1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
julia-pushkina [17]
3 years ago
5

What will you see on the next line? >>> int(200.9123)

Computers and Technology
1 answer:
murzikaleks [220]3 years ago
7 0

Answer:

i.d.k

Explanation:

You might be interested in
What determines whether you can run two programs at the same time or connect your computer to a network?
GuDViN [60]
How your computer is built. Processor... Wireless card.... network card... ethernet ports...
4 0
4 years ago
An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the
djyliett [7]

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

<em>Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization. </em>

5 0
3 years ago
What operating system allows various teams in its office to network and collaborate on projects
Nataliya [291]
It depends what youre doing. If youre doing a collab project you could use mac, windows, or linux. But the basis and best option is Windows Professional 64bit.
5 0
3 years ago
Hiiiiiiiiiii hiiiiiiiiiiiiiiiiiii
jenyasd209 [6]

Gimme Brainliest.

--------------------------

5 0
3 years ago
Read 2 more answers
Create a class ""Student"" that will hold an array of grades and has a method to calculate the average. It would also have a met
morpeh [17]

Answer:

#include <iostream>

#include<time.h>

using namespace std;

class Student

{

   public :

   int grades[20]; //array of grades

   

   double average(int arr[],int n) //method to calculate average of array of grades passed

   {

       int sum=0;

       for(int i=0;i<n;i++)  //loop to calculate sum of all grades

           sum=sum+arr[i];

       return sum/n;   //average is sum of items/number of items

   }

   int get_grade() //method to return grade number(1-14)

   {

       srand(time(NULL));  //method to generate different random number each time

       int num = rand() % 14 + 1;  //method to generate random number b/w 1-14

       return num;

   }

};

int main()

{

   Student s;

   int grade[]={5,3,9,8,10};

   cout<<"Average is : "<<s.average(grade,5);

   return 0;

}

OUTPUT :

Average is : 7

Explanation:

A class Student is created in which a method named average is there to calculate average of the grades passed and a method to generate a grade number b/w 1-14.

5 0
3 years ago
Other questions:
  • 3.34 LAB: Mad Lib - loops in C++
    14·1 answer
  • To delete the hyperlink but keep the text, right-click the hyperlink cell, and then click ____ hyperlink
    14·1 answer
  • The expectations I would discuss with Erica regarding the usage of the internet
    6·1 answer
  • Which of the following about Java arrays is true?
    14·1 answer
  • Tiffany is writing a program to help manage a bake sale. She writes the following code which prompts the user to enter the total
    15·1 answer
  • When do we use SAVE and SAVE AS in saving artwork in adobe illustrator?<br> PLEASE HELP ASAP
    11·1 answer
  • Write convert() method to cast double to int
    7·1 answer
  • The goal of a system is to
    10·1 answer
  • A(n) ________ is a wonder of miniaturization combining a CPU, GPU, and sundry other support logic onto a single silicon die, sav
    9·1 answer
  • Differentiate between symmetric and asymmetric encryption
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!