Answer:
Cyber security is the practice if defending computers,servers,mobile devices,electronic systems, networks, and data from malicious attacks
Whenever the amount of work of an algorithm is expressed as a polynomial, we focus on one term as dominant.
a) true
b) false
Answer:
True
Explanation:
hop it's helpful for you ☺️
What are the different types database of end users? Discuss the main activi-ties of each
Answer:
following types of databases available in the market −
Centralised database.
Distributed database.
Personal database.
End-user database.
Commercial database.
NoSQL database.
Operational database.
Relational database.
Cloud database.
Object-oriented database.
Graph database
Answer:
1. Casual End Users
These are the users who occasionally access the database but they require different information each time. They use a sophisticated database query language basically to specify their request and are typically middle or level managers or other occasional browsers. These users learn very few facilities that they may use repeatedly from the multiple facilities provided by DBMS to access it.
2. Naive or parametric end users
These are the users who basically make up a sizeable portion of database end users. The main job function revolves basically around constantly querying and updating the database for this we basically use a standard type of query known as canned transaction that have been programmed and tested. These users need to learn very little about the facilities provided by the DBMS they basically have to understand the users’ interfaces of the standard transaction designed and implemented for their use. The following tasks are basically performed by Naive end users:
The person who is working in the bank will basically tell us the account balance and post-withdrawal and deposits.
Reservation clerks for airlines, railway, hotels, and car rental companies basically check availability for a given request and make the reservation.
Clerks who are working at receiving end for shipping companies enter the package identifies via barcodes and descriptive information through buttons to update a central database of received and in transit packages.
3. Sophisticated end users
These users basically include engineers, scientist, business analytics and others who thoroughly familiarize themselves with the facilities of the DBMS in order to implement their application to meet their complex requirement. These users try to learn most of the DBMS facilities in order to achieve their complex requirements.
4. Standalone users
These are those users whose job is basically to maintain personal databases by using a ready-made program package that provides easy to use menu-based or graphics-based interfaces, An example is the user of a tax package that basically stores a variety of personal financial data of tax purposes. These users become very proficient in using a specific software package.
The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do loop, and vice versa.
a. True
b. False
IPO cycle eexample three examples
in theory a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation what is the more likely range involved?
A directional antenna or beam that used as an antenna that radiates or receives additional power from the unwanted source into certain directions that enhances performance and reduces interference.
Receiver satellite TVs commonly employ parabolic antennas.It better pulls signals in one way in which it detects a weaker or more distant signal than an omnidirectional antenna counterpart.The difference is that they do it by reducing their ability to draw signals from other directions.The coverage area is smaller yet extends farther out. This could reach up to 8 miles under optimum conditions.Learn more:
brainly.com/question/23886562
The text between < html > and < /html > defines the _____.
a) active Web-page area
b) active code on a page
c) active text on a page
d) active image on a page
Answer:
active text on a page
Explanation:
Suppose that someone suggests the following way to confirm that the two of you are both in possession of the same secret key. You create a random bit string the length of the key, XOR it with the key, and send the result over the channel. Your partner XORs the incoming block with the key (which should be the same as your key) and sends it back. You check and if what you receive is your original random string, you have verified that your partner has the same secret key, yet neither of you has ever transmitted the key. Is there a flaw in this scheme?
Answer:
yes, there is a small flaw. You can reconstruct your partner's key even if it is different from yours.
Explanation:
Suppose you have key a and your partner has key b, you want to check if a == b, but if it is not, your partner doesn't want to reveal his key otherwise he could have just sent it.
So you create a random bit string r. and send a⊕r to him. He sends you back a⊕r⊕b. If a==b the a⊕b would cancel each other out, and you would be left with r.
However, if you calculate a⊕r⊕b⊕r⊕a, you would always get b! In other words, you XOR the received value with r and XOR it with your a. Then you get b, whatever it is.
What is the meaning of DHCP
Answer:
A Dynamic Host Configuration Protocol
Explanation:
hich of the following lists contains the five essential elements of a computer?
1. inputs, returns, programs, processes, and storage
-
2. language, software, hardware, code, and development
-
3. inputs, outputs, programs, processes, and storage
-
4. binary, code, inputs, processes, and storage
Answer:
I think 3(input, outputs, program, processes and storage)!!!!!
the computer _______ and_________ the data you input
please help
Answer: Data and stores
The primary purpose of the SNORT application is to function as an ACL, i.e. it controls authorization (or access) to a resource.
O True
O False
That's why the answer is "False".
Learn more:
brainly.com/question/14288353
System documentation is never up to date.
True or false?
Explanation:
System documentation is never up to date is false
If the formula in cell D49 is copied to cells E49:F49, what sequence of values would be generated in Cells D49:F49?
