Answer:
bill = 47.28
tip = bill * 0.15
total_pay = bill + tip
each_share = total_pay / 2
print("Each person needs to pay: " + str(each_share))
Explanation:
*The code is in Python.
Set the bill
Calculate the tip, multiply the bill by 0.15
Calculate the total_pay, add bill and tip
Calculate each friend's share, divide the total_pay by 2. Then, print it in required format.
Answer: Storage
Explanation:
Storage means means saving data in computer memory. Memory refers to the location which is meant for short-term data, while storage is the part of the computer system that allows an individual to store and also access data on long-term basis.
It should be noted that typically, storage usually comes in form of a hard drive or a solid-state drive.
Answer:
a. social engineering attack
Explanation:
Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.
Answer:
39
Explanation:
Since each of the address occupies only 1 memory cell and the 2-D array is row-major 2-D array.So the elements will be filled row wise.First the first row will be fully filled after that second row and so on.Since we want the address of the element at third row and fourth column.
we can generalize this :
address of the element at ith row and jth column=s + ( c * ( i - 1 ) + ( j - 1 ) ).
s=Starting address.
c=Number of columns in the 2-D array.
address=20+(8*(3-1)+(4-1))
=20+(8*2+3)
=20+16+3
=39
Or you can make a matrix of six rows and eight columns and put first cell with 20.Start filling the elements row wise one by one and look what is the count of 3rd row and 4th column.
Using First fit algorithm:
Using Best-fit algorithm:
Using Worst-fit algorithm:
Properly labeling the six different processes would be:
Best fit algorithm is the best as the name suggests, while the worst fit algorithm is the worst as not all memory is allocated
Read more about memory partitions here:
brainly.com/question/12726841
Answer:
We have six memory partitions, let label them:
100MB (F1), 170MB (F2), 40MB (F3), 205MB (F4), 300MB (F5) and 185MB (F6).
We also have six processes, let label them:
200MB (P1), 15MB (P2), 185MB (P3), 75MB (P4), 175MB (P5) and 80MB (P6).
Using First-fit
The remaining free space while using First-fit include: F1 having 10MB, F2 having 90MB, F3 having 40MB as it was not use at all, F4 having 5MB, F5 having 115MB and F6 having 10MB.
Using Best-fit
The remaining free space while using Best-fit include: F1 having 25MB, F2 having 170MB as it was not use at all, F3 having 25MB, F4 having 5MB, F5 having 45MB and F6 having no space remaining.
Using Worst-fit
The remaining free space while using Worst-fit include: F1 having 100MB, F2 having 90MB, F3 having 40MB, F4 having 5MB, F5 having 100MB and F6 having 110MB.
Explanation:
First-fit allocate process to the very first available memory that can contain the process.
Best-fit allocate process to the memory that exactly contain the process while trying to minimize creation of smaller partition that might lead to wastage.
Worst-fit allocate process to the largest available memory.
From the answer given; best-fit perform well as all process are allocated to memory and it reduces wastage in the form of smaller partition. Worst-fit is indeed the worst as some process could not be assigned to any memory partition.
Answer:
Internal sound card
Explanation:
In this case, George has used an Internal sound card, this is enough to record a podcast, make and receive video conferences or play video games.
If we're going to use an instrument, an external sound card, it's necessary, but in this case, George can make the record with high quality audio.
If George wants to add an adapter to connect 6'35mm but is not the same quality that an external sound card.
Answer:
An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as
TCP Session Hijacking.
Explanation:
TCP Session Hijacking is a cyber-attack in which illegitimate access is acquired to a client's server in the network. The attacker then hijacks the TCP/IP session by reading and modifying transmitted data packets and also sending requests to the addressee's server. To achieve this attack effectively, the hacker generates a large number of session IDs, thereby confusing the client's server to process them as a part of the users' sessions. Sessions (a series of interactions between two communication end points) are used by applications to store user parameters and, they remain alive until the user logs off.