Which Azure networking component is the core unit, from which administrators can have full control over IP address assignments, name resolution, security settings and routing rules

Answers

Answer 1

Answer:

The correct answer will be "Virtual networks".

Explanation:

This networking seems to be the major element of azure connectivity that further keep track of almost all of the essential administrative responsibilities. Its function involves complete ownership over all the appointments of Ip addresses as well as the settlement of names.This decides based on the criteria for transferring the information from one place to another other.

Related Questions

nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync

Answers

Complete Question:

Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync?

Answer:

Network Time Protocol (NTP).

Explanation:

As the IT systems administrator, you can set the network time protocol (NTP) to make sure that your client machines and the server times are in synchronization.

A network time protocol (NTP) can be defined as an internet standard protocol which is used by an IT system administrator to synchronize a computer's clock to a particular time reference over packet switched or local area network (LAN) and variable-latency data networks. NTP was developed at the University of Delaware by Professor David L. Mills.

Basically, the network time protocol uses the coordinated universal time (UTC) and a client-server model to measure the total round-trip delay for a computer process.

A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right.
For example, we can shift the bits in the string 1011 two places to the left to produce the string 1110. Note that the leftmost two bits are wrapped around to the right side of the string in this operation.
Define two scripts, shiftLeft.py and shiftRight.py, that expect a bit string as an input.
The script shiftLeft shifts the bits in its input one place to the left, wrapping the leftmost bit to the rightmost position.
The script shiftRight performs the inverse operation.
Each script prints the resulting string.
An example of shiftLeft.py input and output is shown below:
Enter a string of bits: Hello world!
ello world!H
An example of shiftRight.py input and output is shown below:
Enter a string of bits: Hello world!
!Hello world

Answers

Answer:

Following are the code to this question:

Defining method shiftLeft:

def shiftLeft(bit_string): #defining method shiftLeft, that accepts parameter bit_string

   bit_string= bit_string[1:]+bit_string[0]#use bit_string to provide slicing

   return bit_string#return bit_string value

bit_string =input("Enter value: ")#defining bit_string variable for user input

print (shiftLeft(bit_string))#use print method to call shiftLeft method

Defining method shiftRight:

def shiftRight(bit_string):#defining method shiftRight, which accepts bit_string variable

bit_string=bit_string[len(bit_string)-1]+bit_string[0:len(bit_string)-1]#using bit_string variable for slicing

   return bit_string#return bit_string calculated value

bit_string= input("Enter value: ")#defining bit_string variable for user input

print(shiftRight(bit_string))#use print method to call shiftLeft method

Output:

Please find the attachment.

Explanation:

method description:

In the above-given python code two methods "shiftLeft and shiftRight" are declared, in which both the method accepts a string variable "bit_string". Inside methods, we use the slicing, in which it provides to use all the sequence values and calculated the value in this variable and return its value.  At the last step, the bit_string variable is used to input value from the user end and call the method to print its value.

Assuming a Stop-and-Wait system, if the bandwidth-delay product of a channel is 500 Mbps and 1 bit takes 25 milliseconds to make the roundtrip, what is the bandwidth-delay product? If the data packets are 2500 bits in length, what is the utilization?

Answers

Answer:

Bandwidth delay product = 2500 Kbits

Utilization = 0.02%

Explanation:

We proceed as follows;

From the question, we are given that

band width = 500 Mbps

The bandwidth-delay product is = 500 x 10^6 x 25 x 10^-3

= 2500 Kbits

The system can send 12500 Kbits during the time it takes for the data to go from the sender to the receiver and then back again.

However, the system sends only 2500 bits.

The the link utilization =

2500/(12500 x 10^3) = 0.02%

Multiply each element in origList with the corresponding value in offsetAmount. Print each product followed by a semicolon (no spaces). Ex: If the input is: 4 5 10 12 2 4 7 3 the output is: 8; 20;70; 36; 1 #include 2 3 int main(void) { 4 const int NUM_VALS = 4; 5 int origList[NUM_VALS]; 6 int offsetAmount [NUM_VALS]; 7 int i; 8 9 scanf("%d", &origList[0]); 10 scanf("%d", &origList[1]); 11 scanf("%d", &origList[2]); 12 scanf("%d", &origList[3]); 13 14 scanf("%d", &offsetAmount[0]); 15 scanf("%d", &offsetAmount[1]); 16 scanf("%d", &offsetAmount[2]); 17 scanf("%d", &offsetAmount[3]); 18 19 \* Your code goes here */ 20 21 printf("\n"); 22 23 return 0; 24

Answers

Answer:

Replace /* Your code goes here */  with

for(i =0; i<NUM_VALS; i++) {

    printf("%d", origList[i]*offsetAmount[i]);

printf(";");

}

Explanation:

The first line is an iteration statement iterates from 0 till the last element in origList and offsetAmount

for(i =0; i<NUM_VALS; i++) {

This line calculates and print the product of element in origList and its corresponding element in offsetAmount

    printf("%d", origList[i]*offsetAmount[i]);

This line prints a semicolon after the product has been calculated and printed

printf(";");

Iteration ends here

}

Description:
Create a program that converts the number of miles that you walked on a hike to the number of feet that you walked.
Console:
Hike Calculator
How many miles did you walk?: 4.5
You walked 23760 feet.
Continue? (y/n): y
How many miles did you walk?: 2.5
You walked 13200 feet.
Continue? (y/n): n
Bye!
Specifications:
The program should accept a float value for the number of miles.
Store the code that gets user input and displays output in the main function.
There are 5280 feet in a mile.
Store the code that converts miles to feet in a separate function. This function should return an int value for the number of feet.
Assume that the user will enter a valid number of miles.

Answers

Answer:

The programming language is not stated (I'll answer using C++)

#include <iostream>

using namespace std;

int convert(float miles)

{

   return miles * 5280;

}

int main() {

   cout<<"Console:"<<endl;

   cout<<"Hike Calculator"<<endl;

   float miles;

   char response;

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   while(response == 'y')

   {

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   }

   cout<<"Bye!";

   return 0;

}

Explanation:

Here, I'll explain some difficult lines (one after the other)

The italicized represents the function that returns the number of feet

int convert(float miles)

{

   return miles * 5280;

}

The main method starts here

int main() {

The next two lines gives an info about the program

   cout<<"Console:"<<endl;

   cout<<"Hike Calculator"<<endl;

   float miles;

   char response;

This line prompts user for number of miles

   cout<<"How many miles did you walk?. ";

   cin>>miles;

This line calls the function that converts miles to feet and prints the feet equivalent of miles

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

This line prompts user for another conversion

   cout<<"Continue? (y/n): ";

   cin>>response;

This is an iteration that repeats its execution as long as user continue input y as response

   while(response == 'y')

   {

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   }

   cout<<"Bye!";

Type the correct answer in the box.

Who is responsible for creating and testing the incident response plan?

The _______ is responsible for creating and testing the incident response plan.

Answers

Answer: CSIRT

Explanation: CSIRT is team that specializes in day to day cyber incidents  

The CSIRT is responsible for creating and testing the incident response plan.

What is CSIRT?

CSIRT is the Computer emergency response team. One of the key areas for the efficient operation of a corporation is the legal department. Professionals face enormous challenges, particularly when you take into account the need for other bodies within the company itself.

We can list the reviews of the CSIRT procedures that are conducted through this department as one of its key responsibilities. This department also has the responsibility of comprehending the actions that the CSIRT will take to ensure that they comply with all applicable federal, state, and local laws and regulations.

Therefore, the incident response strategy must be written and tested by the CSIRT.

To learn more about CSIRT, refer to the link:

https://brainly.com/question/18493737

#SPJ2

When you sustain program implementation by staying true to the original design, it is termed A. Goals and objectives B. Program fidelity C. Program evaluation D. Program management

Answers

Answer:

Program fidelity

Explanation:

A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Select TWO).
a) Vishing
b) Whaling
c) Spear phishing
d) Pharming
e) War dialing
f) Hoaxing

Answers

Answer:

Spear Phishing and War Dialing

Explanation:

So let's tackle these one at a time.

Vishing is simply any type of message (i.e., email, text, phone call, etc.) that appears to be from a trusted source but is not.

Whaling is simply a spear phishing attack of a high-value target such as a CEO or someone with high-level access at a company.

Spear phishing is simply a targeted phishing attack, usually towards a specific person or group of people.  (Phishing attack is simply a social attack to try and gain unauthorized access to a resource).

Pharming is an attack that attempts to redirect website traffic to a fake site.

War dialing is a technique to automatically scan a list of numbers in an area in attempt to search for exposed modems, computers, board systems, or fax machines, in order to breach the network.

Hoaxing is simply a social attack that describes a serious threat in attempts to retrieve unauthorized access or money from a victim.  (Think microsoft tech support scams)

Now that we have defined these things, let's identify the possible threats that need to be reported.

(a) Vishing?  The sec admin report doesn't mention the source of the message so we cannot associate this one

(b) Whaling? The sec admin report says a user, implying someone not high up in the company, but doesn't say it's not someone high up.  This is possible.

(c) Spear phishing?  The sec admin report says a user, implying that only this user is being targeted so this is definitely valid.

(d) Pharming?  The sec admin report says nothing about site redirection.

(e) War dialing? The sec admin report doesn't say anything about unauthorized scanning; however, it mentions the user has an old functioning modem, so this is possible.

(f) Hoaxing?  The sec admin report doesn't mention a pop up in the email or the content of the email so we are uncertain.

Thus with these considerations, the two threats that are identified and need mitigation are Spear phishing and War Dialing/Whaling.  Note that we aren't positive of the war dialing or whaling, but a case could be made for either; however, given the modem information, the question seems to indicate war dialing.

The new_directory function

Answers

Answer:The new directory method creates a new directory within the current working directory.

Explanation:The new directory function and returns the list of the files within that directory.The new directory function allow to with the built in function MK dir().

To the new directory function create a current working directory.

import OS

OS.MKdir()

The code creates the directory projects in the current working directory to specify the full path.

C create a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the Plane class and test its functionality. Write a method called Check In() as part of the Plane class to handle the check in process Prompts the user to enter 1 to select First Class Seat (Choice: 1) Prompts the user to enter 2 to select Economy Seat (Choice: 2) Assume there are only 5-seats for each First Class and Economy When all the seats are taken, display no more seats available for you selection Otherwise it displays the seat that was selected. Repeat until seats are filled in both sections Selections can be made from each class at any time.

