Maintenance is an essential task that is often considered to be dull. In information security, penetration testing may be wrongly perceived as being a "hacker-like" activity. In fact, when done correctly, ethical hacking is an important part of risk management. Penetration analysts work under very restrictive rules of engagement when testing systems. This week's project is research on the many ways that penetration analysts limit the risk they pose to internal systems.

Answers

Answer 1

Explanation:

It is important to bear in mind that a penetration tester (analyst) performs a risk management role of a firm's internal system by attempting to break into an IT system.

Here are the benefits to internal systems;

They help detect security loopholes before a cyberattack.They determine how vulnerable a network or computer program is.They advise the IT firm's security teams on how to mitigate vulnerabilities detected.


Related Questions

Discuss some of the examples of poor quality in IT projects presented in the "What Went Wrong?" section. Could most of these problems have been avoided? Why do you think there are so many examples of poor quality in IT projects?

Answers

Answer:

Explanation:

One of the biggest problems in IT projects is that software and hardware are rushed to market, in order for the sellers to beat their competition and make large profits. This causes large problems in regards to the consumer's safety and wellbeing. Most of these problems can be easily avoided by performing better quality management and performing the necessary tests before releasing a product to the market. Overall most of these poor quality IT projects are a result of greed and money.

E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) false

Answers

Answer:

A. True.

Explanation:

E-mail is an acronym for electronic mail and it can be defined as an exchange or transmission of computer-based data (messages) from one user to another over a communications network system.

Also, a distributed application refers to a software program that is capable of running on several computer systems and can communicate effectively through a network.

E-mail is the most common distributed application that is widely used across all architectures and vendor platforms because it primarily operates on a client-server model, by providing users with the requested services through the Simple Mail Transfer Protocol (SMTP) using the standard port number of 25.

Identify the most common level of education for a programmer or software developer.
a bachelor's degree
a PhD
a high school diploma
a certificate

Answers

A bachelors degree, namely in Computer Science

Answer:

A. a bachelor's degree

Explanation:

What AI technology is commonly used to describe Input A to Output B mappings?

Answers

Answer:

Supervised learning

Explanation:

Supervised learning is a term widely used in computer engineering that describes a form of the machine learning process, which is based on understanding a task that maps an input to an output based on illustration input A to output B pairs.

Hence, in this case, AI technology that is commonly used to describe Input A to Output B mappings is called SUPERVISED LEARNING

Change the value in cell E4 to 375000

Answers

Answer:

Click cell E4. Type 375000, and then press ENTER. Keyboard (2)1. Press SHIFT+TAB (or use ARROW keys) to select cell E4.

In what section of the MSDS would you find information that may help if you use this substance in a lab with a Bunsen burner?

Answers

Answer:

The answer is "Fire-fighting measures".

Explanation:

This section is used to includes instructions to combat a chemicals flame. It is also known as the identify sources, which include the instructions for effective detonating devices and details for removing devices only appropriate for just a specific situation. It is the initiatives list, that is necessary destruction technology, materials; flaming inferno dangers.

The system board contains the logic circuitry that performs the instructions of a computer's applications.a. Trueb. False

Answers

Answer:

TRUE

Explanation:

As computer programs can be complex and difficult to write, they, A Web browser is an example of applications software. process, as well as programs, or instructions specifying the steps necessary to complete.

The statement "The system board contains the logic circuitry that performs the instructions of a computer's applications" is true.

What is a logical symbol?

In Boolean algebra, the conjunction between two propositions is denoted by the logical AND symbol.

It is given that:

The statement is:

The system board contains the logic circuitry that performs the instructions of a computer's applications.

As we know,

An idealized or actual device called a logic gate implements a Boolean function, which is a logical operation on one or more binary inputs that results in a single binary output.

Because writing computer programs can be challenging and complex, An illustration of applications software is a web browser. programs or instructions that outline the steps required to perform a process

Thus, the statement "The system board contains the logic circuitry that performs the instructions of a computer's applications" is true.

Learn more about the logical symbol here:

brainly.com/question/11359207

#SPJ2

In QlikView, ________ are used to search information anywhere in the document.

Answers

Answer:

Search Object

Explanation:

Qlikview is a form of computer software application that is basically used in analytics explanation. In order to search for information anywhere in the document inside the Qlikview application, a form of sheet object referred to as SEARCH OBJECT is utilized.

Hence, in this case, In QlikView, SEARCH OBJECT is used to search for information anywhere in the document.

Use the _____ and _____ features to prevent field columns from showing or to view two nonadjacent field columns for comparison.

Answers

Answer:

1. hide

2. freeze

Explanation:

In database management, a lot of functions can be carried out, among which is the HIDE and FREEZE functions.

Hence, a user can use the HIDE and FREEZE features to prevent field columns from showing or to view two nonadjacent field columns for comparison in database management.

Hence, in this case, the correct answer to the statement presented is HIDE and FREEZE






select the correct answers. What are examples of real-time applications?

Answers

My answer to the question are:online money transfer,news update,blog post.

in java how do i Write a program that reads a set of integers, and then prints the sum of the even and odd integers.

Answers

Answer:

Here is the JAVA program:

import java.util.Scanner; //to take input from user

public class Main{

public static void main(String[] args) { //start of main function

Scanner input = new Scanner(System.in); // creates Scanner class object  

       int num, integer, odd = 0, even = 0; //declare variables

       System.out.print("Enter the number of integers: "); //prompts user to enter number of integers

       num = input.nextInt(); //reads value of num from user

       System.out.print("Enter the integers:\n"); //prompts user to enter the integers

       for (int i = 0; i < num; i++) { //iterates through each input integer

           integer = input.nextInt(); // reads each integer value

               if (integer % 2 == 0) //if integer value is completely divisible by 2

                   even += integer; //adds even integers

               else //if integer value is not completely divisible by 2

                   odd += integer;  } //adds odd integers

           System.out.print("Sum of Even Numbers: " + even); //prints the sum of even integers

           System.out.print("\nSum of Odd Numbers: " + odd);//prints the sum of odd integers

           }}

Explanation:

The program is explained in the comments mentioned with each line of the code. I will explain the logic of the program with the help of an example.

Suppose user wants to input 5 integers. So,

num = 5

Suppose the input integers are:

1, 2 , 3, 4, 5

for (int i = 0; i < num; i++)  is a for loop that has a variable i initialized to 0. The condition i<num is true because i=0 and num=5 so 0<5. Hence the statements inside body of loop execute.

At first iteration:

integer = input.nextInt(); statement reads the value of input integer. The first integer is 1

if (integer % 2 == 0) checks if integer is completely divisible by 2. The modulo operator is used which returns the remainder of the division and if this remainder is equal to 0 then it means that the integer is completely divisible by 2 and if the integer is completely divisible by 2 then this means the integer is even. 1%2 returns 1 so this means this condition evaluates to false and the integer is not even. So the else part executes:

odd += integer;   this becomes:

odd = odd + integer

odd = 1

Now the value of i is incremented to 1 so i=1

At second iteration:

integer = input.nextInt(); statement reads the value of input integer. The first integer is 2

if (integer % 2 == 0) checks if integer is completely divisible by 2. 2%2 returns 0 so this means this condition evaluates to true and the integer is even. So

even += integer;   this becomes:

even= even+ integer

even = 2

Now the value of i is incremented to 1 so i=2

At third iteration:

integer = input.nextInt(); statement reads the value of input integer. The first integer is 3

if (integer % 2 == 0) checks if integer is completely divisible by 2. 3%2 returns 1 so this means this condition evaluates to false and the integer is odd. So

odd += integer;   this becomes:

odd= odd + integer

odd= 1 + 3

odd = 4

Now the value of i is incremented to 1 so i=3

At fourth iteration:

integer = input.nextInt(); statement reads the value of input integer. The first integer is 4

if (integer % 2 == 0) checks if integer is completely divisible by 2. 4%2 returns 0 so this means this condition evaluates to true and the integer is even. So

even+= integer;   this becomes:

even = even + integer

even = 2 + 4

even = 6

Now the value of i is incremented to 1 so i=4

At fifth iteration:

integer = input.nextInt(); statement reads the value of input integer. The first integer is 5

if (integer % 2 == 0) checks if integer is completely divisible by 2. 5%2 returns 1 so this means this condition evaluates to false and the integer is odd. So

odd+= integer;   this becomes:

odd= odd+ integer

odd= 4 + 5

odd = 9

Now the value of i is incremented to 1 so i=5

When i=5 then i<num condition evaluate to false so the loop breaks. The next two print statement prints the values of even and odd. So

even = 6

odd = 9

Hence the output is:

Sum of Even Numbers: 6                                                                                                           Sum of Odd Numbers: 9  

Write an application that asks a user to enter an integer. Display a statement that indicates whether the integer is even or odd.

