Answer:
The answer is "Option a and Option f"
Explanation:
The cross-site programming and Server-Side Requests fraud were activities that can have negative effects as these are assaults that directly affect your cloud-based servers via web apps. Although the remainder of an attack could be controlled with these approaches, then they can affect the encryption keys only less.
What is a computer system
Answer:
A computer along with additional hardware and software together is called a computer system. A computer system primarily comprises a central processing unit (CPU), memory, input/output devices and storage devices. All these components function together as a single unit to deliver the desired output.
Explanation:
pls mark brainliest
3. Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickle, and 2 pennies. That is 27=1*25+0*5+2*1.
Answer:
The program in Python is as follows:
cents = int(input("Cents: "))
qtr = int(cents/25)
cents = cents -qtr * 25
nkl = int(cents/5)
pny = cents -nkl * 5
print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")
Explanation:
This gets input for cents
cents = int(input("Cents: "))
This calculates the quarters in cents
qtr = int(cents/25)
This gets the remaining cents
cents = cents -qtr * 25
This calculates the nickel in remaining cents
nkl = int(cents/5)
This calculates the pennies in remaining cents
pny = cents -nkl * 5
This prints the required output
print(qtr,"quarters,",nkl,"nickels,",pny,"pennies")
Compute the acceleration of gravity for a given distance from the earth's center, distCenter, assigning the result to accelGravity. The expression for the acceleration of gravity is: (G * M) / (d2), where G is the gravitational constant 6.673 x 10-11, M is the mass of the earth 5.98 x 1024 (in kg) and d is the distance in meters from the earth's center (stored in variable distCenter).
#include
using namespace std;
int main() {
double G = 6.673e-11;
double M = 5.98e24;
double accelGravity;
double distCenter;
cin >> distCenter;
/* Your solution goes here */
cout << accelGravity << endl;
return 0;
}
Answer:
Replace /* Your solution goes here */ with the following expression
accelGravity = (G * M) / (distCenter *distCenter );
Explanation:
Required
Complete the code
The equivalent expression of (G * M) / (d^2) is:
(G * M) / (distCenter *distCenter );
The expression must be stored in accelGravity.
So, we have:
accelGravity = (G * M) / (distCenter *distCenter );
Hello everybody,
For the quiz questions, I tried using the circular method, but got a numeric, period or comma error?
So I tried using the solver to find the same solution I got, but when I entered it in the answer box, he always said incorrectly.
Any help would be highly appreciated and write the results here, why do I have to read the solution quiz because I was wrong? thank you.
The bisection method is being used to calculate the zero of the following function between x = 0 and x = 1.
What is the midpoint for the 3rd iteration? (The midpoint for the 1st iteration is 0.5.) Provide your answer rounded to the thousandths place.
Answer:
i don't know the answer please tell me
What is the relationship between an organization’s specific architecture development process and the Six-Step Process?
Answer:
It is a method of developing architecture in various stages
Explanation:
The organization-specific architecture developmental process is a tested and repeated process for developing architecture. It made to deal with most of the systems. It describes the initial phases of development. While the six step process is to define the desired outcomes, Endorse the process, establish the criteria and develop alternatives. Finally to document and evaluate the process.Over-activity on LinkedIn?
Answer:
Being over-enthusiastic and crossing the line always get you in trouble even if you’re using the best LinkedIn automation tool in the world.
When you try to hit the jackpot over the night and send thousands of connection requests in 24 hours, LinkedIn will know you’re using bots or tools and they will block you, temporarily or permanently.
This is clearly against the rules of LinkedIn. It cracks down against all spammers because spamming is a big ‘NO’ on LinkedIn.
What people do is that they send thousands of connection requests and that too with the same old spammy templates, “I see we have many common connections, I’d like to add you to my network.”
It will only create spam.
The LinkedIn algorithm is very advanced and it can easily detect that you’re using a bot or LinkedIn automation tool and you’ll be called out on it.
Research via the internet and find an article in the news regarding wireless hacking, hardware hacking, or other security breach. As security and IT changed so rapidly, your article should be no older than 2007 (i.e. Less than 5 years old). Summarize the article using at least 500 words.
Hi, I provided some explanation of key terms.
Explanation:
Wireless hacking: basically the term refers to any unethical activity carried over a radio wave-connected network (eg Internet or Wifi connection) that would provide unauthorized access to information.
Hardware hacking: On the other hand, hardware hacking involves resetting physical hardware with the objective of using it in a way not originally intended by the manufacturer.
Microsoft office can be classified under what heading of application
Answer:
Word processing software/application
pls mark as brainliest!
Have a grt day!!!
similarities between inline css and internal css
Answer:
CSS can be applied to our website's HTML files in various ways. We can use an external css, an internal css, or an inline css.
Inline CSS : It can be applied on directly on html tags. Priority of inline css is greater than inline css.
Internal CSS : It can be applied in web page in top of the page between heading tag. It can be start with
write a programmimg code in c++ for school based grading system, the program should accept the subject in the number of students from a user and store their details in the array of type student(class) the student class you have:
1. number student name, index number remarks as variables of type string, marks as integer and grade as char.
2. avoid function called getData which is used to get student details
3. avoid function called calculate which will work on the marks and give the corresponding great and remarks as given below on
Marks 70-100 grade A remarks excellent Mark 60-69 Grade B remarks very good marks 50-59 grade C remarks pass maths 0-49 grade F remarks fail
Answer:
The program is as follows:
#include <iostream>
#include <string>
using namespace std;
class Student{
string studName, indexNo, remarks; int marks; char grade;
public:
void getData(){
cin.ignore();
cout<<"ID: "; getline(cin,indexNo);
cout<<"Name:"; getline(cin,studName);
cout<<"Marks: ";cin>>marks; }
void calculate(){
if(marks>=70 && marks<=100){
remarks ="Excellent"; grade = 'A'; }
else if(marks>=60 && marks<=69){
remarks ="Very Good"; grade = 'B'; }
else if(marks>=50 && marks<=59){
remarks ="Pass"; grade = 'D'; }
else{
remarks ="Fail"; grade = 'F'; }
cout << "Grade : " << grade << endl;
cout << "Remark : " << remarks << endl; }
};
int main(){
int numStudents;
cout<<"Number of students: "; cin>>numStudents;
Student students[numStudents];
for( int i=0; i<numStudents; i++ ) {
cout << "Student " << i + 1 << endl;
students[i].getData();
students[i].calculate(); }
return 0;}
Explanation:
This defines the student class
class Student{
This declares all variables
string studName, indexNo, remarks; int marks; char grade;
This declares function getData()
public:
void getData(){
cin.ignore();
Prompt and get input for indexNo
cout<<"ID: "; getline(cin,indexNo);
Prompt and get input for studName
cout<<"Name:"; getline(cin,studName);
Prompt and get input for marks
cout<<"Marks: ";cin>>marks; }
This declares funcion calculate()
void calculate(){
The following if conditions determine the remark and grade, respectively
if(marks>=70 && marks<=100){
remarks ="Excellent"; grade = 'A'; }
else if(marks>=60 && marks<=69){
remarks ="Very Good"; grade = 'B'; }
else if(marks>=50 && marks<=59){
remarks ="Pass"; grade = 'D'; }
else{
remarks ="Fail"; grade = 'F'; }
This prints the grade
cout << "Grade : " << grade << endl;
This prints the remark
cout << "Remark : " << remarks << endl; }
};
The main begins here
int main(){
This declares number of students as integer
int numStudents;
Prompt and get input for number of students
cout<<"Number of students: "; cin>>numStudents;
This calls the student object to declare array students
Student students[numStudents];
This is repeated for all students
for( int i=0; i<numStudents; i++ ) {
Print number
cout << "Student " << i + 1 << endl;
Call function to get data
students[i].getData();
Call function to calculate
students[i].calculate(); }
return 0;}
A hierarchy chart can be helpful for a. planning the functions of a program b. naming the functions of a program c. showing how the functions of a program relate to each other d. all of the above e. a and c only
Answer:
Hence the correct options are option B and option C.
Explanation:
Hierarchy Chart means top to bottom structure 0f a function or a program or an organization.
Planning the functions of a program means deciding beforehand that what are the functions of a program and what to try to do and when to try to, hierarchy Charts are often helpful In doing/knowing this all.
Showing how the functions of a program relate to every other means what's the connection between two functions for instance if we have a hierarchical chart of a corporation member then we'll have the connection among the members of the team i.e., first, we'll have CEO, then Manager then team/ project lead then team members and by using hierarchical chart ready to " we will be able to identify the connection among them. during a similar way, we will have a relationship among the functions of a program using the hierarchical chart.
Please draw the dynamic array stack structure (you must mention the size and capacity at each step) after the following lines of code are executed. You should assume that the initial capacity is 2 and a resize doubles the capacity.
values = Stack()
for i in range( 16 ) :
if i % 3 == 0 :
values.push( i )
else if i % 4 == 0 :
values.pop()
Answer:
Explanation:
dxfcgvhb
2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the
difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400
Some example leap years are 1600, 1712 and 2016.
Write a program that takes in a year and determines whether that year is a leap year.
Ex If the input is
1712
the output is
1712 13 leap year.
Ex If the nouts
1913
the outoutis
1913 not leap year.
Written is Coral Language
Answer:
integer userInput
userInput = Get next input
if userInput % 400 == 0
Put userInput to output
Put " is a leap year" to output
else
if userInput % 4 == 0
Put userInput to output
Put " is a leap year" to output
else
Put userInput to output
Put " is not a leap year" to output
Explanation:
I don't know what is so special about Coral but here we go. I couldn't find and IDE that supported Coral so I just used their Coral simulator on their website. The first if statement on line 5 determines if the number is divisible by 400. If so, the leap year is on a century year e.g 1900 1800. If not, the else statement will be executed and the second if statement will execute. If the number is divisible by 4, it is a leap year. If not, the else statement gets executed in which case the number was not a century leap year or a leap year. After that the program terminates.
Hope this helped :) If it didn't let me know and I do my best to find out what went wrong.
Have a good day :)
a do-while loop that continues to prompt a user to enter a number less than 100, until the entered number is actually less than 100. End each prompt with newline Ex: For the user input 123, 395, 25, the expected output is:Enter a number (<100):Enter a number (<100):Enter a number (<100):Your number < 100 is: 25
Answer:
Explanation:
import java.util.Scanner;
//Declare the class NumberPrompt.
public class NumberPrompt
{
public static void main(String args[])
{
/*Declare the variable of scanner class and allocate the
memory.*/
Scanner scnr = new Scanner(System.in);
//Initialize the variable userInput.
int userInput = 0;
/* Your solution goes here*/
//Start the do-while loop
do
{
//Prompt the user to enter the number.
System.out.println("Enter a number(<100)");
/*Store the number entered by the user in the
variable userInput.*/
userInput=scnr.nextInt();
}while(userInput>=100);/*Run the do-while loop till the
user input is greater than 100*/
//Print the number which is less than 100.
System.out.println("Your number <100 is "+userInput);
return;
}
}
Output:-
Define firewall ?with example
Explanation:
it acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it. ... For example, a basic firewall may allow traffic from all IP.
if my answer helps you than mark me as brainliest.
Answer:
hope this helps
Explanation:
Firewalls are software or hardware that work as a filtration system for the data attempting to enter your computer or network. Firewalls scan packets for malicious code or attack vectors that have already been identified as established threats.And also firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
Type the correct answer in the box. Spell all words correctly.
Page scaling mode helps increase or reduce the size of the worksheet to fit within the set number of pages to be printed. Which option re-scales
a worksheet vertically?
To re-scale a worksheet vertically, select the number of pages in the height text box in the____group.
Answer:
Scale to fit.
Explanation:
The scale to fit group can be found in the page layout tab as it is used to deal with display of functionalities of a document and spreadsheet program. The scale to fit requires input in the width option which will dictate the width of the page in which to place the documents on. By specifying 1 for the width, this means that the document will be rescaled to fit on a single page. The automatic option may be selected for the height option which will allow the program to make an auto Decison in the shrinkage depending on the stated width value.
. In the select algorithm that finds the median we divide the input elements into groups of 5. Will the algorithm work in linear time if we divide it into groups of 7? How about 3? Explain your answer--- the asymptotic run time in either case.
Answer:
we have that it grows more quickly than linear.
Explanation:
It will still work if they are divided into groups of 77, because we will still know that the median of medians is less than at least 44 elements from half of the \lceil n / 7 \rceil⌈n/7⌉ groups, so, it is greater than roughly 4n / 144n/14 of the elements.
Similarly, it is less than roughly 4n / 144n/14 of the elements. So, we are never calling it recursively on more than 10n / 1410n/14 elements. T(n) \le T(n / 7) + T(10n / 14) + O(n)T(n)≤T(n/7)+T(10n/14)+O(n). So, we can show by substitution this is linear.
We guess T(n) < cnT(n)<cn for n < kn<k. Then, for m \ge km≥k,
\begin{aligned} T(m) & \le T(m / 7) + T(10m / 14) + O(m) \\ & \le cm(1 / 7 + 10 / 14) + O(m), \end{aligned}
T(m)
≤T(m/7)+T(10m/14)+O(m)
≤cm(1/7+10/14)+O(m),
therefore, as long as we have that the constant hidden in the big-Oh notation is less than c / 7c/7, we have the desired result.
Suppose now that we use groups of size 33 instead. So, For similar reasons, we have that the recurrence we are able to get is T(n) = T(\lceil n / 3 \rceil) + T(4n / 6) + O(n) \ge T(n / 3) + T(2n / 3) + O(n)T(n)=T(⌈n/3⌉)+T(4n/6)+O(n)≥T(n/3)+T(2n/3)+O(n) So, we will show it is \ge cn \lg n≥cnlgn.
\begin{aligned} T(m) & \ge c(m / 3)\lg (m / 3) + c(2m / 3) \lg (2m / 3) + O(m) \\ & \ge cm\lg m + O(m), \end{aligned}
T(m)
≥c(m/3)lg(m/3)+c(2m/3)lg(2m/3)+O(m)
≥cmlgm+O(m),
therefore, we have that it grows more quickly than linear.
Start with the following Python code.
alphabet = "abcdefghijklmnopqrstuvwxyz"
test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"]
test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"]
def histogram(s):
d = dict()
for c in s:
if c not in d:
d[c] = 1
else:
d[c] += 1
return d
Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source.
Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.
Implement has_duplicates by creating a histogram using the histogram function above. Your implementation should use the counts in the histogram to decide if there are any duplicates.
Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for "aaa" and "abc" would be the following.
aaa has duplicates
abc has no duplicates
Print a line like one of the above for each of the strings in test_dups.
Answer:
huwugsgssuaihsux h baiThatha svaadishht us
OSI model layers application in mobile computing
Answer:
The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.
what is
computer.write its example
The First Web page you will see every time you launch the Web Browser Application is called
Answer:
HomePage
Explanation:
Illustrate why sally's slide meets or does not not meet professional expectations?
Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, explains that your biggest client, Major Corporation, is evaluating how they back up their data. Chris needs you to write a report that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of on-site and off-site backup. For this assignment: 1. Research both traditional and cloud data backup methods. 2. Write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of on-site and off-site backup. Required Resources Course textbook Internet Submission Requirements Format: Microsoft Word Font: Arial, size 12, double-space Citation Style: Follow your school's preferred style guide Length: 1-2 pages If-Assessment Checklist I researched both traditional and cloud data backup methods. I wrote a report that compares the two. I included the security of cloud services versus traditional forms of on-site and off-site backup. I organized the information appropriately and clearly. . I created a professional, well-developed report with proper documentation, grammar, spelling, and nunctuation
Answer:
Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules.
Security Risk Scoring
Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.
Operational Security
Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.
Database Activity Monitoring
Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.
Only by covering both of these areas can organizations have defense in depth and effectively control risk.
You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its weight, screen size and price. You consider a number of different models, and narrow your list based on its speed and monitor screen size, then finally select a model to buy based on its weight and price. In this decision, speed and monitor screen size are examples of:_______.
a. order winners.
b. the voice of the supplier.
c. the voice of the customer.
d. order qualifiers.
In this decision, speed and monitor screen size of a laptop are examples of a. order winners.
What is a laptop?A laptop can be defined as a small, portable computer that is embedded with a keyboard and mousepad, and it is usually light enough to be placed on an end user's lap while he or she is using it to work.
What are order winners?Order winners are can be defined as the aspects of a product that wins the heart of a customer over, so as to choose or select a product by a specific business firm. Some examples of order winners include the following:
SpeedMonitor screen sizePerformanceRead more on a laptop here: https://brainly.com/question/26021194
Is" Python programming Language" really
worth studying? If yes? Give at least 10 reasons.
1. Python is a particularly lucrative programming language
2. Python is used in machine learning & artificial intelligence, fields at the cutting-edge of tech
3. Python is simply structured and easy to learn
4. Python has a really cool best friend: data science dilemma.
5. Python is versatile in terms of platform and purpose
6. Python is growing in job market demand
7. Python dives into deep learning
8. Python creates amazing graphics
9. Python supports testing in tech and has a pretty sweet library
10. There are countless free resources available to Python newbies
True or False.
Figuring out the learning styles of your instructors will help you better understand how they prefer to teach.
Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character – to change every third character in the array to its replacement character
(C++ coding)
Method explanation:
Defining a method "changeCharacter" that takes three parameters that are "character array", and two integer variable "s, k" in its parameters.Inside the method, a for loop is declared that takes array value and defines a conditional statement that checks the 3rd character value in the array, is used to the array that holds its key-value.Please find the full program in the attachment.Method description:
void changeCharacter(char* ar, int s, int k)//defining a method changeCharacter that takes three parameters
{
for(int j = 1; ar[j]!='\0'; j++)//defining a for loop for 3rd character value in array
{
if(j%3== 0)//use if block that check 3rd character value in array
{
ar[j-1] = k; //Changing the 3rd character in array
}
}
}
Learn more:
Program: brainly.com/question/12975989
WHAT IS ONE WAY A PIVOTTABLE COULD COMBINE THE FOLLOWING DATA
Answer: You sort table data with commands that are displayed when you click a header arrow button. Hope it help's :D
I really need To know how To get The special ending for final fight 2 for super nintendo it’s a video game
Answer:
Check Yt
Explanation:
More often than not there are many video tutorials about every game imaginable.
After reading the background, please work on the following problem: a. The source process reads information from a file (Therefore, you need to prepare a small text file for testing purpose). b. The source process calls fork() to create the filter process. c. The filter process reads information from the source process (passed via an anonymous pipe), converts the uppercase characters to lowercase ones and vice versa, and then prints out the converted characters to the screen.
Answer:
Explanation:
The following code is written in Java. It has the main method (source process) and a function called fork() which contains the filter process as described in the question. fork() takes in the file information as a parameter and prints out the information to the screen. The test can be seen with the output in the attached image below.
import java.io.File;
import java.io.FileNotFoundException;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
String data = "";
try {
File myObj = new File("C:\\Users\\Gabriel2\\AppData\\Roaming\\JetBrains\\IdeaIC2020.2\\scratches\\input.txt"); //USE YOUR FILE LOCATION
Scanner myReader = new Scanner(myObj);
while (myReader.hasNextLine()) {
data += myReader.nextLine();
data += "\n";
}
myReader.close();
} catch (FileNotFoundException e) {
System.out.println("An error occurred.");
e.printStackTrace();
}
System.out.println("Original: \n" + data);
fork(data);
}
public static void fork(String data) {
String output = "";
for (int i = 0; i < data.length(); i++) {
if (Character.isUpperCase(data.charAt(i)) == true) {
output += Character.toLowerCase(data.charAt(i));
} else if (Character.isLowerCase(data.charAt(i)) == true) {
output += Character.toUpperCase(data.charAt(i));
} else {
output += data.charAt(i);
}
}
System.out.println("Modified: \n" + output );
}
}