Answer:
Import java.awt.*;
import java.util.*;
public class Sprhere
{// Instance Data private double surfaceA, volume, r, diameter; //Constructors public Sphere ()
{r = 0;diameter = 0; surfaceA = 0;volume = 0;}
public Sphere (double radius, double d, double SA, double v)
{this. r = radius; this. diameter = d; this. surfaceA = SA;this.volume = v;}
//--------------------------------------------------------------------// Accesors.//--------------------------------------------------------------------public double get Radius()
{return r;}
public double get Diameter()
{return diameter;}
public double get SurfaceA()
{return surfaceA;}
public double get Volume()
{return volume;}
//--------------------------------------------------------------------// Mutators.//--------------------------------------------------------------------
Answer:
Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>
Explanation:
Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).
The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.
Answer:
denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack)
Explanation:
Denial-of-service attack -
It is a type of cyber attack , where the hacker can create a machine or any network resource , which is capable to disrupt the server of the host , with the help of the internet , is referred to as the denial of service attack .
The task is accomplished with by flooding the host with many superfluous requests , which can overload the system .
In case of the distributed denial-of-service attack , the flooding is done by many different sources .
Hence , from the given scenario of the question ,
The correct answer is denial-of-service attack (DoS attack) and distributed denial-of-service attack (DDoS attack) .
Answer:
Question was incomplete and continued the question
For each of the following scenarios, which of these choices would be best? Explain your answer.
BST
Sorted Array
Un-sorted Array
a) The records are guaranteed to arrive already sorted from lowest to highest (i.e., whenever a record is inserted, its key value will always be greater than that of the last record inserted). A total of 1000 inserts will be interspersed with 1000 searches.
b) The records arrive with values having a uniform random distribution (so the BST is likely to be well balanced). 1,000,000 insertions are performed, followed by 10 searches.
Explanation:
Answer for a: Un-sorted array or Un-sorted linked list : as mentioned in the question itself that the records are arriving in the sorted order and search will not be O(log n) and insert will be not be O(n).
Answer for b : Un-sorted array or Un-sorted linkedlist : Number of the items to be inserted is already known which is 1,000,000 but it is very high and at the same time search is low. Unsorted array or Unsorted linked list will be best option here.
Answer:
8 Standard Computer Components and What They Do
Explanation:
Motherboard. The motherboard is an important computer component because it’s what everything else connects to!
Power Supply. True to its name, the power supply powers all other components of the machine.
Central Processing Unit (CPU)
Random-access Memory (RAM)
Hard Disk Drive / Solid State Drive.
Video Card.
Optical Drives.