FILL IN THE BLANK all executables in the linux ________ directory are accessible and usable by all system users.

Answers

Answer 1

All executables in the Linux /usr/bin directory are accessible and usable by all system users.

This directory contains essential executable files that are required for normal system operation. Executables are files that contain instructions that are executed directly by the operating system or by an application. In Linux, executables are files that have the executable permission bit set. This permission bit allows the file to be executed as a program.
The /usr/bin directory is one of the standard directories in the Linux file system hierarchy. This directory is intended for executable files that are not essential for system booting and maintenance. The files in this directory are usually user-level programs and applications that are installed by the system administrator or by users themselves.
Since all executables in the /usr/bin directory are accessible and usable by all system users, it is important to ensure that only authorized users have access to this directory. Proper access control measures should be implemented to prevent unauthorized access to the system and to protect sensitive data.
In conclusion, the /usr/bin directory in Linux is an important directory that contains executable files that are necessary for normal system operation. All executables in this directory are accessible and usable by all system users, and proper access control measures should be implemented to ensure system security.

Learn more about data :

https://brainly.com/question/31680501

#SPJ11


Related Questions

Which of the following can be used to replace /* missing implementation */ so that removeName will work as intended

Answers

Total.advance(timeCards[k].getHours(), timeCards[k].getMinutes())

how computer examines your software for problems before running it?

Bugs are errors or mistakes that occur in a program. They are nearly usually the programmer’s fault. Debugging is the process of locating and correcting mistakes. Debugging is the act of finding and eliminating current and prospective problems (often known as “bugs”) in software code that might cause it to behave abnormally or crash. To avoid doing erroneous operations.

There are three categories of problems that might arise when building programs: syntax errors, logic errors, and runtime errors.

To learn more about removeName to refer:

https://brainly.com/question/14510887

#SPJ4

the following can be used to replace missing implementation so that removeName will work as intended Total.advance(timeCards[k].getHours(), timeCards[k].getMinutes())

how computer examines your software for problems before running it?

Bugs are errors or mistakes that occur in a program. They are nearly usually the programmer’s fault. Debugging is the process of locating and correcting mistakes. Debugging is the act of finding and eliminating current and prospective problems (often known as “bugs”) in software code that might cause it to behave abnormally or crash. To avoid doing erroneous operations.

There are three categories of problems that might arise when building programs: syntax errors, logic errors, and runtime errors.

To learn more about removeName to refer:

brainly.com/question/14510887

#SPJ4

How does lower latency benefit the users connected to a network?

Answers

Users connected to a network benefit from lower latency "by reducing the delay when sending and receiving data between devices". The correct answer is C.

Lower latency refers to the amount of time it takes for data to be sent and received between devices on a network. When latency is low, the delay between when a user sends a request and when they receive a response is minimized, resulting in a more responsive and smoother experience for the user. This is particularly important in applications such as online gaming, video conferencing, and real-time control systems, where fast response times are critical. A low-latency network allows for faster data transfer, which results in a better user experience.

This question should be provided with answer choices, which are:

(A) by expanding the range over which the network's signals are transmitted.(B) by enabling more devices to connect to the network at the same time.(C) by reducing the delay when sending and receiving data between devices.(E) by limiting network access to users with higher security credentials.

The correct answer is C.

Learn more about high latency here: brainly.com/question/30185656

#SPJ4

Confidential personnel data is stored on the CorpFiles16 file server in a shared directory named Personnel. You need to configure NTFS permissions for this folder so that only managers are authorized to access the folder.

Answers

Your job in this lab is to carry out the following actions: Give the Full Control access to the D:Personnel folder to the Managers group. Take away all inherited rights that are being transferred to the D:Personnel folder.

Click Edit on the Security tab. Add the necessary users or groups that should have access at each level of the folder hierarchy in the Permissions dialogue box. Give the users or groups the appropriate rights (Full control, Modify, Read & execute, List folder contents, Read, Write Special permissions, etc.). To establish NTFS rights, right-click a folder or file and choose "Properties." From there, choose a permission from the "Security" tab, or click "Advanced" for more options and specialised permissions.

To learn more about folder click the link below:

brainly.com/question/14472897

#SPJ4

What are the steps when it comes to making a video game? What do you need to do to plan it, and when it comes to developing it?

Answers

Video game planning, preproduction, production, testing, pre-launch, launch, and post-launch are the seven stages of game development.

How is computer science used in game development?

Utilizing programming languages, creating software, and utilizing artificial intelligence are all aspects of computer science that are used in game development. The ideal degree type for learning Computer Science and Game Development and Design is a Game Development or Game Design emphasis within a Computer Science degree.

The foundations of computer science and programming are used in the creation of video games. To create realistic effects, video games' modern graphics rendering frequently makes use of cutting-edge methods like ray tracing.

A degree in computer science is still a good option for people trying to break into this extremely competitive industry because technical proficiency is required for positions like game developers, software testers, and audio engineers. Video game software development is known as game programming, a subset of game development.

To learn more about development refer to :

https://brainly.com/question/24251696

#SPJ1

Which supercomputer was recently approved for development in the United States?


a.
The WOPR supercomputer

b.
The IBM Blue supercomputer

c.
The Exascale supercomputer

d.
The Sequoia supercomputer

Answers

The Exascale supercomputer was recently approved for development in the United States. The correct option is c.

What is supercomputer?

A supercomputer is a type of computer that performs at a higher level than a general-purpose computer.

Instead of million instructions per second, a supercomputer's speed is typically expressed in floating-point operations per second.

The first exascale computer was recorded in May 2022, and the Frontier supercomputer at the Oak Ridge National Laboratory in Tennessee now holds the record for the fastest supercomputer in the world with 1.1 exaFLOPS.

Frontier might theoretically achieve a two exaFLOPS peak in the upcoming years.

Thus, the correct option is c.

For more details regarding supercomputer, visit:

https://brainly.com/question/28629318

#SPJ1

Which computer memory is higher among digital & analog computer​

Answers

A digital computer has a higher memory. Analog is very low and limited.

Data can be retrieved fastest from :
a. registers
b. cache memory
c. RAM
d. HDMI

Answers

Data can be acquired from registrations the quickest, thus I'm attempting to retrieve user-specific information like first name, last name, and email. Utilizing this feature

add_action(‘user_registration_after_register_user_action’, ‘ur_get_form_fields’, 10, 3);

function ur_get_form_fields($form_data, $form_id, $user_id)

{

var_dump($form_data);

}

However, if I attempt to utilise the $form data, id, or user id variables, I get the message "Unexpected token A in JSON at position 0."

1. The same problem message appears even when all plugins are disabled and the default Twenty Nineteen WP theme is turned on.

2. The plugin is currently running version 1.8.8.

3. The first name, last name, email, and password boxes are all required.

A register essentially serves as a storage area for memory modules that transport data for the CPU (Central Processing Unit) to use right away for data processing. They may actually be found in the computer processor as processor registers and go by the name of memory registers as well.

Learn more about Data here:

https://brainly.com/question/11941925

#SPJ4

updates were rejected because the tip of your current branch is behind

Answers

The error message "Updates were rejected because the tip of your current branch is behind.", you need to first fetch the latest commits from the remote repository and then merge them into your local branch.

This error message occurs when you are trying to push commits to a remote branch, but the remote branch has new commits that you don't have locally. The following are the steps to fix the error message:

Run `git fetch origin` to fetch the latest commits from the remote repository.Run `git status` to check the current status of your local branch.Run `git merge origin/branch_name` to merge the remote commits into your local branch.After merge, you will get conflicts if any , resolve them by checking the conflict files and then run `git add file_name` and `git commit -m "message"`Run git push origin branch_name to push your local commits to the remote repository.

If you still face the problem then use `git pull origin branch_name` which will automatically fetch and merge the changes.

To learn more about Git visit: https://brainly.com/question/19721192

#SPJ4

The question seems to be missing, but I suppose the full question was:

"How do you fix error message updates were rejected because the tip of your current branch is behind?"

Debugging Exercise 3-1 叩| Instructions DebugThree1. 1 // This class calculates a waitperson's tip as 15% of the bill 2 public class DebugThree1 The files provided in the code editor to the right contain syntax and/or logic errors. In each case, determine and fix the problem, public static void main(String args]) remove all syntax and coding errors, and double myCheck50. 90 double yourCheck19. 95 System. Out. Println("Tips are") calcTip(nyCheck); calctip(yourcheck); run the program to ensure it works properly 7 GRADING Write your Java code in the coding area on the right. Use the Run Code button to execute and run the code and the Test button to run a series of pre-configured tests against your project. 10 public void calcTip (double bill) 12 13 14 15 16 17 18 19 20 final double RATE = θ. 15; double tip; tip checkRATE; System. Out. Println("The tip should be at Least "tip); Once you are happy with the test results, click Grade to submit your project for grading

Answers

Perhaps you meant to say that the applet should be displayed after the user hits the button. The answer in this situation might be to include your in a with a css-property of visibility:hidden;.

then develop an HTML button element that interacts with the element and modifies its visible property. When you press F5, the  will automatically locate the project's entry point and begin . Additionally, you may launch a  session from VS Code's Run and De view in the sidebar.  further information. The Java Writer Class's write(String) function is used to write the given String to the stream. The argument is this String value.

Learn more about string here-

https://brainly.com/question/14528583

#SPJ4

A private server wants to reach URL https://www.amazon.com through a NAT device. Please select the answer which best describes how the packet would look on the private server. Please note the following before answering question:
Private System has Private IP: 192.168.0.5
NAT has Private IP: 192.168.0.9 and Public IP: 52.25.13.28
Assume the destination domain name resolves to Public IP: 54.239.17.6
O Source IP: 192.168.0.5, Source Port 45678, Destination IP: 54.239.17.6, Destination Port 443
O Source IP: 192.168.0.5, Source Port 443, Destination IP: 54.239.17.6. Detination Port 443
O Source IP: 192.168.0.5, Source Port 56789, Destination IP: 52.25.13.28, Destination Port 443
O Source IP: 192.168.0.5, Source Port Bo, Destination IP: 54.239.17.6, Destination Port 80

Answers

Given that Private server's IP address is 192.168.0.5, that will act as the source IP address.

What functions do private servers have?

A private server is a real computer that you own and manage and has all the necessary operating systems, programs, and software installed to offer key services, like email. Need a dictionary definition A physical or virtual device that is managed privately is referred to as a private server.

The legality of private servers?

Playing on a private server is it permitted, While hosting one can be against the law, using one is not. Playing on a real server won't get you in trouble because all the legal problems are packed up on simulating a server and disseminating the client.

To know more about IP address visit :-

https://brainly.com/question/16011753

#SPJ4

Your PC screen looks like this:
Which part would you test?
a. GPU
b. APU
c. CPU
d. RAM
e. PSU

Answers

I'll test the GPU portion. Originally created to speed up the rendering of images, a graphics processing unit is a specialized processor.

A GPU is it a graphics card?

The major part of a graphics card is a graphics processing unit (GPU) that executes the necessary computations, although the term "GPU" is also also used to describe the graphics card as a whole.

Does GPU outperform CPU?

Due to their extreme parallelism, GPUs can process data much more quickly than CPUs, but they are less flexible. Since a GPU is unable to manage all of a computer's inputs and outputs, CPUs have much larger and more comprehensive instruction sets.

To know more about GPU visit :-

https://brainly.com/question/14697867

#SPJ4

const COST_OF_SHIRT = 20.00;
function start(){
println("How many T-shirts would you like to buy?");
var tshirts = readInt("How many tshirts are you buying? ");
var cost = tshirts*COST_OF_SHIRT;
println("Your total is $" + cost);
}

Answers

The prompt() method in JavaScript is used to solicit user input. We enter the text we wish the user to see as a parameter.

The input value is returned as soon as the user clicks "ok." In order to leverage user input in our programs, we normally store it in a variable. A BufferedReader can provide user input in the following manner: You must import these items. InputStreamReader inp = new InputStreamReader(System.in); BufferedReader br = new BufferedReader(inp); name as a string = br. readline(); A For loop has three components, similar to a While loop: the keyword For that initiates the loop, the condition being tested, and the keyword EndFor that ends the loop.

Learn more about string here-

https://brainly.com/question/14528583

#SPJ4

How to fix incorrect permissions on windows search directories?

Answers

Answer:

Take ownership of the Data folder.

Run SFC and DISM scans.

Disable and re-enable the Windows Search feature via the Command Prompt.

Create a new user profile.

Let T be a MST of a given graph G. Will T still be the MST if we reduce the weight of exactly one of the edges in G by a constant c?

Answers

Yes. The cut attribute of MSTs. A cut is just a division of the graph's vertices into two separate sets.

This relates to the Minimum Spanning Tree's Cycle Property, which essentially states that in a graph with a cycle, the edge with the highest weight does not belong in the MST (easily proven by contradiction in the link above). As a result, the edge emax cannot be in the MST since it is a cycle. Uniqueness. There can only be one minimal spanning tree if each edge has a unique weight. This is true in many practical circumstances where it's improbable that any two pathways would have precisely the same cost, such as the telecommunications business example given above.

To learn more about MSTs click the link below:

brainly.com/question/15966617

#SPJ4

A formula in cell D1 of this spreadsheet gives a result of 3. Which formula
was most likely entered in cell D1?

Answers

The duplicated formulas in cells G3 and E3 are =E3+F$3 and =$B3+D3, respectively. The contents of cell C1 will be 44, the value shown in cell E1 will be -40, and the result we will obtain is 7.

What does an Excel formula go by?

Using specified values, referred to as inputs, in a given order, or structure, functions are established formulas that carry out calculations. Simple or sophisticated computations can be carried through using functions.

Which of the three formula kinds are they?

Chemical formulas can be divided into three categories: empirical, molecular, and structural. Molecular formulas indicate the number of each type of atom in a molecule, empirical formulas display the simplest whole-number ratio of atoms in a compound, and structural formulas display the number of each type of atom in a compound.

To know more about cells visit:-

https://brainly.com/question/8029562

#SPJ1

at which osi layer does a router operate to forward network messages?

Answers

Answer:

third layer

Explanation:

Emma is creating a database to track sales. She wants to be able to sort by price and sales associate. And she would like to look up the barcode number and the description. What fields should she have in her database?.

Answers

Emma should have barcode number, description, price, and sales associate fields in her database.

What is field in database?A database is a collection of information that has been organized for easy access, management, and updating. Computer databases are typically used to store aggregations of data records or files containing information such as sales transactions, customer data, financials, and product information.A field database is one in which the data under information, email address, and phone number are stored in a field of a row that can also contain other fields such as address or city information in a table named customer contact.The fields are represented by the columns. The field will correspond to data such as ID, color, and postcode. For example, if you have a customer record that includes their name, address, and phone number, each of those pieces of information is considered a field.

The complete question:

"Emma is creating a database to track sales. She wants to be able to sort by price and sales associate. And she would like to look up the barcode number and the description. What fields should she have in her database?

1.sales associate and barcode number

2.sales associate, price, and description

3.barcode number, description, price, and sales associate

4.product number, description, price, sales associate, and profit."

To learn more about database refer to :

https://brainly.com/question/518894

#SPJ4

Prompt
Explain three strategies you can use to take better notes.

Answers

Answer:

1. Use phrases not full sentences

2. Put your notes in categories

3. Take notes in your own words

Explanation:

It's right

Which one of the below is not divide and conquer approach?O Insertion SortO Merge SortO Heap SortO Shell Sort

Answers

Insertion sort is not a divide-and-conquer approach.

It is a sorting algorithm that builds the final sorted list one item at a time. Insertion sort is a simple sorting algorithm that builds the final sorted list one item at a time. It is not a divide and conquers approach, unlike algorithms such as merge sort and quick sort which involve dividing the input into smaller sub-problems, solving them recursively, and then combining the solutions. Insertion sort iterates over the input, comparing each element with the ones before it and inserting it into the correct position. It is efficient for small lists and lists that are already partially sorted.

Learn more about Insertion sort here:https://brainly.com/question/12929022

#SPJ4

What are some ways you can make a good impression on a client, and how would you respond to a difficult client situation?

Cybersecurity~

Answers

Not that  you can make a good impression and win clients by being knowledgeable, professional, and responsive. Respond to difficult client situations by remaini ng calm, listening actively, and working to find a solution that addresses their concerns.

What is the rationale for the above response?

Making a good impression on a customer is critical in the realm of cybersecurity in order to develop trust and confidence in your skills. One method to do this is to be well-versed on the numerous cybersecurity dangers and solutions applicable to the client's business or company.

Also , being professional and receptive to their wants and concerns might aid in the development of trust. It is critical to remain calm and not become defensive in the face of a challenging client situation.

Instead, actively listen to their problems and collaborate to create a solution that meets their requirements.

Learn more about Winning Clients:
https://brainly.com/question/28769079
#SPJ1

Let G1 and G2 be arbitrary context free languages and R an arbitrary regular language.Consider the following problems:(A) Is L(G1) = L(G2)?(B) Is L(G2) ≤ L(G1)?(C) Is L(G1) = R?Which of the problems are undecidable ?Choose the correct answer from the options given below:(A) only (B) only(A) and (B) only(A), (B) and (C)

Answers

If a context-free grammar produces all of a language's strings, that language is said to be a context-free language (CFL). L1 = anbn | n is a positive integer is a context-free language, for example.

How can contextlessness in grammar be demonstrated?

If a formal grammar's production rules can be used regardless of the context of a nonterminal, it is said to be "context-free." The single nonterminal on the left side can always be replaced with the right side, regardless of the symbols that are around it. It differs from context-sensitive grammar because of this.

Is a language that is context-free finite?

(1) Context-free languages are countably infinite in number. This is accurate since each description of a context-free language has a limited length, making the number of such descriptions countably limitless.

To know more about context visit:-

https://brainly.com/question/30163198

#SPJ4

The definition of "Decision" is
*
A) Showing the steps to solve a problem.
B) The act of choosing an option.
C) Inputting numbers into a computer.
D) Creating options in a problem.

Answers

B is the answer the act of choosing an option

Answer:

The answer is letter B

Explanation:

ask your search engine lol

How do you stop sharing location without notifying?

Answers

Turn on airplane mode, turn off location sharing, stop location sharing in Find My Apps, GPS spoofer is used to change location.

There are many reasons to share your iPhone's location with friends and family so they know where you are. This is useful in several ways. B. Friends and family can contact you in an emergency and know your iPhone's location. When you meet up with friends, they can know where you are because you're sharing your location.

However, sharing your location may compromise your privacy. You may not want your friends and family to know where you meet face-to-face. However, you don't want to hurt your friends and family by letting them know you're no longer sharing your location. This article explains how to stop location sharing on her iPhone without her knowing.

Know more about Apps here:

https://brainly.com/question/28650148

#SPJ4

5.2.8 Prevent Zone Transfers
The CorpDC3 server is a domain controller in the CorpNet.com domain. The server holds an Active Directory-integrated zone for the CorpNet.com domain.
You need to secure zone data and prevent anyone from copying zone data from the CorpDC3 server through zone transfer. Because all zone information is replicated automatically through Active Directory replication, you know you can disable zone transfers while still replicating data with other domain controllers.
In this lab, your task is to disable zone transfers for the CorpNet.com zone.

Answers

For the CorpNet.com zone, prevent zone transfers.

You must stop zone transfers for the CorpNet. com zone in this lab.

Finish the lab in the following way:

1. Click Tools > DNS from the Server Manager menu.

2. Expand Forward Lookup Zones in CORPDC3.

3. Click the Properties option when right-click the zone you wish to change.

4. Click the Tab for Zone Transfers.

5. Uncheck the box for Zone transfers.

6. Press OK.

The act of moving the contents of a zone file on a primary DNS server to a secondary DNS server is known as zone transfer. By syncing the zone files on a primary DNS server and a secondary DNS server, zone transfer offers fault tolerance.

Learn more about zone transfer:

https://brainly.com/question/14869816

#SPJ4

Miguel decides to revise his research question to focus on this new information. Which question best supports his new goal? can smiling be perceived as negative? when and why do people respond critically to smiles? what types of persuasive strategies do people use on others? how do people feel when others smile at them?.

Answers

The query Can smile be viewed as negative best supports his new objective. Miguel decides to revise his research question to reflect this new information.

The term "query processing" refers to the creation and execution of a query specification, which is typically defined in a declarative database query language like the structured query language (SQL). There are two phases involved in query processing: compile-time and run-time. An executable programme is created from the query specification at build time by the query compiler. This translation process (commonly referred to as query compilation) includes a query optimization and code generation phase in addition to lexical, syntactical, and semantic analysis of the query definition. Physical operators for a database machine make up the majority of the code produced. By using these operators, data access, joins, selects, projections, grouping, and aggregation are implemented. The database engine runs at runtime.

Learn more about query here:

https://brainly.com/question/20262474

#SPJ4

What are examples of romanesque metalwork? discuss how they are created and what they represent.

Answers

The Romanesque style can be seen in the apse wall painting from the church of San Clemente.

What is romanesque metalwork?Depending on local stone and building traditions, the materials used in Romanesque architecture vary across Europe. Brick was widely used in Italy, Poland, much of Germany, and parts of the Netherlands. Other materials such as limestone, granite, and flint were widely used in other areas.One of the Romanesque style's principles was to lay the individual stones of ecclesiastical buildings in closely-set courses; however, in Worms, we see a tendency - which culminated in Bamburg and Naumburg - to soften and enrich the rigid construction with ornamental masonry forms.Towering round arches, massive stone and brickwork, small windows, thick walls, and a preference for housing art and sculpture depicting biblical scenes characterise Romanesque architecture.

To learn more about Romanesque style refer to :

https://brainly.com/question/23452163

#SPJ4

Answer: May vary.

Explanation:  My example.

Romanesque metalwork encompasses a variety of objects created during the Romanesque period, which lasted from approximately the 10th to the 12th century in Europe. This period was characterized by a revival of artistic and architectural styles inspired by ancient Roman designs. Romanesque metalwork includes items such as reliquaries, censers, processional crosses, and other decorative objects used in religious and secular contexts. These objects serve as valuable artifacts that provide insights into the artistic, cultural, and religious aspects of the time. 

Romanesque metalwork serves as a testament to the artistic skill and cultural values of the time. These objects were created by highly skilled metalworkers who combined various techniques to produce intricate and meaningful pieces. Beyond their aesthetic appeal, these artifacts held religious and symbolic significance, conveying the religious devotion and cultural ideals of the Romanesque period. They offer valuable insights into the religious and social aspects of medieval Europe and continue to be admired for their craftsmanship and historical importance.

Hope this helps! :)  

Which file(s) do you need to encrypt? Select all that apply.
A.txt
B.docx
C.bmp
D.xlsx J
E.pub
F.pptx

Answers

The file(s) you need to encrypt are txt, docx, and xlsx. Information is transformed into secret code through the process of encryption, which conceals the true meaning of the information.

How does encrypt example work?

Sensitive information should be protected from hackers via encryption, which is a key strategy for both individuals and businesses. Websites that transmit credit card and bank account details, for instance, encrypt sensitive data to guard against fraud and identity theft.

What purposes serve lets encrypt?

Global Certificate Authority Let's Encrypt (CA). We facilitate the purchase, renewal, and management of SSL/TLS certificates for individuals and businesses worldwide. Websites can utilize our certificates to provide safe HTTPS connections. Domain Validation (DV) certificates are available from Let's Encrypt.

To know more about encrypt visits :-

https://brainly.com/question/14698737

#SPJ4

Explain the functional organization of elements of a computer system

Answers

Answer:

main memory

control unit

Arithmetic and logical unit

Binary Trees Lab 20 Questions
Submission
o Submit all code and other materials in a single zip file to the appropriate assignment folder on Kodiak.
Goal: Build a system that learns to play a "20 Questions"-like game.
Files
• tree.py - (Do not modify.) Base class for all trees. . binary_tree.py - (Do not modify.) Base class for all binary trees. • linked_binary_tree.py - (Do not modify.) Implementation of a binary tree using linked nodes. • main.py - (Do not modify) Calls play_game() in twenty.py to play the game. • twenty.py - (Modify) Implements the 20 questions game. • training.txt - (Modify) A trace of you training your system. gametree.dat - (Modify) The saved tree generated by your training. Introduction Prior to doing any design, make sure to thoroughly review each of the modules which were distributed with this lab. If anything is unclear about these dasses, ask! Your textbook describes these classes in further detail in Sections 8.1-8.3. Problem You may have seen online games that purport to be "psychic," with the ability to correctly guess any item or character that you may be thinking of by asking yes/no questions of the player. Your goal is to write a program that can play this game, in part by learning about a universe of your choice as it plays by asking yes/no questions. For example, your program might learn about animals by having the following dialogue with its user. (For readability, user responses are shown here in red. The responses also use capital letters, which is not a requirement for this assignment.) Think of an animal, and I will guess it. Does it have legs? yes Is it a cat? yes I win! Continue? yes Think of an animal, and I will guess it. Does it have legs? no Is it a snake? yes I win! Continue? yes Think of an animal, and I will guess it. Does it have legs? no Is it a snake? no I give up. What is it? earthworm Please type a question whose answer is yes for earthworm and no for enake: Does it live underground? Continue? yes Think of an animal, and I will guess it. Does it have legs? no Does it live underground? no Is it a snake? no I give up. What is it? fish Please type a question whose answer is yes for fish and no for snake: Does it live in water? Continue? no The program begins with minimal knowledge about animals: It knows that cats have legs and snakes do not. When the program incorrectly guesses "snake" the next time, it asks for the answer and also asks for a way to distinguish between snakes and earthworms. The program builds a binary tree of questions and animals. A "yes" response to a question is stored in the question's left child; a "no" response to a question is stored in the question's right child Task Extend make a child class of) the Linkedinaryfree class to create a data structure that supports this game. Make use of the protected methods in LinkedBinaryTree to modify the tree structure. You may name your class anything you wish, though your module must be named twenty.py. Additionally, you must have a play_game () function in the module (not your class) that allows the user to play when it is called. We want to avoid having to retrain the system from scratch every time we play the game. So we'll save and load the tree to and from a file. BinaryTree (which you are extending) already has methods for saving and loading the tree: save_tree() and load_tree(). The examples below demonstrate how to use them. Save a tree to gametree.dat mytree.save_tres('gametree.dat') Load a tree from gametree.dat mytree = BinaryTree.load_tree 'gametree.dat's These methods read and write binary files. So you will not be able to read them in a plain text editor When the game first begins, ask if they want to load a file, and if so ask for the filename. Would you like to load a game? yes What file should I load? gametree.dat When the game ends, ask if the user would like to save the file, and if so ask for the filename to save the tree to. Would you like to save the game? yes What Eile should I save to (I will overwrite it)? gametree. dat import linked_binary_tree # Define your class here. Give it a better name than A, # and make sure it extends LinkedBinary Tree. class A: def play_game): # Game logic here. # Feel free to create other methods, modules and classes. | Provide a session log of you training your system from scratch. Just copy and paste your interaction with your program.

Answers

The binary tree is implemented using the following class to represent nodes in the tree. Please read the comment to learn how it is used.

/**

* A class to represent nodes in the binary tree that

* holds the questions.  There are actually two types

* of nodes, depending on the value of the finalAnswer

* field.  

*

* If finalAnswer is true, then the node represents a guess

* by the computer, and the question field should contain only

* the name of the item that is being guessed, such as "a dog"

* or "a tube worm".   In this case, the node is a leaf, and the

* yes and no fields are ignored.

*

* If finalAnswer is false, then the node represents a

* question that the computer will ask.  The question field

* contains the complete question, such as "Is it a mammal?"

* or "Are you thinking of a mammal?".  The yes and no fields

* point to the subtrees that correspond to the answers "yes"

* and "no" to the question.

*/

private static class TreeNode {

boolean finalAnswer;

String question;

TreeNode yes;

TreeNode no;

}

Note that this class uses yes and no as pointers to the left and right subtrees. Also, note that only nodes in which finalAnswer is false have subtrees; nodes in which finalAnswer is true are leaves on the tree.

To learn more about TREE NODES please click on below link.

https://brainly.com/question/30224516

#SPJ4

7.3.5 Compare an MD5 Hash CIT 180 lab.

Answers

The MD5 hash will always be a 128-bit length. The hash calculation includes a step called padding, which converts a single letter into a 32-character output.

Why is MD5 no longer advised for use?

Since security experts have shown methods that can easily produce MD5 collisions on commercially available hardware, MD5 hashing, although initially created as a cryptographic message authentication code algorithm for use on the internet, is no longer thought to be trustworthy for use as a cryptographic checksum.

What makes SHA 512 superior to MD5?

The system is further protected by the SHA-512 algorithm's far stronger hashing than MD5 since it makes it more difficult for an attacker to crack passwords.

To know more about Hash visit:-

https://brainly.com/question/29970427

#SPJ1

Other Questions
What is the name of the writing system of ancient India? HELP I HAVE 14 MINUTES!!Which of the following combinations go together to create true statement about subatomic particles?a - protonb - neutronc - electrond - no chargee - positive chargef - negative chargeg - has massh - has no massGroup of answer choices1) b, d, and h2) a, e, and h3) b, d, and g4) c, d, and h What would be a good play (theater) to analyze and most importantly - be fun to watch? Write the vertex form of the quadratic equation.y=x 6x + 5 An angle measures 170. Through what fraction ofa circle does the angle turn? anyone knows this?!!? HELP ASAP WILL GIVE BRAINLEST TO CORRECT ANSWERWhat is the circumference of a circle with a diameter of 3 feet? Use 3.14 for pi diameter = 3 ft A. 4.71 ft B. 9.42 ft C. 18.84 ft D. 7.07 ft Please help ASAP! giving 100 points Use a decimal number to describe the shaded amount.0.20.50.050.15 elabora la sopa de letras por fa la necesito urgente 7/10 - ___ + 3/2 = 6/5 ??????Help me please What is X?in decimal form plz Tap the word that "them"refers to.Listening to theRainforestby John CrossinghamRainforests are well known for being hot spots forbiodiversity. In other words, if you're looking for lots ofcreatures both in terms of total numbers and speciesvariety-these habitats are where you want to be. It's oneof the biggest reasons why activists want to keep themsafe and healthy. Another reason-one we should all careabout--is that rainforests play a role in keeping our planethealthy by absorbing harmful carbon dioxide andreleasing oxygen, which we need to survive Any help on this?Y=3x+7 Y=x+1 Read the paragraph.Several species of geese fly south in the winter to find food and mate. In fact, several geese from canada make their nests at Bartholomew park, which is only minutes from my home. My friends and I often take picnic lunches there to feed them and see their hatchlings. Of course, the number of birds in my area dwindles significantly once the seasons change.Which sentence from the paragraph contains capitalization errors?Several species of geese fly south in the winter to find food and mate.In fact, several geese from canada make their nests at Bartholomew park, which is only minutes from my home.My friends and I often take picnic lunches there to feed them and see their hatchlings.Of course, the number of birds in my area dwindles significantly once the seasons change. How did the importation of African slaves impact the development of Latin America? What are the solutions of the quadratic equation below?x-4x-6=0 A circle of a radius r,cm inside a square, so that the circle touches the sides of the square. a) calculate the area of the shaded region when r=6 Which best explains how fiber-optic technology has improved communication?It has eliminated the need to send audio data through telephones. It has allowed for faster transmission of Internet signals.It has increased the speed at which light travels through space. It has reduced societys reliance on devices such as computers and cell phones. Q1.How many peaks are there in the 13C NMR spectrum of 1,4-dimethylbenzene?A: 8B: 4C: 3D: 2 Kennedy appointed his brother, Robert, to serve as