Answer:
putting your hands one the wheel, putting the car in gear, putting your foot on the brakes when you need to, and watch for cars when you're driving. hope it helps
Explanation:
Pseudocode finding the sum of the number 12, 14, 16
Answer:
Pseudocode:
1. Initialize a variable named 'sum' and set it to 0.
2. Create an array named 'numbers' containing the numbers 12, 14, and 16.
3. Iterate over each number in the 'numbers' array.
3.1 Add the current number to the 'sum' variable.
4. Print the value of 'sum'.
Alternatively, here's an example of pseudocode using a loop:
1. Initialize a variable named 'sum' and set it to 0.
2. Create an array named 'numbers' containing the numbers 12, 14, and 16.
3. Initialize a variable named 'index' and set it to 0.
4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:
4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.
4.2 Increment 'index' by 1.
5. Print the value of 'sum'.
Explanation:
1st Pseudocode:
1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.
2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.
3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.
3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.
4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.
2nd Pseudocode using a loop:
1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.
2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.
3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.
4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:
4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.
4.2: We increment the 'index' by 1 to move to the next position in the array.
5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.
When a program runs in a text-based environment, such as a command line interface, what determines the order in which things happen?
The set of commands will determines the order in which things
2. Between MAC, DAC, and RBAC, which would you recommend to someone starting up an
online retailing company who had to maintain customer records, track sales, etc., and had
a sizable staff of 20 or more employees? Why?
Answer: RBAC
Explanation:
I would recommend Role-Based Access Control (RBAC) to someone starting up an online retailing company who had to maintain customer records, track sales, and had a sizable staff of 20 or more employees. RBAC is an access control system that is based on the roles of users within an organization. It allows administrators to assign access privileges to users based on their roles within the company. This allows for a more secure and effective way to manage user access, as it is based on roles, rather than individual permissions. Additionally, RBAC provides a more granular level of control over access, allowing administrators to easily assign and manage access to specific resources and tasks. This makes it a good choice for a large organization with many users.
Do you think that Aunt Susan needs more than the normal RDA for protein? Why or why not?
Answer:
Amanda is a 21-year old college student who is minoring in nutrition. While home on break from college, she eats out one day with her Aunt Susan who is 55 years old.Amanda learns that her aunt has been doing basic strength training with a personal trainer twice a week for the past four months. Aunt Susan tells her that she started doing the strength training not because she wants to be a body builder, but because she wants to get in better shape, have stronger muscles and bones, and improve her balance and coordination.At this point, Aunt Susan definitely feels she is in better shape, and also has been paying more attention to her diet. She tells Amanda that her trainer wants her to eat more protein.
Explanation:
what are the main components involved in data transmission
Answer:
connection
Explanation:
connection between each device
He should identify his various
online and offline audiences,
and how best to engage them
TRUE
FALSE
Answer:
false, that shouldn't be a a priority to identify if they are or not.
Explanation:
Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)
if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):
The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):
In the given statement, the condition is that a person should be 18 years or older in order to vote.
The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.
This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.
Let's analyze the other if statements:
1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.
However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.
2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.
Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.
3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.
While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.
For more questions on Boolean condition
https://brainly.com/question/26041371
#SPJ8
How do big organizations take back their data to be reviewed after a disaster?
T/F. in general, the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.
True. In general, the design phase of information security is focused on configuring and operating the organization's information systems in a way that makes them more secure.
What happens in Design Phase?
During the design phase, security professionals work to identify the potential risks and vulnerabilities that exist in the organization's information systems, and develop strategies and solutions to mitigate or eliminate these risks. This may involve implementing security controls such as firewalls, intrusion detection systems, and encryption, as well as developing security policies and procedures to ensure that the organization's information systems are used in a secure and compliant manner.
The design phase is a critical step in the process of securing an organization's information systems, as it sets the foundation for the ongoing operation and maintenance of those systems. By taking a proactive approach to security during the design phase, organizations can significantly reduce the likelihood of security breaches and other threats to their information systems.
To know more about intrusion detection systems, visit: https://brainly.com/question/26199042
#SPJ4
How many ads should be implemented per ad group?
A One or two
B Only one
C Three to five
D Two to three
Answer:
only one
Explanation:
because who likes ad
Write a program that reads a string from the user containing a date in the form mm/dd/yyyy. If the user entered 12/10/2019, then it should print the date in the form December 10, 2019. solution in python.
Answer:
months = ["January","February","March","April","May","June","July","August","September","October","November","December"]
date = input("mm/dd/yyyy: ")
splitdate = date.split("/")
print(months[int(splitdate[0])-1]+" "+splitdate[1]+", "+splitdate[2]+".")
Explanation:
This line initializes a list of all 12 months
months = ["January","February","March","April","May","June","July","August","September","October","November","December"]
This prompts the user for date
date = input("mm/dd/yyyy: ")
This splits the date into three parts; mm with index 0, dd with index 1 and yy with index 2
splitdate = date.split("/")
The following prints the required output
print(months[int(splitdate[0])-1]+" "+splitdate[1]+", "+splitdate[2]+".")
Analyzing the print statment
splitdate[1] represents the day of the date
splitdate[2] represente the month of the date
However, in months[int(splitdate[0])-1]
First: splitdate[0] represents the month of the year as a string in numeric form e.g. "12", "01"
It is first converted to an integer as: int(splitdate[0])
Then the corresponding month is derived from the month list
Which phrase identifies the standard difference in elevation on a topography map?
index contour
contour interval
scale bar
topographic symbol
Answer:
contour interval
Explanation:
The standard that tells the elevation and the difference in topography on the map is that of the contour interval that is it identified the range form the lowest to the highest terrain elevation in meters measured from the sea level. It is also called as C.I and refers to the imaginary lines drawn which has a constant value.Answer:
B. contour interval
Explanation:
Highlight three (3) typical User Requirements and three (3) typical System
Requirements of the ATM system. Use both Natural Language and Form-Based
Specifications to illustrate the typical requirements
As part of each transaction, an user will be obligated to insert an ATM card and enter a personal identification number (PIN), both of which will be sent to the bank for validation.
What is ATM?ATMs are convenient because they allow consumers to perform quick self-service transactions such as deposits, cash withdrawals, bill payments, and account transfers.
Fees for cash withdrawals are frequently charged by the bank where the account is held, the operator of the ATM, or both.
A user will be required to insert an ATM card and enter a personal identification number (PIN) as part of each transaction, both of which will be sent to the bank for validation.
The customer's unique ID must be accepted by the ATM system. The ATM system must accept the customer's choice for a variety of banking transactions.
The ATM system must accept the customer's account type for deposits, balance inquiries, and payments on account.
Thus, these are some of the requirements for ATM.
For more details regarding ATM, visit:
https://brainly.com/question/3450346
#SPJ1
Type the correct answer in the box. Spell all words correctly.
What covers everything from renting equipment and providing food for the crew, to hiring actors and constructing sets?
The
covers everything from renting equipment and providing food for the crew, to hiring actors and constructing sets.
The word that covers everything from renting equipment and providing food for the crew, to hiring actors and constructing sets is "production."
The production covers everything from renting equipment and providing food for the crew, to hiring actors and constructing sets.
What is the cost about?Production squad members are responsible for claiming the setup, demolishing, maintenance, and removal of sounds that are pleasant, harmonized and theater production supplies for stage work.
They are hired in production guests, event scenes, theater groups, and touring bands. In the framework of film, television, and other forms of television, "production" refers to the entire process of founding a finished product, from the beginning idea to the final refine. This includes everything from pre-result to actual production.
Learn more about cost from
https://brainly.com/question/25109150
#SPJ1
explain working principle of computer?
Answer:
The working principle of the computer system. Computers do the work primarily in the machine and we can not see, a control center that converts the information data input to output. This control center, called the central processing unit (CPU), How Computers Work is a very complex system.
Explanation:
which of the following protocols would secure a tunnel for credential exchange using port 636.
A. FTPES
B. SFTP
C. LDAPS
D. DNSSEC
The protocols would secure a tunnel for credential exchange using port 636 is LDAPS. The correct option is C.
What is LDAPS?In order to secure LDAP connections across the network, the Lightweight Directory Access Protocol Secure (LDAPS) protocol is known to employ a PKI certificate and frequently uses TCP port 636.
TCP 3269 is used for LDAPS connection with a global catalog server. SSL/TLS is negotiated when connecting to ports 636 or 3269 before any LDAP traffic is transmitted.
Therefore, the correct option is C. LDAPS protocols would protect a tunnel for the exchange of credentials utilizing port 636.
To learn more about LDAPS, refer to the link:
https://brainly.com/question/17119741
#SPJ1
Top-level domain identifies the type of organization. Which one does NOT belong?
