1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
4 years ago
6

Where is NumPy used?

Computers and Technology
2 answers:
Svetradugi [14.3K]4 years ago
7 0

Explanation:

The ndarray (NumPy Array) is a multidimensional array used to store values of same datatype. These arrays are indexed just like Sequences, starts with zero.

masha68 [24]4 years ago
7 0

Answer:

The answer is python.

Explanation:  

  • NumPy is a part of the python programming language. It is used for an array-processing package and provides a high-performance array and the object that uses a tool for work with arrays.  
  • It is also known as a software that is used for various operations. It is also known as ndarray. It stores the multi-dimensional array and stores the same data type values. Such arrays are indexed as Sequences, starting at zero.
You might be interested in
Create a public non-final class named Partitioner. Implement a public static method int partition(int[] values) that returns the
Nuetrik [128]

Answer:

Check the explanation

Explanation:

class Partioner {

   public static int partition(int[] values) {

       if (values == null || values.length < 1)

           return 0;

       // getting pivot value

       int pivot = values[values.length - 1];

       // pivot index

       int pivot_index = values.length - 1;

       // looping through values

       for (int i = values.length - 2; i >= 0; i--) {

         

           if (values[i] == pivot) {

               pivot_index--;

               continue;

           }

            // if immediate number is greater than pivot

           if (values[i] > pivot) {

               if (pivot_index - i == 1) {

                   int temp = values[i];

                   values[i] = pivot;

                   values[pivot_index] = temp;

                   pivot_index--;

               } else {

                   int temp = values[i];

                   values[i] = values[pivot_index - 1];

                   values[pivot_index - 1] = temp;

                   temp = values[pivot_index - 1];

                   values[pivot_index] = temp;

                   values[pivot_index - 1] = pivot;

                   pivot_index--;

               }

           }

       }

       // returning pivot index

       return pivot_index;

   }

   // testing the function

   public static void main(String[] args) {

       int values[] = { 11, 9, 2, 7, 21, 6, 10, 10, 10 };

       System.out.println("pivot index : " + Partioner.partition(values));

       System.out.println();

   }

}

// OUTPUT

pivot index : 4

8 0
4 years ago
assume you are the Chief Information Officer (CIO)1 of the company that you dream of (any company, real or hypothetical). Give a
tino4ka555 [31]

Answer:

Suppose I am Chief information officer of a business firm which provide accounting related services to leading companies and brands. Obviously the data that my organization has excess of is prone to various cyber threats and because even a slight misuse of data will cause huge loss of clients, it is huge responsibility to secure every bit of data from any kind of cyber threat.

Majorly two type of security threats are there :-

External threat:-When threat is caused due to an external factor which is outside organization it is called external threat.                                                                                                                                

Criminal syndicates:- These are group of malicious professional attackers .They carefully chosen targets from which they expect good returns.

State-sponsored actors:-Their main goal is accessing the database of organization and an access to organizations.

Hacktivists:- Generally they carry out a malicious cyber activity to promote either a political agenda, religious belief or a social ideology. There has come many cases where these hackers shuts down websites, either for fun or for some political purpose time to time.

2. Internal threat:-Threats which comes from employees, ex-employees and third parties. It is very easy for someone from inside the organization to steal the data and misuse it.

Some of the methods by which we can make sure that the data of organization is secured are:-

Adopt for Penetration testing tool:- Penetration testing tools check the vulnerabilities or weak areas in the software systems.We can also install IDS (Intrusion Detection System) which will alert us if there is suspicious activity on the network. Further we would have to keep an eye on all the database access activity and usage patterns in real time to ensure that no data leakage is taking place, or there is unauthorized SQL.

Calculate risk scores:- Risk scores calculates the vulnerabilities and gives the extent of severity in the form of a numerical score. This will gives the company a bigger picture of data vulnerability.Security companies like Lucideus provide this service of risk score calculation.

A trained Workforce-Employees in the company would have to trained to recognize common cyber threats .Small mistakes that we all do like opening emails from mysterious senders should not be done. There is need of promoting a security conscious work culture. Further if ex employees leave the company on bad terms ,it may happen that they would misuse the data out of anger.So to make sure that this doesn't happen provide only a limited access to employees so that once they leave their privileges to access data of the organization is denied.

Encrypt Data:-Encryption is a process where data is converted to scrambled code before transmitting it by using special mathematical algorithms. Further decoding of that data can be done only when an authorized user accesses it. This will make sure that data is secured and is accessed only by right users.In current scenario, encryption is one of the most popular and effective data security methods used by organizations.

Cloud-based architectures:- It may sound bizarre but Cloud-based architectures are more disaster-tolerant to protect data.Clouds uses encryption to transmit the data and it is encrypted also when it is idle on the cloud servers.

Explanation:

7 0
3 years ago
Aaron want to buy an mp3 player online what should he check on the website before entering his credit car details
pshichka [43]

He should probably check the reviews of the mp3 player and the seller accuracy.

7 0
3 years ago
Google Ads was constructed around three core principles, focused on helping businesses reach their online potential. The first o
PolarNik [594]

Answer:

True

Explanation:

Google Ads was constructed around three core principles, focused on helping businesses reach their online potential. The first of these is relevance. Google Ads connects businesses with the right people at the right time. The other principle is control and results.

7 0
4 years ago
In the absence of a cybersecurity theory, we have security standards, frameworks and best practices. An example of best practice
Galina-37 [17]

Answer:

a. to use a password of a certain composition and strength, such as minimum 8 characters.

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

In the absence of a cybersecurity  theory, we have security standards, frameworks and best practices.

An example of best practices in cybersecurity is the use of a password of a certain composition and strength, such as minimum 8 characters. This would ensure there's a formidable wall to protect data and an unauthorized access or usage of the system network.

7 0
4 years ago
Read 2 more answers
Other questions:
  • When you hear or see the warning signal of any emergency vehicle, you should ________________.?
    14·1 answer
  • After brainstorming engineers may refine their ideas by making
    8·1 answer
  • What does ACCU stand for?
    13·2 answers
  • It is safe to stand on the top step of a ladder provided it is braced property
    10·1 answer
  • CB workorder
    6·1 answer
  • Is the internet a private place?
    15·2 answers
  • True or False
    11·1 answer
  • Which one of the following is a type of network security?
    5·1 answer
  • I NEED HELP ASAP<br><br> THANK YOU SO MUCH <br> GOD BLESS YOU
    7·2 answers
  • Why ads on this app do it help pay for the free stuff?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!