What are some reasons DNS is necessary? Check all that apply. A. It maps local addresses to simple names without editing hosts files. B. It makes Internet website IP addresses accessible with human readable domain names. C. It simplifies remote access. D. It improves network throughput.

Answers

Answer 1
Domain Name Servers (DNS) are certainly necessary for easy access of resources across a network. The applicable options of the above are A and B - below are explanations as to why.

A: Computers generally are set to automatically obtain DNS information from the network they are connected to or can be pointed to a specific DNS server. This allows for records of where resources (network attach storage devices, other computers on local network, or even website server details) are located on a “master” kind of list so that the local machine’s host file does not have to be routinely updated to contain new addresses.

B: DNS, as explained partially by the answer to A, maintains a type-able or “human readable” domain name for the actual server’s IP address so we don’t have to memorize or keep a list of IPs for where we want to visit on the web (although, Google’s 8.8.8.8 IP address does make it easy). It shows an association between a name/domain name and an IP address so that we can enter something simple (Google.com) and the computer knows where to go (the server at IP address 8.8.8.8) so it can show you the content you want to see.

C: DNS would only simplify remote access if your were attempting LAN (Local Area Network) remote access of another computer on your network. DNS would not make it easier for remote access of a computer on the internet, as most DNS used in non-commercial settings are created and maintained by third-parties that will not put a specific record for one of your computers in it - not that you would want them to either, since it could lead to an open cyber attack.

D: Network throughput is a fancy phrase for network speed. It could be possible that different DNS servers could process requests faster than others, but it is not likely to increase network speed on the whole as navigating via IP or DNS records will be relatively the same speed.

Related Questions

4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think operating system designers would use the same interface for both

Answers

Answer:

According to the principles of design, Repetition refers to the recurrence of elements of the design

One of the advantages of this is that it affords uniformity. Another is that it keeps the user of such a system familiar or with the interface of the operating system.

One major drawback of this principle especially as used in the question is that it creates a familiar route for hackers.

Another drawback is that creates what is called "repetition blindness". This normally occurs with perceptual identification tasks.

The  phenomenon may be  due to a failure in sensory analysis to process the same shape, figures or objects.

Cheers!

What is meat by text wrapping?

Answers

Answer:

Text wrap is a feature supported by many word processors that enables you to surround a picture or diagram with text. The text wraps around the graphic (picture or diagram).

Explanation:

Hope this helps :)

QUESTION 22 Select the correct statement(s) regarding Carrier Ethernet (CE). a. the Metro Ethernet Forum (MEF) created a CE framework to ensure the interoperability of service provider CE offerings b. MEF certified CE network providers, manufacturers and network professionals to ensure interoperability and service competencies c. MEF certified services include E-Line, E-LAN, E-Tree, E-Access, and E-Transit d. all are correct statements

Answers

Answer:

d. all are correct statements

Explanation:

CARRIER ETHERNET can be defined as the Ethernet which is a telecommunications network providers that provides and enables all Ethernet services to their customers and as well to help them utilize the Ethernet technology in their networks which is why the word “Carrier” in Carrier Ethernet networks is tend to refers to a large communications services providers that has a very wide reach through all their global networks. Example of the carriers are:

They help to provide audio, video, as well as data services to residential and to all business as well as enterprise customers.

CARRIER ETHERNET also make use of high-bandwidth Ethernet technology for easy Internet access and as well as for communication among the end users.

Therefore all the statement about CARRIER ETHERNET NETWORK are correct

a. Metro Ethernet Forum (MEF) is a type of ethernet which created a Carrier Ethernet framework in order to ensure the interoperability of service provider that the Carrier Ethernet is offerings.

b. The MEF also help to certifies CE network providers, as well as the manufacturers and network professionals in order to ensure interoperability as well as a great service competencies.

c. MEF certified services also include E-Line, E-LAN, E-Tree, E-Access, and E-Transit

Hence, MEF is an important part of Carrier Ethernet because they act as the defining body for them, reason been that they are as well telecommunications service providers, cable MSOs, as well as network equipment and software manufacturers among others.

Modify the DemoSalesperson application so each Salesperson has a successive ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive Salesperson. Save the file as DemoSalesperson2.java.

Answers

Answer:

Here is the modified DemoSalesperson2

public class DemoSalesperson2{ // class DemoSalesperson2

public static void main(String[] args) { //start of main() function body

SalesPerson[] sp = new SalesPerson[10]; // creates an array of SalesPerson object named sp

int start_id =111; // assign 111 to starting id number

double start_sal=25000; //assign 25000 to starting salary means salary will start from amount 25000

 for (int i =0; i<sp.length; i++) { //loop iterates until the value of loop variable i remains less then length of the array object sp

  sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i)); /*at each iteration  ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive is displayed using object array sp[] which calls the SalesPerson constructor to access id and sales */

 System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  } } } /*uses object sp of class SalesPerson to access the methods getId which returns the id and getAnnualSales method which returns the annual sales, to display id and annual sales */

Explanation:

The question first requires a SalesPerson class with these requisites:

Class name: Salesperson.

Data fields for Salesperson: int ID number , double annual sales amount.

Methods: constructor SalesPerson() that requires values for both data fields, as well as get and set methods for each of the data fields.

So according to the complete question's requirement, I have implemented SalesPerson class:

public class SalesPerson {   // class name

//data members: integer type id variable and double type sales variable

   private int id;  

   private double sales;  

   public SalesPerson(int id_no, double annual_sales) {   //constructor that requires values for id and sales

       id = id_no;  

       sales = annual_sales;     }  

   public int getId() {   //accessor getId() method to get or access the value of id data field

       return id;     }  

   public void setId(int id_no) {   //mutator setId to set the value of id data field

       id = id_no;     }  

   public double getAnnualSales() {   //accessor getAnnualSales() method to get or access the value of sales data field

       return sales;     }  

   public void setAnnualSales(double annual_sales) { //mutator setAnnualSales to set the value of sales data field

       sales = annual_sales;     }  }

However you can use my DemoSalesperson2 application for your own SalesPerson class.

Now I will explain the working of for loop used in DemoSalesperson2

Iteration 1:

i=0

i<sp.length is true because length of sp[] is 10 so i<10

This means the body of for loop will execute.

The statement inside the body of for loop is :

 sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));

class SalesPerson constructor is used to access the data members of SalesPerson class

start_id = 111

start_sal=25000

start_id+i = 111 + 0 = 111

start_sal+5000*(i) = 25000 + 5000 (0) = 25000

The values 111 and 25000 are stored to sp[0] means at the first index of the sp array.

System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  

This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.

So the output at 1st iteration is:

111   25000.0

Iteration 1:

The value of i is incremented to 1 so now i = 1

i<sp.length is true because length of sp[] is 10 so i<10

This means the body of for loop will execute.

The statement inside the body of for loop is :

 sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));

class SalesPerson constructor is used to access the data members of SalesPerson class

start_id = 111

start_sal=25000

start_id+i = 111 + 1 = 112

start_sal+5000*(i) = 25000 + 5000 (1) = 25000 + 5000 = 30000

The values 111 and 25000 are stored to sp[1] means at the first index of the sp array.

System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  

This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.

So the output at 1st iteration is:

112   30000.0

The loop keeps iterating and the value of id is incremented by 1 and value of sales is increased by 5000 at every iteration.

This loop continues to execute until the value of i exceeds the length of sp array i.e. 10.

The values from iteration 1 to 8 following the above explanation are:

Iteration 1:

111    25000.0

Iteration 2:

112    30000.0

Iteration 3:

113    35000.0

Iteration 4:

114   40000.0  

Iteration 5:

115   45000.0  

Iteration 6:

116   50000.0                                                          

Iteration 7:

117   55000.0                                                                                                      

Iteration 8:                                                                                      

118   60000.0      

Iteration 9:                                                                                    

119   65000.0

Iteration 10:                                                                                    

120   70000.0

At iteration 11 the for loop body will not execute as value of i at 11th iteration is i = 10 and i<sp.length evaluates to false as i = sp.length because length of sp array is 10 and now the value of i is also 10. So the loop ends. Screenshot of the program and its output is attached.

The U.S. continues to become more dependent on the global domain within the information environment consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers. It is imperative that we safeguard this domain known as

Answers

Answer:

"Cyberspace " is the right answer.

Explanation:

Cyberspace seems to be an interactive computational environment, unconstrained by distance and perhaps other functional disabilities. William Gibson developed the word for representing a sophisticated augmented reality infrastructure in his story Neuromancer.The virtual space generated over the network through synchronized computing devices.

So that the above would be the correct answer.

Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is entered.

Answers

Answer:

Here is the sentinel-controlled while loop:

#include <iostream> //to use input output functions

using namespace std; // to identify objects like cin cout

int main(){ // start of main() function body

int test_score; // declare an integer variable for test scores

//prompts user to enter test scores and type-99 to stop entering scores

cout << "Enter the test scores (enter -99 to stop): ";

cin >> test_score; // reads test scores from user

while (test_score != -99){ // while loop keeps executing until user enters -99

cin >> test_score; } } // keeps taking and reading test scores from user

Explanation:

while loop in the above chunk of code keeps taking input scores from user until -99 is entered. Sentinel-controlled loops keep repeating until a sentinel value is entered. This sentinel value indicates the end of the data entry such as here the sentinel value is -99 which stops the while loop from iterating and taking the test score input from user.

The complete question is that the code should then report how many scores were  entered and the average of these scores. Do not count the end sentinel -99 as a score.

So the program that takes input scores and computes the number of scores entered and average of these scores is given below.

#include <iostream>  // to use input output functions

using namespace std;  // to identify objects like cin cout

int main(){  //start of main function body

double sum = 0.0;  // declares sum variable to hold the sum of test scores

int test_score,count =0;  

/* declares test_scores variable to hold the test scores entered by user and count variable to count how many test scores input by user */

cout << "Enter the test scores (or -99 to stop: ";

//prompts user to enter test scores and type-99 to stop entering scores

cin >> test_score;  // reads test scores from user

while (test_score != -99){  // while loop keeps executing until user enters -99

count++;  /* increments count variable each time a test cores is input by user to count the number of times user entered test scores */

sum = sum + test_score;  // adds the test scores

cin >> test_score;}  // reads test scores from user

if (count == 0)  // if user enters no test score displays the following message

cout << "No score entered by the user" << endl;

else  //if user enters test scores

//displays the numbers of times test scores are entered by user

cout<<"The number of test scores entered: "<<count;

/* displays average of test scores by dividing the sum of input test scores with the total number of input test scores */

cout << "\n The average of " << count << " test scores: " <<sum / count << endl;}

The program along with its output is attached.

15. The primitive data types in JavaScript are:​

Answers

Answer:

The three primitive data types in JavaScript are:

1. Numbers

2. Strings of text(known as "strings")

3. Boolean Truth Values (known as "booleans")

Write the code to read 3 input values for the length, height and width of a cuboid, then calculate the area and circumference.

Answers

Answer:

length = float(input("Enter the length: "))

height = float(input("Enter the height: "))

width = float(input("Enter the width: "))

area = 2 * (length * height + height * width + width * length)

circumference = 4 * (length + height + width)

print("The area is: " + str(area))

print("The circumference is: " + str(circumference))

Explanation:

*The code is in Python.

Ask the user to enter the length, height and width

Calculate the area and circumference using the formulas and print them

A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.

Answers

Answer:

Threat assessment

Explanation:

A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.

Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.

Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".

Answer:

Threat assessment

Explanation:

In an IT system, threat assessment is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.

The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;

i. Prevention of data loss

ii. Prevention of system or network of systems downtime

In carrying out threat assessment, one might need to do the following;

i. identification and prioritization of infrastructure including the software and hardware applications in the system.

ii. identification of potential threats such as system failure, natural disaster, unwanted access.

iii. identification of vulnerabilities in the system.

iv. analysing controls by determining who has access and who doesn't.

v. analysing the impact of a threat occurrence.

vi. documentation of analysis and evaluation results.

differentiate between web site and web application?

Answers

Explanation:

A website is a group of globally accessible into linked pages which have a single domain name. A web application is a software or program is is accessible using any web browser.

Answer:

Explanation:

A website shows static or dynamic data that is predominantly sent from the server to the user only, whereas a web application serves dynamic data with full two way interaction.

