Answer:
Security is a major concern for organisations.
Explanation:
Developing mobile application for companies is usually centered on security because of the fear of beach of sensitive company information.
For example, a company may need to decide what measures to put in place that can prevent or reduce data breaches. They may either give employees customize devices with already installed mobile applications or provide unique login details to employees to access the Enterprise mobile application on their own phone.
The IT department sets up a user account and software. Which stage of the hardware lifecycle does this situation belong to?
Answer:
"Development" would be the correct answer.
Explanation:
All that would be required to complete the plan is designed mostly during the development or planning process. The production process is finished whenever it's prepared to resume execution.Local participants and perhaps suppliers are helped to bring in, a timetable would be managed to make, parts and equipment are decided to order, employee training should be given and many more.Write a split_check function that returns the amount that each diner must pay to cover the cost of the meal. The function has 4 parameters: bill: The amount of the bill. people: The number of diners to split the bill between. tax_percentage: The extra tax percentage to add to the bill. tip_percentage: The extra tip percentage to add to the bill.
Answer:
def split_check(bill, people, tax_percentage, tip_percentage):
tax = bill * tax_percentage
tip = bill * tip_percentage
total_bill = bill + tax + tip
return total_bill / people
Explanation:
Create a function called split_check that takes four parameters, bill, people, tax_percentage, and tip_percentage
Inside the function, calculate the tax, multiply bill by tax_percentage. Calculate the tip, multiply bill by tip_percentage. Calculate the total_bill, sum bill, tax, and tip. Finally, return the total_bill / people which gives the amount each diner needs to pay.
When there are items that are out of the control of the programmer that may support or oppose the program goals, this is termed A. Program deterrents B. External motivators C. Environmental influences D. External influences
Answer:
Option D (External influences) is the correct choice.
Explanation:
External factors including certain regulatory changes, the economy, globalization as well as new technologies may determine the effectiveness of such smaller businesses. They are the be the variables that may be out of a corporation's influence. While a company has no power regarding external factors, these factors may have a direct effect on the company.Other given choices are not related to the given circumstances. So that option D would be the right one.
A password checking system that disallows user passwords that are proper names or words that are normally included in a dictionary is an example of _____ with respect to security systems.
What is cutting-edge technology
Answer:
Cutting-edge technology refers to technological devices, techniques or achievements that employ the most current and high-level IT developments; in other words, technology at the frontiers of knowledge. Leading and innovative IT industry organizations are often referred to as "cutting edge."
Explanation:
Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. Its major concern is the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop. Which of the following would help the firm enforce access controls and storage guidelines on its laptops?
a. Anenterprise search software
b. A binary search tool
c. A perceptive software pack
d. A Domain search engine
Answer:
a. An enterprise search software.
Explanation:
In this scenario, Rosseta Technologies, an information technology service provider to a company based out of Germany, allows its employees to work from home twice a month. In order to prevent the leakage of confidential data from the laptops or an employee making copies of sensitive files on his personal laptop, Rosetta technologies should use an enterprise search software.
Enterprise search software is a computer application which is typically used to make relevant data from sources, such as a database, file system and intranet searchable to a specific or defined group of people.
An enterprise search software would help the firm enforce access controls and storage guidelines on its laptops.
On enterprise search software, there are basically two (2) ways to enforce access controls as a security policy on users;
1. Early binding: at the index stage, permissions are analyzed and ascribed to each document in the enterprise search software.
2. Late binding: it involves the process of analyzing permissions and ascribing them to each document at the query stage in the enterprise search software.
Write an object oriented Python script that does the following:
1. Connects to the Sakila database (mysql)
2. Adds a record to the database
3. Retrieves and displays a dataset that shows the newly added record
Answer:
ESCALAS MAYORES (D, E, G, A, B) Porfavor necesito ayuda,te lo agradecería muchísimo!!
Es urgente
LAB: Miles to track laps. (PLEASE CODE IN PYTHON)
Instructor note:
Note: this section of your textbook contains activities that you will complete for points. To ensure your work is scored, please access this page from the assignment link provided in Blackboard. If you did not access this page via Blackboard, please do so now.
