Answer:
The correct usage is a NOR gate which is indicated in the explanation.
Explanation:
The truth table for the given two signals, namely
p=unplugged signal
q=low battery signal
can form a truth table of following form
Here p has 2 states
1 if the power supply is connected
0 otherwise
Similarly q has 2 states
0 if the battery has reached almost zero state
1 otherwise
As the condition for the Hibernate Signal is given as to only activate when the battery is low and the power supply is not connected. This indicate that the value of Hibernate signal should be 1 when both p and q are 0.
Using this condition, the truth table is formed as
unplugged signal | low battery signal | Hibernate Signal
0 | 0 | 1
0 | 1 | 0
1 | 0 | 0
1 | 1 | 0
Now the truth table of NOR is given as
a | b | a or b | ~(a or b)
0 | 0 | 0 | 1
0 | 1 | 1 | 0
1 | 0 | 1 | 0
1 | 1 | 1 | 0
This indicates that the both truth tables are same thus the NOR gate is to be used for this purpose.
If a large organization wants software that will benefit the entire organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required.
Answer:
Hello your question lacks the required options which is : True or False
answer : TRUE
Explanation:
If a large organization wants to develop a software that will benefit the entire organization such software will be known as an enterprise application software and such application software must be developed in such a way that it meets the required purpose for which the organization is designed it for.
An enterprise application software is a computer software developed specially to satisfy the specific needs of an entire organization inside of the individual needs of the people working in the organization.
WRITTEN INTERVIEW QUESTIONS
Doctoral candidates should provide an authentic personal statement to each of the five following questions/prompts reflecting on their own personal interest. In the event that any outside resources are used, resources should be cited in APA format. Submissions should be a maximum of 500 words or 125 words per question/prompt. It is best to response to each prompt/question individually for clarity of the reviewer. Writing sample should be submitted in Microsoft Word format and include candidate’s name.
PhD IT
1. Tell us about yourself and your personal journey that has lead you to University of the Cumberlands.
2. What are your research interests in the area of information technology? How did you become interested in this area of research?
3. What is your current job/career and how will this program impact your career growth?
4. What unique qualities do you think you have that will help you in being successful in this program?
5. How can obtaining a doctorate impact your contribution to the practices of information technology? Where do you see yourself after obtaining a doctorate from UC?
Explanation:
1. I grew up in a small community and my family owned a small business which involved manual labor. Although, having little income, my Dad sought to give us the best education he could afford from his little savings. With the small family savings I went to college where I studied Information Technology, after graduating I worked for a startup firm for two years before I decided to proceed with post graduate studies and I attained my Masters in UA. I met a friend who recommended I study in University of Cumberlands, I hesitated initially but was convinced after I researched the institution.
2. I'm particularly interested in the applications of information technology in labor intensive businesses and work because of my family background.
3. I have my own startup firm that designs work communication software for companies, however I intend to broaden my knowledge through this program into Information Technology based systems using machine learning algorithm.
4. I am committed to work and study, as some have called me a curious mind because of my passion towards learning.
5. I view obtaining a doctorate as not just a personal achievement but of lasting benefits to society as I use knowledge derived to improve the work experience of society.
I am confident that after my program I would be one the renowned contributors to the applications of information technology in labor intensive businesses.
The university computer lab’s director keeps track of lab usage, as measured by the number of students using the lab. This function is important for budgeting purposes. The computer lab director assigns you the task of developing a data warehouse to keep track of the lab usage statistics. The main requirements for this database are to:
Answer:
to keep count of how many users there are in total.
Explanation:
all i had to do was read the question twice to understand the answer is pretty
much in the question.
The director of the computer lab tasks with creating a data warehouse to manage lab utilization data. The major needs for this database are to keep count of how many users there are in total.
What is the budgeting process?
The tactical measures used by a corporation to create a financial plan are the budgeting processes. Budgeting for a future time entails more than simply allocating spending; it also entails figuring out how much income is required to achieve organizational objectives.
These procedures are used by accounting departments to regulate corporate activities, particularly expenditure. A person may use budgeting process to record how much money a business makes and spends over a specific time period.
Therefore, With the aid of budgeting, it may establish financial objectives for the team and the entire organization.
Learn more about the budgeting process, refer to:
https://brainly.com/question/21411418
#SPJ2
What password did the boss gave to the man?
Answer:
1947
Explanation:
because i dont know
Answer:
where is the password?
Explanation:
Write a class called Triangle that can be used to represent a triangle. It should include the following methods that return boolean values indicating if the particular property holds: a. isRight (a right triangle) b. isScalene (no two sides are the same length) c. isIsosceles (exactly two sides are the same length) d. isEquilateral (all three sides are the same length).
Answer:
Explanation:
import java.io.*;
class Triangle
{
private double side1, side2, side3; // the length of the sides of
// the triangle.
//---------------------------------------------------------------
// constructor
//
// input : the length of the three sides of the triangle.
//---------------------------------------------------------------
public Triangle(double side1, double side2, double side3)
{
this.side1 = side1;
this.side2 = side2;
this.side3 = side3;
}
//---------------------------------------------------------------
// isRight
//
// returns : true if and only if this triangle is a right triangle.
//---------------------------------------------------------------
boolean isRight()
{
double square1 = side1*side1;
double square2 = side2*side2;
double square3 = side3*side3;
if ((square1 == square2 + square3) ||
(square2 == square1 + square3) ||
(square3 == square1 + square2))
return true;
else
return false;
}
// isValid
// returns : true if and only if this triangle is a valid triangle.
boolean isValid()
{
if ((side1 + side2 < side3) ||
(side1 + side3 < side2) ||
(side2 + side3 < side1))
return false;
else
return true;
}
// isEquilateral
//
// returns : true if and only if all three sides of this triangle
// are of the same length.
boolean isEquilateral()
{
if (side1 == side2 && side2 == side3)
return true;
else
return false;
}
// isIsosceles
//
// returns : true if and only if exactly two sides of this triangle
// has the same length.
boolean isIsosceles()
{
if ((side1 == side2 && side2 != side3) ||
(side1 == side3 && side2 != side3) ||
(side2 == side3 && side1 != side3))
return true;
else
return false;
}
// isIsosceles
// returns : true if and only if exactly no two sides of this
// triangle has the same length.
boolean isScalene()
{
if (side1 == side2 || side2 == side3 || side1 == side3)
return false;
else
return true;
}
}
//-------------------------------------------------------------------
// class Application
//
// This class is the main class of this application. It prompts
// the user for input to construct a triangle, then prints out
// the special properties of the triangle.
//-------------------------------------------------------------------
public class Application
{
//---------------------------------------------------------------
// getInput
//
// input : stdin - BufferedReader to read input from
// msg - message to prompt the user with
// returns : a double value input by user, guranteed to be
// greater than zero.
//---------------------------------------------------------------
private static double getInput(BufferedReader stdin, String msg)
throws IOException
{
System.out.print(msg);
double input = Double.valueOf(stdin.readLine()).doubleValue();
while (input <= 0) {
System.out.println("ERROR : length of the side of triangle must " +
"be a positive number.");
System.out.print(msg);
input = Double.valueOf(stdin.readLine()).doubleValue();
}
return input;
}
//---------------------------------------------------------------
// printProperties
//
// input : triangle - a Triangle object
// print out the properties of this triangle.
//---------------------------------------------------------------
private static void printProperties(Triangle triangle)
{
// We first check if this is a valid triangle. If not
// we simply returns.
if (!triangle.isValid()) {
System.out.println("This is not a valid triangle.");
return;
}
// Check for right/equilateral/isosceles/scalene triangles
// Note that a triangle can be both right triangle and isosceles
// or both right triangle and scalene.
if (triangle.isRight())
System.out.println("This is a right triangle.");
if (triangle.isEquilateral())
System.out.println("This is an equilateral triangle.");
else if (triangle.isIsosceles())
System.out.println("This is an isosceles triangle.");
else
// we do not need to call isScalene here because a triangle
// is either equilateral/isosceles or scalene.
System.out.println("This is an scalene triangle.");
}
// main
// Get the length of the sides of a triangle from user, then
// print out the properties of the triangle.
public static void main(String args[]) throws IOException
{
BufferedReader stdin = new BufferedReader
(new InputStreamReader(System.in));
double side1 = getInput(stdin,
"What is the length of the first side of your triangle? ");
double side2 = getInput(stdin,
"What is the length of the second side of your triangle? ");
double side3 = getInput(stdin,
"What is the length of the third side of your triangle? ");
System.out.print("Pondering...\n");
printProperties(new Triangle(side1, side2, side3));
}
}
(Find the number of days in a month) Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, If the user entered month 2 and year 2012, the program should display that February 2012 has 29 days. If the user entered month 3 and year 2015, the program should display that March 2015 has 31 days.
Maya wrote a program and forgot to put the steps in the correct order. Which step does Maya need to review? Pattern following Planning Segmenting Sequencing
Answer:
Sequencing
Explanation:
Answer:
SEQUENCING
Explanation:
You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your university of business. The scanner identifies one computer named Prince Hal that has many serious vulnerabilities. You deduce to whom the machine belongs. Explain the ethical implication of:________.
a. telling the owner what you have found,
b. telling you local administrator or security officer what you have found
c. exploiting one of the relatively minor vulnerabilities to show the owner how serious the exposure is
d. exploiting a relatively minor vulnerability as a prank without telling the owner,
e. telling the owner what you have found and the demanding money for details on the vulnerabilities
f. using one of the vulnerabilities to acquire control of the machine, downloading and installing patches and changing settings to address all the vulnerabilities, and never telling anyone what you have done.
Answer and Explanation:
The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.Compute -ABE16-DF416 using 15’s complement
Answer:
33600
Explanation:
Let M = ABE16
and N = DF416
In hexadecimal representation: 10 = A, 11 = B, 12 = C, 13 = D, 14 = E, 15 = F
Step 1: Find the 15's complement of N
F F F F F
- D F 4 1 6
2 0 B E 9
Step 2: Add 15's complement of N to M
A B E 1 6
+ 2 0 B E 9
C C 9 F F
Step 3: Find the 15's complement of CC9FF
F F F F F
- C C 9 F F
3 3 6 0 0
Therefore, ABE16 - DF416 using 15's complement is 33600
Identify a logical operation (along
with a corresponding mask) that, when
applied to an input string of 8 bits,
produces an output string of all 0s if and
only if the input string is 10000001.
Answer: Provided in the explanation section
Explanation:
The Question says;
Identify a logical operation (along
with a corresponding mask) that, when
applied to an input string of 8 bits,
produces an output string of all 0s if and
only if the input string is 10000001.
The Answer (Explanation):
XOR, exclusive OR only gives 1 when both the bits are different.
So, if we want to have all 0s, and the for input only 10000001, then we have only one operation which satisfies this condition - XOR 10000001. AND
with 00000000 would also give 0,
but it would give 0 with all the inputs, not just 10000001.
Cheers i hope this helped !!
What are the best data structures to create the following items? And why?
1. Designing a Card Game with 52 cards.
2. Online shopping cart (Amazon, eBay, Walmart, Cosco, Safeway, ...)
3. Online waiting list (De Anza College class waiting list, ...)
4. Online Tickets (Flight tickets, concert tickets, ...)
Answer:
The best structures to create the following items are
ARRAYHASHMAPS QUEUE SORTED LINK LISTSExplanation:
The best structures to create the following items are:
Array : for the storage of cards in a card game the best data structure to be used should be the Array data structure. this is because the size of the data ( 52 cards ) is known and using Array will help with the storing of the cards values in the Game.Hashmaps : Hashmap data structure should be implemented in online shopping cart this IS BECAUSE items can be easily added or removed from the cart therefore there is a need to map the Items ID or name to its actual database online waiting list are usually organised/arranged in a first-in-first-out order and this organization is best created using the queue data structure Sorted link lists is the best data structure used to create, store and manage online tickets. the sorted link data structure helps to manage insertions and deletions of tickets in large numbers and it also reduces the stress involved in searching through a large number of tickets by keeping the tickets in sorted listsIn 1987, Congress passed the Computer Security Act (CSA). This was the first law to address federal computer security. Under the CSA, every federal agency had to inventory its IT systems. Agencies also had to create security plans for those systems and review their plans every year.
A. True
B. False
Answer:
A.) True is the answer hope it helps
In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals?
a. Full-interruption
b. Desk check
c. Simulation
d. Structured walk-through
Answer:Full-interruption--A
Explanation: The Full-interruption is one of the major steps for a Disaster Recovery Plan, DRP which ensures businesses are not disrupted by saving valuable resources during a disaster like a data breach from fire or flood.
Although expensive and very risky especially in its simulation of a disruption, this thorough plan ensures that when a disaster occurs, the operations are shut down at the primary site and are transferred to the recovery site allowing Individuals follow every procedure, ranging from the interruption of service to the restoration of data from backups, also with the notification of appropriate individuals.
Look at attachment.
Answer: Choice 1
Explanation:
The turtle will loop around 9 times since each time we are subtracting 10 until it hits 10 from 100. Only the first one seems to be like that.
Hope that helped,
-sirswagger21
Answer:
Explanation:
I switch.my acounntt it got hacked
Consider a load-balancing algorithm that ensures that each queue has approximately the same number of threads, independent of priority. How effectively would a priority-based scheduling algorithm handle this situation if one run queue had all high-priority threads and a second queue had all low-priority threads
Answer and Explanation:
Consider giving greater priority to both the queue contains the national priority comment section as well as, therefore, first method the thread throughout this queue.If the item from either the major priority queue becomes decoupled, if the balancing between some of the number of comments in some of these two queues becomes disrupted, instead decouple one thread from either the queue comprising the low-value thread as well as position that one in the queue with the highest - priority loop to match the number of connections in such 2 queues.Whenever a new thread arrives with some kind of proper description, a friendly interface could've been introduced to just the queue contains fewer threads to achieve stability.Therefore, the load-balancing requirements for keeping about the same number of threads would be retained and the meaningful matter of top priority thread would also be retained.
Based on the information given, it is important to give higher priority to the queue that contains the high priority thread.
Also, once an element from the high priority queue is dequeued, then dequeue one thread from the queue containing low priority thread and this will be enqueued into the queue having high priority thread in order to balance the number of threads.
Since the priority queue automatically adjusts the thread, hence the removal of the thread from one priority queue to another is not a problem.
Learn more about threads on:
https://brainly.com/question/8798580
Write an INSERT statement that adds these rows to the Invoice_Line_Items table:
invoice_sequence: 1 2
account_number: 160 527
line_item_amount: $180.23 $254.35
line_item_description: Hard drive Exchange Server update
Set the invoice_id column of these two rows to the invoice ID that was generated
by MySQL for the invoice you added in exercise 4.
Answer:
Insertion query for first row :
INSERT into Invoice_Line_Items (invoice_sequence, account_number, line_item_amount, line_item_description) Values (1, 160, '$180.23', "Hard drive Exchange");
Insertion query for second row :
INSERT into Invoice_Line_Items (invoice_sequence, account_number, line_item_amount, line_item_description) Values (2, 527, '$254.35', "Server update");
Explanation:
* In SQL for insertion query, we use INSERT keyword which comes under DML (Data manipulation Language).
* Statement is given below -
INSERT into Table_name (column1, column2, ....column N) Values (value1, value2, .....value N);
* With the use of INSERT query we can insert value in multiple rows at a same time in a table which reduces our work load.
Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
< html>
Answer:
In HTML file
<body style="background-color:orange;">
Or
In CSS file
body {
background-color: orange;
}
Enter a formula in cell C9 using the PMT function to calculate the monthly payment on a loan using the assumptions listed in the Status Quo scenario. In the PMT formula, use C6 as the monthly interest rate (rate), C8 as the total number of payments (nper), and C4 as the loan amount (pv). Enter this formula in cell C9, and then copy the formula to the range D9:F9.
Answer:
=PMT(C6,C8,C4)
Put that in cell c9
Then use the lower right of the cell to drag it from D9:F9
In this exercise we have to use excel knowledge, so we have to:
=PMT(C6,C8,C4) in the cell C9 and extended to D9:F9
How is PMT calculated in Excel?PMT, one of the financial functions, calculates the payment for a loan based on constant payments and a constant interest rate. Use the Excel Formula Coach to figure out a monthly loan payment.
For this we need to put the form as:
=PMT(C6,C8,C4)
See more about excel at brainly.com/question/12788694
write the following function so that it returns the same result, but does
not increment the variable ptr. Your new program must not use anysquare brackets, but must use an integer variable to visit each double in the array. You may eliminate any unneeded variable.
double computeAverage(const double* scores, int nScores)
{
const double* ptr = scores;
double tot = 0;
while (ptr != scores + nScores)
{
tot += *ptr; } ptr++;
}
return tot/nScores;
b. Rewrite the following function so that it does not use any square brackets (not even in the parameter declarations) but does use the integervariable k. Do not use any of the functions such as strlen, strcpy, etc.
// This function searches through str for the character chr.
// If the chr is found, it returns a pointer into str where
// the character was first found, otherwise nullptr (not found).
const char* findTheChar(const char str[], char chr)
{
for(intk=0;str[k]!=0;k++)
if (str[k] == chr)
}
return &str[k];
return nullptr;
}
c. Now rewrite the function shown in part b so that it uses neither square brackets nor any integer variables. Your new function must not use any local variables other than the parameters.
Answer:
Explanation:
a.
// Rewriting the given function without using any square brackets
double computeAverage(const double* scores, int nScores)
{
const double* ptr = scores;
double tot = 0;
int i;//declaring integer variable
for(i=0;i<nScores;i++)
{
//using an integer variable i to visit each double in the array
tot += *(ptr+i);
}
return tot/nScores;
}
b.
// Rewriting the given function without using any square brackets
const char* findTheChar(const char* str, char chr)
{
for(int k=0;(*(str+k))!='\0';k++)
{
if ((*(str+k)) == chr)
return (str+k);
}
return nullptr;
}
c.
//Now rewriting the function shown in part b so that it uses neither square brackets nor any integer variables
const char* findTheChar(const char* str, char chr)
{
while((*str)!='\0')
{
if ((*str) == chr)
return (str);
str++;
}
return nullptr;
}
Consider the following concurrent tasks, in which each assignment statement executes atomically. Within a task, the statements occur in order. Initially, the shared variables x and y are set to 0.
Task 1 Task 2
x = 1 y = 1
a = y b = x
At the end of the concurrent tasks, the values ofa andb are examined. Which of the following must be true?
I. ( a == 0 ) ( b == 1 )
II. ( b == 0 ) ( a == 1 )
III. ( a == 1 ) ( b == 1 )
(A) I only
(B) II only
(C) III only
(D) I and II only
(E) I, II, and III
Answer:
(D) I and II only
Explanation:
Concurrent tasks is when there is more than one task to be performed but the order of the task is not determined. The tasks occur asynchronously which means multiple processors occur execute input instruction simultaneously. When x =1 and y = 1, the concurrent task will be performed and the a will be zero or either 1.
Write a program that takes in an integer in the range 10 to 100 as input. Your program should countdown from that number to 0, printing
the count each of each iteration After ten numbers have been printed to the screen, you should start a newline. The program should stop
looping at 0 and not output that value
I would suggest using a counter to cổunt how many items have been printed out and then after 10 items, print a new line character and
then reset the counter.
important: Your output should use %3d" for exact spacing and a space before and after each number that is output with newlines in order
to test correctly. In C please
Answer:
The program written in C language is as follows
#include<stdio.h>
int main()
{
//Declare digit
int digit;
//Prompt user for input
printf("Enter any integer: [10 - 100]: ");
scanf("%d", &digit);
//Check if digit is within range 10 to 100
while(digit<10 || digit >100)
{
printf("Enter any integer: [10 - 100]: ");
scanf("%d", &digit);
}
//Initialize counter to 0
int counter = 0;
for(int i=digit;i>0;i--)
{
printf("%3d", i); //Print individual digit
counter++;
if(counter == 10) //Check if printed digit is up to 10
{
printf("\n"); //If yes, print a new line
counter=0; //And reset counter to 0
}
}
}
Explanation:
int digit; ->This line declares digit as type int
printf("Enter any integer: [10 - 100]: "); -> This line prompts user for input
scanf("%d", &digit);-> The input us saved in digit
while(digit<10 || digit >100) {
printf("Enter any integer: [10 - 100]: ");
scanf("%d", &digit); }
->The above lines checks if input number is between 10 and 100
int counter = 0; -> Declare and set a counter variable to 0
for(int i=digit;i>0;i--){ -> Iterate from user input to 0
printf("%3d", i); -> This line prints individual digits with 3 line spacing
counter++; -> This line increments counter by 1
if(counter == 10){-> This line checks if printed digit is up to 10
printf("\n"); -> If yes, a new line is printed
counter=0;} -> Reset counter to 0
} - > End of iteration
The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a victim large sums of money for assisting them in secretly moving large sums of money.
a. True
b. False
Answer:
b. False
Explanation:
The system of fraud is called 4-1-9 scam. And yes, victims are always promised large sum of money to secretly help in moving a large sum of money.
The new Director of Information Technology has asked you to recommend a strategy to upgrade the servers on their network. Recommendations on server hardware, CPU chip set, speed, and caching are needed. You should also recommend which servers to upgrade first and determine whether any servers are still appropriate to keep.
Answer:
servers to be upgraded are : APPLICATION AND LOAD BALANCING SERVERS
servers still appropriate to use : DNS AND DHCP SERVERS
Explanation:
The recommendations to be made in line with what the new director of information is asking for includes :
1 ) For the servers to be upgraded : The servers that requires upgrades includes the APPLICATION SERVER and LOAD BALANCING SERVER. this is because these two servers are critical to the growth/expansion of any business, and they handle large volume of data
Recommendations on the servers upgrade includes:
Hardware : 2.3 GHz Intel Xeon Gold 5118 12-Core
CPU chip set : Socket: FCLGA3647, Type: NSBM
Speed : processor 3.2 GHz
caching: > 100 Gb
2) For servers that do not necessarily need to be upgraded : The servers that do not need immediate upgrade are DNS and DHCP
Remember to save _____ and be certain that you have your files saved before closing out.
public class Student {
private String getFood() {
return "Pizza";
}
public String getInfo() {
return this.getFood();
}
}
public class GradStudent extends Student {
private String getFood() {
return "Taco";
}
public void teach(){
System.out.println("Education!");
getInfo();
}
}
What is the output from this:
Student s1 = new GradStudent();
s1.teach();
Education! would be printed, followed by a run-time error when getInfo is called.
Education! Pizza
This code won't run because it won't compile.
Education! Taco
This code causes a run-time error because getInfo is not declared in the GradStudent class.
Answer:
getInfo(); ==
getSy.Info()
Explanation:
Get System Info
Seth would like to make sure as many interested customers as possible are seeing his business’s website displayed in their search results. What are a few things he could pay attention to in order to achieve this?
Answer:
Hi! Make sure that the website has a few things. Proper Keywords, the pages have the proper tags, a form on the website, contact information, CIty State, Etc., Then a phone number. Social media icons that link properly to the social media pages.
Explanation:
In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that are ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.
Answer:
automated
Explanation:
Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.
Using MARS/MIPS
A) Write a program which increments from 0 to 15 and display results in Decimal on the console
B) Modify above program to increment from 0 to 15 and display results in Hexadecimal on the console
Answer:
Explanation:
MIPS program which increments from 0 to 15 and display results in Decimal on the console
In this program the user defined procedures print_int and print_eot were used to print the integer values and new line characters(\n) respectively.the mechanisam of the loop is explaine in the comment section of the program.
addi $s0, $0, 0
addi $s1, $0, 15
print_int:
li $v0, 1 # system call to print integer
syscall
jr $ra # return
print_eol: # prints "\n"
li $v0, 4
la $a0, linebrk
syscall
jr $ra # return
main: . . .
li $a0, 0 # print 0
jal print_int # print value in $a0
loop: move $a0, $s0 # print loop count
jal print_int
jal print_eol # print "\n" character
addi $s0, $s0, 1 # increment loop count by 1
ble $s1, $s0, loop # exit if $s1<$s0
beq $s0, $0, end
end:
MIPS progam to increment from 0 to 15 and display results in Hexadecimal on the console
this program is slightly differed from the previous program in this program the system call issued in print_int is implemented with a system call that prints numbers in hex.
addi $s0, $0, 15
addi $s1, $0, 0
print_int:
li $v0,34 # syscall number for "print hex"
syscall # issue the syscall
jr $ra # return
print_eol: # prints "\n"
li $v0, 4
la $a0, linebrk
syscall
jr $ra # return
main: . . .
li $a0, 0 # print 0
jal print_int # print value in $a0
loop: move $a0, $s0 # print loop count
jal print_int
jal print_eol # print "\n" character
addi $s0, $s0, 1 # increment loop count by 1
ble $s1, $s0, loop # exit if $s0>$s1
beq $s0, $0, end
end:
Convert each of the following for loops into an equivalent while loop. (You might need to rename some variables for the code to compile, since all four parts a-d are in the same scope.)
// a.
System.out.println("a.");
int max = 5;
for (int n = 1; n <= max; n++) {
System.out.println(n);
}
System.out.println();
// b.
System.out.println("b.");
int total = 25;
for (int number = 1; number <= (total / 2); number++) {
total = total - number;
System.out.println(total + " " + number);
}
System.out.println();
// c.
System.out.println("c.");
for (int i = 1; i <= 2; i++) {
for (int j = 1; j <= 3; j++) {
for (int k = 1; k <= 4; k++) {
System.out.print("*");
}
System.out.print("!");
}
System.out.println();
}
System.out.println();
// d.
System.out.println("d.");
int number = 4;
for (int count = 1; count <= number; count++) {
System.out.println(number);
number = number / 2;
}
Answer:
~CaptnCoderYankee
Don't forget to award brainlyest if I got it right!
Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential __________ to the confidentiality of the data in the files
Answer:
maybe threat?
Explanation: