create “Online shopping System” with c++ following this option 1. Add item(using queue with array of struct) 2.process item(dequeue, and put new item into list) 3. Disply item(sort the list by using any sort method)
Transcribed Image Text: Write a c++ program to read a
sequence of numbers and stop
when the sum of odd numbers
equal to the sum of even
numbers and then print their sum
(using while)
A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean.
Transcribed Image Text: Which of the following is NOT
a feature of the Python
programming language?
O a. Simple
O b. Free and Open
Source
O C. Easy to learn
o d. Low level language
Assuming the ocean’s level is currently rising at about 1.6 millimeters per year, create an application that displays the number of millimeters that the ocean will have risen each year for the next 25 years.
The three methods for doing a blind search should be explained. Which process do you believe is the most effective? Provide justifications and relevant instances. ‘Artificial Intelligence’ is a term that refers to artificial intelligence.
? Transcribed Image Text: QUESTION 17
To connect a workstation serial port to a router console port we use:
O a. Crossover
O b. Straight Through
O c. Rollover
O d. All of the above
Consider the opportunity of applying for a position with a neworganization. What would you like the employer to know aboutyou? How does your Strengths Test accent your potentialwithin that organization? Please clarify your responsethrough examples.
AWS Lambda Function Please provide a lambda function with a lambda trigger and a deletion policy of any kind…(An example in other words). I am trying to do a demo for a CloudFormation stack 🙂
I could use some help with making a working code for a 12 hour clock system in verilog for my DE0lite or any other Fpga Board. I am being unable to get the results correct
Principles of Inforamtion Security Which of the following would provide the way to test operating system patches for a wide variety of computers before deployment? A. OS hardening B. Application control C. Virtualization D. Sandboxing
28)In the e-government audit approach; the key indicators of the portal level’s assessment are all of the following, except:
Select one:
a. Visitor base growth rate
b. Visitor conversion rate
c. Awareness
d. Service range
START ITEM A ACTIVITIES B C D E F G END ITEM H Prepare your own Network Diagram in order to reach the end item. Explain how you reach Item H in a paragraph form.
1. A.Write a program for displaying the string declared in an array, str[] = “hello”,in reverse order of characters using pointers. B.Write a program for initializing from another vector that will output 10 20 30
Registers are small, quick, stand-alone data storage places that are used to temporarily store information. in the central processing unit (CPU). List any three different kinds of registers and explain what they are used for.
I need the answer as soon as possible Transcribed Image Text: True or false
10 INPUT N
20 FOR I=1 TO N
30 INPUT X,Y
40 Z=Z+((X^2-3Y)/(Y+COS(X*3.14/180)))
50 NEXT I
60 PRINT Z
70 END
Compiler Design Transcribed Image Text: When using BNF to specify a programming language, the
of the
.grammar are comprised of the tokens produced by the lexical scanner
a) terminals
b) non-terminal
c) Productions
d) Rules
Suggest at least TWO possible control or counter-measure that could use to prevent one of the following threats: Malware, Denial of Service, Phishing, SQL Injection . Discuss why you think this is a valid countermeasure.
Give a detailed description of the flow of execution of a program using functions. Please reexamine the usage of function prototypes in order Include a description of how a function call works when a program
Transcribed Image Text: find count value *
Class counter
Int Count=D0;
Puplic:
counter():Count(9);
{}
void counter(int x)
{
www
Count=x;
Count-;
}
Void Main()
{counter c(8)
counter c1;
cout<< Count
count=9
count37
counts8
ather answer
Transcribed Image Text: Q2)
1) Is the following HTML file is valid?
2) What does DOCTYPE mean?
What steps do you believe are necessary to ensure the security of data at rest and in transit? Furthermore, which security method is more successful in terms of data integrity protection and user authentication protection.
91. The _____ scheme uses data patterns of size 2 and encodes the 2-bit patterns as one signal element belonging to a four-level signal. a. 4B5B b. 2B1Q c. MLT-3 d. none of the above
>ython program to check prime number take user input – | am beginner to programming help Transcribed Image Text: python program
to check prime number
input
I am beginner to programming help me
take user
Is the internet useful for those with disabilities, whether they’re physical or mental? What new technology do you think will be developed to help those who have special needs? • Should assistive technology be open-sourced?
i. How can a mixed network be converted into a directed network? ii. Distinguish between the various types of arcs in network model iii. In one sentence carefully distinguish between feasible solution and optimal solution
Create a JavaScript program to compute the sum of the two given integers. If the two values are same, then returns triple their sum. Take sample values as, (12,10) and (13,13) to test the code.
Your goal is to build a page that has a button and text that wraps around the left edge of the button. Which CSS property and value should be used to create the button’s appearance?
When is breadth-first search is optimal? Select one: a. When there is less number of nodes b. When all step costs are equal c. When all step costs are unequal d. All of the above
Which architectural pattern is best for applications in which one component generates data and another uses it? Explain the pattern with two real-life examples, or write a piece of code to demonstrate how it works.
Solution by Matlab language Transcribed Image Text: Q4:
Use the funetions for plotting x-y data for plotting the following functions:
() f() =t cos(t)
(ii) x =e
y = 100 + e
0SIS2 step 0.06
Write a function in C++ that takes a list as input and prints all the unique values in the array only once, i.e., if a value is repeated it should be printed only once .
3. Write a program in C++ to find the Greatest Common Divisor (GCD) of two numbers iteratively. Sample Output: Input the first number: 12 Input the second number: 8 The Greatest Common Divisor is: 4
The following 6-bit signed binary numbers were found in a computer. What decimal numbers do they represent? A) 010111 B) 111011 give me full details or will dislike and correct answer don’t copy and paste
A _____ is a product or service, such as a technical report, a training session, or hardware, produced or provided as part of a project. a. deliverable b. product c. work package d. tangible goal
188. Terminals are required for …………….. a. real-time, batch processing & time-sharing b. real time, time-sharing & distributed message processing c. real time, distributed processing & manager inquiry d. real-time, time sharing & message switching
c++ Transcribed Image Text: Evaluating Output.
What is the output from the following code segment?
int point = 1;
while ( point ! = 13)
{
cout << point << ", ";
point +=3;
}
• Describe in detail the procedures necessary to do the following activities in Microsoft Office Word: 4) Insert a heading into the document. 5)Insert a hyperlink to another document to which you want to connect.
Q3: Design a form with a text box in visual basic . Use select statement so that when user
enters g, b, r and respectively.
y then form colored to green, blue, red, and yellow
Considering software evolution;
What are the strategic options for legacy system evolution? When would you normally replace all part of a system rather than continue maintenance of the software?
I appreciate your help, thank you
How may auditing and accountability improve an IT infrastructure’s overall architectural design, according to NIST SP 800-53 Rev 4 Appendix F: Security Control Catalog – AU: Audit and Accountability? Give concrete instances if you can.
Consider Greg Linden’s illustration of search engines learning by observing which search results users click. What are the advantages of having this information for the search engine company (e.g., Google or Microsoft in Linder’s examples)?
When is it appropriate to use Excel to create a table in Word rather than a spreadsheet program such as Excel? What are some of the advantages and disadvantages of creating a table in Word?
With the advancement of technology, the majority of appliances are wireless-capable nowadays. Is it true that wireless information appliances and services have an effect on corporate Internet and Web usage in the business sector? Why?
m beginner in java Transcribed Image Text: java program
take an array ( 11 size) of character from user
and make a string from these entries and print this string
I am beginner in java
Transcribed Image Text: 22
* :Calculate the object code for the instruction at address 1086
53AFD9 Transcribed Image Text: 23
:Calculate the object code for the instruction at address 108E
?B25
24
and End records)
What is the difference between database security and system security when it comes to protecting the database? When creating web-based data designs, does it matter? If this is the case, what steps should I take?
Transcribed Image Text: 7. Which
Which o
as a quadratic so
8. Which data structure allows deleting data elements from front and inserting at rear?
A. Stacks
B.Queues
C. Binary search trees
D. Hash tables
Please solve Quickly Matlab programming language Transcribed Image Text: What is the output of the following code? X-[123 4… 1:
A row vector.
A column vector.
A row vector concatenated with a null vector.
error
What is the definition of physical security? What are the most serious risks to physical security in today’s world? What manifestations do they take in assaults on the organization and how do they show themselves?
Transcribed Image Text: is a statistical metric indicating how well a model fits the data?
O a. Relative Squared Error
O b. Relative Absolute Error
O. Root Mean Squared Error
O d. Coefficient of Determination
Transcribed Image Text: /*Write C++ program to creat a class named (Student) which includes
functions getName, getMark and displayInfo to enter
and display the information (names and marks) of 5 students using array of objects*/
An Abstract Data Type (ADT) is a data type that contains just variables, without information about their values. ADTs have many benefits. By reducing the issue to its simplest parts, it becomes easier to solve.
Transcribed Image Text: Write a MATLAB program that used to calculate the
factorial of any integer number that may read from the
key board by using
a)Script file only.
b)By using function and script file.
computer science dont post copied answer posting mutliple times Transcribed Image Text: Provide the type (I, R, or J) I
and hexadecimal representation
(begin with
Ox, e.g., OXAA230103) of the following instruction:
sw $s1, 4($t2)
C++ Programming double slope (point* other ) Calculate the slope of this point and the other point. The formula for slope is m=(y 2 – y 1 ) / (x 2 – x 1 )
Answer both questions must else downvote Transcribed Image Text: 1. Write a Python program to print every key-value pair of a dictionary line by line.
2. Write a Python program to merge two Python dictionaries.
Which of the following is the “part-whole” or “a-part-of” relationship in which objects representing the component of something are associated with an object representing the entire assembly? a. Generalization b. Specialization c. Aggregation d. None
Explain whether “undecidable” is a way to represent null value or default value if a student has not chosen a major at a university and the value of “undecided” is entered for the major field.
Choose which answers are correct
Which among the following is not a method to do unit commitment ?
a . Dynamic programming
b . Lambda iteration
c. Brute force technique
d . Priority list method
In programming Languages that support bytecode (i.e. Java), the bytecode may beused by a byte code interpreter or a JIT compiler to be translated into the assembly code of the target machine. True or false
How do you fix the if statement in java, so that city can equal to multiply different cities Transcribed Image Text: if ((province.equals(“ontario”)) & (age.equals(“yes”) &
(city.equals (“toronto” & city.equals(“scarborough”)
& city.equals(“etobicoke”) & city.equals(“brampton”))))) {
Aim: – Subtract two numbers, check for negative. IF the result is negative store the number in 2000H. If it is positive, increment the result once and store it in 2005H. ? Platform Required:- sim8085
In your own words, make a compelling argument for and against the benefits and drawbacks of division of duties in an organization’s information security policy, drawing on a practical example from your own professional experience.
Is security policy different from information security standards in that it is considered as static or dynamic, as opposed to the latter? What variables could play a role in deciding the outcome of this scenario?
Transcribed Image Text: Which of the following is/are examples of dynamic programming?
I) Tower of Hanoi
II) Merge sort
III) Knapsack problem
IV) Strassen’s matrix multiplication
IV
None
O I, III, IV
O I, III
Transcribed Image Text: A digital system of an n bit. The total number of its samples 1024. The value of n i .
Select one:
O a. 11
O b.8
O c9
O d. 10
Given two integers in the program, write a program to check whether sum of those numbers is greater than 100 or not. For sample output take numbers as 62 and 57. Use Kotlin programming language.
Write in decimal form the IP address 11000001. 00000001. 10000000. 10000001 Group of answer options 193.1.128.129Links to an external site. 193.1.64.65Links to an external site. 63.101.128.129Links to an external site. 193.1.128.229Links to an external site.
Design a method to draw the following pattern: The name of the method has the following prototype: private static void drawPattern (int height) Transcribed Image Text: 1*1
12**21
123***321
1234****4321
12345*****54321
123456******654321
1234567*******7654321
12345678********87654321
123456789*********987654321
i need the answer quickly Transcribed Image Text: 5/ The modulus operator uses
character.
A. +
B. *
C./
D. %
6/ Variable names must begin with
?. S
A. letter
C. number
D. #
In java create a function that writes student name surname and id to a text file and call the function (registerstd) in main function. the function must accept the arguments name , surname and ID
Explain how database management software helps business professionals and supports the
operations and management of a business. How should a business store, access, and distribute
data and information about its internal operations and external environment
a) What are the different varieties of COTS software? Give an example for each of them.
b) Differentiate among: font, font size, and font style.
c) Describe issues that might arise when using legal software.
What is the difference between screened host architectures for firewalls and screened subnet architectures for firewalls? As a result, which of these provides more protection for information assets that stay on the trusted network? Why?
Transcribed Image Text: factoring
O Adding new functionalities
18. The X-axis of the sequence diagram represents
O Time
O objects
O Activation
O Messages
19. Understand and define the context and the external interactions wit
None Transcribed Image Text: 2. For 80286 processor which has a 24 bit address bus, maximum amount of addresses for
single operation is
b) 4 M
d) 16 M
a) 2 M
c) 8 M
160. ISDN is a group of __________ standards relating to digital transmission across conventional copper wire telephone lines, as also other media. a. CCITT b. ITU c. Both a & b d. None of these
22. The message 11001001 is to be transmitted using the CRC polynomial x3 +1 to protect it from errors. The message that should be transmitted is : a. 110010011001 b. 11001001 c. 110010011001001 d. 11001001011
Transcribed Image Text: What type of RJ45 UTP cable do you use to connect a PC’s COM port to a router or switch console port?
O Straight-through
Crossover cable
Crossover with a CSU/DSU
O Rolled
Human Computer Interaction There are some important features of interactive system in website design. Give a brief description with example for the given feature below: “Systems which can self-adapt intelligently in response to user performance”
A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean.
Transcribed Image Text: O Maintenance
6. Any constraint on the development process is: *
O Functional requirement
O External requirement
O Product requirement
O Organizational requirement
7. Which of these factors may
affect porfe
ma
Transcribed Image Text: Which term is used for minimizing attack surface in Operating Systems?
Your answer:
O Operating system hardening
O Operating system minimizing
O Operating system fortifying
Operating system empowering
O Operating system leveraging
Transcribed Image Text: 2.12 LAB: Divide by x
Write a program using integers user_num and x as input, and output user_num divided by x three tim
Ex: If the input is:
2000
2
Then th
q19 Transcribed Image Text: Building the entities, attributes, constraints, and relationships in a particular RDBMS is called the
physical-level design a O
conceptual design .b O
entity-relationship (E-R) design .c O
information-level design .d O
137. What is a search key in sequential file organization? a. A number assigned to each record b. Necessarily the primary key c. Any attribute or a set of attributes d. None of the mentioned
what is the correct answe Transcribed Image Text: Which of the following mechanisms is used to implement the reuse of the operations
depending upon the instance?
a. Encapsulation
b. Abstraction
O . Polymorphism
d. Inheritance
A _________ is the second smallest unit represented in the data hierarchy and is represented is composed of a series of _______that can take on either a 0 or 1 value.
-character;bit
-byte;bit
-field;bit
-field;character
Instructions : Circle T if the statement is true, F if the statement is false, or write the best answer in the space provided. When_________organization is used, a hashing procedure determines where data is stored.
Write a program to calculate the energy bill. Input the meter readings and find the energy bill when consumed energy is greater than or equal to 300 units then the rate is 3.50/unit otherwise 1.50/unit.
Write a C++ function to take input two positive integers from the user and return true if the last digit of both numbers is same, else return false. Also test the function inside main function.
I need the answer as soon as possible Transcribed Image Text: We had a file named a.txt and something is
written on it. Write a program in python to
get the letters in that file
15) In the e-government audit approach; the key indicators of the user level’s assessment are all of the following, except:
Select one:
a. Visitor base growth rate
b. User satisfaction
c. Awareness
d. User recommendation
i need the answer quickly Transcribed Image Text: ) ???????
Write C++ a program takes an array and
checks if it is a square matrix or not , then
print the diameters .(Use the function)
The famous “1984” commercial was revolutionary in that it framed the computer revolution as a battle between an upstart rebel company and “Big Brother” . . . or Apple versus IBM a. True b. False
________ is a type of transmission impairment in which the signal loses strength due to the different propagation speeds of each frequency that makes up the signal. a. Attenuation b. Distortion c. Noise d. Decibel
Transcribed Image Text: 12- Find the result for the following.
a- (-27)10 +(-41)10 (in binary, then convert the answer to decimal)
b- (45)10 +(78)10 in BCD code
c- (CF)16 – (56)s in Hex.(using two method)
Transcribed Image Text: Construct an E-R diagram for a local
car-insurance company in Salalah, whose
customers own one or more cars each.
Each car has associated with it zero to any
number of recorded accidents.
Use the construction given in the proof of Theorem 1.49 to give a state diagram of an NFA recognizing the Kleene star L ? of the language L = {w|w contains at least three 1’s}.
Transcribed Image Text: Head
???
A
D
5
3.
2.
In the above Self Organizing List, how the list would look like after the following 2 operations?
Access D “Transpose”
Access F “Move to Front”
Transcribed Image Text: Which one is true for cookies?
O They contain data about the client.
O They are stored in the server.
O They send data to the server.
O They are executable programms.
What must the attacker perform in order for a sniffer attack to be successful? Is it possible for an attacker to obtain access to a network in order to make use of the sniffer system?
182. Which of the following is a myth in testing? a. Tester can find bugs b. Any user can test software c. Missed defects are not due to testers d. Complete testing is not possible
dr java Transcribed Image Text: What is the result of executing the following code?
int i = 1;
do {
i++;
} while (i > 5);
System.out.println (i) ;
3
4.
O 2
O 1
67. The command in high level programming which completes the release of buffers and perform other cleanup operations remaining is classified as a. read command b. find next command c. close command d. insert command
Explain briefly the following Object Oriented concepts. (a) Local variable (b) Instance variable (c) Method (d) Inheritance (e) Constructor (f) Encapsulation (getters and setters) (g) Method overloading (h) Method overriding (i) Super keyword (j) Interface
1. Write a program in C++ to find the Greatest Common Divisor (GCD) of two numbers iteratively. Sample Output: Input the first number: 12 Input the second number: 8 The Greatest Common Divisor is: 4
Answer within 1 minute else I will dislike for wasting my question. Write C ++ program to add two numbers a=16 and b= -8 and print the sum. Add output screenshot. Needed Within 1 minute.
14. The media file is streamed to the client but is only played and not stored by the client in : a. progressive download b. regular download c. real time streaming d. virtual time streaming
Suppose a processor executes 12 instructions. Each of these instructions required 5 clock pulses to complete. The processor has a clock period of 4 nanoseconds. What is the CPU time of these instructions (in nanoseconds)?
The cloud computing characteristic that gives the illusion of infinite computing resources provisioned or released according to demand is known as: Select one: Measured service Resource pooling Ubiquitous network access Rapid elasticity On-demand self service
Choose the best Transcribed Image Text: In which of the following computer language, translation is not required?
O a. Assembly Language
O b. Low Level Language
c. None of these
O d. gh Level Language
Q: Find a recurrence relation and give initial conditions for the number of bit strings of length n that do not have two consecutive 0s. How many such bit strings are there of length five?
Transcribed Image Text: What is the output after excuted the following statements:
int y=1, x;
y=y+2*4;
X—y;
if(x)
cout<
using namespace std;
void myfunction(int num2, int num1);
int main(){
myfunction (5,2);
return e;}
void myfunction(int num1, int num2)
| {if (num1>3)
cout<<"A1";
else if (num1<3)
cout<<"A2";
else
cout<<"A3";}
Transcribed Image Text: An example on propositional logic
O a. “x + 2 = x 2.”
O b. “x is the parent of y.”
O C. Socrates is a man
O d. “x is human.”
Registers are small, quick, stand-alone data storage places that are used to temporarily store information. in the central processing unit (CPU). List any three different kinds of registers and explain what they are used for.
When it comes to detecting fraud, what types of processes are in place: In the context of network reconnaissance, network sniffing may be defined as follows: (a) (c) Is the potential of wiretapping a consideration?
In the transport layer, TCP offers full duplex, connection-oriented and dependable delivery services. TCP is a transport protocol. We use the terms connection-oriented, dependable delivery, and full duplex interchangeably, but what exactly do they mean?
Write and test a function to meet this specification. toNumbers (strList) strList is a list of strings, each of which represents a number. Modifies each entry in the list by converting it to a number.
Transcribed Image Text: What value would p take after the following statement:
p = 1;
X = 3;
if (x > 1)
p = p
x;
if (x > 2)
p =
x;
p 3D
Identify an acceptable usage guideline that is fair to both students and instructors. Internet usage during school hours and breaks should be governed by rules that also govern the use of cellphones and social media.
Transcribed Image Text: Processor must be able to perform the following…. (select as appropriate).
Select one or more:
a.
Fetch data.
b.
Write data.
?.
Interpret instruction.
d. Fetch Instruction.
e.
None of the above.
Software entity running on one or more machines and providing a particular type of function to a priori unknown clients is called________. (a) Client (b) Server (c) Service (d) Process (e) None of the above.
Investigate the importance that wireless networks play in the developing countries today. In certain locations, LANs and physical cables have been replaced with wireless systems. Is there a benefit or a drawback in doing this?
I need the answer as soon as possible Transcribed Image Text: Which of the followings are .21
advantages for prototypes? [Multiple
Answers]
Reducing the development effort
Improving usability O
Helping in requirements
elicitation
Improving maintainability
fill6-)Dynamics for s during deccelaration % s1=s, s2=sdot, x=[s1,s2]’; ODE: ds1/dt=s2, ds2/dt=sdotdot=? fill7-)%Dynamics for s during accelaration % s1=s, s2=sdot, x=[s1,s2]’; ODE: ds1/dt=s2, ds2/dt=sdotdot=? whats the answer of fill6-7 f_L=@(t,s)[s(2); %FILL6% ]; f_U=@(t,s)[s(2); %FILL7% ];
Which architectural pattern is best for applications in which one component generates data and another uses it? Explain the pattern with two real-life examples, or write a piece of code to demonstrate how it works.
66. If the current number of records are 92, blocking factor is 20 and the number of file buckets are 5 then the file load factor is a. 0.85 b. 0.92 c. 0.35 d. 0.46
Which configuration topology has a single master, a single proxy node, and then three worker nodes and is great for a non-production testing environment? Select one: gh Availability installation Standard installation Test installation Simple installation
Transcribed Image Text: QUESTION 1
HBRCOA19: Analytics competitors know how their operational costs relate to their financial performance by using
all of these
none of these
complex models
time and motion studies
credit card records
Compiler is a translator that translates a high level program into its equivalent machine language program. Does compiler affect CPU performance. If yes? Then how does it possible? Justify your answer with some valid reasons?
Assuming 8-bit memory addresses, show the active-high chip enable (CE) logic for a 32 x 8 memory module if its placement occupied the range of locations … (a) 32 to 63 (b) 96 to 127
1. Explain 2 suitable MIS application software in CRM.
2. Compare both software in term of business functions supported, technology platforms, cost and ease of use.
3. Choose 1 software of that and give reason.
Don’t copy Transcribed Image Text: Suppose an integer a has order, r =
5, under mod M, where M = 100. If
we take quantum sampling, what will happen to the order under mod M?
arrayA = ([[1, 2], [3, 4]]) arrayB = ([[5, 6, 7], [8, 9, 10]]) python numpy code to multiply array a and b to get result below arrayB = ([[5, 12, 7], [24, 36, 10]])
Cloud computing is a kind of abstraction which is based on the notion of combining physical resources and represents them as _______resources to users. a. Real b. Cloud c. Virtual d. none of the mentioned
Transcribed Image Text: Q7/ Suppose you have the following figure, find out the following constrains:
For the map coloring problem on the left:
(CLO 4Y
Variables:
Domains:
•Constraints: –
Solution:
WA
NT
SA
NSW
V.
Transcribed Image Text: QWrite a Fortran 90 program to read all positive five digits
integer numbers which have the suum of the three interior
digits are equal to the sum of the two external digits.
I need solution in bash code with algorithm Transcribed Image Text: pm
main.bash
1
Task 2 (c)
Check whether the given input is palindrome or
not
input
Command
Standard Input: O Interactive Console
O Text
What is the difference between screened host architectures for firewalls and screened subnet architectures for firewalls? As a result, which of these provides more protection for information assets that stay on the trusted network? Why?
Predict the output of following program int f(int n){ if(n <= 1) return 1; if(n%2 == 0) return f(n/2); return f(n/2) + f(n/2+1); } void main(){ cout<< f(11); } nOTE: SOLVE AS SOON AS POSSIBLE Transcribed Image Text: Consider the Markov chain with three states, S={1,2,3}, that has the following transition matrix YA P= Draw the state transition diagram for this chain. If we know P(X1=1) =P(Xi=2)=1/4, find P(X1=3, X2=2,X3=1) A security breach of personal information has resulted in some identity theft over the past three years. What can you do to protect yourself against identity fraud? Give a specific example of what you mean. A user opens multiple internet applications on his PC. The user’s PC will differentiate the applications currently running on it based on _____. a.source port number b.destination IP address c.source IP address d.destination port number Please write the code in the nodejs and use the localhost server to show the current date and time by creating a function. Please write the code only in Node js the address: – http://localhost:8080/ What would happen – over time – to packets arriving at Router M in the following scenario? Explain Transcribed Image Text: A R= 10 Mb/s R= 12 Mb/s Queue of packets buffered at M link How may auditing and accountability improve an IT infrastructure’s overall architectural design, according to NIST SP 800-53 Rev 4 Appendix F: Security Control Catalog – AU: Audit and Accountability? Give concrete instances if you can. computer science dont post copied answer posting mutliple times Transcribed Image Text: Provide the type (I, R, or J) I and hexadecimal representation (begin with Ox, e.g., OXAA230103) of the following instruction: sw $s1, 4($t2) 51. The command used in high level programs to transfer the record block in to the main memory buffer is classified as a. modify command b. insert command c. read command d. find next command Which of the timer is responsible for keeping the window size information flowing even if the other end closes its receiver window? A. Retransmission timer B. Persistent timer C. Keep alive timer D. Time-wait timer What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? What is the triple constraint? What other factors affect a project? computer science dont post copied answer posting mutliple times Transcribed Image Text: Provide the type (I, R, or J) I and hexadecimal representation (begin with Ox, e.g., OXAA230103) of the following instruction: sw $s1, 4($t2) Design an algorithm to align two sequences A and B so that the beginning part of at least one of the sequences and the ending part of at least one of the sequences are included. Transcribed Image Text: 10 The concept is primarily applied to random-access memory and consists of the access time plus any additional time required before second access can commence. Controller Transfer rate latency Memory cycle time Transcribed Image Text: What rules of inference are used in this argument? “It is either colder than malaya today or the pollution is harmful. It is hotter than malaya today. Therefore, the pollution is harmful.” When it comes to creating software, what four qualities are most important? Please give your views on the additional four characteristics that should be included into the software development process in order to improve efficiency. Identify the attack that exploits the TCP three-way handshake to deplete the resources of the targeted server and prevent it from responding to legitimate connection requests? SYN Spoofing UPD Flood Ping to death ICMP Flood How many times will the following code will print “Final Test”? three times none one time four times Transcribed Image Text: int i 3; do { i–: System.out.println (“Final Test”); } while (i > 0);
In Python language- Write a program to read a string input from user and print the first 3 characters of that string. You can assume that string length is always greater or equal to 3.
Language:java Transcribed Image Text: Assume that int a 5 and double d= 5.0, what is the result of a in the following expression?
= 16 + 34 % 4 (60 6% 2)
Enter your anawer
solve (Web development) Transcribed Image Text: In HTML