Questions
The router is in interface mode when the router prompt is________ Group of answer choices Router(config-Line)#...

The router is in interface mode when the router prompt is________

Group of answer choices

Router(config-Line)#

Router(config-if)#

Router(config)#

Router(config-router)#

With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you access the router.

interface

router

line

global

In: Computer Science

Write a MATLAB script which gets a matrix as input and check the dimensions of the...

Write a MATLAB script which gets a matrix as input and check the dimensions of the input:

Part A) If the input matrix is a square matrix, calculate the inverse of it and show it in the command window, otherwise, show the text “the input matrix is not invertible”.

Part B) Reshape the input matrix to a row vector and assign it to Y and make a vector named X with the same length as Y then make a 2D Plot and show it.

In: Computer Science

Hi! I have a question in Data communication and network please! Make the “ping” return the...

Hi!

I have a question in Data communication and network please!

Make the “ping” return the following messages:

1_ Request Timed Out
2_Destination Network / Host unreachable
3_Time Exceeded

and explain the reasons.

I want to se result please, My computer is Mac.

Thanks!

In: Computer Science

Would your school or place of work benefit from cloud computing? Identify at least two cloud...

Would your school or place of work benefit from cloud computing? Identify at least two cloud computing vendors and research their features and costs. Then, examine one element of your chosen network’s infrastructure and apply it to cloud computing. Would it be feasible to migrate to the cloud? Would it be cost effective? Why or why not?

In: Computer Science

in. java Write a program that reads a string from the user, and creates another string...

in. java

Write a program that reads a string from the user, and creates another string with the letters from in reversed order. You should do this using string concatenation and loops. Do not use any method from Java that does the work for you. The reverse string must be built. Do not just print the letters in reversed order. Instead, concatenate them in a string.

--- Sample run:
This program will create a string with letters in reversed order.
Enter a string: banana
The reversed string is: ananab
Bye

--- Sample run:
This program will create a string with letters in reversed order.
Enter a string: what the heck
The reversed string is: kceh eht tahw
Bye

In: Computer Science

in.java Write a program that reads an integer from the user and prints a rectangle of...

in.java

Write a program that reads an integer from the user and prints a rectangle of starts of width 5 3 and height N.

Sample run 1:
Enter N: 5
***
***
***
***
***
Bye

Sample run 2:
Enter N: 8
***
***
***
***
***
***
***
***
Bye

Sample run 3:
Enter N: 2
***
***
Bye

Sample run 4:
Enter N: -2
Bye

In: Computer Science

Consider the following simple script incorporating a for loop: #!/bin/bash RED='\033[0;31m' NC='\033[0m' clear; cd /home for...

Consider the following simple script incorporating a for loop:

#!/bin/bash
RED='\033[0;31m'
NC='\033[0m'
clear; cd /home
for DIR in $HOME; do
#for DIR in *;do
CHK=$(grep -c "/home/$DIR" /etc/passwd)
if [ $CHK -ge 1 ]
then
echo -e "${NC}$DIR is good"
else
echo -e "${RED}ALERT! $DIR is NOT good!"
fi
done

What kind of script is presented above? How did you make your determination? What is the purpose of the script?

In lines #5/6, what is the type of $DIR?

In line #7, what is the value of $CHK?

In line #8, what are the instructions contained with the brackets known as?

Why are there two lines containing the word "for"? Which line will execute? Will that line execute correctly?

What should you do before running the script?

How could the script be factored into your duties as a sysadmin?

In: Computer Science

Write a java program MyCalendar that outputs a monthly calendar for a given month and year....

Write a java program MyCalendar that outputs a monthly calendar for a given month and year.
the output should be looks like this one at the bottom:( I don't know why it doesn't show right but the first day of the month is not Sunday it starts from Wednesday)

F. Last’s My Calendar
Enter month year? 10 2019
10/2019
Sun Mon Tue Wed Thu Fri Sat
---------------------------------
1 2 3 4
5 6 7 8 9 10  11
12 13 14 15 16 17 18
19 20 21   22 23 24 25
26 27 28 29 30 31

In: Computer Science

PYTHON Search for an element in a 2D sorted matrix using the binary search technique. Your...

PYTHON

Search for an element in a 2D sorted matrix using the binary search technique. Your code should run in O(m + n) where m is the number of rows and n is the number of columns
The python file should have a function named binarysearch

The function should take two arguments. The first argument of the function will be the element to search for. Second argument of the function will be the matrix as a List[List].
The function should return the row and column of the matrix if the element is found. Use a tuple to return the row and column. Return "Not Found" if the element is not found.

Sample values for input and output :

Sample Input:
Case 1: binarysearch(4, [[1, 2, 3],[4, 5, 6],[7, 8, 9]] )
Case 2: binarysearch(10,[[2, 3, 4],[5, 7, 9],[11, 12, 13],[20, 22, 24]]

Sample Output :
Case 1: (1 , 0)
Case 2: Not Found

In: Computer Science

Docker containers can be considered a new era of virtualization that has fundamentally changed the IT...

Docker containers can be considered a new era of virtualization that has fundamentally changed the IT industry. For this discussion question, provide a brief response that describes a Docker container and how a container differs from a hypervisor. What potential do you see in Docker containers?

In: Computer Science

The decimal number 210 expressed in binary is ____. 11010011 11011011 11010010 11010111 ____ is the...

The decimal number 210 expressed in binary is ____.

11010011

11011011

11010010

11010111

____ is the most important layer 3 security protocol.

ARP

NAT

DNS

IPSec

In: Computer Science

In pumping lemma I know how to prove 0^n 1^n is not regular but what changes...

In pumping lemma I know how to prove 0^n 1^n is not regular but what changes when I have 0^n 1^n 2^n (three variables). Do I need to check 6 variations

of 0,1 and 2 instead of only 3 in 0^n 1^n?

thanks.

In: Computer Science

Developing a set of classes demonstrating inheritance - in class work

Developing a set of classes demonstrating inheritance - in class work

In: Computer Science

Write and run SQL statements to complete the following tasks Show the details of the vendors...

Write and run SQL statements to complete the following tasks

  1. Show the details of the vendors who are located in area code 615.
  2. Show the details of the products that do not have a value for the attribute v_code.
  3. Show the details of the invoices whose subtotal is greater than 25 but less than 75.
  4. Show the details of the invoice who has the minimum subtotal.
  5. Show the codes and names of the vendors who supplied products.
  6. Using EXCEPT show the codes of the vendors who did not supply any products.
  7. Using ‘NOT IN’ show the codes and names of the vendors who did not supply any products.
  8. List the codes of vendors and the number of products each vendor has supplied, i.e. vendor XXX has supplied xxx products, and vendor YYY has supplied yyy products etc.
  9. List the names and codes of vendors and the number of products each vendor has supplied, i.e. vendor XXX has supplied xxx products, and vendor YYY has supplied yyy products etc.
  10. Add a new attribute (field) status varchar(6) to the EMP table.
  11. Update status for employee '100' to 'Temporary'.
  12. Using inner join, list the details of the products whose line price is greater than 100.

You are required to answer

1.   The SQL statements for each query, which should be copied and pasted into word.

2. tell all the sql command for each question?

tables: -

VENDOR TABLE

V_CODE

V_NAME

V_CONTACT

V_ARAECODE

V_PHONE

V_STATE

V_ORDER

PRODUCT TABLE

P_CODE

P_DESCRIPT

P_INDATE

P_QOH

P_MIN

P_MIN

P_DISCOUNT

V_CODE

CUSTOMER TABLE:

CUS_CODE

CUS_LNAME

CUS_FNAME

CUS_INITIAL

CUS_AREACODE

CUS_PHONE

CUS_BALANCE

INVOICE TABLE:

INV_NUM

CUS_CODE

INV_DATE

INV_SUBTOTAL

INV_TAX

INV_TOTAL

LINE TABLE:

INV_NUMBER

LINE_NUMBER

P_CODE

LINE_UNITS

LINE_PRICE

LINE_TOTAL

EMPLOYEE TABLE:

EMP_NUM

EMP_TITLE

EMP_LNAME

EMP_FNAME

EMP_INITIAL

EMP_DOB

EMP_HIRE_DATE

EMP_AREACODE

EMP_PHONE

EMP_MGR

In: Computer Science

Discuss in details the applications and challenges of Mobile Database in Public and Private Sector

Discuss in details the applications and challenges of Mobile Database in Public and Private Sector

In: Computer Science