Answer:
C. Denial of Service
Explanation:
Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.
Use an Excel function to find: Note: No need to use Excel TABLES to answer these questions! 6. The average viewer rating of all shows watched. 7. Out of all of the shows watched, what is the earliest airing year
Answer:
Use the average function for viewer ratings
Use the min function for the earliest airing year
Explanation:
The average function gives the minimum value in a set of data
The min function gives the lowest value in a set of data
What is
relation degree.
Answer:
Explanation:
The degree of relationship can be defined as the number of occurrences in one entity that is associated with the number of occurrences in another entity. There is the three degree of relationship: One-to-one (1:1) One-to-many (1:M)
A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capyure all of the network traffic. Which of the following should be used for the IDS implementation?
a. Network tap
b. Honeypot
c. Aggregation
d. Port mirror
Answer:
d. Port mirror
Explanation:
Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.
Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print a newline. Ex: If numInsects = 8, print:
8 16 32 64
#include
using namespace std;
int main() {
int numInsects = 0;
numInsects = 8; // Must be >= 1
while (numInsects < 100) {
numInsects = numInsects * 2;
cout << numInsects << " ";
}
cout << endl;
return 0;
}
So my question is what am I doing wrong?
Answer:
The cout<<numInsects<<""; statement should be placed before numInsects = numInsects * 2; in the while loop.
Explanation:
Your program gives the following output:
16 32 64 128
However it should give the following output:
8 16 32 64
Lets see while loop to check what you did wrong in your program:
The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100.
So the body of while loop executes. numInsects = numInsects * 2; statement in the body multiplies the value of numInsects i.e 8 with 2 and then cout << numInsects << " "; prints the value of numInsects AFTER the multiplication with 2 is performed. So 8 is not printed in output but instead 16 (the result of 8*2=16) is printed as the result of first iteration.
So lets change the while loop as follows:
while (numInsects < 100) {
cout << numInsects << " ";
numInsects = numInsects * 2;
Now lets see how it works.
The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100
So the body of while loop executes. cout << numInsects << " "; first prints the value of numInsects i.e. 8. Next numInsects = numInsects * 2; multiplies the value of numInsects i.e 8 with 2. So first 8 is printed on the output screen. Then the multiplication i.e. 8*2=16 is performed as the result of first iteration. So now value of numInsects becomes 16.
Next the while loop condition numInsects < 100 is again checked. It is true again as 16<100. Now cout << numInsects << " "; is executed which prints 16. After this, the multiplication is again performed and new value of numInsects becomes 32 at second iteration. This is how while loops continues to execute.
So this while loop stops when the value of numInsects exceeds 100.
Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates when "xxxxx" (five x characters) is read in. Other strings are ignored. After the loop, your code should print out 3 lines: the first consisting of the string "land:" followed by the number of "land" strings read in, the second consisting of the string "air:" followed by the number of "air" strings read in, and the third consisting of the string "water:" followed by the number of "water" strings read in. Each of these should be printed on a separate line. Use the up or down arrow keys to change the height.
Answer:
count_land = count_air = count_water = 0
while True:
s = input("Enter a string: ")
if s == "xxxxx":
break
else:
if s == "land":
count_land += 1
elif s == "air":
count_air += 1
elif s == "water":
count_water += 1
print("land: " + str(count_land))
print("air: " + str(count_air))
print("water: " + str(count_water))
Explanation:
*The code is in Python
Initialize the variables
Create a while loop that iterates until a specific condition is met. Inside the loop, ask the user to enter the string. If it is "xxxxx", stop the loop. Otherwise, check if it is "land", "air", or "water". If it is one of the given strings, increment its counter by 1
When the loop is done, print the number of strings entered in the required format
Write a statement that increments numUsers if updateDirection is 1, otherwise decrements numUsers. Ex: if numUsers is 8 and updateDirection is 1, numUsers becomes 9; if updateDirection is 0, numUsers becomes 7.Hint: Start with "numUsers
Answer:
Following are the statement is given below
if(updateDirection ==1) // check condition
{
++numUsers; // increments the value
}
else
{
--numUsers; // decrement the value
}
Explanation:
Following are the description of statement
Check the condition in the if block .If the "updateDirection" variable is 1 then then control moves to the if block otherwise control moves to the else block statement.In the if block the statement is "++numUsers" it means it increment the value by 1 .In the else block the statement is "--numUsers" it means it decrement the value by 1 .You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on your validation set, but good performance on your training set. Your implementation has no bugs. Define various reasons that could be causing the problem?
