Well, regardless of what practices you may wanting and go into, equal employment opportunity (EEO) should apply to everyone equally, even if you're a student.
What is unit testing? a. Checking that the integer values of a function use proper units (yards, meters, etc.) b. Ensuring a program is not one large function but rather consists of numerous smaller functions (units) c. Dividing larger function parameters into several smaller parameters known as units d. Individually testing a small part (or unit) of a program, typically a function, using a separate program called a test harness
Answer:
d. Individually testing a small part (or unit) of a program, typically a function, using a separate program called a test harness.
Explanation:
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
Unit testing can be defined as a software development procedure that involves the process of individually testing a small part (or unit) of a program, typically a function, using a separate program called a test harness.
This ultimately implies that, if the observed behavior of the small part of a software program is consistent with the expectations, then the unit test is considered a pass. Otherwise, the unit test failed.
7.2 need help plzs 15 points
Number are stored and transmitted inside a computer in the form of
Number are stored and transmitted inside a computer in the form of ASCII code
What is the second step in opening the case of working computer
Answer: 1. The steps of opening the case of a working computer as follows:
2. power off the device.
3. unplug its power cable.
4. detach all the external attachments and cables from the case.
5. Remove the retaining screws of the side panel.
6. Remove the case's side panel.
Explanation:
Imagine that you want to build a radio telescope and an optical telescope and that you want them to both have the same angular resolution, assume that both telescopes can reach the diffraction limit. Which telescope will have to have a larger diameter? Explain your reasoning.
Answer:
The radio telescope will have to have a larger diameter than the optical telescope in order to achieve the same angular resolution. This is because radio waves have a longer wavelength than optical waves, and the angular resolution of a telescope is inversely proportional to the wavelength of the radiation it is observing. Since the radio waves have a longer wavelength, the telescope observing them will need a larger diameter in order to achieve the same level of resolution as a telescope observing optical waves. Additionally, the diffraction limit for radio telescopes is greater than for optical telescopes, so the radio telescope will need to be larger to reach the diffraction limit.
: "I have a customer who is very taciturn."
The client typically communicates in a reserved or silent manner
B. He won't speak with you.
Why are some customers taciturn?People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.
The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.
Learn more about taciturn people here:
https://brainly.com/question/30094511
#SPJ1
2.) Using Constants and Variables to create a Program (10 points)
You are going to write out a program below that will help calculate the total amount of money made per
week, based on a 5 day work week and making $8 per hour.
You will need to create (2) Constant variables
You will need to create (3) variables
Using Constants and Variables to create a Program is given below.
How to create the program# Establish constant values
DAYS_PER_WEEK = 5
HOURLY_WAGE = 8
# Introduce changeable parameters
hours_worked = 0
daily_earnings = 0
total_earnings = 0
# Ask user regarding hours labored each day
for day in range(1, DAYS_PER_WEEK + 1):
hours_worked = int(input(f"How many hours did you work on day {day}? "))
daily_earnings = hours_worked * HOURLY_WAGE
total_earnings += daily_earnings
# Display aggregate income for the week
print(f"You made a total of ${total_earnings} this week.")
Learn more about program on
https://brainly.com/question/26642771
#SPJ1
What is a required device(s) used to connect to an ISP Network?
a. Switch
b. Mouse
c. Modem
d. Hub
e. B and C
Answer:e
Explanation:e
As more devices and appliances make use of RTOSs, the necessity of protecting them from hackers becomes increasingly critical. Developers are working to improve the security of the software and to safeguard communications between such devices. How concerned are you about the security of RTOSs in cars, smart homes, and wearable technology
It should be noted that the main concern for the devices is the security system. It's important for the devices to be secured from unauthorized users.
A real-time operating system simply means an operating system that is used in processing data and events that have time constraints.
Nowadays, there are various security concerns. Therefore, it's important for RTOSs in cars, smart homes, and wearable technology to be highly secured. This is important in order to prevent cybercriminals and unauthorized users.
