Answer:
Your submission must include a detailed explanation of the following:
Physical layer
Physical layer refers, in computing, to the consideration of the hardware components involved in a given process. In terms of networks, the physical layer refers to the means of connection through which data will travel, such as serial interfaces, or coaxial cables.
Data link layer
The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network. The data link layer is Layer 2 in the Open Systems Interconnection (OSI) architecture model for a set of telecommunication protocols. Data bits are encoded, decoded and organized in the data link layer, before they are transported as frames between two adjacent nodes on the same LAN or WAN. The data link layer also determines how devices recover from collisions that may occur when nodes attempt to send frames at the same time.
Network layer
The network layer of the OSI model is responsible for controlling overall network operation. Its main functions are the routing of packets between source and destination, even if they have to pass through several intermediate nodes along the route, congestion control and accounting for the number of packets or bytes used by the user for charging purposes.
Transport layer
The transport layer is the layer in the open system interconnection (OSI) model responsible for end-to-end communication over a network. It provides logical communication between application processes running on different hosts within a layered architecture of protocols and other network components. The transport layer is also responsible for the management of error correction, providing quality and reliability to the end user. This layer enables the host to send and receive error corrected data, packets or messages over a network and is the network component that allows multiplexing.
MAC address
When we talk about physical address we are referring to the MAC (Media Access Control) address which is 48 bits (12 hexadecimal characters).
IP address
An Internet Protocol Address (IP Address) is a numeric label assigned to each device (computer, printer, smartphone, etc.) connected to a computer network using the Internet Protocol. for communication.
TCP port
if you are using a File Transfer Protocol (FTP) program, the Internet connection is made through TCP port 21, which is a standard port for this protocol. If you are downloading files from BitTorrent, one of the ports ranging from 6881 to 6889 will be used for such activity.
Checksum check
This is done by calculating the checksum of the data before sending or storing it, and recalculating it upon receipt or retrieval from storage. If the value obtained is the same, the information has not changed and therefore is not corrupted.
More simplified forms of these sums are vulnerable because they do not detect some forms of failure. The simple sum of character values, for example, is vulnerable to their changing order by the commutativity of the sum. There are more elaborate ways of calculating these sums that solve these problems, such as the Cyclic Redundancy Check or CRC widely used for fault detection by dividing polynomials.
Routing table
In a computer network, a routing table, or routing information base, is a data table stored on a network router or host that lists the routes to specific network destinations and, in some cases, metrics associated with those routes.
TTL
Time to Live, which means the number of hops between machines that packets can take a computer network before being discarded (maximum of 255).
Any router is programmed to discount a unit of TTL to packets flowing through it. This is a way to avoid that packages remain on the net for infinite time, if the routing is not being done properly, as in the case of looping.
This value is also useful in screening circuits traversed by packets, as does the tracerouting tool.
Hope this helps :) -Mark Brainiest Please :)
Answer: True
Explanation: File allocation table(FAT) is the part of the file system that helps the hard drives .It is used for the management of the files and data which gets stored in the hard drive by the operating system. It can also help in the extension or expansion of the hard drive storage.
It also keeps tracing the files and data accordingly. This table works for the portable devices ,cameras etc. Thus, the statement given is true.
Answer:
The load instructions in the ALU input registers take the 5 nsec, and tuns the ALU and this takes the 10 nsec and thus stores the result back into the scratchpad registers and this takes 5 nsec. The data path cycle in it is 20 nsec.
The total time is 20 nsec for one cycle.
To calcualte the MIPS, divide one second with 20 nsec.
Millions of instructions per second (MIPS) = (1*10^9 nsec)/20 nsec = 50,000,000 nsec
Therefore, the maximum number of MIPS this machine is capable of in the absence of pipelining is 50 MIPS.
Explanation:
Answer:
Following are the code to this question:
public class Pig //Defining class Pig
{
private String name; //Defining string variable name
private int age; // Defining integer variable age
private double weight; // Defining double variable weight
Pig (String name, int age, double weight) //Defining parameterized constructor
{
super(); //using super key
this.name = name; //holding value in name variable
this.age = age; // holding value in age variable
this.weight = weight; // holding value in weight variable
}
String getName() //Defining method getName
{
return name; //return name value
}
void setName(String name) // Defining method setName
{
this.name = name; //hold name value
}
int getAge() // Defining method getAge
{
return age; //return value
}
void setAge(int age) // Defining method setAge
{
this.age = age; // hold age value
}
double getWeight() //Defining method getWeight
{
return weight; //return weight value
}
void setWeight(double weight) //Defining method setWeight
{
this.weight = weight; //hold weight value
}
void display() //Defining method display
{
System.out.println("Name:" + name + " Age:" + age + " Weight:" + weight); //print value
}
public static void main(String[] ar) //Defining main method
{
Pig onc = new Pig("Jig",5,14.5); //creating class object and called parameterized constructor
onc.display();//calling display method
}
}
Output:
please find the attachment.
Explanation:
In the given java program, a class "Pig" is declared, in which three name, age, and weight is defined which differs in datatypes, in the next step, parameterized constructor, get and set method, and display method declared, which can be described as follows:
Answer:
C++.
Explanation:
#include <iostream>
using namespace std;
////////////////////////////////////////////////////////////////
void printPrime(int n) {
if (n > 0) {
cout<<2<<endl;
for (int i=3; i<=n; i++) {
bool isPrime = true;
for (int j=2; j<i; j++) {
if (i % j == 0) {
isPrime = false;
break;
}
}
if (isPrime == true)
cout<<i<<endl;
}
}
else {
cout<<"Invalid input";
}
}
int main() {
int n;
cout<<"Enter positive integer: ";
cin>>n;
printPrime(n);
return 0;
}
Answer:
Scope creep is defined as the uncontrolled changes occur in the projects scope is known as scope creep. It basically occur when the project scope are not properly define and controlled.
Suggestions for preventing scope creep in projects are as follow:
Answer:
The program to this question as follows:
Program:
#include <iostream> //defining header file
using namespace std;
void PrintPopcornTime(int bagOunces) //defining method PrintPopcornTime that accepts bagOunces
{
//defining conditional statement
if (bagOunces < 3) //if block checks bagOunces less then 3
{
cout << "Too small"<<endl;
}
else if (bagOunces > 10)
{
cout << "Too large"<<endl; //else if value greater than 10
}
else //else block
{
cout << (bagOunces*6) <<" seconds"<<endl; //calculate seconds
}
}
int main()
{
int bagOunces; //defining integer variable bagOunces
cout<<"Enter number: "; //message
cin>>bagOunces; //input value by user
PrintPopcornTime(bagOunces); //calling the method
return 0;
}
Output:
Enter number: 3
18 seconds
Explanation:
In the above C++ language code, the first header file is defined, then the method "PrintPopcornTime" is defined, in this method, an integer variable "bagOunces" is passed as a parameter, inside the method a conditional statement is used that can be described as follows:
In the next step, the main method is defined, inside this method, an integer variable "bagOunces" is defined, which is used for user input and inside this method, the PrintPopcornTime is called.
The completed function "PrintPopcornTime()" can be referred to as given below.
We have,
The completed function "PrintPopcornTime()" as requested:
void PrintPopcornTime(int bagOunces) {
if (bagOunces < 2) {
System.out.println("Too small");
} else if (bagOunces > 10) {
System.out.println("Too large");
} else {
int time = 6 * bagOunces;
System.out.println(time + " seconds");
}
System.out.println();
}
In this function, we check the value of "bagOunces" using conditionalstatements.
If it's less than 2, we print "Too small".
If it's greater than 10, we print "Too large".
Otherwise, we calculate the time by multiplying 6 with "bagOunces" and print it followed by " seconds".
Finally, we print a new line to end the output.
Thus,
The completed function "PrintPopcornTime()" can be referred to as given above.
Learn more about programming of functions here:
#SPJ6