If a process does not call exec after forking, A. the program specified in the parameter to exec will replace the entire process B. all the threads should be duplicated C. all the threads should not be duplicated D. none of above

Answers

Answer:

b) all the threads should be duplicated

Explanation:

The fork provides a process to start a new one, and the new process is not the same program. The exec system call com in play. Exec replaces the currently running process with information. The process is launching a new program firstly fork and create a new process. Exec load into memory. Fork copies of all attribute the new process except for memory. A clone system call implements the kernel fork. Forking provides the existing process. And the thread should be duplicated.

How would you represent a single cyan-colored pixel in Base64 encoding? (Hint: first think about how to represent cyan as a three-byte binary number, and then do the Base64 encoding from the lecture.)

Answers

Answer:

The answer is "AP//"

Explanation:

In the given question choices were missing so, the correct choice can be defined as follows:

The 3-bit color description of 'CYAN' is 011 if we convert it into 3- byte binary representation, we get,  the 3- byte binary representation that is equal to 011 =  00000000 11111111 11111111  and to split the 3-byte description into 6-bit subset to transform into Base64. so, we get:  000000 001111 111111 111111

if we have the Base64 alphabet table to convert the 6-bit representation towards its comparable letter or character by the 6-bit subgroup, that can be defined as follows:

In 000000  the decimal value is = 0, which is equal to Base64 character is ='A' . In 001111 the decimal value is = 15, which is equal to Base64 character is= 'P'  The 111111, its decimal value is = 63, in the Base64 its character is = '/' The 111111, its decimal value is = 63, in the Base64 its character is = '/'

A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long file names. Can something approximating a hierarchical file system be simulated? How?

Answers

Answer:

Yes

Explanation:

Yes, something approximating a hierarchical file system be simulated. This is done by assigning to each file name the name of the directory it is located in.

For example if the directory is UserStudentsLindaPublic, the name of the file can be UserStudentsLindaPublicFileY.

Also the file name can be assigned to look like the file path in the hierarchical file system. Example is /user/document/filename

All of the following are examples of being computer literate, EXCEPT ________. knowing how to use the web efficiently knowing how to build and program computers knowing how to avoid hackers and viruses knowing how to maintain and troubleshoot your computer

Answers

Answer:knowing how to build and program computers.

Explanation:

List the names of 3 computer scientists

Answers

Hi there! Hopefully this helps!

------------------------------------------------------------------------------------------------------

1. Barbara Liskov.

2. Carl Sassenrath.

3. Larry Page.

Answer:

1. Ellon Musk

2. Larry Page

3. John Hopcroft

Hope that helps!

#Write a function called align_right. align_right should #take two parameters: a string (a_string) and an integer #(string_length), in that order. # #The function should return the same string with spaces #added to the left so that the text is "right aligned" in a #string. The number of spaces added should make the total #string length equal string_length. # #For example: align_right("CS1301", 10) would return the #string " CS1301". Four spaces are added to the left so #"CS1301" is right-aligned and the total string length is #10. # #HINT: Remember, len(a_string) will give you the number of #characters currently in a_string.

Answers

Answer:

This program is written using Python Programming Language;

Comments are not used; however, see explanation section for detailed line by line explanation

See Attachment

Program starts here

def align_right(a_string,string_length):

     if len(a_string) > string_length:

           print(a_string)

     else:

           aligned=a_string.rjust(string_length)

           print(aligned)

   

a_string = input("Enter a string: ")

string_length = int(input("Enter string length: "))

align_right(a_string,string_length)

Explanation:

Function align_right is declared using on line

def align_right(a_string,string_length):

This line checks if the length of the current string is greater than the input length

     if len(a_string) > string_length:

If the above condition is true, the input string is printed as inputted

           print(a_string)

If otherwise,

     else:

The string is right justified using the next line

           aligned=a_string.rjust(string_length)

The aligned string is printed using the next line

           print(aligned)

   

The main function starts here

This line prompts user for a string

a_string = input("Enter a string: ")

This line prompts user for total string length

string_length = int(input("Enter string length: "))

This line calls the defined function

align_right(a_string,string_length)

Three students were lined up in a row. Damon was to the left of Val but not necessarily next to them. The student wearing the blue shirt was to the right of the student wearing the white shirt. The student wearing the black shirt was to the left of Harold. Harold was to the left of Val.



