Answer:
Since Python is a scripting language, here is code in python.
#prompt user to give check
amount=float(input("Please Enter the check:"))
#prompt user to give service
service=input("Please Enter the service (good, fair or poor):")
# calculate tip on the basis of service
if service =="good":
tip=amount*0.2
elif service=="fair":
tip=amount*0.15
elif service=="poor":
tip=amount*0.05
#calculate total
total=amount+tip
#print tip
print("tip is equal to : {} ".format(tip))
#print total
print("total of the check is : {} ".format(total))
Explanation:
Prompt user to give check and service input.After taking the input from user, based on the service tip will be calculated. if service is "good" then tip will be 20% of the check, tip will be 15% if service is "fair" and tip will be 5% if service is "poor".
Output:
Please Enter the check:125
Please Enter the service (good, fair or poor):good
tip is equal to : 25.0
total of the check is : 150.0
Answer:
CER
Explanation:
The CER refers to equanimity between an identification technology's False Acceptance Rate and its False Rejection Rate, which is “the best summary measure of face recognition technologies' efficacy,” according to a statement from Applied Recognition.
Simplex
Partial
Full Duplex
Answer:
partial
Explanation:
Answer:
import java.util.Scanner;
public class num9 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter year");
int givenYear =in.nextInt();
if(givenYear>=2101){
System.out.println("Distant Future");
}
else if(givenYear>=2001){
System.out.println("21st Century");
}
}
}
Explanation:
Answer:
Editor. An editor is the individual in charge of a single publication. It is their responsibility to make sure that the publication performs to the best of its ability and in the context of competition. A managing editor performs a similar role, but with greater responsibility for the business of the publication.
Explanation:
Answer:
A secure password has the following characteristics:
Phishing is a kind of social engineering where a cyber criminals trying to trick the victims to get benefit from them. For example, a cyber criminal can send a phishing email to tell the victims about something wrong with their credit card or bank account and provide a malicious link and persuade the victim to access their fake website that resembles an official bank website. From there, the victims can send credential info to the cyber criminals without their awareness. Phishing can also be done through phone call. Phishing is harmful as a victim can fall into the trap of disclosing highly critical credential info that incur a huge loss of money.
DMZ
internal network
external network
Answer: DMZ
Explanation:
DMZ is the demilitarized zone network and it is use in providing he various services to the users or customers by using the public internet. It basically contain organizational services in the logical and physical sub-network and usually works in large network.
The main purpose of DMZ that it is use as web server over the internet for reaching to the users and customers. It also add one additional layer in the organization for security purpose.
Some of the services that DMZ provides as web server, DNS and proxy server.