AutoCAD is one of the first computer-aided design programs that was also one of the first to be integrated into ERP systems.
What is AutoCAD?To put it simply, AutoCAD is a type of CAD software that focuses on drawing and modeling in 2D and 3D. It allows for the creation and modification of geometric models with nearly infinite potential for creating various structures and objects.Because of its versatility, AutoCAD has expanded beyond its traditional use in architecture and engineering to enter the worlds of graphic and interior design.It is a required key in AutoCAD that ensures the execution of a command and can change the function of other keys.The Area command in AutoCAD is a very useful command that can be used to calculate the area and perimeter of a closed region drawn with a polyline.To learn more about AutoCAD refer to :
https://brainly.com/question/25642085
#SPJ4
Sammy’s Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrella to tourists. Modify your Application as follows: Using Python
Modify the getinput() function that accepts the user information so that it prompts for a customer name, first name and last name. Store in two separate variables.
Add data validation to the account number so that only a 4 character string is allowed. The first character must be an A. You will need to use a while loop here because you do not know how many times the user will enter an invalid Account Number. You will have two conditions for the while loop: while the length of the account number variable does not equal 4 or while the account number variables does not start with the letter "A".
Add a phone number input to the getinput(). Make sure that the phone number is 7 digits. Use a while loop that keeps asking the user to enter the phone number until it is seven digits.
Return all values from the getinput() function -- there will be 5 of them.
Modify the main() function so that the line that calls the getinput() function stores all 5 returned values in separate variables.
Modify the main() function so that the values returned from the getinput() function are passed to the calculatefotal() function.
Modify the header of the calculatetotal() function so that is accepts 5 parameters ( the account number, the number of minutes, the first name, the last name , and the telephone number.
Modify the function that calculates the total and displays all the information, so that it displays the Contract Number, first and last names, and the Phone Number. The Phone Number should be displayed in the ###-#### format. You can the slice function to do this.
Includes comments at the top to identify file name, project and a brief description.
For further documentation, include comment for each section of code.
Sample Run:
ACCOUNT NUMBER:, A234 (program keeps prompting until a 4 character, starting with an A
Name Sally Douglass
123 – 4567 (formatted in the module that displays the result)
Minutes rented: 115
Whole hours rented: 1
Minutes remaining: 55
Rental cost: $ 80
Coupon good for 10% Off!
This is my original code base on the instruction how do I add the new code to the case
# Main function calls other functions
def main():
display()
a,x=getinput()
calculatetotal(x,a)
# function to display logo
def display():
#Display the Sammy’s logo
print("-------------------------------------------------------------")
print("+ +")
print("+ “SAMMY’S MAKES IT FUN IN THE SUN +")
print("+ +")
print("+ +")
print("-------------------------------------------------------------")
# function to receive input from user
def getinput():
# Request the minutes rented and store in variable
contract_number = (input("Enter the account number"))
rented_minutes = int(input("Enter the number of minutes it took to rent: "))
while (rented_minutes<60 or rented_minutes>7200):
rented_minutes = int(input("Try again"))
return rented_minutes,contract_number
# function to calculate hours, minutes remaining and cost
def calculatetotal(acc,mins):
# Calculate number of whole hours
whole_hours = mins//60
# Calculate the number of minutes remaining
remaining_min = mins % 60
# Calculate the cost as hours * 40 + minutes remaining times 1
#Calculation from smallest to greater by getting the smallest number
cost = whole_hours*40+ min(remaining_min*1, 40)
# >Display minutes, whole hours, minutes remaining, and cost with labels
# Print all values
print(("ACCOUNT NUMBER:"),acc)
print("Minutes Rented:",mins)
print("Whole Hours:",whole_hours)
print("Minutes Remaining:",remaining_min)
Answer:
figure it out
Explanation:
Which of the following is not true about Mac computers? The current version of OS X is called El Capitan. Macs come with a variety of useful programs already installed. Boot Camp is a program that allows you to install and run Windows on a Mac Macs have a reputation for being unsecure, unstable and difficult to use.
