Get statements to get input values into first Month and firstYearThe Get statement in the COBOL programming language is used to receive data from the input devices such as a keyboard.
The Get statement is followed by the file name from which the data is to be read. The two Get statements that can be used to get input values into first
Month and firstYear are as follows:GET INPUT-FILE1 FIRSTMONTH.GET INPUT-FILE1 FIRSTYEAR.Put statements to output the month, an underscore, and the year
The Put statement in the COBOL programming language is used to display data to the output devices such as a monitor or a printer. The Put statement is followed by the file name to which the data is to be written.
The three Put statements that can be used to output the month, an underscore, and the year are as follows:
PUT OUTPUT-FILE FIRSTMONTHPUT OUTPUT-FILE "_"PUT OUTPUT-FILE FIRSTYEAR.
Example:If the input is 1 2000, the output will be:GET INPUT-FILE1 FIRSTMONTH.GET INPUT-FILE1 FIRSTYEAR.PUT OUTPUT-FILE FIRSTMONTH.PUT OUTPUT-FILE "_".PUT OUTPUT-FILE FIRSTYEAR. The output will be 1_2000.
To know more about COBOL click on below link:
https://brainly.com/question/12978380#
#SPJ11
____________________ is the measure of how quickly a font can be read
Readability is the measure of how quickly a font can be read. Readability is an important consideration when selecting a font for use in printed materials, such as books, magazines, and newspapers, as well as digital media, such as websites and mobile apps.
Several factors can impact readability, including font size, line spacing, and character spacing. Fonts that are too small or too tightly spaced can be difficult to read, while fonts that are too large or too widely spaced can be distracting. Additionally, fonts that use unusual or complex letter shapes can be more difficult to read than more traditional fonts.
Another important consideration for readability is the contrast between the font and the background. A font that is too light or too similar in color to the background can be difficult to read, while a font that is too dark or too contrasting can be harsh on the eyes.
Overall, readability is an important consideration for designers and publishers who want to ensure that their content is accessible and easy to read. By selecting fonts that are clear, legible, and appropriately sized and spaced, designers can help to improve the readability of their materials and make them more engaging and accessible to a wider audience.
To learn more about Readability formulas, visit:
https://brainly.com/question/28199721
#SPJ11
Kyle returns to work the next day and he would like to continue working on the document from yesterday. What should Kyle do?
Double-click on the Start menu.
Look for his open document in the system tray.
Locate his file and click twice on it.
Locate his file, right click, and select Print.
Answer:
Locate his file and click twice on it.
You have recently joined in an academic programme to learn more about
programming. You have learnt a few programmes. Your teacher has now given you a
number of tasks to complete.
a) Explain the concept of an algorithm and describe common algorithmic
techniques and solutions.
b)Create a flowchart from the following algorithm.
Step 1: Input VALUE1, VALUE2
Step 2: if (VALUE1 > VALUE2) then
MAX VALUE1
else
MAX VALUE2
endif
Step 3: Print “The largest value is”, MAX
The concept of an algorithm simply refers to the procedure that is used in problem-solving.
The description of the common algorithmic techniques and solutions are:
Brute-force or exhaustive search.Divide and Conquer.Greedy Algorithms.Dynamic Programming.Branch and Bound Algorithm.Randomized Algorithm.Backtracking.The sample flowchart:START
Input
VALUE1,VALUE2
is
VALUE1>VALUE2
If yes
MAX VALUE1
If no
MAX VALUE2
“The largest value is”, MAX
STOP
Read more about flowcharts here:
https://brainly.com/question/6532130
#SPJ1
which one of the following should you not do when you run out of ip addresses on a subnet? group of answer choices make the existing subnet larger add a second subnet in the same location, using secondary addressing migrate to a new and larger subnet create a new subnet on a different ip range
Answer:
You should not "add a second subnet in the same location, using secondary addressing" when you run out of IP addresses on a subnet. Secondary addressing is typically not recommended as it can lead to complex configurations and may cause routing issues.
Explanation:
What is a problem that social media was used to solve?
One problem that social media has been used to solve is the dissemination of information and promoting awareness on various social and humanitarian issues.
Social media platforms have provided a powerful tool for individuals and organizations to raise awareness about important causes, share news, and mobilize support.
