Answer:
The complete code in Python language along with comments for explanation and output results are provided below.
Code with Explanation:
# the index variable will store the number of times "A" is entered
index = 0
while True:
# get the input from the user
letter = input('Please enter letter grades: ')
# if the user enters "enter" then break the loop
if letter == "":
break
# if user enters "A" then add it to the index
if letter == "A":
index = index + 1
# print the index variable when the loop is terminated
# the str command converts the numeric type into a string
print("Number of times A is entered: " + str(index))
Output:
Please enter letter grades: R
Please enter letter grades: A
Please enter letter grades: B
Please enter letter grades: L
Please enter letter grades: A
Please enter letter grades: A
Please enter letter grades: E
Please enter letter grades:
Number of times A is entered: 3
ICMP
(a) is required to solve the NAT traversal problem
(b) is used in Traceroute
(c) has a new version for IPv6
(d) is used by Ping
Answer:
(b) is used in Traceroute
(d) is used by Ping
Explanation:
ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;
i. Requested service is not available
ii. Host could not be reached
ICMP does not use ports. Rather it uses types and codes. Some of the most common types are echo request and echo reply.
Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as Time Exceeded) to trace a network route.
Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP echo request packets to the host and then waits for an ICMP echo reply from the host.
ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.
#Write a function called "angry_file_finder" that accepts a #filename as a parameter. The function should open the file, #read it, and return True if the file contains "!" on every #line. Otherwise the function should return False. # #Hint: there are lots of ways to do this. We'd suggest using #either the readline() or readlines() methods. readline() #returns the next line in the file; readlines() returns a #list of all the lines in the file. #Write your function here!
Answer:
I am writing a Python function:
def angry_file_finder(filename): #function definition, this function takes file name as parameter
with open(filename, "r") as read: #open() method is used to open the file in read mode using object read
lines = read.readlines() #read lines return a list of all lines in the file
for line in lines: #loops through each line of the file
if not '!' in line: #if the line does not contains exclamation mark
return False # returns False if a line contains no !
return True # returns true if the line contains exclamation mark
print(angry_file_finder("file.txt")) call angry_file_finder method by passing a text file name to it
Explanation:
The method angry_file_finder method takes a file name as parameter. Opens that file in read mode using open() method with "r". Then it reads all the lines of the file using readline() method. The for loop iterates through these lines and check if "!" is present in the lines or not. If a line in the text file contains "!" character then function returns true else returns false.
There is a better way to write this method without using readlines() method.
def angry_file_finder(filename):
with open(filename, "r") as file:
for line in file:
if '!' not in line:
return False
return True
print(angry_file_finder("file.txt"))
Above method opens the file in read mode and just uses a for loop to iterate through each line of the file to check for ! character. The if condition in the for loop checks if ! is not present in a line of the text file. If it is not present in the line then function returns False else it returns True. This is a more efficient way to find a character in a file.
opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and user resources. briefly explain what must be done by the operating system protection mechanism in order to provide the required system protection
Answer:
The operating system must by the use of policies define access to and the use of all computer resources.
Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.
Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:
General PoliciesServer PoliciesVPN PoliciesBack-Up PoliciesFirewall Access and Configuration PoliciesCheers!
I have tried looking for this answer everywhere, and I could not find the answer
I have a Windows 10 Laptop, with a 12GB RAM Card, okay? I also have my 1TB Disk Partitioned so that I have 3 Disks. 2 of them are my primary, both of those are 450GB apiece. The last one ([tex]Z:[/tex]) I named "RAM" and set that one to 100GB.
How do I turn the drive [tex]Z:[/tex] into strictly RAM?
I already did the Virtual Memory part of it, but I was wondering if I can make it strictly RAM so the system uses drive [tex]Z:[/tex] before using the RAM disk? If it is not possible, I'm sorry.
If my computer has 4 gigabytes of ram memory then I have 4e+9 bytes of memory. I think-
Answer: That isn't a software problem, its a hardware problem. There is a difference between 12gb of ram versus 100 gb of HDD. Ram is temporary storage, you can not turn SSD or HDD storage into RAM. If you are a gamer, STEER AWAY FROM LAPTOPS, DO NOT BUY A GAMING LAPTOP. Either buy a DESKTOP (or build) or a console. They give more performance for the price and they are easily upgradable. Not many people can open up a laptop and put in more RAM because the hardware is incredibly small.
Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}
Answer:
double ComputeGasVolume(double pressure, double temperature, double moles){
double volume = moles*GAS_CONST*temperature/pressure;
return volume;
}
Explanation:
You may insert this function just before your main function.
Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles
Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.
differentiate between web site and web application?
Explanation:
A website is a group of globally accessible into linked pages which have a single domain name. A web application is a software or program is is accessible using any web browser.
Answer:
Explanation:
A website shows static or dynamic data that is predominantly sent from the server to the user only, whereas a web application serves dynamic data with full two way interaction.
When discussing the behavior of vulnerability assessments which choice will exploit a weakness?
a) Penetration test
b) Vulnerability scan
c) Intrusive
d) Gray box
e) Credentialed vulnerability scan
f) Non-credentialed vulnerability scan
Answer:
a) Penetration test
Explanation:
A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.
In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.
Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.
When discussing the behavior of vulnerability assessments, the choice which will exploit a weakness is: A) Penetration test.
Cyber security can be defined as a preventive practice to systematically protect computers, software applications (programs), networks, electronic devices, servers and user data from potential attack, damage, theft or an unauthorized access, especially through the use of technologies, frameworks, integrity principles, processes, penetration test and network engineers.
A vulnerability can be defined as a weakness in an automated internal control system and security procedures, which may be exploited by an attacker (hacker) to gain unauthorized access to the data stored on a computer system or disrupt the information system.
Basically, vulnerability assessments can be used in the following ways:
Identify loopholes, risks and security threats. Prioritize and enhance an information system.Mitigate potential security threats.A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, so as to identify, test an check for exploitable vulnerabilities in a web software, network, etc.
This ultimately implies that, a penetration test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments.
When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate
Answer:
Verifying digital signature
Explanation:
In order to guarantee authenticity of digital messages an documents, the certificate authority will perform the verification of the digital signature. A valid digital signature indicates that data is coming from the proper server and it has not been altered in its course.
In e-mail, SSL/TLS provides ________. link encryption end-to-end encryption both link encryption and end-to-end encryption neither link encryption nor end-to-end encryption
Answer:
link encryption
Explanation:
In e-mail, SSL/TLS provides link encryption.
The SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of a TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.
Write a program that displays the values in the list numbers in ascendingorder sorted by the sum of their digits.
Answer:
Here is the Python program.
def DigitList(number):
return sum(map(int, str(number)))
list = [18, 23, 35, 43, 51]
ascendList = sorted(list, key = DigitList)
print(ascendList)
Explanation:
The method DigitList() takes value of numbers of the list as parameter. So this parameter is basically the element of the list. return sum(map(int, str(number))) statement in the DigitList() method consists of three methods i.e. str(), map() and sum(). First the str() method converts each element of the list to string. Then the map() function is used which converts every element of list to another list. That list will now contain digits as its elements. In short each number is converted to the string by str() and then the digit characters of each string number is mapped to integers. Now these digits are passed to sum() function which returns the sum. For example we have two numbers 12 and 31 in the list so each digit is 1 2 and 3 1 are added to get the sum 3 and 4. So now the list would have 3 4 as elements.
Now list = [18, 23, 35, 43, 51] is a list of 5 numbers. ascendList = sorted(list, key = DigitList) statement has a sorted() method which takes two arguments i.e. the above list and a key which is equal to the DigitList which means that the list is sorted out using key=DigitList. DigitList simply converts each number of list to a another list with its digits as elements and then returns the sum of the digits. Now using DigitList method as key the element of the list = [18, 23, 35, 43, 51] are sorted using sorted() method. print(ascendList) statement prints the resultant list with values in the list in ascending order sorted by the sum of their digits.
So for the above list [18, 23, 35, 43, 51] the sum of each number is 9 ,5, 8, 7, 6 and then list is sorted according to the sum values in ascending order. So 5 is the smallest, then comes 6, 7, 8 and 9. So 5 is the sum of the number 23, 6 is the sum of 51, 7 is the sum of 43, 8 is the sum of 35 and 9 is the sum of 18. So now after sorting these numbers according to their sum the output list is:
[23, 51, 43, 35, 18]
12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE function to find the average bonus multiplier (C7:C10).
Answer:
1. Divide each bonus by regular bonus apply this to all the data
2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.
Explanation:
The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.
After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.
Design a two-thread consensus protocol for a Stack class that provides two methods: push(x) and pop(). push(x) pushes a value onto the top of the stack, and pop() removes and returns the most recently pushed value.
Answer:
D. 10, 5.
Explanation:
4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think operating system designers would use the same interface for both
Answer:
According to the principles of design, Repetition refers to the recurrence of elements of the design
One of the advantages of this is that it affords uniformity. Another is that it keeps the user of such a system familiar or with the interface of the operating system.
One major drawback of this principle especially as used in the question is that it creates a familiar route for hackers.
Another drawback is that creates what is called "repetition blindness". This normally occurs with perceptual identification tasks.
The phenomenon may be due to a failure in sensory analysis to process the same shape, figures or objects.
Cheers!
24. Which of the following statements about Emergency Support Functions (ESFs) is correct?
O A. ESFs are not exclusively federal coordinating mechanism
O B. ESFs are only a state or local coordinating mechanism
O C. ESFs are exclusively a federal coordinating mechanism
O D. ESFs are exclusively a state coordinating mechanism
(ESFs) is correct: ESFs are not exclusively federal coordinating mechanism.
All of the following are examples of being computer literate, EXCEPT ________. knowing how to use the web efficiently knowing how to build and program computers knowing how to avoid hackers and viruses knowing how to maintain and troubleshoot your computer
Answer:knowing how to build and program computers.
Explanation:
Write a Java program to get the values stored in a four-by-five array of integers and store those values in a one-dimensional array referred by the name sorted1Darray . This array will have all the numbers in increasing order (remember the bubble sort!!) !
Answer:
done
Explanation:
int a[][] = new int[4][4];
Random r = new Random();
for(int i=0;i<4;i++)
for(int j=0;j<4;j++)
{
a[i][j]=r.nextInt()%100;
}
int sorted1Darray[] = new int [16];
int k=0;
for(int i=0;i<4;i++)
for(int j=0;j<4;j++)
sorted1Darray[k++]=a[i][j];
//now sorting using bubble sort
for(int i=0;i<16;i++)
for(int j=0;j<16;j++)
if(sorted1Darray[i]<sorted1Darray[j])
{
int t= sorted1Darray[i];
sorted1Darray[i]=sorted1Darray[j];
sorted1Darray[j]=t;
}
System.out.println("Sorted array:");
for(int i=0;i<16;i++)
System.out.print(sorted1Darray[i]+" ");
System.out.println();
15. The primitive data types in JavaScript are:
Answer:
The three primitive data types in JavaScript are:
1. Numbers
2. Strings of text(known as "strings")
3. Boolean Truth Values (known as "booleans")
Write a program that create Employee class with fields id,name and sal and create Employee object and store data and display that data.
Answer:
Here is the C++ program for Employee class with fields id,name and sal.
#include <iostream> // to use input output functions
#include <string> //to manipulate and use strings
using namespace std; // to access objects like cin cout
class Employee { //class Employee
private:
/* the following data members are declared as private which means they can only be accessed by the functions within Employee class */
string name; //name field
int id; //id field
double sal; //salary field
public:
Employee(); // constructor that initializes an object when it is created
/* setName, setID and setSalary are the mutators which are the methods used to change data members. This means they set the values of a private fields i.e. name, id and sal */
void setName(string n) //mutator for name field
{ name = n; }
void setId(int i) //mutator for id field
{ id = i; }
void setSalary(double d) //mutator for sal field
{ sal = d; }
/* getName, getID and getSalary are the accessors which are the methods used to read data members. This means they get or access the values of a private fields i.e. name, id and sal */
string getName() //accessor for name field
{ return name; }
int getId() //accessor for id field
{ return id; }
double getSalary() //accessor for sal field
{ return sal; } };
Employee::Employee() { //default constructor where the fields are initialized
name = ""; // name field initialized
id = 0; // id field initialized to 0
sal = 0; } // sal field initialized to 0
void display(Employee);
// prototype of the method display() to display the data of Employee
int main() { //start of the main() function body
Employee emp; //creates an object emp of Employee class
/*set the name field to Abc Xyz which means set the value of Employee class name field to Abc Xyz through setName() method and object emp */
emp.setName("Abc Xyz");
/*set the id field to 1234 which means set the value of Employee class id field to 1234 through setId() method and object emp */
emp.setId(1234);
/*set the sal field to 1000 which means set the value of Employee class sal field to 1000 through setSalary() method and object emp */
emp.setSalary(1000);
display(emp); } //calls display() method to display the Employee data
void display(Employee e) { // this method displays the data in the Employee //class object passed as a parameter.
/*displays the name of the Employee . This name is read or accessed through accessor method getName() and object e of Employee class */
cout << "Name: " << e.getName() << endl;
/*displays the id of the Employee . This id is read or accessed by accessor method getId() and object e */
cout << "ID: " << e.getId() << endl;
/*displays the salary of the Employee . This sal field is read or accessed by accessor method getSalary() and object e */
cout << "Salary: " << e.getSalary() << endl; }
Explanation:
The program is well explained in the comments mentioned with each statement of the program.
The program has a class Employee which has private data members id, name and sal, a simple default constructor Employee(), mutatator methods setName, setId and setSalary to set the fields, acccessor method getName, getId and getSalary to get the fields values.
A function display( ) is used to display the Employee data i.e. name id and salary of Employee.
main() has an object emp of Employee class in order to use data fields and access functions defined in Employee class.
The output of the program is:
Name: Abc Xyz
ID: 1234
Salary: 1000
The program and its output are attached.
Write code to create a list of numbers from 0 to 67 and assign that list to the variable nums. Do not hard code the list. Save & RunLoad HistoryShow CodeLens
Answer:
The program written in Python is as follows
nums = []
for i in range(0,68):
-->nums.append(i)
print(nums)
Explanation:
Please note that --> is used to denote indentation
The first line creates an empty list
nums = []
This line creates an iteration from 0 to 67, using iterating variable i
for i in range(0,68):
This line saves the current value of variable i into the empty list
nums.append(i)
At this point, the list has been completely filled with 0 to 67
This line prints the list
print(nums)
Modify the DemoSalesperson application so each Salesperson has a successive ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive Salesperson. Save the file as DemoSalesperson2.java.
Answer:
Here is the modified DemoSalesperson2
public class DemoSalesperson2{ // class DemoSalesperson2
public static void main(String[] args) { //start of main() function body
SalesPerson[] sp = new SalesPerson[10]; // creates an array of SalesPerson object named sp
int start_id =111; // assign 111 to starting id number
double start_sal=25000; //assign 25000 to starting salary means salary will start from amount 25000
for (int i =0; i<sp.length; i++) { //loop iterates until the value of loop variable i remains less then length of the array object sp
sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i)); /*at each iteration ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive is displayed using object array sp[] which calls the SalesPerson constructor to access id and sales */
System.out.println(sp[i].getId()+" "+sp[i].getAnnualSales() ); } } } /*uses object sp of class SalesPerson to access the methods getId which returns the id and getAnnualSales method which returns the annual sales, to display id and annual sales */
Explanation:
The question first requires a SalesPerson class with these requisites:
Class name: Salesperson.
Data fields for Salesperson: int ID number , double annual sales amount.
Methods: constructor SalesPerson() that requires values for both data fields, as well as get and set methods for each of the data fields.
So according to the complete question's requirement, I have implemented SalesPerson class:
public class SalesPerson { // class name
//data members: integer type id variable and double type sales variable
private int id;
private double sales;
public SalesPerson(int id_no, double annual_sales) { //constructor that requires values for id and sales
id = id_no;
sales = annual_sales; }
public int getId() { //accessor getId() method to get or access the value of id data field
return id; }
public void setId(int id_no) { //mutator setId to set the value of id data field
id = id_no; }
public double getAnnualSales() { //accessor getAnnualSales() method to get or access the value of sales data field
return sales; }
public void setAnnualSales(double annual_sales) { //mutator setAnnualSales to set the value of sales data field
sales = annual_sales; } }
However you can use my DemoSalesperson2 application for your own SalesPerson class.
Now I will explain the working of for loop used in DemoSalesperson2
Iteration 1:
i=0
i<sp.length is true because length of sp[] is 10 so i<10
This means the body of for loop will execute.
The statement inside the body of for loop is :
sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));
class SalesPerson constructor is used to access the data members of SalesPerson class
start_id = 111
start_sal=25000
start_id+i = 111 + 0 = 111
start_sal+5000*(i) = 25000 + 5000 (0) = 25000
The values 111 and 25000 are stored to sp[0] means at the first index of the sp array.
System.out.println(sp[i].getId()+" "+sp[i].getAnnualSales() );
This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.
So the output at 1st iteration is:
111 25000.0
Iteration 1:
The value of i is incremented to 1 so now i = 1
i<sp.length is true because length of sp[] is 10 so i<10
This means the body of for loop will execute.
The statement inside the body of for loop is :
sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));
class SalesPerson constructor is used to access the data members of SalesPerson class
start_id = 111
start_sal=25000
start_id+i = 111 + 1 = 112
start_sal+5000*(i) = 25000 + 5000 (1) = 25000 + 5000 = 30000
The values 111 and 25000 are stored to sp[1] means at the first index of the sp array.
System.out.println(sp[i].getId()+" "+sp[i].getAnnualSales() );
This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.
So the output at 1st iteration is:
112 30000.0
The loop keeps iterating and the value of id is incremented by 1 and value of sales is increased by 5000 at every iteration.
This loop continues to execute until the value of i exceeds the length of sp array i.e. 10.
The values from iteration 1 to 8 following the above explanation are:
Iteration 1:
111 25000.0
Iteration 2:
112 30000.0
Iteration 3:
113 35000.0
Iteration 4:
114 40000.0
Iteration 5:
115 45000.0
Iteration 6:
116 50000.0
Iteration 7:
117 55000.0
Iteration 8:
118 60000.0
Iteration 9:
119 65000.0
Iteration 10:
120 70000.0
At iteration 11 the for loop body will not execute as value of i at 11th iteration is i = 10 and i<sp.length evaluates to false as i = sp.length because length of sp array is 10 and now the value of i is also 10. So the loop ends. Screenshot of the program and its output is attached.
Write a program that read two numbers from user input. Then, print the sum of those numbers.
Answer:
#This is in Python
number1 = raw_input("Enter a number: ")
number2 = raw_input("Enter another number: ")
sum = float(number1) + float(number2)
print(sum)
Explanation:
A school has 100 lockers and 100 students. All lockers are closed on the first day of school. As the students enter, the first student, denoted S1, opens every locker. Then the second student, S2, begins with the second locker, denoted L2, and closes every other locker (i.e. every even numbered locker). Student S3 begins with the third locker and changes every third locker (closes it if it was open, and opens it if it was closed). Student S4 begins with locker L4 and changes every fourth locker. Student
S5 starts with L5 and changes every fifth locker, and so on, until student S100 changes L100.
After all the students have passed through the building and changed the lockers, which lockers areopen? Write a program to find your answer.
(Hint: Use an array of 100 boolean elements. each of which indicates whether a locker is open (true) or closed (false). Initially, all lockers are closed.)
Answer:
Following are the code to this question:
public class Locker //defining a class Locker
{
public static void main(String[] ax)//defining main method
{
boolean[] locker = new boolean[101]; //defining boolean array locker that's size is 100.
int j,s1,k1,x;
x=locker.length;
for (j=1;j<x; j++)//defining loop to assigns value false in locker array
{
locker[j] = false;// assign value false
}
for (j=1;j<x; j++)//defining loop loop to assign value true in array
{
locker[j] = true;//assign value true
}
for(s1=2; s1<x; s1++)//defining loop to count locker from 2nd place
{
for(k1=s1; k1<x; k1=k1+s1)// defining inner loop to assign value
{
if(locker[k1]==false) //defining if block for check false value
{
locker[k1] = true;// if condition is true it assign value true
}
else //defining else block
{
locker[k1] = false;//assign value false in locker array
}
}
}
for(s1=1; s1<x; s1++)//defining loop to print locker value
{
if (locker[s1] == true) //defining if block that check Locker array value is equal to true
{
System.out.println("Locker " + s1 + " Open");//print Locker value with message
}
}
}
}
Output:
Locker 1 Open
Locker 4 Open
Locker 9 Open
Locker 16 Open
Locker 25 Open
Locker 36 Open
Locker 49 Open
Locker 64 Open
Locker 81 Open
Locker 100 Open
Explanation:
In the above code, a class "Locker" is declared, inside the class main method is declared, in which a boolean array "locker" is declared that's size is 100, in the next line fouth integer variable " j,s1,k1, and x" is declared, in which variable x is used to hold the boolean array length value, and other variable used in the loop.
In the next step, two for loop is declared, in the first loop assign value "false" in locker array and in seconde loop it assigns the value "true".In the next step, multiple for loop it uses if block uses to check locker value equal to false then assign value true otherwise assign value false. At the last another loop is declared, that uses if block to check locker value is equal to true and print its value with the message.Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require at least a paragraph for each type of firewall.
Acme Corporation wants to be sure employees surfing the web aren't victimized through drive-by downloads. Which type of firewall should Acme use? Explain why your answer is correct.
Answer:
packet filtering
Explanation:
We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D
How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = futureValue * (1 + monthlyInterestRate); i = i+1; }
a. 5
b. 4
c. 6
d. 0
Answer:
I believe it is A
Explanation:
A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.
Answer:
Threat assessment
Explanation:
A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.
Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.
Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".
Answer:
Threat assessment
Explanation:
In an IT system, threat assessment is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.
The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;
i. Prevention of data loss
ii. Prevention of system or network of systems downtime
In carrying out threat assessment, one might need to do the following;
i. identification and prioritization of infrastructure including the software and hardware applications in the system.
ii. identification of potential threats such as system failure, natural disaster, unwanted access.
iii. identification of vulnerabilities in the system.
iv. analysing controls by determining who has access and who doesn't.
v. analysing the impact of a threat occurrence.
vi. documentation of analysis and evaluation results.
k- Add the code to define a variable of type 'double', with the name 'cuboidVolume'. Calculate the volume of the cuboid and set this variable value.
Answer:
Here is the JAVA program to calculate volume of cuboid:
import java.util.Scanner; // Scanner class is used to take input from user
public class CuboidVol { // class to calculate volume of cuboid
public static void main(String[] args) { // start of main() function body
Scanner input= new Scanner(System.in); //create Scanner class object
// prompts user to enter length of cuboid
System.out.println("Enter the cuboid length:");
double length=input.nextDouble(); //reads the input length value from user
// prompts user to enter width of cuboid
System.out.println("Enter the cuboid width:");
double width=input.nextDouble(); //reads the input width from user
// prompts user to enter height of cuboid
System.out.println("Enter the cuboid height:");
double height=input.nextDouble(); //reads the input height from user
/* the following formula is to calculate volume of a cuboid by multiplying its length width and height and a double type variable cuboidVolume is defined to store the value of the resultant volume to it */
double cuboidVolume= length*width*height; //calculates cuboid volume
//displays volume of cuboid and result is displayed up to 2 decimal places
System.out.printf("Volume of the cuboid (length " + length + "/ height " + height + "/ width" +width +" is: " + "%.2f",cuboidVolume); } }
Explanation:
The formula for the volume of a cuboid is as following:
Volume = Length × Width × Height
So in order to calculate the volume of cuboid three variable are required for length, width and height and one more variable cuboidVolume to hold the resultant volume of the cuboid.
The program is well explained in the comments added to each statement of the program. The program prompts the user to enter the value of height width and length of cuboid and the nextDouble() method is used to take the double type input values of height length and width. Then the program declares a double type variable cuboidVolume to hold the result of the volume of cuboid. Then the last printf statement is used to display the volume of cuboid in the format format "Volume of the cuboid (length / height / width ) is" and the result is displayed up to 2 decimal places.
The screenshot of the program along with its output is attached.
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
A) 14
B) 16
C) 254
D) none of the above
Answer:
tiddies
Explanation:
sukk
The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
Answer:
Deployment
Explanation:
Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.
So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.
Answer:
Deployment
Explanation:
Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is entered.
Answer:
Here is the sentinel-controlled while loop:
#include <iostream> //to use input output functions
using namespace std; // to identify objects like cin cout
int main(){ // start of main() function body
int test_score; // declare an integer variable for test scores
//prompts user to enter test scores and type-99 to stop entering scores
cout << "Enter the test scores (enter -99 to stop): ";
cin >> test_score; // reads test scores from user
while (test_score != -99){ // while loop keeps executing until user enters -99
cin >> test_score; } } // keeps taking and reading test scores from user
Explanation:
while loop in the above chunk of code keeps taking input scores from user until -99 is entered. Sentinel-controlled loops keep repeating until a sentinel value is entered. This sentinel value indicates the end of the data entry such as here the sentinel value is -99 which stops the while loop from iterating and taking the test score input from user.
The complete question is that the code should then report how many scores were entered and the average of these scores. Do not count the end sentinel -99 as a score.
So the program that takes input scores and computes the number of scores entered and average of these scores is given below.
#include <iostream> // to use input output functions
using namespace std; // to identify objects like cin cout
int main(){ //start of main function body
double sum = 0.0; // declares sum variable to hold the sum of test scores
int test_score,count =0;
/* declares test_scores variable to hold the test scores entered by user and count variable to count how many test scores input by user */
cout << "Enter the test scores (or -99 to stop: ";
//prompts user to enter test scores and type-99 to stop entering scores
cin >> test_score; // reads test scores from user
while (test_score != -99){ // while loop keeps executing until user enters -99
count++; /* increments count variable each time a test cores is input by user to count the number of times user entered test scores */
sum = sum + test_score; // adds the test scores
cin >> test_score;} // reads test scores from user
if (count == 0) // if user enters no test score displays the following message
cout << "No score entered by the user" << endl;
else //if user enters test scores
//displays the numbers of times test scores are entered by user
cout<<"The number of test scores entered: "<<count;
/* displays average of test scores by dividing the sum of input test scores with the total number of input test scores */
cout << "\n The average of " << count << " test scores: " <<sum / count << endl;}
The program along with its output is attached.
If the object instance is created in a user program, then the object instance can access both the public and private members of the class using DOT notation (such as Rectangle r; r.area=10). True or False
Answer:
False
Explanation:
The private member of a class is not accessible by using the Dot notation ,however the private member are those which are not accessible inside the class they are accessible outside the class .The public member are accessible inside the class so they are accessible by using the dot operator .
Following are the example is given below in C++ Language
#include<iostream> // header file
using namespace std;
class Rectangle
{
private:
double r; // private member
public:
double area()
{ return 3.14*r*r;
}
};
int main()
{
Rectangle r1;// creating the object
r1.r = 3.5;
double t= r1.area(); // calling
cout<<" Area is:"<<t;
return 0;
}
Output:
compile time error is generated
The correct program to access the private member of class is given below
#include<iostream> // header file
using namespace std;
class Rectangle
{
private:
double r; // private member
public:
double area()
{
r1=r;
double t2=3.14*r2*r2;
return(t2); // return the value
}
};
int main()
{
Rectangle r1;// creating the object
r1.r = 1.5;
double t= r1.area(); // calling
cout<<" Area is:"<<t;
return 0;
}
Therefore the given statement is False