1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa05 [86]
3 years ago
8

Pls help computer science I will give brainliest

Computers and Technology
2 answers:
a_sh-v [17]3 years ago
6 0

Answer: Hardware Management

Reason: Depends on the driver type

marissa [1.9K]3 years ago
5 0

Answer:

A driver assists with hardware management.

Hope this helped.

You might be interested in
Write a program that prompts the user to enter positive integers (as many as the user enters) from standard input and prints out
julia-pushkina [17]

Answer:

Here is the JAVA program that prompts the user to enter positive integers from standard input and prints out the maximum and minimum values:

import java.util.*;

public class Ex0603 {

   public static void main(String[] args) { //start of main function

   Scanner in = new Scanner(System.in); //creates Scanner class object to take input from user

   int minimum = 0; //stores the minimum of the integers

   int maximum = 0; //stores the minimum of the integers

   int num; //stores the positive integer values

   System.out.println("enter a positive integer: ");//prompts user to enter a positive integer

   num = in.nextInt();//scans and reads the input integer value from user

   minimum = num;  //assigns value of num to minimum

   while(true) {//while loop keeps prompting user to enter a positive integer

       System.out.println("enter a positive integer: ");//prompts user to enter a positive integer

       num = in.nextInt();//scans and reads the input integer value from user

       if(num <=0)//if the user inputs a negative integer or 0

           break; //breaks the loop

       if (num > maximum) {//if the value of positive integer is greater than the maximum of value

           maximum = num; } //assigns that maximum value of num to maximum variable

       if (num < minimum) {//if the value of positive integer is less than the minimum of value

           minimum = num; //assigns that minimum value of num to minimum       }    }            

   System.out.println("The maximum integer is : " + maximum); //displays the maximum of the positive integers

   System.out.println("The minimum integer is : " + minimum); }}   //displays the minimum of the positive integers

Explanation:

Here is the JAVA program that that prompts the user to enter an integer N, then reads N double values, and prints their mean (average value) and sample standard deviation:

import java.util.*;  

public class Ex0603 {  

public static void main(String[] args) { //start of main function

Scanner in = new Scanner(System.in);  //creates Scanner class object to take input from user

double integer= 0;  //to store the number of input values

double sum = 0;  //to store the sum of input numbers

double mean = 0;  //to store the average of numbers

double sd = 0;  //to store the standard deviation result

double variance = 0;  //to store the variance result

double sumSquare = 0;  //to store the sum of (num-mean)^2

int n = 0;  //to store the sample size N

   System.out.println("Enter an integer: ");  //prompts user to enter an integer that is how many elements user wants to input

   integer = in.nextInt();  //reads the value of integer from user

   double size=integer; // declares a double type variable and assigns value of int type variable integer to this double type variable size

   int i=0;  //used to point each element of the num array

   double num[] = new double[(int)size];  //declares an array to hold the numbers input by user

   while(integer>0){  //loop executes until value of integer is greater than 0

   System.out.println("Enter a number: "); // prompts to enter a number

   num[i] = in.nextDouble(); //reads double values

   sum += num[i];  //adds the values stored in num array

   i++;  //increments i to point to the next element in num array

   n++;  //increments n to count the total number of elements

  integer--; //decrements integer value at each iteration

   mean = sum / n;    }  //compute the average of values

   i=0;  

    while(size>0){  //loop executes until value of size exceeds 0

       sumSquare += Math.pow(num[i]-mean,2); //takes the sum of square difference between each element of num array and value of mean

       i++; //increments i

      size--;   }  //decrements size

variance = sumSquare / (n-1);  //compute variance by dividing the result of sum of the squares of their differences from the mean by n-1

   sd = Math.sqrt(variance);  //computes standard deviation by using sqrt function which takes the sqrt of the result of variance computed above

System.out.println("Average value is: " + mean+ " and the standard deviation is " + String. format("%.2f", sd));   }} //displays the average of numbers stored in mean variable and value of standard deviation is displayed up to 2 decimal places

Screenshots of both programs and their outputs is attached.

7 0
3 years ago
What are the most recent attacks on computer security that you face this month? Use the Internet to search for the latest attack
grigory [225]

Answer:

Now a days every thing can be done on the internet easily but this internet has various drawbacks with that as the most of our personal information we share on internet these days so if anyone attacks on your server then he/she can easily access all the private information including financial details and this attack is known as cyber attack. there are various ways to attack on the internet some of them are-

1.Malware- it is shortly known as the malicious software, malware can be described as worms, viruses, trojans these all are variety of malware which provide root access to the attacker by which they can control the system remotely.

2.phising- This is a technique by which the criminals craft emails to fool a target into taking some harmful action. The recipient might be tricked in downloading malware that disguised as an important document for instance or argued toclick on that link that takes them to a fake website where they can get the password which are necessary for any transaction.

3.Ransomware- This is like a malware which is stored in the computer and easily encrypt all the necessary files of the victim's computer and after that they demand some ransom to decrypt it.

4.SQL injection- This is the process by which the SQL command gets injected by the attacker into the victim's system so that the attacker can easily gather all the necessary information which they want to take control on the system.

These attacks are very dangerous for the system because the attacker can get all the necessary information about the user and can easily harm him/her by getting their personal information.

There are various steps to prevent these attacks which are-

I.secure your hardware- The user has to prevent their hardware from lost or steal. protect all devices with a complicated password, share that password with the device user only.

II.Encrypt and backup data- You have to prevent your data by making the backup of the necessary files so that if any of your information gets lost then you can retrieve it from your backup.

III. create a security focused workplace- Employees are the most common ways of breaching of the data as many don't recognise the external threats the internal one breaches the security and it cause the loss of the information.

some latest viruses are-

1.cyborg ransomware-This virus is present in the floppy disk which is used by the user and can cause the count of time the system reboot. it's new variant is present in windows 10.

2.Gobrut-This is also one of the latest viruses it is capable enough to detect weak passwords and can cause loss of information.

3.jokeroo-This virus works as the ransomware their author spread it in the computer system which will encrypt the files and for decrypting it they demand ransom for that.

4.Trojan Glupteba- Once this virus enters the system the user cannot know that the system is infected and it will slowly communicates with the IP of the system which results in loss of the confidential information.

Most vulnerable platforms are-

1.Social engineering- The social networking sites has most of your personal information of the user which can be used by the attacker to get the necessary information.

2.cloud computing services- More companies use to store their most of the information on the cloud which is used by the attacker to get the confidential passwords which can cause loss of the essential information.

Explanation:

6 0
3 years ago
What is the unit of measure that specifies the value of cellspacing?
katrin2010 [14]
Pixel is the answer
8 0
3 years ago
Which of the following statements is true? a. Predicate methods typically test a condition and modify the object on which they'r
egoroff_w [7]

Answer:

C

Explanation:

Predicate methods typically test a condition and do not modify the object on which they're called.

3 0
3 years ago
What is printed by the following program? var numApples = 10; var numOranges = 5; if(numApples &lt; 20 || numOranges == numApple
Travka [436]

Answer:

The output of the following code is "Hello, we are open! Sincerely, the grocery store ".

Explanation:

In the given code firstly we declare the variable that is numApples and numOranges. In this variable we assign value and the datatype of the variable is var. The var datatype can hold any type of data. Then we use the conditional statement. In the conditional statement, we use the OR logical operator. In the if block we check the condition that is if numApples variable value is less then 20 OR numOranges variable value is equal to numApples then it will print "Hello, we are open!". In the else block it will print "Sorry, we are closed!". In the last, we print "Sincerely, the grocery store".So in this question, if block is executed and the additional message is printed.

6 0
3 years ago
Other questions:
  • Describe an application where a parallel circuit might work better than a series circuit.
    15·1 answer
  • Implement a program to measure the impact of application-level buffer sizes on read time. This involves writing to and reading f
    13·1 answer
  • What command can be used to export an nps backup file named npsconfig.xml that can be used to restore nps configuration on anoth
    12·1 answer
  • What is a protein called if it loses its shape?
    8·1 answer
  • Different network scenarios require the
    9·1 answer
  • Google Glass, glasses that allow you to take pictures and search online by speaking commands, are introduced at a technology tra
    8·1 answer
  • When Twitter is used to gather a large group for a face-to-face meeting it is called
    10·1 answer
  • Which view is most often used to reorder slides in a presentation that has already been created?
    15·2 answers
  • Alguien porfavor me dice como cambiar de idioma en brainly
    15·1 answer
  • What is technology?5points​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!