Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?

a. WS-Trust
b. WS-SecureConversion
c. WS-SecurityPolicy
d. All of the mentioned

Answers

Answer 1

Answer:

a. WS-Trust

Explanation:

WS-Trust can be defined as a WS-specification as well as OASIS standard that help to provides extensions to WS-Security, in order to facilitate a mechanism for issuing, renewing, as well as validating of security tokens which is why the aim and objectives of WS-Trust is to help and enable applications to construct trusted SOAP message exchanges.

Nevertheless WS-Trust enables the issuance as well as the dissemination of credentials within several and various trust domains.

Answer 2

A web service using the WS-Trust can be used for implementing the standards that encode the WS security to facilitate the mechanisms for issuing and reviewing the security tokens.

Hence e the option A is correct. The  WS security token service is a service based on the mechanisms of the key exchange.

Learn more about the following enhances WS-Security to facilitate.

brainly.com/question/13171394.


Related Questions

More than one component in a particular automotive electric circuit is not working. Technician A starts testing the circuit at the power source. Technician B starts testing the circuit at its load. Who is right?

Answers

Hi there! Hopefully this helps!

--------------------------------------------------------------------------------------------------

The answer is A, testing the circuit at the power source.

If no other row matches, the router will select the ________ row as its best match. First Last either First or Last, depending on the circumstances neither First nor Last

Answers

Answer:

Last

Explanation:

Routing is a term in engineering which involves the process of selecting a path for traffic in a network or across multiple networks. It is applicable in circuit-switched networks, such as the public switched telephone network (PSTN), and computer networks, such as the Internet. It is mostly used as a term for IP Routing.

Hence, in IP Routing, the first step is comparing the packet's destination IP address to all rows, followed by selecting the nest-match row. However, If no other row matches, the router will select the LAST row as its best match.

a. A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2, 048 sectors and there are 131, 072 (2^17) tracks per surface. A block holds 512 bytes. The disk is not "zoned." What is the total capacity of this disk?

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (That, is, what is the capacity of one cylinder?)

Answers

Answer:

Explanation:

Given that:

number of surfaces on a hard disk = 4

number of sectors = 2048 sectors

number of tracks per surface = 131, 072 (2^17)

a block holds 512 bytes.

Since, 'The disk is not "zoned.".....

then, Number of bytes / sector = 512

a) What is the total capacity of this disk?

The total capacity of the disk is:[tex]= 4 \ surfaces \times 131072 \dfrac{tracks}{surfaces} \times 2048 \dfrac{sector}{tracks} \times 512 \dfrac{bytes}{sector}[/tex]

[tex]= 5.49755814\times 10^{11} \ bytes[/tex]

= 549755814 KB ( kilobytes)

= 549755.814 MB (megabytes)

=549.755814  GB (gigabytes)

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (i.e what is the capacity of one cylinder?)

The capacity of one cylinder can be estimated by determining the capacity of one surface and the capacity of one track.

The capacity of one surface = [tex]131072\dfrac{tracks}{surface} \times 2048 \dfrac{sector}{tracks} \times 512\dfrac{bytes}{sector}[/tex]

The capacity of one surface = [tex]1.37438953 \times 10^{11[/tex] byte = 137.44 GB

Capacity of one track = 2048 sectors/track × 512 bytes/sector

Capacity of one track = 1048576 Bytes/track

Capacity of one track =1048 KB/track

Capacity of one track ≅ 1 MB/track

Since the hard disk contains four surfaces

capacity of one cylinder = 1 MB/track × 4 track/cylinder

capacity of one cylinder  = 4 MB

Select the option that is not true. 1. Timestamp and Validation schedulers are both optimistic schedulers. 2. Timestamp and Validation schedulers can be used to remove physically unrealizable behaviour. 3. Timestamp and Validation schedulers guarantee serializability. 4. Timestamp and Validation schedulers perform most effectively on transactions that perform writes.

Answers

Answer:

3. Timestamp and Validation schedulers guarantee serializability.

Explanation:

Timestamp is a sequence of information encoded when a certain event occurs at a given time that information is decoded and message is identified. Time schedulers is optimistic scheduler and it removes physically unrealizable behavior. Timestamp cannot guarantee serializability.  It can detect unrealizable behavior.

A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused by a malicious insider.

a. True
b. False

Answers

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

Suppose that a main method encounters the statement t3.join(); Suppose that thread t3's run() method has completed running. What happens?
A. The main method waits for all running threads to complete their run() methods before proceeding.
B. The main method waits for any other thread to complete its run() method before proceeding
C. The main method proceeds to the next statement following the t3.join(); statement
D. Thread t 3 is re-started
E. All threads except t3 that are running are terminated

Answers

Answer:

C. The main method proceeds to the next statement following the t3.join(); statement

Explanation:

join() method allows the thread to wait for another thread and completes its execution. If the thread object is executing, then t3.join() will make that t is terminated before the program executes the instruction. Thread provides the method which allows one thread to another complete its execution. If t is a thread object then t.join() will make that t is terminated before the next instruction. There are three overloaded functions.

join()

join(long mills)

join(long millis, int Nanos)

If multiple threads call the join() methods, then overloading allows the programmer to specify the period. Join is dependent on the OS and will wait .

The following code uses a nested if statement.

if (employed == 'Y')
cout << "Employed!" << endl;

else if (employed == 'N')
cout << "Not Employed!" << endl;

else
cout << "Error!" << endl;

a. True
b. False

Answers

Answer:

true

Explanation:

else if used so I think it's true

what kind of company would hire an information support and service employee?


-software development


-computer repair


-website development


-network administration

Answers

Answer:

it's a

Explanation:

"The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "

Answers

Question:

"The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "

A) a[0]..a[a.length]

B) a()

C) a

D) a[]  

Answer:

The correct answer is A.

An example is given in the attachment.

Cheers!

Because Java byte code is the same on all computers, compiled Java programs Group of answer choices Cannot run on Linux systems Must be re-compiled for each different machine it is run on Are highly portable Are non-existent

Answers

Answer:

Are highly portable.

Explanation:

Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995.

Java was designed by a software engineer called James Gosling and it is originally owned by Oracle. Also, worthy of mention is the fact that Java was originally known as Oak.

Generally, Java as a software application usually are developed having a ".jar", ".class" or ".java" filename extensions.

Because Java byte code is the same on all computers, compiled Java programs are highly portable. This simply means that, the Java byte code was designed such that it has very few implementation dependency, thus, once the code is written, it can run on all computer platforms that supports the Java programming language.

Hence, the Java byte code is a write once, run anywhere software program.

The Java byte code instructions are read and executed by a computer program known as a Java Virtual Machine (JVM).

Additionally, Java program is used for developing varieties of applications such as, mobile, desktop, games, web and application servers etc.

Identify and write the errors given in the flowchart (with steps and flowchart) : Start ↓ Input A,B ↓ Average = (A + B + C) / 3 ↓ Print Average ↓ Stop

Answers

Answer:

i will send you the answers in the next 10minute

What is computer engineering in your own words?

Answers

Answer: Computer engineering refers to the study that integrates digital engineering with computer sciences to design and develop computer structures and different technological gadgets.

Explanation:

Answer:

Computer engineering is the branch of engineering that integrates electronic engineering with computer sciences. Computer engineers design and develop computer systems and other technological devices.

Write a date transformer program using an if/elif/else statement to transform a numeric date in month/day format to an expanded US English form and an international Spanish form; for example, 2/14 would be converted to February 14 and 14 febrero

Answers

I wrote it in Python because it was quick so i hope this is helpful

Answer:

date = input('Enter Date: ')

split_date = date.split('/')

month = split_date[0]

day = split_date[1]

if month == '1':

   english_month = 'January'

   spanish_month = 'Enero'

elif month == '2':

   english_month = 'February'

   spanish_month = 'Febrero'

elif month == '3':

   english_month = 'March'

   spanish_month = 'Marzo'

elif month == '4':

   english_month = 'April'

   spanish_month = 'Abril'

elif month == '5':

   english_month = 'May'

   spanish_month = 'Mayo'

elif month == '6':

   english_month = 'June'

   spanish_month = 'Junio'

elif month == '7':

   english_month = 'July'

   spanish_month = 'Julio'

elif month == '8':

   english_month = 'August'

   spanish_month = 'Agosto'

elif month == '9':

   english_month = 'September'

   spanish_month = 'Septiembre'

elif month == '10':

   english_month = 'October'

   spanish_month = 'Octubre'

elif month == '11':

   english_month = 'November'

   spanish_month = 'Noviembre'

elif month == '12':

   english_month = 'December'

   spanish_month = 'Diciembre'

US_English = f'{english_month} {day}'

International_Spanish = f'{day} {spanish_month}'

print(f'US English Form: {US_English}')

print(f'International Spanish Form: {International_Spanish}')

Input:

3/5

Output:

US English Form: March 5

International Spanish Form: 5 Marzo

Explanation:

You start by taking input from the user then splitting that at the '/' so that we have the date and the month in separate variables. Then we have an if statement checking to see what month is given and when the month is detected it sets a Spanish variable and an English variable then prints it to the screen.

Hope this helps.

In the Programming Process which of the following is not involved in defining what the program is to do:_____________ Group of answer choices

a. Compile code
b. Purpose
c. Output
d. Input
e. Process

Answers

Answer:

a. Compile code

Explanation:

In programming process, the following are important in defining what a program is to do;

i. Purpose: The first step in writing a program is describing the purpose of the program. This includes the aim, objective and the scope of the program.  The purpose of a program should be defined in the program.

ii. Input: It is also important to specify inputs for your program. Inputs are basically data supplied to the program in order to perform a task. Valid inputs are defined in the program.

iii. Output: Many times, when inputs are supplied to a program the resulting effects are shown in the outputs. The way the output will be is defined in the program.

iv. Process: This involves the method by which inputs are being mapped into outputs. The process implements the functionality of the program by converting inputs into their corresponding outputs. The process is defined in the program.

Compile code is not a requirement in defining what a program is to do. It just allows the source code of the program to be converted into a language that the machine understands.

It is always possible and feasible for a programmer to come up with test cases that run through every possible path in a program.
A. True
B. False

Answers

Answer:

True

Explanation:

It is always possible and feasible for a programmer to come up with test cases that run through every possible path in a program is a "true statement" or the first option. It is very natural for a programmer/developer to come up with test that will run through every possible outcome in a program. Doing so will help the developer find things that might cause problems with the program in later time.

Hope this helps.

The answer to the question about the feasibility of a programmer to always come up with test cases that run through every possible path in a program is:

No

What is a Test Case?

This refers to the set of actions which a programmer performs to find out if his software or program passes the system requirements in order to work properly.

With this in mind, we can see that while in some cases, it is possible for the programmer to come up with test cases, but it is not feasible in all cases as there can be hardware error which a virtual machine cannot solve.

Read more about test cases here:
https://brainly.com/question/26108146

What happens if two functions are defined with the same name, even if they are in different arguments within the same .py files?

Answers

Answer:

Following are the code to this question:

def data(a):#defining method data that accepts parameter

   print (a)#print parameter value

def data(b):#defining method data that accepts parameter

   print (b)#print parameter value

x=input("enter value: ")#defining variable x that5 input value from user

print(data(x))#call method data

Output:

enter value: hello..

hello..

None

Explanation:

As the above code, it is clear defines that python doesn't support the method overloading because More than one method can't be specified in a python class with the same name and python method arguments have no type. The single argument method may be named using an integer, a series, or a double value, that's why we can say that it is not allowed.

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.

