plz help me to do 4 number

Plz Help Me To Do 4 Number

Answers

Answer 1

Answer:

A is an abbaccus.  B is Blaze Pascal.  C is The Jacquard Loom.  D is Charles Babbage.  E is The Manchester Baby.

Explanation:


Related Questions

In contrast to data in a database, data in a data warehouse is described as subject oriented, which means that it _____.

Answers

Answer:

focuses on a certain subject

Explanation:

it means that it focuses on that one subject and none others

Hope it helps c:

Determine whether the phrase below is a sentence or a fragment.

While we were in Greece, we ate a lot of feta cheese.
a.
Sentence
b.
Fragment

Answers

sentence.


i believe it is sentence

What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation

Answers

Answer:

The most effective temparature used in autoclave is 121°C

The logical structure in which one instruction occurs after another with no branching is a ____________.

Answers

Answer:

sequence

Explanation:

The logical structure in which one instruction occurs after another with no branching is a sequence.

In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.

Answers

Answer:

Confidentiality

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.

In the context of computer and network security, confidentiality simply means that a computer system used for performing certain functions such as exchange of data must not allow the disclosing of information to and by anyone who is not authorized to access it.

Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.

In conclusion, confidentiality requires that access to collected data be limited only to authorized staffs or persons.

The DuPage Freight Shipping Company charges the following rates: Weight of Package Rate per Pound 2 pounds or less $1.10 Over 2 pounds, but not more than 6 pounds $2.20 Over 6 pounds, but not more than 10 pounds $3.70 Over 10 pounds $3.80 Design a program that does the following: asks the user to enter the weight of a package and displays the shipping charges. 1. Prompt the user for the weight of a package 2. Determines the rate per pound in a getRate module 3. Calculates and displays the total shipping charge in a getTotal module Hint - you may want to use a global variable for this! Please submit three things:

Answers

Answer:

The program in Python is as follows:

def getRate(weight):

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

   return rate

def getTotal(weight,rate):

   total = weight * rate

   print("Total: ",total)

weight = float(input("Weight: "))

rate = getRate(weight)

getTotal(weight,rate)

Explanation:

This defines the getRate function

def getRate(weight):

The following if conditions determine the corresponding rate based on the value of weight passed to the function

   if weight<=2.0:

       rate = 1.10

   elif weight>2 and weight<=6:

       rate = 2.20

   elif weight>6 and weight<=10:

       rate = 3.70

   else:

       rate = 3.80

This returns the rate back to the main method

   return rate

The getTotal module begins here

def getTotal(weight,rate):

This calculates the total charges

   total = weight * rate

This prints the calculated total

   print("Total: ",total)

The main begins here

This gets input for weight

weight = float(input("Weight: "))

This gets the rate from the getRate function

rate = getRate(weight)

This passes values to the getTotal function

getTotal(weight,rate)

A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

Answers

Group of answer choices.

A. It can communicate with networks inside a particular company with subnets.

B. It can communicate on the local network as well as on the Internet.

C. It has a public IP address that has been translated to a private IP address.

D. It cannot communicate outside its own network.

Answer:

D. It cannot communicate outside its own network.

Explanation:

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

When a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

Generally, a computer cannot communicate outside its own network when it is assigned an IP address of 169.254.33.16.

What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes

Answers

Answer:

metasploit.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Metasploit is a penetration testing tool that combines known scanning and exploit techniques to explore potentially new attack routes. It's officially and formally licensed to Rapid7, a company based in Boston, Massachusetts.

Basically, metasploit is a framework that's mainly focused on availing end users such as ethical hackers, with information about security vulnerabilities in a system, development of intrusion detection system (IDS) signature and modular penetration testing.

which one of the following is not hardware​

Answers

Firewall is not hardware. It is only software.

Answer:

There r no options

Explanation:

I think the application r not the hardware.

Other Questions
Not sure what to pick chemistry help!This mysterious gas has a volume of 4.35 L and a pressure of 1.20 atm. If the pressure is changed to 0.95 atm, what will the new volume be? How do i set up this problem and solve it? At a local community college, 57% of students who enter the college as freshmen go on to graduate. Five freshmen are randomly selected. a. What is the probability that none of them graduates from the local community college? (Do not round intermediate calculations Round your final answer to 4 decimal places Probability b. What is the probability that at most four will graduate from the local community college? (Do not round intermediate calculations. Round your final answer to 4 decimal places.) c. What is the expected number that will graduate? (Round your final answer to 2 decimal places) A commuter backs her car out of her garage with an acceleration of . (a) How long does it take her to reach a speed of 2.00 m/s Suppose that two balanced, six sided dice are tossed repeatedly and the sum of the two uppermost faces is determined on each toss. (a) What is the probability that we obtain a sum of 3 before we obtain a sum of 7 Help please I cant figure this out?!?!? Can you help me about english? Which type of appeal does the passage primarily use A bacteria culture initially contains 100 cells and grows at a rate proportional to its size. After an hour the population has increased to 310.(a) Find an expression for the number of bacteria afterhours.(b) Find the number of bacteria after 3 hours.(c) Find the rate of growth after 3 hours.(d) When will the population reach 10,000? if we have 765 toys and there are 3 people how many toys should we give to each man Explain how animals may have influenced the evolution of terrestrial plants and vice versa Amanda is playing her new video game, Track Runner. At first, she earned 20 points for winning a sprint. Then in the next race, she got 25 points when she knocked over most of her hurdles. What is Amanda's total score now? To solve the problem, Amy added 20+( 25) and came up with an answer of 5 points. Is Amy correct? Why or why not? Solve the equation and enter the value of x below. 4(x + 1) = 64 A mixture of gases contains 0.320 mol CH4, 0.240 mol C2H6, and 0.300 mol C3H8. The total pressure is 1.45 atm. Calculate the partial pressures of the gases. An amount of 25,000 is borrow for 15 years at 5.5% interest, compounded annually. If the loan is paid in full at the end of that period, how much must be paid back? help pls!!The function is defined by f(x) = x(x + 3). If f(a) = 40 and a > 0, what is the value of a ?A) 3B) 5C) 7D) 8 A monopolist, unlike a competitive firm, has some market power. It can raise its price, within limits, without the quantity demanded falling to zero. The main way it retains its market power is through barriers to entrythat is, other companies cannot enter the market to create competition in that particular industry.Complete the following table by indicating which barrier to entry appropriately explains why a monopoly exists in each scenario.ScenarioBarriers to EntryExclusive Ownership of a Key ResourceGovernment-Created MonopoliesEconomies of ScaleThe Aluminum Company of America (Alcoa) formerly controlled all U.S. sources of bauxite, a key component in the production of aluminum. Given that Alcoa did not sell bauxite to any other companies, Alcoa was a monopolist in the U.S. aluminum industry from the late-nineteenth century until the 1940s. Patents are granted to inventors of a product or process for a certain number of years. The reason for this is to encourage innovation in the economy. Without the existence of patents, it is argued that research and development for improved pharmaceutical products is unlikely to take place, since there's nothing preventing another firm from stealing the idea, copying the product, and producing it without incurring the development costs. In the natural gas industry, low average total costs are obtained only through large-scale production. In other words, the initial cost of setting up all the necessary pipes and hoses makes it risky and, most likely, unprofitable for competitors to enter the market. Which of these is a characteristic of Modernist writing? An American worker is hired by a German consulting firm operating in New York. They pay him $50,000 in wages. The new worker's contribution is to bring a new client to the firm that buys consulting services for $70,000 . Assume no other new cost was involved in this other than the wage. The client is a Mexican firm located in Mexico City. Which of the following is correcta. National income increases by $50,000 and factor payments to abroad increase by $20,000, so US GDP increases by $70,000 b. Consumption increases by $70,000 and imports increase by $70,000,50 US GDP remains unchanged c. Consumption increases by $50,000 and exports increase by $20,000, so US GDP increases by $70,000 d. National income increases by $50,000 and factor payments from abroad increase by $50,000, so US GDP remains unchanged Two of the duties of the National Security Council are _____. (Choose two answers.)to advise the President on foreign policy.b.to advise the President on the nations economy.c.to advise the President on American military affairs.d.to prepare the national budget.