Write a program that calculates the shipping charges for parcel. The program should ask the user to enter two floating point values:
The weight of a parcel in pounds
The shipping rate per pound
The program calculates and displays the total shipping charges based on the parcel’s weight and shipping rate per pound.
Your program should print dollars and cents with two decimal places such as 32.85, and not 32.8467777.
Hint: Until we learn how to format output, we will use this little trick. You can round a floating-point value to the nearest hundredth by adding 0.005, multiplying by 100, converting the result to an integer, and then dividing by 100. This trick is not perfect but works well with most values.
Here is a sample of what a typical run of this program looks like where the user entered the values 4.75 for the weight and 2.55 for the shipping rate per pound:
Shipping Charges Calculator
Enter the weight of your parcel in pounds: 4.75
Enter the shipping price per pound: 2.55
The weight of your parcel is 4.75 pounds
The shipping price per pound is $ 2.55
The shipping charges for your parcel is $ 12.11
NOTE: Please remember that your program will be graded in terms of:
correctness: it performs the calculations correctly and uses proper arithmetic expressions: 75% (graded by Zybooks)
code style: good variable names, comments, proper indentation and spacing: 25% (grade by the TAs)
This program code is Python

Answers

Answer 1

Answer:

Answered below

Explanation:

#Program is written in Python programming language

#Get the weight and price and store them in #variables.

parcel_weight = float(input('Enter weight of parcel in pounds: "))

rate_per_pound = float(input ('Enter shipping price per pound: "))

# Calculate the total price per pound

total_price = parcel_weight * rate_per_pound

#print invoice

print ("Your parcel weighs $parcel_weight pounds')

print ("The rate per pound is $rate_per_pound")

print("Total shipping cost is; ")

print ("%.2f" % total_price)


Related Questions

Which computers were the first PCs with a GUI
MS-DOS
Linux
Windows
Mac

Answers

The earliest GUI-equipped PCs were Linux and Mac-based. These are the right answers to the question that was asked.

Which PCs had a graphical user interface (GUI) first?

The first computer to employ a mouse, the desktop metaphor, and a graphical user interface (GUI), concepts Douglas Engelbart first introduced while at International, was the Xerox Alto, developed at Xerox PARC in 1973. It was the first instance of what is now known as a full-fledged personal computer.

When was the GUI added to Windows?

Windows is based on what is known as a graphical user interface (GUI), which was created by Xerox in 1975 but was never used. The "window, icon, menu, and pointing device" (WIMP) combination will make up the majority of a typical GUI.

To learn more about GUI visit:

brainly.com/question/14758410

#SPJ1

What does this button mean in the computer ????????

What does this button mean in the computer ????????

Answers

Answer:

Context menu

Explanation:

If you want to open a context menu this is the one

Alternative is Shift+F10 in most applications to open a context menu. It's basically the same thing as the menu key

Answer:

Context Menu

Explanation:

this button mean in the computer

Justify the existence of programming languages to precisely communicate instructions?

Answers

Answer:

Machines don't understand human language and so must be communicated to using programming languages

Explanation:

Machines help make our lives easier. A machine as simple as a Zip can help to make keep one from an embarrassing situation.

Computers have evolved from simple calculators to what they are today. In the case of a zip, the user thinks up the instructions and executes it. Because a computer is more autonomous and automated than a simple zip because it is given a set of instructions and left to execute them. Because machines are not humans and do not understand any human language, the man had to invent machine language which in it's most basic form is 0 and 1. 0 for 'Off' or 'No' and 1 for 'On' or 'Yes'.

This basic form of language, just like the human language too, has evolved into several more complex and varied forms of languages. They remain relevant and continue to evolve to enable man to communicate with the machine as easily as possible because

Without the programming languages, we would be unable to efficiently describe our commands to the computer. The existence of many languages stems from the fact that languages are deemed more efficient when one is able to communicate more with fewer words. An advanced program is one that enables the programmer to do more with fewer and fewer lines of code.

Cheers!

essay on computer memory and how is it related to computer?​

Answers

Answer:

grvty f th rthnng fr t nd srch

Explanation:

ts bcs y dnt hv brn

Computer memory is where all systems and files are stored including the OS. memory is a key part of any computer because without it a computer would not be able to store any information including its root file systems and basic functions ie; package manager, boot loader, and file systems. Not an essay but maybe a helpful start, good luck homie

Mr. Hoosier has gathered all these data about his finances.

Salary $159,000

Taxable interest $5,600

Municipal Bond interest $15,000

Total Itemized deductions $9,500

The personal exemption is $4700. The standardized deduction for a single filer is 5000.





Single Filer

If Taxable Income is Then tax is:

0-8000 10% of the amount over 0

8000- 35,000 800 + 15% of the amount over 8000

35000- 55,000 4850 + 20% of the amount over 35000

55000- 150,000 8850 + 30% of the amount over 55000

150000 – 200000 37350 + 35% of the amount over 150000

200000 and over 54850 + 40% of the amount over 200000



Married filing jointly:

If Taxable Income is Then tax is:

0-8000 10% of the amount over 0

8000- 35,000 800 + 18% of the amount over 8000

35000- 55,000 4850 + 22% of the amount over 35000

55000- 150,000 8850 + 35% of the amount over 55000

150000 – 200000 37350 + 37% of the amount over 150000

200000 and over 54850 + 45% of the amount over 200000



Please answer each question and you must show your work in order to get partial credit.



What is his average effective tax rate?

Answers

To calculate Mr. Hoosier's average effective tax rate, we need to determine his total tax liability and divide it by his taxable income.

First, we need to calculate his taxable income. We start with his salary of $159,000 and subtract his total itemized deductions of $9,500 and the personal exemption of $4,700.

Taxable Income = Salary - Total Itemized Deductions - Personal Exemption

= $159,000 - $9,500 - $4,700

= $144,800

Next, we calculate his tax liability using the tax brackets for a single filer:

$0 - $8,000: 10% of the amount over $0

Tax = 10% * $8,000 = $800

$8,000 - $35,000: $800 + 15% of the amount over $8,000

Tax = $800 + 15% * ($35,000 - $8,000) = $800 + 15% * $27,000 = $800 + $4,050 = $4,850

$35,000 - $55,000: $4,850 + 20% of the amount over $35,000

Tax = $4,850 + 20% * ($55,000 - $35,000) = $4,850 + 20% * $20,000 = $4,850 + $4,000 = $8,850

$55,000 - $144,800: $8,850 + 30% of the amount over $55,000

Tax = $8,850 + 30% * ($144,800 - $55,000) = $8,850 + 30% * $89,800 = $8,850 + $26,940 = $35,790

Now, we can calculate the average effective tax rate:

Average Effective Tax Rate = Total Tax Liability / Taxable Income

= $35,790 / $144,800

≈ 0.2469 or 24.69%

Therefore, Mr. Hoosier's average effective tax rate is approximately 24.69%.

QUESTION 1 Choose a term from COLUMN B that matches a description in COLUMN A. Write only the letter (A-L) next to the question number (1.1-1.10) in the ANSWER BOOK. COLUMN A 1.1. Substances that provide nourishment to the body 1.2. How you think and feel about something 1.3. Helps to cope with the challenges of being a student Exercise relating to increasing your heart rate 1.5. Having traits or qualities traditionally associated with 1.4. men 1.6. Seeing, hearing, or sensing something that is not really there 1.7. 1.8. Leaving everything till the last minute Is Chapter 2 in the Constitution of SA 1.9. Group of people who share notes and information 1.10. Ability to exercise for extended period of time COLUMN B A hallucination B nutrients C study group D procrastinate E endurance F Bill of Rights G Cardio-vascular H masculine I attitude J resilience K strength L flexibility ​

Answers

Answer:

1.1 B nutrients 1.2 I attitude 1.3 J resilience 1.4 H masculine 1.5 L flexibility 1.6 A hallucination 1.7 D procrastinate 1.8 F Bill of Rights 1.9 C study group 1.10 E endurance

Explanation:

Create a python program that will input their name and their age. It will show an output "Hi, {name} ! How are you? I know you are {age} old."

I WILL MARK YOU AS BRAINLIEST​

Answers

Answer:

age = 10

name = Cynthia

make an f string so the variables appear in the string. There are other ways to do this but I prefer f strings instead of using string concatenation. It causes problems adding 2 strings together most of the time.

print(f'Hi, {name} ! How are you? I know you are {age} old.')

write the truth table for AND, OR, NAND and NOR, using for inputs A,B,C andD

Answers

The truth table for AND, OR, NAND and NOR using for inputs A,B,C and D is in the explanation part.

What is truth table?

A truth table is a mathematical table used in logic that sets out the functional values of logical expressions on each of their functional arguments, that is, for each combination of values taken by their logical variables.

Truth tables are used in Boolean algebra and other branches of mathematics and science that use Boolean logic to show the possible outcomes of an expression or operation in terms of its truth or falsity.

Thus, the truth tables for AND, OR, NAND, and NOR gates with four inputs (A, B, C, and D) is in the image attached below respectively.

For more details regarding truth table, visit:

https://brainly.com/question/29155453

#SPJ1

write the truth table for AND, OR, NAND and NOR, using for inputs A,B,C andD
write the truth table for AND, OR, NAND and NOR, using for inputs A,B,C andD
write the truth table for AND, OR, NAND and NOR, using for inputs A,B,C andD
write the truth table for AND, OR, NAND and NOR, using for inputs A,B,C andD

The software used to provide visual support such as slide show during lectures

Answers

Answer:

microsoft powerpoint

Explanation:

create java program for these 2 question

create java program for these 2 question
create java program for these 2 question

Answers

1 see what you can do and go from their

azure cloud shell utilizes a sandbox. explain what a sandbox is and how powershell utilizes the sandbox. g

Answers

A sandbox is an isolated computing environment where users can run programs and evaluate code without the risk of permanently affecting the underlying system. Azure Cloud Shell utilizes the sandbox to provide users with a secure environment for running PowerShell commands.

What is PowerShell?
PowerShell is a task-based command-line shell and scripting language developed by Microsoft. It helps system administrators and power-users rapidly automate tasks that manage operating systems (Linux, macOS, and Windows) and processes. PowerShell commands let users create, delete, and manage objects on computers.

To know more about PowerShell
https://brainly.com/question/30410495
#SPJ4

Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT

Answers

Answer: C. Executive information system

Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.

An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.

Given that,

Most useful information about determining what direction to go in the next two years.

Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.

It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.

This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.

EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.

So, the correct option is,

C. Executive information system

To learn more about Executive information systems visit:

https://brainly.com/question/16665679

#SPJ6

An array called numbers contains 35 valid integer numbers. Determine and display how many of these values are greater than the average value of all the values of the elements. Hint: Calculate the average before counting the number of values higher than the average

Answers

python

Answer:

# put the numbers array here

average=sum(numbers)/35 # find average

count=0 #declare count

for i in numbers: #loop through list for each value

if i > average: #if the list number is greater than average

count+=1 #increment the count

print(count) #print count

A local firewall adds protection to a hardware firewall by protecting a device _______. Select all that apply. HELP ASAP

A. When device is not connected to internet
B. Not connected through hardware firewall
C. cellular traffic that a hardware firewall prevents
D. For traffic that get past a hardware firewall

Answers

Answer: D. For traffic that get past a hardware firewall

Explanation:

hardware firewalls protect network boundaries

local firewalls are KEYWORD LOCAL more restrictive to device

thus local firewalls are contained within hardware firewalls

the natural answer is D

Current Tetra Shillings user accounts are management from the company's on-premises Active Directory. Tetra Shillings employees sign-in into the company network using their Active Directory username and password.

Answers

Employees log into the corporate network using their Active Directory login credentials, which are maintained by Tetra Shillings' on-premises Active Directory.

Which collection of Azure Active Directory features allows businesses to secure and manage any external user, including clients and partners?

Customers, partners, and other external users can all be secured and managed by enterprises using a set of tools called external identities. External Identities expands on B2B collaboration by giving you new options to communicate and collaborate with users outside of your company.

What are the three activities that Azure Active Directory Azure AD identity protection can be used for?

Three crucial duties are made possible for businesses by identity protection: Automate the identification and elimination of threats based on identity. Use the portal's data to research dangers.

To know more about network visit:-

https://brainly.com/question/14276789

#SPJ1

Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?

Answers

Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.

Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.

It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.

See full question below

Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?

Select an answer:

A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.

B. He connected to an outside data source.

C. He dragged and dropped the file into Tableau.

He duplicated the data in Tableau.

Learn more from

https://brainly.com/question/22908883

can the charger of my laptop get infected with viruses also when it was connected to it?​

Answers

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

He has asked for projected sales figures broken down
by season.

Create one formula that can be copied down and then across.

He has asked for projected sales figures broken downby season.Create one formula that can be copied down

Answers

Below is an example of a formula that you can use to calculate projected sales figures broken down by season, which can be copied down and across:

What is the formula?

Assuming that the seasons are in cells B1:E1 (Summer, Fall, Winter, Spring) and the projected sales data is in cells A2:A6 (Sporting Goods, Electronics, Housewares, Toys, Clothing), you can use the following formula in cell B2:

swift

=A$2 * IF($B$1="Summer", 0.13, IF($B$1="Fall", 0.25, IF($B$1="Winter", 0.30, IF($B$1="Spring", 0.32, 0))))

This formula multiplies the projected sales amount (cell A2) by the corresponding percentage for each season (0.13 for Summer, 0.25 for Fall, 0.30 for Winter, and 0.32 for Spring), based on the value in cell B1. The dollar signs ($) are used to lock the references for cell A2 and the column B, so that the formula can be copied across and down to calculate projected sales for other seasons and product categories.

You can copy this formula down for the remaining product categories (cells B3:B6) and across for the remaining seasons (cells C2:E6) to calculate the projected sales figures broken down by season for all the product categories.

Read more about seasons  here:

https://brainly.com/question/15734021

#SPJ1



David's of Denison

Summer 13% Fall 25%   Winter 30% Spring 32%

Projected Sales

Sporting Goods       350,000

Electronics       310,500

Housewares    289,400

Toys             390,200

Clothing   400,575

write an sql statement to display the warehouseid and the sum of quantityon-hand grouped by warehouseid. name the sum totalitemsonhand and display the results in descending order of totalitemsonhand. (provide the select script statement and screenshot) g

Answers

The command used in SQL statement is SELECT, SUM(), and DESC to display the warehouseid and the sum of quantityon-hand grouped by warehouseid and display the result in descending order.

What is command in SQL?

Command in SQL is used as instructions to communicate the data in database.

The code is below,

SELECT warehouseid,

SUM(quantityon-hand) AS totalItemsonhand

FROM INVENTORY

GROUP BY warehouseid

ORDER BY totalItemsonhand DESC

First, we select the data that want to be displayed with SELECT command. Then SUM() command will sum all quantityon-hand from inventory in group warehouseid. Displayed result in descending order can be instructed by command DESC.

Since, we want to name it totalitemsonhand, then use AS command to rename the result of SUM() to totalitemsonhand.

Learn more about SQL here:

brainly.com/question/25694408

#SPJ4

explain the evolution of computers​

Answers

Answer:

vintage computers

Computers have changed drastically since the 1930s. AP

From the 1930s to today, the computer has changed dramatically.

The first modern computer was created in the 1930s and was called the Z1, which was followed by large machinery that took up entire rooms.

In the '60s, computers evolved from professional use to personal use, as the first personal computer was introduced to the public.

In the 1980s, Apple introduced its first computer, the Macintosh, and has dominated the computer industry ever since with laptops and tablets.

Visit Insider's homepage for more stories.

Although computers seem like a relatively modern invention, computing dates back to the early 1800s.

Throughout computing history, there has not been a lone inventor or a single first computer. The invention of the computer was incremental, with dozens of scientists and mathematicians building on their predecessors. The modern computer, however, can be traced back to the 1930s.

The 1930s marked the beginning of calculating machines, which were considered the first programmable computers.

computer in the 1930s

A calculating machine in the 1930s. AP

Konrad Zuse created what became known as the first programmable computer, the Z1, in 1936 in his parent's living room in Berlin. He assembled metal plates, pins, and old film, creating a machine that could easily add and subtract. Although his early models were destroyed in World War II, Zuse is credited with creating the first digital computer.

In the 1940s, computers took up entire rooms, like the ENIAC, which was once called a "mathematical robot."

computer room vintage

A computer room. AP

John Mauchly created the ENIAC during World War II to help the Army with ballistics analytics. The machine could calculate thousands of problems each second. The large-scale ENIAC weighed 30 tons and needed a 1,500-square-foot room to house the 40 cabinets, 6,000 switches, and 18,000 vacuum tubes that comprise the machine.

Some call this invention the beginning of the computer age.

In the 1950s, computers were strictly used for scientific and engineering research, like the JOHNNIAC, which was once described as a "helpful assistant" for mathematicians.

A man working at a computer in the '50s. AP

The JOHNNIAC was completed in 1954 and was used by RAND researchers. The massive machine weighed just over two tons with over 5,000 vacuum tubes. This early computer operated for 13 years or 51,349 hours before being dismantled.

In the 1960s, everything changed when the Programma 101 became the first desktop computer sold to the average consumer.

Programma 101. Pierce Fuller/ Wikimedia Commons

Up until 1965, computers were reserved for mathematicians and engineers in a lab setting. The Programma 101 changed everything, by offering the general public a desktop computer that anyone could use. The 65-pound machine was the size of a typewriter and had 37 keys and a printer built-in.

The Italian invention ushered in the idea of the personal computer that would last to this day.

As personal computers became popular in the 1970s, the Xerox Alto helped pave the way for Steve Jobs' Apple.

Xerox Alto. Francisco Antunes/ Flickr

The Xerox Alto was created in the '70s as a personal computer that could print documents and send emails. What was most notable about the computer was its design, which included a mouse, keyboard, and screen. This state-of-the-art design would later influence Apple designs in the following decade.

The Alto computers were also designed to be kid-friendly so that everyone — no matter the age — could operate a personal computer.

In the '80s, Apple's Macintosh was described as a game-changer for the computer industry.

The Macintosh. Raneko/ Flickr

When Steve Jobs introduced the first Macintosh computer in 1984, Consumer Reports called it a "dazzling display of technical wizardry." Like the Xerox Alto, the Macintosh had a keyboard, a mouse, and a small 9-inch screen. The computer — which weighed in at 22 pounds and cost $2,495 — was applauded for its interface of windows and icons.

this is very long chapter cannot be type here so please watch video regarding this or search it in Google. I would have definitely helped you but it is not possible to type and help you , it is so long chapter that it might consume 15 to 25 pages to explain it .

Don't think and take my suggestion negatively. I am really sorry.

which of the following is not the correct definition of an operating system

A.

it controls all other execution in a computer

B.

interface between hardware and application programs

C.

its a platform for ensuring that other executions has taken place

D.

maintains consistency of data loss during execution

Answers

The correct answer is C. An operating system is not a platform for ensuring that other executions have taken place. An operating system is a software program that manages the hardware and software resources of a computer and provides common services for computer programs. It acts as an interface between the hardware and application programs and controls all other execution in a computer. It also maintains consistency of data during execution.

By comparing the time out mechanism used in TCP to that used in a data link layer protocol, outline why it is necessary for the TCP timeout mechanism to implement an adaptive timeout duration

Answers

Answer:

When there are network flows within the wireless link that experience prolonged poor transmission it can impact on the network, leading to the stalling of the source while waiting for the arrival of ACKS, due to the filling of the TCP source congestion window. More time is lost as the source waits for a timeout to be caused by the expiration of the RTO timer which results in lower efficiency and network throughput by the TCP that requires an adaptive timeout duration to be implemented

Explanation:

Describe the big data life cycle

Answers

Answer:

Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.

Explanation:

mark me as brainliest please

Answer:

Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.

Explanation:

Difference between Python vs Pandas?

Answers

Python and Pandas are not directly comparable as they serve different purposes. Here's an explanation of each:

Python:

Python is a general-purpose programming language known for its simplicity and readability. It provides a wide range of functionalities and can be used for various tasks, including web development, data analysis, machine learning, and more. Python has a large standard library and an active community, making it versatile and widely used in different domains.

Pandas:

Pandas, on the other hand, is a powerful open-source library built on top of Python. It is specifically designed for data manipulation and analysis. Pandas provides easy-to-use data structures, such as Series (one-dimensional labeled arrays) and DataFrame (two-dimensional labeled data tables), along with a variety of functions for data cleaning, transformation, filtering, grouping, and aggregation.

In essence, Python is the programming language itself, while Pandas is a Python library that extends its capabilities for data analysis and manipulation. You can use Python to write code for a wide range of purposes, while Pandas is focused on providing efficient and convenient tools for working with structured data.

for similar questions on Python.

https://brainly.com/question/26497128

#SPJ8

bills is replacing a worn-cut cable to his power table saw.what type of cable is he most likely using ?
A.PSC
B.SO
C.CS
D.HPD

Answers

Bill is replacing a worn-cut cable for his power table saw.  is using is A. PSC (Portable Cord).

What is the bills?

Working with frayed cables can be dangerous and may act as a form of a risk of electric shock or other hazards. To make a safe and successful cable replacement, there are some general steps Bill can follow.

A is the most probable  type of cable he is utilizing from the provided choices. A type of cord that can be easily carried or moved around. Flexible and durable, portable cords are frequently utilized for portable power tools and equipment.

Learn more about bills from

https://brainly.com/question/29550065

#SPJ1

What is the awnser the question I accidentally put 6 in but it’s not 6

What is the awnser the question I accidentally put 6 in but its not 6

Answers

Answer:

2

Explanation:

Should one own a smart home device

What are some security issues that one can find bothersome with these types of devices?

Answers

Yes, one can have or should one own a smart home device

Some security issues that one can find bothersome with these types of devices are:

Privacy concernsVulnerabilities to hackingLack of updatesWhat are the  security issues?

Smart home tools offer usefulness and can help create growth easier, but they further create freedom risks that should be deliberate.

Some freedom issues so that find bothersome accompanying smart home tools contain:

Lastly, in terms of Privacy concerns: Smart home ploys may accumulate individual dossier, such as custom patterns and choices, that could be joint accompanying after second-party parties for point or direct at a goal buildup or added purposes.

Learn more about  security issues  from

https://brainly.com/question/29477357

#SPJ1


Which statement is used to assign value to a variable?

Answers

Answer:

the "=" sign is used to assign value to a variable. Example:


int number = 25;

You are basically assigning the value '25' to a variable of type 'integer' called 'number'.

Explanation:

The so-called WAP gap involves the __________ of information where the two different networks meet, the WAP gateways.

Answers

Complete Question:

The so-called WAP gap involves the ______ of information where the two different networks meet, the WAP gateways.

Group of answer choices

A. integrity.

B. confidentiality.

C. authentication.

D. WTLS.  

Answer:

B. confidentiality.

Explanation:

WAP is an acronym for wireless application protocol and it is a standard communications protocol used for accessing, formatting and filtering of data (informations) on wireless devices such as mobile phones over the internet or mobile wireless network.

Simply stated, a wireless application protocol (WAP) is a lightweight and easy to use protocol designed and developed for devices with low computing power e.g mobile devices.

There are two (2) main standard protocols that are being used for the wireless application protocol (WAP), these are;

1. Transport Layer Security (TLS).

2. Wireless Transport Layer Security (WTLS).

The so-called WAP gap involves the confidentiality of information where the two different networks (WTLS and TLS) meet, the WAP gateways.

In wireless communications, the wireless transport layer security was an improvement on the transport layer security. However, it created a major problem of confidentiality in the translation of the two protocols in a WAP architecture.

First, the user data is encrypted with a public key of an application server and then encrypted again from the client mobile device to the WAP gateway using the wireless transport layer security (WTLS) and lastly, the transport layer security (TLS) is used from the WAP gateway to the enterprise server. The TLS translates the WTLS data by decrypting it first and then encrypting it again.

The security concerns or confidentiality issues associated with using WAP is that, all messages are seen in plain text by the WAP gateways in the translation at the TLS point, thus causing the so called WAP gap.

Answer:

FROM THE TOP MAKE IT DROP THATS SOME WAP WAP WAP WAP

Explanation:

Meredith just installed a new smart security system in her home, which allows her to turn off her alarm system from her smartphone as she’s on her way home from work.

Meredith’s home security system is an example of ____.

an SSD


a microprocessor


an operating system


an integrated computer system

Answers

Meredith’s home security system is an example of an integrated computer system. The correct option is D.

What is an integrated computer system?

A desktop computer is referred to as an integrated desktop computer if the computer and monitor are housed in the same housing, operate as a single unit, and are powered by the AC mains through the same cable.

An example of an integrated computer system is Meredith's home security system.

It is a system that integrates hardware and software elements, including cameras, sensors, microprocessors, and an operating system, to provide security features like access control, intruder detection, and video monitoring.

The system's components are made to function together seamlessly, and it gives the user a single point of control, such a smartphone, from which to manage the security features.

Thus, the correct option is D.

For more details regarding integrated computer system, visit:

https://brainly.com/question/30273876

#SPJ1

Other Questions
Learning task no.2: Looking at the pictures on page 21 -23, observe and identify the elements and principles of design applied in the following artworks. Write your observations and answers in your activity notebook. (You can ask help from your parents, siblings, or other members of the family for this activity.) (Written works -8 points)Iraya Basket Tingkop Capiz Shell Hablon Patadyong Sinamay Weave Mat Amino acids can be either polar or= non-polar based on their____. In general, amino acids are non-polar if _________peptide bonds referred to as Fent: Such amino acid _____. R groups amide groups Other amino acids are polar and are generally referred to as_____ 20. Why do clothes take a longer time to dry on a humid day? Which statement best describes the area of Triangle ABC shown below?(5 points)O aObOcOdCABIt is one-half the area of a rectangle with sides 2 units x 3 units.It is twice the area of a rectangle with sides 2 units x 3 units.It is one-half the area of a square of side length 3 units.It is twice the area of a square of side length 3 units. plshelpX Incorrect. If the two legs in the following 45-45-90 triangle have length 21 inches, how long is the hypotenuse? 45 2x Round your answer to two decimal places. 1 The hypotenuse is approximately Suppose you are a basketball coach that has two players you are considering. Player A averages 14 pts per game with a 4 pt standard deviation. Player B averages 20 pts per game with a 7 p standard deviation. You have a strong rule that you will not start anyone that you are not at least 95% certain will provide at least 5 points. Which of the following statements are true? a. You should start Player A only b. You should start Player B only C. You should start both Player A and B. d. You should start neither Player A nor B. What is the remainder when 2x^39x^2+11 is divided by x6? 9. The number of boys in a school is 120 more than the numbers of girls. If there are 980 students in the school, find the number of boys and girls in the school. It costs $850 per month to rent an apartment. The monthly cost increases by 3% each year. Find the monthly cost in 10 years.The monthly cost in 10 years are $ I WILL GIVE BRAINLIEST FOR ANSWER WITH EXPLANATION!!!! (trolls get banned) Eric Inc.'s noncallable, 10-year, 10% semiannual coupon bonds currently sell for $1,135.90. They have a par value of $1,000. What is their yield to maturity? (Multiple Choice) a. 4.00% b. 3.38% c. 8.56% d. 8.00% e. 7.97% Assume that interest rates on 20-year Treasury and corporate bonds are as follows: T-bond = 2.89%, Corporate Bond = 4.73%. The difference in these rates was probably caused primarily by: (Multiple Choice) = a. Default and liquidity risk differences. b. Inflation differences. Tax effects. c. Maturity risk differences. d. Real risk-free rate differences. Using the diagram , what is the intersection of plan ABCD and GC? can you please help me HELP PLEEES ASAP i am so lost show your work What is the mean of 9, 8, -15 and -12?The Mean is: If all the following DNA fragments were analyzed on an electrophoresis gel, which one would migrate farthest from the negative electrode? a( n ) ________ organism is one that requires oxygen for growth.? The bacterial chromosome is? a.usually circular. b.found in a nucleoid. c.found in a nucleus. d. both circular and found in a nucleoid. e. both circular and found in a nucleus. Which statement about the graphs of ()=3+2 and ()=34 is correct? CLEAR CHECK The graphs are parallel. The -intercept of () is half the -intercept of () . The graphs both have the same slope. The -intercept of () is twice the -intercept of () . Factor completely 12x5 6x3 8x2. Prime 2(6x5 3x3 4x2) 2x(6x4 6x2 4x) 2x2(6x3 3x 4). I need help ASAP3k+30=95+k+2k-5 Window Washing Services prepares adjustments monthly and shows the following selected accounts on its December 31, 2020, unadjusted trial balance: Account Debit Credit Prepaid insurance $3,630 Prepaid office rent Prepaid subscriptions 21,500 1,270 Prepaid equipment rental 25,480 Required: Prepare the required monthly adjusting entries at December 31, 2020, based on the following additional information: a. The remaining balance in Prepaid Insurance was for a six-month insurance policy purchased for $7,260 and in effect on September 1, 2020. b. $4.900 of the balance in Prepaid Office Rent had not been used as at December 31, 2020. c. $1,110 of the balance in Prepaid Subscriptions had been used as at December 31, 2020. d. The company paid $32.760 on April 1, 2020, to rent equipment for a three-year period beginning April 1, 2020.