What is the name of the FOLDER in which the file named "script" is contained?

Answers

Answer 1

Answer:

The default location for local logon scripts is

the Systemroot\System32\Repl\Imports\Scripts folder


Related Questions

You have deployed your Ethernet cable near a generator, whose heat is effecting the cable in a way that its energy is lost. If signal has a power of 2 mW before passing near the generator and it becomes 1.4 mW after passing near the generator. How much is the attenuation?

Answers

Answer:

  1.55 dB

Explanation:

Attenuation to 1.4/2.0 = 0.7 of the previous power level is a gain of ...

  10·log(0.7) = -1.549 dB

The signal is attenuated by 1.55 dB.

You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation has vanished (so that it looks something like itwasthebestoftimes...). You wish to reconstruct the document using a dictionary, which is available in the form of a Boolean function dict(): for any string w, dict(w) = true if w is a valid word false otherwise . (a) Give a dynamic programming algorithm that determines whether the string s[] can be reconstituted as a sequence of valid words. The running time should be at most O(n2), assuming calls to dict take unit time. (b) In the event that the string is valid, make your algorithm output the corresponding sequence of words.

Answers

Answer: provided in the explanation section

Explanation:

Given that:

Assume D(k) =║ true it is [1 : : : k] is valid sequence  words or false otherwise

To determine D(n)

now the sub problem s[1 : : : k] is a valid sequence of words IFF s[1 : : : 1] is a valid sequence of words and s[ 1 + 1 : : : k] is valid word.

So, from here we have that D(k) is given by the following recorance relation:

D(k) = ║ false maximum (d[l]∧DICT(s[1 + 1 : : : k]) otherwise

Algorithm:

Valid sentence (s,k)

D [1 : : : k]             ∦ array of boolean variable.

for a ← 1 to m

do ;

d(0) ← false

for b ← 0 to a - j

for b ← 0 to a - j

do;

if D[b] ∧ DICT s([b + 1 : : : a])

d (a) ← True

(b). Algorithm Output

      if D[k] = = True

stack = temp stack           ∦stack is used to print the strings in order

c = k

while C > 0

stack push (s [w(c)] : : : C] // w(p) is the position in s[1 : : : k] of the valid world at // position c

P = W (p) - 1

output stack

= 0 =

cheers i hope this helps !!!

is there reality in your point of view ? if your answer is yes, is there a couse effect relation ship between reality and apperance​

Answers

Answer: Yes but maybe yes

Explanation: reality does exist pinch yourself

Answer:

there should be

Explanation:

Contrary to Russell's suggestion, the distinction between appearance and reality is not simply the distinction "between what things seem to be and what they are," more precisely, the distinction between what things seem to be and what they are is not a simple distinction.

Appearance and Reality. Metaphysics is the science that seeks to define what is ultimately real as opposed to what is merely apparent. The contrast between appearance and reality, however, is by no means peculiar to metaphysics. ... Ultimate reality, whatever else it is, is genuine as opposed to sham.

To improve visual effects and semantic context in your presentation, you can get and add a snapshot from a desktop running application or an internet resource in a slide using __________Immersive Reader
(1 Point)
(D) Screen Clipping
(B) Smart Art
(C) Online Pictures
(A) 3D Models

Answers

Answer:

D. Screen Clipping

Explanation:

Screen clipping is a feature or application integrated into operating systems to grab or capture a snapshot of the current open window on the desktop. It could be an inbuilt feature like "Snipping Tool" which is seen in the Windows operating system by default (from Windows 7 and upward); this feature is however not restricted to only Windows operating systems. It could also be a third party app to capture onscreen processes.

Smart Art is a visual representation of data and information which is made by choosing a layout that best suits the information you are projecting.

Online Pictures

are ready resources (photographs) which are already available online; they have to be downloaded to be used.  

3D Models is the process of creating and developing a mathematical representation of data and information in three dimensions using specialized software. This help bring the data and information to life  

All these options (A - D) are good ways of enhancing a presentation. However, to get a snapshot of an onscreen process from the desktop, Option D (Screen Clipping) is the correct answer

Using the Biba Model with levels High, Medium, and Low, determine if the subject has read access, write access, both, or neither. Timecard process P is Medium and a database of entry/exit times D is High. Select one: a. Write b. Read c. Neither d. Read and Write

Answers

Answer:

Option(a) is the correct answer to the given question .

Explanation:

The Biba Model in the database management system ensure the data integrity and define the state transaction in the data security policy .Following are the Features of the Biba Model.

The quick Integrity quote ensures that perhaps the subject should not process the information i.e read at a relatively low level of integrity in the given level of integrity.The * (star) Integrity definition assumes that a subject should not submit data to a new level of integrity  i. e "write data" at a specified level of credibility.In this participant is write data so option(a) is the correct answer to the given question .All the other option are not correct for the Biba Model  that's why they are incorrect option .

First, define an integer variable and assign it any value of your choice. Then you'll need to perform the following operations with it:
1. Add 9
2. Multiply by 2
3. Subtract 4
4. Divide by 2
5. Subtract by the variable's original value
6. Finally, display what the end result is.
7. Once your math / code is complete, double check your work by seeing what happens with the end result when you use different starting values. You should notice something "interesting".

Answers

Python code:

x=121
x += 9
x *= 2
x -= 4
x >>= 2
x -= 121

A computer needs both hardware and to be useful

Answers

Answer:

software

Explanation:

with out software the hardware cannot function

Design and implement a programming (name it SimpleMath) that reads two floating-point numbers (say R and T) and prints out their values, sum, difference, and product on separate lines with proper labels. Comment your code properly and format the outputs following these sample runs.Sample run 1:R = 4.0T = 20.0R + T = 24.0R - T = -16.0R * T = 80.0Sample run 2:R = 20.0T = 10.0R + T = 30.0R - T = 10.0R * T = 200.0Sample run 3:R = -20.0T = -10.0R + T = -30.0R - T = -10.0R * T = 200.0

Answers

Answer:

import java.util.Scanner; public class Main {    public static void main(String[] args) {        // Create a Scanner object to get user input        Scanner input = new Scanner(System.in);                // Prompt user to input first number        System.out.print("Input first number: ");        double R = input.nextDouble();        // Prompt user to input first number        System.out.print("Input second number: ");        double T = input.nextDouble();                // Display R and T          System.out.println("R = " + R);        System.out.println("T = " + T);        // Display Sum of R and T        System.out.println("R + T = " + (R + T));        // Display Difference between R and T        System.out.println("R - T = " + (R - T));        // Display Product of R and T        System.out.println("R * T = " + (R * T));    } }

Explanation:

The solution code is written in Java.

Firstly, create a Scanner object to get user input (Line 7). Next we use nextDouble method from Scanner object to get user first and second floating-point number (Line 9-15).

Next, display R and T and result of their summation, difference and product (Line 18-28).

Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states in the same way and are continuously blocked. This condition is called

Answers

Answer:

livelock.

Explanation:

"Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states in the same way and are continuously blocked. This condition is called" LIVELOCK.

The term ''livelock" in is a very good and a very important in aspect that is related to computing. LIVELOCK simply means a lock in which the process in denied multiple times. A perfect example is;

When a person A and a person meet on a very narrow path. Both person A and Person B will want to shift to a position which will allow each of them to pass(This are the processes Person A and B wants to take), so if the two now move to the same exact position instead of moving in an opposite direction then, we will say that we have a LIVELOCK.

1. What are the first tasks the Team Leader (TL) must perform after arriving at the staging area?
O A. Assign volunteers to specific positions and prioritize response activities.
OB. Gather and document information about the incident.
O C. Take the team to the most pressing need.
O D. Communicate with emergency responders to let them know the CERT is in place.

Answers

A. Assign volunteers to specific positions and prioritize response activities.

Write a cout statement that uses the setw manipulator to display the number variable with a field width of 4. Do not use an endl manipulator in your statement. (Assume the program includes the necessary header file for the setw manipulator.)

Answers

Answer:

Following are the statement in C++ Programming language

cout<<setw(4);// set the width

cout<<number; // print the number with the width of 4

Explanation:

The  setw() is setting  according to the width defined as the argument to the function .The setw()  is under the ios header library .It means its definition is under the ios header file .

Following are the syntax to defined the setw() function that are given below

 setw(int k)

For example

include <iomanip>   // header file

#include <ios>   // header file

#include <iostream>   // header file

using namespace std;   // namespace

int main()   // main function

{    

   int number = 60;// variable declaration  

   cout << "previous width:" << number; // print  

   cout << " After setting the width"<< setw(4);  

   cout << number;     // display number

   return 0;  

}

Which of the following statements is true? The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted. Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues. Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations. NetWitness Investigator is available at no charge while Wireshark is a commercial product.

Answers

Answer:

Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues.

Explanation:

Wireshark is a computer software that was Initially released in the year 1998. The software was written in language (programming language) such as the C++ and the C programming language.

Originally, the main author of the Wireshark software is a man named Gerald Combs.

Wireshark is used in analyzing network protocols and software troubleshooting

Infomation such as antennae signal strengths can also be gotten by using Wireshark.

Hence, "Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues." Is the correct Option.

difference between ram and rom​

Answers

Answer:

RAMIt stands for Random Access memory.It is used for both purpose( read and write).It is volatile memory.ROMIt stands for Read only memory.It can be used only to perform the read operation.It is non-volatile.

Hope this helps...

Good luck on your assignment...

Answer:

RAM is the memory available for the operating system, programs and processes to use when the computer is running. ... When you power off your computer the data stored in RAM is deleted. ROM is a type of non- volatile memory. Data in ROM is permanently written and is not erased when you power off your computer.

Explanation:

Write a program that reads integers from the user and stores them in a list. Your program should continue reading values until the user enters 0. Then it should display all of the values entered by the user (except for the 0) in order from smallest to largest, with one value appearing on each line.

Answers

Answer:

mylist = [] #Create an empty list

i = 0 # initialize counter to 0

b = int(input("Enter into list: ")) # prompt user for input

while not(b == 0): #test if input is not 0

mylist.append(b) #insert input into list if it's not 0

i = i + 1 #increment counter

b = int(input("Enter into list: ")) #prompt user for input

#save sorted list in a newlist

newlist = sorted(mylist)

#print element on separate lines

for ind in newlist:

print(ind)

#End of program

Explanation:

Line 1 of the program creates an empty list named mylist

Line 2, initializes a counter variable i to 0

Line 3 prompts user for input

Line 4 to 7 iterates until user input is 0

Line 9 sorts the list and saves the sorted list into a new list

Line 11 & 12 prints the each element of the list on separate lines

Use the provided template, "Short-Term and Long-Term Goals" to develop short-term and long-term goals. You must develop these goals with your mentee. You can do this over the phone or in-person. It is important to identify areas that could use coaching or mentoring techniques in order to complete your implementation plan. Short-term goals must reflect the next 6 months and long-term goals must reflect 6 months to 2 years.

Answers

Answer:

(1).short term goal.