What was the order of the students from left to right? (Names should be separated by commas - e.g. Jane, Tri, Dave)

Answers

Answer:

demon,harold,val

Explanation:

as it say that damon is on the left nut not necessary  to next to val .harlord was also to the left of varl so on the most right side varl was there and also there was one person who was on the right of harold so harold have one person on the left other on the right harold was in center varl was on right most side and damon was on left most side  

When discussing the behavior of vulnerability assessments which choice will exploit a weakness?
a) Penetration test
b) Vulnerability scan
c) Intrusive
d) Gray box
e) Credentialed vulnerability scan
f) Non-credentialed vulnerability scan

Answers

Answer:

a) Penetration test

Explanation:

A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.

In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.

Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.

When discussing the behavior of vulnerability assessments, the choice which will exploit a weakness is: A) Penetration test.

Cyber security can be defined as a preventive practice to systematically protect computers, software applications (programs), networks, electronic devices, servers and user data from potential attack, damage, theft or an unauthorized access, especially through the use of technologies, frameworks, integrity principles, processes, penetration test and network engineers.

A vulnerability can be defined as a weakness in an automated internal control system and security procedures, which may be exploited by an attacker (hacker) to gain unauthorized access to the data stored on a computer system or disrupt the information system.

Basically, vulnerability assessments can be used in the following ways:

Identify loopholes, risks and security threats. Prioritize and enhance an information system.Mitigate potential security threats.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, so as to identify, test an check for exploitable vulnerabilities in a web software, network, etc.

This ultimately implies that, a penetration test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments.

opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and user resources. briefly explain what must be done by the operating system protection mechanism in order to provide the required system protection

Answers

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

General PoliciesServer PoliciesVPN PoliciesBack-Up PoliciesFirewall Access and Configuration Policies

Cheers!

Customer Premises Equipment (CPE) includes all devices connected to the PSTN, where the ownership and the responsibility for maintenance and repair of the device belongs to the customer and not to the telephone service provider.
A. True
B. False

Answers

Answer:

True.

Explanation:

Customer Premises Equipment (CPE) in telecommunications includes all devices connected to the public switched telephone network (PSTN), where the ownership and the responsibility for maintenance and repair of the device belongs to the customer and not to the telephone service provider.

The customer premises equipment (CPE) can either be an active or passive network equipment which are located in the premises of the customer.

Some typical examples of consumer premises equipment (CPE) are switches, routers, PABX systems, modem, telephone, set-top boxes etc. These devices are used to connect or enable customers to use the services being provided by the telecommunications company.

Hence, you note that they are the property of a customer and not belonging to the service provider. Thus, in the event of a downtime or in cases of maintenance the responsibility lies on the user.

However, a demarco can be used to distinguish between a customer premises equipment and equipments belongings to the telecommunications service provider.

k- Add the code to define a variable of type 'double', with the name 'cuboidVolume'. Calculate the volume of the cuboid and set this variable value.

Answers

Answer:

Here is the JAVA program to calculate volume of cuboid:

import java.util.Scanner; // Scanner class is used to take input from user

public class CuboidVol { // class to calculate volume of cuboid

public static void main(String[] args) { // start of main() function body

Scanner input= new Scanner(System.in); //create Scanner class object

// prompts user to enter length of cuboid

System.out.println("Enter the cuboid length:");

double length=input.nextDouble(); //reads the input length value from user

// prompts user to enter width of cuboid

System.out.println("Enter the cuboid width:");

double width=input.nextDouble(); //reads the input width from user

// prompts user to enter height of cuboid

System.out.println("Enter the cuboid height:");

double height=input.nextDouble(); //reads the input height from user

/* the following formula is to calculate volume of a cuboid by multiplying its length width and height and a double type variable cuboidVolume is defined to store the value of the resultant volume to it */

double  cuboidVolume= length*width*height; //calculates cuboid volume

//displays volume of cuboid and result is displayed up to 2 decimal places

System.out.printf("Volume of the cuboid (length " + length + "/ height " + height + "/ width" +width +" is: " + "%.2f",cuboidVolume);   } }

Explanation:

The formula for the volume of a cuboid is as following:

Volume = Length × Width ×  Height

So in order to calculate the volume of cuboid three variable are required for length, width and height and one more variable cuboidVolume to hold the resultant volume of the cuboid.

The program is well explained in the comments added to each statement of the program. The program prompts the user to enter the value of height width and length of cuboid and the nextDouble() method is used to take the double type input values of height length and width. Then the program declares a double type variable cuboidVolume to hold the result of the volume of cuboid. Then the last printf statement is used to display the volume of cuboid in the format format "Volume of the cuboid (length  / height  / width ) is" and the result is displayed up to 2 decimal places.

The screenshot of the program along with its output is attached.

based on the condition.
The starting value of looping statement is calle
This is the final (last) value of loop statement a
This is a non-executable statement which is al
of QBASIC.
This statement is used to make variable global
It is declared in the main program and changes
This statement is used to close the one or more​

Answers

Answer:

A subroutine is a block of statements that carries out one or more tasks. ... they share all variables with the rest of the main program. ... Once you have defined a function in your program, you may use it in any appropriate expression, such as: ... Thus, functions can- not change the values of the arguments passed to them.

Explanation:

How could using WellConnect help you with time management and in personal health and wellness?

Answers

Answer:

Well Connect help in personal health and wellness

Explanation:

Well Connect is a collaboration of the individuals, and it focused on optimizing the experience of health. Rochester improves healthcare. Well, Connect created. Half of the adults have a physical, mental health condition. Chronic conditions are acute conditions as they cannot be cured. They manage and prevented it. They manage healthcare. Well Connect supports individuals. Well Connect brings the public health community to create a unified system. It is designed to develop relationships with healthcare. Everyone is involved in Well Connect with passion.

How to set up a simple peer-to-peer network using a star topology?

Answers

Answer:

The description including its scenario is listed throughout the explanation section below.

Explanation:

Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.

Throughout this configuration or setup:

Each common network setups network unit, such as a firewall, switch, as well as computer. The main network computer serves as either a server as well as the peripheral system serves as just a client.

Step1: This file contains just a program shell in which you will write all the programming statements needed to complete the program described below. Here is a sample of the current contents of areas.cpp 1 // Assignment 5 is to compute the area (s) WRITE A COMMENT BRIEFLY DESCRIBING THE PROGRAM PUT YOUR NAME HERE. 2 3 4 // INCLUDE ANY NEEDED HEADER FILES HERE 5 using namespace std;l 7 int main) 9// DEFINE THE NAMED CONSTANT PI HERE AND SET ITS VALUE TO 3.14159 10 11 // DECLARE ALL NEEDED VARIABLES HERE. GIVE EACH ONE A DESCRIPTIVE 12// NAME AND AN APPROPRIATE DATA TYPE 13 14// WRITE STATEMENTS HERE TO DISPLAY THE 4 MENU CHOICES 15 16// WRITE A STATEMENT HERE TO INPUT THE USERS MENU CHOICE 17 18// WRITE STATEMENTS TO OBTAIN ANY NEEDED INPUT INFORMATION 19// AND COMPUTE AND DISPLAY THE AREA FOR EACH VALID MENU CHOICE 20 / IF AN INVALID MENU CHOICE WAS ENTERED, AN ERROR MESSAGE SHOULD 21 /BE DISPLAYED 23 return 0 24 )
Step 2: Design and implement the areas.cpp program so that it correctly meets the program specifications given below Specifications: Sample Run Program to calculate areas of objects Create a menu-driven program that finds and displays areas of 3 different objects. The menu should have the following 4 choices 1 -- square 2 circle 3 - right triangle 4 - quit 1square 2 -- circle 3 -- right triangle 4quit Radius of the circle: 3.0 Area 28.2743 . If the user selects choice 1, the program should find the area of a square . If the user selects choice 2, the program should . If the user selects choice 3, the program should . If the user selects choice 4, the program should . If the user selects anything else (i.e., an invalid find the area of a circle find the area of a right triangle quit without doing anything choice) an appropriate error message should be printed

Answers

Answer & Explanation:

This program is written in C++ and it combines the step 1 and step 2 to create a menu driven program

Each line makes use of comments (as explanation)

Also, see attachment for program file

Program Starts Here

//Put Your Name Here; e.g. MrRoyal

//This program calculates the area of circle, triangle and square; depending on the user selection

//The next line include necessary header file

#include<iostream>

using namespace std;

int main()

{

//The next line defines variable pi as a constant with float datatype

const float pi = 3.14159;

// The next two lines declares all variables that'll be needed in the program

string choice;

float length, base, height, radius, area;

// The next four lines gives an instruction to the user on how to make selection

cout<<"Press 1 to calculate area of a square: "<<endl;

cout<<"Press 2 to calculate area of a circle: "<<endl;

cout<<"Press 3 to calculate area of a triangle: "<<endl;

cout<<"Press 4 to quit: "<<endl;

//This  next line prompts user for input

cout<<"Your choice: ";

//This next line gets user input and uses it to determine the next point of execution

cin>>choice;

if(choice == "1")  //If user input is 1, then the choice is area of square

{

 cout<<"Length: ";  //This line prompts user for length of the square

 cin>>length;  // This line gets the length of the square

 area = length * length;  //This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "2") //If user input is 2, then the choice is area of circle

{

 cout<<"Radius: ";  //This line prompts user for radius

 cin>>radius;  //This line gets radius of the circle

 area = pi * radius * radius;  // This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "3") //If user input is 2, then the choice is area of triangle

{

 cout<<"Base: "; //This line prompts user for base

 cin>>base;  //This line gets the base

 cout<<"Height: ";  //This line prompts user for height

 cin>>height;  //This line gets the height

 area = 0.5 * base * height;  //This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "4")  //If user input is 4, then the choice is to quit

{

 //Do nothing and quit

}

else  //Any other input is invalid

{

 cout<<"Invalid Option Selected";

}

return 0;

}

If a program writes more information into the computer's memory than the memory was designed to hold, it is a(n) ___________ attack

Answers

Answer:

Buffer-overflow.

Explanation:

If a program writes more information into the computer's memory than the memory was designed to hold, it is a buffer-overflow attack.

A buffer in computer technology can be defined as a temporary area set aside for data storage. Buffers reside in the random access memory (RAM). In the event that, a system process or program places more data (much more than what was originally or initially intended to be allocated for data storage) in a buffer, the extra data overflows. Consequently, this would result in having some of the data to flow into other buffers and thus, causing the data to be overwritten or corruption of the data being held in that buffer.

For instance, we can liken a buffer-overflow to pouring water (data) into a container (program memory), once it is filled the water begins to overflow as the container has reached its maximum amount.

In a buffer-overflow attack, the hacker or attacker use the extra data to influence certain unauthorized actions such as getting privy informations, damaging a file, compromising a data, corrupting a software program etc.

The common types of buffer-overflow attacks are;

1. Heap-overflow attack.

2. Stack-overflow attack.

3. Unicode-overflow attack.

4. Integer-overflow attack.

In conclusion, the buffer-overflow attack could be prevented through the randomization of the address space.

Open source companies like Ethereum and Codius are enabling Smart Contracts using blockchain technology.

a. True
b. False

Answers

Answer:

True

Explanation:

Ethereum uses Smart Contracts Blockchains and one of the programmers actually explained how it works at a DC Blockchain Summit.

Answer:

True.

Explanation:

In 2018, Cryptanite Blockchain Technologies Corp. (CSE: NITE), a Boulder-based blockchain technology company, today announced the launch of hosting capabilities with Codius, an open-source platform that enables the hosting of smart contracts and apps powered by the Ripple blockchain. Publicly listed in both Canada and in Germany, Cryptanite is one of the first companies to market with Codius’ hosting capabilities.

Write a program that asks a user to predict how many rolls of a single die it will take to reach 100. When all rolling is finished, compare the given answer to the results and let them know if they did well or not.

Answers

Answer:

import random

guess = int(input("Make a guess: "))

total = count = 0

while total < 100:

   roll = random.randint(1, 6)

   total += roll

   count += 1

if guess == count:

   print("Your guess is correct")

elif guess > count:

   print("Your guess is high")

else:

   print("Your guess is low")

Explanation:

*The code is in Python.

Import the random module to simulate the dice roll

Ask the user to make a guess

Initialize the total and count as 0

Create a while loop that iterates while the total is smaller than 100. Inside the loop, use random to get a random number between 1 and 6 and set it to the roll. Add the roll to the total. Increment the count by 1.

When the loop is done, check the guess and count. If they are equal, that means the guess is correct. If the guess is greater than the count, that means it is high. If the previous cases are not true, then the guess is low.

Write a method called listUpper() that takes in a list of strings, and returns a list of the same length containing the same strings but in all uppercase form. You can either modify the provided list or create a new one.Examples:listUpper(list("a", "an", "being")) -> list("A", "AN", "BEING")listUpper(list("every", "gator", "eats")) -> list("EVERY", "GATOR", "EATS")listUpper(list()) -> list()In this format:public List listUpper(List list){}

Answers

Answer:

//method listUpper takes a list of strings as parameter

public List<String> listUpper(List<String> list)

{ List<String> finalList= new ArrayList<String>();

//finalList is created which is a list to display the strings in upper case

for(String s:list){ //loop iterates through every string in the list and converts each string to Upper case using toUpperCase() method

s = s.toUpperCase();

finalList.add(s); } //finally the upper case strings are added to the finalList

return finalList; } //return the final list with uppercase strings

Explanation:

The method listUpper() works as follows:

For example we have a list of following strings: ("a", "an", "being").

finalList is a list created which will contains the above strings after converting them to uppercase letters.

For loop moves through each string in the list with these strings ("a", "an", "being"). At each iteration it converts each string in the list to uppercase using toUpperCase() and then add the string after converting to uppercase form to the finalList using add() method. So at first iteration "a" is converted to A and added to finalList, then "an" is converted to uppercase AN and added to finalList and at last iteration "being" is converted to BEING and added to finalList. At the end return statement returns the finalList which now contains all the string from list in uppercase form.

The method called listUpper() that takes in a list of strings, and returns a list of the same length containing the same strings but in all uppercase form is as follows:

def listUpper(list_string):

    for i in range(len(list_string)):

         list_string[i] = list_string[i].upper()

    return list_string

 

print(listUpper(["buy", "dog", "rice", "brought", "gun"]))

Code explanation

The code is written in python.

We declared a function named listUpper as required. The function takes in list_string as an argument.Then, we loop through the range of the length of the list strings.Then we make each looped value capitalise.We returned the list strings.Finally, we call the function with the required parameter.

learn more on python here: https://brainly.com/question/6858475

Universal Containers (UC) has decided to build a new, highly sensitive application on the Force platform. The security team at UC has decided that they want users to provide a fingerprint in addition to username/password to authenticate to this application. How can an Architect support fingerprints as a form of identification for Salesforce authentication

Answers

Use an AppExchange product that does fingerprint scanning with native Salesforce Identity  Confirmation

Other Questions
What is the mean of: 3.7, 5, 9.2, 4, 6.1, 5, 2.6, 4, 5.2, 5? Expand and simplify (4x+3)(2x-5) In EKL, mK = 90, mE = 25, EK = 3 cm, KH - altitude. Find EH. In 1985, a given Japanese imported automobile sold for 1,476,000 yen, or $8,200. If the car still sold for the same amount of yen today but the current exchange rate is 144 yen per dollar, what would the car be selling for today in U.S. dollars? identify the reflection of the figure with vertices L(-5,15), M(-12,-36), and N(21,-11) across the y-axis. HELP ASAP please. answer choices r in photo Yo ____ rubia. A. soy B. eres C. es What happens in double transverse wishbone front suspension when brakes are applied. What is the serving of coffee? 1 quart, 1 ml, or 1 c The cost of raising capital through retained earnings is__________ the cost of raising capital through issuing new common stock. Change each of the following angles in degrees to angles in radians(d) 150^0 (e) 240^0 (f) 300^0 Helppp!!!! please!!! can someone pleaseee help me?? Having a large standing army became a sign of both strength andA. WeaknessB. PatriotismC. RespectD. Wealth what is an slope? like in general 3. Find the measure of x.a 18b. 54C 126d. 45 Assuming semiannual compounding, what is the price of a zero coupon bond with 12 years to maturity paying $1,000 at maturity if the YTM is (Do not round intermediate calculations and round your answers to 2 decimal places, e.g., 32.16.): convert the following to a rectangular equation x=3t+5y=t^2-1 Which three processes are methods of genetic recombination?wO natural selection, crossing over, and independent assortmentcrossing over, independent assortment, and fertilizationO independent assortment, fertilization, and natural selectionO fertilization, natural selection, and crossing over using three practical example from your cultural background demonstrate the assertion that cultural is dynamic and socially created plz answer question in screen shot