Answer:
Threat assessment
Explanation:
A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.
Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.
Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".
Answer:
Threat assessment
Explanation:
In an IT system, threat assessment is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.
The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;
i. Prevention of data loss
ii. Prevention of system or network of systems downtime
In carrying out threat assessment, one might need to do the following;
i. identification and prioritization of infrastructure including the software and hardware applications in the system.
ii. identification of potential threats such as system failure, natural disaster, unwanted access.
iii. identification of vulnerabilities in the system.
iv. analysing controls by determining who has access and who doesn't.
v. analysing the impact of a threat occurrence.
vi. documentation of analysis and evaluation results.
I have tried looking for this answer everywhere, and I could not find the answer
I have a Windows 10 Laptop, with a 12GB RAM Card, okay? I also have my 1TB Disk Partitioned so that I have 3 Disks. 2 of them are my primary, both of those are 450GB apiece. The last one ([tex]Z:[/tex]) I named "RAM" and set that one to 100GB.
How do I turn the drive [tex]Z:[/tex] into strictly RAM?
I already did the Virtual Memory part of it, but I was wondering if I can make it strictly RAM so the system uses drive [tex]Z:[/tex] before using the RAM disk? If it is not possible, I'm sorry.
If my computer has 4 gigabytes of ram memory then I have 4e+9 bytes of memory. I think-
Answer: That isn't a software problem, its a hardware problem. There is a difference between 12gb of ram versus 100 gb of HDD. Ram is temporary storage, you can not turn SSD or HDD storage into RAM. If you are a gamer, STEER AWAY FROM LAPTOPS, DO NOT BUY A GAMING LAPTOP. Either buy a DESKTOP (or build) or a console. They give more performance for the price and they are easily upgradable. Not many people can open up a laptop and put in more RAM because the hardware is incredibly small.
The advantage of returning a structure type from a function when compared to returning a fundamental type is that
Answer:
The function can return multiple values and the function can return an object
Explanation:
The advantage of returning a structure type from a function when compared to returning a fundamental type is that the function can return multiple values and also the function can return an object
A function in a structure can be passed to a function from any other function or from the main function itself and the definition of a structure can be seen in the function where it is found
What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation?
Answer:
Linked lists and arrays are both linear data structures but while an array is a collection of items that can be accessed randomly, a linked list can be accessed sequentially.
A sparse matrix contains very few non-zero elements. For example;
_ _
| 0 0 3 0 6 |
| 0 5 0 0 4 |
| 2 0 0 0 0 |
|_ 0 0 0 0 0 _|
In the implementation of a sparse matrix, the following are some of the pros and cons of using a linked list over an array;
PROS
i. Linked lists are dynamic in nature and are readily flexible - they can expand and contract without having to allocate and/or de-allocated memory compared to an array where an initial size might need to be set and controlled almost manually. This makes it easy to store and remove elements from the sparse matrix.
ii. No memory wastage. Since the size of a linked list can grow or shrink at run time, there's no memory wastage as it adjusts depending on the number of items it wants to store. This is in contrast with arrays where you might have unallocated slots. Also, because the zeros of the sparse matrix need not be stored when using linked lists, memory is greatly conserved.
CONS
i. One of the biggest cons of linked lists is the difficulty in traversing items. With arrays, this is just of an order of 0(1) since the only requirement is the index of the item. With linked lists, traversal is sequential which means slow access time.
ii. Storage is another bottle neck when using linked lists in sparse matrix implementation. Each node item in a linked list contains other information that needs to be stored alongside the value such as the pointer to the next or previous item.
12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE function to find the average bonus multiplier (C7:C10).
Answer:
1. Divide each bonus by regular bonus apply this to all the data
2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.
Explanation:
The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.
After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.
Your boss wants you to start making your own Ethernet cables to save the company money. What type of connectors will you need to order to make them?
Answer:
Bulk Ethernet Cable - Category 5e or CAT5e
Bulk RJ45 Crimpable Connectors for CAT-5e
Explanation:
How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = futureValue * (1 + monthlyInterestRate); i = i+1; }
a. 5
b. 4
c. 6
d. 0
Answer:
I believe it is A
Explanation:
Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require at least a paragraph for each type of firewall.
Acme Corporation wants to be sure employees surfing the web aren't victimized through drive-by downloads. Which type of firewall should Acme use? Explain why your answer is correct.
Answer:
packet filtering
Explanation:
We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D
Convert the following numbers from decimal to binary, assuming unsigned binary representation:________.
A) 35
B) 3
C) 27
D) 16
Answer:
Binary representations of following are:
A) 35 = 100011
B) 3 = 11
C) 27 = 11011
D) 16 = 10000
Explanation:
The method to generate the binary number from a decimal is :
Keep on dividing the number by 2 and keep on tracking the remainder
And the quotient is again divided and remainder is tracked so that the number is completely divided.
And then write the binary digits from bottom to top.
Please have a look at the method in below examples:
A) 35
[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 35 & 1 \\ 2 & 17 & 1 \\ 2 & 8 & 0 \\ 2 & 4 & 0 \\ 2 & 2 & 0 \\ 2 & 1 & 1\end{tabular}\end{center}[/tex]
Writing the remainder from bottom to top.
So, binary number is 100011
B) 3
[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 3 & 1 \\ 2 & 1 & 1 \\ \end{tabular}\end{center}[/tex]
Writing the remainder from bottom to top.
So, binary equivalent is 11.
C) 27
[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 27 & 1 \\ 2 & 13 & 1 \\ 2 & 6 & 0 \\ 2 & 3 & 1 \\ 2 & 1 & 1 \end{tabular}\end{center}[/tex]
Writing the remainder from bottom to top.
So, binary equivalent is 11011.
D) 16
[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 16 & 0 \\ 2 & 8 & 0 \\ 2 & 4 & 0 \\ 2 & 2 & 0 \\ 2 & 1 & 1 \\\end{tabular}\end{center}[/tex]
Writing the remainder from bottom to top.
So, binary equivalent is 10000.
Answers are:
Binary representations of following are:
A) 35 = 100011
B) 3 = 11
C) 27 = 11011
D) 16 = 10000
g Write a C program that prompts the user for a string of, up to 50, characters and numbers. It can accept white spaces and tabs and end with a return. The program should keep track of the number of different vowels (a,e, i, o, u) and the number of digits (0, 1, 2, 3, 4, 5, 6, 7, 8,9). The program should output the number of occurrences of each vowel and the number of occurrences of all digits.
Answer:
Following are the code to this question:
#include <stdio.h> //defining header file
#include <string.h>//defining header file
int main()//defining main method
{
char name[50]; //defining character variable
int A=0,E=0,I=0,O=0,U=0,value=0,i,l; //defining integer variables
printf("Enter string value: ");//print message
gets(name);//input value by gets method
l=strlen(name);//defining l variable to store string length
for(i=0; i<50; i++) //defining loop to count vowels value
{
if(name[i] == 'A' || name[i] == 'a') //defining if condition count A value A++;//increment value by 1
else if(name[i] == 'E' || name[i] == 'e')//defining else if condition count E value
E++;//increment value by 1
else if(name[i] == 'I' || name[i] == 'i') //defining else if condition count I value
I++;//increment value by 1
else if(name[i] == 'O' || name[i]== 'o') //defining else if condition count O value
O++;//increment value by 1
else if(name[i] == 'U' || name[i] == 'u')//defining else if condition count U value
U++;//increment value by 1
else if(name[i]>= '0' && name[i] <= '9')//defining else if condition count digits value
value++;//increment value by 1 }
printf("A: %d\n",A);//print A value
printf("E: %d\n",E); //print E value
printf("I: %d\n",I);//print I value
printf("O: %d\n",O);//print O value
printf("U: %d\n",U);//print U value
printf("value: %d",value);//print digits value
return 0;
}
Output:
please find the attachment.
