#tcp ch 18
Explore tagged Tumblr posts
clockworkbee · 5 months ago
Text
Jude's dress for Dain’s Coronation
I think it’s important that we note how Cardan had seen Jude in Liriope’s dress at Locke’s gathering, and according to Jude, he had spotted her while saving Sophie as well, even though she’d thought he hadn’t actually seen her, but come on? Faerie sight and Cardan always recognizing Jude?
So, I think it’s safe to say that he was mesmerized by the sight of her, both, in that dress, and in the dark, the woods behind her and the moonlight and whatnot, and that he’d decided he’d like to see her in the same style as the dress she wore at Locke’s, but in the colors he’d seen her (or envisioned her) in that night. I like to think that the seamstress incorporated both Dain’s and Cardan’s wishes, btw. It’s very likely, too, since Jude got to see her dress’s final look after the aforementioned two events. I know she thinks/says,
Over that is stitched the stark outlines of trees, the way I see them from my window as dusk is falling.
But can’t it be that her view of the trees from her window was similar to Cardan’s view of her, while she was helping the mortal girl?
45 notes · View notes
curiosity-killed · 3 years ago
Photo
Tumblr media
“I still have the anba you gave me,” she admitted. “Callebero was going to show me how to wear it, but then…” She trailed off, not sure how to finish. The short sword was carefully stowed in a padded box in her chambers, never worn. Betine’s eyebrows rose slightly, her light eyes widening in surprise before she caught herself and gave a faint smile. “I guess you really don’t need any noble escort, then.”  She paused, rubbing at the back of her neck. “Ah, you know you really didn’t need to keep it.” Her expression had turned sheepish, a far cry from the easy confidence she’d worn each time Jisel had seen her recently. Amusement spread through Jisel, softening her own nerves. She bumped Betine’s arm lightly with her shoulder and folded her hands behind her back. “In Capall, it’s considered bad luck—and unforgivably rude—to cast aside or lose a gift,” she replied. At that, Betine’s eyebrows lifted and she tilted her head to one side, considering. She glanced sideways at Jisel, eyes narrowed slightly as if in thought.
“What if it was a terrible gift, though?” she asks. “How do you get rid of anything?” A smile tugged at the corner of Jisel’s lips. “You give it to someone else.” Betine snorted, shoulders hitching with the laughter. Her embarrassment dissipated easily, and she shook her head slightly.
“And if the gift is so bad it keeps getting passed on, what happens if it’s returned to the original gifter?” She raised her eyebrows as she asked, amusement tucked in the corner of her lips. “Then, hopefully, they learn to give better gifts,” Jisel replied.
5 notes · View notes
james1shields-blog · 7 years ago
Text
For Order This And Any Other Test
 Banks And Solutions Manuals, Course,
 Assignments, Discussions, Quizzes, Exams,
 Contact us At: [email protected]
 Guide to Networking Essentials, 6th ed., ISBN 1111312524
Ch. 1                                                                                                                                                           Solutions-1
 Chapter 1 Solutions
Review Questions
 1.       Which of the following is one of the three basic functions a computer performs? (Choose all that apply.)
 a.  Processing
 c.  Input
 e.  Output
 2.       The __________ executes instructions provided by computer programs.
 a.  CPU
 3.       When a CPU is composed of two or more processors, each one is referred to as a(n)
________.
 b.  Core
 4.       Which of the following is considered long-term storage? (Choose all that apply.)
 a.  Flash drive
 d.  Hard drive
 5.       Which motherboard component controls data transfers between memory, expansion slots, I/O devices, and the CPU?
 c.  Chipset
 6.       You want to purchase a new high-performance graphics card for your computer. Which type of connector should it have?
 d.  PCI-Express
 7.       The time it takes for read/write heads to move to the correct spot on the platter is the
____________.
 b.  Seek time
 8.       Which of the following is a task usually performed by the BIOS? (Choose all that apply.)
 a.  Perform a POST.
 d.  Begin the boot procedure.
 9.       Place the following steps of the boot procedure in order.
 a. The OS is loaded into RAM.
 b.  CPU starts.
 c.  OS services are started.
 d.  Power is applied.
 e.  The POST is executed.
 f.  Boot devices are searched.
 Answer: d, b, e, f, a, c
Guide to Networking Essentials, 6th ed., ISBN 1111312524
Ch. 1                                                                                                                                                           Solutions-2
 10.    Which of the following is a critical service provided by the OS? (Choose all that apply.)
 b. Memory management
 d.  File system
 11.    An OS’s capability to run more than one application or process at the same time is referred to which of the following?
 c.  Multitasking
 12.    You have just installed a new NIC in your PC to replace the old one that had started malfunctioning. What additional software must be installed to allow the OS to communicate with the new NIC?
 b.  Device driver
 13.    Which of the following requests information stored on another computer?
 b.  Network client
 14.    Choose the correct order for the process of a user attempting to access network resources:
 1.       Network protocol
 2.       Application
 3.       Network client
 4.       NIC driver
 d.  2, 3, 1, 4
 15.    TCP/IP is an example of which of the following?
 d.  Network protocol
 16.    In network communication, the ______________ address is used to deliver a frame to the correct computer on the network. (Choose all that apply.)
 a.  MAC
 d.  Physical
 17.    A(n) ______________ message is used to determine whether a computer is listening on the network.
 b.  Ping
 18.    TCP/IP uses _________ to look up a computer’s IP address, given its name.
 a.  DNS
 19.    The unit of information containing MAC addresses and an error-checking code that’s processed by the network interface layer is referred to as a
 _______________.
 c.  Frame
 20.    Data is processed from the time an application creates it to the time it reaches the network medium. This process includes adding information such as addresses and is called which of the following?
 b.  Encapsulation
 21.    You’re the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has
Guide to Networking Essentials, 6th ed., ISBN 1111312524
Ch. 1                                                                                                                                                           Solutions-3
 doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to your existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?
 c.  Internetwork
 22.    Which of the following best describes a client?
 b.  A computer’s primary role in the network is to run user applications and access network resources.
