Answer:
Viper Slash can be classified as a Question mark product
Explanation:
BCG matrix is a method developed by the Boston Consulting Group to analyze the strategic position and potential of businesses or products.
Business portfolios are evaluated using
Relative market shareMarket growth rateThe result of the analysis is divided into four quadrants
DogsCash cowsstars and question marksDogs: This comprises of business portfolios that operate in a slow-growing market. Investing in businesses in this quadrant is not advised due to their poor cash returns.Cash cows: These include business portfolios that provide high cash returns and should be milked. Stars: These are business portfolios that are operating in a fast-growing market and possess very high prospects of becoming cash cows.Question marks: are business portfolios that are underdogs in fast growing markets, they consume much cash but still, incurred losses. They don't gain many market shares despite high investments and have great tendencies to become dogs.
Ruth's Viper Slash falls into the Question marks category as the games section is a fast-growing market and struggle to gain market shares.
How much time per day does the average U.S. youth spend watching television, playing video games, or using a computer?
Answer:
7 hours 30 minutes per day.
Explanation:
Youths of this generation, they say, are addicted to screens. The CNN researchers made their research and claims that the youths average screen time is seven hours and thirty minutes.
This is a possibility as technology have provided that environment of digital communication and entertainment. From TV shows, video games to surfing the internet on computers and smartphones, and social messaging platform, adds up to the screen time of youths on a daily basis.
Tier I (core) capital includes at least some part of which of the following? I. Common stockholders' equity II. Retained earnings III. Subordinated debt IV. Allowance for loan and lease losses
Answer:
I and II only
Explanation:
Tier 1 capital is the core measure of a bank's financial strength from a regulator's point of view. It is composed of core capital, which consists primarily of common stock and disclosed reserves (or retained earnings) —that appears on the bank's financial statements, but may also include non-redeemable non-cumulative preferred stock.
Tier 1 capital is the assets the bank holds in its reserves in order to keep it functioning through all the risky transactions it performs, such as trading/investing and lending. Tier 1 capital includes common stock, retained earnings, and preferred stock.
Thus, Tier I (core) capital includes common stockholders' equity and retained earnings among the options.
Answer:
I. Common stockholders' equity II. Retained earnings
Explanation:
Tier 1 capital is a primary indicator of the financial power of a bank from authority's perspective. It is comprised of main assets, consisting primarily of common shares and declared assets, but can also contain un-redeemable un-cumulative preferred shares.
The core parts of equity capital are identified as the tier 1 capital: bonds, non-disposable balance sheets and retained income of shareholders, earned through the bank's lifetime. This reflects the capital sum which enables a bank to bear deficits without impacting depositors ' interest.
During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the general direction of movement of the other aircraft?
a) The other aircraft is crossing to the left
b) The other aircraft is crossing to the right
c) The other aircraft is approaching head-on
Answer:
a) The other aircraft is crossing to the left
Explanation: An aircraft is any vehicle such as an airplane that is able to fly in the air through the support of the air. Aircrafts usually overcome the force of gravity fr it to be able to sustain it's long movement in the air. An aircraft can either be an airplane or a balloon etc.
One of the traffic signals of the air flight system is that if an aircraft is flashing and steady red light ahead at the same altitude,it means the airplane is crossing left.
Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice.
Explanation:
Ethical Hackers or White Hat Hackers are the skilled security professional , monitors the organisations computer system , fixing the security issues and fixing them to monitor.
Ethical hacking includes
Scanning reports, seeking vulnerabilities Ethical Hacker will attempt to perform network traffic analysis, intrusion protection of the system. Programming or technical aspects of ethical hacking includes programming , networking , hardware engineering , coding , administration and software development. using social engineering techniques like online surfing , privacy , secured login and security of data Hackers find open ports to be attacked, detecting the security issues job of hackers is to resolve them and ensure the enhanced security. Assume there is a variable , h already associated with a positive integer value. Write the code necessary to count the number of perfect squares whose value is less than h , starting with 1 . (A perfect square is an integer like 9 , 16 , 25 , 36 that is equal to the square of another integer (in this case 3*3 , 4*4 , 5*5 , 6*6 respectively).) Assign the sum you compute to a variable q For example, if h is 19 , you would assign 4 to q because there are perfect squares (starting with 1 ) that are less than h are: 1 , 4 , 9 , 16 .