Explanation:
In the above code, a char array "name" and integer variables "A, E, I, O, U, i, value and l" declared, in which name array store 50 character value, which uses the gets function to take string value.after input value strlen method is used to store the length of the input string in l variable.In the next step, for loop is declared that uses multiple conditional statements to counts vowels and the values of the digits,if it is more then one it increments its value and at the last print method is used to print its count's value.Write a program that read two numbers from user input. Then, print the sum of those numbers.
Answer:
#This is in Python
number1 = raw_input("Enter a number: ")
number2 = raw_input("Enter another number: ")
sum = float(number1) + float(number2)
print(sum)
Explanation:
What's the value of this Python expression? ((10 >= 5*2) and (10 <= 5*2))
Answer:
1 (true)
Explanation:
10 == 10 is valid=> 10 >= 10 is valid => 10 >=(5*2) is valid
10 == 10 is valid=> 10 <= 10 is valid => 10 <=(5*2) is valid
=> ((10 >= 5*2) and (10 <= 5*2)) is valid => Return 1 or True
Makers of tablet computers continually work within narrow constraints on cost, power consumption, weight, and battery life. Describe what you feel would be the perfect tablet computer. How large would the screen be? Would you rather have a longer-lasting battery, even if it means having a heavier unit? How heavy would be too heavy? Would you rather have low cost or fast performance Should the battery be consumer-replaceable?
Answer:
In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.
In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.
What will be the typical runtime of a tablet?The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets.
The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets. It might go a week or longer between charges if you only use the tablet once or twice each day.
Many people find that charging merely 80% is ineffective. Your phone won't function if you fully charge it and then use it in a single day. The 40-80% rule applies if, like me, your daily usage is limited to 25–50%.
The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets.
Therefore, In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.
Learn more about battery on:
https://brainly.com/question/19225854
#SPJ2
Write a program named Deviations.java that creates an array with the deviations from average of another array. The main() method
Answer:
hello your question is incomplete attached is the complete question and solution
answer : The solution is attached below
Explanation:
Below is a program named Derivations.java that creates an array with the deviations from average of another array.
The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?
Answer:
Deployment
Explanation:
Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.
So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.
Answer:
Deployment
Explanation:
You are in a rectangular maze organized in the form of M N cells/locations. You are starting at the upper left corner (grid location: (1; 1)) and you want to go to the lower right corner (grid location: (M;N)). From any location, you can move either to the right or to the bottom, or go diagonal. I.e., from (i; j) you can move to (i; j + 1) or (i + 1; j) or to (i+1; j +1). Cost of moving right or down is 2, while the cost of moving diagonally is 3. The grid has several cells that contain diamonds of whose value lies between 1 and 10. I.e, if you land in such cells you earn an amount that is equal to the value of the diamond in the cell. Your objective is to go from the start corner to the destination corner. Your prot along a path is the total value of the diamonds you picked minus the sum of the all the costs incurred along the path. Your goal is to nd a path that maximizes the prot. Write a dynamic programming algorithm to address the problem. Your algorithm must take a 2-d array representing the maze as input and outputs the maximum possible prot. Your algorithm need not output the path that gives the maximum possible prot. First write the recurrence relation to capture the maximum prot, explain the correctness of the recurrence relation. Design an algorithm based on the recurrence relation. State and derive the time bound of the algorithm. Your algorithm should not use recursion
Answer:
Following are the description of the given points:
Explanation:
A) The Multiple greedy approaches could exist, which could be to reach for the closest emergency diamond, and yet clearly we are going to miss some very essential routes in that case. So, it can make every argument quickly, and seek to demonstrate a reference case for that.
B) An approach to the evolutionary algorithm and its users are going to just have states M x N. But each state (i, j) indicates the absolute difference between the amount of the selected diamond and the amounts of the costs incurred.
DP(i, j) = DimondVal(i, j) + max ((DP(i, j-1)-2), (DP(i-1,j-1)-3))
DP(i, j) is a description of the state.
DimondVal(i, j) is the diamond value at (i j), 0 if there is no diamond available.
This states must calculate the states of M N and it involves continuous-time for each State to determine. Therefore the amount of time of such an algo is going to be O(MN).