Answers

Answer:

in C++:

#include <iostream>

int main(){

int input;

std::cout<<"Enter a number: "<<std::endl;

std::cin>>input;

if(input%2==0){

std::cout<<" The number is even"<<std::endl;

}else{

std::cout<<"The number is odd"<<std::endl;

}

}

Explanation:

Getting user input as integer, and check if NUMBER÷2 have remainder=0 or no, if remainder==0 then number is even else number is odd

Write a function that takes any word and applies that pattern. I.E. printer =? p5r ; *** =? v2a ; function =? f6n

Answers

Answer:

I am writing a JAVA program:

import java.util.Scanner; //used to take input from user

public class Main{

   public static void function(String word){ //function that takes a word as parameter an applies a pattern

       int count=0; // count the number of characters between first and last characters of the word string

char first = word.charAt(0); //gets the first character of the word

char last = word.charAt(word.length() - 1); /gets the last character

for(int i = 1; i<word.length()-1;i++) //iterates through word to count the characters between first and last characters

        { count=i; } //sets the count of characters to count variable

System.out.println(first+""+count+""+last);    } //prints the first and last characters of input word with the number of characters between first and last characters of word string

    public static void main(String []args){//start of main function

Scanner input= new Scanner(System.in); //creates Scanner class object

       System.out.print("Enter a word: "); // prompts user to enter a word

       String str= input.nextLine(); //reads word string from user

       function(str); }     } //calls function passing the string to it

 

Explanation:

I will explain the  program with the help of an example:

Suppose the word is printer.

charAt(0) returns the character at the 0-th index of a string word i.e printer. This means the first character of "printer" is returned i.e. 'p'

word.charAt(word.length() - 1) returns the character at the word.length() - 1 index of a string word i.e printer. This means the last character of "printer" is returned i.e. 'r'. Here length() function is used to return the length of the string. The length of "printer" is 7 (from 0 to 6)  so word.length() -1 returns 7-1 = 6. This means the character at 6th index.

for(int i = 1; i<word.length()-1;i++) loop counts the character between the first and last character of "printer" . It works as follows:

1st iteration:

i = 1

i<word.length()-1 is true because 1<6

count = i

count = 1

i = i + 1

i = 2

2nd iteration:

i = 2

i<word.length()-1 is true because 2<6

count = i

count = 2

i = i + 1

i = 3

3rd iteration:

i = 3

i<word.length()-1 is true because 3<6

count = i

count = 3

i = i + 1

i = 4

4th iteration:

i = 4

i<word.length()-1 is true because 4<6

count = i

count = 4

i = i + 1

i = 5

5th iteration:

i = 5

i<word.length()-1 is true because 5<6

count = i

count = 5

i = i + 1

i = 6

At next iteration i<word.length()-1 evaluates to false because i = 6

So final value of count is:

count = 5

System.out.println(first+""+count+""+last); statement prints the first character of "printer" i.e. 'p', followed by value of count i.e. 5 , followed by last character of "printer" i.e. 'r'

Output:

p5r

Which of the following would not be considered metadata for a spreadsheet file?
A) Read-only attributeB) Calculation inside the fileC) Name of the fileD) Full size

Answers

Answer:

B.

Explanation:

Metadata is a type of data that dispense details of other data. In simple terms, metadata can be defined as information of a file such as file name, attributes, etc.

In excel sheet, metadata works the same and helps to provide information about file name, author name, file size, attributes such as read-only, archieve, hidden, system, location of the file, date and time of creation, modification, or accessed, type of file, etc.

From the given options, the information that is not considered or included in metadata is calculation inside the file. Metadata in excel sheet does not include calculations inside the file. Thus option B is the correct answer

Write a simple command-line calculator with an exception handler that deals with nonnumeric operands. Your program should display a message that informs the user of the wrong operand type before exiting. It should also ask the user to re-input the number to finish the calculation.

Answers

Answer:

Here is the JAVA program:

import java.util.InputMismatchException;  // exception that is thrown when input does not match the expected type

import java.util.Scanner;  //used to take input from user

public class Main {

public static void main(String[] args) { //start of main function

   Scanner input = new Scanner(System.in);  // creates Scanner class object

   double num1=0.0;  // double type operand 1

   double num2=0.0;  // double type operand 2

   System.out.println("Please enter 2 operands");  //prompts user to enter two operands

   try {  //defines a chunk of code to be tested for non numeric operand error

      num1 = input.nextDouble();  //reads operand 1 value

      num2 = input.nextDouble(); //reads operand 2 value

         

   } catch (InputMismatchException  ex) {  //code chunk executed when exception occurs in program

     System.out.println("wrong operand type, re-input " + input.next() + " to finish the calculation.");  //displays wrong operand type if user enters non numeric operands

     System.exit(1);  }//exits the program    

   System.out.print("Enter an operator (+, -, *, /): ");  //prompts user to enter an operator

       char operator = input.next().charAt(0);  //reads the input operator

       double result;  // to store the result of the operation

       switch(operator)         {  //decided operation on basis of input operator

           case '+':  // if user enters + operator

               result = num1 + num2;  //adds two operands

               break;

            case '-':  // if user enters - operator

               result = num1 - num2;  //subtracts two operands

               break;  

           case '*':  // if user enters * operator

               result = num1 * num2;  //multiplies two operands

               break;  

           case '/':  // if user enters / operator

               result = num1 / num2;  //divided two operands

               break;  

           default:  //if user enters wrong operator

               System.out.printf("wrong operator!");  //displays wrong operator

               return;          }  

       System.out.printf("%.1f %c %.1f = %.1f", num1, operator, num2, result); }} //displays the result of the operation

Explanation:

The program is well explained in the comments mentioned with each line of program. The user is prompted to enter the values of two operands num1 and num2. The try block is used to test for non numeric operand error and throws InputMismatchException when any of the input operands (num1 or num2) is non numeric. InputMismatchException is thrown by Scanner class. This informs that the token retrieved (which is the num1 or num2 operand) does not match the expected type (which is type numeric). When this error occurs in the program, catch block is used to execute a code chunk, which is the print statement in this program. The print statement informs the user of the wrong operand type before exiting. It also asks the user to re-input the number to finish the calculation and the wrong input type is also mentioned in the output that is to be re-input.

If you want the program to take the input again from user after throwing this exception then you can alter the above program by using two try catch blocks separately for the two operands:

//for operand 1 i.e. num1

System.out.println("Please enter operand 1: ");

   try {

      num1 = input.nextDouble();        

   } catch (InputMismatchException  ex) {

     System.out.println("wrong operand type, re-input " + input.next() + " to finish the calculation.");

      num1 = input.nextDouble();  }  //reads input of operand 1 again from user

//for operand 2 i.e. num2

          System.out.println("Please enter operand 2: ");  

      try {

      num2 = input.nextDouble();  

   } catch (InputMismatchException  ex) {

     System.out.println("wrong operand type, re-input " + input.next() + " to finish the calculation.");

     num2 = input.nextDouble();  } //reads input of operand 1 again from user

The program and its output is attached.

The process of writing in-memory objects to a file so that the object can later be read back into memory ___.

Answers

Answer:

serialization

Explanation:

Serialization is basically the process of converting an object state to a stream of bytes that object can be read back into memory later, can be stored in (in a file etc), or can be transferred over a network or transmitted to memory, file etc. So the object state is saved in order to restart it later when needed.

Which one of the following statements is false? A. As storage is now cheap and plentiful, modern code management systems are less concerned with optimizing storage. B. Sub-version is the best-known, open-source code management product that is based around a centralized repository. C. In the open-source software development model, many different people can work independently on the code without any knowledge of what others are doing. D. The oldest and perhaps best-known system building tool is "Ant", which was originally developed in the 1970s for Unix.

Answers

Answer:

D. The oldest and perhaps best-known system building tool is "Ant", which was originally developed in the 1970s for Unix.

Explanation:

Ant often referred to Apache Ant is a computer software tool, though popularly considered oldest, was originally first built in the year 2000 by Unix, on Java platform, which is utilized as a component of plug-in development.

Hence, given the available options, the correct answer is Option D, because, Ant originally built in the year 2000 and not the year 1970, while the other statements are definitely correct.

Write code to complete PrintFactorial()'s recursive case. Sample output if userVal is 5:5! = 5 * 4 * 3 * 2 * 1 = 120

Answers

Answer:

Here is the C++ program:

#include <iostream>  //to use input output functions

using namespace std;   //to access objects like cin cout

void PrintFactorial(int factCounter, int factValue){  // method definition

  int nextCounter = 0;  // initialize value of nextCounter by 0

  int nextValue = 0;   // initialize value of nextValue by 0

  if (factCounter == 0) { //base case 1: 0! = 1          

     cout << "1" << endl;    }  //displays 1 in the output

  else if (factCounter == 1) {  //base case 2: 1! = 1  

     cout << factCounter << " = " << factValue << endl;    } //displays 1 in result    

  else {  //recursive case                          

     cout << factCounter << " * ";

     nextCounter = factCounter - 1;  //decrements factCounter by 1

     nextValue = nextCounter * factValue;  // multiplies values of nextCounter and factValue and assigns the result to nextValue

PrintFactorial( nextCounter,  nextValue);    } }  //recursively calls PrintFactorial method to compute the factorial

int main() {  //start of main function

  int userVal = 0;   //initialize the userVal variable to 0

  userVal = 5;  //assigns 5 to the userVal variable

  cout << userVal << "! = ";  //prints the userVal with ! =

  PrintFactorial(userVal, userVal); } //calls PrintFactorial method to compute the factorial of userVal i.e. 5

Explanation:

I will explain the logic of the program with an example.