Question 4 options:
.gov
.mil
.org
.cn
Answer:
.cn does Not belong the rest of them do belong
The intention of this problem is to analyze a user input word, and display the letter that it starts with (book → B).
a. Create a function prototype for a function that accepts a word less than 25 characters long, and return a character.
b. Write the function definition for this function that evaluates the input word and returns the letter that the word starts with in capital letter (if it’s in small letters).
c. Create a function call in the main function, and use the function output to print the following message based on the input from the user. (Remember to have a command prompt in the main function requesting the user to enter any word.)
Computer starts with the letter C.
Summer starts with the letter S.
d. Make sure to consider the case where a naughty user enters characters other than the alphabet to form a word and display a relevant message.
%sb$ is not a word.
$500 is not a word.
e. Have the program process words until it encounters a word beginning with the character
Answer:
Here is the C++ program:
#include<iostream> // to use input output functions
using namespace std; //to identify objects like cin cout
void StartChar(string str) { // function that takes a word string as parameter and returns the first letter of that word in capital
int i;
char c;
do //start of do while loop
{
for (int i = 0; i < str.length(); i++) { //iterates through each character of the word str
if(str.length()>25){ //checks if the length of input word is greater than 25
cout<<"limit exceeded"; } //displays this message if a word is more than 25 characters long
c = str.at(i); // returns the character at position i
if (! ( ( c >= 'a' && c <= 'z' ) || ( c >= 'A' && c <= 'Z' ) ) ) { //checks if the input word is contains characters other than the alphabet
cout<<str<<" is not a word!"<<endl; break;} //displays this message if user enters characters other than the alphabet
if (i == 0) { //check the first character of the input word
str[i]=toupper(str[i]); //converts the first character of the input word to uppercase
cout<<str<<" starts with letter "<<str[i]<<endl; } // prints the letter that the word starts with in capital letter
} cout<<"Enter a word: "; //prompts user to enter a word
cin>>str; //reads input word from user
}while(str!="#"); } //keeps prompting user to enter a word until the user enters #
int main() //start of the main() function body
{ string str; //declares a variable to hold a word
cout<<"Enter a word: "; //prompts user to enter a word
cin>>str; //reads input word from user
StartChar(str); } //calls function passing the word to it
Explanation:
The program prompts the user to enter a word and then calls StartChar(str) method by passing the word to the function.
The function StartChar() takes that word string as argument.
do while loop starts. The for loop inside do while loop iterates through each character of the word string.
First if condition checks if the length of the input word is greater than 25 using length() method which returns the length of the str. For example user inputs "aaaaaaaaaaaaaaaaaaaaaaaaaaa". Then the message limit exceeded is printed on the screen if this if condition evaluates to true.
second if condition checks if the user enters anything except the alphabet character to form a word. For example user $500. If this condition evaluates to true then the message $500 is not a word! is printed on the screen.
Third if condition checks if the first character of input word, convert that character to capital using toupper() method and prints the first letter of the str word in capital. For example if input word is "Computer" then this prints the message: Computer starts with the letter C in the output screen.
The program keeps prompting the user to enter the word until the user enters a hash # to end the program.
The output of the program is attached.
An attacker discovered an input validation vulnerability on a website, crafted a URL with additional HTML code, and emailed the link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking on the malicious URL. No other malicious operations occurred outside of the web application’s root directory. This scenario is describing which type of attack?
This scenario is describing attack of:
Computer BotsCommand & ControlWhat are computer bots?A computer programme known as a "bot," short for robot, executes automatic, repeated operations. Usually, bots mimic or take the place of human users. As automated systems, they perform tasks considerably more quickly than do consumers who are humans.
Which types of bots are there?Bots come in two flavours: good bots and bad bots, both of which are relevant to web security. Both make attempts to use web resources (such as websites, web applications, APIs, etc.) or carry out other normal human user actions on the web, but for quite different reasons.
How do computer bots work?A bot (short for robot) is a software application programmed to perform tasks through Robotic Process Automation, or RPA. Bots work by automatically going through a set of instructions, and they carry out tasks and processes much faster, more accurately, and at a higher volume than it would otherwise take humans.
What is computer bots malware?Here's a quick malicious bot definition: A malicious bot is an automated malware program that can infect a system, steal data, or commit other fraudulent activities.
To learn more about computer bots visit:
https://brainly.com/question/28540266
#SPJ10
Answer: (D) Cross-site scripting (XSS)
Explanation: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator program shown in the figures below
Using the knowledge in computational language in python it is possible to write a code that open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator.
Writting the code:Class TaxCalculator(EasyFrame):
def __init__(self):
"""Sets up the window and the widgets."""
EasyFrame.__init__(self, title="Tax Calculator")
# Label and field for the income
self.addLabel(text="Income", row=0, column=0)
# Label and field for the tax
# The event handler method for the button
def computeTax(self):
"""Obtains the data from the input fields and uses
See more about python at brainly.com/question/18502436
#SPJ1
Discuss the Von-Neumann CPU architecture?
The Von Neumann architecture is a traditional CPU design named after John von Neumann and widely implemented since the mid-20th century.
What is the Von-Neumann CPU architecture?Basis for modern computers, including PCs, servers, and smartphones. Von Neumann architecture includes components for executing instructions and processing data. CPU is the core of Von Neumann architecture.
It manages operations, execution, and data flow in the system. Von Neumann architecture stores both program instructions and data in a single memory unit. Memory is organized linearly with each location having a unique address. Instructions and data are stored and retrieved from memory while a program runs.
Learn more about Von-Neumann CPU architecture from
https://brainly.com/question/29590835
#SPJ1
What method is used to ensure proper ventilation in a server room?
Internal cooling systems
Maintaining a steady temperature
Hot and cold aisles
Internal fans
A method which is used to ensure proper ventilation in a server room is: C. Hot and cold aisles.
What is a server?A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.
What is a server room?In Computer technology, a server room is also referred to as a data center and it can be defined as a dedicated space (room) that is typically used for keeping a collection of servers and other network devices.
Generally, hot and cold aisles are often used in server rooms (data centers) to ensure proper ventilation, especially by removing hot air and pushing cool air into the server room.
Read more on hot and cold aisles here: https://brainly.com/question/13860889
#SPJ1
a receiver wants to verify the integrity of a message received from a sender. a hashing value is contained within the digital signature of the sender.
The answer for the above phrase is - Sender's public key.
The recipient accesses the hashing value using the sender's public key to confirm the accuracy of the transmission.
Transmission integrity: What is it?
An approach for assessing and reducing pipeline risks in an effort to reduce incident likelihood and impacts is the Transmission Integrity Management Program.
What does integrity in data processing mean?
Data integrity is the general level of accuracy, consistency, and completeness of data. Data integrity refers to the security and legal compliance of data, such as GDPR compliance.
It is kept current by a system of protocols, regulations, and standards put in place during the design phase.
Learn more about Transmission Integrity Mangement Program
brainly.com/question/14752244
#SPJ4
What is the default layout position for images added to a Word 2016 document?
A) square, where the text wraps around an image around a square border
B) through, where the text wraps around an image with irregular borders
C) in front of the text, where the image is placed over the text
D) in-line, with the text where the text stays with the image
Answer:
D
Explanation:
Hope it works
Answer:
D) in-line, with the text where the text stays with the image
Explanation:
Just did it in ED.
PART 2 - Exercise 2 - Programming Assignment
Case study:
An event company asks you to design the data structure and program prototype for their running event system. The participant for the running event is expected to reach more than 1000 in various categories. You decided to use hashing function method to store the information for each participant's BIB number in the hash table.
To begin the problem solving, suppose that 10 registered runners need to be stored. The sample BIB number of the runners are: 101, 102, 103, 104, 107, 111, 121, 217, 157, and 185. Apart from BIB number, participant information also contains a name (string), category (int) -e.g., men open (1), women open (2)), and runtime (int). The default value for runtime is 0 (represent 0 minutes).
Suppose that a linked list is used as
a data structure for the hash table, create a program that a. Implement the hashing functions for this problem. You can accept up to 10 inputs from the user or read from a formatted text file of participant information.
b. Create the hashing function that will handle any collision as chaining.
c. Find a bib number and print out the information
d. Print out the content of the linked hash table.
Suppose that a linked list is used as a data structure for the hash table, create a program that includes steps his application counts the number of phrases in documents decided on via way of means of the user #include.
What is Programming?It is the manner of making hard and fast commands that inform a pc the way to carry out a task. Programming may be finished the usage of lots of pc programming languages, inclusive of JavaScript, Python, and C++.
This application counts the quantity of phrases in documents decided on via way of means of the user.#include #include #include the usage of namespace std; //Function 1 int count(string word)go back word.size();}//Function 2int vowel(string word)> filename;//Open the {input|enter">enter file.inputfile.open(filename.c_str()); cout<<"nWord listing after format";cout<<"n____nn"; //If the file succesfully opened, process it.if (inputfile).Read more about program :
https://brainly.com/question/1538272
#SPJ1
which of the following would be the fastest method to perform a clean install of the lastest windows os? A. Optical drive, B. In-place upgradeC. Network bootD. USB media
Option D is correct A clean install of the most recent version of Windows can be done quickly using USB media.
When installing software, a clean install eliminates any previous versions. An upgrade, which keeps some components from an earlier version, is an alternative to a clean install. Windows operating systems (OSes) and software programs are frequently mentioned when the terms are used. A hard drive, optical disk, USB drive, or PXE can all be used to install an operating system. The device containing the operating system program is loaded into RAM, or the computer's main memory, during the boot process and then executed. The command to use is mvn clean install. Since you are calling the mvn executable, your computer must have Maven installed. The clean command you are using will eliminate any previously compiled Java.
Learn more about Windows here:
https://brainly.com/question/13502522
#SPJ4
If the pictures are not the same size when they are selected from a file,
PowerPoint will use AutoCorrect so they are the same size.
the picture will be overcorrected.
these pictures will remain the size as in the file.
the layout should be fit to the slide.
Answer:
The correct answer is C) the pictures will remain the size as in the file
Explanation:
Microsoft Office PowerPoint is a multi-media presentation tool. It supports, videos, pictures, and hyperlinks.
When a picture is inserted by selection from a file, PowerPoint does not automatically resize. The editor or user will need to manually adjust the size(s) of the picture(s) to fit the dimensions they require.
Cheers
Assign searchResult with a pointer to any instance of searchChar in personName.
#include
#include
int main(void) {
char personName[100] = "Albert Johnson";
char searchChar = 'J';
char* searchResult = NULL;
/* Your solution goes here */
if (searchResult != NULL) {
printf("Character found.\n");
}
else {
printf("Character not found.\n");
}
return 0;
}
Answer:
Here it the solution statement:
searchResult = strchr(personName, searchChar);
This statement uses strchr function which is used to find the occurrence of a character (searchChar) in a string (personName). The result is assigned to searchResult.
Headerfile cstring is included in order to use this method.
Explanation:
Here is the complete program
#include<iostream> //to use input output functions
#include <cstring> //to use strchr function
using namespace std; //to access objects like cin cout
int main() { // start of main() function body
char personName[100]; //char type array that holds person name
char searchChar; //stores character to be searched in personName
char* searchResult = nullptr; // pointer. This statement is same as searchResult = NULL
cin.getline(personName, 100); //reads the input string i.e. person name
cin >> searchChar; // reads the value of searchChar which is the character to be searched in personName
/* Your solution goes here */
searchResult = strchr(personName, searchChar); //find the first occurrence of a searchChar in personName
if (searchResult != nullptr) //if searchResult is not equal to nullptr
{cout << "Character found." << endl;} //displays character found
else //if searchResult is equal to null
{cout << "Character not found." << endl;} // displays Character not found
return 0;}
For example the user enters the following string as personName
Albert Johnson
and user enters the searchChar as:
J
Then the strchr() searches the first occurrence of J in AlbertJohnson.
The above program gives the following output:
Character found.
New forensics certifications are offered constantly. Research certifications online and find one not discussed in this chapter. Write a short paper stating what organization offers the certification, who endorses the certification, how long the organization has been in business, and the usefulness of the certification or its content. Can you find this certification being requested in job boards?
Answer:
Computer forensics is gathering information or evidence from a computer system in order to use it in the court of law. The evidence gotten should be legal and authentic.
These organization gives certifications for computer forensics
1. Perry4law: they provide training to students, law enforcement officers. There services includes forensics training, research and consultancy.
2. Dallas forensics also offers similar services
3. The New York forensics and electronic discovery also teach how to recover files when deleted, how to get information from drives and how to discover hidden information.
Which tab will you use to format data in cells?
Answer:
Right Click and select Format Cells (CTRL + 1)
Explanation:
To format cells in Excel, you select the cell(s) you want to format, right click, and in the dialogue box that appears select 'Format Cells'.
Answer:
b
Explanation:
trust me