Assume that we have a GBN protocol with a window size 3. We are trying to send 8 packets total (e.g. [0,1,2,3,4,5,6,7]). Show both sender and receiver side for given cases. For the receiver side, write what is the ACK number. In the sender side, show what is the packet number. Also, show the sender window each time it changes. Finally, show what happens after the timeout, e.g. Sender retransmits some packets, receiver sends ACK, show the values. Explain your steps briefly.

Answers

Answer 1

Initially, the sender has packets [0, 1, 2] in its window.

So, the sender sends packets 0, 1, 2 to the receiver. After that, the sender will wait for ACK.

If the sender receives ACK0, it will shift the window by one and include packet 3.

Now, the window becomes [1, 2, 3] and the sender will send packets 3. If the sender receives ACK1, it will again shift the window by one and include packet 4.

Now, the window becomes [2, 3, 4] and the sender will send packets 4. If the sender receives ACK2, it will again shift the window by one and include packet 5.

Now, the window becomes [3, 4, 5] and the sender will send packets 5. The same procedure follows for sending packets 6 and 7.

Receiver side:Initially, the receiver window is [0, 0, 0]. When the receiver receives packets 0, 1, 2, it sends ACK2. When the receiver receives packets 3, 4, 5, it sends ACK5.

When the receiver receives packets 6, 7, it sends ACK7.

If the sender doesn't receive ACK within a certain time, it will retransmit the packets within the window.

Suppose the sender has sent packets [0, 1, 2, 3, 4, 5, 6, 7], and packets 0, 1, 2 are lost in the transmission, then the sender will retransmit packets [0, 1, 2] after the timeout. After that, the sender follows the above window sliding procedure.

Learn more about ACK at:

https://brainly.com/question/32168731

#SPJ11


Related Questions

Computers work on the garbage-in, garbage-out concept. Comment

Answers

Stands for "Garbage In, Garbage Out." GIGO is a computer science acronym that implies bad input will result in bad output.

Because computers operate using strict logic, invalid input may produce unrecognizable output, or "garbage." For example, if a program asks for an integer and you enter a string, you may get an unexpected result. Similarly, if you try to open a binary file in a text editor, it may display unreadable content.

GIGO is a universal computer science concept, but it only applies to programs that process invalid data. Good programming practice dictates that functions should check for valid input before processing it. A well-written program will avoid producing garbage by not accepting it in the first place. Requiring valid input also helps programs avoid errors that can cause crashes and other erratic behavior.

NOTE: Because the related terms FIFO and LIFO are pronounced with a long "i," GIGO is typically pronounced "guy-go" (not gih-go). This also helps avoid confusion with the prefix "giga," which is pronounced with a soft "i."

the key given in the previous problem is an involutory key. (recall the definition of involutory key: if an encryption function is identical to the decryption function function , then the key k is said to be an involutory key.) group of answer choices true false

Answers

The given key in the previous problem is an involutory key, which is true. What is the Involutory Key? The definition of an involutory key is as follows: If an encryption function is identical to the decryption function function, then the key k is said to be an involutory key.

So, if you use the same key to encrypt and decrypt the message, the key becomes an involutory key. In other words, suppose that the encryption function is E() and the decryption function is D(). Then, for any value of x, the following equation must hold true:

D (E (x)) = x Since the key used for encryption is the same as the key used for decryption, the equation can be expressed as: D (E (x, k)) = x, where k is the key used for both E() and D().

Therefore, the statement "The key given in the previous problem is an involutory key" is true as the key used in the previous problem has been identified as an involutory key.

To know more about Involutory Key visit:

https://brainly.com/question/30696522

#SPJ11

as a network analyst, you want the acl (access control list) to forward the icmp (internet control message protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5. which of the following commands will you use in this scenario? 1. access-list acl_2 permit icmp any any2. access-list acl_2 deny icmp any any3. access-list acl_2 permit tcp host 2.2.2.2 host 5.5.5.54. access-list acl_2 permit tcp host 2.2.2.2 host 3.3.3.3 eq www

Answers

The third option, "access-list acl 2 permit tcp host 2.2.2.2 host 5.5.5.5" is what I must select as a network analyst if I want the ACL (Access Control List) to forward the ICMP (Internet Control Message Protocol) traffic from host machine 2.2.2.2 to host machine 5.5.5.5.

What is Access Control List ?

In particular in computer security settings, the term "Access Control List" (ACL) refers to a specific set of rules used for filtering network traffic. ACLs also grant authorized users access to specific system objects like directories or files while denying unauthorized users access.

ACLs are primarily found in switches and routers that have packet filtering capabilities.

What is the Internet Control Message Protocol ?

Network devices use the Internet Control Message Protocol (ICMP), a network layer protocol, to identify problems with network communication. ICMP is primarily used to check whether data is arriving at its target location on time. The ICMP protocol is frequently used on network equipment, such as routers. Although ICMP is essential for error reporting and testing, distributed denial-of-service (DDoS) attacks can also make use of it.

To know more about ACL, check out:

https://brainly.com/question/13198620

#SPJ1

When formulating a linear programming model on a spreadsheet, the decisions to be made are located in the data cells.

a. True
b. False

Answers

True. Gotta have 20 characters to answer

The summary statistics for a certain set of points are: 17, 5, -2.880, 5 * (x - 3) ^ 2 = 19.241 and b_{1} = 1.839 Assume the conditions of the linear
model hold. A 95% confidence interval for beta_{1} will be constructed.
What is the margin of error?
bigcirc 1.391921
C1.399143
C 1.146365
C 41.002571

Answers

The margin of error for a 95% confidence interval cannot be determined based on the given information.

To determine the margin of error for a confidence interval, we need additional information such as the sample size and the standard error of the estimate. The given information does not provide these details, so we cannot calculate the margin of error accurately.

However, I can explain the concept of the margin of error. In the context of a confidence interval, the margin of error represents the range of values around the estimated parameter (in this case, beta_1) within which we expect the true parameter to fall with a certain level of confidence. It is influenced by factors such as sample size and variability in the data.

To calculate the margin of error, we typically use a formula that involves the standard error of the estimate and the critical value corresponding to the desired level of confidence. Without these values, we cannot provide a specific margin of error for the given scenario.

To know more about margin of error,

https://brainly.com/question/30499685

#SPJ11

(50 POINTS) A folder has been shared with other users and set to read-only. What does this mean for users?
Users can only read the name of the shared folder.
Users cannot add new folders or files.
Users can read and edit files.
Users can add new files but not new folders.

Answers

i believe it would be “users cannot add new folders or files” i think they can only read what’s in the folder.

Answer:

B

Explanation:

which of the following statements about the continue statement is true? group of answer choices the continue statement is used to exit a repetition structure early and continue execution after the loop. the continue statement is used to continue after a switch statement. the continue statement does not alter the flow of control. a continue statement proceeds with the next iteration of the immediately enclosing while, for, dowhile statement.

Answers

The sentence "A continue statement proceeds with the next iteration of the immediately enclosing while, for, do-while statement" is true for the continue statement.

A continue statement is used in computer programming to go on to the next iteration of a loop while skipping the current iteration. It is a control flow statement that gives loop execution more flexibility. The continue clause is frequently used in conjunction with a conditional statement to assess a particular condition and skip particular iterations in accordance with that condition. When the continue statement is used inside of a loop, the remaining code for that iteration is skipped and the following iteration is started instead. This allows for the removal of pointless iterations and can result in more effective code, both of which can be helpful in optimising programme execution. Numerous programming languages, including C, C++, Java, and Python, support the continue statement.

Learn more about continue statement here:

https://brainly.com/question/13164244

#SPJ4

Which finger types the highlighted keys?

Which finger types the highlighted keys?

Answers

Answer:

Index

Explanation:

The index finger lays positioned upon the 4 key.

Pointer finger. It is by columns, and your pointer finger occupy those

The majority of repetitive programming tasks are best done with which of the following?A)LoopsB)Decision structuresC)RecursionD)Sequence structuresE)All of the above

Answers

The majority of repetitive programming tasks are best done with loops. Loops are structures in programming that allow a set of instructions to be repeated multiple times.

which is ideal for tasks that need to be done repeatedly. While decision structures and recursion can also be useful in certain situations, loops are the most common and efficient way to handle repetitive tasks in programming. Sequence structures, on the other hand, are simply a series of instructions executed in order, and are not specifically designed for repetitive tasks.

