A ____ risk assessment evaluates threats to and vulnerabilities of the network.

Answers

Answer 1

Answer:

Vulnerability

Explanation:

Vulnerability refers to a weakness in your hardware, software, or procedures


Related Questions

Design a flowchart or pseudocode for a program that accepts two
numbers from a user and displays one of the following messages: First
is larger, second is larger, and numbers are equal.

Answers

Using the knowledge in computational language in python it is possible to write the code that design a flowchart or pseudocode for a program that accepts two numbers from a user and displays

Writting the code:

firstNum=int(input("enter the firstNum "))

secondNum=int(input("enter the secondNum "))

First="First is larger"

Second="Second is large"

Equal="Numbers are equl"

if firstNum>secondNum:

print(First)

elif(secondNum>firstNum):

print(Second)

else:

print(Equal)

See more about python at brainly.com/question/18502436

#SPJ1

Python programming using def function

Give the user a math quiz where they have
to subtract 2-digit integers. Present them
like this: 67 - 55.
Each time, tell the user whether they are
correct or incorrect. Continue presenting
problems to them until they enter a zero to
quit. At the end print the number right,
the number wrong, and the percent right.

Answers

Explanation:

For this program we'll need to know a couple concepts which are: while loops, user input, variables, converting strings to integers, and basic arithmetic operators, if statements, and the random module.

So let's first just declare the basic function, we can call this "main", or something a bit more descriptive, but for now I'll name it "main".

def main():

   # code will go here

main()

so now from here, we want to initialize some variables. We need to somehow keep track of how many they get correct and how many they've answered.

These two numbers may be the same, but at times they will be different from each other, so we'll need two variables. Let's just call the variable tracking how much have been answered as "answered" and the variable tracking how much are correct as "correct".

These two will initially be zero, since the user hasn't answered any questions or gotten any correct. So now we have the following code

def main():

   correct = 0

   answered  = 0

main()

Now let's use a while loop, which we break out of, once the user inputs zero. This may be a bit tricky if we use a condition since we'll have to ask for input before, so let's just use a while True loop, and then use an if statement to break out of it at the end of the loop.

Now we want to generate two numbers so we can use the random module. To access the functions from the random module you use the import statement which will look like this "import random". Now that you have access to these functions, we can use the randint function which generates random numbers between the two parameters you give it (including those end points). It says two digits, so let's use the endpoints 10 and 98, and I'll explain later why I'm limiting it to 98 and not 99.

The reason we want to limit it to 98 and not 99, is because it's possible for the two randomly generated numbers to be equal to each other, so the answer would be zero. This is a problem because the zero is used to quit the program. So what we can do in this case, is add one to one of the numbers, so they're no longer equal, but if they're equal to 99, then now we have a three digit number.

Now onto the user input for simplicitly, let's assume they enter valid input, all we have to do is store that input in a variable and convert it into an integer. We can immediately convert the input into an integer by surrounding the input by the int to convert it.

we of course want to display them the equation, and we can either do this through string concatenation or f-strings, but f-strings are a bit more easier to read.

So let's code this up:

import random

def main():

   correct = 0

   answered  = 0

   while True:

       num1 = random.randint(10, 98)

       num2 = random.randint(10, 98)

       

       if num1 == num2:
           num2 += 1

       userInput = int(input(f"{num1} - {num2}"))

main()

from here we first need to check if they entered zero and if so, break out of the loop. If they didn't enter zero, check if the userInput is equal to the actual answer and if it is, then add one to correct and finally add one to answered regardless of whether their answer is correct or not.

Outside the loop to display how much they got correct we can use an f-string just like we did previously. Since sometimes we'll get a non-terminating decimal, we can use the round function so it rounds to the nearest hundreth.

So let's code this up:

import random

def main():

   correct = 0

   answered  = 0

   while True:

       num1 = random.randint(10, 98)

       num2 = random.randint(10, 98)

       if num1 == num2: # the answer would be zero
           num2 += 1 # makes sure the answer isn't zero

       userInput = int(input(f"{num1} - {num2}"))

       if userInput == 0: # first check if they want to stop

           break

       if userInput == (num1 - num2):
           correct += 1

       answered += 1

   print(f"Correct: {correct}\nIncorrect: {answered - correct}\nPercent: {round(correct/answered, 2)}")

main()

and that should pretty much be it. The last line is just some formatting so it looks a bit better when displaying.

Consider a 3x4 rectangular shape room. Four computers are located at the four
corners of the room. The HUB is placed on the center of the room. Calculate the
minimum length of cables required to connect the computers in a network in each of the
following topologies:
a) Bus topology
b) Ring topology
c) Star topology
d) Mesh topology

Answers

The minimum length of cables required to connect the computers in a network in each of the bus topology. Thus, option (a) is correct.

What is computers?

Computer is the name for the electrical device. In 1822, Charles Babbage created the first computer. The work of input, processing, and output was completed by the computer. Hardware and software both run on a computer. The information is input into the computer, which subsequently generates results.

According to givens the scenario was the justify are the 3×4 rectangular shape room there are the four computers are the set-up to the HUB is placed in the center of the room. The bus topology is the based on the networks are the subsequently.

As a result, the minimum length of cables required to connect the computers in a network in each of the bus topology. Therefore, option (a) is correct.

Learn more about on computers, here:

https://brainly.com/question/21080395

#SPJ2

model sees communication occurring in five key parts
19. The
20
means the systematic application of scientific or other organized knowledge to practical task
21. The model that shows our communication is influenced by environmental, cultural and personal
factors
22. Shannon Weaver model was proposed in the year
23. Fourth generation computers used
24. Auto Gasoline pump is an example of a
25.
26.
27.
28.
29.
30. A server may run several
31. The first mechanical computer designed by Charles Babbage uses,
32.
33. The first generation of computer uses
34
computer
computer are mainly used in the fields of science and engineering
provides us with necessary diversion
available for educational purposes other than the teacher
are the means of communication
is when two persons communicate with each other.
controls educational technology in every way.
is the order in which the content should be taught for the best teaming within a grade?
is a distortion in a message which affects the flow of communication
refers to the facilities used for motion pictures, television, computer, sounds?
35.
36. Aristotle model proposed in the year
37. The first computer designed by Charles Babbage was called
38. Communication result in sharing of
and
39. A Supercomputer is the very
40.
41. A typical modern computer uses
42
and
is the operation of data per giving instruction
type of computer for processing data
chips
computer are used in scientific calculations, for nation defense and radar systems
43. The person who is responsible in the integration of technology in classroom instruction is-
44. A server run several
45. These are types in the classifications of the computer according to size, Except
46 Second generation computers used.
47.
48. The acronomy SNS stands for
is used to send individual or group messages
49. These are example of Barriers in communication, Except
50. Computer cannot do anything without a
PRI

Answers

Model sees comunication key parts so its 15 x because it sayd on the text

Account A can retrieve or modify any relation except DEPENDENT and can grant any of these privileges to other users. (b) Account B can retrieve all the attributes of EMPLOYEE and DEPARTMENT except for SALARY, MGRSSN, and MGRSTARTDATE. (c) Account C can retrieve or modify WORKS_ON but can only retrieve the FNAME, MINIT, LNAME, SSN attributes of EMPLOYEE and the PNAME, PNUMBER attributes of PROJECT. (d) Account D can retrieve any attribute of EMPLOYEE or DEPENDENT and can modify DEPENDENT. (e) Account E can retrieve any attribute of EMPLOYEE but only for EMPLOYEE tuples that have DNO = 3. (f) Write SQL statements to grant these privileges. Use views were appropriate

Answers

The SQL statements to grant these privileges are as follows:

GRANT SELECT, UPDATE

        ON EMPLOYEE, DEPARTMENT, DEPT_LOCATIONS, PROJECT,

        WORKS_ON

        TO ACCOUNTA

        WITH GRANT OPTION;

CREATE VIEW EMPS AS

        SELECT FNAME, MINIT, LNAME, SSN, BDATE, ADDRESS, SEX

        SUPERSSN, DNO

        FROM EMPLOYEE;

        GRANT SELECT ON EMPS

       TO ACCOUNTB;

       CREATE VIEW DEPTS AS

       SELECT DNAME, DNUMBER

       FROM DEPARTMENT;

       GRANT SELECT ON DEPTS

       TO ACCOUNTB;

GRANT SELECT, UPDATE

       ON WORKS_ON

       TO ACCOUNTC;

      CREATE VIEW EMP1 AS

      SELECT FNAME, MINIT, LNAME, SSN

      FROM EMPLOYEE;

      GRANT SELECT ON EMP1

      TO ACCOUNTC;

      CREATE VIEW PROJ1 AS

      SELECT PNAME, PNUMBER

      FROM PROJECT;

     GRANT SELECT ON PROJ1

     TO ACCOUNTC;

GRANT SELECT ON EMPLOYEE, DEPENDENT

       TO ACCOUNTD;

      GRANT UPDATE ON DEPENDENT

      TO ACCOUNTD;

CREATE VIEW DNO3_EMPLOYEES AS

        SELECT * FROM EMPLOYEE

        WHERE DNO = 3;

        GRANT SELECT ON DNO3_EMPLOYEES

        TO ACCOUNTE;

What do you mean by SQL statement?

SQL statement may be defined as a domain-specific language that is significantly utilized in programming and designed for controlling data held in a relational database management system. SQL stands for Structured Query Language.

Therefore, the SQL statements to grant these privileges are well described above.

To learn more about SQL statements, refer to the link:

https://brainly.com/question/14312429

#SPJ1

1. Review and write summary report on Artificial Intelligence (AI), your report should include from starting point of Al to the future of AI in brief and short way.​

Answers

Summary report on Artificial Intelligence (AI):

The term artificial intelligence broadly refers to the application of technology to perform tasks that resemble human cognitive functioning, and is typically defined as "the ability of a machine to imitate intelligent human behaviour." Artificial intelligence typically involves "the theory and development of artificial intelligence systems capable of performing tasks that normally require human intelligence, such as visual perception, speech recognition, decision making, and  between languages." John McCarthy, one of the founders of the study of artificial intelligence, "defined the field of using computers to do things that are said to be intelligent when people do them."

Artificial intelligence is used as an umbrella term to cover a wide range of different technologies and applications, some of which are mentioned below.

Machine Learning (ML) Natural Language Processing (NLP) Computer vision (CV) Robotics Process Automation (RPA)

AI applications typically involve the use of data, algorithms and human feedback. Ensuring that all these components are properly structured and validated is essential to developing and deploying AI applications.

What is Machine Learning ?

Machine learning is a branch of computer science that uses algorithms to process and learn from large amounts of data. Unlike traditional rule-based programming, ML models10 learn from input data to predict or identify meaningful patterns without being specifically programmed to do so. There are different types of ML models depending on their intended task and structure:

Supervised Machine Learning: In supervised ML, a model is trained with labeled input data that correlates with a specified output. Reinforcement learning: In reinforcement learning, the model learns. dynamically to achieve the desired output through trial and error Unsupervised Machine Learning: In unsupervised ML, the input data is unlabelled and the output is undefined Deep Learning: A deep learning model is built on an artificial neural network where algorithms process large amounts of unlabelled or unstructured data through multiple learning layers  in a way inspired by how neural networks work in the brain

To learn more about machine learning, visit;

https://brainly.com/question/29386217

#SPJ9

Problem: A company wants a program that will calculate the weekly paycheck for an employee based on how many hours they worked. For this company, an employee earns $20 an hour for the first 40 hours that they work. The employee earns overtime, $30 an hour, for each hour they work above 40 hours.

Example: If an employee works 60 hours in a week, they would earn $20/hr for the first 40 hours. Then they would earn $30/hr for the 20 hours they worked overtime. Therefore, they earned: ($20/hr * 40hrs) + ($30/hr * 20 hrs) = $800 + $600 = $1400 total.

For this assignment, you must create pseudocode and a flowchart to design a program that will calculate an employee’s weekly paycheck.

Write pseudocode to design a programming solution by outlining a series of steps and using appropriate indentation and keywords. As you write your pseudocode, be sure to consider the following:
What input does the computer need?
What steps does the program need to follow to process the input? What output should result?
When might you need to use decision branching? If you used decision branching, did you account for all possible input values?
Did you use appropriate indentation and keywords (such as IF, ELSE, CALCULATE, and so on) throughout your pseudocode?
Create a flowchart to design a programming solution by organizing a series of steps and using appropriate symbols and arrows. As you create your flowchart, be sure to use appropriate arrows and symbols for each of the following:
Start and end points
Input and output
Decision branching
Processing steps
Note: You may find the correct shapes to create your flowchart on the Insert menu in Microsoft Word. Or you may draw your flowchart by hand, take a clear picture, and insert the picture into your Word document. Use the add shapes or insert pictures tutorials to help you. You could also use a flowcharting tool that you are familiar with, such as Lucidchart, if you prefer.

Answers

Using the knowledge in computational language in pseudocode  it is possible to write a code that programming solution by outlining a series of steps and using appropriate indentation and keywords.

Writting the code:

h = int(input('Enter hours '))

rate = 20

if h <= 40:

   pay = h * rate

elif h > 40:

   pay = ((h-40) * rate * 1.5) + rate * 40

print("Your pay is %.2f" % pay)

Set hourly rate to 20

Input hours worked

If hours worked is under 40

   Compute hours worked times hourly rate equals pay

Else hours worked is over 40

   Compute ?

Endif

Print pay

See more about pseudocode at brainly.com/question/12975450

#SPJ1

Write a java program to find the average of any three numbers.​

Answers

import java.util.Scanner;

public class JavaExample {

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.print("Enter the first number: ");

double num1 = scan.nextDouble();

System.out.print("Enter the second number: ");

double num2 = scan.nextDouble();

System.out.print("Enter the third number: ");

double num3 = scan.nextDouble();

scan.close();

System.out.print("The average of entered numbers is:" + avr(num1, num2, num3) );

}

public static double avr(double a, double b, double c)

{

return (a + b + c) / 3;

}

}

The output is attached to the answer. You can also check it..

One of the four function of Information.
Security
is called

Answers

Answer:

The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.

The 4 functions of Information Security:It protects the organisation's ability to function.It enables the safe operation of applications implemented on the organisation's IT systems.It protects the data the organisation collects and uses.It safeguards the technology the organisation uses.

The cpu is the component responsible for commanding which other component in the system?

Answers

The CPU is the component responsible for commanding memory in the system. The correct option is 3.

What is a CPU?

The CPU is instructed on what to do next and how to communicate with other components by the operating system, a sizable program.

As you are aware, there are numerous computer operating systems, including the Microsoft Windows operating system. An operating system is a substantial piece of software that controls your computer and aids the CPU in decision-making. The CPU is controlled by an operating system so that it can communicate with other system components.

Therefore, the correct option is 3. Memory.

To learn more about CPU, refer to the link:

https://brainly.com/question/14671593

#SPJ1

The question is incomplete. Your most probably complete question is given below:

1. CPU

2. bus

3. memory

4. I/O subsystem.

Give some examples of when either breaking the rules or following the rules lead to greater good

Answers

Answer:

Sometimes breaking a rule can lead to a positive outcome, especially if the rule prevents the positive. But on the other hand, following the rules, can also lead to the greater good, if the rule doesn't prevent the good from happening.

Explanation:

5. Define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2
and y2 and will calculate the distance between these two points using the formula
√((x2 – x1)² + (y2 – y1)²). You must use the SquareRoot function you defined previously.
[10 points]

Test case:
> (DistanceBetweenTwoPoints 2 5 3 2)
3.1622776601683795
Can anyone please help me to write this procedure in Scheme Language? I am stuck! Please help!

Answers

Using the knowledge in computational language in JAVA it is possible to write the code that define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2 and y2.

Writting the code:

package org.totalbeginner.tutorial;

public class Point {

   public double x;

   public double y;

   Point(double xcoord, double ycoord){

       this.x = xcoord;

       this.y = ycoord;

   }

   public double getX() {

       return x;

   }

   public double getY() {

       return y;

   }    

}

package org.totalbeginner.tutorial;

public class Line {

   double x;

   double y;

   Point p1 = new Point(2.0,2.0);

   Point p2 = new Point(4.0,4.0);

   Point mp = new Point(x,y);

   public void midpoint() {

       x = (p1.getX() + p2.getX()) / 2;

       y = (p1.getY() + p2.getY()) / 2;

   }

See more about JAVA at brainly.com/question/12975450

#SPJ1

common errors in writing Python

Answers

Answer:

1.not following the rules

2.misusing expression

IN python

Write a main function that asks the user to enter a series of numbers on the same line. The
function should store the numbers in a list and then display the lowest, highest, total, and average
of the numbers in the list in addition to the list of numbers above the average.
The program should have the following functions:
• A function that takes a list of numbers and returns the lowest number in the list.
• A function that takes a list of numbers and returns the highest number in the list.
• A function that takes a list of numbers and returns sum of the numbers in the list.
• A function that takes a list of numbers and returns the average of the numbers in the list.
• A function that takes a list of numbers and returns a list of numbers above the average.


Here is a sample run:
Enter numbers on the same line
10 23 45 71 8 13 99 5 2 88
Low: 2.0
High: 99.0
Total: 364.0
Average: 36.4
Above Average: [45.0, 71.0, 99.0, 88.0]

iN python

Answers

Using the knowledge of the computational language in python it is possible to write a code that write a main function that asks the user to enter a series of numbers on the same line.

Writting the code:

def minimum(a):

   low = a[0]

   for i in range(1,n):

       if a[i] <= low:

           low = a[i]

   return low

def maximum(a):

   high = a[0]

   for i in range(1,n):

       if a[i] >= high:

           high = a[i]

   return high

def total(a):

   tot = 0

   for i in range(0,n):

       tot += a[i]

   return tot

def average(a):

   total = 0

   for i in range(0,n):

       total += a[i]

   return total/n

   

def above_average(a):

   total = 0

   for i in range(0,n):

       total += a[i]

       

   average = total/n

   above_avg = []

   for i in range(0,n):

       if a[i] > average:

           above_avg.append(float(a[i]))

       

   return above_avg

if __name__ == "__main__":

   print ('Enter numbers on the same line')

   a = list(map(int,input().split()))

   n = len(a)

   

   print("Low: {0:.1f}".format(minimum(a)))

   print("High: {0:.1f}".format(maximum(a)))

   print("Total: {0:.1f}".format(total(a)))

   print("Average: {0:.1f}".format(average(a)))

   print("Above Average:",above_average(a))

See more about python at brainly.com/question/18502436

#SPJ1

What percent of 2.5 hours decrease to 1 hour

Answers

Answer: 60% decrease

Explanation:

How to calculate percentage decrease:

Subtract starting value minus final value

Divide that amount by the absolute value of the starting value

Multiply by 100 to get percent decrease

If the percentage is negative, it means there was an increase and not an decrease.

Percentage Decrease Formula

You can use the percentage decrease formula for any percent decrease calculation:

Percentage Decrease=Starting Value−Final Value|Starting Value|×100

Example Problem: Percentage Decrease

You have a lamp with a 60-watt traditional light bulb. Your lamp uses 60 watts of electricity per hour. You're considering replacing the bulb with an LED light bulb that uses 8 watts of electricity per hour. What is the percentage decrease in the lamp's hourly energy use if you switch to an LED light bulb?

Percentage Decrease = [ (Starting Value - Final Value) / |Starting Value| ] × 100

60 - 8 = 52

52 / 60 = 0.8667

0.8667 × 100 = 86.67%

So if you switch to an LED light bulb your lamp will use 86.67% less energy per hour.

Related Calculators

Answer:

40%

Explanation:

Whenever we find "x" percent of a number, we simply multiply by "x/100", because "percent" just means "per 100".

We can divide the 2.5, by 100 to see how many "groups" of 100 are in 2.5, which gets us, 0.025.

Now we multiply this by some value, which will be our percent, to get "1"

So we have the equation: [tex]0.025 * x = 1[/tex]

Dividing both sides by 0.025 gives us: [tex]x=40[/tex]

so our percentage would be 40.

But generally whenever you solve these problems you convert the "percentage" to a "decimal" by dividing the percentage by 100.

So finding "x" percent of "a", can be calculated by: [tex]a*\frac{x}{100}[/tex]

and from here you would calculate the value with the givens.

Explain why you would select the waterfall model to implement the baby monitoring system by describing the advantages of using the waterfall model in projects like this which consists of a large scope.

Answers

The waterfall model's benefits includes Teams must follow a set of stages in a waterfall process, never going on until each phase is finished. Smaller projects with clear-cut deliverables from the beginning are best suited for this framework.

Why did you choose waterfall model?

When a project must adhere to stringent guidelines, the waterfall technique is preferable because it calls for deliverables for each step before moving on to the next.

Note that As an alternative, Agile is better suited for teams who want to move quickly, experiment with direction, and start without knowing exactly how the project will turn out.

Therefore, The sequential Waterfall Model separates software development into pre-established segments. Before the following phase can start, each phase must be finished.

Learn more about Waterfall Model from

https://brainly.com/question/14079212
#SPJ1

6.6 code practice question 2? 4 adjacent circles one

Answers

We have to create a program that draws an image of concentric circles with the help of canvas  and frame using python.

Codding strucute of the given problem:

import simplegui

def draw_handler(canvas):

  canvas.draw_circle((200, 130), 90, 5, "Green")

  canvas.draw_circle((200, 130), 70, 5, "Green")

  canvas.draw_circle((200, 130), 50, 5, "Green")

  canvas.draw_circle((200, 130), 30, 5, "Green")

  canvas.draw_circle((200, 130), 10, 5, "Green")

frame = simplegui.create_frame('Circle', 600, 600)

frame.set_canvas_background("White")

frame.set_draw_handler(draw_handler)

frame.start()

To know more about Python, visit: https://brainly.com/question/26497128

#SPJ1

How is trust built?
Select all the correct options and click Submit.
Trust is built incrementally.
Trust is earned behaviorally.
Trust is built by spending a lot of time with people.
Trust is built by being pleasant and polite.

Answers

The trust is built by the following options:

Trust is built incrementally.Trust is earned behaviorally.Trust is built by spending a lot of time with people.

How trust is built?

Trust is built by spending much time with the people you are in contact with you have to observe the behavioral characteristics and notice the behavior accordingly. Most important characteristics to build trust: Honesty, Integrity, Transparency etc. Hence to conclude along with certain observance and characteristics trust is built. Consistency often leads to trust. We have the most faith in people who are always there for us, in good and bad times. Showing someone you're there to assist them on a regular basis is a great way to build trust.

To know more about trust please follow the link below:

https://brainly.com/question/11875869

#SPJ1

Implication if the intellectual property rights do not exist

Answers

Intellectual Property Rights (IPR) are  the creative rights over an original piece of work, invention or even an idea behind a business can come under the purview of Intellectual Property Rights Act.

Implication if the intellectual property rights do not exist

1.  Less research and development as nobody would reap benefits generated by their innovations.

2. Cultural and art vitality as they would not be made more according to their original work.

3. Job losses and economic issues as IPR helps in boosting both of these factors.

4. Healthcare and treatment would be at lost because of less innovation of useful vaccines.

5. Less emergence of startups with unique ideas, decline in innovative trade and a race backwards.

6. Counterfeiting of journals, research papers leading to a still situation.

Hence, these factors explain what would happen without IPR.

To know more about Intellectual property rights from the given link

https://brainly.com/question/24015145

#SPJ13

when computer and communications are combined, the result is information and cominiations Technology (true or false)​

Answers

Answer: When computer and communication technologies are combined the result is Information technology.

Explanation: This is a technology that combines computation with high-speed data, sound, and video transmission lines. All computer-based information systems utilized by companies, as well as their underlying technologies, are referred to as information technology.

As a result, information technology encompasses hardware, software, databases, networks, and other electronic gadgets.

IT refers to the technological component of information systems, making it a subsystem of information systems.

Information systems, users, and administration would all be included in a broader definition of IT.

Many organizations rely on IT to support their operations, since IT has evolved into the world's primary facilitator of project activities. IT is sometimes utilized as a catalyst for fundamental changes in an organization's structure, operations, and management. This is because of the capabilities it provides for achieving corporate goals.

These competences help to achieve the following five business goals:

Increasing productivity,

lowering expenses,

improving decision-making,

improving customer interactions, and

creating new strategic applications.

3. Programmers use indenting to organize their code so that it is readable and can be easily debugged. x = 12 if x ==12: print ("x is equal to 12.")

Which of the following keys on the keyboard is used to quickly indent text?
*
Control
Return
Tab
Right Arrow

Answers

Answer:Quickly indent text can be done using key Tab on the keyboard.

Answer: Option C

Explanation:

Code is readable and can be easily debugged because programmers use indenting to organize it . In a computer, any programmer to develop a program both space and tab keys can be used to indent text.

Tab key used to indent the text quickly whereas the space key used to indent text but not to indent text quickly. Tab can be used as the standard key for indenting in the computer programs.

Explanation:

The correct answer would option c

Please help! AP CSP problem.

Answers

Answer:

a is the correct answer ok

“A military contractor has been asked to produce a new all-terrain tablet PC which will be used by the armed forces when out in combat situations. Cost is not an option, lives could well depend on how reliable this tablet PC is under extreme conditions.

Answers

Storage devices are pieces of hardware used to store large amounts of data. Storage devices such as SD cards and SSD cards can be used in military operations because they are durable, do not break easily, and can store large amounts of data.

What exactly is a storage device?

Storage devices are any type of computing hardware that is used to store, transfer, or extract data. Storage devices can temporarily and permanently hold and store data. They can be either internal or external to a computer.

SD cards are the best device for storing and playing large data files. SSDs, on the other hand, are designed to run a computer's operating system partition.

One device serves a simpler purpose, whereas the other must be smarter and more adaptable. These are the most compatible storage devices for military applications.

Thus, it is reliable this tablet PC is under extreme conditions.

For more details regarding storage devices, visit:

https://brainly.com/question/11599772

#SPJ1

Your question seems incomplete, the probable complete question is:

Read the following scenarios carefully and select a suitable storage device for each situation. Make sure to justify your choice by talking about the characteristics of your chosen storage device such as Capacity, Speed, Portability, Durability and Reliability.

(a) “A military contractor has been asked to produce a new all-terrain tablet PC which will be used by the armed forces when out in combat situations. Cost is not an option, lives could well depend on how reliable this tablet PC is under extreme conditions.”

which country did poker originate from?

Answers

Poque, a game that dates back to 1441 and that was supposedly invented in Strasbourg, seems to be the first early evidence of the French origin of the game. Poque in particular used a 52-card deck

France/French

1. Keep the flyer to one page.
2. Be sure the flyer is easy to read and has an attractive design
3. Be sure to provide all information on the flyer as indicated on page 168
4. Use a SmartArt graphic
5. Use a bulleted list
6. Use a picture graphic
7. Choose a color scheme
8. Be creative!

Answers

To quickly and easily create a visual representation of your knowledge, create a SmartArt graphic. You can select from a variety of layouts to clearly convey your message or ideas.

Make a brand-new SmartArt image.

To quickly and easily create a visual representation of your knowledge, create a SmartArt graphic. You can select from a variety of layouts to clearly convey your message or ideas. Excel, Outlook, PowerPoint, and Word all support the creation and use of SmartArt visuals.

See Choose a SmartArt graphic for an overview of SmartArt graphics, including tips for selecting the right visual and layout style to present your data or illustrate a point.

Notes:

Click the arrow control next to the SmartArt graphic to reveal the Text pane if it is not already there.On the Place tab, in the Text group, select Text Box to insert a text box so that you can add text, such as a title, anywhere near or on top of your SmartArt design. Right-click your text box, select Format Shape or Format Text Box, and then choose to make the text box's background and border transparent if you only want the text inside it to show up.

To learn more about SmartArt refer to

https://brainly.com/question/4911152

#SPJ1

Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.

Answers

A sample expression that uses Boolean operators that prints "Special number" if special_num is -99, 0, or 44 is given below:

The Program

import java.util.Scanner;

import java.io.*;

public class Test

{

   public static void main(String[]args) throws IOException

   {

       File file = new File("SNUMS.INP");

       Scanner inputFile = new Scanner(file);

       int order = 1;

       int i = 1;

      int[] special = new int[1000000+1];

       // Write all 10^6 special numbers into an array named "special"

       while (order <= 1000000)

       {

           if (specialNumber(i) == true)

           {

              special[order] = i;

               order++;

           }

           i++;

       }

       // Write the result to file

       PrintWriter outputFile = new PrintWriter("SNUMS.OUT");

       outputFile.println(special[inputFile.nextInt()]);

       while (inputFile.hasNext())

           outputFile.println(special[inputFile.nextInt()]);

       outputFile.close();

   }

   public static boolean specialNumber(int i)

   {

       // This method check whether the number is a special number

       boolean specialNumber = false;

      byte count=0;

       long sum=0;

       while (i != 0)

       {

           sum = sum + (i % 10);

           count++;

           i = i / 10;

       }

       if (sum % count == 0) return true;

       else return false;

    }

}

Read more about boolean operators here:

https://brainly.com/question/5029736

#SPJ1

First,

- select a classification methodology to learn in your project. Select either Classification Trees or Support Vector Machines.

- To actually get the data used in the ISLR examples, you will likely need to download an R package called ISLR; it contains the data sets used in the text.

- Begin by introducing your reader to the corporation from which your stock data (Leggett & Platt Incorporated) comes. Tell the reader something you learned about that corporation that you found interesting, something which would demonstrate to a recruiter that you possess curiosity and the ability to employ it.

- Then, using trimmed screenshots where needed from Excel, sketch out for the reader how you converted your Yahoo-sourced stock data into lagged stock risk data set since 2006.

Second,

-draw a random sample of size n=300 without replacement from your stock return data set. Recall that your stock return data contains a HiLo return column and standardized log lag1 and log lag2 return columns. I will call this your n=300 stock return data set. Show and explain how this is done.

- draw another random sample of size 300 without replacement from your stock return data set. Recall that your stock risk data contains a HiLo risk column and standardized log lag1 and log lag2 columns. I will call this your n=300 stock risk data set.

Next, using your n=300 stock return data set, walk through the steps covered by the ISLR text for your chosen method, SVM or CART, explaining in your own words what you are doing. Put your name into the title of any graphs you show.

Finally, run the program on your n=300 stock risk data set and compare the performance to that of your n=300 stock return data set. Include use of the chi-square test. Discuss the differences, the reasons that these would happen, and the lessons learned about the nature of the stock market.

third,

Select one of the tuning parameters or decision criteria that lie beneath the surface of your chosen methodology, CART or CART. Engage with it by researching beyond the ISLR text. Then experiment with it. Experiment with your data and with other data sets. Try decreasing or increasing n. Look at other sources for help, documenting the sources.

Forth,

Create classification space plots for both of your n=300 data sets, using your chosen methodology, SVM or CART. Be sure to explain how you went about this. Create the plot using the same techniques that we did in our plots for other methods.

] Prepare a comparative study of knn, naive Bayes, logistic regression, and your selected method. Make this comparison on your two n=300 data sets, splitting the data randomly in half to get the training and testing sets.

Explain what you are doing as you go along, explain what you understand about what distinguishes the methods, discuss reasons why the results vary, and why there might be systematic differences in performance between return data and risk data. Show classification space plots for knn, naïve Bayes, and logistic regression. At the end, show a single table in which you summarize the overall correct forecast rate for the stock returns for the four methods; then another table summarizing the performance on the stock risk data

Answers

Using the knowledge of the computational language in python it is possible to write a code that Create classification space plots for both of your n=300 data sets, using your chosen methodology, SVM or CART.

Writting the code:

def randomize(X, Y):

   permutation = np.random.permutation(Y.shape[0])

   X2 = X[permutation,:]

   Y2 = Y[permutation]

   return X2, Y2

X2, y2 = randomize(X, y)

def draw_learning_curves(X, y, estimator, num_trainings):

   train_sizes, train_scores, test_scores = learning_curve(estimator, X2, y2, cv=None, n_jobs=1, train_sizes=np.linspace(0.1, 1.0, num_trainings))

   train_scores_mean = np.mean(train_scores, axis=1)

   train_scores_std = np.std(train_scores, axis=1)

   test_scores_mean = np.mean(test_scores, axis=1)

   test_scores_std = np.std(test_scores, axis=1)

   plt.grid()

   plt.title("Learning Curves")

   plt.xlabel("Training examples")

   plt.ylabel("Score")

   plt.plot(train_scores_mean, 'o-', color="g",

            label="Training score")

   plt.plot(test_scores_mean, 'o-', color="y",

            label="Cross-validation score")

   plt.legend(loc="best")

   plt.show()

See more about python at brainly.com/question/18502436

#SPJ1

help help help help....​

Answers

Answer:redo reload copy cut paste bullet list highlight bold numbered list center right left.

Explanation:

That's all I can help with right now

least privilege meaning in cybersecurity

Answers

Answer:

It is where each system is designed so that it only has the permissions necessary to operate, nothing more.

Explanation:

This is done for security concerns, which is the whole reason for cybersecurity.

Tech A says that it is usually better to pull a wrench to tighten or loosen a bolt. Tech B says that
pushing a wrench will protect your knuckles if the wrench slips. Who is correct?

Answers

Tech A is correct because pulling a wrench to tighten or loosen a bolt secures it to the bolt threading, reducing the possibility of it slipping.

How to tighten nuts and bolts?

Place your socket on the wrench's head. To begin using your torque wrench, insert a socket that fits your nut or bolt into the torque wrench's head. If you have an extender or adaptor, you can insert it into the opening at the head instead.

Hand-tighten the nut or bolt until it catches the threading on the screw. Place the nut or bolt to be tightened over the threading for the screw or opening on your vehicle by hand. Turn the nut or bolt on the vehicle clockwise with your fingers until the threading on the screw catches. Turn the nut or bolt until it can no longer be turned by hand.

Place the wrench on top of the nut or bolt being tightened. Hold the torque wrench handle in your nondominant hand while the nut or bolt is set on the threading.

Tighten the nut or bolt by turning the handle clockwise. When the wrench starts clicking or stops moving, stop turning it.

To know more about wrench and bolts, kindly visit: https://brainly.com/question/15075481

#SPJ1

Other Questions
the income statement is a permanent document that is used to record what you own (assets) and what you owe (liabilities) on a specific date. true false a junior member of congress in the first stage of his or her congressional career is group of answer choices concerned mostly with reelection. primarily interested in developing good legislation. concerned with gaining power within congress and reelection. uninterested in the committee hierarchy on capitol hill. Assume you are 25 and earn 29,000 $ per year, never expect to receive a raise, and plan to retire at age 55. If you invest 5 percent of your salary in a 401(k) plan returning 8 percent annually, and the company provides a $0.50 per $1.00 match on your contributions up to 3 percent of salary, what is the estimated future value of your 401(k) account? Once you retire, how much can you withdraw monthly if you want to deplete your account over 30 years? Use the discriminant to determine the number of solutions for the following equation: \large 3x^2+4x-5=0 How many solutions does this equation have? a 1 real solution b 2 real solutions c infinite solutions d no real solutions Please Help Me I don't Understand It. 2 Your examinations are about to start in a week's time. Write a diary entry in preparation for the study times for the week. Graph y+3=5/2(x-5) on graph paper In the strange situation experiment, when angelas mother leaves the room, angela doesnt become upset. When her mother returns, angela doesnt acknowledge her. This is an example of. Which is an example of a report a company might create using a relational database?a. a toy manufacturer joining data tables of restaurant locations, customer names, and amount of toys orderedb. a clothing retailer joining data tables of pant designers, available styles, and herbal teasc. a hospital joining data tables of surgical equipment, best-selling novels, and types of surgeryd . a college bookstore joining data tables of professor names, classes they teach, and books they require summary of the cow called boy chapter 7 Describe the Renaissance.How did Russia originate? what is the answer in canvas for school The area of a circle is 4x + 12x + 9.a. What is an expression for the radius of the circle?b. What is the least possible integer value of x for the circle to exist? Explain.plspls help me Anson estimated he would need 17 hours to complete is science project. He actually needed 19 1/2 hours. What was his percent error? hotel dreamlandia has a unique concept, with all the hotels having exactly 250 rooms and the same layout for all of its 200 locations that are spread out equally around the globe. hotel dreamlandia is likely using: what are some integers whose product is negative? write a function called convertstrtoint that inputs four strings that represent integers, converts the strings to integers, sums the values and prints the total of the four values. a firm producing where price equals marginal cost that has variable costs equaling $60 million; fixed costs equaling $40 million; and revenues equaling $50 million should: oriented theories propose that people lack insight into their feelings and motives, such that their behavior is influenced by unconscious processes that operate outside of their awareness. question 8 options: 1) cognitive 2) humanistic 3) psychodynamic 4) trait perspective a study by robert criss and everett shock showed that peak floodwater heights in the past 150 years have increased by 2 to 4 meters for the same water volume in the upper mississippi river. what do they say is to blame for this?