Answer:
The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data
Explanation:
Solution
The various reasons that could be causing the problem is given as follows :
1. A wide number of parameters :
In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers. When the training is performed in this tree, then the model files the data too well. When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.2. Noisy Data:
The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values. When the tree is trained on this noisy data, then it sets its parameters according to the training data. As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.
Denial of service (DoS) attacks can cripple an organization that relies heavily on its web application servers, such as online retailers. What are some of the most widely publicized DoS attacks that have occurred recently? Who was the target? How many DoS attacks occur on a regular basis? What are some ways in which DoS attacks can be prevented? Write a one-page paper on your research.
Answer:
The overview of the given question is described in the explanation segment below.
Explanation:
The number of casualties has occurred in recent years. The following are indeed the assaults:
Arbitrary Remote Code execution attacks:
It's also a very hazardous assault. Unsanitary working on implementing that used operating system including user actions could enable an attacker to execute arbitrary functions mostly on system files.
Sites become targeted with such a DOS assault that will cause them inaccessible whether they close the account to an offender who threatens them.
Prevention: We could protect this by preventing the call from additional assessment by the user. We will disinfect input validation if we transfer values to devise calls. The input data is permitted to transfer on requests, it should have been strictly regulated although restricted to a predetermined system of principles.
Injection attack:
The object of the Injection Attack seems to be to delete vital information from the server. Throughout the list, we have such a user, a code, as well as a lot of several other essential stuff. Assailants are taking vital data and doing the wrong stuff. This can have an impact on the web site or software application interface the SQL.
Prevention: Parameterized functions require developers must specify all of the SQL code, and afterward move the question in-parameter, allowing the server to distinguish between some of the code as well as the information. By decreasing the privilege allocated to each database. White list data validation has been used to prevent abnormal information.
Zero-day attack:
It corresponds to something like a vulnerability flaw undisclosed to the user. The security vulnerability becomes infected with malware. The attackers have access to inappropriate details.
Prevention: The organizations are releasing the patch fixes the found holes. The updated plugin is also a preventive tool.
Buffer overflow attack:
This is indeed a major security threat to the accuracy of the data. This overflow happens since more information becomes set to either a specified size than even the buffer could accommodate. Adjoining program memory is compromised. During that time, the attacker was indeed running obfuscated code. Two key forms of such attack are provided below:
Heap-basedStack-basedPrevention: Standard library features, including such strcpy, should indeed be avoided. Standard testing should be performed to identify as well as resolve overflow.
A list based on a simple array (standard array implementation) is preferable to a dynamically allocated list for the following reasons.
A. Insertions and deletions require less work.
B. You are guaranteed a space to insert because it is already allocated.
C. You can take advantage of random-access typically.
D You can mix and match the types of the items on the list. E. (b) and (c).
F. All of the above.
Answer:
A. Insertions and deletions require less work.
C. You can take advantage of random access typically
D. You can mix and match the types of the items on the list.
Explanation:
Standard array implementation is a process in which number of items are of same type and index is restricted at a certain range. This is preferable to dynamic allocated list because it requires less work in insertion and deletions. A dynamically allocated array does not use the fixed array size declaration.
Complete a prewritten C++ program for a carpenter who creates personalized house signs. The program is supposed to compute the price of any sign a customer orders, based on the following facts:
The charge for all signs is a minimum of $35.00.
The first five letters or numbers are included in the minimum charge; there is a $4 charge for each additional character.
If the sign is made of oak, add $20.00. No charge is added for pine.
Black or white characters are included in the minimum charge; there is an additional $15 charge for gold-leaf lettering.
Instructions:
Ensure the file named HouseSign.cppis open in the code editor. You need to declare variables for the following, and initialize them where specified:
A variable for the cost of the sign initialized to 0.00 (charge).
A variable for the number of characters initialized to 8 (numChars).
A variable for the color of the characters initialized to "gold" (color).
A variable for the wood type initialized to "oak" (woodType).
Write the rest of the program using assignment statements and ifstatements as appropriate. The output statements are written for you.