_____________________________________________________________________________
Answer:
pseudo code:
x=1
q=0
while x*x<h: {
x += 1}
q=x-1
complete code in C language
#include <stdio.h>
int main() {
int h=19;
int q=0;
int x=1;
while ((x*x)<h){
x += 1;
}
q=(x-1);
printf("The sum of total perfect squares less than %d is: %d", h,q);
return 0;
}
Explanation:
first '%d' in print statement refers to h and second '%d' in print statement refers to q
A pirated movie-sharing service was discovered operating on company equipment. Administrators do not know who planted the service or who the users are. What technique could
be used to attempt to trace the identity of the users?
a. Ransomware
b. Typo squatting
c.Watering hole attack
d. Integer overflow
Answer:
The answer is "Option c".
Explanation:
The strike by beach bar is a protection task, in which the attacking player attempts to make concessions a community of end-users who are recognized to visit the organization by poisoning websites. It is also known as Watering hole attack. The main purpose to use this process to contaminate the computer of a directed user and achieve network access at both the target location and other options that can be identified as follows which are incorrect:
In option a, It is a software type, which is used to encode the files of a target, that's why It's not right. In option b, It is also known as URL hijack, which is used in Cyber squats, that's why It's wrong. In option d, It is a part of the programming, which is used in arithmetic operation, that's why It's incorrect.Any one of the languages that people have designed for specific purposes, such as representing mathematical ideas or computer programs; all programming languages are these kinds of languages.
Answer:
The correct answer to the following question will be "Formal languages".
Explanation:
These are the languages that are developed for specific purposes by humans. For eg, the syntax used by mathematicians is indeed an official or formal language which is particularly effective in indicating numerical and symbolic connections. Chemists employ a technical language to embody the molecules.Programming languages are the languages of a formal type intended to be used to communicate complex calculations.Such languages are, thus, the languages that people developed for specific purposes.
A programming language is an artificial language designed for specific purposes, such as representing mathematical ideas or computer programs. Examples include Python, Java, and C++.
Explanation:Any one of the languages that people have designed for specific purposes, such as representing mathematical ideas or computer programs, is called a programming language. These languages are artificial languages that are created by humans. Examples of programming languages include Python, Java, and C++. They are used to write computer programs and give instructions to computers.
Why is it important for a company to identify its target market before developing a social media campaign?
Answer:
Explanation:
If we identify our target market, we can make social media campaign more efficient, in this case, we get people with similar hobbies and tastes, is easier to make segments with filters like age, nationality, language, and the hobbies, this is a powerful way to get new costumers and shoppers for our company via social media.
Which of the following is an example of a syntax error?
producing output before accepting input
subtracting when you meant to add
misspelling a programming language word
all of the above
Answer:
misspelling a programming language word
Explanation:
Syntax error is the type of error in programming, when the programmer insert some symbol that is not present in directories or libraries, the programmer not followed the rules of that particular programming language that is understandable to compiler.
For example in C++, it is necessary to insert the semicolon (;) after each statement. If the programmer not insert the semicolon after each statement, the program will show the syntax error.
If the programmer use integer instead of int to assign datatype to the variable in C++, it will also leads to the syntax error. Because in C++ library, Integer is defined with the help of "int".
A security risk to email is __________, which are fraudulent messages that prompt unwary users to reveal sensitive information or grant unauthorized access to protected networks. A. direct mail B. instant messaging C. phishing D. spam E. mass mail
Answer:
Option C is the correct answer for the above question.
Explanation:
Pishing is a type of attack which is used by the attacker to access the secured information from the system. It is used by the third person assuming for the system that he is the right use of the system and can access the information of the system.
The above question asked about the attack which can access the information to assume that he is the right user and give accessed to the network to been hacked. So the answer is phishing which is described above. Hence option C is the correct while the other is not because:-
Option A states about direct mail which is not a type of attack.Option B states about instant messaging which is also not a type of attack.Option D states about spam which is used to send the spam messages.Option 'E' states about the mass mail which is used to send the lots of spam mail.Landon starts his computer and receives the error message, "Hard drive is not found." In a panic, he calls you because he did not back up his data and has numerous important files on his hard drive. During your investigation, Landon tells you he was watching a movie on his computer the previous night.
What might be the problem with Landon’s computer?
A. CMOS RAM has lost power and reset to defaults.
B. Boot priority is set to the DVD drive.
C. POST failed.
D. Motherboard needs to be replaced.
Answer:
Option B is the correct option.
Explanation:
While the user facing a problem on his computer system that is he received a message that 'Hard drive is not found'. Then, he freaks out and calls his friend who is the technician because he has lots of important files and data in his hard drive, he tells him that he was watching a movie last night.
So, the technician tells him after the investigation is that its system's Boot priority is changed and it set to DVD drive.
Suppose we are working with two tables defined as follows: SALESREP(SalesRepNo, RepName, HireDate) and CUSTOMER(CustNo, CustName, Balance, SalesRepNo). Which of the following ANSI SQL queries would return only the name of the sales representative and the name of the customer for each customer that has a balance greater than 400?a. SELECT *
FROM SALESREP, CUSTOMER
WHERE Balance > 400;
b. SELECT DISTINCT RepName, CustName
FROM SALESREP, CUSTOMER
WHERE Balance > 400;
c. SELECT *
FROM SALESREP, CUSTOMER
WHERE SALESREP.SalesRepNo = CUSTOMER.SalesRepNo
AND Balance > 400;
d. SELECT RepName, CustName
FROM SALESREP, CUSTOMER
WHERE SALESREP.SalesRepNo = CUSTOMER.SalesRepNo
AND Balance > 400;
e. SELECT RepName, CustName
FROM SALESREP, CUSTOMER
WHERE Balance > 400
GROUP BY SalesRepNo;
Answer:
D. is the answer.
Explanation:
Since we need sales representative name and customer name, we should select only those columns.
Also we need to join the two tables with the common column i.e. "SalesRepNo", to get only the sales reps that have a sale and their corresponding cutomer(s).
Finally, we need to check for customer balance > 400 condition.
Drag the correct type of update to its definition.
Baseband
PRI
PRL
The connection between a mobile device and radio tower
The chip that controls the radio frequency waves within a device
A list of radio frequencies
Answer:
Base band : A list of radio frequencies
PRI : The chip that controls the radio frequency waves within a device
PRL: The connection between a mobile device and radio tower
Explanation:
Base-band is the range or band of frequencies. It contains a number of between upper and lower limit of the frequency. For example if the range of transmission of the signal is 2khz to 3khz. The frequencies between this range are called base band.
PRI is the chip that is used to control the different frequencies received at the device. This chip control the radio frequencies that are allowed to the devices. It is the short form of primary rate interface.
PRL is the list named as Preferred Roaming List. It has stored the information of the mobile devices that are connected to the mobile phone. This list is used while communicating between mobile device and tower.
You currently have 15 switches with an average of 20 stations connected to each switch. The switches are connected to one another so that all 300 computers can communicate with one another in a single LAN. You have been detecting a high percentage of broadcast frames on this LAN. You think the number of broadcasts might be having an impact on network performance. What should you do?
Answer:
Reorganize the network into smaller groups and connect each group to a router.
Explanation:
The user presently has 15 switches linked to another switch, with such an avg of 20 locations. The switches are linked to each other in such a manner that almost all systems can convey within a single Local area network. The high percentage to broadcast frames were found on that Local area network. They believe the amount of broadcasts could affect throughput.
So, they would reorganize each network into smaller units and link to such a router for each unit.
The 'client area' of a window is the area used to display the contents of the window (thus a title bar or border would lie outside the client area). For the Window class, the client area is nothing more than the entire window, and thus the height of the client area is nothing more than the value of the height instance variable.
Assume the existence of a Window class with existing methods, getWidth and getHeight. There is also a Window subclass, named TitledWindow that has an integer instance variable barHeight, containing the height of the title bar.
Write the method getClientAreaHeight for the TitledWindow class that returns the height (an integer) of the client area of a window with a title bar.
Answer:
The Java code is given below
Explanation:
Window.java:
public class Window {
private int width, height;
public Window(int width, int height) {
this.width = width;
this.height = height;
}
public int getHeight() {
return height;
}
public void setHeight(int height) {
this.height = height;
}
public int getWidth() {
return width;
}
public void setWidth(int width) {
this.width = width;
}
@Override
public String toString() {
return "Window [width=" + width + ", height=" + height + "]";
}
}
TitledWindow.java:
public class TitledWindow extends Window {
private int barHeight;
public TitledWindow(int width, int height, int barHeight) {
super(width, height);
this.barHeight = barHeight;
}
public int getClientAreaHeight() {
return barHeight + super.getHeight();
}
@Override
public String toString() {
return "TitledWindow [width=" + super.getWidth() + ", height=" + super.getHeight() + ", barHeight=" + barHeight + "]";
}
}
TestWindows.java:
public class TestWindows {
public static void main(String args[]) {
Window w = new Window(450, 200);
System.out.println("Window: " + w);
TitledWindow titledWindow = new TitledWindow(450, 200, 30);
System.out.println("titaledWindow: " + titledWindow);
System.out.println("titledWindow.height: " + titledWindow.getClientAreaHeight());
}
}
What process describes using technology as a basis for controlling the access and usage of sensitive data?
Answer:
Technical controls.
Explanation:
In a network, data is transmitted in form of packets and frames within a network or between networks. Users with authorised access to a network and a end device can easily access its services with the required tools.
Cyber attackers exploit vulnerabilities in networks to access information and services. For this technical control means are implemented. It uses technology as a mean of controlling access to networks and information.
Technologies like firewall, intrusion detection and prevention devices, antivirus and encryption are examples of technical control mechanism for access control.
1.The character escape sequence to force the cursor to go to the next line is________: 2. The character escape sequence to force the cursor to advance forward to the next tab setting is__________: 3.The character escape sequence to represent a single quote is_________: 4.The character escape sequence to represent a double quote is__________: 5.The character escape sequence to represent a backslash is__________:
Answer:
Hi there Kaylee! The answers to the blanks are as follow:
1.The character escape sequence to force the cursor to go to the next line is \n
2. The character escape sequence to force the cursor to advance forward to the next tab setting is \t
3.The character escape sequence to represent a single quote \'
4.The character escape sequence to represent a double quote is \"
5.The character escape sequence to represent a backslash is \\
Explanation:
Character escape sequences are used for processing of special characters that may otherwise be used in a context where those characters are reserved as keywords or carry other symbolic reference. If these are not escaped, the output will not be correct.
The process used to obtain the information system resources needed to provide the services necessary to meet a specific set of _______, no matter how broad or narrow, is known as system acquisition.
System Acquisiton: The process used to get the information system resources needed to provide services that are necessary to meet a specific set of needs.
- 2 fundamental strategies for system acquisition:
1) buy off-the-shelf software
2) build a custom application.
Which threats are characterized by possibly long periods of preparation (years is not uncommon), tremendous financial backing, a large and organized group of attackers, and attempts to subvert insiders or to plant individuals inside a potential target in advance of a planned attack?
A. Unstructured threats
B. Structured threats
C. Highly structured threats
D. Nation-state information warfare threats
Answer:
The answer is C. Highly structured threats
Explanation:
Highly structured threats are carried out with a very high level of precision. They have taken a lot of time and effort in identifying system vulnerabilities and strengths. These attackers could have massive financial support, which will enable them to hire highly technical personnel to effectively carry out the attack.
They target big financial institutions, corporate organizations, government agencies and other valuable units that can negatively affect the economy of the organization or nation at large.
E-commerce creates a great deal of data on how consumers interact with a website. L.L.Bean keeps records that show how quickly consumers make decisions, how many alternatives they explore, and whether they stop without completing a purchase. When a manager sees an issue and proposes a solution, the company can easily test the solution. This is an example of:
Answer:
Evidence based decision-making
Explanation:
Evidence-based decision-making uses research as the backbone for making decisions. It ensures that proper investigations are done before any decision is made.
This decision making technique carries out an in-depth analysis of empirical data collected from targeted sources. The decisions made are based on the following type of evidence:
Ethical evidence: research based on social justice to guide in making ethical decisions.Statistical modeling: using regression methods to make decisions in organizations.Impact evidence: making investigations based on the impact on others.Implementation evidence: considering the implementation and delivery success, after proper investigation.L.L. Bean works with the records of how quick customers make decisions and whether they complete their purchase. This means that they suggest solutions based on the evidence retrieved from the data.
In an information systems framework, ________ is the bridge between the computer side on the left and the human side on the right.
Answer:
Data
Explanation:
Information system frameworks are processes or stages in which data in created and transmitted between devices a network.
There are five components or stages in the information system frameworks, they are hardware, software, data, procedure and people.
These components are segmented into three different parts. They are the computer side, data and the human side. The computer side is the hardware and software components which is linked to the human side comprising of the people and procedure.
In Python, create a calculator that will ask the user to input a single dimension of a shape and then display its properties.
E.g. Enter the radius of a circle; Display the circle’s Diameter, Circumference and Area
Only done for square and circle.
The code is given in the explanation section.
Explanation:
def areacalcpy():
_input_ = input("Enter the shape that you wish to calculate the area: ")
shapearea = 0
pieval = 3.14
if _input_ == "Square":
sideval = int(input("Enter side value of the shape: "))
shapearea = shapearea + (sideval ** 2)
elif _input_ == "Circle":
circleradius = int(input("Enter radius value of the circle: "))
shapearea = shapearea + (2 * pieval * circleradius)
else:
print ("The given shape is invalid, give a valid shape to calculate area")
print ("%.2f" % shapearea)
areacalcpy()
The given code can calculate the area for both the shapes circle and square.
Similarly the area can be calculated for triangle and rectangle.
Alessandro wants to use his desktop computer to video chat with his mother. What hardware does he need to accomplish this?
Answer:
To video chat with his mother, he would need a webcam and speakers.
Explanation:
To have a successful video chat, the following must be present.
A computer with good internet accessMicrophone to send soundWebcam for visuals Speakers to listenFor Alessandro to successfully video chat with his mother, the above hardware must be in place.
To video talk with his mother, Alessandro will need the following hardware:
A computer with a camera and microphone.A fast internet connection.A video application, such as Zoom, or Meet.If Alessandro's computer does not have a built-in camera or microphone, he can purchase a microphone separately. He can also connect a headset to his computer which will include both a microphone and speakers.
Alessandro's internet connection should be fast enough to support video streaming. A good rule of thumb is to have an upload speed of at least 1 Mbps and a download speed of at least 3 Mbps.
For such more question on computer
https://brainly.com/question/31132139
#SPJ3
You are running a media-rich website with a global audience from us-east-1 for a customer in the publishing industry. The website updates every 20 minutes. The web-tier of the site sits on three EC2 instances inside an Auto Scaling Group. The Auto Scaling group is configured to scale when CPU utilization of the instances is greater than 70%. The Auto Scaling group sits behind an Elastic Load Balancer, and your static content lives in S3 and is distributed globally by CloudFront. Your RDS database is already the largest instance size available. CloudWatch metrics show that your RDS instance usually has around 2GB of memory free, and an average CPU utilization of 75%. Currently, it is taking your users in Japan and Australia approximately 3 - 5 seconds to load your website, and you have been asked to help reduce these load-times. How might you improve your page load times?
Answer:
Explanation:
The best option, we can use is CDN content delivery network or content distribution network is a proxy server with data centers around the world, this technology was implemented in 1990, and is so helpful to improve big websites with a lot of traffic, in this particular questions, we must improve the velocity in Japan and Australia, with CDN people in these countries will connect in near data centers, the data won't come from the USA or Europe in this case, will be a connection in the country or near.
My programming lab 9.2 C++ Write a full class definition for a class named Counter, and containing the following members:_______.
A) A data member counter of type int.
B) A constructor that takes one int argument and assigns its value to counter
C) A function called increment that accepts no parameters and returns no value.
D) Increment adds one to the counter data member.
E) A function called decrement that accepts no parameters and returns no value.
F) Decrement subtracts one from the counter data member.
G) A function called getValue that accepts no parameters.
H) It returns the value of the instance variable counter.
The Counter class definition in C++ includes a private integer data member, a constructor, increment and decrement functions, and a getValue function to manage and retrieve the counter's value.
Explanation:To write a full class definition for a class named Counter, which includes various members such as a data member, a constructor, and functions to increment, decrement, and get the value of the counter, the following C++ code can be used:
class Counter {This class consists of an int type data member named counter, a constructor that initializes this data member, an increment function which increases the counter by one each time it's called, a decrement function which does the opposite by decreasing the counter by one, and a getValue function that returns the current value of the counter. These members encapsulate the main functionalities expected from a counter.
You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need to be able to view and edit any file in the share folder.
You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the file. What should you do?
Answer:
Modify the NTFS permissions on the folder.
Explanation:
While any user using a folder on his Ms Windows Operating System and he wanted to share that folder with his team members by which they can view and modify any file in that shared folder. Then, He has to provide Full Control permission to that folder by which they can only view that file but they cannot modify it.
So, He has to modify the NTFS permission on the following folder by which only those people can view that folder who has logged in over the server.
Final answer:
The problem with users being unable to modify files in a shared Windows folder can typically be resolved by adjusting the NTFS permissions on the files or folder to grant the correct level of access for editing. This involves ensuring that the necessary user groups have the 'Modify' permission set under the folder's Security properties.
Explanation:
If users can open files in the shared folder but cannot modify them, this suggests that the NTFS permissions on the files or the parent folder may not allow for modifications, despite the share permissions being set to Full Control for Everyone. Share permissions and NTFS permissions work together to provide the final level of access for a user. Since the issue at hand deals with users being able to read but not write or edit files, it's important to check the NTFS permissions.
To resolve the issue, you need to perform the following steps:
Right-click on the folder in question and select Properties.Go to the Security tab.Ensure that the group or usernames that need write access are listed and have the Edit permissions.If not, click on Edit to modify the permissions.Grant the appropriate users or groups the Modify permission or full control as needed.Apply the changes and ensure that the users are informed so that they can test the new permissions.By ensuring that both share and NTFS permissions are set correctly, you will enable your development team to view and edit files within the shared folder.
Being ___________, or knowing how to use the computer as a device to gather, store, organize, and process information, can open up myriad sources of information.
Answer:
Computer-literate
Explanation:
Computer knowledge is divided into areas or families of applications:
Office automation (Mail, Internet, Desktop Publishing, Word Processors, Spreadsheets, etc.) Databases (Access, FoxPro, Oracle, SQL Server , etc.)Allows to have essential skills related to the use of devices, creation and administration of files, networks and information securityNetwork a0 is a process by which several protocols evolve to form a single product.
Answer:
Convergent network
Explanation:
In networking, computers devices are connected together to communicate and share resources. Devices like routers and switches are examples of intermediate network devices and computers, smartphones, tablets and IP phones are all examples of end devices in a network.
In the past, dedicated networks are installed for separate voice, text and video packets. But as information technology evolves, one network is used for all three packets. This network is called convergent network.
describe how landline phones are useful for transfers, use of short codes, conference calls
Answer:
Explanation:
These landline phones are so useful because we can elaborate a communication system, external or internal with multi-line, in this case, we can have until 4 lines, different people speaking at the same time, and the transfer call is easier because the phones are connected, only we must choose the line.
Which the following refers to interpreted data? A. Secondary data B. Information C. Raw data D. Scaling E. Primary data
Answer:
The answer is "Option B"
Explanation:
Interpreted information is also known as an analysis of information, it relates to an application of procedures, in which information is checked to come into an educated assumption, that defines, the analyzed knowledge, that's why other choices were wrong, which can be described as follows:
In option a, It is used to prevents needless work replication, that's why it is wrong. In option C, It is an external text file, which is used to store data. In option D, It is used in medicine, that's why it is not correct. In option E, It is used to organizing data, that's why it is wrong.