What four things does steering control involve?

Answers

Answer 1

Answer:

putting your hands one the wheel, putting the car in gear, putting your foot on the brakes when you need to, and watch for cars when you're driving. hope it helps

Explanation:


Related Questions

Pseudocode finding the sum of the number 12, 14, 16

Answers

Answer:

Pseudocode:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Iterate over each number in the 'numbers' array.

  3.1 Add the current number to the 'sum' variable.

4. Print the value of 'sum'.

Alternatively, here's an example of pseudocode using a loop:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Initialize a variable named 'index' and set it to 0.

4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:

  4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.

  4.2 Increment 'index' by 1.

5. Print the value of 'sum'.

Explanation:

1st Pseudocode:

1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.

2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.

3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.

3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

2nd Pseudocode using a loop:

1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.

2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.

3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.

4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:

4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4.2: We increment the 'index' by 1 to move to the next position in the array.

5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

When a program runs in a text-based environment, such as a command line interface, what determines the order in which things happen?

Answers

The set of commands will determines the order in which things

2. Between MAC, DAC, and RBAC, which would you recommend to someone starting up an
online retailing company who had to maintain customer records, track sales, etc., and had
a sizable staff of 20 or more employees? Why?

Answers

Answer: RBAC

Explanation:

I would recommend Role-Based Access Control (RBAC) to someone starting up an online retailing company who had to maintain customer records, track sales, and had a sizable staff of 20 or more employees. RBAC is an access control system that is based on the roles of users within an organization. It allows administrators to assign access privileges to users based on their roles within the company. This allows for a more secure and effective way to manage user access, as it is based on roles, rather than individual permissions. Additionally, RBAC provides a more granular level of control over access, allowing administrators to easily assign and manage access to specific resources and tasks. This makes it a good choice for a large organization with many users.

Do you think that Aunt Susan needs more than the normal RDA for protein? Why or why not?

Answers

Answer:

Amanda is a 21-year old college student who is minoring in nutrition. While home on break from college, she eats out one day with her Aunt Susan who is 55 years old.Amanda learns that her aunt has been doing basic strength training with a personal trainer twice a week for the past four months. Aunt Susan tells her that she started doing the strength training not because she wants to be a body builder, but because she wants to get in better shape, have stronger muscles and bones, and improve her balance and coordination.At this point, Aunt Susan definitely feels she is in better shape, and also has been paying more attention to her diet. She tells Amanda that her trainer wants her to eat more protein.

Explanation:

what are the main components involved in data transmission​

Answers

Answer:

connection

Explanation:

connection between each device

He should identify his various
online and offline audiences,
and how best to engage them
TRUE
FALSE​

Answers

Answer:

false, that shouldn't be a a priority to identify if they are or not.

Explanation:

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

How do big organizations take back their data to be reviewed after a disaster?

Answers

Here a 5 step recovery plan, I have been in IT for 8 years

1. Create a disaster recovery team.

The team will be responsible for developing, implementing, and maintaining the DRP. A DRP should identify the team members, define each member’s responsibilities, and provide their contact information. The DRP should also identify who should be contacted in the event of a disaster or emergency. All employees should be informed of and understand the DRP and their responsibility if a disaster occurs.

2. Identify and assess disaster risks.

Your disaster recovery team should identify and assess the risks to your organization. This step should include items related to natural disasters, man-made emergencies, and technology related incidents. This will assist the team in identifying the recovery strategies and resources required to recover from disasters within a predetermined and acceptable timeframe.

3. Determine critical applications, documents, and resources.

The organization must evaluate its business processes to determine which are critical to the operations of the organization. The plan should focus on short-term survivability, such as generating cash flows and revenues, rather than on a long term solution of restoring the organization’s full functioning capacity. However, the organization must recognize that there are some processes that should not be delayed if possible. One example of a critical process is the processing of payroll.

4. Specify backup and off-site storage procedures.

These procedures should identify what to back up, by whom, how to perform the backup, location of backup and how frequently backups should occur. All critical applications, equipment, and documents should be backed up. Documents that you should consider backing up are the latest financial statements, tax returns, a current list of employees and their contact information, inventory records, customer and vendor listings. Critical supplies required for daily operations, such as checks and purchase orders, as well as a copy of the DRP, should be stored at an off-site location.

5. Test and maintain the DRP.

Disaster recovery planning is a continual process as risks of disasters and emergencies are always changing. It is recommended that the organization routinely test the DRP to evaluate the procedures documented in the plan for effectiveness and appropriateness. The recovery team should regularly update the DRP to accommodate for changes in business processes, technology, and evolving disaster risks.



summary :an organization must develop a recovery team to create a disaster recovery plan that includes identifying and assessing disaster risks, determining critical applications, and specifying backup procedures. Other procedures may be included in the plan based on the organization. The recovery team and organization must then implement the DRP and follow through on the plan procedures. The DRP should be continually tested and maintained to consistently prepare the organization for evolving disasters and emergencies.

T/F. in general, the design phase is accomplished by changing the configuration and operation of the organization's information systems to make them more secure.

Answers

True. In general, the design phase of information security is focused on configuring and operating the organization's information systems in a way that makes them more secure.

What happens in Design Phase?

During the design phase, security professionals work to identify the potential risks and vulnerabilities that exist in the organization's information systems, and develop strategies and solutions to mitigate or eliminate these risks. This may involve implementing security controls such as firewalls, intrusion detection systems, and encryption, as well as developing security policies and procedures to ensure that the organization's information systems are used in a secure and compliant manner.

The design phase is a critical step in the process of securing an organization's information systems, as it sets the foundation for the ongoing operation and maintenance of those systems. By taking a proactive approach to security during the design phase, organizations can significantly reduce the likelihood of security breaches and other threats to their information systems.

To know more about  intrusion detection systems, visit: https://brainly.com/question/26199042

#SPJ4

How many ads should be implemented per ad group?
A One or two
B Only one
C Three to five
D Two to three

Answers

Answer:

only one

Explanation:

because who likes ad

Write a program that reads a string from the user containing a date in the form mm/dd/yyyy. If the user entered 12/10/2019, then it should print the date in the form December 10, 2019. solution in python.

Answers

Answer:

months = ["January","February","March","April","May","June","July","August","September","October","November","December"]

date = input("mm/dd/yyyy: ")

splitdate = date.split("/")

print(months[int(splitdate[0])-1]+" "+splitdate[1]+", "+splitdate[2]+".")

Explanation:

This line initializes a list of all 12 months

months = ["January","February","March","April","May","June","July","August","September","October","November","December"]

This prompts the user for date

date = input("mm/dd/yyyy: ")

This splits the date into three parts; mm with index 0, dd with index 1 and yy with index 2

splitdate = date.split("/")

The following prints the required output

print(months[int(splitdate[0])-1]+" "+splitdate[1]+", "+splitdate[2]+".")

Analyzing the print statment

splitdate[1] represents the day of the date

splitdate[2] represente the month of the date

However, in months[int(splitdate[0])-1]

First: splitdate[0] represents the month of the year as a string in numeric form e.g. "12", "01"

It is first converted to an integer as: int(splitdate[0])

Then the corresponding month is derived from the month list

Which phrase identifies the standard difference in elevation on a topography map?
index contour
contour interval
scale bar
topographic symbol

Answers

Answer:

contour interval

Explanation:

The standard that tells the elevation and the difference in topography on the map is that of the contour interval that is it identified the range form the lowest to the highest terrain elevation in meters measured from the sea level. It is also called as C.I and refers to the imaginary lines drawn which has a constant value.

Answer:

B. contour interval

Explanation:

Highlight three (3) typical User Requirements and three (3) typical System
Requirements of the ATM system. Use both Natural Language and Form-Based
Specifications to illustrate the typical requirements

Answers

As part of each transaction, an user will be obligated to insert an ATM card and enter a personal identification number (PIN), both of which will be sent to the bank for validation.

What is ATM?

ATMs are convenient because they allow consumers to perform quick self-service transactions such as deposits, cash withdrawals, bill payments, and account transfers.

Fees for cash withdrawals are frequently charged by the bank where the account is held, the operator of the ATM, or both.

A user will be required to insert an ATM card and enter a personal identification number (PIN) as part of each transaction, both of which will be sent to the bank for validation.

The customer's unique ID must be accepted by the ATM system. The ATM system must accept the customer's choice for a variety of banking transactions.

The ATM system must accept the customer's account type for deposits, balance inquiries, and payments on account.

Thus, these are some of the requirements for ATM.

For more details regarding ATM, visit:

https://brainly.com/question/3450346

#SPJ1

Type the correct answer in the box. Spell all words correctly.
What covers everything from renting equipment and providing food for the crew, to hiring actors and constructing sets?
The
covers everything from renting equipment and providing food for the crew, to hiring actors and constructing sets.

Answers

The word that covers everything from renting equipment and providing food for the crew, to hiring actors and constructing sets is "production."

The production covers everything from renting equipment and providing food for the crew, to hiring actors and constructing sets.

What is the cost about?

Production squad members are responsible for claiming the setup, demolishing, maintenance, and removal of sounds that are pleasant, harmonized and theater production supplies for stage work.

They are hired in production guests, event scenes, theater groups, and touring bands. In the framework of film, television, and other forms of television, "production" refers to the entire process of founding a finished product, from the beginning idea to the final refine. This includes everything from pre-result to actual production.

Learn more about cost  from

https://brainly.com/question/25109150

#SPJ1

explain working principle of computer?​

Answers

Answer:

The working principle of the computer system. Computers do the work primarily in the machine and we can not see, a control center that converts the information data input to output. This control center, called the central processing unit (CPU), How Computers Work is a very complex system.

Explanation:

which of the following protocols would secure a tunnel for credential exchange using port 636.
A. FTPES
B. SFTP
C. LDAPS
D. DNSSEC

Answers

The protocols would secure a tunnel for credential exchange using port 636 is LDAPS. The correct option is C.

What is LDAPS?

In order to secure LDAP connections across the network, the Lightweight Directory Access Protocol Secure (LDAPS) protocol is known to employ a PKI certificate and frequently uses TCP port 636.

TCP 3269 is used for LDAPS connection with a global catalog server. SSL/TLS is negotiated when connecting to ports 636 or 3269 before any LDAP traffic is transmitted.

Therefore, the correct option is C. LDAPS protocols would protect a tunnel for the exchange of credentials utilizing port 636.

To learn more about LDAPS, refer to the link:

https://brainly.com/question/17119741

#SPJ1

Top-level domain identifies the type of organization. Which one does NOT belong?
Question 4 options:

.gov

.mil

.org

.cn

Answers

Answer:

.cn does Not belong the rest of them do belong

the answer is “.mil”.

The intention of this problem is to analyze a user input word, and display the letter that it starts with (book → B).

a. Create a function prototype for a function that accepts a word less than 25 characters long, and return a character.
b. Write the function definition for this function that evaluates the input word and returns the letter that the word starts with in capital letter (if it’s in small letters).
c. Create a function call in the main function, and use the function output to print the following message based on the input from the user. (Remember to have a command prompt in the main function requesting the user to enter any word.)

Computer starts with the letter C.
Summer starts with the letter S.

d. Make sure to consider the case where a naughty user enters characters other than the alphabet to form a word and display a relevant message.

%sb$ is not a word.
$500 is not a word.

e. Have the program process words until it encounters a word beginning with the character

Answers

Answer:

Here is the C++ program:

#include<iostream>  // to use input output functions

using namespace std;     //to identify objects like cin cout

void StartChar(string str)  {  // function that takes a word string as parameter and returns the first letter of that word in capital

   int i;  

   char c;

   do  //start of do while loop

   {

   for (int i = 0; i < str.length(); i++) {  //iterates through each character of the word str

       if(str.length()>25){  //checks if the length of input word is greater than 25

           cout<<"limit exceeded"; }  //displays this message if a word is more than 25 characters long

      c = str.at(i);   // returns the character at position i

       if (! ( ( c >= 'a' && c <= 'z' ) || ( c >= 'A' && c <= 'Z' ) ) ) {  //checks if the input word is contains characters other than the alphabet

            cout<<str<<" is not a word!"<<endl; break;}  //displays this message if user enters characters other than the alphabet

        if (i == 0) {  //check the first character of the input word

           str[i]=toupper(str[i]);  //converts the first character of the input word to uppercase

           cout<<str<<" starts with letter "<<str[i]<<endl;  }  // prints the letter that the word starts with in capital letter

   }   cout<<"Enter a word: ";  //prompts user to enter a word

      cin>>str;   //reads input word from user

}while(str!="#");   }    //keeps prompting user to enter a word until the user enters #

int main()   //start of the main() function body

{ string str;  //declares a variable to hold a word

cout<<"Enter a word: "; //prompts user to enter a word

cin>>str; //reads input word from user

   StartChar(str); }  //calls function passing the word to it

     

Explanation:

The program prompts the user to enter a word and then calls StartChar(str) method by passing the word to the function.

The function StartChar() takes that word string as argument.

do while loop starts. The for loop inside do while loop iterates through each character of the word string.

First if condition checks if the length of the input word is greater than 25 using length() method which returns the length of the str. For example user inputs "aaaaaaaaaaaaaaaaaaaaaaaaaaa". Then the message limit exceeded is printed on the screen if this if condition evaluates to true.

second if condition checks if the user enters anything except the alphabet character to form a  word. For example user $500. If this condition evaluates to true then the message $500 is not a word! is printed on the screen.

Third if condition checks if the first character of input word, convert that character to capital using toupper() method and prints the first letter of the str word in capital. For example if input word is "Computer" then this prints the message: Computer starts with the letter C in the output screen.

The program keeps prompting the user to enter the word until the user enters a hash # to end the program.

The output of the program is attached.

The intention of this problem is to analyze a user input word, and display the letter that it starts

An attacker discovered an input validation vulnerability on a website, crafted a URL with additional HTML code, and emailed the link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking on the malicious URL. No other malicious operations occurred outside of the web application’s root directory. This scenario is describing which type of attack?

Answers

This scenario is describing attack of:

Computer BotsCommand & Control

What are computer bots?

A computer programme known as a "bot," short for robot, executes automatic, repeated operations. Usually, bots mimic or take the place of human users. As automated systems, they perform tasks considerably more quickly than do consumers who are humans.

Which types of bots are there?

Bots come in two flavours: good bots and bad bots, both of which are relevant to web security. Both make attempts to use web resources (such as websites, web applications, APIs, etc.) or carry out other normal human user actions on the web, but for quite different reasons.

How do computer bots work?

A bot (short for robot) is a software application programmed to perform tasks through Robotic Process Automation, or RPA. Bots work by automatically going through a set of instructions, and they carry out tasks and processes much faster, more accurately, and at a higher volume than it would otherwise take humans.

What is computer bots malware?

Here's a quick malicious bot definition: A malicious bot is an automated malware program that can infect a system, steal data, or commit other fraudulent activities.

To learn more about computer bots visit:

https://brainly.com/question/28540266

#SPJ10

Answer:  (D) Cross-site scripting (XSS)

Explanation: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.

open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator program shown in the figures below

Answers

Using the knowledge in computational language in python it is possible to write a code that open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator.

Writting the code:

Class TaxCalculator(EasyFrame):

   def __init__(self):

       """Sets up the window and the widgets."""

       EasyFrame.__init__(self, title="Tax Calculator")

       # Label and field for the income

       self.addLabel(text="Income", row=0, column=0)

     

       # Label and field for the tax

   # The event handler method for the button

   def computeTax(self):

       """Obtains the data from the input fields and uses

   

See more about python at brainly.com/question/18502436

#SPJ1

open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator program
open the taxformwithgui.py file and write a GUI-based program that implements the tax calculator program

Discuss the Von-Neumann CPU architecture?​

Answers

The Von Neumann architecture is a traditional CPU design named after John von Neumann and widely implemented since the mid-20th century.

What is the Von-Neumann CPU architecture?​

Basis for modern computers, including PCs, servers, and smartphones. Von Neumann architecture includes components for executing instructions and processing data. CPU is the core of Von Neumann architecture.

It manages operations, execution, and data flow in the system. Von Neumann architecture stores both program instructions and data in a single memory unit. Memory is organized linearly with each location having a unique address. Instructions and data are stored and retrieved from memory while a program runs.

Learn more about   Von-Neumann CPU architecture from

https://brainly.com/question/29590835

#SPJ1

What method is used to ensure proper ventilation in a server room?
Internal cooling systems
Maintaining a steady temperature
Hot and cold aisles
Internal fans

Answers

A method which is used to ensure proper ventilation in a server room is: C. Hot and cold aisles.

What is a server?

A server can be defined as a dedicated computer system that is designed and developed to provide specific services to other computer devices or programs, which are commonly referred to as the clients.

What is a server room?

In Computer technology, a server room is also referred to as a data center and it can be defined as a dedicated space (room) that is typically used for keeping a collection of servers and other network devices.

Generally, hot and cold aisles are often used in server rooms (data centers) to ensure proper ventilation, especially by removing hot air and pushing cool air into the server room.

Read more on hot and cold aisles here: https://brainly.com/question/13860889

#SPJ1

a receiver wants to verify the integrity of a message received from a sender. a hashing value is contained within the digital signature of the sender.

Answers

The answer for the above phrase is - Sender's public key.

The recipient accesses the hashing value using the sender's public key to confirm the accuracy of the transmission.

Transmission integrity: What is it?

An approach for assessing and reducing pipeline risks in an effort to reduce incident likelihood and impacts is the Transmission Integrity Management Program.

What does integrity in data processing mean?

Data integrity is the general level of accuracy, consistency, and completeness of data. Data integrity refers to the security and legal compliance of data, such as GDPR compliance.

It is kept current by a system of protocols, regulations, and standards put in place during the design phase.

Learn more about Transmission Integrity Mangement Program

brainly.com/question/14752244

#SPJ4

What is the default layout position for images added to a Word 2016 document?

A) square, where the text wraps around an image around a square border
B) through, where the text wraps around an image with irregular borders
C) in front of the text, where the image is placed over the text
D) in-line, with the text where the text stays with the image

Answers

Answer:

D

Explanation:

Hope it works

Answer:

D) in-line, with the text where the text stays with the image

Explanation:

Just did it in ED.

PART 2 - Exercise 2 - Programming Assignment

Case study:

An event company asks you to design the data structure and program prototype for their running event system. The participant for the running event is expected to reach more than 1000 in various categories. You decided to use hashing function method to store the information for each participant's BIB number in the hash table.

To begin the problem solving, suppose that 10 registered runners need to be stored. The sample BIB number of the runners are: 101, 102, 103, 104, 107, 111, 121, 217, 157, and 185. Apart from BIB number, participant information also contains a name (string), category (int) -e.g., men open (1), women open (2)), and runtime (int). The default value for runtime is 0 (represent 0 minutes).

Suppose that a linked list is used as

a data structure for the hash table, create a program that a. Implement the hashing functions for this problem. You can accept up to 10 inputs from the user or read from a formatted text file of participant information.
b. Create the hashing function that will handle any collision as chaining.
c. Find a bib number and print out the information
d. Print out the content of the linked hash table.​

Answers

Suppose that a linked list is used as a data structure for the hash table, create a program that includes steps his application counts the number of phrases in documents decided on via way of means of the user #include.

What is Programming?

It is the manner of making hard and fast commands that inform a pc the way to carry out a task. Programming may be finished the usage of lots of pc programming languages, inclusive of JavaScript, Python, and C++.

This application counts the quantity of phrases in documents decided on via way of means of the user.#include #include #include the usage of namespace std; //Function 1 int count(string word)go back word.size();}//Function 2int vowel(string word)> filename;//Open the {input|enter">enter file.inputfile.open(filename.c_str()); cout<<"nWord listing after format";cout<<"n____nn"; //If the file succesfully opened, process it.if (inputfile).

Read more about program :

https://brainly.com/question/1538272

#SPJ1

which of the following would be the fastest method to perform a clean install of the lastest windows os? A. Optical drive, B. In-place upgradeC. Network bootD. USB media

Answers

Option D is correct A clean install of the most recent version of Windows can be done quickly using USB media.

When installing software, a clean install eliminates any previous versions. An upgrade, which keeps some components from an earlier version, is an alternative to a clean install. Windows  operating systems (OSes) and software programs are frequently mentioned when the terms are used. A hard drive, optical disk, USB drive, or PXE can all be used to install an operating system. The device containing the operating system program is loaded into RAM, or the computer's main memory, during the boot process and then executed. The command to use is mvn clean install. Since you are calling the mvn executable, your computer must have Maven installed. The clean command you are using will eliminate any previously compiled Java.

Learn more about Windows here:

https://brainly.com/question/13502522

#SPJ4

If the pictures are not the same size when they are selected from a file,

PowerPoint will use AutoCorrect so they are the same size.
the picture will be overcorrected.
these pictures will remain the size as in the file.
the layout should be fit to the slide.

Answers

Answer:

The correct answer is C) the pictures will remain the size as in the file

Explanation:

Microsoft Office PowerPoint is a multi-media presentation tool. It supports, videos, pictures, and hyperlinks.

When a picture is inserted by selection from a file, PowerPoint does not automatically resize. The editor or user will need to manually adjust the size(s) of the picture(s) to fit the dimensions they require.

Cheers

 

Assign searchResult with a pointer to any instance of searchChar in personName.
#include
#include
int main(void) {
char personName[100] = "Albert Johnson";
char searchChar = 'J';
char* searchResult = NULL;
/* Your solution goes here */
if (searchResult != NULL) {
printf("Character found.\n");
}
else {
printf("Character not found.\n");
}
return 0;
}

Answers

Answer:  

Here it the solution statement:  

searchResult = strchr(personName, searchChar);  

This statement uses strchr function which is used to find the occurrence of a character (searchChar) in a string (personName). The result is assigned to searchResult.

Headerfile cstring is included in order to use this method.

Explanation:  

Here is the complete program

#include<iostream> //to use input output functions  

#include <cstring> //to use strchr function  

using namespace std; //to access objects like cin cout  

int main() { // start of main() function body  

  char personName[100]; //char type array that holds person name  

  char searchChar; //stores character to be searched in personName

  char* searchResult = nullptr; // pointer. This statement is same as searchResult  = NULL    

  cin.getline(personName, 100); //reads the input string i.e. person name  

  cin >> searchChar;    // reads the value of searchChar which is the character to be searched in personName  

  /* Your solution goes here */  

  searchResult = strchr(personName, searchChar); //find the first occurrence of a searchChar in personName  

  if (searchResult != nullptr) //if searchResult is not equal to nullptr  

  {cout << "Character found." << endl;} //displays character found

  else //if searchResult is equal to null  

  {cout << "Character not found." << endl;} // displays Character not found  

  return 0;}  

For example the user enters the following string as personName  

Albert Johnson  

and user enters the searchChar as:  

J

Then the strchr() searches the first occurrence of J in AlbertJohnson.  

The above program gives the following output:  

Character found.

Assign searchResult with a pointer to any instance of searchChar in personName.#include #include int

New forensics certifications are offered constantly. Research certifications online and find one not discussed in this chapter. Write a short paper stating what organization offers the certification, who endorses the certification, how long the organization has been in business, and the usefulness of the certification or its content. Can you find this certification being requested in job boards?

Answers

Answer:

Computer forensics is gathering information or evidence from a computer system in order to use it in the court of law. The evidence gotten should be legal and authentic.

These organization gives certifications for computer forensics

1. Perry4law: they provide training to students, law enforcement officers. There services includes forensics training, research and consultancy.

2. Dallas forensics also offers similar services

3. The New York forensics and electronic discovery also teach how to recover files when deleted, how to get information from drives and how to discover hidden information.

Which tab will you use to format data in cells?

Answers

Answer:

Right Click and select Format Cells (CTRL + 1)

Explanation:

To format cells in Excel, you select the cell(s) you want to format, right click, and in the dialogue box that appears select 'Format Cells'.

Answer:

b

Explanation:

trust me

Other Questions
Consider the map T:P 2 P 1 given by T(a 0 +a 1 x+a 2 x 2 )=(4a 0 3a 2 ) 2 +3a 12 x (a) Calculate T(xx 2 )= (b) Give an example of a non-zero polynomial p(x)P 2 so that T(p(x))=0 p(x)= (c) Does T preserve vector addition? If not, enter two polynomials p(x),q(x)P 2 such that T(p+q)=T(p)+T(q) Otherwise leave the following spaces blank. p(x)=q(x)= (d) Does T preserve scalar multiplication? If not, enter a scalar k and polynomial rP 2 such that T(kr)=kT(r). Otherwise leave the following spaces blank. k= and r(x)= (e) Is T a linear transformation? what is the electron geometry for a molecule that has 1 single bond, 1 double bond and 1 lone pair around the central atom group of answer choices what is capital of andhra pradesh Androgens are hormones that promote the development of ________ characteristics. what obstacles do they face Use series to approximate the value of the integral with an error of magnitude less than 10^-8. integral 0.27 0 sin x/x dx integral 0.27 0 sin x/x dx = (Round to nine decimal places.) When buying highly technical, few-of-a-kind products such as hydroelectric power plants, governments have found that general contractors are reluctant to specify a formal, fixed price for the procurement. Therefore, these contractors use __________ to compensate them for any cost overrunsO at-market pricing O experience curve pricing O cost-plus-fixed-fee pricing O standard markup pricing The sound level (in decibels) of a noise whose intensity is 5.0x10-5 W/m2 is 77 dB. True False Cellular respiration is a ______________process where the bonds in food and __________ molecules are broken, and molecules are rearranged to form new compounds that can provide _____________ to muscles gabriele enterprises has bonds on the market making annual payments, with 17 years to maturity, a par value of $1,000, and selling for $850. at this price, the bonds yield 6.5 percent. what must the coupon rate be on the bonds? market research utilizes data to determine how many different readers there have been of a single issue of a magazine. is the term for this. pass-along readership derived leadership guaranteed circulation primary circulation national rate Suppose the government borrows $20 billion more next year than this year.a. Use a supply-and-demand diagram to analyze this policy. Does the interest rate rise or fall?b. What happens to investment, private saving, public saving, and national saving? Compare the size of the changes to the $20 billion of extra government borrowing.c. How does the elasticity of supply of loanable funds affect the size of these changes?d. How does the elasticity of demand for loanable funds affect the size of these changes?e. Suppose households believe that greater government borrowing today implies higher taxes to pay off the government debt in the future. What does this belief do to private saving and the supply of loanable funds today? Does it increase or decrease the effects you discussed in parts (a) and (b)? Which of the following sentences uses commas appropriately? *1 pointThe woman needed to buy milk, eggs, oil, and flour to make her cookies for her family.The man went to buy eggs, then he saw ice cream but wanted something else instead.People like to visit others, and decorate their houses around the holidays. Why were Enlightenment ideas important to the growth of abolitionmovements in Europe and the United States? A. They argued that race and ethnicity were not important issues. B. They stressed that all people were born with natural rights. C. They were strongly opposed to the idea of absolute monarchy. D. They emphasized the importance of separation of powers. What do local governments use property taxes for?. 2 Your school or college is having a charity 'fun run'. Write a letter to local businesses asking them to sponsor you. You must mention: the cause you are raising money for the place where the run will happen the time it will start. Your letter should be between 50 and 70 words. Do not write an address A tree casts a shadow 15 m long. At the same time, the shadow cast by a 30-cm tall statue is 53 cmlong. Find the height of the tree. Round results to the nearest unit.A) 26 mB) 8 mC) 7 mD) 27m An interview where candidates are placed in a room together and asked to discuss why they are the better fit for the position is known as which type of interview?a. The phone callb. The panel interviewc. The competency testd. The virtual assessment centre Spencer has a retirement account through his employer. His monthly contributions to the account are taken out of his check before payroll taxes are calculated.The fact that his employer sponsors his benefit package, and the contributions are (tax deferred, tax exempt), indicates that Spencers retirement account is a (traditional IRA, Roth IRA, traditional 401k, or a roth 401k. What is conclusive evidence that mixing sugar in water is a physical change