Answer:
3
Explanation:
We can split the expression into two sections
First Section:
7 // 2 = 3. Using the floor division we only utilize the integer part.
Second Section:
10 % 2**4 = 0**4 = 0
Bringing back the full version expression we have
3 + 0 = 3
The program is the set of instructions a computer obeys
Answer:
True
Explanation:
a program is basicly just a list of commands you can run over and over again.
AWS's EC2 is primarily considered which type? OA OB. Maas O Claas O D. None of the above O E. Serverless
Answer:
IaaS (Infrastructure as a Service)
"Amazon takes the responsibility of networking, storage, server and virtualization and the user is responsible for managing the Operating System, middleware, runtime, data and application."
Given the following array definition, write a constant declaration named ArraySize that automatically calculates the size in bytes, of the array:
newArray DWORD 10,20,30,40,50
a) arraysize=(S-newArray)
b) arraysize#(S-new,Array)/2
c) arraySize- (S-newArray)/4
d) arraySize- (S-arraySize)
Answer:
ArraySize = ($ - newArray)
Explanation:
Given
Array name: newArray
Type: DWORD
Required
The size of the array in bytes
The following formula is used to calculate the size of an array in assembly language.
Variable = ($-Array name)
So, we have:
ArraySize = ($ - newArray)
Where ArraySize is the variable that holds the size of newArray (in bytes)
Create a class, CallClass, with two methods to show call by value and call by reference. One method has two parameters that are any primitive types, whereas the other has a parameter that is an object of any class. Create a CallClassTest class that calls the two methods with proper arguments to show call by value and call by reference. You do not need to read the values of parameters from the screen. (5 pts)
Answer:
The output file is given below.
Explanation:
Please visit gotit-pro.com to get complete working code.
An organization needs to integrate with a third-party cloud application. The organization has 15000 users and does not want to allow the cloud provider to query its LDAP authentication server directly. Which of the following is the BEST way for the organization to integrate with the cloud application?
a. Upload a separate list of users and passwords with a batch import.
b. Distribute hardware tokens to the users for authentication to the cloud
c. Implement SAML with the organization's server acting as the identity provider.
d. Configure a RADIUS federation between the organization and the cloud provider
Answer:
The BEST way for the organization to integrate with the cloud application is:
c. Implement SAML with the organization's server acting as the identity provider.
Explanation:
Implementing SAML (Security Assertion Markup Language) integrations will provide more security to the organization (identity provider) as users' credentials are exposed to fewer parties. SAML authenticates the users to the cloud application provider. SAML enables the organization to pass authorization credentials to the service provider by transferring the users' identities to the service provider.
List any two characteristics of ASCC.
Answer:
spirit of cooperation, collective responsibility
Explanation:
i had that question before
The two characteristics of Automatic sequence controlled calculator ( ASCC) include the following:
It is large sized,it makes use of a rotating shaft, andIt has the ability to perform different tasks at the same time.What is Automatic sequence controlled calculator ( ASCC)?The Automatic sequence controlled calculator (ASCC) is defined as the machine that was first installed in Cambridge in 1944 which was designed to solve advanced mathematical physics problems encountered in research.
The characteristics of Automatic sequence controlled calculator ( ASCC) include the following:
It is a very larger machine with the weight of about 5 tons.It's engine makes use of makes use of a horizontal rotating shaft.It has the ability to perform different tasks at the same time.Learn more about calculators here:
https://brainly.com/question/30197381
#SPJ2
I connected to an external hard drive to transfer some photos from my vacation. When I try to drag the photo, it bounces right back and does not transfer. What is the likely cause of this issue?
a. hard drive is full
b. photos were taken in a different country
c. USB port is broken
d. the file structure of the 2 hard drives are not compatible
The answer is D, What is the likely cause of this issue is that the file structure of the two hard drives are not compatible.
The file structure or file system, of a hard drive, tells the disk how to read, write and store information on the drive. Some file systems do not allow the disk to store any files and often do not display error messages. If we try to drag a file onto a hard drive with this kind of file structure, the action would simply not be performed. This can be fixed by formatting the disk partition into a new file system.
Option B states that the issue may be that the photos were taken in a different country. This is not the cause of the problem because regardless of where the pictures are taken, they are all stored in common formats such as:
JPEGPNGJFIFAny external hard drive capable of storing images will have the ability to receive files in these formats as well as many other image formats. For this reason, option B is False.
The question states that you were able to connect the external Hard drive and drag files onto it, though unsuccessfully. This tells us that the USB port is working as intended, if it were not working, it would not display the Hard drive onto the computer and we would not be able to drag files to it. Therefore, option C is false
Insufficient Hard drive storage space is a common issue in not being able to transfer files between hard drives. However, if this were the case, the user would be shown a message displaying the error. The message may look like:
"Insufficient space on the disk.""The Disk is full.""Not enough memory to complete this action"The exact wording may vary depending on the operating system in use. Since the question states that the files simply "bounces back" without an error message displaying, we can infer that option A is false.
For more help with Hard drive issues see: https://brainly.com/question/14254444?referrer=searchResults
Company A has a project plan for a new product under development. The product will be one of many released in the coming year. The plan, if disclosed, might give Company A's competition a market advantage. Which ISO 27002 classification level is most likely assigned to this document?
a) Public Documents
b) Proprietary
c) Highly Confidential
d) Top Secret
Answer:
Company A
The ISO 27002 classification level that is most likely assigned to this document is:
b) Proprietary
Explanation:
The ISO 27002 classification levels adopted by commercial organizations are Restricted (top secret is preferred in government circles), Confidential, Internal (or proprietary), and Public. Since the new product is under development, one of many, and most likely known to the project team, the project plan will be classified as Proprietary. Company A designates this document as Proprietary or Internal to show that disclosure of the information to its competitors is not allowed. This level of classification shows that Company A can establish intellectual property rights over the document.
A hierarchy chart can be helpful for a. planning the functions of a program b. naming the functions of a program c. showing how the functions of a program relate to each other d. all of the above e. a and c only
Answer:
Hence the correct options are option B and option C.
Explanation:
Hierarchy Chart means top to bottom structure 0f a function or a program or an organization.
Planning the functions of a program means deciding beforehand that what are the functions of a program and what to try to do and when to try to, hierarchy Charts are often helpful In doing/knowing this all.
Showing how the functions of a program relate to every other means what's the connection between two functions for instance if we have a hierarchical chart of a corporation member then we'll have the connection among the members of the team i.e., first, we'll have CEO, then Manager then team/ project lead then team members and by using hierarchical chart ready to " we will be able to identify the connection among them. during a similar way, we will have a relationship among the functions of a program using the hierarchical chart.
As the first step, load the dataset from airline-safety.csv by defining the load_data function below. Have this function return the following (in order):
1. The entire data frame
2. Total number of rows
3. Total number of columns
def load_data():
# YOUR CODE HERE
df, num_rows, num_cols
Answer:
import pandas as pd
def load_data():
df = pd.read_csv("airline-safety.csv')
num_rows = df.shape[0]
num_cols = df.shape[1]
return df, num_rows, num_cols
Explanation:
Using the pandas python package.
We import the package using the import keyword as pd and we call the pandas methods using the dot(.) notation
pd.read_csv reads the csv data into df variable.
To access the shape of the data which is returned as an array in the format[number of rows, number of columns]
That is ; a data frame with a shape value of [10, 10] has 10 rows and 10 columns.
To access the value of arrays we use square brackets. With values starting with an index of 0 and so on.
The row value is assigned to the variable num_rows and column value assigned to num_cols
Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume’s formatting.
Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.
Answer:
when dressing feaded back is postive and then list areas of inprovmenr to met the job requirements
Explanation:
Design a dynamic programming algorithm for the following problem.
Find the maximum total sale price that can be obtained by cutting a rod of n units long into integer-length pieces if the sale price of a piece i units long is pi for i = 1, 2, . . . , n. What are the time and space efficiencies of your algorithm?
Answer:
please mark me brainlist
Explanation:
Write a C program to input a character, then check if the input
character is digit, letter, or other character.
Answer:
// CPP program to find type of input character
#include <iostream>
using namespace std;
void charCheck(char input_char)
{
// CHECKING FOR ALPHABET
if ((input_char >= 65 && input_char <= 90)
|| (input_char >= 97 && input_char <= 122))
cout << " Alphabet ";
// CHECKING FOR DIGITS
else if (input_char >= 48 && input_char <= 57)
cout << " Digit ";
// OTHERWISE SPECIAL CHARACTER
else
cout << " Special Character ";
}
// Driver Code
int main()
{
char input_char = '$';
charCheck(input_char);
return 0;
}
Explanation:
// CPP program to find type of input character
#include <iostream>
using namespace std;
void charCheck(char input_char)
{
// CHECKING FOR ALPHABET
if ((input_char >= 65 && input_char <= 90)
|| (input_char >= 97 && input_char <= 122))
cout << " Alphabet ";
// CHECKING FOR DIGITS
else if (input_char >= 48 && input_char <= 57)
cout << " Digit ";
// OTHERWISE SPECIAL CHARACTER
else
cout << " Special Character ";
}
// Driver Code
int main()
{
char input_char = '$';
charCheck(input_char);
return 0;
}
similarities between inline css and internal css
Answer:
CSS can be applied to our website's HTML files in various ways. We can use an external css, an internal css, or an inline css.
