Answer:
Words found in phishing messages are:
Free gift
Promotion
Urgent
Congratulations
Check
Money order
Social security number
Passwords
Investment portfolio
Giveaway
Get out of debt
Ect. this should be a good starting point to figuring out a full list
Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situations that you could use it in?
Answer:
html is a thing that u can to create an website business that u can make money on it
An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.
Answer:
The main problem with such a tool would be resource usage
Explanation:
The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.
Joseph learned in his physics class that centimeter is a smaller unit of length and a hundred centimeters group to form a larger unit of length called a meter. Joseph recollected that in computer science, a bit is the smallest unit of data storage and a group of eight bits forms a larger unit. Which term refers to a group of eight binary digits? A. bit B. byte O C. kilobyte D. megabyte
Answer:
byte
Explanation:
A byte is made up of eight binary digits
examples of pop in computer
Answer:
Short for Post Office Protocol, POP or POP mail is one of the most commonly used protocols used to receive e-mail on many e-mail clients. There are two different versions of POP: POP2 and POP3. POP2was an early standard of POP that was only capable of receiving e-mail and required SMTP to send e-mail. POP3 is the latest standard and can send and receive e-mail only using POP, but can also be used to receive e-mail and then use SMTP to send e-mail.
Before hard disk drives were available, computer information was stored on:
Floppy Disks
Cassette Tapes
Punch Cards
All of the Above
Write a line of code that declares a variable called shipName and set it equal to the string SpaceX3000.
Answer:
shipName = "SpaceX3000"
Explanation:
In java I need help on this specific code for this lab.
Problem 1:
Create a Class named Array2D with two instance methods:
public double[] rowAvg(int[][] array)
This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per row of the 2D array argument.
The method will adjust automatically to different sizes of rectangular 2D arrays.
Example: Using the following array for testing:
int [][] testArray =
{
{ 1, 2, 3, 4, 6},
{ 6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
must yield the following results:
Averages per row 1 : 3.20
Averages per row 2 : 8.20
Averages per row 3 : 13.20
While using this other array:
double[][] testArray =
{
{1, 2},
{4, 5},
{7, 8},
{3, 4}
};
must yield the following results:
Averages per row 1 : 1.50
Averages per row 2 : 4.50
Averages per row 3 : 7.50
Averages per row 4 : 3.50
public double[] colAvg(int[][] array)
This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per column of the 2D array argument.
The method will adjust automatically to different sizes of rectangular 2D arrays.
Example: Using the following array for testing:
int [][] testArray =
{
{ 1, 2, 3, 4, 6},
{ 6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
must yield the following results:
Averages per column 1: 6.00
Averages per column 2: 7.00
Averages per column 3: 8.00
Averages per column 4: 9.00
Averages per column 5: 11.00
While using this other array:
double[][] testArray =
{
{1, 2},
{4, 5},
{7, 8},
{3, 4}
};
must yield the following results:
Averages per column 1: 3.75
Averages per column 2: 4.75
My code is:
public class ArrayDemo2dd
{
public static void main(String[] args)
{
int [][] testArray1 =
{
{1, 2, 3, 4, 6},
{6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
int[][] testArray2 =
{
{1, 2 },
{4, 5},
{7, 8},
{3,4}
};
// The outer loop drives through the array row by row
// testArray1.length has the number of rows or the array
for (int row =0; row < testArray1.length; row++)
{
double sum =0;
// The inner loop uses the same row, then traverses all the columns of that row.
// testArray1[row].length has the number of columns of each row.
for(int col =0 ; col < testArray1[row].length; col++)
{
// An accumulator adds all the elements of each row
sum = sum + testArray1[row][col];
}
//The average per row is calculated dividing the total by the number of columns
System.out.println(sum/testArray1[row].length);
}
} // end of main()
}// end of class
However, it says there's an error... I'm not sure how to exactly do this type of code... So from my understanding do we convert it?
Answer:
Explanation:
The following code is written in Java and creates the two methods as requested each returning the desired double[] array with the averages. Both have been tested as seen in the example below and output the correct output as per the example in the question. they simply need to be added to whatever code you want.
public static double[] rowAvg(int[][] array) {
double result[] = new double[array.length];
for (int x = 0; x < array.length; x++) {
double average = 0;
for (int y = 0; y < array[x].length; y++) {
average += array[x][y];
}
average = average / array[x].length;
result[x] = average;
}
return result;
}
public static double[] colAvg(int[][] array) {
double result[] = new double[array[0].length];
for (int x = 0; x < array[x].length; x++) {
double average = 0;
for (int y = 0; y < array.length; y++) {
average += array[y][x];
}
average = average / array.length;
result[x] = average;
}
return result;
}
When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustment can be done by normalizing to values between 0 and 1, or throwing away outliers.
For this program, adjust the values by dividing all values by the largest value. The input begins with an integer indicating the number of floating-point values that follow.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
5 30.0 50.0 10.0 100.0 65.0
the output is:
0.30 0.50 0.10 1.00 0.65
The 5 indicates that there are five floating-point values in the list, namely 30.0, 50.0, 10.0, 100.0, and 65.0. 100.0 is the largest value in the list, so each value is divided by 100.0.
For coding simplicity, follow every output value by a space, including the last one
1 #include
2 #include
3 #include
4 using namespace std;
5
6 int main() {
7
8 /* Type your code here. */
9
10 return 0;
11 }
12
Answer:
5.23 LAB: Adjust values in a list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.
Explanation:
What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another country a field in a table that uniquely identifies a record in a relational database a field in a table that links it to other tables in a relational database
Answer: a field in a table that links it to other tables in a relational database
A - a security key to a database that stores foreign data
To add musical notes or change the volume of sound, use blocks from.
i. Control ii. Sound iii. Pen
Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. What inputs and outputs are needed to support the storage environment
Answer:
Pros of cloud storage
Files can be accessed remotely without having to be connected to a company's intranetSecurity and file backups are managed by the cloud storage company, frees up employees time applying updates and other maintenance tasks.Usually billed monthly which allows for a lower initial startup costCons of cloud storage
File security relies upon trust in the cloud storage providerLong term cost could be higher than storing files yourselfRequires an internet connection to access fileshe is trying to find information on the internet first he navigated to a search engine entered the keywords database administrator and clicked on search the results did not show what it was looking for
Answer:
b
Explanation:
b
Earl develops a virus tester which is very good. It detects and repairs all known viruses. He makes the software and its source code available on the web for free and he also publishes an article on it. Jake reads the article and downloads a copy. He figures out how it works, downloads the source code and makes several changes to enhance it. After this, Jake sends Earl a copy of the modified software together with an explanation. Jake then puts a copy on the web, explains what he has done and gives appropriate credit to Earl.
Discuss whether or not you think Earl or Jake has done anything wrong?
Answer:
They have done nothing wrong because Jake clearly gives credit to Earl for the work that he did
Explanation:
Earl and Jake have nothing done anything wrong because Jake give the proper credit to Earl.
What is a virus tester?A virus tester is a software that scan virus on computer, if any site try to attack any computer system, the software detect it and stop it and save the computer form virus attack.
Thus, Earl and Jake have nothing done anything wrong because Jake give the proper credit to Earl.
Learn more about virus tester
https://brainly.com/question/26108146
#SPJ2
Write a SELECT statement that displays each product purchased, the category of the product, the number of each product purchased, the maximum discount of each product, and the total price from all orders of the item for each product purchased. Include a final row that gives the same information over all products (a single row that provides cumulative information from all your rows). For the Maximum Discount and Order Total columns, round the values so that they only have two decimal spaces. Your result
Answer:
y6ou dont have mind
Explanation:
Information Technology
Answer:
information technologies
Explanation:
Information technology is the study, design, development, implementation, support or management of computer-based information systems—particularly software applications and computer hardware. IT workers help ensure that computers work well for people.
Nearly every company, from a software design firm, to the biggest manufacturer, to the smallest “mom & pop” store, needs information technology workers to keep their businesses running smoothly, according to industry experts.
Most information technology jobs fall into four broad categories: computer scientists, computer engineers, systems analysts and computer programmers. HR managers responsible for recruiting IT employees increasingly must become familiar with the function and titles of the myriad job titles in demand today.
Some of them are listed below:
Database administration associate
Information systems operator/analyst
Interactive digital media specialist
Network specialist
Programmer/analyst
Software engineer
Technical support representative
Answer:
Information technology is the use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise
What is the creative strategy for music application.
Answer:
The City of Vancouver has allocated $300,000 to support the growth and development of the Vancouver Music Strategy, developed to address current gaps in the music ecosystem that support: Creating a sustainable, resilient, and vibrant music industry.
Explanation:
Animation timing is does not affect the
speed of the presentation
Select one:
True
False
Answer:
True
Explanation:
I think it's true.....
How does it relate
to public domain
and fair use?
Read the 4 entities below and assume that customer_id is the key common to all tables.
Customer: An entity that describes a customer. An instance occurs for unique customers only using name, date of birth, and login name as customer_id primary key.
Online: An entity that describes a customer purchasing activity online. An instance occurs when the customer completes the transaction. Customers can purchase more than once.
Visits: An entity that describes a customer purchase in a physical store. An instance occurs if a customer makes or purchase or checks-in using an app. Customers can visit more than once per day.
Satisfaction: An entity that represents data from a recent customer satisfaction survey. An instance occurs when a customer takes the Survey. A customer is tracked by login name and can only take the survey one time.
Use the information to match the following relationships. Answers can be reused more than once.
1. The relationship between Customer and Online.
2. The relationship between Customer and Satisfaction.
3. The relationship between Online and Visits.
4. The relationship between Visits and Satisfaction
A. prototype
B. one-to-one
C. Zero-sum
D. one-to-many
E. TOO many
F. many-to-many
Answer:
1. The relationship between Customer and Online - One to One
2. The relationship between Customer and Satisfaction - Many to Many
3. The relationship between Online and Visits - Zero sum
4. The relationship between Visits and Satisfaction - Prototype
Explanation:
The relationship between customers and satisfaction is important for any business. One disappointed customer will make a business to loose 10 new customers. The customer satisfaction is most important for any business and it is necessary to get feedback from customers in order to know whether the business service is adequate to satisfy a customer positively.
A medium-sized highway construction company CST has chosen to constrain its investment in computing resources to laptop and desktop computers and the necessary networking hardware and software to access the Internet efficiently. All of CST's data is to be stored off-site through an Internet-enabled storage provider that is used by many different companies and organizations. The service model employed for the data storage capability of only CST is:
Answer:
The service model employed for the data storage capability of only CST is:
SaaS (Software as a Service).
Explanation:
The three cloud computing categories are Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). The three cloud computing services provide different virtual computing resources. In the case of CST, it utilizes only the data storage software of a provider, who provides the data storage infrastructure, including cloud-based servers, while CST uses its own "laptop and desktop computers and other networking hardware and software to access the Internet efficiently."
Explain the paging concept and main disadvantages of pipelined
approaches? Compare the superscalar and super pipelined approaches
with block diagram?
Answer:
PAGINACIÓN En la gestión de memoria con intercambio, cuando ... Debido a que es posible separar los módulos, se hace más fácil la modificación de los mismos. ... Ventajas y Desventajas de la segmentación paginada
Explanation:
Which of the following techniques is a direct benefit of using Design Patterns? Please choose all that apply Design patterns help you write code faster by providing a clear idea of how to implement the design. Design patterns encourage more readible and maintainable code by following well-understood solutions. Design patterns provide a common language / vocabulary for programmers. Solutions using design patterns are easier to test
Answer:
Design patterns help you write code faster by providing a clear idea of how to implement the design
Explanation:
Design patterns help you write code faster by providing a clear idea of how to implement the design. These are basically patterns that have already be implemented by millions of dev teams all over the world and have been tested as efficient solutions to problems that tend to appear often. Using these allows you to simply focus on writing the code instead of having to spend time thinking about the problem and develop a solution. Instead, you simply follow the already developed design pattern and write the code to solve that problem that the design solves.
How was the first computer reprogrammed
Answer:
the first programs were meticulously written in raw machine code, and everything was built up from there. The idea is called bootstrapping. ... Eventually, someone wrote the first simple assembler in machine code.
Explanation:
Suppose you are choosing between the following three algorithms:
• Algorithm A solves problems by dividing them into five subproblems of half the size, recursively solving each subproblem, and then combining the solutions in linear time.
• Algorithm B solves problems of size n by recursively solving two subproblems of size n − 1 and then combining the solutions in constant time.
• Algorithm C solves problems of size n by dividing them into nine sub-problems of size n=3, recursively solving each sub-problem, and then combining the solutions in O(n2) time.
What are the running times of each of these algorithms (in big-O notation), and which would you choose?
Answer:
Algorithm C is chosen
Explanation:
For Algorithm A
T(n) = 5 * T ( n/2 ) + 0(n)
where : a = 5 , b = 2 , ∝ = 1
attached below is the remaining part of the solution
Which of the following describes a codec? Choose all that apply.
a computer program that saves a digital audio file as a specific audio file format
short for coder-decoder
converts audio files, but does not compress them
Answer:
A, B
Explanation:
the
Wnte
that
Program
will accept three
Values of
sides of a triangle
from
User and determine whether Values
carceles, equal atera or sealen
- Outrast of your
a
are for
an
Answer:
try asking the question by sending a picture rather than typing
What is the command to launch each of the following tools? Local Group Policy Local Security Policy Computer Management console Local Users and Groups console Resultant Set of Policy (RSoP)
Answer:
The command for
Local Group Policy is GPedit.msc
Local Security Policy is SecPol.msc
Computer Management console is Compmgmt.msc
Local Users and Groups console is Lusrmgr.msc
Resultant Set of Policy is RSOP.msc
Explanation:
The command for
Local Group Policy is GPedit.msc
Local Security Policy is SecPol.msc
Computer Management console is Compmgmt.msc
Local Users and Groups console is Lusrmgr.msc
Resultant Set of Policy is RSOP.msc
Suppose you have the following search space:
State
next
cost
A
B
4
A
C
1
B
D
3
B
E
8
C
C
0
C
D
2
C
F
6
D
C
2
D
E
4
E
G
2
F
G
8
Draw the state space of this problem.
Assume that the initial state is A and the goal state is G. Show how each of the following search strategies would create a search tree to find a path from the initial state to the goal state:
Breadth-first search
Depth-first search
Uniform cost search
Breadth
Depth
Uniform
U
(Hours, minutes, and seconds) Write a method that returns a string in the form of hour:minute:second for a given total seconds using the following header:
public static String format(long seconds)
Here is a sample run:
Enter total seconds: 342324
The hours, minutes, and seconds for total seconds 342324 is 23:05:24
Note that a zero is padded to hour, minute, and second if any of these values is a single digit.
Answer:
Answered below.
Explanation:
class Convert {
public static String format(long seconds) {
Scanner sc = new Scanner(System.in);
System.out.print("Enter total seconds: ");
int secs = sc.nextInt();
int hours = secs / 3600;
int minutes = (secs % 3600) / 60;
int seconds = (secs % 3600) % 60;
String timeFormat = hours + ":" + minutes + ":" + seconds;
return timeFormat;
}
}
Complete the problem about Olivia, the social worker, in this problem set. Then determine the telecommunications tool that would best meet Olivia's needs.
PDA
VoIP
facsimile
Internet
Answer:
PDA is the correct answer to the following answer.
Explanation:
PDA refers for Programmable Digital Assistant, which is a portable organizer that stores contact data, manages calendars, communicates via e-mail, and manages documents and spreadsheets, typically in conjunction with the user's personal computer. Olivia needs a PDA in order to communicate more effectively.