Answer:
Discuss with product owner and ask if it is a valid scenario.
Explanation:
To resolove this, a discussion should be made with the product owner and the question on if it is a valid scenario should be asked.
Normally when there are issues like this, the product owner should be able to help sort out the issues. This should be the number one option to pick in cases like this where there are different opinions on what to do.
How does computer mouse impact the world, society and health?
Explanation:
Without it, we may have endured convoluted keyboard commands for years, greatly hindering the process of bringing the PC into homes everywhere. The mouse revolutionized computer interfaces, simplified an otherwise scary machine, and helped connect the world.
It's not possible to die in an alcohol-related collision if you're not in an automobile.
A. True
B. False
Answer:
B. False
Explanation:
Consumption of alcohol is not a good practice and is generally not allowed at the time of driving an automobile and is considered to be an offense as it may be injurious to health and property. As too much alcohol can create possible chances of collusions and even if the person is not in an automobile can result in a collision if tries to cross the road. Like head injuries or leg injuries can occur.)You have been asked to do voice-overs and ""wild lines"" for a film. What is your position on the film crew? Boom operator Sound board operator Production sound mixer Sound designer
Answer:
Sound designer.
Explanation:
A boom operator is responsible for positioning of the microphone.
A sound board operator is responsible for playing pre-recorded sound effects.
A production sound mixer records all sounds on the set.
A sound designer creates and edits new sounds.
In conclusion, it must be a sound designer as this best fits the role.
A vowel word is a word that contains every vowel. Some examples of vowel words are sequoia, facetious, and dialogue. Determine if a word input by the user is a vowel word.
Answer:
vowels = ("a", "e", "i", "o", "u")
word = input("Enter a word: ")
is_all = True
for c in vowels:
if c not in word:
is_all = False
if is_all == True:
print(word + " is a vowel word.")
else:
print(word + " is not a vowel word.")
Explanation:
Initialize a tuple, vowels, containing every vowel
Ask the user to enter a word
Initially, set the is_all as True. This will be used to check, if every vowel is in word or not.
Create a for loop that iterates through the vowels. Inside the loop, check if each vowel is in the word or not. If one of the vowel is not in the vowels, set the is_all as False.
When the loop is done, check the is_all. If it is True, the word is a vowel word. Otherwise, it is not a vowel word.
For each of these relations on the set {21,22,23,24},decide whether it is re- flexive, whether it is symmetric, whether it is antisymmetric, and whether it is transitive.1. {(22, 22), (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)} 2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}
Answer:
1. {(22, 22) (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)} : Not reflective, Not symmetric, Not anti-symmetric, Transitive.
2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}: Reflective, symmetric.
Explanation:
Solution
Reflective: Of every element matched to its own element
Symmetric: For every (a,b) there should be (b,a)
Anti-symmetric: For every (a,b) there should not be (b,a)
Transitive: For every (a,b) ∈R and (b,c)∈ R -then (a,c) ER for all a, b, c ∈ A
Now,
1.{(22, 22) (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)}
Not Reflective: This is because we don't have (21,21) (23,23) and (24,24)
Not symmetric: Because we don't have (23,24) and (24,23)
Not anti symmetric: We have both (22,23) and (23,22)
Transitive: It is either 22 or 23 be (a,b) and 24 (b,a)
2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}
Reflective: For all we have (a,a)
Symmetric: For every (a,b) we have (b,a)
Not Anti-symmetric
Transitive
Instead of typing an individual name into a letter that you plan to reuse with multiple people, you should use a _______ to automate the process.
A. mail merge
B. data source
C. mailing list
D. form letter
ONLY ANSWER IF YOU'RE 100% SURE.
Answer:
A. Mail Merge
Explanation:
I had this question last year
6. A distribution consists of three components with frequencies 200, 250 and 300 having means
25,10, and 15 and standard deviations 3, 4, and 5 respectively.
Calculate
The mean?
The standard deviation?
Answer:
The mean = 16
The standard deviation = 7.19
Explanation:
N1 = 200 X1 = 25 σ1 = 3
N2= 250 X2 = 10 σ2 = 4
N3 = 300 X3= 15 σ3 = 5
The mean of a combined distribution is given by:
[tex]X = \frac{X_1N_1+X_2N_2+X_3N_3}{N_1+N_2+N_3}\\X = \frac{25*200+10*250+15*300}{200+250+300}\\X=16[/tex]
The differences from the mean for each component are:
[tex]D_1 = 25-16=9\\D_2=10-16=-6\\D_3=15-16=-1[/tex]
The standard deviation of a combined distribution is given by:
[tex]\sigma=\sqrt{\frac{N_1(\sigma_1^2+D_1^2)+N_2(\sigma_2^2+D_2^2)+N_3(\sigma_3^2+D_3^2)}{N_1+N_2+N_3}}\\\sigma=\sqrt{\frac{200(3^2+9^2)+250(4^2+(-6)^2)+300(5^2+(-1)^2)}{200+250+300}}\\\sigma=\sqrt{\frac{18000+13000+7800}{750} }\\\sigma=7.19[/tex]
The mean = 16
The standard deviation = 7.19
Write a program that inputs a sentence from the user (assume no punctuation), then determines and displays the unique words in alphabetical order. Treat uppercase and lowercase letters the same.
Answer:
Following are the code to this question:
val={} #defining dictionary variable val
def unique_word(i):#defining a method unique_word
if i in val: #defining if condition to add value in dictonary
val[i] += 1#add values
else: #defining else block to update values
val.update({i: 1})#updating dictionary
s =input('Enter string value: ') #defining s variable for input string value
w=s.split()#split string value and sorte in w variable
w.sort() #sorting the value
for i in w: #defining loop for pass value in method unique_word
unique_word(i)#assign value and calling the unique_word method
for j in val:# defining for loop to print dictionary value
if val[j] == 1: #defining if block to check value is unique
print(j) #print value
Output:
Enter string value: my name is dataman
dataman
name
is
my
Explanation:
In the above python code, a dictionary variable "val" is declared, which is used in the method "unique_word" that uses if block to count unique word and in the else block it update its value. In the next step, s variable is declared, that the user input method to store the value and another variable "w" is defined that split and sort the string value. In the last step, two for loop is declared in which the first loop passes the string value and calls the method "unique_word", and in the second loop if block is defined that check unique value and prints its value.Observe the things at Home in which you are using binary
conditions (ON/OFF) and Draw these things (any five).
Explanation:
All five things i can come up with her
1. Doors (we either open or close them)
2. Tap (we either open or close the valve)
3. Electric stove/cooker
4. The lid of containers
5. Shoes/ foot wears(we put them ON or OFF)
On a system with paging, a process cannot access memory that it does not own. Why? How could the operating system allow access to other memory?
Answer:
Because the page is not in its page tableThe operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page tableExplanation:
On a system with paging, a process cannot access memory that it does not own because the page is not in its page table also the operating system controls the contents of the table,therefore it limits a process of accessing to only the physical pages allocated to the process.
The operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table.that way two processes that needs to exchange data can efficiently do that . i.e creating a very efficient inter-process communication
Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash ('-') or a underscore '_'. For example, the string "-Yes" would return True but the string "Nope" would return False. Note: Your function will be unit tested against multiple strings. It is not enough to get the right output for your own test cases, you will need to be able to handle any kind of non-empty string. Note: You are not allowed to use an if statement.
Answer:
The program written in python is as follows:
def begins_with_line(userinut):
while userinut[0] == '-' or userinut[0] == '_':
print(bool(True))
break;
else:
print(bool(not True))
userinput = input("Enter a string: ")
begins_with_line(userinput)
Explanation:
The program makes use of no comments; However, the line by line explanation is as follows
This line defines the function begins_with_line with parameter userinut
def begins_with_line(userinut):
The following italicized lines checks if the first character of user input is dash (-) or underscore ( _)
while userinut[0] == '-' or userinut[0] == '_':
print(bool(True)) ->The function returns True
break;
However, the following italicized lines is executed if the first character of user input is neither dash (-) nor underscore ( _)
else:
print(bool(not True)) -> This returns false
The main starts here
The first line prompts user for input
userinput = input("Enter a string: ")
The next line calls the defined function
begins_with_line(userinput)
NB: The program does not make use of if statement
________ platforms automate tasks such as setting up a newly composed application such as a web service or linking to other applications.
Answer:
Cloud-based
Explanation:
Cloud based platforms are the various platforms that leverage on the power of cloud computing. With these platforms, users or businesses can access some or all features and files of a system without having to store these files and features on their own computers. Some of these platforms also automate tasks such as setting up various applications (such as a web service, a web application, database systems e.t.c) and/or linking them to other applications. Some of these platforms are;
i. Google Drive
ii. Amazon Web Services (AWS)
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused by a malicious insider.
a. True
b. False
Answer:
a. True
Explanation:
The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.
A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.
The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.
The CPU control unit is responsible for A. obtaining instructions B. interpreting instructions C. all logic functions D. both A and B
Answer:
D. Both A and B
Explanation:
Because it controls the input and output of data, check the signals have been delivered successfully, and make sure that data goes to the correct place at the correct time.
Although the term podcasting has caught on, a more accurate term when it applies to video content is ________. a. tubecasting b. webcasting c. vcasting d. viewcasting
Answer:
The answer is option (c) vcasting
Explanation:
Solution
Vcasting for video content are more exact terms to use in place of podcast and podcasting.
Video content or vcasting: It refers any content format that attribute or contains video. common forms of video content are vlogs, animated GIFs, customer testimonials, live videos, recorded presentations and webinar.
A variable like userNum can store a value like an integer. Extend the given program to print userNum values as indicated.
(1) Output the user's input. Enter integer: 4 You entered: 4
(2) Extend to output the input squared and cubed. Enter integer: 4 You entered: 4 4 squared is 16 And 4 cubed is 64!!
(3) Extend to get a second user input into userNum2. Output sum and product. Enter integer: 4 You entered: 4 4 squared is 16 And 4 cubed is 64!! Enter another integer: 5 4+5 is 9 4*5 is 20.
Answer:
This program is written using Java programming language.
No comments were used; however, see explanation section for line by line explanation
import java.util.*;
public class Nums {
public static void main(String args[]) {
Scanner input = new Scanner(System.in);
System.out.println("1.");
int userNum;
System.out.print("Enter Integer: ");
userNum = input.nextInt();
System.out.println("You entered: "+userNum);
System.out.println("2.");
System.out.print("Enter Integer: ");
userNum = input.nextInt();
System.out.println("You entered: "+userNum);
System.out.println(userNum+" squared is "+(userNum * userNum));
System.out.println("And "+userNum+" cubed is "+(userNum * userNum * userNum)+"!!");
System.out.println("3.");
System.out.print("Enter Another integer: ");
int userNum2 = input.nextInt();
System.out.println(userNum+" + "+userNum2+" is "+(userNum + userNum2));
System.out.println(userNum+" * "+userNum2+" is "+(userNum * userNum2));
}
}
Explanation:
This enables the program accept inputs
Scanner input = new Scanner(System.in);
This signifies the beginning of number 1
System.out.println("1.");
Variable userNum is declared as type integer
int userNum;
The line prompts the user for input
System.out.print("Enter Integer: ");
The line accepts the input
userNum = input.nextInt();
This line displays user input
System.out.println("You entered: "+userNum);
This signifies the beginning of number 2
System.out.println("2.");
This line prompts the user for input
System.out.print("Enter Integer: ");
This line accepts input
userNum = input.nextInt();
This line prints user input (as required in number 2)
System.out.println("You entered: "+userNum);
This line calculates and prints the square of user input
System.out.println(userNum+" squared is "+(userNum * userNum));
This line calculates and prints the cube of user input
System.out.println("And "+userNum+" cubed is "+(userNum * userNum * userNum)+"!!");
This signifies the beginning of number 3
System.out.println("3.");
This line prompts the user for another integer value
System.out.print("Enter Another integer: ");
This line accepts the input from the user
int userNum2 = input.nextInt();
This line adds the two inputs by the user and displays the result
System.out.println(userNum+" + "+userNum2+" is "+(userNum + userNum2));
This line multiplies the two inputs by the user and displays the result
System.out.println(userNum+" * "+userNum2+" is "+(userNum * userNum2));
Assume that to_the_power_of is a function that expects two integer parameters and returns the value of the first parameter raised to the power of the second parameter. Write a statement that calls to_the_power_of to compute the value of cube_side raised to the power of 3 and that associates this value with cube_volume.
Answer:
The statement in python is as follows:
to_the_power_of(cube_side,3)
Explanation:
As stated as the requirement of the code segment, the statement takes as parameters a variable cube_side and a constant 3.
It then returns the volume of the cube; i.e. cube raise to power 3
See full program below
def to_the_power_of(val,powe):
result = val**powe
print(result)
cube_side = float(input("Cube side: "))
to_the_power_of(cube_side,3)
The key schedule results in generating multiple keys from the one secret key. These multiple keys are used:
a. in multiple sessions of communications one after the other. For example, if someone has 12 keys, they can use it for twelve video calls one after the other.
b. such that one of them is picked up at random at a time.
c. some as private keys, some as public keys.
d. for different rounds of encryption for the same plaintext to strengthen the cipher.
Answer:
Option(d) is the correct answer to the given question .
Explanation:
There are various type of algorithm is used for the purpose of the key scheduling such as AES .in the AES algorithm we used same key for encryption and decryption of text .The main objective of the AES algorithm it is used by Various round of the similar plain text encryption to reinforce the cipher text.
The Option (a) is wrong because In the key scheduling the creating keys are not being used one after just another in the various communication cycles.The Option (b) is wrong because In the key scheduling we do not used the the random key for the encryption process .The Option (c) is wrong because we will never arbitrarily subdivided into groups of public and private key.
Front wheel drive vehicles typically use
Answer:
Front wheel drive vehicles usually use positive offset wheel
Explanation:
Assume that a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions. How much faster should we run the floating-point instructions to execute entire program 1.25 times faster
Answer:
the floating-point instructions should be run 1.5 times faster in order to execute entire program 1.25 times faster
Explanation:
Given that:
a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions.
Let the integer be the total execution time = V
The floating-point instructions = 60%
The integer instruction = 40%
The time spent on the floating-point instruction = 60/100 × V
= 0.6 V
The time spent on t he integer instruction = 40/100 × V
= 0.4 V
However; How much faster should we run the floating-point instructions to execute entire program 1.25 times faster
If we are to execute the entire program 1,25 times faster;
The new execution time = V/1.25
Assuming the new time spent on floating-point instruction = W
∵
W + 0.4 V = V/1.25
W = V/1.25 - 0.4 V
W = (V - 0.5V)/1.25
W = 0.4V
the new time spent on floating-point instruction = W = 0.4 V
The speed required to make the floating -point instruction to run faster = 0.6V/.4 V
= 1.5
Hence, the floating-point instructions should be run 1.5 times faster in order to execute entire program 1.25 times faster
TLS does not require mutual authentication. Only server must authenticate its public key to the client. Client is authenticated by the application via a password. The most common way for public key authentication would be a. a photo ID. b. a password. c. a certificate. d. biometrics.
Answer:
c. a certificate.
Explanation:
Public key infrastructure authentication is intended to make transactions occurring through the internet as secure as possible. Public keys are usually assigned to entities like business firms or individuals, and digital certificates are given to them as proof that they have been authenticated.
A certificate authority has the role of signing, storing, and issuing digital certificates. A software or humans could be charged with the responsibility of actually ensuring a key to user binding if all conditions are satisfied.
Patrick Stafford's article argues that the growth of mobile phone usage "has given developers the ability to great robust and engaged communities" that help a game's chance of success.
a. true
b. false
Answer:
The statement is False.
Explanation:
In his article published on the 31st Aug 2010, Patrick suggests that a 100% penetration rate for any market is now possible due to the growth of the use of mobile phones.
The strategy of accessing the market using mobile ads, according to Patrick, is called Mobile Marketing.
In his article, Patrick provides statistics which help buttress his position that a good number of mobile phone users are ready to respond positively to mobile ads.
While it is implied that this concept has increased the chances of mobile games as a product being successful, nowhere in the article did Patric mention "games".
Cheers!
The purpose of validating the results of the program is Group of answer choices To create a model of the program To determine if the program solves the original problem To correct syntax errors To correct runtime errors
Answer:
To determine if the program solves the original problem
Explanation:
Required
Essence of validating a program
From list of given options, only the above option best describes the given illustration.
When a program is validated, it means that the results of the program are tested to meet the requirements of the user;
For a program to be validated, it means it has passed the stage of error checking and correction; whether syntax or run time errors;
However, when modifications are made, the program will need to be re-validated to ensure that it comports with its requirements.
any element that has a starting tag and does not have a closing tag is called a ?
pls be quick guys
Answer:
Any element that has a starting tag and doesn't have a closing tag is called a empty element.
:)
What happens if you attempt an operation that uses the input stream and the operation fails but the stream is OK
Answer:
The fail bit of the stream object will be set.
Explanation:
The Input Stream is been used to effectively and efficiently read data from a source .
Therefore in a situation in which an individual or a person attempt an operation that uses the input stream and the operation fails but the stream is OK this means that the fail bit of the stream object will be set . FAILBIT is generally set in a situation where the error that occured involves the loss of integrity of the stream in which it is more likely to persist even if various operation is been carried out or attempted on the stream which is why FAIL BIT can always be checked independently by calling the member function bad.
Lastly FAILBIT is as well set because of a read or write operation that fails.
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a corporate network.
Answer:
A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.
Explanation:
A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.
Advantage:-
Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning. Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets. Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.Disadvantage:-
That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.
When introducing new devices to the network, the organization's security policy requires that devices be monitored to establish normal traffic patterns for the device. Which of the following is generated from initial monitoring?
A. SLA
B. Baseline
C. Forensic log
D. Vulnerability assessment
Answer:
The answer is "Option B".
Explanation:
The Baseline measurement is an essential characteristic of effective coal company monitoring programs to assess the degree of mining effects and keep on improving effect monitoring the system will continue to be modified via periodical analyses, and the wrong choices can be defined as follows:
In choice A, it is wrong because it used in 3D printing technology. In choice C, it is used to analyze the log entities, that's why it is wrong. In choice D, it is used to analyze the security weaknesses, that's why it's wrong.Which operating system problem might cause the desktop background to change
unexpectedly? Choose the answer.
A boot failure
B startup loop
C malware D incompatibility
It should be noted that the operating system problem that might cause the desktop background to change is D incompatibility.
What is operating system problem?The operating system problem serves as those error that can affect the operation of the operating system in computer.
This System errors are caused by malfunctioning hardware components as well as corrupted operating system modules and one of this is compatibility.
Learn more about operating system problem at;
https://brainly.com/question/17506968
the typing area is bordered on the right side by bars in ms word
Answer:
Explanation:
PTA NHI
Create an application named ArithmeticMethods whose main() method holds two integer variables. Assign values to the variables. In turn, pass each value to methods named displayNumberPlus10(), displayNumberPlus100(), and displayNumberPlus1000(). Create each method to perform the task its name implies. Save the application as ArithmeticMethods.java.
Answer:
public class ArithmeticMethods
{
public static void main(String[] args) {
int number1 = 7;
int number2 = 28;
displayNumberPlus10(number1);
displayNumberPlus10(number2);
displayNumberPlus100(number1);
displayNumberPlus100(number2);
displayNumberPlus1000(number1);
displayNumberPlus1000(number2);
}
public static void displayNumberPlus10(int number){
System.out.println(number + 10);
}
public static void displayNumberPlus100(int number){
System.out.println(number + 100);
}
public static void displayNumberPlus1000(int number){
System.out.println(number + 1000);
}
}
Explanation:
Inside the main:
Initialize two integers, number1 and number2
Call the methods with each integer
Create a method called displayNumberPlus10() that displays the sum of the given number and 10
Create a method called displayNumberPlus100() that displays the sum of the given number and 100
Create a method called displayNumberPlus1000() that displays the sum of the given number and 1000