You learn that in a previous security breach at GearUp, a disgruntled employee destroyed the encryption key that had been used to protect data. How will you prevent a similar data safeguard problem at GearOn

Answers

Answer 1

Answer:

The data can be safeguarded using key escrow procedure.

Explanation:

Key escrow basically means to store the cryptographic key in an "escrow" by a reputable trusted third party. The copy of the encryption key is kept with the third party. In case the cryptographic key gets lost or destroyed, then the key escrow service helps to access the encrypted data. It also manages the access control to the key in case the key gets lost. So this way in case of security breach at GearOn the key escrow service can be used to re-implement or access the key easily.


Related Questions

Create a class ProblemSolution with following characteristics Two private member variables name & designation of string type. Parameterized constructor which takes 2 parameters to initialized name & designation. Method solution with no input parameter and void return type. A method should print the member variable values in new lines.

Answers

Answer:

Please see the attachment for the solution

Explanation:

Describe any five GSM PLMN basic services?

Answers

Answer:

Your answer can be found in the explanation below.

Explanation:

GSM is the abbreviation for Global System for Mobile communication. Its purpose is to transmit voice and data services over a range. It is a digital cellular technology.

PLMN is the abbreviation for Public Land Mobile network. It is defined as the wireless communication service or combination of services rendered by a telecommunication operator.

The plmn consists of technologies that range from Egde to 3G to 4G/LTE.

PLMN consists of different services to its mobile subscribers or users but for the purpose of this question, i will be pointing out just 5 of them alongside its definitions.

1. Emergency calls services to fire or police: Plmn provides us with the option to make emergency calls in the event of any accident or fire incident, etc.It is available on devices either when locked or unlocked.

2. Voice calls to/from other PLMN: This entails the putting of calls across to persons we cannot reach very quickly. PLMN helps to connect persons through its network of from other networks thus making communication easier.

3. Internet connectivity: PLMN provieds us with internet services through wifi or bundles that enable us have access to the internet as well as help us communicate with people and loved ones over a distance. Internet service are possble either on GPRS or 3G or 4G networks.

4. SMS service: SMS means short messaging service. This is also know as text messages. PLMN allows us to be able to send short messages to people as oppposed to mails. It is mostly instant and can be sent or recieved from the same PLMN or others.

5. MMS service: Multimedia messaging service whose short form is MMS ccan be descibed as the exchange of heavier messages such as a picture or music or document but not from an email. It is availabel for use from one PLMN to another.

Cheers.

Design and implement a program (name it Youth) that reads from the user an integer values repressing age (say, age). The program prints out the entered values followed by a message as follows: If age is less or equal to 21, the message is "Age is a state of mind.". Finally, the program always prints out the message "Age is a state of mind." Format the outputs following the sample runs below.
Sample run 1:
You entered: 20
Youth is a wonderful thing. Enjoy.
Age is a state of mind.

Answers

Answer:

The programming language is not stated; I'll answer this question using C++ programming language;

Another thing to note is that; the sample run is quite different from the illustration in the question; So, I'll assume the program to print "Youth is a wonderful thing. Enjoy.", if and only if age is less than or equal to 21

The program is as follows

#include<iostream>

using namespace std;

int main()  {

int age;

int i =1;

start:

cout<<"Sample run: "<<i<<endl;

cout<<"You entered: ";

cin>>age;

if(age<=21)  {

 cout<<"Youth is a wonderful thing. Enjoy."<<endl; }

cout<<"Age is a state of mind"<<endl;

i++;

cout<<"Run another? (Y/N): ";

char resp;

cin>>resp;

if(resp=='Y')

{

 goto start;

}

return 0;

}

Explanation:

Line 4 of the program declares age as integer

Line 5 declares and initializes a counter variable, i to 1

Line 6 is used as a label to start another sample run

Line 7 prints the Sample run in the following format;

        Sample run 1, during the first iteration

        Sample run 2, during the second iteration; and so on...

Line 8 prompts the user to supply details for age

Line 9 stores user input in variable age

Line 10 checks if age is less than or equal to 21

If true, the program outputs Youth is a wonderful thing. Enjoy., then it continues execution on line 23

Otherwise, it jumps directly to line 23 and outputs Age is a state of mind

The counter is increased by 1 on line 24

The program asks if the user wants to take another sample run on line 25

The response is saved in a char variable on line 27

If the user response is Y, the program goes to the label on line 6 to begin another iteration

Otherwise, the program is terminated.

See attachment for source file

During a traceroute, which action does a router perform to the value in the Time To Live (TTL) field?

Answers

Answer:

During a traceroute, the router decreases the Time To Live values of the packet sent from the traceroute by one during routing, discards the packets whose Time To Live values have reached zero, returning the ICMP error message ICMP time exceeded.

Explanation:

Traceroute performs a route tracing function in a network. It is a network diagnostic commands that shows the path followed, and measures the transit delays of packets across an Internet Protocol (IP) network, from the source to the destination, and also reports the IP address of all the routers it pinged along its path. During this process, the traceroute sends packets with Time To Live values that increases steadily from packet to packet; the process is started with Time To Live value of one. At the routers, the Time To Live values of the packets is gradually decreased by one during routing, and the packets whose Time To Live values have reached zero are discarded, returning the ICMP error message ICMP Time Exceeded

DEF is a small consulting firm with ten on-site employees and 10 to 12 part-time (off-site) software consultants. Currently, the network consists of 2 servers for internal business processes, 1 server that handles the call-in connections; 10 on-site wireless workstations/devices, and 2 printers. Respond to the following in a minimum of 175 words: Identify one network security strategy that would help this organization. Why did you choose this strategy over others

Answers

Answer:

What i would suggest for the organization is to use the Testing Infrastructure strategy. it is good for your consulting firm because it is less costly and provide security.

Explanation:

Solution

There are different network security strategy which is listed below:

Segment the network:

Segmentation in network is very useful for providing security.If any threat is occur only one segment is effected remaining are safe and it is less cost process. very useful for small organizations.

Test your infrastructure :

Testing infrastructure also very good technique.

Always we have to test our infrastructure whether threat is occur or not.

If any threat is happen we can detect that easily by testing our infrastructure.

Regularly update anti-virus software :

This is very useful for small organizations and it is less cost.with less cost we can provide security for all devices like computer,server,modems etc.

Frequently backup your critical data :

This is very good technique for crucial data.If we backup important data any time that will be useful if any attack is happen.

This is less costs and simple.

Change router default security settings :

Changing router password and settings also helpful for providing security.If we maintain same password and same settings for a long time that may lead to data hacking.It is cost less process very useful for small organizations.

In this lab, you declare and initialize constants in a C++ program. The program, which is saved in a file named NewAge2.cpp, calculates your age in the year 2050.

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   const int YEAR = 2050;

   int currentYear = 2020;

   int currentAge = 38;

   

   cout<<"You will be " << currentAge + (YEAR - currentYear) << " years old in " << YEAR;

   return 0;

}

Explanation:

Initialize the YEAR as a constant and set it to 2050

Initialize the currentYear as 2020, and currentAge as 38

Calculate and print the age in 2050 (Subtract the currentYear from the YEAR and add it to the currentAge)

A participant in a usability test completes one of the tasks and then starts to tell a story about a problem the participant had with a similar product. After about 1 minute, the moderator interrupts the participant and says "Your story is interesting, but it is now time to move to the next task. There will be more time at the end of the session for you to continue your story."
This provide an example of which role of a moderator?
1. Recruiter
2. Gracious Host
3. Neutral Observer4. Leader

Answers

Answer:

4. Leader.

Explanation:

A moderator is an individual who presides over a discussion and regulates how the sessions go.

In the case of usability test, a moderator is expected to be in charge of the session, neutral and unbiased with respect to the product being tested, and approachable by the participants.

In this scenario, the moderator interrupts a participant from telling a story about a problem the participant had with a similar product and said "Your story is interesting, but it is now time to move to the next task. There will be more time at the end of the session for you to continue your story."

Hence, the moderator was acting as a leader in his role.

This simply means that, the moderator was being in charge of the session and thus in full control of the pace or timing. As a leader, the moderator ensures a smooth running of the usability test and the participants.

If i wanted to change my phones simcard, does anything need transferring, or is it an easy swap?

Answers

Most likely not but I think you’ll have to log in your account like if you have an Apple phone . You’ll have to log into your Apple ID

Implement a Java program using simple console input & output and logical control structures such that the program prompts the user to enter 5 integer scores between 0 to 100 as inputs and does the following tasks For each input score, the program determines whether the corresponding score maps to a pass or a fail. If the input score is greater than or equal to 60, then it should print "Pass", otherwise, it should print "Fail". After the 5 integer scores have been entered, the program counts the total number of passes as well as the total number of failures and prints those 2 count values with appropriate messages like "Total number of passes is: " & "Total number of failures is: ". After the 5 integer scores have been entered, the program finds the highest score as well as the lowest score and prints those 2 values with appropriate messages like "Highest score is: " & "Lowest score is: ". The program checks whether an input score is a number between 0 - 100 or not. If the input score value is otherwise or outside the above range, then it prints the error message saying "Invalid score" and prompts the user for valid input.

Answers

Answer:

import java.util.Scanner; public class Main {    public static void main(String[] args) {        int pass = 0;        int fail = 0;        int highest = 0;        int lowest = 100;        int counter = 0;        Scanner input = new Scanner(System.in);        while(counter < 5){            System.out.print("Input a score between 0 to 100: ");            int score = input.nextInt();            while(score < 0 || score > 100){                System.out.println("Invalid score.");                System.out.print("Input a score between 0 to 100: ");                score = input.nextInt();            }            if(score >= 60 ){                System.out.println("Pass");                pass++;            }else{                System.out.println("Fail");                fail++;            }            if(highest < score ){                highest = score;            }            if(lowest > score){                lowest = score;            }            counter++;        }        System.out.println("Total number of passes is: " + pass);        System.out.println("Total number of failures is: " + fail);        System.out.println("Highest score is: " + highest);        System.out.println("Lowest score is: " + lowest);    } }

Explanation:

Firstly, declare the necessary variables and initialize them with zero (Line 4-8). Next create a Scanner object to get user input for score (Line 10). Create a while loop by using the counter as limit (Line 12). In the while loop, prompt user to input a number between 1 - 100 (Line 13-14). Create another while loop to check the input must be between 1 - 100 or it will print invalid message and ask for user input again (Line 15-19).

Next, create an if-else statement to check if the current score is equal or above 60. If so print pass if not print fail (Line 21-27). At the same time increment the fail and pass counter.

Create another two if statement to get the current highest and lowest score and assign them to highest and lowest variables, respectively (Line 29-35).

Increment the counter by one before proceeding to the next loop to repeat the same process (Line 37).

At last, print the required output after finishing the while loop (Line 40-43).

Sarah's Texas location has a server that is starting to give her trouble. It is needing to be restarted frequently and seems to be very slow. The server is on the replacement schedule and has just overheated, stopped and will not restart. What plan should direct the recovery for this single server

Answers

Answer:

Hello your question lacks the required options

A) Business impact analysis plan

B) Business continuity plan

C) Disaster recovery plan

D) Recovery point plan

answer : Disaster recovery plan ( c )

Explanation:

The Disaster recovery  plan is a comprehensive creation of a system/set procedures of recovery of the IT infrastructure from potential threats of a company. especially when the interruption is caused by a disaster, accident or an emergency.

The shutting down of the sever due to overheating and not able to restart for Business is an interruption in a critical business process and the plan to direct the recovery for this single server should be the " Disaster recovery plan"

This program has some errors in it that are needed to be checked import java.io.*;
public class Westside
{
public static void main(String args[])throws IOException
{
double cost=0;
double s=100.0;
int n=100;
int z=0;
double disc=0;
String name[]=new String[n];
double price[]=new double[n];
{
double Billamt=0;
String st;
InputStreamReader read= new InputStreamReader(System.in); BufferedReader in= new BufferedReader(read);
while (true)
{
System.out.println("***********************************************"); System.out.println("*************WELCOME TO WESTSIDE*************** !!!"); System.out.println("***********************************************"); System.out.println(" The Clothing where all your needs for clothes and a little bit of accessories are fulfilled");
System.out.println(" If you are in the mood for shopping... YOU ARE IN THE RIGHT PLACE!"); Westside obj=new Westside(); do { System.out.println(" We allow customers to shop conveniently and provide them a wide variety of choices to choose from"); System.out.println("The choices are \n 1. Women's Wear"); System.out.println("2.Men's Wear \n 3. Surprise Section! \n 4.Kids Wear \n 5. Accessories"); System.out.println("and 6. Shoes"); System.out.println("Enter your choice"); int c=Integer.parseInt(std.readLine()); switch (c) { case 1: obj. Women(); break; case 2: obj. Men(); break; case 3: obj. Surprise(); break; case 4: obj. Kids(); break; case 5: obj. Accessories(); break; case 6: obj. Shoes(); break; default: System.out.println("Please check your Input"); } System.out.println("Please type 'stop' if you want to stop"); System.out.println("Type anything else if you want to continue shopping."); st=std.in.readLine(); while(!(st.equalsIgnoreCase("stop"))); System.out.println("Your Bill:"); System.out.println("Sl.no \t Item Name \t \t \t \t Cost of the Item"); for(int i=0;i

Answers

Answer:

for loop statement is not complete

if you want to exclude a portion of an image which option should be chosen?? A. Arrange B. Position C. Crop D. Delete

Answers

It would be C- crop. This allows you to specifically delete parts of the image using drag and drop features. Hope this helps!

Write a statement that increments numUsers if updateDirection is 1, otherwise decrements numUsers. Ex: if numUsers is 8 and updateDirection is 1, numUsers becomes 9; if updateDirection is 0, numUsers becomes 7.Hint: Start with "numUsers

Answers

Answer:

Following are the statement is given below

if(updateDirection ==1) // check condition

{

++numUsers; // increments the value

}

else

{

--numUsers; // decrement the value

}

Explanation:

Following are the description of statement

Check the condition in the if block .If the "updateDirection" variable is 1 then then control moves to the if block otherwise control moves to the else block statement.In the if  block the statement is "++numUsers" it means it increment the value by 1 .In the else block the statement is "--numUsers" it means it decrement  the value by 1 .

Write a python program that asks the user to enter a student's name and 8 numeric tests scores (out of 100 for each test). The name will be a local variable. The program should display a letter grade for each score, and the average test score, along with the student's name. There are 12 students in the class.
Write the following functions in the program:
calc_average - this function should accept 8 test scores as arguments and return the average of the scores per student
determine_grade - this function should accept a test score average as an argument and return a letter grade for the score based on the following grading scale:
90-100 A
80-89 B
70-79 C
60-69 D
Below 60 F

Answers

Answer:

The program doesn't make use of comments (See Explanation)

Also the source code is attached as image to enable you see the proper format and indexing of the source code

The program using python is as follows

def calc_average(name):

   score = []

   sum = 0

   for j in range(8):

       inp = int(input("Test Score"+str(j+1)+": "))

       score.append(inp)

       sum = sum + inp

       if inp>=90 and inp<=100:

           print("A")

       elif inp>=80 and inp<90:

           print("B")

       elif inp>=70 and inp<80:

           print("C")

       elif inp>=60 and inp<70:

           print("D")

       else:

           print("F")

   avg = sum/8

   print("Result Details of "+name)

   print("Average Score: "+str(avg))

   return avg

def determine_grade(result):

   if float(result) >= 90.0 and float(result) <= 100.0:

       print("Letter Grade: A")

   elif float(result) >= 80.0 and float(result) <90.0:

       print("Letter Grade: B")

   elif float(result) >= 70.0 and float(result) < 80.0:

       print("Letter Grade: C")

   elif float(result) >= 60.0 and float(result) < 70.0:

       print("Letter Grade: D")

   else:

       print("Letter Grade: F")

   print(" ")

for i in range(2):

   name = input("Student Name: ")

   result = calc_average(name)

   determine_grade(result)

Explanation:

def calc_average(name):  -> Declares the function calc_average(name); It accepts local variable name from the main function

   score = []

-> Initialize an empty list to hold test scores

   sum = 0

-> Initialize sum of scores to 0

   for j in range(8):

-> Iterate from test score 1 to 8

       inp = int(input("Test Score"+str(j+1)+": "))

-> This line accepts test score from the user

       score.append(inp)

-> The user input is then saved in a lisy

       sum = sum + inp

-> Add test scores

The following lines determine the letter grade of each test score      

if inp>=90 and inp<=100:

           print("A")

---

      else:

           print("F")

   avg = sum/8  -> Calculate average of the test score

The next two lines prints the name and average test score of the student

   print("Result Details of "+name)

   print("Average Score: "+str(avg))

   return avg

-> This line returns average to the main method

The following is the determine_grade method; it takes it parameter from the main method and it determines the letter grade depending on the calculated average

def determine_grade(result):

   if float(result) >= 90.0 and float(result) <= 100.0:

       print("Letter Grade: A")

   elif float(result) >= 80.0 and float(result) <90.0:

       print("Letter Grade: B")

   elif float(result) >= 70.0 and float(result) < 80.0:

       print("Letter Grade: C")

   elif float(result) >= 60.0 and float(result) < 70.0:

       print("Letter Grade: D")

   else:

       print("Letter Grade: F")

   print(" ")

for i in range(2):

-> This is the main method

   name = input("Student Name: ")  -> A local variable stores name of the student

   result = calc_average(name)  -> store average of scores in variable results

   determine_grade(result)-> Call the determine_grade function

In this exercise we have to use the computer language knowledge in python to write the code as:

the code is in the attached image.

In a more easy way we have that the code will be:

def calc_average(name):

  score = []

  sum = 0

  for j in range(8):

      inp = int(input("Test Score"+str(j+1)+": "))

      score.append(inp)

      sum = sum + inp

      if inp>=90 and inp<=100:

          print("A")

      elif inp>=80 and inp<90:

          print("B")

      elif inp>=70 and inp<80:

          print("C")

      elif inp>=60 and inp<70:

          print("D")

      else:

          print("F")

  avg = sum/8

  print("Result Details of "+name)

  print("Average Score: "+str(avg))

  return avg

def determine_grade(result):

  if float(result) >= 90.0 and float(result) <= 100.0:

      print("Letter Grade: A")

  elif float(result) >= 80.0 and float(result) <90.0:

      print("Letter Grade: B")

  elif float(result) >= 70.0 and float(result) < 80.0:

      print("Letter Grade: C")

  elif float(result) >= 60.0 and float(result) < 70.0:

      print("Letter Grade: D")

  else:

      print("Letter Grade: F")

  print(" ")

for i in range(2):

  name = input("Student Name: ")

  result = calc_average(name)

  determine_grade(result)

See more about python at brainly.com/question/26104476

What is an optimal Hup?man code for the following set of frequencies, based on the first 8 Fibonacci numbers? a:1 b:1 c:2 d:3 e:5 f:8 g:13 h:21 Can you generalize your answer to find the optimal code when the frequencies are the first n Fibonacci numbers?

Answers

Answer:

Optimal Huffman code is an encoding algorithm which encodes different symbols using priority queuing

Explanation:

To explain how the Optimal Huffman code works we draw the Huffman tree for the set of symbols and the leaves of the tree are symbols

Note; the right and left moves on the tree starting from the root of the tree to the leaves contain 1 and 1

Also each letter in the tree has a code word from the the root to each letter and the code is called ; Huffman codes.

h : 0

g : 10

f  : 110

e : 1110

d : 11110

c : 111110

b : 1111110

a : 11111110

attached is the Huffman tree

Write a class Student() such that it has an attribute 'score' (that is initialized with 10) and three methods: add_score(): adds 10 to the score decrease_score(): decreases score by 10 __str__(): returns the current score (should return a string) Example:

Answers

Answer:

I am writing the Python program. Let me know if you want the program in some other programming language. Here is the Python code:

class Student(object):

   def __init__(a,score=10):

       a.score=score

   def add_score(a,score):

       a.score += 10

       return (score)

   def decrease_score(a,score):

       a.score -=10

       return (score)

   def __str__(a):

       current_score="{}".format(a.score)

       return current_score

Explanation:

The program has a Student() class with attribute score.

It has the following methods:

__init__(): This method works as a constructor and enables to initialize score attribute of Student class. The value of score is initialized to 10. I have used a as the instance of Student class. However self keyword can also be used as an instance of the object to access the attributes and methods of Student class.

add_score() This method is used to add 10 to the score.

decrease_score() This method is used to decrease the score by 10.

__str__() This method is used to return the current score. format() is used here to return a string. current_score holds the value of the current score.

If you want the check the working of the program, then you can use the following statements to see the results on the output screen:

p = Student()

print(p)

p.add_score(p)

print(p)

This will create an object p of Student class and calls the above methods to display the values of the score according to the methods.

The program along with its output is attached.

Classes in Python are used as a layout to create objects.

The Student() class in Python, where comments are used to explain each line is as follows:

#This defines the Student class

class Student(object):

   #The following function initializes score to 10

   def __init__(scr,score=10):

       scr.score=score

   #The following function increases score by 10

   def add_score(scr,score):

       scr.score += 10

       return scr

   #The following function decreases score by 10    

   def decrease_score(scr,score):

       scr.score -=10

       return scr

   #The following function returns the current score as a string    

   def __str__(scr):

       current_score = scr.score

       return current_score

Read more about Python classes at:

https://brainly.com/question/20728426

Write VHDL code for a RAM that has 16 locations each 32 bits wide. There will be a chipselect (CS) input that activates the chip. Another input to the circuit is an R/W which determines if the operation is a read or a write to the chip. The address input to the chip is a vector. The input and output would also be a vector(s) that should send and receive the data, depending on the address input to the chip.

Answers

Answer:

Hello your question lacks some parts attached is the complete question and the solution is written in the explanation

Explanation:

VHDL CODE::::::

VHDL Code for RAM Design:

library IEEE;

use IEEE.STD_LOGIC_1164.ALL;

use IEEE.STD_LOGIC_ARITH.ALL;

use IEEE.STD_LOGIC_UNSIGNED.ALL;

entity RAM_32Bits is

port (

Clk: in std_logic;

CS: in std_logic;

RW: in std_logic;

Address: in std_logic_vector(3 downto 0);

Data_In: in std_logic_vector(31downto 0);

Data_Out: out std_logic_vector(31downto 0);

)

end entity RAM_32Bits;

architecture RAM_32 of RAM_32Bits is

// Declare Memory Array

type RAM is array (3 downto 0) of std_logic_vector(31 downto 0);

signal mem_array: ram;

// Signal Declaration

signal read_addr: std_logic_vector (3 downto 0);

begin

process (Clk)

begin

if (Clk’event and Clk=’1’) then

if (CS=’1’ and RW=’1’) then

ram(conv_integer(Address)) <= Data_In;

endif;

if (CS=’1’ and RW=’0’) then

read_addr <= Address;

endif;

else

read_addr <= read_addr;

endif;

endprocess

Data_Out <= ram[conv_integer(read_addr)];

end architecture RAM_32;

Assign True to the variable is_ascending if the list numbers is in ascending order (that is, if each element of the list is greater than or equal to the previous element in the list). Otherwise, assign False with is_ascending.

Answers

Answer:

The question seem incomplete as the list is not given and the programming language is not stated;

To answer this question, I'll answer this question using Python programming language and the program will allow user input.

