Assume you have a PC attached to an Ethernet, and the PC has been turned off for days. Then, you turn the PC on, and after it boots, you try to fetch the web page www.cs.utdallas.edu. List all the packets that the PC will transmit over the Ethernet before the first message from the PC reaches www.cs.utdallas.edu.

Answers

Answer 1

Even though you pc is connected to Ethernet and switch off. I don’t see possible way to list down the web pages during off mode of desktop or laptop or workstation. We end user try to ping end user use to get designation tcpip address host not found or some negative reply.

So as result switch off computer or desktop which is connected to Ethernet there is not any possible to get the list of web pages access during that time. Packets are transmitted based on mac address.


Related Questions

Using a WHILE loop write a program that asks the user to guess your favorite number. The program should end when the user guesses correctly, but otherwise provides hints for guessing higher or lower. Use the Try/Except/Else structure to ensure that the user enters numbers. Name this program guessNumber.py

Answers

Answer:

fav_number=26

guess=0

while 0==0:

   try:

       guess=int(input('Enter your guess: '))

   except:

       print ('You have entered an invalid value.')

   else:

       if guess == fav_number:

           break

       elif guess>fav_number:

            print ('Try a smaller number.')

       elif guess<fav_number:

           print ('Try a larger number')

Explanation:

define a variable fav_number and set it to number. write an infinite while loop to read input from user. In try block get input from user, if user enters invalid input code in except block will be executed. For valid input

check if its greater than favorite number, if yes print try smaller number.check if its smaller than favorite number, if yes print try larger number.check if its equal to favorite number, break loop and exit

Loop-tee-loop LOL

...

Not funneh...

Python programming questions:
1. Assume the names variable references a list of strings. Write code that determines whether 'Dale' is in the names list. If it is, display the message 'Hello Dale'. Otherwise, display the message 'No Dale'.
2. Write a program that opens a specified text file then displays a list of all the unique words found in the file. Hint: Store each word as an element of a set.
3. Write a program that reads the contents of a text file. The program should create a dictionary in which the keys are the individual words found in the file and the values are the number of times each word appears. For example, if the word "the" appears 128 times, the dictionary would contain an element with 'the' as the key and 128 as the value. The program should either display the frequency of each word or create a second file containing a list of each word and its frequency.

Answers

Answer:

Following are the program in the Python Programming Language:

1.)

l=['Ruby','Dale','Kate']

n=input('Enter the name: ')

if(n in l):

   print('Hello {}'.format(n))

else:

   print('No {}'.format(n))

Output:

Enter the name: Dale

Hello Dale

2.)

file=open("text1.txt", "r+") #open file

str=file.read()  #read file

txt=str.replace('\n', ' ') #replace spaces

word=txt.split(' ') #split words in ' '

for words in word: #set for loop

   word2=' '

   for i in range(len(words)):  #set for loop

       if(words[i].isalpha()):  #set if statement

           word2 += words[i].lower()

   word[word.index(words)]=word2

while(' ' in word):  #set while loop

   word.remove(' ')  #remove spaces

st=set(word)

print('The ', len(st),' unique words which appears in document are ' \

     '(in no particular order): ')

for words in st:  #set for loop

   print('-', word)

file.close()  #close file

3.)

file=open("text1.txt", "r+") #open file

str=file.read()  #read file

txt=str.replace('\n', ' ') #replace spaces

word=txt.split(' ') #split words in ' '

for words in word: #set for loop

   word2=' '

   for i in range(len(words)):  #set for loop

       if(words[i].isalpha()):  #set if statement

           word2 += words[i].lower()

   word[word.index(words)]=word2

while(' ' in word):  #set while loop

   word.remove(' ')  #remove spaces

dic={}  #set dictionary

for words in word:  #set for loop

   if(words not in dic):  #set if statement

       dic[words]=1

   else:

       dic[words] +=1

print('\033[4m' + 'word   frequency' + '\033[0m')

for words in dic:

   print(format(words, '15s'), format(dic[words], '5d'))

file.close() #close file

Explanation:

1.) Here, we define the list data type variable 'l' then, set the variable 'n' and assign value by get input from the user,

we set if conditional statement and pass condition is that the variable 'n' is in the variable l then, print message.otherwise, we print No message.

2.) Here, we define the variable "file" in which we open file and save that file in it.

Then, we set variable st which read the file then we set the variable in which we apply the replace().

Then. we set variable in which we split the by suing split()

2.) Here, we define the variable "file" in which we open file and save that file in it.

Then, we set variable st which read the file then we set the variable in which we apply the replace().

Then. we set variable in which we split the by suing split()

Then, we apply all that given in the question.

Write a program that reads the contents of a text file. The program should create a dictionary in which the keys are the individual words found in the file and the values are the number of times each word appears. For example, if the word "the" appears 128 times, the dictionary would contain an element with 'the' as the key and 128 as the value. The program should either display the frequency of each word or create a second file containing a list of each word and its frequency.

Answers

Answer:

Answer:

'''

This is script makes use of dictionaries to get all the words in a file and the

number of times they occur.

'''

#section 1

import string

dic = {}

textFile=open("Text.txt","r")

# Iterate over each line in the file

for line in textFile.readlines():

   tex = line

   tex = tex.lower()

   tex=tex.translate(str.maketrans('', '', string.punctuation))#removes every punctuation  

#section 2

   new = tex.split()

   for word in new:

           if word not in dic.keys():

               dic[word] = 1

           else:

               dic[word] = dic[word] + 1

for word in sorted(dic):

   print(word, dic[word], '\n')

       

       

textFile.close()

Explanation:

The programming language used is python.

#section 1

The string module is imported because of the string operations that need o be performed. Also, an empty list is created to hold the words and the number of times that they occur and the file is opened in the read mode, because no new content is going to be added to the file.

A FOR loop is used to iterate through every line in the file and assigns each line to a variable one at a time, and each line is converted to lowercase and  punctuation is stripped off every word in each line.

