Answers

Answer 1

Answer:

-87

Explanation:

(10101 base 2) = 21

21 - 110 +2 = -87


Related Questions

To read encrypted data, the recipient must decipher it into a readable form. What is the term for this process?.

Answers

Answer:

Decryption.

Explanation:

Cheryl is responsible for cybersecurity at a mid-sized insurance company. She has decided to use a different vendor for a network antimalware than she uses for host antimalware. Is this a recommended action, why or why not

Answers

yes, this a recommended action and this is known to be best described as vendor diversity.

What is Vendor diversity?

This is known to be one that gives two security benefits in regards to the fact that it does  not have a single point of failure if one vendor cease operations and also each vendor has their own methodology and algorithms used for known or seeing malware.

Hence in the above case, yes, this a recommended action and this is known to be best described as vendor diversity.

learn more about cybersecurity from

https://brainly.com/question/12010892

#SPJ1

Organizations must ensure that proper consent is obtained from data subjects or establish some other lawful basis for processing before processing their personal data. what's another requirement that must be met before processing data?

Answers

Answer:Consent.

Explanation:

GDPR requires any organization processing personal data to have a valid legal basis for that processing activity. The law provides six legal bases for processing: consent, performance of a contract, a legitimate interest, a vital interest, a legal requirement, and a public interest. If the data subject, a.k.a. natural person, consents to processing without knowing the (several) purpose(s) in full and in an easy to understand way, then consent is not a legal ground for processing as it's by definition not freely given, specific, informed and unambiguous. Moreover, consent cannot be bundled. Consent needs to be an unambiguous indication. Consent is an act: it needs to be given by a statement or by a clear act. Consent needs to be distinguishable from other matters. The request for consent needs to be in clear and plain language, intelligible and easily accessible.

What is an example of work performed by an integration platform as a service (ipaas)?

Answers

Answer:

An example of work performed by an Integration Platform as a Service (IPaaS) is setting up and configuring cloud-based servers.

- IPaaS is the solution for hosting, developing, and integrating cloud data.

- With help of IPaaS, users can develop integration flows that connect applications that reside in the cloud.

- The best IPaaS solutions consist of easy graphic tools that help visualize. - It is also referred as cloud integration platform

- IPaaS has the ability to provide everything from data warehousing and infrastructure to DevOps environments and application design.

- IPaaS solutions blend services and tools into service-oriented architecture (SOA)

- This gives organizations the ability to share information and resources across applications.

Explanation:

iPaaS, or Integration-Platform-as-a-Service, is a self-service cloud-based solution that standardizes how applications are integrated. Developers, consultants and even non-technical users can use iPaaS out-of-the-box to quickly build the integration flows for sharing data within an organization or with multiple companies.

When adopting and implementing a software as a service (saas) platform such as salesforce for your business, which responsibility falls on you, as the client company? managing the platform feature roadmap installing software updates and bug-fixes hosting data storage and backups complying with governance obligations i don't know this yet.

Answers

When adopting and implementing a software as a service (saas) platform such as salesforce for your business, the responsibility falls on you in Hosting data storage and backups.

What is  data storage?

Storage is known to be the  method used in keeping one's data in a secure location that one can be able to access readily.

Hence, When adopting and implementing a software as a service (saas) platform such as salesforce for your business, the responsibility falls on you in Hosting data storage and backups.

Learn more about saas from

https://brainly.com/question/24852211

#SPJ1

Upon stopping alcohol service to an obviously intoxicated person, the server should:.

Answers

Upon stopping alcohol service to an obviously intoxicated person, the server should:

Never embarrass the customer, mostly in front of other people.Call a cab for them or call someone to pick them up using their phones under permission.

How to deal with an intoxicated customer?

The steps to Handle Intoxicated customer are:

Be calm.Never argue with the intoxicated customer.Never embarrass the customer, mostly in front of other people.Call a cab for them or call someone to pick them up using their phones under permission.

So it is better that Upon stopping alcohol service to an obviously intoxicated person, the server should:

Never embarrass the customer, mostly in front of other people.Call a cab for them or call someone to pick them up using their phones under permission.

Learn more about intoxicated person from

https://brainly.com/question/27218972

#SPJ1

PLEASE HELP


Write a pseudo code for an algorithm to wrap a gift.

Answers

in computertional geometry the gift wrapping algorithm is an algorithm for computing the context hull of a given set of points

When using encryption from your home computer, how would you configure the router?.

Answers

If one is  using encryption from your home computer, one can configure the router by the use the wireless router to set the encryption key and type of encryption.

What wireless encryption one can use?

The good current standard for encryption for WiFi networks is known to be WPA2 as it is very efficient.

Note that If one is  using encryption from your home computer, one can configure the router by the use the wireless router to set the encryption key and type of encryption.

Learn more about router from

https://brainly.com/question/24812743

#SPJ1

Interactivity and Blank______ are two important capabilities of the Internet in the Blank______ relationship.

Answers

Interactivity and individuality are two important capabilities of the Internet in the buyer-seller relationship.

What is  individuality?

The Definition of the term individuality connote the full character that is specific to and set apart a person from another.

Note that Interactivity and individuality are two important capabilities of the Internet in the buyer-seller relationship.

Learn more about individuality from

https://brainly.com/question/18405002

#SPJ1

For the execution of a successful information strategy, staff synchronization _____. (Select all that apply.) relies on informed commander's guidance begins at the execution phase of operations requires cross-talk and cross-representation breaks down staff planning into clearly defined major subsets integrates products does not impact actions, words, and images

Answers

For the execution of a successful information strategy, staff synchronization relies on informed commander's guidance.

What is the above about?

A successful information strategy, staff synchronization is one that  depends on informed commander's guidance.

And as such, if one say that For the execution of a successful information strategy, staff synchronization relies on informed commander's guidance. it is a true statement.

Learn more about information strategy from

https://brainly.com/question/8368767

#SPJ1

______ feedback is a technology that sends resistance to the gaming device in response to actions of the user.

Answers

Force feedback is the name of the technology used that sends resistance to the gaming device in response to the actions of the user.

Gaming device

Gaming devices are a piece of hardware used by game players. For example, devices such as gamepads and joysticks all fall under the category of gaming devices. These gaming devices make use of a force feedback technology which sends resistance when users perform certain actions.

You can learn more about force feedback technology from a related question here https://brainly.com/question/1786465


#SPJ1

Select the correct answer.
What does firewall software do?
A.
It improves network connectivity.
B.
It monitors network traffic to block malicious content.
C.
It adds some new features to the operating system.
D.
It installs viruses in the system.

Answers

Answer:

A. It improves network connectivity.

Answer:

B. It monitors network traffic to block malicious content.

Any two differences between third and fourth generation of computer

Answers

Answer:

Third generation computer use integrated circuit(IC) and it was fast and reliable.

Forth generation computer micro computer were introduced and they were highly reliable and fast.

Third generation computers were developed in 1965 AD.They used (IC)integrated ciruit.
Forth generation computer were developed in 1971 AD.They used micropocessor.

prototypes remain largely unchanged throughout the design process. true or false?

Answers

Prototypes remain largely unchanged throughout the design process is said to be a false statement.

What is a prototype?

Prototyping is known to be a kind of an experimental process that is where design teams are known to often implement ideas into a kind of tangible forms such as from paper to digital.

It is said to be often prone to a lot of changes and as such, Prototypes remain largely unchanged throughout the design process is said to be a false statement.

Learn more about prototypes  from

https://brainly.com/question/7509258

#SPJ1

Taylor uses the numeric keypad to enter statistical data into a spreadsheet. which finger should she use to type the number 7 in the number 7609?

Answers

Answer:

index finger

Explanation:

The image attached is a nice visual explanation numbering fingers.

Answer:

index finger

Explanation:

Write a class with methods to help you balance your checking account (an object class-main method is not in this class). The CheckingAccount Class should have at least two instance variables: the balance and the total service charges, along with methods to get and set each instance variable. You may add other variables and methods if you like. The program should read the initial balance for the month, followed by a series of transactions. For each transaction entered, the program should display the transaction data, the current balance for the account, and the total service charges. Service charges are $0.10 for a deposit and $0.15 for a check. If a check forces the balance to drop below $500.00 at any point during the month, a service charge of $5.00 is assessed but only for the first time this happens. Anytime the balance drops below $50.00, the program should print a warning message. If a check results in a negative balance, an additional service charge of $10.00 should be assessed. A transaction takes the form of an int number (the transaction code), followed by a double number (the transaction amount). If the int number is a 1, then the double number is the amount of a check. If the int number is 2, then the double number is the amount of a deposit. The last transaction is 0 with no number to follow it. Use the JOptionPane to produce the dialog. A sample Input/Output dialogue is provided via the Sample Run Link below. Use proper style and indentation, efficient programming techniques and meaningful variable and method names according to Java conventions.Code Template The following code template will help with this assignment:----------------- Main.java ------------------------public class Main { // global variables // define a CheckingAccount object to keep trach of the // account information public static void main (String[] args) { // defines local variables CS 3 – Spring 2017 E. Ambrosio 2 // get initial balance from the user // perform in a loop until the transaction code = 0 // get the transaction code from the user // and process it with appropriate helper method // When loop ends show final balance to user. } public static __________ getTransCode() { } public static _________ getTransAmt() { } public static __________ processCheck(___________) { } public static __________ processDeposit(___________) { } } --------------------CheckingAccount.java ------------------------- public class CheckingAccount { private double balance; private double totalServiceCharge; public CheckingAccount(double initialBalance) { balance = ______________________; totalServiceCharge = ______________; } public ____________ getBalance() { return _______________; } CS 3 – Spring 2017 E. Ambrosio 3 public void setBalance(double transAmt, int tCode) { if(tCode == 1) balance = ___________________; else //if(tCode == 2) balance = ______________________; } public ____________ getServiceCharge() { return totalServiceCharge; } public void setServiceCharge(double currentServiceCharge) { totalServiceCharge = ___________________________; } }

Answers

Using JAVA knowledge to write code about creating a bank account and using the data to make a transition.

Writing the code in JAVA, we have:

CheckingAccount.java

package bankAccount;

public class Transaction {

int transNumber;

int transId;

double transAmt;

public Transaction(int transNumber, int id, double amount) {

this.transNumber = transNumber;

this.transId = id;

this.transAmt = amount;

}

public int getTransNumber() {

return transNumber;

}

public void setTransNumber(int transNumber) {

this.transNumber = transNumber;

}

public int getTransId() {

return transId;

}

public void setTransId(int transId) {

this.transId = transId;

}

public double getTransAmt() {

return transAmt;

}

public void setTransAmt(double transAmt) {

this.transAmt = transAmt;

}

public String toString() {

return "Transaction Number: " + transNumber + ", Transaction ID: " + transId + " Transaction Amount: " + transAmt;

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Having two, or even three, people explain the material to you
a. Will help you understand it
C.
b. Will give you too many perspectives
O
OB
Please select the best answer from the choices provided
D
d.
Mark this and return
Will just confuse you. Its better to only ask
one person to help
Will decrease your understanding of the
material

Answers

B. Will give you too many perspectives

Is the following statement valid or invalid? Give reason if it is invalid. int 2a = 6:​

Answers

Answer:when the principle die the irrevocable power of attorney is valid or invalid

Explanation:

Most computers today support the ____ standard, which means the computer automatically configures new devices as soon as they are installed and the computer is powered up.

Answers

A lot of computers today support the plug and play standard, which means the computer automatically configures new devices as soon as they are installed.

What is the Plug and Play (PnP)?

This is the aspect of Windows that helps the  computer system to be able to stand  or adapt to hardware changes with some little intervention by the user.

Hence, A lot of computers today support the plug and play standard, which means the computer automatically configures new devices as soon as they are installed.

Learn more about configuration from

https://brainly.com/question/26084288

#SPJ1

Linux drivers may be delivered in an archive format called Stuffit. Group of answer choices True False

Answers

Answer:

False

Explanation:

compare the two methods of creating table in ms access ( Datasheet view and Design view) which one wouldyou prefer to use to record the advantages and dis advantages of using the internet?

Answers

The main difference between the datasheet view and the design view is in the datasheet view, we can only view and do minor changes but in the design view, we can edit the table and modify it.

What is MS Access?

MS Access is a service of Microsoft, that is used in the sector of business and other companies, to store and manage data.

Datasheet view and design view are the two types of tables in ms access, the design view has more functions, you can change and edit the table.

Thus, the primary distinction between the datasheet view and the design view is that while we can examine and make some minor adjustments in the datasheet view, we can edit and amend the table in the design view.

Learn more about MS Access, here:

https://brainly.com/question/17135884

#SPJ1

Last week I was able to go to see the new Dr. Strange movie. I thought it was pretty awesome. When I was looking at buying tickets I wanted to make sure I got as many discounts as I could get. By default a movie ticket is $15. If you go before 5pm, the ticket price is $12.50. If you plan on buying in bulk (5 or more tickets) you will receive a 10% discount. If you are a student, you get a 15% discount.
Write a program that asks the user if they are going to the movie before 5PM (1 for yes, 0 for no), how many tickets they are going to buy (an integer greater than 1), and if they are a student (1 for yes, 0 for no). Print out the total cost for the amount of tickets you would like to buy.
Sample Case 1:
Are you going to the movie before 5PM? (1 - Yes, 0 - No)
0
How many people are going?
2
Are you a student? (1 - Yes, 0 - No)
0
The group’s price is $30.00.

Answers

The program is an illustration of conditional statements.

Conditional statements can have single condition or multiple conditions

The complete program

The program written in Python is as follows:

price = 15

timeCheck = int(input("Are you going to the movie before 5PM? (1 - Yes, 0 - No)"))

if timeCheck == 1:

   price = 12.5

numPeople = int(input("How many people are going?"))

if numPeople>= 5:

   price = price * 0.90 * numPeople

else:

   price = price * numPeople

student = int(input("Are you a student? (1 - Yes, 0 - No)"))

if student == 1:

   price = price * 0.85

print("The group's price is",price)

Read more about Python programs at:

https://brainly.com/question/13246781

#SPJ1

Describe the concept behind a digital signature and explain how it relates to cybersecurity by providing a hypothetical example of a situation in which a digital signature could enhance cybersecurity.

Answers

Answer:  A digital signature creates a stamp on a document, that has time, location and is used to assure that the right person was the one that signed

Explanation:   This can be used in a transaction where two two parties who are signing but in two locations

Which of the following policies states that users agree to follow it in order to be given access to corporate email, information systems, and the I Internet? Acceptable Use Policy. Social Media Policy. Information Privacy Policy. Email Privacy Policy.

Answers

Answer:

Acceptable Use Policy

Explanation:

Hope that helps

If I replace this screen with these black spots go away?

Answers

Yes I'm sure they would, these black spots are being caused due to a broken screen!

Hope this helps!!

Yes it will go away if you replace the screen with a new one

Device drivers perform the actual communication between physical devices and the operating system. Group of answer choices True False

Answers

Answer:

true

Explanation:

Atomic integers in Linux are useful when A) several variables are involved in a race condition. B) a single process access several variable involved in a race condition. C) an integer variable needs to be updated. D) All of the above.

Answers

Atomic integers in Linux are useful when  an integer variable needs to be updated.

What is an Atomic Integer?

This is known to be an applications that is said to be a form of an atomically incremented counters, and it is one which cannot be used as a kind of replacement for any Integer.

Therefore, Atomic integers in Linux are useful when  an integer variable needs to be updated.

Learn more about Atomic integers from

https://brainly.com/question/20515314

#SPJ1

In 2018, the rules changed and Olympic organizers allowed the use of _____ music in performances for the first time

Answers

In 2018, the rules changed and Olympic organizers allowed the use of vocal music in performances for the first time.

What is an Olympic Charter?

An Olympic Charter can be defined as the fundamental rules, regulations and principles which governs the Olympic Games, and they must be adopted by the International Olympic Committee (IOC) as guidelines for hosting and organizing the Olympic Games.

In Pyeongchang 2018, the rules changed and Olympic organizers allowed the use of vocal music in performances for the first time for figure skaters.

Read more on Olympics here: https://brainly.com/question/18765613

#SPJ1

List the two examples of input devices

Answers

Answer:

Computer - Input Devices

•Keyboard.

•Mouse.

•Joy Stick.

•Light pen.

•Track Ball.

•Scanner.

•Graphic Tablet.

•Microphone.

Explanation:

hope this helps you

A security engineer implemented once-only tokens and timestamping sessions. What type of attacks can this type of security prevent

Answers

The type of attacks that this type of security prevent are:

A replay attack A pass-the-hash-attack

What is a replay attack?

A replay attack is known to be a form of network attack where a said attacker is known to detects a data transmission and he or she is the one that fraudulently delayed it or repeated it.

Based on the above scenario, The type of attacks that this type of security prevent are:

A replay attack A pass-the-hash-attack

Learn more about A replay attack  from

https://brainly.com/question/25807648

#SPJ1

Other Questions
I dont know what to do can yall help me out To simplify our consumption models, suppose U.S. consumers only purchase food and all other goods where food is plotted along the horizontal axis of the indifference map. Also, suppose that all states initially impose state sales taxes on all goods (including food), but then the states exempt food from the state sales tax. How does this tax policy change alter the consumer's budget line People were asked if they prefer Pepsi or Coke. The results are in the table below. Pepsi Coke Female 23 44 Male 28 39 a) If two people are chosen, what is the probability that they both prefer Pepsi? b) If one person is chose, find the probability that they are Female or prefer Coke. Solve the following multiplication problem. 9 cu yd 17 cu in x 135 Probabilities that are based on short-run relative frequencies are called what?. what is the adaptation of the heart in human body? Why are chloroplasts more on one side of a cell than the other Which of the following is a risk factor for developing hypertension? Consuming carbohydrates Being underweight Dehydration Having diabetes Median weekly earnings for women with some college for an associate degree.1980.......$2312013.............$657Using today's dollars, the data in the bar graph can be described by the mathematical modelW = 13n + 231,Where W represents median weekly earnings n years after 1980.Does the formula underestimate or overestimate the median weekly earnings in 2013? By how much? whats the diference between 1/2 e to the x minus 4 and e to the x minus 4 Suppose that 43% of the people who inquire about investments at a certain brokerage firm end up investing in stocks, 38% end up investing in bonds, and 51% end up investing in stocks or bonds (or both). What is the probability that a person who inquires about investments at this firm will invest in both stocks and bonds? Please Answer! It is a emergancy! SUPER EASY A business based in China pay for consultant and the US 572,000 yaun per year assume that the conversion is one yaun to 0.14 dollars what is the consultant salary and dollars per month Do you tend to place more value on qualitative or quantitative research? Why? Does it matter what topic is being studied? Which detail does orwell include to support the theme that a lack of education can make a person easier to oppress?. A newborn is being monitored for retinopathy of prematurity. Which condition predisposes an infant to this condition Not only is getting customers into stores by using newspapers, magazines, and television considered retail Blank______, so is the use of displays and signs placed at the point of purchase or in aisles. An individual contributed $50,000 to her nonqualified annuity, and when she annuitized the policy, the insurance company determined that, based on her life expectancy, she will receive $100,000 in payments. If her initial monthly payment was $1,000, how much of that payment was taxable? What is the slope in the equation y = 2x + 3 Writing Exercises353. Why does (a + b) result in a trinomial, but (a b)(a + b) result in a binomial?