Answer:
A. Containment
Explanation:
This Containment is important before an incident or damage to resources. Most events require control, so it is important when handling each event. Containment provides time to develop a solution strategy that is prevalent. Decisions Making decisions to facilitate an event is much easier if the decision is involved in predetermined strategies and processes. Organizations must define acceptable risks in dealing with events and develop strategies accordingly. Network prevention is a fast and powerful tool designed to give security administrators the power they need to detect and prevent threats.What are the characteristics of SAAS? (Choose all that apply) a. Services are usually available during specified time periods b. Software is installed remotely with no local involvement c. Little, if any, software is installed on the user’s computer d. Costs are calculated on a "use" basis e. User data is stored and isolated on central computers f. SAAS company often deploys an on sight employee to assist the client
Answer:
The correct options are, option D (Costs are calculated on a "use" basis), option C (Little, if any, software is installed on the user’s computer), option E (User data is stored and isolated on central computers).
Explanation:
SAAS which is also known as cloud-based software, stands for "Software as a service". SAAS is Use free client software available to clients over the Internet that can be accessed from anywhere, where clients only pay for what they used. SAAS which embraced the concept of cloud computing allows data to be accessed from any device with an internet connection and a web browser allowing software to be delivered by cloud.
Some characteristics of SAAS are: Cloud-based apps that are used over the Internet are managed from a central location, Costs are calculated as "pay for what you used" method.
The characteristics of SAAS that apply are;
C) Little, if any, software is installed on the user's computer
D) Costs are calculated on a "use" basis
E) User data is stored and isolated on central computers
SAAS is an acronym which means Software as a service. This is a software distribution model whereby a cloud provider will host applications and also make them to be very much available to end users over the internet.
Now, this SAAS model is also known as "on demand software" because it is licensed on a subscription basis and is also centrally hosted.
Further more, In SAAS model, an independent software vendor could contract hosting of the application to a third-party cloud provider.
Looking at the options, the only ones that apply to SAAS are options C, D and E.
Read more on SAAS at; https://brainly.com/question/25226343
3.26 LAB: Leap Year A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are: 1) The year must be divisible by 4 2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400 Some example leap years are 1600, 1712, and 2016. Write a program that takes in a year and determines whether that year is a leap year. Ex: If the input is: 1712 the output is: 1712 - leap year
Answer:
year = int(input("Enter a year: "))
if (year % 4) == 0:
if (year % 100) == 0:
if (year % 400) == 0:
print(str(year) + " - leap year")
else:
print(str(year) +" - not a leap year")
else:
print(str(year) + " - leap year")
else:
print(str(year) + "- not a leap year")
Explanation:
*The code is in Python.
Ask the user to enter a year
Check if the year mod 4 is 0 or not. If it is not 0, then the year is not a leap year. If it is 0 and if the year mod 100 is not 0, then the year is a leap year. If the year mod 100 is 0, also check if the year mod 400 is 0 or not. If it is 0, then the year is a leap year. Otherwise, the year is not a leap year.
Write code for iterative merge sort algorithm. It is also known as bottom-up merge sort. There should not be any recursive call for this approach. Include your code and screenshot of output with the answer. You can choose any programming language for this problem.
Answer:
Here is the C++ program:
#include <iostream> // for using input output functions
using namespace std; // to identify objects as cin cout
void merge(int array[], int left, int mid, int right);
// to merge the array into two parts i.e. from left to mid and mid+1 to right
int minimum(int a, int b) { return (a<b)? a :b; }
//to find the minimum of the 2 values
void IterativeMergeSort(int array[], int num) { //function to sort the array
int size; //determines current size of subarrays
int left; //to determine the start position of left subarray
//to merge the sub arrays using bottom up approach
for (size=1; size<=num-1; size = 2*size) {
//to select start position of different subarrays of current size
for (left=0; left<num-1; left += 2*size) {
// To determine the end point of left sub array and start position of right //which is mid+1
int mid = minimum(left + size - 1, num-1);
int right = minimum(left + 2*size - 1, num-1);
// Merge the sub arrays from left to mid and mid+1 to right
merge(array, left, mid, right); } } }
// function to merge the array into two parts i.e. from left to mid and mid+1 //to right
void merge(int array[], int left, int mid, int right){
int i, j, k; // variables to point to different indices of the array
int number1 = mid - left + 1;
int number2 = right - mid;
//creates two auxiliary arrays LEFT and RIGHT
int LEFT[number1], RIGHT[number2];
//copies this mid - left + 1 portion to LEFT array
for (i = 0; i < number1; i++)
LEFT[i] = array[left + i];
//copies this right - mid portion to RIGHT array
for (j = 0; j < number2; j++)
RIGHT[j] = array[mid + 1+ j];
i = 0;
j = 0;
k = left;
//merge the RIGHT and LEFT arrays back to array from left to right i.e //arr[left...right]
while (i < number1 && j < number2) {
if (LEFT[i] <= RIGHT[j])
/*checks if the element at i-th index of LEFT array is less than or equals to that of j-th index of RIGHT array */
{ array[k] = LEFT[i];
//if above condition is true then copies the k-th part of array[] to LEFT //temporary array
i++; }
else //when the above if condition is false
{ array[k] = RIGHT[j];
//moves k-th part of array[] to j-th position of RIGHT temporary array
j++; }
k++; }
while (i < number1) { //copies remaining elements of LEFT array
array[k] = LEFT[i];
i++;
k++; }
while (j < number2) { //copies remaining elements of RIGHT array
array[k] = RIGHT[j];
j++;
k++; } }
int main() {
int Array[] = {9, 18, 15, 6, 8, 3}; // an array to be sorted
int s = sizeof(Array)/sizeof(Array[0]);
//sizeof() is used to return size of array
cout<<"Input array: ";
int i;
for (i=0; i < s; i++) //to print the elements of given array
cout<<Array[i]<<" ";
cout<<endl;
IterativeMergeSort(Array, s); //calls IterativeMergeSort() function
cout<<"Sorted array after applying Iterative Merge Sort:"<<endl;
for (i=0; i < s; i++) //to print the elements of the sorted array
cout<<Array[i]<<" "; }
Explanation:
The program is well explained in the comments mentioned above with each line of the code. The screenshot of the program along with its output is attached.
1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web applications, before using that data. 2. Why should Web site operators that allow users to add content, for example forums or blogs, carefully and consistently patch and configure their systems
Answer:
1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses. Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.
Explanation:
2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.
What feature in the Windows file system allows users to see only files and folders in a File Explorer window or in a list of files from the dir command to which they have been given at least read permission?
Answer:
Access based enumeration
Explanation:
The access based enumeration is the feature which helps the file system to allow users for seeing the files and folders for which they have read access from the direct command.
Access based enumeration: This feature displays or shows only the folders and files that a user has permissions for.
If a user do not have permissions (Read) for a folder,Windows will then hide the folder from the user's view.
This feature only function when viewing files and folders are in a shared folder. it is not active when viewing folders and files in a local system.
Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their way into their master’s degree directly from undergraduate. If you have a 3.5 GPA and graduate from one of our majors, you can continue on and get your masters without having to do a lot of the paperwork. For simplification, we have four undergraduate degrees: CS, SWE, IT, and CGDD – and three masters programs: MSCS, MSSWE and MSIT. For this assignment, you’re going to ask the user a few questions and determine if they qualify for the FastTrack option.
Sample Output:
Major: Frogmongering
GPA: 3.9
Great GPA, but apply using the regular application.
Sample Output #2:
Major: SWE
GPA: 3.3
Correct major, but GPA needs to be higher.
Sample Output #3:
Major: IT
GPA: 3.5
You can FastTrack.
Sample Output #4:
Major: Study Studies
GPA: 0.4
Talk to one of our advisors about whether grad school is for you.
Answer:
The programming language is not stated. However, I'll answer this question using Python programming language.
The program uses no comments; find explanation below
i = 0
while not (i == 4):
print("Sample Run: #"+str(i+1))
Major = input("Major: ")
GPA = float(input("GPA: "))
if not (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):
if GPA >= 3.50:
print("Great GPA, but apply using the regular application")
else:
print("Talk to one of our advisors about whether grad school is for you")
if (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):
if GPA >= 3.50:
print("You can FastTrack.")
else:
print("Correct major, but GPA needs to be higher.")
i = i + 1
Explanation:
Line 1 of the program initializes the sample run to 0
Line 2 checks if sample run is up to 4;
If yes, the program stops execution else, it's continues execution on the next line
Line 3 displays the current sample run
Line 4 and 5 prompts user for Major and GPA respectively
Line 6 to 10 checks is major is not one of CS, SWE, IT, and CGDD.
If major is not one of those 4 and GPA is at least 3.5, the system displays "Great GPA, but apply using the regular application"
If major is not one of those 4 and GPA is less than 3.5, the system displays "Talk to one of our advisors about whether grad school is for you"
Line 11 to 15 checks is major is one of CS, SWE, IT, and CGDD.
If major is one of those 4 and GPA is at least 3.5, the system displays "You can Fastrack"
If major is one of those 4 and GPA is less than 3.5, the system displays "Correct major, but GPA needs to be higher."
The last line of the program iterates to the next sample run
A list based on a simple array (standard array implementation) is preferable to a dynamically allocated list for the following reasons.
A. Insertions and deletions require less work.
B. You are guaranteed a space to insert because it is already allocated.
C. You can take advantage of random-access typically.
D You can mix and match the types of the items on the list. E. (b) and (c).
F. All of the above.
Answer:
A. Insertions and deletions require less work.
C. You can take advantage of random access typically
D. You can mix and match the types of the items on the list.
Explanation:
Standard array implementation is a process in which number of items are of same type and index is restricted at a certain range. This is preferable to dynamic allocated list because it requires less work in insertion and deletions. A dynamically allocated array does not use the fixed array size declaration.
Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as arguments. The function should determine and return the hypotenuse of the triangle. b. A main() function that should call right Triangle() correctly and display the value the function returns.
Answer:
The java program is as follows.
import java.lang.*;
public class Triangle
{
//variables to hold sides of a triangle
static double height;
static double base;
static double hypo;
//method to compute hypotenuse
static double rightTriangle(double h, double b)
{
return Math.sqrt(h*h + b*b);
}
public static void main(String[] args) {
height = 4;
base = 3;
hypo = rightTriangle(height, base);
System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);
}
}
OUTPUT
The hypotenuse of the right-angled triangle is 5.0000
Explanation:
1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.
2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.
3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.
4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().
5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.
6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.
7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.
8. In java, all the code is written inside a class.
9. The name of the program is same as the name of the class having the main() method.
10. The class having the main() method is declared public.
11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.
Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates when "xxxxx" (five x characters) is read in. Other strings are ignored. After the loop, your code should print out 3 lines: the first consisting of the string "land:" followed by the number of "land" strings read in, the second consisting of the string "air:" followed by the number of "air" strings read in, and the third consisting of the string "water:" followed by the number of "water" strings read in. Each of these should be printed on a separate line. Use the up or down arrow keys to change the height.
Answer:
count_land = count_air = count_water = 0
while True:
s = input("Enter a string: ")
if s == "xxxxx":
break
else:
if s == "land":
count_land += 1
elif s == "air":
count_air += 1
elif s == "water":
count_water += 1
print("land: " + str(count_land))
print("air: " + str(count_air))
print("water: " + str(count_water))
Explanation:
*The code is in Python
Initialize the variables
Create a while loop that iterates until a specific condition is met. Inside the loop, ask the user to enter the string. If it is "xxxxx", stop the loop. Otherwise, check if it is "land", "air", or "water". If it is one of the given strings, increment its counter by 1
When the loop is done, print the number of strings entered in the required format
discuss 5 ways in which computer has influence typography and lettering
Answer:
Five ways in which computer has affected typography and lettering are discussed below;
1. Introduction of unconventional typeface: Computers have introduced unconventional typeface texts to typography and lettering by offering a wide range of typeface and fonts that the user can choose from, depending on the type of typing job at hand. Some of these fonts are suitable for aesthetic purpose, and some have official rating. These fonts and type faces range from the Times New Roman, Gothic, Serif, etc.
2. Size and legibility: Computers now allows different sizes of character sizes in typography. These sizes can be chosen easily to suite the degree of readability of the intended message.
3. Specialization: Computer has opened up typography and lettering to lay users and people not specialized in typography. Prior to the digital age, typing jobs were limited to specialist typists who have been trained in typography. Nowadays, anybody with access to a computer can easily learn solo, and be employed as a typist.
4. General layout: The arrangement and layout of text and lettering in typing can now be easily manipulated with a computer, by just selecting from a wide choice of arrangement available on the typing platform.
5. Minimization of errors: The use of computer in typography and lettering has greatly reduced the incidence and occurrence of error in typing. Most computers have built in prediction tools, and auto-correcting software that reduces and sometimes prevent grammatical and spelling errors.
The weekly pay for an employee is determined based on the following parameters:
Standard work hours by week is 40 hours.
Hourly pay rate is $10.00 per hour
Overtime hours are paid at time and a half the rate (that is $15.00 per hour).
Design and implement a program (name it WeeklyPay) that read number of hours worked per week (as integer value), prints out the entered hours, and then prints out the gross earning. Organized your output following these sample runs.
Sample run 1:
You entered 20 hours.
Gross earning is $200.0
Sample run 2:
You entered 40 hours.
Gross earning is $400.0
Sample run 3:
You entered 50 hours.
Gross earning is $550.0
Give an example of a function from N to N that is:______.
a) one-to-one but not onto
b) onto but not one-to-one
c) neither one-to-one nor onto
Answer:
Let f be a function
a) f(n) = n²
b) f(n) = n/2
c) f(n) = 0
Explanation:
a) f(n) = n²
This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.
Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:
f(a) = f(b) ⇒ a² = b² ⇒ a = b
The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number. For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.
b) f(n) = n/2
The above function example is an onto function because every natural number, lets say n is a natural number that belongs to N, is the image of 2n. For example:
f(2n) = [2n/2] = n
The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:
When the value of n=1, then
n/2 = [1/2] = [0.5] = 1
When the value of n=2 then
n/2 = [2/2] = [1] = 1
c) f(n) = 0
The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image. The above function example is also not an onto function because every positive integer is not an image of any natural number.
NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal IP addresses and provides some security neither allows a firm to have more internal IP addresses nor provides some security
Answer:
NAT provides some security but allows a firm to have more internal IP addresses
Explanation:
NAT ( network address translation) this is a process where a network system usually a firewall assigns a public IP address to an internal computer used in a private network. it limits the number of public IP address a company operating a private network for its computer can have and this is very economical also limits the exposure of the company's private network of computers. the computers can access information within the private network using multiple IP addresses but it is safer to access external information using one public IP address
A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?
a. Establish a privileged interface group and apply read -write permission.to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work
Answer:
The correct option is (d) Use a service account and prohibit users from accessing this account for development work
Explanation:
Solution
As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:
By making use of a service account and forbids users from having this account for development work.
The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.
Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.
The topic sentence states a: thesis statement,
paragraphs main idea,
supporting idea,
papers conclusion
The topic sentence states paragraphs main idea. Check more about sentence below.
What is the a topic sentence?A topic sentence is known to be one that tells the main point of any given paragraph.
It is said to be a supporting sentences that has the details and gives proof of one's point.
Therefore, The topic sentence states paragraphs main idea.
Learn more about topic sentence from
https://brainly.com/question/5526170
#SPJ1
Answer:
paragraph's main idea
Explanation:
1. Suppose you purchase a wireless router and connect it to your cable modem. Also suppose that your ISP dynamically assigns your connected device (that is, your wireless router) one IP address. In addition, suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. How are IP addresses assigned to the five PCs
Answer:
In this example, the wireless router uses NAT to allocate private IP addresses to five PC's and router interface, since only one IP address is assigned or given to the wireless router by the ISP.
Explanation:
Solution
The Dynamic Host Configuration Protocol server provides the IP addresses to clients, dynamically.
Generally a wireless router contains DHCP server. a wireless router can also assign IP addresses dynamically to its clients.
So, the wireless router assigns IP addresses to five PC's and the router interface dynamically using the DHCP.
It is stated that the Internet Service Provider (ISP) assigns only one IP address to the wireless router. Here there are five PC's and one router interface need to be allocated IP addresses.
In such cases the NAT (Network Address Translation)protocol is important and allows all the clients of the home network to sue a single internet connection (IP address) assigned or given by the ISP.
NAT permits the router to allocate the private IP addresses to client from the private IP address space reserved for the private networks. these private IP addresses are valid only in the home or local network .
In order to place something into a container you must:_______.
a. double-click on the container and type a command.
b. drag the container onto the materials or instruments shelf.
c. double-click on the material or the instrument.
d. click on the material or instrument and drag it onto the container.
Answer:
Option (d) is the correct answer to this question.
Explanation:
The container is a class, data structure, or abstract data type, the instances of which are compilations of many other particles. In several other words, they store objects in an ordered manner that meets strict rules about access. The reviewing information depends on the number of objects (elements) contained therein. To put any material or instrument in the container, it would be easy to select the material or instrument by clicking them and then dragging them onto the container. The other option won't be able to perform the required task.Other options are incorrect because they are not related to the given scenario.
Using Python I need to Prompt the user to enter in a numerical score for a Math Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a English Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a PE Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a Science Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for an Art Class. The numerical score should be between 0 and 100. Call the letter grade function 5 times (once for each class). Output the numerical score and the letter grade for each class.
Answer:
The program doesn't use comments; See explanation section for detailed line by line explanation
Program starts here
def lettergrade(subject,score):
print(subject+": "+str(score))
if score >= 90 and score <= 100:
print("Letter Grade: A")
elif score >= 80 and score <= 89:
print("Letter Grade: B")
elif score >= 70 and score <= 79:
print("Letter Grade: C")
elif score >= 60 and score <= 69:
print("Letter Grade: D")
elif score >= 0 and score <= 59:
print("Letter Grade: F")
else:
print("Invalid Score")
maths = int(input("Maths Score: "))
english = int(input("English Score: "))
pe = int(input("PE Score: "))
science = int(input("Science Score: "))
arts = int(input("Arts Score: "))
lettergrade("Maths Class: ",maths)
lettergrade("English Class: ",english)
lettergrade("PE Class: ",pe)
lettergrade("Science Class: ",science)
lettergrade("Arts Class: ",arts)
Explanation:
The program makes the following assumptions:
Scores between 90–100 has letter grade A
Scores between 80–89 has letter grade B
Scores between 70–79 has letter grade C
Scores between 60–69 has letter grade D
Scores between 0–69 has letter grade E
Line by Line explanation
This line defines the lettergrade functions; with two parameters (One for subject or class and the other for the score)
def lettergrade(subject,score):
This line prints the the score obtained by the student in a class (e.g. Maths Class)
print(subject+": "+str(score))
The italicized determines the letter grade using if conditional statement
This checks if score is between 90 and 100 (inclusive); if yes, letter grade A is printed
if score >= 90 and score <= 100:
print("Letter Grade: A")
This checks if score is between 80 and 89 (inclusive); if yes, letter grade B is printed
elif score >= 80 and score <= 89:
print("Letter Grade: B")
This checks if score is between 70 and 79 (inclusive); if yes, letter grade C is printed
elif score >= 70 and score <= 79:
print("Letter Grade: C")
This checks if score is between 60 and 69 (inclusive); if yes, letter grade D is printed
elif score >= 60 and score <= 69:
print("Letter Grade: D")
This checks if score is between 0 and 59 (inclusive); if yes, letter grade F is printed
elif score >= 0 and score <= 59:
print("Letter Grade: F")
If input score is less than 0 or greater than 100, "Invalid Score" is printed
else:
print("Invalid Score")
This line prompts the user for score in Maths class
maths = int(input("Maths Score: "))
This line prompts the user for score in English class
english = int(input("English Score: "))
This line prompts the user for score in PE class
pe = int(input("PE Score: "))
This line prompts the user for score in Science class
science = int(input("Science Score: "))
This line prompts the user for score in Arts class
arts = int(input("Arts Score: "))
The next five statements is used to call the letter grade function for each class
lettergrade("Maths Class: ",maths)
lettergrade("English Class: ",english)
lettergrade("PE Class: ",pe)
lettergrade("Science Class: ",science)
lettergrade("Arts Class: ",arts)
A company recently installed fingerprint scanners at all entrances to increase the facility’s security. The scanners were installed on Monday morning, and by the end of the week it was determined that 1.5% of valid users were denied entry. Which of the following measurements do these users fall under?
a. frr
b. far
c. cer
d. sla
Answer:
a. frr
Explanation:
False rejection rate is the rate which measure the incorrect rejection of access in the system. The scanners have rejected the access of 1.5% valid users. The entry was denied to the valid users which is considered as an attempt to unauthorized access to the scanner.
Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is either heads or tails. Assume the input is a value greater than 0.
Ex: If the input is 3, the output is:
tails
heads
heads
For reproducibility needed for auto-grading, seed the program with a value of 2. In a real program, you would seed with the current time. In that case, every program's output would be different, which is what is desired but can't be auto-graded.
Note: A common student mistake is to create an instance of Random before each call to rand.nextInt(). But seeding should only be done once, at the start of the program, after which rand.nextInt() can be called any number of times.
Your program must define and call the following method that returns "heads" or "tails".
public static String HeadsOrTails(Random rand)
Answer:
Here is the JAVA program:
import java.util.Scanner; // to get input from user
import java.util.Random; // to generate random numbers
public class CoinFlip {
// function for flipping a coin to make decisions
public static String HeadsOrTails(Random rand) {
//function to return head or tail
String flip; // string type variable flip to return one of the heads or tails
if ((rand.nextInt() % 2) == 0)
// if next random generated value's mod with 2 is equal to 0
{flip = "heads";} // sets the value of flip to heads
else // when the IF condition is false
{ flip = "tails";} // sets value of flip to tails
return flip; } //return the value of flip which is one of either heads or tails
public static void main(String[] args) { //start of main function body
Scanner rand= new Scanner(System.in); // creates Scanner instance
// creates random object and seeds the program with value of 2
Random no_gen = new Random(2);
int decision = rand.nextInt(); //calls nextInt() to take number of decisions
for (int i = 0; i < decision; i++) {
// produces heads or tails output for the number of decisions needed
System.out.println(HeadsOrTails(no_gen)); } } }
//prints heads or tails
Explanation:
The above program has method HeadsOrTails(Random rand) to return the heads or tails based on the condition if ((rand.nextInt() % 2) == 0) . Here nextInt() is obtains next random number from the sequence of random number generator and take the modulus of that integer value with 2. If the result of modulus is 0 then the value of flip is set to heads otherwise tails.
In the main() function, a random object is created and unique seed 2 is set. The decision variable gets the number of decisions. In the for loop the loop variable i is initialized to 0. The loop body continues to execute until the value of i exceeds the number of decisions needed. The loop body calls the HeadsOrTails(Random rand) method in order to output either heads or tails.
The program and output is attached in a screenshot.
Use an Excel function to find: Note: No need to use Excel TABLES to answer these questions! 6. The average viewer rating of all shows watched. 7. Out of all of the shows watched, what is the earliest airing year
Answer:
Use the average function for viewer ratings
Use the min function for the earliest airing year
Explanation:
The average function gives the minimum value in a set of data
The min function gives the lowest value in a set of data
Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then convert the temperature to Fahrenheit and display it to the screen. Finally, it should convert the Fahrenheit temperature to Kelvin and display that to the screen.
Answer:
c = float(input("Enter the temperature in Celsius: "))
f = c * 1.8 + 32
print("The temperature in Fahrenheit: " + str(f))
k = (f - 32) / 1.8 + 273.15
print("The temperature in Kelvin: " + str(k))
Explanation:
*The code is in Python.
Ask the user to enter the temperature in Celsius
Convert the Celsius to Fahrenheit using the conversion formula and print it
Convert the Fahrenheit to Kelvin using the conversion formula and print it
Who do you think larger or smaller clients will benefit most from MasterCard’s analytics tools? Why?
Answer:The key to analytics success is not about searching for answers, ... If you are trying to determine where to find new customers, there is a recipe for how to do that, and it ... As we work with small businesses, we help them answer their big ... Moving forward, there is going to be a lot more data of varying types.
Explanation:
You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on your validation set, but good performance on your training set. Your implementation has no bugs. Define various reasons that could be causing the problem?
Answer:
The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data
Explanation:
Solution
The various reasons that could be causing the problem is given as follows :
1. A wide number of parameters :
In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers. When the training is performed in this tree, then the model files the data too well. When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.2. Noisy Data:
The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values. When the tree is trained on this noisy data, then it sets its parameters according to the training data. As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.
Design and implement a program (name it GradeReport) that uses a switch statement to print out a message that reflect the student grade on a test. The messages are as follows:
For a grade of 100 or higher, the message is ("That grade is a perfect score. Well done.")
For a grade 90 to 99, the message is ("That grade is well above average. Excellent work.")
For a grade 80 to 89, the message is ("That grade is above average. Nice job.")
For a grade 70 to 79, the message is ("That grade is average work.")
For a grade 60 to 69, the message is ("That grade is not good, you should seek help!")
For a grade below 60, the message is ("That grade is not passing.")
Answer:
#include <iostream>
using namespace std;
int main()
{
int grade;
cout << "Enter student's grade: ";
cin >> grade;
switch (grade)
{
case 100 ... 1000:
cout << "That grade is a perfect score. Well done.";
break;
case 90 ... 99:
cout << "That grade is well above average. Excellent work.";
break;
case 80 ... 89:
cout << "That grade is above average. Nice job.";
break;
case 70 ... 79:
cout << "That grade is average work.";
break;
case 60 ... 69:
cout << "That grade is not good, you should seek help!";
break;
default:
cout << "That grade is not passing.";
break;
}
return 0;
}
Explanation:
*The code is in C++
First, ask the user to enter a grade
Then, check the grade to print the correct message. Since you need to check the ranges using switch statement, you need to write the minimum value, maximum value and three dots between them. For example, 70 ... 79 corresponds the range between 70 and 79 both inclusive.
Finally, print the appropriate message for each range.
Note: I assumed the maximum grade is 1000, which should more than enough for a maximum grade value, for the first case.
1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2. (1 point) Which flag is set when the result of a signed arithmetic operation is either too large or too small to fit into the destination? 3. (1 point) Which flag is set when an arithmetic or logical operation generates a negative result?
Answer:
(1) Carry flag (2) Overflow flag (3) Sign or negative Flag
Explanation:
Solution
(1) The carry flag : It refers to the adding or subtracting. a two registers has a borrow or carry bit
(2) The over flow flag: This flag specify that a sign bit has been modified during subtracting or adding of operations
(3) The sign flag: This is also called a negative sign flag is a single bit status in a register that specify whether the last mathematical operations generated a value to know if the most significant bit was set.
A software company assesses its developers more on their client support skills rather than their development skills. Which of the following terms would best describe the software company's performance management process?
A. Deficient
B. Contaminated
C. Unreliable
D. Inconsistent
E. Unspecified
Answer:
B. Contaminated
Explanation:
Based on the information provided regarding the scenario it seems that the software company's performance management process can be best described as contaminated. This occurs when the criterion of measurement for the employee performance includes aspects of performance that are not part of the job. Which in this case the main role of the employees is to apply their development skills in order to improve the software and not focus on their client support skills, but instead the "client support skills" is what the company is basing their performance review on.
public class Car {
public void m1() {
System.out.println("car 1");
}
â
public void m2() {
System.out.println("car 2");
}
â
public String toString() {
return "vroom";
}
}
public class Truck extends Car {
public void m1() {
System.out.println("truck 1");
}
}
And assuming that the following variables have been declared:
Car mycar = new Car();
Truck mytruck = new Truck();
What is the output from the following statements?
a. Sound F/X System.out.println(mycar);
b. mycar.m1();
c. mycar.m2();
d. System.out.println(mytruck);
e. mytruck.m1();
f. mytruck.m2();
Answer:
The Following are the outputs:
a. vroom
b. car 1
c. car 2
d. vroom
e. truck 1
f. car 2
Explanation:
The first statement System.out.println(mycar); prints an instance of the Car object my car which calls the toString() method.
The second statement mycar.m1(); Calls the method m1() which prints car1
The third statement mycar.m2(); calls the method m2() which prints car2
Then another class is created Truck, and Truck inherits all the methods of Car since it extends Car. Truck has a method m1() which will override the inherited method m1() from the Car class.
The fourth statement System.out.println(mytruck); will print print vroom just as the first statement since it inherits that method toString()
The fifth statement calls m1() in the Truck class hence prints Truck 1
Finally the sixth statement will print car 2 because it also inherited that method and didnt overide it.
Write a program that calculates and prints the average of several integers. Assume the last value read with scanf is the sentinel 9999. A typical input sequence might be 10 8 11 7 9 9999
Answer:
Following are the program in C programming language
#include<stdio.h> // header file
int main() // main function
{
int n1;// variable declaration
int c=0; // variable declaration
float sum=0; // variable declaration
float avg1;
printf("Enter Numbers :\n");
while(1) // iterating the loop
{
scanf("%d",&n1); // Read the value by user
if(n1==9999) // check condition
break; // break the loop
else
sum=sum+n1; // calculating sum
c++; // increment the value of c
}
avg1=sum/c;
printf("Average= %f",avg1);
return 0;
}
Output:
Enter Numbers:
10
8
11
7
9
9999
Average= 9.000000
Explanation:
Following are the description of program
Declared a variable "n1" as int type Read the value by the user in the "n1" variable by using scanf statement in the while loop .The while loop is iterated infinite time until user not entered the 9999 number .if user enter 9999 it break the loop otherwise it taking the input from the user .We calculating the sum in the "sum " variable .avg1 variable is used for calculating the average .Finally we print the value of average .The program takes in several value numeric values until 9999 is inputed, the program calculates the average of these values. The program is written in python 3 thus :
n = 0
#initialize the value of n to 0
cnt = 0
#initialize number of counts to 0
sum = 0
#initialize sum of values to 0
while n < 9999 :
#set a condition which breaks the program when 9999 is inputed
n = eval(input('Enter a value : '))
#accepts user inputs
cnt += 1
#increases the number of counts
sum+=n
#takes the Cummulative sum
print(sum/cnt)
#display the average.
A sample run of the program is attached.
Learn more : https://brainly.com/question/14506469
State all the generations of computers.
Answer:
1 1st generation =vacuum tube based
2 nd generation =transistor based
3 rd generation intergrated circuit based
4rd generation =vlsi microprocessor based
5th generation =ulsi microprocessor based
Answer:
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...
1956 – 1963: Second Generation – Transistors. ...
1964 – 1971: Third Generation – Integrated Circuits. ...
1972 – 2010: Fourth Generation – Microprocessors.
Explanation: