1.15) Many computers use one byte (8 bits) of data for each letter of the alphabet. There are 44 million words in the Encyclopedia Britannica. (a) What is the bit density (bits/in2) of the head of a pin if the entire Encyclopedia is printed on it
Answer: provided in the explanation section
Explanation:
the complete questions is given thus:
Many computers use one byte (8 bits) of data for each letter of the alphabet. There are 44 million words in the Encyclopedia Britannica.
(A). (What is the bit density (bits/in2) of the head of a pin if the entire encyclopedia is printed on it? Assume the average word is five letters long. (B). What is the byte density?
(C). What is the area of a single bit in nm2?
(D). A CD-ROM has a storage density of 46 megabytes/in2 and a DVD has a storage density of 329 megabytes/in2. Is the pinhead better or worse than these two storage media? How much better or worse?
ANSWER PROVIDED:
So both quest. a and b will be solved using the same principle.
Let us say we have the Head of the pin as (1/16)th of an inch in diameter.
Then the area is = pi*(1/(2*16))2 = pi*(1/32)2
Where each word is on an average 5 letters long, and there are 44 million words.
we have a total of 220000000 bytes.
220000000 bytes = 1.76 billion bits ( Since,1 Bytes=8 bits)
hence there are 1.76 billion bits total over the head of the pin.
Note that the bit density is bits per unit area;
since we know that now, let us proceed
Bit density = 1.76billion bits/(pi*(1/32)2 bits(inch)-2
approx 574 trillion bits per (inch)2
(b). Byte density tells us the measure of the quantity of information bytes that can be stored on a given length of track, area of surface, or even in a given volume of a computer storage medium.
⇒ Byte density is bit density divided by 8
(c). asked to find the area;
given that the inch2 = (2.54cm2) = (25.4e-6nm)2.
So to get the area,we will simply divide 574billion by (25.4e-6nm)2
(d). The pin head is WAY better.
what we mean is;
574 trillion bits per inch2 = around 75 trillion bytes per inch2
= 75 terabytes per inch2
cheers i hope this helped !!!
Write a second constructor as indicated. Sample output:User1: Minutes: 0, Messages: 0User2: Minutes: 1000, Messages: 5000// ===== Code from file PhonePlan.java =====public class PhonePlan { private int freeMinutes; private int freeMessages; public PhonePlan() { freeMinutes = 0; freeMessages = 0; } // FIXME: Create a second constructor with numMinutes and numMessages parameters. /* Your solution goes here */ public void print() { System.out.println("Minutes: " + freeMinutes + ", Messages: " + freeMessages); return; }}// ===== end =====// ===== Code from file CallPhonePlan.java =====public class CallPhonePlan { public static void main (String [] args) { PhonePlan user1Plan = new PhonePlan(); // Calls default constructor PhonePlan user2Plan = new PhonePlan(1000, 5000); // Calls newly-created constructor System.out.print("User1: "); user1Plan.print(); System.out.print("User2: "); user2Plan.print(); return; }}// ===== end =====
Answer:
public PhonePlan(int numMinutes, int numMessages) {
freeMinutes = numMinutes;
freeMessages = numMessages;
}
Explanation:
Create a constructor that takes two parameters, numMinutes and numMessages
Inside the constructor, set numMinutes to freeMinutes and numMessages to freeMessages.
With this constructor, we are able to create PhonePlan objects that take parameters and different options as seen in the output. We can set any values for minutes and messages in the constructor.
Answer:
PhonePlan::PhonePlan(int numMinutes, int numMessages) {
freeMinutes = numMinutes;
freeMessages = numMessages;
}
Explanation: For C++
PhonePlan::PhonePlan(int numMinutes, int numMessages) {
^^^^^^^^^^^^
you need that
freeMinutes = numMinutes;
freeMessages = numMessages;
}
Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. screening scanning examination viewing
Answer:
screening
Explanation:
Packet screening also known as packet filtering wall is a package that works at the network layer of the OSI model. It screens IP addresses and packet options and its firewall option allows it to block or allow access into the computer, based on what it has detected.
To achieve this, it can employ the dynamic-packet filtering where ports are opened when it is really necessary and then closed. Static-packet filtering in which rules are set manually and the stateful-paket filtering where packets have to move through some sequence.
