Which statement most aptly defines the term networking?

Answers

Answer 1

Answer: We need more info.

Explanation:


Related Questions

Anyone watch anime, i love stay kids and they sang the op for Tower of God XD

Answers

Answer:

I do Stray kids and Tower Of God is good combo mannnn

Answer:

Yes

Explanation:

I dont comprehend how this question requires any intellectual answer but it's ok.

A computer needs both hardware and to be useful

Answers

Answer:

Software? or a person?

Software. To be fully functional, a computer needs both hardware and software

Explain the difference between storage devices and virtual storage

Answers

Answer:

Storage devices tend to be built in/physical pieces of storage such as an SD Card or Hard Drive. Virtual storage is more-so like Cloud storage, where the files are hosted elsewhere.

Explanation:

A _____ is a form of Web conferencing that uses streaming media technologies to broadcast video and/or audio over the Internet from a single content source to many listeners or viewers simultaneously.

Answers

Answer:

Webcast

Explanation:

Webcast is the live broadcast of a video or audio feed from your event or conference harnessing the internet. Webcast is a media presentation of an event circulated over the internet by using media technology to distribute a single source to various viewers.

Generally,  webcast is briefly defined as broadcasting over the internet. The broadcast might not be specifically live  . One can capture the video or the audio he or she wants to publish and publish it online anywhere. Webcast allow your viewers to remain engage as if they are face to face with the broadcaster.

Webcasting is a a great tools that has been used by various multinational and company to reach wide range of audience . This web based broadcast can even provide opportunity for audience to ask question and even provide answers in real time.

Answer:

Webcast.

Explanation:

A Webcast is a form of Web conferencing that uses streaming media technologies to broadcast video and/or audio over the Internet from a single content source to many listeners or viewers simultaneously.

The Webcast is an internet conferencing tool that transmits and stores, corporate presentations, lectures, workshops, seminars, etc., with the advantage of being a simple operation tool that can bring together groups in real time offering dynamism and reducing geographical distance.

It is a widely used and useful tool for companies, as it can help when traditional communication channels are not sufficient to deal with extremely relevant issues for the company, such as training and presentation of materials for prospecting customers.

The Webcast is an advantageous technology for companies by reducing personnel displacement and reducing costs with facilities, infrastructure and space rental.

This quiz is meant to test your understanding of secure passwords. Click on the title and answer the following questions in the submission box: What are the characteristics of a secure password? Why is phishing harmful?

Answers

Answer:

A secure password has the following characteristics:

long - it should be more than 15 charactersmix of characters - it should composed of letters (uppercase and lowercase), numbers and symbolsdon't use dictionary word - avoid using common words such as "orange", "password"don't use memorable key paths - avoid using the sequential letter or numbers such as "abc123"

Phishing is a kind of social engineering where a cyber criminals  trying to trick the victims to get benefit from them. For example, a cyber criminal can send a phishing email to tell the victims about something wrong with their credit card or bank account and provide a malicious link and persuade the victim to access their fake website that resembles an official bank website.  From there, the victims can send credential info to the cyber criminals without their awareness. Phishing can also be done through phone call. Phishing is harmful as a victim can fall into the trap of disclosing highly critical credential info that incur a huge loss of money.

Determining the Services Running on a Network Alexander Rocco Corporation has multiple OSs running in its many branch offices. Before conducting a penetration test to determine the network’s vulnerabilities, you must analyze the services currently running on the network. Bob Kaikea, a member of your security team who’s experienced in programming and database design but weak in networking concepts, wants to be briefed on network topology issues at Alexander Rocco Corporation. Write a memo to Bob summarizing port numbers and services that run on most networks. The memo should discuss the concepts of well-known ports and give a brief description of the most commonly used ports: 20, 21, 23, 25, 53, and 110. Complete your mini-case projects in a Microsoft Word document (or any other text editor) and submit the completed work as instructed below. Remember - papers need to be in APA format with Title page.

Answers

Answer: provided in the explanation section

Explanation:

 Network’s vulnerabilities:

           Vulnerability is a weak spot in your network that might be exploited by a security threat. Risks are the potential consequences and impacts of unaddressed vulnerabilities. In other words, failing to do Windows Updates on your Web server is vulnerability.

           Regularly scheduled network vulnerability scanning can help an organization identify weaknesses in their network security before the bad guys can mount an attack. The goal of running a vulnerability scanner or conducting an external vulnerability assessments is to identify devices on your network that are open to known vulnerabilities without actually compromising your systems.

           The overall objective of a Vulnerability Assessment is to scan, investigate, analyze and report on the level of risk associated with any security vulnerabilities discovered on the public, internet-facing devices and to provide your organization with appropriate mitigation strategies to address those discovered vulnerabilities.

         

Network topology issues:

Coverage Topology

           Coverage problem reflects how well an area is monitored or tracked. The coverage and connectivity problems in networks have received considerable attention in the research community in recent years

 

Geographic routing

           Geographic routing uses geographic and topological information of the network to achieve optimal routing schemes with high routing efficiency and low power consumption

Port Numbers

           Port Numbers While IP addresses determine the physical endpoints of a network connection, port numbers determine the logical endpoints of the connection. Port numbers are 16-bit integers with a useful range from 1 to 65535.

Port numbers are assigned by an organization called IANA and ports are allocated to various needs to avoid confusion.

Ports are classified into 3 main categories.

Well Known Ports (Port numbers 0 - 1023)

           In a client-server application, the server usually provides its service on a well-known port number. Well-known port numbers are a subset of the numbers which are assigned to applications. According to RFC1700 [5], well-known port numbers are managed by the Internet Assigned Numbers Authority (IANA). They used to be in the range from 1 to 255, but in 1992 the range was increased up to 1023.

Registered Ports (Port numbers1024 - 49151)

Such ports are used by programs run by users in the system.

           In addition to the well-known ports below 1024 there are more port numbers assigned to applications but are located anywhere from 1024 to 65535.

Private or Dynamic Ports (Port numbers 49152 - 65535)

           Private ports are not assigned for any specific purpose.

         

Discuss the concepts of well-known ports and give a brief description of the most commonly used ports: 20, 21, 23, 25, 53, and 110.

Commonly Used Port Numbers

The following port numbers are unofficial list of commonly used for linux/unix based servers.

         

20&21               TCP                FTP (File server protocol)

           FTP is one of the most commonly used file transfer protocols on the Internet and within private networks. An FTP server can easily be set up with little networking knowledge and provides the ability to easily relocate files from one system to another. FTP control is handled on TCP port 21 and its data transfer can use TCP port 20 as well as dynamic ports depending on the specific configuration.

23                   TCP/UDP          Telnet

           Telnet is the primary method used to manage network devices at the command level. Unlike SSH which provides a secure connection, Telnet does not, it simply provides a basic unsecured connection. Many lower level network devices support Telnet and not SSH as it required some additional processing. Caution should be used when connecting to a device using Telnet over a public network as the login credentials will be transmitted in the clear.

25                   TCP/UDP         SMTP   (for sending outgoing emails)

           SMTP is used for two primary functions, it is used to transfer mail (email) from source to destination between mail servers and it is used by end users to send email to a mail system.

53         TCP/UDP        DNS Server (Domain name service for DNS request)

           The DNS is used widely on the public internet and on private networks to translate domain names into IP addresses, typically for network routing. DNS is hieratical with main root servers that contain databases that list the managers of high level Top Level Domains (TLD) (such as .com). T

110             TCP                 POP3 (For receiving emails)

           POP version 3 is one of the two main protocols used to retrieve mail from a server. POP was designed to be very simple by allowing a client to retrieve the complete contents of a server mailbox and then deleting the contents from the server.

What are keyboards that include all the keys found on a typical virtual keyboard, as well as extra keys, such as function and navigation keys

Answers

Answer:

multimedia keyboard i think

Explanation:

The keyboards that include all the keys found on a typical virtual keyboard including function and navigation keys are called;

Laptops

A virtual keyboard is one that appears only when we require it and then goes away after we are done using it. Due to the nature of them, they occupy a small space. Examples of these virtual keyboards are the keyboards in touch screen mobile phones as well as tablets. Also, there are some computer operating systems that support virtual keyboards such as Windows 10.

Now, it is pertinent to know that virtual keyboards don't require physical keys to operate and also they don't possess the function and navigation keys that traditional keyboards have.

The only other unit that has a keyboard that possesses the function and navigation keys are Laptops.

Read more at; https://brainly.in/question/11722276

Write and test a Python program to find and print the smallest number in a set of integer numbers. The program should read input numbers until it reads a negative number. The negative number serves as a sentinel or marker telling the program when to stop reading numbers. The smallest of all numbers input as well as how many numbers were read (not considering the sentinel number) should be printed.

Answers

Answer:

numbers = []

count = 0

while True:

   number = int(input("Enter a number: "))

   if number < 0:

       break

   else:

       numbers.append(number)

       count += 1

min_number = min(numbers)  

print(str(min_number) + " was the smallest among " + str(count) + " entered numbers.")

Explanation:

Initialize an empty array, to hold the entered numbers, and count as 0

Create a while loop that iterates until a specific condition is met

Inside the loop, ask the user to enter the numbers. When the user enters a negative number terminate the loop. Otherwise, add the entered number to the numbers array and increment the count by 1.

When the loop is done, find the smallest of the number in the numbers array using min method and assign it to the min_number.

Print the min_number and count

The first programming project involves writing a program that computes the minimum, the maximum and the average weight of a collection of weights represented in pounds and ounces that are read from an input file. This program consists of two classes. The first class is the Weight class, which is specified in integer pounds and ounces stored as a double precision floating point number. It should have five public methods and two private methods:A public constructor that allows the pounds and ounces to be initialized to the values supplied as parameters.A public instance method named lessThan that accepts one weight as a parameter and returns whether the weight object on which it is invoked is less than the weight supplied as a parameter.A public instance method named addTo that accepts one weight as a parameter and adds the weight supplied as a parameter to the weight object on which it is invoked. It should normalize the result.A public instance method named divide that accepts an integer divisor as a parameter. It should divide the weight object on which the method is invoked by the supplied divisor and normalize the result.A public instance toString method that returns a string that looks as follows: x lbs y oz, where x is the number of pounds and y the number of ounces. The number of ounces should be displayed with three places to the right of the decimal.A private instance method toOunces that returns the total number of ounces in the weight object on which is was invoked.A private instance method normalize that normalizes the weight on which it was invoked by ensuring that the number of ounces is less than the number of ounces in a pound.Both instance variable must be private. In addition the class should contain a private named constant that defines the number of ounces in a pound, which is 16. The must not contain any other public methods.The second class should be named Project1. It should consist of the following four class (static) methods.The main method that reads in the file of weights and stores them in an array of type Weight. It should then display the smallest, largest and average weight by calling the remaining three methods. The user should be able to select the input file from the default directory by using the JFileChooser class. The input file should contain one weight per line. If the number of weights in the file exceeds 25, an error message should be displayed and the program should terminate.A private class method named findMinimum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the smallest weight in that array.A private class method named findMaximum that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the largest weight in that array.A private class method named findAverage that accepts the array of weights as a parameter together with the number of valid weights it contains. It should return the average of all the weights in that array.Be sure to follow good programming style, which means making all instance variables private, naming all constants and avoiding the duplication of code. Furthermore you must select enough different input files to completely test the program.Java programmingThe text file could not be attached but it looks like this:Year,Weight in Lbs,Weight Loss Rate1994,713.6,91995,684.5,8.21996,636.6,7.41997,611,6.81998,567.6,6.31999,523,5.72000,506.5,5.52001,504.5,5.62002,494.4,5.62003,475.8,5.72004,463.2,5.52005,469,5.62006,479.3,5.82007,471.8,5.72008,458.6,5.42009,431.9,52010,404.5,4.82011,387.1,4.72012,387.8,4.72013,367.9,4.5please tell me what to do? How to get the problem done.

Answers

Answer:

yoooooooooooooooooooooooo

Explanation:

lrmgkrmbm mrm g

Which of the following is the final step in the problem-solving process?

Answers

Explanation:

Evaluating the solution is the last step of the problem solving process.

A drawback of using observation as a data collection method is that:_______
a. it is inaccurate in measuring overt behavior.
b. it cannot be used to study cross-cultural differences.
c. it is appropriate only for frequently occurring behaviors.
d. it cannot be used to collect sensitive data about respondents.

Answers

Answer:

The answer is d, because it is not reliable in the sense that it can be used for important and sensitive information when your collecting data.

software that interprets commands from the keyboard and mouse is also known as the? A. desktop B. Operating system C. operating disk D. hard drive

Answers

Answer:

C

Explanation:

LAB:
Warm up:
People's weights Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
printf("%0.2lf", yourValue);
(1) Prompt the user to enter five numbers, being five people's weights. Store the numbers in an array of doubles. Output the array's numbers on one line, each number followed by one space. (2 pts)
Ex:
Enter weight 1: 236.0
Enter weight 2: 89.5
Enter weight 3: 142.0
Enter weight 4: 166.3
Enter weight 5: 93.0
You entered: 236.00 89.50 142.00 166.30 93.00
(2) Also output the total weight, by summing the array's elements. (1 pt)
(3) Also output the average of the array's elements. (1 pt)
(4) Also output the max array element. (2 pts)
Ex:
Enter weight 1: 236.0
Enter weight 2: 89.5
Enter weight 3: 142.0
Enter weight 4: 166.3
Enter weight 5: 93.0
You entered: 236.00

Answers

Answer:

Following is the program in the C language

#include <stdio.h> // header file  

int main() // main function

{

float weight1[10]; // array declaration  

float sum=0,max1,t; // variable declaration

for(int k = 0; k < 5; k++) //iterating the loop

{

printf("Enter weight %d: ",k+1);

scanf("%f",&weight1[k]); // Read the array by user

}

printf("\n");

printf("You entered: ");

max1=weight1[0];

for(int k = 0; k < 5 ; k++)

{

sum=sum+weight1[k];

if(max1 < weight1[k]) // check condition for highest element

{

max1=weight1[k];

}

printf("%.2lf ",weight1[k]);

}

t=sum/5.0; // find average

printf("\nTotal weight: %.2lf\n",sum); // displat total

printf("Average weight: %.2lf\n",t); // display Average

printf("Max weight: %.2lf\n",max1); // display maximum value

return 0;

}

Output:

Enter weight 1: 1

Enter weight 2: 2

Enter weight 3:3

Enter weight 4:4

Enter weight 5: 5

You entered:  1.00  2.00  3.00  4.00  5.00

Total weight: 15.00

Average weight:  3.00

Max weight:  5.00

Explanation:

Following are description of program :

Declared a array "weight1" of type "float" .Declared a variable sum,t max1 of type "float ".Iterating the loop for taking the input by the user by using scanf statement .Iterating the loop for calculating the maximum value in "max1" variable  ,total in "sum" variable .In the "t" variable we calculated the average. Finally we print the value of the maximum ,average ,total and respective array that are mention in the question .