Conference Room Location Staff ID
D East 19106
C North 19122
A South 19107
E South 19104
B South 19147
=$D$44
Excel moves or copies a cell with formulas and their results, cell formats, and comments. When moving or copying a cell.
If there are certain cells, rows, or columns that do not appear on a worksheet, you can copy all cells.Otherwise, the visible cells. In adding to viewable cells, Excel copies cached or filtering cells per default.[tex]\bold{C \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ C \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ C}[/tex]
The formulation in cell D49 is a stable formula that does not vary by cell type. Alt + F4 is the shortcut to fasten a form. Therefore, the formula given in D49 would achieve the same output when copied to another cell.Learn more:
brainly.com/question/17021828
How has colored television impacted society in a positive way?
please click on star
Explanation:
Color television was sold to viewers as a way to experience everything from sports and nature to musical theater in a more legible, realistic, captivating, and sensational way.what separates the components of a domain name
Explanation:
period
In a domain name, the 'thing' that separates its components is a period.
I’m a grade 12 computer student with no knowledge of Java. All I know is hello world. I have final exam in 2 months is there any chance I can learn Java in 2 months, Atleast that I’ll pass my exams and if yes can anyone guide me, where to start from and the next steps.
Answer:
But iam 9th class student.
What does it mean to demonstrate big picture thinking
Answer:
To know how to demonstrate something, you have to know what it means first. Big Picture Thinking is the ability to come up with ideas, solutions and opportunities. Big thinkers see possibilities and jump on opportunities.
Explanation:
So, in order to demonstrate something like this, you'd fins or create an idea and get right into it. For example, if you see an opportunity to help an elderly woman across the street, a big thinker would go and do that.
Which statement about sample size is true?
A. As the sample size within a study increases, statistical power decrea
B. As the sample size within a study decreases, statistical power decrea
C. As the sample size within a study decreases, statistical power increa
D. As the sample size within a study decreases, statistical power remain
Please select the best answer from the choices provided
A
0 0 0 0
Write a program that computes an integer's checksum. To compute the checksum, break the integer into its constituent digits and, working from right to left, doubling every second digit. If the product results in a number with two digits, treat those two digits independently. Then, sum all the digits for the final checksum.
Following are the C++ program to the given question:
#include <iostream>//header file
using namespace std;
int findCheckSum(int n)//defining a method findCheckSum that takes integer parameter
{
bool c = false;//defining bool variable
int S= 0,d;//defining integer variable
while(n)//defining while loop that seprates digits
{
d = n%10; // get the digit.
n=n/10; // remove the last digit.
if(c)//use if to check the even position value
{
d=d*2;//multiplying d with 2
while(d)//use if to check digit value
{
S=S+(d%10);//adding value
d=d/10;// remove the last digit.
}
}
else//defining else block
{
S=S+d;// checking the odd position
}
c= c^true;//holding bool value
}
return S;//return S
}
int main() //defining main method
{
cout << findCheckSum(1984);//calling method
}
Output:
22
Program Explanation:
Including header file.Defining a method, "findCheckSum" that takes an integer parameter "n".Inside the method, a bool variable "c" and two integer variable "S, d" is declared that defines a while loop.Inside the loop, a conditional statement is defined that separates digits and adds them into the "S" variable, and returns its values.Outside the method, the main method is declared that calls the "findCheckSum" method, and print its value.Learn more:
brainly.com/question/14788459
What is MVC architecture in relation to developing in web applications? How
can we make use of this concept in web application development? Explain with
an example
Answer:
11÷3=5÷5=-316+6×53×4+996=357534
The major computer operations include what?
Answer:
They include input, processing, output, storage and controlling.
A computer is a computing system that takes inputs, processes, storage and gives an output. These are some of the basic computer or major computer operations.
These processes include various types of processes and dedicated systems. Other main operations include sequencing and looing, programming business statistics, etc.Thus the option B is correct.
Learn more about the major computer operations include.
brainly.com/question/18045931.
Memory Uninstalling a program
A) Removes the program from memory
B) Removes the program from a disk
C) Removes the program from the monitor
D) Permanently removes a program that is no longer
wanted
Answer:
D
Explanation:
but you can re install it
why entity relationship model is used for data manipulation??
Answer:
An entity relationship diagram gives a snapshot of how these entities relate to each other. You could call it the blueprint that underpins your business architecture, offering a visual representation of the relationships between different sets of data (entities)
Hope u got it
If you have any question just ask me
If you think this is the best answer please mark me as brainliest
Statistics are often calculated with varying amounts of data stored in a file. Write a program that takes any number of non-negative integers as input, and outputs the average, min and max. Prompt user for the input file name, open the file, read and process the numbers in the file.
Following are the program explanation, program, and output to the given question:
Program Explanation:
Import package.Defining a class Main.Defining the main method.Defining a string variable "str" and define a Scanner class object to input the"str" value.After input, the string value of a Scanner class object is created that takes the "str" value in the parameter.In the next step, the "ArrayList" class object is declared that uses a while loop to add value to the list.In the condition statement an if block is defined that check ArrayList value equal to 0, and print the message.In the else block, a float variable "sum" and three integer variable "ctr, min, and max " is declared that check its value and prints its value with the message.Program:
import java.io.*;//import package
import java.util.*;//import package
public class Statistics //defining a class Statistics
{
public static void main (String[] asx)//defining main method
{
String str;//defining a string variable str
Scanner sob= new Scanner(System.in);//defining Scanner class object to input value
System.out.println("Enter value: ");//print message
str= sob.nextLine();//input value
Scanner s = new Scanner(str);//using Scanner class to take value str in parameter
List<Integer> val = new ArrayList<Integer>();//defining an ArrayList class
while(s.hasNextInt())//defining a while loop in add value
{
val.add(s.nextInt());//using add method to add value
}
if(val.size() == 0)//defining if block that check ArrayList value equal to 0
System.out.println("The File is empty");//print message
else//else block
{
float sum = 0;//defining float variable
int ctr = 0, max = Integer.MIN_VALUE, min = Integer.MAX_VALUE;//defining integer variable that hold value
for(Integer a:val)//defining a for loop that check ArrayList
{
ctr = ctr + 1;//adding value in ctr variable
sum = sum + a;//adding value sum variable
if(min > a)//use if to check min value greater than a
min = a;//holding value in min
if(max < a)//use if to check max value less than a
max = a;//holding value in max
}
System.out.print("Average = ");//print message
System.out.println(sum/ctr);//print average value
System.out.print("Minimum value = ");//print message
System.out.println(min);//print min value
System.out.print("Maximum value = ");//print message
System.out.println(max);//print max value
}
}
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/15410214
Basic function call get_pattern() returns 5 characters. Call get_pattern() twice in a print() statement to return and print 10 characters. Example output: ***** *****
def get_pattern():
return '*****'
print('*****')
print('*****')
get_pattern()
get_attern()
Testing pattern returned was printed twice.
Your output
*****
*****
Testing with different character. Output differs. See highlights below.
Your output
*****
*****
Expected output
#####
#####
Answer:
get_pattern()
get_pattern()
print(get_pattern())
print(get_pattern())
Explanation:
The program is given in Python; this means that it must be completed in Python.
The code segment that completes the program is:
print(get_pattern())
print(get_pattern())
From the complete question, the given code segment is:
def get_pattern():
return '*****'
The above function will only return 5 characters i.e. 5 *'s, but it will never print the characters.
For the characters to be printed, a print statement must be introduced when calling the function get_pattern()
So, the print statement will be:
print(get_pattern())
The question requires 10 characters; so, the print statement must be called twice.
Hence, the code segment that completes the program is:
print(get_pattern())
print(get_pattern())
Read more about Python programs at:
https://brainly.com/question/22841107
In a typical day, what types of Computer-Mediated Communication do you use?
Answer:
Well, the types of Computer-Mediated communication I use are email, network communication and distance learning.
Explanation:
On a typical day, the types of Computer-Mediated Communication that will use our Instant messages, computer, audio, and video conferencing.
What are Computer-Mediated Communications?The time and geographic limitations of in-person contact are removed through computer-mediated communication (CMC), in which people use computers and networks to communicate with one another across enormous distances and multiple time zones.
Computer-mediated communication (CMC) emphasizes how important it is for parties to communicate with one another through mediated channels of communication. Instead of focusing on the quantity, content, frequency, or timing of the message exchange, CMC places more emphasis on how new messages relate to older ones.
Therefore, the methods of computer-mediated communication that are used on a daily basis include audio, video, and instant messaging.
To learn more about Computer-Mediated Communications, refer to the link:
https://brainly.com/question/1918317
#SPJ2
Discuss the term internal control
Answer:
Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.
PLEASE MARK ME BRAINLIEST19. Fatigue can help improve your reaction time.
False
O True
Fatigue can help improve your reaction time is false.
Fatigue generally impairs reaction time rather than improving it.
When a person is fatigued, their cognitive and physical abilities can be negatively affected, including their reaction time.
Fatigue can lead to slower reflexes, decreased attention, and impaired decision-making, which can all contribute to longer reaction times.
It is important to get sufficient rest and manage fatigue to ensure optimal performance and safety, especially in activities that require quick reflexes and rapid responses.
To learn more on Fatigue click:
https://brainly.com/question/32503112
#SPJ6
What is computer hacking?
Answer:
Computer hacking:-Computer hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals.How is a WAN different from a LAN?
O LANs and WANs together make up 2. network.
O LANs require WANs or servers.
O A WAN is made up of LANS
O A LAN is made up of WANS
A WAn ( Wide Area Network ) is made up of LANS ( Local Area Network)…………