The U.S. military's standard for computer security is known as
DCS-3000.
TEMPEST.
Daubert standard.
Carnivore.

Answers

Answer 1

daubert answer lllllllll


Related Questions

Exodia
Principle of Computer Operation​

Answers

Answer:

????

Explanation:

Write a program that declares three one-dimensional arraysnamed miles, gallons, and mpg. Each array should be declared in main() and should becapable of holding ten double-precision numbers. The numbers that should be stored in miles are240.5, 300, 189.6, 310.6, 280.7, 206.9, 199.4, 160.3, 177.4, and 192.3. The numbers should bestored in gallons are 10.3, 15.6, 8.7, 14, 16.3, 15.7, 14.9, 10.7, 8.3, and 8.4.

Answers

Answer:

#include <iostream>

using namespace std;

int main(){

   double miles[10] = {240.5, 300, 189.6, 310.6, 280.7, 206.9, 199.4, 160.3, 177.4, 192.3};

   double gallons[10] = {10.3, 15.6, 8.7, 14, 16.3, 15.7, 14.9, 10.7, 8.3, 8.4};

   double mpg[10];

   for (int i = 0; i < 10; i++){

       mpg[i] = miles[i]/ gallons[i];

       cout << "mpg: " << mpg[i] << endl;

   }

}

Explanation:

The C++ source code declares three arrays miles, gallons and mpg with an array length of 10. The gallons and miles arrays are assigned 10 array items each and they are used to push values to the mpg array in the for loop statement. The result of each item in the mpg array is displayed on the screen.

The inside color of a shape or object is it’s

Answers

Answer:

A.

Explanation:

4.8 Code Practice: Question 1
I need help

Answers

for x in range(5,76,5):

   print(x, end=" ")

I wrote my code in python 3.8. Hope this helps

1. Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z
2. Write an if statement that assigns 10 to the variable b, and 50 to the variable c if the
3. Write an if-else statement that assigns 0 to the variable b if the variable a is less
than 10. Otherwise, it should assign 99 to the variable b.
Has and how does it work?
Algorithm Workbench
of the variable x is greater than 100.
variable a is equal to 100.​

Answers

Answer:

if x > 100:

   y = 20

   z = 40

Explanation:

Name the application used for creating Presentations___
1.MS PowerPoint
2.MS Word
3MS Excel

Answers

Keynote is great for presentation

Answer:

1.MS PowerPoint

Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell

Answers

Answer:

Trace Precedent

Explanation:

Trace Precedent is a Microsoft Excel tool that is mostly used in auditing work to evaluate the connection or linkage between the cells in a spreadsheet. It is used to display the cells that are referred to by a formula in the selected cell. This is to locate the basis of an error in knowing how the formulas are adapted.

This can be done by clicking on the Formulas tab, then click on Formulas Auditing, then click on Trace Precedents.

Hence, in this case, the correct answer is TRACE PRECEDENTS.

public class Main{ public static void main(String [] args){ String name=WelcomeJava; Runnable r1=() -> System.out.println(name); String name1 = name.toUpperCase(); Runnable r2=() -> System.out.println(name1); r1.run(); } }
What is the output of the above program?

Answers

Answer:

Concept: Programming

You take a string as an input, and you output the result which is a user defined name.Then you take that name and turn all the strings to uppercase in name and return that result.Rate brainlist

The output of the given program is,

''WelcomeJava''

Given program is,

public class Main {

   public static void main(String[] args) {

       String name = "WelcomeJava";

       Runnable r1 = () -> System.out.println(name);

       String name1 = name.toUpperCase();

       Runnable r2 = () -> System.out.println(name1);

       r1.run();

   }

}

Now, This program defines a class called Main, with a main method as the entry point.

It declares a String variable name with the value "WelcomeJava".

Then, it creates a Runnable r1 that prints the value of the name when executed.

Next, it converts the name to uppercase and assigns the result to name1.

Finally, it creates another Runnable r2 that prints the value of name1 when executed.

In the main method, r1 is called using the run method, resulting in the output "WelcomeJava".

Read more about Python programs at:

brainly.com/question/26497128

#SPJ4

Factor 72y+108z

lmk the answer asap

Answers

36(2y+3z)

This is the answer , please mark brainliest if correct.

Ryan is a manager who maintains an official record of the events that happen in his company. At the end of the day, he writes about the events that took place. The words that he frequently mentions in his record are today, client, and meeting. The moment he types the first two letter of these words, they appear as a suggestion. Which feature of the word processing program makes these suggestions

Answers

Answer: word completion

Explanation:

Answer:

Word Completion

Explanation: because i took the test.

Is it important to study information systems

Answers

Answer:

There is massive importance if you want to study information study.

It can help you understand the data, organize, and process the data, using which we can generate and share information.

Explanation:

It largely depends on your interest and requirement, but a better knowledge or clue about information systems may help analyze the data especially if you want to become a data scientist, machine learning, Artificial intelligence or deep learning, etc.

It can help you understand the data, organize, and process the data, using which we can generate and share information.

A great understanding of information systems may exponentially increase the productivity, growth, performance, and profit of the company.

Most Professions get exposed to information Systems no matter what their career objective is, as it may help in having better decision making based on the information they get through data.

So, yes!

There is a massive importance if you want to study information study.

Benjamin took a photo that focused on certain part of an image while blurring out the rest. What is this effect called?
A.
alternate focus
B.
major focus
C.
minor focus
D.
selective focus

Answers

Answer:

(D) selective focus

Explanation: hope this helps!

Answer:

D. Selective Focus

Explanation:

Photographers commonly use the tilt-shift effect to focus on a certain part of the image while blurring the rest of the photograph. They refer to this as selective focus.

Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second, regardless (within limits) of size. Assume the workstation uses direct memory access (DMA) to move data in and out of its main memory, which has a bandwidth of 2 Gbps, and that the I/O bus has a bandwidth of 1 Gbps. At what packet size would the bus bandwidth become the limiting factor

Answers

Answer:

When the transmission exceeds 667 packets

Explanation:

In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.

A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.

David bought 5.2 pounds of oranges for $1.20 per pound . how much did david spend ..................................................... explain to me how you did it

Answers

Answer:

David spent $6.24.

Explanation:

5.2 times 1.2

Which retouching action is unethical?

A.

removing a person from a photograph intended for publication in a newspaper

B.

removing the saturation in a photograph intended as a magazine cover page

C.

adding extra lighting on subject’s face and body in a photograph meant for display in an exhibition

D.

changing the color of the subject’s hair in a photograph intended for use in an advertising campaign

Answers

Answer:

B.) removing the saturation in a photograph intended as a magazine cover page

Answer:

its A for Plato

Explanation:Trust me i got it right

As you draw a star, pressing the shift key while you drag increases the number of points on the star. True or false

Answers

Answer:

true

Explanation:

Amanda would like to add text to a slide in her presentation. Select all of the correct methods she can use to add text.
Select "Text" from the Insert menu.

Click in the Task pane and enter text.

Draw a text box, click in it, and enter text.

Click in a placeholder and enter text.

PLEASE help

Answers

Answer:

Draw a text box

Explanation:

Because if she draw it she can edit and write what she want

Which of the following apertures will give you the shallowest depth of field?
a)2.8
b)5.6
c)11
d)22
e)2
50 points and brainliest

Answers

Answer:

a.2.8

The f-stops work as inverse values, such that a small f/number (say f/2.8) corresponds to a larger or wider aperture size, which results in a shallow depth of field; conversely a large f/number (say f/16) results in a smaller or narrower aperture size and therefore a deeper depth of field.

Proper answer=brainliest

Answers

Answer:

hehe

Explanation:

Most slide layouts include at least one ________ by default.
Question 2 options:

placeholder

action button

transition

animation

Answers

Hey

I think that the answer placeholder :)

Sry if im wrong tho

Answer:

The answer is placeholder.

Below is an ERD showing the 1:M relationship between Department and Employee entity types. This relationship is modeled as a Department JSON object as:Department: deptID,deptName,deptRoom,{deptPhone},{employee: empID, empName,empPhone,{empEmail}}Where {} indicates multi-valued.Part 1: Open the mydb database we created earlier and create a new department table with two fields:documentid (as an integer field) Jsondocument (as a JSON field)And add around 3 departments and each with 2 or 3 employees.Part 2: Use SQL to answer the following questions:Q1: Select all the records in the table.Q2: List the department names with their phones.Q3: A query to show the deptName and number of employees of the department.Q4: A query to show all the employees of a department of your choice using deptName as criteria.USE MYSQL

Answers

Answer:

hi

Explanation:

PLS HELP ME!! WILL GIVE BRAINLIEST

Read the following block of CSS code, and then answer the question.


body

{

position: relative;

left: 50px;

top: 50px;

}


What effect would this code have on the display of a box?

All content would be placed 50 pixels to the left of the current box.

The current box would be located 50 pixels to the left of the page border.

The current box would be located 50 pixels to the left of the next page element.

The current box would be located 50 pixels to the left of the first textual element.

Answers

B i think sorry if I’m wrong

Answer:

it is maybe:

A.  All content would be placed 50 pixels to the left of the current box.

Explanation:

The U.S. military's standard for computer security is known as
DCS-3000.
TEMPEST.
Daubert standard.
Carnivore.

Answers

Answer:

TEMPEST.

Explanation:

TEMPEST is an acronym for Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions and it is a secret (classified) project of the government of the United States of America that originated with its military in the 1960s based on the study of security with respect to telecommunication devices emitting Electromagnetic Radiation (EMR).

Hence, the U.S. military standard for computer security is known as TEMPEST.

The main purpose of the Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions (TEMPEST) is to prevent the theft, compromise or interception of informations that are being transmitted on various telecommunications devices through the use of Electromagnetic Radiation (EMR).

Janet needs to flag a message for follow-up in Outlook. Which option is not a default?

Today
Tomorrow
Next Week
Next Tuesday

Answers

Answer:

Explanation:

Today

Answer:

Next tuesday.

Explanation: Its to specific

Review how to write a for loop by choosing the output of this short program.

for counter in range(3):
print(counter * 2)


Please explain it to me, I’m not learning Bc I don’t have a teacher.

Answers

Answer:

The output is:

0

2

4

Explanation:

First of all, the print statement must be indented with a tab, otherwise it is not part of the for loop.

The range(3) creates an array with values 0,1,2. The variable 'counter' gets those values one after another, and the print statement outputs this value doubled, hence the 0, 2 and 4 output.

Write a program that reads a list of integers, and outputs the two smallest integers in the list, in ascending order. The input begins with an integer indicating the number of integers that follow. You can assume that the list will have at least 2 integers and fewer than 20 integers. Ex: If the input is: 5 10 5 3 21 2 the output is: 2 3 To achieve the above, first read the integers into an array. Hint: Make sure to initialize the second smallest and smallest integers properly.

Answers

Answer:

Following are the code to this question:

import java.util.*;//import package

public class Main //defining a Main class  

{

   public static void main(String[] args)//defining a main method  

   {

       Scanner oxc = new Scanner(System.in);//defining main method  

       int n,m1,m2,num,t,i;//defining integer variable

       n= oxc.nextInt();//input value from user end  

       m1 = oxc.nextInt(); //input value from user end

       m2 = oxc.nextInt(); //input value from user end

       if (m1 > m2)//defining if block that check m1 greater then m2  

       {

           //swapping the value

           t= m1;

           m1 = m2;

           m2 = t;

       }

       for (i=2;i<n;i++)//defining for loop that check the smallest value    

       {

           num = oxc.nextInt();//input value from user end

           if (num < m1) //defining if block that check num lessthan m1

           {

               m2 = m1;//store m1 value into m2  

               m1 = num;//store num value into m1

           }

           else if (num<m2)//defining else if block that check num lessthan m2

           {

               m2 = num;//store m2 value in num

           }

       }

       System.out.println(m1 + " " + m2);//print value

   }

}

Output:

5

10

5

3

21

2

2 3

Explanation:

In the above-given code, inside the main class the main method is declared, in method 6 integer variable "n,m1,m2, num,t, and i" is declared, and in the "n, m1, m2, and num" is used for input the value from the user end.

In the next step, and if block is defined that check m1 greater than m2, and swap the value.In the next step for loop s used that defines two conditions that check the two smallest value from the user input and print its value.

This is similar to the last problem, except that the first number on a line is an ID number that identifies an account. The same ID number may appear on any number of lines. Use a Dictionary to accumulate, for each ID, the sum of all the numbers that are on all the lines with that ID number. Call the input file id_data.txt. Write an output file called ID_sums.txt. On each line of the output fille, print an ID number and the sum. Sort the lines by the numerical order of the IDs

Answers

Answer:

Following are the code to this question:

def getSum(ID):#defining a method getSum that accept an ID

   t= 0#defining a variable t

   while ID!= 0:#defining while loop to check ID not equal to 0

       t+= ID % 10# holding remainder value

       ID = ID // 10#holding quotient value

   return t#return total value

def readRecord(S):#defining a method readRecord that hold list  

   f_Read = open("idInfo.txt","r")#defining a variable f_Read to open file

   for C_ID in f_Read:#defining for loop to hold file value  

       C_ID = C_ID.replace('\n', '')#use replace method

       S[C_ID] = getSum(int(C_ID))#use list to method value

   f_Read.close()#close file

def sortRecord(ID_List, t_List):#defining a sortRecord

   for x in range(len(ID_List) - 1):#defining for loop to calculate the length of list  

       for y in range(0, len(ID_List) - x - 1):#defining for loop to calculate the length of list

           if ID_List[y] > ID_List[y+1]:#defining if block to check value is greater

               ID_List[y], ID_List[y+1] = ID_List[y+1], ID_List[y]#swap the value

               t_List[y], t_List[y+1] = t_List[y+1], t_List[y]#swap the value

def showReport(ID, t):#defining a method showReport that accept id and t

   for i in range(len(ID)):#defining for loop to hold index value

       print(ID[i]," ",t[i])#print index value

def writeRecord(ID_List, t_List):#defining a method writeRecord that accept two list

   f_Write = open("idSorted.txt","w")#defining a variable f_Write to hold store value in file

   for i in range(len(ID_List)):#defining a for loop to store value with index

       f_Write.write(ID_List[i])#hold list value

       f_Write.write(" ")    #for space

       f_Write.write(str(t_List[i]) + "\n")# add index value

   f_Write.close()#close file

def run():#defining method run

   S = {}#defining an empty list

   readRecord(S)#passing list into readRecord method

   ID_List = list(S.keys())#defining a variable that holds key value in list

   t_List = list(S.values())#defining a variable that holds values value in list

   sortRecord(ID_List, t_List)#calling a method sortRecord by passing value

   showReport(ID_List, t_List)#calling a method showReport by passing value

   writeRecord(ID_List, t_List)#calling a method writeRecord by passing value

if "run":

   run()

Output:

Please find the attached file.

Explanation:

In the above program code, 6 method getSum, readRecord, sortRecord,showReport, writeRecord, and run method is defined, in which getSum and readRecord is used a single list store value in parameters, and in other methods, it accepts two parameter to store value in key and values form and use a txt file to store and take value.    

In the run method, an empty list s is declared, that pass into the variable ID_List and t_List, and call the method, in this program two a text file "idInfo.txt" is used, that holds some value in the file, and create another file that is "idSorted.txt", in this file it stores the value in the numerical order of the ID's.

Page
U what is a common language that computers use
to talk with one another on- a network?
a. client b. Adapter
c. protocol d. operating
System​

Answers

I think it’s protocol
The computers use a set of protocols. Therefore, the answer is C. Protocol. I hope this helps.

Write an algorithm and draw a flowchart to enter the length and width of any room then check if length and width are equal find area and circumference of the square room. Otherwise, find the area and circumference of the rectangle room.

Answers

Answer: i have no clue

Explanation:

I WILL MARK BRAINLEST FOR THAT FIRST ANSWEr that is CORRECT!!!!!!!!!!!!
Which option lists the correct steps to apply a style?

1 Select the text, click the Home tab, and in the Styles Gallery, click to select a style to apply.
2 Select the text, click the Insert tab, and in the Formatting Gallery, click to select a style to apply.
3 Select the text, click the Home tab, and in the Font group, select a font, font size, and type to apply.
3 All of the options listed above are correct.

Answers

Answer:

Explanation:

Maybe all of the options listed above are correct

2or3 I would reckon hope this helps
Other Questions
If you buy every item in the song, The Twelve Days of Christmas, how many items will you buy? A spinner can land on either red, blue, green, or yellow. You spin once. Find the number of possible outcomes in the sample space. Please show me how to solve this. A coffeemaker can brew at a rate of 1 cup every 0.8 minute. At this rate, how long would it take to brew 6 cups? Analysts look for red flags in financial statements that may signal financial trouble. Which of the following is a red flag that suggests that a company may be in trouble? A. a consistent movement in sales, merchandise inventory, and accounts receivable B. operating activities are a major source of cash flows C. a significant decrease in net income for several years in a row D. a reduction in the debt ratio text that lists benefits of owning a dog from least important to greatest importance uses _____ order The Boardman family walked two over five of a mile in two over seven of an hour. What is their unit rate in miles per hour?two-sevenths over two-fifths equals one and two-fifths miles per hourtwo-sevenths over two-fifths equals five over seven miles per hourtwo-fifths over two-sevenths equals one and two-fifths miles per hourtwo-fifths over two-sevenths equals five over seven miles per hour Many nativists called for immigrants to pass a______? What is the size of the exterior and interior angle of a regular polygon if it has 3 sides Hunter and Manny work at a horse farm. On Thursday, they split cleaning the small horse stalls, but Manny finished first. On Friday, they are going to work together to clean the big horse stalls. If they clean for the same amount of time on Friday, who will likely clean more horse stalls? HELPPPP how to get big and all thing The chart below represents the steps in the process of a bill becoming a law. Use the chart to answer the following question.The image represents the process of a bill becoming a law. It shows a set of parallel lines that merge, then split into two, and then merge again. Moving left to right, the top line has boxes labeled: A, C, E, G, and H. The bottom line has boxes labeled: B, D, F, and I. Boxes A and B, C and D, E and F, H and I, are paired. G is the only box on the top line without a corresponding box on the bottom line. Continuing to move from left to right, the two lines merge into one and have one box labeled J. Then the lines separate into two parallel lines again. The top line is labeled with box K and the bottom line is labeled with box L. The two parallel lines continue to the right where they again merge into one line, with an arrow pointing to a final box labeled M.Which section of this chart represents the point at which a bill is discussed in a conference committee of House and Senate members? A) G B) K and L C) E and F D) J Which statement about the Indian Removal Act of 1830 is false?Three of the five tribes favored the legislation because theywelcomed the opportunity for westward expansion.Andrew Jackson supported it.Most Whigs opposed this legislation.The act forced members of five tribes to leave their lands in theEast and relocate further west. in which type of bond are electron shared between atoms?A. ionicB.covalentC.metallic What are the advantages and disadvantages of top-down and bottom-up programming? How would you decide which one to use? Do you approach problems in your real life from a bottom-up or top-down approach? What is the impact of the rise of the Manorial system? The bacteria we are growing contain both chromosomal DNA and plasmid DNA. Both are circular, but they are different. In 3-5 sentences, discuss at least 3 differences between the chromosomal DNA and plasmid DNA found in our bacterial cells. bcAlex rents a car for one day. The charge is $18 plus $0.12 per mile. Alex wants to spend exactly $30. Write an equation to represent the situation. A) 30 - 0.12 = 18x B) 18 + 0.12x = 30C) 18 - 0.12x = 30 D) 18x + 0.12 = 30 please help When two people use the same dichotomous key to identify the same object, is it possible (should it be possible) for them to have different final answers? Explain? What is the x intercept of the graph of 3x-y+6=0 What is the only force that acts on a falling body when it is in free fall?