visual studio code c# console app
This project creates a customer list. A customer has an ID number, a first name, and a last name. Create a class for a customer, and include a constructor, getters and setters, and a print method. In the main method create an array or array list ("container") to hold customers. Start with 3 hard-coded customer objects and include them in the container. Display those customers.
In a loop, ask the user what action they want -- add a new customer, delete an existing customer, change an existing customer, or print the whole list of customers. Use string processing to clean up the answer. If the answer is not one of the specified actions, print an error message. For those actions that need to find an existing customer in the container, write a helper method outside of the Main method, passing to it the container and the customer ID to find, and have it return the location in the container where that ID is found. After processing the action, ask if the user is all done. This response is the sentinel to stop the loop when the user decides the work is completed.
Here is an example. It includes some errors -- invalid action choice, invalid customer ID, spelling out the yes/no choice and using different capitalization. It tests all functions provided.
Use foreach loops wherever possible to traverse the contents of the container. Use string processing to change user responses into the format expected (such as lowercase or uppercase, trimming extra letters). Test all functionality provided in the project.
Run the project and take screenshots of the results. These must show at least one of every possible action, and examples of invalid input and how it is handled.
Module 4 Competency Project: Customer List by Student Name Customers who were hardcoded: 5432 Kathy Lindstrom 9801 Phil Peterson 7634 Sam Strathmore What do you want to do? (a)Add, (d)Delete, (c)Change (p)Print: q Invalid choice, try again All done? (y/n) no What do you want to do? (a)Add, (d)Delete, (c)Change (p)Print: a Enter new customer ID: 1289 Enter first name: Tracy Enter last name: Thompson All done? (y/n) NO What do you want to do? (a)Add, (d)Delete, (c) Change (p)Print: p 5432 Kathy Lindstrom 9801 Phil Peterson 7634 Sam Strathmore 1289 Tracy Thompson All done? (y/n) n What do you want to do? (a)Add, (d)Delete, (c) Change (p)Print: C What is customer ID? 5555 Customer not found All done? (y/n) No What do you want to do? (a)Add, (d)Delete, (c) Change (p)Print: c What is customer ID? 5432 Enter first name: Lucy Enter last name: Lindstrom Changed customer 5432 All done? (y/n) no What do you want to do? (a)Add, (d)Delete, (c) Change (p)Print: p 5432 Lucy Lindstrom 9801 Phil Peterson 7634 Sam Strathmore 1289 Tracy Thompson All done? (y/n) n What do you want to do? (a)Add, (d)Delete, (c)Change (p)Print: d what is customer ID? 9801 Customer 9801 was removed All done? (y/n) n What do you want to do? (a)Add, (d)Delete, (c) Change (p)Print: p 5432 Lucy Lindstrom 7634 Sam Strathmore 1289 Tracy Thompson All done? (y/n) YES Press any key when ready

Answers

Answer 1

This program creates a list of customers and allows the user to add new customers, delete existing customers, change customer details, or print the list of customers.

Here's an example C# console application that implements the functionality you described: using System;

using System.Collections.Generic;

namespace CustomerList

{

   class Customer

   {

       public int ID { get; set; }

       public string FirstName { get; set; }

       public string LastName { get; set; }

       public Customer(int id, string firstName, string lastName)

       {

           ID = id;

           FirstName = firstName;

           LastName = lastName;

       }

       public void Print()

       {

           Console.WriteLine($"{ID} {FirstName} {LastName}");

       }

   }

   class Program

   {

       static void Main(string[] args)

       {

           List<Customer> customers = new List<Customer>

           {

               new Customer(5432, "Kathy", "Lindstrom"),

               new Customer(9801, "Phil", "Peterson"),

               new Customer(7634, "Sam", "Strathmore")

           };

           string choice;

           bool done = false;

           do

           {

               Console.WriteLine("What do you want to do? (a)Add, (d)Delete, (c)Change (p)Print:");

               choice = Console.ReadLine().Trim().ToLower();

               switch (choice)

               {

                   case "a":

                       Console.Write("Enter new customer ID: ");

                       int newID = Convert.ToInt32(Console.ReadLine().Trim());

                       Console.Write("Enter first name: ");

                       string newFirstName = Console.ReadLine().Trim();

                       Console.Write("Enter last name: ");

                       string newLastName = Console.ReadLine().Trim();

                       customers.Add(new Customer(newID, newFirstName, newLastName));

                       break;

                   case "d":

