A.
do you want a physical copy of your work
Answer:
A
Explanation:
you want a large, unlimited audience.
The UNIX operating system started the concept of socket which also came with a set of programming application programming interface (API) for 'socket level' programming. A socket was also uniquely identified:
a. as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.
b. the port number to clearly identify which application is using TCP.
c. IP address to make sure the Internet device using the socket is delineated.
d. the access network, such as Ethernet or Wi-Fi so that multiple LAN devices could be installed on a single computer.
Answer:
(a). as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.
Explanation:
The explanation is in the answer.
Calculator Create a program that calculates three options for an appropriate tip to leave after a meal at a restaurant.
Specifications:
a. The program should calculate and display the cost of tipping at 15%, 20%, or 25%.
b. Assume the user will enter valid data.
c. The program should round results to a maximum of two decimal places.
Answer:
I am writing a Python program:
print("Tip Calculator \n")
bill = float(input("Cost of meal: "))
tip15pc = bill * 0.15
tip20pc = bill * 0.20
tip25pc = bill * 0.25
print("\n15%")
print("Tip amount: %.2f"% (tip15pc))
print("Total amount: %.2f \n" % (bill + tip15pc))
print("20%")
print("Tip amount: %.2f"% (tip20pc))
print("Total amount: %.2f \n" % (bill + tip20pc))
print("25%")
print("Tip amount: %.2f"% (tip25pc))
print("Total amount: %.2f" % (bill + tip25pc))
Explanation:
The program first prints the message: Tip Calculator
bill = float(input("Cost of meal: ")) This statement prompts the user to enter the amount of the bill of meal. The input value is taken as decimal/floating point number from user.
tip15pc = bill * 0.15 This statement calculates the cost of tipping at 15%
tip20pc = bill * 0.20 This statement calculates the cost of tipping at 20%
tip25pc = bill * 0.25 This statement calculates the cost of tipping at 25%
print("\n15%") This statement prints the message 15%
print("Tip amount: %.2f"% (tip15pc)) this statement displays the amount of tip at 15% and the value is displayed up to 2 decimal places as specified by %.2f
print("Total amount: %.2f \n" % (bill + tip15pc)) This statement prints the total amount by adding the cost of mean with the 15% tip amount.
The program further computes the the amount of tip at 20% and 25%. The resultant values are displayed up to 2 decimal places as specified by %.2f Then the program prints the total amount by adding the cost of mean with the 20% and 25% tip amounts just as computed for the 15% tip.
The screenshot of the program as well as its output is attached.
Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a corporate network.
Answer:
A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.
Explanation:
A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.
Advantage:-
Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning. Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets. Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.Disadvantage:-
That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.
A vowel word is a word that contains every vowel. Some examples of vowel words are sequoia, facetious, and dialogue. Determine if a word input by the user is a vowel word.
Answer:
vowels = ("a", "e", "i", "o", "u")
word = input("Enter a word: ")
is_all = True
for c in vowels:
if c not in word:
is_all = False
if is_all == True:
print(word + " is a vowel word.")
else:
print(word + " is not a vowel word.")
Explanation:
Initialize a tuple, vowels, containing every vowel
Ask the user to enter a word
Initially, set the is_all as True. This will be used to check, if every vowel is in word or not.
Create a for loop that iterates through the vowels. Inside the loop, check if each vowel is in the word or not. If one of the vowel is not in the vowels, set the is_all as False.
When the loop is done, check the is_all. If it is True, the word is a vowel word. Otherwise, it is not a vowel word.
"The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "
Question:
"The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "
A) a[0]..a[a.length]
B) a()
C) a
D) a[]
Answer:
The correct answer is A.
An example is given in the attachment.
Cheers!
Write a method called listUpper() that takes in a list of strings, and returns a list of the same length containing the same strings but in all uppercase form. You can either modify the provided list or create a new one.
Answer:
public static List<String> listUpper(List<String> list){
List<String> upperList = new ArrayList<String>();
for(String s:list){
s = s.toUpperCase();
upperList.add(s);
}
return upperList;
}
Explanation:
Create a method named listUpper that takes list as a parameter
Inside the method, initialize a new list named upperList. Create a for-each loop that iterates through the list. Inside the loop, convert each string to uppercase, using toUpperCase method, and add it to the upperList.
When the loop is done, return the upperList
A technician is troubleshooting a computer that will not communicate with any hosts on the local network. While performing a visual inspection of the system, the technician notices no lights are lit on the computer's wired NIC."Which of the following are possible steps the technician should take to resolve this issue? (Select TWO.)
a. Check for APIPA assignment on the computer.
b. Ping the default gateway router. (this one is wrong)
c. Verify the NIC is enabled in system BIOS.
d. Verify the NIC is connected to the keystone jack. (this one is right)
e. Verify the network patch cable is wired as T568A.
Answer:
Assuming that D is correct, the other answer is C.
Explanation:
I used Dell Support to confirm this.
It states that if the lights are off, it is not detecting the network and no connection is in place. You would want to confirm the NIC is enabled in the BIOS (as C states).
I hope this helps!
If you are asked to design an optimal workflow using technology for a car accident claim process, what factors would you consider to build into the solution? Explore existing workflow technology and discuss which software solutions meet the workflow requirements?
Answer:
The factors to consider when building a solution for optical workflow for car accident are the type of claim to be modelled, also to examine the level of automation in vehicles.
Some of the software solutions that meet the requirements are the A1 Tracker which is very effective to the enterprise business and small business working with insurance. we also have the Mutual expert, Ninja Quote.
Explanation:
Solution
In suggesting an optical workflow for the car accident claim process it is of importance to understand the following factors such as, the type of claim to be modelled, it will be determined by the policy that the clients have for their cars. this will assist in classifying the workflow and giving a clear path of the design.
The number of expected claims is also a very important factor that should be added in the design. Another important factor to examine the level of automation of the vehicles, this can be very useful in collecting the accident data in a more efficient way and also making it simple to design the model.
Presently there are several workflow softwares in the insurance that have encouraged a great deal and have made the workflow in the insurance companies more greater.
Some of the soft wares are the A1 Tracker which are very effective and efficient in are highly applicable to the enterprise business and small business working with insurance, the software is convenient in monitoring the work progress in the company.
The other soft wares that have been quite useful in the industry for example the Insly, ISI enterprise, Mutual expert, Ninja Quoter among others. These software are some of the best soft wares available in the market that have met the workflow requirement in the insurance sector.
If productCost and productPrice are numeric variables, and productName is a string variable, which of the following statements are valid assignments? If a statement is not valid, explain why not.
a. productCost =100
b. productPrice= productCost
c. productPrice= productName
d. productiPrice =24.95
e. 15.67= productCost
f. productCost= $ 1,345.52
g. product Cost= productPrice -10
h. productName= "mouse pad"
i. productCost + 20= productPrice
j. productName= 3 -inch natis
k. productName =43
l. productName =" 44 n
m. " 99 "= productName
a. productCost = 100
b. productPrice = productCost
c. productPrice = productName
d. productPrice = “24.95”
e. 15.67 = productCost
f. productCost = $1, 345.52
g. product Cost = productPrice − 10
h. productName = “mouse pad”
i. productCost + 20 = productPrice
j. productName = 3-inch nails
k. productName = 43
l. productName = “44”
m.“99” = productName
Answer:
(a) valid
(b) valid
(c) invalid
(d) valid
(e) invalid
(f) invalid
(g) invalid
(h) valid
(i) invalid
(j) invalid
(k) invalid
(l) valid
(m) invalid
Explanation:
(a) valid. Since productCost is a numerical variable, a value of 100 can be assigned to it.
(b) valid. Both productCost and productPrice are numerical variables and as such value of one can be stored in the other.
(c) invalid. productName is a string variable and cannot be directly assigned to productPrice which is a numeric variable.
(d) valid. productPrice is a numeric variable and 24.95 can be assigned to it.
(e) invalid. 15.67 is not a variable name and as such cannot have values assigned to it.
(f) invalid. $ and , are not numeric digits and as such cannot be assigned to productCost which is numeric.
(g) invalid. There should be no space between product and Cost. It should be productCost and not product Cost.
(h) valid. "mouse pad" is a string literal and can be assigned to productName which is a string variable.
(i) invalid. productCost + 20 is not a variable .