Answer:
#include <iostream>
#include <string>
using namespace std;
int main()
{
double charge = 0.00;
int numChars = 8;
string color = "gold";
string woodType = "oak";
if(numChars > 5){
charge += (numChars - 5) * 4;
}
if(woodType == "oak"){
charge += 20;
}
if(color == "gold"){
charge += 15;
}
charge += 35;
cout << "The charge is: $" << charge << endl;
return 0;
}
Explanation:
Include the string library
Initialize the variables as specified
Check if the number of characters is greater than 5 or not. If it is, add 4 to the charge for each character that is greater than 5
Check if the sign is made of oak or not. If it is, add 20 to the charge
Check if the color is gold or not. If it is, add 35 to the charge
Add the minimum cost to the charge
Print the charge
In this exercise we have to use the knowledge of the C++ language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
#include <iostream>
#include <string>
using namespace std;
int main()
{
double charge = 0.00;
int numChars = 8;
string color = "gold";
string woodType = "oak";
if(numChars > 5){
charge += (numChars - 5) * 4;
}
if(woodType == "oak"){
charge += 20;
}
if(color == "gold"){
charge += 15;
}
charge += 35;
cout << "The charge is: $" << charge << endl;
return 0;
}
See more about C++ at brainly.com/question/26104476
Who do you think larger or smaller clients will benefit most from MasterCard’s analytics tools? Why?
Answer:The key to analytics success is not about searching for answers, ... If you are trying to determine where to find new customers, there is a recipe for how to do that, and it ... As we work with small businesses, we help them answer their big ... Moving forward, there is going to be a lot more data of varying types.
Explanation:
Write a program that displays, 10 numbers per line, all the numbers from 100 to 200 that are divisible by 5 or 6, but not both. The numbers are separated by exactly one space
My Code:
count = 0
for i in range (100, 201):
if (i %6==0 and i %5!=0) or (i%5==0 and i%6!=0):
print(str(i), "")
count = count + 1
if count == 10:
string = str(i) + str("")
print(string)
count = 0
Any way to put the numbers 10 per line?
Answer & Explanation:
To print 10 on a line and each number separated by space; you make the following modifications.
print(str(i)+" ",end=' ')
str(i)-> represents the actual number to be printed
" "-> puts a space after the number is printed
end = ' ' -> allows printing to continue on the same line
if(count == 10):
print(' ')
The above line checks if count variable is 10;
If yes, a blank is printed which allows printing to start on a new line;
The modified code is as follows (Also, see attachment for proper indentation)
count = 0
for i in range(100,201):
if(i%6 == 0 and i%5!=0) or (i%5 ==0 and i%6!=0):
print(str(i)+" ",end=' ')
count = count + 1
if(count == 10):
print(' ')
count = 0
1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2. (1 point) Which flag is set when the result of a signed arithmetic operation is either too large or too small to fit into the destination? 3. (1 point) Which flag is set when an arithmetic or logical operation generates a negative result?
Answer:
(1) Carry flag (2) Overflow flag (3) Sign or negative Flag
Explanation:
Solution
(1) The carry flag : It refers to the adding or subtracting. a two registers has a borrow or carry bit
(2) The over flow flag: This flag specify that a sign bit has been modified during subtracting or adding of operations
(3) The sign flag: This is also called a negative sign flag is a single bit status in a register that specify whether the last mathematical operations generated a value to know if the most significant bit was set.
Implement a Java program using simple console input & output and logical control structures such that the program prompts the user to enter 5 integer scores between 0 to 100 as inputs and does the following tasks For each input score, the program determines whether the corresponding score maps to a pass or a fail. If the input score is greater than or equal to 60, then it should print "Pass", otherwise, it should print "Fail". After the 5 integer scores have been entered, the program counts the total number of passes as well as the total number of failures and prints those 2 count values with appropriate messages like "Total number of passes is: " & "Total number of failures is: ". After the 5 integer scores have been entered, the program finds the highest score as well as the lowest score and prints those 2 values with appropriate messages like "Highest score is: " & "Lowest score is: ". The program checks whether an input score is a number between 0 - 100 or not. If the input score value is otherwise or outside the above range, then it prints the error message saying "Invalid score" and prompts the user for valid input.
Answer:
import java.util.Scanner; public class Main { public static void main(String[] args) { int pass = 0; int fail = 0; int highest = 0; int lowest = 100; int counter = 0; Scanner input = new Scanner(System.in); while(counter < 5){ System.out.print("Input a score between 0 to 100: "); int score = input.nextInt(); while(score < 0 || score > 100){ System.out.println("Invalid score."); System.out.print("Input a score between 0 to 100: "); score = input.nextInt(); } if(score >= 60 ){ System.out.println("Pass"); pass++; }else{ System.out.println("Fail"); fail++; } if(highest < score ){ highest = score; } if(lowest > score){ lowest = score; } counter++; } System.out.println("Total number of passes is: " + pass); System.out.println("Total number of failures is: " + fail); System.out.println("Highest score is: " + highest); System.out.println("Lowest score is: " + lowest); } }Explanation:
Firstly, declare the necessary variables and initialize them with zero (Line 4-8). Next create a Scanner object to get user input for score (Line 10). Create a while loop by using the counter as limit (Line 12). In the while loop, prompt user to input a number between 1 - 100 (Line 13-14). Create another while loop to check the input must be between 1 - 100 or it will print invalid message and ask for user input again (Line 15-19).
Next, create an if-else statement to check if the current score is equal or above 60. If so print pass if not print fail (Line 21-27). At the same time increment the fail and pass counter.
Create another two if statement to get the current highest and lowest score and assign them to highest and lowest variables, respectively (Line 29-35).
Increment the counter by one before proceeding to the next loop to repeat the same process (Line 37).
At last, print the required output after finishing the while loop (Line 40-43).
Using Python I need to Prompt the user to enter in a numerical score for a Math Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a English Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a PE Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a Science Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for an Art Class. The numerical score should be between 0 and 100. Call the letter grade function 5 times (once for each class). Output the numerical score and the letter grade for each class.
Answer:
The program doesn't use comments; See explanation section for detailed line by line explanation
Program starts here
def lettergrade(subject,score):
print(subject+": "+str(score))
if score >= 90 and score <= 100:
print("Letter Grade: A")
elif score >= 80 and score <= 89:
print("Letter Grade: B")
elif score >= 70 and score <= 79:
print("Letter Grade: C")
elif score >= 60 and score <= 69:
print("Letter Grade: D")
elif score >= 0 and score <= 59:
print("Letter Grade: F")
else:
print("Invalid Score")
maths = int(input("Maths Score: "))
english = int(input("English Score: "))
pe = int(input("PE Score: "))
science = int(input("Science Score: "))
arts = int(input("Arts Score: "))
lettergrade("Maths Class: ",maths)
lettergrade("English Class: ",english)
lettergrade("PE Class: ",pe)
lettergrade("Science Class: ",science)
lettergrade("Arts Class: ",arts)
Explanation:
The program makes the following assumptions:
Scores between 90–100 has letter grade A
Scores between 80–89 has letter grade B
Scores between 70–79 has letter grade C
Scores between 60–69 has letter grade D
Scores between 0–69 has letter grade E
Line by Line explanation
This line defines the lettergrade functions; with two parameters (One for subject or class and the other for the score)
def lettergrade(subject,score):
This line prints the the score obtained by the student in a class (e.g. Maths Class)
print(subject+": "+str(score))
The italicized determines the letter grade using if conditional statement
This checks if score is between 90 and 100 (inclusive); if yes, letter grade A is printed
if score >= 90 and score <= 100:
print("Letter Grade: A")
This checks if score is between 80 and 89 (inclusive); if yes, letter grade B is printed
elif score >= 80 and score <= 89:
print("Letter Grade: B")
This checks if score is between 70 and 79 (inclusive); if yes, letter grade C is printed
elif score >= 70 and score <= 79:
print("Letter Grade: C")
This checks if score is between 60 and 69 (inclusive); if yes, letter grade D is printed
elif score >= 60 and score <= 69:
print("Letter Grade: D")
This checks if score is between 0 and 59 (inclusive); if yes, letter grade F is printed
elif score >= 0 and score <= 59:
print("Letter Grade: F")
If input score is less than 0 or greater than 100, "Invalid Score" is printed
else:
print("Invalid Score")
This line prompts the user for score in Maths class
maths = int(input("Maths Score: "))
This line prompts the user for score in English class
english = int(input("English Score: "))
This line prompts the user for score in PE class
pe = int(input("PE Score: "))
This line prompts the user for score in Science class
science = int(input("Science Score: "))
This line prompts the user for score in Arts class
arts = int(input("Arts Score: "))
The next five statements is used to call the letter grade function for each class
lettergrade("Maths Class: ",maths)
lettergrade("English Class: ",english)
lettergrade("PE Class: ",pe)
lettergrade("Science Class: ",science)
lettergrade("Arts Class: ",arts)
All of the following are true about hacksaws except: a. A hacksaw only cuts on the forward stroke. b. A coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. c. A fine hacksaw blade (one with many teeth) is better for cutting sheet metal. d. A hacksaw blade is hardened in the center, so it is best to saw only with the center portion of the blade.
All of the following are true about hacksaws, except a coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. The correct option is b.
What is a hacksaw?A hacksaw is a saw with fine teeth that were originally and primarily used to cut metal. Typically, a bow saw is used to cut wood and is the corresponding saw.
Hacksaw is used by hand, it is a small tool for cutting pipes rods wood etc that is very common and homes and in shops. The different types of hacksaws. The main three types of hacksaws are course-grade hacksaws, medium-grade hacksaws, and fine-grade hacks. The difference is just for the quality, and the design of the blade.
Therefore, the correct option is b. Cutting thick steel is easier with a coarse hacksaw blade (one with fewer teeth) than a fine one.
To learn more about hacksaw, refer to the below link:
https://brainly.com/question/15611752
#SPJ2
Sarah's Texas location has a server that is starting to give her trouble. It is needing to be restarted frequently and seems to be very slow. The server is on the replacement schedule and has just overheated, stopped and will not restart. What plan should direct the recovery for this single server
Answer:
Hello your question lacks the required options
A) Business impact analysis plan
B) Business continuity plan
C) Disaster recovery plan
D) Recovery point plan
answer : Disaster recovery plan ( c )
Explanation:
The Disaster recovery plan is a comprehensive creation of a system/set procedures of recovery of the IT infrastructure from potential threats of a company. especially when the interruption is caused by a disaster, accident or an emergency.
The shutting down of the sever due to overheating and not able to restart for Business is an interruption in a critical business process and the plan to direct the recovery for this single server should be the " Disaster recovery plan"
Describe any five GSM PLMN basic services?
Answer:
Your answer can be found in the explanation below.
Explanation:
GSM is the abbreviation for Global System for Mobile communication. Its purpose is to transmit voice and data services over a range. It is a digital cellular technology.
PLMN is the abbreviation for Public Land Mobile network. It is defined as the wireless communication service or combination of services rendered by a telecommunication operator.
The plmn consists of technologies that range from Egde to 3G to 4G/LTE.
PLMN consists of different services to its mobile subscribers or users but for the purpose of this question, i will be pointing out just 5 of them alongside its definitions.
1. Emergency calls services to fire or police: Plmn provides us with the option to make emergency calls in the event of any accident or fire incident, etc.It is available on devices either when locked or unlocked.
2. Voice calls to/from other PLMN: This entails the putting of calls across to persons we cannot reach very quickly. PLMN helps to connect persons through its network of from other networks thus making communication easier.
3. Internet connectivity: PLMN provieds us with internet services through wifi or bundles that enable us have access to the internet as well as help us communicate with people and loved ones over a distance. Internet service are possble either on GPRS or 3G or 4G networks.
4. SMS service: SMS means short messaging service. This is also know as text messages. PLMN allows us to be able to send short messages to people as oppposed to mails. It is mostly instant and can be sent or recieved from the same PLMN or others.
5. MMS service: Multimedia messaging service whose short form is MMS ccan be descibed as the exchange of heavier messages such as a picture or music or document but not from an email. It is availabel for use from one PLMN to another.
Cheers.
House real estate summary Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value)) Ex: If the input is: 200000 210000 the output is: This house is $200000. The change is $-10000 since last month. The estimated monthly mortgage is $850.00.
Answer:
current_price = int(input("Enter the current price: "))
last_months_price = int(input("Enter the last month's price: "))
print("This house is $" + str(current_price))
print("The change is $" + str(current_price - last_months_price) + " since last month")
print("The estimated monthly mortgage is ${:.2f}".format((current_price * 0.051) / 12))
Explanation:
Ask the user to enter the current price and last month's price
Print the current price
Print the change in the price, subtract the last month's price from the current price
Print the estimated monthly mortgage, use the given formula to calculate, in required format
(Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds using the following header: def convertMillis(millis): The function returns a string as hours:minutes:seconds. For example, convertMillis(5500) returns the string 0:0:5, convertMillis(100000) returns the string 0:1:40, and convertMillis(555550000) returns the string 154:19:10. Write a test program that prompts the user to enter a value for milliseconds and displays a string in the format of hours:minutes:seconds. Sample Run Enter time in milliseconds: 555550000 154:19:10
Answer:
I am writing the Python program. Let me know if you want the program in some other programming language.
def convertMillis(millis): #function to convert milliseconds to hrs,mins,secs
remaining = millis # stores the value of millis to convert
hrs = 3600000 # milliseconds in hour
mins = 60000 # milliseconds in a minute
secs = 1000 #milliseconds in a second
hours =remaining / hrs #value of millis input by user divided by 360000
remaining %= hrs #mod of remaining by 3600000
minutes = remaining / mins # the value of remaining divided by 60000
remaining %= mins #mod of remaining by 60000
seconds = remaining / secs
#the value left in remaining variable is divided by 1000
remaining %= secs #mod of remaining by 1000
print ("%d:%d:%d" % (hours, minutes, seconds))
#displays hours mins and seconds with colons in between
def main(): #main function to get input from user and call convertMillis() to #convert the input to hours minutes and seconds
millis=input("Enter time in milliseconds ") #prompts user to enter time
millis = int(millis) #converts user input value to integer
convertMillis(millis) #calls function to convert input to hrs mins secs
main() #calls main() function
Explanation:
The program is well explained in the comments mentioned with each line of code. The program has two functions convertMillis(millis) which converts an input value in milliseconds to hours, minutes and seconds using the formula given in the program, and main() function that takes input value from user and calls convertMillis(millis) for the conversion of that input. The program along with its output is attached in screenshot.
The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network. a. user- or server-specific b. port- or program-specific c. role- or function-specific d. file or folder-specific
Answer:
c. role- or function-specific.
Explanation:
The Security Configuration Wizard was firstly used by Microsoft in its development of the Windows Server 2003 Service Pack 1. It provides guidance to network security administrators, secure domain controllers, firewall rules and reduce the attack surface on production servers.
Security Configuration Wizard saves any changes that are made as a role- or function-specific security policy which can be used as a baseline and applied to other servers in the network.
After checking the Group policy by an administrator, any changes made as a role- or function-specific security policy by the Security Configuration Wizard (SCW) is used as a baseline and can be applied either immediately or sometimes in the future to other servers in the network after testing it in a well secured environment.
Basically, the Microsoft Security Configuration Wizard (SCW) typically help administrators in running the following;
1. Role-Based Service Configuration.
2. Registry settings.
3. Network and Firewall Security settings.
4. Auditing Policy settings.
A software company assesses its developers more on their client support skills rather than their development skills. Which of the following terms would best describe the software company's performance management process?
A. Deficient
B. Contaminated
C. Unreliable
D. Inconsistent
E. Unspecified
Answer:
B. Contaminated
Explanation:
Based on the information provided regarding the scenario it seems that the software company's performance management process can be best described as contaminated. This occurs when the criterion of measurement for the employee performance includes aspects of performance that are not part of the job. Which in this case the main role of the employees is to apply their development skills in order to improve the software and not focus on their client support skills, but instead the "client support skills" is what the company is basing their performance review on.
Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as arguments. The function should determine and return the hypotenuse of the triangle. b. A main() function that should call right Triangle() correctly and display the value the function returns.
Answer:
The java program is as follows.
import java.lang.*;
public class Triangle
{
//variables to hold sides of a triangle
static double height;
static double base;
static double hypo;
//method to compute hypotenuse
static double rightTriangle(double h, double b)
{
return Math.sqrt(h*h + b*b);
}
public static void main(String[] args) {
height = 4;
base = 3;
hypo = rightTriangle(height, base);
System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);
}
}
OUTPUT
The hypotenuse of the right-angled triangle is 5.0000
Explanation:
1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.
2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.
3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.
4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().
5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.
6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.
7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.
8. In java, all the code is written inside a class.
9. The name of the program is same as the name of the class having the main() method.
10. The class having the main() method is declared public.
11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.
A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?
a. Establish a privileged interface group and apply read -write permission.to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work
Answer:
The correct option is (d) Use a service account and prohibit users from accessing this account for development work
Explanation:
Solution
As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:
By making use of a service account and forbids users from having this account for development work.
The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.
Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.
Many treadmills output the speed of the treadmill in miles per hour (mph) on the console, but most runners think of speed in terms of a pace. A common pace is the number of minutes and seconds per mile instead of mph. Write a program that starts with a quantity in mph and converts the quantity into minutes and seconds per mile. As an example, the proper output for an input of 6.5 mph should be 9 minutes and 13.8 seconds per mile. If you need to convert a double to an int, which will discard any value after the decimal point, then you may use intValue
Answer:
This question is answered using C++ programming language.
This program does not make use of comments; However, see explanation section for detailed line by line explanation.
The program starts here
#include <iostream>
using namespace std;
int main()
{
double quantity,seconds;
int minutes;
cout<<"Quantity (mph): ";
cin>>quantity;
minutes = int(60/quantity);
cout<<minutes<<" minutes and ";
seconds = (60/quantity - int(60/quantity))*60;
printf("%.1f", seconds);
cout<<" seconds per mile";
return 0;
}
Explanation:
The following line declares quantity, seconds as double datatype
double quantity,seconds;
The following line declares minutes as integer datatype
int minutes;
The following line prompts user for input in miles per hour
cout<<"Quantity (mph): ";
User input is obtained using the next line
cin>>quantity;
The next line gets the minute equivalent of user input by getting the integer division of 60 by quantity
minutes = int(60/quantity);
The next statement prints the calculated minute equivalent followed by the string " minuted and " without the quotes
cout<<minutes<<" minutes and ";
After the minutes has been calculated; the following statement gets the remainder part; which is the seconds
seconds = (60/quantity - int(60/quantity))*60;
The following statements rounds up seconds to 1 decimal place and prints its rounded value
printf("%.1f", seconds);
The following statement prints "seconds per mile" without the quotes
cout<<" seconds per mile";
Following are the program to the given question:
Program Explanation:
Defining the header file.Defining the main method.Inside the method, three double variables "mph, sec, and min_per_mile", and one integer variable "min" is defined. After defining a variable "mph" is defined that inputs value by user-end.After input value, "sec, min_per_mile, and min" is defined that calculates the value and prints its calculated value.Program:
#include<iostream>//header file
using namespace std;
int main()//defining main method
{
double mph,sec,min_per_mile;//defining a double variable
int min;//defining integer variable
cout<<"Enter the speed of the treadmill in mph:";//print message
cin>>mph;//input double value
min_per_mile=(1/mph)*60;//defining a double variable that calculates minutes per mile
min=static_cast<int>(min_per_mile);//defining int variable that converts min_per_mile value into integer
sec=(min_per_mile-min)*60;//defining double variable that calculates seconds per mile value
cout<<"A common pace is the "<<min<<" minutes and "<<sec<<" seconds per mile"<<endl;//print calculated value with message
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/21278031
What feature in the Windows file system allows users to see only files and folders in a File Explorer window or in a list of files from the dir command to which they have been given at least read permission?
Answer:
Access based enumeration
Explanation:
The access based enumeration is the feature which helps the file system to allow users for seeing the files and folders for which they have read access from the direct command.
Access based enumeration: This feature displays or shows only the folders and files that a user has permissions for.
If a user do not have permissions (Read) for a folder,Windows will then hide the folder from the user's view.
This feature only function when viewing files and folders are in a shared folder. it is not active when viewing folders and files in a local system.
Write a program that prompts the user to enter integers in the range 1 to 50 and counts the occurrences of each integer. The program should also prompt the user for the number of integers that will be entered. As an example, if the user enters 10 integers (10, 20, 10, 30, 40, 49, 20, 10, 25, 10), the program output would be:
Answer:
import java.util.Scanner; public class Main { public static void main(String[] args) { int num[] = new int[51]; Scanner input = new Scanner(System.in); System.out.print("Number of input: "); int limit = input.nextInt(); for(int i=0; i < limit; i++){ System.out.print("Input a number (1-50): "); int k = input.nextInt(); num[k]++; } for(int j=1; j < 51; j++){ if(num[j] > 0){ System.out.println("Number of occurrence of " + j + ": " + num[j]); } } } }Explanation:
The solution is written in Java.
Firstly, create an integer array with size 51. The array will have 51 items with initial value 0 each (Line 5).
Create a Scanner object and get user entry the number of input (Line 6-7).
Use the input number as the limit to control the number of the for loop iteration to repeatedly get integer input from user (Line 9-13). Whenever user input an integer, use that integer, k, as the index to address the corresponding items in the array and increment it by one (LINE 11-12).
At last, create another for loop to iterate through each item in the array and check if there is any item with value above zero (this means with occurrence at least one). If so, print the item value as number of occurrence (Line 14-17).
The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the network (how many bits/sec it can transport) and the latency (how many seconds it takes for the first bit to get from the client to the server). Give an example of a network that exhibits high bandwidth but also high latency. Also give an example of one that has both low bandwidth and low latency. Justify/explain your answers. (
Answer:
A bandwidth is the maximum rate of transfer of data across a given path
Latency refers to the delay of data to travel or move between a source and destination
An example of a high bandwidth and high latency network is the Satellite Internet connectivity.
An example of a low bandwidth and latency network is the telephone system connection.
Explanation:
Solution
Bandwidth: Bandwidth determines how fast data can be transferred for example, how many bits/sec it can transport.
Latency: It refers to the delay or how long it takes for data to travel between it's source and destination.
An example of a high bandwidth and high latency network is the Satellite internet connection.
Satellite internet connection: This is responsible for the connectivity of several systems, it has a high bandwidth, since satellite are in space, due to distance it has a high latency.
So, satellite internet connection is compensated with high latency and high bandwidth.
An example of a low bandwidth and low latency network is the Telephony network.
Telephone/telephony internet connection: This connection does not have much data for transfer. it has low size audio files of which a low bandwidth range. also for both end or end users to understand and talk to each other, it has low latency.
An example of a network that exhibits high bandwidth but also high latency is Satellite internet connection.
An example of one that has both low bandwidth and low latency is telephony internet connection.
Based on the provided information, we can say that Satellite internet connection posses high bandwidth but also high latency because, the fastness of data transfer is based on the bandwidth and how the data to travel between it's source and destination is based on its latency.
We can conclude that telephony internet connection has low bandwidth and low latency because of low data transfer is required.
Learn more about bandwidth at;
https://brainly.com/question/11408596
11.19 (Constructor Failure) Write a program that shows a constructor passing information about constructor failure to an exception handler. Define class SomeClass, which throws an Exception in the constructor. Your program should try to create an object of type SomeClass and catch the exception that’s thrown from the constructor
Answer:
You absolutely should throw an exception from a constructor if you're unable to create a valid object. This allows you to provide proper invariants in your class. ... Throw an exception if you're unable to initialize the object in the constructor, one example are illegal arguments.
Explanation:
Error codes cannot be used in constructors since they lack a return type. Therefore, throwing an exception is the most effective technique to indicate constructor failure. Here is a workaround if you don't have or are unwilling to use exceptions.
What constructor passing information, constructor failure?When an exception is thrown in a constructor, memory for the actual object has already been set aside before the constructor is even invoked. Therefore, after the exception is thrown, the compiler will immediately deallocate the memory the object was using.
There are two solutions to that: Simple and conventional approach: Use arrows. To make use of a two-stage construction, use a custom “construct” function after a default constructor that cannot throw exceptions.
Therefore, The constructor has the ability to “zombie” an object if it fails.
Learn more about Constructors here:
https://brainly.com/question/18914381
#SPJ5
Give an example of a function from N to N that is: Hint: try using absolute value, floor, or ceiling for part (b). (a) one-to-one but not onto (b) onto but not one-to-one (c) neither one-to-one nor onto
Answer:
Let f be a function
a) f(n) = n²
b) f(n) = n/2
c) f(n) = 0
Explanation:
a) f(n) = n²
This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.
Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:
f(a) = f(b) ⇒ a² = b² ⇒ a = b
The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number. For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.
b) f(n) = n/2
The above function example is an onto function because every natural number, let’s say n is a natural number that belongs to N, is the image of 2n. For example:
f(2n) = [2n/2] = n
The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:
When the value of n=1, then
n/2 = [1/2] = [0.5] = 1
When the value of n=2 then
n/2 = [2/2] = [1] = 1
c) f(n) = 0
The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image. The above function example is also not an onto function because every positive integer is not an image of any natural number.