One lap around a standard high-school running track is exactly 0.25 miles. Write the function miles_to_laps() that takes a number of miles as an argument and returns the number of laps. Complete the program to output the number of laps.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
1.5
the output is:
6.00
Ex: If the input is:
2.2
the output is:
8.80
Your program must define and call the following function:
def miles_to_laps(user_miles)
Answer:
The program in python is as follows:
def miles_to_laps(user_miles):
return (user_miles/0.25)
mile = float(input("Number of Miles: "))
print("Number of laps: ",end="")
print('{:.2f}'.format(miles_to_laps(mile)))
Explanation:
The first line defines the function miles_to_lap
def miles_to_laps(user_miles):
This line returns the equivalent number of laps
return (user_miles/0.25)
The main method starts here
This line prompts user for input
mile = float(input("Number of Miles: "))
This line prints the string "Number of laps", without the quotes
print("Number of laps: ",end="")
This prints the equivalent number of laps to two decimal places
print('{:.2f}'.format(miles_to_laps(mile)))
The program converts the number of miles enters by the user to an equivalent measure in laps is written in python 3 thus :
def miles_to_laps(miles):
#initialize the function which takes in a single parameter
return (miles/0.25)
mile_value= eval(input("Number of Miles: "))
#allows user to input a value representing distance in miles
print("Number of laps: ",end="")
#display Number o laps with cursor on th same line
print('{:.2f}'.format(miles_to_laps(mile_value)))
#pass user's vlaue to the function to Obtain the lap value.
A sample run of the program is attached.
ou are sending a very small amount of information that you need the listening program to respond to immediately. Which Transmission Control Protocol (TCP) flag will be used
Answer:
The Push flag
Explanation:
When sending a very small amount of information which the listening program needs to respond to immediately. The Transmission Control Protocol (TCP) flag that will be used is the Push flag.
The Push flag, like the Urgent flag, was brought into existence to ensure that the data is given the priority it deserves and it is urgently processed at the sending or receiving end. Push flag is used more often at the beginning and end of a data transfer, it affect the way the data is handled at both ends (sending and receiving).
When developers make available new applications, they must always ensure they follow specific guidelines given by the RFC's to ensure that the applications created work properly / efficiently and control the flow of data in and out of the application layer of the OSI model perfectly. When used, the Push bit ensure that the data segment is handled correctly and given the deserved priority at both ends of a virtual connection.
A bit shift is a procedure whereby the bits in a bit string are moved to the left or to the right.
For example, we can shift the bits in the string 1011 two places to the left to produce the string 1110. Note that the leftmost two bits are wrapped around to the right side of the string in this operation.
Define two scripts, shiftLeft.py and shiftRight.py, that expect a bit string as an input.
The script shiftLeft shifts the bits in its input one place to the left, wrapping the leftmost bit to the rightmost position.
The script shiftRight performs the inverse operation.
Each script prints the resulting string.
An example of shiftLeft.py input and output is shown below:
Enter a string of bits: Hello world!
ello world!H
An example of shiftRight.py input and output is shown below:
Enter a string of bits: Hello world!
!Hello world
Answer:
Following are the code to this question:
Defining method shiftLeft:
def shiftLeft(bit_string): #defining method shiftLeft, that accepts parameter bit_string
bit_string= bit_string[1:]+bit_string[0]#use bit_string to provide slicing
return bit_string#return bit_string value
bit_string =input("Enter value: ")#defining bit_string variable for user input
print (shiftLeft(bit_string))#use print method to call shiftLeft method
Defining method shiftRight:
def shiftRight(bit_string):#defining method shiftRight, which accepts bit_string variable
bit_string=bit_string[len(bit_string)-1]+bit_string[0:len(bit_string)-1]#using bit_string variable for slicing
return bit_string#return bit_string calculated value
bit_string= input("Enter value: ")#defining bit_string variable for user input
print(shiftRight(bit_string))#use print method to call shiftLeft method
Output:
Please find the attachment.
Explanation:
method description:
In the above-given python code two methods "shiftLeft and shiftRight" are declared, in which both the method accepts a string variable "bit_string". Inside methods, we use the slicing, in which it provides to use all the sequence values and calculated the value in this variable and return its value. At the last step, the bit_string variable is used to input value from the user end and call the method to print its value.As a security engineer, compare and contrast the pros and cons of deploying hetero vs homogenous networks. Which costs more? Which offers more protection? Why?
Answer:
See below
Explanation:
In case of a homogeneous network, Skype is an example and OpenTable is an example of a heterogeneous network.
Homogeneous networks are easier to get started with since its all pre-integrated, and even the troubleshooting is more convenient if a problem arises. However, it then becomes a security concern if you choose to place all that power to a single vendor - known as ' monoculture'. One event can affect the entire network. On the other hand, a heterogeneous set up does not run this risk. Several different components are utilized which are not as vulnerable to security threats.
In conclusion, homogeneous networks cost more and heterogeneous networks are more secure.
The dramatic growth in the number of power data centers, cell towers, base stations, recharge mobiles, and so on is damaging the environment because Radio Frequency Interference (RFI) is overcrowding specific areas of the electromagnetic spectrum.
A. True
B. False
Answer:
A. True
Explanation:
Radio frequency interference abbreviated RFI is radio interference that occurs as a result of radiation in radio frequency energy that usually causes electronic devices to malfunction. Radio frequency interference or RFI is given out or emitted by electrical devices or centres such as mobile phones, satellites or data centres which affects the environment by increasing heat and bringing about increased body temperature in humans
Summary
In this graded assignment, you will write Python programs that use loops to implement various algorithms.
Learning Outcomes
In completing this assignment, you will:
• Gain more experience converting an algorithm expressed using flowchart to one implemented in a Python program.
• Write a Python program using loops
Description
In a previous assignment in this course, you were asked to draw a flowchart for an algorithm that finds the two smallest items in a list, and then another assignment asked you to convert that flowchart to pseudocode.
Here is a pseudocode implementation of that algorithm:
1. min1- list
2. min2 - list,
3. for each item in list
4. if item
5. then if min1
6. then min2
7. else mint
8. else if item
9. then min2
10. output: min1, min2 item item item
Now, implement the algorithm in Python so that it correctly sets the values of min1 and min2 which should hold the two smallest values in the list, though not necessarily in that order.
In the code below, we have provided a list called "list" and initialized min 1 and min2 to hold the first two elements. Write your code starting at line 5 (you can remove the comments starting at line 6, and may need more space than what is provided), and be sure that the values of min1 and min2 are correctly set before the code reaches the "return (min1, min2)" statement on line 11.
As in the previous assignment, we will be using the Coursera automatic grading utility to test your code once you submit this quiz for grading, and this requires it to be within a function. So be sure that all of the code after line 1 is indented, and that you do not have any code after the "return (min 1, min2)" statement.
Keep in mind that the goal here is to write a program that would find the two smallest values of any list, not just the one provided on line 2. That is, don't simply set min 1 and min2 to-2 and -5, which are the two smallest values, but rather write a program that implements the algorithm from the flowchart and correctly sets min1 and min2 before reaching the return (min1, min2)" statement.
As before, you can test your program by clicking the "Run" button to the right of the code to see the results of any "print" statements, such as the one on line 10 which prints min1 and min2 before ending the function. However, please be sure that you do not modify the last two lines of the code block
1. def test(): # do not change this line!
2. list = [4, 5, 1, 9, -2, 0, 3, -5] # do not change this line!
3. min1 = list[0]
4. min2 = list[1]
5.
6. #write your code here so that it sets
7. #min1 and min2 to the two smallest numbers
8. # be sure to indent your code!
9.
10. print(min1, min2)
11. return (min1, min2) # do not change this line!
12. # do not write any code below here
13.
14. test() # do not change this line!
15. # do not remove this line!
Hints: The Python code for this algorithm is very similar to the pseudocode! Just be sure you are using the correct syntax. As in previous activities, don't forget that you can use the "print" function to print out intermediate values as your code is performing operations so that you can see what is happening