Inline CSS : It can be applied on directly on html tags. Priority of inline css is greater than inline css.
Internal CSS : It can be applied in web page in top of the page between heading tag. It can be start with
Which are the best networking projects for a final year student in college
Answer:
The best networking project for a final year are Security issues with mobile IP.IP based patients monitoring systems.A red team initiated a DoS attack on the management interface of a switch using a known vulnerability. The monitoring solution then raised an alert, prompting a network engineer to log in to the switch to diagnose the issue. When the engineer logged in, the red team was able to capture the credentials and subsequently log in to the switch. Which of the following actions should the network team take to prevent this type of breach from reoccurring?
A. Encrypt all communications with TLS 13
B. Transition from SNMPv2c to SNMPv3 with AFS-256
C. Enable Secure Shell and disable Telnet
D. Use a password manager with complex passwords
Answer:
Hence the answer is Option A Encrypt all communication with TLS 1 3.
Explanation:
Transportation Layer Security (TLS 1 3)---->TLS stands for Transport Layer Security and is the successor to SSL (Secure Sockets Layer). TLS provides secure communication between web browsers and servers. The connection itself is secure because symmetric cryptography is used to encrypt the transmitted data.
SNMPv3 Security with 256 bit AES encryption is not available for all devices. The net-snmp agent does not support AES256 with SNMPv3.so it is not the correct option.
The best choice is an option a because TLS 1 3 because,
TLS version 1 3 helped in removing all the insecure features such as:
SHA-1
RC4
DES
3DES
AES-CBC
While troubleshooting an Internet connection problem for your network, you restarted the modem and then the router. The router is now communicating with the Internet, which you can confirm by observing the blinking light on the router's WAN indicator. However, now your laptop is not communicating with the router. Order the commands below to fix the problem and confirm connectivity.
a. ping
b. ipconfig /renew
c. nslookup microsoft.com
d. ipconfig /release
Answer:
d. ipconfig /release
b. ipconfig /renew
a. ping
c. nslookup microsoft.com
Explanation:
A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.
Basically, it is an electrical device or node that is designed to connect two (2) different networks (in different locations) together and allows them to communicate.
Generally, routers are configured using a standard routing protocol with an IP address as the default gateway.
Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.
Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.
On a related note, when a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.
I. ipconfig /release
II.. ipconfig /renew
III. ping
IV. nslookup microsoft.com
Suppose a program written in language L1 must be executed on a machine running a program running in language L0. What important operation must take place
Question Completion with Options:
a. Translation of the entire L1 program into L0 code
b. Translation of the L0 program into L1 code
c. Creation of a language L3 that interprets L0 instructions
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Answer:
The important operations that must take place in this scenario are:
a. Translation of the entire L1 program into L0 code
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Explanation:
Translation enables decoding to take place. This means that the L1 program is decoded into a language that the L0 program can understand and execute. Without this translation, the higher level language of L1 will not be understood by the machine language of the L0 programs. Translation of a code creates a shared understanding, thereby easing program execution. Code translation is simultaneously accompanied by interpretation.
Consider a short, 90-meter link, over which a sender can transmit at a rate of 420 bits/sec in both directions. Suppose that packets containing data are 320,000 bits long, and packets containing only control (e.g. ACK or handshaking) are 240 bits long. Assume that N parallel connections each get 1/ N of the link bandwidth. Now consider the HTTP protocol, and assume that each downloaded object is 300 Kbit long, and the initial downloaded object contains 6 referenced objects from the same sender.
Required:
Would parallel download via parallel instances of non-persistent HTTP make sense in this case? Now consider persistent HTTP. Doyou expect significant gains over the non-persistent case?
There must be security policies in place to set core standards and requirements when it comes to encrypted data.
a. True
b. False
Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and settings. These can usually be found in the settings/options area of the browser. Identify the web browser you are analyzing and answer the following questions/prompts:
1. List and explain/discuss the privacy and security features that the browser has to offer.
2. How do these privacy and security features protect individuals?
3. How do these privacy and security features affect what businesses can do on the Internet in terms of gathering customer data?
Solution :
Chrome web browser
The Chrome web browser uses a range of privacy and security settings for its customers. They include several security indicators as well as malware protection. Chrome uses the sandboxing technology, which prevents the harmful viruses and Trojans from reaching the computers.
Chrome provides a safe browsing by giving us an alert whenever we try to browse some harmful web sites. It also warns you if we use a username and password combination which has been compromised in any data leak.
Chrome also serves to protect the individuals :
It provides a features of Ad blocking.
When we want to browse safely without being recognized or without storing any credentials, Chrome provides an Incognito mode.
Many businesses can be done on the internet using Chrome platform that is safe and authenticate to gather and collect data and information.
Question 3 of 5.
Which of the following option(s) explain the need for ETL?
O ETL provides a method of moving the data from various sources into a data warehouse.
ETL is a predefined process for accessing and manipulating source data into the target database.
Allow verification of data transformation, aggregation and calculations rules.
O All of the above
The correct option is "All of the above".
ETL simply means “extract, transform, and load.” ETL is a vital process in the strategies of data integration.
ETL also allows for verification of data transformation, aggregation and calculations rules.
Furthermore, ETL enables companies to be able to gather data from different sources and then consolidate the data hats gathered into a single and centralized location.
ETL also allows different types of data to be able to work together.
In conclusion, based on the information given above, the answer will be All of the above.
Read related link on:
https://brainly.com/question/13333461
Illustrate why sally's slide meets or does not not meet professional expectations?
create a function that has an argument is the triple jump distance. It returns the estimate of vertical jump height. The world record for the triple jump distance is 18.29 meters by Johnathan Edwards. What's our prediction for what Edwards' vertical jump would be
Answer:
function predicting vertical
def predict_vertical(triple):
# using least squares model parameters
ls_vertical = ls_slope*triple + ls_intercept
return ls_vertical
# Johnathan Edwards prediction
triple = 18.29 # m
vertical = predict_vertical(triple)
print("Edward's vertical jump prediction would be {:.2f} meters.".format(vertical))
plt.legend(['linear regression','least squares','data'])
plt.grid()
plt.show()
Explanation:
list two ways to insert a chart in powerpoint
Answer:
1st way: On the Insert tab, in the Illustrations group, click Chart. In the Insert Chart dialog box, click a chart, and then click OK.
2nd way: Click INSERT > Chart. Click the chart type and then double-click the chart you want.
The Lisp function LENGTH counts the number of elements in the top level of a list. Write a function ALL-LENGTH of one argument that counts the number of atoms that occur in a list at all levels. Thus, the following lists will have the following ALL-LENGTHs.
(A B C) => 3
((A (B C) D (E F)) => 6
(NIL NIL (NIL NIL) NIL ) => 5
Answer:
bc
Explanation:
A network administrator needs 10 prevent users from accessing the accounting department records. All users are connected to the same Layer 2 device and access the internal through the same router. Which of the following should be Implemented to segment me accounting department from the rest of the users?
a. Implement VLANs and an ACL.
b. Install a firewall and create a DMZ.
c. Create a site-to-site VPN.
d. Enable MAC address filtering.
Answer:
C
Explanation:
Fit a boosting model to the training set with Purchase as the response and the other variables as predictors. Use 1,000 trees, and a shrinkage value of 0.01. Which predictors appear to be the most important
Answer and Explanation:
For the training set consist of 1000 observations, let's have a set consist of the observations such as sets.seed train boost.caravan gbm(Purchase., data = Caravan.train , distribution = "gaussian" , n trees = 1000 summary(boost.caravan) The tree classification such as tree(formula = Purchase data - train where variable are used in tree construction and number of terminal nodes 0 and deviance is 0.7 and error is 0.165
. Write programming code in C++ for school-based grading system
Explanation:
The grade must be calculated based on following pattern:
Average Mark RangeGrade91-100A181-90A271-80B161-70B251-60C141-50C233-40D21-32E10-20E2
Calculate Grade of Student in C++
To calculate grade of a student on the basis of total marks in C++ programming, you have to ask from user to enter marks obtained in 5 subjects. Now add marks of all the 5 subjects and divide it by 5 to get average mark. And based on this average mark, find grade as per the table given above:
// C++ Program to Find Grade of Student // -------codescracker.com------- #include<iostream> using namespace std; int main() { int i; float mark, sum=0, avg; cout<<"Enter Marks obtained in 5 Subjects: "; for(i=0; i<5; i++)
An administrator needs to protect rive websites with SSL certificates Three of the websites have different domain names, and two of the websites share the domain name but have different subdomain prefixes.
Which of the following SSL certificates should the administrator purchase to protect all the websites and be able to administer them easily at a later time?
A . One SAN certificate
B . One Unified Communications Certificate and one wildcard certificate
C . One wildcard certificate and two standard certificates
D . Five standard certificates
Answer:
Option A (One SAN certificate) is the right answer.
Explanation:
A vulnerability management certificate that permits many domain identities to be safeguarded by such a singular or unique certification, is considered a SAN certificate.Though on the verge of replacing common as well as accepted security credentials with either of these de-facto certifications.Other alternatives are not connected to the given scenario. Thus the above option is correct.