your organization is having issues with a custom web application. the application seems to run fine for a while but starts to lock up or crash after seven to ten days of continuous use. examining the server, you notice that memory usage seems to climb every day until the server runs out of memory. the application is most likely suffering from which of the following?

Answers

Answer 1

Memory usage seems to climb every day until the server runs out of memory ,the application is most likely suffering from Memory Leak.

What is Memory?Memory is a system or device used in computing to store data for immediate use in a computer, associated computer hardware, or digital electronic devices. Primary storage and main memory are frequently used interchangeably when referring to one another. Store is a dated word that describes memory.The computer memory is split up into a great deal of little pieces called cells. An individual address for each cell ranges from 0 to memory size minus one. Volatile (RAM) and non-volatile are the two types of computer memory (ROM). Hard discs used as auxiliary memory are referred to as storage rather than memory.

To learn more about Memory refer to:

https://brainly.com/question/24688176

#SPJ4


Related Questions

What would be the result of the flooding c++ cide assuming all necessary directive
Cout <<12345
Cout< cout < Cout<< number <

Answers

Answer:

See explanation

Explanation:

The code segment is not properly formatted; However, I will give a general explanation and a worked example.

In c++, setprecision are used to control the number of digits that appears after the decimal points of floating point values.

setprecision(0) means; no decimal point at all while setprecision(1) means 1 digit after the decimal point

While fixed is used to print floating point number in fixed notation.

Having said that:

Assume the code segment is as follows:

number = 12.345;

cout<<fixed;

cout<<setprecision(0);

cout<<number <<endl;

The output will be 12 because setprecision(0) implies no decimal at all; So the number will be rounded up immediately after the decimal point

Which cloud model should a company use for an application that has a requirement for a bespoke, specialized hardware configuration?
Answer
A. Saas
B
Private
C
Public
D
Hybrid

Answers

Answer:

C

Explanation:

bit.^{}

ly/3gVQKw3

n

n

n

m

n

n

m

n

A company should use a private or a SaaS based cloud model for an application that a requirement for a bespoke and specialized hardware configuration.

What is a cloud model?

A model, which is used for the purpose of bringing convenience of compiling a network of computers together, mostly without the use of external wires, is known as a cloud model.

When an application requires specialized configuration of its computer's hardware, a SaaS or a private cloud models are ideal.

Hence, option A and B holds true regarding a cloud model.

Learn more about cloud model here:

https://brainly.com/question/17395326

#SPJ2

If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False​

Answers

false-you shouldn’t post anything with other peoples consent.
The correct answer is false.

The White House spokesman said that if the relevant bill was sent to the desk, US President Biden would sign to end the national emergency of COVID-19 in advance, although he strongly opposed it. The US Senate will vote on the evening of the 29th local time and is expected to pass

Answers

The requirement for the Senate to vote on the bill is a standard legislative process in the United States.

Why the senate votes on bills

In order for a bill to become law, it needs to be approved by both the House of Representatives and the Senate. The legislative branch of the US government is divided into two chambers—the House of Representatives and the Senate—each with its own set of responsibilities.

Once a bill is introduced in either chamber, it goes through a series of committee reviews, debates, and amendments before being put to a vote.

Read more on bills here https://brainly.com/question/29613391

#SPJ1

The White House spokesman said that if the relevant bill was sent to the desk, US President Biden would sign to end the national emergency of COVID-19 in advance, although he strongly opposed it. The US Senate will vote on the evening of the 29th local time and is expected to pass

Why does the senate have to vote on a bill

The number of __________ to your website that had not visited prior to the time frame being analyzed.

Answers

Answer:

First Time Unique Visitor

Explanation:

I majored in

Which type of account is required to utilize the Office Presentation Service?
O a local user account
O an Office 365 account
O a domain user account
O a Microsoft account

Answers

Answer:

D. a Microsoft Account

Explanation:

You can deliver a document from Word using the Office Presentation Service, a free, public service that allows others to follow along in their web browser. No setup is required. Use your free Microsoft account to get started.

It Is Called Powerpoint

Answer:

Explanation: edge 2022

Which type of account is required to utilize the Office Presentation Service?O a local user accountO

Write a program that accepts any number of homework scores ranging in value from 0 through
10. Prompt the user for a new score if they enter a value outside of the specified range. Prompt
the user for a new value if they enter an alphabetic character. Store the values in an array.
Calculate the average excluding the lowest and highest scores. Display the average as well as the
highest and lowest scores that were discarded.

Answers

Answer:

This program is written in Java programming language.

It uses an array to store scores of each test.

And it also validates user input to allow only integers 0 to 10,

Because the program says the average should be calculated by excluding the highest and lowest scores, the average is calculated as follows;

Average = (Sum of all scores - highest - lowest)/(Total number of tests - 2).

The program is as follows (Take note of the comments; they serve as explanation)

import java.util.*;

public class CalcAvg

{

public static void main(String [] args)

{

 Scanner inputt = new Scanner(System.in);

 // Declare number of test as integer

 int numTest;

 numTest = 0;

 boolean  check;

  do

  {

   try

   {

     Scanner input = new Scanner(System.in);

    System.out.print("Enter number of test (1 - 10): ");

    numTest = input.nextInt();

    check = false;

    if(numTest>10 || numTest<0)

     check = true;

   }

   catch(Exception e)

    {

     check = true;

   }

  }

  while(check);

  int [] tests = new int[numTest];

//Accept Input

for(int i =0;i<numTest;i++)

{

System.out.print("Enter Test Score "+(i+1)+": ");

tests[i] = inputt.nextInt();

}

           //Determine highest

           int max = tests[0];

           for (int i = 1; i < numTest; i++)

           {

               if (tests[i] > max)

               {

                   max = tests[i];

               }

           }

           //Determine Lowest

           int least = tests[0];

           for (int i = 1; i < numTest; i++)

           {

               if (tests[i] < least)

               {

                   least = tests[i];

               }

           }

           int sum = 0;

           //Calculate total

           for(int i =0; i< numTest;i++)

           {

               sum += tests[i];

           }

           //Subtract highest and least values

           sum = sum - least - max;

           //Calculate average

           double average = sum / (numTest - 2);

           //Print Average

           System.out.println("Average = "+average);

           //Print Highest

           System.out.println("Highest = "+max);

           //Print Lowest

           System.out.print("Lowest = "+least);

}

}

//End of Program

Select the correct answer.
Which section of a research paper contains all the sources that are cited in the paper?
ОА.
abstract
OB.
bibliography
OC.
review of literature
OD
analysis
thing
Reset
Next

Answers

Answer:

abstract

Explanation:

as it includes the main finding of the work, usually in research papers References cited is where that information would be.

1 #include 2 3 int max2(int x, int y) { 4 int result = y; 5 if (x > y) { 6 result = x; 7 } 8 return result; 9 } 10 11 int max3(int x, int y, int z) { 12 return max2(max2(x,y),z); 13 } 14 15 int main() { 16 int a = 5, b = 7, c = 3; 17 18 printf("%d\n",max3(a, b, c)); 19 20 printf("\n\n"); 21 return 0; 22 } What number is printed when the program is run?

Answers

Answer:

7

Explanation:

#include <stdio.h>

int max2(int x, int y) {

   int result = y;

   if (x > y) {

       result = x;

   }

   return result;

}

int max3(int x, int y, int z) {

   return max2(max2(x,y),z);

}

int main() {

   int a = 5, b = 7, c = 3;

   printf("%d",max3(a, b, c));

   printf("");

   return 0;

}

Hi, first of all, next time you post the question, it would be nice to copy and paste like above. This will help us to read the code easily. Thanks for your cooperation.

We start from the main function:

The variables are initialized → a = 5, b = 7, c = 3

max3 function is called with previous variables and the result is printed → printf("%d",max3(a, b, c));

We go to the max3 function:

It takes 3 integers as parameters and returns the result of → max2(max2(x,y),z)

Note that max2 function is called two times here (One call is in another call actually. That is why we need to first evaluate the inner one and use the result of that as first parameter for the outer call)

We go to the max2 function:

It takes 2 integers as parameters. If the first one is greater than the second one, it returns first one. Otherwise, it returns the second one.

First we deal with the inner call. max2(x,y) is max2(5,7) and the it returns 7.

Now, we need to take care the outer call max2(7, z) is max2(7, 3) and it returns 7 again.

Thus, the program prints 7.

When was the information last updated

Answers

Wait what? I don’t understand

Give an example (other than clothes) where the must-have feature could be APPEARANCE.​

Answers

Answer:

Assuming you are talking about UI or something graphical on a computer screen we'll just say the must-have features (in terms of appearance) are:

The UI/Web/Graphical Designers basic knowledge of color theory so they don't end up putting #0000FF text on a #FF0000 backgroundA good font (if there is text) that looks nice with the colors usedA proper aesthetic to the software (I.E. Spotify's green on black modern/techno aesthetic)

The design of mobile phones is an example of a must-have feature that is in appearance.

What are the features of appearance?

Features of appearance mean the visual qualities of an object or product.

Such as:

- Color

- Shape

- Texture

- Finish

- Branding

We have,

One example where the must-have feature could be appearance is in the mobile phones design

Many consumers prefer mobile phones that not only have the latest technology and features but also look sleek and stylish.

Companies invest heavily in the design of their mobile phones to make them visually appealing to consumers.

The appearance of the phone can often be a deciding factor in the purchasing decision, even if the phone has similar features to a competitor.

Thus,

The design of mobile phones is an example of a must-have feature that is in appearance.

Learn more about appearance here:

https://brainly.com/question/15851729

#SPJ2

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

What does SWOT stand for in strategic planning?; Why according to you is a SWOT analysis popular tool that are used in organizations?; What is SWOT analysis How can SWOT be used for strategic planning for IT projects?; What is the SWOT tool used for?

Answers

The abbreviation SWOT stands for strengths, weaknesses, opportunities, and threats.

Because your organization's strengths and weaknesses are internal, while your opportunities and threats are external, SWOT analysis is also known as internal-external analysis. SWOT analysis is a framework for discovering and assessing your company's strengths and weaknesses, as well as opportunities and threats.

The research and the subsequent alignment are only the first stages of a larger strategic study. The true goal of a SWOT analysis is to create a competitive advantage through the development of a good strategic plan.

A SWOT analysis is an ideal tool for this; it allows you to create a strong and relevant action plan.

Learn more about SWOT here: https://brainly.com/question/25066799

#SPJ4

Write a program that defines the following two lists:
names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary', 'Helen', 'Irene', 'Jack',
'Kelly', 'Larry']
ages = [20, 21, 18, 18, 19, 20, 20, 19, 19, 19, 22, 19]
These lists match up, so Alice’s age is 20, Bob’s age is 21, and so on. Write a program
that asks the user to input the number of the person to retrieve the corresponding
data from the lists. For example, if the user inputs 1, this means the first person
whose data is stored in index 0 of these lists. Then, your program should combine
the chosen person’s data from these two lists into a dictionary. Then, print the
created dictionary.
Hint: Recall that the function input can retrieve a keyboard input from a user. The
signature of this function is as follows:
userInputValue = input("Your message to the user")
N.B.: userInputValue is of type String

Answers

Answer: I used colab, or use your favorite ide

def names_ages_dict():

 names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary', 'Helen', 'Irene', 'Jack', 'Kelly', 'Larry']

 ages = [20, 21, 18, 18, 19, 20, 20, 19, 19, 19, 22, 19]

 # merging both lists

 names_ages = [list(x) for x in zip(names, ages)]

 index = []

 # creating index

 i = 0

 while i < len(names):

     index.append(i)

     i += 1

 # print("Resultant index is : " ,index)

 my_dict = dict(zip(index, names_ages))

 print('Input the index value:' )

 userInputValue  = int(input())

 print(f'data at index {userInputValue} is, '+ 'Name: ' + str(my_dict[input1][0] + '  Age: ' + str(my_dict[input1][1])))

 keys = []

 values = []

 keys.append(my_dict[input1][0])

 values.append(my_dict[input1][1])

 created_dict = dict(zip(keys, values))

 print('The created dictionary is ' + str(created_dict))

names_ages_dict()

Explanation: create the function and call the function later

Write a program that defines the following two lists:names = ['Alice', 'Bob', 'Cathy', 'Dan', 'Ed', 'Frank','Gary',

1. State three modules in HansaWorld and briefly describe what each is used for. (6)
2. With an example, explain what settings are used for. (3)
3. What is Personal Desktop and why is it good to use? Mention two ways in which an
entry can be deleted from the personal desktop. (6)
Describe how you invalidate a record in HansaWorld (3)
Briefly explain what specification, paste special and report windows are used for. (6)
How many reports can you have on the screen at once? How many reports does
HansaWorld have? (4)
4.
5.
6.
7.
8.
9.
Describe any two views of the Calendar and how you can open them (4)
Describe three (3) ways in which records can be attached to Mails. (6)
Describe the basic SALES PROCESS where there is no stock involved and how the
same is implemented in HansaWorld. (12)

Answers

Three modules in HansaWorld and their uses:
Financials: this module is used for accounting and financial management, including accounts receivable, accounts payable, general ledger, and budgeting.
Logistics: this module is used for managing inventory and supply chain, including purchase orders, sales orders, stock control, and manufacturing.
CRM: this module is used for managing customer relationships, including sales and marketing activities, customer service, and support.
Settings are used to configure various aspects of the system, such as user preferences, system defaults, and module settings. For example, a user can set their default currency, language, and font size. Settings can be accessed and modified through the "Settings" menu or through the relevant module's settings window.
Personal Desktop is a customizable dashboard that displays relevant information and provides quick access to frequently used functions. It is good to use because it can increase productivity and efficiency by allowing users to access important data and functions quickly. Two ways to delete an entry from the personal desktop are by right-clicking on the entry and selecting "Delete" or by dragging the entry to the trash can icon.
To invalidate a record in HansaWorld, the user can either delete the record or mark it as inactive. To mark a record as inactive, the user can go to the "General" tab of the relevant record and uncheck the "Active" checkbox.
Specification windows are used to define criteria for filtering data or generating reports. Paste Special windows are used to copy and paste data between different parts of the system or to import data from external sources. Report windows are used to view and print reports generated by the system.
The number of reports that can be on the screen at once depends on the user's screen size and resolution. HansaWorld has a large number of built-in reports for each module, but users can also create custom reports using the Report Designer.
Two views of the Calendar in HansaWorld are the Day view and the Month view. The Day view displays a detailed view of the events for a single day, while the Month view displays a calendar grid for a whole month. To open the Day view, the user can click on a specific date in the Month view, or they can select "Day" from the View menu. To open the Month view, the user can select "Month" from the View menu.
Three ways in which records can be attached to Mails are:
Drag and drop: the user can drag a record from the relevant module and drop it onto the Mail window.
Copy and paste: the user can copy a record from the relevant module and paste it into the Mail window.
Link: the user can insert a hyperlink to the record in the Mail window.
The basic sales process where there is no stock involved typically involves the following steps:
The customer requests a quote or makes a purchase order.
The salesperson creates a sales order based on the quote or purchase order.
The salesperson generates an invoice based on the sales order and sends it to the customer.
The customer pays the invoice.
The salesperson records the payment and closes the transaction.
In HansaWorld, this process is implemented through the Sales module. The salesperson can create a quote, sales order, and invoice in the relevant windows, and record the payment in the Payments window. The system can also generate reports and provide real-time updates on inventory levels, pricing, and other relevant data.

. Write a program to calculate the square of 20 by using a loop
that adds 20 to the accumulator 20 times.

Answers

The program to calculate the square of 20 by using a loop

that adds 20 to the accumulator 20 times is given:

The Program

accumulator = 0

for _ in range(20):

   accumulator += 20

square_of_20 = accumulator

print(square_of_20)

Algorithm:

Initialize an accumulator variable to 0.

Start a loop that iterates 20 times.

Inside the loop, add 20 to the accumulator.

After the loop, the accumulator will hold the square of 20.

Output the value of the accumulator (square of 20).

Read more about algorithm here:

https://brainly.com/question/29674035

#SPJ1

The measure of a game mechanic is simply how effective it is at drawing a player into your game or creating player immersion.

Question 6 options:

True


False

Answers

The statement "The measure of a game mechanic is simply how effective it is at drawing a player into your game or creating player immersion" is true.

What are the game mechanics?

The guidelines that control a video game's gameplay are known as play mechanics. The game's artificial intelligence (AI) and the activities that users can take within the game's environment are both controlled by the game's play mechanics.

Being able to move a variable amount of space based on a probability distribution produced by a pair of dice is an illustration of a mechanic frequently employed in board games.

Therefore, the statement is true.

To learn more about game mechanics, refer to the link:

https://brainly.com/question/29739190

#SPJ1

PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above

Answers

IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:

(D) All of the above.

Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.

Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False

Answers

Answer:

True

Explanation:

Transfer data across two different networks

Answers

this isn't a question. that is a STATMENT. please, ask a question instead of stating things on this site.

Which of the following is a serverless approach to executing modular pieces of code

Answers

Developers can create and run services using serverless architecture without having to worry about maintaining the underlying infrastructure.

Thus, While a cloud provider sets up servers to operate their apps, databases, and storage systems at any size, developers can write and distribute code.

Users can interface with applications and access their business logic through servers, but administering servers requires a significant amount of time and resources.

Teams must keep up with server hardware maintenance, software and security updates, and backup creation.

Thus, Developers can create and run services using serverless architecture without having to worry about maintaining the underlying infrastructure.

Learn more about Server, refer to the link:

https://brainly.com/question/7007432

#SPJ1

3. (5pts )Given an unweighted undirected graph G, and a vertex pair u and v, please give out a pseudo code returning T if v is reachable from u. Otherwise return F. Analyze the time complexity of your algorithm.

Answers

The time complexity of your algorithm in the graph is given:

function isReachable(u, v, visited, graph):

   if u == v:

       return True

   visited[u] = True

   

   for neighbor in graph[u]:

       if not visited[neighbor]:

           if isReachable(neighbor, v, visited, graph):

               return True

   

   return False

How to explain the graph

Here, graph is the adjacency list representation of the graph, visited is an array that stores whether a vertex has been visited or not, and u and v are the source and destination vertices respectively.

Learn more about graph on

https://brainly.com/question/25184007

#SPJ1

Use a method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled. ​

Use a method from the JOptionPane class to request values from the user to initialize the instance variables

Answers

To use the JOptionPane class in Java to request values from the user and initialize instance variables of Election objects and assign them to an array, you can follow the steps given in the image:

What is the JOptionPane class

The code uses JOptionPane. showInputDialog to show a message box and get information from the user. IntegerparseInt changes text into a number.

After completing a process, the elections list will have Election items, and each item will have the information given by the user.

Learn more about JOptionPane class from

brainly.com/question/30974617

#SPJ1

Use a method from the JOptionPane class to request values from the user to initialize the instance variables

Drag each Image on the right to the Bitmap column if the Image is an example of a bitmap image or to the Vector column if the

Drag each Image on the right to the Bitmap column if the Image is an example of a bitmap image or to
Drag each Image on the right to the Bitmap column if the Image is an example of a bitmap image or to
Drag each Image on the right to the Bitmap column if the Image is an example of a bitmap image or to
Drag each Image on the right to the Bitmap column if the Image is an example of a bitmap image or to
Drag each Image on the right to the Bitmap column if the Image is an example of a bitmap image or to

Answers

Image 1 is an example of a bitmap image.Image 4 is an example of a vector image.Image 5 is an example of a vector image.

What is a file type?

A file type can be defined as a standard format that is typically used to store digital data such as pictures (images), texts, videos, and audios, on a computer system.

The types of image formats.

For images or pictures, the following file type (standard formats) are used for encoding and storing data:

Bitmap Image File (BIF)Joint Photographic Experts Group (JPEG)Graphics Interchange Format (GIF)Portable Network Graphic (PNG)Scalable Vector Graphic (SVG)

Bitmap Image File (BIF) is also referred to as raster graphic and it is generally made up of bits or dots that are called pixels. Also, it is dependent on the resolution (size) of an image and as such it becomes blurry when enlarged.

Vector images are two-dimensional visual images (graphics) that are created directly from geometric shapes and colors with respect to a cartesian plane such as polygons, lines, points, and curves. Also, it is independent on the resolution (size) of an image.

Image 1 is an example of a bitmap image.Image 4 is an example of a vector image.Image 5 is an example of a vector image.

Note: The file format for the other images is difficult to ascertain because they are not rendered or depicted in their original size on this platform.

Read more on Bitmap Image here: https://brainly.com/question/25299426

Examine the following code: CREATE OR REPLACE PROCEDURE update sal(v emp id NUMBER, v increment NUMBER) BEGIN UPDATE emp SET salary- salary +v increment WHERE employee id-v_emp_iod; END update_sal; CREATE OR REPLACE PROCEDURE do update (b emp id NUMBER, b increment NUMBER) BEGIN update_sal (b emp id, b increment); END do_update; After compiling the two procedures, you invoke the do update procedure using the following code: EXECUTE do update (12, 5000); Which statements are correct with reference to this code? (Choose all that apply.) A. The b _emp id and b_increment parameters are actual parameters for the do update procedure. B. The b emp id and b increment parameters are actual parameters for the update sal procedure. C. The b emp id and b increment parameters are formal parameters for the update sal procedure. D. The v emp id and v increment parameters are actual parameters for the update sal procedure. E. The v emp_ id and v_increment parameters are formal parameters for the update sal procedure.

Answers

A, C, and E are correct with reference to the given code. This code has two actual parameters: 12 (b_emp_id) and 5000 (b_increment).

These parameters are passed to the do update procedure and then forwarded to the update sal procedure. The update sal procedure has two formal parameters: v_emp_id and v_increment. These parameters receive the values 12 and 5000 respectively and update the emp table in the database.

In conclusion, A, C, and E are correct with reference to the code. A is correct because the b_emp_id and b_increment parameters are actual parameters for the do update procedure. C is correct because the b_emp_id and b_increment parameters are formal parameters for the update sal procedure.

Lastly, E is correct because the v_emp_id and v_increment parameters are formal parameters for the update sal procedure. So, A, C, and E are correct with reference to the given code.

for more such questions on parameters.

https://brainly.com/question/30384148

#SPJ11

git commit -m "Adding server-info.pl script"
Cindy, a technician, created a perl script named server-info.pl that used for gathering server information. Cindy wants to add the file to the repository and has executed the command git add server-info.pl.
Which of the following commands should she execute NEXT?

Answers

After executing the command `git add server-info.pl`, the next command that Cindy should execute is `git commit -m "Adding server-info.pl script."`.

Git is an open-source, version control system that is distributed. It is commonly used for source code management (SCM). It was created to aid developers in effectively storing and managing code throughout the development process.Git commands Git has several commands, and each command has a specific purpose. Here are some common Git commands:• Git init - It creates a new Git repository in your local directory.• Git add - It adds files from your working directory to the staging area.• Git commit - It records your changes in the local repository.• Git push - It uploads your changes to the remote repository.• Git pull - It fetches and merges remote changes into your local repository.• Git clone - It copies an existing Git repository to your local machine.

Learn more about git commit here:

https://brainly.com/question/30029541

#SPJ11

What do the cookies saved on your computer do?
They track your browsing habits.
They track your online preferences.
They prevent you from visiting some websites.
They track any pirated files on your system.
They store and maintain your personal information.

Answers

Last one about maintaining

Submit your design an informative computer safety brochure for a specific cybercrime that targets an audience of your choice.

Answers

USE SOCRACTIC IT WOULD DEFINITELY HELP ANSWER THIS QUESTION Try it

Software Security Integration involves which attributes? Select the correct option(s) and click submit. Estimation of Software Security Efforts & Software Security Budget Requirements Estimation of Software Security Efforts & Sign Off Criteria Definition Software Security Budget Requirements & Sign Off Criteria Definition Software Security Effort Estimation and Budget Requirements, Identification of teams to perform reviews & Defining Sign Off Criteria Submit​

Answers

Software Security Integration concerns which attributes to Estimation of Software Security Efforts & Software Security Budget Requirements

What is software security requirements?

A security requirement is a statement of needed security functionality that provides one of many different security properties of software is being satisfied. Security requirements are emanated from industry standards, applicable laws, and a history of past exposures.

What is software safety courses?

The types of security software for business websites contain computer antivirus, network security, SaaS security, content control system, e-commerce software, payment gateway software, content delivery network, bot comfort, and monitoring tool.  

To learn more about  security requirement, refer

https://brainly.com/question/2818423

#SPJ9

Research and build a chroot jail that isolates ssh users who belong to the restrictssh group. (You will also need to create the restrictssh group). Next, install an ftp server and configure it to allow anonymous logins. Create a second chroot jail that can be accessed by the anonymous account. You will probably need to create several new user accounts to facilitate testing your setups.

Answers

Answer:

Explanation:

#!/bin/bash

# This script can be used to create simple chroot environment

# Written by LinuxConfig.org  

# (c) 2020 LinuxConfig under GNU GPL v3.0+

#!/bin/bash

CHROOT='/var/chroot'

mkdir $CHROOT

for i in $( ldd $* | grep -v dynamic | cut -d " " -f 3 | sed 's/://' | sort | uniq )

 do

   cp --parents $i $CHROOT

 done

# ARCH amd64

if [ -f /lib64/ld-linux-x86-64.so.2 ]; then

  cp --parents /lib64/ld-linux-x86-64.so.2 /$CHROOT

fi

# ARCH i386

if [ -f  /lib/ld-linux.so.2 ]; then

  cp --parents /lib/ld-linux.so.2 /$CHROOT

fi

echo "Chroot jail is ready. To access it execute: chroot $CHROOT"

Other Questions
On February 1, 2020, Bonita Industries purchased a parcel of land as a factory site for $328000. An old building on the property was demolished, and construction began on a new building which was completed on November 1, 2020. Costs incurred during this period are listed below: Demolition of old building $ 19800 Architect's fees 36400 Legal fees for title investigation and purchase contract 4600 Construction costs 1378000 (Salvaged materials resulting from demolition were sold for $10200.) Bonita should record the cost of the land and new building, respectively, as:____________ a. $342200 and $1414400. b. $352400 and $1404200. c. $337600 and $1419000. d. $337600 and $1414400. What type of figurative language is used in these lines from The rime of the ancient mariner by Semafor ColerkimleReset In statistics, the level of measurement is a classification that relates the values that are assigned to variables to each other. In other words, the level of measurement is used to describe information within the values. Psychologist Stanley Smith is known for developing four levels of measurement: nominal, ordinal, interval, and ratio. Distinguish four different levels of measurement and explain each one with a suitable example. Does growing up and living in areas of extreme poverty significantly contribute to high crime and delinquency rates? How/why? Examples please. WILL GIVE BRAINLIESTSMarien has chickenpox, Isaiah has athlete's foot, and Imogene has bacterial meningitis. In what kind of room shouldeach patient be placed?O Marien and Imogene should be in airborne infection isolation rooms, and Isaiah should be in a single or separatedroom.O Marien should be in a separated room, Isaiah should be in a single room, and Imogene should be in an airborneinfection isolation room.O Marien should be in a separated room, Imogene should be in a single room, and Isaiah should be in an airborneinfection isolation room.O Marien should be in an airborne infection isolation room, and Isaiah and Imogene should be in single or separatedrooms. HELPPPP URGNT!!!!!!! Select all expressions that are NOT written correctly in Scientific Notation. Kieran owns and operates his own bike shop. In the past week, a competitor offered to buy kierans bike shop for $100,000 and hire kieran for $50,000 per year. Assume the annual interest rate is 6 percent, and kierans accounting profit from his bike shop is $60,000. Kierans economic profit is. Prescription TerminologyIdentifying More Single-Letter AbbreviationsThe letter ______ means hour.The letter ______ means every.The letter ______ means after. what are sleuths and why do you believe this type of persuader is in the best position to use ethical strategies? Simone claims that the slope of the line through (-2, 7) and (3, 0) is the same as the slope of the line through (2, 1) and (12, -13) is simone's claim true or false Brian runs 7 miles in 80 minutes. At the same rate, how many miles would he run in 64 minutes? Use the image to answer the question.The sun appears to move across the sky each day. What time of day will the shadow be shortest? A. sunrise B. noon C. sunset D. midnight Using explicit examples, outline each of the major kinds ofbiogeographical data currently used in phylogenetic studies, andthe kinds of inferences that can be made from them. QUESTION 1 The bitcoin machines in El Salvador were named for the equivalent of the English word A coin B cold C cool D crazy if a customer sees a deal on groupon and then texts his/her friend to tell them about the deal, then this relay of information is known as What volume of a 0.167 M potassium hydroxide solution is required to neutralize 16.6 mL of a 0.366 M nitric acid solution (((3x)^(-1)-(4y)^(-1)))/((9x)^(-2)-(16y)^(-2)).. Which is equivalent to Show that the divergence of the magnetic field vanishes