Answer:tq we
Explanation:
t rhh
example of Bussiness application software
Answer:
those are the example
Hope it helps u
You have been given an encrypted copy of the Final exam study guide here, but how do you decrypt and read it???
Along with the encrypted copy, some mysterious person has also given you the following documents:
helloworld.txt -- Maybe this file decrypts to say "Hello world!". Hmmm.
hints.txt -- Seems important.
In a file called pa11.py write a method called decode(inputfile,outputfile). Decode should take two parameters - both of which are strings. The first should be the name of an encoded file (either helloworld.txt or superdupertopsecretstudyguide.txt or yet another file that I might use to test your code). The second should be the name of a file that you will use as an output file. For example:
decode("superDuperTopSecretStudyGuide.txt" , "translatedguide.txt")
Your method should read in the contents of the inputfile and, using the scheme described in the hints.txt file above, decode the hidden message, writing to the outputfile as it goes (or all at once when it is done depending on what you decide to use).
Hint: The penny math lecture is here.
Another hint: Don't forget about while loops...
Answer:
Explanation:
Which best describes the purpose of LoJack on a computer
Answer:The purpose of the lo jack on a computer to the lock and delete files on the computer devices.
Explanation:The lo jack on a computer to locate all the lock and delete files.
lo jack can provides the computer on the passwords that contains different levels of the bios access.
lo jack perform on the computer operating system provides on the boot only the trusted by the computer operating system.
Lo jack computer on the function is used to the published the exam answers on the websites.
Lo jack insures to the data into hard drives to the correct computer password.
Which of the following vendors offers the largest variety of editions for its operating system?
Answer:
Microsoft Windows offers the largest variety of editions for its operating system.
Create a list of books you like most. Make sure the list has more than 7 books. Assume you want to randomly assign one book to read to each of your 7 friends. Make sure no two people get the same book assigned to them.
This a coding question, so paste your answer directly from python
Answer:
import random
# List of books
books = ["To Kill a Mockingbird", "The Great Gatsby", "Pride and Prejudice", "1984", "Animal Farm", "Brave New World", "The Catcher in the Rye", "One Hundred Years of Solitude", "The Lord of the Rings", "Harry Potter and the Philosopher's Stone", "The Hobbit", "The Hunger Games", "The Da Vinci Code", "Angels and Demons", "The Girl with the Dragon Tattoo", "Gone Girl", "The Fault in Our Stars"]
# Shuffle the list of books randomly
random.shuffle(books)
# Assign one book to each of seven friends without repeating any book
for i in range(7):
print("Friend", i+1, "will read:", books[i])
This code will randomly shuffle the list of books and then assign one book to each of seven friends without repeating any book. The output will display the name of each friend followed by the book assigned to them.
Explanation:
hello!..
Here's the code: ↓```python
import random
# List of books you like most
favorite_books = [
"The Great Gatsby",
"To Kill a Mockingbird",
"1984",
"Pride and Prejudice",
"The Catcher in the Rye",
"The Lord of the Rings",
"Harry Potter and the Sorcerer's Stone",
"The Hobbit",
"The Hunger Games",
"The Da Vinci Code",
]
# Create a copy of the list to shuffle
available_books = favorite_books.copy()
# Initialize a dictionary to store book assignments
book_assignments = {}
# Create a list of your 7 friends
friends = ["Friend1", "Friend2", "Friend3", "Friend4", "Friend5", "Friend6", "Friend7"]
# Assign books to friends randomly without duplicates
for friend in friends:
if available_books:
assigned_book = random.choice(available_books)
book_assignments[friend] = assigned_book
available_books.remove(assigned_book)
else:
break # No more books available
# Print the book assignments
for friend, book in book_assignments.items():
print(f"{friend} will read: {book}")
```
↪ This code will randomly assign one book from your list of favorite books to each of your 7 friends, ensuring that no two friends receive the same book.
does anyone know how to fix this do not answer if you don't
In setting for the keyboard you will find the solution
you can easily go to settings and search keyboard and it should help
Katie and her mom had an argument. Katie was at the mall when her mom called on her cell phone. What type of noise came up in their
communication?
Answer:
Noise pollution.
Explanation:
Noise pollution is too loud noise that is harmful to health or that significantly reduces the comfort of the environment or significantly impairs work. Noise pollution arises, for example, from traffic and work machines, as well as from noisy events such as open-air concerts. Noise pollution can also arise from industrial plants (such as wind turbines, rock crushers), work machines (such as cargo handling equipment in ports and other sites), individual machines and equipment (such as leaf blowers, clearing and chainsaws, air conditioners), water pumps) and other noise sources. The noise of the work machines also causes inconvenience to the user of the device if the source of the noise is close to the hearing system of the machine operator.
Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_perimeter and get_area that compute the perimeter and area, and a member function void resize(double factor) that resizes the rectangle by multiplying the width and height by the given factor
Answer:
Explanation:
The following code is written in Java. It creates the Rectangle class with the height and width variables. The constructor takes these variables as parameters to create Rectangle objects. It creates the get_perimeter method that sums up two of each side in order to get the perimeter of the Rectangle. A get_area method multiplies the height by the width to get the area. Finally, a resize method takes in a double factor variable and multiplies the height and the width by the factor to get a resized Rectangle object.
class Rectangle {
double height, width;
public Rectangle(double height, double width) {
this.height = height;
this.width = width;
}
public double get_perimeter() {
return (this.height + this.height + this.width + this.width);
}
public double get_area() {
return (this.height * this.width);
}
public void resize(double factor) {
this.height *= factor;
this.width *= factor;
}
}
cs academy unit 8.3.2 Shirt Design
In order to fix the code and make it work, you can try the following corrections:
How to explain the program# Import the necessary libraries here
# Set the background color
app.background = 'pink'
# Draw the shirt
Polygon(5, 175, 85, 60, 315, 60, 395, 175, 330, 235, 290, 190, 300, 355, 100, 355, 110, 190, 70, 237, fill='lavenderBlush')
Arc(200, 60, 95, 70, 90, 180, opacity=10)
# Use a loop to draw stars
for radius in range(10, 100, 5):
# Draw a crimson star whenever the radius is a multiple of 10 and a white star otherwise
if radius % 10 == 0:
Star(200, 210, radius, 6, fill='red')
else:
Star(200, 210, radius, 6, fill='white')
# Display the graphic
# Add code here to show or update the graphic window
Learn more about program on
https://brainly.com/question/26642771
#SPJ1
Which statement describes what the Conditional Formatting option in Excel 2016 allows users to do?
Answer:
It automatically applies formatting based on specific rules or conditions being met. It automatically applies highlighting to selected cell ranges based on specific rules or conditions being met.
Explanation:
Answer:
D. All of the options listed are correct.
Explanation:
Edg. 2021
Which option should you choose to change the background of your current slide?
Design Background
Format Background
Theme
Variant
Answer: Format Background
Explanation:
If you want to change the background of your current slide on PowerPoint then the correct button to use is Format Background.
You can find it by clicking on the ''Design'' tab, it will be at the far right afterwards.
You can also right-click the smaller version of the slide to the left of the screen and you will see Format Background in the options.
Answer: Format Background
Explanation: Try it, it really works!
2.Some artists look for ways to extend copyright for longer than the laws normally allow. Why do they do this?
please guys my grade depends on it 50 POINTS.
Some artists might want to extend copyright longer than the law allows because;
They want to maintain sole rights to the work.They do not want others to claim their intellectual property.They want to distribute the works personally while gaining the financial benefits that come with it.What is Copyright?Copyright refers to the legal rights of creators to claim ownership of their work. The law allows the copyright owners some time to claim ownership after which the work can go to the public domain.
However, some chose to renew the copyright because of their attachment to the work and desire to maintain full rights over their innovations.
Learn more about Copyright here:
https://brainly.com/question/1078532
How would you explain a number system to someone who had never seen numbers before
Answer:
Use a number of items (likes apples) to show the amount each number correlates to.
Explanation:
hy please help me do this
Answer:
1 True
2 False
3 False
4 True
5 True
6 True
7 True
8 False
Explanation:
8 robot's are not perfect they make mistakes too
. In the ____, you justify acquiring newer and better resources to investigate computer forensics cases.
Answer:
Business Case
Explanation:
In the Business Case, you justify acquiring newer and better resources to investigate computer forensics cases.
Security monitoring has detected the presence of a remote access tool classified as commodity malware on an employee workstation. Does this allow you to discount the possibility that an APT is involved in the attack
Answer:
No it doesn't
Explanation:
Targeted malware can be linked to such high resource threats as APT. Little or nothing can be done to stop such advanced persistent threats. It is necessary to carry out an evaluation on other indicators so that you can know the threat that is involved. And also to know if the malware is isolated or greater than that.
The ______ engine compares your entry against its database and returns a list of hits or sites that contain the keywords. (hint: s___h)
Answer:
The search engine
And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase
There were 5 staff members in the office before the increase.
To find the number of staff members in the office before the increase, we can work backward from the given information.
Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.
Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.
Moving on to the information about the year prior, it states that there was a 500% increase in staff.
To calculate this, we need to find the original number of employees and then determine what 500% of that number is.
Let's assume the original number of employees before the increase was x.
If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:
5 * x = 24
Dividing both sides of the equation by 5, we find:
x = 24 / 5 = 4.8
However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.
Thus, before the increase, there were 5 employees in the office.
For more questions on staff members
https://brainly.com/question/30298095
#SPJ8
If the decimal value is 45, binary value is
Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75).
Answer:
Following is the program in the python language
hr = input("input hours:") #Read input by user
h1 = float(hr)
rate =input("Input Rate:") #Read RATE BY USER
r1 = float(rate) #CONVERT INTO FLOAT
if h1 <= 40: #check condition
t=h1 * r1
print (t) #DISPLAY
else :#else block
t1=(40 * r1) + (h1 -40) * r1 * 1.5
print('The pay is :')
print(t1)#DISPLAY
Output:
input hours:45
Input Rate:10.50
The pay is :
498.75
Explanation:
Following are the description of program
Read the value of hour in the "hr" variable and convert into the float value in the "h1" variable .Read the value of rate in the " rate" variable and convert into the float value in the "r1" variable .After that check the condition of hour if block if the hour is less then or equal to 40 then it multiplied h1 *t1 otherwise else block will be executed and print the value of pay .
What is Stefen Salvators mom name? For the tvd fans
Answer:
Lillian "Lily" Salvatore
Explanation:
Answer:
lily
Explanation:
find four
reasons
Why must shutdown the system following the normal sequence
If you have a problem with a server and you want to bring the system down so that you could then reseat the card before restarting it, you can use this command, it will shut down the system in an orderly manner.
"init 0" command completely shuts down the system in an order manner
init is the first process to start when a computer boots up and keep running until the system ends. It is the root of all other processes.
İnit command is used in different runlevels, which extend from 0 through 6. "init 0" is used to halt the system, basically init 0
shuts down the system before safely turning power off.
stops system services and daemons.
terminates all running processes.
Unmounts all file systems.
Learn more about server on:
https://brainly.com/question/29888289
#SPJ1
Math Machine Code:
Convert strings to numbers.
Initialize and use the Random number generator.
Perform several Math class operations.
Display a value in hexadecimal format.
Answer:
import random
# Convert strings to numbers
string_num1 = "123"
string_num2 = "456"
num1 = int(string_num1)
num2 = int(string_num2)
# Initialize and use the Random number generator
random_num = random.randint(1, 100)
print("Random Number:", random_num)
# Perform several Math class operations
sum = num1 + num2
product = num1 * num2
power = num1 ** num2
sqrt = num1 ** 0.5
# Display a value in hexadecimal format
hex_value = hex(random_num)
# Display the results
print("Num1:", num1)
print("Num2:", num2)
print("Sum:", sum)
print("Product:", product)
print("Power:", power)
print("Square Root of Num1:", sqrt)
print("Hexadecimal Value of Random Number:", hex_value)
Explanation:
In this code, we first convert two string numbers (string_num1 and string_num2) to integers using the int() function. Then, we use the random module to generate a random number and perform various Math class operations such as addition, multiplication, exponentiation, and square root. Finally, we use the hex() function to convert the random number to hexadecimal format.
When you use a rest area, you should:
A. Make sure your windows are closed tightly
B. Stop in a dark place where you can sleep
C. Walk around your car after resting
D. Sleep with the windows rolled down
Assignment
Write a assembly program that can display the following shapes:
Rectangle
Triangle
Diamond
The program will read an input from the user. The input is terminated with a period. So the program will continue to run until a period is read.
The data the program reads is as follows:
A shape command followed by parameters.
R stands for Rectangle. The parameters are height (rows) and width (columns)
T stands for Triangle. The parameters is base width
D stands for Diamond. The parameters
Your program needs to read the input and based on the input do the following:
Print your name
Then print the name of the shape
Then the shape below it.
Sample input:
R 03 10
T 05
D 11
.
Output:
Loay Alnaji
Rectangle
**********
**********
**********
Triangle
*
***
*****
Diamond
*
***
*****
*******
*********
***********
*********
*******
*****
***
*
Requirements
Your main should only be the driver. It should only read the "shape type", based on that, call the proper function to read the parameters and draw the shape.
Example of your main (just example, pseudocode):
loop:
read shape
if shape is '.' then exit
if shape is 'R'
call Rectangle Function
if shape is 'D'
call Diamond Function
if shape is 'T'
Call Triangle Function
go to loop
The program above is one that begins with the _begin name, which is the passage point of the program.
What is the program about?The program uses framework call int 0x80 to print your title on the screen utilizing the compose framework call. It loads the suitable values into the registers (eax, ebx, ecx, edx) to indicate the framework call number, record descriptor, buffer address (where the title is put away), and length of the title.
It checks in case the shape input may be a period (.), which demonstrates the conclusion of input. In case so, it bounced to the exit name to exit the program.
Learn more about program from
https://brainly.com/question/23275071
#SPJ1
Write a program that prompts the user to enter two points (x1, y1) and (x2, y2) and displays their distance between them. The formula for computing the distance is: Square root of ((x2 - x1) squared + (y2 - y1) squared) Note that you can use pow(a, 0.5) to compute square root of a.
Answer:
x1 = input("enter x value of first number: ")
y1 = input("enter y value of first number: ")
x2 = input("enter x value of second number: ")
y2 = input("enter y value of second number: ")
ans = (float(x2)-float(x1))**2 + (float(y2)-float(y1))**2
ans = pow(ans, 0.5)
print(ans)
A standard that is designed to connect peripheral devices, similar to Bluetooth, but that transfers data more quickly is ____.
Answer:
WiFi I believe, the technology is faster and has less latency
Pls help I really don’t know
Answer:
Routine decisions are nothing complicated. They are simply decisions that you make everyday, sometimes without thinking, because you've been making them for a long time.
Just relax and think of decisions you made today that you've been making for a long time.
For instance:
Waking up and checking to see if someone texted you. Brushing your teethWhat footwear to wear. What breakfast to have.What time to sleep.1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
What will be displayed with the formula DATE(2020,13,15)?
Select an answer:
44211
44150
#VALUE
44180
Answer: The formula DATE(2020,13,15) will result in the error value #VALUE.
This is because the second argument (13) in the DATE function represents the month, and a valid month value should be between 1 and 12. Since 13 is not a valid month value, Excel will return the error value #VALUE.
Explanation:
The formula DATE(2020,13,15) will return an error of #VALUE as the second argument, which represents the month, is invalid since it is outside the range of 1 to 12.
What is programming?The process of creating a set of instructions that tells a computer how to perform a task is known as programming.
Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.
In Excel, valid arguments for the year, month, and day values are required. The year must be an integer between 1900 and 9999, and the month must be an integer between 1 and 12.
The second argument in this case is 13, which is outside the valid range for a month. As a result, the formula is unable to generate a valid date and returns an error code of #VALUE.
Thus, the answer is #value.
For more details regarding programming, visit:
https://brainly.com/question/11023419
#SPJ2