Answer:
the space bar
Explanation:
FAT
GUI
RAM
hey bud it's your ole pal paps
sans and i came to help by giving some tips this will surely help and jolt the memory.
Keeping track of these files is a big job. To perform this task, the OS makes an index of all the files stored on the computer. This index is called a File Allocation Table (FAT). The OS updates the FAT every time a file is created, renamed, moved, or deleted.
-paps & sans
B) tactical management.
C) strategic management.
D) contingency management.
Answer: C) Strategic management
Explanation:
The strategic management is the process of determining the long term organization objective and mission. It basically include the analyzes, management and the planning for organization so that they can meet its main objective.
The strategic management is the basically involve with the strategies so that it can be use by the manager in an organization to achieve the goals with good performance.
Therefore, the implementation of the plan for attain these types of objective is known as the strategic management.
The answer is Query Design.
Algorithm 1
This algorithm creates a string from the message in which every vowel (a, e, i, o, and u) is removed unless the vowel is at the very start of a word (i.e., it is preceded by a space or is the first letter of the message). Every repeated non-vowel character is also removed from the new string (i.e., if a character appears several times in a row it should only appear once at that location). So for example the string "I will arrive in Mississippi really soon" becomes "i wl arv in mssp rly sn".
After applying this algorithm, your program should output the shortened message, the number of vowels removed, the number of repeated non-vowel characters removed, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.
Algorithm 2
This algorithm creates a string by taking each unique character in the message in the order they first appear and putting that letter and the number of times it appears in the original message into the shortened string. Your algorithm should ignore any spaces in the message, and any characters which it has already put into the shortened string. For example, the string "I will arrive in Mississippi really soon" becomes "8i1w4l2a3r1v2e2n1m5s2p1y2o".
After applying this algorithm, your program should output the shortened message, the number of different characters appearing, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.
Sample Run 1
Type the message to be shortened
This message could be a little shorter
Algorithm 1
Vowels removed: 11
Repeats removed: 2
Algorithm 1 message: ths msg cld b a ltl shrtr
Algorithm 1 characters saved: 13
Algorithm 2
Unique characters found: 15
Algorithm 2 message: 4t2h2i4s1m5e2a1g1c2o1u3l1d1b2r
Algorithm 2 characters saved: 8
Sample Run 2
Type the message to be shortened
I will arrive in Mississippi really soon
Algorithm 1
Vowels removed: 11
Repeats removed: 6
Algorithm 1 message: i wl arv in mssp rly sn
Algorithm 1 characters saved: 17
Algorithm 2
Unique characters found: 13
Algorithm 2 message: 8i1w4l2a3r1v2e2n1m5s2p1y2o
Algorithm 2 characters saved: 14
import java.util.Scanner;
public class JavaApplication54 {
public static int appearance(String word, char letter){
int count = 0;
for (int i = 0; i < word.length(); i++){
if (word.charAt(i) == letter){
count++;
}
}
return count;
}
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.println("Type the message to be shortened");
String message = scan.nextLine();
message = message.toLowerCase();
int volCount = 0, repCount = 0, num = 0;
char prevC = ' ';
String vowels = "aeiou";
String newMessage = "";
for (int i = 0; i < message.length(); i++){
char c = message.charAt(i);
if (vowels.indexOf(c) != -1 && prevC == ' '){
newMessage += c;
}
else if (vowels.indexOf(c) == -1 && prevC != c){
newMessage += c;
}
else if (vowels.indexOf(c) != -1){
volCount ++;
}
else{
repCount++;
}
prevC = c;
}
System.out.println("Algorithm 1");
System.out.println("Vowels removed: "+volCount);
System.out.println("Repeats removed: "+repCount);
System.out.println("Algorithm 1 message: "+newMessage);
System.out.println("Algorithm 1 characters saved: "+(message.length() - newMessage.length()));
String uniqueMessage = "";
for (int i = 0; i<message.length(); i++){
char w = message.charAt(i);
if (uniqueMessage.indexOf(w)== -1 && w!=' '){
uniqueMessage += appearance(message,w)+""+w;
num++;
}
}
System.out.println("Algorithm 2");
System.out.println("Unique characters found: "+num);
System.out.println("Algorithm 2 message: "+uniqueMessage);
System.out.println("Algorithm 2 characters saved: "+(message.length() - uniqueMessage.length()));
}
}
I hope this helps!
B. DAC
C. MAC
D. RBAC
Q2. Which physical access control uses a portable device that authenticates a person's identity electronically by storing some sort of personal information?
A. Infrared scanners
B. Hardware security tokens
C. Biometric devices
D. Keypads
Q3. Which implementation of Network Access Control grants access depending on a specific job role?
A. DAC
B. RBAC
C. MAC
D. PAC
Q4. Which implementation of Network Access Control is more relaxed, allowing users to determine file access privileges?
A. AAC
B. MAC
C. DAC
D. RBAC
Q5. Which type of access control sets the standard for the way security actions unfold?
A. Identity
B. Management
C. Physical
D. Technical
Q.1) Option c) MAC
Q.2) Option c) Biometric devices
Q.3) Option b) RBAC
Q.4) Option c) DAC
Q.5) Option b) Management
What is MAC ?
The ability of individual resource owners to allow or refuse access to resource objects in a file system is constrained by the security measure known as mandatory access control (MAC).
What is a biometric device ?
An authentication and security identification tool is a biometric gadget.
What is RBAC ?
Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system.
What is DAC ?
The idea behind discretionary access control is to limit access to things based on who the subject is.
Therefore, MAC, biometric device, RBAC, DAC and Management access control sets are some of the measures for network security and access control.
You can learn more about network security from the given link
https://brainly.in/question/33317398
#SPJ2
Answer:
1. MAC
2. Biometric Devices
3. RBAC
4. DAC
5. Management
Explanation: