I need help. People who know computer science. I have selected a word from the first 1000 words in my dictionary. Using the binary search algorithm, how many questions do you have to ask me to discover the word I have chosen?
a. 8 b. 10 c. 12 d. 14

Answers

Answer 1

Answer:

14

Explanation:


Related Questions

Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000 2 Then the output is: 1000 500 250

Answers

Answer:

Soory! I can't tell please tell clearly

Answer:

user_num = int(input("Number: "))

x = int(input("x: "))

for i in range(1,4):

    user_num = user_num/x

    print(user_num," ")

Explanation:

Choose the appropriate computing generation.


: artificial intelligence



: integrated circuits



: microprocessors


: parallel processing




the awsers for them are 5th generation 3rd generation 4th generation i really need help guys

Answers

The appropriate computing generation for each of theese are:

Artificial intelligence is 5th generation

Integrated circuit is 3rd generation

Microprocessor are 4th generation

Parallel processors is 5th generation

What is a computing generation?

There are five computing generations, they are defined from the technology and components used: valves, transistors, integrated circuits, microprocessors and artificial intelligence, respectively.

Each generation of computers refers to a period when a technology with similar capabilities and characteristics is launched on the market and produced on a large scale.

Since the first tube computers, computers have preserved the same fundamental architecture: data processor, main memory, secondary memory and data input and output devices.

See more about computing at: brainly.com/question/20837448

#SPJ1

Transmissions in wireless networks do not allow for collision detection but try to avoid collision. Briefly describe this process and explain why it is termed as unreliable.

Answers

Transmissions in wireless networks do not allow for collision detection but try to avoid collision and also  It is especially crucial for wireless networks since wireless transmitters desensing (turning off) their receivers during packet transmission prevents the option of collision detection using CSMA/CD.

What are the different types of wireless transmission?

Wireless transceivers are unable to send and receive on the same channel simultaneously, hence they are unable to identify collisions. This is because the send power (which is typically around 100mw) and the receive sensitivity have such a huge disparity (commonly around 0.01 to 0.0001mw).

Therefore, Infrared, broadcast radio, cellular radio, microwaves, as well as communications satellites are examples of wireless transmission media that are used in communications. Infrared (IR), which is a wireless transmission medium that uses infrared light waves to transmit signals, was covered previously in the chapter.

Learn more about collision detection  from

https://brainly.com/question/14775265

#SPJ1

do you think film is a great media in exposing information?​

Answers

not really everything don’t need to be on the internet

Answer:I think film is a great media in exposing information

Explanation:Films are great for exposing information for many reasons. Films are long, which increases the chance the watcher will remember, also it makes the watcher more involved and more interactive

Performance assessments are conducted periodically and .

Answers

Performance assessments are conducted periodically and systematically.

What are performance assessments ?

Periodic and structured evaluations are essential to maintain accurate assessments of performance. These reviews usually occur regularly, such as once or twice a year, and follow a systematic process designed to examine an individual's job-related skills consistently using objective standards.

A typical appraisal procedure generally includes establishing clear aims and goals for the employee, offering regular coaching along with feedback throughout the appraisal term, compiling data related to their task progress, and then conducting a comprehensive review at the end of that period to analyze and assess it thoroughly.

Find out more on performance assessments at https://brainly.com/question/1532968

#SPJ1

Gary is unable to log in to the production environment. Gary tries three times and is then locked out of trying again for one hour. Why? (D3, L3.3.1)

Answers

Answer:

Gary is likely locked out of trying to log in again for one hour after three failed login attempts as part of a security measure to prevent unauthorized access or brute force attacks in the production environment. This policy is often implemented in computer systems or applications to protect against malicious activities, such as repeatedly guessing passwords or using automated scripts to gain unauthorized access to user accounts.

By locking out an account for a certain period of time after a specified number of failed login attempts, the system aims to deter potential attackers from continuously attempting to guess passwords or gain unauthorized access. This helps to enhance the security of the production environment and protect sensitive data or resources from unauthorized access.

The specific duration of the lockout period (one hour in this case) and the number of allowed failed login attempts may vary depending on the security settings and policies configured in the system. It is a common security practice to implement account lockout policies as part of a comprehensive security strategy to protect against unauthorized access and ensure the integrity and confidentiality of data in the production environment.

Upon returning from a year long working holiday, Alberta, the youngest of 4 sisters, announced her whirlwind marriage. Her 3 sisters, Carla, Paula, and Roberta,
were amazed by her husband's name.
• The 4 men are Albert, Carl, Paul, and Robert. Their last names are Albertson, Carlson, Paulson, and Robertson.
• No woman's husband has a first name that consists of her first name without the final "a"; no woman's last name consists of her first name without the final
"a" and with "son" on the end; and, no man's last name consists of his first name with "son" added at the end.
• Paul is not married to Roberta, and Robert is not married to Paula.
• No husband and wife have "bert" in both their first names, but there is a man who has "bert" in his first and last names.
Carl's last name is not Paulson.
Work out Alberta's husband's first and last name, as well as Carla's, Paula's, and Roberta's husbands' first and last name

Answers

The couples, considering the patterns in the problem, are listed as follows:

Carla and Robert Paulson.Paula and Albert Robertson.Alberta and Paul Carlson.Roberta and Carl Albertson.

What are the couples?

We use the information from the bullet points to find the couples.

The first information is:

No woman's husband has a first name that consists of her first name without the final "a".

Hence:

Alberta is married to either Carl, Paul or Robert.Carla is married to either Albert, Paul or Robert.Paula is married to either Albert, Carl or Robert.Roberta is married to either Albert, Carl or Paul.

The second information is:

Paul is not married to Roberta, and Robert is not married to Paula.

Hence:

Roberta is married to either Albert or Carl.Paula is married to either Albert or Carl.

No husband and wife have "bert" in both their first names, hence:

Roberta is married to Carl.Paula is married to Albert.Alberta is married to Paul.Carla is married to Robert.

No woman's last name consists of her first name without the final "a" and with "son" on the end, and no man's last name consists of his first name with "son" added at the end, hence:

Roberta and Carl are either Albertson or Paulson.Paula and Albert are either Carlson or Robertson.Alberta and Paul are either Carlson or Robertson.Carla and Robert are either Albertson or Paulson.

There is a man who has "bert" in his first and last names, hence either of these two can be couples.

Carla and Robert Albertson.Paula and Albert Robertson.

Carl's last name is not Paulson, hence a couple is:

Carla and Robert Paulson.

Then Carla and Robert are Paulson, and the couples are:

Carla and Robert Paulson.Paula and Albert Robertson.Alberta and Paul Carlson.Roberta and Carl Albertson.

More can be learned about patterns at https://brainly.com/question/18941199

#SPJ1

What is something you can setup within your email account to prevent potentially harmful emails making their way to your inbox?.

Answers

The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:

Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.

Which feature helps to prevent spam messages from being sent to your inbox?

To avoid spam in one's email, one of the best thing to do is to Run your inbox through spam filter and virus filter.

Hence, The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:

Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.

Learn more about Email  from

https://brainly.com/question/24688558

#SPJ1

What is your biggest concern when it comes to purchasing a used phone or laptop?

Answers

Answer:

quality

Explanation:

if i know about the phone or laptop quality and quantity then i can know which is important if i buy.

i can give you example by laptop. For example i want to get buy laptop. i should know about the quantity and quality. then if i choose quantity i can buy so many laptops if they are more than 3 laptops and i get it in low price. then i take it and i try to open the laptops for some other thing to do but they cant opened so it means it has lowest quality.

and if i choose the quality. may be i can't buy more than 1 laptops but the qulaity of the laptops is high so when i open the laptop it opened

Note

quality is the superiority or the quality level of a things.

quantity is the abundance or the quantity level of a thing

As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.

Answers

Answer:

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.

First, let's convert -9/2 to a decimal number: -9/2 = -4.5

Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:

1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM

Sign bit: Since the number is negative, the sign bit is 1: 1

Mantissa and exponent: Convert -4.5 into binary and normalize it:

-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2

Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)

Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101

Now, put the sign, exponent, and mantissa together: 1101 0010

So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.

B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.

To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:

Sign bit: 1

Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)

Mantissa: Smallest mantissa is 0000

The 8-bit representation is 1001 0000. Converting this to decimal:

-1 * 2^{-2} * 1.0000 which is -0.25.

The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.

C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.

To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:

Sign bit: 0

Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)

Mantissa: Largest mantissa is 1111

The 8-bit representation is 0110 1111. Converting this to decimal:

1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.

The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.

Explanation:

Excel

Please explain why we use charts and what charts help us to identify.
Please explain why it is important to select the correct data when creating a chart.

Answers

1) We use chart for Visual representation, Data analysis, Effective communication and Decision-making.

2. It is important to select the correct data when creating a chart Accuracy, Credibility, Clarity and Relevance.

Why is necessary to select the correct data in chart creation?

Accuracy: Selecting the right data ensures that the chart accurately represents the information you want to convey. Incorrect data can lead to misleading or incorrect conclusions.

Relevance: Choosing the appropriate data ensures that your chart focuses on the relevant variables and relationships, making it more useful for analysis and decision-making.

Clarity: Including unnecessary or irrelevant data can clutter the chart and make it difficult to interpret. Selecting the correct data helps to maintain clarity and simplicity in the chart's presentation.

Credibility: Using accurate and relevant data in your charts helps to establish credibility and trust with your audience, as it demonstrates a thorough understanding of the subject matter and attention to detail.

Find more exercises related to charts;

https://brainly.com/question/26501836

#SPJ1

When creating a user generated function, what procedure is followed?
a) create a function prototype before main()
b) create a function definition after main()
c) create a function definition before main()
d) all of the above

Answers

When creating a user-generated function, what procedure is followed d) all of the above.

What are the three factors of user-described characteristic?

A user-described characteristic has 3 essential additives which might be characteristic declarations, characteristic definition and characteristic called.

The characteristic prototypes are used to inform the compiler approximately the variety of arguments and approximately the specified datatypes of a characteristic parameter, it additionally tells approximately the go-back kind of the characteristic. By this information, the compiler cross-assessments the characteristic signatures earlier than calling.

Read more about the prototype :

https://brainly.com/question/7509258

#SPJ1

Directions: Arrange the jumbled letters to make/form a new word. Then give a
short description of those words that can be related to the topic which is Cleaning
and Lubricating Machines. Write your answers in your journal
. wens in
Name of materials
Words
Description
1. HEINCMA ILO-MACHINE OIL
2. CHOLT MADP-CLOTH DAMP
3. NIEMHAC WINSEG-MACHINE SEWING
4. SONAPLER- PERSONAL PROTECTIVE EQUIPMENT
VETICETPORT
QUIPTEMPEN
5. EEENDL ISEZ- NAEEDLE SIZE
6. MALLS NIB- SMALL BIN
7. BINNOB DREWIN-?????
8. NILT BURSH- LINT BRUSH
9. BONBIB KOHO- BOBBIN HOOK
10. DELENE LLAPTE - NEEDLE PLATE

Answers

Answer:

1. Heincma Ilo- Machine Oil  

2. Cholt Madp- Damp Cloth  

3. Niemhac Winseg- Sewing Machine

4. Sonapler- Personal Protective Equipment Veticetport Quiptempen  

5. Eeendl Isez- Needle Size  

6. Malls Nib- Small Bin  

7. Binnob Drewin- Bobbin Winder  

8. Nilt Bursh- Lint Brush  

9. Bonbib Koho- Bobbin Hook  

10. Delene Llapte - Needle Plate  

 

Explanation:

Machine Oil: This is used to lubricate the sewing machine gear, prevents/ reduces wear, tear, and rust of the parts which are made of metal;Damp Cloth: This is used to remove tough stains on the machine without leaving too much moisture on it. When water or moisture reacts with the iron and oxygen, it forms rust which is not good for the machine.Sewing Machine: This is used to putting or sewing fabric togetherPersonal Protective Equipment: These are equipment that a tailor or sewing factor worker must put on when at work to prevent or minimize the risk of injuries. They include but are not limited to:FacemasksHand glovesEye Protection

5. Needle Size: Various sizes of needles are needed to sew different kinds of fabric;

6. Small Bin: This is mostly for ensuring good home keeping. Good home-keeping means managing the waste in the factory area. By collecting them in a bin, they are easy to dispose of.

7. Bobbin Winder: This is used to wind the thread around a bobbin evenly.

8. Lint Brush: This is used to remove lint. Lint is simply a collection of accumulated fibers from textile and non-textile materials.

9. Bobbin Hook: This term is used to describe the part which extends outwards like a finger that encircles the bobbin case.

10. Needle Plate: This is present in all sewing machines. It is installed to guide one as they sew and also covers the bobbin compartment.

Cheers!

How to change the display of subtotals to Show all subtotals at top of group in pivotTable?

Answers

To change the display of subtotals to Show all subtotals at top of the group in PivotTable follow these steps:

Select a cell in the pivot table and, on the Excel Ribbon, pick the Design tab under PivotTable Tools.Select Compact Form or Outline Form from the Report Layout menu. (Subtotals are only given at the bottom of the Tabular Form.)Click Subtotals, then Show All Subtotals at Group's Top.What is a PivotTable?

A pivot table is a statistics tool that summarizes and reassembles chosen columns and rows of data in a spreadsheet or database table to produce the required report.

The tool does not alter the spreadsheet or database; rather, it "pivots" or rotates the data to examine it from various angles.

Learn more about PivotTable:

https://brainly.com/question/27813971

#SPJ1

WHICH OF THE FOLLOWING TASKS ARE PART OF THE SOFTWARE EVALUATION PROCESS?
TESTERS...

Answers

With regard to software evaulation, note that the correct options are -

Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.

How is this so?

The tasks that are part of the software evaluation process include  -

Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.

Tasks not directly related to the software evaluation process are  -

Software developers writing code line by line.Creating a design for the software program.

Learn more about software evaluation at:

https://brainly.com/question/28271917

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Choose all that apply: Which of the following tasks are part of the software evaluation process?

testers check that the code is implemented according to the specification document

an specification document is created

software developers write code line by line

any issues with the software are logged as bugs

bugs are resolved by developers

a design for the software program is created

You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.

Answers

Following are the steps of the polynomial-time algorithm:

Split the routes according to their categorizationAssuming that mid = di of the middle road, low = road with the least di, and high = road with the highest di, we may do a binary search on the sorted list.All shops must be approachable only using these roads for every road, from low to mid.Check if all shops can be reached from\(\bold{ low \ to\ mid+1}\) using only these roads.There is a solution if every shop can be reached by road only up to \(\bold{mid+1}\), but not up to mid.You can \(\bold{set \ low = mid+1}\) if all businesses aren't accessible using both \(\bold{mid\ and\ mid+1}\) roads.If every shop could be reached using both mid and mid+1, then set high to mid-1.With these layouts of businesses and roads, no response can be given because \(\bold{ low > high}\)You can do this by \(\bold{set\ mid = \frac{(low + high)}{2}}\)The new low, mid, and high numbers are used in step (a).

In a minimum amount of time, this algorithm will determine the best strategy to supply all shops.

Learn more:

polynomial-time algorithm: brainly.com/question/20261998

Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2

Answers

Answer:

F7

Explanation:

Mostly in MS Office products, although a lot of other products will mimic the same well known key sequences as a way of enticing you to their platform.

Answer:The answer to your question is F7

Explanation:

What is the advantage of entering metadata for electronic records that you create

Answers

Answer:

allows users to locate and evaluate data without each person having to discover it anew with every use.

Explanation:

here you go hope it helps!

A ____________________ machine is used to gather or arrange in their proper sequence.

Answers

Answer:

A collating machine is used to gather or arrange in their proper sequence.

Explanation:

What is the default layout position for images added to a Word 2016 document?

A) square, where the text wraps around an image around a square border
B) through, where the text wraps around an image with irregular borders
C) in front of the text, where the image is placed over the text
D) in-line, with the text where the text stays with the image

Answers

Answer:

D

Explanation:

Hope it works

Answer:

D) in-line, with the text where the text stays with the image

Explanation:

Just did it in ED.

Why dose enginuty suck like really

Answers

Answer:

if you don't like it why u doin it?

Explanation:

Submit your three to five page report on three manufacturing careers that interest you.

Answers

Answer:

Manufacturing jobs are those that create new products directly from either raw materials or components. These jobs are found in a factory, plant, or mill. They can also exist in a home, as long as products, not services, are created.1

For example, bakeries, candy stores, and custom tailors are considered manufacturing because they create products out of components. On the other hand, book publishing, logging, and mining are not considered manufacturing because they don't change the good into a new product.

Construction is in its own category and is not considered manufacturing. New home builders are construction companies that build single-family homes.2 New home construction and the commercial real estate construction industry are significant components of gross domestic product.3

Statistics

There are 12.839 million Americans in manufacturing jobs as of March 2020, the National Association of Manufacturers reported from the Bureau of Labor Statistics.4 In 2018, they earned $87,185 a year each. This included pay and benefits. That's 21 percent more than the average worker, who earned $68,782 annually.5

U.S. manufacturing workers deserve this pay. They are the most productive in the world.6 That's due to increased use of computers and robotics.7 They also reduced the number of jobs by replacing workers.8

Yet, 89 percent of manufacturers are leaving jobs unfilled. They can't find qualified applicants, according to a 2018 Deloitte Institute report. The skills gap could leave 2.4 million vacant jobs between 2018 and 2028. That could cost the industry $2.5 trillion by 2028.

Manufacturers also face 2.69 million jobs to be vacated by retirees. Another 1.96 million are opening up due to growth in the industry. The Deloitte report found that manufacturers need to fill 4.6 million jobs between 2018 and 2028.9

Types of Manufacturing Jobs

The Census divides manufacturing industries into many sectors.10 Here's a summary:

Food, Beverage, and Tobacco

Textiles, Leather, and Apparel

Wood, Paper, and Printing

Petroleum, Coal, Chemicals, Plastics, and Rubber

Nonmetallic Mineral

Primary Metal, Fabricated Metal, and Machinery

Computer and Electronics

Electrical Equipment, Appliances, and Components

Transportation

Furniture

Miscellaneous Manufacturing

If you want details about any of the industries, go to the Manufacturing Index. It will tell you more about the sector, including trends and prices in the industry. You'll also find statistics about the workforce itself, including fatalities, injuries, and illnesses.

A second resource is the Bureau of Labor Statistics. It provides a guide to the types of jobs that are in these industries. Here's a quick list:

Assemblers and Fabricators

Bakers

Dental Laboratory Technicians

Food Processing Occupations

Food Processing Operators

Jewelers and Precious Stone and Metal Workers

Machinists and Tool and Die

Medical Appliance Technicians

Metal and Plastic Machine Workers

Ophthalmic Laboratory Technicians

Painting and Coating Workers

Power Plant Operators

Printing

Quality Control

Semiconductor Processors

Sewers and Tailors

Slaughterers and Meat Packers

Stationary Engineers and Boiler Operators

Upholsterers

Water and Wastewater Treatment

Welders, Cutters, Solderers

Woodworkers11

The Bureau of Labor Statistics describes what these jobs are like, how much education or training is needed, and the salary level. It also will tell you what it's like to work in the occupation, how many there are, and whether it's a growing field. You can also find what particular skills are used, whether specific certification is required, and how to get the training needed.11 This guide can be found at Production Occupations.

Trends in Manufacturing Jobs

Manufacturing processes are changing, and so are the job skills that are needed. Manufacturers are always searching for more cost-effective ways of producing their goods. That's why, even though the number of jobs is projected to decline, the jobs that remain are likely to be higher paid. But they will require education and training to acquire the skills needed.

That's for two reasons. First, the demand for manufactured products is growing from emerging markets like India and China. McKinsey & Company estimated that this could almost triple to $30 trillion by 2025. These countries would demand 70 percent of global manufactured goods.12

How will this demand change manufacturing jobs? Companies will have to offer products specific to the needs of these very diverse markets. As a result, customer service jobs will become more important to manufacturers.

Second, manufacturers are adopting very sophisticated technology to both meet these specialized needs and to lower costs.

You're a short-order cook in a pancake restaurant, so you need to cook pancakes as fast as possible. You have one pan that can fit capacity pancakes at a time. Using this pan you must cook pamCakes pancakes. Each pancake must be cooked for five minutes on each side, and once a pancake starts cooking on a side it has to cook for five minutes on that side. However, you can take a pancake out of the pan when you're ready to flip it after five minutes and put it back in the pan later to cook it on the other side. Write the method, minutes Needed, that returns the shortest time needed to cook numCakes pancakes in a pan that holds capacity pancakes at once.

Answers

Answer:

Explanation:

The shortest time needed means that we are not taking into account the amount of time it takes to switch pancakes, flip them, or take them out of the pan, etc. Only cooking them. Therefore, written in Java would be the following...

public static int minutesNeeded (int numCakes, int panCapacity) {

       int minutesNeededtoCook = 0;

       while (numCakes != 0) {

           if (numCakes > panCapacity) {

               numCakes -= panCapacity;

               minutesNeededtoCook += 10;

           } else {

               numCakes = 0;

               minutesNeededtoCook += 10;

           }

       }

       return minutesNeededtoCook;

   }

The code takes in the amount of pancakes and the pan capacity, then compares them and adds 10 minutes (5 on each side) per pancake batch that is being made until all the pancakes are made.

what connects data center to your device?

Answers

My answer to the question is ISP(Internet Service Provider).

PLEASE HELP
Find five secure websites. For each site, include the following:

the name of the site

a link to the site

a screenshot of the security icon for each specific site

a description of how you knew the site was secure

Use your own words and complete sentences when explaining how you knew the site was secure.

Answers

The name of the secure websites are given as follows:

wwwdotoxdotacdotuk [University of Oxford]wwwdotmitdotedu [Massachusetts Institute of Technology]wwwdotwordbankdotorg [World Bank]wwwdotifcdotorg [International Finance Corporation]wwwdotinvestopediadotorg [Investopedia]

Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.

What is Website Security?

The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.

It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.

Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.

Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.

Learn more about website security:
https://brainly.com/question/28269688
#SPJ1

PLEASE HELPFind five secure websites. For each site, include the following:the name of the sitea link

mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number of cents to the equivalent number of quarters, dimes, nickels, and pennies. Then output the maximum number of quarters that will fit the amount, then the maximum number of dimes that will fit into what then remains, and so on. If the amount entered is negative, write an error message and quit. Amounts greater than 100 are OK (the user will get many quarters.) Use extended assembly instructions and exception handler services.

Answers

Answer:

Explanation:

The following code is written in python and divides the amount of cents enterred in as an input into the correct amount of quarters, dimes, nickels and pennies. Finally, printing out all the values.

import math

#First we need to define the value of each coin

penny = 1

nickel = 5

dime = 10

quarter = 25

#Here we define the variables to hold the max number of each coin

quarters = 0

dimes = 0

nickels = 0

pennys = 0

cents = int(input("Please enter an amount of money you have in cents: "))

if cents > 0 and cents <= 100:

   if cents >= 25:

       quarters = cents / quarter

       cents = cents % quarter

   if cents >= 10:

       dimes = cents/dime

       cents = cents % dime

   if cents >= 5:

       nickels = cents /nickel

       cents = cents % nickel

   if cents > 0:

       pennys = cents / penny

       cents = 0

   print("The coins are: "

       "\nQuarters", math.floor(quarters),

       "\nDimes", math.floor(dimes), "\nNickels", math.floor(nickels), "\nPennies", math.floor(pennys))

else:

   print("wrong value")

mips Write a program that asks the user for an integer between 0 and 100 that represents a number of

QUESTION 4 Developing practical thinking skills often involves O using common sense o learning from experience and building emotional intelligence mixing collaboration with private time evaluating whether examples support ideas​

Answers

Answer:

The answer is "mixing collaboration with private time".

Explanation:

In this question, the development of practical thinking abilities, training often involves resolved everyday struggles. It also helps students, are already used to develop communication skills, in particular, to resolve mostly based on critical thinking, everyday life issues at different layers of difficulty.

how does such editing affect courtrooms where visual evidence is often presented?​

Answers

Can hurt others..!! yw

Using Python Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.

Sample output with input: 17
Not special number

Answers

special_num = int(input())

if special_num == -99 or special_num == 0 or special_num == 44:

   print("Special number")

else:

   print("Not special number")

I wrote the code so that the user enters a number of their choice. Best of luck.

What
are the
Contituent of a c p u

Answers

It consists of an arithmetic and logic unit (ALU), a control unit, and various registers. The CPU is often simply referred to as the processor. The ALU performs arithmetic operations, logic operations, and related operations, according to the program instructions.

Other Questions
the use of employee empowerment has shifted the recruiting focus away from general cognitive and interpersonal skills toward technical skills. what are some evidence/example of lions and zebras in an ecosystem?pls no unuseful answer Evaluate the following, using f(x) = 3x +2: f(x + h) - f(x) h/h Which of the following is NOT an ionic compound?A. Carbon DioxideB. Lithium OxideC. Barium OxideD. Calcium Chloride B. Use the graph to write the equation of each line.3.422. 2x - 5y = -22x + 7y =27 Services that allow you to create or upload content and interact with the users who read the content is known as:Aosocial collaboration.BOsocial commerceOsocial media publishing.DOsocial networking. explain the mechanism. list the steps which occurs to decreasemap due to the ruptured fallopian tube internal bleeding Starting at No.3. Please help ! please help 30 points What is the volume of a cylinder, in cubic centimeters, with a height of 8 centimeters and a base diameter of 16 centimeters? Round to the nearest tenths place he electric field is constant over each face of the cube shown in the figure (Figure 1). Part A Does the box contain positive charge, negative charge, or no charge? positive charge negative charge O no charge Which element is shown below? How do you know? What is the freedom to petition the government to correct? 137x723+462x50=?do yall think its ok for your girl to k.i.s.s. other people?and would yall let it slide and think it was a joke? use induction to prove that n! < nn for all positive integers n 2. T2 Midterm Re1. X and Y are two fractions. X is greater than 0 but less than 1.Which statement describes the product of X and Y?A.The product is less than -1.B. The product is greater than -1 but less than 0.C. The product is greater than 0 but less than 1.D. The product is greater than 1. The line passing through the points (5,4) and (-2,-3). 257HELPPP MEE PLEASE Where would you place the Libertarian Party on the liberal-conservative political spectrum?Explain