/ Looks up author of selected booksimport java.util.*;
class DebugNine1
{
public static void main(String[] args)
{
Scanner input = new Scanner(System.in);
String[][] books = new String[6][2];
books[0][0] = "Ulysses";
books[0][1] = "James Joyce";
books[1][0] = "Lolita"
books[1][1] = "Vladimir Nabokov";
books[2][1] = "Huckleberry Finn";
books[2][1] = "Mark Twain";
books[3][0] = "Great Gatsby";
books[3][2] = "F. Scott Fitzgerald";
books[4][0] = "1984";
books[4][1] = "George Orwell";
books[5][5] = "Sound and the Fury";
books[5][1] = "William Faulkner";
String entry,
shortEntry,
message ="Enter the first three characters of a book title omitting \"A\" or \"The\" ";
int num, x;
boolean isFound = true;
while(!isFound)
{
System.out.println(message);
entry = input.next();
shortEntry = entry.substring(0,3);
for(x = 0; x < books.length; ++x)
if(books[x][0].startsWith(shortEntry))
{
isFound = true;
System.out.println(books[x][x] + " was written by " + books[x][1]);
x = books.length;
}
if(isFound)
System.out.println("Sorry - no such book in our database);
}
}
}

Answers

Answer 1
Answer:

Answer:

What's the question?

Explanation:


Related Questions

What is computer?iwhat is computer ​
When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the location and size of the control.
If two light bulbs are wired in series and one bulb burns out the other bulb will
_ is an important management tool that is used to monitor and manage that contract and/or project
9 Which of these words is used to begin a conditional statement? ​

Which of the following are key corporate assets?A) intellectual property, core competencies, and financial and human assetsB) production technologies and business processes for sales, marketing, and financeC) knowledge and the firm's tangible assets, such as goods or servicesD) time and knowledge

Answers

Answer:

A) intellectual property, core competencies, and financial and human assets                                

Explanation:

Key corporate assets are

Intellectual property

Core competencies

Financial and human assets.

Corporate assets are referred to as individuals, properties, goods, data  company or firm repute.These assets are managed digitally. A digital firm is the one in which almost all the important business partnerships and relationships that an organization has with their employees, customers are administered, interposed and handles digitally.

Intellectual property:

It is a property that is the outcome of human creativity and intelligence. It is an intangible property such as copyrights, patents, trademarks etc. The IP strategy is basically a strategy, in accordance with the company's business objectives, to obtain IP assets and extract the most benefit from current IP assets.

Core Competencies:

Core competencies are the skills and proficiency that are essential for a company or business to attain competitive edge. They separate an organization from its competitors and create a competitive lead for a it in the marketplace. Core competency is an corporation's tactical and strategic strength. Development of core competencies of an corporation helps to sustain the competitive advantage of the corporation for a long time.

Financial and human assets.

Basically, the individuals in a corporate determine and define a corporate's success or failure. Human assets are a part of the company's intangible assets. For example human capital is an intangible asset. It can be defined as economic benefit of a worker's experience and skills. For example assets like knowledge, training, intellect, expertise, health. The abilities of employees reflects corporate's assets.

Financial assets refer to a security contract that contains a right over the real assets of a company. For example cash, stocks, bonds and bank deposits. A financial asset has a claim on the real assets or physical assets usually possessed by a company. Financial assets 'main contribution is to finance companies or money making organizations. These are provided in the market so that investors can bring their investments to use, and corporations can invest in real assets and make money.

Volume of Pyramid = A*h/3 where A is the area of the base of the pyramid and h is the height of the pyramid. Write a C++ program that asks the user to enter the necessary information about the pyramid (note that the user would not know the area of the base of the pyramid, you need to ask them for the length of one of the sides of the base and then calculate the area of the base). Using the information the user input, calculate the volume of the pyramid. Next display the results (rounded to two decimal places). Example Output (output will change depending on user input): The area of the base of the pyramid is: 25.00 The height of the pyramid is: 5.00 The volume of the pyramid is: 41.67 *Pseudocode IS required for this program and is worth 1 point. The program IS auto-graded.

Answers

Answer:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

   double side, height;

   

   cout<<"Enter the length of one of the sides of the base: ";

   cin>>side;

   cout<<"Enter the height: ";

   cin>>height;

   

   double area = side * side;

   double volume = area * height / 3;

   

   cout<<"The area of the base of the pyramid is: "<<area<<endl;

   cout<<"The height of the pyramid is: "<<height<<endl;

   cout<<"The volume of the pyramid is: "<<fixed<<setprecision(2)<<volume<<endl;

   return 0;

}

Pseudocode:

Declare side, height

Get side

Get height

Set area = side * side

Set volume = area * height / 3

Print area

Print height

Print volume

Explanation:

Include <iomanip> to have two decimal places

Declare the side and height

Ask the user to enter side and height

Calculate the base area, multiply side by side

Calculate the volume using the given formula

Print area, height and volume (use fixed and setprecision(2) to have two decimal places)

Assume that two computers are directly connected by a very short link with a bandwidth of 125 Mbps. One computer sends a packet of 1000 Bytes to the other computer. What’s the end-to-end delay (ignoring the propagation delay)?

Answers

Answer:

End to End Delay = 64 micro second

Explanation:

Given

Bandwidth = 125Mbps

A packet = 1000 bytes

Converting bandwidth from Mbps to bit/s

Bandwidth = 125* 10^6 bits/s

Bandwidth = 125,000,000 bit/s

End to End delay is calculated as

Length of Packet ÷ Bandwidth

Length of Packet = 1,000 byte --- convert to bits

Length of Packet = 1000 * 8

Length of Packet = 8,000 bits

So, End to End delay = 8,000/125,000,000

End to End Delay = 0.0000064 seconds --- convert to micro second

End to End Delay = 64 micro second

What subnet mask or CIDR notation would be required to maximize the host counts while still meeting the following requirements: 192.168.228.0 255.255.255.128 Required Networks: 2 Required Hosts: 20

Answers

Answer:

192.168.228.0 255.255.255.224

Explanation:

192.168.228.0 255.255.255.128

subnet mask: defines the host and the network part of a ip

CIDR notation : is the shortened form for subnet mask that uses the number of host bits for defining the host and the network part of a ip

For example: 192.168.228.0 255.255.255.128 has CIDR equivalent of 192.168.228.0\25

To have atleast 20 hosts

20 ≤ (2^x) -2

x ≈5

with 5 host bits, we have 2^5-2 = 30 hosts per subnet

and 2^3 = 8 subnets

To get the subnet mask, we have 3 network bits

1110000 to base 10 = 2^7 + 2^6 +2^5= 224

192.168.228.0 255.255.255.224

Which of the following statements is NOT true regarding the Security Configuration and Analysis (SCA) tool?a. It evaluates the current security state of computers in accordance with Microsoft security recommendations.
b. It allows an administrator to analyze a computer and compare its configuration settings with a baseline.
c. It can apply a baseline to force current computer settings to match the settings defined in the baseline.
d. It uses security templates to store the settings that make up baselines.

Answers

Answer: a. It evaluates the current security state of computers in accordance with Microsoft security recommendations

Explanation:

The Security Configuration and Analysis tool allows the configuration of local computers through the application of the settings in a security template to the local policy.

This allows an administrator to analyze a computer and compare its configuration settings with a baseline. The Security Configuration and Analysis (SCA) tool also uses security templates to store the settings that make up baselines.

Therefore, based on the options given, the correct option is A as the SCA tool doesn't evaluate the current security state of computers in accordance with Microsoft security recommendations.

Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication. i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks

Answers

Answer and Explanation:

I and II answered

Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.

Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.

Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.

Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.