Answer:
program to this question can be defined as follows:
Program:
#include <iostream> //defining header file
using namespace std;
void send_number(int x) //defining method send_number
{
cout<<x; //print the value
}
int main() //defining main method
{
send_number(5); //calling a method
return 0;
}
Output:
5
Explanation:
In the given C++ language program, firstly the header file is defined, in the next step, the method "send_number" is defined, in which an integer variable "a"passed as parameter, in which the print method is used, that prints its value. In the main method, the method "send_number" is called, in which an integer value that is 5 is passed.An online service allows users to integrate their phonebook with their social media profiles and stores it on the cloud. The phonebook is updated with pictures of contacts when they are uploaded on social media sites. Which of the following cloud-based offerings is being provided to the users?a) software as a service (SaaS)b) Platform as a service (PaaS)c) Infrastructure as a service (IaaS)
QUESTION 3 Which of the following for loop headers will cause the body of the loop to be executed 100 times? a. for(int i = 0; i <= 100; i++) b. for(int i = 1; i < 100; i++) c. for(int i = 1; i <= 101; i++) d. for(int i = 0; i < 100; i++) e. none of these for loops will execute the loop body 100 times
Answer: a
Explanation:
for(int i = 1; i <= 100; i++)
means the execution start from 1 that is i=1 and execution will stop at 100 dot.
the loop will test the statement, if the statement is true it will execute and go to the next(that is increment by 1).
Answer:
0 + 10i
Explanation:
just did it on edge 2020
The cloud computing model has several unique and essential characteristics that distinguish cloud computing from an in-house infrastructure. One of these characteristics is ________.
Answer:
Rapid Elasticity is the correct answer of this question.
Explanation:
Rapid elasticity is a cloud computing phrase for scalable storage, or the capacity to deliver scalable software. The cloud computing model has many different and necessary features which separate both cloud computing and an in-house technology. One such attribute is Rapid Elasticity.
The principle of rapid elasticity in specific cloud computing conditions does cause some problems.The knowledge that companies still need to distribute and decommission services is often negligible on the part of the client or user.You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It includes a banner line and a notice regarding the content only being marked at the highest level of classification within the database. Is this information authorized for use as a source of derivative classification?
a) yes
b) no
Answer:
No
Explanation:
The information without any authentic source including a banner line and a notice regarding the content only being marked at the highest level of classification within the database is not authorized for use as a source of derivative classification.
Answer:
Yes
Explanation:
The information can be safely use as alternative source of derivative classification. This is because the information is reliable. The reliability of the information comes from the fact that the sources are authentic and easily traceable. In addition, such information follows the highest standards of safety, such as encryption, safety protocols, URL checks, malware checks and many other security checks.
___________provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.a. User support
b. Database administration
c. Systems support and security
d. Network administration
Answer:
C-Systems support and security
Explanation:
Systems support and security protect and maintain the system by troubleshooting and ensuring the proper installation of both the hardware and software as well as the system updates. It also including enterprise computing systems, transaction processing systems, and corporate IT infrastructure.
Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. Which stage of the software development life cycle is Keira ready for next?
Keira is using the software development life cycle to create a new app. She has the pseudocode for her program. The next stage for Keira is CODING.
Explanation :
SDLC or the Software Development Life Cycle is a process that produces software with the highest quality and lowest cost in the shortest time. SDLC includes a detailed plan for how to develop, alter, maintain, and replace a software system.SDLC involves several distinct stages, including planning, design, building, testing, and deployment. Popular SDLC models include the waterfall model, spiral model, and Agile model.The steps of the SDLC are given below :Identify the current problems. “What don’t we want?” Plan. “What do we want?” Design. “How will we get what we want?” Build. “Let’s create what we want.” This SDLC stage develops the software by generating all the actual code. If the previous steps have been followed with attention to detail, this is actually the least complicated step.Build is the phase which Keira should move onto in the SDLCSDLC done right can allow the highest level of management control and documentation. Developers understand what they should build and why. All parties agree on the goal up front and see a clear plan for arriving at that goal. Everyone understands the costs and resources required.Answer:
The answer is A because
Explanation:
You have designed a serverless learning management system and you are ready to deploy your code in to a test/dev environment. The system uses a combination of Lambda, API Gateway, S3 and CloudFront and is architected to be highly available, fault-tolerant and scalable. What are the three different ways you can deploy your code to Lambda?
Answer:
Lambda is a cloud computing platform developed by Amazon. It provides the opportunity to run without any form of administration. Clients pay based on computing power consumption.
To deploy your code to Lambda, the following options can be used. They are:
Inside Lambda, you can copy and paste your code to the IDE (Integrated Development Environment).
You can upload the zipped file of your code via the Lambda console
You can also write a cloud formation template to help ensure code and environment deployment.
Which operations security control prevents unauthorized intruders from internally or externally accessing the system and lowers the amount and impact of unintentional errors that are entering the system?
Answer:
Preventative controls
Explanation:
Preventative controls are measures taken to avoid or reduce the possibility of threats or errors from happening like standards and processes. In networks, the preventative controls block the attempts from unauthorized people to access a system. According to this, the answer is that the operations security control that prevents unauthorized intruders from internally or externally accessing the system and lowers the amount and impact of unintentional errors that are entering the system are preventative controls.
The screened subnet protects the DMZ systems and information from outside threats by providing a network with intermediate security, which means the network is less secure as the general public networks but more secure than the internal network.1. True2. False
Answer:swswsw
Explanation:swwsws
If you are viewing a webpage with customized or regenerated content, such as updated stock quotes, what type of webpage are you viewing? Group of answer choices dynamic static transformative animated
Answer:
Dynamic
Explanation:
A dynamic web page is a type of web page that shows different and diverse content each time it's viewed. For instance, the webpage may adjust with every passing time of day, it might also change according to the different preference of each user that accesses the webpage, or the kind of user interaction.
You have been using the same computer for several years. To extend its service life, you decide to upgrade the processor. You check the motherboard documentation and purchase the fastest processor supported by the motherboard. However, when you start the computer, it beeps regularly, nothing is displayed on the screen, and it doesn't start. What should you do?A. Return the CPU for a new one.B. Update the UEFI firmware.C. Press F8 while booting the computer.D. Upgrade the motherboard.
Answer:
B. Update the UEFI firmware
Explanation:
UEFI (Unified Extensible Firmware Interface) is a standard firmware interface for PCs. It is responsible for waking up the computer hardware components and ensure they are functioning properly.
The old processor was controlled by an older version of the UEFI but to run the new processor, you update the Firmware Interface to enable it communicate with the computer's hardware components.
Cathy experiences issues in her internet connection. She contacts a network administrator. Which protocol will the administrator use to check for errors?
A HTTP
B LDAP
C ICMP
D FTP
There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.
Answer:
5
Explanation:
Fill in the blanksThere are 5 modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used.
People who are regular visitors to SyFy (a website maintained by a science fiction cable network) and those who are regular visitors to BHG (a website maintained by the producers of BHG-TV and the publishers of a women's magazine) belong to different ________ segments.
Answer: Psychographic Segments
Explanation:
Psychographics is the qualitative method of studying consumers or people based on their psychological characteristics and traits. When values, aspirations, goals, desires, interests, and lifestyle choices of people are utilized to in other to know exactly what to bring into the market, then you are using Psychographics in marketing focus which is usually focused on understanding the consumer's emotions and values, to market whatever it is more accurately.
From the question, those who visit Syfy and those that regularly visit BHG are from different psychographic segments because they have different interests and/or values. And the owners of these sites upload contents that will make them to continue to visit the site and enrich the site owners. (Market)
You need to provide connectivity between two buildings without running any cables. You decided to use two 802.11ac APs to provide wireless connectivity between the buildings. Which of the following is the BEST choice to support this need?
a. Use omnidirectional antennas on both APs.
b. Use wide channels.
c. Use the 2.4 GHz frequency band.
d. Use direction antennas on both APs.
Answer:
D
Explanation:
Use Directional antennas on both APs
Compare and contrast if-else and elif statements. Give examples.
Explanation:
In coding, decisions are required only if certain conditions are fulfilled or met. If these conditions are met or not, the outcome should either be TRUE or FALSE before action of these statements is taken. An If else statement evaluates to FALSE when a Boolean expression is not met or is not true. Consider the snippet code below as an example
If 10==10
Print (10 is equal to 10)
Else:
Print (It is incorrect)
So, the above means that the program will evaluate to true if 10==10, and will print “It is incorrect” if another value is provided that evaluates to false
The elif statements, on the other hand, checks all conditions in your code and if one statement is TRUE, it will execute.
if 5.5 == int):
print("Value is Integer")
elif 5.6 == float):
print(“Value is Float”)
elif 5.5 == complex):
print("Value is Complex")
else:
print("Unknown")
Each condition is evaluated one after the other until a TRUE condition is found and evaluated. If all conditions happen to be FALSE, the else statement will be printed.
Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation.
Answer:
The answer is ".pcapng"
Explanation:
Wireshark format includes a "dump" with data packets, which is collected over a channel and sometimes a common folder to store, that data in the PCAP Next Iteration file system.
The .pcapng stands for the file system, this file system compatible with the recorded data transmission packet. It includes several data blocks. It is quite robust, but it should not be helped by the other devices. Wireshark allows the libpcap system as well.In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across the Internet and thus detectable.
Answer:
SYN spoofing attacks.
Explanation:
The Spoofing attack is used to access the personal information it is distributed the viruses through infected links or file .The spoofing attacks has redistributed the traffic and the flow control in the denial-of-service attacks.
The SYN spoofing attacks is used the spoofed source in the result of giving response to packet The Spoofing attack is distributed across the Internet also it is detectable
Your company has decided it wants to build a file server and store data that can be shared by coworkers. You were asked to research the type of storage that should be used on the server. Your boss said that he would like to implement RAID on the computer and wants your opinion on the best RAID type for the company. He informed you that the company will need at least 500 TB of storage. He also wants to make sure that if a drive fails, the data can be recovered. In addition, he told you to keep the cost down as much as possible. What will you recommend to your boss?
Answer:
RAID 5
Explanation:
One of the most common and best RAID configurations is the RAID 5. It is ideal for application and file servers with a restricted number of drives. RAID 5 is Considered as a good all-around RAID system in that it combines the better elements of efficiency and performance among the different RAID configurations.
Raid 5 is known to be fast, and reliable . It also offers cheap data redundancy and fault tolerance. Writes tend to be slower, due to the parity data calculation, but data can be accessed and read even when a failed drive is being rebuilt.
In a case of drive failure ,RAID 5 system can read the information contained on the other drives and recreate that data, accommodating a single drive failure.
In conclusion, the RAID 5 configuration is Cost Effective and has ability to recover from failures, thus it will be best option to be recommended tomy boss.
Final answer:
RAID 6 is recommended based on the need for at least 500 TB of storage, data recoverability from drive failures, and cost-effectiveness. It provides better data protection than RAID 5 and is more cost-effective than RAID 10, while maintaining the redundancy required for safe storage.
Explanation:
Considering the requirements of having at least 500 TB of storage, the necessity for data recovery in case of a drive failure, and the need to manage costs effectively, the RAID 6 configuration is recommended. RAID 6 provides fault tolerance by allowing up to two disk failures without data loss, which would give your company the redundancy needed to safeguard the stored data. While RAID 5 also provides fault tolerance, it only allows for a single drive failure, which might not provide enough protection for such a large data set. RAID 6, however, uses two parity blocks rather than one, giving it higher reliability.
It would require a minimum of 4 drives, and because of the dual parity, it would slightly reduce the total storage size available. However, this is a cost-effective solution compared to more expensive options like RAID 10, which offers great performance and redundancy but would require double the number of drives for the same usable storage space. When selecting drives for the RAID array, using enterprise-level hard drives is recommended as they are made for the rigors of continuous operation, which can extend the reliability and lifespan of your storage system.
I have sampled a trumpet note and keymapped it to MIDI notes 55 to 65. If I play MIDI note 60 and hear middle C, what will I hear if I play MIDI note 62?
Answer:
The answer is D.
Explanation:
The musical interval between two notes depends on the ratio of their frequencies. An octave is a ratio of 2:1, an octave comprises 12 equal semitones. Each semitone therefore has a ratio of:
[tex]2^{\frac{1}{12} }[/tex]≈ 1.059
Then by convention, A4 is often set at 440 Hz and has MIDI note 69.
MIDI note 68 wich is one semitone below A4, that is, G#:
G#= [tex]\frac{440}{1.059}[/tex]=415.3 Hz
MIDI note 67 wich is one semitone below G#, that is, G:
G= [tex]\frac{415.3 }{1.059}[/tex]=392 Hz
MIDI note 66 wich is one semitone below G, that is, F#:
F#= [tex]\frac{392 }{1.059}[/tex]=369.9 Hz
MIDI note 65 wich is one semitone below F#, that is, F:
F= [tex]\frac{369.9 }{1.059}[/tex]=349.23 Hz
MIDI note 64 wich is one semitone below F, that is, E:
E= [tex]\frac{349.23 }{1.059}[/tex]=329.63 Hz
MIDI note 63 wich is one semitone below E, that is, D#:
D#= [tex]\frac{329.63 }{1.059}[/tex]=311.13 Hz
Therefore MIDI note 62 wich is one semitone below D#, that is,D:
D= [tex]\frac{311.13 }{1.059}[/tex]=293.6 Hz
Final answer:
If MIDI note 60 corresponds to middle C, then playing MIDI note 62 will result in the note D4, which is two semitones higher.
Explanation:
The student is asking about the relationship between MIDI notes and the pitches they represent. When a student plays MIDI note 60 and hears middle C, they are referencing the standard tuning where MIDI note 60 corresponds to middle C, which is 261.63 Hz (slight discrepancy from the 263 Hz mentioned, but both are commonly used to represent middle C). If the student then plays MIDI note 62 on the same key-mapped trumpet sample, they should expect to hear a note that is two semitones higher than middle C, which is the note D4.
Analyze the following network traffic logs depicting communications between Computer1 and Computer2 on opposite sides of a router. The information was captured by the computer with the IPv4 address 10.254.254.10.
Question Continuation
Computer1 Computer2
[192.168.1.105]------[INSIDE 192.168.1.1 router OUTSIDE 10.254.254.1]
-----[10.254.254.10] LOGS
7:58:36 SRC 10.254.254.1:3030, DST 10.254.254.10:80, SYN
7:58:38 SRC 10.254.254.10:80, DST 10.254.254.1:3030, SYN/ACK
7:58:40 SRC 10.254.254.1:3030, DST 10.254.254.10:80, ACK
Given the information, what can you infer about the network communications?
Answer:
What can be concluded from the above log is that; the router implements the Network Address Translation (NAT).
Explanation:
Network address translation (NAT) is a refers to the of remapping one IP address by enabling a private IP networks that use unregistered IP addresses to connect to the Internet.
This can be seen as allowing the router to repackage some packets so that the devices can have just one IP address.
As seen above, when the routes implements the NAT, the three networks were connected.
Which gives each network a private address so that packets can be sent to another network through their IP addresses
In one week, your company received the following quantities of e-mail messages. Monday 240 Tuesday 315 Wednesday 290 Thursday 180 Friday 375 What is the average number of e-mail messages? A. 280 B. 285 C. 275 D. 310
Answer:
280
Explanation:
Average = (240 + 315 + 290 + 180 + 375) ÷ 5
= 1400 ÷ 5
= 280
Cheers
In a(n) ____ design, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen.
Answer:
I think it would be centralized
An increasing concern for privacy and widespread availability of encryption products has led to the use of encryption for individual files and even entire devices. Briefly discuss the current state of encryption with respect to forensic investigation.
Answer:
As investigators, we are limited to the information on the device that we can access. If a hard drive is fully encrypted, we have no easy access to the stored data and our investigative options become limited. The first thing an investigator must do is to determine the level and extent of the encryption. Weak passwords can be cracked, but if the user has implemented a strong password it becomes almost impossible to access via brute force methods. It could be that just a few files are encrypted and there could be unencrypted copies elsewhere on the device. The user could also be a creature of habit and use the same set of passwords. These passwords can be quickly located in easily decipherable formats throughout the system. In all cases, though, I tell investigators that digital evidence is just one piece of the body of evidence in a case. Don’t fall into a trap where you spend too much time trying to decrypt a potentially probative item, when valuable unencrypted data may be found by simply continuing your examination
Yesterday you installed a new game on your computer. When you ran the computer, you noticed that the application was running very slow. After you exited the game and restarted it, you received an error message saying, "Insufficient memory or disk space." You checked your hard drive and saw that you had more than 250GB of free space.What should you check next in Task Manager?
Answer:
Performance tab - Memory available
Explanation:
Based on the scenario being described within the question it can be said that the next thing you should check in the task manager would be the memory available in the performance tab. This tells you the amount of RAM memory that certain applications are using. Sometimes applications such as games, may have a memory leak in the coding causing the game to take up an excess amount of memory to run, which would cause the game to crash.
Final answer:
The next step in troubleshooting the error message is to open Task Manager and check the memory usage of your system in both the 'Performance' and 'Processes' tabs to identify if RAM is fully utilized and if any applications are consuming too much memory.
Explanation:
When you encounter the error message 'Insufficient memory or disk space' despite having ample free hard drive space, the issue is likely related to RAM (Random Access Memory) and not storage space. The next step to troubleshoot in the Task Manager is to check the memory usage of your system. You can open Task Manager by pressing Ctrl + Shift + Esc or by right-clicking on the taskbar and selecting Task Manager.
Once opened, click on the 'Performance' tab to see if the RAM is being fully utilized. If it is, you may need to close some programs that are using a high amount of memory, or consider adding more RAM to your computer if possible. It can also be helpful to check the 'Processes' tab to see if any applications besides the game are consuming a disproportionate amount of memory.
Due to ________, early file processing systems were difficult to maintain.
a. frequent software upgrades
b. data dependency between the programs and files
c. complicated tables and fields with no metadata
d. lack of database administrators and IT personnel.
Answer:
b-data dependency between programs and files
Explanation:
The close relationship between data stored in files and the software programs that update and maintain those files. Any change in data organization or format requires a change in all the programs associated with those files.
What option is available on a Host A record to tell the system how long the record should remain in the database after it was created or last updated?
Answer:
Time to live.
Explanation:
The Time to Live is used for the purpose of the expiration table in the rows dynamically.The Time to live is represented in the time limit to stay in the database the Time to live It is no longer possible to fetch the data that has passed its closing timeout value also it is not displayed in the store metrics.
The Time to live is available on the host in the log informing the system how long the record will stay in the database after it has been generated or last modified.
____, a Symantec product, offers a number of residential firewall and security applications that also provide various degrees of content filtering and proxy services.
Answer:
Norton
Explanation:
Fill in the blanksNorton , a Symantec product, offers a number of residential firewall and security applications that also provide various degrees of content filtering and proxy services.
Why are some constraints automatically applied by the software
Answer:
Some constraint are automatically applied by the software while others must be entered manually because we have some shapes that just come with automatic constraint.
In instance can be given with square, this have all ot iits four sides equal with two set of parallel sides.
Explanation:
see Answer.
What integrates all departments and functions throughout an organization into a single IT system (or integrated set of IT systems) so employees can make decisions by viewing enterprisewide information about all business operations
Answer:
The correct answer to the following question will be "Enterprise Resource Planning".
Explanation:
Such applications usually provide dashboards where customers can stare at information gathered from all over the company in real-time to assess efficiency as well as profit margins.
Throughout different enterprise operations, ERP uses a consolidated platform for growing manual labor and automate current business interfaces.This incorporates all divisions and activities under a single This structure within a corporation.