                       Console.Write("What is customer ID? ");

                       int idToDelete = Convert.ToInt32(Console.ReadLine().Trim());

                       int index = FindCustomerIndex(customers, idToDelete);

                       if (index != -1)

                       {

                           customers.RemoveAt(index);

                           Console.WriteLine($"Customer {idToDelete} was removed");

                       }

                       else

                       {

                           Console.WriteLine("Customer not found");

                       }

                       break;

                   case "c":

                       Console.Write("What is customer ID? ");

                       int idToChange = Convert.ToInt32(Console.ReadLine().Trim());

                       int changeIndex = FindCustomerIndex(customers, idToChange);

                       if (changeIndex != -1)

                       {

                           Console.Write("Enter first name: ");

                           string changedFirstName = Console.ReadLine().Trim();

                           Console.Write("Enter last name: ");

                           string changedLastName = Console.ReadLine().Trim();

                           customers[changeIndex].FirstName = changedFirstName;

                           customers[changeIndex].LastName = changedLastName;

                           Console.WriteLine($"Changed customer {idToChange}");

                       }

                       else

                       {

                           Console.WriteLine("Customer not found");

                       }

                       break;

                   case "p":

                       foreach (Customer customer in customers)

                       {

                           customer.Print();

                       }

                       break;

                   default:

                       Console.WriteLine("Invalid choice, try again");

                       break;

               }

               Console.Write("All done? (y/n) ");

               string response = Console.ReadLine().Trim().ToLower();

               done = (response == "y" || response == "yes");

           } while (!done);

           Console.WriteLine("Press any key to exit...");

           Console.ReadKey();

       }

       static int FindCustomerIndex(List<Customer> customers, int id)

       {

           for (int i = 0; i < customers.Count; i++)

           {

               if (customers[i].ID == id)

               {

                   return i;

               }

           }

           return -1;

       }

   }

}

It uses string processing to handle user input and performs error checking for invalid actions and customer IDs. You can run the program in Visual Studio Code, and it will prompt you for inputs and display the results accordingly. Make sure to take screenshots of the program running to showcase the different actions and error handling

To learn more about print click here: brainly.com/question/31443942

#SPJ11


Related Questions

list all the components of a computer

Answers

Answer:

Motherboard, Central Processing Unit, Memory, Storage, Case, Fans, and Power supply.

Motherboard, Computer Memory, Central Processing Unit, Power Supply Unit, Graphics Processing Unit, Power Supply, USB Ports, Hard Drive, Floppy Drive, CD-ROM Drive, CD-RW Drive, DVD-ROM Drive, Keyboard, Video Card, Sound Card, Speaker, CPU Fan, Touchpad, Network Cards NIC

I’m sorry if I repeated any or left any out. So much stuff goes into making a computer but I hope this helped!

This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste​

Answers

Answer:

Drag or paste (im not 100% sure tho)

Explanation:

a(n) ____________________ is a memory location whose contents can be changed.

Answers

A variable is a memory location whose contents can be changed. In computer programming, variables are used to store and manipulate data during the execution of a program. They act as containers that hold different types of values, such as numbers, text, or objects.

Variables are essential for dynamic and flexible programming as they allow the program to store and modify data as needed. They have names or identifiers that are used to refer to them and can be assigned initial values or updated throughout the program's execution.

The contents of a variable can be changed by assigning new values to it using assignment statements or through various operations and computations performed in the program. This ability to store and modify data dynamically makes variables a fundamental concept in programming languages.

To learn more about Programming - brainly.com/question/14368396

#SPJ11

Which statement is true about input and output devices? A. An input device receives information from the computer and an output device sends information to the computer. B. An output device receives information from the computer and an input device sends information to the computer. C. Neither statement is true. D. Both statements are true

Answers

Answer:

B. An output device receives information from the computer and an input device sends information to the computer.

Explanation:

Output device: The term "output device" is described as a device that is responsible for providing data in multitude forms, a few of them includes hard copy, visual, and audio media. The output devices are generally used for projection, physical reproduction, and display etc.

Example: Printer and Monitor.

Input device: The term "input device" is determined as a device that an individual can connect with the computer in order to send some information inside the computer.

In the question above, the correct answer is option-B.

if a speaker is using powerpoints as part of a presentation, which of these guidelines should he or she follow? select all that apply.

Answers

If a speaker is using PowerPoint as part of a presentation, guidelines should he or she follow that he or she should keep slides simple and uncluttered, with clear and concise text.

More details of these guidelines should he or she follow is as:
1. Keep slides simple and uncluttered, with clear and concise text.
2. Use high-quality visuals, such as images and charts, to support the speaker's points.
3. Maintain consistency in fonts, colors, and styles throughout the presentation.
4. Use bullet points to summarize key points and make the content easy to follow.
5. Limit the number of slides to avoid overwhelming the audience.
6. Practice the presentation to ensure smooth transitions between slides and effective communication of the content.
By following these guidelines, the speaker can ensure a professional and engaging PowerPoint presentation.

Learn more about guidelines at

https://brainly.com/question/30392490

#SPJ11

what is the hardest codes to input

first to answer get brainlyiest

Answers

Answer:

computers

Explanation:

Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur ____________________ time or a_____________________ or both depending on the degree and the frequency of the infraction, and the age of the perpetrator.

Answers

Answer:

1) Imprisonment

2) Fine

Explanation:

By the 2013 Mississippi Code, on Cybercrimes and Identity Theft, it is against the law to make use of electronic mail or other forma of electronic communication to engage in cyber bullying, which involves the use of threatening language of inflicting arm or with an aim to extort money from another person

The punishment for cyber bullying, includes imprisonment time or a fine or both.

Therefore, for the question, we have; Mississippi law codes state that bullying and cyberbullying are against the law. A court can decide to incur imprisonment time or a fine or both depending on the degree and the frequency of the infraction, and the age of the perpetrator.

one security component that doubles as a network component

Answers

Answer:

is the sentence above the question?

Answer:

It is to enter the site and then it will protect you in terms of form and appearance, and so on as required

What is normally disabled by default on most Linux servers?
O TUI
O laas
O GUI
O Embedded Linux

Answers

The Option that is normally disabled by default on most Linux servers is GUI.

Is Linux an embedded OS?

Embedded Linux is known to be a kind of Linux operating system as well as a kernel that is set up to be place or installed and known to be used inside embedded devices as well as other appliances.

It is seen as a kind of compact type of Linux that gives features and services in line with the operating system.

Therefore, The one that is normally disabled by default on most Linux servers is GUI.

Learn more about GUI from

https://brainly.com/question/3692609

#SPJ1

New communication technology can impact seemingly unrelated industries such as the airline industry. This would be an example of a threat of substitute products. threat of entry. Customers tend to have negative opinions of firms that imitate other firms. forward integration.

Answers

Answer: threat of substitute products

Explanation:

2. Write a QBASIC program to enter a number and print whether its even or odd.​

Answers

In order to determine if a number is even or divisible by two (i.e., divisible by two), this application first asks the user to enter a number. If num MOD 2 yields a value of 0, 0.

How can a software that determines if a number is even or odd be written?

The necessary code is shown below. Number = int (input) (“Enter any number to test whether it is odd or even: “) if (num % 2) == 0: print (“The number is even”) else: print (“The provided number is odd”) Output: Enter any number to test whether it is odd or even: 887 887 is odd.

CLS

INPUT "Enter a number: ", num

IF num MOD 2 = 0 THEN

   PRINT num; " is even."

ELSE

   PRINT num; " is odd."

END IF

To know more about application visit:-

https://brainly.com/question/30358199

#SPJ1

What type of data is produced when you call the range() function?
x = list(range(5))
a. A boolean (true/false) value
b. A list of integers
c. A list of words
d. A list of characters
e. A string

Answers

b. A list of integers

When you call the range function and convert it to a list, as shown in the example x = list(range(5)), it produces a list of integers. In this case, the range(5) function generates a sequence of integers starting from 0 up to (but not including) 5, resulting in the list [0, 1, 2, 3, 4].

The range() function is commonly used in Python to generate a sequence of numbers. It can take one, two, or three arguments to define the start, stop, and step values of the range. By default, if only one argument is provided, it represents the stop value, and the range starts from 0 with a step of 1.

#SPJ11

Which actions help to protect a computer and keep it running properly? Check all that apply.

performing regular scans
deleting any unwanted files
backing up files and other data
saving Internet browsing history
saving and storing all junk files

Answers

backing up files and othed date
saving and storing all junk files
deleting any unwanted scans

Answer:

ABC

Explanation:

100% EDGE 2022

Use the ______ element to create a generic area or section on a web page that is physically separated from others

Answers

Use the div element to create a generic area or section on a web page that is physically separated from others.

In the field of computers, div can be described as a special container that is used in order to make a specific generic area or a particular section on a web page.

The 'div' element stands for division as this element causes a division to be made on the webpage. The div tags are used for multiple purposes such as web layouts.

It is due to the div element that content can be grouped in a webpage that makes it look more attractive and reliable. Without the div element, data will not be understood properly on a webpage and might be misunderstood by the reader.

To learn more about a webpage, click here:

https://brainly.com/question/14552969

#SPJ4

what is the 'key exchange' problem in modern information security? encryption keys are too long. there are too many encryption keys to keep track of. two parties need to privately share the secret encryption key before communicating. the encryption key is too complicated to calculate.

Answers

The 'key exchange' problem in modern information security refers to the challenge faced by two parties who need to privately share a secret encryption key before communicating securely. Encryption is a method of converting data into an unreadable format, so that only authorized parties with the correct decryption key can access the information.

Key exchange is crucial for ensuring secure communication because it allows the involved parties to establish a shared secret key that can be used for encryption and decryption. However, exchanging keys securely can be a challenge, especially when communication is happening over an unsecured channel where eavesdroppers can intercept the messages.
One common solution to the key exchange problem is using asymmetric encryption algorithms, such as RSA or Elliptic Curve Cryptography (ECC), which involve the use of public and private key pairs. In this system, each party has a public key that can be shared openly and a private key that is kept secret. The sender encrypts the message with the recipient's public key, and the recipient decrypts it with their private key.
While asymmetric encryption provides a solution to the key exchange problem, it is generally slower than symmetric encryption methods, which use a single shared key for both encryption and decryption. To achieve the best of both worlds, many secure communication protocols combine both techniques, using asymmetric encryption to securely exchange a symmetric key that is then used for encrypting the actual data.

Learn more about key exchange here:

https://brainly.com/question/28707952

#SPJ11

a(n) loop usually occurs when the programmer does not include code inside the loop that makes the test condition false and can cause what to happen?. (select two)

Answers

When the programmer forgets to insert code within the loop which makes its test condition false and may result in an infinite loop, a(n) loop typically happens.

What is looping?A loop is a set of instructions that are repeatedly carried out until a specific condition is met in computer programming. Typically, a certain action is taken, such as receiving and modifying a piece of data, and then a condition is verified, such as determining when a counter has exceeded a predetermined value.The conditions within the control statement must be true for each iteration of the loop. The block containing code or series of logical assertions that will be executed repeatedly make up the body of a loop. In Python, there are two different types of loops: for loops and while loops.The reason it was called a loop back then was because the ends of an analog tape portion would be spliced together.

To learn more about looping refer to :

https://brainly.com/question/26568485

#SPJ4

What are the Attitude Control System Errors
that impacted the TIMED NASA mission?

Answers

The Attitude Control System (ACS) is a system that governs the spacecraft's position and orientation in space. When it comes to the TIMED mission, the Attitude Control System (ACS) had two major issues, which are elaborated below:1. A pitch rate gyro drift: It was discovered that one of the pitch rate gyros was affected by a constant drift, which was most likely caused by radiation exposure.

This resulted in attitude estimation errors, which meant that the spacecraft was pointed in the wrong direction.2. An ACS magnetic sensor failure: A sudden voltage spike caused a magnetic sensor's permanent failure, which then resulted in large attitude errors. The ACS magnetic sensor is an important component of the ACS since it determines the spacecraft's orientation in space.

The sensor in question was unable to estimate the correct magnetic field vector and, as a result, could not calculate the spacecraft's orientation correctly. Both the pitch rate gyro drift and the magnetic sensor failure led to the spacecraft's inability to maintain its orientation in space.

To know more about orientation  visit:-

https://brainly.com/question/31034695

#SPJ11

he primary key contained in the vendor master record is the ________.

Answers

The primary key contained in the vendor master record is the Vendor Number.

What is the Vendor Master Record?

A Vendor Master Record (VMR) is a collection of vendor-specific data that is stored and maintained in SAP. The Vendor Master Record is used to keep track of the vendor's essential information, such as the vendor's name, address, bank information, payment terms, and other critical data. A master record is created for every vendor in the vendor master data.

Vendor Number, which is the primary key contained in the Vendor Master Record is the unique identification of each vendor. It's a six-digit numeric code assigned to vendors that identifies them in the SAP system. The Vendor Number helps identify a vendor's information in the vendor master record by searching for the vendor's record using the vendor number.

Learn more about Vendor Master Record (VMR) here: https://brainly.com/question/13650923

#SPJ11

.What is true about failover cluster network configuration?
- The storage network should be on a separate subnet
- NIC addresses on servers must have the same network ID
- You need at least three NICs per server
- The heartbeat should be on the client access network

Answers

In a failover cluster network configuration, it is true that the storage network should be on a separate subnet. This separation ensures efficient communication and reduces the chance of interference.

A failover cluster network configuration is a setup that allows for seamless failover in case one of the nodes in the cluster fails. In such a configuration, there are several considerations to keep in mind. Firstly, the storage network should be on a separate subnet to ensure that there is no interference with the regular network traffic. Secondly, the NIC addresses on servers must have the same network ID to facilitate communication between the nodes. Thirdly, you need at least three NICs per server to ensure redundancy and prevent any bottlenecks. Finally, the heartbeat should be on the client access network, which allows for faster detection of any issues that may arise. Overall, a well-designed cluster network configuration can ensure high availability and minimize any downtime that may occur.

Learn more about storage network here:-brainly.com/question/13327865

#SPJ11

Create a program that:
Asks if you want to participate. If they type anything but y, yes, Yes, or YES, it repeats until they type y, yes, Yes, or
YES (While statement)
The program then asks three survey questions that you create. At least on of the questions must have a decision structure that takes a different path depending on the answer.
Lastly, the program prints a summary of the responses.

Answers

Consider a scenario where we want to create a program that can calculate the average of a set of (moredata[0]) allows us to accept "y", "yes", or "yeah" to continue the loop.

In Python, how do you repeat a program?

repeat() For practicing repeat in Python, the itertools package offers the repeat() function. We supply the data and the number of repetitions in the repeat() function.

How do you handle survey questions where respondents can choose from multiple answers?

Since no statistical software will be able to measure this unless you can divide it into two separate questions, which you shouldn't do, you should eliminate the response entirely. Make sure to let your participants know that each question should only have one response.

To know more about Python visit:-

https://brainly.com/question/18502436

#SPJ1

Question 5 of 10
If you pay the balance of your credit card bill before the due date, how much
do you pay?
OA. The full amount that you owe
B. The minimum payment on your bill
C. The full amount you owe, plus a service fee
D. The full amount you owe, plus interest for the past month
SUBMIT

Answers

Answer:

b

explination.

By paying the credit card dues early, you will have an advantage over the others as the credit card issuer will report a lower balance to the credit bureaus. This will reflect in your credit report and you can have an edge over the others for a lower credit utilization ratio.

How much storage space is reserved on a storage device to convert a storage disk to a dynamic disk using a Windows tool

Answers

Answer:

You must have at least 1 megabyte (MB) of unallocated disk space available on any master boot record (MBR) basic disk that you want to change to a dynamic disk. When you change a basic disk to a dynamic disk, you change the existing partitions on the basic disk to simple volumes on the dynamic disk

Explanation:

i know

C++ only has two visibility modifiers: Public and Private
True
False

Answers

False. C++ actually has three visibility modifiers: Public, Private, and Protected. The Protected modifier allows for data and functions to be accessed within the same class and its derived classes.

These modifiers determine the access level for class members (variables, functions, and nested classes).
1. Public: Members declared as public are accessible from any part of the program. They can be accessed both inside and outside the class.
2. Private: Members declared as private are only accessible within the class itself. They cannot be accessed outside the class.
3. Protected: Members declared as protected are accessible within the class and its derived (child) classes. They cannot be accessed outside these classes, except by friend functions and classes.
In summary, C++ does not have only two visibility modifiers; it has three - Public, Private, and Protected.

To know more about Public visit:

brainly.com/question/29996448

#SPJ11

briefly explain the emerging trends in micro computer technology according to size

Answers

Answer:

Emerging trends in IT include big data analytics, virtual and augmented reality, 5G, and the internet of things. Computer science workers can learn about computer science current events and new technologies by joining a professional organization.Mar 3, 2022

Suppose you have been hired as a Software Engineer by a company XYZ. You have been assigned a task to develop a complex data processing application, involving the parsing and analysis of large XML files that contain structured data. This structured data is organized and formatted consistently. Your specific responsibility revolves around memory allocation for the data processing tasks, with a focus on fast data access and no requirement for memory deallocation. For doing so, either you will carry out the stack memory allocation or heap memory allocation.

Answers

As a software engineer, my responsibility revolves around memory allocation for the data processing tasks with a focus on fast data access and no requirement for memory deallocation.

For this task, either stack memory allocation or heap memory allocation can be used. Before deciding between stack and heap memory allocation, we should understand the basics of both types of memory allocation. Stack Memory Allocation: Stack memory allocation is an automatic memory allocation that occurs in the stack section.

It is a simple and efficient way of memory allocation. However, it is limited in size and can result in stack overflow if the allocated size is more than the limit. It follows a Last In First Out (LIFO) order. It is faster compared to heap memory allocation due to its simple mechanism and fixed size.

To know more about engineer visit:

https://brainly.com/question/31140236

#SPJ11

What is the default file system used by Windows 7?A. FAT32B. CDFSC. NTFSD. FAT

Answers

The default file system used by Windows 7 is NTFS (New Technology File System).

Option C. NTFS is correct.

The default file system used by Windows 7 is NTFS (New Technology File System).

NTFS was introduced by Microsoft in 1993 as an improvement over the older FAT (File Allocation Table) file system. NTFS is a more advanced and robust file system that supports larger files and provides better security and data reliability.

NTFS offers several advantages over FAT, such as support for larger file sizes, improved performance, better security, and more efficient use of disk space.

With NTFS, you can store files larger than 4GB, which is the maximum file size supported by FAT32. This is especially useful for users who work with large media files, such as videos, images, and audio files.

Another advantage of NTFS is its support for advanced security features such as file and folder permissions, encryption, and auditing.

This allows users to set permissions on individual files and folders, control who can access them, and track changes made to them.

NTFS also supports journaling, which means that file system changes are logged to a journal file before they are written to disk.

This helps prevent data loss in case of a power failure or system crash.

In summary, NTFS is the default file system used by Windows 7, and it offers several advantages over the older FAT file system.

NTFS provides better performance, larger file size support, enhanced security, and more efficient use of disk space, making it the preferred choice for modern Windows operating systems.

For similar question on Windows 7.

https://brainly.com/question/30438692

#SPJ11

HELP ASAP!!!
Write a program that asks the p34won to enter their grade, and then prints GRADE is a fun grade. Your program should repeat these steps until the user inputs I graduated.

Sample Run
What grade are you in?: (I graduated) 1st
1st is a fun grade.
What grade are you in?: (I graduated) 3rd
3rd is a fun grade.
What grade are you in?: (I graduated) 12th
12th is a fun grade.
What grade are you in?: (I graduated) I graduated

It's in python

Answers

def func():

   while True:

       grade = input("What grade are you in?: (I graduated) ")

       if grade == "I graduated":

           return

       print("{} is a fun grade".format(grade))

func()

I hope this helps!

either using the response tab in the attack results window or by looking at each successful (i.e. 200 code) request manually in your browser, find the ticket that contains the flag. what is the flag?

Answers

The flag is usually found in the response body of a successful request. To find it, look for a response with a 200 code in the attack results window. Then, open the response tab to view the response body.

what is code?

Code is a set of instructions or commands written using a programming language to communicate with a computer or other device to perform a specific task. It is the language computers understand and use to carry out tasks that humans want them to do. Code is used to create computer programs, websites, apps, and other digital media. It is the foundation of modern technology, as it is the key to unlocking the power of computers. Code can be written in many languages, such as C++, Python, and Java, and can be used to create a wide variety of applications and solutions.

Search for the flag in the body, which is typically in the form of a string of random letters and numbers. Once you've found the flag, copy it and paste it into the flag input field.

To learn more about code

https://brainly.com/question/23275071

#SPJ1

What does the router on the WAN owned by your internet service provider do
with any packet it receives?
A. The router reads the packet and sends it to another router on the
internet.
B. The router sends the packet to a central computer in a secret
location.
C. The router sends the packet directly to individual devices all over
the world.
D. The router stores the packet in an electromagnetic cloud for easy
access.

Answers

The router on the WAN owned by an internet service provider (ISP) does the following with any packet it receives: option A.

What is a router?

A router is a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.

In Computer networking, the router on the WAN owned by an internet service provider (ISP) is designed and developed to read the packet and then send it to another router on the internet.

Read more on router here: brainly.com/question/24812743

#SPJ1

the characteristics of an entity are called . group of answer choices attributes variables traits fields

Answers

The characteristics of an entity are typically referred to as attributes. These attributes can be thought of as the properties or characteristics that define the entity and distinguish it from other entities in the same category.

Explanation:

In computer science and database management, an entity is a representation of a real-world object or concept. For example, a customer, an employee, or a product can all be considered entities. In order to accurately represent these entities in a database, it is necessary to define their attributes, or the characteristics that distinguish them from other entities.

Attributes can take many different forms depending on the entity being represented. For example, the attributes of a customer might include their name, address, phone number, and email address, while the attributes of a product might include its name, price, description, and manufacturer. By defining these attributes, it becomes possible to store and manipulate data about the entity in a structured and organized way.

To learn more about Attributes click here, brainly.com/question/30024138

#SPJ11

Other Questions
Who is the president in Dominican Select all the expressions that are equal to 6 105.A.60 1,000B.60 10,000C.600 1,000D.6,000 1,000E.6,000 100 The fighting on the western front was marked by1: bloody slaughter and stalemate2:revolts of troops against commanders3:quick victories for the Allies4: complete takeover of France by Germany Can you plz help me, I am struggling? Which of the following represents the factorization of the trinomial below?x- 24x+144O A. (x+12) (x-12)OB. (x-12)O C. (x+12)O D. (x-12)(x-2) You should use linux programming.a) Write a C program which reads only regular files from adirectory. [9 marks]b) Write a program/script which allows creation of 10 usershaving as UserId U1,U2,U3. Calculate break-even point: Your company sells t-shirts at music concerts. You sell your shirts for $35 each. You pay $10 for each t-shirt, and $1 to print the band's logo and tour dates on each shirt. You pay the band a royalty (licensing fee) of $1 per shirt sold. You pay the venue $100 in rent for your kiosk, and you pay your room-mate $100 to help you sell shirts. Question 5) How many shirts will you need to sell to break even? The child appeared restless when he was first observed.Independent or subordinate clause? Consider the vector field F(x, y) = (-2xy, x ) and the region R bounded by y = 0 and y = x(2-x) (a) Compute the two-dimensional curl of the field. (b) Sketch the region (c) Evaluate BOTH integrals in Green's Theorem (Circulation Form) and verify that both computations match. A horizontal beam of uniform section is pinned at its ends which are at the same level and is loaded at the left-hand pin with an anticlockwise moment 10kNm ' and at the night-hand pin with a dockwise moment '20 kNm, both in the same vertical plane. The length between the pin is 5 m '. Use the virtual work method to find. a. slope at A b. slope at B c. deflection at the midpoint of the span. El is Constant Given the following data, find the weight that represents the 53rd percentile.Weights of Newborn Babies9.47.55.47.57.16.08.15.77.16.69.45.88.75.79.3 I need help on this question plsss help Select the true statement about trend lines.O A. A trend line should be as close as possible to the points.O B. A trend line connects the points.O C. A trend line goes through the first and last points.D. A trend line is always horizontal.SUBMIT In which quadrant is point C? Horace, the youngest child of a high school athletic director, was able to roll over at 3 months, crawl at 6 months, and walk at 12 months. This ordered sequence of motor development was largely due to. write a paragraph about winter seasons using six transitional devices ASAP.....................................!!!!! hannel analysis enables an analytics user to O find ways to shift paid traffic sources toward unpaid traffic sourcesO conduct counterfactual analyses of the effect of increased marketing investments in any channel O investigate which traffic source produced the best-quality traffic O determine which ad copy produced the highest click-through rate The earths magnetic poles are in the general direction of the planets geographic poles. However, unlike the geographic poles, the magnetic poles are not always in the same place.As used in the text, what does the phrase "general direction" mean? (A) different but the same exact way (B) similar but complete opposite way(C) similar but not the same exact way (D) different and complete opposite way True/False: The Heimlich maneuver is a procedure in which air in the lungs is used to expel a piece of food that obstructs the opening to the trachea. If 10% of a number equals 4, find 40% of that number.