Answer:
Welcome to Gboard clipboard, any text you copy will be saved here.
Why linked list is better than an array?
Your job is to protect your company's information assets. What security objectives
should you address?
1) Assets, liabilities, and threats
2) Common vulnerabilities and exposures
3) Confidentiality, integrity and availability
4) Risks, threats and vulnerabilities
Answer:3
Explanation: The CIA Triangle is the basis of all Security related needs.
hi hi hihihihihivvv hihihihihihi v vhi
Answer: hihihihihihiihihi hihihihiihihih
Explanation: hi.
Brainliest if correct. 5. if you wanted b show how many employees at your office ride a bicycle to work in
comparison to the number of employees who drive a car, take public transportation,
or walk wihat visual would be best? (1 point)
Answer:
I believe a bar graph would be best for me. What are your answer options though?
Explanation:
x = 9 % 2
if (x == 1):
print ("ONE")
else:
print ("TWO")
Answer:
Hewo There!!
_______________________
Simplify 9 % ⋅ 2 .
x = 0.18
_______________________
“One’s life has value so long as one attributes value to the life of others, by means of love, friendship, indignation and compassion.” — Simone De Beauvoir
_______________________
Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn
Please hurry, it's a test! 30 POINTS. :)
What computing and payment model does cloud computing follow?
Cloud computing allows users to_____ computing resources and follows the ______
payment model.
1. Buy, Own, Rent, Sell
2. pay-as-you-go, pay-anytime-anywhere, pay-once-use-multiple-times
Please debbug this code for me
public class SavingAccount { // interest rate for all accounts private static double annualInterestRate = 0; private final double savingsBalance; // balance for currrent account // constructor, creates a new account with the specified balance public void SavingAccount( double savingsBalance ) { savingsBalance = savingsBalance; } // end constructor // get monthly interest public void calculateMonthlyInterest() { savingsBalance += savingsBalance * ( annualInterestRate / 12.0 ); } // end method calculateMonthlyInterest // modify interest rate public static void modifyInterestRate( double newRate ) { annualInterestRate = ( newRate >= 0 && newRate <= 1.0 ) ? newRate : 0.04; } // end method modifyInterestRate // get string representation of SavingAccount public String toString() { return String.format( "$%.2f", savingsBalance ); } // end method toSavingAccountString } // end class SavingAccount
Answer:
/
Explanation:
VPN or Proxy is safer?
Consider that a man is watching a picture of a Black Horse. He receives an external stimulus from input channel. Man gains some information about the picture from external environment and stores it in the memory. Once the initial information is gained, it is compared with the memory and then stores it. Finally upon perceiving and storing the information in memory Man says that the picture contains Black horse.
Based on the information-processing model, cognition is conceptualized as a series of processing stages where perceptual, cognitive, motor processors are organized in relation to one another.
You are required to identify and elaborate that which cognitive processes i.e. Perceptual system, Cognitive system, and motor system are involved when man interacts with the picture and also that which input channel is responsible in taking information to the brain.
The first Cognitive Process that was in play according to the excerpt is Perceptual System. It is also called Perceptual Representation and Intelligence.
This function of the brain is responsible for the sensory input which may be auditory (sounds), visual (pictures), and kinesthetic (emotions or feelings).
So the Perceptual Cognitive system (visual) relays the input (image of the horse to his brain, then it is stored.
This next stage is handled by the memory. Memory (a crucial process for learning) is a cognitive function that enables us to code, store, and recover information from the past.
Notice that the man perceived the information, and as the input interacts with the memory, he is able to say that the image or picture contains a black horse because there is a recall function.
Learn more about cognitive functions in the link below:
https://brainly.com/question/7272441
how to download film
in which country was Abacus build
if ur smart don't searh
Answer:
Abacus many be built first in China
Explanation:
I know Abacus ^o^
Answer:
Hewo There!!!!
__________________
China- i thinkkk maybe?
__________________
“Hold fast to dreams,
For if dreams die
Life is a broken-winged bird,
That cannot fly.”
― Langston Hughes
__________________
Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn
Window server how it works
Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following algorithm. There is no need to create a class similar to how Java works.
3.1. User enters the first number.
3.2. User enters the second number.
3.3. If the first number is less than, greater than, or equal the second number, a message is displayed.
Please Help me. Thank You!
Marry Christmas!
x = int(input("Enter first number\n"))
y = int(input("Enter second number\n"))
if x > y:
print(x, "is greater than", y)
elif x < y:
print(x, "is less than", y)
else:
print(x, "is equal to", y)
i'm not the greatest coder, but it works :)
displaying advertisements specific or users internet based on their buy preference is called ._________.
please write an Introduction on intrusion detection system and prevention system
PLEASE
Answer:
An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.
Write a python program to calculate the sum of three numbers and as well require the user to input the numbers.
Answer:
numbers = []
for i in range(3):
numbers.append(eval(input("Enter number: ")))
print('Sum is:', sum(numbers))
Explanation:
You want to use a loop to prevent repeating your code.
