You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing.

Answers

Answer 1

Answer: volume testing

Explanation:

Volume testing is a non-functional test that looks into the performance of a software or database whenn handling a particular amount of data. It can be used to determine how much data or users a database or software can handle without a substantial change in the performance.


Related Questions

Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she sees values that look like this: "XXX-XX-9142." What has happened to these records?
a. Encryption.
b. Truncation.
c. Hashing.
d. Masking

Answers

Answer:

The correct option to the following question is an option (D) Masking.

Explanation:

The following option is correct because Masking is the ability to apply mask on the value with the help of bitwise AND, OR and XOR,  

That's why, when Alison looks the Social Security Number then it looks different and this is the 9 digits of Social Security Number which is in three parts, the first part is for the area, the next part is for group number and last part is for the serial number.

A modem from which communications occur in discrete units, and in which the start of a unit is signaled by a start bit at the front, and a stop bit at the back signals the end of the unit.

Answers

Answer:

Asynchronous modem

Explanation:

In an asynchronous modem, data is transmitted in an infrequent stream of small packets, in which a start bit at the front signals the start of a unit, and the end of the unit is signaled by a stop bit at the back.

Adam is evaluating the security of a web server before it goes live. He believes that an issue in the code allows an SQL injection attack against the server. What term describes the issue that Adam discovered?

A. threat
b. vulnerability
c. risk
d. impact

Answers

The term vulnerability describes the issue that Adam discovered.

b. vulnerability

Explanation:

SQL injection attack is an attack in which an external party can execute SQL commands on the database that serves as a back-end for a particular website. The SQL commands can be used to modify the contents of the website, modify the records, delete the records, and retrieve confidential information as well.  

As Adam believes that the code has an issue that allows a SQL injection attack, the term that best describes the issue that he discovered is vulnerability. The website is vulnerable since the code does not have a proper procedure to tackle a situation of SQL injection attack.

Jed is a database administrator for a mid-sized computer component manufacturer. Part of his duties include managing security, tracking problems, and monitoring the performance of the database. This is an example of Jed's ________ tasks.

Answers

Answer:

operational

Explanation:

Based on the information provided within the question it can be said that this is an example of Jed's operational tasks. These are tasks that maintain a system and make sure that everything is running efficiently as opposed to creating something new or innovating. Which is what Jed does by monitoring and managing security and problems in order to make sure everything is running as it should be.

​A(n) ________ database makes it possible to store information across millions of machines in hundreds of data centers around the​ globe, with special​ time-keeping tools to synchronize the data and ensure the data are always consistent. qizlet

Answers

Answer:

A distributed database makes it possible to store information across millions of machines in hundreds of data centers around the​ globe, with special​ time-keeping tools to synchronize the data and ensure the data are always consistent.

Explanation:

In distributed databases, a database can be opened, viewed modified or deleted on more than one places. This means distributed databases has a system that integrates the data being used at more than one location. These locations can either be under same network or entirely different network.

All the data is synchronized periodically in order to  ensure that changes made at one place are reflected at all other locations.

i hope it will help you!

Classes cannot:
A) Be derived from other classes
B) Initialize data members in the class definition
C) Be used to model attributes and behaviors of objects
D) Include objects from other classes as members

Answers

Classes cannot Initialize data members in the class definition.

B) Initialize data members in the class definition

Explanation:

Class is defined by end user data type where it can handle multiple data type and referred to other classes also. Class is also called as data structure object or object class.

Due to class methods total programming language coding style is changes. For example employee of an organization should hold his or her employee number, address detail, spouse details, salary details

Where in old style programming language we need to declare separate variable to hold the data types, where we can define employee as class which can hold employee number, address fields, and again define salary details as other class and add employee->employee number where key connect between to class which is called derived class.

Which security technology inspects network traffic, attempting to find matches to suspected malicious or unauthorized activity based on the content of the packets, and is limited to being able to only log or send alerts on that malicious activity?

Answers

Answer:

Intrusion Detection System (IDS)

Explanation:

An Intrustion Detection System (IDS) is an application software or hardware device that monitors network traffics or systems. It searches the network or system for threats. These threats could be (but not limited to) suspicious activities or malicious activities or policy violations.

Once a threat is observed, it beeps or alerts the system administrator(s). Also, all these threats are then logged in a security information and event management (SIEM) system.

But an IDS cannot block or prevent threats on the system.

you are the server managert for your company you hae just installed a new windows server you need to design a backup and recovery strategy for the server that meets the following requirements you will use windows tools for the backups backups are to be taken to an offsiet location for storage aftrer they are performed backups should only save data changed since the lasty backup you need to be able to recover invidual files and folders whaty should you do

Answers

Answer:

We should use the Windows Server Backups options to create a scheduled backup to the drives or the removable hard disk.

Explanation:

WSB(Windows Server Backup)is referred to as it is one of the best features or options of the Windows server by which we can create backups of our data and recover that data when we have lost them.

This option provides you the full security of your files, if you create a backup of those files then you have recover them when the file will be corrupted or you lose those file

A service-oriented architecture _________________. Question 5 options: a) Is one in which the servers are supporting multiple mobile devices b) Enables Web services to be reused across an organization c) Is a type of cloud computing d) Is focused on user response e) Places servers closest to the primary user

Answers

Answer:

Enables Web services to be reused across an organization

Explanation:

Option B is correct

Bullets in a text box will do which of the following?

A) ensure you fill up the slide with text
B) help you present you data with concise statements
C) help you properly size your text
D) ensure you leave space for drawings

Answers

Answer:

Option B is the correct answer to this question.

Explanation:

Bullets play very important role in presenting the data with concise statements:

As the bullets make the statements more clear and effective.Bullets make the statements/data more easy,clear, and simple for the readers to understand.They make the document more appealing to the user or the reader and makes the document to be presented in a proper and specific order.Bullets make the writers to organise and emphasize their information quickly and effectively.Bullets make the text more beautiful,effective and easy to learn or understand.

All other options are incorrect because they do not relate from this question.

A hardware compatibility list recommends striping with double parity as storage for an application. In a test environment, a technician realized that a different RAID level can be used to compensate for a limited number of available disks. Which of the following is the closest RAID level the technician should deploy while minimizing the number of disks and maintaining fault tolerance.

Answers

Answer:

RAID level 5 can be used to compensate a limited number of available disks.

Explanation:

There are two type of RAID

Software RAIDHardware RAID

Software RAID

deliver services form the host.

Hardware RAID

provides hardware services.

RAID has levels

0, 1, 5, 6, and 10

RAID 0, 1, and 5 work on both HDD and SSD media,

4 and 6 also work on both media.

RAID 0 :Striping

In this level minimum of two disks,RAID 0 split the file strip the data.Multiple hard drive are used to split the data.

RAID 1 : Mirroring

In this level Minimum two disk require and provide data tendency.

RAID 5 :Stripping with parity

Parity is a binary data.RAID system calculate the value which system used to recover the data.

Most RAID system with parity function store parity blocks.

RAID 5 combines the performance of RAID 0 with redundancy of RAID 1.

RAID 5 level should minimize the fault tolerance.

When connecting a trunk link between two switches, it is important to configure the allowed VLANs correctly on either end. If this is not done correctly _________ will occur.

Answers

Answer: A VLAN mismatch

Explanation:

 The VLAN mismatch is the process when the both ends of the truck line are not connected correctly and properly between the two switches.

The configuration of the VLAN is done correctly as it is important to connecting the VLAN on either of the ends for avoiding the VLAN mismatch occurrence. By default the truck allow the VLAN 2094 for traversing the trunk by using the native VLAN in the form of VLAN 1.

Therefore, VLAN mismatch is the correct answer.

In a(n) ____ design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen.A. closedB. distributedC. openD. centralized

Answers

Answer:

D. centralized

Explanation:

Centralized design is a type of computing architecture where all or most of the processing/computing is performed on a central server. Centralized computing enables the deployment of all of a central server's computing resources, administration and management. The central server, in turn, is responsible for delivering application logic, processing and providing computing resources to the attached client machines.

Therefore in centralized design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen

Final answer:

The correct answer is D. In a centralized design, a user's keystrokes are sent to the mainframe, which processes the input and sends the output back to the user's screen.

Explanation:

In a centralized design, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen.

This setup is typical of traditional mainframe environments, where a powerful central computer (the mainframe) handles processing and storage, while user terminals mainly serve as input and output points.

The centralized computing model contrasts with distributed computing, where processing is spread across multiple machines.

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

Answers

Answer:  

The answer is "SCMS".  

Explanation:  

MIS stands for management information systems. This system studies information systems and use in business and other organizations. This system is categories in many forms in which SCMS helps businesses manage inventories.  

The SCMS stands for Serial Copy Management System. It is a system that allows users to copy digital content by showing how much they would copy.  In this process, the user will be copying digital information via authorization flags.

On a compromised computer, you have found that a user without administrative privileges was able to perform a task limited to only administrative accounts. What type of exploit has occurred?​

a. privilege escalation
b. ​DNS cache poisoning
c. man-in-the-middle
d. ARP poisoning

Answers

Answer:

a. privilege escalation

Explanation:

Privilege escalation is the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user.

Thus, if a user without administrative privileges was able to perform a task limited to only administrative accounts, this can be called as privilege escalation.

DNS cache poisoning is a type of attack that exploits vulnerabilities in the domain name system (DNS) to divert Internet traffic away from legitimate servers and towards fake ones.

A man-in-the-middle attack is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

ARP poisoning is a technique by which an attacker sends Address Resolution Protocol messages onto a local area network.

The exploit that occurred is a privilege escalation attack, allowing a non-administrative user to perform administrative tasks.Therefore the Correct Option Is a. privilege escalation.

The Correct Answer Is a. privilege escalation. This exploit allows a user to gain elevated access to resources that are typically restricted for higher-level accounts.

Here are definitions of the incorrect options:

DNS cache poisoning: This attack involves substituting addresses in the DNS cache so that the computer is redirected to another device.Man-in-the-middle: This is where the attacker intercepts communication between two parties and can modify or eavesdrop on the conversation.ARP poisoning: In this attack, falsified ARP messages are sent over the local network to link the attacker’s MAC address with the IP address of a victim, allowing unauthorized access.

The Open Systems Interconnection (OSI) is a conceptual model whose purpose is to make networks more manageable. Its objectives include allowing for more portable hardware and software integration, the creation of standard interfaces that would allow manufacturers of different systems to interconnect their equipment and the creation of a model that would be used world-wide. There are seven layers to the OSI. The lowest - or first - layer allows a contiguous sequence of bits to be transmitted through the network. Which is the first layer: A. data-link layer, B. physical layer, C. network layer, D. transport layer

Answers

Answer:

A. data-link layer

Explanation:

Data-link layer is the first layer and allows a contiguous sequence of bits to be transmitted through the network.

On top of it is the Network Layer and it handles the task of routing network messages from one computer to another.

Then comes the Transport Layer which is the basic layer at which one network computer communicates with another network computer.

The first layer of the OSI model is the Physical Layer, which is responsible for the transmission of raw bit streams over a physical medium.

The Open Systems Interconnection (OSI) model is a conceptual framework used to understand and design network systems. It divides network communications into seven distinct layers, each with its own specific function. The first and lowest layer is the Physical Layer, which deals with the transmission of raw bit streams over a physical medium, such as cables and switches.

The seven layers of the OSI model are:

Physical LayerData-Link LayerNetwork LayerTransport LayerSession LayerPresentation LayerApplication Layer

Which type of open source license ensures that the source code of a program is freely available while also allowing the original author of the source code some control over the changes they've made?
A) Freeware
B). GPL
C). Artistic
D). Shareware

Answers

Answer:

C). Artistic

Explanation:

In cell c11, enter a formula to reference the date stored in cell b7. insert a nested function in cell c12 to calculate the date for the next payment. nest the year, month, and day functions within the date function. add 1 to the month result. copy the function to the range c13:c34.

