LAB: Varied amount of input data
Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as input, and outputs the average and max.
Ex: If the input is:
15 20 0 5
the output is:
10 20

Answers

Answer 1

Answer:

Answered below

Explanation:

#python program

#First get the number of inputs from user

num_inputs = int(input("Enter number of inputs:")

j = 0

sum =0

max = 0

while j < num_inputs:

    num = int(input ("Enter numbers: ")

    sum = sum + num

    if num > max:

        max = num

  j++

#Compute the average   

average = sum/num_inputs

print (average, max)

   


Related Questions

TRUE OR FALSE Try running the following Oz program composed by several functions (select 'True' after you run them): declare fun (Minus X} ~X end {Browse {Minus 15}} declare fun {Max X Y} if X > Y then X else Y end end declare X = {Max 22 18} Y = {Max X 43} {Browse Y}

Answers

The answer is True.

What is program?

The process of creating, writing, testing, and managing the source code for computer programmes is known as computer programming. A computer programme that solves the issue is the result of a procedure that begins with a problem. Writing the code that tells the machine how to carry out the intended task requires the usage of programming languages. The programming languages C, Java, and Python are a few examples.

Writing methods, which are a collection of instructions that show a computer how and where to solve a problem, is a necessary part of computer programming. Writing code for every phase of the process entails breaking the problem down into smaller pieces. A programming language which the can comprehend is used to write the code. After that, this code is compiled and checked to make sure it functions properly.

To learn more about program

https://brainly.com/question/23275071

#SPJ

____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist. a. RIPv1 b. Classless c. Classful d. Class-oriented

Answers

Classful  routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist.

What is classful routing protocols?

Older networks are the only ones that use the outdated classful routing protocols RIPv1 and IGRP.

                      Both RIPv2 and EIGRP are classless routing protocols that have developed from these earlier ones. Link-state routing protocols are inherently non-classical.

What defines classy and unclassy behavior?

IP addresses are divided into five groups using the classful addressing approach when they are assigned. In order to prevent the depletion of IP addresses, classless addressing is a method of IP address allocation that will eventually replace classful addressing.

                        Problems involving routing between classfull and classless systems are resolved using static routes. You can't, sorry. In accordance with the wider routing context, static routes might be either.

Learn more about Classful  routing protocols

brainly.com/question/28446917

#SPJ4

You recently purchased a copy of Windows 11 from a retail store. This system you want to install Windows on doesn't have an optical drive.
What is the BEST option for installing Windows in this scenario?

Answers

Since You recently purchased a copy of Windows 11 from a retail store. This system you want to install Windows on doesn't have an optical drive. The BEST option for installing Windows in this scenario is to create a bootable USB drive.

What is the process of  bootable USB drive about?

This involves creating a USB drive that contains the Windows 11 installation files and can be used to boot the computer and begin the installation process.

To create a bootable USB drive, you will need a USB drive with at least 8 GB of storage space and a computer with a USB port and internet access.

Therefore, You will also need a tool that can be used to create a bootable USB drive, such as the Windows Media Creation Tool, which is provided by Microsoft. Once you have the tool you will follow the steps to download the Windows 11 installation files and create a bootable USB drive.

Once you have your bootable USB drive, you can plug it into the computer you want to install Windows 11 on and set the BIOS or UEFI to boot from the USB drive.

.

Learn more about Windows 11 from

https://brainly.com/question/29852089

#SPJ1

the selection structure is used when a programmer wants to repeatedly process one or more program instructions. true or false

Answers

The selection structure is used when a programmer wants to repeatedly process one or more program instructions that are true.

What are the program instructions?

A style of teaching where each student learns independently and at their own pace.

Programmable learning resources in the form of books or teaching aids, as well as different forms of self-instructional materials, are examples of software instructional sequences.

A learner may readily learn on their own with the help of the Steps, which are the components of new information that make up programmed learning.

When a programmer wishes to continually run one or more true program instructions, they utilize the selection structure.

More about the program instructions link is given below.

https://brainly.com/question/13166283

#SPJ4

Briefly embellish the virtues of structured Programming approach.

Answers

Answer:

Structured programming encourages dividing an application program into a hierarchy of modules or autonomous elements, which may, in turn, contain other such elements. Within each element, code may be further structured using blocks of related logic designed to improve readability and maintainability.

Explanation:

The following function should return the product of all elements of a list. Invoke listproduct function with the list [2, 3, 4]. Print the product. Can you fix it? LARVITY 20.3.1: PAS 4 3: (2 attempts) 0/100 main.py Load default template... WN def listproduct(list): product = 1 for item in list: product *- item return product

Answers

The output of the next function should be the sum of all list elements.

What is the principle of list product?

def listproduct(list):

   product = 1

   for item in list:

       product *= item

   return product

print(listproduct([2, 3, 4])) # 24

The code below contains an error. It should be "product *= item" instead of "product *- item". This is because we want to multiply the product with the item in the list, not subtract it.

def listproduct(list):

   product = 1

   for item in list:

       product *= item

   return product

print(listproduct([2, 3, 4]))

The output is 24, which is the product of all elements in the list.

To learn more about the principle of list product refer to:

https://brainly.com/question/26293311

#SPJ4

A program is designed to determine the minimum value in a list of positive numbers
called numlist. The following program was written
var minimum = MISSING CODE
for(var i = lo; i < numlist.length; i++){
if (numList[1] < minimum)
minimum = numList[1];
console.log("The minimum is" - minimum);
Which of the following can be used to replace ISSING CODE> so that the program works as intended for every possible list of positive numbers?

Answers

To determine the minimum value in a list of positive numbers called numlist, the following code can be used to replace MISSING CODE so that the program works as intended for every possible list of positive numbers:

var minimum = Number.MAX_VALUE;

The Number MAX_VALUE property represents the maximum positive number that can be represented in JavaScript. By initializing the minimum variable with this value, the program will ensure that any positive number in numlist will be smaller than minimum and will be correctly assigned as the minimum value.The largest positive number that may be represented using JavaScript is indicated by the Number.MAX VALUE property. The software will guarantee that every positive integer in numlist that is smaller than minimum will be appropriately allocated as the minimum value by initializing the minimum variable with this value.

To know more about numlist Kindly visit
https://brainly.com/question/21916257

#SPJ4

Given the following code sequence calculating a matrix norm.
double c[96], a [96] 196];
with a and c being arrays of double precision floating point numbers with each element being 8 bytes. No element of a or c is in the cache before executing this code. Please assume row-major ordering. Assuming that the cache is large enough to hold both a and c, and has a cache block size of 64 bytes, determine the number of cache misses (6 pts) and the cache miss rate (4 pts) for this code sequence.
Please correctly label each step if possible so I can follow along.

Answers

There were 11 cache misses, with a 0.22 cache miss rate.

What is arrays?

A group of elements, each of which is defined from at most one end of the array or key, make up an array, a type of data structure. Computer applications frequently utilise arrays to organise data so that a connected set of values may be quickly searched for or sorted. Any data type, including integers, characters, objects, and other arrays, can be contained in an element of an array. Arrays are the building blocks of many programming languages because they allow for the efficient and organised storage of data. They are frequently used it to store a lot of data of a similar type in a way that makes it simple to access any array element. Multi-dimensional arrays are those that have more than one level of elements.
11 cache misses total

Missing Cache Rate: 0.22


Miss - Load a[0] and a[1] into the caches in step one.

Miss - Load a[2] and a[3] into in the caches in step two.

Hit - Load c[0] and c[1] from the caches in step three.

Miss - Load a[4] and a[5] into the caches in step four.

Hit - Load c[2] and c[3] from the caches in step 5

Miss - Load a[6] and a[7] into the caches in step 6.

Hit - Load c[4] and c[5] from the caches in step 7

Miss - Load a[8] and a[9] into the caches in step 8.

Hit - Load c[6] and c[7] from the caches in step 9

Miss - Load a[10] and a[11] into in the caches in step 10.

Hit - Load c[8] and c[9] from the caches in step 11.

To learn more about arrays
https://brainly.com/question/26104158
#SPJ4

when you create a new database which object is created first

Answers

Table
a collection of records for a single subject, such as all customer records
Query
a subset of data from one or more tables

Answer:

When you first create a database, it's almost empty. But to get you started, Access creates your first database object—a table named Table1.

Explanation:

What is the SQL statement that will select the ID of all the superheros who has a latitude and longitude less than 50? I did SELECT ID FROM Superhero WHERE latitude AND longitutde < 50. But that didnât work.

Answers

You can use a SELECT statement based on the Haversine formula to discover places in your markers table that are within a specific radius distance of a specified latitude/longitude.

How can I determine my latitude?

You may calculate your latitude by calculating the angle of Polaris, the North Star, above the horizon. Your latitude is that. Alternatively, if it is during the day, you can determine how far below a vertical line the Sun is on March 21 or September 21 at precisely noon (when the shadows are the shortest).

Latitude and longitude are variables, right?

It is possible to represent the latitude and longitude coordinates of a horizontal grid that was not created as a Cartesian product of latitude and longitude axes.

To know more about latitude visit:-

https://brainly.com/question/13478781

#SPJ4

which is the correct way to construct and assign a 2d array, with 8 rows and 10 columns, to the variable popcorn? int[8][10] popcorn; int[8][10] popcorn

Answers

The right approach to create and assign a 2d array with 8 rows and 10 columns to the variable popcorn is int[][] popcorn = new int[8][10].

Which variable is the dependent one?

A dependent variable is one that is altered as a result of the modification of an independent variable. Your independent variable "depends" on the outcome you're interested in measuring.

Why does popcorn pop, anyway?

Water that has been trapped inside the popcorn kernel is what causes it to pop. This water will turn into steam if the kernel is cooked to a sufficient temperature. The hard, largely impermeable shell prevents the steam from venting, which causes pressure to build up inside the kernel.

To know more about variable visit:-

https://brainly.com/question/13375207

#SPJ4

You have decided to conduct a business meeting at a local coffee shop. The coffee shop you chose has a wireless hotspot for customers who want internet access.
You decide to check your email before the meeting begins. When you open the browser, you cannot gain internet access. Other customers are using the internet without problems. You are sure your laptops wireless adapter works because you use a wireless connection at work. What is the likely cause of the problem?
Different LAN protocols are being used.
WAP is out of range.
Antenna strength on the WAP is too low.
A mismatched SSID.
PPP is not configured correctly.

Answers

The cause of the problem of unable to get internet access on the wireless hotspot is a mismatched SSID.

What is SSID?

SSID or service set identifier is the unique name that contains sequence of characters in wireless LAN, it also be called as network name.

The SSID function to determine the stations to be connected to the desired network when multiple independent networks is available in the same area.

For the case, since the other customers can using the internet without the problems, so the network doesn't have any problem. Then, the laptops is wireless adapter works, so the device also doesn't have any problem.

So, the only problem is when connecting the device to the LAN, and this can happen if the user mismatches the SSID.

Learn more about SSID here:

brainly.com/question/27975067

#SPJ4

a search engine lists the hits in a search results list in a certain order, usually with more relevant hits at or near the top of the list.

Answers

Search engine , a search engine lists the hits in a search results list in a certain order, usually with more relevant hits at or near the top of the list..

What are some examples of search engines?

An online resource known as a search engine enables users to look up information on the World Wide Web (WWW), a component of the Internet.

                     This will be accomplished by the search engine by searching through numerous web sites for matches to the user's search inputs. The search engine's popularity and relevancy algorithms will determine the order of the results.

What makes it a search engine?

A software program developed specifically to do web searches is known as a search engine.

                      They carry out a methodical search of the World Wide Web for specific data that is specified in a text web search query. Search engine results pages, which are lists of results that show the search results typically, are used to refer to them (SERPs).

Learn more about Search engine

brainly.com/question/18559208

#SPJ4

java write a graphical application that displays a checkerboard with 64 squares, alternating white and black

Answers

java write a graphical application that displays a checkerboard with 64 squares, alternating white and black

import java.awt.Graphics2D;

import java.awt.Rectangle;

import java.awt.Color;

/**

 This class displays a checkerboard with squares,

 alternating between white and black.

*/

public class CheckerBoard

{

 /**

    Creates a CheckerBoard object with a given number of squares.

     aNumSquares the number of squares in each row

    aSize the size of each square

 */

 public CheckerBoard(int aNumSquares, int aSize)

 {

    numSquares = aNumSquares;

    size = aSize;

 }

 /**

    Method used to draw the checkerboard.

    g2 the graphics content

 */

 public void draw(Graphics2D g2)

 {

     int rows = numSquares * size;

     int columns = numSquares * size;

         if (rows %2 == columns %2)

            g2.setColor(Color.white);

         else

            g2.setColor(Color.black);

 }

 private int numSquares;

 private int size;

}

To know more about Java visit

brainly.com/question/29897053

#SPJ4

Question 8
To authenticate user accounts on a computer against AD, what must be done to the computer first?

Answers

Answer:

Join it to the domain.

Write a program named CheckMonth2 that prompts a user to enter a birth month and day.
Display an error message that says Invalid date if the month is invalid (not 1 through 12) or the day is invalid for the month (for example, not between 1 and 31 for January or between 1 and 29 for February).
If the month and day are valid, display them with a message. For example, if the month entered is 2, and the day entered is 17, the output should be 2/17 is a valid birthday.
(answer in c#)
-----------------------------------------------------------------------------------------------------------------------------------
using System;
using static System.Console;
class CheckMonth2
{
static void Main()
{
// Write your main here
}
}

Answers

The program named CheckMonth2 prompts a user to enter a birth month and day, written below in python.

What is programming?

The first line of the code in the Python program below is used to hold the list of the month. The user's input is then used to create a message for the user and saved into a variable on the second line.

month=['January', 'Februrary', 'March', 'April', 'May', 'June', 'July', 'August', 'September', 'October', 'November', 'December'] #list which stores the name of the month.

CheckMonth= int(input("Enter the number of the month")) #it is used to take the inputs from the user.

if CheckMonth>=1 and CheckMonth<=12: #check the condition for valid month.

  print(str(CheckMonth)+" is a valid month which name is: "+ str (month [CheckMonth-1])) #print the name of month which is enter by the user.

else:

  print(str(CheckMonth)+" is not a valid month, please enter the valid month") # print for the invalid month.

Therefore, the program is written above

To learn more about programming, refer to the link:

https://brainly.com/question/11023419

#SPJ4

Benefits of Encapsulation:
The fields of a class can be made read-only or write-only.
A class can have total control over what is stored in its fields.
The users of a class do not know how the class stores its data. A class can change the data type of a field and users of the class do not need to change any of their code.

Answers

Data concealing, increased flexibility, and ease of reuse are advantages of encapsulation programming.

What uses for encapsulation are there?

Preventing reactivity with other ingredients in food products, such as oxygen or water, is another objective of using encapsulation. Encapsulation can also be used to encapsulate cells or enzymes in food processing applications, such as the fermentation process and the synthesis of metabolites.

What Benefits Come with Encapsulation?

Encapsulation is the process of concealing complex, lower-level data by combining data and operations into a single abstracted entity. By using access modifiers, it can limit erroneous human changes, prohibit unauthorized access to sensitive data, and conceal information.

To know more about encapsulation visit:-

https://brainly.com/question/29762276

#SPJ4

Using the data for age given in Exercise 3.3, (a) Plot an equal-width histogram of width 10. (b) Sketch examples of each of the following sampling techniques: SRSWOR, SRSWR, cluster sampling, and stratified sampling. Use samples of size 5 and the strata “youth,” “middle-aged,” and “senior.”

Answers

Using the knowledge in computational language in python it is possible to write a code that Use samples of size 5 and the strata “youth,” “middle-aged,” and “senior.”

Writting the code;

{13,15,16,16,19,20,20} interval [11-20] F=7 ages

{21,22,22,25,25,25,25,25,30} interval [21-30] F=8 ages

{33,33,35,35,35,36,40} interval[31-40] F=8 ages

{45,46} interval [41-40] F=2 ages

{0} interval [51-60] F=0 age

{70} interval [61-70] F=1 age

Each unit can be chosen one time

therefore Sample size=5

{13,15,16,19,20}

repetition is allowed

Sample size=5

{13,13,13,15,16}

All units in a cluster is selected

{33,35,36,40}

Youth {16,19,20,21,22}

Middle aged {33,35,36,40,45,46}{

Senior {52,70}

Sample={16,21,33,40,52}

See more about python at brainly.com/question/18502436

#SPJ1

A mobile device is freezing almost daily. The device remains powered on and the screen illuminated. The user restarts the device, and it operates for another day or so. This problem has been occurring for several weeks.
Which of the following steps should the user take next to resolve this issue?

Answers

The user should back up all crucial data as the first step in fixing the problem.

Which action from the list below should the user take next to fix this problem?The user should back up all crucial data as the first step in fixing the problem. This is crucial in the event that the device cannot be restored or if any data is lost while troubleshooting. The user should then reset the device to factory defaults in order to assist verify that all software is current and any corrupt files are erased after backing up all crucial data.The user should then look for any updated software. This includes any operating system, software, or firmware upgrades for the gadget. If there are any updates, the user needs to install them right away.The device's cache should then be cleared by the user. This can assist in enhancing the device's general performance and resolving any conflicts between various apps or processes. Additionally, the user needs to confirm that there is adequate free storage on the device.The user should lastly scan for malware and viruses. The user should take action to delete any dangerous software identified on the device. To further shield the smartphone from risks, the user ought to think about downloading a security programme.

To learn more about troubleshooting refer to:

https://brainly.com/question/14394407

#SPJ4

Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?

Answers

We are aware that the agreement covers risk transfer, risk avoidance, and risk mitigation, but not (A) risk extinguishment.

What is Transfer risk?

The danger that a local currency cannot be transferred into the currency of another country due to fluctuations in nominal value or because of certain regulatory or exchange constraints is known as transfer risk.

Avoid risk:
By avoiding risks, you reduce your exposure to lawsuits by attempting to stay away from potentially damaging situations.

Reducing your exposure to risk can help you keep your company's losses and other damages under control.

Mitigate risk:

Planning for disasters and finding a strategy to decrease their effects is the practice of risk mitigation.

Although a corporation should be prepared for all potential risks, a comprehensive risk mitigation plan would analyze each risk's impact and give that impact priority when prioritizing planning.

Now, we know that transferring risk, avoiding risk, and mitigating risk are included is the document, they extinguish risk is not included in the document.

Therefore, we are aware that the agreement covers risk transfer, risk avoidance, and risk mitigation, but not (A) risk extinguishment.

Know more about Transfer risk here:

https://brainly.com/question/7040039

#SPJ4

Complete question:
Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?

(A) Extinguish risk

(B) Transfer risk

(C) Avoid risk

(D) Mitigate risk

We are aware that the agreement does not address (A) risk extinguishment, but rather risk transfer, risk avoidance, and risk reduction.

How does transfer risk work?

Transfer risk refers to the risk that a local currency cannot be converted into the currency of another nation owing to changes in nominal value or because of specific regulatory or exchange restrictions.

Avoid risk: By making an effort to avoid potentially harmful circumstances, you can lessen your exposure to litigation.

You may manage losses and other damages to your firm by reducing your exposure to risk.

Reduce risk:

The technique of risk mitigation involves making preparations for calamities and coming up with a plan to lessen their consequences.

Despite the fact that a firm should be ready for every conceivable risk, a thorough risk mitigation strategy would examine each risk's impact and give that impact precedence when prioritizing preparation.

We now know that while transferring risk, avoiding risk, and managing risk are covered in the agreement, eliminating risk is not.

Therefore, we are aware that (A) risk extinguishment is not covered by the agreement, only risk transfer, risk avoidance, and risk reduction.

Know more about Transfer risk here:

brainly.com/question/7040039

#SPJ4

Complete question:

Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?

(A) Extinguish risk

(B) Transfer risk

(C) Avoid risk

(D) Mitigate risk

sniffing is a situation where esomeone examines that passes their nic, whether addressed for them or not. T/F

Answers

False, sniffing is a situation where someone captures and examines network traffic that passes through their network interface card (NIC), whether the traffic is addressed to them or not.

What is NIC?

The Government of India's technological partner is the National Informatics Centre (NIC), which is a division of the Ministry of Electronics and Information Technology (MeitY). With the intention of offering Central and State Governments technology-driven solutions in a variety of development-related areas, it was founded in 1976. NIC has played a crucial role in helping the Central Government embrace and support information and communication technology (ICT) and eGovernment.

False. Sniffing is a situation where someone captures and examines network traffic that passes through their network interface card (NIC), whether the traffic is addressed to them or not. Sniffing is typically done using specialized software or hardware tools, and it can be used for legitimate purposes such as network monitoring and troubleshooting, or for malicious purposes such as stealing sensitive information or spreading malware.

In contrast, network traffic that is addressed to a specific network interface card (NIC) is typically not captured and examined by sniffing tools, as it is intended for the device with that specific NIC. Traffic that is not addressed to a specific NIC is referred to as "broadcast" or "multicast" traffic and may be captured and examined by sniffing tools.

To know more about NIC checkout https://brainly.com/question/20689912

#SPJ4

Dion Training has asked you to consult on the installation of their new file server. The current server consists of a RAID 5 array with three 1 TB 7200 RPM hard disk drives. Due to increase reliance on the new file server, you have been asked to recommend a RAID solution that will help ensure there is no unscheduled downtime, no data loss, and increase speed/performance over the current file server. Based on these requirements, which of the following RAID solutions should you recommend?

Answers

Based on the requirements you have listed (no unscheduled downtime, no data loss, and increased speed/performance), it seems that the most suitable RAID solution would be RAID 1+0 (also known as RAID 10).

According to the criteria you've provided (no unplanned downtime, no data loss, and better speed/performance), RAID 1+0 appears to be the most appropriate RAID option (also known as RAID 10).

The advantages of RAID 1 (mirroring) and RAID 0 are combined in RAID 1+0. (striping). Data is duplicated across many disks using RAID 1+0, offering redundancy and loss prevention. Data is simultaneously striped across the disks, enhancing performance and speed.

RAID 1+0 offers outstanding reliability and performance but requires a minimum of four drives to implement. File servers that require high availability and performance should use it.

To know more about RAID solutions kindly visit
https://brainly.com/question/14669307

#SPJ4

marking alters bits within a frame, cell, or packet to indicate how the network should treat that traffic. marking alone does not change how the network treats a packet.

Answers

Marking is the quality of service (QoS) function that alters bits in a frame, cell, or packet.A frame, cell, or packet can be marked by changing bits in order to tell the network how to handle the traffic.

A packet's treatment by the network is unaffected by marking alone. However, other tools (like queuing tools, for instance) can make judgments based on those markers and refer to those markings. The majority of QoS solutions categorize traffic, enabling each class of traffic to be treated differently from other traffic classes. This approach can be used to give one kind of traffic priority over another. In this solution, tools for classification and marking play a significant role.

To know more about the packet click on the below link:

https://brainly.com/question/13818790

#SPJ4

Provide test cases for each test path you list in the previous question. if it is not possible to find the test input for certain test path, describe the reason. (6 pts.)

Answers

Test paths for edge-coverage: {[1,2,3,4,3,5,6,7,6,8]} is i = 5 for out, length = 5 for input.

Input domains for edge coverage

D: {length > 0}

INPUT    -   OUTPUT

length = 5 i = 5

Input domain testing verifies a system's output using a small number of inputs. This procedure demonstrates that only specific inputs that are within the permitted range will be accepted by the tested system. Only the necessary outputs should be produced by the system, and any erroneous input data should be blocked.

The Test-Path cmdlet checks to see if each component of the path is present. When all elements are present, $True is returned; otherwise, $False is returned.

To learn more about the test path

https://brainly.com/question/29215873

#SPJ4

You are working with an employee database that has some incorrect hiring dates. Which of the following SQL commands will you use to make these changes?
-ALTER
-CREATE
-UPDATE
-LOAD

Answers

SQL commands you will use to make these changes by UPDATE.

What is SQL and its commands?Structured Query Language is known as SQL. The instructions needed to interface with a database in order to carry out operations, functions, and queries on data are known as SQL commands. The database may be searched using SQL commands, and they can also be used to create, add data to, change, and remove tables, among other things.A database may be communicated with using SQL. It is the accepted language for relational database management systems, claims ANSI (American National Standards Institute). To change data on a database or to obtain data from a database, SQL statements are employed.A common language for navigating and modifying databases is SQL.

Learn more about SQL commands refer to ;

https://brainly.com/question/25694408

#SPJ4

Soon after completing a vulnerability scan, you review the most critical findings on your apache web server. from the following list, which is likely a false positive?

Answers

The majority of the time, vulnerability scanners are unable to confirm the existence of a prior blind SQL injection with code execution.

Which of the following factors is least likely to have an impact on schedules for vulnerability scanning?

The organization's risk appetite, legal requirements, technological limits, commercial constraints, and licensing restrictions are frequently what influence staff availability and scan schedules.

What would be the main thing to be worried about while running a vulnerability scan?

You have no assurance that your systems are secure because a vulnerability scanning program also misses flaws. This is one of the main drawbacks of all scanning tools since hackers may still be able to exploit security holes.

To know more about vulnerability visit:-

https://brainly.com/question/15593733

#SPJ4

To prevent the loss of a single message due to accidental decryption
from affecting other encrypted messages, which of the following
properties is needed?
A. Stream encryption
B. Perfect forward secrecy
C. Entropy
D. Obfuscation

Answers

Stream encryption shields other encrypted messages from being damaged if one message is accidentally decrypted and lost.

Symmetric encryption is what?

The same key is used for encryption and decryption in symmetric encryption. Therefore, it is crucial to take into account a secure way while transferring the key between the sender and recipient.

What are the two elements required for encryption and decryption operations in an asymmetric encryption system?

A public key and a private key, which are related mathematically, are used in asymmetric encryption for encryption and decryption. The associated private key is used for decryption if the public key is utilized for encryption. The associated public key is utilized if the private key is used for encryption.

To know more about encryption visit:-

https://brainly.com/question/17017885

#SPJ4

FILL IN THE BLANK. in addition, you should code and show how the client process waits for a signal sigint using sigsuspend(____) in the beginning of the client program. remember that you can generate sigint by pressing ctrl-c. this signal waiting part is 5pt and will be in the beginning of the client program. after that, the client will interact with the server as described above.

Answers

The client process waits for a signal sigint using  sigsuspend ( SignalMask) in the beginning of the client program.

What is sigsuspend or sigpause Subroutine?

The collection of signals indicated to by the SignalMask parameter are substituted for a thread's signal mask by the sigsuspend function.

The thread's execution is then put on hold until a signal that either triggers a signal-catching function or ends the process is sent. The SIGKILL and SIGSTOP signals cannot be prevented by the sigsuspend function.

The sigsuspend procedure doesn't report an error if a program tries to block one of these signals.

The sigsuspend subroutine doesn't come back if the process ends as a result of the signal delivery.

If a signal delivery triggers the start of a signal-catching function, the sigsuspend subroutine will resume once the signal-catching function has finished, with the signal mask set back to what it was before the sigsuspend subroutine.

To know more about SIGKILL & SIGSTOP, visit: https://brainly.com/question/29559108

#SPJ4

_____ is independent of particular programming languages, but it does provide standard visual symbols and notations for specifying object-oriented elements, such as classes and procedures.

Answers

Unified Modelling Language is independent of particular programming languages, but it does provide standard visual symbols and notations for specifying object-oriented elements, such as classes and procedures.

Define unified modeling language.

In the realm of software engineering, the Unified Modeling Language is a general-purpose, developmental modeling language that aims to offer a uniform method of visualizing system architecture. The Unified Modelling Language class diagram depicts the object's properties, functions, and relationships. Classes are connected by arrows, which highlight significant relationships. Among other things, the arrows signify affiliation, inheritance, aggregation, composition, reliance, and realization.

A modeling language with many uses is called Unified Modeling Language (UML). The basic objective of UML is to specify a common method for visualizing a system's design process. It resembles plans used in other branches of engineering quite a bit.

