Question 3 How would I do this? Ensure you have DFS installed on any two servers. Enable replication for the Replicate Share/Folder Create the following Shares on both servers. Demonstrate replication by placing a text file in one (c:\replicate) folder and have it replicate to the partner replication folder (c:\replicate): ( Full explain this question and text typing work only We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line)
Q: Give the advantages and disadvantages of totem-pole output stage arrangement.
A:
Q: Define - SMP
A:
Q: how did it get 4?
A: In this question we have to understand how the code is getting executed to get the value in C++…
Q: What is pipeline stall?
A: In the design of pipelined computer processors, a pipeline stall is a delay in execution of an…
Q: Explain in your own words why it is important to design information security into applications…
A: In this question we need to explain why it is necessary to design information security into…
Q: How do I develop an algorithm and program for computing the month-by-month balance in your savings…
A: Answer:
Q: The size of the memory could be given as: Size of the memory =Number of Wordsx Number of bits per…
A:
Q: OZ PROGRAMMING LANGUAGE Given the Oz functions F1 and F2, construct the equivalent Oz program…
A: ANSWER:-
Q: 2. Declare and implement a class named BinaryStrings. The class will contain the following methods:…
A: String incBinary(String b){ String str="1";int l1 = b.length() - 1;int l2 = str.length() -…
Q: a program model is working like this how could i drow a flowchart for the assignment tool…
A: The flowchart is a picture representation of step-wise process flow in a sequential manner. It is a…
Q: In Java please. Only aswer the code where it says "/* Your code goes here */". Write a method…
A: The source code of the program public class Names { public static void main(String[]…
Q: 14. What is SMT?
A:
Q: 1- Write a C++ program to find the volume of a cube, cylinder, and rectangular box using the concept…
A: In this question we need to write a C++ program where we need to overload a function such that it…
Q: SOLVE THE PROBELEM USING MATLAB Plot the given parametric equations using plot3 command: x = eat…
A: Initialise the values of a, b and w. Create a vector t having values range from -5 to 5 with an…
Q: Define - Response Time.
A: Different types of processes are: 1. Arrival time The time at which a process joins the ready queue…
Q: Othello is played as follows: Each Othello piece is white on one side and black on the other. When a…
A: Let's begin with an illustration. In an Othello game, suppose we have the following moves: 1. Place…
Q: 7. Fill in the blank cells based on the information provided. Network Class *CIDR Subnet Mask…
A: Class A 1.0.0.1 to 126.255.255.254 Class B 128.1.0.1 to 191.255.255.254Class C 192.0.1.1 to…
Q: Help me complete this task. Add the following style rules for the form elements. Create a style…
A: Solution: I have modified according to the given instructions.
Q: e.Differentiate between goals and objectives when planning a website? f.Differentiate between the…
A: Goals are the outcomes you want your website to achieve over a predetermined period of time, which…
Q: Define - Static Multiple Issue.
A: Definition: The collection of instructions that are executed all at once during one clock cycle is…
Q: Find (49.3)10-(00110110.0010) BCD BCD with BCD weight (8421 = (?),
A: A decimal number must first be divided into its weighted digits in order to convert it to…
Q: (ii) What is the value of z after executing the following code? int x = 33; double y = 5; double z =…
A: I have used C++ for represeting the output.
Q: // Remove all the books which contain the given keyword in book title public void…
A: ANSWER: The code contains at least one error; the sentence "booksList.remove(b);" is in the wrong…
Q: L queries for tables: employees, departments, 1. List all employees whose first name is "John"…
A: 1. List all employees whose first name is "John" and whose last names begin with "B."
Q: C program to check whether a number is cute number or not using function
A: A number is called cute if, for every digit x in the number, there are x occurrences of it in the…
Q: What is meant by delayed branch?
A: It is a conditional branch instruction which is found inside some RISC architectures, Which…
Q: Which two types of technology can currently be found in virtually all wireless networks?
A: Wireless technology Modern wireless technological systems are one of the fundamental components of…
Q: Given an array arr[] of N Numbers. A Perfect Piece is defined as a subarray such that the difference…
A: #include <iostream>using namespace std; int longestPerfectPiece(int arr[], int N) { int…
Q: When it comes down to it, what does a firewall do best? My current project is a piece of software to…
A: It provides security for Network packets. Additionally, it examines received data packets. It was…
Q: HouseSale (houseID, agentID, dateSold, commissionRate, interestRate) Where: dateSold →interestRate…
A: Answer: Given HouseSale(houseId, agenId, dateSold, commisionRate, InterestRate)…
Q: Write a static method countEvens() that has four integer parameters, and returns the count of…
A: Disclaimer: “Since you have asked multiple questions, we will solve the first question for you. If…
Q: Write a method maxMagnitude() with three integer parameters that returns the largest magnitude…
A: The complete java code is below:
Q: What are the basic components of performance?
A: Given: What constitutes performance's fundamental elements?
Q: Compute the following expression: var4 = var1- (var2 var3*var5) /var4 All the variables are 32-bit…
A: Assembly language: Assembly language is a general purpose low level programming language. It is used…
Q: Show that Vertex Cover is still NP-complete even when all vertices in the graph are restricted to…
A: Introduction: An undirected graph's vertex cover is a subset of its vertices that includes either…
Q: There are many advantages to using a cloud-based service instead of a traditional client-based…
A: This question discusses the several benefits of a cloud-based programme over a typical client-based…
Q: Algorithm for Expectiminimax using alpha-beta pruning and fail-soft enhancement.…
A: given data: in: node v; alpha value α; beta value βout: utility value of node vconstant: the range…
Q: OZ PROGRAMMING LANGUAGE What are the characteristics of class documentation? Give example of a good…
A: Definition: OZ programming: The Oz programming language and the Mozart programming system are both…
Q: What your Python program should do 1. Ask the user to enter the product name. The user can also…
A: Algorithm for the code 1. Enter a product name and store it in a variable. 2. Enter the product…
Q: Comparing the throughput of wired and wireless networks reveals that wireless networks have a…
A: Introduction: Wi-Fi network: Computers are linked together by a wireless network using radio waves…
Q: (2) Let G be a directed graph on n vertices and maximum pos- sible number of directed edges; assume…
A: “Since you have posted a question with multiple sub-parts, we will solve first three sub- parts for…
Q: I just posted a question about an MASM program. The code is helpful but I am getting an exception…
A: MASM program: The x86 assembler Microsoft Macro Assembler (MASM) employs the Intel syntax for MS-DOS…
Q: Hello. I need help in my python code. I'm currently working on lists. In the first example how do I…
A: ALGORITHM OF THE CODE:- 1. Initialise empty list values [] and totalScore=0. 2. Take the input score…
Q: In cell L16, enter a formula using the AVERAGEIF function that averages the budget amounts for…
A: The purpose of an AVERAGEIF function is to assist in determining the average of numbers within a…
Q: Write the formula for CPU execution time for a program
A: CPU execution time: The amount of time that a given task takes to execute, also known as the CPU…
Q: Provide & explain an application for data mining?
A: Introduction Data mining: Data mining is a technical procedure that analyses massive amounts of…
Q: Problem (Circle.java) a. Implement a class called Circle for representing a circle. The circle has…
A: Program code is mentioned in below...
Q: A student wants to design and implement a Python program to convert any 6-bit unsigned binary number…
A: Description >> Input a list of six 1s and 0s corresponding to the binary number to be…
Q: Prepare an activity diagram that elabotates the details of logging into an email system. Note that…
A: UML diagrams (Unified Modeling Language):- 1) UML diagrams are way of visualizing a software program…
Q: Why does this not work
A: After updating the code , I have provided JAVA CODE along with CODE SCREENSHOT and OUTPUT…
Question 3
How would I do this?
Ensure you have DFS installed on any two servers. Enable replication for the Replicate Share/Folder
Create the following Shares on both servers. Demonstrate replication by placing a text file in one (c:\replicate) folder and have it replicate to the partner replication folder (c:\replicate):
( Full explain this question and text typing work only
We should answer our question within 2 hours takes more time then we will reduce Rating Dont ignore this line)
Step by step
Solved in 2 steps
- Brute Attack on FTP server (KALI -LINUX) The file you downloaded contains the 100 most common passwords. Load the file in the Metasploit framework by setting the PASS_FILE variable. When you run the command, after some time, you will see a connection error and it says ‘scan complete’ but in reality, it is not. Why do you think that the first few scans went unsuccessful and then the connection error appears? Verify your answer using a log file generated at the victim’s machine. Furthermore, explain how you can circumvent this problem and show at least one working solution. Upload the log file generated at the victim's machine which shows the first few scans went unsuccessful and then the connection error appears. Also, include your answer and explain how you can avoid this problem.Downloads/ ht 8 (File X English localhost:8888/notebooks/Downloads/CSE110%20Lab%20Assignment%208%20(File%201_0%20%26%20Exception).ipynb Cjupyter CSE110 Lab Assignment 8 (File I_O & Exception) Last Checkpoint: 6 hours ago (unsaved changes) Logout File Edit View Insert Cell Kernel Widgets Help Trusted Python 3 O • Run Code Task 9 Write a python program that will take a string input from the user. Your task is to count the number of vowels and consonants in the string. Using try, if the number of vowels is greater than or equal to the number of consonants, then raise a runtime error. Print 'Number of vowels greater/equal to consonants. Please paraphrase.'. Otherwise, print 'The sentence will work.'. Note: a,e,i,o,u are called vowels and all the other 21 english alphabets are consonants. =====: Example 1: Input: 'his age is 10' Output: Number of vowels greater/equal to consonants. Please paraphrase. Example 2: Input: 'he is 10 years old' Output: The sentence will work. In [ ]: #to do Task…Downloads/ ht 8 (File X English localhost:8888/notebooks/Downloads/CSE110%20Lab%20Assignment%208%20(File%201_0%20%26%20Exception).ipynb Cjupyter CSE110 Lab Assignment 8 (File I_O & Exception) Last Checkpoint: 6 hours ago (unsaved changes) Logout File Edit View Insert Cell Kernel Widgets Help Trusted Python 3 O • Run с Code Task 10 Write a python program that finds the corresponding energy values from a list of frequency values which are taken as input from the user, using the formula, E = h * f, where h is a constant of value: 1050 Exceptions to handle: • Make sure all elements in the lists are numbers Example 1: Input: [2,3] Output: [2100, 3150] ==== Example 2: Input: [2,boss] Output: Wrong input type In [ ]: #to do OneDrive Screenshot saved Task 11 The screenshot was added to your OneDrive. Imagine Salman Khan is going to the sets of a new movie. He decides to cycle everyday on his way to the sets. For that he uses a distan finds the distance based on the present day's date, which is…
- Downloads/ ht 8 (File X English localhost:8888/notebooks/Downloads/CSE110%20Lab%20Assignment%208%20(File%201_0%20%26%20Exception).ipynb C jupyter CSE110 Lab Assignment 8 (File I_O & Exception) Last Checkpoint: 6 hours ago (unsaved changes) Logout File Edit View Insert Cell Kernel Widgets Help Trusted Python 3 O + • Run с Code Task 11 Imagine Salman Khan is going to the sets of a new movie. He decides to cycle everyday on his way to the sets. For that he uses a distance calculator which finds the distance based on the present day's date, which is asked as an input from the user. You should first take the day and then the month as your inputs. The inputs should be stored in variables named day and month .The distance calculator uses the following formula to calculate a number which dictates the number of kilometers he must cycle on his way to work. Distance = lif day<10, 5+(day*2)/month |else, 3+(day/month) Exceptions to handle: -Check for 0 division error exception in the formula -Type…For the virtual machine, do the following: locate and download virtual box/VMware player/Parallels VMM from the appropriate website. pay attention to the MD5 and SHA1 hash values. download the software before installing the software, Hash the file and see if the value you get matches the value provided by the download website. Install the software only if the hashes match. locate and download Unbuntu/Kali Linux (most recent version) view the MD5 and SHA1 values hash the downloaded file to compare the hash values install the file only of the hashes match after installation, take a screen shot of the computer name in Ubuntu/Kali and the date. Submit the screen shot as proof of installation google MD5 and SHA1 hash creation (should be free and part of your O.S.Q13. In file allocation methods, there are three approaches. Contiguous, Linked, and Indexed. (a) Which one does not waste any sectors? (b) Which one require additional sectors? (c) Which one uses extents?
- File slack is the space between the end of a file and the end of the disk cluster it is stored in. Hide a secret message into a file that contains slack space. For the assignment purpose, use a secret text containing 12345nn . Explain each step with the help of screenshots from the tool you used.A small insurance company has an online application system that allows its customers to interactwith the business (e.g., log claims). Backups of the customers’ details are done on a spreadsheetdocument stored on Google drive. However, anyone who has access to the Google drive link ofthe file can view and modify all the customer details. On the backup, the system administratordoes not have visibility of the modifications made on the file. By analysing the scenario above, use the security design principles to criticise theoperations of the small insurance company and propose any two simple controlsthat could influence a good security program.Based on the following facts, which of the following is the most likely reason for a missing file in Git? Commits are pushed to a remote repository. The latest file created was not included in the upload. The remote server blacklisted the file. The file was not added to commit staging with git add New files must be pushed separately to the server. There is a typo in a new file's filename.
- In this assignment, you are required to write a bash script, call it mycontainer.sh to do the following tasks:1) Create an LXD container based on ubuntu.2) Install the latest version of mysql on the container created in Step 1. Then, start the database and autostart it during future boots.3) Print the process ID of the running database, then give this process the highest possible priority.4 Inside the container, create a new systemd service to: Re-execute Step 3 to adjust the priority. Send a notification message to your AUIS email address(es). Call this new service ‘email-mysql.service’.5) Adjust systemd to run the ‘email-mysql.service’ automatically once every six hours.6) Lastly, include necessary Bash commands to upload your container to an ssh server with the IP address 192.168.1.1. Assume the username and password are 'auis' and 'pass123', respectively.PHP, MYSGL The company "Visitors" wants a website for a guestbook. They want the guestbook to work so that you can create and delete posts in it.The guestbook must contain the entries who made the post (name or alias),The post (the text written) anddate and time when the post took place.The created posts must be stored in a text file in serialized form.NOTE! You do not need to be able to update these posts, it is enough that you can create new ones and delete any post. Your solution should be object-oriented with PHP and be able to store / read all information against a serialized file on your server.The features to be implemented in your solution on the guestbook website should be: possibility to create and delete posts in the guestbookInformation that should be in each record should be:username / signature, post, date + time of created postExamples of entries in the file:The silver surfer, In the sea are the biggest fish, 2018-01-17 22:41:55Falo, 100 small mice built a nest in a…Create a new database using phpmyadmin (or any other method you choose). The database should have at least two tables: One table should be able to store the username and password of users for session management. Insert one record in this table for use later in the project. The second table should be able to store the articles written by the user. The only information we need for articles is the author (which would be a user of the system), the title of the article and the content of the article. The content field should be able to store at least a thousand characters. Insert one simple record in this table for use later in the project H4