For example, social media campaigns have played a crucial role in raising awareness about important issues such as climate change, gender equality, mental health, and human rights violations.
Hashtags and viral challenges have spread across platforms, engaging millions of users and bringing attention to these causes. The widespread use of social media has enabled individuals from diverse backgrounds to unite and amplify their voices, leading to increased awareness, public discourse, and even policy changes.
Moreover, social media has also facilitated the sharing of critical information during times of crisis or emergencies. During natural disasters, social media platforms have been used to coordinate relief efforts, locate missing persons, and provide real-time updates on the situation.
Overall, social media has served as a catalyst for positive change by providing a platform for information dissemination, raising awareness, and mobilizing support for important social and humanitarian issues.
For more such questions on Social media,click on
https://brainly.com/question/32333874
#SPJ8
What feature is essential for managing code iterations within the provisioning and deprovisioning processes
Answer:
Version control is an ID system for each iteration of a software product
The feature that is essential for managing code iterations within the provisioning and de-provisioning processes is known as version control.
What is Code iteration?Code iteration may be defined as a set of instructions or codes that are significantly repeated until a specific end outcome is achieved. Iterative development is sometimes called circular or evolutionary development.
According to the context of this question, version control represents an ID system for each code iteration with respect to its software products. This governs all the processes of code iteration as per the user's instruction and executes the entire process before revealing the outcome or output of that code.
Therefore, the feature that is essential for managing code iterations within the provisioning and de-provisioning processes is known as version control.
To learn more about Code iteration, refer to the link:
https://brainly.com/question/26995556
#SPJ6
Your question seems incomplete. The most probable complete questin is as follows:
What feature is essential for managing code iterations within the provisioning and de-provisioning processes?
Version control.Secure tagging.Software diversity.Continuous monitoring.which of the following would be considered a career in communication? Select all that apply. A actor B author C editor D journalist
Answer:
1. The answers are B and D
2. The answer is A
3. The answer is A
4. The answers are C and D
Are the answers to this question.
A career in communication involves the use of professionals in mass media to to pass messages across to an audience.
Professionals in media work with different companies, organizations and businesses to do the jobs of influencing and educating people or the intended audience about happenings, products and services and practices.
read more at https://brainly.com/question/13391998?referrer=searchResults
Write down the difference between Sub... end sub and function... end function statement.
any 3 points, please
A sub does something but doesn't give something back. A function provides a value representing the tasks completed. Subs come in many different types and can be recalled from anywhere in the program.
What is sub and end sub in VBA?A Sub procedure is a collection of Visual Basic statements that are delimited by the Sub and End Sub statements and that carry out tasks without producing a result. A calling procedure may give constants, variables, or expressions as inputs to a sub process.
Various processes are used in Visual Basic, including: Sub Procedures carry out tasks but do not provide the calling code with a value in return. Sub procedures known as "event-handling procedures" run in response to an event triggered by a user action or by a program occurrence.
Thus, A sub does something but doesn't give something back.
For more information about sub and end sub in VBA, click here:
https://brainly.com/question/26960891
#SPJ1
1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze
The tool that you can use to find duplicates in Excel is c. Conditional Formatting
b. the first real row of datac. analyze, data, and programsWhat is Conditional Formatting?Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.
Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.
Read more about Conditional Formatting here:
https://brainly.com/question/30652094
#SPJ4
If a computer with a 2.2GHz processor is rendering a 15GB video file , how long would it take to process that file?
Unit Equal to:
Kilohertz (KHz) 1000 Hz
Megahertz (MHz) 1000 kHz
Gigahertz (GHz) 1000 MHz
Terahertz (THz) 1000 GHz
Petahertz (PHz) 1000 THz
Exahertz (EHz) 1000 PHz
Zettahertz (ZHz) 1000 EHz
Yottahertz (YHz) 1000 ZHz
If a computer with a 2.2GHz processor is rendering a 15GB video file, how long would it take to process that file?
Answer:
um 3 minutes im in 6th grade so dont listen to me plz
Explanation:
Answer:
maybe 3-10 mins
Explanation:
When searching for your word processing file to finish writing your report, you should look for a file with which extension? (6 points)
Answer:
doc
Explanation:
What is the easiest computer programming language
Answer:
Ther are 8 easiest computer programming language :
• HTML
• CSS
• Javascript
• Python
• Ruby
• Java
• PHP
• C/C++
When a single network server can't handle all the data processing requests, more servers can be added and joined together to create a ______.
When a single network server can't handle all the data processing requests, more servers can be joined together and create a: Cluster and Server farm.
What is a server?A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.
Types of server.Generally, there are different types of server and these include the following:
Centralized ServerDistributed application serverProxy serverDistributed communication serverWeb serverBlockchain serverEmail serverFile serverDatabase serverIn Computer technology, a Cluster and Server farm is usually created by combining two or more servers together when a single network server cannot handle all the data processing requests.
Read more on Servers here: https://brainly.com/question/17054032
#SPJ1
Which of the following is NOT a responsibility of an IT project manager?
A.
writing code
B.
managing the budget
C.
managing the schedule of the project
D.
assigning work to team members
Answer:
I think that The answer is A.
Explanation:
A project manager needs to be a leader which is assigning work, managing the schedule, and manage the budget.
In the name, it says Manager.
This is how I know that.
The one that is not a responsibility of an IT project manager is writing code. The correct option is A.
What is IT project manager?The unique IT objectives of enterprises must be planned, organized, resourced, budgeted, and successfully carried out by IT project managers. Examples of such initiatives include the creation of apps and software.
One of the most difficult occupations is project management since no day is ever the same and you must use all of your project management abilities to address every issue.
Additionally, when an issue arises, your team will turn to you first. They might assume you have all the solutions to their questions. A project manager must be a leader who manages the budget, schedule, and job assignments.
Therefore, the correct option is A. writing code.
To learn more about IT project managers, refer to the link:
https://brainly.com/question/15404120
#SPJ2
if a friend asked you to help her decide what internal sabling system to install in her new house, what kinds of questions wouls you ask her to do? why would you ask those questions?
Answer:
Assuming you mean *cabling system*
you could ask:
- The architectural structure of the building, which houses for the cabling installation.
- The function of the cabling installation.
- The configuration of an already installed system (upgrades and retrofits).
others
- The cable and connection products.
- The types of equipment the cabling installation will support -- present and future.
- Customer requirement.
PLEASE HELP!!!
I was trying to create a superhero class code, but i ran into this error
File "main.py", line 3
def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):
IndentationError: expected an indented block
Here is my actual code:
class superhero:
def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):
# Create a new Superhero with a name and other attributes
self.name = name
self.strengthPts = strengthPts
self.alterego = alterego
self.powers = powers
self.motto = motto
self.villain = villain
def addStrengthPts(self, points):
# Adds points to the superhero's strength.
self.strengthPts = self.strengthPts + points
def addname(self):
if(self.name == "Dr.Cyber"):
print("My hero's name is Dr.cyber!")
elif(self.name == "Mr.cyber"):
print("My hero's name is Mr.cyber!")
elif(self.name == "Cyber Guy"):
print("My hero's name is Cyber Guy!")
else:
print("My hero doesn't have a name")
def addalterego(self):
if(self.alterego == "John Evergreen"):
print("Dr.Cyber's alter ego is John Evergreen")
elif(self.alterego == "John Silversmith"):
print("Dr.Cyber's alter ego is John Silversmith.")
elif(self.alterego == "Johnathen Grey"):
print("Dr.Cyber's alter ego is Johnathen Grey.")
else:
print("Dr.Cyber Does not have an alter ego")
def addpowers(self):
if(self.powers == "flight, super strength, code rewrighting, electronics control, psychic powers"):
print(fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.")
else:
print(Fly. He can rewrite the genetic code of any object around him. he can move objects with his mind.")
def addmotto(self):
if(self.motto == "error terminated!"):
print("rewritting the code!")
else:
print("error eliminated!")
def addvillain(self):
if(self.villain == "The Glitch"):
print("Dr.Cyber's Arch nemisis is The Glitch.")
elif(self.villain == "The Bug"):
print("Dr.Cyber's Arch nemisis is The Bug.")
else:
print("Dr.Cyber has no enemies!")
def main():
newhero = superhero("Dr.Cyber", "John Evergreen", "fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.", "The Glitch", "error terminated!", "0")
print("My Superhero's name is " + newhero.name + ".")
print(newhero.name + "'s alter ego is " + newhero.alterego + ".")
print(newhero.name + " can " + newhero.powers + ".")
print(newhero.name + "'s arch nemisis is " + newhero.villain + ".")
print("when " + newhero.name + " fights " + newhero.villain + ", he lets out his famous motto " + newhero.motto + ".")
print(newhero.name + " defeated " + newhero.villain + ". Hooray!!!")
print(newhero.name + " gains 100 strengthpts.")
main()
PLEASE ONLY SUBMIT THE CORRECT VERSION OF THIS CODE!!! NOTHING ELSE!!!
