answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Effectus
1 month ago
12

If BAD = 10, DAC = 11 and CGI = 22 what is the value of OCCAM?

Computers and Technology
1 answer:
8_murik_8 [964]1 month ago
5 0
The answer is 40. Given the letter values (A=1, B=2, C=3, D=4, E=5, F=6, etc.):
BAD sums to 10: 2 + 1 + 4 + (3)
DAC sums to 11: 4 + 1 + 3 + (3)
CGI sums to 22: 3 + 7 + 9 + (3)
The added (3) likely corresponds to the number of letters in the word.
Therefore:
OCCAM = 15 + 3 + 3 + 1 + 13 + (5) = 40, with (5) representing the letter count.

You might be interested in
Write a loop that prints each country's population in country_pop. Sample output for the given program.
zubka84 [1067]

Response:

Correct script pertaining to the previous query that showcases the output.

for x, y in country_pop.items(): #this for loop iterates through the list items.

   print(str(x) + " has " + str(y) + " people") #output function to display the values.

Result:

  • This code is written in Python and produces the output required by the previous question.

Clarification:

  • The code in the previous question is intended for Python language to show the output, however, it has inaccuracies.
  • A 'for' loop is necessary, which will allow the items to be displayed one at a time.
  • The list presented is structured as key-value pairs, thus the use of the 'items' function from Python dictionaries is essential to present the list items.
  • Additionally, two variables must be established in the for loop, one representing the key and the other representing the value.
7 0
1 month ago
Cindy visits her favorite website on a lunch break using a hospital computer. After she downloads a file, she notices that the c
Amiraneli [1052]

Explanation:

Keep in mind that Malware is derived from the terms Malicious-Software (Mal...ware). Therefore, Malware can be understood as software that is deliberately created by cybercriminals to infiltrate or damage a computer or network.

a.

Cindy might discover the distinction between these two methods used for executing a malware attack:

  • via downloads from harmful websites: An attacker may create a harmful website where unsuspecting visitors might click to download various files, which will end up installing malware software onto their systems.
  • through phishing emails: These emails may have attachments that, if they are opened or downloaded by an unaware user, will result in malware infecting their system.

b. Here are several basic precautions;

  • Avoid opening attachments from unfamiliar email addresses.
  • install a reputable paid antivirus program.
  • be cautious of websites overloaded with advertisements.
4 0
8 days ago
Although it is not a term Excel uses, how do most people think of Excel?
zubka84 [1067]
Many individuals perceive Excel primarily as a spreadsheet tool.
7 0
2 days ago
Represent decimal number 8620 in (a) BCD, (b) excess-3 code, (c)2421 code, and (d) as a binary number
maria [1035]

The decimal number 8620 can be expressed in the following ways:

a = 1000 0110 0010 0000

b = 1011 1001 0101 0011

c = 1110 1100 0010 0000

d = 10000110101100

I hope these representations answer your question and prove useful.

4 0
1 month ago
Sean is white hat hacker, who is demonstrating a network level session hijack attacks and as part of it, he has injected malicio
amid [951]

Answer:

The type of session hijacking attack that Sean is illustrating is Blind Hijacking, option C.

Explanation:

This is because he is inserting harmful data or commands into the compromised communications within the TCP session, regardless of the source-routing being turned off. He is capable of sending the data or commands, but does not have the ability to view the responses.

3 0
15 days ago
Other questions:
  • A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To ac
    11·2 answers
  • A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to k
    5·1 answer
  • Assign max_sum with the greater of num_a and num_b, PLUS the greater of num_y and num_z. Use just one statement. Hint: Call find
    5·1 answer
  • Q2 - Square Everything (0.25 points) Write a function called square_all that takes an input called collection that you assume to
    7·1 answer
  • Which of the following is NOT true about data?
    8·2 answers
  • Which of the following does not describe local alignment algorithm?
    9·1 answer
  • An application specifies a requirement of 200 GB to host a database and other files. It also specifies that the storage environm
    12·1 answer
  • _______________ is used by a hacker to mask intrusion and obtain administrator permissions to a computer.
    7·1 answer
  • Suppose that we have a set of activities to schedule among a large number of lecture halls, where any activity can take place in
    8·1 answer
  • Write a MATLAB function named lin_spaced_vector with two inputs and one return value. The first input will be a single real numb
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!