Answers

Final answer:

The student needs to reference a date in one cell and create a formula for the next payment date in another cell using spreadsheet functions. In cell C11, they will reference the date with =B7, and in cell C12, they will use a nested formula =DATE(YEAR(B7), MONTH(B7) + 1, DAY(B7)) which is then copied down to subsequent cells.

Explanation:

The student is asking about how to use spreadsheet functions to reference and manipulate dates. In cell C11, the formula to reference the date stored in cell B7 would simply be =B7. For cell C12, the nested function to calculate the next payment date, adding one month to the current date, would be something like =DATE(YEAR(B7), MONTH(B7) + 1, DAY(B7)). This uses the YEAR, MONTH, and DAY functions nested within the DATE function to construct the new date. Once the function is entered in cell C12, it can be copied down the range C13:C34 to apply to additional cells. Remember, these functions and formulas are typical of spreadsheet software like Microsoft Excel ora Sheets.

What would be the results of the following code?final int SIZE = 25;int[] array1 = new int[SIZE];... // Code that will put values in array1int value = 0;for (int a = 0; a < array1.length; a++){value += array1[a];}a.value contains the highest value in array1b.value contains the lowest value in array1c.value contains the sum of all the values in array1d.This would cause the program to crash

Answers

Answer:

The correct option to this code is "a".

Explanation:

The given code contains the highest value in array1 because code will use variable value that adds all value of array1. and other options are not correct that can be described as:

In option, b The value variable, we add a number that's why it can not contain the lowest value.In option, c The value variable use for loop for add all array element not sum of values.In option, d There will no crash in program.

What is aperture priority mode? When might you use this mode on a camera? What is depth of field? How can you adjust the depth of field in a photograph? What is the relationship between aperture and shutter speed? How can you describe this relationship? What is the landscape mode? How does this mode adjust the aperture? What is the result of this adjustment? How is shutter speed generally measured? What do the measurements mean? How is aperture measured? What do the measurements mean? Why is learning to control aperture and shutter speed important? Which camera mode do you think you are most likely to use? Why? Have you tried to take some action photographs of people, animals, or other objects? How did the photographs turn out? What are some of the challenges with taking action photographs? What are some of the difficulties of taking night photographs? How can you reduce these challenges?

Answers

Answer:

Please check explanation

Explanation:

We abbreviate aperture priority by A or Av( which is used for aperture value) on the camera mode call up, which is an adjustment on some of the cameras which leverage the user to adjust the certain value of the aperture or the f-number as meanwhile the camera adjust the speed of the shutter ensuring it matches it, and which results in a good exposure depending on the condition of the light  as being measured via the light meter. And this is not the same as the manual mode, in which the user is compelled to make the decision for both the values, the priority of the shutter, the location the user selects the shutter speed while the camera picks up the correct aperture, as well as the program state, where camera picks each of them.

So the first two questions are answered. Let's see the third, the depth of the field.  It is the distance from the nearest to the furthest objects which provides an image being selected for being at the focus in a camera.

Hence the depth of the field means the range of the sharp focus in a certain photograph. And while you shoot with the help of the larger camera like the DSLR, you will be able to adjust the depth through the adjustment of the aperture of the lens. The aperture is nothing else but the opening within the lens which manages the amount of the light that is permitted via the lens.

Now come to the fifth question. The shutter speed and the aperture are being related directly. It improves the aperture (by a stop). And each of them comes up with the very best exposure through the permitted weight of light.

And both of them are related to each other in an inverse proportion. And both of them must be balanced for ensuring that the image is not being exposed or less exposed to the permitted light. And when the aperture is increased the shutter speed increased for balancing it as well as vice versa.

Landscape mode:

It is the kind of page orientation that prints out the picture in a horizontal manner rather than in a vertical manner. And it is being commonly used for printing the charts or various other types of pictures as well as the text which might not adjust properly with the page that is aligned vertically.

Consider the High Nikon DSLR. You need to hold down the "MODE" as meanwhile the rear control (dial)  is turned unless you view "A" over the LCD top. And your FCD then sets the aperture. And in almost all Canon SLRs as an example: You need to turn to "Av" your mode dial.

The results of these adjustments are certainly good.

And the shutter speed is being measured by the unit of time and ranges in less than fractions of one second. And as we say that the shutter speed is "5000", it means its 1/30000 th of a  minute. And the shutter speed which is of one second or more in length is being marked as a'. One example is 16'.

How we measure aperture. And what it means:

It is being measured with the help of the f-stop scale. And on the digital camera, you will find 'f/' which is being followed by an integer. And this f-number indicates the wideness of the aperture. As well as the size does affect the exposure as well as the field depth of the resultant image.

Now come to why we should learn to control the shutter speed and the aperture.

You should know that by selecting the shutter speed you permit yourself to freeze or otherwise blur motion, and sometimes you would like to do the first one or the second one. And the aperture permits you to select the field depth to either blur the background or make it sharper.

Thus, now you have an idea of each of the modes, and their merits. And if you will ask the best one, he will be up with the aperture priority or with auto ISO and full manual. If you are up with some specific requirements, then you should have a full manual mode in automatic mode, and that will be quite handy. You certainly need to learn by heart how to make use of the full manual, as it will improve your understanding of the photography, however, the semi-automatic mode is certainly your best friend.

And yes, as well as its a very great feeling. Its certainly quite hard to take the photographs of still objects while you are riding.

Some of the things that make it hard to take the action photographs are like the object, or the animal can move as well as you need to set the shutter speed as well as the aperture speed quite swiftly. Also, you need to focus your camera for ensuring a very good picture and ensure its not blurry or like the picture is out of the focus.

In night photography, the camera might shake because of the very low ambient brightness, the camera might move for very slow shutter speed. Various other challenges are the improper focus, white balances, less exposure, etc,

That solves all the questions asked.

Answer:

Select cell range B2:F29.

Select the Subtotals command under the Data menu.

In the Subtotals dialog, in the Group by dropdown list, select the option Region.

In the Calculate subtotals for field, select Country.

In the Use function field, select Count.

Click OK.

Explanation: Plato

Add a String instance variable, messageUponExiting, to the Window class. This variable will be used to display a message when the user closes the window (for example, "Are you sure you want to quit?"). Furthermore, this variable should be accessible to all subclasses of the Window class, as each sort of window may require a different message upon exiting. Please provide the declaration of the instance variable only—nothing else.

Answers

Answer:

Following are the Declaration of instance variable which is mention above .

protected String messageUponExiting; // variable declaration

Explanation:

Here we declared a variable "messageUponExiting "  as string type.The String datatype parameter will hold the string value .We can use Protected access modifier because as mention in the question the variable must be accessible  in all of the subclass of windows.

Syntax of declaring any instance variable .

Access-modifier datatype variable-name;

In general, what are reasons that someone would choose to use lossy compression? Write a brief response below including at least one example of a situation when lossy compression would be appropriate.In general, what are reasons that someone would choose to use lossy compression? Write a brief response below including at least one example of a situation when lossy compression would be appropriate.

Answers

Answer:

You can achieve better compression ratio as compared to lossless.

Lossy file sizes are very small as compared to lossless.

For example

If you want to upload a small image lossy compression can make photo 36KB that was 822Kb.

Loosely provide higher degree of  compression .

Lossy widely used JPEG method.

Most tool are available that will let you to choose the degree of compression.

In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web server for delivery in the form of a Web page to the user. True or False?

Answers

Answer: True

Explanation:

 Yes, the given statement is true that the web based database used the various types of database applications for transferring the information or data.

The web database applications are basically designed so that the users managed and easily access the information by using the internet. It is works as the middleware form for transferring the data from the internal database of an organization to the web server and it is known as web page for the user interface. We can store various types of business and also personal related data by using the web database.

Identify a true statement of a JavaScript program in a web form.
a) JavaScript is a closed-source programming language, which provides tools and a programming environment for communicating the strategy and overall administration of distributed applications.
b) JavaScript is extracted by all layout engines in a similar way; as a consequence, this grounds consistency in terms of functionality and interface.
c) JavaScript is a bug-free Visual Basic scripting language, which is used only for networking applications.
d) JavaScript intercepts the content of the form before the browser attempts to contact the CGI script and report whether the data contained in the survey form has been correctly filled out or not.

Answers

Answer:

Option d): JavaScript intercepts the content of the form before the browser attempts to contact the CGI script and report whether the data contained in the survey form has been correctly filled out or not.

is the true statement.

Explanation:

Introduction to JavaScript:

JavaScript can be defined as the object-oriented programming language used specially for creating effective and interactive styles for web, it can update and modify the languages like HTML and CSS.

The data can be validated, calculated and manipulated using JavaScript.

JavaScript is a scripting language from the client-side. By this we mean that the source code of JavaScript is processed by the browser of client instead of the web Server.

From the server-side of scripting language, JavaScript can be added anywhere within the HTML of a webpage.

i hope it will help you!

A 5.5 g sample of a substance contains only carbon and oxygen. Carbon makes up 35% of the mass of the substance. The rest is made of oxygen. You are asked to determine the mass of oxygen in the sample. Which of the following expressions demonstrates a mathematical procedure to solve this problem using the proper order of operations?
((100 - 35)/100) x 5.5 grams =
100 - 35/100 x 5.5 grams =
100 - (35/100) x 5.5 grams =
Recall that to calculate a percent of an amount in grams means you have to convert the percent to a number and multiply by the amount in grams. For example, 50% means 50 out of 100, or 50 hundredths. So 50% of 10 grams is 0.50 times 10 grams. You need to take 0.50 and multiply it by 10 grams to determine 50% of 10 grams is 5.0. (50% and 10 grams are examples and not numbers for this problem.)

Answers

Answer:

((100-35)/100) x 5.5grams=3.575grams of oxygen

Explanation:

Since ha sample contains 35% carbon which means (100-35)=65% is oxygen in the sample. In order to calculate the mass of oxygen in the sample we have to find the 65% of 5.5g which means we have to multiply 65/100=0.65 with 5.5g i.e 0.65*5.5. so the mathematical expression we use will be:

((100-35)/100) x 5.5grams=3.575grams of oxygen

Write the definition of a function printLarger, which has two int parameters and returns nothing. The function prints the larger value of the two parameters on a single line by itself. (For purposes of this exercise, the "larger" means "not the smaller".)

Answers

Answer:

def printLarger(x: int ,y: int):

print(max(x,y))

Explanation:

The function is written in python as follows:

the fuction printLarger takes two integer parameters x and ymax() function determines larger value of x and y. If the numbers are the same it prints the value of the numbers as the largest value. the function prints the larger value.

Before programmers decide which programming language to use or start writing code, they develop a complete description of the task the program needs to accomplish. This is called a ________.

Answers

Answer:

Problem Statement

Explanation:

The problem statement is described the complete description of the task of the program. It gives a clear description of the program.

The main objective to develop a problem statement explain the program in a detailed manner The good programmer firstly create the problem statement of the program then it created the program by following the guidelines of the problem statement.

Jane, a marketing manager for the Grocery SuperStore retail chain, fired up a computer program that gave her ready access to information about product availability and customer buying. The program helped her immediately set prices for bananas and cherries. This type of computer program is called ________.

Answers

Answer:

This type of computer program is called Intranet.

Explanation:

Intranet is a computer network with restricted access.  

In a company intranet, one can share and manage corporate information, tools, systems, and services only within an organization.

Jane, as an authorized member of company network, she was able to access to information about product price and changed it. She used Intranet of the Grocery SuperStore retail chain.

Which line in the following program contains the header for the showDub function? 1 #include 2 using namespace std; 3 4 void showDub(int); 5 6 int main() 7 { 8 int x = 2; 9 10 showDub(x); 11 cout << x << endl; 12 return 0; 13 } 14 15 void showDub(int num) 16 { 17 cout << (num * 2) << endl; 18 } 1. 4 2. 6 3. 10 4. 1

Answers

The header for the showDub function is contained in line 4.

The header of a function in C++ is the first line where the function is declared before it is defined or called. It specifies the return type, the name of the function, and the parameters the function will take, if any. In this case, line 4, 'void showDub(int);' is where the function showDub is declared, making it the function's header. This is a forward declaration and tells the compiler what the function looks like. This allows the function to be called before it is fully defined, as seen in line 10 within the main function. The actual definition of the showDub function does not occur until line 15, where the function's operations are fully described.

The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.a. Bug/CERT b. Bugtraq/CERT c. CC/CERTd. CERT/CC

Answers

Answer:

d. CERT/CC

Explanation:

Option D is correct

Other Questions
A company plans on selling MP3 players for $120. To make the MP3 players, a cost estimator determined it costs the company $1500 per week for overhead and $45 for each MP3 player made. How much profit would the company make if it sold 100 players in one week? Explain. Define Nationalism. What were the goals of nationalists? The devil went down to georgia,He was looking for a soul to stealHe was in a bind, 'cause he was way behind,So he was willing to make a dealWhen he come across this young manSawing on a fiddle and playing it hotAnd the devil jumps up on a hickory stumpAnd said,"boy let me tell you what:I guess you didn't know it,But I'm a fiddle player tooAnd if you'd care to take a dare,I'll make a bet with youNow you play a pretty good fiddle, boy,But give the devil his dueI'll bet a fiddle of gold against your soul'Cause I think I'm better than you"The boy said:"My name's johnny and it might be a sin,But I'll take your bet, you're gonna regret'Cause I'm the best that's ever been"Johnny, rosin up your bowAnd play your fiddle hard,'Cause hell's broke loose in georgiaAnd the devil deals the cardsAnd if you win you'll getThis shiny fiddle made of gold,But if you lose, the devil gets your soul!The devil opened up his case and said,"I'll start this show"And fire flew from his fingertipsAs he rosined up his bowAnd he pulled the bow acrossThe strings and it made an evil hissThen a band of demons joined in and itSounded something like thisWhen the devil finished,Johnny said: "Well you're pretty good old sonBut sit down in that chair right there,And let me show you how it's done"(Fire on the mountain! Run, boys, run!The devil's in the house of the rising sunThe chicken in the bread pan picking out doughGranny does your dog bite? No, child, no)Devil bowed his head becauseHe knew that he'd been beatAnd he laid that golden fiddleOn the ground at johnny's feetJohnny said:"Devil, just c'mon backIf you ever wanna try again'Cause I told you once, you son of a gun,I'm the best that's ever been!"(Fire on the mountain! Run, boys, run!Devil's in the house of the rising sunChicken in the bread pan pickin out dough,Granny, does your dog bite? yes, child, yes) After a motor vehicle crash, a client who sustained multiple injuries is oriented to person and place but is confused as to time. The client complains of a headache and drowsiness, but assessment reveals that the pupils are equal and reactive. Which nursing action takes priority? Around the world, people may experience the same genetically based disorder quite differently, depending on their personal expectations and their cultural definition of abnormality. This BEST illustrates the need for what model? Crater HVAC Systems is preparing its statement of cash flows (indirect method) for the year ended March 31, 2018. To follow, in no particular order, is a list of items that will be used in preparing the company's statement of cash flows. Identify each item as an operating activity addition to net income; an operating activity subtraction from net income; an investing activity; a financing activity; or an activity that is not used to prepare the cash flows statement. The money demand curve has a negative slope because Underline infinitives or infinitive phrases; circle or highlight prepositional phrases. Please help!! Tell me which ones are which!!:)1. We went to the store to buy some groceries. 2. My mother loves to sew clothes for her granddaughter to wear.3. To speak eloquently is a gift. 4. I want to see the Eiffel Tower one day if I ever go to France. 5. He has the strength to carry on. 6. He gave his last dollar to a Salvation Army bell ringer. Maria and Kim left town at 9:00 am and traveled the same route in separate cars. Kim drove 3 h at a steady speed, then slowed down 15km/h for 3 more hours. Maria averaged 5 km/h more than Kim's original speed for the entire trip and arrived at their destination at 2 pm. What was Kim's original speed? Addison company will issue a zero-coupon bond this coming month. The projected yield for the bond is 7%. If the par value of the bond is $1,000, what is the price of the bond using a semiannual convention if: a. the maturity is 20 years b. the maturity is 30 years c. the maturity is 50 years d. the maturity is 100 years A(n) _____ is another form of intrapreneurship initiated by an employee who conceives an idea, convinces top management of its potential, and then recruits human and other resources from within the company to turn that idea into a commercial project. The Ksp for Zn(OH)2 is 5.0 x 10-17. Determine the molar solubility of Zn(OH)2 in a buffer solution with a pH of 11.5.a) 5.0 x 106b) 1.2 x 10-12c) 1.6 x 10-14d) 5.0 x 10-12e) 5.0 x 10-17 A woman eats cookies, cake, ice cream, and almost anything else that is sweet. At some point during the binge, she takes a huge dose of a laxative to "empty out" the food. Her taking thelaxative, and the assumption underlying why she does it, would lead to a diagnosis of:a. binge-eating disorder. b. purging-type bulimia nervosa. c. nonpurging-type bulimia nervosa. d. eating disorder not otherwise specified 1. On the planet Susru, there are three types of bears; those who like honey-nut cheerios, those who like multi-grain, and those who like plain cheerios. The phenotype is determined in an epistatic way by two loci: a. HNNT, with alleles H (dominant) and h (recessive), and b. MLTGRN, with alleles M (dominant) and m (recessive) 2. In a cross of a HHMM bear and an hhmm bear, and the Fls like honey-nut. A cross of two F1 bears produces the following sums two-locus genotype counts: a. All F2 bears with at least one H allele: 801 b. All F2 bears with at least one M allele but no H alleles: 200. 3. What number of F2 bears with the hhmm genotype would produce an F2 data set that is consistent with a dominant mode of inheritance at the 1% level of significance (Hint: Think Chi-square)? A. 55.B. 37.C. 118. D. 90 E. 15 What is X +7 equals 14 When an IRB is reviewing a research study and they are considering if a potential subject population is vulnerable, they should consider_______.A. Are there adequate resources to conduct the study?B. Is there a power differential between researchers and subjects?C. Are the research procedures greater than minimal risk of harm?D. Has the researcher completed required training? What is the output of the code corresponding to the following pseudocode? (In the answer options, new lines are separated by commas.) Declare X As Integer Declare Y As Integer For (X = 1; X One major difference between a merchandisers master budget and a manufacturers master budget is that A : a merchandiser does not include direct materials, direct labor, and manufacturing overhead budgets, whereas a manufacturer does. B : a merchandiser does not include a sales budget, whereas a manufacturer does. C : a manufacturer does not include a sales budget, whereas a merchandiser does. D : a manufacturer does not include direct materials, direct labor, and merchandising overhead budgets, whereas a merchandiser does. Macy enters a formula and presses Enter. She sees #Data! in the cell instead of the answer. This means _____. a)the cell is not wide enough b)there is too much data to calculatec) the answer is greater than one million d)there is a mistake in the formula A curtain hangs straight down in front of an open window. A sudden gust of wind blows past the window; and the curtain is pulled out of the window. Which law, principle, or equation can be used to explain this movement of the curtain?A. Poiseuille's lawB. Bernoulli's equationC. the equation of continuityD. Archimedes' principleE. Pascal's principle