What are the main differences between photo and video formats?

Answers

Answer:

Nothing just the video is series of photos together

Explanation:

(Geometry: area of a regular polygon)
A regular polygon is an n-sided polygon in which all sides are of the same length and all angles have the same degree (i.e., the polygon is both equilateral and equiangular). The formula for computing the area of a regular polygon is
area = (n * s^2) / (4 * tan(PI / n)
Here, s is the length of a side. Write a program that prompts the user to enter the number of sides and their length of a regular polygon and displays its area.

Answers

Answer:

import math

n = int(input("Enter the number of sides: "))

s = float(input("Enter the length of a side: "))

area = (n * s**2) / (4 * math.tan(math.pi/n))

print("The area is: " + str(area))

Explanation:

*The code is in Python.

Import the math to be able to compute the pi and tan

Ask the user to enter the number of sides and the length of a side

Calculate the area using the given formula

Print the area

What is one reason to include people who will use a new technology in conversations about technology upgrades for a business?

Answers

Answer:The users would likely know if an upgrade would be necessary or even useful.

First hand user information is often ignored by developers, change managers etc. However, obtaining first hand user input has proven vastly cost effective ,productive and easier to apply . By having early input the actual working interface can be designed so that daily users find it works effectively for them and others they interact with. It can also allow users to effectively aim to break the functionality before a crisis occurs etc. Furthermore by having user input the users will make a greater effort in ensuring the upgrade works seamlessly.

Explanation:

Assume the following variable definition appears in a program:
double number = 12.3456;
Write a cout statement that uses the setprecision manipulator and the fixed manipulator to display the number variable rounded to 2 digits after the decimal point. (Assume that the program includes the necessary header file for the manipulators.)

Answers

Answer:

cout << setprecision(2)<< fixed << number;

Explanation:

The above statement returns 12.35 as output

Though, the statement can be split to multiple statements; but the question requires the use of a cout statement.

The statement starts by setting precision to 2 using setprecision(2)

This is immediately followed by the fixed manipulator;

The essence of the fixed manipulator is to ensure that the number returns 2 digits after the decimal point;

Using only setprecision(2) in the cout statement will on return the 2 digits (12) before the decimal point.

The fixed manipulator is then followed by the variable to be printed.

See code snippet below

#include <iostream>  

#include <iomanip>

using namespace std;  

int main()  

{  

// Initializing the double value

double number = 12.3456;  

//Print  result

cout << setprecision(2)<< fixed << number;  

return 0;  

}  

How do I write: "get a random number between -10 and 11 but it cannot be 0"? (java)

Answers

Answer:

  generate a random number in a known range and map the result to the range you want

Explanation:

Use any of the usual methods to get a random number in the range 0-20, then subtract 9. Use an IF statement to test if the result is 0. If it is, replace the value with -10.

For this lab you will write a Java program that will run a simple math quiz. Your program will generate two random integers between 1 and 20 and then ask a series of math questions. Each question will be evaluated as to whether it is the right or wrong answer. In the end a final score should be reported for the user.

This is a sample transcript of what your program should do. Items in bold are user input and should not be put on the screen by your program.

Enter your name: Jeremy
Welcome Jeremy! Please answer the following questions:

4 + 6 = 10
Correct!

4 * 6 = 24
Correct!

4 / 6 = 1
Wrong!
The correct answer is 0

4 % 6 = 4
Correct!

You got 3 correct answers
That's 75.0%!

Your code will behave differently based on the random numbers it selects and the answers provided by the user. Here is a second possible execution of this code:

Enter your name: Bob
Welcome Bob! Please answer the following questions:

3 + 3 = 0
Wrong!
The correct answer is 6

3 * 3 = 6
Wrong!
The correct answer is 9

3 / 3 = 0
Wrong!
The correct answer is 1

3 % 3 = 1
Wrong!
The correct answer is 0

You got 0 correct answers
That's 0.0%!

Answers

Answer:

A java program was used to run a simple math quiz. the program was used to generate two random integers between 1 and 20 and then ask a series of math questions

Explanation:

Solution

THE CODE:

import java.util.Random;

import java.util.Scanner;

public class LabQuiz {

public static void main(String[] args) {

Scanner in = new Scanner(System.in);

System.out.println("****Welcome to Quiz******");

System.out.print("Enter your name: ");

String name = in.next();

System.out.println("Welcome "+name+"! Please answer the following questions:");

int scoreCounter=0;

int a;

int b;

int response;

a=getRandomNum();

b=getRandomNum();

System.out.print(a+"+"+b+"=");

response = in.nextInt();

if(response==(a+b)){

scoreCounter++;

System.out.println("That is correct");  

}  

else

System.out.println("No, thats not the right answer, its::"+(a+b));

a=getRandomNum();

b=getRandomNum();

System.out.print(a+"*"+b+"=");

response = in.nextInt();

if(response==(a*b)){

scoreCounter++;

System.out.println("That is correct");  

}  

else  

System.out.println("No, thats not the right answer, its::"+(a*b));

a=getRandomNum();

b=getRandomNum();

System.out.print(a+"/"+b+"=");

response = in.nextInt();

if(response==(a/b)){

scoreCounter++;

System.out.println("That is correct");

}

else

System.out.println("No, thats not the right answer, its::"+(a/b));

a=getRandomNum();

b=getRandomNum();

System.out.print(a+"%"+b+"=");

response = in.nextInt();

if(response==(a%b)){

scoreCounter++;

System.out.println("That is correct");  

}

else

System.out.println("No, thats not the right answer, its::"+(a*b));

System.out.println("You got "+scoreCounter+" correct answers.");

System.out.println("Thats "+(scoreCounter*25)+"%");

in.close();  

}

static int getRandomNum(){

Random rand = new Random();

int a;  

a = rand.nextInt(20);

if(a==0)

a++;  

return a;  

}  

}

For each of the descriptions below, perform the following tasks:

i. Identify the degree and cardinalities of the relationship.
ii. Express the relationships in each description graphically with an E-R diagram.

a. A book is identified by its ISBN number, and it has a title, a price, and a date of publication. It is published by a publisher, which has its own ID number and a name. Each book has exactly one publisher, but one publisher typically publishes multiple books over time.
b. A book is written by one or multiple authors. Each author is identified by an author number and has a name and date of birth. Each author has either one or multiple books; in addition, occasionally data are needed regarding prospective authors who have not yet published any books.
c. In the context specified in 2a and 2b, better information is needed regarding the relationship between a book and its authors. Specifically, it is important to record the percentage of the royalties that belongs to a specific author, whether or not a specific author is a lead author of the book, and each author's position in the sequence of the book's authors.
d. A book can be part of a series, which is also identified as a book and has its own ISBN number. One book can belong to several sets, and a set consists of at least one but potentially many books.
e. A piano manufacturer wants to keep track of all the pianos it makes individually. Each piano has an identifying serial number and a manufacturing completion date. Each instrument represents exactly one piano model, all of which have an identification number and a name. In addition, the company wants to maintain information about the designer of the model. Overtime, the company often manufactures thousands of pianos of a certain model, and the model design is specified before any single piano exists.
f. A piano manufacturer (see 2e) employs piano technicians who are responsible for inspecting the instruments before they are shipped to the customers. Each piano is inspected by at least two technicians (identified by their employee number). For each separate inspection, the company needs to record its date and a quality evaluation grade.
g. The piano technicians (see 2f) have a hierarchy of reporting relationships: Some of them have supervisory
responsibilities in addition to their inspection role and have multiple other technicians report to them. The supervisors themselves report to the chief technician of the company.
h. A vendor builds multiple types of tablet computers. Each has a type identification number and a name. The key
specifications for each type include amount of storage space and display type. The company uses multiple processor types, exactly one of which is used for a specific tablet computer type; obviously, the same processor can be used in multiple types of tablets. Each processor has a manufacturer and a manufacturer's unique code that identifies it.
i. Each individual tablet computer manufactured by the vendor (see 2h) is identified by the type identification number and a serial number that is unique within the type identification. The vendor wants to maintain information about when each tablet is shipped to a customer.
j. Each of the tablet computer types (see 2h) has a specific operating system. Each technician the company employs is certified to assemble a specific tablet type—operating system combination. The validity of a certification starts on the day the employee passes a certification examination for the combination, and the certification is valid for a specific period of time that varies depending on tablet type—operating system combination.

Answers

Answer:

Explanation:

The underlined traits in the ER chart speak to essential key since they remarkably recognize the quality  

(a)

(I) The level of the given relationship is 2 i.e it is a parallel connection among Book and Publisher. It is a one to numerous relationship from distributer to book in light of the fact that a distributer can distribute any number of books however a book will have only one publisher,so the cardinality will be 1 to 1..* (one to many)

(b)

(i) The degree of the given relationship is 2 i.e it is a binary relationship between Author and Book. It is a many to many relationship from Book to Author a book can be written by one or more authors and an author can write more than one book, so the cardinality will be 1..* to 1..* (many to many)

(c)

(i) As mentioned in part (b), the degree of given relation is 2 and cardinality is many to many (1..* to 1..*)

(d)

(i) The degree of the given relationship is 1 i.e unary relationship. It is a many to many relationship because one book can belong to any sets and a set can have any number of books, so cardinality is 1..* to 1..* (many to many)

Note: attached below is the image of various options to confirm the explanation (answer).

cheers i hope this helped !!!

In a horse race, the odds that Romance will win are listed as 2 : 3 and that Downhill will win are
1:2. What odds should be given for the event that either Romance or Downhill wins? (3 mks)
QUESTION FOUR​

Answers

Answer:

The odds for the event that either Romance or Downhill wins is 11/4

Explanation:

The odds that Romance will win is 2: 3

The odds that Downhill will win is 1:2

[tex]P(event) = \frac{Odd(event)}{1 + Odd(event)}[/tex]

Where P(event) = Probability that an event occurs

Odd(event) = The odds that an event occurs

Calculate the Probability that Romance wins, P(R):

[tex]P(R) = \frac{2/3}{2/3 + 1} \\P(R) = 2/5[/tex]

Calculate the probability that Downhill wins, P(D):

[tex]P(D) = \frac{1/2}{1/2 + 1} \\P(D) = 1/3[/tex]

Calculate the Probability that either Romance or Downhill wins, P(R or D):

P(R or D) = P(R) + P(D)

P(R or D) = 2/5 + 1/3

P(R or D) = 11/15

[tex]P(R or D) = \frac{Odd(R or D)}{1 + Odd(R or D)} \\\\11/15 = \frac{Odd(R or D)}{1 + Odd(R or D)}\\[/tex]

[tex]\frac{11}{15} + \frac{11}{15}[ Odd(R or D)] = Odd(R or D)\\\\\frac{4}{15}[ Odd(R or D)] = \frac{11}{15}\\\\\\Odd(R or D) = \frac{11}{15} * \frac{15}{4}\\\\Odd(R or D) = 11/4[/tex]

Print "Censored" if userInput contains the word "darn", else print userInput. End with a newline. Ex: If userInput is "That darn cat.", then output is: Censored Ex: If userInput is "Dang, that was scary!", then output is: Dang, that was scary! Note: If the submitted code has out-of-range access, the system will stop running the code after a few seconds, and report "Program end never reached." The system doesn't print the test case that caused the reported message.
#include
#include
using namespace std;
int main() {
string userInput;
getline(cin, userInput);
/* Your solution goes here */
return 0;
}

Answers

Answer:

The program goes as follows

Comments are used to explain difficult lines

#include <iostream>

#include <string>

using namespace std;

int main()

{

string userinput;

getline(cin,userinput);

/* My Solution starts here*/

//Initialize sub string position to 0

int stringpos = 0;

// Declare an iterating variable to iterate through userinput

int startpos;  

//Declare and initialize a determinant variable

int k = 0;

while((startpos = userinput.find("darn",stringpos))!=string::npos)

{

 //If userinput contaings "darn", increase k by 1

k++;

// Go to next string position

stringpos = startpos+1;  

}

//If determinant variable k is p then, userinput does not contain "darn"

if(k==0)

{

 cout<<userinput;

}

//Otherwise, it contains "darn"

else

{

 cout<<"Censored";

}

/* My Solution ends here*/

return 0;

}

See attached for .cpp program file

The skip_elements function returns a list containing every other element from an input list, starting with the first element. Complete this function to do that, using the for loop to iterate through the input list.

Answers

Answer:

Following are code that we fill in the given in the given question

if i %2==0:# check the condition

new_list.append(elements[i])# append the list  

return new_list # return the new_list

Explanation:

Missing Information :

def skip_elements(elements):# function

new_list=[]# Declared the new list

i=0  #variable declaration

for i in range(len(elements)): #iterating over the loop  

if ---------# filtering out even places elements in the list

--------------# appending the list

return -------- # returning the new_list

print(skip_elements(['a','b','c','d','e','f','g'])) #display

Following are the description of the code:

In this we declared a function skip_elements .In this function we pass the parameter into them .After that we declared the new_list array.Declared the variable "i" that are initialized with the 0 value .Iterating over the for loop and this loop we check the condition in the if condition.The if condition executed when the index is even .The statement inside the if condition we will appending the list and returning the list item .Finally we print the even number of index list .

Write an if-else statement with multiple branches. If year is 2101 or later, print "Distant future" (without quotes). Otherwise, if year is 2001 or greater, print "21st century". Otherwise, if year is 1901 or greater, print "20th century". Else (1900 or earlier), print "Long ago". Sample output with input: 1776 Long ago

Answers

Answer:

year = int(input("Enter a year: "))

if year >= 2101:

   print("Distant future")

elif year >= 2001:

   print("21st century")

elif year >= 1901:

   print("20th century")

else:

   print("Long ago")

Explanation:

*The code is in Python.

Ask the user to enter a year

Use if-else statement to check the year and print the appropriate message given for each condition. If year is greater than or equal to 2101, print "Distant future". If year is greater than or equal to 2001, print "21st century". If year is greater than or equal to 1901, print "20th century". Otherwise, print "Long ago".

Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read it. Eve can write to File1 but can't read it. Alice has Top Secret, {A,B,C}. Bob has Secret{A,B}, Charlie has Confidential,{C} and Eve is Unclassified. File2 should be classified as

Answers

Answer:

Top Secret, (A,B,C)

Explanation:

Solution:

Some information are known to be sensitive, and has a higher level of classification.

