Answer:ater on, in Chapter 9, you'll learn to put web pages online so anyone with a web ... Every web page you build along the way will be a bona fide HTML document. ... That means that the raw code behind every web page you create will consist entirely ... punctuation marks, and everything else you can spot on your keyboard).
Explanation:
Discussion Question 10: A bank in California has 13 branches spread throughout northern California , each with its own minicomputer where its data are stored. Another bank has ten branches spread throughout California , with the data being stored on a mainframe in San Francisco . Which system do you think is more vulnerable to unauthorized access
Answer:
The system that will be more prone to attack or vulnerability is the bank that has ten branches spread throughout California with the data being stored on a mainframe in San Francisco.
Explanation:
Solution
If the databases are not shared by all the branches throughout the network, they could not be hacked or accessed easily. but when the systems are in a network and share databases or resources,then these could be more vulnerable to unauthorized persons or individuals.
The data been stored on a mainframe in San Francisco that is a centralized access by 10 branches of another bank. what this implies is that networking is involved or used to share data.
With this example, the chances of vulnerability or attacks increases from the following :
Accounts payable could be disturbed by changing cash in payment false.Entering incorrect data into the system. such transactions can be altered, deleted by unauthorized persons.Transaction fraud like hacking, masquerading are very common in a networked system.The system that will be more prone to attack or vulnerability is:
The bank with data being stored on a mainframe in San Francisco.What is Database?This refers to the data management where information is stored for easy retrieval and use.
With this in mind, we can see that if a bank in California has 13 different branches and stores data differently and another bank has 10 branches in California with data stored in a mainframe in San Francisco.
Hence, the more vulnerable system would be the mainframe in San Francisco because it is a shared system.
Read more about databases here:
https://brainly.com/question/5707732
Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False
Lossy compression means that when you compress the file, you're going to lose some of the detail is a true statement.
2. InDesign is the industry standard for editing photos is a true statement.
3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.
4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.
What lossy compression means?The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after it has undergone decompression.
Note that data here tends to be permanently deleted, which is the reason this method is said to be known as an irreversible compression method.
Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true statement.
Learn more about File compression from
https://brainly.com/question/9158961
#SPJ1
Spreadsheet software enables you to organize, calculate, and present numerical data. Numerical entries are called values, and the
instructions for calculating them are called.
Answer:
It's called coding frame
Define the 7 steps to web design.
In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multiplied by the fourth power of two.
A. Fourth
B. Fifth
C. Sixth
Answer:
Your answer would be, B. Fifth digit ftom the right.
Explanation:
Binary with letters works like this,
the first 3 bits from the left, determine if the character is caps or lowercase, 010 is capital and 011 is lowercase, the next 5 are like this,
First - 2 to the power of four
Second - 2 to the power of three
Third - 2 to the power of two
Fourth - 2 to the powet of one
Fifth - 2 to the power of zero
So, given that information, the fourth digit from the right is 2 to the power of the three. The sixth digit is a bit to determine the capitalization, so the only answer left is B.
In binary, the second digit from the right is multiplied by the first power of two, and the fifth digit from the right is multiplied by the fourth power of two.
What is a binary number?The base-2 numeral system, often known as the binary numeral system, is a way of expressing numbers in mathematics that employs only two symbols, typically "0" and "1."
The character's case is determined by the first three bits from the left, 010 is capitalized, 011 is lowercase, and so on for the following 5.
First - 2 to the power of four
Second - 2 to the power of three
Third - 2 to the power of two
Fourth - 2 to the powet of one
Fifth - 2 to the power of zero
The fourth digit from the right is therefore 2 to the power of three given the information above. The only option left is B because the sixth digit is a bit to determine capitalization.
Therefore, the correct option is B. Fifth.
To learn more about binary numbers, refer to the link:
https://brainly.com/question/15766517
#SPJ2
In Scratch, what option in the Sounds tab would you select if you wanted to use a sound file already on your local computer?
Choose a Sound
Record
Surprise
Upload
Answer:
upload
Explanation:
Declare an array to store objects of the class defined by the UML. Use a method from the JOPTIONPANE class to request the length of the array the use
Here's the code snippet that declares an array to store objects of a class defined by a UML and uses the showInputDialog method from the JOptionPane class to request the length of the array from the user:
The Code Snippetimport javax.swing.JOptionPane;
public class MyClass {
public static void main(String[] args) {
int length = Integer.parseInt(JOptionPane.showInputDialog("Enter the length of the array:"));
MyUMLClass[] array = new MyUMLClass[length];
// Rest of the code...
}
}
class MyUMLClass {
// Class definition...
}
This instance entails that the user is requested to provide the quantity of items in the array with the use of the showInputDialog method, and subsequently, the input value is saved into the length variable. Subsequently, a collection of MyUMLClass instances is generated with a predetermined size.
Read more about arrays here:
https://brainly.com/question/29989214
#SPJ1
What is output?
C = 1
sum - 0
while (c < 10):
c = c + 3
sum = sum + c
print (sum)
Explanation:
Please make me BrainliestIn 2019, the tuition for a full time student is $7,180 per semester. The tuition will be going up for the next 7 years at a rate of 3.5% per year. Write your program using a loop that displays the projected semester tuition for the next 7 years. You may NOT hard code each years tuition into your program. Your program should calculate the tuition for each year given the starting tuition in 2019 ($7, 180) and the rate of increase (3.5%). You should then display the actual year (2020, 2021, through 2026) and the tuition amount per semester for that year
Answer:
In Python:
tuition = 7180
year = 2019
rate = 0.035
for i in range(2019,2027):
print(str(year)+": "+str(round(tuition,2)))
tuition = tuition * (1 + rate)
year = year + 1
Explanation:
This initializes the tuition to 7180
tuition = 7180
This initializes the year to 2019
year = 2019
This initializes the rate to 3.5%
rate = 0.035
This iterates through years 2019 to 2026
for i in range(2019,2027):
This prints the year and tuition
print(str(year)+": "+str(round(tuition,2)))
This calculates the tuition
tuition = tuition * (1 + rate)
This increments year by 1
year = year + 1
C++ code pls write the code
Answer:
Following are the code to this question:
#include<iostream>//defining header file
using namespace std;
class vec//defining class vec
{
int x, y, z; //defining integer varaible x, y, z
public: // using public access specifier
vec() //defining default constructor
{
x = 0; //assign value 0 in x variable
y = 0; //assign value 0 in y variable
z = 0;//assign value 0 in z variable
}
vec(int a, int b , int c) //defining parameterized constructor vec
{
x = a; //assign value a in x variable
y = b; //assign value b in y variable
z = c;//assign value c in z variable
}
void printVec() //defining a method printVec
{
cout<<x<<","<<y<<","<<z<<endl; //use print method to print integer variable value
}
//code
vec& operator=(const vec& ob) //defining operator method that create object "ob" in parameter
{
x=ob.x; //use ob to hold x variable value
y=ob.y;//use ob to hold y variable value
z=ob.z;//use ob to hold z variable value
return *this;//using this keyword to return value
}
};
int main()//defining main method
{
vec v(1,2,3);//calling parameterized constructor
vec v2; //creating class object to call method
v2=v; //creatring reference of object
v2.printVec(); //call method printVec
return 0;
}
Output:
1, 2, 3
Explanation:
In the above-given code part, a method "operator" is defined, that accepts an object or we can say that it is a reference of the class "ob", which is a constant type. Inside the method, the object is used to store the integer variable value in its variable and use the return keyword with this point keyword to return its value.
Write first 20 decimal dijits in the base 3
Answer:
first 20 decimal dijits in the base 3
Explanation:
i wrote what you said
Different types of users in a managed network, what they do, their classification based on tasks
In a managed network,, skilled can be miscellaneous types of consumers accompanying various roles and blames.
What is the network?Administrators are being the reason for directing and upholding the network infrastructure. Their tasks involve network arrangement, freedom management, consumer approach control, listening network performance, and mechanically alter issues.
Administrators have high-ranking approach and control over the network. Network Engineers: Network engineers devote effort to something designing, achieving, and claiming the network foundation.
Learn more about network from
https://brainly.com/question/1326000
#SPJ1
ndcdeviceid?????????????????????
YESS
Explanation:
YESSssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss
I am working on 8.8.6 "Totals of Lots of Rolls" in codeHS javascript and
I do not know what to do can someone help me?
Using the knowledge in computational language in JAVA it is possible to write a code that rolls a 6-sided die 100 times.
Writting the code:var counts = [0, 0, 0, 0, 0, 0, 0];
for (var i = 0; i < 100; i++) {
counts[Math.floor(1 + Math.random() * 6)]++;
}
console.log('You rolled ' + counts[1] + ' ones.');
console.log('You rolled ' + counts[2] + ' twos.');
console.log('You rolled ' + counts[3] + ' threes.');
console.log('You rolled ' + counts[4] + ' fours.');
console.log('You rolled ' + counts[5] + ' fives.');
console.log('You rolled ' + counts[6] + ' sixes.');
See more about JAVA at brainly.com/question/12975450
#SPJ1
If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color
Answer:
watermark
Explanation:
Write a program that will read in id numbers and place them in an array.The array is dynamically allocated large enough to hold the number of id numbers given by the user. The program will then input an id and call a function to search for that id in the array. It will print whether the id is in the array or not.
Answer:
#include <stdio.h>
#include <stdlib.h>
int main() {
int n, i, *p, s;
scanf("%d", n);
p = (int*) malloc(n * sizeof(int));
if(p == NULL) {
printf("\nError! memory not allocated.");
exit(0);
}
printf("\nEnter elements of array : ");
for(i = 0; i < n; ++i) {
scanf("%d", p + i);
}
scanf("Enter Id to be searched: %d", s);
for(j = 0; j < n; ++j) {
if (s == *(p+j)){
printf("ID number is in the array at position %d", j);
}else{
printf("Error: ID number does not exist.");
}
}
return 0;
Explanation:
The C program source code inputs integer values to dynamic array size, and the search variable is looked for in the array using a for loop. If the search term exists, then the index position is printed on the screen, else an error message is displayed on the screen.
A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error. The analyst runs a netstat -an command to discover if the webserver is up and listening. The analyst receives the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
A. Buffer overflow
B. Domain hijacking
C. Denial of service
D. Arp poisoning
Answer:
C. Denial of Service
Explanation:
Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.
D-H public key exchange Please calculate the key for both Alice and Bob.
Alice Public area Bob
Alice and Bob publicly agree to make
N = 50, P = 41
Alice chooses her Bob
picks his
Private # A = 19 private #
B= ?
------------------------------------------------------------------------------------------------------------------------------------------
I am on Alice site, I choose my private # A = 19.
You are on Bob site, you pick up the private B, B and N should have no common factor, except 1.
(Suggest to choose B as a prime #) Please calculate all the steps, and find the key made by Alice and Bob.
The ppt file of D-H cryptography is uploaded. You can follow the steps listed in the ppt file.
Show all steps.
Answer:
See explaination
Explanation:
Please kindly check attachment for the step by step solution of the given problem.
Explain the history of communication.
Answer:
Ur answer
Explanation:
i hope its help to you ✌
What is the best way to deal with a spam
Simply ignoring and deleting spam is the best course of action. Avoid responding to or engaging with the spam communication because doing so can let the sender know that your contact information is still live and invite additional spam in the future. Additionally, it's critical to mark the email as spam using your email program or by reporting it to the relevant authorities. Make careful to report the spam to the proper authorities for investigation if it appears to be a phishing scheme or contains hazardous content.
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
Perform algorithm time measurement for all three quadratic sorting algorithms for Best Case (already sorted), Average Case (randomly generated), and Worst Case (inverse sorted) inputs and compare them with O(N*logN) sorting algorithm using Arrays.sort() method. Use arrays sizes of 50K, 100K, and 200K to produce timing results.
Answer:
Experiment size : 50,000
==================================
Selection sort :
---------------------------------------------------------
Worst case : 0.162
Average case : 0.116
Best case : 0.080
Insertion sort :
---------------------------------------------------------
Worst case : 0.162
Average case : 0.116
Best case : 0.080
Bubble sort:
--------------------------------------------------------
Worst case : 0.211
Average case : 0.154
Best case : 0.117
Experiment size : 100,000
==================================
Selection sort :
---------------------------------------------------------
Worst case : 0.316
Average case : 0.317
Best case : 0.316
Insertion sort :
---------------------------------------------------------
Worst case : 0.316
Average case : 0.317
Best case : 0.316
Bubble sort:
--------------------------------------------------------
Worst case : 0.482
Average case: 0.487
Best case : 0.480.
Experiment size : 200,000
==================================
Selection sort :
---------------------------------------------------------
Worst case : 1.254
Average case : 1.246
Best case : 1.259
Insertion sort :
---------------------------------------------------------
Worst case : 1.254
Average case : 1.246
Best case : 1.259
Bubble sort:
--------------------------------------------------------
Worst case : 1.990
Average case : 2.009.
Best case : 1.950
Explanation:
[NB: since it is very long there is the need for me to put it it a document form. Kindly check the doc. Files. The file A is the sort Analysis.Java file and the file B is the sort.Java file].
The concept of algorithm time measurement strictly depends on the following;
=> The measurement of time, space or energy on different sizes.
=> Plotting of the measurements and characterizing them.
=> Running or implementation of the algorithm.
Programming language such as Java can be used in accessing the operating system clock and Java had two static methods.
KINDLY CHECK BELOW FOR THE ATTACHMENT.
Identify and describe the three basic operations used to extract useful sets of data from a relational database?
The select operation, The join operation, The project operation are the three basic operations used to extract useful sets of data from a relational database.
Describe the three basic operations used to extract useful sets of data from a relational database?The select operation generates a subset from the table's records (rows) that satisfy the specified criteria. Relational tables are joined together to offer the user access to more data than is contained in each table alone. The project procedure generates a subset of the table's columns, enabling the user to construct new tables that only include the necessary data.
What actions are performed in a relational DBMS?Relational algebra has five fundamental operations: Set Difference, Union, Cartesian Product, and Selection. Most required data retrieval activities are carried out by them.
To know more about database visit
brainly.com/question/29412324
#SPJ4
Help me with this digital Circuit please
A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.
Thus, These circuits receive input signals in digital form, which are expressed in binary form as 0s and 1s. Logical gates that carry out logical operations, including as AND, OR, NOT, NANAD, NOR, and XOR gates, are used in the construction of these circuits.
This format enables the circuit to change between states for exact output. The fundamental purpose of digital circuit systems is to address the shortcomings of analog systems, which are slower and may produce inaccurate output data.
On a single integrated circuit (IC), a number of logic gates are used to create a digital circuit. Any digital circuit's input consists of "0's" and "1's" in binary form. After processing raw digital data, a precise value is produced.
Thus, A subset of electronics called digital circuits or digital electronics uses digital signals to carry out a variety of tasks and satisfy a range of needs.
Learn more about Digital circuit, refer to the link:
https://brainly.com/question/24628790
#SPJ1
What can help establish the focus and organization it relies on?
A.organizing
B.Plan
C.programming
D. arranging
Answer:
the answer is A jdififkfmtmg of g
Write a research about the 5 major of computer applications
Answer:
At the Indian National Congress Karachi session in 1931, Congress passed resolution dissociating itself and disapproving the policy of political violence in any form. The resolution was drafted by Mahatma Gandhi which admired the bravery and sacrifice of the 3 Martyrs- Bhagat Singh, Sukhdev, and Rajguru.
Explanation:
What is the running time to perform the following operations: (a) minimum (b) maximum (c) median (d) average (e) search/look-up (f) predecessor (g) successor, for a dynamic set with n keys implemented using the following data structures: (a) binary search tree (b) hash table based dictionary (c) direct address based dictionary (d) red-back tree (e) van-emde boas tree.
The running time that is used for a lot of operations in a lot of data structures for any given dynamic set with n keys are known to be given below.
What is the running time about?In terms of (a) Minimum time they are:
Binary search tree: This is seen as O(h), and it is one where h is seen as the height of the said tree.
In terms of Hash table based dictionary: It is one that is not applicable, as it is one where the hash tables do not aid or support any form of finding of any kind in terms of the minimum element.
Lastly in terms of Direct address based dictionary: O(1) is one that is seen as as the minimum element that is it is one that can be directly accessed via the use of its key. Red-black tree: is one where the O(1), is one that act as red-black trees that tends to keep a subtree via the use of the minimum element found at its root.
Learn more about running time from
https://brainly.com/question/26046491
#SPJ1
Explain Newtown 3rd law.
gur-krcz-siq
a simple structured program in c++ to calculate average of n items
Answer:
#include <iostream>
using namespace std;
int main ()
{
int n, i;
float sum = 0.0, average;
cout << "Enter the number of items:";
cin >> n;
float num[n];
for(i = 0; i < n; ++i)
{
cout << "Enter a number: ";
cin >> num[i];
sum += num[i];
}
average = sum / n;
cout << "Average = " << average;
return 0;
}
Explanation:
OK, I let ChatGPT write this one, but it is a proper solution. You can simplify it by not storing each number in an array element. This is because other than adding it to the sum, you don't need these numbers.
4. Why do animals move from one place to another?
Answer:
Animal move from one place to another in search of food and protect themselves from their enemies.They also move to escape from the harsh climate. Animal move from one place to another in search of food,water and shelter.
Answer:
Animals move one place to another because he search food and shelter