Why are your interactive ads so broken?
Why do you charge people for answers you aren't even answering, the people are doing all your work for you?
Answer:
lol truuuue
Explanation:
*When a computer programmer is finished writing or developing a program, what has to happen first before the computer can understand and utilize the code?
A.a service pack needs to be applied to the newly created program
B.the object code has to be translated into source code C.the source code has to be translated into object code
D.a device driver for the program has to be installed E.the programmer needs to obtain a software license
Answer:
C. The source code has to be translated into object code.
Specifically, you will write two policies to ensure web server software and web browsers are secure. Your policy statements will describe the goals that define a secure application. Consider the following questions for web server software and web browsers: 1. What functions should this software application provide? 2. What functions should this software application prohibit? 3. What controls are necessary to ensure this applications software operates as intended? 4. What steps are necessary to validate that the software operates as intended? Tasks Create two policies—one for web server software and one for web browser clients. Remember, you are writing policies, not procedures. Focus on the high-level tasks, not the individual steps. Use the following as a guide for both policies: ▪ Type of application software ▪ Description of functions this software should allow ▪ Description of functions this software should prohibit ▪ Known vulnerabilities associated with software ▪ Controls necessary to ensure compliance with desired functionality ▪ Method to assess security control effectiveness
Answer:
Navigate to Prohibit Software from the Inventory tab. This will list the details of all the software that are already prohibited.
Click Add Prohibited Software. This will open the Add Prohibited Software dialog listing all the software detected in the managed computers. You should have scanned the Windows systems at least once to have the details of the software here.
Select the software that you wish to prohibit and move them to Prohibited List.
Note: In case you have grouped certain software and you are adding that Software
Write a Java program that prompts for integers and displays them in binary. Sample output: Do you want to start(Y/N): y Enter an integer and I will convert it to binary code: 16 You entered 16. 16 in binary is 10000. Do you want to continue(Y/N): y Enter an integer and I will convert it to binary code: 123 You entered 123. 123 in binary is 1111011. Do you want to continue(Y/N): y Enter an integer and I will convert it to binary code: 359 You entered 359. 359 in binary is 101100111. Do you want to continue(Y/N): y Enter an integer and I will convert it to binary code: 1024 You entered 1024. 1024 in binary is 10000000000. Do you want to continue(Y/N): n
Answer:
Explanation:
The following code is written in Java and creates a loop that cycles the same prompt until the user states no. While the loop runs it asks the user for an integer value and returns the binary code of that value
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
boolean continueLoop = true;
while (continueLoop) {
System.out.println("Would you like to continue? Y/N");
String answer = in.nextLine().toLowerCase();
if (answer.equals("y")) {
System.out.println("Enter int value: ");
int number = in.nextInt();
System.out.println("Integer: "+number);
System.out.println("Binary = " + Integer.toBinaryString(number));
} else if (answer.equals("n")){
System.out.println("breaking");
break;
}
}
}
Not only did 1 in 4 teenagers experience online abuse, but how many are exposed to it
Answer: lots of teens will get this from cyber bullying and some people will mostly expeirience it because they are not as popular as others
Explanation:
9% of U.S. teens have been bullied or harassed online, and a similar share says it's a major problem for people their age. At the same time, teens mostly think teachers, social media companies and politicians are failing at addressing this issue.
PLEASE SOMEONE ANSWER THIS
If the old code to a passcode was 1147, and someone changed it, what would the new code be?
[I forgot my screen time passcode please someone help I literally can’t do anything on my phone.]
2. A technology to connect various people using computers
Answer:
Network technologies allow two or more computers to connect with each other. The most common of these technologies include Local Area Network (LAN), Wireless Area Network (WAN), the Internet via client servers and Bluetooth.
With which type of test question should you leave yourself extra time to answer?
multiple choice
matching
essay
true/false
Answer:
c
Explanation:
Answer:
C bc essays take longer than matching and multiple choice
Put the steps in order to produce the output shown below. Assume the indenting will be correct in the program.
52
53
82
83
1. Line 1
for numB in (5,8]
2. Line 2
for numA in [2,3]:
3. Line 3
print (numB, numA)
SUBMIT ANSWER
ASK FOR HELP
TURN ITIN
2014 Cylyonne All right reserved
Which of the following is a key difference between a Windows 7 restore point and one you set yourself?
Windows 7 restore points are not all-inclusive, while those you set manually are.
Windows 7 restore points take far longer to initiate a restore point, while it’s faster when you do it yourself.
Windows 7 restore points are set automatically.
Windows 7 restore points are reliable so you won’t have to deal with a corrupted system configuration.
Answer:
Windows 7 restore points are not all-inclusive, while those you set manually are.
Explanation:
The relationship between social media and the Internet is complex. Individual Internet behavior involves a myriad of factors that contribute either safety or risk-taking behaviors that can begin in adolescence. Discuss risks currently derived from online interactions, including coverage of violence trending on social media and identification of its characteristics. Be sure to include at least one example (case) that demonstrates this relationship.
Answer:
Explanation:
The internet could be regarded has a marketplace or platform which gives individuals, businesses the opportunity to interact, relate, access opportunities, learn in an easy manner with the help of a data connection. The internet has redefined the process and concept of acesing information and interaction with the ease and coverage it brings. The Social media is could be seen a part of the internet platform which allows people to relate and interact, make friends, promote brands and so on. The internet and social media platforms however, in spite of its huge benefits comes with its inherent risk. Including the surge in cyber crime, immorality and information theft to mention a few. Common scenarios whereby banking details are being stolen from databases resulting in wholesale illegal transfer of funds. Issues of blackmail and violent defamation by groups of cohorts has also been a con in the advent of internet and social media, including growing trends of fake news which usually escalate tension, in which the recent unrest in my vicinity benefitted negatively from.
Advantages that users experience when working with computers
Answer:
Multitasking Multitasking – Multitasking Multitasking is one among the main advantage of computer. ...
Speed – Now computer isn't just a calculating device. ...
Cost/ Stores huge – Amount of knowledge it's a coffee cost solution. ...
Accuracy – ...
Data Security – ...
Task completer – ...
Communication – ...
Productivity –
Explanation:
I hope that this is what you were looking for
Which of these situations would benefit from the AutoRecover feature? Check all that apply.
You clicked Don't Save when you closed a file but later realized you did want that file after all.
You decided you wanted to rename a folder, but you could not remember what it was called.
Your computer crashed while bu were working on a file.
Your friend wants you to e-mail her a file.
Answer: Your friend wants you to email her.
Explanation:
Answer:
Its 1 and 3 on edge 2021
Explanation:
In this exercise, you are going to build a hierarchy to create instrument objects. We are going to create part of the orchestra using three classes, Instrument, Wind, and Strings. Note that the Strings class has a name very close to the String class, so be careful with your naming convention! We need to save the following characteristics: Name and family should be saved for all instruments We need to specify whether a strings instrument uses a bow We need to specify whether a wind instrument uses a reed Build the classes out with getters and setters for all classes. Only the superclass needs a toString and the toString should print like this: Violin is a member of the Strings family. Your constructors should be set up to match the objects created in the InstrumentTester class.
These are the files given
public class InstrumentTester
{
public static void main(String[] args)
{
/**
* Don't Change This Tester Class!
*
* When you are finished, this should run without error.
*/
Wind tuba = new Wind("Tuba", "Brass", false);
Wind clarinet = new Wind("Clarinet", "Woodwind", true);
Strings violin = new Strings("Violin", true);
Strings harp = new Strings("Harp", false);
System.out.println(tuba);
System.out.println(clarinet);
System.out.println(violin);
System.out.println(harp);
}
}
////////////////////////////
public class Wind extends Instrument
{
}
///////////////////////////
public class Strings extends Instrument
{
}
/////////////////////////
public class Instrument
{
}
Answer:
Explanation:
The following code is written in Java and creates all of the necessary classes as requested so that the main class runs perfectly without having to change anything...
package sample;
class InstrumentTester {
public static void main(String[] args) {
/*** Don't Change This Tester Class!** When you are finished, this should run without error.*/
Wind tuba = new Wind("Tuba", "Brass", false);
Wind clarinet = new Wind("Clarinet", "Woodwind", true);
Strings violin = new Strings("Violin", true);
Strings harp = new Strings("Harp", false);
System.out.println(tuba);
System.out.println(clarinet);
System.out.println(violin);
System.out.println(harp);
}
}
class Wind extends Instrument {
boolean usesReef;
public Wind(String name, String family, boolean usesReef) {
this.setName(name);
this.setFamily(family);
this.usesReef = usesReef;
}
public boolean isUsesReef() {
return usesReef;
}
public void setUsesReef(boolean usesReef) {
this.usesReef = usesReef;
}
}
class Strings extends Instrument{
boolean usesBow;
public Strings (String name, String family, boolean usesBow) {
this.setName(name);
this.setFamily(family);
this.usesBow = usesBow;
}
public Strings (String name, boolean usesBow) {
this.setName(name);
this.setFamily("String");
this.usesBow = usesBow;
}
public boolean isUsesBow() {
return usesBow;
}
public void setUsesBow(boolean usesBow) {
this.usesBow = usesBow;
}
}
class Instrument{
private String family;
private String name;
public String getName() {
return name;
}
public void setName(String name) {
this.name = name;
}
public String getFamily() {
return family;
}
public void setFamily(String family) {
this.family = family;
}
public String toString () {
System.out.println(this.getName() + " is a member of the " + this.getFamily() + " family.");
return null;
}
}
Junie is researching Ancient Egypt. She found a website that is full of information and great
images. As she is reading the text, she notices that there are little bits of information that don't
really agree with any of the other research she has done. What should she do?
