Answer:
The correct answer is letter "C": always.
Explanation:
Vulnerability management is in charge of preventing, identifying, and eliminating threats that could exploit vulnerabilities in a software system. The threat can damage or destroy the software after the threat gained unauthorized access and it does not matter how large the vulnerability of the software is, a threat will exploit it.
Write a Java method onlyDigits that takes a string as a parameter. The method should remove from the string all characters, which are not digits, and return a string that contains only digits.
Answer:
public static String onlyDigits(String in){
String digitsOnly = in.replaceAll("[^0-9]", "");
return digitsOnly;
}
A Complete program is wrtten in the explanation section
Explanation:
public class TestClass {
public static void main(String[] args) {
String a = "-jaskdh2367sd.27askjdfh23";
System.out.println(onlyDigits(a));
}
public static String onlyDigits(String in){
String digitsOnly = in.replaceAll("[^0-9]", "");
return digitsOnly;
}
}
The output: 23672723
The main logic here is using the Java replaceAll method which returns a string after replacing all the sequence of characters that match its argument, regex with an empty string
Which two Apex data types can be used to reference a Saleforce record ID dynamically ?A. sObjectB. String C. ENUMD. External ID
Answer:
sObject and String
Explanation:
sObject is the universal object in Salesforce which contains an Object that may be Standard one or Custom one. And we can store any object in sObject we can get the Id as well. In string we store IDsIn External ID can be text , mail or number , it cannot be refer and in ENUMD we cannot store IDsWhen a large project begins, a programmer can build a(n) ________, which is a small model of what the final program will look like when it is finished.
Answer:
A Prototype
Explanation:
Prototype: It is an early sample, model, or release of a product built by the programmer to test a concept or process and that will how the final product will look like.
Answer:
The correct word for the blank space is: prototype.
Explanation:
In computer science, a prototype is built to test if theoretical propositions can be translated into factual systems. The prototype is the draft of what the final software could give and include core features only. Designing prototypes is an opportunity for the programmers because the basic layout could spot unexpected failures that could or could not be corrected.
Using your favorite imperative language, give an example of each of the following. (a) A lexical error, detected by the scanner (b) A syntax error, detected by the parser (c) A static semantic error, detected by semantic analysis (d) A dynamic semantic error, detected by code generated by the compiler
Explanation:
a. int foo+; (foo+ is an invalid identifier because + is not a valid char in identifiers)
b. foo int; (Syntax error is any error where the syntax is invalid - either due to misplacement of words, bad spelling, missing semicolons etc.)
c. Static semantic error are logical errors. for e.g passing float as index of an array - arr[1.5] should be a SSE.
d. I think exceptions like NullReferenceException might be an example of DME. Not completely sure but in covariant returns that raise an exception at compile time (in some languages) might also come in this category. Also, passing the wrong type of object in another object (like passing a Cat in a Person object at runtime might qualify for DME.) Simplest example would be trying to access an index that is out of bounds of the array.
Using your text editor, write the function sumSquares(aList). The function takes a list as an input and returns (not prints) the sum of the squares of the all the numbers which absolute value is divisible by 3. If an element in the list is not a number, the function should ignore the value and continue. When the function receives an input that is not a list, code should return the keyword None (not the string ‘None’). Hints: review the type() or isinstance() methods
Answer:
We have the Python code below with appropriate comments
Explanation:
#defining the function for use
def sumSquares(aList):
#checking if element in list is not in number as an error
if type(aList) is not list:
return 'error'
sum = 0
for x in aList:
#checking if in list and is
#divisible by 3
if type(x) in [int, float] and x % 3 == 0:
#squares of number x is x*x
#+= is an updating syntax that represents
#the sum of the squares
sum += x*x
#returning the sum, not printing
return sum
Sample test cases
print(sumSquares(5))
print(sumSquares('5'))
print(sumSquares(6.15))
print(sumSquares([1, 5, -3, 5, 9, 8, 4]))
print(sumSquares(['3', 5, -3, 5, 9.0, 8, 4, 'Hello']))
NOTE: Use in your code and view the result
Create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).
You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.
Answer:
Step 1
IT security policies for handling user accounts or rights for a student
IT security is simply protecting computer systems from being robbed or damaged in terms of
Misdirection for service they produce Software'sHardware andinformationStep 2:
Account/Right is one of the security policies IT provides.Policies that can be written for handling user accounts includes
User account must reside within the system authorized by IT teamUser account protection User account responsibility User account and their access must agree to condition of usage established by IT.Policies for students who are leaving prematurely:
Expiry and deletion of user account:
When a course is finished or when a particular student withdraws from the course then user account gets terminated or deleted automatically.Achieving this can be through changes in authorization or deleting the account itself if no privileges are on the account
Step 4
Responsibilities of user account
A working assistant for the faculties who is a student would be given extra privileges compared to a normal student.For these category of students while exiting from the university they should hand over the responsibility , user account and password to the authority as required.
The access to other servers within the intranet or other resources are terminated.
Step 5
Privilege user account:
When assistant who are students drop out of a course,they should temporarily handover their user account to the concerned office.Now when they rejoin the the faculty he or she has the ability to take up the responsibility for handling the user's account
Step 6
Protection of user account
Assistants who are students or normal students ,while leaving at any time or for any reason should not relate their login ID's and password.IT polices do not request for user ID's under any circumstance.Hence it is he job of the student to maintain secrecy of their login ID and their password.
Explanation:
The above answer is an outline of an IT policy in order gain an insight on it let first define the term IT policy
IT policy
An IT policy can be defined as a lay down rule or a course of action adopted by an IT organisation to guild their activities in order to arrive at a particular outcome.this policies are implemented as a procedure or a protocol.
Some of the function of an IT policy include
1 To make available an IT infrastructure that would help the user identify opportunities , improve performance and understand business environment.
2 To evolve and archive information as corporate resource and to offer infrastructure to ensure coherent access for user to complete, concise and timely information.
The above answer provides a student with the necessary information to be able to make use of the resource on the faculties network.and be guided on outcome of some situation and conditions
Final answer:
To manage the IT security for user accounts of departing students with special access, one should follow a strict protocol involving notification, access review, revocation of rights, audits, documentation, continuity planning, and regular policy updates.
Explanation:
Step-by-Step IT Security Policy for Handling User Accounts/Rights
When a student who has been granted special access to certain resources (such as a faculty assistant or a lab assistant) leaves a college or university prematurely, it is crucial to follow a structured approach to revoke their access and secure the institution's systems. Here is a detailed step-by-step IT security policy to handle such scenarios:
Audit: Perform further audits on systems and services that were accessible to the student to ensure no security breaches or data manipulations.
Continuity Planning: Assess the need for a replacement or redistribution of the student's previous responsibilities to ensure continuity.
Policy Review and Update: Regularly review and update the IT security policy to incorporate new challenges and technologies.
Ensuring that explicit rules like the ones contained within a Student Handbook are diligently enforced is vital for maintaining the integrity of the institution's IT infrastructure, particularly when dealing with cyberbullying, identity theft, and other emerging issues.
Write a fragment of code that will test whether an integer variable score contains a valid test score. Valid test scores are in the range 0 to 100.
Answer:
Following are the code in the C Programming Language.
//set integer datatype variable
int score;
//check condition is the score is in the range of 0 to 100
if(score > 0 && score < 100){
//print if condition is true
printf("Valid test scores");
}else{
//otherwise print the following string.
printf("test scores are Invalid");
}
Explanation:
Following are the description of the code.
In the following code that is written in the C Programming Language.
Set an integer data type variable i.e., score.Then, set the if conditional statement to check the condition is the variable "score" is greater than 0 and less the 100.If the following statement is true then print "Valid test scores".Otherwise, it print "test scores are Invalid".If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fall within?
Answer:
LAN
Explanation:
A LAN ( local area network) is network that is installed with a small area like a building. It can be connected to a WAN or wide area network. The connection between the devices in a LAN network could be with cable (Ethernet protocol) or wireless using WiFi protocol.
The traditional connection in a LAN is with cable, but sometimes, a wireless connection can be used, this is called a WLAN (wireless local area network). Both form of connections are still under the LAN domain.
write a java program that will print out the following pattern 1 12 123 1234 12345
Answer:
public class Main {
public static void main(String[] args)
{
int n,m;
int k=5;
for(n=1;n<=k;n++)
{
for(m=1;m<=n;m++)
System.out.print(m);
System.out.print(" ");
}
}
}
Explanation:
The solution to this problem is the use of nested loops of an inner and outer loop to generate a half pyramid of numbers, but displayed on the same line so we have a sequence 1 12 123 1234 12345. The outer loop iterates for n=1 to n<=5 and the inner loop that has the print statement prints the integers from for m = 1 to m<=n.
Note that the value k = 5 is hard coded which in some sense is the number of rows, that is the length of iteration of the outer loop.
Open "Wireshark", then use the "File" menu and the "Open" command to open the file "Exercise One.pcap". You should see 26 packets listed. This set of packets describes a ‘conversation’ between a user’s client and a central server. This entire conversation happens automatically, after a user types something and hits enter. Look at the packets to answer the following questions in relation to this conversation. In answering the following questions, use brief descriptions. For example, "In frame X, the client requests a web page, and in frame Y, the server delivers the content of the page." Hint: See the accompanying document titled the "QuickStart Guide" – Look under the appendix describing "Hits Versus Page Views". Hint: a favicon.ico is a small graphic that can be used as an icon to identify a web page. In the following graphic the colorful "G" to the left is a favicon.ico.? What is the IP address of the client that initiates the conversation? Use the first two packets to identify the server that is going to be contacted. List the common name, and three IP addresses that can be used for the server. What is happening in frames 3, 4, and 5? What is happening in frames 6 and 7? Ignore frame eight. However, for your information, frame eight is used to manage flow control. What is happening in frames nine and ten? How are these two frames related? What happens in packet 11? After the initial set of packets is received, the client sends out a new request in packet 12. This occurs automatically without any action by the user. Why does this occur? See the first "hint" to the left. What is occurring in packets 13 through 22? Explain what happens in packets 23 through 26. See the second "hint" to the left. In one sentence describe what the user was doing (Reading email? Accessing a web page? FTP? Other?).
Final answer:
The IP address of the client, the server communication flow, and the user accessing a web page.
Explanation:
The IP address of the client that initiates the conversation can be found in the first two packets of the file. In frames 3, 4, and 5, the client sends a request to the server, and in frames 6 and 7, the server responds with the requested information. Frames 9 and 10 are related as they capture the transmission of an acknowledgment from the client to the server for the data received in frame 8. Packet 11 contains a retransmission of data from the server to the client. The client sends out a new request in packet 12 because the requested content references additional resources, such as images, that need to be fetched. Packets 13 to 22 represent the transmission of data between the client and server. In packets 23 to 26, the server sends the final response to the client, completing the conversation.
In this conversation, the user was accessing a web page.
You have been handed a mysterious piece of data by an unknown person. Judging by his shifty eyes and maniacal laughter you don't think he can be trusted. Complete the below method to tell you the type for this unknown data. The example already implemented can be adapted for other wrapper classes as well. Complete the method to analyze String, Character, and Double. Examples: whatAmI(1) -> "Integer" 1 public String whatAmI(E e) { 3 //.getClass() returns the runtime class of an object //.equals() determines whether two objects are equivalent //by calling a new static instance of a wrapper object we can analyze //it's class type and compare it to the variable passed in if(e.getClass().equals(new Integer(1).getClass()) { return "Integer"; }else{ return "Who knows!"; Given a word, use a stack to reverse the word and return a new string with the original word in reverse order. You cannot use the reverse string methods in the String class. Examples: reverseword("hello") -> "olleh" reverseword("hallo") -> "ollah" i public String reverseWord(String word) Stack character> stack = new Stack ;
Answer:
Java Code given below with appropriate comments for better understanding
Explanation:
1.
public String whatAmI(E e) {
//.getClass() returns the runtime class of an object
//.equals() determines whether two objects are equivalent
//by calling a new static instance of a wrapper object we can analyze
//it's class type and compare it to the variable passed in
if(e.getClass().equals(new Integer(1).getClass())) {
return "Integer";
}
else if(e.getClass().equals(new String("1").getClass())) {
return "String";
}
else if(e.getClass().equals(new Double(1.0).getClass())) {
return "Double";
}
else {
return "Who knows!";
}
}
2.
public String reverseWord(String word) {
Stack<Character> stack = new Stack<Character>();
for (int i = 0; i < word.length(); i++) {
stack.push(word.charAt(i));
}
String result = "";
while (!stack.isEmpty()) {
result += stack.pop();
}
return result;
}
Write a Python program that requests the price and weight of an item in pounds and ounces, and then determines the price per ounce from the below inputEnter price of item: 25.50Enter weight of item inpounds and ounces separately.Enter pounds: 1Enter ounces: 9Price per ounce: $1.02
Answer:
The program to this question as follows:
Program:
price=float(input('Enter total price: ')) #define variable price and take user-input
print('Enter value of weight separately into pounds and onces: ') #print message
pounds=int(input('Input pounds value: ')) # defining variable pounds and take user-input
ounces=int(input('Input ounces value: ')) # defining variable ounces and take user-input
total_ounces=pounds*16+ounces # defining variable total_ounces and calculate variable
total=price/total_ounces # defining variable total and calculate price/ounces
print('price/ounces is: ',total) #print value
Output:
Enter total price: 25.50
Enter value of weight separately into pounds and onces:
Input pounds value: 1
Input ounces value: 9
price/ounces is: 1.02
Explanation:
In the above python program code, a variable "price" is defined, that is takes price value from user, to take this value the "input and float" is used, in which the "float" convert value into decimal and input function is used for user- input.
In the next line, the print function is declared, which is used for print message and variable values, in this function, we print a message that takes two values separately. Then two-variable "pounds and ounces" are defined that take integer value separately.In the last step, the total_ounces variable is defined, which calculates total ounces and the total variable will use to calculate the price per ounces. The print function is used to print this variable value.
a. Use the Euclidean algorithm to compute the GCDs of the following pairs of integers State how many iterations each one takes to compute, and the value of the potential s at each stage. Verify that indeed si+1≤2/3si. i. (77,143) ii. (90, 504) ii. (376, 475) iv. (987, 1597)b. Try to find pairs of inputs (x, y such that the number of iterations of Euclid(x, y) is "large", that is, as close as possible to the upper bound of loga3/2(x+y) that we derived in lecture. Can you come up with a hypothesis about what kinds of inputs yield the worst-case running time?
Answer:
Explanation:
(a). given GCD (77,143)
143 = 77.1 + 66
77 = 66.1 + 11
66 = 11.6 + 0
∴ the gcd (77,143) = 11
the number of iterations = 3
(ii). GCD(90,504)
504 = 90.5 + 54
90 = 54.1 + 36
54 = 36.1 + 18
36 = 18.2 + 0
∴ the gcd(90,504) = 18
the number of iterations = 4
(iii). GCD(376,475)
475 = 376.1 + 99
376 = 99.3 + 79
99 = 79.1 + 20
79 = 20.3 + 19
20 = 19.1 + 1
19 = 1.19 + 0
∴ the gcd(376,475) = 1
the number of iterations = 6
(iv). GCD(987,1597)
1597 = 987.1 + 610
987 = 610.1 + 377
610 = 377.1 +233
377 = 233.1 +144
233 = 144.1 + 89
144 = 89.1 + 55
89 = 55.1 + 34
55 = 34.1 + 21
34 = 21.1 + 13
21 = 13.1 = 8
13 = 8.1 9+ 5
8 = 5.1 + 3
5 = 3.1 + 2
3 = 2.1 + 1
2 = 1.2 + 0
∴ the gcd(987,1597) = 1
the number of iterations = 15
(b). the pairs of inputs for which the number of iterations is large is given thus;
1. gcd(8,5)
8 = 5.1 + 3
5 = 3.1 + 2
3 = 2.1 + 1
2 = 1.2 + 0
the number of iterations from this is 4
2. also gcd(8,13)
13 = 8.1 + 5
8 = 5.1 + 3
5 = 3.1 + 2
3 = 2.1 + 1
2 =1.2 + 0
the number of iteration from this is 5
→ from the examples given, the worst case scenario occurs when the inputs are conservative Fibonacci numbers.
cheers, i hope this helps.
what is the clorox logo font?
