Answer:
I hope this is right (one difference)
SDN is software based whereas normal network setup is mostly hardware based
Pls ask me if you want another differrence! :)
PLS MARK AS BRAINLIEST
Select all below that are not functions of the operating system of your computer?
a. Allocate memory
b. Direct information flow in the system
c. Format text documents
d. Provide a User interface
Answer:
c. Format text documents.
Explanation:
An operating system can be defined as a system software application that manages the interactions between the software and hardware resources of a computer, as well as providing essential services to other installed software applications.
The functions of the operating system of any computer is to;
1. Allocate memory.
2. Direct information flow in the system.
3. Provide a User interface.
Some examples of computer operating systems are Microsoft windows, Apple MacOS, Linux, Unix, Chrome OS etc.
The task of formatting text documents is performed by computer software applications such as Microsoft Word, notepad, wordperfect etc. Text formatting includes functions such as cut, paste, copy, bold, italics, font type, font size etc.
In order to use an object in a program, its class must be defined.
True
False
In object-oriented programming, what is initializing?
Concatenating the initial values of an attribute
Modifying the initial values of an attribute
Printing the initial values of an attribute
Setting the initial values of an attribute
Answer:
True
Setting the initial values of an attribute
Explanation:
A class in a program describes the contents of the objects that it belongs to and specifies how they behave. It defines the operations (methods).
Therefore, for an object to be used in a program, its class must be defined, which is TRUE.
Initialization with regards to object-oriented programming is defining or assigning values to a constant or variable. Thus, option D is correct as it is setting the initial values of an attribute
Q1: True
Q2: Setting the initial values of an attribute
Explanation:Got both answers correct in the class thanks to the guy above me!
Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of the base class' printAll() method.
Name: Fluffy, Age: 5, ID: 4444
// ===== Code from file AnimalData.java =====
public class AnimalData {
private int ageYears;
private String fullName;
public void setName(String givenName) {
fullName = givenName;
}
public void setAge(int numYears) {
ageYears = numYears;
}
// Other parts omitted
public void printAll() {
System.out.print("Name: " + fullName);
System.out.print(", Age: " + ageYears);
}
}
// ===== end =====
// ===== Code from file PetData.java =====
public class PetData extends AnimalData {
private int idNum;
public void setID(int petID) {
idNum = petID;
}
// FIXME: Add printAll() member function
/* Your solution goes here */
}
// ===== end =====
// ===== Code from file BasicDerivedOverride.java =====
import java.util.Scanner;
public class BasicDerivedOverride {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
PetData userPet = new PetData();
String userName;
int userAge;
int userID;
userName = scnr.next();
userAge = scnr.nextInt();
userID = scnr.nextInt();
userPet.setName(userName);
userPet.setAge (userAge);
userPet.setID (userID);
userPet.printAll();
System.out.println("");
}
}
// ===== end =====
Answer:
public void printAll(){ // member function petAll()
super.printAll(); // calls printAll() method of the superclass (base class) AnimalData using super keyword
System.out.print(", ID: " + idNum);} // prints the ID stored in the idNum data member of the PetData class
Explanation:
Here is the complete PetData class:
public class PetData extends AnimalData { //
private int idNum;
public void setID(int petID) {
idNum = petID; }
// FIXME: Add printAll() member function
/* Your solution goes here */
public void printAll(){
super.printAll();
System.out.print(", ID: " + idNum);} }
PetData class is a subclass which is inherited from the base class AnimalData.
This class has a private data member which is the variable idNum which is used to store the ID value.
It has a member function setID with parameter petID which is the idNum. This method basically acts as a mutator and sets the user ID.
This class has another method printAll() that uses super keyword to access the method printAll() of the base class which is AnimalData
super basically refers to the base class objects.
Here the super keyword is used with the method name of subclass PetData in order to eliminate the confusion between the method printAll() of AnimalData and PetData since both have the same method name.
In the main() method the use is prompted to enter values for userName, UserAge and UserID. Lets say user enters Fluffy as user name, 5 as user age and 4444 as userID. Then the statement userPet.printAll(); calls printAll() method of PetData class as userPet is the object of PetData class.
When this method is called, this method calls printAll() of AnimalData class which prints the Name and Age and printAll() of PetData class prints the ID. Hence the program gives the following output:
Name: Fluffy, Age: 5, ID: 4444
The program illustrates the use of methods.
Methods are used to group related codes together, so that they function as one, after being called/invoked
The printAll() method, where comments are used to explain each line is as follows:
//This defines the printAll() method
public void printAll(){
//This calls the base class of the printAll() method
super.printAll();
//This prints the required output
System.out.print(idNum);
}
Read more about similar programs at:
https://brainly.com/question/14581501
You are training to complete in a local 5K run. You record your time scores in minutes after completing seven practice runs. Write a method to calculate and return the average score based on the data.
Answer:
Following are the program to this question:
#include <iostream>//defining header file
using namespace std;
float Avg(float sum, int n)//defining method Avg that accepts float parameter
{
float average=sum/n;//defining float variable average that holds average value
return average;//return average
}
int main()//defining main method
{
float ar[ ] = {24.1,24.5,24.4,23.8,28.2,29.1,27.4};//defining float array
float sum;//defining float variable sum
int n=7,i;//defining integer variable
for (i = 0; i <n; i++)//defining loop to count total of array
{
sum=sum+ar[i];//add value in sum variable
}
cout<<"The average is: "<<Avg(sum,n);//use print method to call and print method return value
return 0;
}
Output:
The average is: 25.9286
Explanation:
In the above code, the float method "Avg" is declared, that accepts two parameters, that is "sum and n", inside the method, a float variable average is declared that divides and returns its values.
In the main method a float array "ar" is declared that holds values, in the next line, float variable "sum" and integer variable "n, j" is used.
In for loop, the "i" variable is used to add array values in the sum variable and pass into cout to call the "Avg" method and print its return value.
#include using namespace std;void Swap(int x,int y); //prototypeint main(){ int num1, num2; cout << "Please enter two numbers to swap, the same numbers will quit." << endl; cin >> num1 >> num2; while (num1 != num2) { Swap(num1,num2); cout << "After swap, the numbers are " << num1 << " " << num2 << endl; cout << "Please enter two numbers to swap, "; cout << "the same numbers will quit." << endl; cin >> num1 >> num2; } cout << "Thanks!" << endl; return 0; }//***************************//This subroutine swaps two numbers//*****************************void Swap(int x, int y){ int temp; temp = x; x = y; y = temp;}1. Type in the above program as swap.cpp. Add a comment to include your name and date. Compile and run with different values.2. To find out why this is not working, add the following output statements to the swap function.a. cout << " beginning of swap" << x << " " << y << endl;b. cout << " end of swap" << x << " " << y << endl;Are the variables being swapped inside the swap function?3. Explain why this program is not working correctly.4. Fix the program so the swap will work. Compile and run and be sure the swap works.5. Submit a copy of the final listing and output. Also include a copy of the hierarchy chart for the program.
Answer:
Fix:
void Swap(int &x, int &y){
int temp;
temp = x;
x = y;
y = temp; }
See the explanation
Explanation:
1. swap.cpp
//Name: ABC Date: dd/mm/yyyy
#include
using namespace std;
void Swap(int x,int y); //prototype
int main(){
int num1, num2;
cout << "Please enter two numbers to swap, the same numbers will quit." << endl;
cin >> num1 >> num2;
while (num1 != num2) {
Swap(num1,num2);
cout << "After swap, the numbers are " << num1 << " " << num2 << endl;
cout << "Please enter two numbers to swap, ";
cout << "the same numbers will quit." << endl;
cin >> num1 >> num2; }
cout << "Thanks!" << endl;
return 0; }
//********************//This subroutine swaps two numbers // ********************
void Swap(int x, int y){
int temp;
temp = x;
x = y;
y = temp;}
The output of this program with num1 = 1 and num2 = 2 is:
Please enter two numbers to swap, the same numbers will quit. 1 2 After swap, the numbers are 1 2 Please enter two numbers to swap, the same numbers will quit. 1
1 Thanks!
Notice that the numbers 1 and 2 are not swapped correctly even when the Swap() method is called in the main() function.
The other numbers 1 and 1 are entered in order to quit the program.
2.
