When you program in a language that uses GUI components, you need to create them from scratch.

a. True
b. False

Answers

Answer 1

Answer:

B. False

Explanation:

You do NOT need to start from scratch when you program in a language that uses GUI components. You can think of it like the components are add-ons to your programming language.

Answer 2

Answer:

The correct answer is b. False

Explanation:

You don't need to create them from scratch.

Hope this helps!


Related Questions

When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate

Answers

Answer:

Verifying digital signature

Explanation:

In order to guarantee authenticity of digital messages an documents, the certificate authority will perform the verification of the digital signature. A valid digital signature indicates that data is coming from the proper server and it has not been altered in its course.

(Convert letter grade to number) Write a program that prompts the user to enter a letter grade A/a, B/b, C/c, D/d, or F/f and displays its corresponding numeric value 4, 3, 2, 1, or 0.

Sample Run 1 Enter a letter grade: B The numeric value for grade B is 3

Sample Run 2 Enter a letter grade: b The numeric value for grade b is 3

Sample Run 3 Enter a letter grade: T T is an invalid grade

Answers

Answer:

This program is written in Python Programming Language

Program doesn't make use of comments (See Explanation Section for detailed explanation)

letterg = ['A','B','C','D','F']

inp = input("Enter a Letter Grade: ")

for i in range(len(letterg)):

if inp.upper() == letterg[i]:

print('The numeric value for grade ', inp, ' is ',4 - i)

break;

else:

print(inp, "is an invalid grade")

Explanation:

This line initializes all letter grade from A to F

letterg = ['A','B','C','D','F']

This line prompts user for letter grade

inp = input("Enter a Letter Grade: ")

This line iterates through the initialized letter grades

for i in range(len(letterg)):

This line checks if the user input is present in the initialized letter grades (it also takes care of lowercase letters)

if inp.upper() == letterg[i]:

This line is executed if tge about condition is true; the line calculates the number grade and prints it

print('The numeric value for grade ', inp, ' is ',4 - i)

This line terminates the iteration

break;

If the condition above is not true

else:

This line is executed

print(inp, "is an invalid grade")

24. Which of the following statements about Emergency Support Functions (ESFs) is correct?
O A. ESFs are not exclusively federal coordinating mechanism
O B. ESFs are only a state or local coordinating mechanism
O C. ESFs are exclusively a federal coordinating mechanism
O D. ESFs are exclusively a state coordinating mechanism

Answers

(ESFs) is correct: ESFs are not exclusively federal coordinating mechanism.

The famous Fibonacci sequence, 1, 1, 2, 3, 5, 8, 13, . . . , begins with two 1s. After that, each number is the sum of the preceding two numbers. Write a program using a recursive function that requests an integer n as input and then displays the nth number of the Fibonacci sequence.

Answers

Yo bro I just need help with you

Answer:

int recursiveFunction(int n) {

 

if (n == 0 || n == 1) {

 

 return n;

}

else {

 

 return recursiveFunction(n - 2) + recursiveFunction(n - 1);

}

Explanation:

Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is entered.

Answers

Answer:

Here is the sentinel-controlled while loop:

#include <iostream> //to use input output functions

using namespace std; // to identify objects like cin cout

int main(){ // start of main() function body

int test_score; // declare an integer variable for test scores

//prompts user to enter test scores and type-99 to stop entering scores

cout << "Enter the test scores (enter -99 to stop): ";

cin >> test_score; // reads test scores from user

while (test_score != -99){ // while loop keeps executing until user enters -99

cin >> test_score; } } // keeps taking and reading test scores from user

Explanation:

while loop in the above chunk of code keeps taking input scores from user until -99 is entered. Sentinel-controlled loops keep repeating until a sentinel value is entered. This sentinel value indicates the end of the data entry such as here the sentinel value is -99 which stops the while loop from iterating and taking the test score input from user.

The complete question is that the code should then report how many scores were  entered and the average of these scores. Do not count the end sentinel -99 as a score.

So the program that takes input scores and computes the number of scores entered and average of these scores is given below.

