Answer:
Following are the solution to this question:
Explanation:
In point 1:
Trials frequency [tex]= \frac{100 \ million }{second}[/tex]
calculating the main length of cryptography = 112 bit
[tex]\to 100\ Million = 1 \times 10^8[/tex]
calculating the second year value:
[tex]\to 365 \times 24 \times 60 \times 60 =3153600\\\\[/tex]
[tex]=3.15 \times 10^7 \ seconds[/tex]
Currently, in average , at least half the possible sleeves is being used to verify the encryption process: [tex]2^{111} \ keys[/tex]
[tex]\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years[/tex]
the total time value will be [tex]8.22 \times 10^{20} \ years[/tex]
In point 2:
In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).
Algorithm:-
The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::
[tex]ciphertext = EK3(DK2(EK1(plaintext)))[/tex]
I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.
The reverse is the decryption:
[tex]plaintext = DK1(EK2(DK3(ciphertext)))[/tex]
I.e. decrypt by K3, crypt by K2, decrypt by K1.
Every three-bit authentication encrypts a 64-bit block.
Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.
Which of the following is not a valid PHP variable:
a. $_tenth,
b. $Tenth,
c. $10th,
d. $tENTH
Why is it not valid?
Answer:
c. $10th
Explanation:
In order to declare or create a valid variable in PHP, there are rules and guidelines to follow, these the following:
1. Valid variable begins with the $ sign.
2. It must begin with a letter or the underscore character only.
3. Valid variable cannot begin with a number after the $ dollar sign.
4. It can only contain alpha-numeric characters and underscores
5. Valid variable name is case-sensitive
Hence, given these rules and guidelines, the correct answer is option C, which after starting with $ sign begins with a number character.
Write a program that reads a number in meters convert it to feet and displays the result in java.
//import the Scanner class
import java.util.Scanner;
//Begin class definition
public class Converter {
//Begin main method
public static void main(String args[]) {
//Create an object of the Scanner class
//To allow for reading from standard inputs
Scanner input = new Scanner(System.in);
//Prompt the user to enter some number in meters
System.out.println("Enter the number in meters: ");
//Store the user's input in a variable of type double
double meters = input.nextDouble();
//Convert the user's input to feet
//Since 1 meter = 3.28 feet
double feet = meters * 3.28;
//Display the result
System.out.println("The number in feet is " + feet);
} //End of main method
} // End of class definition
Sample Output>> Enter the number in meters:
2
The number in feet is 6.56
Explanation:The program above has been written in Java and it contains comments explaining each line of the code. Kindly go through the comments.
A sample output resulting from a run of the code has also been provided.
The snapshots of the program and the sample output have been attached to this response.
Wha is a firewall is used for?
Answer:
Blocking programs from accessing the internet, and stopping certain traffic.
Explanation:
Three amperes of current are measured through a 27 resistor connected across a voltage
source. How much voltage does the source produce?
Answer:
81 Volts
Explanation:
V = I * R
so V = 3A * 27Ω = 81V
_______ is human thinking and problem-solving by a machine, including learning, reasoning, and self-correction.
O cloud computing
O Moore's law
O artificial intelligence
O biocomputing
Answer:
cloud computing
Explanation:
1. Given a sequential list with n numbers, represented in a one-dimensional array A) Write an algorithm to check if the list has any duplication. Explain the time complexity of your algorithm. Can you think of a better algorithm to do the job? If so, briefly explain. B) Write an algorithm to find all the duplicate numbers in the list, if any. Explain the time complexity of your algorithm. Can you think of a better algorithm to do the job? If so, briefly explain.
Answer:
Define a function that accept a list as an argument. Save the length of the list as a variable and cast the list to a set and also save the length to a variable.
If the result of the subtraction of the set length from the list length is not equal to zero, then the list have duplicates.
Explanation:
A sample of the source code using Python,
def list_duplicate( list ):
list_len = len( list )
new_set = set( list )
set_len = len( new_set )
If list_len - set_len != 0 :
Print( " The list has duplicate " )
What key stage involves considering design options?
Answer: Formulating your brief
Explanation:
The key stage that involves considering design options is formulating one's brief.
The aim of "Formulating Your Brief" is simply a way to determine the context in which a particular work will be to be undertaken after which the aim is then defined. It can either be formal or informal.
Create a class named Apartment that holds an apartment number, number of bedrooms, number of baths, and rent amount. Create a constructor that accepts values for each data field. Also create a get method for each field. Write an application that creates at least five Apartment objects. Then prompt a user to enter a minimum number of bedrooms required, a minimum number of baths required, and a maximum rent the user is willing to pay. Display data for all the Apartment objects that meet the user’s criteria or No apartments met your criteria if no such apartments are available.
Solution:
public class Apartment {
int aptNumber;
int bedrooms;
double baths;
double rent;
public Apartment(int num, int bdrms, double bths, double rent) {
aptNumber = num;
bedrooms = bdrms;
this.baths = bths;
this.rent = rent;
}
public int getAptNumber() {
return aptNumber;
}
public int getBedrooms() {
return bedrooms;
}
public double getBaths() {
return baths;
}
public double getRent() {
return rent;
}
}
import java.util.*;
public class TestApartments {
public static void main(String args[]) {
Scanner input = new Scanner(System.in);
Apartment apts[] = new Apartment[5];
apts[0] = new Apartment(101, 2, 1, 725);
apts[1] = new Apartment(102, 2, 1.5, 775);
apts[2] = new Apartment(103, 3, 2, 870);
apts[3] = new Apartment(104, 3, 2.5, 960);
apts[4] = new Apartment(105, 3, 3, 1100);
int bdrms;
int baths;
double rent;
int count = 0;
System.out.print("Enter minimum number of bedrooms needed >> ");
bdrms = input.nextInt();
System.out.print("Enter minimum number of bathrooms needed >> ");
baths = input.nextInt();
System.out.print("Enter maximum rent willing to pay >> ");
rent = input.nextDouble();
System.out.println("\nApartments meeting citeria of\nat least " + bdrms + " bedrooms, at least " + baths + " baths, and " + " no more than $" + rent + " rent:");
// Write your code here
boolean isExist = false;
for(int i=0; i<apts.length; i++){
if(checkApt(apts[i], bdrms, baths, rent)){
display(apts[i]);
isExist = true;
}
}
if(!isExist){
System.out.println("No apartments met your criteria");
}
}
public static boolean checkApt(Apartment apt, int bdrms, double baths, double rent) {
// Write your code here
if(apt.getBedrooms()>=bdrms && apt.getBaths()>=baths && apt.rent<=rent)
return true;
return false;
}
public static void display(Apartment apt) {
System.out.println(" Apt #" + apt.getAptNumber() + " " + apt.getBedrooms() +" bedrooms, and " + apt.getBaths() + " baths. Rent $" + apt.getRent());
}
}
List the data types that are allowed for SQL attributes.
Answer:
Explanation:
In the SQL database manipulation coding language, there are a variety of different available data types to use. These data types are the following.
NumericDate/TimeCharacter/StringUnicode Character/StringBinary3rd Party / MiscellaneousEach of these data types has a wide range of subcategories (data types as well) that each handle different variables in a coding sequence. These subcategories can be all seen in the attached picture below.
A denial-of-service attack is one of the most common attacks on a system.
a. True
b. False
Answer:
A: true
Explanation:
Yes, the DDOS attack as it is called is the most common of the attacks used to take sites down, as it is relatively simple to execute, just a large amount of requests to overload the site and make it fall
The Boffo Balloon Company makes helium balloons. Large balloons cost $13.00 a dozen, medium-sized balloons cost $11.00 a dozen, and small balloons cost $8.60 a dozen. Customer order information includes customer name, quantity ordered, and size. This program should output the customer order information and total sales according to what and how many balloons they have ordered.
Answer:
name = input("Enter customer name: ")
quantity = int(input("Enter quantity: "))
size = input("Enter size [large-medium-small]: ")
if size == "large":
sales = (quantity / 12) * 13
if size == "medium":
sales = (quantity / 12) * 11
if size == "small":
sales = (quantity / 12) * 8.6
print(name + " ordered " + str(quantity) + " " + size + " ballons")
print("Total sales is $" + str(sales))
Explanation:
*The code is in Python.
Ask the user to enter name, quantity, and size
Check the size using if structure. Depending on the size, calculate the sales using the given cost for for a dozen.
Print the order information and total sales
What will be the value of EAX when the following sequence of instructions has executed?
a. push 5.b. push 10.c. push 20.d. pop eax.
Answer:
20
Explanation:
The value of EAX would be 20. This is a 32 bit version of AX register. It has two common purposes.
1. It is useful for storing the return value of a function
2. It is used as register while performing some kinds of calculations.
The value is not preserved. It is therefore volatile in nature as a register.
Read each app feature and select all of the ones that are examples of humane design:
A.
Rewards increase as you play more
B.
Periodic alerts asking if you want to quit
C.
Suggested options for offline activities
D.
Penalties for leaving the app
E.
Autoplay and countdown features
F.
Settings to keep track of usage time
G.
Settings to control the amount of notifications
Answer:
B, C, F, G
Explanation:
Digital Citizenship
Among the options given, the examples of humane design are as follows:
Periodic alerts asking if you want to quit.Suggested options for offline activities.Settings to keep track of usage time.Settings to control the amount of notifications.Thus, the correct options for this question are B, C, F, and G.
What do you mean by Humane design?The Humane design may be defined as a type of design system that significantly emphasizes the user's experience and well-being. It takes deals with the processes on account of how people interact with technology.
According to the context of this question, examples of humane design are turning off all notifications that aren't from people, charging your device outside of your bedroom, eliminating social media, setting to keep track of usage time, etc. All these activities which are of human nature are now controlled by technology.
Therefore, the correct options for this question are B, C, F, and G.
To learn more about Humane design, refer to the link:
https://brainly.com/question/18187305
#SPJ2
PLLLLLLEEEEEEEEEAAAAAAAASSSSSSSSSEEEEEEEE HHHHHHHEEEEEELLLLLLLPP MMMMMMEEEEEEEHHHHHHHH
Imagine that you own a small business. Give all reasons why you should buy an ink-jet printer.
Answer:
Follows are the explanation to this question:
Explanation:
It works well with a jet ink printer. Even so, its ink cartridges were pricey. Inkjet printers could be low-cost because you sometimes can buy a basic print for just $30. This is not as durable as inkjet printers, and it provides good quality copies. The inkjet printer may be the right choice if you ever don't print several pages. However, the 30 $printer may want a 20 $cartridge and replenish. Check the monthly duty period for both the costs each tab.
A new network administrator is hired to replace a consultant that has been running the network for several months and whose contract was just cancelled. After a month of working on the network, the new network administrator realized there are some network issues and configuration changes in the server settings. The log files on the servers do not contain any error messages related to the issues or changes. What could be the problem
Answer:
yrgfyfhfhcgcjvhvchgcgctffxfxfxfxgxgfch
4.17 LAB: Varied amount of input data ( C++)
Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outputs the average and max. A negative integer ends the input and is not included in the statistics.
Ex: When the input is:
15 20 0 5 -1
the output is:
10 20
(Please use C++)
Answer:
Written in C++
#include<iostream>
using namespace std;
int main()
{
int num;
int sum = 0;
cout<<"Input: ";
cin>>num;
int count = 0;
int max = 0;
while(num >= 0)
{
sum+=num;
cin>>num;
count++;
if(num>=max){
max = num;
}
}
cout<<(sum/count)<<endl;
cout<<max<<endl;
return 0;
}
Explanation:
I've added the full source code as an attachment where I use comments as explanation.
See Attachment
The max and the average of the input data will be determined through iterations and conditional statements.
The program in C++ is as follows
#include<iostream>
using namespace std;
int main(){
//This declares num
int num;
//This initializes sum to 0
int sum = 0;
//This prompts user for input
cout<<"Input: ";
//This gets input from the user
cin>>num;
//This initializes counter to 0
int count = 0;
//This initializes max to 0
int max = 0;
//The following iteration gets user input until user enters negative
while(num >= 0) {
//This line calculates the sum
sum+=num;
//This gets another input from the user
cin>>num;
//This increases counter by 1
count++;
//The following if statement checks for maximum
if(num>=max){
max = num;
}
}
//This prints the average
cout<<"Average: "<<(sum/count)<<endl;
//This prints the max
cout<<"Maximum: "<<max<<endl;
return 0;
}
See comments for program explanation
Read more about C++ programs at:
https://brainly.com/question/15410214
Suppose a computer system and all of its applications are completely bug free. Suppose further that everyone in the world is completely honest and trustworthy. In other words, we do not need to consider fault isolation. How should the operating system allocate the processor
Answer:
lots of assumption here but i belive the processing unit will most definitely increase in performance
Explanation:
The REPE prefix does which of the following ?a. Repeats an instruction while the zero flag is clearb. Repeats an instruction while the zero flag is setc. Repeats an instruction while the carry flag is cleard. Repeats an instruction while the carry flag is set
Answer:
repeats an instruction while the Zero flag is set
Explanation:
hope this helps you :)
Answer:
Repeats an instruction while the zero flag is set.
Explanation:
I just took the quiz
design an algorithm to find and display the price of the pizza per square inch
Answer:
The algorithm is as follows
StartRead the price of unit Pizza, PRead the Radius of Pizza, RArea = 3.14 * R * RPrice Per Area = P/AreaPrint Price Per AreaStopExplanation:
The algorithm is self explanatory.
However, take note of the following
Price Per Square inch is calculated by dividing the price (P) of the pizza by its areaA pizza has a circular surface, so the area will be calculated using Area = πR²So, the formula to calculate the required output is P/Area as shown in the algorithm above.what is java Encapsulation?
Answer:e
Explanation: Encapsulation is one of the four fundamental OOP concepts. The other three are inheritance, polymorphism, and abstraction. The other three are inheritance, polymorphism, and abstraction. Encapsulation in Java is a mechanism of wrapping the data (variables) and code acting on the data (methods) together as a single unit
The UDP protocol provides reliable, connectionless service.
a) true
b) false
1. What is the term for a problem-
solving model in which a task
ordinarily performed by
one person is outsourced to a
large group or community?
a. Collective intelligence
b. Crowdsourcing
c. Folksonomy
d. Mashup
Answer:
Option b (Crowdsourcing) is the correct approach.
Explanation:
The method of acquiring the resources, innovations, or information required by soliciting participation from some kind of broad amount of participants instead of just conventional employees through vendors, and specifically through the online population. It is the method of obtaining suggestions or support from a wide variety of persons, typically via the internet, on something like a campaign.The other options offered aren't relevant to the description given. So, the solution here is just the right one.
Write a program that will simulate a change machine found at cash registers. Input the amount due and amount paid from the keyboard. Tell the user how much change is owed and number of quarters, dimes, nickels, and pennies in change a customer would receive. Pay special attention to roundoff error. Your program should use division and modular division. No if’s or loops may be used. You may assume all change will be between $0 and $.99 Hint: Modular division is a great way to find the remainder of a division. Think about how you can use this to calculate the change that is left over after some coins are given.
Answer:
amount_due = float(input("Enter amount due: "))
amount_paid = float(input("Enter amount paid: "))
change = amount_paid - amount_due
pennies = change * 100
quarters = int(pennies / 25)
pennies %= 25
dimes = int(pennies / 10)
pennies %= 10
nickels = int(pennies / 5)
pennies %= 5
pennies = int(pennies)
print("Your change is $%.2f" % change)
print("Quarters: " + str(quarters) + ", Dimes: " + str(dimes) + ", Nickels: " + str(nickels) + ", Pennies: " + str(pennies))
Explanation:
*The code is in Python.
Ask the user to enter amount due and amount paid
Calculate the change
Convert change to pennies
Find the number of quarters, dimes, nickels in the pennies using division and modular operator. The remaining amount equals the number of pennies
Print the change
Print the number of quarters, dimes, nickels, and pennies
Let me demonstrate calculating the quarters:
Let's say pennies equals 39,
quarters = int(pennies / 25) → int(39/35) → int(1.11) = 1
pennies %= 25 (same as pennies = pennies % 25) → 39 % 25 → 14
Complete the statement below with the correct term.
The primary disk drive that boots the system is known as the
.
Answer:
boot disk
Explanation:
This disk contains files required by the boot sequence as well as the operating system, which is loaded at the end of the startup process.
Master
Explanation:
Master is the term used for to describe the primary disk, one that boots, or start up, the system
Which is an example of appropiate online behavior?
Answer:
Positive online behaviour is the ability to develop positive, appropriate and constructive online relationships with peers, friends and families in a variety of mediums. It includes netiquette, appropriate contact and communication with others, and issues such as cyberbullying, problematic usage and unethical behaviour.
What is the focus of developers interested in the Internet of Things?
A. Converting electrical devices into programmable appliances
O B. Creating specialized software for enterprise systems
C. Creating social networking sites
D. Developing international teleconferencing capabilities
Answer: A. Converting electrical devices into programmable appliances
Explanation:
The focus is on converting electrical devices into programmable appliances. The correct option is A.
What are electrical devices?Devices that functionally rely on electric energy (AC or DC) to power their essential components are known as electric(al) devices (electric motors, transformers, lighting, rechargeable batteries, control electronics).
Electrical energy is received by electrical equipment, which directly convert it into various forms of energy like light, heat, or mechanical energy. For instance, an iron uses electrical energy to create heat that may be used to iron clothing.
Electrical energy is transformed into other forms of energy, such as heat, light, or sound, using electrical devices. To carry out a task, electronic gadgets regulate the flow of electrons.
The goal of Internet of Things developers is to turn electrical equipment into programmable appliances.
Thus, the correct option is A.
For more details regarding electrical devices, visit:
https://brainly.com/question/2538188
#SPJ2
A data warehouse is:
Answer:
Explanation:in computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence. DWs are central repositories of integrated data from one or more disparate sources.
Answer:
Is A system that pulls together data from different sources within an organisation for reporting and analyzing
Explanation:
Sending messages electronically to one or more recipients is called
Answer:
Forward all
Explanation:
Answer:
Explanation:
Instant Messaging/Text Messaging
They predicted another cold day in Seattle. They predicted another windy day in Seattle. Combine the sentences into one sentences
Answer:
They predicted another cold, windy day in Seattle.
What is the IP address of the second Ethernet adapter?
Answer: 172.16
Explanation:
The IP address of the second Ethernet adapter is 172.16