Suppose Charlie had installed key logger software on all company computer systems and had made a copy of Peter’s encryption key. Suppose that Charlie had this done without policy authority and without anyone’s knowledge, including Peter’s. Would the use of such a tool be an ethical violation on Charlie’s part? Is it illegal? Suppose that Charlie had implemented the key logger with the knowledge and approval of senior company executives, and that every employee had signed a release that acknowledged the company can record all information entered on company systems. Two days after Peter’s call, Charlie calls back to give Peter his key: "We got lucky and cracked it early." Charlie says this to preserve Peter’s illusion of privacy. Is such a "little white lie" an ethical action on Charlie’s part?

Answers

Answer 1

Answer: Provided in the explanation section

Explanation:

We will follow this question carefully with a well precise answer.

I hope at the end of the day, you find this useful.

Answer to First part:

-----------------------

Here as Charlie has not taken any one's permission even policy authority so using such keylogger tool is completely ethical violation on charlie's part. Because any decession that has taken by a company its not an issue until everyone agreed to it. Because without knowledge of such software the people will not  be aware and they may get trap and also there is not any written document regarding the acknowledgement so its completely wrong or illegal to blame someone based on result of such softwares. And second illegal thing is to copy some else's encryption key because the policy should be equal to all the people and it should not be used for personal gain.

Answer to second part:

=================

No it is still not ethical action on Charle's part because the policy should be same for everyone and as Charlie is the one who installed this software so he should keep this secrate and not to misuse as its not a matter how Peter came to know his encryption key from Charlie but why should Charlie in first place copy the encryption key for peter and share the encryption code with Peter,its completely unethical.

cheers i hope this helped !!


Related Questions

Many treadmills output the speed of the treadmill in miles per hour (mph) on the console, but most runners think of speed in terms of a pace. A common pace is the number of minutes and seconds per mile instead of mph. Write a program that starts with a quantity in mph and converts the quantity into minutes and seconds per mile. As an example, the proper output for an input of 6.5 mph should be 9 minutes and 13.8 seconds per mile. If you need to convert a double to an int, which will discard any value after the decimal point, then you may use intValue

Answers

Answer:

This question is answered using C++ programming language.

This program does not make use of comments; However, see explanation section for detailed line by line explanation.

The program starts here

#include <iostream>

using namespace std;

int main()

{

 double quantity,seconds;

 int minutes;

 cout<<"Quantity (mph): ";

 cin>>quantity;

 minutes = int(60/quantity);

 cout<<minutes<<" minutes and ";

 seconds = (60/quantity - int(60/quantity))*60;

 printf("%.1f", seconds);

 cout<<" seconds per mile";

 return 0;

}

Explanation:

The following line declares quantity, seconds as double datatype

 double quantity,seconds;

The following line declares minutes as integer datatype

 int minutes;

The following line prompts user for input in miles per hour

 cout<<"Quantity (mph): ";

User input is obtained using the next line

 cin>>quantity;

 

The next line gets the minute equivalent of user input by getting the integer division of 60 by quantity

minutes = int(60/quantity);

The next statement prints the calculated minute equivalent followed by the string " minuted and " without the quotes

 cout<<minutes<<" minutes and ";

After the minutes has been calculated; the following statement gets the remainder part; which is the seconds

 seconds = (60/quantity - int(60/quantity))*60;

The following statements rounds up seconds to 1 decimal place and prints its rounded value

 printf("%.1f", seconds);

The following statement prints "seconds per mile" without the quotes

 cout<<" seconds per mile";

Following are the program to the given question:

Program Explanation:

Defining the header file.Defining the main method.Inside the method, three double variables "mph, sec, and min_per_mile", and one integer variable "min" is defined. After defining a variable "mph" is defined that inputs value by user-end.After input value, "sec, min_per_mile, and min" is defined that calculates the value and prints its calculated value.  

Program:

#include<iostream>//header file

using namespace std;

int main()//defining main method

{

   double mph,sec,min_per_mile;//defining a double variable  

int min;//defining integer variable

cout<<"Enter the speed of the treadmill in mph:";//print message

cin>>mph;//input double value

min_per_mile=(1/mph)*60;//defining a double variable that calculates minutes per mile

min=static_cast<int>(min_per_mile);//defining int variable that converts min_per_mile value into integer

sec=(min_per_mile-min)*60;//defining double variable that calculates seconds per mile value  

cout<<"A common pace is the "<<min<<" minutes and "<<sec<<" seconds per mile"<<endl;//print calculated value with message  

return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/21278031

Write code for iterative merge sort algorithm. It is also known as bottom-up merge sort. There should not be any recursive call for this approach. Include your code and screenshot of output with the answer. You can choose any programming language for this problem.

Answers

Answer:

Here is the C++ program:

#include <iostream> // for using input output functions

using namespace std; // to identify objects as cin cout

void merge(int array[], int left, int mid, int right);  

// to merge the  array into two parts i.e. from left to mid and mid+1 to right

int minimum(int a, int b) { return (a<b)? a :b; }

//to find the minimum of the 2 values

void IterativeMergeSort(int array[], int num) { //function to sort the array

  int size; //determines current size of subarrays

  int left;  //to determine the start position of left subarray

//to merge the sub arrays using bottom up approach          

  for (size=1; size<=num-1; size = 2*size)    {

      //to select start position of different subarrays of current size  

      for (left=0; left<num-1; left += 2*size)   {    

// To determine the end point of left sub array and start position of right //which is mid+1    

          int mid = minimum(left + size - 1, num-1);  

          int right = minimum(left + 2*size - 1, num-1);  

// Merge the sub arrays from left to mid and mid+1 to right

         merge(array, left, mid, right);        }    } }

 // function to merge the  array into two parts i.e. from left to mid and mid+1 //to right

void merge(int array[], int left, int mid, int right){

   int i, j, k; // variables to point to different indices of the array

   int number1 = mid - left + 1;

   int number2 =  right - mid;  

//creates two auxiliary arrays LEFT and RIGHT

   int LEFT[number1], RIGHT[number2];  

//copies this mid - left + 1 portion to LEFT array

   for (i = 0; i < number1; i++)

       LEFT[i] = array[left + i];

//copies this right - mid portion to RIGHT array

   for (j = 0; j < number2; j++)

       RIGHT[j] = array[mid + 1+ j];  

   i = 0;

   j = 0;

   k = left;

//merge the RIGHT and LEFT arrays back to array from left to right i.e //arr[left...right]

   while (i < number1 && j < number2)     {

       if (LEFT[i] <= RIGHT[j])    

/*checks if the element at i-th index of LEFT array is less than or equals to that of j-th index of RIGHT array */

{             array[k] = LEFT[i];

//if above condition is true then copies the k-th part of array[] to LEFT //temporary array

           i++;         }

       else //when the above if condition is false

       {  array[k] = RIGHT[j];

//moves k-th part of array[] to j-th position of RIGHT temporary array

           j++;         }

       k++;     }  

   while (i < number1)     {  //copies remaining elements of LEFT array

       array[k] = LEFT[i];

       i++;

       k++;     }  

   while (j < number2)     { //copies remaining elements of RIGHT array

       array[k] = RIGHT[j];

       j++;

       k++;     } }  

int main() {

   int Array[] = {9, 18, 15, 6, 8, 3}; // an array to be sorted

   int s = sizeof(Array)/sizeof(Array[0]);

//sizeof() is used to return size of array

   cout<<"Input array:  ";

   int i;

   for (i=0; i < s; i++) //to print the elements of given array

       cout<<Array[i]<<" ";

       cout<<endl;

   IterativeMergeSort(Array, s);   //calls IterativeMergeSort() function

   cout<<"Sorted array after applying Iterative Merge Sort:"<<endl;

  for (i=0; i < s; i++) //to print the elements of the sorted array

      cout<<Array[i]<<" "; }

Explanation:

The program is well explained in the comments mentioned above with each line of the code. The screenshot of the program along with its output is attached.

Write a python function average_sample_median(n,P), that return the average of 1000 samples of size n sampled from the distribution P.

* Sample run *

print(average_sample_median(10,[0.2,0.1,0.15,0.15,0.2,0.2])) print(average_sample_median(10,[0.3,0.4,0.3])) print(average_sample_median(10,P=[0.99,0.01])
* Expected Output *
3.7855
2.004
1

Answers

Answer:

Explanation: E(x)=np

E(x+y)=E(x)+E(y)

Y:p(y=1)=p

P(y-0)=1-p

I hope you can understand this example if not just tell me and I can Give you more examples thaks:-)

Write a program that calculates and prints the average of several integers. Assume the last value read with scanf is the sentinel 9999. A typical input sequence might be 10 8 11 7 9 9999

Answers

Answer:

Following are the program in C programming language

#include<stdio.h> // header file

int main() // main function  

{

int n1;// variable declaration

int c=0; // variable declaration

float sum=0; // variable declaration

float avg1;

printf("Enter Numbers :\n");

while(1) // iterating the loop

{

scanf("%d",&n1); // Read the value by user

if(n1==9999) // check condition  

break; // break the loop

else

sum=sum+n1; // calculating sum

c++; // increment the value of c

}

avg1=sum/c;

printf("Average= %f",avg1);

return 0;

}

Output:

Enter Numbers:

10  

8  

11

7  

9  

9999

Average= 9.000000

Explanation:

Following are the description of program

Declared a variable "n1" as int type Read the value by the user in the "n1" variable by using scanf statement in the while loop .The while loop is iterated infinite time until user not entered the 9999 number .if user enter 9999 it break the loop otherwise it taking the input from the user .We calculating the sum in the "sum " variable .avg1 variable is used for calculating the average .Finally we print the value of average .

