Answer:
Input or inserting data and instructions.Processing.Output or retrieving data or information.Storing data or information/file management.Controlling of devices and functions.In this area, you want to focus on which hardware, application, personnel, or department(s) will be impacted by the security policy. For instance, what type of personal devices are allowed on the network and when? Must the personnel receive formal approval before using such devices on the network? What kind of activity is allowed on a personal device? Who is responsible for granting the permission to use a device on the network?
The type of personal devices that are allowed on the network are:
LaptopsSmartphones tabletsWhat devices do BYOD have?BYOD is known to be Personal devices such as smartphones that organizations often gives permission for employees that are working from home so as to be able to have a flexible schedule and others.
Therefore, The type of personal devices that are allowed on the network are:
LaptopsSmartphones tabletsLearn more about personal device from
https://brainly.com/question/4457705
#SPJ1
Question # 9
Fill in the Blank
Complete the statement using the correct term.
The aerospace industry uses______________ simulators to train astronauts and design spacecraft.
Answer:
flight stimulators are used to train astronaut and design simple air craft
In Exercises 1–4 construct the dual graph for the map shown.
Then find the number of colors needed to color the map so
that no two adjacent regions have the same color.
Answer:
10.8 Graph Coloring
A coloring of a simple graph is the assignment of a color to each vertex of the graph so that no
two adjacent vertices are assigned the same color.
Chromatic number
The chromatic number of a graph is the least number of colors needed for a coloring of this graph.
The Four Color Theorem
The chromatic number of a planar graph is no greater than four.
10.8 pg. 733 # 3
Construct the dual graph for the map shown. Then find the number of colors needed to color the
map so that no two adjacent regions have the same color.
a
b c d e
f
At least three colors are needed to color the
graph because of triangle 4abc exists in the
graph.
10.8 pg. 733 # 7
Find the chromatic number of the given graph.
a
b
c
d
Since this graph forms two triangles, 4abd and
4bcd, we can color this graph with at least 3
colors where a and c are the same colors.
a
b
c
d
10.8 pg. 733 # 9
Find the chromatic number of the given graph.
1
ICS 241: Discrete Mathematics II (Spring 2015)
a
e
b
c
d
This graph can be colored with two colors like
shown.
a
e
b
c
d
10.8 pg. 734 # 19
The mathematics department has six committees, each meeting once a month. How many different
meeting times must be used to ensure that no member is scheduled to attend two meetings at the
same time if the committees are C1 = {Arlinghaus, Brand, Zaslavsky}, C2 = {Brand, Lee, Rosen},
C3 = {Arlinghaus, Rosen, Zaslavsky}, C4 = {Lee, Rosen, Zaslavsky}, C5 = {Arlinghaus, Brand},
and C6 = {Brand, Rosen, Zaslavsky}?
We will first draw the intersection graph of the given sets.
C1 C2
C3
C5 C4
C6
From here, it is easy to see that we need at least 5 colors like so:
C1 C2
C3
C5 C4
C6
Therefore, 5 meeting times are needed. Committees C4 and C5 can meet at the same time.
Explanation:
done-_-
what gases are involved in the process of respiration
Answer: (O(2)), nitric oxide (NO), and carbon dioxide (CO(2))
Explanation:
Explain the major hardware and software requirements that supported by Windows OS, Linux OS and Mac OS support
Answer:
You don’t have a great many choices when it comes to your computer's operating system, but the choice that you make can have wide-ranging consequences. The five OSes included here are your most viable options. That's not a huge number, but these operating systems differ distinctly in strengths and weaknesses. Four come from gargantuan commercial tech giants, while one, the Linux-based Ubuntu, is a free, open-source option. Windows and macOS are generally the most powerful in terms of hardware and software selection as well as interface conveniences and utilities, while Chrome OS is more lightweight and runs on inexpensive hardware.
Answer:
Where they are used: Desktops, laptops, smartphones, and other devices run on the Windows operating system. Computers, servers, and several embedded systems use Linux. Mac is primarily used on desktops and not recommended for servers due to its high cost.
A method for breaking a program down into smaller parts
Answer:
Top Down Design
A method for breaking a program down into smaller parts
Explanation:
Answer:
Top Down Design
A method for breaking a program down into smaller parts
Explanation:
What is the regular expression that generates the language L = {w^n x v^m, n > 0, m > 1}
The regular expression corresponding to the language L(X) ∪ L(Y) where L(X+Y) = L(X) ∪ L(Y) is X+Y.
What is regular expression?A regular expression is a pattern that the regular expression engine attempts to match in input text. A pattern consists of one or more character literals, operators, or constructs.
The most basic regular expression consists of a single literal character, such as A. It matches the first occurrence of that character in the string. If the string is Jack is a boy, it matches the A after the J. This regex can match the second a too.
Learn more about regular expression here,
https://brainly.com/question/14186204
#SPJ1
DUE IN AN HOUR PLS HELP
Random answers for points will be reported
Which one of these is an example of an output device digital pen headset keyboard mouse
Answer:headset
Explanation:because sound comes out of them
Answer:
Headset
Explanation:
It would be a headset because headsets "output sounds"
Digital pens, keyboards, and mice don't output anything.
In which of the following careers must one learn and use programming languages?
Systems Analyst
Software Engineer
Database Administrator
Computer Support Specialist
The career option dealing with the programming languages is software engineer. Thus, option B is correct.
What are programming Languages?The programming languages are given as the type of computer language that performs the task of converting the strings and graphical elements of the program in a visual program. The language has been utilizing the codes of the machine to implement the algorithm.
The career that enables the dealing with the software and the programming is software engineer. Thus, option B is correct.
Learn more about programming language, here:
https://brainly.com/question/12696037
#SPJ1
What is the ability for anyone in a society to own private property _____.
Answer:
The ability for anyone in a society to own private property incentivizes people to conserve resources and encourages entrepreneurship.
When searching for a video file on your computer, you should look for a file with which extension?
While searching for a video file on the computer, the .mp4 extension must be searched.
What is a file extension?A file extension is given as the suffix added to the file name that has the description of the type of file.
The file extensions for various types of files are different and are used for the identification of the file type. The video files have the general extension as .mp4.
Thus, while searching for a video file on the computer, the .mp4 extension must be searched.
Learn more about file extensions, here:
https://brainly.com/question/7640304
#SPJ1
The following equations estimate the calories burned when exercising (source):
Women: Calories = ( (Age x 0.074) — (Weight x 0.05741) + (Heart Rate x 0.4472) — 20.4022 ) x Time / 4.184
Men: Calories = ( (Age x 0.2017) + (Weight x 0.09036) + (Heart Rate x 0.6309) — 55.0969 ) x Time / 4.184
Write a program using inputs age (years), weight (pounds), heart rate (beats per minute), and time (minutes), respectively. Output calories burned for women and men.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('Men: {:.2f} calories'.format(calories_man))
Ex: If the input is:
49
155
148
60
Then the output is:
Women: 580.94 calories
Men: 891.47 calories
Answer:
# Women: Calories = ((Age x 0.074) - (Weight x 0.05741) + (Heart Rate x 0.4472) - 20.4022) x Time / 4.184
#Men: Calories = ((Age x 0.2017) + (Weight x 0.09036) + (Heart Rate x 0.6309) - 55.0969) x Time / 4.184
#main function to gets input for age, weight, hear rate and time and print Women and Man calorie burnt
def main():
#get user input for age, weight, hear rate and time
age = int(input("Enter your age:"))
weight = int(input("Enter your weight:"))
heartRate = int(input("Enter your heart rate:"))
time = int(input("Enter your time:"))
#calculate calories for women and men
caloriesWomen = ((age * 0.074) - (weight * 0.05741) + (heartRate * 0.4472) - 20.4022) * time / 4.184
caloriesMen = ((age * 0.2017) + (weight * 0.09036) + (heartRate * 0.6309) - 55.0969) * time / 4.184
#print calories for women and men
print("Women: %.2f calories"%caloriesWomen)
print("Men: %.2f calories"%caloriesMen)
#calling main function
main()
Explanation:
1) Above is your updated program.
2) Please copy it in python file and run
3) Below is the test output for this program
Enter your age:49
Enter your weight:155
Enter your heart rate:148
Enter your time:60
Women: 580.94 calories
Men: 891.47 calories
Use the drop-down menus to describe the Customize Ribbon dialog box,
This section lists the different tabs on the ribbon.
