Answer:
information of personnel
Explanation:
The malicious actor that is essentially looked for when attempting a network attack is information of personnel.
Who are malicious actors?
An entity that is partially or completely accountable for an occurrence. It has an impact on or the potential to have an impact on the security of an organization and is referred to as a threat actor, also known as a malicious actor or bad actor.
Actors are typically divided into three categories in threat intelligence: partner, internal, and external. Any individual or group that wreaking havoc online is referred to as a threat actor, also known as a malevolent actor.
They carry out disruptive assaults on people or organizations by taking advantage of holes in computers, networks, and other systems.
Therefore, when attempting a network attack, personnel information is the main harmful actor that is sought after.
To learn more about malicious factors, refer to the link:
https://brainly.com/question/29848232
#SPJ2
A security team has downloaded a public database of the largest collection of password dumps on the Internet. This collection contains the cleartext credentials of every major breach for the last four years. The security team pulls and compares users' credentials to the database and discovers that more than 30% of the users were still using passwords discovered in this list. Which of the following would be the BEST combination to reduce the risks discovered?
a. Password length, password encryption, password complexity
b. Password complexity least privilege, password reuse
c. Password reuse, password complexity, password expiration
d. Group policy, password history, password encryption
Answer:
a. Password length, password encryption, password complexity
Explanation:
Under this scenario, the best combination would be Password length, password encryption, password complexity. This is because the main security problem is with the user's passwords. Increasing the password length and password complexity makes it nearly impossible for individuals to simply guess the password and gain access, while also making it extremely difficult and time consuming for hackers to use software to discover the password as well. Password excryption would be an extra layer of security as it encrypts the password before storing it into the database, therefore preventing eavesdroppers from seeing the password and leaked info from being used without decryption.
n a visual studio c project named using the format firstname lastname 0102 create a program that asks for the size of the triangles. the valid input values are 3, 4, 5, 6, and 7. if a different integer value is entered, it should show the message invalid input. try again. then, repeat the request until a valid input value is entered. with a valid value, create the following four triangles using the size (height) of the triangles. examples of size 3: * ** *** *** ** * * ** *** *** ** *
While loop is used to print triangle of characters, after its execution, the inner while loop prints a single row and the outer while loop aids in printing n rows.
How use while loop to triangle patter of characters?To print the triangle of the character '*' using a while loop or a for loop, where the triangle is one character wide at its narrowest point and N characters wide at its widest point. Then show a blank line, followed by the number of times the '*' character appears in the triangle.Steps are as follows:
Iterates from I = rows to I = 1 in the outer for loop.The first inner for loop prints the required spaces in each row.The second inner for loop prints half of the pyramid (vertically cut), while the final inner for loop prints the other half.The program is as follows:
N = 3
for i in range(0, N +1):
for j in range(1, i + 1):
print("*", end='')
print('')
print('')
To learn more while loop refer to :
brainly.com/question/19344465
#SPJ4
And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase
There were 5 staff members in the office before the increase.
To find the number of staff members in the office before the increase, we can work backward from the given information.
Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.
Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.
Moving on to the information about the year prior, it states that there was a 500% increase in staff.
To calculate this, we need to find the original number of employees and then determine what 500% of that number is.
Let's assume the original number of employees before the increase was x.
If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:
5 * x = 24
Dividing both sides of the equation by 5, we find:
x = 24 / 5 = 4.8
However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.
Thus, before the increase, there were 5 employees in the office.
For more questions on staff members
https://brainly.com/question/30298095
#SPJ8
Question #2
Multiple Select
Hofstede's cultural dimensions describe
Select 2 options
how the world's cultures share six similar values
how the world's cultures differ in six main ways
how different cultures should strive to become the same
how some cultures are better than others
ualistic than
Hofstede's cultural dimensions describe how the world's cultures differ in six main ways and how different cultures should strive to become the same.
What are the scale of lifestyle and its influences?According to Hofstede, the 5 principal dimensions are identity, power, gender, uncertainty, and time. You can reflect on consideration on cultural fee dimensions on a scale or a continuum, in which one element of the fee lies on one aspect of the dimensions and the opposite intense lies at the opposite give up of the dimensions.
To run VBA withinside the “Microsoft Visual Basic for Applications” window, you can surely press the “F5” key button or click on on the “Run” icon withinside the toolbar.The Visual Basic button opens the Visual Basic Editor, in which you create and edit VBA code. Another button on the Developer tab in Word and Excel is the Record Macro button, which routinely generates VBA code that may reproduce the actions that you perform withinside the application.Read more about the Hofstede's cultural dimensions :
https://brainly.com/question/7158663
#SPJ1
Answer:
-how the world’s cultures differ in six main ways
-how some cultures are more individualistic than others
Explanation:
ED22
Formal Writing Assignment: CUNY WAN Modernization Project Spring 2023
The CUNY University System has begun developing programs for enterprising professionals and advanced degree students that want to complete their studies remotely. This emerging need originated when the CUNY University System was operating fully remote due to the Corona virus. There is significant interest in continuing to provide this remote mode of instruction and expand it to new outreach programs within the New York City region. The CUNY University System has hired you to provide help with their modernized WAN that will be needed for developing these new programs.
Providing WAN Services to Remote locations
CUNY University System plans to offer night and weekend classes for professionals and advanced degree students, paralegal students, and nurses, in five “Centers of Excellence” remote locations at each borough of the City of New York.. Its plan is to have professors offer the classes from the main campus site and to use video conferencing and multimedia options at these “Centers of Excellence” remote sites. The CUNY University System main site has a TCP/IP Ethernet network. The remote “Centers of Excellence” sites, which are not yet set up, will also have TCP/IP Ethernet networks.
The CUNY University System Director of Information Technology is asking you to write a proposal for three WAN options (possible candidates are: Frame Relay, Broad Band and MPLS) to connect the “Centers of Excellence” remote sites to the main campus and provide a rationale for each of these options. Your WAN options must provide for the use of voice over IP, video conferencing and multimedia applications. Each WAN option should provide details on the following factors:
How does the technology work?
Bandwidth costs
Bandwidth allocation (how much bandwidth is available/supported) by the method.
Equipment costs associated with the method.
Ability for the method to address future expanded bandwidth requirements.
Ability for the method to incorporate other applications such as voice and video.
Ability for the method to offers fault tolerant options to provide more guaranteed uptime—an important consideration for providing long-distance learning.
Teaching Classes from Home
The CUNY University System president enjoys participating in several classes once a week as a guest speaker or mentor, but she wants to do this from home, so she can spend more time with her family instead of driving back to the main CUNY University System campus, which is about ten miles away.
Write a 1–2-page letter to the CUNY University System president explaining how she might be connected to the main CUNY University System campus network through a particular WAN technology, and why you recommend that WAN technology. One of the requirements is that she needs to be able to use the telephone in her home office while she is connected to the CUNY network.
WAN Connectivity for a Business Incubator
The CUNY University System is starting a business incubator on the main campus. The business incubator provides one year of resources for up to five new small businesses, including a business location and office resources, such as computers, printers, scanners and Internet access. Write a 1–2-page letter to the CUNY University System president explaining to her the WAN connectivity options that are most appropriate for these small businesses, so that it is consistent with what they can use when they leave the incubator facilities.
In order to carry out this assignment, you want to make sure that you research and thouroughly understand the Wide Area Network (WAN) techologies of Frame Relay, Broad Bank, and MPLS.
What else needs to be done?You must present a proposal for each WAN alternative, describing the bandwidth prices, allocation, equipment costs, capacity to handle future bandwidth requirements, include audio and video, and offer fault-tolerant choices.
You would need to submit a letter outlining the proposed WAN technology to link her to the campus network while enabling her to use her phone in response to the CUNY University System president's request to participate in classes from home.
You would also need to produce another letter for the business incubator describing the best WAN connectivity alternatives for small enterprises to use once they depart the incubator facility. Thus,, the project necessitates good research abilities as well as the ability to communicate material clearly and concisely.
Learn more about WAN:
https://brainly.com/question/621746
#SPJ1
XYZ is a well-renowned company that pays its salespeople on a commission basis. The salespeople each receive 700 PKR per week plus 9% of their gross sales for that week. For example, a salesperson who sells 4000 PKR worth of chemicals in a week receives 700 plus 9% of 5000 PKR or a total of 1060 PKR. Develop a C++ program that uses a Repetitive Structure (while, for, do-while) to manipulate each salesperson’s gross sales for the week and calculate and displays that salesperson’s earnings.
Answer:
#include<iostream>
#include<conio.h>
using namespace std;
float calculateGross(float sale)
{
return (sale/100*9) + 700;
}
main()
{
float sale[3] = { 5000,7000,9000}, Totalsale =0;
for(int i=0; i<=2; i++)
{
cout<<"Sales Person "<<i+1<<" Gross Earnings: "<<calculateGross(sale[i])<<" PKR\n";
Totalsale += calculateGross(sale[i]);
}
cout<<"Total Gross Sales Earnings for week: "<<Totalsale<<" PKR\n";
return 0;
}
1. Write a Java application that:
a. asks the user for the daily sales for each day of a week using a repetition loop and calculates its total.
b. calculates the average daily sales for the week
c. displays the total and average sales for the week.
Each of the three components of the program should be handled by a different method.
Here is a Java application that asks the user for the daily sales for each day of a week using a repetition loop and calculates its total, calculates the average daily sales for the week, and displays the total and average sales for the week.
The Programimport java.util.Scanner;
public class WeeklySales {
public static void main(String[] args) {
double[] sales = getDailySales();
double totalSales = calculateTotalSales(sales);
double averageSales = calculateAverageSales(sales);
displaySales(totalSales, averageSales);
}
public static double[] getDailySales() {
Scanner scanner = new Scanner(System.in);
double[] sales = new double[7];
for (int i = 0; i < 7; i++) {
System.out.print("Enter the daily sales for day " + (i+1) + ": ");
sales[i] = scanner.nextDouble();
}
scanner.close();
return sales;
}
public static double calculateTotalSales(double[] sales) {
double totalSales = 0;
for (int i = 0; i < sales.length; i++) {
totalSales += sales[i];
}
return totalSales;
}
public static double calculateAverageSales(double[] sales) {
double totalSales = calculateTotalSales(sales);
double averageSales = totalSales / sales.length;
return averageSales;
}
public static void displaySales(double totalSales, double averageSales) {
System.out.println("Total sales for the week: " + totalSales);
System.out.println("Average daily sales for the week: " + averageSales);
}
}
The getDailySales() method asks the user for the daily sales for each day of the week using a for loop and stores them in an array of doubles. It returns the array.
The calculateTotalSales(double[] sales) method calculates the total sales for the week by adding up all the daily sales in the array. It returns the total sales as a double.
The calculateAverageSales(double[] sales) method calculates the average daily sales for the week by dividing the total sales by the number of days (i.e., the length of the array). It returns the average sales as a double.
The displaySales(double totalSales, double averageSales) method displays the total and average sales for the week to the user using the println() method.
Read more about java program here:
https://brainly.com/question/26789430
#SPJ1
Which of these are examples of how forms are
used? Check all of the boxes that apply.
to input patient information at a doctor's office
O to store thousands of records
to check out books from a library
to choose snacks to buy from a vending
machine
Answer:to input patient information at a doctors office
To check out books from a library
To choose snacks to buy from a vending machine
Explanation:
A. To input patient information at a doctor's office, C. To check out books from a library, and D. To choose snacks to buy from a vending machine are examples of how forms are used. Therefore option A, C and D is correct.
Forms are used in various settings and scenarios to collect and manage data efficiently.
In option A, forms are utilized at doctor's offices to input and record patient information, streamlining the registration and medical history process.
In option C, library check-out forms help manage book borrowing, recording details like due dates and borrower information. Option D showcases how vending machines use forms to present snack options, allowing users to make selections conveniently.
All these examples demonstrate the versatility of forms as tools for data collection, organization, and user interaction, contributing to smoother operations and improved user experiences in different domains.
Therefore options A To input patient information at a doctor's office, C To check out books from a library, and D To choose snacks to buy from a vending machine are correct.
Know more about vending machines:
https://brainly.com/question/31381219
#SPJ5
Use the following cell phone airport data speeds (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.6 0.7 0.7 0.7 0.8 0.8
Answer:
\(P_{10} =0.1\)
Explanation:
Given
\(0.1, 0.1, 0.3, 0.3, 0.3, 0.4, 0.4, 0.4, 0.6, 0.7, 0.7, 0.7, 0.8, 0.8\)
Required
Determine \(P_{10}\)
\(P_{10}\) implies 10th percentile and this is calculated as thus
\(P_{10} = \frac{10(n+1)}{100}\)
Where n is the number of data; n = 14
\(P_{10} = \frac{10(n+1)}{100}\)
Substitute 14 for n
\(P_{10} = \frac{10(14+1)}{100}\)
\(P_{10} = \frac{10(15)}{100}\)
Open the bracket
\(P_{10} = \frac{10 * 15}{100}\)
\(P_{10} = \frac{150}{100}\)
\(P_{10} = 1.5th\ item\)
This means that the 1.5th item is \(P_{10}\)
And this falls between the 1st and 2nd item and is calculated as thus;
\(P_{10} = 1.5th\ item\)
Express 1.5 as 1 + 0.5
\(P_{10} = (1 +0.5)\ th\ item\)
\(P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item\)
From the given data; \(1st\ item = 0.1\) and \(2nd\ item = 0.1\)
\(P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item\) becomes
\(P_{10} =0.1 +0.5(0.1 - 0.1)\)
\(P_{10} =0.1 +0.5(0)\)
\(P_{10} =0.1 +0\)
\(P_{10} =0.1\)
if you want to learn how to perform an action, which feature of the excel window should you use
To learn how to perform an action on Excel Window, the feature you should use is the "Tell Me What To Do" Feature. It can be found on the top right corner above all the ribbons after "Help". This can be activated using the keyboard shortcut keys "Alt + Q".
What is Excel Window?Excel is a popular spreadsheet system that manages data into columns and rows that can be manipulated using formulas that allow the software to perform mathematical functions on the data.
It is software created by Microsoft that uses spreadsheets to organize numbers and data with formulas and functions. Excel analytics is ubiquitous around the world and is used by companies of all sizes for financial analysis
Learn more about Excel:
https://brainly.com/question/25879801
#SPJ1
Which best describes external hardware?
Answer:
Peripherals
Explanation:
devices used to interact with the computer. External hardware devices include monitors, keyboards, mice, printers, and scanners.
Design a modular program that asks the user to enter a distance in kilometers, and then converts that distance to miles. The conversion formula is as follows:
miles=kilometers x 0.6214
Using the knowledge in computational language in C++ it is possible to write a code that asks the user to enter a distance in kilometers, and then converts that distance to miles.
Writting the code:#include<iostream.h>
void convert();
int main()
{
convert();
return 0;
}
void convert()
{
double kilometers,miles;
cout<<"Enter distance in kilometers";
cin>>kilometers;
miles=kilometers *0.6214;
cout<<"Distance in Miles : "<< miles;
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
How do you handle sensitive data?
hope it helps
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
Although you always wanted to be an artist, you ended up being an expert on databases because you love to cook data and you somehow confused database with data baste. Your old love is still there, however, so you set up a database company, ArtBase, that builds a product for art galleries. The core of this product is a database with a schema that captures all the information that galleries need to maintain. Galleries keep information about artists, their names (which are unique), birthplaces, age, and style of art. For each piece of artwork, the artist, the year it was made, its unique title, its type of art (e.g., painting, lithograph, sculpture, photograph), and its price must be stored. Pieces of artwork are also classified into groups of various kinds, for example, portraits, still lifes, works by Picasso, or works of the 19th century; a given piece may belong to more than one group. Each group is identified by a name (like those just given) that describes the group. Finally, galleries keep information about customers. For each customer, galleries keep that person's unique name, address, total amount of dollars spent in the gallery (very important!), and the artists and groups of art that the customer tends to like. Draw the ER diagram for the database. Exercise 3.18 Write SQL statements to create the corresponding relations to the ER dia- gram you designed for Exercise 2.8. If your translation cannot capture any constraints in the ER diagram, explain why.
Artists, with names (which are distinctive), locations of birth, ages, and art forms. "For each work of art, who created it, what year it was created, what is its special title, and what kind of art is it? and its cost must be kept in storage.
What does a SQL ER diagram mean?A visual representation of a table's structure and the connections among logically related tables is an entity-relationship (ER) model. The data model is visualised in ER modelling using an ER diagram (ERD). A better grasp of the entire database structure is provided by an ER diagram.
Why do we draw ER diagram?To illustrate the content of a data store, ERD diagrams are frequently used in combination with a flow chart. They are very helpful when building a relational database since they enable us to broadly visualise how data is connected.
To know more about ER diagram visit:
https://brainly.com/question/29898277
#SPJ4
Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____.
I want know answer for best way to copy formula on MS Access
Answer:
copy and paste is alternate
Which of the following queries can have a fully Meets result?
Answer: we need the awnser key
Explanation:
Questions and Answers the OJT and answer the following:
Please do not copy search and your idea.
1. TELL ME ABOUT YOURSELF.
2. WHAT IS YOUR GREATEST STRENGTH?
3.) WHAT IS YOUR GREATEST WEAKNESS?