The value of variable userVal is 5  

This is passed to the method PrintFactorial()

1st step:

void PrintFactorial(int factCounter, int factValue) becomes:  

PrintFactorial(5, 5)

PrintFactorial method has two base conditions which do not hold because the factCounter is 5 here which is neither 1 nor 0 so the program control moves to the recursive part.  

cout << factCounter << " * ";

In recursive part, the above statement prints the value of factCounter  followed by an asterisk on the output screen. So this prints:

5 *

nextCounter = factCounter - 1;

This statement decrements the value of factCounter by 1 and assigns it to nextCounter as:

nextCounter = 5 - 1;

nextCounter = 4

nextValue = nextCounter * factValue;  multiplies the value of nextCounter by factValue and stores result in nextValue . So

nextValue = 4 * 5  

nextValue = 20

PrintFactorial( nextCounter,  nextValue);  this statement calls the PrintFactorial() recursively to perform the above steps again until the base condition is reached. This statement becomes:  

PrintFactorial(4,20)

2nd step:

PrintFactorial method has two base conditions which do not hold because the factCounter is 4 here which is neither 1 nor 0 so the program control moves to the recursive part.  

cout << factCounter << " * ";

In recursive part, the above statement prints the value of factCounter  followed by an asterisk on the output screen. So this prints:

5* 4 *

nextCounter = factCounter - 1;

This statement decrements the value of factCounter by 1 and assigns it to nextCounter as:

nextCounter = 4 - 1;

nextCounter = 3

nextValue = nextCounter * factValue;  multiplies the value of nextCounter by factValue and stores result in nextValue . So

nextValue = 3 * 20

nextValue = 60

PrintFactorial( nextCounter,  nextValue);   This statement becomes:  

PrintFactorial(3,60)

3rd step:

PrintFactorial method has two base conditions which do not hold because the factCounter is 3 here which is neither 1 nor 0 so the program control moves to the recursive part.  

cout << factCounter << " * ";

In recursive part, the above statement prints the value of factCounter  followed by an asterisk on the output screen. So this prints:

5* 4 * 3 *

nextCounter = factCounter - 1;

This statement decrements the value of factCounter by 1 and assigns it to nextCounter as:

nextCounter = 3 - 1;

nextCounter = 2

nextValue = nextCounter * factValue;  multiplies the value of nextCounter by factValue and stores result in nextValue . So

nextValue = 2 * 60

nextValue = 120

PrintFactorial( nextCounter,  nextValue);  This statement becomes:  

PrintFactorial(2,120)

4th step:

PrintFactorial method has two base conditions which do not hold because the factCounter is 2 here which is neither 1 nor 0 so the program control moves to the recursive part.  

cout << factCounter << " * ";

In recursive part, the above statement prints the value of factCounter  followed by an asterisk on the output screen. So this prints:

5* 4 * 3 * 2 *

nextCounter = factCounter - 1;

This statement decrements the value of factCounter by 1 and assigns it to nextCounter as:

nextCounter = 2 - 1;

nextCounter = 1

nextValue = nextCounter * factValue;  multiplies the value of nextCounter by factValue and stores result in nextValue . So

nextValue = 1 * 120

nextValue = 120

PrintFactorial( nextCounter,  nextValue);  This statement becomes:  

PrintFactorial(1,120)

Now the base case 2 evaluates to true because nextCounter is 1

cout << factCounter << " = " << factValue  statement prints the value of factCounter i.e. 1 followed by an equal sign = followed by value of factValue i..e 120

So the output of the above program with userVal = 5 is:  

5! = 5 * 4 * 3 * 2 * 1 = 120

Recursion functions are functions whose execution is controlled from within the function

The PrintFactorial()'s recursive case

The code segment written in Python, where comments are used to explain each action is as follows:

#This defines the function

def PrintFactorial(n):

#if n is 1, this returns the value of n

  if n == 1:

      return n

#If otherwise

  else:

#This calculates the factorial, recursively

      return n*PrintFactorial(n-1)

Read more about python programs at:

https://brainly.com/question/16397886

To move a file or folder in Microsoft Windows you can click and hold down the left mouse button while moving your mouse pointer to the location you want the file or folder to be, which is also known as

Answers

Answer:

**UNSURE** Cutting and pasting*

Explanation:

Its essentially the same thing. Nowadays File Explorer will instead copy the file to the new location in certain circumstances, such as if the destination is a separate drive.

*I'm not sure if this is the type of answer you are looking for, as I'm not sure what context this is in. If you're looking for a specific term regarding that type of action in the user interface, this might not be it.

