Answer:
Redundancy
Req. 1 and Req. 3 are seemed to say the same thing. We need to remove the first sentence in Req. 1
Conflict and understandability
Req. 1 states that access is through web browser while Req. 4 states that access is via html. We have to re-write the Req. 3 to make it clear that users do not actually have to write directly html to communicate with the system.
Completeness
Req. 5 states that print out will “mainly” be documents. What else might be printed? What other inputs will be produced?
Either remove mainly or clarify other print out.
What version of html or web browser is assumed in Req. 1 and Req. 3?
Explanation:
I really need To know how To get The special ending for final fight 2 for super nintendo it’s a video game
Answer:
Check Yt
Explanation:
More often than not there are many video tutorials about every game imaginable.
Write a method named lastIndexOf that accepts an array of integers and an * integer value as its parameters and returns the last index at which the * value occurs in the array. The method should return -1 if the value is not * found.
Answer:
The method is as follows:
public static int lastIndexOf(int [] numbers, int num){
int lastIndex = numbers[0];
for(int i =0; i<numbers.length;i+=num){
lastIndex = numbers[i];
}
return lastIndex;
}
Explanation:
This defines the method
public static int lastIndexOf(int [] numbers, int num){
This initializes the lastIndex to the first element of the array
int lastIndex = numbers[0];
This iterates through every "num" element of the array
for(int i =0; i<numbers.length;i+=num){
This gets the current index... until the last
lastIndex = numbers[i]; }
This returns the last
return lastIndex; }
Declare a struct named PatientData that contains two integer data members named heightInches and weightPounds. Sample output for the given program:Patient data: 63 in, 115 lbs#include using namespace std;/* Your solution goes here */int main() {PatientData lunaLovegood;lunaLovegood.heightInches = 63;lunaLovegood.weightPounds = 115;cout << "Patient data: "<< lunaLovegood.heightInches << " in, "<< lunaLovegood.weightPounds << " lbs" << endl;return 0;}
Answer:
struct PatientData{
int heightInches, weightPounds;
};
Explanation:
In order to declare the required struct in the question, you need to type the keyword struct, then the name of the struct - PatientData, opening curly brace, data members - int heightInches, weightPounds;, closing curly brace and a semicolon at the end.
Note that since the object - lunaLovegood, is declared in the main function, we do not need to declare it in the struct. However, if it was not declared in the main, then we would need to write lunaLovegood between the closing curly brace and the semicolon.
An organization is building a new customer services team, and the manager needs to keep the team focused on customer issues and minimize distractions. The users have a specific set of tools installed, which they must use to perform their duties. Other tools are not permitted for compliance and tracking purposes. Team members have access to the Internet for product lookups and to research customer issues. Which of the following should a security engineer employ to fulfill the requirements for the manager?a. Install a web application firewallb. Install HIPS on the team's workstations.c. implement containerization on the workstationsd. Configure whitelisting for the team
Answer:
a
Explanation:
because they need to protect the organization's information
Operations that a given computing agent can perform are called
Answer:
Primitive operation
Explanation:
Operations that a given computing agent can perform are called primitive operations.
These operations are basic arithmetic work done by an algorithm such as assigning a variable, calling a method, returning an array, etc. They are sometimes written in pseudo-code.
Write a method that accepts a String object as an argument and returns a copy of the string with the first character of each sentence capitalized. For instance, if the argument is "hello. my name is Joe. what is your name?" the method should return the string "Hello. My name is Joe. What is your name?" Demonstrate the method in a program that asks the user to input a string and then passes it to the method. The modified string should be displayed on the screen.
Answer:
The programming language is not stated; However, the program written in C++ is as follows: (See Attachment)
#include<iostream>
using namespace std;
string capt(string result)
{
result[0] = toupper(result[0]);
for(int i =0;i<result.length();i++){
if(result[i]=='.' || result[i]=='?' ||result[i]=='!') {
if(result[i+1]==' ') {
result[i+2] = toupper(result[i+2]);
}
if(result[i+2]==' ') {
result[i+3] = toupper(result[i+3]);
}
} }
return result;
}
int main(){
string sentence;
getline(cin,sentence);
cout<<capt(sentence);
return 0;
}
Explanation:
The method to capitalize first letters of string starts here
string capt(string result){
This line capitalizes the first letter of the sentence
result[0] = toupper(result[0]);
This iteration iterates through each letter of the input sentence
for(int i =0;i<result.length();i++){
This checks if the current character is a period (.), a question mark (?) or an exclamation mark (!)
if(result[i]=='.' || result[i]=='?' ||result[i]=='!') {
if(result[i+1]==' '){ ->This condition checks if the sentence is single spaced
result[i+2] = toupper(result[i+2]);
-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized
}
if(result[i+2]==' '){ ->This condition checks if the sentence is double spaced
result[i+3] = toupper(result[i+3]);
-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized
}
}
} The iteration ends here
return result; ->The new string is returned here.
}
The main method starts here
int main(){
This declares a string variable named sentence
string sentence;
This gets the user input
getline(cin,sentence);
This passes the input string to the method defined above
cout<<capt(sentence);
return 0;
}
In what way does a hash provide a better message integrity check than a checksum (such as the Internet checksum)?
Answer:
Hash function have less collision than a internet checksum because of computational infeasibility.
Explanation:
A collision means there is more then one way to produce the same sum. It is nearly difficult to developed two messages with same hash however, in checksum, it is more easier to develop or modify two messages to have same sum, thereby enabling attackers to have access to the message or the information arising to less message integrity.
In database a record is also called a
Explanation:
hope it helps you
pls mark this ans brainlist ans
2. A computer that is easy to operate is called
I
10 POINTSSSS PLEASEEE HELPPP
DIT QUESTION
Answer:
Explanation:
A computer that is easy to operate is called User Friendly
when an object is passed as a non-reference pointer parametor to a method, modifiying the members of that object from
Answer:
"this" keyword representing the class object itself.
Explanation:
Object-oriented programming concept emphasizes on using blueprints representing the structure of a data collection type to continuously create an instance of that data structure. The instance of that object is called a class object. It is used in database management systems to populate the database.
Functions defined in the class objects are called methods and are used specifically by the class instance to modify the data content of the class object defined.
When a member of a class is referenced in the class, it can be accessed with the "this" keyword. At an instance of the class object, the variable holding the object should be called to get the class content because of the "this" keyword binding the instance of the object to the method.
Explain what 10CLS program does and the write the output
A device driver would ordinarily be written in :__________
a. machine language
b. assembly language
c. a platform-independent language, such as Java
d. an application-oriented language
Answer: Assembly language
Explanation:
A device driver is a computer program that is in charge of the operation or the controls of a device attached to a computer.
device driver would ordinarily be written in an assembly language. Assembly language is a low-level symbolic code that is converted by an assembler. It is typically designed for a particular type of processor.
А.
is the highest education degree available at a community college.
Answer:
The answer is "associate".
Explanation:
The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.
What are the best websites to learn about Java Programing?
Answer:
well you can download some apps from the play store and it is easy for you to learn from there (interactive)
Individually or in a group find as many different examples as you can of physical controls and displays.a. List themb. Try to group them, or classify them.c. Discuss whether you believe the control or display is suitable for its purpose.
Answer:
Open ended investigation
Explanation:
The above is an example of an open ended investigation. In understanding what an open ended investigation is, we first of all need to understand what open endedness means. Open endedness means whether one solution or answer is possible. In other words it means that there may be various ways and alternatives to solve or answer a question or bring solution to an investigation.
