When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. But, she does not like to remember too many passwords. She wants to keep only one password. So, she tried to change the password again to her original password. But, she cannot change the password. Why can’t she change the password

Answers

Answer 1

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.


Related Questions

Which character goes at the end of a line of code that starts with if?

Answers

Answer:

Explanation:

tttttttttttt

Provide the code to insert a subtitle track named "Spanish Version" using the track text in the spanish.vtt file and the Spanish source language. Make this the active track in the video clip.

Answers

Answer:

See explaination

Explanation:

<video id="video" controls preload="metadata"> <source src="video/sintel-short.mp4" type="video/mp4"> <source src="video/sintel-short.webm" type="video/webm"> <track label="English" kind="subtitles" srclang="en" src="captions/vtt/sintel-en.vtt" default> <track label="Deutsch" kind="subtitles" srclang="de" src="captions/vtt/sintel-de.vtt"> <track label="Español" kind="subtitles" srclang="es" src="captions/vtt/sintel-es.vtt"> </video>

Write a program using integers userNum and x as input, and output userNum divided by x four times. Ex: If the input is 2000 2, the output is: 1000 500 250 125 Note: In Coral, integer division discards fractions. Ex: 6 / 4 is 1 (the 0.5 is discarded).

Answers

Answer:

import java.util.Scanner;

public class Division {

   public static void main(String[] args) {

    Scanner in = new Scanner(System.in);

       System.out.println("Enter an integer");

       int userNum = in.nextInt();

       System.out.println("Enter the divisor");

       int x = in.nextInt();

           int first = userNum/x;

           int second = first/x;

           int third = second/x;

           int fourth = third/x;

       System.out.println(first+" "+second+" "+third+" "+fourth);

   }

}

Explanation:

In Java programming langauge use the scanner class to receive the values from the user (userNum and x)Carryout integer division of userNum/x to obtain the first numberRepeat the sam step to obtain the second, third and fourth numberOutput the numbers to the user

The student's question was about writing a program to divide an integer by another integer four times using integer division. The provided code is written in Python, demonstrating the process of capturing input and repeatedly dividing and outputting the result.

To solve the student's question, we need to create a simple program that takes two integers as input, userNum and x, and outputs the result of userNum divided by x four times. Each division operation will use integer division, which discards any fractions that might result from the division.

Example Code in Python:

Assuming they are learning programming using Python, which is common in high school:

userNum, x = map(int, input("Enter two integers separated by a space: ").split())
for _ in range(4):
   userNum //= x
   print(userNum, end=' ')
This code snippet reads two integers from the user, then performs integer division of userNum by x in a loop that runs four times. After each division, the program prints the current value of userNum, followed by a space.

The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer per line and the code works correctly in that case. If any of the lines don't contain just an integer, than this code fails. Fix this code so that it ignores any lines that don't contain integers instead of raising an exception. Do this with try/except blocks. Your code should still return the list of integers from the lines that contain integers.

Answers

Answer:

Check the explanation

Explanation:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

 

File.txt:

Kindly check the output below.

In this exercise we have to use the knowledge of computational language in python to write the code.

This code can be found in the attached image.

To make it simpler the code is described as:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

See more about python at brainly.com/question/22841107

XYZ is a large real estate firm. Their core competence is their understanding of the real estate market, and their understanding of their customers and the customer needs. Their most critical tools are their CRM and email servers. They are growing, and so is their customer list and their IT and marketing costs are growing at an alarming rate. They currently use managed services to run their CRM, email, etc software but they have had to deal with significant delays as each growth spurt is bogged down by the time and cost it takes to provision new servers, install the software, test it and bring it online. Which cloud delivery model would be best suited for them?

Answers

Answer:

SaaS is the correct answer to the given question .

Explanation:

The saas is known as "software as a service is a model " In the software as a service is a model the software is authorized and distributed only when  software is approved on a subscription basis also it is distributed in the centralized manner .

The cost of software as a service is a model is not so expensive as compared to the other model  also the software as a service model is more Integrated  and extensible as compared to the other model of the cloud delivery.According to the given question only the SaaS i.e "  software as a service " model is best to implement cloud delivery.

Final answer:

XYZ's real estate firm should adopt a Software-as-a-Service (SaaS) cloud delivery model to tackle growth-related IT and marketing cost increases, ensuring scalability, reliability, and a focus on core business activities.

Explanation:

For a large real estate firm like XYZ, which is experiencing rapid growth and increasing IT and marketing costs, the most suited cloud delivery model would be Software-as-a-Service (SaaS). This model provides access to applications over the internet with flexibility and scalability. SaaS applications are updated regularly in the cloud, offering enhanced responsiveness without the need for XYZ to bear the costs of server provisioning, software installation, and maintenance.

Using SaaS for their CRM and email servers allows for a cost-effective approach with a subscription-based model that adjusts easily with the company's growth. Additionally, given the criticality of these tools for XYZ, the SaaS model will ensure uptime and reliability while delivering sophisticated features and functionalities that cater to the firm's understanding of the real estate market and customer needs.

Moreover, as echoed in the cases of Scandic Hotels and Zalando, relying on cloud services will enable XYZ to focus on their core business activities and customer engagement without being bogged down by the complexities of IT infrastructure management.

the eight bytes in the words y and z. If a byte is the code for a decimal number, output it to the console. Otherwise, simply ignore it and examine the next byte. The program must be a loop. That means that you must write a loop that will execute eight times to examine each byte, output if necessary, and continue. End the program as usual with a syscall 10. After completing the program answer this question: What numbers are output?

