Answer:
i don't see them
Explanation:
i don't see them
At the settings window, the app buttons below the background thumbnails are used to change the
Select one:
a. image options for the Lock screen,
b. apps that appear on the Start menu.
c. screen saver settings.
d. apps that give notifications on the Lock screen image.
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in various security problems.
a) What are two such problems?
1. One user can read the private data of another user - privacy.
2. One user can corrupt the private data of another user - integrity.
3. One user can prevent another user from getting anything done - denail of service.
b) Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer.
There are two answers, either one correct.
a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing, and fairly shares the computer, then we can achieve the same level of security.
b. No - we can never be sure that our software doesn't have bugs, so we can never be sure that we prevent all sharing of data and fairly allocate computer resources.
Explanation:
a.
One user can read the private data of another user-privacy.One user can prevent another user from getting anything done-denial of service.Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.
b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.
Write a program using python 3 that asks the user how many integers they would like to enter. You can assume that this initial input will be an integer >= 1. The program will then prompt the user to enter that many integers. After all the numbers have been entered, the program should display the largest and smallest of those numbers (no, you cannot use lists but you can use loops, if statements, comparison & logical operators). Your code should work correctly no matter what integers the user enters. When you run your program it should match the following format:
How many integers would you like to enter?
4
Please enter 4 integers.
-4
105
2
-7
min: -7
max: 105
I've included my code in the picture below. Best of luck.
1. Which of the following cables are used in networking? Check all that apply.
a HDMI cable
b. Ethernet
C. Auxiliary cable
d. Fiber optic cable
Answer:
ethernet and HDMI for sure those 2
Explanation:
^
Write a recursive function to determine if a number is prime.
Answer:
Follows are the code to find the prime number:
import java.util.*;//import package for user input
public class Main//defining a class
{
public static boolean Prime(int x, int j)//defining a method isPrime
{
if (x<= 2) //use if block to check x less than equal to 2
return (x== 2) ? true : false; //use bitwise operator to return value
if (x%j == 0) //use if to check x%j equal to 0
return false;//return false value
if (j*j > x)//defining if that check i square value greater than n
return true; //return true value
return Prime(x, j+1); //callling recursive method
}
public static void main(String[] as)//main method
{
int n; //defining integer variable
Scanner oxc=new Scanner(System.in);//creating Scanner class object
n=oxc.nextInt();//input value
if (Prime(n, 2)) //use if block to call isPrime method
System.out.println("Yes"); //print value
else //else block
System.out.println("No"); //print value
}
}
Output:
5
Yes
Explanation:
In this code, a static boolean method "Prime" is declared, that accepts two integer variables in its parameter and defines the if block that checks the prime number condition by the recursive method and returns a value true or false. Inside, the main method an integer variable is declared that uses the Scanner class object for input value and passes into the method and prints its value.
Assume that a file containing a series of integers is named numbers.txt. Write a program that calculates the average of all the numbers stored in the file. The input file may have numbers all on one line or several lines or one number on each line.
Answer:
Program in Python:
file = open("numbers.txt", "r")
count = 0
isum = 0
content = file.readlines()
for nums in content:
num = nums.rstrip('\n').split(" ")
for i in num:
isum= isum + int(i)
count = count + 1
print("Average: "+str(isum/count))
Explanation:
This line opens the file named numbers.txt
file = open("numbers.txt", "r")
This line initializes num to 0
count = 0
This line initializes sum to 0
isum = 0
This line reads the content of the opened file file
content = file.readlines()
This iterates through the content of the file
for nums in content:
This removes trailing new lines and blank spaces from each number
num = nums.rstrip('\n').split(" ")
This also iterates through the content of the file
for i in num:
This calculates the sum of the numbers in the file
isum= isum + int(i)
This counts the numbers in the file
count = count + 1
This calculates and prints the average of the numbers
print("Average: "+str(isum/count))
The program reads in a series of integer values from a text file and calculates the average of the values. The program is written in python 3 thus ;
with open("numbers.txt", 'r') as file :
#opens the file in read mode
content = file.readlines()
#reads in the contents of the file at once into a list
count = 0
#initialize counter
sum = 0
#initialize the sum of the integers
for line in content:
#loop through each line in the content list
num = line.rstrip("\n").split()
#removes the newline and splits the values based on whitespace
for val in num :
#loops through the list
count+=1
#increase count by one for every iteration
sum+=int(val)
#takes the Cummulative sum
print("average =", int(sum/count))
Learn more : https://brainly.com/question/20308959
Which steps are needed for Word to create an Index? Select two options.
