Answer:
Confidentiality and availability- interruption, integrity - modification and fabrication.
Explanation:
Data on a network is provided with the three As in security, accountability, authentication and authorisation to promote the confidentiality and integrity of data on the network.
When a data is interrupted by a DOS attack, it is exposed to the attackers and the data transfer is interrupted. With this, the attacker can modify the existing data or fabricate a new data to sent to the network, crippling the integrity of the network data.
Final answer:
The principles of confidentiality, integrity, and availability in information security directly counter concerns over interruption, modification, and fabrication by ensuring data is properly secured against unauthorized access, changes, and creation of false data.
Explanation:
The concepts of confidentiality, integrity, and availability of data, often encapsulated by the acronym CIA, are fundamental principles in information security. These principles directly relate to concerns over interruption, modification, and fabrication in several ways. Confidentiality aligns with preventing unauthorized disclosure, ensuring that data is not seen or disclosed to unauthorized parties, akin to preventing interruption in access. Integrity involves safeguarding the accuracy and completeness of data, thereby preventing unauthorized modification. Availability ensures that data is accessible and usable upon demand by an authorized user, countering both interruption and modification that could render data inaccessible or corrupt.
Interruption can be seen as a threat to availability, as it involves disrupting access to or use of information or an information system. Modification and Fabrication, on the other hand, primarily undermine integrity; modification involves altering existing information, while fabrication entails generating false data. Both can lead to unauthorized changes and misrepresentation of data, impacting its reliability and trustworthiness.
Therefore, ensuring high levels of confidentiality, integrity, and availability (CIA) addresses these concerns directly. By protecting against unauthorized access (interruption), ensuring data accuracy and consistency (modification), and preventing the creation of false data (fabrication), one can uphold the principles of CIA in information security.
Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot use a resource?a.issue-specificb.system-specificc.enterprise informationd.user-specific
Answer:A. ISSUE-SPECIFIC
Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.
Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.
A user of the wireless network is unable to gain access to the network. The symptoms are:1.) Unable to connect to both internal and Internet resources2.) The wireless icon shows connectivity but has no network access
The wireless network is WPA2 Enterprise and users must be a member of the wireless security group to authenticate. Which of the following is the MOST likely cause of the connectivity issues?
A. The wireless signal is not strong enoughB. A remote DDoS attack against the RADIUS server is taking placeC. The user’s laptop only supports WPA and WEPD. The DHCP scope is fullE. The dynamic encryption key did not update while the user was offline
Answer:
c
Explanation:
because only certain amount of laptops/pc's can vairy between all the internet data networks. most laptops and pc's run on WPA only because its cheaper and it has a better efficiency at running the fomain faster than most other networks. they are also most common for the most reliable updates. WEPD is not really a popular domain that most people use, but it is really common if they live in big cities where multiple users are basing off the same internet company ( a.k.a workspaces/offices). And when the DHCP scope is full that basically means that in a DHCP server, a scope is configured to determine the address pool of IPs that the server can provide to DHCP clients. Scopes determine which IP addresses are provided to the clients. They should be defined and activated before DHCP clients use the DHCP server for its dynamic IP configuration.
Write a program that prompts the user to enter seven test scores and then prints the average test score. (Assume that the test scores are decimal numbers.)
Answer:
The cpp program for the scenario is given below.
#include <iostream>
using namespace std;
int main() {
// array to store seven test scores
double scores[7];
// variable to store sum of all test scores
double sum=0;
// variable to store average of all test scores
double avg_score;
// user is prompted to enter seven test scores
cout<<"Enter the test scores ";
// user input is taken inside for loop
// for loop executes seven times to take input for seven test scores
for(int j=0; j<7; j++)
{
cin>>scores[j];
sum = sum + scores[j];
}
// average of test scores is calculated and assigned
avg_score = sum/7;
cout<<"The average of all entered test scores are "<< avg_score <<endl;
return 0;
}
OUTPUT
Enter the test scores 90
88
76
65
56.89
77.11
68
The average of all entered test scores are 74.4286
Explanation:
The program execution is explained below.
1. An array, scores, is declared of size seven to store seven user-entered test scores.
2. Variables, sum and avg_score, are declared to store the sum and average of all the seven test score values. The variable sum is initialized to 0.
3. User is prompted to enter the test scores using cout keyword.
4. Inside for loop, all seven test scores are stored inside array, scores, using cin keyword.
5. Inside the same for loop, the values in the array, scores, are added and assigned to the variable sum.
6. Outside the for loop, the average score is calculated and assigned to the variable avg_score.
7. At the end, the average score is displayed. New line is inserted using endl after the average score is displayed.
8. In order to store decimal values, all variables and the array are declared with double datatype.
9. The main() has return type of integer and thus, ends with a return statement.
10. The iostream is included to enable the use of keywords like cin, cout, endl and others.
How do you freeze the total cell so that it doesn't change when copied?
a) put a # in front of the letter and number that represents the cell position.
b) put a $ behind the letter and number that represents the cell position.
c) put a $ in front of the letter and number that represents the cell position.
d) you don't do anything, they are already frozen in Excel"
Answer:
c) put a $ in front of the letter and number that represents the cell position.
Explanation:
Dollar sign ($) is used to lock the formula in the cell. This is called absolute reference. In this type of referencing, A dollar sign is place in front of the letter and number to lock that cell. Whenever we copy that cell, the formula will be copied in other cell without changing its reference number.
As
Example 1
C1 = A1 + B1
if we copy this formula in C2 then it becomes
C2= A2 + B2
there both reference of A and B has been changed.
Example 2
If we put $ sign as
C1= $A$1 + $B$1
now of we copy C1 and into C2
C2= $A$1 + $B$1
There reference of cell is not changed.
To freeze a cell in Excel, use the dollar sign ($) in front of the letter and number of the cell position. For example, if the total cell is A1, change it to $A$1. This technique ensures Excel maintains the cell reference when copying the formula.
Explanation:To freeze a total cell in Excel so that it doesn't change when copied, you should use the dollar sign ($) in front of the letter and number that represent the cell position. This operation is commonly referred to as cell referencing. For instance, if your total cell is A1, you would change it to $A$1 to freeze it.
The dollar sign instructs Excel to maintain the reference to the specific cell when you copy the formula to other cells. Without the dollar sign, Excel will adjust the formula to refer to relative cells. Therefore, option (c) is the correct technique for freezing the total cell in Excel.
Learn more about Cell Referencing here:https://brainly.com/question/35910076
#SPJ3
Evaluate the expression. Be sure to list a value of appropriate type (e.g., 7.0 rather than 7 for a double, Strings in quotes). 19 / 2 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4
14.0
Explanation:Using the level of precedence in Java,
From left to right;
(i) the first division operation will be done.
(ii)followed by the second division operation.
(iii)followed by the first multiplication operation.
(iv)followed by the third division operation.
(v)followed by the second multiplication operation.
(vi) followed by the first addition operation.
(vii)lastly followed by the second addition operation.
=================================================
Taking the steps above one after the other;
(i) the first division operation will be done (i.e 19 / 2)
=> Integer division in Java gives an integer result. Therefore, 19 / 2 = 9.5 will give 9.
So,
=> 19 / 2 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4
=> 9 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4
(ii)followed by the second division operation. (i.e 9 / 2.0)
=> From the result from step (i), the second division operation is now 9 / 2.0.
=> 9 / 2.0 = 4.5
So,
=> 9 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4
=> 4.5 + 2.5 * 6 / 2 + 0.5 * 4
(iii)followed by the first multiplication operation. (i.e 2.5 * 6)
=> The first multiplication operation is given by 2.5 * 6
=> 2.5 * 6 = 15.0
So,
=> 4.5 + 2.5 * 6 / 2 + 0.5 * 4
=> 4.5 + 15.0 / 2 + 0.5 * 4
(iv)followed by the third division operation. (i.e 15.0 / 2)
=> The third division operation is given by 15.0 / 2
=> 15.0 / 2 = 7.5
So,
=> 4.5 + 15.0 / 2 + 0.5 * 4
=> 4.5 + 7.5 + 0.5 * 4
(v)followed by the second multiplication operation. (i.e 0.5 * 4)
=> The second multiplication operation is given by 0.5 * 4
=> 0.5 * 4 = 2.0
So,
=> 4.5 + 7.5 + 0.5 * 4
=> 4.5 + 7.5 + 2.0
(vi) followed by the first addition operation. (i.e 4.5 + 7.5)
=> The first addition operation is given by 4.5 + 7.5
=> 4.5 + 7.5 = 12.0
So,
=> 4.5 + 7.5 + 2.0
=> 12.0 + 2.0
(vii) lastly followed by the second addition operation. (i.e 12.0 + 2.0)
=> The second addition operation is given by 12.0 + 2.0
=> 12.0 + 2.0 = 14.0
So,
=> 12.0 + 2.0
=> 14.0
Therefore, 19 / 2 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4 = 14.0
Note:In Java, the order of precedence for arithmetic operators is;
=> /, * and %
=> followed by + and -
Suppose two hosts, A and B, are separated by 20,000 kilometers and are connected by a direct link of R = 2 Mbps. Suppose the propagation speed over the link is 2.5 x 10^8 meters/sec.a. Calculate the bandwidth-delay product, R _ dprop.b. Consider sending a file of 800,000 bits from Host A to Host B. Suppose the file is sent continuously as one large message. What is the maximum number of bits that will be in the link at any given time?c. Provide an interpretation of the bandwidth-delay product.d. What is the width (in meters) of a bit in the link? Is it longer than a football field?e. Derive a general expression for the width of a bit in terms of the propagation speed s, the transmission rate R, and the length of the link m.
Answer:
a ) The bandwidth-delay is 160,000 bits.
b)The maximum number of bits at a given time will be 160,000 bits.
c ) The maximum number of bits on the transmission line is equal to the product of he bandwidth and the delay
d) The length is 125 meters which is longer than a football field
e) The general expression is given as [tex]\frac{S}{R}[/tex]
Explanation:
Step-by-Step Explanation
(a) We are old from he question that A and B are connected with a direct link.
The length between A and B is given as ( d )[tex] = 20,000 Km = 2×10⁷ meters [/tex] given that (1 Km = 10³ )
The rate of transmission on the direct connection between A and B
Denoted as (R) = 2 Mbps = 2 × 10⁶bps given that (1Mbps = 10⁶bps)
Speed of propagation of the link between A and B
Denoted as (S) = 2.5 × 10⁸ meters/sec
Formula to calculate propagation delay denoted as dₐ = [tex]\frac{D}{S}[/tex]
dₐ = [tex]\frac{D}{S}[/tex]
= [tex]\frac{2 * 10 ^7}{2.5*10^8}[/tex]
= 0.08 sec
We multiply the rate of transmission with the propagation delay to get the bandwidth delay
i.e. R × dₐ = (2 × 10⁶) × 0.08
= 16 × 10⁴ bits
Hence the bandwidth delay is given as 160,000 bits.
Step 2 :
b) From the question we are given that file is been transmitted from host A to host B consistently as one large message.
Given that the size of the file o be transmitted is =800,000 bits
= 8 × 10⁵bits
The rate of transmission of the direct connection between A and B (R)
= 2 Mbps
= 2 × 10⁶bps (Given that 1Mbps = 10⁶ bps)
Note : That the maximum number of bits the connection can carry is not dependent on the file size
but on the bandwidth -delay i.e (R * da). It is also equal in value hence
At a given time the maximum number of bits is equal to the bandwidth product delay = 160,000 bits
Step 3
c) The highest number of bits on the link between A and B is gotten from the product of bandwidth and delay
Step 4:
Given from the question that the propagation speed of the connect A and B (S) = 2.5 × 10⁸ meters/sec
The rate of transmission through the direct connection between A and B (R) = 2 Mbps
= 2 × 10⁶ bps (Given that 1Mbps = 10⁶ bps)
We then have that the length of 1 bit on the link can be calculated with the formula [tex]\frac{S}{R}[/tex]
Length of 1 bit = [tex]\frac{S}{R}[/tex]
= [tex]\frac{2.5 * 10^8}{2*10^6}[/tex]
= 125 m/bit
We can see from the answer that the length of 1 bit is longer than a football field
Step 5:
We can deduce the width of a bit by looking at the unites of the given parameters
Unit for the length of the link = m meters
Unit of propagation speed = S m/s
the transmission rate is = R bps
Note :Width of a bit is not dependent on the length but on the propagation speed and the rate of transmission and it is the ratio these parameter
Hence the width of a bit is given as = [tex]\frac{S}{R}[/tex]
rrayList Mystery Consider the following method:
public static void mystery(ArrayList list) {
for (int i = 1; i < list.size(); i += 2) {
if (list.get(i - 1) >= list.get(i)) {
list.remove(i);
list.add(0, 0);
}
}
System.out.println(list);
} Write the output produced by the method when passed each of the following ArrayLists: List Output
a) [10, 20, 10, 5]
b) [8, 2, 9, 7, -1, 55]
c) [0, 16, 9, 1, 64, 25, 25, 14
Answer:
a)
int: [10, 20, 10, 5]
out: [0, 10, 20, 10]
b)
int: [8, 2, 9, 7, -1, 55]
out: [0, 0, 8, 9, -1, 55]
c)
int: [0, 16, 9, 1, 64, 25, 25, 14]
out: [0, 0, 0, 0, 16, 9, 64, 25]
Explanation:
What the code is doing is changing the list if and only if the item number i, where i is an odd position on the list, is greater than the item number i-1. If the condition mentioned is satisfied, the element number i is removed, and a zero is added to the beginning of the list; this is why the dimension of the input is equal to the output (for every element removed a zero is added).
Note:
The first item of a list is the item 0.add method can receive two parameters the first indicating the position where the element will be added and the second the element to be added. .get method allows you to select any element on the list by its index..size method gives you the size of the listIn the for loop i += 2 indicates an increment of two, since we start with i = 1 we are going to iterate through odd numbers i = 1,3,5,7...
a user reports that his dot matrix printer is printing dark and clear on the left of the paper but that the print is very light on the right side of the paper. what should you do to correct this problem with the printer
Answer:
Correctly position the platen of the printer to hold the paper in place.
Explanation:
Since the dot matrix printer is printing dark and clear on the left of the paper but very light on the right side of the paper, it is possible that the paper is not being held properly. So adjusting the platen will hold the paper properly and hence uniform prints on the paper.
Note: Dot matrix printers are printers that print closely related dots to form require texts (shapes) by striking some pins against an ink ribbon.
Some of the parts of these printers are; power supply, carriage assembly, Paper sensor, ribbon, platen and pins.
Get three int values from the keyboard. Using the conditional operator determine if the numbers are in ascending order. If they are in ascending order store the character ‘A’ in a char variable otherwise store a ‘D’ character in the char variable. Do not duplicate assignment operations.
Answer:
Program:
First_number = int(input("Enter first number")) # The first number is entered by the user.
second_number = int(input("Enter second number")) # The second number is entered by the user.
third_number = int(input("Enter Third number")) # The Third number is entered by the user.
if(First_number<second_number)and(second_number<third_number):# compare the first number with second number and the second number with the third number.
store ='A' # assign the 'A' value on store variable.
else:
store= 'D' # Assign the D value on store variable.
Output:
If the user inputs 4,5,6 then store variable holds 'A'.If the user inputs 6,5,4 then store variable holds 'D'.Explanation:
The above program is written in python language in which the first, second and the third line of the program is used to rendering the message to the user and take the inputs from the user and stored the value on First_number, second_number, and third_number after converting the value on int.Then the fourth line of the program is used to compare that the first number and second number are in ascending order or not and it also checks that the second number and third number are in ascending order or not. Then assign the 'A' character for the store variable if both the condition is true because it is separated by 'and' operator which gives true if both the condition is true.Otherwise, assign the 'D' character on the store variable.Final answer:
To check if three int values are in ascending order and assign 'A' or 'D' to a char variable accordingly, use the conditional operator in a single line of code after obtaining the int values from the user.
Explanation:
To determine if three integer values are in ascending order using the conditional operator, you can perform a comparison between them. If you have three variables, let's call them num1, num2, and num3, the ascending order condition would be num1 < num2 and num2 < num3. If this condition is true, the character 'A' is assigned to a character variable; otherwise, the character 'D' is assigned. With the conditional operator, it would look something like this:
char order = (num1 < num2 && num2 < num3) ? 'A' : 'D';
This single line checks the condition and assigns 'A' to order if the numbers are in ascending order, or 'D' if they are not. It's important to ensure that you retrieve the integer values from the keyboard correctly and store them in the variables num1, num2, num3 before evaluating the conditional expression.
A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integrate, analyze, and apply the available information effectively?
a. online market research tools
b. integrated marketing systems
c. CRM systems
d. internal survey methods
e. quality assurance tools
Answer:
C. CMR systems
Explanation:
CMR or customer relationship management is a strategy that uses data analysis of customers to manage the interaction between a company and current and potential customers.
It analyses the data of client from different channels like wesites, email, social media,telephone log etc, describing and predicting potential decisions to be made to enhance customer service and acquisition.
Here are the steps. (1) Create a Student class containing an ID, a last name, and a list of course names such as "COP2210" or "COP2250". This should not be a string of multiple courses. The ID should be an integer which is printed with leading zeros. (2) Create a class named StudentTest that contains a List of students. Do not use the list provided here. In the class constructor, create 15 students and add them to the list. Each student's ID must be different. Each student you add to the list must contain 2-4 different course names. At least one should have two course names and at least one should have four course names. Make sure the students do not all have the same courses, although there should be some overlap (see the sample below). The student names must be inserted into the list in random order (not sorted). (3) Sort the list in ascending order by student last name and display the list. For each student, display the ID with leading zeros, last name, and list of courses on a single line. Here is sample output. Note how the tab character is inserted after the name to line up the next column containing courses. Be sure there is no trailing comma at the end of the list of courses.
Answer:
Java code is given below with appropriate comments
Explanation:
import java.util.*;
public class Student
{
String ID, lastName;
//Arraylist to store courses
ArrayList courses = new ArrayList();
public Student()
{
//Default constructor
ID = "";
lastName = "";
}
public Student(String I, String l)
{
//Parameterized Constructor to initialize
ID = I;
lastName = l;
int i, n;
String temp;
Scanner sc = new Scanner(System.in);
System.out.print("\nHow many courses you want to add: ");
n = Integer.parseInt(sc.nextLine());
if(n < 3){ //Cannot choose less than 3 courses
System.out.println("\nNumber of courses must be at least 3.");
return;
}
for(i = 1; i <= n; i++)
{
System.out.print("\nEnter course name: ");
temp = sc.nextLine();
if(courses.contains(temp))//If course already present
{
System.out.println("\nCourse already present. Try another.");
i--;
}
else
{
courses.add(temp); //Adding course
}
}
}
//Accessors
public String getID()
{
return ID;
}
public String getName()
{
return lastName;
}
public ArrayList getCourses()
{
return courses;
}
//Mutators
public void setID(String i)
{
ID = i;
}
public void setName(String n)
{
lastName = n;
}
public void setCourses(ArrayList c)
{
courses.clear();
courses.addAll(c);
}
}
class StudentTest
{
//To store 10 students
Student[] list = new Student[10];
public StudentTest(){
int i, j, flag;
Scanner sc = new Scanner(System.in);
for(i = 0; i < 10; i++)
{
String temp, l;
System.out.print("\nEnter student ID: ");
temp = sc.nextLine();
flag = 1;
for(j = 0; j < i; j++)
{
if(list[j].getID().equals(temp))//If ID already exists
{
System.out.println("\nID already exists. Try another.");
flag = 0;
i--;
break;
}
}
if(flag == 1)
{
System.out.print("\nEnter student Last name: ");
l = sc.nextLine();
list[i] = new Student(temp, l); //Initializing student
}
}
}
public void sort()
{
//To sort and display
int i, j;
String temp;
ArrayList t = new ArrayList();
for(i = 0; i < 9; i++)
{
for(j = 0; j < 9 - i; j++)
{
if(list[j].getName().compareTo(list[j + 1].getName()) > 0)//If list[j + 1].lastName needs to come before list[j].lastName
{
//Swapping IDs
temp = list[j].getID();
list[j].setID(list[j + 1].getID());
list[j + 1].setID(temp);
//Swapping last names
temp = list[j].getName();
list[j].setName(list[j + 1].getName());
list[j + 1].setName(temp);
//Swapping courses
t.clear();
t.addAll(list[j].getCourses());
list[j].setCourses(list[j + 1].getCourses());
list[j + 1].setCourses(t);
}
}
}
//Display
System.out.println();
for(i = 0; i < 10; i++)
{
System.out.print(list[i].getID() + ", " + list[i].getName());
//Using fencepost loop to print with comma before
System.out.print(" " + list[i].getCourses().get(0));
for(j = 1; j < list[i].getCourses().size(); j++)
System.out.print(", " + list[i].getCourses().get(j));
System.out.println();
}
}
public static void main(String args[])
{
StudentTest S = new StudentTest();
S.sort();
}
}
Suppose you are a project manager who typically has been using a waterfall development-based methodology on a large and complex project. Your manager has just read the latest article in Computerworld that advocates replacing this methodology with the Unified Process and comes to you requesting you to switch. What do you say?
Answer:
Answer explained below
Explanation:
Depending upon the current situation we can switch. That means suppose the entire project is mid way that means we already implemented the project by Waterfall methodology then it would take lot of time to switch to Prototype model. Again if we see the efficiency I mean if we complete the project using prototype model and the outcome would be very well and robust then we should definitely switch to prototype model. So depending on the scenario we need to decide whether it would be beneficial to switch or not.
Further, we have the differences between Waterfall and Prototype :
I) In case of Waterfall model requirements should be very well known. On the other hand in case of prototype model if the user requirements are not complete then we can choose prototype model.
II) Technical issues should be cleared in case of Waterfall model, on the other hand technical requirements need not be clear.
Advantages of Waterfall:
I) Easy to understand this model and easy to use.
II) It provides structure to inexperienced staff
III) Milestones are well understood
IV) Set requirements stability
Disadvantages of Waterfall Model:
I) All requirements must be known upfront
II) Inhibits flexibility
III) Can give a false impression of progree
Advantage of Prototype Model:
I) Even if user requirements are not complete we can use
II) Even if technical issues are not clear we can use
Disadvantage of Prototype:
I) The Model is complex
II) Risk Assessment expertise is required
III)Time spent for evaluating risks too large for small projects.
A(n) ___________ is one of the most common examples of redundancy built into a network to helpreduce the impact of disruption.
a.network cloaking device
b.backup punch card reader
c.uninterruptible power supply
d.service level agreemente.help desk
Answer:
C. Uninterrupted power supply.
Explanation:
Uninterrupted power supply or UPS is device that is connected to the main power supply of a system or a network of computer systems to provide power, when the main power supply is down. It promotes power redundancy for a reliable network.
Network cloaking device is used to hide a networks domain name, while it is being broadcast across.
The backup punch card is an outdated technology used for recording digital data.
Service level agreement is a documented agreement between the services providers and companies, on the method or form of service to be rendered.
Answer:
c.uninterruptible power supply
Explanation:
Disruption means disturbance or problems which interrupt an event, activity, or process.
Uninterrupted power supply helps to prevent our system from being interrupted while functioning.
Software licensing is a major problem in cloud computing. Discuss several ideas to prevent an administrator from hijacking the authorization to use a software license.
Answer:
Yes, the software license is a major problem in cloud computing.
Explanation:
The ad network administrator or system administrator he or she has to buy hardware appliance such server, firewall protection and operating system and their licenses. Each purchase is addon cost to and depends on the organization decided on the investment process.
Moreover, the system administrator should do daily routine check the patches of the operating system and firewall and schedule checking has to be made and update the firewall. In case if any hijacking taking place he has to contact immediately the hardware firewall supplier or service provider for help
In clouds, all threats are taken care and the network administrator only has to check any new supporting software that has to update in the client pc or workstation and laptop.
As an investor of organizations has to compare cloud licenses cost and local hardware appliance and software licenses and has to make a decision.
____________ is demonstrated by the processes and procedures that an organization uses to meet the law.A. An auditB. SecurityC. ComplianceD. An administrative procedure
Answer:
D
Explanation:
because it is a administrative procedure
Answer:
the answer is D. administrative procedure
Explanation:
that is the answer
You are consulting for a trucking company that does a large amount ofbusiness shipping packages between New York and Boston. The volume ishigh enough that they have to send a number of trucks each day betweenthe two locations. Trucks have a fixed limit w on the maximum amountof weight they are allowed to carry. Boxes arrive at the New York stationone by one, and each package i has a weight wi. The trucking stationis quite small, so at most one truck can be at the station at any time.Company policy requires that boxes are shipped in the order they arrive;otherwise, a customer might get upset upon seeing a box that arrivedafter his make it to Boston faster. At the moment, the company is usinga simple greedy algorithm for packing: they pack boxes in the order theyarrive, and whenever the next box does not fit, they, send the truck on itsway.But they wonder if they might be using too many trucks, and theywant your opinion on whether the situation can be improved. Here ishow they are thinking. Maybe one could decrease the number of trucksneeded by sometimes sending off a truck that was less full, and in thisway allow the next few trucks to be better packed.Prove that, for a given set of boxes with specified weights, the greedyalgorithm currently in use actually minimizes the number of trucks thatare needed. Your proof should follow the type of analysis we used forthe Interval Scheduling Problem: it should establish the optimality of thisgreedy packing algorithm by identifying a measure under which it "staysahead" of all other solutions.
Answer:
Answer explained with detail below
Explanation:
Consider the solution given by the greedy algorithm as a sequence of packages, here represented by indexes: 1, 2, 3, ... n. Each package i has a weight, w_i, and an assigned truck t_i. { t_i } is a non-decreasing sequence (as the k'th truck is sent out before anything is placed on the k+1'th truck). If t_n = m, that means our solution takes m trucks to send out the n packages.
If the greedy solution is non-optimal, then there exists another solution { t'_i }, with the same constraints, s.t. t'_n = m' < t_n = m.
Consider the optimal solution that matches the greedy solution as long as possible, so \for all i < k, t_i = t'_i, and t_k != t'_k.
t_k != t'_k => Either
1) t_k = 1 + t'_k
i.e. the greedy solution switched trucks before the optimal solution.
But the greedy solution only switches trucks when the current truck is full. Since t_i = t'_i i < k, the contents of the current truck after adding the k - 1'th package are identical for the greedy and the optimal solutions.
So, if the greedy solution switched trucks, that means that the truck couldn't fit the k'th package, so the optimal solution must switch trucks as well.
So this situation cannot arise.
2) t'_k = 1 + t_k
i.e. the optimal solution switches trucks before the greedy solution.
Construct the sequence { t"_i } s.t.
t"_i = t_i, i <= k
t"_k = t'_i, i > k
This is the same as the optimal solution, except package k has been moved from truck t'_k to truck (t'_k - 1). Truck t'_k cannot be overpacked, since it has one less packages than it did in the optimal solution, and truck (t'_k - 1)
cannot be overpacked, since it has no more packages than it did in the greedy solution.
So { t"_i } must be a valid solution. If k = n, then we may have decreased the number of trucks required, which is a contradiction of the optimality of { t'_i }. Otherwise, we did not increase the number of trucks, so we created an optimal solution that matches { t_i } longer than { t'_i } does, which is a contradiction of the definition of { t'_i }.
So the greedy solution must be optimal.
A computer has a CPU that can execute 10 million instructions per second and a memory has a transfer rate of 100 million bytes per second. When interrupt-driven I/O is performed, the ISR has to execute 50 instructions to transfer one byte between memory and I/O device. What is the maximum data transfer rate during I/O operations implemented by using interrupt-driven I/O
Answer:
2 x 10⁵ bytes per second
Explanation:
Given:
MIPS rate = maximum speed of CPU to execute instructions = 10 million instructions per seconds
number of instructions required to transfer 1 byte using interrupt driven I/O = 50
Maximum number of bytes that can be transferred in 1 second = MIPS rate / number of instructions for 1 byte
=> max number of bytes = 10 million / 50 = 10 x 10⁶ / 50 = 2 x 10⁵
which is less than the maximum transfer rate of memory = 100 million bytes per second
So, maximum data transfer rate during I/O operations by using interrupt-driven I/O is 2 x 10⁵ bytes per second
Which two ways should a developer create this functionality? A developer is asked to create a PDF quote document formatted using the company's branding guidelines, and automatically save it to the Opportunity record.
A. Create a visualforce page with custom stylingB. Create a visual flow that implements the company s formattingC. Install an application from the AppExchange to generate documents.D. Create an email template and use it in Process builder.
Answer:
The answers are A and C.
Explanation:
To create a PDF quote document formatted using the company's branding guidelines, and automatically save it to the Opportunity record the developer must;
A .) Create a Visualforce page with custom styling.
C.) Install an application from the AppExchange to generate documents.
To create a PDF quote document formatted using the company's branding guidelines and save it to the Opportunity record, developers can choose between creating a visualforce page with custom styling or creating a visual flow that implements the company's formatting.
Explanation:In order to create a PDF quote document formatted using the company's branding guidelines and save it to the Opportunity record, there are two recommended ways a developer can create this functionality:
A(n) ____________________ is the collection of individuals responsible for the overall planning and development of the contingency planning process.
Answer:
Contingency Planning Management Team (CPMT)
Explanation:
:)
Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call findMax() twice in an expression.
import java.util.Scanner;
public class SumOfMax {
public static double findMax(double num1, double num2) {
double maxVal = 0.0;
// Note: if-else statements need not be understood to
// complete this activity
if (num1 > num2) { // if num1 is greater than num2,
maxVal = num1; // then num1 is the maxVal.
}
else { // Otherwise,
maxVal = num2; // num2 is the maxVal.
}
return maxVal;
}
public static void main(String [] args) {
double numA = 5.0;
double numB = 10.0;
double numY = 3.0;
double numZ = 7.0;
double maxSum = 0.0;
/* Your solution goes here */
System.out.print("maxSum is: " + maxSum);
return;
}
}
Answer:
maxSum=findMax(numA,numB)+findMax(numY,numZ);
Explanation:
In the above statement, a function is used twice to calculate the maximum of 2 numbers passed as parameters of type double and returns the maximum value of type double as well. As the function is static, so, there is no need to make an object of the class in which the function is made. After finding the largest of both the pairs, the values are added and printed to console.
Answer:
maxSum = findMax(numA, numB); // first call of findMax
maxSum = maxSum + findMax(numY, numZ); // second call
Explanation:
What factor(s) should be considered when determining whether a business is too far based on the query and the user location? Select all that apply.a. True/False-Type of Business/entityb. True/ False-User Locationc. True/ False- your judgmentd. True/False- User Intent
Answer: A. True/false-Type of Busirness/entity and
B. True/false-User Location
Explanation
Business/entity and Usee location ia what considered when determining whether a business is too far based on the query and the user location
Write a complete C program to run on the MSP432 platform to do the following:
Declare an array of size 3 x 7 of type uint8_t. Use loops to initialize each array element to contain the value of the sum of its indices (e.g., for element arr[2][5], write a value of 7 to arr[2][5], write a value of 7 to arr[1][6], etc.). Use additional loops to go through the array and test each value – if a value is not a multiple of 5, add that value to a cumulative sum and write a zero to the array element. If it is a multiple of 5, leave it untouched. Print the final result as a 16-bit integer value (the sum of the array elements not multiples of 5). Be sure to compile it in CCS to catch any syntax errors.
Answer:
The C code is given below with appropriate comments
Explanation:
#include <stdio.h>
int main()
{
//array declaration
int arr[3][7], cumulativeSum = 0;
//initialize the array
for(int i=0; i<3; i++)
{
for(int j=0; j<7; j++)
{
arr[i][j] = i+j;
}
}
//calculate the cumulative sum
for(int i=0; i<3; i++)
{
for(int j=0; j<7; j++)
{
if((arr[i][j] % 5) != 0)
{
cumulativeSum += arr[i][j];
arr[i][j] = 0;
}
}
}
//display the final array
printf("The final array is: \n\n");
for(int i=0; i<3; i++)
{
for(int j=0; j<7; j++)
{
printf("%d ", arr[i][j]);
}
printf("\n");
}
//display the cumulative sum
printf("\nCumulative Sum = %d", cumulativeSum);
return 0;
}
The easiest way to run a web page that’s already in your browser after you’ve made changes to the code for the page is to
Answer:
click on the Reload or Refresh button
Explanation:
If you are having problems with a page that loads slowly or does not display correctly, you can refresh the page. Depending on which Internet browser you are using - Internet Explorer, Firefox or Chrome - the buttons may be in different areas of the screen or look slightly different. However, it does not matter if they are different since each button will give the same result: the web page you are viewing will reload or update.
Which of the following attack is a threat to confidentiality?
a. snooping
b. masquerading
c. repudiation
Answer:
The correct answer is letter "B": masquerading.
Explanation:
The attack referred to as masquerading simply consists of impersonating the identity of an authorized user of an information system. The impersonation could take place electronically -the user has a login and password that does not belong to him to access a server- or personally -employees accessing restricted areas of a company.
b. masquerading attack is a threat to confidentiality.
Masquerade terms can be as follows:
The term "masquerade" refers to the act of pretending to be someone else.Masquerading is a simple attack that involves faking the identity of an authorized user of an information system.Impersonation can occur either electronically (e.g., when a user uses a login and password which does not belong to him to access a server) or personally (e.g., when workers get access to restricted sections of a firm).Learn more: https://brainly.com/question/17085630
What technology would you like to use or see developed that would help you be a "citizen of the world"?
Answer and explanation:
While traveling abroad the main barrier to be considered is language. Entrepreneurs should focus special attention on developing mobile apps that interpret people's segments accurately so regardless of the country and language they can communicate through the app and make them feel they are "citizens of the world".
Write a single statement that shifts row array attendanceValues one position to the left. The rightmost element in shiftedValues also keeps its value.
Ex: [10, 20, 30, 40] after shifting becomes [20, 30, 40, 40]
Hi, you haven't provided the programing language in which you need the code, I'll just explain how to do it using Matlab, and you can apply a similar method for any programming language.
Answer:
attendanceValues = [attendanceValues(2:end),attendanceValues(end)]
Explanation step by step:
We take all the values of the array from the second position until the end, in this case, we use attendanceValues(2:end) for that. We take the last value of the array using attendanceValues(end). We create a single array based on the result of step one plus step two. We save the new array in the old one reusing attendanceValues.
The program written shifts the row array of attendance values one position to the left, the program written in python 3 goes thus :
attendanceValues = [10, 20, 30, 40]
#the variable attendanceValues is a list of integers
shiftedValues = attendanceValues[1:], attendanceValues[-1]
#using list slicing, the value is selected from index 1 till the end and the last index value is added.
print(shiftedValues)
#displays the values in the shiftedValues list.
Learn more : https://brainly.com/question/15584303
Which of the following commands would you use to start the program Main with four strings? a. java Main arg0 arg1 arg2 arg3 b. java Main argo arg1 arg 2 arg3 arg4c. java Main argo arg1d. java Main argo arg1 arg 2
Answer:
A java Main arg0 arg1 arg2 arg3
Explanation:
The bee may travel to a different species of plant, so the pollen may not fertilize another flower. The wind can blow the dandelion seeds into an area where they can’t sprout. The squirrel might come back for the seeds it buried in the ground
Which NSX feature would enhance their security so that this doesn’t happen again?
NSX enhance logical switching, load balancing and microsegmentation which improves networking performance and operations.
The performance starts in Layer 2, NSX manage routing even in virtual or cloud networks. Its firewall can support up to 20Gb traffic and monitoring all at once. Next work will in Layer 4 to 7, using SSL by making regular routine checks on network activities on this layer.
As for security features, it uses microsegmentation which can make administrators manage policies of the network including making security groups.This would prevent previous attacks to happen again because NSX has firewalls that records and set policies in a network.
A large organization with a large block address (12.44.184.0/21) is split into one medium size company using the block address (12.44.184.0/22) and two small organizations. If the first small company uses the block (12.44.188.0/23), what is the remaining block that can be used by the second small company? Explain how the datagrams destined for the two small companies can be correctly routed to these companies if their address blocks still are part of the original company.
Answer:
The answer is explained below
Explanation:
The Organization mask is 21 so number of addresses granted to organization are 32 - 21 = 2048 addresses
Now, medium-size company has mask as 22 so number of addresses to medium-size organization are 32 - 22 = 1024 addresses
Each small organization has 32 - 23 = 512 addresses as mask is 23
That implies the range of addresses for each organization
Large Organization = 12.44.184.0/21 - 12.44.191.255/21
Medium organization = 12.44.184.0/22 - 12.44.187.255/22
small Organization 1: 12.44.188.0/23 - 12.44.189.255/23
small Organization 2: 12.44.190.0/23 - 12.44.181.255/23
so now if we have a router then we need to configure it so that when an address is routed correctly.
So router should be installed or configured for forward lookup which are defined in forwarding table
The forwarding table is configured o bases of longest prefix match
So Forward table will be:
00001100 00101100 10111110 small organization1
00001100 00101100 10111111 small organization2
00001100 00101100 1011110 medium-size organization
For each of them we can take an example in the range of its IP address and check this forwarding table will correctly identify the other inner organizations
A __________ watches for attacks and sounds an alert only when one occurs.a. network intrusion prevention system (NIPS)b. proxy intrusion devicec network intrusion detection system (NIDS)d. firewall
Answer:
The correct answer is letter "C": network intrusion detection system (NIDS).
Explanation:
A Network Intrusion Detection System (NIDS) is a network protection system configured to spot threats in any server connected to it. The NIDS has a history of common threats that is used to filter all the data flowing through the network. If malware is identified, an alert pops up with the suggested actions to follow in front of that case.