Answer: d) Network
Explanation: IPv4(internet protocol version 4) is the decimal-digit numeric value for the internet protocol.It helps in the identification of the hosts through logical addresses. The functioning of IPv4 helps in the routing of the information over the network.
The network layer contains router that is responsible for the routing of message between the nodes of the path.Router functions with internet protocol.Other options are incorrect because protocol is the set of riles,data link layer works for managing the movement of data and transport layer monitors the transmission of data.Thus ,correct option is option(d)
What is white noise and how does it affect a signal? Provide a business process example that could be affected and what would you recommend to minimize white noise?
Answer: White noise is the merging of the audible signal of different frequencies varying from high to low into a single unit. The number of frequencies combined in white noise more than 20,000. It helps in masking the other noise in the environment.
In accordance with the signal, white noise acts as a statistical mode which merges all the signal into one with same intensity which results in the power spectral density being persistent.
E.g.- Any business process of company that requires attention and speedy working such as creating report, presentation can get affected by the white noise in positive or negative manner depending on the person.It might lead to increment or decrement in the cognitive performance of employees.
White noise can be remove by several software present in the market, removing it by the "Noise removal" option from the Effects menu in operating system, etc.
. When would one use the analytic application fraud detection?
Answer:Fraud detection through analytical method is used for detection of the fraud transactions,bribe activity etc in companies, business,etc. This techniques helps in the reduction of financial frauds in the organization, have the control over company to protect it,decrease in the fraud associated costs etc.
It has the capability of identifying the fraud which has happened or going to happen through the analytical ways and human interference. The organizations or companies require efficient processing and detection system for identification of such false happening.
Which of the following is a correct call to a method declared as public static void i) aMethod(char code)? a. void aMethod(); b. void aMethod(‘V’); c. aMethod(char ‘M’); d. aMethod(‘Q’);
Answer:
Option(d) i.e aMethod(‘Q’); is the correct answer for the given question .
Explanation:
To call any method following syntax is used
methodname(parameter);
In option(a) the return type void is used and no char parameter is passed in the function so this option is wrong.
In option(b) the return type void is used which is not correct syntax to calling a method so this option is wrong.
In option(c) the char datatype is passed in the function which is not correct syntax to calling a method so this option is wrong.
So aMethod(‘Q’); is the correct answer .
A method variable a class variable with the same name. a) acquiesces to b) destroys c) overrides d) alters
Answer:
Option(c) is the correct answer for the given question.
Explanation:
The method variable overrides the class variable name with same name The method variable overrides of the class variable name .
Following are the example in java language
public class Main
{
int b=90; // class varaible or instance varaible
void sum()
{
int b=34; // method having same name as class varaible name
b=b+10;
System.out.println(b); // display b
}
public static void main(String[] args) // main method
{
Main ob=new Main(); // craete object
ob.sum(); // calling method sum
}
}
Output:
44
In this we declared a variable 'b' as int type in class and override this variable in sum() function it means same variable name is declared in function sum() .
acquiesces ,destroys,alters are the wrong for the given question.
So overrides is the correct answer
A class can inherit from a super class whose behavior is “near enough” and then adjust behavior as necessary thanks to the ability of a subclass to override a method. Thus, option C is correct.
What are the main uses of overrides as class variable?The name, number, type, and return type of the overriding method are the same as those of the method it overrides.
In the case of method overriding, the overridden methods entirely replace the inherited method.
However, in the case of variable hiding, the child class conceals the inherited variables rather than replacing them.
In a nutshell, a class variable cannot be overridden. In Java, class variables are hidden rather than overridden. For example, overriding is for methods. Overriding differs from hiding.
Therefore, overrides A method variable a class variable with the same name.
Learn more about overrides here:
https://brainly.com/question/20216755
#SPJ2
Convert 15 from decimal to binary. Show your work.
Answer: 1111
Explanation: As a decimal number can be decomposed in a sum of products involving powers of ten, it can be factored as a sum of products of powers of 2 in order to convert to binary.
In the example, we can write 15 as a decimal number in this way:
1* 10¹ + 5* 10⁰ = 15
Decomposing in powers of 2:
1*2³ + 1* 2² + 1*2¹ + 1.2⁰ = 1 1 1 1 = (15)₂
What is the advantage of using the conditional operator?
Answer: Conditional operator are the ternary operator that work during a particular condition in which they returns a value as a result.This mechanism of the conditional operator helps in the making of the decision. The advantages of the conditional operator are as follows:-
It has faster executionIt can operate in many conditions even where the if-else condition is not executableCompact in nature Readable
Explain why a business would use metrics to measure the success of strategic initiatives.
Answer:
Metrics is basically used to measurement various type of success initiatives in the business for determining the current status of the project. The various business leaders uses the metrics for evaluating and monitoring various types of activity for tracking their business.
As,it helps in checking whether the project meets its particular goals.It gauges something which is legitimately controllable by the people or various small groups. This recommends measurements are neighborhood, and associated with activity.
It basically measuring which is something significant. In the event that the word key methods significant, at that point measurements mirror the goals for individual or association.
Final answer:
Businesses use metrics to quantifiably track and measure the success of strategic initiatives, provide essential feedback, and drive improvement. Metrics such as sales, defects, and satisfaction levels help in aligning employees' efforts with the company's strategic goals and aid in effective decision-making.
Explanation:
Businesses use metrics to measure the success of strategic initiatives to ensure that objectives are met efficiently and effectively. Metrics provide a quantifiable method to assess performance and progress towards goals, acting as a vital feedback mechanism for employees and management alike. They are used to track various aspects such as sales, defects, efficiency, and satisfaction levels, among others. By establishing Key Performance Indicators (KPIs), companies can objectively determine how well they are performing in specific areas and where they need to improve.
Specific metrics like turnover rates or productivity are typically straightforward to quantify and can be tracked easily. They are necessary to determine Critical to Stakeholder metrics and translate customer requirements into coherent project goals. However, companies often need to quantify less tangible aspects, such as employee or customer satisfaction, to get a holistic view of their performance. Although this may require additional effort, tools like surveys can help in quantifying these 'soft targets.'
Ultimately, utilising these metrics allows all members of an organization to identify and address issues proactively, aligning their efforts with the broader strategic goals of the business, enhancing decision-making, and fostering a culture of continuous improvement.
Who are the users of the encryption technology?
Answer: The users of encrypted technology can range from a consumer to a professional. As an individual, you might tend to login to a social media platform. These activities mostly use encryption in order to prevent your data and information from being exposed. More general uses might include safeguarding sensitive data and information, governments protecting social security and records.
As the performance of PCs steadily improves, computers that in the past were classified as midrange computers are now marketed as ____.
laptops
PC servers
PDAs
tablet PCs
Answer: PC servers
Explanation: PC(Personal computer) servers are the helps in the utilization of the network services to the software and hardware of the computer. It manages the network resources . In the past time ,Mindrange computers, mini computers etc are present time's PC servers.
Other options are incorrect because laptops ,PDA(Personal digital assistant) or tablets are the modern version of the computer units that are portable and compact with fast processing. Thus the correct option is option PC servers.
Write a method that take an integer array as a parameter and returns the sum of positive odd numbers and sum of positive even numbers.
Answer:
I will code in Javascript:
function sumOddAndEven(){
//Define and initialize variables.
var numbers = [1,2,3,4,5,6,7,8];
var sum = [0,0];
for ( var i = 0; i < numbers.length ; i++ ){ // loop to go throght the numbers
if(numbers[i] > 0) { // if the number is positive
if(numbers[i]%2 == 0) { // if number is even and
sum[0] = sum[0] + numbers[i]; //adds in the first place of sum
}
else{
sum[1] = sum[1] + numbers[i]; // else adds in the second place of sum
}
}
}
return sum; //return an array with the sum of the positive evens numbers in the first place and the sum of the positive odd numbers in the second place.
}
Why is monitoring email, voice mail, and computer files considered legal?
Explanation:
Monitoring someone's emails,voice mails and computer files is considered is illegal because you are accessing someone's personal information which is not regarded as ethical .
There are certain reasons where one's email,voice mails and computer files can be monitored are as following:
Protect the security information and security.Investigation of complaints of harassment.Preventing personal use of employer's facilities.____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.
War driving
Wi-Fi driving
Wi-Fi finding
E-stalking
Answer:War driving
Explanation: War driving is the activity which is done for searching for the Wi-Fi connection while driving vehicle .The main purpose of the war driving is gaining and accessing the network of Wi-Fi by being in slowly moving vehicle. The act is carried out by the individual or more people.
Other options are incorrect because Wifi driving and Wifi finding are not technical words in the computer field and E-stalking is the stacking activity with the help of internet enables electronic devices.Thus, the correct option is war driving.
The correct answer is Wardriving
Explanation:
Nowadays, it is common people want to access the internet most of the time even if this involves using networks without authorization by connecting a device such as a cellphone or a computer to a Wi-Fi network that is a wireless technology to access the internet. In this context, one common practice is wardriving in which you look for a Wi-Fi network by using a vehicle to move through different zones until finding one network you can access and use. This involves using networks from public places or private networks that do not require a password. According to this, it is wardriving the term that refers to driving around an area to find a Wi-Fi network to access and use it with no authorization.
Business customers pay $0.006 per gallon for the first 8000 gallons. If the usage is more than 8000 gallons, the rate will be $0.008 per gallon after the first 8000 gallons. For example, a residential customer who has used 9000 gallons will pay $30 for the first 6000 gallons ($0.005 * 6000), plus $21 for the other 3000 gallons ($0.007 * 3000). The total bill will be $51. A business customer who has used 9000 gallons will pay $48 for the first 8000 gallons ($0.006 * 8000), plus $8 for the other 1000 gallons ($0.008 * 1000). The total bill will be $56. Write a program to do the following. Ask the user which type the customer it is and how many gallons of water have been used. Calculate and display the bill.
Answer:
#include <bits/stdc++.h>
using namespace std;
int main()
{
// variables
char cust_t;
int no_gallon;
double cost=0;
cout<<"Enter the type of customer(B for business or R for residential):";
// read the type of customer
cin>>cust_t;
// if type is business
if(cust_t=='b'||cust_t=='B')
{
cout<<"please enter the number of gallons:";
// read the number of gallons
cin>>no_gallon;
// if number of gallons are less or equal to 8000
if(no_gallon<=8000)
{
// calculate cost
cost=no_gallon*0.006;
cout<<"total cost is: $"<<cost<<endl;
}
else
{
// if number of gallons is greater than 8000
// calculate cost
cost=(8000*0.006)+((no_gallon-8000)*0.008);
cout<<"total cost is: $"<<cost<<endl;
}
}
// if customer type is residential
else if(cust_t=='r'||cust_t=='R')
{
cout<<"please enter the number of gallons:";
// read the number of gallons
cin>>no_gallon;
// if number of gallons are less or equal to 8000
if(no_gallon<=8000)
{
// calculate cost
cost=no_gallon*0.007;
cout<<"total cost is: $"<<cost<<endl;
}
else
{// if number of gallons is greater than 8000
// calculate cost
cost=(8000*0.005)+((no_gallon-8000)*0.007);
cout<<"total cost is: $"<<cost<<endl;
}
}
return 0;
}
Explanation:
Ask user to enter the type of customer and assign it to variable "cust_t". If the customer type is business then read the number of gallons from user and assign it to variable "no_gallon". Then calculate cost of gallons, if gallons are less or equal to 800 then multiply it with 0.006.And if gallons are greater than 8000, cost for first 8000 will be multiply by 0.006 and for rest gallons multiply with 0.008.Similarly if customer type is residential then for first 8000 gallons cost will be multiply by 0.005 and for rest it will multiply by 0.007. Then print the cost.
Output:
Enter the type of customer(B for business or R for residential):b
please enter the number of gallons:9000
total cost is: $56
What is database design?
Answer: Database design is the model created of data/information for any particular organization .the relation between the information and which data is to be stored is the most important factor for designing .These parameters are decided by the designer of the database.
After the decision of the designed the data is invoked in the database .The data representation in the theoretical manner is known as ontology.The classification and relation defining is the purpose of the database design.
Write a Java program HW2.java that asks the user to enter an array of integers in the main method. The program should prompt the user for the number of elements in the array and then the elements of the array. The program should then call a method named isSorted that accepts an array of and returns true if the list is in sorted (increasing) order and false otherwise. For example, if arrays named arr1 and arr2 store [10, 20, 30, 30, 56] and [2, 5, 3, 12, 10] respectively, the calls isSorted(arr1) and isSorted(arr2) should return true and false respectively. Assume the array has at least one element. A one-element array is considered to be sorted.
Answer:
The java program for the given scenario is given below.
This program can be saved as HW2.java.
import java.util.Scanner;
public class HW2 {
public static void main(String args[]) {
HW2 ob = new HW2();
Scanner sc = new Scanner(System.in);
int len;
System.out.println( "Enter the number of elements to be entered in the array");
len = sc.nextInt();
int[] arr = new int[len];
System.out.println( "Enter the elements in the array");
for( int k=0; k<len; k++ )
{
arr[k] = sc.nextInt();
}
boolean sort = ob.isSorted(arr, len);
System.out.println( "The elements of the array are sorted: " + sort );
}
public boolean isSorted( int a[], int l )
{
int sort = 0;
if( l==1 )
return true;
else
{
for( int k=1; k<l; k++ )
{
if(a[k-1] < a[k])
continue;
else
{
sort = sort + 1;
break;
}
}
if(sort == 0)
return true;
else
return false;
}
}
}
OUTPUT
Enter the number of elements to be entered in the array
3
Enter the elements in the array
1
2
1
The elements of the array are sorted: false
Explanation:
1. First, integer variable, len, is declared for length of array. User input is taken for this variable.
2. Next, integer array is declared having the size, len. The user is prompted to enter the equivalent number of values for the array.
3. These values are directly stored in the array.
4. Next, the function isSorted() is called.
5. This method uses an integer variable sort which is declared and initialized to 0.
6. Inside for loop, all elements of the array are tested for ascending order. If the 1st and 2nd elements are sorted, the loop will continue else the variable sort is incremented by 1 and the loop is terminated.
7. Other values of the variable sort indicates array is not sorted.
8. A Boolean variable, sort, is declared to store the result returned by isSorted method.
9. Lastly, the message is displayed on the output whether the array is sorted in ascending order or not.
What is unauthorized data disclosure?
Answer: Unauthorized data disclosure is the revealing of the confidential or private data to the unauthorized user. The disclosure of such data can be highly risk because it can lead to the several ways in which information can be misused . This incident can be due to attacking and stealing of data on purpose or by accident.
They purposely disclosure of data can be done through the methods like spoofing, sniffling etc.It is considered as the malicious activity which is a punishable crime if done on purpose.Top avoid such situation the exchange of information should be done carefully and in secure manner.
What are some of the features about Word that you find interesting?
Answer:
Some interesting features of the Microsoft word are as follow:
The main key feature of the word is that it has the ability to write the formatted text and also we can save and also print the document according to the individual requirement.
It also used the word processing system in the Microsoft word for checking the spelling and grammar mistake to make the document error free and efficient.
It is compatible with the different kinds of software for local use and for collaboration features.
