Answer:
The Program is written in C++
#include<iostream>
using namespace std;
int main()
{
//Variable declaration
double m2;
cout<<"Input your mass (in kilogram): ";
cin>>m2;
//Constant declaration and initialisation
double G = 0.00000000006673;
double m1 = 5974200000000000000000000;
double r = 6378000;
double g = 9.8;
//Calculating Gravitational Force
double F = G * m1 * m2 / (r * r);
//Print Gravitational Force
cout<<"Gravitational Force = "<<F;
// Calculating Force exerted on earth
F = m2 * g;
cout<<"Force = "<<F;
//Calculating acceleration due to gravity (g) caused by the
// gravitational force exerted on him/her by the Earth.
g = G * m2 / (r * r);
cout<<"Gravity Exerted on Earth: "<<g;
return 0;
}
//End of Program
//Comments were used to explain some lines of codes
//Program was implemented using C++
Explanation:
Answer:
Explanation:
For each entity, select the attribute that could be the unique identifier of each entity.
Entities: Student, Movie, Locker
Attributes: student ID, first name, size, location, number, title, date released, last name, address, produced, director.
Answer:
"student ID, number and title" is the correct answer for the above question.
Explanation:
The primary key is used to read the data of a table. It can not be duplicated or null for any records.The "student ID" is used to identify the data of the "student" entity. It is because the "student ID" can not be duplicated or null for any records. It is because every student has a unique "student ID". The "number" is used to identify the data of the "Locker" entity. It is because the "number" can not be null or duplicate for any records. It is because every locker has a unique "number".The "title" is used to identify the data of the "Movie" entity. It is because the "title" can not be Null or duplicate for any records. It is because every movie has a unique "title".Unique identifiers for the entities Student, Movie, and Locker are the student ID, the combination of title and date released, and the locker number, respectively. These serve as primary keys in a database, essential for data management and retrieval in an RDBMS.
Explanation:For each entity, the attribute that could be the unique identifier, often known as the primary key, in a database is essential to ensure that each record can be distinguished from all others. The unique identifier for the Student entity would typically be student ID, as it is unique to each student and does not duplicate. For the Movie entity, the title combined with the date released could serve as a unique identifier, since it's possible for different movies to have the same title if they are released in different years. Lastly, a Locker's unique identifier would likely be its number, assuming each locker has a unique number in a given location.
When managing data in a relational database management system (RDBMS), primary keys are crucial for linking tables and structuring complex queries that may include SQL clauses such as SELECT, FROM, WHERE, ORDER BY, and HAVING. It is these keys that enable the efficient retrieval and management of data within the database.
Write the definition of a function half which recieves a variable containing an integer as a parameter, and returns another variable containing an integer, whose value is closest to half that of the parameter. (Use integer division!)
Answer:
int half(int x){
int a=x/2;
return a;
}
Explanation:
function half(x) which has return type integer and accept an integer type parameter 'x' and return the an integer value in variable 'a' which is closest to half that of the parameter 'x'.
Write an application that inputs three numbers (integer) from a user. (10 pts) UPLOAD Numbers.java a. display user inputs b. determine and display the number of negative inputs c. determine and display the number of positive inputs d. determine and display the number of zero inputs e. determine and display the number of even inputs f. determine and display the number of odd inputs
Answer:
The program to this question as follows:
Program:
import java.util.*; //import package for user input
public class Number //defining class Number
{
public static void main(String[] ak)throws Exception //defining main method
{
int a1,b1,c1; //defining integer variable
int p_Count=0,n_Count=0,n_Zero=0,even_Count=0,odd_Count=0;
Scanner obx=new Scanner(System.in); //creating Scanner class object
System.out.println("Input all three numbers: "); //print message
//input from user
a1=obx.nextInt(); //input value
b1=obx.nextInt(); //input value
c1=obx.nextInt(); //input value
//check condition for a1 variable value
if(a1>0) //positive number
p_Count++;
else if(a1==0) //value equal to 0
n_Zero++;
else //value not equal to 0
n_Count++;
if(a1%2==0)//check even number
even_Count++;
else //for odd number
odd_Count++;
//check condition for b1 variable value
if(b1>0) //positive number
p_Count++;
else if(b1==0) //value equal to 0
n_Zero++;
else //value not equal to 0
n_Count++;
if(b1%2==0) //check even number
even_Count++;
else //for odd number
odd_Count++;
//check condition for c1 variable value
if(c1>0) //positive number
p_Count++;
else if(c1==0) //value equal to 0
n_Zero++;
else //value not equal to 0
n_Count++;
if(c1%2==0) //check even number
even_Count++;
else //for odd number
odd_Count++;
//print values.
System.out.println("positive number: "+p_Count);//message
System.out.println("negative number: "+n_Count); //message
System.out.println("zero number: "+n_Zero); //message
System.out.println("even number: "+even_Count); //message
System.out.println("odd number: "+odd_Count); //message
}
}
Output:
Input all three numbers:
11
22
33
positive number: 3
negative number: 0
zero number: 0
even number: 1
odd number: 2
Explanation:
In the above java program code a class is defined in this class three integer variable "a1,b1, and c1" is defined which is used to take input value from the user end, and other integer variable "p_Count=0, n_Count=0, n_Zero=0, even_Count=0, and odd_Count=0" is defined that calculates 'positive, negative, zero, even, and odd' number.
In the next step, the conditional statement is used, in if block a1 variable, b1 variable, c1 variable calculates it checks value is greater then 0, it will increment the value of positive number value by 1. else if it will value is equal to 0. if this condition is true it will negative number value by 1 else it will increment zero number values by 1. In this code, another if block is used, that checks even number condition if the value matches it will increment the value of even number by 1, and at the last print, method is used that print all variable values.Token stories of success and upward mobility (illustrated by Oprah, Ross Perot, and Madonna) reinforce ________ and perpetuate the myth that there is equal opportunity for all to achieve upward mobility in the United States.
A. assimilation
B. class structure
C. heterogeneity
D. economic diversity
Answer:
class structure.
Explanation:
Which of the following helps in developing a microservice quickly? API Gateway Service registry Chassis Service Deployment
Answer:
Micro Service is a technique used for software development. In micro services structure, services are excellent and arrange as a collection of loosely coupled. API Gateway helps in developing micro services quickly.
Explanation:
The API gateway is the core of API management. It is a single way that allows multiple APIs to process reliably.
Working:
API gateway takes calls from the client and handles the request by determining the best path.
Benefits:
Insulated the application and partitioned into micro services.
Determine the location of the service instances.
Identify the problems of services.
Provide several requests.
Usage:
API stands for application program interface. It is a protocol and tool used for building software applications. Identify the component interaction and used the Graphical Interface component for communication.
Write a program that reads in characters from standard input and outputs the number of times it sees an 'a' followed by the letter 'b'.
Answer:
Following is attached the code that works accordingly as required. It reads in characters from standard input and outputs the number of times it sees an 'a' followed by the letter 'b'. All the description of program is given inside the code as comments.
I hope it will help you!
Explanation:
Please develop a C program to reverse a series of integer number (read from the user until EOF issued by user) using stack ADT library. Please include c code and three sample run demonstrations with at least 10 different numbers each time.
Answer:
#include <stdio.h>
#define MAX_CH 256
int main(void) {
int ch, i, length;
char string[MAX_CH];
for (;;) {
for (i = 0; i < MAX_CH; i++) {
if ((ch = getchar()) == EOF || (ch == '\n')) break; string[i] = ch; }
length = i;
if (length == 0) { break; }
for (i = 0; i < length; i++) { putchar(string[length - i - 1]); }
putchar('\n');
}
return 0;
}
Explanation:
Take input from user until the end of file.Reverse the string using the following technique:putchar(string[length - i - 1])Create a Python for loop script of exactly 2 lines of code that generates a sequence of integer numbers that start in zero and go to (and include) the number 25. For each integer generated, print in the Python console the following string (for instance if you have generated the number five): Generated number: 5. Ensure that your script generated the output in the Python console
Final answer:
The script provided uses a for loop and the range function to generate and print numbers 0 to 25 with a message stating 'Generated number: X'.
Explanation:
To create a Python for loop script that generates a sequence of integer numbers from zero to 25 and prints out those numbers with a specific message, you can use the following 2-line script:
for i in range(26):
print(f'Generated number: {i}')
This script uses a for loop and the range function to generate the sequence, and a formatted string to print the numbers with the message.
What type of malware actually evolves, changing its size and other external file characteristics to elude detection by antivirus programs?
Answer:
This type of malware are called Polymorphic Malware.
Purpose of this program:
- In the ocelot.aul.fiu.edu FIU server, create a website using your topic of choice. Basketball sport topic.
- Program must be done using terminal mode and editors ONLY, no IDEs or templates allowed.
ALL CODE MUST BE ORIGINAL, no automatic tools or templates allowed.
- ONLY code learned in this class will be accepted
- Using HTML, tables, borders, cellpadding, cellspacing, paragraphs, breaks, fonts, font colors,
font sizes, graphics/images/pictures, call websites using links, and menues with hyperlinks
create the following program 1:
1) In your public_html folder, create a folder named includes, located at the same level/location
as your index file.
All pages for this program 1, except the index.html, must be saved in the includes folder.
2) Create a folder named images, located at the same level/location as your index file.
All images for this program must be saved in the images folder.
3) Create your home page
As we know your index page is your home page, which gets loaded when your webpage gets called by
browsers such as Google Chrome, IE Explorer, Edge, Firefox, Opera, Safari etc.
a) In your index file, in the title section place your last name, first Initial and page name
b) On the top of your web page, display "CENTERED" the following message:
====this is a teaching website====
using the Arial font, color red, size 6
c) On the next line display your full name, "CENTERED",
using the Times New Roman font, color blue, size 5
d) Display a single line from left to right, using the command learned in class
***MAKE SURE THAT b, c, and d ARE ON THE TOP OF EVERY PAGE***
e) Create ONE CENTERED hyperlink, also known as a link, that will call your program one page
(pgm1), located in the include folder
4) Your pgm1 page should have one centered menu with five (5) hyperlinks/links called:
Home Page1 Page2 Page3 Page4
***Notice that there are three spaces between each link
Each link, when pressed, will take you to:
a) Home link will load your index.html, located in your public_html folder
b) Page1 link will load Page1.html, located in the include folder
c) Page2 link will load Page2.html, located in the include folder
d) Page3 link will load Page3.html, located in the include folder
e) Page4 link will load Page4.html, located in the include folder
example: Home Page1 Page2 Page3 Page4
f) ***MAKE SURE TO HAVE THE ABOVE HYPERLINKS MENU ON EACH OF THE ABOVE PAGES***
Home Page1 Page2 Page3 Page4
5) Each page on question 4, MUST BE DIFFERENT and UNIQUE
(UNIQUE means that ALL ITEMS, colors, fonts, sizes, pictures, comments, etc in each page,
can ONLY be used ONCE in the entire pgm1)
Each page will have the following:
a) On all pages, on the title section. display your Last Name, First Name, and Page Name
b) Four UNIQUE colors. Colors CAN NOT be black or white
c) Four UNIQUE fonts.
d) Four UNIQUE font sizes.
e) Using instructions on sections b) c) and d) write four lines of any UNIQUE text you want,
using breaks and paragraphs tags.
f) Display two UNIQUE graphics, each bringing you to any UNIQUE website when the graphic is pressed.
all web pages MUST be UNIQUE
Answer:
Solved. Please download the attached zipped file. You can download the answers from the given link in explanation section
Explanation:
Download the attached file and unzipped/extract it to the root folder of your server.
This package contains all the files and folders as asked in the project.
In this package you can find the 5 pages in the includes folder and at the root you can find the index file. Click on the index file to open it.
Each page is stylized and have uniqueness than other pages. Please also note that, each page contains first, last and initial name in the title section of each page and in body section of each page. You can modify these names parameter according to your name/requirement
https://drive.google.com/file/d/1OBdjUI6JOnUuji-iYPmPWnJBk4gcMd6X/view?usp=sharing
"Microsoft's Exchange/Outlook and Lotus Notes provide people with e-mail, automated calendaring, and online, threaded discussions, enabling close contact with others, regardless of their location. Identify this type of information system."
Answer:
Collaboration information system
Explanation:
Information system is a process of communication between users and the computer system to perform instructions. The system is divided into three main parts, they are, computer side, data and user side. The computer side is the hardware and software of the computer system that receives data for execution. User side is the people and the procedure used to input data.
Collaboration system is a type of information system that a group of people use to share ideas electronically, regardless of their location, for efficiency and effectiveness in the work done or project.
There are two algorithms called Alg1 and Alg2 for a problem of size n. Alg1 runs in n2 microseconds and Alg2 runs in 100n log n microseconds. Alg1 can be implemented using 4 hours of programmer time and needs 2 minutes of CPU time. On the other hand, Alg2 requires 15 hours of programmer time and 6 minutes of CPU time.
1. If programmers are paid 20 dollars per hour and CPU time costs 50 dollars per minute, how many times must a problem instance of size 500 be solved using Alg2 in order to justify its development cost?
The answer & explanation for this question is given in the attachment below.
Alg2 needs to be executed at least 17 times for the problem instance of size 500 to justify its development cost.
We have,
Let's first calculate the cost of development and implementation of Alg2:
Cost of programmer time for Alg2 = 15 hours * $20 per hour = $300
Cost of CPU time for Alg2 = 6 minutes * $50 per minute = $300
Total development cost for Alg2 = $300 + $300 = $600
The CPU time required by Alg2 for one instance of size 500
= 100 * 500 * log(500) microseconds
(since Alg2 runs in 100n log n microseconds)
We need to convert the CPU time to dollars:
CPU time cost for one instance of size 500
= 100 * 500 * log(500) microseconds * ($50 per minute / 1,000,000 microseconds)
= $35.76 (approximately)
Now, to justify the development cost, we need to find out how many times Alg2 needs to be executed for the total cost of running Alg2 to surpass the development cost:
Number of times Alg2 needs to be executed
= Total development cost / Cost of running Alg2 for one instance of size 500
= $600 / $35.76
= 16.77
= 17 (approximately)
Thus,
Alg2 needs to be executed at least 17 times for the problem instance of size 500 to justify its development cost.
Learn more about expressions here:
https://brainly.com/question/3118662
#SPJ3
How would GIS, GPS, or remote sensing technology be used to evaluate the destruction caused by a tornado in Oklahoma?
Answer:
They can be used to compare a certain region before and after disaster.
Explanation:
Answer:
This type of technology can help survey the damage caused by the tornado and determine the extent of the destruction.
Explanation:
In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of packet to confirm that the host computer is live?a. ICMP SYN-ACK packetb. ICMP SYN packetc. ICMP Echo Reply (type 8)d. ICMP Echo Reply (type 0)
Answer:
d. ICMP Echo Reply (type 0)
Explanation:
ICMP or internet control message protocol is an Internet layer protocol in the TCP/IP suite. It works together with routing devices like the router to send messages based on results sensed in the network.
The RFC 1122 has stated that the ICMP server and end user application be configured or installed in user devices, for receiving and sending ICMP echo request packets and reply. The process is called pinging.
For an attacker to implement ping of ping, he needs to confirm if the target user in live by sending an ICMP echo request packet type 8, to receive an ICMP echo reply type0.
Assume that the variable myString refers to a string, and the variable reversedString refers to an empty string. Write a loop that adds the characters from myString to reversedString in reverse order.
Answer:
# The user input is accepted and stored in myString
myString = input(str("Enter your string: "))
# An empty string called reversedString is declared
reversedString = ''
# l is defined to show number of times the loop will occur.
# It is the length of the received string minus one
# since the string numbering index start from zero
l = len(myString) - 1
# Beginning of the while loop
while l >= 0:
reversedString += myString[l]
l = l - 1
# The reversed string is printed to the user
print(reversedString)
Explanation:
Final answer:
To reverse the order of characters from myString to reversedString, iterate over myString in reverse and concatenate each character to reversedString. This process uses a loop and results in reversedString containing the characters of myString but in reversed order.
Explanation:
The student asked how to add characters from the variable myString to the variable reversedString in reverse order using a loop. This can be achieved by iterating over myString in reverse and concatenating each character to reversedString. Here's how it can be done in Python:
myString = "example string"
reversedString = ""
for char in reversed(myString):
reversedString += char
print(reversedString)
This code snippet iterates over myString in reverse order. For each iteration, it adds the current character to reversedString. By the end of the loop, reversedString will contain all characters from myString but in reverse order.
Given four inputs: a, b, c & d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsigned binary number Y (i.e. both X and Y are in the range #0 to #3). The output is z, which is 1 whenever X > Y, and 0 otherwise (this circuit is part of a "2-bit comparator"). For instance, if a = 1, b = 0 (i.e. X = b10 => #2); c = 0, d = 1 (i.e. Y = b01 => #1); then z = 1, since b10 > b01
Just need truth table, and boolean expression (simplified) for these thumbs up.
Answer:
z = a.c' + a.b.d' + b.c'.d'
Explanation:
The truth table for this question is provided in the attachment to this question.
N.B - a' = not a!
The rows with output of 1 come from the following relations: 01 > 00, 10 > 00, 10 > 01, 11 > 00, 11 > 01, 11 > 10
This means that the Boolean expression is a sum of all the rows with output of 1.
z = a'bc'd' + ab'c'd' + ab'c'd + abc'd' + abc'd + abcd'
On simplification,
z = bc'd' + ab'c' + ac'd' + ac'd + abc' + abd'
z = ac' + abd' + bc'd'
Hope this helps!
A laser printer produces up to 20 pages per minute, where a page consists of 4000 characters. The system uses interrupt-driven I/O, where processing each interrupt takes 50 microseconds. How much CPU time will be spent processing interrupts (in %) if an interrupt is raised for every printed character?
Final answer:
The CPU time spent processing interrupts for a laser printer that prints 80,000 characters per minute, with each interrupt taking 50 microseconds, is 6.67% of the total CPU time.
Explanation:
To calculate the amount of CPU time spent processing interrupts from a laser printer that produces up to 20 pages per minute and raises an interrupt for each of the 4000 characters on a page, we first calculate the number of characters printed in a minute. Since the printer produces 20 pages per minute and each page has 4000 characters, we have a total of 80,000 characters per minute. Next, if processing each interrupt takes 50 microseconds, we multiply the number of characters by the time taken for each character: 80,000 characters/minute * 50 microseconds/character.
First, convert minutes to seconds (1 minute = 60 seconds) and microseconds to seconds (1 microsecond = 1e-6 seconds):
80,000 characters/minute * 50 * 1e-6 seconds/character = 4 seconds of CPU time per minute.
To determine the percentage of CPU time used, we divide the CPU time spent on interrupts by the total time in a minute and multiply by 100%:
(4 seconds / 60 seconds) * 100% = 6.67% of CPU time spent processing interrupts.
Writing Output to a File 1. Copy the files StatsDemo.java (see Code Listing 4.2) and Numbers.txt from the Student CD or as directed by your instructor. 2. First we will write output to a file: a. Create a FileWriter object passing it the filename Results.txt (Don’t forget the needed import statement). b. Create a PrintWriter object passing it the FileWriter object. c. Since you are using a FileWriter object, add a throws clause to the main method header. d. Print the mean and standard deviation to the output file using a three decimal format, labeling each. e. Close the output file. 3. Compile, debug, and run. You will need to type in the filename Numbers.txt. You should get no output to the console, but running the program will create a file called Results.txt with your output. The output you should get at this point is: mean = 0.000, standard deviation = 0.000. This is not the correct mean or standard deviation for the data, but we will fix this in the next tasks.
Below is a code for StatsDemo.java that writes the output to a file
Java
i
PrintWriter printWriter = new PrintWriter(fileWriter);
// Since you are using a FileWriter object, add a throws clause to the main method header
// This will allow you to catch any exceptions thrown by the FileWriter or PrintWriter objects
try {
// Read the data from the file
Scanner scanner = new Scanner(new File("Numbers.txt"));
// Calculate the mean and standard deviation of the data
double[] data = new double[scanner.nextInt()];
for (int i = 0; i < data.length; i++) {
data[i] = scanner.nextDouble();
}
double mean = calculateMean(data);
double standardDeviation = calculateStandardDeviation(data, mean);
// Print the mean and standard deviation to the output file using a three decimal format, labeling each
DecimalFormat df = new DecimalFormat("0.000");
printWriter.println("Mean = " + df.format(mean));
printWriter.println("Standard deviation = " + df.format(standardDeviation));
} finally {
// Close the output file
printWriter.close();
fileWriter.close();
}
}
}
The output file will contain the following:
Mean = 0.000
Standard deviation = 0.000
So, the above code will read the data from the file "Numbers.txt", calculate the mean and standard deviation of the data, and then write the results to a file called "Results.txt".
code is incomplete as it is showing inappropriate words
The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they can take appropriate actions in a timely manner to prevent further damage by the data thieves.
Answer:
California Identity Theft Statute
Explanation:
The California Identity Theft Statute, also referred to as the Penal Code 530.5 PC is a statute that clearly provides a definition of what the crime of identity theft actually is. Identity theft is a crime committed when the personal identifying information of another person is taken and used unlawfully or fraudulently. The statute further provide ample information to victims of identity theft in order to avert such occurrence or further damage.
San Juan Sailboat Charters (SJSBC) is an agency that leases (charters) sailboats. SJSBC does not own the boats. Instead, SJSBC leases boats on behalf of boat owners who want to earn income from their boats when they are not using them, and SJSBC charges the owners a fee for this service. SJSBC specializes in boats that can be used for multiday or weekly charters. The smallest sailboat available is 28 feet in length, and the largest is 51 feet in length. Each sailboat is fully equipped at the time it is leased. Most of the equipment is provided at the time of the charter. The owners provide most of the equipment, but some is provided by SJSBC. The owner-provided equipment includes equipment that is attached to the boat, such as radios, compasses, depth indicators and other instrumentation, stoves, and refrigerators. Other owner-provided equipment, such as sails, lines, anchors, dinghies, life preservers, and equipment in the cabin (dishes, silverware, cooking utensils, bedding, and so on), is not physically attached to the boat. SJSBC provides consumable supplies, such as charts, navigation books, tide and current tables, soap, dishtowels, toilet paper, and similar items. The consumable supplies are treated as equipment by SJSBC for tracking and accounting purposes.
Answer:
The given question is incomplete as it does not contains the complete information.
Following are attached images:
First two images contain the complete information needed for question.Next three images contain the detailed answer or the question given.I hope it will help you!
Explanation:
Final answer:
SJSBC is a business that charters sailboats ranging from 28 to 51 feet. Owners provide permanent and non-permanent equipment, while SJSBC offers consumables for tracking and accounting.
Explanation:
San Juan Sailboat Charters (SJSBC) is a company that facilitates the chartering of sailboats for boat owners. The smallest sailboat they charter is 28 feet long, while the largest is 51 feet. Equipment such as stoves, radios, and compasses are considered owner-provided and are attached to the boat. Additional equipment like sails, anchors, and life preservers, while not attached, are also provided by the owners. SJSBC contributes by supplying consumable supplies, treated as equipment for tracking and accounting purposes, including navigation tools and various personal use items.
Find the mistakes in the following code. Not all lines contain mistakes. Each line depends on the lines preceding it. Watch out for uninitialized pointers, NULL pointers, pointers to deleted objects, and confusing pointers with objects.
Answer:
Explanation:
A null pointer is pointing to nothing, if we can detect if a pointer is null, we can use an "IF" because a null pointer always going to be false, a null pointer even can block an application, because is a result of undefined behavior, it can even cause problems because the compiler can’t tell whether we mean a null pointer or the integer 0, there is a confusion in this kind of pointers.
"Which of the following sets the window width to 100 pixels and the height to 200 pixels?
A) setSize(100, 200);
B) setSize(200, 100);
C) setDims(100, 200);
D) set(200, 100);"
Answer:
Option A is the correct answer for the above question.
Explanation:
When the user wants to create a window application in java, He can create with the help of Java swing and AWT library of java. It gives the features to create a window application.So when a user creates a frame or window with the help of frame or window class, then he needs to set the size of the frame and window which he can set by the help of setSize() function.This function takes two argument weight and height like "setSize(int width, int height)", which is called by the object of window or frame class.The above question wants to ask about the function which is used to set the width and height as 100 and 200 pixels. This can be set by the help of setSize() function which is written as setSize(100,200). This is stated from option A. Hence A is the correct while the other is not because they are not the right syntax.Final answer:
The appropriate method to set the window width to 100 pixels and the height to 200 pixels is A) setSize(100, 200).
Explanation:
The correct option that sets the window width to 100 pixels and the height to 200 pixels is A) setSize(100, 200). This typically corresponds to a method in a graphical user interface (GUI) library in programming, where the first value passed to setSize represents the width and the second value represents the height. Hence, to set the width to 100 pixels and the height to 200 pixels, setSize(100, 200) would be the suitable method call.
In the case of a security incident response, the Building and Implementing a Successful Information Security Policy whitepaper cautions that __________ is often critical in limiting the damage caused by an attack.
Answer:
Risk management.
Explanation:
Information security policy is a documented set of rules and regulations to prevent cyber attacks and exposure to company information. It entails risk analyses, management, violation and implementation.
A information security officer is obligated to document these policies and disseminate the message to all the employees of the company.
Risk management processes like physical or desktop security and internet threat security is critical in mitigating damage and attacks.
Determine the binary expression for the following code. Enter your answer as a string of '1's and '0's. Do NOT type any spaces or your answer will register as incorrect. A = 0x0F A |= 0x70; A &= ~0x80;
Answer:
The binary expression or the given code is as follows:
1110111I hope it will help you!
Create a class Cola Vending Machine. This class is simulating a cola vending machine. It keeps track of how many cola bottles are in the class and how much one bottle costs. There should be a method sell Bottle which sells one bottle to a customer, decreases the amount of bottles left. There also is a method restock which sets the number of bottles to the number it is restocked to. Write a main method to test the functionality of the Cola Vending Machine machine.
Answer:
public class CocaColaVending {
private int numBottles;
private double costPerBottle;
public CocaColaVending(int numBottles, double costPerBottle) {
this.numBottles = numBottles;
this.costPerBottle = costPerBottle;
}
public int getNumBottles() {
return numBottles;
}
public void setNumBottles(int numBottles) {
this.numBottles = numBottles;
}
public double getCostPerBottle() {
return costPerBottle;
}
public void setCostPerBottle(double costPerBottle) {
this.costPerBottle = costPerBottle;
}
public void sellBottles(int numSold){
int remainingStock = this.numBottles-numSold;
setNumBottles(remainingStock);
}
public void restockBottles(int numRestock){
int newStock = this.numBottles+numRestock;
setNumBottles(newStock);
}
}
THE TEST CLASS IS showing the functionality of the class is given in the explanation section
Explanation:
public class CocaColaVendingTest {
public static void main(String[] args) {
CocaColaVending vending = new CocaColaVending(1000,2.3);
System.out.println("Intial Stock "+ vending.getNumBottles());
vending.sellBottles(240);
System.out.println("After Selling 240 bottles "+ vending.getNumBottles());
vending.restockBottles(1000);
System.out.println("After restocking 1000 bottles "+ vending.getNumBottles());
}
}
Listed below are the five steps for planning a Windows Forms application. Put the steps in the proper order by placing a number (1 through 5) on the line to the left of the step. _____________________ Identify the items that the user must provide. _____________________ Identify the application’s purpose. _____________________ Draw a sketch of the user interface. _____________________ Determine how the user and the application will provide their respective items. _____________________ Identify the items that the application must provide.
Answer:
1. Identify the application’s purpose.
2. Identify the items that the user must provide.
3. Identify the items that the application must provide.
4. Determine how the user and the application will provide their respective items.
5. Draw a sketch of the user interface.
Explanation:
There are five steps to plan a windows forms application, mentioned above in the proper order. First of all, the purpose of the application has been identified. Then, inputs of the form from user and output of the form will be identified. Then it has been identified that, how the inputs and output, will be provided. In last, user interface will be drawn.
Using C#, declare two variables of type string and assign them a value "The "use" of quotations causes difficulties." (without the outer quotes). In one of the variables use quoted string and in the other do not use it.
Answer:
Let the two string type variables be var1 and var2. The value stored in these two variables is : The "use" of quotations causes difficulties.
The variable which uses quoted string:string var1 = "The \"use\" of quotations causes difficulties.";
The variable which does not use quoted string:string var2 = "The " + '\u0022' + "use" + '\u0022' + " of quotations causes difficulties.";
Another way of assigning this value to the variable without using quoted string is to define a constant for the quotation marks:const string quotation_mark = "\"";
string var2 = "The " + quotation_mark + "use" + quotation_mark + " of quotations causes difficulties.";
Explanation:
In order to print and view the output of the above statements WriteLine() method of the Console class can be used.
Console.WriteLine(var1);
Console.WriteLine(var2);
In the first statement escape sequence \" is used in order to print: The "use" of quotations causes difficulties. This escape sequence is used to insert two quotation marks in the string like that used in the beginning and end of the word use.
In the second statement '\u0022' is used as an alternative to the quoted string which is the Unicode character used for a quotation mark.
In the third statement a constant named quotation_mark is defined for quotation mark and is then used at each side of the use word to display it in double quotations in the output.
Convert to octal. Convert to hexadecimal. Then convert both of your answers todecimal, and verify that they are the same.(a) 111010110001.0112 (b) 10110011101.112
The given decimal values are converted to octal and hexadecimal.
Explanation:
a. The converted octal value of 111010110001.0112 decimal number is 1473055755061.00557000643334272616
The converted hexadecimal value of 111010110001.0112 decimal number is 19D8B7DA31.02DE00D1B71758E21965
b. The converted octal value of 10110011101.112 decimal number is 113246503335.07126010142233513615
The converted hexadecimal value of 10110011101.112 decimal number is
25A9A86DD.1CAC083126E978D4FDF4
a. while converting back from octal to decimal the value is 111010110001.01119999999999999989
b. while converting back from octal to decimal the value is
10110011101.11199999999999999973
Hence both the values changes while we convert from octal to decimal.
OSI is a seven-layered framework used to help define and organize the responsibilities of protocols used for network communications. It does not specifically identify which standards should be used within each layer.a. Trueb. False
Answer:
True.
Explanation:
OSI network model is a networking framework that has seven layers that describes the encapsulation and communication of devices in a network. The seven OSI model layers are, application, presentation, session, transport, network, data-link and physical layer.
Each layer in this model describes the protocol datagram unit PDU and identifies several standard and proprietary protocols that can be used in a layer.
A network administrator of engineer can decide to use a protocol based on his choice and the brand of network device used.
Suppose the author of an online banking software system has programmed in a secret feature so that program mails him the account information for any account whose balance has just gone over $10,000. Which of the C.I.A. concepts is most affected
Answer:
Accounting.
Explanation:
Computer networks are designed to allow computer devices to communicate intelligently. The connection of these network devices could be wired or wireless. A network can be private or public. Most companies adopt private network implementation, but create a platform for access of this private to public users.
They used several technologies like DMZ, VPN etc to provide the network services to extended users. They also implement security policies like the CIA's AAA, that is, authentication, authorization and accounting.
Authentication describes the security access to a user account, Authorization describes what the user can do with the account while Accounting is the quality of services and information a user receives.