hich of the following can be used to synchronize the time between a number of linux servers and workstations on a network with a time clock source on the internet?

Answers

Answer 1

The option that can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet is known as option d. NTP.

What is NTP?

Network Time Protocol (NTP) is known to be a kind of an internet protocol that is said to be used to synchronize with that of the computer clock time types in a network.

The Importance of Time Synchronization for any given Network is that in any from of modern computer networks, time synchronization is seen as a vital process due to the fact that all areas  of managing, securing, planning, as well as debugging a network entails knowing when events will take place.

Time gives  the  frame of reference between all devices that are found on the network. Hence, The option that can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet is known as option d. NTP.

Learn more about Time Synchronization from

https://brainly.com/question/13068616

#SPJ1

Which of the following can be used to synchronize the time between a number of Linux servers and workstations on a network with a time clock source on the Internet?

a. SFTP

b. IMAP

c. SMTP

d. NTP


Related Questions

What would happen to the document if the change "A is pointing to was accepted?



a.

The selected sentence would be inserted.

b.

The comment would be deleted.

c.

There would be no changes.

d.

The selected sentence would be removed.

Answers

The selected sentence would be inserted. If the change labeled as "A" is accepted in a document.

it means that the suggested sentence or modification associated with that change will be incorporated into the document. By accepting the change, the selected sentence will be inserted at the specified location, replacing or adding to the existing content. This ensures that the suggested revision is included in the final version of the document. The acceptance of a change signifies agreement with the proposed modification and the decision to implement it, resulting in the insertion of the selected sentence as part of the document's content.

learn more about document  here:

https://brainly.com/question/15390495

#SPJ11

Part 1
Find a public, free, supervised (i.e., it must have features and labels), machine learning dataset from somewhere *other than* The UCI Machine Learning Repository or Kaggle.com. Provide the following information:
The name of the data set.
Where the data can be obtained.
A brief (i.e. 1-2 sentences) description of the data set including what the features are and what is being predicted.
The number of examples in the data set.
The number of features for each example. If this isn’t concrete, describe it as best as possible.
Extra credit will be given for: (1) the most unique, (2) the data set with the largest number of examples and (3) the data set with the largest number of features.
Part 2
Two datasets have been provided and the descriptions can be found below.
Datasets
TitanicPreview the document: Predict whether the passenger survived (last column) based on:
First class (whether the passenger was in first class or not)
Sex (0 = Male, 1 = Female)
Age (0 = <25, 1 = 25+)
SibSp (had siblings/spouses aboard?)
ParCh (had parents/children aboard?)
Embarked (Left from Southampton?)
Breast CancerPreview the document: Predict the recurrence of breast cancer (last column) based on:
age: 10-19, 20-29, 30-39, 40-49, 50-59, 60-69, 70-79, 80-89, 90-99.
menopause: lt40, ge40, premeno.
tumor-size: 0-4, 5-9, 10-14, 15-19, 20-24, 25-29, 30-34, 35-39, 40-44, 45-49, 50-54, 55-59.
inv-nodes: 0-2, 3-5, 6-8, 9-11, 12-14, 15-17, 18-20, 21-23, 24-26, 27-29, 30-32, 33-35, 36-39.
node-caps: yes, no.
deg-malig: 1, 2, 3.
breast: left, right.
breast-quad: left-up, left-low, right-up, right-low, central.
irradiat: yes, no.
Questions
For each dataset, your program should output multiple training error rates, one for each feature. For each of the features, calculate the training error rate if you use only that feature to classify the data. (Namely, we are building a 1-level decision tree. Do not use any existing implementation of the decision tree model for this question.)
For each dataset, use some library (e.g., sklearn) to build a full decision tree and report the training error rate. (One might use an existing implementation of the decision tree model for this question.)
Can we directly use the kNN or the Perceptron model to train a classifier on these two datasets? A brief and reasonable explanation would be good enough. (Hint: compared to the dataset in PA 1, is there any trouble on how to compute the distances or how to compute the inner-products? Optionally, one might come up with some ideas so that these issues are resolved.)

Answers

Part 1

For a public, free, supervised machine learning dataset from somewhere other than The UCI Machine Learning Repository or Kaggle.com, the following is the information:

The name of the data set: "COVID-19 Vaccination Progress Data".Where the data can be obtained: The data set can be found on Our World in Data’s website.A brief (i.e. 1-2 sentences) description of the data set including what the features are and what is being predicted:

The COVID-19 Vaccination Progress Data set includes data about the progress of vaccinations all around the world. The features of this dataset are the location, date, total vaccines administered, and total people vaccinated. The number of examples in the data set is 6,117.The number of features for each example:

he data set has four features for each example.Part 2Titanic Data SetTraining Error Rate of a single feature:

First class: 0.23883

Sex: 0.19057

Age: 0.40668

SibSp: 0.28952

ParCh: 0.28807

Embarked: 0.30625

Training error rate after building a full decision tree: 0.17532

Breast Cancer Data SetTraining Error Rate of a single feature:

age: 0.28683menopause: 0.34581

tumor-size: 0.34241inv-nodes: 0.26491

node-caps: 0.24038deg-malig: 0.35058

breast: 0.34581

breast-quad: 0.35960

irradiat: 0.28335

Training error rate after building a full decision tree: 0.05186

Can we directly use the kNN or the Perceptron model to train a classifier on these two datasets?

For these two datasets, we cannot directly use the kNN or the Perceptron model to train a classifier since both of these models require calculating the distance or the inner product between different data points. However, in the case of the Titanic dataset, the features are already numerical, so it would be possible to use kNN or Perceptron after normalizing the data. In contrast, the Breast Cancer dataset is not numerical, and we would need to convert the features into numbers, which could cause problems when training the model.

Therefore, it is best to use other models like decision trees, SVM, or logistic regression on the Breast Cancer dataset.

To know more about the machine learning, click here;

https://brainly.com/question/31908143

#SPJ11

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

anyone else parents take your phone and you ask for it nicely and they say no and you ask why and they ignore you

Answers

Answer:

that's the same situation with me but with other objects cuz me no have ph0nE

Explanation:

when i was a smol chiLd i would get beat if i didnt  know my multiplication table l0l

anyone else parents take your phone and you ask for it nicely and they say no and you ask why and they
yes, hate it so much

what is the working principle of computer?​

Answers

Answer:

input, process, output, storage

describe which uml diagram should be used to describe entity classes. what information is recorded in each class? describe which uml diagram should be used to describe boundary classes. what information is recorded in each class? describe which uml diagram(s) should be used to describe controller class workflows.

Answers

To describe entity classes, the UML class diagram is commonly used. Entity classes are used to represent objects in a system, and the class diagram depicts the properties, methods, and relationships of each entity class.

In each entity class, information such as attributes, behaviors, and associations with other entity classes is recorded.

For boundary classes, the UML use case diagram is typically used. Boundary classes are responsible for handling the interactions between the system and its external environment.

They are the entry and exit points of the system, and the use case diagram shows the actors that interact with the system and the boundary classes that manage those interactions.

For controller class workflows, the UML activity diagram is the most appropriate. Controller classes are responsible for coordinating the interactions between entity classes and boundary classes.

The activity diagram represents the workflow of the system's processes, showing the sequence of actions that the controller class takes to accomplish a specific task.

The diagram includes activities, decisions, and control flows that help to visualize the system's overall workflow. Overall, each UML diagram serves a unique purpose in describing the various classes and workflows within a system.

To Learn More About UML

https://brainly.com/question/14178673

SPJ11

Write an algorithm to get the value of length and breadth of a rectangle from the user and find its area. inn qbasic

Answers

Answer:

IN PYTHON ::

x=int(input('Enter length:'))

y=int(input('Enter width:'))

print('Area of the rectangle is', x*y,'squared units')

I hope it will be useful.

Who invented the television and what year did color come out? Explain​

Answers

The television was not invented by a single person, but its development involved contributions from several inventors and engineers.

How is this so?

Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.

As for color television, it was first introduced commercially in the United States in 1953 by RCA.

The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.

Learn more about television at:

https://brainly.com/question/12079773

#SPJ1

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Please tell answer fast​

Please tell answer fast

Answers

Answer:

a sonos wireless speakers

Find the cost of 2m 20cm at 25p per metre​

Answers

Answer:

length * cost per unit

2.2*25

= 50 pounds





The concept of vertical farming allows agriculture to occur when there is not enough___Available .

Answers

Answer:

land

Explanation:

Vertical farming is a modern method of farming or growing crops and vegetation. It allows growing of crops in stacked layers which is vertical. The crops are grown in a well equipment controlled-environment set up.

Vertical farming is done where there is fewer land resources as well as water resources. The main is to increase the crop yield with a very less use of land resources. But it requires more energy than the conventional energy.


Which two technologies support the building of single-page applications?

Answers

Answer:

The technology which support the building of single- page applications are as follows

Explanation:

Front endHTMLPHPJavaScriptAngularJS

6. A small design agency you are consulting for will be creating client websites and wants to purchase a web server so they can host the sites themselves. How will you advise them on this purchase?

Answers

Answer:

Explanation:

The best way to advise the agency in this matter would be to help them completely understand the total cost of ownership of the server. This includes the server itself but many other factors as well. Such as any and all server software and application software that they will need, an IT server manager, facility costs, security costs, backup features. These are some of the main costs that they will be incurring but there may be more unforeseen costs. Therefore the best way to advise them is by providing all of this information so that they can make the most informed decision possible.

Give at leat one example in practice where confidentiality protection of the data
i not needed, but integrity and availability protection to the data are neceary. Explain
your anwer

Answers

One of the example in practice where confidentiality protection of the data is  various access control methods, like two-factor authentication, passwordless sign-on, and other access control. The function of two factor authentication is to keeping certain files inaccessible.

In computer and technology, Confidentiality generally can be defined as all forms of information including personal information about people using services or employees or volunteers, information about the organization. The examples of confidentiality protection of the data is its plans or finances and information about other organizations, whether the information is recorded or not.

Here you can learn more about confidentiality protection https://brainly.com/question/30099467

#SPJ4

I WILL MARK BRAINLIEST
Create a concept for a new social media service based on new technologies. The service must include functions or features that require using rich media and geolocation or some other location-sharing technology that you have researched.

Submit your plan using both text and visual elements (graphics or drawings).

These are some key points you need to cover in your concept document:

What type of social media service is it?
What is the purpose of the service?
List the functions that the service provides.
List the features that the service provides
What makes the service unique?
Who is the target audience?
What type of layout did you use for the service?

Answers

Answer:... what are the answers u got

Explanation:

Which tools can be used to scale an object? Check all that apply.
rotation handle
side sizing handles
Format Picture pane
corner sizing handles
Remove Background tool

Answers

Answer:

format picture pane

corner sizing handles

Explanation:

Answer:

C and D

Explanation:

WILL MARK BRAINLIEST!!
What will be displayed after this code segment is run?

luckyNumbers + 15, 33, 25
INSERT lucky Numbers, 2, 13
APPEND lucky Numbers, 3
REMOVE lucky Numbers, 1
DISPLAY LENGTH luckyNumbers

Please explain!! :)

WILL MARK BRAINLIEST!!What will be displayed after this code segment is run?luckyNumbers + 15, 33, 25INSERT

Answers

Answer:

Output: 4

Explanation:

You start with [15,23,25]

You insert 13 at index 2 [15,13,33,25]

Append 3 [15,33,25,3]

Output length of array: 4

The output that will be displayed after the code segment is run is 3

The flow of the algorithm is as follows:

luckyNumbers <- 15, 33, 25:

This above line initializes a list

INSERT lucky Numbers, 2, 13:

The above line replaces the number in the 2nd index with 13.

So, the list becomes 15, 33, 13

APPEND lucky Numbers, 3

The above line appends 3 at the end of the list.

So, the list becomes 15, 33, 13, 3

REMOVE lucky Numbers, 1

The above line removes the number in the 1st index

So, the list becomes 15, 13, 3

DISPLAY LENGTH luckyNumbers

The above line prints the count of numbers in the list i.e. 3

Hence, the output that will be displayed after the code segment is run is 3

Read more about algorithms at:

https://brainly.com/question/24793921

Why does a folder change color when you click and drag a file over it

Why does a folder change color when you click and drag a file over it

Answers

It is the third dot

And what type of question is this lol

Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood.

Answers

Computers that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and understood.

What is a protocol?

A protocol can be defined as a formatted blocks of data that have been designed and established to obey a set of standard rules (conventions) such as the Transmission Control Protocol and Internet Protocol (TCP/IP).

In Computer networking, all computers and other network devices that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and well understood by end users.

Read more on protocol here: https://brainly.com/question/17387945

Supply Chain strategy often optimizes supply chain networks for "average" performance. Explain why this is or is not the right approach? Edit View Insert Format Tools Table 12pt Paragraph BIU AQV T²V : When locating facilities in a network, the transportation economies about the potential facility location should be considered. What does this mean with respect to where the facility is located and how the network is configured? Edit View Insert Format Tools Table 12pt Paragraph ✓ B I U AV 2V T²V ⠀

Answers

Supply Chain strategy is essential in every organization that involves the planning and management of all activities involved in sourcing, procurement, conversion, and logistics. In doing so, the goal is to optimize supply chain networks for average performance.

It is the right approach to optimize supply chain networks for "average" performance because it helps the company attain its objectives and improve its performance. It makes the planning and management of activities in sourcing, procurement, conversion, and logistics more efficient by making use of resources at an optimal level. Also, this approach allows the company to maintain the right balance between supply and demand by producing enough products to meet the customers' demands. By doing so, the company reduces costs, increases efficiency, and enhances customer satisfaction. However, sometimes, optimizing supply chain networks for "average" performance may not be the right approach. This is because customers' preferences are not average. Also, different customers have different needs. Thus, optimizing the supply chain for an average performance level may result in dissatisfied customers who may opt to seek services from the competitors. Thus, it is essential to ensure that the optimization strategy considers the customers' needs and preferences, and a balance is achieved. In conclusion, optimizing the supply chain for average performance is the right approach in most cases. However, this approach should consider the customers' needs and preferences to achieve a balance between supply and demand. Therefore, when locating facilities in a network, transportation economies about the potential facility location should be considered. This means that the facility should be located in an area that is easily accessible to transportation. Additionally, the network should be configured in such a way that the facility is linked to other facilities in the supply chain network to allow for efficient transportation.

To learn more about Supply Chain strategy, visit:

https://brainly.com/question/27670727

#SPJ11

What is a set of software development tools called that can be installed as one unit and provides code frameworks or code snippets to help development go faster

Answers

Answer:

SDK

Explanation:

Software Development Kit

The
command is used to fix a mistake immediately after you make it.
Redo

Undo

Correct

Fix

Answers

The answer is Undo I think
Undo I think to a good

Which of the following are ways that
employees can check their behaviors at work
after reviewing the written policies? (choose
all that apply)
observing coworkers
checking in with a supervisor frequently
discussing their employment contract with
legal department

Answers

Answer:

A and b

Explanation:

Answer: A AND B

Explanation:

The _____________ display alerts for your device and all the apps in the slider pan on the right side of the desktop

Options:
1. Tablet Mode
2. Action Center
3. Task View

Answers

Answer:

In this case it would be the touch bar,but based off of your answers here, it would be 3) Task view.

Explanation:

On certain computers, like my Chromebook, you can adjust the settings to where your apps are on the left or right side of the screen, whether it be in tablet mode or desktop mode.  

you are a network engineer at bhms ltd. the network administrator wants you to set up a security configuration for the router so that the router can accept or decline certain packets depending on their information. which of the following will you use in such a scenario?

Answers

The network engineer will use in such a scenario is SSH. The correct option is (A).

What is SSH?

SSH is an abbreviation for Secure Shell or Secure Socket Shell. It is a type of network protocol. As the name implies, it allows the user to access a host or computer on an unprotected network in a more secure manner.

The primary distinction between SSH and SSL is that SSH is used to establish a secure tunnel to another computer from which you can issue commands, transfer data, and so on.

Worldwide, it is extremely popular and frequently utilized. Encrypts and authenticates communication between two hosts over the internet.

Therefore, the correct option is (A) SSH.

To learn more about SSH, refer to the link:

https://brainly.com/question/15687439

#SPJ1

The question is incomplete. Your most probably complete question is given below:

(A) SSH.

(B) RDP.

(C) SMB.

(D) FTP transfer.

Binary is represented by two digits, write out each and describe what each means:

Answers

Answer:

binary is represented by 1 and 0

Explanation:

the binary of 1 means it has value, and the binary of 0 means it has no value. with a combination of 1s and 0s, you can get a complex program to run, like this platform :) what it basicly does is a true or false kinda think. just think of it that way: true or false, value or no value, and yes or no. the 1 is a positive value and the 0 is a negative value that has no value.

I hope this helps you :D

In binary, the 0s and 1s signify OFF and ON, respectively.

What do the binary numbers 1 and 0 represent?

In binary, the 0s and 1s signify OFF and ON, respectively. A "0" in a transistor indicates that no electricity is flowing, while a "1" indicates that electricity is flowing.

Numbers are physically represented inside the computing equipment in this fashion, allowing calculations.

Learn more about binary numbers here:

https://brainly.com/question/13371877

#SPJ4

RAM that can be changed. True or False

Answers

The answer is True is

Answer:

Yes, computer RAM can be changed, upgraded, etc. depending on whatever your motherboard supports.

PLS HELP QUICK!!!!
Read the following scenario:
A cell phone company is launching a brand new state-of-the-art smart phone. This phone has the latest wireless communications
technology built into its system. The phone is loaded with new apps and special devices that enhance speed and efficient Internet use.
Which of the following can a consumer most likely expect with the unveiling of this new product?
increases in the cost of services from providers
increased value of older smart phone models
O increase in sound quality
O decrease in the creation of competing apps

PLS HELP QUICK!!!!Read the following scenario:A cell phone company is launching a brand new state-of-the-art

Answers

Answer:

increases in the cost of services from providers

Explanation:

With the advancement in the quality of the product, the price of the product also sees a hike. According to the given excerpt, the cell phone company had added many new features and upgraded the version of the smartphones. Because of this reason, it's value in the market will be more as compare to the last product. New technology and advanced features would help the customers in various ways. In return, the price of the product will be more.

E-governance is the only solution against corruption. justify the statement in context of nepal​

Answers

Answer:

Following are the solution to this question:

Explanation:

The E-government implies use as part of the government systems to offer SMART, which is used to manage smart governance, ethics or accountability, sensitivity, and transparency. It is the research teams, that also shown that policies were progressing in India's creation of information technology. It is also argued against reducing the risk of bribery through improved public official surveillance and reducing its need for citizen engagement with porters with key services.

E-government involves against the utilization of Intelligent as the impact of government way of managing practice evidence, accountability as well as traceability, responsiveness.

It's often stated that decreasing the possibility of bribery thru enhanced government employee supervision and minimizing the necessity for civilian involvement with employees delivering critical services reduces the chance of corruption.

Thus the response above is right.

Learn more about corruption here:

https://brainly.com/question/24673177

Other Questions
12) Triangle DEF is the image of triangle ABCafter a series of rigid motion transformations.BAFDEWhich one of the following statements is true?1) The measure of angle A is the same as themeasure of angle E.2) Segment AC has the same length assegment DF.3) One transformation in the series must havebeen a dilation.4) Segment EF is congruent to segment AC. 2. (5 Marks) A bakery in a small town has a supply curve for custom cakes that is given by the equation \( P=2 Q+5 \). The bakery faces a weekly demand curve for cakes given by \( P=45-3 Q \) where pr" HELP FASTWrite an expression to represent the perimeter of the figure Bacon's purpose is to explain whatO Chaos is.O Love is.O Night is.O Venus is. planters moved from the old south to the deep south to:A. Find new landB. Avoid laws against slaveryC. Avoid taxes on cropsD. Keep slave families together How do you write 9.6522 as a percentage Read the sentence:The colossal failure of the gutters to handle the downpour caused huge problems for the homeowner.Which word in this sentence offers clues to the meaning of colossal?FailureODownpourO HugeO Problems How much does it cost each year?What percentage of students graduate?What is one thing that interests you about this school? Factor the quadratic expression completely 6x^2 - 13x + 6 This is the first one. eory.According to cell theory, which of the following aremade of cells? Check all that apply.O flowersrocksbloodwaterbacteriasugarskinRETRY Find the mBAC, if mDEC = 45 and mEDC= 65 50607080 1. sin 71pi2. cot pi3. cos 5pi/64. tan 1355. sin 120degrees6. tan 180degrees A researcher would like to know the effect of education on income and has hypothesized that the higher one's education, the more income they are likely to get. Here is the data:years of educationfamily income level16890001616000820000108400611000168500015240001456000134500012980001323000102000010450014130001265000168000012550001395000103500Based on your calculations from previous questions, what is the regression coefficient? removing a program from windows makes it impossible for an attacker to use that program to compromise a computer. T/F? upon admission to a healthcare facility what are the nurses responsibilities regarding a living will (07.06) There are currently 4 people signed up to play on a baseball team. The team must have at least 9 players.Which of the following graphs includes the possible values for the number of people who still need to sign up for the team? Number line with closed circle on 5 and shading to the left Number line with closed circle on 5 and shading to the right. Number line with open circle on 5 and shading to the left. Number line with open circle on 5 and shading to the right. Hansberry spends a surprising amount of time having her characters discuss the roaches a sometimes hidden, indestructible force around them. Why might that be? Discuss at least one literal and one symbolic/metaphorical reason why she might do this. Y=9 13+3y How do I do this? evaluatea. 9^3 b. (-7)^2 c. -2^4d. (5/6)^3 e. (-2/3)^4 f. 1.2^2g. 1^8 h. (-5)^55 i. 0.5^3