Write a function named wordLineCount with the following input and output: Input: a string parameter, inFile, that is the name of a file Output: return a dictionary in which each unique word in inFile is a key and the corresponding value is the number of lines on which that word occurs The file inFile contains only lower case letters and white space. For example, if the file ben.txt contains these lines tell me and i forget teach me and i remember involve me and i learn then the following would be correct output:

>>> print(wordLineCount('ben.txt')){'remember': 1, 'and': 3, 'tell': 1, 'me': 3, 'forget': 1, 'learn': 1,'involve': 1, 'i': 3, 'teach': 1}

Answers

Answer 1

Answer:

def wordLineCount(file):

   dic = {}

   with open(file,'r') as file:

       

       text = file.read()

       text = text.strip().split()

       for word in text:

           if word in dic:

               dic[word] += 1

           else:

               dic[word] = 1

   return dic

print(wordLineCount('ben.txt'))

Explanation:

The programming language used is python.

The program starts by defining the function, an empty dictionary is created to hold the words and the number of times that they occur. the with key word is used to open the file, this allows the file to close automatically as soon as the operation on it is finished.

The data in the file is read to a variable text, it is striped from all punctuation and converted to a list of words.

A FOR loop and an if statement is used to iterate through every word in the list and checking if they are already in the dictionary. if the word is already contained in the dictionary, the number of occurrences increases by one. otherwise, it is added to the dictionary.

check the attachment to see code in action.

Write A Function Named WordLineCount With The Following Input And Output: Input: A String Parameter,

Related Questions

Suppose a computer using direct mapped cache has 220 bytes of byte-addressable main memory, and a cache of 32 blocks, where each cache block contains 16 bytes. a. How many blocks of main memory are there? b. What is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, block, and offset fields? c. To which cache block will the memory address 0DB6316 map?

Answers

Answer:

Following are given answers to each part as required.

I hope it will help you!

Explanation:

Based on a customer's requirements, the CPQ Admin has created multiple configuration attributes and assigned them to a single feature. Which configuration is valid for displaying the attributes?Choose one answerA. Above or below all product options in the feature.B. Above or below the feature in the bundle.C. Above or below all features in the bundle.D. Above all product options in the feature."

Answers

Answer:

Option A is the correct option.

Explanation:

The following option is correct because the following configuration is used to show the attributes which assigned in the individual feature by the CPQ Admin. So, the following configuration is the valid configuration that fulfills the necessity of the customer's.

Option B, C, and D is not the valid configuration which based on the necessity of the customer's.

What is the most common way for an attacker outside of the system to gain unauthorized access to the target system?

Answers

Stack and buffer overflow

Which of the following describes a VPN?

a. A hardware and software solution for remote workers, providing users with a data-encrypted gateway through a firewall and into a corporate network
b. A connection that connects two offices in different locations
c. A proprietary protocol developed by Microsoft that provides a user with a graphical interface to another computer
d. A small home office

Answers

Answer:

a. A hardware and software solution for remote workers, providing users with a data-encrypted gateway through a firewall and into a corporate network

Explanation:

VPN is the initial for Virtual Private Network. it is a highly secured channel that is encrypted end to end for for exchanging information via a public network like the internet.

Write a program that takes two numbers from the Java console representing, respectively, an investment and an interest rate (you will expect the user to enter a number such as .065 for the interest rate, representing a 6.5% interest rate). Your program should calculate and output (in $ notation) the future value of the investment in 5, 10, and 20 years using the following formula:

future value = investment * (1 + interest rate)^year

We will assume that the interest rate is an annual rate and is compounded annually.

Answers

Answer:

in this case you have to use a For cycle

Explanation:

This is the entire code for this program

Step 1: We declare two variables investment and interest with double, and we take the numbers with the console.

We ask with console the two numbers  

We show the two number in console

Step 2: We create two new double variable: Value and cont5

We save the formula in the variable Value

We create 3 For cycle

the first one for 5 years

the second one for 10 years

the third one for 20 years

package javaapplication6;

import java.util.*;

public class JavaApplication6 {

   /**

    * @param args the command line arguments

    */

   public static void main(String[] args) {

       // TODO code application logic here

     double investment;

     double interest;

Scanner keyboard = new Scanner(System.in);

 

System.out.println("Enter the investment");

investment = keyboard.nextDouble();

System.out.println("Enter the interest" );

interest = keyboard.nextDouble();

 

System.out.println("With an investment of $"+investment);

 

System.out.println("an interest rate of "+interest+"% compounded annually:");

double Value = investment * (1+interest);

double cont5 = Value;

//int Value = getValue(investment,interest,5);

for(int year = 1; year <= 4; year++){

   cont5 = cont5 * Value;

}

System.out.println("In 5 years the value is : "+"$"+cont5);

double cont10 = Value;

//Value = getValue(investment,interest,10);

for(int year = 1; year <= 9; year++){

   cont10 = cont10 * Value;

}

System.out.println("In 10 years the value is : "+"$"+cont10);

double cont20 = Value;

//Value = getValue(investment,interest,20);

for(int year = 1; year <= 19; year++){

   cont20 = cont20 * Value;

}

System.out.println("In 20 years the value is : "+"$"+cont20);

}

}  

P3. In Section 4.2 , we noted that the maximum queuing delay is (n–1)D if the switching fabric is n times faster than the input line rates. Suppose that all packets are of the same length, n packets arrive at the same time to the n input ports, and all n packets want to be forwarded to different output ports. What is the maximum delay for a packet for the (a) memory, (b) bus, and (c) crossbar switching fabrics?

Answers

Answer:

All points are explained below in detail.

I hope it will help you

Explanation:

A hacktivist is someone who _______.

a. ​attempts to gain financially and/or disrupt a company’s information systems and business operations
b. attempts to destroy the infrastructure components of governments
c. hacks computers or Web sites in an attempt to promote a political ideology
d. violates computer or Internet security maliciously or for illegal personal gain

Answers

Answer:

A hacktivist is someone who hacks computers or Web sites in an attempt to promote a political ideology

Explanation:

Computer hacking is the process in which attacker or outsiders try to access the data of the company or some personnel data to damage the reputation.

Now a days, computer hacking in terms of politics is also adopted by different attackers to damage the reputation of some politician. This type of hacker are called hacktivist.

What advantages do stack parameters have over register parameters?a. Programs using stack parameters execute more quickly.b. Register parameters are optimized for speed.c. Stack parameters reduce code clutter because registers do not have to be saved and restored.d. Stack parameters are compatible with high-level languages.

Answers

Answer:

C. Stack parameters reduce code clutter because registers do not have to be saved and restored.

D. Stack parameters are compatible with high-level languages.

Explanation:

The advantages stack parameters have over register parameters are that stack parameters reduce code clutter because registers do not have to be saved and restored and are also compatible with high-level languages.

A line in the Agile Manifesto reads, "____________ and _____________ over processes and tools". Please select which option best completes the statement. Select one:
a. People; Relationships
b. Customer; Individuals
c. Customers; Employees
d. Individuals; Interactions

Answers

Answer:

Option D i.e., Individuals; Interactions is the correct option.

Explanation:

Because Agile Manifesto is the development software tool that is used to reads the line for the individuals and it also interacts with the process of the user. It also used to collaborate with their customers to negotiates the contacts of the customers.

Other option is not correct because they are not related to the following statement.

Which of the following is NOT a strategy for protecting Active Directory (AD)?

Limit the number of administrators with access to AD.

Ensure that administrators managing AD do so using separate Administrator user accounts.

Require that AD administrators do their AD work only from their workstations instead of dedicated terminal servers.

Periodically change the Directory Service Restore Mode (DSRM) password.

Answers

Answer:

Require that AD administrators do their AD work only from their workstations instead of dedicated terminal servers.

Step-by-step explanation:

Requiring that AD administrators do their AD work only from their workstations instead of dedicated terminal servers is not helpful and improbable. They will need to work from their dedicated terminal servers.

You need to transfer data from one laptop to another and would like to use an Ethernet cable. You do not have a hub or a switch. Which type of cable should you use?

Answers

Answer:

The correct answer to the following question will be Crossover.

Explanation:

Crossover: The cable which is used to connect the same type of two Ethernet devices directly, known as Crossover cable also known as crossed cable. The temporary host-to-host networking can be created with the help of these types of crossed cables.

