Answer:
confidentiality
Explanation:
Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of
This type of security concept is an example of confidentiality. Thus, option B is correct.
What is security?Security is the capacity to withstand possible damage from other individuals by placing restrictions on their right to act freely. The term security is the absence of threat or a sense of safety.
Any uncovered danger or weakness in any technology that could be exploited by criminals to compromise equipment or knowledge is a security threat.
It has to do with Alice’s ability to decide on their own how if, and why people exploit individual data if it is being sent to bob. To ensure human rights, welfare, and consciousness, solitude must be protected. People are able to independently create their own personalities.
Therefore, option B is the correct option.
Learn more about security, here:
https://brainly.com/question/15278726
#SPJ2
The question is incomplete, the complete question is:
a. message integrity
b. confidentiality
c. availability
d. non-repudiation
e. authentication
You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.
Following are the steps of the polynomial-time algorithm:
Split the routes according to their categorizationAssuming that mid = di of the middle road, low = road with the least di, and high = road with the highest di, we may do a binary search on the sorted list.All shops must be approachable only using these roads for every road, from low to mid.Check if all shops can be reached from[tex]\bold{ low \ to\ mid+1}[/tex] using only these roads.There is a solution if every shop can be reached by road only up to [tex]\bold{mid+1}[/tex], but not up to mid.You can [tex]\bold{set \ low = mid+1}[/tex] if all businesses aren't accessible using both [tex]\bold{mid\ and\ mid+1}[/tex] roads.If every shop could be reached using both mid and mid+1, then set high to mid-1.With these layouts of businesses and roads, no response can be given because [tex]\bold{ low > high}[/tex]You can do this by [tex]\bold{set\ mid = \frac{(low + high)}{2}}[/tex]The new low, mid, and high numbers are used in step (a).In a minimum amount of time, this algorithm will determine the best strategy to supply all shops.
Learn more:
polynomial-time algorithm: brainly.com/question/20261998
Dr. Watson has been kidnaped! Sherlock Holmes was contacted by the kidnapper for ransom. Moments later he received a message from Dr. Watson's phone. The message contained three random strings. Sherlock being Sherlock, was able to deduce immediately that Dr. Watson was trying to give a hint about his location. He figured out that the longest common subsequence between the 3 words is the location. But since it was too easy for him, he got bored and asked you to find out what the actual location is. Your task is to find the longest common subsequence from the 3 given strings before it is too late. A subsequence is a sequence that can be derived from another sequence by deleting some or no elements without changing the order of the remaining elements. For instance, given a sequence "drew"; "d", "w", "de", "drw", "drew" are all examples of valid subsequences (there are also others), while "er", "wdre" are not. Design a dynamic programming algorithm which takes three input sequences X, Y, and Z, of lengths m, n, and p, respectively, and returns their longest common subsequence. For full marks your algorithm should run in (mnp) time. Note that W is a common subsequence of X, Y, and Z if and only if W is a subsequence of X, W is a subsequence of Y, and W is a subsequence of Z.
Required:
Describe the set of subproblems that your dynamic programming algorithm will consider.
Answer:
please mark me brainlist
Explanation:
This algorithm works for n number of strings in python3
Input:
83217
8213897
683147
Output:
837
from itertools import product
import pdb
import numpy as np
def neigh(index):
N = len(index)
for ri in product((0, -1), repeat=N):
if not all(i == 0 for i in ri):
yield tuple(i + i_rel for i, i_rel in zip(index, ri))
def longestCommonSubSequenceOfN(sqs):
numberOfSequences = len(sqs); # to know number of sequences
lengths = np.array([len(sequence) for sequence in sqs]); # to know length of each sequences placed in # array
incrLengths = lengths + 1; # here we are taking no .of sequences +1
lengths = tuple(lengths); # making lengths into tuple to make it mutable
inverseDistances = np.zeros(incrLengths);
ranges = [tuple(range(1, length+1)) for length in lengths[::-1]]; # finding ranges from 1 to each lengths
for tupleIndex in product(*ranges):
tupleIndex = tupleIndex[::-1];
neighborIndexes = list(neigh(tupleIndex)); # finding neighbours for each tupled index value and # store them in list
operationsWithMisMatch = np.array([]); # creating array which are miss matched
for neighborIndex in neighborIndexes:
operationsWithMisMatch = np.append(operationsWithMisMatch, inverseDistances[neighborIndex]);
#appending newly created array with operations miss match and inverseDistances
operationsWithMatch = np.copy(operationsWithMisMatch);
# copying newly generated missmatch indexs
operationsWithMatch[-1] = operationsWithMatch[-1] + 1;
# incrementing last indexed value
chars = [sqs[i][neighborIndexes[-1][i]] for i in range(numberOfSequences)];
# finding a string(chars) with neighbour indexes and checking with other sequences
if(all(elem == chars[0] for elem in chars)):
inverseDistances[tupleIndex] = max(operationsWithMatch);
else:
inverseDistances[tupleIndex] = max(operationsWithMisMatch);
subString = ""; # resulted string
mainTupleIndex = lengths; # copying lengths list to mainTupleIndex
while(all(ind > 0 for ind in mainTupleIndex)):
neighborsIndexes = list(neigh(mainTupleIndex));
#generating neighbour indexes with main tuple index in form of list
anyOperation = False;
for tupleIndex in neighborsIndexes:
current = inverseDistances[mainTupleIndex];
if(current == inverseDistances[tupleIndex]): # comparing indexes in main tuple index and inverse #distance tuple index
mainTupleIndex = tupleIndex;
anyOperation = True;
break;
if(not anyOperation): # if anyoperation is False then we are generating sunString
subString += str(sqs[0][mainTupleIndex[0] - 1]);
mainTupleIndex = neighborsIndexes[-1];
return subString[::-1]; # reversing resulted string
sequences = ["83217", "8213897", "683147"]
print(longestCommonSubSequenceOfN(sequences)); #837
explain computer coding in an understandable manner
Answer:
Coding is simply how we communicate with computers. Code tells a computer what actions to take, and writing code is like creating a set of instructions
Explanation:
Computer coding empowers kids to not only consume digital media and technology, but to create it. Instead of simply playing videogame or envision what their own website, or app might look like and they'll have the outlet for the expression
Develop a program that will maintain an ordered linked list of positive whole numbers. Your program will provide for the following options: a. Add a number b. Delete a number c. Search for a number d. Display the whole list of numbers At all times, the program will keep the list ordered (the smallest number first and the largest number last).
Answer:
#include <iostream>
using namespace std;
struct entry
{
int number;
entry* next;
};
void orderedInsert(entry** head_ref,entry* new_node);
void init_node(entry *head,int n)
{
head->number = n;
head->next =NULL;
}
void insert(struct entry **head, int n)
{
entry *nNode = new entry;
nNode->number = n;
nNode->next = *head;
*head = nNode;
}
entry *searchNode(entry *head, int n)
{
entry *curr = head;
while(curr)
{
if(curr->number == n)
return curr;
curr = curr->next;
}
}
bool delNode(entry **head, entry *ptrDel)
{
entry *curr = *head;
if(ptrDel == *head)
{
*head = curr->next;
delete ptrDel;
return true;
}
while(curr)
{
if(curr->next == ptrDel)
{
curr->next = ptrDel->next;
delete ptrDel;
return true;
}
curr = curr->next;
}
return false;
}
void display(struct entry *head)
{
entry *list = head;
while(list!=NULL)
{
cout << list->number << " ";
list = list->next;
}
cout << endl;
cout << endl;
}
//Define the function to sort the list.
void insertionSort(struct entry **h_ref)
{
// Initialize the list
struct entry *ordered = NULL;
// Insert node to sorted list.
struct entry *current = *h_ref;
while (current != NULL)
{
struct entry *next = current->next;
// insert current in the ordered list
orderedInsert(&ordered, current);
// Update current
current = next;
}
// Update the list.
*h_ref = ordered;
}
//Define the function to insert and traverse the ordered list
void orderedInsert(struct entry** h_ref, struct entry* n_node)
{
struct entry* current;
/* Check for the head end */
if (*h_ref == NULL || (*h_ref)->number >= n_node->number)
{
n_node->next = *h_ref;
*h_ref = n_node;
}
else
{
//search the node before insertion
current = *h_ref;
while (current->next!=NULL &&
current->next->number < n_node->number)
{
current = current->next;
}
//Adjust the next node.
n_node->next = current->next;
current->next = n_node;
}
}
int main()
{
//Define the structure and variables.
char ch;int i=0;
entry *newHead;
entry *head = new entry;
entry *ptr;
entry *ptrDelete;
//Use do while loop to countinue in program.
do
{
//Define the variables
int n;
int s;
int item;
char choice;
//Accept the user choice
cout<<"Enter your choice:"<<endl;
cout<<"a. Add a number"<<endl
<<"b. Delete a number"<<endl
<<"c. Search for a number"<<endl
<<"d. Display the whole list of numbers"<<endl;
cin>>choice;
//Check the choice.
switch(choice)
{
//Insert an item in the list.
case 'a' :
// cin>>item;
cout<<"Enter the element:"<<endl;
cin>>item;
//To insert the first element
if(i==0)
init_node(head,item);
//To insert remaining element.
else
{
ptr = searchNode(head,item);
//Check for Duplicate data item.
if(ptr==NULL)
{
insert(&head,item);
}
else
{
cout<<"Duplicate data items not allowed";
cout<<endl<<"EnterAgain"<<endl;
cin>>item;
insert(&head,item);
}
}
insertionSort(&head);
i=i+1;
break;
//Delete the item from the list
case 'b' :
int numDel;
cout<<"Enter the number to be deleted :"<<endl;
cin>>numDel;
//Locate the node.
ptrDelete = searchNode(head,numDel);
if(ptrDelete==NULL)
cout<<"Element not found";
else
{
if(delNode(&head,ptrDelete))
cout << "Node "<< numDel << " deleted!\n";
}
break;
//Serach the item in the list.
case 'c' :
cout<<"Enter the element to be searched :";
cout<<endl;
cin>>s;
ptr = searchNode(head,s);
if(ptr==NULL)
cout<<"Element not found";
else
cout<<"Element found";
break;
//Display the list.
case 'd' :
display(head);
break;
default :
cout << "Invalid choice" << endl;
break;
}
//Ask user to run the program again
cout<<endl<<"Enter y to countinue: ";
cin>>ch;
}while(ch=='y'||ch=='Y');
return 0;
}
output:
Discuss the OSI Layer protocols application in Mobile Computing
Answer:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.
Consider a DataFrame named df with columns named P2010, P2011, P2012, P2013, 2014 and P2015 containing float values. We want to use the apply method to get a new DataFrame named result_df with a new column AVG. The AVG column should average the float values across P2010 to P2015. The apply method should also remove the 6 original columns (P2010 to P2015). For that, what should be the value of x and y in the given code?
Answer:
x = 1
y = 1
Explanation:
The apply method has the axis argument which enables it to use the applied function either across the rows or columns, by passing the value 1 to the axis argument, the mean of at each index is calculated, (across the column) such that the length of the AVG column is equal to the lengtb of the original dataframe.
The drop method is used in pandas to remove row or column entry from a dataframe. To remove columns from a data table, the value 1 is passed to the axis argument of the drop method. Hence, passing 1 to the axis argument removes all 6 columns leaving only the AVG column in result_df.
How does Accenture view automation?
Answer:
The description of the given question is summarized below.
Explanation:
These organizations retrained, retooled, and empowered our employees amongst all organization's internal management operating areas throughout order to create an increased automation attitude.Accenture's Innovative Software department was indeed adopting a concept called Human Plus technology, which includes this type of training.Where does change management play a major role in transforming a client
business into a data-driven, intelligent enterprise?
To manage a modern IT environment characterized by hybrid complexity and exponential data growth — and to make that same IT a driver of growth and innovation for the business — you need to build intelligence into every layer of your infrastructure.
Change management plays a major role in transforming a client business into a data-driven, intelligent enterprise in: data culture and literacy.
Data culture and literacy refer to all the processes involved in analyzing and understanding data within the framework of an organization.
The employees within such organizations are trained to read and understand data. It becomes a part of the organization's culture.
So data culture and literacy should be used when trying to transform a client business into a data-driven, intelligent enterprise.
Learn more about data culture here:
https://brainly.com/question/21810261
Components of micro computer with diagram
Answer:
CPU, Program memory, Data memory, Output ports, Input ports and Clock generator.
Explanation:
There are six basic components of a microcomputer which includes CPU, Program memory, Data memory, Output ports, Input ports and Clock generator. CPU is the central processing unit which is considered as the brain of the computer. It is the part of a computer that executes instructions. Data memory is the place where data is stored that is present in the CPU.
How can an IS managers keep up with the endless demand for more software to support new information systems
An IS manager can keep up with the endless demand for more software to support new information systems by thinking outside the box.
To think outside the box, the IS manager should try the following strategies:
Use predetermined application components that are operating on low-code or no-code platforms.Use better software-testing practices and tools that spread programming into small sprints.Engage in shift-left testing, which enables software-testing to be done at every phase of the development process.Involve product managers and business users at the beginning of software development, making them to drive innovation that satisfies their requirements.Finally, the IS manager can utilize AI and Machine Learning to speed up the development of required software, thereby enhancing its qualities and capabilities with reduced time and costs.Thus, the IS manager must realize that there are always solutions to every software problem outside the mainstream box.
Learn more about information systems here: https://brainly.com/question/1521627
Which are the best networking projects for a final year student in college
Answer:
The best networking project for a final year are Security issues with mobile IP.IP based patients monitoring systems.will social media lose its relevance?
Judging from it's prevalence and popularity, there will be a long way to go until people start to lose interest with expressing themselves online. So no, social media will not lose its relevance, but maybe when technology is dead, then it will.
In database a record is also called a
Explanation:
hope it helps you
pls mark this ans brainlist ans
A _______ read inputs the first data item from a file. It typically appears immediately before the loop that processes the data from the file and inputs the remaining data from the file.
Answer:
the answer is priming read
Explanation:
hope it helps u
Write a pseudocode For loop that displays all the numbers from 0 to 5, one at a time. We have the following pseudocode so far. Declare Integer number Write this statement Display number End For Type the exact text for the line of pseudocode that should replace Write this statement shown above.
Answer:
The statement is:
For number = 0 to 5
Explanation:
Given
The incomplete pseudocode
Required
The loop statement to complete the pseudocode
To loop from 0 to 5, we make use of:
For number = 0 to 5
Where:
number is the integer variable declared on line 1
So, the complete pseudocode is:
Declare Integer number
For number = 0 to 5
Display number
End For
This method adds newValue to the list at the specified index. If the index is invalid for the list, throw an IndexOutOfBoundsException. Note that the last valid index is the size of the list; this would mean adding to the back of the list. Call any existing methods of LinkedList and LLNode as needed.
Answer:
i dont know
Explanation:
Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses to the int * parameters. Prompt the user for a character. Get their response as a single character and return that from the function. In main Define three variables and call your function. Print values of your variables
Answer and Explanation:
In C programming language:
char fun(int*a, int*b){
printf("enter two integers: ");
scanf("%d%d",a,b);
int e;
printf("please enter a character: ");
e=getchar();
return e;
}
int main(int argc, char *argv[]) {
int d;
int f;
int g;
fun();
printf("%d%d%d", d, f, g);
}
We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.
Give one example of where augmented reality is used
Answer
Medical Training
From operating MRI equipment to performing complex surgeries, AR tech holds the potential to boost the depth and effectiveness of medical training in many areas. Students at the Cleveland Clinic at Case Western Reserve University, for example, will now learn anatomy utilizing an AR headset allowing them to delve into the human body in an interactive 3D format.
it is also use in retail ,. Repair & Maintenance,Design & Modeling,Business Logistics etc
A sinewave has a period (duration of one cycle) of 645 μs. What is the corresponding frequency of this sinewave, in kHz, expressed to 3 significant figures?
please help me figure this out I am so confused
The corresponding frequency of this sinewave, in kHz, expressed to 3 significant figures is: 155 kHz.
Given the following data:
Period = 645 μsNote: μs represents microseconds.
Conversion:
1 μs = [tex]1[/tex] × [tex]10^{-6}[/tex] seconds
645 μs = [tex]645[/tex] × [tex]10^{-6}[/tex] seconds
To find corresponding frequency of this sinewave, in kHz;
Mathematically, the frequency of a waveform is calculated by using the formula;
[tex]Frequency = \frac{1}{Period}[/tex]
Substituting the value into the formula, we have;
[tex]Frequency = \frac{1}{645\; * \;10^{-6}}[/tex]
Frequency = 1550.39 Hz
Next, we would convert the value of frequency in hertz (Hz) to Kilohertz (kHz);
Conversion:
1 hertz = 0.001 kilohertz
1550.3876 hertz = X kilohertz
Cross-multiplying, we have;
X = [tex]0.001[/tex] × [tex]1550.39[/tex]
X = 155039 kHz
To 3 significant figures;
Frequency = 155 kHz
Find more information: https://brainly.com/question/23460034
What is one advantage and disadvantage of designing a support security that might be based on a centralized model, where all sensitive information is stored in one secure place, or a distributed model, where information is spread around in many different places?
During the testing phase of an ERP system, the system implementation assurers should review: Group of answer choices Program change requests Vendor contracts Error reports Configuration design specifications
Answer:
Error reports
Explanation:
ERP is a multimodal software system that integrates all business processes and the function's of the entire organizations into single software system using a one database.WHICH PROGRAMMING LANGUAGES ARE THE BEST AND COMPATIBLE FOR 3D PRINTERS?
Answer:
G-code and C++ can be used
In order to print multiple worksheets, what needs to happen before printing?
Answer:
Explanation:
Click the File tab.
Click Print, or press the control p keyboard command.
On the Print screen, select the printer and other settings.
Click Print.
What is the importance of planning a web page before starting to create it?
The importance of planning a web page according to the question is provided below.
A well-designed company's website may contribute to making even your potential consumers a favorable immediate impression.
This might also assist people to cultivate guidelines and make additional transformations. Further significantly, it brings pleasant client interaction as well as allows customers to your website unrestricted access as well as browse easily.
Learn more about the web page here:
https://brainly.com/question/9060926
explain the working principle of computer? can anyone tell
Answer:
input process and output hehe
Clarissa needs to modify a runtime environment variable that will be set for all users on the system for both new logins as well as new instances of the BASH shell being launched. Which of the following files should she modify?
a. /root/.profile
b. /etc/profile
c. /root/.bashrc
d. /etc/bashrc
Clarissa should modify the file /root/.profile.
Runtime environment variables
The Runtime environment variables are defined as the key pairs that are deployed along the function. The variables are mainly scoped to a function in the project.Therefore, in the context, Clarissa wishes to modify the run time environment variable which can be used for all the new logins and also for the new instances for the BASH shell. So for this, Clarissa should modify the /root/.profile file command.
Learn More :
https://brainly.in/question/10061342
Following are the description of the wrong choice:
In option b and option d, both are wrong because it's file directory.In option c, it is a software file directory which install in the main disk, that's why it is wrong.Therefore, the "/root/.profile" file should be changed by Clarissa.
Learn More :
https://brainly.in/question/6708999
Let a be an int array and let i and j be two valid indices of a, a pair (i,j) with i a[j]. Design a method that counts the different pairs of indices of a in disarray. For example, the array <1,0,3,2> has two pairs in disarray.
Answer:
Code:-
#include <iostream>
using namespace std;
int main()
{
// take array size from user
int n;
cout << "Enter array size:";
cin >> n;
// Declare array size with user given input
int a[n];
// take array elements from user & store it in array
cout << "Enter array elements:";
for(int i=0 ; i < n ; i++){
cin >> a[i];
}
/* ----- Solution Starts ----- */
// i & j for checking disarray & count is for counting no. of disarray's
int i=1, j=0, count=0;
for(int k=0; k < n ; k++){
if(a[i] > a[j]){
// if disarray found then increament count by 1
count++;
}
// increament i & j also to check for further disarray's
i++;
j++;
}
// Print the disarray count
cout << "Pairs of disarray in given array:" << count;
/* ----- Solution Ends ----- */
return 0;
}
Output:-
How to overcome software quality dilemma
Explanation:
anytime software and business come together there is an inherent conflict between get it done fast and do a good job
Fasilitas untuk pengaturan batas kertas pada Microsoft Word adalah….
a. Margin
b. View
c. LayOut
d. Paragraph
Office 92 sering disebut juga dengan….
a. Office 3.0
b. Office 7.0
c. Office Xp
d. Office 2.0
Fasilitas untuk pengaturan batas kertas pada Microsoft Word adalah
B.View
Office 92 sering disebut juga dengan
A.Office 3.0
What is true about the pivot in Quicksort? Group of answer choices After partitioning, the pivot will always be in the center of the list. After partitioning, the pivot will never move again. Before partitioning, it is always the smallest element in the list. A random choice of pivot is always the optimal choice, regardless of input.
Answer:
The pivot is selected randomly in quick sort.