The program takes in several value numeric values until 9999 is inputed, the program calculates the average of these values. The program is written in python 3 thus :

n = 0

#initialize the value of n to 0

cnt = 0

#initialize number of counts to 0

sum = 0

#initialize sum of values to 0

while n < 9999 :

#set a condition which breaks the program when 9999 is inputed

n = eval(input('Enter a value : '))

#accepts user inputs

cnt += 1

#increases the number of counts

sum+=n

#takes the Cummulative sum

print(sum/cnt)

#display the average.

A sample run of the program is attached.

Learn more : https://brainly.com/question/14506469

1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web applications, before using that data. 2. Why should Web site operators that allow users to add content, for example forums or blogs, carefully and consistently patch and configure their systems

Answers

Answer:

1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses.  Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.

Explanation:

2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address  issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.

Use an Excel function to find: Note: No need to use Excel TABLES to answer these questions! 6. The average viewer rating of all shows watched. 7. Out of all of the shows watched, what is the earliest airing year

Answers

Answer:

Use the average function for viewer ratings

Use the min function for the earliest airing year

Explanation:

The average function gives the minimum value in a set of data

The min function gives the lowest value in a set of data

State all the generations of computers.

Answers

Answer:

1 1st generation =vacuum tube based

2 nd generation =transistor based

3 rd generation intergrated circuit based

4rd generation =vlsi microprocessor based

5th generation =ulsi microprocessor based

Answer:

   1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...

   1956 – 1963: Second Generation – Transistors. ...

   1964 – 1971: Third Generation – Integrated Circuits. ...

   1972 – 2010: Fourth Generation – Microprocessors.

Explanation:

1. Suppose you purchase a wireless router and connect it to your cable modem. Also suppose that your ISP dynamically assigns your connected device (that is, your wireless router) one IP address. In addition, suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. How are IP addresses assigned to the five PCs

Answers

Answer:

In this example, the wireless router uses NAT to allocate private IP addresses to five PC's and router interface, since only one IP address is assigned or given to the wireless router by the ISP.

Explanation:

Solution

The Dynamic Host Configuration Protocol server provides the IP addresses to clients, dynamically.

Generally a wireless router contains DHCP server. a wireless router can also  assign IP addresses dynamically to its clients.

So, the wireless router assigns IP addresses to five PC's and the router interface dynamically using the DHCP.

It is stated that the Internet Service Provider (ISP) assigns only one IP address to the wireless router. Here there are five PC's and one router interface need to be allocated IP addresses.

In such cases the NAT (Network Address Translation)protocol is important and allows all the clients of the home network to sue a single internet connection (IP address) assigned or given by the ISP.

NAT permits the router to allocate the private IP addresses to client from the private IP address space reserved for the private networks. these private IP addresses are valid only in the home or local network .

In a real pulley system, the work supplied must be the work accomplished.

Equal to
Less than
Greater than

Answers

sorry I was testing something

A software company assesses its developers more on their client support skills rather than their development skills. Which of the following terms would best describe the software company's performance management process?


A. Deficient
B. Contaminated
C. Unreliable
D. Inconsistent
E. Unspecified

Answers

Answer:

B. Contaminated

Explanation:

Based on the information provided regarding the scenario it seems that the software company's performance management process can be best described as contaminated. This occurs when the criterion of measurement for the employee performance includes aspects of performance that are not part of the job. Which in this case the main role of the employees is to apply their development skills in order to improve the software and not focus on their client support skills, but instead the "client support skills" is what the company is basing their performance review on.

public class Car {
public void m1() {
System.out.println("car 1");
}
â
public void m2() {
System.out.println("car 2");
}
â
public String toString() {
return "vroom";
}
}


public class Truck extends Car {
public void m1() {
System.out.println("truck 1");
}
}

And assuming that the following variables have been declared:

Car mycar = new Car();
Truck mytruck = new Truck();

What is the output from the following statements?

a. Sound F/X System.out.println(mycar);
b. mycar.m1();
c. mycar.m2();
d. System.out.println(mytruck);
e. mytruck.m1();
f. mytruck.m2();

Answers

Answer:

The Following are the outputs:

a. vroom

b. car 1

c. car 2

d. vroom

e. truck 1

f. car 2

Explanation:

The first statement System.out.println(mycar);  prints an instance of the Car object my car which calls the toString() method.

The second statement mycar.m1();  Calls the method m1() which prints car1

The third statement mycar.m2(); calls the method m2() which prints car2

Then another class is created Truck, and Truck inherits all the methods of Car since it extends Car. Truck has a method m1() which will override the inherited method m1() from the Car class.

The fourth statement System.out.println(mytruck); will print print vroom just as the first statement since it inherits that method toString()

The fifth statement calls m1() in the Truck class hence prints Truck 1

Finally the sixth statement will print car 2 because it also inherited that method and didnt overide it.

You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on your validation set, but good performance on your training set. Your implementation has no bugs. Define various reasons that could be causing the problem?

Answers

Answer:

The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data

Explanation:

Solution

The various reasons that could be causing the problem is given as follows :

1. A wide number of parameters :

In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers. When the training is performed in this tree, then the model files the data too well. When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.

2. Noisy Data:

The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values. When the tree is trained on this noisy data, then it sets its parameters according to the training data. As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.

The weekly pay for an employee is determined based on the following parameters:
Standard work hours by week is 40 hours.
Hourly pay rate is $10.00 per hour
Overtime hours are paid at time and a half the rate (that is $15.00 per hour).
Design and implement a program (name it WeeklyPay) that read number of hours worked per week (as integer value), prints out the entered hours, and then prints out the gross earning. Organized your output following these sample runs.
Sample run 1:
You entered 20 hours.
Gross earning is $200.0
Sample run 2:
You entered 40 hours.
Gross earning is $400.0
Sample run 3:
You entered 50 hours.
Gross earning is $550.0

Answers

394484845848585858484

Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates when "xxxxx" (five x characters) is read in. Other strings are ignored. After the loop, your code should print out 3 lines: the first consisting of the string "land:" followed by the number of "land" strings read in, the second consisting of the string "air:" followed by the number of "air" strings read in, and the third consisting of the string "water:" followed by the number of "water" strings read in. Each of these should be printed on a separate line. Use the up or down arrow keys to change the height.

Answers

Answer:

count_land = count_air = count_water = 0

while True:

   s = input("Enter a string: ")

   if s == "xxxxx":

       break

   else:

       if s == "land":

           count_land += 1

       elif s == "air":

           count_air += 1

       elif s == "water":

           count_water += 1

print("land: " + str(count_land))

print("air: " + str(count_air))

print("water: " + str(count_water))

Explanation:

*The code is in Python

Initialize the variables

Create a while loop that iterates until a specific condition is met. Inside the loop, ask the user to enter the string. If it is "xxxxx", stop the loop. Otherwise, check if it is "land", "air", or "water". If it is one of the given strings, increment its counter by 1

When the loop is done, print the number of strings entered in the required format

Give an example of a function from N to N that is:______.
a) one-to-one but not onto
b) onto but not one-to-one
c) neither one-to-one nor onto

Answers

Answer:

Let f be a function

a) f(n) = n²

b) f(n) = n/2

c) f(n) = 0

Explanation:

a) f(n) = n²

This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.

Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:

                                f(a) = f(b) ⇒ a² = b² ⇒ a = b

The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number.  For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.

b) f(n) = n/2

The above function example is an onto function because every natural number, lets say n is a natural number that belongs to N, is the image of 2n. For example:

                                f(2n) = [2n/2] = n

The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:

When the value of n=1, then    

                                   n/2 = [1/2] = [0.5] = 1

When the value of n=2 then

                                    n/2 = [2/2] = [1] = 1

c) f(n) = 0

The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image.  The above function example is also not an onto function because every positive integer is not an image of any natural number.

Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as arguments. The function should determine and return the hypotenuse of the triangle. b. A main() function that should call right Triangle() correctly and display the value the function returns.

Answers

Answer:

The java program is as follows.

import java.lang.*;

public class Triangle

{

   //variables to hold sides of a triangle

   static double height;

   static double base;

   static double hypo;

   //method to compute hypotenuse

   static double rightTriangle(double h, double b)

   {

       return Math.sqrt(h*h + b*b);

   }

public static void main(String[] args) {

    height = 4;

    base = 3;

    hypo = rightTriangle(height, base);

 System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);

}

}

OUTPUT

The hypotenuse of the right-angled triangle is 5.0000

Explanation:

1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.

2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.

3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.

4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().

5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.

6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.

7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.

8. In java, all the code is written inside a class.

9. The name of the program is same as the name of the class having the main() method.

10. The class having the main() method is declared public.

11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.

Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their way into their master’s degree directly from undergraduate. If you have a 3.5 GPA and graduate from one of our majors, you can continue on and get your masters without having to do a lot of the paperwork. For simplification, we have four undergraduate degrees: CS, SWE, IT, and CGDD – and three masters programs: MSCS, MSSWE and MSIT. For this assignment, you’re going to ask the user a few questions and determine if they qualify for the FastTrack option.
Sample Output:
Major: Frogmongering
GPA: 3.9
Great GPA, but apply using the regular application.
Sample Output #2:
Major: SWE
GPA: 3.3
Correct major, but GPA needs to be higher.
Sample Output #3:
Major: IT
GPA: 3.5
You can FastTrack.
Sample Output #4:
Major: Study Studies
GPA: 0.4
Talk to one of our advisors about whether grad school is for you.

Answers

Answer:

The programming language is not stated. However, I'll answer this question using Python programming language.

The program uses no comments; find explanation below

i = 0

while not (i == 4):

     print("Sample Run: #"+str(i+1))

     Major = input("Major: ")

     GPA = float(input("GPA: "))

     if not (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):

           if GPA >= 3.50:

                 print("Great GPA, but apply using the regular application")

           else:

                 print("Talk to one of our advisors about whether grad school is for you")

     if (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):

           if GPA >= 3.50:

                 print("You can FastTrack.")

           else:

                 print("Correct major, but GPA needs to be higher.")

     i = i + 1

Explanation:

Line 1 of the program initializes the sample run to 0

Line 2 checks if sample run is up to 4;

If yes, the program stops execution else, it's continues execution on the next line

Line 3 displays the current sample run

Line 4 and 5 prompts user for Major and GPA respectively

Line 6 to 10 checks is major is not one of CS, SWE, IT, and CGDD.

If major is not one of those 4 and GPA is at least 3.5, the system displays "Great GPA, but apply using the regular application"

If major is not one of those 4 and GPA is less than 3.5, the system displays "Talk to one of our advisors about whether grad school is for you"

Line 11 to 15 checks is major is one of CS, SWE, IT, and CGDD.

If major is one of those 4 and GPA is at least 3.5, the system displays "You can Fastrack"

If major is one of those 4 and GPA is less than 3.5, the system displays "Correct major, but GPA needs to be higher."

The last line of the program iterates to the next sample run

Using Python I need to Prompt the user to enter in a numerical score for a Math Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a English Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a PE Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a Science Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for an Art Class. The numerical score should be between 0 and 100. Call the letter grade function 5 times (once for each class). Output the numerical score and the letter grade for each class.

Answers

Answer:

The program doesn't use comments; See explanation section for detailed line by line explanation

Program starts here

def lettergrade(subject,score):

     print(subject+": "+str(score))

     if score >= 90 and score <= 100:

           print("Letter Grade: A")

     elif score >= 80 and score <= 89:

           print("Letter Grade: B")

     elif score >= 70 and score <= 79:

           print("Letter Grade: C")

     elif score >= 60 and score <= 69:

           print("Letter Grade: D")

     elif score >= 0 and score <= 59:

           print("Letter Grade: F")

     else:

           print("Invalid Score")

maths = int(input("Maths Score: "))

english = int(input("English Score: "))

pe = int(input("PE Score: "))

science = int(input("Science Score: "))

arts = int(input("Arts Score: "))

lettergrade("Maths Class: ",maths)

lettergrade("English Class: ",english)

lettergrade("PE Class: ",pe)

lettergrade("Science Class: ",science)

lettergrade("Arts Class: ",arts)

Explanation:

The program makes the following assumptions:

Scores between 90–100 has letter grade A

Scores between 80–89 has letter grade B

Scores between 70–79 has letter grade C

Scores between 60–69 has letter grade D

Scores between 0–69 has letter grade E

Line by Line explanation

This line defines the lettergrade functions; with two parameters (One for subject or class and the other for the score)

def lettergrade(subject,score):

This line prints the the score obtained by the student in a class (e.g. Maths Class)

     print(subject+": "+str(score))

The italicized determines the letter grade using if conditional statement

This checks if score is between 90 and 100 (inclusive); if yes, letter grade A is printed

     if score >= 90 and score <= 100:

           print("Letter Grade: A")

This checks if score is between 80 and 89 (inclusive); if yes, letter grade B is printed

     elif score >= 80 and score <= 89:

           print("Letter Grade: B")

This checks if score is between 70 and 79 (inclusive); if yes, letter grade C is printed

     elif score >= 70 and score <= 79:

           print("Letter Grade: C")

