Do you guys answer questions about cyber security?

Answers

Answer 1

Answer:

yes

Explanation:

let's hear your question first.


Related Questions

how has education technology evolved in schools over the past years​

Answers

More sophisticated software given to students

how do you create 2 dimensional array with c++?

Answers

2 dimensional arrays in C++ are arrays that have 2 dimensions i.e. rows and columns

How to create the array?

To create a 2-dimensional array in C++, you make use of the following syntax

data_type array_name[rows][columns];

Assume the following parameters:

The data type of the array is integerThe array name is StudentsThe array has 10 rows and 20 columns.

The declaration of an array with the above properties would be:

int Students[10][20];

Read more about arrays at:

https://brainly.com/question/22364342

You have been asked to write a program for the Duckie's Obstacle Race. The program calculates the total number of racers, the fastest race time, the slowest race time, and the overall average race time.

Ask user to enter the maximum number of racers allowed for the race
Use repetition structure (loop) to ask the user to enter race times (in minutes)
Exit the loop if the user specifies there are no more times to enter (sentinel value) or if the maximum number of racers allowed has been reached
At a minimum, within the loop, you should keep track of how many race times are entered, the fastest race time and the slowest race time.
After the loop is exited, display how many race times were entered, the fastest race time, the slowest race time and the overall average race time.
Format your output appropriately
Be sure to include all appropriate documentation at the start of the program and within the program body

Answers

The program illustrates the use of loops and conditional statements

Conditional statements are used to make decisionsLoops are used for operations that must be repeated until a certain condition is met.

The race program

The program written in Python, where comments are used to explain each action is as follows:

#This initializes the variables to 0

totalRaceTime = 0; minRaceTime = 0; maxRaceTime = 0; countTimes = 0

#This gets input for the number of race times

numTimes = int(input("Number of times: "))

#This opens a sentinel controlled loop

while countTimes < numTimes:

   #This gets the race time

   raceTime = int(input("Race time: "))

   if countTimes == 0:

       minRaceTime = raceTime

       maxRaceTime = raceTime

   #This determines the highest race time

   if raceTime > maxRaceTime:

       maxRaceTime = raceTime

   #This determines the leest race time

   if raceTime < minRaceTime:

       minRaceTime = raceTime

   #This determines the total race time

   totalRaceTime+=raceTime

   countTimes+=1

#This prints the highest race time

print("Maximum: ",maxRaceTime)

#This prints the least race time

print("Minimum: ",minRaceTime)

#This prints the average race time

print("Average: ",round(totalRaceTime/numTimes,2))

Read more about while loops and conditional statements at:

https://brainly.com/question/24833629

How might the project team recommending an ERP design strategy justify its recommendation as compared with other types of design strategies?

Answers

The project team recommending an ERP design strategy by stating that in all, most of the attributes of a specific plan will bring about a good, quick and full return on that investment.

The project team can legitimize their ERP strategy by inputting the main preferred viewpoint to reengineering the proposed business procedure.

What is a ERP strategy?

The term  ERP strategy is a term that connotes the use of a technology strategy that often helps to integrates a combination of business functions.

The functions includes finance, HR and purchasing and linked  with operational areas, such as manufacturing  via a tight rope from operational business works to financial records.

Learn more about design strategy  from

https://brainly.com/question/5971614

please answer this question​

Answers

The salary calculator program is an illustration of a sequential program

What are sequential programs?

Sequential programs are programs that do not require loops, iterations or conditional statements

How to write the main program

The program written in Python, where comments are used to explain each action is as follows:

#This initializes the base number of hours

baseHours = 40

#This initializes the base payment

basePay = 600

#This initializes the overtime payment

overtimePay = 300

#This initializes the total hours worked

hoursWorked = 45

#This calculates the total payment

totalPay = baseHours * basePay + (hoursWorked - baseHours) * overtimePay

#This prints the total payment

print(totalPay)

Read more about sequential programs at:

https://brainly.com/question/26642771

My computer has been running slow for a few days I’m sure it’s a virus

Answers

Answer:

You try to clean it, dipping it in water 2-3 times will be fine.

Explanation:

ha ha I'm indian boy F...

Answer:

Don't put some water on it it will be break just clean it and tell your parents to fix it if you have a money you can fix it

The IT staff at a hospital shares genetic information about specific patients with a life insurance company. Which ethical standard was violated?

Answers

The ethical standard which was violated by the IT staff at a hospital is: confidentiality.

What is PHI?

PHI is an acronym for protected health information and it can be defined as any form of health information for a patient that mustn't be disclosed without the patient's knowledge, approval (consent) or used for the payment of health care insurance for employees.

This ultimately implies that, it is an ethical standard for all health workers to keep and protect protected health information under normal working conditions because they are confidential in nature with respect to Health Insurance Portability and Accountability Act (HIPAA).

Read more on PHI here: https://brainly.com/question/24439144

[ASAP!] Which of these can be a problem for people with accessibility issues? Select 4 options.

1. using all uppercase text
2. using left-aligned text
3. putting two spaces after a period
4. flashing images
5. using an image instead of text​

Answers

The answers are:

- Using all uppercase text

- Putting two spaces after a period

- Flashing images

- Using an image instead of text

Proof:

Using full capital text, inserting two spaces after a period, flashing pictures, and using an image in place of text are all accessibility issues. Options A, C, D and E are correct.

What are the accessibility issues?

When providing access to the product or service, the following accessibility concerns must be taken into account:

Visual problems including color blindness or poor vision.Similar to photosensitive epilepsy, seizures.Mobility or motor problems, such as those of wheelchair users.

Making information, activities, and/or surroundings understandable, relevant, and useable for as many individuals as feasible is the practice of accessibility. Architectural design is a typical instance of accessibility that we have all probably seen.

Accessibility concerns include utilizing all capital letters, adding two spaces after a period, flashing images, and replacing text with an image.

Therefore, option A, C, D and E are correct.

Learn more about the accessibility issues, refer to:

https://brainly.com/question/17351493

#SPJ2

Is hacking always wrong? Creating viruses?

Answers

Answer:

yes

Explanation:

Answer:

Not every “hack” is bad, and not every hacker is a criminal. In fact, many hackers secure websites and companies from malicious actors.

creating viruses is done by negative intention hackers

This is an example of what type of formula? =AVERAGE(D1:D17) A. ADDITION
B.SUBTRACTION C.RANGE D.AVERAGE

Answers

Answer:

d average

Explanation:

average as it already shows it says average

Write the pseudocode for the following scenario. The final exam marks for 10 students are 65, 45, 78, 65, 89, 65, 79, 67, 75, and 63. The marks are stored in an array. Find: • The student with the highest mark. • The student with the lowest mark. • The total marks for all the students. • The overall average.

Answers

The pseudocode of the program serves as a prototype of the program

How to determine the pseudocode?

The pseudocode of the program is as follows:

StartDeclare array MARKSInput MARKS[0] to MARKS[9]Sort MARKSPrint MARKS[9] ----- this prints the highest markPrint MARKS[0] ----- this prints the least markFOR I = 0 TO 9; ADD MARK[I] TO TOTALPrint TOTALPrint TOTAL/10Stop

The above pseudocode gets input for the array; then sorts the array before performing the required operations

Read more about pseudocodes at:

https://brainly.com/question/24735155

RAM is like a computer’s ______________, while a hard drive is like a computer’s ______________

Answers

Explanation:

RAM is what the computer and the applications run on and hard drive is the type of memory all your files and apps are located on

When purchasing a security program, you must make sure that _____. Select 2 options.

it can be implemented quickly

it can be easily adopted

it hinders operational efficiency

the employees are not involved

it is complex and complicated

Answers

Answer:

1 ans 3

Explanation:

Answer:

- it can be implemented quickly

- it can be easily adopted

Explanation:

When selecting a security program to purchase, you should want to ensure its efficiency. Correct on Edge.

I hope this helped!

Good luck <3

A new robot is created to explore volcanoes on other planets. Which robot is
most likely to have been referenced in the design of the new robot?
A. Dante
B. Roomba
C. ASIMO
D. Sophia

Answers

Answer:

A

Explanation: Dante II is a unique walking robot that provides important insight into high-mobility robotic locomotion and remote robotic exploration. Dante's uniqueness stems from its combined legged and rappelling mobility system, its scanning laser rangefinder and its multi-level control scheme.

Mr. Hicks is setting up a wiiſed office network for 10 computers. He needs to use a network topology
devices to be added later as required. Which topology should he use?
A. Star
B.tree
C.mesh
D.ring

Answers

Answer:

C. Mesh

Explanation:

Each device will be connected to the other 9 devices, making it the best topology to use.

Hope this helps!

Answer:

STAR

Explanation:

Similarities in off-site and On-site

Answers

Answer:

Off prevents the page from finding your easy search terms; basically what you search for, while On page will help you improve the quality of your newly designed web page.

▬▬▬Casual Terms▬▬▬

Off page means that you are not actively viewing a page; unlike On, it would mean the exact opposite.

▬▬▬Conclusion▬▬▬

I Hope you have a great day!

Answer:

onsite is on or at a site while offsite is away from a mail location in a place not owned by a particular organization.

Use Advanced Filtering to restrict the data to only display full-time employees with at least one dependent. Place the results in cell A37. Use the criteria in the range H24:M25 to complete the function.

Answers

Answer:

Click cell H10, and enter an AVERAGEIFS function to determine the average salary of full-time employees with at least one dependent. Format the results in Accounting Number Format. Step 1: Open the excel and go to Insurance worksheet

what is the answer to 7.4.4: Length of User's Name codehs

Answers

The program that ask the user to type there first name and then print out how many letters that is in there name is as follows:

x = input("what is your first name: ")

y = len(x)

print(f"There are {y} letters in your name")

Code explanation;

The code is written in python.

Firstly, we store the users name in the variable x.Then, we find the length of the users inputted name and store it in a variable y.Finally, we print the length of the users name using the print function.

learn more on python here: https://brainly.com/question/26738945

An IT infrastructure manager is reviewing his company's computer assets, particularly the mean time to failure (MTTF) of the PC and server hard drives. The manufacturer of the hard drives typically used in the company states that the MTTF is approximately 11 years. Because servers and some high-priority workstations must operate continuously except for brief periods of maintenance, how many hours, on average, can these hard drives be expected to operate before failure

Answers

The numbers of  hours, on average, can these hard drives be expected to operate before failure is 24 hours a day, also seven days a week and 365 days a year.

How many hours can Hard drive last?

The total life-time of a hard disk is said to be 5 years" that is about 43,800 hours of been in constant use.

Note that a key  reliability-linked criterion for the selection of storage components is based on its operating duty that is the numbers of  many hours in a day a drive can be active for.

A lot of HDDs used by Enterprise-class applications are said to be optimized for constant use that is 24 hours a day, seven days a week, and 365 days a year.

Note that a Managed Service Provider (MSP) have to plan for a failure in every 1000 hours that is about 42 days.

Learn more about hard drives from

https://brainly.com/question/1558359

What app or divice has a filter that you can have blackvalk in real life

Answers

Answer:

look in app store explanation:

look in-app store

Why do you want to work for Rev?

Answers

People do have reasons why they want to work for a particular company. It may be due to what they company stands for, what they make or about your dream.

I can therefore say that I want to work for Rev because they are revolutionizing the industry and I want to be part of the change process.

How do you answer why do you want to work?

Note that when looking for a job, job experience do matter. When ask the reason for looking for this job.

One can answer that they have the experience or the needed expertise and skills required for this job as they want to be aligned with what the company stands for.

Learn more about work  from

https://brainly.com/question/25573309

You have been asked to investigate a web server for possible intrusion. You identify a script with the following code. What language is the code in and does it seem likely to be malicious? import os, sockets, syslog def r_conn(ip) s=socket.socket(socket.AF_INET,socket.SOCK_DGRAM) s.connect(("logging.trusted.foo",514))

Answers

The code below is written in JavaScript and does not seem malicious.

What is a Malicious Code?

A Malicious code is one that is not designed for any productive end but to cause disruptions in the computer with the objective of

harming the workstation; or destroying the data stored therein.

There are numerous classifications of malicious codes and they can be identified and removed by an application called an Anti-Virus or malicious app remover.

Learn more about JavaScript at:
https://brainly.com/question/16698901

What exactly is github?

Answers

GitHub is a code hosting platform for version control and collaboration.

It lets you and others work together on projects from anywhere.

Explanation:

Hope it helps you!!

13. In cell B16, use the SUMIF function and structured references to display the total wins for teams in the Youth league.

Answers

Using the SUMIF function and structured references to display the total wins for teams in the Youth league is gotten as; 65

How to make use of the SUMIF Function?

The SUMIF function in excel combines a condition and a sum of the values which meets the stated condition. That is; SUMIF(row_range, condition)

From the attached image we can see the number of times youth won the league in column D. Also, we can see the total number of youth wins in column H under Total.

Thus, using SUMIF function for the total number of wins, we have;

B6 = SUMIF(SwimTeams[League], "youth",H3:H12

B6 = 21 + 16 + 12 + 9 + 7

B6 = 65

Read more about the SUMIF Function at; https://brainly.com/question/19595606

In C, What is the #line used for?

Answers

The #line is mainly used to reset the line number and also the filename in the code.

What does a line in C mean?

The c in code is written in lower-case. The c that has a line over it means "with".

The C preprocessor is known to be macro processor that is often used often by the C compiler to change one's program before actual compilation. This   #line means that one can do any reset any line of code to an arbitrary line number or a filename that is said to have been stated by the user.

Learn more about code from

https://brainly.com/question/25605883

2. Choose four organizations in a particular industry and compare their strategies and analyze how the information system could be used for each organization to gain competitive advantage. 9.1 The first organization should follow the competitive strategy of lower cost across the industry,

Answers

The four organizations in a particular industry (Food industry) are:

Cargill Archer Daniels Midland (ADM) Company Nestle Sysco Corporation

What is Low-cost strategy?

The food industry is one that has been dominated by a lot of big companies. It is competitive in nature and it is advisable to have a Low-cost strategy.

This Low-cost strategy is one that helps the firm to sell its product or its service using a lower price when compared to its competitors as this will help them to have or win a competitive edge in the industry.

Learn more about Food industry from

https://brainly.com/question/11900425

How do I write this program?

def goingUp(n): # prints the stars from the row with 1 until a row with n

def goingDown(n): # prints the stars from the row with n to the row with 1

If the user enters a negative value, your program should print nothing.

If the user enters 0, your program should print nothing.

If the user enters 1, your program should print a single line with one star.

If the user enters any number greater than 1, your program should print according to the pattern shown above.

The prompt to the user must be Please enter a value

Answers

Answer:

Sorry but I don't know this

Networking essentials

Answers

Answer:

Gain the essential knowledge and skills required to configure, troubleshoot, manage and protect a data network.

Explanation:

help meeeeeeeeeeeeeeeee

Answers

Answer:

The advantages include much access to photos, digital functions like games and contacts with friends, videos, and you can search questions to anything you like. Disadvantages include things like too much screen time affecting sleep, health, and other physical problems. There is also exposure to explicit content and hatred from strangers.

There are hundreds of editing software for you to try, and many are free to use and are even compatible offline. They can make content related to or look like something in a movie or can be used to make things look nicer and cooler.

Examples of ________, which is hosted on a web site, include e-mail, word processing, tax preparation, and game programs.

Answers

Answer:Web Application

Explanation:Web hosting is more or less like having an ordinary computer in the cloud in order share information and resources with others world wide.One cannot make effective use of a computer without software applications . Similarly hosting just normal html pages and documents on a server cannot help increase productivity,hence the creation of cloud computer applications also known as "Web Apps (Web Applications)" to aid boost productivity and information dissemination via quality task automations.

Other Questions
What is spin? Giveme an example. Demarcus has to wrap a gift for his friend's birthday party. The gift is in a rectangularbox with the dimensions shown below. He's trying to figure out how much gift wraphe needs to cover the entire box. Should he calculate the total surface area or thelateral surface area? Pick the right measurement and then calculate it for him.In your answer, specify whether he should use total surface area or lateral surfacearea. Calculate the one you choose, give that measurement of the box, and thenexplain how you calculated it.13 in20 in8 in After Sarah's family moved to Ireland, she and Tara were separated by the Atlantica prolific written correspondence sustained their friendship.Ocean butOcean; butOcean, but table:0 162 234 336 488 6910 99is this linear or exponential? indicate the formula for the following conditions. P(n,r) = ? What is the number halfway between 8516 and 8586? 9. Graph the following data on the graph, then use the graph to determine the half life of this isotope. Point q is located on the coordinate grid at (-9.73,-3.32) in which quadrant is point q called It has taken you 10 minutes to go 75 kilometers, How fast are you moving?(And please do not respond with suspicious links :) help me out i will give brainlist by how much is 5547g greater than 8837 mg Which point is on the graph of the inverse function g1(x)?(3, 0)(0, 3)(2, 3)(3, 4) Find the perimeter and area of the shaded figure below. Potencia de exponente 1:(Si no sabes no Respondas) To get to work Sam jogs 3 kilometers to the train, then rides the remaining 5 kilometers. If the train goes 40 km per hour faster than Sams constant rate of jogging and the entire trip takes 30 minutes, how fast does Sam jog? Frozen water is less dense than liquid water, allowing lake organisms to survive winter. true false What motivated Japan to begin creating an empire in the late 19th century? A. the desire to encourage foreigners to immigrate to Japan B. the need for raw materials to support its growing industries C. the wish to spread the Japanese language throughout the world D. the lack of markets for its agricultural products A car of mass 1200kg moving 90km/hr is brought to rest over a distance of 20m. calculate breaking force. Who was involved in the martin Luther king speech? Freud believes that defense mechanisms are reactions people have to protect themselves from uncomfortable feelings. The article ""High on Anxiety"" suggests that some people want to feel __________ instead of calm because thats the feeling theyre used to operating under. A. Anxious B. Happy C. Excited D. Angry.