In this program, we will calculate the area of a triangle and a rectangle using the procedure outlined in the preceding question using the C++ programming language's class and object concept:
Coding Part:
#include<iostream.h>
#include<conio.h>
#include<stdio.h>
#include<string.h>
//class shape
class Shape
{
public:
double height,base;
//height and base are given initial values by the constructor.
Shape()
{
height=0;
base=0;
}
//get_data() function to get values of height and base
void get_data()
{
cout<<"\nEnter height and base to compute are :";
cin>>height>>base;
}
//declaration of virtual function display_area()
virtual void display_area()
{
}
};
//class triangle inheriting class Shape
class Triangle : public Shape
{
public:
//redefining function display_area()
void display_area()
{
cout<<height;
cout<<"\nArea of Triangle = "<<(height*base)/2;
}
};
//class Rectangle inheriting class Shape
class Rectangle : public Shape
{
public:
/redefining function display_area()
void display_area()
{
cout<<"\nArea of Rectangle = "<<height*base;
}
};
void main()
{
clrscr();
Shape *s;
Triangle t;
t.get_data();
s=&t;
s->display_area();
Rectangle r;
r.get_data();
s=&r;
s->display_area();
getch();
}
To know more about Programming in C++, visit: https://brainly.com/question/13441075
#SPJ4
which protected premises system enables emergency responders to identify the general location of alarm device activation?
Fire-alarm system annunciation, allows emergency services to identify the general location of the alarm device activation.
By providing a unique address for each alarm device, firefighters and other emergency personnel can quickly identify where the fire is located and respond appropriately.
Advantages of fire alarm systems using annunciationIncreased safety: Fire alarm systems with annunciation provide an audible warning in the event of a fire, allowing occupants to evacuate quickly and safely.Increased accuracy: Annunciation systems offer detailed information on the exact location of a fire, allowing emergency services to respond more quickly and accurately.Reduced liability: Annunciation systems provide detailed information on the cause of a fire, helping to reduce legal liability for property owners.Cost-effectiveness: Annunciation systems can be connected to existing fire alarm systems, eliminating the need to purchase additional equipment.Learn more about Fire-alarm system annunciation:
https://brainly.com/question/29575897
#SPJ4
When a model car speeds up to three times its original speed, its kinetic energy.
For a threefold increase in speed, the kinetic energy will increase by a factor of nine.
What is kinetic energy?Energy is a physical quantity that allows a thing to perform labor. When an object performs work, only objects with kinetic energy, potential energy, or both (mechanical energy) can perform that work.
Since electrical energy is produced by an electric charge flow, it can either be potential or kinetic energy. Using a battery as an example, we can see that it contains electrical potential energy while charging.
Kinetic Energy's formula is KE = 1/2 mv2. Because mass and kinetic energy are directly correlated, an object's kinetic energy rises as mass does. The same may be said for velocity.
Due to the fact that kinetic energy is proportional to the square of speed, increasing speed results in an increase in kinetic energy.
To learn more about kinetic energy refer to:
https://brainly.com/question/25959744
#SPJ4
Every keystroke and every mouse click creates an action, or ________, in the respective computer device.
In the appropriate computer device, each keypress and mouse click results in an action, or event.
Describe a device.
A display device is an output tool for information presentation in tactile or visual form (the latter used for example in tactile electronic displays for blind people). An electronic screen is one that uses an electronic current as part of its input information. A computer that is portable—also known as a visual interface be handled and used in the hands. Mobile phones often have a touchscreen interface, a flat LCD and OLED screen, and either physical or digital buttons. They might even have a real keyboard. Many of these gadgets have Internet connections and can communicate with other devices.
To know more about device
https://brainly.com/question/11599959
#SPJ1
HBO and Showtime are both considering producing new television shows. They could produce either a romantic comedy or a historical drama. The profits are illustrated in the following payoff matrix. Use the table shown here to answer the three true false questions that follow. Note: these questions are taken from Study Problem 2 in Chapter 18 of your textbook. Showtime produces romantic Showtime produces historical comedy drama HBO produces HBO receives $19 million profit HBO receives $22 million profit romantic Showtime receives $13 million Showtime receives $10 million comedy profit profit HBO produces HBO receives $30 million profit HBO receives $25 million profit historical Showtime receives $14 million Showtime receives $8 million drama profit profit Question 8 3 pts If HBO chooses to produce a romantic comedy, then Showtime's best response is to produce a historical drama. [Select] HBO's best response is to always produce a historical drama. [Select ] Showtime's best response is to always produce a romantic comedy. [Select]
The ideal response from HBO is usually to create a historical drama- True. False: If HBO decides to make a romantic comedy, Showtime's best reaction is to do the same. The best way for Showtime to unwind is to create a romantic comedy- True.
The graph's information allows us to determine the profit of HBO and Showtime in light of several scenarios, including:
HBO's income from producing fragrant comedies are $ 19 million and Showtime's are $ 13 million (Showtime)
If Showtime makes a historical drama and HBO does a romantic comedy, the profits are $22 million for HBO and $ 10 million for Showtime, respectively (Showtime)
The revenues from a historical drama produced by HBO and Showtime are $ 25 million (HBO) and $ 8 million (Showtime) (Showtime)
If Showtime produces a romantic comedy and HBO a historical drama, the profits are $30 million for HBO and $14 million for Showtime.
This leads us to the conclusion that:
Because it makes between $ 25 million and $ 30 million per historical drama it produces, HBO's best reaction is usually to do so. On the other hand, it makes between $ 19 and $ 22 million from producing romantic comedies.
When HBO decides to produce a romantic comedy, Showtime's best answer is to produce a historical drama, yet this is untrue because Showtime makes more money producing historical drama than it does when HBO produces a romantic comedy ($10 million against $13 or $14 million).
Given that its profits from producing comedies are between $ 13 and $ 14 million and those from making historical dramas are between $ 10 and $ 8 million, Showtime's best solution is to make comedies.
To know more about million click here:
https://brainly.com/question/13676185
#SPJ4
Briefly explain how manufacturers have updated the materials used in automobiles.
Discuss some future trends in the automobile industry, such as electric cars and self-driving cars
1989 suzuki swift ran up to 60 miles per gallon
2008 tato nano ran up to 80 miles per gallon using an air compression engine
if the oil is warmed diesel cars can use filtered cooking oil called biodiesel that restaurants have used again and again in restaurants and can no longer use
its is rumored that cuba has converted much of its sugar into ethanol or alcohol to be used in cars that use gasoline when the soviet union stopped providing them with oil / gasoline
its also been guessed that when alcohol was illegal in america, the illegal alcohol (moonshine) sold that was made in homes were also used to fuel the moonshiners cars
average cars nowadays still only do 30+ miles per gallon even if they're hybrid electric cars
materials used in automobiles have to be light like
aluminum , plastic , lightweight steel, glass, rubber and carbon fiber
less weight means less gas used
weight of the lithium battery for hybrid cars still makes many new cars somewhat heavy
elon musk made the largest mass produced electric car called tesla
musk is trying to make a mass produced self driving car
right now its tesla has only auto pilot feature meaning driver has to have his hands on the steering wheel at all times
ford and gm plan to make a self driving in 5 years
tesla
investopedia
Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?.
Since Jerry has a problem with a package he just received—two items from his order are missing. The person that he should contact to resolve the problem is Customer service representative.
What does a customer service agent do?By giving useful information, responding to inquiries, and handling complaints, a customer service representative helps customers. They serve as clients' and customers' first point of contact and work to make sure that customers are happy with the goods, services, and features.
Note that Customer service agents pay attention to customers' inquiries and provide answers. They often assist customers in resolving issues, processing orders, and getting information about the goods and services offered by an organization.
Therefore, based on the scope of their work, they can be able to answer Jerry's problem.
Learn more about Customer service representative from
https://brainly.com/question/26546102
#SPJ1
When filtering records in a query, the expression must return what kind of value?
a. a maximum or minimum value
b. a single text value
c. a positive number value
d. a true or false value
When filtering records in a query, the expression must return this kind of value: a. a maximum or minimum value.
What is DBMS?In Computer technology, DBMS is an abbreviation for database management system and it can be defined as a collection of software applications that enable various computer users to create, store, modify, migrate (transfer), retrieve and manage data items in a relational database.
What is query?A query simply refers to a computational request for data that are stored in a database table, from existing queries, or even from a combination of both a database table and existing queries.
In database management system (DBMS), we can reasonably infer and logically deduce that when the expressions MIN() or MAX() are used in a structured query language in filtering records in a query, either a maximum or minimum value would be returned and this typically corresponds to the values that are located at the top or bottom portion in a data field respectively.