Which of the following are examples of IT careers? Check all of the boxes that apply.
software engineer
hardware engineer
lawyer
systems analyst
database administrator
computer support specialist
Answer:
software engineer hardware engineer systems analyst database administrator computer support specialistExplanation:
Software engineer: This deals with the application development where engineers develop application related to system software and application software which is used for commercial purposes. Hardware engineer: Deals with problem in the hardware viz keyboard, mouse, mother board and other internal parts and also with network. Systems analyst: This is once again a profession which deals with the internal problems of the system and also to install softwares and troubleshoot if issues arise. Database administrator: Maintains the database, fix errors, monitor data, etc Computer support specialist: The responsibility depends on the company and it will be similar to a clerical role.Lawyer This option is irrelevant
Answer:
operating system
web browser
word processor
device driver
the clipboard
Explanation:
got these answers right and also got a 100 on it
The declarations and statements that compose the method definition are called the __________.
a.method body
b.method header
c.parameter list
d.method name
Answer:
a. method body.
Explanation:
A method contains the following components:
method namemethod argumentsmethod return typemethod implementation codeAll of these together constitute the method body. The method body contains the declarations and statements constituting the method definition.
Apart from this, when the method is invoked at runtime, it needs to be called with method-name and the actual parameter list which gets substituted for the formal parameters in the method body.
To control for an InternalError exception you should use a(n) __________ connection.
a
Unbuffered
b
Buffered
c
Secure
d
Open
Answer: (B) Buffered
Explanation:
Buffered connection is basically used to control the internal error exception. The buffer cursor are basically executed different queries like fetchall() and fetchone(), these are the row fetching method. It is basically used to return the row from set of the buffered row.
For creating the buffered cursor we can use the buffered argument and call the cursor connection.
On the other hand, all the other options are incorrect because it cannot control the internal error only buffered connection can do.
Therefore, Option (B) is correct.
Float and double variables should not be used _____. (Points : 4)
as counters
to perform mathematical calculations
as approximate representations of decimal numbers
for applications when precision is required
Answer: As approximate representations of decimal numbers
Explanation:
In the computer programming language, the float and the double variable is basically used to represent the decimal numbers. In the C language, both the float is basically represent the decimal value of precision upto the 7 digits and the double variable represent upto 16 digit of the precision.
Float is the type of the data type that is used to represent the floating point in the programming language and it takes less memory so that is why it is faster in speed.
Double variable is basically used to represent the numeric variable and decimal number in the programming language and it hold very large number as compared to float.
Using the command line, create a symbolic link to the /etc in the /root/Desktop folder.
Answer:
ln -s /etc /root/Desktop
Explanation:
ln is the command to create links and -s is the flag to create symbolic links between element1 and element2
Example:
ln -s /etc /root/Desktop
Create a symbolic link between folder etc and folder Desktop
. List four different ways automation can be used in testing?
Answer:
Automation testing can be used for:
Input-output test : If the main function of your software is to transform input data into output data you can configure a new test by providing a new input/output pair, then the test will check to see if the output matches with the expected values.
Unit test : This test is a script to check the return values of a specific code by initializing it and calling his methods. This is a part of a test-driven development process.
Integration test : This test is a code level script that does a complete check process involving multiple objects. For example, you might make a test for “buy a product” which checks to see if the database is updated, if the data is correct of the person is correct, and if the person placing the order gets the right confirmation email.
Smoke Tests: This test is executed immediately after implementation on production to ensure that the application is still functioning.
Why is a memory hierarchy of different memory types used instead of only one kind of memory?
Answer: Memory hierarchy is the hierarchy that is created on the basis of the response time of different memories. The performance obtained by the memory helps in creating a computer storage space in distinguished form. The factors considered for the creating of the hierarchy structure are usually response time, storage capacity, complexity etc.
Usage of different kind of memories take place due to different kind of requirements from the system which cannot be fulfilled using one memory device.The requirement is based on saving time, decreasing complexity , improving performance etc.Example of requirements can be like some functions and files do not require much space , some might require quick accessing,etc.
Thus hierarchy of any particular system is in the form of fast to slow order from registers,cache memory, Random access memory(RAM) and secondary memory.
Write a program which asks the user to enter N numbers. The program will print out their average. Try your program with the following numbers: 20.5, 19.7, 21.3, 18.6 and 22.1
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
int n;
double average,sum=0,x;
cout<<"enter the Value of N:";
// read the value of N
cin>>n;
cout<<"enter "<<n<<" Numbers:";
// read n Numbers
for(int a=0;a<n;a++)
{
cin>>x;
// calculate total sum of all numbers
sum=sum+x;
}
// calculate average
average=sum/n;
// print average
cout<<"average of "<<n<<" Numbers is: "<<average<<endl;
return 0;
}
Explanation:
Read the total number from user i.e "n".Then read "n" numbers from user with for loop and sum them all.Find there average by dividing the sum with n.And print the average.
Output:
enter the Value of N:5
enter 5 Numbers:20.5 19.7 21.3 18.6 22.1
average of 5 Numbers is: 20.44
Roman numeration uses 7 uppercase letters instead of numbers that make it easily adaptable in most MATH formulas when needed.
True
False
Answer:
TRUE
Explanation:
Roman numerals system is a system of numerical notations, that involves using combination of uppercase letters from the Latin alphabet to represent numbers. This system was used in the ancient Rome.
This system involves the use of seven uppercase letters from the Latin alphabet as symbols to represent a fixed integer value.
The symbol I represents the integer 1, V represents the integer 5, X represents the integer 10, L represents the integer 50, C represents the integer 100, D represents the integer 500 and M represents the integer 1000.
According to the ________ definition of organizations, an organization is seen as a means by which primary production factors are transformed into outputs consumed by the environment.
Select one:
a. macroeconomic
b. sociotechnical
c. microeconomic
d. behavioral
Answer: (C) Microeconomic
Explanation:
The microeconomic organization basically consist two factor of the primary production that is labor and capital by which the output is consume by environment.
It is transformed by using the firm by the process of the production into the products and the different services.
According to the microeconomic the organization is basically refers to the collection of the responsibilities and rights for balanced the time by conflict resolution in the organization.
This microeconomic definition basically suggest established a new information system and also rearrange all the technical machines in the organization
In this type of password attack, the attacker has some information about the password. For example, the attacker knows the password contains a two- or three-digit number.
hybrid
nontechnical
rule-based
precomputed hashes
Answer: Non- technical
Explanation:
Non technical attacks also known as non- electronic attack. The non technical attack does not required any type of the technical domain knowledge and methods for intruding the other systems.
In the non technical password attack, the attacker contain some data or information regarding the password like two and three digits and umber of the password. It basically search the data from the users trash bins and sticky notes from the users system.
On the other hand, all the the options are incorrect because it does not have some information and data regarding the password according to the given statement.
Therefore, non technical option is correct.
Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 512-bit encryption military-strength 1,024-bit encryption
Answer: Strong 128-bit encryption.
Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,
16[tex]\times[/tex]8=128 bits keys
This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key by any method e.g.-brute-force method.
Other options are incorrect because the characters given by the other bits are as follows: [tex]{\frac{256}{8}[/tex]=32 characters
[tex]{\frac{512}{8}[/tex]=64 characters
[tex]{\frac{512}{8}[/tex]=128 characters
Thus, the strongest character key is of 128 bits. for cipher.
Assume a 8x1 multiplexer’s data inputs have the following present values: i0=0, i1=0, i2=0, i3=0, i4=0, i5=1, i6=0, i7=0. What should be value of the select inputs s2, s1 and s0 for the value on the multiplexer’s output d to be 1?
s2=
s1=
s0
Answer: s2=1 s1=0 s0=1
Explanation:
Generally speaking, the multiplexer is a digital circuit , build with combinational logic, that acts like a switch, sending to the output the current value present at the input which order number (in decimal) is equal to the binary combination of the select inputs, expressed in decimal form.
If the multiplexer is 8x1, in order to be able to pass to the output any of the 8 inputs, the number of select inputs (n), must satisfy the following relationship:
M(number of inputs) = 2ⁿ
In this case, as the only input which present value is "1" ,is the input i5, the value present at the input select must be the binary combination of s₀, s₁
and s₂, that yields the decimal 5, i.e., s₀ = 1 s₁ = 0 s₂ = 1.