Answer:
Blockchain transactions allow users to control their data through private and public keys, allowing them to own it. Third-party intermediaries are not allowed to misuse and obtain data. If personal data are stored on the blockchain, owners of such data can control when and how a third party can access it.
Explanation:
hope it helps you
Which image-editing tool can be used to help remove spots and other marks from an image?
A. brighten
B. stylize
C. healing brush
D. contrast
E. desaturate
Answer:
c. healing brush
Explanation:
where are all of your documents saved?
Answer:
create a my document folder so you can easily find it
Are items a through e in the following list algorithm? If not, what qualities required of algorithms do they lack?
a. Add the first row of the following matrix to another row whose first column contains a nonzero entry. (Reminder: Columns run vertically; rows run horizontally.)
[1 2 0 4 0 3 2 4 2 3 10 22 12 4 3 4]
b. In order to show that there are as many prime numbers as there are natural numbers, match each prime number with a natural number in matching the first prime number with 1 (which is the first natural number) and the second prime number with 2, the third with 3, and so forth. If, in the end, it turns out that each prime number can be paired with each natural number, then it is shown that there are as many prime numbers as natural numbers.
c. Suppose you're given two vectors each with 20 elements and asked to perform the following operation. Take the first element of the first vector and multiply it by the first clement of the second vector. Do the same to the second elements, and so forth. Add all the individual products together to derive the dot product.
d. Lynne and Calvin are trying to decided who will take the dog for a walk. Lynne suggests that they flip a coin and pulls a quarter out of her pocket. Calvin does not trust Lynne and suspects that the quarter may be weighted (meaning that it might favor a particular outcome when tossed) and suggests the following procedure to fairly determine who will walk the dog.
1. Flip the quarter twice.
2. If the outcome is heads on the first flip and tails on the second, then I will walk the dog.
3. If the outcome is tails on the first flip, and heads on the second, then you will walk the dog.
Answer:
Following are the responses to the given points:
Explanation:
The following features must contain a well-specified algorithm:
Description [tex]\to[/tex] Exact measures described
Effective computation [tex]\to[/tex] contains steps that a computer may perform
finitude [tex]\to[/tex] It must finish algorithm.
In choice "a", there is little algorithm Because it does not stop, finiteness has already been incomplete. There is also no algorithm.
In choice "b", it needs productivity and computational burden. because it's not Enter whatever the end would be.
In choice "c", the algorithm is given the procedure. It fulfills all 3 algorithmic properties.
In choice "d", each algorithm is a defined process. Since it needs finitude.
When you use a rest area, you should:
A. Make sure your windows are closed tightly
B. Stop in a dark place where you can sleep
C. Walk around your car after resting
D. Sleep with the windows rolled down
A company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design
methodology would they be using?
A
structured design
B.
modular design
C.
object-oriented design
rapid application development
D
E
use-case design
Answer:
C. object-oriented design
Explanation:
Answer:
c. object- oriented design.
Explanation:
i took the test.
Explain different types of networking-based attacks
Answer:
Network-based cyber attacks. ... These may be active attacks, wherein the hacker manipulates network activity in real-time; or passive attacks, wherein the attacker sees network activity but does not attempt to modify it
6n^3+n-2 C++ code using Dev
i need only the code
Answer:
A = 6*pow(n,3) +n - 2
Explanation:
I'm not sure if this what you need but that's what I can help you with :)
Which term describes the surrounding area of this image?
The surrounding area of this image is called
Surroundings
Foreground
Background
This area is also called a
Negative
Positive
Neutral
Answer: background/negative
Explanation: the background, is negative space. A solid piece of sculpture occupies space, and makes the space around it come to life.
h. What is recycle bin?
->
Answer:
Trash application, the Recycle Bin
The given SQL creates a Movie table with an auto-incrementing ID column. Write a single INSERT statement immediately after the CREATE TABLE statement that inserts the following movies:
Title Rating Release Date
Raiders of the Lost Ark PG June 15, 1981
The Godfather R March 24, 1972
The Pursuit of Happyness PG-13 December 15, 2006
Note that dates above need to be converted into YYYY-MM-DD format in the INSERT statement. Run your solution and verify the movies in the result table have the auto-assigned IDs 1, 2, and 3.
CREATE TABLE Movie (
ID INT AUTO_INCREMENT,
Title VARCHAR(100),
Rating CHAR(5) CHECK (Rating IN ('G', 'PG', 'PG-13', 'R')),
ReleaseDate DATE,
PRIMARY KEY (ID)
);
-- Write your INSERT statement here:
Answer:
INSERT INTO Movie(Title,Rating,ReleaseDate)
VALUES("Raiders of the Lost ArkPG",'PG',DATE '1981-06-15'),
("The Godfaher",'R',DATE '1972-03-24'),
("The Pursuit of Happyness",'PG-13',DATE '2006-12-15');
Explanation:
The SQL statement uses the "INSERT" clause to added data to the movie table. It uses the single insert statement to add multiple movies by separating the movies in a comma and their details in parenthesis.
A Zookeeper wants you to create a program to keep track of all of the animals in the zoo and people working for him. You are given 4 files: Mammals.txt, Birds.txt, Reptiles.txt, and Personnel.txt. Your task is to create an array of structs for each file to hold the entries. The first line of each file will be a number indicating how many entries are in the file.
Answer:
I don't know you should figure that out good luck
Explanation:
good luck
Explain the complement of a number along with the complements of the binary and decimal number systems.why is the complement method important for a computer system?
olha so olha la que bacana bonito
The complement method are the digital circuits, are the subtracting and the addition was the faster in the method. The binary system was the based on the bits are the computer language.
What is computer?
Computer is the name for the electrical device. In 1822, Charles Babbage created the first computer. The work of input, processing, and output was completed by the computer. Hardware and software both run on a computer. The information is input into the computer, which subsequently generates results.
The term “binary” refers to the smallest and minimum two-digit number stored on a computer device. The smallest binary codes are zero (0) and one (1). The use of storing numbers easily. The computer only understands the binary language. The binary is converted into the number system as a human language. The complement method are the digital circuits the addition and the subtracting was the easily.
As a result, the complement method is the digital circuits are the subtracting to the binary system was the based on the bits are the computer language.
Learn more about on computer, here:
https://brainly.com/question/21080395
#SPJ2
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send a packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we
This project is based on SEED labs by Wenliang Du, Syracuse University.
get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure
a = IP()
a.dst '1.2.3.4
a.ttl = 3
b = ICMP()
send (a/b)
If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result
Task: Sniffing and-then Spoofing
In this task, you will combine the sniffing and spoofing techniques to implement the following sniff- and-then-spoof program. You need two VMs on the same LAN. From VM A, you ping an IP X. This will generate an ICMP echo request packet. If X is alive, the ping program will receive an echo reply, and print out the response. Your sniff-and-then-spoof program runs on VM B, which monitors the LAN through packet sniffing. Whenever it sees an ICMP echo request, regardless of what the target IP address is, your program should immediately send out an echo reply using the packet spoofing technique. Therefore, regard-less of whether machine X is alive or not, the ping program will always receive a reply, indicating that X is alive. You need to use Scapy to do this task. In your report, you need to provide evidence to demonstrate that your technique works.
Answer:
kad ;ikajlfhdakjsfhadskfadhkjfahdjkfadk a jk h
Explanation:
Answer:
is this even a legit question
which internet service is the main reason the internet has expanded and what draws newcomers to the internet?
Answer:
It has spread throughout the world since it is a very useful tool since most things are facilitated, thus leading to a much more efficient daily life, which is why the internet is one of the main means for the functioning of the world today. day, as new technologies have revolutionized
Social media.
The term social media refers to those digital tools that facilitate the transmission of information, communication and social interaction between individuals. Thus, social media allows individuals to relate to each other, in a similar way as if they were physically interacting, but through computer means.
These social media can be from profiles on social networks to blogs, podcasts or even videos on digital platforms. In short, nowadays social media is an integral part of people's social life, and it is in many cases what ends up driving them to use the internet.
Learn more in https://brainly.com/question/21765376
Advantages of special purpose computer
Answer:
The main advantage of the special-purpose systems is the possibility to utilize a much higher fraction of available silicon to actually do calculations. ... All the rest of the calculation, such as the time integration of the orbits of particles, I/O, and diagnostics are handled by a general-purpose host computer..
Explanation:
which among the following if absent, a computer is not complete.
A. mouse
B. DVD
C. user
D. projector
Answer:
user because all the other things the computer need
Combination of one or more columns used to identify particular rows in a relation is a (n)
Answer:
Combination of one or more columns used to identify particular rows in a relation is a key
A key is a combination of one or more columns that is used to identify particular rows in a relation.
KEYS in DBMS (database management system) is an attribute or set of attributes which helps you to identify a row in a relation(table). They allow you to find the relation between two tables.
Keys help you uniquely identify a row in a table by a combination of one or more columns in that table. Key is also helpful for finding unique record or row from the table.
Database key is also helpful for finding unique record or row from the table.
Find out more on DBMS at: https://brainly.in/question/1919695
1. What characteristics are common among operating systems? List types of operating systems, and
examples of each. How does the device affect the functionality of an operating system?
The fundamental software applications running upon that hardware allow unauthorized to the interface so much with the equipment because then instructions may be sent and result obtained.
Some characteristics of OS are provided below:
Developers provide technology that could be suitable, mismatched, or otherwise completely at odds with several other OS categories throughout various versions of the same similar OS.Throughout two different versions, the OS's are often 32 as well as 64-Bit.
Type of OS:
Distributed OS.Time-sharing OS.Batch OS.
Learn more about the operating system here:
https://brainly.com/question/2126669
1. Which of the following is used to operate computers and execute tasks?
A. Software
C. Update
B. Application
D. Upgrade
Answer:
a.software
I hope it hel
What is one way to use proper netiquette when communicating online? Ask permission before posting private information. Post a message when you are angry Use CAPS when sending a message. Use unreliable sources.
Answer: A
Explanation:
Being a responsible netizen you must respect anyone using internet. Be mindful of what you share which include fake news, photos and video of others. Watch you're saying, if you wouldn't say something in real life dont say it online. You must think before you click not to hurt others.
Answer:
Ask permission before posting private information.
Explanation:
Just the most logical answer
1. In what ways a computer system is like a human being
la
2. In what ways is it not like a human being
3. What will happen if the computer is not invented
a computer system can be considered similar to human beings in a way that it needed various parts in order to it to function it humans we need the or such as hurt brain veins exactra while computer need the CPU Ram etc
Write a function solution that, given an integer N, returns the maximum possible
value obtained by inserting one '5' digit inside the decimal representation of integer N.
Examples:
1. Given N = 268, the function should return 5268.
2. Given N = 670, the function should return 6750.
3. Given N = 0, the function should return 50.
4. Given N = -999, the function should return - 5999.
Assume that:
• N is an integer within the range (-8,000..8,000).
In your solution, focus on correctness. The performance of your solution will not be the
focus of the assessment.
Copyright 2009-2021 by Codility Limited. All Rights Reserved. Unauthorized copying, publication or
disclosure prohibited
You did not specified the language, so I did my program in python.
Hope it helps!!!
To copy an item, you would:
O Highlight the item, right click, and select copy
O Press Ctrl + X
O Press Ctrl + Z
O Highlight text
____________ reference is used when you want to use the same calculation across multiple rows or columns.
Answer:
relative cell
Explanation:
So, if you want to repeat the same calculation across several columns or rows, you need to use relative cell references. For example, to multiply numbers in column A by 5, you enter this formula in B2: =A2*5. When copied from row 2 to row 3, the formula will change to =A3
Answer:
Relative
Explanation:
Relative reference is used when you want to use the same calculation across multiple rows or columns.
Can someone tell me how to get rid of the the orange with blue and orange on the status bar
Please and thank you
Picture above
Answer:
Explanation:
i'm not sure how tho
2. It is the art of creating computer graphics or images in art, print media, video games.
ins, televisions programs and commercials.
What are the inputs and outputs of the app "Spotify"?
Hey the I/O for Spotify would be. for I or input keyboard and mouse.
and for O or output the sound files being sent from the server to the pc
Hope this helps.
-Toby aka scav
Answer:
Input is for mics and other tools, output is your audio interface, speakers, headphones, so on. 3. At the top you'll find general system-wide settings, below you find dedicated settings for each open app. You'll need to have Spotify open to see it there.
Explanation:
What is Software Packages
[tex]{\fcolorbox{red}{black}{\white {Answer}}}[/tex]
A software package is an assemblage of files and information about those files. ... Each package includes an archive of files and information about the software, such as its name, the specific version and a description. A package management system (PMS), such as rpm or YUM, automates the installation process.
algorithm and flowchart of detect whether entered number is positive, negative or zero
If columns are labelled alphabetically, what will be the label for the cell in row 1, column 16,384?
AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
Hope this helps!