From the definition, we can deduce that an open ended investigation is a practical investigation that requires students to utilize procedural and substantive skills in arriving at conclusion through evidence gathered from open ended research or experiment(as in not close ended, not limited to ready made options, freedom to explore all possibilities). This is seen in the example question where students are asked to explore the different examples of physical controls and displays and also discuss their observations. Here students are not required to produce a predefined answer but are free to proffer their own solutions
help me
Q3/ Put True or false in front of the following
statements:
1- You can use the Goal seek feature available by clicking on the data what-if analysis-> Goal Seek.
2- The equations in matrix form [X]-[A] [b]. 3- The A B matrix will be 2 3 ,where A is 2*3 and B is 3*3..
4- The command of inverse is +minverse(arry1...arry2).
5- The (By Changing Cells) box should contain the location of the decision variables for the problem.
Answer:
TrueFalseFalseTrueFalseExplanation:
mark me as brainlyest
You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step should you take next
Answer:
The answer is "check the worksheet is not read only"
Explanation:
The read only mode is used for read the file data, and it doesn't allows the user to update the file, and for updating the worksheet we should check iut does not open in the read-only mode.
If it is open, then we close it and for close we goto the office button and click on the tools option after that goto general setting, in this there is a check box for turn off the read-only mode.
Select the function completion that satisfies this docstring description: def convert_to_string(nums): """ (list of number) -> NoneType Replace each item in nums with its string equivalent. >>> nums
Answer:
def convert_to_string(nums):
for i in range(len(nums)):
nums[i] = str(nums[i])
nums = [7, 28, 92]
print(nums)
convert_to_string(nums)
print(nums)
Explanation:
Create a function called convert_to_string that takes one parameter, nums
Create a for loop that iterates through the nums. Inside the loop, set each item to its string equivalent using type casting (str)
Initialize a list
Print the list before the function call
Call the function, passing the list as a parameter
Then, print the list again to see the difference
They are correct? thank you!
Answer:
Yes they are correct. welcome....
what are 3 important reasons to reconcile bank and credit card accounts at set dates?
Answer:
To verify transactions have the correct date assigned to them.
To verify that an account balance is within its credit limit.
To verify that all transactions have been recorded for the period.
Explanation:
What triggers a LinkedIn account ban?
Answer:
Before we dig into using advanced LinkedIn automation tools, it’s important to understand what activities can trigger LinkedIn to ban your account?
Using multiple LinkedIn tools at the same timeUsing Low-quality LinkedIn ToolsSending Connect Requests BlindlySending Templates MessagesFor this lab, imagine you are an IT Specialist at a medium-sized company. The Human Resources Department at your company wants you to find out how many people are in each department. You need to write a Python script that reads a CSV file containing a list of the employees in the organization, counts how many people are in each department, and then generates a report using this information. The output of this script will be a plain text file.
Answer:
import csv
import sys
file_csv = argv
with open( "file_csv", "rb" ) as file:
rowlist= csv.DictReader( file )
dict_count={ }
for row in rowlist:
dict_count[ row[ 'department' ] ] = dict_count.get( row[ 'department' ], 0 ) + 1
print( " The count of employees per department are", dict_count )
Explanation:
The python script in the solution above is able to accept user input csv files via command prompt and get an output of the number of employees for each department.
2) What are three categories of computer languages? 3) Write four components of a QBASIC window. 4) What are the three types of operators in QBASIC? 5) What is the use of connector symbol in flowchart? 6) What is a computer network? 7) State two uses of Internet. 8) Write three examples for web browser. 9) Name some popular ISPs in Sri Lanka. 10) Differentiate between MAN and PAN.
Answer:
2: assembly language , machine language and high level language
3: a character set , constants , variables , statements , operators and expressions
Discuss the different methods of authentication supported between Microsoft’s Web server (Internet Information Services) and the browsers in common use at your organization. Cover both basic authentication and Microsoft’s challenge-response scheme.
Answer:
Answered below
Explanation:
The Microsoft web server (Internet Information Services) supports the following authentication methods;
1) Basic authentication: This method uses basic authentication to restrict access to files on NTFS-formatted web servers. Access is based on user ID and password.
2) Digest authentication, which uses a challenge-response mechanism where passwords are sent in encrypted formats.
3) Anonymous authentication: In this method, the IIS creates IUSR-computerName account, to authenticate anonymous users.
4) Windows integration uses windows domain accounts for access.
5) .Net passport authentication provides users with security-enhanced access to .Net websites and services.
6) Client certificate mapping where a mapping is created between a certificate and a user account.
Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU
Answer:
mouse printer CPU touch screen
Explanation:
on a tablet computer hope this helps you :)
Karl from Accounting is in a panic. He is convinced that he has identified malware on the servers—a type of man-in-the-middle attack in which a Trojan horse manipulates calls between the browser and yet still displays back the user's intended transaction. What type of attack could he have stumbled on?
Answer:
The correct answer will be "Man-in-the-browser".
Explanation:
Man-in-the-browser seems to be a category of person-in-the-middle attack where a certain Trojan horse tries to misrepresent calls between some of the web pages and therefore it is prevention systems while still demonstrating the intentional transfer of funds back to the customer.High-tech as well as high-amount technology for starting a man throughout the internet explorer assaults.3. Which property is used to select full Row of data grid view
a) Select Mode b) Mode Selection c) Selection Mode d) Mode Select
Answer:
I think a is correct answer.
A proper divisor of a positive integer $n$ is a positive integer $d < n$ such that $d$ divides $n$ evenly, or alternatively if $n$ is a multiple of $d$. For example, the proper divisors of 12 are 1, 2, 3, 4, and 6, but not 12. A positive integer $n$ is called double-perfect if the sum of its proper divisors equals $2n$. For example, 120 is double-perfect (and in fact is the smallest double-perfect number) because its proper divisors are 1, 2, 3, 4, 5, 6, 8, 10, 12, 15, 20, 24, 30, 40, and 60, and their sum is 240, which is twice 120. There is only one other 3-digit double-perfect number. Write a Python program to find it, and enter the number as your answer below.
Answer:
The program written in Python is as follows:
See Explanation section for line by line explanation
for n in range(100,1000):
isum = 0
for d in range(1,n):
if n%d == 0:
isum += d
if isum == n * 2:
print(n)
Explanation:
The program only considers 3 digit numbers. hence the range of n is from 100 to 999
for n in range(100,1000):
This line initializes sum to 0
isum = 0
This line is an iteration that stands as the divisor
for d in range(1,n):
This line checks if a number, d can evenly divide n
if n%d == 0:
If yes, the sum is updated
isum += d
This line checks if the current number n is a double-perfect number
if isum == n * 2:
If yes, n is printed
print(n)
When the program is run, the displayed output is 120 and 672
Write a function called changeCharacter that takes three parameters – a character array, its size, and the replacement character – to change every third character in the array to its replacement character
(C++ coding)
Method explanation:
Defining a method "changeCharacter" that takes three parameters that are "character array", and two integer variable "s, k" in its parameters.Inside the method, a for loop is declared that takes array value and defines a conditional statement that checks the 3rd character value in the array, is used to the array that holds its key-value.Please find the full program in the attachment.Method description:
void changeCharacter(char* ar, int s, int k)//defining a method changeCharacter that takes three parameters
{
for(int j = 1; ar[j]!='\0'; j++)//defining a for loop for 3rd character value in array
{
if(j%3== 0)//use if block that check 3rd character value in array
{
ar[j-1] = k; //Changing the 3rd character in array
}
}
}
Learn more:
Program: brainly.com/question/12975989
what is the difference between packed and unpacked bcd numbers
Explanation:
Packed BCD ( Binary coded decimal) is type in which each decimal digit is represented by 4 bits ( 1 nibble) . For Example : 14 will be shown as 0001 0100 in packed BCD form. Unpacked BCD is type in which each decimal digit is represented by 8 bits ( 1 byte).