Java Programming
1. The employee class is an abstract class and has the following private attributes:
. String fullName
. string socialSecurityNumber
It's going to have an abstract method called double earnings()
2. The HourlyEmployee class is a class derived from the abstract class Employee. It has the following private attributes:
. double wage
. double hours
Do the earnings() method. will calculate earnings as follows:
. If the hours are less than or equal to 40
. wages *hours
. If the hours are greater than 40
. 40 * wages + ( hours -40) * wages * 1.5
Implement Exception handling in the setHours method of the HourlyEmployee class, apply the IllegalArgumentException when the hours worked are less than zero.
3. Using the concept of polymorphism instantiate an object of each concrete class and print them in main. Assume classes SalariedEmployee are done.
The output should be: name of the employee, social security, and what i earn ( earnings)

Answers

Answer 1

```java

public class Main {

   public static void main(String[] args) {

       Employee salariedEmployee = new SalariedEmployee("John Doe", "123-45-6789", 5000);

       Employee hourlyEmployee = new HourlyEmployee("Jane Smith", "987-65-4321", 15.0, 45);

       System.out.println("Name: " + salariedEmployee.getFullName() + ", Social Security Number: " + salariedEmployee.getSocialSecurityNumber() + ", Earnings: " + salariedEmployee.earnings());

       System.out.println("Name: " + hourlyEmployee.getFullName() + ", Social Security Number: " + hourlyEmployee.getSocialSecurityNumber() + ", Earnings: " + hourlyEmployee.earnings());

   }

}

```

"Using polymorphism, instantiate an object of each concrete class (e.g., `SalariedEmployee` and `HourlyEmployee`), and print their information (name, social security number, and earnings) in the `main` method."

Here's an example implementation of the `Employee` abstract class, `HourlyEmployee` class, and the main method to instantiate objects and print their information:

```java

abstract class Employee {

   private String fullName;

   private String socialSecurityNumber;

   public Employee(String fullName, String socialSecurityNumber) {

       this.fullName = fullName;

       this.socialSecurityNumber = socialSecurityNumber;

   }

   public abstract double earnings();

   public String getFullName() {

       return fullName;

   }

   public String getSocialSecurityNumber() {

       return socialSecurityNumber;

   }

}

class HourlyEmployee extends Employee {

   private double wage;

   private double hours;

   public HourlyEmployee(String fullName, String socialSecurityNumber, double wage, double hours) {

       super(fullName, socialSecurityNumber);

       this.wage = wage;

       setHours(hours);

   }

   public void setHours(double hours) {

       if (hours < 0) {

           throw new IllegalArgumentException("Hours worked cannot be less than zero.");

       }

       this.hours = hours;

   }

   public double earnings() {

       if (hours <= 40) {

           return wage * hours;

       } else {

           return 40 * wage + (hours - 40) * wage * 1.5;

       }

   }

}

public class Main {

   public static void main(String[] args) {

       SalariedEmployee salariedEmployee = new SalariedEmployee("John Doe", "123-45-6789", 5000);

       HourlyEmployee hourlyEmployee = new HourlyEmployee("Jane Smith", "987-65-4321", 15.0, 45);

       Employee[] employees = { salariedEmployee, hourlyEmployee };

       for (Employee employee : employees) {

           System.out.println("Name: " + employee.getFullName());

           System.out.println("Social Security Number: " + employee.getSocialSecurityNumber());

           System.out.println("Earnings: " + employee.earnings());

           System.out.println();

       }

   }

}

```

In this example, the `Employee` class is defined as an abstract class with private attributes `fullName` and `socialSecurityNumber`. It also has an abstract method `earnings()`. The `HourlyEmployee` class extends `Employee` and adds private attributes `wage` and `hours`. It implements the `earnings()` method based on the given calculation. The `setHours()` method in `HourlyEmployee` includes exception handling using `IllegalArgumentException` to ensure that hours worked cannot be less than zero.

In the `main` method, objects of `SalariedEmployee` and `HourlyEmployee` are instantiated. The `Employee` array is used to store both objects. A loop is used to print the information for each employee, including name, social security number, and earnings.

Learn more about class Main

brainly.com/question/29418692

#SPJ11


Related Questions


SOMEONE PLEASE HELP ME DUE IS IN 30 MINUTES!!!⚠️⚠️⚠️⚠️

~WAP to accept a number and display the square of the number using SUB END SUB​

Answers

Answer:

Display square root of an input number

REM PROGRAM TO DISPLAY SQUARE ROOT OF AN INPUT NUMBER. INPUT “ENTER ANY NUMBER”; N. S = N ^ (1 / 2) ...