This component helps the user reorder tabs along the ribbon.
This section lists commands to be added to or removed from the ribbon.
In Scratch, what option in the Sounds tab would you select if you wanted to use a sound file already on your local computer?
Choose a Sound
Record
Surprise
Upload
Answer:
upload
Explanation:
give an example of an algorithm in c++ that can be used to avoid car collision using four infra red sensors
Answer:
Since entering the 21st century, the number of vehicles has increased exponentially, and the number of vehicles and drivers has further increased [1]. How to reduce the number of traffic accident deaths and economic losses has become an important issue in the context of such a large number of vehicles [2].
In recent years, some research studies have been made on the collision warning algorithm. The existing collision warning algorithms are mainly divided into two categories, namely, the Safety Time Algorithm and the Safety Distance Algorithm [3]. The safety time logic algorithm compares the collision time between the two workshops with the safety time threshold to determine the safety status. The safety time algorithm mainly uses Time to Collision (TTC) as the research object [4]. The safety distance model refers to the minimum distance between the vehicle and the obstacle, which is also the distance the vehicle needs to maintain to avoid the collision with the obstacle under the current conditions of the vehicle [5].
Explanation:
Question 2 of 25
How could a video's file size be reduced so that it will take up less space on a
computer's hard drive?
A. By shooting it at a lower resolution
B. By shooting it at a higher resolution
C. By shooting it at a higher frame rate
D. By sampling the sound at the maximum rate
In object-oriented programming, what is a class?
A design approach that divides well-defined tasks into modules, functions, or steps
A planning method that focuses on objects rather than functions
A system that categorizes the different types of actions and functions
A template with attributes and behaviors for an object
Object-oriented programming is the programming model in a computer that uses objects and data to organize the design. In OOP, class is a template that includes real values. Thus, option d is accurate.
What is OOP?Object-oriented programming (OOP) is the approach to designing that uses objects instead of variables and functions. The programmers create codes in OOP that interacts and performs the function.
Programming languages like C⁺⁺, Python, and Java are object-oriented programs. The known object in OPP is called a class that contains the data that makes up the objects and methods.
Therefore, the class is the building block of OOP.
Learn more about OOP here:
https://brainly.com/question/26709198
#SPJ1
Characteristics of VR headsets
In the event of a fire, the most appropriate failure policy is a policy.
In the event of a fire, the most appropriate failure policy is Fail open policy.
What is fail open policy?A system set to fail open does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important than authentication.
Fail Open systems allow access as opposed to Fail Closed systems that block access. When handling errors, developers need to carefully choose what actions to take.
Learn more about fire policies here,
https://brainly.com/question/15020213\
#SPJ1
Coding final. The code needs to be in python. See picture for information.
Answer:
Explanation:
def running_sum():
num = int(input("Enter a number: "))
limit = int(input("Enter a limit: "))
sum = num
while sum < limit or sum == limit:
number = int(input("Enter another number: ")
sum+=num
if sum==limit:
print(sum)
Write a question that the database will understand. Which records do not contain "sold"?
a. <>sold
b. /=sold
c. is sold i
d. >=sold
Answer:
b
Explanation:
b
During a system board replacement, a new TPM is installed. What is the next best step to take?
The step to install TPM involves the connection of the chip to the connector and snapping of the bolt in its place by pressing down the plastic bolt.
What is a TPM?A TPM is given as the Trusted Platform Module. It is a computer chip that enables the storage of the artifacts at a safe location for the authentication of the system.
In the system board replacement, the TPM installation is followed by the insertion of the TPM chip in the TPM connector, and pressing down the security rivet in the form of the plastic bolt to make the bolt snap in its place.
Learn more about TPM, here:
https://brainly.com/question/15202666
#SPJ1
Allan is a candidate for the position of Mayor in his town. He is worried about using email for the fear that it may be intercepted by the government and used by his opponent. What law protects his email from being intercepted by the government?
The
and its proposed update strengthen the online privacy of users by increasing requirements for governmental access to the stored data.
Answer: Electronic Communications Privacy Act
Answer:
This is correct.
Explanation:
I took the test and got it right.
BestMed Medical Supplies Corporation sells medical and surgical products
and equipment from more than 700 manufacturers to hospitals, health clinics,
and medical offices. The company employs 500 people at seven locations in
western and midwestern states, including account managers, customer service
and support representatives, and warehouse staff. Employees communicate by
traditional telephone voice services, email, instant messaging, and cell phones.
Management is inquiring about whether the company should adopt a system for
unified communications. What factors should be considered? What are the key
decisions that must be made in determining whether to adopt this technology?
Use the web, if necessary, to find out more about unified communications and
its costs.
Management of the company should adopt a system for unified communications.
What is unified communications?Unified Communications (UC) is a term that connote a kind of a phone system that uses or “unifies” a lot of communication methods within one or the same business.
Note the one's business can be able to communicates in a lot of ways such as phone calls, video conferencing and as such, Best Med Medical Supplies Corporation should be considered adopting a system for unified communications.
They should look into:
The level of productivityTotal costsCompatibility with their business model Productivity.Learn more about communications from
https://brainly.com/question/26152499
#SPJ1
Assignment Type : Ai using prolog language
• AI Search Techniques
o The search algorithms can solve this problem easily so you must implement one of the uninformed search techniques and one of the informed search techniques to solve the problems
I. Problem #1
1. Problem#1 Overview
Given a list of positive integer Items whose elements are guaranteed to be in sorted ascending order, and a positive integer Goal, and Output is a list of three elements [A,B,C] taken from items that together add up to goal. The Output must occur inside the items list in that order (ascending order).
?-threeSum([3,8,9,10,12,14],27,Output).
Output=[8,9,10];
Output=[3,10,14].
?-threeSum([2,4,8,10,12,14],25,Output).
false.
?-threeSum([2,4,8,12,14,16],20,Output).
Output=[2,4,14].
?-threeSum([1,2,3,4,5,6,7,8,9],12,Output).
Output=[1,2,9];
Output=[1,3,8];
Output=[1,4,7];
Output=[1,5,6];
Output=[2,3,7];
Output=[2,4,6];
Output=[3,4,5].
2. Problem#1 Components:
This program consists of the following engines:
• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using depth first search or greedy algorithm to get the path. This algorithm should be implemented in prolog.
• You must solve this problem twice (depth first search and greedy algorithm)
II. Problem #2
1. Problem#2 Overview
Daisy loves playing games with words. Recently, she has been playing the following Deletive Editing word game with Daniel.
Daisy picks a word, for example, "DETERMINED". On each game turn, Daniel calls out a letter, for example, 'E', and Daisy removes the first occurrence of this letter from the word, getting "DTERMINED". On the next turn, Daniel calls out a letter again, for example, 'D', and Daisy removes its first occurrence, getting "TERMINED". They continue with 'I', getting "TERMNED", with 'N', getting "TERMED", and with 'D', getting "TERME". Now, if Daniel calls out the letter 'E', Daisy gets "TRME", but there is no way she can get the word "TERM" if they start playing with the word "DETERMINED".
Daisy is curious if she can get the final word of her choice, starting from the given initial word, by playing this game for zero or more turns. Your task it help her to figure this out.
% deletiveEditing(Initial,End).
Each word consists of at least one and at most 30 uppercase English letters; Initial is the Daisy's initial word for the game; End is the final word that Daisy would like to get at the end of the game.
?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','R','M','E']).
True.
?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','E','R','M']).
False.
?- deletiveEditing(['D','E','I','N','S','T','I','T','U','T','I','O','N','A','L','I','Z','A','T','I','O','N'], ['D','O','N','A','T','I','O','N']).
True.
?- deletiveEditing(['C','O','N','T','E','S','T'], ['C','O','D','E']).
False.
?- deletiveEditing(['S','O','L','U','T','I','O','N'], ['S','O','L','U','T','I','O','N']).
True.
2. Problem#2 Components:
This program consists of the following engines:
• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using informed search algorithm (greedy algorithm) to get the path.
This algorithm should be implemented in prolog.
Answer:
Explanation:
Assignment Type : Ai using prolog language
• AI Search Techniques
o The search algorithms can solve this problem easily so you must implement one of the uninformed search techniques and one of the informed search techniques to solve the problems
I. Problem #1
1. Problem#1 Overview
Given a list of positive integer Items whose elements are guaranteed to be in sorted ascending order, and a positive integer Goal, and Output is a list of three elements [A,B,C] taken from items that together add up to goal. The Output must occur inside the items list in that order (ascending order).
?-threeSum([3,8,9,10,12,14],27,Output).
Output=[8,9,10];
Output=[3,10,14].
?-threeSum([2,4,8,10,12,14],25,Output).
false.
?-threeSum([2,4,8,12,14,16],20,Output).
Output=[2,4,14].
?-threeSum([1,2,3,4,5,6,7,8,9],12,Output).
Output=[1,2,9];
Output=[1,3,8];
Output=[1,4,7];
Output=[1,5,6];
Output=[2,3,7];
Output=[2,4,6];
Output=[3,4,5].
2. Problem#1 Components:
This program consists of the following engines:
• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using depth first search or greedy algorithm to get the path. This algorithm should be implemented in prolog.
• You must solve this problem twice (depth first search and greedy algorithm)
II. Problem #2
1. Problem#2 Overview
Daisy loves playing games with words. Recently, she has been playing the following Deletive Editing word game with Daniel.
Daisy picks a word, for example, "DETERMINED". On each game turn, Daniel calls out a letter, for example, 'E', and Daisy removes the first occurrence of this letter from the word, getting "DTERMINED". On the next turn, Daniel calls out a letter again, for example, 'D', and Daisy removes its first occurrence, getting "TERMINED". They continue with 'I', getting "TERMNED", with 'N', getting "TERMED", and with 'D', getting "TERME". Now, if Daniel calls out the letter 'E', Daisy gets "TRME", but there is no way she can get the word "TERM" if they start playing with the word "DETERMINED".
Daisy is curious if she can get the final word of her choice, starting from the given initial word, by playing this game for zero or more turns. Your task it help her to figure this out.
% deletiveEditing(Initial,End).
Each word consists of at least one and at most 30 uppercase English letters; Initial is the Daisy's initial word for the game; End is the final word that Daisy would like to get at the end of the game.
?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','R','M','E']).
True.
?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','E','R','M']).
False.
?- deletiveEditing(['D','E','I','N','S','T','I','T','U','T','I','O','N','A','L','I','Z','A','T','I','O','N'], ['D','O','N','A','T','I','O','N']).
True.
?- deletiveEditing(['C','O','N','T','E','S','T'], ['C','O','D','E']).
False.
?- deletiveEditing(['S','O','L','U','T','I','O','N'], ['S','O','L','U','T','I','O','N']).
True.
2. Problem#2 Components:
This program consists of the following engines:
• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using informed search algorithm (greedy algorithm) to get the path.
This algorithm should be implem
write three questions you have about jow geography shapes economic activies in Australia and the pacific…
Answer:
Are the trades gonna be harder or easier?
How did geography shape conomic activies in Australia and the pacific?
How did the land get seperated?
ps im not good with these kind of stuff dk y u chose me to do it
ANSWER QUICKLY!!!
Ed has taken up a freelancing project to build a website. The website should be easy to navigate and lighter to load. He has brilliant HTML and
CSS coding skills. However, he doesn't have enough time to build the website from scratch. What can he do to create a relatively light website in
a short span of time?
In the above scenario, he create a relatively light website in a short span of time by using option A.
What is a website?A website is known to be a composition of web pages and similar or linked content that is known by a common domain name and it is one that is often published on web server.
Note that In the above scenario, he create a relatively light website in a short span of time by using option A as it is the right choice to make.
Learn more about website from
https://brainly.com/question/13171394
#SPJ1
Connect research concepts to their definitions
what is another word for low level language
Answer:
machine code or assembly language
Explanation:
Because of the low abstraction between the language and machine language, low-level languages are described as "close to the hardware"
wikipedia
Answer:
Another word for Low Level Language is 'Machine-Oriented Language'.
there are two types of Low Level Languages:
1 ) Machine Language
2) Assembly Language
hope that helps...
ANSWER QUICKLY!!!
What is an advantage of digital portfolios?
Answer:
transmit
Explanation: