(A) Arithmetic operator (B) Relational operator (C) Check operator (D) Logical

(A) Arithmetic operator
(B) Relational operator
(C) Check operator
(D) Logical

(A) Arithmetic operator
(B) Relational operator
(C) Check operator
(D) Logical operator
37. Which of these characters is
correct in C language? (/2)
(A) “here” (B) “a”
(C) ‘a’ (D) None
38. C Which option is correct
about language? (/2)
(A) c is not a case-sensitive language
(B) Can use keywords as names
of variables
(C) All logical operators are binary
(D) None
39. The C language provides
_____ functions to display output.
(/2)
(A) scanf (B) print f
(C) main (D) auto
40. ______ statements specify the
o r d e r i n w h i c h p r o g r a m
statements will be executed. (/2)
(A) Loop (B) Conditional
(C) Control (D) First three
41. A condition can be a ny
_____expression. (/2)
(A) Arithmetic (B) Relational
(C) Logical
(D) Arithmetic, relational or logical
42. According to ___ __, all
statements are executed in the
given order. (/2)
(A) Repetition control
(B) Conditional control
(C) Sequential control
(D) Random control
43. Array is a____structure. (/2)
(A) Loop (B) Control
(C) Data (D) Conditional
44. _____ is a unique identifier
that refers to an array. (/2)
(A) Data type (B) Array name
(C) Array size (D) None
45. Arrays can be initialized ____
of the declaration. (/2)
(A) Time (B) After
(C) in side (D) both a and b
46. Using loops within loops is
called ____loops. (/2)
(A) for (B) while
(C) do-while (D) nested
47. To initialize an array in a
statement it _____initialize the
declaration. (/2)
(A) Time (B) After
(C) First (D) Both a and b
48. The strategy of solving a big
problem by dividing it into small
parts is called ______. (/2)
(A) Analysis
(B) Divide and conquer
(C) Synthesis (D) Deduction
4 9 . A _ _ _ _ _ i s a b l o c k o f
stateme nts tha t pe rforms a
specific task. (/2)
(A) Function
(B) Selection Structure
(C) Conditional Structure (D) Hey
50. The input of the function is
called ____. (/2)
(A) Return Receive
(B) Arguments
(C) Parameters (D) Procedure
51. _____ defines the inputs and
outputs of the function. (/2)
(A) Function Definition
(B) Function Declaration
(C) Function Signature
(D) Function Initialization
52. The following is a selection
statement: (/2)
(A) if statement
(B) if-else statement
(C) both a and b
(D) else statement
53. Every programming language
has some basic building blocks
that adhere to some programming
principles called ____. (/1)
(A) Programming Rules
(B) Syntax
(C) Structural Elements
(D) Semantic Rules
54. _____ is used in the service
c o d e t o f u r t he r d e f i n e t he
algorithms and procedures used
by the program. (/1)
(A) Messages (B) Signals
(C) Comments (D) Explanations
55. A series or list of instructions
is called: (/1)
(A) Hardware (B) Software
(D) Operating System
(C) Firmware
56 . The proc e ss of s toring
instructions in a computer is
called: (/1)
(A) Comments (B) IDE
(C) Programming (D) Syntax
57. A person who knows how to
write a computer program is
called: (/1)
(A) System Analyst
(B) Computer Program
(C) Computer Designer
(D) Computer Operator
58. Programmers write computer
programs in special languages
called: (/1)
(A) Special Program
(B) English Programme
(C) Programming language
(D) None of these
59. Who created the c-language?
(/1)
(A) Kathleen (B) Jeff Beddoes
(C) Thomas Curtner
(D) Dennis Ritchie
60 . c ombine s a ll the ma jor
programming tools to form: (/1)
(A) Programming Environment
(B) Text Editor
(C) IDE (D) Program Centex
61. In C language there _______
types of loop structure. (/1)
(A) 2 (B) 3
(C) 4 (D) 5
62. GUI stands for: (/1)
(A) Graphical user interface
(B) Graphical user interaction
(C) Graphical uniform interface
(D) Graphical uniform interaction
63. Which of the following is a text
editor program: (/1)
(A) Notepad (B) Text Edit
(C) WordPad (D) All
64. Which of these is IDE of C
programming language? (/1)
(A) code :: Blocks (B) Dave C++
(C) X-Code (D) All of these
65. The C language provides
_____ functions to take input from
the user. (/1)
(A) scanf (B) print f
(C) main (D) auto
66. printf is a ____ function to
display the output on the screen.
(/1)
(A) Main function
(B) User defined function
(C) Built-in function
(D) Return function
67. printf derives its name from
_____. (/1)
(A) print functions (B) print formatted
(C) print form (D) print free
68. It is used to format data in
input and output operations: (/1)
(A) printf (B) scanf
(C) format specifier
(D) escape sequence
69. A format specifier is preceded
by a ____ sign. (/1)
(A) % (B) & (C) = (D) !
70. The format specifier for the int
data type is: (/1)
(A) %c (B) %f (C) %d (D) %t
71. The format specifier for a float
data type is: (/1)
(A) %d (B) %f (C) %c (D) %i
72. The format specifier for a
character data type is: (/1)
(A) %d (B) %c (C) %i (D) %

1-For multipoint configuration, only one device at a time can transmit. Why and

1-For multipoint configuration, only one device at a time can transmit. Why and

1-For multipoint configuration, only one device at a time can transmit. Why and what is that terminology called. Explain in maximum 2 paragraphs and cite your work? (10 Point)
2- Cost-2-Cost is a famous radio show broadcast from Los Angeles, California. The broadcast use AM stereo at 1320 kHz by the time it reaches Maryland, Rockville WWDC-F2 (@101.1 kHz) Monday – to Saturday from 1AM to 6AM and Sunday off day. What is the antenna height required to capture the station wavelength. Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (10 points)
3- Hulu and YouTube offer regular TV broadcast, and Time Shift service for their customers. As promotion to encourage subscribers to the service providers. FXX movie channel broadcast a new 4K movie with Dolby Atmos for subscribers. Answer the following Questions and Explain your Answer and calculations in details Do Not give only the final answer or short explanation you will not get a grade. (20 points)
What is the required bandwidth to watch a 4K HDR10 12-Bit color movie stream? (10 points)
How much data is needed for the Time Shift of 1.5 hour and what is the compressed Value in? (10 points
Need to explain the details the steps of your answer and calculations.
Need to mention references and citations for all the above questions

Q1)List the different network management standards mentioned in the slides? Whic

Q1)List the different network management standards mentioned in the slides? Whic

Q1)List the different network management standards mentioned in the slides? Which of them is the most widely implemented?
Q2)1. What is the purpose of the network layer in the OSI model? 2. How does network layer handle errors?
Q3)1. What is the difference between MDB and MIB? 2. Give two examples of managed object.
Q4)
1. What is the figure below? 2. Explain the information giving in the figure.

Assignment 3 Protocol & TCP/IP for Part 2 How to broadcast a message on the Inte

Assignment 3 Protocol & TCP/IP for Part 2
How to broadcast a message on the Inte

Assignment 3 Protocol & TCP/IP for Part 2
How to broadcast a message on the Internet? Two questions need to be answered: What address should be used as the broadcast address. How to send data to the broadcast address? A broadcast address is the subnet’s network number with all onebits set for the host portion of the address. For instance, if a network IP address is 192.168.1.0, and the netmask is 255.255.255.0, the last byte of the address is the host number (because the first three bytes, according to the netmask, correspond to the network number). So the broadcast address is 192.168.1.255. Under Unix, the ifconfig command will actually give you all this information.
Determine the broadcast address of your local machine; b. Send a broadcast packet to your broadcast address. Write a code to implement this task.
NOT: The assgnment qustions requires the following
Search the internet for resources about IP address, Subnet mask and Internet protocol. Then explain your understanding.
From your search and understanding answer a, and b to the best of your knowledge
Reference your answer from your internet resources.
Make sure you Do not Use Wikipedia it’s not an Academic Resource.

Assignment 3 Protocol & TCP/IP for Part 2 How to broadcast a message on the Inte

Assignment 3 Protocol & TCP/IP for Part 2
How to broadcast a message on the Inte

Assignment 3 Protocol & TCP/IP for Part 2
How to broadcast a message on the Internet? Two questions need to be answered: What address should be used as the broadcast address. How to send data to the broadcast address? A broadcast address is the subnet’s network number with all onebits set for the host portion of the address. For instance, if a network IP address is 192.168.1.0, and the netmask is 255.255.255.0, the last byte of the address is the host number (because the first three bytes, according to the netmask, correspond to the network number). So the broadcast address is 192.168.1.255. Under Unix, the ifconfig command will actually give you all this information.
Determine the broadcast address of your local machine; b. Send a broadcast packet to your broadcast address. Write a code to implement this task.
NOT: The assgnment qustions requires the following
Search the internet for resources about IP address, Subnet mask and Internet protocol. Then explain your understanding.
From your search and understanding answer a, and b to the best of your knowledge
Reference your answer from your internet resources.
Make sure you Do not Use Wikipedia it’s not an Academic Resource.

Scenario: Your sister just moved into a new home and needs you to help her get a

Scenario:
Your sister just moved into a new home and needs you to help her get a

Scenario:
Your sister just moved into a new home and needs you to help her get all of her computer devices connected to the network and the Internet.
Your sister and her family have the following devices:
2 laptops: one for work, one for gaming and video streaming
2 mobile devices: one Apple-iPad, one Samsung Android tablet
2 mobile phones: one iPhone, one Android phone
3 wireless security cameras
1 Amazon Alexa
2 wireless printers
2 smart TVs that can be used as projectors
Instructions:
For this assignment, you must diagram a network depicting the physical device configuration of your sister’s home network using cloud services for data storage and sharing. (Use a graphical software tool like Visio or DIA to draw the network diagram.)
You must then create a second diagram of the floor layout with all appliances and computer device distributions.
Embed both diagrams into a paper and indicate how the router and each device should be configured so they have access to the Internet and file-sharing capability.
Length: 3-5 page pager with an embedded original network diagram
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards,

Scenario: Your sister just moved into a new home and needs you to help her get a

Scenario:
Your sister just moved into a new home and needs you to help her get a

Scenario:
Your sister just moved into a new home and needs you to help her get all of her computer devices connected to the network and the Internet.
Your sister and her family have the following devices:
2 laptops: one for work, one for gaming and video streaming
2 mobile devices: one Apple-iPad, one Samsung Android tablet
2 mobile phones: one iPhone, one Android phone
3 wireless security cameras
1 Amazon Alexa
2 wireless printers
2 smart TVs that can be used as projectors
Instructions:
For this assignment, you must diagram a network depicting the physical device configuration of your sister’s home network using cloud services for data storage and sharing. (Use a graphical software tool like Visio or DIA to draw the network diagram.)
You must then create a second diagram of the floor layout with all appliances and computer device distributions.
Embed both diagrams into a paper and indicate how the router and each device should be configured so they have access to the Internet and file-sharing capability.
Length: 3-5 page pager with an embedded original network diagram
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards,

Develop a findings report on the company’s ability to close a project effectivel

Develop a findings report on the company’s ability to close a project effectivel

Develop a findings report on the company’s ability to close a project effectively and efficiently. this report will provide a gap analysis to project managers and company management on the areas of their project management framework that require development. Needs to include: listing and description of the deliverables and work products project managers will use in project closure management.; an executive summary and conclusion, this summary must offer a high-level description of your consulting effort and a summary of your findings, the conclusion should focus on the organizational changes necessary to implement your recommendations. Provide a gap analysis and recommendations for the following documents that I have attached: Project charter, scope management plan & WBS, and the risk and change management plan. This paper must be 8 pages long and include 8 credible references.

You are the systems administrator for the Bafwell Company. Develop and recommend

You are the systems administrator for the Bafwell Company. Develop and recommend

You are the systems administrator for the Bafwell Company. Develop and recommend a wireless policy, and present to the management of the Bafwell Company. Be sure to address the following:
Identify specific encryption and authentication protocols, Media Access control (MAC) addresses, and interference that is required
Address existing policies if any
Research some wireless policies that organizations use, and describe the wireless security policy that you would recommend.
Please be sure to validate your opinions and ideas with citations and references in APA format.