Is it legal to "use" an unprotected wireless access point that you discover in a public area? Is it ethical to use it? Hypothetically, if you were at an event and your computer detected a wireless network which was not protected and that was not sponsored by the event or its organizers, would you use it? Justify your answer

Answers

Answer 1

Answer:

The legality of use is dependent on the permissions provided by the owner, service provider ad state's laws. It is not ethical to use open wifi not provided or sponsored by event's organizer.

Some of the risk are:

Privacy leak and risk of confidentiality. Wifi data transfer occur using encryption but there are also some devices that can decrypt this data provided the have access the wifi. In open wifi, since everyone has access hence anyone with malicious intents can overlook your activities by decrypting data. This become more dangerous when a person is accessing bank statement or doing transactions on public wifi.


Related Questions

x, y,w and z are Booleanvariables. Make the truth table for the expressiongiven below. (Marks8)

z =NOT(x XORy )AND w

Answers

Answer:

Refer the image for the truth table.

Explanation:

First 3 columns of the truth table are for the values of x,y,and w. The fourth columns is for the expression x XOR y .XOR gives output 1 when the inputs are not same if they are same the output is 0.Fifth column is for the NOT of X XOR y.Then the last columns is for the expression z that is and operation of w and the expression in fifth column.

Write a complete C program that obtains two integers from the user, saves them in the memory, and calls the function void swap (int *a, int *b) to swap the content of the two integers. The main function of your program should display the two integers before and after swapping.

Answers

C program for swapping numbers

#include <stdio.h>

void swap(int *num1, int *num2)/*Defining function  for swapping the numbers*/

{

   int temp; /*using third variable to store data of numbers*/

  temp = *num1;    

  *num1 = *num2;  

  *num2 = temp;      

}

int main ()//driver function

{

  int a,b;

  printf("Enter the numbers for swapping\n");//taking input

  scanf("%d %d",&a,&b);

  printf("The numbers before swapping is a =%d and b=%d \n",a,b);  

  swap(&a, &b);//calling function for swaping  

  printf("The numbers after swapping is a=%d and b=%d",a,b);  

  return 0;      

}

Output

Enter the numbers for swapping  3,4

The numbers before swapping is a =3 and b=4  

The numbers after swapping is a=4 and b=3

Suppose a computer design has -bit integers. What happens when overflow occurs?

Answers

Answer:

When a computer designed has a bit-integers so the overflow occurred when magnitude of number exceeding and the results of the arithmetic operation are exceeding the maximum size of the type of an integer like the addition and the multiplication, which are used to stored in it. The two similar signed number sum are varying with the exceeding range of bit then, it increases the possibility of the overflow.

Is there any advantage of usingbranch predictor in a pipleline. Explain with example.

Answers

Answer:

Yes, there are advantages of using branch predictor in a pipeline.

Explanation:

Yes, there is advantage of using branch predictor in pipelining. T know this, lets first understand the Branching. Branches are the places in the instructions where multiple paths can be possible and one of the path (in branch) will be followed. This can be understood as conditional executions like If - Else conditions, Switch cases etc. Without branch prediction, the processor becomes slow, processing less number of instructions and taking more clock cycles. The processor has to stall without executing any instructions and wasting lot of clock cycles.  Without branch predictor the instructions that have to be next executed doesn't know. Branch prediction increases Instruction Level Parallelism. Examples are If - Else Conditions and Switch cases.

From the binary search algorithm, it follows that every iteration of the while loop cuts the size of the search list by half.

True

False

Answers

Answer:

True: In binary search algorithm, we follow the below steps sequentially:

Input: A sorted array  B[1,2,...n] of n items and one item x to be searched.

Output: The index of x in B if exists in B, 0 otherwise.

low=1high=n while( low < high )  {      mid=low + (high-low)/2         if( B[mid]==x)          {             return(mid)  //returns mid as the index of x           }          else          {              if( B[mid] < x)      //takes only right half of the array               {                 low=mid+1               }              else               // takes only the left half of the array               {                high=mid-1               }           }  }return( 0 )

Explanation:

For each iteration the line number 11 or line number 15 will be executed.

Both lines, cut the array size to half of it and takes as the input for next iteration.

The scope of a variable declared in a for loop's initialization expression always extends beyond the body of the loop



True False

Answers

Answer:

False

Explanation:

for loop is used to run the statement again and again until the condition put inside the for loop is false.

syntax:

for(initialization;condition;increment/decrement)

{

  statement;

}

the initialization scope is valid only within the curly braces of the for loop. it is not valid outside the body of the for loop.

because initialization is the part of the for loop.

In what conditions we use forward and backwardchaining in prolog please specify?

Answers

Answer:

Explanation:

Forward Chaining:

As the name suggests, Forward Chaining is the method of arriving at the goal with the available data and the data that is produced from the available data. With the help of the available data more data is produced by using inference rules. With the combination of available data and the produced data, a goal will be reached.

Backward Chaining:

As the name suggests, Backward Chaining is the method of finding the reasons behind the goal or hypothesis. It is used when the goal is present and checking if the available data supports / satisfies the goal.

State whether true or false.
i) init( ) of servlet is called after a client request comes in
ii) Servlets are ultimately converted into JSP
A) i-false, ii-false
B) i-false, ii-true
C) i-true, ii-false
D) i-true, ii-true

Answers

Answer:

                A) i-false, ii-false

Explanation:

i)

init() method is only called once at the time of creation of servlet,it is not called for the client request.It is a one time initialization.The init() method is used  creating and loading data that will be used throughout the life of the servlet.

Definition Init() method

public void init() throws ServletException {

  // Initialization code...

}

ii)

Servlet is a java class that contains Java Api specification.Every Jsp is ultimately converted to Servlet, as in JSP you put Java inside HTML and for Servlet you put HTML inside JAVA.Both JSP and Servlet is used for server side scripting.

Write a pseudocode statement thatsubtracts the vaiable downPayment from the variable total andassigns the reult to the variable due.

Answers

Answer:

initialize the variables total and downPayment.

int due = total - downPayment;

Explanation:

In the programming, before use the variable in the code you have to declare the variable.

then, there are the mathematical operators in the programming to perform the mathematical calculation.

for perform addition, the operator is '+'.

for performing multiplication, the operator is '*'.

similarly, for performing subtraction, the operator is '-'.

and there is one more assignment operator in programming which is used to assign the value to the variables. The assignment operator is '='.

so,  int due = total - downPayment;

in the above, the program subtracts the downPayment value from the total value and assign to the variable due which is an integer type.

________splitting places a group of columns in onetable and the remaining columns in anothertable.1. Horizontal2. Vertical3. Both 1 and 2

Answers

Answer:

2. Vertical

Explanation:

Vertical splitting places a group of columns in one table and the remaining columns in another table.

Write a calculator program that keep reading operations and double numbers from user, and print the result based on the chosen operation using while loop. The loop must stop if the user enters Q letter.

NOTE: no need to write two classes.

Typical run of the program:

Enter an operation(+,-,*,/), Q to quit: +

Enter your first number: 6

Enter your second number: 5

Result= 11.0

Enter an operation(+,-,*,/), Q to quit: *

Enter your first number: 5

Enter your second number: 5

Result= 25.0

Enter an operation(+,-,*,/), Q to quit: q

You calculator has been ended!

Answers

Answer:

 #include <iostream>

using namespace std;

int main()

{

   char opt;

   double num1,num2;

   cout<<"Enter an operation(+,-,*,/), Q to quit: ";

   cin>>opt;

  while(opt != 'Q'){

      cout<<"\nEnter your first number: ";

      cin>>num1;

      cout<<"\nEnter your second number: ";

      cin>>num2;

      if(opt == '+'){

          cout<<"Result = "<<num1+num2<<endl;

      }else if(opt == '-'){

           cout<<"Result = "<<num1-num2<<endl;

      }else if(opt == '*'){

           cout<<"Result = "<<num1*num2<<endl;

      }else if(opt == '/'){

           cout<<"Result = "<<num1/num2<<endl;

      }

      cout<<"Enter an operation(+,-,*,/), Q to quit: ";

      cin>>opt;

  }

  return 0;

}

Explanation:

First, include the library iostream, it allows to use the input/output instruction.

Create the main function and declare the variables.

Then print the message on the screen using cout instruction.

cin instruction is used to store the value into the variable.

then, take a while and check the condition if the value enters by the user is 'Q' or not. if true then enter the while otherwise exit.

after that, store the number enter by the user in the variables and then take the if-else statement for matching the operation enter by the user if match true then do the match operation.

This process continues until the user enters the value 'Q'.

if the user enters the 'Q'  then condition false and exit the program.

Glven an array named Scores with 25 elements, what is the correct way to assign the 25th element to myScore? A. myScores + 25 B. myScore Scores[24] C. myScore Scores[25) D. myScore== Score[last]

Answers

Answer:

myScore Scores[24]

Explanation:

The array is used to store the data in continuous memory location.

The index of array start from zero, it means first element store in the index zero and second element store in the index 1. So, the index at which the element store is less than 1 from the number of element.

so, the last element is 25 - 1=24.

Option A: myScores + 25

It is not the correct way to store the element.

Option B: myScore Scores[24]

it is the correct form and also the index location is correct.

Option C: myScore Scores[25)

index number is wrong and also the bracket is wrong, it must be [ ].

Option D: myScore== Score[last]

It is not the correct way to store the element.

There, the correct option is B.

. Which of thefollowing is not a characteristic of marketing plan?

a. It shouldprovide a strategy to accomplish the company mission

b. It shouldprovide for the use of existing resources

c. It should besimple and short

d. It should berigid

Answers

Answer: d)It should be rigid

Explanation: Marketing plan is the basic report that gives the outline about the strategy of marketing in the coming time. The marketing strategy usually include the facts such as simple plan, using resources accordingly and in sufficient way, some future goals, metrics with high level,etc .But the plan should not be rigid, it will make the marketing plan restricted to certain limit which is not included in good marketing strategy.

When the amount of storage data is big, and we need the searching and insertion must be very fast, which kind of data structure we should consider? a. Hash table b. Binary tree c. Array d. Linked Lists

Answers

Answer:

b. Binary tree

Explanation:

The time complexity of a binary tree is O(log n). As it scales up in size (n), the time taken is only log n. This is because it makes use of divide and conquer to split up the data which makes searching and inserting very simple. However, this only holds if the data is already sorted.

T F The exit function can only be called from main .

Answers

Answer:

FALSE

Explanation:

The exit function is used to terminate or halt the process.

Syntax-

            void exit(int status)  

Exit function (exit()) can be used in any function not only main() and it will terminate your whole process.

Example- C Program

#include<stdio.h>

#include <stdlib.h>  

//  function declaration

float exitexample ( float x );                                

// Driver program

int main( )                

{

 float a, b ;

 printf ( "\nEnter some number for finding square \n");

  scanf ( "%f", &a ) ;

 // function call

 b = exitexample ( a ) ;                      

 printf ( "\nSquare of the given number %f is %f",a,b );  

/*This will not printed as exit function is in exitexample() function*/

}

float exitexample ( float x )   // function definition  

{

 exit(0);    //exit function

   float p ;

  p = x * x ;

return ( p ) ;

}

Which of the following will cause asyntax error?(0 < num)&& (num <12)0 < num <120 < num&& num < 12num > 0&& num <12

Answers

Answer:

The answer to this question is that none of the following will give syntax error.All of them will get executed.

(0 < num)&& (num <12)

0 < num <12

0 < num&& num < 12

num > 0&& num <12

There is no syntax error i have checked on the compiler also.But logically we take variable on the left side of the comparison operator and the value to the right of the operator.

In Java, which of these classes implement the LayoutManagerinterface?

?? RowLayout

?? ColumnLayout

?? GridBagLayout

?? FlowLayoutManager

Answers

Answer:

GridBagLayout,FlowLayoutManager

Explanation:

LayoutManager interface is the interface used for laying out containers.Components like Button,text boxes are placed by Layout Manager,it is used to determine size and position of components in a container.

We can implement this interface via many classes like -

 SpringLayout, SynthScrollBarUI, ViewportLayout  ,  FlowLayout, GridBagLayout, GridLayout etc.

GridBagLayout-This layout arranges the components in vertical,horizontal or in baseline irrespective of their size.The orientation of the GridBagLayout depends on the container's ComponentOrientation property.  

GridBagLayout is associated with an instance of GridBagConstraints which manages each component.

FlowLayoutManager-This layout arranges the components in a directional flow. The alignment of line is determined by componentOrientation.

ComponentOrientation .LEFT_TO_RIGHT  

ComponentOrientation.RIGHT_TO_LEFT

When the average amplitude is non zero then the problemarises is ______________.

Answers

Answer:

Average amplitude is the average magnitude in a wave cycle of all instant values. Average amplitude is the ratio of the sum of all instantaneous values to the number of instantaneous values considered in cycle.

When the average amplitude is non zero then the problem arises is it make it  ineffective to carry a signal over the transmission medium.

An issue arises when there is a long 0s or 1s sequence and the voltage level is maintained for a long time at the same value. This creates a receiving end problem because the clock synchronization is now lost due to the lack of any transitions.