In this part first output statement a) is added to the start of Swap() method before swapping the numbers x and y and the output statement b) is added to the last after the set of operations performed to swap x and y.
void Swap(int x, int y){
cout << " beginning of swap " << x << " " << y << endl;
int temp;
temp = x;
x = y;
y = temp;
cout << " end of swap " << x << " " << y << endl; }
Lets say x = 1 and y = 2
The output of these two statements is:
beginning of swap 1 2
end of swap 2 1
This shows that the Swap() function is working correctly and swapping the two numbers x and y.
3.
The reason that the program is not working properly is that x and y are value parameters. They are like local variables and local to the Swap() function. So changes made to them have no effect on the calling functions arguments num1 and num2. That is why the result remains the same when this function is called in the main().
In these three statements of Swap() method:
int temp = x;
x = y;
y = temp;
temp is a local variable which is local to this Swap function
Similarly x=y; and y= temp statements make changes only in the local copy and not in the values of num1 and num2 which are passed to this function in main()
So for the above example where num1 = 1 and num2 = 2, the statement
cout << "After swap, the numbers are " << num1 << " " << num2 << endl;
displays:
After swap, the numbers are 1 2
This means their real values are printed as it is without swapping the values.
4.
The solution is to mark the parameters x and y of the function Swap() as reference parameters in the following way:
void Swap(int &x, int &y)
In this way the memory address of each argument num1 and num2 is passed to the Swap(). The Swap() uses this address to both access and change the values.
So Swap(num1,num2); function call passes the memory address the actual parameters.
For the reference parameter an ampersand (&) is used before the variables x and y of Swap method. Now any changed made to these variables will effect the calling function arguments num1 and num2. So if x and y are swapped then num1 and num2 are also swapped when this function is called in main().
So change the prototype of Swap function as:
void Swap(int &x,int &y);
Change the function definition as:
void Swap(int &x, int &y){
int temp;
temp = x;
x = y;
y = temp; }
Now the program gives the following output:
Please enter two numbers to swap, the same numbers will quit. 1 2 After swap, the numbers are 2 1 Please enter two numbers to swap, the same numbers will quit. 1 1 Thanks!
See now the numbers are correctly swapped. The program and its output is attached.
6. Which of these buttons is used to rotate a selected image?
A
B
C
D
D is the button used to rotate a selected image.
In a six-story building, which floor would be the best option for the data center?
Answer:
243
Explanation:
4.17 LAB: Data File A comma separated value (.csv) file has been included to be used for this program. Each line contains two values, a name and a number separated by a comma (except the first line, which contains the titles for the value types). The name is that of a writer and the number refers to the number of works the writer has written. Ex. Jane Austen,6. Each line is an entry and each entry number can be updated by identifying the associated name. Once complete, the following program opens data file allWorks.csv and asks if the user wants to update entries or add new entries. All entries are stored in an array while being read in and updated. The program then writes the array to the file, overwriting the original contents. The following TODO sections must be completed. Open allWorks.csv for reading/input. Locate an entry to be updated by name (use the Java String indexOf() method) Add a new entry if the name isn't found in the file (give the entry a new number) Open file allWorks.csv for output Write contents of the array to allWorks.csv (original file is overwritten)
Answer:
import csv
def Csvreader(filename):
with open("filename", "r") as file:
content = file.csv_reader()
list_content = list(content)
file.close
return list_content
Explanation:
This is a python description of the function that reads the csv file and converts it to a list, from the list, each item can accessed with its index and updated directly. Use this to draw the same conclusion for a java program.
What is the best platform for a online meeting?
Answer: at the moment i would pick between zoom and something by google
Explanation: Face time is not very useful as only apple users can use other things like house party and the Instagram face chat thing are not good for a professional setting. Skype has been giving me problems with the vast amount of people on it for work.
Answer: Online Platforms
Explanation:
Google,Adobe,Skype for Business, Join.me
Arrays save space because all elements of an array are stored in a single memory location while a list of variables needs a separate location for each variable.
a. True
b. False
Answer:
Option A. True Is the correct answer
Explanation:
Arrays are allowed to store multiple elements of the same data type, all of them stored with the same array hence preventing the need for creating separate variables for each element. An array therefore will act as a container for storing several variables all of the same type. This offers a lot of convinience and enhances better memory space management. In java arrays are declared by:
dataType[] arrayName;
Where dataType is the datatype of elements to be stored in the arrays. This is followed by a pair of square brackets then the name of the array.
for declaration and initialization in Java, the new keyword is used as:
dataType[] arrayName = new dataType[arraySize];
Write the ColorfulBouncingCircle class, where you should write the constructor, setPlayingFieldSize, and tick methods, and override the overlaps method, each according to the above descriptions. You should not have to write any code which draws; instead, a test program will be provided which will animate ColorfulBouncingCircles based on your implementation. For every time tick, the test program will compare every circle against every other circle using the overlaps method
Answer: Circle class representing circle objects which have a radius, center x, and center y. It included overlaps and draw methods. Then, we wrote a Colorfulcircle class which included a Color property and overrode the draw method of Circle. For this assignment, you are asked to create a ColorfulBouncing circle class. Begin with the versions of Circle and ColorfulCircle uploaded to Canvas ColorfulBouncingCircle should extend ColorfulCircle, Unlike the other Circle classes, it will include a velocity for the x and y axes. The constructor for ColorfulBouncingCircle includes these parameters: public colorfulBouncingcircle (double radius, double centerx, double center Color color, double xVelocity, double yvelocity) Note that we are treating x as increasing to the right and y as increasing down, as with Java's graphics coordinates system. This was also seen with Circle's draw method. ColorfulBouncingCircles will bounce around in a playing field which the tester will provide. The Colorful Bouncinesicle class should have a public static method to set the playing field width and height: public static void setPlayingFieldsize (double newwidth, double newHeight) ColorfulBouncingCircle will also include a method which should alter its center and center with each time tick (similar to a metronome's noise guiding a musician to play a song). The circle's x position should be altered according to x velocity and y position according to y velocity. However, before changing the positions, check if the center position would, after moving, be either less than 0 or greater than the playing field dimensions. If so, instead of changing the center position, alter the velocity. If the ball hits the top or bottom, the sign of its vertical velocity should be flipped: if it hits the left or right, its horizontal velocity sign should be flipped. If it hits a corner, both should be. Notice that velocity may be positive or negativel The tick method which will be called by the tester is defined in this way:
public void tick() Finally, we should override the overlaps method to make balls bounce away from each other. You should call the super method to see if your circle overlaps another circle. If so, alter this circle's velocity according to its center relative to the other circle. If this circle" is above or below the "other circle," flip the sign of "this circle's" vertical velocity. If it's to the left or right, flip the horizontal velocity As before, both may be flipped. This is NOT the same as a true elastic collision, but it should be simpler for you to implement. The sign flipping will sometimes cause the balls to "vibrate" when caught between each other. Please review the velocity changing rules carefully; they are easy to get wrong!! To review: Write the ColorfulBouncineCircle class, where you should write the constructor setPlayingfield Size, and tick methods, and override the overlaps method, each according to the above descriptions. You should not have to write any code which draws; instead, a test program will be provided which will animate ColorfulBouncingCircles based on your implementation. For every time tick, the test program will compare every circle against every other circle using the overlaps method. The test program will ask you to press Enter in the console to launch the automated tests which will assign a tentative score based on your implementation. DO NOT ALTER the Circle OR Colorful Circle files!!
Explanation:
Image-editing software is used to_____
Edit images.
(have to spam so i ahve enough words)
apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple apple
Juan is interested in getting a job in the technological field. He is interested in protecting data from threats, and stopping hackers and viruses. Which job would should Juan apply for?
This question is incomplete because the options are missing; here is the missing section:
Which job would should Juan apply for?
A. Research and software development
B. Technical support
C. Training and support
D. Information security
The correct answer is D. Information security
Explanation:
In technology, information security is the area that deals with the protection of information or data in computers and other technological devices. This includes creating strategies, programs or protocols to stop unauthorized access to data, which can occur due to the action malicious programs such as viruses or due to hackers (experts in technology who use their knowledge to access illegally to data). In this context, Juan would need to apply to an information security job because this is part of the technology field and in this, he would need to protect data, which is exactly what he wants.
