Answer:
Communicating by email is almost instantaneous, which enhances communications by quickly disseminating information and providing fast response to customer inquiries. It also allows for quicker problem-solving and more streamlined business processes.
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this future network, anti-spoofing and directed broadcast filters are widely deployed. Also, the security of PCs and workstations is much greater, making the creation of botnets difficult. Do the administrators of server systems still have to be concerned about, and take further countermeasures against, DoS attacks? If so, what types of attacks can still occur, and what measures can be taken to reduce their impact? Explain in detail with valid diagram and example.
Answer:
yes administrators have to be concerned
Explanation:
It is necessary for countermeasures to be taken against DoS attacks
The types of attacks that can still occur are:
If the network connection get to be overloaded, there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.
To reduce the impact of this kind of attacks,
1. there should be enough or excess network bandwidth and distributed servers should be replicated if there is a possibility that network could get to be overloaded.
2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.
3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters
4. Use strong antivirus on computer sytems that are used to connect to the internet
Write a program that asks for the number of units sold and computes the total cost of the purchase. Input validation: Make sure the number of units is greater than 0. Use output (stream) manipulators: 2 digits after the decimal point g
Answer:
Explanation:
The following code is written in C++, it asks the user for input on number of units sold and places it in a variable called units_sold. Then it asks for the package price and places that value in a variable called package_price. Finally it multiplies both values together into a variable called final_price and adjusts the decimals.
#include <iostream>
#include <iomanip>
using namespace std;
int main()
{
// Variables
int units_sold,
final_price;
// ask user for number of units sold
cout << "\nEnter number of units sold: ";
cin >> units_sold;
//ask for Package price
cout << "\nEnter Package Price: ";
cin >> package_price;
// Total amount before discount
final_price = units_sold * package_price;
cout << setprecision(2) << fixed;
cout << endl;
return 0;
}
See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}
Answer:
See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}
Explanation:
Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?
Answer:
The website is
classroom
Explanation:
The computer scientists Richard Conway and David Gries once wrote: The absence of error messages during translation of a computer program is only a necessary and not a sufficient condition for reasonable [program] correctness. Rewrite this statement without using the words necessary or sufficient.
Answer:
A computer program is not reasonably correct if it has no error messages during translation.
Explanation:
First, we need to understand what the statement means, and we also need to identify the keywords.
The statement means that, when a program does not show up error during translation; this does not mean that the program is correct
Having said that:
We can replace some keywords as follows:
absence of error messages := no error messages
Give me good answers
1- what is the money?
2- what is the wealth?
How can it be used for good
Answer:
Money is currency
Explanation:
Is is how you pay for items
Consider the following code segment, which is intended to create and initialize the two-dimensional (2D) integer array num so that columns with an even index will contain only even integers and columns with an odd index will contain only odd integers.
int[][] num = /* missing code */;
Which of the following initializer lists could replace /* missing code */ so that the code segment will work as intended?
A. {{0, 1, 2}, {4, 5, 6}, {8, 3, 6}}
B. {{1, 2, 3}, {3, 4, 5}, {5, 6, 7}}
C. {{1, 3, 5}, {2, 4, 6}, {3, 5, 7}}
D. {{2, 1, 4}, {5, 2, 3}, {2, 7, 6}}
E. {{2, 4, 6}, {1, 3, 5}, {6, 4, 2}}
Answer:
A. {{0, 1, 2}, {4, 5, 6}, {8, 3, 6}}
Explanation:
From the options, we can see that the array is a 3 by 3 array and the array index (whether row or column) begins at 0.
So, the column index for this array is 0, 1 and 2.
Column number 0 and 2 will be treated as the even column while column number 1 will be treated as the odd columns.
Of all options (a) to (e), option (a) fits the requirement of the question; hence; (a) answers the question.
Answer:
A
Explanation:
because the index is even
How have newspapers and magazines adapted to digital technology?
Answer:
Most newspapers now have online editions. Subscription models have gone beyond print-only into digital-only and print-digital combinations -- and as print-only circulation is dropping, digital and combination circulation is on the rise.
hy plzz help me friends
Answer:
Ok so RAM is Random-Access-Memory.
RAM can store data just like in a hard drive - hdd or solid state drive - ssd
but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.
ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.
Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.
Have a great day.
Explanation:
Answer:
Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer
Use the drop-down menu to complete each statement. First, calculate the time spent doing each activity _____ . Next, multiply each category by ____ . Then, ___ the totals. Last, subtract the total from ____ .
Answer:1. Every day 2. 7 3. add 4. 168
Explanation:
I got it right on Edge
First, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.
What is the significance of the activity?The significance of activity may be determined by the fact that it usually enhances your health and lowers the threat of developing several diseases and other abnormal conditions like type 2 diabetes, cancer, and cardiovascular disease.
According to the context of this question, if you are required to calculate the time spent doing each activity in each day. You are required to make a chart that represents all such activities followed by multiplication. Then, you are considerably required to add the totals followed by subtracting the total from the total number of days in a year.
Therefore, first, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.
To learn more about Activities, refer to the link:
https://brainly.com/question/26654050
#SPJ3
please answer soon
Anonymity allows you to have freedom of
the internet
downloads
expression
information
Answer:
[ Freedom of expression ]
Why?
it was either that or internet but internet just means being able to use it rather than do whatever i guess
Can i get any information on this website i'd like to know what its for ?
https://www.torsearch.org/
Explanation: torsearch.org is a safe search engine mainly used for dark wed purposes. It does not track your location nor give any personal information.
Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral device should she use?
A.
voice recognition
B.
microphone
C.
mouse
D.
compact disk
((PLEASE HELP ME)) i need to get all my school work done before thursday
------------- are used to navigate between pages and Web sites.
Question 1 options:
Transitions
Animations
Hyperlinks
None of the above
Answer:
none of the above
Explanation:
Web navigation refers to the process of navigating a network of information resources in the World Wide Web, which is organized as hypertext or hypermedia. The user interface that is used to do so is called a web browser.
what is memory? explain types of memory?
Answer:
Memory is the taking personal record of computer of past experience. The types of memory are 1)Read Only Memory 2)Random Access memory
You are given an array of arrays a. Your task is to group the arrays a[i] by their mean values, so that arrays with equal mean values are in the same group, and arrays with different mean values are in different groups. Each group should contain a set of indices (i, j, etc), such that the corresponding arrays (a[i], a[j], etc) all have the same mean. Return the set of groups as an array of arrays, where the indices within each group are sorted in ascending order, and the groups are sorted in ascending order of their minimum element.
Example
For
a = [[3, 3, 4, 2],
[4, 4],
[4, 0, 3, 3],
[2, 3],
[3, 3, 3]]
the output should be
meanGroups(a) = [[0, 4],
[1],
[2, 3]]
mean(a[0]) = (3 + 3 + 4 + 2) / 4 = 3;
mean(a[1]) = (4 + 4) / 2 = 4;
mean(a[2]) = (4 + 0 + 3 + 3) / 4 = 2.5;
mean(a[3]) = (2 + 3) / 2 = 2.5;
mean(a[4]) = (3 + 3 + 3) / 3 = 3.
There are three groups of means: those with mean 2.5, 3, and 4. And they form the following groups:
Arrays with indices 0and 4 form a group with mean 3;
Array with index 1 forms a group with mean 4;
Arrays with indices 2and 3 form a group with mean 2.5.
Note that neither
meanGroups(a) = [[0, 4],
[2, 3],
[1]]
nor
meanGroups(a) = [[0, 4],
[1],
[3, 2]]
will be considered as a correct answer:
In the first case, the minimal element in the array at index 2 is 1, and it is less then the minimal element in the array at index 1, which is 2.
In the second case, the array at index 2 is not sorted in ascending order.
For
a = [[-5, 2, 3],
[0, 0],
[0],
[-100, 100]]
the output should be
meanGroups(a) = [[0, 1, 2, 3]]
The mean values of all of the arrays are 0, so all of them are in the same group.
Input/Output
Answer:
import numpy as np
a = [[3, 3, 4, 2], [4, 4], [4, 0, 3, 3], [2, 3], [3, 3, 3]]
mean_holder = [np.array(i).mean() for i in a]
mean_groups= [[i for i,x in enumerate(mean_holder) if x==v] for v in mean_holder]
mean_g = []
for i in mean_groups:
if i not in mean_g:
mean_g.append(i)
print(mean_holder)
print(mean_g)
Explanation:
The python's Numpy package is used to convert the lists in the a-list into arrays and the means are taken and grouped by index
Tyrone Shoelaces has invested a huge amount of money into the stock market and doesnât trust just anyone to give him buying and selling information. Before he will buy a certain stock, he must get input from three sources. His first source is Pain Webster, a famous stock broker. His second source is Meg A. Cash, a self-made millionaire in the stock market, and his third source is Madame LaZora, world-famous psychic. After several months of receiving advice from all three, he has come to the following conclusions:
a) Buy if Pain and Meg both say yes and the psychic says no.
b) Buy if the psychic says yes.
c) Donât buy otherwise.
