Answer:
2. translates program written in any programming language into Machine language
last ko . false
Explanation:
aru aaunna
give the difference between functional and functional tools in the middle of to the circle give importance
Answer:
hakkuna matata is the radious of a circle
SOMEONE PLEASE HELP ME DUE IS IN 30 MINUTES!!!⚠️⚠️⚠️⚠️
~WAP to accept a number and display the square of the number using SUB END SUB
Answer:
Display square root of an input number
REM PROGRAM TO DISPLAY SQUARE ROOT OF AN INPUT NUMBER. INPUT “ENTER ANY NUMBER”; N. S = N ^ (1 / 2) ...
DECLARE SUB SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...
SUB SQROOT (N) S = N ^ (1 / 2) ...
DECLARE FUNCTION SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...
FUNCTION SQROOT (N) SQ= N ^ (1 / 2)
Explanation:
hope this helps u
Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas
Answer:
name1+","+name2+","+name3
Explanation:
Given
name1, name2 and name3
Required
Concatenate, separated by comma (,)
To concatenate, we simply use the + operator.
So, the expression is:
name1+","+name2+","+name3
Color mixtures using light, for example those in digital displays, are called __________ color mixtures.
Answer:
Additive color mixtures
Explanation:
The process of mixing colored lights together is called additive color mixing. Red, green, and blue are the primary colors for additive mixing. If all of these three colors of light are shone onto a screen at the same time, white color is produced.
Hopefully, this helped. If I am incorrect feel free to correct me by commenting on my answer. :)
Which of these collections defines a LIST? ["apple", "banana", "cherry"] {"apple", "banana", "cherry"} {"name": "apple", "color": "green"} ("apple", "banana", "cherry") Next ❯
Answer:
["apple", "banana", "cherry"]
Explanation:
In programming lists are defined by using square brackets. Curly brackets are used to define sets or dictionaries. Dictionaries are similar to lists but are not really considered lists since they use a key: value system unlike lists. Parenthesis in programming are used to define tuples or in some languages object literals with curly brackets inside. A list uses only square brackets, and depending on the language can either contain elements of the same type of different types. Therefore, the only correct example of a LIST in this question would be
["apple", "banana", "cherry"]
You work as a computer technician for a production company that travels all over the world while filming and editing music videos. Due to the nature of video editing, you will be building a video production workstation for the company that will have the maximum amount of RAM, an 8-core CPU, a dedicated GPU, and a redundant array of solid state devices for storage. You are now determining which power supply to install in the system. What is the MOST important characteristic to consider when choosing a power supply
Answer: Input Voltage
Explanation:
Based on the information given, since the power supply to install in the system is being determined, the input voltage is the most important characteristic to consider when choosing a power supply.
The input voltage indicates the type of voltage and the electrical current that's required to power a device safely and effectively.
What type of display allows the user to access a large amount of vocabulary in one device, uses spelling to convey the message, is changeable by the user, depicts language in electronic form, uses context-based pages, and uses conversational pages
Answer:
Dynamic
Explanation:
As defined by Walter Woltos, DYNAMIC DISPLAY is a type of display that allows the user to access a large amount of vocabulary in one device, uses spelling to convey the message, is changeable by the user, depicts language in electronic form, uses context-based pages, and uses conversational pages.
For example, a dynamic display includes smartphones, laptops, etc. This is the opposite of Static display.
Question 1:
The Wayfinder is an ancient piece of technology created as a means of navigating challenging stretches of space. The device connects to every piece of technology in the galaxy in order to detect planets and spaceships and then shown their location to the user. As it happens, locations of planets follow a specific distribution. A planet can exist at coordinates x,y only if
2x² + |2xy| + y² =10000
The user can use the Wayfinder to find nearby planets by input the range for x and y. Draw a flowchart and write a C++ program that models the Wayfinder. Ask the user to input a range for x and y, then print all possible planet coordinates. The program should also print the number of planets detected.
Hint: you can use pow(x,n) to get the value of xn and abs(x) to get the absolute value of x.
helpppppppppp!!!!!!!!!!
