1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
artcher [175]
2 years ago
5

Functions are ideal for use in menu-driven programs. When a user selects a menu item, the program can_______ the appropriate

Computers and Technology
1 answer:
Masteriza [31]2 years ago
4 0

Answer:

a. call

Explanation:

According to my research on function, I can say that based on the information provided within the question the program can call the appropriate function. A function is a piece of code that completes a single task when called upon. Calling is another way of just saying that your telling the function to run its code at that given moment.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

You might be interested in
Sonora wants to extend the cells to be added in her formula. What is the quickest way to add more cells?
djyliett [7]

Answer:

D

Explanation: took the test on edge

7 0
3 years ago
Read 2 more answers
Write the following function without using the C++ string class or any functions in the standard library, including strlen(). Yo
dolphi86 [110]

Answer:

The function in C++ is as follows

int chkInd(string str1, string str2){    

int lenstr1=0;

while(str1[lenstr1] != '\0'){  lenstr1++;  }

int index = 0; int retIndex=0;

for(int i=lenstr1-1;i>=0; i--){

   while (str2[index] != '\0'){

       if (str1[i] == str2[index]){

           retIndex=1;

           break;         }

       else{   retIndex=0;      }

  index++;    }

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Explanation:

This defines the function

int chkInd(string str1, string str2){    

First, the length of str1 is initialized to 0

int lenstr1=0;

The following loop then calculates the length of str1

while(str1[lenstr1] != '\0'){  lenstr1++;  }

This initializes the current index and the returned index to 0

int index = 0; int retIndex=0;

This iterates through str1

for(int i=lenstr1-1;i>=0; i--){

This loop is repeated while there are characters in str2

   while (str2[index] != '\0'){

If current element of str2 and str1 are the same

       if (str1[i] == str2[index]){

Set the returned index to 1

           retIndex=1;

Then exit the loop

           break;         }

If otherwise, set the returned index to 0

       else{   retIndex=0;      }

Increase index by 1

  index++;    }

This returns the calculated returned index; if no matching is found, it returns -1

  if (retIndex == 0){   return i;   }else{return -1;}}

}

4 0
3 years ago
Answer the following Python Interview questions • How is Python an interpreted language? • What is the difference between Python
8_murik_8 [283]

Answer:

1. Python is called as interpreted language. However as a programming language it is not fully compiled nor interpreted language. Python program runs from direct source code which makes it byte code interpreted.

An Interpreter is the one which takes the code and performs the actions specified in the code. It turns the code into intermediate language which is again translated to machine language understood by the processor. Interpreted or compiled are the property of the implementation and not of the language.

2. Array : It is a collection of same data type elements stored at contagious memory location. It is handled in python with module array. All the elements of array must be of same data type. In order to manipulate same data types arrays are used.

Ex: array1 = a.array ('i', [10, 20, 30]) this is a array of integer type.

Lists : Python lists are ordered data structure and are like non homogeneous dynamic sized arrays. It may contain integers, strings, boolean, or objects.

Ex: List1 = [70, 89, 98] , List2 = ["Rose", "Lilly", "Jasmine"]

List3 = [1, 10, 100, 'Test', 'Test1']

Tuple : It is a collection of objects separated by commas and they are immutable. It is static which makes them faster.

Ex: tupule1 = ('element1', 'element2')

List and Tuple in Python are the class of data structure. The list is dynamic, whereas tuple has static characteristics.

Lists are mutable but tuples are not.

tuples are mainly used to access the elements where as lists are used in operations like insertion and deletion.

Iterations are time consuming in list where as it is faster in tuples.

tuples don't have inbuilt methods but list has many builtin methods.

tuples takes slightly less memory that lists in Python

Records: Records data structure will have fixed number of fields and each field may have a name and different type. Immutable records are implemented using named tuple.

3. Syntax of slice in python is list[<start>:<stop>:<step>] and it can be used on tuples and lists.

so X [::-1] means that it will start from the end towards the first element by taking each of the elements.

for ex: X = '9876'

X [::-1] will result in '6789'.

Means it will reverse all the elements in the array.

4. Items of list can be shuffled with the random.shuffle() function of a random module.

Syntax is : random.shuffle(x, random)

x- It is a sequence to shuffle and can be list or tuple.

random- it is a optional argument which returns random float number between 0.1 to 1.0.

5. range() – Range function returns a range object which is a type of iterable object.

xrange() – xrange function returns the generator object that can be used to display numbers only by looping. Only particular range is displayed on demand and hence called “lazy evaluation“.

• Return type of range () is range object whereas that of xrange() is xrange object.

• Variable to store the range using range () takes more memory but xrange takes comparative less memory.

• Range returns the list but xrange returns the xrange object. Hence operations on list can be applied for range but not on xrange.

• Xrange is faster to implement than range as xrange evaluates only generator objects.

• Xrange is depreciated in Python 3 and above.

For ex :

x = range (10, 100)

y= xrange (10, 100)

#To know the return type we can print it

print ( return type of range () is : “)

print (type (x))

print ( return type of xrange () is : “)

print (type (y))

Output will be list and xrange respectively.

6. NumPy's arrays are more compact than Python lists

reading and writing items is also faster with NumPy.

Memory taken by python lists are way higher than NumPy arrays.

Python lists don’t support vectorized operation.

Since lists can contain objects of different types its type information must be stored and executed every time operation is performed on it.

Memory taken by python lists are a lot higher than that of NumPy Arrays.

Reading and writing of elements in NumPy arrays are faster than lists.

NumPy arrays are compact and accumulate lesser storage.

Numpy is convenient and efficient.

For ex :

Metrics operations are easy in NumPy.

Checkerboard pattern can be done using NumPy.

7. Attached as Image

8. split() method returns a list of strings after breaking the given string by the specified separator. It is splitting of string into list with each word is a list item.

Syntax : str.split ( separator, maxsplit)

Separator : its is delimiter used and by default whitespace is used as separator.

Maxsplit : Maximum number of times to split the string. By default it has no limit.

For ex:

text = 'apples and oranges are different '

print(text.split())

output will be : ['apples', 'and', 'oranges', 'are', 'different' ]

Explanation:

7 0
3 years ago
Several users are required to transfer files among themselves in a conference room. No APs are available for connections to the
lana66690 [7]
5272838yiwosysbkwhvsjdxbzb
8 0
3 years ago
Overview: For the final project in this course, you will assume the role of a training manager at a cybersecurity firm needing t
Free_Kalibri [48]

<u>Solution and Explanation:</u>

<u>INTRODUCTION </u>

A) Introduction Cybersecurity should be a priority for all businesses so that they can protect their information systems and data assets. Organizations all over the world have been experiencing cyber-attacks. Types of cybercrime include identity theft, ransomware, denial of service attacks, botnets, phishing and social engineering (Khanse, 2014).

Cybersecurity threats exist from both external sources and from within a company. Cybersecurity issues will have impacted businesses financially to the tune of $6 trillion dollars per year worldwide, which is double the amount since 2013. Cybercrime is projected to be more profitable than the global illegal drug trade (Morgan, 2017). CyberLeet Technologies can safeguard businesses against these threats by strictly adhering to the core tenets of cybersecurity which are confidentiality, availability and integrity. CyberLeet will ensure these tenets by identifying vulnerabilities in client systems, implementing data security policies and utilizing threat detection monitoring.

B) Your Role at CyberLeet The role of an information security analyst at CyberLeet Technologies is to enforce the cybersecurity tenets of confidentiality, integrity and availability. This will be accomplished by performing risk assessments of its client’s software, hardware and networks. The analyst must plan and implement security measures to protect client systems, networks and data. Finally, the role includes helping the client engage in security awareness training for its employees (New England College, 2017). The CyberLeet information security analyst will perform job functions which uphold the basic tenets of cybersecurity. The analyst will perform vulnerability assessments of the client systems to ensure the cybersecurity principle of availability. He or she will monitor the client network and systems to safeguard the cybersecurity tenet of confidentiality. Also, the analyst will safeguard the cybersecurity tenet of integrity by protecting client data through the use of data encryption. Other tasks that will be performed include malware analysis, enhancement of security standards, and investigation and documentation of any security breaches. The ultimate goal of an information security analyst at CyberLeet Technologies is to uphold the cybersecurity tenets of confidentiality, integrity and availability by protecting its client systems’ assets, networks and data from cyberattacks.

C) Purpose of This Manual The purpose of this manual is to train new CyberLeet information security analyst recruits about their job duties. These duties include understanding that their client’s organization is subject to information security issues and the fundamental core cybersecurity tenets of confidentiality, integrity and availability must be applied to develop security measures (Henderson, 2017). These threat mitigation security measures include the development of cybersecurity policies including password policies, acceptable use policies, employee training policies, and basic user polices. It is imperative that information security analysts apply the principles and practices outlined in this manual and provide high-quality services to the client. Failure to do so could result in the client experiencing cyber-attacks ranging from malware, phishing, denial of service and ransomware (Khanse, 2014).

CORE TENENTS OF CYBER SECURITY

A) Confidentiality One of the core tenets of cybersecurity is confidentiality. Confidentiality is the preservation of private and proprietary information, such as customer data or health records. Only authorized users should be able access protected information, while unauthorized users should be blocked. Information security requires control on access to protected information (Henderson, 2017). An example of enforcing confidentiality includes the restriction of access to company assets and information via the use authentication and authorization techniques.

B) Integrity The core tenet of integrity is the guarding against improper modification of data or system information. Data integrity is maintained when information remains unchanged during storage, transmission and usage (Henderson, 2017). An example of maintaining system integrity is the prevention of malware which can corrupt computer files. An example of maintain data integrity is the proper encryption of data prior to transmission between systems, to prevent unauthorized access and manipulation.

C) Availability The core tenet of availability is the accessibility of users to systems and data. Availability is maintained when all components of the information system are working properly. Problems in the information system could make it impossible to access information, thereby making the information unavailable (Henderson, 2017).

 

8 0
3 years ago
Other questions:
  • Programmers use _____ languages in the Rapid Application Development (RAD) methodology to facilitate code reuse?
    5·1 answer
  • Set numMatches to the number of elements in userValues (having NUM_VALS elements) that equal matchValue. Ex: If matchValue = 2 a
    6·1 answer
  • Which area of physics governs wireless communication?
    10·2 answers
  • Select the correct answer.
    5·2 answers
  • What disese is sue suffering from
    15·2 answers
  • Brake fluid should be checked __________.
    8·2 answers
  • Write a program to enter length of a square and print area of square.<br>(class 8)​
    9·2 answers
  • Which input and output pair is correct for a bicycle?
    12·1 answer
  • Can anyone answer this ​
    12·1 answer
  • How is information sent across the internet binary
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!