The parent_directory function returns the name of the directory that's located just above the current working directory. Remember that '..' is a relative path alias that means "go up to the parent directory". Fill in the gaps to complete this function.
import os
def parent_directory():
# Create a relative path to the parent
# of the current working directory
dir = os.getcwd()
relative_parent = os.path.join(dir, ___)
# Return the absolute path of the parent directory
return os.path.dirname(relative_parent)
print(parent_directory())
Answer:
Following are the complete code to this question:
import os #import package
def parent_directory():#defining a method parent_directory
dir = os.getcwd()#defining dir that stores the getcwd method value
relative_parent = os.path.join(dir) #defining relative_parent variable that uses join method to adds directory
return os.path.dirname(relative_parent)#use return keyword to return directory name
print(parent_directory())#use print method to call parent_directory method
Output:
/
Note:
This program is run the online compiler that's why it will return "/"
Explanation:
In the given Python code, we import the "os" package, after that a method "parent_directory" is defined, which uses the dir with the "getcwd" method that stores the current working directory.
After that "relative_parent" variable is declared, which uses the join method to store the directory value and use the return keyword to returns its value. In the next step, the print method is used, which calls the method.Functions are collection of code segments that are executed when called or evoked.
The complete function in Python, where comments are used to explain each line is as follows:
#This imports the os module
import os
#This defines the parent_directory function
def parent_directory():
#This gets file directory
dir = os.getcwd()
#This gets the complete directory
relative_parent = os.path.join(dir)
#This returns the directory name
return os.path.dirname(relative_parent)
print(parent_directory())
Read more about python functions at:
https://brainly.in/question/10211834
Mia is disappointed with how her latest video games are playing on her computer; the images are slow
and grainy, and what she sees onscreen seems to lag behind what she is inputting through her
controls. Which of these components does Mia most likely need to upgrade?
O USB
O GPU
ONIC
O loT
Answer:
she is complaining about her images being slow and lagging she should get a new gpu because, well it should be pretty self explnitory gpu stands for graphics processing unit, so putting 2 and 2 together...
Answer:
B. GPU
The Graphics proccessing unit or GPU is what decides how good or bad your graphics are. If you are having problems with the speed or look of your graphics, then it would be a good idea to upgrade the GPU.
I hope this helps. Cheers! ^^
You are hired to create a simple Dictionary application. Your dictionary can take a search key from users then returns value(s) associated with the key. - Please explain how you would implement your dictionary. - Please state clearly which data structure(s) you will use and explain your decision. - Please explain how you communicate between the data structures and between a data structure and an interface.
Answer:
The application should have a form user interface to submit input, the input is used to query a database, if the input matches a row in the database, the value is displayed in the application.
Explanation:
The data structure in the database for the dictionary application should be a dictionary, with the input from the user as the key and the returned data as the value of the dictionary.
The dictionary application should have a user interface form that submits a query to the database and dictionary data structure returns its value to the application to the user screen.
Define algorithm
Write a small algorithm
Answer:
an algorithm (pronounced AL-go-rith-um) is a procedure or formula for solving a problem, based on conducting a sequence of specified actions. A computer program can be viewed as an elaborate algorithm. In mathematics and computer science, an algorithm usually means a small procedure that solves a recurrent problem.
Answer:
a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Explanation:
To print a budget:________.
1. From the Company Center, select Company & Financials > Budgets
2. From the Reports Center, select Budgets & Forecasts > Budget Overview
3. From the Reports Center, select Company & Financials > Budgets
4. From the Reports Center, select Accountant & Taxes > Budgets
Answer:
2. From the Reports Center, select Budgets & Forecasts > Budget Overview
Explanation:
In order to print a budget, the step is: From the Reports Center, select Budgets & Forecasts > Budget Overview
An attack in which the attacker attempts to impersonate the user by using his or her session token is known as:
Answer:
Session hijacking
Explanation:
Session hijacking : Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.
A ________ uses the Internet communications infrastructure to build a secure and private network. HAN PAN VPN WAN
Answer:
VPN is a correct answer
Answer:
VPN
Explanation:
The description of a barcode mainly serves to:________.
A. trivialize the complexity of a particular research practice.
B. use a familiar concept to communicate an idea.
C. question the novelty of a scientific phenomenon.
D. inject a note of levity into an otherwise serious argument.
Answer:
B. use a familiar concept to communicate an idea.
Explanation:
From the article written by Tim Heupink, et al, and titled "Dodos and Spotted Green Pigeons are Descendants of an Island Hopping Bird"
Following the scientist's analysis on DNA from two feathers of green pigeon which were seen they examined the minor area of DNA that are distinct for most bird species. This minor area comprises three DNA “mini barcodes." It was concluded from the analysis of mini Barcodes that the green pigeon that were discovered is certainly a different species, indicating a distinct DNA barcode compared
Hence, it can be concluded that the description of a barcode mainly serves to use a familiar concept to communicate an idea.
How to help it automation with python professional certificate?
Answer:
Following are the answer to this question:
Explanation:
As we know, that Python is based on Oop's language, it allows programmers to decide, whether method or classes satisfy the requirements.
It's an obvious benefit, in which the system tests the functions, and prevent adverse effects, and clear the syntaxes, which makes them readable for such methods.All the framework uses the python language, that will be used to overcome most every coding task like Mobile apps, desktop apps, data analyses, scripting, automation of tasks, etc.Merge arrays A and B into array C using merge sort algorithm. Give final sorted numbers of C using colored numbers without showing intermediate steps. For example, your answer can be [1, 3, 3, 5, 7, 7, 9, 9, 13, 25] or [1, 3, 3, 5, 7, 7, 9,9, 13, 25), or another variation. void merge(int all, int aux[], int lo, int mid, int hi) / for (int k = lo; k<= hi; k++) aux [k] a[k]; int i lo, j = mid+1; for (int k lo; k<-hi; k++) if (i > mid) ak) else if (1 > hi) a[k] else if (small (aux(j), aux[1])) a[k] else ak aux[j++); aux (i++); aux [j++); /*++ aux (i++]; 1 j++
Answer:
Explanation:
Given code:-
#include<iostream>
using namespace std; //namespace
#define RED "\033[31m" /* Red */
#define BLUE "\033[34m" /* Blue */ //color definition
#define WHITE "\033[37m" /* White */
void mergeArrays(int arr1[], int arr2[], int n1, int n2, int arr3[])
//merger sort
{
int i = 0, j = 0, k = 0;
while (i<n1 && j <n2) //iterate over both array
{
if (arr1[i] < arr2[j]) //iff array 1 element is larger
{
arr3[k] = arr1[i]; //assign to a3
k++;
i++;
}
else
{
arr3[k] = arr2[j]; //else assign array 2 to a3
j++;
k++;
}
}
//say the array turns out to br of different sizes
//let us copy the remaining elemnt to array 3
while (i < n1)
{
arr3[k] = arr1[i];
i++;
k++;
}
while (j < n2)
{
arr3[k] = arr2[j];
k++;
j++;
}
}
int main(){
int A[4] = {3,5,7,9}; //array 1 assignment
int a_size = 4;
int b_size = 6;
int B[6] = {1,3,7,9,13,25}; //array 2 assignment
int C[10]; //array 3 declearation
int a_count = 0;
int b_count = 0; //counter for both array index
mergeArrays(A,B,a_size,b_size,C); //merger function applied;
cout<<WHITE<<"A: ";
for(int i = 0; i<4; i++){
cout<<RED<<A[i]<<" ";
}
cout<<endl<<WHITE<<"B: ";
for(int i = 0; i<6; i++){
cout<<BLUE<<B[i]<<" ";
}
cout<<endl<<WHITE<<"C: ";
for(int i = 0; i<10; i++){ //iterate over C
if(C[i] == A[a_count] && a_count < a_size){
cout<<RED<<C[i]<<" ";
// if element is common in array 1 print in red
a_count++;
}
else if (C[i] == B[b_count] && b_count < b_size){
//say element was similar in array 2, print in blue
cout<<BLUE<<C[i]<<" ";
b_count++;
}
}
cout<<endl;
}
Processors for most mobile devices run at a slower speed than a processor in a desktop PC.
A. True
B. False
Hope this helps you! :)
The ans is A which is TRUE
(Was a tricky ques for some but... u gotta learn it!)
PLS MARK AS BRAINLIEST!
Processors for most mobile devices run at a slower speed than a processor in a desktop PC, therefore, the statement is true.
The Processor is simply known as the heart of the computer. It enables the computer to be able to execute its command.It should be noted that the processors for most mobile devices run at a slower speed than a processor in a desktop PC. It should be noted that mobile devices are smaller than computers. There is a lot of heat that is generated by the running mobile processor in mobile phones and this limits the speed of the mobile phones.In conclusion, once there's a limitation of the speed, there's a slower performance of the mobile phone.
Read related link on:
https://brainly.com/question/614196
A technician mistakenly uninstalled an application that is crucial for the productivity of the user.
Which of the following utilities will allow the technician to correct this issue?
A. System Restore
B. System Configuration
C. Component Services
D. Computer Management
The utility that allows the technician to correct this issue is system restoration. The correct option is A.
What does a system restore?System Restore is a tool for safeguarding and repairing computer software. System Restore creates Restore Points by taking a “snapshot” of some system files and the Windows registry.
Type recovery into the Control Panel search box. Choose Recovery > System Restore. Select Next in the Restore system files and settings window. Select the desired restore point from the list of results, and then click Scan for affected programs.
The Restore Process copies data from a source (one or more Archive files) to a destination (one or more tables in a database). A Restore Process consists of two phases. First, identify one or more Archive Files containing the data to be recovered and choose the desired data.
Therefore, the correct option is A. System Restore.
To learn more about system restoration, refer to the link:
https://brainly.com/question/27960518
#SPJ5
You are given an array of integers a. A new array b is generated by rearranging the elements of a in the following way:
b[0] is equal to a[0];
b[1] is equal to the last element of a;
b[2] is equal to a[1];
b[3] is equal to the second-last element of a;
and so on.
Your task is to determine whether the new array b is sorted in strictly ascending order or not.
Example
For a = [1, 3, 5, 6, 4, 2], the output should be alternatingSort(a) = true.
The new array b will look like [1, 2, 3, 4, 5, 6], which is in strictly ascending order, so the answer is true.
For a = [1, 4, 5, 6, 3], the output should be alternatingSort(a) = false.
The new array b will look like [1, 3, 4, 6, 5], which is not in strictly ascending order, so the answer is false.
Input/Output
[execution time limit] 3 seconds (java)
[input] array.integer a
The given array of integers.
Guaranteed constraints:
1 ≤ a.length ≤ 105,
-109 ≤ a[i] ≤ 109.
[output] boolean
A boolean representing whether the new array bwill be sorted in strictly ascending order or not.
Answer:
Explanation:
Take note to avoid Indentation mistake which would lead to error message.
So let us begin by;
import java.util.*; ------ using Java as our programming language
class Mutation {
public static boolean alternatingSort(int n , int[] a)
{
int []b = new int[n];
b[0]=a[0];
int j=1,k=0;
for(int i=1;i<n;i++)
{
if(i%2==1)
{
b[i]=a[n-j];
j++;
}
else
b[i]=a[++k];
}
for(int i=0;i<n;i++)
{
System.out.print(b[i]+" ");
}
System.out.print("\n");
for(int i=1;i<n;i++)
{
if(b[i]<=b[i-1])
return false ;
}
return true;
}
public static void main (String[] args) {
Scanner sc = new Scanner(System.in);
int n= sc.nextInt();
int []a = new int [n];
for(int i=0;i<n;i++)
a[i]=sc.nextInt();
System.out.println(alternatingSort(n,a));
}
}
This code should give you the desired result (output).
The program is an illustration of Arrays.
Arrays are variables that are used to hold multiple values using one variable name
The program in Java, where comments are used to explain each line is as follows:
import java.util.Scanner;
public class Main {
//This defines the alternatingSort function
public static boolean alternatingSort(int n , int[] a){
//This creates an array b
int b[] = new int[a.length];
//This populates the first element of array b
b[0]=a[0];
//This initializes two counter variables
int count1 =1,count2 = 0;
//This iterates from 1 to n - 1
for(int i=1;i<a.length;i++){
//This populates array b for odd indices
if(i%2==1){
b[i]=a[n-count1];
count1++;
}
//This populates array b for even indices
else{
b[i]=a[++count2];
}
}
//This iterates from 0 to n - 1
for(int i=0;i<a.length;i++){
//This prints the elements of array b
System.out.print(b[i]+" ");
}
//This prints a new line
System.out.println();
//This iterates from 1 to n - 1
for(int i=1;i<a.length;i++){
//This checks if the elements of array b are strictly in ascending order
if(b[i]<=b[i-1]){
return false ;
}
}
return true;
}
//The main function begins hers
public static void main (String[] args) {
//This creates a Scanner object
Scanner input = new Scanner(System.in);
//This gets input for the length of the array
int n= input.nextInt();
//This creates the array a
int a[] = new int [n];
//The following iteration populates array a
for(int i=0;i<n;i++){
a[i]=input.nextInt();
}
//This calls the alternatingSort function
System.out.println(alternatingSort(n,a));
}
}
Read more about arrays at:
https://brainly.com/question/15683939
RAID level ________ refers to disk arrays with striping at the level of blocks, but without any redundancy. A. 0 B. 1 C. 2 D. 3
Answer:
A. 0
Explanation:
RAID level zero refers to disk arrays with striping at the level of blocks, but without any redundancy.
RAID ZERO (disk striping) : This is the process of dividing a body of data into blocks and also spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs), in a redundant array of independent disks (RAID) group.
Which of the following are true statements about collisions in hashing? Linear probing can cause secondary collisions. Higher space utilization tends to cause more collisions.
Answer:
hello the options to your question is incomplete below are the options
A. Linear probing causes secondary collisions.
B. Higher space utilization tends to cause more collisions.
C. Chained entries will be ordered by key.
D. (a) and (b).
E. All of the above.
answer : (a) and (b) --- D
Explanation:
The true statements about collisions in hashing are ;Linear probing causes secondary collisions and Higher space utilization tends to cause more collisions.
collisions in hashing is when two data sets whom are distinctively different have the same hash value or checksum. the collision in hashing can be resolved by checking the hash table for an open slot to keep the data set that caused the collision.
when will you need to use a tuple data structure rather than a list of data structure
Answer:
They can always be easily promoted to named tuples. Likewise, if the collection is going to be iterated over, I prefer a list. If it's just a container to hold multiple objects as one, I prefer a tuple. The first thing you need to decide is whether the data structure needs to be mutable or not
A ________ topology uses more than one type of topology when building a network. crossover multiple-use fusion hybrid
Answer:
hybrid topology
Explanation:
The type of topology that is being described is known as a hybrid topology. Like mentioned in the question this is an integration of two or more different topologies to form a resultant topology which would share the many advantages and disadvantages of all the underlying basic topologies that it is made up of. This can be seen illustrated by the picture attached below.
Write Album's PrintSongsShorterThan() to print all the songs from the album shorter than the value of the parameter songDuration. Use Song's PrintSong() to print the songs.
#include
#include
#include
using namespace std;
class Song {
public:
void SetNameAndDuration(string songName, int songDuration) {
name = songName;
duration = songDuration;
}
void PrintSong() const {
cout << name << " - " << duration << endl;
}
string GetName() const { return name; }
int GetDuration() const { return duration; }
private:
string name;
int duration;
};
Answer:
Here is the function PrintSongsShorterThan() which prints all the songs from the album shorter than the value of the parameter songDuration.
void Album::PrintSongsShorterThan(int songDuration) const { //function that takes the songDuration as parameter
unsigned int i;
Song currSong;
cout << "Songs shorter than " << songDuration << " seconds:" << endl;
for(int i=0; i<albumSongs.size(); i++){
currSong = albumSongs.at(i);
if(currSong.GetDuration()<songDuration){ //checks if the song duration of the song from album is less than the value of songDuration
currSong.PrintSong(); } } } //calls PrintSong method to print all the songs with less than the songDuration
Explanation:
Lets say the songDuration is 210
I will explain the working of the for loop in the above function.
The loop has a variable i that is initialized to 0. The loop continues to execute until the value of i exceeds the albumSongs vector size. The albumSongs is a Song type vector and vector works just like a dynamic array to store sequences.
At each iteration the for loop checks if the value of i is less than the size of albumSongs. If it is true then the statement inside the loop body execute. The at() is a vector function that is used to return a reference to the element at i-th position in the albumSongs.
So the album song at the i-th index of albumSongs is assigned to the currSong. This currSong works as an instance. Next the if condition checks if that album song's duration is less than the specified value of songDuration. Here the method GetDuration() is used to return the value of duration of the song. If this condition evaluates to true then the printSong method is called using currSong object. The printSong() method has a statement cout << name << " - " << duration << endl; which prints/displays the name of the song with its duration.
The musicAlbum is the Album object to access the PrintSongsShorterThan(210) The value passed to this method is 210 which means this is the value of the songDuration.
As we know that the parameter of PrintSongsShorterThan method is songDuration. So the duration of each song in albumSongs vector is checked by this function and if the song duration is less than 210 then the name of the song along with its duration is displayed on the output screen.
For example if the album name is Anonymous and the songs name along with their duration are:
ABC 400
XYZ 123
CDE 300
GHI 200
KLM 100
Then the above program displays the following output when the user types "quit" after entering the above information.
Anonymous
Songs shorter than 210 seconds: XYZ - 123
GHI - 200
KLM - 100
Notice that the song name ABC and CDE are not displayed because they exceed the songDuration i.e. 210.
5.During a recent network attack, a hacker used rainbow tables to guess network passwords. Which type of attack occurred
Answer:
Rainbow table attack
Explanation:
A rainbow table attack is a type of network attack or hacking where the hacker tries to utilize a rainbow hash table to crack the passwords in a database system. A rainbow table itself is a hash function used in cryptography for saving important data in a database. Especially passwords.
In this process, sensitive data are hashed two or multiple times with the same key or with different keys so as to avoid rainbow table attack. In a rainbow table attack, the hacker simply compares the hash of the original password against hashes stored in the rainbow table and when they find a match, they then identify the password used to create the hash.
AddAll - Adds all the doubles in the string with each other. Note every double is separated by a semi-colon. AddAll("1.245;2.9")=>4.145 double AddAll(const char* str) struct Sale char Person[100]; double sale; double tax; struct SaleStatistic double average Sale; double totalSale; double totalTax; (4) AddAl - Adds all the doubles in the string with semi-colon. AddAll("1.245;2.9")=>4.145 double AddAll(const char* str) { ww struct Sale { char Person[100]; double sale; double tax; }; struct SaleStatistic -- double average Sale: double totalSale: double totalTax:
Answer: provided below
Explanation:
The code is provided below/
// the method to add all double value in the string
double AddAll(const char *str)
{
double total = 0;
vector<string> vec;
stringstream strStream(str);
while (strStream.good())
{
string substr;
getline(strStream, substr, ';');
vec.push_back(substr);
}
for (size_t i = 0; i < vec.size(); i++)
{
total = total + stod(vec[i]);
}
return total;
}
Program code with addition of the above for testing is provided thus
#include <iostream>
#include <sstream>
#include <vector>
using namespace std;
//addin all double value in syring
double AddAll(const char *str)
{
double total = 0;
vector<string> vec;
stringstream strStream(str);
while (strStream.good())
{
string substr;
getline(strStream, substr, ';');
vec.push_back(substr);
}
for (size_t i = 0; i < vec.size(); i++)
{
total = total + stod(vec[i]);
}
return total;
}
int main()
{
//method calling and display result
cout<<AddAll("1.245;2.9");
}
This gives output as:
4.145
The so-called WAP gap involves the __________ of information where the two different networks meet, the WAP gateways.
Complete Question:
The so-called WAP gap involves the ______ of information where the two different networks meet, the WAP gateways.
Group of answer choices
A. integrity.
B. confidentiality.
C. authentication.
D. WTLS.
Answer:
B. confidentiality.
Explanation:
WAP is an acronym for wireless application protocol and it is a standard communications protocol used for accessing, formatting and filtering of data (informations) on wireless devices such as mobile phones over the internet or mobile wireless network.
Simply stated, a wireless application protocol (WAP) is a lightweight and easy to use protocol designed and developed for devices with low computing power e.g mobile devices.
There are two (2) main standard protocols that are being used for the wireless application protocol (WAP), these are;
1. Transport Layer Security (TLS).
2. Wireless Transport Layer Security (WTLS).
The so-called WAP gap involves the confidentiality of information where the two different networks (WTLS and TLS) meet, the WAP gateways.
In wireless communications, the wireless transport layer security was an improvement on the transport layer security. However, it created a major problem of confidentiality in the translation of the two protocols in a WAP architecture.
First, the user data is encrypted with a public key of an application server and then encrypted again from the client mobile device to the WAP gateway using the wireless transport layer security (WTLS) and lastly, the transport layer security (TLS) is used from the WAP gateway to the enterprise server. The TLS translates the WTLS data by decrypting it first and then encrypting it again.
The security concerns or confidentiality issues associated with using WAP is that, all messages are seen in plain text by the WAP gateways in the translation at the TLS point, thus causing the so called WAP gap.
Answer:
FROM THE TOP MAKE IT DROP THATS SOME WAP WAP WAP WAP
Explanation:
The SQL WHERE clause: Limits the row data that are returned. Limits the column data that are returned. ALL Limits the column and row data that are returned.f the options
Answer: Limits the row data that are returned.
Explanation: In structured query language (SQL), The where clause is used as a filter. The filter is applied to a column and as such the filter value or criteria determines the values that are spared in the column on which the WHERE clause is applied. All rows in which the column value does not meet the WHERE clause criteria are exempted from the output. This will hence limit the number of rows which our command displays.
For instance,
FROM * SELECT table_name WHERE username = 'fichoh' ;
The command above filters the username column for username with fichoh, then displays only rows of Data with fichoh as the username. All data columns are displayed but rows of data which do not match fichoh are exempted.
Training a model using labeled data and using this model to predict the labels for new data is known as ____________.
Answer:
supervised learning
Explanation:
This process is known as supervised learning. This refers to the machine learning task of learning a function that maps an input to an output based on example input-output pairs. In other words, by teaching it a single process it is able to repeat and predict the same process or predict the output based on the inputs that are being implemented by referring to the initially learned function.
1.16 LAB: Input: Welcome message Write a program that takes a first name as the input, and outputs a welcome message to that name. Ex: If the input is Pat, the output is:
Answer:
Following are the program to this question:
val=input("")#defining val variable that inputs value
print('Hello',val,', we welcome you...')#defining print method, that print input value with the message
Output:
Pat
Hello Pat , we welcome you...
Explanation:
In the above given, python code a "val" variable, and the print that is inbuilt method is declared, inside the "val" variable the input method is used, which is used to input the value from the user side.
In the next line, the print method has declared, which is used to print the value with the message.
A DATABASE IS A COLLECTION OF _____ DATA
Answer:
related
Explanation:
Database is an integrated collection of logically related records or files. A database consolidates records previously stored in separate files into a common pool of data records that provides data for many applications. The data is managed by systems software called database management systems
Out of the choices provided above, it can be concluded to state that A database is a collection of related data. Therefore, the option A holds true.
What is the significance of a database?A database can be referred to or considered as a data that contains a collection or compilation of different sets of data observations. These observations are having a common characteristic, which is always predefined for easy access of the user of the data.
A database set can never have data about two or more things, which are completely unrelated to each other, simply because it does not make any sense or utility to use such database as one whole set of observation. The data must be related in some way or the other.
Therefore, the option A holds true and states regarding the significance of database.
Learn more about database here:
https://brainly.com/question/6447559
#SPJ6
The missing choices are added below for better reference.
A. Related
B. Unrelated
C. Scattered
Which type of firewall is ideal for many small office/home office (SOHO) environments?
Answer:
Native OS firewall
Explanation:
Native OS firewall is a computer engineering term that is used in describing a form of the operating system that is in-built or comes from manufacturers of a given device.
Therefore, given that it supports basic functionality, and many, if not all small office/home office (SOHO) environment works with small or little traffic. Hence, for easy navigation and work-around, it is most ideal to use Native OS firewall
How do diverse regulatory practices impede the integration process in a global information system (GIS)
Answer:
Following are the explanation to this question:
Explanation:
In the various regulatory procedures were also simply corporate initiatives, as well as their analytical application by using the open standards users could even solve its problematic situation. It may not work forever, and it is some type of temporary fix.
All such activities include the state or country-related problems only with the Global Information System results. Or in various countries police forces are different. All these price differences thus help the development of incorporation into one of GIS.