Answer:
you need to properly indent it
Explanation:
align your codes
Mark the other guy as brainliest, I'm just showing you what he meant.
I'm not sure if that's all that's wrong with your code, I'm just explaining what he meant.
Answer:
def_init(self, name = "", strengthpts = 0, alterego = "", villain "", powers = "", motto = ""):
# Create a new Superhero with a name and other attributes
self.name = name
self.strengthPts = strengthPts
self.alterego = alterego
self.powers = powers
self.motto = motto
self.villain = villain
def addStrengthPts(self, points):
# Adds points to the superhero's strength.
self.strengthPts = self.strengthPts + points
def addname(self):
if(self.name == "Dr.Cyber"):
print("My hero's name is Dr.cyber!")
elif(self.name == "Mr.cyber"):
print("My hero's name is Mr.cyber!")
elif(self.name == "Cyber Guy"):
print("My hero's name is Cyber Guy!")
else:
print("My hero doesn't have a name")
def addalterego(self):
if(self.alterego == "John Evergreen"):
print("Dr.Cyber's alter ego is John Evergreen")
elif(self.alterego == "John Silversmith"):
print("Dr.Cyber's alter ego is John Silversmith.")
elif(self.alterego == "Johnathen Grey"):
print("Dr.Cyber's alter ego is Johnathen Grey.")
else:
print("Dr.Cyber Does not have an alter ego")
def addpowers(self):
if(self.powers == "flight, super strength, code rewrighting, electronics control, psychic powers"):
print(fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants.He can control surrounding electronics to do what he wants. He can move objects with his mind.")
else:
print(Fly. He can rewrite the genetic code of any object around him. he can move objects with his mind.")
def addmotto(self):
if(self.motto == "error terminated!"):
print("rewritting the code!")
else:
print("error eliminated!")
def addvillain(self):
if(self.villain == "The Glitch"):
print("Dr.Cyber's Arch nemisis is The Glitch.")
elif(self.villain == "The Bug"):
print("Dr.Cyber's Arch nemisis is The Bug.")
else:
print("Dr.Cyber has no enemies!")
def main():
newhero = superhero("Dr.Cyber", "John Evergreen", "fly. He is super strong. He can rewrite the genetic code of any object around him to whatever he wants. He can control surrounding electronics to do what he wants. He can move objects with his mind.", "The Glitch", "error terminated!", "0")
print("My Superhero's name is " + newhero.name + ".")
print(newhero.name + "'s alter ego is " + newhero.alterego + ".")
print(newhero.name + " can " + newhero.powers + ".")
print(newhero.name + "'s arch nemisis is " + newhero.villain + ".")
print("when " + newhero.name + " fights " + newhero.villain + ", he lets out his famous motto " + newhero.motto + ".")
print(newhero.name + " defeated " + newhero.villain + ". Hooray!!!")
print(newhero.name + " gains 100 strengthpts.")
main()
Using the flowchart below, what value when entered for Y will generate a mathematical error and prevent our flowchart from being completely executed? 3 0 1 None of these values will produce a mathematical error
Answer:
The answer is the last choice that is "None of these values will produce a mathematical error".
Explanation:
In this question, the above given choice correct because neither of the flowchart procedures could trigger a mathematical error. This error could not be induced by multiplication, addition and subtraction, and the only division by 15. It is the only divide by 0, that's why the above flowchart will produce a mathematical error.
you are having a hard day at work, but you have to make several phone calls. what can you do to make sure your voice projects a friendly tone? leave a short, curt voice mail message.
Since you are having a hard day at work, but you have to make several phone calls. The thing that you could do to make sure your voice projects a friendly tone is option C: Avoid talking on the phone.
