Assume you are a manager in the security department of a high-tech corporation. You are mentoring Mary, an entry-level network technician, who is considering a career change to specialize in security. She asks you for advice as to whether she should self-study to become a security professional or seek formal education, such as a bachelor's degree in information security. What is your advice to Mary

Answers

Answer 1

Answer:

Seek a bachelor's degree.

Explanation:

Seems more compromised and education from people with experience already.

Answer 2

Mary, my advice to you would be to pursue formal education such as a bachelor's degree in information security, to specialize in the field.

Why should Mary consider pursuing a bachelor's degree in information security?

By obtaining a formal education in information security, such as a bachelor's degree, you will gain a comprehensive understanding of the fundamental principles, theories, and practices of security.

This will provide you with a solid foundation and knowledge base to excel in your career as a security professional. Additionally, pursuing a degree will often expose you to practical hands-on experiences, internships, and networking opportunities which will greatly enhance your learning and help you establish valuable connections within the industry.

Read more about security manager

brainly.com/question/32458782

#SPJ2


Related Questions

70 POINTS!!!!
what is the importance of genders in computer science
give at least 3 complete paragraphs
PLS answer correctly...i will mark u as brainlyst!!!!!

Answers

Answer:

Explanation:

The biggest question now is how do we attract more women into the computer science field. Women need more encouragement, especially from teachers of both sexes and fellow students. Mentoring is a definite means to attract and keep women more interested in the field. Even just the support of other females present in a classroom setting can help boost the confidence in each other. Multiple studies have shown that the lack of women in computer science is very likely to start before college (Cohoon). They need this encouragement not only while taking college courses but also early on in their education. Females tend to be just as interested in science as men when they are young but their teachers and schools, who would have the most influence on them, aren’t doing their job in nurturing and identifying these women (Gurian). A possible solution to improving their confidence would be to have more mentors who can help attract and keep women interested in the field. The shortage of women in the computer science field has made it more difficult to have women in high positions. This makes it important for women who are in high positions to be mentors to all women interested. According to Joanne Cohoon a professor at the University of Virginia “CS departments generally retained women at comparable rates to men when the faculty included at least one woman; was mentored, and supervised female students; enjoyed teaching; and shared responsibility for success with their students”. It is also found that departments with no female faculty lost female students at high rates relative to men (Cohoon). Seeing other women in computer science can definitely raise confidence in women to continue or begin studying the subject. “In a new survey, 40 percent of women in the STEM fields… report that they were discouraged from their career choices, typically in college and often by their professors” (Downey). This data shows how we need more mentors willing to support women and that we are lacking teachers to help inspire young women into entering the field.

Since the beginning of computing most software and programs have been male-oriented. Video games were originally targeted at males with sport and violent themes with mostly male lead characters and limiting female roles like women who need to be rescued (Lynn). Early experiences with computers are important in shaping someone’s willingness to explore technology. “Playing with computer, console, and arcade games and educational ware can provide an introduction to computer literacy, creating familiarity and building confidence in skills” (Lynn, 145). Because computer science is so dominated by men, the software tends to be more male- friendly. To make software more appealing to girls, it should have low frustration levels, be challenging and be interactive (Lynn). By having more women in the field, women can create much more women-friendly software. Girls tend to prefer games where they can make things, rather than destroy them(Lynn). Recently more and more games have been produced that are more girl-friendly, like simulation games. The Sims is a video game where you create humans, animals and homes and has proved to be a big success with a female audience. A strategy to get more women to break outside the stereotype of women being less competitive than men would be to take games designed for boys and demand comparable female characters to empower them to be more competitive and assertive. Video games often become involved with computing as a byproduct of wanting to master gaming (Lynn).

Many boys tend to have more experience with computers at a younger age because of video games, when boys and girls are put together in a class to learn about computers the boys are already at a higher level, which is not encouraging to the women beginning at a lower level in the same class. Making more computer classes mandatory both in high school and at the college level will not only help women because of the increasing number of other female peers, but it can spark interest in women early on, helping teachers to identify students with aptitude.

Lucy wants to add some notes in her research paper that provide additional information to the reader. She also wants to display her university logo on all the pages as part of the title. What formatting can she apply to her document to include these details?

Answers

She can use a header

Write a recursive function

string reverse(string str)
that computes the reverse of a string. For example, reverse("flow") should return "wolf". Hint: Reverse the substring starting at the second character, then add the first character at the end. For example, to reverse "flow", first reverse "low" to "wol", then add the "f" at the end.

Answers

Answer:

Explanation:

The following code is written in Java. It creates a function called stringReverse that takes in one string parameter and uses a recursive algorithm to print out the input string in reverse. The output can be seen in the attached picture below.

void stringReverse(String str)

   {

       //Check to see if String is only one character or less

       if ((str==null) || (str.length() <= 1))

           System.out.println(str);

       else

       {

           System.out.print(str.charAt(str.length()-1));

           stringReverse(str.substring(0,str.length()-1));

       }

   }

6.11 LAB: Sort a vector
Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The first integer
indicates how many numbers are in the list. Assume that the list will always contain less than 20 integers.
Ex: If the input is:
5 10 4 39 12 2
the output is:
2 4 10 12 39
For coding simplicity, follow every output value by a space, including the last one.
Your program must define and call the following function. When the SortVector function is complete, the vector passed in as the parameter
should be sorted.
void SortVector(vector int>& myVec)
Hint: There are many ways to sort a vector. You are welcome to look up and use any existing algorithm. Some believe the simplest to code
is bubble sort: https://en.wikipedia.org/wiki/Bubble_sort. But you are welcome to try others: https://en.wikipedia.org/wiki/Sorting_algorithm.
290064 1698536.qx3zqy7

Answers

The sort a vector program is an illustration of functions, loops and vectors or lists.

The main program

The program written in C++, where comments are used to explain each action is as follows:

#include<bits/stdc++.h>

using namespace std;

//This defines the SortVector function

void SortVector(vector <int>& myVec){

   //This sorts the vector elements in ascending order

   sort(myVec.begin(), myVec.end());

   //This iterates through the sorted vector, and print each element

for (auto x : myVec)

 cout << x << " ";

}

//The main begins here

int main(){

   //This declares all the variables

   int num, numInput; vector<int> v;

   //This gets the length of the vector

   cin>>num;

   //The following iteration gets input for the vector

   for(int i = 0; i<num;i++){

       cin>>numInput;

       v.push_back(numInput);

   }

   //This calls the SortVector function

   SortVector(v);

return 0;

}

Read more about functions at:

https://brainly.com/question/24833629

Explain in detail the most important technology term outlined

Answers

Answer:

Technology can be most broadly defined as the entities, both material and immaterial, created by the application of mental and physical effort in order to achieve some value. In this usage, technology refers to tools and machines that may be used to solve real-world problems.

Hope it help!:)

Technology is the use of science and engineering in making life easy.

Answer :

Technology

It is defined as the application of the technical knowledge and scientific knowledge which helps in doing certain processes and studies.

Technology is used in practical purposes using the applied sciences or engineering.

Technology is used in the field of engineering, industries, medicals, space and in many more applications.

Learn More :

https://brainly.com/question/4291549

Rory has asked you for advice on (1) what types of insurance she needs and (2) how she should decide on the coverage levels vs monthly premium costs. Give Rory specific recommendations she can follow to minimize her financial risk but also keep a balanced budget.

Answers

She should get a basic health insurance plan with a monthly premium choice as she is a single lady without children in order to make payments more convenient.

How much does health insurance cost?

All full-time employees (30 hours or more each week) have their health insurance taken out of their paychecks. It will total 9.15 percent of your salary when combined with your pension payment. For illustration, a person making 300,000 per month will have 27,450 taken out.

Where in the world is medical treatment free?

Only one nation—Brazil—offers universally free healthcare. According to the constitution, everyone has the right to healthcare. Everyone in the nation, even transient guests, has access to free medical treatment.

to know more about health insurance here:

brainly.com/question/29042328

#SPJ1

A sequential circuit has one flip-flop Q, two inputs X and Y, and one output S. The circuit consists of a D flip-flop with S as its output and logic implementing the function D = X ⊕ Y ⊕ S with D as the input to the D flip-flop. Derive the state table and state dia- gram of the sequential circuit.

Answers

To derive the state table and state diagram of the sequential circuit, we first need to determine the possible states of the flip-flop Q, and the next states based on the input values X and Y and the current state of Q.

The state table for the sequential circuit would look like this:

Q(t) X Y Q(t+1) S

0 0 0 0 0

0 0 1 1 1

0 1 0 1 1

0 1 1 0 0

1 0 0 1 1

1 0 1 0 0

1 1 0 0 0

1 1 1 1 1

The state diagram for the sequential circuit would look like this:

 S=0                                                                 S=1

   ------------                                                      ------------

  | 0 |   | 1 |                                                    | 1 |   | 0 |

   ------------                                                      ------------

  |   |   |   |                                                    |   |   |   |

   ------------                                                      ------------

  |   |   |   |                                                    |   |   |   |

   ------------                                                      ------------

  |   |   |   |                                                    |   |   |   |

   

What is  flip-flop Q?

A flip-flop is a circuit that is used to store binary data in digital electronic systems. It is a type of latch circuit that is used as a memory element in digital logic circuits. Flip-flops can be either positive edge-triggered or negative edge-triggered, and can be either level-sensitive or edge-sensitive. The most common types of flip-flops are SR flip-flops, JK flip-flops and D flip-flops.

In this case, Q is a flip-flop that is used as a memory element in the sequential circuit. It stores the current state of the circuit and is used in the logic implementation of the circuit's function. The output of this flip-flop is used as an input to the next state of the circuit, and it's also the output of the circuit.

Learn more about flip-flop in brainly.com/question/16778923

#SPJ1

21. The most overlooked people in information security are:
A consultants and temporary hires.
B. secretaries and consultants.
C. contract laborers and executive assistants.
D. janitors and guards.
E. executives and executive secretaries.

Answers

Answer: D. janitors and guards

Explanation:

Information security simply means the protection of information from an unauthorized use or access.

The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.

An airline describes airfare as follows. A normal ticket's base cost is $300. Persons aged 60 or over have a base cost of $290. Children 2 or under have $0 base cost. A carry-on bag costs $10. A first checked bag is free, second is $25, and each additional is $50. Given inputs of age, carry-on (0 or 1), and checked bags (0 or greater), compute the total airfare. Hints: First use an if-else statements to assign airFare with the base cost Use another if statement to update airFare for a carryOn Finally, use another if-else statement to update airFare for checked bags Think carefully about what expression correctly calculates checked bag cost when bags are 3 or more

Answers

Answer:

The program in Python is as follows:

age = int(input("Age: "))

carryOn = int(input("Carry on Bags [0 or 1]: "))

checkedBags = int(input("Checked Bags [0 or greater]: "))

airFare = 300

if age >= 60:

   airFare = 290

elif age <= 2:

   airFare = 0

if carryOn ==  1:

   airFare += 10

if checkedBags ==  2:

   airFare += 25

elif checkedBags >  2:

   airFare += 25 + 50 * (checkedBags - 2)

print("Airfare: ",airFare)

Explanation:

This gets input for age

age = int(input("Age: "))

This gets input for carry on bags

carryOn = int(input("Carry on Bags [0 or 1]: "))

This gets input for checked bags

checkedBags = int(input("Checked Bags [0 or greater]: "))

This initializes the base cost to 300

airFare = 300

This updates the base cost to 290 for adults 60 years or older

if age >= 60:

   airFare = 290

This updates the base cost to 0 for children 2 years or younger

elif age <= 2:

   airFare = 0

This updates the airFare if carryOn bag is 1

if carryOn ==  1:

   airFare += 10

if carryOn bag is 0, the airFare remains unchanged

This updates the airFare if checkedBags is 2. The first bag is free; so, only the second is charged

if checkedBags ==  2:

   airFare += 25

This updates the airFare if checkedBags greater than 2. The first bag is free; so, only the second and other bags is charged

elif checkedBags >  2:

   airFare += 25 + 50 * (checkedBags - 2)

if checkedBags is 0 or 1, the airFare remains unchanged

This prints the calculated airFare

print("Airfare: ",airFare)

write flow chart pseudocode and algorithm for a computation that perform balance,interest, withdrawal,in bank for Ethiopia?​

Answers

Answer:

Flowchart:

Start

Input customer information (name, account number, etc.)

Calculate balance

Calculate interest

Prompt user to enter withdrawal amount

Calculate new balance

Print new balance

End

Pseudocode:

START

// Declare variables

DECLARE customerName

DECLARE customerAccountNumber

DECLARE customerBalance

DECLARE customerInterest

DECLARE withdrawalAmount

// Get customer information

INPUT customerName

INPUT customerAccountNumber

// Calculate balance

SET customerBalance = customerAccountNumber * customerInterest

// Calculate interest

SET customerInterest = customerBalance * 0.05

// Prompt user to enter withdrawal amount

INPUT withdrawalAmount

// Calculate new balance

SET customerBalance = customerBalance - withdrawalAmount

// Print new balance

PRINT customerBalance

END

Explanation:

Which statement best describes 'abstraction'? *
1 point
the result of how a program handles complexity, by focusing on detail
the result of minimizing program details by reducing the size and complexity of the
program
the result of designing a program where the focus is on what each step does, instead
of how the steps are implemented
the result of increasing program detail or duplication in order to focus on the concept
while adhering to the rules of the programming language
P

Answers

Answer:

I think it's the first one

Explanation:

The true statement regarding the abstraction is that it is the result of how a program handles complexity, by focusing on detail.

What is abstraction?

The general meaning of abstraction is defined as the process of trimming something to a set of core features by eliminating or deleting characteristics.

In terms of technology, it is a modified performance of something sophisticated, like a system's function. The purpose of “abstracting” data is to cut back complexity by removing irrelevant data.

We all think of computers in abstract terms at some level. The true statement about abstraction is that it is the result of a program's approach to complexity, which is to focus on detail.

Therefore, option A is correct.

Learn more about the abstraction, refer to:

https://brainly.com/question/13072603

#SPJ2

_______ is the assurance that you can rely on something to continue working properly throughout its lifespan.

A) Reliability
B) Raid
C) P/E cycle
D) MTBF

Answers

A) Reliability is the assurance that you can rely on something to continue working properly throughout its lifespan.

why does a computer need memory​

Answers

Answer:

For storage area and to put data

Write a program that will calculate the internal angle of an n-sided polygon from a triangle up
to a dodecagon. The output to the console should show what the random number chosen was
and the value of the internal angle. Remember to find the internal angle of a polygon use:

360°
n

Answers

The  program that will calculate the internal angle of an n-sided polygon from a triangle upto a dodecagon is given below

import random

def internal_angle(n):

   angle = 360 / n

   return angle

n = random.randint(3, 12)

print("Random number chosen:", n)

angle = internal_angle(n)

print("Internal angle of a", n, "-sided polygon:", angle, "degrees")

What is the Python program  about?

The program uses the formula for calculating the internal angle of a polygon, which is 360° divided by the number of sides (n). It also generates a random number between 3 and 12 to represent the number of sides of the polygon, and uses this value to calculate the internal angle.

The program starts by importing the random library, which is used to generate a random number. Then, it defines a function called "internal_angle" that takes one parameter, "n", which represents the number of sides of the polygon.

Inside the function, the internal angle of the polygon is calculated by dividing 360 by n and storing the result in the variable "angle". The function then returns this value.

Therefore, It's important to note that the internal angle of a polygon would be correct as long as the number of sides is greater than 2.

Learn more about Python program from

https://brainly.com/question/28248633
#SPJ1

[C++ for array week|
First, make an array to use later in the pogram:
Array of ints of size 90 (not dynamic)
Init all values to 0 (that's the curly braces thing)
Loop through the array and set each value to a random number between 2 and 9
Print the array with a separate for loop. Put a space between each number
Now use that array to do the following:
Ask the user what index they want to change
If it is out of bounds, don't exit the program, just ask again.
Ask the user what the new value should be
Reprint the array
Keep doing this until they enter -1 for the index
Here's a super important point. Before you use the index they gave you, you must check to make sure it is not out of bounds on that array. Crashing is worse than being wrong.
Any crash or infinite loop automatically drops the grade two letters no matter how correct anything else is. In real life, if you make a mistake you can fix it in a patch. If your program crashes though, someone might die. Or worse yet, return your program so you don't get paid.
SP21: Give extra point for dynamic array

Answers

Answer:

this is stupi

Explanation:

Someone help me out eh?

Answers

Line 4

It should be font-size: 15px

Also there should be curly braces in line 5.

Answer:

You are screwed

Explanation:

no one cares about this Question

Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commission is 35% of the sales. If the company earns less than $200,000 in a month, the commission is 27% of the sales. Calculate the commissions as follows:
a. In cell b17, enter a formula that uses the IF function and tests whether the total sales for January ( cell B10) is greater than or equal to 200000
b. If the condition is true, multiply the total sales for January ( cell B10) BY 0.35 TO calculate a commission of 35%.

Answers

Answer:

srry dont know

Explanation:

How do internet gateway routers help to defend the network from cyberattack?

Answers

Answer:

Predict and prevent web attacks before they reach your corporate network or your users – wherever they are. Set up first line defence to protect your most valuable asset – your data.

Explanation:

The best solution at Gateway between the Internet (Public) and the Intranet (Vast LAN/VLAN (Private)) for the intruder detection, drop or deny, stopping spam emails and viruses/malwares, protect from exploiting vulnerabilities, flood a targets in application and communication protocol etc. and a best monitoring, evaluation and analysis tool for the better safeguard. Normally we intend to implement either a software or hardware firewall which enforces a set security policies that needs to be fine-tuned according to the recent advancement and race.

We can take all possible measures for the security of databases servers, web servers, systems servers with a set of inbuilt security mechanism and secure travel of transactions over the net based on encryption & VPN as choices are available.

Assume your sketch has a variable named silo, which stores an object that is defined by a class you have created. The name of the class is Cylinder. The Cylinder class has a method named volume, which calculates the volume of a cylinder using its property values and returns the calculated value. Which line of code is the correct line to use the silo variable, calculate volume, and store that value in a new variable.

a. let v = [silo volume];
b. let v = volume(silo);
c. let v = silo.volume();
d. let v = silo[volume];
e. let v = cylinder.volume(radius, height);

Answers

Answer:

c. let v = silo.volume();

Explanation:

When you create and initialize a new object you pass through that object's class constructor. The constructor is in charge of initializing all the necessary variables for that class including radius and height. Once you save the object in a specific variable (silo) you need to call the class methods through that variable, using the '.' command. Therefore, in this scenario, in order to call the volume() method you would need to call it from the silo object and save it to the v variable, using the following statement.

let v = silo.volume();

8. Explain strategies employed by the operating system to ensure safety of programs and data in
a computer system.
mand line operating systems.

Answers

Answer:

is the process of ensuring OS integrity, confidentiality and availability. ... OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised.

Manfred wants to include the equation for the area of a circle in his presentation. Which option should he choose?
O In the Design tab of the ribbon, choose a slide theme that includes the equation.
O In the Home tab of the ribbon, choose Quick Styles and select the equation from the default options.
In the Insert tab of the ribbon, choose Object and select the equation from the dialog box.
In the Insert tab of the ribbon, choose Equation and select the equation from the default options.

Answers

Answer:

In the Insert tab of the ribbon, Manfred should choose Equation and select the equation from the default options.

Which of the following does NOT pair the statement with the corresponding output?

Answers

The statement that does not pair with the corresponding output is system.out.printin (a + b+ c). The correct option is statement A.

What is the output?

Output is any information processed by and sent by a computer or other electronic device. Anything visible on your computer monitor screen, such as the words you write on your keyboard, is an example of output.

Outputs can be text displayed on the computer's monitor, sound from the computer's speakers, or a physical output such as a printed sheet of paper from a printer connected to the computer.

Therefore, the correct option is A, system.out.printin (a + b+ c).

To learn more about output, refer to the link:

https://brainly.com/question/13736104

#SPJ1

A citizen of any group both

Answers

Answer:

Rights and Responsibilities

Explanation:

In the flag, the RGB values next to each band indicate the band's colour.
RGB: 11111101 10111001 00010011
RlGB: 00000000 01101010 01000100
RGB: 11000001 00100111 00101101
First, convert the binary values to decimal. Then, to find out what colours these values correspond to, use the Colour names' handout (ncce.io/rep2-2-hw) or look up the RGB values online. Which European country does this flag belong to?​

Answers

Answer:

To convert the binary values to decimal, you can use the following steps:

Start with the rightmost digit and assign it the value of 0.

For each subsequent digit moving from right to left, double the value of the previous digit and add the current digit.

For example, to convert the first binary value, 11111101, to decimal:

10 + 02 + 04 + 08 + 016 + 132 + 164 + 1128 = 253

So the first binary value, 11111101, corresponds to the decimal value 253.

Using this method, you can convert the other binary values to decimal as well. To find out what colours these values correspond to, you can use the Colour names' handout or look up the RGB values online.

To determine which European country this flag belongs to, you can try looking up the colours and seeing if they match any known flags. Alternatively, you could try searching for flags of European countries and see if any of them match the colours you have identified.

Question 2
1 pts
Which of the following is true about main and secondary memory?
O Main memory is short term memory used by the CPU in processing commands,
secondary memory is more permanent and used for storage.
Secondary memory is lost when the device's power is turned off.
Main memory is more permanent and used for storage, secondary memory is short
term memory is used by the CPU in processing commands.
Main memory is used for storage.

Answers

Answer:

Main memory is short term memory used by the CPU in processing commands,

secondary memory is more permanent and used for storage.

Explanation:

Main memory defines ur ram.

Secondary memory defines your hard drives etc.

Need to use Python to create the below function;
''' This function takes as input two lists of same length. It outputs net correlation value between these two lists. To compute correlation between two lists:
1. Compute the average of each list
2. Subtract a list's average from every element in the list (repeat for both lists)
3. Multiply corresponding differences from each list to compute the element-wise correlation
4. Sum all the values from step 3 to compute the net correlation value
Example: [-10,0,10,20],[20,10,10,20] -> 0
def compute_net_correlation(self,data_series_1,data_series_2):
''' #### FILL IN CODE HERE ####
net_correlation = # fill in computation
return net_correlation

Answers

Answer:

The function is as follows:

def compute_net_correlation(data_series_1,data_series_2):

   series1 = 0; series2 = 0

   for i in range(len(data_series_1)):

       series1+=data_series_1[i]

       series2+=data_series_2[i]

   avg_series1 =series1/len(data_series_1)

   avg_series2 =series2/len(data_series_1)

   for i in range(len(data_series_1)):

       data_series_1[i]-=avg_series1

       data_series_2[i]-=avg_series2

       data_series_1[i]*=data_series_2[i]

   net_correlation = 0

   for i in range(len(data_series_1)):

       net_correlation +=data_series_1[i]

   return net_correlation

Explanation:

This defines the function

def compute_net_correlation(data_series_1,data_series_2):

This initializes the sum of each series to 0

   series1 = 0; series2 = 0

This iterates through each data series

   for i in range(len(data_series_1)):

This adds series 1

       series1+=data_series_1[i]

This adds series s

       series2+=data_series_2[i]

This calculates the average of data series 1

   avg_series1 =series1/len(data_series_1)

This calculates the average of data series 2

   avg_series2 =series2/len(data_series_1)

This iterates through each data series

   for i in range(len(data_series_1)):

This subtracts the average from series 1

       data_series_1[i]-=avg_series1

This subtracts the average from series 2

       data_series_2[i]-=avg_series2

This multiplies the corresponding elements of both series

       data_series_1[i]*=data_series_2[i]

This initializes the net correlation to 0

   net_correlation = 0

This iterates through each data series

   for i in range(len(data_series_1)):

This adds up the corresponding elements of both series

       net_correlation +=data_series_1[i]

This returns the net correlation

   return net_correlation

Can someone write an essay on data storage and describe the different storages I have listed below•
Hard drive disk
floppy disk
tape
compact disk
dvd and blu-ray
usb flash drive
secure digital card
solid state drive
cloud storage
punch card
...
.
.
. This is worth 100 points!!!
I really need this!

Answers

Answer:

Explanation:

Punch card is the oldest computer storage; followed by tape and then floppy disk. Hard drive goes back as far as floppy but is still in use today. CD/DVD/BR discs are all later storage but are also used for storing music and videos. USB flash, SD card, SSD and cloud storage are the common technologies used today for data storage.

Answer:

Explanation:

the other answer talks about when the different storages were used; here are their capacity comparison; in increasing order:

punch card - one hole represents 1 bit

tape - slightly more w/ 0/1 represented by sound

floppy disk - more as 0/1 represented by magnetics

hard drive - also magnetics but capacity ranges from okay (in MB) at the beginning to enormous (in TB) currently

CD - beginning to be okay but still under 1 GB

DVD and BR - better 5-28GB

USB/SD/SSD - good; all in 10s to 100s of GB

cloud storage - UNLIMITED!

You are a member of Future Business Leaders of America, and a local retirement community has asked if you and
your other members could come to their facility to help teach the residents that live there how to use technology
so that they can communicate with their grandchildren. This is an example of
networking
a competition
community service
a class assignment

Answers

Senior executives typically invite network members to participate in the planning and implementation of the change process at the first meeting. There is a matter of minutes, and Meetings are scheduled frequently.

Which three strategies would you recommend to make your company a fantastic place to work?

Fantastic lines of communication between management and employees. a feeling of belonging within the crew. allowing workers the freedom to develop their skills. a tradition of ongoing development.

What are some tactics you may employ to promote innovation and creativity within a company?

Ask your staff to present their ideas if you want to encourage creativity and innovation. You might also develop a procedure to submit them. Request that each employee presents an idea within a set deadline, and offer incentives to encourage discussion.

to know more about community service here:

brainly.com/question/15862930

#SPJ1

Please submit one zip file containing all source code, header, and output files. Exercise 1: 30 Points (Duplicate Elimination with vector) Use a vector to solve the following problem. Read in 20 numbers, each of which is between 10 and 100, inclusive. As each number is read, validate it and store it in the vector only if it isn't a duplicate of a number already read. After reading all the values, display only the unique values that the user entered. Begin with an empty vector and use its pushback function to add each unique value to the vector. SAMPLE RUN: Enter an integer: 105 Enter an integer: 5 Enter an integer: 10 Enter an integer: 11 Enter an integer: 11 Enter an integer: 12 Enter an integer: 13 Enter an integer: 14 Enter an integer: 15 Enter an integer: 15 Enter an integer: 16 Enter an integer: 17 Enter an integer: 18 Enter an integer: 19 Enter an integer: 20 Enter an integer: 21 Enter an integer: 22 Enter an integer: 23 Enter an integer: 24 Enter an integer: 25 Enter an integer: 26
Enter an integer: 27
Enter an integer: 28
Enter an integer: 29
Unique values in the vector are:
10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 294

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

#include <algorithm>

using namespace std;

int main(){

   vector <int> inTs;

   int num;

   int count = 0;

   int temp; int chk = 0;

   while(count < 20){

       temp = count;

       cout<<"Enter an integer: ";

       cin>>num;

       if(num>=10 && num<=200){

           for(int i = 0; i<count;i++){

               if(num == inTs.at(i)){ chk = 1; break;}

           }

       if(chk == 0){ inTs.push_back(num); count++; }

       else{ count = temp; }

       chk = 0;

       }

   }

   for(int i=0; i < 20; i++){  cout << inTs.at(i) << ' ';    }

   return 0;

}

Explanation:

See attachment for complete code where comments are used as explanation

Hey tell me more about your service. I have a school assignment 150 questions and answers on cyber security,how can I get it done?

Answers

Answer:

Explanation:

I have knowledge in a wide range of topics and I can help you with your school assignment by answering questions on cyber security.

However, I want to make sure that you understand that completing a 150 question assignment on cyber security can be time-consuming and it's also important that you understand the material well in order to do well on exams and to apply the knowledge in real-world situations.

It would be beneficial to you if you try to work on the assignment by yourself first, then use me as a resource to clarify any doubts or to check your answers. That way you'll have a deeper understanding of the material and the assignment will be more beneficial to you in the long run.

Please also note that it is important to always check with your teacher or professor to ensure that getting assistance from an AI model is in line with your school's academic policies.

Please let me know if there's anything specific you would like help with and I'll do my best to assist you.

Other Questions
When you don't consume enough protein, your body will start using your muscles and organs as a source of protein. T/F Spanish homework help please. I'm failing Pat recently moved to San Diego from Nevada, where he has an inactive broker license. He has passed the California broker license exam, but has not yet received his license. Pat found a buyer for a house in the neighborhood that was listed for sale. Escrow is scheduled to close in two days and Pat is looking forward to his commission check. Pat receives a call from the escrow officer telling him he will not receive a commission check. Which statement is correct? Edgar accumulated $3,000 in credit card debt. If the interest rate is 50% per year and he does not make any payments for3 years, how much will he owe on this debt in 3 years by compounding continuously?Provide your answer below: One of the effects of China'sisolationist foreign policy underthe Qing Dynasty was.A. The Chinese fell behind in innovation andtechnologyB. China's economy was restoredC. The price of European goods became inflatedin China Why are dynamic flexibility tests not used as often as static flexibility tests a dynamic flexibility tests involve m? Voxguxihxjcib iBuick oh oh big ugxjgxkhc In this assignment, you will build a program using techniques from previous CSS courses that counts unique fractions. No new constructs from our readings are expected, and as such, you can complete this program with just a handful of lines (12-25) of code in just one main function. (But do NOT feel that your code needs to be that short!) Note that the use of methods will improve your design and improve your grade. You will need to use loops, ifs, comments, etc., (in other words, structured programming) to complete this assignment and achieve the outcomes listed below. Included below is a sample execution of your program as well as a list of outcomes your program is to implement; notice reduction of fractions is optional in this version of the assignment. Do NOT build any classes (other than your driver, obviously). You are NOT allowed to use any of Java's built-in abstract data types like ArrayList or HashMap or any of that stuff.IntroductionYour project is to read in a series of fractions from a text file, which will have each line formatted as follows: "A/B". A sample text file is listed below, and the purpose of your program is to read in each fraction and count the number of occurrences for the current fraction. When all the input is consumed (or as the input is consumed), your program will print out its list of unique fraction and their corresponding count see the output below (and you may assume no blank lines or misleading characters; see the text file link on the website for one of the actual inputs Ill use when testing your submission).Sample Text Input6/37/36/312/6Sample Console Output6/3 has a count of 37/3 has a count of 1NOTE: it is also fine (though not required) if your program simplifies the fractions so that the output is:2/1 has a count of 37/3 has a count of 1---But either way, 6/3 and 12/6 count as the same fraction, so you do need some mechanism for determining if two fractions that look different are actually the same. The only optional part of the assignment is how you display them in the end.text file:6/34/25/980/90800/90015/255/51/11/101/1001/10001/32/61/21/31/11/41/51/61/71/81/92/12/22/32/42/52/62/72/82/9 Show all the work and don't forget to show scientific notation! You are provided with the following information for Najera Inc. for the month ended June 30, 2017. Najera uses the periodic method for inventory.Date Description Quantity Unit Cost or Selling PriceJune1 Beginning inventory 38 $42June4 Purchase 135 $46June10 Sale 108 $70June11 Sale return 12 $70June18 Purchase 58 $48June18 Purchase return 9 $48June25 Sale 64 $75June28 Purchase 33 $52Required:Calculate cost per unit. Select all that are equivalent to sinGFH A. SinGEJ B. SinEGJ C. CosFGH D. CosGEJ E. CosGFH F. TanGEJ 7e^.1t =47 express the solution as a logarithmic in base e 3) Rcrire totalement le texte suivant en faisantapparatre le discours indirect.Il se retourna en entendant Glenda entrer dans la pice.Elle portait un petit plateau. J'allais le faire, protesta-t-il. - a ne fait rien, murmura safemme. Tu as l'air d'en avoir besoin. Elle lui tendit unwhisky. J'en ai besoin, en effet. Merci, chrie. Il remarquaqu'elle buvait un Coca. (...) Tu as eu mal, aujourd'hui ?- Un peu, avoua Glenda. (...) Regarde. C'est bizarre ! Leslumires de la maison de Steve sont teintes. - Depuis ici,elle me semblait vraiment sombre, constata Roger. >D'aprs M. Higgins Clark, La Nuit du renard.aidez moi svp How did the United States exert its influence in Cuba? Was it direct or indirect If you know the area and the base of a triangle, how can you find the height?(20 pts) What are the most important values of your culture? What is wrong with the sentence - The secretary of state whose appointed by the president of the United States is the country's chief adviser on foreign affairs A cylinder has a volume of 105 cubic centimeters. What is the volume of a cone with the same base and height?315 am210 cm70 cm35 cm At the candy store, Julie found a special scale that would measure the number of pounds, p, of candy and then calculate the cost, c, when you typed in the name of the candy. For her favorite candy, chocolate gummy bears, she wrote this table. p c0.25 1.690.45 3.040.75 5.061.25 11.81Choose all of the following statements that are true.Select one or more:a.A reasonable domain is [-1, 100]b.A reasonable domain is (0, 50] .c.c = 6.75pd.none of thesee.A reasonable range is [0, 20]. If a borrower wishes to borrow 90% of the $250,000 purchase price, which of the following equals one discount point?A) $3,000B) $2,500C) $2,250D) $2,000