If you were the IT manager for a large manufacturing company,what issues might you have with the use of opensource software? What advantage might there be for use of such software?

Answers

Answer 1

Answer: Having the ability to change the source code to fit your needs

Explanation:


Related Questions

When enabling IPsec mobile client support, you made some selections in the Xauth section of the interface. What does Xauth stand for

Answers

Answer:

Extended authentication

Explanation:

Xauth = Extended authentication

An extended authentication can cause security to be increased because it requires the user to enter a username and password. These details would then be authenticated at the internal database of the controller. This extension is an ipsec extension which would enable VPN users to enter a username and password. These details would be required of the user while trying to connect and they would be checked against the login details registered by such a user.

If you’re storing some personal information like Debit/Credit card numbers or Passwords etc, on different sites for running you’re E-business. Do you think that cookies are stored and maintain such information on the server-side and hackers can''t steal user''s information from these cookies easily? Do you agree with the above statement? Please give short comments in favor of or against the statement.

Answers

Answer:

No, hackers can steal information from cookies. This many times depend on the type of cookies.

Cookies, by general definition, are programs embedded onto browsers which collect non-invasive information about our activities such so that it can adapt to our needs.

The type of information that a cookie collects depends on what type of cookie it is.

Session Cookies: These types of cookies only collect information about the movement of the user on the website such as pages visited, products that were examined (for e-commerce websites) and products/services that the user put in their cart.

These type of cookies are temporary and are deleted as soon as the browser is shut down.

Persistent Cookies:

These do the same thing that the Session cookies do only that they are more permanent and are stored in a text file even after the browser and the computer has been shut down.

It is these types of cookies that pose a threat. These type of cookies many store codes and passwords and log-in details which may be exploited by a hacker.

Cheers!

Which of the following terms means that the system changes based on
the needs of each learner?
A
Adaptive
B
Mobile-ready
С
Gamified
D
Reactive

Answers

Answer:

A

Explanation:

Should behavioral tracking be legal? Why or why not?

Answers

Answer:

I honestly don't see very many reasons on why it is bad because it's just showing you ads that you might actually want to see instead of some random ad about cats whenever you own a goldfish, but I feel like websites should ask for permission before they do it.

Answer:

     Behavioral Tracking should be legal. I don't see very many reasons as too why behavioral tracking is bad being shown as ads that might actually be useful, but websites should ask for permission before they do it.

Would two bits be enough to assign a unique binary number to each vowel in the English language? Explain.

Answers

Answer:

No.

Explanation:

Since there are 5 vowels, you'd need at least 3 bits to number them. 2 bits give you 2²=4 possibilities, which is 1 short. 3 bits give you 2³=8 possibilities, which fits 5 easily.

The term "bit" means binary digit, and it is used to represent data in a computer system.  

The number of character an n-bit computer can hold is [tex]2^n[/tex]

So, a 2-bit computer can hold a maximum of:

[tex]Max = 2^2[/tex]

[tex]Max = 4[/tex]

i.e. A 2-bit computer can hold a maximum of 4 characters.

The English language vowel are 5 (i.e. letters a, e, i, o and u).

5 is greater than the maximum number of characters the 2-bit computer can hold (i.e. 5 > 4)

Hence, two bits will not be enough to hold each vowel in the English language.

Read more about binary digits at:

brainly.com/question/9480337

Where can you submit a bug report?​

Answers

Answer:

most developers incorporate a report a bug feature, if you cannot find it search online or go to the website on the software.

Explanation:

Which button is used to decrease the contrast for a selected image ?

Answers

Answer:

tab button........... ..

Can folders have mixed apps?

Answers

Answer:

what

Explanation:

You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of:________

Answers

Complete Question:

You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of?

Group of answer choices

A. Wildcard

B. The Tab key

C. Regular expressions

D. The Escape key

Answer:

B. The Tab key

Explanation:

In this scenario, You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will misspell part of it. You can help yourself out via the use of the Tab key.

When working with the command line prompt (cmd) on a Windows, Unix or Linux computer, typing file paths is sometimes difficult or considered to be a burden because they are lengthy (too long) and perhaps confusing to the user. To help yourself out, you can always use the "Tab key" to autocomplete names of directories or file paths in an alphabetical order, while in the command line.

Additionally, pressing the "Tab key" continuously while in the command line would cycle or toggle all available commands in an alphabetical order.

Error messages are a key part of an overall interface design strategy of guidance for the user. Discuss strategies to ensure integrated, coordinated error messages that are consistent across an application.

Answers

Answer:

Answered below

Explanation:

In order to not discourage the user, error messages must be implemented in a user-friendly way with the use of strategies which ensure coordination, consistency and simplicity.

Error messages should be short, direct and communicate clearly, the right amount of information to a user. These messages should be sorted into categories which represent different kinds of errors. These specific categories should have a brief alphanumeric code that can be easily shared with a customer support personnel for solution and also to help users search for solutions themselves, on the internet.

Home communication involves controlling systems such as heating, cooling, and security.
a. True
b. False

Answers

Answer:

A. True

Explanation:

Home communications involves automating home. It includes controlling the air-con,water heater, webcam, etc. A

Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both single words. Then the program outputs last name, comma, first name. End with newline. Example output if the input is: Maya Jones

Answers

Complete Question:

Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, first name. End with newline.  

Example output if the input is: Maya Jones

Jones, Maya

In C++

Answer:

The program written in C++ is as follows

#include<iostream>

using namespace std;

int main(){

string lname, fname;

cout<<"First name: ";

cin>>fname;

cout<<"Last name: ";

cin>>lname;

cout<<lname<<", "<<fname;

return 0;

}

Explanation:

This line declares lname, fname as string to get the user's last name and first name, respectively

string lname, fname;

This line prompts the user for first name

cout<<"First name: ";

This line gets the user first name

cin>>fname;

This line prompts the user for last name

cout<<"Last name: ";

This line gets the user last name

cin>>lname;

This line prints the desired output

cout<<lname<<", "<<fname;

The program in Python is

person_name = input("Enter your first name and last name separated

                           by space: ")

split_names = person_name.split( )

first_name = split_names[0]

last_name = split_names[1]

print(last_name + ", " + first_name)

The first line of the program requests the first and last names as a single string, separated by a space.

The next line splits the name into first and last names

Finally, the print statement displays the names reversed, but separated with a comma

See another example of a Python program here: https://brainly.com/question/21861447

Which of the following code segments will display all of the lines in the file object named infile, assuming that it has successfully been opened for reading?
a. while line in infile :
print(line)
b. while infile in line :
print(line)
c.for infile in line :
print(line)
d. for line in infile :
print(line)

Answers

Answer:

d.

for line in infile :

   print(line)

Explanation:

for loop is used to iterate through the each line of the file using line variable. The file is accessed using the object infile. For example if the file name is "file.txt" and it is opened in read mode. It contains the following lines:

hi there friend

how are you

what are you doing

Then the above given chunk of code gives the following output

hi there friend

how are you

what are you doing

At each iteration each line of the the file is printed on the output screen. The print() method is used to display these lines in output.

Java provides a number of interfaces and classes to systematically implement collections.

a. True
b. False

Answers

Answer:

A) True

Explanation:

Java provides collections architecture or framework used to store and manipulate a group of objects or collections.

The collection framework has interfaces which include; Set, Queue, Deque, List, as well as classes which include; Hashset, ArrayList, LinkedList, LinkedHashset, PriorityQueue, Vector and TreeSet.

There are also many methods declared in the collection interface which include; add(), addAll(), remove(), removeAll(),retainAll(), clear(), size(), iterator(), toArray() etc

Which advantage of database processing makes it easier to make a change in the database structure?

Answers

Answer:

I HOPE IT WORK

Explanation:

An advantage of using the database approach to processing is that it facilitates consistency. True. Users never interact with a database, directly; database interaction is always through the DBMS

Which security scanner runs in a web browser and doesn't require that you install a product before scanning

Answers

Answer:

It’s OSI. also your question cut off lol

Vector testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full credit is 100, so anything over 100 is extra credit. Ex: If testGrades = {101, 83, 107, 90}, then sumExtra = 8, because 1 + 0 + 7 + 0 is 8.

Answers

Answer:

Here is for loop that sets sumExtra to the total extra credit received. I am writing a program in C++

for(i = 0; i <= testGrades.size() - 1; i++){

  if(testGrades.at(i) > 100){

      sumExtra = sumExtra + (testGrades.at(i) - 100);   } }

Explanation:

The complete program is:

#include <iostream> //to use input output functions

#include <vector> //to use vectors

using namespace std; //to identify objects like cin cout

int main() { //start of main function

const int NUM_VALS = 4; // sets the value of NUM_VALS as a constant to 4

vector<int> testGrades(NUM_VALS); // initialize the vector of int (integer) type

int i = 0; // i is initialzed to 0

int sumExtra = 0; //stores the total extra credit

testGrades.at(0) = 101; //sets 101 at first position in vector

testGrades.at(1) = 83; //sets value 83 at second position

testGrades.at(2) = 107; //sets value 107 at third position

testGrades.at(3) = 90; //sets value 90 at fourth position

for(i = 0; i <= testGrades.size() -1; i++){ //loop iterate through each value of in a vector testGrades

  if(testGrades.at(i) > 100){ // if the value in a vector exceeds 100

      sumExtra = sumExtra + (testGrades.at(i) - 100);   } } //computes total extra credit

cout << "sumExtra: " << sumExtra << endl;} //displays the value of computed total extra credit in output

The loop works as follows:

In the first iteration the value of vector testGrades at(i) is at(0) = 101.

if statement checks if this value/element is greater than 100. This is true as 101 > 100. So sumExtra = sumExtra + (testGrades.at(i) - 100); statement is executed in which 100 is subtracted from that element and the result is added to the sumExtra. sumExtra is initialized to 0 so the value of sumExtra becomes: 0+ 101 - 100= 1 So the value of sumExtra = 1

In the second iteration the value of i = 1 and it is positioned at 2nd value of vector testGrades i.e. 83. Then if statement checks if this value/element is greater than 100. This is false as 83 < 100. So the value of sumExtra = 1

In the third iteration the value of i = 2 and it is positioned at 3rd value of vector testGrades i.e. 107. Then if statement checks if this value/element is greater than 100. This is true as 107 > 100.

sumExtra = sumExtra + (testGrades.at(i) - 100); statement is executed in which 100 is subtracted from that element and the result is added to the sumExtra

sumExtra is 1 so the value of sumExtra becomes: 1+ 107 - 100= 8 So the value of sumExtra = 8

In fourth iteration  the value of i = 3 and it is positioned at 4th value of testGrades vector i.e. 90. Then the if statement checks if this element is greater than 100. This is false as 90 < 100. So the value of sumExtra remains 8.  

Finally the loop breaks as the value of i becomes 4. So the output is 8.

Answer:

sumExtra = 0;

   for (i = 0; i < NUM_VALS; ++i) {

     if (testGrades[i] >= 101) {

     sumExtra += (testGrades[i] - 100);

     }

   }

   cout << "sumExtra: " << sumExtra << endl;

Explanation:

A smart refrigerator can use _____ to detect when you are running low on milk, and then send a reminder to you on a wireless network.

Answers

Answer:

IoTs

Explanation:

Write a copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *this. Sample output for the given program:

Answers

Answer:

Here is the copy assignment operator for CarCounter:

CarCounter& CarCounter::operator=(const CarCounter& objToCopy) {

carCount = objToCopy.carCount;

return *this;  }

The syntax for copy assignment operator is:

ClassName& ClassName :: operator= ( ClassName& object_name)

In the above chunk of code class name Is CarCounter and object name is objToCopy.

Assignment operator = is called which assigns objToCopy.carCount to the new objects's carCount.

This operator basically is called when an object which is already initialized is assigned a new value from another current object.

Then return *this returns the reference to the calling object

Explanation:

The complete program is:

#include <iostream>  //to use input output functions

using namespace std;   //to access objects like cin cout

class CarCounter {  //class name

public:  // public member functions of class CarCounter

CarCounter();  //constructor of CarCounter

CarCounter& operator=(const CarCounter& objToCopy);  //copy assignment operator for CarCounter

void SetCarCount(const int setVal) {  //mutator method to set the car count value

carCount = setVal;  } //set carCount so setVal

int GetCarCount() const {  //accessor method to get carCount

return carCount;  }  

private:  //private data member of class

int carCount;  };    // private data field of CarCounter

CarCounter::CarCounter() {  //constructor

carCount = 0;  //intializes the value of carCount in constructor

return; }  

// FIXME write copy assignment operator  

CarCounter& CarCounter::operator=(const CarCounter& objToCopy){

/* copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *this */

carCount = objToCopy.carCount;

return *this;}  

int main() {  //start of main() function

CarCounter frontParkingLot;  // creates CarCounter object

CarCounter backParkingLot;   // creates CarCounter object

frontParkingLot.SetCarCount(12);  // calls SetCarCount method using object frontParkingLot to set the value of carCount to 12

backParkingLot = frontParkingLot;  //assigns value of frontParkingLot to backParkingLot

cout << "Cars counted: " << backParkingLot.GetCarCount();  //calls accessor GetCarCount method to get the value of carCount and display it in output

return 0;  }

The output of this program is:

Cars counted = 12

Arrays save space because all elements of an array are stored in a single memory location while a list of variables needs a separate location for each variable.

a. True
b. False

Answers

Answer:

The correct option is A True

Explanation:

Arrays are implemented to store sevaral variables of the same type as a single array object in java for example. The arrays therefore acts as a container that can store several variables of the same type hence preventing the need to declare those variables seperately thus giving more code efficiency and better storage space management.

Assume the following Python code has already executed.
import os
cwd = os.getcwd()
Which answer is most likely output from the following Python statement?
os.path.join(cwd, 'Documents/file.txt')
Select one:
a. ['Music', 'Pictures', 'Desktop', 'Library', 'Documents', 'Downloads']
b. False
c. True
d. /Users/me
e. /Users/me/Documents/file.txt

Answers

e. /Users/me/Documents/file.txt

The Python statement is an illustration of file manipulations

The output from the Python statement is: (e) /Users/me/Documents/file.txt

From the given statement, the first line imports the Python os module.

While the second line gets the current working file path.

So, the statement os.path.join(cwd, 'Documents/file.txt') means that:

The current working file path is Documents/file.txt

Hence, the output from the Python statement is: (e) /Users/me/Documents/file.txt

Read more about file manipulations at:

https://brainly.com/question/19386916

5.4.2: While loop: Print 1 to N. Write a while loop that prints from 1 to user_num, increasing by 1 each time. Sample output with input: 4 1 2 3 4

Answers

Answer:

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   Scanner in = new Scanner(System.in);

   System.out.println("Enter a number");

   int user_num = in.nextInt();

   int n = 1;

   while(n <= user_num){

     System.out.print(n+" ");

     n++;

   }

 }

}

Explanation:

Import Scanner to receive user numberCreate and initalize a new variable (n) to be printed outSet the while condition to while(n <= user_num)Print the value of n after each iteration and increment n by 1

Answer:

Written in Python:

i = 1

user_num = int(input()) # Assume positive

while i <= user_num:

   print(i)

   i += 1

Explanation:

Dani wants to create a web page to document her travel adventures. Which coding language should she use? HTML Java Python Text

Answers

Answer:

HTML, CSS, JavaScript, python, SQL

Explanation:

To create a web page for her travel adventures Dani has to use HTML and CSS to design the page's layout. A beautiful simple design such as one which shows photos of her on her travel destinations, and a paragraph for her to write a little story on her travels would do.

Dani needs JavaScript to animate the photos she's going to post on the page. Dani also should use python to build the backend of her page so she can write codes to save and access her documented adventures from the database. She should use a database language like SQL to save all of her adventures so she can view them at a later time for the memories.

Answer:

Dani should use HTML

Explanation:

Outline a scenario in which you might be acting ethically but might still want to remain anonymous while using the Internet. How might someone learn your identity even if you attempt to remain anonymous?

Answers

Answer:

I would like to stay anonymous while criticizing the current government. As there have been many cases when people who wrote against the government's decisions were caught by the police.

So I would prefer to stay anonymous while commenting on various government policies. My friends would know about it because I share my posts only with them.

The government can know about my identity by ordering the social networking site to reveal it.

One scenario in which you can act ethically but still remain anonymous when using the internet could be to guarantee your freedom of expression on a certain subject, sharing your ideas in the way you think is ideal for the situation.

Is anonymity on the internet legal?

It is protected by the US Supreme Court under the First Amendment, but its protection is balanced, that is, anonymity on the internet can be dissolved and the user can be found if the use of this function occurs to commit cyber crimes.

Therefore, it is essential that every individual action on the internet and outside of it is based on ethics and legality, so that there is an orderly and positive society for all citizens.

Find out more information about cyber crimes here:

https://brainly.com/question/25157310

In GamePoints' constructor, assign teamWhales with 500 and teamLions with 500. #include using namespace std; class GamePoints { public: GamePoints(); void Start() const; private: int teamDolphins; int teamLions; }; GamePoints::GamePoints() : /* Your code goes here */ { } void GamePoints::Start() const { cout << "Game started: Dolphins " << teamDolphins << " - " << teamLions << " Lions" << endl; } int main() { GamePoints myGame; myGame.Start(); return 0; }

Answers

Answer:

Here is the GamePoints constructor:

GamePoints::GamePoints() :

/* Your code goes here */

{

teamLions = 500;

teamDolphins = 500;

}    

Explanation:

Here is the complete program:

#include  //to use input output functions

using namespace std; //to identify objects like cin cout

class GamePoints {  //class GamePoints

   public: GamePoints(); // constructor of GamePoints class

   void Start() const;  //method of GamePoints class

   private: //declare data members of GamePoints class

   int teamDolphins; // integer type private member variable of GamePoints

   int teamLions; }; // integer type private member variable of GamePoints

   GamePoints::GamePoints()  //constructor

    { teamLions = (500), teamDolphins= (500); }   //assigns 500 to the data members of teamLions  and teamDolphins of GamePoints class

   void GamePoints::Start() const    { //method Start of classs GamePoints

       cout << "Game started: Dolphins " << teamDolphins << " - " << teamLions << " Lions" << endl; }  //displays the values of teamDolphins and teamLions i.e. 500 assigned by the constructor

       int main() //start of main() function

       { GamePoints myGame;  // creates an object of GamePoints class

       myGame.Start(); //calls Start method of GamePoints class using the object

       return 0; }

The output of the program is:

Game started: Dolphins 500 - 500 Lions                    

"The ______ of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works."

Answers

Answer:

decision logic

Explanation:. The decision logic of an operational system that supports an organization includes policies, requirements, and conditional statements that govern how the system works. These systems includes the following :

a) Order processing,

b)Pricing

c) Inventory control, and

d) Customer relationship management. And the traditional means of modifying the decision logic of information systems involves heavy interaction between business users and information technology (IT) analysts.

The following are types of numbers except one. Select the one which is not an integer.
A. Float
B. Int
C. Long
D. Boolean

Answers

Answer:

D) Boolean

Explanation:

Int, Float, Long and Boolean are commonly used data types in programming languages. Of these data types, the Boolean data type, named after George Boole, does not represent a numerical value. Rather it has one of two possible values, True and False. These values represent the two truth values of logic and Boolean algebra.

The Boolean data type is basically associated with conditional statements which specifies different actions to be taken depending on whether the Boolean condition evaluates to true or false. Therefore it influences the control flow of a program.

what keyboard command that will allow you to copy text

Answers

Answer:

Control + c

Explanation:

If you click and drag over text to highlight it and press on the control or command key (CTRL) and the "C" key, it will copy the text. When you want to paste it, you press control or command key (CRTL) and key "V" at the same time.

Select the components of a search engine.
a. robot
b. database
c. search form
d. all of the above

Answers

Answer:

C because whatever a search engine is it will need a search form to do its job, so C (maybe d)

A . There is a boy that traffics around the web and sorts out the result you see on your search engine e.g Google based on the input of the user that is what the user searched for
B. There would be obviously a database where all the results come from

Explain 3 ways you can be an upstander when seeing cyberbullying.

Answers

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

Call them out

Report them to someone

Or block them
Other Questions
Why is the holy land important to Islam Please help me! i need to do this by Friday Sirvo para ordenar informacin y me pueden llevar a todas partes. Quin soy? (09.04, 09.06 MC) The economies of most European countries have slid into a recession. Unemployment is high, and consumer spending is down. Which of the following countries is likely to be LEAST affected by Europe's woes? (4 points) Country E's young people migrate to Italy to work and send money home each month. Country A relies on food and cash aid from the European Union to feed its people during famines. Country D grows flowers and flies them overnight to markets in France. Country B has created a slow-growing self-sufficient economy in the past decade. Country C manufactures clothing for export to developed countries. A high marginal propensity to expend will cause the multiplier to be smaller.A. TrueB. False 21. Perry Inc.'s bonds currently sell for $1,150. They have a 6-year maturity, an annual coupon of $85, and a par value of $1,000. What is their current yield A positive two-digit number is written at random. Determine the probability that the number will be at least 75. Please put answer in the form of a fraction. Hypothesis (4 points)Record your hypothesis as an "if, then" statement for the rate of dissolving the compounds:Record your hypothesis as an "if, then" statement for the boiling point of the compounds:Variables (6 points)Independent Variable:Dependent Variable:Controlled Variables: What were the Twelve Tables? Question: -2 - (-4) 15. (01.01)What is the value of the radius of the following circle with an area of 154 cm2? (1 point)Area154 cm^2*4.9 cm*7.0 cm*25 cm*68 cm Which choice is best for lowering the amount of saturated fat in your diet? Believability Of a speaker is highly dependent on supporting materials for that are Graph 2 + 3y = 6. Please hurry Which of the following is an example of a limiting factor? A. A prolonged droughtB. Heavy rainfallC. A small pond Read the sentence. The baker donated bread to the fund-raiser in a large box. Which is the best revision of this sentence? In a large box, the baker donated bread to the fund-raiser. The baker donated to the fund-raiser bread in a large box. The baker donated a large box of bread to the fund-raiser. In a large box, the fund-raiser had bread donated by the baker. Find the volume of the rectangular prism. 9 ft 9 ft 9 ft A proposed new investment has projected sales of $515,000. Variable costs are 44 percent of sales, and fixed costs are $128,500; depreciation is $49,750. Prepare a pro forma income statement assuming a tax rate of 24 percent. What is the projected net income? Consider the waveform expression. y(x,t)=ymsin(801t+3.38+0.503x) The transverse displacement ( y ) of a wave is given as a function of position ( x in meters) and time ( t in seconds) by the expression. Determine the wavelength, frequency, period, and phase constant of this waveform. When conducting research for a thesis paper, what is the best way to determine the authors point of view?