What can you do to ensure that your voice carries a welcoming tone?The listener's ability to comprehend your message is the most crucial component of a voicemail. Don't mumble, and make sure to talk properly and aloud. Speaking softly will make it difficult for the listener to comprehend you and may prevent them from calling you back. Hence, this is not advisable in the above situation.
Note that End statements with a lower tone and queries with a higher pitch. It will appear like you don't believe what you just stated if you end sentences with a high pitch. Changing your voice pitch while you speak is the greatest approach to maintain a welcoming tone and since you are tired, you better wait and not make calls because it may tell in your voice.
Learn more about friendly tone from
https://brainly.com/question/25627023
#SPJ1
See full question below
What can you do to make sure your voice projects a friendly tone?
Leave a short, curt voice mail message.
Smile when speaking on the phone.
Avoid talking on the phone.
describe a tsunami when it is far from the coast
I hope it is helpful for you ......
Mark me as Brainliest ......Tsunamis are marine phenomena, created by the abrupt displacement of large amounts of water into an aquatic formation. Tsunamis manifest as waves, which travel in the deep waters of the oceans at an average speed of 756 kilometers per hour.
While in deep water the tsunami, due to its characteristics there, is not considered a serious danger to the floating structures, reaching the shores has particularly devastating consequences.
Learn more in https://brainly.com/question/15964056
Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies?
Answer:
The correct answer will be "Mandatory access control".
Explanation:
MAC seems to be a security standard protocols limited by the designation, initialization including verification of the systems. These policies and configurations are implemented through one centralized controller and therefore are accessible to the system admin.MAC establishes and maintains a centralized implementation of sensitive requirements in information security.after declaring a streamreader variable, you can use the to open a sequential access file for input; doing this automatically creates a streamreader object.
File.OpenText. After declaring a streamreader variable, you can use the File.OpenText to open a sequential access file for input.
By doing this, it automatically creates a streamreader object.File.OpenText Method: This method is used to create a new StreamReader object and returns it after opening a file. It accepts a single string argument, which is the file name (including the path). This method automatically assigns the UTF8 encoding to the file.The following is the syntax for the File.OpenText method:StreamReader reader = File.OpenText(filename);Where:reader is the stream reader object to read text from the specified file.filename is a string that contains the file name or a path to the file to open.
Learn more about streamreader variable here:
https://brainly.com/question/29562492
#SPJ11
Assignment 4: Evens and Odds
Need help on this
Answer:
any even number plus 1 is odd
________ is malware that hijacks a user's computer and demands payment in return for giving back access.
Ransom malware that hijacks a user's computer and demands payment in return for giving back access.
What is Ransom malware?This is known to be a kind of malware that hinders users from gaining in or access to their system or personal files and it is one that often demands ransom payment so as to get access.
Therefore, Ransom malware that hijacks a user's computer and demands payment in return for giving back access.
Learn more about Ransom malware from
https://brainly.com/question/27312662
#SPJ12
Salim wants to add a device to a network that will send data from a computer to a printer. Which hardware component should he use?
A.
repeater
B.
modem
C.
switch
D.
bridge
If data takes up more than one line in a cell, ____.
a. you must manually reconfigure the cell height
b. some text will not appear
c. Word automatically wraps the text to the next line and increases the height of the row
d. Word moves the text into a new cell
c. Word automatically moves the text to the following line and makes the row taller.
Can you type while dragging the entry point to the a cell in a table to enter data?Moving the entry point to a column and typing allow you to input data into a table.The easiest way to pick a specific area of a table is to drag the mouse pointer over the columns and rows.The insertion point changes to a new spot on the horizontal ruler when users press the Tab key, which is known as a tab stop.
How can I ignore several mistakes in Excel?Launch your Excel workbook.Pick out the cell (and cells) that the error messages are displayed in.When the cells are chosen, click the caution icon which appears next to them.Choose Ignore Error from the drop-down menu.
To know more about Word visit:
https://brainly.com/question/28611
#SPJ4
Which of the following statements is true of sans serif fonts?
A. Sans serif fonts provide a more creative look.
O B. Sans serif fonts are more decorative with additional curls and
loops.
C. Sans serif fonts set a more inviting and comforting tone.
D. Sans serif fonts are easier to read on a computer screen.
Answer:
The answer is D
Explanation:
I got it right
The statement that is true of sans serif fonts is that Sans serif fonts are easier to read on a computer screen.
