In the eye on oversight video case study, what was the name of a ransomware software that impacted the united kingdom national health service in 2017?.

Answers

Answer 1

In the 'Eye on Oversight' video case study,  the 'Wan-naCry' ranso-mware software impacted the United Kingdom National Health Service in 2017.

'Wan-naCry' is an example of crypto-ranso-mware. It is a type of malicious software used by cyber attackers to extort money. 'Wan-naCry' ranso-mware software spread rapidly across a number of computer networks in May of 2017. After infecting a Windows computer, it encrypted files on the computers' hard drives, making them impossible for users to access, then demanded a ransom payment in bitcoin in order to decrypt them.

By the 'Wan-naCry' ranso-mware around 200,000 computer devices were infected across 150 countries, where the four most affected countries were  Ukraine, India, Russia, and Taiwan.

You can learn more about rans-omware at

https://brainly.com/question/27312662

#SPJ4


Related Questions

In python, an infinite loop usually occurs when the computer accesses an incorrect memory address. True or false?.

Answers

Answer:

False

Infinite Loop in Python is a continuous repetitive conditional loop that gets executed until an external factor interfere in the execution flow, like insufficient CPU memory, a failed feature/ error code that stopped the execution, or a new feature in the other legacy systems that needs code integration.

You can learn more about at :
brainly.com/question/18782666#SPJ4

a catalyst 1900 switch with multiple vlans is connected to a single physical interface on a cisco 2600 router. the switch is using isl trunking. you want to permit intervlan routing between each of the vlans. what should you do? (select two.)

Answers

Simply plugging an extra port from each VLAN into a Router will enable routing between the two VLANs.

It is unnecessary for the router to be aware that it has two connections to the same switch. When sending packets between two networks, the Router functions as usual. The old inter-VLAN routing method's drawback is fixed by the "router-on-a-stick" inter-VLAN routing technique. Traffic between numerous VLANs on a network can be routed using just one physical Ethernet interface. This trunk enables the transmission and routing of all the traffic from the defined VLANs across a single routed interface. Through this single interface, the router controls and directs all traffic from one VLAN to another.

Learn more about router here-

https://brainly.com/question/15851772

#SPJ4

you are setting up a machine for a home user who doesn't know much about computers. you don't want to make the user a local administrator, but you do want to give this user the right to change windows updates manually. how can you configure this?

Answers

Modify the LGPO for Windows Update to allow the user to make changes manually. Microsoft offers Windows Update as a free service as part of its upkeep and support services for Windows components.

What is  the purpose of windows update?

Microsoft offers Windows Update as a free service as part of its upkeep and support services for Windows components. The program offers software upgrades/modifications to correct flaws or faults, improve user experience, or boost Windows component performance.

Windows Update is a Microsoft service that automates the downloading and installation of Microsoft Windows software updates via the Internet for the Windows 9x and Windows NT families of operating systems. Wikipedia

Your PC will still boot and operate, but Microsoft will no longer send you software updates, including security patches.

Never turn off your smartphone to halt an update that is already running. This might seriously harm Windows and render your computer useless. when the procedure is complete.

To learn more about windows update refer to:

https://brainly.com/question/28903855

#SPJ4

Change the LGPO for Windows Update to enable manual changes from the user. As part of its maintenance and support services for Windows components, Microsoft provides Windows Update as a free service.

What is  the purpose of windows updateAs part of its maintenance and support services for Windows components, Microsoft provides Windows Update as a free service. To fix bugs or errors, enhance user experience, or increase Windows component performance, the application delivers software upgrades or modifications.For the Windows 9x and Windows NT families of operating systems, Windows Update is a Microsoft service that automates the downloading and installation of Microsoft Windows software updates via the Internet. WikipediaMicrosoft will no longer send you software updates, including security patches, but your computer will still boot and function.In order to stop an update that is already underway, never switch off your smartphone. Your machine could become completely worthless if this badly damages Windows. when the process is finished.

To learn more about windows update refer to:

brainly.com/question/28903855

#SPJ4

Darius needs to include contact information in an email that he is sending to a colleague. Which option should he choose from the ribbon?


Attach File

Attach Item

Attach Policy

Attach Signature

Answers

Attach a Signature should he choose from the ribbon that he is sending to a colleague. Thus, option D is correct.

Who is a colleague?

A colleague is a companion or collaborator, usually of the same position or standing, who works in a profession, government or religious office, or both.

The alternative to Attach Signatures lets users add a previously made signing including your personal details at the conclusion of the communication. Darius wants to have included an email address, thus he will pick the tie is attach signature option.

Therefore, option D is the correct option.

Learn more about colleague here:

https://brainly.com/question/14138829

#SPJ1

as an it leader in a fast growing technology start-up, which software development methodology would you implement to ensure your firm can make adjustments when necessary?

Answers

As an IT leader in a fast growing technology start-up, a software development methodology which you should implement to ensure your firm can make adjustments when necessary is agile.

The software development models.

In Computer technology, some example of the models and methodologies that are typically used in the software development life cycle (SDLC) include the following;

Waterfall modelIncremental modelSpiral modelBig bang model.V-shaped model.Agile model.

What is Agile software development?

In Agile software development, the software development team are generally more focused on the production of working and active software programs with less effort on documentation, while ensuring that adjustments can be made when necessary.

Read more on software development here: brainly.com/question/26324021

#SPJ1

Complete Question:

As an IT leader in a fast growing technology start-up, which software development methodology would you implement to ensure your firm can make adjustments when necessary?

agile

v-shaped

ascending

spiral

waterfall

Assignment 4 divisible by 3 in project stem

Please help fast!

Answers

Using the knowledge of the computational language in python it is possible to write a code that print a list of the first 100 numbers wich is divide by 3 and 5 and not 7.

Writting the code:

# create an empty list to store the numbers

numbers = []

# set n to start number 1

n = 1

# loop until the list contains 100 numbers

while len(numbers) < 100:

# current value of n is divisible by 3 and 5 but not divisible by 7, append n to numbers list

if n%3 == 0 and n%5 == 0 and n%7 != 0:

 numbers.append(n)

n += 1 # increment n by 1

# display the numbers list

print("List of first 100 numbers divisible by 3 and 5, but not by 7:\n",numbers)

# end of program

See more about python at brainly.com/question/18502436

#SPJ1

Jonah needs to add a list of the websites he used to his report. He opens the “Websites” document and copies the information. He now needs to change his view to the “Renaissance” report to add the information before saving his report.

Answers

The steps, in order, that Jonah needs to follow to view the "Renaissance" report are Go to the ribbon area, click on the View tab, Click on the Switch Windows tab. Then Click on the "Renaissance" report.

What is Renaissance?

The term "renaissance" refers to the use of style and art in the present. The term or option Renaissance is used in documents to add more art and style to an existing document in order to make it more appealing.

What is website?

A website is made up of many web pages, and web pages are digital files written in HTML. To make your website accessible to everyone on the planet, it must be stored or hosted on a computer that is constantly connected to the Internet. A Web Server is one of these computers.

To know more about Website, visit: https://brainly.com/question/9060926

#SPJ1

what is the difference between stateful autoconfiguration and stateless autoconfiguration for ipv6?

Answers

A stateful DHCPv6 server gives hosts IPv6 addresses in addition to "other information."Additionally, it monitors how each assignment is progressing.

What does stateful and stateless configuration mean in IPv6?Stateless here refers to the fact that no server maintains track of which hosts have received which addresses and which addresses are still up for grabs.A stateful DHCPv6 server gives hosts IPv6 addresses in addition to "other information."Additionally, it monitors how each assignment is progressing. Some of the network administrator's chores are automated via stateless address auto configuration.The method used by IPv6 nodes (hosts or routers) to automatically configure IPv6 addresses for interfaces is known as stateless address auto configuration. The following kinds of auto-configuration are supported by IPv6:Auto-configuration with state:Since the installation and management of the nodes require a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server, this kind of configuration necessitates some amount of human involvement. Nodes use stateless DHCPv6 to obtain additional data, such as a DNS server list and a domain name, without the need for individual nodes to maintain any dynamic state.

To learn more about  ipv6 refer

https://brainly.com/question/28837313

#SPJ4

after a print file is generated by an application, what is the next step in printing to a network printer?

Answers

In printing to a network printer, the next step after a print file is generated by an application is the GDI (graphics device interface) integrates information about the print file with information received from the printer driver.

A network printer may be defined as printer that is connected to a network, through Ethernet or Wi-Fi - the latter being the more contemporary option. Meanwhile, a local printer would be cabled straight to the tool that needed it, a network printer can access through multiple tools simultaneously on the same network. A network printer can facilitate employees working from remote locations who still need to print. By connecting to the network using the Internet, employees can transfer documents to print from anywhere. Network printer is a great device for people who need to print from remote locations.

Learn more about network printer at https://brainly.com/question/15849954

#SPJ4

a data analyst is working with a data frame called salary data. they want to create a new column named total wages that adds together data in the standard wages and overtime wages columns. what code chunk lets the analyst create the total wages column?

Answers

To construct the total wages column, the data analyst would use the following code: mutate(salary_data, total_wages = overtime_wages + standard_wages).

What is a data frame and mutate function?When storing data in R Studio using R programming language, a data frame is just a two-dimensional tabular or array-like structure which is composed of rows and columns.Creating a brand-new variables from a list of data sets while maintaining old variables is the main usage of a modify function in R programming.The mutate() function from dplyr package in the R programming language allows us to easily add new columns toward a data frame which are calculated from existing columns. The transform() function in pandas is comparable to the mutate() function.

Code that can be run in R Studio.

The code fragment in this example that would enable the data analyst to add the total wages column is:

total_wages = overtime_wages + standard_wages; mutate(salary data);

To learn more about data frame refer to :

https://brainly.com/question/28448874

#SPJ4

and assuming main memory is initially unloaded, show the page faulting behavior using the following page replacement policies. how many page faults are generated by each page replacement algorithm?

Answers

FIFO

// C++ implementation of FIFO page replacement

// in Operating Systems.

#include<bits/stdc++.h>

using namespace std;

// Function to find page faults using FIFO

int pageFaults(int pages[], int n, int capacity)

{

   // To represent set of current pages. We use

   // an unordered_set so that we quickly check

   // if a page is present in set or not

   unordered_set<int> s;

   // To store the pages in FIFO manner

   queue<int> indexes;

   // Start from initial page

   int page_faults = 0;

   for (int i=0; i<n; i++)

   {

       // Check if the set can hold more pages

       if (s.size() < capacity)

       {

           // Insert it into set if not present

           // already which represents page fault

           if (s.find(pages[i])==s.end())

           {

               // Insert the current page into the set

               s.insert(pages[i]);

               // increment page fault

               page_faults++;

               // Push the current page into the queue

               indexes.push(pages[i]);

           }

       }

       // If the set is full then need to perform FIFO

       // i.e. remove the first page of the queue from

       // set and queue both and insert the current page

       else

       {

           // Check if current page is not already

           // present in the set

           if (s.find(pages[i]) == s.end())

           {

               // Store the first page in the

               // queue to be used to find and

               // erase the page from the set

               int val = indexes.front();

               

               // Pop the first page from the queue

               indexes.pop();

               // Remove the indexes page from the set

               s.erase(val);

               // insert the current page in the set

               s.insert(pages[i]);

               // push the current page into

               // the queue

               indexes.push(pages[i]);

               // Increment page faults

               page_faults++;

           }

       }

   }

   return page_faults;

}

// Driver code

int main()

{

   int pages[] = {7, 0, 1, 2, 0, 3, 0, 4,

               2, 3, 0, 3, 2};

   int n = sizeof(pages)/sizeof(pages[0]);

   int capacity = 4;

   cout << pageFaults(pages, n, capacity);

   return 0;

}

LRU

//C++ implementation of above algorithm

#include<bits/stdc++.h>

using namespace std;

// Function to find page faults using indexes

int pageFaults(int pages[], int n, int capacity)

{

   // To represent set of current pages. We use

   // an unordered_set so that we quickly check

   // if a page is present in set or not

   unordered_set<int> s;

   // To store least recently used indexes

   // of pages.

   unordered_map<int, int> indexes;

   // Start from initial page

   int page_faults = 0;

   for (int i=0; i<n; i++)

   {

       // Check if the set can hold more pages

       if (s.size() < capacity)

       {

           // Insert it into set if not present

           // already which represents page fault

           if (s.find(pages[i])==s.end())

           {

               s.insert(pages[i]);

               // increment page fault

               page_faults++;

           }

           // Store the recently used index of

           // each page

           indexes[pages[i]] = i;

       }

       // If the set is full then need to perform lru

       // i.e. remove the least recently used page

       // and insert the current page

       else

       {

           // Check if current page is not already

           // present in the set

           if (s.find(pages[i]) == s.end())

           {

               // Find the least recently used pages

               // that is present in the set

               int lru = INT_MAX, val;

               for (auto it=s.begin(); it!=s.end(); it++)

               {

                   if (indexes[*it] < lru)

                   {

                       lru = indexes[*it];

                       val = *it;

                   }

               }

               // Remove the indexes page

               s.erase(val);

               // insert the current page

               s.insert(pages[i]);

               // Increment page faults

               page_faults++;

           }

           // Update the current page index

           indexes[pages[i]] = i;

       }

   }

   return page_faults;

}

// Driver code

int main()

{

   int pages[] = {7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2};

   int n = sizeof(pages)/sizeof(pages[0]);

   int capacity = 4;

   cout << pageFaults(pages, n, capacity);

   return 0;

}

You can learn more about this at:

https://brainly.com/question/13013958#SPJ4

which of the sorts in the textbook can be characterized by the fact that even in the worst case the running time will be o(n log(n)))? i quicksort ii selection sort iii merge sort

Answers

The merge sort is a sorting algorithm that even in the worst case gives the running time o(n log(n))). Thus, option III which is 'merge sort' is the correct answer.

Sorting algorithms describe a set of instructions that take a list or array as an input and arrange the items into a particular ascending or descending order. Since sorting algorithms have the ability to reduce the complexity of searching problems, they are considered very important in computer science. Merge sort is one such sorting algorithm that is based on the divide and conquers rule where an input array is divided into two halves; for each half, the merge sort algorithm calls itself, and finally, two sorted halves are merged.

The time complexity of the merge sort is only o(n log(n))), which is the biggest advantage of using merge sort because the merge sort has the capability of sorting an entire array in o(n log(n))), even in the worst cases too.

You can leanr more about Sorting Algorithms at

https://brainly.com/question/14698104

#SPJ4

in windows defender on windows 10, when you click scan now, which type of scan is initiated by default?

Answers

The type of scan that is initiated by default in windows defender on windows 10, when you click scan now is known as Microsoft Safety Scanner.

What is the significance of Window defender?

The significance of window defender is determined by the fact that it helps in the protection of your device against potentially dangerous apps, files, sites, links, and downloads.

According to the context of this question, Microsoft's safety scanner is initiated by default which is a kind of tool that significantly protect your computer from viruses and intentionally eradicate them for a reason. It is designed in order to find and eliminate malware from windows computers.

Therefore, Microsoft Safety Scanner is a type of scan that is initiated by default in windows defender on windows 10, when you click scan now.

To learn more about Microsoft defender, refer to the link:

https://brainly.com/question/28244702

#SPJ1

write a java application that models a crime wave in which two criminals commit 100 crimes each while two detectives solve them. the criminals place the crimes in a regular queue and the detectives remove them from the queue.

Answers

Here a simple java application that models a crime wave using netbeans 15. First you have to make form based on picture attached. Add sql connector ODBC connector library on your project and create MySQL database without password name "crime" with table "progress" and "solved". '"progress" table contains column "casecode","CriminalName", "crime" and "solved" table contains column "casefinish","CriminalNameSolved" and "CrimeSolved" . Here the code:

On package:

import java.sql.*;

import javax.swing.*;

import javax.swing.table.*;

import javax.swing.JOptionPane;

public Connection conn;

public Statement cn;

public void connection(){

   try{

       Class.forName("com.mysql.jdbc.Driver");

       conn = DriverManager.getConnection("jdbc:mysql://localhost:3306/crime","root","");

       cn = conn.createStatement();

   }catch(Exception e){

       JOptionPane.showMessageDialog(null,"connection failed...");

       System.out.print(e.getMessage());

   }

}

public void CrimeRecord(){

       try{

           conn=connection();

           stt=conn.createStatement();

           String sql = "select * from progress where casecode='"+casecod.getText()+"'";

           ResultSet rs= stt.executeQuery(sql);

           if(rs.next()){

               criminalsname.setText(rs.getString("CriminalName"));

               crimecommit.setText(rs.getString("crime"));

                  }catch(Exception e){

                      JOptionPane.showMessageDialog(null,"error" +e);

       }

   }

public void showingtable()

{

   DefaultTableModel tabelModel = new DefaultTableModel();

   tabelModel.addColumn("Case code");

   tabelModel.addColumn("Criminal name");

   tabelModel.addColumn("Crime");

   try{

   conn = connection();

   stt = conn.createStatement();

   String sql = " select casecode,CriminalName,crime from progress";

   ResultSet rs = stt.executeQuery(sql);

   while (rs.next()){

       tabelModel.addRow(new Object[]{

       rs.getString("casecode"),

       rs.getString("CriminalName"),

       rs.getString("crime")

       });

   }

   }catch (Exception e){

      JOptionPane.showMessageDialog(null,"terjadi kesalahan..." + e);

       }

  CrimeListTable.setModel(tabelModel);

On public class "formYourMakeName"

public Connection conn;

public Statement cn;

showingtable();

On add crime button:

try{

   connection();

   String sql="insert into servis values('"+ casecod.getText()+"','"+ criminalsname.getText()+"' , '"+ crimecommit.getText()+"')";

}catch(Exception e){

       JOptionPane.showMessageDialog(null,"please fill all the blank");

   }

showingtable();

On end case button

try{

   connection();

   String sql="insert into solved values('"+ casecod.getText()+"','"+ criminalsname.getText()+"' , '"+ crimecommit.getText()+"')";

}catch(Exception e){

       JOptionPane.showMessageDialog(null,"please click one of the data on table");

   }

try{

   connection();

   String sql="Delete  from progress where casecode='"+casecod.getText()+"'";

}catch(Exception e){

       JOptionPane.showMessageDialog(null,"please click data on table");

   }

showingtable();

What this code do?

The code that written above will insert the crime data that you input in the three available textbox where textbox on case code, criminal name and crime are named by order "casecod", "criminalsname", "crimecommit". you can add criminal record by click "ADD CRIME" button after filling all the data. When you click a data on table on the left, the data will be written on the three textbox then you can click "END CASE" button to remove them from the crime list table and move it to solved case finish table on SQL database.

Learn more about java programming https://brainly.com/question/26642771

#SPJ4

which type of nat allows many computers to share a pool of routable ip addresses that number fewer than the computers?

Answers

A pool of routable IP addresses which is smaller than the number of computers can be shared by several computers thanks to dynamic NAT.

What is dynamic NAT?A private IP address or subnets inside the SD-WAN network are mapped many-to-one to a public IP address or subnet from outside SD-WAN network through dynamic NAT. In the LAN segment, traffic from several zones and subnets is delivered over just a single public (outside) IP address instead of using trusted (inside) IP addresses.Dynamic network address translation makes it possible to automatically map inside local and outside global addresses, in contrast to static NAT, which always maps inside local and outside global addresses. A collection or pool of public IPv4 addresses is used by dynamic NAT for translation.A private IP address or subnet inside the SD-WAN network is many-to-one mapped to a public IP address or subnet from outside network via dynamic NAT.

To learn more about dynamic NAT refer to :

https://brainly.com/question/14281371

#SPJ4

Anyone have answers to 3.6 code practice on project stem, Python Fundamentals? Thanks in advance. Been struggling hard.

Actual Question:

Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.

Sample Run
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3

Answers

The program that prints the smallest each time a number is inputted is as follows:

myList = []

for i in range(6):

   num = int(input("Enter a number: "))

   myList.append(num)

   myList.sort()

   print(f"Smallest : {myList[0]}")

How to write the program?

From the question, we have the following parameters:

Number of inputs = 6

Requirement = Print the smallest of the numbers entered so far

This means that we make use of iteration for a range of 6

Also, we need to make use of a list

So, the program in Python is as follows:

# initialize a list

myList = []

# Iterate to get 6 inputs and perform the required operations

for i in range(6):

   # Get each input

   num = int(input("Enter a number: "))

   # Append input to a list

   myList.append(num)

   # Sort the list

   myList.sort()

   # Print the smallest

   print(f"Smallest : {myList[0]}")

Note that comments are used to explain each line

Read more about programs at

https://brainly.com/question/26497128

#SPJ1

you are concerned that wireless access points may have been deployed within your organization without authorization. what should you do? (select two. each response is a complete solution.) answer implement an intrusion prevention system (ips). check the mac addresses of devices connected to your wired switch. implement an intrusion detection system (ids). conduct a site survey. implement a network access control (nac) solution.

Answers

Since you are concerned that wireless access points may have been deployed within your organization without authorization, the thing that you should do are option B and D:

Check the MAC addresses of devices connected to your wired switch.Conduct a site survey.

Why would a wireless access point be used?

An access point is a component that establishes a WLAN, or wireless local area network, typically in a workplace or sizable structure. An access point transmits a WiFi signal to a predetermined region after being connected to a wired router, switch, or hub through an Ethernet cable.

An individual identification code known as a media access control address (MAC address) is given to a network interface controller (NIC) to be used as a network address in communications within a network segment. The majority of IEEE 802 networking technologies, such as Ethernet, Wi-Fi, and Bluetooth, frequently make use of this.

Note that a Media Access Control (MAC) address is a number that uniquely identifies each connected device on a network. A site survey is conducted with a Wi-Fi analyzer.

Learn more about wireless access points  from

https://brainly.com/question/27334545
#SPJ1

for a display of 1920 pixels by 1080 pixels at 16 bits per pixel how much memory, in megabytes, is needed to store the image?

Answers

For a display of 1920 pixels by 1080 pixels at 16 bits nearly needed 4 MB precisely (3.955) bytes to  store the image.

How to calculate the file size for a digital image?

Stage 1: Increase the locators number of level pixels by the quantity of vertical pixels to get the complete number of pixels of the finder.

Stage 2: Increase complete number of pixels by the piece profundity of the indicator (16 digit, 14 piece and so forth) to get the all out number of pieces of information.

Stage 3: Partitioning the complete number of pieces by 8 equivalents the document size in bytes.

Stage 4: Gap the quantity of bytes by 1024 to get the record size in kilobytes. Partition by 1024 once more and get the document size in megabytes.

Calculation :  1920 x 1080 x 16 x 8 / 1024 / 1024 = 3995 bytes.

                                                                              =  4 Megabytes.

To learn more about Digital literacy , refer :

https://brainly.com/question/14242512

#SPJ4

suppose a turing machine uses a one-sided infinite tape, but each tape cell is a stack (like an infinite amount of infinite stacks). writing to a certain position on the tape pushed the character onto the respective stack, reading pops the top-most character off the respective stack. is such a machine less, equally or more powerful than a regular turing machine?

Answers

The Turing machine is more powerful since the stacks allow us to compress the number of memory cells needed, thus the Turing machine is faster when it wants to access certain fields.

What is a Turing machine?

A Turing machine is an abstract machine that manipulates symbols on a strip of tape in accordance with a set of rules. A Turing model is the mathematical model of computation. A head that reads the input tape is what it consists of the Turing machine's state and is kept in a state register.

The model is straightforward, but it can implement any computer algorithm. Turing machines are straightforward, abstract computation tools designed to assist in examining the scope and bounds of what can be computed.

To learn more about a Turing machine, use the link given
https://brainly.com/question/28026656
#SPJ1

you're evaluating a new system that uses security-enhanced linux to handle classified government information. what kind of access control model should you expect it to use? choose the best response.

Answers

Most common operating systems employ Discretionary Access Control (DAC)model.

