What is design reference threat

Answers

Answer 1
it’s a threat ‘make it spicey’ so with design

Related Questions

given a number n for each integer i in the range from 1 to n inclusive print one value per line as follows fizzbuzz if __name__

Answers

Answer:

The program in Python is as follows:

def fizzBuzz(n):

    for i in range(1,n+1):

         print(i)

   

if __name__ == '__main__':

    n = int(input().strip())

    fizzBuzz(n)

Explanation:

This declares the fizzBuzz function

def fizzBuzz(n):

This iterates from 1 to n

    for i in range(1,n+1):

This prints every number in that range; one per line

         print(i)

   

The main begins here

if __name__ == '__main__':

This prompts user for input

    n = int(input().strip())

This calls the fizzBuzz function

    fizzBuzz(n)

How many minutes are there from 8:00 am to 1:00 pm?

Answers

Well it’s 5 hours so you take 5 times 60m for each hour and you get 300m

Answer:300 minutes

Explanation:

from 8 to 1 is 5 hours so you do 5*60= 300

The plugin that changes Jenkins to use green balls instead of blue for successful builds is ________.

Answers

Answer:

The answer is below

Explanation:

Jenkins is a server used by developers to to reliably build, test, and deploy their software. Jenkins has different plugins that can be used for this testing.

Jenkin green ball plugin changes jenkins to use green balls instead of blue for successful builds. This green ball plugin is used as an alternative for blue ball builds and it does not affect the output of the XML and JSON APIs.

What is the difference between a programming language and natural (every-day) language?

Answers

Natural languages are used for communication between people

According to the video, what are some concerns of Webmasters? Check all that apply.
how fast the website can be accessed
how many writers provide content for a website
how to create images for a website
the number of similar websites that exist
the time it takes for elements on a website to download
website security and privacy

Answers

Answer:

A.how fast the website can be accessed

E.the time it takes for elements on a website to download

F.website security and privacy

Explanation:

Answer:

1,5,6

Explanation:

hope this helps gg

Write a function called quadruple that quadruples a number and returns the result. Then make several calls to the quadruple function to test it out.

For example, if you made a call like

x = quadruple(3)
then x should hold the value 12.

Print the value of x to verify your function works correctly.

(CODEHS, PYTHON)

Answers

def quadruple(n):

   return n*4

print(quadruple(3))

print(quadruple(1))

print(quadruple(2))

I wrote my code in python 3.8. I hope this helps.

/kwɒdˈruː.pəl/ to increase by four times, or to multiply anything by four: In the past ten years, the college's enrolment has increased by a factor of four.

What is the role of quadruple that quadruples a number?

Finding the array's four maximum and four minimum components is another method for locating the quadruple with the highest product. And then supply the maximum of these three product values, which will result in a quadrupled maximum product.

When ordering a quadruple-shot latte, which contains four shots of espresso, you can also use the word quadruple to signify “four times as many.” The suffix quadric-, which means “four,” is the source of the Latin root quadruple, which means “create fourfold.”

Three address codes are also referred to as quadruples. Using pointers to entries in a symbol table as the operands and an enumerated type to represent the operations, quadruples can be accomplished.

Therefore, One operation and up to three operands are divided into four fields in a quadruple.

Learn more about quadruples here:

https://brainly.com/question/7966538

#SPJ2

NEED HELP 100 POINTS FOR ANSWER AND BRAINIEST!!! Which comparison operator is used to signify that a value is not equal to another value?
<>
<<
>=
=

Answers

Answer:

We use SQL Not Equal comparison operator (<>) to compare two expressions. For example, 10<>11 comparison operation uses SQL Not Equal operator (<>) between two expressions 10 and 11

Explanation:

<> operator is used to signify that a value is not equal to another value , Option A is the correct answer.

What are Comparison Operators ?

An operator used to compare or relate the value of two number or string is called a Comparison operator.

The value of 0 or 1 is returned on using Comparison Operators.

<> , Not equal to operator signifies that the value are either greater than or less than the other value but not equal in any case.

Therefore <> operator is used to signify that a value is not equal to another value.

To know more about Comparison Operators

https://brainly.com/question/15260168

#SPJ2

Which is an example of a technology that has changed the safety of humans?
A) a bicycle

B) a window

C) a rope

D) a baseball bat

Answers

Answer:

B

Explanation:

because they have added more protection from breaking window to keep people safe such as if there were a lot of layers of city

The index value of the first element in a JavaScript array is a. undefined b. one c. zero d. null

Answers

Answer:

The index value of the first element in a JavaScript array is zero

Explanation:

Required

Index of first JavaScript array element

Just like numerous programming languages, when an array is declared in JavaScript, the index of the array starts at 0.

Meaning that the first element of the JavaScript array is indexed 0

Say for instance, the array has 5 elements:

This is declared as:

var arrayname = Array(5);

The first of the 5 elements of the array starts at 0 while the last of the 5 elements would be at index 4.

During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports?

Answers

Answer:

Following are the solution to the given question:

Explanation:

It sends commands to its Nmap executable platForm, which is used to specified and retrieves the production. The  ZenMap utilizes templates, which are primarily Nmap.

The parameter templates to decide how scans become formed Several ports, like ports, are available: 11, 21, 22, 25, 53, 445, and 3306, all of which run TCP: Linux services, SMTP Postfix, Apache Tomcat/Coyote JSP.

A __________ is the blueprint for __________ having similar attributes and behaviors. signature, objects class, parameters header, objects signature, parameters class, objects

Answers

Answer: E. class, objects

Explanation:

A class is the blueprint for objects having similar attributes.

As much as classifying something means to define it based on the characteristics that is has that are similar to other things in that class, so also is a class here.

A class is the blueprint or rather template for making objects that have similar attributes which means that the class therefore gives the object its various attributes and its behavior.

Is a free verse a poetry that has no images

Answers

No it just means that it does not have any specific rhymes or formats
No they just typically have no set meter

Brian has created the following selection sort class in Java. In which line is the index of the smallest value returned? In which line is the input array given as an argument?

public class SelectionSort{
private static int positionMin (int] vals, int startPosition) {
int minPosition startPosition;
for (int i startPosition; i
if (vals[i] vals[min Position]) {

minPosition = i;
return min

Position; private static void swap(int] vals, int firstPosition, int secondPosition) {

int temp; temp vals[firstPosition];
vals[firstPosition] vals[second Position];
vals[secondPosition] temp return public static void selSort(int| vals) {
int minPos for (int startPos 0; startPos< vals.length; startPos++){

minPos positionMin(vals,startPos); swap(vals,startPos, min Pos) ;

for (int i 0; i< vals.length; i++) { if(i
}else Jelse { System.out.println(vals[i]); } }; }

return; } }

Answers

Answer:

Explanation:

Since there are no line numbers in this question I will start counting from public class SelectionSort{ as line 1 and so on, as well as provide the code on that line.

The index of the smallest value is returned on line 8 where it says return min which shouldn't have any spaces and should be return minPosition;

The input array is given as an argument at the beginning of the function on line 2 where it says private static int positionMin (int] vals, int startPosition) {, as the variable vals.

This input array is also used as an argument on line 10 where it says Position; private static void swap(int] vals, int firstPosition, int secondPosition) and line 15 where it says vals[secondPosition] temp return public static void selSort(int| vals) {

If you are the Head of H.R Department in Ali Manufacture Company and you have hire the totally fresh candidates in your company so what kind of training you will suggested; on the job training or off the job training and also justify your answer with four reasons.

Answers

Answer:

on the job training

Explanation:

I would personally suggest on the job training. This is because it provides the new candidates specific experience on how the job will be on a day-to-day basis. This can drastically increase the performance of hired candidates since they will know exactly what and how to perform for that exact company. Also, it will help the candidates get acquainted with the other current employees and even get rid of candidates who would have eventually quit by showing them exactly what the job will be like. Some candidates will realize that the job is not right for them and simply give up and quit.

Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example output for userNum

Answers

userNum = int(input("Enter a number: "))

while userNum > 1:

   print(userNum, end=" ")

   userNum /= 2

I wrote my code in python 3.8. I think this is what you want but I'm not too sure. I'll change the code if you need me to.

Which of the following is not a type of digital signature?

a. Approval Signatures
b. Non-Certified Signatures
c. Visible Digital Signature
d. Invisible Digital Signature

Answers

Answer:

d

Explanation:

Term that doesn't belong to a type of digital signature is Invisible Digital Signature.

What is digital signature?

A digital signature  can be regarded as the  mathematical technique used to validate the authenticity and integrity of a message.

Examples of type of digital signature are:

Approval SignaturesNon-Certified SignaturesVisible Digital Signature

Therefore, option D is correct.

Learn more about digital signature at;

https://brainly.com/question/24448358

Write a program that asks the user how many names they have. (If they have a first name, two middle names, and a last name, for example, they would type 4.) Then, using a for loop, ask the user for each of their names. Finally, print their full name.

Answers

Answer:

The solution is implemented in python:

numnames = int(input("Number of Names: "))

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

names = []

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

Explanation:

This prompts user for number of names

numnames = int(input("Number of Names: "))

This lists the name titles in a list

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

This initializes an empty list

names = []

The following for loop get names from the user

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

The following instructions print the user fullnames

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

An example program in Python that asks the user for the number of names they have and then prompts them to enter each name.

It will then print their full name based on the names provided:

python

Copy code

num_names = int(input("How many names do you have? "))

names = []

for i in range(num_names):

   name = input("Enter name {}: ".format(i + 1))

   names.append(name)

full_name = " ".join(names)

print("Your full name is:", full_name)

In this program, we first ask the user to enter the number of names they have. The input is converted to an integer using int() since input() returns a string.

Then, we initialize an empty list names to store the names provided by the user.

Next, we use a for loop that iterates num_names times to ask the user for each name. The loop variable i starts from 0, so we add 1 to it when displaying the prompt using i + 1.

Inside the loop, we prompt the user to enter the name and append it to the names list. After the loop completes, we join all the names in the names list using the join() method with a space as the separator. This creates a single string representing the full name.

Learn more about python on:

https://brainly.com/question/30391554

#SPJ6

a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​

Answers

Answer:

would it be term and tequnique?

Explanation:

oooooooo

Consider a file/directory with the following info:

-rwxr-x--x 1 milk milk 1858 May 1 16:29 abc

Which of the following statement(s) is/are true for the file/directory? Pick ONE OR MORE options

a. abc is a directory.
b. The group the owner belongs to can read and execute abc.
c. All other users can execute abc.
d. The owner can not execute abc.

Answers

Answer:

The statement that is true for the file/directory is:

a. abc is a directory.

Explanation:

A file directory is a computer filing system with cataloging and referencing structure to computer files and other directories.  Also known as folders or drawers, directories are like the workbench or traditional office filing cabinet.  Information is stored in files, which are then stored in directories (folders). Directories can also store other directories to form a directory tree.

"abc" is a directory. A further explanation is below.

A file directory would be a type of computer organizing system that provides cataloging and reference architecture for computer records as well as other directories.Files have been used to hold knowledge, which would be subsequently organized into directories. Additional directories could be stored in directories just to construct its hierarchy.

Thus the above approach is right.

Learn more about the directory here:

https://brainly.com/question/7007432

How many total beats are these tied notes worth, assuming a quarter note equals 1 beat?
A. One
B. Five
C. Three

Answers

Answer:

one i think

Explanation:

PLEASE HELP
A program is designed to determine the minimum value in a list of positive numbers
called numlist. The following program was written
var minimum = MISSING CODE
for(var i = lo; i < numlist.length; i++){
if (numList[1] < minimum)
minimum = numList[1];
console.log("The minimum is" - minimum);
Which of the following can be used to replace ISSING CODE> so that the program works as intended for every possible list of positive numbers?

Answers

The missing code segment is meant to initialize the variable minimum to the first list element.

The missing code is (d) numList[0]

From the question, we understand that the first line of the program should determine the smallest number in the list numList

To do this, we start by initializing the variable minimum to the first element of numList

This is done using the following code segment:

var minimum = numList[0]

Hence, the missing code segment is (d) numList[0]

Read more about similar programs at:

https://brainly.com/question/19484224

list the difference between sdram and dram​

Answers

Answer:

i need this for a challenge

Explanation:

he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do

Answers

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software. It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.

All of the following describes technology EXCEPT
(a) application of knowledge (b) development of skills
(c) solving of problems (d) prohibiting human capabilities

Answers

Answer: (d) prohibiting human capabilities

Explanation:

Technology can be described as application of knowledge, development of skills or solving of problems.

Technology helps in solving numerous challenges. Technology involves skills and application of knowledge. Every technology used today solves a problem in one way or the other.

Technology prohibiting human capabilities doesn't describe technology. It doesn't limit the abilities of humans but rather improves it.

Name one characteristic of natural languages that prevents them from being used as programming languages.

Answers

Answer:

Ambiguity.

Explanation:

Natural language of human beings are believed to be ambiguous, as it often required settings punctuation, and intonation to determine certain meanings correctly.

Also is the fact that natural language sometimes has more than one meaning for the same words.

Hence, one characteristic of natural languages that prevent them from being used as programming languages is AMBIGUITY.

which of the following is not a type of operating system software?
a) windows b) linux
c)Macintosh d) Communications and organization​

Answers

Answer:

the answer is communication abd organization

The option that is not a type of operating system software is called; D: Communications and organization​

What are the types of Computer operating system?

An operating system is defined as a type of software that manages the hardware and software of a computer as well as provision of common services.

The most popular Operating Systems for computers are Windows, Linux,  Macintosh. Whereas, the popular types of operating systems for phones are iOS, Android, and Windows.

Read more about Computer Operating System at; https://brainly.com/question/1763761

#SPJ9

She can't part.....her jewels.​

Answers

Answer:

She can't part with her jewels.

Explanation:

:))))

The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.

a
Conclusion
b
Introduction
c
Counterclaim
d
Topic Sentence
Question 9 (5 points)

Answers

Answer:

D. Topic Sentence

Explanation:

How many passes will it take to find the four in the list 4,5,6,7,8,9,10

Answers

Answer:

1

Explanation:

What is a variable?

A.a box (memory location) where you store values

B. a type of memory

C. a value that remains the same throughout a program

D. a value that loads when the program runs

Answers

Answer. D: a value that looks loads when the program runs.


Explanation:

In programming, a variable is a value that can change, depending on conditions or on information passed to the program. Typically, a program consists of instruction s that tell the computer what to do and data that the program uses when it is running.
Other Questions
(1 1/8 + 1/8) - 5/4A -1B 0C 5/8D 4/5 are the two triangles congruent ? A. yes B. no c . there not enough information to say Solve the equation 3(-2-3x)=-9x-4 authors use different text structures to what A. make an effective argument B. avoid logical fallacies C . show diversity of opinion D. pursue different purpose if correct ill give 100 points How long does it take Neptune to travel around the sun?? What is the legacy of the Civil War on African- Americans in Louisiana, Citizens of Louisana, and Union soldiers occupying Louisana? why does the author emphasize the aspect of the nuns character FILL IN THE BLANK!!Linnaeus developed two groups for classifying organisms: genus and _____ How many 3/4 are in 8? Historians could best use the excerpt as an example of which of the following?* Please help me with this question kristy had two brothers and 2 sister the little sister name kylie was 8 years old the big sister name kaylie is 12 years old the big brother name jay lay is 13 years old the little brother is 10 years old but they mom let hem buy what ever they wanted she gave each 10$ and 9 cents how many money did she paid Ryan drinks liters of water every of an hour at a constant rate.How many liters of water does he drink in 3 hours? hailey has recently joined the hospital PLZZZZZ HELPPP ME WITH THISS!!!!! What would you use to determine whether an acid or alkali has been added to a solution?A. ReactantB. IndicatorC. AdjustorD. Identifier Find the Value of Y. How many moles of NaHCO3 are there in a 3g tablet of Alka-Selzer? PLZZ ANYONE TO ANSWER MY QUESTIONS.....I WILL GIVE BRAINLIEST. ....... What is the message of this poster?