Sample output:
Answer:
Following are the code to the given question:
#include<iostream>//header file
#include<math.h>//header file
using namespace std;
int main()//main method
{
long long x, x1, y, y1;//defining long variable
int count=0,i,j;//defining integer variable
cout<<"Enter a range for x coordinates: "<<endl;//print message
cin>>x>>x1;//input x and x1 value
cout<<"Enter a range for y coordinates: "<<endl;//print message
cin>>y>>y1; //input y and y1 value
for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates
{
for(j = y; j <= y1; j++)//use nested loop that tests each coordinates
{
if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question
{
cout<<"There is a planet at "<<i<<", "<<j<<endl;// print coordinates
count++;//incrementing count variable value
}
}
}
cout<<"Total number of planets detected are: "<<count<<endl;//print count value
return 0;
}
Explanation:
In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.
In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.
If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False
PLEASEE HELP
Answer:
false , those are called passive railways
X = 10
y =
20
х» у
print("if statement")
print("else statement")
Answer:
"else statement"
Explanation:
Given
The above code segment
Required
The output of the program
Analyzing the program line by line, we have:
x = 10 ----> Initialize x to 10
y = 20 ----> Initialize y to 20
if x > y ----> check if x is greater than y
print("if statement") ----> Execute this line if the condition is true
The condition is false because 10 is less than 20, so: the statement will not be executed. Automatically, the else condition will be executed
else
print("else statement")
"else statement" without the quotes will be printed because the if condition is false
Draw a flowchart to find greater number among three number
Answer:
See attachment for flowchart
Explanation:
First, we get input for the three numbers
The flowchart then checks if the first number is greater than the other two
If yes, the first is assigned the largest
If otherwise, the second number is tested
If it is greater than the other two, then the second is assigned the largest
If otherwise, the third is assigned the largest
Lastly, the largest is printed before the flowchart ends
In Python, to assign a value to a variable, an equal sign must follow the variable name.
True
False
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet
Answer:
The given statement is true.
Explanation:
The honeynet is indeed a decoy network comprising a honey trap or even more. It appears to be a real network with multiple systems but is housed on one or a few servers, each of them together in one setting, which is why it is termed a honeynet when more than one honeypot is linked to an amount of honey pot system on one subnet. In the IDSs (Intrusion Detection Systems), a padded cell system has been used which is like a honeycomb.
You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?
Answer: Static
Explanation:
Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.
Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
Answer:
Confidentiality
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.
In the context of computer and network security, confidentiality simply means that a computer system used for performing certain functions such as exchange of data must not allow the disclosing of information to and by anyone who is not authorized to access it.
Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.
In conclusion, confidentiality requires that access to collected data be limited only to authorized staffs or persons.
Write the steps of the following
i to change font name and size
ii to apply superscript
iii to change a paragraph into capital letter
quick thanks!
Answer:
i) To change the font name and size
1) Select the text that has the font and size that are to be changed
2) In the Home tab, in the Font group, select the drop down button next to the displayed font and select the desired font, from the drop down list that appears
3) With the text still highlighted, within the Home tab, click on the dropdown button next to the displayed font size in the Font group and select the desired font size from the displayed drop down list and save the changes
ii) To apply superscript
To format a text as a superscript;
1) Select the text to be formatted as superscript
2) In the Home tab, in the Font group, click on the superscript button x² to change the selected text to superscript
A text can also be changed to superscript by selecting the text and pressing the Ctrl, Shift, and Plus sigh (+) simultaneously
iii) To change a paragraph into capital letter
1) Select the paragraph that is to be changed into capital letter
2) From within the Font group in the Home tab, click on the Change Case button, Aa, then select UPPERCASE from the drop down menu
3) Save the changes
Explanation:
The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.
What is the purpose of "display:table"?
Answer:
Modern browsers use CSS to style all their markup.
How would they render a <table> element if CSS had nothing that could express the appearance of one?
(That, and you might have non-tabular data that you want to render like a table, there are enough people using tables for layout to see a demand for it).
They can be used to format content in a tabular manner when the markup does not use the table element, e.g. because the markup was written by someone who was told not use tables or because the markup is generic XML and not HTML.
