Answer:
Smart home-enabled devices can include appliances like refrigerators, washing machines, dryers, and toaster ovens, as well as heating and air conditioning units and lighting devices.
Explanation:
Smart home appliances include;
Sensors that collect information.WIFI Combability.The ability to send notifications to a smartphone app.What is a smart home appliance?A smart home is known to be home equipment that helps homeowners to control appliances, thermostats, lights, etc.
They are known to be used remotely via a smartphone or tablet through the aid of internet connection. They homes are often set up via wireless or hardwired systems.
Learn more about home appliances from
https://brainly.com/question/18713901
what is an unknown network called
Answer
It means the network has no name and your device has picked it up as a wifi / network.
Explanation:
This likely means the owners of the network have not set a SSID. ( SSID is network name.)
Is a pocket watch consider a computer
Answer:
I don't think a pocket watch is considered a computer based off of my logic. Other people may think differently tho.
Explanation:
Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per second. How long in (days or years) would it take for you to find the key to a code that used a 112-‐‑bit key on average? What encryption algorithm might have been used by the encryption system? (Give the name of an encryption algorithm that uses 112-‐‑bit-‐‑key.)
Answer:
Following are the solution to this question:
Explanation:
In point 1:
Trials frequency [tex]= \frac{100 \ million }{second}[/tex]
calculating the main length of cryptography = 112 bit
[tex]\to 100\ Million = 1 \times 10^8[/tex]
calculating the second year value:
[tex]\to 365 \times 24 \times 60 \times 60 =3153600\\\\[/tex]
[tex]=3.15 \times 10^7 \ seconds[/tex]
Currently, in average , at least half the possible sleeves is being used to verify the encryption process: [tex]2^{111} \ keys[/tex]
[tex]\to \frac{2^{111} \time3s 10^6}{3.15 \times 10^7}\approx 8.22 \times 10^{20} \ years[/tex]
the total time value will be [tex]8.22 \times 10^{20} \ years[/tex]
In point 2:
In cryptography, the common name is Triple DES (3DES), which would be the symmetric-key encrypted communication algorithm (TDEAor Triple DEA), which adds 3 times per block size only with the cryptographic method Data Encryption Standard ( DES).
Algorithm:-
The key package involves four DES keys, K1, K2, and K3, each 56-bit (except parity bits), Triple DES includes. Its encoding algorithm is::
[tex]ciphertext = EK3(DK2(EK1(plaintext)))[/tex]
I.e. K1, DES encrypt, K2 decrypt, then K3 encrypt DES.
The reverse is the decryption:
[tex]plaintext = DK1(EK2(DK3(ciphertext)))[/tex]
I.e. decrypt by K3, crypt by K2, decrypt by K1.
Every three-bit authentication encrypts a 64-bit block.
Its middle procedure in each situation it's the reverse of the first operation. It improves the strength of the key second option algorithm which offers DES native support with key option 3.
Which are elements involved in modeling a solution? Choose all that apply. A) often includes a visual graphic B) shows the flow of information from task to task C) assigns demands D) breaks the solution into tasks E) includes pseudocode
Often includes a visual graphic, shows the flow of information from task to task, breaks the solution into tasks and includes pseudocode are elements involved in modeling a solution. Hence, options A, B, D and E are correct.
What is pseudocode?Pseudocode is a made-up, informal language that aids in the creation of algorithms by programmers. A "text-based" detail design tool is pseudocode. The Pseudocode rules are not too complicated. Statements that demonstrate "dependence" must all be indented. Some of these are while, do, for, if, and switch.
Pseudo code: It's just a plain text document with annotations and informative text that implements an algorithm. It has no grammar like any other programming language, making it impossible for a computer to compile or interpret.
A simplified version of an algorithm that expresses coding logic in English is known as pseudocode. It enables programmers to plan the architecture of any algorithm using straightforward commands. Pseudocode describes numerous coding actions and their proper order mostly in plain English.
Thus, options A, B, D and E are correct.
For more information about pseudocode, click here
https://brainly.com/question/13208346
#SPJ2
Select the correct answer.
Steve is a recruiter for a large graphic design company. He is looking for a candidate who can translate any vision into reality and make tough decisions. Which quality is he looking for in an employee?
A.
teamwork
B.
leadership
C.
honesty
D.
dedication
E.
self-motivation
Answer:
D
Explanation:
Hard work and dedication prove that you will be there and do what you need to.
Answer:
isnt it leadership
Explanation:
making tough descisions..
which of the following are bee per frame attribute
Explanation:
where are the choices
List the data types that are allowed for SQL attributes.
Answer:
Explanation:
In the SQL database manipulation coding language, there are a variety of different available data types to use. These data types are the following.
NumericDate/TimeCharacter/StringUnicode Character/StringBinary3rd Party / MiscellaneousEach of these data types has a wide range of subcategories (data types as well) that each handle different variables in a coding sequence. These subcategories can be all seen in the attached picture below.
Which of the following statements is not true?A. A structured chart is a sequential representation of program designB. the Real-Time system is a particular case of a on-line-systemC. Batch totals are not incorporated while designing real-time applicationsD. 4GLs are used for application proto typingE. None of the above
Answer:
A structured chart is a sequential representation of program design
Explanation:
It is true that a real-time system which is a term to describe an operating system working in relation to real-time is actually a form of the online system. Hence, option B is not correct.
It is also true that Batch totals are not incorporated while designing real-time applications because Batch Data processing is carried out in a separate manner and at a time when the computer is free. Thus Option C is not Correct
It is also true that 4GL which stands for Forth generation programming language is used for application prototyping. Again Option D is not Correct.
However, a structured chart is not a sequential representation of program design, but rather a break down to the infinitesimal module in the program design. Hence, option A is the correct answer.
What is the focus of developers interested in the Internet of Things?
A. Converting electrical devices into programmable appliances
O B. Creating specialized software for enterprise systems
C. Creating social networking sites
D. Developing international teleconferencing capabilities
Answer: A. Converting electrical devices into programmable appliances
Explanation:
The focus is on converting electrical devices into programmable appliances. The correct option is A.
What are electrical devices?Devices that functionally rely on electric energy (AC or DC) to power their essential components are known as electric(al) devices (electric motors, transformers, lighting, rechargeable batteries, control electronics).
Electrical energy is received by electrical equipment, which directly convert it into various forms of energy like light, heat, or mechanical energy. For instance, an iron uses electrical energy to create heat that may be used to iron clothing.
Electrical energy is transformed into other forms of energy, such as heat, light, or sound, using electrical devices. To carry out a task, electronic gadgets regulate the flow of electrons.
The goal of Internet of Things developers is to turn electrical equipment into programmable appliances.
Thus, the correct option is A.
For more details regarding electrical devices, visit:
https://brainly.com/question/2538188
#SPJ2
What is the IP address of the second Ethernet adapter?
Answer: 172.16
Explanation:
The IP address of the second Ethernet adapter is 172.16
. (a) Prove or disprove carefully and in detail: (i) Θ is transitive and (ii) ω is transitive. (b) Assume n is a positive integer. Algorithm A(n: int) int z = 0; int temp = 0; for (int i = 0; i < n ; i++) { for (int j = 0 ; j < i ; j++) { int temp = i + j ; int z = z + temp; } } System.out.println(z) ; What is the input size for Algorithm A? Analyze carefully and explicitly the time complexity of A in terms of the input size. Show all steps. Is A a polynomial time algorithm? Justify your answer.
Answer:
The Following are the solution to this question:
Explanation:
In Option a:
In the point (i) [tex]\Omega[/tex] is transitive, which means it converts one action to others object because if [tex]\Omega(f(n))=g(n)[/tex] indicates [tex]c.g(n)<=f(n)[/tex]. It's true by definition, that becomes valid. But if [tex]\Omega(g(n))=h(n)[/tex], which implies [tex]c.h(n)<=g(n)[/tex]. it's a very essential component. If [tex]c.h(n) < = g(n) = f(n) \[/tex]. They [tex]\Omega(f(n))[/tex] will also be [tex]h(n)[/tex].
In point (ii), The value of [tex]\Theta[/tex] is convergent since the [tex]\Theta(g(n))=f(n)[/tex]. It means they should be dual a and b constant variable, therefore [tex]a.g(n)<=f(n)<=b.g(n)[/tex] could only be valid for the constant variable, that is [tex]\frac{1}{a}\ \ and\ \ \frac{1}{b}[/tex].
In Option b:
In this algorithm, the input size value is equal to 1 object, and the value of A is a polynomial-time complexity, which is similar to its outcome that is [tex]O(n^{2})[/tex]. It is the outside there will be a loop(i) for n iterations, that is also encoded inside it, the for loop(j), which would be a loop[tex](n^{2})[/tex]. All internal loops operate on a total number of [tex]N^{2}[/tex] generations and therefore the final time complexity is [tex]O(n^{2})[/tex].
A data warehouse is:
Answer:
Explanation:in computing, a data warehouse (DW or DWH), also known as an enterprise data warehouse (EDW), is a system used for reporting and data analysis, and is considered a core component of business intelligence. DWs are central repositories of integrated data from one or more disparate sources.
Answer:
Is A system that pulls together data from different sources within an organisation for reporting and analyzing
Explanation:
A new object of type list is created for each recursive invocation of f.A. TrueB. False
Answer:
True but double check!
what is java Encapsulation?
Answer:e
Explanation: Encapsulation is one of the four fundamental OOP concepts. The other three are inheritance, polymorphism, and abstraction. The other three are inheritance, polymorphism, and abstraction. Encapsulation in Java is a mechanism of wrapping the data (variables) and code acting on the data (methods) together as a single unit
4.17 LAB: Varied amount of input data ( C++)
Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outputs the average and max. A negative integer ends the input and is not included in the statistics.
Ex: When the input is:
15 20 0 5 -1
the output is:
10 20
(Please use C++)
Answer:
Written in C++
#include<iostream>
using namespace std;
int main()
{
int num;
int sum = 0;
cout<<"Input: ";
cin>>num;
int count = 0;
int max = 0;
while(num >= 0)
{
sum+=num;
cin>>num;
count++;
if(num>=max){
max = num;
}
}
cout<<(sum/count)<<endl;
cout<<max<<endl;
return 0;
}
Explanation:
I've added the full source code as an attachment where I use comments as explanation.
See Attachment
The max and the average of the input data will be determined through iterations and conditional statements.
The program in C++ is as follows
#include<iostream>
using namespace std;
int main(){
//This declares num
int num;
//This initializes sum to 0
int sum = 0;
//This prompts user for input
cout<<"Input: ";
//This gets input from the user
cin>>num;
//This initializes counter to 0
int count = 0;
//This initializes max to 0
int max = 0;
//The following iteration gets user input until user enters negative
while(num >= 0) {
//This line calculates the sum
sum+=num;
//This gets another input from the user
cin>>num;
//This increases counter by 1
count++;
//The following if statement checks for maximum
if(num>=max){
max = num;
}
}
//This prints the average
cout<<"Average: "<<(sum/count)<<endl;
//This prints the max
cout<<"Maximum: "<<max<<endl;
return 0;
}
See comments for program explanation
Read more about C++ programs at:
https://brainly.com/question/15410214
Max shot a video with a digital camera. Where did the video files get stored in the camera?
Answer:
In the memory sticks/cards of the digital camera
Explanation:
Many digital cameras come with removable storage cards in the form of memory cards, memory sticks and flask cards. Activities (pictures and videos) captured with these digital cameras are stored in these removable storage cards. These makes it easy for users to remove the storage cards and insert into other devices.
which data type could be used for the field, remark or comment?
Answer:
While CLOB/NCLOB types may seem attractive, they are not nearly as efficent as [N]VARCHAR for most of the functions you would usually want to run on them, and anyone who can't comment in 2000 or 4000 characters isn't likey to generate a comment you'd want to use anyway.
copied from google
hope that helps
One suggested means of gaining eye contact before reversing is to:____.
Answer:
hit the vehicle horn
Explanation:
Remember, a driver reversing may easily go unnoticed by pedestrians as the driver may be coming from behind. Thus, a suggested means of gaining the eye contact of pedestrians before reversing is to hit the vehicle horn.
If someone you don”t know asks where you go to school, what should you do?
Answer:come up something that sounds real but is not true.
Explanation: The reason why is because they could look it up if you tod them the real answer and then follow you and kidnap you and they could do a school shooting it"s not lying it's not it's protecting your self and others.#bettersafethansorry
The right thing to do when someone you don't know asks where you go to school, is do not respond.
Why talking to stranger has its cons?The act of talking to Strangers is one that can help a person to know more about a thing but it also has its disadvantage.
Conclusively, note that someone asking you about where you school may want to harm you or do some really bad and as such it is better not to respond when someone you don't know asks where you go to school.
Learn more about school from
https://brainly.com/question/6947486
#SPJ2
You want to decide whether you should drive your car to work or take the train. You know the one-way distance from your home to your place of work, and the fuel efficiency of your car (in miles per gallon). You also know the one-way price of a train ticket. You assume the cost of gas at $4 per gallon, and car maintenance at 5 cents per mile. Write an algorithm to decide which commute is cheaper.
Explanation:
Remember, an algorithm in simple words means a set of instructions or steps to be followed in other to solve a problem.
Note, to decide which commute is cheaper, it means the output of the algorithm should be the cheaper way to commute.
Using pseudocode do the following;
determine the inputs and outputs of the problem arrange the identified problem into micro-tasksdescribe each micro-tasks in the pseudocode Test the pseudocode by solving the problem.
You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember
there is an app on your phone that will use your location and show you that information. What is the app using?
A. Chip-and-pin technology
B. Augmented reality
C. Kiosk
D. Digital literacy
Since you remember there is an app on your phone that will use your location and show you that information. The app that is been used is option D. Digital literacy
What does "digital literacy" mean?The ability to communicate and obtain information in a culture where digital technologies like internet platforms, social media, and mobile devices are used more frequently is referred to as digital literacy.
Therefore, a person Understanding and using technology are both components of digital literacy. Your ability to find, consume, and produce information online can be improved with the aid of digital literacy skills. Understanding digital literacy allows you to utilize technology properly and helps you stay away from its risks.
Learn more about Digital literacy from
https://brainly.com/question/20718794
#SPJ1
Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example output for userNum = 40: 20 10 5 2 1 Note: These activities may test code with different test values. This activity will perform four tests, with userNum = 40, then with userNum = 2, then with userNum = 0, then with userNum = -1. See "How to Use zyBooks". Also note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "Program end never reached." The system doesn't print the test case that caused the reported message.
Answer:
public class Main
{
public static void main(String[] args) {
int userNum = 40;
while(userNum > 1){
userNum /= 2;
System.out.print(userNum + " ");
}
}
}
Explanation:
*The code is in Java.
Initialize the userNum
Create a while loop that iterates while userNum is greater than 1. Inside the loop, divide the userNum by 2 and set it as userNum (same as typing userNum = userNum / 2;). Print the userNum
Basically, this loop will iterate until userNum becomes 1. It will keep dividing the userNum by 2 and print this value.
For the values that are smaller than 1 or even for 1, the program outputs nothing (Since the value is not greater than 1, the loop will not be executed).
When considering server consolidation, plan on running ___________ vCPUs per core.a. 1 to 2b. 3 to 4c. 4 to 6d. 6 to 8
Answer:
c. 4 to 6
Explanation:
According to the VMware, a virtual machine software company widely known for producing the virtualization software, which is capable of making computer hardware components to be compartmentalized into various virtual layers, recommended the best practices of virtual CPU per core to be running 4 to 6.
Hence, in this case, the correct answer is option C
what is computing networking
why ISO is not protocol? however it is service
Answer:
First, the OSI model is just that, a model. Its use is not mandated for networking, yet most protocols and systems adhere to it quite closely. It is mainly useful for discussing, describing, and understanding individual network functions. Second, not all layers are used in some simpler applications.
Consider sorting n numbers stored in array A by first finding the smallest element of A and exchanging it with the element in A[1]. Then find the second smallest element of A, and exchange it with A[2]. Continue in this manner for the first n − 1 elements of A. Write pseudocode for this algorithm, which is known as selection sort. What loop invariant does this algorithm maintain? Why does it need to run for only the first n − 1 elements, rather than for all n elements? Give the best–case and worst–case running times of selection sort in Θ–notation.
Answer:
1. create the first array A
2. create the second array A1, the same length as array A.
3. create a loop to iterate over both arrays for a number of times specific to the length of the arrays, with a condition to get and pop only the minimum value of which arrays for every loop.
4. save both items to "a" for minimum value A and "b" for minimum value A1.
5. call a function to push the "a" variable value to A1 and "b" variable value to the array A.
Explanation:
This code would interchange the values of both arrays, the best-case scenario for the code is O( n ) where n is the number of items in both arrays and worst is the best-case multiplied by the number of time to compare all the items with the minimum value.
design an algorithm to find and display the price of the pizza per square inch
Answer:
The algorithm is as follows
StartRead the price of unit Pizza, PRead the Radius of Pizza, RArea = 3.14 * R * RPrice Per Area = P/AreaPrint Price Per AreaStopExplanation:
The algorithm is self explanatory.
However, take note of the following
Price Per Square inch is calculated by dividing the price (P) of the pizza by its areaA pizza has a circular surface, so the area will be calculated using Area = πR²So, the formula to calculate the required output is P/Area as shown in the algorithm above.1. Given a sequential list with n numbers, represented in a one-dimensional array A) Write an algorithm to check if the list has any duplication. Explain the time complexity of your algorithm. Can you think of a better algorithm to do the job? If so, briefly explain. B) Write an algorithm to find all the duplicate numbers in the list, if any. Explain the time complexity of your algorithm. Can you think of a better algorithm to do the job? If so, briefly explain.
Answer:
Define a function that accept a list as an argument. Save the length of the list as a variable and cast the list to a set and also save the length to a variable.
If the result of the subtraction of the set length from the list length is not equal to zero, then the list have duplicates.
Explanation:
A sample of the source code using Python,
def list_duplicate( list ):
list_len = len( list )
new_set = set( list )
set_len = len( new_set )
If list_len - set_len != 0 :
Print( " The list has duplicate " )
Which of these is the largest?
terabyte
exabyte
gigabyte
kilobyte
PLEASE HELP
Answer: Exabyte
Explanation:
I took the Quiz
A good administrative position to acquire as a stepping stone to further positions is
Answer:
A good administrative position to acquire as a stepping stone to future positions is an intern.
Explanation:
When an individual is an intern within an administrative sector, he will be able to learn many concepts and guidelines of this type of work, getting involved in various areas within the sector and accumulating knowledge that will serve him to occupy greater positions within the sector.
In this case, being a trainee is a better option due to the exchange of areas in which he can participate and which will show where his greatest capacities are concentrated within an administrative sector.