1. Some Operating systems that were designed with a security mindset are
2. A protection state consists of
3. What is the difference between secrecy and integrity?
4. Mandatory access control can be applied along with discretionary access and it is meant to do the followings
5. What is Operating System?
6. The three components of referent monitor are
In: Computer Science
assume a program in unix that have a multiple system calls
how to show the list of system calls used in the program?
In: Computer Science
Write a program that repeatedly generates a random integer in the range [1, 100], one integer at a time, and displays the generated numbers on the screen according to the following rules:
1
5
32
68
89
45
31
IN C++ ONLY PLEASE
In: Computer Science
Write a program fragment (not a complete program) which will perform the following task:
The int variable m currently contains the number of minutes a basketball player played in their last game.
Use an IF statement(s) to print out an appropriate message based on the following:
If m is from 35 to 48, print the message "very tired"
If m is from 10 to 34, print the message "little tired"
If m is from 1 to 9, print the message "played at least"
If m is 0, print the message "bench warmer"
If m is not in the range from 0 to 48, print the message "invalid data"
In: Computer Science
Language: Python
Function name : sort_by_rating
Parameters : file (.csv file), category (string), order
(boolean)
Returns: None
Description : You want to see what order the items of a particular
category in your file would be in if you sorted them by rating.
Given a file, a category of clothing, and an order boolean (True
for ascending order, False for descending order), create a function
that writes a file called “sorted_items.csv” that includes all of
the items in the specified category in sorted order by
ranking.
The format of the file should look like this:
item name |
rating |
item name 1 |
rating 1 |
item name 2 |
rating 2 |
... |
... |
(NOTE: there will be a header row at the top of each .csv file)
Note: If your input file contains no items in the specified
category, your “sorted_items.csv” file should still be created and
have the header row. Also, your written files should end in a new
line character
Hint : You can use the built-in Python .sort() method on a list of
tuples. The tuples will get sorted by the first item in each tuple.
Example:
>>> list_of_tups = [(5, "cats"), (6, "kittens"), (1,
"lizards")] >>> list_of_tups.sort()
>>> print(list_of_tups)
[(1, 'lizards'), (5, 'cats'), (6, 'kittens')]
Test cases:
>>> sort_by_rating("uniqlo.csv","tops",True)
In: Computer Science
In: Computer Science
Provide the basic goal of Software Architectural evolution in the software design process. Also, discuss three stages of software development stages where architectural evaluation can be applied.
NO HANDWRITING PLEASE... THANK YOU.
In: Computer Science
Suppose both the sender and receiver are in the same local area network. If the sender has the receiver's IP address only, but not the MAC address, how does ARP (Address Resolution Protocol) find out the receiver's MAC address?
In: Computer Science
The following sequence of operations essentially leaves a queue unchanged.
Group of answer choices
enqueue followed by dequeue
dequeue followed by enqueue
two enqueues followed by two dequeues
two isEmptys followed by two isFulls
A standard linked list provides a good implementation of a "Deque".
Group of answer choices
True
False
The main thread of a Java program cannot generate additional threads.
Group of answer choices
True
False
The text's link-based queue is being used and holds an empty queue. We can say:
Group of answer choices
at this point in time an invocation of the enqueue method would throw an exception.
at this point in time an invocation of the dequeue method would throw an exception.
the value of front is -1.
In: Computer Science
C++ program that runs on Visual Basic that computes the total cost of books you want to order from an online bookstore. It does so by first asking how many books are in your shopping cart and then based on that number, it repeatedly asks you to enter the cost of each item. It then calls two functions: one for computing the taxes and another for computing the delivery charges. The function which computes delivery charges works as follows: It adds a 5% delivery charge for standard delivery if the total is below $1,000, and an additional 10% charge if you want an expedited next day delivery. The tax and delivery charges are added to the bill and the total cost is displayed.
In: Computer Science
•Describe security problems inherent to the TCP/IP protocol suite..
In: Computer Science
In: Computer Science
Question 4 n
Which of the following combine content or functionality from existing web services, websites and RSS feeds to serve a new purpose?
Question 4 options:,
Blogs |
|
Mashups |
|
XML |
|
MySQL |
Question 5 (1 point)
Which of the following can be used to add location information (longitude, latitude, etc.) to websites, images RSS feeds, Videos and more?
Question 5 options:
RSS |
|
XML |
|
Blogs |
|
Geotagging |
Question 6 (1 point)
Which of the following are mini applications designed to run either as stand-alone appliations or as add-on features in web pages?
Question 6 options:
Widgets |
|
XML |
|
RSS |
|
Blogs |
Question 7 (1 point)
Which of the following is a 3D virtual world social networking program where users create avatars that they use to meet other users with similar interests, conduct business, participate in group activities, or take classes?
Question 7 options:
|
|
Three Space |
|
Second Life |
|
Linked In |
Question 8 (1 point)
Which of the following provide applications with access to external services and databases?
Question 8 options:
API |
|
XML |
|
Mashups |
|
JavaScript |
Question 9 (1 point)
Which of the following is a markup language that allows you to label data based on its meaning?
Question 9 options:
XHTML |
|
CSS |
|
JavaScript |
|
XML |
In: Computer Science
Please read carefully. Using the minimum number of digits in 2’s complement notation, perform 25 – 18 (subtraction by preserving addition). Show all the significant steps in your work by indicating the starting values, sign conversion and the addition operation aligning all numbers including the carry values in each position using the Courier New font. Indicate the final value as a decimal.
In: Computer Science
What would you do if you encountered a database that violated referential integrity? How would you address the problem? When forming your answer be sure to include at least one of the three main types of referential actions (cascade, restrict, set null).
In: Computer Science