Answer:
Answered below
Explanation:
//Programmed in Java
public double avgList(int [] nums){
int I;
double sumOfNumbers = 0;
double averageOfNumbers = 0;
//Loop over to sum all elements in the list.
for(I = 0; I < nums.length; I++){
sumOfNumbers += nums[I];
}
//Calculate the average
averageOfNumbers = sumOfNumbers/ nums.length;
return averageOfNumbers;
}
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link
Answer:
131 packets
Explanation:
Given
W (link ) =0.5 M bits, and Ping packets ( P ) = 500bytes
To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet
P ( required ) = 500 * 8 = 4000 bits
therefore the W /P packet is calculated as
= 0.5 M bits / 4000 bits
given that : 1 M bits = 1,048,576 bits
0.5 M bits / 4000 bits= 131.07
hence approximately 131 packets/ sec is required to flood the target organization
briefly explain 5 software which is either free or fee
Answer:
65
Explanation:
Answer:
65
Explanation:
You are helping a friend in college with his network connection. He would like a high speed connection between his computers so he can play Super Blast with others. In this lab, your task is to complete the following: Choose an appropriate router that will provide security and the fastest local connection. Connect the router to both computers and to the dorm internet connection. Request new TCP/IP information from the router on both computers. Configure Windows Firewall on both computers. Turn on Windows Firewall for both the Private and the Public network profiles. Add an exception for the SuperBlast program only for the Private network profile.
Solution :
Set up the router as follows:
On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet [tex]$100/1000TX$[/tex] router with the firewall to the Workspace.
Connection of the router as follows:
Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a [tex]$LAN$[/tex] port on the router. Above the Dorm-[tex]$PC2$[/tex] computer, select [tex]$\text{back}$[/tex] to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag the connector to the [tex]$LAN$[/tex] port on the computer. In the Selected Component window, drag the other connector to a [tex]$LAN$[/tex] port on the router. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag a connector to the [tex]$WAN$[/tex] port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.
Provide power to the router as follows:
On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.
Request new [tex]$TCP/IP$[/tex] information from the router for Dorm-PC as follows:
On the [tex]$\text{Dorm-PC}$[/tex] monitor, select Click to view [tex]$\text{Windows 10}$[/tex].In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter [tex]$\text{ipconfig}$[/tex] /renew and press [tex]$\text{Enter}$[/tex] to request new [tex]$TCP/IP$[/tex] information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.
Configure Windows Firewall on [tex]$\text{Dorm-PC}$[/tex] as follows:
In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.
This unit is used to print the picture on a paper
Answer:a printer
Explanation:
It prints things
A user has a computer with a single SSD, and the entire drive contains one partition. The user wants to install a second OS on the computer without having to reinstall the current OS. The user wants to be able to select which OS to use when booting the computer. Which Disk Management tools should the user utilize to accomplish this task?
Answer:
The correct approach is "Shrink partition". A further explanation is given below.
Explanation:
Shrinking partition shrinks or decreases this same disc size as well as unallotted disc space, unallotted space could be utilized to mount a secondary Operating system to operate as a double operating system.Whilst also diminishing everything into neighboring volatile memory on another disc, this same space required for area as well as drives could also be reduced.Thus the above is the correct answer.
What type of information is best suited for infographies?
Answer:
All varieties of information, from bullet pointed text to numerical tables
Explanation:
Answer:
All varieties of information, from bullet pointed text to numerical tables
Explanation:
Provide an example of formula (with proper syntax) that would check whether cell B5 has a negative number, and return a value of "negative" if it was and "not negative" the value was zero or higher.
Answer:
The formula is:
=IF(B3<0,"negative","not negative")
Explanation:
The formula can be split as follows:
= --> This begins all excel formulas
IF --> This means that we are writing an IF condition formula
B3<0, ---> This is the condition being tested
"negative", ---> This is the result is the condition is true
"not negative" ---> This is the result is the condition is false
Why is dark supereffective against ghost? (AGAIN)
I don't get it. I get why it is supereffective against psychic, because even the greatest minds are scared of criminal activities, but why would it be good against ghost?
AND GIVE ME AN ACTUAL ANSWER THIS TIME. DON"T ANSWER IF YOU DON"T KNOW OR IF YOUR ANSWER ISN'T IN ENGLISH.
Answer: Think of it in this way: People often warn others not to speak badly of the Dead. Why? This is because, it is believed that their souls get "restless", and this causes them to haunt others. Thus, Dark type moves, that symbolise the "evil" aspect of the Pokemon, are super-effective against Ghosts. Type chart, effectiveness and weakness explained in Pokémon Go
Type Strong Against Weak Against
Bug Grass, Psychic, Dark Fighting, Flying, Poison, Ghost, Steel, Fire, Fairy
Ghost Ghost, Psychic Normal, Dark
Steel Rock, Ice, Fairy Steel, Fire, Water, Electric
Fire Bug, Steel, Grass, Ice Rock, Fire, Water, Dragon
Explanation: hopes this helps
If you are insured with third party insurance, it will cover which costs?
A. business losses due to a denial-of-service attack
B. loss of data in your laptop because of a coffee spillover
C. ransomware attack on your laptop
D. costs related to lawsuits, and penalties due to a cyberattack
Answer:
c.
Explanation:
Answer: D (costs related to lawsuits, and penalties due to a cyberattack)
Explanation: Third Party insurance covers the liabilities of policyholders to their clients or customers. Regulatory: It covers the cost related to legal affairs, lawsuits and penalties due to a cyberattack.
how do i remove my search history?
Step 1: Go to PC settings from the Start Menu or Desktop. Step 2: In PC settings, choose Search in the menu, and click Delete history.
If D3=30 and D4=20, what is the result of the function
=IF(D4 D3, D3-D4, "FULL")?
0-10
O Unknown
O 10
O Full
Answer:
c. 10
Explanation:
Given
[tex]D3 = 30[/tex]
[tex]D4 = 20[/tex]
Required
The result of: [tex]=IF(D4 < D3,D3-D4,"FULL")[/tex]
First, the condition D4 < D3 is tested.
[tex]D4 < D3 = 20 < 30[/tex]
Since 20 < 30, then:
[tex]D4 < D3 = True[/tex]
The condition is true, so:
D3 - D4 will be executed.
[tex]D3 - D4 = 30 - 20[/tex]
[tex]D3 - D4 = 10[/tex]
Hence, the result of the function is 10
Explain what an IM is,
Answer: Stands for "Instant Message." Instant messaging, or "IMing," as frequent users call it, has become a popular way to communicate over the Internet
Explanation:
what is a software house
Answer: a company whose primary products are various forms of software, software technology, distribution, and software product development. They make up the software industry.
this should be the answer
hoped this helped
Write a program that asks for the user's name, phone number, and address. The program then saves/write all information in a data file (each information in one line) named list.txt. Finally, the program reads the information from the file and displays it on the screen in the following format: Name: User's Name Phone Number: User's Phone Number Address: User's Street Address User's City, State, and Zip Code g
Answer:
Amazon prime
Explanation:
What yields 2.5? Type casting
Answer:
5.0/2
Explanation:
I don't do Java, but I do Python. I'm pretty sure the answer to this question is 5.0/2. I'm sorry if I'm wrong.
Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a pair containing the minimum and maximum value. Require that the array elements implement the Measurable interface of Section 10.1.2.
Answer:
Explanation:
The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.
public static T minmax(ArrayList<T> mylist) {
T min = new T();
T max = new T();
for (int x = 0; x < mylist.size(); x++) {
if (mylist.get(x) > max) {
max = mylist.get(x);
} else if (mylist.get(x) < min) {
min = mylist.get(x);
}
}
return (min, max);
}
Three reasons Why we connect speakers to computers
Answer:
we connected speakers with computers for listening voices or sound .. because the computer has not their own speaker..
Explanation:
Me Completan Pliiiis
Answer:
its in Spanish most people cant read Spanish
Explanation:
Take a number N as input and output the sum of all numbers from 1 to N (including N).
Answer:
Incluint respuet
Explanation:
espero que te sirva
what is a computer and what is the work of it
Answer:
A computer is an electronic machine that processes information. It is an information processor. It takes data, stores it, and then gives the result or answer.
It is a machine composed of hardare and software componests to be manually ised or atonomosly used.
Hope this helps!
Answer:
A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.
c program that calculates the summation of integers from one to N. Allow the user to input an integer, then pass that number to a function that will calculate the sum of all integers up to N. For example, if the user inputs the number 5, then the function will return the sum 1 2 3 4 5. Allow the user to enter multiple integers, calling the function for each number. Use a sentinel value or similar method to terminate user input.
Answer:
Answered below.
Explanation:
#include <studio.h>
#include<conio.h>
void main(){
int I = 0;
int sumOfNumbers = 0;
int number;
printf("Input an integer: ");
("%d", &sumOfNumbers);
//Loop over while adding numbers
while(I <= number){
sumOfNumbers = sumOfNumbers + I;
I++;
}
printf("\n Sum of N numbers is: %d", sumOfNumbers);
getch();
}
At the beginning of the semester, we studied partially filled arrays. This is when the number of elements stored may be less than the maximum number of elements allowed. There are two different ways to keep track of partially filled arrays: 1) use a variable for the numberElements or 2) use a sentinel (terminating} value at the end of elements (remember c-strings?). In the code below, please fill in the details for reading the values into the an array that uses a sentinel value of -1. Complete the showArray function as well.
#include
using namespace std;
void showArray(int array[]);
// ToDo: Code showArray function with one array parameter
int main()
{
const int MAX_SIZE=16;
int array[MAX_SIZE]; // store positive values, using -1 to end the values.
cout <<"Enter up to " << MAX_SIZE-1 << " positive whole numbers, use -1 to stop\n";
//To do: Read the int values and save them in the static array variable.
// When the user enters -1 or the array has no more room, leave the loop..
//To do: store -1 at the end of elements in the array
// Show array function
showArray(array);
return 0;
}
// To do: print out for the array
void showArray(int array[])
{
}
Answer:
Complete the main as follows:
int num;
cin>>num;
int i = 0;
while(num!=-1 && i <16){
array[i] = num;
cin>>num;
i++; }
array[i+1] = -1;
The showArray() as follows:
int i =0;
while(array[i]!=0){
cout<<array[i]<<" ";
i++;
}
Explanation:
See attachment for complete program where comments are used to explain difficult lines
how to be safe through internet? and what is e safety definition and what are the the rules of e safety pls pls I will give u 74 points lessgooo
Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble online (and offline).
1. Keep Personal Information Professional and Limited
Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.
2. Keep Your Privacy Settings On
Marketers love to know all about you, and so do hackers. Both catsometimes(detsometimes hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.
3. Practice Safe Browsing
You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don't even give the hackers a chance.
4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection
When you go online in a public place, .Careful What You Download
A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust
6. Choose Strong Passwords
Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don't forget etc... .....
follow me entrust
Answer:
안녕
from my opinion don't tell anyone anything about you like be anonymous
and if anyone ask you where u live say earth he /she will think u became angry or for example you said to person 1 ( you stay in England )
but to person 2 ( say to stay in Japan )
but it's good to say nothing about you not even your name or age
I HOPE YOU UNDERSTAND ENGLISH IF NOT I CAN REWRITE IT IN KOREAN
Scrabble is a word game in which words are constructed from letter tiles, each letter tile containing a point value. The value of a word is the sum of each tile's points added to any points provided by the word's placement on the game board. Write a program using the given dictionary of letters and point values that takes a word as input and outputs the base total value of the word (before being put onto a board). Ex: If the input is: PYTHON the output is: 14
Complete question:
Scrabble is a word game in which words are constructed from letter tiles, each letter tile containing a point value. The value of a word is the sum of each tile's points added to any points provided by the word's placement on the game board. Write a program using the given dictionary of letters and point values that takes a word as input and outputs the base total value of the word (before being put onto a board). Ex: If the input is: PYTHON
the output is: 14
part of the code:
tile_dict = { 'A': 1, 'B': 3, 'C': 3, 'D': 2, 'E': 1, 'F': 4, 'G': 2, 'H': 4, 'I': 1, 'J': 8, 'K': 5, 'L': 1, 'M': 3, 'N': 1, 'O': 1, 'P': 3, 'Q': 10, 'R': 1, 'S': 1, 'T': 1, 'U': 1, 'V': 4, 'W': 4, 'X': 8, 'Y': 4, 'Z': 10 }
Answer:
Complete the program as thus:
word = input("Word: ").upper()
points = 0
for i in range(len(word)):
for key, value in tile_dict.items():
if key == word[i]:
points+=value
break
print("Points: "+str(points))
Explanation:
This gets input from the user in capital letters
word = input("Word: ").upper()
This initializes the number of points to 0
points = 0
This iterates through the letters of the input word
for i in range(len(word)):
For every letter, this iterates through the dictionary
for key, value in tile_dict.items():
This locates each letters
if key == word[i]:
This adds the point
points+=value
The inner loop is exited
break
This prints the total points
print("Points: "+str(points))
Answer:
Here is the exact code, especially if you want it as Zybooks requires
Explanation:
word = input("").upper()
points = 0
for i in range(len(word)):
for key, value in tile_dict.items():
if key == word[i]:
points+=value
break
print(""+str(points))
What are input masks most useful for in data validation? moving data from one field to another hiding parts of a value that are unnecessary identifying duplicate values in different records in a table ensuring consistent formatting of values in a specific field
Answer:
Ensuring Consistent Formatting of Values in a Specific Field
Explanation:
Answer: ensuring consistent formatting of values in a specific field
Explanation: on edg
what is work immersion and its nature
what is subnetting. what does subnetting mean
Answer:
Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.
Explanation:
Write a template that accepts an argument and returns its absolute value. The absolute entered by the user, then return the total. The argument sent into the function should be the number of values the function is to read. Test the template in a simple driver program that sends values of various types as arguments and displays the results.
Answer:
In python:
The template/function is as follows:
def absval(value):
return abs(value)
Explanation:
This defines the function
def absval(value):
This returns the absolute value of the argument using the abs() function
return abs(value)
To call the function from main, you may use:
print(absval(-4))
What should a valid website have?
Select one:
a. Cited sources, copyright, and a clear purpose
b. Cited sources, copyright, and a poor design
c. Cited sources, copyright, and colorful images
d. Cited sources, no copyright, and a broad purpose
Answer:
A. cites sources,copyright,and a clear purpose
how do i work this out? does anyone do programming?