Answer:
Explanation:
The following expressions are written in Java and require the rest of the "assummed code" to run correctly, but can be pasted to that code and it has already been tested to be working and be bug free.
1) boolean areEqual = (a1.getName() == a2.getName());
2) ch = c1.getModel().charAt(2);
3) public static void whatIsStatus(Lamp myLamp) {
if (myLamp.status == true) {
return "ON";
} else if (myLamp.status == false) {
return "OFF";
} else {
return "ERROR";
}
}
Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.
Explanation:
User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.
RISKS:
-
User can destroy data in application(intentionally or not) and delete all
- User can insert infected CD or USBflash drive into the work computer
Workstation Domain : A computer of an individual user where the production takes place
RISKS:
- The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
- A workstation’s hard drive can fail causing lost data
LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone
RISKS:
-
A worm can spread through the LANand infect all computers in it.
- LAN server OS can have a knownsoftware vulnerability.
WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines
RISKS:
- Service provider can have a major network outage.
- Server can receive a DOS or DDOS attack.
- A FTP server can allow anonymously uploaded illegal software
LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall
RISKS:
- Weak ingress/egress traffic filteringcan degrade performance.
- A firewall with unnecessary portsopen can allow access from the Internet
System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database
RISKS:
- A fire can destroy primary data
- A DOS attack can cripple the organization’s email
Remote Access Domain :The domain in which a mobileuser can access the local network remotely, usually through a VPN
RISKS:
- Communication circuit outage candeny connection.
- Remote communication from officecan be unsecured.
- VPN tunneling between remotecomputer and ingress/egress routercan be hacked
Body.
head contains all of the data that we generally don't see.
Link is used to link to external stylesheets.
script is where you would type scrips.
doctype is used to tell the browser the document type.
Answer:
False is the correct answer for the above question.
Explanation:
- The structure is a user-defined data type, which is used to define the set of different data types and values. Just like in the above question, the class structure holds the list of three variables, which is a type of double.
- When any user wants to compare the two structure values, then he can do it with the help of comparing all the variables of a structure. if a user wants to compare the circle1 with the value of the circle2, then he needs to compare the circle1.centerX with circle2.centerX, and so on with the other variables.
- But the above question syntax will directly compare the two structure variable, which is not correct. Hence the above answer is false.
Answer:
The statement (in Python) is as follows:
recalled = modelYear >=2001 and modelYear <=2006
Explanation:
Required
A statement without an if statement to assign true or false to recalled
Using an if statement, the comparison is
if modelYear >=2001 and modelYear <=2006:
recalled = True
else:
recalled = False
To rewrite the statement without using the "if" keyword, we simply equate variable recalled to the stated condition i.e.
recalled = modelYear >=2001 and modelYear <=2006
Note that, we assume that there is an input fo variable modelYear