Answer:
d. Divide and conquer approach
Explanation:
Dividing and conquering, mostly used in computing, is a multi-branched recursion-based algorithm layout framework.
A dividing-and-conquering algorithm operates by repeatedly breaking down a issue into multiple smaller problems of the same or associated kinds until it becomes sufficiently easy to solve them instantly.
The troubleshooting approach that starts examining from the network layer of the OSI model is known as the bottom-up approach. It operates on the principle of verifying the functionality of lower layers before the higher ones.
When examining a network problem by starting at the network layer of the OSI model, the troubleshooting approach being used is the bottom up approach. This strategy begins at the lower levels of the OSI model and works its way up, troubleshooting each layer in turn until the problem is found. Starting at the network layer, which is the third layer of the OSI model, means you are working up from the link layer and physical layer that underpin it.
The OSI model is a conceptual framework that uses a layered approach, making networks easier to understand and troubleshoot. The network layer where IP addresses live is crucial for routing packets across networks. The bottom-up approach is effective because it checks fundamental aspects like cable connections and signal transmission before moving on to more abstract layers including the network layer's routing protocols and connection state.
A class named Clock has two instance variables: hours (type int) and isTicking (type boolean). Write a constructor that takes a reference to an existing Clock object as a parameter and copies that object's instance variables to the object being created.
Answer:
public Clock(Clock a) // Copy constructor
{
hour = a.hour;
Ticking = a.Ticking;
}
Explanation:
Following are the program in c#
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
namespace Program
{
class Clock // Class
{
// variables For Clock Class
private int hour;
private bool Ticking;
public Clock(int hour, bool ticking) // Parameterized constructor for Initilizing
{
this.hour = hour;
this.Ticking = ticking;
}
public Clock(Clock a) // Copy constructor
{
hour = a.hour;
Ticking = a.Ticking;
}
static void Main(string[] args) // Main function
{
// Create a new object For Clock Class.
Clock c1 = new Clock(20, true);
// c1 are copied to c2.
Clock c2 = new Clock(c1);
Console.WriteLine("Hours : " + c2.hour);
Console.WriteLine("Ticking : " + c2.Ticking);
Console.Read();
}
}
}
Output:
Hour : 20
Ticking : True
In this program their is a single class Clock which have a variable hours and ticking. hour is of type integer and ticking is type of bool which is either True or False. Here two types of constructor are used:-
1. Parameterized Constructor : This is used to initialize the value to a variables declared in Clock Class. Like in program when c1 object is created it automatically initialize the value to variable of class.
2. Copy Constructor : This constructor is used to copy the c1 instance to the c2 instance.
Hence, c1 instance have value Hour And Ticking is copied to c2 instance. So c2 also have the same value like c1 instance have
In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In this scenario, the _____ decision-making analysis has been used to display the desired results on the system.
a. if-else
b. what-is
c. if-continue
d. what-if
Answer:
b. what-is
Explanation:
According to my research on the decision making analysis, I can say that based on the information provided within the question this analysis is called "what-is". This (like described in the question) is the act of providing a specific piece of information in order to receive a set of information in regards to what you provided.
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
Answer:
b. what-is
Explanation:
In an airline reservation system, on entering the flight number, the flight schedule and the flight status are displayed. In this scenario, the what-is decision-making analysis has been used to display the desired results on the system.
Get user input as a boolean and store it in the variable tallEnough. Also, get user input as a boolean and store it in the variable oldEnough. Then, use the two boolean variables to decide whether the user is able to ride the rollercoaster. The only time the user can ride the rollercoaster is if the responses to both answers is true. Use a logical operator to decide whether the user is eligible to ride. Print true or false depending on whether the user can or can’t ride the rollercoaster.
Answer:
I will code in JAVA.
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
boolean tallEnough;
boolean oldEnough;
Scanner input = new Scanner(System.in);
tallEnough = input.nextBoolean(); //wait the input for tallEnough
oldEnough = input.nextBoolean(); //wait the input for OldEnough
if(tallEnough && oldEnough){
System.out.print(true);
} else {
System.out.print(false);
}
}
}
Explanation:
First, to accept user inputs you have to import the class Scanner. Then declare both variables before allowing the user to set input values for both boolean variables.
In the if-else statement checks if both variables are true, then prints true. Another case prints always false.
How do you know if something is in the public domain
Yoon, who sells designer jeans, has a mobile app to help women determine what leg style looks best on their body type. What could she do to bring in more prospective customers?
a. Add a mobile-app extension to her ad
b. Use sitelink extensions.
c. Add a call-only extension to her ad
d. Include a link to her mobile website in her ad.
Answer:a)Add a mobile-app extension to her ad
Explanation: A mobile app extension is the tool that extends due to the purpose of any specific function.It creates the extension of the application's function and information towards the users. This creates a interactive environment with the user even when they are accessing other apps.
Other options are incorrect because site link will be for sharing of the link as extension,call only extension is the calling purpose and mobile website link in the ad will only be used while accessing the website. Thus the correct option is option(a).
Alfred, a software programmer at Gamma Inc., develops a program that spreads Trojan viruses to the organization’s network. When Liam, his manager, discovers that Alfred had intentionally spread the virus, he immediately fires Alfred. In this scenario, Liam’s behavior is considered _____. a. legal and ethical b. illegal, but ethical c. legal, but unethical d. illegal and unethical
Answer: (A) legal and ethical
Explanation:
In the above given scenario, the liam's behaviors is consider as legal and ethical. The organization ethics is the morals of an association, and it is the means by which an association reacts to an inner or outside upgrade. Hierarchical morals is associated with the authoritative culture.
The ethical standard are basically depend on the human standards of good and bad and lawful guidelines depend on composed law, while moral norms depend on human rights and wrongs.
In the organization, the ethical and legal value are basically expressed by each employee as it is the regulatory law which is developed by the government for the particular organization to maintain the discipline.
The manager discovers that he had intentionally planned and spread the virus that lead to his immediate fired. Thus option D. the illegal and unethical.
How is use of the virus bad for a company.?As the spreading of the virus which is a program that destroys the company's reputation in the market and also destroys the integrity and leaks the data of the various users of the system is sort of hacking and a crime that has a paneity and a fine. Thus is illegal as against the norms and unethical.
Find out more information about the software programmer.
brainly.com/question/18340665.
Which value can be entered to cause the following code segment to display the message "That number is acceptable."? ____.
intnumber;
cin>> number;
if (number > 10 && number < 100)
cout << "That number is acceptable.\n";
else
cout << "That number is not acceptable.\n";
a) 0
b) 10
c) 99
d) 100
e) All of these
Answer:
C) 99
Explanation:
This code only displays "That number is acceptable" when such number is higher than 10 and less than 100. This is becasue the conditional sentence if controls which message is going to be displayed based on the abovementioned condition. 0 and 10 are not greater than 10, so they don't pass the condition and 100 is not less than itself, so it does not pass either. The only number among the options greater than 10 and less than 100 is 99.
The IT department sent out a memo stating that it will start delivering desktop computer interfaces through the IT data center via a web browser interface. What technology is the IT department using?
a. Public cloud computingb. Server clusteringc. Directory serverd. Virtual desktop infrastructure
Answer: Virtual desktop infrastructure
Explanation:
The virtual desktop infrastructure is the virtualization technology in which the host desktop OS (operating system) is in the centralized server of the data center. The virtual desktop infrastructure is also known as server based computing as it include the variation in the computing model such as client - server model.
The example of the virtual desktop infrastructure is wallpapers, toolbars, window and folder is the stored in the server remotely.
All the other options does not involve with this technology so that is why option (D) is correct.
A customer, who uses a Windows computer, recently purchased an inkjet printer from your store. She is now calling to complain that the colors in the photos she printed on her new printer don't match the colors in the original photos created by the photo shop.
• Run the Windows FIXCOLR utility to automatically calibrate the driver's color settings.
• Use the Color Management tab of the printer driver to calibrate the driver's color settings.
• Download and install the latest printer drivers.
• Instruct the customer to upgrade to a color laser printer.
• Educate the customer on the limitations of inkjet printers.
• Use Driver Rollback to restore an earlier version of the printer driver.
Answer:
• Use the Color Management tab of the printer driver to calibrate the driver's color settings.
• Download and install the latest printer drivers.
A customer, who uses a Windows computer, recently purchased an inkjet printer from your store. The correct options are:
B. Use the Color Management tab of the printer driver to calibrate the driver's color settings.
C. Download and install the latest printer drivers.
What is Photoshop?The industry standard for photo editing software, Photoshop is the preferred choice for anything from minor retouching adjustments to innovative photo art.
Editors use Photoshop to crop pictures, change the way they seem, fix lighting issues, and give any topic the greatest possible appearance.
Therefore, the correct options are: B. Use the Color Management tab of the printer driver to calibrate the driver's color settings and C. Download and install the latest printer drivers.
To learn more about Photoshop, refer to the link:
https://brainly.com/question/15385979
#SPJ5
Bob finished a C programming course and created a small C application to monitor the network traffic and produce alerts when any origin sends "many" IP packets, based on the average number of packets sent by all origins and using some thresholds. In concept, the solution developed by Bob is actually:
A. Just a network monitoring tool
B. A signature-based IDS
C. A hybrid IDS
D. A behavior-based IDS
Final answer:
The solution developed by Bob is a behavior-based IDS, which monitors network traffic and produces alerts based on the average number of packets sent by all origins and using thresholds.
Explanation:
The solution developed by Bob for monitoring network traffic and producing alerts when any origin sends "many" IP packets is a behavior-based IDS.
A behavior-based IDS is designed to detect suspicious or abnormal behavior on a network rather than relying on known signatures. In this case, the application monitors the average number of packets sent by all origins and uses thresholds to identify potentially malicious activity.
This approach is different from a signature-based IDS, which matches patterns or signatures of known attacks, and a hybrid IDS, which combines both signature-based and behavior-based techniques.
The term _____ refers to an organization of components that define and regulate the collection, storage, management and use of data within a database environment.
a) transaction
b) database system
c) structured data
d) management system
Answer:
The correct answer for the given question is option(B) i.e "database system"
Explanation:
Database is the collection of interrelated data .Database system is an organization of components that define and regulate the collection, storage and manage the data.Database system maintain the integrity in the database. Database system provides an interface to the database for information storage and retrieval.
Transaction is the contract between a buyer and a seller to interchange goods or services. it does not regulate the collection store the data so this option is wrong .
Structured data and management system does not store the data that define and regulate the collection in organization. So this option is also wrong
So correct answer is database system.
Answer:
b) database system
Explanation:
Database System is a container (usually a file or set of files) used to store organized data; a set of related information. Examples of this systems are MySQL, SQLite e.t.c
Write a sequence of statements that finds the first comma in the string line, and assigns to the variable clause the portion of line up to, but not including the comma. You may assume that an int variable pos, as well as the variables line and clause, have already been declared.
Answer:
I will code in Javascript;
function findFirstComma() {
var pos;
var line = 'Thi,s is a t,est';
var clause;
pos = line.indexOf(','); //set pos in 3.
clause= line.slice(0,pos); // saves in clause the value 'Thi'.
}
Explanation:
The slice(start, end) method extract a part of a string then returns a new string with the extracted part. The end parameter indicates where to end the extraction(up to, but not including).
The includes(value) method determines if a string contains the characters on a specified string, if it doesn't match then returns -1.
What term is used to describe the process or mechanism of granting or denying use of a resource, typically applied to users or generic network traffic?
Answer: Access control
Explanation: Access control is the control unit that permits about the usage of the computer environment and its resources.It acts as the security feature that helps in the granting permission or denying the permission in a operating system.
The accessing of the service or resource by the permitted user decreases the risk of the organizations, companies etc.There are three types of the access control named as MAC(mandatory access control),DAC(discretionary access control ) and RBAC(role-based access control).
Computer ______________ concerns itself with instruction sets and formats, operation codes, data types, the number and types of registers, addressing modes, main memory access methods, and various I/O mechanisms.
Answer: architecture
Explanation:
The computer architecture is one of the most important criteria for deciding the instruction sets and formats, operation codes, data types, the number and types of registers, addressing modes, main memory access methods, and various I/O mechanisms. Based on this architecture we have further different types of computer system divided based on their performance and reliability.
The most important architectures is the Von Neumann architecture which laid the first architectural model of the computer system. then based on it we have RISC and CISC architectures we get different systems with different performance ratings. Their instruction sets are different, their datatypes are different and their addressing modes are different. Based on architecture we have different addressing modes such as register addressing mode, direct, indirect addressing modes.
In a _____ feedback loop, output that results from a system acts as input that moves the system in the other direction.In a _____ feedback loop, output that results from a system acts as input that moves the system in the other direction.invertednegativeconvolutedpositive
Answer: Negative
Explanation: A negative feedback loop has the major property of regulating on its own. It also becomes stable at certain point of time which makes it balancing feedback.The increment in the output of this system prevents the future generation of the feedback system.
The output gained as feedback is meant as the input in opposite direction in this system.Other options are incorrect because inverted feedback loop works in the inverted manner, positive feedback loop behaves as unstable system and convoluted feedback loop is not a technical term.
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
A. HTTP, IP, TCP, Ethernet
B. HTTP, TCP, IP, Ethernet*
C. Ethernet, TCP, IP, HTTP
D. Ethernet, IP, TCP, HTTP
Answer:
D. Ethernet. IP, TCP, HTTP
Explanation:
OSI model help us to see the are level of protocols executed one by one and each one becoming the data for the next protocol to be executed properly and the request can be sent. This sequence of protocols is what is called the protocol stack and the first protocols to be carried out are the ones related to the physical media used to send the request (wire, WiFi, mobile data, etc). That is Why Ethernet protocol goes fisrt from the perspective of the client. Then the next protocols should be the ones who prepare the request to be identified through internet and that is when IP comes into play. Remember: First Ethernet protocol and then IP (Internet Protocol).
Once the request is identified it needs to be secured and actions must be taken to ensure data fidelity (no loss of information during transmition). This level of quality is possible thanks to protocols like TCP, so this is the next one on the protocol stack. Now the request has a media to be sent, an way to be identified over the internet and communication between the client and the web server is guaranteed to be successful, then the request can be sent via a protocol like HTTP en charge of transporting the data to the server.
The correct option B. HTTP, TCP, IP, Ethernet
The correct order of the protocol stack from the perspective of the client when sending a request for a webpage to a web server is: HTTP, TCP, IP, Ethernet. This order corresponds to option B. Let's break this down step-by-step:
HTTP (HyperText Transfer Protocol) is used at the Application layer to format and send the request for the webpage.
TCP (Transmission Control Protocol) operates at the Transport layer to ensure reliable data transmission between the client and server.
IP (Internet Protocol) functions at the Network layer to handle network addressing and routing the packet to the destination.
Ethernet works at the Network Access layer to prepare the data packet for physical transmission over the network.
These protocols collaboratively ensure that your web request is sent, routed, and delivered accurately to the web server.
Katie's design template includes an indent for the first paragraph of every chapter and first paragraph after any section break in a chapter, To keep these indents visually consistent, she instructs her designers to do which of the following?
A. Specify an indent value in the Paragraph panel
B. Use the Tab key
C. Press [Spacebar] exactly five times to create the
indent
D. Specify an indent value in the Character panel
Answer: A. Specify an indent value in the Paragraph panel
Explanation:
Katie's wants an indent for the first paragraph and for all subsequent paragraphs in case of section breaks in the chapter.
So in this case if we specify an indent value in the paragraph panel then it would appear in all the subsequent paragraph section.
Option b is not correct as using the tab key would be a long process and have to keep a count on the number of times the tab needs to be placed.
Option c is incorrect as pressing the space button would be more longer option and the indent would also be not at the same place where we want it.
The indent value would work for characters and would not work for paragraphs as desired by katie.
Kaira's company recently switched to a new calendaring system provided by a vendor. Kaira and other users connect to the system, hosted at the vendor's site, using a webbrowser. Which service delivery model is Kaira's company using?
Answer:Software as a Service (SaaS)
Explanation: Software as a service(SaaS) is the software model that consist of the services don by it in the distributed form. There is presence of the third party or external factor that helps in providing the internet with the users It is the widely used in the area of cloud computing.
Kaira's company is also tending to used the software as service model(SaaS) for their company to maintain the connection of the system's host and employees.
Electronic transmission of information standards, such as transaction and code sets and uniform identifiers, are covered underQuestion options:a) administrative simplification.b) HITECH.
c) CMS.d) OCR
Answer:
option A
Explanation:
Option A.
With the use of Administrative simplification, we can transform all the paper work to electronic media such as electronic receipts or electronic mail. By shifting towards electronic means in Administrative simplification we are actually saving a lot of time by helping the human resource and from the laborious tasks of paper work and data management.
The management of electronic means is very easy and friendly, it is also a reason for implementing administration simplification as well.
Declare and initialize the following variables: monthOfYear, initialized to the value 11 companyRevenue, initialized to the value 5666777 firstClassTicketPrice, initialized to the value 6000 totalPopulation, initialized to the value 1222333
Answer:
int monthOfYear=11;
long companyRevenue=5666777;
int firstClassTicketPrice=6000;
long totalPopulation=1222333;
Explanation:
Here we have declared four variable monthOfYear , companyRevenue, firstClassTicketPrice , totalPopulation as int ,long, int and long type .We have declared companyRevenue,totalPopulation as long type because it exceed the range of integer.
Following are the program in c language
#include <stdio.h> // header file
int main() // main function
{
int monthOfYear=11; // variable
long companyRevenue=5666777; //variable
int firstClassTicketPrice=6000;//variable
long totalPopulation=1222333;//variable
printf("%d\n%ld\n%d\n%ld",monthOfYear,companyRevenue,firstClassTicketPrice,totalPopulation); // display value
return 0;
}
Output:
11
5666777
6000
1222333
Final answer:
In programming, variables are initialized by selecting appropriate data types and assigning values. The variables monthOfYear, companyRevenue, firstClassTicketPrice, and totalPopulation would be initialized with the data types int, double, and long, to correspond with their expected value ranges.
Explanation:
Variable Initialization in Programming
To initialize the given variables in programming, you would select the appropriate data types and assign the provided values. Here's how you can declare and initialize the variables:
int monthOfYear = 11; // Assuming months are integer values from 1 to 12
double companyRevenue = 5666777; // Revenue is usually a large number with the potential for decimal points, hence 'double'
double firstClassTicketPrice = 6000; // Similar to revenue, the price could potentially have decimals
long totalPopulation = 1222333; // Population can be a large number, therefore 'long' might be used for larger range
Note that the data types chosen (such as int, double, long) are based on the usual conventions and the expected ranges of the values. For example, 'int' is typically used for whole numbers without decimals, 'double' for numbers with a significant range and potential decimals, and 'long' for very large numbers.
What is a type of machine-to-human communication?
A.
biofeedback
B.
Talking face to face
C.
Typing on a computer
D.
Your computer communicating with a server
*I will give brainliest to the first answer*
A. Biofeedback
Its where your body is read by a machine and you read the machine
Answer:
A. Biofeedback
Explanation:
(did this so other person could get brainliest)
When a customer places an order atBookBox.com, the company processesthe customer's payment information,sends the order to the nearestwarehouse, and ships the order viaFedEx. This is best described as the________.
A) market-sensing process
B) customer acquisition process
C) customer relationship managementprocess
D) fulfillment management process
E) new-offering realization process
Answer:
fulfillment management process
Explanation:
According to my research on the different business process', I can say that based on the information provided within the question this is best described as the fulfillment management process. Which is the process that a company goes through from accepting an order to delivering that order to the client. Which is what is happening in this situation.
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
Which of the following terms best describes the security domain that relates to how data is classified and valued?
a) Security Policy
b) Asset Management Compliance
c) Access Control
Answer:
c) Access Control.
Explanation:
The term which describes the security domain best that relates to how the data is valued and classified is Access Control.
Access Control :It is the restriction of access of a resource or a place that is selective.Permission to access a resource is called authorization.It is an important term in the field of information security and physical security.
Given an int variable n that has already been initialized to a positive value and, in addition, int variables k and total that have already been declared use a while loop to compute the sum of the cubes of the first n whole numbers.
Answer:
// here is code in C++.
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
int n=5;
int k,total=0;
int copy=n;
// while loop to calculate cubes
while(n)
{
// find cube
k=n*n*n;
// find total
total=total+k;
// decrease n
n--;
}
// print sum of cubes of first n whole numbers
cout<<"Sum of cube of first "<<copy<<" numbers is "<<total<<endl;
return 0;
}
Explanation:
Declare three variables n, k and total. initialize n with 5.In the while loop, calculate cube of n then add it to total.Then decrease the n by 1.While loop run until n becomes 0.After the while loop,total will have the sum of cubes of first n whole numbers.
Output:
Sum of cube of first 5 numbers is 225
The information revolution is defined as ______.
The information revolution is defined as the rapid increase of available information and of technological developments such as the internet, computers, cellphones, and gadgets, that have made possible that the information is obtained, processed, stored and transmitted at a low cost and in the least amount of time. This dramatic and wide-reaching change has impacted everything from the way we learn and interact as a society, to the economy and politics of a nation.
If you're currently using text, display, and video ads but also want to more specifically control spending on ads that appear when someone searches on Google, which additional campaign type would you choose?
a. Search Network
b. Search Network with Display opt-in
c. Universal App
d. Display Network
Answer:a)Search Network
Explanation:Search network is the tool provided by Google where the advertisements appear when there is search execute on the website or apps.The ad appears while searching is due to the keywords present in the search titles.
Other options are incorrect because display network is already taken by the user and because of that display, text and video are being accessed and Universal app contain various features which is not required in this situation.Search network along with display opt-in is not correct because it already has display network. Thus the correct option is option(a).
A Law office has leasing dark fiber from a local telecommunications company to connect a remote office to company headquarters. The telecommunications company has decided to discontinue its dark fiber product and is offering an MPLS connection, which the law office feels is too expensive. Which of the following is the BEST solution for the law office?
Remote access VPN
VLAN
VPN Concentrator
Site-to-site VPN
Answer: Site to site VPN
Explanation:
A site to site VPN is the connection in which it allow offices to establish a secure connection over they public network like internet. It can easily connect multiple network in the office like it connect the various remote office with the company headquarter for communication.
The site to site VPN network is very secure as compared to traditional VPN system. All the traffic are get encrypt in the tunnel from one site to the another site.
And all the other options are not much efficient as they does not provide any high effective VPN system as compared to site to site VPN system.
Therefore, correct option is Site-to-site VPN.
What is the correct term for a set of established guidelines for actions (which may be designated by individuals, teams, functions, or capabilities) under various specified conditions?
Answer: Protocol
Explanation: Protocol is the standard that is used in the communication and electronic devices for the communication. Through the mean of the these guidelines the communication is done by the sending and receiving of the data.
This works for the both wired networking and wireless communication which functions under the certain conditions.Examples-TCP(Transmission control protocol), FTP(File transfer protocol) etc.
"Matthew captures traffic on his network and notices connections using ports 20, 22, 23, and 80. Which port normally hosts a protocol that uses secure, ncrypted connection
A. 20
B. 22
C. 23
D. 80 "
Answer:
B.22
Explanation:
I know this because 22 is normally a port that hosts a protocol with an encrypted connection
An organization wants to upgrade its enterprise-wide desktop computer solution. The organization currently has 500 PCs active on the network. The Chief Information Security Officer (CISO) suggests that the organization employ desktop imaging technology for such a large-scale upgrade. Which of the following is a security benefit of implementing an imaging solution?
It allows for faster deployment
It provides a consistent baseline
It reduces the number of vulnerabilities
It decreases the boot time
Answer: It provide a consistent baseline
Explanation:
Imaging technology basically provide the consistent security baseline for the implementation of the imaging solution.
The main objective is to provide the security services to the organization system.
The chief information security officer (CISO) basically suggest that the for the large upgrade the organization should use the desktop imaging software technology. This technology is basically used to maintain the entire copy of the computer data.