To connect the old router to the switch of a network, a normal cable will provide a link from the functioning.The crossover cable will be the most suitable cable for transferring the data from one device to another device, such as a laptop.

So, Crossover is the right answer.

Create a VBScript script (w3_firstname_lastname.vbs) that takes one parameter (folder name) to do the following

1) List all files names, size, date created in the given folder
2) Parameter = Root Folder name The script should check and validate the folder name
3) Optionally, you can save the list into a file "Results.txt" using the redirection operator or by creating the file in the script.
4) Make sure to include comment block (flowerbox) in your code.
5) Sample run:- C:\entd261>cscript.exe w3_sammy_abaza.vbs "c:\entd261" >results.txt

Answers

Answer:

VBScript is given below

Explanation:

As per the given details the program should be as follows:

if (WScript.Arguments.Count = 0) then

WScript.Echo "Missing parameters"

else

'Declare the File System object to be used

Dim fso

'Declare the path variable to be used for storing the path entered by user

Dim path

'Create the File System object using the FileSystemObject class

Set fso = CreateObject("Scripting.FileSystemObject")

'initialize the path

path = WScript.Arguments(0)

'Check if the path exists

exists = fso.FolderExists(path)

if (exists) then

'declare a constant of size 1024 since 1024 bytes = 1 Kb

CONST bytesToKb = 1024

'Print the selected path

WScript.Echo "Selected Path " & WScript.Arguments(0)

'get the folder on path

Set inDir=fso.GetFolder(path)

'Create the file to store the output results

Set outFile = fso.CreateTextFile("Results.txt",True)

'Print the name, date created and size of each file and store the same in output file

For Each objFile in inDir.Files

  'Calculate the padding needed for File Name. Assuming the maximum length of file name is 40 characters

  namePadding = 40 - Len(objFile.Name)

  'Calculate the padding needed for Date

  datePadding = 30 - Len(objFile.DateCreated)

  'Add spaces to file Name so that same can be printed in a tabular format

  fileName = objFile.Name & Space(namePadding)

  'Add spaces to date so that same can be printed in a tabular format

  dateCreated = objFile.DateCreated & Space(datePadding)

  'Print the details on screen

  Wscript.Echo fileName & dateCreated & CINT(objFile.Size / bytesToKb) & "Kb"

  'Store the details in ouput file with a newline character at the end

  outFile.Write fileName & dateCreated & CINT(objFile.Size / bytesToKb) & "Kb" & vbCrLf

Next

'Close the output file once the loop ends

outFile.Close

else

'Print a message if the path does not exist

WScript.Echo "Invalid Path Entered"

end if

end if

In this exercise we have to use the programming knowledge to program from python in this way, so:

The code to solve this programming can be found in the image attached below.

As per the given details the program should be as follows:

if (WScript.Arguments.Count = 0) then

WScript.Echo "Missing parameters"

else

'Declare the File System object to be used

Dim fso

'Declare the path variable to be used for storing the path entered by user

Dim path

'Create the File System object using the FileSystemObject class

Set fso = CreateObject("Scripting.FileSystemObject")

'initialize the path

path = WScript.Arguments(0)

'Check if the path exists

exists = fso.FolderExists(path)

if (exists) then

'declare a constant of size 1024 since 1024 bytes = 1 Kb

CONST bytesToKb = 1024

'Print the selected path

WScript.Echo "Selected Path " & WScript.Arguments(0)

'get the folder on path

Set inDir=fso.GetFolder(path)

'Create the file to store the output results

Set outFile = fso.CreateTextFile("Results.txt",True)

For Each objFile in inDir.Files

 namePadding = 40 - Len(objFile.Name)

 'Calculate the padding needed for Date

 datePadding = 30 - Len(objFile.DateCreated)

   fileName = objFile.Name & Space(namePadding)

  dateCreated = objFile.DateCreated & Space(datePadding)

 'Print the details on screen

 Wscript.Echo fileName & dateCreated & CINT(objFile.Size / bytesToKb) & "Kb"

 'Store the details in ouput file with a newline character at the end

 outFile.Write fileName & dateCreated & CINT(objFile.Size / bytesToKb) & "Kb" & vbCrLf

Next

'Close the output file once the loop ends

outFile.Close

else

'Print a message if the path does not exist

WScript.Echo "Invalid Path Entered"

end if

end if

See more about python at brainly.com/question/26104476

Each 4G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network

A. True
B. False

Answers

Answer:

A. True.

Explanation:

It is true that each 4G device has a unique Internet Protocol (IP) address and appears just like any other wired device on a network.

Consider the following 3 programs:

1
//contents of file foo.c:
static int a = 5;
int main() {
f();
return 0;
}
//contents of file bar.c:
static int a = 10;
void f() {
printf("%d\n", a);
}

2
//contents of file foo.c:
int a = 5; int main() {
f();
return 0;
}
//contents of file bar.c:
void f() { int a = 10;
printf("%d\n", a);
}

3
//contents of file foo.c:
int a = 5;
int main() {
f(); return 0;
}
//contents of file bar.c:
int a;
void main() {
printf("%d\n", a);
}

If the command "gcc foo.c bar.c" is executed, which of the above programs result in a linker error?

Answers

Answer:

If the following programs are executed then Program 2 results "linker error"

Explanation:

Because In program 1, which is in the C Programming Language they declare the integer data type variable "a" as static in both files, so the scope of the static member is in the file or method then, the output of the following Program 1 is 10.

In the Program 2, which is in the C Programming Language they declare the integer data type variable in both files with initialization of 5 and 10, so when they execute the following Program 2 then, it occurs an "linker error" because the following program cannot find the value of the integer variable a.

In the Program 3, which is in the C Programming Language they declare the integer data type variable in both files but they initialize in the file "foo.c" is 5 and not initialize in the file "bar.c", so when they execute the following Program 3 then, its output is 5.

Describe precisely what the routers can send back to make prohibited outgoing TCP connections fail quickly. (Assume they cannot make any changes to the TCP implementation on clients.)

Answers

Answer:

See the explanation

Explanation:

1. The router can send back an ICMP error code indicating what happened in this case.  

2. If you send back an ICMP error code, the user's connection attempt will fail immediately, otherwise it will time out which will take several minutes.  

There are two types of ICMP codes they are destination unreachabl and destination administratively unreachable:

- The first pair of ICMP error codes(destination unreachable)might return, host unreachable and network unreachable. It is designed to indicate serious network problems.

- The second set of ICMP error codes the (destination administratively unreachable)might return, host administratively unreachable and network administratively unreachable.It is added to the official list of ICMP message types later, specifically to return when they dropped a packet.  

If your router returns an ICMP error code for every packet that violates your filtering policy you are also giving an attacker a way to probe your filtering system.  

If your router offers enough flexibility, it might make sense to configure it to return ICMP error codes to internal systems (which would like to know immediately that something is going to fail, rather than wait for a timeout) but not to external systems.

Hope this helps!

Which of the following function declarations correctly expect an array as the first argument?

Question 1 options:

void f1(int array, int size);

void f1(int& array, int size);

void f1(int array[100], int size);

void f1(float array[], int size);

All of the above

C and D

A and B

Answers

Answer:

Only

Option: void f1(float array[], int size);

is valid.

Explanation:

To pass an array as argument in a function, the syntax should be as follows:

functionName (type arrayName[ ] )

We can't place the size of the array inside the array bracket (arrayName[100]) as this will give a syntax error. The empty bracket [] is required to tell the program that the value that passed as the argument is an array and differentiate it from other type of value.

What is the importance of having standard framework for networking and the evolution of networks?

Answers

Answer:

Generally, a framework is more comprehensive and perspective than a protocol and a structure.

Explanation:

Importance of standard framework for the evolution of the networks:

The two dealer systems can not directly communicate because every different dealer follows different apparatus and protocols.Used for communicating across different networks.

There are two types of the framework used in computer networks, these are as follows:

OSI Reference modelTCP/IP Model

To communicate between the computer, a framework can be provided by any of the models either its OSI or TCP/IP.

Given below is information about a network.

Choose one of the following three​ options:
A. the network is definitely a​ tree;
B. the network is definitely not a​ tree;
C. the network may or may not be a tree​ (more information is​ needed).

Accompany your answer with a brief explanation for your choice. The network has 11 vertices and 11 edges.

Answers

Answer:

Option (B) is the correct answer.

Explanation:

The network is used to share the information between two or more persons or systems in a connected pair. It has vertices and edges on which vertices mean the points which participate to communicate and edges are used for the medium by which communication is done.

The network can make the shape of a tree or not. If it follows the property of a tree we can say that it is a tree otherwise it can not be called a tree.

Here in the question, it is a given that there are 11 vertices and 11 edges.

But from the tree property if there are n vertices and n-1 edges then any circuit is called a tree, But this circuit has n edges and n vertices that's why it is not a tree. Hence option b is the correct answer.

While other is not valid because-

Option "a" suggests that this circuit is a tree that is not correct.Option b suggests that this circuit may or may not a tree but it is proved that this circuit is not a tree.

You have several pictures of different sizes that you would like to frame.A local picture framing store offers two types of frames—regular andfancy. The frames are available in white and can be ordered in any colorthe customer desires. Suppose that each frame is 1 inch wide. The costof coloring the frame is $0.10 per inch. The cost of a regular frame is$0.15 per inch and the cost of a fancy frame is $0.25 per inch. The costof putting a cardboard paper behind the picture is $0.02 per square inchand the cost of putting glass on top of the picture is $0.07 per square inch. The customer can also choose to put crowns on the corners,which costs $0.35 per crown. Write a program that prompts the userto input the following information and then output the cost of framing the picture:a. The length and width, in inches, of the picture.b. The type of the frame.c. Customer's choice of color to color the frame.d. If the user wants to add the crowns, then the number of crowns.

Answers

Answer:

written in java

Note :  Package name was excluded

 

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       //declared 8 uninitialised variable  

       String input;

       double cost, colorC, frameC, paperC, glassC, crownC;

       char crowns;

       int type, color, crown, length, width, area, perimeter;

       

       //creating an instance of the Scanner class to accept value from user

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter length of frame: ");

       length = scanner.nextInt();

       System.out.print("Enter width of frame: ");

       width = scanner.nextInt();

       System.out.print("Do you want a fancy frame or a regular frame\nEnter 1 for fancy, 2 for regular: ");

       type = scanner.nextInt();

       if (type == 1) {

           frameC = 0.25;

       } else {

           frameC = 0.15;

       }

       System.out.print("Do you want a white frame or a colored frame\nEnter 1 for white, 2 for colored: ");

       color = scanner.nextInt();

       if (color == 2) {

           colorC = .10;

       } else{

           colorC = 0;

       }

       System.out.print("Do you want crowns \nEnter y for yes, n for no ");

       input = scanner.next();

       crowns = input.charAt(0);

       if (crowns == 'y' || crowns == 'Y') {

           System.out.print("How many crowns?");

           crown = scanner.nextInt();

       } else

           crown = 0;

       if (crown > 0)

           crownC = crown * .35;

       else

           crownC = 0;

       area = length * width;

       perimeter = length * 2 + width * 2;

       paperC = area * .02;

       glassC = area * .07;

       cost = glassC + paperC + crownC + colorC * perimeter + frameC * perimeter;

       System.out.println("The cost of your frame is: $" + cost);

   }

}

Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Quit", "quit", or "q" for the line of text.

Answers

Final answer:

To write a program that takes in a line of text as input and outputs that line of text in reverse, you can use a loop to iterate through each character in the input string and concatenate them to a new string. The program can repeat until the user enters "Quit", "quit", or "q" for the line of text.

Explanation:

To write a program that takes in a line of text as input and outputs that line of text in reverse, you can use a loop to iterate through each character in the input string. Starting from the last character and moving backwards, you can concatenate each character to a new string. Here is an example program in Python:

line = input("Enter a line of text:")
reverse_line = ""

while line.lower() not in ["quit", "q"]:
   for i in range(len(line)-1, -1, -1):
       reverse_line += line[i]
   print(reverse_line)
   line = input("Enter a line of text:")
   reverse_line = ""

Write code to create a set with the following integers as members: 10, 20, 30, and 40.