When passing a stream to a function, it must always be pass-by-__________.
a) value
b) address
c) reference
d) class
e) function
Answer:
C) Reference
Explanation:
Stream objects are usually passed to functions as parameters, similar to other kind of objects. When passing a stream parameter, it must always be pass-by-reference.
This means that a reference to the original object is being passed to the function and not the copy of the object. As such, the object can be modified within the function. Also, if the object is large or has a large memory, copying it may be inefficient as regards the memory space and the time.
Therefore, object references point to the same object even when they are passed to functions.
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base. Sample output with inputs: 4.5 2.1 3.0
Answer:
def pyramid_volume(base_length, base_width, pyramid_height):
base_area = base_length * base_width
volume = 1 / 3 * base_area * pyramid_height
return volume
Explanation:
Create a function called pyramid_volume that takes base_length, base_width, pyramid_height as parameters
The formula to calculate the volume of a pyramid is = 1/3Ah, A is the base area, h is the height
Inside the function, calculate the base area, multiply base_length with base_width. Then, calculate the volume using the formula. Return the volume
Overload the + operator as indicated. Sample output for the given program:
First vacation: Days: 7, People: 3
Second vacation: Days: 12, People: 3
#include
using namespace std;
class FamilyVacation{
public:
void SetNumDays(int dayCount);
void SetNumPeople(int peopleCount);
void Print() const;
FamilyVacation operator+(int moreDays);
private:
int numDays;
int numPeople;
};
void FamilyVacation::SetNumDays(int dayCount) {
numDays = dayCount;
return;
}
void FamilyVacation::SetNumPeople(int peopleCount) {
numPeople = peopleCount;
return;
}
// FIXME: Overload + operator so can write newVacation = oldVacation + 5,
// which adds 5 to numDays, while just copying numPeople.
/* Your solution goes here */
void FamilyVacation::Print() const {
cout << "Days: " << numDays << ", People: " << numPeople << endl;
return;
}
int main() {
FamilyVacation firstVacation;
FamilyVacation secondVacation;
cout << "First vacation: ";
firstVacation.SetNumDays(7);
firstVacation.SetNumPeople(3);
firstVacation.Print();
cout << "Second vacation: ";
secondVacation = firstVacation + 5;
secondVacation.Print();
return 0;
}
Answer:
FamilyVacation FamilyVacation::operator+(int moreDays) {
FamilyVacation copy = *this;
copy.numDays += moreDays;
return copy;
}
Explanation:
You create a copy (which is simple because the class contains no pointers), then you modify the copy and return it.
Use the Web to search for methods to prevent XSS attacks. Write a brief description of more than one method.
Explanation:
Cross site scripting is a security vulnerability. it is a client side code injection attack, the attacker tries to execute a malicious JavaScript in the internet browser of the victim. The users browser executes this script on the users computer. Almost one in three websites are vulnerable to cross site scripting. To prevent cross site scripting, scan your web application or website regularly, your developers should also correct the code to eliminate vulnerabilities.Escaping is the first method one should use to prevent XSS attacks. Escaping means whatever data an application receives should be secure before sending it to user. Validating input is he second method, it means one should ensure that the application renders correct data and prevents malicious data from harming the site, database and users. Blacklisting is used for this. IT disallows several predetermined characters in user input. Sanitizing is the third way to prevent XSS attacks. It is helpful on sites that allow HTML markup to make sure that the data which is received is not doing any harm to users or your database by cleaning the data of harmful markups.ven if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are
Complete Question:
Even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are;
Group of answer choices
A. policy and procedure development
B. use case activity diagram testing
C. method design and coding
D. data conversion and user training
Answer:
C. method design and coding
Explanation:
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are six (6) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Deployment.
6. Maintenance.
Among the listed stages, there are two (2) most important stages which cannot be ignored in the creation of a software application are.
Hence, even if you skipped all the requirements analysis steps, the two steps guaranteed to be completed in any software development are method design and coding.
I. Method design: this is the third step of the software development life cycle, it comes immediately after the analysis stage. This is the stage where the software developer describes the features, architecture and functions of the proposed solution in accordance with a standard.
II. Coding (development): this is the fourth step in the software development process and it involves the process of creating a source code which would enable the functionality of the software application.
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?
The information security principle that the keylogger most likely designed to disrupt is confidentiality.
Keyloggers are often called keystroke loggers. They are software programs or hardware devices that monitors the activities that is the keys pressed by an individual using a keyboard.Keyloggers are known to be a form of spyware where computer users are unaware their actions are being tracked.
Conclusively, A keylogger Trojan virus is a program that logs keystrokes. it infects computer by tracking every single keystroke you enter through your keyboard, including passwords and usernames.
Learn more from
https://brainly.com/question/20877093
Confidentiality, integrity, and availability (C-I-A) are large components of access control. Integrity is __________. ensuring that a system is accessible when needed defining risk associated with a subject accessing an object ensuring that a system is not changed by a subject that is not authorized to do so ensuring that the right information is seen only by subjects that are authorized to see it
Answer: ensuring that a system is not changed by a subject that is not authorized to do so
Explanation: Access control refers to pribcues which are employed in the bid thlo ensure the security of data and information. It provides the ability to authenticate and authorize access to information and data thereby preventing unwarranted access and tampering of the information. Integrity in terms of data security and access control is is concerned with modification to an existing or original data by unauthorized sources. When unauthorized addition or subtraction occurs on a data, the integrity of such data has been compromised. Therefore, authorization is required whenever a source is about to access certain information whereby only those with the right authorization code will be allowed, Inputting an incorrect pass code after a certain number of tries may result in system lock down as access control detects a a possible intrusion
Different network scenarios require the use of different tools. The tools you may consider should EXCLUDE:_________
Complete Question:
Different network scenarios require the use of different tools. The tools you may consider should EXCLUDE:
a. Port scanner
b. Banner grabbing tools
c. Vulnerability scanner
d. Honeypots
e. Protocol analyzer
f. Viruses
g. Honeynets
Answer:
f. Viruses
Explanation:
Different network scenarios require the use of different tools. The tools you may consider should include:
a. Port scanner: this is a program used by network administrators to scan various application, transport, internet and network ports which may be exploited by hackers or attackers when found vulnerable.
b. Banner grabbing tools: it is used to gather informations of a computer residing on a network and various services running on its open ports using telnet, zmap, netcat and nmap.
c. Vulnerability scanner: used for the detection of vulnerabilities in a network or systems.
d. Honeypots: it is used to detect and redirect or prevent any unauthorized use of information of a network by mimicking the potential target systems.
e. Protocol analyzer: it is used to analyze traffic and packet captures in a network. Software programs such as wireshark, tshark can be used for protocol analysis.
f. Honeynets: is a combination of one or more honeypots used for attracting and trapping potential attackers.
However, a virus is a malicious program that can replicate and cause severe damage to a computer system.
A monitor is a type of? CPU input memory output
Answer:
Un monitor es un periférico de salida en el que la computadora muestra las acciones y ejecuciones que se realizan él.
Explanation:
:D
Answer:
output
Explanation:
I just took the test.The person that answered it in Spanish is correct they also put output. Congrats :)
A permanent storage device inside of a computer is called a
Answer:
The hard drive or the SSD.
Which is the ideal amount of time to set for viewers to take in a slide with just one photo and a short caption?
A. 1-2 seconds
B. 10-15 seconds
C. 5-10 seconds
Which methods are commonly used by sysadmins to organize issues?
a. Random machine checks
b. Daily checks on each machine
c. Service monitoring alerts
Answer:
c. Service monitoring alerts
Explanation:
Given the fact that system administrators manage so many computer systems, they are equipped with service monitoring alerts that indicate when there is a problem with any of the systems and the extent or magnanimity of the problem. This is necessary so as to attract responses from the right personnel.
Metrics are deployed to gather raw data on the system's use and behavior. Monitoring compiles these data to useful information that can be stored when they meet up to some standards. The alert system sends out signals to the administrators when some acceptable standards are not met. So, the service, monitoring alerts are used by system admins to organize issues.
Give a tight bound on the number of times the z = z + 1 statement is executed. i = 2 while ( i > 1 ) { i = floor(i/2) z = z + 1 }
Answer:
zero ( 0) times.
Explanation:
In the code;
i = 2
while ( i > 2){
i = floor( i/2 );
z = z + 1;
}
the variable " i " is assigned the integer " 2 ", then the while statement loops with a condition of a greater " i " value and divides the value by two for every loop.
But in this case, the while statement is not executed as the value of " i " which is 2 is not greater than but equal to two.
"The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works."
Answer:
Decision logic.
Explanation:
The decision logic of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works.
Generally, the decision logic of an operational system comprises of systems which includes pricing, order processing, customer relationship management (CRM) and inventory control. In order to modify the decision logic of information systems, continuous interactions between information technology (IT) analysts and the clients of these businesses are created.
Additionally, operational decision logic are typically visible, can be measured, managed and can easily be shared across processes within an organization through the use of a business rule management system (BRMS).
Given the Query Data Type, which of the following is incorrectly matched with the corresponding Storage Data Type?
a) Text : String
b) TRUE/FALSE: Boolean
c) Date : Date
d) Duration : Time
Answer:
c) Date : DateExplanation:
A type of attribute of data is called data type in computer science, data types tells the interpreter how a person wants to use the data. The basic data types are supported by most of the programming languages, the basic data types are Integers, float, characters, strings, point numbers and arrays. The terminology may differ from one language to other.
Which of the following can be managed using Active Directory Users and Computers snap-in?
a. Domain trusts and domain forest trusts
b. Information in Active Directory
c. Directory data replication
d. Active Directory schema
Answer:
The answer is "Option b".
Explanation:
The active directory can manage the data with active directory customers but a snap-on machine. It is used in scrolling the list, as the earlier replies demonstrate. It will appear on the screen if there is no other startup software installed on a computer.
This snap-on desktop is only a component, that allows its simultaneous use of different systems or devices on the very same system. It also turns the objects more or less into the pieces of the whole.
Using Active directory users and computers snap-in, Information in Active Directory can be managed.
Active directory can be used to give access Laptops and applications on windows. This snap-in helps you to with the administration of active directory and also management of object, units and attributes.
In conclusion, information in active directory is managed using the process.
Read more on https://brainly.com/question/14469917?referrer=searchResults
Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is properly read from grades.txt. and the desired output to the screen is as follows: OUTPUT TO SCREEN DATAFILE Adara Starr has a(n) 94 average Adara Starr 94 David Starr has a(n) 91 average David Starr 91 Sophia Starr has a(n) 94 average Sophia Starr 94 Maria Starr has a(n) 91 average Maria Starr 91 Danielle DeFino has a(n) 94 average Danielle DeFino 94 Dominic DeFino has a(n) 98 average Dominic DeFino 98 McKenna DeFino has a(n) 92 average McKenna DeFino 92 Taylor McIntire has a(n) 99 average Taylor McIntire 99 Torrie McIntire has a(n) 91 average Torrie McIntire 91 Emily Garrett has a(n) 97 average Emily Garrett 97 Lauren Garrett has a(n) 92 average Lauren Garrett 92 Marlene Starr has a(n) 83 average Marlene Starr 83 Donald DeFino has a(n) 73 average Donald DeFino 73
Answer:
Here is the C++ program:
#include <fstream> //to create, write and read a file
#include <iostream> // to use input output functions
using namespace std; //to access objects like cin cout
const int MAXNAME = 20; //MAXNAME is set to 20 as a constant
int main(){ //start of main() function
ifstream inData; //creates an object of ifstream class
inData.open("grades.txt"); //uses that object to access and opens the text file using open() method
char name[MAXNAME + 1]; // holds the names
float average; //stores the average
inData.get(name,MAXNAME+1); //Extracts names characters from the file and stores them as a c-string until MAXNAME+1 characters have been extracted
while (inData){ //iterates through the file
inData >> average; //reads averages from file using the stream extraction operator
cout << name << " has a(n) " << average << " average." << endl; //prints the names along with their averages
inData.ignore(50,'\n'); //ignores 50 characters and resumes when new line character is reached. It is used to clear characters from input buffer
inData.get(name,MAXNAME+1);} //keeps extracting names from file
return 0; }
Explanation:
The program is well explained in the comments added to each line of the code. The program uses fstream object inData to access the grades.txt file. It gets and extracts the contents of the file using get() method, reads and extracts averages from file using the stream extraction operator. Then program displays the names along with their averages from grades.txt on output screen.
The grades.txt file, program and its output is attached.