This processing is needed in order for the program o accurately deliver the number of occurrences for each individual word in the text.

#section 2

Each line is converted to a list using the split function, this is done so that a FOR loop can iterate over each word. The FOR loop, iterates over each word in the list and the IF statement checks if the word is already in the dictionary, if the word id in the dictionary, it increases the number of occurrences, if it is not in the dictionary, it adds it to the dictionary and assigns the number 1 to it.

The words are then sorted just to make it look more organised and the words and the number of times that they occur is printed to the screen.

Here's a Python program that reads the contents of a text file, creates a dictionary with word frequencies, and then displays the frequency of each word:

```python

def count_word_frequency(file_path):

   word_frequency = {}

   # Open the file for reading

   with open(file_path, 'r') as file:

       # Iterate through each line in the file

       for line in file:

           # Split the line into words

           words = line.split()

           # Iterate through each word

           for word in words:

               # Remove any punctuation characters

               word = word.strip('.,!?;:"()[]{}')

               # Convert the word to lowercase

               word = word.lower()

               # Increment the count for this word in the dictionary

               word_frequency[word] = word_frequency.get(word, 0) + 1

   return word_frequency

def display_word_frequency(word_frequency):

   # Iterate through the dictionary and print each word and its frequency

   for word, frequency in word_frequency.items():

       print(f"{word}: {frequency}")

def main():

   file_path = input("Enter the path to the text file: ")

   word_frequency = count_word_frequency(file_path)

   display_word_frequency(word_frequency)

if __name__ == "__main__":

   main()

```

To use this program:

1. Save the code into a Python file (e.g., `word_frequency.py`).

2. Run the program.

3. Enter the path to the text file you want to analyze.

This program will read the text file, count the frequency of each word, and then display the frequency of each word in the console.

1. `count_word_frequency(file_path)` function:

  - This function takes a file path as input.

  - It initializes an empty dictionary called `word_frequency` to store word frequencies.

  - It opens the file specified by the file path in read mode using a `with` statement, ensuring that the file is properly closed after reading.

  - It iterates through each line in the file.

  - For each line, it splits the line into individual words using the `split()` method.

  - It then iterates through each word, strips any punctuation characters from the word, converts it to lowercase, and updates the count for that word in the `word_frequency` dictionary.

  - If the word is not already in the dictionary, it initializes its count to 1; otherwise, it increments its count by 1.

  - After processing all lines in the file, it returns the `word_frequency` dictionary containing the word frequencies.

2. `display_word_frequency(word_frequency)` function:

  - This function takes the `word_frequency` dictionary as input.

  - It iterates through the dictionary and prints each word along with its frequency.

3. `main()` function:

  - This function serves as the entry point of the program.

  - It prompts the user to enter the path to the text file they want to analyze.

  - It calls the `count_word_frequency()` function with the provided file path to calculate word frequencies.

  - It then calls the `display_word_frequency()` function to display the word frequencies to the user.

4. `if __name__ == "__main__":` block:

  - This block ensures that the `main()` function is only executed when the script is run directly, not when it's imported as a module in another script.

Overall, this program reads a text file, counts the frequency of each word, and displays the frequency of each word to the user.

Which of the following is true about cloud computing?
a. Cloud firms have limited capacity to account for service spikes.
b. Cloud computing is not as green as traditional computing.
c. Cloud firms are often located in warehouse-style buildings designed for computers, not people.
d. Cloud firms are usually crammed inside inefficiently cooled downtown high-rises.
e. Cloud computing firms often have data centers that are not designed to pool and efficiently manage computing resources.
29. Android is a software product developed by Google that allows cell phone manufacturers to control hardware and establish standards for developing and executing applications on its platform. Android is thus an example of a(n) _____.
a. operating system
b. programming language
c. user interface
d. embedded system
e. database management system

Answers

Answer:

The correct option to the following question is option:

(C).

29. (A).

Explanation:

Cloud firms or companies are those that provides us the facilities to store our important data and kept it in safety, they also provides more facilities such as storage, networking, intelligence, database, etc.

Cloud computing are the facility in which we keep our data safe and confidential by saving our data in drives.

Operating System are software which manages the software as well as hardware also, that's why this option is correct

Problem 2 Write a method that (a) returns an int[] , (b) takes in two sorted arrays (in descending order) and (c) returns an int [] with sorted values (in descending order) from the two sorted arrays. The method will also print out the number of compares done. int[] a = new int[]{18, 16, 15, 6, 2}; int[] b = new int[]{13, 12, 11, 7, 1}; public int[] sortArraysDes(int[] a, int[] b){ //your code here } The int[] returned should have all the integers from int[]a and int[]b in descending order.

Answers

Answer:

Following are the Program in the Java Programming Language.

//define class

public class Main

{

//define function to merge and sort array

public static int[] sort_Array(int[] a, int[] b)

{

//set integer variable and initialize values

int x = 0, y = 0, k = 0, num = 0;

int n = a.length;

int n1 = b.length;

//set integer type array

int[] ar = new int[n+n1];

//set while loop

while (x<n && y <n1)

{

num++;

num++;

//set if conditional statement

if (a[x] > b[y])

ar[k++] = a[x++];

else

ar[k++] = b[y++];

num++;

}

//set the while loop

while (x < n)

{

num++;

ar[k++] = a[x++];

}

//set the while loop

while (y < n1)

{

num++;

ar[k++] = b[y++];

}

//print the total compares done

System.out.println("Number of compares done: " + n);

//return array

return ar;

}

//define main method

public static void main(String[] args)

{

//declaration and the initialization of array

int[] a = new int[]{18,16, 15, 6, 2};

int[] b = new int[]{13, 12, 11, 7, 1};

int[] ar;

//call function

ar = sort_Array(a, b);

//print message

System.out.println("\nThe resultant array is: \n");

//set for loop to print array

for(int x=0; x<ar.length; x++)

{

System.out.print(ar[x] + " ");

}

}

}

Output:

Number of compares done: 5

The resultant array is:

18 16 15 13 12 11 7 6 2 1

Explanation:

Here, we define a class "Main" inside the class, define a function "sort_Array()"and pass two integer type array argument "a" and "b".

Set four integer type variables "x", "y", "k", and "num" and initialize them to 0.Set two integer type array "n", "n1" and initialize them the length of the array then, set integer type array variable "ar".Set the while loop then, set if conditional statement then, agin set while loop to sort array in descending order.Then, print the number of compares and return the value of the variable "ar".

Finally, define the main method inside it, we set two integer type array variable and initialize elements in them then, set the for loop to print the sorted elements of the array.

c++ Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words.

Answers

Answer:

The following are the program in the C++ Programming Language:

#include <iostream> //header file

#include <string>  //header file

#include <vector>  //header file

//name space

using namespace std;

//main function

int main() {

  vector<string> word; //set variable

  vector<int> c;  //set variable

  int s, counts = 0; //set variable

  string strng;  //set variable

  cout<<"Enter the size of string: "; //print message

  cin >> s; //get input

  cout<<"Enter the string: "; //print message

  for(int i = 0; i < s; ++i) {  //set for loop

     cin >> strng; //get input

     word.push_back(strng);

  }

  for(int i = 0; i < s; ++i) { //set for loop

         counts = 0;

         for(int j = 0;j<word.size();j++){ //set for loop

       if(word[j] == word[i]){ //set if statement

          counts++; //increament in counts

       }        

     }

      c.push_back(counts);

  }

  for(int i = 0; i < s; ++i) {

      cout << word[i] << " " << c[i] << endl;//print result

  }

  return 0;

}

Output:

Enter the size of string: 2

Enter the string: hello  sir

hello 1

sir 1

Explanation:

Here, we define three header files <iostream>, <String>, <vector> and namespace "std" after that we define main() method inside it.

Then, we set two vector type variables first one is string variable "word" and the second one is integer variable "c". Then we set two integer variable "s" and "counts" and variable "counts" assign to 0. Then, we get input from the user in variable "s" for the length of the loop. Then, we set for the loop inside it, we get input in the variable "strng" from the user. Then, we set the for loop for count the string repetition if any word comes again in the string then the value of count will increase. Finally, we set for a loop to print the result.

In this exercise we have to write a C++ code requested in the statement, like this:

find the code in the attached image

We can write the code in a simple way like this below:

#include <iostream>

#include <string>

#include <vector>

using namespace std;

//main function

int main() {

 vector<string> word; //set variable

 vector<int> c;  //set variable

 int s, counts = 0; //set variable

 string strng;  //set variable

 cout<<"Enter the size of string: "; //print message

 cin >> s; //get input

 cout<<"Enter the string: "; //print message

 for(int i = 0; i < s; ++i) {  //set for loop

    cin >> strng; //get input

    word.push_back(strng);

 }

 for(int i = 0; i < s; ++i) { //set for loop

        counts = 0;

        for(int j = 0;j<word.size();j++){ //set for loop

      if(word[j] == word[i]){ //set if statement

         counts++; //increament in counts

      }        

    }

     c.push_back(counts);

 }

 for(int i = 0; i < s; ++i) {

     cout << word[i] << " " << c[i] << endl;//print result

 }

 return 0;

}

See more about C++ at brainly.com/question/19705654

What is the critical path?
A. The path from resource to task that passes through all critical components of a project plan
B. The path between tasks to the projects finish that passes through all critical components of a project plan
C. The path from start to finish that passes through all the tasks that are critical to completing the project in the shortest amount of time
D. The path from start to finish that passes through all the tasks that are critical to completing the project in the longest amount of time

Answers

Answer:

Option C. The path from start to finish that passes through all the tasks that are critical to completing the project in the shortest amount of time

is the correct answer.

Explanation:

Critical path is the term used in Project management.It can be known by determining the longest stretch for dependent activities and the time required for them to complete.A method known as "critical path method" is used for Project modelling.All types of projects including aerospace, software projects, engineering or plant maintenance need Critical method analysis for the modeling of project and estimation.

I hope it will help you!

Imagine you are spending the weekend with your family in a location with ZERO technology- no phones, TV, computers, video, radio, etc. How will you spend your weekend? Describe some of the activities you will do to pass and enjoy the time. [250 - 300 words]

Answers

Answer:

easy. i've done this with my family before. take a bike or skateboard to the park with your family. maybe invite some friends over, or just spend the day at their house. this is obviously a good time to finish any home-work if you have any left. you can make a few extra bucks by doing some extra chores done (just make sure to tell your parents about it first;)). i hate not having technology, but i mean it's not the end of the world.

Explanation:

Nowadays, we rely on technology heavily. Because of this, it can be difficult to imagine what we would do without it. However, avoiding technology for a few days can be an enriching experience.

There are many things that you can do with your family without the use of technology. For example, if you are at a different location and there is nature around, you can go camping. You can make a fire to cook, swim, look at the stars and hike. If you are in the city, you can go to a park and read, or play a sport. You can also take advantage of this experience to talk more to your family and get to know them better.

Write a program that takes nouns and forms their plurals on the basis of these rules:
a. If noun ends in "y", remove the "y" and add "ies".
b. If noun ends in "s", "ch", or "sh", add "es".
c. In all other cases, just add "s".
Print each noun and its plural. Try the following data:
chair dairy boss circuis fly dog church clue dish

Answers

Answer:

def nounToplural(tex):

   import re

   

   text = tex.split()

   new = []

   for word in text:

       if re.findall(r"y\b", word):

           word = re.sub(r"y\b", 'ies' ,word)

           new.append(word)

       

       elif re.findall(r"ch\b", word):

           word = re.sub(r"ch\b", 'ches' ,word)

           new.append(word)

       elif re.findall(r"sh\b", word):

           word = re.sub(r"sh\b", 'shes' ,word)

           new.append(word)

       elif re.findall(r"s\b", word):

           word = re.sub(r"s\b", 'ses' ,word)

           new.append(word)

       else:

           word = word + 's'

           new.append(word)

   result = []

   for i in text:

       for j in new:

           if new.index(j) == text.index(i):

               result.append( (i,j) )

           

           

   print(result)

str = "chair dairy boss circuis fly dog church clue dish"

nounToplural(str)

Explanation:

We made use or Regular Expressions which is simply a special sequence of characters that helps you match or find other strings or sets of strings, by using a specialized syntax held in a pattern.

Firstly, define the function and import the regular expression module, split the text into a list and create an empty list to hold the plural list.

For every word in the list  we check with IF statements and regular expressions to find out what they end with.

 if re.findall(r"y\b", word):

           word = re.sub(r"y\b", 'ies' ,word)

           new.append(word)

The above IF block checks if a noun ends with 'y', if it does it replaces the 'y' with 'ies' and ads it to the new list.

If it does not, ot moves to the next IF/ELIF block.

In the ELIF blocks carry out a  a similar operation for "s", "ch", or "sh", in order to add "es".

Finally, 's' is added to all other cases using the ELSE block which traps any noun that did not fall under the IF or any of the ELIF blocks.

This last part of the code prints both list side by side and passes them to a new list result which is printed to the screen

result = []

   for i in text:

       for j in new:

           if new.index(j) == text.index(i):

               result.append( (i,j) )

           

           

   print(result)

I called the function and passed the string you provided in your question and attached the result of the code.



Creating parts that are interchangeable in manufacturing terms is key to the ____ line

Answers

Answer:

Assembly line.

Explanation:

The interchangeable parts was a game-changing concept for the manufacturing industry during the Industrial Revolution.

It was first introduced by Eli Whitney, also the inventor of the Cotton Gin, and later was perfected by Henry Ford, who was the first to create a continuous moving assembly line. The Interchangeable parts are identical pieces created from a master model and are so similar to each other, that they can fit into any line of production of the same kind.

Thanks to these advances, the manufacturing process across all industries could be now faster, more cost-efficient, and profitable.

Assure that major, minor, sub1 and sub2 each contain four digit numbersIf less than four digits are entered in major OR minor OR sub1 OR sub1, then the fieldshould be padding with zeroes at the beginning (e.g., if the user enters "33", then thescript should convert this to a four digit number "0033", if they enter "0", the scriptshould convert this to "0000")Blank fields are not allowed in the major, minor, sub1. sub2 or ta fieldsHowever, if an account number containing ALL zeroes is INVALID (i.e., if major=0000AND minor=0000 AND sub1=0000 AND sub2=0000, then the journal entry isconsidered INVALID because there will never be an Account Number composed of allzeroes)

Answers

Answer:

import re

#section 1

while True:

   try:

       major=input('Enter Major: ')

       if re.search(r'^\d{1,4}$',major):

           minor=input('Enter minor: ')

       else:

           raise

       try:

           if re.search(r'^\d{1,4}$',minor):

               sub1=input('Enter sub1: ')

           else:

               raise

       

           try:

               if re.search(r'^\d{1,4}$',sub1):

                   sub2=input('Enter sub2: ')

               else:

                   raise

           

               try:

                   if re.search(r'^\d{1,4}$',sub2):

                       break

                   else:

                       raise

               except:

                   print('enter a correct sub 2')

           except:

               print('enter a correct sub1')        

       except:

           print('Enter a correct minor ')            

   except:

        print('enter a correct Major')

#section 2

sub1= f"{int(sub1):04d}"

sub2= f"{int(sub2):04d}"

major= f"{int(major):04d}"

minor= f"{int(minor):04d}"

if major == '0000' and minor == '0000' and sub1=='0000' and sub2=='0000':

   print('INVALID!!! Acount Number')

else:

   print('-----------------------')

   print('Your Account Number is')

   print(major, minor, sub1, sub2)

   print('-----------------------')

Explanation:

The programming language used is python 3

The Regular  Expression Module was imported to allow us perform special operations on string variables.

This is the pattern that was used to check if an input was valid or invalid re.search(r'^\d{1,4}$',string)

what this pattern does is that it ensures that:

(\d) represents digits that is any number from 0-9. ( ^ ) ensures that it starts with a digit.({1,4}) accepts digits with length ranging from 1-4. i.e you can enter at least one digit and at most four digits.($) ensures that the input ends with a digitstring is the text that is passed to the pattern

we also made use of fstrings

sub1= f"{int(sub1):04d}"

the above line of code takes 'sub1' in this case, and converts it temporarily to an integer and ensures it has a length of 4 by adding 0's in front of it to convert it to a four digit number.

These are the major though areas, but i'll explain the sections too.

#section 1

In this section the WHILE loop is used in conjunction with the TRY and EXCEPT block and the IF statement to ensure that the correct input is given.

The while loop will keep looping until the correct input is inserted  before it breaks and each input is tested in the try and except block using the if statement and the regular expression pattern I explained, as a result, you cannot input a letter, a blank space, a punctuation or numbers with length greater than 4, it has to be numbers within the range of 1-4.

#section 2

The second section converts each entry to a four digit number and checks with an if statement if the entry is all zeros (0000 0000 0000 0000) and prints invalid.

Otherwise, it prints the account number.

check the attachment to see how the script runs.

A friend asks you for help writing a computer program to calculate the square yards of carpet needed for a dorm room. The statement "the living room floor is rectangular" is an example of a(n) . The length and width of the room are examples of information, which you can obtain as from the user.

Answers

Answer:

A friend asks you for help writing a computer program to calculate the square yards of carpet needed for a dorm room. The statement "the living room floor is rectangular" is an example of a(n) assumption . The length and width of the room are examples of known information, which you can obtain as input from the user.

Explanation:

The given question is a Problem statement.

Problem statement can be defined as the brief description of an issue that needs to be focused in order to reach the require goal.

So the parts that a problem statement may have include:

facts and figures (assumptions), that are known in the given scenario.data required (solution)to be calculated by focusing on present assumptions (given as input by the user).

So the attributes to be filled into blanks of given statement are assumption, known, input.

i hope it will help you!

Write a java method called vowelCount that accepts a String as a parameter and produces/returns an array of integers representing the count of each vowel in the String. The array returned by your method should hold five elements: the first is the count of the 'A's, the second is the count of 'E's, the third 'I''s, the fourth 'O's and the fifth the number of 'U's. Your count should check for both upper and lower case versions.For example the call vowelCount("I think therefore I am") should return the array [1,3,3,1,0].Your main program should then allow the user to type in single lines, analyzing each line and print out its count. The program should stop when the user types the word "STOP" by itself.

Answers

Answer:AEIOU

Explanation:

What set operator would you use if you wanted to see all of the Customers and the Employees including any records that may appear in both Customers and Employees? select firstname ,lastname ,phone from Customers select firstname ,lastname ,phone from Employees; Group of answer choices1 INTERSECT2 EXCEPT3 UNION ALL4 UNION

Answers

Answer:

1. INTERSECT

Explanation:

Intersection is the set operator that gives us the information which is common to both tables. In this case the query will be:

SELECT firstname, lastname, phone FROM Customers

INTERSECT

SELECT firstname, lastname, phone FROM Employees;

In an AND truth table.

a. All values must be true for the statement to be true

b.Either of the values must be true for the statement to be true

c. There are not enough arguments to process

d. None of the values must be true for the statement to be true


Which of the following search tool alternatives would be a helpful starting place when looking for income tax information?

a. the federal government main Web site

b. the Internal Revenue Service Web site

c. the Census Web site

d. the Small Business Association Web site

Answers

Answer:

1. A

2. B

Explanation:

1. For an AND truth table to output true, all it input must be true. If one or any of the input is false, the output will be false. The truth table for AND is written below:

INPUT      INPUT      OUTPUT

FALSE      FALSE      FALSE

FALSE      TRUE        FALSE

TRUE        FALSE      FALSE

TRUE        TRUE        TRUE

2. The Internal Revenue Service web site is a good search tool when looking for income tax information. The federal government main web site might look like a correct option but one must understand that the federal government will only make the policy while the Internal Revenue Service will implement the policy.

Consider the following classes: public class A { private int myNum; public A(int x) { myNum = x; } public int getNumber() { return myNum; } public String getLetters() { return "A"; } public String getMessage() { return this.getLetters() + "-" + this.getNumber(); } } public class AB extends A { public AB(int x) { super(x + 1); } public int getNumber() { return super.getNumber() + 1; } public String getLetters() { return "AB"; } } What is the output of the following code segment? A test = new AB(0); System.out.print(test.getMessage());

Answers

Answer:

The output of the given code is "AB-2".

Explanation:

The description of the java program can be given as:

In this program firstly we define a class that is "A". In this class, we define a private integer variable that is "myNum" and parameterized constructor and pass an integer variable that is "x" and use a private variable to holds the constructor variable value.Then we define three function that is "getNumber(), getLetters() and getMessage()" this function we returns values. Then we define another class that is "AB" which inherits the base class "A". In this class we define parameterized constructor and two methods that is "getNumber() and getLetters()". In the parameterized constructor and getNumber() method we use a super keyword that calls above(base class methods) and increases the value by 1. In getLetters() method we return value that is "AB". In calling time we create a class object that is "test", and call the AB class and pass value 0 in the parameter, and call the getMessage() method.

That's why the output of this program is "AB-2".

Write a function safeOpen() that takes one parameter, filename — a string giving the pathname of the file to be opened for reading. When safeOpen() is used to open a file, a reference to the opened file object should be returned if no exception is raised, just like for the open() function. If an exception is raised while trying to open the file, safeOpen() should return the value None

Answers

Final answer:

The safeOpen() function in Python is used to open a file while handling exceptions. It returns the file object on success, or None if an error occurs, thus ensuring that the program can continue to run without crashing.

Explanation:

The function safeOpen() is designed to handle file operations within a Python program safely by attempting to open a file and returning a file object if successful, or None if an exception occurs. This function makes use of Python's built-in exception handling mechanisms to provide a secure way of accessing files. Here's an example of how you can define the safeOpen() function:
def safeOpen(filename):
   try:
       file = open(filename, 'r')
       return file
   except Exception as e:
       print("An error occurred: ", e)
       return None
In this code snippet, the try block attempts to open the specified file in read mode. If the file is opened successfully, the file object is returned. If any exception, such as FileNotFoundError or PermissionError, is raised during the attempt, the except block is executed, printing out the error message and returning None.

Recovery point objectives of a recovery plan specify ________.

A. the capacity of backup servers in storing the necessary data
B. data structures and patterns of the data
C. how current the backup data should be
D. the maximum time allowed to recover from a catastrophic event
E. the minimum time after which response should be allowed in a catastrophic event

Answers

Answer:

The correct option to the following question is an option (D).

Explanation:

Because RPO(Recovery point objective) is the objective in which we getting the greatest level of the privacy. confidence and the important thing is security for our resources.

The best thing is that the center of activity of the RPO in on the data and the overall elasticity of the loss of your company.

In Java :
Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detected should print a separate statement followed by a newline.Ex: If passCode is "9a", output is:Alphabetic at 1import java.util.Scanner;public class FindAlpha {public static void main (String [] args) {Scanner scnr = new Scanner(System.in);String passCode;passCode = scnr.next();/*Your solution goes here */}}

Answers

Answer:

The code to this question can be given as:

Code:

//define code.

//conditional statements.

   if (Character.isLetter(passCode.charAt(0))) //if block

   {

       System.out.println("Alphabetic at 0"); //print message.

   }

   if (Character.isLetter(passCode.charAt(1))) //if block

   {

       System.out.println("Alphabetic at 1"); //print message.

   }

Explanation:

In this code, we define conditional statement and we use two if blocks. In both if blocks we use isLetter() function and charAt() function. The isLetter() function checks the inserted value is letter or not inside this function we use charAt() function that checks inserted value index 1 and 2 is the character or not.