O Use the website. Most of the information seems correct.
OUse only the information that she needs and ignore the information that doesn't seem right.
O Ask her friend what he thinks about the website.
O Evaluate the site using the CARS checklist to see if the site is valid and reliable.
Answer: Evaluate the site using the CARS checklist to see if the site is valid and reliable.
Explanation:
to assign length and breadth to display area of a rectangle
Answer:
In Python:
Length = float(input("Length: "))
Breadth = float(input("Breadth: "))
Area = Length * Breadth
Print(Area)
Explanation:
Get values for length and breadth
Length = float(input("Length: "))
Breadth = float(input("Breadth: "))
Calculate area
Area = Length * Breadth
Print area
Print(Area)
How do computers solve complex problems?
Answer:
Computers solve complex problems by coding
Explanation:
I hope this helps
4. Describe a report that a company might want to create and run on a regular basis. (1-3
sentences. 3.0 points)
Answer:
A report,.. hmm.. maybe about their company.=
A report that they would like people to see. One that says who they are. Also, what they do there, and why.
Explanation:
Spreadsheet software is often utilized throughout database applications. A further explanation is provided below.
Company reportSince there are several positions available, such as sales manager or human resources manager. It's incredibly beneficial to save marketing as well as customer data throughout a spreadsheet since it allows you to establish a database as well as evaluate current sales.There seems to be a wealth of tools available to assist consumers throughout studying databases within spreadsheets.
Find out more information about the company report here:
https://brainly.com/question/2870954
When artists have a successful career, there is sometimes the need to collect all their works in an anthology album. Given main() and a base Album class, define a derived class called BoxSet. Within the derived Album class, define a printInfo() method that overrides the Album class' printInfo() method by printing not only the title, author, publisher, and publication date, but also whether it is the complete works, and number of discs.
Ex. If the input is:
Master of Puppets
Metallica
Elektra
1986
The Complete Studio Albums
Creedence Clearwater Revival
Fantasy
27 Oct 2014
true
7
the output is:
Album Information:
Album Title: Master of Puppets
Author: Metallica
Publisher: Elektra
Publication Date: 1986
Album Information:
Album Title: The Complete Studio Albums
Author: Creedence Clearwater Revival
Publisher: Fantasy
Publication Date: 27 Oct 2014
Is Complete Works? true
Number of Discs: 7
AlbumInformation.java
import java.util.Scanner;
public class AlbumInformation {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
Album myAlbum = new Album();
BoxSet myBoxSet = new BoxSet();
String title, author, publisher, publicationDate;
String bTitle, bAuthor, bPublisher, bPublicationDate;
boolean isCompleteWorks;
int numDiscs;
title = scnr.nextLine();
author = scnr.nextLine();
publisher = scnr.nextLine();
publicationDate = scnr.nextLine();
bTitle = scnr.nextLine();
bAuthor = scnr.nextLine();
bPublisher = scnr.nextLine();
bPublicationDate = scnr.nextLine();
isCompleteWorks = scnr.nextBoolean();
numDiscs = scnr.nextInt();
myAlbum.setTitle(title);
myAlbum.setAuthor(author);
myAlbum.setPublisher(publisher);
myAlbum.setPublicationDate(publicationDate);
myAlbum.printInfo();
myBoxSet.setTitle(bTitle);
myBoxSet.setAuthor(bAuthor);
myBoxSet.setPublisher(bPublisher);
myBoxSet.setPublicationDate(bPublicationDate);
myBoxSet.setIsCompleteWorks(isCompleteWorks);
myBoxSet.setNumDiscs(numDiscs);
myBoxSet.printInfo();
}
}
Album.java
public class Album {
protected String title;
protected String author;
protected String publisher;
protected String publicationDate;
public void setTitle(String userTitle) {
title = userTitle;
}
public String getTitle() {
return title;
}
public void setAuthor(String userAuthor) {
author = userAuthor;
}
public String getAuthor(){
return author;
}
public void setPublisher(String userPublisher) {
publisher = userPublisher;
}
public String getPublisher() {
return publisher;
}
public void setPublicationDate(String userPublicationDate) {
publicationDate = userPublicationDate;
}
public String getPublicationDate() {
return publicationDate;
}
public void printInfo() {
System.out.println("Album Information: ");
System.out.println(" Album Title: " + title);
System.out.println(" Author: " + author);
System.out.println(" Publisher: " + publisher);
System.out.println(" Publication Date: " + publicationDate);
}
}
BosSet.java
public class BoxSet extends Album {
// TODO: Declare private fields: isCompleteWorks, numDiscs
// TODO: Define mutator methods -
// setIsCompleteWorks(), setNumDiscs()
// TODO: Define accessor methods -
// getIsCompleteWorks(), getNumDiscs()
// TODO: Define a printInfo() method that overrides
// the printInfo in Album class
}
Answer:
Answered below
Explanation:
public class BoxSet extends Album{
private boolean isCompleteWork;
private int numDiscs;
public void setIsCompleteWorks( boolean cw){isCompleteWorks = cw;
}
public boolean getCompleteWorks(){
return isCompleteWorks;
}
public void setNumDiscs(int discs){
numDiscs = discs;
}
public int getNumDiscs(){
return numDiscs;
}
public void printInfo(){
super.printInfo();
System.out.print(isCompleteWorks);
System.out.print(numDiscs);
}
}
Match the hardware device with the "category" into which it falls. Remember to choose
the main function of the device.
SSD
O Storage
O Processing
O Output
O Input
O Other -- on the computer but doesn't fit neatly into a category
O Communication to external peripheral or device
A, Storage, basically it collects data and stores it for future use. Hope this helps, have a great day.
The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use the Filter pattern to filter the list in order to return a new list which contains only strings longer than five characters. The current implementation breaks when it encounters integers in the list. Fix it to return a properly filtered new list.student.py HNM 1 - Hef filter_only_certain_strings (data_list): new_list = [] for data in data_list: if type (data) == str and len(data) >= 5: new_list.append(data) return new_list Restore original file Save & Grade Save only
Answer:
Explanation:
The Python code that is provided in the question is correct just badly formatted. The snippet of code that states
return new_list
is badly indented and is being accidentally called inside the if statement. This is causing the function to end right after the first element on the list regardless of what type of data it is. In order for the code to work this line needs have the indentation removed so that it lines up with the for loop. like so... and you can see the correct output in the attached picture below.
def filter_only_certain_strings(data_list):
new_list = []
for data in data_list:
if type(data) == str and len(data) >= 5:
new_list.append(data)
return new_list
Read these sentences from the passage:
“The TV and the glasses work together. When the TV flashes the image meant for the right eye, the right lens is clear and the left lens is dark.
Which of the following describes the relationship between the first and second sentence?
Answer
It is B
Explanation:
Answer:
It's giving further information
Explanation:
We investigated a program which is probably used as one component of a bigger password breaking algorithm. We determined that the program can input arbitrary N-bit queue and for actual N-bit input also the program output will be always N bits long. Additionally we noticed that the longer program input is, the longer will be the output calculating time. After performing some repeating tests we also determined that the program working time depends only and exactly on input length, not on the input itself.
Finally we fixed some actual working times:
-for N=10 - 10.576 seconds;
-for N=20 - 11.087 seconds;
-for N=25 - 13.544 seconds;
-for N=30 - 27.442 seconds;
-for N=35 - 1 minute 46.059 seconds;
-for N=40 - 9 minutes 10.784 seconds.
Task:
a) Find the program working time for N=50.
b) Please derive the mathematical formula using which is possible to calculate actual working time for arbitrary N.
Answer:
i dont know
Explanation:
how does equal employment opportunity apply to nursing practice?
Well, regardless of what practices you may wanting and go into, equal employment opportunity (EEO) should apply to everyone equally, even if you're a student.
Write a recursive function next_pow2(n) that returns the smallest integer value p such that for a non-negative value n. For example: function call return value next_pow2(0) 0 next_pow2(1) 0 next_pow2(2) 1 next_pow2(3) 2 next_pow2(4) 2 next_pow2(5) 3 next_pow2(6) 3 next_pow2(7) 3 next_pow2(8) 3 next_pow2(9) 4 next_pow2(255) 8 next_pow2(256) 8 next_pow2(257) 9
Answer:
Explanation:
The following code is written in Python and is a recursive function as requested that uses the current value of p (which is count in this instance) and raises 2 to the power of p. If the result is greater than or equal to the value of n then it returns the value of p (count) otherwise it raises it by 1 and calls the function again.
def next_pow2(n, count = 0):
if (2**count) < n:
count += 1
return next_pow2(n, count)
else:
return count
Write a program that will input letter grades (A, B, C, D, F), the number of which is input by the user (a maximum of 50 grades). The grades will be read into an array. A function will be called five times (once for each letter grade) and will return the total number of grades in that category. The input to the function will include the array, number of elements in the array and the letter category (A, B, C, D or F). The pro- gram will print the number of grades that are A, B, etc.
Answer:
In Java:
import java.util.*;
public class Main{
public static int countgrades(char[]letterGrades,char Grade, int lent){
int count = 0;
for(int i =0;i<lent;i++){
if(letterGrades[i]==Grade){
count++; } }
return count;
}
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int lent;
System.out.print("Length: ");
lent = input.nextInt();
while(lent >30 || lent<1){
System.out.print("Invalid input\nLength: ");
lent = input.nextInt(); }
char[] letterGrades = new char[lent];
for(int i =0; i<lent;i++){
letterGrades[i] = input.next().charAt(0);
}
char[] letters = {'A','B','C','D','F'};
for(char i:letters){
System.out.println(i+": "+countgrades(letterGrades,i, lent));
}
}
}
Explanation:
See attachment where I I used comment to explain each lin e
Following are the code to the given question:
Program Explanation:
Include header file.Defining a method "count_Char" that takes three variable in the parameter that are "g as character array, x as integer variable, and a character variable l".Inside the method two integer variable "i,s" is declared.In the next step, a for loop is declared that use if block that checks input value is in array and return incremented s value.In the next line, a main method is declared inside this two integer variable "i,x" and two character array is declared that inputs value, and define a loop that call the above method, and print its value.Program:
#include <iostream>//header file
using namespace std;
int count_Char(char g[], int x, char l)//defining a method count_Char that takes 3 variable in parameter
{
int i,s=0;//defining integer variable
for(i=0;i<x;i++)//defining for loop that checks input value find in array
{
if(g[i]==l)//defining if block that check value is in array
{
s++;//incrementing s value by 1
}
}
return s;//return s value
}
int main()//defining main method
{
int i,x;//defining integer variable
char g[50],l[5]={'A','B','C','D','F'};//defining 2 character array
cout<<"Please input the number of grades to be read in.(1-50): ";//print message
cin>>x;//input integer value
cout<<"all grades must be upper case A B C D or F\n";//print message
for(i=0;i<x;i++)//defining loop that Input array value
{
cout<<"Input a grade: ";//print message
cin>>g[i];//input array value
}
for(i=0;i<5;i++)//defining loop that prints array value and prints its match value
{
cout<<"Number of "<<l[i]<<"s ="<<count_Char(g,x,l[i])<<endl;//prints array value with matched value
}
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/19512947
picture question please help me
Answer:
where is the picture?????
After turning on your computer ,it prompts you to type a password to continue the boot process. However ,you forgot the password. What are your next steps to allow the computer to continue the boot process ,start Windows ,and access the file on the hard disk.
Answer:
It depends if you are using a PC or laptop
Explanation:
PC:
Remove the BIOSjumper from the motherboard (look in your manual to find this). Turn on the PC without the jumper and let everything load up. Then turn off your PC again and turn it back on with the BIOSjumper back in.
Laptop:
Turn off the laptop (plugged out). Then remove the CMOS battery from the motherboard (again manual). Wait around 15 minutes then put it back in and boot up your laptop again.
Which of the following would NOT be stored
using an array?
A first name
O The names of the top ten movies of 2019
Prices for 25 different shoes at a store
O Longitude and latitude tracking data of a wild
polar bear
The data cannot be stored using an array is Longitude and latitude tracking data of a wild polar bear.
It should be noted that arrays are the contiguous block as regards the memory locations, the first element is been stored by the lowest position of the array
Some of the data that can be stored using arrays are:
first nameThe names of the top ten movies of 2019.Prices for 25 different shoes at a storeLearn more about array at:
https://brainly.com/question/19586990
A gui allows you to interact with objects on the screen such as icons and buttons true or false