The purpose of a function that does not return a value is Group of answer choices to insert a temporary implementation of a function that can be refined later only used when the function needs to produce output to package a repeated task as a function even though the task does not yield a value to provide a function that can only be included in an assignment statement

Answers

Answer 1

Answer:

to package a repeated task as a function even though the task does not yield a value.

Explanation:

In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.

Some of the notable characteristics of a function includes;

I. The name and arguments of the function must be specified by a function.

II. The implementation of a function is usually designed to be hidden from the caller.

IIII. A function define specific tasks that reusable at many points in a program.

A function that does not return a value after it executes is generally referred to as a void function. Thus, a void function uses the keyword "void" and has no explicit return statement in its body, with respect to a data type.

The purpose of a void function is to control returns back to the caller or package a repeated task as a function but, it doesn't yield a value.


Related Questions

There are two major types of wireless networks that are popular today among users. These networks are Wi-Fi and ____

Answers

Answer:

That would be Bluetooth

Explanation:

As Bluetooth is the most widely used network. It is used to operate many things, such as:

Headphones

Speakers

Remotes

etc.

You have been given a laptop to use for work. You connect the laptop to your company network, use it from home, and use it while traveling.You want to protect the laptop from Internet-based attacks.Which solution should you use?

Answers

You can get a antivirus subscription that will kill malwaresAlso, you can avoid going on websites you don't trustI hope this helps you.

Your internal network is protected from Internet attacks by a Cisco firewall. To improve security, your supervisor suggests installing a Fortinet firewall between the Cisco firewall and the trusted LAN, then using the space between as a perimeter network. Which security principles does this promote

Answers

Answer:

Defense-in-depth

Vendor diversity

Explanation:

The Defense-in-depth or the DiD means a security approach in information where a series of security mechanism and also controls are layered throughput the computer network in order to protect the confidentiality, availability and integrity of the network as well as the data within.

The security principle of Vendor diversity approach is a way of implementing the security controls from the different vendors to increase the security of the network.

Thus in the context, the supervisor is trying to promote the Defense-in-depth  as well as the Vendor diversity principles of security by asking to install a Fortinet firewall between the Cisco firewall and its trusted LAN.

Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer choices

Answers

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

What type of compression uses an algorithm that allows viewing the graphics file without losing any portion of the data

Answers

Answer: Lossless Compression

Explanation:

The type of compression that uses an algorithm which allows viewing the graphics file without losing any portion of the data is referred to as the lossless compression.

Lossless compression refers to a form of data compression algorithms which enables the reconstruction of the original data from the compressed data.

IN C++ PLEASE!!!! Define a function FilterStr() that takes a string parameter and returns "Good" if the character at index 4 in the string parameter is uppercase. Otherwise, the function returns "Bad".

Ex: FilterStr("sandwich") returns

Bad

Recall isupper() checks if the character passed is uppercase. Ex: isupper('A') returns a non-zero value. isupper('a') returns 0.

string's at() returns a character at the specified position in the string. Ex: myString.at(3)
)
#include
#include
#include
using namespace std;

/* Your code goes here */

int main() {
string input;
string output;

getline(cin, input);
output = FilterStr(input);
cout << output << endl;

return 0;
}

Answers

Answer:

Replace /*Your code goes here */ with

string FilterStr(string str){

   string retStr= "BAD";

   if(isupper(str.at(4)) != 0){

     retStr = "GOOD";

   }

   return retStr;

}

Explanation:

This defines the function

string FilterStr(string str){

This initializes the return string to BAD

   string retStr= "BAD";

This checks if the string at index 4 is uppercase;

   if(isupper(str.at(4)) != 0){

If yes the return string is updated to GOOD

     retStr = "GOOD";

   }

This returns the return string

   return retStr;

}

See attachment for complete program

50 POINTS! PLEASE HELP!
________ is a VMware Network setting that does not put the virtual machine directly on the physical network of the computer.


Host Only

MAT

NAT

VNAT

Answers

Answer:

NAT

Explanation:

The Network Address Translation (NAT) is a Virtual Machine Software which allows organizations to make use of a single Internet Protocol by altering the private network addresses to a private one. It makes it possible to Map multiple network addresses to a public address thereby providing security. The NAT VMware allows a single device such as a router provide an information transfer interface between a private and public network. Hence, it does not use the physical network of the computer.

Answer:

NAT

Explanation:

I took the test :D Hope this helps!

what is the best college in texas for cyber security

Answers

Answer:

Cybersecurity education in Texas There’s no doubt that cybersecurity education in Texas is in a league of its own. Out of all of the Lone Star State’s universities, the University of Texas at San Antonio is the number one choice for many budding cybersecurity professionals.

In order for storage devices to be prepared for use, they must be ____________ Group of answer choices pre-prepared loaded initiated formatted

Answers

Answer:

formatted

Explanation:

In order for storage devices to be prepared for use, they must be formatted.

Answer:

Formatted

Explanation:

In order for storage devices to be prepared for use, they must be Formatted Group of .

Hope it is helpful to you

An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement. True False

Answers

Answer:

True

Explanation:

An end user license agreement (EULA) is usually designed by a software developer to take the form of an electronic notification that would appear on the screen of the device of an end user when he or she is installing a software.

Furthermore, an end user has a choice to accept or decline the terms of this agreement.

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops

Answers

Answer:

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

Explanation:

Routing Information Protocol (RIP) is a type of dynamic routing protocol which finds the best path between the source and the destination network through the use of hop count as a routing metric. The path with the lowest hop count from source to destination is considered as the best route. Routing Information Protocol (RIP) is a distance-vector routing protocol.

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

a.
5. A red circle and diagonal slash on a sign means
that
a hazard is ahead.
b. the action is not allowed.
c. diagonal crossing is permitted.
d. two roads intersect ahead.

Answers

Answer:

b. the action is not allowed.

Explanation:

Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.

A red circle and diagonal slash on a sign simply means that the action is not allowed.

A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.

For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.

Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.

Which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data

Answers

Answer:

Data management.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.

Hence, a database management system (DBMS) is a software that enables an organization or business firm to centralize data, manage the data efficiently while providing authorized users a significant level of access to the stored data.

In conclusion, data management is a type of infrastructure service that avails businesses (companies) the ability to store and manage corporate data while providing capabilities for analyzing these data.

Discuss if you think technology, mobile apps, and/or social networks make us lazy or not. Justify your answer.
Identify ways that you’ve seen social media affect people in the workplace or in society (whether positively or negatively).
Analyze technology’s impact (and in particular, consider social media and mobile apps) on your own life.

Answers

Answer:

Yes, I do you can't just go out and work, play, or anything outside and people just want to stay inside on electronics like phones, tv, game systems.

Explanation:

   In truth, technology has made a lot of difference in our society, but it has also transformed humans into lazy-bones. These days, people don't need to run errands anymore; they push a button on their phone (another product of tech) and have most of the human's first world problems solved

Which power backup method will continually provide power to a server if the power goes out during a thunderstorm

Answers

Answer:

An online UPS

Explanation:

An online uninterrupted power supply (ups) can be defined as an electronic device that is designed to supply continuous power to a load that uses alternating current (AC), through the inverter and rectifier arrangement (combination) during normal operation of the device. Thus, an online UPS through its inverter supplies continuous AC power in the event of a power failure.

Hence, an online UPS power backup method is designed and developed to continually provide power to a server (load) if there is a power outage as a result of a thunderstorm.

In conclusion, an online uninterrupted power supply (ups) guarantees a 24 hour power supply when properly installed and connected to a load or end user device such as a server.

What best Describes algorithm bias

Answers

Answer:

E

Explanation:

cause e

We made a distinction between the forwarding function and the routing function performed in the network layer. What are the key differences between routing and forwarding

Answers

Answer: forwarding: move packets from router's input to appropriate router output

routing: determine route taken by packets from source to destination

Explanation:

The network layer refers to where connections take place in the internet communication process by sending packets of data between different networks.

The distinction between the forwarding function and the routing function performed in the network layer is that the forwarding function move packets from the input of the router to the appropriate router output while the routing function:m helps in knowing the routee taken by packets from the source to destination.

Tell me a password. Your password must be at least 8 characters long and must include at least one uppercase letter, one lowercase letter, one special character, and one number.

82 point question even tho it’s really easy

Answers

Answer:

swa#22*88#&mu#hu..

Explanation:

hope it correct

We use loops to: Process Numeric Data Ask users to enter information Repeat blocks of code Ask True/False questions

Answers

Answer:

Repeat blocks of code.

Explanation:

EXAMPLE JAVASCRIPT LOOP CODE

_________________________________________________________

INPUT:

while(true){//Check If bool True=True

console.log("Hello World!")

}

_________________________________________________________

OUTPUT:

Hello World!

Hello World!

Hello World!

Hello World!

Hello World!

[tex]\cdots[/tex]

Hello World!

Hello World!

what is data processing? What is the output of data processing system?​

Answers

Answer:

A data processing system is a combination of machines, people, and processes that for a set of inputs produces a defined set of outputs. The inputs and outputs are interpreted as data, facts, information etc. depending on the interpreter's relation to the system. ... Conversion converting data to another form or Language.

Explanation:

(⌒_⌒;)

you press the F9 key to convert an object to a symbol true or false​

Answers

Answer:

False,

Reason

F8 key is used for the coversion of object to symbol

The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an operation within software. True False

Answers

answer
True
explain



The shortcut keyboard is one or more keys that are used to performing a program and other capabilities, that's why the given statement is "True", and the further discussion can be defined as follows:

The keyboard shortcut is a set of one or more keys that invoke the preprogrammed activity of the software package.Shortcut keys are the strategic utilization key combinations on one's keyboard for more good functioning in your software. The shortcuts are in one's file folders, word processing programs, and even for e-mail accounts or social bookmarking sites.The keyboard shortcuts, CTRL, ALT, and WINDOWS, which can perform quickly in the software, are commonly used.

Therefore, the final answer is "True".

Learn more:

brainly.com/question/1212286

A(n) _____ is the component of an expert system that performs tasks similar to what a human expert does by explaining to end users how recommendations are derived.

Answers

Answer:

Explanation facility

Explanation:

Expert systems leverage the ability of artifical intelligence as they are computer programs which have the ability of learning over time from a particular expert on a certain knowledge base or field in other to be reproduce or simulate the responses or capability of the expert based on the same subject. The expert system is composed of components such as the knowledge base, inference engine, knowledge and learning module, user interface and the Explanation facility . What the explanation facility typically does is explains to the user why and how a particular recommendation is made or how it reached a certain conclusion

In a _____ cloud, a participating organization purchases and maintains the software and infrastructure itself.

Answers

Answer:

"Private" is the right solution.

Explanation:

Application servers supplied sometimes over the World wide web or through a personal corporate network as well as to chosen customers rather than the community benefit of the entire, is termed as the private cloud.It provides companies with the advantages of a cloud environment that include self-checkout, adaptability as well as flexibility.

How get end portals in mope

Answers

Answer:

what

Explanation:

a passcode is created using 4 digits. how many passcodes can be created where the code has to be 5000 or greater with no digit allowed to repeat

Answers

Answer:

5000 passcodes

Explanation:

5x10x10x10 = 5000

i am doing 7th grade coding 3.02 assignment can anybody help me it says bad input on line 3 and this is what it is can someone help me
grade = int(input("What grade are you in?"))

Answers

Answer:

grade = int(input("What grade are you in?")

if grade == 9:

print ("Freshman")

elif grade == 10:

print ("Sophomore")

elif grade == 11:

print ("Junior")

elif grade == 12:

print ("Senior")

else:

print ("Invalid")

Explanation:

You fail to provide the complete code. So, I will rewrite the code from scratch

The complete question requires that the level is printed based on the input grade.

The code has been added in the answer section.

The explanation is as follows:

[Thus gets input for grade]

grade = int(input("What grade are you in?")

[If grade is 9, this prints Freshman]

if grade == 9:

print ("Freshman")

[If grade is 10, then level is sophomore]

elif grade == 10:

print ("Sophomore")

[If grade is 11, then grade is Junior]

elif grade == 11:

print ("Junior")

[If grade is 12, then level is senior]

elif grade == 12:

print ("Senior")

[All other inputs are invalid]

else:

print ("Invalid")

anyone know how to translate this 1100111111110100000110 pls n ty!4!:$;

Answers

Answer:

1100111111110100000110 = �

Binary -> UTF-16

3,407,110 in decimal form

Additionally, it also translates to the color green in hexadecimal.

Not really sure what you are trying to translate this in to though.

yeah sure no problem that says

With a(n) ______, a search engine will show ads that have the keyword typed exactly as the searcher used, but may also have other words within the search. Group of answer choices exact match phrase match broad match modified broad match

Answers

Answer:

modified broad match.

Explanation:

A Search engine is an internet resource or service that searches for keywords or categories specified by the end user and then displays (shows) a list of website which matches or have informations similar to the query. Some examples of popular search engines are Goo-gle, Bing, Yahoo, etc.

At the retrieving stage of a web search, the search engine queries its database using a retrieval algorithm to extract the necessary and related terms to the search. After obtaining the search terms, the stored web addresses that are related to the search is then displayed.

There are different types of matching techniques used in configuring a search engine and these includes;

I. Exact match.

II. Phrase match.

III. Broad match.

IV. Modified broad match

When a modified broad match is used, the search engine shows adverts that have the keyword typed exactly as the searcher used, but may also include other words within the search term.

Hence, the name modified because it avail users other options by including other words within the search.

In _____, a program running on a Web server creates a Web page in response to a request for specific information from a Web client.

Answers

Answer:

server-side scripting

Explanation:

Other Questions
The direction of applied force has to be .............. to the distance in order to say work is done What would -4|5+-3| be The Cotton GinAndrea BrecheenThe cotton gin was one of the most amazing and tragic inventions of early America. The cotton gin is credited to the brilliant and creative American inventor Eli Whitney. Because Whitney's invention made cotton harvesting easier, it allowed farmers in the South to increase production. The cotton gin simplified the process of removing the cotton from the seeds, a process formerly done by hand.As a result, Southern plantations increased their production of cotton from 750,000 bales in 1830 to 2.85 million bales just 20 years later. Because of the increase in production, the farmers in South became even more dependent on cotton for revenue. This new reliance on cotton increased the need for slavery. More slaves were needed to farm the ever expanding cotton plantations. If Whitney had known the effects his invention would have on slavery, he never would have created it.Read the passage. Which sentence from the text is an opinion that needs more support to be considered valid? As a result, Southern plantations increased their production of cotton from 750,000 bales in 1830 to 2.85 million bales. . ." If Whitney had known the effects his invention would have on slavery, he never would have created it. "Because Whitney's invention made cotton harvesting easier, it allowed farmers in the South to increase production." "Because of the increase in production, the farmers in South became even more dependent on cotton for revenue." an alternating voltage of 100V, 50HZ Is Applied across an impedance of (20-j30) calculate the resistance, the capacitance, current, the phase angle between current and voltage In a certain breed of dog, the alleles B and b determine black and brown coats respectively. However, the allele Q of a gene on a separate chromosome is epistatic to the B and b color alleles resulting in a gray coat (q has no effect on color). If animals of genotype B/b ; Q/q are intercrossed, what phenotypic ratio is expected in the progeny the first battle of the revolutionary war? how does social and environmental responsibility help fight unemployment Find the sum of a 22-term arithmetic sequence, where the first term is 7 and the last term is 240. Two hydrogen atoms interact to form a hydrogen molecule.a. Trueb. False John is tall Paul is taller but Ken is the tallest. Who is the shortest?Who is the tallest? ______________Emily_______________(visit) London two years ago?.1 imA. Did/visitB. Was/visitC. Did/visitedD. Was/visited what Is the si unit of temperature PLEASE HELP IM TRYING TO FINISH THIS BY NEXT MONDAY AND IVE BEEN STUCK ON THIS (Q008) Magnetic anomalies are a. found only on the seafloor. b. measured with an instrument called an inclinometer. c. defined as the angle between which a compass needle points and the longitude at that point. d. places where the magnetic field strength is either greater or less than the expected strength. please help have a lot of math to do Not all the items in your office supply store are evenly distributed as far as demand is concerned, so you decide to forecast demand to help plan your stock. Past data for legal-sized yellow tablets for the month of August are. Week 1 280 Week 2 380 Week 3 580 Week 4 680 a. Using a three-week moving average, what would you forecast week 5 to be (Q008) Two physical properties of minerals both result in smooth, flat surfaces with specific angles between them. The first property is externally visible and is the result of how the mineral forms; the second is inherently internal and is the result of breaking a sample of the mineral. These properties are called Which of the following is NOT an example of an explicit cost? Multiple Choice The income the owner could have earned in his or her next best employment opportunity. The salaries paid to the managers who help run the business. The overtime wages paid to workers. The rent the owner pays each month to lease office space. Simplify the F = ABC + AB + ABC most people blame others when in fact their attitude was the problem . justify this statement in your own word