Answer:
Welcome to Gboard clipboard, any text you copy will be saved here.
state an application that would be better to write c++ than java and give a rationale for your answer
Write a python program to calculate the sum of three numbers and as well require the user to input the numbers.
Answer:
numbers = []
for i in range(3):
numbers.append(eval(input("Enter number: ")))
print('Sum is:', sum(numbers))
Explanation:
You want to use a loop to prevent repeating your code.
Answer:
numbers = []
for i in range(3):
numbers.append(eval(input("Enter number: ")))
print('Sum is:', sum(numbers))
Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of them are odd.
Answer:
import random
numbers = []
even = 0
odd = 0
for i in range(100):
numbers.append(random.randint(1, 200))
for i in range(100):
if numbers[i] % 2 == 0:
even += 1
else:
odd += 1
print("Even:", even)
print("Odd:", odd)
Explanation:
Gg ez.
At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:
a) message content
b) source address
c) type of application
The answer is c) type of application
The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name. Thus, option C is correct.
What are the TCP/IP protocol hierarchy could a firewall?Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).
Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.
Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.
Learn more about TCP/IP here:
https://brainly.com/question/27742993
#SPJ2
Define Word Processing
Answer:
Word Processing refers to the act of using a computer to create, edit, save and print documents. ... Text can be inserted, edited, moved, copied or deleted within your document and the appearance of the text can be modified in numerous ways.
What is the result of the following code?
x=7//2+10%2**4
print(x)
Answer:
3
Explanation:
We can split the expression into two sections
First Section:
7 // 2 = 3. Using the floor division we only utilize the integer part.
Second Section:
10 % 2**4 = 0**4 = 0
Bringing back the full version expression we have
3 + 0 = 3
I really need help with this question! Please help!
Answer:
(C) Emma goes to sleep late and does not set an alarm.
Explanation:
Decomposing a problem is setting a back drop inference as to (WHY?) something happens . So Emma woke up late , the only reasonable (WHY?) in this question would be (C)
13) You notice that the row labels in your spreadsheet are 1, 2, 3, 8, 9.
Row labels 4 through 7 are missing. What could cause this?
Possible reasons for missing out row 4 to 7 are as follows,
Chance of rows from 4 to 7 contain incorrect/ non formatted data.Chance of rows from 4 to 7 are in hidden state.Chance of rows from 4 to 7 are assigned to some other user which does not belongs to your current user.Chance of rows from 4 to 7 were deleted from the sheet.These are all the possible reasons for missing of row 4 to 7.
Learn more: https://brainly.com/question/24504878
Alexis plans to stop trading once she lose 5% of her account balance, her account balance is $215.00. How much money is she willing to lose ?
Answer:
She's willing to lose $10.75.
Explanation:
$215.00 * .05 = answer
or
$215.00 * .95 = x
$215.00 - x = answer
Identifies 3 different companies that use Information Systems. Then for each company describe the WHAT the company actually uses, the HOW the company uses it, and the WHY the company needs to implement this system within itself.
The companies that use Information Systems are
Amazon IBMRRE VenturesHow does Ama.zon use information systems?Ama.zon uses information systems in a lot of its business processes as it helps them to have good and improved efficiency in the the area of collection, storage, and analytics of all their customers' information.
Conclusively, IBM uses the information system for:
Keeping of customers information.communicating.Buying and selling etc.Learn more about Information Systems from
https://brainly.com/question/14688347
I have a D in one of my majors, I got a lot of 70s and I'm failing music. im in middle school. Will I be held back? Please answer this
Answer:
probably sorry it will be okay
• R7.9 Write enhanced for loops for the following tasks.
a. Printing all elements of an array in a single row, separated by spaces.
b. Computing the maximum of all elements in an array.
2. Counting how many elements in an array are negative.
Answer:
a is the correct answer
Explanation:
correct me if I'm wrong hope it's help thanks
C++
see attached file for quesion
Your job is to protect your company's information assets. What security objectives
should you address?
1) Assets, liabilities, and threats
2) Common vulnerabilities and exposures
3) Confidentiality, integrity and availability
4) Risks, threats and vulnerabilities
Answer:3
Explanation: The CIA Triangle is the basis of all Security related needs.
check image dont answer if you dont know please
Answer:
Explanation:
1-2nd option
2-1st option
3-last option
hope this helps!! have a good rest of ur day!! <3
A Product Manager has been given responsibility for overseeing the development of a new software application that will be deployed to a group of Accenture clients.
What would be the most time-saving and cost-effective way for the Product Manager to address the new application’s security considerations?
Utilize a DevSecOps approach to incorporate security into the development process from the beginning.
Schedule development of security features after the application’s initial release.
Design the application’s security features after the application’s initial build is complete.
Contract with an external vendor to develop a security solution separately from the main application.
I don't know this yet.
There are different software that has been developed today. The most time-saving and cost-effective way is to Design the application’s security features after the application’s initial build is complete.
Accenture is known for their work in improving business needs. They are constantly shifting to a new method of delivering information technology.
They are known to embed security into the product development life cycle helps secure the business and also keeping speed and assisting to remove friction.
Learn more about Accenture from
https://brainly.com/question/25737623
Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20.
The program performs the following tasks:
Read the file name of the tsv file from the user.
Open the tsv file and read the student information.
Compute the average exam score of each student.
Assign a letter grade to each student based on the average exam score in the following scale:
A: 90=
B: 80=< X < 90
C: 70=< X < 80
D: 60=< X < 70
E: X < 60
Compute the average of each exam.
• Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt.
• Output one student per row and separate the values with a tab character.
• Output the average of each exam, with two digits after the decimal point at the end of report.txt. Hint: Use the setprecision manipulator to format the output.
Ex: If the input of the program is:
StudentInfo.tsv
and the contents of Studentinfo tsv are:
Barrett Edan 70 45 59
Bradshaw Reagan 96 97 88
Charlton Caius 73 94 80
Mayo Tyrese 88 61 36
Stern Brenda 90 86 45
the file report.txt should contain:
Barrett Edan 70 45 59 F
Bradshaw Reagan 96 97 88 A
Charlton Caius 73 94 80 B
Mayo Tyrese 88 61 36 D
Stern Brenda 90 86 45 C
Averages: midtermi 83.40, midterm2 76.60, final 61.60
If a client must wait too long for software that works, he might attempt to add requests for more and more features to be added to the program. This is known as ________.
Answer:
scope creep
Explanation:
Explain if a company is responsible for using computer components manufactured using fair trade practices. [9 marks]
Answer:
Fair trade practices aims at promoting the fair relationships between the buyers and producers. It is a kind of a social movement that makes the producers to provide the better conditions and humane working environment in case of developing countries.
• It also favors and supports the proper and substantial payment to the manufacturers and wages to the labors.
• It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.
Explanation:
can you mark me as brainlist
Answer:
It is a trading partnership that states the manufacturers to analyze and check their supply sources or resources and provide disclosure if the materials were produced or mined in the areas of conflict or areas of extreme poverty.
VPN or Proxy is safer?
Responsible manner in video and audio conferencing
Answer:
1.Mute yourself when not speaking.
2.Be on time.
3.Ensure your technology works correctly.
4.Use technology to fully engage remote participants.
Explanation:
hi hi hihihihihivvv hihihihihihi v vhi
Answer: hihihihihihiihihi hihihihiihihih
Explanation: hi.
list 3 things needed in order to complete mail merge process.
pls help me!
People can use computers for sending ....... writing reports, listening to music and playing games.
Answer:
the answer is messages, emails, texts
Hope This Helps!!!
Answer:
People can use computers for sending MESSAGES'TEXT'EMAILS ,writing reports,listening to music and playing games....What is a shell programming? Write a shell program to get the following details from the student: NAME, AGE, USN and GENDER. Output all the details to the terminal and also display message whether the student is eligible to vote or not
Shell programs are computer programs designed to run on the Unix/Linux shell
The shell program where comments are used to explain each line is as follows:
#This gets input for NAME
read NAME
#This gets input for AGE
read AGE
#This gets input for USN
read USN
#This gets input for GENDER
read GENDER
#This prints the name
echo "Name: $NAME"
#This prints the age
echo "Age: AGE"
#This prints the usn
echo "USN: USN"
#This prints the gender
echo "GENDER: $GENDER"
#The following if condition determines, if the user is eligible to vote or not
if [ $USN -gt 50 ] then
echo "You are not eligible"
else
echo "You are eligible"
Read more about computer programs at:
https://brainly.com/question/13795586
Complete the sentence based on the given information.
______ are responsible for analyzing the client business model, whereas _____ are responsible for identifying errors in the software product to confirm that it meets the client model.
Answer:
blank answer so brainly doesnt delete your question.
Explanation:
Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
Brainliest if correct. 5. if you wanted b show how many employees at your office ride a bicycle to work in
comparison to the number of employees who drive a car, take public transportation,
or walk wihat visual would be best? (1 point)
Answer:
I believe a bar graph would be best for me. What are your answer options though?
Explanation:
explain the use of mail merge feature.
pls help
what are organization tools?