1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Anestetic [448]
4 years ago
15

trhy356yjetyi46ui y j4yhnpug 2utg[ 2[ 24[ou [o24t

Computers and Technology
1 answer:
Mashcka [7]4 years ago
5 0
This is not a question It's free 5 points!
You might be interested in
Alexa hoped that a good outline will accomplish which of the following for her<br> presentation?
atroni [7]

Answer: A. Help her distinguish between main topics and subtopics.

Explanation: APEX

6 0
3 years ago
Read 2 more answers
What should every Software Engineer know about Software Architecture?
Alenkinab [10]
<span>!UML (all of them)
2.Flowchart (more for understanding a real world process of some kind; like a business process)
3.Data model including Bachman (if you don't need to at least understand your data, how it is stored versus a model, i.e., Bachman then you are doing it wrong and your schema could be simplistic)
This is 3 different examples</span>
6 0
3 years ago
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
2. Using the Book class developed in HW 4, write an application, BookLibrary, that creates a library (array) of up to 10 books a
qwelly [4]

BookLibrary, that creates a library (array) of up to 10 books. If the user selects the add option, issue an error message if the library is full.If the book with that title exists, issue an error message

Explanation:

import java.util.Scanner;

import java.util.Arrays;

public class Derro_BooksLibrary {

public static void main(String[] args) {

 Derro_Books[] Library = new Derro_Books[10];

 Scanner scan = new Scanner(System.in);

 Derro_Books book1 = new Derro_Books("", 20);

 Derro_Books book2 = new Derro_Books("hi", 10);

 Library[0] = book1;

 Library[1] = book2;

 System.out.println("Enter 1 for add, 2 for delete, 3 for change, 4 to stop application: ");

 int answer = scan.nextInt();

 int counter = 0;

 int z = 0;

 while (true) {

  if (answer == 1) {

   for (Derro_Books book : Library) {

    counter = counter + 1;

   }

   if (counter == 10) {

    System.out.println("Library full");

   }

   System.out.println("Enter Title: ");

   String title = scan.nextLine();

   for (int i = 0; i < Library.length; i++) {

    if (title == Library[i].getTitle()) {

     System.out.println("No Duplicated Books Titles Are Allowed");

     break;

    }

    else {

     z++;

    }

   }

   if (z < Library.length) {

   System.out.println("Enter number of pages: ");

   int pages = scan.nextInt();

   Library[z + 1] = new Derro_Books(title, pages);

  }

  if (answer == 2){

   if (Library.length == 0) {

    System.out.println("Library is empty");

   }

   System.out.println("Enter title of book: ");

   String title2 = scan.nextLine();

   for (int d = 0; d < Library.length; d++) {

    if (title2 == Library[d].getTitle())

     // Delete book

     System.out.println("Deleted book: " + title2);

    else

     System.out.println("Book does not exist");

   }

  }

  if (answer == 3) {

   if (Library.length == 0) {

    System.out.println("Library is empty.");

   } else {

    System.out.println("Enter book title: ");

    String title3 = scan.nextLine();

    for (int y = 0; y < Library.length; y++) {

     if (title3 != Library[y].getTitle())

      continue;

     else {

      System.out.println("Enter number of pages: ");

      int pages = scan.nextInt();

      Library[y] = new Derro_Books(title3, pages);

     }

    }

   }

  }

  String[] StringList = new String[10];

  for (int y = 0; y < Library.length; y++) {

   StringList[y] = Library[y].getTitle();

  }

  Arrays.sort(StringList);

  for (String bookt : StringList) {

   System.out.println(bookt + Library);

  }

 }

}

}

}

6 0
4 years ago
Text line breaks and returns are controlled using which tags?
eduard
<b></b> <span>element when used to strongly emphasize portions of text within a document.
<p></p> </span><span>tag defines a paragraph.
<ol></ol> </span><span>Defines an ordered list
<a></a> </span><span> tag defines a hyperlink</span>
5 0
3 years ago
Read 2 more answers
Other questions:
  • An email address is made up of all of the following parts except
    13·2 answers
  • Create a class named CarRental that contains fields that hold a renter's name, zip code, size of the car rented, daily rental fe
    13·1 answer
  • 1) List at least five smaller behaviors you could break the complex behavior "brushing my teeth" into.
    14·2 answers
  • Describe how asymmetric encryption is used to send a message from User A to User B that assures data confidentiality, authentica
    9·1 answer
  • It is not important to keep financial records since they can all be found online.
    5·2 answers
  • _____ include the people, procedures, hardware, software, data, and knowledge needed to develop computer systems and machines th
    11·1 answer
  • Complete the sentence.<br> The IP protocol creates and addresses packets at the _____ layer.
    7·2 answers
  • What does a pencil icon in the row selector area indicate?
    7·1 answer
  • What is the best wi-fi name you have ever seen?
    10·1 answer
  • Which are the 2 main elements that’s make up computer architecture?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!