Examples for such levels are: Secret, Top secret ,Unclassified and  Confidential, and Unclassified.  all users of the system has a  level of clearance. fro a user to be able to gain access to document, he or she must have posses a level of the document.

Now, this is governed by two rules which is stated below:

No user can have access to any information that is considered higher than their level of clearance.

Secondly, a user can write to files only that contains an equal level or lower of his clearance level, this is to stop what is called the write down effect.

It is important to note that ABC, categories determine what type of access is permitted.

Now, for the given example, since, Bob and charlie cannot read it, which shows that the file must be of top priority or importance, then Bob and Charlie needs clearance to the file,the file 2 is considered a top priority.

Therefore, the File 2 is classified as a Top Secret, (A,B,C)

Select the correct order of the chemicals to successfully create the cure. *

Purple=P, Red=R, Orange=O, Yellow=Y, Green=G, Blue=B

Answers

Answer:

Red=R, Yellow=Y, Blue=B, Orange=O, Green=G, Purple=P

Explanation:

Colors of chemical is a physical property which comes from excitation of electrons. The electrons absorbs energy which enables the chemical to change its color. The correct sequence to create cure is to use red, yellow and blue then add gradually the other colored chemicals.

Continue to develop the site content as directed in milestone 4. At this point, at least 3 of the pages for the site should be completed. Use the knowledge gained in this week's lecture and Lab to create a user feedback form. Include all necessary controls (text boxes, radio buttons, check boxes, text areas, dropdown lists, and buttons) to allow the user to effectively interact with the form. You can choose the type of input control for each question, but your feedback form will have at least five feedback questions. Use CSS to control the layout of the form. Include reset and submit buttons with the form. The reset button should clear the form and the submit button should load a "Your information has been received" page. Move all site and page level styles to an external CSS file. Upon completion of this step, zip up all of the files for the site into one single file and submit the file.
Grading Rubric
Category Points % Description
Content completed on at least
three pages 9 20 Content on pages is visible
Form created and CSS used for the layout
of the form 9 20 As per milestone spec
All necessary form controls used
as appropriate 9 20 Required site evaluation options present
Buttons (submit/reset) included 9 20 Submit button linked to form action;
reset clear forms
External CSS file 9 20 Site managed by an external CSS file
Total 45 100 A quality project will meet or exceed
all of the above requirements
Submit your assignment to the Dropbox, located at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructions.

Answers

Answer:

This is createing a responsive website form for clients.

Explanation:

Using HTML, CSS and JavaScript or python to create an interactive, dynamic website. The html file is used to structure the layout of the website Dom , the CSS, also known as cascaded style sheet is using to style the created web pages. The CSS libraries and frameworks like sass, less and bootstraps can be used for convenience and speed. The JavaScript file is used to manipulate the Dom, creating an interactive site. Python libraries likes flask are used for backend development routing to create dynamic contents and web pages.

2-3 Calculating the Body Mass Index (BMI). (Programming Exercise 2.14) Body Mass Index is a measure of health based on your weight. It can be calculated by taking your weight in kilograms and dividing by the square of your height in meters. Write a program that prompts the user to enter a weight in pounds and height in inches and displays the BMI. Note: One pound is 0.45359237 kilograms and one inch is 0.0254 meters. Hint: Convert the pounds entered into kilograms also convert the height in inches into meters Example: If you entered in pounds your weight as 95.5 and your height as 50 inches then the calculated BMI is 26.8573 FYI: BMI < 18.5 is underweight BMI >

Answers

Answer:

weight = float(input("Enter your weight in pounds: "))

height = float(input("Enter your height in inches: "))

weight = weight * 0.45359237

height = height * 0.0254

bmi = weight / (height * height)

print("Your BMI is: %.4f" % bmi)

Explanation:

*The code is written in Python.

Ask the user to enter weight in pounds and height in inches

Convert the weight into kilograms and height into meters using given conversion rates

Calculate the BMI using given formula

Print the BMI

Suppose two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, Sketch the waveform produced by A when “$” is sent. Also mention the OSI layer that is responsible for this.

Answers

Answer:

Physical / Data link layer

Explanation:

If two computers (A & B) are directly connected through Ethernet cable. A is sending data to B, the data would be transmitted if the network is clear but if the network is not clear, the transmission would wait until the network is clear.

The Open Systems Interconnection model (OSI model) has seven layers each with its own function.

The physical layer is the first layer responsible for data transmission over a physical link. The data packets are converted to signals over a transmission media like ethernet cable.

The data link layer is the second layer in the OSI layer responsible for transmission of data packets between nodes in a network. It also provides a way of detecting errors and correcting this errors produced as a result of data transmission.

What is the work of the cpu as processer

Answers

Answer:

A central processing unit (CPU) is an important part of every computer. The CPU sends signals to control the other parts of the computer, almost like how a brain controls a body. The CPU is an electronic machine that works on a list of computer things to do, called instructions. hope that helps love!

I would say the CPU has to be the most important part including the graphics card
Other Questions
Rocky Mountain National Park is a popular park for outdoor recreation activities in Colorado. According to U.S. National Park Service statistics, 46.7% of visitors to Rocky Mountain National Park in 2018 entered through the Beaver Meadows park entrance, 24.3% of visitors entered through the Fall River park entrance, 6.3% of visitors entered through the Grand Lake park entrance, and 22.7% of visitors had no recorded point of entry to the park. Consider a random sample of 175 Rocky Mountain National Park visitors. Use the normal approximation of the binomial distribution to answer the following questions. (Round your answers to four decimal places.)(a) What is the probability that at least 85 visitors had a recorded entry through the Beaver Meadows park entrance?(b) What is the probability that at least 80 but less than 90 visitors had a recorded entry through the Beaver Meadows park entrance?(c) What is the probability that fewer than 12 visitors had a recorded entry through the Grand Lake park entrance?(d) What is the probability that more than 55 visitors have no recorded point of entry? Read the following excerpt from The American Crisis:These are the times that try men's souls. The summersoldier and the sunshine patriot will, in this crisis, shrinkfrom the service of his country; but he that stands it now,deserves the thanks of man and woman.Which term best describes the tone of this passage?A. DeterminedB. DefeatedC. DemoralizedD. Outraged , ? (1) (2) (3) (4) .1) 1, 3, 42) 3, 43) 1, 24) 1, 2, 3 Indigo Devices Corp. has 25,000 units in process on September 1 that are 70% complete. In September, the company completed and transferred out 60,000 units. The company has 12,000 units in process on September 30 that are 40% complete. Calculate the equivalent units of Indigo Devices for September assuming the company uses the FIFO method of costing. 10] James is about to paint the walls of his lounge. The lounge has 4 walls (2 x Wall A and 2 x Wall B). Wall A and wall B which has a square window of side 1.0m, are shown below:Wall A Wall B 3.0m 4.0m5.0mA can of paint advertises coverage of 4.5 m2. How much paint will James require? The equation sin(25) = 9/Ccan be used to find the length of what is the length of AB round to the nearest tenth Which sequence of transformations maps ABC onto RST? Which proportion could be used to determine if the figures represent a dilation? 2/3=5/8, 2/3=8/5, 2/8=5/3, or 2/8=3/5? Cathy, the manager of Cathys Catering, Inc., uses activity-based costing to compute the costs of her catered parties. Each party is limited to 20 guests and requires 5 people to serve and clean up. Cathy offers two types of parties, an afternoon picnic and an evening formal dinner. The breakdown of the costs follows: Activities (and cost drivers) Afternoon Picnic Formal Dinner Advertising (parties) $ 89 per party $ 89 per party Planning (parties) $ 90 per party $ 134 per party Renting equipment $ 51 per party plus $ 77 per party plus (parties, guests) $ 10 per guest $ 20 per guest Obtaining insurance (parties) $ 155 per party $ 430 per party Serving (parties, servers) $ 58 per server per party $ 79 per server per party Preparing food (guests) $ 19 per guest $ 27 per guest Per party costs do not vary with the number of guests.Required:(a) Compute the cost of a 20-guest afternoon picnic. (b) Compute the cost of a 20-guest evening formal dinner. Complete each sentence with the correct form of the verb in parentheses.1. Si vous le vouliez, vous ____ (pouvoir) commencer comme cadre.2. J____ (avoir) moins de temps libre si je prends un emploi plein temps.3. Si vous voulez prendre un cong, vous ____ (devoir) nous le dire un mois lavance.4. Si tu commenais a ce niveau, tu ____ (avoir) un salaire modeste.5. Vous ____ (prendre) un message si je ne suis pas rentre.6. Ils auraient le choix sils ____ (postuler) dans plusieurs compagnies la fois. 7. Si ta lettre de motivation est bonne, tu ____ (trouver) un travail plus facilement.8. Je ____ (dmnager) sil ny avait plus de postes dans la rgion. Find the equation of the line that is parallel to y=2x and goes through the point (-2, 3 ) i really need help on thisss how much is 78ml when you turn it to litres 3 examples od abiotic Which of these labor sources was most important to the Southern colonial plantation economy? African slaves Child labor Indentured servants Native Americans At points on the short run aggregate supply curve (SAS) to the left of the long run aggregate supply curve (LAS), resources are most likely:________.a. overutilized, making it more likely that the short run aggregate supply curve (SAS) will shift up.b. underutilized, making it more likely that the short run aggregate supply curve (SAS) will shift down.c. overutilized, making it more likely that the short run aggregate supply curve (SAS) will shift down.d. underutilized, making it more likely that the short run aggregate supply curve (SAS) will shift up. BRAINLIEST round to one decimal place Students in 7 grade took a standardized math test that they also had taken in 5 grade. The collected data showed that in two years the median increased by three points, and the mean increased by around two and a half points. In term of the contex, what can you infer? Which process will the bacteria use to obtain energy? A. Cellular respiration B. Photosynthesis C. Lactic fermentation D. Alcoholic fermentation I think its B someone tell me if its right 1/5X-3=4 solve the equation