(j) invalid. 3-inch nails should be in quotes for it to be assignable to productName.
(k) invalid. 43 is a numeric literal and cannot be directly assigned to productName which is a string variable. In other words, 43 should be in quotes for it to be assignable to productName.
(l) valid. 44 (in quotes) is a string literal and can be assigned to productName which is a string variable.
(m) invalid. "99" is not a variable name and cannot hold or be assigned any value.
intext:"The browser feature which enables tabs to work independently from one another so if one crashes, the others may continue to work is known as"
A contracting company recently completed it's period of performance on a government contract and would like to destroy all information associated with contract performance Which of the following is the best NEXT step for the company to take?
A. Consult data disposition policies in the contract
B. Use a pulper or pulverizer for data destruction
C. Retain the data for a period of no more than one year.
D. Burn hard copies containing PII or PHI
Answer: A. Consult data disposition policies in the contract
Explanation:
This is a Government Contract and as such may be subject to certain restrictions on how information should be handled or even destroyed.
The first thing the company should do therefore is to check the Data Disposition Policies that were included in the contract to see if and how they are to destroy the data and then proceed from there.
#Write a function called 'string_type' which accepts one #string argument and determines what type of string it is. # # - If the string is empty, return "empty". # - If the string is a single character, return "character". # - If the string represents a single word, return "word". # The string is a single word if it has no spaces. # - If the string is a whole sentence, return "sentence". # The string is a sentence if it contains spaces, but # at most one period. # - If the string is a paragraph, return "paragraph". The # string is a paragraph if it contains both spaces and # multiple periods (we won't worry about other # punctuation marks). # - If the string is multiple paragraphs, return "page". # The string is a paragraph if it contains any newline # characters ("\n"). # #Hint: think carefully about what order you should check #these conditions in. # #Hint 2: remember, there exists a count() method that #counts the number of times a string appears in another #string. For example, "blah blah blah".count("blah") #would return 3.
Answer:
I am writing a Python program:
def string_type(string):
if string=="": //if the string is empty
return "empty"
elif string.count(".")>1: #if the period sign occurs more than once in string
if string.count("\n"): #checks if the new line occurs in the string
return "page" #if both the above cases are true then its a page
return "paragraph" # if the period sign condition is true then its a para
elif string.count(" ")>=1: #if no of spaces in string occur more than once
return "sentence" #returns sentence
elif len(string)==1: # if length of the string is 1 this
return "character" #returns character
else: #if none of the above conditions is true then its a word
return "word" #returns word
Explanation:
def string_type(string): this is the definition of method string_type which takes a string as argument and determines whether the type of string is a word, paragraph, page, sentence or empty.
if string=="" this if condition checks if the string is empty. If this condition is true then the method returns "empty"
elif string.count(".")>1 This condition checks if the string type is a paragragh
string.count(".")>1 and if string.count("\n") both statements check if the string type is a page.
Here the count() method is used which is used to return the number of times a specified string or character appears in the given string.
Suppose the string is "Paragraphs need to have multiple sentences. It's true.\n However, two is enough. Yes, two sentences can make a paragraph."
The if condition first checks if count(".")>1 which means it counts the occurrence of period i.e. "." in the string. If the period occurs more than once this means it could be a page. But it could also be a paragraph so in order to determine the correct string type another if statement if string.count("\n") inside elif statement determines if the string is a page or not. This statement checks the number of times a new line appears in the string. So this distinguishes the string type paragraph from string type page.
elif string.count(" ")>=1: statement determines if the string is a sentence. For example if the string is "i love to eat apples." count() method counts the number of times " " space appears in the string. If the space appears more than once this means this cannot be a single word or a character and it has more than one words. So this means its a sentence.
elif len(string)==1: this else if condition checks the length of the string. If the length of the string is 1 this means the string only has a single character. Suppose string is "!" Then the len (string) = 1 as it only contains exclamation mark character. So the method returns "character" . If none of the above if and elif conditions evaluates to true then this means the string type is a word.
