The protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called: interior gateway protocol (IGP).
A network refer to a set of interconnected computer systems (nodes) and the relational ties linking the computer systems together, especially for the purpose of exchanging (transmitting) data electronically.
An autonomous system (AS) can be defined as a network or group of networks that are administered or managed by an individual or business firm while using a single set of management rules.
Generally, an autonomous system (AS) typically uses a single (one) Internet Protocol (IP) routing protocol.
In this context, the protocol that is used by network or networks within an autonomous system (AS) to communicate with each other is generically called an interior gateway protocol (IGP).
On the other hand, an exterior gateway protocol (EGP) is the protocol that is used by autonomous systems (AS) to communicate with each other.
Read more: https://brainly.com/question/20629962
Project: On Assignment as a Web Developer
Assignment Directions:
Create a web page for a fictitious company: Widgets Inc. has hired you to make a mock-up for their new website. They are on a budget and only want to have a presence on the Internet. They do not need any fancy bells and whistles. They have sent you an email message with the basic parameters of the site.
The site should have at least three pages. They should include the landing page (commonly named index.htm), a contact page, and a "Meet the Company" page.
Each page should have an identical header containing the company name and motto: "We make widgets fun!"
Each page must include navigation back to the home page (without needing to use the Back button on the browser).
All font styles and alignment must be performed with inline CSS.
The company mascot is a dog, but there is no logo provided in this project. Any picture of a dog will do. Make sure it is prominently displayed on each page.
Each page should display in a web browser with a title.
All employees on the "Meet the Company" page can be random people's photos from the Internet. Please include Jack Sprat, President, Tom Thumb, Vice President, Sally Flag, Treasurer, and Monty Fuller, Secretary.
All text for these pages can be fake. See this website to create filler paragraphs.
Make up email addresses, but use the mail to: command as a hyperlink and display the person's name and not the actual address.
Each page should have a link to the other pages.
Link to at least three remote web pages. One of these should be formatted in an iframe.
The main page should have a sample product table including the following information:
Name Size Color Lead time Price Discount (for 10)
W-1 1X1 Blue 1 week $200.00 10%
R-2 2X2 Green 1 week $1,200.00 15%
D-2 2X3 Red 2 weeks $12,000.00 20%
Assignment Guidelines:
Projects will be assessed on following the requirements and style. Use color (creatively), at least two typefaces, headings, bold and italics, images, background colors, and so on to make your pages.
Submission Requirements:
Standard HTML
Question # 1
File Upload
Ensure that you fulfill all requirements, then upload your final web page project.
Answer:
It is not possible to upload files .html files here
Edward scissorhands Of course, Jim is the villain, but who or what is the antagonist in the film? Explain in detail.
Pedestrians, bicyclists, and skateboarders _____ the rules of right-of-way when they use the road.
Pedestrians, bicyclists, and skateboarders must follow the rules of right-of-way when they use the road.
Chapter 20 reading and vocab review
Explain the subtractive and additive approaches to editing.
Answer:
Essentially additive editing and stringing “the good stuff” together, whereas subtractive is more about stringing all your raw footage together and “removing the bad stuff”
Additive editing feels confident and concerned with the pursuit of a specific, existing vision. And it’s faster. Subtractive editing feels like a deeper listening to what the footage is saying, and holding on to many potential permutations.
Explanation:
Addictive editing - creating a program from raw footage by starting by starting with nothing and adding selected components
Subtraction editing - creating a program by removing redundant or poor quality material from the original footage
In older languages, you could leave a selection or loop before it was complete by using a ____ statement
Answer:
D) go to
Explanation:
A) next
B) go next
C) loop
D) go to
D) go to is correct answer
(Hope this helps can I pls have brainlist (crown)☺️)
what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?
rules
feedback
tasks
algotithms
Answer:
A. Rules
Explanation:
Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player
When it comes to game mechanics, what is the most universal mechanic that is present in virtually every computer game that you can think of?
quests and goals
movement
catch-up
turns
I have no Clow but I wanted to answer because you cute
Explanation:
none
In a complex formula, how does excel determine which calculation to perform first?.
In a complex formula, the way excel determines which calculation to perform first is that; It follows the order of operations.
When carrying out calculations in excel, if we don't bracket certain operations, excel will use the order of operation called BODMAS to determine which operation to carry out first.
For example, if excel wants to solve 3 × 4 + 7 - 2;
The acronyms in BODMAS stand for;
B - Brackets
O - Orders (powers/indices or roots)
D - Division
M - Multiplication
A - Addition
S - Subtraction
Now, it means that the first action it will perform is Bracket while the last will be subtraction.
In our example, excel will first use the multiplication sign to get;
(3 * 4) = 12
Then addition; 12 + 7 = 19
Then subtraction; 19 - 2 = 17
Read more on BODMAS at; https://brainly.com/question/16788360
What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop entry, and the expression that alters the loop control variable, all in one convenient place
Answer:
I think it's a for loop.
A for loop looks like:
for (starting statement; condition that is true; condition applied to iteration)
Explanation:
Lloyd works for a graphic design company. He needs a monitor that accurately represents colors. Lloyd's monitor recently failed, and you have been asked to purchase a new one. You have been asked to find a monitor with a fast pixel refresh rate, low energy consumption, and very accurate colors representation.
Required:
What types of display devices will BEST meet the requirements requested?
OLED simply stands for Organic Light-Emitting Diode. It is often regarded as a type of technology that uses LEDs in which the light is produced by organic molecules. The types of display devices will best meet the requirements requested OLED.
They are often regarded as organic LEDs that are used to produce display panels.
OLED displays are produced with a number of organic thin films between two conductors. It has a form of a simple design that has a lot of merits over other display technologies.These technology are mostly used today in mobile devices as they give a better image quality.
Learn more from
https://brainly.com/question/14781150
how to make your phone flash when you get a notification
Answer:
If your talking about it turning on then go to notifications in the settings and turn on badges. If your talking about the flashlight on ur phone not possible.
Explanation:
Power Supply
Description :
A device that supplies power to electronic equipment which; is sometimes called A, B, or C according to its purpose of heating vacuum tube cathodes, producing electron current flow in plate circuits, or applying a direct voltage in grid circuits.
Explanation:
Not exexactly sure on what your asking
A ______ error occurs when the program's grammar and punctuation is correct, but something happens to halt the program before it is finished.
1. Runtime
2. Syntax
3. Logical
Answer:
Logical error
Explanation:
Answer:
Runtime
Explanation:
The program stops execution before the end of the instructions has been reached. It is not due to poor grammar/punctuation which would be a syntax error. A logical error would be due to an error in the programmer's logic but would not cause the program to terminate abnormally. This is also not the case.
Set the Append Only property to _____ to allow users to add data to a Long Text field but not to change or remove existing data.
A computer data storage is made of many features. Set the Append Only property to YES to allow users to add data to a Long Text field but not to change or remove existing data.
Append-only is known to be a characteristic or component of computer data storage. It is where new data can be appended to the storage, but where existing data is said to be immutable.A field's data type is very essential property as it shows what kind of data the field can store.
Learn more from
https://brainly.com/question/24795103
Daphne has determined that she has malware on her linux machine. She prefers to only use open-source software. Which anti-malware software should she use?.
Answer:
ClamAV is the open source antivirus you can in your Linux machine.
ClamAV is one of the best open-source anti-malware software for Linux machines.
What is malware?Any program or file that purposefully hurts a computer, network, or server is known as malware or malware. Computer viruses, worms, Keyloggers, extortion, and spyware are examples of infection.
By analyzing all received packets to stop malware from being launched and infiltrating a computer, antiviruses can assist in preventing malware attacks. Antimalware software can also identify sophisticated malware and provide defense against ransomware assaults.
Hence "One of the top free anti-malware programs for Linux systems is ClamAV".
To learn more about malware,
https://brainly.com/question/22185332
#SPJ12
Assuming a 1-KB page size, what are the page numbers and offsets for the following address references (provided as decimal numbers): a. 3085 b. 42095 c. 215201 d. 650000 e. 2000001
Answer:
(a) page = 3; offset = 13
(b) page = 41; offset = 111
(c) page = 210; offset = 161
(d) page = 634; offset = 784
(e) page = 1953; offset = 129
The page numbers and offsets for the following address are:
page number 3, with an offset of 13.page number 41, with an offset of 47.page number 210, with an offset of 641.page number 634, with an offset of 496.page number 1953, with an offset of 49.To find the page numbers and offsets for the given address references, we need to perform some calculations based on the page size.
Assuming a 1-KB page size (1 KB = 1024 bytes), use the following formulas:
1. Page number = Address reference / Page size
2. Offset = Address reference % Page size
a. 3085:
Page number = 3085 / 1024 = 3
Offset = 3085 % 1024 = 13
Address 3085 is on page number 3, with an offset of 13.
b. 42095:
Page number = 42095 / 1024 = 41
Offset = 42095 % 1024 = 47
Address 42095 is on page number 41, with an offset of 47.
c. 215201:
Page number = 215201 / 1024 = 210
Offset = 215201 % 1024 = 641
Address 215201 is on page number 210, with an offset of 641.
d. 650000:
Page number = 650000 / 1024 = 634
Offset = 650000 % 1024 = 496
Address 650000 is on page number 634, with an offset of 496.
e. 2000001:
Page number = 2000001 / 1024 = 1953
Offset = 2000001 % 1024 = 49
Address 2000001 is on page number 1953, with an offset of 49.
Learn more about offset here:
https://brainly.com/question/32088531
#SPJ3
A business is having trouble keeping up with the competition. They cannot
respond to their customers like the competition. Which type of system will
likely be able to help them solve this issue?
A. Transaction processing system
B. Management communication system
C. Decision support system
D. Management information system
Answer:
Decision support system is the answer
Explanation:
Do you think should give credit to people who invented viral dances?
Answer:
michal jackson i think who credit to people invented viral dances.
Answer:
Yes
Explanation:
Well, they added some taste to life.
a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a
Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.
A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.
It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.
Read related link on:
https://brainly.com/question/25820385
Six months ago, you purchased a new laptop. Since then, you notice that the battery life has been steadily going down. When it was new, and full charge lasted about three hours. Now your lucky to get two hours before the battery charge level drops the 5%. What should be your first step to correct the problem?a. Calibrate the batteryb. Replace the power meter chip on the batteryc. Clean the contacts on the batteryd. Buy a new battery
Answer:
A. Calibrate the battery
Explanation:
It is unlikely that the battery has deteriorated significantly in the timespan of six months. The laptop is likely being shut down due to inaccurate battery levels to protect the laptop. Battery calibration will ensure accurate battery information is reported.
Kyra is protesting corruption in the mayoral office. She is afraid that the mayor has access to her emails where she discusses his wrongdoings. Which of the following laws protects her electronic communication from being accessed by the government or law enforcement agencies?
Answer:i don’t know sorry
Explanation:
Elan inserted shapes into a slide in his presentation. What is the quickest way to format those shapes?
it's C. Shape Styles gallery got a 100
Answer:
c. Shape Styles gallery
Explanation: is correct. post protected
1.What is the output of the following program? [10 Marks]namespace ConsoleApp1{class Program{static void Main(string[] args){int i, j;int [,] A = new int[5,5];for (i = 0; i < 5; ++i){for (j = 0; j < 4; ++j){A[i,j] = i*j;}}for (i = 0; i < 5; ++i){for (j = 0; j < 4; ++j){if (i < 5){A[j, i] = A[i, j];}elsebreak;Console.Write(A[i, j] + " ");}Console.WriteLine();}Console.ReadLine();}}}
The program outputs the following rectangular array:
0 0 0 0
0 1 2 3
0 2 4 6
0 3 6 9
0 4 8 12
This is the correctly formatted C# program:
namespace ConsoleApp1{
class Program
{
static void Main(string[] args)
{
int i, j; // declare index variables used to iterate over the array A
int [,] A = new int[5,5]; // create a 5 by 5 array
/* Iterate over the array with the index variables i and j
and initialize each location A[i, j] with the product
of i and j. */
for (i = 0; i < 5; ++i)
{
for (j = 0; j < 4; ++j)
{
A[i, j] = i*j;
}
}
/* Iterate over the array again. This time, swap locations
A[i, j] with A[j, i] */
for (i = 0; i < 5; ++i)
{
for (j = 0; j < 4; ++j)
{
if (i < 5)
{
A[j, i] = A[i, j];
}
else
break;
// display the current location A[i, j]
Console.Write(A[i, j] + " ");
}
/* print a newline to prepare for the next line of printing
which corresponds to the next column i */
Console.WriteLine();
// pause and wait for user keypress before continuing
Console.ReadLine();
}
}
}
}
When executed, this program simply prints a rectangular array like so;
0 0 0 0
0 1 2 3
0 2 4 6
0 3 6 9
0 4 8 12
Learn more about predicting program output here: https://brainly.com/question/20259194
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicles. You are concerned that someone might walk by and take one of these laptops. Which of the following is the BEST protection to implement to address your concerns?
a. Require strong passwords in teh local security policy.b. Use cable locks to chan the laptops to the desks.c. Implement screen saver passwords.d. Encrypt all company data on the hard drives.
There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.
The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.With this, your computer becomes theft-proof.
Thia will give you piece of mind as you will not be restless anymore.
Learn more about Laptop security from
https://brainly.com/question/24956493
Which option ensures that items in a text box or table cell will be in the absolute center of that element?
*i chose b. center, align, middle and got a 100 edg21
Answer:
Center, Align, Middle
Explanation:is correct. post protected
One of the difficult things about working in game design is that while there are many different roles, most of them only match one specific personality type.
True
False
Answer:
it's false
Explanation:
they don't match to personalities
I need help with this question
What is the “digital divide”?
A. the gap between people who are very skilled using the Internet and people who are less skilled.
B. the gap between the time before Smartphones debuted and the time they became widely used.
C. the gap between people who have readily available Internet access and people who do not.
D. the gap between the time before the Internet debuted and the time it became popular.
Answer:
C IS YOUR ANSWERexplanation is availableExplanation:
The digital divide describes the gap between people who have access to affordable, reliable internet service (and the skills and gadgets necessary to take advantage of that access) and those who lack it. ... The Access Divide—This is the most visible digital divide.Answer:
option c is the answer....
true or false windows 98 and windows xp are examples of an operating system?
Answer:
true
Explanation:
1.Write a C++ program that allows the user to enter the phrase "I am smart". Output the first letter and last letter of the phrase using string properties.
2.Write a C++ program to output the following values after they are loaded into an array: 67, 45, 12, 89, 46, 88 and 43.
PLS Help they are different questions
Answer:
1)
string value;
cout << "type I am smart";
cin >> value; // get user input from the keyboard
2)
int num1 = 67;
int num2 = 45;
int num3 = 12;
int num4 = 89;
int num5 = 46;
int num6 = 89;
int num7 = 46;
int num8 = 88;
int num9 = 43;
int numbers [ ] = {num1,num2,num3,num4,num5,num7,num8,num9} ;
//to load it as a function
int main ()
{
for ( n=0 ; n<5 ; n++ )
{
result += numbers[n];
}
cout << result;
return 0;
}
The C++ programs are illustrations of arrays and strings
The program 1The program written in C++ is as follows:
#include<iostream>
using namespace std;
int main(){
//This declares the string
string myStr;
//This gets the input
cin>>myStr;
//This prints the first and the last index elements
cout<<myStr[0]<<" "<<myStr[myStr.length()-1];
return 0;
}
The program 2The program written in C++ is as follows:
#include<iostream>
using namespace std;
int main(){
//This initializes the array
int myArr [] = {67, 45, 12, 89, 46, 88, 43};
//This prints the array elements
for(int i = 0; i<7;i++){
cout<<myArr[i]<<" ";
}
return 0;
}
Read more about arrays and strings at:
https://brainly.com/question/15683939
#SPJ2
We use the keyboard to point, click, and select menus and icons, and for onscreen navigation. True or False
Answer:
False.
Explanation:
Hope I could help. Hey, have a nice study time.
Answer:
false
Explanation:
we use our keyboard to type not click icons or point.