Answer:
I took a screenshot of the test withe that question
Explanation:
What is cybercrime?
Describe some of the various cybercrimes?
What are the laws that govern cybercrimes?
What can we do to prevent being a victim?
Remember to provide examples.
Answer:
criminal activities carried out by means of computers or the internet is known as cyber crime.
4.8 Code Practice: Question 1
I need help
for x in range(5,76,5):
print(x, end=" ")
I wrote my code in python 3.8. Hope this helps
1. Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z
2. Write an if statement that assigns 10 to the variable b, and 50 to the variable c if the
3. Write an if-else statement that assigns 0 to the variable b if the variable a is less
than 10. Otherwise, it should assign 99 to the variable b.
Has and how does it work?
Algorithm Workbench
of the variable x is greater than 100.
variable a is equal to 100.
Answer:
if x > 100:
y = 20
z = 40
Explanation:
David bought 5.2 pounds of oranges for $1.20 per pound . how much did david spend ..................................................... explain to me how you did it
Answer:
David spent $6.24.
Explanation:
5.2 times 1.2
What is a commonly used software access restriction for a computer system connected to other networks such as the internet?
a.Passwords
b. Firewall
c. encryption
d. biometric systems
Answer:
firewall
Explanation:
Page
U what is a common language that computers use
to talk with one another on- a network?
a. client b. Adapter
c. protocol d. operating
System
public class Main{ public static void main(String [] args){ String name=WelcomeJava; Runnable r1=() -> System.out.println(name); String name1 = name.toUpperCase(); Runnable r2=() -> System.out.println(name1); r1.run(); } }
What is the output of the above program?
Answer:
Concept: Programming
You take a string as an input, and you output the result which is a user defined name.Then you take that name and turn all the strings to uppercase in name and return that result.Rate brainlistThe output of the given program is,
''WelcomeJava''
Given program is,
public class Main {
public static void main(String[] args) {
String name = "WelcomeJava";
Runnable r1 = () -> System.out.println(name);
String name1 = name.toUpperCase();
Runnable r2 = () -> System.out.println(name1);
r1.run();
}
}
Now, This program defines a class called Main, with a main method as the entry point.
It declares a String variable name with the value "WelcomeJava".
Then, it creates a Runnable r1 that prints the value of the name when executed.
Next, it converts the name to uppercase and assigns the result to name1.
Finally, it creates another Runnable r2 that prints the value of name1 when executed.
In the main method, r1 is called using the run method, resulting in the output "WelcomeJava".
Read more about Python programs at:
brainly.com/question/26497128
#SPJ4
what is bullk email software
PLS HELP ME!! WILL GIVE BRAINLIEST
Read the following block of CSS code, and then answer the question.
body
{
position: relative;
left: 50px;
top: 50px;
}
What effect would this code have on the display of a box?
All content would be placed 50 pixels to the left of the current box.
The current box would be located 50 pixels to the left of the page border.
The current box would be located 50 pixels to the left of the next page element.
The current box would be located 50 pixels to the left of the first textual element.
Answer:
it is maybe:
A. All content would be placed 50 pixels to the left of the current box.Explanation:
The advancement of technology in our daily lives has changed how we interact with the world.
A hacker successfully modified the sale price of items purchased through your company's web site. During the investigation that followed, the security analyst has verified the web server, and the Oracle database was not compromised directly. The analyst also found no attacks that could have caused this during their log verification of the Intrusion Detection System (IDS). What is the most likely method that the attacker used to change the sale price of the items purchased
Answer:
By modifying the hidden form values that is in a local copy of the company web page
Explanation:
In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.
C:/Users/Documents/resume.docx Where is the "resume" document located in this file structure?
Answer:
"resume.docx" is located in "Documents"
Explanation:
[<drive-letter:: represents drive name>]:/Main_Directory/Sub_Directory/ETC..
The "resume" is located in the "Documents" according to the file structure.
Given the information C:/Users/Documents/resume.docx, this can be interpreted as Documents is in the Users folder and the resume can be found in the Document folder.
We can also say that the document folder was created by the user and the "resume" file is placed directly into the documents.
Based on the explanation, we can say that the "resume" is located in the "Documents" according to the file structure.