In first if block we pass the user input value and check the condition that if the inserted value is a character and its index is 0 so, it will print Alphabetic at 0. In second if block we pass the user input value and check the condition that if the inserted value is a character and its index is 1 so, it will print Alphabetic at 1.

The code segment is an illustration of conditional statements

Conditional statements are statements whose execution depends on the truth value of the condition.

The code segment in Java, where comments are used to explain each line is as follows:

//This checks if the first character is an alphabet.

if (Character.isLetter(passCode.charAt(0))){

   //If yes, this prints alphabetic at 0

   System.out.println("Alphabetic at 0");

}

//This checks if the second character is an alphabet.

if (Character.isLetter(passCode.charAt(1))){

   //If yes, this prints alphabetic at 1

   System.out.println("Alphabetic at 1");

}

Read more about similar programs at:

https://brainly.com/question/14391069

Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keystrokes to a third party. What information security property is this malware attacking?

Answers

Mostly the spyware and malware protection for desktop and laptop or workstations are to protected with anti-virus regular updates. All workstation or desktop or laptops are to updated operating systems patches.

If any operating systems patched update to be schedule and checked regularly. Schedule scanning by virus scanner to be made for desktop and laptop or workstations in regular interval basis

There are third parties tools such as malware and ADWCLEANER are also available free scanner software through internet where end user can download and scanner so software will clean the malware.

Mostly end user do mistake keep the files in desktop. Most of the malware software will affect the desktop folder only.

It will also affect c:\users folder and register enter keys.

Create a program to deteate a program to determine whether a user-specified altitude [meters] is in the troposphere, lower stratosphere, or upper stratosphere. The program should include a check to ensure that the user entered a positive value less than 50,000. If a nonpositive value or a value of 50,000 or greater is entered, the program should inform the user of the error and terminate. If a positive value

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   float altitude;

   cout<<"Enter alttitude in meter";

cin >>altitude;

if(altitude<0 || altitude > 50000)

{

   cout<<"Invalid value entered";

   return 0;

}

else{

   if(altitude<= 10000)

   {cout <<"In troposphere "<<endl;}

   

   else if(altitude>10000 && altitude<=30000)

   {cout <<"In lower stratosphere"<<endl;}

   

   else if(altitude>30000 && altitude<=50000)

   {cout <<"In upper stratosphere"<<endl;}

   

}

   return 0;

}

Explanation:

Define a float type variable. Ask user to enter altitude in meters. Store value to altitude variable.

Now check if value entered is positive and less than 5000,if its not in the range of 0-50,000 display a termination message and exit else check if it's in less than 10000, in between 10000 and 30000 or in between 30000 and 50000.

10,000 is above sea level is troposphere.

10,000-30,000 is lower stratosphere.

30,000-50,000 is upper stratosphere.

Python3
Write function countLetter that takes a word as a parameter and returns a dcitionary that tells us how many times each alphabet appears in the word (no need to account for absent alphabets). Develop your logic using dictionaries only. Save the count result as a dictionary. Display your output in the main() function.

Answers

Answer:

Following are the program in the Python Programming Language:

def countLetter(words):

   #set dictionary

 di = {}

 for i in words: #set for loop

 #if key exists in di or not

   if di.get(i):

 #if exists count increased

     di[i] += 1

   else: #otherwise assign with key

     di[i] = 1

   # return di

 return di

def main():

 #get input from the user

 words = input("Enter the word: ")

 #store the output in function

 letter = countLetter(words)

 #set for loop

 for i in letter:

   print(i, ":", letter[i])  #print output with :

#call main method

if __name__ == "__main__":

 main()

Explanation:

Here, we define the function "countLetter()" and pass the argument "words" in parameter and inside it.

we set the dictionary data type variable "di".we set the for loop and pass the condition inside it we set if statement and increment in di otherwise di is equal to 1.we return the variable di.

Then, we define the function "main()" inside it.

we get input from the user in the variable "words".we store the return value of function "countLetter()" in the variable "letter".we set for loop to print the output.

Finally, we call the main method.

write a program that converts a Fahrenheit temperature to Celsius. The design of this program is important as I want you to break your program into separate functions and have the main() function call these to do the work.

Answers

Answer:

See the code snippet in the explanation section

Explanation:

import java.util.Scanner;

public class Question {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   System.out.println("Enter temperature in Fahrenheit: ");

   int inputTemperature = scan.nextInt();

   fahrenheitTemperatureToCelsius(inputTemperature);

 }

public static void fahrenheitTemperatureToCelsius(int fahrenheitTemperature){

   int celsiusTemperature = ((fahrenheitTemperature - 32)*5)/9;

   System.out.println("Temperature in Celsius = " + temperature);

}

}

Which is true of case-based reasoning (CBR)?
a. Each problem and its corresponding solution are stored on a global network.
b. Each case in a database shares a common description and keyword.
c. It matches a new problem with a previously solved problem and its solution.
d. It solves a problem by going through a series of if-then-else rules.

Answers

Answer:

The correct option is Option C: It matches a new problem with a previously solved problem and its solution.

Explanation:

Case-based reasoning (CBR) is used when someone tries to solve new problems based on old problems that were similar. The person applying case-based reasoning would look for the solutions to these similar past problems and try to apply them to the new case. For example, a doctor who tries to treat a patient based on what was successful with a prior patient with a similar problem is applying case-based reasoning. In some instances, these problems are available in a database and ideally, that is how it is conceived, but it would depend on the field and the kind of problems. There is no universal global network dedicated to CBR as a whole (other than generic searches on the internet in general). One example of a specific CBR database is the European Nuclear Preparedness system called PREPARE.

Find all the files in /etc (including subdirectories) end .conf Send the list of full path names to s9. Your find command may produce "Permission Denied" errors during this search. This will have no effect on the answer, and this error can be safely ignored for this question.

Answers

Final answer:

To find all .conf files in the /etc directory, use the find command and redirect the output to a file. Knowledge of navigating directories and handling file permissions is also applicable.

Explanation:

The student has asked for assistance in searching for configuration files in the directory /etc, including all of its subdirectories, that end with the .conf extension. To accomplish this task, one can use the find command in a Unix-based system. Here's an example of how this command can be structured:

find /etc -type f -name "*.conf" > s9

This command will search for all files (-type f) within the /etc directory and its subdirectories that match the name pattern (-name "*.conf") and redirect the output to a file named s9. The student is also advised on how to navigate directories using both absolute and relative paths and how to handle any 'Permission Denied' errors that may occur during the execution of the find command.

Furthermore, it is important to note that file permissions, as per Unix file system conventions, may prevent certain directories from being accessible to non-root users.

A user who will spend considerable time using specific programs and is likely to become comfortable and familiar with the terminal's operation is called a:A) expert userB) system ownerC) casual userD) system builderE) none of these

Answers

Answer:

A) expert user

Explanation:

An expert user is an experienced user who has spent considerable time using specific application programs and, therefore, it is fair to assume that this user is likely to become comfortable and familiar with the terminal's operation.

A casual user is a less experienced computer user who will generally use a computer less frequently and thus is not likely to become comfortable and familiar with the terminal's operation.

System owners and system builders are not technically users.

Therefore, the answer is A) expert user

James is a recent college graduate and has six months of IT experience. He is thinking about pursuing a certification program in order to demonstrate that he is serious about IT. James is most interested in becoming a database designer. Another name for this career choice is database ____.

Answers

Answer:  Database Architect

Explanation:

Database architect is a person whose duty involves management, designing and generation of huge electronic databases.Mostly database architect work in the field of computer system designing, data processing companies etc.The databases contain large amount of data and information which is organized and stored in certain form and category accordingly.According to the situation in question, alternate name for James's career is database architect. As database designing is related with information technology which includes managing, organizing data in certain pattern , table , etc and maintaining it .

Which of the following is an attack that adds SQL statements to input data for the purpose of sending commands to a database management system?

Zombie attack
Man-in-the-middle attack
SQL injection
SQL spoofing

Answers

Answer: SQL Injection

Explanation:

The SQL injection is one of the type of attack which is used in the database management system for sending the commands by adding the structured query (SQL) language statement in the form of input data.

The SQL injection is the technique of code injection in which the SQL statement for the purpose of sending commands.  It is widely used in the data driven applications. The various types of web applications and web pages are used the SQL injection and uses in the form of input in the SQL query and then it is executed in the database.

Therefore, The SQL injection is the correct option.

8.8 Lab: Swapping variables Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is 3 8, then the output is 8 3 Your program must define and call a function. SwapValues returns the two values in swapped order. void SwapValues(int& userVal1, int& userVal2) zybooks c++ g

Answers

Answer:

Following are the program in c++ language

#include<iostream> // header file

using namespace std; // using namespace

void swapvalues(int&  userVal1, int& userVal2);// fucnction declaration

int main() // main method

{

   int x,y; // variable declaration

   cout<<"Enter the two value before swapping:\n";

   cin>>x>>y; // read the two input

  cout<<"before swapping:";

  cout<<x<<y; // display the value before swapping

   swapvalues(x, y);

   cout << "\nAfter swapping:";

   cout<<x<<y; // display the value after swapping

   return 0;

}

void swapvalues(int&  userVal1, int& userVal2) // function definition

{

   int t; // variable declaration

   t = userVal1; // assign the value userval1 to variable t

   userVal1 = userVal2; // assign the value userval2 to userval1

   userVal2 = t; // assign the value of variable t to userval2

}

Output:

Enter the two value before swapping:

3

8

before swapping:3 8

After swapping   :8 3

Explanation:

Following are the description of the program

Declared a variable "x" and "y" of type "int".Read a input by user in x and y .Display the values of variable x and y before the swapping.Call the function  swapvalues() by passing the value of x and y.After calling the console moved In the definition of swapvalues() Function where it interchanged the value of variable userVal1 and userVal2 by using third variable "t".After interchanged the console moved to the main function and finally display the value of variable "x" and "y' after the swapping.

Following are C++ programs on Swapping values:

Program:

#include <iostream>//header file

using namespace std;

void SwapValues(int& userVal1, int& userVal2)//defining the method SwapValues that takes two integer variable

{

   int t;//defining integer variable t

   //performing the swapping

   t=userVal1;//using t variable that holds userVal1 value

   userVal1=userVal2;//using userVal1 variable that holds userVal2 value

   userVal2=t;//holding the t value in userVal2

   cout<<"After swapping value: "<<userVal1<<" "<<userVal2;//printing the swapped value

}

int main()//defining the main method

{

   int x,y;//defining integer variable that inputs value

   cout<<"Input first number: ";//print message

   cin>>x;//input value

   cout<<"Input second number: ";//print message

   cin>>y;//input value

   cout<<"Before swapping value: "<<x<<" "<<y<<endl;//printing value

   SwapValues(x,y);//calling method SwapValues

   return 0;

}

Program Explanation:

Defining the header file.Defining the method "SwapValues" that takes two integer variables "userVal1 and userVal2" inside the parameter.Inside the method, an integer variable "t" is declared that performs the swapping, and prints its value.Outside the method, the main method is declared that defines two integer variables "x,y" and input the value from the user-end.After that, we call the above method.  

Output:

Please find the attached file.

Find out more information about the swapping here:

brainly.com/question/19665043

Two polygons are said to be similar if their corresponding angles are the same or if each pair of corresponding sides has the same ratio. Write the code to test if two rectangles are similar when the length and width of each are provided as integer values. For example:If the rectangles have lengths of 10 and 8, the ratio would be 1.25.

Answers

Here's a C++ program that reads two rectangles' lengths and widths as integer values and tests if they are similar:

#include <iostream>

#include <cmath>

using namespace std;

bool areSimilar(int length1, int width1, int length2, int width2) {

   float lengthRatio = static_cast<float>(length1) / static_cast<float>(length2);

   float widthRatio = static_cast<float>(width1) / static_cast<float>(width2);

   return lengthRatio == widthRatio;

}

int main() {

   int length1, width1, length2, width2;

   cout << "Enter the length and width of the first rectangle: ";

   cin >> length1 >> width1;

   cout << "Enter the length and width of the second rectangle: ";

   cin >> length2 >> width2;

   if (areSimilar(length1, width1, length2, width2)) {

       cout << "The two rectangles are similar." << endl;

   } else {

       cout << "The two rectangles are not similar." << endl;

   }

   return 0;

}

This program defines a function areSimilar that takes the lengths and widths of two rectangles as input and returns a boolean value indicating whether the rectangles are similar. The function calculates the ratios of the lengths and widths and checks if they are equal. If the ratios are equal, the rectangles are considered similar, and the function returns true. Otherwise, the rectangles are not similar, and the function returns false.

Other Questions
Complete parts (a) through (c) below. (a) Determine the critical value(s) for a right-tailed test of a population mean at the alphaequals0.01 level of significance with 10 degrees of freedom. (b) Determine the critical value(s) for a left-tailed test of a population mean at the alphaequals0.10 level of significance based on a sample size of nequals15. (c) Determine the critical value(s) for a two-tailed test of a population mean at the alphaequals0.01 level of significance based on a sample size of nequals12. Tyrone, an 85-kg teenager, runs off the end of a horizontal pier and lands on a free-floating 130-kg raft that was initially at rest. After he lands on the raft, the raft, with him on it, moves away from the pier at 1.6 m/s. What was Tyrone's speed as he ran off the end of the pier? Gaseous butane will react with gaseous oxygen to produce gaseous carbon dioxide and gaseous water. Suppose 3.49 g of butane is mixed with 7.0 g of oxygen. Calculate the maximum mass of carbon dioxide that could be produced by the chemical reaction. Round your answer to significant digits. In the fermentation of glucose (wine making), 790 mL of CO2 gas was produced at 37 C and 1.00 atm . You may want to reference (Pages 303 - 304) Section 8.5 while completing this problem. Part A What is the final volume, in liters, of the gas when measured at 18 C and 695 mmHg , when n is constant? What acid and what base would react in aqueous solution so that the following salts appear as products in the molecular equation? Write the balanced molecular equation for each reaction. a. potassium perchlorate b. cesium nitrate c. calcium iodide Having a collision with a larger animal could result in serious injuries to the vehicles occupants and damage to your vehicle, but could be the safest option as the alternative could involve hitting another vehicle with the result significantly worse.a. True.b. False Hotel Cortez is an all-equity firm that has 125000 shares of stock outstanding at a market price of $44.46 per share. The firm's management has decided to issue $80000 worth of debt and use the funds to repurchase shares of the outstanding stock. The interest rate on the debt will be 4.2 percent. What is the break-even EBIT? Ignore taxes. a cube of mass 128g has density of 2g/^3 what is the length each side of cube - What can we learn about slavery from interviews with former slaves? (a) Calculate the magnitude of the gravitational force exerted on a 1,320-kg satellite that is a distance of two earth radii from the center of the earth. N(b) What is the magnitude of the gravitational force exerted on the earth by the satellite? N(c) Determine the magnitude of the satellite's acceleration. m/s2(d) What is the magnitude of the earth's acceleration? m/s2 Additional Materials In a(n) ____ design, the remote users keystrokes are transmitted to the mainframe, which responds by sending screen output back to the users screen.A. closedB. distributedC. openD. centralized Which of the following are spectator ions in the reaction shown? What is one way that the student could improve his or her argument? A. give examples of how Chinese cuisine has changed B. explain how Northern and Southern Indian foods are different C. reduce the strong language against American cuisine D. give examples of how Tex-Mex has ruined Mexican food Which function represents the graph of y=10(4)x ? PLEASE HELP! :) f g h j What is the volume of the cone? Use 3.14. 12.56 cubic units 18.84 cubic units 20.93 cubic units 25.12 cubic units National Geographic is replacing an old printing press with a new one. The old press is being sold for $350,000 and it has a net book value of $75,000. Assume that National Geographic is in the 30% income tax bracket. What is the tax implication of the proceed of the sale of the old press? Round to the nearest penny. If tax liabilities, type a negative sign in front. Do not include a dollar sign in your answer. (i.e. If your answer is tax liabilites of $8,765,43, type -8765.43; if tax shield of $8,765.43, type 8765.43). Paxton Company can produce a component of its product that incurs the following costs per unit: direct materials, $10; direct labor, $14, variable overhead $3 and fixed overhead, $8. An outside supplier has offered to sell the product to Paxton for $32. Compute the net incremental cost or savings of buying the component. 7. Use mental math28% of 100 TO TRANSMIT INFORMATION ON THE INTERNET, LARGE FILES ARE BROKEN INTO PACKETS OF SMALLER SIZES. EACH PACKET HAS 1,500 BYTES OF INFORMATION. AN EQUATION RELATING PACKETS TO BYES OF INFORMATION IS GIVEN BY B=1,500P REPRESENTS THE NUMBER OF PACKETS AND B REPRESENT THE NUMBER OF BYTES OF INFORMATION. A. HOW MANY PACKETS WOULD BE NEEDED TO TRANSMIT 30,000BYTES OF INFORMATION B. HOW MUCH INFORMATION COULD BE TRANSMITTED IN 30,000 PACKETS For this question please enter the number of sigma (\sigma ) and pi (\pi ) bonds (e.g. 0,1,2,3,4, etc). How many sigma and pi bonds, respectively, are in this carboxylic acid? CH3CHCHCOOH. 11 \sigma bonds and 1 \pi bond(s). How many sigma and pi bonds, respectively, are in this organic molecule (an amine)? HCCCH2CHCHNH2 \sigma bonds and \pi bond(s). How many sigma and pi bonds, respectively, are in this organic molecule? H2CCHCH2CCH. \sigma bonds and \pi bond(s).