Answer:
numbers = []
for i in range(3):
numbers.append(eval(input("Enter number: ")))
print('Sum is:', sum(numbers))
This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI
Answer:
GUI
Explanation:
write down the application areas of an ICT?
Answer:
These are internet, telephone, mobile phone, TV, radio and office automation systems such as word-processing, fax, audio conferencing, video conferencing, computer conferencing, multimedia, etc, through the use of networks of satellite and fiber optics..
Explanation:
hope its help
C++
see attached file for quesion
Which of the following will you do in step X in the following series of clicks to change the bounds of
a chart axis: Chart > Chart Tools > Format tab > Current Selection> Format Selection > Format Axis
> Axis Options > Vertical Axis crosses > At Category number > X?
O Expand Labels, then under Interval between labels, select Specify interval unit and type the
number you want in the text box.
O Expand Tick Marks, and then in the Interval between tick marks box, and type the number that
you want
N
Type the number that you want in the text box.
O Expand Tick Marks, and then select the options that you want in the Major type and Minor type
boxes.
In order to change the bounds of a chart axis after performing the aforementioned series of clicks, at step X: C. Type the number that you want in the text box.
A step chart can be defined as a line chart that uses both the vertical and horizontal lines to connect two (2) data points. Thus, it enables an end user to see the exact point on the X-axis when there is a change in the Y-axis.
In Microsoft Excel, the series of clicks that are used to change the bounds of a chart axis are:
Click on chart.Select chart tools and then format tab.Select the current selection and then format selection.Click on format axis and then axis options.Click on vertical axis crosses.At category number, you should type the number that you want in the text box.In conclusion, typing the number that you want in the text box is the action that should be performed at step X.
Read more on step chart here: https://brainly.com/question/9737411
Suppose a password must have at least 8, but no more than 12 characters, where each character can be either:
Answer:
A combination of uppercase letters, lower case letters, numbers, and special characters.
Explanation:
A password is a word that permit you to register, log or sign in a site.
difference between syntax error and semantics
error
Answer:
The syntax error is an incorrect construction of the source code, whereas a semantic error is erroneous logic that produces the wrong result when executed.
Explanation:
Syntax
It refers to the rules of any statement in the programming language.
Semantics
It refers to the meaning associated with any statement in the programming language
Implement a class named BankAccount. Every bank account has a starting balance of $0.00. The class should implement methods to accept deposits and make withdrawals. __init__(self): Sets the balance to 0. deposit(self, amount): Deposits money. Return True if transaction is successful. Return False if amount is less than 0 and ignore the transaction. widthdraw(self, amount): Withdraws money. Return True if transaction is successful. Return False if amount is more than the balance and ignore the transaction.
The BankAccount class implementation in Python 3.8 is found in the attached image
The deposit method uses an if statement to check if the amount to be deposited is negative. If so, it does nothing, but returns False signifying that the transaction failed.
However, if the test finds out that the amount to deposit is positive or zero, the deposit method increments the balance, then returns True, signifying a successful transaction.
The withdraw method is similar, but this time, it tests if the amount to be withdrawn is greater than the available balance. If so, it ignores the transaction, and returns False.
If the withdrawal amount is less or equal to the available balance, the withdraw method decrements the available balance, then returns True, signifying a successful transaction.
Learn more about Python programming here https://brainly.com/question/20379340
describe the process of terminating a crossover cable
what is the full form of computer
Answer:
Common Operating Machine Purposely Used for Technological and Educational Research
Explanation:
what is operating system?
The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
Read two numbers from user input. Then, print the sum of those numbers.
Hint -- Copy/paste the following code, then just type code where the question marks are to finish the code.
num1 = int(input())
num2 = ?
print(num1 + ?)
Answer:
First ? - int(input())
Second ? - num2
Explanation:
This works because we are just mimicing the first input in your first variable.
The second one is adding them together.
Don't remember to give me brainliest :)
You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store. This would be an example of a(n):
The given situation is an example of shoplifting.
What is hardware?All the mechanical components made of simply plastic or metal used in houses or industries are termed as hardware.
You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store.
This gives an idea of the shoplifting, as he hold the account with them. He doesn't need to pay every time he buys anything.
This, this would be an example of shoplifting.
Learn more about hardware.
https://brainly.com/question/15232088
#SPJ2
What type of system software manages memory?
Answer:
"Operating System"
Explanation:
The type of system software that manages memory is an operating system. To manage memory, the operating system employs a number of software strategies.
What is system software?The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer.
You can converse with the computer using this method even if you don't understand its language. Memory connections are the structures that come before and after all memory areas, whether they are allocated or available.
Working memory, short-term memory, and long-term memory are the three primary categories of memory. While long-term memory stores your enduring memories, working memory and short-term memory enable you to retain and use transient information.
Therefore, an operating system is a sort of system software that controls memory.
To learn more about system software, refer to the link:
https://brainly.com/question/12908197
#SPJ2
The ratio of sparrows to bluejays at the bird sanctuary was 5 to 3 If there were 15 bluejays in the sanctuary, how many sparrows were there?