Answer:
=IF((D5="Yes"),(C4*1.05),C4)
Explanation:
If condition accepts 3 parameters, where the 1st parameter is the condition and second parameter is the one which needs to be executed “if the condition is true” and the third argument is executed when the “condition is false”.
Here the condition is if there is an delivery ie. D5 = yes, then we add some amount of additional charges through the formula (c4*1.05) and if not we retain the base price C4.
Here the additional delivery charges are considered as 5%. You can change the number according to your need.
Answer:
b) Bounded Waiting
Explanation:
int currentThread = 1;
bool thread1Access = true;
bool thread2Access = true;
thread1 { thread2 {
While (true) {
While (true)
{
while(thread2Access == true)
{
while(thread1Access == true)
{
If (currentThread == 2) {
If (currentThread == 1)
{
thread1Access = false; thread2Access = false;
While (currentThread == 2);
While (currentThread == 1);
thread1Access = true; thread2Access = true;
} }
/* start of critical section */ /* start of critical section */
currentThread = 2 currentThread = 1
… ...
/* end of critical section */ /* end of critical section */
thread1Access = false; thread2Access = false;
… ...
} }
} }
} }
It can be seen that in all the instances, both threads are programmed to share same resource at the same time, and hence this is the bounded waiting. For Mutual exclusion, two threads cannot share one resource at one time. They must share simultaneously. Also there should be no deadlock. For Progress each thread should have exclusive access to all the resources. Thus its definitely the not the Progress. And hence its Bounded waiting.
The primary reason that you would import data into a database is because the data already exists somewhere else.
As an example, you may have a spreadsheet that contains names and telephone numbers of a group of people. It is much faster to import this data into a database instead of manually entering the information.
Answer:
Security risk associated with sharing a printer are
- Printer Attacks
- Theft
- Breach of data
- Vulnerable Network
Explanation:
Printer Attacks
A network printer can be used for a DDoS attack.As printer are not very secured and are a weak link in network these can be easily exploited by the hackers for any kind of malicious activities and even lanching a DDoS attack.
DDoS attack is denial of service attack in which network is flooded with malicious traffic which cause it to choke and make it inaccessible for users.
Theft
Physical theft of document can be an issue.Anyone can just took printed pages from printer tray by any one.
Breach of Data
The documents which are printed are usually stored in printer cache for some time which can be accessed by any one connected to the network. Any document containing confidential information which are printed on network printer can fall in wrong hands.
Vulnerable Network
As mentioned a single unsecured network printer can pose great threat to entire network as it can provide a way into the network.