UrosaTecaPortal
Home
Search
Register
Login
Search
Computers and Technology
Computers And Technology
High School
In Python please. Write a class named RetailItem that holds data about an item in a retail store. The class should store the following data in attributes: item description, units in inventory, and price. Once you have written the class, write a program that creates three Retailitem objects and stores the following data in them: Description Units in Inventory PriceItem #1 Jacket 12 59. 95Item #2 Designer Jeans 40 34. 95Item #3 Shirt 20 24. 95
Computers And Technology
High School
Malware that comes with a downloaded file that a user requests is called a:A) Trojan horse.B) backdoor.C) drive-by download.D) PUP.
Computers And Technology
High School
Bradley has been running a business in his garage for over a period of 10 years. He plans on expanding the business by opening up three new offices in three different cities. Since he has accumulated sufficient profits to move to a larger office space, he plans to upgrade his network connection to one with a dedicated and symmetrical bandwidth. Bradley approaches Mantle Solutions, an ISP. Which of the following options should be offered by the ISP in this scenario?Cable broadbandMPLSSD-WANLeased lines
Computers And Technology
High School
Derive input space partitioning test inputs for the BoundedQueue class with the following signature: public BoundedQueue (int capacity); // The maximum number of elements public void enQueue (Object X); public Object deQueue (); public boolean isEmpty (); public boolean isFull ();Assume the usual semantics for a queue with a fixed, maximal capacity. Try to keep your partitioning simplechoose a small number of partitions and blocks.(a) List all of the input variables, including the state variables.(b) Define characteristics of the input variables. Make sure you cover all input variables.(c) Partition the characteristics into blocks. Designate one block in each partition as the "Base" block.(d) Define values for each block.(e) Define a test set that satisfies Base Choice Coverage (BCC). Write your tests with the values from the previous step. Be sure to include the test oracles.
Computers And Technology
High School
What is Information Security? 2. Explain confidentiality, integrity, and availability 3. What is a threat in information security 4. What are some of the most common information security threats 5. What is a vulnerability? 6. What is risk management?
Computers And Technology
High School
lab 6: firewall configuration set up a stateless firewall on a vdi machine that accomplishes the following objectives: 1. allows any critical traffic needed for your machine to function. the critical traffic includes the tcp traffic to and from the vdi gateways (check the wireshark trace for the ip addresses; they could be through ) and all traffic on the loopback interface. 2. allows web traffic to external servers with class a ip addresses at ports 80 and 443. 3. allows secure shell connections from your machine to any machine at port 22. 4. allows secure shell connections from one of the fox servers (e.g., ) to your machine at port 22. 5. blocks all other tcp traffic. 6. logs all blocked packets before dropping them. use a custom label to easily extract the log information generated by the firewall rules you created. use a vdi machine created for this course to do this exercise. you have sudo privileges on this machine. the firewall rules are specified using the iptables command on linux machines. there are frontend tools available to create and manage iptables. however, for this assignment, use the iptables command. to check the log created by the firewall, use dmesg. for each task, try one allowed scenario and one disallowed scenario. demonstrate the working of the allowed scenario with screenshots. demonstrate the blocking of the disallowed scenario with screenshots and the relevant log messages.
Computers And Technology
High School
Which of the following is not a feature that using view page source allows you to quickly see? O The HTML that marks up the page O Images used and their location in a site folder O Server-side scripts that bring in information from a database, such as search engines, forums, etc. JavaScript within or outside of a
Computers And Technology
High School
You are the manager of Simpsons Hardware Store and have received the following handwritten letter from a man who lives in a small town 165 miles away: Dear Simpsons Hardware: I own a Simpson Model S4320 grass trimmer and had it for over 15 years. The gas cap begun to leek last week and I need another gas cap for it. I know your products have a lifetime warranty so please send me a new cap as soon as possible. Thank you. Frank Dunford Box 26 Emmetsburg, Iowa 50536 Mr. Dunford is not in your database, and you are not sure he has ever been in your store. You must now write a reply letter to Mr. Dunford and tell him that only Simpson "tools" have a lifetime-replacement policyother products do not. His string trimmer had a one-year warranty. Because his trimmer is so old, you do not carry parts for it anymore; however, you can order the part from another supplier at a cost of $17.65, plus $5.00 shipping and handling. If he will send you a $22.65 check, you will order the part and have it delivered to his home. Delivery time will be about three to four weeks. If Mr. Dunford decides to buy a new trimmer, he can look at new models on your website (gosimpsons.com) and order one online but you do not know if he has a computer. Apply the principles you learned in chapters 2 and 3 of Writing and Speaking for Business.
Computers And Technology
High School
when an external device is ready to accept more data from the processor, the i/o module for that external device sends an __________ signal to the processor.
Computers And Technology
High School
which of the following is not hardware? responses x-box game controller x-box game controller, virus scanner virus scanner wireless network router wireless network router flat-panel monitor
Computers And Technology
High School
A typical report in landscape orientation is 11 inches wide and 8.5 inches tall.a. Trueb. False
Computers And Technology
High School
With ____ configuration mode, you can configure the virtual terminals, console, and aux lines that let you access the router.
Computers And Technology
College
Which of the following best describes the difference between gross profit and net profit?
Computers And Technology
High School
Which describes the first thing you should do when beginning a new object-oriented programming activity?
Computers And Technology
High School
Discuss some of the documentation pitfalls that you have read about or seen in a video regarding grant writing, maintenance, and documentation. Then suggest safeguards against some of the issues you identified. Offer suggestions to maintain good documentation.
Computers And Technology
High School
Which of the following are benefits of using SQL? Select all that apply.-SQL offers powerful tools for cleaning data.-SQL can be used to program microprocessors on database servers.-SQL can be adapted and used with multiple database programs.-SQL can handle huge amounts of data.
Computers And Technology
High School
Facility Layout: Create a fast food or manufacturing plant layout, identify, and draw the particular facility. Describe the nature of your production and the importance of the layout setting. Consider and describe the activities that take place in that facility. Why are things set up as they are? Be creative.
Computers And Technology
High School
Complete the method definition to return the hours given minutes. Output for sample program: 3.5 318134.2086236.qx3zqy7 2 public class HourToMinConv { 3 public static double getMinutesAsHours(double origMinutes) { 4 5 System.out.print(origMinutes / 60);/* Your solution goes here */ 6 } 7 8 public static void main (String [] args) { 9 Scanner scnr = new Scanner(System.in); 10 double minutes; 11 12 minutes = scnr.nextDouble(); 13 14 // Will be run with 210.0, 3600.0, and 0.0. 15 System.out.println(getMinutesAsHours(minutes)); 16 } 17 } Run Failed to compile HourToMinConv.java:6: error: missing return statement } 1 error Note: Although the reported line number is in the uneditable part of the code, the error actually exists in your code. Tools often don't recognize the problem until reaching a later line.
Computers And Technology
High School
Charlie Gordon is the new technician at Beekman University computer lab. He is unable to get the Wifi client to connect to the AP at all. He has looked into the matter and has found that he can't find an available AP even after using the correct security key. After further investigation, he has realized that if the access point does not broadcast its SSID, he would have to enter the SSID during client configuration. Analyze which of the following issues Charlie might be encountering in this scenario.a. encryption protocol mismatchb. incorrect passphrasec. wrong SSIDd. Long AP association time
Computers And Technology
High School
in experimental design, subjects are assigned to one of two or more condition groups based on multiple criteria as selected by the investigator (e.g., subject demographics).True or false
Computers And Technology
High School
In a typical transport network optimization problem, transportroutes are:Nodes.Constraints.Attributes. Arcs.
Computers And Technology
High School
The cast function can be used to convert the date datatype to the datetime datatype. a)true b)false
Computers And Technology
High School
Match the correct descriptions with each artwork. (Note: only select scenes of each entire artwork are shown.)fire: painted scrollisometric...horizontal formatbirds eye...read from right->left23 feetshows kidnappingWhite paper:shows the crowning...275 feet loongread left->righthorizontal format
Computers And Technology
High School
Create a class called ParsingUtils. Add a static method: public static void changeLetter(StringBuilder sb, char letter) Convert all occurrences of the letter variable in the StringBuilder to upper case. Overload the method described in the previous question. The signature will be public static void changeLetter(StringBuilder sb, String letters) Make it so any letters from the second parameter found in the StringBuilder are converted to uppercase.
« Previous
Page 29
Next »