Answer:
Every method call which requires a V-TAB is hidden and implicit SWITCH-CASE. V-TABs are a jump table were the object type is the index in which method is called. Properly build O-O Programming requires very few SWITCH-CASE as the V-TABs make the selection.
Hope it helps
Please mark me as the brainliest.
Thank you
will give brainlyist
Which sentence in the following paragraph correctly describes mobile technology?
Mobile devices have become the main source of communication for many people around the world. However, businesses are still to capitalize on the wide reach mobile communication. Social media is being increasingly used in marketing research. Customized advertising can be integrated based on specific users' location. Smartphones do not have videoconferencing capabilities that is becoming a major business tool.
i think its the first sentence: Mobile devices have become the main source of communication for many people around the world
if im wrong im dum ;-;
Answer:
Customized advertising can be integrated based on specific users location.
Explanation:
Right for Plato/edmentum
Instructions:Emotet is an advanced banking Trojan that primarily functions as a downloader of other Trojans. According to the Symantec Internet security threat report, Emotet first emerged in 2014 and, after a quiet period, reappeared to make waves in the second half of 2017. Emotet again made headline news when it was used in more attacks in late 2019. In this activity, you will do some research and answer the following questions about Emotet.Note:Include references to support each of your answers, such as the book, news article, or website you collected the information from. Only answers with references will receive points.1. [10 points] Explain how the malware spread itself. In particular, do you think its spreading mechanism is like a worm or a virus? Justify your answer. (4-6 sentences)2. [10 points ] Explain the concealment mechanisms employed by Emotet. (3-6 sentences)3. [10 points ] Explain how Emotet communicates with a command and control (C&C) server? (4-6 sentences)
Compared with space operations specialists, intelligence officers are which of the following?
A.) less likely to perform on-the-job training
B.)more likely to participate in technical training
C.)less likely to obtain a bachelor’s degree
D.)more likely to work with highly classified information
Answer:
more involved in aligning communications systems
Explanation:
I think this should be it
Answer could be:
more likely to work with highly classified informationor
something before Z
Case Study Dr. Thomas Waggoner, an information systems professor at the local university, is at the Will Call window at the Medallion Theatre, trying to pick up tickets he had reserved. However, due to an oversight which turns out to be rather frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner and his wife, who are celebrating their wedding anniversary, the box office manager finds two box seats which had not been claimed. In talking with the box office manager, Dr. Waggoner starts thinking that he could perhaps help the theatre avoid this type of problem in the future. His students could design and build a system to help keep track of ticket sales, and hopefully help the theatre become more efficient and improve customer satisfaction. Q # 1 Write down the purpose of the given requirements HINT: purpose of a system? Q # 2 Write down the Modules and also extract the functional requirements of the given requirements? Q # 3 Create a use Case Diagram and Use cases of the above requirements? Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE: Write down the caption on each interface.
Answer:
1. The primary purpose of a system is system development, analysis and design to avoid inappropriate and duplicate selling of theatre tickets.
2. The function requirements are development of a system which automatically reserves the ticket when a person books it and marks it appear booked for all the customers.
3. The customers can book the ticket through online system. The system then marks the ticket as unavailable for all the other customers until and unless the original customers cancels the ticket.
Explanation:
Dr. Waggoner had an issue with ticket booking as his booking was sold to another customer. This could lead him to a bad experience at theatre but since the box office manager assisted him with another available seats. This issue has been resolved with good faith but there can be problems in future where many customers can claim a single seat. To avoid this the theatre should introduce online booking system based on computer application which can be accessed by all the customers through website.
A computer connected to the internet that ask for data is a
Answer:
Client
Explanation:
When your computer is connected to the internet it is always asking and sending data. Your computer is the client which recieves the data from the sever.
Which options can be used for totaling numbers?
Activity #2
1. Write the formula in getting the sum of these two numbers:
16 and 25; 16 is in cell B2 and 25 is in cell B3.
Answer:
2. Write the multiplication formula of these two numbers:
8 and 10; 8 is in cell C4 and 10 is in cell C5.
Answer:
3. Write the formula in dividing these numbers:
20 and 5 : 20 is in cell F2 and 5 is in cell F3.
Answer;
Answer:
1. sum(B2,B3) , OR =B3+B2
2. =C4*C5
3. =F2/F3
Explanation:
Use the = operator to do any basic math using numbers or the respective cells. each also have respective functions as shown first in problem 1.
Liquid-liquid extraction is best suited to separate a mixture of compounds when:
A. The mixture contains compounds with similar polarities but different solubilities.
B. The mixture contains compounds with similar solubilities but different molecular weights.
C. The mixture contains compounds with similar melting points but different polarities.
D. The mixture contains compounds with similar molecular weight but different polarities.
E. The mixture contains compounds with similar molecular weight but different melting points.
Answer:
A. The mixture contains compounds with similar polarities but different solubilities.
Explanation:
Liquid – Liquid (LLE) extraction is a process for the isolation of compounds or metal complexes, also known as solvent extraction and partitioning, based on their relative solubility in two distinct liquids, generally water- (polar) liquids and an organic solvent (non-polar). Net transition from a liquid to a liquid process of one or more species, normally from aqueous to organic.
In MIPS, all operation codes (op-codes) use ______ only.
A- 5 bits
B- 8 bits
C- 6 bits
D -32 bits
Answer:
5 bits
Explanation:
ue82ijevw8ey जभछतड।णृबदजठणब
Suppose Client A initiates a Telnet session with Server S. At about the same time, Client B also initiates a Telnet session with Server S. Provide possible source and destination port numbers for:
a. The segments sent from A to S.
b. The segments sent from B to S.
c. The segments sent from S to A.
d. The segments sent from S to B.
e. If A and B are different hosts, is it possible that the source port number in the segments from A to S is the same as that from B to S?
f. How about if they are the same host?
Answer:
Explanation:
From the given information;
We will like you to understand that the source port numbers and destination port number can be any number. For that reason, the ones being used here will just be examples.
NOTE:
That the destination port numbers sent from A to S and B to S are the same in their segments.
That the destination port numbers sent from S to A and S to B are the same in their segments.
From A to S, the segment sent possibly could have the source port number 467 and destination port number as 23(Telnet)
From B to S, the segment sent possibly could have the source port number 513 and destination port number as 23(Telnet).
From S to A, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 467.
From S to B, the segment sent possibly could have the source port number as 23(Telnet) and destination port number as 513.
Yes, it is possible. This is because the inclusion of IP in the segments is to recognize the host.
No, the source ports will be different. Because source port number from A to S can't be the same from B to S at the time they are in the same host.
Pulling out specific differences
Answer:
Terms in this set (24) abstraction. Pulling out specific differences to make one solution work for multiple problems. algorithm. A list of steps to finish a task. binary. A way of representing information using only two options. bug. code. command. computational thinking. conditionals.Do you know the energy unit question?
Answer:
Fossil Fuels
Explanation:
Example of vector image format
Answer:
JPEGs, GIFs and PNGs are common raster image types. ...
Vector images, alternatively, allow for more flexibility. Constructed using mathematical formulas rather than individual colored blocks, vector file types such as EPS, AI and PDF* are excellent for creating graphics that frequently require resizing.
if your audience seems confused about a previous slide, in presenter view, whats the best way to jump back to a previous point in the presentation
Answer:
You can go back to that point towards the end of the presentation or find where it would link later on in the presentation. Then you can ask if there are any questions and if the audience are willing to ask them you can go ahead and explain it.
Explanation:
If the message portion of a frame contains 640 bits, SDLC has a beginning flag (8 bits), an address (8 bits), a control field (8 bits), a frame check sequence (assume we use a CRC-32 with 32 bits), and an ending flag (8 bits). Calculate the efficiency of this synchronous transmission and complete TE1. Next, calculate the efficiency using a frame that contains 720 bits with the same overhead and complete TE2. Which one is more efficient
Answer:
The same basic formula can be used to calculate the efficiency of synchronous transmission. For example, suppose we are using SDLC. The number of information bits is calculated to help you determine how many.
Explanation:
WHY ARE APARTMENTS CALLED APARTMENTS IF THEY ARE TOGETHER LOL
Answer:
cause architects are weird
Explanation:
Explanation:
Cause apartments is apartments so therefore its called apartments
When cropping a picture to shape, you can only turn it into a square or circle.
Select one:
O True
O False
3) Which of the following operators is used for performing exponentiation?
Answer:
pls make more detailed
Explanation:
The operator that is used for performing exponentiation is ^. The correct option is A.
What are exponential?One technique to determine the exponential value of the supplied base and exponent values in Python is to use the exponentiation operator. Between the base and exponent values, we utilize the (**) double asterisk/exponentiation operator.
It provides a string in exponential notation that represents the Number object. Using the syntax number.to Exponential (value) The '.' operator is used with a number to invoke the toExponential() method, as demonstrated in the syntax above.
The ^ symbol represents the exponent. This symbol is known as a carrot (). As an illustration, 4 raised to 2 can be expressed as 42 or 42.
Therefore, the correct option is A) ^.
To learn more about exponential, refer to the link:
https://brainly.com/question/28596571
#SPJ6
The question is incomplete. Your most probably complete question is given below:
A) ^
B) #
C) *
D) /
what is the quotient of 8.16 ÷ 100
Answer:
0.0816
Explanation:
8.16 ÷ 100 = 0.0816 (Ans)
Cloud computing security risks
Answer:
Risks:
Network issues or outages caused by attackers can limit or completely deny access to data stored in the cloud
Attackers could find an exploit and steal company data without ever physically touching the company's computer.
That's what I can think of.
Explanation:
Case Study
Dr. Thomas Waggoner, an information systems professor at the local university,
is at the Will Call window at the Medallion Theatre, trying to pick up tickets he
had reserved. However, due to an oversight which turns out to be rather
frequent, his tickets were sold to another patron. Fortunately for Dr. Waggoner
and his wife, who are celebrating their wedding anniversary, the box office
manager finds two box seats which had not been claimed. In talking with the
box office manager, Dr. Waggoner starts thinking that he could perhaps help the
theatre avoid this type of problem in the future. His students could design and
build a system to help keep track of ticket sales, and hopefully help the theatre
become more efficient and improve customer satisfaction.
Q # 1 Write down the purpose of the given requirements HINT: purpose of a
system?
Q # 2 Write down the Modules and also extract the functional requirements of
the given requirements?
Q # 3 Create a use Case Diagram and Use cases of the above requirements?
Q # 4 Create a Class Diagram and its GUI interfaces of the system? NOTE:
Write down the caption on each interface.
Answer:
1. Design system to avoid theatre tickets selling issue.
2. Resources provided to student who can built a system for the theatre tickets booking.
3. Medallion Theatre Booking System
Add/edit patron
Add/edit production
Add/edit performance
Add/edit seats
Purchase tickets
Generate Tickets Sold Report
4.GUI or graphical user interface allows the user to connect through graphical icons.
Explanation:
The main purpose is to avoid problems of duplicate tickets sales in future. The system will enable the selling of each seat to one customer only and when an attempt is made to resold the seat the system warns the user creating a check for original sale. This will help theatre to avoid any issues in future and customers will be happy with their ease of confirmation of booking.
What are the best legendary pokemon?
Answer:
Any EX
Any GX
Pikachu
Raichu
Mew Two
Charizard
Taurus
Gumshoos
Lurantis
Lapras
Incineroar
Dialga
Guzzlord
Lugia
Darkrai
Sigilyph
Xerneas
Explanation:
There are more but it takes a little while to get them all
Design a program named GradeDistribution.java that reads in 10 grades from the keyboard, then counts and displays grade distribution as follows:
Grade Range No.
[90 - 100] 2
[80 - 89] 5
[70 - 79] 1
[0 - 69] 1
Others 1
Answer:
[70 — 79]
Explanation:
1.2.6: Anonymity Reflection
1) What are some reasons a person might choose to remain anonymous on the Internet?
2) What are some harmful outcomes that stem from Internet anonymity?
3) Do you think that people have a “right” to remain anonymous online? Why or why not?
Answer:
1. they are too afraid to say it in person or are afraid of getting in trouble if they give their identity.
2.more cyber crimes committed and no filter for what is okay to say or not as they have the security no one knows who they are.
3. yes because you may not want your full personal info out there even though negative outcomes could occur from anonymity
There are several reasons why a person might choose to remain anonymous on the internet, including: privacy, security, Whistleblowing, etc.
What is Internet anonymity?Internet anonymity is the capacity of a person to remain unidentified and anonymous online, generally through concealing or obfuscating their real identity.
A person could decide to remain anonymous on the internet for a number of reasons, such as:
Concerns about privacy: People might prefer to keep their internet activities or personal information hidden, especially if they are discussing sensitive or divisive viewpoints.Safety worries: Some people could feel unsafe or vulnerable if they reveal their identify online, especially if they have previously been the target of abuse or threats.Whistleblowing: In order to protect themselves from retaliation, those who seek to bring attention to wrongdoing or unlawful activity may decide to remain anonymous.Internet anonymity can have a number of negative effects, such as:
Online bullying and harassment.Misinformation and hate speech propagation.Absence of responsibility.Some contend that anonymity is an essential part of free speech and expression and that people should have the freedom to share their thoughts without worrying about being judged or subjected to retaliation.
Thus, these are some harmful outcomes that stem from Internet anonymity.
For more details regarding internet anonymity, visit:
https://brainly.com/question/13264093
#SPJ2
Change the following sentences using 'used to
a. We went to school together.
b. How did you spend the winter evenings?
c. We had our milk delivered.
d. I was in love with him.
e. At one time there were trees in the garden.
Answer:
a. We used to go to school together.
b. How did you use to spend the winter evenings?
c. We used to have our milk delivered.
d. I used to be in love with him.
e. At one time there used to be trees in the garden.
Identify at least 6 errors from the following program code. Write all the errors and rewrite the correct program.(11 pts)
1. public E2
2. {
3. Public static void main(String )
4. {
5. System.Out.Println(“hello)
6. }
Answer:The code after rearrange the question segment:
public class Q// Class declaration of Q name.
{// Open the class body.
public static void main(String[] a) // Main function declaration.
{ //Open the main-function body.
System.out.println("Q"); // Print statement which print Q.
} //close the main-function body.
}//close the class body.
Output:
Q
Explanation:
07:39
30
Cancel
Identity verification
Verify
Question1: What was the name of your primary school?
Answer
Question2: What was the name of your best friend in
childhood?
Answer
Explanation:
nose pero esta viendo que la tecnología es con electricidad y unos elementos eléctricos
Where do you go to connect to a VPN server in Windows 7?
Answer:
1) Start→Control Panel→View Network Status.
2) Click the Connect to a Network link.
3) Locate the VPN you want to connect to and click its name and then click the Connect button.
The button only appears after you click the name of the network.
To disconnect from a network, click the network name in this dialog box and then click the Disconnect button. Click Disconnect when prompted and then click Close.
4) Enter your network security key.
Most VPNs require a security key. It’s the same one you used to establish the connection.
Select the Hide Characters check box if you want to keep the Key hidden.
5) Click OK and then click the Connect button.
Windows 7 will use the key to establish a connection to the VPN network.
Disscuss how you would
advise a female student
in your community to study
and practice automotive
technology
Answer:
You have to say that they can do everything
they are equal with everyone else.
You have to advice them they can do it again and again
I THINK SO IT IS LIKE THAT
Is the ability to choose the start and finish times, but they must complete a full day’s work