answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Olin [163]
2 years ago
10

Writing a program in a language such as c or java is known as _____ the program.

Computers and Technology
1 answer:
Angelina_Jolie [31]2 years ago
8 0
<span>Writing a program in a language such as c or java is known as coding the program</span>
You might be interested in
It has been said that the quality of our relationships depends in large part on the quality of our
timurjin [86]

Answer:

people

Explanation:

6 0
2 years ago
The OSHA Workplace Poster 3165 is optional for workplaces.<br> A) True<br> B) False
bezimeni [28]

Hello, your answer is ready.


Answer: A) True



Best of luck!


~

Your pal papaguy

5 0
2 years ago
Read 2 more answers
Recall that a Set is an abstract data type somewhat similar to a Bag, they can store a finite collection of objects without any
lina2011 [118]

Answer:

Here is the addLikeASet() method:

public boolean addLikeASet(T anEntry){  // method takes the T parameter anEntry

       boolean res = true;  //sets the result to true

       if(Arrays.asList(bag).contains(anEntry);  {  //checks if the bag already contains anEntry

           res=false;         }  //returns false

       else         {   if the bag does not already contain anEntry

           bag[numberOfEntries]=anEntry;  //enters the anEntry in bag array

           numberOfEntries++;         }  //increments the  numberOfEntries by 1

       return res;     } //returns true

Explanation:

You can also implement this method like this:

public boolean isFilled(){ // the function to check if the bag is full

       return numberOfEntries == bag.length;  } // number of entries equals length of the bag which shows that the bag is full

public boolean addLikeASet(T anEntry){

       boolean res=true;

       if (!isFilled() || (Arrays.asList(bag).contains(anEntry));  //checks if the bag is full or contains anEntry already

           res=false;         //returns false

       else         { if bag does not already contain anEntry

           bag[numberOfEntries]=anEntry; //add anEntry to the bag

           numberOfEntries++;         } add 1 to the count of numberOfEntries

       return res;     } //returns true

You can also use a loop to check if anEntry is already present in bag:

for(int i=0; i< bag.length; i++)  {

    if(anEntry.equals(bag[i])) {

      return false;      }    }  

  return true;

3 0
2 years ago
A clock is reading 10:27:54.0 (hr:min:sec) when it is discovered to be 4 seconds fast. Explain why it is undesirable to set it b
lara31 [8.8K]

Answer:

(a)Applications Time Stamp Events

(b)S=0.5(W-T_{skew})+T_{skew}, where T_{skew}≤W≤T_{skew}+8.

Explanation:

Some applications assume that clocks always advance, so they could timestamp events under this assumption.

In our case we have the wrong timed clock, say W and the hardware clock H which is supposed to advance at a perfect rate.

We proceed to construct a software clock such that after 8 seconds we can replace the wrong timed clock with the software clock in good conditions.

Let us denote the software clock with S.

Then, S=c(W-T_{skew})+T_{skew} where:

T_{skew}=The current Time(10:27:54) and;

c is to be found.

We already know that S=T_{skew}+4 when W= T_{skew}+8,

So:

S=c(W-T_{skew})+T_{skew}

T_{skew}+4=c(T_{skew}+8-T_{skew})+T_{skew}

4=8c

c=0.5

We obtain the formula

S=0.5(W-T_{skew})+T_{skew}, where T_{skew}≤W≤T_{skew}+8.

4 0
2 years ago
Instructions:
Digiron [165]

Answer:

Scenario 1: Advanced Encryption Standard (AES)

It is the best choice for the security of smart phones. AES is symmetric algorithm. It uses keys of 128, 192, and 256 bits and encrypts and decrypts fixed blocks length of 128 bits. It is effective  in encryption of all forms of electronic data. AES encryption is most widely used in smart phones to protect confidential data stored on the device such as bank account information, personal pictures, social security number etc.  It is considered as unbreakable encryption algorithms. For example if smartphone is using AES 256 encryption algorithm to secure its data from attacks, the encrypted data cannot be attacked if the key length is 256-bit as there would be 2256 possible combinations, and a hacker has got to try most of the 2256 possible combinations to guess they key which would take time beyond human lifespan.

Scenario 2:  Digital Signatures  

It is an electronic signature that is used to authenticate the identity of "message sender". It also makes sure that real content of the message has not been changed during transit. Since the company's concern is to protect confidential information from a rival so it the better choice as it assures authentication of message source and data integrity. Digital signatures generate a unique hash of message and use sender's private key to encrypt it. After it the message is signed digitally and sent. Receiver produces his own hash of message. He uses senders's public key to decrypt sender's hash and compares with his own hash. If they match it means the sender is the real one and the message contents are not altered.

Scenario 3: Elliptic curve cryptography (ECC)

It is an asymmetric general-purpose encryption technology. The basic idea behind this method is to generate simple, short, fast and difficult to break encryption keys. This is what the company requires that encryption technology must be general purpose, difficult to break. It uses elliptical curve theory for generating cryptographic keys instead of using large prime numbers. It is efficient to use for smartphones.  ECC does not require much processing power and memory. This results in less overhead faster response time and throughput on Web servers when ECC is being used.

Scenario 4. Secure Sockets Layer (SSL)

It is a standard security technology for setting up an encrypted link between a server and a client (in this case web browsers and web server). SSL is a security protocol that transmits sensitive information securely. As we know data transmitted between browsers and web servers is sent in the form of plain text. If a hacker is able to seize data being transmitted between a browser and a web server, they can misuse that information.  So SSL makes the web servers and web browsers to communicate with each other securely. When transmitting confidential information, a web server and browser set up a secure connection using SSL certificate. The link between web server and browser is encrypted by SSL which makes sure that all data transmitted between them remains private and protected. Due to the sensitive nature of the business SSL is most suitable solution to keep sensitive information sent across internet encrypted making sure that only intended receiver can access it. SSL certificate is used for authentication purpose. For making sure that information is sent to right server, web browsers give indication of secured connection via a lock icon attached or uses https.

Scenario 5: Advanced Encryption Standard (AES)

Confidential Services should choose AES. It is a symmetric encryption algorithm for protecting sensitive data. This means it uses symmetric key encryption in which only one secret key is used to encrypt and decrypt information. This algorithm is also used by U.S. Government agencies to secure sensitive material. Refer to the scenario 1 for more details about AES. It is a fast encryption standard. It is used in both hardware and software. Also it is strong in a sense that it comes up with an option for various key lengths. AES allows  a 128-bit, 192-bit or 256-bit key and are practically unbreakable by brute force based on current computing power

           

 

6 0
2 years ago
Other questions:
  • U.S. industries like steel, computers, and energy need to be protected from foreign competition to ensure which of the following
    6·2 answers
  • Using information from the lesson, explain how new technologies change your experience as a consumer.
    5·2 answers
  • ________ is free software created and updated by a worldwide community of programmers. office software a web service cloud-based
    9·1 answer
  • Mr. Cooper would like to customize his Excel software so his students can create an electronic graph in Excel for their lab repo
    6·1 answer
  • Which key retains its uniqueness even after you remove some of the fields?
    14·1 answer
  • What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
    10·1 answer
  • You are attempting to open a file containing a list of integer numbers, each on a separate line, and read them into Python as in
    6·1 answer
  • Write a copy assignment operator for CarCounter that assigns objToCopy.carCount to the new objects's carCount, then returns *thi
    15·1 answer
  • In your own words, describe what Internet Protocols are. Why is it important to have agreed upon protocols?
    6·1 answer
  • 1⁰=?<br> Is equal to...........
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!