Your answer is A. Because a query is a question about a an organization to check how it's going
Answer:
The program to the given question as follows:
Program:
import java.util.*; //import package for user input.
public class Main //defining class Main
{
public static void main(String[] as) //defining main method
{
final double over_time_factor = 1.5; //define final variable
double number_Of_hours,wages,total_Wages=0; //defining variables
System.out.println("Enter hours and wages rate:"); //print message
Scanner obc = new Scanner(System.in); //creating Scanner class object for user input
number_Of_hours = obc.nextDouble(); //taking input
wages = obc.nextDouble(); //taking input
if(number_Of_hours>40) //check condition if number_Of_hours greter then 40
{
total_Wages=40*wages+(number_Of_hours-40)*wages*over_time_factor; //calculate value
}
else //else part
{
total_Wages = number_Of_hours*wages; //calculate total_Wages
}
System.out.println("Total Wages: $"+total_Wages); //print value
}
}
Output:
Enter hours and wages rate:
12
3
Total Wages: $36.0
Explanation:
In the above java program, the package is first imported into the user input and then the class is defined and inside this, the main method is defined, that defines a double type final variable "over_time_factor" is defined that holds a value "1.5", Then double type variable is defined that are " number_Of_hours, wages, and total_Wages", in which first two variables are used for taking input from the user and the third variable is used to calculate their values. After taken input from the user, the conditional statement is used that can be defined as follows:
Answer:Encryption is the process
of translating plain text data into something that appears to be random and meaningless. A symmetric key is used during both the encryption and decryption process. To decrypt a particular piece of ciphertex, the key that was used to encrypt the data must be used.
Types of encryption
1.Symmetric encryption :This is also known as public key encryption. In symmetric encryption, there is only one key, and all communication patties use the same key for encryption and decryption.
2.Asymmetric encryption :This is foundational technology for SSL(TLS)
How encryption is being configured
Encryption uses algorithms to scramble your information. It is then transmitted to the receiving party, who is able to decode the message with a key.
Explanation:
B. Discuss whether such an attack would succeed in systems protected by SSL.
Answer:
A. No, it would not succeed.
B. Yes, the attack will succeed.
Explanation:
In the seven-layer OSI model of computer networking, packet strictly refers to a protocol data unit at layer 3, the network layer. So if an attacker wants to insert bogus/ fake packets this will happen at the network layer.
A. IPSec works on network layer (the IP layer) of the OSI model protecting and authenticating IP packets. It provides data integrity, authentication and confidentiality between participating peers at the IP layer.
Thus, inserting bogus packets into the communications by an attacker will not have any affect on security of a system which has IPSec security and therefore it will not succeed.
B. SSL/TLS is an application layer protocol that fits into layer 5 to 7 of the OSI model. However, an attack by inserting bogus packets into the communications will succeed as SSL only provides protection for layer 5 to 7 and not the network layer.
B. Start menu
C. System tray
D. Desktop Arie is moving icons around and deleting shortcuts. He is working on the _____.
A. All programs submenu
B. Start menu
C. System tray
D. Desktop
Answer:
D. Desktop
Explanation:
If he's moving icons around and deleting shortcuts, he has to do that at the desktop.
The advantages and the disadvantages of the communication with the used of the technology are: Quickly communicate and the lack of privacy.
The term communication refers to the exchange of thoughts, ideas, and messages that are shared between two or more people. Without language, a person can survive, but without communication, no one can survive. Communication is divided into two categories, such as interpersonal and intrapersonal.
Advantages of the communication with the used of the technology are:
Disadvantages of the communication with the used of the technology are:
Hence, the significance of the communication are the aforementioned.
Learn more about on communication, here:
#SPJ2
Answer:
ADVANTAGES:
First, the evolution of technology is beneficial to humans for several reasons. At the medical level, technology can help treat more sick people and consequently save many lives and combat very harmful viruses and bacteria.
2-Technology has also increased the productivity of almost every industry in the world. Thanks to technology, we can even pay with bitcoins instead of using banks
DISADVANTAGES:
1-Lack of Privacy. You might think that a quick text or IM offers more privacy than a telephone call in a crowded room. ...
2-Distraction from Real Life. ...
3-Potential for Misunderstanding. ...
4-Decline of Grammar and Spelling...
5- Near people are far and far people are near through communication technology. we have no time to sit with our relatives but constantly communicate far away people . I think this is biggest disadvantage
Explanation: