1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kozerog [31]
3 years ago
7

What are the important points

Computers and Technology
1 answer:
LUCKY_DIMON [66]3 years ago
6 0

Answer:

You must evaluate information

Explanation:

The first step to thinking critically is to accept information only after evaluating it. Whether it's something read or heard, critical thinkers strive to find the objective truth. In doing this, these employees evaluate by considering possible challenges and solutions. This process of vetting new information and considering outcomes is called evaluation.

You might be interested in
Given two integer arrays, largerArray with 4 elements, and smallerArray with 3 elements. What is the result after this code exec
kherson [118]

Answer:

A. All of the elements of secondArray will get copied to firstArray.

Explanation:

The correct iteration code is:

for(i =0; i<4;++i) {

largerArray[i] = smallerArray[i];

}

From the question, we understand that the largerArray has a size of 4 elements while the smallerArray has a size of 3 elements

Take for instance largerArray is {1,2,3,4} and smallerArray is {5,6,7}

Next, we analyze the loop

1. for(i =0; i<4;++i) {  --->This iterates from index 0 to index 3

2. largerArray[i] = smallerArray[i]; ---- > This assigns the elements of the smallerArray to largerArray.

However, it should be noted that the smallerArray has a maximum index of 2 while the largerArray has a maximum index of 3

The content of largerArray after the iteration will be:

largerArray = {5,6,7,5}

This is so because,

When i = 0

largerArray[0] = smallerArray[0] = 5

When i = 1

largerArray[1] = smallerArray[1] = 6

When i = 2

largerArray[2] = smallerArray[2] = 7

When i = 3

largerArray[3] = smallerArray[0] = 5

Notice that the last iteration refers to smallerArray[0]; this is so because index 3 do not exist in smallerArray. Hence, the index will be returned to the first index of the smallerArray

Taking largerArray as the firstArray and smallerArray as the secondArray.

We can conclude that option A answers the question because all elements in smallerArray is copied to firstArray

3 0
3 years ago
CSCU EXAM TEST FINAL1-A software or hardware that checks information coming from the Internet and depending on the applied confi
Nastasia [14]

Answer:

1. Firewall.

2. Router.

3. Proxy.

4. SMTP, 25.

Explanation:

1. A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

Furthermore, firewalls are typically bidirectional, it checks all sent and received data and only allow authorized traffic through.

2. A router can be defined as a network device that is designed typically for forwarding data packets between two or more networks based on a well-defined routing protocol.

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

3. A proxy can be defined as a computer network service designed to avail end users (clients) the ability to connect indirectly to other network services. For example, a reverse proxy is a type of server that is placed right in front of other servers such as a web server and forwards or routes the user's (client) requests to those servers sitting behind it. When properly configured, reverse proxy helps to ensure security, reliability and good performance of a network.

4. A spam filter can be defined as a software program designed to process all incoming electronic messages (e-mails) and prevents any unsolicited or unwanted mail (spam) from entering the inbox of a client.

Generally, a spam filter uses SMTP with port number 25 to carry out its services.

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

3 0
3 years ago
Python: Write a program for a small restaurant that sells pizzas. You may consider it as a prototype of a realistic online appli
katrin2010 [14]

Answer:

Name: tyler

Number of pizzas: 2

Small (10 inch, $7.95), Medium (12 inch, $9.95), and Large (14 inch, $11.95)

Pizza size: large

Available toppings: Ham, Mushrooms, Onions, Green Peppers, Black Olives, Tomatoes, Pineapple, Spinach

$0.75 each for Small Pizza, $0.95 each for Medium Pizza, and $1.15 each for Large Pizza

Number of toppings: 2

Enter topping number 1: ham

Enter topping number 2: onions

Order Summary:  

Customer Name: tyler

2 large pizzas with ['ham', 'onions']        

Subtotal | Sales Tax (6%) | Total Cost        

26.2 | 1.5719999999999998 | 27.772

Explanation:

name = input("Name: ")

num_pizzas = int(input("Number of pizzas: "))

print("Small (10 inch, $7.95), Medium (12 inch, $9.95), and Large (14 inch, $11.95)")

pizza_size = input("Pizza size: ").lower()

print("Available toppings: Ham, Mushrooms, Onions, Green Peppers, Black Olives, Tomatoes, Pineapple, Spinach")

print("$0.75 each for Small Pizza, $0.95 each for Medium Pizza, and $1.15 each for Large Pizza")

num_toppings = int(input("Number of toppings: "))

toppings = []

subtotal = 0

tax = 0

total = 0

for i in range(1,num_toppings + 1):

   toppings.append(input(f"Enter topping number {i}: "))

if pizza_size == 'small':

   subtotal += num_pizzas * 7.95

   subtotal += num_toppings * 0.75

   tax += subtotal * 0.06

   total += subtotal + tax

   print("Order Summary: ")

   print(f"Customer Name: {name}")

   print(f"{num_pizzas} {pizza_size} pizzas with {toppings}")

   print("Subtotal | Sales Tax (6%) | Total Cost")

   print(f"{subtotal} | {tax} | {total}")

if pizza_size == 'medium':

   subtotal += num_pizzas * 9.95

   subtotal += num_toppings * 0.95

   tax += subtotal * 0.06

   total += subtotal + tax

   print("Order Summary: ")

   print(f"Customer Name: {name}")

   print(f"{num_pizzas} {pizza_size} pizzas with {toppings}")

   print("Subtotal | Sales Tax (6%) | Total Cost")

   print(f"{subtotal} | {tax} | {total}")

if pizza_size == 'large':

   subtotal += num_pizzas * 11.95

   subtotal += num_toppings * 1.15

   tax += subtotal * 0.06

   total += subtotal + tax

   print("Order Summary: ")

   print(f"Customer Name: {name}")

   print(f"{num_pizzas} {pizza_size} pizzas with {toppings}")

   print("Subtotal | Sales Tax (6%) | Total Cost")

   print(f"{subtotal} | {tax} | {total}")

7 0
3 years ago
A network admin configures a static route on the edge router of a network to assign a gateway of last resort (the router that co
kupik [55]

Answer:

Use the default-information originate command.

Explanation:

A network administrator customizes a fixed path on a channel's edge router for creating any last recourse gateway that is the router connecting to the online / ISP. So, they using the usual command source to customize the edge router to connect this path instantly using RIP.

That's why the following answer is correct according to the scenario.

8 0
3 years ago
Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server
adelina 88 [10]

Answer: C. Differential backup

Explanation: There are several ways od ensuring the preservation and storage of data even cases of disaster, one of such ways is data data mirroring which allows data to be replicated or copied in real time and several backup options. In cases where there there is need to restore a server, the warm recovery site provides a data or disaster recovery option used to mitigate the effect of data loss on organization. In the absence of data mirroring, differential backup option, provides the quickest recovery option as it only requires changes in the data stored after the last full backup. These speed experieced should be expected due to the relatively low data been dealt with rather than the entire data.

5 0
3 years ago
Other questions:
  • How do smart watches affect the business and its position in the global marketplace?
    12·2 answers
  • Which best describes a VPN?
    14·2 answers
  • What are computers used for?
    14·2 answers
  • The software program you need to have to read PDF file, such as the PDF files you download from your My Courses page, is
    9·2 answers
  • Edhesive coding practice 3.4​
    12·1 answer
  • You want to change your cell phone plan and call the company to discuss options. This is a typical example of CRM that focuses o
    9·1 answer
  • Identify the normalized form of the mantissa in 111.01.
    14·1 answer
  • 1. If we want define style for an unique element, then which css selector will
    14·1 answer
  • Why are women more exposed to mass media?
    9·2 answers
  • Explain how you would set up a Demilitarized Zone on. You have 25 workstations and a server on your site. Explain what additiona
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!