The authentication can be done by using user id and password, social sign-in or by using the biometrics.
How to explain the information?Authentication works as follows:
Prompting the user to enter the credentials. Send credentials to the authentication server. Match the credentials. Authorize the user and grants the accesExternal Website security:
Use of firewall. Implement the access control. Use of MVC (Model View Controller) Use of encryption. Use of SSL certificate.Use of security plugins. Use of network monitoring team.Internal Website security:
Use of authentication to identify the user identity. Use of authorization to provide different user with the specific privileges and access. Encrypt or hide sensitive web pages. By implementing IT policies. Educate the user about the website.Remote Access Solution:
Remote access provides better security, cost efficiency, ease of management, and increased availability.
Remote access can be deployed by using the RAS gateway.
Firewall and Basic rules recommendations:
Firewall is important for managing the traffic and providing external website security. Rules to prevent SQL injection and XSS. Allow only the specific type of traffic. Use access rules for IP security. Implement certain IT policies.Wireless Security:
Wifi is being used in every organization and it prevents the network from malicious access.
Wireless security can be provided by usin encryption, decryption, and authorization.
VLAN configuration:
VLAN are important for traffic filtering and providing the logical division of the network.
VLAN can be configured for web interface and can provide web filtering.
VLAN can be configured between router and firewall that passes the network.
Laptop Security Configuration:
Use of password, VPN and the registering the laptop will provide laptop security. .
Application policy recommendations:
Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.
Security and privacy policy recommendations:
It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.
Intrusion detection or prevention for systems containing customer data:
IPS is implemented behind firewall and it matches the incoming traffic against the security policies.
Learn more about security infrastructure on:
https://brainly.com/question/5939963
#SPJ1
How to enter Data into cells in excel
Answer:
u can enter data into excel by either copy pasting by right clicking or typing It manually in the Fx box located at the top
Question One
a) The research department of De-mod Limited has developed a software at a cost of ten million cedi that is a game changer. In other to ensure total ownership and control of the software, you have been consulted to provide an advice on what De-mod Limited can do to maintain absolute ownership and control of the newly developed software.
With the knowledge you have acquired in this course, examine at least three protections for developers of computer software, stating the merits and demerits of each EV(7Marks)
The three protections for developers of computer software, are:
Patents Copyright and Trade secretsTrademarks.What are the different kinds of protection of computer software?The principal modes of protection of software is known to be copyright and patents. Copyright is said to be used a lot so as to protect computer program, this is due to the fact that writing of a code is one that tends to be similar to any other kinds of literary work.
Patents are known to be exclusive right of a person to make or produce, use their invention and thus The three protections for developers of computer software, are:
Patents Copyright and Trade secretsTrademarks.Note that the use of patent and copyright benefits a person as it tends to give them the power over their products and services.
Learn more about computer software from
https://brainly.com/question/1538272
#SPJ1
In cell N2, enter a formula using the IF function and structured references as follows to determine which work tier Kay Colbert is qualified for:
a. The IF function should determine if the student's Post-Secondary Years is greater than or equal to 4, and return the value 2 if true or the value 1 if false.
The IF Function based formula that can be entered into cell N2 that will return 2 if true, and 1 if false is =IF(M2 >=4, 2, 1).
How is the IF function used?An IF function allows us to be able to sort through data by analyzing data to find out if it conforms to a certain characteristic that we are looking for.
If the data corresponds, the IF function will return a value that means True, but if it doesn't, the value returned would be false.
After typing in the IF function, the next thing to do is specify the cell where the data you want to analyze is. In this case that data is in cell M2. You immediately follow this up by the parameter being compared.
In this case, we want to know if the figure in cell M2 is greater or equal to 4 so the next entry is M2>=
The next entry is the return if the comparison is true. In this case, the number for true is 2 and the one for false is 1. The full formula becomes:
=IF(M2 >=4, 2, 1).
In conclusion, the function is =IF(M2 >=4, 2, 1).
Find out more on the spreadsheets at https://brainly.com/question/1429504.
#SPJ1
Task 03
Write C# code which starts with the number 1 and then displays the result of halving
the previous number until the result is less than 0.001.
The expected output should be:
1.0
0.5
0.25
0.125
0.0625
0.03125
0.015625
0.0078125
0.00390625
0.001953125
Answer:
class Program {
public static void Main (string[] args) {
double number = 1.0;
while(number >= 0.001) {
Console.WriteLine (number);
number /= 2;
}
}
}
Explanation:
Always think carefully about what is in the condition of the while statement. In this case, you want the loop to be executed as long as the number is larger than or equal to 0.001.
Question 4 of 10
Which action takes place in the Define step of the game development cycle?
A. Looking for errors and determining how best to fix them
B. Choosing a color scheme and overall theme for the game
OC. Determining the goals of the game
D. Releasing the game and collecting feedback from users
SUBMIT
An action which takes place in the Define step of the game development cycle is: C. determining the goals of the game.
What is GDLC?GDLC is an acronym for game development life cycle and it can be defined as a strategic methodology that defines the key steps, phases, or stages that are associated with the design, development and implementation of high quality gaming software programs (applications).
In Computer science, there are seven (7) phases involved in the development of a gaming software program and these include the following;
DefinePlanningDesignDevelopment (coding)TestingDeploymentMaintenanceIn this context, we can infer and logically deduce that determining the goals of the game is an action which takes place in the Define step of the game development cycle.
Read more on software here: brainly.com/question/26324021
#SPJ1
Which action takes place in the Deploy stop of the game development cycle?
Answer: is D. Releasing the game and collecting feedback from users
How serious are the risks to your computer security?
Why is it important to protect a Wi-Fi network? What should you do to protect your Wi-Fi network?
The seriousness of the risks to your computer security is not to be a severe one. This is because Computer security risks are due to the handwork of malware such as, bad software, that can infect a computer, and make the hacker to destroy your files, steal your data, or even have access to your system without one's knowledge or authorization.
What are the risk results for information and computer security?The term “information security risk” is known to be those damage that occurs due to an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.
Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.
Hence, The seriousness of the risks to your computer security is not to be a severe one. This is because Computer security risks are due to the handwork of malware such as, bad software, that can infect a computer, and make the hacker to destroy your files, steal your data, or even have access to your system without one's knowledge or authorization.
Learn more about computer security from
https://brainly.com/question/12010892
#SPJ1
In python please:
Assume the variable definitions references a dictionary. Write an ig statement that determined whether the key ‘marsupial’ exist in the dictionary. If so, delete ‘marsupial’ and it’s associated value. If the key is not the dictionary, display a message indicating so.
Answer:
"
if 'marsupial' in dictionary:
del dictionary['marsupial']
else:
print("The key marsupial is not in the dictionary")
"
Explanation:
So you can use the keyword "in" to check if a certain key exists.
So the following code:
"
if key in object:
# some code
"
will only run if the value of "key" is a key in the object dictionary.
So using this, we can check if the string "marsupial' exists in the dictionary.
"
if 'marsupial' in dictionary:
# code
"
Since you never gave the variable name for the variable that references a dictionary, I'm just going to use the variable name "dictionary"
Anyways, to delete a key, there are two methods.
"
del dictionary[key]
dictionary.pop(key)
"
Both will raise the error "KeyError" if the key doesn't exist in the dictionary, although there is method with pop that causes an error to not be raised, but that isn[t necessary in this case, since you're using the if statement to check if it's in the dictionary first.
So I'll just use del dictionary[key] method here
"
if 'marsupial' in dictionary:
del dictionary['marsupial']
else:
print("The key marsupial is not in the dictionary")
"
The last part which I just added in the code is just an else statement which will only run if the key 'marsupial' is not in the dictionary.
Write a program to demonstrate doubly linked list using pointers – insert (beginning, end,
middle), delete(beginning, end, middle),view)
A program to demonstrate doubly linked list using pointers – insert (beginning, end, middle), delete(beginning, end, middle),view) is:
/* Initialize nodes */
struct node *head;
struct node *one = NULL;
struct node *two = NULL;
struct node *three = NULL;
/* Allocate memory */
one = malloc(sizeof(struct node));
two = malloc(sizeof(struct node));
three = malloc(sizeof(struct node));
/* Assign data values */
one->data = 1;
two->data = 2;
three->data = 3;
/* Connect nodes */
one->next = two;
one->prev = NULL;
two->next = three;
two->prev = one;
three->next = NULL;
three->prev = two;
/* Save address of first node in head */
head = one;
What is a Doubly Linked List?This refers to the linked data structure that contains of a set of sequentially linked records called nodes.
The requested program is given above.
Read more about doubly linked list here:
https://brainly.com/question/13326183
#SPJ1
Write the function definition for a function called list_total that accepts a list of integers
as a parameter. The function should sum all the numbers in the list and return the total.
Answer:
def list_total(numbers):
sum_of_numbers = 0
for number in numbers:
sum_of_numbers += number
return sum_of_numbers
Explanation:
So, to define a function, the syntax is simply:
def functionName(arguments here):
# code
So to define a function called "list_total" which accepts a list of integers, you write:
"
def list_total(numbers):
# code
"
any the "numbers" is a parameter, and it's just like any variable, so you can name it anything besides keywords. I just named it "numbers" since it makes sense in this context, you could also write "integers" instead and it would be just as valid, and may be a bit more specific in this case.
Anyways from here, the initial sum should be equal to 0, and from there we add each number in the list to that initial sum. This can be done by initializing a variable to the value "0" and then traversing the list using a for loop. This can be done as such:
"
def list_total(numbers):
sum_of_numbers = 0
for number in numbers:
# code
"
So for each element or integer in the list "numbers" the for lop will run, and the variable "number" will contain the value of the current element it's on.
So we can add the "number" to the sum_of_numbers as such:
sum_of_numbers = sum_of_numbers + number
but there is a shorter way to do this, and it's represented as:
sum_of_numbers += sum_of_numbers
which will do the same exact thing. In fact this works for any mathematical operation for example:
a *= 3
is the same thing as
a = a * 3
and
a /= 3
is the same thing as
a = a / 3
It's the same thing, but it's a much shorter and more readable notation.
Anyways, this code will go in the for loop to almost finish the code
"
def list_total(numbers):
sum_of_numbers = 0
for number in numbers:
sum_of_numbers += number
"
The last thing is to return this value, and this is simply done by using the syntax:
"return {value here}"
and since the sum_of_numbers has the value, we write
"return sum_of_numbers"
at the end of the function, which is very very important, because when you use the return keyword, you end the function, and return whatever value is next to the return to the function call
So to finish the code we just add this last piece to get:
"
def list_total(numbers):
sum_of_numbers = 0
for number in numbers:
sum_of_numbers += number
return sum_of_numbers
"
Write a program in c# that simulates the roll of two six sided dice.
The program should ask the user to guess the total sum of the dice. The user has to
keep guessing until they get the total correct, and the program should tell them how
many tries it took.
An example of the expected output is shown below.
What do you think the total of two six-sided die will be? 6
The total was 8. Try again!
What do you think the total of two six-sided die will be? 4
The total was 11. Try again!
What do you think the total of two six-sided die will be? 10
The total was 10. Congratulations! It took you 3 tries to guess successfully.
Answer:
using System;
class Program
{
public static void Main(string[] args)
{
Random rnd = new Random();
int tries = 0;
while (true)
{
tries++;
Console.Write("What do you think the total of two six-sided die will be? ");
int guess = int.Parse(Console.ReadLine());
int total = rnd.Next(1, 7) + rnd.Next(1, 7);
Console.Write($"The total was {total}. ");
if (total == guess)
{
Console.WriteLine($"Congratulations! It took you {tries} tries to guess successfully.");
break;
}
else
{
Console.WriteLine("Try again!");
}
}
}
}
Explanation:
Worst case you could be guessing forever...
How can structure of a table change in sql. What general types of changes are possible
One can structure of a table change in sql and the general types of changes that are possible is that:
One can use the MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.How can we modify the structure of a table in SQL?The SQL ALTER TABLE command is known to be the tool that is often used to alter the structure of an existing table.
Note that it is one that can helps to add or delete columns, make or destroy indexes, alter the type of existing columns, and others.
Hence, One can structure of a table change in sql and the general types of changes that are possible is that:
One can use the MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.Learn more about table structure from
https://brainly.com/question/26125587
#SPJ1
Question 1
Write C# code which generates and displays 10 random (integer) numbers between 0 and
50, note that each time this program runs the results are different.
Question 2
Repeat your code from the previous exercise.
In addition to generating the 10 random numbers, display the lowest of the 10 numbers.
Question 3
Repeat your code from the previous exercise.
In addition to the lowest number, display the highest and the average of the 10
numbers.
Using the knowledge in computational language in C++ it is possible to write a code that generates and displays 10 random (integer) numbers between 0 and 50.
Writting the code in C++class SecureRandom : Random
{
public static byte[] GetBytes(ulong length)
{
RNGCryptoServiceProvider RNG = new RNGCryptoServiceProvider();
byte[] bytes = new byte[length];
RNG.GetBytes(bytes);
RNG.Dispose();
return bytes;
}
public SecureRandom() : base(BitConverter.ToInt32(GetBytes(4), 0))
{
}
public int GetRandomInt(int min, int max)
{
int treashold = max - min;
if(treashold != Math.Abs(treashold))
{
throw new ArithmeticException("The minimum value can't exceed the maximum value!");
}
if (treashold == 0)
{
throw new ArithmeticException("The minimum value can't be the same as the maximum value!");
}
return min + (Next() % treashold);
}
public static int GetRandomIntStatic(int min, int max)
{
int treashold = max - min;
if (treashold != Math.Abs(treashold))
{
throw new ArithmeticException("The minimum value can't exceed the maximum value!");
}
if(treashold == 0)
{
throw new ArithmeticException("The minimum value can't be the same as the maximum value!");
}
return min + (BitConverter.ToInt32(GetBytes(4), 0) % treashold);
}
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
For a computer, it is a minimum system requirement that the video card supports directx 9 graphics with ____________________ 1.0 or higher driver.
Answer:
With 0.5,0.7,0.9 drivers
What is the output of the
given program if the user
enters 20?
A. A lot of fun
B. some fun
C. no fun
Consider the following
segment:
Scanner
Scanner(System.in);
input
System.out.print("Please
value");
int value =
fun");
}
else
{
input.nextInt();
if (value >= 30 )
{
program
enter
System.out.println("A
lot
new
a
of
5
if(value_ 30)
Explanation:
es igual 30 espero que te sirva
Explain the unique reasons why assembly language is preferred to high level language
The special reason why assembler language is preferred to high level language is that It is said to be memory efficient and it is one that requires less memory.
Why is assembly language better than other kinds of high level?It implies means that the programs that one uses to write via the use of high-level languages can be run easily on any processor that is known to be independent of its type.
Note that it is one that has a lot of better accuracy and an assembly language is one that carries out a lot of better functions than any high-level language, in all.
Note also that the advantages of assembly language over high-level language is in terms of its Performance and accuracy as it is better than high-level language.
Hence, The special reason why assembler language is preferred to high level language is that It is said to be memory efficient and it is one that requires less memory.
Learn more about assembler language from
brainly.com/question/13171889
#SPJ1
Even if we reached the state where an AI can behave as a human does, how do we measure if Al is acting like a human? and how can we be sure it can continue to behave that way? We can base the human-likeness of an AI entity with the: Turing Test, the Cognitive Modelling Approach, The Law of Thought Approach, and the Rational Agent Approach. Explain in detail these terms with suitable examples.
We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.
What test tells you if an AI can think like a human?The Turing Test is known to be the tool or the method that is unused in regards to the inquiry in artificial intelligence (AI) for a person to be able to known if or not a computer have the ability of thinking like a human being.
Note that the test is said to be named after Alan Turing, who was known to be the founder of the Turing Test and he was also known to be an English computer scientist, a cryptanalyst, a mathematician and also a theoretical biologist.
Therefore, in regards to the issues with AI, a person or We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.
Learn more about Al from
https://brainly.com/question/20463001
#SPJ1
what are web site and web page?
Answer:
Website: a set of related web pages located under a single domain name, typically produced by a single person or organization
Webpage: a hypertext document on the World Wide Web
The term “web site” is commonly used to describe a collection of web pages and related content published simultaneously on at least one server and identified by a common domain name. A web site is a collection of many web pages that are linked together under the domain name of the same company.
Web pageWeb pages are a type of hypertext document which can be found on the World Wide Web. In a web browser, a user can view a web page that has been delivered by a web server to their computer. It is the name “web page” itself that is a metaphor for the binding of paper pages together to make a book.
Hope this helps :)
TensorFlow and Pytorch are examples of which type of machine learning platform?