Answer:
Low-level security is designed to detect and impede some unauthorized external activity.
Examples of low-level security systems include:
Basic physical obstacles to defense Locks for increased-security Simple lighting coverage Standard alarm SystemsExplanation
Protection devices that prevent and track any unwanted external actions are called Low-Level security measures.
Other obstacles to the installation of the security system, such as reinforced doors, fences, high-security locks, and window bars and grates, are often installed after simple physical protection barriers and locks have been created.
Also, a simple lighting system that could not be more complex than the standard security lighting systems over windows and doors and a regular security warning system that will be an unattended unit that offers monitoring capability and sound warnings at the location of unwanted entry.
Storage facilities, convenience shops, and small business premises are some of the locations that incorporate low-level security devices.
Cheers
Write some code that assigns True to the variable is_a_member if the value assigned to member_id can be found in the current_members list. Otherwise, assign False to is_a_member. In your code, use only the variables current_members, member_id, and is_a_member.
Answer:
current_members = [28, 0, 7, 100]
member_id = 7
if member_id in current_members:
is_a_member = True
else:
is_a_member = False
print(is_a_member)
Explanation:
Although it is not required I initialized the current_members list and member_id so that you may check your code.
After initializing those, check if member_id is in the current_members or not using "if else" structure and "in" ("in" allows us to check if a variable is in a list or not). If member_id is in current_members, set the is_a_member as True. Otherwise, set the is_a_member as False.
Print the is_a_member to see the result
In the example above, since 7 is in the list, the is_a_member will be True
g Unlike when you create a String, when you create a StringBuilder, you must use the keyword ____________.
Answer:
Unlike when you create a String, when you create a StringBuilder, you must use the keyword new
Explanation:
Strings are used in programming which also opens the way for StringBuilder to be used too. In javascript, for instance, variables are useful for storing data, We have "Let" and "const" variables. Const variables cannot be changed after they’re created. The data stored are in types an example is a string. Strings allow one to write a value and store the result in a variable.
For example, using the dot operator, when you:
console.log('love'.length); // Prints 4
Note that console.log() allows the computer to evaluate the expression inside the parentheses and print that result to the console.
.length prints 4 as the result. This shows how the string has a property that stores the number of characters in that string.
StringBuilder with the keyword "new" is used when we want to change or modify data property stored in a string.
3.2 lesson practice edhesive
Answer:
3.2 Question 1
x = float(input("Enter a number: "))
if (x > 45.6):
print("Greater than 45.6")
3.2 Question 2
x = float(input("Enter your grade: "))
if (x >= 90):
print("Great! ")
Explanation:
I hope this works I do not know exactly what you were asking for
Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules of RPS Prompt player_1 for their move To make sure player_2 can't see what player_1's move was, insert: print('*** NO CHEATING ***\n\n' * 20) Prompt player_2 for their move Design and develop an IF-ELSE structure to play the game IF player_1's move equivalent to player_2's move, "It's a tie" "rock" beats "scissors" "scissors" beats "paper" "paper" beats "rock" Make sure you test for valid input!!
Answer:
'''
Rock, Paper, Scissors:
The Rules:
If player1's move equivalent to player2's move, "It's a tie".
"rock" beats "scissors", "scissors" beats "paper", and "paper" beats "rock"
'''
player_1 = input("Player 1's move: ")
print('*** NO CHEATING ***' * 20)
player_2 = input("Player 2's move: ")
if player_1 or player_2 not in ["rock", "paper", "scissors"]:
print("Invalid input!")
if player_1 == player_2:
print("It's a tie")
else:
if player_1 == "rock":
if player_2 == "scissors":
print("Player 1 won")
elif player_2 == "paper":
print("Player 2 won")
elif player_1 == "scissors":
if player_2 == "paper":
print("Player 1 won")
elif player_2 == "rock":
print("Player 2 won")
elif player_1 == "paper":
if player_2 == "rock":
print("Player 1 won")
elif player_2 == "scissors":
print("Player 2 won")
Explanation:
In the comment part, put the header and the rules of the game
Ask the user to enter the player1's move
Print the asterisks
Ask the user to enter the player2's move
If any of the input is not "rock", "paper", "scissors", state that the input is invalid
Check the inputs. If they are equal, print that it is a tie. Otherwise:
If player1's move is rock. Check player2's move. If it is "scissors", player1 wins. If it is "paper", player2 wins
If player1's move is scissors. Check player2's move. If it is "paper", player1 wins. If it is "rock", player2 wins
If player1's move is paper. Check player2's move. If it is "rock", player1 wins. If it is "scissors", player2 wins
Which of the following industries does not use technology?
Medicine
Marketing and advertising
Law enforcement
Arts and entertainment
None of the above
Answer:
None of the above
Explanation:
Medicine uses technology to research
Advertiseres use platforms like Instagram to share the product they are promoting
Law enforcement uses tech to pull up databases of people's records
Arts and entertainment use them to create (in some cases), share, and sell their art.
Hope this helps!
Answer:
E
Explanation: got it right on edge 2020
#include
using namespace std;
const int SIZE = 4;
bool isSorted(const int arr[], int size);
bool isNonDecreasing(const int arr[], int size);
bool isNonIncreasing(const int arr[], int size);
void printArr(const int arr[], int size);
int main()
{
int test1[] = { 4, 7, 10, 69 };
int test2[] = { 10, 9, 7, 3 };
int test3[] = { 19, 12, 23, 7 };
int test4[] = { 5, 5, 5, 5 };
if (!isSorted(test1, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr(test1, SIZE);
if (!isSorted(test2, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr(test2, SIZE);
if (!isSorted(test3, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr(test3, SIZE);
if (!isSorted(test4, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr(test4, SIZE);
return 0;
}
bool isSorted(const int arr[], int size)
{
// TODO: This function returns true if the array is sorted. It could be
// sorted in either non-increasing (descending) or non-decreasing (ascending)
// order. If the array is not sorted, this function returns false.
// HINT: Notice that the functions isNonDecreasing and isNonIncreasing are not
// called from main. Call the isNonDecreasing and isNonIncreasing functions here.
}
bool isNonDecreasing(const int arr[], int size)
{
// TODO: Loop through the array to check whether it is sorted in
// non-decreasing (in other words, ascending) order. If the array
// is non-decreasing, return true. Otherwise, return false.
}
bool isNonIncreasing(const int arr[], int size)
{
// TODO: Loop through the array to check whether it is sorted in
// non-increasing (in other words, descending) order. If the array
// is non-increasing, return true. Otherwise, return false.
}
void printArr(const int arr[], int size)
{
for (int i = 0; i < size; i++)
cout << arr[i] << " ";
cout << endl << endl;
}
Output
SORTED
4 7 10 69
SORTED
10 9 7 3
NOT SORTED
19 12 23 7
SORTED
5 5 5 5
Code
//The added part is in the bottom
#include <iostream>
using namespace std;
const int SIZE = 4;
bool isSorted (const int arr[], int size);
bool isNonDecreasing (const int arr[], int size);
bool isNonIncreasing (const int arr[], int size);
void printArr (const int arr[], int size);
int
main ()
{
int test1[] = { 4, 7, 10, 69 };
int test2[] = { 10, 9, 7, 3 };
int test3[] = { 19, 12, 23, 7 };
int test4[] = { 5, 5, 5, 5 };
if (!isSorted (test1, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr (test1, SIZE);
if (!isSorted (test2, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr (test2, SIZE);
if (!isSorted (test3, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr (test3, SIZE);
if (!isSorted (test4, SIZE))
cout << "NOT ";
cout << "SORTED" << endl;
printArr (test4, SIZE);
return 0;
}
bool
isSorted (const int arr[], int size)
{
//Added part
if (isNonDecreasing (arr, size) || isNonIncreasing (arr, size))
{
return true;
}
else
{
return false;
}
}
bool
isNonDecreasing (const int arr[], int size)
{
for (int i = 0; i < (size - 1); i++)
{
if (arr[i] > arr[i + 1]) //It compares the n value with the n-1 value and output
{
return false;
break;
}
}
return true;
}
bool
isNonIncreasing (const int arr[], int size)
{
for (int i = 0; i < (size - 1); i++)
{
if (arr[i] < arr[i + 1]) //It compares the n value with the n-1 value and output reautilization of previous function by replacing only “<”
{
return false;
break;
}
}
return true;
}
void
printArr (const int arr[], int size)
{
for (int i = 0; i < size; i++)
cout << arr[i] << " ";
cout << endl << endl;
}
Before inserting a preformatted table of contents, what must you do first?
apply heading styles to text
update the table of contents
navigate to the Review tab and the Table of Contents grouping
navigate to the Insert Table of Contents dialog box
Answer: apply heading styles to text.
Explanation:
What are the four components of the Universal Systems Model?
Answer:
output, process, input, and feedback
Explanation:
How to get passed administrattor on macbook air to get games and stuff.
Answer:
You need to use the name and password of the main owner of the computer/the account you made when you first got it. Then, you should be able to download apps and use it if you have your apple ID set up.
Explanation:
What is one reason to create a study check list
Which term describes a repository that holds pairs of entries to translate a domain name to an IP address? Select 2 options.
a. name server
b. domain server
c. root server
d. domain name system
e. domain lookup
Answer:
I said name server and domain name system, although it may not be correct.
Answer:
A and D
Explanation:
1. Add an import statement above the class declaration to make the Scanner class available to your program.
2. In the main method, create a Scanner object and connect it to the System.in object.
3. Prompt the user to enter his/her first name.
4. Read the name from the keyboard using the nextLine method, and store it into a variable called firstName (you will need to declare any variables you use).
5. Prompt the user to enter his/her last name.
6. Read the name from the keyboard and store it in a variable called lastName.
7. Concatenate the firstName and lastName with a space between them and store the result in a variable called fullName.
8. Print out the fullName.
9. Compile, debug, and run, using your name as test data.
10. Since we are adding on to the same program, each time we run the program we will get the output from the previous tasks before the output of the current task.
Answer:
import java.util.Scanner;
public class Assignment{
public static void main(String [] args)
{
Scanner input = new Scanner(System.in);
String firstName, lastName;
System.out.print("Firstname: ");
firstName = input.nextLine();
System.out.print("Lastname: ");
lastName = input.nextLine();
String fullName = firstName +" "+lastName;
System.out.print(fullName);
}
}
Explanation:
I'll use the line numbers in the question to point at the corresponding instruction
import java.util.Scanner; -- The import statement (1)
public class Assignment{
public static void main(String [] args)
{
Scanner input = new Scanner(System.in); -- Scanner object (2)
String firstName, lastName; -- Variable declarations
System.out.print("Firstname: "); ---- Prompt to enter first name (3)
firstName = input.nextLine(); --- User input for firstName (4)
System.out.print("Lastname: "); ---- Prompt to enter first name (5)
lastName = input.nextLine(); --- User input for lastName (6)
String fullName = firstName +" "+lastName; --- concatenating both user inputs (7)
System.out.print(fullName); --- Print out fullName (8)
}
}
Nowadays computer games are mostly available on external
hard disk.
Is it true or false?
Answer:
false
Explanation:
because a lot of times they are downloads without the disk
It is false that nowadays computer games are mostly available on external hard disk.
What is hard disk?A hard disk drive (HDD) is a type of computer storage device that uses magnetic storage to store and retrieve digital information.
Hard disks are usually located inside the computer and are used to store the operating system, applications, and user data such as documents, pictures, and videos.
Computer games can be stored on a variety of devices, including internal hard drives, external hard drives, solid state drives, and even cloud storage.
While external hard drives may be a popular option for some users, computer games can be installed and played from a variety of storage devices depending on user preferences and hardware capabilities.
Thus, the given statement is false.
For more details regarding hard disk, visit:
https://brainly.com/question/9480984
#SPJ2
write a program that reads in a number n and prints out n rows each containing n star charactersg
In python:
rows = int(input("How many rows would you like? "))
i = 0
while i < rows:
print("*" * rows)
i += 1
I hope this helps!
Cleary specifying the theme to be used for a site
before building it provides which main advantage:
site navigation
site consistency
O
a clear message
O O O
improved readability
Answer: site consistency
Answer:
B) Site Consistency
Explanation:
What issues will the Internet of Things present to Cybersecurity?
Answer:
The IoT offers new ways for businesses to create value, however the constant connectivity and data sharing also creates new opportunities for information to be compromised. Explore some of the more notable developments in the battle to combat cyber risks.
Explanation:
I hope this helps you. UwU. P.S. Plz mark me Brainlyest
How do I turn on autosave in Pokemon Shield?
Answer:
You Can't
Explanation:There isn't a feature for that in the game.
Answer:
You can't. It really sucks. Just save your game every hour when you play.
PLEASE HURRY!!!
Look at the image below!
Answer:
cde
Explanation:
You start counting from 0.
So letters are:
a b c d e f
0 1 2 3 4 5
We do include the 2, but not the 5. So answer is cde.
If a function does not return a value, which of the follow is correct?Group of answer choicesThe return type is a Swift optional type.The return type must be set to nil.The return type is omitted from the function declaration.
Answer:
In swift programming language it is ok when a function does not return any value you are not necessarily required to set return type because it is optional so the correct answer is "The return type is omitted from the function declaration".
Explanation:
If programing language is swift so we can omit return type from function declaration otherwise if language is C++ we can set return type "Void".
The IP address and the port are both numbers. Which statement is true?
A computer has many IP addresses and many ports.
A computer has one IP address and many ports.
A computer has one IP address and one port,
Acomputer has many IP addresses and one port.
Answer:
A computer has one IP address and many ports.
Explanation:
Answer:
A computer has one IP address and many ports.
Explanation:
WILL MARK AS BRAINLIEST
Describe the environmental issues in India and list ways that technology has been used to address these issues.
India has been having to engineer better technology to better prepare people in india for the brutal monsoon seasons in india
What is a clip art gallery
what tools IS used to mine stones and ores
Answer:
pickaxe
Explanation:
that is the tool u use
A pickaxe or a pick.
Shown in minecraft and talked about in many story's that take place in the mines.
Depending on the pickaxe material, many things could be mines like stone and ore.
ASAP 20 Points please hurry
Answer:
All you got to do is type System.out printIn("Study English) etc...
Explanation:
Look at the answer to see if it is right.
in programming and flowcharting, what components should you always remember in solving any given problem?
Answer:
you should remember taking inputs in variables
Which statements are true regarding file management? File management means grouping related files into folders. You can store multiple folders within a file. However, a single folder can only store a single file. You can also create subfolders. Related folders when grouped together are called subfolders. When you logically organize files, folders, and subfolders, you'll get a file hierarchy resemblinga tree.
The statements that is true regarding file management are;
File management means grouping related files into folders. You can also create subfolders. Related folders when grouped together are called subfolders. What is file management what does it include?File Management is known to be one that is made up of the common operations done on files or groups of files, such as creating, opening, renaming, and others
Note that in file management, Each user are required to access to create, delete, read, write, and modify a file and also user need to have limitations to no access to others files.
Hence, The statements that is true regarding file management are;
File management means grouping related files into folders. You can also create subfolders. Related folders when grouped together are called subfolders.Learn more about file management from
https://brainly.com/question/12736385
#SPJ1
An example of an access control is a: Multiple Choice Check digit. Password. Test facility. Read only memory.
Answer:
B. Password
Explanation:
An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.
Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication is like an access control, ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
An example of an access control is a password because it is typically a basic and fundamental front-line defense mechanism against an unauthorized use of data or cyber attacks from hackers.
PLEASE HURRY!!!
Look at the image below!
Answer:A and E
Explanation:
The last three are strings while the other choices are integers.
Putting ' ' or " " around something makes it a string and the input is asking the user to input a string.
to save a copy of word online document to your hard drive which option should you select? Save as , save, rename or download and copy
Answer:
The correct answer is Save as
The option that is to select to save a copy of word online document to hard drive is the save as option.
What is word document?The term “Word Document” is used to denote the document that is made in the Microsoft Word. This document is made in the proper format with the MS Word. This document can be safe electronically by selecting the save as option.
After saving that document, this will automatically save on the hard drive of the computer device of that user.
Therefore, option A is correct.
Learn more about the Word document, refer to:
https://brainly.com/question/15939168
#SPJ2
Your game design company has recently asked all employees to use a specific personal information management application (PIM) to increase workplace efficiency. The PIM is collaborative, so contacts, calendar entries, and notes are shared across the team. Several team members are resistant to the idea, saying it interrupts their workflow, and they prefer their own way of handing contacts, notes, etc. Others don’t want their own notes to be seen by their coworkers.
Answer:For example, an office worker might manage physical documents in a filing cabinet by placing them in folders organized alphabetically by project name, or might manage digital documents in folders in a hierarchical file system.
Explanation: