Which statement is false?If a value should not change in the body of a function to which it is passed, the value should be defined const to ensure that it is not ac-cidentally modified.Attempts to modify the value of a variable defined const are caught at execution time.One way to pass a pointer to a function is to use a non-constant pointer to non-constant data.It is dangerous to pass a non-pointer into a pointer argument.

Answers

Answer 1

Answer:

Attempts to modify the value of a variable defined const are caught at execution time

Explanation:

The false statement among the options is Attempts to edit the value of a variable defined const are caught at execution time while other options are true.

A const variable should not be modify because the main reason of having a const variable is not to make modifying it possible. If you prefer a variable which you may likely want to modify at some point, then don't just add a const qualifier on it. Furthermore, Any code which modify's a const by force via (pointer) hackery invokes Undefined Behavior


Related Questions

A Solutions Architect needs to build a resilient data warehouse using Amazon Redshift. The Architect needs to rebuild the Redshift cluster in another region. Which approach can the Architect take to address this requirement

Answers

Answer:

Explanation:

An Amazon Redshift data warehouse refers to a collection of computing resources that are known as nodes. These nodes are organized into a group called a cluster. In order to correctly replicate/rebuild this cluster in another region, the Architect needs to modify the Redshift cluster to take snapshots of the Amazon EBS volumes each day, sharing those snapshots with the other region. These snapshots will provide accurate and up-to-date information allowing for a correct rebuild of the Redshift cluster.

Two stations running TCP/IP are engaged in transferring a file. This file is 1000MB long, the payload size is 100 bytes, and the negotiated window size is 1000 bytes. The sender receives an ACK 1200 from the receiver.

Requried:
a. Which bytes will be sent next?
b. What is the last byte number that can be sent without an ACK being sent by the receiver?

Answers

Answer:

a. 2100

b. 2199

Explanation:

GIven that:

The file size = 1000 MB

The  payload size is  = 100 bytes

The negotiated window size is = 1000 bytes.

This implies that the sliding window can accommodate maximum number of 10 packets

The sender receives an ACK 1200 from the receiver.

Total byte of the file is :

1000 MB = 1024000000 bytes

a.

Sender receives an ACK 1200 from the receiver but still two packets are still unacknowledged

=1200 + 9 * 100

= 1200 +  900

= 2100

b. What is the last byte number that can be sent without an ACK being sent by the receiver?

b. Usually byte number starts from zero, in the first packet, the last byte will be 99 because it is in 1000th place.

Thus; the last byte number send is :

= 1200 + 10 *100 -1

= 1200 + 1000-1

= 1200 + 999

= 2199

Write a program BandMatrix.java that takes two integer command-line arguments n and width and prints an n-by-n pattern like the ones below, with a zero (0) for each element whose distance from the main diagonal is strictly more than width, and an asterisk (*) for each entry that is not, and two spaces between each 0 or *.

Answers

Answer:

import java.util.Scanner; //Scanner class to take input from user

public class BandMatrix{ // start of the BandMatrix class

   public static void main(String[] args) {// start of main() function body

   Scanner scanner = new Scanner( System.in );

//creates Scanner class object scanner

              int n = scanner.nextInt(); //reads the value of n from user

                   int width = scanner.nextInt(); //reads input value of width

//the outer and inner loops to form a n by n pattern

   for (int i=0; i<n; i++)    {

       for (int j=0; j<n; j++)        {

           if (j==i || Math.abs(i-j) <= width) {

/*if the value of j become equal to the value of i OR if the difference between i and j is less than or equal to the value of width input by user then asterisks are printed in the pattern otherwise 0 is printed. This simply moves through each element of and calculates its distance from main diagonal */

System.out.print(" * ");   } //displays asterisks when above if condition is true

           else            { //when the above IF condition evaluates to false

 System.out.print(" 0 "); }  }  //displays 0 in pattern when if condition is false    

       System.out.println();    } } }

Explanation:

The program is well explained in the comments mentioned with each statement of the program. The program first takes two integer arguments from user i.e. n and width and uses for loops if (j==i || Math.abs(i-j) <= width) condition to print n-by-n pattern with a zero 0 for each element whose distance from the main diagonal is strictly more than width, and an asterisk * for each entry that is not. I will explain the working of loops.

Suppose n=8 and width=0

The first outer for loop has an i variable that is initialized to 0. This loop executes until the value of i exceeds the value of n. So at first iteration i=0. The loop checks if i<n. Its true because n=8 and i=0 So 8>0. Now the program enters the body of outer loop.

There is an inner loop which has a j variable that is initialized to 0. This loop executes until the value of j exceeds the value of n. So at first iteration j=0. The loop checks if j<n. Its true because n=8 and j=0 So 8>0. Now the program enters the body of inner loop.

There is an if statement inside the body of inner loop. It checks each entry whose distance from the main diagonal is strictly less than or equal width and prints asterisks * when the statement evaluates to true otherwise prints a 0. Lets see how it works.  

i=0 j=0 So j==i is True. If we check the second part of this if statement then

i - j = 0 - 0 = 0. Math.abs() method is used to return the absolute value of this subtraction in case the result comes out to be a negative number. So the result is 0. As the value of width is 0 so this part is true because i-j=0 and width is also 0. So one asterisk is printed when this condition evaluates to true.

This way the loops keeps executing and printing the asterisks or 0 according to the if statement at each iteration. The program along with its output is attached.

Those with good motor skills are often described as having ...
A. good coordination.
B. poor coordination.
C. athletic coordination,

Answers

The answer is B. Poor coordination

In the above case, those with good motor skills are often described as having good coordination.

What is good coordination?

A coordination skill is known to bee the ability of a person to look at many moving pieces and derive a plan for all the pieces to be put  together.

Therefore, In the above case, those with good motor skills are often described as having good coordination.

Learn more about good coordination from

https://brainly.com/question/1476231

#SPJ9

php Exercise 3: Function Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word is a sequence of one or more non-space characters (any character other than ' '). For example, the call of word_count("hello, how are you?") should return 4. Constraints: • Do not use any data structures such as arrays to help you solve this problem. • Do not use the String function explode on this problem. • But you can declare as many simple variables like Integer, String, etc. as you like. Keep it simple.

Answers

Answer:

<?php  

function word_count($string){   // function that takes a string a parameter and returns the number of words in that string

   $space = 0;   // this variable is used in order to detect space, new line and tab spaces in a string

   $words = 1; // this variable is used to identify word presence in string

   $include = $space;  //used to maintain the state of $words and $space

   $counter = 0;  // this counts the number of words in the string

   $i = 0;  //this moves through each character of the string

   while ($i < strlen($string)){  // iterates through every character of string until the last character of string is reached

       if ($string[$i] == " "||$string[$i] == "\n" || $string[$i] == "\t")  //if the space or new line or tab space is identified in the string

           $include = $space;  //set the state of include as space if the next character is a space newline or a tab space

       else if ($include == $space) {  //if next character is a word and current state i.e. $include holds $space

           $include = $words;   //  then set the state i.e. $include as $words

           ++$counter; } //increments i to move to next character at each iteration

       ++$i;  } //returns the number of words in a string

   return $counter; }

$str = "Hello, how are you ";  //sample string

echo "Words: " . word_count($str);  // calls word_count function to return number of words in str.

?>  

Explanation:

The program has a function word_count that accepts a string as its parameter and returns the number of words in the string. In the function there are three variables $space and $words and $include used as state variables. For instance $space identifies space, new line and tab spaces in the $string so it specifies that a space has occurred. $words identifies words in the $string so it specifies that a word has occurred. $include holds this state information. $i moves through every character of the $string and when a space occurs in the $string then the state $include is set to $space. When a word occurs then state $include is set to $words. $counter variable, which is used to count the number of words is incremented to 1 when previous state is $space and next character is a word character. Every time a word is seen in the string, this variable is incremented to 1 to keep track of number of words in the string. When $i reaches the end of the string then this loop stops and counter returns the number of words in the $string.

Write a program that reads a file containing text. Read each line and send it to the output file, preceded by line numbers. If the input file is Mary had a little lamb Whose fleece was white as snow. And everywhere that Mary went, The lamb was sure to go! then the program produces the output file /* 1 */ Mary had a little lamb /* 2 */ Whose fleece was white as snow. /* 3 */ And everywhere that Mary went, /* 4 */ The lamb was sure to go! The line numbers are enclosed in /* */ delimiters so that the program can be used for numbering Java source files. Prompt the user for the input and output file names.

Answers

Answer:

I am writing a JAVA program:

import java.io.FileReader;  // class used for reading data from a file

import java.io.IOException;  //class used for handling exceptions

import java.io.PrintWriter;  // class used to printing or writing formatted data. It is used when the data to be written contains text and numbers

import java.util.Scanner;   // class used to take input from the user

public class Main  {  //start of the class

public static void main(String[] args)  {//start of main() function body

Scanner input = new Scanner(System.in);  //creates Scanner class object

System.out.print("Enter the input file name: ");  // prompts user to enter the input file name

String input_file = input.next();  //to  read and return the token i.e. input file name and store this into input_file String type variable

System.out.print("Enter the output file name: "); // prompts user to enter the output file name

String output_file = input.next();   /to  read and return the token i.e. output file name and store this into output_file String type variable

try   {/* try  defines a chunk of code to be tested for errors during the execute of this chunk. its a code block for reading from input file and writing to output file. This handles the exception if program cannot create or write to the file indicated. */

   FileReader inFile = new FileReader(input_file);  //creates object inFile of FileReader class to read the input_file contents

   Scanner scan = new Scanner(inFile);  //read and scans the input file

   PrintWriter outFile = new PrintWriter(output_file);  //creates object outFile of PrintWriter class to write to the output file. It is used to write output data in a readable text form.

   int count = 1;    //counts the line number      

   while (scan.hasNextLine())  {  //loop keeps checking for the next line in input file

    String lines = scan.nextLine();  // reads the entire line of the input file and stores that line contents in String lines

    outFile.println("/* " + count + " */ " + lines);  //each line represented with line number enclosed in /* */

    count++;  }   //increments the line number at each iteration    

    outFile.close();        }  //closes the output file after writing the contents from input file with each line of the input file enclosed in  /* */

catch (IOException e)  {  // catching the IOException and prints the following message if program cannot create input_file or write to the output_file

   System.out.println("Error processing file: " + e);    }     }   }

Explanation:

The program is well explained in the comments mentioned with each statement of the above program. The user is prompted to enter input and output file names. Then the program uses a while loop that scans through lines of the input file and count variable counts each line of input file. Then at each iteration the count variable counts a line of input file and line number of each line of the input file is enclosed in /* */ delimiters. The contents of input file, in which the line numbers of text lines of the input file are enclosed in /* */ delimiters, is written to the output file.

The screenshot of the program is attached along with the output file produces as a result of this program execution.

The blank function returns to the first character or characters in a text string based on the number of characters specified??? A. PROPER B. MID C. LEN D. LEFT

Answers

Answer: D.) LEFT

Explanation: LEFT is an excel function allows users to extract a specified number of characters starting from the left. The syntax goes thus :

=LEFT(text, [num_chars])

text: the original string in which characters are to be extracted.

num_chars : takes an integer, stating the number of characters to extract.

The proper function is also an excel function which sets the first character in each word to uppercase. The mid function is also used in text extraction starting from any position in the original string based on what is specified.

The LEN function is used to get the number or length of characters in a string.

If I have an Animal superclass with a Mammal subclass, both concrete and both having a method called eat() with identical signatures and return types, polymorphism means:________.
a. the Animal version of eat() will be called, regardless of the static/dynamic type.
b. the Mammal version of eatſ) will be called, regardless of static/dynamic.
c. the dynamic type of the reference will determine which of the methods to call.
d. the static type of the reference will determine which of the methods to call.

Answers

Answer:

(c) the dynamic type of reference will determine which of the methods to call.

Explanation:

Polymorphism in Object Oriented Programming typically means the same method name can cause different actions depending on which object it is invoked on. Polymorphism allows for dynamic binding in that method invocation is not bound to the method definition until the program executes.

So in the case of Animal superclass and Mammal subclass, both having a method called eat() with identical signatures and return types, depending on which reference, the correct method eat() will be called dynamically upon execution.

For example, if we have the following;

================================

Mammal mammal = new Animal();

mammal.eat()

================================

The eat() method that will be called is the one in the Mammal subclass.

However, if we have;

================================

Animal animal = new Animal();

animal.eat()

================================

The eat() method of the Animal superclass will be called.

Complete the method, print Multiples(), that takes in a positive integer n, and another positive integer, max. Print out all the multiples of n that are less than or equal to max. Print each multiple on a separate line. For example, if the method is called with n

Answers

Answer:

public static void printMultiples(int n, int max){

    for (int i=1; i<=max; i++){

        if(i%n == 0)

            System.out.println(i);

    }

}

Explanation:

Create a method called printMultiples that takes two parameters n and max

Inside the method, create a for loop that iterates from 1 to max. If i, a number between 1 and max, % n is equal to 0, that means the number is a multiple of n, print the number.

All the protocol layers of the internet (Application, Transport. Network) were originally without any security. TLS is one of the security architectures added later. In the Internet protocol stack. TLS is located:________. 1. right above the application layer 2. right below the application layer 3. right below the transport layer 4. right above the IP layer

Answers

Answer:

2. right below the application layer

Explanation:

TLS (Transport Layer Security) is an improved and more secured version of the SSL (Secure Socket Layer) used as cryptographic protocol for providing authentication and encryption over a network. It is initialized at the transport layer of the IP stack and finalized at the application layer. In other words, it is located between the transport and application layer of the Internet protocol stack. And this is necessary so that data received in the application layer from the transport layer are protected from start to end between these two layers.

Therefore, it is safe to say that the TLS is located right below the application layer.  

Can someone shows me an example of recursive descent parser and recursive descent parser tests ?

Answers

Answer:

Parser is type of program that can determine that whether the start symbol can derive the program or not. Parser done carefully then parser is right otherwise it is wrong.

Explanation:

Recursive descent Parser example: It is also called the top down parser. In this parser, the symbol can be expand for whole program.

The recursive Descent and LL parser are called the top down parser.

Example:

E->E+T / T

T-T*F / F

F-> (E) / id

S -cAd

A- ab/a Input string is w= cad

You purchase a new desktop computer that does not have wireless capability, and then you decide that you want to use a wireless connection to the Internet. What are the two least expensive ways (choose two) to upgrade your system to wireless

Answers

Answer:

hello the options to the question are missing here are the option

a. Trade in the computer for another computer that has wireless installed 4

b. Purchase a second computer that has wireless

c. Purchase a wireless expansion card and install it in your system

d. Purchase a USB wireless adapter and connect it to your PC by way of a USB  port

Answer : Purchase a wireless expansion card and install it in your system (c)

Purchase a USB wireless adapter and connect it to your PC by way of         a USB port ( d )

Explanation:

A wireless expansion card : A wireless Expansion card are added to a system via expansion slots. they are added to a system without a WiFi adapter and it is quite affordable

USB wireless adapter : A USB wireless adapter overrides the computer's built-in wireless function of a system and it gives a faster and more reliable connection via the USB ports.

write the algorithm, flowchart and BASIC program to calculate the area of the rectangle length 50m and width 30m.​

Answers

Answer:

The Basic Program is as follows:

10 LENGTH = 50

15 WIDTH = 30

20 AREA = WIDTH * LENGTH

25 PRINT AREA

30 END

The Algorithm is as follows:

1. Start

2. Let Length = 50

3. Let Width = 30

4. Compute Area = Length * Width

5. Display Area

6. Stop

See Attachment for flowchart (flowchart is designed using draw io tools)

Explanation:

The flowchart, algorithm and basic program all follow the same sequence and explanation

Using the basic program as a case study;

Line number 10: The program starts by initializing LENGTH to 50

Line number 15: It then initializes WIDTH to 30

Line number 20: The AREA is calculated by LENGTH * WIDTH

Line number 25: The value of AREA is printed afterwards

Line number 30: Lastly, the program stops execution

If you have taken any drugs, it's not safe to drive.
A. True
B. False

Answers

Answer:

True

Explanation:

It is risky to drive while you are on drugs!

What are entity-relationship diagrams and how are they used? What symbol is used for a relationship? What is an associative entity? Provide an example.

Answers

Answer:

The definition including its given problem is outlined in the following segment on the clarification.

Explanation:

Entity-relationship (ER) diagram describes how mechanical stored procedures are constructed and demonstrate the overarching representation of the situation. It also describes the connections between some of the entities of the framework and even the comparison with standard measurements.For something like an individual relationship structure, the normal representation of connections seems to be a diamond. Associative institutions have several to many partnerships to communicate with. It's indeed the verb throughout a diamond-shaped form that holds two organizations around each other. This verb is in fact an entity on its own, therefore it must be termed an associative entity.An illustration of such might be if a participant were to register for a class. Multiple individuals will be registered for several courses, and there have been many to several relationships; thus, the associative object will indeed register.

Rijndael, AES, CCMP are same as well as different. They are same in terms of how encryption is done and different in terms of whether each one is a protocol, algorithm or a standard.CCMP is both, a protocol and a standard, Rijndael is:_________ a) standard only b) an algorithm c) a communications protocol. d) patented by US Government

Answers

Answer:

Option (b) is the correct answer to this question.

Explanation:

AES is based on Rijndael Algorithm.

The Rijndael algorithm enables a choice of block sizes and key sizes. The choices are for each of 128, 192, or 256 bits. Once NIST implemented Rijndael for AES, it only specified one block size,128 bits, but maintained three major lengths of selection. IEEE 802.11I go a step and further limits when both the main size and length of the block for 128 bits. It simplifies deployment and relieves users during development from having to make yet again another decision.

Other options are incorrect because they are not related to the given scenario.

If you know the audience for your website is diverse, what should you do? A. Avoid creating a list of frequently asked questions (FAQs). B. Use a high-tech, complex page design to impress site visitors. C. Provide more than one way to find specific content. D. Incorporate graphics of sports and use sports-related metaphors.

Answers

Answer:

C. Provide more than one way to find specific content.

Explanation:

The website should be made in an innovative and in an attractive way so that the audience, customers, the general public could see your products easily and reach you out in an easy manner.

As you know that your audience for a website is diverse that for that you should need to provide them one more way to determine the specific content as it is easy for them to understand and easily they can access to their website

Hence, the correct option is C.

The birthday attacks are called so because we can only have 365 birthdays (oh well, excluding 2/29). So, if there are 366 people in a place at least two of them have the same birthday - thus causing collision(s). Same things happens in hash algorithm. The people in birthday attack is the same thing as:___________. 1. hash in the hash algorithm. 2. input in the hash algorithm. 3. the algorithm in hash algorithm. 4. the key

Answers

Answer:

2. input in the hash algorithm

Explanation:

In a hash algorithm, a function called hash function (say H) is chosen to transform a variable sized input n, and return a fixed size string called the hash value (say h). i.e

H(n) => h

Comparing this to the birthday attacks;

i. the hash function is getting the people's birthdays - H,

ii. the input is each person in the group of people - n,

iii. the hash is the value of the birthday of each person - H(n).

For vulnerable road users, the areas where roadways transition from one environment to another are...
A. the safest areas.
B. the most clearly marked areas.
C. the most dangerous areas.

Answers

The answer will be C- the most dangerous areas !!!

For vulnerable road users, the areas where roadways transition from one environment to another are the most dangerous areas. Thus the correct answer is C.

What is the environment?

An environment is refers to surroundings in which all the living and nonliving objects exist to survive life. This includes humans, animals, plants, and other resources.

the areas where roadways transition from one environment to another are the most dangerous areas because here drivers first recognize an approaching change in the nature of the roadway and then reduce their speed as appropriate.

Therefore, option C is appropriate.

Learn more about the environment, here:

brainly.com/question/518189?

#SPJ2

The Local Government Authority of Ghana wishes to computerize their activities. The Authority desires departments and units to be able to share files whiles it reduces some unnecessary cost. As the Head of IT unit your Head of Department has tasked you to research what connection type would be appropriate for LGA and why? As a tough headed Boss he requires that you give Three (3) key points to support your choice for and against?

Answers

Answer:

wireless connection

Explanation:

key point worth noting : reduces some unnecessary cost

As the Head of IT unit your Head of Department, I will recommend that wireless connection should put in place. wireless connection will reduce cost of laying wires to different department of the Local Government Authority and also save record time that would have been used up during the installation.

Major benefits of wireless networking

1. Increased network coverage: wireless networks  can be used to reach  places in Local Government Authority office that are not accessible for wires and cables.

2. Improved Scalability: Wireless systems can be configured to meet the needs of specific departments of the Local Government Authority. These can be easily modified and scaled depending on each department’s needs.

3. Lower overall cost:Wireless Networking is relatively less costlier than wired Networks since no cables is required between the devices as well as lower long-term costs due to lesser maintenance fees since there is less equipment.

print_pattern() prints 5 characters. Call print_pattern() twice to print 10 characters. Example output: ***** ***** in python

Answers

Answer:

def print_pattern():

print("*****",end=" ")

print_pattern()

print_pattern()

Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored in the list special_list

Answers

Answer:

In python, the statement can be written as:

if(special_num in special_list): print("Special Number")

Explanation:

We need to create a list with the name 'special_list' with some values and then check whether special_num is in the list or not using the membership operator.

Membership operator in python: in

Let us do it step by step in python:

special_list = ['1', '2', '3','4']      #A list with the values 1, 2, 3 and 4

special_num = input("Enter the number to be checked as special \t")

#Taking the input from the user in the variable special_num.

if(special_num in special_list): print("Special Number")

#Using the membership operator in to check whether it exists in the list or not.

Please refer to the image attached for the execution of above program.

So, the answer is:

In python, the statement can be written as:

if(special_num in special_list): print("Special Number")

A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply

Answers

Complete Question:

A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply.

A. Logs.

B. Full Disk Encryption (FDE).

C. Binary whitelisting software.

D. Security Information and Event Management (SIEM) system.

Answer:

A. Logs.

D. Security Information and Event Management (SIEM) system.

Explanation:

If a network security analyst received an alert about a potential malware threat on a user’s computer. In order to get a detailed information about this compromise, the analyst should review both the logs and Security Information and Event Management (SIEM) system.

In Computer science, logs can be defined as records of events triggered by a user, operating system and other software applications running on a computer. Log files are used to gather information stored on a computer such as user activities, system performance and software program.

Security Information and Event Management (SIEM) system is the process of gathering and integration of all the logs generated by a computer from various software application, service, process, or security tool.

These logs collected through the SIEM are shown in a format that is readable by the security analyst and this help in real-time detection of threats.

Hence, logs and SIEM systems are important tools for network security analyst for detection of threats in real-time and event management functions.

James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. What can James use to wipe the data clean?

a. Zero-fill utility
b. Format the drive
c. ATA Secure Erase
d. Smash the USB drive

Answers

Answer:

C. ATA Secure Erase

D. Smash the USB drive

Explanation:

Zero fill utility is a specialized way of formatting a storage device particularly secondary storage such as hard disk, flash drive e.t.c. In this process, the disk contents are overwritten with zeros. Once this has been done, undoing is essentially hard but possible. In most cases, this might just mean that the data content is corrupt and as such might still be recovered, maybe not in its pure entirety.

