Answer:
Follows are the code to the given question:
def steps_to_miles(user_steps):#defining a method steps_to_miles that takes a variable user_steps
return user_steps/2000#use return to calculate the steps
user_steps = int(input())#defining a variable user_steps that holds value from the user-end
print('%0.2f' % steps_to_miles(user_steps))#defining print that calls the steps_to_miles method
Output:
5345
2.67
Explanation:
In this code a method "steps_to_miles" that takes "user_steps" in the parameter inside the method a return keyword is used that calculates the user steps and return its values.
Outside the method, a "user_steps" variable is declared that inputs the value from the user-end pass into the method and prints its value.
The answer to this question is Document Management Software.
Document Management Software or DMS is a computer system or software that is used to store, share, manage, and distribute documents by converting paper based documents into an electronic image that can be viewed by any user. The converting of documents is through the use of a scanner, and the document management software will enable the users to manage the electronic documents or data.
Answer:
The answer is "ICANN"
Explanation:
In the given question some information is missing, that is option, which can be described as follows:
A) IAB
B) ICANN
C) W3C
D) ISOC
It manages the installation and processes of multiple databases concerning the Network domain and provides a stable and safe networking service, and wrong choices were explained as follows:
- IAB, It provides a protocol to manage IETF, that's why it is wrong.
- W3C is used in web development.
- ISOC is used to provide internet accessibility.
The answer is C) Availability.
Although the company is addressing scalability by adding more servers, the question is asking for security requirement. Therefore we need to choose one of the principles from CIA triad which includes confidentiality, integrity, and availability.
Integrity involves keeping the data accurate and confidentiality involves keeping the data between the sender and intended recipient(s). That being said, scalability and availability are the possible answers.
C) Availability is the best answer because it is part of the CIA triad.
Note: Another resource to look at for cyber security principles would be the Parkerian Hexad.
I'm not sure but maybe one of the two websites can help you
.
http://wiki.netbeans.org/MusicAppUsingRESTRemoting
https://mukeshscience.wordpress.com/2014/05/26/adding-audio-to-java/