Read more on database here: brainly.com/question/13179611
#SPJ1
You suspect a bad video driver is causing a user's system to randomly crash and reboot. Where wouldyou go to identify and confirm your suspicions?Application logsSyslogSIP logsDump files
Several software drivers may malfunction as a result of high CPU consumption. The typical symptoms include excessive heating and your programs' generally poor response times.
Stop all resource-intensive programs from consuming the system's memory in such situations. Playing 4K games with an integrated GPU rather than a dedicated one can also result in problems. Check your integrated GPU's ability to handle graphically demanding apps. If not, think about investing in a dedicated GPU. The incorrect launch option may cause an incompatible video setting to be used when the game first launches, resulting in the display driver crash error message. We'll walk you through setting up the launch options on outside gaming servers like Steam.
Learn more about system here-
https://brainly.com/question/13992507
#SPJ4
Fill in the blank: when you execute code in the source editor, the code automatically also appears in the___ a. Files tab b. Plots tab c. R console d. Environment pane
When you execute the code in source editor, then the code automatically also appears in the R console. Hence, option 'C' is the right answer.
What is source editor?A text editor programme called a source-code editor can be used to edit the source code of computer programmes. It could be a standalone application, one that is incorporated into an IDE, or a web browser.
A source-code editor is a fundamental piece of programming hardware because writing and editing source code is a fundamental task for programmers.
A few of the features that source-code editors have are brace matching functionality, autocomplete, syntax highlighting, and indentation. These features are designed to make typing source code simpler and faster. These editors also provide a simple way for users to start a compiler, interpreter, debuger, or other software-development-related programme.
Learn more about source code
https://brainly.com/question/29661963
#SPJ1
A developer has requested permission to build a large retail store at a location adjacent to the intersection of an undivided four-lane major road and a two-lane minor road. Traffic on the minor road is controlled by a stop sign. The speed limits are 35 and 50 mi/hr on the minor and major roads, respectively. The building is to be located at a distance of 65 ft from the near lane of one of the approaches of the minor road. Determine where the building should be located relative to the centerline of the outside lane of the major road in order to provide adequate sight distance for a driver on the minor road to turn right onto the major road after stopping at the stop line. Design vehicle is a multiple-unit truck. Lanes on the both roadways are 12 ft wide. Grades are approximately level.
Answer:
Determine where the building should be located relative to the centerline of the outside lane of the major road in order to provide adequate sight distance for a driver on the minor road to turn right onto the major road after stopping at the stop line. Design vehicle is a multiple-unit truck. Lanes on the both roadways are 12 ft wide. Grades are approximately level.
:
what is one benefit of placing voip gateways in geographically separated branch offices that have an existing wan connection?
To enable WAN connectivity, less priced VoIP gateways can be employed in place of pricey routers and modems.
when VoIP calls have odd sound effects due to severe jitter. whenever VoIP data uses an excessive amount of your network's bandwidth. when callers talk over one another due to network latency. a technique for data compression to reduce bandwidth usage. The codec G. 722 should be used initially, followed by the codec G. 711, if you prefer higher call quality. However, set G if lesser bandwidth is a problem. By using a broadband Internet connection rather than an ordinary (or analog) phone line, Voice over Internet Protocol (VoIP) technology enables voice calls to be placed.
Learn more about bandwidth here-
https://brainly.com/question/13079028
#SPJ4
The adoption of ________ has been an important factor in the development of the internet of things.
Since files are now easier to find and access, the same business may provide better customer service while spending less on storage.
What role of adoption in development of the internet?There are numerous stages to the process, which are typically characterized by the demographics of those that employ the technology. As an illustration, innovators are the very first people to create a technology.
Therefore, The adoption of IPv1 has been an important factor in the development of the internet of things.
Learn more about adoption here:
brainly.com/question/18223114
#SPJ1
What is the correct port number that should be used with the winscp or cyberduck secure file transfer program?.
Port 22 is the right one to use for Secure File Transfer Protocol (SFTP).
How does protocol work?
A protocol is a collection of instructions for exchanging data. Each step and process of communication between a number of computers has a set of rules that apply to it. For networks to transport data successfully, they must abide by certain guidelines. Protocols puts out the rules for communication and give specifics on the steps taken during data transmission. Multiple protocols may run concurrently on a single process. A protocol family is developed as a result of this protocol coordination.
To know more about protocol
https://brainly.com/question/27581708
#SPJ4
you want to store your computer-generated audit logs in case they are needed in the future for examination or to be used as evidence in the event of a security incident. which method can you use to ensure that the logs you put in storage have not been altered when you use them in the future?
Answer:
Create a hash of each log
Explanation:
PLEASE HELP
THIS IS A BEGINNER’S COMP SCI CLASS AND THE LANGUAGE IS JAVA!
Answer:
is this you looking for?
import java.util.Scanner;
public class PIN {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int pin = 1234;
int userPIN = 0;
int attempts = 0;
while (userPIN != pin && attempts < 3) {
System.out.print("Enter your PIN: ");
userPIN = input.nextInt();
if (userPIN != pin) {
System.out.println("Invalid PIN, try again");
attempts++;
}
}
if (attempts == 3) {
System.out.println("Attempt limit exceeded. Account has been locked");
} else {
System.out.println("Access granted");
}
}
}
A source of emf is connected by wires to a resistor, and electrons flow in the circuit. The wire diameter is the same throughout the circuit. Compared to the drift speed of the electrons before entering the resistor, the drift speed of the electrons after leaving the resistor is.
The drift speed of the electrons after leaving the resistor is same.
What is drift speed?Drift is the sluggish approach to something or anything. Drift velocity is the average speed of charged particles moving through a medium as a result of an electric field.
The average speed at which electrons "drift" in the presence of an electric field is known as drift velocity. The electric current is a result of the drift velocity (or drift speed). Thermal velocity, on the other hand, results in random motion that generates collisions with metal ions.
A change in mass causes an electron moving in a crystal lattice to move similarly to a free electron, as was previously demonstrated. This fact enables us to describe the motion of electrons and holes in a semiconductor device using the classical equations of motion.
To learn more about drift speed refer to:
https://brainly.com/question/12911661
#SPJ4
smartphones and tablets currently outsell laptop and desktop computers. this statement describes the trend known as .
At the moment, tablets and smartphones outsell laptops and desktops. The term "Mobile Revolution" describes the style in question.
What does revolution mean?
When the populace rebels against the government, usually because of systematic injustices (administrative, social, or economic), or governmental incompetence, a revolution is defined in political science as a fundamental and comparatively fast change in the political politics and influence structure. Revolutions have taken place through human history, and they can differ considerably in terms of their tactics, length, and underlying ideologies. Major alterations in culture, the economy, and political institutions are the result of their actions, which typically follow views of excessive authoritarianism or plutocracy.
To know more about revolution
https://brainly.com/question/29352502
#SPJ4
how does unsolicited and unwanted e-mail pose a security risk to companies? group of answer choices viruses spread through e-mail attachments. hackers enter systems through e-mail. firewalls can be breached by e-mails. e-mail increases worker productivity. each e-mail requires a reply.
Unsolicited and unwanted e-mail poses a security risk to companies because viruses spread through e-mail attachments.
Thus, the correct option is A.
Why are unsolicited and unwanted e-mails dangerous?One of the most serious problems thаt аffect corporаte e-mаil security is the spreаd of viruses. Mаny e-mаils, sent by unknown senders, contаin аttаchments or mаlicious content, which when executed cаn contаminаte the equipment аnd bring incаlculаble dаmаge to the compаny.
Аlmost аny kind of threаtwаre or mаlwаre, including viruses, spywаre, аnd rаnsomwаre, cаn be delivered viа аn e-mаil аttаchment. While opening аne-mаil is generаlly not dаngerous, once you interаct with it in some wаy, usuаlly by opening аn аttаchment thаt looks like аn executаble file, the mаlwаre is delivered into your e-mаil аnd computer where it cаn then wreаk hаvoc.
For more information about unwanted e-mails refer to the link:
https://brainly.com/question/11427348
#SPJ4
how many linked lists are used to represent a graph with n nodes and m edges, when using an edge list representation? question 5 options: m m*n n n
The number of linked lists that are used to represent a graph with n nodes and m edges, when using an edge list representation is option B: n.
What purposes serve linked lists?A linked list is a linear grouping of data pieces in computer science whose order is not determined by their actual location in memory. Instead, every part relates to the one before it. It is a data structure made up of a number of nodes that collectively stand for a sequence.
Therefore, Because of how quickly they may be added to and removed, linked lists are frequently used. The implementation of stacks, queues, and other abstract data types can be done using them. Linked Lists often come in three different forms.
Learn more about linked lists from
https://brainly.com/question/20058133
#SPJ1
Answer: the correct graph is the one that shows a horizontal segment, followed by a positive slope segment, followed by a flat segment, and then a negative slope segment that is option B.
What is graph?
In mathematics, a graph is a visual representation of a set of objects and the connections between them. The objects, which are often called vertices or nodes, are typically represented by points or circles on the graph. The connections between the objects, which are often called edges or arcs, are typically represented by lines or curves connecting the points or circles.
Here,
To represent Marie's situation in a graph, we need to plot her golf cart's distance from the first hole over time. Let's analyze the given information to determine what the graph should look like.
For the first 30 minutes, Marie stayed at the first hole, so her distance from the first hole would be 0 during that time.
For the next 2 hours, Marie drove away from the first hole. Her distance from the first hole would increase during this time.
After 2 hours of driving, Marie stopped for lunch. Her distance from the first hole would remain constant during this time.
After lunch, Marie took 2 more hours to drive back to the first hole. Her distance from the first hole would decrease during this time.
The x-axis represents time in hours, and the y-axis represents distance from the first hole in miles. The graph starts at the origin, where the golf cart stays for the first 30 minutes, and then goes up with a positive slope for 2 hours as the golf cart moves away from the first hole. Then, the graph remains flat for 1 hour during lunch, before going down with a negative slope for 2 hours as the golf cart returns to the first hole.
As a result, the right graph is option B, which displays a horizontal section followed by a positive slope segment, a flat segment, and then a negative slope segment.
Explanation:
In the context of planning a training program, even though it is time-consuming, putting together a/an _______ is worthwhile because it helps an organization clarify training objectives, compare vendors, and measure results.
Answer: a request for proposal
Explanation:
this is the answer I put on my test hope this helps
A computer randomly generates numbers 1 through 100 for a lottery game. Every lottery ticket has 7 numbers on it. Identify the correct experiment, trial, and outcome below: Select all that apply: The experiment is the computer randomly generating a number The experiment is the computer randomly generating a number less than 10. A trial is one number generated. The trial is identifying the number generated. An outcome is the number 2 being generated. The outcome is the number being randomly generated.
Since the computer randomly generates numbers 1 through 100 for a lottery game. The correct experiment, trial, and outcome are:
The experiment is the computer randomly generating a number.A trial is one number generated.An outcome is the number 2 being generated.What does the word "random" mean in the context of an experiment?A Detailed Description of a Random Situation can be Any clearly defined procedure that yields an observable result that could not be entirely predicted beforehand is considered a random experiment. In order to avoid any ambiguity or surprise, a random experiment must be clearly defined.
Based on the above experiment, one can say that A planned procedure carried out in a controlled environment is called an experiment. The experiment here is to produce a random number.
Hence, One way an experiment can happen is through a trial. One number is generated as a test in this case.
Therefore, A result is any one of the experiment's potential outcomes. Any number between 1 and 100 may result in this situation.
Learn more about experiment from
https://brainly.com/question/17274244
#SPJ1
Write a hashing algorithm for social security numbers (ex. 124-34-5438) that would have 32 possible values, zero included. Note: THIS IS NOT A CLASS OR A PROGRAM, JUST A FORMULA! Write a description of how it would work, and tell me where the sample above would resolve to as a hash. Java
This hashing algorithm would work by converting the social security number into an integer and then performing a modulo operation on that number.
what is hashing algorithm
The modulo operation would be performed with a prime number that is larger than 32 such that the number can be divided up into 32 possible values, 0 included. For example, the prime number 41 could be used for this operation. The algorithm would take the individual digits of the social security number, convert them into an integer, and then add them all together. This integer would then be divided by 41 and the remainder would be the hash value. For the example social security number provided (124-34-5438), the algorithm would first convert each number into an integer (1, 2, 4, 3, 4, 5, 4, 3, 8) and add them all together (34). Then, 34 divided by 41 yields a remainder of 8, so the hash value of this social security number would be 8.
To know more about hashing algorithm
https://brainly.com/question/16985314
#SPJ4
___ is a video-sharing website owned by where users can upload, view, and comment on videos.
You tube is is a video-sharing website owned by where users can upload, view, and comment on videos.
What is the You tube?You Tube is a social networking and internet video-sharing service with its main office in San Bruno, California. The date of its introduction was February 14, 2005.
A program that makes it possible to share videos. Any program that records videos and has a menu choice for transferring the clip can be referred to as a video-sharing app. Any local or cloud storage solution that facilitates file sharing may also be referred to as it.
Therefore, Users can upload, view, and comment on videos on the video-sharing website you tube, which is owned by.
To learn more about You tube, refer to the link:
https://brainly.com/question/532899
#SPJ1
a customer calls in a problem that a printer isn't working. when the technician arrives, what is one of the first things the technician should check?
it is the responsibility of a routing algorithm to determine the cost of an output link. group of answer choices true false
FALSE. The price of an output connection is something that a routing algorithm decides.
Algorithm: What is it?
An algorithm for sorting is one that arranges the items in a list, according to computer science. The two orders that are most frequently employed are lexicographical and numerical order, both in ascending or descending order. For other algorithms (including search and merger algorithms) which require input data to be in part of a sample, efficient sorting is crucial to maximizing their efficiency. Data canonicalization and the creation of output that is readable by humans both benefit greatly from sorting.
To know more about algorithm
https://brainly.com/question/24953880
#SPJ4
The open source movement makes _____ available to everyone in an effort to continue to build and improve the functionality of open source software.
The open source movement makes Source Code available to everyone in an effort to continue to build and improve the functionality of open source software.
What is Open Source software?
A piece of software that is open source is one whose source code is available for anyone to review, edit, and improve.
Most computer users never see the "source code," which is the code that computer programmers can update to alter how a piece of software—a "program" or "application"—works. Programmers can improve a computer program by adding new features or fixing any problematic sections when they have access to the source code.
To know more about Open Source Software, visit the given link:
https://brainly.com/question/4593389
#SPJ4
Which of the following modules provides a function for formatting currency in the US, UK, or parts of Europe? a. locale b. decimal c. math d. currencyl
Locale modules provides a function for formatting currency in the US, UK, or parts of Europe
Locale ModuleThe locale module opens access to databases and local POSIX functionality. POSIX local mechanisms allow programmers to address specific cultural issues within an application without needing to know all the details of the country in which the software is running. This Locale module is related to the programming language that is widely used by developers recently, namely Python.
Learn more about POSIX use: https://brainly.com/question/29407854
#SPJ4
many police departments coordinate youth-oriented programs as part of their prevention efforts. which of the following is not an example of such programs? group of answer choices midnight basketball explorer and mentoring programs seamless summer option (sso) wilderness clubs
Many police departments coordinate youth-oriented programs as part of their prevention efforts. The option that is not an example of such programs is option D: wilderness clubs.
What makes youth programming important?The first and most obvious is maybe that we have helped young people and the adults in their life develop meaningful relationships by providing them with the means to engage with their communities successfully.
While the AFP has main responsibility for situations involving the suppression of insurgencies and other major threats to national security, the PNP enforces laws and ordinances and fulfills statutory obligations.
Therefore, one can say that the target audience for youth programming is anyone between the ages of 10 and 25. The majority of the mentioned activities are designed to promote juvenile development through leisure, social interaction, prevention, intervention, or education. The option selected is not part of them because it is not in the scope of police work.
Learn more about youth-oriented programs fromhttps://brainly.com/question/1280815
#SPJ1
A local pizza parlor provides pizzas in the following sizes: Small, Medium, or Large. Customers also have a choice of a maximum of five toppings that can be added. If the user enters a value greater than 5, an appropriate message should be shown alerting the user and allowing them to re-enter the value. A delivery fee of $300 is charged as a flat rate, this is only applied if the pizza size is not large. The user is required to pay a tax of 17.5%. The program must print the sub-total, taxes, the amount of money the customer is required to pay based on the order given, and change to be tendered, and the name of the Cashier . Your program is to execute as many times until the user presses Y to exit. Use Appropriate FUNCTIONS are part of your solution.
Now the cost per pizza is calculated as follows:
pizza_cost = base_price + ( number_of_toppings * cost_per_topping ) + delivery cost + taxes
which kind of virus operates only in memory and usually exploits a trusted application like powershell to circumvent traditional endpoint security solutions?
File less virus operates only in memory and usually exploits a trusted application like PowerShell to circumvent traditional endpoint security solutions
What is meant by File less virus ?A sort of harmful behaviour known as "fileless malware" use native, lawful tools that are already present in a system to carry out a cyberattack. File less malware is more difficult to detect than regular malware since it doesn't require an attacker to install any code on a target's system.
Malicious software that leverages trustworthy apps to infect a computer is known as file less malware. It is difficult to detect and get rid of because it does not rely on files and leaves no traces.
Malicious software known as "file less malware" does not use virus-filled files to infect a host. Instead, it uses malicious code to run in resident memory by taking advantage of programmes that are frequently used for legal and acceptable activity.
To learn more about Files less malware refer to :
https://brainly.com/question/29549268
#SPJ1