What type of access control model does Linux system use?Traditional Linux security is built on a Discretionary Access Control (DAC) policy, which offers bare-bones defense against malware that is executing as a regular user or as root or against malfunctioning software.The only criteria for accessing files and devices are user identity and ownership.Most common operating systems employ Discretionary Access Control (DAC), a security concept that upholds security via ownership.A user has the ability to modify a file's read, write, and execute permissions if he owns it.Users have discretion over the data under this model.

To learn more about Discretionary Access Control  refer,

https://brainly.com/question/15152756

#SPJ4

you might propose a(n) program for your country if you wanted to hire a large number of manual laborers from neighboring countries to build a large dam or canal, with the understanding that they would not be granted any other privileges or legal status in your country, after the project is finished. a. guest worker b. unauthorized worker c. unauthorized hiring d. engineering obstacle e. chain migration

Answers

You might propose  guest worker program for your country if you wanted to hire a large number of manual laborers from neighboring countries to build a large dam or canal, with the understanding that they would not be granted any other privileges or legal status in your country, after the project is finished.

What is guest worker program?In the absence of a ready supply of replacement workers, guest worker programs enable foreign workers to live and work temporarily in a host nation.For temporary employment lasting less than a year, the United States now offers two guest worker programs: the H-2A program for temporary agricultural work and the H-2B program for temporary non-agricultural work.Guest workers will be eligible for all federal programs, including Social Security and Medicare, if they are granted green cards. Additionally, low-skilled, low-income guest workers bring along their spouses and kids, who are enrolled in local schools and qualify for a variety of state benefits.

To learn more about  program refer to:

https://brainly.com/question/20534047

#SPJ4

Name three regions where the media is severely repressed. Select 3 options.
South America
Europe
Middle East
North America
Africa

Answers

The three regions where the media is severely repressed are options.  C D and E:

Middle East North America Africa

What restrictions exist on media outlets' freedom of expression?

In two circumstances—respecting the reputations or rights of others and defending public safety, public order, public health, or morals—are listed in the International Covenant on Civil and Political Rights, which establishes the right to freedom of expression.

Therefore, This issues includes the freedom to look for, receive, and share knowledge and ideas of any kind through any preferred medium, whether it is verbally, in writing, orally, in print. Only limits that are compliant with international human rights legislation may be imposed.

Learn more about media from

https://brainly.com/question/26152499
#SPJ1

11.7 lab: exception handling to detect input string vs. integerthe given program reads a list of single-word first names and ages (ending with -1), and outputs that list with the age incremented. the program fails and throws an exception if the second input on a line is a string rather than an integer. at fixme in the code, add a try/catch statement to catch java.util.inputmismatchexception, and output 0 for the age.ex: if the input is:

Answers

Using knowledge of computational language in JAVA  to write a code that given program reads a list of single-word first names and ages (ending with -1), and outputs that list with the age incremented.

Writting the code:

import java.util.Scanner;

import java.util.InputMismatchException;

public class NameAgeChecker {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       String inputName;

       int age;

       inputName = scnr.next();

       while (!(inputName.equals("-1"))){

           

           try {

               age = scnr.nextInt();

           }

           

           catch (InputMismatchException ex){

               age = -1;

               scnr.nextLine();

           }

           

           System.out.println(inputName + " " + (age + 1));

           inputName = scnr.next();

       }

   }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

What can go wrong when a program uses both > > and getline() to read input from the same file? group of answer choices getline() may end up with a blank line, because > > can leave a dangling newline in the input stream. >> may read only a newline and not the intended word, because getline() reads everything on a line except the final newline. nothing in particular can go wrong, just the usual programming pitfalls. >> reads only one word, while getline() reads an entire line.

Answers

Getline()  may end with a blank line because >> can leave a dangling newline in the input stream.


cin >> leaves the new line character (/n) in the iostream . If getline is used after cin >> the getline sees this new line character as leading whitespace, thinks it is finished and stops reading any further.


You can learn more about at:
brainly.com/question/20388738#SPJ4

which http request method will provide read access to the resources when setting the actions allowed

Answers

The HTTP request type known as GET allows for resource access. To read or retrieve a resource, we employ GET. When a GET request is successful, a response containing the data you requested is returned.

You can control access to AWS resources using permissions. IAM entities (users, groups, and roles) receive permissions; by default, these entities have no permissions. In other words, until you provide IAM entities the permissions you want, they are powerless in AWS. ACLs are cross-account permissions policies that give the designated principal permissions. Permissions cannot be granted to entities inside the same account by ACLs. Policy for sessions - When you use the AWS CLI or AWS API to act in the capacity of a role or a federated user, pass advanced session policies.

Learn more about permissions here-

https://brainly.com/question/13146880

#SPJ4

how do containers access an operating system? containers use a shared base operating system stored in a cloud storage bucket. containers use a shared base operating system stored in a shared runtime layer

Answers

Containers access an operating system is option B:containers use a shared base operating system stored in a shared runtime layer.

