What would you say to her?
Q: uestion 9 Which command is used to change the definition of a table in SQL? SELECT UPDATE Ob. CREATE...
A: Complete answer is given below .
Q: Write a program in c++ to create a base class: “Question3”, with protected data member: x (int) and ...
A: PROGRAM CODE: #include <iostream>using namespace std; //Create the base class, Question3clas...
Q: WAP in c++ that reads the file FIRST.TXT and creates a new file named SECOND.TXT, to contain only th...
A: #include <iostream> #include <stdio.h> using namespace std; int main() { FILE *input; ...
Q: Write a SQL to compute and display for each Product the Total Orders by Value, Number of Orders and ...
A: It is defined as a database computer language designed for the retrieval and management of data in a...
Q: Write an assembly code that perform the following:; vall = (al * bl + val2 ) /2Consider the followin...
A: ANS 1val1 db ? val2 db 23 mov al,17 sub al,bl sub al,23 OR
Q: a. Compute CBC-MAC for a message of 16 bits, “8642” (in Hexa). Assume a block size of 8 bits with an...
A: Compute CBC-MAC for a message of 16 bits, “8642” (in Hexa). Assume a block size of 8 bits with an IV...
Q: A lady behaves like a teacher in a classroom, mother or daughter in a home and customer in a market....
A: In this case, the concept used is Polymorphism. Polymorphism means the ability to take more than on...
Q: 3. Write a program to create a base class: “Question3”, with protected data member: x (int) and with...
A: #include <iostream>using namespace std; class Question3{ protected: int x; public:virtual v...
Q: package Q2;import java.io.FileInputStream;import java.io.FileNotFoundException;import java.util.Arra...
A: Code: package Q2; import java.io.FileInputStream; import java.io.FileNotFoundException; import java...
Q: Computer Science Lab APEX - Salesforce Write an Apex Class to Multiply two numbes and show in the C...
A: I have provided the answer in step2
Q: (DONT USE STRUCTURE... USE CLASSES) Write a C++ program which takes multiple Employees information (...
A: the solution is an given below :
Q: PROGRAMMING LANGUAGE: C++ How do we differentiate between prefix and postfix increment operator wh...
A: The Prefix increment operator (++) adds one to its operand; this escalated value is the result of th...
Q: glass breaking sensor is an example of --- which are used to sense unauthorized activities. a ...
A: Detective Control Detective control is an accounting term that refers to a type of internal control ...
Q: "Semaphore' may be used also to control the flow of execution. Consi tuation: P and P2 are two concu...
A: Here we need to use two semaphore X and Y. Let the initial value of X be 0 and initial value of Y b...
Q: All the following instructions represent DDL functions EXCEPT _________. a. Alter Table b....
A: Explanation: Example of DDL Commands: CREATE DROP ALTER TRUNCATE COMMENT RENAME SO b. Insert data ...
Q: Consider the following schema and answer the following questions: Project(projld: integer, proj_name...
A: please upvote for my efforts thanks! answer a)
Q: Discrete math
A: "All ECE kids take at least two classes"Domain Of Disclose:ECE(x) =True if X is a ECE StudentTakes(x...
Q: develop a java program for universal Hashing , add approriate comments and explanations in your pro...
A: Complete answer is given below .
Q: Write a C ++ program which take number of consumed unit as input and calculator the electricity bill...
A: Sample Response: //C++ program to calculate the electricity bill#include<iostream>using namesp...
Q: Assuming that two processes are now executing; postponing execution before one of the processes comp...
A: The operating system is what binds the machine's hardware and the programmes that run on it. The pri...
Q: plz help with the follwong: in sql Oracle issued the following error: user user_123 lacks CREATE SES...
A: plz help with the follwong: in sql Oracle issued the following error: user user_123 lacks CREATE SES...
Q: Discuss any five data dictionary views which provides key information to the Database Administrator.
A: Database Administrator:- Database administrators use specialized software to store and organize data...
Q: Review Concepts for VB.net: 1. How can you set the size of a structure array based on the size of an...
A: 1. How can you set the size of a structure array based on the size of an existing string array? 2. C...
Q: quickly please
A: As per our guidelines we are supposed to answer only one question. Kindly repost the remaining quest...
Q: Consider the following schema and answer the following questions: Project(projld: integer, proj_name...
A: Relational Algebra: In database management systems, relational algebra is a structured query languag...
Q: Python Programming
A: I have simplest python code in step2.
Q: . Write a class definition that creates a class called leverage with one private data member, crowba...
A: EXPLANATION Create class leverage, which will have only one data field crowbar. Use a constructor t...
Q: Write a PL/SQL block of code that performs the following tasks: Read a Book id provided by user a...
A: I have used PL/SQL Cursors to solve the given problem SET SERVEROUTPUT ON; DECLARE v_author Book...
Q: Exercise 9 (H.W): a. Show that p n q = qa p and pv q = q v P b. Show that (p v 9) v r = pv (q v r) a...
A: We have to show that both left hand side and right hand side are equivalent. We can show that with t...
Q: Question # 4 (Points 6)a) You have been appointed a project manager within an information systems or...
A: Stated Facts: Need to Build a application for information system organization in which other applica...
Q: Cisc and risc difference...in computer archietecture
A: EXPLANATION: The microprocessor is basically termed as the processing unit that is installed on the...
Q: Which of the following statements is FALSE? (Assume that 1 KB = 2^13 bits.)
A: The option 1,2,4,5 is True because it follows the following reasons :- A pixel (short for pictur...
Q: For Marketing & order tracking purposes, which software & techniques will you choose? And Wh...
A: For Marketing & order tracking purposes, which software & techniques will you choose? And ...
Q: Explain Software Testing Life Cycle (STLC)
A: Software Testing Life Cycle (STLC) is the testing process that is executed in a well-planned manner....
Q: package Q2;import java.io.FileInputStream;import java.io.FileNotFoundException;import java.util.Arra...
A: package Q2;import java.io.FileInputStream;import java.io.FileNotFoundException;import java.util.Arra...
Q: Qu.3: Identify any ten-risk associated with managing IT projects. Define project risk management and...
A: Qu.3: Identify any ten-risk associated with managing IT projects. Define project risk management and...
Q: amyo Manufacturing produces four parts that require the use of a lathe and a drillpress. The two mac...
A:
Q: Computer Science Lab APEX - Salesforce Write an Apex Class to Multiply two numbes and show in the C...
A: GIVEN An Apex Class to Multiply two numbers and show in the Console and please add proper comments a...
Q: What are five tools that can be used by security administrators, network administrators, and attacke...
A: Answer : Number of tools which can be used by security administrators, network a...
Q: Based on the following ER Model, write SQL statements to create the tables. USING SQL NOT MYSQL Inc...
A: A relational database contains tables also known as relations. A relation contains tuples and attrib...
Q: Which of the printf statements below gives the output shown below? Output: Programming is fun select...
A: I have given an answer in step 2.
Q: 4.03-2. Network Address Translation (b). Consider the following scenario in which host 10.0.0.1 is c...
A: HERE ARE THE ANSWERS... 1)D 2)E 3)B 4)C 5)B 6)C 7)D 8)D
Q: PROGRAMMING LANGUAGE: C++ Write a complete C++ program with the following features.a. Declare a cl...
A: Given: Write a complete C++ program with the following features.a. Declare a class Time with two fie...
Q: What is the output of the following C code? int x=9, y=5, w=8; x=y=w=24; if(x==9) printf("24"); else...
A: We are going to find out the output of the given C code.. I have provided step wise execution of the...
Q: Instruction format in computer archietecture
A: Given: Instruction format in computer architecture
Q: in sql In a sequence, the CURRVAL must be used at least once in order to get the NEXTVAL Select o...
A: In order to get the NEXTVAL, the sequence should be considered with the CURRVAL which acts as base f...
Q: A) Write the SQL code that will create the table structure for table: PRODUCT.Note:P_CODE is the Pri...
A: 63 answers Problem 1 CREATE TABLE EMPLOYEE ( EMP_NUM VARCHAR(3) PRIMARY KEY, EMP_LNAME VARCHAR(15) N...
Q: Moving to another question will save this response. Question 5 is a data model that has less semanti...
A: The answer is given below: When people use the term “NoSQL database”, they typically use it to refer...
Q: Question 3 If the different versions of the same data appear in many places, then this may cause Dat...
A: Answer: Data Inconsistency
Q: Programming language is C : (please write with more comments ..thank you) Write a program to find t...
A: Input the array elements. Initialize small = large = arr[0] Repeat from i = 2 to n if(arr[i] > la...
The vice president of accounting says to you the IT director "This request procedure takes too long. My people know what they are doing, and their systems requests are necessary and important." She suggests that the IT department bypass the initial steps and immediately get to work on her requests. What would you say to her?
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
- John just finished his inspection coordinator course. After obtaining his first appointment, he plans to add his personal secretary to the inspection team for the purpose of serving as a session scribe and producing the required reports. He assumes that her participation will free him of the coordination tasks and enable him to conduct the session successfully. Is it advisable to employ a secretary (a non-information technology professional) as a scribe in an inspection session? List the pros and cons of adding such a nonprofessional to the inspection session.Chain Link Consulting is an information technology consulting company that focuses on system security concerns. When the company's president asks you to assist her with the preparation of a presentation for a group of potential clients at a trade show meeting next month, you say "yes." First and foremost, she would like you to examine system security concerns in light of all six security levels. Afterwards, she wants you to come up with a list of methods that Chain Link might evaluate a client's security procedures in order to obtain an accurate evaluation of their level of exposure.It was her way of making the situation more intriguing by saying that it was fine to be imaginative in your ideas, but that you should avoid proposing anything that would be unlawful or immoral. Example: It might be OK to pretend as a job candidate with phony references to see whether they were being reviewed, but it would be inappropriate to steal a lock and access the computer room to check on things.Your…Mr. Art Pang is in charge of Receivables. His subordinates must provide information to help us collect system needs for a new billing system. Although Mr. Pang has indicated his desire to assist us in our fact-finding efforts, he has voiced worry about the fact that his employees are very busy and must get their tasks done.What is the best way to get the most out of your fact-finding efforts while requiring the least amount of time from his subordinates?The requirements should be documented after they have been collected. For the new billing system, what methods would we employ? Your reasoning should be explained.
- David Martin just finished his inspection coordinator course. After obtaining his first appointment, he plans to add his personal secretary to the inspection team for the purpose of serving as session scribe and producing the required reports. He assumes that her participation will free him for the coordination tasks and enable him to conduct the session successfully. 1. Is it advisable to employ a secretary (a non-information technology professional) as a scribe in an inspection session? List your arguments pro and con.Answer Q1(a) and Q1(b) based on Figure Q1. Your team received a system request by the Principal of Tuition Center located at Malacca. The management ask to improve their current management system. In the first week, your team comes to the place to see the staffs' routine works using the current system. They sit at the receptionist counter, monitor the staffs and students there. In the meantime, they also make copies all the forms they use like subjects' registration form, fees payment form and exam marking form. They notice a list of pass years exam results was display in glasses notice bord. On the following weeks, they organize a meeting to collect all requirements. FIGURE Q1 (a) Based on the Figure Q1, analyze THREE (3) types of requirements gathering. (b) Interview is the best technique to elicitation the requirements for this case. State FOUR (4) suitable users to be selected as the interviewees.Then, suppose you get a position as an IT architect at a new organization. The company's CEO instructed your team to develop a contingency plan in the case of a calamity. They have adequate resources to complete the task, but they do not want to exceed their budget, thus they are unwilling to do so. What would your department say about the CEO's safety net?
- Mr. Art Pang is the Accounts Receivables manager. We have been assigned to gather the system requirements for a new billing system, and we need to solicit facts from his subordinates. Mr. Pang has expressed his concern that, although he wishes to support us in your fact-finding efforts, his people are extremely busy and must get their jobs done. 1. Describe a fact-finding strategy with rationale, that we could follow to maximize your fact-finding while minimizing the time required from his subordinates. 2. Once we have gathered the requirements, they must be recorded. What techniques would we use to capture the requirements for the new billing system? Explain your rationale.Imagine that you have been given the responsibility of serving as the JAD session's facilitator. If you were in charge of a JAD session, you should compile a list of 10 rules and regulations that you would want all of the participants to follow.Your manager shocks you when she announces that she has recommended you for promotion and that one of your new responsibilities would be to serve as the new finance liaison with the IS organization. She asks, “What do you feel needs to be done to help prepare you for this new responsibility?”
- How can leadership be updated on the status of the monitoring of security? How can crucial areas be identified so that staff may inspect controls? Who should keep an eye on the events? Provide responses to the questions using both the text and your own experiences.The IT director of Global Hills started the meeting today by saying "I've got some good news and some bad news. The good news is that the higher management has approved the Customer Care Contact (C3) information system project. The new system will reduce clerical time and errors, more over it will improve morale of the department, and avoid possible fines and penalties for noncompliance. The bad news is that the system must be implemented by the end of November as per the demand of federal government, costs must be within the budget, the new system must interact with marketing system, and the president of marketing department insists on approving the final design." 1. Identify the constraints and indicate whether each is present, future, internal, external mandatory, or desirable. (Note: Draw grid that shows the constraints). 2. Identify tangible and intangible benefits of the new C3 system. 3 What topics should be included in a report to management at the end of the preliminary…Assume you are an information security professional for a corporation. You have been asked to review responses and recovery from real security incidents. In addition, senior management wants a summary of the types of tests you have run on the organization's computer incident response team (CIRT) plan, the results, and lessons learned.Why would senior management want to know how a CIRT plan has been tested and the results?