An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the organization has installed crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, which of the following would be the NEXT step?

a. Remove the affected servers from the network.
b. Review firewall and IDS logs to identify possible source IPs.
c. Identify and apply any missing operating system and software patches
d. Delete the malicious software and determine if the servers must be reimaged

Answers

Answer 1

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization.


Related Questions

Write a date transformer program using an if/elif/else statement to transform a numeric date in month/day format to an expanded US English form and an international Spanish form; for example, 2/14 would be converted to February 14 and 14 febrero

Answers

I wrote it in Python because it was quick so i hope this is helpful

Answer:

date = input('Enter Date: ')

split_date = date.split('/')

month = split_date[0]

day = split_date[1]

if month == '1':

   english_month = 'January'

   spanish_month = 'Enero'

elif month == '2':

   english_month = 'February'

   spanish_month = 'Febrero'

elif month == '3':

   english_month = 'March'

   spanish_month = 'Marzo'

elif month == '4':

   english_month = 'April'

   spanish_month = 'Abril'

elif month == '5':

   english_month = 'May'

   spanish_month = 'Mayo'

elif month == '6':

   english_month = 'June'

   spanish_month = 'Junio'

elif month == '7':

   english_month = 'July'

   spanish_month = 'Julio'

elif month == '8':

   english_month = 'August'

   spanish_month = 'Agosto'

elif month == '9':

   english_month = 'September'

   spanish_month = 'Septiembre'

elif month == '10':

   english_month = 'October'

   spanish_month = 'Octubre'

elif month == '11':

   english_month = 'November'

   spanish_month = 'Noviembre'

elif month == '12':

   english_month = 'December'

   spanish_month = 'Diciembre'

US_English = f'{english_month} {day}'

International_Spanish = f'{day} {spanish_month}'

print(f'US English Form: {US_English}')

print(f'International Spanish Form: {International_Spanish}')

Input:

3/5

Output:

US English Form: March 5

International Spanish Form: 5 Marzo

Explanation:

You start by taking input from the user then splitting that at the '/' so that we have the date and the month in separate variables. Then we have an if statement checking to see what month is given and when the month is detected it sets a Spanish variable and an English variable then prints it to the screen.

Hope this helps.

Write a Java application with a main() to find the two largest distinct integers entered on the command line by the user. We are just creating a simple stand-alone application. All your code can be in main().

Answers

Answer:

import java.util.Scanner; // Scanner class is to use input output functions

public class TwoDistinctLargest //class to find two distinct largest nos

{

public static void main(String[] args) { //start of main() function

Scanner input = new Scanner(System.in); // creates Scanner type object

       int integers = 0, largest1 = 0, largest2 = 0; // declare variables

/* integers holds the input integer values, largest1 has 1st largest number and largest 2 contains second distinct largest number, i is used as the count variable to move through the input integers */

       int i = 0;  

//prompts user to enter integers and enter 0 to stop

       System.out.println("Enter the integers (press 0 to stop): ");

       integers = input.nextInt(); //reads and scans input integers

       while(integers != 0) {

/* the loop keeps taking integer values from user until the value of integers is equal to 0, this means until the user enters 0 */

//checks if the value of integer is greater than first largest computed number

           if(integers > largest1) {

//if the value in largest1 is greater than that of largest2

               if(largest1 > largest2) {

                   largest2 = largest1; } // then value of largest1 is set to largest2                

               largest1 = integers; // largest1 now holds the value of integers //which means largest1 holds the first distinct largest integer

           } else { //checks if the value of integers is greater than largest2

               if(integers > largest2) {

//if the value of integers is not equal to that of largest1

                   if(integers!=largest1)  {

// set the value of second distinct largest number to largest2

                   largest2 = integers;}              }            }

                     i++; //keeps moving to the next input integer

           integers = input.nextInt();     //keeps taking input integers    }      

//prints the two distinct largest integers

       System.out.println("\n The 1st largest distinct integer is " + largest1);

       System.out.println("\n The 2nd largest distinct integer is " + largest2); } }

Explanation:

Lets suppose the user inputs the following integers

1, 6, 5, 6, 0

Initial values are:

integers = 0

largest1 = 0

largest2 = 0

i = 0

When the user enters 1, then value of integers = 1

while loop checks if integers!=0. As integers =1 so the program enters the body of while loop. The first IF condition is checked if(integers > largest1)

As largest1 = 0 and integers =1 so this condition evaluates to true as 1 > 0

So the statements in the body of this IF condition are executed. This if conditions contains another if statement if(largest1 > largest2) which checks if the value largest1 is greater than that of largest2. Its false because largest1 =0 and largest2 =0 so largest1 = largest2, so the statement of this if condition body will not execute and program moves to this                 largest1 = integers; statement which sets the value of integers i.e. 1 to largest1. So the value of largest1 = 1

Now the i is incremented by 1 and it points at second value of integers= 6.

while loop checks if integers!=0. As integers =6 so the program enters the body of while loop. The first IF condition is checked if(integers > largest1)

As largest1 = 1 and integers =6 so this condition evaluates to true as 6>1

So the statements in the body of this IF condition are executed. This if conditions contains another if statement if(largest1 > largest2) which checks if the value largest1 is greater than that of largest2.

Its true because largest1 =1 and largest2 =0 so largest1 > largest2, so the next statement is executed largest2 = largest1; So now the value of largest2=1.

Now program moves to this largest1 = integers; statement which sets the value of integers i.e. 6 to largest1. So the value of largest1 = 6

Now the i is incremented by 1 and it points at second value of integers= 5.

while loop condition is again true. IF condition is checked if(integers > largest1)

As largest1 = 6 and integers =5 so this condition evaluates to false as 5<6. So this IF part will not execute and program control moves to the else part.

Else part has an if condition if(integers > largest2) which evaluates to true because integers = 5 and largest2 = 1 so the program moves to next if statement inside the previous if statement of else part i.e. if(integers!=largest1). This if statement is the main statement which will help in finding two distinct largest numbers in case the same largest value is input more than once. It checks If the value of integers is not equal to largest1 value. As integers = 5 and  largest1 = 6 so this if condition is true. If this condition is not used in this program then largest2 will not be assigned distinct largest values but assigned 6 for both largest1 and largest2 as 6 is input twice. Next this if statement  largest2 = integers assigns value of integers to largest2 which is the second largest distinct integer.

Now the i is incremented by 1 integers value become 0.

while loop checks if integers!=0. As integers =0 so the while loop breaks. The last two print statements which produce following output.

The 1st largest distinct integer is: 6

The 2nd largest distinct integer is: 5

The best way to avoid driving impaired is to...
A. avoid drinking.
B. stay under the legal BAC limit.
C. keep a taxi fare on hand.

Answers

Answer:

the answer is A avoid drinking 10 Tips to Avoid Driving Drunk

Explanation:

Give someone your keys. Find someone trustworthy who isn't drinking and hand over your keys for the night. ...

Don't drink on an empty stomach. ...

Know your body and pace yourself. ...

Take public transit. ...

Spend the night. ...

Wait an hour or two. ...

Stop drinking 90 minutes before you plan to leave. ...

Take the night off from drinking. hope this helps you :)

What happens to weather patterns when a cold front approaches? What happens to
weather patterns when a warm front approaches?

Answers

Answer:

The overview including its problem is listed in the explanation segment following.

Explanation:

The cool, unobstructed front develops whenever the cool front overwhelms the warm side or front. The warm front increases over its colder, then gradually move towards the surface of the earth.

The subsequent weather system seems to be close to something like a moving warmer front.

So that the above seems to be the right answer.

Write a program that first reads in the name of an input file and then reads the file using the csv.reader() method. The file contains a list of words separated by commas. Your program should output the words and their frequencies (the number of times each word appears in the file) without any duplicates.

Answers

Answer:

Here is the Python code.

import csv  

inputfile = input("Enter name of the file: ")

count = {}

with open(inputfile, 'r') as csvfile:

 csvfile = csv.reader(csvfile)

 for line in csvfile:

   for words in line:

     if words not in count.keys():

       count[words] = 1

     else:

         count[words] + 1

   print(count)

Explanation:

I will explain the code line by line.

import csv   here the css is imported in order to read the file using csv.reader() method

inputfile = input("Enter name of the file: ")  This statement takes the name of the input file from the user

count = {}  this is basically a dictionary which will store the words in the file and the number of times each word appears in the file.

with open(inputfile, 'r') as csvfile:  This statement opens the inputfile using open() method in read mode. This basically opens the input file as csv type

 csvfile = csv.reader(csvfile)  This statement uses csv.reader() method to read the csv file contents.

for line in csvfile:  This outer for loop iterates through each line of the file

for words in line:  This inner loop iterates through each word in the line

if words not in count.keys():  This if condition checks if the word is not in the dictionary already. The dictionary holds key value pair and keys() method returns a list of all the keys of dictionary

count[words] = 1  if the word is not present already then assign 1 to the count dictionary

co unt[words] + 1 if the word is already present in dictionary increment count of the words by 1. Suppose the input file contains the following words:

hello,cat,man,hey,dog,boy,Hello,man,cat,woman,dog,Cat,hey,boy

Then because of co unt[words] + 1 statement if the word appears more than once in the file, then it will not be counted. So the output will be:

{' cat': 1, ' man': 1, ' dog': 1, ' woman': 1, ' Hello': 1, ' hey': 1, ' boy': 1, 'hello': 1, ' Cat': 1}

But if you want the program to count those words also in the file that appear more than once, then change this co unt[words] + 1 statement to:  

count[words] = count[words] + 1

So if the word is already present in the file its frequency is increased by 1 by incrementing 1 to the count[words]. This will produce the following output:

{' Cat': 1, ' cat': 2, ' boy': 2, ' woman': 1, ' dog': 2, ' hey': 2, ' man': 2, ' Hello': 1, 'hello': 1}  

You can see that cat, boy, dog and hey appear twice in the file.                    

print(count) This statement prints the dictionary contents with words and their frequencies.

The program with its output is attached.

The program is an illustration of file manipulations.

File manipulations involve reading from and writing into files.

The program in Python, where comments are used to explain each line is as follows:

#This imports csv module

import csv  

#This initializes a dictionary

kounter = {}

#This gets input for the file name

fname = input("Filename: ")

#This opens and iterates through the file

with open(fname, 'r') as cfile:

   #This reads the csv file

   cfile = csv.reader(cfile)

   #This iterates through each line

   for line in cfile:

       #This iterates through each word on each line

       for words in line:

           #This counts the occurrence of each word

           if words not in kounter.keys():

               kounter[words] = 1

           else:

               kounter[words] + 1

#This prints the occurrence of each word

print(kounter)

Read more about similar programs at:

https://brainly.com/question/14468239

Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:42 seconds#include void PrintPopcornTime(int bagOunces) {}int main(void) {int userOunces;scanf("%d", &userOunces);PrintPopcornTime(userOunces);return 0;}2. Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline. Example output with input 2:1: Lather and rinse.2: Lather and rinse.Done. Hint: Declare and use a loop variable.#include /* Your solution goes here */int main(void) {int userCycles;scanf("%d", &userCycles);PrintShampooInstructions(userCycles);return 0;}

Answers

Answer:

Function 1:

#include <stdio.h> //for using input output functions

// start of the function PrintPopcornTime body having integer variable //bagOunces as parameter

void PrintPopcornTime(int bagOunces){

if (bagOunces < 3){ //if value of bagOunces is less than 3

 printf("Too small"); //displays Too small message in output

 printf("\n"); } //prints a new line

//the following else if part will execute when the above IF condition evaluates to //false and the value of bagOunces is greater than 10

else if (bagOunces > 10){

    printf("Too large"); //displays the message:  Too large in output

    printf("\n"); //prints a new line }

/*the following else  part will execute when the above If and else if conditions evaluate to false and the value of bagOunces is neither less than 3 nor greater than 10 */

else {

/* The following three commented statements can be used to store the value of bagOunces * 6 into result variable and then print statement to print the value of result. The other option is to use one print statement printf("%d",bagOunces * 6) instead */

    //int result;

    //result = bagOunces * 6;

    //printf("%d",result);

 printf("%d",bagOunces * 6);  /multiplies value of bagOunces  to 6

 printf(" seconds");

// seconds is followed with the value of bagOunces * 6

 printf("\n"); }} //prints a new line

int main(){ //start of main() function body

int userOunces; //declares integer variable userOunces

scanf("%d", &userOunces); //reads input value of userOunces

PrintPopcornTime(userOunces);

//calls PrintPopcornTime function passing the value in userOunces

return 0; }

Explanation:

Function 2:  

#include <stdio.h> //header file to use input output functions

// start of the function PrintShampooInstructions body having integer variable numCycles as parameter

void PrintShampooInstructions(int numCycles){

if(numCycles < 1){

//if conditions checks value of numCycles is less than 1 or not

printf("Too few."); //prints Too few in output if the above condition is true

printf("\n"); } //prints a new line

//else if part is executed when the if condition is false and else if  checks //value of numCycles is greater than 4 or not

else if(numCycles > 4){

//prints Too many in output if the above condition is true

printf("Too many.");

printf("\n"); } //prints a new line

//else part is executed when the if and else if conditions are false

else{

//prints "N: Lather and rinse." numCycles times, where N is the cycle //number, followed by Done

for(int N = 1; N <= numCycles; N++){

printf("%d",N);

printf(": Lather and rinse. \n");}

printf("Done.");

printf("\n");} }

int main() //start of the main() function body

{    int userCycles; //declares integer variable userCycles

   scanf("%d", &userCycles); //reads the input value into userCycles

   PrintShampooInstructions(userCycles);

//calls PrintShampooInstructions function passing the value in userCycles

   return 0;}

I will explain the for loop used in PrintShampooInstructions() function. The loop has a variableN  which is initialized to 1. The loop checks if the value of N is less than or equal to the value of numCycles. Lets say the value of numCycles = 2. So the condition evaluates to true as N<numCycles  which means 1<2. So the program control enters the body of loop. The loop body has following statements. printf("%d",N); prints the value of N followed by

printf(": Lather and rinse. \n"); which is followed by printf("Done.");

So at first iteration:

printf("%d",N); prints 1 as the value of N is 1

printf(": Lather and rinse. \n");  prints : Lather and rinse and prints a new line \n.

As a whole this line is printed on the screen:

1: Lather and rinse.

Then the value of N is incremented by 1. So N becomes 2 i.e. N = 2.

Now at second iteration:

The loop checks if the value of N is less than or equal to the value of numCycles. We know that the value of numCycles = 2. So the condition evaluates to true as N<numCycles  which means 2=2. So the program control enters the body of loop.

printf("Done."); prints Done after the above two lines.

printf("%d",N); prints 2 as the value of N is 2

printf(": Lather and rinse. \n");  prints : Lather and rinse and prints a new line \n.

As a whole this line is printed on the screen:

2: Lather and rinse.

Then the value of N is incremented by 1. So N becomes 2 i.e. N = 3.

The loop again checks if the value of N is less than or equal to the value of numCycles. We know that the value of numCycles = 2. So the condition evaluates to false as N<numCycles  which means 3>2. So the loop breaks.

Now the next statement is:

printf("Done."); which prints Done on the screen.

So as a whole the following output is displayed on the screen:

1: Lather and rinse.

2: Lather and rinse.

Done.

The programs along with their outputs are attached.

Your on-premises hosted application uses Oracle database server. Your database administrator must have access to the database server for managing the application. Your database server is sized for seasonal peak workloads, which results in high licensing costs. You want to move your application to Oracle Cloud Infrastructure (OCI) to take advantage of CPU scaling options. Which database offering on OCI would you select?

Answers

Answer:

Bare metal DB systems

Explanation:

Oracle Call Interface OCI is comprehensive system which is native C language interface to Oracle Database for custom applications. The bare metal database system requires more compute node processing power. Customers are not given OS logons or SYSDBA in Oracle autonomous applications which prevents phishing attacks.

What is computer engineering in your own words?

Answers

Answer: Computer engineering refers to the study that integrates digital engineering with computer sciences to design and develop computer structures and different technological gadgets.

Explanation:

Answer:

Computer engineering is the branch of engineering that integrates electronic engineering with computer sciences. Computer engineers design and develop computer systems and other technological devices.

A script sets up user accounts and installs software for a machine. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

deployment phase

Explanation:

This specific scenario belongs to the deployment phase of the hardware lifecycle. This phase is described as when the purchased hardware and software devices are deployed to the end-user, and systems implemented to define asset relationships. Meaning that everything is installed and set up for the end-user to be able to use it correctly.

Write a method named isPalindrome that accepts a string parameter and returns true if that string is a palindrome, or false if it is not a palindrome. For this problem, a palindrome is defined as a string that contains exactly the same sequence of characters forwards as backwards, case-insensitively. For example, "madam" or "racecar" are palindromes, so the call of isPalindrome("racecar") would return true. Spaces, punctuation, and any other characters should be treated the same as letters; so a multi-word string such as "dog god" could be a palindrome, as could a gibberish string such as "123 $$ 321". The empty string and all one-character strings are palindromes by our definition. Your code should ignore case, so a string like "Madam" or "RACEcar" would also count as palindromes.

Answers

Answer:

The programming language is not stated;

However, I'll answer this question using Java Programming Language;

The method is as follows;

   public static void isPalindrome(String userinput)

    {

       String reverse = "";

       int lent = userinput.length();

int j = lent - 1;

while(j >= 0)

       {

           reverse = reverse + userinput.charAt(j);

           j--;

       }

       if(reverse.equalsIgnoreCase(userinput))

       {

           System.out.println("True");

       }

       else

       {

           System.out.println("False");

       }    

    }

Explanation:

This line defines the method isPalindrome with a string parameter userinput

public static void isPalindrome(String userinput) {

This line initializes a string variable

       String reverse = "";

This line gets the length of the userinput

       int len = userinput.length();

The following while-loop gets the reverse of userinput and saved the reversed string in reverse

int j = lent - 1;

while(j >= 0)

       {

           reverse = reverse + userinput.charAt(j);

           j--;

       }

The following if statement checks if userinput and reverse are equal (cases are ignored)

       if(reverse.equalsIgnoreCase(userinput))

       {

           System.out.println("True"); This line is executed if the if condition is true

       }

       else

       {

           System.out.println("False"); This line is executed if otherwise

       }  

    } The method ends here

The technology environment would include studies of family changes. social engineering. information technology. minimum wage laws. customer service.

Answers

Question:

The technology environment would include studies of:

A) family changes

B) social engineering

C) information technology

D) minimum wage laws

E) customer service

Answer:

The correct answer is Information Technology (C)

Explanation:

Information and communications technology (ICT) or Information Technology. Whenever the technology environment is under discourse, these are usually the predominant subject matter.

It doesn't come as a surprise given that we live in an information age. An era of the internet of things. If we are tending towards an era where every equipment and even most biological species will give off and receive data, then a technology environment is really predominantly IT.

Cheers!

Because Java byte code is the same on all computers, compiled Java programs Group of answer choices Cannot run on Linux systems Must be re-compiled for each different machine it is run on Are highly portable Are non-existent

Answers

Answer:

Are highly portable.

Explanation:

Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995.

Java was designed by a software engineer called James Gosling and it is originally owned by Oracle. Also, worthy of mention is the fact that Java was originally known as Oak.

Generally, Java as a software application usually are developed having a ".jar", ".class" or ".java" filename extensions.

Because Java byte code is the same on all computers, compiled Java programs are highly portable. This simply means that, the Java byte code was designed such that it has very few implementation dependency, thus, once the code is written, it can run on all computer platforms that supports the Java programming language.

Hence, the Java byte code is a write once, run anywhere software program.

The Java byte code instructions are read and executed by a computer program known as a Java Virtual Machine (JVM).

Additionally, Java program is used for developing varieties of applications such as, mobile, desktop, games, web and application servers etc.

A network technician is designing a network for a small company. The network technician needs to implement an email server and web server that will be accessed by both internal employees and external customers. Which of the following would BEST secure the internal network and allow access to the needed servers?
A. Implementing a site-to-site VPN for server access.
B. Implementing a DMZ segment for the server
C. Implementing NAT addressing for the servers
D. Implementing a sandbox to contain the servers

Answers

Answer:

(B) Implementing a DMZ segment for the servers

Explanation:

DMZ is the short form for Demilitarized Zone. It is the temporary storage between an internal or private LAN and the public Internet. The main purpose of the DMZ is to give additional layer of security to a company's LAN (Local Area Network).

Once there are services to be provided to users on the public Internet, such services should be added to the DMZ. A few services that are worth implementing a DMZ segment for are;

i. Email servers

ii. Web servers

iii. Proxy servers

iv. FTP servers

a. A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2, 048 sectors and there are 131, 072 (2^17) tracks per surface. A block holds 512 bytes. The disk is not "zoned." What is the total capacity of this disk?

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (That, is, what is the capacity of one cylinder?)

Answers

Answer:

Explanation:

Given that:

number of surfaces on a hard disk = 4

number of sectors = 2048 sectors

number of tracks per surface = 131, 072 (2^17)

a block holds 512 bytes.

Since, 'The disk is not "zoned.".....

then, Number of bytes / sector = 512

a) What is the total capacity of this disk?

The total capacity of the disk is:[tex]= 4 \ surfaces \times 131072 \dfrac{tracks}{surfaces} \times 2048 \dfrac{sector}{tracks} \times 512 \dfrac{bytes}{sector}[/tex]

[tex]= 5.49755814\times 10^{11} \ bytes[/tex]

= 549755814 KB ( kilobytes)

= 549755.814 MB (megabytes)

=549.755814  GB (gigabytes)

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (i.e what is the capacity of one cylinder?)

The capacity of one cylinder can be estimated by determining the capacity of one surface and the capacity of one track.

The capacity of one surface = [tex]131072\dfrac{tracks}{surface} \times 2048 \dfrac{sector}{tracks} \times 512\dfrac{bytes}{sector}[/tex]

The capacity of one surface = [tex]1.37438953 \times 10^{11[/tex] byte = 137.44 GB

Capacity of one track = 2048 sectors/track × 512 bytes/sector

Capacity of one track = 1048576 Bytes/track

Capacity of one track =1048 KB/track

Capacity of one track ≅ 1 MB/track

Since the hard disk contains four surfaces

capacity of one cylinder = 1 MB/track × 4 track/cylinder

capacity of one cylinder  = 4 MB

In the Programming Process which of the following is not involved in defining what the program is to do:_____________ Group of answer choices

a. Compile code
b. Purpose
c. Output
d. Input
e. Process

Answers

Answer:

a. Compile code

Explanation:

In programming process, the following are important in defining what a program is to do;

i. Purpose: The first step in writing a program is describing the purpose of the program. This includes the aim, objective and the scope of the program.  The purpose of a program should be defined in the program.

ii. Input: It is also important to specify inputs for your program. Inputs are basically data supplied to the program in order to perform a task. Valid inputs are defined in the program.

iii. Output: Many times, when inputs are supplied to a program the resulting effects are shown in the outputs. The way the output will be is defined in the program.

iv. Process: This involves the method by which inputs are being mapped into outputs. The process implements the functionality of the program by converting inputs into their corresponding outputs. The process is defined in the program.

Compile code is not a requirement in defining what a program is to do. It just allows the source code of the program to be converted into a language that the machine understands.

More than one component in a particular automotive electric circuit is not working. Technician A starts testing the circuit at the power source. Technician B starts testing the circuit at its load. Who is right?

Answers

Hi there! Hopefully this helps!

--------------------------------------------------------------------------------------------------

The answer is A, testing the circuit at the power source.

Select the option that is not true. 1. Timestamp and Validation schedulers are both optimistic schedulers. 2. Timestamp and Validation schedulers can be used to remove physically unrealizable behaviour. 3. Timestamp and Validation schedulers guarantee serializability. 4. Timestamp and Validation schedulers perform most effectively on transactions that perform writes.

Answers

Answer:

3. Timestamp and Validation schedulers guarantee serializability.

Explanation:

Timestamp is a sequence of information encoded when a certain event occurs at a given time that information is decoded and message is identified. Time schedulers is optimistic scheduler and it removes physically unrealizable behavior. Timestamp cannot guarantee serializability.  It can detect unrealizable behavior.

What is the value of the totalsString variable after the following code is executed? var totals = [141.95, 212.95, 411, 10.95]; totals[2] = 312.95; var totalsString = ""; for (var i = 0; i < totals.length; i++) { totalsString += totals[i] + "|"; }

Answers

Answer:

141.95|212.95|312.95|10.95|

Explanation:

Reformatting the code snippet and giving it line numbers;

1.       var totals = [141.95, 212.95, 411, 10.95];

2.      totals[2] = 312.95;

3.      var totalsString = "";

4.      for (var i = 0; i < totals.length; i++) {

5.          totalsString += totals[i] + "|";

6.      }

Line 1 creates an array called totals with four elements.

     First element = totals[0] =141.95

     Second element = totals[1] = 212.95

     Third element = totals[2] = 411

     Fourth element = totals[3] = 10.95

Line 2 replaces the value of the third element totals[2] = 411 with 312.95.

     Therefore the array totals = [141.95, 212.95, 312.95, 10.95]

Line 3 creates an empty string called totalsString

Lines 4 - 6 create a for loop that cycles from i=0 to i<totals.length

       totals.length = 4 (which is the number of items in the array totals)

       This means that the loop cycles from i=0 to i<4

       During cycle 1 when i = 0, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[0] + "|"   //substitute the values

            totalsString = "" + 141.95 + "|"

            totalsString = 141.95|

       During cycle 2 when i = 1, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[1] + "|"   //substitute the values

            totalsString = "141.95|" + 212.95 + "|"

            totalsString = 141.95|212.95|

       During cycle 3 when i = 2, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[2] + "|"   //substitute the values

            totalsString = "141.95|212.95|" + 312.95 + "|"

            totalsString = 141.95|212.95|312.95|

       During cycle 4 when i = 3, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[3] + "|"   //substitute the values

            totalsString = "141.95|212.95|312.95|" + 10.95 + "|"

            totalsString = 141.95|212.95|312.95|10.95|

At the end of the execution, totalsString = 141.95|212.95|312.95|10.95|

Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph'

Answers

Answer:  

I am writing a Python program:

For taking input from user:

user_input = input() # takes input from user

short_names = user_input.split() #splits user_input into list of strings

short_names.pop(0) # removes the first element of the list i.e. Gertrude

short_names[-1] = "Joe" #sets the last element to Joe

print(short_names)    #prints modified list of Sam Ann Joe

If you do not want to take input from user:  

short_names=['Gertrude', 'Sam', 'Ann', 'Joseph']  #list of 4 elements

short_names=short_names[1:]  # removes the first element Gertrude

short_names.pop()  # removes last element i.e. Joseph from list

short_names.append('Joe')  #adds Joe to the end of the list

print(short_names) #prints modified list Sam Ann Joe

If you do not want to use pop() and append() methods:

short_names = ['Gertrude', 'Sam', 'Ann', 'Joseph']  #creates list of 4 values

short_names = short_names[1:]  # removes first value i.e. Gertrude from list

short_names[-1] = "Joe"  #set the last element to Joe

print(short_names) #prints modified list Sam Ann Joe

Explanation:

The first program takes the names from the user, splits them into list of strings, then pop(0) has given index value 0 which means 1st value in the list. So it removes and returns first value from the list. Next statement sets the last value of list to Joe.

The second program has a hard coded list ['Gertrude', 'Sam', 'Ann', 'Joseph']  

short_names = short_names[1:] removes the first value of the short_names list i.e. Gertrude. Next pop() removes and returns last value in the list i.e. Joseph from list. Last statement append('Joe') adds Joe to the end of the list.

The third program has a list of 4 elements. short_names = short_names[1:]   removes first value i.e. Gertrude from list and short_names[-1] = "Joe"  sets the last element to Joe.

The function was implemented using the JavaScript language, the shift, pop and push function was used to get the desired output

Array and String Operations

The function bellow is written in JavaScript

function shortName (short_names){

short_names.shift() // The first element "Gertrude" was removed

short_names.pop() //The last element "Joseph" was removes

short_names.push("joe") //"Joe" is added to the new list

return short_names //The new list is returned as output

}

Learn more about array operation here:

https://brainly.com/question/26104158

In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.

Answers

Answer:

Flowchart.

Explanation:

Structured Systems Analysis and Design (SSAD) is a methodology and a systems technique of analyzing and designing of information systems.

This system uses several tools to design various components such as dataflow diagram, conceptual data model, flowchart, etc.

In the given scenario, the tool that will be used by the system would be a flowchart.

A flowchart is a diagram that represents a systematic flow of a process. In SSAD, flowchart is used to illustrate the logical steps to be taken in a process but it does not show data elements and associations.

So, the correct answer is flowchart.

The following code uses a nested if statement.

if (employed == 'Y')
cout << "Employed!" << endl;

else if (employed == 'N')
cout << "Not Employed!" << endl;

else
cout << "Error!" << endl;

a. True
b. False

Answers

Answer:

true

Explanation:

else if used so I think it's true

zybooks cis 110 challenge activity 9.8.1 Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x % 2 (remainder is either 0 or 1) x = x / 2 Note: The above algorithm outputs the 0's and 1's in reverse order. Ex: If the input is 6, the output is 011. Your program should define and call a function: Function Integer To Binary(integer num) returns nothing The function should output 1's and 0's representing the integer in binary (in reverse).

Answers

Answer:

public class IntegerToBinary

{

public static void main(String[] args) {

 integerToBinary(6);

}

public static void integerToBinary(int num){

    while(num > 0){

       System.out.print(num%2);

       num = Math.floorDiv(num, 2);

    }

}

}

Explanation:

*The code is in Java.

Create a function called integerToBinary that takes one parameter, num

Inside the function, create a while loop that iterates while the num is greater than 0. Inside the loop, print the num%2. Then, get the floor division of the num by to and assign it to the num.

Inside the main, call the function with parameter 6.

Suppose that a main method encounters the statement t3.join(); Suppose that thread t3's run() method has completed running. What happens?
A. The main method waits for all running threads to complete their run() methods before proceeding.
B. The main method waits for any other thread to complete its run() method before proceeding
C. The main method proceeds to the next statement following the t3.join(); statement
D. Thread t 3 is re-started
E. All threads except t3 that are running are terminated

Answers

Answer:

C. The main method proceeds to the next statement following the t3.join(); statement

Explanation:

join() method allows the thread to wait for another thread and completes its execution. If the thread object is executing, then t3.join() will make that t is terminated before the program executes the instruction. Thread provides the method which allows one thread to another complete its execution. If t is a thread object then t.join() will make that t is terminated before the next instruction. There are three overloaded functions.

join()

join(long mills)

join(long millis, int Nanos)

If multiple threads call the join() methods, then overloading allows the programmer to specify the period. Join is dependent on the OS and will wait .


21. The quality of worth or merit, excellence and importance; custom or
ideal that people desire as an end, often shared within a group.
*

Answers

Answer:

Goals

Explanation:

Interestingly, the term goals refers to a perceived future a certain individual or group of individuals are hopeful for, or better still it could be an expectation of improved quality of worth or merit, excellence and importance; custom or ideals that people desire as an end, often shared within a group.

Remember, goals are desired end, achieved as a result of deliberate action or actions towards attaining it.

Write a program that asks the user to input a positive integer and then calculates and displays the factorial of the number. The program should call a function named getN

Answers

Answer:

The program is written in python and it doesn't make use of any comment;

(See explanation section for line by line explanation)

def getN(num):

     fact = 1

     for i in range(1, 1 + num):

           fact = fact * i

     print("Factorial: ",fact)

num = int(input("Number: "))

if num < 0:

     print("Invalid")

else:

     getN(num)

Explanation:

The function getNum is defined here

def getN(num):

Initialize the result of the factorial to 1

     fact = 1

Get an iteration from 1 to the user input number

     for i in range(1, 1 + num):

Multiply each number that makes the iteration

           fact = fact * i

Print result

     print("Factorial: ",fact)

Ths line prompts user to input number

num = int(input("Number: "))

This line checks if user input is less than 0; If yes, the program prints "Invalid"

if num < 0:

     print("Invalid")

If otherwise, the program calls the getN function

else:

     getN(num)

Create a program that will find and display the largest of a list of positive numbers entered by the user. The user should indicate that he/she has finished entering numbers by entering a 0.

Answers

Answer:

This program is written using Python Programming language,

The program doesn't make use of comments (See explanation section for line by line explanation)

Program starts here

print("Enter elements into the list. Enter 0 to stop")

newlist = []

b = float(input("User Input: "))

while not b==0:

    newlist.append(b)

    b = float(input("User Input: "))

newlist.sort()

print("Largest element is:", newlist[-1])

Explanation:

This line gives the user instruction on how to populate the list and how to stop

print("Enter elements into the list. Enter 0 to stop")

This line creates an empty list

newlist = []

This line enables the user to input numbers; float datatype was used to accommodate decimal numbers

b = float(input("User Input: "))

The italicized gets input from the user until s/he enters 0

while not b==0:

    newlist.append(b)

    b = int(input("User Input: "))

This line sorts the list in ascending order

newlist.sort()

The last element of the sorted list which is the largest element is printed using the next line

print("Largest element is:", newlist[-1])

Consider the following algorithm. x â 1 for i is in {1, 2, 3, 4} do for j is in {1, 2, 3} do x â x + x for k is in {1, 2, 3, 4, 5} do x â x + 1 x â x + 5 Count the number of + operations done by this algorithm.

Answers

Answer:

Number of + operation done by this algorithm is 60

Explanation:

i = 4

j = 3

k = 6

Now, let "n" be number of '+' operations

n = i × j + i × 2k

substituting the figures

n = 4 × 3 + 4 × (2 × 6)

n = 12 + 4 × 12

n = 12 + 48

n = 60

Answer:

i can't see some of the numbers

Explanation:

What happens if two functions are defined with the same name, even if they are in different arguments within the same .py files?

Answers

Answer:

Following are the code to this question:

def data(a):#defining method data that accepts parameter

   print (a)#print parameter value

def data(b):#defining method data that accepts parameter

   print (b)#print parameter value

x=input("enter value: ")#defining variable x that5 input value from user

print(data(x))#call method data

Output:

enter value: hello..

hello..

None

Explanation:

As the above code, it is clear defines that python doesn't support the method overloading because More than one method can't be specified in a python class with the same name and python method arguments have no type. The single argument method may be named using an integer, a series, or a double value, that's why we can say that it is not allowed.

It is always possible and feasible for a programmer to come up with test cases that run through every possible path in a program.
A. True
B. False

Answers

Answer:

True

Explanation:

It is always possible and feasible for a programmer to come up with test cases that run through every possible path in a program is a "true statement" or the first option. It is very natural for a programmer/developer to come up with test that will run through every possible outcome in a program. Doing so will help the developer find things that might cause problems with the program in later time.

Hope this helps.

The answer to the question about the feasibility of a programmer to always come up with test cases that run through every possible path in a program is:

No

What is a Test Case?

This refers to the set of actions which a programmer performs to find out if his software or program passes the system requirements in order to work properly.

With this in mind, we can see that while in some cases, it is possible for the programmer to come up with test cases, but it is not feasible in all cases as there can be hardware error which a virtual machine cannot solve.

Read more about test cases here:
https://brainly.com/question/26108146

If no other row matches, the router will select the ________ row as its best match. First Last either First or Last, depending on the circumstances neither First nor Last

Answers

Answer:

Last

Explanation:

Routing is a term in engineering which involves the process of selecting a path for traffic in a network or across multiple networks. It is applicable in circuit-switched networks, such as the public switched telephone network (PSTN), and computer networks, such as the Internet. It is mostly used as a term for IP Routing.

Hence, in IP Routing, the first step is comparing the packet's destination IP address to all rows, followed by selecting the nest-match row. However, If no other row matches, the router will select the LAST row as its best match.

Other Questions
10 rubber stamps cost $10.30 Which equation would help determine the cost of 2 rubber stamps? When or how does a contract become a legal document and is binding on all parties involved? GRADPOINT Which of the following foods would have the LEAST greenhouse gas footprint?A fish B beef C vegetables D nuts A box is dragged across a floor by pulling on a rope attached to the crate and inclined 25 o above the horizontal. If the coefficient of static friction is 0.64, it requires a force of 350 N to just start it moving. What is the mass of the box Anita works at a local news station and needs to decide which news story to report first. Of the news stories, 3 are local, 4 are international, and 5 national. The stories are equally important so anita randomly orders the stories. What is the probability that the first story is a national story. Give your answer as a fraction Emma buys a camping van for 23500 plus vat at 20% she pays deposit then pays the rest in of the cost in 18 equal payments of 940 each month find the ratio of the deposit Emma pays to total of the 18 equal payments give your answer in the simplest part For the functions f(x)=3x1 and g(x)=4x3, find (fg)(x) and (gf)(x) Lina is making a trail mix of a hiking trip. She has 2 1/2 cups of peanuts, 3 1/4 cups of raisins, and 2 2/3 cups of banana chips. How many cups of trail mix can she make? Please answer this if you want too. one term of an arithmetic sequence is a17=82 and d=-6. write a rule for the nth term of the sequence. then find a10 The CEO/chairman of PharmaPacifica was recently killed in an airplane crash. This tragedy has thrown PharmaPacifica into turmoil as there is no one in the organization qualified to step into the former CEOs shoes. This is an example of: Compute gross profit earned by the company for each of the four costing methods. For specific identification, the March 9 sale consisted of 135 units from beginning inventory and 265 units from the March 5 purchase; the March 29 sale consisted of 115 units from the March 18 purchase and 155 units from the March 25 purchase. Which equation is represented by the graph below? Help please!!!!! How long can a virus be kept on a plastic bag? Question 5 of 102 PointsWhich word would be most appropriate in this example from a technicaldocument?All employees must _____the new time card system.A. utilizeB. operateC. useD. manipulateSUBMIT The defect length of a corrosion defect in a pressurized steel pipe is normally distributed with mean value 30 mm and standard deviation 7.8 mm [suggested in the article "Reliability Evaluation of Corroding Pipelines Considering Multiple Failure Modes and Time-Dependent Internal Pressure" (J. of Infrastructure Systems, 2011: 216224)]. What values separate the largest 80% from the smallest 20% of the defect length distribution. All circles are similar figures. A Single transformation is applied to the circle with center M to create another circle with center N. Which statement about the transformation is true? a. the bride and groom are not allowed to go to the bathroom for 3 days after the wedding.b. the engaged couple wears rings on the right hand and then shifts it to the left hand onceofficially marriedc. the groomsmen are allowed to kiss the bride.d. it is considered good luck to break any porcelain found in the brides homee. spend an hour a day crying for joy starting 1 month before the wedding.f. the bride and groom are not allowed to smile during the ceremony.1. In China, before a wedding itcommon for the bride to.2. In a Tidong community in both Indonesia/Malaysia...a*3. In Sweden if the grooms leaves the room for any reason...4. In Congo5. In Germany..6. In Chile... Brendan is 6 feet tall and has red hair and green eyes. His cousin, Connor, is 5 feet, 6 inches tall, and has brown hair and brown eyes. Both boys are described as friendly and outgoing. These descriptions of genetic expression are known as their Last year Mr. John Q. Public received an inheritance. He paid $20\%$ in federal taxes on the inheritance, and paid $10\%$ of what he had left in state taxes. He paid a total of $\$10{,}500$ for both taxes. How many dollars was the inheritance? arrange these numbers in order of size from smallest to largest 2.64 21.3 12.35 12.06 2.8 2.09