Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the String is a palindrome, i.e., the String is the same if read forwards or in reverse. For example, "racecar" is a palindrome. The method should return false if the String is not a palindrome. Note: any single-letter word is considered a palindrome.

public class StringMethod {
public static boolean isPalindrome(String word) {
//TODO: Complete this method

}
}

Answers

Answer 1

Answer:

public static boolean isPalindrome(String word) {

   //TODO: Complete this method

   String reverse = "";  

       for (int i = (word.length()-1); i>=0; i--) {

           if(word.charAt(i)!=' '){

               reverse+=word.charAt(i);

           }

       }

   String without_space = word.replaceAll(" ", "");

   

   return reverse.equals(without_space);

   }

Answer 2

Methods are collections of named code blocks, that are executed when called or evoked.

The isPalindrome method written in Java, where comments are used to explain each line is as follows

//This defines the method

public static boolean isPalindrome(String word) {

   //This removes all the spaces in the word

   String newStr = word.replaceAll(" ", "");

   //This initializes an empty string

   String rev = "";  

   //This iterates through the word, in reverse order

   for (int i = (word.length()-1); i>=0; i--) {

       //This gets all the characters in the string (without the space)

       if(word.charAt(i)!=' '){

           rev+=word.charAt(i);

       }

   }

   //This returns true or false

   return reverse.equals(newStr);

}

Read more about methods at:

https://brainly.com/question/19360941


Related Questions

For the Python program below, will there be any output, and will the program terminate?
while True: while 1 > 0: break print("Got it!") break
a. Yes and no
b. No and no
c. Yes and yes
d. No and yes
e. Run-time error

Answers

the answer is e ......
The answer is E ,
hope it’s help

When you sustain program implementation by staying true to the original design, it is termed A. Goals and objectives B. Program fidelity C. Program evaluation D. Program management

Answers

Answer:

Program fidelity

Explanation:

When you use Word's Email option to share a document, you should edit the _____ line to let the recipient know the email is from a legitimate source.

Answers

Answer:

Subject line

Explanation:

Editing the subject line is very important so as to enable the recipient know the source of received the message (document).

For example, if a remote team working on a project called Project X receives a shared document by one member of team, we would expect the subject line of the email to be– Project X document. By so doing the legitimacy of the email is easily verified.

Velma is graduating from Ashford at the end of next year. After she completes her final class, she will reward herself for her hard work with a week-long vacation in Hawaii. But she wants to begin saving money for her trip now. Which of the following is the most effective way for Velma to save money each month?

Answers

This question is incomplete because the options are missing; here are the options for this question:

Which of the following is the most effective way for Velma to save money each month?

A. Automatically reroute a portion of her paycheck to her savings account.

B. Manually deposit 10% of her paycheck in her savings account.

C. Pay all of her bills and then place the remaining money in her savings account.

D. Pay all of her bills and then place the remaining money in her piggy bank.

The correct answer to this question is A. Automatically reroute a portion of her paycheck to her savings account.

Explanation:

In this case, Velma needs to consistently save money for her vacation as this guarantees she will have the money for the trip. This means it is ideal every month she contributes consistently to her savings for the vacation.

This can be better be achieved by automatically rerouting a part of her paycheck for this purpose (Option A) because in this way, every month the money for the vacations will increase and the amount of money will be consistent, which means Velma will know beforehand the money she will have for the vacation. Moreover, options such as using a piggy bank or paying the bills and using the rest for her savings, do not guarantee she will contribute to the savings every month, or she will have the money she needs at the end.

A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right.
For example, we can shift the bits in the string 1011 two places to the left to produce the string 1110. Note that the leftmost two bits are wrapped around to the right side of the string in this operation.
Define two scripts, shiftLeft.py and shiftRight.py, that expect a bit string as an input.
The script shiftLeft shifts the bits in its input one place to the left, wrapping the leftmost bit to the rightmost position.
The script shiftRight performs the inverse operation.
Each script prints the resulting string.
An example of shiftLeft.py input and output is shown below:
Enter a string of bits: Hello world!
ello world!H
An example of shiftRight.py input and output is shown below:
Enter a string of bits: Hello world!
!Hello world

Answers

Answer:

Following are the code to this question:

Defining method shiftLeft:

def shiftLeft(bit_string): #defining method shiftLeft, that accepts parameter bit_string

   bit_string= bit_string[1:]+bit_string[0]#use bit_string to provide slicing

   return bit_string#return bit_string value

bit_string =input("Enter value: ")#defining bit_string variable for user input

print (shiftLeft(bit_string))#use print method to call shiftLeft method

Defining method shiftRight:

def shiftRight(bit_string):#defining method shiftRight, which accepts bit_string variable

bit_string=bit_string[len(bit_string)-1]+bit_string[0:len(bit_string)-1]#using bit_string variable for slicing

   return bit_string#return bit_string calculated value

bit_string= input("Enter value: ")#defining bit_string variable for user input

print(shiftRight(bit_string))#use print method to call shiftLeft method

Output:

Please find the attachment.

Explanation:

method description:

In the above-given python code two methods "shiftLeft and shiftRight" are declared, in which both the method accepts a string variable "bit_string". Inside methods, we use the slicing, in which it provides to use all the sequence values and calculated the value in this variable and return its value.  At the last step, the bit_string variable is used to input value from the user end and call the method to print its value.

why does study state that unless you were sleeping it is almost impossible not to be communicating?

Answers

Answer:

Because your movements, expressions, and posture are also a type of communication

Explanation:

Multiply each element in origList with the corresponding value in offsetAmount. Print each product followed by a semicolon (no spaces). Ex: If the input is: 4 5 10 12 2 4 7 3 the output is: 8; 20;70; 36; 1 #include 2 3 int main(void) { 4 const int NUM_VALS = 4; 5 int origList[NUM_VALS]; 6 int offsetAmount [NUM_VALS]; 7 int i; 8 9 scanf("%d", &origList[0]); 10 scanf("%d", &origList[1]); 11 scanf("%d", &origList[2]); 12 scanf("%d", &origList[3]); 13 14 scanf("%d", &offsetAmount[0]); 15 scanf("%d", &offsetAmount[1]); 16 scanf("%d", &offsetAmount[2]); 17 scanf("%d", &offsetAmount[3]); 18 19 \* Your code goes here */ 20 21 printf("\n"); 22 23 return 0; 24

Answers

Answer:

Replace /* Your code goes here */  with

for(i =0; i<NUM_VALS; i++) {

    printf("%d", origList[i]*offsetAmount[i]);

printf(";");

}

Explanation:

The first line is an iteration statement iterates from 0 till the last element in origList and offsetAmount

for(i =0; i<NUM_VALS; i++) {

This line calculates and print the product of element in origList and its corresponding element in offsetAmount

    printf("%d", origList[i]*offsetAmount[i]);

This line prints a semicolon after the product has been calculated and printed

printf(";");

Iteration ends here

}

Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of the base class' printAll() method. Name: Fluffy, Age: 5, ID: 4444

Answers

Answer and Explanation:

public class petData

{

private int ageYears;

private String fullName;

private int IdNumber;

public void setName (String givenName)

{

fullName = givenName;

return;

}

public void setAge (int numYears)

{

ageYears = numYears;

return;

}

public void setID (int numID)

{

IdNumber = numID;

return;

}

public void printAll ()

{

System.out.print ("Name: " + fullName);

System.out.print (", Age: " + ageYears);

return;

}

}

From the above, we have defined a class petData, with methods setName, setAge, printAll. These methods all make use of the string variable fullName and integer variable ageYears. From the above, setName method sets fullName variable to name given to its string parameter givenName while setAge method does the same with the ageYears variable in initializing it. This is also done by the ID method. These variables are then used by printAll method in printing out the Name and age of the object which would be created with the petData class

E. g: petData dog= new petData();

Jason has a part time job in the office of a construction company and is also a student at a community college. He often works on his homework during times when he is not busy at work because the office computer contains the software he needs to do his assignments and he hasn't been able to afford to purchase the software for his own personal computer. Which of these unacceptable uses typically included in a user access policy might he most likely be engaging in?

Answers

Complete Question:

Jason has a part time job in the office of a construction company and is also a student at a community college. He often works on his homework during times when he is not busy at work because the office computer contains the software he needs to do his assignments and he hasn't been able to afford to purchase the software for his own personal computer. Which of these unacceptable uses typically included in a user access policy might he most likely be engaging in?

1.Using the network to download software for personal use

2.Disclosing personal information about employees

3.Copying of copyrighted material

4.Using a network account for a purpose not specified by the owner’s job description

Answer:

4.Using a network account for a purpose not specified by the owner’s job description

Explanation:

The office computer is meant to be used for the owner's purpose only.  By using the office computer to do his homework, even at a free hour, Jason is still violating his employer's asset for selfish purpose.  Jason could obtain permission from his manager to use the office computer for his homework for a temporary period, until he could "afford to purchase the software for his own personal computer."  The official permission can exempt him from being penalized for the violation.  A written permission is more ideal in this case.

nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync

Answers

Complete Question:

Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync?

Answer:

Network Time Protocol (NTP).

Explanation:

As the IT systems administrator, you can set the network time protocol (NTP) to make sure that your client machines and the server times are in synchronization.

A network time protocol (NTP) can be defined as an internet standard protocol which is used by an IT system administrator to synchronize a computer's clock to a particular time reference over packet switched or local area network (LAN) and variable-latency data networks. NTP was developed at the University of Delaware by Professor David L. Mills.

Basically, the network time protocol uses the coordinated universal time (UTC) and a client-server model to measure the total round-trip delay for a computer process.

Which of the following is not typically a responsibility for a social media specialist? Choose the answer.

Question 19 options:

Monitor SEO and user engagement and suggest content optimization.


Communicate with industry professionals and influencers via social media to create a strong network.


Install computer hardware.


Manage a company's social media profiles.

Answers

Answer:

C

Explanation:

A social media specialist does not usually install computer hardware. They will do things like look at engagement data, create new posts to send out to followers, and consult on how to get more people to come into your business, but they wouldn't be doing things like installing new ram.

Description:
Create a program that converts the number of miles that you walked on a hike to the number of feet that you walked.
Console:
Hike Calculator
How many miles did you walk?: 4.5
You walked 23760 feet.
Continue? (y/n): y
How many miles did you walk?: 2.5
You walked 13200 feet.
Continue? (y/n): n
Bye!
Specifications:
The program should accept a float value for the number of miles.
Store the code that gets user input and displays output in the main function.
There are 5280 feet in a mile.
Store the code that converts miles to feet in a separate function. This function should return an int value for the number of feet.
Assume that the user will enter a valid number of miles.

Answers

Answer:

The programming language is not stated (I'll answer using C++)

#include <iostream>

using namespace std;

int convert(float miles)

{

   return miles * 5280;

}

int main() {

   cout<<"Console:"<<endl;

   cout<<"Hike Calculator"<<endl;

   float miles;

   char response;

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   while(response == 'y')

   {

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   }

   cout<<"Bye!";

   return 0;

}

Explanation:

Here, I'll explain some difficult lines (one after the other)

The italicized represents the function that returns the number of feet

int convert(float miles)

{

   return miles * 5280;

}

The main method starts here

int main() {

The next two lines gives an info about the program

   cout<<"Console:"<<endl;

   cout<<"Hike Calculator"<<endl;

   float miles;

   char response;

This line prompts user for number of miles

   cout<<"How many miles did you walk?. ";

   cin>>miles;

This line calls the function that converts miles to feet and prints the feet equivalent of miles

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

This line prompts user for another conversion

   cout<<"Continue? (y/n): ";

   cin>>response;

This is an iteration that repeats its execution as long as user continue input y as response

   while(response == 'y')

   {

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   }

   cout<<"Bye!";

A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Select TWO).
a) Vishing
b) Whaling
c) Spear phishing
d) Pharming
e) War dialing
f) Hoaxing

Answers

Answer:

Spear Phishing and War Dialing

Explanation:

So let's tackle these one at a time.

Vishing is simply any type of message (i.e., email, text, phone call, etc.) that appears to be from a trusted source but is not.

Whaling is simply a spear phishing attack of a high-value target such as a CEO or someone with high-level access at a company.

Spear phishing is simply a targeted phishing attack, usually towards a specific person or group of people.  (Phishing attack is simply a social attack to try and gain unauthorized access to a resource).

Pharming is an attack that attempts to redirect website traffic to a fake site.

War dialing is a technique to automatically scan a list of numbers in an area in attempt to search for exposed modems, computers, board systems, or fax machines, in order to breach the network.

Hoaxing is simply a social attack that describes a serious threat in attempts to retrieve unauthorized access or money from a victim.  (Think microsoft tech support scams)

Now that we have defined these things, let's identify the possible threats that need to be reported.

(a) Vishing?  The sec admin report doesn't mention the source of the message so we cannot associate this one

(b) Whaling? The sec admin report says a user, implying someone not high up in the company, but doesn't say it's not someone high up.  This is possible.

(c) Spear phishing?  The sec admin report says a user, implying that only this user is being targeted so this is definitely valid.

(d) Pharming?  The sec admin report says nothing about site redirection.

(e) War dialing? The sec admin report doesn't say anything about unauthorized scanning; however, it mentions the user has an old functioning modem, so this is possible.

(f) Hoaxing?  The sec admin report doesn't mention a pop up in the email or the content of the email so we are uncertain.

Thus with these considerations, the two threats that are identified and need mitigation are Spear phishing and War Dialing/Whaling.  Note that we aren't positive of the war dialing or whaling, but a case could be made for either; however, given the modem information, the question seems to indicate war dialing.

Assuming a Stop-and-Wait system, if the bandwidth-delay product of a channel is 500 Mbps and 1 bit takes 25 milliseconds to make the roundtrip, what is the bandwidth-delay product? If the data packets are 2500 bits in length, what is the utilization?

Answers

Answer:

Bandwidth delay product = 2500 Kbits

Utilization = 0.02%

Explanation:

We proceed as follows;

From the question, we are given that

band width = 500 Mbps

The bandwidth-delay product is = 500 x 10^6 x 25 x 10^-3

= 2500 Kbits

The system can send 12500 Kbits during the time it takes for the data to go from the sender to the receiver and then back again.

However, the system sends only 2500 bits.

The the link utilization =

2500/(12500 x 10^3) = 0.02%

A byte addressable direct-mapped cache has 1024 blocks/lines, with each block having eight 32-bit words. How many bits are required for block offset, assuming a 32-bit address

Answers

Answer and Explanation:

"The inquiry as presented is not necessarily responsible. A word has been states as 32-bit. We need to ask if the frame is "byte-addressable" (From this we can access to get an 8-bit piece of information) or "text-addressable" (the smallest open lump is 32-bit) or maybe "half-word-addressable" (the tiny bundle of information it could reach to 16-bit).

To understand what the smallest request bit of a position is to let anyone know, you have to remember this.

You operate from base up at that stage. We will agree with the byte-addressable structure. Every reserved square at a certain point contains 8 words * (4 bytes/word) = 32 = 25 bytes, so the counterbalance seems to be 5 bits.

The history in a direct-mapped stored is the squares in reserves (12 bits for this position due to 212 = 4096). at a certain point, as you have seen, the tag is also one of the bits left behind.

As the reserve becomes increasingly cooperative. And a similar size remains. These are lesser bits on the list and more bits on the mark.'

Complete the function ConvertToDecadesAndYears to convert totalYears to decades and years. Return decades and years using the TimeDecadesYears struct. Ex: 26 years is 2 decades and 6 years.

Answers

Answer:

It is a C++ program. The complete function   ConvertToDecadesAndYears which takes totalYears as parameter and convert totalYears to decades and years is provided in the attached document.

Explanation:

The explanation is provided in the attached document.

The screenshot of the complete code along with its output is attached.

Write an object oriented Python script that does the following:
1. Connects to the Sakila database (mysql)
2. Adds a record to the database
3. Retrieves and displays a dataset that shows the newly added record

Answers

Answer:

ESCALAS MAYORES (D, E, G, A, B) Porfavor necesito ayuda,te lo agradecería muchísimo!!

Es urgente

A systems analyst attended a week-long workshop on Agile software development. When she returned to her job, she told her boss that agile practices were not worth the time to learn and use on the job. Her view was that it was too academic and idealistic to be useful. Do you agree or disagree?Defend your position.

Answers

Answer:

The answer is "disagree"

Explanation:

The system analyst is responsible, who uses research and methods of solving industrial problems with IT. He or she may act as representatives of change that identify, that process improvements needed design systems for such improvements, or inspire us to use systems.

Analysts testing and diagnosing issues in operating systems for QA applications and the programmer analyst design and write custom software, that satisfy the requirements of their employers or customers. For the system analysis, the analyst uses all types of techniques, which may be old's, that's why we disagree with the analyst.

Consider these functions:_________.
def f(x) :
return g(x) + math.sqrt(h(x))
def g(x):
return 4 h(x)
def h(x):
return x x + k(x)-1
def k(x):
return 2 (x + 1)
Without actually compiling and running a program, determine the results of the following function calls.
a. x1 = f(2)
b. x2 = g(h(2)
c. x3 = k(g(2) + h(2))
d. x4 - f(0) + f(l) + f(2)
e. x5 - f{-l) + g(-l) + h(-1) + k(-l)

Answers

Answer:

x1 = 39

x2 = 400

x3 = 92

x4 = 62

x5 = 0

Explanation:

a. x1 = f(2)

This statement calls the f() function passing 2 to the function. The f(x) function takes a number x as parameter and returns the following:

g(x) + math.sqrt(h(x))

This again calls function g() and h()  

The above statement calls g() passing x i.e. 2 to the function g(x) and calls function h() passing x i.e. 2 to h() and the result is computed by adding the value returned by g() to the square root of the value returned by the h() method.

The g(x) function takes a number x as parameter and returns the following:

return 4*h(x)

The above statement calls function h() by passing value 2 to h() and the result is computed by multiplying 4 with the value returned by h().

The h(x) function takes a number x as parameter and returns the following:

return x*x + k(x)-1

The above statement calls function k() by passing value 2 to k() and the result is computed by subtracting 1 from the value returned by k() and adding the result of x*x (2*2) to this.

The k(x) function takes a number x as parameter and returns the following:

return 2 * (x + 1)

As the value of x=2 So

2*(2+1) = 2*(3) = 6

So the value returned by k(x) is 6

Now lets go back to the function h(x)

return x*x + k(x)-1

x = 2

k(x) = 6

So

x*x + k(x)-1 = 2*2 + (6-1) = 4 + 5 = 9

Now lets go back to the function g(x)

return 4*h(x)

As x = 2

h(x) = 9

So

4*h(x)  = 4*9 = 36

Now lets go back to function f(x)

return g(x) + math.sqrt(h(x))

As x=2

g(x) = 36

h(x) = 9

g(x) + math.sqrt(h(x))  = 36 + math.sqrt(9)

                                  = 36 + 3 = 39

Hence

x1 = 39b. x2 = g(h(2) )

The above statement means that first the function g() calls function h() and function h() is passed a value i.e 2.

As x=2

The function k() returns:

2 * (x + 1)   = 2 * (2 + 1) = 6

The function h() returns:

x*x + k(x)-1 = 2*2 + (6-1) = 4 + 5 = 9

Now The function g() returns:

4 * h(x)  = 4 * h(9)

This method again calls h() and function h() calls k(). The function k() returns:

2 * (x + 1)   = 2 * (9 + 1) = 20

Now The function h() returns:

x*x + k(x)-1 = 9*9 + (20-1) = 81 + 19 = 100

h(9) = 100

Now The function g() returns:

4 * h(x)  = 4 * h(9) = 4 * 100 = 400

Hence

x2 = 400c. x3 = k(g(2) + h(2))

g() returns:

return 4 h(x)

h() returns:

return x*x + k(x)-1

k(2) returns:

return 2 (x + 1)

          = 2 ( 3 ) = 6

Now going back to h(2)

x * x + k(x)-1  = 2*2 + 6 - 1 = 9

Now going back to g(2)

4 h(x)  = 4 * 9 = 36

So k(g(2) + h(2)) becomes:

   k(9 + 36 )

    k(45)

Now going to k():

return 2 (x + 1)

2 (x + 1)   = 2(45 + 1)

             = 2(46)

             = 92

So k(g(2) + h(2)) = 92

Hence

x3 = 92d. x4 = f(0) + f(1) + f(2)

Compute f(0)

f() returns:

return g(0) + math.sqrt(h(0))

f() calls g() and h()

g() returns:

return 4 * h(0)

g() calls h()

h() returns

return 0*0 + k(0)-1

h() calls k()

k() returns:

return 2 * (0 + 1)

2 * (0 + 1)  = 2

Going back to caller function h()

Compute h(0)

0*0 + k(0)-1  = 2 - 1 = 1

Going back to caller function g()

Compute g(0)

4 * h(0)  = 4 * 1 = 4

Going back to caller function f()

compute f(0)

g(0) + math.sqrt(h(0))  = 4 + 1 = 5

f(0) = 5

Compute f(1)

f() returns:

return g(1) + math.sqrt(h(1))

f() calls g() and h()

g() returns:

return 4 * h(1)

g() calls h()

h() returns

return 1*1 + k(1)-1

h() calls k()

k() returns:

return 2 * (1 + 1)

2 * (1 + 1)  = 4

Going back to caller function h()

Compute h(0)

1*1 + k(1)-1  = 1 + 4 - 1 = 4

Going back to caller function g()

Compute g(1)

4 * h(1)  = 4 * 4 = 16

Going back to caller function f()

compute f(1)

g(1) + math.sqrt(h(1))  = 16 + 2 = 18

f(1) = 18

Compute f(2)

f() returns:

return g(2) + math.sqrt(h(2))

f() calls g() and h()

g() returns:

return 4 * h(2)

g() calls h()

h() returns

return 1*1 + k(2)-1

h() calls k()

k() returns:

return 2 * (2+1)

2 * (3)  = 6

Going back to caller function h()

Compute h(2)

2*2 + k(2)-1  = 4 + 6 - 1 = 9

Going back to caller function g()

Compute g(2)

4 * h(2)  = 4 * 9 = 36

Going back to caller function f()

compute f(2)

g(2) + math.sqrt(h(2))  = 36 +3 = 39

f(1) = 13.7

Now

x4 = f(0) + f(l) + f(2)

    = 5 + 18 + 39

    = 62

Hence  

x4 = 62e. x5 = f(-1) + g(-1) + h(-1) + k(-1)

Compute f(-1)

f() returns:

return g(-1) + math.sqrt(h(-1))

f() calls g() and h()

g() returns:

return 4 * h(-1)

g() calls h()

h() returns

return 1*1 + k(-1)-1

h() calls k()

k() returns:

return 2 * (-1+1)

2 * (0)  = 0

Going back to caller function h()

Compute h(-1)

-1*-1 + k(-1)-1  = 1 + 0 - 1 = 0

Going back to caller function g()

Compute g(-1)

4 * h(-1)  = 4 * 0 = 0

Going back to caller function f()

compute f(-1)

g(-1) + math.sqrt(h(-1))  = 0

f(-1) = 0

Compute g(-1)

g() returns:

return 4 * h(-1)

g() calls h()

h() returns

return 1*1 + k(-1)-1

h() calls k()

k() returns:

return 2 * (-1+1)

2 * (0)  = 0

Going back to caller function h()

Compute h(-1)

-1*-1 + k(-1)-1  = 1 + 0 - 1 = 0

Going back to caller function g()

Compute g(-1)

4 * h(-1)  = 4 * 0 = 0

g(-1) = 0

Compute h(-1)

h() returns

return 1*1 + k(-1)-1

h() calls k()

k() returns:

return 2 * (-1+1)

2 * (0)  = 0

Going back to caller function h()

Compute h(-1)

-1*-1 + k(-1)-1  = 1 + 0 - 1 = 0

h(-1) = 0

Compute k(-1)

k() returns:

return 2 (x + 1)

k(-1) = 2 ( -1 + 1 ) = 2 ( 0 ) = 0

k(-1) = 0

x5 = f(-1) + g(-1) + h(-1) + k(-1)

    = 0  + 0 + 0 + 0

    = 0

Hence

x5 = 0

An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:_______

a. have a redundancy.
b. get caught in an infinite loop.
c. suffer from indefinite postponement.
d. issue a compiler error.

Answers

Answer:

c. suffer from indefinite postponement.

Explanation:

Algorithm is a set of rules that are followed in calculations or other problem solving operation by a computer. An algorithm may execute for unknown amount of time and it may suffer indefinite postponement. Algorithm depends on random numbers and it can execute continuously.

a) five benefits of having
an operating system over not having one.

Answers

Answer:

Software Updates, Computing Sources, No Coding, Relatively Inexpensive, Safeguards Data.

Explanation:

CHALLENGE ACTIVITY 2.1.2: Assigning a sum. Write a statement that assigns total_coins with the sum of nickel_count and dime_count. Sample output for 100 nickels and 200 dimes is: 300

Answers

Answer:

Assuming python language:

total_coins = nickel_count + dime_count

Explanation:

The values of nickel_count and dime_count are added together and stored into total_coins.

Cheers.

Following are the code to the given question:

Program Explanation:

Defining a variable "nickel_count, dime_count" that initializes the value that is "100, 200" within it.In the next step, the "total_coins" variable is declared that initializes with 0.After initializing into the "total_coins" we add the above variable value and print its value.

Program:

nickel_count = 100#defining a variable nickel_count that holds an integer value

dime_count = 200#defining a variable dime_count that holds an integer value

total_coins = 0#defining a variable total_coins that initilize the value with 0  

total_coins = nickel_count + dime_count#using total_coins that adds nickel and dime value

print(total_coins)#print total_coins value

Output:

Please find the attached file.

Learn more:

brainly.com/question/17027551

What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack?

Answers

Answer:

The answer is below

Explanation:

1.  Lack of password enforcement

2.  Outdated third party applications: this includes outdated software such as Apache, PHP, MySQL, OpenSSL, and VNC

3.  General lack of patch management for the OS

4.  General lack of system hardening:

5.  Lack of backups

Ways to hardened the Linux/Unix based computer system is do the following:

1.  Perform minimal Installation: this involves, installing softwares that are necessary, and limiting the number of admin users on the computer system.

2.  Carry out Code Auditing: this is a means of preventing security issues, by withing more secure softwares to prevent variable declarations, or otherwise unexpected logic.

3.  Ensure there is a Traffic filter firewall: this will helps to attacks from external users or hackers. Install, Web Applicatio firewall, which helps to filter out traffic.

4.  Carry out Softwares updates: a software update can help prevent or guide against security leaks in a software

5.  Install security updates only: this is done by filtering out the security-related programs and only upgrade packages which are referred to in the custom file.

Type the correct answer in the box.

Who is responsible for creating and testing the incident response plan?

The _______ is responsible for creating and testing the incident response plan.

Answers

Answer: CSIRT

Explanation: CSIRT is team that specializes in day to day cyber incidents  

The CSIRT is responsible for creating and testing the incident response plan.

What is CSIRT?

CSIRT is the Computer emergency response team. One of the key areas for the efficient operation of a corporation is the legal department. Professionals face enormous challenges, particularly when you take into account the need for other bodies within the company itself.

We can list the reviews of the CSIRT procedures that are conducted through this department as one of its key responsibilities. This department also has the responsibility of comprehending the actions that the CSIRT will take to ensure that they comply with all applicable federal, state, and local laws and regulations.

Therefore, the incident response strategy must be written and tested by the CSIRT.

To learn more about CSIRT, refer to the link:

https://brainly.com/question/18493737

#SPJ2

Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. Its major concern is the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop. Which of the following would help the firm enforce access controls and storage guidelines on its laptops?
a. Anenterprise search software
b. A binary search tool
c. A perceptive software pack
d. A Domain search engine

Answers

Answer:

a. An enterprise search software.

Explanation:

In this scenario, Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. In order to prevent the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop, Rosetta technologies should use an enterprise search software.

Enterprise search software is a computer application which is typically used to make relevant data from sources, such as a database, file system and intranet searchable to a specific or defined group of people.

An enterprise search software would help the firm enforce access controls and storage guidelines on its laptops.

On enterprise search software, there are basically two (2) ways to enforce access controls as a security policy on users;

1. Early binding: at the index stage, permissions are analyzed and ascribed to each document in the enterprise search software.

2. Late binding: it involves the process of analyzing permissions and ascribing them to each document at the query stage in the enterprise search software.

The new_directory function

Answers

Answer:The new directory method creates a new directory within the current working directory.

Explanation:The new directory function and returns the list of the files within that directory.The new directory function allow to with the built in function MK dir().

To the new directory function create a current working directory.

import OS

OS.MKdir()

The code creates the directory projects in the current working directory to specify the full path.

As a security engineer, compare and contrast the pros and cons of deploying hetero vs homogenous networks. Which costs more? Which offers more protection? Why?

Answers

Answer:

See below

Explanation:

In case of a homogeneous network, Skype is an example and OpenTable is an example of a heterogeneous network.

Homogeneous networks are easier to get started with since its all pre-integrated, and even the troubleshooting is more convenient if a problem arises. However, it then becomes a security concern if you choose to place all that power to a single vendor - known as ' monoculture'. One event can affect the entire network. On the other hand, a heterogeneous set up does not run this risk. Several different components are utilized which are not as vulnerable to security threats.

In conclusion, homogeneous networks cost more and heterogeneous networks are more secure.

What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that make up the network defense implementation of the banks' networks.

Answers

Answer:

In several organizations, the operating system (OS) functions at the core of the personal computers in use and the servers. The OS ought to be secure from external threats to its stored data and other resources.

Explanation:

In this regard, Intrusion detection systems play a critical role in protecting the sensitive data, along with software firewalls. Hardware firewalls protect the hardware elements in the network (such as storage drivers etc), the IDS and as well as the IPS.

LAB: Miles to track laps. (PLEASE CODE IN PYTHON)
Instructor note:
Note: this section of your textbook contains activities that you will complete for points. To ensure your work is scored, please access this page from the assignment link provided in Blackboard. If you did not access this page via Blackboard, please do so now.
One lap around a standard high-school running track is exactly 0.25 miles. Write the function miles_to_laps() that takes a number of miles as an argument and returns the number of laps. Complete the program to output the number of laps.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
1.5
the output is:
6.00
Ex: If the input is:
2.2
the output is:
8.80
Your program must define and call the following function:
def miles_to_laps(user_miles)

Answers

Answer:

The program in python is as follows:

def miles_to_laps(user_miles):

     return (user_miles/0.25)

mile = float(input("Number of Miles: "))

print("Number of laps: ",end="")

print('{:.2f}'.format(miles_to_laps(mile)))

Explanation:

The first line defines the function miles_to_lap

def miles_to_laps(user_miles):

This line returns the equivalent number of laps

     return (user_miles/0.25)

The main method starts here

This line prompts user for input

mile = float(input("Number of Miles: "))

This line prints the string "Number of laps", without the quotes

print("Number of laps: ",end="")

This prints the equivalent number of laps to two decimal places

print('{:.2f}'.format(miles_to_laps(mile)))

The program converts the number of miles enters by the user to an equivalent measure in laps is written in python 3 thus :

def miles_to_laps(miles):

#initialize the function which takes in a single parameter

return (miles/0.25)

mile_value= eval(input("Number of Miles: "))

#allows user to input a value representing distance in miles

print("Number of laps: ",end="")

#display Number o laps with cursor on th same line

print('{:.2f}'.format(miles_to_laps(mile_value)))

#pass user's vlaue to the function to Obtain the lap value.

A sample run of the program is attached.

C create a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the Plane class and test its functionality. Write a method called Check In() as part of the Plane class to handle the check in process Prompts the user to enter 1 to select First Class Seat (Choice: 1) Prompts the user to enter 2 to select Economy Seat (Choice: 2) Assume there are only 5-seats for each First Class and Economy When all the seats are taken, display no more seats available for you selection Otherwise it displays the seat that was selected. Repeat until seats are filled in both sections Selections can be made from each class at any time.

Answers

Answer:

Here is the C++ program:

#include <iostream>  //for using input output functions

using namespace std;  //to identify objects like cin cout

class Plane{  //class Plane

private:  // declare private data members i.e. first_class and eco_class

int first_class;  //variable for first class

int eco_class;  //variable declared for economy class

public:  // public access modifier

Plane(){  //constructor to initialize values of first_class and eco_class

first_class=0;  //initialized to 0

eco_class=0;}   //initialized to 0

int getFirst(){  // class method to get data member first_class

return first_class;}   //returns the no of reserved first class seats

int getEco(){  // class method to get data member eco_class

return eco_class;}  //returns the no of reserved eco class seats

void CheckIn(){  //method to handle the check in process

int choice;  //choice between first and economy class

cout<<"\nEnter 1 to select First Class Seat: "<<endl;  //prompts user to enter 1 to reserve first class seat

cout<<"\nEnter 2 to select Economy Class Seat: "<<endl;   //prompts user to enter 2 to reserve economy class seat

cin>>choice;   //reads the choice from user

switch(choice){  // switch statement is used to handle the check in process

case 1:  //to handle the first class seat reservation

if(getFirst()<5){  //if the seat is available and the seat limit has not exceed 5

first_class++;  //add 1 to the first_class seat to count that a seat is reserved

cout<<"You reserved First class seat! ";} //display the message about successful seat reservation in first class

cout<<"\nNumber of first class seats reserved: "<<getFirst()<<endl;}  //displays the number of seats already reserved

else{  //if all first class seats are reserved then display the following message

cout<<"No more seats available for you selection!"<<endl;  

if(getEco()>=5 && getFirst()>=5){  //if all seats from first class and economy class are reserved display the following message

cout<<"All seats are reserved!"<<endl;  

exit(1);}}  //program exits

break;  

case 2:  //to handle the economy seat reservation

if(getEco()<5){   //if the seat is available and the seat limit has not exceed 5

eco_class++;  //add 1 to the eco_class seat to count that a seat is reserved

cout<<"You reserved Economy class seat! "; //display the message about successful seat reservation in economy class

cout<<"\nNumber of Economy class seats reserved: "<<getEco()<<endl;}  //displays the number of seats already reserved

else{  //if all economy class seats are reserved then display the following message

cout<<"No more seats available for you selection!"<<endl;

if(getEco()>=5 && getFirst()>=5){  //if all seats from first class and economy class are reserved display the following message

cout<<"All seats are reserved!"<<endl;

exit(1);}}  //program exits

break;

default: cout<<"Enter a valid choice"<<endl; } } };   //if user enters anything other that 1 or 2 for choice then this message is displayed

int main(){  //start of main() function body

int select;  // choice from first or economy class

Plane plane;  //create an object of Plane class

cout<<"**************************"<<endl;

cout<<"Airline Reservation System"<<endl;  //display this welcome message

cout<<"**************************"<<endl;

while(true){  // while loop executes the check in procedure

plane.CheckIn();} }  //class CheckIn method of Plane classs using plane object to start with the check in process

Explanation:

The program is elaborated in the comments with each statement of the above code. The program has a class Plane that has a method CheckIn to handle the check in process. The user is prompted to enter a choice i.e. enter 1 to select First Class Seat and enter 2 to select Economy Seat. A switch statement is used to handle this process. If user enters 1 then the case 1 of switch statement executes which reserves a seat for the user in first class. If user enters 2 then the case 2 of switch statement executes which reserves a seat for the user in economy class.There are only 5 seats for each First Class and Economy. So when the limit of the seats reservation exceeds 5 then the no more seats available for you selection is displayed. If all the seats are taken in both the first and economy class then it displays the message All seats are reserved. If the user enters anything other than 1 or 2 then display the message Enter a valid choice. Whenever the user reserves one of first or economy class seats the relevant seat is incremented to 1 in order to count the number of seats being reserved. The program and its output are attached.

Other Questions
The theater sold 562 tickets to the concert at a price of $6 each. Use the distributive property to find the product of 6 562. 6(562) = 6(500) + (60)(2) = 3,120 Find the critical numbers of the function. (Enter your answers as a comma-separated list. If an answer does not exist, enter DNE.) f(x) = x3 + 3x2 72x A ________________ is a nerve cell whose cell body is located in the spinal cord and whose axon projects outside the spinal cord to directly or indirectly control our muscles. which basic geometric figure is labeled as cd Select the correct answer from each drop-down menu.Pictures that we receive from space are of the because it takes time forto reach Earth. Which church leaders were immediately below cardinals in the Catholic Church hierarchy? The people of East Africa have often been exposed to other cultures through _____. A.fishing B.trade C.cash crops D.farming WILL MARK BRAINLIEST Which expression is equivalent to x^2 x^3? How would you measure the mass and weight of an object? The table shows the number of flowers in four bouquets and the total cost of each bouquet. A 2-column table with 4 rows. The first column is labeled number of flowers in the bouquet with entries 8, 12, 6, 20. The second column is labeled total cost (in dollars) with entries 12, 40, 15, 20. What is the correlation coefficient for the data in the table? 0.57 0.28 0.28 0.57 Write a balanced equation for: capture of an electron by cadmium-104 Which of the following is NOT a frameshift mutation? A. Deletion B. Insertion C. None of these D. Inversion Find the volume of the cuboid which length is 10cm, breadth is 8cm and height is 7cm. Who answers first gets brainliest answer Find the number of four-digit numbers which are not divisible by 4? What is the purpose of reacting 2.0mL of HNO3 with 2.0 mL of H2SO4 in a separate test tube, prior to adding it to the solution containing the substrate Trident Sports Inc. manufactures and distributes athletic wear, sporting equipment, and protective sports gear worldwide. They are departmentalized based on products sold to professional athletes, products sold to people who pursue sports only for leisure, and products sold to sports teams. Which approach to departmentalization does the company follow In a school, 25% of the teachers teach basic math. If there are 50 basic math teachers, how many teachers are there in a school? Lisa lives next to a vacant plot that belongs to Carol. Carol has never visited the plot in the last 20 years during which period, Lisa has taken care of it by fencing the plot and mowing the grass. If this continues, Lisa will be able to claim ownership of land based on: Compared to refined foods, high-fiber, unprocessed, or lightly processed foods aid in weight loss because they provide: A. less absorption, resulting in fewer kcalories. B. a faster transit time through the intestinal tract. C. more kcalories in a larger amount of food. D. bulk and satiety for fewer kcalories. E. blockage of fats from being absorbed.