To learn more about unified modeling language, use the link given
https://brainly.com/question/29603322
#SPJ4

Consider the following class definition. Each object of the class Employee will store the employee's name as name, the number of weekly hours worked as wk_hours, and hourly rate of pay as pay_rate.
public class Employee
{
private String name;
private int wk_hours;
private double pay_rate;
public Employee(String nm, int hrs, double rt)
{
name = nm;
wk_hours = hrs;
pay_rate = rt;
}
public Employee(String nm, double rt)
{
name = nm;
wk_hours = 20;
pay_rate = rt;
}
}
Which of the following code segments, found in a class other than Employee, could be used to correctly create an Employee object representing an employee who worked for 20 hours at a rate of $18.50 per hour?
I.
Employee e1 = new Employee("Lili", 20, 18.5);
II.
Employee e2 = new Employee("Steve", 18.5);
III.
Employee e3 = new Employee("Carol", 20);
A.
I only
B.
III only
C.
I and II only
D.
I and III only
E.
I, II, and III

Answers

The code segments found in a class other than Employee, could be used to correctly create an Employee object representing an employee who worked for 20 hours at a rate of $18.50 per hour is C. I and II only

What is a code segment?

A code segment in computing is a section of an object file or the corresponding area of the program's virtual address space that contains executable instructions. It is also referred to as a text segment or simply as text.

Exons are the coding segments, and introns are the non-coding segments.

On embedded systems, the code segment can typically be stored in read-only memory because it is typically read-only and has a fixed size. In conclusion, the correct option is C.

Learn more about code on:

https://brainly.com/question/13506144

#SPJ1

Other Questions
in 2008, zimbabwe ran out of locally produced coca cola and local coke bottlers were not able to import the concentrated syrup needed to make coke from the united states because they could not obtain u.s. dollars. a small amount of coke was imported from south africa, but a single bottle sold for around 15 billion zimbabwean dollars. zimbabwe was experiencing rapid increases in the price level, which is known as What is y =- 4 on a graph? What are the five integral parts of research? Graph by finding the x and y intercepts using a table-3x-6y=0 What was the 3rd Agricultural Revolution referred to as? Which hardware component processes data? If a country has an absolute advantage in every good, then? Two protons (charge q = 1.60210-19 C) move at the same speed v= 1.6 105 m/s in opposite directions parallel to the x-axis. At the instant when they are at the same x-position, the proton moving in the negative direction is at distance r= 0.7 m in the positive y-direction with respect to the one moving in the positive direction.What is the magnetic field direction at the point of the proton moving in the negative direction?+x-x+y-y+z-zWhat is the magnetic force direction experienced by the proton moving in the negative direction?+x-x+y-y+z-z Whats the definition of reflexive? Fashion Design - what are the 3 influences on fashion?? an object with a mass of 5kg is initially at rest on a frictionless horizontal surface. a horizontal force is applied to the objevt. the object changes its position as assume the demand curve for a good is perfectly inelastic and the production of each unit of this good generates external costs. a profit-maximizing firm producing the good in an unregulated free market will when people purchase groceries or household goods in most states, they pay an additional percent of the subtotal. what kind of tax are they paying? A firm can fund an expansion of its operations bySelect one:A. buying stock.B. loaning money.C. paying dividends.D. issuing bonds.Use the table below to answer questions 2 and 3Question 2What is the growth rate of real GDP from 2019 to 2020?Select one:a. -1.86%b. -1.90%c. 4.72%d. 4.38%e. 1.56%Clear my choiceQuestion 3What is the average annual growth rate from 2017 to 2020?Select one:a. 1.10%b. 1.47%c. -0.32%d. -0.43%e. 0.92% Identify the expanded accounting equation from the options below. O Assets = Liabilities + Common Stock - Dividends + Revenues - Expenses O Assets + Liabilities - Common Stock + Revenues - Expenses - Dividends O Assets = Liabilities - Common Stock + Revenues - Expenses - Dividends The mycenaeans (early greeks) are often regarded as the heirs of the minoans. according to one of the supplementary videos, compared to the minoan civilization, the mycenaean culture was a great step forwards a great step backwards an immediate continuation All of the following variables related to the collection of blood may falsely increase the potassium levels EXCEPT:Drawing a purple-top EDTA tube prior to a red-top tube.Mixing the blood collection tube aggressively.Pouring some sample from a purple-top EDTA tube into a red-top tube to make up for low collection volume.Using a 21 G needle with a 10 mL collection tube. What are the 4 most used taxes? What does PACs mean in government? The art museum is 8 1/2 miles from Alison's house. Alison has ridden her bike 2/3 of the way there so far. How far has she gone?