20 acti 3
.pdf
keyboard_arrow_up
School
Continental University of Sciences and Engineering *
*We aren’t endorsed by this school
Course
AUDITING
Subject
Computer Science
Date
Nov 24, 2024
Type
Pages
4
Uploaded by ProfMooseMaster202
3/12/23,
13:30
Actividad
virtual
N°3:
revision
de
intentos
Pagina
Principal
/
Miscursos
/
ASUC-01123-20375-WH2-202320-S01
/
Unidad3
/
Actividad
virtual
N°3
Comenzado
el
Estado
Finalizado
en
Tiempo
empleado
Calificacion
Pregunta
domingo,
3
de
diciembre
de
2023,
13:21
Finalizado
domingo,
3
de
diciembre
de
2023,
13:31
9
minutos
58
segundos
20,00
de
20,00
(100%)
Finalizado
Puntta
2,00
sobre
2,00
Para
el
calculo
hidraulico
de
las
tuberias,
se
utilizaran
férmulas
racionales.
En
caso
de
aplicarse
la
formula
de:
a.
HazenyWilliams.
b.
Manning.
c.
Froude.
d.
Reynolds.
Respuesta
correcta
Pregunta
2
Finalizado
Punt(a
2,00
sobre
2,00
Grifos
Contra
Incendio
se
ubicaran
en
las
esquinas,
https://aulavirtual.continental.edu.pe/mod/quiz/review.php?attempt=5994778&cmid=6760095
a.
0,50
malinterior
del
filo
de
la
vereda
b.
0,40
malinterior
delfilo
de
la
vereda
c.
0,80
malinterior
delfilo
de
|la
vereda
d.
0,20
m
alinterior
del
filo
de
la
vereda
Respuesta
correcta
1/4
3/12/23,
13:30
Actividad
virtual
N°3:
revision
de
intentos
Pregunta
3
Finalizado
Punt(a
2,00
sobre
2,00
Para
el
calculo
hidraulico
de
las
tuberias,
se
debe
respetar
un
limite
de
velocidad,
que
es:
a.
Maximo2.0
m/s.
b.
Maximo
6.0
m/s.
c.
Maximo3.0m/s
d.
Maximo5.0m/s
Respuesta
correcta
Pregunta
4
Finalizado
Punt(a
2,00
sobre
2,00
Para
el
célculo
hidraulico
de
las
tuberias,
se
debe
respetar
una
presion
maxima
en
las
redes,
que
es:
a.
Maximo
40
mca.
b.
Maximo
30
mca.
c.
Maximo
50
mca.
d.
Méaximo
35
mca.
Respuesta
correcta
Pregunta
o
Finalizado
Punta
2,00
sobre
2,00
Para
el
calculo
hidraulico
de
las
tuberias,
para
diametros
menores
a
63mm
o0
2"
en
ese
caso
de
aplicarse
la
férmula
de:
o
Manning.
b.
Reynolds.
c.
Whipple
d.
Manning.
Respuesta
correcta
https://aulavirtual.continental.edu.pe/mod/quiz/review.php?attempt=5994778&cmid=6760095
2/4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
"The Internet is a computer network that connects billions of computing devices all around the world," as defined by Wikipedia. [Further citation is required] Please give a succinct description of the following three components, as well as the function that each of them plays in facilitating communication over the internet, by using a "nuts and bolts" manner to describe what they are and what they do respectively:
arrow_forward
What is the structure of UNIX file system?
Group of answer choices
Hierarchical structure (tree with root at the bottom) with loop
Hierarchical structure (inverted tree with root at the top) with links
General graph structure
Complete graph structure
How to identify a relative pathname? Where does relative pathname start?
Group of answer choices
Any pathname that does not start with / is a relative pathname and it starts at current working directory
Any pathname that starts with . is a relative pathname and it starts at the root
Any pathname that starts with / is a relative pathname and it starts at current working directory
Any pathname that starts with / is a relative pathname and it starts at the root
What is home directory? What is login directory?
Group of answer choices
They are same. It is the system directory under which all users directories are created
They are same. It represents the /home system directory
Both are same. It is user’s top-level…
arrow_forward
1) Show the shortest (abbreviated) form of the following IPv6 address:
a. 2340:0000:006B:0000:0000: 0000:1328:0000
b. 2001:00BD:3C00:0015:0000:0000:1A20:002B
C. 0010:0000:3003:0000:0000:0001:0000:0123
arrow_forward
Imagine that you are putting in place for your university's first time a new room reservation system that keeps track of which courses are being taught in which rooms. Imagine that each building is "owned" by a single college or department, and that only one person inside each college or department has the authority to allocate the rooms in that building. In your opinion, what conversion method would you employ?
arrow_forward
Computer networks
arrow_forward
Matlab
arrow_forward
Check and analyze the table below. What are your conclusions?
arrow_forward
I am needing help in understanding Question 4. Please provide step by step explanation of each of the anomalies. Thank you
arrow_forward
y
Which of the following expression explain logical network diagram below.
O A. XYZ + XỸ Z+XỸ Z
O B. XYZ + XYZ+XỸ Z
OC. (XYZ)( XYZ) + XY Z
OD. XYZ + XYZ+XY Z
arrow_forward
Operating Systems Which possible downside associated with adopting the at most once semantics for remote procedure calls, in your view, is the most severe, and why? How may the initial state of a mutex be set to its one and only valid value?
arrow_forward
Question 1A new computer has been acquired by the management of CIPOL a research lab sited around Teshie to help in the analysis of samples of blood taken from suspected cases of COVID-19. Upon testing the computer, it was realized bytechnicians that it can only process data fed into it in the form of sign magnitude. However, all the equipment in CIPOL works in the 2’complement environment. There is currently no interface to link the old systems to the new computer. As the technical team leader, you have been tasked to brief management on the problem on hand. You are to:
a. Critically explain the challenge faced by your team in connection with the new and old computers and propose a solution to it.b. Given the raw data AB8716, perform the necessary manipulation to feed the new computer. c. On a trial base, you were given 415678 to generate an 18-bit sign magnitude number for the computer
d. Based on “c” above, write a document that would become a standard to be used by your department…
arrow_forward
Just answer please without explanation
arrow_forward
urgent
arrow_forward
Question-6) For a CRC code with generator polynomial 1 +X^3+X^4, if the message word is 10101, what is the generated code word?
NOTE: If the information in the text and the photo is different, please solve the question using the information given in the photo.
Please help urgently.
arrow_forward
?
arrow_forward
Draw the diagram of LFSR with characteristic polynomial x^6+x^5+x^3+x^2+1. What is the maximum period of the
LFSR?
For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac).
BIUS
Paragraph V Arial
✔
www
arrow_forward
Explain the following observations related to the application layer. Use diagrams and calculations as needed. Mention the references (if any) at the end.Can I have a detailed explanation for Question 3 according to above instructions?
Thank you!
arrow_forward
Choose the correct Answer
Note : Don't Explain
arrow_forward
Describe the process of how to solve the substitution cipher below and solve it:
ZFSZB YESUK SQYDJ SQGVK SGZBJ WBSWG IZXWF UVDYZ TZVKW
JJSUQ JJTDQ KCSPI QKQFP FZYBW FPWFU QYWIC SYZFW Y
arrow_forward
ΕMPLOYEΕ
Ssn
Bdato
Address
Ser Salary Super ssn Dno
Fnamo
Minit
Lname
123456789 1965-01-00 731 Fondron, Houston, TX M 30000 333445555
M 40000 B88665555
John
Smith
Wong
333445555 1055-12-08 638 Voss, Houston, TX
Franklin
999887777 1968-01-19 3321 Castlo, Spring, TX
F
25000 987654321
4.
Zolaya
Wallace 987654321 1941-06-20 291 Borry, Bollairo, TX
Alicia
43000 888665555
4.
Jonnifor
Narayan 666884444 1962-09-15 975 Fire Oak, Humblo, TX M 38000 333445555
25000 333445555
M 25000 087654321
Ramesh
K.
English 453453453 1972-07-31 5631 Rice, Houston, TX
987987987 1969-03-20 980 Dallas, Houston, TX
Joyce
4.
Ahmad
Jabbar
James
Borg
888665555 1937-11-10 450 Stono, Houston, TX
M 55000 NULL
DEPARTMENT
DEPT LOCATIONS
Dname
Dnumber
Mgr ssn
Mgr start dato
Dnumbor
Dlocation
Rosearch
333445555
1988-05-22
1.
Houston
Administration
4.
987654321
1995-01-01
4.
Stafford
Headquarters
1
888665555
1981-06-19
5
Bellaire
Sugarland
Houston
WORKS ON
PROJECT
Essn
Pno
Hours
Pname
Prumber
Plocation
Dnum
123456789
32.5…
arrow_forward
What does the first X1,X2,X3,X4,X5 and the second X1,X2,X3,X4,X5 mean?
arrow_forward
A synchronous connection and an isochronous connection example should be provided, followed by a description of the key distinctions between the two kinds of connections.
arrow_forward
01
02
Q3
Q4
Q5
Q6 Q7
Q8 Q9
Q10
Q11 Q12 Q13 Q14
Q15 Q16 Q17 Q18 Q19 020 Q21 022 023
Q24 Q25 Q26 Q27
Faurd
Fau/u
FaU/1
Fau/2
Fa0/2
RT1
Fa0/1
Fa0/1
PC1
PC2
PC3
Refer to the exhibit PC1 issues an ARP request because it needs to send a packet to PC2. In this scenario, what will happen next?
O
Time Left 00:48:24
RT1 will send an ARP reply with its Fa0/0 MAC address.
RT1 will send an ARP reply with the PC2 MAC address
PC2 will send an ARP reply with its MAC address
SW1 will send an ARP reply with its Fa0/1 MAC address.
19 of 60 Questions
Skip Question
arrow_forward
3. Write the commands to configure the OSPFV3 in the following topology diagram.
Area 1
Area 0
Fa0/0
2001:DB8:1:12::/64 A
2001:DB8:1:1::/64
Fa0/0
So/O
:1
::2
So/0
R2
::2
::1
R1
so/0
::1
SO/1
::3
::1
Area 14
Fa0/0
Fa0/1
::3
::4
2001:DB8:1:14:/64
2001:DB8:1:13::/64
R3
Fa0/0
R4
::4 Fa0/1
2001:DB8:1:4::/64
4.
a) Router R1
b) Router R2
c) Router R3
d) Router R4
4. Answer the following questions based on Layer 3 VLAN Configuration.
Routero
Fa0/0 10.10. 10.1/24
no switchportFa0/3 10. 10.10.2/24
trunk
Fa0/1
trunk
Multilayer
trunk
Fa0/1
Fa0/2
trunk
access vlan 2
Fa0/1
Fa0/2 Switcho
Switc access vlan 3
Fa0
Fa0/2
192. 168.3.0/24 (VLAN 3)
192. 168.2.0/24 (VLAN 2)
Fa0
PCO
PC1
a) Write the steps to configure VLAN in Layer 3 Switches.
b) How many VLANS are there in the above topology diagram
c) Identify the trunk link in the above topology diagram
d) How many sub-interfaces to be created in Router 0
e) Do we need any Routing Protocol or Static Route to be configured to communicate
from PC0 to PC1?…
arrow_forward
Member
Telephone DVD
Number Code
Name
Tle
Cost
Date Out
Date In
Number
(RM)
1012
Inobel Ringer
293847
003
American Ple
2.50
1 Jan 2014
2 Jan 2014
011 My Grandpa in My Pocket
2.00
2 Jan 2014
3 Jan 2014
1034
John Siver
142536
002
Finding Nemo
3.50
17 Feb 2014
18 Feb 2014
015
Shrek
4.00
28 Feb 2014
1 March 2014
1056
Fred Flinstone
817263
003
American Pie
250
3 March 2014
4 March 2014
011 My Grandpa in My Pocket
2.00
13 March 2014
14 March 2014
1097
Annette Kirton
384756
008
Frozen
4.00
2 April 2014
3 April 2014
014
Prime Suspect
2.00
3 April 2014
4 April 2014
1. Normalized the table.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- "The Internet is a computer network that connects billions of computing devices all around the world," as defined by Wikipedia. [Further citation is required] Please give a succinct description of the following three components, as well as the function that each of them plays in facilitating communication over the internet, by using a "nuts and bolts" manner to describe what they are and what they do respectively:arrow_forwardWhat is the structure of UNIX file system? Group of answer choices Hierarchical structure (tree with root at the bottom) with loop Hierarchical structure (inverted tree with root at the top) with links General graph structure Complete graph structure How to identify a relative pathname? Where does relative pathname start? Group of answer choices Any pathname that does not start with / is a relative pathname and it starts at current working directory Any pathname that starts with . is a relative pathname and it starts at the root Any pathname that starts with / is a relative pathname and it starts at current working directory Any pathname that starts with / is a relative pathname and it starts at the root What is home directory? What is login directory? Group of answer choices They are same. It is the system directory under which all users directories are created They are same. It represents the /home system directory Both are same. It is user’s top-level…arrow_forward1) Show the shortest (abbreviated) form of the following IPv6 address: a. 2340:0000:006B:0000:0000: 0000:1328:0000 b. 2001:00BD:3C00:0015:0000:0000:1A20:002B C. 0010:0000:3003:0000:0000:0001:0000:0123arrow_forward
- Imagine that you are putting in place for your university's first time a new room reservation system that keeps track of which courses are being taught in which rooms. Imagine that each building is "owned" by a single college or department, and that only one person inside each college or department has the authority to allocate the rooms in that building. In your opinion, what conversion method would you employ?arrow_forwardComputer networksarrow_forwardMatlabarrow_forward
- Check and analyze the table below. What are your conclusions?arrow_forwardI am needing help in understanding Question 4. Please provide step by step explanation of each of the anomalies. Thank youarrow_forwardy Which of the following expression explain logical network diagram below. O A. XYZ + XỸ Z+XỸ Z O B. XYZ + XYZ+XỸ Z OC. (XYZ)( XYZ) + XY Z OD. XYZ + XYZ+XY Zarrow_forward
- Operating Systems Which possible downside associated with adopting the at most once semantics for remote procedure calls, in your view, is the most severe, and why? How may the initial state of a mutex be set to its one and only valid value?arrow_forwardQuestion 1A new computer has been acquired by the management of CIPOL a research lab sited around Teshie to help in the analysis of samples of blood taken from suspected cases of COVID-19. Upon testing the computer, it was realized bytechnicians that it can only process data fed into it in the form of sign magnitude. However, all the equipment in CIPOL works in the 2’complement environment. There is currently no interface to link the old systems to the new computer. As the technical team leader, you have been tasked to brief management on the problem on hand. You are to: a. Critically explain the challenge faced by your team in connection with the new and old computers and propose a solution to it.b. Given the raw data AB8716, perform the necessary manipulation to feed the new computer. c. On a trial base, you were given 415678 to generate an 18-bit sign magnitude number for the computer d. Based on “c” above, write a document that would become a standard to be used by your department…arrow_forwardJust answer please without explanationarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning