Answer:
V is the average Halstead Volume per module.
G is the average Cyclomatic Complexity per module.
L is the average number of Source Lines of Code (SLOC) per module.
C is the average number of comment lines per module
Explanation:
What rough outline of a policy would you establish to determine who should be allowed to have administrative rights on a computer system with role-based access control? Remember, policies can refer to specific workstations, employee types, customer types, etc. Defend the major tenets of your policy.
RBAC, also referred to as rule-based access control, is the most popular type of access control system. RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere.
What are households?In addition to any unrelated individuals who share a residence with related family members, a household may also contain lodgers, foster children, wards, or employees. Families, blended families, shared housing, group homes, boarding houses, houses of multiple occupancies (UK), and single-room occupancy are some examples of household types (US).
Also referred to as rule-based access control, is the most popular type of access control system. RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere. Access control can be configured with conditions, roles, and a script that determines whether the 'answer' variable is true or false.
Therefore, RBAC is not only in high demand among households, but it has also grown in popularity in the business sphere.
Learn more about households here:
https://brainly.com/question/29351418
#SPJ1
Placing parenthesis around a word, in a search, provides an exact match to that word
in the results.
True
False
Answer:
Explanation:
Placing parenthesis around a word, in a search, provides an exact match to that word in the results.
True
what utility, as a centos system administrator, are you most likely to use to monitor process activity in real time?
The top command gives a thorough breakdown of the system's processes and their resource utilization, including CPU and memory usage, in real time.
What programme can a Linux system administrator use to modify text documents that contain configuration files?Vim and nano are the two command-line text editors available in Linux®. If you ever need to write a script, modify a configuration file, build a virtual host, or just make a short note for yourself, you can utilise one of these two alternatives.
When keeping an eye on your machine, have you noticed a continuously high CPU usage statistic of above 90%?However, if the percentage of privileged time is routinely higher than 90%, the computer's antivirus programme, other drivers, or another OS component may be the cause of the excessive CPU consumption. To determine what is causing this behaviour, you should evaluate it with your system administrator.
to know more about centos system here:
brainly.com/question/14103627
#SPJ1
Write a program to input the day of a week and print holiday if it is Saturday
Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. Please select the best answer from the choices provided T F
Answer:
Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.
Explanation:
Text books are not a good source for finding ideas about what to study because the teachers make up the test questions. False- most teachers use the textbooks as guides. Visiting the library to seek books on your current topic will not help you in determining what to study.
Answer:
False
Explanation: I took the test and passed!!
The Internet is considered a WAN.
True or False
Answer:
True
Explanation:
The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable.
Answer:
True
The internet is considered a WAN
What is the IT professional testing?
fault tolerance
spoolers
shared resources
routing protocols
Answer:
The answer would be Fault Tolerance.
Explanation: Hope this helps<3
what is pirating means in technical terms?
Answer:
the illegal copying, distribution or use of software
Pirating refers to the unauthorized copying, distribution, or use of copyrighted material, such as software, music, movies, or books, without the permission of the copyright holder.
Here,
In technical terms pirating refers to the unauthorized copying, distribution, or use of copyrighted material.
This can include activities such as downloading or sharing copyrighted content without paying for it or using cracks to bypass licensing or copy protection mechanisms.
Pirating is considered illegal and unethical because it infringes upon the rights of the copyright holder and can result in legal consequences.
Know more about pirating,
https://brainly.com/question/29769277
#SPJ6
which adobe program is used for typesetting and interior page layout
Answer:
Adobe InDesign
Explanation:
An ad agency is interested in keeping track of their clients a little more easily. Help them out by creating two ArrayLists :
1. Create an ArrayList called company Name that stores an ArrayList of all the company names.
2. Create an Integer ArrayList called contractValue that stores the value of the contract that the ad agency has with its clients.
Answer:
Explanation:
The only things requested in this question were the two Arraylists. These following arraylists need to be called and values need to be added to them by the corresponding code. At the moment they would be empty.
1. ArrayList<String> Names = new ArrayList<>();
2. ArrayList<Integer> contractValue = new ArrayList<>();
They can be added to any code or in the main method as long as they are within the scope of the code that will be calling them.
G
Which type of control uses a Boolean value to control the number of looping increments?
flag
sentinel
EOF
O count
3
Mark this and return
Save and Exit
Next
01:53:
Submit
The type of control that uses a Boolean value to control the number of looping increments is a flag loop. The correct option is a.
What is a flag loop?To act as a flag, a bool variable is created and initialized. The while loop runs until the value of the flag variable changes (true becomes false or false becomes true).
The user is requested to input integers on the keyboard that is added together in the example that follows.
You can modify a program's control flow and choose which statement(s) will be executed using boolean expressions when using boolean control structures.
Therefore, the correct option is a. flag loop.
To learn more about Boolean value, refer to the link:
https://brainly.com/question/29096400
#SPJ9
The museum ticket price should be :
$0 on Fridays with couponcode "FREEFRIDAY"
$10 on the weekends for everybody
On weekdays $5 for 18 years old and under and $10 otherwise.
A student wrote this conditional to set the price . For which case will the price NOT come out as indicated?
var price=10;
// Check the value of variables to decide the price to set
if (age <= 18 && day != "Saturday" && day != "Sunday") {
price = price / 2;
} else if (day == "Friday" && discountCode == "FREEFRIDAY"){
price = 0;
}
a. a minor on Friday with the discount code
b. an adult on Friday with the discount code
c. an adult on the weekend
d. a minor on the weekend
e. an adult on a weekday
Answer:
a. a minor on Friday with the discount code
Explanation:
Let's try and decipher the given code segment
Let's first look at the if part
if (age <= 18 && day != "Saturday" && day != "Sunday") {
price = price / 2;
==> if a minor and a weekend then price is half = $5
Now look at the else part
else if (day == "Friday" && discountCode == "FREEFRIDAY"){
price = 0;
}
This means if the visitor is NOT a minor and it is NOT a weekend if it is a friday, with a coupon then admission is free
Let's look at the answer choices and see what the logic flow is:
a. minor on Friday with the discount code
if (age <= 18 && day != "Saturday" && day != "Sunday")
All three parts of this condition are true so the statement price = price/2 is executed and price = 5. However, everyone with this coupon should get in free. So this part is incorrectly coded
b. an adult on Friday with the discount code
if part is False, else if part is true and price = 0 which is consistent
c. an adult on the weekend
if part is false, else if part is also false so price printed out is 10 which is consistent
d. a minor on the weekend
the if part is false and so is the else if part , so price is unchanged at 10. Consistent
e. an adult on a weekday
Both the if and else if parts are false, so price is unchanged at 10. COnsistent
The design development or study of computers is known a A graphic design B information technology C human services D robotics
The answer to your question is B, information technology. Information technology involves the development, design, and study of computers and other technologies used to manage and process information.
It includes hardware, software, networking, and communication technologies that enable the processing, storage, and transmission of information. The development of computers involves the creation and improvement of hardware and software components that are used to build computer systems. This includes the design of microprocessors, memory modules, storage devices, and other components that are used to create computer systems. The study of computers involves research into the capabilities and limitations of computer systems, as well as the development of new applications and technologies that can be used to improve their performance and functionality.
The field of information technology is constantly evolving, with new technologies and applications being developed all the time. This makes it an exciting and challenging field for professionals who are interested in working with computers and other technologies. If you are interested in pursuing a career in information technology, there are many opportunities available in areas such as software development, network administration, cybersecurity, and data analytics, among others.
Learn more about cybersecurity here: https://brainly.com/question/31928819
#SPJ11
5 evaluation criteria
Answer:
relevance, efficiency, effectiveness, impact and sustainability.
An objective of the __________ is to provide a standardized set of I/O interface routines to user processes. Select one: a. working directory b. file management system c. indexed file allocation d. file directory Clear my choice
Option b (file management system) is used to provide a set of input/output interface.
A software package that focuses on providing numerous user-friendly features including productivity applications as well as file manipulations, respectively, would be termed as the file management system.
The other given alternatives such as:
Option a (Working directory) - The directory users are functioning in at present.Option c (Indexed file allocation) - The techniques of assignment dictate how documents have been saved on a disc.Option d (File directory) - A file storage place on your desktop.These options are not connected to the given question. Thus the above answer is the correct one.
Learn more about the file directory here:
https://brainly.com/question/2170165
Select the correct answer from each drop-down menu. Computer memory stores data as a series of 0s and 1s. In computer memory, represents the absence of an electric signal and represents the presence of an electric signal.
Answer:
Zero (0); one (1).
Explanation:
Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.
The memory of a computer generally stores data as a series of 0s and 1s. In computer memory, zero (0) represents the absence of an electric signal i.e OFF and one (1) represents the presence of an electric signal i.e ON.
What is the difference between weak AI and strong AI?
Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.
Which branch of science helps avoid or minimize stress-related injuries at workplace?
is a branch of science that aims to design workplaces to minimize stress-related injuries.
Answer:
PUTANG INA MO MAMATAY KANA KING INA NYONG NGA AMERICANO
what two layers of the osi model are defined by docsis? (choose two.)A. channel bandwidthB. the separation of the voice and data transmissionsC. VPN tunneling requirementsD. modulation techniqueE. a deterministic media access method
The two layers of the OSI model that are defined by DOCSIS (Data Over Cable Service Interface Specification) are
1. Layer 1 (Physical layer): This layer is defined by aspects such as modulation technique (D) and channel bandwidth (A). DOCSIS uses various modulation techniques, like QAM, to transmit data over cable networks, and it allocates specific channel bandwidths for efficient data transfer.
2. Layer 2 (Data Link layer): At this layer, DOCSIS defines a deterministic media access method (E), which is the Time Division Multiple Access (TDMA) or Frequency Division Multiple Access (FDMA) method. These methods allow for the effective sharing of network resources among multiple users.
The other options, such as the separation of voice and data transmissions (B) and VPN tunneling requirements (C), are not specifically defined by DOCSIS in the context of the OSI model layers.
learn more about OSI model here:
https://brainly.com/question/31713833
#SPJ11
TRUE / FALSE. the esi and edi registers cannot be used when passing 32-bit parameters to procedures.
The answer is False. The ESI (Extended Source Index) and EDI (Extended Destination Index) registers can be used when passing 32-bit parameters to procedures.
The ESI and EDI registers are general-purpose registers in the x86 architecture commonly used for string operations and memory addressing. They can also be used for passing parameters to procedures, including 32-bit parameters.
In the x86 calling conventions, function parameters are typically passed through registers or the stack. While specific calling conventions may vary, the ESI and EDI registers can be utilized to pass 32-bit parameters to procedures, along with other registers such as EAX, EBX, ECX, and EDX.
These registers provide additional flexibility for passing parameters and can be useful in certain programming scenarios. However, it is important to follow the specific calling convention guidelines and ensure proper usage of registers when passing parameters to procedures in order to maintain consistency and compatibility with the underlying system and compiler.
Learn more about registers here :
https://brainly.com/question/13014266
#SPJ11
Write a program that HARDCODE a word, and then writes out that word once per line but for each line replace the first character of the word with a space and remove the last character of the word. Continue until no characters are left. (You will have to be careful with words having an odd number of characters.)
NOTE: As always, you can use input instead of hardcode.
Enter a word -->ABARACADABARA
ABARACADABARA
BARACADABAR
ARACADABA
RACADAB
ACADA
CAD
A
The program that illustrates the information will be:
public class Main
{
public static void main(String[] args) {
String s="ABARACADABARA";
int l=s.length()-1;//get the length of test string
System.out.println(s);
StringBuilder str=new StringBuilder(s);//Use string builder to replace characters
for(int i=0;i<s.length()/2;i++){
str.setCharAt(i,' ');//set character to space
}
What is a computer program?A computer program is a set of instructions written in a programming language that a computer can execute.
Software contains computer programs as well as documentation and other intangible components. Source code refers to a computer program in its human-readable form.
Learn more about program on:
https://brainly.com/question/23275071
#SPJ1
Which statement is correct? O a. There could be more than one critical path in a network of activities O b. Delay in performing the activities that are not on the critical path would never lead to a d
The correct statement is "There could be more than one critical path in a network of activities".
Critical Path Analysis is a technique utilized to define the critical path for a project plan or schedule, which includes determining the shortest time necessary to complete tasks.The critical path in a network diagram is the sequence of linked activities that takes the longest time to finish and is the most crucial path to follow to complete the project in the shortest possible time.If there is no delay in performing the critical path activities, the project is completed on time. In contrast, any delay in performing the activities on the critical path will result in the entire project being delayed.There might be more than one critical path in a network of activities.
When there are more than one critical paths, a delay in one of the activities that lie on one of the critical paths can cause a delay in the project's overall completion date.Therefore, in multiple critical paths, each path's duration is critical to completing the project on time. To ensure that project delivery times are kept to a minimum, the project manager should focus on the critical path tasks' timely completion while keeping an eye on the non-critical path tasks.CPA can provide visibility to all activities in the network of activities, allowing the project manager to optimize project delivery times, manage resources, and identify areas where the project can benefit from improving processes, skills, or technology to complete the project on time and within budget.
Learn more about network :
https://brainly.com/question/31228211
#SPJ11
For what reasons do readers use text-to-speech tools? Check all that apply.
Answer:d
Explanation:
Answer:
to support new language learning. to focus on important information. to hear a word's pronunciation. to better follow a text.
Explanation:
Because the user accesses files on cloud storage through a browser using an app from the storage provider, the actual media on which the files are stored are transparent to the user.
True or False.
The given statement "because the user accesses files on cloud storage through a browser using an app from the storage provider, the actual media on which the files are stored are transparent to the user." is true because cloud storage typically provides a user-friendly interface for accessing files stored on remote servers. The user can access these files through a web browser or through an app provided by the storage provider.
The actual media on which the files are stored (such as hard drives or solid-state drives) are not visible or accessible to the user. Instead, the user interacts with the files through the software interface provided by the cloud storage provider. This abstraction layer provides a level of convenience and ease-of-use for the user, while allowing the storage provider to manage the underlying hardware and infrastructure as needed.
You can learn more about cloud storage at
https://brainly.com/question/13092608
#SPJ11
wes is using usmt to migrate user profiles to newly purchased windows 10 computers in the organization. to begin the migration, he executes the scanstate.exe process on the source computers to collect user profile information. where is this information most likely to be stored?
Answer:
When using USMT (User State Migration Tool) to migrate user profiles, the scanstate.exe process is used to collect user profile information from the source computers. This information is most likely to be stored in a migration store, which is a location on the source computer where USMT stores the data that it collects.
The migration store can be specified by the user when the scanstate.exe process is run, or it can be set to a default location. The default location for the migration store is typically the local drive of the source computer.
Once the user profile information has been collected and stored in the migration store, it can be used to restore the user profiles to the target computers using the loadstate.exe process. The loadstate.exe process reads the data from the migration store and restores it to the target computers, allowing the user profiles to be transferred to the new Windows 10 computers.
Explanation:
an expanded version of a star schema in which all of the tables are fully normalized is called a(n):
A snowflake schema is an extended form of a star schema in which all of the tables have undergone full normalization.
A snowflake schema in computing is a logical setup of tables in a multidimensional database so that the entity relationship diagram looks like a snowflake. Centralized fact tables connected to various dimensions serve as the representation of the snowflake schema. A star schema's dimension tables can be normalized by a process called "snowflaking." When all of the dimension tables are fully normalized, the resulting structure resembles a snowflake with the fact table in the center. The basic idea behind snowflaking is to normalize dimension tables by splitting out low cardinality characteristics and creating new tables.
Similar to the star schema is the snowflake schema. In contrast, dimensions are standardized into numerous linked tables in the snowflake schema.
Learn more about snowflake schema here:
https://brainly.com/question/29676088
#SPJ4
Why is computer called information processing maching???
☆ Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).
HOPE IT HELPS ❣️
Answer:
Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine or IPM.
Explanation:
does anybody have the answer to Exercise 2.5.7: Circle Pyramid for codehs python?
The Circle Pyramid for codehs python Yes, here is the solution.
What is the Pyramid ?The Pyramid is a monumental structure that is characterized by its triangular shape, typically with a flat base and four steep sides that meet at a point at the top. Pyramids have been built all over the world in many different cultures, including Ancient Egypt, Mesoamerica, and China. The most well-known pyramids are those of the ancient Egyptians, which were built as tombs for the Pharaohs and their families.
Yes, here is the solution:
from turtle import *
# Set up your screen and starting position.
setup(500,300)
setworldcoordinates(-250,-150,250,150)
penup()
home()
# Draw the pyramid
pendown()
for i in range(4):
circle(25,360)
left(90)
forward(50)
# Hide your turtle
hideturtle()
# Close window on click.
exitonclick()
To learn more about Pyramid
https://brainly.com/question/5017673
#SPJ1
which is known as accurate processing of computer gigo E mail MHz bug
GIGO is the considered as the accurate processing in computers.
In the field of computer science, the word GIGO stands for " garbage in, garbage out".
It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.
It is the inability of the program to any bad data providing incorrect results.
Thus GIGO is the most accurate processing in a computer programs.
Learn more :
https://brainly.in/question/23091232
Your customer said that the language used in your program was offensive. This is an aspect of
O accuracy
O efficiency
O usability
O propriety
Answer: USABILITY
Explanation:
Perhaps efficiency
Answer:
Propriety
Explanation:
Right on Edge