#We've started a recursive function below called #measure_string that should take in one string parameter, #myStr, and returns its length. However, you may not use #Python's built-in len function. # #Finish our code. We are missing the base case and the #recursive call. # #HINT: Often when we have recursion involving strings, we #want to break down the string to be in its simplest form. #Think about how you could splice a string little by little. #Then think about what your base case might be - what is #the most basic, minimal string you can have in python? # #Hint 2: How can you establish the base case has been #reached without the len() function? #You may not use the built-in 'len()' function.

Answers

Answer 1

Answer:

Here is the Python program:  

def measure_string(myStr): #function that takes a string as parameter  

 if myStr == '': #if the string is empty (base case)  

      return 0  #return 0  

  else: #if string is not empty  

      return 1 + measure_string(myStr[0:-1]) #calls function recursively to find the length of the string (recursive case)  

#in order to check the working of the above function the following statement is used    

print(measure_string("13 characters")) #calls function and passes the string to it and print the output on the screen      

Explanation:

The function works as following:  

Suppose the string is 13 characters  

myStr = "13 characters"  

if myStr == '': this is the base case and this does not evaluate to true because myStr is not empty. This is basically the alternate of  

if len(myStr) == 0: but we are not supposed to use len function here so we use if myStr == '' instead.  

So the program control moves to the else part  

return 1 + measure_string(myStr[0:-1])  this statement is a recursive call to the function measure_string.  

myStr[0:-1] in the statement is a slice list that starts from the first character of the myStr string (at 0 index) to the last character of the string (-1 index)  

This statement can also be written as:  

return 1 + measure_string(myStr[1:])

or  

return 1 + measure_string(myStr[:-1])  This statement start from 1st character and ends at last character  

This statement keeps calling measure_string until the myStr is empty. The method gets each character using a slice and maintains a count by adding 1 each time this statement is returned.The function breaks string into its first character [0:] and all the rest characters [:-1]. and recursively counts the number of character occurrences and add 1. So there are 13 characters in the example string. So the output is:  

13

#We've Started A Recursive Function Below Called #measure_string That Should Take In One String Parameter,

Related Questions

Assign a pointer to any instance of searchChar in personName to searchResult.#include #include using namespace std;int main() {char personName[100];char searchChar;char* searchResult = nullptr;cin.getline(personName, 100);cin >> searchChar;/* Your solution goes here */if (searchResult != nullptr) {cout << "Character found." << endl;}else {cout << "Character not found." << endl;}return 0;}

Answers

Answer:

Here it the solution statement:

searchResult = strchr(personName, searchChar);

This statement uses strchr function which is used to find the occurrence of a character (searchChar) in a string (personName). The result is assigned to searchResult.

Headerfile cstring is included in order to use this method.

Explanation:

Here is the complete program

#include<iostream> //to use input output functions

#include <cstring> //to use strchr function

using namespace std; //to access objects like cin cout

int main() { // start of main() function body

   char personName[100]; //char type array that holds person name

   char searchChar; //stores character to be searched in personName

   char* searchResult = nullptr; // pointer. This statement is same as searchResult  = NULL  

   cin.getline(personName, 100); //reads the input string i.e. person name

   cin >> searchChar;    // reads the value of searchChar which is the character to be searched in personNa,e

   /* Your solution goes here */

   searchResult = strchr(personName, searchChar); //find the first occurrence of a searchChar in personName

   if (searchResult != nullptr) //if searchResult is not equal to nullptr

   {cout << "Character found." << endl;} //displays character found

   else //if searchResult is equal to null

   {cout << "Character not found." << endl;} // displays Character not found

   return 0;}

For example the user enters the following string as personName

Albert Johnson

and user enters the searchChar as:

J

Then the strchr() searches the first occurrence of J in AlbertJohnson.

The above program gives the following output:

Character found.

Please help me please and thank you!

Answers

Answer:

1. a digital designer involves movement like animations, movies, etc. A graphic designer is static for an example logos pictures etc.

2. a ux is the interaction between humans and products

3.  a ui is the design of software and machines, for an example computers, electronic devices, etc.

4.  textures, color, value, and space

5. the basics are contrast, balance, emphasis, white space, hierarchy, movement, proportion, repetition, pattern, variety, unity, and rhythm

6. the basic fundamentals are images, color theory, lay-out, shapes, and typograph  

I hope this helped you and have a great rest of your day

When first defining the cloud, NIST gave three service models, which can be viewed as nested service alternatives: software as a service, platform as a service, and _________ as a service.

Answers

Answer:

Infrastructure.

Explanation:

In Computer science, Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives. It offers individuals and businesses a fast, effective and efficient way of providing services.

Simply stated, Cloud computing are services or programs located on the Internet, they are usually remote resources making use of cloud storage.

When first defining the cloud, National Institute of Standards and Technology (NIST) gave three (3) service models, which can be viewed as nested service alternatives;

1. Software as a Service (SaaS).

2. Platform as a Service (PaaS)

3. Infrastructure as a Service (IaaS).

According to NIST, the five (5) characteristics of a cloud computing service are;

1. On-demand self-service .

2. Broad network access .

3. Resource pooling .

4. Rapid elasticity .

5. Measured service.

Additionally, the cloud service can either be deployed as private, public, hybrid or community service.

explain 10 challenges in the use of ICT​

Answers

There are multiple challenges to the ICT education system, here are a few:

ICT is susceptible to various cyber-threats ICT limits the imagination and observance powerIt also arises various health-related problemsNonverbal communication. Student laziness Less security. Social isolation.The Implementation of ICT is much costly.Increases Unemployment and lack of job security Increases Dominant culture within the workplace

Touch screens are becoming extremely popular input devices for phones and tablets. Assess the value of touch screen devices related to human-computer interaction systems. Identify at least two advantages and two disadvantages of having touch screen devices in the workplace. Support your response by citing a quality resource.

Answers

Answer:

Two advantages of touch screen inputs are; free of hardware input problems and the adaptivity of mobile applications.

Two disadvantages of touch screen inputs are; screen usage and software error.

Explanation:

Touch screen input is a slick application of finger-on-screen interaction with gadgets, that promotes mobility. It cancels the need for hardware input devices, reducing system size and weight.

But with its slickness comes extra memory usage and screen space consumption.

The first version of the SMTP protocol was defined in RFC 821. The current standard for SMTP is defined in RFC 5321 considering only RFC 821 what are the main commands of the SMTP protocol?

Answers

Answer:

The following are the explanation for each command, with the SMTP protocol considering only RFC 821.

Explanation:

The key commands of the SMTP protocols which take the RFC 821 into account are as follows:

HELLO -  

A client receives that order to describe himself  

HELP-  

It asks by the receivers to submit the command information as argument  

QUIT -  

It is used to terminate the message.  

-FROM MAIL  

The clients use it to acknowledge the message's sender.  

NOOP -  

The client does not use any procedure to verify the receiver status as required by the receiver's reply form.  

RCPT-  

The user needs it to determine the intended beneficiary.  

SAML-  

It sends or ends the specific mail which is sent to the mailbox or the SAML

RESET-  

The existing email transaction is aborted.  

SEND- The mail to be sent by the recipient's terminal, not its mailbox, is specified.  

TURN-  

It allows the sender to change position and recipients.  

VRFY-  

Verification checks the recipient's address.

 

Consider a city of 10 square kilometers. A macro-cellular system design divides the city into square cells of 1 square kilometer, where each cell can accommodate 100 users. Find the total number of users that can be accommodated in the system. B) If the cell size is reduced to 100 square meters and everything in the system scales so that 100 users can be accommodated in these smaller cells, find the total number of users the system can accommodate.

Answers

Answer:

1,000 users

10,000,000 users

Explanation:

Given the following :

Area of city = 10 square kilometers

Each cell = 1 square per kilometer

Number of users each cell can accommodate = 100

Total number of users that can be accommodated in the system :

(Total number of cells in the system * number of users per cell)

(10 sqkm / 1 sqkm) * 100

10 * 100 = 1,000 users

B) If cell size is reduced to 100 square meters

Converting 100 square meters to square km

100 sq meters = 0.0001 sq kilometers

Number of users each cell can accommodate = 100

Total number of users that can be accommodated in the new system :

(Total number of cells in the system * number of users per cell)

(10 sqkm / 0.0001 sqkm) * 100

100,000 * 100 = 10,000,000 users

You want to know what directories in your account hold C files. You can use the command:______.
1. Is.
2. find.
3. cp.
4. 8++.

Answers

Answer:

The answer is "find Command".

Explanation:

The find command is a popular * nix application, which enables the users for locating information inside a system file via criteria like, that of the file names when the last access is created, the data file privileges, the user, the community, the file size or the inodes, in which it was last modified, and the incorrect choices can be defined as follows:

In point 1, The Is command is used to read inputs from the flies, that's why it is wrong. In points 3 and 4, both were wrong because cp is used for copy and 8++ is not a command.

The field on which records are sorted is called the composite primary key.A. TrueB. False

Answers

Answer: TRUE

Explanation: Composite is simply used to refer to the existence of more than one event or pattern. The composite primary key as related to database management query refers to the synergy or combination of more than one field or column of a specified table which is used in sorting or accurate identification of a record. When attributes are combined, that is more than one, it assists in narrowing down the returned records such that records which are close and exclusive to the options specified are returned. Usually, the more the number of columns which makes uo the case mpoaite keys, the more unique and well sorted our returned output is.

Write a program that could find whether the number entered through keyboard is odd or even the program should keep on taking the value till the user ends.

Answers

Answer:

using namespace std;

int main() {

int number;

while (1) {

 cout << "Enter a number: ";

 cin >> number;

 cout << number << " is " << ((number % 2) ? "odd" : "even") << endl;

};

return 0;

}

Explanation:

This is a c++ version. Let me know if you need other languages.

The (number % 2) is the essence of the program. It returns 0 for even numbers, and 1 for odd numbers (the remainder after division by 2).

For this lab, you will do some work on a GUI program. Most of the work is related to actions, buttons, menus, and toolbars.
When you turn in your work for this lab, you should also turn in an executable jar file of your program, in addition to all the files from your Eclipse project. See the last section on this page for information about how to create executable jar files.
To begin the lab, create a new project in Eclipse and copy-and-paste both directories – guidemo and resources -- from the code directory in this linke :
The guidemo directory is a package that contains the Java code of the program. The resources directory has several sub-directories that contain image and sound resources used by the program. You will be working only on the code in the guidemo package.
The code directory also contains an executable jar file of the completed program, GuiDemoComplete.jar. You can run this jar file to see how the program should look when it's done. In the incomplete source code that you will be working on, the main class is in GuiDemo.java, and you can execute that file to see what the program does so far.
=========================
Make a Menu
The program has a toolbar at the bottom of the window. The buttons in this toolbar have icons. If you click one of the icons, you can then use the mouse to "stamp" copies of the icon onto the picture. (Note that a short sound is played when you stamp.) If you click the button "DEL", you can use the mouse to erase icon images from the picture.
The toolbar is made by adding Actions to a JToolBar object. This is done in the class IconSupport, which contains a list of actions and a createToolbar method to create a toolbar from the actions.
Write a method createMenu() in the IconSupport class to create and return a menu with the same functionality as the toolbar. That is, all the Actions from the actions arraylist should be added to the menu, just as they were added to the toolbar. (Remember that a menu is represented by an object of type JMenu, which can be created, for example, with: JMenu stamper = new JMenu("Stamper");)
Once you have a method to create the menu, find the place in the constructor of the GuiDemo class where the menu bar is created. Use the method to create a menu, and add that menu to the menu bar. Test to make sure that it is working.

Answers

sorry

Explanation: don't understand

What does the following code output? System.out.println((5+20 + 5)
* (10 / 10))

Answers

Explanation:

the output of your code is 30

A wedding photographer taking photos of the happy couple at a variety of locations prior to their wedding would be classified as a reactive system on the service system design matrix.A. TrueB. False

Answers

Answer:

True

Explanation:

When a laptop has a built-in wireless adapter or the wireless adapter is physically installed on a computer and it does not appear in Network Connections, what is most likely the problem?

Answers

Answer:

The problem is most likely to be that the wireless adapter is disabled.

Explanation:

When a laptop has a built-in wireless adapter or the wireless adapter is physically installed on a computer and it does not appear in Network Connections, then the problem is most likely to be that the adapter is disabled.

Please note, with the wireless adapter disabled it is practically impossible to connect to the internet using a wireless connection (network).

In order to enable the wireless adapter, open the control panel on your computer, scroll to "Network and Internet" and select "Network and Sharing Center." Click on the "Change Adapter Settings" and right-click to choose enable.

Before creating a brief to design a product, what is needed

Answers

Answer:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

Explanation:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

For many cryptographic algorithms, it is necessary to select one or more very large prime numbers.A. TrueB. False

Answers

Answer:

True

Explanation:

For many cryptographic algorithms such as RSA algorithm, prime numbers are important for encryption purpose. However it is not that difficult for a computer to break or factor a product of large prime numbers. The product of small prime numbers can be easy to get.  So at least if one of the prime numbers is very large then it would not be easy to break out from their product. In some cryptographic algorithms because we know that if the product of two prime numbers can be factored then the secret message can be read. So in order to make it difficult to factor and break we use large prime numbers.

In most cases, it is possible to prevent an exception from terminating a program by using the try and except statements. Select one: True False

Answers

Answer:

True

Explanation:

Try and except statements (pseudo code) or try and catch (java, c++, etc)

is for error handing. The try and except "handles errors" If encountered an error, the try and except will try to "handle" the error and let the program continue running.

Guys for those who are familiar to bubble gum sim...THERE IS A HUGE EVENT AND I DONT WANT TO FAIL AN EVENT...(again) is anyone willing to give me a donation so i could get a gamepass? it will make my life so much easier. Plus im broke.... to donate go to my group its called dazzles clothing. here is the link https://www.roblox.com/groups/6558778/DAZZLEZ-CLOTHING#!/about

Answers

Dude is u still use this app then friend meh on roblox

4. What are the basic scientific principles the engineers who designed the digital scales
would have needed to understand to design this tool? Choose all that apply.
A. electric currents
B. physical properties of metals
C. influence of gravitational force on objects
D. physical and chemical properties of materials used in building circuits

Answers

Answer:

A, C and D

Explanation:

A digital scale is a measuring device used to measure the weight of an object. Unlike the mechanical version, the digital scale displays the numeric value of an object weight on a screen, that is, it does not use any mechanical part like a pointer.

To design this scale, the engineers heard to understand the principles of electric current which powers the device, the influence of gravitational force on objects for which a sensor is used to collect the weight of objects and convert it to digits, and the physical and chemical properties of materials used in building the digital scale circuits.

Graded Discussion Board
Mobile application development industry in the last few years has grown worldwide and it has changed the way businesses function worldwide. Enterprises also want to align mobile apps according to their productivity in recent times. Rapid innovation in mobile devices across platforms has given the challenge to mobile application developers to write several versions of an application for many different platforms using a single language and many pieces of reusable code. As a mobile application developer when you had realized your mobile app idea, it's time to validate it, understand the target market, and narrow down the platform on which you ideally would like to build your mobile application. As soon as that is decided, it’s time to select a programming language, keeping in mind your business strategy to make either native or hybrid platform apps.
So considering you a mobile application developer you are given the following requirements for your mobile application development
User friendly GUI
Full access to any platform spectrum including platform specific capabilities
Libraries inclusion from different service providers
Ahead-of-time (AOT) compilation on applications
Negligible startup time
Increased memory sharing feature
Improved performance
You will suggest that either you will go for hybrid or native application development. After that as per your selected application type you will write name of programming language and framework you use and then you justify your choice with reasons. Your answer must be brief

Answers

Answer:

Mobile Crash Reporting

Mobile app crash reporting and run time errors in a single view, give you a holistic overview of your application's health in real-time.

Correlate errors with releases, tags, and devices, to solve problems quickly, decrease churn and improve user retention.

Aggregate Crash and Error Reporting

Sentry captures every crash and tells you about it in real-time.

Is a bug impacting 100,000 people while another is only impacting 1,000? Crashes roll up into Issues, giving you immediate impact visibility.

Dive in to see the exact stack frames and threads to tackle whatever is derailing your mobile app development.

Monitor Release Health

Closely track user adoption, usage of the application, percentage of crash-free users and sessions. Sentry for Mobile provides insight into the impact of crashes and bugs as it relates to user experience and application versions.

Measure the health of mobile releases over time and view trends with each new issue through the release details, graphs, and filters.

Get Up and Running in Five Minutes

Install our SDK (we work with iOS, Android, React Native, Swift, and everything else) and start seeing mobile crash analytics five minutes later.

Upload debug files, ProGuard mapping files, and source maps with minimal effort during the build of the application.

Integrating Sentry with your mobile app development process is easy, regardless of if you're collaborating with one person or one thousand. That's why we're used by over 1M developers at more than 60K organizations.

Get the Best from the Sentry Ecosystem

THE BEST FEATURES FROM MANY OTHER PLATFORMS, APPLIED TO MOBILE

Cross-Platform projects in React Native, Cordova, or Ionic, can benefit from our best-in-class Javascript error tracking and from the platform-specific Android and iOS SDKs that add device context to error reports.

Android, iOS, and Native projects get all the same features you use for non-mobile projects including:

Customizable grouping of error reports into issues

Stable integration with build systems and release management

Integration with symbol servers

Easy access to all the data via API

And, the best in class symbolication for everyone

Is your data secure? You better believe it.

Just look at all the high-quality security features all accounts get, regardless of plan.

Two-Factor Auth

Single Sign-On support

Organization audit log

SOC-2 Certified

Privacy Shield certified

PII data scrubbing

SSL encryption

COPPA Compliant

All errors, one place

Use Sentry to collect and process errors from clients and connected projects. We support all major platforms.

Product

Compan

In recent years, there has been an effort by companies to make computer chips:
O smaller.
O larger.
O bendable.
O harder

Answers

Answer:

A

Explanation:

Answer:

A) smaller

Explanation:

Recent advances in information technologies (IT) have powered the merger of online and offline retail channels into one single platform.

a. True
b. False

Answers

Answer:

True

Explanation:

With the recent advancement in IT we have witnessed offline retail businesses begin to get online presence. The advancement of the e-commerce sector and the convenience that it brings to customers through providing the ability to make orders online and get goods delivered to their doorsteps in a short time, has brought about escalating growth in the online and in extension offline retail businesses.

Big retail chains such as Walmart are taking advantage of this to increase their sales. Also, online retail presence helps put offline businesses out there in terms of advertising and marketing.

Password Verifier Imagine you are developing a software package that requires users to enter their own passwords. Your software requires that users’ passwords meet the following criteria: The password should be at least six characters long. The password should contain at least one uppercase and at least one lowercase letter. The password should have at least one digit. Write a program that asks for a password then verifies that it meets the stated criteria. If it doesn’t, the program should display a message telling the user why.

Answers

Answer:

Here is the C++ program:

#include <iostream>  //to use input output functions

using namespace std;  //to identify objects like cin cout

bool verifyLength(string password);  // to verify length of password

bool verifyUpper(string password);  //to verify if  password contains uppercase letters

bool verifyLower(string password);  //to verify if  password has lowercase letters

bool verifyDigit(string password);  // to verify if password contains digits

int main() {   //start of main() function

   string password = " ";  //to hold password string input by user

  while(true)     {  //loop that verifies the password. The loop keeps prompting user to enter a valid password telling what criteria is to be met to verify password.

       cout << "\nPlease enter your password: ";  // prompts user to enter a password

       getline(cin, password);  //reads and gets password from user

           if (verifyLength(password) == false)  // calls verifyLength to check length criteria for password. Checks if length of password is less than 6

             { cout << "The password should be at least six characters long.\n";}                                        

else if (verifyUpper(password) == false)   { // calls verifyUpper to check criteria for password letters to be in uppercase. Checks if password does not have an uppercase letter

   cout << "The password should contain at least one uppercase letter.\n";  }  

         else if (verifyLower(password) == false) {  // calls verifyLower to check criteria for password letters to be in lowercase.  Checks if password does not contain a lowercase letter

           cout << "The password should contain at least one lowercase letter.\n";   }

          else if (verifyDigit(password) == false)  {   // calls verifyDigit to check digit criteria for password. Checks if password does not contain a digit

           cout << "The password should have at least one digit.\n";    }  

        else {  //if password meets the criteria

          cout << "Password verified!\n";  

         break;   }     } }   //breaks the loop                

Explanation:

Here are the method that are called to verify the stated criteria:  

bool verifyLength(string password)  {  // this method takes input password as parameter to verify the length criteria and returns true of false accordingly

   bool length = false;   // the bool type variable length is initially set to false

   if(password.length() >= 6)  //if the length of the password that is obtained by using length() function is greater than or equals to 6 then it means it meets valid password length criteria

   length = true;   //set length to true when above if statement is true

   else  //if length of password is less than 6

   length = false;   //set length to false if length of password  is less than 6

   return length;  }   //return the state of length

bool verifyUpper(string password)  {  // this method takes input password as parameter to verify the uppercase criteria and returns true of false accordingly

   bool upper = false;   // the bool type variable upper is initially set to false

   for (int i = 0; i < password.length(); i++)     { //the loop iterates through the letter of password string until the length of the string is reached

       if (isupper(password[i]))         {  //it checks if any letter of the password is in uppercase using the isupper() method

           upper = true;       }        }   //set upper to true when above if condition is true

   return upper;  }  //returns the state of upper

bool verifyLower(string password)  { // this method takes input password as parameter to verify the lowercase criteria and returns true of false accordingly

   bool lower = false;  // the bool type variable lower is initially set to false

   for (int i = 0; i < password.length(); i++)     { //the loop iterates through the letter of password string until the length of the string is reached

       if (islower(password[i]))         {  //it checks if any letter of the password is in lowercase using the islower() method

           lower = true;         }     }   //set lower to true when above if condition is true

   return lower;  } //returns the state of lower accordingly

bool verifyDigit(string password)  {  // this method takes input password as parameter to verify the digit criteria and returns true of false accordingly

   bool digit = false;   // the bool type variable digit is initially set to false

   for (int i = 0; i < password.length(); i++)     {  //the loop iterates through each letter of password string until the length of the string is reached

       if (isdigit(password[i]))         {  //it checks if any letter of the password is a digit using the isdigit() method

           digit = true;         }     } //set digit to true when above if condition is true

    return digit;  }    //returns the state of digit accordingly                                  

The output of program is attached.

Which statement compares the copy and cut commands?

Answers

Answer: duplicate

Explanation:

Answer : Duplicate Because it does

True or false?
FCC Guidelines restrict the amount of RF radiation that can be "leaked" by non-industrial equipment?

Answers

Answer:

True

Explanation:

The Federal communications commission (FCC), is responsible for evaluating the effect of radio frequency and electromagnetic radiations and emissions on the consumers of products which make use of these frequencies and radiation energy. Devices such as cell phones are not allowed to emit radiation higher than a certain safe standard or frequency, set by the Federal communications commission.

The Federal communications commission also provides bulletins and publications that present safety information and guidelines for industries and consumers involved with radio frequency and electromagnetic radiation.

2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components of security management can be adapted for use in the security management model

Answers

Answer:

A security management model (SMM) is a representation of all the things that a firm or business can do to ensure that its environment is secure. A Security Management Model does not provide details of the security management process itself.

Sometimes, the job of the Security Manager is just to pick a generic model then adapt it to the requirements and peculiarities of the organisation.

Some security models one can select from are:

ISO 27000 Series (International Organization for Standardization)    ITIL (Information Technology Infrastructure Library) NIST (National Institute of Standards and Technology) andCOBIT (Control Objectives for Information and Related Technology)

Some of the  interesting components of the security management model that can be adapted for use in the SMM are:

Identification of the Impact of a security breach on the business;determine preventive measures anddeveloping recovery strategies

Cheers!

 

Jenae helps maintain her school web site and needs to create a web site poll for students. Which tool will she use?

Answers

Answer:

web browser

Explanation:

the other three will not let her excess her page at all

She needs to use a web browser

If N represents the number of elements in the list, then the index-based add method of the LBList class is O(1).
a) true
b) false

Answers

Answer:

True

Explanation:

What command would you use to copy the content of a file named report1 to another called report1uc. Convert the content of report1 to upper case as you copy it to report1uc.

Answers

Answer:

Answered below.

Explanation:

This answer is applicable to Linux.

There are several commands for copying files in Linux. cp and rsync are the most widely used. cp though, is the command used to copy files and their contents.

To copy a file named report1.txt to another file named report1uc.txt in the current directory, the following command is run.

$ cp report1.txt report1uc.txt

You can change the case of the strings in the file by using the tr command.

tr [:lower:] [:upper:]

For example,

$ echo brainly | tr [:lower:]. [:upper:]

Result is BRAINLY.

Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this

Answers

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

If someone posing as an IT tech requests information about your computer configuration, this kind of attack is: social engineering.

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or perform actions that compromises their security.

Basically, social engineering is a manipulative strategy (technique) which typically involves the use of deceptive and malicious tactics on vulnerable (unsuspecting) victims, so as to gain an unauthorized access to their confidential or private information, especially for fraud-related purposes.

In Cybersecurity, some examples of social engineering attacks include:

Quid pro quo.Spear phishing.Baiting.Tailgating.

Read more: https://brainly.com/question/24112967

Other Questions
what is the most common purpose for composition in art? what is the volume of the box below ?5cm,8cm,10cm (9x + 1) -(-7x2 + 4x + 10) A company prices its tornado insurance using the following assumptions: In any calendar year, there can be at most one tornado. In any calendar year, the probability of a tornado is 0.11. The number of tornadoes in any calendar year is independent of the number of tornados in any other calendar year.Required:Using the company's assumptions, calculate the probability that there are fewer than 3 tornadoes in a 14-year period. Characteristics and structure of argumentative texts: mastery test Write an algebraic expression to represents the verbal expression: the difference between the product of 4 and a number and the square of the number 10)"Manifest Destiny' is associated with which of these statements Five boys A, B, C, D,Eare sitting in a park in a circle. A is facing South-West, D is facingSouth-East, B and E are right opposite A and D respectively and C is equidistant betweenD and B. Which direction is C facing? what kind of material could have been used by early humans t make homes or shelters. A, bricks, B, large bones, C, metal, D, clay Regarding mechanical ventilation, what ventilator settings are the primary determinants of oxygenation? Nick and Katelyn paid $1,600 and $2,100 in qualifying expenses for their two daughters, Nicole and Naomi, respectively, to attend the University of Nevada. Nicole is a sophomore and Naomi is a freshman. Nick and Katelyn's AGI is $202,000. What is their allowable American opportunity tax credit? a raccoon may live longer if it only eats vegetables what is the student doing 6 Hundreds 3 Tens 17 Ones in Standard Form ) I went from my house to a playground, 300metres away in 10 minutes. I ran back andreached in 2 minutes. What was my averagespeed? give answer fast! 3 concepts about carbohydrates? Teresa has completed 57 deliveries so far this week. She needs to make 60 deliveries for the week. What percentage of her deliveries has Teresa completed? The vector is first dilated by a factor of 2.5 and then rotated by radians. If the resulting vector is , then a =_____ and b = ____. a stockbroker sold 70 shares of stock $14.52 each. what was the total amount of the sale? Consider a 2.4-kW hooded electric open burner in an area where the unit costs of electricity and natural gas are $0.10/kWh and $1.20/therm (1 therm = 105,500 kJ), respectively. The efficiency of open burners can be taken to be 73 percent for electric burners and 38 percent for gas burners. Determine the rate of energy consumption and the unit cost of utilized energy for both electric and gas burners. Increase #500 in the ratio 16:10