Answer:
public static void print_popcorn_time(int bag_ounces){
if(bag_ounces<3){
System.out.println("Too Small");
}
else if(bag_ounces>10){
System.out.println("Too Large");
}
else{
bag_ounces*=6;
System.out.println(bag_ounces+" seconds");
}
}
Explanation:
Using Java prograamming Language.
The Method (function) print_popcorn_time is defined to accept a single parameter of type int
Using if...else if ....else statements it prints the expected output given in the question
A complete java program calling the method is given below
public class num6 {
public static void main(String[] args) {
int bagOunces = 7;
print_popcorn_time(bagOunces);
}
public static void print_popcorn_time(int bag_ounces){
if(bag_ounces<3){
System.out.println("Too Small");
}
else if(bag_ounces>10){
System.out.println("Too Large");
}
else{
bag_ounces*=6;
System.out.println(bag_ounces+" seconds");
}
}
}
The input function reads a piece of data that has been entered at the keyboard and returns that piece of data, as a string, back to the program. This function is designed to accept data directly from the user, Similar function is the function raw_input() used in Python programming, which asks the user for a string of data (ended with a newline), and simply returns the string.
Web conferencing is an internet technology that allows people in remote locations collaborate in a virtual conference room by making presentations and sharing visual aids.
Let me know if you have any questions.
Answer:
The correct answer is option (D) Identify the impact on safety of the property
Explanation:
Solution
In every Business Impact Analysis, the first and the most important step is for the CISO is to identify and estimate the impact of the aftereffects on the business and property of an organization that may be occurred from the disaster.
Physical security is very important, but it is not noticed by most organizations. It is important if you do not want anyone to take away your information or destroy it, in case of natural calamity. the reason could be that, the intruder is doing it for his personal achievement, financial gain,or seeking revenge or when one is taken unaware and becomes a target. If this security is not maintained properly all the safety measures will not be useful once the attacker gets through by gaining physical access.
Example of property can be software, equipment, facilities, company’s assets.