Answer:
The answer is "bump".
Explanation:
In the logo Clorox, it is the company brand name, which provides the cleaning products. In this logo design the "bump" font is used which can be described as follows:
The bump is a definition of a level surface with a physical difference. It is also known as a font that is freely available on the internet. This font is available for individual use, and it also contains characters in the European language.What Linux services can pose a problem when attempting to reach remote host on a network?
Answer:
NFS configuration
Explanation:
The Linux server runs the Linus open source operating system that provides a stable, secure and more flexible environment to carry out more challenging jobs like network and system administration, database management and web hosting.
The NFS or Network file system configured on the Linux server only supports Linux servers communication. It mounts the storage of the server on the network for central access.
Answer:
NFS Configuration
Explanation:
The Network File System (NFS) is a way of mounting Linux discs/directories over a network. An NFS server can export one or more directories that can then be mounted on a remote Linux machine. Note, that if you need to mount a Linux filesystem on a Windows machine, you need to use Samba/CIFS instead.
The NFS enables a UNIX workstation to mount an exported share from the server into its own filesystem, thus giving the user and the client the appearance that the sub filesystem belongs to the client; it provides a seamless network mount point.
Complete the program by writing and calling a function that converts a temperature from Celsius into Fahrenheit. Use the formula F = C x 9/5 + 32. Test your program knowing that 50 Celsius is 122 Fahrenheit.
Final answer:
To convert a temperature from Celsius to Fahrenheit, you can use the formula: F = C x 9/5 + 32. For example, 50 degrees Celsius is equal to 122 degrees Fahrenheit.
Explanation:
To convert a temperature from Celsius to Fahrenheit, you can use the formula: F = C x 9/5 + 32. Let's say we want to convert 50 degrees Celsius to Fahrenheit. We can plug in C=50 into the formula: F = 50 x 9/5 + 32. Simplifying the equation, we get: F = 90 + 32 = 122. Therefore, 50 degrees Celsius is equal to 122 degrees Fahrenheit.
To convert Celsius to Fahrenheit, the formula F = C x 9/5 + 32 is used. By implementing this formula in a function and passing the Celsius temperature as an argument, the program accurately converts temperatures. For instance, when passing 50 Celsius into the function, it correctly returns 122 Fahrenheit. This confirms the functionality and accuracy of the conversion formula in the program.
Explanation:The program involves the creation of a function to convert temperatures from Celsius to Fahrenheit using the formula F = C x 9/5 + 32. This formula signifies that to obtain the Fahrenheit equivalent of a Celsius temperature, one needs to multiply the Celsius temperature by 9/5 and add 32 to the result. This mathematical operation accurately represents the conversion from one scale to another.
Implementing this formula within a function allows for efficient and reusable code. When the program is tested with a known conversion, such as 50 Celsius being equivalent to 122 Fahrenheit, the function successfully returns the expected Fahrenheit value. This successful conversion demonstrates the correctness of the implemented formula within the function.
By encapsulating the conversion logic within a function, it promotes modularity and ease of use. This way, the program becomes scalable and adaptable for converting temperatures from Celsius to Fahrenheit by merely passing the Celsius value as an argument to the function.
In conclusion, the program's function for converting Celsius to Fahrenheit works accurately by utilizing the, ensuring reliable temperature conversions with ease.
Given the following function definition:
What is the output of the following code fragment that invokes calc?
1 2 3 1 6 3 3 6 3 1 14 9
None of these
The question is incomplete! Complete question along with its step by step answer is provided below!
Question:
Given the following function definition:
void calc (int a, int& b)
{
int c;
c = a + 2;
a = a * 3;
b = c + a;
}
x = 1;
y = 2;
z = 3;
calc(x, y);
cout << x << " " << y << " " << z << endl;
What is the output of the following code fragment that invokes calc?
a. 1 2 3
b. 1 6 3
c. 3 6 3
d. 1 14 9
e. None of these
Answer:
b. 1 6 3
Explanation:
In the given problem we have a function void calc which takes two input arguments a and b and updates its values according to following equations
c = a + 2;
a = a * 3;
b = c + a;
Then we call this function calc(x,y) by providing test values of
int x = 1;
int y = 2;
int z = 3;
and the output returns the values of x, y and z
cout << x << " " << y << " " << z << endl;
Lets find out what is happening here!
When the program runs we provide x=a=1 and y=b=2
c=a+2=1+2=3
a=a*3=1*3=3
b=c+a=3+3=6
So the updated values of a=x=3 and b=y=6?
NO!
The updated values are a=x=1 and b=y=6
WHY?
There are two ways to pass values
1. Pass by values -> value cannot change (int a)
2. Pass by reference -> value can change (int& b)
Look at the function void calc (int a, int& b) ;
Here we are passing (int a) as a value and (int& b) as a reference, therefore x remains same x=1 and y gets changed to updated value y=6 and z remains same as z=3 since it wasnt used by function calc(x,y)
The right answer is:
b. 1 6 3
x=1, y=6, z=3
You are contacted by a project organizer for a university computer science fair. The project organizer asks you to hold a forum that discusses the origins of the Linux operating system, including how it has evolved and continued to develop. The main focus of this forum is to encourage university students toward participating in the open source community; therefore, it should detail the philosophy, major features, and methods of the hacker culture. Prepare a bulleted list of the major topics that you will discuss, and write down some sample questions that you anticipate from the participants as well as your responses. reddit
Final answer:
Linux changed the economics of high tech by providing a free and easily configurable operating system. It replaced expensive proprietary systems and broke Microsoft's monopoly. The hacker culture contributed to the development of Linux through active participation and a collaborative approach.
Explanation:
Major Topics:
Origins of the Linux operating system
Evolution and development of Linux
Philosophy of the open source community
Major features of Linux
Hacker culture and methods
Sample Questions:
How did Linux change the economics of high tech?
What are some major features of Linux?
How has the hacker culture contributed to the development of Linux?
Responses:
How did Linux change the economics of high tech? Linux revolutionized the high tech industry by providing a free and easily configurable operating system. This led to a reduction in the cost of systems by PC manufacturers like IBM and Dell, breaking Microsoft's monopoly. Linux also replaced expensive proprietary systems, such as IRIX and Microsoft NT, in organizations like NASA.
What are some major features of Linux? Some major features of Linux include its free distribution, easy configurability, and the ability to customize the kernel with desired features. It is also known for its stability, security, and support for a wide range of hardware architectures. Linux is highly scalable and can be used in various environments, from embedded systems to supercomputers.
How has the hacker culture contributed to the development of Linux? The hacker culture played a crucial role in the development of Linux. Hackers embraced Linux due to its open-source nature and actively contributed to its improvement. Their collaborative and innovative approach allowed Linux to evolve rapidly and gain popularity. The hacker culture emphasized freedom, sharing, and tinkering, which aligned with the open-source philosophy of the Linux community.
Final answer:
The forum will cover the origins and philosophy of Linux, its development, and its impact on the technology sector, encouraging university students to participate in the open source community. Topics will include the history of Linux, the role of the FSF, key features of Linux, diverse distributions, and its economic impact. Problems with open-source software and educational packages will also be discussed.
Explanation:
Introduction to Linux and Open Source
Origins of Linux by Linus Torvalds in the early 1990s, as an alternative to UNIX.
The philosophy of open source and its impact on software development and hacker culture.
Evolution of Linux and its widespread adoption in various domains, including servers and supercomputers.
Contribution of the Free Software Foundation (FSF) and Richard Stallman to the open source movement.
Key features of Linux that fostered its popularity: configurability, stability, and performance.
The variety of Linux distributions such as Ubuntu and Red Hat, and their individual characteristics.
Effects of Linux on the economics of the technology sector and competition with proprietary software.
Community-driven development and contribution: how individuals can participate.
Anticipated Questions and Responses
How did the development of open source operating systems like Linux change the tech industry's economics?
Linux disrupted the proprietary market by providing a free, customizable, and reliable alternative to costly UNIX systems. Companies like IBM and Dell integrated Linux to reduce their products' costs and offer choice to consumers.
It changed the competitive landscape, leading to the decline of proprietary workstations and a rise in the use of cost-effective, Linux-powered servers and supercomputers.
What are some problems associated with open-source software?
While open-source software promotes community collaboration and development, it can face issues like fragmented support, varying quality of contributions, and security concerns due to exposed code. Additionally, open-source projects rely heavily on community engagement, which can fluctuate, affecting the continuity and maintenance of the software.
Can you recommend some educational open-source software packages?
Yes, there are many educational open-source software packages available. Examples include Moodle for learning management, R for statistical computing, and SciPy for scientific and technical computing. These tools are freely available and can be modified to suit specific educational needs.
Widespread sharing or piracy of MP3s online influenced the music industry to develop a secure digital music initiative.(T/F)
Answer:
True
Explanation:
In the past, the music industries had distributed the finish music products from it's industries to the the music market globally, through evolving mediums from tapes to CDs and DVDs.
The rise of the digital era and affordable microcomputers and the web, created a platform for digital literacy, with individuals able to digitize files. This constituted the rise of digital music privacy. A group of people steals and shares digital music to other people.
To avoid diminishing market return caused by piracy, the music industry made a policy to make buy of music easier than stealing, made their music digitally available for purchase online and collaborated with digital application music players and constantly expose the activities of music pirate.
Because assembly language is so close in nature to machine language, it is referred to as a ____________.
Answer:
low-level language.
Explanation:
Answer:
The correct answer is: low-level language.
Explanation:
A low-level language is a computer language with very few abstractions. Usually is the type of language used at the assembly level. Low-level language instructions apply over direct control in the computer's hardware and are subject to the physical structure to the computers that support them.
Intellectual property piracy has gotten a small boost from the increasing availability of counterfeit goods through Internet channels, such as P2P file-sharing sites and mail order or auction sites.
(A) True
(B) False
Answer:
The answer is "Option B".
Explanation:
Intellectual property is protected by law in which property, copyright, and trademarks, are uses, that enable you to gain individuals' popularity or personally benefit according to what they create.
It is a program that helps to create an environment, in which imagination and technology are used.It will change the growth by striking a balance between innovator rights and wider public interest.You just finished upgrading a video card in a PC. When you reboot the system, nothing displays on the screen.
What is the cause of this crash?
Answer:
The main reason behind the crush is that either the graphic is not in the pc or graphic is not supporting.
Explanation:
The main reason behind the crush is that either the graphic is not in the pc or graphic is not supporting.
Graphic card is help for graphics on the computer. It renders an image to monitor.
crash of graphic cards can be due to any reason. some of them are as follow
-overheating of the PC
-By reboot process
An advertising company wishes to plan an advertising campaign in three different media: television, radio, and magazines. The purpose of the advertising program is to reach as many potential customers as possible. The results of a market study are given:
Answer:
It all depends on the demand for the product and address the area of coverage.
Explanation:
First, of all, there should be demand for the product and which area segment will be covered and the advertising company has to do a proper system before starting advertisement through media television and radio and magazines.
Mostly advertisement companies prefer to advertise on television were watching or view of television is more compare to reading a magazine or listening to the radio.
Advertise company has to select the which media will be useful to promote the product of a company
"There are 1.6093 kilometers in a mile. Create a variable to store a number of miles. Convert this to kilometers, and store in another variable."
MATLAB CODE:
%%%%
clc
dist_mile=input('enter the distance in miles') %%%dist_mile stores given distance in miles
dist_km=dist_mile*1.6093 %%coversion of dist_mile into km and storing in dist_km
%%%%
OOUTPUT:
enter the distance in miles
2
dist_km
3.2186
What type of tool might a systems analyst use to identify a relationship between two variables? What tool is useful foridentifying and prioritizing causes of problems?
Answer:
XY chart is used to identify relationship between two variables. A Pareto chart is used to prioritize the cause of problems.
Explanation:
A Pareto chart is a diagram of bars and line graph, uses the descending bars to represent the individual items or factors, while the lines represents the cumulative total of the individual items. It is used to point out the most important item on the graph and sometimes, the most common cause of a problem.
The XY chart is a graph that shows the relationship of two items using scattered plot graph. This scattered plot uses thick dots to mark the intersection line between items.
Implement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the integers within this file, close the file, and then return the sum. If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.
Answer:
The C++ code is given below with appropriate comments for better understanding
Explanation:
/*C++ program that prompts user to enter the name of input file(input.txt in this example) and print the sum of the values in the file to console. If file dosnot exist, then close the program */
//header files
#include <fstream>
#include<string>
#include <iostream>
#include <cstdlib> //needed for exit function
using namespace std;
//function prototype
int fileSum(string filename);
int main()
{
string filename;
cout << "Enter the name of the input file: ";
cin >> filename;
cout << "Sum: " << fileSum(filename) << endl;
system("pause");
return 0;
}
/*The function fileSum that takes the string filename and
count the sum of the values and returns the sum of the values*/
int fileSum(string filename)
{
//Create a ifstream object
ifstream fin;
//Open a file
fin.open(filename);
//Initialize sum to zero
int sum=0;
//Check if file exist
if(!fin)
{
cout<<"File does not exist ."<<endl;
system("pause");
exit(1);
}
else
{
int value;
//read file until end of file exist
while(fin>>value)
{
sum+=value;
}
}
return sum;
}//end of the fileSum
Write a program that will read the weight of a package of breakfast cereal in ounces and output the weight in metric tons as well as the number of boxes needed to yield one metric ton of cereal. In: A metric ton is 35,273.92 ounces.
Answer:
The C++ code is given below
Explanation:
#include <iostream>
using namespace std;
int main () {
int flag=1;
do{
double ounce,metric,boxes;
cout<<"Enter weight of package in ounces: ";
cin>>ounce;
metric=ounce/35273.92;
cout<<"Metric ton is "<<metric<<endl;
boxes=35273.92/ounce;
cout<<"Number of boxes are: "<<boxes<<endl;
cout<<"Press 0 to quit else press 1: ";
cin>>flag;
}while(flag==1);
return 0;
}
When writing functions that accept multi-dimensional arrays as arguments, ________ must be explicitly stated in the parameter list.
Answer:
size of all dimensions but the first.
Explanation:
This is because of a certain thing known as addressing. Compiler, in order to access any data, needs to know its address in memory.
If we don't pass in the value for any dimension after the first, compiler can't calculate the address of given array location we may want to access inside a function.
E.g.
void Foo(int bar[][3]) {
bar[1][2];
}
In the above example, the compiler needs to know the no. of columns in "bar" array to figure out the address of bar[1][2] and access the data underneath.
Because, in order to go to 2nd row in the array, compiler needs to know how much memory allocation (columns) is in a row.
Write the document type declaration markup statement for an HTML5 file. Be sure to include the appropriate opening and closing brackets < >.
Answer:
<!DOCTYPE html>
Explanation:
<!DOCTYPE html> is used in the HTML5. It is the document type declaration markup statement for an HTML5 file.
The document type declaration that markup statement for an HTML5 file is as follows:
<!DOCTYPE html>What is a document declaration?Document declaration may be defined as an instruction that significantly associates a particular XML or SGML document with a document type definition. In the serialized form of the document, it manifests as a short or small form of a string of markup that conforms to a particular syntax.
The given document type declaration is used in HTML5. It is the document type declaration that significant markup a statement for an HTML5 file. The DOCTYPE declaration is an instruction to the web browser about what version of HTML the page is written in.
This ensures that the web page is parsed the same way by different web browsers. In HTML 4.01, the DOCTYPE declaration refers to a document type definition (DTD).
Therefore, <!DOCTYPE html> is the document type declaration that markup a statement for an HTML5 file.
To learn more about Document type declaration, refer to the link:
https://brainly.com/question/14105649
#SPJ2
What is the security vulnerability in the following code snippet? Value of my Textfield is
Answer:
The answer is "Cross-Site Scripting"
Explanation:
In the given question some information is missing, that is an option, that can be defined as follows:
A. SOQL Injection
B. Arbitrary Redirects
C. Cross-Site Scripting
D. Access Control
Cross-site scripting also called XSS. It is a web security weakness, that enables an attacker to jeopardize user experiences with a compromised application, and the other choices, which will be a list but not correctly described as follows:
In option A, It is used in input/output service, that's why it is not correct.In option B, It is a process, in which a user can control the program, that's why it is wrong.In option D, It is used to provide the accessibility, that's why it is not correct.