If you implement too many security controls, what portion of the CIA triad (Information Assurance Pyramid) may suffer?
a. Availability
b. Confidentiality
c. Integrity
d. All of the above

Answers

Answer 1

Answer:

Option A

Availability

Explanation:

The implementation of too many security protocols will lead to a reduction of the ease at which a piece of information is accessible.  Accessing the piece of information will become hard even for legitimate users.

The security protocols used should not be few, however, they should be just adequate to maintain the necessary level of confidentiality and integrity that the piece of information should have, While ensuring that the legitimate users can still access it without much difficulty.


Related Questions

Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public static integer named d. Which of the following are legal statements in a class named ClassB that has instantiated an object as ClassA obA =new ClassA();?

a. obA.b 12;
b. obA.c 5;
c. obA.d 23;
d. ClassA.b=23;
e. ClassA.c= 33;
f. ClassA.d= 99;

Answers

Answer:

b. obA.c 5;

d. ClassA.b=23;

f. ClassA.d = 99;

Explanation:

Java is a programming language for object oriented programs. It is high level programming language developed by Sun Microsystems. Java is used to create applications that can run on single computer. Static variable act as global variable in Java and can be shared among all objects. The non static variable is specific to instance object in which it is created.

what level of security access should a computer user have to do their job?

Answers

Answer:

A computer user should only have as much access as required to do their job.

Explanation:

A computer user should not be able to access resources outside of their job requirement, as this poses a potential attack vector for an insider threat.  By limiting the scope of resources to just what is needed for the user's specific job, the threat to the system or company can be mitigated with additional access control features for the computer user.  Never allow permission higher than what are needed to accomplish the task.

Cheers.

Bharath has made a table of content for his document in Open Office, in which he wants to make few changes, but he is unable to make the changes. Give reason. Explain how he can make the necessary changes

Answers

Answer:

H cannot update it because it is probably protected.

If you cannot click in the table of contents, it is probably because it is protected. To disable this protection, choose Tools > Options > OpenOffice.org Writer > Formatting Aids, and then select Enable in the Cursor in protected areas section. If you wish to edit the table of contents without enabling the cursor, you can access it from the Navigator.

Explanation:

. To update a table of contents when changes are made to the document:

Right-click anywhere in the TOC.

From the pop-up menu, choose Update Index/Table. Writer updates the table of contents to reflect the changes in the document.

You can also update the index from the Navigator by right-clicking on Indexes > Table of Contents1 and choosing Index > Update from the pop-up menu.

Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
entering and exiting indicate a
A. construction zone.
B. railroad crossing.
C. school zone.
D. none of the above

Answers

Answer:

Explanation:

Hello friend !!!!!!!!!!!!

The answer is school zone

Hope this helps

plz mark as brainliest!!!!!!!

Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).

A school zone is a specific urban area where can be found a school and/or is near a school.

A school zone shows an accessible parking area for the use of individuals (e.g. parents) holding valid accessible parking passes.

Moreover, a school zone sign refers to a warning signal because children cannot be as alert as adults when they cross a road.

In conclusion, children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).

Learn more in:

https://brainly.com/question/8019372

Speeding is one of the most prevalent factors contributing to traffic crashes.
A. TRUE
B. FALSE

Answers

Answer:

A true

Explanation:

Speeding leads to an increase in the degree of crash severity, possibly resulting in more fatalities or injuries. More damage is caused to the vehicles involved at higher speeds, increasing likelihood vehicle will not be drivable after a crash.

The statement "Speeding is one of the most prevalent factors contributing to traffic crashes" is true.

What is speeding?

Speeding causes crashes to be more severe, which could lead to more fatalities or injuries. Higher speeds result in more damage to the involved vehicles, increasing the risk that the vehicle won't be drivable following a collision. There are many accidents increasing because of high speed.

The term "speeding" refers to moving or traveling swiftly. He paid a penalty for speeding. For many American drivers, speeding has become the standard, whether it is going over the posted speed limit, driving too quickly for the road conditions, or racing. Nationwide, speeding contributes to road fatalities.

Therefore, the statement is true.

To learn more about speeding, refer to the link:

https://brainly.com/question/15297960

#SPJ2

An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. Which of the following would BEST meet this goal?a. Split tunnelb. Full tunnelc. IPsec using Tunnel moded. IPsec using Transport mode

Answers

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

The intention of this problem is to analyze a user input word, and display the letter that it starts with (book → B).

a. Create a function prototype for a function that accepts a word less than 25 characters long, and return a character.
b. Write the function definition for this function that evaluates the input word and returns the letter that the word starts with in capital letter (if it’s in small letters).
c. Create a function call in the main function, and use the function output to print the following message based on the input from the user. (Remember to have a command prompt in the main function requesting the user to enter any word.)

Computer starts with the letter C.
Summer starts with the letter S.

d. Make sure to consider the case where a naughty user enters characters other than the alphabet to form a word and display a relevant message.

%sb$ is not a word.
$500 is not a word.

e. Have the program process words until it encounters a word beginning with the character

Answers

Answer:

Here is the C++ program:

#include<iostream>  // to use input output functions

using namespace std;     //to identify objects like cin cout

void StartChar(string str)  {  // function that takes a word string as parameter and returns the first letter of that word in capital

   int i;  

   char c;

   do  //start of do while loop

   {

   for (int i = 0; i < str.length(); i++) {  //iterates through each character of the word str

       if(str.length()>25){  //checks if the length of input word is greater than 25

           cout<<"limit exceeded"; }  //displays this message if a word is more than 25 characters long

      c = str.at(i);   // returns the character at position i

       if (! ( ( c >= 'a' && c <= 'z' ) || ( c >= 'A' && c <= 'Z' ) ) ) {  //checks if the input word is contains characters other than the alphabet

            cout<<str<<" is not a word!"<<endl; break;}  //displays this message if user enters characters other than the alphabet

        if (i == 0) {  //check the first character of the input word

           str[i]=toupper(str[i]);  //converts the first character of the input word to uppercase

           cout<<str<<" starts with letter "<<str[i]<<endl;  }  // prints the letter that the word starts with in capital letter

   }   cout<<"Enter a word: ";  //prompts user to enter a word

      cin>>str;   //reads input word from user

}while(str!="#");   }    //keeps prompting user to enter a word until the user enters #

int main()   //start of the main() function body

{ string str;  //declares a variable to hold a word

cout<<"Enter a word: "; //prompts user to enter a word

cin>>str; //reads input word from user

   StartChar(str); }  //calls function passing the word to it

     

Explanation:

The program prompts the user to enter a word and then calls StartChar(str) method by passing the word to the function.

The function StartChar() takes that word string as argument.

do while loop starts. The for loop inside do while loop iterates through each character of the word string.

First if condition checks if the length of the input word is greater than 25 using length() method which returns the length of the str. For example user inputs "aaaaaaaaaaaaaaaaaaaaaaaaaaa". Then the message limit exceeded is printed on the screen if this if condition evaluates to true.

second if condition checks if the user enters anything except the alphabet character to form a  word. For example user $500. If this condition evaluates to true then the message $500 is not a word! is printed on the screen.

Third if condition checks if the first character of input word, convert that character to capital using toupper() method and prints the first letter of the str word in capital. For example if input word is "Computer" then this prints the message: Computer starts with the letter C in the output screen.

The program keeps prompting the user to enter the word until the user enters a hash # to end the program.

The output of the program is attached.

Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:
42 seconds
import java.util.Scanner;
public class PopcornTimer {
public static void printPopcornTime(int bagOunces) {
/* Your solution goes here */
}
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
int userOunces;
userOunces = scnr.nextInt();
printPopcornTime(userOunces);
}
}

Answers

Answer:

Replace

/* Your solution goes here */

with

if (bagOunces < 2) {

   System.out.print("Too Small");

}

else if(bagOunces > 10) {

   System.out.print("Too Large");

}

else {

   System.out.print((bagOunces * 6)+" seconds");

}

Explanation:

This line checks if bagOunces is less than 2;

if (bagOunces < 2) {

If yes, the string "Too Small" is printed

   System.out.print("Too Small");

}

This line checks if bagOunces is greater than 10

else if(bagOunces > 10) {

If yes, the string "Too Large" is printed

   System.out.print("Too Large");

}

The following condition is executed if the above conditions are false

else {

This multiplies bagOunces by 6 and adds seconds

   System.out.print((bagOunces * 6)+" seconds");

}

Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Sample output with inputs 2014 777:

Answers

Answer:

I am writing the program in JAVA and C++

JAVA:

public int createLicenseNum(int customID){  //class that takes the customID as parameter and creates and returns the licenseNum

       licenseNum = (100000 * customID) + licenseYear;  //licenseNum creation formula

       return(licenseNum);     }

In C++ :

void DogLicense::CreateLicenseNum(int customID){ //class that takes the customID as parameter and creates the licenseNum

licenseNum = (100000 * customID) + licenseYear; } //licenseNum creation formula

Explanation:

createLicenseNum method takes customID as its parameter. The formula inside the function is:

licenseNum = (100000 * customID) + licenseYear;

This multiplies 100000 to the customID and adds the result to the licenseYear and assigns the result of this whole expression to licenseNum.

For example if the SetYear(2014) means the value of licenseYear is set to 2014 and CreateLicenseNum(777) this statement calls createLicenseNum method by passing 777 value as customID to this function. So this means licenseYear = 2014 and customID  = 777

When the CreateLicenseNum function is invoked it computes and returns the value of licenseNum as:

licenseNum = (100000 * customID) + licenseYear;

                     = (100000 * 777) + 2014

                     = 77700000 + 2014

licenseNum = 77702014                                                                                                        

So the output is:

Dog license: 77702014          

To call this function in JAVA:

public class CallDogLicense {

public static void main(String[] args) {//start of main() function

    DogLicense dog1 = new DogLicense();//create instance of Dog class

dog1.setYear(2014); // calls setYear passing 2014

dog1.createLicenseNum(777);// calls createLicenseNum passing 777 as customID value

System.out.println("Dog license: " + dog1.getLicenseNum()); //calls getLicenseNum to get the computed licenceNum value

return; } }

Both the programs along with the output are attached as a screenshot.

Answer:

public int createLicenseNum(int customID){

  licenseNum = (100000 * customID) + licenseYear;

  return(licenseNum);    

}

Explanation:

Hello, I am having trouble adding a txt file into a array, so I can pop it off for a postfix problem I have uploaded what I have so far. I need help please

Answers

Answer:

#include <stack>

#include<iostream>

#include<fstream> // to read imformation from files

#include<string>

using namespace std;

int main() {

   stack<string> data;

   ifstream inFile("postfix.txt");

   string content;

   if (!inFile) {

       cout << "Unable to open file" << endl;

       exit(1); // terminate with error

   }

   while (getline(inFile, content)) {

       data.push(content);

   }

   inFile.close();

   return 0;

}

Explanation:

You were very close. Use the standard <stack> STL library, and make sure the stack elements are of the same type as what you're trying to add, i.e., std::string.

You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component should you check first

Answers

Answer:

Pick up roller

Explanation:

you should first check the pickup roller component. This component is the part of the printer that picks paper up from the paper tray. The pickup roller links the printer and the paper. When the printer printer is running, the roller would take paper from the paper tray for the printer to print on. One of the issues it can have is Paper jam where the roller would stop turning so that it will no longer be picking papers up from the tray.

Briefly describe the importance of thoroughly testing a macro before deployment. What precautions might you take to ensure consistency across platforms for end users?

Answers

Answer:

Answered below

Explanation:

A macro or macroinstruction is a programmable pattern which translates a sequence of inputs into output. It is a rule that specifies how a certain input sequence is mapped to a replacement output sequence. Macros makes tasks less repetitive by representing complicated keystrokes, mouse clicks and commands.

By thoroughly testing a macro before deployment, you are able to observe the flow of the macro and also see the result of each action that occurs. This helps to isolate any action that causes an error or produces unwanted results and enable it to be consistent across end user platforms.

Each time we add another bit, what happens to the amount of numbers we can make?

Answers

Answer:

When we add another bit, the amount of numbers we can make multiplies by 2. So a two-bit number can make 4 numbers, but a three-bit number can make 8.

The amount of numbers that can be made is multiplied by two for each bit to be added.

The bit is the most basic unit for storing information. Bits can either be represented as either 0 or 1. Data is represented by using this multiple bits.

The amount of numbers that can be gotten from n bits is given as 2ⁿ.

Therefore we can conclude that for each bit added the amount of numbers is multiplied by two (2).

Find more about bit at: https://brainly.com/question/20802846

Scams where people receive fraudulent emails that ask them to supply account information are called ________.

Answers

Answer:

"Phishing" will be the correct approach.

Explanation:

This aspect of cyber attacks or fraud is called phishing, whereby clients or users are questioned for personally identifiable information about them.Attackers could very well-currently the most frequently use phishing emails to exchange malicious programs that could operate effectively in what seems like several different ways. Others would get victims to steal user credentials including payment details.

Given an array of integers check if it is possible to partition the array into some number of subsequences of length k each, such that:
Each element in the array occurs in exactly one subsequence
For each subsequence, all numbers are distinct
Elements in the array having the same value must be in different subsequences
If it is possible to partition the array into subsequences while satisfying the above conditions, return "Yes", else return "No". A subsequence is formed by removing 0 or more elements from the array without changing the order of the elements that remain. For example, the subsequences of [1, 2, 3] are D. [1], [2], [3]. [1, 2], [2, 3], [1, 3], [1, 2, 3]
Example
k = 2.
numbers [1, 2, 3, 4]
The array can be partitioned with elements (1, 2) as the first subsequence, and elements [3, 4] as the next subsequence. Therefore return "Yes"
Example 2 k 3
numbers [1, 2, 2, 3]
There is no way to partition the array into subsequences such that all subsequences are of length 3 and each element in the array occurs in exactly one subsequence. Therefore return "No".
Function Description
Complete the function partitionArray in the editor below. The function has to return one string denoting the answer.
partitionArray has the following parameters:
int k an integer
int numbers[n]: an array of integers
Constraints
1 sns 105
1 s ks n
1 s numbers[] 105
class Result
*Complete the 'partitionArray' function below.
The function is expected to return a STRING
The function accepts following parameters:
1. INTEGER k
2. INTEGER ARRAY numbers
public static String partitionArray (int k, List public class Solution

Answers

Answer:

Explanation:

Using Python as our programming language

code:

def partitionArray(A,k):

flag=0

if not A and k == 1:

return "Yes"

if k > len(A) or len(A)%len(A):

return "No"

flag+=1

cnt = {i:A.count(i) for i in A}

if len(A)//k < max(cnt.values()):

return "No"

flag+=1

if(flag==0):

return "Yes"

k=int(input("k= "))

n=int(input("n= "))

print("A= ")

A=list(map(int,input().split()))[:n]

print(partitionArray(A,k))

Code Screenshot:-

What is resource management in Wireless Communication? Explain its advantages

Answers

Answer:

This is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel.

Explanation:

Radio Resource Management is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel. Its aim is to effectively manage the radio network infrastructure. Its advantages include;

1. It allows for multi-users communication instead of point-to-point channel capacity.

2. it increases the system spectral efficiency by a high order of magnitude. The introduction of advanced coding and source coding makes this possible.

3. It helps systems that are affected by co-channel interference. An example of such a system is the wireless network used in computers which are characterized by different access points that make use of the same channel frequencies.

Which of the following statements is true of an encrypted file? * The file can be read only by a user with the decryption key The file can be read by the creator and system administrator The file can not be opened again The file can be opened but not read again

Answers

Answer:

The file can be read only by a user with the decryption key

Explanation:

The way encryption works is it scrambles the data in a file following the rules of the encryption algorithm using a certain key to tell it how to scramble everything.

Without the key, the computer doesn't know how to decrypt it.

This is true no matter who has access to the file, be it a system administrator, a hacker, or even a legitimate user who has somehow lost access to the key

Strictly speaking, encryption can be broken, but, especially with modern encryption, that's a matter of centuries, and isn't really feasible

The statement that is true of an encrypted file is that The file can be read only by a user with the decryption key.

What is decryption key?

A decryption key is known to be a key that is given to Customers by a specific Distributor.

This key allows Customers to open and access the Software that they bought. The decryption key is a  mechanism that  permit  that a file can be read only by a user.

Learn more about decryption key from

https://brainly.com/question/9979590

Write a method that accepts a String object as an argument and returns a copy of the string with the first character of each sentence capitalized. For instance, if the argument is "hello. my name is Joe. what is your name?" the method should return the string "Hello. My name is Joe. What is your name?" Demonstrate the method in a program that asks the user to input a string and then passes it to the method. The modified string should be displayed on the screen.

Answers

Answer:

The programming language is not stated; However, the program written in C++ is as follows: (See Attachment)

#include<iostream>

using namespace std;

string capt(string result)

{

result[0] = toupper(result[0]);

for(int i =0;i<result.length();i++){

 if(result[i]=='.' || result[i]=='?' ||result[i]=='!')  {

 if(result[i+1]==' ') {

  result[i+2] = toupper(result[i+2]);

 }

 if(result[i+2]==' ')  {

  result[i+3] = toupper(result[i+3]);

 }

 } }

return result;

}

int main(){

string sentence;

getline(cin,sentence);

cout<<capt(sentence);

return 0;

}

Explanation:

The method to capitalize first letters of string starts here

string capt(string result){

This line capitalizes the first letter of the sentence

result[0] = toupper(result[0]);

This iteration iterates through each letter of the input sentence

for(int i =0;i<result.length();i++){

This checks if the current character is a period (.), a question mark (?) or an exclamation mark (!)

if(result[i]=='.' || result[i]=='?' ||result[i]=='!')  {

 if(result[i+1]==' '){  ->This condition checks if the sentence is single spaced

  result[i+2] = toupper(result[i+2]);

-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized

 }

 if(result[i+2]==' '){ ->This condition checks if the sentence is double spaced

  result[i+3] = toupper(result[i+3]);

-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized

 }

}

}  The iteration ends here

return result;  ->The new string is returned here.

}

The main method starts here

int main(){

This declares a string variable named sentence

string sentence;

This gets the user input

getline(cin,sentence);

This passes the input string to the method defined above

cout<<capt(sentence);

return 0;

}

Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU

Answers

Answer:

mouse printer CPU touch screen

Explanation:

on a tablet computer hope this helps you :)

Write a Bash script that searches all .c files in the current directory (and its subdirectories, recursively) for occurrences of the word "foobar". Your search should be case-sensitive (that applies both to filenames and the word "foobar"). Note that an occurrence of "foobar" only counts as a word if it is either at the beginning of the line or preceded by a non-word-constituent character, or, similarly, if it is either at the end of the line or followed by a non-word- constituent character. Word-constituent characters are letters, digits and underscores.

Answers

Answer:

grep -R  '^foobar'.c > variable && grep -R  'foobar$'.c >> variable

echo $variable | ls -n .

Explanation:

Bash scripting is a language used in unix and linux operating systems to interact and automate processes and manage files and packages in the system. It is an open source scripting language that has locations for several commands like echo, ls, man etc, and globbing characters.

The above statement stores and appends data of a search pattern to an already existing local variable and list them numerically as standard out 'STDOUT'.

Where can you find detailed information about your registration, classes, finances, and other personal details? This is also the portal where you can check your class schedule, pay your bill, view available courses, check your final grades, easily order books, etc. A. UC ONE Self-Service Center B. Webmail C. UC Box Account D. ILearn

Answers

Answer:

A. UC ONE Self-Service Center

Explanation:

The UC ONE Self-Service Center is an online platform where one can get detailed information about registration, classes, finances, and other personal details. This is also the portal where one can check class schedule, bill payment, viewing available courses, checking final grades, book ordering, etc.

it gives students all the convenience required for effective learning experience.

The UC ONE platform is a platform found in the portal of University of the Cumberland.

How does the teacher know you have completed your assignment in Google Classroom?

Answers

Answer:

When students have completed the assignment, they simply click the Mark As Done button to let the teacher know they have finished.

Explanation: Note: The teacher does NOT receive an alert or email notification when work has been turned in, or marked as done.

Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to group them, or classify them.c. Discuss whether you believe the control or display is suitable for its purpose.

Answers

Answer:

Open ended investigation

Explanation:

The above is an example of an open ended investigation. In understanding what an open ended investigation is, we first of all need to understand what open endedness means. Open endedness means whether one solution or answer is possible. In other words it means that there may be various ways and alternatives to solve or answer a question or bring solution to an investigation.

From the definition, we can deduce that an open ended investigation is a practical investigation that requires students to utilize procedural and substantive skills in arriving at conclusion through evidence gathered from open ended research or experiment(as in not close ended, not limited to ready made options, freedom to explore all possibilities). This is seen in the example question where students are asked to explore the different examples of physical controls and displays and also discuss their observations. Here students are not required to produce a predefined answer but are free to proffer their own solutions

mplement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the integers within this file, close the file, and then return the sum.If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.Please Use This Code Template To Answer the Question#include #include #include //needed for exit functionusing namespace std;// Place fileSum prototype (declaration) hereint main() {string filename;cout << "Enter the name of the input file: ";cin >> filename;cout << "Sum: " << fileSum(filename) << endl;return 0;}// Place fileSum implementation here

Answers

Answer:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

Explanation:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

You are in the process of building a computer for a user in your organization. You have installed the following components into the computer in Support:AMD Phenom II X4 quad core processor8 GB DDR3 memoryOne SATA hard drive with Windows 7 installedYou need to make sure the new components are installed correctly and functioning properly. You also need to install a new SATA CD/DVD drive and make sure the computer boots successfully.Perform tasks in the following order:Identify and connect any components that are not properly connected.Use the PC tools on the shelf to test for components that are not functioning. Replace any bad components with the known good parts on the shelf.Install the required CD/DVD drive in one of the drive bays and connect the power cable from the power supply.

Answers

Answer:

i would check all connections from the hard drive and power supply and check your motherboard for any missing sauters and or loose no contact connections

Explanation:

If the data rate is 10 Mbps and the token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle network with 40 stations? (The average number of stations the token must pass through is 40/2 = 20.) Ignore the propagation delay and the gap Ethernet requires between packets.

Answers

Answer:

1.024x10^-5

Explanation:

To calculate the transmission delay bytes for the token,

we have the token to be = 64bytes and 10mbps rate.

The transmission delay = 64bytes/10mbps

= 51.2 microseconds

A microsecond is a millionth of a second.

= 5.12 x 10^-5

The question says the average number of stations that the token will pass through is 20. Remember this value is gotten from 40/2

20 x 5.12 x 10^-5

= 0.001024

= 1.024x10^-5

Therefore on an idle network with 40 stations, the average wait is

= 1.024x10^-5

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0

Answers

Answer:

def pyramid_volume(base_length,base_width,pyramid_height):

      return base_length * base_width * pyramid_height/3

length = float(input("Length: "))

width = float(input("Width: "))

height = float(input("Height: "))

print("{:.2f}".format(pyramid_volume(length,width,height)))

Explanation:

This line declares the function along with the three parameters

def pyramid_volume(base_length,base_width,pyramid_height):

This line returns the volume of the pyramid

      return base_length * base_width * pyramid_height/3

The main starts here

The next three lines gets user inputs for length, width and height

length = float(input("Length: "))

width = float(input("Width: "))

height = float(input("Height: "))

This line returns the volume of the pyramid in 2 decimal places

print("{:.2f}".format(pyramid_volume(length,width,height)))

Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Incremental Development d. Linear Development

Answers

Answer:

b. Both incremental and iterative development.

Explanation:

Agile software development is based on both incremental and iterative development. It is an iterative method to software delivery in which at the start of a project, software are built incrementally rather than completing and delivering them at once as they near completion.

Incremental development means that various components of the system are developed at different rates and are joined together upon confirmation of completion, while Iterative development means that the team intends to check again components that makes the system with a view to revising and improving on them for optimal performance.

Agile as an approach to software development lay emphasis on incremental delivery(developing system parts at different time), team work, continuous planning and learning, hence encourages rapid and flexible response to change.

In the three As of security, which part pertains to describing what the user account does or doesn't have access to

Answers

Answer:

Authorization

Explanation:

Determine the median paycheck from the following set:

{$100, $250, $300, $400, $600, $650}

$300

$350

$450

$600

Answers

Answer:

My answer to the question is $350.

The middle numbers are $300&$400.

300+400=700/2=350.

Answer:

$350

Explanation:

Other Questions
3(x-4)=-5 solve for x What is the scale factor of this dilation? 420 miles in 6.5 hours unit rate Please help me! This is Algerbra 1 What are half reaction Discuss SOX in 500 words or more. How do logging and separation of duties help comply with SOX? How might database auditing and monitoring be utilized in SOX compliance? How can a dba use automation to comply with SOX frameworks? In working on a bid for project you have determined that $245,000 of fixed assets will be required and that they will be depreciated straight-line to zero over the 5-year life of the project, and you can get $23,200 for these fixed assets at the end of 5 years. You will also need to increase net working capital by 15,000 initially and recoup the investment in net working capital at the end of the project. You have also determined that the discount rate should be 14 percent and the tax rate will be 35 percent. In addition, the annual cash costs will be $68,500. What is the minimum amount of annual sales revenue that is required for you to make money on the project? PLEASE SHOW WORK A. $151,627.90 B. $155,119.00 C. $162,515.75 D. $102,627.90 E. $227,012.50 Assume BGL Enterprises increases its operating efficiency by lowering its costs while holding its sales constant. As a result, given all else constant, the: A. return on assets will decrease. B. profit margin will decline. C. equity multiplier will decrease. D. return on equity will increase. E. price-earnings ratio will increase. Lila is camping with her family. She wants to hike to the lake, go fishing, and hike back before 6:05 P.M. It will take 1 hour and 10 minutes to hike to the lake and 1 hour and 50 minutes to hike back. Lila wants to fish for 3 hours and 10 minutes. What is the latest time Lila can start the hike to the lake? Find the coordinates of point X that lies along the directed line segment from Y(-8, 8) to T(-15, -13) and partitions the segment in the ratio of 5:2. A. (-5, -15) B. (-23, -5) C. (-13, -7) D. (-11.5, -2.5) Scenario B You are a principal who is trying to figure out the truth about a lunchroom fight. The fight was between Justin and Max. Justin is a new student. He is shy and doesnt have many friends. Max is a popular student who is known for his friendliness. Account A: Justin Max started it. I was just standing in line waiting to pay for my food, and he shoved me super hard. And for no reason! He just freaked out on me. I dont even know the kid, and hes been weird to me ever since I started going to this school. Him and his friends glare at me in English class for no reason. Account B: Max That kid is psycho. He turned around and punched me out of nowhere. Me and my friends were standing in line just joking around, and he turned around and punched me for no reason. Hes messed up and creepy. Ask anyone. Account C: Jamie (student who has class with Max and Justin right before lunch) I wasnt in the cafeteria today, and Im not friends with any of those guys, but Ive seen Max and his friends be mean to Justin in the hallways and in class when the teacher isnt looking. Not physical or anything, but theyll like say jokes under their breath and then laugh and stuff like that. They make him uncomfortable." An agent who accepts a bribe to purchase goods for a principal from a seller who is a personal friend breaches his ________ duty by taking the money, since it is the agent's duty to work only for the best interests of the principal. Group of answer choices Kela Corporation reports net income of $450,000 that includes depreciation expense of $70,000. Also, cash of $50,000 was borrowed on a 5-year note payable. Based on this data, total cash inflows from operating activities are: Economic globalization refers to the economic of nations resulting from mutual a sample of 25 workers with employer provided health insurance paid an average premium of $6600 eith a sample standard deviation of $800. Construct a 95% confidence interval for the mean premium amount paid by all workers who have employer provided health insurance g A television screen has a length to width ratio of 8 to 5 and a perimeter of 117 inches. What is the diagonal measure of the screen (to the nearest tenth of an inch)? A computer uses a programmable clock in square-wav e mode. If a 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of (a) a millisecond (a clock tick once every millisecond) 5. When looking at a map, a student realizes that Birmingham is nearly due west of Atlanta, and Nashville is nearly due north of Birmingham. If the distance from Atlanta to Birmingham is roughly 150 mi, and the distance from Birmingham to Nashville is roughly 200 mi, what is the estimated distance from Atlanta to Nashville? how many are 1 raised to 2 ??? A firm has current assets of $36,000, cash of $5,000, current liabilities of $20,000, total assets of $80,000 and total liabilities of $45,000. What is its net working capital? a. $16,000 b. $28,000 c. $35,000 d. $44,000 Where r is the radius of the cylinder and h is the height of the cylinder. Find the surface area when r is 3 inches and h is 5 inches. A. 50 in B. 112 in C. 48 in D. 80 in