Answers

Answer:

See explaination

Explanation:

MIPS PROGRAM :-

.data

y: .word 0x32774b33

z: .word 0x2a276c39

y_prompt: .asciiz "Y= "

z_prompt: .asciiz "Z= "

new_line: .asciiz "\n"

.text

main:

la $s0, y

la $s1, z

li $t0, 8

loop:

beqz $t0, END_OF_LOOP

# checking fo y word

lb $t1, 0($s0)

#checking for whether the byte is decimal or not

li $t2, '0'

bltu $t1, $t2, check_for_z

li $t2, '9'

bltu $t2, $t1, check_for_z

#print new line

li $v0, 4

la $a0, new_line

syscall

#print y prompt

li $v0, 4

la $a0, y_prompt

syscall

#print the value

li $v0, 1

add $a0, $zero, $t1

syscall

check_for_z:

# checking fo z word

lb $t1, 0($s1)

#checking for whether the byte is decimal or not

li $t2, '0'

bltu $t1, $t2, next_element

li $t2, '9'

bltu $t2, $t1, next_element

#print new line

li $v0, 4

la $a0, new_line

syscall

#print y prompt

li $v0, 4

la $a0, z_prompt

syscall

#print the value

li $v0, 1

add $a0, $zero, $t1

syscall

next_element:

addi $s0, $s0, 1

addi $s1, $s1, 1

#decrease the counter

addi $t0, $t0, -1

j loop

END_OF_LOOP:

li $v0,10

syscall

Write a SQL query to find the population of the planet named 'Caprica' -- 10 points Find the first name, last name, and age of people from bsg_people whose last name is not 'Adama' -- 10 points Find the name and population of the planets with a population larger than 2,600,000,000 -- 10 points Find the first name, last name, and age of people from bsg_people whose age is NULL -- 12 points

Answers

The question is incomplete! Complete question along with answer and step by step explanation is provided below.

Please find the attached question.

Answer:

a) SQL Query:

SELECT population

FROM bsg_planets

WHERE name='Caprica';

b) SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE lname!='Adama';

c) SQL Query:

SELECT name, population

FROM bsg_planets

WHERE population > 2600000000

d) SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE age IS NULL;

Explanation:

a) Write a SQL query to find the population of the planet named 'Caprica'

Syntax:

SELECT  Column

FROM TableName

WHERE Condition;

For the given case,

Column = population

TableName  = bsg_planets

Condition = name='Caprica'

SQL Query:

SELECT population

FROM bsg_planets

WHERE name='Caprica';

Therefore, the above SQL query finds the population of the planet named 'Caprica' from the table bsg_planets.

b) Find the first name, last name, and age of people from bsg_people whose last name is not 'Adama'

Syntax:

SELECT  Column1, Column2, Column3

FROM TableName

WHERE Condition;

For the given case,

Column1 = fname

Column2 = lname

Column3 = age

TableName  = bsg_people

Condition = lname!='Adama'

SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE lname!='Adama';

Therefore, the above SQL query finds the first name, last name and age of people whose last name is not 'Adama' from the table bsg_people.

c) Find the name and population of the planets with a population larger than 2,600,000,000

Syntax:

SELECT  Column1, Column2

FROM TableName

WHERE Condition;

For the given case,

Column1 = name

Column2 = population

TableName  = bsg_planets

Condition = population > 2600000000

SQL Query:

SELECT name, population

FROM bsg_planets

WHERE population > 2600000000

Therefore, the above SQL query finds the name and population of the planets with a population larger than 2,600,000,000 from the table bsg_planets.

d) Find the first name, last name, and age of people from bsg_people whose age is NULL

Syntax:

SELECT  Column1, Column2, Column3

FROM TableName

WHERE Condition;

For the given case,

Column1 = fname

Column2 = lname

Column3 = age

TableName  = bsg_people

Condition = age IS NULL

SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE age IS NULL;

Therefore, the above SQL query finds the first name, last name and age of people whose age is NULL from the table bsg_people.

Answer:

SQL Query : select population from bsg_planets where name='Caprica';

SQL Query : select fname,lname,age from bsg_people where lname!='Adama';

SQL Query : select name,population from bsg_planets where population > 2600000000;

SQL Query : select fname,lname,age from bsg_people where age='NULL';

Explanation:

using MySQL Workbench.

SQL Query : select population from bsg_planets where name='Caprica';

Because this sql query will return the population from bsg_planets where the name is Caprica;

SQL Query : select fname,lname,age from bsg_people where lname!='Adama';

Because this SQL query will return the first name ,last name and age from the bsg_people where last name is not adama.

SQL Query : select name,population from bsg_planets where population > 2600000000;

Because this SQL query will return the name and population where population is greater than 2600000000

SQL Query : select fname,lname,age from bsg_people where age='NULL';

Because this SQL query will return the first name ,last name and age from the bsg_people where age is NULL.

Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to different modules of your network design. Document whether you will use public or private addressing for each module. Document whether you will use manual or dynamic addressing for each module. Specify where (if anywhere) route summarization will occur.

Answers

Answer:

Given that: Design scenario - page 197 has a continuation of the chapter 1 design scenario for ElectroMyCycle

Explanation:

See attached image

Final answer:

An IP addressing scheme for ElectroMyCycle involves using private addresses for internal networks with a combination of manual and dynamic addressing, public addresses for the DMZ, and route summarization at the router connecting to the ISP.

Explanation:

To design an IP addressing scheme for ElectroMyCycle, one must consider both the size of the network and the security requirements. The following is a tentative plan:

Headquarters: Use private addressing (e.g., 192.168.1.0/24) because these IP addresses do not need to be routable to the Internet. Dynamic addressing through DHCP can be applied here for ease of management.

Production Facility: Use a separate block of private addresses (e.g., 192.168.2.0/24) and manual addressing for fixed assets like servers, while dynamic addressing can be used for employee devices.

Sales Offices: Smaller subnets of private addresses (e.g., 192.168.3.0/28) with dynamic addressing would be appropriate.

DMZ (Demilitarized Zone): This area, which contains public-facing servers, should use public IP addresses for accessibility from the Internet. Manual addressing is recommended for these critical assets.

Route summarization can occur at the router connecting the headquarters to the ISP, summarizing the multiple private subnets into a single entry in the routing table to simplify the routing process and reduce overhead.

1.3 Code Practice edhisive

Answers

Answer:

edhesive

Explanation:

Final answer:

The question is related to the practice of ethical guidelines in software engineering, focusing on the importance of following a professional code of conduct. This college-level topic is covered by resources such as CK-12, LibreTexts, and IEEE-CS/ACM Joint Task Force, providing exercises, ethical frameworks, and science practices essential in a computer science curriculum.

Explanation:

The Code Practice edhesive refers to exercises and ethical guidelines in software engineering. The exercise appears to be related to the application of the Software Engineering Code of Ethics and Professional Practice, which is essential for aspiring software engineers to learn and follow to ensure they act responsibly and professionally in their field.

In the context of computer science and technology education, such practices are commonly used to instill a sense of ethical responsibility and to prepare students to face various real-world scenarios that they may encounter in their professional careers. The content referenced from CK-12, LibreTexts, and the IEEE-CS/ACM Joint Task Force provides essential guidelines, exercises, and anecdotal historical investigations that enrich the learning experience.

Furthermore, understanding Science Practices through different exercises, including sections on the scientific method, the role of models, and the appropriate use of mathematics, is crucial in developing a well-rounded software engineering skill set. Materials shared under various licenses offer exercises and solutions to reinforce these concepts.

Write a script that will generate random integers in the range from

0 to 50, and print them, until one is finally generated that is greater

than 25. The script should print how many attempts it took.

Answers

Answer:

Explanation:

Let's do this in Python, we shall use the package random to generate a random double between 0 and 1. Then we multiply it with 50 and covert to integer to get a random integer between 0 and 50. Place a While function with condition to stop when it's greater than 25

from random import random

attempts = 1

random_int = int(random()*50)

print(random_int)

print("This is attempt " + attempts)

while random_int <= 25:

    attempts += 1

    random_int = int(random()*50)

    print(random_int)

    print("This is attempt " + attempts)

The length of a hailstone sequence is the number of terms it contains. For example, the hailstone sequence in example 1 (5, 16, 8, 4, 2, 1) has a length of 6 and the hailstone sequence in example 2 (8, 4, 2, 1) has a length of 4. Write the method hailstoneLength(int n), which returns the length of the hailstone sequence that starts with n. /** Returns the length of a hailstone sequence that starts with n, * as described in part (a). * Precondition: n > 0 */ public static int hailstoneLength(int n)

Answers

Answer:

Following are the program to this question:

#include <iostream> //defining header file

using namespace std;

int hailstoneLength(int n) //defining method hailstoneLength

{

int t=1; //defining integer variable assign  

while(n!=1) //define a loop that checks value is not equal to 1

{

if(n%2==0) // check even number condition

{

n=n/2; // divide the value by 2 and store its remainder value in n

t++; //increment value of t by 1.

}

else

{

n=n*3+1; //calculate and hold value in n  

t++; //increment value of t variable by 1  

}

}

return t; //return value

}

int main() //defining main method

{

int n; //defining integer variable

cout<<"Enter any number: "; //print message

cin>> n; //input value

cout<<hailstoneLength(n); //call method and print its value

return 0;

}

Output:

Enter any number: 3

8

Explanation:

Program description can be given as follows:

In the given C++ language program an integer method "hailstoneLength", is declared, that accepts an integer variable "n" in its parameter. Inside the method, an integer variable t is declared, that assign a value that is 1, in the next line, a while loop is declared, that uses if block to check even condition if number is even it divide by 2 and increment t variable value by 1. If the number is odd it will multiply the value by 3 and add 1 and increment t by 1 then it will go to if block to check value again. when value of n is not equal to 1 it will return t variable value. In the main method, an integer variable "n" is used that call the method and print its return value.

Which of the following is NOT correct concerning database design?
1. Identify all fields needed to produce the required information
2. Organize each piece of data into its largest useful part
3. Group related fields into tables
4. Determine each table’s primary key

Answers

Final answer:

The incorrect statement regarding database design is the directive to organize each piece of data into its largest useful part as data should actually be in the smallest useful part to avoid redundancy and maintain normalization.

Explanation:

The statement that is NOT correct concerning database design is Organize each piece of data into its largest useful part. Instead, data should be organized into the smallest useful part, to ensure normalization and avoid redundancy. The design process includes determining the purpose of the database, identifying fields, grouping related fields into tables, and establishing primary and foreign keys to ensure relationships between tables.

The purpose of the primary key is to ensure that each record in a table is unique, which is crucial to maintain data integrity. A good design also considers the use of foreign keys to link tables together and maintain referential integrity. The goal is to prevent redundant data, which avoids wasting space and reduces the occurrence of data entry errors.

4.24 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Quit", "quit", or "q" for the line of text. Ex: If the input is:

Answers

The program that takes in a line of text as input, and outputs that line of text in reverse is given in the explanation part below.

What is programming?

The implementation of logic to facilitate specified computing operations and functionality is known as programming.

It occurs in one or more languages that vary according to application, domain, and programming model.

The goal of programming is to find a set of instructions that will automate the execution of a task that may be as complex as an operating system on a computer, mostly to solve a specific problem.

import java.util.Scanner;

public class LabProgram

{

public static void main(String[] args)

{

Scanner in = new Scanner(System.in);

String line;

while (true)

{

line = in.nextLine();

if (line.equals("quit") || line.equals("Quit") || line.equals("q")) break;

for (int i = 0; i < line.length(); i++) {

System.out.print(line.charAt(line.length() - i - 1));

}

System.out.println();

}

}

}

Thus, above mentioned is the program for the given scenario.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ5

These are the characteristics of good blogs.


use corporate jargon and abbreviations

use industry-specific vocabulary

updated frequently

use a friendly, professional tone

enable users to edit corporate documents

Answers

Answer:

Updated Frequently

Use a friendly, professional tone.

