Answer:
Hacking refers to attempts to gain information from otherwise undisclosed areas. Hacking is the most commonly known computer crime, however, people refer to hacking as committing any criminal act using a computer while this is not the case. ... Piracy refers to the unauthorized duplication of computer software.
Hope this helps!!
Explanation:
Answer:
SOFTWARE PIRACY is a term used to describe the act of illegal using, copying distributing software without ownership or legal rights eg: downloading movies
HACKING is an attempt to exploit a computer system or a private network inside a computer
When is the following expression true? (2 points)
!(!a || b) || (!a && b)
1) If and only if a and b have different values
2) If and only if a and b have the same value
3)
If and only if both a and b are true
4) If and only if both a and b are false
5) The expression is never true
Answer:
1) If and only if a and b have different values
Explanation:
Given
Expression: !(!a || b) || (!a && b)
Required
When is it true?
The expression is true when the values a and b are different and the proof is as follows.
(1) Assume that: a = true and b = false
!(!a || b) || (!a && b)
= !(!true || false) || (!true && false)
!true = false, so the expression becomes:
= !(false|| false) || (false && false)
In boolean, false|| false = false and false && false = false. So, we have:
= !(false) || (false)
!(false) = true, so, the expression becomes:
= true || (false)
Lastly, true || false = true
(2) Assume that: a = false and b = true
!(!a || b) || (!a && b)
= !(!false|| true) || (!false && true)
!false = true, so the expression becomes:
= !(true|| true) || (true && true)
In boolean, true|| true = true and true && true = true. So, we have:
= !(true) || (true)
!(true) = false, so, the expression becomes:
= false|| true
Lastly, false || true = true
This expression is false if a and b have the same value
what did Bakers wear (1) in the Portugal does (2) when was author was young ???
Please don't post invalid answer please..!!
Anyone active here please give me answer of that question..!!
(i) The dress that the bakers used to wear in Portugal was; a a single-piece long frock that reached to their knees called ''Kabai''.
(ii) The dress that the bakers used to wear when the author was young was; shirts and trousers that were shorter than the ones of full length but longer than half-pants.
This question is from the title "Glimpses of India" which is a story about a baker from Goa that is related to the period/time when the Portuguese were ruling in Goa. The story is simply a chronicles of one of the bakers that was residing in a Goan village.
i) Now, according to his story, it was clear that the cloth that was synonymous with the bakers was a single piece frock that reached their knees and this dress was called "Kabai"ii) When the author was young he reported that the dresses then among the bakers were shirts and trousers that were quite shorter than the ones of full length but longer than the half-pants.Read more on glimpses of india at; https://brainly.com/question/9566788
What types of information should have their sources cited to avoid plagiarism? List at least 3
Answer:
Everything.It doesn't matter the information because there's always a way to plagiarize.No matter what the information, always, ALWAYS, cite the source.
Explanation:
Answer:To avoid plagiarism, cite your sources for statistics, opinions, quotes, and judgments.
Explanation:
E-banking is also called: [1]
1) Online banking
2) Internet banking
3) Both a and b
4) None of these
what is a sending device
Answer:
A sending device that initiates an instruction to transmit data, instruction, or. information. e.g., Computer A, which sends out signals to another computer. □ A communication device that converts the data, instructions, or information. from the sending device into signals that can be carried by a.
Answer:
A sending device is an object that gives instructions to transmit information.
Colleen started working for a company that makes stuffed animals and delivers them with special messages. She immediately recognized some needs of the company and started talking to employees to gather information. The employees all need to access a common database. They need to print from all workstations. They would like managers to be automatically notified when supplies are running low. Select each of the requirements for this business.
-shared drive on the network
-networked printer
-broadband
-remote access
-automatic notification
-e-mail
Answer:
automatic notification, networked printer, shared drive on the network
Explanation:
The automatic notification allows to be notified when supplies are low. To be able to print from all workstation, they need a printer that is connected by network. The common database would be the shared drive on the network.
Answer:
automatic notification, networked printer, shared drive on the network
Explanation:
Or a,b,d,e
Create an array of size 10 and name RandArray populate the RandArray with random integer from 1 to 20. Every element in the RandArray must be changed as follows: If the value of the element is less than the array index, the element must be replaced with the index plus 10. If the value of the element is equal to the index, the element must be doubled. If the value of the element is greater than the index, the element must be replaced by the index squared. Print the original number and the changed number of the RandArray
Answer:
int[]RandArray = new RandArray[10];
for(int x =0; x< RandArray.length;x++){
RandArray[x] = random.nextInt(10 - 1 + 1) + 1;
}
for(int x =0; x< RandArray.length;x++){
int og = RandArray[x];
if(RandArray[x]<x){
RandArray[x] = x + 10;
}
else if(RandArray[x] == x){
RandArray[x] =RandArray[x] * 2;
}
else if(RandArray[x] > x){
RandArray[x] =Math.pow(x,2);
}
System.out.println("Original: " + og +"New: "+ " RandArray[x])
}
Explanation:
Following are the python program for calculating the array values by using the random array function:
Python Program:
import random as R#import package of random
R1 = R.sample(range(1, 20), 10) #Generating 10 random numbers from 1 to 20
RandArray = R1.copy() #Copying the elements of R1 in to RandArray
print("Original Array: ",RandArray)#defining the print method that prints RandArray value
for e in range(len(RandArray)):#defining a loop that calculates
if(RandArray[e] < e):#defining if block that checks index of list that stores random number
RandArray[e] = e+10#adding 10 in numbers
elif(RandArray[e] == e):#defining if block that checks index of list that stores random number
RandArray[e] = e*2#multiplying by 2 in number
elif(RandArray[e] > e):#defining if block that checks index of list that stores random number
RandArray[e] = e**2#calculating the square value of RandArray
print("Changed Array: ",RandArray)#print RandArray value
for i in range(10):#defining loop that prints Array value
print("Original Number:",R1[i], "Changed Number:",RandArray[i])#print RandArray value
Output:
Please find the attached file.
Program Explanation:
import package of random. Defining the "R1" variable that uses a random function to generate 10 random numbers from 1 to 20.Declaring the "RandArray" that Copying the elements of R1 into RandArray.Defining a loop that calculates the length of the array and uses a conditional block that checks and calculates the random array values.In the last step, another loop is declared that prints the array "RandArray" value.
Find out more information about the random number here:
brainly.com/question/16403687
Computational artifacts can include various forms of bias that result in the _____
of certain groups of people.
Answer:
Exclusion
Explanation:
Right on Egenuity
Answer:Below
Explanation:
Explain why the program did not print "clap", and how to fix it.
#takes number of fingers and recommends a thoughtful response
fingers = 10
if fingers >= 2:
print("whistle")
elif fingers >= 4:
print("snap")
elif fingers >= 10:
print("clap")
else:
input("are you human?")
Answer:
Because you're using "elif".
If I were to have this code:
if *blank*:
*action 1*
elif *blank*:
*action 2*
If and elif is basically saying "one or the other". Since 10 is >= 2, it prints out only whistle. Instead of elif, you were to replace them all with "if", it would print out:
whistle
snap
clap
Choose the answer. Janice's IT department found that her computer had a program on it that was collecting her personal information as she browsed the Web. What is this an example of?
spyware
pharming
spam
spoofing
Answer:
Spyware
Spam is just unwanted soliciation, spoofing is making links appear as something else, pharming is creating a fake website for victims to use.
Moving your Sprite from right to left is considered the X coordinate?
Question 12 options:
True
False
Answer:
True.
Explanation:
X coordinates run from left to right, while Y runs from the top to the bottom.
To help you remember it, think of this:
A plane takes off and lands at the X coordinates and can choose whichever way it wants to take off from: left or right. Until the plane takes off, your Y coordinate is at 0. Once it's in the air, Y coordinates jumps in with our X and the plane can go up and up as it pleases (of course, there are limits) until it lands at the next airport.
Please note that x and y coordinates are always there, but in some cases they will stay at 0,0.
Hope this helped!
Source(s) used: N/A
how will you format date so that dates appear in a format similar to 26-January-2022
Its urgent... Please tell fast
Answer:
the format will look like this
DD-MM-YYYY
Explanation:
Which printing option results in a word document with images of the slides and an area to take notes
Answer:
handout is the correct answer
Explanation:
on edge
Answer:
It's C - Handout
on edge 2021
Explanation:
_____ Create
graphics that are math based.
Answer:
Vector Graphics
Explanation:
Vector graphics are computer graphics images that are defined in terms of points on a Cartesian plane, which are connected by lines and curves to form polygons and other shapes. Vector graphics have the unique advantage over raster graphics in that the points, lines, and curves may be scaled up or down to any resolution with no aliasing. The points determine the direction of the vector path; each path may have various properties including values for stroke color, shape, curve, thickness, and fill.
!!!!! 40 pts !!!!!
Select the correct answer from each drop-down menu.
Which words or statements complete the sentences given below?
Interference created by fatigue is called ___
noise. Interference created by strong negative emotions is called ____ noise.
Physiological noise
semantic noise
For what two reasons is it important to add comments to a program?
Which IDEs specifically support the Python programming language? Select all that apply.
PyScripter
Xcode
PyCharm
IDLE
Answer:
PyCharm (Jetbrains)
PyScripter
IDLE
Xcode too!
Explanation:
You have to do some setup to use Python 3.8 with Xcode
What pc games do you all play?
Answer:
none
Explanation:
Answer:
Among us
Explanation:
Which of the following is a correctly named cell?
B8
BB-8
8-B
8B
Answer:
8-B???
Explanation:
The Cell "B8" is the correct mode of depicting the spreadsheet cell.
Let understand that Spreadsheet like Ms Excel, G.oogle Spreadsheet can be be user friendly not operated with the use of Cells Rows and Columns.
The Cell Row refers to the straight boxes from the Left to Right while the Cell Column refers to straight boxes from Up to down on the InterfaceEach Row and Column have a name & number attached to it. For instance, each Row have its number and each Column have its Alphabet.In conclusion, the correct named cell out of the options is Option A which is B8 (Row B & Column 8).
Read more on this here
brainly.com/question/12961162
Which field can be used to track the progress on tasks that a user has created? A. A. Subject
B. Start Date
C. Due Date
D. % Complete
Computer has brought radical change in every field
Answer:
Yes it has brought change in every field
Explanation:
Ask the user to enter a sentence. If the sentence has any mention of dog, tell the user (once) Dogs are cute. If the sentence has any mention of taco, tell the user (once) Tacos are tasty. Change each mention of dog to puppy. Change each mention of taco to burrito. Print the new sentence. Capitalization matters! For example, if theres a mention of Dog (note where the capital letter is), it should be changed to Puppy (note where the capital letter is). You will only need to look for mentions of dog, Dog, taco, and Taco. The plural forms are allowed but the final output for dog / Dog will not be grammatically correct, and this is ok. See sample output.
Answer:
Theses puppies are so cute!
Theses burritos are so yummy!
Would you like a taste of this delicious taco dog?
Explanation:
there you go plz may i have a brainilist??
when receiving your bank account, you should immediately do what
Answer:
give ur account details to everyone in the world
Explanation:
Consider the graph of the function f(x) = 2(x + 3)2 + 2. Over which interval is the graph decreasing? (–∞, –3) (–∞, 2) (–3, ∞) (2, ∞)
Answer:
The interval over which the graph is decreasing is;
(-∞, -3)
Explanation:
The given function is f(x) = 2·(x + 3)² + 2
By expanding the function, we have;
2·x² + 12·x + 20
From the characteristics of a quadratic equation, we have;
The shape of a quadratic equation = A parabola
The coefficient of x² = +2 (positive), therefore the parabola opens up
The parabola has a minimum point
Points to the left of the minimum point are decreasing
The minimum point is obtained as the x-coordinate value when f'(x) = 0
∴ f'(x) = d(2·x² + 12·x + 20)/dx = 4·x + 12
At the minimum point, f'(x) = 4·x + 12 = 0
∴ x = -12/4 = -3
Therefore;
The graph is decreasing over the interval from -infinity (-∞) to -3 which is (-∞, -3)
Please find attached the graph of the function created with Microsoft Excel
The graph is decreasing over the interval (-∞, -3).
Answer:
A. (–∞, –3)
Explanation:
Edge 2021 ( if feel still think it's wrong, check the picture ⬇️ )
Explain why E-mail A is inappropriate for the workplace and revise it to be appropriate.
Email A Is Not Appropriate Because The Email Dosent Sound Professional At All Or Respectful At All
Explanation:
This is the revised Email Appropriate For Workplace
Is it possible that I will be receiving the training manual this morning because I will be needing it for my next shift.
inappropriate--workplace email uses include messages linked to social networking sites or emails involving an employee's sideline business.
Hope this Helps you!!
Please help me with this lab I will give brainliest . It's about binary search tree. The instructions are in the files please help me.
Explain the Decision making statement
Answer:
Decision making structures require that the programmer specify one or more conditions to be evaluated or tested by the program, along with a statement or statements to be executed if the condition is determined to be true, and optionally, other statements to be executed if the condition is determined to be false.
I need this nowww!!!!
Answer:
b,c
Explanation:
What is the most common option for fighting radiation?
A video project needs to be encrypted as it is going from a source to a destination. What can be added to the video
Answer:
A video encoder
Explanation:
an encoder is used to make a video encrypted so nobody can take your copy it. For instance You Tube uses an encoder