What do network operating systems use? Check
all of the boxes that apply.
hardware
software
plant material
desks
sunlight

Answers

Answer 1

Answer:

1 and 2Explanation:


Related Questions

Julie I'm here so help me I'm red

Answers

Answer:

hey hey hey hey hey hey hey hey

Explanation:

hey hey hey hey hey hey hey hey

Computer science pls awnser

Answers

Answer: Secure shell (SSH)

Explanation:

What direction would a sprite go if you constantly increased its x property? Your answer What direction would a sprite go if you constantly decreased its y property?* Your answer Do you feel you understand sprite movement and how to create the counter? Your answer​

Answers

Answer:

decrease x property,It would go left

decrease y property, it would go down

yes

Explanation:

According to the vulnerability assessment methodology, vulnerabilities are determined by which 2 factors?

Answers

Answer:

3 and 60!

Explanation:

Consider the following statement, which is intended to create an ArrayList named a to store only elements of type Thing. Assume that the Thing class has been properly defined and includes a no-parameter constructor.
ArrayList a = /* missing code */;
Which of the following can be used to replace /* missing code */ so that the statement works as intended?
A: new Thing()
B: new ArrayList()
C: new ArrayList(Thing)
D: new ArrayList()
E: new ArrayList<>(Thing)
Consider the following statement, which is intended to create an ArrayList named numbers that can be used to store Integer values.
ArrayList numbers = /* missing code */;
Which of the following can be used to replace /* missing code */ so that the statement works as intended?
new ArrayList()
new ArrayList
new ArrayList()
A: III only
B: I and II only
C: I and III only
D:II and III only
E: I, II, and III

Answers

Answer:

B: new ArrayList()

Explanation:

When dealing with Java syntax you always need to initialize an ArrayList object with its constructor. From the options listed the only correct option would be B: new ArrayList(). This would correctly initialize the ArrayList object but is not necessarily the recommended way of doing this. The truly recommended way would be the following

ArrayList<Thing> a = new ArrayList<Thing>()

ArrayLists are simply resizable array.

The statement that can replace the missing code is (b) new ArrayList();The statements that can replace the missing code is (c) I and III only

The syntax to create an ArrayList is:

ArrayList<Type> str = new ArrayList<Type>();

Another possible syntax is:

ArrayList var_name= new ArrayList();

The above declarations mean that: the statement that can replace the missing code is (b) new ArrayList();

While the statements that can replace the missing code is (c) I and III only

Read more about ArrayLists at:

https://brainly.com/question/18323069

Consider the decision version of the Binary Search algorithm, which takes an array a of integers of size n, an integer x to be found, and gives a boolean result. Which of the following statements corresponds to a pair of valid Pre- and Post-conditions?
Note: Assume issorted() implies ascending numeric order:______.
A) PRE:n > 1
POST: result == x E a A is Sorted (a)
B) PRE: True
POST:isSorted(a) An > 1 C) PRE:n > 1A is Sorted (a). 10 sxs a[n-1]
POST: result == x E a vissorted(a)
D) PRE:n 1 An == size (a) A is Sorted (a) A a [0] SX Sa(n-1)
POST: result == XE a
E) PRE:n > i^n -- size (a) ^ a[0] 5 x 5 a (n-1]
POST: result = X Ea

Answers

Answer:

B

Explanation:

I am not for sure

PRE: True POST: is Sorted(a) An > 1 C) PRE : n > 1A is Sorted (a). 10 sxs a[n-1] POST: result == x E a vissorted (a).

What is computer programming?

Computer programming is defined as the process of carrying out a specific computation, typically through creating an executable computer program. Computer programmers create code and scripts, modify them, and test them to make sure that software and applications function as intended. They convert the blueprints made by engineers and software developers into computer-readable instructions.

The algorithm determines whether the key the number you're looking for and the array's middle value are equal. If so, the key is in the middle and the search is complete. The program then determines if the key is larger or less than the middle value if it isn't.

Thus, PRE: True POST: is Sorted(a) An > 1 C) PRE : n > 1A is Sorted (a). 10 sxs a[n-1] POST: result == x E a vissorted (a).

To learn more about computer programming, refer to the link below:

https://brainly.com/question/3397678

#SPJ2

Suppose Alice and Bob are sending packets to each other over a computer network. SupposeTrudy positions herself in the network so that she can capture all the packets sent by Alice and sendwhatever she wants to Bob; she can also capture all the packets sent by Bob and send whatever she wantsto Alice. List one active and one passive malicious thing that Trudy can do from this position.

Answers

Explanation:

can observe the contents of all the packets sent and even modify the content.can prevent packets sent by both parties from reaching each other.

From a network security standpoint, since we are told that Trudy "positions herself in the network so that she can capture all the packets sent", it, therefore implies that the communication between Alice and Bob is vulnerable to modification and deletion.

Edhesive 1.7 code practice question 2

Answers

Answer:

num = int(input("Enter a number: "))

print ("Answer= "+ str(num * 12))

Explanation:

write a program that display yor name

Answers

Answer:

For python:

Explanation:

Name = input("What is your name? ")

print("Hello " + Name + "!")

company gives the following discount if you purchase a large amount of supply. Units Bought Discount 10 - 19 20% 20 - 49 30% 50 - 99 35% 100 40% If each item is $4.10. Create a program that asks the user how many items they want to buy, then calculates the pre-discount price, the amount of discount and the after discount price. So for example if order 101 items, I should see something similar to the following: With your order of 101 items, the total value will be $414.10 with a discount of $165.64 for a final price of $248.46. Your output should be very well organized, and use the correct formatting. (Including precision)

Answers

Answer:

In Python:

order = int(input("Order: "))

discount = 0

if(order >= 10 and order <20):

    discount = 0.20

elif(order >= 20 and order <50):

    discount = 0.30

elif(order >= 50 and order <100):

    discount = 0.35

elif(order >= 100):

    discount = 0.40

price = order * 4.1

discount = discount * price

print("With your order of "+str(order)+" items, the total value will be $"+str(round(price,2))+" with a discount of $"+str(round(discount,2))+" for a final price of $"+str(round((price-discount),2)))

Explanation:

This prompts the user for number of orders

order = int(input("Order: "))

This initializes the discount to 0

discount = 0

For orders between 10 and 19 (inclusive)

if(order >= 10 and order <20):

-----------discount is 20%

    discount = 0.20

For orders between 20 and 49 (inclusive)

elif(order >= 20 and order <50):

-----------discount is 30%

    discount = 0.30

For orders between 50 and 99 (inclusive)

elif(order >= 50 and order <100):

-----------discount is 35%

    discount = 0.35

For orders greater than 99

elif(order >= 100):

-----------discount is 40%

    discount = 0.40

This calculates the total price

price = order * 4.1

This calculates the pre discount

discount = discount * price

This prints the report

print("With your order of "+str(order)+" items, the total value will be $"+str(round(price,2))+" with a discount of $"+str(round(discount,2))+" for a final price of $"+str(round((price-discount),2)))

b) Develop a truth table for expression AB+ C.

Answers

It will become c-ab :)

Write a function species_count that returns the number of unique Pokemon species (determined by the name attribute) found in the dataset. You may assume that the data is well formatted in the sense that you don't have to transform any values in the name column. For example, assuming we have parsed pokemon_test.csv and stored it in a variable called data:

Answers

Answer:

Escribe una función species_count que devuelva el número de especies de Pokémon únicas (determinadas por el atributo de nombre) que se encuentran en el conjunto de datos. Puede suponer que los datos están bien formateados en el sentido de que no tiene que transformar ningún valor en la columna de nombre. Por ejemplo, suponiendo que analizamos pokemon_test.csv y lo almacenamos en una variable llamada datos:

Explanation:

Imagine that you are designing an application where you need to perform the operations Insert, DeleteMaximum, and Delete Minimum. For this application, the cost of inserting is not important, because itcan be done off-line prior to startup of the time-critical section, but the performance of the two deletionoperations are critical. Repeated deletions of either kind must work as fast as possible. Suggest a datastructure that can support this application, and justify your suggestion. What is the time complexity foreach of the three key operation

Answers

Answer:

A stack data structure should be used. The time complexity of the insert, delete minimum and maximum operation is O(1).

Explanation:

The stack data structure is an indexed structure that holds data in an easily retrievable way. Data is held in a first-in last-out method as elements in the structure are popped out from the end of the stack when retrieved sequentially.

The worst-case time complexity of getting the minimum and maximum elements in a stack and deleting it is O(1), this is also true for inserting elements in the stack data structure.

We have looked at several basic design tools, such as hierarchy charts, flowcharts, and pseudocode. Each of these tools provide a different view of the design as they work together to define the program. Explain the unique role that each design tool provides (concepts and/or information) to the design of the program.

Answers

Answer:

Answered below

Explanation:

Pseudocode is a language that program designers use to write the logic of the program or algorithms, which can later be implemented using any programming language of choice. It helps programmers focus on the logic of the program and not syntax.

Flowcharts are used to represent the flow of an algorithm, diagrammatically. It shows the sequence and steps an algorithm takes.

Hierarchy charts give a bird-eye view of the components of a program, from its modules, to classes to methods etc.

Consider the following code segment.

int[] arr = {1, 2, 3, 4, 5};

Which of the following code segments would correctly set the first two elements of array arr to 10 so that the new value of array arr will be {10, 10, 3, 4, 5} ?

a. arr[0] = 10;
arr[1] = 10;

b. arr[1] = 10;
arr[2] = 10;

c. arr[0, 1] = 10;

d. arr[1, 2] = 10;
e. arr = 10, 10, 3, 4, 5;

Answers

Answer:

A.)

arr[0] = 10;

arr[1] = 10;

Explanation:

Given the array:

arr = {1,2,3,4,5}

To set the first two elements of array arr to 10.

Kindly note that ; index numbering if array elements starts from 0

First element of the array has an index of 0

2nd element of the array has an index of 1 and so on.

Array elements can be called one at a time using the array name followed by the index number of the array enclosed in square brackets.

arr[0] = 10 (this assigns a value of 10 to the index value, which replace 1

arr[1] = 10 (assigns a value of 10 to the 2nd value in arr, which replaces 2

Assume that you are able to do an exhaustive search for the key to an encrypted message at the rate of 100 Million trials per second. (a) (7 Points) How long in (days or years) would it take for you to find the key on the average to a code that used 112-bit key on average

Answers

Answer:

8.22 × 10²⁰ years

Explanation:

Given that:

Total frequency = 100 million per record

The length of the key used for the encryption = 112 bit key

To calculate the number of seconds in  a year, we have:

= 365 × 24 × 60 × 60

= 3.1536 × 10⁷ seconds

Thus, on average, the number of possible keys that is required to check for the decryption should be at least  2¹¹¹ keys.

[tex]\mathbf{ = \dfrac{2^{111} \times 10^6}{3.1536 \times 10^7} = 8.22 \times 10^{20} \ years}[/tex]

Thus, it will take a total time of about 8.22 × 10²⁰ years on average.

PHP is based on C rather than ______.


Select one:


a. PEARL


b. JAVA


c. PERL


d. COBOL

Answers

Answer:

The answer is "option b and option d"

Explanation:

In this question, both choice "b and c" is correct because Java is compiled and run on a JVM  and it uses the byte code. On the other hand, PHP has interpreted language, that compiled into the bytecode after that the output engine interpreted. Similarly, the COBOL is used for enterprise, finance, and administrative systems, and PHP is used in web creation.

describe a sub routine​

Answers

Explanation:

A routine or subroutine, also referred to as a function procedure and sub program is code called and executed anywhere in a program. FOr example a routine may be used to save a file or display the time.

what is a computer modem?​

Answers

Answer:

A modem modulates and demodulates electrical signals sent through phone lines, coaxial cables, or other types of wiring.

Sophisticated modeling software is helping international researchers

Answers

Answer:

A. increase the pace of research in finding and producing vaccines.

Explanation:

These are the options for the question;

A. increase the pace of research in finding and producing vaccines.

B. analyze computer systems to gather potential legal evidence.

C. market new types of products to a wider audience.

D. create more intricate screenplays and movie scripts.

Modeling software can be regarded as computer program developed in order to build simulations as well as other models. modelling software is device by international researchers to make research about different vaccines and other drugs and stimulants to combat different diseases. It helps the researcher to devoid of details that are not necessary and to deal with any complexity so that solution can be developed. It should be noted that Sophisticated modeling software is helping international researchers to increase the pace of research in finding and producing vaccines.

Key Categories: more libraries and thousands of functions


Select one:


a. Power


b. Practicality


c. Possibility


d. Price

Answers






b. power
YOUR WELXOME



Key Categories: more libraries and thousands of functions is Practicality. Hence, option B is correct.

What is Practicality?

the ability to perform something or put something into action: Bankers expressed dissatisfaction with the new rules' viability as workable answers to challenging issues. He believes that wind energy can be a useful renewable energy source. For the majority of residential residences, the equipment is too large to be useful. Although the shoes are attractive, they are not particularly useful. The book is a helpful manual for maintaining cars.

tailored or created for actual use; beneficial: useful guidelines. interested or skilled in practical application or work: a pragmatic politician with a record of enacting significant legislation.

The definition of practical thinking is "examining ways to adapt to your surroundings or change your environment to fit you" in order to achieve a goal. Practicality is a term that is used occasionally.

Thus, option B is correct.

For more information about Practicality, click here:

https://brainly.com/question/24313388

#SPJ5

Output values below an amount
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value.
Ex: If the input is:
5 50 60 140 200 75 100
the output is:
50 60 75
The 5 indicates that there are five integers in the list, namely 50, 60, 140, 200, and 75. The 100 indicates that the program should output all integers less than or equal to 100, so the program outputs 50, 60, and 75.
For coding simplicity, follow every output value by a space, including the last one. Such functionality is common on sites like Amazon, where a user can filter results.

Answers

Answer:

Explanation:

The following code is written in Python and it is a function called filter, which takes in the requested inputs. It then places the threshold in its own variable and pops it out of the array of inputs. Then it loops through the array comparing each element with the threshold and printing out all of the ones that are less than or equal to the threshold.

def filter():

   num_of_elements = input("Enter a number: ")

   count = 0

   arr_of_nums = []

   while count <= int(num_of_elements):

       arr_of_nums.append(input("Enter a number: "))

       count += 1

   threshold = arr_of_nums[-1]

   arr_of_nums.pop(-1)

   print(threshold)

   for element in arr_of_nums:

       if int(element) < int(threshold):

           print(element)

       else:

           continue

5. All sites are required to have the following reference materials available for use at VITA/TCE sites in paper or electronic format: Publication 17, Publication 4012, Volunteer Tax Alerts (VTA), and Quality Site Requirement Alerts (QSRA). AARP Foundation Tax Aide uses CyberTax Alerts in lieu of VTAs and QSRAs. What other publication must be available at each site and contains information about the new security requirements at sites

Answers

Answer:

Publication 5140.

Explanation:

The acronym VITA stands for Volunteer Income Tax Assistance and TCE stands for Tax Counseling for the Elderly. VITA/TCE is a certification gotten from the Internal Revenue Service in which the holders of such certification are trained on how to help people that have disabilities or that their incomes earners that are low. These volunteers help these set of people to prepare for their tax return.

In order to make the volunteers to be able to perform their work with high accuracy, the Department of Treasury, Internal Revenue Service gave out some aids for Quality Site. One of the aids which is the one contains information about the new security requirements at sites is given in the Publication 5140.

Consider the following class definition.
public class Tester
{
privtae int num1;
private int num2;
/missing constructor /
}
The following statement appears in a method in a class other than Tester. It is intended t o create a new Tester object t with its attributes set to 10 and 20.
Tester t = new Tester(10,20);

Which can be used to replace / missing constructor / so that the object t is correctly created?

Answers

Answer:

Explanation:

The following constructor needs to be added to the code so that the object called t can be created correctly...

public Tester(int arg1, int arg2) {

    num1 = arg1;

    num2 = arg2;

}

This basic constructor will allow the object to be created correctly and will take the two arguments passed to the object and apply them to the private int variables in the class. The question does not state what exactly the Tester constructor is supposed to accomplish so this is the basic format of what it needs to do for the object to be created correctly.

The Clean Air Act Amendments of 1990 prohibit service-related releases of all ____________. A) GasB) OzoneC) MercuryD) Refrigerants

Answers

Answer:

D. Refrigerants

Explanation:

In the United States of America, the agency which was established by US Congress and saddled with the responsibility of overseeing all aspects of pollution, environmental clean up, pesticide use, contamination, and hazardous waste spills is the Environmental Protection Agency (EPA). Also, EPA research solutions, policy development, and enforcement of regulations through the resource Conservation and Recovery Act .

The Clean Air Act Amendments of 1990 prohibit service-related releases of all refrigerants such as R-12 and R-134a. This ban became effective on the 1st of January, 1993.

Refrigerants refers to any chemical substance that undergoes a phase change (liquid and gas) so as to enable the cooling and freezing of materials. They are typically used in air conditioners, refrigerators, water dispensers, etc.

Answer:

D

Explanation:

Please select the word from the list that best fits the definition Asking for review material for a test

Answers

Answer:

B

Explanation:

Answer:

B is the answer

Explanation:

Write a program named BinaryToDecimal.java that reads a 4-bit binary number from the keyboard as a string and then converts it into decimal. For example, if the input is 1100, the output should be 12. (Hint: break the string into substrings and then convert each substring to a value for a single bit. If the bits are b0, b1, b2, b3, then decimal equivalent is 8b0 4b1 2b2 b3)

Answers

Answer:

import java.util.*;

public class BinaryToDecimal

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

    String binaryNumber;

    int decimalNumber = 0;

   

 System.out.print("Enter the binary number: ");

 binaryNumber = input.nextLine();

 

 for(int i=0; i<binaryNumber.length(); i++){

     char c = binaryNumber.charAt(binaryNumber.length()-1-i);

     int digit = Character.getNumericValue(c);

     decimalNumber += (digit * Math.pow(2, i));

 }

 System.out.println(decimalNumber);

}

}

Explanation:

Create a Scanner object to be able to get input from the user

Declare the variables

Ask the user to enter the binaryNumber as a String

Create a for loop that iterates through the binaryNumber. Get each character using charAt() method. Convert that character to an integer value using Character.getNumericValue(). Add the multiplication of integer value and 2 to the power of i to the decimalNumber variable (cumulative sum)

When the loop is done, print the decimalNumber variable

U6L1 - Algorithms Solve Problems
I'm just really stuck on this and have no clue what to do.

Answers

Answer:

1. Left hand picks up card on position 1

2. Assume position 2 as the "working position"

3. Free hand picks up card on working position.

4. Compare two cards, put back the largest card on working position.

5. Increase working position by 1.

6. Go to step 3 if there is a card at the new working position.

7. Smallest card is in your hand.

A mom is planning a theme park trip for her husband, herself, and their three children. The family has a budget of $500. Adult tickets cost $25 each, and child tickets cost $25 each. Which Excel formula should be entered in cell B5

Answers

Complete question :

Sue is planning a theme park trip for her husband, herself, and her three children. She has a budget of $500. Adult tickets cost $55 each, and child tickets cost $25 each. Which formula should go in cell B4?

Answer:

=E1B1+E2B2

Explanation:

Cost of adult ticket = $55

Child ticket = $25

Number of adult = 2

Number of children = 3

Assume :

Cost of adult ticket = $55 = E1

Child ticket = $25 = E2

Number of adult = 2 = B1

Number of children = 3 = B2

The formula that should go into cell B5 in other to calculate total amount :

Total should be :

($55*2) + ($25*3)

=E1B1+E2B2

If you are writing an algorithm and you aren’t confident that you understand the problem, what can you do?

Answers

Answer:

divide it into smaller pieces

Explanation:

Usually, the main reason a programmer does not understand a problem fully is that there is too much information. The best way to try and fully understand a problem is to divide it into smaller pieces. Start off by answering the question what is the expected output for an input. Then divide each individual issue within the problem. This will allow you as a programmer/developer to create an individual solution for each individual issue within the problem and then test to make sure that the input gives the correct output.

Other Questions
Find the missing length I WILL GIVE BRAINLIEST The air bubbles and spongy texture of bread are due to which process?a. Lactic acid fermentationb. Glycolysisc. Alcoholic fermentationd. The Krebs Cycle the rio grande river is a border between which two countries?A - mexico and guatemala B - the U.S. and mexico C - venezuela and brazil D - chile and argentina Which statement describes a difference between authoritarian governmentand constitutional government? Thursday, 11 OctoberPresently they descried people, naked, and the Admiral landed in the boat, which was armed, along with MartinAlonzo Pinzon and Vincent Yanez his brother, captain of the Nina. ... The Admiral called upon the two Captains, andthe rest of the crew who landed, as also to Rodrigo de Escovedo notary of the fleet, and Rodrigo Sanchez, of Segovia,to bear witness that he before all others took possession (as in fact he did) of that island for the King and Queen hissovereigns, making the requisite declarations, which are more at large set down here in writing. Numbers of thepeople of the island straightway collected together. Here follow the precise words of the Admiral: "As I saw that theywere very friendly to us, and perceived that they could be much more easily converted to our holy faith by gentlemeans than by force, I presented them with some red caps, and strings of beads to wear upon the neck, and manyother trifles of small value, wherewith they were much delighted, andbecame wonderfully attached to us. Afterwardsthey came swimming to the boats, bringing parrots, balls of cotton thread, javelins, and many other things which theyexchanged for articles we gave them such as glass beads, and hawk's bells, which trade was carried on with theutmost good will. But they seemed on the whole to me, to be a very poor people.... Weapons they have none, norare acquainted with them, for I showed them swords which they grasped by the blades, and cut themselves throughignorance. They have no iron, their javelins being without it, and nothing more than sticks, though some have fish-bones or other things at the ends. They are all of a good size and stature, and handsomely formed. I saw some withscars of wounds upon their bodies, and demanded by signs the of them; they answered me in the same way, thatthere came people from the other islands in the neighborhood who endeavored to make prisoners of them, and theydefended themselves. I thought then, and still believe that these were from the continent. It appears to me, that thepeople are ingenious, and would be good servants and I am of opinion that they would very readily becomeChristians, as they appear to have no religion. They very quickly learn such words as are spoken to them. If it pleaseour Lord, I intend at my return to carry home six of them to your Highnesses, that they may learn our language."These are the words of the Admiral.Part BWhat does Columbus describe the people of Hispaniola? List at least three pieces of evidence What is the starting point for an argument? Why do we sometimes use roman numerals in naming ionic compounds? i need help pls! Which one do i put in front before the french sentences? Do i put le or la? Help me pls thank u Ratei me from 1-10 lol Diego drank x ounces of juice. Lin drank 1/8 less than that. When 70.4 g of benzamide (C7H7NO) are dissolved in 850. g of a certain mystery liquid X, the freezing point of the solution is 2.7 C lower than the freezing point of pure X. On the other hand, when 70.4 g of ammonium chloride (NH CI) are dissolved in the same mass of X, the freezing point of the solution is 9.9 C lower than the freezing point of pure X. Required:Calculate the van't Hoff factor for ammonium chloride in X. This is a single strand of DNA. Write out the corresponding strand we would findon the other side.T-A-C-A-T-G-C-A-A-G-T-C-G-T-C-C-G-T-T-T-C-C-A-G What did Booker T. Washington argue Will give 15 point Easy math please explain your work "Let us not seek to satisfy our thirst for freedom by drinking from the cup of bitterness and hatred" This is a quote that was taken from Dr. King's "I Have a Dream Speech". In 1 or 2 paragraphs explain what you think that it means and why it's important in today's society. Pls help I will give u brain master Can our cells undergo photosynthesis? Why or why not? Which of the following likely motivated Stowe to write Uncle Tom's Cabin? Select all that apply.her feminist tendencies.the death of her sonthe Fugitive Slave Acther religious background Find the diameter and circumference of the circle below : r=8cm. Evaluate a + b if a = 0 and b = -20