Select the Stats Worksheet. Enter simple formulas in B3 and B4 to pull through the calculated Total Expenditure and Total Net from the Data worksheet (cells X2 and Y2). If you have done it correctly the pie chart should now show how income is proportioned between expenditure and net. QUESTION: According to the pie chart, what percentage of Income is made up by Expenditure?

Answers

Answer 1

Answer:

62.49

Explanation:


Related Questions

a) Code a statement that creates an instance of an Account class using the default constructor and stores the object that’s created in a variable named account.
b) Code a statement that creates an instance of the Account class using a constructor that has two parameters named firstName and age, and store the object in a variable named account. Assume that variables with those names have already been declared and initialized so you can pass those variables to the constructor.
c) Code a statement that sets the value of the Age property of an Account object named account to the value in a variable named newAge.
d) Code a statement that will get the value of a public static field named Count that’s defined in the Account class, and store the value in a new int variable named count. Assume that you’ve already created an object from this class that’s named account.

Answers

Answer:

a)

Account account = new Account();

b)

Account account = new Account(firstName, age);

c)

account.Age = newAge;

d)

int count = Account.Count;

Explanation:

a)

new is the keyword which is used to create an object.

Account is the class name.

account is the name of an object of class Account.

account object is created to access the class Account.

Account() is the constructor of Account class. This is the default constructor and it has no parameters. Constructor has the same name as class. When a account object is created, constructor Account will be invoked.

b)

Account is the class name.

account is the name of an object of class Account.

Account() is the constructor of Account class. This is the parameterized constructor and it has two parameters i.e. firstName and age. Constructor has the same name as class. When a account object is created, constructor Account will be invoked.

c)

account.Age = newAge;

Here account is the object name. The Age property to access and update the private field of the Account class is set to the variable named newAge.

d)

This int count = Account.Count; statement gets the value of a public static field named Count that’s defined in the Account class, and stores the value in a new int variable named count.

Declare a struct named PatientData that contains two integer data members named heightInches and weightPounds. Sample output for the given program:Patient data: 63 in, 115 lbs#include using namespace std;/* Your solution goes here */int main() {PatientData lunaLovegood;lunaLovegood.heightInches = 63;lunaLovegood.weightPounds = 115;cout << "Patient data: "<< lunaLovegood.heightInches << " in, "<< lunaLovegood.weightPounds << " lbs" << endl;return 0;}

Answers

Answer:

struct PatientData{

   int heightInches, weightPounds;

};

Explanation:

In order to declare the required struct in the question, you need to type the keyword struct, then the name of the struct - PatientData, opening curly brace, data members - int heightInches, weightPounds;, closing curly brace and a semicolon at the end.

Note that since the object - lunaLovegood, is declared in the main function, we do not need to declare it in the struct. However, if it was not declared in the main, then we would need to write lunaLovegood between the closing curly brace and the semicolon.

What is resource management in Wireless Communication? Explain its advantages

Answers

Answer:

Wireless resources management is communication to address they faster response time.

Explanation:

Wireless communication that provide bandwidth, and transmission reliable, towards development.

This communication is discovered to the date and have consumed physical layer  of available wireless resources.

Wireless communication management all this critical topic  and the management techniques, and limited device battery power.

Communication as the address channel loss, and multi path .

Communication are the latest resources allocation and new or next generation and technologies.

Wireless communication theoretical concepts in a manner, and the necessary mathematical tools and fundamental tools.

Wireless communication device industries up to date of the topic,readers are benefit from a basic.

Write a script named dif.py. This script should prompt the user for the names of two text files and compare the contents of the two files to see if they are the same. If they are, the script should simply output "Yes". If they are not, the script should output "No", followed by the first lines of each file that differ from each other. The input loop should read and compare lines from each file, including whitespace and punctuation. The loop should break as soon as a pair of different lines is found.

Answers

Answer:

Following are the code to this question:

f1=input('Input first file name: ')#defining f1 variable that input file 1

f2=input('Input second file name: ')#defining f2 variable that input file 2

file1=open(f1,'r')#defining file1 variable that opens first files by using open method  

file2=open(f2,'r')#defining file1 variable that opens second files by using open method  

d1=file1.readlines()#defining d1 variable that use readlines method to read first file data

d2=file2.readlines()#defining d2 variable that use readlines method to read second file data

if d1==d2:#defining if block that check file data

   print('Yes')#when value is matched it will print message yes  

   exit# use exit keyword for exit from if block

for j in range(0,min(len(d1),len(d2))):#defining for loop that stores the length of the file  

   if (d1[j]!=d2[j]):#defining if block that check value is not matched

       print('No')#print the message "NO"

       print("mismatch values: ",d1[j]," ",d2[j])#print file values

Output:

please find the attached file.

Explanation:

code description:

In the above code, the "f1 and f2" variable is used for input value from the user end, in which it stores the file names. In the next step, the "file1 and file2" variable is declared that uses the open method to open the file. In the next line, the"d1 and d2" variable is declared for reads file by using the "readlines" method. Then, if block is used that uses the "d1 and d2" variable to match the file value if it matches it will print "yes", otherwise a for loop is declared, that prints files mismatch values.

Answer:

first = input("enter first file name: ")

second = input("enter second file name: ")

file_one = open(first, 'r')

file_two = open(second, 'r')

if file_one.read() == file_two.read():

  print("Both files are the same")

else:

  print("Different files")

file_one.close()

file_two.close()

3. What are the first steps that you should take if you are unable to get onto the Internet? (1 point)
O Check your router connections then restart your router.
O Plug the CPU to a power source and reboot the computer.
O Adjust the display properties and check the resolution
Use the Control Panel to adjust the router settings.​

Answers

Answer:

Check your router connections then restart your router.

Explanation:

When the internet connection is not displaying properly then the first step is to check the router. The network icon on the internet displays the availability of internet. Adjust the router and see if the router is working properly. If not restart the router so that it adjusts its settings to default. The connection will be available on the computer and internet will start working normally.

If a schema is not given, you may assume a table structure that makes sense in the context of the question. (using sql queries)
Find all Employee records containing the word "Joe", regardless of whether it was stored as JOE, Joe, or joe.

Answers

Answer:

The correct query is;

select * from EMPLOYEE where Employee_Name = 'JOE' or Employee_Name = 'Joe' or Employee_Name = 'joe';

where EMPLOYEE refer to the table name and type attribute name is Employee_Name

Explanation:

Here, the first thing we will do is to assume the name of the table.

Let’s assume the table name is EMPLOYEE, where the column i.e attribute from which we will be extracting our information is Employee_Name

The correct query to get the piece of information we are looking for will be;

select * from EMPLOYEE where Employee_Name = 'JOE' or Employee_Name = 'Joe' or Employee_Name = 'joe';

The breastbone or ________________ extends down the chest.

Answers

Answer:

The sternum or breastbone is a long flat bone located in the central part of the chest.

The sternum or breastbone is a long flat bone located in the central part of the chest.

In the middle of the chest, there is a long, flat bone known as the sternum or breastbone. It forms the front of the rib cage and is joined to the ribs by cartilage, assisting in the protection of the heart, lungs, and major blood arteries from harm. It is one of the longest and largest flat bones in the body, somewhat resembling a necktie. The manubrium, body, and xiphoid process are its three regions.

Therefore, the sternum or breastbone is a long flat bone located in the central part of the chest.

Learn more about the breastbone here:

https://brainly.com/question/32917871.

#SPJ2

a_____________ may have its value change during program execution. options. flowchart,counter, Algorithm,None of them​

Answers

Answer:

i think is "none of them"


Your car must have two red stoplights, seen from ______ feet in the daytime, that must come on when the foot brake is pressed.
A. 100
B. 200
C. 300
D. 400

Answers

Answer:

the answer is 300 feet in the daytime

You are required to install a printer on a Windows 7 Professional x86 workstation. Which print driver do you need to complete the installation?

Answers

Answer:

It depends on the model of the printer you want to install. Recent printers when connected to the computer install themselves searching for the drivers needed on the internet. Anyway, you can always google the word "driver" plus the model of your printer and it will surely appear the driver you need from the the company's website of the printer

The print driver that you will need to complete the installation of a printer on Windows 7 Professional x86 workstation is; 32 bit driver

In windows 7 Professional, an x86 name architecture simply denotes a 32 - bit CPU and operating system while x64 will refer to a 64-bit CPU and operating system.

Thus, since we want to install a printer on a Windows 7 Professional x86 workstation, it means we have to use a print driver that is 32 - bit.

Read more about 32 bits at; https://brainly.com/question/19667078

System stored procedures a. perform standard tasks on the current database b. are stored in the Master database c. can change with each version of SQL Server d. all of the above

Answers

Answer:

D. all of the above

Explanation:

A Stored Procedure (sp) is an already compiled group of SQL requests that contains either one or more statements which are stored in the master database.

A Stored Procedure can be created by using the CREATE PROC statement.

They perform standard tasks, stored in the master database and can change with each new version of SQL, so option D is correct.

A TCP entity opens a connection and uses slow start. Approximately how many round-trip times are required before TCP can send N segments

Answers

Answer:

Round trip times required =  log2N

Explanation:

The round-trip times required before TCP can send N segments using a slow start is log2N. we can arrive at this by looking at the mode of operation of TCP which is  at the 1st time of using a TCP it starts the congestion window as 1 then it  sends an initial segment. When the acknowledgement of the initial segment arrives, TCP increases the congestion window to 2 and then sends 2 segments, When the 2 acknowledgements of the segments sent out arrives, they each increase the congestion window by one, thereby increasing the congestion window to 4 . therefore it takes   log2N round trips before TCP can send N segments

Maintaining public libraries is a waste of money since computer technology can replace their functions. Do you agree or disagree?

Answers

Answer:

I totally do not agree that maintaining public library is a waste of money

Explanation:

Most library are now advancing in terms of service delivery and public

libraries are no exception as libraries are now incorporating E- platforms/E- libraries, Audio visuals, where anyone can learn or borrow materials electronically.

         Furthermore, not everyone can own a computer set to so that public libraries are even relevant to the majorities who can afford a computer set.

Also a library especially the public library is a place where people can meet and socialize to the end we even make friends at the public library more effectively than the online library can make(if they can).

In summary the pros of physical public libraries can not be over emphasized.

 

Bar-code readers are typically used to track large numbers of inventory items, as in grocery store inventory and checkout, package tracking, warehouse inventory control, and zip code routing for postal mail.
A. True
B. False

Answers

B. False ..................

3. Explain why the process of project planning is iterative and
why a plan must be continually reviewed during a software
project.
Ans:​

Answers

Answer:

because they inspecting or checking how there works good or not good there are under there work what a result cause they want a good and beautiful work

They're inspecting or checking how there works good or not good there are beneath there job what a result because they want a nice and beautiful work.

What is project planning?

The discipline of project planning focuses on how to complete a project within a predetermined timeframe, often with predetermined stages and resources. According to one method of project planning, the first stage is to set definable goals. scheduling the deliverables definition.

A project plan is made in order to effectively provide a result for the internal or external client. Project deliverables include, for instance, software products, design documentation, and other assets listed in the project plan. Deliverables for projects are frequently asked for as software products.

A project plan is a group of official documents that describe the execution and control phases of the project. The strategy considers risk management, resource management, and communications in addition to scope, cost, and schedule baselines.

Thus, They're inspecting or checking how there works good or not good.

For more information about project planning, click here:

https://brainly.com/question/27992266

#SPJ2

Q2) Answer the following:
1- Expression d=i++; causes:
a. The value of i incremented by 1
b- The value of i assigned to d
C- The value of i assigned to d then i incremented by 1
d- The value ol i incremented by 1 then assigned to d.
CO
SA​

Answers

Answer:

D

Explanation:

The value of i is incremented by one then assigned to d

list three components of a computer system​

Answers

Central Processing Unit,
Input devices and
Output devices.

which approach does procedural programming follow? bottom up, top down, random, or object oriented​

Answers

Answer:

Top to down approach

Explanation:

Describe and compare imperative (C), functional (SML) and logic (Prolog) programming paradigms.

Answers

Answer:

Answered below

Explanation:

Imperative programming paradigm is a paradigm in which the programmer tells the machine how to change its state. It is divided into procedural programming, where programs are grouped as procedures, and object-oriented, where programs are grouped together with the properties they operate on.

Imperative paradigm is efficient, familiar and popular compared to others.

Functional programming paradigm implements all instructions as functions, in a mathematical sense. They take on an argument and return a single solution. The advantage of this, compared to other paradigms, is its abstraction and independence.

Logical programming, like functional programming, incorporates a declarative approach to problem solving. All known facts are first established before queries are made. Advantage of this paradigm is that programming steps are kept to a minimum.

5.15 LAB: Count input length without spaces, periods, or commas Given a line of text as input, output the number of characters excluding spaces, periods, or commas. Ex: If the input is:

Answers

Answer:

Following are the code to this question:

userVal = input()#defining a variable userVal for input the value

x= 0#defining variable x that holds a value 0

for j in userVal:#defining for loop to count input value in number

   if not(j in " .,"):#defining if block that checks there is no spaces,periods,and commas in the value

       x += 1#increment the value of x by 1

print(x)#Print x variable value

Output:

Hello, My name is Alex.

17

Explanation:

In the above-given code, a variable "userVal" is defined that uses the input method for input the value from the user end, in the next line, an integer  variable "x" is defined, hold value, that is 0, in this variable, we count all values.

In the next line, for loop is defined that counts string value in number and inside the loop an if block is defined, that uses the not method to remove spaces, periods, and commas from the value and increment the value of x by 1. In the last step, the print method is used, which prints the calculated value of the "x" variable.    

 

Answer:

Explanation:#include <iostream>

#include<string>

using namespace std;

int main()

{

  string str;

   

cout<<"Enter String \n";

 

getline(cin,str);/* getLine() function get the complete lines, however, if you are getting string without this function, you may lose date after space*/

 

  //cin>>str;

 

  int count = 0;// count the number of characeter

  for (int i = 1; i <= str.size(); i++)//go through one by one character

  {

     

   

   if ((str[i]!=32)&&(str[i]!=44)&&(str[i]!=46))//do not count  period, comma or space

{

          ++ count;//count the number of character

      }

  }

  cout << "Number of characters are  = "; //display

cout << count;// total number of character in string.

  return 0;

}

}

Does clicking ads and pop ups like the one shown in this image could expose your computer to malware?

Answers

Answer: Yes, clicking adds/popups like the one in the image could cause your computer/electronic to catch viruses/malware.

Explanation: The cause to this is when you click an ad/popup you're exposing yourself to a potential dangerous/visious site. You're unaware to where the popup could bring you, and for all we know it could bring us to a fake site for a download which is really a visious malware to be downloaded to your device.

To ensure AD RMS network transmission is protected from being read and interpreted by protocol analyzers, which of the following must be allowed to enroll for a computer certificate?
a) File Server
b) Domain Controller
c) SQL Server
d) Internet Information Services (IIS)

Answers

Answer:

b) Domain Controller

Explanation:

Active Directory Rights Management Services (AD RMS) is a server software that is developed by Microsoft to manage information rights on the Windows server.

The AD RMS servers produce a rights account certificate to link various users with particular PC systems. They also issue end-user licenses.

To ensure that AD RMS network transmission is protected, the domain controller needs to be allowed to enroll for a computer certificate.

A domain controller is a server that authenticates requests from users on a  particular computer network. It keeps user data organized and secure.

how do you run a function in python?

Answers

You can call a Python function like so: function(parameters).

Example:

Define function add:
def add(x,y):
return x+y

Call function:
add(3,7) -> 10

Ann. An employee in the payroll department, has contacted the help desk citing multiple issues with her device, including: Slow performance Word documents, PDFs, and images no longer opening A pop-up Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?

a. Spyware
b. Crypto-malware
c. Rootkit
d. Backdoor

Answers

Answer:

d. Backdoor

Explanation:

A backdoor is a type of malware that overrides security checks and authentications to access a computer or embedded device.

When this is done, remote access is granted and databases and servers can be accessed and modified. Attackers can also give remote commands to the system.

What happened to Ann in the payroll department is probably a backdoor attack that affected her device.

The Adjacent Coins Problem Published on 2017-08-30 Consider N coins aligned in a row. Each coin is showing either heads or tails. The adjacency of these coins is the number of adjacent pairs of coins with the same side facing up. Write a program that given a non-empty zero-indexed array A consisting of N integers representing the coins, returns the maximum possible adjacency that can be obtained by reversing exactly one coin (that is, one of the coins must be reversed). Consecutive elements of array A represent consecutive coins in the row. Array A contains only 0s and/or 1s:

Answers

Answer:

Here is the JAVA code:

public class Main{

public static int solution(int[] A) { //method that takes non-empty array A consisting of 0s and 1s

           int N = A.length; // number of 0s and 1s in array A

           int r = 0; //result of adjacency

           for (int i = 0; i < N - 1; i++;   )   { // iterates through A

               if (A[i] == A[i + 1])  //if i-th element of A is equal to (i+1)th element

                   r = r + 1;   }     //add 1 to the count of r

           if (r == N-1)   //for test cases like {1,1}

           {return r-1; }

           int max = 0; //to store maximum possible adjacency

           for (int i = 0; i <N; i++)   { //iterates through array

               int c = 0;

               if (i > 0)    { //starts from 1 and  covering the last

                   if (A[i-1] != A[i]) //checks if i-1 element of A is not equal to ith element of A

                       c = c + 1;    //adds 1 to counter variable

                   else

                      c = c - 1;   } //decrements c by 1

               if (i < N - 1)     {//starting with 0

                   if (A[i] != A[i + 1])  //checks if ith element of A is not equal to i+1th element of A

                       c = c + 1; //adds 1 to counter variable

                   else

                       c = c - 1;   }      //decrements c by 1        

               max = Math.max(max,c);   }  //finds the maximum of max and c

           return r + max;         } //returns result + maximum result

        public static void main(String[] args) {

   int[] A = {1, 1, 0, 1, 0, 0}; //sample array to test the method

   System.out.println(solution(A));} } //calls the method passing array to it

Explanation:

The program works as follows:

A[] = {1, 1, 0, 1, 0, 0}

N = A.length

N = 6

The A has the following elements:

A[0] =  1

A[1] = 1

A[2] = 0

A[3] = 1

A[4] = 0

A[5] = 0

Program iterates through array A using for loop. Loop variable i is initialized to 0

if condition if (A[i] == A[i + 1]) checks

if (A[0] == A[0 + 1])

A[0] =  1

A[0 + 1] = A[1] = 1

They both are 1 so they are equal

r = r + 1;  

Since the above if condition is true so 1 is added to the value of r Hence

r = 1

At each iteration of the loop the if condition checks whether the adjacent elements of A are equal. If true then r is incremented to 1 otherwise not.

So after all the iterations value of r = 2

if (r == N-1) evaluates to false because r=2 and N-1 = 5

So program moves to the statement:

for (int i = 0; i <N; i++)

This loop iterates through the array A

if (i > 0) condition checks if value of i is greater than 0. This evaluates to false and program control moves to statement:

if (i < N - 1) which makes if(0<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1])  which means:

if (A[0] != A[0 + 1]) -> if (A[0] != A[1])

We know that

A[0] =  1

A[1] = 1

So this evaluates to false and else part is executed:

value of c is decremented to 1. So c=-1

max = Math.max(max,c) statement returns the max of max and c

max = 0

c = -1

So max = 0

value of i is incremented to 1 so i = 1

At next step:

if (i < N - 1) which makes if(1<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1]) which means:

if (A[1] != A[1 + 1]) -> if (A[1] != A[2])

A[1] = 1

A[2] = 0

So the statement evaluates to true and following statement is executed

c = c + 1; The value of c is incremented to 1. So

c = -1 + 1

Hence

Hence c= 0, max = 0 and i = 2

next step:

if (i < N - 1) which makes if(2<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1]) which means:

if (A[2] != A[2 + 1]) -> if (A[2] != A[3])

A[2] = 0

A[3] = 1

So the statement evaluates to true and following statement is executed

c = c + 1; The value of c is incremented to 1. So

c = 0 + 1

c = 1

Hence

The statement max = Math.max(max,c) returns the max of max and c

max = 0

c = 1

So max = 1

Hence  c= 1, max = 1 and i = 3

next step:

if (i < N - 1) which makes if(3<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1]) which means:

if (A[3] != A[3 + 1]) -> if (A[3] != A[4])

A[3] = 1

A[4] = 0

So the statement evaluates to true and following statement is executed

c = c + 1; The value of c is incremented to 1. So

c = 1 + 1

c = 2

Hence

The statement max = Math.max(max,c) returns the max of max and c

max = 1

c = 2

So max = 2

Hence c= 2, max = 2 i = 4

next step:

if (i < N - 1) which makes if(4<5) This evaluates to true and program control moves to statement

if (A[i] != A[i + 1])  which means:

if (A[4] != A[4+ 1]) -> if (A[4] != A[5])

A[4] = 0

A[5] = 0

So this evaluates to false and else part is executed:

value of c is decremented to 1. So c=1

max = Math.max(max,c) statement returns the max of max and c

max = 2

c = 1

So max = 2

value of i is incremented to 1 so i = 5

next step:

if (i < N - 1) which makes if(5<5) This evaluates to false

if (i > 0) evaluates to true so following statement executes:

if (A[i-1] != A[i])

if (A[5-1] != A[5])

if (A[4] != A[5])

A[4] = 0

A[5] = 0

This statement evaluates to false so else part executes and value of c is decremented to 1

Hence

max = 2

c = 0

So max = 2

value of i is incremented to 1 so i = 6

The loop breaks because i <N evaluates to false.

Program control moves to the statement:

return r + max;

r = 2

max = 2

r + max = 2+2 = 4

So the output of the above program is:

4

The web development team is having difficulty connecting by ssh to your local web server, and you notice the proper rule is missing from the firewall. What port number would you open on your webserver?

a. Port 21
b. Port 22
c .Port 25
d. Port 80
e. Port 443

Answers

Answer:

Option b (Port 22) seems to the appropriate choice.

Explanation:

Below seem to be some measure you should take to correct this mistake.

Verify whether Droplet's host IP address seems to be right.  Verify existing connection supports communication over all the utilized SSH port. Any access points can be able to block port 22 and sometimes customized SSH. For illustration, you could do this by checking different hosts who used the same port, using only a recognized working SSH connection. These could help you identify unless the current problem is not particular to clients' Droplet. Authenticate the Droplet configuration settings. Verify that they're not being configured to DROP 's preferred policy, and do not apply the port to require connectivity.

The SSH server also operates on port 22, by default.  

Other choices don't apply to the specified scenario. So that the argument presented above will be appropriate.

The port number would you open on your webserver is Port 22

For better understanding let's explain SSH means.

Service Name and Transport Protocol Port Number Registry. where the service name is Secure Shell (SSH) Protocol and it has the port number of 22 therefore this mean that SSH will only work with port 22 using it for other port will only result in difficulty in connection. SSH has other names like Secure Shell or Secure Socket Shell. it is known as a network protocol that helps its users with system administrator.

From the above we can therefore say that the answer The port number would you open on your webserver is Port 22, is correct

Learn more about SSH and port from:

https://brainly.com/question/13054022

What do Quadratic Selection sort, and Shell sort have in common?
They both used a/an_______based implementation in the standard form and are both relatively_____to the order of the data. The main similarity is that each one creates an environment in which a_____strategy works more efficiently.
1. blank
2. linked list
3. array
4. hybrid
5. tree
6. sensitive
7. insensitive
8. complex
9. modern
10. simple
11. retrograde
12. advanced

Answers

Answer:

a) An ARRAY ( 3 )

B) relatively INSENSITIVE ( 7 )

c) a HYBRID ( 4 )

Explanation:

They both used an array based implementation in the standard form and are both relatively insensitive to the order of the data. The main similarity is that each one creates an environment in which a hybrid strategy works more efficiently.

Quadratic selection sort is the sorting system that sorts out the smallest value in an entire list and arrange the list in such a way that the smallest value comes first.

1a) Skills are increasingly the key variable of the entire process of access and information inequality in the information society. Discuss the 21st century competencies or skills required in the information society and four ways (4) you can apply it during Supported Teaching on Schools.​

Answers

Answer:

Explanation:

Skill acquisition improves quality, competence and competitiveness of an individual, It boost the chances of success and ability to make an impact. Access to information plays a verybhuge role in the society as it enables hearers to get updated while those who aren't informed are left behind. Some of the key competences or skills required in the information society include:

Critical thinking : Problem identification and ways to solve them.

Information sourcing and gathering : knowing where to get vital informations and facts

Effective communication, creativity, leadership, social, media and technological skills and so on.

The skills could be can be applied on schools in the form of :

Creating clubs such as the writing and debate clubs where students are given a research topic to write and present, this improves their research ability and communication skill.

Group project or assignment improves collaboration between members.

Assignments or projects requiring technology : Students may be given problems to solve with the use of computers moutwr programs and technology, this will help mad improve productivity.

Reward for innovation: Students should be paused mad encouraged for being creative, this will improve such individual and push others as well.

Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentication, and integrity. Be specific as to the keys used and how they achieve the three goals.

Answers

Answer:

Find the explanation below.

Explanation:

Asymmetric encryption is a system of communication in technology between two parties where keys which are variable values coined by an algorithm are used to encrypt and decrypt the messages between the sender and receiver. The two types of keys used in this process are the public and private keys. The public keys can be used by anyone to encrypt messages which are then sent to the receiver who decrypts the message using his private keys. The private keys on the other hand are only shared by the person who first set up the key. In sending messages this way, the receiver's public key is gotten from a public directory, and the message encrypted by the sender. The receiver can then decrypt the message using his private keys. But if the message is encrypted using a private key, it is decrypted by the receiver with a public key.

The one-way nature of this style of communication ensures data integrity and confidentiality since users are not required to disclose their keys and only the two parties can access the message. The two end users also preserve the right to authenticate the keys. The transport layer security protocol makes use of asymmetric encryption.

Consider two different implementations of the same instruction set architecture (ISA). The instructions can be divided into four classes according to their CPI (class A, B, C, and D). P1 with a clock rate of 2.5 GHz have CPIs of 1, 2, 3, and 3 for each class, respectively. P2 with a clock rate of 3 GHz and CPIs of 2, 2, 2, and 2 for each class, respectively. Given a program with a dynamic instruction count of 1,000,000 instructions divided into classes as follows: 10% class A, 20% class B, 50% class C, and 20% class D.which implementation is faster?
a. What is the global CPI for each implementation?
b. Find the clock cycles required in both cases.

Answers

Answer: Find answers in the attachments

Explanation:

Other Questions
-What is the product?(-3s +2)(4s-1) Simplify:[tex] \frac{ {a}^{5} {b}^{8} }{ {a}^{4} {b}^{10} } [/tex]HELP! answer if you can ! The period of a pendulum is the time it takes the pendulum to swing back and forth once. If the only dimensional quantities that the period depends on are the acceleration of gravity, g, and the length of the pendulum, , what combination of g and must the period be proportional to? (Acceleration has SI units of m s-2.) The enormity of the temple rebuilding process, economic hardships, and opposition from the surrounding peoples stalled the project for sixteen months.a. Trueb. False Which of the following is not a good example of a marketing-related key success factor? A. a well-known and well-respected brand name B. breadth of product line and product selection C. proven ability to improve production processes D. clever advertising E. courteous, personalized customer service An increase in taxes when the economy is above full employment ______ aggregate demand and real GDP, and the price level ______. Alex wants to sew a pillow in the shape below. How many square yards of fabric are needed to sew the pillow? Fabric is only sold in increments of yard. It is estimated that 52% of drivers text while driving . What is the probability the next driver texting while driving that a police officer pulls over is the fifth driver? Stickleback fish are collected from a lake in Alaska. 600 from the sample are spineless, which is a recessive trait in the fish. 80 of the fish collected have spines. Calculate: A. The frequency of recessive alleles in the population (p): B. The frequency of dominant alleles in the population (q): C. The percentage of individuals in the population that are heterozygous: D. Provide an explanation for why so many fish in the lack display the recessive trait: Which of the following supports the idea that Hamlet is a problem play? Select all that apply.The plays characters are neither all good nor all bad.The play has a somber, sinister mood.Hamlet lacks a tragic flaw.It has a tragic ending. When light is either reflected or refracted, the quantity that does not change in either process is its -8 + 4m = 2. What is m? A foot is 12 inches and a mile is 5280 ft, exactly. A centimeter is exactly 0.01m or mm. Sammy is 5 feet and 5.3 inches tall. What is Sammy's Height in inches? The role of the pubic information officer A. includes reporting to the Operations Section Chief during an incident response. B. has become ever more complex as the challenge of delivering messages has evolved. C. is strictly dictated by the National Qualification System position task book. D. is to wait for direction from the incident commander. BRAINLIEST!!!What are the coordinates of P? solve for x 5(x+1)=4(x+8) PLEASE HELP URGENT AND EXPLAIN FOR 25 POINTS MUST BE CORRECT Brielle bought an apartment building for $202,444. The value of the real estate appreciated at a constant rate per year. The table shows the value of the apartment building after the first and second years: Year 1 2 Value (in dollars) $212,566.20 $223,194.51 Which function best represents the value of the apartment building after t years? f(t) = 202,444(0.05)t f(t) = 202,444(1.05)t f(t) = 212,566.20(1.05)t f(t) = 212,566.20(0.05)t If a = 6, which of the following is equal to a^-2? -36-12 1/6^26^2 please help me i need help The heat capacity of object B is twice that of object A. Initially A is at 300 K and B at 450 K. They are placed in thermal contact and the combination is thermally insulated. The final temperature of both objects is