3. List and discuss five areas where threat to data security might occur? 4. Briefly describe the major components of a datawarehouse architecture. Explain how the volatility of a datawarehouse is different from the volatility of a database for an operational information system. 5. List six typical characteristics of reconciled data.

Answers

Answer 1

3. List and discuss five areas where threat to data security might occur?

The five areas where threat to data security might occur are:

Network security: Data can be intercepted or manipulated during transmission over a network.Access control: Unauthorized access to data can occur if access control mechanisms are not properly implemented or enforced.Malware: Malicious software can infect systems and compromise data security.Physical security: Data can be compromised if physical security measures are not in place to protect against unauthorized access to systems and storage devices.Human error: Data can be compromised due to mistakes made by employees or other authorized users.


4. Briefly describe the major components of a datawarehouse architecture. Explain how the volatility of a datawarehouse is different from the volatility of a database for an operational information system.

The major components of a datawarehouse architecture are:

Data sources: These are the systems and applications that provide data to the datawarehouse.Data staging area: This is where data is extracted, transformed, and loaded (ETL) before being stored in the datawarehouse.Data storage: This is where the data is stored in the datawarehouse.Data access: This includes the tools and applications that are used to access and analyze the data in the datawarehouse.

The volatility of a datawarehouse is different from the volatility of a database for an operational information system because a datawarehouse is designed to store historical data that is not frequently updated, while a database for an operational information system is designed to store current data that is frequently updated.


5. List six typical characteristics of reconciled data.

The six typical characteristics of reconciled data are:

Consistent: Reconciled data is consistent across all sources.Accurate: Reconciled data accurately reflects the original data sources.Complete: Reconciled data includes all relevant data from all sources.Timely: Reconciled data is updated in a timely manner to reflect changes in the original data sources.Secure: Reconciled data is protected against unauthorized access and manipulation.Auditable: Reconciled data can be traced back to the original data sources for auditing purposes.

Learn more about network

brainly.com/question/15002514


Related Questions

The File Explorer button on the taskbar is a convenient way to switch among open windows. _________________________

Answers

A taskbar is an element of a graphical user interface which has various purposes.

The primary purpose of the taskbar is to allow users to switch among different windows. The taskbar often contains icons representing a variety of applications, files, and programs that the user may access. File Explorer is a convenient way to navigate and manage files and folders on your Windows computer.

It provides a graphical user interface that allows you to view and manipulate files, as well as perform various operations such as copying, moving, and deleting files. The File Explorer button on the taskbar is a convenient way to switch among open windows. It allows you to quickly access and manage files and folders without having to navigate to the desktop or start menu.

To know more about taskbar visit:-

https://brainly.com/question/32543231

#SPJ11

Which sentence describes a biotechnology method of treating sulfur liquor in the paper industry?
Fungi produce a chemical substance that reacts with the sulfur liquor, turning it into soluble salts.
Bacteria feed on the sulfur liquor and produce methane.
A spongy substance absorbs the sulfur liquor.
A chemical reacts with the sulfur liquor to produce a salt.

Answers

Answer:

B. Bacteria feed in the liquor and produce methane.

Explanation:

The methane is then burned as a fuel, which is necessary for production.

C) The Cloud makes use of the client-server model.
(i) Explain the roles of the client and server in this relationship.

Answers

Please answer answer question answer

Answer:

But generally the shurikens are considered the best bang for you buck. Followed by the flame vent (if you want to hit apparitions with living weapon) or the Axe for general purpose. The dagger is considered the worst and in many cases actually manages to be WORSE than the piercing variant.

Explanation:

For the network shown below, use two-pass method to determine the critical path, the project duration and each activity's slack time. (All durations shown are in weeks). (1 point)

Answers

The critical path for the network is A-C-E-G-I-K, with a project duration of 18 weeks. The slack time for each activity is as follows: Activity B has a slack time of 0 weeks, Activity D has a slack time of 1 week, Activity F has a slack time of 2 weeks, Activity H has a slack time of 0 weeks, and Activity J has a slack time of 3 weeks.

To determine the critical path, project duration, and slack time for each activity, we use the two-pass method.

First, we calculate the earliest start (ES) and earliest finish (EF) times for each activity. The ES for the first activity is 0, and the EF is the duration of that activity. For subsequent activities, the ES is the maximum EF of all preceding activities, and the EF is ES + duration.

Using this method, we find the following values:

Activity A: ES = 0, EF = 4

Activity B: ES = 4, EF = 4

Activity C: ES = 4, EF = 9

Activity D: ES = 9, EF = 10

Activity E: ES = 10, EF = 15

Activity F: ES = 15, EF = 17

Activity G: ES = 17, EF = 21

Activity H: ES = 4, EF = 4

Activity I: ES = 21, EF = 23

Activity J: ES = 23, EF = 26

Activity K: ES = 26, EF = 30

Next, we calculate the latest start (LS) and latest finish (LF) times for each activity. The LF for the last activity is the project duration, and the LS is LF - duration. For preceding activities, the LF is the minimum LS of all succeeding activities, and the LS is LF - duration.

Using this method, we find the following values:

Activity K: LS = 30, LF = 30

Activity J: LS = 26, LF = 30

Activity I: LS = 21, LF = 26

Activity H: LS = 4, LF = 4

Activity G: LS = 17, LF = 21

Activity F: LS = 15, LF = 17

Activity E: LS = 10, LF = 15

Activity D: LS = 9, LF = 10

Activity C: LS = 4, LF = 9

Activity B: LS = 4, LF = 4

Activity A: LS = 0, LF = 4

Finally, we calculate the slack time (ST) for each activity by subtracting EF from LS. The critical path consists of activities with zero slack time.

Using this calculation, we find the following slack times:

Activity A: ST = 0

Activity B: ST = 0

Activity C: ST = 0

Activity D: ST = 1

Activity E: ST = 0

Activity F: ST = 2

Activity G: ST = 0

Activity H: ST = 0

Activity I: ST = 0

Activity J: ST = 3

Activity K: ST = 0

The critical path for the network is A-C-E-G-I-K, with a project duration of 18 weeks. Activities B, H, and K have zero slack time, meaning any delay in these activities will cause a delay in the overall project. Activities D, F, and J have some slack time available, indicating that they can be delayed without impacting the project's duration.

To know more about network follow the link:

https://brainly.com/question/1326000

#SPJ11

The Klez virus was a worm created to "spoof others. What is "spoofing"?
1.Hoax, trick, or deceive
2. Receive a prize

Answers

Answer:

1

Explanation:

Hoax, trick, or deceive

one important result of using an abc system is more accurate product costing. what is another important result of using an abc system?

Answers

ABC System stands for Activity-Based Costing System. It is used to allocate costs to products and services based on their usage. Apart from accurate product costing, another important result of using an ABC system is improved cost control.

What is an Activity-Based Costing System?

Activity-Based Costing System (ABC System) is a costing system that assigns overheads to products and services based on their usage.

The activity-based costing system is used in contrast to the traditional costing system. It recognizes that the production of some products requires more activities than others, hence, it will assign more overheads to that product. This method is also called the 'cost driver.'

What is Cost Control?

Cost control is the method that is used to manage the expenses that are incurred during a business operation. The primary aim of cost control is to minimize the expenses that are incurred by a business to increase profitability.

By using an ABC system, a business can easily identify the areas of the company that have excessive costs and may cut back on them.

In conclusion, an important result of using an ABC system is more accurate product costing and improved cost control.

Read more about the ABC system at https://brainly.com/question/31064932

#SPJ11

a company wants to implement threat detection on its aws infrastructure. however, the company does not want to deploy additional software. which aws service should the company use to meet these requirements? a. amazon vpc b. amazon ec2 c. amazon guardduty d. aws direct connect

Answers

To fulfill these needs, the business should use the Amazon GuardDuty AWS service.

Which AWS service is appropriate for threat detection?

Amazon GuardDuty is a threat detection service that constantly scans for harmful activity and unlawful conduct to safeguard your AWS accounts and workloads. With GuardDuty, you now have a wise and affordable choice for ongoing threat detection in the AWS Cloud.

By monitoring for suspicious activity, this AWS service detects threats?

Amazon GuardDuty is a threat detection service that constantly scans your AWS accounts and workloads for harmful behavior and provides in-depth security findings for visibility and mitigation.

To know more about AWS service visit :-

https://brainly.com/question/28786304

#SPJ4

Which type of influencer often has the smallest following, but the highest engagement rate?

Answers

The type of influencer that often has the smallest following, but the highest engagement rate is known as the micro-influencer.

Micro-influencers are individuals who have a small, niche following ranging from 1,000 to 100,000 followers. However, despite their smaller reach, they are able to generate high engagement rates because their followers are highly engaged with their content, and they are considered experts in their respective fields. Micro-influencers are seen as more authentic and relatable because they often have a closer relationship with their followers. They are able to engage in genuine conversations with their followers and are more likely to respond to comments and direct messages, which in turn increases their engagement rate. Micro-influencers also tend to have a more niche audience, which means they are able to target a specific group of people who are more likely to engage with their content.Brands are recognizing the value of micro-influencers and are partnering with them to promote their products or services. Because micro-influencers have a smaller following, they are also more affordable for brands to work with, making it a win-win situation for both parties.

For such more questions on Micro-influencers

https://brainly.com/question/31356472

#SPJ11

Which three individuals were involved in creating programming languages?
A. Kathleen Booth
B. Charles Babbage
C. John G. Kemeny
D. Grace Hopper

Answers

The three individuals that were involved in creating programming languages are:

A. Kathleen Booth

C. John G. Kemeny

D. Grace Hopper

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task and proffer solutions to a particular problem.

What is programming?

Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.

Based on historical information and records, we can infer and logically deduce that the three individuals that were involved in creating programming languages are:

Kathleen Booth John G. KemenyGrace Hopper

Read more on programming languages here: brainly.com/question/26497128

#SPJ1

What cannot be collected by the default analytics tracking code?.

Answers

Personally identifiable information (PII) cannot be collected by the default analytics tracking code.

The default analytics tracking code used in most analytics platforms is designed to collect and analyze various types of data related to website or application usage. However, it is important to note that the default tracking code is typically configured to exclude the collection of personally identifiable information (PII). PII includes sensitive information such as names, email addresses, phone numbers, social security numbers, or any data that can be used to identify an individual.

This exclusion is in place to prioritize user privacy and data protection. By default, the tracking code focuses on collecting and analyzing aggregated and anonymized data to provide insights into user behavior, website performance, and other metrics.

You can learn more about Personally identifiable information (PII) at

https://brainly.com/question/28165974

#SPJ11

Which of the following statements are true regarding Steve Jobs and Steve Wozniak? Select 3 options.

1. Both Steve Jobs and Steve Wozniak raised $1000 by selling personal items, so that they could start Apple.

2. Steve Wozniak worked for Hewlett Packard designing calculators before starting Apple.

3. Steve Job founded Apple and managed the company from its inception until his death.

4. Steve Jobs never learned to code and primarily focused on design.

5. The two met in college at Princeton.

Answers

The statements below are true of Steve Jobs and Steve Wozniak.

Both Steve Jobs and Steve Wozniak raised $1000 by selling personal items, so that they could start Apple.

Steve Wozniak worked for Hewlett Packard designing calculators before starting Apple

Steve Jobs never learned to code and primarily focused on design.

Who is Steve Jobs and Steve Wozniak?

Steve Jobs and Steve Wozniak met in 1971 and became friends when they both worked for the Summer at HP. Steve Wozniak worked in a mainframe computer.

Jobs decided to start a company of his own in order to build computers for people , then he talked to Wozniak and convinced him to start it up together.

They sold their personal belongings in order to raise $1300 to launch the company.

The created the Apple computer in 1976 and they builded the company together

Therefore, The statements below are true of Steve Jobs and Steve Wozniak.

Both Steve Jobs and Steve Wozniak raised $1000 by selling personal items, so that they could start Apple.

Steve Wozniak worked for Hewlett Packard designing calculators before starting Apple

Steve Jobs never learned to code and primarily focused on design.

Learn more on Steve Jobs and Steve Wozniak from the link below.

https://brainly.com/question/11282999

Answer:

Steve Job founded Apple and managed the company from its inception until his death.

Steve Wozniak worked for Hewlett Packard designing calculators before starting Apple.

Steve Jobs never learned to code and primarily focused on design.

Explanation:

right on edge

Instant Feedback Tool: 2-3 Assignment: Write a Class Listen Get instant feedback on your assignment prior to submitting it to your instructor for grading. Write a Dog java Class Feedback: Tell me how well my program meets the assignment requirements. Write a Cat java Class Feedback Tell me how well my program meets the assignment requirements, Submit your assignment to all the options as many times as you need for feedback. You will still need to submit your assignment in the numbered item below. Reflect in ePortfolio Download Print Open with docReader Activity Details < • Task: View this topic Get instant feedback on your assignment prior to submitting it to your instructor for grading. Write a Dog java Class Feedback: Tell me how well my program meets the assignment requirements.

Answers

Override the to String method to return a string representation of the object that is, the name and age.

//class Dog

class Dog {

 //attributes

 private String name;

 private int age;

 //constructor

 public Dog(String name_, int age_) {

   name = name_;

   age = age_;

 }

 //setter for name

 public void setName(String name_) {

   name = name_;

 }

 //setter for age

 public void setAge(int age_) {

   age = age_;

 }

 //getter for name

 public String getName() {

   return name;

 }

 //getter for age

 public int getAge() {

   return age;

 }

 //overriding tostring method

 //returns string representation of object

 public String toString() {

   return "Dog named " + name + " is aged " + age;

 }

}

Output:

For the below test file, the class yielded the following output.

class Main {

 public static void main(String[] args) {

   Dog d = new Dog("Jaime", 3);

   System.out.println(d.toString());

   d.setAge(7);

   d.setName("Roxy");

   System.out.println(d.toString());

 }

}

Explanation:

Declare a dog class. Declare two attributes, name and age. Set up the usual getter and setter methods for both attributes. Then, override the toString method to return a string representation of the object that is, the name and age.

Cat class:

Code:

//class Cat

class Cat {

 //attributes

 private String name;

 private int age;

 //constructor

 public Cat(String name_, int age_) {

   name = name_;

   age = age_;

 }

 //setter for name

 public void setName(String name_) {

   name = name_;

 }

 //setter for age

 public void setAge(int age_) {

   age = age_;

 }

 //getter for name

 public String getName() {

   return name;

 }

 //getter for age

 public int getAge() {

   return age;

 }

 //overriding tostring method

 //returns string representation of object

 public String toString() {

   return "Cat named " + name + " is aged " + age;

 }

}

Output:

The class returns the following output for the below test program.

class Main {

 public static void main(String[] args) {

   Cat d = new Cat("Jaime", 3);

   System.out.println(d.toString());

   d.setAge(7);

   d.setName("Roxy");

   System.out.println(d.toString());

 }

}

To learn more about instant feedback

https://brainly.com/question/29750640

#SPJ4

Instant Feedback Tool: 2-3 Assignment: Write a Class Listen Get instant feedback on your assignment prior
Instant Feedback Tool: 2-3 Assignment: Write a Class Listen Get instant feedback on your assignment prior
Instant Feedback Tool: 2-3 Assignment: Write a Class Listen Get instant feedback on your assignment prior
Instant Feedback Tool: 2-3 Assignment: Write a Class Listen Get instant feedback on your assignment prior

Why might a company choose Linux for its operating system instead of Microsoft Windows or Mac OS? The company's employees can sync their mobile devices to their computers. The company will not have to send its computers back to the manufacturer for repairs. The company does not have to worry about all the possible hardware configurations. The company can create an operating system to fit its specific needs.

Answers

Answer:

D.

The company can create an operating system to fit its specific needs.

Explanation:

Linux is an open source operating system format, which can be modified to fit specific needs of it's users.

I've been stuck on these two basic javascript assignments for an embarrassingly long time. The teacher refuses to help me and the material I've been provided doesn't help me. I just need these two assignments done so I don't fail the class (like I currently am). I appreciate any help you can give

I've been stuck on these two basic javascript assignments for an embarrassingly long time. The teacher
I've been stuck on these two basic javascript assignments for an embarrassingly long time. The teacher

Answers

Answer:

it is 29 0ver 30

Explanation:

i took the quiz

100 POINTS!!!!!!!!
To safeguard against losses of computer equipment and important information, businesses should train their employees about _____. Select 3 options.

A. not using unknown devices

B. securing unattended equipment

C. avoiding natural disasters

D. monitoring colleagues

E. not using free WiFi

Answers

Answer:

A, B and E

Explanation:

Option A is a correct choice, this is because using an unknown device and connecting it to a network may cause malware to spread on the network or allow a third party unauthorised access to the network.

Option B is also very important because it means that no equipment will be tampered with, keeping it secure is essential.

Option C is not correct as it is simply not possible.

Options D and E are, in my opinion, both correct but I would see how option E is more viable than option D.

Option E is a method hackers use to gain access or data from devices, they do this by making a network that is free and open to everyone and when a device connects, all the data is routed through that network and the person who created it (this is called a man in the middle attack).

Hope this helps!

Instructions
Click the links to open the resources below. These resources will help you complete the assignment. Once you have created your
file(s) and are ready to upload your assignment, click the Add Files button below and select each file from your desktop or network
folder. Upload each file separately.
Your work will not be submitted to your teacher until you click Submit.
Documents
Ways to Organize Text - Student Guide
Creation and Management of Lists - Student Guide
Insertion of Symbols Special Characters, and Images - Student Guide
File Upload
Accepted file types: .ppt, .pptx, xls, xlsx, doc, .docx, zip, pdf, .accdb, msg
Add Files
*
Delete All

Answers

answer:


explanation:
whats the question?

What are some innovative research ideas for Onshore/Offshore hybrid wind turbines?
I was thinking whether it could be integrated with AI technologies, Pv Cells, thermoelectric plates, piezoelectric etc etc
please give me some inspirations

Answers

Some innovative research ideas for onshore/offshore hybrid wind turbines include integrating AI technologies for advanced control and optimization, incorporating PV cells for hybrid energy generation, utilizing thermoelectric plates for waste heat recovery, and exploring the potential of piezoelectric materials for vibration energy harvesting.

One innovative research idea is to integrate AI technologies into onshore/offshore hybrid wind turbines. AI algorithms can be used to optimize turbine performance by analyzing real-time data and making adjustments to maximize energy production and efficiency. AI can also enable predictive maintenance, allowing for proactive identification of potential issues and minimizing downtime.

Another idea is to incorporate photovoltaic (PV) cells into the hybrid wind turbines. By combining wind and solar energy generation, these turbines can generate power from both sources, maximizing energy output and improving the overall reliability and stability of the system.

Additionally, exploring the use of thermoelectric plates in hybrid wind turbines can enable the recovery of waste heat generated by the turbine. This waste heat can be converted into electricity, enhancing the overall energy efficiency of the system.

Furthermore, researchers can investigate the application of piezoelectric materials in hybrid wind turbines for vibration energy harvesting. These materials can convert mechanical vibrations caused by wind turbulence into electrical energy, supplementing the power output of the turbine.

These innovative research ideas highlight the potential for integrating AI technologies, PV cells, thermoelectric plates, and piezoelectric materials into onshore/offshore hybrid wind turbines to enhance their performance, energy generation capabilities, and efficiency.

Learn more about AI technologies here:

https://brainly.com/question/30089143

#SPJ11

what is the full form of GUI​

Answers

Graphical User Interface

what is the largest possible number of internal nodes in a red-black tree with black-height kk? what is the smallest possible number?

Answers

The number of red nodes and black nodes on the path can only be equal because the leaf must be black. 2k − 1. The least amount that is conceivable is 2k − 1.

What is meant by internal nodes?A node that is not a leaf or, in the case of a tree, one or more offspring nodes. also referred to as a nonterminal component. also, see progenitor and root. Leaves or external nodes are nodes that don't have any offspring. Internal nodes are referred to as nodes that are not branches. Nodes that share a progenitor are referred to as siblings.Internal nodes are nodes that have offspring. External nodes, also known as branches, are nodes without descendants. The binary tree is a type of tree where a node can have up to two descendant nodes. A node or apex may have zero, one, or two children. An internal node is a node that can have at least one offspring or a non-leaf node.

To learn more about internal nodes, refer to:

https://brainly.com/question/29608280

The largest possible number of internal nodes in a red-black tree with black-height k is (2k - 1). The smallest possible number of internal nodes in a red-black tree with black-height k is k-1.

1. In a red-black tree, the largest number of nodes occurs when every level is completely filled, meaning each node has two children. The maximum number of nodes can be calculated using the formula for the sum of a geometric series: (2k - 1).

2. The smallest possible number of internal nodes occurs when the red-black tree is a "straight line" with only one node at each level of black-height, except the root which has two children (one black and one red). So, the smallest possible number of internal nodes is (k - 1) since the red nodes are not counted in the black-height.

Learn more about red-black tree here:

https://brainly.com/question/29886831

#SPJ11

Many ____ classes for certification are available on the Internet and by many companies that have set up intranets within their organizations.

Answers

Many online training classes for certification are made available for students on the Internet and by many companies that have set up intranets within their organizations.

Certification can be defined as a recognition that is given to an individual (student) for the completion of a specific course of study and passing an examination. Thus, it usually issued to certify that an individual is a professional in a particular course of study.

Some examples of certifications that are issued to an individual (student) include the following:

CCNAComptia A+HSE I and II

In this context, many companies with intranet facilities within their organizations offer online training classes for certification by making them available for students over the Internet.

Read more on certification here: https://brainly.com/question/1391803

What are the advantages and disadvantages of using a relational database than a flat-file database.

Answers

Advances

Data Integrity, You Only need to change the data in one of the tables, it will then update itselfData Redundancy, By having a relational databse it ensures that no attributes are repeatedData Consistency, There is no chance of the same attribute being stored in a different format in a different fileData Flexibility, When dealing with queries, it gets much easier creating deeper queries with a relational DatabseGreater Efficiency, as you only have to input the data only once into a relational database it saves time and human resources

Disadvantages

Complex, Relational databases can be very complex and without the necessary training can be very hard to break down.Expensive, Relational databases are mostly commercial and require the user to buy that piece of software or licenses for more than one machine

It is easier to minimize duplicate data in a relational database.

It is difficult to use a relational database without prior knowledge.

5. All of the following are part of a cylinder head EXCEPT:
OA. Water pump
OB. Combustion chamber
OC. Valve guides
OD. Valve seats

Answers

Answer:

Wouldn't it be B? I mean a combustion chamber is where the fuel and air mixture are injected to be ignited and burned to produce power to a vehicle.

If you need to take a printout of a report, how can you specify the paper size you re using?.

Answers

When someone needs to take a printout of a report, they can specify the paper size that they are using by choosing these options:

Page Layout (tab) ---> Page Setup (group) ---> Size.What is the page layout in Windows?

The Page Layout tab has all of the options for arranging your document pages exactly how you want them. Set margins, apply themes, manage page orientation and size, insert sections and line breaks, show line numbers, and customize paragraph indent and lines. To change the paper size in a page layout, follow these steps:

Choose the Page Layout or design tab.Select the size from the Page Setup groupClick the symbol that reflects the desired page size. For instance, select Letter (Portrait) 8.5 x 11".If you don't find the size you're looking for, either click "more preset page sizes" or click "create new page size" to make your own.

Learn more about margin in windows here: brainly.com/question/14629384

#SPJ4

Which logical address is used for delivery of data to a remote network?

Answers

The IP address is utilized to send data to a distant network.

What does your IP address tell you?

An crucial component of accessing the Internet is the IP address, which is given or leased to a person by a service provider. IP addresses reveal the source of data and the destination it should be routed to.

Is your IP address the same as your Wi-Fi?

Your wireless router has its own IP address in addition to the one that is given to your computer. It's possible that you'll need to know the IP address for your computer, router, or both while configuring Wi-Fi Internet access on a different device or debugging a Wi-Fi connection.

To know more about IP address visit :

https://brainly.com/question/14306158

#SPJ4

You wrote a program to allow the user to guess a number. Complete the code to generate a random integer between one and 10.
from random import randint
# Generate and save a random number
correct

Answers

if we are talking about python

from random import randint
x = random.randint(1,10)
y = input(“enter a guess”)
if x == y:
print(“correct”)
else:
print(“incorrect, the answer was “, x)

(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer (ranging from 1 to 3, inclusive) to a variable sum that is initially 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that organizes and synchronizes the programs that will run on the computer.

Writting the JAVA code as:

import java.util.concurrent.ExecutorService;

import java.util.concurrent.Executors;

public class Main

{

Integer sum=new Integer(0);

Main(){

ExecutorService e=Executors.newFixedThreadPool(1000);

final Sum s = new Sum();

for(int i=0;i<1000;i++){

e.execute(s);

}

e.shutdown();

while(!e.isTerminated()){

}

System.out.println(sum);

}

public static void main(String[]args){

new Main();

}

class Sum implements Runnable{

public void run() {

m();

}

public void m(){

sum=sum+1;

}

}

}

See more about JAVA at brainly.com/question/12978370

#SPJ1

(Synchronized threads) Write a program that launches 1000 threads. Each thread adds a random integer

What is output by the following code?
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)

Answers

Answer:

if the code is like this, theres an indent on the print(sum)

c = 1

sum = 0

while (c < 10):

   c = c + 2

   sum = sum + c

   print (sum)

the output would be:

3

8

15

24

35

or

if the code look like this, it has no indent on print(sum)

c = 1

sum = 0

while (c < 10):

   c = c + 2

   sum = sum + c

print (sum)

the output would be:

35

what are the main forces impacting the airline environment? what are the main infrastructure issues?

Answers

The  main forces impacting the airline environment are

Physical Economic Political/legal Socio/culturalDemographicTechnologicalWhat are the main infrastructure issues?

ATC  is one that needs to be consistently updated, but other countries are known to be able to tap in and make use our own technology.

The Capacity in the sky that is the capacity infrastructure is one that is known to have its demand to be higher.

What environmental factors affect the airline industry?

A lot of concerns around the environmental is one that tends to affect the aviation and they are known to be as a result of climate change, noise and air quality.

When all these take place, one find it difficult to make quantitative data on all  of these subjects.

Therefore, The  main forces impacting the airline environment are

Physical Economic Political/legal Socio/culturalDemographicTechnological

Learn more about airline environment from

https://brainly.com/question/15124410

#SPJ1

which of the following are best practices when designing for mobile experiences? select all that apply. 1 point place call-to-action buttons front and center design a custom app, to direct all users to a single platform experience create unique color schemes for each platform keep navigation buttons short and simple

Answers

When designing for mobile experiences, some of the best practices include placing call-to-action buttons front and center and keeping navigation buttons short and simple. Therefore, the correct answer is: Place call-to-action buttons front and center and keep navigation buttons short and simple.

Mobile experience design is a new user interface design area that has emerged over the last few years. The term refers to the design of applications, websites, and other interfaces specifically for use on mobile devices.

Mobile app developers must understand the principles of user experience design (UX) to develop applications that are effective in terms of user engagement and retention. The design should be simple, visually appealing, and simple to use. The design should be tailored to the mobile device's small screen size, touch, and gesture-based navigation.

It's important to design a mobile app that will be engaging to the user from the start. Call-to-action buttons must be placed in front and center, so the user does not have to look for them. Navigation buttons should be short and simple to use. This would be a good strategy for designing mobile experiences that are both efficient and enjoyable.

Learn more about design: https://brainly.com/question/265380

#SPJ11

Which network component extends from a computer's NIC to a switch?A) Network interfaceB) Device DriverC) Network MediumD) Network Protocol

Answers

The network component extends from computer's NIC to a switch is Network Medium. So option C is the correct answer.

The network medium refers to the physical medium through which data is transmitted between a computer's network interface (NIC) and a switch. It represents the physical infrastructure that carries the data signals.

The network medium can take various forms, such as Ethernet cables (e.g., twisted pair, fiber optic), wireless connections (e.g., Wi-Fi), or even other types of connections like powerline networking.

The network medium provides the pathway for data to travel between the computer's NIC and the switch.

The network interface (NIC) is responsible for transmitting and receiving data over the network medium, while the switch is responsible for directing the data packets to their intended destinations within the network.

The device driver enables the communication between the NIC and the computer's operating system, and the network protocol defines the rules and standards for data transmission and communication across the network.

So the correct answer is option C) Network Medium.

To learn more about network: https://brainly.com/question/8118353

#SPJ11

Other Questions
what is mass measured in; what is weight measured in; is mass measured in newtons; what is the difference between mass and weight with examples; what are the five differences between mass and weight; is mass measured in newtons or kg; how are mass and weight related; measured in kilograms mass or weight How we communicate is often based on the relationship. Think about talking with your closest friend versus a friend you are just getting to know. How about with your parents versus a brother or sister? What about the way you talk with an adult compared to people your age? Or what about one teacher versus another? Your internal dialog is also an important aspect of communication skills, and learning to communicate effectively and consistently is a healthy practice. What is the pH of an aqueous solution made by combining 43.55 mL of a 0.3692 M ammonium chloride with 42.76 mL of a 0.3314 M solution of ammonia to which 4.743 mL of a 0.0752 M solution of HCl was added? India has a 12-foot board. How many 18-inch pieces can she cut from the board? FILL IN THE BLANK. the classical nahuatl aztec language was used as a(n)_____, which is a common language developed by speakers of different languages. what is the slope of (-5,4) and (7,8) I need help ASAP!!! Giving brainiest Translate the sentence into an inequality.The sum of a number times 10 and 21 is less than 23.Use the variable w for the unknown number. Ford Motor Company produces passenger cars, commercial trucks and specialty vehicles, performance vehicles, and race cars. Ford uses a procedure called _____ to divide its large market.a. micromarketingb. positioningc. market segmentationd. cannibalizatione. perceptual mapping rorey was just diagnosed with a personality disorder that fits into the detachment category of the dsm-5. what behavior is he most likely to display? Boris rented a truck for one day. There was a base fee of $16.99, and there was an additional charge of 88 cents for each mile driven. Boris had to pay 138.43 when he returned the truck. For how many miles did he drive the truck? the part of household savings that is used to finance high-risk business enterprises in exchange for part of the profits if the enterprise is successful, is called . because beach 2 is cooler than beach 1, we might expect more astelars to hatch if we move the eggs. but how many more astelars would hatch on beach 2 than would hatch on beach 1? and would this benefit of moving the eggs outweigh the risks posed by other variables? The angles of depression of the top and bottom of a building 50 meters high as observed from the top of a tower are 30 and 60 respectively. Find the height of the tower, and also the horizontal distance between the building and the tower. match each technology with the disease is helps detect or treat PLEASE HELP ME THIS IS URGENT I AM BEING TIMED!!!A book has 280 pages. Of the 280 pages, 210 have printing, 40 have pictures, and 30 are blank. Write your answers as fractions. Represent a fraction using the / symbol.What is the probability of not opening to a printed page? Solve.(3.3 10) (2 10) minerals needed in amounts less than 20 milligrams daily--iron, zinc, selenium, fluoride, chromium, copper, manganese, and molybdenumare classified as Nick had to run 36 laps around the track. He has finished 27 laps. What is thepercent of laps that Nick has left to run? pls answer i beg who answers correct get 100 points