Answer:
c. Both versions
Explanation:
The Windows Remote management has hardening levels that could be set to Relaxed, Strict, or None based on the channel binding token associated with a request. This feature could be automatically found in the system or manually configured to a user's choice.
Relaxed settings mean rejection of channel binding token that are not valid and the acceptance of requests with no channel binding tokens, but which may be susceptible to attacks. Strict settings entail an automatic rejection of invalid channel binding tokens. None settings entail the acceptance of all requests with no protection against credential-forwarding attacks.
Clyde Clerk is reviewing his firm’s expense reimbursement policies with the new salesperson, Trav Farr. "Our reimbursement policies depend on the situation. You see, first we determine if it is a local trip. If it is, we only pay mileage of 18.5 cents a mile. If the trip was a one-day trip, we pay mileage and then check the times of departure and return. To be reimbursed for breakfast, you must leave by 7:00 a.m., lunch by 11:00 a.m., and have dinner by 5:00 p.m. To receive reimbursement for breakfast, you must return later than 10:00 a.m., lunch later than 2:00 p.m., and have dinner by 7:00 p.m. On a trip lasting more than one day, we allow hotel, taxi, and airfare, as well as meal allowances. The same times apply for meal expenses." Write structured English for Clyde’s narrative of the reimbursement policies. Draw a decision tree.
Answer:
The answer is described in the image.
Explanation:
The firm is responsible for all expenses made by it's employees, so for a local trip, the cost of gas relative to the mileage covered during the journey is paid for ( 18 cents per mileage).
If it is not a local trip, then it is a one-day trip, so the firm pays for the mileage and the cost of the meals not taken in the company, which depends on the departure and return/arrival time. If the departure and return time is 7am to 10am, the employee is paid for breakfast, if the departure and return is 11am to 2pm then the employee is paid for lunch, and for dinner, 5pm to 7pm.
If process P0 is switched to process P1, state for P0 will be saved into ____, and state from ___ will be reloaded.
Answer:
1. PCB0
2. PCB1
Explanation:
Given that PCB is often referred to as Process Control Block, is a form of data structure that is applicable and utilized by the computer operating systems to store all the information concerning a process.
This process is carried out in a way that when Process P0 is initialized, the operating system established a related process that takes the computer processing unit from Process P0 and allocates it to Process P1, the Operating System, in turn, will save P0's PCB, and then reload P1's PCB.
Hence, If process P0 is switched to process P1, the state for P0 will be saved into "PCB0" and the state from "PCB1" will be reloaded.
We wish to produce a graphic that is pleasing and easily readable. Suppose we
make the background color pink. What color text font should we use to make
the text most readable? Justify your answer.Assume that the color Pink is obtained by mixing equal amounts of Red and White. Use the RGB color model and assume that the amount of each primary color in the model is described in the interval [0 255]. Describe the color of the text font you would choose using these conventions.
Answer:
light color
Explanation:
When we will mix equal amounts or equal quantities of the color red and the color white, we will get the color reddish pink. It is popularly called as the SOFT RED and the color code of this color is RGB (255, 128, 128).
Since, red color + white color = 0.5 RGB(255, 0, 0) + 0.5RGB(255, 255, 255)
= RGB (255, 128, 128)
According to me, the color white will best suit as the text color that can be used for a background having RGB(255, 128, 128). Because the color looks more red and not that pink, so it wise to use a light tone color for the natural reading purpose. Hence, it will not give strain to the eyes.
Consider a distributed denial of service (DDOS) attack, Assume the attacker has compromised a number of broadband connected computers to use as zombie systems. If the ISP provides a maximum uplink data rate of 512 Kbps in ADSL, what is the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second? How many such zombie systems would the attacker need to flood a target server in an organization that has
a. A Fast Ethernet.
b. A Gigabit Ethernet.
Answer:
A ) 200 Zombie systems
B ) 200 Zombie systems
Explanation:
maximum uplink data rate : 512 kbps = 512 * 1000 * 8 = 4096000 bits/sec
Determine the number of 512 byte ICMP echo packets = 512 * 8 = 4096 bits
hence the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second = 400 packets/sec
i.e. for 512kbps = 400 packets/sec
Determine the number of Zombie systems that the attacker will need to flood a target server
A) For a fast ethernet
A fast ethernet = 100 mbps
The number of Zombie systems needed = 1 zombie system * 200
and 1 zombie system = 512 kbps
therefore for a Fast ethernet the number of zombies systems needed = 200
B) For A Gigabit Ethernet
same as a fast ethernet system i.e. = 200
Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The first digit identifies the product category, the nextfive digits identify the manufacturer, the following five identify the particular product, andthe last digit is acheck digit. The check digit is determined in the following way:
• Beginning with the first digit multiply every second digit by 3.
• Sum all the multiplied digits and the rest of the digits except the last digit.
• If the (10 - sum % 10) is equal to the last digit, then the product code is valid.
• Otherwise it is not a valid UPC.The expression is:sum= 3.x1+x2+ 3.x3+x4+ 3.x5+x6+ 3.x7+x8+ 3.x9+x10+ 3.x11where the x’s are the first 11 digits of the code.
If you choose to add the last digit also in the second step and if the sum is a multiple of 10,then the UPC is valid. Either way, you still need to perform the modular division to checkwhether the given number is a valid code.In this problem, you need to use either a string or long long integer type for the product codebecause it is 12 digits long. If you use string, you can convert one character substring of thestring in to a single digit integer from left to right using the function stoi(str.substr(i,1)).This way you do not need to get last digit of the number and then divide the number by 10.
in c++
problem 3
Translate the following pseudocode for randomly permuting the characters in a string into a C++ program. Read a word. repeat word.length() times Pick a random position i in the word, but not the last position. Pick a random position j > i in the word. swap the letters at positions j and i. Print the word. Please work on this problem after we learn to generate random numbers in the class which is on Wednesday the latest. These problems only deal with simple loop while, for and do loops. You will get a second set of problems next week on nested loops.
Answer:
#include <iostream>
#include <cmath>
using namespace std;
int main(){
string upc;
char last;
cout<< "Enter UPC number: ";
cin >> upc;
if (upc.size() == 12){
last = upc[-1];
} else{
return 0;
}
cout<< last;
char myArr[upc.length()];
for (int i = 0 ; i < upc.substr(0,11).length(); ++i){
if (upc[i]%2 != 0){
myArr[i] = upc[i] * 3;
}
else{
myArr[i] = upc[i];
}
}
int sum = 0;
for (int x = 0; x < sizeof(myArr); ++x){
sum += (int)myArr[x] - '0';
}
if (sum% 10 == last){
cout<<"UPC number is valid";
}
else{
cout<<"Invalid UPC number.";
}
}
Explanation:
The UPC number in the c++ source code input must be 12 digits long for the rest of the code to execute. The code checks the validity of the number by comparing the reminder of the sum division with the last digit in the UPC number.
In the program below, which two variables have the same scope?
def rhyme(word):
leftCharacter = word[0]
if leftCharacter != 'd':
return 'd' + word[1:]
else:
return 'f' + word[1:]
def poem():
print("Enter Q to quit.")
userWord = input("Enter a word: ")
while userWord != 'Q' and userWord != 'q':
rhymeWord = rhyme(userWord)
print(rhymeWord)
userWord = input("Enter a word: ")
# the main part of your program that calls the function
poem()
userWord and ____
Fill in the blank Answer options: poem, word, rhymeWord
Answer:
rhymeWord
Explanation:
correct answer edge 2020
# the main part of your program that calls the function poem() userWord and rhymeWord. Hence, option C is correct.
What is rhymeWord?Rhyming words all have the same last consonant. Simply put, it is the repetition of similar sounds. When two words have similar sounds, usually those that follow the final stressed syllable of each word, the words are said to rhyme. Cat-hat, rotten-forgotten, and heard-bird are some examples of words that rhyme; they all have similar sounds after the final stressed syllable.
If the last sounds of two or more words are the same or similar, then the words will rhyme. Some words that rhyme are goat, boat, moat, float, and coat. To determine whether two words rhyme, use your ears to listen while you speak the words. If two words have a similar or matching sound, they rhyme.
Thus, option C is correct.
For more information about rhymeWord, click here:
https://brainly.com/question/2398244
#SPJ2
What are some areas in Computer Science that make use of multivariate statistical testing or MCM methods? Explain why they are used.
Explanation:
Computational modeling is one of the areas of Computer Science that uses mathematical systems to perform multivariate statistical tests to solve highly complex problems in multidisciplinary areas, such as medicine, engineering, science, etc.
An example of the use of multivariate statistical tests is social development research in social science, which uses multiple variables to find more hypotheses and greater coverage between variables.
Multivariate statistical tests have the benefit of making research more effective and providing a more systematic and real view of the study.
When was the information last updated
ASAP PLZ!!!. Which command group is used to apply effects and modify color schemes of SmartArt graphics?
Reset Graphics
SmartArt Styles
Graphic Layouts
Create Graphics
NVM!! The answer is B. SmartArt Styles
Answer:
I think I am wrong but I assume it is C. Graphic Layout Sorry if I am wrong but if I am not please reward me brainlist.
What feature allows you to access previous copies of a document on OneDrive?
File storage
Recover file
Stored work
Version history
Version history feature
OneDrive's Version history feature allows you to view older versions of an Office Online document. If you find a version you want, you can then restore it, moving it to the top of the list as the latest version of the file.
Answer:
Version history
Explanation:
how to create diagram that demonstrates the step
by step procedures in performing a mail merge.
Answer:
hope it helps
1-Creating a Main Document and the Template.
2-Creating a Data Source.
3-Defining the Merge Fields in the main document.
4-Merging the Data with the main document.
5-Saving/Exporting
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.
Answer:
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.
Explanation:
thats all you said
In python 3.8:
def pyramid_volume(base_length, base_width, pyramid_height):
return round((base_length*base_width*pyramid_height)/3,2)
print(pyramid_volume(1,1,2))
I used the round function to round the volume to 2 decimal places. You can change this if you need more or less precision. I hope this helps!
Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address is 0x000C, If the branch is taken, what will be the new Program Counter (PC) value?
a. 0x00001844
b. 0x00001850
c. 0x00001870
d. 0x00001874
Answer:
a. 0x00001844
Explanation:
When the branch is takes the new program counter value is increased by 1. The value of existing memory is labelled with number sets and then next instruction is accepted in sequence. The new value is the increase in the current labelled value.
What is the purpose of the Microsoft® PowerPoint® application? to design publications such as newsletters and brochures to create documents such as business letters and resumés to develop presentations for business meetings to design a company employee database
Answer:
The first one
Explanation:
The main purpose of MS PowerPoint is to enable the user to create dynamic, informational slides through the use of text, graphics, and animation.
The purpose of PowerPoint is to act as a visual aid as a presenter goes along presenting their option, ideas, sales pitch, etc. Make sure to not make your slides too wordy and concentrate on adding only basic bullet points.
Answer:
to develop presentations for business meetings
Explanation:
Any of the other options will be used in Word, Excel and Publisher.
But Power Point is mainly for presentations and not newsletters and other.
One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?
Explanation:
Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:
Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.Find the minimum, maximum, and average grade of final exams in sections taught by Todd Smythe.
Answer:
A sample of the statement is written below
SELECT MIN(GRADE), MAX(GRADE), AVG(GRAD), FROM TABLE 2 WHERE TEACHER = "TODD SMYTHE"
Explanation:
To find the Minimum, maximum and average grade of final exams in the sections taught by Todd Smythe. we will write a statement
Using the select to get the required data using the functions ; MIN , MAX , AVG and the WHERE clause for the condition
A sample of the statement is written below
SELECT MIN(GRADE), MAX(GRADE), AVG(GRAD), FROM TABLE 2 WHERE TEACHER = "TODD SMYTHE"
PLEASE HELPP
Why do you think it is important to write your high school plan in middle school? Explain your answer in 3-4 well written sentences.
Answer:
Es muy importante que escriba su plan para la escuela secundaria antes de llegar a la escuela secundaria. Te da algo a lo que admirar cuando llegas a la escuela secundaria. Cuando lo complete, sabrá que hizo algo bien. Entonces puede establecer sus metas cada vez más altas, dándole la oportunidad de una buena vida.
Python rephactor
1. Write code that swaps the first and last elements in a list called my_list. Assume that the list has already been created and contains at least one element.
2.Write code that creates a Python set containing each unique character in a string named my_string. For example, if the string is 'hello', the set would be {'h', 'e', 'l', 'o'} (in any order). Assign the set to a variable named my_set. Assume that my_string has already been initialized.
1.
my_list = ([1,2,3,4,5])
h = my_list[-1]
my_list[-1] = my_list[0]
my_list[0] = h
print(my_list)
2.
my_string = "hello"
my_set = set(my_string)
print(my_set)
The list has already been created and contains one element. The python set of my string has been already initiated.
What is python set?Python set is defined as a data type for unordered collections that is iterable, changeable, and lacks duplication of elements. There are essentially two sorts of sets in Python. the frozenset and the set. Whether the frozenset is changeable or not depends on the set type. On a set, we can use add(), remove(), and other operations of this nature; however, frozenset does not support these actions.
The program is
your list = ([1,2,3,4,5])
my list[-1] = h
MyList[-1] equals MyList[0]
h print(my list, "my list");
"hello" is my string
set(my string) my set
print(my set)
Thus, the list has already been created and contains one element. The python set of my string has been already initiated.
To learn more about python set, refer to the link below:
https://brainly.com/question/14936500
#SPJ5
What is the main advantage of using a WYSIWYG("what you see is what you get")editor when constructing a website
A.only one programming language is required
B.websites may have more professional construction
C.knowledge of HTML is not required
D.Website templates are not necessary
Answer:
c
12121212121212121212121212121221212121212121212
A ____ is a a set of presentation rules that control how text should look. It is applied to an XML file to change the collection of text with schema tags into a presentable document that shows data in a way that is pleasant and easily understood.
Answer: language
Explanation:
I have no idea, any help is appreciated.
Answer:
A
Explanation:
How do I explain it.... well the analogy shows the circle in the middle of the parallelogram, then the next shows the circle bigger than the parallelogram and the parallelogram with lines in it.
So you do the same to the triangle with a square and there you go!
Answer:
A - the first one is correct.
Explanation:
Hope this Helps!
:D
Why would a programmer use a flow chart? (Edge2020 Coding Critical Thinking Questions)
Answer:
As a visual representation of data flow, flowcharts are useful in writing a program or algorithm and explaining it to others or collaborating with them on it. You can use a flowchart to spell out the logic behind a program before ever starting to code the automated process.
Explanation:
Answer: I answered yo can give the other guy brainliest yw
Explanation:
A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?
Answer: Nothing should be done.
Explanation:
Group Policy helps in the provision of a centralized management of operating systems, and applications. It should be noted that a group policy object (GPO) is simply referred to as the configurations involving the group policy.
Nothing should be done to manage the GPO created. When the permission to create a GPO has been given to someone, it means that they can also manage the GPO therefore, nothing needs to be done anymore.
A Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with one of the nation’s largest
A)retail sellers of computers and related accessories.
B)in-store computer repair and service companies.
C)developers of computer operating systems.
D)makers of computer networking equipment.
Answer:
C
Explanation:
This job will have the largest amount of 1. computer programmers, 2. like-minded coworkers, and 3. a large number of like-minded coworkers.
Please give Brainliest if accurate!
The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.
What is the term like-minded?The Definition of the term like-minded is known to be when two or more people like or have the same purpose, habit or thought.
Therefore we can say that The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.
Learn more about Programmer from
https://brainly.com/question/23275071
#SPJ2
Which of the following are reasons why it is important to write readable code?
Choose all that apply.
Readable code is easier to maintain.
Readable code is easier to modify.
Readable code is fun to write.
Writing readable code saves time in the long run.
Answer:
Readable code is easier to maintain.
Writing readable code saves time in the long run.
Readable code is easier to modify.
Readable code is fun to write.
Explanation:
Readability of a code means that how easy it is to read the code even if any person other than programmer reads the code. Different techniques like line breaks and indentation are used to make the code readable. the program follows an indentation pattern so it is easy and fun to write.
Hence,
it can be concluded that the true statements are:
Readable code is easier to maintain.
Writing readable code saves time in the long run.
Readable code is easier to modify.
Readable code is fun to write.
Answer:
for short answer it is a,b and D
Explanation:
Question #2 Dropdown What are the missing words in the program? divide(numA, numB): numA / numb
Answer:
def
return
Explanation:
I hope this helps!
How can we tell the computer what to put on the web page, and how to organize it?
Answer:
[tex]\boxed {\boxed {\sf Code}}[/tex]
Explanation:
Humans communicate with computers through code.
For web pages, HTML (HyperText Markup Language) is used.
A person writes the code to tell a computer what to display and how to structure the displayed information. You can create webpages with any information, add pictures, links, headings, paragraphs, change fonts, and more, all through the use of code.
When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the variablec) the length of the variabled) a copy of the variablee) the binary memory address
Answer:
The answer is "Option d".
Explanation:
In this question the choice d, that is "a copy of the variable" is correct because the method takes a reference value or a copy of the variable in its parameter, the example of this question can be defined as follows:
void me2(double x)//defining a method me2 with a double parameter
{
//method body
}
double x = 35.655;//defining a double variable x
me2(x);//calling a method with passing the copy of th e variable
What is the primary purpose of a slideshow presentation
Answer:
to help us to complete all of useless project given by school
Answer:
support the presenter's ideas
Explanation:
Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse
Answer:
TrueExplanation:
Minoritys have always faced prejudice