In 1987, Congress passed the Computer Security Act (CSA). This was the first law to address federal computer security. Under the CSA, every federal agency had to inventory its IT systems. Agencies also had to create security plans for those systems and review their plans every year.
A. True
B. False

Answers

Answer 1

Answer:

A.) True is the answer hope it helps


Related Questions

An introduction to object-oriented programming.
Write a GUI program named EggsInteractiveGUI that allows a user to input the number of eggs produced in a month by each of five chickens. Sum the eggs, then display the total in dozens and eggs. For example, a total of 127 eggs is 10 dozen and 7 eggs.

Answers

Answer:

The csharp program is given below.

using System;

using System.Collections.Generic;

using System.ComponentModel;

using System.Data;

using System.Drawing;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

using System.Windows.Forms;

namespace WindowsFormsApplication1

{

   public partial class Form1 : Form

   {

       public Form1()

       {

           InitializeComponent();

      }

       private void button6_Click(object sender, EventArgs e)

       {

           int total = (Convert.ToInt32(textBox1.Text) +  Convert.ToInt32(textBox2.Text) + Convert.ToInt32(textBox3.Text) + Convert.ToInt32(textBox4.Text) + Convert.ToInt32(textBox5.Text));

           int dozen = total / 12;

           int eggs = total % 12;

           textBox6.Text = dozen.ToString();

           textBox7.Text = eggs.ToString();

       }

       private void button7_Click(object sender, EventArgs e)

       {

           textBox1.Text = "";

           textBox2.Text = "";

           textBox3.Text = "";

           textBox4.Text = "";

           textBox5.Text = "";

           textBox6.Text = "";

           textBox7.Text = "";

       }

        private void button8_Click(object sender, EventArgs e)

       {

           Close();

       }

    }

}

Explanation:

1. The integer variables are declared for total eggs, number of dozens and number of eggs.

2. The input of each text box is converted into integer by using the Convert.ToInt32() method on the value of that particular text box.

3. All the inputs are added and the sum is assigned to variable, total.

4. The number of dozens are obtained by dividing total by 12 and assigning the value to the variable, dozen.

5. The number of extra eggs are obtained by taking the modulus of total and 12 and the value is assigned to the variable, eggs.

6. The integer values in the variables, dozen and eggs, are converted into string using the ToString() function with that particular value.

dozen.ToString();

eggs.ToString();

7. The text boxes are assigned the respective values of dozens and number of eggs.

textBox6.Text = dozen.ToString();

textBox7.Text = eggs.ToString();

8. Two additional buttons, clear and exit, are also added.

9. The clear button erases the contents of all the text boxes. The Text property of each textbox is set to “” thereby clearing all the text fields.

10. The exit button closes the application using Close() function.

11. The program is made in visual studio and the output is attached.

Consider a load-balancing algorithm that ensures that each queue has approximately the same number of threads, independent of priority. How effectively would a priority-based scheduling algorithm handle this situation if one run queue had all high-priority threads and a second queue had all low-priority threads

Answers

Answer and Explanation:

Consider giving greater priority to both the queue contains the national priority comment section as well as, therefore, first method the thread throughout this queue.If the item from either the major priority queue becomes decoupled, if the balancing between some of the number of comments in some of these two queues becomes disrupted, instead decouple one thread from either the queue comprising the low-value thread as well as position that one in the queue with the highest - priority loop to match the number of connections in such 2 queues.Whenever a new thread arrives with some kind of proper description, a friendly interface could've been introduced to just the queue contains fewer threads to achieve stability.

Therefore, the load-balancing requirements for keeping about the same number of threads would be retained and the meaningful matter of top priority thread would also be retained.

Based on the information given, it is important to give higher priority to the queue that contains the high priority thread.

Also, once an element from the high priority queue is dequeued, then dequeue one thread from the queue containing low priority thread and this will be enqueued into the queue having high priority thread in order to balance the number of threads.

Since the priority queue automatically adjusts the thread, hence the removal of the thread from one priority queue to another is not a problem.

Learn more about threads on:

https://brainly.com/question/8798580

windows can create a mirror set with two drives for data redundancy which is also known as​

Answers

Answer:

Raid

Explanation:

(Find the number of days in a month) Write a program that prompts the user to enter the month and year and displays the number of days in the month. For example, If the user entered month 2 and year 2012, the program should display that February 2012 has 29 days. If the user entered month 3 and year 2015, the program should display that March 2015 has 31 days.

Answers

it would be a table program. you can add a table and put your data into the table

Translate each statement into a logical expression. Then negate the expression by adding a negation operation to the beginning of the expression. Apply De Morgan's law until each negation operation applies directly to a predicate and then translate the logical expression back into English.
Sample question: Some patient was given the placebo and the medication. ∃x (P(x) ∧ D(x)) Negation: ¬∃x (P(x) ∧ D(x)) Applying De Morgan's law: ∀x (¬P(x) ∨ ¬D(x)) English: Every patient was either not given the placebo or not given the medication (or both).(a) Every patient was given the medication.(b) Every patient was given the medication or the placebo or both.(c) There is a patient who took the medication and had migraines.(d) Every patient who took the placebo had migraines. (Hint: you will need to apply the conditional identity, p → q ≡ ¬p ∨ q.)

Answers

Answer:

Explanation:

To begin, i will like to break this down to its simplest form to make this as simple as possible.

Let us begin !

Here statement can be translated as: ∃x (P(x) ∧ M(x))

we require the Negation: ¬∃x (P(x) ∧ M(x))

De morgan's law can be stated as:

1) ¬(a ∧ b) = (¬a ∨ ¬b)

2) ¬(a v b) = (¬a ∧ ¬b)

Also, quantifiers are swapped.

Applying De Morgan's law, we have: ∀x (¬P(x) ∨ ¬M(x)) (∃ i swapped with ∀ and intersecion is replaced with union.)

This is the translation of above

English: Every patient was either not given the placebo or did not have migrane(or both).

cheers i hope this helped !!

Suppose that the following two classes have been declared public class Car f public void m1) System.out.println("car 1"; public void m2) System.out.println("car 2"); public String toString) f return "vroom"; public class Truck extends Car public void m1) t System.out.println("truck 1"); public void m2) t super.m1); public String toString) t return super.toString) super.toString ); Write a class MonsterTruck whose methods have the behavior below. Don't just print/return the output; whenever possible, use inheritance to reuse behavior from the superclass Methog Output/Return monster 1 truck1 car 1 m2 toString "monster vroomvroom'" Type your solution here:

Answers

Answer: provided in the explanation section

Explanation:

// code to copy

Car.java

public class Car {

 

  public void m1()

  {

  System.out.println("car 1");

}

 

  public void m2() {

      System.out.println("car 2");

}

 

  public String toString()

  {

  return "vroom";

}

 

}

Truck.java

public class Truck extends Car{

 

  public void m1()

  {

  System.out.println("truck 1");

  }

 

  public void m2()

  {

  super.m1();

  }

 

  public String toString()

  {

      return super.toString() + super.toString();

  }

}

MonsterTruck​​​​​​​.java

public class MonsterTruck extends Truck

{

  public void m1() {

System.out.println("monster 1");

}

 

public void m2() {

super.m1();

super.m2();

}

 

public String toString() {

return "monster " + super.toString();

}

public static void main(String[] args) {

  MonsterTruck mt=new MonsterTruck();

  mt.m1();

  mt.m2();

  System.out.println(mt);

}

}

cheers i hope this helped !!!

Chris wants to view a travel blog her friend just created. Which tool will she use?

HTML
Web browser
Text editor
Application software

Answers

Answer:

i think html

Explanation:

Answer:

Web browser

Explanation:

In this assignment you'll write a program that encrypts the alphabetic letters in a file using the Hill cipher where the Hill matrix can be any size from 2 x 2 up to 9 x 9. The program can be written using one of the following: C, C++, or Java. Your program will take two command line parameters containing the names of the file storing the encryption key and the file to be encrypted. The program must generate output to the console (terminal) screen as specified below.Command Line Parameters1. Your program compile and run from the command line.2. The program executable must be named "hillcipher" (all lowercase, no spaces or file extension).3. Input the required file names as command line parameters. Your program may NOT prompt the user to enter the file names. The first parameter must be the name of the encryption key file, as described below. The second parameter must be the name of the file to be encrypted, as also described below. The sample run command near the end of this document contains an example of how the parameters will be entered.4. Your program should open the two files, echo the input to the screen, make the necessary calculations, and then output the ciphertext to the console (terminal) screen in the format described below.Note: If the plaintext file to be encrypted doesn't have the proper number of alphabetic characters, pad the last block as necessary with the letter 'X'. It is necessary for us to do this so we can know what outputs to expect for our test inputs.

Answers

Answer: Provided in the explanation section

Explanation:

C++ Code

#include<iostream>

#include<fstream>

#include<string>

using namespace std;

// read plain text from file

void readPlaneText(char *file,char *txt,int &size){

  ifstream inp;

 

  inp.open(file);

 

  // index initialize to 0 for first character

 

  int index=0;

  char ch;

 

  if(!inp.fail()){

      // read each character from file  

      while(!inp.eof()){

          inp.get(ch);

          txt[index++]=ch;

      }

  }

 

  // size of message

  size=index-1;

}

// read key

int **readKey(char *file,int **key,int &size){

  ifstream ink;

 

  //

  ink.open(file);

      if(!ink.fail()){

         

          // read first line as size

      ink>>size;

     

      // create 2 d arry

      key=new int*[size];

     

      for(int i=0;i<size;i++){

          key[i]=new int[size];

      }

     

      // read data in 2d matrix

      for(int i=0;i<size;i++){

          for(int j=0;j<size;j++){

              ink>>key[i][j];

          }  

      }

  }

  return key;

}

// print message

void printText(string txt,char *msg,int size){

  cout<<txt<<":\n\n";

 

  for(int i=0;i<size;i++){

      cout<<msg[i];

  }

}

// print key

void printKey(int **key,int size){

  cout<<"\n\nKey matrix:\n\n";

  for(int i=0;i<size;i++){

      for(int j=0;j<size;j++){

          cout<<key[i][j]<<" ";

      }  

      cout<<endl;

  }

}

void encrypt(char *txt,int size,int **key,int kSize,char *ctxt){

  int *data=new int[kSize];

 

  for(int i=0;i<size;i=i+kSize){  

 

  // read key size concecutive data

      for(int a=0;a<kSize;a++){

          data[a]=txt[i+a]-'a';

      }

     

      // cipher operation

      for(int a=0;a<kSize;a++){

          int total=0;

          for(int b=0;b<kSize;b++){

              total+=key[a][b]*data[b];

          }  

          total=total%26;

          ctxt[i+a]=(char)('a'+total);

      }      

  }

}

int main(int argc,char **argv){

  char text[10000];

  char ctext[10000];

  int **key;

  int keySize;

  int size;

  // input

  key=readKey(argv[1],key,keySize);

  readPlaneText(argv[2],text,size);

  encrypt(text,size,key,keySize,ctext);

 

  // output

  printKey(key,keySize);

  cout<<endl<<endl;

  printText("Plaintext",text,size);

  cout<<endl<<endl;

  printText("Ciphertext",ctext,size);

 

  return 0;

}

cheers i hope this helped !!!

Write a Python program that can compare the unit (perlb) cost of sugar sold in packages with different weights and prices. The program prompts the user to enter the weight and price of package 1, then does the same for package 2, and displays the results to indicate sugar in which package has a better price. It is assumed that the weight of all packages is measured in lb. The program should check to be sure that both the inputs of weight and price are both positive values.

Answers

Answer:

This program is written using python

It uses less comments (See explanation section for more explanation)

Also, see attachments for proper view of the source code

Program starts here

#Prompt user for price of package 1

price1 = int(input("Enter Price 1: "))

while(price1 <= 0):

     price1 = int(input("Enter Price 1: "))

#Prompt user for weight of package 1

weight1 = int(input("Enter Weight 1: "))

while(weight1 <= 0):

     weight1 = int(input("Enter Weight 1: "))

#Calculate Unit of Package 1

unit1 = float(price1/weight1)

print("Unit cost of Package 1: "+str(unit1))

#Prompt user for price of package 2

price2 = int(input("Enter Price 2: "))

while(price2 <= 0):

     price2 = int(input("Enter Price 2: "))

#Prompt user for weight of package 2

weight2 = int(input("Enter Weight 2: "))

while(weight2 <= 0):

     weight2 = int(input("Enter Weight 2: "))

#Calculate Unit of Package 2

unit2 = float(price2/weight2)

print("Unit cost of Package 2: "+str(unit2))

#Compare units

if unit1 > unit2:

     print("Package 1 has a better price")

elif unit1 == unit2:

     print("Both Packages have the same price")

else:

     print("Package 2 has a better price")

Explanation:

price1 = int(input("Enter Price 1: ")) -> This line prompts the user for price of package 1

The following while statement is executed until user inputs a value greater than 1 for price

while(price1 <= 0):

     price1 = int(input("Enter Price 1: "))

weight1 = int(input("Enter Weight 1: ")) -> This line prompts the user for weight of package 1

The following while statement is executed until user inputs a value greater than 1 for weight

while(weight1 <= 0):

     weight1 = int(input("Enter Weight 1: "))

unit1 = float(price1/weight1) -> This line calculates the unit cost (per weight) of package 1

print("Unit cost of Package 1: "+str(unit1)) -> The unit cost of package 1 is printed using this print statement

price2 = int(input("Enter Price 2: ")) -> This line prompts the user for price of package 2

The following while statement is executed until user inputs a value greater than 1 for price

while(price2 <= 0):

     price2 = int(input("Enter Price 2: "))

weight2 = int(input("Enter Weight 2: ")) -> This line prompts the user for weight of package 2

The following while statement is executed until user inputs a value greater than 1 for weight

while(weight2 <= 0):

     weight2 = int(input("Enter Weight 2: "))

unit2 = float(price2/weight) -> This line calculates the unit cost (per weight) of package 2

print("Unit cost of Package 2: "+str(unit2)) -> The unit cost of package 2 is printed using this print statement

The following if statements compares and prints which package has a better unit cost

If unit cost of package 1 is greater than that of package 2, then package 1 has a better priceIf unit cost of both packages are equal then they both have the same priceIf unit cost of package 2 is greater than that of package 1, then package 2 has a better price

if unit1 > unit2:

     print("Package 1 has a better price")

elif unit1 == unit2:

     print("Both Packages have the same price")

else:

     print("Package 2 has a better price")

5. Write a C++ program that can display the output as shown below. Your
program will calculate the price after discount. User will input the
price and the discount is 20%


Answers

Answer:

#include<iostream>

using namespace std;

int main()

{

float price;

float discount;

cout<<"enter price : ";

cin>>price;

discount=price - (price * 20 / 100);

cout<<"discount rate is :"<<discount;

}

Explanation:

Other Questions
A) work out (8 x 10^-3) x (2 x 10^-4). Give your answer in standard form.B) work out (6 x 10^2) (3 x 10^-5). Give your answer in standard form. Caring, respect, appreciation, and _____ are characteristics that healthy families share. cohabitation coping competition communication Select all the equations where a=8 is a solution.Choose 3 answers:Aa+11=15B1=8aC15+a=23D42=7aEa-5=3 Who were important cultural figures of the Age of Romanticism? Select all that apply. Beethoven Chopin Irving Bismarck Poe 1. Is (6,7) a solution to the inequality y> 2x - 5?2. Mathematically prove that it is or isn't below. Present Value ComputationsUsing the present value tables, solve the following.(Click here to access the time value of money tables to use with this problem.)Round your answers to two decimal places.Required:1. What is the present value on January 1, 2016, of $30,000 due on January 1, 2020, and discounted at 10% compounded annually?$2. What is the present value on January 1, 2016, of $40,000 due on January 1, 2020, and discounted at 11% compounded semiannually?$3. What is the present value on January 1, 2016, of $50,000 due on January 1, 2020, and discounted at 16% compounded quarterly?$ What additional piece of information must be known in order to calculate the volume of the cylinder below?A cylinder with radius of 7 inches.the diameter of a basethe height of the cylinderthe area of a basethe radius of a base Which of the following is not an example of a "lag" that diminishes the potential impact of the use of fiscal policy? a. the recessionary lag b. the data lag c. the legislative lag d. the transmission lag A biology teacher takes fish, algae, pond weed, invertebrates, and bottom muck from a local pond and establishes them in an aquarium. When the system is stable, the teacher seals it into a large, airtight glass box and leaves the box in a sunny location. After 3 months, the organisms in the aquarium appear alive and healthy. Which of the following statements about the experiment is NOT correct? For EACH one of the choices indicate if it is a correct or incorrect statement and explain why (the explanation MUST include the information covered in class) A) During the 3 months, the biomass of plant life was greater than the biomass of animal life. B) No energy has entered or left the glass box during the 3 months, C) Some atoms from water molecules have become parts of organic molecules, D) The air in the glass box contains carbon dioxide. E) Some of the energy in the system has moved from one organism to another during the 3 months Which of the following best defines the Southern Code during the slavery era? White Southerners believed women should not do certain chores and gentlemen should not do manual labor. White Southerners thought free African Americans were treated worse than enslaved African Americans. White Southerners considered it their duty to provide food, shelter, and clothing to enslaved people while relieving them of responsibility. White Southerners felt there should be an immediate end to slavery and called for abolitionism. What is gel electrophoresis used for?O A. Cutting DNA into sectionsO B. Separating strands of DNAO C. Performing reverse transcriptionO D. Cloning organisms 9x+18=-20what does X = Which of the following describes how damaged DNA can lead to a mutation?A. The damaged DNA stops all protein synthesis by the cell.B. An error occurs when the damaged DNA is repaired.C. The segment of DNA that is damaged is transcribed into RNA.D. The nucleotide sequence of the damaged DNA is restoredperfectly If you answer ill give you brainliest.What might a postmodernist say about fingerprint techniques? Fingerprinting are unique to one individual. They are as unique as snowflakes. Fingerprinting is a reliable method of identifying someone. We may learn that fingerprints are not unique to individuals after all. The more we match fingerprints to individuals, the better we become at this. Use the drop-down menus to choose the correct pronouns to replace the underlined nouns.Omar and Eric are training for a marathon.Ms. Monroe will meet with the students after school.The bicycle belongs to Trina.Keiko and I are hoping to win first prize at the science fair. What was commutation in the context of the military draft? A. Commutation allowed people to pay $300 to avoid the draft. B. Commutation was a tactic of rioters trying to end the draft. C. Commutation allowed criminals to serve in the army instead of going to prison. D. Commutation allowed people to move to Canada to avoid the draft. Given the regular octagon, what is the length of any side? Identify a 1 in this sequence 13,15,17,19 First, tell whether each decimal is a fraction or a mixed number.Then, write it in simplest form. 0.85 Which graph has a slope of -3?