Mark entry.
Make a list of entries.
Insert Index.
Insert Table of Contents.
Insert Footnotes.
Answer:
A: Mark Entry
C: Insert Index
Explanation:
It includes Mark an Entry and Insert Index.
Index in Microsoft Word is used to list the terms or topics which are in the document as well as the pages they appear.
The steps to create an Index are:
You should place the insertion point where you want the index tab to appear.At top of the bar, you should click References tab, click Index group, click Insert Index. Then, the Index dialog box will appears.With the click of Ok, the Index will appears at the insertion point.In conclusion, the two options includes Mark an Entry and Insert Index.
Read more on this here
brainly.com/question/17864103
Write a program with total change amount as an integer input, and output the change using the fewest coins, one coin type per line. The coin types are Dollars, Quarters, Dimes, Nickels, and Pennies. Use singular and plural coin names as appropriate, like 1 Penny vs. 2 Pennies.
If input is 0 or less, output is 'No Change'
For Example: Input: 45
Output:
1 Quarter
2 Dimes
input_val = int(input())
if input_val <= 0:
print('No change')
else:
num_dollars == input_val // 100
input_val %= 100
num_quarters == input_val // 25
input_val %= 25
num_dimes == input_val // 10
input_val %= 10
num_nickels == input_val // 5
input_val %= 5
num_pennies == input_val
if num_dollars > 1:
print('%d dollars' % num_dollars)
elif num_dollars ==1:
print('%d dollar' % num_dollars)
if num_quarters > 1:
print('%d quarters' % num_quarters)
elif num_quarters ==1:
print('%d quarter' % num_quarters)
if num_dimes >1:
print('%d dimes' % num_dimes)
elif num_dimes ==1:
print('%d dime' % num_dimes)
if num_nickels >1:
print('%d nickels' % num_nickels)
elif num_nickels ==1:
print('%d nickel' % num_nickels)
if num_pennies >1:
print('%d pennies' % num_pennies)
elif num_pennies ==1:
print('%d penny' % num_pennies)
Answer:
b ,/knlk
Explanation:
In what order should these be completed?
1.Open case cover
2.Unplug computer
3.Clip ESD strap to case
4.Power down system
5.Press and hold power button
6.Back up data
What are two strategies a Product Owner can use during Program Increment Planning to minimize dependencies?
Answer:
1. Split Stories to eliminate dependencies;
2. Move Stories on their team's backlog to another team;
Explanation:
There are two established strategies a Product Owner can use during Program Increment Planning to minimize dependencies. These includes
1. Split Stories to eliminate dependencies; this help to define the different story for the Team backlog and thereby making others understand it in simple terms.
2. Move Stories on their team's backlog to another team;
Which of the following terms best describes the process of suppressing complex details of a system and presenting a simplified version with just the relevant details?
a. Creativity
b. Free Thinking
c. Abstraction
d. Programming
Answer: Abstraction
Explanation: Abstraction could simply be explained as an art of giving a general, concise and yet reasonable overview or summary of a rather bulky or voluminous assignment, project Or system. It is composed of key scenes or steps involved in a complex or huge build up in other make a simple and understandable version of the same project albeit exempting in depth explanation and analysis. Abstraction technique is used in making abstract segment of various projects which is a segment of a writeup or research where the summary of the entire project is being outlined.
Who is responsible for maintaining, monitoring, and analyzing database security at the back end?
The _________
works on the back end and is responsible for maintaining, monitoring, and analyzing database security
database.
Answer:
back end developer?
Explanation:
pls need help pls pls
its answer is listen to
PLEASE HELP!!! WILLGIVE BRAINLIEST!!!
By using an understanding of subtractive color, why do black cars left outside in a sunny day get hotter faster than white cars?
Question # 2 Multiple Choice The _____ method returns an integer between the two provided numbers. It can take the value of either of the provided numbers. seed randint random range
Answer:
randint
Explanation:
Answer:
randint
Explanation:
ed 2021
What can a user do using the Contact Group dialog box? Check all that apply.
name a group
add members to a group
vote on items
remove members
plan meetings
block other groups
email a group
Answer:
1,2,4,5,7
Explanation:
Had the question
Answer:
a b d e g
Explanation:
While setting up a computer on the network, you use 'ipconfig' and see that the IP address is currently 10.24.16.160, with subnet mask 255.255.255.192. Where did the IP address likely come from?
Answer:
Explanation:
The IP address either came from your router or your Internet Service Provider (ISP). Sometimes ISP's automatically assign every device under their network an IP address, while other times they allow each individual's home network router to determine the IP of every connected device. This router can either assign an automatic IP address to each device from a range of addresses or the IP address can be assigned manually to each device as static.
A loop that will output only the names that come before "Thor" in the alphabet from the names list.
names = ["Kevin", "Joe", "Thor", "Adam", "Zoe"]
names.sort()
for x in names:
if x == "Thor":
break
else:
print(x)
I made up my own names for the sake of testing my code. I wrote my code in python 3.8. I hope this helps.
A loop that will output only the names that come before "Thor" in the alphabet from the names list is written below:
What is a loop?A loop is a set of instructions in computer programming languages that repeatedly repeats itself until a given condition is met.
The time it takes to determine the number of times the loop iterates before the loop executes is the difference between the decorative and extensive program loops.
If a loop's block of code is to be repeated until the provided condition turns false, and this condition is tested before the block is run, the loop is said to be a pretest.
names = ["Kevin", "Joe", "Thor", "Adam", "Zoe"]
names.sort()
for x in names:
if x == "Thor":
break
else:
print(x)
Therefore, the loop is written or coded above.
To learn more about the loop, refer to the link:
https://brainly.com/question/25955539
#SPJ2
Read three integers from user input. Then, print the product of those integers. Ex: If input is 235, output is 30. Note: Our system will run your program several times, automatically providing different input values each time, to ensure your program works for any input values.
1 first-2
2 second-3
3 third=5
4 s=int(first second third)
5 print(s)
Answer:
The program in Python is as follows:
first = int(input())
second = int(input())
third = int(input())
s = first * second * third
print(s)
Explanation:
This prompts the user for first input
first = int(input())
This prompts user for second input
second = int(input())
This prompts user for third input
third = int(input())
This calculates the product
s = first * second * third
This prints the calculated product
print(s)
SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value matches a value contained within a subset of listed values is ____. Question 20 options: BETWEEN IS NULL LIKE IN
Answer:
LIKE.
Explanation:
A structured query language (SQL) can be defined as a domain-specific language designed and developed for managing the various data saved in a relational or structured database.
In Computer programming, any word restricted for use, only in object names because they belong to the SQL programming language are called reserved word.
Hence, these reserved words can only be used as the name of an object but not as an identifier e.g the name of a function, label or variable.
Some examples of reserved words in structured query language (SQL) are UPDATE, GROUP, CURRENT_USER, CURRENT_DATE, CREATE, DELETE etc.
Hence, SQL allows the use of special operators in conjunction with the WHERE clause. A special operator used to check whether an attribute value matches a value contained within a subset of listed values is LIKE.
Consider the following method, which is intended to return an array of integers that contains the elements of the parameter arr arranged in reverse order. For example array containing (-5, 3, 2, 7) then a new array (-5, 3, 2, 7) contains should be returned and the parameter are should be left unchanged .
public static int[] reverse(int) arr)
Intl new new intarr.length);
for (int k = 0; K arr.length: )
* Bissing statement / return newer;
Write down the statements that can be used to replace / Missing statement so that the method works as intended?
Code:
public static int[] reverse(int [] arr){
Int [] newArr = new int[arr.length];
for (int k = 0; k<arr.length;k++){
/*Missing statement */
}
return newArr;
Answer:
Replace the comment with:
newArr[k] = arr[arr.length-k];
Explanation:
Required
Complete the code
In the given code:
The first line of the given code defines the method
public static int[] reverse(int [] arr){
The next line declares array newArr withe same length as array arr
Int [] newArr = new int[arr.length];
The next line iterates through the elements of array arr
for (int k = 0; k<arr.length;k++){
The /* Missing statement */ is then replaced with:
newArr[k] = arr[arr.length-k];
The above statement gets the elements of array arr in reversed order.
This is so because, as the iteration iterates through array arr in ascending order, arr.length-k gets the element in reversed order
Mobile cameras are now of a higher quality than when they first arrived on the market. Describe the difference in
resolution that has come about and how that has led to higher photo quality.
Answer:
When mobile cameras first arrived on the market, they did not have a high-quality resolution. But after the years, mobile cameras are able to record a significant amount of digital information.
You have booted a new computer (purchased from a manufacture) to PowerShell prior to the computer starting the Out-of-Box Experience. From PowerShell, you run the Set-ExecutionPolicy Unrestricted cmdlet. What is the function of this cmdlet?
Answer:
It allows Windows to run script files.
Explanation:
A cmdlet is an abbreviation for command-let and it is a special type of lightweight command that is typically used with the Microsoft Windows PowerShell script for the automatic performance of a single-specific function on a computer system.
In this scenario, you have booted a new computer (purchased from a manufacture) to PowerShell prior to the computer starting the Out-of-Box Experience. From PowerShell, you run the Set-ExecutionPolicy Unrestricted cmdlet. Thus, the function of this cmdlet is to allow Windows run script files known as scripts which have been typed into the command line.
Complete the sentence about entering and editing data in a cell in a spreadsheet.
To enter data in a cell in a spreadsheet (1, select the cell, click and start typing.2, select the cell and right click to bring up options.3, select the row that contains the cell and use the insert tool.) To overwrite data in a cell(1, select the cell, click and start typing.2, select the cell and right click to bring up actions.3, select the row that contains the cell and use the insert tool)
Answer:
1. Select the cell, click and start typing
2. Select the cell, click and start typing
Explanation:
To enter data in a cell in a spreadsheet, select the cell, click and start typing.
To overwrite data in a cell, select the cell, click and start typing.
A spreadsheet is an application that is used for entering, organizing, analyzing, interpreting and storing data. It a relatively simple application and an example is Microsoft Excel. The easiest way to enter data into a spreadsheet is to select the cell, click and start typing. Overwriting an already existing data can be done in the same manner in which data is entered into a cell - selecting the cell, clicking and start typing.
To enter data in a cell in a spreadsheet, select the cell, click, and start typing. To overwrite data in a cell, select the cell, click, and start typing. The correct options are 1 and 1 respectively.
To enter data into a spreadsheet cell, first select the required cell by clicking on it. Once you've made your selection, you may begin typing immediately into the cell.
You can enter numbers, text, or formulae into the column for additional computations or data organisation. To erase data in a cell, however, repeat the procedure of choosing the cell by clicking on it.
As you begin inputting new information, the prior material within the cell will be highlighted and replaced.
This makes it simple to modify and update data within spreadsheet cells, assuring accuracy and flexibility in data management.
Thus, the correct options are 1 and 1 respectively.
For more details regarding spreadsheet, visit:
https://brainly.com/question/31511720
#SPJ6
-(-13) P binary using signed. 2's complement representation
Perform the arithmetic operations (+42) + (-13) and (-42)
negative .
Consider the balloon
Answer:
00011101
00011101
Explanation:
Given the following arithmetic operations
a) (+42) + (-13)
b) (-42) - (-13)
From (a):
We need to convert +42 into binary, so we get = 00101010
Now for +13, when it is converted into binary, we get = 00001101
But, here, the 13 is negative. So, here is what we will do, we will have to take the two compliment of the binary. After doing that, we get = 111110011
∴
+ 42 → 00101010
- 13 → 1 1 1 10011
+29 000 11101
Thus, the arithmetic operation after we use 2's complement is 00011101
b)
Here both 42 and 13 are negative. Using two complement representation
-42 is first converted to binary as 00101010, Then → 11010101 + 1 = 11010110
-13 is converted to binary as 00001101 → 11110010 = 11110011
In between, a negative sign exists, so we take another 2's complement.
i.e.
11110011 → 00001100 + 1 = 00001101
- 42 → 1 1 01 0110
+13 → 00001 101
-29 1 1 1 00011
since there is no carry, we take two's complements for the result as:
1 1 1 00011 →00011100 + 1 = 00011101
Explain briefly what would happen if marketing research is not conducted before a product is developed and produced for sale.
Answer:
Neglecting to do market research can result in indecision and inaction, fear of risk or the truth, and/or too many options, which can lead to paralysis. When launching a new product, effective market research will help you narrow down your true market potential and your most likely customers.
Explanation:
A customer is looking for a storage archival solution for 1,000 TB of data. The customer requires that the solution be durable and data be available within a few hours of requesting it, but not exceeding a day. The solution should be as cost-effective as possible. To meet security compliance policies, data must be encrypted at rest. The customer expects they will need to fetch the data two times in a year. Which storage solution should a Solutions Architect recommend to meet these requirements
Incomplete question. The options;
A. Copy data to Amazon S3 buckets by using server-side encryption. Move data to Amazon S3 to reduce redundancy storage (RRS).
B. Copy data to encrypted Amazon EBS volumes, then store data into Amazon S3.
C. Copy each object into a separate Amazon Glacier vault and let Amazon Glacier take care of encryption.
D. Copy data to Amazon S3 with server-side encryption. Configure lifecycle management policies to move data to Amazon Glacier after 0 days.
Answer:
D. Copy data to Amazon S3 with server-side encryption. Configure lifecycle management policies to move data to Amazon Glacier after 0 days.
Explanation:
Note, the Amazon S3 (Amazon Simple Storage Service) is a cloud storage service that is both durable, cost-effective, and secure. Since the customer wants a storage space of up to 1,000 TB (terra bytes), this makes the Amazon S3 solution the most recommended solution.
The process begins by copying the data to Amazon S3 with server-side encryption. Next, set-up the configuration of lifecycle management policies to move data to Amazon Glacier after 0 days.
Mary is working on joining of a new domain tree to an existing forest, but before starting the process, she should have at least some number of other domains present. What will be the number of those domains?
Answer:
One.
Explanation:
When two or more domains (trees) not sharing a contiguous namespace are joined together, a forest would be formed.
This ultimately implies that, a forest is formed by joining two or more independent domains having non-contiguous namespaces are joined together.
For instance, joining brainly1.com and brainly2.com would result in a forest i.e a single Active Directory environment.
In this scenario, Mary is working on joining of a new domain tree to an existing forest. Before starting the process, she should have at least one domains present. This single domain is typically known as the root domain.
Hence, joining a new domain tree to an existing forest requires that a user must have at least one domains present.
Question # 2 Multiple Select You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results. Your program compared an equal number of male and female drivers. You could modify the program to allow the user to enter the data. It is important to test your program with a small enough set of data that you can know what the result should be. A different set of observations might result in a larger portion of male drivers being on the phone
Answer:
3,5,4,1
Explanation:
Edge 2020
Twenty years ago, most games were sold in brick and mortar stores. How did independent game developers get their games into these stores?
Question 18 options:
by working with a crowdfunding specialist who would give developers funds to offer to retailers if they promised to sell the game
by working with a piracy specialist who would ensure the game was distributed to each and every retailer, regardless of licensing
by working with a retail specialist who distributed video games to consumers
by working with a publisher who would help the developer bring their games to stores and then market them and get as much exposure and traction as possible
Answer: by working with a publisher who would help the developer bring their games to stores and then market them and get as much exposure and traction as possible
Explanation:
Publishers were and are still important in the gaming world even if they have now increasingly moved online. Publishers have a reputation and with this reputation comes access to a wide array of services that enable them to sell games.
This was the same when most stores were brick and mortar. One would sign a deal with a publisher who through their expertise would help the game get to market and give it publicity so that it can be sold.