Not sure what quizScore1-5 is, but here it is. Also, I'm not entirely sure what language you're working with here, but null can't be returned as an integer. If it were a string, for example, it'd be possible as string is an object reference type.
public int getData(int dataNumber)
{
if (dataNumber == 1)
return quizScore1;
else if (dataNumber == 2)
return quizScore2;
else if (dataNumber == 3)
return quizScore3;
else if (dataNumber == 4)
return quizScore4;
else if (dataNumber == 5)
return quizScore5;
else
return 0;
}
Answer:
def length( mystring):
count = 0
for i in mystring:
count += 1
return count
def reversed( mystring):
strlist = []
for i in range(length(mystring)):
strlist.append(mystring[(length(mystring) - 1) - i])
txt = "".join(strlist)
return txt
string = 'Yolanda'
print(reversed(string))
Explanation:
The python module defines two functions 'reversed' and 'length'. The length function counts the number of characters in a string variable while the reversed function reverses the string variable value.
Answer:
Mainframes
Explanation:
Mainframes are utilized by many major corporations and government agencies. They are also used in banking, accounting, and healthcare to name a few.
Answer:
B. Implement a key escrow.
Explanation:
A key escrow can be defined as a data security method of storing very essential cryptographic keys.
Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.
As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.
Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).
In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.