Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?

Answers

Answer 1
Frank discovers a keylogger hidden on the laptop of his company’s chief executive officer. What information security principle is the keylogger most likely designed to disrupt?
Answer 2

The information security principle that the keylogger most likely designed to disrupt is confidentiality.

Keyloggers are often called keystroke loggers. They are software programs or hardware devices that monitors the activities that is the keys pressed by an individual using a keyboard.

Keyloggers are known to be a form of spyware where computer users are unaware their actions are being tracked.

Conclusively, A keylogger Trojan virus is a program that logs keystrokes. it infects computer by tracking every single keystroke you enter through your keyboard, including passwords and usernames.

Learn more from

https://brainly.com/question/20877093


Related Questions

Using Python code.
Fill in the gaps in the nametag function so that it uses the format method to return first_name and the first initial of last_name followed by a period. For example, nametag("Jane", "Smith") should return "Jane S."
def nametag(first_name, last_name):
return("___.".format(___))
print(nametag("Jane", "Smith"))
# Should display "Jane S."
print(nametag("Francesco", "Rinaldi"))
# Should display "Francesco R."
print(nametag("Jean-Luc", "Grand-Pierre"))
# Should display "Jean-Luc G."

Answers

Answer:

def nametag(first_name, last_name):

return("{} {[0]}.".format(first_name, last_name))

print(nametag("Jane", "Smith"))

# Should display "Jane S."

print(nametag("Francesco", "Rinaldi"))

# Should display "Francesco R."

print(nametag("Jean-Luc", "Grand-Pierre"))

# Should display "Jean-Luc G."

Explanation:

First you must think about that the question ask about the first letter for last_name, remember [0] is the first letter not [1], the other part is about format function and its order

The format method to return first_name and the first initial of last_name followed by a period in python is represented as follows:

def nametag(first_name, last_name):

  return '{} {}.'.format(first_name, last_name[0])

print(nametag("Jane", "Smith"))

print(nametag("Francesco", "Rinaldi"))

print(nametag("Jean-Luc", "Grand-Pierre"))

A function named nametag is declared with the arguments first_name and last_name.

Then it returns the first name and the initial of the last_name using the .format method.

Then we call the function using the print statement with the arguments.

learn more on python code; https://brainly.com/question/17184408?referrer=searchResults

Which complaints was stated by some Strategic Defense Initiative Organization (SDIO) board members about the software of the Strategic Defense Initiative (SDI)?

Answers

Answer:

they complained that it threatened the Mutually assured destruction (MAD) approach.

Explanation:

For example, the Strategic Defense Initiative (SDI) allowed for a swift response if the United Nations came under attack, by deploying ballistic strategic nuclear weapons.

However, the Mutually assured destruction (MAD) approach demanded that there should be restraint in using nuclear weapons, especially when there is a threat of another Nation.

Write a program to complete the task given below: Ask the user to enter any 2 numbers in between 1-10 and add both of them to another variable call z. Use z for adding 30 into it and print the final result by using variable results.

Answers

Answer:

a = int(input("Enter first value between 1 - 10"))

b = int(input("Enter second value between 1 - 10"))

z = a + b

z += 30

print("The value of z = ", z)

Explanation:

The code is written above in python language to perform the given task.

Now, let us explain each statement of code.

Step 1: The first two lines take input from the user prompting the user to enter the values between 1 to 10.

Then the values are type casted to int using int().

The values are stored in variables a and b.

Step 2: Then, the values of a and b are added to get another variable z.

Step 3: The statement 'z += 30' is equivalent to z = z+30

It adds 30 to the variable z and stores it in the same variable z.

Step 4: Finally the value of variable 'z' is printed using print() command.

Which of the following corresponds to the computer interface technology that uses icon, etc?
A. CUI
B. CAI
C. GDI
D. GUI

Answers

Answer:

D) GUI

Explanation:

GUI an acronym for Graphical user interface, is a type of user interface where a user interacts with a computer or an electronic device through the use of graphics. These graphics include icons, images, navigation bars etc.

GUIs use a combination of technologies and devices to create a layout that users can interact with and perform tasks on. This makes it easier for users who do have basic computer skills to utilize.

The most common combination of these elements is the windows, icons, menus and pointer paradigm (WIMP) . GUIs are used in mobile devices, gaming devices, smartphones, MP3 players etc.

Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both single words. Then the program outputs last name, comma, first name. End with newline. Example output if the input is: Maya Jones

Answers

Complete Question:

Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, first name. End with newline.  

Example output if the input is: Maya Jones

Jones, Maya

In C++

Answer:

The program written in C++ is as follows

#include<iostream>

using namespace std;

int main(){

string lname, fname;

cout<<"First name: ";

cin>>fname;

cout<<"Last name: ";

cin>>lname;

cout<<lname<<", "<<fname;

return 0;

}

Explanation:

This line declares lname, fname as string to get the user's last name and first name, respectively

string lname, fname;

This line prompts the user for first name

cout<<"First name: ";

This line gets the user first name

cin>>fname;

This line prompts the user for last name

cout<<"Last name: ";

This line gets the user last name

cin>>lname;

This line prints the desired output

cout<<lname<<", "<<fname;

The program in Python is

person_name = input("Enter your first name and last name separated

                           by space: ")

split_names = person_name.split( )

first_name = split_names[0]

last_name = split_names[1]

print(last_name + ", " + first_name)

The first line of the program requests the first and last names as a single string, separated by a space.

The next line splits the name into first and last names

Finally, the print statement displays the names reversed, but separated with a comma

See another example of a Python program here: https://brainly.com/question/21861447


How SDN is different from a normal network setup?

Answers

Answer:

I hope this is right (one difference)

SDN is software based whereas normal network setup is mostly hardware based

Pls ask me if you want another differrence! :)

PLS MARK AS BRAINLIEST

The final step of the decision-making model is to make your decision and take action.​

Answers

Answer:

No, it is not the final step in decision-making model. It is rather the penultimate stage of the model of decision making.

Explanation:

The final step of the decision-making model is reviewing your decision and its consequences. The decision-making model has total of 7 steps. One should follow these all the steps to make it error free and more efficient then it rather would have been when the decision was made without following it.

The very first step of this model is to identify the decision. And it is one of the most important steps to be followed to avoid any error.  

1. For what purposes do you use the internet? State at least 3. 2. What is the benefits of using the internet? State atleast 3 with explanations. 3. What website do you mainly use? How often do you visit these website? 4. What browser do you use for searching information in the web? 5. Have you tried communicating through the internet? If yes, how did the internet improve your communication with others? ANSWER IN 5 SENTENCES 6. It is true that the coming of the internet has brought us even more opportunities compared than before but what is your opinion about its influence on the people of this modern world, especially younger generations? ANSWER IN 5 SENTENCES non se nse, unacceptable or inapropriate answers will be r e por ted :) mind you

Answers

Explanations

__________________________________________________________

1: Education, entertainment, notifications, etc.

2: The internet is a fast, easy and effeciant way to communicate. other reasons may be for banking purposes, online grocery shopping, etc.

3 & 4: Self answerable questions.

5: Common communication nowadays is texting, phone calls, etc. It's easier to press a button or two to send out information than what it used to be. For example, it often took days, weeks, and even months for messages to be sent from one location to a far-flung position.

6: ( MY OPINION ) I feel like the internet is (in a lot of ways) bad for the  younger generation and the ( soon to come ). There are alot of online predators, blogs/websites that have inappropriate content. It's quite easy for a teen to just go to a po**ographic site nowadays, type in his/her email and just simply watch it like that. Some of them don't require sign up to view videos, images, gifs. And about the online predator situation, a lot of teenagers (girls AND boys) often feel pressured into sending images of themselves now.

__________________________________________________________

1. For what purposes do you use the internet? State at least 3. 2. What is the benefits of using the internet? State atleast 3 with explanations. 3. What website do you mainly use? How often do you visit these website? 4. What browser do you use for searching information in the web? 5. Have you tried communicating through the internet? If yes, how did the internet improve your communication with others? ANSWER IN 5 SENTENCES 6. It is true that the coming of the internet has brought us even more opportunities compared than before but what is your opinion about its influence on the people of this modern world, especially younger generations? ANSWER IN 5 SENTENCES non se nse, unacceptable or inapropriate answers will be r e por ted :) mind you

Answers

Answer:

1) communication

  entertainment

  sharing information and news

2) helps to easily get access to any sort of information

   we can easily come to know the recent happenings in the world

   helps to communicate with people living in other countries

   helps in earning money through online jobs

3) wiki(wikipedia) whenever needed

4) google chrome

5) yes.

   sorry i don know what to say

6) i think internet has both good and bad effects on younger generations.its helping them with their work but also kind of misleading them too.

Explanation:

definition of letter in communication skills

Answers

Answer:

Explanation:A letter is a written message conveyed from one person to another person through a medium. Letters can be formal and informal. Besides a means of communication and a store of information, letter writing has played a role in the reproduction of writing as an art throughout history.

Answer:

A letter is a written message conveyed from one person to another person through a medium. Letters can be formal and informal. Besides a means of communication and a store of information, letter writing has played a role in the reproduction of writing as an art throughout history.

Excellent written and verbal communication skills. Confident, articulate, and professional speaking abilities (and experience) Empathic listener and persuasive speaker. Writing creative or factual. Speaking in public, to groups, or via electronic media. Excellent presentation and negotiation skills.

Vector testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full credit is 100, so anything over 100 is extra credit. Ex: If testGrades = {101, 83, 107, 90}, then sumExtra = 8, because 1 + 0 + 7 + 0 is 8.

Answers

Answer:

Here is for loop that sets sumExtra to the total extra credit received. I am writing a program in C++

for(i = 0; i <= testGrades.size() - 1; i++){

  if(testGrades.at(i) > 100){

      sumExtra = sumExtra + (testGrades.at(i) - 100);   } }

Explanation:

The complete program is:

#include <iostream> //to use input output functions

#include <vector> //to use vectors

using namespace std; //to identify objects like cin cout

int main() { //start of main function

const int NUM_VALS = 4; // sets the value of NUM_VALS as a constant to 4

vector<int> testGrades(NUM_VALS); // initialize the vector of int (integer) type

int i = 0; // i is initialzed to 0

int sumExtra = 0; //stores the total extra credit

testGrades.at(0) = 101; //sets 101 at first position in vector

testGrades.at(1) = 83; //sets value 83 at second position

testGrades.at(2) = 107; //sets value 107 at third position

testGrades.at(3) = 90; //sets value 90 at fourth position

for(i = 0; i <= testGrades.size() -1; i++){ //loop iterate through each value of in a vector testGrades

  if(testGrades.at(i) > 100){ // if the value in a vector exceeds 100

      sumExtra = sumExtra + (testGrades.at(i) - 100);   } } //computes total extra credit

cout << "sumExtra: " << sumExtra << endl;} //displays the value of computed total extra credit in output

The loop works as follows:

In the first iteration the value of vector testGrades at(i) is at(0) = 101.

if statement checks if this value/element is greater than 100. This is true as 101 > 100. So sumExtra = sumExtra + (testGrades.at(i) - 100); statement is executed in which 100 is subtracted from that element and the result is added to the sumExtra. sumExtra is initialized to 0 so the value of sumExtra becomes: 0+ 101 - 100= 1 So the value of sumExtra = 1

In the second iteration the value of i = 1 and it is positioned at 2nd value of vector testGrades i.e. 83. Then if statement checks if this value/element is greater than 100. This is false as 83 < 100. So the value of sumExtra = 1

In the third iteration the value of i = 2 and it is positioned at 3rd value of vector testGrades i.e. 107. Then if statement checks if this value/element is greater than 100. This is true as 107 > 100.

sumExtra = sumExtra + (testGrades.at(i) - 100); statement is executed in which 100 is subtracted from that element and the result is added to the sumExtra

sumExtra is 1 so the value of sumExtra becomes: 1+ 107 - 100= 8 So the value of sumExtra = 8

In fourth iteration  the value of i = 3 and it is positioned at 4th value of testGrades vector i.e. 90. Then the if statement checks if this element is greater than 100. This is false as 90 < 100. So the value of sumExtra remains 8.  

Finally the loop breaks as the value of i becomes 4. So the output is 8.

Answer:

sumExtra = 0;

   for (i = 0; i < NUM_VALS; ++i) {

     if (testGrades[i] >= 101) {

     sumExtra += (testGrades[i] - 100);

     }

   }

   cout << "sumExtra: " << sumExtra << endl;

Explanation:

Error messages are a key part of an overall interface design strategy of guidance for the user. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application.

Answers

Answer:

Answered below

Explanation:

In order to not discourage the user, error messages must be implemented in a user-friendly way with the use of strategies which ensure coordination, consistency and simplicity.

Error messages should be short, direct and communicate clearly, the right amount of information to a user. These messages should be sorted into categories which represent different kinds of errors. These specific categories should have a brief alphanumeric code that can be easily shared with a customer support personnel for solution and also to help users search for solutions themselves, on the internet.

Java provides a number of interfaces and classes to systematically implement collections.

a. True
b. False

Answers

Answer:

A) True

Explanation:

Java provides collections architecture or framework used to store and manipulate a group of objects or collections.

The collection framework has interfaces which include; Set, Queue, Deque, List, as well as classes which include; Hashset, ArrayList, LinkedList, LinkedHashset, PriorityQueue, Vector and TreeSet.

There are also many methods declared in the collection interface which include; add(), addAll(), remove(), removeAll(),retainAll(), clear(), size(), iterator(), toArray() etc

Can folders have mixed apps?

Answers

Answer:

what

Explanation:

The figure below shows a black and white image with a resolution of 720×504. Identify how much memory (in bits) will be occupied by this image in the hard drive of your computer, if it is stored. (2 marks)

Answers

Answer:

362880

Explanation:

In black and white images each pixel is 1 bit. You need to first find the total number of pixels, to do this you multiply the width and length of the picture (720x504) and you will get 362880. From there you would multiply the amount of pixels by how many bits each pixel is. In this case, since its black and white you multiply it by 1, which is 362880.

Assume the following Python code has already executed.
import os
cwd = os.getcwd()
Which answer is most likely output from the following Python statement?
os.path.join(cwd, 'Documents/file.txt')
Select one:
a. ['Music', 'Pictures', 'Desktop', 'Library', 'Documents', 'Downloads']
b. False
c. True
d. /Users/me
e. /Users/me/Documents/file.txt

Answers

e. /Users/me/Documents/file.txt

The Python statement is an illustration of file manipulations

The output from the Python statement is: (e) /Users/me/Documents/file.txt

From the given statement, the first line imports the Python os module.

While the second line gets the current working file path.

So, the statement os.path.join(cwd, 'Documents/file.txt') means that:

The current working file path is Documents/file.txt

Hence, the output from the Python statement is: (e) /Users/me/Documents/file.txt

Read more about file manipulations at:

https://brainly.com/question/19386916

#We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns its length. However, you may not use #Python's built-in len function. # #Finish our code. We are missing the base case and the #recursive call. # #HINT: Often when we have recursion involving strings, we #want to break down the string to be in its simplest form. #Think about how you could splice a string little by little. #Then think about what your base case might be - what is #the most basic, minimal string you can have in python? # #Hint 2: How can you establish the base case has been #reached without the len() function? #You may not use the built-in 'len()' function.

Answers

Answer:

Here is the Python program:

def measure_string(myStr):  #function that takes a string as parameter

   if myStr == '':  #if the string is empty (base case)

       return 0  #return 0

   else:  #if string is not empty

       return 1 + measure_string(myStr[0:-1])  #calls function recursively to find the length of the string (recursive case)

#in order to check the working of the above function the following statement is used        

print(measure_string("13 characters")) //calls function and passes the string to it and print the output on the screen        

Explanation:

The function works as following:

Suppose the string is 13 characters

myStr = "13 characters"

if myStr == '': this is the base case and this does not evaluate to true because myStr is not empty. This is basically the alternate of

if len(myStr) == 0: but we are not supposed to use len function here so we use if myStr == '' instead.

So the program control moves to the else part

return 1 + measure_string(myStr[0:-1])  this statement is a recursive call to the function measure_string.

myStr[0:-1] in the statement is a slice list that starts from the first character of the myStr string (at 0 index) to the last character of the string (-1 index)

This statement can also be written as:

return 1 + measure_string(myStr[1:])

or

return 1 + measure_string(myStr[:-1])  This statement start from 1st character and ends at last character

This statement keeps calling measure_string until the myStr is empty. The method gets each character using a slice and maintains a count by adding 1 each time this statement is returned.The function breaks string into its first character [0:] and all the rest characters [:-1]. and recursively counts the number of character occurrences and add 1. So there are 13 characters in the example string. So the output is:

13

Why would you set up a workbook to be shared if you are the only one using the workbook?

a. You can send emails of your edits to yourself.
b. You can track changes.
c. You can make a draft copy of the workbook.
d. You can password protect the workbook.

Answers

Answer:

b. You can track changes.

Explanation:

Setting up a workbook to be shared if you are the only one using the workbook is to enable you track the changes that may occur.

When sharing a workbook, you can allow users gain access to it, make changes and then you easily track those changes.

It makes a team to work simultaneously on the same workbook.

A work book is a file that consists of more than work sheet that helps you to organize A workbook can be created from a blank workbook or a template.

MS excel has a collection of many work books and many worksheets that can help in keeping the track of changes. They are arranged in a network of rectangle cells. In the tabular form of rows and columns.

Hence the option B is correct.

Learn more about the set up of a workbook to be shared if you.

brainly.in/question/20376644.

Explain 3 ways you can be an upstander when seeing cyberbullying.

Answers

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

Call them out

Report them to someone

Or block them

Write a copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *this. Sample output for the given program:

Answers

Answer:

Here is the copy assignment operator for CarCounter:

CarCounter& CarCounter::operator=(const CarCounter& objToCopy) {

carCount = objToCopy.carCount;

return *this;  }

The syntax for copy assignment operator is:

ClassName& ClassName :: operator= ( ClassName& object_name)

In the above chunk of code class name Is CarCounter and object name is objToCopy.

Assignment operator = is called which assigns objToCopy.carCount to the new objects's carCount.

This operator basically is called when an object which is already initialized is assigned a new value from another current object.

Then return *this returns the reference to the calling object

Explanation:

The complete program is:

#include <iostream>  //to use input output functions

using namespace std;   //to access objects like cin cout

class CarCounter {  //class name

public:  // public member functions of class CarCounter

CarCounter();  //constructor of CarCounter

CarCounter& operator=(const CarCounter& objToCopy);  //copy assignment operator for CarCounter

void SetCarCount(const int setVal) {  //mutator method to set the car count value

carCount = setVal;  } //set carCount so setVal

int GetCarCount() const {  //accessor method to get carCount

return carCount;  }  

private:  //private data member of class

int carCount;  };    // private data field of CarCounter

CarCounter::CarCounter() {  //constructor

carCount = 0;  //intializes the value of carCount in constructor

return; }  

// FIXME write copy assignment operator  

CarCounter& CarCounter::operator=(const CarCounter& objToCopy){

/* copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *this */

carCount = objToCopy.carCount;

return *this;}  

int main() {  //start of main() function

CarCounter frontParkingLot;  // creates CarCounter object

CarCounter backParkingLot;   // creates CarCounter object

frontParkingLot.SetCarCount(12);  // calls SetCarCount method using object frontParkingLot to set the value of carCount to 12

backParkingLot = frontParkingLot;  //assigns value of frontParkingLot to backParkingLot

cout << "Cars counted: " << backParkingLot.GetCarCount();  //calls accessor GetCarCount method to get the value of carCount and display it in output

return 0;  }

The output of this program is:

Cars counted = 12

The balanced F measure (a.k.a. F1) is defined as the harmonic mean of precision and recall. What is the advantage of using the harmonic mean rather than "averaging" (using the arithmetic mean)?

Answers

Answer:

Because the value derived from harmonic mean reflects the credible result of search engine

Explanation:

Given that the value of arithmetic mean tends to be closer to the highest value between Precision and Recall, while the value of the harmonic mean, is the lowest value between Precision and Recall, in a situation where all documents relevant to a query are returned, where R = 1 and P is closer to 0, the arithmetic mean will be greater than 0.5 and will not reflects the credible result of search engine

However, if the harmonic mean is utilized, the value will be closer to the low Precision value, hence it closely reflects the credible result of search engine

"If someone really wants to get at the information, it is not difficult if they can gain physical access to the computer or hard drive." - Microsoft White Paper, July 1999. Is this statement categorically true or just true in most cases

Answers

Answer:

It is  just true in most cases

Explanation:

This statement is just true in most cases because in some cases having a physical access to the computer or hard drive this does not guarantee access to the information contained in the hard drive or computer because the data/information in the hard drive or computer might as well be encrypted and would require a password in order to de-crypt the information.

Having a physical access is one step closer in some cases but not the only step required .

Referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relationships.
a) true
b) false

Answers

Answer:

a) true

Explanation:

In Computer programming, integrity constraints can be defined as a set of standard rules that ensures quality information and database are maintained.

Basically, there are four (4) types of integrity constraints and these are;

1. Key constraints.

2. Domain constraints.

3. Entity integrity constraints.

4. Referential integrity constraints.

Referential integrity is a property of data which states that each foreign key value must match a primary key value in another relation or the foreign key value must be null.

For instance, when a foreign key in Table A points to the primary key of Table B, according to the referential integrity constraints, all the value of the foreign key in Table A must be null or match the primary key in Table B.

Hence, the referential Integrity constraints ensures that the relationship between the data in a table is consistent and valid.

Hence, referential integrity constraints are concerned with checking INSERT and UPDATE operations that affect the parent child relationships.

This ultimately implies that, referential Integrity are rules used in database management systems (DBMS) to ensure relationships between tables when records are changed is VALID (INSERT and UPDATE).

In a nutshell, it always ensures a primary key must have a matching foreign key or it becomes null.

In this exercise we have to analyze the integrity that some constraints have, so the alternative that best matches is;

True

In Computer plan out, uprightness constraints maybe delineate as a set of standard rules that guarantee kind information and collection of data happen uphold. Basically, skilled are four (4) types of completeness restraint and these exist;

Key constraints. Domain constraints. Entity integrity constraints. Referential integrity constraints.

Referential honor exist a property of information in visible form that states that each irrelevant key value must equal a basic key profit in another family connection or the from another country key profit must be ineffectual.

For instance, when a experience transfer data from one computer system to another Table A points to the basic key of Table B, in accordance with the referential purity restraint, all the worth of the from another country transfer data from one computer system to another Table A must exist valueless or counterpart the basic transfer data from one computer system to another Table B.

Hence, the referential Integrity restraint make secure that the relationship middle from two points the information in visible form in a table exist compatible and right. Hence, referential integrity restraint exist concerned with restrain INSERT and UPDATE movement that influence the parent very young person connection.

This eventually indicate that, referential Integrity are rules secondhand fashionable collection of data management structure (DBMS) to make secure friendship middle from two points tables when records are transformed exist VALID (INSERT and UPDATE). In a nutshell, it forever ensures a basic key must bear a equal foreign key or it enhance ineffectual.

See more about integrity at brainly.com/question/14406733

Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text

Answers

Answer:

HTML, CSS, JavaScript, python, SQL

Explanation:

To create a web page for her travel adventures Dani has to use HTML and CSS to design the page's layout. A beautiful simple design such as one which shows photos of her on her travel destinations, and a paragraph for her to write a little story on her travels would do.

Dani needs JavaScript to animate the photos she's going to post on the page. Dani also should use python to build the backend of her page so she can write codes to save and access her documented adventures from the database. She should use a database language like SQL to save all of her adventures so she can view them at a later time for the memories.

Answer:

Dani should use HTML

Explanation:

If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can''t steal user''s information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.

Answers

Answer:

No, hackers can steal information from cookies. This many times depend on the type of cookies.

Cookies, by general definition, are programs embedded onto browsers which collect non-invasive information about our activities such so that it can adapt to our needs.

The type of information that a cookie collects depends on what type of cookie it is.

Session Cookies: These types of cookies only collect information about the movement of the user on the website such as pages visited, products that were examined (for e-commerce websites) and products/services that the user put in their cart.

These type of cookies are temporary and are deleted as soon as the browser is shut down.

Persistent Cookies:

These do the same thing that the Session cookies do only that they are more permanent and are stored in a text file even after the browser and the computer has been shut down.

It is these types of cookies that pose a threat. These type of cookies many store codes and passwords and log-in details which may be exploited by a hacker.

Cheers!

what keyboard command that will allow you to copy text

Answers

Answer:

Control + c

Explanation:

If you click and drag over text to highlight it and press on the control or command key (CTRL) and the "C" key, it will copy the text. When you want to paste it, you press control or command key (CRTL) and key "V" at the same time.

A smart refrigerator can use _____ to detect when you are running low on milk, and then send a reminder to you on a wireless network.

Answers

Answer:

IoTs

Explanation:

If you were the IT manager for a large manufacturing company,what issues might you have with the use of opensource software? What advantage might there be for use of such software?

Answers

Answer: Having the ability to change the source code to fit your needs

Explanation:

Which advantage of database processing makes it easier to make a change in the database structure?

Answers

Answer:

I HOPE IT WORK

Explanation:

An advantage of using the database approach to processing is that it facilitates consistency. True. Users never interact with a database, directly; database interaction is always through the DBMS

The factorial of a nonnegative integer n is written n ! (pronounced "n factorial") and is defined as follows: n ! = n · (n - 1) · (n - 2) · … · 1 (for values of n greater than or equal to 1) and n ! = 1 (for n = 0). For example, 5! = 5 · 4 · 3 · 2 · 1, which is 120.
a) Write a program that reads a nonnegative integer and computes and prints its factorial.
b) Write a program that estimates the value of the mathematical constant e by using the formula:
e = 1 + 1/1! +1/2! + 1/3! +.......
c) Write a program that computes the value of by using the formula
e^x = 1 + x/1! + x^2/2! + x^3/3! +.......

Answers

Answer:

Here are the programs. I am writing C++ and Python programs:

a)

C++

#include<iostream>   

using namespace std;    

int factorial(int number)  {  

   if (number == 0)  

       return 1;  

   return number * factorial(number - 1);  }    

int main()  {  

   int integer;

   cout<<"Enter a non negative integer: ";

   cin>>integer;

   cout<< "Factorial of "<< integer<<" is "<< factorial(integer)<< endl;  }

Python:

def factorial(number):  

   if number == 0:  

       return 1

   return number * factorial(number-1)  

integer = int(input("Enter a non negative integer: "))  

print("Factorial of", integer, "is", factorial(integer))

b)

C++

#include <iostream>  

using namespace std;

double factorial(int number) {  

if (number == 0)  

 return 1;  

return number * factorial(number - 1); }  

 

double estimate_e(int num){

    double e = 1;

    for(int i = 1; i < num; i++)

     e = e + 1/factorial(i);

     cout<<"e: "<< e; }  

 

int main(){

int term;

cout<<"Enter a term to evaluate: ";

cin>>term;

estimate_e(term);}

Python:

def factorial(number):  

   if number == 0:  

       return 1

   return number * factorial(number-1)  

def estimate_e(term):

   if not term:

       return 0

   else:

       return (1 / factorial(term-1)) + estimate_e(term-1)

number = int(input("Enter how many terms to evaluate "))

print("e: ", estimate_e(number))

c)

C++

#include <iostream>

using namespace std;

int main(){

   float terms, sumSeries, series;

   int i, number;

   cout << " Input the value of x: ";

   cin >> number;

   cout << " Input number of terms: ";

   cin >> terms;

   sumSeries = 1;

   series = 1;

   for (i = 1; i < terms; i++)      {

       series = series * number / (float)i;

       sumSeries = sumSeries + series;     }

   cout << " The sum  is : " << sumSeries << endl;  }  

Python    

def ePowerx(number,terms):

   sumSeries = 1

   series =1

   for x in range(1,terms):

       series = series * number / x;

       sumSeries = sumSeries + series;

   return sumSeries    

num = int(input("Enter a number: "))

term=int(input("Enter a number: "))

print("e^x: ",ePowerx(num,term))

Explanation:

a)

The program has a method factorial that takes numbers as parameter and computes the factorial of that number by using recursion. For example if the number = 3

The base case is  if (number == 0)

and

recursive is return number * factorial(number - 1);    

Since number = 3 is not equal to zero so the method calls itself recursively in order to return the factorial of 3

return 3* factorial(3- 1);

3 * factorial(2)

3* [2* factorial(2- 1) ]

3 * 2* [ factorial(1)]

3 * 2 * [1* factorial(1- 1) ]

3 * 2 * 1* [factorial(0)]

Now at factorial(0) the base condition is reached as number==0 So factorial(0) returns 1

Now the output is:

3 * 2 * 1* 1

return 6

So the output of this program is

Factorial of 3 is 6

b)

The method estimate_e takes a number i.e. num as parameter which represents the term and estimates the value of the mathematical constant e

The for loop iterates through each term. For example num = 3

then  

e = e + 1/factorial(i);  

The above statement calls works as:

e = 1 + 1/1! +1/2!

since the number of terms is 3

e is initialized to 1

i  is initialized to 1

So the statement becomes:

e = 1 + 1/factorial(1)

factorial function is called which returns 1 since factorial of 1 is 1 So,

e = 1 + 1/1

e = 2

Now at next iteration at i = 2 and e = 2

e = 2 + 1/factorial(2)

e = 2 + 1/2

e = 2.5

Now at next iteration at i = 3 and e =3

e = 3 + 1/factorial(3)

e = 3 + 1/6

e = 3.16666

So the output is:

e: 3.16666

c)

The program computes the sum of series using formula:

e^x = 1 + x/1! + x^2/2! + x^3/3! +...

The for loop iterates till the number of terms. Lets say in the above formula x is 2 and number of terms is 3. So the series become:

e^x = 1 + x/1! + x^2/2!

So number = 2

terms = 3

series =1

sumSeries = 1

i = 1

The statement series = series * number / (float)i; works as following:

series = 1 * 2 /1

series = 2

sumSeries = sumSeries + series;

sumSeries = 1 + 2

sumSeries = 3

At next iteration: i=2, series =2 , sumSeries =3

series = 2 * 2/2

series = 2

sumSeries = 3 + 2

sumSeries = 5

Now the loop breaks as i=3

So output returns the value of sumSeries i.e. 5

Output:

e^x: 5

Other Questions
ab-0.5bab0.5ba, b, minus, 0, point, 5, b when a=1a=1a, equals, 1 and b=5b=5b, equals, 5. Ayayai Mining Company purchased land on February 1, 2020, at a cost of $1,038,200. It estimated that a total of 57,900 tons of mineral was available for mining. After it has removed all the natural resources, the company will be required to restore the property to its previous state because of strict environmental protection laws. It estimates the fair value of this restoration obligation at $111,600. It believes it will be able to sell the property afterwards for $124,000. It incurred developmental costs of $248,000 before it was able to do any mining. In 2020, resources removed totaled 28,950 tons. The company sold 21,230 tons. Compute the following information for 2020. (a) Per unit mineral cost $(b) Total material cost of December 31, 2020, inventory $(c) Total material cost in cost of goods sold at December 31, 2020 $ During germination time seeds need to obtain high-energy food throughA. Stored fats and oilsB. Nutrients found in the soilC. SunlightD. Water found in the soil A preparation that "teaches" the immune system to recognize a disease-causing agent without actually causing disease is termed a(n):__________.A. antibiotic.B. virus.C. antiviral.D. vaccination.E. injection. Which sentence uses the word it's correctly?OA.Mymother saysit's not polite to stare.O B.The car rammed it's front bumper into the tree.O C.The cat carried it's kitten to the kitchen. Find the slope of the line graphed below. in following passage, which words would be considered academic language In this analysis of the works of Edgar Allen poe I present the hypothesis that his one personal demons,including alcohol,drugs, and the death of his wife,fueled his writing. I examine the first- hand comments by colleagues, and evaluate the claim that Poe invented the America short-story form.A. analysis,hypothesis,evaluate,claimB.Fueled,first-hand,inventedC.his own personal demonsD.examine, colleagues, form what was galloways third house of parliment called If there is a loss of balance in biodiversity, describe at least 5 possible consequences for the sustainability of life on earth When a 235 92U 92235U nucleus is bombarded by neutrons (10n01n) it undergoes a fission reaction, resulting in the formation of two new nuclei and neutrons. The following equation is an example of one such fission process: 235 92U+10nAZBa+9436Kr+310n 92235U+01nZABa+3694Kr+301n Enter the isotope symbol for the barium (BaBa) nucleus in this reaction. Express your answer as an isotope. x to the power of 2 = 121 what is x Two students are watching a person riding a skateboard up and down a ramp. Each student shares what they think about the energy of the skateboarder as they ride up and down the ramp. Elisa: I think the skateboarder has the more total energy at the top of the ramp than the bottom of the ramp. Raymond: I think the skateboarder has the same total energy at all points on the ramp. Which student do you agree with? Why? Its zoom help me please god Please help me with this Find the area of this triangle. Round tothe nearest tenth.l Which term refers to marking on a map that runs in an east and west direction and measures distance north and south of the equator Two kids at a summer camp, Tina and Winston, are competing in a potato sack race. Tina is younger, so she is given a head start of 33 meters. When the race starts, Tina hops at a rate of 1 meter per second, and Winston hops 4 meters per second. Eventually, Winston will overtake Tina. How long will that take? How far will Winston have to hop? It will take ___ seconds for Winston to hop ___ meters and catch up to Tina. dancer by vickie sears what point do you think the narrator is making when she says ay the end of the story that molly and greybull and clarissa are both the same age Suppose the average yearly salary of an individual whose final degree is a masters is $36 thousand less than twice that of an individual whose final degree is a bachelors. Combined, two people with each of these educational attainments earn $117 thousand. Find the average yearly of an individual with each of these final degrees. 17 points! please help thanks :)