Read related link on:
https://brainly.com/question/25686595
Most shop accidents are caused by?
Answer:Most shop accidents are caused by÷
liftingpoor light trips and fallsstressdangerous materialsact of shop violencedehydrationextreme tirednessBalance is the design principle that is represented when using the Crop tool?
Answer:
The answer is "False".
Explanation:
The rule of thirds implies to the subject, which is not centered mostly on the picture because of new photography formats their shots. Its main object is a little off with one side by using a third-party principle, which draws your attention for the audience into another design, instead of only looking at the center. In another word, we can say that this rule is used as the definition to design the Crop tool to represent as an overlay.
Which of the following BEST describes an inside attacker?
An agent who uses their technical knowledge to bypass security.
An attacker with lots of resources and money at their disposal.
A good guy who tries to help a company see their vulnerabilities.
An unintentional threat actor. This is the most common threat.
The inside attacker should be a non-intentional threat actor that represents the most common threat.
The following information related to the inside attacker is:
It is introduced by the internal user that have authorization for using the system i.e. attacked.It could be intentional or an accidental.So it can be non-intentional threat.Therefore we can conclude that The inside attacker should be a non-intentional threat actor that represents the most common threat.
Learn more about the threat here: brainly.com/question/3275422
Evaluati urmatoarele expresii
5+2*(x+4)/3, unde x are valoare 18
7/ 2*2+4*(5+7*3)>18
2<=x AND x<=7 , unde x are valoare 23
50 %10*5=
31250/ 5/5*2=
Answer:
A) 22 ⅓
B) 111>18
C) There is an error in the expression
D) 25
E) 62500
Question:
Evaluate the following expressions
A) 5 + 2 * (x + 4) / 3, where x has a value of 18
B) 7/2 * 2 + 4 * (5 + 7 * 3) & gt; 18
C) 2 <= x AND x<= 7, where x has value 23
D) 50% 10 * 5 =
F) 31250/5/5 * 2 =
Explanation:
A) 5 + 2 * (x + 4) / 3
x = 18
First we would insert the value of x
5 + 2 * (x + 4) / 3
5 + 2(18 + 8) / 3
Then we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.
= 5 + 2(26) / 3
= 5 + 52/3
= 5 + 17 ⅓
= 22 ⅓
B) 7/2 * 2 + 4 * (5 + 7 * 3) > 18
we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.
7/2 * 2 + 4 * (5 + 7 * 3) >18
= 7/2 × 2 + 4× (5 + 7 × 3)>18
= (7×2)/2 + 4× (5+21) >18
= 14/2 + 4(26) >18
= 7 + 104 >18
= 111>18
C) 2 <= x AND x<= 7, where x has value 23
There is an error in the expression
D) 50% of 10 * 5
we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.
The 'of' expression means multiplication
= 50% × 10×5
= 50% × 50
50% = 50/100
=50/100 × 50
= 1/2 × 50
= 25
F) 31250/5/5 * 2
The expression has no demarcation. Depending on how it is broken up, we would arrive at different answers. Let's consider:
31250/(5/5 × 2)
Apply BODMAS
= 31250/[5/(5 × 2)]
= 31250/(5/10)
= 31250/(1/2)
Multiply by the inverse of 1/2 = 2/1
= 31250 × (2/1)
= 62500
You need to create a field that provides the value "over" or "under" for sales, depending on whether the amount is greater than or equal to 15,000. Which type of function can you write to create this data?
Since You need to create a field that provides the value "over" or "under" for sales, depending on whether the amount is greater than or equal to 15,000. the type of function that one can use to create this data is conditional function.
What is the type of function?This function takes a businesses amount as input and checks either it is degree or effective 15,000. If it is, the function returns the strand "over". If it is not, the function returns the string "under".
You can use this function to build a new field in a dataset by asking it for each row of the sales pillar. The harvest of the function each row will be the profit of the new field for that row.
Learn more about function from
https://brainly.com/question/11624077
#SPJ1
in order to avoid keyerror exceptions, you can check whether a key is in the dictionary using the operator.
You can use the in operator to determine whether a key is present in the dictionary and so prevent KeyError exceptions.
Which of the following operators checks to see if a dictionary has a key?Using the in operator is the simplest approach to determine whether a key is present in a dictionary. It is a unique operator that is used to assess a value's membership. Most developers intend to use and favor this strategy.
Which approach would you take to get a list of tuples representing every element in a dictionary?Get Things. Each item in a dictionary will be returned by the items() method as tuples in a list.
To know more about operator visit:-
https://brainly.com/question/29949119
#SPJ4
Question:
In order to avoid KeyError exceptions, you can check whether a key is in the dictionary using the _____ operator.
included
of
in
not in
Which of the following best explains why algorithms are written in the design phase?
A. Algorithms must be tested before they are deployed.
В. It is best for the overall budget If algorithms are written early in the SDLC.
C. The team that writes algorithms usually needs to move on to other projects, so they write algorithms early in the SDLC process.
D. Algorithms need to be written in the design phase so they can be translated into code in the development phase.
Answer:
D. Algorithms need to be written in the design phase so they can be translated into code in the development phase.
Explanation:
based on your review of physical security, you have recommended several improvements. your plan includes smart card readers, ip cameras, signs, and access logs. implement your physical security plan by dragging the correct items from the shelf into the various locations in the building. as you drag the items from the shelf, the possible drop locations are highlighted. in this lab, your task is to: install the smart card key readers in the appropriate locations to control access to key infrastructure. install the ip security cameras in the appropriate locations to record which employees access the key infrastructure. install a restricted access sign in the appropriate location to control access to the key infrastructure. add the visitor log to a location appropriate for logging visitor access.
Deploy smart card readers at all access points to critical infrastructure locations, including server rooms, data centres, and any other locations that house sensitive data or essential equipment.
What three crucial elements make up physical security?Access control, surveillance, and testing make up the three key parts of the physical security system. The degree to which each of these elements is implemented, enhanced, and maintained can frequently be used to measure the effectiveness of a physical security programme for an organisation.
What essentials fall under the category of physical security?Three crucial aspects of physical security are testing, access control, and surveillance. In order for physical security to successfully secure a structure, each element depends on the others.
To know more about access points visit:-
https://brainly.com/question/29743500
#SPJ1
If a user loses their smart phone, which of the following would allow protection of the data that was on the device?A) FIPS 140-2 encryption software B) Corporate anti-malware application C) Data synchronization application E) Client-side scanning tools
Protection of the data on the device provided by FIPS 140-2 encryption software.
On a lost mobile device, what would be the best strategy to guarantee data confidentiality?Encrypt your device to prevent unauthorized access to your data. Decryption is the process of turning unreadable data into readable data. This is significant to prevent theft and unauthorized access. To encrypt your device, all you have to do is find this feature on your mobile device and input a password.
What is the most effective safeguard against data loss?Backing up your files to your hard drive is your best line of defense against data loss. To stop unauthorized data transfers, firewalls inspect data before it is sent between a computer and outside recipients.
To know more about encryption visit:-
https://brainly.com/question/17017885
#SPJ4
Sam and you work together in an IT firm. One day you overhear Sam bragging how he investigated a complex network issue at a client site and solved it to the client's satisfaction. You later come to know he was chatting with a friend who works in another IT company but smaller than yours. He also at times visits a few clients of his friend, and offers them professional services. Which professional work standards Sam may have violated?
Answer:
Based on the scenario you have described, Sam may have violated several professional work standards, including:
1. Confidentiality: By discussing the details of a client's network issue with someone outside the company, Sam may have breached the client's trust and violated the confidentiality of their information.
2. Conflict of Interest: Sam's work for his friend's clients could create a conflict of interest with his job at your company. He may be in a situation where he could potentially prioritize his friend's clients over his own, which is unethical.
3. Professional Competence: If Sam is providing professional services to clients outside of his area of expertise, he may be violating the professional competence standard. It is important for IT professionals to only provide services within their area of expertise.
4. Professional Conduct: Sam's bragging about his work to someone outside of the company may also be seen as unprofessional conduct. It may reflect poorly on the company and damage its reputation.
Overall, Sam's actions could potentially harm the company's reputation, violate ethical standards, and jeopardize client relationships. It is important for IT professionals to uphold high ethical standards in their work.
Hope this helps!
help me choose framework in programming
32. The broadcast address is a special address in which the host bits in the network address are all set to 1, and it can also be used as a host address.
A.True
B.False
Some host addresses are reserved for special uses. On all networks, host numbers 0 and 255 are reserved. An IP address with all host bits set to 1 is False.
How can I find a network's broadcast address?Any device connected to a multiple-access communications network can receive data from a broadcast address. Any host with a network connection could receive a message delivered to a broadcast address.All hosts on the local subnet are reached by using this address to send data. The Routing Information Protocol (RIP), among other protocols that must communicate data before they are aware of the local subnet mask, uses the broadcast address.The use of some host addresses is reserved. Host numbers 0 and 255 are set aside for use only on reserved networks. When all host bits are set to 1, an IP address is considered false.To learn more about Broadcast address refer to:
https://brainly.com/question/28901647
#SPJ1
irving is running cable underground beside his driveway to power a light at his entrance .what type of cable is he most likely using?
A.MC
B.NNC
C.UFD
D.UF
Based on the given information, Irving is running cable underground beside his driveway to power a light at his entrance. The most likely type of cable he would use in this scenario is "D. UF" cable.
Why is the cable Irving is using a UF cable and its importanceUF stands for "Underground Feeder" cable, which is specifically designed for underground installations.
It is commonly used for outdoor applications, such as running power to lights, pumps, or other outdoor fixtures. UF cable is moisture-resistant and has insulation suitable for direct burial without the need for additional conduit or piping.
Read more about cables here:
https://brainly.com/question/13151594
#SPJ1
write a code for a program in which the parent had to ask from user that how many child user wants to create and then it should fork that many Childs?
Answer:
//same program different code
#include<stdio.h>
#include<unistd.h>
#include<stdlib.h>
int main()
{
int pid;
pid=fork();
if(pid<0)
{
printf("\n Error ");
exit(1);
}
else if(pid==0)
{
printf("\n Hello I am the child process ");
printf("\n My pid is %d ",getpid());
exit(0);
}
else
{
printf("\n Hello I am the parent process ");
printf("\n My actual pid is %d \n ",getpid());
exit(1);
}
}
Explanation:
Following are the program to the given question:
Program Explanation:
Include header file.Defining the main method.Defining an integer variable "n, i", after defining this use "n" to the input value.In the next step, a loop is declared that uses if block that checks fork value equal to 0, in which it calls the sleep method and prints its value.At the last, it calls the wait method.Program:
#include<stdio.h>//header file
#include<sys/types.h>
#include<sys/wait.h>
#include<unistd.h>
int main()//defining the main method
{
int n,i;//defining an integer variable
printf("Enter the number of child to be created:"); //print message
scanf("%d", &n);//input value in n
for(i=0;i<n;i++) // defining a loop that use if block with the frok method to print value
{
if(fork() == 0)//use if that check fork method value equal to 0
{
sleep(3);//calling sleep method
printf("[child] pid %d from [parent] pid %d\n",getpid(),getppid());//print message
}
}
wait(NULL);//calling wait method
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/17925458
you are working as a network engineer at krofter securities. the organization uses cisco's linux os in all of its workstations. the network administrator has asked you to use the route utility to delete some static routes used by the router. which of the following commands will you use in this scenario?
1. route
2. route print
3. show ip route
4. show running-config
The command to use is route. You have been instructed by the network administrator to delete some static routes from the router using the route utility. in the course of a network engineer job.
A network is described as a collection of two or more connected computer systems. Computer networks come in a wide variety of forms, including the following: LANs, or local area networks: Geographically speaking, the computers are close by (that is, in the same building). These might include databases, unique group initiatives, etc. A network-connected equipment, like a printer or scanner, can be shared by a number of users. A piece of software can be set up on the server rather than having to be bought and installed on every computer. The programmed can then be accessed by all users.
Learn more about router here
https://brainly.com/question/29869351
#SPJ4
Reality Media Services (RMS) provides Web design and social media services for Red Clay Renovations to promote its services. RMS employees work primarily out of their own home offices using company provided equipment. Red Clay leaders are concerned about threats to online privacy coming from unauthorized access to the company's website. RMS is tasked with providing a privacy notice on the company's website. After reviewing notice options with Red Clay's corporate council, suggested providing a summary of privacy practices at the bottom of the website, and providing a link to a more detailed explanation. What is this type of notification called?
Question options:
Full Notice
Security Notice
Layered Notice
Short Notice
Privacy Notice is this type of notification called.
What is the Privacy Notice ?A Privacy Notice is a document that informs individuals of an organization’s practices concerning collecting, using, and disclosing personal information. It outlines the types of personal information that are collected, the purposes for which it is used, how it is shared, and the individual’s rights with respect to their data. Privacy Notices help to ensure that individuals understand how their data is being used and how to exercise their rights. They also help organizations to comply with data protection laws and standards.
To learn more about Privacy Notice
https://brainly.com/question/15181652
#SPJ1
When you set the position property for a block element to fixed, the element
Answer:
-is positioned relative to the browser window
Hope this helps!
Answer: When you set the position property for a block element to fixed, the element remains in an exact position on the screen even if the page is scrolled down.
( _____)once demonstrated that a rigid wing on an aircraft would break more often than a flexible wing. Will give BRAINLIEST.
Answer:
the Wright brothers
Explanation:
Wing warping was an early system for lateral (roll) control of a fixed-wing aircraft. The technique, used and patented by the Wright brothers, consisted of a system of pulleys and cables to twist the trailing edges of the wings in opposite directions.
Answer:
the Wright Brothers
Explanation:
I know
5. Which one of the following best defines a network server?
O A A type of network system that provides resources to network clients
B A type of system where all devices on the network are clients
C A type of network with one server and multiple clients
O D A type of device that connects all all other network devices together
Answer:
i thank it is B for the answer
At which stage should Joan discuss the look and feel of her website with her website designer?
At the
stage, Joan should discuss the look and feel of her website with her website designer.
Answer:
Development stage: It is great to talk with the website designer during the development stages to understand the goalsAnswer:
At the planning stage maybe?
Explanation:
I'm not positive but in plato it discusses this in the Website Development Proccess lesson.
You are a systems analyst. Many a time have you heard friends and colleagues complaining that their jobs and businesses are being negatively impacted by e-commerce. As a systems analyst, you decide to research whether this is true or not. Examine the impact of e-commerce on trade and employment/unemployment, and present your findings as a research essay.
E-commerce, the online buying and selling of goods and services, has significantly impacted trade, employment, and unemployment. This research essay provides a comprehensive analysis of its effects.
What happens with e-commerceContrary to popular belief, e-commerce has led to the growth and expansion of trade by breaking down geographical barriers and providing access to global markets for businesses, particularly SMEs. It has also created job opportunities in areas such as operations, logistics, customer service, web development, and digital marketing.
While certain sectors have experienced disruption, traditional businesses can adapt and benefit from e-commerce by adopting omni-channel strategies. The retail industry, in particular, has undergone significant transformation. E-commerce has empowered small businesses, allowing them to compete with larger enterprises and fostered entrepreneurial growth and innovation. However, there have been job displacements in some areas, necessitating individuals to transition and acquire new skills.
Read mroe on e-commerce here https://brainly.com/question/29115983
#SPJ1