This checks if score is between 60 and 69 (inclusive); if yes, letter grade D is printed

     elif score >= 60 and score <= 69:

           print("Letter Grade: D")

This checks if score is between 0 and 59 (inclusive); if yes, letter grade F is printed

     elif score >= 0 and score <= 59:

           print("Letter Grade: F")

If input score is less than 0 or greater than 100, "Invalid Score" is printed

     else:

           print("Invalid Score")

This line prompts the user for score in Maths class

maths = int(input("Maths Score: "))

This line prompts the user for score in English class

english = int(input("English Score: "))

This line prompts the user for score in PE class

pe = int(input("PE Score: "))

This line prompts the user for score in Science class

science = int(input("Science Score: "))

This line prompts the user for score in Arts class

arts = int(input("Arts Score: "))

The next five statements is used to call the letter grade function for each class

lettergrade("Maths Class: ",maths)

lettergrade("English Class: ",english)

lettergrade("PE Class: ",pe)

lettergrade("Science Class: ",science)

lettergrade("Arts Class: ",arts)

Eddie creates one-of-a-kind brochures for his customers, and he wants to be able to customize the look of some of the headings in a given brochure. This special type of heading will be used throughout a given document, but it won't be reused in other documents. What type of construct should he create

Answers

Answer:

A template

Explanation:

The type of construct he should create is a Template.

Template: A template is a file that serves as a beginning point for a document that is new.

When you open a template, it is pre-formatted in a way. for instance you might make use of a template in Microsoft Word that is arranged as a business letter, the template would mostly have a space for your address also a name in the left (upper)corner, which is an area for the receivers's address.

Now a little below that on the left site, is an area for the message (body) and after that, is a spot for your signature at the bottom.

A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?

a. Establish a privileged interface group and apply read -write permission.to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work

Answers

Answer:

The correct option is (d) Use a service account and prohibit users from accessing this account for development work

Explanation:

Solution

As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:

By making use of a service account and forbids users from having this account for development work.

The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.

Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.

A list based on a simple array (standard array implementation) is preferable to a dynamically allocated list for the following reasons.
A. Insertions and deletions require less work.
B. You are guaranteed a space to insert because it is already allocated.
C. You can take advantage of random-access typically.
D You can mix and match the types of the items on the list. E. (b) and (c).
F. All of the above.

Answers

Answer:

A. Insertions and deletions require less work.

C. You can take advantage of random access typically

D. You can mix and match the types of the items on the list.

Explanation:

Standard array implementation is a process in which number of items are of same type and index is restricted at a certain range. This is preferable to dynamic allocated list because it requires less work in insertion and deletions. A dynamically allocated array does not use the fixed array size declaration.

What feature in the Windows file system allows users to see only files and folders in a File Explorer window or in a list of files from the dir command to which they have been given at least read permission?

Answers

Answer:

Access based enumeration

Explanation:

The access based enumeration is the feature which helps the file system to allow users for seeing the files and folders for which they have read access from the direct command.

Access based enumeration: This feature displays or shows only the folders and files that a user has permissions for.

If a user do not have permissions (Read) for a folder,Windows will then hide the folder from the user's view.

This feature only function when viewing files and folders are in a shared folder. it is not active  when viewing folders and files in a local system.

discuss 5 ways in which computer has influence typography and lettering​

Answers

Answer:

Five ways in which computer has affected typography and lettering are discussed below;

1. Introduction of unconventional typeface: Computers have introduced unconventional typeface texts to typography and lettering by offering a wide range of typeface and fonts that the user can choose from, depending on the type of typing job at hand. Some of these fonts are suitable for aesthetic purpose, and some have official rating. These fonts and type faces range from the Times New Roman, Gothic, Serif, etc.

2. Size and legibility: Computers now allows different sizes of character sizes in typography. These sizes can be chosen easily to suite the degree of readability of the intended message.

3. Specialization: Computer has opened up typography and lettering to lay users and people not specialized in typography. Prior to the digital age, typing jobs were limited to specialist typists who have been trained in typography. Nowadays, anybody with access to a computer can easily learn solo, and be employed as a typist.

4. General layout: The arrangement and layout of text and lettering in typing can now be easily manipulated with a computer, by just selecting from a wide choice of arrangement available on the typing platform.

5. Minimization of errors: The use of computer in typography and lettering has greatly reduced the incidence and occurrence of error in typing. Most computers have built in prediction tools, and auto-correcting software that reduces and sometimes prevent grammatical and spelling errors.

(Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds using the following header: def convertMillis(millis): The function returns a string as hours:minutes:seconds. For example, convertMillis(5500) returns the string 0:0:5, convertMillis(100000) returns the string 0:1:40, and convertMillis(555550000) returns the string 154:19:10. Write a test program that prompts the user to enter a value for milliseconds and displays a string in the format of hours:minutes:seconds. Sample Run Enter time in milliseconds: 555550000 154:19:10

Answers

Answer:

I am writing the Python program. Let me know if you want the program in some other programming language.

def convertMillis(millis):  #function to convert milliseconds to hrs,mins,secs

   remaining = millis  # stores the value of millis to convert

   hrs = 3600000  # milliseconds in hour

   mins = 60000  # milliseconds in a minute

   secs = 1000  #milliseconds in a second

   hours =remaining / hrs  #value of millis input by user divided by 360000

   remaining %= hrs  #mod of remaining by 3600000

   minutes = remaining / mins  # the value of remaining divided by 60000

   remaining %= mins  #mod of remaining by 60000

   seconds = remaining / secs  

#the value left in remaining variable is divided by 1000

   remaining %= secs  #mod of remaining by 1000

   print ("%d:%d:%d" % (hours, minutes, seconds))

#displays hours mins and seconds with colons in between

   

def main():  #main function to get input from user and call convertMillis() to #convert the input to hours minutes and seconds

   millis=input("Enter time in milliseconds ")  #prompts user to enter time

   millis = int(millis)  #converts user input value to integer

   convertMillis(millis)   #calls function to convert input to hrs mins secs

main() #calls main() function

Explanation:

The program is well explained in the comments mentioned with each line of code. The program has two functions convertMillis(millis) which converts an input value in milliseconds to hours, minutes and seconds using the formula given in the program, and main() function that takes input value from user and calls convertMillis(millis) for the conversion of that input. The program along with its output is attached in screenshot.

Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then convert the temperature to Fahrenheit and display it to the screen. Finally, it should convert the Fahrenheit temperature to Kelvin and display that to the screen.

Answers

Answer:

c = float(input("Enter the temperature in Celsius: "))

f = c * 1.8 + 32

print("The temperature in Fahrenheit: " + str(f))

k = (f - 32) / 1.8 + 273.15

print("The temperature in Kelvin: " + str(k))

Explanation:

*The code is in Python.

Ask the user to enter the temperature in Celsius

Convert the Celsius to Fahrenheit using the conversion formula and print it

Convert the Fahrenheit to Kelvin using the conversion formula and print it

A company recently installed fingerprint scanners at all entrances to increase the facility’s security. The scanners were installed on Monday morning, and by the end of the week it was determined that 1.5% of valid users were denied entry. Which of the following measurements do these users fall under?
a. frr
b. far
c. cer
d. sla

Answers

Answer:

a. frr

Explanation:

False rejection rate is the rate which measure the incorrect rejection of access in the system. The scanners have rejected the access of 1.5% valid users. The entry was denied to the valid users which is considered as an attempt to unauthorized access to the scanner.

The topic sentence states a: thesis statement,
paragraphs main idea,
supporting idea,
papers conclusion

Answers

The topic sentence states paragraphs main idea. Check more about sentence below.

What is the a topic sentence?

A topic sentence is known to be one that tells the main point of any given paragraph.

It is said to be a supporting sentences that has the details and gives proof of one's point.

Therefore, The topic sentence states paragraphs main idea.

Learn more about  topic sentence  from

https://brainly.com/question/5526170

#SPJ1

Answer:

paragraph's main idea

Explanation:

1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2. (1 point) Which flag is set when the result of a signed arithmetic operation is either too large or too small to fit into the destination? 3. (1 point) Which flag is set when an arithmetic or logical operation generates a negative result?

Answers

Answer:

(1) Carry flag (2) Overflow flag (3) Sign or negative Flag

Explanation:

Solution

(1) The carry flag : It refers to the adding or subtracting. a two registers has a borrow or carry bit

(2) The over flow flag: This flag specify that a sign bit has been modified during subtracting or adding of operations

(3) The sign flag: This is also called a negative sign flag is a single bit status in a register that specify whether the last mathematical operations  generated a value to know if the most significant bit was set.

Who do you think larger or smaller clients will benefit most from MasterCard’s analytics tools? Why?

Answers

Answer:The key to analytics success is not about searching for answers, ... If you are trying to determine where to find new customers, there is a recipe for how to do that, and it ... As we work with small businesses, we help them answer their big ... Moving forward, there is going to be a lot more data of varying types.

