Answer:
import java.util.Scanner; public class Salesman2 {
public static void main(String[] args) { // TODO Auto-generated method stub double CommissionRate;
double TotalSales, Commission;
Scanner Read = new Scanner (System.in); System.out.println("Please enter total sales "); TotalSales=Read.nextDouble();
if (TotalSales<500)
CommissionRate=0.0;
else if (TotalSales>=500 && TotalSales <1000) CommissionRate=0.05;
else
CommissionRate=0.08;}
Commission = CommissionRate * TotalSales;
System.out.println("The Commision is: "+ Commission); }
}
}
Answer:
cyptographically
Explanation:
Did this question and got it right. Good luck!
Answer:
Duplicate these displays.
Explanation:
<u>A. Show only on 1</u> <em>displays only the first screen and disconnects the second one</em>
<u>B. Extend these displays</u> <em>displays two different outputs on the same computer</em>
<u>C. Show only on 2.</u> <em>displays only the second screen and disconnects the first one</em>
<u>D. Duplicate these displays.</u> <em>displays the same output for both screen</em>
Explanation:
We can divide the multiplex in different categorize, for example:
- FREQUENCY DIVISION MULTIPLEXERS (FDM)
-
TIME DIVISION MULTIPLEXERS (TDM)
-
STATISTICAL TIME DIVISION MULTIPLEXERS (STDM).
But in this case, we're going to explain about the time and frequency, because the time division multiplex differ to frequency, because the circuit is divided horizontally, and the time is vertically
b. splits the communication circuit vertically (with time slots) instead of horizontally
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.