You can also design a page using e.g. div elements so that some stylesheet formats them as a table, some other stylesheet lets them be block elements or turns them to inline elements. This may depend e.g. on the device width
What framework is used for transporting authentication protocols instead of the authentication protocol itself
Answer:
EAP (Extensible Authentication Protocol)
For transporting authentication protocols instead of the authentication protocol itself will be an Extensible Authentication Protocol.
What is the Extensible Authentication Protocol (EAP)?An architecture for authentication that is often used in network and internet connections is called Extensible Authentication Protocol (EAP). RFC 5247 updates RFC 3748's definition, which superseded RFC 2284's. EAP is a framework for authentication that enables the delivery and use of data and parameters produced by EAP techniques.
RFCs describe a large variety of tricks, and there are also several merchant methods and fresh proposals. EAP merely specifies the information from the interface and the formats; it is not a wire protocol. Each EAP-using protocol specifies a method for encasing user-generated EAP messages inside this messages of that connection.
For shipping confirmation conventions rather than the verification convention itself will be an Extensible Authentication Protocol.
More about the Extensible Authentication Protocol link is given below.
https://brainly.com/question/20813972
#SPJ12
define computer network
In data representation, what represents one character which may be a
letter, number, or punctuation mark.
Answer:
Binary ?
Explanation:
Im not 100% sure but it could be binary or 0
The process where the programmer steps through each of the program's statements one by one is called
The process where the programmer steps through each of the program's statements one by one is called [tex]\sf\purple{hand \:tracing}[/tex].
[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]
The part (or statement) of a recursive function that decides whether the recursive loop is terminated is called: (Select all that apply)
Answer:
The base case
Explanation:
Required
The part that determines the termination of a recursion
This part of a recursion is referred to as the base case.
Take for instance, the following:
factorial(int n) {
if (n < = 1) { return 1; }
else { return n*factorial(n-1); } }
The base case of the above is if (n < = 1) { return 1; }
Because the recursion will continue to be executed until the condition is true i.e. n less than or equals 1
__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.
Answer:
Redundancy is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.
Explanation:
Redundancy means having extra or duplicate resources available to support the main system. It is a backup or reserve system that can step in if the primary system fails. The reserve resources are redundant most of the time as they are not being used if everything is working properly.
Cuando se introduce una fórmula en una celda primero que hay que introducir es
Answer:
El signo =.
Explanation:
La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.
Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.
Your friend want to make a copy of your new game you bought the previous day .
Why should you prevent him from doing that?
Answer:
It is copyright infringement
Explanation:
Required
Why you should prevent your friend from copying a software you bought
When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.
This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.
Which part of the packet contains the sequencing information that's used by TCP to reassemble packets
Answer:
During the TCP startup and teardown sequence, a "phantom byte" causes the sequence number and acknowledgment number fields to increment by 1 even though no data is exchanged. This phantom byte can be confusing when you have just learned that the sequence number field increments only when data is sent.
Explanation:
A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.
Answer:
tictactoe[1][1]
Explanation:
To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::
Given a 2 - dimensional 3×3 array of integers :
Creating a dummy array assigned to the variable tictactoe :
[1 2 3]
[4 5 6]
[7 8 9]
We have a 3×3 array, that is 3 rows and 3 columns.
The middle element in the middle row is located in the second row ;second colum
Row and column Indexes starts from 0
Middle element in the middle row is the value 5 and it corresponds to :
tictactoe[1][1]
We call the variable name and the we use one square box each to house the row and column position.
_________ media must be downloaded in its entirety to the user's computer before it can be heard or seen
Answer:
Downloadable
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
In Computer science, a downloadable media must first be downloaded in its entirety and saved to a user's computer before it can be played, heard or seen.
For example, for an end user to listen to a song hosted on a particular website, he or she must first of all download the song in its entirety and have saved on a computer system before it can be seen, played and listened to. Also, other downloadable media such as videos, animations, texts, etc., must be downloaded before they can be accessed or used by an end user.
The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing
Answer:
a. spear-phishing has more specific targets than phishing
Explanation:
The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.
Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.