Explanation:

What are the characteristics of SAAS? (Choose all that apply)​ a. ​ Services are usually available during specified time periods b. ​ Software is installed remotely with no local involvement c. ​ Little, if any, software is installed on the user’s computer d. ​ Costs are calculated on a "use" basis e. ​ User data is stored and isolated on central computers f. ​ SAAS company often deploys an on sight employee to assist the client

Answers

Answer:

The correct options are, option D (Costs are calculated on a "use" basis), option C (Little, if any, software is installed on the user’s computer), option E (User data is stored and isolated on central computers).

Explanation:

SAAS which is also known as cloud-based software, stands for "Software as a service". SAAS is Use free client software available to clients over the Internet that can be accessed from anywhere, where clients only pay for what they used. SAAS which embraced the concept of cloud computing allows data to be accessed from any device with an internet connection and a web browser allowing software to be delivered by cloud.

Some characteristics of SAAS are: Cloud-based apps that are used over the Internet are managed from a central location, Costs are calculated as "pay for what you used" method.

The characteristics of SAAS that apply are;

C) Little, if any, software is installed on the user's computer

D) Costs are calculated on a "use" basis

E) User data is stored and isolated on central computers

SAAS is an acronym which means Software as a service. This is a software distribution model whereby a cloud provider will host applications and also make them to be very much available to end users over the internet.

Now, this SAAS model is also known as "on demand software" because it is licensed on a subscription basis and is also centrally hosted.

Further more, In SAAS model, an independent software vendor could contract hosting of the application to a third-party cloud provider.

Looking at the options, the only ones that apply to SAAS are options C, D and E.

Read more on SAAS at; https://brainly.com/question/25226343

Other Questions
Find the average velocity if the takeoff velocity of an airplane on a runway is 300 km/hr with an acceleration of 1 m/s2 . A) 30 sec B) 41.7 sec C) 72.2 sec D) 83.33 sec In Ricci v. DeStefano, Ricci, a white firefighter, took and passed the City of New Haven firefighter's test, required of all applicants for promotion in the city's fire department. The test was thrown out when it was discovered that minorities scored poorly and the city feared a disparate impact-based lawsuit. How did the court rule? A) An employer may not simply disregard a test based on unwanted results unless the test is shown to be biased or deficient. B) Even though the test was prepared by a professional testing organization, the city has the right to reject the test results if minorities do not score adequately C) Deliberately oversampling minorities to seek to create a fair test is irrelevant if the test results show that minorities still scored poorly D) Ricci, as a member of the white majority, had no grounds to sue when the city was seeking the legitimate aim of nondiscrimination does Laissez-faire means that the government interference with peoples right to pursue happiness. If the smart phone supply increases, you can expect the price of smart phones to A. Not change B. Increase C. Triple B. Decrease Sara is a librarian and works at least 10 hours per week. If Sara would like to work extra shifts, they are added to herschedule in two-hour increments. Which equation models the number of hours that Sara will work at the library thisweek? Assume x is the number of two-hour increments and y is the total number of hours worked. Tom has 1 cup of a 5% vinegar-water solution, 2 cups of a 10% vinegar-water solution, and 3 cups of a 15% vinegar-water solution. He needs at least 8 cups of a 5% vinegar-water solution for his chemistry project. What is the number of cups of pure water he should add to the total of all his vinegar-water solutions to complete the project? What is the domain of the step function f(x) = 2x 1? Which of the following is a community lifeline Suppose a baby food company has determined that its total revenue R for its food is given by R = x 3 + 33 x 2 + 720 x where R is measured in dollars and x is the number of units (in thousands) produced. What production level will yield a maximum revenue? Someone please help which of the following is the correct graph of the linear equation below? y+2=1/5(x-1) The number of unread emails in Bryans account is 100. This number grows by 15 unread emails a day. The function N(t)=100+15t represents the relation between the number of unread emails, N, and the time, t, measured in days. A woodcutter wishes to cause the tree trunk to fall uphill, even though the trunk is leaning downhill. With the aid of the winch W, what tension T in the cable will be required?The 600-kg trunk has a center of gravity at G. The felling notch at O is sufficiently large so that the resisting moment there is negligible. Enter your answer in (N) - numerical value only What is the slope of the line described by the data in the table below? x 0 1 2 3 y 2 4 6 8 Please answer this correctly Find the exact value of tan . A. 5 3B. 3 14 14C. 3 5 5D. 2 14 Name the plane represented by the front of the box. please solve thankyou in advance x accounting theories are the foundation for understanding your company's financial direction and developing strategies for long term success. What are some theories that a business owner should be aware of? Which point gives the vertex of f(x) = x2 4x + 21? Question 1 options: (2,17) (2,17) (2,17) (2,17)