=>complete the studies : next 4 months(time frame); certifcate in the course(reward or incentive).

=> getting a job : next six months(time frame); financial stability (reward or incentive).

(2). Long term goal.

=> learn about Business Analytics : 1 year(time frame); good pay for the position (reward/incentive).

=> Build my career: 2nd year (time frame);

Explanation:

At a particular period of time we all need mentors and this mentorships are what that we build us. When we are already built, we also become mentors and in turn we mentor others so as to build them too.

For the question, we should have something like this from a mentee

(1).short term goal.

=>complete the studies : next 4 months(time frame); certifcate in the course(reward or incentive).

=> getting a job : next six months(time frame); financial stability (reward or incentive).

(2). Long term goal.

=> learn about Business Analytics : 1 year(time frame); good pay for the position (reward/incentive).

=> Build my career: 2nd year (time frame);

The difrent between valid deductive argument and strong inductive argument? At least 2 example​

Answers

Answer:

If the arguer believes that the truth of the premises definitely establishes the truth of the conclusion, then the argument is deductive. If the arguer believes that the truth of the premises provides only good reasons to believe the conclusion is probably true, then the argument is inductive.

ALSO

Deductive arguments have unassailable conclusions assuming all the premises are true, but inductive arguments simply have some measure of probability that the argument is true—based on the strength of the argument and the evidence to support it.

Explanation:

Assume a user datagram connection sending 500 bytes to a client. the first byte is numbered 501. what is the sequence number of the segment if all data is sent in only one segment?

Answers

Answer:

501.

Explanation:

In Transmission Control Protocol (TCP), sending and receiving of data is done as byte. These bytes are eventually grouped into packets referred to as segment.

The sequence number of the segment if all data is sent in only one segment is the same as the first byte of that segment.

In this scenario, a user datagram connection is sending 500 bytes to a client and the first byte is numbered 501. Thus, if all data is sent in only one segment, the sequence number of the segment is 501. The 501 represents the initial segment number (ISN).

However, assuming the same data was sent in five (5) segments. The sequence number would be;

First segment (1st) = 501.

Second segment (2nd) = 1501.

Third segment (3rd) = 2501.

Fourth segment (4th) = 3501.

Fifth segment (5th) = 4501.

// This program accepts a user's monthly pay
// and rent, utilities, and grocery bills
// and displays the amount available for discretionary spending
// (which might be negative)
// Modify the program to output the pay and the total bills // as well as the remaining discretionary amount start input pay input rent input utilities input groceries discretionary

start
input pay
input rent
input utilities
input groceries
discretionary= pay - rent - utlilites - groceries
output discretionary
stop


Answers

Answer:

The programming language is not stated; However, I'll answer this question using two programming languages (Python and C++)

Comments are used to explain difficult lines

#Python Program starts here

#Prompt user for monthly pay

pay = float(input("Enter Monthly Pay: "))

#Prompt user for rent

rent = float(input("Enter Rent: "))

#Prompt user for utilities

utilities = float(input("Enter Utilities: "))

#Prompt user for groceries

groceries = float(input("Enter Groceries: "))

#Calculate discretionary

discretionary = pay - rent - utilities - groceries

#Print discretionary

print("Discretionary: ")

print(discretionary)

#Python Program ends here

//C++ Program starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables

float pay, rent, utilities, groceries, discretionary;

//Prompt user for input

cout<<"Enter Monthly Pay: ";

cin>>pay;

cout<<"Enter Rent: ";

cin>>rent;

cout<<"Enter Utilities: ";

cin>>utilities;

cout<<"Enter Groceries: ";

cin>>groceries;

//Calculate discretionary

discretionary = pay - rent - utilities - groceries;

//Print discretionary

cout<<"Discretionary: "<<discretionary;

return 0;

 

}

//C++ Program ends here

Given an integer n and an array a of length n, your task is to apply the following mutation to an: Array a mutates into a new array b of length n.

For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].

Answers

Answer: provided in the explanation section

Explanation:

import java.util.*;

class Mutation {

public static int[] mutateTheArray(int n , int[] a)

{

int []b = new int[n];

for(int i=0;i<n;i++)

{

b[i]=0;

if(((i-1)>=0)&&((i-1)<n))

b[i]+=a[i-1];

if(((i)>=0)&&((i)<n))

b[i]+=a[i];

if(((i+1)>=0)&&((i+1)<n))

b[i]+=a[i+1];

}

return b;

}

  public static void main (String[] args) {

      Scanner sc = new Scanner(System.in);

      int n= sc.nextInt();

      int []a = new int [n];

     

      for(int i=0;i<n;i++)

      a[i]=sc.nextInt();

     

      int []b = mutateTheArray(n,a);

for(int i=0;i<n;i++)

      System.out.print(b[i]+" ");

     

 

     

  }

}

cheers i hope this helped !!

The program is an illustration of loops and conditional statements.

Loops are used to perform repetitive operations, while conditional statements are statements whose execution depends on the truth value.

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

class Main {

   public static void main (String[] args) {

       //This creates a scanner object

       Scanner input = new Scanner(System.in);

       //This gets input for n

       int n= input.nextInt();

       //This declares array a

       int []a = new int [n];

       //The following loop gets input for array a

       for(int i=0;i<n;i++){

           a[i]=sc.nextInt();

       }

       //This declares array b

       int []b = new int [n];

       //The following loop mutates array a to b

       for(int i=0;i<n;i++){

           b[i]=0;

           if(((i-1)>=0)&&((i-1)<n)){

               b[i]+=a[i-1];

           }

           if(((i)>=0)&&((i)<n)){

               b[i]+=a[i];

           }

           if(((i+1)>=0)&&((i+1)<n)){

               b[i]+=a[i+1];

           }

       }

       //The following loop prints the mutated array b

       for(int i=0;i<n;i++){

       System.out.print(b[i]+" ");

       }

 }

}

At the end of the program, the elements of the mutated array b, are printed on the same line (separated by space).

Read more about similar programs at:

https://brainly.com/question/17478617

The ability to write functions is one of the more powerful capabilities in C++. Functions allow code to be reused, and provides a mechanism for introducing the concept of modularity to the programming process. In addition to the concept of functions, C++ allows complex programs to be organized using header files (.h files) that contain the prototypes of functions and implementation files that (.cpp files) that contain the implementation (definition) of the functions.
In this programming assignment you will be asked to implement a number of useful functions using a header file and an implementation file. You will place the prototypes for your function in a .h file, and implement these functions in a .cpp file. You will need to write a driver (a program designed to test programs) to test your functions before you upload them.
[edit]Deliverables:
main.cpp
myFunctions.cpp
myFunctions.h
[edit]Function:
[edit]max
Precondition
two integer values exist
Postcondition
The value of the largest integer is returned.
The original integers are unchanged
If the integers have the same value then the value of either integer is returned.
Return
integer
Description
Function returns the value of the larger of two integers.
Prototype:
int max ( int, int )
Sample Parameter Values
m n max(m,n)
5 10 10
-3 -6 -3

Answers

Answer:

The header file in C++ is as follows

myFunction.h

void max(int a, int b)

{

if(a>b)

{

 std::cout<<a;

}

else

{

 std::cout<<b;

}

}

The Driver Program is as follows:

#include<iostream>

#include<myFunction.h>

using namespace std;  

int main()

{

int m,n;

cin>>m;

cin>>n;

max(m,n);

}

Explanation:

It should be noted that, for this program to work without errors, the header file (myFunction.h) has to be saved in the include directory of the C++ IDE software you are using.

For instance; To answer this question I used DevC++

So, the first thing I did after coding myFunction.h is to save this file in the following directory  ..\Dev-Cpp\MinGW64\x86_64-w64-mingw32\include\

Back to the code

myFunction.h

void max(int a, int b)  {

-> This prototype is intialized with integer variables a and b

if(a>b)  -> If the value of a is greater than b;

{

 std::cout<<a;  -> then the value of variable a will be printed

}

else

-> if otherwise,

{

 std::cout<<b;

-> The value of b will be printed

}

}

Driver File (The .cpp file)

#include<iostream>

#include<myFunction.h>  -> This line includes the uesr defined header

using namespace std;  

int main()

{

int m,n;  -> Two integer variables are declared

      cin>>m;  -> This line accepts first integer input

      cin>>n;  -> This line accepts second integer input

max(m,n);

-> This line calls user defined function to return the largest of the two integer variables

}

Can anyone please help me to solve this question?
A Food organization's payroll system is in such a way that it pays its employees as shift managers fixed weekly salary and hourly workers fixed hourly wage for up to the first 60 hours they
work and if they work more than 60 hrs , it is considered as overtime and paid 2.5 times their hourly wages. Commission workers get $400 plus 2.8% of their gross weekly sales. Write a program to compute the weekly pay for each employee. Each type of employee has its own pay code: Shift Managers have paycode 1, hourly workers have code 2, and commission workers have code 3 .Use a switch to compute each employee’s pay based on that employee’s paycode. Within the switch, prompt the user (i.e., the payroll clerk) to enter the appropriate facts your program needs to calculate each employee’s pay based on that employee’s pay code.
Sample Output
Enter employee's number code: 2
Enter hourly worker's pay rate: 12.25
Enter the number of hours worked: 100
Weekly pay is: 1592.50

Answers

Answer:

You didn't specify the language so I did it in C#

Explanation:

The first programming project involves writing a program that computes the minimum, the maximum and the average weight of a collection of weights represented in pounds and ounces that are read from an input file. This program consists of two classes. The first class is the Weight class, which is specified in integer pounds and ounces stored as a double precision floating point number. It should have five public methods and two private methods:
A public constructor that allows the pounds and ounces to be initialized to the values supplied as parameters.
A public instance method named lessThan that accepts one weight as a parameter and returns whether the weight object on which it is invoked is less than the weight supplied as a parameter.
A public instance method named addTo that accepts one weight as a parameter and adds the weight supplied as a parameter to the weight object on which it is invoked. It should normalize the result.
A public instance method named divide that accepts an integer divisor as a parameter. It should divide the weight object on which the method is invoked by the supplied divisor and normalize the result.
A public instance toString method that returns a string that looks as follows: x lbs y oz, where x is the number of pounds and y the number of ounces. The number of ounces should be displayed with three places to the right of the decimal.
A private instance method toOunces that returns the total number of ounces in the weight object on which is was invoked.
A private instance method normalize that normalizes the weight on which it was invoked by ensuring that the number of ounces is less than the number of ounces in a pound.
Both instance variable must be private. In addition the class should contain a private named constant that defines the number of ounces in a pound, which is 16. The must not contain any other public methods.
The second class should be named Project1. It should consist of the following four class (static) methods.
The main method that reads in the file of weights and stores them in an array of type Weight. It should then display the smallest, largest and average weight by calling the remaining three methods. The user should be able to select the input file from the default directory by using the JFileChooser class. The input file should contain one weight per line. If the number of weights in the file exceeds 25, an error message should be displayed and the program should terminate.
A private class method named findMinimum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the smallest weight in that array.
A private class method named findMaximum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the largest weight in that array.
A private class method named findAverage that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the average of all the weights in that array.
Be sure to follow good programming style, which means making all instance variables private, naming all constants and avoiding the duplication of code. Furthermore you must select enough different input files to completely test the program.

Answers

Answer: Provided in the explanation section

Explanation:

CODE USED :

//weight class

public class Weight

{

  //defining private variables pound, ounces and number of ounces in pound which is 16

  private int pounds;

  private double ounces;

  private int numberOfOuncesInPound=16;

  //constructor which initializes the weight variable with the coming input

  public Weight(int p, double o)

  {

      this.pounds=p;

      this.ounces=o;

  }

  //checks if the incoming weight object is less than the current object weight

  public boolean lessThan(Weight w)

  {

      //first comparison between pounds of the objects, if current object is less, then return true

      if(this.pounds<w.pounds)

          return true;

      //else if it is less then return false

      else if(this.pounds>w.pounds)

          return false;

      //else if both are equal then we compare the ounces

      else

      {

          //if current object ounces is less than we return true else false

          if(this.ounces<w.ounces)

              return true;

          else

              return false;

      }

  }

  //adds incoming weight to the current weight object and then normalize it

  public void addTo(Weight w)

  {

      this.pounds+=w.pounds;

      this.ounces+=w.ounces;

      normalize();

  }

  //divide the current weight with factor x which is a parameter of the function

  public void divide(int x)

  {

      this.ounces=toOunces();

      this.ounces/=x;

      this.pounds=0;

      normalize();

  }

  //returns a string which contains the data in a Particular Format

  public String toString()

  {

      return this.pounds+" lbs "+this.ounces+" oz";

  }

  //returns weight converted into ounces

  private double toOunces()

  {

      return this.pounds*this.numberOfOuncesInPound+this.ounces;

  }

  //this function checks if number of ounces is greater than 16 then it normalizes it by converting into pounds

  private void normalize()

  {

      while(this.ounces>this.numberOfOuncesInPound)

      {

          this.ounces-=this.numberOfOuncesInPound;

          this.pounds++;

      }

  }

}

cheers i hope this helped !!

A security professional wants to test a piece of malware that was isolated on a user's computer to document its effect on a system. Which of the following is the FIRST step the security professional should take?
A. Create a sandbox on the machine.
B. Open the file and run it.
C. Create a secure baseline of the system state.
D. Hardon the machine

Answers

Answer:

The correct answer is option (A) Create a sandbox on the machine

Explanation:

Solution

From the example given, the first step the security professional should take is to create a sandbox on the machine.

Sandbox: It  refers to as a remote testing environment that allows users to run programs or implement files without distorting the application, system or platform on which they run.

In areas of computer security a sandbox is a security technique used for separating running programs, normally in an effort to reduce system failures or software vulnerabilities from moving further.

This was a quiz that I submitted earlier in the semester but I had not received full points due to a coding mistake. Below, I will provide the instructions and the code that needs to be changed in order for the program to work. Any place that has a "// Student Code Here" or "// Test Your Methods Here" must be changed accordingly.------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------INSTRUCTIONS:Step 1Fill in the doubleOrNothing method, which takes an int as a parameter. If the number is less than 100, return that number doubled. Otherwise, return zero.For example, passing 4 to this method would return 8, but passing 104 to this method would return 0.Step 2Fill in the formatPercentmethod, which takes a double as a parameter that represents a percent value between 0 and 1. This method returns a String that is the percentage between 0 and 100 percent, with one place following the decimal before a '%'.For example, passing the double '.85' would return the string "85.0%".Step 3Fill in the everyOtherChar method, which takes a String parameter called word*. This method returns an int which computes the sum of the ASCII values of *every other* character in the parameter word, starting with the first character.For example, passing the word "yam" into the method would tally the ASCII value of the characters 'y' and 'm', which have ASCII values of 121 and 109 respectively, so the method would return 230.Test Your MethodsTest your methods by calling them within main. You may run your program in Develop mode as many times as you would like, but you may only submit your program once.------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------CODE:public class quiz1 { // Step 1 public static int doubleOrNothing(int num) {e // student code here } // Step 2 public static String formatPercent(double percent) { // student code here } // Step 3 public static int everyOtherChar(String word) { // student code here } public static void main(String [] args) { // test your methods here! }}

Answers

Answer:

The methods is completed as follows

See attachment for .java source file

Comments are used to explain difficult lines

Program starts here

import java.util.*;

public class quiz1

{

public static int doubleOrNothing(int num)

{

 if(num<100)

 {

  num*=2;

 }

 else{

  num = 0;

 }

 System.out.println(num);

 return num;

}

public static String formatPercent(double percent)

{

 percent*=100;

 System.out.println(percent+"%");

 return percent+"%";

}

 

public static int everyOtherChar(String word)

{

 char first = word.charAt(0);

 char last = word.charAt(word.length() - 1);

 int ascii = (int)first + (int)last;

 System.out.print(ascii);

 return ascii;

}

public static void main(String [] args)

{

 //Testing doubleOrNothing method

 int num;

 Scanner input = new Scanner(System.in);

 System.out.print("Enter any integer number: ");

 num = input.nextInt();

 System.out.print("Result of doubleOrNothing method\n:");

 doubleOrNothing(num);

 

 //Testing formatPercent method

 double percent;

 System.out.print("Enter any number between 0 and 1: ");

 percent = input.nextDouble();

 System.out.print("Result of formatPercent method\n:");

 formatPercent(percent);

 

 //Testing everyOtherChar method

 String word;

 System.out.print("Enter any string: ");

 word = input.next();

 System.out.print("Result of everyOtherChar method\n:");

 everyOtherChar(word);

}

}

//See Attached file

The goal of this milestone is to identify the objects needed for the UNO card game and the actions that those objects perform, rather than how the objects are actually represented. For example, a standard UNO card must be able to report both its color and value, and, when given another card, tell whether or not it is a "match." When specifying operations, think simplicity. "It's better to have a few, simple operations that can be combined in powerful ways, rather than lots of complex operations." (MIT, n.d.) 1. Review the rubric for this assignment before beginning work. Be sure you are familiar with the criteria for successful completion. The rubric link can be found in LoudCloud under the assignment. 2. Activity Directions: Prepare a document that includes an ADT (abstract data type) for each object needed in your program. Create a LOOM video in which you explain your class design. Discuss your selection of properties and methods for each object.

Answers

Answer:

public class UNOCard {

  //class variables

  int value; //stores value of the card.

  String color; //stores color of the card

  //method returns value of the card

  public int getValue() {

      return value;

  }

 

  //method sets the value of the card to the passed argument

  public void setValue(int value) {

      this.value = value;

  }

 

  //method returns color of the card

  public String getColor() {

      return color;

  }

 

  //method sets the color of the card to the passed argument

  public void setColor(String color) {

      this.color = color;

  }

 

  //constructor

  UnoCard(int value, String color)

  {

      setValue(value);

      setColor(color);

  }

 

  //mrthod to compare if cards are equal or not

  public boolean isMatch(UnoCard card)

  {

      if(this.getColor() == card.getColor() || this.getValue() == card.getValue())

          return true;

     

      return false;

  }

}

public class UnoCardTest {

  public static void main(String[] args) {

     

      UnoCard card1 = new UnoCard(10, "Red");

      UnoCard card2 = new UnoCard(10, "Black");

      UnoCard card3 = new UnoCard(9, "Black");

     

      System.out.println("Card-1: Value: " + card1.getValue() +"\tColor: " + card1.getColor());

      System.out.println("Card-2: Value: " + card2.getValue() +"\tColor: " + card2.getColor());

      System.out.println("Card-3: Value: " + card3.getValue() +"\tColor: " + card3.getColor());

     

     

      System.out.println("\n\nMatching card-1 with card-2: " +card1.isMatch(card2));

      System.out.println("Matching card-1 with card-3: " +card1.isMatch(card3));

     

  }

}

Explanation:

the discussion of the selection of properties and methods can be seen along with code.

A retail company assigns a $5000 store bonus if monthly sales are $100,000 or more. Additionally, if their sales exceed 125% or more of their monthly goal of $90,000, then all employees will receive a message stating that they will get a day off. When your pseudocode is complete, test the following monthly sales and ensure that the output matches the following. If your output is different, then review your decision statements.
Monthly Sales Expected Output
monthlySales 102500 You earneda $5000 bonus!
monthlySales = 90000
monthlySales 112500 You earned a $5000 bonus!
All employees get one day off!

Answers

Answer:

To answer this question, i prepared a pseudocode and a program written in python;

Pseudocode begins here:

1. Start

2. Input montlySales

3. If monthlySales < 100000

3.1. Display Nothing

4. Else

4.1 Display “You earned a $5000 bonus!”

4.2 If monthlySales > 1.25 * 90000

4.2.1 Display “All employees get one day off!”

5.     Stop

Python Program starts here (See attachment for proper view of the program):

#Prompt user for input

monthlySales = float(input("Monthly Sales: "))

#Check monthlySales

if monthlySales < 100000:

     print("")

else:

     print("You earned a $5,000 bonus")

     if monthlySales > 1.25 * 90000:

           print("All Employees get the day off")

Explanation:

To answer this question, a conditional if statement is needed.

The pseudocode (and the program) starts by prompting user for input;

Then, the user input is first compared with 100,000

If it's less than 100,000; then nothing is displayes

However, if it is at least 100,000

"You earned a $5,000 bonus" is displayed

It further checks if the user input is greater than 125% of 90,000

If yes, "All Employees get the day off" is displayed else, nothing is displayed.

The pseudocode (and the program) stops execution, afterwards

This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours

Answers

Answer: provided in the explanation section

Explanation:

Network Merging and Acquisitions

Environment:

· 400 Windows Servers

· 8000 Windows client devices (laptops running Windows os)

· 40 Linux servers Active Directory Domain Services to provide DNS services to all the hosts, both Windows and Linux.

· Unix servers(Other environment to be merged)

· host resolution they use is BIND

A great challenge of managing a network at a growing company is that of acquisitions. That is, one of the ways a developing company grows is by acquiring other companies. When that acquisition happens, there is usually the require to connect the two networks together.

Connecting two networks environments together is one of those tasks that makes network engineers groan. As networks are not built to any type of agreed-upon norm, what the opposite network will hold is always unpredictable, most probably in a difficult-to-integrate way.

Quick & Dirty IPSEC Tunnel

When an acquisition deal happen, management needs the IT infrastructures connected. The proper way of bringing networks together involves a full audit of the remote network to insure compliance with regulatory obligations, inventorying IP address blocks both public and private and BGP ASNs in use, understanding IGP routing schemes, reviewing WAN provider contracts, itemizing hardware and software in use, purchasing needed equipment, staging infrastructure changes, scheduling maintenance windows, and so on.  

Main problems with quick and dirty IPSEC tunnels are

Maintaining network lists manually.

manual maintenance of route injection into the IGP.

Probable single points of failure.

Using SD-WAN As Acquisition Network Glue:

Thinking through SD-WAN technology, quick connectivity option that’s better than a quick and dirty IPSEC tunnel. SD-WAN offers

1. Easily managed redundant plumbing :

SD-WAN forms a mesh of tunnels on top of all available paths. That means that a local circuit outage neither takes down the ability to forward nor needs a network engineer to re-configure IP tunnel endpoints.

2. IGP integration:

When route injection is often available with IPSEC tunnels, it is found that route injection is not terribly reliable, depending on vendor, software version, and a host of other factors. I have not been keen to rely on routes being injected or withdrawn by an IPSEC VPN endpoint.

3. Segment isolation:

An SD-WAN function available from many of SD-WAN vendors is that of segment isolation. You can create virtual network segments that permit intra-segment communication while preventing inter-segment communication. In the case of an acquisition, that functionality seems really helpful.

Segment isolation can also help simplify routing. If you’re facing overlapping, this might help avoid a complex NAT scheme.

4. Service chaining:

Many SD-WAN products shows service chaining. That is, SD-WAN devices tunnel between each other. By seeing the tunnelling ability, it’s possible to drop traffic off when we need.

Drawbacks Of The SD-WAN Approach

A few drawbacks in using SD-WAN as a network merger tool come to mind.

Cost:

The cost of adding a new network segment to an SD-WAN deployment varies by licensing scheme, but is not at all free. Quick and dirty IPSEC tunnels often are free which requires no capital expense to stand up.

Remote hands:

In order to leverage SD-WAN at remote sites, there is a great chance you’ll need remote hands to pull off the device installation. That’s not anything else than deploying SD-WAN in your own network

Perhaps not quick and dirty enough:

The great problem facing around is the long time it takes to stand up dedicated WAN circuits. IPSEC tunnels are often the path of very less resistance to bringing up a private connection between two newly acquainted organizations.

To Conclude:

Using IPSEC tunnels to join networks together what will eventually be part of a unified IT whole isn’t a mature solution in the modern era. SD-WAN looks like a mature solution that do not need require private MPLS circuits to function.

If private MPLS circuits are eventually added to the SD-WAN mix, technology transition is not required. The SD-WAN option can stay in place as-is, using the MPLS circuit being added to the SD-WAN forwarding device as a newly available path. That means the temporary solution can transition into the permanent solution by grace.

SD-WAN can be opted as a way to onboard an acquired network permanently, at the same time retaining the fast time to connect that an IPSEC tunnel offers. For organizations who already have an SD-WAN solution in place, there is nothing to think about. Considering organizations who haven’t invested in SD-WAN so far, this might be an additional driver to do so.

Given a set, weights, and an integer desired_weight, remove the element of the set that is closest to desired_weight (the closest element can be less than, equal to OR GREATER THAN desired_weight), and associate it with the variable actual_weight. For example, if weights is (12, 19, 6, 14, 22, 7) and desired_weight is 18, then the resulting set would be (12, 6, 14, 22, 7) and actual_weight would be 19. If there is a tie, the element LESS THANdesired_weight is to be chosen. Thus if the set is (2, 4, 6, 8, 10) and desired_weight is 7, the value chosen would be 6, not 8. Assume there is at least one value in the set.

Answers

Answer:

In the question stated a we declared a set named as weights also an integer variable was the desired_weight

In python A set is regarded as  {12, 19, 6, 14, 22, 7}

Explanation:

Solution

The python program code is executed below:

# Declare a tuple

weights = (12, 19, 6, 14, 22, 7)

# Declare an integer variable to store desired weight.

desired_weight = 18

# Declare an integer variable to store actual_weight weight

actual_weight = weights[0]

# Create a for-loop to read each value in the tuple.

for each_weight in weights:

   # Create an if-statement to find the that is

   # closest weight but not greater than desired weight.

   if(each_weight > actual_weight and each_weight < desired_weight):

       actual_weight = each_weight

weights=list(weights)

# Delete the actual weight

weights.remove(actual_weight)

weights=tuple(weights)

# Display the actual weight

print("Actual Weight:",actual_weight)

# Display the resulted tuple.

print("Resulted set:",weights)

This program here is to declare a set which is as follows:

# Declare a set

weights = {12, 19, 6, 14, 22, 7}

# Declare an integer variable to store desired weight.

desired_weight = 18

# Declare an integer variable to store actual weight

# Assign first index element using list.

actual_weight = list(weights)[0]

# Create a for-loop to read each value in the tuple.

for each_weight in weights:

   # Create an if-statement to find the that is

   # closest weight but not greater than desired weight.

   if(each_weight > actual_weight and each_weight < desired_weight):

       actual_weight = each_weight

# Delete the actual weight using discard() method.

weights.discard(actual_weight)

# Display the actual weight

print("Actual Weight:",actual_weight)

# Display the resulted tuple.

print("Resulted set:",weights)

Create a MATLAB function r = nm(f,x0,tol) which applies Newton's method to an anonymous function f(x). Start with a guess of x0 Run until the absolute value of a current iteration subtracted by the last iteration is less than tol (ie |x(n)-x(n+1)|

Answers

Answer:

...............................................

Explanation:

............................................................

Write a program that first calls a function to calculate the square roots of all numbers from 1 to 1,000,000 and write them to a file named: roots.txt (See output on page 3) 2.) Write a program then calls a function to calculate the squares of all numbers from 1 to 1,000,000 and write them to a file named: squares.txt 3.) Here are the function prototypes: void writeRoots(); void writeSquares();

Answers

Answer:

The csharp program to compute square roots of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeRoots()  

{  

StreamWriter writer1 = new StreamWriter("roots.txt");  

double root;  

for (int n=1; n<=max; n++)  

{  

root = Math.Sqrt(n);  

writer1.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeRoots();  

}  

}

The program to compute squares of numbers and write to a file is as follows.

class Program  

{  

static long max = 1000000;  

static void writeSquares()  

{  

StreamWriter writer2 = new StreamWriter("squares.txt");  

long root;  

for (int n = 1; n <= max; n++)  

{  

root = n*n;  

writer2.WriteLine(root);  

}  

}  

static void Main(string[] args)  

{  

writeSquares();  

}  

}  

Explanation:

1. An integer variable, max, is declared to hold the maximum value to compute square root and square.

2. Inside writeRoots() method, an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer1 = new StreamWriter("roots.txt");

3. Inside a for loop, the square roots of numbers from 1 to the value of variable, max, is computed and written to the file, roots.txt.

4. Similarly, inside the method, writeSquares(), an object of StreamWriter() class is created which takes the name of the file as parameter.

StreamWriter writer2 = new StreamWriter("squares.txt");

5. Inside a for loop, the square of numbers from 1 to the value of the variables, max, is computed and written to the file, squares.txt.

6. Both the methods are declared static.

7. Inside main(), the method writeRoots() and writeSquares() are called in their respective programs.

8. Both the programs are written using csharp in visual studio. The program can be tested for any operation on the numbers.

9. If the file by the given name does not exists, StreamWriter creates a new file having the given name and then writes to the file using WriteLine() method.

10. The csharp language is purely object-oriented language and hence all the code is written inside a class.

Other Questions
Oak Creek Furniture Factory (OCFF), a custom furniture manufacturer, uses job order costing to track the cost of each customer order. On March 1, OCFF had two jobs in process with the following costs: Work in Process Balance on 3/1 Job 33 $ 7,500 Job 34 6,000 $ 13,500 Source documents revealed the following during March: Materials Requisitions Forms Labor Time Tickets Status of Job at Month-End Job 33 $ 3,500 $ 6,500 Completed and sold Job 34 6,000 7,800 Completed, but not sold Job 35 4,200 3,250 In process Indirect 1,300 2,140 $ 15,000 $ 19,690 The company applies overhead to products at a rate of 150 percent of direct labor cost. For the year ended December 31, 2020, Transformers Inc. reported the following: Net income $300,000 Preferred dividends declared 50,000 Common dividend declared 10,000 Unrealized holding loss, net of tax 5,000 Retained earnings, beginning balance 400,000 Common stock 200,000 Accumulated Other Comprehensive Income, Beginning Balance 25,000. What would Transformers report as the ending balance of Retained Earnings? Select one: a. $695,000 b. $645,000 c. $665,000 d. $640,000 ASAP! GIVING BRAINLIEST! Please read the question THEN answer CORRECTLY! NO guessing. I say no guessing because people usually guess on my questions. Read and choose the option that answers the question. Primero, se lavan el pelo con champ. Segundo, se peinan el pelo. El tercer paso de su rutina, se lavan las manos. Su cuarto paso, se ponen los lentes de contacto. Quinto, se pintan las uas. Sexto y ltimo paso, se secan las uas. Which of the following steps is completed sixth? Se peinan Se pintan Se secan Se lavan In training for the zombie race, Harris runs 4 times back and forth across the pasture, then runs through the woods 3.75 miles. In all, Harris runs 15.7 miles. What is the distance from one side of the pasture to the other? please help! ill mark you as brainleist if you get it correct! Which of these values would you most likely see on a U.S. speed limit sign?O A. 200 miles / dayO B. 3,500 miles / secondC. 18 feet/ secondO D. 55 miles/hour Suppose a binomial trial has a probability of success of 0.4, and 75 trials areperformed. What is the standard deviation of the possible outcomes? Roundyour answer to two decimal places. Ravi was surprised to see his aunt at his house when he returned from work.How many prepositional phrases are there in the sentence above? A. 2 B. 3 C. 4 D. 1 Consider the reaction below. 2C6H14 + 19O2 Right arrow. 12CO2 + 14H2O How many moles of hexane (C6H14) must burn to form 18.4 mol of carbon dioxide? Skylar Sutherland earns a salary of $80,000 per year. How much is Skylar paid per month? * Need some help with these plz how many coronaviruses are there? 1. Arrange the following income statement items so they are in the proper order of an income statement:Taxes Earnings per shareShares outstanding Earnings before taxesGross profit shares outstanding Cost of goods soldInterest expense Earnings after taxesDepreciation expense Earnings available to commonPreferred stock dividends stockholdersOperating profit Selling and administrative expenseSalesGross profit Does this represent a proportional relationship? Explain your answer. A specific shade of orange paint calls for 2 parts yellow and 3 parts red. Catie uses 3 cups of yellow paint and 4 cups of red paint to make orange paint. The _______ represents half the distance between the maximum of a sine or cosine graph Options: Extreme values, amplitude, period, frequencyanswer quickly pleaseeeee Anyone got the RIGHT answer to this?Make x the subject of:h = 4 ( x + 3y ) + 2 what type of number is 0.50.55 PLEASE ANSWER THIS QUESTION !! 20 POINTS AND BRAINLIEST !! Consider these signed numbers and determine whether each product is positive or negative.(-2/3) (5 2/4)PositiveNegative(4 5/9) (4/5)(-6 3/4) (-7 1/11)