Therefore, the correct answer is A) Loops. The majority of repetitive programming tasks are best done with A) Loops. Loops are specifically designed to handle repetitive tasks efficiently by executing a block of code multiple times until a certain condition is met.

To know more about programming click here

brainly.com/question/14618533

#SPJ11

Do you think that people have a “right” to remain anonymous online? Why or why not?

Answers

Answer:

Yes

Explanation:

because everyones privacy should be respected

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

netscape developed the ____________________ layer protocol to use public-key encryption to secure a channel over the internet, thus enabling secure communications.

Answers

Netscape developed the Secure Sockets Layer (SSL) protocol to use public-key encryption and ensure secure communications over the internet.

SSL provided a secure channel for data transmission between a web browser and a web server. It allowed for the encryption of sensitive information, such as passwords, credit card details, and other personal data, during online transactions and data transfers. SSL has been widely replaced by its successor, the Transport Layer Security (TLS) protocol, which provides enhanced security and is now the standard encryption protocol used on the internet.

Learn more about Secure Sockets Layer here:

https://brainly.com/question/9978582

#SPJ11

Darla is going to start writing the HTML code for a web page. What would she
start with?
A. Header
B. Closing tag
C. Opening tag
D. Title

Answers

Answer:

(C) Opening Tag

Explanation:

HTML code is contained in an opening and closing tag. To start writing code you need to first type in the opening tag.

Darla can be able to start with Opening tag. Check more about HTML code below.

What are tags in HTML?

An HTML tag is known to be a part of made up language that is often used to show the start and also the ending of an HTML element that can be found in any  HTML document.

Conclusively, for Darla to be able to start writing the HTML code for a web page, she needs an Opening tag for it to start.

Learn more about HTML code from

https://brainly.com/question/24051890

#SPJ5

In which format is data finally stored in computers?

Answers

Data is ultimately stored in computers in the form of binary digits, or bits. Binary digits are composed of two states, 0 and 1, which represent the two voltage levels used in digital circuits.

What is computer?

Computer is an electronic device that is used to store, process, and retrieve data. It is an essential tool for any business or home and is capable of performing complex tasks quickly and efficiently. Computers use a variety of components, such as processors, memory, storage, and software, to process information and generate output. Computers can also be used to communicate with other computers, people, and devices through the internet, email, and other methods. Computers can be used for a variety of tasks, from gaming and entertainment to professional and scientific research.

Each bit is typically stored in a single memory cell or transistor, which can be combined with other cells to form larger data structures such as RAM, ROM, caches, and registers.

To learn more about computer
https://brainly.com/question/29338740
#SPJ1

what are some key points/processes after an armed intruder (active shooter) incident?

Answers

After an armed intruder incident, commonly known as an active shooter incident, it is crucial to prioritize safety and take immediate action to protect yourself and others.

While specific procedures may vary depending on the situation and location, here are some key points and processes to consider:

1. Run, Hide, Fight: The "Run, Hide, Fight" principle is often recommended in active shooter situations. If it is safe to do so, evacuate the area and run to a safe location. If running is not an option, find a secure place to hide and barricade yourself in. As a last resort, if confronted directly by the shooter, fight back using any available objects or self-defense techniques.

2. Contact Emergency Services: Call the emergency services in your area, such as 911 in the United States, and provide them with accurate information about the situation. Provide your location, a description of the intruder, and any other relevant details that can help law enforcement respond effectively.

3. Follow Instructions: If you are in a public place or workplace, follow any instructions given by authorities or law enforcement personnel. They are trained to handle such situations and will provide guidance to ensure your safety.

4. Maintain Silence and Communication: If hiding, keep silence to avoid attracting attention. Communicate quietly with others around you to coordinate actions and stay informed about the situation.

5. Lockdown Procedures: If you are in a school or workplace, follow lockdown procedures that may already be in place. This can involve locking doors, turning off lights, closing blinds, and remaining silent until the all-clear is given.

6. Evacuation Assembly Points: Once you have reached a safe location, follow any evacuation procedures and assemble at designated safe areas where you can be accounted for and receive further instructions.

7. Provide Information to Law Enforcement: When law enforcement arrives, cooperate fully and provide any information or details about the incident that you may have witnessed or heard from others.

8. Seek Support and Counseling: Experiencing an active shooter incident can be traumatic. Seek support from professionals or counseling services to address any emotional or psychological effects it may have caused.

Remember, these points are general guidelines, and it is crucial to familiarize yourself with the specific emergency procedures and protocols of your location, workplace, or institution. Regular training and drills can help individuals and organizations be better prepared for such incidents and ensure a coordinated response.

Learn more about active shooter here:

https://brainly.com/question/30289636

#SPJ11

Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _____ tool to create a clean and consistent visual appearance for their spreadsheets.

Answers

The tool used by data analysts to create a clean and consistent visual appearance for their spreadsheets is called clear formats.

A database refers to an organized or structured collection of data that is typically stored on a computer system and it can be accessed in various ways. Also, each database has a unique formatting and this may result in data inconsistency.

In Computer science, a clean data is essential in obtaining the following:

Data consistencyData integrityReliable solutions and decisions.

Furthermore, spreadsheets are designed and developed with all kinds of tools that can be used to produce a clean data that are consistent and reliable for analysis.

In this context, clear formats is a kind of tool that is used by data analysts to create a clean and consistent visual appearance for their spreadsheets.

Read more on database here: https://brainly.com/question/15334693

Select all of the TRUE statements about files.
Group of answer choices

Resolution refers to the sharpness and clarity of an image.

A higher resolution will always make an image appear better on a screen.

Images that will be printed require a larger resolution than those that will be presented on a computer monitor.

Optimized files will load slowly and take up large storage space.

Images that will be printed should have a resolution of 150 dpi to 300 dpi.

Answers

The true statements about files include the following:

Resolution refers to the sharpness and clarity of an image.A higher resolution will always make an image appear better on a screen.Images that will be printed should have a resolution of 150 dpi to 300 dpi.

What is a resolution?

A resolution can be defined as the number of pixels that are contained in an image (picture) or on a display monitor.

In Computer technology, resolution is typically expressed as a function of the number of pixels on both the horizontal axis and vertical axis. This ultimately implies that, the resolution of an image (picture) determines its quality and sharpness.

Note: dpi is an abbreviation for dots per inch.

Read more on resolution here: brainly.com/question/28182244

#SPJ1

A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network is called (5 points)

a byte
a digit
an IP address
a packet

Answers

An IP address is a distinctive series of numbers, each separated by a period, that uniquely identifies every machine communicating over a network using the Internet Protocol.

What is the Internet Protocol?For data packets to be addressed and routed across networks and reach their intended location, the Internet Protocol (IP) is a protocol, or set of rules. The Internet divides data into units known as bits that are used for transmission.The network layer communication mechanism in the Internet protocol family used to relay datagrams across network boundaries is known as the Internet Protocol (IP). The Internet was basically founded by its routing function, which makes internetworking possible. Users can transfer files from one computer to another using this early Internet tool. By logging into a remote computer, browsing its files, and downloading or uploading files using the FTP software, a user can access files on that computer (if the remote computer allows).

To learn more about Internet Protocol, refer to:

https://brainly.com/question/17820678

PLEASE HELP, MAKE SURE IT IS THE CORRECT WAY!! 100 POINTS!!!

Joe, a project manager, calls your extension because his computer just crashed. He lets you know that his computer will not connect to the internet, that he has lost multiple files, and he needs to get things back up and running in the next hour due to an important meeting he is scheduled to host. He is irritated because he is working on an older laptop and is getting a new one next week. He says that he knew this would happen and wishes that this laptop worked for just one more week.

He is agitated and in a panic. He is afraid that he has lost all his important documents and is blaming the company’s technology. As you ask him questions to find out more about the problem, you make the rookie mistake of asking, “Have you tried restarting your computer?” Joe explodes in a rage and screams that he already told you that he did and that you are not listening to him.

You are now in a situation where you not only need to determine the cause of the problem and fix it, but you also need to calm this individual down so that you can get clearer and more accurate information.

What do you do?

Answers

Consider his point of view and apologize politely. Reason out the causes in a calm and orderly manner. Take deep breaths and listen to what he has to say.

