Answer:
y=20 z=40 x>100
Explanation:
not sure if this is correct but yes
________________ are piece of programs or scripts that allow hackers to take control over any system.
Answer:
Exploits
Explanation:
Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.
They use these scanners above to search for vulnerabilities.
In C 11, the ________ tells the compiler to determine the variable's data type from the initialization value.
Answer:
auto key word
Explanation:
the auto keyword in c++11 can be regarded as one of the features of
“Type Inference” . It should be noted that in In C ++11, the auto key word tells the compiler to determine the variable's data type from the initialization value.
Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?
Answer:
This is not true
Explanation:
The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.
The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;
= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits
This would be the same for both cases.
The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.
Write a program that gives simple math quizzes. The program should display two random numbers that are to be added, such as:
Project 5-11 output
The program should allow the student to enter the answer. If the answer is correct, a message of congratulations should be displayed. If the answer is incorrect, a message showing the correct answer should be displayed.
Answer:
6
Explanation:
the answer would have to be 6
It is always better to get at least 3 times the amount of b-roll needed
True
False
Answer:
true
Explanation:
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
Explanation:
Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major advantage of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main disadvantage of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.
In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. A major advantage of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), a disadvantage.
Advantage:
Because the content is contained throughout a non-secure file, the above strategy decreases the chance of an assault on classified info.Disadvantage:
This approach has the disadvantage that concealed information might be able to retrieve if somehow the documents have been changed or deleted as of a non-secure file.Once again to encrypt as well as decode information, symmetric encryption employs a unique key, but asymmetric encryption utilizes two different keys, something for encryption as well as someone else for decryption.
Advantage:
One such approach is superior to steganography throughout the level of protection.Disadvantage:
Because distinct keys have been needed to get access, such techniques of asymmetric encryption are considerably slower.Thus the approach above is correct.
Learn more about steganography here:
https://brainly.com/question/15187715
Multiple Choice
Which method adds an element at the beginning of a deque?
appendleft
O insertleft
O popleft
addleft
Answer: appendleft
Explanation: Edge 2021
The method that adds an element for the information at the beginning of a deque is append left. Thus option (A) is correct.
What is an information?An information refers to something that has the power to inform. At the most fundamental level information pertains to the interpretation of that which may be sensed.
The digital signals and other data use discrete signs or alogrithms to convey information, other phenomena and artifacts such as analog signals, poems, pictures, music or other sounds, and the electrical currents convey information in a more continuous form.
Information is not knowledge itself, but its interpretation is important. An Information can be in a raw form or in an structured form as data. The information available through a collection of data may be derived by analysis by expert analysts in their domain.
Learn more about information here:
brainly.com/question/27798920
#SPJ5
What is the purpose of the Error Alert feature?
Answer:
When you add data validation to a cell, the Error Alert feature is automatically turned on. It blocks the users from entering invalid data in the cell.
Explanation:
There ya go.. -_-
Answer:
A) To alert the user to data entry mistakes
Explanation:
Assuming int numbers[SIZE]; is initialized somehow, write a function counter() that you can send the array to, plus an extra integer, and the function will return the number of times that value is found in the array. For example, if the array of SIZE 7 contains {1,2,3,2,3,3,3}then the call
x=counter(numbers,SIZE,3); will put 4 into x.
Answer:
Explanation:
The following function is written in Java and takes in three parameters the array, its size, and the chosenNumber that will be counted. The function then creates an instance variable called Counter and loops through the given array looking for the chosenNumber. Every time that the number is found in the array it adds 1 to the counter. Once the loop is done it returns the total value of the counter variable.
public static int counter(int[] numbers, int Size, int chosenNumber) {
int counter = 0;
for (int x = 0; x < Size; x++) {
if(numbers[x] == chosenNumber) {
counter++;
}
}
return counter;
}
write the code that writes access granted if the correct password, swordfish is entered and access denied! otherwise
In python 3.8:
if input("Enter password: ") == "swordfish":
print("access granted")
else:
print("access denied!")
Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.
Answer:
Following are the program to this question:
import java.util.*;//import package for user input
public class Main//defining main class
{
public static String Cat (String name, String gender, int age)//defining string method Cat that accept parameter value
{
return name + ';' + gender + ';' + age;//return parameter value
}
public static void main(String[] args) //defining main method
{
String name,gender;//defining String variable
int age;//defining integer variable
System.out.println("Enter name, gender and age: ");//print message
Scanner obx=new Scanner(System.in);//creating Scanner class object for user input
name=obx.next();//input name value
gender=obx.next();//input gender value
age=obx.nextInt();// input age value
System.out.println(Cat(name,gender,age));//print return method value
}
}
Output:
Enter name, gender and age:
dani
Female
12
dani;Female;12
Explanation:
In the above-given code, a string method Cat is declared, that accepts three variable "name, gender, and age", inside the method return keyword is used that returns the parameter values.
In the main method, the above parameter variable is declared, which is used to input value from the user-end, and used the print method to print its return value.
12. The best method of protecting the residential user with an Internet connection from intruders out on the Internet is to use
Answer:
Updated OS software patches
Explanation:
Firstly we need to know that patches are those software updates as well as operating system updates that addresses the vulnerabilities In a program or a products security. Software operators may decide to roll out new updates which have the power to fix performance bugs in a program as well as providing more enhanced methods of security.
PLS I WILL GIVE BRAINLIEST IF CORRECT
Select the correct answer.
Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?
A. hierarchical
B. linear
C. webbed
D. wheel
Answer:webbed
Explanation:
k
Answer:
Webbed
Explanation:
Type the correct answer in the box. Spell all words correctly.
A freelance graphic designer has received an assignment to design a company logo. What image format is most suitable to display this logo on the company website?
The _________ format is most suitable in order to display the logo on the company website.
Answer:
The most suitable format for logo is PNG
Explanation:
PNG stands for portable network graphics. It is an improved version of gif. The best thing in png is that it is lossless compression and the background is not visible. Both 24 and 32 bit Colour can be used in png. PNG became ISO standard in sixteen years ago in 2004.
If a function is called more than once in a program, the values stored in the function's local variables do not _________ between function calls. g
Answer:
persist
Explanation:
Calling a function Within a program, can be regarded to as specifying of the name of the function when it is within a statement or it could be by the function itself, it possible for a particular function to call another function, in a case wherby a function returns a value, assignment or using the value to variable is not necessary. It should be noted that If a function is called more than once in a program, the values stored in the function's local variables do not persist between function calls
How many fnaf games did Scott Cawthon make?
Answer:
8 but he is making FNaF security breach
Explanation:
there is FNaF VR help wanted
Answer:
8 or 10
Explanation:
hello hello . please help me
Answer:
#include <iostream>
using namespace std;
int main() {
int num, check=0;
for(int num = 1; num<=100;num++){
for(int i = 2; i <= num/2; i++) {
if(num % i == 0) {
check=1;
break; } }
if (check==0) { cout <<num<<" "; }
check = 0;
}
return 0;
}
Explanation:
This line declares num as integer which represents digits 1 to 100.
A check variable is declared as integer and initialized to 0
int num, m=0, check=0;
This for loop iterates from 1 to 100
for(int num = 1; num<=100;num++){
This iterates from 2 to half of current digit
for(int i = 2; i <= num/2; i++) {
This checks for possible divisors
if(num % i == 0) {
If found, the check variable is updated to 1
check=1;
And the loop is terminated
break; } }
The following if statement prints the prime numbers
if (check==0) { cout <<num<<" "; }
check = 0;
}
Write a recursive function that accepts two arguments into the parameters x and y. The function should return the value of x times y. Hint: multiplication can be performed as repeated addition. Test your recursive function by prompting the user to enter values for x and y and then displaying the result. Your function should be able to handle multiplication of negative values.
Answer:
In Python:
def times(x,y):
if y<0:
return -1*times(x,y*-1)
if y == 1:
return x
return x + times(x,y-1)
x = int(input("x: "))
y = int(input("y: "))
print(times(x,y))
Explanation:
I answered the question using Python3
This defines the function
def times(x,y):
This checks for negative values
if y<0:
return -1*times(x,y*-1)
This is the base case where y = 1
if y == 1:
If true, the value of x is returned
return x
This returns the recursion and it is repeated until the base case is achieved
return x + times(x,y-1)
This prompts user for x value
x = int(input("x: "))
This prompts user for y value
y = int(input("y: "))
This calls the recursion and also prints the result
print(times(x,y))
How might use of computer and knowledge of technology system affect personal and professional success
Answer:
social media
Explanation:
Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them
Answer:
A, template specifics, such as horizontal or vertical menu layout
Explanation:
Answer:
D. who will be using the site and the design theme selected for them
Explanation:
I am doing the exam right now.
What are url addresses for visiting websites? And what are the different parts of a URL? Answer it in a 1-2 paragraph
Answer:
Please read explanation
Explanation:
URL is the short form for "Uniform Resource Locator". A uniform resource locator tells the location of a website to the browser.
Parts of URL:
There are three main parts of URL
ProtocolDomain nameExtensionProtocol defines the type of protocol used for communicating with the website while the domain name is the name assigned to the IP address and the mapping is stored in domain name server and extension tells the type of website i.e.
.com means commercial
.org means non-profitable organization
.edu means educational website
An additional element is path which change with the website navigation.
turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is not the case. What could be a possible cause?
active cell is indentifed by its thick border true or false
Answer: It's identifed by its thick border so its true
Documenting findings, actions, and outcomes of network troubleshooting calls is an essential part of the troubleshooting process. List the reasons why documentation is critical, and discuss the form that this documentation could take (e.g. blogs, wikis, professional document management software, etc). Include a detailed description of what information would need to be saved.
Answer:
The main purpose of documentation is for future reference on the cost, materials, procedures, and techniques used in a task. It can be in form of a video log, report, digital text document or software, etc.
Explanation:
Documentation is an important practice of taking notes of events during a process. It could in the process of creating or discovering new ideas or repair or management of existing processes. It holds the time, cost, technique, event name, measures-taken, etc, that would totally describe the event.
If you wanted to make the system sequentially consistent, what are the key constrains you need to impose
Answer:
The call of instructions and data must be sequential, there can be no reordering of instructions but to allow reordering, a fence must be created.
Explanation:
Sequential consistent memory model is able to use instructions when or before processing is done and after processing, so long as the instruction order is sequential.
This is similar to uploading a video on you-tube, the site immediately creates a page for the video even before the video is fully uploaded. Sent tweeter messages are seen by different people at different times, but the messages appear to be arranged sequentially.
One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files
Write an LC-3 assembly language program to read in a two-digit decimal number whose digits add up to less than 10 and display the sum of those digits in the next line.
Sample execution (user input underlined) : Please enter a two-digit decimal number > 27. The sum of the digits = 9
Answer:
Explanation:
.MODEL SMALL
.STACK 100H
.DATA
STR1 DB 0AH,0DH, 'THE SUM OF TWO DIGITS PRENT IN THE GIVEN NUMBER'
FNUM DB ?
STR2 DB ' AND '
SNUM DB ?
STR3 DB ' IS '
ANS DB ?
STR4 DB ' $'
.CODE
MAIN PROC
MOV AX, "at" DATA PLEASE NOTE: your "at" need to be in symbol
MOV DS,AX It is because this text editor who allow the sub-
mission of this answer if i use the symbol format
MOV AH,2 that is why put it in bold and parenthesis
MOV DL,3FH
INT 21H
MOV AH,1
INT 21H
MOV BL,AL
MOV FNUM,AL
INT 21H
MOV SNUM,AL
ADD BL,AL
SUB BL,30H
MOV ANS,BL
MOV AH,9
LEA DX,STR1
INT 21H
MOV AH,4CH
INT 21H
MAIN ENDP
END MAIN
What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g
Answer:
Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.
Explanation:
The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.
SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.
For things like school, you should have a more serious:
Answer:
who and what do you mean
Explanation:
Which feature is being used when connecting a device to the network using an electrical outlet?
Answer:
In other words, a WiFi bridge can convert Ethernet to WiFi. WiFi bridges can be high-performance and can support more WiFi network types than the T7-Pro can.