Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers like Wireshark and capturing packets c. using rootkits and privilege escalation to get to the kernel processes d. using a virus and destroying the computer that stores authentication information.

Answers

Answer 1

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.


Related Questions

You have observed that Alexander Rocco Corporation uses Alika’s Cleaning Company for its janitorial services. The company’s floors are vacuumed and mopped each night, and the trash is collected in large bins placed outside for pickup on Tuesdays and Fridays. You decide to visit the dumpster Thursday evening after the cleaning crew leaves. Wearing surgical gloves and carrying a large plastic sheet, you place as much of the trash on the sheet as possible. Sorting through the material, you find the following items: a company phone directory; a Windows NT training kit; 23 outdated Oracle magazines; notes that appear to be programs written in HTML, containing links to a SQL Server database; 15 company memos from key employees; food wrappers; an empty bottle of expensive vodka; torn copies of several resumes; an unopened box of new business cards; and an old pair of women’s running shoes. Based on this information, write a two-page report explaining the relevance these items have. What recommendations, if any, might you give to Alexander Rocco management?

Answers

Answer:

Explanation:

Relevance of Thrown Items:

   The thrown items mainly consist of the Windows NT training kit, outdated magazines and some written notes, etc. All these things can be used in the company for training the fresh talent.    These things must be used for the purpose of training fresh people and the things like programs written in HTML must not be dumped like this because they consists of the raw code which can be harmful if gotten into wrong hands.    Hence, the information like this must be taken care of seriously as these can be loopholes into companies down.    Rest of the things like food wrappers, empty bottles, resume copies are all worthless to the company and can be thrown into the dump as soon as possible.The business cards must also be thrown if not important.

Recommendation To Management:

   The management must take these things seriously and must double check the company properties before throwing them into dump. There must be a committe build to check the things that are been going directly to the dump.    They must have the responsibility for checking the things before going to the dump and must filter all the important things from the garbage back to the shelves of the office.Hence, these things must be taken care of so that no harm is to be done to the company.

cheers i hope this helped !!

The beginning of a free space bitmap looks like this after the disk partition is first formatted: 1000 0000 0000 0000 0000 0000 0000 0000 (the first block is used by the root directory). The system always searches for free blocks starting at the lowest numbered block, so after writing file A, which uses 8 blocks, the bitmap looks like this 1111 1111 1000 0000 0000 0000 0000 0000. Show the bitmap after each of the following actions: (a) File B is written, using 12 blocks (b) File C is written, using 7 blocks (c) File A is deleted (d) File B is deleted (e) File D is written, using 6 blocks (f) File E is written, using 9 blocks Show all steps.

Answers

Hgvccnnfdknvjdkvkdjdi

The bitmap is 1110 0000 0001 0000 after some use. The system always looks for free blocks beginning using a contiguous allocation technique.

What is a bitmap?

After some use, the new bitmap is 1110 0000 0001 0000. The system employs a contiguous allocation mechanism and starts searching for free blocks at the position.

(a) File B is made up of five blocks, 1111 1111 1111 0000.

b) The batch number 1000 0001 1111 0000 deletes File A.

c) Eight blocks are used for writing in file C.

1111 1111 1111 1100

File B is deleted (d). 1111 1110 0000 1100

Free-space bitmaps are one method used by some file systems to keep track of allocated sectors. Even though the most fundamental implementation of free-space bitmaps is incredibly wasteful, some modern file systems use complex or hybrid versions of them.

Therefore, after some use, the bitmap is 1110 0000 0001 0000. The contiguous allocation strategy is always used by the system to look for free blocks to start with.

To learn more about bitmap, refer to the link:

https://brainly.com/question/26230407

#SPJ2

Which of the following is NOT a type of software?
O a database system
O Skype
O Microsoft PowerPoint
O an output device
Previous
Noyt

Answers

Answer:

Output device

Explanation:

Im pretty sure that correct

Which of the following is an example of joint problem solving?

Answers

Explanation:

There is a high degree of informality to these relationships, which are focused on information sharing, joint-problem solving and joint operations.

A hallmark of most of these processes is their informality, whether through information sharing, joint problem solving or joint operations.

Global joint problem-solving team. In addition to requesting a division of labour, the Global Task Team recommendations called upon the World Health Organization (WHO), UNICEF, the United Nations Population Fund (UNFPA), the United Nations Development Programme (UNDP), the World Bank, the UNAIDS Secretariat and the Global Fund to take the lead in and establish the joint United Nations system-Global Fund problem-solving team by July # in order to support efforts that address implementation bottlenecks at the country level

The degree of a point in a triangulation is the number of edges incident to it. Give an example of a set of n points in the plane such that, no matter how the set is triangulated, there is always a point whose degree is n−1.

Answers

Answer:

squarepentagon

Explanation:

The vertices of a square is one such set of points. Either diagonal will bring the degree of the points involved to 3 = 4-1.

The vertices of a regular pentagon is another such set of points. After joining the points in a convex hull, any interior connection will create a triangle and a quadrilateral. The diagonal of the quadrilateral will bring the degree of at least one of the points to 4 = 5-1.

The following are reasons why many organizations are trying to reduce and right-size their information foot-print by using data governance techniques like data cleansing and de-duplication:
A. None of the above
B. reduce risk of systems failures due to overloading
C. improve data quality and reduce redundancies, reduce increased and staggering storage management costs,
D. Both A and B

Answers

Answer:

C. improve data quality and reduce redundancies, reduce increased and staggering storage management costs

Explanation:

Excess data retention can lead to retention of redundant and irrelevant data, which can reduce data handling and processing efficiency, while at the same time increasing the cost of data storage and management. This can be curbed be reducing data to the right size by using data governance techniques like data cleansing and de-duplication

Given: The following if statement uses an overloaded > operator to determine whether the price of a Car object is more than $5000. Car is a struct and myCar is an object of Car. Each Car object has two variables: id (int) and price (float). As you can see in the following code, the ID of myCar is 12345 and the price is $6,000.
Car myCar = {12345, 6000.};
float price = 5000;
if (myCar > price)
cout << "My car price is more than $5,000.\n";
Which one of the following function prototypes is correct syntax to overload the > operator based on the if statement above.
a. void operator>(float price);
b. bool operator>(Car& car, float price);
c. bool operator >(float amt);
d. bool operator>(Car& yourCar);
e. none of the above

Answers

Answer:

Option(c) is the correct answer to the given question.

Explanation:

In the given question car is the structure and mycar is the instance or the object of the class also the object mycar holds two variables of type integer and the one float variable .

Following are the syntax of operator overload in C++ programming language

return -type operator operator-symbol(datatype variable name )

Now according to the question the option(c) follows the correct syntax of operator overload

All the other option do not follow the correct prototype that's why these are incorrect option .

Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeople receive $200 per week plus 9% of their gross sales for that week. For example, a salesperson who grosses $5,000 in sales in a week receives $200 plus 9% of $5,000, or a total of $650. Write an app (using an array of counters) that determines how many of the salespeople earned salaries in each of the following ranges (assume that each salesperson's salary is an integer). a) $200–299
b) $300–399
c) $400–499
d) $500–599
e) $600–699
f) $700–799
g) $800–899
h) $900–999
i) $1000 and over
Summarize the results in tabular format.

Answers

Answer: Provided in the explanation section

Explanation:

import java.util.Scanner;

public class commission

{

   public static void main(String[] args) {

      Scanner input = new Scanner(System.in);

        int totals[]={0,0,0,0,0,0,0,0,0};          

      int n,sales,i,index;

       double salary;

        System.out.print("how many salesmen do you have? ");                          

      n=input.nextInt();

        for(i=1;i<=n;i++)

           {System.out.print("Salesman "+i+" enter sales: ");

            sales=input.nextInt();

            salary=200+(int)(.09*sales);

               System.out.printf("Salary=$%.2f\n",salary);

            index=(int)salary/100-2;

            if(index>8)

                index=8;

            totals[index]++;

            }

        System.out.println("SUMMARY\nSALES\t\tCOUNT");

        for(i=0;i<8;i++)

           System.out.println("$"+(i*100+200)+"-"+(i*100+299)+"\t"+totals[i]);

        System.out.println("$1000 and over\t"+totals[i]);

       }                                

   }

 

cheers i  hope this helped !!      

Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
< html>

Answers

Answer:

In HTML file

<body style="background-color:orange;">

Or

In CSS file

body {

background-color: orange;

}

Convert 2910 to binary, hexadecimal and octal. Convert 5810 to binary, hexadecimal and octal. Convert E316 to binary, decimal and octal. Convert 5916 to binary, decimal and octal. Convert 010010102 to decimal, octal and hexadecimal. Convert 001010102 to decimal, octal and hexadecimal. Convert 438 to binary, decimal and hexadecimal. Convert 618 to binary, decimal and hexadecimal.

Answers

Answer:

2910 to binary = 101101011110

2910 to hexadecimal = B5E

2910 to octal = 5536

E316 to binary = 1110001100010110

E316 to octal = 161426

E316 to decimal = 58134

5916 to binary = 101100100010110

5916 to decimal = 22806

5916 to octal = 54426

010010102 to decimal = 149

010010102 to octal = 225

010010102 to hexadecimal = 95

FOR 438 and 618, 8 is not a valid digit for octal..

web pages with personal or biograpic information are called ​

Answers

Answer:

Web pages with personal or biographic information are called. a. Social Networking sites. c.

Explanation:

import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in); final int NUM_ELEMENTS = 8; // Number of elements int[] userVals = new int[NUM_ELEMENTS]; // User numbers int i = 0; // Loop index int sumVal = 0; // For computing sum // Prompt user to populate array System.out.println("Enter " + NUM_ELEMENTS + " integer values..."); for (i = 0; i < NUM_ELEMENTS; ++i) { System.out.print("Value: "); userVals[i] = scnr.nextInt(); } // Determine sum sumVal = 0; for (i = 0; i < NUM_ELEMENTS; ++i) { sumVal = sumVal + userVals[i]; } System.out.println("Sum: " + sumVal); return; } }

Answers

Answer:

There's nothing wrong with the question you posted except that it's not well presented or arranged.

When properly formatted, the program will be error free and it'll run properly.

The programming language used in the question is Java programming lamguage.

in java, the sign ";" signifies the end of each line and lines that begins with // represent comments. Using this understanding of end of lines and comments, the formatted code goes thus

import java.util.Scanner;  

public class Arraysum {  

public static void main(String[] args) {  

Scanner scnr = new Scanner(System.in);  

final int NUM_ELEMENTS = 8;

// Number of elements  

int[] userVals = new int[NUM_ELEMENTS];  

// User numbers  

int i = 0;  

// Loop index  

int sumVal = 0;  

// For computing sum  

// Prompt user to populate array  

System.out.println("Enter " + NUM_ELEMENTS + " integer values...");  

for (i = 0; i < NUM_ELEMENTS; ++i) {  

System.out.print("Value: ");  

userVals[i] = scnr.nextInt();  

}  

// Determine sum  

sumVal = 0;

for (i = 0; i < NUM_ELEMENTS; ++i)

{

sumVal = sumVal + userVals[i];

}

System.out.println("Sum: " + sumVal); return;

}

}

Also, see attachment for source file

Advanced Sounds is engaging in a full upgrade of its Windows Server 2003 network to Windows Server 2008. The upgrade includes using Windows Server 2008 Active Directory. Advanced Sounds has pioneered many technological innovations and is very concerned about keeping its network and computer systems secure. Advanced Sounds Information Technology (IT) Department hires you to help them implement Windows Server 2008 Active Directory. Assume the following:
All email servers have been consolidated back in the New York City Complex.
Most all the other applications running on Windows Servers are distributed at all sixteen locations.
Each location at minimum has a file server, a print server and a local application server.
All locations have adequate Wide Area network connections with available capacity; 10 Mbps links
The New York location has enough network capacity to serve all 16 locations.
There are 500 people at the New Your City complex.
There are 200 people at the Quebec City location and 200 at the Montreal location.
There are 40-50 people at each outlet store.
Advanced Sounds IT Department has formed a small installation planning committee consisting of the IT server operations manager, two system programmers, the current Active Directory administrator, and you. After the first meeting they have asked you to prepare a small report to address the following questions:
A. What information is required as input to the initial installation involving Active Directory? a=
B. How many Active directory servers do you propose?
C. Where will the Active directory server(s) be located?

Answers

Answer:

cs

Explanation:

8) Which of the following statements is FALSE?
1) You will likely need to use a combination of both popular and scholarly resources in your research
2) The CRAAP test can be used to help evaluate all of your sources
3) Academic journal articles are always unbiased in their analysis
4) Popular resources tend to be easier to read than scholarly articles

Answers

Answer:

3) Academic journal articles are always unbiased in their analysis.

Explanation:

The Academic journals are not always unbiased. There can be some authors which may write in some situation and bias the articles. It is important to analyse source and reliability of the article before relying on it. An unbiased author will try to capture picture fairly. The unbiased author presents the facts as it is and does not manipulates the truth.

Write a calling statement for the following code segment in Java: public static int sum(int num1, int num2, String name) { int result = num1 + num2; System.out.println("Hi " + name + ", the two numbers you gave me are: " + num1 + " " + num2); return result; } Function Integer sum(Integer num1, Integer num2, String name) Integer result = num1 + num2 Display "Hi " + name + ", the two numbers you gave me are: ", num1, " ", num2 Return result End Function Write a calling statement to the function in Java or Pseudocode. You may use any value of appropriate data samples to demonstrate your understanding.

Answers

Answer:

Following are the calling of the given question

public static void main(String[] args) // main function

{

int store; // variable declaration

store = sum(32,15,"san"); // Calling of sum()

System.out.println(" TheValue returned by sum() : "+store); // display

}

Explanation:

Following are the description of the above statement

Here is the name of function is sum() In the sum() function definition there are 3 parameter in there signature i.e  two "int" type and 1 is "string" type .In the main function we declared the variable store i,e is used for storing the result of sum() it means it storing the result of value that is returning from the definition of sum() function .After that calling the function by there name and passing three parameter under it  sum(32,15,"san"); and store in the "store" variable.Finally print the value by using system.out.println ().

Write the class "Tests". Ensure that it stores a student’s first name, last name, all five test scores, the average of those 5 tests’ scores and their final letter grade. (Use an array to store all test scores.)

Answers

Answer:

The following assumption will be made for this assignment;

If average score is greater than 75, the letter grade is AIf average score is between 66 and 75, the letter grade is BIf average score is between 56 and 65, the letter grade is CIf average score is between 46 and 55, the letter grade is DIf average score is between 40 and 45, the letter grade is EIf average score is lesser than 40, the letter grade is F

The program is written in Java and it uses comments to explain difficult lines. The program is as follows

import java.util.*;

public class Tests

{

public static void main(String [] args)

{

 //Declare variables

 Scanner input = new Scanner(System.in);

 String firstname, lastname;

 //Prompt user for name

 System.out.print("Enter Lastname: ");

 lastname = input.next();

 System.out.print("Enter Firstname: ");

 firstname = input.next();

 char grade;

 //Declare Array

 int[] Scores = new int[5];

 //Initialize total scores to 0

 int total = 0;  

  //Decalare Average

  double   average;

 //Prompt user for scores

 for(int i =0;i<5;i++)

 {

  System.out.print("Enter Score "+(i+1)+": ");

  Scores[i] = input.nextInt();

  //Calculate Total Scores

  total+=Scores[i];

 }

 //Calculate Average

 average = total/5.0;

 //Get Letter Grade

 if(average>75)

 {

 grade = 'A';

 }

 else if(average>65)

 {

 grade = 'B';

 }

 else if(average>55)

 {

 grade = 'C';

 }

 else if(average>45)

 {

 grade = 'D';

 }

 else if(average>40)

 {

 grade = 'E';

 }

 else

 {

 grade = 'F';

 }

 //Print Student Results

 System.out.print("Fullname: "+lastname+", "+firstname);

 System.out.print('\n');

 System.out.print("Total Scores: "+total);

 System.out.print('\n');

 System.out.print("Average Scores: "+average);

 System.out.print('\n');

 System.out.print("Grade: "+grade);

}

}

See Attachment for .java file

Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to print two random integers between (and including) 0 and 9. End with a newline. Ex: 5 7 Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, after calling srand() once, do not call srand() again. (Notes)
GIVEN:
#include
#include // Enables use of rand()
#include // Enables use of time()
int main(void) {
int seedVal = 0;
/* Your solution goes here */
return 0;
}
2). Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex:
101
133
Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, srand() has already been called; do not call srand() again.
GIVEN:
#include
#include // Enables use of rand()
#include // Enables use of time()
int main(void) {
int seedVal = 0;
seedVal = 4;
srand(seedVal);
/* Your solution goes here */
return 0;
}

Answers

Answer:

1. The solution to question 1 is as follows;

srand(seedVal);

cout<<rand()%10<<endl;

cout<<rand()%10<<endl;

2. The solution to question 2 is as follows

cout<<100+rand()%50 <<endl;

cout<<100+rand()%50 <<endl;

Explanation:

The general syntax to generate random number between interval is

Random Number = Lower Limit + rand() % (Upper Limit - Lower Limit + 1)

In 1;

The solution starts by calling srand(seedVal);

The next two statements is explained as follows

To print two random integers between intervals of 0 and 9 using rand()"

Here, the lower limit = 0

the upper limit =  9

By substituting these values in the formula above; the random number will be generated as thus;

Random Number = 0 + rand() % (9 - 0 + 1)

Random Number = 0 + rand() % (10)

Random Number = rand() % (10)

So, the instruction to generate the two random variables is rand() % (10)

2.

Similar to 1 above

To print two random integers between intervals of 100 and 149 using rand()"

Here, the lower limit = 100

upper limit = 149

By substituting these values in the formula above; the random number will be generated as thus;

Random Number = 100 + rand() % (149 - 100 + 1)

Random Number = 100 + rand() % (50)

So, the instruction to generate the two random variables is 100 + rand() % (50)

Universal Containers (UC) is currently live with Sales Cloud and in the process of implementing Service Cloud. UC wants to create a sandbox to test its Service Cloud implementation with real Sales Cloud data. Which three Sandbox types can be used to accomplish this? Choose 3 answersA. Administrator SandboxB. Partial Copy SandboxC. Full SandboxD. Developer k Pro SandboxE. Test Sandbox

Answers

Answer:

B. Partial Copy Sandbox

C. Full Sandbox

D. Developer k Pro Sandbox

Explanation:

In this scenario Universal containers wants to implement a service cloud and test with real Sales Cloud data.

Service cloud is defined a system that allows automation of various customer service functions. It can listen to customers via different social media platforms and direct customers to agents that can solve their problems.

Sandbox is a testing environment that is isolated and allows for running of programs without affecting the application.

To test service cloud implementation with real data we use the following 3 sandboxes:

- Partial copy sandbox: copies only relevant data to test configurations with real data.

- Full Sandbox: makes a replica of data by copying all data such as attachments, metadata, and object records.

- Developer K pro sandbox: is used by developers to test software in an isolated environment and can use large data sets. It includes configuration data (metadata)

Mikayla wants to create a slide with a photograph of a car and the car horn sounding when a user clicks on the car. Which
feature should she use, and why?
a. She should use the Action feature because it allows a user to embed a hyperlink for an Internet video on the car.
b. She should use the Video from Website feature because it allows a user to embed a hyperlink for an Internet video on the car.
c. She should use the Action feature because it allows a user to place an image map with a hotspot on the car.
d. She should use the Video from Website feature because it allows a user to place an image map with a hotspot on the car.

Answers

Answer: A

Explanation: edge :)

Answer:

C

Explanation:

The common field cricket chirps in direct proportion to the current tem­perature. Adding 40 to the number of times a cricket chirps in a minute, then dividing by 4, gives us the temperature (in Fahrenheit degrees). Write a program that accepts as input the number of cricket chirps in fifteen seconds, then outputs the current temperature

Answers

Answer:

This program is written in Java programming language;

First, you should understand that:

The formula given in the question implies that the current temperature can only be calculated using measurement of time in minutes;

Given that the number of chirps is directly proportional to the temperature.

If the cricket made n chirps in 15 seconds, it will make n * (60/15) chirps in 1 minutes;

n * (60/15) = n * 4

Base on this analysis, the program is as follows

import java.util.*;

public class cricket

{

public static void main(String []args)

{

 //Declare number of chips in 1 minutes

 int num;

 Scanner input = new Scanner(System.in);

 //Prompt user for input

 System.out.print("Number of chirps (in 15 seconds): ");

 num = input.nextInt();

 //Calculate temperature  (multiply temperature by 4 to get number of chirps in minutes

 double temp = (num * 4+ 40)/4;

 //Print temperature

 System.out.print("Current Temperature = "+temp+" F");

}

}

Write a class called Triangle that can be used to represent a triangle. It should include the following methods that return boolean values indicating if the particular property holds: a. isRight (a right triangle) b. isScalene (no two sides are the same length) c. isIsosceles (exactly two sides are the same length) d. isEquilateral (all three sides are the same length).

Answers

Answer:

Explanation:

import java.io.*;

class Triangle

{

  private double side1, side2, side3; // the length of the sides of

                                       // the triangle.

  //---------------------------------------------------------------

  // constructor

  //

  // input : the length of the three sides of the triangle.

  //---------------------------------------------------------------

  public Triangle(double side1, double side2, double side3)

  {

      this.side1 = side1;

      this.side2 = side2;

      this.side3 = side3;

  }

  //---------------------------------------------------------------

  // isRight

  //

  // returns : true if and only if this triangle is a right triangle.

  //---------------------------------------------------------------

  boolean isRight()

  {

      double square1 = side1*side1;

      double square2 = side2*side2;

      double square3 = side3*side3;

      if ((square1 == square2 + square3) ||

          (square2 == square1 + square3) ||

          (square3 == square1 + square2))

          return true;

      else

          return false;

  }

  // isValid

  // returns : true if and only if this triangle is a valid triangle.

  boolean isValid()

  {

      if ((side1 + side2 < side3) ||

          (side1 + side3 < side2) ||

          (side2 + side3 < side1))

          return false;

      else

          return true;

  }

  // isEquilateral

  //

  // returns : true if and only if all three sides of this triangle

  // are of the same length.

  boolean isEquilateral()

  {

      if (side1 == side2 && side2 == side3)

          return true;

      else

          return false;

  }

  // isIsosceles

  //

  // returns : true if and only if exactly two sides of this triangle

  // has the same length.

  boolean isIsosceles()

  {

      if ((side1 == side2 && side2 != side3) ||

          (side1 == side3 && side2 != side3) ||

          (side2 == side3 && side1 != side3))

          return true;

      else

          return false;

  }

  // isIsosceles

  // returns : true if and only if exactly no two sides of this

  // triangle has the same length.

  boolean isScalene()

  {

      if (side1 == side2 || side2 == side3 || side1 == side3)

          return false;

      else

          return true;

  }

}

//-------------------------------------------------------------------

// class Application

//

// This class is the main class of this application. It prompts

// the user for input to construct a triangle, then prints out

// the special properties of the triangle.

//-------------------------------------------------------------------

public class Application

{

  //---------------------------------------------------------------

  // getInput

  //

  // input : stdin - BufferedReader to read input from

  //         msg - message to prompt the user with

  // returns : a double value input by user, guranteed to be

  //           greater than zero.

  //---------------------------------------------------------------

  private static double getInput(BufferedReader stdin, String msg)

      throws IOException

  {

      System.out.print(msg);

      double input = Double.valueOf(stdin.readLine()).doubleValue();

      while (input <= 0) {

          System.out.println("ERROR : length of the side of triangle must " +

              "be a positive number.");

          System.out.print(msg);

          input = Double.valueOf(stdin.readLine()).doubleValue();

      }

      return input;

  }

  //---------------------------------------------------------------

  // printProperties

  //

  // input : triangle - a Triangle object

  // print out the properties of this triangle.

  //---------------------------------------------------------------

  private static void printProperties(Triangle triangle)

  {

      // We first check if this is a valid triangle. If not

      // we simply returns.

      if (!triangle.isValid()) {

          System.out.println("This is not a valid triangle.");

          return;

      }

      // Check for right/equilateral/isosceles/scalene triangles

      // Note that a triangle can be both right triangle and isosceles

      // or both right triangle and scalene.

     

      if (triangle.isRight())

          System.out.println("This is a right triangle.");

      if (triangle.isEquilateral())

          System.out.println("This is an equilateral triangle.");

      else if (triangle.isIsosceles())

          System.out.println("This is an isosceles triangle.");

      else

          // we do not need to call isScalene here because a triangle

          // is either equilateral/isosceles or scalene.

          System.out.println("This is an scalene triangle.");

  }

  // main

  // Get the length of the sides of a triangle from user, then

  // print out the properties of the triangle.

  public static void main(String args[]) throws IOException

  {

      BufferedReader stdin = new BufferedReader

          (new InputStreamReader(System.in));

      double side1 = getInput(stdin,

          "What is the length of the first side of your triangle? ");

      double side2 = getInput(stdin,

          "What is the length of the second side of your triangle? ");

      double side3 = getInput(stdin,

          "What is the length of the third side of your triangle? ");

      System.out.print("Pondering...\n");

      printProperties(new Triangle(side1, side2, side3));

  }

}

For the PSoC chip what is the minimum voltage level in volts that can be considered to logic one?​

Answers

Answer:

Asian man the man is one 1⃣ in a and the perimeters are not only

Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, and distribute his work, but he would still like to retain his copyright on the content. What type of license should he u for his book?

Answers

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

Answers

Answer: provided in the explanation section

Explanation:

The question says:

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

The Answer:

multi-segment executable file template. data segment ; add your data here! pkey db "press any key...$" ends stack segment dw 128 dup(0) ends code segment start: ; set segment registers: mov ax, data mov ds, ax mov es, ax ; add your code here mov cx,4 input: mov ah,1 int 21h push ax loop input mov dx,13d mov ah,2 int 21h mov dx,10d mov ah,2 int 21h mov cx,4 output: pop bx mov dl,bl mov ah,2 int 21h loop output exit: lea dx, pkey mov ah, 9 int 21h ; output string at ds:dx ; wait for any key....

mov ah, 1 int 21h mov ax, 4c00h ; exit to operating system. int 21h ends end start ;

set entry point and stop the assembler.

Cheers I hope this helps!!!

Answers must be correct. Or else it will be flagged. All of these sub parts need to be answered with step by step process showing all work and reasoning.
DISCRETE STRUCTURES:
1.a. Truth value of a propositional statement For this exercise, it is easier not to use truth tables.
1. Suppose that A → ((BAC)-D) is false. What are the truth values of A, B, C, and D?
2. Suppose that (A-B) v (CA (DAE)) → F) is false.
What are the truth values of A, B, C, D, E, and F?
1.b. Logical equivalence Prove the equivalences below without using truth tables. Instead, use the rules of logical equivalence given in class. Justify your reasoning.
1.c. Inference Formalize the following argument and show that it is valid.
If Jose took the jewellery or Mrs. Krasov lied, then a crime was committed. Mr. Krasov was not in town. If a crime was committed, then Mr. Krasov was in town. Therefore Jose did not take the jewellery

Answers

Note: The complete part of question 1b is attached as a file

Answer:

1ai) A = true, B = true, C = true, D = false

Check the attached files for the answers of the remaining parts

Explanation:

The detailed solutions of all the sections of the question are contained in the attached files

A(n) _____ element, as described by the World Wide Web Consortium (W3C), is an element that "represents a section of a page that consists of content that is tangentially related to the content around that element, and which could be considered separate from that content."

Answers

Answer:

B. Aside element

Explanation:

The options for this question are missing, the options are:

A. ​article element

B. ​aside element

C. ​section element

D. ​content element

An aside element is defined as a section of a page that has content that is tangentially related to the content around the element. In other words, the aside element represents content that is indirectly related to the main content of the page. Therefore, we can say that the correct answer to this question is B. Aside element.

Computers in a LAN are configured to use a symmetric key cipher within the LAN to avoid hardware address spoofing. This means that each computer share a different key with every other computer in the LAN. If there are 100 computers in this LAN, each computer must have at least:

a. 100 cipher keys
b. 99 cipher keys
c. 4950 cipher keys
d. 100000 cipher keys

Answers

Answer:

The correct answer is option (c) 4950 cipher keys

Explanation:

Solution

Given that:

From the given question we have that if there are 100 computers in a LAN, then each computer should have how many keys.

Now,

The number of computers available = 100

The number of keys used in  symmetric key cipher for N parties is given as follows:

= N(N-1)/2

= 100 * (100 -1)/2

= 50 * 99

= 4950 cipher keys

Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is able to attempt passwords at a rate of 1 per second. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password

Answers

Answer:

Given:

Passwords are selected from 4 characters.

Character combinations are 26 lower case alphabetic characters.

Passwords attempts by adversary is at rate of 1 second.

To find:

Expected time to discover the correct password

Explanation:

Solution:

4 character combinations of 26 alphabetic characters at the rate of one attempt at every 1 second = 26 * 4 = 104

So 104 seconds is the time to discover the correct password. However this is the worst case scenario when adversary has to go through every possible combination. An average time or expected time to discover the correct password is:

13 * 4 = 52

You can also write it as 104 / 2 = 52 to discover the correct password. This is when at least half of the password attempts seem to be correct.

is brainly down? Cant search anything

Answers

You need to have WIFI

In this challenge you will use the file regex_replace_challenge_student.py to:
Write a regular expression that will replace all occurrences of:
regular-expression
regular:expression
regular&expression
In the string: This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression
Assign the regular expression to a variable named pattern
Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results
Regular Expression Replace Challenge
The Python statement containing the string to search for the regular expression occurrence is below. search_string=’’’This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression’’’
Write a regular expression that will find all occurrences of:
a. regular expression
b. regular-expression
c. regular:expression
d. regular&expression in search_string
Assign the regular expression to a variable named pattern
The Python string below is used for substitution substitution="regular expression"
Using the sub() method from the re package substitute all occurrences of the ‘pattern’ with ‘substitution’
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results
import re
#The string to search for the regular expression occurrence (This is provided to the student)
search_string='''This is a string to search for a regular expression like regular expression or
regular-expression or regular:expression or regular&expression'''
#1. Write a regular expression that will find all occurrances of:
# a. regular expression
# b. regular-expression
# c. regular:expression
# d. regular&expression
# in search_string
#2. Assign the regular expression to a variable named pattern
#The string to use for subsitution (This is provided to the student)
substitution="regular expression"
#3. Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
#4. Assign the outcome of the sub() method to a variable called replace_result
#5. Output to the console replace_results

Answers

Answer:

Please follow the code indentation for the python program.

Explanation:

Other Questions
which equation represents a line perpendicular to the line shown on the graph Which set of events is listed in chronological order?A.The Equal Opportunity Employment Commission rules that transgender people are a protected class.The Daughters of Bilitis forms to promote awareness of issues affecting gay people.California passes Proposition 8, which makes same-sex marriage illegal in the state.B.The Equal Opportunity Employment Commission rules that transgender people are a protected class.California passes Proposition 8, which makes same-sex marriage illegal in the state.The Daughters of Bilitis forms to promote awareness of issues affecting gay people.C.The Daughters of Bilitis forms to promote awareness of issues affecting gay people.California passes Proposition 8, which makes same-sex marriage illegal in the state.The Equal Opportunity Employment Commission rules that transgender people are a protected class.D.California passes Proposition 8, which makes same-sex marriage illegal in the state.The Daughters of Bilitis forms to promote awareness of issues affecting gay people.The Equal Opportunity Employment Commission rules that transgender people are a protected class. What did you include in your response? Medications can be tested on cell cultures instead of being injected into patients unnecessarily. Cancer cells continue to grow in the cultures uncontrollably allowing scientists to test multiple medications on the cancer cells. Specific treatments that are shown to fight the growth of cancer cells in the culture can be used on patients. Cultures are safer to use than injections of unneeded medications into patients. what that answer to 21-5 Rashida doesnt think that skepticism should play an important role in the scientific process. She says that skepticism interferes with scientific consensus. Which statement best describes Rashidas conclusion?It is incorrect because skepticism helps scientists recognize when ideas are not supported by evidence.It is correct because skepticism prevents the acceptance of creative ideas and new discoveries.It is correct because skepticism prevents scientists from testing new ideas and communicating with other scientists.It is incorrect because skepticism leads to the acceptance of new ideas, which can eventually gain scientific consensus. How do i sign in thisa is very important so can Carys calculates the total amount EEE, in dollars, that she earns for working hhh hours using the equation E=10hE=10hE, equals, 10, h. How many dollars does Carys earn per hour?Kjjkl jk Why do you invert your tubes after performing a venipuncture? find the second derivative of the function P(t) =(2t+4)/(t+1) The atomic number of a nucleus decreases during which nuclear reactions?A. Nuclear fission and alpha decayB. Nuclear fusion and beta decay (positron emission)C. Nuclear fission and beta decay (electron emission)D. Nuclear fusion and alpha decay In "How to Jump-Start a Car Battery," what is the first step?A. Making sure your car battery im deadB. Asking someone to jump-start your car batteryC. Carrying jumper cables with your car at all timesD. Locating the battery inside each of the cars Find an equation of the line containing the given pair of points.(4,1) and (12,7) Ramla has two full 1.5 litre bottles of water. She wants to fill as many glasses as possible with water from the bottles. Each glass can hold 180 millilitres of water.How many glasses can Ramla completely fill? Use the formation reactions below such that when added together, they match the balanced equation for the combustion of methane.Cgraphite(s)+ 2H2(g) CH4(g) H 1=74.80kJCgraphite(s)+ O2(g) CO2(g) H2=393.5kH2(g)+ 1/2O2(g) H2O(g) H3=241.80kJCalculate Hrxn for the combustion of methane, CH4(g).CH4(g)+ 2O2(g) CO2(g)+ 2H2O(g) Hrxn =--------------kJ 1.Berikut yang termasuk kutipan teks eksplanasi adalah ...A.Anjing merupakan sahabat terbaik manusia. Ia adalah seorang hewan peliharaan yang dinilai paling setia kepada tuannya. Namun tidak sedikit anjing yang diterlantarkan begitu saja oleh tuannya. Mengakibatkan banyaknya anjing yang terlantar di jalanan.B.Novel ini adalah seri ketiga dari novel Dilan, Dia Dilanku Tahun 1990 dan Dilan, Dia Dilanku Tahun 1991. Jika tidak mengikuti dua novel sebelumnya, pasti akan kebingungan untuk menyimak novel Milea ini. Novel ini seakan menjawab keresahan pembaca novel Dilan sebelumnya, karena di novel Milea ini seolah semua pertanyaan dan kebingungan pembaca akan terjawab.C.Banjir adalah suatu fenomena alam yang sangat merugikan sehingga disebut juga dengan bencana alam. Kata banjir berarti ketidak mampuan sungai, danau, drainase atau aliran air lainnya untuk menampung air yang jumlahnya sangat banyak, sehingga meluap dan memasuki daerah sekitarnya. Bencana banjir ini sering sekali muncul pada daerah-daerah pingggiran sungai (DAS) atau daerah yang dahulunya merupakan resapan sungai, dan juga daerah yang sistem drainasenya terganggu.D.Dahulu kala di suatu tempat di Jepang, hidup seorang pemuda bernama Yosaku. Kerjanya mengambil kayu bakar di gunung? dan? menjualnya? ke? kota.? Uang? hasil? penjualan dibelikannya makanan. Terus seperti itu setiap harinya.? Hingga? pada? suatu? hari ketika ia berjalan pulang dari kota ia melihat sesuatu yang menggelepar di atas salju. Setelah di? dekatinya? ternyata? seekor? burung? bangau? yang? terjerat diperangkap? sedang? meronta-ronta.? Yosaku? segera melepaskan perangkat itu. Do 4/ A,B for 11 points. Determine the approximate ordered pair for f(x) = g(x)(3, 12)(3,18)(12,3)(18, 3) Completed Per Day Flower Beds Weeded Bags of Leaves Raked Samantha 4 8 Adam 5 25 Samantha and Adam own a gardening business together. They each pull weeds from flower beds and rake up leaves for their neighbors. If each decides to specialize in what they are best at, Samantha will a.weed and Adam will rake because these are the goods each has a comparative advantage in. b.rake and Adam will weed because these are the goods each has a comparative advantage in. c.weed and Adam will rake because these are the goods each has an absolute advantage in. d.rake and Adam will weed because these are the goods each has an absolute advantage in. The company has just hired a new marketing manager who insists that unit sales can be dramatically increased by dropping the selling price from $8 to $7. The marketing manager would like to use the following projections in the budget:Data Year 2 Quarter Year 3 Quarter1 2 3 4 1 2Budgeted unit sales 45,000 70,000 105,000 70,000 90,000 100,000Selling price per unit $7 per unita. What are the total expected cash collections for the year under this revised budget?b. What is the total required the production for the year under this revised budget?c. What is the total cost of raw materials to be purchased for the year under this revised budget?d. What are the total expected cash disbursements for raw materials for the year under this revised budget?e. After seeing this revised budget, the production manager cautioned that due to the current production constraint, a complex milling machine, the plant can produce no more than 80,000 units in any one quarter. Is this a potential problem? What is the square root of m^6? M^2M^3M^4M^5 What is the y coordinate of the point that divides the directed line segment from j to k into a ratio of 2 to 3