1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
2 years ago
5

Who invented Napier's Bones and when? Write its functions. field of comm​

Computers and Technology
1 answer:
Nataly_w [17]2 years ago
7 0

Explanation:

Napier's Bone was invented by Scottish mathematician John Napier in 1617 AD.... It's function is that it was very useful for finding multiplication at that time...

You might be interested in
Which language would you use to create scripts that send data to a web server?
bonufazy [111]

Which language would you use to create scripts that send data to a web server?

A. HTML

<u>B. ASP</u>

C. SGML

D. CSS

5 0
4 years ago
Read 2 more answers
Which of these is a good guideline when using text on a slide?
aleksklad [387]
Use no more than two font types
3 0
4 years ago
A function named function1 is defined in a module named module1. Suppose function1 has no parameter. Which of the following Pyth
Oduvanchick [21]

Answer:

Option C i.e., both A and B is the correct option to the following question.

Explanation:

Because in the following statement which is for the Python Programming Language, they can define the function i.e., "function1" without any argument and they can call that function with the help of another module then, they can call that function by using both methods. So that's why the following option is correct.

7 0
3 years ago
Write a class named Add that has the following data members, constructor, and methods:
taurus [48]

Answer:

A class is like a blueprint of object.

Explanation:

A class defines the kinds of data and the functionality their objects will have.

A class enables you to create your own custom types by grouping together variables of other types, methods and events.

In C#, we can create a class  using the class keyword.

Here's a sample program:

using System;

namespace ConsoleApplication

{

   public class Test

   {

       public static void Main()

       {

           Add a1 = new Add(70, 50);

           a1.AddNumbers();                    

           Console.ReadLine();

       }      

   }

     class Add

   {

       private int row;

       private int column;

       public Add(int r, int c)

       {

           row = r;

           column = c;

       }

       public void AddNumbers()

       {

           Console.WriteLine(row+column);

       }

   }

}

output: 120

Explanation of the program:

I have created a class named Add. Within a class, row and column are two fields and AddNumbers() is a method. We also have constructor to initialize row and column.

In main method, If I need to invoke members of the class, I must create  an instance of the class. We can create any number of instances using the single class.IN our program, a1 is the reference variable using which we can invoke members of the class. I invoked function in the class and passed arguments to the constructor while creating an instance.

Those values are assigned to method variables and it operated the addition. Thus the output is 120.

7 0
3 years ago
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
4 years ago
Other questions:
  • 14. The data selected to create a table must include
    12·2 answers
  • Which statement correctly describes how the density and temperature of air is related .
    7·1 answer
  • Two of the goals of community mobilization are getting the community interested and
    6·1 answer
  • Dead state is the name of the time delay in a cpu caused by differences between the speed of the cpu and ram.
    15·1 answer
  • The phrase ____ refers to an organization of components that define and regulate the collection, storage, management and use of
    10·1 answer
  • Please check my answer! (Java)
    8·1 answer
  • There is an enormous amount of information on the Internet that is automatically separated into good content and not-so-good con
    15·1 answer
  • Twitter and facebook are both examples of the​ _____________ internet business model.
    7·1 answer
  • _____ are networks that learn and are capable of performing tasks that are difficult with conventional computers.
    11·1 answer
  • A data mart is the operational database for the company. group of answer choices true false
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!