Does Shared operating systems exist amongst containers?

The host OS is shared by all containers, so they are not required to boot an OS or load libraries. This makes containers much lighter and more efficient. Applications that are containerized can start quickly, and compared to VM scenarios, many more instances of the application can be installed on the machine.

Note that without the traditional need for virtual machines, containers can share access to an OS kernel. Partitioning from the 1960s and chroot process isolation from Unix in the 1970s are the foundations of container technology.

Hence, Operating system virtualization is a technique used with containers. From a small software process or microservice to a more complex application, anything can be run inside of a single container.

Learn more about operating system from

https://brainly.com/question/22811693
#SPJ1

when constructing the ethernet datagram to send the packet from router z to computer 2 which is on network c, what information needs to be in the destination mac address?

Answers

If a person is constructing the ethernet datagram to send the packet from router z to computer 2 that is on network c, the information that needs to be in the destination mac address is option  A: Router Z's MAC address.

How does the host know the MAC address to include in the Ethernet header as the destination?

The host node has an ARP cache, or routing table, that maps IP addresses to Ethernet addresses. The host node will issue an ARP request to find the MAC address that corresponds to its IP address if the MAC address is not already mapped to an entry in the ARP cache.

Note that a router is unaware of and unconcerned with a remote destination's MAC address. Within a directly linked network, MAC addresses are solely utilized for delivery in layer-2 segments like Ethernet.

Learn more about MAC address from

https://brainly.com/question/29318295
#SPJ1

See full question below

when constructing the ethernet datagram to send the packet from router z to computer 2 which is on network c, what information needs to be in the destination mac address?

Router Z's MAC address

Computer 2's MAC address

Computer I's MAC address

Router Y's MAC address

the cumipmt function has the syntax cumipmt(rate, nper, pv, start, end, type). what do you enter for the type argument?

Answers

Since the CUMIPMT function has the syntax CUMIPMT, the type that you can enter for the Type argument is option B and D:

b. Enter 0 if payments are made at the end of the period, or enter 1 if payments are made at the start. d. Enter the interest rate of the loan or investment.

What is the CUMIPMT Function argument?

The following arguments are used with the CUMIPMT function:

Rate is the amount of interest charged every period (necessary argument). The total number of payment periods for which the loan or investment must be repaid, Nper (necessary argument).

Pv (mandatory argument) - The Present Value of the loan or investment is represented by this. Start period is the initial period's number that must be used to calculate interest (mandatory argument). It must be an integer with a value between 1 and the given NPER.

Lastly, End period is the final time frame for interest calculations (mandatory parameter). It has to be an integer with a value between 1 and the given NPER. Type is a necessary argument that can either be 0 or 1. It is an integer that indicates if the interest is paid.

Learn more about Function from

https://brainly.com/question/12336270
#SPJ1

See full question below

The CUMIPMT function has the syntax CUMIPMT(Rate, Nper, Pv, Start, End, Type). What do you enter for the Type argument? a. Enter the starting and ending payment periods. b. Enter 0 if payments are made at the end of the period, or enter 1 if payments are made at the start. c. Enter the number of payment periods. d. Enter the interest rate of the loan or investment.

you are designing a power apps web portal. you want to provide customers the ability to add or review requests for service. you create a table to store the data. you need to define the list of attributes for the table. what are two ways to define the list? each correct answer presents a complete solution.

Answers

The two ways to define the attributes for the table in PowerApps are with the use of:

Asterisk; and //slash-separated list. To add a list or a comment in a power app, use /* and enter the information, then close the comment with the same backslash and asterisk.

What are PowerApps?

Power Applications is a collection of apps, services, and connections, as well as a data platform, that enables quick development of bespoke apps for your company needs.

Canvas applications and Model-driven apps are the two basic categories of Power Apps. Previously, Power Apps Portals would have been classified as such. Since then, Microsoft has created Power Pages, a separate product derived from the capability of Power Apps Portals.

Power Applications is a service that allows you to create and deploy unique business apps that connect to your data and function across the web and mobile - all without the time and expense of conventional software development.

Learn more about attributes:
https://brainly.com/question/28875118
#SPJ1

Explain how the error card trick from the error detection lesson uses a parity scheme. Was it an even or odd parity scheme?.

Answers

The trick with the cards was the parity scheme as it added bits (row and column of other cards) to make each direction even, making it an even parity scheme.

You can learn more through link below:

https://brainly.com/question/24194840#SPJ4

The required answer is the error card trick uses an odd parity scheme to detect errors in the sequence of bits represented by the deck of cards. The parity card, set based on the value of the data bits, helps identify whether an error has occurred by checking if the total number of bits with a value of 1 is odd or even.

The error card trick from the error detection lesson uses an odd parity scheme. In an odd parity scheme, an additional bit, called a parity bit, is added to a group of data bits. The parity bit is set in such a way that the total number of bits (including the parity bit) with a value of 1 is always an odd number.

In the error card trick, a deck of cards is used to represent a sequence of bits. Each card is assigned a value of 0 or 1, and the deck is arranged to form a sequence of data bits.

To implement the odd parity scheme, an additional "parity card" is introduced. The parity card represents the parity bit and is set based on the value of the data bits. If the total number of cards (including the parity card) with a value of 1 is even, the parity card is set to 1 to make the total odd. If the total number of cards with a value of 1 is already odd, the parity card is set to 0.

During the trick, the magician shows the deck of cards (including the parity card) to the audience and asks them to remember the sequence of bits. Then, the magician turns away and asks an audience member to secretly flip any one card, introducing an error into the sequence.

To detect the error, the magician checks the parity of the sequence. If the total number of cards with a value of 1 (including the parity card) is still odd, the magician knows that no error occurred. However, if the total number of cards with a value of 1 is now even, the magician can determine that an error has occurred. By revealing the flipped card, the magician can identify the position of the error.

By using the odd parity scheme, the error card trick effectively detects whether an error has occurred in the sequence of bits. If the parity of the bits is inconsistent, it indicates the presence of an error. This parity-based approach helps the magician identify the position of the error card and perform the trick successfully.

Therefore, the error card trick uses an odd parity scheme to detect errors in the sequence of bits represented by the deck of cards. The parity card, set based on the value of the data bits, helps identify whether an error has occurred by checking if the total number of bits with a value of 1 is odd or even.

Learn more about error detection and parity schemes  here:

https://brainly.com/question/18510618

#SPJ4

Other Questions
bird wing bedding can lease an asset for 4 years with payments of $20,000 due at the beginning of the year. the firm can borrow at a 6% rate and pays a 25% federal-plus-state tax rate. the lease qualifies as a tax-oriented lease. what is the cost of leasing? Edna shares a story about "a woman who paddled away with her lover one night in a pirogue and never came back." from "THE AWAKENING" by Kate ChopinPLEASE ANALYZE THIS QUOTE!! PLEASE I WILL ADD YOU AS BRAINLIEST ALSO INCLUDE THE SYMBOLISM OF THE SEA! which is the best reason to use a power model to describe the relationship between the length and period of a pendulum? the standard deviation of the residuals is small. nevaeh and michael are helping their friend nabhitha move. if nevaeh can move 6 boxes for every 24 boxes that michael moves, then how many boxes can michael move for every box that nevaeh moves? what is the enter A 12 pack of sodas is priced at $5.40 and a 16 pack of sodas is priced at $6.72. Which is a better buy? Repeated irrigation in dry climates leads to accumulation of salts in the upper layers of the soil, a process called ____. If a circle has an Area of 84.9056, find the radius and the circumference of the circle.(Use =3.14 and do not round.)Radius = Circumference = Kickstarter and indiegogo are crowdsourcing platforms primarily started for which type of crowdsourcing?. What two advantages did the english army have that helped them win many battles during the hundred years war?. What is one reason the author of No, NoWe Wont Go! Mandatory Military Service Is Not Necessary in America believes that military service should not be mandatory? Use textual evidence to support your answer. Did labor unions succeed in this goal in the late 1800s? Why or why not? Use examples to support your answer. dan has agi of $50,000 and paid the following taxes during this tax year. state income tax withholding $ 1,375 state income tax estimated payments 800 federal income tax withholding 3,175 social security tax withheld from wages 2,000 state excise tax on liquor 450 automobile license (based on the car's weight) 325 state sales tax paid 525 calculate how much dan can deduct for taxes as an itemized deduction this year. Read the following sentence.They went down Main Street if you want to follow them.Which of the following revisions to the sentence corrects the unclear use of pronouns?It went that way if you want to follow it.BThe marching band and parade went down Main Street if you want to followthem.If you want to follow them, they went down Main Street.DThey went down Main Street if you or Ms. Georgiva want to follow them. solve for x. "-8+x/4=-4" simplify your answer as much as possible Based on "Civil Disobedience," what statement did Thoreau, like his modern-day successors, hope to make with his imprisonment?He wanted to show the great unfairness of the prison system.He wanted to prove himself as a martyr for his cause.He wanted to suggest that one should be willing to go to great lengths for a belief.He wanted to suggest that imprisonment was the only valid form of political protest.\ Identification where Information Technology causes a hindrance to business processes Which learning process occurs when a connection between a stimulus and a response is strengthened as learning begins? a. acquisition b. discrimination c. extinction d. generalization please select the best answer from the choices provided a b c d inactive, shows relatively calm reactions to her environment, and her mood is generally negative,and she tends to withdraw from new situations. she is referred to as There are 90 new houses being built in a neighborhood.last month, 1/5 of them were sold. this month,1/3 of the remaining houses were sold. How many houses were left to be sold? A patient had symptoms that could be related to meningitis. The physician ordered a spinal tap for cerebrospinal fluid analysis. From which space a sample for analysis will be taken?.