What is the difference between requirements and controls in the security process? Give examples of each.
Answer:
Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.
Explanation:
Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.
Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.
Write code to create a list of numbers from 0 to 67 and assign that list to the variable nums. Do not hard code the list. Save & RunLoad HistoryShow CodeLens
Answer:
The program written in Python is as follows
nums = []
for i in range(0,68):
-->nums.append(i)
print(nums)
Explanation:
Please note that --> is used to denote indentation
The first line creates an empty list
nums = []
This line creates an iteration from 0 to 67, using iterating variable i
for i in range(0,68):
This line saves the current value of variable i into the empty list
nums.append(i)
At this point, the list has been completely filled with 0 to 67
This line prints the list
print(nums)
Write down the information for your system’s active network connection (most likely either Ethernet or Wi-Fi).
Question:
1. Open a command prompt window, type ipconfig/ all and press Enter.
2. Write down the information for your system’s active network connection(most likely either Ethernet or Wi-Fi).
* Physical address in paired hexadecimal form.
* Physical address expressed in binary form.
Answer:
00000000 11111111 00000011 10111110 10001100 11011010
Explanation:
(i)First, open a command prompt window by using the shortcut: Windows key + X then select command prompt in the list.
(ii)Now type ipconfig/ all and press Enter. This will return a few information
(a) To get the Physical address in paired hexadecimal form, copy any of the Physical Addresses shown. E.g
00-FF-03-BE-8C-DA
This is the hexadecimal form of the physical address.
(b) Now let's convert the physical address into its binary form as follows;
To convert to binary from hexadecimal, we can use the following table;
Hex | Decimal | Binary
0 | 0 | 0000
1 | 1 | 0001
2 | 2 | 0010
3 | 3 | 0011
4 | 4 | 0100
5 | 5 | 0101
6 | 6 | 0110
7 | 7 | 0111
8 | 8 | 1000
9 | 9 | 1001
A | 10 | 1010
B | 11 | 1011
C | 12 | 1100
D | 13 | 1101
E | 14 | 1110
F | 15 | 1111
Now, from the table;
0 = 0000
0 = 0000
F = 1111
F = 1111
0 = 0000
3 = 0011
B = 1011
E = 1110
8 = 1000
C = 1100
D = 1101
A = 1010
Put together, 00-FF-03-BE-8C-DA becomes;
00000000 11111111 00000011 10111110 10001100 11011010
PS: Please make sure there is a space between ipconfig/ and all
Write a program that create Employee class with fields id,name and sal and create Employee object and store data and display that data.
Answer:
Here is the C++ program for Employee class with fields id,name and sal.
#include <iostream> // to use input output functions
#include <string> //to manipulate and use strings
using namespace std; // to access objects like cin cout
class Employee { //class Employee
private:
/* the following data members are declared as private which means they can only be accessed by the functions within Employee class */
string name; //name field
int id; //id field
double sal; //salary field
public:
Employee(); // constructor that initializes an object when it is created
/* setName, setID and setSalary are the mutators which are the methods used to change data members. This means they set the values of a private fields i.e. name, id and sal */
void setName(string n) //mutator for name field
{ name = n; }
void setId(int i) //mutator for id field
{ id = i; }
void setSalary(double d) //mutator for sal field
{ sal = d; }
/* getName, getID and getSalary are the accessors which are the methods used to read data members. This means they get or access the values of a private fields i.e. name, id and sal */
string getName() //accessor for name field
{ return name; }
int getId() //accessor for id field
{ return id; }
double getSalary() //accessor for sal field
{ return sal; } };
Employee::Employee() { //default constructor where the fields are initialized
name = ""; // name field initialized
id = 0; // id field initialized to 0
sal = 0; } // sal field initialized to 0
void display(Employee);
// prototype of the method display() to display the data of Employee
int main() { //start of the main() function body
Employee emp; //creates an object emp of Employee class
/*set the name field to Abc Xyz which means set the value of Employee class name field to Abc Xyz through setName() method and object emp */
emp.setName("Abc Xyz");
/*set the id field to 1234 which means set the value of Employee class id field to 1234 through setId() method and object emp */
emp.setId(1234);
/*set the sal field to 1000 which means set the value of Employee class sal field to 1000 through setSalary() method and object emp */
emp.setSalary(1000);
display(emp); } //calls display() method to display the Employee data
void display(Employee e) { // this method displays the data in the Employee //class object passed as a parameter.