Input will stop until user enters 0

The program is as follows

newlist = []

print("Input into the list; Press 0 to stop")

userinput = int(input("User Input:"))

while not userinput == 0:

     newlist.append(userinput)

     userinput = int(input("User Input:"))

is_ascending = "True"

i = 1

while i < len(newlist):  

     if(newlist[i] < newlist[i - 1]):  

           is_ascending = "False"

     i += 1

print(newlist)

print(is_ascending)

Explanation:

This line declares an empty list

newlist = []

This line prompts gives instruction to user on how to stop input

print("Input into the list; Press 0 to stop")

This line prompts user for input

userinput = int(input("User Input:"))

This next three lines takes input from the user until the user enters 0

while not userinput == 0:

     newlist.append(userinput)

     userinput = int(input("User Input:"))

The next line initialized "True" to variable is_ascending

is_ascending = "True"

The next 5 line iterates from the index element of the list till the last to check if the list is sorted

i = 1

while i < len(newlist):  

     if(newlist[i] < newlist[i - 1]):  

           is_ascending = "False"

     i += 1

The next line prints the list

print(newlist)

The next line prints the value of is_ascending

print(is_ascending)

JAVA

Write a program that prompts the user to enter a year and the first three letters of a month name (with the first letter in uppercase) and displays the number of days in the month.

If the input for month is incorrect, display a message as shown in the following sample run.


SAMPLE RUN 1:

Enter a year: 2001
Enter a month: Jan
Jan 2001 has 31 days

SAMPLE RUN 2:

Enter a year: 2016
Enter a month: Feb
Feb 2016 has 29 days

SAMPLE RUN 3:

Enter a year: 2016

Enter a month: jan

jan is not a correct month name


Class Name: Exercise04_17

Answers

Answer:

Following are the code to this question:

import java.util.*;//import package for user input

public class Exercise04_17 //defining class Exercise04_17

{

public static void main(String[] as)//defining the main method  

{

int y,d=0; //defining integer variable

String m;//defining String variable

Scanner oxc=new Scanner(System.in);//creating scanner class object oxc

System.out.print("Enter a year: ");//print message

y=oxc.nextInt();//input year value which store in y variable

System.out.print("Enter a month: ");//print message

m=oxc.next();//input month value which store in m variable

if(m.equals("Jan")||m.equals("Mar")||m.equals("May")||m.equals("Jul")||m.equals("Aug")||m.equals("Oct")||m.equals("Dec"))//defining if block to check Month value

{

d=31;//assign value in d variable

}

if(m.equals("Apr")||m.equals("Jun")||m.equals("Sep")||m.equals("Nov"))//definingif block to check month value

{

d=30;//assign value in d variable

}

if(m.equals("Feb"))//defining if block to check month value is Feb

{

if(y%4==0||y%400==0)//defining if blook to check leap year

{

d=29;//assign value in d variable

}

else//else block

{  

d=28;//assign value in d variable

}

}

if(d!=0)//defining if block that check d variable value not equal to 0

{

System.out.println(m+" "+y+" has "+d+" days");//print inserted value with message

}

else//else block

{

System.out.println(m+" is not a correct month name");//print message

}

}

}

Output:

please find the attachment.

Explanation:

Description of the code:

In the above code, two integer variable  "d and y" and one string variable "m" are declared, in which the "y and m" variable is used to input the value from the user end. In the y variable, we simply input the value and print its value, but in the m variable, we input the value and used to check its value by using multiple if blocks and in this, we also check leap year value, and then assign value in "d" variable. In the last step, we print input values with the "d" variable value.

The performance of a client-server system is strongly influenced by two major network characteristics: the bandwidth of the network (how many bits/sec it can transport) and the latency (how many seconds it takes for the first bit to get from the client to the server). Give an example of a network that exhibits high bandwidth but also high latency. Also give an example of one that has both low bandwidth and low latency. Justify/explain your answers. (

Answers

Answer:

A bandwidth is the maximum rate of transfer of data across a given path

Latency refers to the delay of data to travel or move between a source and destination

An example of a high bandwidth and high latency network is the Satellite Internet connectivity.

An example of a low bandwidth and latency network is the telephone system connection.

Explanation:

Solution

Bandwidth: Bandwidth determines how fast data can be transferred for example, how many bits/sec it can transport.

Latency: It refers to the delay or how long it takes for data to travel between it's source and destination.

An example of a high bandwidth and high latency network is the Satellite internet connection.

Satellite internet connection: This is responsible for the connectivity of several systems, it has a high bandwidth, since satellite are in space, due to distance it has a high latency.

So, satellite internet connection is compensated with high latency and high bandwidth.

An example of a low bandwidth and low latency network is the Telephony network.

Telephone/telephony internet connection: This connection does not have much data for transfer. it has low size audio files of which a low bandwidth range. also for both end or end users to understand and talk to each other, it has low latency.

An example of a network that exhibits high bandwidth but also high latency is Satellite internet connection.

An example of one that has both low bandwidth and low latency is telephony internet connection.

Based on the provided information, we can say that Satellite internet connection posses high bandwidth but also high latency because, the fastness of data transfer is based on the bandwidth and how the data to travel between it's source and destination is based on its latency.

We can conclude that telephony internet connection has low bandwidth and low latency because of low data transfer is required.

Learn more about bandwidth at;

https://brainly.com/question/11408596

Consider the following algorithm. for i ∈ {1,2,3,4,5,6} do ???? beep for j ∈ {1,2,3,4} do beep for k ∈ {1,2,3} do ???? for l ∈ {1,2,3,4,5} do beep for m ∈ {1,2,3,4} do ???? ???? beep How many times does a beep statement get executed?

Answers

Answer:

This is the complete question:

for i ∈ {1,2,3,4,5,6} do  beep  

for j ∈ {1,2,3,4} do  beep  

for k ∈ {1,2,3} do

    for l ∈ {1,2,3,4,5} do beep  

for m ∈ {1,2,3,4} do  beep

Explanation:

I will explain the algorithm line by line.

for i ∈ {1,2,3,4,5,6} do  beep  

This statement has a for loop and i variable that can take the values from 1 to 6. As there are 6 possible values for i so the beep statement gets executed 6 times in this for loop.

for j ∈ {1,2,3,4} do  beep  

This statement has a for loop and j variable that can take the values from 1 to 4. As there are 4 possible values for j so the beep statement gets executed 4 times in this for loop.

for k ∈ {1,2,3} do

    for l ∈ {1,2,3,4,5} do beep  

There are two statements here. The above statement has a for loop and k variable that can take the values from 1 to 3. As there are 3 possible values for k so the beep statement gets executed 3 times in this for loop. The below statement has a for loop and l variable that can take the values from 1 to 5. As there are 5 possible values for l so the beep statement gets executed 5 times in this for loop. However these statement work like an inner and outer loop where the outer loop is k and inner one is l which means 1 gets executed for each combination of values of k and l. As there are three values for k and 5 possible values for l so the combinations of values of k and l is 15 because 3 * 5 = 15. Hence the beep statement gets executed 15 times.

for m ∈ {1,2,3,4} do  beep

This statement has a for loop and m variable that can take the values from 1 to 4. As there are 4 possible values for m so the beep statement gets executed 4 times in this for loop.

Now lets take the sum of all the above computed beeps.

for i = 6 beeps

for j = 4 beeps

for k and l possible combinations = 15 beeps

for m = 4 beeps

total beeps = 6 + 4 + 15 + 4 = 29 beeps

A deliberate, politically or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target. This is known as:

a. cyberterrorism.
b. salami technique.
c. cyberstalking.
d. cyberbullying.

Answers

Answer:

a. cyberterrorism.

Explanation:

Cyberterrorism can be defined as an illegal attack against the information stored in a data based done so as to intimidate a target. This is done to coerce a  target to action or to frustrate and destabilize a target.

In this act, the data compilations or information systems is deliberately attacked to disrupt the psychology of a target. It is one of the major tactics used in politics to frustrate the effort of a political system by an opposition.

Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to print two random integers between (and including) 0 and 9. End with a newline. Ex: #include < iostream > #include < cstdlib > // Enables use of rand() #include < ctime > // Enables use of time() using namespace std: int main() { int seedVal = 0 /* Your solution goes here */ return 0: }

Answers

Answer:

Replace /* Your solution goes here */ with the following code segment

srand(seedVal);

cout<<rand()%(int)(9 - 0 + 1) + 0<<endl;

cout<<rand()%(int)(9 - 0 + 1) + 0<<endl;

Explanation:

From the code segment, the seedVal has already been declared and initialized to 0; The next step is to seed it as random number using srand.

The first line of the code segment in the Answer section "srand(seedVal); " is used to achieve that task.

Having done that, the next step is to write statements to generate the two random numbers using rand();

When generating random numbers, two things are to be noted;

The lower bound; LThe upper bound; U

Here, the lower bound is 0 and the upper bound is 9;

C rand() function uses the following syntax to generate random numbers

rand()%(int)(U - L + 1) + L

Where U = 9 and L = 0

Replacing U and L with there respective values; the syntax becomes

rand()%(int)(9 - 0 + 1) + 0

So, the two print statements will be written as

cout<<rand()%(int)(9 - 0 + 1) + 0;

Also, the question states that, each print statement be ended with a new line;

So, the print statements will be

cout<<rand()%(int)(9 - 0 + 1) + 0<<endl;

Alternatively, by solving (9 - 0 + 1) + 0; the statements can be written as

cout<<rand()%(int)(10)<<endl;

Conclusively, the complete statements is as follows;

srand(seedVal);

cout<<rand()%(int)(9 - 0 + 1) + 0<<endl;

cout<<rand()%(int)(9 - 0 + 1) + 0<<endl;

or

srand(seedVal);

cout<<rand()%(int)(10)<<endl;

cout<<rand()%(int)(10)<<endl;

Denial of service (DoS) attacks can cripple an organization that relies heavily on its web application servers, such as online retailers. What are some of the most widely publicized DoS attacks that have occurred recently? Who was the target? How many DoS attacks occur on a regular basis? What are some ways in which DoS attacks can be prevented? Write a one-page paper on your research.

Answers

Answer:

The overview of the given question is described in the explanation segment below.

Explanation:

The number of casualties has occurred in recent years. The following are indeed the assaults:

Arbitrary Remote Code execution attacks:

It's also a very hazardous assault. Unsanitary working on implementing that used operating system including user actions could enable an attacker to execute arbitrary functions mostly on system files.

Sites become targeted with such a DOS assault that will cause them inaccessible whether they close the account to an offender who threatens them.

Prevention: We could protect this by preventing the call from additional assessment by the user. We will disinfect input validation if we transfer values to devise calls. The input data is permitted to transfer on requests, it should have been strictly regulated although restricted to a predetermined system of principles.

Injection attack:

The object of the Injection Attack seems to be to delete vital information from the server. Throughout the list, we have such a user, a code, as well as a lot of several other essential stuff. Assailants are taking vital data and doing the wrong stuff. This can have an impact on the web site or software application interface the SQL.

Prevention: Parameterized functions require developers must specify all of the SQL code, and afterward move the question in-parameter, allowing the server to distinguish between some of the code as well as the information. By decreasing the privilege allocated to each database. White list data validation has been used to prevent abnormal information.

Zero-day attack:

It corresponds to something like a vulnerability flaw undisclosed to the user. The security vulnerability becomes infected with malware. The attackers have access to inappropriate details.

Prevention: The organizations are releasing the patch fixes the found holes. The updated plugin is also a preventive tool.

Buffer overflow attack:

This is indeed a major security threat to the accuracy of the data. This overflow happens since more information becomes set to either a specified size than even the buffer could accommodate. Adjoining program memory is compromised. During that time, the attacker was indeed running obfuscated code. Two key forms of such attack are provided below:

Heap-basedStack-based

Prevention: Standard library features, including such strcpy, should indeed be avoided. Standard testing should be performed to identify as well as resolve overflow.

House real estate summary Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value)) Ex: If the input is: 200000 210000 the output is: This house is $200000. The change is $-10000 since last month. The estimated monthly mortgage is $850.00.

Answers

Answer:

current_price = int(input("Enter the current price: "))

last_months_price = int(input("Enter the last month's price: "))

print("This house is $" + str(current_price))

print("The change is $" + str(current_price - last_months_price) + " since last month")

print("The estimated monthly mortgage is ${:.2f}".format((current_price * 0.051) / 12))

Explanation:

Ask the user to enter the current price and last month's price

Print the current price

Print the change in the price, subtract the last month's price from the current price

Print the estimated monthly mortgage, use the given formula to calculate, in required format

Two friends are eating dinner at a restaurant. The bill comes in the amount of 47.28 dollars. The friends decide to split the bill evenly between them, after adding 15% tip for the service. Calculate the tip, the total amount to pay, and each friend's share, then output a message saying "Each person needs to pay: " followed by the resulting number.

Answers

Answer:

bill = 47.28

tip = bill * 0.15

total_pay = bill + tip

each_share = total_pay / 2

print("Each person needs to pay: " + str(each_share))

Explanation:

*The code is in Python.

Set the bill

Calculate the tip, multiply the bill by 0.15

Calculate the total_pay, add bill and tip

Calculate each friend's share, divide the total_pay by 2. Then, print it in required format.

For this assignment you will write a class called Dog that has the following member variables:
birthyear. An int that holds the dog’s birth year.
breed. A string that holds the breed of dog.
vaccines. A Boolean holding a yes/no value indicating whether the dog is currently on vaccinations. In addition, the class should have the following member functions:
Constructor. The constructor should accept the dog’s birthyear, breed and vaccines as arguments and assign these values to the object’s birthyear, breed and vaccines member variables.
Accessors. Appropriate accessor functions should be created to allow values to be retrieved from an object’s birthyear, breed and vaccines member variables.
Demonstrate the class in a program that creates a Dog object. The user should enter all input. Be sure to include comments throughout your code where appropriate.

Answers

Answer:

import java.util.Scanner;

public class Dog {

   private int birthYear;

   private String breed;

   private boolean isVaccinated;

   // The constructor

  public Dog(int birthYear, String breed, boolean isVaccinated) {

       this.birthYear = birthYear;

       this.breed = breed;

       this.isVaccinated = isVaccinated;

   }

   // The Accesor Methods

   public int getBirthYear() {

       return birthYear;

   }

   public void setBirthYear(int birthYear) {

       this.birthYear = birthYear;

   }

   public String getBreed() {

       return breed;

   }

   public void setBreed(String breed) {

       this.breed = breed;

   }

   public boolean isVaccinated() {

       return isVaccinated;

   }

   public void setVaccinated(boolean vaccinated) {

       isVaccinated = vaccinated;

   }

}

//A program that creates the Dog Object

class DogTest{

   public static void main(String[] args) {

       //Requesting details of the Dog from User

       System.out.println("Enter Dog year of birth");

       Scanner in = new Scanner(System.in);

       int year = in.nextInt();

       System.out.println("Enter Dog breed");

       String breed = in.next();

       System.out.println("Is Dog vaccinated");

       boolean isVaccinated = in.nextBoolean();

       //Creating an Object of the Dog class

       Dog DogOne = new Dog(year, breed, isVaccinated);

       System.out.println("The Dog's Breed is is "+DogOne.getBreed());

   }

}

Explanation:

Create two class Dog and DogTest

Define all the class members in the Dog class (The three variables, constructor and accessor methods)

Create the main method in the DogTest class, create an instance of the Dog class.

Use scanner class to request the attributes of a new Dog

Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. You may assume that the string does not contain spaces and will always contain less than 50 characters.Ex: If the input is:n Mondaythe output is:1Ex: If the input is:z TodayisMondaythe output is:0Ex: If the input is:n It'ssunnytodaythe output is:2Case matters.Ex: If the input is:n Nobodythe output is:0n is different than N.C++ Code:#include #include int main(void) {/* Type your code here. */return 0;}

Answers

Answer:

Here is the C++ program:

#include <iostream> // to include input output functions

using namespace std; // to identify objects like cin cout

int counter(string userString, char character) { //function counter

   int count = 0;   // counts the no of times a character appears in the string

   for (int i=0;i<userString.length();i++)  

// loop to move through the string to find the occurrence of the character

       if (userString[i] == character) //if characters is found in the string

           count++;   //counts the occurrence of the character in the string

   return count; }   //returns the no of times character occurs in the string

int main() { //start of the main() function body

   string s; // stores the string entered by the user

   cout<<"Enter a string: "; //prompts user to enter the string

   cin>>s; //reads the string from user

   char ch; //stores the character entered by the user

   cout<<"Enter a character: "; //prompts user to enter a character

   cin>>ch; //reads the character from user

   cout << counter(s, ch) << endl; }  

//calls counter function to find the number of times a character occurs in the //string

Explanation:

The counter function works as following:

It has a count variable which stores the number of occurrences of a character in the userString.

It uses a for loop which loops through the entire string.

It has i position variable which starts with the first character of the string and checks if the first character of userString matches with the required character.

If it matches the character then count variable counts the first occurrence of the character and in the userString and is incremented to 1.

If the character does not match with the first character of the userString then the loops keeps traversing through the userString until the end of the userString is reached which is specified by the length() function which returns the length of the string.

After the loop ends the return count statement is used to return the number of occurrences of the character in the userString.

The main() function prompts the user to enter a string and a character. It then calls counter() function passing string s and character ch arguments to it in order to get the number of times ch appears in s.

The output is attached in a screenshot.

10. Which of these is not an HTTP verb? PUT AJAX GET DELETE

Answers

Answer:

Brainliest!

Explanation:

The primary or most-commonly-used HTTP verbs (or methods, as they are properly called) are POST, GET, PUT, PATCH, and DELETE. These correspond to create, read, update, and delete (or CRUD) operations, respectively. There are a number of other verbs, too, but are utilized less frequently.

-

restapitutorial

.

com

AJAX

The word that is not an HTTP verb is AJAX.

But PUT, GET, and DELETE are HTTP verbs.

A HTTP verb is a word or method (it can also be a noun) for retrieving information (documents) in a web-based environment.  There are other HTTP verbs used for various purposes.  The most common include PUT, GET, DELETE, and POST.

HTTP is a computer-based abbreviation that means Hypertext Transfer Protocol.  It is the protocol for transferring data over the web using a client's home computer, laptop, or mobile device.

AJAX, which means Asynchronous Javascript and XML, is mainly used as a technique for creating fast and dynamic web pages using small amounts of data.

There is no suitable reference of HTTP verbs at brainly.com.

The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network. a. user- or server-specific b. port- or program-specific c. role- or function-specific d. file or folder-specific

Answers

Answer:

c. role- or function-specific.

Explanation:

The Security Configuration Wizard was  firstly used by Microsoft in its development of the Windows Server 2003 Service Pack 1. It provides guidance to network security administrators, secure domain controllers, firewall rules and reduce the attack surface on production servers.

Security Configuration Wizard saves any changes that are made as a role- or function-specific security policy which can be used as a baseline and applied to other servers in the network.

After checking the Group policy by an administrator, any changes made as a role- or function-specific security policy by the Security Configuration Wizard (SCW) is used as a baseline and can be applied either immediately or sometimes in the future to other servers in the network after testing it in a well secured environment.

Basically, the Microsoft Security Configuration Wizard (SCW) typically help administrators in running the following;

1. Role-Based Service Configuration.

2. Registry settings.

3. Network and Firewall Security settings.

4. Auditing Policy settings.

Other Questions
Please Help Me Guys!!!!! Which of the following was one effect of Europes Commercial Revolution? People invested money in joint-stock companies. Banks tightened lending restrictions. Cottage industries promoted the regulation of labor. Merchant guilds increased their influence. the diagram shows a star made by surrounding a regular octagon with triangles, explain why angle a must be 135 degrees Sally has a dog at home so she knows about dogs. She is walking down the street and sees an animal walking toward her. The animal has four legs, fur, a tail, and is barking. Sally knows that these are characteristics of a dog given her knowledge of dogs. She quickly concludes that this animal is a dog. This example illustrated the Piagetian concept of _____.A) operationsB) assimilationC) equilibriumD) accommodation Graph the rational function f(x)=2x-3 over x+4 Classify the following real numbers as rational or irrational: Choose the algebraic description that maps ABC onto ABC in the given figure. answwers: A) (x, y) (x + 4, y + 5) B) (x, y) (x 4, y 5) C) (x, y) (x 4, y + 5) D) (x, y) (x + 5, y 4) Read the prompt, then answer questions about yourwriting assignment.Topic: What will you write about?Purpose: What is your reason for writing?Research suggests that laughterimproves people's emotional andphysical well-being. Write a research-based essay to inform the readerabout the positive effects of laughteron emotional and physical health.Properly cite research evidence toinform the audience about the topic.1. The positive effects of laughter 2. To offer information on a topic An amoeba is a unicellular organism, which doesnt have a stomach for digestion of food. How does food storage and digestion take place in an amoeba? PLEASE HELP!!! WILL GIVE BRAINLIEST!! Which scenario below best shows how local taxes support the economy? Income taxes pay for building a new state highway. Gas taxes pay for building a federal office building. A special one-year tax pays for building new schools. Income taxes go to pay for military research. Frantic Fast Foods had earnings after taxes of $900,000 in 20X1 with 301,000 shares outstanding. On January 1, 20X2, the firm issued 32,000 new shares. Because of the proceeds from these new shares and other operating improvements, earnings after taxes increased by 28 percent. a. Compute earnings per share for the year 20X1. (Round your answer to 2 decimal places.) b. Compute earnings per share for the year 20X2. (Round your answer to 2 decimal places.) The spreadsheet below shows a list of fruits with their calorie count, grams of sugar, dietary fiber, and protein. Which set of steps will organize the data to only show foods with more than 100 calories and rank their sugar content from greatest to least? Sort Sugar in descending order, and filter Calories by under 100 calories. Sort Sugar in ascending order, and filter Calories by over 100 calories. Filter Calories by over 100 calories, and sort Sugar in descending order. Filter Calories by over 100 calories, and sort Sugar in ascending order. Clothing Emporium was organized on January 1, 2021. The firm was authorized to issue 100,000 shares of $5 par value common stock. During 2021, Clothing Emporium had the following transactions relating to stockholders equity: Issued 30,000 shares of common stock at $7 per share. Issued 20,000 shares of common stock at $8 per share. Reported a net income of $100,000. Paid dividends of $50,000. What is the total stockholders' equity at the end of 2021? Researchers want to determine if caffeine affects reaction time. They divide a sample of 150 people into 3 groups. Group 1 gets a regular drink with no caffeine, group 2 gets a drink with 95 mg of caffeine, and group 3 gets a drink with 250 mg of caffeine. Each group is then given a test to gauge their reaction time. What is the appropriate test to use? Why Do i SUCK AT MATH!!!!!!!!!!!!!!!!! :( A donut shop is experimenting with two new types of cream-filled treats, one with raspberry filling, and the other with peach. A batch of raspberry donuts cooks in 11 minutes while a batch of peach donuts cooks in only 8 minutes. Let x represent the number of raspberry-filled donuts and let y represent the number of peach-filled donuts. Write an inequality to represent how many batches of the new type of donuts can be produced in a 10 hour day. a. c. b. d. The interior angle of the regular pentagon below measures 108, and the pentagon has rotational symmetry. Which of the following is the measure of an interior angle after a 90 rotation around the point of symmetry? what is the best summary of the excerpt ? ""pangu"" early chinese myth Antoine has a solid, spherical ball of clay with a radius of 5 cm. If he shapes it into a solid, coneshaped figure with a radius of 2 cm, what will the height of the cone be? People with (blank) interests rarely suffer from boredom.Which word, derived from the base word varied, should go in the blank? PLZZZZZZZZZ HLPPPPPPPP MEEEEEEEEEEEwhich of the following is made up of one base and a vertex not in the same plane as the base? check all that applya. coneb. prismc. cylinderd. pyramid