① Protection is strictly an internal problem. (1 word), on the other hand, requires not only an adequate protection system but also consideration of the external environment within which the system operates.
② A (1 word) is a computer, appliance, or router that sits between the two security domains and monitors and logs all connections. It can also limit connections based on source or destination address, source or destination port, or direction of the connection.
③ In the (1 word) algorithm, the disk arm starts at one end of the disk and moves toward the other end, servicing requests as it reaches each cylinder, until it gets to the other end of the disk. At the other end, the direction of head movement is reversed, and servicing continues.
④ A file-control block (FCB) (an (1 word) in most UNIX file systems) contains information about the file, including ownership, permissions, and location of the file contents.
In: Computer Science
use python to solve
Write a function called word_chain that repeatedly asks the user for a word until either (1) the user has entered ten words, or (2) the user types nothing and presses enter. Each time the user enters an actual word, your program should print all the words entered so far, in one long chain. For example, if the user just typed "orange", and the user has already entered "apple" and "banana", your program should print "applebananaorange" before asking for the next word. Each of your prompts should look like this:
Enter word:
Your function MUST be called word_chain. You can write code in the main part of your program to test your function, but when you submit, your code must ONLY have the function definition!
In: Computer Science
Please answer the following questions
1) Suppose the user inputs “Good Morning!” in the console when running the following code.
What will be printed to the console?
char word[100] ;
cout << “Type a word: “;
cin >> word;
cout << word << endl;
2) What is the value of myStr[5] after the following code?
char myStr[100] = “Good!”;
3) Suppose we have a string variable that contains a string with a length of N, what is the index of
the third to the last character in this string?
4) Please fill the two inputs to the substr function so that it will print “morning” to the console.
string myStr = “Good morning Friday!”;
cout<<myStr.substr( ___, ___ )<<endl;
5) I am trying to initialize a c-style string to “chen”. What is the problem of the following code?
char myStr[5] = {‘c’, ‘h’, ‘e’, ‘n’ };
cout<<myStr;
In: Computer Science
What is a program format?
CNC programming is based on what current standard?
Briefly describe the Word address format.
Define each of the following as they pertain to CNC programming.Explain G code?
1.Character
2.Address
3.Word
4.Block
5.Program
Explain what a G code is?
The difference between modal and nonmodal G codes?
Explain the mode and use of each of the following G
codes.Explain what an M code is.
G 49
G1
G80
G0
G92
Explain what a M code is.
What two main groups to M codes fall?
Explain the type and use of the following M codes.Explain the
function of the following Word address command.
M6
M30
M0
M3
M5
Explain the function of the following Word address command.
(N0080 G83 X-.5 Y.375 Z-.8876 R.1 Q.1)
In: Computer Science
question: Pig LatinPig latin, is a mock language which
encrypts english sentences using the following rules: For every
word in a sentence, the firstletter of the word is shifted to the
end of the word and the suffix “-ay” is added at the end of the
word. For example, “hey pat”becomes “eyhay atpay”.Implement
thepiglatin(str)function so it translates sentences to pig latin.
If you have time remaining, try implementing afunction to ”decrypt”
piglatin, i.e. given a sentence in piglatin, return the english
version of the sentence
def pig_latin(sentence: str) -> str:
"""
Return a pig latin encrypted version of the
given sentence
>>> pig_latin("that pig is
so cute aww")
'hattay igpay siay osay utecay wwaay'
>>> pig_latin("utm needs
more food options")
'tmuay eedsnay oremay oodfay ptionsoay'
"""
# TODO: write this function's body - ay
pass
In: Computer Science
1. Discuss the THREE uses of Trial Balance with Literature Review and by providing example for each use of Trial Balance. . (word range – 150 to 200)
2. Mr. Juma paid the rent three months in advance for his shop. Write a short note on prepaid expenses with Literature Review and by providing examples. (word range – 150 to 200)
3. Ms. Salma is yet to pay the salaries to her employees of last three months. Write a short note on accrued expenses with Literature Review and by providing examples. (word range – 150 to 200)
4. Yummy Foods received an advance payment of OMR 1,000 for the order to be delivered after two months. Write a short note on unearned income/ Income received in advance with Literature Review and by providing examples. (word range – 150 to 200)
5. Reflection Report – Online Course (word range – 100 to 150)
Your reflection may include, your individual experience, What did you learn from this online course, how much progress you made in the online course, strengths of the online course, challenges you faced in attempting the online course, etc.
In: Accounting
Part (b): Reversing the order of bits in a word
Recall that in our course we define a word to be a 32-bit sequence (i.e., four
consecutive bytes). For some algorithms it is useful to have a reversed version of
that 32-bit sequence. (The deeply curious can read a brief description about such
use in Fast Fourier Transform algorithm implementations by visiting Wikipedia at
this link: http://bit.ly/2rnvwz6 ).
Your task for part (b) is to complete the code in reverse.asm that has been
provided for you. Please read this file for more detail on what is required.
Some test cases are provided to you.
# Compute the reverse of the input bit sequence that must be stored
# in register $8, and the reverse must be in register $15.
.text
start:
lw $8, testcase3 # STUDENTS MAY MODIFY THE TESTCASE GIVEN IN THIS LINE
# STUDENTS MAY MODIFY CODE BELOW
# vvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
nop
add $15, $0, -10
# ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
# STUDENTS MAY MODIFY CODE ABOVE
exit:
add $2, $0, 10
syscall
.data
testcase1:
.word 0x00200020 # reverse is 0x04000400
testcase2:
.word 0x00300020 # reverse is 0x04000c00
testcase3:
.word 0x1234fedc # reverse is 0x3b7f2c48In: Computer Science
4. A English word is palindrome if its characters read the same backward as forward. For example, civic is palindrome. Describe a recursive algorithm for determining a word w of length n is palindrome or not. Analyze its time complexity using a recursion tree. Implement your algorithm in Java
In: Computer Science
Use MS Word to complete "Questions to be Graded: Exercises 31 and 32" in Statistics for Nursing Research: A Workbook for Evidence-Based Practice. Submit your work in SPSS by copying the output and pasting into the Word document. In addition to the SPSS output, please include explanations of the results where appropriate.
In: Statistics and Probability
1)please Explain the guard cell mechanism which opens and closes stomata in your own word at least five complete sentences
2) Explain angiosperm double fertilization. If it helps, feel free to include drawings in your own word at least five complete sentences
In: Biology