/*displays the name of the Employee . This name is read or accessed through accessor method getName() and object e of Employee class */
cout << "Name: " << e.getName() << endl;
/*displays the id of the Employee . This id is read or accessed by accessor method getId() and object e */
cout << "ID: " << e.getId() << endl;
/*displays the salary of the Employee . This sal field is read or accessed by accessor method getSalary() and object e */
cout << "Salary: " << e.getSalary() << endl; }
Explanation:
The program is well explained in the comments mentioned with each statement of the program.
The program has a class Employee which has private data members id, name and sal, a simple default constructor Employee(), mutatator methods setName, setId and setSalary to set the fields, acccessor method getName, getId and getSalary to get the fields values.
A function display( ) is used to display the Employee data i.e. name id and salary of Employee.
main() has an object emp of Employee class in order to use data fields and access functions defined in Employee class.
The output of the program is:
Name: Abc Xyz
ID: 1234
Salary: 1000
The program and its output are attached.
A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
1. True
2. False
Answer:
true
Explanation:
Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}
Answer:
double ComputeGasVolume(double pressure, double temperature, double moles){
double volume = moles*GAS_CONST*temperature/pressure;
return volume;
}
Explanation:
You may insert this function just before your main function.
Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles
Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.
24. Which of the following statements about Emergency Support Functions (ESFs) is correct?
O A. ESFs are not exclusively federal coordinating mechanism
O B. ESFs are only a state or local coordinating mechanism
O C. ESFs are exclusively a federal coordinating mechanism
O D. ESFs are exclusively a state coordinating mechanism
(ESFs) is correct: ESFs are not exclusively federal coordinating mechanism.
#Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #The first parameter represents how many apostrophes should #be in the string. The second parameter represents how many #quotation marks should be in the string. The third #parameter represents how many apostrophe-quotation mark #pairs should be in the string. # #For example, random_marks(3, 2, 3) would return this #string: #'''""'"'"'" # #Note that there are three apostrophes, then two quotation #marks, then three '" pairs. #Add your function here!
Answer:
def random_marks(apostrophe, quotation, apostrophe_quotation):
return "'"*apostrophe + "\""*quotation + "'\""*apostrophe_quotation
print(random_marks(3, 2, 3))
Explanation:
Create a function called random_marks that takes apostrophe, quotation, and apostrophe_quotation as parameters. Inside the function, return apostrophe sign times apostrophe plus quotation mark times quotation plus apostrophe sign quotation mark times apostrophe_quotation.
Note that plus sign (+) is used to concatenate strings. Also, if you multiply a string with a number, you get that number of strings ("#"*3 gives ###).
Then, call the function with given parameters and print
The main path of the Internet along which data travels the fastest is known as the Internet ________. Group of answer choices
Answer:
Internet backbone
Explanation:
The internet backbone is made up of multiple networks from multiple users. It is the central data route between interconnected computer networks and core routers of the Internet on the large scale. This backbone does not have a unique central control or policies, and is hosted by big government, research and academic institutes, commercial organisations etc. Although it is governed by the principle of settlement-free peering, in which providers privately negotiate interconnection agreements, moves have been made to ensure that no particular internet backbone provider grows too large as to dominate the backbone market.
Write a program that displays the values in the list numbers in ascendingorder sorted by the sum of their digits.
