Answer:
bakakkallalalnabzjs d bannn my account pls
A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a:
Answer:
True. A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a: Direct-action virus.
Explanation:
A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.
What is Direct-action virus?A direct action computer virus is known to be a virus class that is said to be self-multiplying malware that is known to be attached to any executable file.
Therefore, Note that A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.
Learn more about virus from
https://brainly.com/question/26128220
#SPJ2
what are the process of boots up a computer?
Answer:
a boat causes a computer start cutting cs and max contain built in instructions in a rom or flash memory chip that are automatically excited on started up these instructions search for the operating system load it and pass control to itwhich data type uses %i as a format specifier
Answer:
A decimal integer
Explanation:
Hope this helps!
They need network security skills to know how to perform tasks such as:
A. Testing software before launching.
B. maintaining databases.
C. investigating virus attacks
Answer:
Your answer should be C
because in they will protect the data base from virus.
Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. calcPyramidVolume() calls the given calcBaseArea() method in the calculation.
Answer:
The method in C++ is as follows:
double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){
double baseArea = calcBaseArea(baseLength, baseWidth);
double volume = baseArea * pyramidHeight;
return volume;
}
Explanation:
This defines the calcPyramidVolume method
double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){
This calls the calcBaseArea method to calculate the base area of the pyramid
double baseArea = calcBaseArea(baseLength, baseWidth);
This calculates the volume
double volume = baseArea * pyramidHeight;
This returns the volume
return volume;
}
See attachment for complete program that include all methods that is required for the program to function.
17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursion; a non-recursive function, or using the built-in function math.pow(), would be more common.
Answer:
The recursion function is as follows:
def raise_to_power(num, power):
if power == 0:
return 1
elif power == 1:
return num
else:
return (num*raise_to_power(num, power-1))
Explanation:
This defines the function
def raise_to_power(num, power):
If power is 0, this returns 1
if power == 0:
return 1
If power is 1, this returns num
elif power == 1:
return num
If otherwise, it calculates the power recursively
else:
return (num*raise_to_power(num, power-1))
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service
Answer:
it will make the wireless network faster and it is a performance network i am pretty sure.
Explanation:
You need to build out the networking for your small local business. You have purchased a core switch and will pull home runs to each of the devices. What type of cabling will you use to connect your network
Answer: Use an Ethernet cable
Explanation:
Since the person will need to build out the networking for a small local business and wants to pull home runs to each of the devices after buying a core switch, the type of cabling that will be used to connect the network is an Ethernet cable.
An Ethernet cable is known to be the commonest network cable that's used on a wired network. The cable is required to connect the wired devices together to local network which is then vital for file sharing and Internet access.
Suppose a computer using set associative cache has 221 bytes of main memory, and a cache of 64 blocks, where each cache block contains 4 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, set, and offset fields
Answer:
Tag = 1
Index = 5
Block offset = 2
Explanation:
From the given information:
The main memory bits(MM) = 221
number of block in the cache = 64 blocks
Block size = 4B
Recall that;
MM = log (memory size)
Thus;
main memory bits = log (221)
= 8 bits
Since this is a 2-way assoicative set;
the number of set in each cache = block size/2
64/2 = 32
Now, the index bit = log( no of set in each cache)
= log(32)
= 5 bits
Also since block size = 4B;
the block offset = log(4) = 2 bits
As such, tag = main memory bits - (index bit + block offset)
tag = 8 -(5 + 2)
tag = 8 -7
tag = 1
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print
b. random
c. else
d. while
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
Answer:d. while ✓
Explanation:
The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.
[tex] \\ \\ [/tex]
Hope it helps
-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀
Amy’s new summer job at the pool will put $9 per hour. Which term describes this type of hourly income?
A. Salary
B. Take-home pay
C. Wage
D. All of the above
Answer:
d
Explanation:
Question # 4
Fill in the Blank
Complete the following sentence.
The first email was sent in
.
Answer:
1971
Explanation:
If there is more detail needed i'm sorry
Answer:
1971
Explanation:
#Nova
Have a great day!
:)
What is a
a program
Answer:
-a collection of related measures or activities aimed at achieving a specific long-term goal.
-a set of pre-programmed software instructions for controlling the operation of a computer or other machine
-provide (a computer or other machine) with pre-programmed instructions for completing a task automatically
-Organize according to a schedule or plan.
Explanation:
Answer:
A program is an set of instructions given by a computer to perform particular task
Blank Are input instructions you give to a computer
Explanation:
A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.
Identify the correct statement regarding HTTP. a. Basic HTTP is a stateful protocol. b. In HTTP tunneling, some protocols travel inside HTTP traffic. c. It has been replaced with IPv6. d. It was developed by Al Gore.
Answer:
b. In HTTP tunneling, some protocols travel inside HTTP traffic.
Explanation:
a. HTTP is not a stateful protocol. It is a stateless protocol since the receiver is not allowed to store the state from previous requests. In other words, there is no need to keep track of the session information or status. Other examples of stateless protocol are UDP (User Datagram Protocol) and DNS (Domain Name System).
b. In HTTP tunneling, some protocols travel inside HTTP traffic. HTTP tunneling allows two devices to be connected together using network link with or without restrictions such as firewalls and access control lists. One way of implementing this HTTP tunneling is by using the regular HTTP methods such as POST, GET, PUT and DELETE.
In other words, HTTP tunneling allows certain protocols travel inside HTTP traffic.
c. HTTP has not been replaced with IPV6. They are different protocols performing different functions. IPV6 is an internet protocol addressing scheme invented to replace its predecessor IPV4.
d. HTTP was not developed by AI Gore. It was developed by Tim Berners-Lee and his team.
Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions?
1. MOV CX, [BX+DI]
2. MOV AX, ARRAY[CX]
3. MOV BX, [CX+DI+6]
Answer:
Demonstrate the register addressing mode for the following instructions. Also what addressing mode belongs to these instructions?
1. MOV CX, [BX+DI]
2. MOV AX, ARRAY[CX]
3. MOV BX, [CX+DI+6]
A town decides to publicize data it has collected about electricity usage around the city. The data is freely available for all to use and analyze in the hopes that it is possible to identify more efficient energy usage strategies. Which of the following does this situation best demonstrate?
a. Citizen science.b. Crowdfunding.c. Open data.d. Machine Learning.
Write an algorithm to sum to values
Answer:
There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:
Let a,b be two numbers.
c=a+b;
print(c);
But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:
Let a be the variable where the input numbers are stored.
while(f==1)
{
printf(“Enter number”);
scanf(“Take number into the variable a”);
sum=sum+a;
printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);
scanf(“Take the input into the variable f”);
}
print(Sum)
Explanation:
hi there answer is given mar me as brainliest
Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should her friend give
Answer:
"The game shouldn't need your SSN to be playable; don't enter it."
Explanation:
The game shouldn't need your SSN to be playable; don't enter it."
What is SSN?A numerical identification code known as a Social Security number (SSN) is given to residents and citizens of the United States in order to track income and calculate benefits.
As a component of The New Deal, the SSN was established in 1936 to offer benefits for retirement and disability. The SSN was first created to track earnings and offer benefits. Today, it is also utilized for other things including tracking credit reports and identifying people for tax purposes.
In the US, people are required to provide their SSN in order to open bank accounts, apply for government benefits, get credit, make large purchases, and more.
Therefore, The game shouldn't need your SSN to be playable; don't enter it."
To learn more about SSN, refer to the link:
https://brainly.com/question/2040269?
#SPJ5
Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Explain why these tips are useful.
Answer:
1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons
2. Do not share your passwords because people can hack into your things
3. Don't make guessable passwords such as Cookies, ILovePizza, Money
A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.