What is font?The word font is known to be a kind of different printable text characters. e.g. f sans serif fonts
Based on the above, The statement that is true of sans serif fonts is that Sans serif fonts are easier to read on a computer screen.
Learn more about fonts from
https://brainly.com/question/1991747
#SPJ 2
which type of file is commonly used by trusted websites to create installation software for mobile devices?
.apk -Application installer for Android is type of file is commonly used by trusted websites to create installation software for mobile devices.
What is installation?Making a computer programme (including plugins and device drivers) ready for use involves installing (or setting up) the programme. Installation is the process of configuring software or hardware so that it can be used with a computer. Installing a piece of software (programme) requires a soft or digital copy of the software.
A software installation can be done in a variety of ways (program). Programs (including operating systems) frequently come with an installer, a specialised programme responsible for carrying out whatever is necessary (see below) for the installation, because the process differs for each programme and each computer. Installation might be a step in a larger software deployment process.
Learn more about software installation
https://brainly.com/question/28388040
#SPJ4
Explain the history of computing device of mechanical era
The history of computing devices in the mechanical era began with the invention of the abacus in ancient times, which was used for simple calculations. It was later followed by devices like the slide rule and mechanical calculators in the 17th and 18th centuries, which could perform more complex calculations using gears, levers, and other mechanical components. These early computing devices paved the way for the development of modern computers in the electronic era.
Explanation:
The mechanical era of computing devices refers to the time period between the mid-19th century and early 20th century when mechanical calculators and adding machines were developed.
During the mechanical era, computing devices were based on mechanical principles and were designed to perform specific tasks such as addition, subtraction, multiplication, and division. The first mechanical calculator was developed by French mathematician Blaise Pascal in 1642, but it was not until the mid-19th century that mechanical calculators and adding machines became more widespread and sophisticated.
One of the most significant developments during this era was the invention of the Analytical Engine by Charles Babbage in the mid-1800s. The Analytical Engine was an early form of computer that used punched cards to store information and was capable of performing complex mathematical calculations.
Other notable devices developed during this time included the Comptometer, invented by Dorr E. Felt in 1887, and the Millionaire calculator, developed by Otto Steiger in 1893. These machines were widely used in businesses and government offices, and helped to automate many repetitive tasks.
Overall, the mechanical era of computing devices laid the foundation for the development of more advanced and sophisticated computing technology in the 20th century.
To know more about the Analytical Engine click here:
https://brainly.com/question/31746586
#SPJ11
Consider the following statement which refers to the block
When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representing the direction and position of the sprite, performing an algorithm to update these values, and changing the display in the window to match the updated state of the program. All of these actions are represented by just one single block.
Which of the following terms names the phenomenon which is best described by this statement?
Answer:
Abstraction
Explanation:
the quality of dealing with ideas rather than events
9.2.6 View Open Ports with netstat
Steps:
1. Open Zenmap
2. Type nmap -p 5900 192.168.0.0/24 and Scan
3. Find computer with port 5900 open
4. Select Support and open Terminal
5. Type netstat and press Enter to confirm port is open
6. Type dnf list vnc and press Enter to find package name
7. Type dnf erase libvncserver and press Enter
8. Press Y and press Enter
9. Type netstat and press Enter to confirm port is closed
Netstat provides statistics about all active connections so you can find out which computers or networks a PC is connected to. You can use the network tool for Windows, Linux, and macOS conveniently via the command line.
In 1983, netstat was first implemented into the Unix derivative BSD (Berkley Software Distribution), whose version 4.2 supported the first Internet protocol family TCP/IP. netstat has been integrated into Linux since its debut in 1991 and has been present in Windows since the release of version 3.11 (1993), which could also communicate via TCP/IP with the help of extensions.To view open ports with netstat, follow these steps: Open Zenmap, Type "nmap -p 5900 192.168.0.0/24" and click on Scan, Find a computer with port 5900 open, Select Support and open Terminal, Type "netstat" and press Enter to confirm the port is open, Type "dnf list vnc" and press Enter to find the package name, Type "dnf erase libvncserver" and press Enter, Press Y and press Enter, Type "netstat" and press Enter to confirm the port is closed.
More On Port: https://brainly.com/question/30503397
#SPJ11