Learn more here: https://brainly.com/question/13715153
For this program you are given a String that represents stock prices for a particular company over a period of time. For example, you may be given a String that looks like the following:
String stockPrices = "1,22,30,38,44,68,49,73,52,66";
Each number in this String represents the stock price for a particular day. The first number is day 0, the second number is day 1, and so on. You can always assume tha the supplied string will formatted using commas to separate daily stock prices. The individual stock prices will always be valid integers, but they many not always be the same number of digits (i.e. 1 is a valid stock price, as is 1000. Your program should work with strings of any length. The "split" method might come in handy for this problem. Your task is to analyze the supplied string and determine the following:
• The highest price for the stock
• The day when the highest price occurred
• The lowest price for the stock
• The day when the lowest price occurred
Here are two sample runnings of the program:
// First run
Please enter stock prices: 1,22,30,38,44,68,49,73, 52,66
Highest price: 73 ocurred on day # 7
Lowest price: 1 occurred on day # 0
// pecond run
Please enter stock prices: stock_prices - 41,37,40,54,51,63,54,47,23,33
Highest price: 63 occurred on day # 5
Lowest price: 23 accurred on day # 8
Write your program on the following page. You can use this page for rough work.
Answer:
price = input("Please enter stock prices: ")
x = price.split(",")
min = int(x[0])
max = int(x[0])
for i in x:
if int(i) < min:
min=int(i)
if int(i) > max:
max=int(i)
index = x.index(str(max))
print("Highest price: "+str(max)+" ocurred on day # "+str(index))
index = x.index(str(min))
print("Lowest price: "+str(min)+" ocurred on day # "+str(index))
Explanation:
This solution is implemented in Python
This prompts user for stock prices
price = input("Please enter stock prices: ")
This places the price in a list
x = price.split(",")
The next two lines initialize the lowest and highest to stock at index 0
min = int(x[0])
max = int(x[0])
This iterates through the list
for i in x:
The following if statement checks for the lowest
if int(i) < min:
min=int(i)
The following if statement checks for the highest
if int(i) > max:
max=int(i)
This gets the day for the highest stock
index = x.index(str(max))
This prints the highest price and the day it occurred
print("Highest price: "+str(max)+" ocurred on day # "+str(index))
This gets the day for the lowest stock
index = x.index(str(min))
This prints the lowest price and the day it occurred
print("Lowest price: "+str(min)+" ocurred on day # "+str(index))
Which of the following apertures will give you the shallowest depth of field?
a)2.8
b)5.6
c)11
d)22
e)2
50 points and brainliest
Answer:
a.2.8
The f-stops work as inverse values, such that a small f/number (say f/2.8) corresponds to a larger or wider aperture size, which results in a shallow depth of field; conversely a large f/number (say f/16) results in a smaller or narrower aperture size and therefore a deeper depth of field.
Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL
Answer:
hi
Explanation:
A __ consists of wires connecting the CPU and other parts of the computer. The __ transfers the data between the CPU and the memory unit.
The U.S. military's standard for computer security is known as
DCS-3000.
TEMPEST.
Daubert standard.
Carnivore.
Answer:
TEMPEST.
Explanation:
TEMPEST is an acronym for Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions and it is a secret (classified) project of the government of the United States of America that originated with its military in the 1960s based on the study of security with respect to telecommunication devices emitting Electromagnetic Radiation (EMR).
Hence, the U.S. military standard for computer security is known as TEMPEST.
The main purpose of the Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions (TEMPEST) is to prevent the theft, compromise or interception of informations that are being transmitted on various telecommunications devices through the use of Electromagnetic Radiation (EMR).
Factor 72y+108z
lmk the answer asap
As you draw a star, pressing the shift key while you drag increases the number of points on the star. True or false
Answer:
true
Explanation:
Amanda would like to add text to a slide in her presentation. Select all of the correct methods she can use to add text.
Select "Text" from the Insert menu.
Click in the Task pane and enter text.
Draw a text box, click in it, and enter text.
Click in a placeholder and enter text.
PLEASE help
Answer:
Draw a text box
Explanation:
Because if she draw it she can edit and write what she want
Benjamin took a photo that focused on certain part of an image while blurring out the rest. What is this effect called?
A.
alternate focus
B.
major focus
C.
minor focus
D.
selective focus
Answer:
(D) selective focus
Explanation: hope this helps!
Answer:
D. Selective Focus
Explanation:
Photographers commonly use the tilt-shift effect to focus on a certain part of the image while blurring the rest of the photograph. They refer to this as selective focus.
Name the application used for creating Presentations___
1.MS PowerPoint
2.MS Word
3MS Excel
Answer:
1.MS PowerPoint
Please help with this
Answer:
Horizontal lines chart/graph
Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second, regardless (within limits) of size. Assume the workstation uses direct memory access (DMA) to move data in and out of its main memory, which has a bandwidth of 2 Gbps, and that the I/O bus has a bandwidth of 1 Gbps. At what packet size would the bus bandwidth become the limiting factor
Answer:
When the transmission exceeds 667 packets
Explanation:
In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.
A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.
Which retouching action is unethical?
A.
removing a person from a photograph intended for publication in a newspaper
B.
removing the saturation in a photograph intended as a magazine cover page
C.
adding extra lighting on subject’s face and body in a photograph meant for display in an exhibition
D.
changing the color of the subject’s hair in a photograph intended for use in an advertising campaign
Answer:
B.) removing the saturation in a photograph intended as a magazine cover page
Answer:
its A for Plato
Explanation:Trust me i got it right
It is said that Wifi repeater is not good as a rumor
Write a program that declares three one-dimensional arraysnamed miles, gallons, and mpg. Each array should be declared in main() and should becapable of holding ten double-precision numbers. The numbers that should be stored in miles are240.5, 300, 189.6, 310.6, 280.7, 206.9, 199.4, 160.3, 177.4, and 192.3. The numbers should bestored in gallons are 10.3, 15.6, 8.7, 14, 16.3, 15.7, 14.9, 10.7, 8.3, and 8.4.
Answer:
#include <iostream>
using namespace std;
int main(){
double miles[10] = {240.5, 300, 189.6, 310.6, 280.7, 206.9, 199.4, 160.3, 177.4, 192.3};
double gallons[10] = {10.3, 15.6, 8.7, 14, 16.3, 15.7, 14.9, 10.7, 8.3, 8.4};
double mpg[10];
for (int i = 0; i < 10; i++){
mpg[i] = miles[i]/ gallons[i];
cout << "mpg: " << mpg[i] << endl;
}
}
Explanation:
The C++ source code declares three arrays miles, gallons and mpg with an array length of 10. The gallons and miles arrays are assigned 10 array items each and they are used to push values to the mpg array in the for loop statement. The result of each item in the mpg array is displayed on the screen.
Jorge is sending a message to Thomas but would like a copy sent to his external email address as well. Jorge does not want Thomas to see this copy that was sent.
Which mail field will Jorge use to achieve this goal?
To:
From:
CC:
BCC:
Answer: BCC (fourth choice)
=================================================
Explanation:
CC stands for "carbon copy".
BCC stands for "blind carbon copy".
Filling out forms is a tedious process. It's even more tedious when you have to repeat yourself multiple times. Carbon copy paper technology allows you to fill out one form and have those inputted entries be copied to the layers below. In terms of email, a carbon copy (CC) email is just an email sent to more than one person. In the CC line, recipients can see who the other people are in the email chain.
In contrast, a blind carbon copy is where the recipients cannot see who is in the BCC line. This allows Jorge to send the message copy to an external address without Thomas knowing.
For this exercise, you are going to write a recursive function that counts down to a Blastoff!
Your recursive function will not actually print. It will return a String that can be printed from the main function. Each recursive call will add on to that string.
In your main function, prompt the user for a starting value, then print the results.
Sample Output
Please enter a number to start:
5
5 4 3 2 1 Blastoff!
import java.util.Scanner;
public class Countdown
{
public static void main(String[] args)
{
// Start here
}
public static String countdown(int number)
{
// Base case - return Blastoff!
// Recursive call
}
}
Answer:
import java.util.Scanner;
public class Countdown {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int n;
System.out.print("Please enter a number to start: ");
n = input.nextInt();
System.out.print(countdown(n));
}
public static String countdown(int number) {
if(number>0) { return " "+number+countdown(number-1); }
else { return " Blastoff!"; }
}
}
Explanation:
The main method begins here
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
This declares an integer variable n
int n;
This prompts user for a number
System.out.print("Please enter a number to start: ");
This gets user input n
n = input.nextInt();
This calls the countdown function
System.out.print(countdown(n));
}
The countdown function begins here
public static String countdown(int number) {
This is the base case where input number is greater than 0
if(number>0) { return " "+number+countdown(number-1); }
This ends the recursion
else { return " Blastoff!"; }
}
Janet needs to flag a message for follow-up in Outlook. Which option is not a default?
Today
Tomorrow
Next Week
Next Tuesday
Answer:
Next tuesday.
Explanation: Its to specific