Answer:
def string_type(string):
if string=="": //if the string is empty
return "empty"
elif string.count(".")>1: #if the period sign occurs more than once in string
if string.count("\n"): #checks if the new line occurs in the string
return "page" #if both the above cases are true then its a page
return "paragraph" # if the period sign condition is true then its a para
elif string.count(" ")>=1: #if no of spaces in string occur more than once
return "sentence" #returns sentence
Explanation:
Define stubs for the functions get_user_num) and compute_avg). Each stub should print "FIXME: Finish function_name" followed by a newline, and should return -1. Each stub must also contain the function's parameters Sample output with two calls to get_user_num) and one call to compute_avg): FIXME: Finish get_user_num() FIXME: Finish get_user_num() FIXME: Finish compute_avg() Avg: -1 1 ' Your solution goes here '' 2 4 user_num1 = 0 5 user_num2 = 0 6 avg_result = 0 7 8 user_num1 = get_user_num 9 user_num2 = get_user_num ) 10 avg_result = compute_avg(user_num1, user_num2) 11 12 print'Avg:', avg_result)|
Answer:
Here are the stub functions get_user_num() and compute_avg()
def get_user_num():
print('FIXME: Finish get_user_num()')
return -1
def compute_avg(user_num1, user_num2):
print('FIXME: Finish compute_avg()')
return -1
Explanation:
A stub is a small function or a piece of code which is sometimes used in program to test a function before its fully implemented. It can also be used for a longer program that is to be loaded later. It is also used for a long function or program that is remotely located. It is used to test or simulate the functionality of the program.
The first stub for the function get_user_num() displays FIXME: Finish get_user_num() and then it returns -1.
The seconds stub for the function compute_avg() displays the FIXME: Finish compute_avg() and then it returns -1.
Here with each print statement, there is function name after this FIXME: Finish line. The first function name is get_user_num and the second is compute_avg().
Next the function get_user_num() is called twice and function compute_avg() followed by a print statement: print('Avg:', avg_result) which prints the result. So the program as a whole is given below:
def get_user_num():
print('FIXME: Finish get_user_num()')
return -1
def compute_avg(user_num1, user_num2):
print('FIXME: Finish compute_avg()')
return -1
user_num1 = 0 # the variables are initialized to 0
user_num2 = 0
avg_result = 0
user_num1 = get_user_num() #calls get_user_num method
user_num2 = get_user_num()
avg_result = compute_avg(user_num1, user_num2)
print('Avg:', avg_result)
The method get_user_num() is called twice so the line FIXME: Finish get_user_num() is printed twice on the output screen. The method compute_avg() is called once in this statement avg_result = compute_avg(user_num1, user_num2) so the line FIXME: Finish compute_avg() is printed once on the output screen. Next the statement print('Avg:', avg_result) displays Avg: -1. You can see in the above program that avg_result = compute_avg(user_num1, user_num2) and compute_avg function returns -1 so Avg= -1. The program along with the produced outcome is attached.
How does computer mouse impact the world, society and health?
Explanation:
Without it, we may have endured convoluted keyboard commands for years, greatly hindering the process of bringing the PC into homes everywhere. The mouse revolutionized computer interfaces, simplified an otherwise scary machine, and helped connect the world.
Create an application named ArithmeticMethods whose main() method holds two integer variables. Assign values to the variables. In turn, pass each value to methods named displayNumberPlus10(), displayNumberPlus100(), and displayNumberPlus1000(). Create each method to perform the task its name implies. Save the application as ArithmeticMethods.java.
Answer:
public class ArithmeticMethods
{
public static void main(String[] args) {
int number1 = 7;
int number2 = 28;
displayNumberPlus10(number1);
displayNumberPlus10(number2);
displayNumberPlus100(number1);
displayNumberPlus100(number2);
displayNumberPlus1000(number1);
displayNumberPlus1000(number2);
}
public static void displayNumberPlus10(int number){
System.out.println(number + 10);
}
public static void displayNumberPlus100(int number){
System.out.println(number + 100);
}
public static void displayNumberPlus1000(int number){
System.out.println(number + 1000);
}
}
Explanation:
Inside the main:
Initialize two integers, number1 and number2
Call the methods with each integer
Create a method called displayNumberPlus10() that displays the sum of the given number and 10
Create a method called displayNumberPlus100() that displays the sum of the given number and 100
Create a method called displayNumberPlus1000() that displays the sum of the given number and 1000
A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused by a malicious insider.
a. True
b. False
Answer:
a. True
Explanation:
The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.
A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.
The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.
6. A distribution consists of three components with frequencies 200, 250 and 300 having means
25,10, and 15 and standard deviations 3, 4, and 5 respectively.
Calculate
The mean?
The standard deviation?
Answer:
The mean = 16
The standard deviation = 7.19
Explanation:
N1 = 200 X1 = 25 σ1 = 3
N2= 250 X2 = 10 σ2 = 4
N3 = 300 X3= 15 σ3 = 5
The mean of a combined distribution is given by:
[tex]X = \frac{X_1N_1+X_2N_2+X_3N_3}{N_1+N_2+N_3}\\X = \frac{25*200+10*250+15*300}{200+250+300}\\X=16[/tex]
The differences from the mean for each component are:
[tex]D_1 = 25-16=9\\D_2=10-16=-6\\D_3=15-16=-1[/tex]
The standard deviation of a combined distribution is given by:
[tex]\sigma=\sqrt{\frac{N_1(\sigma_1^2+D_1^2)+N_2(\sigma_2^2+D_2^2)+N_3(\sigma_3^2+D_3^2)}{N_1+N_2+N_3}}\\\sigma=\sqrt{\frac{200(3^2+9^2)+250(4^2+(-6)^2)+300(5^2+(-1)^2)}{200+250+300}}\\\sigma=\sqrt{\frac{18000+13000+7800}{750} }\\\sigma=7.19[/tex]
The mean = 16
The standard deviation = 7.19
Assume that to_the_power_of is a function that expects two integer parameters and returns the value of the first parameter raised to the power of the second parameter. Write a statement that calls to_the_power_of to compute the value of cube_side raised to the power of 3 and that associates this value with cube_volume.
Answer:
The statement in python is as follows:
to_the_power_of(cube_side,3)
Explanation:
As stated as the requirement of the code segment, the statement takes as parameters a variable cube_side and a constant 3.
It then returns the volume of the cube; i.e. cube raise to power 3
See full program below
def to_the_power_of(val,powe):
result = val**powe
print(result)
cube_side = float(input("Cube side: "))
to_the_power_of(cube_side,3)
Choose all of the correct answers for each of the following:
[1] The number of superkeys of a relation R(A, B, C, D) with keys {A} and {B, C} is
1-2..
2- 10..
3- 12..
4- All of the above..
5- None of the above..
[2] The relations of two subentities of the same entity set have
1- The same keys..
2- The same attributes..
3- The same functional dependencies..
4- The same natural joins with their super entity set..
5- All of the above..
6- None of the above..
[3] A relation R
1- Is in BCNF if R is in 3NF..
2- Is in 3NF if R is in BCNF..
3- May be in BCNF but not in 3NF..
4- May be in 3NF but not in BCNF..
5- May be neither in BCNF nor in 3NF..
6- All of the above..
7- None of the above..
[4] The natural join of relations R and S may be expressed as
1- (oc(R x S))..
2- 0ca_ (R x S))..
3- Neither "1" nor "2"..
4- Either "1" or "2"..
[5] A tuple constraint that references an attribute R.A to attribute S.B is checked
1- When changes in R are made..
2- When changes in R.A are made..
3- When changes in S are made..
4- When changes in S.B are made..
5- Any of the above..
6- None of the above..
Answer:
[1] = 10
[2] = The same natural joins with their super entity set
[3] = Is in 3NF if R is in BCNF
[4] = Neither "1" or "2"
[5] = When changes in R.A are made
Explanation:
[1] The number of super keys of a relation R(A, B, C, D) with keys {A} and {B, C} is 10. The super keys of the given relations are {A}; {A, B}; {A,C}; {A,D}; {A,B,C}; {A,B,D}; {A,C,D}; {A,B,C,D}; {B,C}; {B,C,D}.
[2] key is used to uniquely identify entity from entity set. So key for every entity is unique. Subentities can have different attributes. Also functional dependencies can be different but natural join with their super subsets will be same.
[3] For a relation R to be in BCNF it must be in 3NF but If a relation R is in 3NF it is not necessary that it will be in BCNF.
[4] The natural join of relations R and S is expressed by R ✕ S.
[5] If tuple constraint references an attribute R.A to S.B then every time a change is done in R.A the tuple constraint is checked.
Identify and write the errors given in the flowchart (with steps and flowchart) : Start ↓ Input A,B ↓ Average = (A + B + C) / 3 ↓ Print Average ↓ Stop
Answer:
i will send you the answers in the next 10minute
Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent single conditional.
Answer:
One of the strategies to avoid nested conditional is to use logical expressions such as the use of AND & operator.
One strategy is to use an interface class with a method. That method can be created to be used for a common functionality or purpose. This is also called strategy design pattern. You can move the chunk of conditional statement to that method. Then each class can implement that interface class and use that shared method according to their own required task by creating objects of sub classes and call that common method for any such object. This is called polymorphism.
Explanation:
Nested conditionals refers to the use of if or else if statement inside another if or else if statement or you can simply say a condition inside another condition. For example:
if( condition1) {
//executes when condition1 evaluates to true
if(condition2) {
//executes when condition1 and condition2 evaluate to true
} else if(condition3) {
//when condition1 is true and condition3 is true
} else {
//condition1 is true but neither condition2 nor conditions3 are true
} }
The deeply nested conditionals make the program difficult to understand or read if the nested conditionals are not indented properly. Also the debugging gets difficult when the program has a lot of nested conditionals.
So in order to avoid nested conditionals some strategies are used such as using a switch statement.
Here i will give an example of the strategies i have mentioned in the answer.
Using Logical Expressions:
A strategy to avoid nested conditionals is to use logical expressions with logical operators such as AND operator. The above described example of nested conditionals can be written as:
if(condition1 && condition2){ //this executes only when both condition1 and condition2 are true
} else if(condition1 && condition3) {
this executes only when both condition1 and condition3 are true
} else if(condition1 ){
//condition1 is true but neither condtion2 nor condtion3 are true }
This can further be modified to one conditional as:
if(!condition3){
// when condition1 and condition2 are true
}
else
// condition3 is true
Now lets take a simple example of deciding to go to school or not based on some conditions.
if (temperature< 40)
{
if (busArrived=="yes")
{
if (!sick)
{
if (homework=="done")
{
printf("Go to school.");
}
}
}
}
This uses nested conditionals. This can be changed to a single conditional using AND logical operator.
if ((temperature <40) && (busArrived=="yes") &&
(!sick) && (homework=="done"))
{ cout<<"Eligible for promotion."; }
The second strategy is to use an interface. For example you can
abstract class Shape{
//declare a method common to all sub classes
abstract public int area();
// same method that varies by formula of area for different shapes
}
class Triangle extends Shape{
public int area() {
// version of area code for Triangle
return (width * height / 2);
}
}
class Rectangle extends Shape{
public int area() {
// version of area code for Rectangle
return (width * height)
}
}
// Now simply create Rectangle or Triangle objects and call area() for any such object and the relevant version will be executed.
For each of these relations on the set {21,22,23,24},decide whether it is re- flexive, whether it is symmetric, whether it is antisymmetric, and whether it is transitive.1. {(22, 22), (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)} 2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}
Answer:
1. {(22, 22) (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)} : Not reflective, Not symmetric, Not anti-symmetric, Transitive.
2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}: Reflective, symmetric.
Explanation:
Solution
Reflective: Of every element matched to its own element
Symmetric: For every (a,b) there should be (b,a)
Anti-symmetric: For every (a,b) there should not be (b,a)
Transitive: For every (a,b) ∈R and (b,c)∈ R -then (a,c) ER for all a, b, c ∈ A
Now,
1.{(22, 22) (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)}
Not Reflective: This is because we don't have (21,21) (23,23) and (24,24)
Not symmetric: Because we don't have (23,24) and (24,23)
Not anti symmetric: We have both (22,23) and (23,22)
Transitive: It is either 22 or 23 be (a,b) and 24 (b,a)
2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}
Reflective: For all we have (a,a)
Symmetric: For every (a,b) we have (b,a)
Not Anti-symmetric
Transitive
#Write a function called find_max_sales. find_max_sales will #have one parameter: a list of tuples. Each tuple in the #list will have two items: a string and an integer. The #string will represent the name of a movie, and the integer #will represent that movie's total ticket sales (in millions #of dollars). # #The function should return the movie from the list that #had the most sales. Return only the movie name, not the #full tuple. #Write your function here!
Answer:
I am writing a Python program:
This is the find_max_sales
def find_max_sales(tuple_list): #method that takes a list of tuples as parameter and returns the movie name which had the most sales
maximum=0 #stores the maximum of the ticket sales
name="" #stores the name of the movie with maximum sales
for tuple in tuple_list: # iterates through each tuple of the tuple list
[movie, sale]= tuple #tuple has two items i.e. movie contains name of the movies and sale holds the total ticket sale of the movie
if sale>maximum: #if the sale value of a tuple is greater than that of maximum sale value
maximum=sale #assigns the maximum of sales to maximum variable
name=movie # assigns the movie name which had most sales to name variable
return name #returns the movie name that had the most sales and not the full tuple
#Below is the list of list of movies. This list is passed to the find_max_sales method which returns the movies name from the list that had the most sales.
movie_list = [("Finding Dory", 486), ("Captain America: Civil War", 408), ("Deadpool", 363), ("Zootopia", 341), ("Rogue One", 529), ("The Secret Life of Pets", 368), ("Batman v Superman", 330), ("Sing", 268), ("Squad", 325), ("The Jungle Book", 364)]
print(find_max_sales(movie_list))
Explanation:
The program has a method find_max_sales that has one parameter tuple_list which is a list of tuples. Each tuple i.e. tuple has two items a movie which is a string and sale which is an integer. The movie represents the name of a movie, and the sales represents that movie's total ticket sales The function has a loop that iterates through each tuple tuple of the list tuple_list. Variable maximum holds the value of the maximum sales. The if condition checks if the value of tuple sale is greater than that stored in maximum, at each iteration. If the condition evaluates to true then that sale tuple value is assigned to maximum variable so that the maximum holds the maximum of the ticket sales. The name variable holds the name of the movie corresponding to the maximum sale tuple value. The method returns the movie name from the tuple_list that has the most sales.
For example in the above given movie_list , the maximum of sale is of the movie Rogue One. When the method is called it returns the movie name and not the full tuple so the output of the above program is:
Rogue One
______is a technology that allows users to access databases that contain case law or statutory law governing a particular issue.
Explanation:
In my opinion this is computer assisted legal search
TO COMPUTING IN BUSINE
ANSWER ALL QUESTIONS IN BOTH SE
TIME ALLOWED: 2 hours 30 minutes
Which of the following is not a Business Software?
a Word processing
SECTION A (50 Marks)
b. Spreadsheet
c. Presentation
d. Personal Finance
uolatile memory and sto
Answer:
the correct answer is a. Word processing.
Explanation:
hope this works out!!!!!
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the organization has installed crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, which of the following would be the NEXT step?
a. Remove the affected servers from the network.
b. Review firewall and IDS logs to identify possible source IPs.
c. Identify and apply any missing operating system and software patches
d. Delete the malicious software and determine if the servers must be reimaged
Answer:
a. Remove the affected servers from the network.
Explanation:
An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;
1. Preparation.
2. Detection and analysis (identification).
3. Containment.
4. Eradication.
5. Recovery.
6. Review of incident activities.
When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.
A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.
In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).
Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization.
Implement the function is_maxheap which takes a list of integers and returns True if the list represents a valid max-heap, and False otherwise. Assume that the list represents the contents of a complete binary tree, following the parent/child indexing conventions established in class. E.g., is_maxheap should return True for the following inputs: a) [] b) [10] c) [10, 7, 8] E.g., is_maxheap should return False for the following inputs: a) [1, 2] b) [5, 6, 3] You should not define or use any external data structures in your implementation besides the list passed in.
Answer:
I am writing a Python function:
def is_maxheap(list):
#finds the length of the list
size=len(list)
#loop has a variable i which starts traversing from root til end of last #internal node
for i in range(int((size - 2) / 2) + 1):
if list[2 * i + 1] > list[i]: #If left child is greater than its parent then return #false
return False
if (2 * i + 2 < size and
list[2 * i + 2] > list[i]): #checks if right child is greater, if yes then #returns false
return False
return True
Explanation:
The function is_maxheap() traverses through all the internal nodes of the list iteratively. While traversing it checks if the node is greater than its children or not. To check the working of this function you can write a main() function to check the working on a given list. The main() function has a list of integers. It then calls is_maxheap() method by passing that list to the function. The program displays a message: "valid max heap" if the list represents valid max-heap otherwise it returns invalid max heap.
def main():
list = [10,7,8]
size = len(list)
if is_maxheap(list):
print("Valid Max Heap")
else:
print("Invalid Max Heap")
main()
The program along with its output is attached in a screenshot.
a reviewer is required to enter a reason in the comments field only when a candidate is recommended to be hired. which action can a developer take to enforce this requirement?
Answer:
Create a validation rule
Explanation:
Solution
The action a developer would take to enforce this requirement is by creating a validation rule.
Validation rule: A validation rules demonstrate that the data a user enters in a record meets the standards you identify before the user can save the record.
A validation rule can have a formula or expression that assesses the data in more than one fields and returns a value of either “True” or “False”.
It allow for values which are or are not allowed on a specific field.
a. Write out a structure called GroceryItem that contains two fields: a string (name) that contains the name of the grocery item and a float (cost) that stores the cost of the item.
b. Write out how you would create a variable of type GroceryItem called apple. Write two more lines of code that would set apple’s name to "Granny Smith" and apple’s cost to 0.79.
c. Now, write out a line of code that would create an array of 20 GroceryItem structures called, inventory.
d. Write the two lines of code that would
i. set the name of 6th GroceryItem in the array, inventory, to be "Cheese"
ii. set the cost of the 11th GroceryItem in the array, inventory, to be 3.50.
Answer:
a) struct GroceryItem{
string name;
float cost; };
b) GroceryItem apple;
apple.name = "Granny Smith";
apple.cost = 0.79;
c) GroceryItem inventory[20];
d) inventory[5].name = "Cheese";
inventory[10].cost = 3.50;
Explanation:
a) GroceryItem is the name of the structure and struct is a keyword which is used to create GroceryItem structure.
The structure has two members one is name of type string which means its holds the name strings of items. The other is cost which is a float type variable which supports floating point numbers and its holds the cost of item.
b) GroceryItem apple statement means that a variable apple is created which is of type GroceryItem
apple.name = "Granny Smith" This statement uses the apple to access the member variable name of GroceryItem structure and sets the apples's name to Granny Smith. The dot between apple variable and member variable name is basically used to access the member variable name of GroceryItem .
apple.cost = 0.79; This statement uses the apple variable to access the member variable cost of GroceryItem structure in order to set the apples's cost to 0.79. The dot between apple variable and member variable cost is basically used to access the member variable cost of structure.
c) GroceryItem inventory[20]; This statement creates an array of GroceryItem structure. The array name is inventory and [20] is basically specifies the size of this array which is 20.
d) inventory[5].name = "Cheese"; This statement uses inventory array and access the name member of the structure GroceryItem to set the name of the 6th GroceryItem in inventory array to "Cheese". .Here [5] is the index of the 6th item of the inventory array as the array locations start from 0. So inventory[20] can contains 20 elements from 0 index to 19 index. So to set the name of 6th item 5th index is specified.
inventory[10].cost = 3.50; This statement uses inventory array and access the cost member of the structure GroceryItem to set the cost of the 11th GroceryItem in inventory array to "3.50". Here [10] is the index of the 11th item of the inventory array as the array locations start from 0. So inventory[20] can contains 20 elements from 0 index to 19 index. So to set the cost of 11th item 10th index is specified
Jan has had a small business for three years or so, selling decorative art pieces. She works out of her home office. Jan has read about the Apple iPad and wants to get one for her art business. What kind of computer would the iPad probably replace
Answer:
In this sense, the different types of computers would range from Desktop to Laptops, to iPads, then Mobile Phones. Somewhere in-between the phone and the iPad is the phablet.
A phablet is a group of mobile devices with the combined functionality and size of a smartphone and a tablet.
On the balance of probabilities, Jan is trying to replace her laptop.
Cheers!