Philosophy, I beleive. He tought Sikander liturature and eloquence, but his most famous teachings were of philosophy.
Aristotle taught the world science. He was considered the best scientists of his time.
Write a procedure called Str_nextWord that scans a string for the first occurrence of a certain delimiter character and replaces the delimiter with a null byte. There are two input parameters: a pointer to the string and the delimiter character. After the call, if the delimiter was found, the Zero flag is set and EAX contains the offset of the next character beyond the delimiter. Otherwise, the Zero flag is clear and EAX is undefined. The following example code passes the address of target and a comma as the delimiter:
Answer:
Str_nextword PROC, pString:PTR BYTE, ; pointer to string delimiter:BYTE ; delimiter to find push esi mov al,delimiter mov esi,pString cld ; clear Direction flag (forward) L1: lodsb ; AL = [esi], inc(esi) cmp al,0 ; end of string? je L3 ; yes: exit with ZF = 0 cmp al,delimiter ; delimiter found? jne L1 ; no: repeat loop L2: mov BYTE PTR [esi-1],0 ; yes: insert null byte mov eax,esi ; point EAX to next character jmp Exit_proc ; exit with ZF = 1 L3: or al,1 ; clear Zero flag Exit_proc: pop esi ret Str_nextword ENDP
Explanation:
push esimov al,delimitermov esi,pStringcld ; clear Direction flag (forward)L1: lodsb ; AL = [esi], inc(esi)cmp al,0 ; end of string?je L3 ; yes: exit with ZF = 0cmp al,delimiter ; delimiter found?jne L1 ; no: repeat loopL2: mov BYTE PTR [esi-1],0 ; yes: insert null bytemov eax,esi ; point EAX to next characterjmp Exit_proc ; exit with ZF = 1L3: or al,1 ; clear Zero flagExit_proc:pop esiretStr_nextword ENDPStr_nextword ENDP
Where do I look for a deep learning mentor who can assist me in my career?
The answer:
You have to pay for it man!
Explanation:
You can find a lot of services from Fiverr and Upwork etc. But that would need to pay a lot for it.
Choose all items that represent characteristics of a cover letter:
A: asks for an interview for a specific job
B: lists prior positions held
C: is brief – never longer than one page
D: is required at job fairs
E: demonstrates enthusiasm and knowledge of the company and position
Answer:
The answers are:
A: asks for an interview for a specific job
C: is brief- never longer than one page
E: demonstrates enthusiasm and knowledge of the company and position
Hope this helps!
The cover letter represents the following things:
A: asks for an interview for a specific job
C: is brief – never longer than one page
E: demonstrates enthusiasm and knowledge of the company and position
What is a cover letter?A cover letter is a summary form of the resume of a person that informs the hiring manager of the company about what position the job is being required, it is not more than a single page.
The cover letter shows the enthusiasm level of the candidate, his knowledge, and position he is standing currently based on the knowledge.
Learn more about cover letter, here:
https://brainly.com/question/10626764
#SPJ2
How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.
Answer:
i choose choice D
Explanation:
reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit
Write a function "doubleChar(" str) which returns a string where for every character in the original string, there are two characters.
Answer:
//Begin class definition
public class DoubleCharTest{
//Begin the main method
public static void main(String [ ] args){
//Call the doubleChar method and pass some argument
System.out.println(doubleChar("There"));
}
//Method doubleChar
//Receives the original string as parameter
//Returns a new string where for every character in
//the original string, there are two characters
public static String doubleChar(String str){
//Initialize the new string to empty string
String newString = "";
//loop through each character in the original string
for(int i=0; i<str.length(); i++){
//At each cycle, get the character at that cycle
//and concatenate it with the new string twice
newString += str.charAt(i) + "" + str.charAt(i);
}
//End the for loop
//Return the new string
return newString;
} //End of the method
} // End of class declaration
Sample Output:TThheerree
Explanation:The code above has been written in Java and it contains comments explaining each line of the code. Kindly go through the comments. The actual lines of executable codes have been written in bold-face to differentiate them from comments.
A sample output has also been given.
Snapshots of the program and sample output have also been attached.
When should programmers use variables to store numeric data?
Programmers should use variables to store numeric data when they need to reference and use the same data multiple times throughout a program.
What is program?A program is a set of instructions that can be executed by a computer to perform a specified task. It can be written in any of a number of programming languages, such as C, Java, Python or Visual Basic. Programs can range from simple scripts that automate a task, to complex applications with many features. Programs are designed to solve a particular problem or provide a specific benefit to the user.
Variables are a convenient way to store and access data that may be needed in multiple different places.
To learn more about program
https://brainly.com/question/28028491
#SPJ1
The data files from a computer-assisted questionnaire software program can be downloaded at the researcher's discretion; however, different formatting options, including SPSS-readable files, may not be available. Group of answer choices True False
Answer:
False.
Explanation:
When data files are sourced from a computer-assisted questionnaire software program. The data files can be downloaded at the researcher's discretion, different formatting options can be used on the data files, and SPSS (Statistical Product and Service Solutions)-readable files are also available.
For instance, the CAPI (Computer-Assisted Personal Interview), CAWI (Computer-Assisted Web Interview) and CASI (Computer-Assisted Self Interview) software program collects data from potential targeted population in a survey. These data can be downloaded by the originator of the survey with its SPSS (Statistical Product and Service Solutions)-readable files.
Also, if the researcher wishes to edit or format the data, it is very possible to achieve.
Happy Thanksgiving!!!!
Yoo, you too, bro!
Have a nice time with your family
How to use the screen mirroring Samsung TV app
If you want to show what's on your phone or computer screen on a Samsung TV, you can do it by these steps:
Make sure both your Samsung TV and the thing you want to copy are using the same Wi-Fi.
What is screen mirroringThe step also includes: To get to the main menu on your Samsung TV, just press the "Home" button on your remote.
The screen mirroring is Copying or making a duplicate of something. They are repeating each other's words to try to fix the problem between them. This is the way to show what is on your computer or phone screen on another screen by using wireless connection.
Learn more about screen mirroring from
https://brainly.com/question/31663009
#SPJ1
4) Create a text file (you can name it sales.txt) that contains in each line the daily sales of a company for a whole month. Then write a Java application that: asks the user for the name of the file, reads the total amount of sales, calculates the average daily sales and displays the total and average sales. (Note: Use an ArrayList to store the data).
Answer:
Here's an example Java application that reads daily sales data from a text file, calculates the total and average sales, and displays the results:
import java.util.ArrayList;
import java.util.Scanner;
import java.io.File;
import java.io.FileNotFoundException;
public class SalesDemo {
public static void main(String[] args) {
// Ask the user for the name of the file
Scanner input = new Scanner(System.in);
System.out.print("Enter the name of the sales file: ");
String fileName = input.nextLine();
// Read the daily sales data from the file
ArrayList<Double> salesData = new ArrayList<>();
try {
Scanner fileInput = new Scanner(new File(fileName));
while (fileInput.hasNextDouble()) {
double dailySales = fileInput.nextDouble();
salesData.add(dailySales);
}
fileInput.close();
} catch (FileNotFoundException e) {
System.out.println("Error: File not found!");
System.exit(1);
}
// Calculate the total and average sales
double totalSales = 0.0;
for (double dailySales : salesData) {
totalSales += dailySales;
}
double averageSales = totalSales / salesData.size();
// Display the results
System.out.printf("Total sales: $%.2f\n", totalSales);
System.out.printf("Average daily sales: $%.2f\n", averageSales);
}
}
Assuming that the sales data is stored in a text file named "sales.txt" in the format of one daily sale per line, you can run this program and input "sales.txt" as the file name when prompted. The program will then calculate the total and average sales and display the results.
I hope this helps!
Explanation:
Which of the following are recommended ways to address run-time errors? Choose all that apply.
Delete the suspect lines of code and issue the program without that function.
Add error routines that allow the program to execute fully even when unanticipated data is entered.
Create error messages to alert the user to an error in data entry.
Create controls in the program that ensure the input of proper data.
Answer:
2. Add error routines that allow the program to execute fully even when unanticipated data is entered.
3. Create error messages to alert the user to an error in data entry.
4. Create controls in the program that ensure the input of proper data.
Explanation:
Mark me brainliest plz
Answer:
2 3 4 i got it right
Explanation:
When scaling up a vector image, which of the follow does NOT happen? (1 point)
The image becomes blurry and harder to see.
The image keeps its sharpness no matter how large it gets.
The computer can fill in information to make each point more detailed.
The image's colors remain the same.
Brainly account. How to open?
Internet Retailing
Visit an e-commerce Web site such as Amazon.com and find a product you would like to purchase. While looking at the page for that item, count the number of other products that are being offered on that page.
Activity
Answer the following questions: What do they have in common? Why are they appearing on that page?
When I visited the e-commerce Web site such as Amazon.com and find a product that I would like to purchase which is a laptop, The thing that the sellers have in common is that they are trusted and verified sellers, their product presentation is nice and has warranty on it. The reason they are appearing on that page is because the product are similar.
What is E-commerce site website?The term e-commerce website is one that enables customers to buy and sell tangible products, services, and digital commodities over the internet as opposed to at a physical store. A company can process orders, receive payments, handle shipping and logistics, and offer customer care through an e-commerce website.
Note that there are numerous eCommerce platforms available, each with its own set of characteristics. The optimal eCommerce platform will therefore rely on your demands, available resources, and business objectives.
So, for instance, if you're a novice or small business owner looking to set up an online store in only a few clicks, go with a website builder like Hostinger. Oberlo, on the other hand, boasts the best inventory management system for dropshippers and is the top eCommerce platform overall.
Learn more about e-commerce Web site from
https://brainly.com/question/23369154
#SPJ1
Place yourself in the position of a network designer. You have customers that are looking to improve their network but need your help. Read over each scenario to get an idea of what the customer currently has and what they will need of the new network. Customer may not always know exactly what they need so reading in between the lines is a great skill to start working on.
After picking out the requirements the customer is in need of solving, complete research on real world devices that may be a good fit for them. This can include new devices, services and cables depending on the customers' needs. Once you have finished your research make a list of the devices you are recommending to the customer. Each device/service will need an explanation on why you chose it, the price, link to the device and a total budget for reach scenario. Think of your explanation as a way of explaining to the customer why this device would fit their specific needs better than another one.
There is no one way of designing any network. Your reasoning for choosing a device is just as important as the device itself. Be creative with your design!
Scenario A: young married couple, the husband is an accountant, and the wife is a graphic designer. They are both now being asked to work from home. Their work needs will be mainly accessing resources from their offices but nothing too large in file size. They have a 2-story townhome with 1600 square feet space. There is a 2nd floor master bedroom with a streaming device, a 1st floor office space with a streaming device and living room with a 3rd streaming device. The wife works from the master bedroom while the husband works mainly in the office space. Their ISP is a cable provider, and they have a 200 Mbps download and a 50 Mbps upload service account. The cable modem is in the office space and they currently pay $5 a month to have an integrated wireless access point (WAP) but no ethernet capability. The office space will need to have a LaserJet printer connected to the network via ethernet Cat-5E cable. They want to stop paying the monthly $5 and have their own WAP. The WAP needs to have an integrated switch that can provide them reliable work-from-home connectivity, with at least 4 ethernet ports for growth, and steady streaming capability for their personal viewing. Budget for the network infrastructure improvement is under $2500.
The Ubiquiti Networks UniFi Dream Machine (UDM) is the perfect instrument to fulfill the couple's networking requirements.
What does it serve as?The all-inclusive device serves as a Router, Switch, Security gateway, and WAP delivering stable home-working performance. It provides four Ethernet ports operating at the most advanced WiFi 6 specifications, enabling convenient streaming for entertainment.
Besides its user-friendly mobile app assisting with setting up and management processes, the UDM accommodates VLANs so users can segment their network in order to heighten security.
Costing around $299 – obtainable from either Ubiquiti’s site or Amazon - and Cat-6 Ethernet cables costing roughly $50 for every five on Amazon, the total expenditure comes to $350, conveniently fitting in the prearranged budget of $2500.
Read more about budget here:
https://brainly.com/question/6663636
#SPJ1
A server accepts and processes requests from clients. The server keeps the results of the most recent requests in memory as a cache. The processing of each request takes 15 ms.
If the requested result is not in the memory cache, additional 75 ms are needed to access the disk.
On average, 80% of all requests can be serviced without disk access. The creation of a new thread takes 10 ms.
(a) To minimize average response time, should the server be implemented as a single-threaded or a multi-threaded process? Justify your answer.
(b) What percentage of requests would have to be satisfied without disk access for the two approaches to break even?
In order to minimize average response time, the server be implemented as a multi-threaded process as it'll help in time reduction.
What is a server?It should be noted that a server means a computer that provides data and resources to clients over a network.
The percentage of requests would have to be satisfied without disk access for the two approaches to break even will be 80%.
Learn more about server on:
brainly.com/question/17062016
#SPJ2
Who designed the Analytical Engine in the 1830s? Alan Turing Alan Turing Charles Babbage Charles Babbage Bill Gates Bill Gates Steve Wozniak Steve Wozniak
You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative
Answer:
The answer is:
A) Absolute cell reference
Explanation:
An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.
Hope this helped you!! Have a good day/night!!
Answer:
A is the right option absoluteIn order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Which of the following best describes an insider attack on a network?
OA. an attack by someone who uses fake emails to gather information related to user credentials
OB. an attack by someone who becomes an intermediary between two communication devices in an organizatio
OC. an attack by a current or former employee who misuses access to an organization's network
O D. an attack by an employee who tricks coworkers into divulging critical information to compromise a network
An attack by a current or former employee who misuses access to an organization's network ca be an insider attack on a network. The correct option is C.
An insider attack on a network refers to an attack carried out by a person who has authorized access to an organization's network infrastructure, either as a current or former employee.
This individual intentionally misuses their access privileges to compromise the network's security or to cause harm to the organization.
Option C best describes an insider attack as it specifically mentions the misuse of network access by a current or former employee.
The other options mentioned (A, B, and D) describe different types of attacks, but they do not specifically involve an insider with authorized access to the network.
Thus, the correct option is C.
For more details regarding network, visit:
https://brainly.com/question/29350844
#SPJ1
Imagine that you are a sound designer for a new spy/mystery film. In a pivotal scene, the lead character discovers that a mentor has betrayed her. She confronts her mentor on the rooftop of a high-rise building at night. What would you, as the sound designer, do to maximize the impact of this emotional scene? Your answer should be at least 150 words.
Answer:
I would of made the sound deep, somewhat emotional, like with violin or piano in the background, while the dialog played. If the mentor were to push the lead character off the building, I would add some music that was intense, to add onto it, and when the character would start to fall, the music would get deeper and quieter, and make the music cut out as the character fell the rest of the way. If somebody saved the person, like somebody were to save them by grappling onto a building and snatching the person, the music would go up, and be a bit more up beat.
that would be what I would of put if I were to have that same question on something.
I hope that helped you!
What are the four components of the Universal Systems Model?
Answer:
output, process, input, and feedback
Explanation:
Small organizations with only a few computers can manage each device in an ad hoc way without standardization. Larger organizations need to use standardization to scale their ability to support many users. Consider what you’ve learned about Active Directory and Group Policy and how they can be used to simplify user support and desktop configuration. You can search the Internet for examples. Create a posting that describes your thoughts on how Active Directory and Group Policy improve management in large organizations.
Organizational security is the principal application of Group Policy Management. Group policies, also known as Group Policy Objects (GPOs), enable decision-makers and IT professionals to deploy critical cybersecurity measures throughout an organization from a single place.
What is an Active Directory?Microsoft Active Directory has a feature called Group Policy. Its primary function is to allow IT administrators to manage people and machines throughout an AD domain from a single location.
Microsoft Active Directory is a directory service designed for Windows domain networks. It is featured as a set of processes and services in the majority of Windows Server operating systems. Active Directory was initially exclusively used for centralized domain management.
Group Policy is a hierarchical framework that enables a network administrator in charge of Microsoft's Active Directory to implement specified user and computer configurations. Group Policy is essentially a security tool for applying security settings to people and machines.
Learn more about Active Directories:
https://brainly.com/question/14469917
#SPJ1
In Excel, is there a way to have two variables added together like this?
x = x + y where, for example, x=2 y=3
x = 2 + 3
then making cell x = 5 rather than the original 2
Yes, in Excel, one can perform the above Operation. Note that the instruction must be followed to get the result. See the attached image for the output.
How can this be done?In separate cells, enter the x and y values. Enter 2 in cell A1 and 3 in cell A2, for example.
Enter the formula "=A1+A2" in another cell. Enter "=A1+A2" in cell A3, for example.
When you press enter or return, the calculation result (5) will appear in cell A3.
If you replace the value of x with the computation formula, it will result in a circular reference error.
A circular reference in Excel indicates that the calculation in a certain cell refers to it's own result once or several times.
Note that x cannot be equal to x + y except y is 0.
Learn more about Excel:
https://brainly.com/question/31409683
#SPJ1
#Write a function called "in_parentheses" that accepts a
#single argument, a string representing a sentence that
#contains some words in parentheses. Your function should
#return the contents of the parentheses.
#
#For example:
#
# in_parentheses("This is a sentence (words!)") -> "words!"
#
#If no text appears in parentheses, return an empty string.
#Note that there are several edge cases introduced by this:
#all of the following function calls would return an empty
#string:
#
# in_parentheses("No parentheses")
# in_parentheses("Open ( only")
# in_parentheses("Closed ) only")
# in_parentheses("Closed ) before ( open")
#
#You may assume, however, that there will not be multiple
#open or closed parentheses.
#Write your function here!
def in_parentheses(a_string):
import re
regex = re.compile(".*?\((.*?)\)")
result = re.findall(regex, a_string)
return(result)
#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print (including the blank lines):
#words!
#
#as he is doing right now
#
#
#!
print(in_parentheses("This is a sentence (words!)."))
print(in_parentheses("No parentheses here!"))
print(in_parentheses("David tends to use parentheses a lot (as he is doing right now). It tends to be quite annoying."))
print(in_parentheses("Open ( only"))
print(in_parentheses("Closed ) only"))
print(in_parentheses("Closed ) before ( open"))
print(in_parentheses("That's a lot of test cases(!)"))
Answer:
import regex as re
def in_parentheses(a_string):
regeX = re.compile(".*?\((.*?)\)")
result = re.findall(regeX, a_string)
return str(result).replace("[","").replace("]","")
print("test 1: "+in_parentheses("Open ( only"))
print("test 2: "+in_parentheses("This is a sentence (words!)."))
PLEASE HELPP!!!!!
Select all that apply.
Proper numeric keyboarding technique includes:
1.looking at the keys
2.resting your fingers gently on the home keys
3.stiffening your fingers
4.keeping your wrist straight
5.pressing the keys squarely in the center
Answer:
1, 2 and 5
Explanation:
see picture to make sure they are in the correct order for you.
Answer:
resting your fingers gently on the home keys
keeping your wrist straight
pressing the keys squarely in the center
discuss seven multimedia keys
Answer:
Any seven multimedia keys are :-
□Special keys
□Alphabet keys
□Number keys
□Control keys
□Navigation keys
□Punctuation keys
□Symbol keys
Which strategy helps job seekers organize and track their job search progress efficiently?
A job seeker who is using an online resources for the job search shows that how technology as well as the internet in the particular has been helped to simplify our everyday life.
What is the use of online resources in finding a job?The use of the online resources in the job search provides a much faster way of reaching and covering a wide range of available jobs within and far beyond your immediate geographical range.
Before the internet, the job searches were typically done manually, and the process has been consumed a lot of time and the resources and was mostly limited a certain geographical range.
Therefore, nowadays, someone in the US can easily apply for a job post on the internet all the way in Germany.
Learn more about internet on:
https://brainly.com/question/13308791
#SPJ9
A Lost link is an interruption or loss of the control link between the control station and the unmanned aircraft, preventing control of the aircraft. As a result, the unmanned aircraft performs pre-set lost link procedures. Such procedures ensure that the unmanned aircraft:
Answer:
There is nothing to answer from this statement.
Explanation:
Can you rephrase the statement into question?
please help with this question