Answer:
Here is the Python program.
def DigitList(number):
return sum(map(int, str(number)))
list = [18, 23, 35, 43, 51]
ascendList = sorted(list, key = DigitList)
print(ascendList)
Explanation:
The method DigitList() takes value of numbers of the list as parameter. So this parameter is basically the element of the list. return sum(map(int, str(number))) statement in the DigitList() method consists of three methods i.e. str(), map() and sum(). First the str() method converts each element of the list to string. Then the map() function is used which converts every element of list to another list. That list will now contain digits as its elements. In short each number is converted to the string by str() and then the digit characters of each string number is mapped to integers. Now these digits are passed to sum() function which returns the sum. For example we have two numbers 12 and 31 in the list so each digit is 1 2 and 3 1 are added to get the sum 3 and 4. So now the list would have 3 4 as elements.
Now list = [18, 23, 35, 43, 51] is a list of 5 numbers. ascendList = sorted(list, key = DigitList) statement has a sorted() method which takes two arguments i.e. the above list and a key which is equal to the DigitList which means that the list is sorted out using key=DigitList. DigitList simply converts each number of list to a another list with its digits as elements and then returns the sum of the digits. Now using DigitList method as key the element of the list = [18, 23, 35, 43, 51] are sorted using sorted() method. print(ascendList) statement prints the resultant list with values in the list in ascending order sorted by the sum of their digits.
So for the above list [18, 23, 35, 43, 51] the sum of each number is 9 ,5, 8, 7, 6 and then list is sorted according to the sum values in ascending order. So 5 is the smallest, then comes 6, 7, 8 and 9. So 5 is the sum of the number 23, 6 is the sum of 51, 7 is the sum of 43, 8 is the sum of 35 and 9 is the sum of 18. So now after sorting these numbers according to their sum the output list is:
[23, 51, 43, 35, 18]
ICMP
(a) is required to solve the NAT traversal problem
(b) is used in Traceroute
(c) has a new version for IPv6
(d) is used by Ping
Answer:
(b) is used in Traceroute
(d) is used by Ping
Explanation:
ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;
i. Requested service is not available
ii. Host could not be reached
ICMP does not use ports. Rather it uses types and codes. Some of the most common types are echo request and echo reply.
Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as Time Exceeded) to trace a network route.
Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP echo request packets to the host and then waits for an ICMP echo reply from the host.
ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.
When preparing a photo for a magazine, a graphic designer would most likely need to use a program such as Microsoft Excel to keep track of magazine sales. Microsoft Word to write an article about the photo. Adobe Photoshop to manipulate the photo. Autodesk Maya to create 3-D images that match the photo.
Answer:
Adobe Photoshop To Manipulate The Photo.
Explanation:
BLACKPINKS new album is amazing OMG I LOVE Lovesick Girls!!!
A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.) A. LCD power inverter B. AC adapter C. Battery D. Processor E. VGA card F. Motherboard G. Backlit keyboard H. Wireless antenna
Answer:
A. LCD power inverter
B. AC adapter
C. Battery
True or False: It is okay to just paste the URLs of the items you used for references at the end of a paper. Select one: True False
It is not okay to just paste the URLs of the items you used for references at the end of a paper therefore the answer is False
For better understanding, lets explain why the answer is false
When citing a reference it not OK to cite URLs. when you are citing onlh the URL is wrong because theURL could change at any time and the fact remain that it is not everyone who reads your paper can do it electronically or has access to the internet., so the url is not the first step to take. The right thing to do is to give the name of the paper, the author(s), the Journal it was published in and the year it was published.
From the above, we can therefore say that the answer is It is not okay to just paste the URLs of the items you used for references at the end of a paper therefore the answer is False, is correct.
Learn more about referencing from:
https://brainly.com/question/13003724
C++ 3.4.4: If-else statement: Print senior citizen. Write an if-else statement that checks patronAge. If 55 or greater, print "Senior citizen", otherwise print "Not senior citizen" (without quotes). End with newline.
Answer:
#include <iostream>
using namespace std;
int main()
{
int patronAge = 71;
if(patronAge >=55)
cout<<"Senior citizen"<<endl;
else
cout<<"Not senior citizen"<<endl;
return 0;
}
Explanation:
Initialize the patronAge age, in this case set it to 71
Check the patronAge. If it is greater than or equal to print "Senior citizen". Otherwise, print "Not senior citizen". Use "endl" at the end of each print statement to have new lines.