answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valentina_108
1 month ago
15

You encounter another boat. You assess the situation and determine that you are the stand-on vessel. What must you do?

Computers and Technology
2 answers:
maria [1K]1 month ago
7 0

Answer

Continue on your current heading and maintain your speed unless the vessel required to give way does not act.

Explanation

When two vessels approach each other, the one positioned on the right side is designated as the stand-on vessel, which means the other vessel, the give-way vessel, must yield. In this circumstance, you should keep your course and speed unless the give-way vessel fails to do so. If that happens, you must take evasive maneuvers to avoid collision by steering clear, never turning toward or crossing in front of the other vessel.

ivann1987 [1K]1 month ago
5 0
When encountering another vessel and identifying yourself as the stand-on vessel, you should keep your current course and speed. However, if the other vessel, which must give way, does not take proper action, you are then responsible for maneuvering to avoid collision by moving away; never steer toward or cross ahead of that vessel.
You might be interested in
for question 1-3, consider the following code what is output if the user types in 9? click all that apply A, B, C, D click all t
oksian1 [950]

Response:

weyfbhy

Clarification:

8 0
1 month ago
Define a function PrintFeetInchShort, with int parameters numFeet and numInches, that prints using ' and " shorthand.
Natasha_Volkova [1026]

Answer:

I'm developing a function in C++. If you need it in a different programming language, just let me know.

void PrintFeetInchShort(int numFeet, int numInches){

   cout<<numFeet<<"\' "<<numInches<<"\"";

This function requires two integers, numFeet and numInches, as arguments. It employs cout to output the value of numFeet followed by a single quote, and subsequently the value of numInches, completed with double quotes. The character \ is utilized to introduce double quotes in the output. While using a backslash before a single quote isn't necessary, you could easily write cout<<numFeet<<"' " to display a single quote without it. However, the inclusion of backslash is essential for double quotes.

Explanation:

Here's the entire program to demonstrate how the function operates.

#include <iostream> // used for input and output operations

using namespace std;   // to enable usage of cout and cin without specific qualifying prefix

void PrintFeetInchShort(int numFeet, int numInches){

// function for printing in shorthand using ' and '

   cout<<numFeet<<"\' "<<numInches<<"\""; }

int main() { // beginning of main() body

  PrintFeetInchShort(5, 8);    }

// invokes PrintFeetInchShort() with arguments of 5 for //numFeet and 8 for numInches

To prompt the user for values of numFeet and numInches, do the following:

int main() {

   int feet,inches; // declares two integer type variables

   cout<<"Enter the value for feet:"; // asks user to provide the feet measurement

   cin>>feet; // inputs the feet value from user

   cout<<"Enter the value for inch:"; // asks user to provide the inch measurement

   cin>>inches;     // inputs the inch value from user

  PrintFeetInchShort(feet, inches);   } // invokes PrintFeetInchShort()

The screenshot of the program output has been attached.

5 0
17 days ago
A pedometer treats walking 2,000 steps as walking 1 mile. Write a program whose input is the number of steps, and whose output i
ivann1987 [1066]

Response:

steps = int(input("Specify the number of steps: "))

miles = steps / 2000

print('{:.2f}'.format(miles))

Explanation:

Prompt the user to input the number of steps and convert the input to an integer.

Compute the corresponding miles by dividing the number of steps by 2000.

Output the miles formatted to two decimal places.

5 0
1 month ago
Write a program that prompts the user to enter 50 integers and stores them in an array. The program then determines and outputs
Amiraneli [1052]
Here's a C++ code snippet: #include <bits/stdc++.h> using namespace std; int main() { int n=50; int arr[n]; cout << "Enter 50 integers: "; for (int i = 0; i < n; i++) cin >> arr[i]; cout << endl; sort(arr,arr+n); for (int i = 0; i < n; i++) { cout << "pair which gives sum equal to " << arr[i] << " is:"; for (int j = 0; j < n; j++) for (int k = j + 1; k < n; k++) if (arr[i] == arr[j] + arr[k]) cout << "(" << arr[j] << " & " << arr[k] << ")" << ","; cout << endl; cout << "*******************************" << endl; } return 0; } The program will gather 50 integers from the user, sort them in ascending order, and identify all pairs that total to any of the array's elements, followed by printing those pairs.
5 0
11 days ago
In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and
ivann1987 [1066]

Answer and explanation:

Authentication:

Authentication is achieved by entering a user ID and password, utilizing social sign-ins, or employing biometric methods. It serves to confirm the identity of the user and allow them access.

Here’s how authentication functions:

Prompt the user to provide their credentials.

Transmit these credentials to the authentication server.

Verify the credentials.

Grant access to the user upon successful match.

External Website Security:

It is crucial to safeguard the website from hackers and unauthorized users to avert any security issues.

Implement firewalls.

Establish access controls.

Utilize MVC (Model View Controller) to create different views tailored for various user types.

Employ encryption techniques.

Utilize SSL certificates.

Employ security plugins.

Adopt strategies for backup and disaster recovery.

Engage a network monitoring team.

Internal Website Security:

Use authentication to verify user identities.

Utilize authorization to assign specific privileges and access to different users.

Conceal or encrypt sensitive web pages.

Implement IT policy frameworks.

Educate users about the website.

Remote Access Solution:

Remote access enhances security, cost-effectiveness, management simplicity, and availability.

This can be set up using RAS gateways (either single or multi-tenant):

Remote access options include VPN (Virtual Private Network), BGP (Border Gateway Protocol), and Hyper-V networks.

This access can be configured simply. It includes enabling users, managing their access, securing assets, using remote desktop protocols, and overseeing sessions including RemoteApp and both personal and pooled desktops.

Firewall and Basic Rules Recommendations:

Firewalls are essential for traffic management and securing external websites.

Establish rules to prevent SQL injection and XSS.

Permit only specific traffic types.

Apply access rules for IP security.

Implement defined IT policies.

Users can create custom rules.

Wireless Security:

In today's landscape, Wi-Fi is prevalent in organizations and protects the network from harmful and unauthorized access.

Wireless security can be enhanced through encryption, decryption, and processes for authentication and authorization.

VLAN Configuration:

VLANs are critical for filtering traffic and logically dividing the network.

VLANs can be configured for web interfaces, facilitating web filtering.

The configuration for VLANs in a web interface can be done as follows:

Switching => VLAN => Advanced => VLAN Membership

Switching => VLAN > Advanced => Port PVID Configuration.

For VLAN web filtering:

VLANs can be interconnected between routers, firewalls, or switches to filter web traffic traversing the network.

Laptop Security Configuration:

Security for laptops can be achieved using passwords, VPNs, and MAC address registration. Employing security tools on local machines is also advisable. Device-level authentication via local usernames and passwords is a beneficial approach.

Application Policy Recommendations:

Application policies encompass the use of cookies, social media integration, access control, notification generation, and adherence to other organizational and IT guidelines.

Security and Privacy Policy Recommendations:

This includes a catalogue of security methods necessary for managing traffic filtering, IP spoofing, user authentication, and other specific website policies.

Intrusion Detection or Prevention for Systems with Customer Data:

IPS operates behind firewalls and reviews incoming traffic against security policies, matching signatures and managing any incidents while generating logs and alerts. The goal of IDS is to detect harmful traffic ahead of it penetrating further into the network, providing necessary alerts and notifications to the monitoring team. Opting for anomaly-based detection and prevention systems is recommended.

6 0
1 month ago
Other questions:
  • Which of the following is true of how computers represent numbers?
    9·2 answers
  • Two middle-order batsmen are compared based on their performance in their previous cricket match.
    7·1 answer
  • Suppose that a scheduling algorithm (at the level of short-term CPU scheduling) favors those processes that have used the least
    10·1 answer
  • Create a different version of the program that: Takes a 3-digit number and generates a 6-digit number with the 3-digit number re
    14·1 answer
  • To finish creating a design for the webpage, use one shape to cut away part of the other. Create a 700 pixel by 700 pixel square
    10·1 answer
  • RADIAC instruments that operate on the ionization principle are broken down into three main categories based on what?
    15·1 answer
  • Consider a one-way authentication technique based on asymmetric encryption: A --&gt; B: IDA B --&gt; A: R1 A --&gt; B: E(PRa, R1
    13·1 answer
  • What type of memory can support quad, triple, and dual channels?
    5·1 answer
  • Which of the following is opened when the Find command is clicked?
    12·1 answer
  • Danielle, a help desk technician, receives a call from a client. In a panic, he explains that he was using the Internet to resea
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!