Answer:
Following are the solution to this question:
Explanation:
Physical Access to Linux Servers:
Unauthorized staff is denied access to windows server due to various reasonable factors which might damage databases and then all database depends.
Linux distributions handle their servers but it is almost important that they will be protected or hackproof to safeguards their organizations' networks.
Guess if an unwanted staff has access to the server, he/she can be using the device by just placing a simple USB or dragging the information of the database to study it even further. Here that the results stay throughout the possession of even an unauthorized person, whom no organization wants to confront.
Its attacker may also damage that server by installing a virus or any virus mostly on the server. User security can allow unauthorized staff to go on a search and retrieve the database to disc inside the database.
Warranted physical limitations:
All such physical constraints are assured because the company cannot manage a minor error in physical security.
Because conflicts with both the physical limitation will damage its database so much but leave all loopholes free to that same protection of attackers and operators.
Its physical safety guarantee should be maintained by routine server room checks and ensure that every step of safety is undertaken and results are achieved.
Analyze and write a comparison of C's malloc and free functions with C++'s new and delete operators. Use safety as the primary consideration in the comparison
Answer:
The C's malloc and free functions and the C++'s new and delete operators execute similar operations but in different ways and return results.
Explanation:
- The new and delete operators return a fully typed pointer while the malloc and free functions return a void pointer.
-The new and delete operators do not return a null value on failure but the malloc/free functions do.
- The new/delete operator memory is allocated from free store while the malloc/free functions allocate from heap.
- The new/delete operators can add a new memory allocator to help with low memory but the malloc/free functions can't.
- The compiler calculates the size of the new/delete operator array while the malloc/free functions manually calculate array size as specified.
An anagram of a string is another string with the same characters in the same frequency, in any order. For example 'ab', 'bca, acb), 'bac', 'cba, 'cab' are all anagrams of the string 'abc'. Given two arrays of strings, for every string in one list, determine how many anagrams of it are in the other list. Write a function that receives dictionary and query, two string arrays. It should return an array of integers where each element i contains the number of anagrams of queryll that exist in dictionary.
Answer:
from collections import Counter
def anagram(dictionary, query):
newList =[]
for element in dictionary:
for item in query:
word = 0
count = 0
for i in [x for x in item]:
if i in element:
count += 1
if count == len(item):
newList.append(item)
ans = list()
for point in Counter(newList).items():
ans.append(point)
print(ans)
mylist = ['jack', 'run', 'contain', 'reserve','hack','mack', 'cantoneese', 'nurse']
setter = ['ack', 'nur', 'can', 'con', 'reeve', 'serve']
anagram(mylist, setter)
Explanation:
The Counter class is used to create a dictionary that counts the number of anagrams in the created list 'newList' and then the counter is looped through to append the items (tuple of key and value pairs) to the 'ans' list which is printed as output.
What symbol following a menu command lets you know that a dialog box will be displayed? an ellipse an arrow a check mark a radio button
cords and batteries or electric radio
Answer:
It would be an ellipse
Most operating systems perform these tasks. coordinating the interaction between hardware and software allocating RAM to open programs creating and maintaining the FAT modifying word processing documents correcting spreadsheet formulas displaying the GUI
Answer:
The answer are A.) Coordinating the interaction between hardware and software And B.) Allocating RAM to open programs
Explanation:
Hope this helps :)
Tasks that are been performed by most operating systems are;
Coordinating the interaction between hardware and software.Allocating RAM to open programs.An operating system can be regarded as system software which helps in running of computer hardware as well as software resources and mange them.
This system provides common services for computer programs.
It should be noted that operating system coordinating the interaction between hardware as well software.
Therefore, operating system, allocate RAM to open programs.
Learn more about operating system at:
https://brainly.com/question/14408927
Need help with 4.7 lesson practice edhesive
Answer:
Question 4 => 4th answer: The first line should be for x in range (7, 10):
Question 5 => 2nd answer: 14 16 18 20 22 24 26 28 30 32
Explanation:
Question 4
"for" loops always need a variable (like "x") defined to iterate with different values. for x in range (7, 10): makes x to take values 7, 8, 9 and 10 successively and execute print(x) each time.
Question 5
The expression x in range (7, 16) makes x to take values from 7 up to 16 inclusive. So for each iteration it will execute print x*2 which prints the double of the actual value for x. Starting with x=7, it will print 14, then with x=8 will print 16, and so on. All values are shown on the table below:
X Prints
7 14
8 16
9 18
10 20
11 22
12 24
13 26
14 28
15 30
16 32
The code segments are illustrations of loops.
4: The first line should be for x in range(7,10):5: The output is 14 16 18 20 22 24 26 28 30The syntax of a for loop is:
for variable in range (begin,end+1):
The loop in question (4) is given as:
for range (7,10)
This means that, the variable is missing.
So, the first line of the code segment should be
for x in range(7,10):
For question 5, the value of x would range from 7 to 15.
The print statement prints twice x, followed by a space.
So, the output would be 14 16 18 20 22 24 26 28 30
Read more about loops at:
https://brainly.com/question/19323897
Individuals who break into computer systems with the intention of doing damage are called _____________.
a. white hats
b. e-criminals
c. hackers
d. keyloggers
e. black hats
The individuals who made the unethical entry into a person's system with intentions of damage are termed, hackers. Thus, option C is correct.
What is a computer system?A computer system has been given as the network connection of the hardware and the software equipped with the objects that are used for the operation of the computer.
The computer system with the internet connection has been able to make the connection to the world. as well the invention mediates the work with ease as well.
The system thereby has the access to the passwords and the personal details of an individual as well. There are individuals who try to make access the computer system in an unethical way and intended to damage the system.
The computer viruses are used for the following purpose and were drawn by the hackers. Thus, option C is correct.
Learn more about the computer system, here:
https://brainly.com/question/14253652
#SPJ2
Complete the sentence.
Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called______
Answer:
Compilation
Explanation:
" Python is an interpreted, high-level, general-purpose programming language. It is is dynamically typed and garbage-collected. "
But first it does a compilation for a file with the extension `.pyc`, so the answer is compilation, even though python is being interpreted
Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.
What is code?The line of code returns the ASCII code.
ASCII, has the full form American Standard Code for Information Interchange. It consists of a 7-bit code in which every single bit represents a unique alphabet.
Python is a high-level computer programming language. It is dynamically used.
First, it does a compilation for a file with the extension `.pyc`
Python converts your code into bytecode when you run your program. This process is an intermediate step in a process called Compilation.
Learn more about code.
https://brainly.com/question/2596551
#SPJ2
QUESTION 3 / 10
Which of the following is the BEST reason to use cash for making purchases?
A. Keeping track of how much you have spent is simple.
B. Splitting bills with friends is easier.
C. Getting more cash from an ATM machine is easy to do.
D. Knowing what you have spent your money on is
simple.
In a three-tier architecture, the component that runs the program code and enforces the business processes is the:_______.
Answer:
Application Server
Explanation:
The Application Server is a component in computer engineering that presents the application logic layer in a three-tier architecture.
This functionality allows client components to connect with data resources and legacy applications.
In this process of interaction, the Application Server runs the program code from Tier 1 - Presentation, through Tier 2 - Business Logic to Tier 3 - Resources, by forcing through the business processes.
Which of the following statements about computational thinking are true? Select 3 options.
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
In this question the choices are missing, the choices of this question are:
The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions, Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development. Computational thinking is basically synonymous with programming. Computational thinking is a set of techniques used to help solve complex problems or understand complex systems Understanding all of the minor details about a problem is critical in computational thinkingThe correct 3 choices about computational thinking that are true are given below:
1.The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions.
2. Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.
4. Computational thinking is a set of techniques used to help solve complex problems or understand complex systems.
Answer:
-The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions.
-Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.
- Computational thinking is a set of techniques used to help solve complex problems or understand complex systems.
Explanation:
I just took the test got a 100%
What is a file type and why is it important? Give at least three examples of file
types, including the associated file extension and
program.
what are the types of slide show in powerpoint? define.
Answer:
normal view
slide sorter view
master view
notes page view
Compress
00eb:0000:0000:0000:d8c1:0946:0272:879
IPV6 Address
Answer:
Compress
00eb:0000:0000:0000:d8c1:0946:0272:879
IPV6 Addres
Explanation:
What is the part of a CSS declaration that describes the HTML tag?
A.the selector
B.the pointer
C.the value
D.the property
Answer:
a selector
Explanation:
Answer:
A. the selector
Information System (IS) designed to provide reports to managers for tracking operations, monitoring and control is ________
Answer:
Management Information System(MIS)
Explanation:
management information system can be regarded as an information system
that is engaged in decision-making as well as the coordination and control and analysis of information in an organization. It involves processes as well as people and technology when studying the management information systems in organizational view.
In Management Information System(MIS) data can be gotten from the database, as well as the compilation of reports, this report could be inventory-level reports,
financial statements/analysis so that routine decision can be made by the manager. It should be noted that Management Information System(MIS) is the Information System (IS) designed to provide reports to managers for tracking operations, monitoring and control.
Write a program that uses two input statements to get two words as input. Then, print the words on one line separated by a space. Your program's output should only include the two words and a space between them.
Hint: To print both words on one line, remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a space between the words as well.
Sample Run
Enter a word: Good
Enter a word: morning
Good morning
word1 = input("Enter a word: ")
word2 = input("Enter a word: ")
print(word1 + " " + word2)
I hope this helps!
fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
Answer:
that's a good fact about yourself the more love that better
What are the different types of store-based and nonstore-based retail locations? Provide a real example (store name) for each different type.
Explanation:
For Store-based retail locations; they've been grouped on the basis of:
ownership, andthe type of merchandise offeredI. On the basis of ownership, we have:
Independent retailer locationchain retail locationfranchise locationII. On the basis of merchandise offered, we have:
departmental store locationconvenience store locations supermarket locationsFor Non-Store retail locations, ie. retailing that does not a physical store. These include;
direct sellingmail orderonline retailing outlets3. Answer the following questions.
a. How does computer number system play
calculations?
a vital role in a
computer
Answer:
Computers use the binary number system to store data and perform calculations.
Explanation:
Write a function called prod_all that takes any number of arguments and returns their sum. Test the function by using these two tuples (separately) as arguments: (1, 2, 3, 4) & (4,6,8): prod_all(1, 2, 3, 4) # The answer should be 24 prod_all(4, 6, 8) # The answer should be 192 [10]: def prod_all(*args): tupl = (args) total *= n # total = total *n
Answer:
from functools import reduce
def prod_all(*args):
prod = reduce(lambda x,y: x *y, args)
return prod
result = prod_all(4,6,8)
print(result)
Explanation:
The use of the "*args" passes a tuple of variable length to a python defined function. The function above takes any number of arguments and returns the product using the python reduce module and the lambda function.
(plsssssssssssssssssssssssssssssssssssssss helpp meee)
think about system you know,list the parts of the system,describe some ways that the parts are connected to the whole
Answer:
A computer is a complex machine. While most of it works on a microscopic level, it certainly has recognizable macroscopic components that contribute to its uses. A computer can be used to do just about anything from simple calculations to preparing reports to sending rockets into space to simulating the spread of cancer in body organs. Some of the parts are, the motherboard, the power supply, the central processing unit, the optical drive ect. The motherboard plays roles like storing some simple information when the computer is off, such as the system time. The power supply, as you might have already guessed is the powerhouse of the computer. The CPU mainly does arithmetic and logical tasks. It will make a bunch of calculations to ensure the functions of the computer are carried out efficiently. An optical drive is used to read CDs and DVDs, which can be used to listen to music or watch movies. They can also be used to install software, play games, or write new information into a disk.
Explanation: O///O sorry if this is bad....
2.4 Code Practice: Question 2
Write a program that accepts a number as input, and prints just the decimal portion. Your program should also work if a negative number is inputted by the user.
Sample Run
Enter a number: 15.789
Sample Output
0.789
Hints:
You'll likely need to use both the int() and float() commands in your program.
Make sure that any number the user inputs is first stored as a float.
You'll need to use at least two variables in your program: one that stores the original value entered by the user, and one that represents the integer value entered by the user.
These two variables can be subtracted from one another, to leave just the decimal portion remaining.
Don't forget to have your program print the decimal portion at the end!
num = float(input("Enter a number: "))
num1 = int(num)
print(num - num1)
I hope this helps!
Following are the C++ program to calculate the decimal part:
Program Explanation:
Defining the header file. Defining the main method. Inside the method, a float variable "num" is declared that inputs the value. In the next step, an integer variable "x" is declared that converts float value into an integer that holds the whole part number.In the next step, "num" is declared that removes the whole number part from the decimal value, and prints its value.Program:
#include <iostream>//header file
using namespace std;
int main()//main method
{
float num;//defining a string variable
cout<<"Enter password: ";//print message
cin>>num;//input float value
int x=int(num);//defining integer variable that converts float value into integer that hold whole part number
num=num-x;//remove whole number part from the decimal value
cout<<num;//print decimal number
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/17554487
For a typical program, the input is taken using _________ Command-line scanf Files All of the mentioned
Answer:
D)All of above
Explanation:
This is the complete question
For a typical program, the input is taken using _________.
A)Files
B)Command-line
C)scanf
D)All of above
E)None of these
computer program could be regarded as a collection of instructions which can be executed using computer to carry out a specific task, and it is written by programmer ,Input in domain of computer could be explained as feeding some data into a program. This input could be in the form of a file as well as command line, with the help of programming set of built-in functions that will help in reading the given input as well as feeding it to the program base on requirement. The scanf do reads the input from the standard input stream( stdin and scans) which is been input based on provided format. It should be noted that For a typical program, the input is taken using Files, Command-line and scanf.
how does computer number system play a Vital role in a computer calculation.
Answer:
When we type some letters or words, the computer translates them in numbers as computers can understand only numbers. A computer can understand the positional number system where there are only a few symbols called digits and these symbols represent different values depending on the position they occupy in the number
Explanation: SAME AS
which devices are used in networking
Answer:
Hub.
Switch.
Router.
Bridge.
Gateway.
Modem.
Repeater.
Access Point.
Explanation:
Some of the latest smartphones claim that a user can work with two apps simultaneously. This would be an example of a unit that uses a __________ OS.
Answer:
MULTITASKING OS
Explanation:
MULTITASKING OPERATING SYSTEM is an operating system that enables and allow user of either a smartphone or computer to make use of more that one applications program at a time.
Example with MULTITASKING OPERATING SYSTEM smartphones user can easily browse the internet with two applications program like chrome and Firefox at a time or simultaneously
Therefore a user working with two apps simultaneously is an example of a unit that uses a MULTITASKING OS.
who wants 100 points? comment buh. i don't rlly care buh.
Answer:
I do
Explanation:
Answer:
hey bae I do heheheheeheh
20 POINTS Which of the following statements is true of subroutines? Check all that apply.
They can be used in multiple places.
They can be used in one place only.
They save a programmer time since they are reusable.
They can be used only once.
They can contribute to excessive use of a computer’s resources.
Answer:
1,3,5?
Explanation:
Ms office suite comes with its own set of pictures in the
Answer:
clipart ...........................
Explanation:
clipart is the correct answer for the above question.
laptop components that can be replaced relatively easily include the ____ and the ____
first part
screen
power supply
RAM
second part
hard disk
keyboard
touchpad
Answer:
Power supply and Hard disk
Explanation: