Explanation:
In today's world Internet is the main thing in our daily life. Without it there would be a lot of troubles and we use Internet for research, watching videos etc
what is a web browser
Answer:
web browser
Explanation:
.........;)
Two essential privacy concerns are _____.
cybercrime and government authorization
political freedom and religious freedom
protecting criminals’ personal emails
knowing how personal data are collected and used
please answer asap as well as the others i posted
Answer:
knowing how personal data are collected and used.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Basically, the two (2) essential privacy concerns in the field of cybersecurity are knowing how personal data are collected and essentially how they're used by the beneficiaries or end users.
This ultimately implies that, the medium (channel) and methods through which personal data are collected or obtained plays a huge role in determining how secured or unsecured a user's data are. Also, the manner in which a person's personal data is used should be well defined.
What does the top-level domain in a URL indicate?
A. the organization or company that owns the website
B. the organization or company that operates the website
C. the protocol used to access the website D. the type of website the URL points to
Answer:
b i think
Explanation:
A top-level domain (TLD) is the last segment of the domain name. The TLD is the letters immediately following the final dot in an Internet address. A TLD identifies something about the website associated with it, such as its purpose, the organization that owns it or the geographical area where it originates.
Answer:
The answer is D. The type of website the URL points to.
Explanation:
I got it right on the Edmentum test.
You are writing a device driver for an audio device connected to your computer. Your code needs to determine if the device is busy or ready to accept a new command. How can the driver determine this
Answer: hello the options related to your question is missing attached below is the complete question and options
answer : Read the status register ( A )
Explanation:
To determine if the device is busy or ready to accept a new command the line of action is to write a code that will Read the status register. A status register is a hardware register which contains the information about the processor of the device ( i.e. whether the processor is busy or ready )
g Consider a disk queue with requests for I/O to blocks on cylinders 95, 120, 41, 122, 15, 142, 65, 167. The Shortest Seek Time First (SSTF) scheduling algorithm is used. The head is initially at cylinder number 100. The cylinders are numbered from 0 (center of disk) to 199 (edge of disk). a) List the requests in the order in which they will be serviced. b) What is the total head movement (in number of cylinders) incurred while servicing these requests
Answer:
follows are the solution to the given question:
Explanation:
Please find the image file for the SSTF scheduling algorithm.
Following are the requested order:
[tex]Request \ \ order :\\\\95\\120\\122\\142\\167\\65\\ 41\\15[/tex]
Calculating the Total Head Movement:
[tex]= (100-95) + (120-95) + (122-120) + (142-122) + (167-142) + (167-65) + (65-41) + (41-15)\\\\= 5 + 25 + 2 + 20 + 25 + 102 + 24 + 26\\\\= 229[/tex]
Write a program called nearest_multiple.py that asks the user to input a number (here I will call it num) and a strictly positive integer (here I will call it mult) and prints as output the closest integer to num that is a multiple of mult
Answer:
The program is as follows:
num = float(input("Enter a decimal (float): "))
mult = int(input("Enter a positive whole (int): "))
small = (num // mult) * mult
big = small + mult
print(num,"rounded to the nearest multiple of ",mult,"is",end=" ")
print(big if num - small > big - num else small)
Explanation:
This gets input for num
num = float(input("Enter a decimal (float): "))
This gets input for mult
mult = int(input("Enter a positive whole (int): "))
This calculates the smaller multiple
small = (num // mult) * mult
This calculates the larger multiple
big = small + mult
This prints the output header
print(num,"rounded to the nearest multiple of ",mult,"is",end=" ")
This prints small if small is closer to num, else it prints big
print(big if num - small > big - num else small)
ses
te whether the following statements are True or False
LOGO is programming language.
The full form of LOGO is Language Of Great Object.
The turtle in logo is Moving Triangle.
LOGO was designed by Bill Gates.
School Level Computer Science, Grade-4
Answer:
Amoung us
Explanation:
When the imposter is sus
state the keyboard key used to move the cursor to the line
Answer:
Home & End are used to move the cursor to the start and end of a line
How have technology and social media changed reading?
O A. Physical books can only be read on the web.
B. Now reading is a conversation of give and take.
O C. People no longer have to read anything at all.
D. Reading often takes much longer to undergo.
Answer:
B?
Explanation:
I'm super sorry if I get this wrong for you but after thinking so much I probably think it would be B
Answer:
the guy above is right it is B
Explanation:
because 2+2=4
Select the correct answer.
What is the advantage of using transparencies?
O A. They support better image quality than online presentations.
O B. They are helpful when creating non-linear presentations.
OC. They allow the presenter to jot down points on the slide.
OD. They are better suited to creating handouts.
Reset
Next
Answer:
They are better suited to creating handouts
Counting the character occurrences in a file
For this task you are asked to write a program that will open a file called “story.txt”
and count the number of occurrences of each letter from the alphabet in this file.
At the end your program will output the following report:
Number of occurrences for the alphabets:
a was used – times.
b was used – times.
c was used – times…. …and so, on
Assume the file contains only lower-case letters and for simplicity just a single
paragraph. Your program should keep a counter associated with each letter of the
alphabet (26 counters) [Hint: Use array]
Your program should also print a histogram of characters count by adding
a new function print Histogram (int counters []). This function receives the
counters from the previous task and instead of printing the number of times each
character was used, prints a histogram of the counters.
Answer:
hope this helps!
Explanation:
#include <iostream>
#include <fstream>
using namespace std;
void print_histogram(int counter[26])
{
for(int i = 0; i < 26; ++i){
cout << (char)(i+97) << " ";
for(int j = 0; j < counter[i]; ++j){
cout << (char)254;
}
cout << endl;
}
}
int main()
{
int counter[26] = {0};
string filename = "data.txt";
char byte = 0;
// opens file in read mode
ifstream input_file(filename);
if (!input_file.is_open()) {
cerr << "Could not open the file - '"
<< filename << "'" << endl;
return EXIT_FAILURE; // exit if not opened
}
// reads every character from the file
while(input_file.get(byte)){
if(byte >= 97 && byte <= 122){
++counter[byte-97];
}
}
print_histogram(counter); // required print histogram function
return 0;
}
To launch the mail merge help dialog box, what option should you select using the Microsoft word office assistant?
Answer:
Complete setup.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.
A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) for each entry in the list at once and send to all individuals in a database query or table.
Hence, Mail Merge is a Microsoft Word feature that avails users the ability to insert fields from a Microsoft Access database into multiple copies of a Word document.
Some of the options available in the Write & Insert Fields group of Mail Merge are;
I. Highlight Merge Fields.
II. Address Block.
III. Greeting Line.
Generally, when a user wants to launch the Mail Merge help dialog box, the option he or she should select using the Microsoft word office assistant is complete setup.
Additionally, the sequential steps of what occurs during the mail merge process are;
1. You should create the main document
2. Next, you connect to a data source
3. You should highlight or specify which records to include in the mail.
4. You should insert merge fields.
5. Lastly, preview, print, or email the document.
All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not been initialized properly Dereferencing a null pointer Dereferencing a pointer that has not been assigned to point to a specific address Dereferencing a variable that is not a pointer
Answer: Dereferencing a variable that is not a pointer
Explanation:
The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.
Some of the reasons for a fatal execution-time error include:
• Dereferencing a pointer that has not been initialized properly
• Dereferencing a null pointer
• Dereferencing a pointer that has not been assigned to point to a specific address.
It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.
PLEASE I NEED HELP, WILL MARK BRAINLYEST!!! 50 POINTS!!!
Select the correct answer.
Production teams share a script between them, and the script is a collaborative effort. Which action is important to keep its character intact?
A.
develop the structure of the screenplay
B.
mention the details of the genres and the subgenres
C.
develop the hook
D.
create a sales pitch
Answer: Develop the structure of the screenplay
Explanation:
The screenplay helps the team find the character of the film and develop it.
Answer: B.
mention the details of the genres and the subgenres
Explanation:
Right on test
What is the benefit of using WYSIWYG editor
A WYSIWYG editor is a program with a rich text editing interface that allows your users to see what the end result will look like (more or less) while they're typing. Without one, users would have to edit raw HTML, which can get in the way of the writing process, to say the least.
Hope it helps! :)
Select the correct answer.
Which tag appears in the element of an HTML file?
A.
B.
OC.
OD.
OE.
Answer:
A. <Title> tag
Explanation:
Required
Tag that can be written in the <head> element
Of the given options, <title> is correct.
This is so because, it is compulsory to have the <title> tag and the only location where it can be placed is inside the <head> tag.
Its function is to display the title of a page
e.g.
<title> This is my first page </title>
Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_perimeter and get_area that compute the perimeter and area, and a member function void resize(double factor) that resizes the rectangle by multiplying the width and height by the given factor. (Page EX9-3).
//class declaration
public class Rectangle{
//declare the instance variables - width and height
double width;
double height;
//the constructor
public Rectangle(double width, double height){
//initialize the width of the rectangle
this.width = width;
//initialize the height of the rectangle
this.height = height;
}
//method get_perimeter to compute the perimeter of the rectangle
public double get_perimeter(){
//compute the perimeter
//by using the formula 2(width + height)
double perimeter = 2*(this.width + this.height);
//return the perimeter
return perimeter;
}
//method get_area to compute the area of the rectangle
public double get_area(){
//compute the area
//by multiplying the width and height of the rectangle
double area = this.width * this.height;
//return the area
return area;
}
//method resize to resize the rectangle
public void resize(double factor){
//resize the width of the rectangle
//by multiplying the width by the factor
this.width = this.width * factor;
//resize the height of the rectangle
//by multiplying the height by the factor
this.height = this.height * factor;
}
} //end of class declaration
Explanation:The code above has been written in Java. In contains comments explaining every part of the program.
Which of the following statements is correct?
Select one:
a. A failure in Network layer crashes the application
b. A failure in Network layer affects transport layer
c. A failure in Network layer affects Data Link layer
d. A failure in Network layer affects entire communication
e. A failure in Network layer stops the device from working entirely
The statement which is correct from the given answer choices is:
C. A failure in Network layer affects Data Link layerAccording to the given question, we are asked to show which of the statement about the network layer is most represented accurately.
As a result of this, we can see that a network layer is a part of the OSI model which is in charge of receiving and forwarding service requests from the sender to the receiving host in a network.
With this in mind, if the network layer fails, then there would also be a failure in the data link layer.
Therefore, the correct answer is option C
Read more here:
https://brainly.com/question/21298343
What factors do network consultants consider when determining the network needs of a business? Use the space provided below to answer this question in five to ten sentences.
Answer:
1.Support
In most cases, the simpler the network design, the less technical support you'll require for both installation and maintenance. If you need a complex, high-speed network, consider the level of technical assistance available locally. Many small businesses can't justify the cost of full-time IT personnel. Designing a simple network that can be serviced quickly by local technicians should be a primary consideration. If your business demands a complex network beyond the capabilities of local service, design sufficient redundancy in critical network elements to ensure a minimum level of service until repairs can be made.
2.Expansion
Planning for growth in the initial stages can save future expenditures. The price difference, for example, between a 16-port switch and a 32-port switch can be negligible when compared to the cost of purchasing an new switch to replace one that is too small. Most network devices are designed to provide several years of service.
3.Outside Access
Internet access has become all but mandatory for most modern businesses. It's a good idea to consider the type of Internet connection required and the amount and type of support you will receive from your Internet service provider before designing the rest of your network. Some ISPs will provide support and advice on connection speed requirements and security concerns for commercial accounts before installation.
4.Security
Securing a network from outside intrusion or data theft is a primary concern for many companies. While it is possible to eliminate the expense of Ethernet cabling by opting for a wireless network solution, Wi-Fi networking is the least secure method of sharing data and connections. The encryption methods built into most commercial routers, Wireless Encryption Protocol (WEP), Wireless Protected Access (WPA) and the more recent WPA2, can be cracked by skilled hackers. Designing a network with hard-wired Ethernet connections eliminates the risk of intrusion to only those with physical access to the network.
5.Cost
Equipment and maintenance costs are often the first consideration in network design. Fortunately, the cost of hubs, routers and switches are relatively low when compared to the early days of networking.
Which best describes the condition under which the Unicode output is the same as plain text?
when the text contains no punctuation
when the text contains only characters that are part of Unicode
when the text contains only characters that are part of ASCII
when the text contains no numbers
Answer:
the answer is c
Explanation:
when the text contains only characters that are part of ASCII- on edge
HAGS
Answer:
when the text contains only characters that are part of ASCII
Explanation:
Sixteen stations, numbered 1 through 16, are contending for the use of a shared channel by using the adaptive tree walk protocol. If all the stations whose addresses are prime numbers suddenly become ready at once, how many bit slots are needed to resolve the contention
Answer:
11 bit slot will be needed
Explanation:
The number of prime numbers between 1 through 16
= 2, 3 , 5, 7, 11 and 13
hence we can say 6 stations are to use the shared channel
Given that all the stations are ready simultaneously
The number of bit slots that will be needed to handle the contention will be 11 bits :
slot 1 : 2, 3, 5 , 7, 11 , 13
slot 2 : 2,3, 5, 7
slot 3 : 2, 3
slot 4 : 2 . slot 5 : 3 . slot 6 : 5,7. slot 7 : 5 . slot 8 : 7. slot 9: 11,13.
slot 10 : 11. slot 11 : 13
Question # 2 Multiple Select You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results. Your program compared an equal number of male and female drivers. You could modify the program to allow the user to enter the data. It is important to test your program with a small enough set of data that you can know what the result should be. A different set of observations might result in a larger portion of male drivers being on the phone.
Answer: A different set of observations might result in a larger portion of male drivers being on the phone.
You could modify the program to allow the user to enter the data.
Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results.
It is important to test your program with a small enough set of data that you can know what the result should be.
Explanation: Got it right
Write a recursive method called printNumPattern() to output the following number pattern.Given a positive integer as input (Ex: 12), subtract another positive integer (Ex: 3) continuallyuntil 0 or a negative value is reached, and then continually add the second integer until therst integer is again reached. For this lab, do not end output with a newline.
Answer:
Explanation:
The following is written in Java and prints out the pattern to and from the first num parameter that is passed to the function. Meaning it goes from num1 to 0 and then from 0 to num1 again. It prints all of the values in a single line seperated by a space and a test case was used using the values provided in the question. The output can be seen in the attached picture below.
static void printNumPattern(int n1,int n2){
System.out.print(n1 + " ");
if(n1<=0) {
return;
} else {
printNumPattern(n1-n2,n2);
}
System.out.print(n1 + " ");
}
g 4-6 you've been given the network 200.5.0.0 /24 and need to subnet it using vlsm as follows: bldg 1 30 hosts bldg 2 10 hosts bldg 3 10 hosts bldg 4 4 hosts what will be the network address for bldg 3
Answer:
The answer is "200.5.0.0 32/28".
Explanation:
The requirement of the Bldg is =30.
The number of the host bits which is needed = 5
Therefore the subnet mask will be =/27
for bldg 3 netmask could be= /28
and when the /28 after that the last octet will be= 00100000.
00100000 converting value into a decimal value that is = 32.
therefore the correct value is 200.5.0.32 /28.
what is polymerization1
Answer:
Polymerization, any process in which relatively small molecules, called monomers, combine chemically to produce a very large chainlike or network molecule, called a polymer. The monomer molecules may be all alike, or they may represent two, three, or more different compounds.please give me brainliest~❤︎ت︎Write the recursive method printNumber. The public static method named printNumber takes two parameters. The first parameter is an integer array called nums, and the second is parameter is an even int called index. The return value is an integer that is the product of the even index values in nums whose index is less than or equal to index. Assume that the array nums has length >
Answer:
The function is as follows:
public static void printNumber(int nums[],int index){
if (index < 0) {
System.out.print(nums[0]);
return; }
if (index % 2 == 0){
if(index!=0){
nums[index-2]*=nums[index];} }
printNumber(nums, index - 1);
}
Explanation:
To do this, we need to save the required product in the 0 index element of the array.
This defines the function
public static void printNumber(int nums[],int index){
If the index variable < 0,
if (index < 0) {
Print the 0 index as the product [i.e. the calculated product]
System.out.print(nums[0]);
This ends the recursion
return; }
If the current array index is even
if (index % 2 == 0){
Check if index is not 0
if(index!=0){
If both conditions are valid, calculate the product and save the result in index - 2 element. The final result is then saved in the 0 index
nums[index-2]*=nums[index];} }
Call the function while the base case has not been executed
printNumber(nums, index - 1);
}
Ilang takudtod ba isang saknong
Answer:
?
Explanation:
Because travel distance, cost of living, and other factors vary among the three regions, the annual cost of having a salesperson is $5000 in the east, $11000 in the Midwest, and $7000 in the west. The company has 700000 budgeted for expenses. To ensure nationwide exposure for its product, the company has decided that each region must have at least 10 salespeople. The company wants to know how many salespeople to allocate to each region to maximize the total number of products sold. What type of integer programming model it is
Answer:
Pure integer programming model
Explanation:
To know the type of integer model, we simply check the expected variable and/or value of the model.
From the question, we understand that the end result is to determine the number of salespeople that will be allocated to the east, midwest and west region.
The number of salespeople is discrete i.e. it is an integer (whole number). Since the result is purely integer, the type of model is Pure integer programming model
Write a program that will create an array of random numbers and output the values. Then output the values in the array backwards. SPECIFICATIONS: File name: ArrayBackwards.java Your program must make use of at least one method other than main()to receive full credit (methods can have a return type of void). Suggestion: create and populate the array in the main() method. Make a method for Step 3 below and send in the array as a parameter. Make another method for Step 4 and send in the array as a parameter.
Answer:
The program is as follows:
import java.util.*;
public class Main{
public static void backward(int [] Rndarray, int lnt){
System.out.print("Reversed: ");
for(int itm = lnt-1;itm>=0;itm--){
System.out.print(Rndarray[itm]+" "); } }
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int lnt = input.nextInt();
Random rd = new Random();
int [] Rndarray = new int[lnt];
for (int itm = 0; itm < lnt; itm++) {
Rndarray[itm] = rd.nextInt();
System.out.print(Rndarray[itm]+" ");
}
System.out.println();
backward(Rndarray,lnt); }}
Explanation:
This defines the backward() method
public static void backward(int [] Rndarray, int lnt){
This prints string "Reversed"
System.out.print("Reversed: ");
This iterates through the array
for(int itm = lnt-1;itm>=0;itm--){
Each element is then printed, backwards
System.out.print(Rndarray[itm]+" "); } }
The main begins here
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
This gets the array length
int n = input.nextInt();
This creates a Random object
Random rd = new Random();
This declares the array
int [] Rndarray = new int[lnt];
This iterates through the array for input
for (int itm = 0; itm < lnt; itm++) {
This generates a random number for each array element
Rndarray[itm] = rd.nextInt();
This prints the generates number
System.out.print(Rndarray[itm]+" ");
}
This prints a new line
System.out.println();
This passes the array and the length to backward() method
backward(Rndarray,lnt); }}
What will the declaration below do to its target?
animation-direction: reverse;
The animation steps will play backward.
The animation steps will play forward, then backward.
The animation steps will play forward.
The animation steps will play backward, then forward.