Construct a truth table and find the minimized Boolean function to implement the logic telling Tyrone when to buy.
Solution :
The truth table is :
Pain Meg Psych Buy
[tex]$0$[/tex] [tex]$0$[/tex] [tex]$0$[/tex] [tex]$0$[/tex]
[tex]$0$[/tex] [tex]$0$[/tex] [tex]$1$[/tex] [tex]$1$[/tex]
[tex]$0$[/tex] [tex]$1$[/tex] [tex]$0$[/tex] [tex]$0$[/tex]
[tex]$0$[/tex] [tex]$1$[/tex] [tex]$1$[/tex] [tex]$1$[/tex]
[tex]$1$[/tex] [tex]$0$[/tex] [tex]$0$[/tex] [tex]$0$[/tex]
[tex]$1$[/tex] [tex]$0$[/tex] [tex]$1$[/tex] [tex]$1$[/tex]
[tex]$1$[/tex] [tex]$1$[/tex] [tex]$0$[/tex] [tex]$1$[/tex]
[tex]$1$[/tex] [tex]$1$[/tex] [tex]$1$[/tex] [tex]$1$[/tex]
The Boolean function :
[tex]$\text{F(Pain, \ Meg, \ Psych)}$[/tex] = [tex]$\overline {\text{PainMeg}}\text{Psych}+\overline{\text{Pain}}\text{MegPsych}+\text{Pain}\overline{\text{Meg}}\text{Psych}+\text{PainMeg}\overline{\text{Psych}}$[/tex][tex]$+\text{PainMegPsych}$[/tex]
Meg and Psych
[tex]$00$[/tex] 01 [tex]$11$[/tex] 10
Pain 0 1 1
[tex]$1$[/tex] [tex]$1$[/tex] 1 [tex]$1$[/tex]
Therefore,
[tex]$\text{F(Pain, \ Meg, \ Psych)}$[/tex] = Psych + PainMeg
Very large storage system that protects data by constantly making backup copies of files moving across an organization's network is known as ...
Answer:
RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
Explanation:
RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
What is File system failure?File system failure refers to disk-related errors that may be due to corrupt files, disk integrity corruption, file execution policies, bad sectors, etc. These errors may prevent be causing users from accessing or opening files. The first line of defense against a file system failure is a well-defined set of proper system backup and file maintenance procedures.
These errors can be encountered in files such as images, documents, PDFs, movies, etc. In order to protect and provide defense against file system failure, it is important to manage proper backup and file maintenance procedures.
Therefore, RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
You can learn more about file system at:
brainly.com/question/14312784
#SPJ2
Which of the following statements is false?
Copyright exists the moment a work is created.
Copyright protects intellectual property such as text, art, film, music, or software.
Omitting the © copyright symbol means your work is not copyrighted.
Copyright is free.
You are not required to register your copyright.
It is false that omitting the © copyright symbol means your work is not copyrighted. The correct option is C.
What is a copyright?Original works of authorship are protected by copyright, a type of intellectual property, as soon as the author fixes the work in a tangible form of expression.
The creators of the works of expression typically control the copyrights, however there are some significant exceptions: When an employee produces a work while employed, the employer is the rightful owner of the copyright.
Some individuals think that a work isn't covered by copyright law if it doesn't display a copyright emblem. That is untrue. The copyright symbol need not be used in most situations.
Thus, the correct option is C.
For more details regarding a copyright, visit:
https://brainly.com/question/14704862
#SPJ2
List 3 clinical tools available in the EHR and discuss how those benefit the patient and/or the practice
Def locate_substring(dna_snippet, dna): This function takes in two strings, dna_snippet and dna, where dna_snippet is a substring of dna, and returns all locations of the substring as a list of integers. In other words, dna_snippet may exist in multiple locations within dna; you should return the beginning index position of each occurrence of dna_snippet inside of dna. Example: * Sample DNA snippet (substring): "ATAT" * Sample DNA string: "GATATATGCATATACTT" * The returned position list: [1, 3, 9]
Answer:
In Python. The function is as follows:
def locate_substring(dna_snippet, dna):
res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]
print("The returned position list : " + str(res))
Explanation:
This iterates defines the function
def locate_substring(dna_snippet, dna):
Check for all occurrence
res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]
print all occrrence
print("The returned all position list : " + str(res))
Following is the Python program to the given question.
PythonAccording to the question,
DNA Series: GATATATGCATATACTTDNA
Snippet: ATAT
Program: def locate_substring (dna_snippet, dna):
start = 0 while True: start = dna.
find(dna_snippet, start) #finding the first occurrence of dna_snippet in dna.
if start == -1: return # if dna.find() returns -1 yield start #Resumes next execution start += 1dna=input ("Enter the DNA sequence: ") dna_snippet=input
("Enter the DNA snippet: ") print(list(locate_substring(dna_snippet,dna )))
Program Explanation: Defining a function.
An infinite loop is being utilized just to produce the indexes from which dna snippet begins.
Determining the initial occurrence of dna snippet inside dna. storing the new occurrences of dna snippet throughout the starting point.
Whenever dna.find() returns minus one, it means there was no occurrence identified and the method should be exited.
Find out more information about Python here:
https://brainly.com/question/26497128
What is a key consideration when evaluating platforms?
Answer:
The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.
Select the true statement about network protocols.A protocol determines how the sending computer notifies the receiving computer about the presence of compressed data.A protocol determines how it will be executed on every networked device.A protocol determines how the sending device notifies the receiving device that there is data to be sent.A protocol is not required for all data transmissions.
Answer:
A protocol determines how the sending device notifies the receiving device that there is data to be sent.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A protocol can be defined as a standard set of rules established by the regulatory agencies to determine how data are transmitted from one network device to another.
Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.
A protocol determines how the sending device notifies the receiving device that there is data to be sent, regardless of any difference in terms of structure or design.
User ideas for ro blox?
Answer:
You can put random people, or something you like to do, like Soccer2347 (that was just an example) or your favorite animal, Horse990. But Rob lox has to approve it first
Explanation:
Answer:
You can do a lot of usernames despite the fact that a lot of them have also been taken already. You can do something like your favorite food, sport, etc, and combine it into a couple words, and then add numbers to the end if the name has been taken already.
There is a nickname feature too which let's you name yourself whatever you want.
WHY
is communication Important
in
space
Answer:
Communication is vitally important to astronauts while they are in space. Not only does it allow them to talk to their friends and family back home, it also allows them to communicate with the team of experts on the ground that helps them carry out their mission safely.
17
Select the correct answer.
What is the key length of each key in triple DES?
OA 168 bits
ОВ.
56 bits
128 bits
OD
256 bits
OE.
192 bits
Answer:
OB
Explanation:
bc i said lol
bc i said lol to be 128 bits
Many types of academic writing require multiple sources ?
True
False
Answer:
True!
Explanation:
A few types that need them are;
News articles
Narratives
Opinion writes
Etc
Your co-worker who went to UCLA tells you that DHCP is not enabled at your new job, so you should just use the same IP address that you have at home to connect to the internet. He told you it should work because your computer is communicating with a unique public IP address at home, so no other computer in the world would have it. When you try this, your computer does not have internet access. Give two reasons why?
Answer:
1. internet connection is not enabled on the computer.
2. The DHCP server in the company is not enabled as well.
Explanation:
For a user to access the internet, the computer must have a public IP address that is either assigned to it by a service provider or dynamically from the DHCP server in the computer. In the case of the former, the user just needs to enable the internet connection to obtain the unique IP address.
If the DHCP server or the internet connection is not enabled, the user would not have access to the internet.
What is your favorite LEGO set
Answer:
star wars death star....
Write a program that would determine the day number in a non-leap year. For example, in a non-leap year, the day number for Dec 31 is 365; for Jan 1 is 1, and for February 1 is 32. This program will ask the user to input day and month values. Then it will display the day number day number corresponding to the day and month values entered assuming a non-leap year. (See part II to this exercise below).
Answer:
In Python:
months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]
daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]
day = int(input("Day: "))
month = input("Month: ")
ind = months.index(month)
numday = 0
for i in range(ind):
numday+=daymonths[i]
numday+=day
print(numday)
Explanation:
This initializes the months to a list
months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]
This initializes the corresponding days of each month to a list
daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]
This gets the day from the user
day = int(input("Day: "))
This gets the month from the user
month = input("Month: ")
This gets the index of the month entered by the user
ind = months.index(month)
This initializes the sum of days to 0
numday = 0
This adds up the days of the months before the month entered by the user
for i in range(ind):
numday+=daymonths[i]
This adds the day number to the sum of the months
numday+=day
This prints the required number of days
print(numday)
Note that: Error checking is not done in this program