#include <iostream>  // to use input output functions

using namespace std;  // to identify objects like cin cout

int main(){  //start of main function body

double sum = 0.0;  // declares sum variable to hold the sum of test scores

int test_score,count =0;  

/* declares test_scores variable to hold the test scores entered by user and count variable to count how many test scores input by user */

cout << "Enter the test scores (or -99 to stop: ";

//prompts user to enter test scores and type-99 to stop entering scores

cin >> test_score;  // reads test scores from user

while (test_score != -99){  // while loop keeps executing until user enters -99

count++;  /* increments count variable each time a test cores is input by user to count the number of times user entered test scores */

sum = sum + test_score;  // adds the test scores

cin >> test_score;}  // reads test scores from user

if (count == 0)  // if user enters no test score displays the following message

cout << "No score entered by the user" << endl;

else  //if user enters test scores

//displays the numbers of times test scores are entered by user

cout<<"The number of test scores entered: "<<count;

/* displays average of test scores by dividing the sum of input test scores with the total number of input test scores */

cout << "\n The average of " << count << " test scores: " <<sum / count << endl;}

The program along with its output is attached.

differentiate between web site and web application?

Answers

Explanation:

A website is a group of globally accessible into linked pages which have a single domain name. A web application is a software or program is is accessible using any web browser.

Answer:

Explanation:

A website shows static or dynamic data that is predominantly sent from the server to the user only, whereas a web application serves dynamic data with full two way interaction.

Write a program that read two numbers from user input. Then, print the sum of those numbers.

Answers

Answer:

#This is in Python

number1 = raw_input("Enter a number: ")

number2 = raw_input("Enter another number: ")

sum = float(number1) + float(number2)

print(sum)

Explanation:

k- Add the code to define a variable of type 'double', with the name 'cuboidVolume'. Calculate the volume of the cuboid and set this variable value.

Answers

Answer:

Here is the JAVA program to calculate volume of cuboid:

import java.util.Scanner; // Scanner class is used to take input from user

public class CuboidVol { // class to calculate volume of cuboid

public static void main(String[] args) { // start of main() function body

Scanner input= new Scanner(System.in); //create Scanner class object

// prompts user to enter length of cuboid

System.out.println("Enter the cuboid length:");

double length=input.nextDouble(); //reads the input length value from user

// prompts user to enter width of cuboid

System.out.println("Enter the cuboid width:");

double width=input.nextDouble(); //reads the input width from user

// prompts user to enter height of cuboid

System.out.println("Enter the cuboid height:");

double height=input.nextDouble(); //reads the input height from user

/* the following formula is to calculate volume of a cuboid by multiplying its length width and height and a double type variable cuboidVolume is defined to store the value of the resultant volume to it */

double  cuboidVolume= length*width*height; //calculates cuboid volume

//displays volume of cuboid and result is displayed up to 2 decimal places

System.out.printf("Volume of the cuboid (length " + length + "/ height " + height + "/ width" +width +" is: " + "%.2f",cuboidVolume);   } }

Explanation:

The formula for the volume of a cuboid is as following:

Volume = Length × Width ×  Height

So in order to calculate the volume of cuboid three variable are required for length, width and height and one more variable cuboidVolume to hold the resultant volume of the cuboid.

The program is well explained in the comments added to each statement of the program. The program prompts the user to enter the value of height width and length of cuboid and the nextDouble() method is used to take the double type input values of height length and width. Then the program declares a double type variable cuboidVolume to hold the result of the volume of cuboid. Then the last printf statement is used to display the volume of cuboid in the format format "Volume of the cuboid (length  / height  / width ) is" and the result is displayed up to 2 decimal places.

The screenshot of the program along with its output is attached.

The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

Deployment

Explanation:

Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.

So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.

Answer:

Deployment

Explanation:

How to set up a simple peer-to-peer network using a star topology?

Answers

Answer:

The description including its scenario is listed throughout the explanation section below.

Explanation:

Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.

Throughout this configuration or setup:

Each common network setups network unit, such as a firewall, switch, as well as computer. The main network computer serves as either a server as well as the peripheral system serves as just a client.

It is acceptable to create two TCP connections on the same server/port doublet from the same client with different port numbers.
A. True
B. False

Answers

the answer is a. true
I think the answer is A

QUESTION 22 Select the correct statement(s) regarding Carrier Ethernet (CE). a. the Metro Ethernet Forum (MEF) created a CE framework to ensure the interoperability of service provider CE offerings b. MEF certified CE network providers, manufacturers and network professionals to ensure interoperability and service competencies c. MEF certified services include E-Line, E-LAN, E-Tree, E-Access, and E-Transit d. all are correct statements

Answers

Answer:

d. all are correct statements

Explanation:

CARRIER ETHERNET can be defined as the Ethernet which is a telecommunications network providers that provides and enables all Ethernet services to their customers and as well to help them utilize the Ethernet technology in their networks which is why the word “Carrier” in Carrier Ethernet networks is tend to refers to a large communications services providers that has a very wide reach through all their global networks. Example of the carriers are:

They help to provide audio, video, as well as data services to residential and to all business as well as enterprise customers.

CARRIER ETHERNET also make use of high-bandwidth Ethernet technology for easy Internet access and as well as for communication among the end users.

Therefore all the statement about CARRIER ETHERNET NETWORK are correct

a. Metro Ethernet Forum (MEF) is a type of ethernet which created a Carrier Ethernet framework in order to ensure the interoperability of service provider that the Carrier Ethernet is offerings.

b. The MEF also help to certifies CE network providers, as well as the manufacturers and network professionals in order to ensure interoperability as well as a great service competencies.

c. MEF certified services also include E-Line, E-LAN, E-Tree, E-Access, and E-Transit

Hence, MEF is an important part of Carrier Ethernet because they act as the defining body for them, reason been that they are as well telecommunications service providers, cable MSOs, as well as network equipment and software manufacturers among others.

You are in a library to gather information from secondary sources, and you want to find a current print resource that can supplement information from a book. What source should you use

Answers

Answer:

Periodical Literature

Explanation:

In this specific scenario, the best source for you to use would be the periodicals. Periodical Literature is a category of serial publications that get released as a new edition on a regular schedule, such as a magazine, newsletters, academic journals, and yearbooks. Some real-life examples include Sports Illustrated, Discovery, or even Time Magazine. These periodical literary sources all provide up to date data on any topic that is needed.

in java how do i Write a method named isEven that accepts an int argument. The method should return true if the argument is even, or false otherwise. Also write a program to test your method.

Answers

Answer:============================================

//Class header definition

public class TestEven {

   

   //Method main to test the method isEven

   public static void main(String args[ ] ) {

       

       //Test the method isEven using numbers 5 and 6 as arguments

       System.out.println(isEven(5));

       System.out.println(isEven(6));

     

   }

   

   //Method isEven

   //Method has a return type of boolean since it returns true or false.

   //Method has an int parameter

   public static boolean isEven(int number){

       //A number is even if its modulus with 2 gives zero

      if (number % 2 == 0){

           return true;

       }

       

       //Otherwise, the number is odd

       return false;

   }

}

====================================================

Sample Output:

=========================================================

false

true

==========================================================

Explanation:

The above code has been written in Java. It contains comments explaining every part of the code. Please go through the comments in the code.

A sample output has also been provided. You can save the code as TestEven.java and run it on your machine.

Methods are collections of named program statements that are executed when called or evoked

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

   public static void main(String args[ ] ) {

       //This creates a Scanner Object

       Scanner input = new Scanner(System.in);

       //This gets input for the number

       int num = input.nextInt();

       //This calls the function

       System.out.println(isEven(num));

  }

  public static boolean isEven(int num){

      //This returns true, if num is even

      if (num % 2 == 0){

          return true;

      }

      //This returns false, if otherwise

      return false;

  }

}

Read more about methods at:

https://brainly.com/question/20442770

A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long file names. Can something approximating a hierarchical file system be simulated? How?

Answers

Answer:

Yes

Explanation:

Yes, something approximating a hierarchical file system be simulated. This is done by assigning to each file name the name of the directory it is located in.

For example if the directory is UserStudentsLindaPublic, the name of the file can be UserStudentsLindaPublicFileY.

Also the file name can be assigned to look like the file path in the hierarchical file system. Example is /user/document/filename

Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}

Answers

Answer:

double ComputeGasVolume(double pressure, double temperature, double moles){

   double volume = moles*GAS_CONST*temperature/pressure;

    return volume;        

}

Explanation:

You may insert this function just before your main function.

Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles

Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.

SONET is the standard describing optical signals over SMF, while SDH is the standard that describes optical signals over MMF fiber.
A. True
B. False

Answers

Answer:

False.

Explanation:

SONET is an acronym for synchronous optical networking while SDH is an acronym for synchronous digital hierarchy. They are both standard protocols used for the transmission of multiple digital bit streams (multiplex) synchronously through an optical fiber by using lasers.

Hence, both SONET and SDH are interoperable and typically the same standard protocols in telecommunication networks. Also, the SONET is a standardized protocol that is being used in the United States of America and Canada while SDH is an international standard protocols used in countries such as Japan, UK, Germany, Belgium etc.

The synchronous optical networking was developed in 1985 by Bellcore and it was standardized by the American National Standards Institute (ANSI). SDH was developed as a replacement for the plesiochronous digital hierarchy (PDH).

Generally, SONET comprises of four functional layers and these are;

1. Path layer

2. Line layer.

3. Section layer.

4. Physical or Photonic layer.

The SDH comprises of four synchronous transport modules and these are;

1. STM-1: having a basic data rate of 155.52Mbps.

2. STM-4: having a basic data rate of 622.08Mbps.

3. STM-16: having a basic data rate of 2488.32Mbps.

4. STM-64: it has a basic data rate of 9953.28Mbps.

These two standard telecommunications protocols are used to transmit large amounts of network data over a wide range through the use of an optical fiber.


Enter key is also known as Return key. (True or false)

Answers

Answer:

I think false

hope it helps

Answer:

False

Explanation:

The return key is the backspace or escape key.

Hope it helps.

Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3. Your program should make use of the sqrt() method. Math.sqrt(number).

Answers

Answer:

I am writing a JAVA program. Let me know if you want the program in some other programming language.

public class FourthRoot{ //class to calculate fourth root of 81

public static void main(String[] args) { //start of main() function body

   double square_root; //declares to hold the fourth root of 81

   double number=81; // number is assigned the value 81

/* calculates the fourth root of number using sqrt() method twice which means sqrt() of sqrt(). This is equivalent to pow(number,(0.25)) where pow is power function that computes the fourth root by raising the number 81 to the power of 0.25 which is 1/4 */

   square_root=Math.sqrt(Math.sqrt(number));

//displays the fourth root of 81 i.e. 3

     System.out.println("Fourth Root of 81 is "+ square_root); } }

Explanation:

The program is well explained in the comments given along with each statement of the program . Since it was the requirement of the program to user Math.sqrt() method so the fourth root of number= 81 is computed by taking the sqrt() of 81 twice which results in the fourth root of 81 which is 3.

So the first sqrt(81) is 9 and then the sqrt() of the result is taken again to get the fourth root of 81. So sqrt(9) gives 3. So the result of these two computations is stored in square_root variable and the last print statement displays this value of square_root i.e. the fourth root of number=81 which is 3.

Another way to implement the program is to first take sqrt(81) and store the result in a variable i.e. square_root. After this, again take the sqrt() of the result previously computed and display the final result.

public class FourthRoot{

   public static void main(String[] args) {

   double square_root;

   double number=81;

   square_root=Math.sqrt(number);

  System.out.println("Fourth Root of 81 is: "+ Math.sqrt(square_root)); } }

The program along with its output is attached in a screenshot.

opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and user resources. briefly explain what must be done by the operating system protection mechanism in order to provide the required system protection

Answers

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

General PoliciesServer PoliciesVPN PoliciesBack-Up PoliciesFirewall Access and Configuration Policies

Cheers!

4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think operating system designers would use the same interface for both

Answers

Answer:

According to the principles of design, Repetition refers to the recurrence of elements of the design

One of the advantages of this is that it affords uniformity. Another is that it keeps the user of such a system familiar or with the interface of the operating system.

One major drawback of this principle especially as used in the question is that it creates a familiar route for hackers.

Another drawback is that creates what is called "repetition blindness". This normally occurs with perceptual identification tasks.

The  phenomenon may be  due to a failure in sensory analysis to process the same shape, figures or objects.

Cheers!

ICMP
(a) is required to solve the NAT traversal problem
(b) is used in Traceroute
(c) has a new version for IPv6
(d) is used by Ping

Answers

Answer:

(b) is used in Traceroute

(d) is used by Ping

Explanation:

ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;

i. Requested service is not available

ii. Host could not be reached

ICMP does not use ports. Rather it uses types and codes. Some of the most common types are echo request and echo reply.

Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as Time Exceeded) to trace a network route.

Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP echo request packets to the host and then waits for an ICMP echo reply from the host.

ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.

Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require at least a paragraph for each type of firewall.
Acme Corporation wants to be sure employees surfing the web aren't victimized through drive-by downloads. Which type of firewall should Acme use? Explain why your answer is correct.

Answers

Answer:

packet filtering

Explanation:

We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D

15. The primitive data types in JavaScript are:​

Answers

Answer:

The three primitive data types in JavaScript are:

1. Numbers

2. Strings of text(known as "strings")

3. Boolean Truth Values (known as "booleans")

12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE function to find the average bonus multiplier (C7:C10).

Answers

Answer:

1. Divide each bonus by regular bonus apply this to all the data

2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

Explanation:

The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.  

After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

All of the following are examples of being computer literate, EXCEPT ________. knowing how to use the web efficiently knowing how to build and program computers knowing how to avoid hackers and viruses knowing how to maintain and troubleshoot your computer

Answers

Answer:knowing how to build and program computers.

Explanation:

Step1: This file contains just a program shell in which you will write all the programming statements needed to complete the program described below. Here is a sample of the current contents of areas.cpp 1 // Assignment 5 is to compute the area (s) WRITE A COMMENT BRIEFLY DESCRIBING THE PROGRAM PUT YOUR NAME HERE. 2 3 4 // INCLUDE ANY NEEDED HEADER FILES HERE 5 using namespace std;l 7 int main) 9// DEFINE THE NAMED CONSTANT PI HERE AND SET ITS VALUE TO 3.14159 10 11 // DECLARE ALL NEEDED VARIABLES HERE. GIVE EACH ONE A DESCRIPTIVE 12// NAME AND AN APPROPRIATE DATA TYPE 13 14// WRITE STATEMENTS HERE TO DISPLAY THE 4 MENU CHOICES 15 16// WRITE A STATEMENT HERE TO INPUT THE USERS MENU CHOICE 17 18// WRITE STATEMENTS TO OBTAIN ANY NEEDED INPUT INFORMATION 19// AND COMPUTE AND DISPLAY THE AREA FOR EACH VALID MENU CHOICE 20 / IF AN INVALID MENU CHOICE WAS ENTERED, AN ERROR MESSAGE SHOULD 21 /BE DISPLAYED 23 return 0 24 )
Step 2: Design and implement the areas.cpp program so that it correctly meets the program specifications given below Specifications: Sample Run Program to calculate areas of objects Create a menu-driven program that finds and displays areas of 3 different objects. The menu should have the following 4 choices 1 -- square 2 circle 3 - right triangle 4 - quit 1square 2 -- circle 3 -- right triangle 4quit Radius of the circle: 3.0 Area 28.2743 . If the user selects choice 1, the program should find the area of a square . If the user selects choice 2, the program should . If the user selects choice 3, the program should . If the user selects choice 4, the program should . If the user selects anything else (i.e., an invalid find the area of a circle find the area of a right triangle quit without doing anything choice) an appropriate error message should be printed

Answers

Answer & Explanation:

This program is written in C++ and it combines the step 1 and step 2 to create a menu driven program

Each line makes use of comments (as explanation)

Also, see attachment for program file

Program Starts Here

//Put Your Name Here; e.g. MrRoyal

//This program calculates the area of circle, triangle and square; depending on the user selection

//The next line include necessary header file

#include<iostream>

using namespace std;

int main()

{

//The next line defines variable pi as a constant with float datatype

const float pi = 3.14159;

// The next two lines declares all variables that'll be needed in the program

string choice;

float length, base, height, radius, area;

// The next four lines gives an instruction to the user on how to make selection

cout<<"Press 1 to calculate area of a square: "<<endl;

cout<<"Press 2 to calculate area of a circle: "<<endl;

cout<<"Press 3 to calculate area of a triangle: "<<endl;

cout<<"Press 4 to quit: "<<endl;

//This  next line prompts user for input

cout<<"Your choice: ";

//This next line gets user input and uses it to determine the next point of execution

cin>>choice;

if(choice == "1")  //If user input is 1, then the choice is area of square

{

 cout<<"Length: ";  //This line prompts user for length of the square

 cin>>length;  // This line gets the length of the square

 area = length * length;  //This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "2") //If user input is 2, then the choice is area of circle

{

 cout<<"Radius: ";  //This line prompts user for radius

 cin>>radius;  //This line gets radius of the circle

 area = pi * radius * radius;  // This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "3") //If user input is 2, then the choice is area of triangle

{

 cout<<"Base: "; //This line prompts user for base

 cin>>base;  //This line gets the base

 cout<<"Height: ";  //This line prompts user for height

 cin>>height;  //This line gets the height

 area = 0.5 * base * height;  //This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "4")  //If user input is 4, then the choice is to quit

{

 //Do nothing and quit

}

else  //Any other input is invalid

{

 cout<<"Invalid Option Selected";

}

return 0;

}

A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS

Answers

Answer:

FIN

Explanation:

A TCP is an acronym for Transmission Control Protocol and it is one of the essential and important protocol of the internet protocol network. This simply means that, it is an essential part of the TCP/IP network.

The TCP has a wide range of applications in the following areas, file transfers, world wide web, remote administration, e-mail, etc.

The TCP connection are mainly established in the network using the three-way handshake.

A TCP FIN segment is a request to the other transport process to close a connection. The FIN in transmission control protocol (TCP) is an acronym for finish and it involves the packets associated with termination or closing of a network connection.

Generally, the TCP in networking is made up of all of the following flag bits, namely;

1. SYN: used for synchronizing packets associated with a connection.

2. ACK: this is mainly where an acknowledgement of packets in a network takes place.

3. FIN:  it is used for closing connections.

4. PSH: used for pushing packets that are to meant to be delivered at the far end.

5. RST: used as a reset in times of errors in the connection.

6. URG: used to denote urgent and high priority packets in the network.

7

The goal of what technology research is to provide solutions to physical and health related problems

Answers

Answer:Crisis-mapping

Explanation:

Answer:

Crisis Mapping

Explanation:

How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = futureValue * (1 + monthlyInterestRate); i = i+1; }
a. 5
b. 4
c. 6
d. 0

Answers

Answer:

I believe it is A

Explanation:

Other Questions
what's the best prouduct of these fractions 4/78/914/15 Tuliskan dua kebaikan jika mengutamakan kebersihan dan keindahan alam sekitar. the ratio 2.5m to 60cm can be written in the form 1:n find the value of n. someone please help asap if straykids hyunjin had 50,000 won and wanted to by lots of 45rings for 500 won how much will he have left? b) if changbin and han had 145 lightsicks and sold 75? how much lighsticks will they have now? A company wants to administer a satisfaction survey to its current customers. Using their customer database, the company randomly selects 100 customers and asks them about their level of satisfaction with the company.what type of sampling method is use Select the correct car trips. Listed are the distances traveled by four cars and the time it took each car to cover that distance. Identify which cars traveled at the same speed. What was the experience of minority groups during the Great Depression? A. They experienced increased discrimination because of the competition for jobs. B. They received government assistance in starting their own businesses. C.They migrated to the Midwest and found success in farming. Identify the distance between points (3,8, 0) and (-2,9,-4), and identify the midpoint of thesegment for which these are the endpoints. Round to the nearest tenth if necessaryA) d-3.5 units; M(-0.5, 8.5.2)B) d-3.5 units; M(0.5, 8.5.-2)C) d-6.5 units: M(0.5, 8.5.-2)D) d-6.5 units: M(-0.5, 8.5.2) ASAP!! Please help me. I will not accept nonsense answers, but will mark as BRAINLIEST if you answer is correctly with solutions. Please help; thank you! :D ((I would offer some points, but I'm new and I don't know how that works lol)) The demand and supply for catnip are given by the following tables: Demand Price Quantity Supply Price Quantity $1.50/lb 2.00 2.50 3.00 3.50 4.00 10 lb 9 8 7 4 3 $1.50/lb 2.00 2.50 3.00 3.50 4.00 4 lb 5 6 7 10 11 What quantity is sold in equilibrium, and at what price 1. Which of the following is NOT a result of convection current? a) The air in a room is cooled by an air conditioner b) Wind blows towards the beach from the sea. c) The water in a kettle is heated and boils d) The wax covering an iron rod melts when the rod is heated. An association of workers created to improve the working conditions and wages of its members is a Find the area of the shape shown below. In art, what is shade?A. The combination of a color with white to make it lighterB. The combination of a color with black to make it darkerC. The difference between one extreme and another, such as lightand dark or smooth and texturedD. A color's brightness or dullness, as well as shadows and contrastscreated with color each pair of figures is similar find the missing side Prepare the journal entries on December 31, 2019, for the 40 extended contracts (the first year of the revised 3-year contract). Which of these does not determine an ecosystem carrying capacity for a population? A. FoodB. Space C. Migration D. Water Please answer its urgent would be very helpful . Thank you so much ! If you start with 512 grams of aluminum and 1147 grams of copper chloride to make aluminum chloride and copper, what is the limiting reagent? 2Al + 3CuCl -> 2AlCl3 + 3Cu The emperor of mail were know as