4.) HOW MANY HOURS DO YOU NORMALLY WORK PER WEEK?
5.) WHAT IS YOUR AMBITION?
6.) WHAT ARE YOUR SALARY EXPECTATIONS?
7.) WHEN WAS THE LAST TIME YOU WERE ANGRY? WHAT HAPPENED?
8.) WHY DO YOU WANT THIS JOB?
9.) TELL ME ABOUT A TIME YOU MADE A MISTAKE?
10.) ARE YOU WILLING TO RELOCATE OR TRANSFER TO OTHER PLACE FOR WORK?
11.) WHY WE SHOULD HIRE YOU?
What does the % math operation do?
Answer:
The percentage sign %, called modulo (or the remainder operator) is a operator which will find the remainder of two numbers x and y.
Explanation:
Hajar needs to copy files on a Linux system. What command can she use to create a new copy of a file in a different location while preserving the original file
Answer:
cp command
Explanation:
When copying files and directories under a Linux operating systems, we usually make use of the cp command . In Linux, this cp command is the one that is entered in a shell to copy a file from one location to another, and also possibly on another different file system.
Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables
●
.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.
The following is a description of the entities and relationships in the ERD -
CustomersProductOrdersOrder Details How is this so?Customers is a standard entity that stores information about customers, such as their name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.The relationships between the entities are as follows -
A Customer can place Orders.An Order can contain Products.A Product can be included inOrders.The primary keys and foreign keys are as follows -
The primary key for Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product IDLearn more about ERD at:
https://brainly.com/question/30391958
#SPJ1
Pls due soon
Directions: Answer these questions as you navigate through the modules of the Computer Basics Tutorial.
Define computer:
What are the functions of a computer?
Name three ways in which you can use a computer?
Define hardware:
Define software:
Name at least four different types of computers.
What are the two main styles that personal computers come in?
What is the purpose of the operating system?
Name the three most common operating systems for PCs.
What does GUI stand for and what is its purpose?
In what year did Microsoft create Windows?
What is MAC OS?
What is Linux?
Name three operating systems designed specifically for mobile devices?
What is an App?
What are apps for mobile devices called?
Name six types of desktop applications?
Name three examples of mobile apps (does not have to come from the tutorial)?
What is the Cloud?
Name three services that use the Cloud?
Give at least one reason why someone would want to use the Cloud.
Give three examples of web apps?
What are the basic parts of a desktop computer and what purpose does each one serve?
Name two common mouse alternatives?
Name at least five peripherals?
What is the CPU/Processor of a computer?
How is the processor’s speed measured?
What is the motherboard and what purpose does it serve?
What does the power supply unit do?
What is RAM and what is it measured in?
What is a hard drive and what purpose does it serve?
What is the purpose of each of the following:
expansion card
video card
sound card
network card
Bluetooth card
What is a laptop computer and how is it different from a desktop computer?
What is a mobile device? Give three examples.
What is a smartphone?
What are 3G, 4G, and LTEs?
How is a tablet computer different from a laptop? What are some advantages and disadvantages of using a tablet?
What is the desktop and what features does it usually contain?
What is the purpose of using folders on the computer?
What is the purpose of the Recycle Bin?
Name three things you need to access the Internet?
Describe each of the following common types of Inter services:
Dial-up
DSL
Cable
Satellite
3G and 4G
What are some things you should consider when you are choosing and Internet Service Provider?
What is a modem?
What is a router?
What is a network card?
What does Wi-Fi stand for?
What is a web browser and what is its main job?
What is the World Wide Web?
Name three different types of web browsers?
Explain the following security terms:
SSID:
Encryption password
Encryption
Passphrase
What steps do you need to take to keep your computer healthy?
How do you deal with spilled liquid on your keyboard?
How do you clean the mouse and the monitor?
What is malware and what does it include? What is the best way to guard against malware?
In what ways can you back up your computer?
Name several techniques to maintain your computer?
Define computer ergonomics.
What are four general tips to keep in mind when troubleshooting your computer?
What is a flash drive?
What is Cloud storage?
What is the proper way to safely remove a flash drive from the computer?
Name three free popular services that allow you to save data to the Cloud?
What are accessibility features? Name three?
Name three assistive technology devices and what they are used for?