Which term describes a protocol to manage a network, able to configure a network, monitor activity, and control devices?

Post Office Protocol version 3 (POP 3)

Simple Mail Transfer Protocol (SMTP)

Internet Message Access Protocol (IMAP)

Simple Network Management Protocol (SNMP)

Answers

Answer:

Simple Network Management Protocol (SNMP)

Explanation:

Answer:

SNMP

Explanation:

vote brainliest please.

At which of the capability maturity model integration maturity levels, are processes well defined, understood, and consistent across the organization?.

Answers

At defined (quantitatively managed), the capability maturity model integration maturity levels, are processes well defined, understood, and consistent across the organization.

An organization's software development process can be developed and improved using the Capability Maturity Model (CMM). The model outlines a five-level evolutionary path of processes that get more ordered and systematic as they mature.

The Software Engineering Institute (SEI), a research and development facility supported by the U.S. Department of Defense (DOD) and now a part of Carnegie Mellon University, developed and promotes CMM. In order to address software engineering difficulties and, generally speaking, develop software engineering approaches, SEI was established in 1984.

More specifically, SEI was created to streamline the DOD's software-intensive system development, acquisition, and maintenance processes. SEI supports the widespread industrial use of CMM Integration (CMMI), a development of CMM. Additionally, the capability maturity model is still commonly employed.

CMM is comparable to ISO 9001, one of the International Organization for Standardization's ISO 9000 set of standards. The ISO 9000 standards outline an efficient quality system for the manufacturing and service sectors; ISO 9001 explicitly addresses the creation and upkeep of software.

To know more about  Capability Maturity Model click on the link:

https://brainly.com/question/14595603

#SPJ4

you are running windows 10 and want to use a virtualization program so you can test out a new distribution of linux and work with other operating systems while still being able to use windows 10. what should you install?

Answers

Virtualization is a method of running multiple operating systems on a single computer. Virtualization software allows you to run one operating system inside another.

If you are running Windows 10 and want to use a virtualization program so you can test out a new distribution of Linux and work with other operating systems while still being able to use Windows 10, then you should install a virtualization software such as Oracle Virtual Box. The operating system running on the actual computer is known as the host operating system, while the operating system running inside the virtualization software is known as the guest operating system. Virtualization software makes it easier to run multiple operating systems on a single computer simultaneously. With virtualization, you can run multiple operating systems, each with its own applications, on a single computer. Virtualization is often used in the IT industry to manage servers and to test software on different operating systems. Oracle Virtual Box is a virtualization program that allows you to run multiple operating systems on a single computer. It is an open-source virtualization software that is available for Windows, Linux, and macOS. Virtual Box allows you to create virtual machines that can run different operating systems, including Linux, Windows, macOS, and others. With VirtualBox, you can install and test new distributions of Linux and work with other operating systems while still being able to use Windows 10.

Learn more about Virtualization here:

https://brainly.com/question/31257788

#SPJ11

For this exercise, you will complete the TicTacToe Board that we started in the 2D Arrays Lesson.

We will add a couple of methods to the TicTacToe class.

To track whose turn it is, we will use a counter turn. This is already declared as a private instance variable.

Create a getTurn method that returns the value of turn.

Other methods to implement:

printBoard()- This method should print the TicTacToe array onto the console. The board should include numbers that can help the user figure out which row and which column they are viewing at any given time. Sample output for this would be:

0 1 2
0 - - -
1 - - -
2 - - -
pickLocation(int row, int col)- This method returns a boolean value that determines if the spot a user picks to put their piece is valid. A valid space is one where the row and column are within the size of the board, and there are no X or O values currently present.
takeTurn(int row, int col)- This method adds an X or O to the array at position row,col depending on whose turn it is. If it’s an even turn, X should be added to the array, if it’s odd, O should be added. It also adds one to the value of turn.
checkWin()- This method returns a boolean that determines if a user has won the game. This method uses three methods to make that check:

checkCol- This checks if a player has three X or O values in a single column, and returns true if that’s the case.
checkRow - This checks if a player has three X or O values in a single row.
checkDiag - This checks if a player has three X or O values diagonally.
checkWin() only returns true if one of these three checks is true.

public class TicTacToeTester
{
public static void main(String[] args)
{
//This is to help you test your methods. Feel free to add code at the end to check
//to see if your checkWin method works!
TicTacToe game = new TicTacToe();
System.out.println("Initial Game Board:");
game.printBoard();

//Prints the first row of turns taken
for(int row = 0; row < 3; row++)
{
if(game.pickLocation(0, row))
{
game.takeTurn(0, row);
}
}
System.out.println("\nAfter three turns:");
game.printBoard();



}
}

public class TicTacToe
{

private int turn;
private String[][] board = new String[3][3];

public TicTacToe()
{
for(int i = 0; i < 3; i++)
{
for(int j = 0; j < 3; j++)
{
board[i][j] = "-";
}
}
}

//this method returns the current turn
public int getTurn()
{
return turn;
}

/*This method prints out the board array on to the console
*/
public void printBoard()
{

}

//This method returns true if space row, col is a valid space
public boolean pickLocation(int row, int col)
{
return true;
}

//This method places an X or O at location row,col based on the int turn
public void takeTurn(int row, int col)
{

}

//This method returns a boolean that returns true if a row has three X or O's in a row
public boolean checkRow()
{
return true;
}

//This method returns a boolean that returns true if a col has three X or O's
public boolean checkCol()
{
return true;
}

//This method returns a boolean that returns true if either diagonal has three X or O's
public boolean checkDiag()
{
return true;
}

//This method returns a boolean that checks if someone has won the game
public boolean checkWin()
{
return true;
}

}

Answers

ndjdjdbzkdkekkdjdjdkodododofiifidididiidieiekeieidid

AI structure question. Please help
Type the correct answer in the box. Spell all words correctly.


On what structure is an artificial neural network based?


An artificial neural network is based on interconnected _______.

Answers

Answer:

A). An ANN is based on a collection of connected units or nodes called artificial neurons, which loosely model the neurons in a biological brain. Each connection, like the synapses in a biological brain, can transmit a signal to other neurons.

B). Understanding an Artificial Neural Network (ANN)

Artificial neural networks are built like the human brain, with neuron nodes interconnected like a web. The human brain has hundreds of billions of cells called neurons.

Explanation:

Answer:

The answer to this question is Neurons

Explanation:

I took the test on Plato and got a 100%.

Explain the difference between undecidable problems and unreasonable time algorithms. Be specific.

Answers

One for which no algorithm can ever be written to find the solution is an unsolvable problem. An undecidable problem is one for which no algorithm can ever be written that will always provide any input value with a correct true/false option.

An insoluble issue is one for which there is no algorithm that can ever be constructed to locate the solution. Undecidable problems are those for which there is no method that will ever be developed that can consistently return a true/false answer for any input value.

What is time algorithms?

If the value of an algorithm is constrained by a value that is independent of the amount of the input, the algorithm is said to be constant time sometimes written as time. For instance, accessing any individual element in an array requires a constant amount of time because just one operation is required to find it.

We employ a technique known as "Big O notation" to describe how time-consuming a method is. We employ a language called the Big O notation to express how time-consuming an algorithm is.

Therefore, we would argue that the insertion sort's best-case time complexity is O. (n). Linear complexity is another name for O(n) complexity.

Thus, An insoluble issue is one for which there is no algorithm.

For more information about time algorithms, click here:

https://brainly.com/question/14635830

#SPJ6

What term is used to describe data that is stored in a nonpersistent state of either RAM, CPU caches, or CPU registers

Answers

Answer:

Data in use

Explanation:

Data in use is the term used to describe data that is stored in a nonpersistent state of either RAM, CPU caches, or CPU registers.

if it helps u mark me as a brainliest

be happy

In the Business world people are often measured by their???

A- soft skills
B- hobbies
C- iq
D- technical skills

In the Business world people are often measured by their???A- soft skillsB- hobbies C- iq D- technical

Answers

Answer: D technical skills

WILL GIVE BRAINLIEST IF DONE CORRECT
Write a program in PYTHON that will simulate an ATM machine. A user at this ATM machine can do one of 5 things:

1 – Deposit (adding money to the account)
2 – Withdrawal (removing money from the account)
3 – Balance Inquiry (check current balance)
4 – Transfer Balance (transfer balance from one account to another)
5 – Log Out (exits/ends the program)

Before a user can do any of those things, he/she must first enter his/her username and passcode. After 3 incorrect attempts at entering the username and password, the program will end. The list of legitimate users along with their user ID, passcode, and account balance is shown below.

Customer, Username, Password, Savings Account, Checking Account
Robert Brown, rbrown, blue123, $2500.00, $35.00
Lisa White, lwhite, red456, $500.00, $1250.00
Mark Black, mblack, green789, $750.00, $200.00


Once the user enters the username, password, and option choice correctly, process the transaction according to these rules:
Allow the user to make up to a maximum of 3 transactions at a time. After 3 transactions, the program will terminate and they must log in again.
After a transaction is completed, the program will update the running balance and give the customer a detailed description of the transaction. A customer cannot overdraft on their account; if they try to withdraw more money than there is, a warning will be given to the customer.

Also, note that the ATM doesn’t distribute or collect coins – all monetary values are in whole dollars (e.g. an integer is an acceptable variable type). Any incorrect transaction types will display an appropriate message and count as a transaction.

Answers

Answer:

import sys

#account balance

account_balance = float(500.25)

##prints current account balance

def printbalance():

  print('Your current balance: %2g'% account_balance)

#for deposits

def deposit():

 #user inputs amount to deposit

 deposit_amount = float(input())

 #sum of current balance plus deposit

 balance = account_balance + deposit_amount

 # prints customer deposit amount and balance afterwards

 print('Deposit was $%.2f, current balance is $%2g' %(deposit_amount,

balance))

#for withdrawals

def withdraw():

 #user inputs amount to withdraw

 withdraw_amount = float(input())

 #message to display if user attempts to withdraw more than they have

 if(withdraw_amount > account_balance):

   print('$%.2f is greater than your account balance of $%.2f\n' %

(withdraw_amount, account_balance))

 else:

   #current balance minus withdrawal amount

   balance = account_balance - withdraw_amount

   # prints customer withdrawal amount and balance afterwards

   print('Withdrawal amount was $%.2f, current balance is $%.2f' %

(withdraw_amount, balance))

#system prompt asking the user what they would like to do

userchoice = input ('What would you like to do? D for Deposit, W for

Withdraw, B for Balance\n')

if (userchoice == 'D'): #deposit

 print('How much would you like to deposit today?')

 deposit()

elif userchoice == 'W': #withdraw

 print ('How much would you like to withdraw today?')

elif userchoice == 'B': #balance

 printbalance()

else:

 print('Thank you for banking with us.')

 sys.exit()

Answer:

account_balance = float(500.25)  print('Your current balance: %2g'% account_balance)  ('Deposit was $%.2f, current balance is $%2g' %(deposit_amount, balance)) print('$%.2f is greater than your account balance of $%.2f\n' % (withdraw_amount, account_balance))('Withdrawal amount was $%.2f, current balance is $%.2f' %  (withdraw_amount, balance)) ('How much would you like to deposit today?') ('How much would you like to withdraw today?') ('Thank you for banking with us.')

Explanation:

The simple answer

Jason is creating a web page on the basic parts of a camera. He has to use a mix of both images and content for the web page to help identify different parts of a camera. What screen design techniques should he apply to maintain consistency in the content and images? A. balance and symmetry B. balance and color palette C. balance and screen navigation D. balance and screen focus

Answers

A. Balance and symmetry would be the most appropriate screen design techniques to maintain consistency in the content and images on the web page about the basic parts of a camera. Balance refers to the even distribution of elements on the screen, and symmetry is a specific type of balance that involves creating a mirror image effect. By applying balance and symmetry, Jason can ensure that the content and images are evenly distributed and aligned, which can make the web page more visually appealing and easier to understand.

As a game designer, your goal in game design is to get your players to fell like your game is the whole world. You want your players to obtain a state of deep engagement with the game that allows them to fully invest their imagination in the game's artificial world. If you successfully accomplish this, what have you mastered?

roguelike state

second person perspective

player immersion

seamless movement

Answers

My Answer:

Player Immersion

Explanation:

I love video games, so this is something I am also looking for. Player Immersion will successfully draw the player into the game, seamlessly hooked to it. In order to make this possible, focus on the big details, like the setting, the music, and the plot.

Setting: Must be immersive, big, and beautiful.

Music: Must be beautiful, grand, and can possibly get stuck in your head.

Plot: Must be plausible. Don't make a plot that doesn't tie into the game.

These are things that will definitely draw in your player, hence, the answer is player immersion.

Hope this helps!

Player immersion because it tells u right there
Other Questions
Calculate the Ecell for each of the following balanced redox reactions.1) 2Cu(s)+Mn2+(aq)2Cu+(aq)+Mn(s). Determine whether the reaction is spontaneous as it is written.2) MnO2(s)+4H+(aq)+Zn(s)Mn2+(aq)+2H2O(l)+Zn2+(aq). Determine whether the reaction is spontaneous as it is written.3) Cl2(g)+2F(aq)F2(g)+2Cl(aq). Determine whether the reaction is spontaneous as it is written. Choose the best spanish translation. they are happy. after the preapproach phase is completed, what is the next step in the personal selling process? multiple choice question. generating leads the sales presentation follow-up closing the sale Quetion Jack' pancake recipe call for 2 teapoon baking powder and 3 cup of flour. How much baking powder i needed if Jack ue 9 cup of flour WILL GIVE BRAINLIEST - HELP ASAPHumans process some foods by adding chemicals to reduce harmful bacterial growth. This allows foods to be edible for longer periods of time. Which best describes the advantages of food processing? A. control of density-independent limiting factors such as disease spread B. control of density-dependent limiting factors such as disease spread C. control of density-dependent limiting factors such as predation D. control of density-independent limiting factors such as predation camilla is a scientist studying the mating pathway in yeast. she performs a series of immunoprecipitations followed by immunoblots. what will she see if she immunoprecipitates with an antibody against ste5 and immunoblots with an antibody to pbs2. (1 Point)O Agun because children don't know how to use themO A gun because it has caused more child deaths per yearA swimming pool because most children don't swim with adult supervisionA swimming pool because it has caused more child deaths per year2. Why would a politician prefer to make an agenda to stop terrorism before sdisease? * Which ordered pair is a solution of the equation? 5x+2y=12 an individual who takes a patient to a private area before their visit with the provider to discuss the practices financial policies and review the patients insurance coverage Multiply.(2.1)(1.4) the rate constant of a reaction at 31 c was measured to be 5.8102 s1.if the frequency factor is 1.21013s1 , what is the activation barrier? Newton's law of universal gravitation only refers to thephenomena of objects falling toward the ground or rollingdownhill. True-false 2. The cost of a badger is b pence. A raccoon is 5 pence more expensive than a badger and a beaver three times as expensive as a badger. a) What is the cost of a raccoon?b) What is the cost of the beaver?c) What is the total cost of a raccoon and 8 beavers? How long will it take for a $6000 investment to grow to $27,696 at an annual rate of 8%, compounded semiannually? Assume that no withdrawals aremade.Do not round any intermediate computations, and round your answer to the nearest hundredth.Please put final answers in years How sensitivity analysis (scenario analysis) is carried out, and what it is for? The mass number of an atom oxygen is 17. Describe the number and type of particles in the nucleus of this atom.PLS HELP ( 1 point) Let an-- . Let an = 13/(n +1)^7/2 - 13/n^7/2 Let Sn = n n=1 an(a) Find S3 S3=(b) Find a simplified formula for Sn Sn= (c) Use part (b) to find infinity n=1 an. If it diverges, write "infinity" or "-infinity which action would be most important postoperatively for a client who has had a knee or hip replacement? VIDEO ANSWER: Yeah. The answer is that the first part is false. Technology has been the most important factor in the growth of the US economy. .2. A restaurant owner wants to know whether customers are more likely to eat indoors vs. outdoors depending on whether they are coming for breakfast, lunch or dinner. She hires a psychology research student to observe the choices of 30 people at each of the different meal times. She examines the results to see whether there was a difference in seating preference across the different meal times. Test for independence at a .05 level of sig. Carry out all calculations to 2 d.p. only. For your verbal statement remember to provide directionality if appropriate.