Answers

Answer:

import java.util.*;  

public class Create_set

{

   public static void main(String args[])

   {

       Set<Integer> hset = new HashSet<Integer>(); //creating set using hashset of Integer type

       hset.add(10); //add method add members to set

       hset.add(20);

       hset.add(30);

       hset.add(40);

       System.out.println(hset); //printing the set

       

   }

}

OUTPUT :

[20,40,10,30]

Explanation:

The above code is implemented through java language. First a collection object is created using Set interface. Then that interface is implemented using Hashset class. As they are of generic datatype, Integer type is declared for this object. Then using add() method elements of the set are added and at last they are printed.

Set is an unordered collection which means elements can't be accessed through their particular position and no duplicate values are stored in sets.  

Which of the following are "Best Practices" that may be appropriate for software intensive programs? (Select all that apply)
Possible Answers (Please comment if you have the answer, Thank You):
Consider the risks of reusing existing software
Use metrics to manage and monitor risk
To speed development, only test software at completion
Generate new code whenever possible

Answers

The best practices that may be appropriate for software intensive programs are:

Consider the risks of reusing existing software To speed development, only test software at completion Generate new code whenever possible

Explanation:

Consider the risks of reusing existing software. While reusing the existing software one has to take special care about the modifications to be made and  inheritances to be made.In order to do speed up the development, test the software at completion.Once the software is complete,  it can be tested for all the bugs and improvements and improved in accordance.New code should be generated whenever possible to provide more abstraction and module formation to aid the process of coding and indentation.
Final answer:

Best practices for software intensive programs include considering the risks of reusing existing software, using metrics to manage and monitor risk, and generating new code whenever possible.

Explanation:Best Practices for Software Intensive ProgramsConsider the risks of reusing existing software: Reusing existing software can save time and effort, but it is important to assess the risks involved. It's crucial to evaluate the quality and compatibility of the software to ensure it meets the requirements.Use metrics to manage and monitor risk: Metrics provide a quantitative way to measure and track risks in software development. By using metrics, organizations can identify potential problems, assess the impact, and take necessary actions to mitigate risks.Generate new code whenever possible: While reusing code is beneficial, generating new code whenever possible helps ensure that the software is tailored to the specific needs and requirements of the program. This approach allows for more flexibility and adaptability in the long run.

Learn more about Software Intensive Programs here:

https://brainly.com/question/35070986

#SPJ3

Betsy recently assumed an information security role for a hospital located in the United States. What compliance regulation applies specifically to healthcare providers?

a. FFIEC
b. FISMA
c. HIPAA
d. PCI DSS

Answers

HIPAA compliance regulation applies specifically to healthcare providers

c. HIPAA

Explanation:

HIPAA stands for Health Insurance Portability and Accountability Act. HIPAA applies to specifically to healthcare providers.

It is a law which was designed to provide privacy standards to protect the patient's medical records, reports and other health information which may be sensitive or confidential provided to health plans, doctors, hospitals and other health care providers.

________ is a remote access client/server protocol that provides authentication and authorization capabilities to users who are accessing the network remotely. It is not a secure protocol.
1. Network access server (NAS)
2. Extensible Authentication Protocol (EAP)
3. Authentication Header (AH)
4. Terminal Access Controller Access Control System (TACACS)

Answers

Answer:

Correct answer is (4)

Explanation:

Terminal Access Controller Access Control System

Write a function that takes in a nonnegative integer and sums its digits. (Using floor division and modulo might be helpful here!)def sum_digits(n):"""Sum all the digits of n.>>> sum_digits(10) # 1 + 0 = 11>>> sum_digits(4224) # 4 + 2 + 2 + 4 = 1212>>> sum_digits(1234567890)45 """

Answers

Answer:

def sum_digits(n):

   sum=0

   while n>0:

       num=n%10     #will store digits of number

       sum+=num    #sums the digits

       n=int(n/10)

   return sum  #sum of digits is returned

Explanation:

In the above method , n is the number whose digit sum is to be returned. Sum is the variable which will store the sum of digits. Then a while loop will be executed until n is greater than 0 then num will store the individual digits of number and those digits will be added in sum variable. After that, n will be divided by 10. As we want only int variable we will typecast it into int.

Alice is working on a web page to attract the maximum number of people to join her cause. She wants to inform people about the benefits of adopting eco-friendly methods of living. Which writing style should she use to get visitors to join her cause?


A. formal writing style

B. informal writing style

C. standard writing style

D. persuasive writing style

#.

Answers

Answer:

Option D.    Persuasive writing style

is correct answer.

Explanation:

Alice should adopt the persuasive writing style as she wants to convince the people to adopt eco-friendly methods of living.When a person write persuasively, this means he/she will present justifications and reasons for that specific opinion he/she is trying to convince the audience.For the correctness of their opinion, different kinds of evidences are prepared so that the fact persuade the reader.Persuasive writing is used widely while writing academic papers, advertisements  and argumentative essays as well.i hope it will help you!

Answer:

D.) persuasive writing style

Explanation:

PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is discovered that has too many characters in it. In the main driver of the program, read strings from the user until the user enters "DONE". If a string is entered that has too many characters (say 20), throw the exception. Allow the thrown exception to terminate the program.

Answers

Answer

The answer and procedures of the exercise are attached in the following archives.

Step-by-step explanation:

You will find the procedures, formulas or necessary explanations in the archive attached below. If you have any question ask and I will aclare your doubts kindly.  

Which of the following integrity security mechanisms ensures that a sent message has been received intact, by the intended receiver?

A. IPSEC
B. SHA
C. DES
D. CRC

Answers

Answer:

Option A i.e., IPSEC is the correct option.

Explanation:

Because Internet Protocol security is the security of the Internet Protocol that make secure the sent message by sender and which has been received intact by the receiver which is intended to receive the message. Internet Protocol Security uses the Internet Protocol version 4 and the Internet Protocol version 6. So, that's why the following option is correct.

What is the purpose of using self.id in tests, while working with unittest?A. self.id returns the name of moduleB. self.id returns the name of methodC. self.id returns the name of classD. self.id returns reference value

Answers

Answer:

B. self.id returns the name of method.

Physical access, security bypass, and eavesdropping are examples of how access controls can be ________.

Answers

Answer: Compromised

Explanation:

Access control is the controlling and management unit for handling the  access of any user on a particular system. It implements a selective restriction on the users to access the function of computing system.

Authorized and permitted user are allowed to access the services and unauthorized party is not allowed for accessing the resources of the system. Permissible user can perform any task and consume service device.Compromising in access control depicts about intruding and spying of unauthorized user in devices that is eavesdropping. Security bypass is fault that lets the access to access system by another route.Thus, flaw in access control occurs then security of controlling and managing the system will be at risk as hacker and attacker can get access to perform function.

Final answer:

Physical access, security bypass, and eavesdropping can compromise access controls that protect information within an organization. Implementing strong access control policies helps prevent unauthorized access and data breaches.

Explanation:

Physical access, security bypass, and eavesdropping are examples of how access controls can be compromised.

Access control mechanisms are critical for protecting the confidentiality, integrity, and availability of information. When these controls fail or are bypassed, it can lead to unauthorized access and potentially to the leakage or corruption of sensitive data. Physical access refers to situations where an unauthorized individual gains direct access to hardware or systems. Security bypass occurs when normal security procedures are avoided or circumvented, often due to system or human vulnerabilities. Eavesdropping is the act of secretly listening to private conversations or monitoring transmissions, which can be a form of information theft.

Organizations must implement strong access control policies and measures, including physical security, authentication protocols, and encryption, to reduce the risk of these types of compromises and to safeguard their information assets effectively.

Other Questions
I need help ASAP... Its due tomorrow PLEASE HELP Which statement is correct? The range of the graph is all real numbers less than or equal to 0. The domain of the graph is all real numbers less than or equal to 0. The domain and range of the graph are the same. The range of the graph is all real numbers. Balance this equation C6H14(g) + O2(g) H2O(g) + CO2(g) The number of atoms in 5.78 mol NH4NO3. Show your work. Erma and Harvey were a compatible barnyard pair, but a curious sight. Harveys tail was only 6 cm while Ermas was 30 cm. Their F1 piglet offspring all grew tails that were 18 cm. When inbred (F1X F1), an F2 generation resulted in many piglets (Erma and Harveys grandpigs) whose tails ranged in 4 cm intervals from 6 to 30 cm (6, 10, 14, 18, 22, 26, 30). Most had 18 cm tails while 1/64 had 6 cm and 1/64 had 30 cm tails.a) Explain how tail length is inherited by describing the mode of inheritance, indicating how many gene pairs are at work, and designating the genotypes of Harvey, Erma, and their 18 cm offspring.b) If one of the 18 cm F1 pigs were mated with the 6 cm F2 pigs, what phenotypic ratio would be predicted if many offspring resulted? Samantha, who is single and has MAGI of $36,000, recently was employed by an accounting firm. During the year, she spends $1,650 for a CPA exam review course and begins working on a law degree in night school. Her law school expenses were $4,275 for tuition and $900 for books (which are not a requirement for enrollment in the course).Assuming no reimbursement, how much can Samantha deduct for the:a. CPA exam review course? $Xb. Law school expenses? $X The shadow of the moon during a solar eclipse travels 2300 miles in one hour in the first 20 minutes the Shoadow traveled seven 66 2/3 miles how long does it take for the Shadow to reach 1150 miles Which of the following statements about regulation of eukaryotic gene expression is INCORRECT?A) The presence of a nuclear membrane separating transcription and translation in eukaryotes led to the evolution of additional mechanisms of gene regulation.B) In eukaryotes, most structural genes are found within operons.C) Eukaryotic mRNAs are generally more stable than prokaryotic mRNAs.D) The rate of degradation of mRNAs is important in regulation in eukaryotes.E) Posttranslational regulation of histones is unique to eukaryotes. During the current year, Eleanor earns $120,000 in wages as an employee of an accounting firm. She also earns $13,000 in gross income from an outside consulting service she operates. Deductible expenses paid in connection with the consulting service amount to $3,000. Eleanor also incurs a recognized long-term capital gain of $1,000 from the sale of a stock investment. She must pay a self-employment tax on: What was required of immigrants processed at angel island but not those processed at Ellis island? Two angle measures in a triangle are 47 and 43. What type of triangle is it?acuteobtuserightisosceles please help 10 point + brainlyiest = one big thank uwhich of these is the algebraic expression for "five more than the product of ten and some number? 10 + 5x 5 + 10 + x 10x + 5 5 + 10 x 16. Afla numrul necunoscut:x + 7 = 36X-9 = 83X + (13- 8) = 74a - (14 - 6) = 6734 - X= 882 - x = 9114 Multiplying (-9)(-6)(2)= A licensed _______________ must display his or her license conspicuously in the principal place of business at all times. __________ refers to the process by which activities are started, directed, and continued so that physical and psychological needs or wants are met. 1. Motivation 2. Homeostasis 3 .Drive 4. Instinct How have you been of service to your community and what has that taught you about being a leader? Read the poem "Autumn" by Emily Dickinson.The morns are meeker than they were,The nuts are getting brown;The berry's cheek is plumper,The rose is out of town.The maple wears a gayer scarf,The field a scarlet gown.Lest I should be old-fashioned,I'll put a trinket on. Which statement best explains the central idea of the second stanza?1. Autumn weather requires warm clothing.2. Autumn is a time for celebrations.3. Nature changes the temperature in autumn.4. Nature has an elegant appearance in autumn. Donna danced into the party and immediately became the center of attention. With sweeping gestures of her arms and dramatic displays of emotion, she boasted about her career as an actress in a local theater group. During a private conversation, a friend inquired about the rumors that she was having some difficulties in her marriage. In an outburst of anger, she denied any problems and claimed that her marriage was "as wonderful and charming as ever." Shortly thereafter, while drinking her second martini, she fainted and had to be taken home. Mercury Inc. purchased equipment in 2019 at a cost of $400,000. The equipment was expected to produce 700,000 units over the next five years and have a residual value of $50,000. The equipment was sold for $210,000 part way through 2021. Actual production in each year was: 2019 = 100,000 units 2020 = 160,000 units 2021 = 80,000 units. Mercury uses units-of-production depreciation, and all depreciation has been recorded through the disposal date.Prepare the journal entry to record the sale. Steam Workshop Downloader