Answer:
Software for personal computers is typically developed and distributed independently from the hardware or operating system manufacturers. Many personal computer users no longer need to write their own programs to make any use of a personal computer, although end-user programming is still feasible. This contrasts with mobile systems, where software is often only available through a manufacturer-supported channel. And end-user program development may be discouraged by lack of support by the manufacturer.
Explanation:
I have a java hangman game and want to add a play again option how do i do that?
please help its worth 30 percent of my grade
Answer:
I'm not sure if this is Java-like (code.org) or an actual compiler you use. But the best way to do it is to use a while loop that continues running the game until the player chooses to exit the game.
Explanation:
public class Hangman {
public static void main(String[] args) {
boolean playAgain = true;
while (playAgain) {
//This asks the player if they want to play again.
System.out.println("Do you want to play again? (y/n)");
Scanner scanner = new Scanner(System.in);
String input = scanner.nextLine();
if (input.equals("n")) {
playAgain = false;
}
}
}
}
(Rough example haven't done java in a min but it could work?)
There are obvious problems with the American system: the influence of money on politics, the influence of an electoral system that is increasingly misaligned with "democratic" choices, but America seems incapable of reforming itself.
The American political system, without a doubt, has flaws and challenges. Money's influence in politics, as well as the potential misalignment of the electoral system with popular will, are both important considerations that have been the subject of ongoing debate and discussion.
What is democracy?Democracy is a form of government in which the people have the power to deliberate and decide on legislation, or to elect governing officials to do so.
Money politics, identity politics, wrangling between political parties, political polarization, social division, racial tension, and wealth disparities have all gotten worse.
All of this has harmed the functioning of democracy in the United States.
Without a doubt, the American political system has flaws and challenges. Money's influence in politics, as well as the electoral system's potential misalignment with popular will, are both critical considerations that have been the subject of ongoing debate and discussion.
Thus, it is true that there are obvious problems with the American system.
For more details regarding democracy, visit:
https://brainly.com/question/13158670
#SPJ1
Devices used to aid in performing tasks are _____.
qualifications
tasks
skills
tools
Devices serve as a tool to carry out associated work while doing duties. Hence, option D is correct
What are devices in computers?The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware. Software, on the other hand, is a collection of instructions that may be stored and executed by hardware.
A computer is a multifunctional tool that can execute a finite number of jobs and accept input, process data, store data, etc. Tools act as a device aid in performing tasks.
Thus, option D is the correct answer
learn more about computer aids:
https://brainly.com/question/14039774
#SPJ1
ERIC'S Company sells cement at 30.0 Ghana Cedis per bag. The company
however gives discount of 15% for customers that buy 100 or more bags, and 0% for
customers that buy less than 100 bags.
Write a pseudo code and present a flowchart that
will display the discount percentage when the quantity of bags purchased is entered.
Answer:
The pseudocode is as follows:
Input Quantity
Discount = 0%
If Quantity >= 100:
Discount = 15%
Print Discount
See attachment for flowchart
Explanation:
This line gets the quantity from the user
Input Quantity
This line initializes the discount to 0%
Discount = 0%
This checks if quantity is more than or equal to 100
If Quantity >= 100:
If yes, discount is set to 15%
Discount = 15%
This prints the discount percentage
Print Discount
See attachment for flowchart
is a colon (:) and semicolon (;) important in CSS declaration?
Answer:
YES
Explanation:
this is very important
kendra is worried about the difference between a security procedure and a baseline. what is the correct definition of eadch
Answer:
The answer is below
Explanation:
Security Procedure is a term often used in Computer Science, to describe strategies and techniques employed in confirmation or recognizing differences in electronic data of various individuals. It involves the application of codes and other sequential calculations to carry out this procedure.
While baseline is a term often used in computer to describe a set of characteristics of a product or a form of the reference point in which comparison can be made for various products of similar characteristics. It can also mean the starting point of project work.
An engineer is designing an HTML page and wants to specify a title for the browser tab to display, along with some meta data on what tools the page should use. These items would best fit in which of the following sections
a. The element
b. The element
c. The
element
d. The
An HTML is made up of several individual tags and elements such as the head, body. form, frame and many more.
In an HTML page, the meta element and the title element are placed in the head element.
An illustration is as follows:
< head >
< title > My Title < /title >
< meta charset="UTF-8" >
< / head >
The head element contains quite a number of elements and tags; some of them are:
metatitle stylescriptbaseAnd so on.
Hence, in order to use a meta-data element, the meta element has to be placed within the head element.
Read more about HTML elements at:
https://brainly.com/question/4484498