1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kupik [55]
3 years ago
15

If a code word is defined to be a sequence of different letters chosen from the 10 letters A, B, C, D, E, F, G, H, I, and J, wha

t is the ratio of the number of 5-letter code words to the number of 4-letter code words?
Computers and Technology
1 answer:
netineya [11]3 years ago
5 0

Answer:

The answer is 6:1 .

Explanation:

We don't need to have prior knowledge of combination or permutation.

Count the way to chose 4 letters.As given in the question chose sequence of different letters

For first place we have 10 letter

For second place we have 9 letter as one is already out

For 3 place we have 8 letter as two letter are already out

For 4 place we have 7 letter as three letter are already out

Total group of 4 letters = 10 * 9 *8*7

Similarly form group of 5 letters we have

Total group of 5 letters = 10 * 9* 8 * 7*6

then Calculating ratio between 4 and 5

We have,

Group 5 : Group 4 ::10 * 9* 8 * 7*6:10 * 9 *8*7

                              : : 30240 : 5040

divide by 5040 on both side we get

Group  5: Group 4 :: 6 : 1

You might be interested in
Forms often allow a user to enter an integer. Write a program that takes in a string representing an integer as input, and outpu
Bond [772]

Answer:

user_string = input("Input a string : ")

output = user_string.isnumeric()

if output == True:

   print("yes")

else:

   print("no")

Explanation:

  • First of all check whether user input have all numeric value or not .
  • Display yes if string contain all numeric values .
  • Display no if string contain at least one non - integer character .

7 0
3 years ago
Read 2 more answers
So, I have an Cru__ on this boy in school and his name is Bray but Yeah.............Can someone help me
tester [92]

Explanation:

Okay so, am not a great person at that but my best advice would be. to be yourself. you can always be honest and talk to him privately that you have a crush on him. Dont be afraid and if he doesn't go to well dont feel bad, at least you had the guts to tell him. other girls would be scared.

4 0
3 years ago
Read 2 more answers
Wanda manages an application that fluctuates in usage quite a bit. Sometimes it uses quite a few servers with lots of memory and
TEA [102]

Answer:

c. Elasticity

Explanation:

When referring to Cloud Servers this capability is known as Elasticity. It basically describes how able and efficient a server is to automatically implement resources and remove resources in order meet the specific amount of demand at any given moment. Many times a server will not have much demand but will still have all the resources being used by the server. Being able to remove these unused resources so that they are available for other usage is what makes the servers elastic.

8 0
3 years ago
Where does the CPU store its computations
mario62 [17]

Answer:

In main memory

Explanation:

Hope this helps

8 0
3 years ago
Read 2 more answers
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
Other questions:
  • In 2-3 paragraphs, identify at least two ways technology and innovation have affected global economic competition. Provide a spe
    5·1 answer
  • Write a program that asks the user for a CSV of the NYC Open Data Film Permits: There is a sample file for June 2019 film permit
    9·2 answers
  • Assume that a function with this header: function amountSaved(price, discountRate, salesTaxRate) already exists. Write a single
    14·1 answer
  • Do you think LinkedIn stands to change the way employers hire? If so, how? Would this be a positive change or a negative one? Ex
    14·1 answer
  • What does it mean to be a good cyber citizen?
    8·2 answers
  • Select three advantages of cloud computing.
    12·1 answer
  • Can you please help me
    9·1 answer
  • Extended essay on globalization not less than 200​
    6·1 answer
  • Why do my airpods keep disconnecting from my laptop
    8·2 answers
  • Modern life is not possible if computer stops working? Give your opinion<br>​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!