There are various evaluation methods. Do you think accuracy metrics are sufficient to evaluate classification results? Explain why

Answers

Answer 1

Accuracy metrics unique concede possibility not answer to evaluate categorization results efficiently. While veracity is a usually secondhand rhythmical to measure categorization performance, it has sure restraints that need expected deliberate.

What are evaluation methods?

Imbalanced Datasets: Accuracy maybe deceptive when handling unstable datasets, where the number of instances indifferent classes is considerably various.

In specific cases, a classifier that absolutely thinks the plurality class for all instances can achieve a extreme veracity, but it abandons to capture the accomplishment on the youth class, that maybe more important.

Learn more about   evaluation methods from

https://brainly.com/question/25907410

#SPJ1


Related Questions

Can someone help me out by coding this c into HLA(High Level Assembly)language. I am having so difficulty writting in HLA. That would be appreciated.
program crazy_8s;
#include ("stdlib.hhf");

static
num1: int16;
num2: int16;
num3: int16;
tens: int16;
eight_found: boolean;

begin crazy_8s;

eight_found := false;

while (1)
{
stdout.put("Gimme a number: ");
stdin.get(num1);

tens := num1 / 10 * 10;

if (tens == 8)
{
stdout.put("One of them ends in eight!");
eight_found := true;
break;
}

stdout.put("Gimme a number: ");
stdin.get(num2);

tens := num2 / 10 * 10;

if (tens == 8)
{
stdout.put("One of them ends in eight!");
eight_found := true;
break;
}

stdout.put("Gimme a number: ");
stdin.get(num3);

tens := num3 / 10 * 10;

if (tens == 8)
{
stdout.put("One of them ends in eight!");
eight_found := true;
break;
}

if (!eight_found)
{
stdout.put("Sorry Charlie! You lose the game!");
break;
}
}

end crazy_8s;

Answers

Below is the provided C code translated into HLA (High Level Assembly) language:

program crazy_8s;

#include ("stdlib.hhf")

static

num1: int16;

num2: int16;

num3: int16;

tens: int16;

eight_found: boolean;

begin crazy_8s;

   eight_found := false;

   while (1) {

       stdout.put("Gimme a number: ");

       stdin.gets(num1);

       tens := num1 div 10 * 10;

       if (tens = 8) then

           stdout.put("One of them ends in eight!")

           eight_found := true;

           break;

       endif

       stdout.put("Gimme a number: ");

       stdin.gets(num2);

       tens := num2 div 10 * 10;

       if (tens = 8) then

           stdout.put("One of them ends in eight!")

           eight_found := true;

           break;

       endif

       stdout.put("Gimme a number: ");

       stdin.gets(num3);

       tens := num3 div 10 * 10;

       if (tens = 8) then

           stdout.put("One of them ends in eight!")

           eight_found := true;

           break;

       endif

Thus, this can be the code asked.

For more details regarding HLA, visit:

https://brainly.com/question/13034479

#SPJ1

package Unit3_Mod2;


public class ImageExample3 {

public static void main (String[] argv)
{
int[][][] A = {
{
{255,200,0,0}, {255,150,0,0}, {255,100,0,0}, {255,50,0,0},
},
{
{255,0,200,0}, {255,0,150,0}, {255,0,100,0}, {255,50,0,0},
},
{
{255,0,0,200}, {255,0,0,150}, {255,0,0,100}, {255,0,0,50},
},
};

// Add one pixel on each side to give it a "frame"
int[][][] B = frameIt (A);

ImageTool im = new ImageTool ();
im.showImage (B, "test yellow frame");
}

public static int[][][] frameIt (int[][][] A)
{
static int[][][] copy(int[][][] A)
{
int i, j, x;
//declaring a new array with size of original array A
int[][][] ArrayCopy = new int[A.length][][];
//iterate through rows original array
for (i = 0; i < A.length; i++) {
ArrayCopy[i] = new int[A[i].length][];
//Iterate through columns in the array
for (j = 0; j < A[i].length; j++) {
ArrayCopy[i][j] = new int[A[i][j].length];
//iterate through third dimension
for (x = 0; x < A[i][j].length; x++) {
ArrayCopy[i][j][x] = A[i][j][x];
}
}
}
//return the copy of the original array
return ArrayCopy;
}

}


In java, change black frame border to yellow colored frame

Answers

Note that to change the black frame border to a yellow-colored frame in the given Java code, you can modify the frameIt method as follows.

What is the modified code?

public static int[][][] frameIt(int[][][] A) {

   int[][][] ArrayCopy = copy(A); // Create a copy of the original array

   

   // Iterate   over the first and lastrows

   for (int j = 0; j <   A[0].length;j++) {

       ArrayCopy[0][j][0] =255; //   Set red value to 255

       ArrayCopy[0][j][1] = 255; // Set green value to 255

       ArrayCopy[0][j][2] = 0;   // Set blue value to 0

       

       ArrayCopy[A.length - 1][j][0] = 255; // Set red value to 255

       ArrayCopy[A.length - 1][j][1] = 255; // Set green value to 255

       ArrayCopy[A.length - 1][j][2] = 0;   // Set blue value to 0

   }

   

   // Iterate over thefirst and last   columns

   for(int i = 0; i < A.length; i+  +) {

       ArrayCopy[i][0][0] = 255; //Set red value to   255

       ArrayCopy[i][0][1] = 255;   // Set green value to255

       ArrayCopy[i][0][2] = 0;   // Set blue value to 0

       

       ArrayCopy[i][A[i].length -   1][0] = 255;// Set red value to 255

       ArrayCopy[i][A[i].length -   1][1] =255; // Set green value to 255

       ArrayCopy[i][A[i].length - 1][2] = 0;   // Set blue value to 0

   }

   

   return ArrayCopy;

}

Learn more about Java:
https://brainly.com/question/26789430
#SPJ1

Juliet grew up in a small town with limited access to the internet, so she knew how challenging that was. After receiving an email about an organization needing computer programming tutors, Juliet decided to volunteer for the organization, which provides technology for classrooms. Based on this paragraph, what factors can influence a person to donate? Choose two answers.

Answers

Answer:

Based on this paragraph, two factors that can influence a person to donate are:

1. Personal experience or empathy: Juliet's experience growing up in a small town with limited access to the internet may have influenced her decision to volunteer for an organization that provides technology for classrooms.

2. Receiving an email or other form of communication: Juliet's decision to volunteer was based on receiving an email about the organization needing computer programming tutors, which suggests that communication can be a factor in motivating people to donate or volunteer.

Explanation:

Based on this paragraph, two factors that can influence a person to donate are:

1. Personal experience or empathy: Juliet's experience growing up in a small town with limited access to the internet may have influenced her decision to volunteer for an organization that provides technology for classrooms.

2. Receiving an email or other form of communication: Juliet's decision to volunteer was based on receiving an email about the organization needing computer programming tutors, which suggests that communication can be a factor in motivating people to donate or volunteer.

create a powerpoint presentation on various e commerce websites. compare them and write which one is your favourite and why

Answers

The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.

Thus, By providing information via various website services, you can raise audience engagement and knowledge. Internet stores Ppt Images and Graphics.

You can deliver information in stages using this template. Using this PPT design, you may also show information on products, exclusive discounts, and strong online websites. This style is entirely changeable, so personalize it right away to satisfy the demands of your audience.

A lousy PowerPoint presentation can detract from the excellent content you're providing with team stakeholders because of poor color choices or unclear slides.

Thus, The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.

Learn more about PPT, refer to the link:

https://brainly.com/question/31676039

#SPJ1

100 POINTS Can someone help me write a code in python. a program which can test the validity of propositional logic. Remember, a propositional logical statement is invalid should you find any combination of input where the PROPOSITIONAL statements are ALL true, while the CONCLUSION statement is false.

Propositional Statements:

If someone has a rocket, that implies they’re an astronaut.

If someone is an astronaut, that implies they’re highly trained.

If someone is highly trained, that implies they’re educated.

Conclusion Statement:

A person is educated, that implies they have a rocket.

Your output should declare the statement to either be valid or invalid. If it’s invalid, it needs to state which combination of inputs yielded the statement invalid.

Answers

For the code that returns the above output see the attatched.

How does the above code work?

Rocket(), astronaut(), highly trained(), and educated() are the four functions defined in the code that correlate to the propositional propositions. These functions just return the value of the argument passed in.

The test_proposition() method examines all possible input combinations and evaluates the conclusion statement. It returns the exact combination that invalidates the assertion if any combination produces the conclusion statement as false while all propositional statements are true. Otherwise, "Valid" is returned.

Learn more about code at:

https://brainly.com/question/26134656

#SPJ1

Describe how the data life cycle differs from data analysis

Answers

The data life cycle and data analysis are two distinct phases within the broader context of data management and utilization.

The data life cycle refers to the various stages that data goes through, from its initial creation or acquisition to its eventual retirement or disposal. It encompasses the entire lifespan of data within an organization or system.

The data life cycle typically includes stages such as data collection, data storage, data processing, data integration, data transformation, data quality assurance, data sharing, and data archiving.

The primary focus of the data life cycle is on managing data effectively, ensuring its integrity, availability, and usability throughout its lifespan.

On the other hand, data analysis is a specific phase within the data life cycle that involves the examination, exploration, and interpretation of data to gain insights, make informed decisions, and extract meaningful information.

Data analysis involves applying various statistical, mathematical, and analytical techniques to uncover patterns, trends, correlations, and relationships within the data.

It often includes tasks such as data cleaning, data exploration, data modeling, data visualization, and drawing conclusions or making predictions based on the analyzed data.

The primary objective of data analysis is to derive actionable insights and support decision-making processes.

In summary, the data life cycle encompasses all stages of data management, including collection, storage, processing, and sharing, while data analysis specifically focuses on extracting insights and making sense of the data through analytical techniques.

Data analysis is just one component of the broader data life cycle, which involves additional stages related to data management, governance, and utilization.

To know more about life cycle refer here

https://brainly.com/question/14804328#

#SPJ11

It is a system that is used to solve problems and interact with the environment

Variable
Computing System
Network
Computer

Answers

The term that encompasses asystem used to solve problems and interact with the environment is a "computing system."

Why is a computing system important?

Technology has improved to the point where computer systems are employed by every sector to  boost efficiency and remain ahead of their competition.

"A computing system is often made up of hardware components (such as computers and server  s) and software components (such as operating systems and apps) that collaborate to execute tasks, analyze data, and interface with people or other systems.

 It can include a variety ofdevices, networks, and computer resources to facilitate problem solving, data processing, communication, and other computational  operations.

Learn more about computer at:

https://brainly.com/question/29892306

#SPJ1

Select the correct answer from each drop-down menu.
Which two components help input data in a computer and select options from the screen, respectively?
✓inputs data into computers in the form of text, numbers, and commands. However, a
commands from the screen.
A
Reset
Next
✓selects options and

Answers

Which two components help input data in a computer and select options from the screen, respectively?

✓ Keyboard inputs data into computers in the form of text, numbers, and commands. However, a

✓ Mouse selects options and commands from the screen.

A

Reset

Next

To know more about input data refer here

https://brainly.com/question/30256586#

#SPJ11

Which of the following accurately describes a user persona? Select one.

Question 6 options:

A user persona is a story which explains how the user accomplishes a task when using a product.


A user persona should be based only on real research, not on the designer’s assumptions.


A user persona should include a lot of personal information and humor.


A user persona is a representation of a particular audience segment for a product or a service that you are designing.

Answers

A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Thus, User personas are very helpful in helping a business expand and improve because they reveal the various ways customers look for, purchase, and utilize products.

This allows you to concentrate your efforts on making the user experience better for actual customers and use cases.

Smallpdf made very broad assumptions about its users, and there were no obvious connections between a person's occupation and the features they were utilizing.

The team began a study initiative to determine their primary user demographics and their aims, even though they did not consider this to be "creating personas," which ultimately helped them better understand their users and improve their solutions.

Thus, A user persona is a fictionalized version of your ideal or present consumer. In order to boost your product marketing, personas can be formed by speaking with people and segmenting them according to various demographic and psychographic data and user.

Learn more about User persona, refer to the link:

https://brainly.com/question/28236904

#SPJ1

what is your research study all about?

Answers

One could say, ""Research studies are conducted to discover new information or to answer a question about how we learn, behave, and function in order to benefit society."

What is research?

"Creative and systematic work undertaken to increase the stock of knowledge" is what research is. It entails gathering, organizing, and analyzing information to get a better knowledge of a subject, with a special focus on mitigating sources of bias and inaccuracy.

Scientific study is vital because it enables us to comprehend how things function. Furthermore, it advances numerous fields of study including as biology, chemistry, psychology, medicine, and others. Furthermore, scientific research aids in the resolution of both present and potential future issues.

Learn more about research at:

https://brainly.com/question/968894

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

How do you respond to the question "what is your research study all about?"

how to find tax rate using VLOOKUP in microsoft excel

Answers

To find a tax rate using VLOOKUP in Microsoft Excel, you would set up a table with tax brackets and corresponding rates, and then use the VLOOKUP function to match the income amount and retrieve the corresponding tax rate.

What is VLOOKUP?

When you need to find anything in a table or a range by row, use VLOOKUP. Look for the pricing of an automobile item by its part number, or locate an employee's name by their employee ID.

The VLOOKUP method requires three inputs, in this order: lookup value, table array, and column index number. The lookup value is the value for which you wish to locate matching data and must be in the lookup table's first column; it can be a value, a text string, or a cell reference.

Learn more about VLOOKUP:
https://brainly.com/question/30154536
#SPJ1

Design two classes named Employee and PaySheet to represent employee and PaySheet data as follows: For the Employee class, the data fields are: int empNo; String name; double payRatePerHour, PaySheet[] PaySheet for four weeks (1 month), and Two other data fields of your choice. For the PaySheet class, the data fields are: String weekEndingDate; integer Array of size=5 for the five working days. Entries in this array will be integers from 0-8 where 0 means that the employee did not work that day and a value from 1 to 480 means the number of hours the employee worked in that day. All data fields should be declared as private, and associated getters and setters should be declared in each class. Create a driver class called Main, whose main method instantiates array of Employee objects and write the following methods: 1. A Method called printInfo that receives an array of Employees and prints all information about working days that looks like the following: Emp NO. Week Total Days/hours weekly Payment 1 1 1 2 2 1 2 3 1 2 4/32 5/37 3/12 1/8 3/15 400 500 300 150 450 2. Method called print WarnedEmployees that receives an array of Employees and prints the name of the employee who has a warning. An employee is warned if he is absent for two or more days in two consecutive weeks. 3. A method that receives an array of Objects and sorts unwarned Employees based on TotalPayment (in all weeks) method header must be: public static void sortEmps (Object[] o)​

Answers

You may quickly calculate the wage using the ready-to-use wage salary Sheet template for Excel, Sheets, OpenOffice Calc, and Apple Numbers.

Thus, This payroll document allows you to enter payroll information for many employees as well as a salary slip that is generated in accordance with employment laws in India and contains provident fund and employee allowances.

A salary sheet is a document that contains all the information regarding the payment due to an employee for work completed during a specific time period. It also includes information on things like the employees' base pay, bonuses, deductions, overtime, etc.

The HR document that businesses use to determine employee compensation is the payroll or salary sheet.

Thus, You may quickly calculate the wage using the ready-to-use wage salary Sheet template for Excel, Sheets, OpenOffice Calc, and Apple Numbers.

Learn more about Salary sheet, refer to the link:

https://brainly.com/question/15014451

#SPJ1

In this test you are expected to code a Sales
Management System that saves sold Products to a
MySQL Database using a JDBC connection. Problem
Domain and Data Access classes are used. DA
methods to be coded are specified in the test.
The GUI for the application:
Product Details
Barcode No:
Product name:
Unit Price:
Product weight:
Manufacturer:
View Sales
Product Category
Item Based Product
Weight Based Product
Sale
View Item Based Products

Answers

To build a Sales Management System, it is essential to design a user-friendly graphical interface that features sections for entering details pertaining to products, including barcodes, names, prices per unit, weights and manufacturers.

How to use this dB?

Using a JDBC connection, it is imperative for the system to store the sold products in a MySQL database. The classes responsible for accessing data should be equipped with functions that facilitate the retrieval and storage of information from and to the database.

The graphical user interface must include features allowing the user to examine sales figures, distinguish between product types based on quantity or weight, and browse item-based products. The design of the system should prioritize efficient management of product data and sales, while also ensuring user-friendliness.

Read more about database here:

https://brainly.com/question/518894

#SPJ1

21
Select the correct answer.
Which task occurs just before the maintenance phase?
O A reviewing prerequisites
B.
final reviewing and deploying the product
C. training end users to operate the product
D.
site surveying
O E reviewing all manuals and plans
Edmentum/Plato

Answers

The task, final reviewing and deploying the product occurs just before the maintenance phase. The correct option is B.

The task that takes place just before the maintenance phase is the last review and deployment of the product.

At this step, the software or product is thoroughly examined to make sure it complies with all the prerequisites and quality standards. Before the product is deployed or made available to end users, any outstanding problems or faults are addressed and fixed.

Final testing, user acceptability testing, and preparing the product for deployment in the production environment are additional tasks included in this phase.

The product can be made available for usage by the intended end users after the final review is finished and it is determined that it is ready.

Thus, the correct option is B.

For more details regarding testing, visit:

https://brainly.com/question/31941684

#SPJ1

Create a data validation list in cell D5 that displays Quantity, Payment Type, Amount (in that order). Do not use cell references as the source of the list. Be sure to enter a blank space after each comma when entering the values.

Answers

Validating the cell D5 would ensure that the cell D5 do not accept invalid inputs.

How can one to create data validation?

To create data validation in the cell D5, we perform the following steps

Select the cell D5 in the Microsoft Excel sheetGo to data; select data validationGo to the Settings tab, then select the Whole number option under AllowNext, goto data then select condition.Set all necessary conditionsGo to the Input Message tab, then enter a custom message that displays when the user enters an invalid input.Check the Show input messageSet the error style under the Error Alert tabClick OK.

It is correct to state that rhe above steps validates the cell D5, and would ensure that the cell D5 do not accept invalid inputs.

Learn  more about data validation at:

https://brainly.com/question/31429699

#SPJ1

Which of the following queries can have a fully Meets result?

Answers

Answer: we need the awnser key

Explanation:

The layer that represent information as Binary numbers 0s and 1s

information
communication
programming
Hardware

Answers

The layer that represent information as Binary numbers 0s and 1s "Hardware" (Option D)

Why is binary important to computing?

Binary numbers and binary math are used by computers because they considerably simplify their work. It is easier to store or modify the numbers since there are just two choices (0 and 1) for each digit rather than ten.

Hardware components of a computer system, such as transistors, logic gates, and memory circuits, process and store information using binary digits (bits), which can have a value of 0 or 1.

Learn more about Binary Numbers:
https://brainly.com/question/31662989
#SPJ1

Your organization sometimes needs to securely share information with three clients organizations. What will you use so your clients get partial access to resources on your organization’s network?

Answers

Answer:

Personnellement j'utiliserai un logiciel qui permet de paramétrer la limite d'accès aux organisations sur des ressources partagées.

Explanation:

Complete the code to change the label to black text on a yellow background. w = tk.Label(root, text="Movies", ="yellow", ="black")

Answers

Answer:

To change the label to black text on a yellow background, you need to specify the foreground and background colors using the fg and bg attributes, respectively. Here's the updated code:

w = tk.Label(root, text="Movies", fg="black", bg="yellow")

Design two classes named Employee and PaySheet to represent employee and PaySheet data as follows: For the Employee class, the data fields are: int empNo; String name; double payRate PerHour, PaySheet[] PaySheet for four weeks (1 month), and Two other data fields of your choice. For the PaySheet class, the data fields are: String weekEndingDate; integer Array of size=5 for the five working days. Entries in this array will be integers from 0-8 where 0 means that the employee did not work that day and a value from 1 to 480 means the number of hours the employee worked in that day. All data fields should be declared as private, and associated getters and setters should be declared in each class. Create a driver class called Main, whose main method instantiates array of Employee objects and write the following methods: 1. A Method called printInfo that receives an array of Employees and prints all information about working days that looks like the following: Emp NO. Week Total Days/hours weekly Payment 1 1 1 2 2 1 2312 2 4/32 5/37 3/12 1/8 3/15 400 500 300 150 450 2. Method called print WarnedEmployees that receives an array of Employees and prints the name of the employee who has a warning. An employee is warned if he is absent for two or more days in two consecutive weeks. 3. A method that receives an array of Objects and sorts unwarned Employees based on TotalPayment (in all weeks) method header must be: public static void sortEmps (Object[] o)​

Answers

A class serves as a model for generating objects through code. Objects are characterized by their member variables and their corresponding behavior.  The code is given below.

What is the class code?

The term "class" in Python is generated using the keyword "class". A new instance is generated through the usage of the class's constructor.

The function that is named "printWarnedEmployees" is one that often accepts an array containing objects of type "Employee" and show forth the name of any employee who has received a warning. If an employee is absent for two or more days in two consecutive weeks, they will be given a warning.

Learn more about class code from

https://brainly.com/question/17544466

#SPJ1

3. As a basic user of SAP Business One, Which features of the application do you like most?

Answers

As a basic user of SAP Business One, the  feature of the application that holds my interst the most is the Real Time Analytics.

What is Real Time Analytics in SAP Business One?

It is important to note that real time analytics in SAP Business One allows you to obtain information faster and analyse it with advanced analytics in real time. SAP Business One makes it easier to search for data and create standard or ad hoc reports on the go.

SAP is a single, low-cost system for managing your complete small business, including accounting and financials, purchasing, inventory, sales, and customer interactions, as well as reporting and analytics.

Learn more about Analytics at:

https://brainly.com/question/31129488

#SPJ1

Which of the following statements about mentors is true?

A. Most companies do not support mentoring programs.

B. Mentors rarely provide real-life and practical advice.

C. Mentors are an excellent way to learn on the job.

D. Leaders in high positions rarely have time to be mentors.

Answers

C. Mentors are an excellent way to learn on the job.

Among the given options, statement C is true. Mentors play a crucial role in providing guidance, support, and practical advice to individuals seeking to learn and grow in their professional lives. Mentoring programs are commonly supported by companies as they recognize the value of mentorship in developing talent, enhancing skills, and fostering career advancement. Mentors bring their experience and expertise to the table, sharing real-life insights and offering guidance based on their own professional journey. They provide valuable knowledge, wisdom, and support, making them an excellent resource for learning and development.

1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:

4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
 WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
 WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:

Answers

Network controls that would meet the requirements is option a) Stateful Firewall

Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option  b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEP

What is the statement about?

A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.

A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.

Learn more about network administrator  from

https://brainly.com/question/28729189

#SPJ1

XYZ is a well-renowned company that pays its salespeople on a commission basis. The salespeople each receive 700 PKR per week plus 9% of their gross sales for that week. For example, a salesperson who sells 4000 PKR worth of chemicals in a week receives 700 plus 9% of 5000 PKR or a total of 1060 PKR. Develop a C++ program that uses a Repetitive Structure (while, for, do-while) to manipulate each salesperson’s gross sales for the week and calculate and displays that salesperson’s earnings.

Answers

Answer:

#include<iostream>

#include<conio.h>

using namespace std;

float calculateGross(float sale)

{

return (sale/100*9) + 700;

}

main()

{

float sale[3] = { 5000,7000,9000}, Totalsale =0;

for(int i=0; i<=2; i++)

{

cout<<"Sales Person "<<i+1<<" Gross Earnings: "<<calculateGross(sale[i])<<" PKR\n";

Totalsale += calculateGross(sale[i]);

}

cout<<"Total Gross Sales Earnings for week: "<<Totalsale<<" PKR\n";

return 0;

}

Other Questions
select comfort, a producer of adjustable air mattresses, sells most of its products through direct mail sales and on its website. this channel would be classified as what built-in utility allows windows targets to be enumerated? a. nbtstat b. netview c. net use d. all are commands that may be used with windows enumeration. what surprised you about dna replication and protein synthesis How does Richard Connell create suspense during the story ? From the most dangerous game what explanations can you think of for pseudo fatigue which of the above skulls is the most intermediate between ape-like and human-like? stanislavsky is perhaps the most famous acting teacher of the twentieth century. his method of acting became known as the stanislavski system. true false how long does it take to deposit a coating of gold 1.00 m thick on a disk-shaped med The primary benefit that the nervous system gains from myelination isSelect one:a. increased resting potentials.b. generation of currents actively (action potentials) rather than passively (electrotonic conduction).c. decreased membrane resistance.d. faster neural communication. agamemnon refuses to return chryseis to her father who then implores apollo to take action against the greeks. apollo showers the greek camp with his arrows. what do his arrows bring to the greeks and their animals? The leap frog by hans christian Andersen rewrite To understand your own values, you shouldA. understand how ethics differs from legal requirements.B. take a course on value creation and definition.C. articulate them in writing and test them through daily decision making.D. focus on cutting costs while improving quality.E. write a strong marketing plan that will help you achieve your desired profit level. Magee Company's stock has a beta of 1.20, the risk-free rate is 4.50%, and the market risk premium is 5.00%. What is Magee's required return?a. 10.25%b. 10.50%c. 10.75%d. 11.00%e. 11.25% according to the consumer electronics manufacturers association, 10% of all u.s. households have a fax machine and 52% have a personal computer. suppose 91% of all u.s. households having a fax machine have a personal computer. a u.s. household is randomly selected. what is the probability that the household has a fax machine and does not have a personal computer? I need the inequality and also the answer I have in incorrect please I need a answer (1 point) find the linear approximation of f(x)=lnx at x=1 and use it to estimate ln(1.12). l(x)= ln1.12 describe the free response of the output y(t) given an arbitrary initial state x(0). Why are organic molecules so diverse compared to inorganic molecules?- There are more different kinds of atoms in organic compounds.- Naturally occurring compounds are more complex than man-made compounds.- The carbon molecules in an organic compound can make four bonds.- Organic compounds are made by living things, which can create more complexity than non-living.- Organic compounds are man-made, so they can be created in any form we can imagine. A mail-order coffee company sells coffee beans for $10 per pound.It charges $10 shipping for orders weighing less than 5 pounds.Orders weighing 5 pounds or more have free shipping.Orders weighing 8 pounds or more are discounted by 20%. Which graph represents the total charge, including snipping, for orders of differentnumbers of pounds of coffee? Which is not a criteria that is related to being a mammal? a differential teeth b three ear bones c two ear bones d seven neck bones e large cranium f secondary palate