Answers

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

Write a program that asks the user to input a positive integer and then calculates and displays the factorial of the number. The program should call a function named getN

Answers

Answer:

The program is written in python and it doesn't make use of any comment;

(See explanation section for line by line explanation)

def getN(num):

     fact = 1

     for i in range(1, 1 + num):

           fact = fact * i

     print("Factorial: ",fact)

num = int(input("Number: "))

if num < 0:

     print("Invalid")

else:

     getN(num)

Explanation:

The function getNum is defined here

def getN(num):

Initialize the result of the factorial to 1

     fact = 1

Get an iteration from 1 to the user input number

     for i in range(1, 1 + num):

Multiply each number that makes the iteration

           fact = fact * i

Print result

     print("Factorial: ",fact)

Ths line prompts user to input number

num = int(input("Number: "))

This line checks if user input is less than 0; If yes, the program prints "Invalid"

if num < 0:

     print("Invalid")

If otherwise, the program calls the getN function

else:

     getN(num)

Create a program that will find and display the largest of a list of positive numbers entered by the user. The user should indicate that he/she has finished entering numbers by entering a 0.

Answers

Answer:

This program is written using Python Programming language,

The program doesn't make use of comments (See explanation section for line by line explanation)

Program starts here

print("Enter elements into the list. Enter 0 to stop")

newlist = []

b = float(input("User Input: "))

while not b==0:

    newlist.append(b)

    b = float(input("User Input: "))

newlist.sort()

print("Largest element is:", newlist[-1])

Explanation:

This line gives the user instruction on how to populate the list and how to stop

print("Enter elements into the list. Enter 0 to stop")

This line creates an empty list

newlist = []

This line enables the user to input numbers; float datatype was used to accommodate decimal numbers

b = float(input("User Input: "))

The italicized gets input from the user until s/he enters 0

while not b==0:

    newlist.append(b)

    b = int(input("User Input: "))

This line sorts the list in ascending order

newlist.sort()

The last element of the sorted list which is the largest element is printed using the next line

print("Largest element is:", newlist[-1])

The best way to avoid driving impaired is to...
A. avoid drinking.
B. stay under the legal BAC limit.
C. keep a taxi fare on hand.

Answers

Answer:

the answer is A avoid drinking 10 Tips to Avoid Driving Drunk

Explanation:

Give someone your keys. Find someone trustworthy who isn't drinking and hand over your keys for the night. ...

Don't drink on an empty stomach. ...

Know your body and pace yourself. ...

Take public transit. ...

Spend the night. ...

Wait an hour or two. ...

Stop drinking 90 minutes before you plan to leave. ...

Take the night off from drinking. hope this helps you :)

In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.

Answers

Answer:

Flowchart.

Explanation:

Structured Systems Analysis and Design (SSAD) is a methodology and a systems technique of analyzing and designing of information systems.

This system uses several tools to design various components such as dataflow diagram, conceptual data model, flowchart, etc.

In the given scenario, the tool that will be used by the system would be a flowchart.

A flowchart is a diagram that represents a systematic flow of a process. In SSAD, flowchart is used to illustrate the logical steps to be taken in a process but it does not show data elements and associations.

So, the correct answer is flowchart.

#Write a function called 'string_type' which accepts one #string argument and determines what type of string it is. # # - If the string is empty, return "empty". # - If the string is a single character, return "character". # - If the string represents a single word, return "word". # The string is a single word if it has no spaces. # - If the string is a whole sentence, return "sentence". # The string is a sentence if it contains spaces, but # at most one period. # - If the string is a paragraph, return "paragraph". The # string is a paragraph if it contains both spaces and # multiple periods (we won't worry about other # punctuation marks). # - If the string is multiple paragraphs, return "page". # The string is a paragraph if it contains any newline # characters ("\n"). # #Hint: think carefully about what order you should check #these conditions in. # #Hint 2: remember, there exists a count() method that #counts the number of times a string appears in another #string. For example, "blah blah blah".count("blah") #would return 3.

Answers

Answer:

I am writing a Python program:

def string_type(string):

   if string=="":  //if the string is empty

       return "empty"

   elif string.count(".")>1:  #if the period sign occurs more than once in string

       if string.count("\n"):  #checks if the new line occurs in the string

           return "page"  #if both the above cases are true then its a page

       return "paragraph"  # if the period sign condition is true then its a para

   elif string.count(" ")>=1:  #if no of spaces in string occur more than once

       return "sentence"  #returns sentence

   elif len(string)==1:  # if length of the string is 1 this

       return "character"  #returns character

   else:  #if none of the above conditions is true then its a word

       return "word" #returns word

Explanation:

def string_type(string):  this is the definition of method string_type which takes a string as argument and determines whether the type of string is a word, paragraph, page, sentence or empty.

if string=="" this if condition checks if the string is empty. If this condition is true then the method returns "empty"

elif string.count(".")>1  This condition checks if the string type is a paragragh

string.count(".")>1   and if string.count("\n") both statements check if the string type is a page.

Here the count() method is used which is used to return the number of times a specified string or character appears in the given string.

Suppose the string is "Paragraphs need to have multiple sentences. It's true.\n However, two is enough. Yes, two sentences can make a paragraph."

The if condition first checks if count(".")>1 which means it counts the occurrence of period i.e. "." in the string. If the period occurs more than once this means it could be a page. But it could also be a paragraph so in order to determine the correct string type another if statement if string.count("\n") inside elif statement determines if the string is a page or not. This statement checks the number of times a new line appears in the string. So this distinguishes the string type paragraph from string type page.

elif string.count(" ")>=1: statement determines if the string is a sentence. For example if the string is "i love to eat apples." count() method counts the number of times " " space appears in the string. If the space appears more than once this means this cannot be a single word or a character and it has more than one words. So this means its a sentence.

  elif len(string)==1:  this else if condition checks the length of the string. If the length of the string is 1 this means the string only has a single character. Suppose string is "!" Then the len (string) = 1 as it only contains exclamation mark character. So the method returns "character" . If none of the above if and elif conditions evaluates to true then this means the string type is a word.

Answer:

def string_type(string):

  if string=="":  //if the string is empty

      return "empty"

  elif string.count(".")>1:  #if the period sign occurs more than once in string

      if string.count("\n"):  #checks if the new line occurs in the string

          return "page"  #if both the above cases are true then its a page

      return "paragraph"  # if the period sign condition is true then its a para

  elif string.count(" ")>=1:  #if no of spaces in string occur more than once

      return "sentence"  #returns sentence

Explanation:

The technology environment would include studies of family changes. social engineering. information technology. minimum wage laws. customer service.

Answers

Question:

The technology environment would include studies of:

A) family changes

B) social engineering

C) information technology

D) minimum wage laws

E) customer service

Answer:

The correct answer is Information Technology (C)

Explanation:

Information and communications technology (ICT) or Information Technology. Whenever the technology environment is under discourse, these are usually the predominant subject matter.

It doesn't come as a surprise given that we live in an information age. An era of the internet of things. If we are tending towards an era where every equipment and even most biological species will give off and receive data, then a technology environment is really predominantly IT.

Cheers!

Write a program that first reads in the name of an input file and then reads the file using the csv.reader() method. The file contains a list of words separated by commas. Your program should output the words and their frequencies (the number of times each word appears in the file) without any duplicates.

Answers

Answer:

Here is the Python code.

import csv  

inputfile = input("Enter name of the file: ")

count = {}

with open(inputfile, 'r') as csvfile:

 csvfile = csv.reader(csvfile)

 for line in csvfile:

   for words in line:

     if words not in count.keys():

       count[words] = 1

     else:

         count[words] + 1

   print(count)

Explanation:

I will explain the code line by line.

import csv   here the css is imported in order to read the file using csv.reader() method

inputfile = input("Enter name of the file: ")  This statement takes the name of the input file from the user

count = {}  this is basically a dictionary which will store the words in the file and the number of times each word appears in the file.

with open(inputfile, 'r') as csvfile:  This statement opens the inputfile using open() method in read mode. This basically opens the input file as csv type

 csvfile = csv.reader(csvfile)  This statement uses csv.reader() method to read the csv file contents.

for line in csvfile:  This outer for loop iterates through each line of the file

for words in line:  This inner loop iterates through each word in the line

if words not in count.keys():  This if condition checks if the word is not in the dictionary already. The dictionary holds key value pair and keys() method returns a list of all the keys of dictionary

count[words] = 1  if the word is not present already then assign 1 to the count dictionary

co unt[words] + 1 if the word is already present in dictionary increment count of the words by 1. Suppose the input file contains the following words:

hello,cat,man,hey,dog,boy,Hello,man,cat,woman,dog,Cat,hey,boy

Then because of co unt[words] + 1 statement if the word appears more than once in the file, then it will not be counted. So the output will be:

{' cat': 1, ' man': 1, ' dog': 1, ' woman': 1, ' Hello': 1, ' hey': 1, ' boy': 1, 'hello': 1, ' Cat': 1}

But if you want the program to count those words also in the file that appear more than once, then change this co unt[words] + 1 statement to:  

count[words] = count[words] + 1

So if the word is already present in the file its frequency is increased by 1 by incrementing 1 to the count[words]. This will produce the following output:

{' Cat': 1, ' cat': 2, ' boy': 2, ' woman': 1, ' dog': 2, ' hey': 2, ' man': 2, ' Hello': 1, 'hello': 1}  

You can see that cat, boy, dog and hey appear twice in the file.                    

print(count) This statement prints the dictionary contents with words and their frequencies.

The program with its output is attached.

The program is an illustration of file manipulations.

File manipulations involve reading from and writing into files.

The program in Python, where comments are used to explain each line is as follows:

#This imports csv module

import csv  

#This initializes a dictionary

kounter = {}

#This gets input for the file name

fname = input("Filename: ")

#This opens and iterates through the file

with open(fname, 'r') as cfile:

   #This reads the csv file

   cfile = csv.reader(cfile)

   #This iterates through each line

   for line in cfile:

       #This iterates through each word on each line

       for words in line:

           #This counts the occurrence of each word

           if words not in kounter.keys():

               kounter[words] = 1

           else:

               kounter[words] + 1

#This prints the occurrence of each word

print(kounter)

Read more about similar programs at:

https://brainly.com/question/14468239

The UNIX operating system started the concept of socket which also came with a set of programming application programming interface (API) for 'socket level' programming. A socket was also uniquely identified:

a. as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.
b. the port number to clearly identify which application is using TCP.
c. IP address to make sure the Internet device using the socket is delineated.
d. the access network, such as Ethernet or Wi-Fi so that multiple LAN devices could be installed on a single computer.

Answers

Answer:

(a). as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.

Explanation:

The explanation is in the answer.

A script sets up user accounts and installs software for a machine. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

deployment phase

Explanation:

This specific scenario belongs to the deployment phase of the hardware lifecycle. This phase is described as when the purchased hardware and software devices are deployed to the end-user, and systems implemented to define asset relationships. Meaning that everything is installed and set up for the end-user to be able to use it correctly.

What is the output of the following Python statements? def recurse(a): if (a == 0): print(a) else: recurse(a) recurse(0)

Answers

Answer:

d) 0 1 1 2

The above piece of code prints the Fibonacci series.

Explanation:

def a(n):

   if n == 0:

       return 0

   elif n == 1:

       return 1

   else:

       return a(n-1)+a(n-2)

for i in range(0,4):

   print(a(i),end=" ")

Define stubs for the functions get_user_num) and compute_avg). Each stub should print "FIXME: Finish function_name" followed by a newline, and should return -1. Each stub must also contain the function's parameters Sample output with two calls to get_user_num) and one call to compute_avg): FIXME: Finish get_user_num() FIXME: Finish get_user_num() FIXME: Finish compute_avg() Avg: -1 1 ' Your solution goes here '' 2 4 user_num1 = 0 5 user_num2 = 0 6 avg_result = 0 7 8 user_num1 = get_user_num 9 user_num2 = get_user_num ) 10 avg_result = compute_avg(user_num1, user_num2) 11 12 print'Avg:', avg_result)|

Answers

Answer:

Here are the stub functions get_user_num() and compute_avg()

def get_user_num():

   print('FIXME: Finish get_user_num()')

   return -1  

def compute_avg(user_num1, user_num2):

   print('FIXME: Finish compute_avg()')

   return -1

Explanation:

A stub is a small function or a piece of code which is sometimes used in program to test a function before its fully implemented. It can also be used for a longer program that is to be loaded later. It is also used for a long function or program that is remotely located. It is used to test or simulate the functionality of the program.  

The first stub for the function get_user_num() displays FIXME: Finish get_user_num() and then it returns -1.

The seconds stub for the function compute_avg() displays the FIXME: Finish compute_avg() and then it returns -1.

Here with each print statement, there is function name after this FIXME: Finish line. The first function name is get_user_num and the second is compute_avg().

Next the function get_user_num() is called twice and function compute_avg() followed by a print statement: print('Avg:', avg_result) which prints the result. So the program as a whole is given below:

def get_user_num():

   print('FIXME: Finish get_user_num()')

   return -1  

def compute_avg(user_num1, user_num2):

   print('FIXME: Finish compute_avg()')

   return -1  

user_num1 = 0  # the variables are initialized to 0

user_num2 = 0

avg_result = 0  

user_num1 = get_user_num()  #calls get_user_num method

user_num2 = get_user_num()

avg_result = compute_avg(user_num1, user_num2)  

print('Avg:', avg_result)

The method get_user_num() is called twice so the line FIXME: Finish get_user_num() is printed twice on the output screen. The method compute_avg() is called once in this statement avg_result = compute_avg(user_num1, user_num2)   so the line FIXME: Finish compute_avg() is printed once on the output screen. Next the statement print('Avg:', avg_result) displays Avg: -1. You can see in the above program that avg_result = compute_avg(user_num1, user_num2)   and compute_avg function returns -1 so Avg= -1. The program along with the produced outcome is attached.

Your on-premises hosted application uses Oracle database server. Your database administrator must have access to the database server for managing the application. Your database server is sized for seasonal peak workloads, which results in high licensing costs. You want to move your application to Oracle Cloud Infrastructure (OCI) to take advantage of CPU scaling options. Which database offering on OCI would you select?

Answers

Answer:

Bare metal DB systems

Explanation:

Oracle Call Interface OCI is comprehensive system which is native C language interface to Oracle Database for custom applications. The bare metal database system requires more compute node processing power. Customers are not given OS logons or SYSDBA in Oracle autonomous applications which prevents phishing attacks.

A network technician is designing a network for a small company. The network technician needs to implement an email server and web server that will be accessed by both internal employees and external customers. Which of the following would best secure the internal network and allow access to the needed servers?
A. Implementing a site-to-site VPN for server access.B. Implementing a DMZ segment for the server.C. Implementing NAT addressing for the servers.D. Implementing a sandbox to contain the servers.

Answers

Answer:

Option A (Implementing a site-to-site VPN for server access) seems to be the correct choice.

Explanation:

A site-to-site configuration is something that a single Open VPN network links several more separate networks linked. Technologies through one network will access machines in all the other computer systems in that connection model, including conversely. Implementing this would be extremely straightforward, for as much further even though Access Server was indeed implicated.The much more challenging aspect happens when interacting regarding firewalls including privacy filtering methods, as well as modifying the forwarding table in internet gateways, as several of them from different manufacturers but instead prototypes which they may not be able to log many of these.This rather gateway device uses an Open VPN with a Linux VPN client, to create a connection between various channels. If someone's server hardware is also measured accurately then perhaps a site-to-site configuration could be accomplished which works straightforwardly throughout all systems in both cable systems.

Other choices are not related to the given instance. So that Option A would be the right one.

Other Questions
Which diagram shows possible angle measures of a triangle? A triangle has angle lengths 35 degrees, 115 degrees, and 25 degrees. A triangle has angle lengths 32 degrees, 115 degrees, and 33 degrees. A triangle has angle lengths 35 degrees, 120 degrees, and 35 degrees. A triangle has angle lengths 30 degrees, 120 degrees, and 20 degrees. . A compound X, containing C, H, and O was found to have a relative molar mass of 6owhilst 20.0g of X contained 8.0g of C and 1.33g of H. Calculate the empirical formula of compound X, and hence determine its molecule formula. show calculation A carpenter uses a hand saw to cut a piece of wood in half. The length of the saw blade is 40 cm, while the wood he is cutting is 8 cm across. Each time he extends the saw out with his arm, there is 5 cm of blade between the handle and the wood. When he pulls the saw toward his self with his arm, the saw handle is 25 centimetres from the wood. Each time he extends his arm out and pulls it back in, 1 second has passed. He starts with his arm extended out. Write an equation that models how far the tip of the saw is from the wood in terms of time. Solve for the width in the formula for the area of a rectangle.Use the rewritten formula to find the width of a rectangle with an area of 42 square inches and a length of 16.8 inches. Read the sentence.One consideration was *which house has more space.*The bolded words are what kind of clause?A is Noun ClauseB is Adverb ClauseC is Adjective ClauseI'm betting on noun clause, what about you? What mass of nickel (Ni) is in a 2.4 Kg sample of propanol if the concentration is 20 ppb ? (atomic mass of Ni = 58.69) To understand the standard formula for a sinusoidal traveling wave.One formula for a wave with a y displacement (e.g., of a string) traveling in the x direction isy(x,t)=Asin(kxt).All the questions in this problem refer to this formula and to the wave it describes.1) What is the phase (x,t) of the wave?Express the phase in terms of one or more given variables ( A, k, x, t, and ) and any needed constants like (x,t)=2) What is the wavelength of the wave?Express the wavelength in terms of one or more given variables ( A, k, x, t, and ) and any needed constants like .=3) What is the period T of this wave?Express the period in terms of one or more given variables ( A, k, x, t, and ) and any needed constants like .T=4) What is the speed of propagation v of this wave?Express the speed of propagation in terms of one or more given variables ( A, k, x, t, and ) and any needed constants like .v= 1. Without graphing, identify the quadrant in which the point (x, y) lies if x > 0 and y What is the solution to this system of linear equations?y x = 6y + x = 101.(2, 8) 2.(8, 2)3.(6, 10)4.(10, 6) What are "temporal" relationships in costa rica's cultural group? For three consecutive numbers, the sum of the first number, twice the second, and 7less than the third is 133. What are the three numbers? I NEED HELP PLEASE, THANKS! :) Find the angle between u = and v = . 47.5 42.5 132.5 137.5 what is the mass of 1.5 mol of aluminum? A 12 sided die is rolled the set of equally likely outcomes is 123 456-789-10 11 and 12 find the probability of rolling a number greater than three Dana has to pay 10% tax on any income above 18,000 per year. Dana is paid 24,000 annually. Calculate the amount of money she receives after tax each month. Writing Prompt Directions: Knowing the definitions of the key terms weve discussed thus far, describe in one paragraph what you think this statement below means. Make sure to use two of the key terms discussed in your response. To be free, one must be chained Answer quick! EASY! WILL GIVE YALL BRAINLIESTTT Which group organized a series of protests, including a Prayer Pilgrimage in Washington, D.C., which helped convince Congress to pass civil rights legislation? A) Congress of Racial Equality (CORE) B) National Association for the Advancement of Colored People (NAACP) C) Southern Christian Leadership Conference (SCLC) D) Montgomery Improvement Association (MIA) Which of the following does NOT provide independent ratings of insurance companies' financial strength and claims-paying abilities? A. each state's Department of Insurance B. Standard & Poor's C. Moody's D. A.M. Best if 2 X degree is the exterior angle of triangle and x degree and 45 degree are opposite interior angle find the value of x degree