Explanation:

A blog can be defined as an informal journal posted on a webpage either by an individual or group of people. A blog is written online and updated regularly.

There can be many purposes of writing a blog; it varies according to the writer. A blogger may write to express his/her feelings, views, etc. Or they can also write to share information related to anything such as education, etc.

The characteristics of a good blog are that it is updated regularly and written in a friendly and professional tone. A blog should be different from the existing ones, they should share the information which can not be found on other blogs.

Thus the correct answer is option third and fourth.

Design a class called NumDays. The class’s purpose is to store a value that represents a number of work hours and convert it to a number of days. For example, 8 hours would be converted to 1 day, 12 hours would be converted to 1.5 days, and 18 hours would be converted to 2.25 days. The class should have a constructor that accepts a number of hours, as well as member functions for storing and retrieving the hours and days. The class should also have the following overloaded operators: • (+) Addition operator. When two NumDays objects are added together, the overloaded + operator should return the sum of the two objects’ hours members. • (-) Subtraction operator. When one NumDays object is subtracted from another, the overloaded − operator should return the difference of the two objects’ hours members. Part 2: Design a class named TimeOff. The purpose of the class is to track an employee’s sick leave, vacation, and unpaid time off. It should have, as members,

Answers

Answer:

Check the explanation

Explanation:

#include <iostream>

#include <string>

using namespace std;

//class declaration

class NumDays{

private:

   double hours;

   double days;

public:

   //constructor

   NumDays(double h = 0){

       hours = h;

       days = h/(8.00);

   }

   //getter functions

   double getHours(){

       return hours;

   }

   double getDays(){

       return days;

   }

   //setter functions

   void setHours(double h){

       hours = h;

       days = h/(8.00);

   }

   void setDays(double d){

       days = d;

       hours = d*(8.00);

   }

   //overload + operator

   double operator+ (const NumDays &right){

       return hours+right.hours;

   }

   //overload - operator

   double operator- (const NumDays &right){

       //check if subtraction will give negative value

       if(hours < right.hours){

           cout << "ERROR! Cannot subtract! Now terminating!\n";

           exit(0);

       }

       return hours-right.hours;

   }

   //overload prefix ++ operator

   NumDays operator++(){

       //pre-increment hours member

       ++hours;

       //update days member

       days = hours/(8.00);

       //return modified calling object

       return *this;

   }

   //overload postfix ++ operator

   NumDays operator++(int){

       //post-increment hours member

       hours++;

       //update days member

       days = hours/(8.00);

       //return modified calling object

       return *this;

   }

   //overload prefix -- operator

   NumDays operator--(){

       //pre-decrement hours member

       --hours;

       //update days member

       days = hours/(8.00);

       //return modified calling object

       return *this;

   }

   //overload postfix -- operator

   NumDays operator--(int){

       //post-decrement hours member

       hours--;

       //update days member

       days = hours/(8.00);

       //return modified calling object

       return *this;

   }

};

int main()

{

   //create first object

   cout << "Creating object with 12 hours...\n";

   NumDays obj1(12);

   cout << obj1.getHours() << " hours = " <<obj1.getDays() << " days.\n";

   //create second object

   cout << "\nCreating object with 18 hours...\n";

   NumDays obj2(18);

   cout << obj2.getHours() << " hours = " <<obj2.getDays() << " days.\n";

   //test overloaded + operator

   cout << endl << "Adding hours... " << obj1 + obj2 << " hours.\n";

   //test overloaded - operator

   cout << endl << "Subtracting hours... " << obj2 - obj1 << " hours.\n\n";

   //test overloaded ++ operators

   cout << "Pre- and post-incrementing first object...\n";

   ++obj1;

   cout << obj1.getHours() << " hours = " <<obj1.getDays() << " days.\n";

   obj1++;

   cout << obj1.getHours() << " hours = " <<obj1.getDays() << " days.\n";

   //test overloaded -- operators

   cout << "\nPre- and post-decrementing second object...\n";

   --obj2;

   cout << obj2.getHours() << " hours = " <<obj2.getDays() << " days.\n";

   obj2--;

   cout << obj2.getHours() << " hours = " <<obj2.getDays() << " days.\n";

   return 0;

}

Answer:

Sew explaination foe code

Explanation:

Code below:

#include <iostream>

using namespace std;

class NumDays{

int hours;

float day;

public:

NumDays()

{

hours=0;

day=0.0;

};

NumDays(int h)

{

hours=h;

day=float(h/8.0);

};

int getHour()

{

return hours;

}

float getDay()

{

return day;

}

NumDays operator +(NumDays obj)

{

int h=getHour()+obj.getHour();

NumDays temp(h);

return temp;

}

NumDays operator -(NumDays obj)

{

int h=getHour()-obj.getHour();

NumDays temp(h);

return temp;

}

const NumDays& operator++() //prefix

{

++hours;

day=float(hours/8.0);

return *this;

}

const NumDays& operator--() //prefix

{

--hours;

day=float(hours/8.0);

return *this;

}

const NumDays operator++(int) //postfix

{

NumDays temp(*this);

++hours;

day=float(hours/8.0);

return temp;

}

const NumDays operator--(int) //postfix

{

NumDays temp(*this);

--hours;

day=float(hours/8.0);

return temp;

}

};

int main()

{

NumDays obj(2),obj2(10),obj3,obj4;

obj3=obj2-obj;

cout<<"'obj3=obj2-obj'=> Day:"<<obj3.getDay()<<"##Hour:"<<obj3.getHour()<<"\n";

obj3=obj+obj2;

cout<<"'obj3=obj+obj2'=> Day:"<<obj3.getDay()<<"##Hour:"<<obj3.getHour()<<"\n";

obj4=obj3++;

cout<<"'obj4=obj3++' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=++obj3;

cout<<"'obj4=++obj3' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=obj3--;

cout<<"'obj4=obj3--' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

obj4=--obj3;

cout<<"'obj4=--obj3' => Day:"<<obj4.getDay()<<"##Hour:"<<obj4.getHour()<<"\n";

};

A 64-bit word computer employs a 128KB cache. The address bus in this system is 32-bits. Determine the number of bits in each field of the memory address register (MAR) as seen by cache in the following organizations (show your calculations): A. Fully associative mapping with line size of 4 words. B. Direct mapping with the line size of 8 words. C. 2-way set associated mapping with the line size of 4 words. D. 8-way set associated mapping with the line size of 2 words.

