Instead of typing an individual name into a letter that you plan to reuse with multiple people, you should use a _______ to automate the process.
A. mail merge
B. data source
C. mailing list
D. form letter
ONLY ANSWER IF YOU'RE 100% SURE.

Answers

Answer 1

Answer:

A. Mail Merge

Explanation:

I had this question last year


Related Questions

A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused by a malicious insider.

a. True
b. False

Answers

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

Assume that to_the_power_of is a function that expects two integer parameters and returns the value of the first parameter raised to the power of the second parameter. Write a statement that calls to_the_power_of to compute the value of cube_side raised to the power of 3 and that associates this value with cube_volume.

Answers

Answer:

The statement in python is as follows:

to_the_power_of(cube_side,3)

Explanation:

As stated as the requirement of the code segment, the statement takes as parameters a variable cube_side and a constant 3.

It then returns the volume of the cube; i.e. cube raise to power 3

See full program below

def to_the_power_of(val,powe):

    result = val**powe

    print(result)

cube_side = float(input("Cube side: "))

to_the_power_of(cube_side,3)

A variable like userNum can store a value like an integer. Extend the given program to print userNum values as indicated.

(1) Output the user's input. Enter integer: 4 You entered: 4

(2) Extend to output the input squared and cubed. Enter integer: 4 You entered: 4 4 squared is 16 And 4 cubed is 64!!

(3) Extend to get a second user input into userNum2. Output sum and product. Enter integer: 4 You entered: 4 4 squared is 16 And 4 cubed is 64!! Enter another integer: 5 4+5 is 9 4*5 is 20.

Answers

Answer:

This program is written using Java programming language.

No comments were used; however, see explanation section for line by line explanation

import java.util.*;

public class Nums {

   public static void main(String args[]) {

     Scanner input = new Scanner(System.in);

     System.out.println("1.");

     int userNum;

     System.out.print("Enter Integer: ");

     userNum = input.nextInt();

     System.out.println("You entered: "+userNum);

     

     System.out.println("2.");

     System.out.print("Enter Integer: ");

     userNum = input.nextInt();

     System.out.println("You entered: "+userNum);

     System.out.println(userNum+" squared is "+(userNum * userNum));

     System.out.println("And "+userNum+" cubed is "+(userNum * userNum * userNum)+"!!");

     

     System.out.println("3.");

     System.out.print("Enter Another integer: ");

     int userNum2 = input.nextInt();

     System.out.println(userNum+" + "+userNum2+" is "+(userNum + userNum2));

     System.out.println(userNum+" * "+userNum2+" is "+(userNum * userNum2));

     

   }

}

Explanation:

This enables the program accept inputs

     Scanner input = new Scanner(System.in);

This signifies the beginning of number 1

     System.out.println("1.");

Variable userNum is declared as type integer

     int userNum;

The line prompts the user for input

     System.out.print("Enter Integer: ");

The line accepts the input

     userNum = input.nextInt();

This line displays user input

     System.out.println("You entered: "+userNum);

     

This signifies the beginning of number 2

     System.out.println("2.");

This line prompts the user for input

     System.out.print("Enter Integer: ");

This line accepts input

     userNum = input.nextInt();

This line prints user input (as required in number 2)

     System.out.println("You entered: "+userNum);

This line calculates and prints the square of user input

     System.out.println(userNum+" squared is "+(userNum * userNum));

This line calculates and prints the cube of user input

     System.out.println("And "+userNum+" cubed is "+(userNum * userNum * userNum)+"!!");

     

This signifies the beginning of number 3

     System.out.println("3.");

This line prompts the user for another integer value

     System.out.print("Enter Another integer: ");

This line accepts the input from the user

     int userNum2 = input.nextInt();

This line adds the two inputs by the user and displays the result

     System.out.println(userNum+" + "+userNum2+" is "+(userNum + userNum2));

This line multiplies the two inputs by the user and displays the result

     System.out.println(userNum+" * "+userNum2+" is "+(userNum * userNum2));

A vowel word is a word that contains every vowel. Some examples of vowel words are sequoia, facetious, and dialogue. Determine if a word input by the user is a vowel word.

Answers

Answer:

vowels = ("a", "e", "i", "o", "u")

word = input("Enter a word: ")

is_all = True

for c in vowels:

   if c not in word:

       is_all = False

if is_all == True:

   print(word + " is a vowel word.")

else:

   print(word + " is not a vowel word.")

Explanation:

Initialize a tuple, vowels, containing every vowel

Ask the user to enter a word

Initially, set the is_all as True. This will be used to check, if every vowel is in word or not.

Create a for loop that iterates through the vowels. Inside the loop, check if each vowel is in the word or not. If one of the vowel is not in the vowels, set the is_all as False.

When the loop is done, check the is_all. If it is True, the word is a vowel word. Otherwise, it is not a vowel word.

How does computer mouse impact the world, society and health?

Answers

Explanation:

Without it, we may have endured convoluted keyboard commands for years, greatly hindering the process of bringing the PC into homes everywhere. The mouse revolutionized computer interfaces, simplified an otherwise scary machine, and helped connect the world.

Define stubs for the functions get_user_num) and compute_avg). Each stub should print "FIXME: Finish function_name" followed by a newline, and should return -1. Each stub must also contain the function's parameters Sample output with two calls to get_user_num) and one call to compute_avg): FIXME: Finish get_user_num() FIXME: Finish get_user_num() FIXME: Finish compute_avg() Avg: -1 1 ' Your solution goes here '' 2 4 user_num1 = 0 5 user_num2 = 0 6 avg_result = 0 7 8 user_num1 = get_user_num 9 user_num2 = get_user_num ) 10 avg_result = compute_avg(user_num1, user_num2) 11 12 print'Avg:', avg_result)|

Answers

Answer:

Here are the stub functions get_user_num() and compute_avg()

def get_user_num():

   print('FIXME: Finish get_user_num()')

   return -1  

def compute_avg(user_num1, user_num2):

   print('FIXME: Finish compute_avg()')

   return -1

Explanation:

A stub is a small function or a piece of code which is sometimes used in program to test a function before its fully implemented. It can also be used for a longer program that is to be loaded later. It is also used for a long function or program that is remotely located. It is used to test or simulate the functionality of the program.  

The first stub for the function get_user_num() displays FIXME: Finish get_user_num() and then it returns -1.

The seconds stub for the function compute_avg() displays the FIXME: Finish compute_avg() and then it returns -1.

Here with each print statement, there is function name after this FIXME: Finish line. The first function name is get_user_num and the second is compute_avg().

Next the function get_user_num() is called twice and function compute_avg() followed by a print statement: print('Avg:', avg_result) which prints the result. So the program as a whole is given below:

def get_user_num():

   print('FIXME: Finish get_user_num()')

   return -1  

def compute_avg(user_num1, user_num2):

   print('FIXME: Finish compute_avg()')

   return -1  

user_num1 = 0  # the variables are initialized to 0

user_num2 = 0

avg_result = 0  

user_num1 = get_user_num()  #calls get_user_num method

user_num2 = get_user_num()

avg_result = compute_avg(user_num1, user_num2)  

print('Avg:', avg_result)

The method get_user_num() is called twice so the line FIXME: Finish get_user_num() is printed twice on the output screen. The method compute_avg() is called once in this statement avg_result = compute_avg(user_num1, user_num2)   so the line FIXME: Finish compute_avg() is printed once on the output screen. Next the statement print('Avg:', avg_result) displays Avg: -1. You can see in the above program that avg_result = compute_avg(user_num1, user_num2)   and compute_avg function returns -1 so Avg= -1. The program along with the produced outcome is attached.

For each of these relations on the set {21,22,23,24},decide whether it is re- flexive, whether it is symmetric, whether it is antisymmetric, and whether it is transitive.1. {(22, 22), (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)} 2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}

Answers

Answer:

1. {(22, 22) (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)} : Not reflective, Not symmetric, Not anti-symmetric, Transitive.

2.  {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}: Reflective, symmetric.

Explanation:

Solution

Reflective: Of every element matched to its own element

Symmetric: For every (a,b) there should be (b,a)

Anti-symmetric: For every (a,b) there should not be (b,a)

Transitive: For every (a,b) ∈R and (b,c)∈ R -then (a,c) ER for all a, b, c ∈ A

Now,

1.{(22, 22) (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)}

Not Reflective: This is because we don't have (21,21) (23,23) and (24,24)

Not symmetric: Because we don't have (23,24) and (24,23)

Not anti symmetric: We have both (22,23) and (23,22)

Transitive: It is either 22 or 23 be (a,b) and 24 (b,a)

2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}

Reflective: For all we have (a,a)

Symmetric: For every (a,b) we have (b,a)

Not Anti-symmetric

Transitive

The purpose of validating the results of the program is Group of answer choices To create a model of the program To determine if the program solves the original problem To correct syntax errors To correct runtime errors

Answers

Answer:

To determine if the program solves the original problem

Explanation:

Required

Essence of validating a program

From list of given options, only the above option best describes the given illustration.

When a program is validated, it means that the results of the program are tested to meet the requirements of the user;

For a program to be validated, it means it has passed the stage of error checking and correction; whether syntax or run time errors;

However, when modifications are made, the program will need to be re-validated to ensure that it comports with its requirements.

Create an application named ArithmeticMethods whose main() method holds two integer variables. Assign values to the variables. In turn, pass each value to methods named displayNumberPlus10(), displayNumberPlus100(), and displayNumberPlus1000(). Create each method to perform the task its name implies. Save the application as ArithmeticMethods.java.

Answers

Answer:

public class ArithmeticMethods

{

public static void main(String[] args) {

    int number1 = 7;

    int number2 = 28;

 displayNumberPlus10(number1);

 displayNumberPlus10(number2);

 displayNumberPlus100(number1);

 displayNumberPlus100(number2);

 displayNumberPlus1000(number1);

 displayNumberPlus1000(number2);

}

public static void displayNumberPlus10(int number){

    System.out.println(number + 10);

}

public static void displayNumberPlus100(int number){

    System.out.println(number + 100);

}

public static void displayNumberPlus1000(int number){

    System.out.println(number + 1000);

}

}

Explanation:

Inside the main:

Initialize two integers, number1 and number2

Call the methods with each integer

Create a method called displayNumberPlus10() that displays the sum of the given number and 10

Create a method called displayNumberPlus100() that displays the sum of the given number and 100

Create a method called displayNumberPlus1000() that displays the sum of the given number and 1000

#Write a function called 'string_type' which accepts one #string argument and determines what type of string it is. # # - If the string is empty, return "empty". # - If the string is a single character, return "character". # - If the string represents a single word, return "word". # The string is a single word if it has no spaces. # - If the string is a whole sentence, return "sentence". # The string is a sentence if it contains spaces, but # at most one period. # - If the string is a paragraph, return "paragraph". The # string is a paragraph if it contains both spaces and # multiple periods (we won't worry about other # punctuation marks). # - If the string is multiple paragraphs, return "page". # The string is a paragraph if it contains any newline # characters ("\n"). # #Hint: think carefully about what order you should check #these conditions in. # #Hint 2: remember, there exists a count() method that #counts the number of times a string appears in another #string. For example, "blah blah blah".count("blah") #would return 3.

Answers

Answer:

I am writing a Python program:

def string_type(string):

   if string=="":  //if the string is empty

       return "empty"

   elif string.count(".")>1:  #if the period sign occurs more than once in string

       if string.count("\n"):  #checks if the new line occurs in the string

           return "page"  #if both the above cases are true then its a page

       return "paragraph"  # if the period sign condition is true then its a para

   elif string.count(" ")>=1:  #if no of spaces in string occur more than once

       return "sentence"  #returns sentence

   elif len(string)==1:  # if length of the string is 1 this

       return "character"  #returns character

   else:  #if none of the above conditions is true then its a word

       return "word" #returns word

Explanation:

def string_type(string):  this is the definition of method string_type which takes a string as argument and determines whether the type of string is a word, paragraph, page, sentence or empty.

if string=="" this if condition checks if the string is empty. If this condition is true then the method returns "empty"

elif string.count(".")>1  This condition checks if the string type is a paragragh

string.count(".")>1   and if string.count("\n") both statements check if the string type is a page.

Here the count() method is used which is used to return the number of times a specified string or character appears in the given string.

Suppose the string is "Paragraphs need to have multiple sentences. It's true.\n However, two is enough. Yes, two sentences can make a paragraph."

The if condition first checks if count(".")>1 which means it counts the occurrence of period i.e. "." in the string. If the period occurs more than once this means it could be a page. But it could also be a paragraph so in order to determine the correct string type another if statement if string.count("\n") inside elif statement determines if the string is a page or not. This statement checks the number of times a new line appears in the string. So this distinguishes the string type paragraph from string type page.

elif string.count(" ")>=1: statement determines if the string is a sentence. For example if the string is "i love to eat apples." count() method counts the number of times " " space appears in the string. If the space appears more than once this means this cannot be a single word or a character and it has more than one words. So this means its a sentence.

  elif len(string)==1:  this else if condition checks the length of the string. If the length of the string is 1 this means the string only has a single character. Suppose string is "!" Then the len (string) = 1 as it only contains exclamation mark character. So the method returns "character" . If none of the above if and elif conditions evaluates to true then this means the string type is a word.

Answer:

def string_type(string):

  if string=="":  //if the string is empty

      return "empty"

  elif string.count(".")>1:  #if the period sign occurs more than once in string

      if string.count("\n"):  #checks if the new line occurs in the string

          return "page"  #if both the above cases are true then its a page

      return "paragraph"  # if the period sign condition is true then its a para

  elif string.count(" ")>=1:  #if no of spaces in string occur more than once

      return "sentence"  #returns sentence

Explanation:

More than one component in a particular automotive electric circuit is not working. Technician A starts testing the circuit at the power source. Technician B starts testing the circuit at its load. Who is right?

Answers

Hi there! Hopefully this helps!

--------------------------------------------------------------------------------------------------

The answer is A, testing the circuit at the power source.

When introducing new devices to the network, the organization's security policy requires that devices be monitored to establish normal traffic patterns for the device. Which of the following is generated from initial monitoring?
A. SLA
​B. Baseline
​C. Forensic log
D. Vulnerability assessment

Answers

Answer:

The answer is "Option B".

Explanation:

The Baseline measurement is an essential characteristic of effective coal company monitoring programs to assess the degree of mining effects and keep on improving effect monitoring the system will continue to be modified via periodical analyses, and the wrong choices can be defined as follows:

In choice A, it is wrong because it used in 3D printing technology. In choice C, it is used to analyze the log entities, that's why it is wrong. In choice D, it is used to analyze the security weaknesses, that's why it's wrong.

A network technician is designing a network for a small company. The network technician needs to implement an email server and web server that will be accessed by both internal employees and external customers. Which of the following would best secure the internal network and allow access to the needed servers?
A. Implementing a site-to-site VPN for server access.B. Implementing a DMZ segment for the server.C. Implementing NAT addressing for the servers.D. Implementing a sandbox to contain the servers.

Answers

Answer:

Option A (Implementing a site-to-site VPN for server access) seems to be the correct choice.

Explanation:

A site-to-site configuration is something that a single Open VPN network links several more separate networks linked. Technologies through one network will access machines in all the other computer systems in that connection model, including conversely. Implementing this would be extremely straightforward, for as much further even though Access Server was indeed implicated.The much more challenging aspect happens when interacting regarding firewalls including privacy filtering methods, as well as modifying the forwarding table in internet gateways, as several of them from different manufacturers but instead prototypes which they may not be able to log many of these.This rather gateway device uses an Open VPN with a Linux VPN client, to create a connection between various channels. If someone's server hardware is also measured accurately then perhaps a site-to-site configuration could be accomplished which works straightforwardly throughout all systems in both cable systems.

Other choices are not related to the given instance. So that Option A would be the right one.

Assume that a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions. How much faster should we run the floating-point instructions to execute entire program 1.25 times faster

Answers

Answer:

the floating-point instructions  should be run 1.5 times faster in order to execute entire program 1.25 times faster

Explanation:

Given that:

a program consists of integer and floating-point instructions. 60% of the total execution time is spent on floating point instructions and the remaining 40% is on integer instructions.

Let the integer be the total execution time = V

The  floating-point instructions = 60%

The integer instruction = 40%

The time spent on the floating-point instruction = 60/100 × V

= 0.6 V

The time spent on t he integer instruction = 40/100 × V

= 0.4 V

However; How much faster should we run the floating-point instructions to execute entire program 1.25 times faster

If we are to execute the entire program 1,25 times faster;

The new execution time = V/1.25

Assuming the new time spent on floating-point instruction = W

W + 0.4 V = V/1.25

W = V/1.25 - 0.4 V

W = (V - 0.5V)/1.25

W = 0.4V

the new time spent on floating-point instruction = W = 0.4 V

The speed required to make the floating -point instruction to run faster = 0.6V/.4 V

= 1.5

Hence,  the floating-point instructions  should be run 1.5 times faster in order to execute entire program 1.25 times faster

Identify and write the errors given in the flowchart (with steps and flowchart) : Start ↓ Input A,B ↓ Average = (A + B + C) / 3 ↓ Print Average ↓ Stop

Answers

Answer:

i will send you the answers in the next 10minute

The best way to avoid driving impaired is to...
A. avoid drinking.
B. stay under the legal BAC limit.
C. keep a taxi fare on hand.

Answers

Answer:

the answer is A avoid drinking 10 Tips to Avoid Driving Drunk

Explanation:

Give someone your keys. Find someone trustworthy who isn't drinking and hand over your keys for the night. ...

Don't drink on an empty stomach. ...

Know your body and pace yourself. ...

Take public transit. ...

Spend the night. ...

Wait an hour or two. ...

Stop drinking 90 minutes before you plan to leave. ...

Take the night off from drinking. hope this helps you :)

TLS does not require mutual authentication. Only server must authenticate its public key to the client. Client is authenticated by the application via a password. The most common way for public key authentication would be a. a photo ID. b. a password. c. a certificate. d. biometrics.

Answers

Answer:

c. a certificate.

Explanation:

Public key infrastructure authentication is intended to make transactions occurring through the internet as secure as possible. Public keys are usually assigned to entities like business firms or individuals, and digital certificates are given to them as proof that they have been authenticated.

A certificate authority has the role of signing, storing, and issuing digital certificates. A software or humans could be charged with the responsibility of actually ensuring a key to user binding if all conditions are satisfied.

Because Java byte code is the same on all computers, compiled Java programs Group of answer choices Cannot run on Linux systems Must be re-compiled for each different machine it is run on Are highly portable Are non-existent

Answers

Answer:

Are highly portable.

Explanation:

Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995.

Java was designed by a software engineer called James Gosling and it is originally owned by Oracle. Also, worthy of mention is the fact that Java was originally known as Oak.

Generally, Java as a software application usually are developed having a ".jar", ".class" or ".java" filename extensions.

Because Java byte code is the same on all computers, compiled Java programs are highly portable. This simply means that, the Java byte code was designed such that it has very few implementation dependency, thus, once the code is written, it can run on all computer platforms that supports the Java programming language.

Hence, the Java byte code is a write once, run anywhere software program.

The Java byte code instructions are read and executed by a computer program known as a Java Virtual Machine (JVM).

Additionally, Java program is used for developing varieties of applications such as, mobile, desktop, games, web and application servers etc.

The UNIX operating system started the concept of socket which also came with a set of programming application programming interface (API) for 'socket level' programming. A socket was also uniquely identified:

a. as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.
b. the port number to clearly identify which application is using TCP.
c. IP address to make sure the Internet device using the socket is delineated.
d. the access network, such as Ethernet or Wi-Fi so that multiple LAN devices could be installed on a single computer.

Answers

Answer:

(a). as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.

Explanation:

The explanation is in the answer.

Select the option that is not true. 1. Timestamp and Validation schedulers are both optimistic schedulers. 2. Timestamp and Validation schedulers can be used to remove physically unrealizable behaviour. 3. Timestamp and Validation schedulers guarantee serializability. 4. Timestamp and Validation schedulers perform most effectively on transactions that perform writes.

Answers

Answer:

3. Timestamp and Validation schedulers guarantee serializability.

Explanation:

Timestamp is a sequence of information encoded when a certain event occurs at a given time that information is decoded and message is identified. Time schedulers is optimistic scheduler and it removes physically unrealizable behavior. Timestamp cannot guarantee serializability.  It can detect unrealizable behavior.

The following code uses a nested if statement.

if (employed == 'Y')
cout << "Employed!" << endl;

else if (employed == 'N')
cout << "Not Employed!" << endl;

else
cout << "Error!" << endl;

a. True
b. False

Answers

Answer:

true

Explanation:

else if used so I think it's true

Write a program that asks the user to input a positive integer and then calculates and displays the factorial of the number. The program should call a function named getN

Answers

Answer:

The program is written in python and it doesn't make use of any comment;

(See explanation section for line by line explanation)

def getN(num):

     fact = 1

     for i in range(1, 1 + num):

           fact = fact * i

     print("Factorial: ",fact)

num = int(input("Number: "))

if num < 0:

     print("Invalid")

else:

     getN(num)

Explanation:

The function getNum is defined here

def getN(num):

Initialize the result of the factorial to 1

     fact = 1

Get an iteration from 1 to the user input number

     for i in range(1, 1 + num):

Multiply each number that makes the iteration

           fact = fact * i

Print result

     print("Factorial: ",fact)

Ths line prompts user to input number

num = int(input("Number: "))

This line checks if user input is less than 0; If yes, the program prints "Invalid"

if num < 0:

     print("Invalid")

If otherwise, the program calls the getN function

else:

     getN(num)

a. A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2, 048 sectors and there are 131, 072 (2^17) tracks per surface. A block holds 512 bytes. The disk is not "zoned." What is the total capacity of this disk?

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (That, is, what is the capacity of one cylinder?)

Answers

Answer:

Explanation:

Given that:

number of surfaces on a hard disk = 4

number of sectors = 2048 sectors

number of tracks per surface = 131, 072 (2^17)

a block holds 512 bytes.

Since, 'The disk is not "zoned.".....

then, Number of bytes / sector = 512

a) What is the total capacity of this disk?

The total capacity of the disk is:[tex]= 4 \ surfaces \times 131072 \dfrac{tracks}{surfaces} \times 2048 \dfrac{sector}{tracks} \times 512 \dfrac{bytes}{sector}[/tex]

[tex]= 5.49755814\times 10^{11} \ bytes[/tex]

= 549755814 KB ( kilobytes)

= 549755.814 MB (megabytes)

=549.755814  GB (gigabytes)

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (i.e what is the capacity of one cylinder?)

The capacity of one cylinder can be estimated by determining the capacity of one surface and the capacity of one track.

The capacity of one surface = [tex]131072\dfrac{tracks}{surface} \times 2048 \dfrac{sector}{tracks} \times 512\dfrac{bytes}{sector}[/tex]

The capacity of one surface = [tex]1.37438953 \times 10^{11[/tex] byte = 137.44 GB

Capacity of one track = 2048 sectors/track × 512 bytes/sector

Capacity of one track = 1048576 Bytes/track

Capacity of one track =1048 KB/track

Capacity of one track ≅ 1 MB/track

Since the hard disk contains four surfaces

capacity of one cylinder = 1 MB/track × 4 track/cylinder

capacity of one cylinder  = 4 MB

Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a corporate network.

Answers

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

Advantage:-

Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning. Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets. Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

Disadvantage:-  

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.

Answers

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

what kind of company would hire an information support and service employee?


-software development


-computer repair


-website development


-network administration

Answers

Answer:

it's a

Explanation:

any element that has a starting tag and does not have a closing tag is called a ?
pls be quick guys​

Answers

Answer:

Any element that has a starting tag and doesn't have a closing tag is called a empty element.

:)

"The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "

Answers

Question:

"The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "

A) a[0]..a[a.length]

B) a()

C) a

D) a[]  

Answer:

The correct answer is A.

An example is given in the attachment.

Cheers!

What is the output of the following Python statements? def recurse(a): if (a == 0): print(a) else: recurse(a) recurse(0)

Answers

Answer:

d) 0 1 1 2

The above piece of code prints the Fibonacci series.

Explanation:

def a(n):

   if n == 0:

       return 0

   elif n == 1:

       return 1

   else:

       return a(n-1)+a(n-2)

for i in range(0,4):

   print(a(i),end=" ")

6. A distribution consists of three components with frequencies 200, 250 and 300 having means
25,10, and 15 and standard deviations 3, 4, and 5 respectively.
Calculate
The mean?
The standard deviation?​

Answers

Answer:

The mean  = 16

The standard deviation = 7.19

Explanation:

N1 = 200  X1 = 25   σ1 = 3

N2= 250  X2 = 10   σ2 = 4

N3 = 300  X3= 15   σ3 = 5

The mean of a combined distribution is given by:

[tex]X = \frac{X_1N_1+X_2N_2+X_3N_3}{N_1+N_2+N_3}\\X = \frac{25*200+10*250+15*300}{200+250+300}\\X=16[/tex]

The differences from the mean for each component are:

[tex]D_1 = 25-16=9\\D_2=10-16=-6\\D_3=15-16=-1[/tex]

The standard deviation of a combined distribution is given by:

[tex]\sigma=\sqrt{\frac{N_1(\sigma_1^2+D_1^2)+N_2(\sigma_2^2+D_2^2)+N_3(\sigma_3^2+D_3^2)}{N_1+N_2+N_3}}\\\sigma=\sqrt{\frac{200(3^2+9^2)+250(4^2+(-6)^2)+300(5^2+(-1)^2)}{200+250+300}}\\\sigma=\sqrt{\frac{18000+13000+7800}{750} }\\\sigma=7.19[/tex]

The mean  = 16

The standard deviation = 7.19

Other Questions
hey mate answer te question please Fill in the blank in the following sentence with the appropriate preterite verb below. La policia _____ al ladron. What is the value of the var variable after the execution of the following snippet of code:int var;var = -1;var = var - 1;var = var - var; It is believed that 11% of all Americans are left-handed. In a random sample of 100 students from a particular college with 10123 students, 14 were left-handed. Find a 98% confidence interval for the percentage of all students at this particular college who are left-handed. Which is one way that media has influenced acceptance of different sexual orientations? a)including more LGBTQ characters as comic relief b)having more LGBTQ characters in lead roles c)showing more LGBTQ characters in negative roles d)showing more same sex couples experiencing divorce Which word correctly completes this sentence? l es Juan, mi ____________ de la universidad. A. amigo B. hermana C. conocida D. novia A species of fish evolved over thousands of years to have gills that allowed the fish to swim deep in the sea. Whats the effect of this development on deep-water resources?The fish developed the gills because of____ . Because the fish are now able to swim in deep water, their ____ in shallower water will have less food. Likewise, competition for food among deep-water fish that eat the same types of food will ____.1. A. genetic modificationB. hybridizationC. natural selection2.A . competitors B. predators c.prey3a .increase b. decreaseC. not change Two points A (-2, 9) and B (4, 8) lie on a line l.Find the distance between points A and B. Please I need help in this question, Best answer gets BRAINLIEST Which two undefined geometric terms always describe figures with no beginning or end? Ardem has two lights one flashes every 15 seconds the other flashes every 42 seconds. They start flashing at the same time. After how many seconds will they next flash at the same time?? Jada solved the equation Negative StartFraction 4 over 9 EndFraction = StartFraction x over 108 EndFraction for x using the steps below. What was Jada's error? Why is participation essential in a democracy? Pls help me I need the help! Write 0000 using the am/pm clock. Find the 13th term of the geometric sequence 4, -8, 16 Which sentence in this excerpt from Mark Twain's "The 1,000,000 Bank-Note" is an example of hyperbole? I would have picked up the pear now and eaten it before all the world, but it was gone; so I had lost that by this unlucky business, and the thought of it did not soften my feeling toward those men. As soon as I was out of sight of that house I opened my envelope, and saw that it contained money! My opinion of those people changed, I can tell you! I lost not a moment, but shoved note and money into my vest-pocket, and broke for the nearest cheap eating-house. Well, how I did eat! When at last I couldn't hold any more, I took out my money and unfolded it, took one glimpse and nearly fainted. Five millions of dollars! Why, it made my head swim. I must have sat there stunned and blinking at the note as much as a minute before I came rightly to myself again. The first thing I noticed, then, was the landlord. His eye was on the note, and he was petrified. He was worshiping, with all his body and soul, but he looked as if he couldn't stir hand or foot. I took my cue in a moment, and did the only rational thing there was to do. I reached the note towards him, and said, carelessly: "Give me the change, please." 19.25 tons equal Lbs Find the area of the figure. Round to the nearest tenth if necessary. Use 3.14 for pi . 47.3 units2 41.1 units2 57.1 units2 66.2 units2 Sheboygan Co. purchased a new vehicle at a cost of $42,000 on July 1. The vehicle is estimated to have a useful life of 6 years and a salvage value of $3,000. The company uses the straight-line method of depreciation. How much depreciation expense will be recorded for the vehicle during the first year ended December 31?