Write an essay of at least 250 words describing the connections between people and computing and the role of equity in those connections.
As you research, consider that equity is affected by the actions of individuals, organizations, and governments. How is the equity question you choose as your topic affected by these players?
When used correctly, technology can make a significant contribution to equity. It removes obstacles to accessing educational materials, meets students where they are in various learning contexts and needs, and provides educators with better understanding into the educational contexts they are creating.
What is equity?Digital equity is defined by the National Digital Inclusion Alliance (NDIA) as "a condition in which all individuals and communities have the information technology capacity required for full participation in our society, democracy, and economy."
Computer science for all students necessitates that equity be prioritized in any reform effort.
When equity exists, appropriate supports are provided based on individual student needs, allowing all students to achieve similar levels of success.
Technology, when used correctly, can make a significant contribution to education equity.
It removes barriers to educational materials access, meets students where they are in diverse learning contexts and needs, and gives educators a better understanding of the educational contexts they are creating.
Thus, this is the connections between people and computing and the role of equity in those connections.
For more details regarding equity, visit:
https://brainly.com/question/13278063
#SPJ1
Write a program that keeps track of a simple inventory for a store. While there are still items left in the inventory, ask the user how many items they would like to buy. Then print out how many are left in inventory after the purchase. You should use a while loop for this problem. A sample run is below.
(CodeHS, PYTHON)
Answer:
STARTING_ITEMS_IN_INVENTORY = 20
num_items = STARTING_ITEMS_IN_INVENTORY
# Enter your code here
while num_items > 0:
print("We have " + str(num_items) + " items in inventory")
toBuy = int(input("How many would you like to buy?"))
if toBuy > num_items:
print("There is not enough in inventory")
print("Now we have " + str(num_items) + " left")
else: # ok to sell
num_items = num_items - toBuy # update
if num_items > 0: # only for printing
print("Now we have " + str(num_items) + " left")
print("All out!")
Explanation:
This allows Python to store the number of items in inventory after each purchase by subtracting how much is bought with the toBuy function by how much is left. This continues until num_items is no longer greater than zero. If what’s toBuy goes above the # of items left in inventory, then the “if toBuy > num_items” segment of the code comes into play by telling the user there’s not enough and re telling them how much is left and how much they’d like to buy. When the items in inventory is out, meaning the exact amount that’s left is purchased, then Python prints “All out!”
Following are the code to the given question:
Program Explanation:
Defining a variable "INVENTORY_ITEMS" that hold an integer value.Defining a variable "num" that holds "INVENTORY_ITEMS" value.In the next step, a while loop is declared that checks "num" value greater than 0.Inside the loop, "num and To_Buy" is declared and in the To_Buy it inputs value by user-end.In the next step, conditional statement is used that check "To_Buy" value and prints its value.At the last another conditional statement is used that checks num value, and print its value.Program:
INVENTORY_ITEMS = 20#defining a variable INVENTORY_ITEMS that hold integer value
num= INVENTORY_ITEMS#defining a num variable that holds INVENTORY_ITEMS value
while num > 0:#defining a while loop that check num value greater than 0
print("We have " + str(num) + " items in inventory")#print num value with message
To_Buy = int(input("How many would you like to buy?"))#defining To_Buy variable that inputs value
if To_Buy > num:#defining if block that check To_Buy value greater than num value
print("There is not enough in inventory")#print message
print("Now we have " + str(num) + " left")#print num value with message
else: # defining else block
num= num - To_Buy#using num variable that decreases num by To_Buy
if num> 0: #use if to check num greater than 0
print("Now we have " + str(num) + " left")#print num value with message
print("All out!")#print message
Output:
Please find the attached file.
Learn more:
brainly.com/question/18634688
8. Give regular expressions with alphabet {a, b} for
a) All strings containing the substring aaa
b) All strings not containing the substring aaa
c) All strings with exactly 3 a’s.
d) All strings with the number of a’s (3 or greater) divisible by 3
Answer:
i think its C
Explanation:
The given SQL creates a song table and inserts three songs.
Write three UPDATE statements to make the following changes:
Change the title from 'One' to 'With Or Without You'.
Change the artist from 'The Righteous Brothers' to 'Aritha Franklin'.
Change the release years of all songs after 1990 to 2021.
Run your solution and verify the songs in the result table reflect the changes above.
CREATE TABLE song (
song_id INT,
title VARCHAR(60),
artist VARCHAR(60),
release_year INT,
PRIMARY KEY (song_id)
);
INSERT INTO song VALUES
(100, 'Blinding Lights', 'The Weeknd', 2019),
(200, 'One', 'U2', 1991),
(300, 'You\'ve Lost That Lovin\' Feeling', 'The Righteous Brothers', 1964),
(400, 'Johnny B. Goode', 'Chuck Berry', 1958);
-- Write your UPDATE statements here:
SELECT *
FROM song;
Answer:
UPDATE song SET title = 'With Or Without You' WHERE song_ID = 200UPDATE song SET artist = 'Aritha Franklin' WHERE song_ID = 300UPDATE song SET release_year = 2021 WHERE release_year > 1990Explanation:
Given
The above table definition
Required
Statement to update the table
The syntax of an update statement is:
UPDATE table-name SET column-name = 'value' WHERE column-name = 'value'
Using the above syntax, the right statements is as follows:
UPDATE song SET title = 'With Or Without You' WHERE song_ID = 200The above sets the title to 'With Or Without You' where song id is 200
UPDATE song SET artist = 'Aritha Franklin' WHERE song_ID = 300
The above sets the artist to 'Aritha' where song id is 300
UPDATE song SET release_year = 2021 WHERE release_year > 1990The above sets the release year to '2021' for all release year greater than 1990
Should one own a smart home device
What are some security issues that one can find bothersome with these types of devices?
Yes, one can have or should one own a smart home device
Some security issues that one can find bothersome with these types of devices are:
Privacy concernsVulnerabilities to hackingLack of updatesWhat are the security issues?Smart home tools offer usefulness and can help create growth easier, but they further create freedom risks that should be deliberate.
Some freedom issues so that find bothersome accompanying smart home tools contain:
Lastly, in terms of Privacy concerns: Smart home ploys may accumulate individual dossier, such as custom patterns and choices, that could be joint accompanying after second-party parties for point or direct at a goal buildup or added purposes.
Learn more about security issues from
https://brainly.com/question/29477357
#SPJ1
Match the terms with the appropriate definition.
1.image-editing software
--------------------------------------------Portable Document Format
2.PDF
------------------------------------------------software that organizes a collection of information
3.presentation software
---------------------------------------------------software used to create a slide show
4.CAD
-------------------------------------------------software used to create technical drawings
5.database software
--------------------------------------------------software used to enhance photographs
Answer:
1: Image editing software is software used to enhance photographs.
2: PDF is abbreviation for Portable Digital Format.
3: Presentation software used to create a slide show.
4: CAD ( Computer Aided Designing ) software used to create technical drawings .
Explanation:
\(.\)
Answer: 1 image editing software software used to enhance photographs
2 PDF Portable Document Format
3 presentation software used to create a slide
4 CAD software used to create techinal drawings
5 database software software that organizes a collection of information
Explanation:
SHORT ANSWERS:
Q.1 List some causes of poor software quality?
Q.2 List and explain the types of software testing?
Q.3 List the steps to identify the highest priority actions?
Q.4. Explain the importance of software quality?
Answer:
Hard drive Microsoft have the highest priority actions
what is the abbreviation of IP address
Answer: Internet Protocol Address
Explanation: IP Address is the abbreviation of Internet Protocol Address
Hope this helps
--Wavey
the meaning of the abbreviation of IP address is: Internet Protocol address(IP address)
sorry if that isn't what you meant, but hope this helps
Describing Education for Accountants
s
Click this link to view O'NET's Education section for Accountants. According to O'NET, what is the most common
level of education required for Accountants?
O master's degree
bachelor's degree
associate degree
high school diploma or its equivalent
Answer: bachelor's degree
Explanation:Click this link to view ONET's Education section for Accountants. According to ONET, what is the most common level of education required for Accountants? master's degree bachelor's degree associate degree high school diploma or its equivalent
View the accountant education part of o*net by clicking this link. The most typical amount of education needed for accountants, according to o*net, is a bachelor's degree.
What is education?Education has the deliberate process with certain goals in mind, such as the transmission of knowledge or the development of abilities and moral qualities. The growth of comprehension, reason, kindness, and honesty are a few examples of these objectives.
In order to discern between education and indoctrination, various researchers emphasize the importance of critical thinking. Some theorists demand that education lead to the improvement of the learner, while others favor a definition of the term that is value-neutral.
Education can also refer to the mental states and dispositions that educated people possess, rather than the process itself, in a somewhat different sense. Transmission of cultural heritage from one generation to the next was the original purpose of education. New concepts, such as the liberty of learners, are being included into educational goals.
Therefore, View the accountant education part of o*net by clicking this link. The most typical amount of education needed for accountants, according to o*net, is a bachelor's degree.
Learn more about accountant on:
https://brainly.com/question/22917325
#SPJ7
What is the role of the computer in banking system?
Answer: In banks, computers are used for keeping account information of customer accounts. Banks use technology to carry out payments effectively and successfully. Computers help bankers keep a record of and verify financial records much quicker. Hope this is helpful.
Internet Retailing
Visit an e-commerce Web site such as Amazon.com and find a product you would like to purchase. While looking at the page for that item, count the number of other products that are being offered on that page.
Activity
Answer the following questions: What do they have in common? Why are they appearing on that page?
When I visited the e-commerce Web site such as Amazon.com and find a product that I would like to purchase which is a laptop, The thing that the sellers have in common is that they are trusted and verified sellers, their product presentation is nice and has warranty on it. The reason they are appearing on that page is because the product are similar.
What is E-commerce site website?The term e-commerce website is one that enables customers to buy and sell tangible products, services, and digital commodities over the internet as opposed to at a physical store. A company can process orders, receive payments, handle shipping and logistics, and offer customer care through an e-commerce website.
Note that there are numerous eCommerce platforms available, each with its own set of characteristics. The optimal eCommerce platform will therefore rely on your demands, available resources, and business objectives.
So, for instance, if you're a novice or small business owner looking to set up an online store in only a few clicks, go with a website builder like Hostinger. Oberlo, on the other hand, boasts the best inventory management system for dropshippers and is the top eCommerce platform overall.
Learn more about e-commerce Web site from
https://brainly.com/question/23369154
#SPJ1
Describe how the data life cycle differs from data analysis
The data life cycle and data analysis are two distinct phases within the broader context of data management and utilization.
The data life cycle refers to the various stages that data goes through, from its initial creation or acquisition to its eventual retirement or disposal. It encompasses the entire lifespan of data within an organization or system.
The data life cycle typically includes stages such as data collection, data storage, data processing, data integration, data transformation, data quality assurance, data sharing, and data archiving.
The primary focus of the data life cycle is on managing data effectively, ensuring its integrity, availability, and usability throughout its lifespan.
On the other hand, data analysis is a specific phase within the data life cycle that involves the examination, exploration, and interpretation of data to gain insights, make informed decisions, and extract meaningful information.
Data analysis involves applying various statistical, mathematical, and analytical techniques to uncover patterns, trends, correlations, and relationships within the data.
It often includes tasks such as data cleaning, data exploration, data modeling, data visualization, and drawing conclusions or making predictions based on the analyzed data.
The primary objective of data analysis is to derive actionable insights and support decision-making processes.
In summary, the data life cycle encompasses all stages of data management, including collection, storage, processing, and sharing, while data analysis specifically focuses on extracting insights and making sense of the data through analytical techniques.
Data analysis is just one component of the broader data life cycle, which involves additional stages related to data management, governance, and utilization.
To know more about life cycle refer here
https://brainly.com/question/14804328#
#SPJ11
TCPDump is used by Wireshark to capture packets while Wireshark own function is:
a. to provide a graphical user interface (GUI) and several capture filters.
b. to act as an intrusion prevention system (IPS) by stopping packets from a black-listed website or packets with payloads of viruses.
c. to defend the network against TCP SYN Flooding attacks by filtering out unnecessary TCP packets.
d. yet to be defined.
Answer:
a. to provide a graphical user interface (GUI) and several capture filters
Explanation:
TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text
Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.
The source document states:
(S) The range of the weapon is 70 miles.
The new document states:
(S) The weapon may successfully be deployed at a range of 70 miles.
Which concept was used to determine the derivative classification of the new document?
Select one:
a.
Revealed by
b.
Classification by Compilation
c.
Extension
d.
Contained in
Answer: its b i took the test
Explanation:
What is the value of scores[3] after the following code is executed? var scores = [70, 20, 35, 15]; scores[3] = scores[0] + scores[2];
scores[3]( 15 ) = scores[0]( 70 ) + scores[2]( 35 ) == 105
If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least
If you buy $1000 bicycle, the credit payoff strategy that will result in your paying the least is option c) Pay $250 per month until it's paid off.
Which credit card ought to I settle first?You can lower the total amount of interest you will pay over the course of your credit cards by paying off the one with the highest APR first, then moving on to the one with the next highest APR.
The ways to Pay Off Debt More Quickly are:
Pay more than the required minimum.more than once per month.Your most expensive loan should be paid off first.Think about the snowball approach to debt repayment.Keep track of your bills so you can pay them faster.Learn more about credit payoff strategy from
https://brainly.com/question/20391521
#SPJ1
See full question below
If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least
a) Pay off the bicycleas slowly as possible
b) Pay $100 per month for 10 months
c) Pay $250 per month until it's paid off
Drag each tile to the correct box.
Anne wants to post online videos about her favorite recipes. She plans to start a video podcast for this purpose. Arrange the tiles in the order that
Anne should carry out the steps.
To help Anne successfully start a video podcast for sharing her favorite recipes online, the following steps should be arranged in the recommended order.
Define the Podcast Format: Anne should begin by defining the format of her video podcast. This involves deciding on the episode length, structure, and style that aligns with her content and target audience. Determining whether she will have a solo show or invite guest chefs, and choosing the frequency of episodes, will provide a clear direction for her podcast.
Plan the Content: Once the format is established, Anne should plan her content strategy. This includes selecting the recipes she wants to feature, creating an episode outline, and considering any additional segments or themes she wants to incorporate. Planning the content in advance ensures consistency and helps Anne stay organized throughout the podcasting process.
Gather the Equipment: Anne needs to gather the necessary equipment for recording her video podcast. This includes a good-quality camera, microphone, and lighting setup. She should also consider investing in a tripod or other stabilizing tools to ensure steady footage. Acquiring the right equipment will contribute to the overall quality of her videos.
Set Up the Recording Space: Anne should designate a dedicated space for recording her podcast episodes. This area should have good lighting, minimal background noise, and a visually appealing backdrop that complements the recipe theme. Creating a professional-looking recording space enhances the overall production value of her videos.
Edit the Videos: After recording, Anne needs to edit her videos to refine the content and enhance the visual appeal. Using video editing software, she can trim unnecessary footage, add music or graphics, adjust colors and audio levels, and incorporate any additional elements that enhance the viewer's experience. Editing will help create a polished and professional final product.
Publish and Promote: Once the episodes are edited, Anne can proceed to publish them on a video hosting platform or her website. She should optimize the video titles, descriptions, and tags to increase visibility and attract her target audience. Additionally, Anne should actively promote her video podcast on social media, food-related forums, and her personal network to generate interest and gain subscribers.
By following these steps in the recommended order, Anne can effectively launch her video podcast and share her favorite recipes with a growing online audience.
For more questions on podcast
https://brainly.com/question/16693974
#SPJ11
According to the information, the order of the steps are: Record the video using a cam and microphone, Transfer the video file to a computer, Edit the video, adding transitions and audio where needed, etc...
What is the correct steps order?To identify the correct steps order we have to consider the procedure that each option describes. Then we have to organize them according to the correct procedure. So, the order would be:
Record the video using a cam and microphone.Transfer the video file to a computer.Edit the video, adding transitions and audio where needed.Compress the video file for easy download.Register with a video podcasting host that provides an RSS feed.Upload the recipe video online.Learn more about procedures in: https://brainly.com/question/27176982
#SPJ1
What is the first phone ever made?
Answer:
the Telephone
Explanation:
Before the invention of electromagnetic telephones, mechanical acoustic devices existed for transmitting speech and music over a greater distance greater than that of normal direct speech. The earliest mechanical telephones were based on sound transmission through pipes or other physical media.The acoustic tin can telephone, or "lovers' phone", has been known for centuries. It connects two diaphragms with a taut string or wire, which transmits sound by mechanical vibrations from one to the other along the wire (and not by a modulated electric current). The classic example is the children's toy made by connecting the bottoms of two paper cups, metal cans, or plastic bottles with tautly held string.Some of the earliest known experiments were conducted by the British physicist and polymath Robert Hooke from 1664 to 1685. An acoustic string phone made in 1667 is attributed to him.For a few years in the late 1800s, acoustic telephones were marketed commercially as a competitor to the electrical telephone. When the Bell telephone patents expired and many new telephone manufacturers began competing, acoustic telephone makers quickly went out of business. Their maximum range was very limited. An example of one such company was the Pulsion Telephone Supply Company created by Lemuel Mellett in Massachusetts, which designed its version in 1888 and deployed it on railroad right-of-ways.Additionally, speaking tubes have long been common, especially within buildings and aboard ships, and they are still in use today. The telephone emerged from the making and successive improvements of the electrical telegraph. In 1804, Spanish polymath and scientist Francisco Salva Campillo constructed an electrochemical telegraph.The first working telegraph was built by the English inventor Francis Ronalds in 1816 and used static electricity. An electromagnetic telegraph was created by Baron Schilling in 1832. Carl Friedrich Gauss and Wilhelm Weber built another electromagnetic telegraph in 1833 in Göttingen.At the University of Gottingen, the two have been working together in the field of magnetism. They built the first telegraph to connect the observatory and the Institute of physics, which was able to send eight words per minute.
business cards can be send to other outlook users as email attachments or........
Answer:
Hey man, here is the answerExplanation:
The easiest route is Forwarding the existing conversation to another person. The previous thread will be quoted in the new message.
The method in the question appears to be for preserving the top-down reading structure of the existing thread, of which there is no way I'm aware of. Often times, the aforementioned method of simply forwarding an email is enough to impart some context to the person.
Alternatively, one might view the entire thread, and create a PDF of it (possible from the Print dialog box on a Mac, or to save as a PDF in the File/Edit menus in certain windows applications), which they could then send in an email.
QUESTION 6
To create our own Custom View, we may need to override the OnMeasure method. Why is
this? Give a practical example, with some of the variables we might want to access.
(a)
(b) There are three distinct means of creating a new view. Evaluate each in terms of complexity
and uniqueness of code.
(c)
onDraw method demands the knowledge of primitive shapes in order for it to be used
efficiently. Comment on this, detailing specific functionality to draw basic shapes.
Answer: eeeeeeek
Explanation:
The create our own Custom View, we may need There are three distinct means of creating a new view. Evaluate each in terms of complexity and uniqueness of code.
What is the complex?A complex is an informal phrase for what occurs when someone forms the opinion—often an exaggerated opinion—that a specific circumstance is risky or embarrassing. Saying, "For heaven's sake, don't draw attention to her nose being so huge!" is an example. She'll get a complex from you.
The term Measure customer view refers to that opportunity to tell. The android how big they want their customer view to be dependent on the layout constraints provided by the parents.
Therefore, The custom view means creating a new view. And evaluating terms of complexity.
Learn more about The complex here:
https://brainly.com/question/17027861
#SPJ1
To fill the entire background of a container use ___, it enlarges until it fills the whole element
repeat:both
full
cover
fill
Answer:
cover
Explanation:
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
How many subnets and host per subnet are available from network 192.168.43.0 255.255.255.224?
It should be noted that the number of subnets and hosts available from network 192.168.43.0 255.255.255.224 is 8 and 32, respectively. Only 30 of the 32 hosts are generally functional.
What is a host in computer networking?A network host is a computer or other device that is connected to a computer network. A host can serve as a server, supplying network users and other hosts with information resources, services, and applications. Each host is given at least one network address.
A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, computers use common communication protocols over digital links.
So, in respect to the above response, bear in mind that we may compute the total number of: by putting the information into an online IPv4 subnet calculator.
8 subnets; and30 hosts available for 192.168.43.0 (IP Address) and 255.255.255.224 (Subnet)
Learn more about hosts:
https://brainly.com/question/14258036
#SPJ1
write a method that returns the index of the smallest element in an array of integers. if the number of such elements is greater than 1, return the smallest index. use the following header: public static int indexofsmallestelement(double[] array)
Method that returns the index of the smallest element in an array of integers: Import java.util.Scanner; public class ArrayTest { public static int indexOfsmallestElement (double[] array) { int min=0; //itearating element by element and checking smallest element for(int i=0;i<array. length;i+
What does array index mean?An array is an ordered list of values referenced by name and index. For example, consider an array named emp containing employee names indexed by numeric employee number. So emp[0] is employee number 0, emp[1] is employee number 1, and so on.
What is the smallest element in an array?Iterates through the array from 0 to the length of the array and compares the min value to the elements of the array. If an element is less than min, min contains the value of that element. Finally, min represents the smallest element in the array.
What is the smallest index in the array?If no such index is found, print -1. So i = 1 is the desired index.
To learn more about index of an element visit:
https://brainly.com/question/9413922
#SPJ4
Tommy runs his juicer every morning. The juicer uses 416 W of Power and the current supplied is 3.2 A. What is the resistance of the juicer?
Every morning, Tommy uses his juicer, which has a 40.625-ohm resistance power (ohms).
What causes resistance?Resistance is a unit of measurement for a circuit's resistance to current flow. Ohms, a unit of measurement for resistance, are represented by the Greek letter omega ().
We can use Ohm's Law to calculate the resistance of the juicer:
Ohm's Law: V = I * R
where: V = voltage, I = current, R = resistance
We know the current I, and we can calculate the voltage V using the power P and the current I: P = V * I
Solving for V, we get: V = P / I
Substituting the given values, we get:
V = 416 W / 3.2 A
V = 130 V
Now we can use Ohm's Law to solve for the resistance R: R = V / I
Substituting the calculated values, we get:
R = 130 V / 3.2 A
R = 40.625 Ω
Therefore, the resistance of the juicer is 40.625 Ω (ohms).
To know more about Power visit:-
https://brainly.com/question/14635087
#SPJ1
One standard of word processing is to have only one space after
each _______________________ .
One standard of word processing is to have only one space after each period.
How did this convention begin?This convention originated from the typewriter era, where characters had the same width, and the two-space rule helped create a visual break between sentences. However, with the advent of modern word processors and variable-width fonts, the extra space can make the text appear uneven and disrupt the flow of reading.
Therefore, most style guides recommend using only one space after a period, which improves readability and creates a more polished look. This practice has become widely accepted in professional writing and is a common typographical standard today.
Read more about word processing here:
https://brainly.com/question/17209679
#SPJ1
What is research?. A. Looking at one page on the internet. B. Writing about a magazine article. C. Making a list interesting topics. D. Using many sources to study a topic.
hello
the answer to the question is D)
Answer: D
Explanation: Research is discovering many sources of information for a specific task, and the closest thing to that is answer D.
is there a way for me to play a .mp3 file from my computer using Atom?
They have a sound package. More info here: https://atom.io/packages/sound