Answers

Answer: provided in the explanation segment

Explanation:

taking a step by step process for this, we will analyze this problem,

we have that the Word size = 8 bytes

Cache size = 128 KB = 128×2¹⁰ bytes = 2¹⁷ bytes

(a). we are asked to cal for fully associative mapping with line size of  4 words.

fully associative mapping with line size of  4 words = 4 × 8 = 32 bytesoffset = log₂³² = 5 bittag = 32 - (5+0) = 27 bit index bit = 0

(b). Direct mapping with the line size of 8 words:

here  the line size = 8×8 = 64 bytes no of lines = 2¹⁷/2⁶ = 2¹¹ lines offset = log ₂(2⁶) = 6 bitindex = log ₂(2¹¹) = 11 bittag = 32 - (5 +11) = 15 bit

(c). 2-way set associated mapping with the line size of 1 word:

no of lines = 2¹⁷/2³ = 2¹⁴ linesoffset = log₂(2³) = 3 bitno of sets = 2¹⁴/2 = 2¹³ sets index = log₂(2¹³) = 13 bittag = 32 - (3+13) = 16 bit

(d). 8-way set associated mapping with the line size of 2 words:

8-way set associated mapping with the line size of 2 = 2*8 = 16  bytes

no of lines = 2¹⁷/2⁴ = 2¹³ linesno of sets = 2¹³/2³ = 2¹⁰ sets offset = log₂¹⁶ = 4 bitindex = log ₂(2¹⁰) = 10 bittag = 32 - (4+10) = 18 bit

cheers i hope this helps!!!!

In Section 8.5.4, we described a situation in which we prevent deadlock by ensuring that all locks are acquired in a certain order. However, we also point out that deadlock is possible in this situation if two threads simultaneously invoke the transaction () function. Fix the transaction () function to prevent deadlocks.

Answers

Answer:

See Explaination

Explanation:

Separating this critical section into two sections:

void transaction(Account from, Account to, double amount)

{

Semaphore lock1, lock2;

lock1 = getLock(from);

lock2 = getLock(to);

wait(lock1);

withdraw(from, amount);

signal(lock1);

wait(lock2);

deposit(to, amount);

signal(lock2);

}

will be the best solution in the real world, because separating this critical section doesn't lead to any unwanted state between them (that is, there will never be a situation, where there is more money withdrawn, than it is possible).

The simple solution to leave the critical section in one piece, is to ensure that lock order is the same in all transactions. In this case you can sort the locks and choose the smaller one for locking first.

In the lab, you discovered that the server you scanned (10.20.1.2) was vulnerable to the WannaCry ransomeware attack. What ports are affected and what are the recommended remediations? Why is it important to perform penetration testing on networks and individual servers?

Answers

Answer:

Check the explanation

Explanation:

If Zenmap SYN scan did not work in your lab, then that means the application could not locate the network you were attempting to scan, i.e. 10.20.1.0/24. Recall that in Section 2.

Part 2. You added a Route for 10.20.1.0 to be routed via the 172.30.0.1 gateway. That route you added to communicate with the 10.20.1.0 network is a temporary route and will be replaced each time.

This program has one small difference that will make it run a little differently. Again though, remember:
All your code outside the draw loop is run first, one time
All your code inside the draw loop is run over and over forever
What will this program do? Write your prediction below.

Answers

Answer:

Answer:

Add the following code after the line 3 that is:

numItems = numItems - 1;

Explanation:

In the following question, some information in the question is missing that is code block.

0 var numItems = promptNum("How many items?");

1 var total = 0;

2 while (numItems > 0){

3 total = total + promptNum("Enter next item price");

4 }

5 console.log("The total is" + total);

In the following scenario, Tiffany is developing a program to help with the handling of bake sales and she not write that part which is essential.

There would become an incorrect condition that requires any increment/decrement operations stating that perhaps the condition variable will be incorrect. Because there has to be the variable "numItems" operation because it engages in the while loop condition.

Read more on Brainly.com - https://brainly.com/question/15009132#readmore

Explanation:

Susan was recently fired from her executive IT position. You have concerns that she has enough knowledge and expertise to sabotage company documents—and you need to delete her access. However, upon beginning, you find information that should be retained in her user directory for future company needs. Consider the process you would take to ensure that Susan no longer has access and that data is retained. In situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not?

Answers

Answer:

The answer is No, the gains or benefit do not exceed the risk because, even if the data of the user seem very vital, the damage it would have on the long will affect the organisation in a negative way.

Explanation:

From the example given, stating that in situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not

I would say that  NO, the benefits do not outweigh the risk that will be enough to keep the user information because, just as the user data is important, but the damage it would yield or have could affect the organization on the long run.

Modify class fraction to keep track of the number of the objects currently in memory Let the user input a denominator, and then generate all combinations of two such fractions that are between 0 and 1, and multiply them together. Create fractions and arrays dynamically based on the user input. Only positive fractions. No need to reduce. No vectors allowed. The well-formatted ou

Answers

Answer:

See explaination

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

int main() {

int dem,i,j;

cout<<"Enter denominator value"<<endl;

cin>>dem;

int** arr=new int*[dem];

for(i=0;i<dem;i++)

{

if(i!=0)

cout<<setw(5)<<i<<"/"<<dem;

cout<<"\t";

}

cout<<endl;

for(i=1;i<dem;i++)

{ cout<<setw(5)<<i<<"/"<<dem<<"\t";

arr[i] = new int[dem];

for(j=1;j<dem;j++)

{

cout<<setw(5)<<i*j<<"/"<<dem<<"\t";

}

cout<<endl;

}

return 0;

}

Implement the function create_prefix_lists(list) that will return a sequence of lists, each containing a prefix of list. All the lists should be collected as one big list. For example, for [2, 4, 6, 8, 10] the function should return [[], [2], [2, 4], [2, 4, 6], [2, 4, 6, 8], [2, 4, 6, 8, 10]]. Note: recursion can not be used for this solution, if you are familiar with the concept.

Answers

Answer:

The below code was written in Python language, kindly let me know if you'll want to see the implementation done in another language.

Explanation:

As python is tab specific, you need align the as per the screenshot of the code that I have attached below the code and text version of the code is also provided.

Code:

======

result = []

def create_prefix_lists(lst):

for i in range(len(lst)):

l = []

for j in range(i):

l.append(lst[j])

result.append(l)

result.append(lst)

return result

lis = [2,4,6,8,10]

print create_prefix_lists(lis)

Code indentation screen and code output can be seen in the attached images below:

====================

Answer:

See Explaination

Explanation:

code below

import java.util.ArrayList;

import java.util.Collections;

import java.util.List;

public class Prefix_test_check {

public static void create_prefix_lists(List elementList) {

if (elementList.size() > 0) {

Collections.sort(elementList);

List newArrayList = new ArrayList();

newArrayList.add("[");

System.out.print(newArrayList);

System.out.print(",");

newArrayList.clear();

int counterDataObj = 0;

for (int iObjectData = 0; iObjectData < elementList.size(); iObjectData++) {

newArrayList.add(elementList.get(iObjectData));

counterDataObj++;

if (counterDataObj == elementList.size()) {

System.out.print(newArrayList);

System.out.print("]");

} else {

System.out.print(newArrayList);

if (counterDataObj != elementList.size()) {

System.out.print(",");

}

}

}

} else {

List emptyDataList = new ArrayList();

emptyDataList.add("]");

System.out.print(emptyDataList);

}

}

public static void main(String args[]) {

List elementList = new ArrayList();

elementList.add(2);

elementList.add(4);

elementList.add(6);

elementList.add(8);

elementList.add(10);

create_prefix_lists(elementList);

}

}

The primary purpose of an operating system is: To provide a software interface between the hardware and the application programs. To provide additional products for hardware manufacturers to sell. To give the user less versatility in using the computer. To maximize the productivity of the computer system user. To maximize the productivity of a computer system by operating it in the most efficient manner.

Answers

Answer:

To provide a software interface between the hardware and the application programs.

Explanation:

An operating system is a system software that is responsible to manage the hardware and software on our computer. Operating system play the role as a coordinator to handle how different software interact or communicate with hardware and produce a desired output to user. Operating system will also manage computer resources such as central processing unit (cpu), memory and storage required by software to perform its task. The common operating system exist in the today market includes Microsoft Windows, Mac OS X, and Linux.

Write a menu-driven program for a user to store information about the media collection they own. This requires using an array of struct type called Media. Every element in the array represents one media item in a person's collection. Represent the information as an array of structs that needs to able to hold up to 100 media entries. However, the actual number of entries is probably much smaller so the program needs to keep track of how many actual entries are in the collection.

Answers

Answer:

Check Explanation and attachment.

Explanation:

Since the site does not allow me to submit my work(for you to easily copy and paste it), I will post some additional attachments.  

Please, note that there is category, unique ID, description for each media item.

#include <stdio.h>

#include <string.h>

struct Media {

int id;

int year;

char title[250];

char description[250];

char category[50];

};

void show_menu();

void add_item(struct Media arr[], int *c);

void print_all(struct Media arr[], int c);

void print_category(struct Media arr[], int c);

void delete_entry(struct Media arr[], int *c);

int main() {

struct Media collection[100];

int ch, count = 0;

// loop until user wants to quit

while (1) {

show_menu(); // display the menu

printf("Enter your choice: ");

scanf("%d", &ch);

if (ch == 1)

add_item(collection, &count);

else if (ch == 2)

print_all(collection, count);

else if (ch == 3)

print_category(collection, count);

else if (ch == 4)

delete_entry(collection, &count);

else if (ch == 0)

break;

else

printf("Invalid choice. Try again!\n");

}

return 0;

}

void show_menu() {

printf("1. Add a media item to the collection\n");

printf("2. Print all media in the collection\n");

printf("3. Print all media in a given category\n");

printf("4. Delete an entry\n");

printf("0. Quit\n");

}

void add_item(struct Media arr[], int *cnt) {

Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?


To be a digital media coordinator, Claire needs a bachelor’s degree in (psychology, public relations, finance) , digital media, or a related field. She also needs to have knowledge of (computer programming, computer coding, search engine optimization) and emerging digital technologies.

Answers

To pursue a career as a Digital Media Coordinator, Claire should have a bachelor's degree in a relevant field.

Claire should have a good understanding of emerging digital technologies and trends. This includes staying up-to-date with the latest developments in digital media platforms, social media, and online advertising. Familiarity with digital marketing techniques and tools is essential.

Claire should be able to analyze digital media data and performance metrics. This includes using tools like Analytics to measure the effectiveness of digital campaigns and make data-driven decisions. Strong written and verbal communication skills are important for creating and conveying digital media content effectively. Claire may be responsible for writing web content, social media posts, or email campaigns.

Learn more about Digital Media Coordinator, here:

https://brainly.com/question/24032108

#SPJ3

Final answer:

Claire needs a bachelor's degree in public relations or a related field, knowledge of SEO, and practical experience in strategic communication. She should highlight her communication experiences and skills such as content creation and media planning. Starting as a communication technician can lead to more advanced roles.

Explanation:

To pursue a career as a digital media coordinator, Claire should ideally have a bachelor’s degree in public relations, digital media, or a related field such as marketing or communication studies. It is also essential for her to possess knowledge of search engine optimization (SEO) and stay updated on emerging digital technologies. Practical experience, whether through internships, work placements, or personal projects, is highly valued in this field; not only do they demonstrate Claire's skill set, but also her understanding of the practical aspects of strategic communication.

Claire should emphasize her communication major experience and any hands-on involvement she had with social media campaigns, event planning, or creating digital content. These experiences could range from managing social media accounts for a student organization to participating in a campaign focus group. Highlighting skills such as content creation, analytics, audience engagement, and media planning in her cover letter and application materials will be beneficial.

Starting as a communication technician could be a stepping stone in Claire's career, eventually leading up to a managerial role in public relations or advertising. To stay competitive and prepared for job opportunities, Claire should also consider developing a comprehensive portfolio that showcases her skills in business communication and strategic planning.

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). c

Answers

Final answer:

A program can calculate the estimated monthly mortgage using the formula (currentPrice * 0.051) / 12 and determine the percentage change in house prices to analyze market trends.

Explanation:

Sites like Zillow provide summaries of house prices to give accurate estimates of home values. When writing a program to output a summary of the current price, last month's price, and the estimated monthly mortgage, one can use the formula provided in the question to calculate the mortgage. The estimated monthly mortgage is computed using the formula (currentPrice * 0.051) / 12. It's also important to note that the percentage change in house prices is an important metric when analyzing real estate data, which can be computed as [(current price - last month's price) / last month's price] * 100. This will help in understanding the real estate market trends.

Write a complete program that: 1. Prompt the user to enter 10 numbers. 2. save those numbers in a 32-bit integer array. 3. Print the array with the same order it was entered. 3. Calculate the sum of the numbers and display it. 4. Calculate the mean of the array and display it. 5. Rotate the members in the array forward one position for 9 times. so the last rotation will display the array in reverse order. 6. Print the array after each rotation. check the sample run.

Answers

Answer:

see explaination

Explanation:

oid changeCase (char char_array[], int array_size ) {

__asm{

// BEGIN YOUR CODE HERE

mov eax, char_array; //eax is base image

mov edi, 0;

readArray:

cmp edi, array_size;

jge exit;

mov ebx, edi; //using ebx as offset

shl ebx, 2;

mov cl, [eax + ebx]; //using ecx to be the storage register

check:

//working on it

cmp cl, 0x41; //check if cl is <= than ASCII value 65 (A)

jl next_indx;

cmp cl, 0x7A; //check if cl is >= than ASCII value 122 (z)

jg next_indx;

cmp cl, 'a';

jl convert_down;

jge convert_up;

convert_down:

or cl, 0x20; //make it lowercase

jmp write;

convert_up:

and cl, 0x20; //make it uppercase

jmp write;

write:

mov byte ptr [eax + ebx], cl //slight funky town issue here,

next_indx:

inc edi;

exit:

cmp edi, array_size;

jl readArray;

mov char_array, eax;

// END YOUR CODE HERE

}

}

in c Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. The output of the program is every word in the list that contains the character at least once. Assume at least one word in the list will contain the given character. Assume that the list will always contain less than 20 words. Each word will always contain less than 10 characters and no spaces.

Answers

Answer:

see explaination

Explanation:

//Include required header file.

#include <stdio.h>

//Define the function isWordContainChar() having the

//required parameters.

int isWordContainChar(char* req_word, char search_char)

{

//Declare required variable.

int i;

//Start a for loop to traverse the string given in

//the function parameter.

for(i = 0; req_word[i] != '\0' ; i++)

{

//If the current character in the gievn word is

//matched with the character which needs to be

//found in the word, then return 1.

if(req_word[i] == search_char)

{

return 1;

}

}

//Otherwise, return 0.

return 0;

}

//Start the execution of the main() method.

int main(void)

{

//Declare the required variables.

int num_words, index, word_index;

char str_word[20][10];

char searchCharacter;

//Prompt the user to enter the number of words.

scanf("%d", &num_words);

//Prompt the user to enter the required words using a

//for loop and store them into an array.

for(index = 0; index < num_words; index++)

{

scanf("%s", str_word[index]);

}

//Prompt the user to enter a required character which

//needs to be found in a word.

scanf(" %c", &searchCharacter);

//Traverse the words stored in the array using a for

//loop.

for(index = 0; index < num_words; index++)

{

//Call the function isWordContainChar() with

//required arguments in rach iteration and if the

//value returned by this function is not 0, then

//display the current string in the array.

if(isWordContainChar(str_word[index],

searchCharacter) != 0)

{

printf("%s\n", str_word[index]);

}

}

return 0;

}

Write which of the ovals (A, B, C, or D) is placed around code that best meets the criteria as a student-developed algorithm. Explain your answer using the criteria in the scoring guide.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given question, some information is missing, that attachment of the image files code, So, the code to the question can add in an image file, and explanation to this question can be described as follows:

In option 4, In drawSquare method, it is positioned across the abstraction, as it is across a method, that compresses many lines of code all in one. In option 1, The moveTo method is the rule. Throughout in option 4, and in option 2, is a request to function, which is defined in option 3, that is the for-loop.

reAay ouyay aay hizway ithway igPay atin?Lay? (Translated: "Are you a whiz with Pig Latin?") Write a program that converts an English phrase into a pseudo-Pig Latin phrase (that is Pig Latin that doesn’t follow all the Pig Latin syntax rules). Use predefined methods of the Array and string classes to do the work. For simplicity in your conversion, place the first letter as the last character in the word and prefix the characters "ay" onto the end. For example, the word "example" would become "xam-pleeay," and "method" would become "ethodmay." Allow the user to input the English phrase. After converting it, display the new Pig Latin phrase.

Answers

Answer:

Check the explanation

Explanation:

package com.prt.test;

package com.prt.test;

  import java.util.Arrays;

  import java.util.Scanner;

  public class StringEncryption {

      public static void main(String[] args)

      {

  try{

          String concatedString1="";//testing();

          StringBuffer encryptedString=new StringBuffer();

Scanner scanner = new Scanner(System.in);

         

          System.out.println("enter the string ");

         

          String userInput = scanner.nextLine();// to read the string

         

          String[] words=userInput.split("\\s");//to split the words if user enter the string with period

         

          for(String word:words)

          {

              int numberOfSpacesadd=1;

              String subs=word.substring(0, 1);//to split the first letter

              String s1=word.substring(1);//to split the after the first letter

              String concatedString=s1+subs;

              concatedString1=concatedString+"ay";//to add the adding phrase

              String addSpace = String.format("%"+ numberOfSpacesadd +"s", " ");//for adding the space after the word

                 

              encryptedString.append(concatedString1+addSpace);

             

          }

         

System.out.println(encryptedString.toString().trim()+"?");

  }catch(Exception e)

  {

      System.out.println(" try another time");

  }  

      }

  }

 

Output :

enter the string

Are You a Whiz with Pig Latin?

reAay ouYay aay hizWay ithway igPay atin?Lay?

Other Questions
Quadrilateral EFGH was dilated with the origin as the center of dilation to createquadrilateral E' F'G'H'. The quadrilateral was dilated using a scale factor of 2.5.The lengths of the sides of quadrilateral EFGH are given.What is the length of side F'G'? On April 1, 2019, SBD Corp. paid $120,000 for rent on a new warehouse space one year in advance. On October 1, 2019, SBD Corp. entered into a lease agreement to rent out its old warehouse space it was no longer using. This agreement calls for SBD to receive $8,000 per month from the lessee (i.e. tenant), due and payable at the end of the 4-month lease term. On December 31, 2019, none of the rental payments from the lessee had yet been received. a. if SBD makes the appropriate adjusting entry how much will be reported on the December 31, 2019, income statement for rent expense b. If SBD makes the appropriate adjusting entry how much will be reported on the December 31 2019 balance sheet as prepaid rent and rent receivable respectively What frisbee technique has a name like a flying mahine? Identify the sentence type.My friend wants to go to the mall because the boy she likes will be there, and she wants to talk to him.a simpleC. complexb. compoundd. compound-complexPlease select the best answer from the choices provided 1. What do you notice about the poem? (Stanzas, form, line length, word choice, punctuation.) 2. What is the poem about? Use textual evidence3. What is the primary emotion in this poem? And why? Use textual evidence In which quadrant does the point (5, -13) lie?A.Quadrant IVb. Quadrant !c. Quadrant IIID.Quadrant II Please help me with the math question CheckWhich one of these Chinese leaders was responsible for uniting China after the warlord period and leading China'sNationalist Party?Emperor PuyiSun Yat-senChiang Kai-shek Presented below is the income statement of Cowan, Inc.: Sales revenue $372,700 Cost of goods sold 221,800 Gross profit $150,900 Operating expenses 80,800 Income before income taxes 70,100 Income taxes 26,900 Net income $ 43,200 In addition, the following information related to net changes in working capital is presented: Debit Credit Cash $14,100 Accounts receivable 22,000 Inventories $18,600 Salaries payable (operating expenses) 8,700 Accounts payable 13,700 Income taxes payable 2,700 The company also indicates that depreciation expense for the year was $16,700 and that the deferred tax liability account increased $4,200. Prepare a schedule computing the net cash flow from operating activities by using the indirect method that would be shown on a statement of cash flows.(Show amounts that decrease cash flow with either a - sign e.g. -10,000 or in parenthesis e.g. (10,000).) Cowan, Inc. Statement of Cash Flows (Partial) (Indirect Method) $ Adjustments to reconcile net income to $ $ Prepare a schedule computing the net cash flow from operating activities by using the direct method that would be shown on a statement of cash flows. Cowan, Inc. Statement of Cash Flows (Partial) Direct Method $ $ $ why did nella larsen go to harlem renaissance ? Factor -6x^2+26x+20 completely.P.s. Need answers soon! the sum of two numbers is 64. The smaller number is 6 less than the larger number. What are the numbers? Which property is illustrated by the statement 6 4 = 4 6? * Evaluate the expression when x=-7.x + 4x-5 Sebastian has 3 whole apples. He cuts each whole into fourths. Sebastian gives away 4 4 of the apples. Which is the number of fourths Sebastian has left as a fraction? If f(x) = 3x - 1 and g(x) = x + 2, find (f - g)(x).wO A. 4x+1O B. 2x-3o c. 2x-1O D. 3 - 2xIRSUBMI Which is the BEST estimate of the average rate of change for the function given in the table, over the interval 2 x 6?a) 5b) 10 c) 15d) 20 An isothermal chromatogram at 90 C shows an elution order of 1-pentanol followed by ethylene diamine followed by diethylene glycol. But in order to reduce the overall time of the experiment, a temperature programmed chromatogram is tried, beginning at 60 C and increasing to 190 C over 5 minutes then holding at 190 C for 4 minutes. Predict the elution order of the compounds using the temperature programmed conditions. The amount of light entering a camera or your eye is regulated bya. an eyepiecec. an aperture.b. the cornea.d. a set of compound lenses. An oblique prism has a base area of 3x2 square units. An oblique prism has a base area of 3 x squared square units. The base of the prism is a quadrilateral. The distance from the top quadrilateral to the bottom quadrilateral is 13. A right triangle is drawn outside of the prism and has the side with length 13 as its hypotenuse. The base length of the triangle is 5. What expression represents the volume of the prism, in cubic units? 15x2 24x2 36x2 39x2 Steam Workshop Downloader