answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sveta [45]
2 years ago
15

A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is loca

ted in an urban city. Which of the following best describes a limitation of using a simulation for this purpose?
a) The model used by the simulation software cannot be modified once the simulation has been used.
b) The model used by the simulation software often omits details so that it is easier to implement.
c) Running a simulation requires more time to generate data from trials than observing the crowd exiting the arena at various events.
d) Running a simulation requires a large number of observations to be collected before it can be used to explore a problem.
Computers and Technology
1 answer:
Damm [24]2 years ago
6 0

Answer:

d)

Explanation:

The main limitation of simulations is that running a simulation requires a large number of observations to be collected before it can be used to explore a problem. In a real life situation there are thousands of variables to take into consideration which can drastically affect the way that the situation unfolds at any given time. Therefore, in order to replicate/simulate such a scenario all of these variables need to be taken into consideration. This data can take a large amount of time to observe and collect in order to implement into the simulation so that it provides an accurate depiction of the problem.

You might be interested in
Consider a router that interconnects three subnets: subnet 1, subnet 2, and subnet 3. suppose all of the interfaces in each of t
creativ13 [48]

Answer:

thank God for us you and keep hoping tougher than I thought it would be

4 0
2 years ago
Read 2 more answers
True or false words spelling and grammar check is always %100
OverLord2011 [107]
I don't quite understand what you are asking but if you are asking if word, spelling and grammar checkers are always 100% accurate then that is false :) 
6 0
2 years ago
Read 2 more answers
As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (no
Simora [160]

Answer:

A digital forensic investigation is a special case of a digital investigation. Where the procedure and techniques are used will allow the results to be entered into cost of low foreg on investigation may be started to answer a question about whether or not centraband digital images exist on a computer.

Here we are considering the case of Global Finance Company with wide range of financial products and wide range of customers throughout the world. A suspect of compromise has been detected from the manager's computer. Now the team has been deployed to the branch office and conduct the Digital Forensic Investigation.

Concern of the Company

1. Regular updates for application infrastructure and network infrastructure.

2. One branch managers from porisbane branch felt compromises in his computer.

3. Both the servers and work station from all the offices are based on Microsoft Windows.

4. The firewalls and network segmentation are fully implemented.

5. Through intrasion detection and logging exist in the brances these are hardly used.

Digital Forensic Investigation Approach

The audit term of the Global Finacnce Company can follow four step. The digital forensic investigation model stands to be most effective model for investigation of the compromise happened int he reginal branch of the Global Finance Company.

1. Collection

a. All information from the manager's workstation, servers and other workstations must be collected.

b. Obtain all the important informtation.

c. Identify storage context noth internal and external devices.

d. Forensic tools that are applicable and to be used for the investigation are to be listed and made available for usage.

e. Target computer forensic imaging to be done and hashed to check the integrity of data.

f. Line network traffic has to captured.

Digital Evidance Collection done in two stages:

Volatile memory is the temporary memory and primary volatile memory is RAM

By cinning command: Cryptcat6543 -k key

Computer data can now required with the command Cryptcat -1 -p6543 -k key>>

Non volatile Memory Acquisition: Permanent memory or volatile memory stands significant source for the digital forensic investigation.

Parmanent data is collected through both online and offline methods:

Offline data is collected from the hard drive applications tool such as Guymayers etc.

Online data like firewall logs, antivirus logs and domain controller log with help of wires work and ethernal collected.

2. Examination

Once the data collected detailed examination is done by comparing the original and logical copies collected. Such examination gives us clues of how manege for window registry examination. Command used echo text_mess > file1.text : file2.txt

The above file retrieved through the command more < file1.txt : file2.txt

The network forensic is enabled using the tools and techniques so that the following potential information can be accessed.

System Information, Service listing, Process listing, Registry information, Binary dumped of memory

3. Analysis with Assumption

Many tools and methodologies are used by the audit team to analyse the collection and examined evidence. Analysis is done according to the following:

a. Leyword searches in all the files

b. Recovering the deleted files

c. Registry information extraction from the workstation

The tools used in this phase are FTK and ILOOKIX. These tools are helpful to recover the document, chat, logs, emails.

4. Report

The final report is generated by the audit team

Purpose of report Digital Forensic investigation conducted on the compromise of manager's computer

Author of the report Aufit Team

Incident Summery The source of compromise are x, y, x

Evidence All the effected files, registry, log files

Analysis All the analyzed data analyzed

Conclusion All digital evidence are extracted and found from the source

Document support volatile and non volatile data, tools, log info, registry info and so on.

7 0
2 years ago
When excel follows the order of operations the formula 8 * 3 + 2 equals?
Airida [17]
It follows the normal convention of BODMAS , which is the order of precedence of operations , so the answer equals to 26
3 0
2 years ago
Write a copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *thi
ollegr [7]

Answer:

Here is the copy assignment operator for CarCounter:

CarCounter& CarCounter::operator=(const CarCounter& objToCopy) {

carCount = objToCopy.carCount;

return *this;  }

The syntax for copy assignment operator is:

ClassName& ClassName :: operator= ( ClassName& object_name)

In the above chunk of code class name Is CarCounter and object name is objToCopy.

Assignment operator = is called which assigns objToCopy.carCount to the new objects's carCount.

This operator basically is called when an object which is already initialized is assigned a new value from another current object.

Then return *this returns the reference to the calling object

Explanation:

The complete program is:

#include <iostream>  //to use input output functions

using namespace std;   //to access objects like cin cout

class CarCounter {  //class name

public:  // public member functions of class CarCounter

CarCounter();  //constructor of CarCounter

CarCounter& operator=(const CarCounter& objToCopy);  //copy assignment operator for CarCounter

void SetCarCount(const int setVal) {  //mutator method to set the car count value

carCount = setVal;  } //set carCount so setVal

int GetCarCount() const {  //accessor method to get carCount

return carCount;  }  

private:  //private data member of class

int carCount;  };    // private data field of CarCounter

CarCounter::CarCounter() {  //constructor

carCount = 0;  //intializes the value of carCount in constructor

return; }  

// FIXME write copy assignment operator  

CarCounter& CarCounter::operator=(const CarCounter& objToCopy){

/* copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *this */

carCount = objToCopy.carCount;

return *this;}  

int main() {  //start of main() function

CarCounter frontParkingLot;  // creates CarCounter object

CarCounter backParkingLot;   // creates CarCounter object

frontParkingLot.SetCarCount(12);  // calls SetCarCount method using object frontParkingLot to set the value of carCount to 12

backParkingLot = frontParkingLot;  //assigns value of frontParkingLot to backParkingLot

cout << "Cars counted: " << backParkingLot.GetCarCount();  //calls accessor GetCarCount method to get the value of carCount and display it in output

return 0;  }

The output of this program is:

Cars counted = 12

3 0
2 years ago
Other questions:
  • To copy consecutive items, click the first item in the group, hold down _______, and click the last item
    7·2 answers
  • Which table style option is useful to display aggregated data when it is checked? total row filter button last column header row
    8·1 answer
  • Fill in the blank; "As well as their traditional role of computing data, computers are also extensively used for..."
    14·1 answer
  • Explain how buyers and sellers factor into setting the stock price for a company’s shares.
    13·1 answer
  • You're the sole IT employee at your company. Most of the computers in your fleet are Windows machines. Your boss wants you to se
    11·1 answer
  • Write a program that has the following String variables: firstName, middleName, and lastName. Initialize these with your first,
    7·1 answer
  • If productCost and productPrice are numeric variables, and productName is a string variable, which of the following statements a
    11·1 answer
  • php Exercise 3: Function Write a function named word_count that accepts a string as its parameter and returns the number of word
    5·1 answer
  • Longer speeches should be separated into the paragraphs of:
    9·1 answer
  • 4. Word Separator:Write a program that accepts as input a sentence in which all of thewords are run together but the first chara
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!