A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate the other’s certificate c. A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection d. A scenario in which the certificate’s issuer and subject fields hold the same information

Answers

Answer 1

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

Answer 2

Answer:

A construct of systems, personnel, applications, protocols, technologies and policies that work together to provide a certain level of protection

Explanation:

A trust domain is a certificate that entities or users gain and is granted by a trusted domain this is that when you enter another software or other systems you will be recognized as a trusted character or user and gives protection between systems and softwares and provides protection for the users.


Related Questions

Differentiate Between register and Memory location (

Answers

Answer:

Register-it contains all the instructions that are present in the processor.

Memory location- it is the particular memory address where the data is stored.

Explanation: Difference between register and memory location are as follows :-

Register are the found in the CPU internal storage and memory location is present on the RAM.Registers are faster in movement as compared to the memory location.Register has the capacity of holding of less data as compared to the memory location which can store data in large amount .

The Task Manager can be used ot track running _________________ .

Answers

Answer:

Processes

Explanation:

The Windows Task Manager helps us track processes running on the system.

It can be invoked by pressing Ctrl+Alt+Delete and selecting the 'Task Manager' option or by right clicking on the status bar and choosing 'Task Manager' menu item. Besides the running process name it also provides supplementary information about the process such as :

CPUMemoryDiskNetwork

Develop a program so that the output will produce the following :
the circumference of the circle is 33.912
the area of the circle is 91.5624.

Answers

Answer:

 #include <iostream>

using namespace std;

int main()

{

  float radius = 5.4;

  float circumference = 2 * 3.14 * radius;

  float area = 3.14 * radius * radius;

 

  cout<<"the circumference of the circle is "<<circumference<<endl;

  cout<<"the area of the circle is "<<area<<endl;

  return 0;

}

Explanation:

Include the library iostream for using the input/output instructions.

create the main function and define the variable with value. Then,

use the formula to calculate the circumference and are of circle.

[tex]circumference = 2*\pi *radius[/tex]

[tex]area = \pi * radius^{2}[/tex]

here, choose [tex]\pi = 3.14[/tex]

after that, display the result.

Note: All variable define in float type.

What would display if the following pseudocode was coded and executed? Declare String user = "Martha and George" Declare Integer number Set number = length(user) Display number

Answers

Answer:

 17

Explanation:

length() is the function which is used to find the number of character the string.

character include space as well.

initially declare the string user with input  "Martha and George".

then call length function which count the character within the double quotes""

total number is 17 (15 letters and 2 spaces).

and it then store in the integer.

finally print the value.

Therefore, the output is 17.

What is the minimum valid subscript value for array a?
#define MAX 50
int a[MAX], i, j, temp;
A. 0
B. 1
C. Any negative number
D. There is no minimum
E. None of the above

Answers

Answer:

The answer to this question is A. 0.

Explanation:

In this segment of code #define MAX 50 is used.It is a pre-processor directive and in pre processor directive it is a MACRO means whenever the compiler encounters the word MAX in the execution it replaces MAX with 50.

So the size of the array becomes 50 and the indexing starts from 0 and upto 49.

What is the output frequency for a counter circuit that contains 12 flip-flops with an input clock frequency of 20.48 MHz?

Answers

Answer:

5KHz

Explanation:

The formula for calculating the output frequency when the input frequency and the number of flip-flops are given.

[tex]out put Frequency = \frac{in put frequency}{2^{N}}[/tex]

here, N is the number of filp-flops.

Note: The input frequency must be in Hz.

first convert given input frequency (MHz) into HZ.

[tex]in put frequency = 20.48 *10^{6}Hz[/tex]

apply the formula:

[tex]out put Frequency = \frac{20.48*10^{6}}{2^{12}}[/tex]

which comes out to be 5000Hz or 5KHz.

Assume that x is an integer variable. Which of the following represents the memory address where x is stored? E) None of the Above A) x B) &x C) *x D) 2**

Answers

Answer: (B) &x

Explanation:

Here whenever any variable is stored let it be integer, char, float it is always stored in a memory location assigned as '&'. Here the location where x is stored is denoted as '&x' which means memory address of x. *x means the pointer which is pointing to the memory address of x.

A five-digit number is entered through the keyboard. Write a program to obtain the reversed number

Answers

Answer:

 #include<iostream>

using namespace std;

int main(){

   int number;

   cout<<"Enter the five-digit number: ";

   cin>>number;

   int result = 0;

   while(number != 0){

       int remainder = number % 10;

       result = result*10 + remainder;

       number = number/10;

   }

   cout<<"The reverse Number is: "<<result<<endl;

   return 0;

}

Explanation:

first, include the library iostream for using the input/output.

Then, create the main function and declare the variables.

Print the message on the screen by using the instruction cout.

Store the value enter by the user in the variable by using cin instruction.

Take the while which runs until the number not equal to zero.

In the while, first, take the remainder of the number by using the operator '%'.

for example:

number = 123 % 10, it gives the value 3 which is the remainder.

after that, we write logic to reverse the number:

initially, remainder =3 and result=0

result = result * 10 + remainder

so, the result will be 3

after that, suppose remainder =2 and result=3 (previous calculated)

result = 3* 10 +2.

so, the result will be 32. so the number is reversed. we store the number in reverse order.

This process continues until the condition is true.

After that, print the output.

A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory. How many bits are needed for the opcode?

Answers

Answer:

8 bit

Explanation:

we have given that the instruction consist 150 different operation

we know that [tex]2^{8}[/tex] = 256

but we have only 150 operation

so now we check [tex]2^{7}[/tex]=128

which is less than 150 so we need 8 bit for the opcode

so the 8 bit are needed for the opcode because when we take 7 bit then [tex]2^{7}[/tex]=128 which is less than 150 and not useful so we need 8 bit

The true or false questions.

The command: find -empty -type f -exec rm { } \; will remove all empty regular files, starting from the current directory

Answers

Answer:

true

Explanation:

The command:

find -empty -type f -exec rm { } \;

carries out the following steps.

1) Finds all the empty files in the current directory and its subdirectories.

2) For each of the identified files, it executes the command specified as the parameter to exec option,namely, rm <filename>.

So effectively it removes all empty files in the directory tree starting at the current directory.  

The AND operator is written as two ____.

a.
asterisks

b.
equal signs

c.
ampersands

d.
plus signs

Answers

Answer:

ampersands

Explanation:

In the programming the AND operator is denoted as '&&' , two ampersands.

it is used to between two conditions and give Boolean result.

It has four possible result:

first condition TRUE  second TRUE, result TRUE

first condition TRUE  second FALSE, result FALSE

first condition FALSE second TRUE, result FALSE

first condition FALSE second FALSE , result FALSE

For example:

(5 > 0 && 7 > 4):   it gives the result TRUE because both are true.

5 > 8 && 7 > 4):   it gives the result FALSE because one is false.

The condition that is tested by a while loop must be enclosed in parentheses and terminated with a semicolon



True False

Answers

Answer:

False

Explanation:

while loop is used to execute the statement again and again until the condition is TRUE.

Syntax:

initialization;

while(condition)

{

   statement;

}

we write condition within the parentheses but without terminate with the  semicolon.

Therefore., the answer is False

a. Is there any functional difference between the class being instantiated in the following two ways? Balanced bal = new Balanced ("abc", "xyz"); Balanced bal = new Balanced ("cab", "zxy"); b. Is there any functional difference between the class being instantiated in the following two ways? Balanced bal = new Balanced ("abc", "xyz"); Balanced bal = new Balanced ("abc", "zxy"); c. Is there any functional difference between the class being instantiated in the following two ways? Balanced bal = new Balanced ("abc", "xyz"); Balanced bal = new Balanced ("xyz", "abc"); d. What type is pushed onto the stack? A char? An int? An integer? explain. e. Under which circumstances is the first opeation performed on the stack (not counting the new operation) the top operation? f. What happens if the string expression, that is passed to the test method, is an empty string?

Answers

Answer:

A,B,C -NO

D-Value type like int,char..

E.pop

D. it throws null exception

Explanation:

(A,B,C)There is no functional difference but  as the values passed to the parameterized constructor is different so you will get different outputs but functionality of the class didn't change  

(D) stack is a data structure which stores value types where as heap stores object types.In.stack actual value of the variable stored and heap address of the object stored

(E)the top operation on stack is always pop once we inserted the elements in a stack.if there are no elements in stack pop results null

(D) if the string we passed is null or empty to the test method it returns exception we need to handle that

The following JavaScript program is supposed to print: 1 by 4 by 9
on a single line by itself. Unfortunately the program contains at least eight mistakes. Write the corrected line beside the line in error.

var N; // Text
N := 1;
document.writeln( N );
document.writeln( “ by “);
document.writeln( “N + 3”);
document.writeln( “ by “ );
document.writeln( N + 5);

Answers

Answer:

var N; // Text

N = 1;

document.write( N );

document.write(" by ");

document.write(N + 3);

document.write(" by ");

document.write(N + 8);

Explanation:

var N; // Text

N = 1;

document.write( N );

document.write(" by ");

document.write(N + 3);

document.write(" by ");

document.write(N + 8);

The general case in a recursive function is the case for which the solution is obtained directly.

True

False

Answers

Answer: False.

Explanation:

The general case of recursive function is when the solution is obtained recursively by simplification at each step.

However, it is the base case in a recursive function when the solution is obtained directly.

The general case must be reducible to base to arrive at a solution else the recursion would be a infinite recursion.

The Windows 8 file management interface is called _____.

A. Windows Manager

B. File Browser

C. File Manager

D. File Explorer

Answers

Answer:

D. File Explorer

Hope that helps!

Write a JAVA program to sort a given array of integers (1 Dimensional) in ascending order (from smallest to largest). You can either get the array as input or hardcode it inside your program.

Answers

Answer:

import java.util.Arrays;

public class sort{

    public static void main(String []args){

       int[] arr = {2,6,9,1,5,3};

       int n = arr.length;

       Arrays.sort(arr);

       for(int i=0;i<n;i++){

          System.out.println(arr[i]);

       }    

    }

}

Explanation:

first import the library Arrays for using inbuilt functions.

create the main function and define the array with elements.

then, use the inbuilt sort function in java which sort the array in ascending order.

syntax:

Arrays.sort(array_name);

then, use for loop for printing the each sorting element on the screen.

How do you write a computer program to convert a decimal number into binary, octal, and hexadecimal?

Answers

Answer:

#include <iostream>

using namespace std;

void hexadecimal(int dec)

{    

   char hexa[100];// character array to store hexadecimal number.

   int i = 0;

   while(dec!=0)

   {  

       int digit  = 0;

       digit = dec % 16;// storing remainder.

       if(digit < 10)//condition

       {

           hexa[i] = digit + 48;//storing digit according to ascii values.

           i++;

       }

       else

       {

           hexa[i] = digit + 55; //storing respective character according to ascii values..

           i++;

       }

       dec = dec/16;

   }

     cout<<"The corresponding Hexadecimal number is :- ";

   for(int j=i-1; j>=0; j--)// printing in reverse order .

       cout << hexa[j];

       cout<<endl;

}

void Binary(int dec)

{

   int bin[32];// integer array to store binary values.

   int i = 0;

   while (dec > 0) {

 

       bin[i] = dec % 2;// storing remainder

       dec = dec / 2;

       i++;

   }

 cout<<"The corresponding Binary number is :- ";

   for (int j = i - 1; j >= 0; j--) // printing in reverse order

       cout << bin[j];

       cout<<endl;

}

void Octal(int dec)

{

   int oct[100];// integer array to store octal values.

   int i = 0;

   while (dec != 0) {

       oct[i] = dec % 8;// storing remainder

       dec = dec / 8;

       i++;

   }

 cout<<"The corresponding Octal number is :- ";

   for (int j = i - 1; j >= 0; j--) // printing in reverse order

       cout << oct[j];

       cout<<endl;

}

int main() {

   int d,bin,oct,hex;

   cout<<"Enter decimal number"<<endl;

   cin>>d;//taking input.

   Binary(d);

   Octal(d);

   hexadecimal(d);

   return 0;

}

OUTPUT:-

Enter decimal number

10

The corresponding Binary number is :- 1010

The corresponding Octal number is :- 12

The corresponding Hexadecimal number is :- A

Enter decimal number

256

The corresponding Binary number is :- 100000000

The corresponding Octal number is :- 400

The corresponding Hexadecimal number is :- 100

Explanation:

I have built 3 function of type void Hexadecimal,Binary,Octal all the functions take decimal integer as argument.They print their respective number after conversion.

So main approach is that :-

1.Take an array to store the digit on dividing.

2.Find the remainder on dividing it by corresponding number (for ex:- if binary divide by 2).

3.Store each remainder in the array.

4.Divide the number until it becomes 0.

5.Print the array in reverse.

write a program which capitalize every character after full stopin a given sentence

Answers

Answer:

#include <bits/stdc++.h>//header file which includes most of the libraries..

using namespace std;

int main() {

   char st[500];//character array of length 500..

   cin.getline(st,499);//taking input of the text.

   for(int i=0;st[i];i++)

   {

       if((st[i]=='.')&& (i!=strlen(st)-1))//condition

       {

          st[i+1]= toupper(st[i+1]);//converting to upper case.

       }

   }

   cout<<st<<endl;//printing the string..

return 0;

}

Input:

i am .the .great .gambler.i am going gamble everything

Output:

i am .The .Great .Gambler.I am going gamble everything

Explanation:

I have taken a character array of size 500.

Taking input as a line.

If full stop encounters then converting the character to uppercase if it exists.

Printing the output.

What is ment by WCF services in asp.net?How does it help in creating web pages?

Answers

Answer:

WCF -  Windows Communication   Foundation

Explanation:

WCF stands for Windows Communication   Foundation.

The first version of WCF is released as   a part of .NET 3.0.The later versions are 4.0 and   4.5.

WCF is used to build distributed applications.   Distributed application is an application that where   parts of it run on two or more systems.  

For example,  

We have a web application running on one server. If   this web application is consuming a web server   which is running on another server, then this  

application is called distributed application.

The programmers can also build 3-tier web   application. The 3-tiers are,

          1. Presentation tier

          2. Business tier

          3. Data Access tier

If all 3 tiers are deployed on same machine,   scalability can be an issue, if more number of users   try to access the application.  

If we deploy each tier on different machines, then it   can handle multiple requests without degrading   performance of an application.

WCF is also used to build interoperable applications.  An interoperable application is an application where   one application can communicate with any other   application that is built on any platform.

So, the two advantages of using WCF are:

An enterprise application can use the services  

provided by other.  

we can have better scalability.  

Earlier, we used to have web services and .NET   Remoting to build distributed applications.  

Web service was used to exchange messages in   XML format using HTTP protocol. A .NET remoting was used to exchange messages   in binary format using TCP protocol.

Microsoft unified these communicating technologies   and named it as WCF.

When a user process is running and an instruction is executed that requests a file-open operation, which of the following event will occur? (A) Supervisor call (B) Trap (C) I/O interrupt (D) Fault (E) None of the above

Answers

Answer:e

Explanation:

Because it will automatically work

What is the difference between a sequential access tile and a random access file?

Answers

Answer: Sequential access file enables the computer system to read or write file in sequential manner whereas random access file enables to read or write randomly in a data file.

Explanation:

Sequential file access is faster than random file access, however random access uses index searches. In random access higher number of seek operations are involved whereas in sequential access the number of seek operation is less.

What does the /etc/shadow file contain?

Answers

Answer:

This file contains encrypted password and other information also such as password expiration values,account and other confidential stuff etc.

Explanation:

In linux this file contains passwords and confidential stuff.

This file is only readable that to by the root account and hence it is secured.

When you create an array variable, memory space is automatically reserved.

True

False

Answers

Answer:

The answer is true.

Explanation:

An array is a collection of data of the same type. It is used to handle a number ''n'' of elements in common, either of types defined by the language ( int, float, string, etc) as well as those defined by the programmer.

A one dimensional array is a structured data type that is made up of a finite, ordered collection of data of the same type.

A vector, also called a one dimensional array, is a data structure that allows you to group elements of the same type and store them in a single block of memory together, one after the other. This group of elements is identified by the same name and the position in which they are found. Ther first position of the array is position zero.

We could group in an array a series of elements of integer type, floating, etc. For example:

int a [5]; (vector of 5 integers)

float b[5]; (vector of 5 floating)

int a [] = {5,6,7,8,9};

float b [] = {5.1,5.2,5.3,5.4,5.5};

Since there are 5 elements in each array, automatically 5 memory spaces will be assigned to each vector, but if I try to create the vector of the form int a [], the compiler will show an error, because I did not indicate the size of the vector and I did not initialize its elements.

An expression tag contains a scripting language expression thatis evaluated.TrueFalse

Answers

Answer: True

Explanation:

Yes, an expression tag contains a scripting language expression that is evaluated. As, expression tag is used to display the output of the data in the generated page. If data is placed in expression tag then, it prints on the output stream and then it automatically convert data into the string and the output are displayed.

What will be the value of input_value if the value 5 is input at run time?
cin >> input_value;
if (input_value > 5)
input_value = input_value + 5;
else if (input_value > 2)
input_value = input_value + 10;
else
input_value = input_value + 15;

Answers

Answer:

15

Explanation:

The if else state is used for checking the condition and if the condition is TRUE and program can execute the statement  within the if else.

Initially input_value is 5

then the if statement check the condition 5>5, condition FALSE because 5==5

it not less than 5.

then program move to else if and check condition 5>2, condition TRUE.

then, input_value = 5 + 10=15 execute and update the value to 15.

After that, program terminate the if else statement.

Therefore, the answer is 15.

What operator is used to create a validation rule? A. – B. / C. < or > D. +

Answers

Answer:

A

Explanation:BECAUSE

Relational operators, specifically < and >, are used to create validation rules that data must satisfy when being entered or modified. They set conditions such as requiring a quantity to be at least one, as in >=1.

The operator used to create a validation rule is C. < or > which are relational operators. These operators are essential in forming expressions that set the conditions data must meet to be considered valid. For instance, a typical validation rule in an Order Entry form might be that the quantity entered must be equal to or greater than one. In this case, the rule would be represented as >=1.

In database systems and programming, the proper use of relational operators, such as <, >, <=, and >=, is critical for ensuring accurate querying and data integrity. These operators allow for comparison between values, ensuring that the entered data fits within the specified parameters defined by the validation rules.

The class at the top of exception class hierarchy is ..........................
A) ArithmeticException
B) Throwable
C) Class
D) Exception

Answers

Answer:

B) Throwable

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

There are a wide range of classes on the exception class hierarchy. All the way on the top is the Objects Class but since that is not an available answer we will move on to the next one. The next one is the Throwable class. therefore that is the answer.

**Exception is after Throwable , and Arithmetic Exception is at the bottom.... everything is a class so that is not a part of the hierarchy **

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

what are the elements of a Software Process Improvement (SPI) modle?

Answers

Answer: Current Situation Evaluation, Improvement Planning, Improvement Implementation, Improvement Evaluation are the elements of SPI

Explanation:

SPI modle plans to achieve a desired task of software development in terms of Current Situation Evaluation, Improvement Planning, Improvement Implementation, Improvement Evaluation, with each having a specified and detailed role to play in the software development.

A B-tree can be ____ in three ways: inorder, preorder, and postorder.

A.
copied

B.
reversed

C.
traversed

Answers

Answer:

traversed

Explanation:

B-tree is a self balancing tree and it is a data structure which allows insertion, deletion operations.

inorder, preorder and post order, they all are traversing algorithms in the tree data structure.

inorder: first print left, then root and then right.

preorder: first print root, then left and then right.

postorder: first print left, then right and then root.

Therefore, the answer is traversed.

Other Questions
b. Suppose 20% of all balls produced by a particular manufacturer are less than 1.680 inches in diameter, and assume that the number of such balls, x, in a sample of two dozen balls can be adequately characterized by a binomial probability distribution. Find the mean and standard deviation of the binomial distribution. What is the difference between Special warranty deed vs general warranty deed When a company produces 10 items, it charges a price of $65 per product. When it produces 20 items, it charges a price of $60 per product. The cost to produce 10 items is $650, and the cost to produce 20 items is $1050. Based on this information, find the following:price functioncost functionrevenue functionprofit functionbreak even points ,maximum profitnumber of products to produce maximum profit Analyze the diagram below and complete the instructions that follow.If mZK = 82, find mZL, M2M, and mZN.A. m L = 82, m_M= 82, m N=98B. MZL = 82, mZM = 989, m N= 98C. mL = 98, mM= 82, m N= 98D. MZL = 98, mZM = 98, mZN= 82 Which is true of the 1912 presidential election?A. Southerners supported Roosevelt because he was antitrust.B. Big business supported Debs.C. Northerners supported Wilson because he was antiunion.D. Black Progressives supported Wilson. Who usually has the lowest alcohol elimination rate?A. Inexperienced drinkersB. Moderate drinkersC. Heavy drinkers The volume of a sample of hydrogen gas was decreased from 12.16 L to 5.45 L at constant temperature. If the final pressure exerted by the hydrogen gas sample was 5.09 atm, what pressure did the hydrogen gas exert before its volume was decreased? True or false? A codon is a group of three bases that can specify more than one amino acid. Hemisphere Corp. is considering a Build-Operator-Transfer (BOT) contract to construct and operate a large dam with a hydroelectric power generation facility in a developing nation in the southern hemisphere. The initial cost of the dam is expected to be $30 million, and it is expected to cost $100,000 per year to operate and maintain. Benefits from flood control, agricultural development, tourism, etc., are expected to be $2.8 million per year. At an interest rate of 8% per year, should the dam be constructed on the basis of its conventional B/C ratio? The dam is assumed to be a permanent asset for the country. What is the resting heart rate? What is the best time to take the resting heart rate pulse, and why? using the discriminant, how many solutions and what type of solution(s) does 3p-9p^2=6 have?a. 2; irrational b. 2; rational c. 1; rational d. no real solutions A compact minivan costs $16,000 with a residual value of $1,000. It has an estimated useful life of five years. If the minivan was bought on July 3, what would be the book value at the end of Year 1 using straight-line rate? A. $14,500 B. $16,000 C. $1,500 D. $12,500 In the presidential election of 1840: a. the Whigs employed political tactics pioneered by Democrats. b. the Democrats nominated three regional candidates, hoping to throw the election into the House of Representatives. c. the Democrats and Whigs both produced platforms that clearly laid out the parties positions on major public issues. d. the Whigs again nominated Henry Clay. e. voter turnout dropped dramatically because no popular candidate like Jackson ran. An electron in a magnetic field has a cyclotron frequency of 3.0x 10^12 Hz What is the magnetic fleld strength? (The mass of an electron is 9.1 x 10^-31 kg and the charge of an electron is 16x 10^-19C) A) 0.0093 T B) 110 T C) 12T D) 0.084 T Solve the following trigonometric equation for 0to2pi(a) cos(4x) - 9 sin(2x) + 4 = 0 What is the command to display the user name with which youhave logged in? Factor 7x3 - 28x2 + 3x - 12 Which of these statements or sentences best describe "The Migratory Bird Rule". Select one a. was promulgated by the EPA. b. prohibits hunters from shooting birds that migrate across states. c. was struck down by the Supreme Court in the late 1990s or early 2000. d. allows bird watchers to sue persons who kill or poison birds. Which operations involving complex numbers have solutions represented by point A on the graph? PLEASE HELP What are the advantages and disadvantages of the various collision resolution strategies for hashes?