Formatting the drive on another hand does not essentially mean cleaning the drive and wiping off data. It just means that operating systems cannot see those data contents anymore. They are still present in the drive and can be recovered.

ATA Secure Erase is actually a way of completely and permanently erasing the content in a drive. Once the function has been done, undoing is not possible. Both the data content and even the data management table will be completely gone.

Smashing the USB drive is the surest way of cleaning data as that will permanently destroy the working components of the drive such as the memory chip. And once that happens then there's no drive let alone its contents.

Which guideline should an employee use when taking notes for a report

Answers

They should respect what is going on and wittiest down everything they can and get it to be the truth or closet to the truth. Also if they say sow,thing happened and they don't want you to right it would be for the best not to right it

1. He is sincere while making report bcz when he make report by heart it is definitely useful.

He is always remain alert bcz any mistake can influence his ratings or project importance


How many searches should you complete when looking up information using online references?

Answers

As many as it takes of course ;)

Answer:

c

Explanation:

The list of lists below is meant to represent the money raised by a charity over multiple days. The inner lists represent each donation, and the outer list represents each day. Use a for loop to calculate the sum of all the numbers in this list of list of numbers, to print the total amount of money raised.
code given:hourly_donations_per_day = [[44, 33, 56, 27, 33, 25],[12, 15, 22, 19, 21],[36, 34, 32, 37, 28, 11, 35],[20, 19, 29],[22, 27, 21, 15, 26, 15]]

Answers

Answer:

Following are the code to this question:

hourly_donations_per_day = [ #declaring list of lists and assign values

[44, 33, 56, 27, 33, 25],

[12, 15, 22, 19, 21],

[36, 34, 32, 37, 28, 11, 35],

[20, 19, 29],

[22, 27, 21, 15, 26, 15]

]

total_amount_of_money_raised = 0#defining a variable and assign a values 0

for i in hourly_donations_per_day:#defining loop to count values donation  

       if isinstance(i,list): #using if block to add donation values

               for j in i:#defining loop for add list values

                   total_amount_of_money_raised += j #add all values in total_amount_of_money_raised variable

print(total_amount_of_money_raised) #print value

Output:

714

Explanation:

In the above code, a list of the list is declared in which, it assigns the multiple values, in the inner lists it represents donation value and in the outer list it represents the day. In the next step, a variable "total_amount_of_money_raised" is declared that assigns a value 0, in the next step, multiple for loop is declared which is used to add list donation value and at the last print, the method is used to print its value.    

all HTML tags are case sensitive, case insensitive and have to be written in capitals only​

Answers

Answer:

Html tags are not case sensitive

It's in JavaScript that the tags are case sensitive

Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?

a. WS-Trust
b. WS-SecureConversion
c. WS-SecurityPolicy
d. All of the mentioned

Answers

Answer:

a. WS-Trust

Explanation:

WS-Trust can be defined as a WS-specification as well as OASIS standard that help to provides extensions to WS-Security, in order to facilitate a mechanism for issuing, renewing, as well as validating of security tokens which is why the aim and objectives of WS-Trust is to help and enable applications to construct trusted SOAP message exchanges.

Nevertheless WS-Trust enables the issuance as well as the dissemination of credentials within several and various trust domains.

A web service using the WS-Trust can be used for implementing the standards that encode the WS security to facilitate the mechanisms for issuing and reviewing the security tokens.

Hence e the option A is correct. The  WS security token service is a service based on the mechanisms of the key exchange.

Learn more about the following enhances WS-Security to facilitate.

brainly.com/question/13171394.

Internally, a bin heap is typically implemented as a BST that has the additional ordering property that the minimum value is at the root (or the maximum value is at the root, if we chose to make the bin heap to be a max heap).
a) True
b) False

Answers

Answer:

True is the correct answer to the given question .

Explanation:

Heap is the complete binary tree that meets the property of organizing the heap There are two types heap max heap and min heap .The value in the heap of every node is greater than or equal to its parent 's value or less then equal to the  parent with there dimension of the minimum value or the maximum value just at the root.

So the binary heap is configured as a Binary Search Tree with the external organizing attribute that perhaps the mean price is in the root with maximum value .

Therefore the given statement is true .

Other Questions
A stock just paid a dividend of $5.37 and is expected to maintain a constant dividend growth rate of 4.6 percent indefinitely. If the current stock price is $77, what is the required return on the stock Why did the main character confess to the police of his murder in the story 'The Tell-tale heart'?A) he wanted to go to jailB) he heard the old man's heartC) the police already knew D) he was being forced to confess Write an analysis of a situation, the barriers involved, and how you can make it work. Include all of the material on synergy from your readings on Synergy. Men when they enter into society, yield up a part of theirnatural liberty, for the sake of being protected bygovernment. If they yleld up all their natural rights they areabsolute slaves to their governors. If they yield up lessthan is necessary, the government is so feeble, that itcannot protect them. To yield up so much, as is necessaryfor the purposes of government, and to retain all beyondwhat is necessary, is the great point, which ought, ifpossible, to be attained in the formation of a constitution..U.To define what portion of his natural liberty, the subjectshall at the time be entitled to retain, is one great end of abill of rights....Without such a bill of rights, firmlysecuring the privileges of the subject, the government isalways in danger of degenerating into tyrannyWhat important Anti-Federalist idea is expressed in this excerpt from the Anti-Federalist Papers?0 A. Support for a bill of rightsB. Belief in states' rightsC. Hatred of FederalistsO D. Disapproval of constitutions Carl is a self-employed real estate agent. For the current year, his self-employment net earnings (revenues minus expenses) are $80,000. He is also employed as an accountant with a gross salary of $70,000 for the year. Assume that the appropriate social security income ceiling for the year is $130,000 and that the self-employed FICA rates are 12.4% for social security and 2.9% for Medicare. What is Carl s self-employment tax liability for the year Abels age in 2019 will be equal to the sum of the digits of his year of birth. If Abel is an adult, how old is Abel now? CaC(s) + H2O(l) > Ca(OH)2(s): triangle H = -65.2kJ The times for completing one circuit of a bicycle course are normally distributed witha mean of 72.5 minutes and a standard deviation of 6.5 minutes. An associationwants to sponsor a race but will eliminate the bottom 75% of riders. In a trial run,what should be the cutoff time? A student titrates a 20.00 mL sample of an aqueous borax solution with 1.03 M H2SO4. If 2.07 mL of acid are needed to reach the equivalence point, then what is the molarity of the borax solution Please help, i need to finish this please! Find the value of x in each case: Medeco sold goods for $100 to a charge customer. The customer returned for credit $25 worth of goods. Terms of the sale were 1/10,n/30. If the customer pays the amount owed within the discount period, what is the amount the customer should pay? 3. Two-thirds of a number plus 4 is 76. What is the number? What was the television show for which Queen Latifah wrote the theme song?A. A Different WorldB. The Living RoomC. Living SingleD. Big Bunch Propose FOUR measures South Africans can implement during thelockdown to keep their mental health in check. At the city museum, child admission is $6.20 and adult admission is $9.50. On Friday, tickets were sold for a total sales of $1082.00. How many child tickets were sold that day? Geneticists studying the gene for lactase did not find any differences in the coding region DNA (the section of DNA with instructions to make the protein) between people who could digest lactose and people who could not digest lactose. After they investigated further, they discovered that the difference between lactose tolerant and intolerant individuals was due to a mutation located in A company's product sells at $12.30 per unit and has a $5.45 per unit variable cost. The company's total fixed costs are $96,500. The break-even point in units is: Can someone help me ? In an experiment, the membrane potential of a neuron is hyperpolarized to 120 mV. When an inhibitory neurotransmitter is applied to the preparation, the membrane is depolarized. Which of the following could explain this result?a. Inhibitory transmitters normally depolarize the synaptic membrane. b. The normal response of the postsynaptic membrane to any transmitter is depolarization. c. The inhibitory transmitter activates ligand-gated potassium channels. d. Sodium channels become inactivated. e. Calcium channels become activated.