Scenario: A robot is sitting in a chair with its arms facing down. Write an algorithm, using pseudocode, to make the robot:
1. stand up2. walk forward until it senses a wall3. turn around4. walk back to the chair5. sit down in its original starting positionFinally, output the total number of steps taken.Commands--------In addition to our standard pseudocode commands, you must also use the following robot control commands:sitstandstep (one step forward)raise arms (parallel to floor)lower arms (pointing to floor)sense (only if arms are raised)turn (90 degrees right)Immediately after issuing a sense command, you can check whether the robot is at the wall as follows:if at wallor alternativelyif not at wallAssumptions-----------You must assume the following facts:The robot's initial sitting position is directly facing the target wall.There are no obstacles between the robot and the wall.The wall is 1 or more exact steps from the chair.The wall is sensed when it is less than 1 step from the robot's arms.The length of the robot's arms are slightly less than the length of 1 step.Your solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps takenYour solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps taken
Solution :
[tex]\text{Algorithm to}[/tex] stand [tex]$\etxt{up:}$[/tex]
step [tex]1[/tex]: [tex]$\text{stand}$[/tex]
step 2: [tex]\text{raise arms}[/tex]
[tex]\text{Algorithm to}[/tex] walk [tex]$\text{until it senses}$[/tex] a wall:
step [tex]1[/tex]: [tex]$\text{stand}$[/tex]
step 2: [tex]\text{raise arms}[/tex]
step 3: [tex]$\text{wallSensed}$[/tex]=false
step 4: [tex]$\text{numberOfSteps}$[/tex] = 0
step 5: if([tex]$\text{wallSensed}$[/tex]==true) then
[tex]\text{lower arms}[/tex]
step
else
if(sense)
[tex]$\text{wallSensed}$[/tex]=true;
else
step
[tex]$\text{numberOfSteps}$[/tex]++;
step 6: display [tex]$\text{numberOfSteps}$[/tex] to reach the wall
[tex]\text{Algorithm to}[/tex] turn around:
Step [tex]1[/tex]: if([tex]$\text{wallSensed}$[/tex]==true) then
turn
[tex]\text{raise arms}[/tex]
turn
[tex]\text{Algorithm to}[/tex] walk back[tex]$\text{ to the chair}$[/tex]:
Step [tex]1[/tex]: [tex]$\text{turn around}$[/tex]
Step 2: for i=[tex]1[/tex] to [tex]$\text{numberOfSteps}$[/tex] do
step
[tex]\text{Algorithm to}[/tex] sit back down:
Step [tex]1[/tex]: sit
Step 2: Lower arms
Justin Kace is promoting the metric system and wants people to be able to convert miles to kilometers and kilometers to miles. Develop a program that asks the user for a number of miles and converts miles to kilometers (multiplying miles by 1.609), and then asks for a number of kilometers and converts kilometers to miles (multiplying kilometers by 0.6214).
Solution :
//Program heading
Display "Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program"
//Get [tex]$\text{Miles}$[/tex]
Display "Enter the [tex]$\text{miles}$[/tex]: "
Input [tex]$\text{miles}$[/tex]
//Convert [tex]$\text{miles}$[/tex] to kilometers and display result
converted_km =[tex]$\text{miles}$[/tex] x 1.609
Display "Converted kilometers = " + converted_km
//Get Kilometers
Display "Enter the kilometers: "
Input km
//Convert kilometers to [tex]$\text{miles}$[/tex] and display result
converted_[tex]$\text{miles}$[/tex] = km x 0.6214
Display "Converted [tex]$\text{miles}$[/tex] = " + converted_[tex]$\text{miles}$[/tex]
//Thank the user for using this program
Display "Thank you for using this program. Good-bye!"
Stop
Sample Output:
Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program
Enter the [tex]$\text{miles}$[/tex]: 10
Converted kilometers = 16.09
Enter the kilometers: 10
Converted [tex]$\text{miles}$[/tex] = 6.214
Thank you for using this program. Good-bye!
What can be viewed in the Tasks folder? Check all that apply
Answer: task details; appointments; to do list
Explanation:
Task folders, simply allows an individual organize their tasks in a logical manner. It performs an identical function just like a file directory.
Folders can be created in the root folder. Once can also create them as subfolder in the other files. The task details, appointments and the to do list can be viewed in the task folder.
In this code, there's a Person class that has an attribute name, which gets set when constructing the object. Fill in the blanks so that 1) when an instance of the class is created, the attribute gets set correctly, and 2) when the greeting() method is called, the greeting states the assigned name. mtino 1-class Person: 2 - def __init__(self, name): self.name = def greeting(self): # Should return "hi, my name is " followed by the name of the Person. return Run 8 # Create a new instance with a name of your choice 9 some_person = 10 # Call the greeting method 11 print (some_person. ) 12 Press ESC to exit the code block at any time
Answer:
Explanation:
The following code is written in Python. It creates a Person class and creates the constructor which takes in the name of the person for that instance, as well as a greeting method which outputs the desired "Hi, my name is" string with the name of that person. The output of the code can be seen in the attached picture below. I have created a person object called John and called the greeting method so that you can see the output.
class Person:
name = ''
def __init__(self, name):
self.name = name
def greeting(self):
print('Hi, my name is ' + self.name)
The code containing the Person class definition and the greeting is found in the attached image
The Person class has a single instance field name that stores the name of the person.
The instance initializer, __init__, accepts an argument, name, and saves the value in the name attribute of the Person class.
The Person class also has a greeting method that is called by the main code segment. The main code segment creates a Person object, and calls it in the print function to display the greeting with the person's name.
Learn more about classes in Python here https://brainly.com/question/21065208
Describe Technology class using at least 3 adjectives
Answer:
clearly alien
typically inept
deadly modern
Explanation:
A programmer writes 500 lines of computer code in 17 days. Must there have been at least 1 day when the programmer wrote 30 or more lines of code
Answer:
The answer is No
Explanation:
Given data
Total Lines of code= 500
Number of days= 17 days
Number of codes written per day= 500/17
Number of codes written per day= 29.4117
If we multiply 29.4117 by 17
=499.9989
=500 approx
Hence there was never a day when the programmer wrote 30 or more lines
Which of the following describes an iteration in a computer program?
Answer:
a set of instructions that can be run multiple times throughout a program
Explanation:
Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Risk Management and Information Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Answer:
Following are the response to the given question:
Explanation:
They are already talking business to business collects in which we are calling the client for collecting whenever the products which we have purchased are overdue and overdue inside 30 days. About business criteria, we should ensure no other websites mostly on agent acting open up so that nobody can misuse it; we also have to know the correct revising and trying to run off all systems and therefore all apps are organ systems because then the critical business work time has would not get out of the way. This is about the security of information. The agents also are adequately taught in IT policy according to the demand of the company.
They soon come towards the area of risk, experience, and skill. All agents ought to have proper refresh sessions to fulfill GAP knowledge but also improve their abilities for 100 percent cent accuracy on TAT on every appeal. Your Agency's response.
There ought to be a right party connect. We must keep up with 80-20 RULE which means that we can easily acquire the bigger amount earlier than somehow investing whatever money for future production if we concentrate on TOP 20 Overdue Current Passengers.
When we add up the current sum owing as well as the amount due by both the end of the month, so we will subtract all promises that were made by the end of each month. You can readily deduce how long and how much money will be received by the end of each month, and how long this will be due by the end of each month.
The total danger which we imagine to be cash flow issues is when a company is close to collapse or even has a money problem, they are few risks that any company has.
To solve this RISK to money flow clients, we have to provide them a payment plan so that we could at the very least invest some cash in additional production. Besides offering customers a pay system, you truly cannot help.
Another key potential risk is the unrequired quantity on the accounts of the consumer. Underneath the U.S. government, it'll be a direct responsibility of the government if there is an unclear and unapplied amount which has lied to an account for even more than 4 years.
Therefore it does have to do about risk, skills, knowledge the safety of information. All above theory helps explain everything which enables the execution of operations as well as, as project manager, we have to track input and output information. we need to charge, past due, credits, debits, PD percent every week and month, seeing the company's pattern, and also transform policies as to how the trend or even the forecast can enhance.
g Boolean Algebraic properties _____. a. are used to make boolean expressions more complicated b. are used to convert a Boolean equation to a circuit c. can lead to a simpler expression and thus a simpler circuit d. can be used with integer numbers
Answer:
c. can lead to a simpler expression and thus a simpler circuit.
Explanation:
Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.
Also, Boolean logic allow users to combine keywords with Boolean operators (quotes, AND, OR, near/n) to give a more personalized and relevant search results.
There are five (5) main Boolean Algebraic properties and these includes;
I. Commutative property: it applies to both multiplication and addition.
For addition; A + B = B + AFor multiplication; A.B = B.AII. Associative property: it applies to both multiplication and addition.
For addition; A + (B + C) = (A + B) + CFor multiplication; A(BC) = (AB)CIII. Distributive property: it is formed using the product of a sum.
A(B + C) = AB + ACIV. Complement property: it involves a variable and its complement.
For addition: A + A' = 1For multiplication; A.A' = 0V. Identity property:
For addition; A + 0 = AFor multiplication; A.1 = AIn digital electronics, Boolean expressions are used to represent circuits which comprises of Boolean operations and as such simplifying any logic expression without changing or altering any of it's functionalities and properties based on given operations or variables.
Hence, Boolean Algebraic properties can lead to a simpler expression and thus a simpler circuit.