DECLARE SUB SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...

SUB SQROOT (N) S = N ^ (1 / 2) ...

DECLARE FUNCTION SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...

FUNCTION SQROOT (N) SQ= N ^ (1 / 2)

Explanation:

hope this helps u

Remember our person class from the last video? let’s add a docstring to the greeting method. How about, "outputs a message with the name of the person"

Answers

The outputs of a message with the name of the person are:

def greeting(self):

 """Outputs a message with the name of the person"""

 return f"Hello, my name is {self.name}"

What is output?

The output of a program is the information that is produced after the program has been executed and the input has been processed. Output is usually displayed on a screen or printed onto paper, but could also be stored into a file or sent over a network. Output can come in many different forms, from graphical and textual representations of data, to audio and video recordings. Outputs are often the result of a program's processing of input and can be used to provide feedback to the user or to inform other programs of the results of the processing. Output is an important part of the programming process and can provide valuable insight into the effectiveness of the program.

To learn more about outputs

https://brainly.com/question/28498043

#SPJ1

What behavior do elements in a stack follow?

Answers

A stack operates on the LIFO (Last In First Out) principle, which states that the element inserted last is the first element to be removed. Inserting an element into the stack is known as a push operation, and removing an element from the stack is known as a pop operation.

Answer:

last in, first out, or LIFO behavior

Explanation:

B

What is ABC computer?​

Answers

Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.

Explanation:

From the menu of the navigation pane, Cecily wants multiple joined tables to be displayed. She later changes her mind and wants several different types of data displayed. Which shows the correct order and menu items Cecily selects?

She first selects Table, then All Access Objects.
She first selects Queries, then All Access Objects.
She first selects Forms, then Queries.
She first selects All Access Objects, then Queries.

Answers

She first selects table then all access objects

which of the following are DPs (Departure procedures)
Obstacle Departure procedures and standard Instrument Departures
ATC climb clearances
En route ATC clearances

Answers

Departure Procedures (DPs) are specific guidelines and instructions that pilots follow when departing from an airport. They are designed to ensure safe and efficient aircraft departures, particularly in challenging or congested airspace. There are various types of DPs, including Obstacle Departure Procedures (ODPs) and Standard Instrument Departures (SIDs).

1. Obstacle Departure Procedures (ODPs): ODPs are departure procedures that provide guidance to pilots on how to navigate around obstacles, such as mountains or tall structures, during the initial climb phase. ODPs are typically published for airports where terrain or obstacles pose a potential hazard to departing aircraft. These procedures outline specific headings, altitudes, and other instructions that pilots must follow to ensure obstacle clearance.

2. Standard Instrument Departures (SIDs): SIDs are departure procedures that provide a standard and efficient route for aircraft to follow after takeoff. SIDs are typically used in controlled airspace and help to ensure aircraft maintain safe separation and follow a predictable path. SIDs include specific waypoints, altitude restrictions, and other instructions that pilots must adhere to during the initial climb and transition to the en-route phase.

On the other hand, ATC climb clearances and en-route ATC clearances are not considered DPs. ATC climb clearances refer to instructions given by air traffic control to pilots during the climb phase to reach a specific altitude or flight level. These clearances may include altitude restrictions, speed restrictions, or other instructions to ensure safe separation and airspace management.

En route ATC clearances are instructions provided by air traffic control to pilots during the en-route phase of flight. These instructions may include changes in altitude, route modifications, or other directives to ensure safe and efficient navigation through the airspace.

In summary, the DPs specifically refer to Obstacle Departure Procedures (ODPs) and Standard Instrument Departures (SIDs), while ATC climb clearances and en route ATC clearances are separate instructions given by air traffic control during different phases of flight.

Learn more about Departure procedures: https://brainly.com/question/31813870

#SPJ11

What challenges do internet browsers face in the marketplace? in a paragraph

Answers

The challenge that Internet Browsers face in the market can be categorized into two:

Race for Superior adoption;Race for superior protection.Why are the above problems the biggest challenges of Internet Browsers?

Suerior Adoption by Internet Users: In order to stay relevant, internet users must want to access the internet via a browser. If nobody is using a browswer, the browswer spends more money than they are making to get people on board. Hence, there is a challenge to stay relevant. One of the factors that drive adoption is how secure users feel.

Superior Secrity:

Security is paramount in the mind of any internet user to the extent that people are not paranoid to some extent about how to access the internet. Security is so important that Antivirus makers now have products that cater to this need. Hence it's important.

Learn more about Internet browswers:
https://brainly.com/question/22650550
#SPJ1

what windows 8 tool can you use to migrate user data and settings

Answers

In Windows 8, you can use the "Windows Easy Transfer" tool to migrate user data and settings from one computer to another.

Windows Easy Transfer simplifies the process of transferring files, folders, user accounts, settings, and even some programs from an old computer to a new one.

To use Windows Easy Transfer, follow these steps:

1. Open the Windows 8 Start screen and type "Windows Easy Transfer" to search for the tool.

2. Click on the "Windows Easy Transfer" search result to launch the application.

3. A welcome screen will appear. Click on the "Next" button to proceed.

4. Select the method you want to use to transfer data. You can choose to transfer data over a network, using an Easy Transfer cable, or by creating a Windows Easy Transfer file on an external storage device.

5. Follow the on-screen instructions to select the specific data and settings you want to transfer. You can choose to transfer user accounts, documents, pictures, music, videos, and other personal files.

6. Once you've made your selections, click on the "Transfer" button to begin the migration process.

7. After the transfer is complete, you will be able to review the transferred data and settings on the new computer.

It's important to note that Windows Easy Transfer is not available in Windows 10 or later versions. In those versions, Microsoft has integrated the data migration functionality directly into the operating system, making it easier to transfer user data and settings during the initial setup process of a new computer.

Learn more about Windows 8:

https://brainly.com/question/28343583

#SPJ11

1) Assume you are adding an item 'F' to the end of this list (enqueue('F')). You have created a new linear node called temp that contains a pointer to 'F'. Also assume that in the queue linked list implementation, we use the variable numNodes to keep track of the number of elements in the queue.

Answers

When a new item 'F' is added to the end of the queue list (enqueue('F')), a new linear node is created called temp that contains a pointer to the new element. In a queue linked list implementation, the variable numNodes is used to keep track of the number of elements in the queue.

As a result, we increment the numNodes variable by 1 since a new item has been added to the queue list. The pointer at the tail of the queue is then updated to the newly added node temp. We can do this by assigning the new node temp to the current node that is being referenced by the tail pointer.

Next, if the queue was previously empty, then we set both the head and tail pointers to temp. If the queue wasn't empty, we leave the head pointer unmodified, since the element added is being added to the end of the queue. We then return the updated queue list with the newly added item 'F'.In summary, when adding a new item 'F' to the end of a queue list implementation, we first create a new node that points to the new element.

To know more about mplementation visit:

https://brainly.com/question/32092603

#SPJ11

who sang devil went down to georgia

Answers

Answer:

Charlie Daniels sang that one for sure

to work with install images (.wim files), you use the command.

Answers

To work with install images (.wim files), you use the Dism command.

The Dism command is a command-line tool that can be used to manage Windows images. It can be used to mount, modify, and create images. To work with install images, you can use the following Dism commands:

Mount - Mounts an image file so that it can be accessed.

Unmount - Unmounts an image file.

Apply - Applies an image to a computer.

Export - Creates a copy of an image file.

Update - Updates an image file.

For example, to mount the install image file install.wim, you would use the following command:

dism /mount-wim /wimfile:install.wim /index:1 /mountdir:c:\

This command would mount the image file install.wim at the location c:\. You can then use other Dism commands to modify the image.

To unmount the image, you would use the following command:

dism /unmount-wim /mountdir:c:\

This command would unmount the image file from the location c:\.

To apply the image to a computer, you would use the following command:

dism /apply-wim /wimfile:install.wim /index:1 /applydir:c:\

This command would apply the image file install.wim to the computer at the location c:\.

To create a copy of an image file, you would use the following command:

dism /export-image /sourcewim:install.wim /sourceindex:1 /destinationimage:c:\new-install.wim

This command would create a copy of the image file install.wim at the location c:\new-install.wim.

To update an image file, you would use the following command:

dism /update-wim /sourcewim:install.wim /sourceindex:1 /update:c:\update.cab

This command would update the image file install.wim with the contents of the file c:\update.cab.

The Dism command is a powerful tool that can be used to manage Windows images. It can be used to mount, modify, create, and apply images.

To learn more about command, visit here:

https://brainly.com/question/25243683

#SPJ11

a. Write a program that reads a file "data.in" that can be of any type (exe, pdf, doc, etc), and then copy its content to another file "data.out". For example, if it's a pdf file, "data.out" should be opened successfully by a PDF reader. If it's a video file, the output file can be replayed.
b. Please use binary file read/write for your program.
c. The file size ranges between 1MB-50MB.
d. Comment at the top of the program for how to execute your program

Answers

To write a program that reads a file "data.in" of any type (exe, pdf, doc, etc) and then copies its content to another file "data.out" successfully opened by the respective program, the following code may be written with binary file read/write:```c#include
using namespace std;
int main() {
   string fileName = "data.in";
   string outFileName = "data.out";
   ifstream inputFile(fileName, ios::binary | ios::ate);
   int size = inputFile.tellg();
   inputFile.seekg(0, ios::beg);
   ofstream outputFile(outFileName, ios::binary);
   char* buffer = new char[size];
   inputFile.read(buffer, size);
   outputFile.write(buffer, size);
   delete[] buffer;
   inputFile.close();
   outputFile.close();
   return 0;
Executing the program: Run the program as you would any other C++ program in the command prompt by following these steps:

1. Make sure you have a C++ compiler installed on your computer (such as gcc).

2. Save the code to a file with the ".cpp" file extension (such as "filecopy.cpp").

3. Open the command prompt and navigate to the directory where the code file is located.

4. Type "g++ filecopy.cpp -o filecopy" and press enter.

5. Type "filecopy" and press enter.

To learn more about "program", visit: https://brainly.com/question/31137060

#SPJ11

Stella has captured this candid photograph of a man who was reunited with his son. She has used facial retouching in each of the images. Which images could she print along with the mans interview?

Stella has captured this candid photograph of a man who was reunited with his son. She has used facial

Answers

Answer: The last picture it looks better.

Explanation: Welcome!

Answer:

4

Explanation:

What type of access controls allow the owner of a file to grant other users access to it using an access control list

Answers

Answer:

Discretionary Access Control

Explanation:

The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control.

What is discretionary access control?

This is known to be a type of control that gives one a specific amount of access control to the use of the object's owner, or any other person.

Note that The type of access controls allow the owner of a file to grant other users access to it using an access control list is Discretionary Access control as it only gives a little access.

Learn more about Discretionary Access from

https://brainly.com/question/20038736

#SPJ2

Your Task
Your teacher may ask you to work in groups. Check with your teacher to see if this is required.
Choose a topic from the unit.
Identify a problem or issue to research.
• Write a question (or questions) to be answered by your research.
• Find at least four sources; these can be a journal article, a website from a reputable organization, an encyclopedia, a newspaper,
or a documentary. When in doubt, ask your teacher.
Unacceptable sources Include Wikipedia, an individual's blog, and social media, except as examples not counted as sources.
• Create a Word document as described below.
• Compare your project to the rubric before you submit it.
.
.

Answers

Students must collaborate in teams and choose a subject from a specific unit of study for this undertaking.

What is the objective?

The objective is to pinpoint a challenge or concern related to the selected subject matter and conduct thorough investigation to gather information that addresses particular queries.

It's important for students to obtain data from a minimum of four reliable sources, which may include scholarly publications, trustworthy websites, reference books, news outlets, or informative films. It is prohibited to utilize any sources such as Wikipedia, personal blogs, or social media.

The Word document will serve as a record of the project and must comply with the rubric provided.

Read more about project design here:

https://brainly.com/question/26872062

#SPJ1

write a function f(n) to calculate the number of ways of representing $n$ as a sum of 1, 2, and 5, where the order of summands is important. for example:

Answers

Calculate the number of ways of representing $n$ as a sum of 1, 2, and 5, can be represented as  Fibonacci Series ,this pattern is observed using fibonacci series .

Input : N = 3

Output : 3

3 can be represented as (1+1+1), (2+1), (1+2).

Input : N = 5

Output : 8

For N = 1, answer is 1.

For N = 2. (1 + 1), (2), 2 is the answer.

For N = 3. (1 + 1 + 1), (2 + 1), (1 + 2), answer is 3.

For N = 4. (1 + 1 + 1 + 1), (2 + 1 + 1), (1 + 2 + 1), (1 + 1 + 2), (2 + 2) answer is 5.

To obtain the sum of N number of terms , we can add 1 to N – 1. Also, we can add 2 to N – 2. And of only 1 and 2 are allowed to make the sum N as by the rule of fibonacci series. So, to obtain sum N using 1s and 2s, total ways are: number of ways to obtain (N – 1) + number of ways to obtain (N – 2)., so as by fibonacci series .

Divide the problem into sub-problems for solving it. Let P[n] be the number of ways to write N as the sum of 1, 3, and 4 numbers. Consider one possible solution with n = x1 + x2 + x3 + … xn. If the last number is 1, then sum of the remaining numbers is n-1 in the full series. So according to the sequence the number that ends with 1 is equal to P[n-1]. Taking all the other cases of series  into account where the last number is 3 and 4.

Learn more about fibonacci series  here:-

brainly.com/question/29764204

#SPJ4

Internal combustion engines use hot expanding gasses to produce the engine's power. Technician A says that some engines use spark to ignite the gasses. Technician B says some engines use compression to ignite the gasses. Who is correct?

Answers

Answer:

Explanation:

Both are right.

Engines are divided into:

1) Internal combustion engines

2) Diesels

Review the HTML code below.



My Web Page


Hello Friend!
Make it a great day!

Smile
Laugh
Celebrate




Which of the text below would display in the page title, based upon the HTML code above?

Smile
My Web Page
Make it a great day!
Hello Friend!

Answers

My Web Page would display in the page title, based upon the HTML code above.

What is the HTML code?For pages intended to be viewed in a web browser, the HyperText Markup Language, or HTML, is the accepted markup language. Cascading Style Sheets and JavaScript are technologies and scripting languages that can help.A web page's structure and content are organised using HTML (HyperText Markup Language) coding. The organisation of the material, for instance, might take the form of a series of paragraphs, a list of bulleted points, or the use of graphics and data tables.In HTML, four tags are necessary. HTML stands for "title," "head," and "body." These tags go at the start and end of an HTML document.

Learn more about HTML refer to :

https://brainly.com/question/4056554

#SPJ1

what would be the time complexity of the size operation of queue, for a linked lisk implementation, if there was not a count variable

Answers

Enque and deque operations on a singly-linked list based queue should both have constant time, or O(1), if carried out properly .

A linear data structure called a queue employs the FIFO method (First In First Out). A line of people waiting sequentially, commencing at the front of the line, might be thought of as a queue. It is an ordered list where deletions are made from the front and insertions are made from the rear end, which is known as the list's end. You can implement a queue using an array or a linked list.

The measurement of how long it takes for an algorithm or piece of code to run is known as time complexity. The efficiency can also be measured by the time complexity.

An operation is deemed to be constant time, if it continuously uses the same number of fundamental operations to produce the desired result, provided there are no variable-length loops or recursion.

In order to avoid traversing the list, which takes O(N) time and is not constant, you must keep a pointer to both the head and tail of the linked list.

To learn more about singly-linked list click here:

brainly.com/question/29306616

#SPJ4

The Department of Computer Science at Jacksonville State University has received several applications for teaching assistant positions from JSU students. The responsibility of each applicant is to assist a faculty member in instructional responsibilities for a specific course. The applicants are provided with the list of available courses and asked to submit a list of their preferences. The corresponding committee at JSU prepares a sorted list of the applicants (according to the applicants' background and experience) for each course and the total number of TAs needed for the course. Note that there are more students than the available TA spots. The committee wants to apply an algorithm to produce stable assignments such that each student is assigned to at most one course. The assignment of the TAs to courses is stable if none of the following situations arises. 1. If an applicant A and a course are not matched, but A prefers C more than his assigned course, and C prefers A more than, at least, one of the applicants assigned to it. 2. If there is unmatched applicant A, and there is a course C with an empty spot or an applicant A is assigned to it such that C prefers A to A. Your task is to do the following: i Modify the Gale-Shapley algorithm to find a stable assignment for the TAS-Courses matching problem ii Prove that the modified algorithm produces stable TAS-Courses assignments.

Answers

Modifying the Gale-Shapley algorithm for the TAS-Courses matching problem:The Gale-Shapley algorithm, also known as the stable marriage algorithm, can be modified to solve the TAS-Courses matching problem.

In this case, we have applicants (students) and courses as the two sets to be matched.Here is the modified version of the Gale-Shapley algorithm for finding a stable assignment for the TAS-Courses matching problem:Initialize all applicants and courses as free and unassigned.While there exists at least one unassigned applicant:Select an unassigned applicant A.Let C be the highest-ranked course in A's preference list that has available spots or an assigned applicant A' such that C prefers A to A'.If C has an available spot, assign A to C.If C is already assigned to an applicant A' and C prefers A to A', unassign A' and assign A to C If C rejects A, go to the next highest-ranked course in A's preference list.Repeat steps 2-4 until all applicants are assigned to a course.

To know more about algorithm click the link below:

brainly.com/question/12946457

#SPJ11

how to disappear completely from the internet pc magazine

Answers

In order to disappear completely from the internet, one needs to delete their social media accounts, delete their emails, etc.

The internet is a network of interconnected computer systems. Despite its numerous advantages, it also has several disadvantages and there are some moments when we want to disappear from the internet.

The steps that are needed to disappear from the internet include:

Delete your social network accounts.Delete your email accounts.Use search engines to track your old activities online and delete them.Falsify the accounts that can't be deleted.Unsubscribe from mailing lists.

Read related link on:

https://brainly.com/question/24902823

What are the three default file descriptors that linux uses to classify information for a command?

Answers

The three default file descriptors that Linux uses to classify information for a command are:

Standard Input (stdin): File descriptor 0 (FD 0) represents the standard input, which is used for accepting input from the user or from another command. By default, it is connected to the keyboard.

Standard Output (stdout): File descriptor 1 (FD 1) represents the standard output, which is used for displaying the output of a command. By default, it is connected to the terminal where the command is executed.

Standard Error (stderr): File descriptor 2 (FD 2) represents the standard error, which is used for displaying error messages or diagnostic information. By default, it is also connected to the terminal.

In Linux, file descriptors are integer values that represent open files or input/output channels. The three default file descriptors mentioned above are a standard convention in the Unix-like operating systems, including Linux. They provide a standardized way for commands to interact with input, output, and error streams.

Standard input (stdin) is where the command reads input data from, such as user input or data piped from another command. Standard output (stdout) is where the command writes its normal output, which is usually displayed on the terminal or can be redirected to a file. Standard error (stderr) is where the command writes error messages or diagnostic information that should not be mixed with the normal output.

By using these three default file descriptors, Linux provides a consistent and convenient mechanism for handling input, output, and error streams in command-line operations. Understanding and managing these file descriptors is important for efficient command execution and handling of data in the Linux environment.

To learn more about Linux, visit

brainly.com/question/12853667

#SPJ11

How
would I change the user owner and group owner on the shadow file in
linux?

Answers

In order to change the user owner and group owner on the shadow file in Linux, you can use the `chown` command.

Here's how you can do it:

Open the terminal and type the following command: `sudo chown username:groupname /etc/shadow`.

Replace `username` with the desired user's username and `groupname` with the desired group's name.

For example, if you want to change the owner to user "john" and group "admin", the command would be `sudo chown john:admin /etc/shadow`.

Note: Be very careful when making changes to system files, as incorrect changes can cause serious issues. Always backup important files before making any changes.

Learn more about command at

https://brainly.com/question/32148148

#SPJ11

____ is an attack that relies on guessing the ISNs of TCP packets.
a. ARP spoofing c. DoS
b. Session hijacking d. Man-in-the-middle

Answers

b. Session hijacking is an attack that relies on guessing the ISNs of TCP packets.

Session hijacking is a type of attack that aims to take control of an established session between a client and a server. In this attack, an attacker attempts to hijack or take over an existing session by intercepting and manipulating the communication between the client and the server.

One common way to perform session hijacking is by guessing or predicting the Initial Sequence Number (ISN) of the TCP packets that are exchanged during the session establishment process. The ISN is a randomly generated value used to initiate a TCP connection, and it is used to ensure the uniqueness and integrity of the packets exchanged between the client and server.

So the correct answer is b. Session hijacking.

Learn more about Session hijacking: https://brainly.com/question/13068625

#SPJ11

What was the hypothesis of the X-linked cross conducted in the lab with the white mutation in Drosophila and written up in your lab report? For the toolbar, press ALT +F10 (PC) or ALT +FN+F10 (Mac). The genes for mahogany eyes and ebony body are approximately 30 map units apart on chromosome 3 in 0 Prosophint female was mated to an ebony-bodied male and that the resulting F. phenotypicmlly wild-type fomates were mated to mahogany offepring, what would be the expected phenotypes, and in what numbers would they be expected? For the toolbar, press ALT +F10 (PC) or ALT +FN+F10 (Mac).

Answers

The expected phenotype ratio is 1:1:1:1. The offspring would be expected to have wild-type eyes and wild-type bodies.

The hypothesis of the X-linked cross conducted in the lab with the white mutation in Drosophila and written up in the lab report was that genes are located on chromosomes and exhibit sex-linkage. The X-linked recessive mutation responsible for white eyes in Drosophila melanogaster was studied in this experiment.The result showed that the gene for white eyes was located on the X chromosome and was sex-linked.

Because females have two X chromosomes and males have only one, the inheritance of white eyes was different between the two sexes.In Drosophila, the genes for mahogany eyes and ebony body are approximately 30 map units apart on chromosome 3.

If a 0 Prosophila female was mated to an ebony-bodied male and the resulting F1 phenotypically wild-type females were mated to mahogany offspring, the expected phenotypes and numbers would be as follows:¼ of the offspring would be expected to have mahogany eyes and ebony bodies.¼ of the offspring would be expected to have wild-type eyes and ebony bodies.¼ of the offspring would be expected to have mahogany eyes and wild-type bodies.¼ of the offspring would be expected to have wild-type eyes and wild-type bodies. The expected phenotype ratio is 1:1:1:1.

Learn more about phenotype :

https://brainly.com/question/32129453

#SPJ11

Your company is adopting a new BYOD policy for tablets and smartphones. Which of the following would allow the company to secure the sensitive information on personally owned devices and the ability to remote wipe corporate information without the user's affecting personal data?​A. Face ID​B. Containerization​C. Touch ID​D. Long and complex passwords

Answers

B. Containerization. Containerization is the process of separating corporate applications and data from a personal device, so that the corporate information can be securely accessed and remotely wiped without affecting the user's personal data.

The solution for the given question "Your company is adopting a new BYOD policy for tablets and smartphones. Which of the following would allow the company to secure the sensitive information on personally owned devices and the ability to remote wipe corporate information without the user's affecting personal data?"

is option B) Containerization. What is BYOD policy? BYOD is a policy that allows employees to bring their own device to the office or use their personal device for business purposes. In today's market, it has become increasingly common. The employee is given the authorization to use a device of their choosing to connect to the corporate network, access sensitive company data, and use other business-related resources and services.

The advantage of the policy is that it helps in cutting costs and time as the employees will have access to the business-related resources on their devices, and there is no need to provide additional devices to them. What is containerization? Containerization is a concept used to separate corporate data from personal data on a user's device.

You can read more about Containerization at https://brainly.com/question/30975572

#SPJ11

Note that common skills are listed toward the top, and less common skills are listed toward the bottom.

According to O*NET, what are common skills needed by Chefs and Head Cooks? Select three options.

technology design
monitoring
management of personnel resources
programming
time management
installation

Answers

Answer:

2,3,5

Explanation:

i took the assignment

According to O*NET, skills needed by Chefs and Head Cooks are monitoring, management of personnel resources, and time management. Hence, options 2, 3, and 5 are correct.

What is O*NET?

O*NET (Occupational Information Network) is an online database that provides comprehensive information on job characteristics, worker attributes, and occupational requirements for a wide range of occupations in the United States.

It is maintained by the US Department of Labor and is freely available to the public.

O*NET includes information on job titles, job descriptions, required skills and knowledge, education and training requirements, wages and employment trends, and much more.

The information is collected from a variety of sources, including surveys of workers and employers, industry experts, and other occupational data sources.

Thus, options 2, 3, and 5 are correct.

To learn more about the O*NET, follow the link:

https://brainly.com/question/30823238

#SPJ2

Which of the following is true of the SHA-256 hash function?
A. It has been proven not to have a collision
B. However secure it is Bitcoin adopts other hash functions
C. No collision has ever been publicly found
D. It has been proven that there is no fast way to find collisions

Answers

The following statement is true of the SHA-256 hash function:

C. No collision has ever been publicly found.

The correct option is C

SHA-256 is a widely used cryptographic hash function that generates a 256-bit output. It is considered to be a secure and reliable hashing algorithm. Although it has not been mathematically proven that SHA-256 is collision-resistant, no collision has ever been publicly found. Bitcoin, among many other systems, uses SHA-256 to secure its transactions, and there is no evidence to suggest that the algorithm has been compromised in any way. However, as the world of cryptography is constantly evolving, Bitcoin and other systems may adopt other hash functions as a precautionary measure. It has not been proven that there is no fast way to find collisions in SHA-256, and it is still possible that a collision could be found in the future.

To know more about function click here:

brainly.com/question/12431044

#SPJ4

which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?

Answers

The correct response is d. Slide Sorter. You may easily rearrange or divide your slides into sections by dragging and dropping them around the grid-like display of your slides thanks to the slide sorter.

You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view. The "Slide Sorter" button in the "Presentation Views" button group on the "View" tab of the Ribbon is another option. The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here. All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in PowerPoint's Slide Sorter view are also available in the Normal view's slide thumbnails pane. Click a slide thumbnail in the Slide Sorter window to choose a slide. Click and drag the slide thumbnails in this view, then release them where you want them to be. This will reorder the order of the slides in your presentation. The selected slide opens in Normal View, where you can edit its content, if you double-click a slide thumbnail in PowerPoint's Slide Sorter view or if you choose a slide thumbnail and then press the "Enter" key on your keyboard. In the Slide Sorter window, click the desired slide thumbnail to choose it for deletion. Then, use your keyboard's "Delete" key. Alternatively, you can erase the slide by doing a right-click. then from the pop-up menu, choose the "Delete Slide" option.

Learn more about Slide Sorter here

https://brainly.com/question/16910023

#SPJ4

Which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?

a. Normal

b. Outline

c. Slide Show

d. Slide Sorter

introduce yourself by following the rule

introduce yourself by following the rule

Answers

My name is Trisha Davis, I am a first year medical student and i love to read and write books. I hate lies and i love anyone who is honest.

What is self introduction?

My name is Trisha Davis, I am a first year medical student and i love to read and write books. I hate lies and i love anyone who is honest.

My goal in life is to be a medical doctor and also an entrepreneur. I love to help others and put smile on people's face. What  i want from life is good health, favor and avenue to showcase my gifts to the world.

Learn more about self introduction from

https://brainly.com/question/26685169

#SPJ1

Other Questions
Discuss three ways in which building and sustaining good relationship may impact positively on your emotional well being during lockdown 1 Which factor most likely made large-scale human migrationfrom Asia to North America possible during the prehistoric age? If a homeowner sells a kitchen table and chairs that she no longer wants to use and does not report the income earned from the sale to the Internal Revenue Service, the value of GDP isA. understated because this transaction took place in the underground economy.B. overstated because the sale of the furniture is counted twice in GDP calculations.C. unaffected by this transaction because the table and chairs were already counted in GDP as final goods D. when the homeowner bought them new.E. understated because this purchase was a nonmarket transaction. You make a stock solution using 17.26 mg of a dye with a molar mass of 225.8 g/mol and you add water until you reach a volume of 500.0 mL. What is the concentration of the dye in the stock solution? Give your answer in all of the units requested (M, mM) What does the word solar mean in this paragraph?1. having2. from the sun3. stored energy4.a type of fooda type of food TRUE OR FALSE the max-width property should never be used in a fluid layout. During Reconstruction in the United States, the Freedmens Bureauadministered poll taxes and literacy tests during elections.segregated white and African American students in schools.built schools and trained teachers for newly freed persons.helped African Americans relocate from the South to the North What does burning fossil fuels release into the air? Which president said, "as government expands, liberty contracts"? group of answer choices georgeA. w. bushB. bill clinton C. ronald reagan D. jimmy carter which of the following has established guidelines to ensure that insurance companies and heir agents promote their products properly and accurately, without exaggerating the benefits or minimizing the drawbacks? What is wrong with this sentence, and why?"To tell us all what really happened."Select one:It is a sentence fragment because it has two independent clauses.It is a run-on sentence because it does not have a subject.It is a sentence fragment because it does not have a subject.It is a run-on sentence because it is a dependent clause. According to Markovnikov's rule of the electrophilic addition to an alkene, the electrophile, usually a proton, is more likely to add to the ___________ in a double bond. This arrangement places the intermediate carbocation on the ________ , which stabilizes it with the presence of _________. In the major product of a reaction following Markovnikov's rule, the___________ will then end up on the more-substituted carbon in a double he fomc has instructed the frbny trading desk to purchase $500 million in u.s. treasury securities. the federal reserve has currently set the reserve requirement at 5 percent of transaction deposits. assume u.s. banks withdraw all excess reserves and give out loans. a. assume also that borrowers eventually return all of these funds to their banks in the form of transaction deposits. what is the full effect of this purchase on bank deposits and the money supply? b. what is the full effect of this purchase on bank deposits and the money supply if borrowers return only 95 percent of these funds to their banks in the form of transaction deposits I got stuck at on a problem what is 3x+4+2x+5=34? How does the New Space pioneers' testing ofsonic retropropulsion technology support the author's claim?oes it add to your understanding of the argument? Which is not true please help me I also have a picture on here ! hogan remembers the general plot of a well-known movie that he has not seen himself. he cannot remember details from the movie, but he knows that it was a romantic comedy and remembers the names of the leading actors. hogan's memory of this movie is a(n) memory. Matt's parents claim that their teenage son is not using drugs, even though they found paraphernalia in his room. This is an example of 1/2+2/3 In a fraction please helpppppp!!!!!!! a researcher designs a new app to help children with adhd improve their social skills. she randomly assigns 100 children with adhd to either use the new app for 3 hours per week for a month (the experimental group) or to a control group that does not use the app and then compares their social skills. the researcher expects that social skills will be better in the experimental group than in the control group.