 23.    You work for a small company with four users who need to share information on their computers. The budget is tight, so the network must be as inexpensive as possible. What type of network should you install?
 b.  Peer-to-peer network
 24.    Which of the following characteristics is associated with a peer-to-peer network? (Choose all that apply.)
 a.  Decentralized data storage
 b.  Inexpensive
 c.  User-managed resources
 25.    A device interconnects five computers and a printer in a single office so that users can share the printer. This configuration is an example of which of the following?
 a.  LAN
 26.    At Yavapai College, the Prescott and Prescott Valley campuses (8 miles apart) have LANs connected via the local phone company. This configuration is an example of which of the following? (Choose the best answer.)
 a.  MAN
 27.    You have installed Windows Server 2008 on a new server and want to centralize user logons and security policies. What type of software should you install and configure on this server?
 d.  Directory services
 28.    Peer-to-peer networks aren’t suitable in which of the following situations?
 a. Tight security is required.
 29.    Which of the following best describes a storage area network?
 b.  Uses high-speed networking technologies to give servers fast access to large amounts of disk storage
 30.    Why might Windows 7 or Windows Vista require more RAM or disk space than Windows Server 2008?
 d.  They support a graphics-intensive user interface.
 Hands-On Projects
 Hands-On Project 1-1
 Step 2: Steps of the boot procedure:
 1.       Power is applied to the motherboard.
Guide to Networking Essentials, 6th ed., ISBN 1111312524
Ch. 1                                                                                                                                                           Solutions-4
 2.       CPU starts.
 3.       CPU carries out BIOS startup routines, include the POST. Step 5: Final steps of the boot procedure:
4.       Boot devices are searched for an OS.
 5.       The OS is loaded into RAM.
 6.       OS services are started.
 Hands-On Project 1-3
 Step 5:
 •          Word-processing program: User application
 •          NIC displayed in the Connect using text box: Network interface
 •          Client for Microsoft Networks: Network software
 •          File and Printer Sharing for Microsoft Networks: Network software
 •          Internet Protocol Version 4: Network protocol
 Hands-On Project 1-5
 Step 2: workgroup, peer-to-peer
 Hands-On Project 1-6
 Step 10: File sharing, peer-to-peer
 Case Projects
 Case Project 1-1
 A server-based network is the best choice. A peer-to-peer network might work for now, but when new employees are hired, a peer- to-peer network would be too difficult to manage. The key is that easy backup and centralized storage for files point to a server-based network.
 Case Project 1-2
 Because employees must be able to control access to their own resources, a peer-to-peer model works best. Supplies will likely include NICs, cabling, and a switch. Students should state they need to configure file shares and possibly create user accounts on the computers to allow access by other users. They might also need to configure IP address settings, although self-configuring addresses could be used.
 Case Project 1-3
 An internetwork is called for because LANs in the same building are being connected. A router is probably needed for communication between LANs on the two floors.
 Case Project 1-4
 A personal area network (PAN)
 Case Project 1-5
Guide to Networking Essentials, 6th ed., ISBN 1111312524
Ch. 1                                                                                                                                                           Solutions-5
 Answers will vary.
0 notes
clockworkbee · 5 months ago
Text
Tumblr media Tumblr media
I am going to make my mayfly life count for something.
18 notes · View notes
clockworkbee · 5 months ago
Text
For instance, the stuff that goes on between her and Valerian? The horror of knowing that someone wants to kill you, that they would delight in seeing the life go out of you, and then actually saving yourself from those attempts multiple times? Like, actually seeing murder in their eyes, and then realizing you could have been dead if not for luck or the fighting instinct in you? He was her first kill, even if it was in self-defence, and that too right after she saw the girl she was trying to save, chose to drown? No wonder she’d lost her mind.
Jude Duarte is one of the strongest mortal characters that I’ve ever read about. Like, when you look at the traumatic, life-altering experiences she’s been through, even before the age of 18? Yes, no one could ever.
It’s easy for all that she’s been through to just blur into one big messy picture, but each and every thing that she suffered made her stronger and tougher as a person, if not better as a human being. And who would even expect her to be, surrounded as she was by the inhuman folk?
46 notes · View notes
clockworkbee · 4 years ago
Text
THE CRUEL PRINCE | CHAPTER 18 SPOILERS
Jude: kills someone
*think where to hide the body*
Jude: *after some inspiration* oh I know!
Tumblr media
This moment is so tense tbh and it's over so soon like, I'm still processing and then she hides his body UNDER HER BED? I'm laughing and I have questions. Girl!! Someone can come. Clean the blood. Do SOMETHING! won't the body smell? And back to laughing at UNDER THE BED?! XD
5 notes · View notes