Answer:
import java.util.regex.*;
import java.util.Scanner;
public class Password
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.println("Please enter the Password. \n");
String passwordString = input.next();
System.out.println(passwordCheck(passwordString));
}
public static boolean passwordCheck(String password){
if(password.length()>=8 && password.matches("[a-z0-9A-Z]+")){
return true;
}
else{
return false;
}
}
}
Explanation:
The Java class "Password" is used by the program to make an instance of the password object and check its validity with the passwordChecker method defined within the Password class. The passwordChecker method only matches alphanumeric passwords, that is, passwords with alphabets and numbers. If a non-alphanumeric character is encountered, the boolean value false is returned.
Which of the following are risks to a network?
a Sending emails
b. Granting administrator access to a non-administrator
c. Opening files from unknown senders
d. Unwanted advertisements
Answer:
option b and c are correct answers.
Explanation:
Let see each option in detail.
a) Sending email is not a risk.
b) Granting access is a problem because the other person can undermine the network
c) Unknow senders can send virus or other malicious code to corrupts you data.
d) Unwanted advertisement is not a big deal.
Answer:
Granting administrator access to a non-administrator
Opening files from unknown senders
Explanation:
Psst those are the answers
It is said that Wifi repeater is not good as a rumor
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Answer:
By modifying the hidden form values that is in a local copy of the company web page
Explanation:
In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.
Explain to Alana why she might not want to blast her boss on social media just yet.
Answer: She might get fired. And who knows, if she doesn't, she might get a raise!
what type of collection is used in the assignment statement
info: [3:10,4:23,7:10,11:31]
tuple
list
Duque
dictionary
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
There are four data types in Python used to store data such as tuple, list, set, and dictionary.
The correct answer to this question is option D: Dictionary
Dictionary data type is used to store data values in key:value pairs as given in the question. It is a collection that is changeable, unordered, and does not allow duplicate entries.
Dictionaries in Python are written with curly brackets and have keys and values such as car={name="honda", model=2010}
when you run the given assignment statment such
info= {3:10,4:23,7:10,11:31}
print(info)
It will print the info dictionary (key:value pair)
{3: 10, 4: 23, 7: 10, 11: 31}
While other options are not correct because:
Tuples in Python are used to store multiple items in a single variable. For example:
info=("apple", "banana", "cherry")
List is used to store multiple items in a single variable. for example
myList = ["apple", "banana", "cherry"]
print(myList)
The list is ordered, changeable, and allows duplicate entry. But you can not put key: value pair in the list.
Deque is a double-ended queue that has the feature to add or remove an element on it either side.
Answer:
Dictionary is the answer
Why is it important to proofread your work even after using the Spelling and Grammar tool?
To make sure you have the correct word count
To make sure your document layout is correct
To print your document correctly
To catch mistakes the spelling and grammar check will not catch
Answer:
To catch mistakes the spelling and grammar check will not catch.
Explanation:
Grammar and spelling check is not always perfect!
It is the 4th one, to catch mistakes the spelling and grammar check will not catch.
Which tab should you use to change the text font color in your presentation?
Answer:
The Home Tab
Explanation:
Mary is writing an article about the animal kingdom. She wants to place an image below the text. Which menu should Mary choose for this
purpose?
Mary needs to choose the _________
menu in order to place the text in a desired fashion around the image
Plato btw
Answer:
she needs to choose the insert menu
Biodiversity explanation
Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL
Answer:
hi
Explanation:
Janet needs to flag a message for follow-up in Outlook. Which option is not a default?
Today
Tomorrow
Next Week
Next Tuesday
Answer:
Next tuesday.
Explanation: Its to specific
Select the correct answer. Which type of computer application is Apple Keynote? OA. word processor O B. spreadsheet O C. presentation OD. database O E. multimedia
Answer:
Apple Keynote is presentation Software
The correct option is C
Explanation:
Now let explain each option
Word processor:
Word processor is incorrect because it is used to type text, format it add tables and figures, For example MS Word
Spread Sheet:
Spread Sheet is incorrect as it is used for calculation. Like MS Excel
Presentation:
Key tone is a presentation software. it is used to make presentation and add animation and transition to it.
Database
Database is incorrect because databases are used for storing data. Not for presentation.
You manage a Windows server that has an attached printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:Sally needs to connect to a printer, print documents, and pause and resume her own print jobs.Damien needs to pause and resume documents for all users, but does not need to change printer properties.You want to assign the most restrictive permissions that meet the sales manager's requirements. What should you do
Answer:
Damien would be assign the Manage Documents permission while Sally on the other hand will be assign the permission to print.
Explanation:
Based on the information given in order for me to assign a restrictive permission that will meet the requirements of the sale manager's what I will do is for me to assign the Manage Documents permission to Damien reason been that Damien only needs to stop and resume the documents for all users in which he does not need to change the printer properties and to assign the permission to print to Sally reason been that Sally only needs to connect to a printer and to print documents in which she will then stop and resume her own print jobs.
Write a program that declares three one-dimensional arraysnamed miles, gallons, and mpg. Each array should be declared in main() and should becapable of holding ten double-precision numbers. The numbers that should be stored in miles are240.5, 300, 189.6, 310.6, 280.7, 206.9, 199.4, 160.3, 177.4, and 192.3. The numbers should bestored in gallons are 10.3, 15.6, 8.7, 14, 16.3, 15.7, 14.9, 10.7, 8.3, and 8.4.
Answer:
#include <iostream>
using namespace std;
int main(){
double miles[10] = {240.5, 300, 189.6, 310.6, 280.7, 206.9, 199.4, 160.3, 177.4, 192.3};
double gallons[10] = {10.3, 15.6, 8.7, 14, 16.3, 15.7, 14.9, 10.7, 8.3, 8.4};
double mpg[10];
for (int i = 0; i < 10; i++){
mpg[i] = miles[i]/ gallons[i];
cout << "mpg: " << mpg[i] << endl;
}
}
Explanation:
The C++ source code declares three arrays miles, gallons and mpg with an array length of 10. The gallons and miles arrays are assigned 10 array items each and they are used to push values to the mpg array in the for loop statement. The result of each item in the mpg array is displayed on the screen.
If I am working in a document and wish to follow a hyperlink, what should I do?
Copy the link and paste it in your web browser.
Hold the Control key and click on the link.
Click on the link.
Select Ctrl+K.
Answer:
Click on the link or copy and paste it to your browser
Explanation:
The material inspection and recieving report the multi-purpose document that serves as evidence of inspection and acceptance, shipping document, receiving document, and contractor invoice is designated as the:________.
Answer:
DD Form 250
Explanation:
DD Form 250 which is an acronym for Department of Defense Form 250.
It is the Material Inspection and Receiving Report that is used for contracts supplies and services including acquiring noncommercial commodities such as:
1. Acknowledgment of equipment by the Government
2. Contractor's invoice for expense.
3. loading record for hauling and acquiring.
4. Proof of Government Quality assessment.
Hence, in this case, the correct answer is DD Form 250.
Adam is so good at playing arcade games that he will win at every game he plays. One fine day as he was walking on the street, he discovers an arcade store that pays real cash for every game that the player wins - however, the store will only pay out once per game. The store has some games for which they will pay winners, and each game has its own completion time and payout rate. Thrilled at the prospect of earning money for his talent, Adam walked into the store only to realize that the store closes in 2 hours (exactly 120 minutes). Knowing that he cannot play all the games in that time, he decides to pick the games that maximize his earnings
Sample game board at the arcade GAME COMPLETION TIME (in minutes) PAYOUT RATE Pac-man 90 400 Mortal Kombat 10 30 Super Tetris 25 100 Pump it Up 10 40 Street Fighter II 90 450 Speed Racer 10 40
An acceptable solution is the one where it still picks the best earnings even when the list of games or completion times or payout rates change.
Question:
Write code in Java/Scala/Python to help Adam pick the sequence(s) of games that earn him the most money?.
Then, assume you have a variable list of games and their payout rates. What is the best way to pick the games that earn you the most?
Input Explanation
The first line of input is always an integer denoting many lines to read after the first line. In our sample test case, we have 6 in the first line and 6 lines after the first line, each having a game, completion_time and payout_rate.
In each data line, the game, completion_time and payout_rate are separated by a ','(comma).
The games board may change but the store still closes in 120 minutes.
Input
6
Pac-man,80,400
Mortal Kombat,10,30
Super Tetris,25,100
Pump it Up,10,40
Street Fighter II,90,450
Speed Racer,10,40
Output Explanation
Print the game names that earn him the most into the standard output in alphabetical order
Output
Mortal Kombat
Pump it Up
Speed Racer
Street Fighter II
Answer:
ask it to ur teacher boiiiiii
This is similar to the last problem, except that the first number on a line is an ID number that identifies an account. The same ID number may appear on any number of lines. Use a Dictionary to accumulate, for each ID, the sum of all the numbers that are on all the lines with that ID number. Call the input file id_data.txt. Write an output file called ID_sums.txt. On each line of the output fille, print an ID number and the sum. Sort the lines by the numerical order of the IDs
Answer:
Following are the code to this question:
def getSum(ID):#defining a method getSum that accept an ID
t= 0#defining a variable t
while ID!= 0:#defining while loop to check ID not equal to 0
t+= ID % 10# holding remainder value
ID = ID // 10#holding quotient value
return t#return total value
def readRecord(S):#defining a method readRecord that hold list
f_Read = open("idInfo.txt","r")#defining a variable f_Read to open file
for C_ID in f_Read:#defining for loop to hold file value
C_ID = C_ID.replace('\n', '')#use replace method
S[C_ID] = getSum(int(C_ID))#use list to method value
f_Read.close()#close file
def sortRecord(ID_List, t_List):#defining a sortRecord
for x in range(len(ID_List) - 1):#defining for loop to calculate the length of list
for y in range(0, len(ID_List) - x - 1):#defining for loop to calculate the length of list
if ID_List[y] > ID_List[y+1]:#defining if block to check value is greater
ID_List[y], ID_List[y+1] = ID_List[y+1], ID_List[y]#swap the value
t_List[y], t_List[y+1] = t_List[y+1], t_List[y]#swap the value
def showReport(ID, t):#defining a method showReport that accept id and t
for i in range(len(ID)):#defining for loop to hold index value
print(ID[i]," ",t[i])#print index value
def writeRecord(ID_List, t_List):#defining a method writeRecord that accept two list
f_Write = open("idSorted.txt","w")#defining a variable f_Write to hold store value in file
for i in range(len(ID_List)):#defining a for loop to store value with index
f_Write.write(ID_List[i])#hold list value
f_Write.write(" ") #for space
f_Write.write(str(t_List[i]) + "\n")# add index value
f_Write.close()#close file
def run():#defining method run
S = {}#defining an empty list
readRecord(S)#passing list into readRecord method
ID_List = list(S.keys())#defining a variable that holds key value in list
t_List = list(S.values())#defining a variable that holds values value in list
sortRecord(ID_List, t_List)#calling a method sortRecord by passing value
showReport(ID_List, t_List)#calling a method showReport by passing value
writeRecord(ID_List, t_List)#calling a method writeRecord by passing value
if "run":
run()
Output:
Please find the attached file.
Explanation:
In the above program code, 6 method getSum, readRecord, sortRecord,showReport, writeRecord, and run method is defined, in which getSum and readRecord is used a single list store value in parameters, and in other methods, it accepts two parameter to store value in key and values form and use a txt file to store and take value.
In the run method, an empty list s is declared, that pass into the variable ID_List and t_List, and call the method, in this program two a text file "idInfo.txt" is used, that holds some value in the file, and create another file that is "idSorted.txt", in this file it stores the value in the numerical order of the ID's.
When an organizatin needs a program to do a very specific job, it mayhire someone to write _____ software.
Jordan uses a spreadsheet to keep track of how many hits each player on a baseball team has had in each game
throughout the season. For every game, each player's name appears in a column that Jordan has titled "Player."
Next to that, a column titled "Hits" shows the number of hits for each player in a single game.
What function should Jordan use to find the average number of hits per game for player A_Clemente?
O SUMIF(Hits, "A Clemente", Player)
O SUMIF(Player, "A Clemente". Hits)
O AVERAGEIF(Hits, "A Clemente", Player)
O AVERAGEIF(Player,"A_Clemente", Hits)
Answer:
AVERAGEIF(Player, "A_Clemente", Hits)
Explanation:
The AVERAGEIF function allows users to calcule the mean value of numerical columns while also Given certain constraints within a single function call. The AVERAGEIF takes in 3 arguments.
The first is a column which houses the range of the constraint we would like to apply on our function.
The second argument is the constraint itself which should reside within the values in the range defined in the first argument.
The third argument is the numerical column whose average is calculated based on the defined constraint.
Therefore, in the scenario above, Player is the column containing player names, which it's value will later be used as a constraint
"Clemente_A" the constraint, only values pertaining to Clemente_A will be defined.
Hits, the numeric column whose value is averaged based on the constraint given.
Write a version of the sequential search algorithm that can be used to search a sorted list. Write a program to test the sequential search algorithm. Use either the function bubbleSort or insertionSort to sort the list before the search. Your program should prompt the user to enter 10 digits and then prompt the user to enter a digit to search - if the list contains this digit, output its position to the console:
Answer:
#include <iostream>
using namespace std;
void insertionSort(int myArr[]){
int currentvalue, position;
for (int i = 1; i < myArr.size(); ++i){
currentvalue = myArr[i] ;
position = i;
while (position>0 and myArr[position-1]>currentvalue){
myArr[position]= myArr[position-1] ;
position = position-1 ;
}
myArr[position]= currentvalue;
}
}
int main(){
int numberList[10], search;
for (int x = 0; x < 10; ++x){
cin>> numberList[x];
}
insertionSort(numberList);
cout << "Enter the search term/number: ";
cin>> search;
for (int i = 0; < 10; ++x){
if (search == number[i]){
cout<< i;
break;
} else {
cout<< "Number does not exist.";
}
}
}
Explanation:
The C++ source code defines the insertionSort void function, then prompts the user ten times to fill the array numberList. It uses the insertion sort algorithm to sort the array of ten items and then a number is searched using a sequential search algorithm.
What is the best approach to testing a website? visit all pages to verify that they load visit every page and verify all links visit the pages with hyperlinks visit all pages that appear on the navigation menu
Answer:
B. visit every page and verify all links
Explanation:
I just took the test, and only one year late.
Answer:
THe answer s b
Explanation:
Before we can use the PS Session to remotely manage a target system, there are certain tasks we must perform, such as create exception in Firewall and enable WinRM. PowerShell has a cmdlet that can perform all of these tasks at once.
A. Start-PSRemoting.B. Enable-PSRemoting.C. Enable-PSSession.D. Get-PSRemoting.
Answer:
B. Enable-PSRemoting.
Explanation:
Powershell is a command-line interface software used in windows operating system to manage the operations of the system. It is similar to the bash terminal scripting language in Linux and has some of the command prompt features.
The PS session is used to manage remote systems connected wirelessly to the administrative system. The command used to enable this process is "Enable-PSRemoting".
what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and credit card info is the store?
what is the purpose of writing a topic sentence
Answer:
A topic sentence must highlight the main idea of a paragraph, letting the reader know what the paragraph will be about. The topic sentence must present an idea that will unify the rest of the paragraph while relating it back to the main thesis of the paper.
Explanation:
Answer:
To summarize the main point of paragraph
Explanation:
A specific packet journey, from your computer to a remote server, end-to-end across multiple networks, has the following link bandwidths (packet travels across each of these links, in order): 1000 Mbps, 1 Mbps, 40 Mbps, 400 Mbps, 100 Mbps, 1000 Mbps. Assuming your computer and the server can transfer data at > = 1000 Mbps (so neither device is limiting the data transfer relative to the links), how long, in seconds, will it take to transfer a 125 MB file?
Answer:
0.125 seconds
Explanation:
The formula for the time taken to transfer the file is = file size / bandwidth
Assuming the computer and server could only transfer data at the speed of 1000 Mbps or more, The time of transmission is;
= 125 MB / 1000 Mbps = 0.125 seconds.
What is a commonly used software access restriction for a computer system connected to other networks such as the internet?
a.Passwords
b. Firewall
c. encryption
d. biometric systems
Answer:
firewall
Explanation:
Jorge is sending a message to Thomas but would like a copy sent to his external email address as well. Jorge does not want Thomas to see this copy that was sent.
Which mail field will Jorge use to achieve this goal?
To:
From:
CC:
BCC:
Answer: BCC (fourth choice)
=================================================
Explanation:
CC stands for "carbon copy".
BCC stands for "blind carbon copy".
Filling out forms is a tedious process. It's even more tedious when you have to repeat yourself multiple times. Carbon copy paper technology allows you to fill out one form and have those inputted entries be copied to the layers below. In terms of email, a carbon copy (CC) email is just an email sent to more than one person. In the CC line, recipients can see who the other people are in the email chain.
In contrast, a blind carbon copy is where the recipients cannot see who is in the BCC line. This allows Jorge to send the message copy to an external address without Thomas knowing.
What’s the term for a current flow in which electrons move in one direction
Answer:
Direct Current
Explanation:
MARK ME BRAINLIEst pls
Which of the following calculates to 10?
3*(6+2/2)
(3* 6) + 2/2
(3* 6+ 2)/2
3*6+2/2
Answer:
C. (3* 6+ 2)/2
Explanation:
Arithmetic operation are performed sequentially using the rule known as bracket of division, multiplication, addition and subtraction (BODMAS).
(3* 6 + 2)/2
Simplifying the above mathematical expression, we have;
(18 + 2)/2
= 20/2 = 10