Answer:
time.sleep(5)
Explanation:
The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as
Answer:
Security code review.
Explanation:
The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as security code review.
The main purpose of security code review is to ensure that all the necessary security measures or procedures are adopted (available), to confirm the level of accuracy of its operations, and verify that all loopholes for unauthorized access or use by attackers is prevented.
Hence, various software developers employ the security code review process in order to ensure that the integrity and safety of their software applications or programs are present.
Code review is the process for auditing the source codes and is a an application that is used for verification of the proper security control that are present and that they are intended to use.
The code review is to assure the quality of the software and verity the activity that checks the program mainly for viewing the parts of code.Learn more about the source code for an application to verify that the
brainly.com/question/24749514.
Queries in Access are utilized by users to enter data into tables and view existing records true false
Answer:
False.
Explanation:
Microsoft Access can be defined as a software application or program designed by Microsoft corporation to avail end users the ability to create, manage and control their database.
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Database schema is the logical design of a database. In database management, the term "schema" is used to denote a representation of data while the term "instance" is used to denote an instance of time.
A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.
Datasheet View in Access are utilized by users to enter data into tables and view existing records.
This Command to insert copied text anywhere in your document
Cut
Copy
Format painter
Paste
Answer:
Paste
Explanation:
Answer:
Please give me brainliest. The answer is paste
Explanation:
2.Explain the differences between kernel applications of the OS and the applications installed by an organization or user.
Explanation:
Operating system is a system software, whereas, Kernel is a part of operating system. Operating system acts as an interface between user and hardware. Kernel acts as an interface between applications and hardware. In Linux, for example, device drivers are often part of a kernel (specifically Loadable Kernel Modules).
Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address
Answer:
Network Address Translation (NAT).
Explanation:
An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.
Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6).
Network Address Translation (NAT) is a technology that provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address.
This ultimately implies that, Network Address Translation (NAT) is a technology used by network engineers to translate IP addresses into a single IP address on a local area network.
Explain the development, design and implementation aspects of algorithms in the development of software.
Explanation:
Phases of software development are ;
1. Requirements analysis
2.Domain analysis
3.Client-oriented design
4.Implementation-oriented design
5.Implementation
6.Integration
7.Packaging.
Ongoing Activities in Software Development
1. Risk analysis
2. Planning
3.Verification
4.Documentation
When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated
Answer:
NO
Explanation:
No, it's not, when a virus blocks a file stored in a sandbox, it does not affect the system. However, the virus program does not necessarily recognize other parts of the program. It still takes analysis to determine what. Also, the virus vault must be emptied to delete the original filesWrite a c program using loops to generate following output.
12 x 2 = 24
11 x 2 = 22
10 x 2 = 20
9 x 2 = 18
8 x 2 = 16
7 x 2 = 14
6 x 2 = 12
5 x 2 = 10
4 x 2 = 8
3 x 2 = 6
2 x 2 = 4
1 x 2 = 2
Answer:
#include <stdio.h>
int main()
{
for (int n = 12; n > 0; n--) {
printf("%d x 2 = %d\n", n, n * 2);
}
}
Explanation:
Only one loop.
products in which titanium is used
Answer:
It is used in jewelry, tennis rackets, scissors, bicycle frames, surgical tools, mobile phones and some other high-performance products.
Explanation:
Titanium is a familiar metal. Titanium is as strong as steel but weights about half as much.
i'll give brainliest to whoever says Tom Clancy's: The Division 2 is a garbage game.
50 POINTS!!!!! WILL MARK BRAINLIEST!!!!!HURRY!!!!!
Your Python program has this code.
for n = 1 to 10:
position = position + 10 # Move the position 10 steps.
direction = direction + 90 # Change the direction by 90 degrees.
You decided to write your program in a block programming language.
What type of block do you need to accomplish what this line does?
direction = direction + 90 # Change the direction by 90 degrees.
A) event
B) voice and graphics
C) control
D) motion
Answer:
control
Explanation:
Repeat 10 times is a control block.
The type of block that would be needed to accomplish the line would be C. Control
What is Programming?This refers to the set of code that is given to the computer by a programmer to execute a task.
Hence, we can see that from the line of code that shows a sequence of numbers from 1 to 10 and to move and change the direction of the position and degree, to write this program in a block programming language, the type of block that is needed is a control block.
Read more about block programming here:
https://brainly.com/question/14525641
#SPJ2
Think of a simple software project that requires your design skills. Specify the requirements needed on each design process
Answer:In this guide, we'll go over the basics of your software development ... I know which option I'd choose. ... Will you need to integrate with other tools or APIs? ... With the requirements in place, it's time to start designing what this ... In its most basic form, you can think of the Waterfall method as following each ...
Explanation:
These comprise fundamental elements such as the functions, features, and requirements, which are chosen after analysing user demands. Hardware and software specifications, maintainability, availability, and testability are a few design criteria.
What requirements needed on each design process?Design specifications specify the conditions that a new good or service must fulfil to be deemed successful. In order for your team to design, create, and assess your solution, it is crucial to identify these requirements in the beginning.
Therefore, Criteria are the requirements that the design must meet in order to succeed. The design is limited by constraints. These could include the materials on hand, the cost of the supplies, the time allotted for developing the solution, etc.
Learn more about design process here:
https://brainly.com/question/28221020
#SPJ2
Which of the following are all involved in the evaluation of the presentation of a speech?
Vocal technique, organization, body language
Body language, organization, visual aids
Visual aids vocal technique, body language
Organization, body language, visual aids
Answer:
C.
Explanation:
The elements involved in the evaluation of the presentation of a speech includes visual aids, vocal technique, and body language.
Adding vivid pictures in the presentation makes it graphic and proficient. The visual aids in presentation also provides the succinct and clear meaning of the message to the reader.
The vocal technique is another element that adds value in presentation. A speaker's confidence is reflected through his/her tone. It is the speaker's voice that becomes an influential tool that draws the audience's attention.
Body language, like vocal technique, helps in effective delivering of the speech. Body language is a non-verbal form of communicatin that communicates a lot to the audience than one can imagine.
Therefore, option C is correct.
Visual aids, voice technique, and body language are all factors considered when assessing how well a speech is presented.Thus, option C is correct.
What evaluation of the presentation of a speech?Making use of colorful images in the presentation gives it a visual and professional feel. The reader can easily understand the material thanks to the presentation's visual aids.
Another aspect of presenting that adds value is voice technique. The tone of a speaker conveys his or her level of assurance. The voice of the speaker becomes a powerful tool for grabbing the audience's attention.
Similar to vocal technique, body language aids in effective speech delivery. Body language is a non-verbal type of communication that tells your audience more than you might think.
Therefore, Visual aids vocal technique, body language all involved in the evaluation of the presentation of a speech.
Learn more about speech here:
https://brainly.com/question/12453277
#SPJ3
What item appears in a user’s My Unresolved items after synchronization using Salesforce for Outlook? (2 answers)
The avialble options are:
1. Notes not associated to a record
2. Emails not associated to a record
3. Contacts not assigned to an account
4. Cases not assigned to a contact
Answer:
1. Contacts not assigned to an account
2. Emails not associated to a record
Explanation:
Given that any items that are not automatically assigned to Salesforce records are found in My Unresolved Items.
Hence, usually, Items such as Contacts, Events, Emails, and Tasks are found in a user's My Unresolved Items after synchronization using Salesforce for Outlook.
Thereby, in this case, the correct answers are:
1. Contacts not assigned to an account
2. Emails not associated with a record
What is the current DoD repository for sharing security authorization packages and risk assessment data with Authorizing officials?
Answer:
The answer is "Army Portfolio Management System".
Explanation:
The Army Way to solve Information-Technology (APMS-AITR) portfolio management registration for IT investment, IT capacity, and IT software was its single legal army registry.
Its main goal of IM/IT Management Of working capital and Corporate Finance is to prioritize IM/IT expenditure by evaluating and handling TRADOC as just an investment portfolio. The APMS was its main decision supporting instrument for military portfolio management.
How long does it take to send a 19 MiB file from Host A to Host B over a circuit-switched network, assuming:
Answer:
58.4 ms
Explanation:
How long does it take to send a 14 MiB file from Host A to Host B over a circuit-switched network, assuming:
Total link transmission rate = 31.1 Gbps.
Network is TDM, with 11 permitted users, each with an equal time slot size.
A link connection requires a setup time of 51.7 ms.
Solution:
For TDM transmission, the bandwidth is divided equally between the users for transmission.
Transmission rate of each user = 31.1 Gbps / 11 users = 2.83 Gbps = 2830 Mbps
Time taken for file transmission = file size / transmission rate = 19 Mb / 2830 Mbps = 0.0067 seconds = 6.7 ms
Total time taken = Set up time + transmission time = 51.7 ms + 6.7 ms = 58.4 ms
The total transmission time is 58.4 ms
Which type of table is the most commonly used in Access databases?
A. one-to-one
B. one-to-many
C. many-to-many
D. many-to-all
The table of one-to-many is used most commonly for the purpose of getting access to a database.
What is a database?Any kind of data, record, or information, which is stored over a computer or network of computers with an intention to access such data as and when required is known as a database.
Hence, option B holds true regarding a database.
Learn more about database here:
https://brainly.com/question/6447559
#SPJ2
_______ workplace cultures emphasizes everyone being in agreement.
Answer:
Calm
Explanation:
Importance of computer in 150 words and essay
Answer: See explanation
Explanation:
A computer is simply referred to as an electronic device that can be used to store information and which can also make our work easier and faster.
The role of the computer in our daily lives nowadays cannot be understated as the computer is useful and used in every aspect of our lives. Computers are accurate, and makes our works easier.
Also, huge data's can be stores on the computer system. Computers are used in the education sector to tech students, in medical field as they aid treatments of patients etc.
The analogy of a computer system is often used to illustrate the different parts of memory. The keyboard is where we encode new information, the hard drive is where we store information, and the monitor is where we retrieve information. Now create your own analogy and explain why each part of the memory system corresponds with the analogy you have selected.
Answer:
Different memory parts is used to provide an analogy of the computer system. In keyboard, we give new new information, we store the information in a hard drive and we retrieve information from the monitor.
Explanation:
The Encoding: keyboard- encoding: we write something on a piece of a paper and then place it into a manila file folder.
Example: let a poem about Santa Claus
The Storage: Next CPU-Label of the folder and then put it into the file cabinets in the hanging file folder which is labeled with subject
Example: Label folder Santa Clause and put it into the present hanging file folder that is labeled "the Mythical winter figures"
The Retrieval: Now monitor-Open file cabinet, then flip to an appropriate hanging file, and then go to the specific file folder to get access to the paper.
Example: Flip to the "mythical winter figures" and then browse through the files until we locate the "Santa Claus," pull it out to read the poem. Then define and also give an example of the parallel processing.
Which of the data repositories serves as a pool of raw data and stores large amounts of structured, semi-structured, and unstructured data in their native formats
Answer:
Data lakes.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Data lakes can be defined as data repositories which serves as a pool of raw data and stores large amounts of structured, semi-structured, and unstructured data in their native formats. These pool of raw or natural data allow data scientists to perform various tasks such as artificial intelligence (AI), machine learning, visualization, reporting, advanced analytical study, etc.
A sandbox is known as a holding area for website or .
Answer:
blog
Explanation:
How many passes will it take to find the four in this list? 4, 5, 6, 7, 8, 9, 10 1 2 3 4
Answer:
10 passes
Explanation
just count the numbers in between the 2 4s :|
Answer:
3
Explanation:
got it right on edge
Someone please help?!
Drag the tiles to the correct boxes to complete the pairs.
Match the soft skills with their descriptions.
to foster approachability among team members
to come up with creative but practical solutions
to set priorities and accomplish goals
to identify and effectively use a team's potential
to accomplish goals
leadership
analytical thinking
coordination
2
time management
Answer:
i think the 1st one is for leadership
Answer:
im taking it right now
Explanation:
funny
why should technology be used. No plagiarism pls.
Answer:
Explanation:
mobile devices and the applications they help us in life devisec can individualize instruction. three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment. One reason why technology is good is that it has saved many lives.
Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().
Answer:
Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().
Explanation:
You will write a flowchart, and C code for a program that does the following:1. Within main(), it asks for the user’s annual income.2. Within main(), it calls a function called printIt() and passes the income value to printIt(). 3. The printIt() function evaluates the income, and if the number is over 90000, prints a congratulatory message. If the income is not over 90000, it prints a message of encouragement, like “You WILL make $50,000, if you keep going.”Here is what the output looks like.File SubmissionUpload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.
A medical record that contains computer-generated reports, collects data, and shares data with outside agencies is a
Answer:
Electronic Health Record
Explanation:
ELECTRONIC HEALTH RECORD is a medical record which helps to collect patients data pertaining the patients medical information and history such as the patient diagnosis, the treatment that was given to the patient and the medication given to the patient, by then sharing the collected and store medical data or information with external agencies in order to reduce any medical mistakes that may want to arise and to as well provide high quality health care service to the patient as regards to the patient already stored medical history on the ELECTRONIC HEALTH RECORD.
What certificate authority user role is tasked with the approval of requests for certificate enrollment and revocation
Answer:
Certificate manager.
Explanation:
Certification can be defined as a recognition given for completing a course of study or passing an examination. This is to certify that the individual is a professional in that course of study. Some examples are CCNA, Comptia A+, HSE I and II
Certificate manager is the certificate authority user role that is tasked with the approval of requests for certificate enrollment and revocation.
This ultimately implies that, the individual who is saddled with the responsibility of approving requests for certificate enrollment and revocation is a certificate manager.
Hence, a certificate can be revoked by a certificate manager if a person issued the certificate contravenes the set rules, requirements and standard binding on the certificate.
Write two lines of code to draw the following circles centered at 600,600. The radius of the smallest circle is 200. There are 50 points between the larger circle and the smaller circle.
Answer:
canvas.draw_circle((600, 600), 200, 3, "Black")
canvas.draw_circle((600, 600), 250, 3, "Black")
Explanation:
# include < conio.h>
# include < iostream.h>
int canvas.draw_circle,
namespace std
{
canvas.draw_circle((600, 600), 200, 3, "Black")
canvas.draw_circle((600, 600), 250, 3, "Black")
}
return,
Write a program that reads a list of words. Then, the program outputs those words and their frequencies.
Answer:
The program in Python is as follows:
mylist = []
nword= "y"
while(nword== "y"):
word = input(": ")
mylist.append(word)
nword = input("New word: y/n: ")
for item in mylist:
freq = mylist.count(item)
print(item, freq)
Explanation:
This creates an empty list
mylist = []
This is used to let the user input more word or stop input
nword = "y"
The following iteration lets the program read words from the user
while(nword == "y"):
This gets the user input
word = input(": ")
This appends the inputted word into the list
mylist.append(word)
This prompts if the user wants to input more word or not
nword = input("New word: y/n: ")
This iterates through the list
for item in mylist:
This gets the frequency of each word in the list
freq = mylist.count(item)
This prints the word and the frequency
print(item, freq)