Answer:
System Access Review (previously known as Identity Management) is the organizational process for ensuring that individuals have the appropriate access to technology resources.
Ill give alot of points if you answer: How do I get a 100 dollar ps4
Your assignment is to write an assembly language program which read a string and print it in uppercase. This program asks the user to enter a string which is subsequently displayed in uppercase. It is important to first ensure that string to be converted is in the a-z range. The program does not recognize any space, symbols or any kind of punctuation marks. Any time the user enters any of this character the program is going to repeatedly ask for the valid string.
An example execution of your program could be:
Please enter your string: 1winter
Invalid Entry!
Please enter your string: summer
Your capitalized string:SUMMER
Answer:
try this
Explanation:
MSG1 DB 10,13,'enter any string:-$'
MSG2 DB 10,13,'converted string is:-$'
P1 LABEL BYTE
M1 DB 0FFH
L1 DB?
P11 DB 0FFH DUP<'$'>
DATA ENDS
DISPLAY MARCO MSG
MOV AH,9
LEA DX,MSG
INT 21H
ENDM
CODE SEGMENT
ASSUME CS: CODE,DS:DATA
START:
MOV AX,DATA
MOV DS,AX
DISPLAY MSG1
LEA DX,P1
MOV AH,0AH
INT 21H
DISPLAY MSG2
LEA SI,P1
MOV CL,L1
MOV CH,0
CHECK:
CMP[SI],61H
JB DONE
CMP[SI],5BH
UPR: SUB[SI],20H
DONE: INC SI
LOOP CHECK
DISPLAY P11
MOV AH,4CH
INT 21H
CODE ENDS
END START
Select the correct answer from each drop-down menu.
As a technical writer, you should state your purpose in the 1. ________ of your summary. In addition, you must _
2.______ the words used in the original document while writing a summary.
1. Last sentence
1. First sentence
2. Paraphrase
2. Copy
2. Quote
Answer:
1. First sentence
2. Paraphrase
Explanation:
Just took it
What kinds of components are tangible assets?
Answer:
Tangible assets are physical like cash, inventory, vehicles, equipment, buildings and investments.
Explanation:
Write a Java program named Problem 3 that prompts the user to enter two integers, a start value and end value ( you may assume that the start value is less than the end value). As output, the program is to display the odd values from the start value to the end value. For example, if the user enters 2 and 14, the output would be 3, 5, 7, 9, 11, 13 and if the user enters 14 and 3, the output would be 3, 5, 7, 9, 11, 13.
Answer:
hope this helps
Explanation:
import java.util.Scanner;
public class Problem3 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.print("Enter start value: ");
int start = in.nextInt();
System.out.print("Enter end value: ");
int end = in.nextInt();
if (start > end) {
int temp = start;
start = end;
end = temp;
}
for (int i = start; i <= end; i++) {
if (i % 2 == 1) {
System.out.print(i);
if (i == end || i + 1 == end) {
System.out.println();
} else {
System.out.print(", ");
}
}
}
}
}
why do we install doorbells in our house
Explanation:
It's placed near the door. When a visitor presses the button, the bell rings inside alerting you that someone is at the door.
difference between academic library and school Library
A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web services for client workstations on the 10.10.10.0/24 network. The same client workstations are configured to contact a server at 192.168.1.15/24 for domain name resolution.
Required:
What rules should the technician add to the firewall to allow this connectivity for the client workstations
Answer:
Explanation:
Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following
Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443
Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53
This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.
what is the Is option that prints to the author of a file?
Answer:
We need to use Option - 'author' along with option- 'l'The biggest limitation of a network operating system (NOS) is _____ in terms of memory, process, device, and file management.
Answer:
Lack of global control.
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
There are different types of operating systems (OS) used for specific purposes and these are;
1. Batch Operating System.
2. Multitasking/Time Sharing OS.
3. Multiprocessing OS.
4. Single User OS.
5. Mobile OS.
6. Real Time OS .
7. Distributed OS.
8. Network OS.
A network operating system (NOS) can be defined as specialized computer operating system that are designed primarily for use on network devices such as routers, switches, workstations, which are mainly connected to a local area network.
Generally, the biggest limitation of a network operating system (NOS) is lack of global in terms of memory, process, device, and file management.
Yo I need to know where to find a ps4 for free or a very cheap price please
(01)²
what is 2 in this number
Answer and Explanation:
It's an exponent (2 is squared I believe)
When you have an exponent, multiply the big number by the exponent
Ex: [tex]10^2[/tex]= 10x2=20
Ex: [tex]10^3\\[/tex]= 10x3=30
Consolidated Supplies is a medium-sized distributor of restaurant supplies that operates in Canada and several northern U.S. states. They have 12 large warehouses spread across both countries to service their many customers. Products arrive from the manufacturers and are stored in the warehouses until they are picked and put on a truck for delivery to their customers. The networking equipment in their warehouses is old and is starting to give them problems; these problems are expected to increase as the equipment gets older. The vice president of operations, Pat McDonald, would like to replace the existing LANs and add some new wireless LAN technology into all the warehouses, but he is concerned that now may not be the right time to replace the equipment. He has read several technology forecasts that suggest there will be dramatic improvements in networking speeds over the next few years, especially in wireless technologies. He has asked you for advice about upgrading the equipment.
Should Consolidated Supplies replace all the networking equipment in all the warehouses now, should it wait until newer networking technologies are available, or should it upgrade some of the warehouses this year, some next year, and some the year after, so that some warehouses will benefit from the expected future improvements in networking technologies?
Answer:
Consolidated Supplies
Consolidated Supplies should upgrade some of the warehouses this year, some next year, and others the year after, so that some warehouses will benefit from the expected future improvements in networking technologies.
Explanation:
Gradual technology upgrade should be the way forward for Consolidated Supplies. Waiting until newer networking technologies are available is not an option. Total replacement of all the networking equipment in all the warehouses is not an option, as technology equipment becomes obsolete in no time. Overall, Consolidated Supplies should never forget the numerous benefits from technology upgrade, including reduction of downtime, increased productivity, and improved customer services and satisfaction.
List to String (0.5 points) Since we are often dealing with a list of strings, it would be useful to have a function to tum a list of strings back into one single concatenated string, This function will return a string that is each element of input_list concatenated together with each separated by the string Separator For example, the following function call: list_to_string('This', 'is's 'fun' should return; "This is fun To do this, write a function called list_to_string This function should have the following inputs, outputs, and internal procedures: Input(s) input_list - list of strings . separator - string Output(s); . output - string Procedure(s): - assign a variable called output to be the first (index 0) element from input_list - loop through the rest of input_list, looping from the 2nd element index 1) through to the end of the list - Within the loop, use string concatenator to combine output with the current element, separated by separator • Assign the output of this to be the new value of output • return output, which should now be a list of the elements of input_list joined together into a single string
Answer:
The function is as follows:
def list_to_string(input_list,separator):
output = ""
for inp in input_list:
output+=inp+separator
output = output[:-1]
return output
Explanation:
Given
See attachment for instruction
Required
A function to convert list to string
This defines the string
def list_to_string(input_list,separator):
This initializes the output to an empty string
output = ""
This iterates through the input list
for inp in input_list:
This concatenates every string in the list including the separator
output+=inp+separator
This removes the last character of the string
output = output[:-1]
This returns the output string
return output
Determining Uses for Outer Joins
Which situation would most benefit from an outer join?
a query that shows only customers who placed orders
a query that shows all duplicate customers from both tables
O a query that shows only the orders that have customers attached
a query that shows all customers, whether or not they placed an order
ve
Answer:
a query that shows all customers, whether or not they placed an order
Explanation:
EDG 21
Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. The output of the program is every word in the list that contains the character at least once. Assume at least one word in the list will contain the given character.Ex: If the input is:4 hello zoo sleep drizzle zthen the output is:zoodrizzle
Answer:
try this.
Explanation:
#include <iostream>
#include <vector>
using namespace std;
int main() {
int n;
cin>>n;
vector<string> v;
string s;
for(int i = 0;i<n;i++){
cin>>s;
v.push_back(s);
}
char ch;
cin>>ch;
for(int i = 0;i<v.size();i++){
for(int j = 0;j<v[i].length();j++){
if(v[i][j]==ch){
cout<<v[i]<<endl;
break;
}
}
}
return 0;
}
Write a recursive method named hanoi that prints a solution to the classic Towers of Hanoi puzzle. Your method should accept three integer parameters representing the number of disks, the starting page number, and ending peg number. Your method should print the solution to the game to move from the given start peg to the given end peg. For example, the call of hanoi(3, 1, 3); should print the following output to move the three pegs from peg
Answer:
Explanation:
The following recursive method is written in Java. It creates a simulation of the towers of Hanoi and outputs every step-by-step instruction on how to solve it. The output for the code can be seen in the attached picture below.
class Brainly {
public static String hanoi(int numOfDisks, int startPeg, int endPeg) {
int helpPeg;
String sol1, sol2, MyStep, mysol; // Contains moves
if (numOfDisks == 1) {
return "Move from " + startPeg + " to " + endPeg + "\n";
} else {
helpPeg = 6 - startPeg - endPeg; // Because startPeg + helpPeg + endPeg = 6
sol1 = hanoi(numOfDisks - 1, startPeg, helpPeg);
MyStep = "Move from " + startPeg + " to " + endPeg + "\n";
sol2 = hanoi(numOfDisks - 1, helpPeg, endPeg);
mysol = sol1 + MyStep + sol2; // + = String concatenation !
return mysol;
}
}
public static void main(String[] args) {
String output = hanoi(3, 1, 3);
System.out.println(output);
}
}
The technology dealing with robots is called
Robotics is a field of engineering that deal with design and application of robots and the use of computer for their manipulation and processing. ... Robotics requires the application of computer integrated manufacturing, mechanical engineering, electrical engineering, biological mechanics, software engineering.
The given SQL creates a Movie table and inserts some movies. The SELECT statement selects all movies released before January 1, 2000 Modify the SELECT statement to select the title and release date of PG-13 movies that are released after February 1, 2008. Run your solution and verify the result table shows just the titles and release dates for The Dark Knight and Crazy Rich Asians. 3 6 1 CREATE TABLE Movie ( 2 ID INT AUTO_INCREMENT, Title VARCHAR(100), 4 Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')), 5 ReleaseDate DATE, PRIMARY KEY (ID) 7); 8 9 INSERT INTO Movie (Title, Rating, ReleaseDate) VALUES 19 ('Casablanca', 'PG', '1943-01-23'), 11 ("Bridget Jones's Diary', 'PG-13', '2001-04-13'), 12 ('The Dark Knight', 'PG-13', '2008-07-18'), 13 ("Hidden Figures', 'PG', '2017-01-06'), 14 ('Toy Story', 'G', '1995-11-22'), 15 ("Rocky', 'PG', '1976-11-21'), 16 ('Crazy Rich Asians', 'PG-13', '2018-08-15'); 17 18 -- Modify the SELECT statement: 19 SELECT * 20 FROM Movie 21 WHERE ReleaseDate < '2000-01-01'; 22
Answer:
The modified SQL code is as follows:
SELECT Title, ReleaseDate FROM movie WHERE Rating = "PG-13" and ReleaseDate > '2008-02-01'
Explanation:
The syntax of an SQL select statement is:
SELECT c1, c2, c...n FROM table WHERE condition-1, AND/OR condition-n
In this query, we are to select only the title and the release date.
So, we have:
SELECT Title, ReleaseDate
The table name is Movie.
So, we have:
SELECT Title, ReleaseDate FROM movie
And the condition for selection is that:
Ratings must be PG-13
And the date must be later than February 1, 2008
This implies that:
Rating = "PG-13"
ReleaseDate > '2008-02-01'
So, the complete query is:
SELECT Title, ReleaseDate FROM movie WHERE Rating = "PG-13" and ReleaseDate > '2008-02-01'
Describing the One-to-Many Relationship
What is another name for the one-to-many relationship?
child-to-parent
O parent-to-child
O student-to-teacher
O teacher-to-student
Ve
Answer: B) Parent-to-child
Answer:
What is another name for the one-to-many relationship?
child-to-parent
Correct Answer: parent-to-child( B)
student-to-teacher
teacher-to-student
Explanation:
Write a new method in the Rectangle class to test if a Point falls within the rectangle. For this exercise, assume that a rectangle at (0,0) with width 10 and height 5 has open upper bounds on the width and height, i.e. it stretches in the x direction from [0 to 10), where 0 is included but 10 is excluded, and from [0 to 5) in the y direction. So it does not contain the point (10, 2). These tests should pass:
Answer:
Explanation:
The Rectangle and Point class is not provided in this question but was found online. Using that code as guidance I created the following method named contains. This method takes in a Point object and checks to see if the x-axis point is inside the parameters of the Rectangle class and then checks the same for the y-axis. If it is inside the Rectangle then the method returns true otherwise it returns false.
def contains(self, point):
return self.width > point.x >= self.corner.x and self.height > point.y >= self.corner.y
You have a larger file but do not need it right away. In this scenario, you have to change the way a file is used to make it what?
O open
o closed
compressed
O usable
Answer:
Compressed
Explanation:
I hope this helps!
Answer:
usable
Explanation:
open doesnt make any sense, neither does closed and compressed is wrong i chose it and got it wrong. Its usable
Complete the divisible_by(list1, int1) function below. As input, it takes a list of integers list1 and an integer int1. It should return a list with all the integers in list1 where the integer is divisible by int1. For example, divisible_by([2, 9, 4, 19, 20, -3, -15], 3) should return the list [9, -3, -15].
1 def divisible_by(listi, n):
2 # code goes here
3 pass
4
5 if _name == "__main__":
6 # use this to test your function
7 test_list = [2, 9, 4, 19, 20, -3, -15]
8 print(divisible_by(test_list, 3))
Answer:
The function is as follows:
def divisible_by(listi, n):
mylist = []
for i in listi:
if i%n == 0:
mylist.append(i)
return mylist
pass
Explanation:
This defines the function
def divisible_by(listi, n):
This creates an empty list
mylist = []
This iterates through the list
for i in listi:
This checks if the elements of the list is divisible by n
if i%n == 0:
If yes, the number is appended to the list
mylist.append(i)
This returns the list
return mylist
pass
what is a web client
Answer:
A Web client typically refers to the Web browser in the user's machine or mobile device. It may also refer to extensions and helper applications that enhance the browser to support special services from the site.
hope this helps
have a good day :)
Explanation:
The Internet is written in a "language" called
O Usenet
O package switching
O HTTP
O ARPANET
Answer:
HTTP
Explanation:
I hope it helps u.
Mark Me as brainlist answer
URGENTTTTTTTTTTTT
You want to find a random decimal between 0 and 1, with 0 included. Choose the correct lines of code, in the order they should appear in IDLE. Sample Output: 0.3570702149467504
>>>_________
>>>_________
from math import *
randint(0,1)
from random import *
random( )
Answer:
from random import *
print(random())
Explanation:
You can try this in any online python ide quicker than putting the question here!
PLEASE HELP ME ASAP!!!!
First party insurance: Loss due to laptop theft, loss due to interruption in business activities due to website failure
Third party insurance: cost of lawsuits filed against the policyholder, fees of a special programmer investigating a cyber fraud, expenses of providing notifications of the cyber attack to clients and employees
I WILL GIVE MOST BRAINLY
Which factor most contributed to the rise of globalization beginning in the 20th century?
A.Consumers preferring to buy local goods
B.Governments breaking up corporate monopolies
C.Economist promoting barriers to trade
D.Internet access becoming widespread
Plz help I need this ASAP
The factor that contributed to the rise of globalization beginning in the 20th century is economist promoting barriers to trade. Thus, option C is correct.
What is globalization?Globalization has made communication between the countries easier to share information openly. This has also helped to increase the speed of transportation of products. Globalization brings nations together, breaking down cultural barriers and turning the world into a global village.
Technology not only changes the way we produce and connect, but also enables more humans to create and test new objects and ideas, reducing the costs and risks of innovation. Product development, even in developing countries.
Globalization has positive effects such as increase in national income, access to global capital, emergence of new business opportunities, increase in loans and investments, transfer of technology, development of energy and communication infrastructures. Improvement of labor quality and working conditions
Thus, option C is correct.
Learn more about Globalization on:
https://brainly.com/question/15283031
#SPJ7
Design an algorithm to find the weighted average of four test scores. The four test scores and their respective weights are given in the following format: testscore1 weight1 ... For example, the sample data is as follows: 75 0.20 95 0.35 85 0.15 65 0.30 The user is supposed to enter the data and press a Calculate button. The program must display the weighted average.
Answer:
data = [75, 0.2, 95, 0.35, 85, 0.15]
print (f'Average weight: {sum(data) / len(data)}')
Explanation:
This is python algorithm for finding average weight. To get average weight, you sum up all data involved and divide that amount by the number of data provided.
PLEASE HELP ME ASAP