Description
Please answer this question (see pdf) and provide an explanation on how you found your answer.
Unformatted Attachment Preview
CS177 Spring 2015
Final exam - Page 26 of 29
Fri 05/08 7:00p - 9:00p
39. Consider the following Python program:
from g r a p h i c s import ⇤
def main ( ) :
win = GraphWin ( ’My Window ’ , 3 0 0 , 3 0 0 )
win . s e t C o o r d s ( 0 , 0 , 300 , 3 0 0 )
r e c t = R e c t a n g l e ( Point ( 1 0 0 , 1 0 0 ) , Point ( 2 0 0 , 2 0 0 ) )
x1 = r e c t . getP1 ( ) . getX ( )
y1 = r e c t . getP1 ( ) . getY ( )
x2 = r e c t . getP2 ( ) . getX ( )
y2 = r e c t . getP2 ( ) . getY ( )
line1 = ?
line2 = ?
r e c t . draw ( win )
l i n e 1 . draw ( win )
l i n e 2 . draw ( win )
win . getMouse ( )
main ( )
What should be at line1 and line2 in order to get the following output?
Purchase answer to see full attachment
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Explanation & Answer
Review
Review
Anonymous
I use Studypool every time I need help studying, and it never disappoints.
Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
24/7 Homework Help
Stuck on a homework question? Our verified tutors can answer all questions, from basic math to advanced rocket science!
Most Popular Content
UMUC Forecast Net Present Value of Cash Inflows & Outflows of Project Excel Task
Forecast the Net Present Value of a project given the cash inflows and cash outflows of the project. Then use this informa ...
UMUC Forecast Net Present Value of Cash Inflows & Outflows of Project Excel Task
Forecast the Net Present Value of a project given the cash inflows and cash outflows of the project. Then use this information to simulate the uncertainty of forecasting a project’s NPV.Please see the attached file for detailed information.After you review the assignment, make sure to:1. Run simulation for given scenario2. Run simulation for alternate scenario3. Show simulation data and assumption/forecast cells for both scenarios4. Show your analysis/interpretation of simulation results
database security
Review Questions 1. Identify the purpose of an internal audit and an external audit. 2. Identify those persons who might ...
database security
Review Questions 1. Identify the purpose of an internal audit and an external audit. 2. Identify those persons who might be included within an auditing team for both formal and informal audits. 3. Explain the goal of an auditor. Provide an example to support your response. 4. List the documents that would likely be reviewed in the planning and preparation phase of a formal external audit. 5. What is the difference between a scope and a perimeter? 6. List the typical sections of information included within an audit report. 7. Identify documents that would likely be reviewed in the planning and preparation phase of a database-specific informal audit. 8. List database-supporting components that would require an audit to ensure reliability of the database. 9. Identify and explain the different areas of concentration for database security audits. 10. Explain the purpose of audit_trail found within Oracle. 11. Describe the difference between a database-level audit and an application-level audit.below is the file to aswer these questions
CMGT 433 University of Phoenix Cybersecurity Action Plan Paper
An action plan is often developed to assist project leaders to effectively demonstrate what items need to be add ...
CMGT 433 University of Phoenix Cybersecurity Action Plan Paper
An action plan is often developed to assist project leaders to effectively demonstrate what items need to be addressed when charged to create or improve a business process, program, practice, etc. A plan should break down individual requirements and issues into steps that can be tracked, indicate team member(s) responsibility, and completion (including prerequisites) dates. A plan usually includes goals, steps, assignments, and deadlines.The executive staff at Dayton Soft Products did not agree with your first recommendations provided in your executive summary. They asked that you go with your number 2 and number 4 recommendations, which they thought would be best for their organization. This presents a challenge to you, but you must go ahead with what your client wants.Create an action plan with a total of at least 10 tasks. Each task must address the following three issues:
Risk assessment (overall strategy)
Contingency planning
What is your plan if there is a problem? Who sets the priorities following an incident? Who is going to do what? What are the priorities? How do you keep the plan going?
Vulnerability management
What is the strategy for ongoing risk identification?
Once you've identified the risk, how do you mitigate the risk? What are the steps?
You may complete this action table either as a 4- to-5-page Microsoft® Word document or as a detailed Microsoft® Excel spreadsheet. The following are examples of column heading titles for a table-formatted action plan:
Column 1: Action Item
Column 2: Description/Details
Column 3: Person Responsible
Column 4: Status
Column 5: Due Date
Column 6: Prerequisites
Column 7: Date Completed
Column 8: Comments/Notes
University of Phoenix Computer Science SQL Injection Discussion
Imagine you have been asked to work at your organization’s booth at a high school career fair. You and other members of ...
University of Phoenix Computer Science SQL Injection Discussion
Imagine you have been asked to work at your organization’s booth at a high school career fair. You and other members of the IT security team must be ready to discuss important topics in IT security with the students on the topic you have been assigned. Your assigned topic is SQL injection attacks.
Write a 1- to 2-page outline of your talking points for the career fair in which you:
Define SQL injection.
Identify common SQL injection attacks and explain what each attack does.
Identify SQL injection detection techniques.
Identify countermeasures to SQL injection.
Describe the effectiveness of the SQL injection countermeasures you identified.
GMU Common Vulnerabilities and Exposures Discussion Board
MITRE (https://cve.mitre.org/cve/ (Links to an external site.)) continuously updates the common vulnerabilities and exposu ...
GMU Common Vulnerabilities and Exposures Discussion Board
MITRE (https://cve.mitre.org/cve/ (Links to an external site.)) continuously updates the common vulnerabilities and exposures (CVE) database with vulnerabilities to hardware and software. This database contains information about vulnerabilities including a description, references, and a link to the NIST National Vulnerability Database (NVD). The NVD is maintained by National Institute for Standard and Technology (NIST). In this discussion you will search the NVD for a CVE of your choice and post about it. Browse to the NVD at https://nvd.nist.gov/vuln/search (Links to an external site.) and search for the title of a program installed on your system or of interest to you; i.e. Abode Reader. If you search does not return a result, search again. Pick a vulnerably and describe it to the class. Include things like a quick overview and how it ranks out of 10. Talk about the risk it poses to you or your system. Include the link in your reference section using APA style.In your peer responses (2 minimum) suggest possible mitigation paths or additional threats you could see from the software.
ISM 521 CSUGlobal Proposed Approach to Implementing an ERP System Paper
You are the CIO of a manufacturing firm. The CEO and CFO continue to express concern over the lack of integration among bu ...
ISM 521 CSUGlobal Proposed Approach to Implementing an ERP System Paper
You are the CIO of a manufacturing firm. The CEO and CFO continue to express concern over the lack of integration among business processes within their functional business areas. The CEO and CFO believe the solution for this is an ERP system coupled with Supply Chain Management and Customer Relationship functionality.Both executives have heard negative reports from executives in other companies and from the press of failed ERP implementations. To avoid duplicating the same situation in their organization, the CEO and CFO request that you submit a Proposed Approach to Implementing an ERP System report. Ultimately, they want to determine if their company is ready for ERP.Your final deliverable should include the following content:A proposed approach to conducting a needs assessment/requirements gathering initiative.A proposed approach to evaluating ERP vendors and their software products’ fitness to meet your requirements. The requirements, at this stage, reflect the functional business processes that your firm needs to implement.A proposed approach to implementing the ERP system into a full production enterprise system.Proposed measurements to determine if the ERP implementation was successful.Your paper should be 15-20 pages in length and conform APA format. Include at least three scholarly references, in addition to the course textbook. The CSU-Global Library is a good place to find these references.
Similar Content
Abia Polytechnic University Python Code Algorithms Paper
1 Loops, & Sums
Let u = {₁, U2, Un} and 7 = V₁, V2, ..., Um be vectors of length in and m.
The outer product of u with...
InfoTech in a Global Economy Discussion
Respond to these 3 discussion posts by my peers students on Infotech in a global economy
1) Many systems and issues are sa...
UC A Visualization That Works Essay
Visualizations That Really WorkThis week we will discuss what is required to really make visualizations work. Berinato (20...
Need help with computer science about the differences between operational and decision support data
Post 2-3 detailed paragraphs on the following topic:Research and provide three to four paragraphs covering the follow...
Campbellsville University Balance Scorecards Discussion
Chapter 6 – Review the section on knowledge creation, culture, and strategy. Explain how balance scorecards impact know...
Florida International University The Internet is for Everyone Discussion
Read the nine challenges that Vint Cerf, the "father of the Internet" wrote about and sent to the Internet Engineering Tas...
Assignment 9
1. SQL is essential because it teaches the basics of databases. It shows how data can be stored in an orderly manner with...
Python Script That Conducts Internal Reconnaissance Of A Windows Machine
Python script that conducts internal reconnaissance of a Windows machine Python script that conducts internal reconnaissa...
Creswell
Chapter two of Creswell is all about literature review, which constitutes a detailed analysis of the proposal to gauge wha...
Related Tags
Book Guides
Team of Vipers
by Cliff Sims
Cat on a Hot Tin Roof
by Tennessee Williams
The Catcher in the Rye
by J. D. Salinger
The Scarlet Letter
by Nathaniel Hawthorne
The 7 Habits of Highly Effective People
by Stephen R. Covey
Extreme Ownership - How US Navy SEALs Lead and Win
by Jocko Willink and Leif Babin
The Picture of Dorian Gray
by Oscar Wilde
Of Mice and Men
by John Steinbeck
Get 24/7
Homework help
Our tutors provide high quality explanations & answers.
Post question
Most Popular Content
UMUC Forecast Net Present Value of Cash Inflows & Outflows of Project Excel Task
Forecast the Net Present Value of a project given the cash inflows and cash outflows of the project. Then use this informa ...
UMUC Forecast Net Present Value of Cash Inflows & Outflows of Project Excel Task
Forecast the Net Present Value of a project given the cash inflows and cash outflows of the project. Then use this information to simulate the uncertainty of forecasting a project’s NPV.Please see the attached file for detailed information.After you review the assignment, make sure to:1. Run simulation for given scenario2. Run simulation for alternate scenario3. Show simulation data and assumption/forecast cells for both scenarios4. Show your analysis/interpretation of simulation results
database security
Review Questions 1. Identify the purpose of an internal audit and an external audit. 2. Identify those persons who might ...
database security
Review Questions 1. Identify the purpose of an internal audit and an external audit. 2. Identify those persons who might be included within an auditing team for both formal and informal audits. 3. Explain the goal of an auditor. Provide an example to support your response. 4. List the documents that would likely be reviewed in the planning and preparation phase of a formal external audit. 5. What is the difference between a scope and a perimeter? 6. List the typical sections of information included within an audit report. 7. Identify documents that would likely be reviewed in the planning and preparation phase of a database-specific informal audit. 8. List database-supporting components that would require an audit to ensure reliability of the database. 9. Identify and explain the different areas of concentration for database security audits. 10. Explain the purpose of audit_trail found within Oracle. 11. Describe the difference between a database-level audit and an application-level audit.below is the file to aswer these questions
CMGT 433 University of Phoenix Cybersecurity Action Plan Paper
An action plan is often developed to assist project leaders to effectively demonstrate what items need to be add ...
CMGT 433 University of Phoenix Cybersecurity Action Plan Paper
An action plan is often developed to assist project leaders to effectively demonstrate what items need to be addressed when charged to create or improve a business process, program, practice, etc. A plan should break down individual requirements and issues into steps that can be tracked, indicate team member(s) responsibility, and completion (including prerequisites) dates. A plan usually includes goals, steps, assignments, and deadlines.The executive staff at Dayton Soft Products did not agree with your first recommendations provided in your executive summary. They asked that you go with your number 2 and number 4 recommendations, which they thought would be best for their organization. This presents a challenge to you, but you must go ahead with what your client wants.Create an action plan with a total of at least 10 tasks. Each task must address the following three issues:
Risk assessment (overall strategy)
Contingency planning
What is your plan if there is a problem? Who sets the priorities following an incident? Who is going to do what? What are the priorities? How do you keep the plan going?
Vulnerability management
What is the strategy for ongoing risk identification?
Once you've identified the risk, how do you mitigate the risk? What are the steps?
You may complete this action table either as a 4- to-5-page Microsoft® Word document or as a detailed Microsoft® Excel spreadsheet. The following are examples of column heading titles for a table-formatted action plan:
Column 1: Action Item
Column 2: Description/Details
Column 3: Person Responsible
Column 4: Status
Column 5: Due Date
Column 6: Prerequisites
Column 7: Date Completed
Column 8: Comments/Notes
University of Phoenix Computer Science SQL Injection Discussion
Imagine you have been asked to work at your organization’s booth at a high school career fair. You and other members of ...
University of Phoenix Computer Science SQL Injection Discussion
Imagine you have been asked to work at your organization’s booth at a high school career fair. You and other members of the IT security team must be ready to discuss important topics in IT security with the students on the topic you have been assigned. Your assigned topic is SQL injection attacks.
Write a 1- to 2-page outline of your talking points for the career fair in which you:
Define SQL injection.
Identify common SQL injection attacks and explain what each attack does.
Identify SQL injection detection techniques.
Identify countermeasures to SQL injection.
Describe the effectiveness of the SQL injection countermeasures you identified.
GMU Common Vulnerabilities and Exposures Discussion Board
MITRE (https://cve.mitre.org/cve/ (Links to an external site.)) continuously updates the common vulnerabilities and exposu ...
GMU Common Vulnerabilities and Exposures Discussion Board
MITRE (https://cve.mitre.org/cve/ (Links to an external site.)) continuously updates the common vulnerabilities and exposures (CVE) database with vulnerabilities to hardware and software. This database contains information about vulnerabilities including a description, references, and a link to the NIST National Vulnerability Database (NVD). The NVD is maintained by National Institute for Standard and Technology (NIST). In this discussion you will search the NVD for a CVE of your choice and post about it. Browse to the NVD at https://nvd.nist.gov/vuln/search (Links to an external site.) and search for the title of a program installed on your system or of interest to you; i.e. Abode Reader. If you search does not return a result, search again. Pick a vulnerably and describe it to the class. Include things like a quick overview and how it ranks out of 10. Talk about the risk it poses to you or your system. Include the link in your reference section using APA style.In your peer responses (2 minimum) suggest possible mitigation paths or additional threats you could see from the software.
ISM 521 CSUGlobal Proposed Approach to Implementing an ERP System Paper
You are the CIO of a manufacturing firm. The CEO and CFO continue to express concern over the lack of integration among bu ...
ISM 521 CSUGlobal Proposed Approach to Implementing an ERP System Paper
You are the CIO of a manufacturing firm. The CEO and CFO continue to express concern over the lack of integration among business processes within their functional business areas. The CEO and CFO believe the solution for this is an ERP system coupled with Supply Chain Management and Customer Relationship functionality.Both executives have heard negative reports from executives in other companies and from the press of failed ERP implementations. To avoid duplicating the same situation in their organization, the CEO and CFO request that you submit a Proposed Approach to Implementing an ERP System report. Ultimately, they want to determine if their company is ready for ERP.Your final deliverable should include the following content:A proposed approach to conducting a needs assessment/requirements gathering initiative.A proposed approach to evaluating ERP vendors and their software products’ fitness to meet your requirements. The requirements, at this stage, reflect the functional business processes that your firm needs to implement.A proposed approach to implementing the ERP system into a full production enterprise system.Proposed measurements to determine if the ERP implementation was successful.Your paper should be 15-20 pages in length and conform APA format. Include at least three scholarly references, in addition to the course textbook. The CSU-Global Library is a good place to find these references.
Earn money selling
your Study Documents