1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
storchak [24]
3 years ago
5

Use pseudocode to specify a recursive algorithm to compute the nth value of the harmonic series, for some integer n.

Computers and Technology
1 answer:
Assoli18 [71]3 years ago
6 0
Well, this task is pretty easy, I bet after my countings you will immediately understand how to figure it out : 
At first, <span>def h(n): 
</span>As it is done, n = 0, so after returning 0
sum = 1./n + h(n-1)
The last thing you should do is to return sum
hope it helps =)

You might be interested in
Linux distributions overview? information​
disa [49]

Answer:

Debian

Arch Linux

Ubuntu

Fedora

Manjaro

Linux Mint

Elementary OS

openSUSE

Explanation:

6 0
3 years ago
You can encrypt individual files, but microsoft recommends encrypting at what level?
vichka [17]
Microsoft recommends encrypting at the folder level.
4 0
3 years ago
You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
Kitty [74]

<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>

Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.

It is a security device and purpose to make organization to access or connected to end use of other networks.

Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN

Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers.  Keeping network logs is policy driven. So network administrator keeps logs for no. of days.

Some network administration export log and keep as reference.

4 0
4 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
Write a pyhton program to calculate area of a circle?
marta [7]

Answer:

The code to calculate the area of a circle is:

from math import pi

def circleArea(radius):

 if radius > 0:

   return pi * (radius ** 2)

 else:

   return None

if __name__ == '__main__':

 radius = 5

 print("Radius: {} Area: {}".format(radius,circleArea(radius)))

Explanation:

A detailed explanation of each line of code is given below.

#Define the number pi used to calculate the area

from math import pi

#We define a function that calculates the area of a circle

def circleArea(radius):

#Check if the radius is valid ( radius > 0) since there aren´t negative radius

 if radius > 0:

#Compute the area formula for a circle \pi * radius^{2}

   return pi * (radius ** 2)

 else:

#Return None if the radius is invalid

   return None

#Run the function we´ve defined

if __name__ == '__main__':

#Define a radius

 radius = 5

#Call the function and parse the radius through it, then print the result

 print("Radius: {} Area: {}".format(radius,circleArea(radius)))

8 0
3 years ago
Other questions:
  • Which of the following has the responsibility of offering instruction on intrusion detection systems and intrusion prevention sy
    11·1 answer
  • Which of the following is NOT an example of a font style?
    13·1 answer
  • Which is the output of the formula =XOR(120&lt;102;83=83;51&lt;24)??
    11·2 answers
  • What vi command do you use to insert the a file named "file2.txt" to the end of your current file?
    12·1 answer
  • bro this scared me, i thought i just got hacked, could someone explain why when i went to ask a question, it kicked me out my ac
    9·2 answers
  • Which of the following best describes what a long-term goal is?
    13·1 answer
  • ICT Practical Work
    12·1 answer
  • How can a user remove or delete a Pivot Table?
    8·1 answer
  • Images that are made up of pixels and cannot be resized without losing quality?
    11·1 answer
  • Explain how mobile phone production could be more sustainable​
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!