List four types of systems that may require software safety cases, such as
Bank SystemsHospital / Laboratory SystemsGovernment SystemsFlight Control SystemsSoftware engineers should hold some sort of professional certification or license if they will be involved in the specification and development of safety-related systems. People who are experts and have knowledge in this development are required to work on the definition and development of a safety-related system since they are responsible for the users of the system's safety. Experts or specialists are also required to guarantee the system's effectiveness and safety.
Learn more about Software
https://brainly.com/question/28224061
#SPJ4
Any help would be greatly Appreciated! :)
I think the answer is A or E.
Explain the role of ANY TWO components of the CPU
Answer:
An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations.
The control unit of the central processing unit regulates and integrates the operations of the compute
Choose one scene or object to photograph. Take and submit at least three photographs of this scene at three different times of day. Be sure to note the times of day that you choose. Write a brief response about how the light changed in the photograph.
Take and submit photographs of someone using frontlighting, backlighting, and sidelighting. You can use the sun or other lighting.
Practice taking photographs on a cloudy or rainy day. Turn in three of your favorites from that practice.
Take some portrait photographs using a reflector. (Remember that white paper, poster board, sheets, or a wall can all act a reflector.) Practice moving the subject in different positions relative to the reflector. Turn in three of your favorite photographs.
Practice taking photographs in different lighting conditions (indoors and outdoors, different times of day, different weather, and so on) to help you better understand the impact of light on your photographs. Turn in three of your favorite photographs from your practice sessions.
Answer:
i dont get what you mean
Explanation:
Which features allows the user to insert individual names in a primary document?
Features allows the stoner to fit individual names in a primary document is to insertion, omission, copying, pasting and for formatting the document is font type, bolding, italicizing or underscoring.
What's MS Word?
Microsoft Word is a word processor that may be used to produce papers, letters, reports, and other types of jotting of a professional quality. It includes sophisticated capabilities that give you the stylish formatting and editing options for your lines and systems.
Both the Windows and Apple operating systems support Microsoft. Microsoft Word is a element of the Microsoft Office productivity suite, though it can also be used singly. Since its original 1983 release, Microsoft Word has experienced multitudinous variations. Both Windows and Mac computers can use it.
Microsoft Word can be used for a variety of tasks :
Creating business papers with a variety of images, similar as prints, maps, and plates. Saving and reusing-formatted textbook and rudiments like cover runners and sidebars. Making letters and letterheads for both particular and professional use. Creating a variety of documents, including resumes and assignation cards. Producing a variety of letters, ranging from simple office memos to legal clones and reference documents.
Learn further about MS Word click then :
brainly.com/question/25813601
#SPJ1
write a matlab program in a script file that finds a positive integer n such that the sum of all the integers 1 2 3 n is a number between 100 and 1,000 whose three digits are identical. as output, the program displays the integer n and the corresponding sum.
Answer:
%% Positive Integer between 100 and 1,000 with Identical Digits
% Initialize variables
n = 0;
sum = 0;
% Loop until an integer is found that meets the requirements
while sum < 100 || sum > 1000 || length(unique(num2str(sum))) ~= 1
n = n + 1;
sum = sum + n;
end
% Print the integer and corresponding sum
fprintf('The integer is %d and the sum is %d.\n', n, sum);
You are writing a paper and find some information you want to use in a journal article: Original text: Among students with incorrect answers at pre- and posttest, the largest percentage had trouble recognizing an example of patchwork plagiarism. Apparently, many did not understand that cutting and pasting is plagiarism. Source: Fenster, Judy. "Teaching Note—Evaluation of an Avoiding Plagiarism Workshop for Social Work Students." Journal of Social Work Education, vol. 52, no. 2, Apr-Jun 2016, pp. 242-248. Academic Search Complete, doi:10.1080/10437797.2016.1151278 Entry in your paper: Among students with incorrect answers, most couldn't recognize patchwork plagiarism and did not understand that cutting and pasting is plagiarism. What is your judgment- is this plagiarism?
Answer:
The answer is "True".
Explanation:
The term Plagiarism is a word, that implies as a form of cheating, which includes the usage, of all or part, of its thoughts, words, designs, arts, the music of anyone else without any of the author's recognition or permission.
In the question, it is already defined that students copy and paste the data, which is lying in the criteria of plagiarism, that's why the given statement is "true".
Choose the best answer to complete the sentence.
A transferable skill can be applied:
in a variety of situations and roles.
in only one setting or situation.
in every situation.
Answer:
First is A
Explanation:
Second is B,C,F
xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. what type of access control model is this approach using?
Since Xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. The type of access control model in this approach using option D: DAC: Discretionary Access Control.
What does "discretionary access control" mean?The Trusted Computer System Evaluation Criteria is one that define discretionary access control as a sort of access control used in computer security to limit access to objects depending on the identity of subjects and or seen as groups to which they belong.
Therefore, in the above context, the concept of limiting access to things based on the identity of the subject is known as discretionary access control (the user or the group to which the user belongs). Access control lists are used to implement discretionary access control.
Learn more about Discretionary Access Control from
https://brainly.com/question/15152756
#SPJ1
See full question below
Xavier is developing a file system in which users will have the ability to grant editing permissions to their colleagues. What type of access control model is this approach using?
A. MAC, B. RBAC, C. ABAC, D. DAC
on examining the source code you find a hidden routine that allows access to any account using the password wrtsglz, regardless of the normal password associated with that account. what kind of vulnerability have you uncovered?
A backdoor is when a hacker tries a number of different user credentials in an effort to guess the right ones.
Which phrase describes an attack that happens before the security industry learns about and patched a security flaw?A threat known as a zero-day attack aims to take advantage of a software application vulnerability before the vendor of the application learns of it and before the vulnerability is widely publicized by the internet security community.
How do you describe a program that was created to exploit a security flaw?A piece of code that exploits a software weakness or security fault is called an exploit. It is created either by malicious actors for use in their operations or by security researchers as a proof-of-concept threat.
to know more about hackers here:
brainly.com/question/29215738
#SPJ4
What is the result when you run the following program? print(2 + 7) print("3 + 1") Responses 9 4 9 4 9 3 + 1 9 3 + 1 2 + 7 4 2 + 7 4 an error statement
The word "program" can be used as a verb. To establish, control, or alter something in order to get a certain outcome.
Thus, Both Americans and Britons prefer the spelling "program" when discussing developing code. By the age of 18, youth not enrolled in the Chicago CPC program had a 70% higher chance of being detained for a violent offense.
And by the age of 24, program participants were 20% less likely to have spent time in a jail or prison. A robot in the shape of a caterpillar called Code-A-Pillar is one of the devices. Its interchangeable parts each add a different movement command to the device as a whole, allowing the young scholars to program the robot's behavior as they figure out a pattern to get it from point A to point B.
Thus, The word "program" can be used as a verb. To establish, control, or alter something in order to get a certain outcome.
Learn more about Program, refer to the link:
https://brainly.com/question/30613605
#SPJ1
The short-range two-way communication technology behind contactless payments is called ____.
Hi there,
I hope you and your family are staying safe and healthy!
The answer is: Near Field Communication (NFC).
The short-range two-way communication technology behind contactless payments is called the Near Field Communication (NFC).
Happy to help!
~Garebear
What do devices provide? A.data to be processed B. Software code C.text and images only D.results of processing.
A is the correct answer!
briefly explain about five kinds of network topology
Answer:
The mapping of the LAN (local area network) is design called as Topology.
Explanation:
The network topology is to perform a arrangement of the network to the connect sender and receiver in the network connection, there is a five type of topology is there are:- (1) tree topology (2) star topology (3) ring topology (4) bus topology (5) mesh topology.
(1) Tree topology is the nodes are connecting to the hierarchical form it is called by the hierarchical topology its used in the wide area network, and they are manage and maintain the easily, they work in the group.(2) star topology is to the connected to the all computers in a single hub cable through, it is dedicated to the hub connection, star topology is the setup and modify to the network and nodes and low network, is to expensive to use.(3) Ring topology is tho perform it computer to connect by the another computer for each device, ring topology is the use large number and to star topology is to install and expand, troubleshooting is the difficult in the ring topology.(4) Bus topology is the contain computer network device is connected to the single cable, and this only one direction system, bus topology is used in small networks and bus topology is the cost effective, and the bus topology is the limited length cable.(5) Mesh topology is to perform point to point connection to computer devices, and to transmits data to two ways (1) routing (2) flooding.Mesh routing is network requirement and has information of the broken links.Mesh flooding is transmitted to the all computer network and leads to load over network.differences between placeholders and textbook in PowerPoint
Answer:
fifthly, if it is an empty box. it disappear completely. sixth the size of a text box changes depending on the length of a text that we type . this is in contrast with a place holder box where changes are made of the font of the text
Explanation:
mark me a brainlist
a nested if statement only executes if the if statement in which it is nested evaluates to true.
true/false
True. A conditional statement that is nested inside another if statement is referred to as a nested if statement. As the nested if statement will only be executed if the outer if statement evaluates to true, this enables more complex decision-making in the code.
In other words, the outer if statement's condition is what determines whether the nested if statement applies. No matter if the nested if statement's own condition is true or false, it will not be performed if the outer if statement's condition is false. Given that the nested if statement will only be run if it is genuinely essential, this can aid in code optimization and reduce the need for pointless computations. It's critical to check that the logic of the nested if statement is sound because any flaws could cause the programme to behave unexpectedly.
learn more about Nested here:
brainly.com/question/13971698
#SPJ4
What skills and practices help
when we code web pages?
Answer:
You should also ideally have an aptitude for - or experience of - elements such as:
User experience (UX)
User interface (UI)
Visual design.
Coding languages including HTML and CSS.
Frontend web programing languages and skills such as JavaScript, Ajax and web animation techniques.
Explanation:
have u good day
17. Describe bandwidth and give an example. (5pts)
Answer:
a range of frequencies within a given band, in particular that used for transmitting a signal.
Explanation:
you only have a serton amount of bandwidth on your phone
What is the different between a regression problem and a classification problem? Is face detection problem a regression or classification problem?
Regression problem and a classification problem are two different types of machine learning problems. The difference between them is that regression problems involve predicting continuous values while classification problems involve predicting categorical values.
Regression problems involve finding a relationship between input variables and a continuous output variable. The goal of regression is to make a prediction about the output value based on the input variables. Examples of regression problems include predicting the price of a house based on its location, size, and other features, and predicting the temperature based on time and weather conditions.
Classification problems, on the other hand, involve assigning input variables to a discrete category. The goal of classification is to predict the category to which a given input belongs. Examples of classification problems include predicting whether an email is spam or not based on its content, and predicting whether a tumor is malignant or benign based on medical data.
Face detection problem is a classification problem because it involves predicting whether a given input (an image) contains a face or not. The output is binary: the image either contains a face or it does not. Therefore, face detection is a classification problem.
In summary, the main difference between a regression problem and a classification problem is that the former involves predicting continuous values while the latter involves predicting categorical values.
To know more about features visit:
brainly.com/question/31563236
#SPJ11
Compound conditions require a computer to sense whether multiple conditions are true or false.
True
False
Answer:
False
Explanation:
You can have multiple conditions in your while and for loops as well as your if statements.
A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system
Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
Explanation:
A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.
when backing up an ios device to a cloud service the first recommended step is to
Answer:
make sure that your device is connected to wifi
Explanation:
I think that's the answer because cloud service needs wifi (duh). Hope this helps!
Answer:
The first recommended step is to connect to an internet connect, and not your mobile WiFi as it can take a lot of GB.
PLZ HELP ASAP
Jaelyn is working late at night on a project that is due the next day. She is not sure how to add a picture to her document, and it is too late to call or text her teacher or friends. What is the best option for Jaelyn?
1-Decide not to use a border.
2-Provide negative feedback to Office Online.
3-Type a question in the “Tell me what you want to do” box.
4-View accessibility options.
Answer:
its accessibility options
Explanation:
because on office that's were you go to view what you can do
Answer:
its accessibility
Explanation:
I took the test
When an application has multiple uses what is it known as?.
Answer:
an application that had multiple uses is called full featured
is an impact printer makes contact with the paper.
Answer:
Yes
Explanation:
because the name impact
Which branch of study can help Jessica study the concept of light
Answer:
Physics, Quantum Mechanics
Explanation:
Light is a stream of photons with no weight. If you want to dig deeper in this mysterious phenomena, you should study physics and quantum mechanics. Physics takes up things like the theory of relativity, which can be useful in studying spacetime and how light travels through it, and quantum mechanics, being the study of matter in an atomic level, should help you get an understanding on how photons of light travel and why they behave so strangely.
Answer:
Physics
Explanation:
the _________ is a global system of linked, hypertext documents.
A global system of connected, hypertext documents makes up the World Wide Web.
The World Wide Web: What is it?The World Wide Web, commonly referred to as the web, WWW, or W3, is a collective term for all publicly accessible websites and other online content that people can access on their personal computers and other internet-connected devices. Users can click on the hyperlinks that connect these pages and publications to get more information.
Why is it used the World Wide Web?Not just scientists now have access to the internet thanks to the world wide web. People could now obtain knowledge, exchange it, and communicate with one another much more easily thanks to how the world was connected. Since then, it has made it possible for people to use social networking sites, video sharing, and other platforms to share their ideas and labor.
To know more about World Wide Web visit:-
https://brainly.com/question/28318870
#SPJ4
Which of the following is NOT an example of application software
Answer:
Option B is the answer.
Windows operating system is not an example of application software. Thus, the correct option for this question is B.
What is an Operating system?An Operating system may be defined as a type of system software that significantly regulates computer hardware along with software resources.
It also delivers some common services for processing computer programs. The operating system controls the input instructed by the user to the computer with respect to the output delivered by the computer to the user.
Options like photoshop image editing programs, internet explorer web browsers, and Microsoft Powerpoint presentation software are all examples of application software while Windows operating system is an example of system software.
Therefore, among the options given, the windows operating system is not an example of application software. Thus, the correct option for this question is B.
To learn more about Types of software, refer to the link:
https://brainly.com/question/18661385
#SPJ2
PLEASE HELP ASAP
Which selection from the article BEST supports the conclusion that the practice of looking at applicants' social media use is growing?
Question 2 options:
Six hundred percent more employers use social media to screen than they did in 2006.
Seventy percent of employers use social networking sites to research job candidates.
This survey found that 35 percent checked applicants' social media profiles. Many who do say social media has influences their admission decision.
The CareerBuilder survey found 44 percent of employers who screened candidates using social networks found positive information
The selection from the article that best supports the conclusion that the practice of looking at applicants' social media use is growing is that Seventy percent of employers use social networking sites to research job candidates."
This statement strongly supports the conclusion that the practice of looking at applicants' social media use is growing because it states that a large percentage of employers are currently using social media to research job candidates.
It suggests that a large portion of employers are utilizing social media as a tool for researching job candidates, which implies that the practice is becoming increasingly common.
Learn more about social networks here: https://brainly.com/question/23976852
#SPJ4
There are many options for using Python in the cloud. What should you check if you experience errors with standard syntax? Select an answer: the compression method the version of the Python kernel being used the fonts and color schemes for the editor the version of the exercise files
If you encounter errors with standard syntax while using Python in the cloud, it is recommended to check the version of the Python kernel being used as it could be incompatible with the version of the programming language you're using.
If you experience errors with standard syntax while using Python in the cloud, you should check the version of the Python kernel being used.
Python is a popular high-level programming language for general-purpose programming. It's utilized in web development, data analysis, artificial intelligence, scientific computing, and other fields. Python is open-source software, which means it's free to use and distribute.
Cloud computing is a model for delivering services on-demand over the internet, like servers, storage, databases, networking, software, analytics, and intelligence, rather than using your local server or computer. The pay-as-you-go service is accessible from any location with an internet connection.
There are various options for using Python in the cloud. Let's have a look at some of the most common ones:
Web Services: It's a collection of remote computing services provided. It provides cloud computing services that can help you get your project up and running quickly.Azure: It's a cloud computing service created by that is frequently used for building, testing, deploying, and managing applications and services through a network of managed data centers.Cloud Platform: It's a collection of cloud computing services provided. It provides cloud computing services that can help you get your project up and running quickly.OpenShift: OpenShift is a container application platform for deploying and managing cloud-native applications that allows you to deploy and scale your Python applications in the cloud.If you experience errors with standard syntax while using Python in the cloud, you should check the version of the Python kernel being used. This may occur if the kernel version used is incompatible with the version of the programming language you're using.
Learn more about standard syntax: brainly.com/question/20935990
#SPJ11
Which of the following policies should be adopted to help reduce increasing congestion caused by devices attempting to resend lost packets too quickly or too often?
Retransmission policy
Window policy
Discarding policy
Admission policy
The retransmission policy should be adopted to help reduce the increasing congestion caused by devices attempting to resend lost packets too quickly or too often.
A retransmission policy is a technique that requires the sending of packets until an acknowledgment is received from the receiver. When a packet is sent, it is kept in the queue until an acknowledgment is obtained. If no acknowledgment is obtained, the packet is considered lost and is retransmitted.
This cycle of sending and resending packets causes congestion in the network. As a result, the retransmission policy should be implemented to reduce congestion caused by devices that attempt to resend lost packets too frequently or too quickly.
The issue of too many packets present in the network at the same time, slowing data transmission and affecting the quality of service, is known as congestion. Congestion causes packet loss, slows data transmission, and lowers service quality, which affects the user experience. The following are some common sources of network congestion:
Too much traffic in the network.Failure to keep up with traffic spikes.Network devices' processing power is limited.Poor network design.Packet loss occurs when one or more packets of data traveling through a network do not reach their intended destination. It may be caused by network congestion, poor network design, hardware failure, or packet corruption. When packet loss occurs, the data contained in the packet must be resent, resulting in increased network traffic, delays, and poor service quality.
You can learn more about retransmission at: brainly.com/question/28274178
#SPJ11