Answer:
A class
Explanation:
A class is a construct that enables you to create your own custom types by grouping together variables of other types, methods and events. You can map classes to an existing database or use them to generate a database. In this tutorial, you'll create the data models by writing data model classes.
What is the primary hash algorithm used by the NIST project created to collect all known hash values for commercial software and OS files
Answer:
National Software Reference Library (NSRL).
Explanation:
NIST is acronym for National Institute of Standards and Technology and it's under the U.S. Department of Commerce. The NIST cybersecurity framework (CSF) is a powerful tool that provide guidelines for both the external and internal stakeholders of organization on how they can effectively and efficiently organize, manage, and improve their cybersecurity programs, so as to mitigate the risks associated with cybersecurity.
National Software Reference Library (NSRL) is the primary hash algorithm used by the National Institute of Standards and Technology (NIST) project created to collect all known hash values for commercial software and operating system (OS) files.
Write a short note on Computer
impact on
our society?
well not a note but here are some few points
Explanation:
1 Computers can have the huge impact on employment of people like job and other stuff.
2 lots of human can be jobless or unemployed
3 it can cuz impact on the health of peoples
4 it also can make us lazy and and lack of self knowledge
Answer:
Everybody knows that the computer age is here, and most people use the computer. Science and technology development has a direct impact both on our everyday life and on our social lives. In seconds, computer technology has enabled communication between the two parts of the world. In one part of the world, you may see the transactions while in the other part. The development of computers is one of the 20th century's greatest scientific achievements.
Explanation:
Positive Impact of Computer:-
The work can be done very quickly.You can store more information in a small space.Multitasking and data multimedia capacity.Access to data is easy.Negative Impact of Computer:-
Very costly.Accidents.Pirating data. Enhanced joblessness.Sometimes enormous data and information can be lost.Computer technology is changing rapidly.Distribution of services.Computing and computer analphabetism.Write the definition of a public class Simple. The class has no constructors, methods or instance variables.
Answer:
public class Simple{}
Explanation:
What accesses organizational databases that track similar issues or questions and automatically generate the details to the representative who can then relay them to the customer
Answer: Call scripting
Explanation:
A script refers to the computer language that has different commands in a file and can be executed without them being compiled.
Call scripting can be used in accessing organizational databases which track identical issues and then automatically generate the details to the representative who can then relay them to the customer.
In the context of applications of artificial intelligence (AI), _____ perform well at simple, repetitive tasks and can be used to free workers from tedious or hazardous jobs.
Answer:
The right response is "Robots ".
Explanation:
A robot seems to be an independent machine that can detect its surroundings, conduct simulations, as well as take action throughout the modern or actual environment.It is indeed a piece of computer-controlled equipment, which would also be utilized autonomously for carrying out duties or other hazardous tasks.Artificial intelligence is a far more superior or complicated aspect of intelligence. They make use of patterns to find solutions to various problems.
Artificial intelligence machines are called robots. These tend to work and perform tasks that are much complex and length within short and simple steps. They can be sued to free the workers and help in any hazardous situation or events. Hence they serve the purpose of bots or robots.Learn more about the context of applications of artificial intelligence (AI).
brainly.com/question/24259157.
Popular mixed drinks such as margaritas
contain more alcohol than a standard drink.
A. will
B. do not necessarily
O C. never
Drugs
the chemistry of the brain and the way that a person thinks.
A. change
B. don't change
C. trick
Highway Safety Administration
Answer:
C.never and A.change that's what I think
One property of light that makes it possible to record the image of an object with the camera
Answer:
Reflection
Explanation:
Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.
So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.
write a pseudocode that reads temperature for each day in a week, in degree celcius, converts the celcious into fahrenheit and then calculate the average weekly temperatures. the program should output the calculated average in degrees fahrenheit
Answer:
total = 0
for i = 1 to 7
input temp
temp = temp * 1.8 + 32
total + = temp
average = total/7
print average
Explanation:
[Initialize total to 0]
total = 0
[Iterate from 1 to 7]
for i = 1 to 7
[Get input for temperature]
input temp
[Convert to degree Fahrenheit]
temp = temp * 1.8 + 32
[Calculate total]
total + = temp
[Calculate average]
average = total/7
[Print average]
print average
_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen
Answer:
Downloadable
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.
For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.
A company with archived and encrypted data looks to archive the associated private keys needed for decryption. The keys should be externally archived and heavily guarded. Which option should the company use?
Answer:
Key escrow
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user. Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In conclusion, the option which the company should use is a key escrow.
In PowerPoint, a type of chart that, rather than showing numerical data, illustrates a relationship or logical flow between different ideas is called
A. SmartArt
B. WordArt
C. Clip Art
D. Number Art
Answer:
A. SmartArt
Explanation:
SmartArt is a graphical tool used to visually communicate information.
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?
Answer:
Salting
Explanation:
Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.
Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks
The salt for each user is a unique value that is stored along with the username in a database
Question 1:
The Wayfinder is an ancient piece of technology created as a means of navigating challenging stretches of space. The device connects to every piece of technology in the galaxy in order to detect planets and spaceships and then shown their location to the user. As it happens, locations of planets follow a specific distribution. A planet can exist at coordinates x,y only if
2x² + |2xy| + y² =10000
The user can use the Wayfinder to find nearby planets by input the range for x and y. Draw a flowchart and write a C++ program that models the Wayfinder. Ask the user to input a range for x and y, then print all possible planet coordinates. The program should also print the number of planets detected.
Hint: you can use pow(x,n) to get the value of xn and abs(x) to get the absolute value of x.
helpppppppppp!!!!!!!!!!
Sample output:
Answer:
Following are the code to the given question:
#include<iostream>//header file
#include<math.h>//header file
using namespace std;
int main()//main method
{
long long x, x1, y, y1;//defining long variable
int count=0,i,j;//defining integer variable
cout<<"Enter a range for x coordinates: "<<endl;//print message
cin>>x>>x1;//input x and x1 value
cout<<"Enter a range for y coordinates: "<<endl;//print message
cin>>y>>y1; //input y and y1 value
for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates
{
for(j = y; j <= y1; j++)//use nested loop that tests each coordinates
{
if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question
{
cout<<"There is a planet at "<<i<<", "<<j<<endl;// print coordinates
count++;//incrementing count variable value
}
}
}
cout<<"Total number of planets detected are: "<<count<<endl;//print count value
return 0;
}
Explanation:
In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.
In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.
True or False? Using your traffic analytics report, you can see the source of traffic to your website
Answer:
True
Explanation:
which one will be the correct answer
pls tell
Answer:
option c clean boot. it is correct.
A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.
Answer:
Explanation facility
Explanation:
Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion
If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False
PLEASEE HELP
Answer:
false , those are called passive railways
A program that allows employees to choose their starting and ending times, as long as they are at work during a specified core period, is called ______.
Answer:
flextimes
Explanation:
Flex times is defined as the flexible time that is scheduled for allowing the workers to alter the workday start and their finish times. This is in contrast to the traditional work arrangements which require for the employees to start work at a standard 9 a.m. and to finish at 5 p.m.
It is program which allows the employees to choose a suitable starting time as an ending time for doing their work during the specified core period.
Your internal network is protected from Internet attacks by a Cisco firewall. To improve security, your supervisor suggests installing a Fortinet firewall between the Cisco firewall and the trusted LAN, then using the space between as a perimeter network. Which security principles does this promote
Answer:
Defense-in-depth
Vendor diversity
Explanation:
The Defense-in-depth or the DiD means a security approach in information where a series of security mechanism and also controls are layered throughput the computer network in order to protect the confidentiality, availability and integrity of the network as well as the data within.
The security principle of Vendor diversity approach is a way of implementing the security controls from the different vendors to increase the security of the network.
Thus in the context, the supervisor is trying to promote the Defense-in-depth as well as the Vendor diversity principles of security by asking to install a Fortinet firewall between the Cisco firewall and its trusted LAN.
Which is the most viewed vdo in YT ever?
what is microsoft speadsheet
Answer:
Exel if I spelled it right
Explanation: It is very good
Answer:
It's called Excel and it's in Office 365
Explanation:
It's very useful in my opinion to organize any graphs or information you would like to store online.
If you want to work on all aspects of your presentation, switch to __________ view, which displays the Slide pane, Outline pane, and Notes pane.
Answer:
Normal
Explanation:
If you want to work on all aspects of your presentation, switch to normal view, which displays the Slide pane, Outline pane, and Notes pane.
What is presentation?Productivity software includes Docs, Excel, and Presentation software. Word processing programs, spreadsheets, presentation software, and graphic design programs are examples of productivity software.
Norton Antivirus is a type of antivirus and security software for PCs and laptops that is one of the options provided. Instant Messenger is a type of communication software that allows two or more people to communicate via text over the Internet or other types of networks.
It enables efficient and effective communication by allowing for the immediate receipt of a response or acknowledgement.
Therefore, switch to normal view to work on all aspects of your presentation, which displays the Slide pane, Outline pane, and Notes pane.
To learn more about the presentation, refer to the below link:
https://brainly.com/question/17087249
#SPJ2
I m a rectangle in a flow chart? What do I represent?
Answer:
It represents processing box
Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.
82 point question even tho it’s really easy
Answer:
swa#22*88#&mu#hu..
Explanation:
hope it correct
which is known as accurate processing of computer gigo E mail MHz bug
GIGO is the considered as the accurate processing in computers.
In the field of computer science, the word GIGO stands for " garbage in, garbage out".
It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.
It is the inability of the program to any bad data providing incorrect results.
Thus GIGO is the most accurate processing in a computer programs.
Learn more :
https://brainly.in/question/23091232
1.printer is an example of......... device.
Printer is an example of output devise.It gives hard copy output on paper .
1. Printer is an example of output device.
I hope it's help you...
A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used
Question options:
State Machine
Flowchart
Sequence
Global Exception Handler
Answer:
Sequence
Explanation:
Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.
Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called: cumulative sequence check batch sequence check suspense file of missing numbers computer agreement of batch totals
Answer:
batch sequence check.
Explanation:
A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.
The steps for checking an event data within a batch using a batch sequence check include the following;
I. You'll enter a range of serial numbers of the document in a batch.
II. You'll enter each serially pre-numbered document one after the other.
III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.
What is an html skeleton? If you know what it is can you write it for me?
Answer:
HTML Skeleton. The basic HTML skeleton is the set of tags required of every HTML web page you build. The tags that make up the skeleton tell browsers what kind of file it is reading, and without the skeleton HTML files will not be rendered correctly in web browsers. There are four tags that need to be included in the skeleton.
Explanation:
Question 8 of 10
Which type of computer operating system would be best for a large
corporation?
O A. Single-user, multitasking
B. Multi-user, multitasking
C. Single-user, single-tasking
D. Real-time
Answer: B. Multi-user, multitasking.
Explanation:
Multiuser/Multitasking operating system refers to an operating system that's powerful and supports more than one user at a time, and can also perform more than one task at a time.
The operating system allows many users to use the programs which are running concurrently on a single network server. It is the computer operating system that would be best for a large corporation. An example is UNIX.