Recall that within our BinarySearchTree class the root variable is of type BSTNode. A BSTNode object has three attributes: info of class T, left of class BSTNode, and right of class BSTNode, Following is the implementation of the isEmpty method: public boolean isEmpty() // Returns true if this BST is empty; otherwise, returns false.
{
return (root == null);
}
A. True
B. False

Answers

Answer:

False ( A )

Explanation:

The implementation is incorrect hence the return would be false and this is because : root.left is supposed to be NULL, root.right is supposed to be NULL and when  these conditions are met then the Binary tree would be empty.

The condition for the above statement would be represented as

if( root.left = = null && root.right == null &&root.info == null)

return true;

else

return false;

What are video games and what have they meant for society?

Answers

video games are a source of entertainment for people especially children.

it helps relieve stress for adults or grown ups.

society sees video games as a negative impact on children and that it wastes their time.

Answer:

video games are games played for fun and enjoyment they are types of video games we have shooting video games, football video games, sport video games and so much more. video games are for fun and not all video games are meant for society. video games like football should be meant for sociey ehere everyone can come together to play games like these bring people and society together.

11. To select Access database entries, you should be in
O A. Datasheet view.
O B. Design view.
O C. Query wizard.
O D. Form Design.

Answers

Answer: A

Explanation:

Answer:

Design view

Explanation:

did it on edge

Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
a. ubiquity.
b. quality.
c. anomaly.
d. integrity.

Answers

Answer:

d. integrity

Explanation:

Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.

Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.

What three conditions must be satisfied in order to solve the critical section problem?

Answers

Answer:

Explanation:

The critical section problem revolves around trying to ensure that at most one process is executing its critical section at a given time. In order to do so, the three following conditions must be met.

First, no thread may be executing in its critical section if there is already a current thread executing in its critical section.

Second, only the specific threads that are not currently occupied executing in their critical sections are allowed to participate in deciding which process will enter its critical section next.

Third, a preset limit must exist on the number of times that other threads are allowed to enter their critical state after a thread has made a request to enter its critical state.

A keyboard would be considered____. Select 2 options.

Answers

Answer:

hardware

an input device

Explanation:

the ohter options are not applicable

The answer here would be Hardware and Input device as it is considered a peripheral and its also inputting to the computer

Help me pls, thank you

Answers

Answer:

pseudocode

flowchart

Explanation:

Answer:

Pseudo code flowchart

What are the similarities and differences between the binary and decimal systems?

Answers

Answer:

A binary system is a system that functions on zeros and ones (0's and 1's).

A decimal system is an Arabic numeric system that has 10 as its base and uses a dot which is also called a decimal point to show fractions.

Differences

A decimal uses ten different digits which is 0-9 while a binary system uses just two digits 0 and 1Decimal system was historically a Hindu-Arabic system while the binary system is just an Arabic system

Similarities

They are capable of performing arithmetic operations They both can be represented in decimal form

Differences between binary and decimal systems

A binary system represents information using two digits(0 and 1) while a decimal system represents information using ten digits (0 to 9) Numbers represented using the binary system has bits as their unit while numbers represented using the decimal system has digits as their unitBinary numbers are called base two numbers while decimal numbers are called base 10 numbersThe language understood by the computer system is binary, and not decimal

Similarities between binary and decimal systems

Arithmetic operations can be carried out on numbers in both the binary ands decimal systemsValues of each bit and digit in binary and decimal numbers respectively depends on how close they are to the decimal pointInteger and fraction components are represented in both decimal and binary systems

Learn more here: https://brainly.com/question/18520134

Which of the following encryption methods does PKI typically use to securely protect keys? a. Elliptic curve b. Digital signatures c. Asymmetric d. Obfuscation

Answers

Answer:

B. Digital Signature

Explanation:

Digital signature is an electronic signatures.  They are used to authenticate the identity of a person sending the message. It ensures that the original content of the document or message remains unchanged. Digital signatures cannot be imitated. There are three types of digital signature certificates:

Sign Digital Signature Certificate  

Encrypt Digital Signature Certificate  

Sign & Encrypt Digital Signature Certificate

Write code to complete factorial_str()'s recursive case. Sample output with input: 5 5! = 5 * 4 * 3 * 2 * 1 = 120

Answers

Answer:

Here is the complete code to complete factorial_str()'s recursive case:

Just add this line to the recursive part of the code for the solution:

output_string += factorial_str(next_counter,next_value)  

The above statement calls factorial_str() method recursively by passing the values of next_counter and next_value. This statement continues to execute and calls the factorial_str() recursively until the base case is reached.

Explanation:

Here is the complete code:

def factorial_str(fact_counter, fact_value):  #method to find the factorial

   output_string = ''   #to store the output (factorial of an input number)

   if fact_counter == 0:  # base case 1 i.e. 0! = 1

       output_string += '1'  # displays 1 in the output

   elif fact_counter == 1:  #base case 2 i.e. 1! = 1

       output_string += str(fact_counter) + ' = ' + str(fact_value)  #output is 1

   else:  #recursive case

       output_string += str(fact_counter) + ' * '  #adds 8 between each value of fact_counter

       next_counter = fact_counter - 1  #decrement value of fact_counter by 1

       next_value = next_counter * fact_value  #multiplies each value of fact_value by next_counter value to compute the factorial

       output_string += factorial_str(next_counter,next_value) #recursive call to factorial_str to compute the factorial of a number

   return output_string   #returns factorial  

user_val = int(input())  #takes input number from user

print('{}! = '.format(user_val),end="")  #prints factorial in specified format

print(factorial_str(user_val,user_val))  #calls method by passing user_val to compute the factorial of user_val

I will explain the program logic with the help of an example:

Lets say user_val = 5

This is passed to the method factorial_str()

factorial_str(fact_counter, fact_value) becomes:

factorial_str(5, 5):  

factorial_str() method has two base conditions which do not hold because the fact_counter is 5 here which is neither 1 nor 0 so the program control moves to the recursive part.

output_string += str(fact_counter) + ' * '  adds an asterisk after the value of fact_counter i.e. 5 as:

5 *

next_counter = fact_counter - 1 statement decrements the value of fact_counter  by 1 and stores that value in next_counter. So

next_counter = 5 - 1

next_counter = 4

next_value = next_counter * fact_value  multiplies the value of next_counter by fact_value and stores result in next_value. So

next_value = 4 * 5

next_value = 20

output_string += factorial_str(next_counter,next_value)  this statement calls the factorial_str() to perform the above steps again until the base condition is reached. This statement becomes:

output_string = output_string + factorial_str(next_counter,next_value)

output_string = 5 * 4 = 20

output_string = 20

Now factorial_str(next_counter,next_value) becomes:

factorial_str(4,20)

output_string += str(fact_counter) + ' * ' becomes

5 * 4 * 3

next_counter = fact_counter - 1  becomes:

4 - 1 = 3

next_counter = 3

next_value = next_counter * fact_value  becomes:

3 * 20 = 60

next_value = 60

output_string = 5 * 4 * 3= 60

output_string = 60

factorial_str(next_counter,next_value) becomes:

factorial_str(3,60)

output_string += str(fact_counter) + ' * ' becomes

5 * 4 * 3 * 2

next_counter = fact_counter - 1  becomes:

3 - 1 = 2

next_counter = 2

next_value = next_counter * fact_value  becomes:

2 * 60 = 120

next_value = 120

output_string += factorial_str(next_counter,next_value) becomes:

output_string = 120 + factorial_str(next_counter,next_value)

output_string = 5 * 4 * 3 * 2 = 120

factorial_str(2,120)

output_string += str(fact_counter) + ' * ' becomes

5 * 4 * 3 * 2 * 1

next_counter = fact_counter - 1  becomes:

2 - 1 = 1

next_counter = 1

next_value = next_counter * fact_value  becomes:

1 * 120 = 120

next_value = 120

output_string += factorial_str(next_counter,next_value) becomes:

output_string = 120 + factorial_str(next_counter,next_value)

factorial_str(next_counter,next_value) becomes:

factorial_str(1, 120)

Now the base case 2 evaluates to true because next_counter is 1

elif fact_counter == 1

So the elif part executes which has the following statement:

output_string += str(fact_counter) + ' = ' + str(fact_value)  

output_string = 5 * 4 * 3 * 2 * 1 = 120

So the output of the above program with user_val = 5 is:

5! = 5 * 4 * 3 * 2 * 1 = 120

Following are the recursive program code to calculate the factorial:

Program Explanation:

Defining a method "factorial_str" that takes two variable "f, val" in parameters.Inside the method, "s" variable as a string is defined, and use multiple conditional statements.In the if block, it checks f equal to 0, that prints value that is 1.In the elif block, it checks f equal to 1, that prints the value is 1.In the else block, it calculates the factor value and call the method recursively, and return its value.Outside the method "n" variable is declared that inputs the value by user-end, and pass the value into the method and print its value.

Program:

def factorial_str(f, val):#defining a function factorial_str that takes two parameters

   s = ''#defining a string variable

   if f == 0:#defining if block that check f equal to 0

       s += '1'#adding value in string variable

   elif f == 1:#defining elif block that check f equal to 1

       s += str(f) + ' = ' + str(val)#printing calculated factorial value

   else:#defining else block that calculates other number factorial

       s += str(f) + ' * '#defining s block that factorial

       n = f - 1#defining n variable that removes 1

       x = n * val#defining x variable that calculate factors

       s += factorial_str(n,x)#defining s variable that calls factorial_str method recursively  

   return s#using return keyword that returns calculated factors value  

n = int(input())#defining n variable that inputs value

print('{}! = '.format(n),end="")#using print method that prints value

print(factorial_str(n,n))#calling method factorial_str that prints value

Output:

Please find the attached file.

Learn more:

brainly.com/question/22777142

Which of the following is an example of self-directed learning?

Answers

Answer:

Self directed learning is an the strategy the students guidance from that teacher decide and students they will learn.

Explanation:

Self directed learning its a effective technique that can anyone to use the learning in a school time into a curriculum program, there are many type of characteristics:- (1) Flexibility (2) Autonomy (3) Self acceptance (4) Playfulness.

Self directed learning is to perform that allow us to the initiative own learning, students grow and improve the motivation and integrity to the learning.Self directed learning to that contain the self learning with the internet program, and apply to the skill outside of the area learning.Self directed learning to the set of goal that the business and career and the achieve of the goal.Self directed learning to contain your  interests and motivate yourself and reflecting the learners.Self directed learning is to provide learn strategies and methods to achieve the better lives and behavior can translate.Self directed is the value to the teamwork and help the students and learner work in better team.Self learning is perform physical side learning and the focus on the mental side, and they we are putting in heads.Self learning is to contain the better your learning  standards and to measure learning goals.

Answer:

B

I got it on edge

Other Questions
Using a cash flow statement, explain why ultra Cable Corporation's cash balance has declined so precipitously this past year. Nikils soccer team has 13 players. nikil has 4 fewer players on his team than roses team. How many players are on rise team? In which form do plants store energy? What is the solution to the problem rounded to the correct number of significant figures?12.77 + 0.8 = ? What would be the best engine to use for making a 3d beginner game 6. A motorcycle is moving at a constant speed of 40 miles/hour. How long does it take to travela distance of 65 miles? Which of the following limited topics would be appropriate for a short paper?The history of Rock and Roll in AmericaElvis PresleyThe influence of Elvis on Rock and Roll Which statement about conjunction is true 1/4a + 1/3a + 8 = 22 what would be the steps to solve this What replaced copper wires in long distance communicationas they are cheaper and less bulky than copper cables carrying the same information Green is a sign of danger in some countries so a U.S firm that sells its goods that sells its goods in those countries would probably want to avoid using green on its packaging. Which aspect of packaging is addressed by this issue Identify the inequality for the given graph. Read the passage from a speech given by the Athenian leader Pericles. Our constitution does not copy the laws of neighboring states; we are rather a pattern to be imitated than imitators ourselves. Its administration favors the many instead of the few; this is why it is called democracy. If we look to the laws, they afford equal justice to all in their private differences. . . . [C]lass considerations [are not] allowed to interfere with merit; nor again does poverty bar the way, if a man is able to serve the state, he is not hindered by the obscurity of his condition. Pericles claimed that the Athenian government, unlike other Greek city-states, Corinne has a job selling magazines. She earns $7.50 per hour plus 20% of the total amount of her sales. She also gets an allowance of $40 per week for gas. She knows her weekly earnings can be shown using the following expression: 7.50h + 0.20s + 40 Part A: Identify a coefficient, a variable, and a constant in this expression. (3 points) Part B: If Corinne works for 25 hours and sells $300 in magazines, how much does she earn for the week? Show your work to receive full credit. (4 points) Part C: If Corinne gets a raise and begins earning $9 per hour, would the coefficient, variable, or constant in the equation change? Why? Question 2 of 5 What is one of the reasons that Swift gives for his proposal? O A. Harvesting poor infants will reduce the number of Papists in the country. O B. Irish infants' fathers are already selling them as servants to the rich. C. There is a famine in the land, and children are plentiful. D. Chefs in Ireland are already serving infant meat in the finest restaurants. Thenumbers are {0, 1, 2, 3, 4, ...}.wholerationalnaturalrealinteger Explain how hereditary diseases are passed from one generation to another. I NEED HELP WITH THIS. PLZZZZ HELP!!!!!!!! :( 1) Charles Wallace recognizes the stranger who comes into the kitchenas Mrs. Whatsit. Do you think it was just by chance she came tothe Murry house, or does she have some purpose for being there?Explain your answer. If G is a 3 x 4 matrix and His a 4x 3 matrix, what is the dimension of GH?04x30 3x4O 3x3O Undefined