Describe the general process of creating a DataFlow Diagram (DFD)

Answers

 Answer:

General process of creating a data flow diagram:

  Data flow diagram are used to represents the flow of data graphically and it is divided into physical and logical parameters. For creating the data flow diagram the steps involved are:

Select the data and name the DFD. In DFD add the entity for start the process and add that process in data flow diagram. Add a data store and continuous adding that data into DFD.Now, adding the data flow in DFD and name the data.

 

The good example of pivoting is changing thedimensions along the axis.? True? False

Answers

Answer:

False

Explanation:

The good example of pivoting is NOT changing the dimensions along the axis.

A(n) ___________________ process is initiated by individuals who are subjected to forensic techniques with the intention of hiding or obfuscating items or objects with evidentiary value. a. digital forensics b. discovery c. eDiscovery d. anti-forensics

Answers

A(n) anti-forensics process is initiated by individuals who are subjected to forensic techniques with the intention of hiding or obfuscating items or objects with evidentiary value.

What is the printout of the call nPrint("a", 4)?

static void nPrint(String message, int n) {
while (n > 0) {
System.out.print(message);
n--;
}
}
Please explain so that I can learn from you.

Answers

Answer:

aaaa

Explanation:

We have a function nPrint which return type is void, it means it returns nothing.

we declare the two parameters, one parameter is string type and the second parameter is an integer type.

Then, it has a while loop that executes the statement again and again until the condition not FALSE.

Let dry run the code:

First, call the function nPrint("a", 4) bypassing the value in the argument.

then, the value receives by the parameters, the message contains "a" and n contain 4. After that, while loop checks the condition 4 > 0, which is TRUE and the program starts executing the statement.

The program prints the message on the screen "a" and then decreases the value of n by 1. So, the value of n becomes 3.

The above process repeats for the value of n = 3, 2, 1

and print the message "aaaa".

then, the condition becomes false and the program terminates the loop.

Therefore, the answer is aaaa

What process makes one group a member of another group? nesting cloning copying grouping

Answers

Answer: Nesting

Explanation: The process of making one group the part of another group is defines as nesting. it is mostly done in the programming . This process helps in reduction of the program by nesting the functions. Nesting is done in computer field in applications as well to make one document the part of other  document .Therefore, nesting is the correct option .

What is the value of "d" after this line of code has been executed? double d = Math.round ( 2.5 + Math.random() ); A. 2 B. 3 C. 4 D. 2.5

Answers

Answer:

  3

Explanation:

Math.random() is the function which gives the value greater than or equal to 0.0 and less than 1.0. it gives the double type value.

Math.round is also the function which gives the closest long to the argument.

for example:

Math.round(2.5) it gives 3.

so, Math.random() generate number 0.000 to 0.999

maximum possible value inside the Math.round(2.5+0.999) which is equal to

Math.round(3.499) which gives 3 not 4 when it 3.5 then it gives 4.

therefore, the result is 3

The purpose of a report is to

A. organize and summarize data.
B. filter data.
C. search for specific data points.
D. sort data chronologically.

Answers

Answer:

c

Explanation:

Reports communicate information which has been compiled as a result of research and analysis of data and of issues

What is the purpose of TCP?

Answers

Answer:

The purpose of TCP / IP is to provide computers with a method to transmit data to each other. TCP/ IP provides the means for application to send data between computers and for networks to deliver that data to applications on others computers.

Explanation:

The internet control protocol (TCP/ IP, transmission control IP / internet protocol) is the set of protocols used to transport information on the internet and in most private networks. The TCP/IP name leaves two more important protocols of the transport layers (TCP) and the network layer (IP).

Each internet application depends on the communication of data between two or more processes. The most common is that they are two processes, and that their roles are well defined as client and server. The applications under this model ''client-server'', will issue a service request on the client side, and the server will elaborate a response and return it to the client.

To communicate these two processes it is necessary that the data that configure the requirement made by the client, and those that configure the response, produced by the server, can circulate through the network in both directions. The TCP/IP protocol suite resolves this need. For this, IP performs communication between devices, hosts, or nodes of the network, creating virtual paths between them through its fundamental function, which is routing.

For most general purpose processors, how does the operating system handle the situation when the processor is idle?

Answers

Answer:

The operating system handle this system idle situation by using the System Idle Process.

Explanation:

This system idle process constantly keeps the processor occupied means that the processor will not freeze when no processes are in work.When a process is using 12% of the CPU then 88% of the CPU is used by the system idle process.You can see this in the task manager of your windows.

In which of the following is “y” not equal to 5 after execution? X is equal to 4.

a) y = ++x; b) y = x = 5; c) y = 5; d) y = x++;

Answers

Answer:

d) y=x++

Explanation:

In all 3 statements:

y= ++x;

y=x=5;

y=5;

The value of y is equal to 5.

However in the statement y=x++, the value of 5 is equal to value of x prior to the increment operation. The original value of x was 4. So the value of y will be 4. Note that after the statement execution, the value of x will be updated to 5. In effect y=x++ can be visualized as a sequence of following steps:

x=4;

y=x;

x=x+1;

____ is a set of elements of the same type in which the elements are added at one end.

A.
hash table

B.
tree

C.
queue

Answers

Answer:

queue

Explanation:

queue is the data structure which perform the operation in specific order.

It follow the order first in first out (FIFO). The element is insert at the rear end and deleted from the front.

So, the element is added only the one end.

Tree is a hierarchical structure, their is not one end which used to insert the element.

Hash table also not having single end for insert the element.

Therefore, the answer is queue.

Special variables that hold copies of function arguments are called _________.

Answers

Answer:

Special variables that hold copies of function arguments are called parameters.

Other Questions
How did President Clinton respond to the terrorist attack in Oklahoma City?He closed all federal buildings in Oklahoma.He signed a new antiterrorism law.He outlawed groups that opposed the federal government. How should we respect the international personalities?write in short point Write a C++ program that computes the area and perimeter of aspecified shape(either rectangle,triangle, or circle). The user should be prompted for therelevantinput (type of shape anddata associated with that shape). See the examplebelow.Enter the shape type (1 forrectangle, 2 for triangle, 3 for circle)1Enter the width2Enter the height3The perimeter of the rectangleis 10 and the area is 6. Completion time (from start to finish) of a building remodeling project is normally distributed with a mean of 200 work-days and a standard deviation of 10 work-days. To be 99% sure that we will not be late in completing the project, we should request a completion time of _______ work-days. How much work is done lifting a 12-m chain that is initially coiled on the ground and has a density 2 kg/m so that its top end is 8 m above the ground? (Assume that acceleration due to gravity is g = 9.8 m/s2.) What kind of graphs can you use to understand how people came to the United States? In a week you could read two books or see four movies.The opportunity cost of choosing to read one book is While viewing a webpage for outdoor gear, Phil noticed a graphic display advertising skateboards at low prices. When he clicked on the ad, it took him to a different website where the skateboards were listed for sale. This is an example of what type of Internet advertising? The equation of a line is -6x - 2y = -18. What is the x-intercept & y-intercept of the line?a. x-intercept = 3 y-intercept = 9b. x-intercept = 9 y-intercept = 3c. x-intercept = -3 y-intercept = -9d. x-intercept = -9 y-intercept = -3 one of the leading cause of death among young children is Deep ultrasonic heating is used to promote healing of torn tendons. It is produced by applying ultrasonic sound over the affected area of the body. The sound transducer (generator) is circular with a radius of 1.09 cm, and it produces a sound intensity of 6.86 103 W/m2. How much time is required for the transducer to emit 4040 J of sound energy? 4.A 48 inch long cylindrical shaped cannon has a diameter of 4 inches. There are two 3 inch diameter cannonballs inside it. How much empty space is in the cannon barrel (round to the nearest hundredth and use 3.14 for pi)? Write a programe to add two numbers using function with return type"void". Choose the correct preterite form ofirin this sentence:Nosotros ______ juntos.Question 1 options:a)fuib)fuec)fuimosd)fueron What is Mrs. Morningstar's opinion regarding Bolsa? You see a cell with several nuclei and you know that something is different about cell division. What is the most likely explanation? a. Failure of cytokinesis following mitosis b. Failure of homologous chromosomes to separate nondisjunction c. Failure of sister chromatids to separate Use a substitution method to solve both of the following DEs, stating the general solution clearly, and showing all work clearly. a. dy/dx - y = e^xy^2 (Solve explicitly for y.) b. dy/dx = x + y/x - y (You can leave the General Solution in implicit form.) Give the largest interval I over which the general solution is defined. PLEASE EXPLAIN HOW!!!(x^2-1)dy/dx+2y=(x+1)^2 How to work out 161 as a percentage of 3500 Anna wants to take fitness classes. She compares two gyms to determine which would be the best deal for her. Fit Fast charges a set fee per class. Stepping Up charges a monthly fee, plus an additional fee per class. The system of equations models the total costs for each.y = 7.5xy = 5.5x + 101. Substitute: 7.5x = 5.5x + 10How many classes could Anna take so that the total cost for the month would be the same?