Answers

Answer:

Here is the C++ program:

#include <iostream>  //for using input output functions

using namespace std;  //to identify objects like cin cout

class Plane{  //class Plane

private:  // declare private data members i.e. first_class and eco_class

int first_class;  //variable for first class

int eco_class;  //variable declared for economy class

public:  // public access modifier

Plane(){  //constructor to initialize values of first_class and eco_class

first_class=0;  //initialized to 0

eco_class=0;}   //initialized to 0

int getFirst(){  // class method to get data member first_class

return first_class;}   //returns the no of reserved first class seats

int getEco(){  // class method to get data member eco_class

return eco_class;}  //returns the no of reserved eco class seats

void CheckIn(){  //method to handle the check in process

int choice;  //choice between first and economy class

cout<<"\nEnter 1 to select First Class Seat: "<<endl;  //prompts user to enter 1 to reserve first class seat

cout<<"\nEnter 2 to select Economy Class Seat: "<<endl;   //prompts user to enter 2 to reserve economy class seat

cin>>choice;   //reads the choice from user

switch(choice){  // switch statement is used to handle the check in process

case 1:  //to handle the first class seat reservation

if(getFirst()<5){  //if the seat is available and the seat limit has not exceed 5

first_class++;  //add 1 to the first_class seat to count that a seat is reserved

cout<<"You reserved First class seat! ";} //display the message about successful seat reservation in first class

cout<<"\nNumber of first class seats reserved: "<<getFirst()<<endl;}  //displays the number of seats already reserved

else{  //if all first class seats are reserved then display the following message

cout<<"No more seats available for you selection!"<<endl;  

if(getEco()>=5 && getFirst()>=5){  //if all seats from first class and economy class are reserved display the following message

cout<<"All seats are reserved!"<<endl;  

exit(1);}}  //program exits

break;  

case 2:  //to handle the economy seat reservation

if(getEco()<5){   //if the seat is available and the seat limit has not exceed 5

eco_class++;  //add 1 to the eco_class seat to count that a seat is reserved

cout<<"You reserved Economy class seat! "; //display the message about successful seat reservation in economy class

cout<<"\nNumber of Economy class seats reserved: "<<getEco()<<endl;}  //displays the number of seats already reserved

else{  //if all economy class seats are reserved then display the following message

cout<<"No more seats available for you selection!"<<endl;

if(getEco()>=5 && getFirst()>=5){  //if all seats from first class and economy class are reserved display the following message

cout<<"All seats are reserved!"<<endl;

exit(1);}}  //program exits

break;

default: cout<<"Enter a valid choice"<<endl; } } };   //if user enters anything other that 1 or 2 for choice then this message is displayed

int main(){  //start of main() function body

int select;  // choice from first or economy class

Plane plane;  //create an object of Plane class

cout<<"**************************"<<endl;

cout<<"Airline Reservation System"<<endl;  //display this welcome message

cout<<"**************************"<<endl;

while(true){  // while loop executes the check in procedure

plane.CheckIn();} }  //class CheckIn method of Plane classs using plane object to start with the check in process

Explanation:

The program is elaborated in the comments with each statement of the above code. The program has a class Plane that has a method CheckIn to handle the check in process. The user is prompted to enter a choice i.e. enter 1 to select First Class Seat and enter 2 to select Economy Seat. A switch statement is used to handle this process. If user enters 1 then the case 1 of switch statement executes which reserves a seat for the user in first class. If user enters 2 then the case 2 of switch statement executes which reserves a seat for the user in economy class.There are only 5 seats for each First Class and Economy. So when the limit of the seats reservation exceeds 5 then the no more seats available for you selection is displayed. If all the seats are taken in both the first and economy class then it displays the message All seats are reserved. If the user enters anything other than 1 or 2 then display the message Enter a valid choice. Whenever the user reserves one of first or economy class seats the relevant seat is incremented to 1 in order to count the number of seats being reserved. The program and its output are attached.

why does study state that unless you were sleeping it is almost impossible not to be communicating?

Answers

Answer:

Because your movements, expressions, and posture are also a type of communication

Explanation:

Complete the function ConvertToDecadesAndYears to convert totalYears to decades and years. Return decades and years using the TimeDecadesYears struct. Ex: 26 years is 2 decades and 6 years.

Answers

Answer:

It is a C++ program. The complete function   ConvertToDecadesAndYears which takes totalYears as parameter and convert totalYears to decades and years is provided in the attached document.

Explanation:

The explanation is provided in the attached document.

The screenshot of the complete code along with its output is attached.

A byte addressable direct-mapped cache has 1024 blocks/lines, with each block having eight 32-bit words. How many bits are required for block offset, assuming a 32-bit address

Answers

Answer and Explanation:

"The inquiry as presented is not necessarily responsible. A word has been states as 32-bit. We need to ask if the frame is "byte-addressable" (From this we can access to get an 8-bit piece of information) or "text-addressable" (the smallest open lump is 32-bit) or maybe "half-word-addressable" (the tiny bundle of information it could reach to 16-bit).

To understand what the smallest request bit of a position is to let anyone know, you have to remember this.

You operate from base up at that stage. We will agree with the byte-addressable structure. Every reserved square at a certain point contains 8 words * (4 bytes/word) = 32 = 25 bytes, so the counterbalance seems to be 5 bits.

The history in a direct-mapped stored is the squares in reserves (12 bits for this position due to 212 = 4096). at a certain point, as you have seen, the tag is also one of the bits left behind.

As the reserve becomes increasingly cooperative. And a similar size remains. These are lesser bits on the list and more bits on the mark.'

An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:_______

a. have a redundancy.
b. get caught in an infinite loop.
c. suffer from indefinite postponement.
d. issue a compiler error.

Answers

Answer:

c. suffer from indefinite postponement.

Explanation:

Algorithm is a set of rules that are followed in calculations or other problem solving operation by a computer. An algorithm may execute for unknown amount of time and it may suffer indefinite postponement. Algorithm depends on random numbers and it can execute continuously.

What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack?

Answers

Answer:

The answer is below

Explanation:

1.  Lack of password enforcement

2.  Outdated third party applications: this includes outdated software such as Apache, PHP, MySQL, OpenSSL, and VNC

3.  General lack of patch management for the OS

4.  General lack of system hardening:

5.  Lack of backups

Ways to hardened the Linux/Unix based computer system is do the following:

1.  Perform minimal Installation: this involves, installing softwares that are necessary, and limiting the number of admin users on the computer system.

2.  Carry out Code Auditing: this is a means of preventing security issues, by withing more secure softwares to prevent variable declarations, or otherwise unexpected logic.

3.  Ensure there is a Traffic filter firewall: this will helps to attacks from external users or hackers. Install, Web Applicatio firewall, which helps to filter out traffic.

4.  Carry out Softwares updates: a software update can help prevent or guide against security leaks in a software

5.  Install security updates only: this is done by filtering out the security-related programs and only upgrade packages which are referred to in the custom file.

The statistical report is typically used to set targets for the organization's expenditures for the year and then report actual costs on a monthly or quarterly basis.
A. True
B. False

Answers

Answer:

False

Explanation:

Budget and Financial reports are used to set targets for organization's expenditure. These reports display cost and expenditures related to all assets, raw material, inventory of the organization. The variance is then calculated based on targeted figures and the actual expenses. The deviation from target is found by the variance and then actions are taken for it. Managers rely heavily on these reports. Statistical reports are non financial reports. These focus on customer satisfaction, employee performance, staff turnover rate and assets performance.

Consider these functions:_________.
def f(x) :
return g(x) + math.sqrt(h(x))
def g(x):
return 4 h(x)
def h(x):
return x x + k(x)-1
def k(x):
return 2 (x + 1)
Without actually compiling and running a program, determine the results of the following function calls.
a. x1 = f(2)
b. x2 = g(h(2)
c. x3 = k(g(2) + h(2))
d. x4 - f(0) + f(l) + f(2)
e. x5 - f{-l) + g(-l) + h(-1) + k(-l)

Answers

Answer:

x1 = 39

x2 = 400

x3 = 92

x4 = 62

x5 = 0

Explanation:

a. x1 = f(2)

This statement calls the f() function passing 2 to the function. The f(x) function takes a number x as parameter and returns the following:

g(x) + math.sqrt(h(x))

This again calls function g() and h()  

The above statement calls g() passing x i.e. 2 to the function g(x) and calls function h() passing x i.e. 2 to h() and the result is computed by adding the value returned by g() to the square root of the value returned by the h() method.

The g(x) function takes a number x as parameter and returns the following:

return 4*h(x)

The above statement calls function h() by passing value 2 to h() and the result is computed by multiplying 4 with the value returned by h().

The h(x) function takes a number x as parameter and returns the following:

return x*x + k(x)-1

The above statement calls function k() by passing value 2 to k() and the result is computed by subtracting 1 from the value returned by k() and adding the result of x*x (2*2) to this.

The k(x) function takes a number x as parameter and returns the following:

return 2 * (x + 1)

As the value of x=2 So

2*(2+1) = 2*(3) = 6

So the value returned by k(x) is 6

Now lets go back to the function h(x)

return x*x + k(x)-1

x = 2

k(x) = 6

So

x*x + k(x)-1 = 2*2 + (6-1) = 4 + 5 = 9

Now lets go back to the function g(x)

return 4*h(x)

As x = 2

h(x) = 9

So

4*h(x)  = 4*9 = 36

Now lets go back to function f(x)

return g(x) + math.sqrt(h(x))

As x=2

g(x) = 36

h(x) = 9

g(x) + math.sqrt(h(x))  = 36 + math.sqrt(9)

                                  = 36 + 3 = 39

Hence

x1 = 39b. x2 = g(h(2) )

The above statement means that first the function g() calls function h() and function h() is passed a value i.e 2.

As x=2

The function k() returns:

2 * (x + 1)   = 2 * (2 + 1) = 6

The function h() returns:

x*x + k(x)-1 = 2*2 + (6-1) = 4 + 5 = 9

Now The function g() returns:

4 * h(x)  = 4 * h(9)

This method again calls h() and function h() calls k(). The function k() returns:

2 * (x + 1)   = 2 * (9 + 1) = 20

Now The function h() returns:

x*x + k(x)-1 = 9*9 + (20-1) = 81 + 19 = 100

h(9) = 100

Now The function g() returns:

4 * h(x)  = 4 * h(9) = 4 * 100 = 400

Hence

x2 = 400c. x3 = k(g(2) + h(2))

g() returns:

return 4 h(x)

h() returns:

return x*x + k(x)-1

k(2) returns:

return 2 (x + 1)

          = 2 ( 3 ) = 6

Now going back to h(2)

x * x + k(x)-1  = 2*2 + 6 - 1 = 9

Now going back to g(2)

4 h(x)  = 4 * 9 = 36

So k(g(2) + h(2)) becomes:

   k(9 + 36 )

    k(45)

Now going to k():

return 2 (x + 1)

2 (x + 1)   = 2(45 + 1)

             = 2(46)

             = 92

So k(g(2) + h(2)) = 92

Hence

x3 = 92d. x4 = f(0) + f(1) + f(2)

Compute f(0)

f() returns:

return g(0) + math.sqrt(h(0))

f() calls g() and h()

g() returns:

return 4 * h(0)

g() calls h()

h() returns

return 0*0 + k(0)-1

h() calls k()

k() returns:

return 2 * (0 + 1)

2 * (0 + 1)  = 2

Going back to caller function h()

Compute h(0)

0*0 + k(0)-1  = 2 - 1 = 1

Going back to caller function g()

Compute g(0)

4 * h(0)  = 4 * 1 = 4

Going back to caller function f()

compute f(0)

g(0) + math.sqrt(h(0))  = 4 + 1 = 5

f(0) = 5

Compute f(1)

f() returns:

return g(1) + math.sqrt(h(1))

f() calls g() and h()

g() returns:

return 4 * h(1)

g() calls h()

h() returns

return 1*1 + k(1)-1

h() calls k()

k() returns:

return 2 * (1 + 1)

2 * (1 + 1)  = 4

Going back to caller function h()

Compute h(0)

1*1 + k(1)-1  = 1 + 4 - 1 = 4

Going back to caller function g()

Compute g(1)

4 * h(1)  = 4 * 4 = 16

Going back to caller function f()

compute f(1)

g(1) + math.sqrt(h(1))  = 16 + 2 = 18

f(1) = 18

Compute f(2)

f() returns:

return g(2) + math.sqrt(h(2))

f() calls g() and h()

g() returns:

return 4 * h(2)

g() calls h()

h() returns

return 1*1 + k(2)-1

h() calls k()

k() returns:

return 2 * (2+1)

2 * (3)  = 6

Going back to caller function h()

Compute h(2)

2*2 + k(2)-1  = 4 + 6 - 1 = 9

Going back to caller function g()

Compute g(2)

4 * h(2)  = 4 * 9 = 36

Going back to caller function f()

compute f(2)

g(2) + math.sqrt(h(2))  = 36 +3 = 39

f(1) = 13.7

Now

x4 = f(0) + f(l) + f(2)

    = 5 + 18 + 39

    = 62

Hence  

x4 = 62e. x5 = f(-1) + g(-1) + h(-1) + k(-1)

Compute f(-1)

f() returns:

return g(-1) + math.sqrt(h(-1))

f() calls g() and h()

g() returns:

return 4 * h(-1)

g() calls h()

h() returns

return 1*1 + k(-1)-1

h() calls k()

k() returns:

return 2 * (-1+1)

2 * (0)  = 0

Going back to caller function h()

Compute h(-1)

-1*-1 + k(-1)-1  = 1 + 0 - 1 = 0

Going back to caller function g()

Compute g(-1)

4 * h(-1)  = 4 * 0 = 0

Going back to caller function f()

compute f(-1)

g(-1) + math.sqrt(h(-1))  = 0

f(-1) = 0

Compute g(-1)

g() returns:

return 4 * h(-1)

g() calls h()

h() returns

return 1*1 + k(-1)-1

h() calls k()

k() returns:

return 2 * (-1+1)

2 * (0)  = 0

Going back to caller function h()

Compute h(-1)

-1*-1 + k(-1)-1  = 1 + 0 - 1 = 0

Going back to caller function g()

Compute g(-1)

4 * h(-1)  = 4 * 0 = 0

g(-1) = 0

Compute h(-1)

h() returns

return 1*1 + k(-1)-1

h() calls k()

k() returns:

return 2 * (-1+1)

2 * (0)  = 0

Going back to caller function h()

Compute h(-1)

-1*-1 + k(-1)-1  = 1 + 0 - 1 = 0

h(-1) = 0

Compute k(-1)

k() returns:

return 2 (x + 1)

k(-1) = 2 ( -1 + 1 ) = 2 ( 0 ) = 0

k(-1) = 0

x5 = f(-1) + g(-1) + h(-1) + k(-1)

    = 0  + 0 + 0 + 0

    = 0

Hence

x5 = 0

Volume of Pyramid = A*h/3 where A is the area of the base of the pyramid and h is the height of the pyramid. Write a C++ program that asks the user to enter the necessary information about the pyramid (note that the user would not know the area of the base of the pyramid, you need to ask them for the length of one of the sides of the base and then calculate the area of the base). Using the information the user input, calculate the volume of the pyramid. Next display the results (rounded to two decimal places). Example Output (output will change depending on user input): The area of the base of the pyramid is: 25.00 The height of the pyramid is: 5.00 The volume of the pyramid is: 41.67 *Pseudocode IS required for this program and is worth 1 point. The program IS auto-graded.

Answers

Answer:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

   double side, height;

   

   cout<<"Enter the length of one of the sides of the base: ";

   cin>>side;

   cout<<"Enter the height: ";

   cin>>height;

   

   double area = side * side;

   double volume = area * height / 3;

   

   cout<<"The area of the base of the pyramid is: "<<area<<endl;

   cout<<"The height of the pyramid is: "<<height<<endl;

   cout<<"The volume of the pyramid is: "<<fixed<<setprecision(2)<<volume<<endl;

   return 0;

}

Pseudocode:

Declare side, height

Get side

Get height

Set area = side * side

Set volume = area * height / 3

Print area

Print height

Print volume

Explanation:

Include <iomanip> to have two decimal places

Declare the side and height

Ask the user to enter side and height

Calculate the base area, multiply side by side

Calculate the volume using the given formula

Print area, height and volume (use fixed and setprecision(2) to have two decimal places)

Jason has a part time job in the office of a construction company and is also a student at a community college. He often works on his homework during times when he is not busy at work because the office computer contains the software he needs to do his assignments and he hasn't been able to afford to purchase the software for his own personal computer. Which of these unacceptable uses typically included in a user access policy might he most likely be engaging in?

Answers

Complete Question:

Jason has a part time job in the office of a construction company and is also a student at a community college. He often works on his homework during times when he is not busy at work because the office computer contains the software he needs to do his assignments and he hasn't been able to afford to purchase the software for his own personal computer. Which of these unacceptable uses typically included in a user access policy might he most likely be engaging in?

1.Using the network to download software for personal use

2.Disclosing personal information about employees

3.Copying of copyrighted material

4.Using a network account for a purpose not specified by the owner’s job description

Answer:

4.Using a network account for a purpose not specified by the owner’s job description

Explanation:

The office computer is meant to be used for the owner's purpose only.  By using the office computer to do his homework, even at a free hour, Jason is still violating his employer's asset for selfish purpose.  Jason could obtain permission from his manager to use the office computer for his homework for a temporary period, until he could "afford to purchase the software for his own personal computer."  The official permission can exempt him from being penalized for the violation.  A written permission is more ideal in this case.

CHALLENGE ACTIVITY 2.1.2: Assigning a sum. Write a statement that assigns total_coins with the sum of nickel_count and dime_count. Sample output for 100 nickels and 200 dimes is: 300

Answers

Answer:

Assuming python language:

total_coins = nickel_count + dime_count

Explanation:

The values of nickel_count and dime_count are added together and stored into total_coins.

Cheers.

Following are the code to the given question:

Program Explanation:

Defining a variable "nickel_count, dime_count" that initializes the value that is "100, 200" within it.In the next step, the "total_coins" variable is declared that initializes with 0.After initializing into the "total_coins" we add the above variable value and print its value.

Program:

nickel_count = 100#defining a variable nickel_count that holds an integer value

dime_count = 200#defining a variable dime_count that holds an integer value

total_coins = 0#defining a variable total_coins that initilize the value with 0  

total_coins = nickel_count + dime_count#using total_coins that adds nickel and dime value

print(total_coins)#print total_coins value

Output:

Please find the attached file.

Learn more:

brainly.com/question/17027551

When you use Word's Email option to share a document, you should edit the _____ line to let the recipient know the email is from a legitimate source.

Answers

Answer:

Subject line

Explanation:

Editing the subject line is very important so as to enable the recipient know the source of received the message (document).

For example, if a remote team working on a project called Project X receives a shared document by one member of team, we would expect the subject line of the email to be– Project X document. By so doing the legitimacy of the email is easily verified.

1| def saveUserProfile(firstName, lastName, age, height, country):
2| filename = lastName + firstName + ".txt"
3| outputFile = open(filename, "w")
4| print(lastName, file = outputFile)
5| print(firstName, file = outputFile)
6| print(country, file = outputFile)
7| print(height, file = outputFile)
8| print(age, file = outputFile)
9| outputFile.close()
Above is a function that takes five pieces of information about a user and saves that data to a file. We'll assume firstName, lastName, and country are strings, age is an integer, and height (expressed in meters) is a float.

Assume we call the function above with this line of code:

saveUserProfile("David", "Joyner", 30, 1.8, "USA")
After the function runs, what is name of the file that is created?

a. What is written on line 1 of that file? If there is no line 1 or if line 1 is blank, enter Nothing.
b. What is written on line 2 of that file? If there is no line 2 or if line 2 is blank, enter Nothing.
c. What is written on line 3 of that file? If there is no line 3 or if line 3 is blank, enter Nothing.
d. What is written on line 4 of that file? If there is no line 4 or if line 4 is blank, enter Nothing.
e. What is written on line 5 of that file? If there is no line 5 or if line 5 is blank, enter Nothing.

Answers

Answer:

Joyner

David

USA

1.8

30

Explanation:

def saveUserProfile(firstName, lastName, age, height, country):

This is the definition of function named saveUserProfile which accepts the following parameters:

firstNamelastNameageheightcountry

filename = lastName + firstName + ".txt"

When the file is created it will be named as the lastName and firstName string combined with .txt as extension. For example if the lastName contains the name string Joyner and firstName contains the name David then the file created to be written is named as JoynerDavid.txt

outputFile = open(filename, "w")

This statement uses open() method in write mode and uses outputFile object to access the file. "w" represents write mode i.e. file is opened in write mode to write on it.

a) Joyner is written on line 1 of that file because of the following statement of above function:

print(lastName, file = outputFile)

This statement prints the string stored in lastName i.e. Joyner. Here outputFile opens the file in "w" write mode and writes the last name to the first line of the file.

b) David is written on line 2 of that file because of the following statement of above function:

print(firstName, file = outputFile)

This statement prints the string stored in firstName i.e. David. Here outputFile opens the file in "w" write mode and writes the first name to the second line of the file.

c) USA is written on line 3 of that file because of the following statement of above function:

print(country, file = outputFile)

This statement prints the data stored in country i.e. USA. Here outputFile opens the file in "w" write mode and writes the country name to the third line of the file.  

d) 1.8 is written on line 4 of that file because of the following statement of above function:

print(height, file = outputFile)

This statement prints the value stored in height i.e. 1.8. Here outputFile opens the file in "w" write mode and writes the height value to the fourth line of the file.  

e) 30 is written on line 5 of that file because of the following statement of above function:

print(age, file = outputFile)

This statement prints the value stored in age parameter of function saveUserProfile i.e. 30. Here outputFile opens the file in "w" write mode and writes the age value to the fifth line of the file.  

What are the links between the operating systems, the software, and hardware components in the network, firewall, and IDS that make up the network defense implementation of the banks' networks.

Answers

Answer:

In several organizations, the operating system (OS) functions at the core of the personal computers in use and the servers. The OS ought to be secure from external threats to its stored data and other resources.

Explanation:

In this regard, Intrusion detection systems play a critical role in protecting the sensitive data, along with software firewalls. Hardware firewalls protect the hardware elements in the network (such as storage drivers etc), the IDS and as well as the IPS.

LAB: Miles to track laps. (PLEASE CODE IN PYTHON)
Instructor note:
Note: this section of your textbook contains activities that you will complete for points. To ensure your work is scored, please access this page from the assignment link provided in Blackboard. If you did not access this page via Blackboard, please do so now.
One lap around a standard high-school running track is exactly 0.25 miles. Write the function miles_to_laps() that takes a number of miles as an argument and returns the number of laps. Complete the program to output the number of laps.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
1.5
the output is:
6.00
Ex: If the input is:
2.2
the output is:
8.80
Your program must define and call the following function:
def miles_to_laps(user_miles)

Answers

Answer:

The program in python is as follows:

def miles_to_laps(user_miles):

     return (user_miles/0.25)

mile = float(input("Number of Miles: "))

print("Number of laps: ",end="")

print('{:.2f}'.format(miles_to_laps(mile)))

Explanation:

The first line defines the function miles_to_lap

def miles_to_laps(user_miles):

This line returns the equivalent number of laps

     return (user_miles/0.25)

The main method starts here

This line prompts user for input

mile = float(input("Number of Miles: "))

This line prints the string "Number of laps", without the quotes

print("Number of laps: ",end="")

This prints the equivalent number of laps to two decimal places

print('{:.2f}'.format(miles_to_laps(mile)))

The program converts the number of miles enters by the user to an equivalent measure in laps is written in python 3 thus :

def miles_to_laps(miles):

#initialize the function which takes in a single parameter

return (miles/0.25)

mile_value= eval(input("Number of Miles: "))

#allows user to input a value representing distance in miles

print("Number of laps: ",end="")

#display Number o laps with cursor on th same line

print('{:.2f}'.format(miles_to_laps(mile_value)))

#pass user's vlaue to the function to Obtain the lap value.

A sample run of the program is attached.

An organization is struggling to differentiate threats from normal traffic and access to systems. A security engineer has been asked to recommend a system that will aggregate data and provide metrics that will assist in identifying malicious actors or other anomalous activity throughout the environment. Which of the following solutions should the engineer recommend?a. Web application firewall b. SIEM c. IPS d. UTM e. File integrity monitor

Answers

Answer:

b. SIEM.

Explanation:

In this scenario, an organization is struggling to differentiate threats from normal traffic and access to systems. A security engineer has been asked to recommend a system that will aggregate data and provide metrics that will assist in identifying malicious actors or other anomalous activity throughout the environment. The solution the engineer should recommend is the Security information and event management (SIEM).

Security information and event management is an enterprise software that provides a holistic view and analyzes activity from various resources across an entire information technology (IT) infrastructure.

The SIEM is used to aggregate important data from multiple source such as servers, routers, firewall, switches, domain controllers, antivirus software and analyzes the data to detect any threat, deviation from the norm, as well as investigate in order to take appropriate actions. Some examples of the SIEM system are IBM QRadar, Splunk, LogRhythm etc.

Write an object oriented Python script that does the following:
1. Connects to the Sakila database (mysql)
2. Adds a record to the database
3. Retrieves and displays a dataset that shows the newly added record

Answers

Answer:

ESCALAS MAYORES (D, E, G, A, B) Porfavor necesito ayuda,te lo agradecería muchísimo!!

Es urgente

Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word is a sequence of one or more non-space characters (any character other than ' ').

Answers

Answer:

def word_count(words):

   return len(words.split(" "))

print(word_count("This is Python."))

Explanation:

*The code is in Python.

Create a function called word_count that takes one parameter, words

Split the words using split function, use " " for the delimiter, and return the length of this using len function.

Note that split function will give you a list of strings that are written with a space in the words. The len function will just give you the length of this list.

Call the word_count function with a string parameter and print the result.

For the Python program below, will there be any output, and will the program terminate?
while True: while 1 > 0: break print("Got it!") break
a. Yes and no
b. No and no
c. Yes and yes
d. No and yes
e. Run-time error

Answers

the answer is e ......
The answer is E ,
hope it’s help

Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. Its major concern is the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop. Which of the following would help the firm enforce access controls and storage guidelines on its laptops?
a. Anenterprise search software
b. A binary search tool
c. A perceptive software pack
d. A Domain search engine

Answers

Answer:

a. An enterprise search software.

Explanation:

In this scenario, Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. In order to prevent the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop, Rosetta technologies should use an enterprise search software.

Enterprise search software is a computer application which is typically used to make relevant data from sources, such as a database, file system and intranet searchable to a specific or defined group of people.

An enterprise search software would help the firm enforce access controls and storage guidelines on its laptops.

On enterprise search software, there are basically two (2) ways to enforce access controls as a security policy on users;

1. Early binding: at the index stage, permissions are analyzed and ascribed to each document in the enterprise search software.

2. Late binding: it involves the process of analyzing permissions and ascribing them to each document at the query stage in the enterprise search software.

Velma is graduating from Ashford at the end of next year. After she completes her final class, she will reward herself for her hard work with a week-long vacation in Hawaii. But she wants to begin saving money for her trip now. Which of the following is the most effective way for Velma to save money each month?

Answers

This question is incomplete because the options are missing; here are the options for this question:

Which of the following is the most effective way for Velma to save money each month?

A. Automatically reroute a portion of her paycheck to her savings account.

B. Manually deposit 10% of her paycheck in her savings account.

C. Pay all of her bills and then place the remaining money in her savings account.

D. Pay all of her bills and then place the remaining money in her piggy bank.

The correct answer to this question is A. Automatically reroute a portion of her paycheck to her savings account.

Explanation:

In this case, Velma needs to consistently save money for her vacation as this guarantees she will have the money for the trip. This means it is ideal every month she contributes consistently to her savings for the vacation.

This can be better be achieved by automatically rerouting a part of her paycheck for this purpose (Option A) because in this way, every month the money for the vacations will increase and the amount of money will be consistent, which means Velma will know beforehand the money she will have for the vacation. Moreover, options such as using a piggy bank or paying the bills and using the rest for her savings, do not guarantee she will contribute to the savings every month, or she will have the money she needs at the end.

Other Questions
By what method did the Securities and Exchange Commission try to reform the stock market in the 1930s? Nationalizing the New York Stock Exchange Distributing stocks to all unemployed Americans Monitoring all stock transactions Establishing mandatory sentences for traders convicted of fraud. Fill in the table using this function rule.y=-6x-1 Which describes oxygen content as Earth evolved over time? Oxygen levels sharply declined about 400 million years ago. Oxygen levels stay above 15 percent starting 200 million years ago Oxygen levels remain below 5 percent starting 1000 million years ago. Oxygen levels raise significantly between 1000 and 700 million years ago. The value of Mike Jacksons shares in the New Frontiers Technology Fund is $51,400. The management fee for this particular fund is 0.80 percent of the total asset value. Calculate the management fee Mike must pay this year. (Round your answer to 2 decimal places.) Help PLZ!!! Which statement accurately represents the arrangement of electrons in Bohrs atomic model? -Electrons move around the nucleus in fixed orbits of equal levels of energy. -Electrons move around the nucleus in fixed orbits of increasing levels of energy. -Electrons move randomly in the relatively large space surrounding the nucleus. -Electrons vibrate in fixed locations around the nucleus. The legal document identifying the rights and obligations of both the bondholders and the issuer is called the bond ______. This document describes the number of bonds authorized, their par value, and the contract interest rate. agreement document indenture article Grace starts with 100 milligrams of a radioactive substance. The amount of the substance decreases by 14 each week for a number of weeks, w. She writes the expression 100(14)w to find the amount of radioactive substance remaining after w weeks. Ryan starts with 1 milligram of a radioactive substance. The amount of the substance decreases by 40% each week for a number of weeks, w. He writes the expression (1 0.4)w to find the amount of radioactive substance remaining after w weeks. Use the drop-down menus to explain what each part of Graces and Ryans expressions mean. Under conditions for which the same roojm temperature is mainteined bt a heating or cooling system, it is not uncommon for a person to feel chilled in the winter but comfortable in the summer. Provide a plausible explanation for this situation (with supporting calculations) y by considering a room whose air temperature is maintained at 20 Dagree C throughout the year, while the walls of the room are nominally at 27 Dagree C and 14 Dagree C in the summer and winter, respectively. The exposed surface of a person in the room may be assumed to be at a temperature of 32 Dagree C throughout the year and to have an emissivity of 0.90. The coefficient associated with heat transfer by natural convection between the person and the room air is approximately 2 W/m2 Middot K. DeLong Corporation was organized on January 1, 2017. It is authorized to issue 14,500 shares of 8%, $100 par value preferred stock, and 450,000 shares of no-par common stock with a stated value of $3 per share. The following stock transactions were completed during the first year.Jan. 10 Issued 84,500 shares of common stock for cash at $6 per share.Mar. 1 Issued 5,150 shares of preferred stock for cash at $110 per share.Apr. 1 Issued 23,500 shares of common stock for land. The asking price of the land was $91,000. The fair value of the land was $81,500.May 1 Issued 84,000 shares of common stock for cash at $5.00 per share.Aug. 1 Issued 10,000 shares of common stock to attorneys in payment of their bill of $39,500 for services performed in helping the company organize.Sept.1 Issued 11,500 shares of common stock for cash at $7 per share.Nov. 1 Issued 2,000 shares of preferred stock for cash at $111 per share.Journalize the transactions. Triangle K M L is shown. Line L K extends through point J to form exterior angle J K M. Which angle is an adjacent interior angle to JKM? JKL MKL KLM LMK The mean one-way commute to work in Chowchilla is 7 minutes. The standard deviation is 2.4 minutes, and the population is normally distributed. What is the probability of randomly selecting one commute time and finding that: a). P (x < 2 mins) _____________________________ b). P (2 < x < 11 mins) _____________________________ c). P (x < 11 mins) ________________________________ d). P (2 < x < 5 mins) _______________________________ e). P (x > 5 mins) 1. What number comes next in this sequence?483, 759, 264, 837,?A) 487B) 592C) 375D) 936 What was brinkmanship and what was the result of the policy in the 1950s? The city park department is planning to enclose a play area with fencing. One side of the area will be against an existing building, so no fence is needed there. Find the dimensions of the maximum rectangular area that can be enclosed with 800 meters of fence. Include the units. Identify how many distinct classes there were in Rome I really need this ASAP. There are 25 students in a class. How many ways can the teacher (randomly) pick two students for the lead roles in the class play? What is the image of the point by (-5,3) under a 270 rotation about the point (-7,-3) In order for a dead organisms remains to become fossilized certain conditions must be met. summarize three of these conditions. How did political events impact young people, and how did the youth culture impact the politics of the period? What caused the rise of student radicalism in the 1960s and 1970s? In a perpetual average cost system:_________ a) A new weighted-average unit cost is calculated each time additional units are purchased. b) The cost allocated to ending inventory is generally the same as it would be in a periodic inventory system. c) The moving-average unit cost is determined following each sale. d) The average is determined by dividing the total number of units sold by the cost of units purchased during the period.