var tax = .07;

var getCost = function(itemCost, numItems) {

var subtotal = itemCost * numItems;

var tax = 0.06;

var total = subtotal + subtotal * tax;

return (total);

}

var totalCost = getCost(25.00, 3);

alert("Your cost is $" + totalCost.toFixed(2) + " including a tax of " +

tax.toFixed(2));


Which variable represents the function expression?


a. totalCost

b. getCost

c. itemCost

d. total

Answers

Answer 1

Answer:

b. getCost

Explanation:

Javascript is a multi-purpose programming language, used in applications like web development, software development and embedded system programming, data visualization and analysis, etc.

Its regular syntax defines variables with the "var" keyword and with additional ecmascript rules, the "let" and "const" keywords as well. function definition uses the keyword "function" with parenthesis for holding arguments. The code block of a function is written between two curly braces and returns a value stored in a variable with the return keyword.

The variable can now be called with the parenthesis and required arguments. Note that only anonymous functions can assigned to a variable.


Related Questions

Hello, I am having trouble adding a txt file into a array, so I can pop it off for a postfix problem I have uploaded what I have so far. I need help please

Answers

Answer:

#include <stack>

#include<iostream>

#include<fstream> // to read imformation from files

#include<string>

using namespace std;

int main() {

   stack<string> data;

   ifstream inFile("postfix.txt");

   string content;

   if (!inFile) {

       cout << "Unable to open file" << endl;

       exit(1); // terminate with error

   }

   while (getline(inFile, content)) {

       data.push(content);

   }

   inFile.close();

   return 0;

}

Explanation:

You were very close. Use the standard <stack> STL library, and make sure the stack elements are of the same type as what you're trying to add, i.e., std::string.

"The fact that we could create and manipulate an Account object without knowing its implementation details is called"

Answers

Answer:

Abstraction

Explanation: Abstraction is a software engineer terminology that has been found to be very effective and efficient especially as it relates to object-oriented computer programming. It has helped software engineers and other computer experts to effectively manage account objects without having a knowledge of the details with regards to the Implementation process of that account object.

Implement a recursive method named power that takes 2 integer parameters named base and expo. The method will return the base raised to the power of expo.

Answers

Answer:

def power(base, expo):

   if expo == 0:

       return 1

   else:

       return base * power(base, expo-1)

Explanation:

*The code is in Python.

Create a method called power that takes base and expo as parameters

Check if the expo is equal to 0. If it is return 1 (This is our base case for the method, where it stops. This way our method will call itself "expo" times). If expo is not 0, return base * power(base, expo-1). (Call the method itself, decrease the expo by 1 in each call and multiply the base)

Consider a bit stuffing framing method where the start of a frame is indicated by 6 consecutive ones, followed by 2 zeroes. What should be the bit stuffing rules at the transmitter? What should be the bit destuffing rules at the receiver? Fill in the blank to show what is the stream after bit stuffingWrite the rule for stuffing:Write the rule for destuffing:Assume the user data stream before bit stuffing is 011111100011111101. What is the stream after bit stuffing?

Answers

Answer:

Explanation:

Bit stuffing Framing Method

In the given situation, the beginning casing is shown by 6 sequential ones followed by 2 zeroes.

The beginning casings are generally known as the flags.which are utilized for demonstrating the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the reciever.

Along these lines here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).

To enable us understand how this question plays out, let us understand the rule for Stuffing and De-stuffing .

The standard for stuffing is :

At whatever point there are 5 successive ones supplement one zero in the casing which is an information. The embedded zero piece is known as the stuffed bit.The principle reason behind stuffing somewhat after 5 back to back ones is to evade the distortion of information (data) as flag. If the reciever misconstrues the information as end banner then he would quit recieving the information where the entire information sent by the sender will be left and lost causing an error-prone information.

The rule for destuffing :

The standard/rule for destuffing is only inverse as stuffing. After recieving the bitstuffed information (data), at the reciever's end zero after each 5 continuous ones will be evacuated and the rest of the information will be considered as the genuine information.

In the given situation, the beginning casing is demonstrated by 6 back to back ones followed by 2 zeroes.

the beginning casings are normally known as the flags.which are utilized for showing the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the receiver.

In this way here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).

data before bit stuffing is:  011111100011111101the stream after stuffing would be: 01111101000111101101

where the bolded/underlined digits represents the stuffed bits

cheers i hope this helps

Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles
entering and exiting indicate a
A. construction zone.
B. railroad crossing.
C. school zone.
D. none of the above

Answers

Answer:

Explanation:

Hello friend !!!!!!!!!!!!

The answer is school zone

Hope this helps

plz mark as brainliest!!!!!!!

Children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).

A school zone is a specific urban area where can be found a school and/or is near a school.

A school zone shows an accessible parking area for the use of individuals (e.g. parents) holding valid accessible parking passes.

Moreover, a school zone sign refers to a warning signal because children cannot be as alert as adults when they cross a road.

In conclusion, children walking on the sidewalk, a person sitting in a parked car, and a parking lot with vehicles entering and exiting indicate a school zone (Option C).

Learn more in:

https://brainly.com/question/8019372

Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a space. Ex: If origList = {40, 50, 60, 70} and offsetAmount = {5, 7, 3, 0}, print:45 57 63 70 #include using namespace std;int main() {const int NUM_VALS = 4;int origList[NUM_VALS];int offsetAmount[NUM_VALS];int i = 0;origList[0] = 40;origList[1] = 50;origList[2] = 60;origList[3] = 70;offsetAmount[0] = 5;offsetAmount[1] = 7;offsetAmount[2] = 3;offsetAmount[3] = 0;// your solution goes here

Answers

Answer:

Complete the program with the following code segment

for(int i =0;i<=3;i++)

{

cout<<offsetAmount[i]+origList[i]<<" ";

}

return 0;

}

Explanation:

The following line is an iteration of variable i from 1 to 3; It iterates through elements of origList and offsetAmount

for(int i =0;i<=3;i++){

This adds and prints the corresponding elements of origList and offsetAmount

cout<<offsetAmount[i]+origList[i]<<" ";

}  The iteration ends here

) Write the JS code to load the 3rd party script before ready event triggers and after successful load show your name on the browser with a message

Answers

Answer:

Following are the code to this question:

var id= document.createElement('script');//defining id varaible that uses the createElement method  

ld.src = "https://code.jquery.com/jquery-3.5.1.min.js";//defining id varaible with src that holds the source link

alert("The loaded Script is: ");//defining alert box that print Script loaded.

Explanation:

In the above-given code, an id variable is defined that uses the createElement method, which helps to create the specified name with the Element Node, and in the next line, it uses the src with the id variable, that store the link, it also helps to loads the 3rd party script, which is displayed in an alert msg box.

What is the output of the following Python program? try: fin = open('answer.txt') fin.write('Yes') except: print('No') print('Maybe')

Answers

(<ANSWER RETRACTED>)

I have an PC and it has one HMDI port but I need two monitors other problem is I need one monitor to connect to my USB drive work system and one to stay on my regular windows system how can I do this?

Answers

Answer:

You'll need dual monitor cables and an adapter.

Explanation:

First Step

Position your monitors on your desk or workspace. Make sure the systems are off.

Second Step

Make sure your power strip is close by. Then plug your power strip and connect the first monitor to your PC via your HDMI

Use an adapter to do the same for the second monitor.

Turn the entire system on

Third Step

On your PC, right click on a blank place in your home screen and click on Display Settings.

If you want to have two separate displays showing the same thing, select Duplicate, but if you want to have the two displays independent of each other, select Extend Display.

Apply the settings and select Done.

what are the 21St century competencies or skills required in the information society?

Answers

Answer:

Communication

Collaboration

ICT literacy

Explanation:

These are some of the skills that are needed in the 21st century to compete and thrive in the information society.

To remain progressive, one needs to have good communication skills. These communication skills can include Active Listening and Passive Listening.

Collaboration is important because you'll have to work with other people as no man is an island, we need someone else so the skill of collaboration is necessary to compete and stay relevant in the information society in the 21st century.

IT literacy is also very important because one needs to have basic computer knowledge such as programming, computer essentials and applications, etc.

A user in an apartment building on a wireless network is no longer able to print to the network printer. The user has been able to print to the printer in the past and nothing on the network has changed. A technician notices that the user has a different IP address scheme than what was originally setup and is able to browse the Internet using that IP address scheme. What should he do?

Answers

Answer:

The technician should either provide a route from the user's IP scheme to the printer or change the user's IP scheme to be within the same scheme as the printer.

Explanation:

The most likely reason the user is unable to print to the printer is that the user's computer cannot path the current address to the address of the printer.  Without the printer being on the same subnet as the user's computer, the computer has no way of being able to tell where the printer is.

The two solutions to this are to either add a route to the user's computer explicitly telling the user's computer where to trace to find the printer or to change the user's computer to match the IP scheme of the printer.

Cheers.

Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scenario where the use of DPI may be considered a privacy concern.

Answers

Answer:

Answered below

Explanation:

Deep packet inspection is a kind of data processing that thoroughly inspects data sent over a computer network and acts on it by rerouting, logging or blocking it. Uses of DPI include;

To ensure that data is in the correct format, internet censorship, to check for malicious code, and also eavesdropping.

DPI uses port mirroring and optical splitter to acquire packets for inspection. It combines the functionality of an intrusion detection system and intrusion prevention system with a traditional stateful firewall.

DPI is therefore helpful in perimeter security by keeping unauthorized users out and at the same time protecting authorized users from attack. Privacy concerns have been raised over the inspection of content layers of internet protocols such as in the case of censorship and government regulations and control.

Which of the following statements is true of an encrypted file? * The file can be read only by a user with the decryption key The file can be read by the creator and system administrator The file can not be opened again The file can be opened but not read again

Answers

Answer:

The file can be read only by a user with the decryption key

Explanation:

The way encryption works is it scrambles the data in a file following the rules of the encryption algorithm using a certain key to tell it how to scramble everything.

Without the key, the computer doesn't know how to decrypt it.

This is true no matter who has access to the file, be it a system administrator, a hacker, or even a legitimate user who has somehow lost access to the key

Strictly speaking, encryption can be broken, but, especially with modern encryption, that's a matter of centuries, and isn't really feasible

The statement that is true of an encrypted file is that The file can be read only by a user with the decryption key.

What is decryption key?

A decryption key is known to be a key that is given to Customers by a specific Distributor.

This key allows Customers to open and access the Software that they bought. The decryption key is a  mechanism that  permit  that a file can be read only by a user.

Learn more about decryption key from

https://brainly.com/question/9979590

An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. Which of the following would BEST meet this goal?a. Split tunnelb. Full tunnelc. IPsec using Tunnel moded. IPsec using Transport mode

Answers

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

industrial advantages of using a waterfall model for library system

Answers

Answer:

It allows for departmentalization and managerial control. Simple and easy to understand and use. Easy to manage due to the rigidity of the model – each phase has specific deliverables and a review process. Phases are processed and completed one at a time.

Explanation:

1. Cases Prudence has a special (cubic) die. The values on its face are the integers from 1 to 6, but they are not arranged ae in a normal die. When Prudence first tosses the die, the sum of the values on the four side faces is 15. In her second toss, the sum of these values is 12. Find what value appears in the face opposite 6 on Prudence’s special die. (Hint: what are possible values for the top and bottom face when the sum of the side faces is 12).

Answers

Answer:

The definition of the subject in question is presented in section elsewhere here.

Explanation:

The total value of almost all of the quantities mostly on unique die features will indeed be:  

⇒  [tex]1+2+3+4+5+6[/tex]

⇒  [tex]21[/tex]

The number of the 4 lateral sides throughout the first tossing will be 15, therefore determines the total of both top and bottom features would be:

⇒  [tex]21-15[/tex]

⇒  [tex]6[/tex]

The compositions including its {top and bottom} current valuations that give a total of Six include {1, 5}, {5, 1}, {2, 4}, as well as {4, 2}. Consequently, because neither of those variations includes Six, it indicates that six doesn't really feature on the very first toss mostly on high or low hand.  

And then let's look at second tossed situation. Throughout this particular instance, the total amount obtained would be 12.

Which means it has to be the number of top and bottom:

⇒  [tex]21-12[/tex]

⇒  [tex]9[/tex]

{4, 5},{5, 4}, {6, 3}, and {3, 6} seem to be the {top, bottom} facial variations that provide a total of Nine.  

Currently regarding all the tosses, {6, 3} and perhaps {3, 6} have been the only situations wherein the 6 emerge towards top or bottom. Then the value of the unique die mostly on face identical to 6 must've been 3.

By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.

Answers

Answer:

Polymorphism

Explanation:

If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

The information regarding the polymorphism is as follows:

The person has various attributes at the same timeFor example,  a man could be a father, a husband, an entrepreneur at the same time.In this, the similar person has different types of behavior in different situations.

Therefore we can conclude that If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

Learn more about the behavior here: brainly.com/question/9152289

Speeding is one of the most prevalent factors contributing to traffic crashes.
A. TRUE
B. FALSE

Answers

Answer:

A true

Explanation:

Speeding leads to an increase in the degree of crash severity, possibly resulting in more fatalities or injuries. More damage is caused to the vehicles involved at higher speeds, increasing likelihood vehicle will not be drivable after a crash.

The statement "Speeding is one of the most prevalent factors contributing to traffic crashes" is true.

What is speeding?

Speeding causes crashes to be more severe, which could lead to more fatalities or injuries. Higher speeds result in more damage to the involved vehicles, increasing the risk that the vehicle won't be drivable following a collision. There are many accidents increasing because of high speed.

The term "speeding" refers to moving or traveling swiftly. He paid a penalty for speeding. For many American drivers, speeding has become the standard, whether it is going over the posted speed limit, driving too quickly for the road conditions, or racing. Nationwide, speeding contributes to road fatalities.

Therefore, the statement is true.

To learn more about speeding, refer to the link:

https://brainly.com/question/15297960

#SPJ2

Write down the complete AJAX code to avoid page caching.

Answers

Answer:

AZAX is key sentence for without reloading page.

Explanation:

AJAX is also known as XHR. If some one wants to send the file without reloading then look ahead at the search function and prompt the users by auto saving the documents. This request is sent to the server. The server return the data to your network. Whenever you have seen the file form, some action on the page. You will see some request from AJAX server request on your functional area. AJAX is called a reloading file without page. AZAX is stands for Asynchronous java scripts And XML. AJAX is used to send an email. AZAX is not used in front end, it is used from back end process.

Objects for AJAXJava ScriptWord Press Action.ProtectionError handling process

1.the following code example would print the data type of x, what data type would that be?
x=5
print (type(x))

2.The following code example would print the data type of x, what data type would that be?
x="Hello World"
print(type(x))

3. The following code example would print the data type x, what data type would that be?
x=20.5
print (type(x))

Answers

Answer:

x = 5, the data type is integer( integer data type is for whole numbers)

2. The data type is string

3. The data type is float (float data type is for decimals)

Explanation:

________ databases are better than relational databases at handling unstructured data such as audio clips, video clips, and pictures.

Answers

Answer:

"Object-oriented" would be the correct choice.

Explanation:

An object-oriented database seems to be a database that subscribes to a framework containing object-depicted details. Throughout the context of the relational database management system, object-oriented is a unique product that is not as popular and most well-known as traditional web applications.This indicates that internet connectivity to existing records has to implement the previously defined connections for interacting components established by that same containers.

#Below is a class representing a person. You'll see the
#Person class has three instance variables: name, age,
#and GTID. The constructor currently sets these values
#via a calls to the setters.
#
#Create a new function called same_person. same_person
#should take two instances of Person as arguments, and
#returns True if they are the same Person, False otherwise.
#Two instances of Person are considered to be the same if
#and only if they have the same GTID. It does not matter
#if their names or ages differ as long as they have the
#same GTID.
#
#You should not need to modify the Person class.

class Person:
def __init__(self, name, age, GTID):
self.set_name(name)
self.set_age(age)
self.set_GTID(GTID)

def set_name(self, name):
self.name = name

def set_age(self, age):
self.age = age

def set_GTID(self, GTID):
self.GTID = GTID

def get_name(self):
return self.name

def get_age(self):
return self.age

def get_GTID(self):
return self.GTID

#Add your code below!

#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print: True, then False.
person1 = Person("David Joyner", 30, 901234567)
person2 = Person("D. Joyner", 29, 901234567)
person3 = Person("David Joyner", 30, 903987654)
print(same_person(person1, person2))
print(same_person(person1, person3))

Answers

Answer:

Here is the function same_person that takes two instances of Person as arguments i.e. p1 and p2 and returns True if they are the same Person, False otherwise.

def same_person(p1, p2):  #definition of function same_person that takes two parameters p1 and p2

   if p1.GTID==p2.GTID:  # if the two instances of Person have same GTID

       return True  #returns true if above condition evaluates to true

   else:  #if the two instances of Person do not have same GTID

       return False #returns false when two persons have different GTID

Explanation:

person1 = Person("David Joyner", 30, 901234567)  #first instance of Person

person2 = Person("D. Joyner", 29, 901234567)  #second instance of Person

person3 = Person("David Joyner", 30, 903987654)  #third instance of Person

print(same_person(person1, person2))  #calls same_person method by passing person1 and person2 instance of Person to check if they are same

print(same_person(person1, person3)) #calls same_person method by passing person1 and person3 instance of Person to check if they are same

The function works as follows:

For function call print(same_person(person1, person2))

The GTID of person1 is 901234567 and that of person2 is 901234567

If condition if p1.GTID==p2.GTID in the function same_person checks if the GTID of person1 is equal to the GTID of person2. This condition evaluates to true because GTID of person1 = 901234567 and GTID of person2 = 901234567

So the output is:

True

For function call print(same_person(person1, person3))

The GTID of person1 is 901234567 and that of person3 is 903987654

If condition if p1.GTID==p2.GTID in the function same_person checks if the GTID of person1 is equal to the GTID of person3. This condition evaluates to false because GTID of person1 = 901234567 and GTID of person2 = 903987654 and they are not equal

So the output is:

False

The complete program along with its output is attached in a screenshot.

1)

Set numMatches to the number of elements in userValues (having NUM_VALS elements) that equal matchValue. Ex: If matchValue = 2 and userVals = {2, 2, 1, 2}, then numMatches = 3.

#include

int main(void) {
const int NUM_VALS = 4;
int userValues[NUM_VALS];
int i = 0;
int matchValue = 0;
int numMatches = -99; // Set numMatches to 0 before your for loop

userValues[0] = 2;
userValues[1] = 2;
userValues[2] = 1;
userValues[3] = 2;

matchValue = 2;

/* Your solution goes here */

printf("matchValue: %d, numMatches: %d\n", matchValue, numMatches);

return 0;
}

2)Write a for loop to populate array userGuesses with NUM_GUESSES integers. Read integers using scanf. Ex: If NUM_GUESSES is 3 and user enters 9 5 2, then userGuesses is {9, 5, 2}.

#include

int main(void) {
const int NUM_GUESSES = 3;
int userGuesses[NUM_GUESSES];
int i = 0;

/* Your solution goes here */

return 0;
}

3)Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full credit is 100, so anything over 100 is extra credit. Ex: If testGrades = {101, 83, 107, 90}, then sumExtra = 8, because 1 + 0 + 7 + 0 is 8.

#include

int main(void) {
const int NUM_VALS = 4;
int testGrades[NUM_VALS];
int i = 0;
int sumExtra = -9999; // Initialize to 0 before your for loop

testGrades[0] = 101;
testGrades[1] = 83;
testGrades[2] = 107;
testGrades[3] = 90;

/* Your solution goes here */

printf("sumExtra: %d\n", sumExtra);
return 0;
}

4)Write a for loop to print all NUM_VALS elements of array hourlyTemp. Separate elements with a comma and space. Ex: If hourlyTemp = {90, 92, 94, 95}, print:

90, 92, 94, 95
Note that the last element is not followed by a comma, space, or newline.

#include

int main(void) {
const int NUM_VALS = 4;
int hourlyTemp[NUM_VALS];
int i = 0;

hourlyTemp[0] = 90;
hourlyTemp[1] = 92;
hourlyTemp[2] = 94;
hourlyTemp[3] = 95;

/* Your solution goes here */

printf("\n");

return 0;
}

Answers

Answer:

1)

for(i = 0; i < NUM_VALS; ++i) {

  if(userValues[i] == matchValue) {

     numMatches++;  }    }

2)  

for (i = 0; i < NUM_GUESSES; i++) {

      scanf("%d", &userGuesses[i]);   }

  for (i = 0; i < NUM_GUESSES; ++i) {

         printf("%d ", userGuesses[i]);    }

3)

sumExtra = 0;

for (i = 0; i < NUM_VALS; ++i){

     if (testGrades[i] > 100){  

        sumExtra = testGrades[i] - 100 + sumExtra;    }       }

4)

for (i = 0; i < NUM_VALS; ++i) {

    if (i<(NUM_VALS-1))  

   printf( "%d,", hourlyTemp[i]);

    else  

    printf("%d",hourlyTemp[i]); }      

Explanation:

1) This loop works as follows:

1st iteration:

i = 0

As i= 0 and NUM_VALS = 4 This means for condition i<NUM_VALS  is true so the body of loop executes

if(userValues[i] == matchValue) condition checks if element at i-th index position of userValues[] array is equal to the value of matchValue variable. As matchValue = 2 and i = 0 So the statement becomes:

userValues[0] == 2

2 == 2

As the value at 0th index (1st element) of userValues is 2 so the above condition is true and the value of numMatches is incremented to 1. So numMatches = 1

Now value of i is incremented to 1 so i=1

2nd iteration:

i = 1

As i= 1 and NUM_VALS = 4 This means for condition i<NUM_VALS  is true so the body of loop executes

if(userValues[i] == matchValue) condition checks if element at i-th index position of userValues[] array is equal to the value of matchValue variable. As matchValue = 2 and i = 1 So the statement becomes:

userValues[1] == 2

2 == 2

As the value at 1st index (2nd element) of userValues is 2 so the above condition is true and the value of numMatches is incremented to 1. So numMatches = 2

Now value of i is incremented to 1 so i=2

The same procedure continues at each iteration.

The last iteration is shown below:

5th iteration:

i = 4

As i= 4 and NUM_VALS = 4 This means for condition i<NUM_VALS  is false so the loop breaks

Next the statement: printf("matchValue: %d, numMatches: %d\n", matchValue, numMatches);  executes which displays the value of

numMatches = 3

2)

The first loop works as follows:

At first iteration:

i = 0

i<NUM_GUESSES is true as NUM_GUESSES = 3 and i= 0 so 0<3

So the body of loop executes which reads the element at ith index (0-th) index i.e. 1st element of userGuesses array. Then value of i is incremented to i and i = 1.

At each iteration each element at i-th index is read using scanf such as element at userGuesses[0], userGuesses[1], userGuesses[2]. The loop stops at i=4 as i<NUM_GUESSES evaluates to false.

The second loop works as follows:

At first iteration:

i = 0

i<NUM_GUESSES is true as NUM_GUESSES = 3 and i= 0 so 0<3

So the body of loop executes which prints the element at ith index (0-th) index i.e. 1st element of userGuesses array. Then value of i is incremented to i and i = 1.

At each iteration, each element at i-th index is printed on output screen using printf such as element at userGuesses[0], userGuesses[1], userGuesses[2] is displayed. The loop stops at i=4 as i<NUM_GUESSES evaluates to false.

So if user enters enters 9 5 2, then the output is 9 5 2

3)

The loop works as follows:

At first iteration:

i=0

i<NUM_VALS is true as NUM_VALS = 4 so 0<4. Hence the loop body executes.

if (testGrades[i] > 100 checks if the element at i-th index of testGrades array is greater than 100. As i=0 so this statement becomes:

if (testGrades[0] > 100

As testGrades[0] = 101 so this condition evaluates to true as 101>100

So the statement sumExtra = testGrades[i] - 100 + sumExtra; executes which becomes:

sumExtra = testGrades[0] - 100 + sumExtra

As sumExtra = 0

testGrades[0] = 101

So

sumExtra = 101 - 100 + 0

sumExtra = 1

The same procedure is done at each iteration until the loop breaks. The output is:

sumExtra = 8

4)

The loop works as follows:

At first iteration

i=0

i < NUM_VALS is true as  NUM_VALS = 4 so 0<4 Hence loop body executes.

if (i<(NUM_VALS-1))   checks if i is less than NUM_VALS-1 which is 4-1=3

It is also true as 0<3 Hence the statement in body of i executes

printf( "%d,", hourlyTemp[i]) statement prints the element at i-th index i.e. at 0-th index of hourlyTemp array with a comma (,) in the end. As hourlyTemp[0] = 90; So 90, is printed.

When the above IF condition evaluates to false i.e. when i = 3 then else part executes which prints the hourlyTemp[3] = 95 without comma.

Same procedure happens at each iteration unless value of i exceeds NUM_VAL.

The output is:

90, 92, 94, 95

The programs along with their output are attached.

If you implement too many security controls, what portion of the CIA triad (Information Assurance Pyramid) may suffer?
a. Availability
b. Confidentiality
c. Integrity
d. All of the above

Answers

Answer:

Option A

Availability

Explanation:

The implementation of too many security protocols will lead to a reduction of the ease at which a piece of information is accessible.  Accessing the piece of information will become hard even for legitimate users.

The security protocols used should not be few, however, they should be just adequate to maintain the necessary level of confidentiality and integrity that the piece of information should have, While ensuring that the legitimate users can still access it without much difficulty.

Under the ____________________, federal agencies must 1) review their IT systems for privacy risks, 2) post privacy policies on their Web sites, 3) post machine-readable privacy policies on their Web sites, and 4) report privacy activities.

Answers

Answer:

E-Government Act of 2002.

Explanation:

The E-Government Act of 2002 is a statute of the United States of America which was enacted by the 107th U.S Congress on the 17th of December, 2002. The E-Government Act of 2002 was signed into law to facilitate the management and promotion of the US government processes and services, as well as enhance transparency and accountability between the government and the public through the application of internet-based information technology.

Under the E-Government Act of 2002, federal agencies must;

1. Review their IT systems for privacy risks.

2. Post privacy policies on their websites.

3. Post machine-readable privacy policies on their websites.

4. Report privacy activities.

A machine on a 10 Mbps network is regulated by a token bucket algorithm with a fill rate of 3 Mbps. The bucket is initially filled to capacity at 3MB. How long can the machine transmit at the full 10 Mbps capacity

Answers

2+4= this gbhfchgcjdxbhdch is correct

is badlion safe and how ?

Answers

Answer:

Yes, badlion is safe. The further explanation is given below.

Explanation:

Badlion Client does not encompass any malicious programs, like viruses and sometimes malware.Badlion application is pretty much safe to be used on inequality in society because most expressly forbidden plugins like decided to post as well as schematics become unavailable on the client-side whenever you enter Hypixel, but that is not a confirmation and therefore should not be depended towards.

What is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps? a. Automatic vehicle locationb. Geographic information systemc. Cartographyd. Edge matching

Answers

Answer:

c. Cartography.

Explanation:

Cartography is the science and art of making an illustrated map or chart. Geographic information system (GIS) allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.

Basically, cartography is the science and art of depicting a geographical area graphically, mostly on flat surfaces or media like maps or charts. It is an ancient art that was peculiar to the fishing and hunting geographical regions. Geographic information system is an improved and technological form of cartography used for performing a whole lot of activities or functions on data generated from different locations of the Earth.

Answer:

C. Cartography

Explanation:

You bought a monochrome laser printer two years ago. The printer has gradually stopped feeding paper. Which printer component should you check first

Answers

Answer:

Pick up roller

Explanation:

you should first check the pickup roller component. This component is the part of the printer that picks paper up from the paper tray. The pickup roller links the printer and the paper. When the printer printer is running, the roller would take paper from the paper tray for the printer to print on. One of the issues it can have is Paper jam where the roller would stop turning so that it will no longer be picking papers up from the tray.

Which branch structure does a program use to output "Yes" if a variable's value is positive, or "No" otherwise?

Answers

Answer:

Selection control structure

Explanation:

This is often referred to as if-conditional statement;

This condition tests for a condition and performs a sequence of operation depending on the result of the condition;

Take for instance, the following program written in python

x = int(input("enter any number: "))

if x < 0:

  print("Yes")

else

  print("No")

The above checks if the input number is less than 0,

If the condition is true, it prints Yes

If otherwise, it prints No

Other Questions
Does a reaction occur when aqueous solutions of potassium hydroxide and chromium(III) bromide are combined Davids family is driving from New York to Florida. They know the distance they will travel is about 1100 miles . If a map has a scale of 1 in = 80 mi about how far will the trip be on the map ? If you told a policeman about a car traveling 44.704 m/s (100 mph) that was traveling in an eastward direction, you would be describing the car's ___. What decimal number does point A on the number line below represent? A vertical number line is shown from negative 2.00 to 0 to positive 2.00.There are tick marks to show increments of 1 over 4. Only the whole numbers are labeled. Point A is plotted at the third tick mark below negative 1.00. 0.25 0.25 1.75 1.75 I NEED this answered within the next 30 minutes! Please it is simple. There is an error in this. What is it? What type of function is graphed in this figure?Question 20 options:A)Continuous non-linearB)Discrete linearC)Discrete non-linearD)Continuous linear ind the missing length. The triangles are similar. similar 16 A. 27 B. 24 C. 16 D. 21 Protestant values such as asceticism and entrepreneurship as a result of the belief that success on earth could lead to salvation, and a fervent individualism due to the belief that only individuals could be saved lead, in the right conditions, to the rise of capitalism. Who made this argument Literary Text: from The Devil's Dictionary, Ambrose BierceRead these entries from The Devil's Dictionary by Ambrose Bierce.Then, answer the question(s).Which statement best describes Bierce's tone and purpose?O Bierce uses an angry tone to condemn the sins of humanity.OBBierce uses a cynical tone to ridicule human behavior andsocietyO.Bierce uses a lighthearted tone to educate humanity in agentle way.DBierce uses a reprimanding tone to encourage humanbeings to improveABSURDITY n. A statement or belief manifestly inconsistentwith one's own opinion.ACADEME n. An ancient school where morality andphilosophy were taught.ACADEMY n. [from ACADEME] A modern school wherefootball is taughtBORE n. A person who talks when you wish him to listen.CABBAGE n. A familiar kitchen-garden vegetable about aslarge and wise as a man's head. [The cabbage is so calledfrom Cabagius, a prince who on ascending the throne issued adecree appointing a High Council of Empire consisting of themembers of his predecessor's Ministry and the cabbages in theroyal garden. When any of his Majesty's measures of statepolicy miscarried conspicuously it was gravely announced thatseveral members of the High Council had been beheaded, andhis murmuring subjects were appeased.] Given the linear correlation coefficient r and the sample size n, determine the critical values of r and use your finding to state whether or not the given r represents a significant linear correlation. Use a significance level of 0.05. r=0.767, n=25 Emma changed 500 into rand before going on holiday to South Africa.The rate of exchange at the time was 1 = 10.4 rand.Emma spent 4000 rand on holiday. When she got home, she changed her leftover rand into pounds.The exchange rate was now 1 = 9.8 rand. How much money did she get back in pounds? Journalize the following sales transactions for Salem Sportswear. Explanations are not required. Aug. 1 Salem sold $69,000 of women's sportswear on account, credit terms of 3 / 10, n / 60. Cost of goods is $38,000. 5 Salem received a $3,500 sales return on damaged goods from the customer. Cost of goods damaged is $1 ,750. 10 Salem receives payment from the customer on the amount due, less the return and discount.Journalize the sales transactions.Aug 1 : Salem sold $69,000 of women's sportswear on account, credit terms of 3 / 10, n / 60. Cost of goods is S38,000. Begin by preparing the entry to journalize the sale portion of the transaction. Prepare the journal entry to record Jevonte Companys issuance of 35,000 shares of its common stock assuming the shares have a: $3 par value and sell for $22 cash per share. $3 stated value and sell for $22 cash per share. The block moves up an incline with constant speed. What is the total work WtotalWtotalW_total done on the block by all forces as the block moves a distance LLL Miller Fruit wants to expand and needs $1.6 million to do so. Currently, the firm has 465,000 shares of stock outstanding at a market price per share of $32.50. The firm decided on a rights offering with one right granted for each share of outstanding stock. The subscription price is $28 a share. How many rights are needed to purchase one new share of stock in this offering?Miller Fruit wants to expand and needs $1.6 million to do so. Currently, the firm has 465,000 shares of stock outstanding at a market price per share of $32.50. The firm decided on a rights offering with one right granted for each share of outstanding stock. The subscription price is $28 a share. How many rights are needed to purchase one new share of stock in this offering? Perform the operation. (3x^2+4)-(-5x^2+4x-1) The magnetic field of a plane-polarized electromagnetic wave moving in the z-direction is given by in SI units. What is the frequency of the wave group the like term together Facial Cosmetics provides plastic surgery primarily to hide the appearance of unwanted scars and other blemishes. During 2021, the company provides services of $402,000 on account. Of this amount, $52,000 remains uncollected at the end of the year. An aging schedule as of December 31, 2021, is provided below. Age Group Amount Estimated Percent Receivable Uncollectible Not yet due $ 32,000 4 % 0-30 days past due 10,200 6 % 3160 days past due 7,200 12 % More than 60 days past due 2,600 30 % Total $ 52,000 Required: 1. Calculate the allowance for uncollectible accounts. 2. Record the December 31, 2021, adjustment, assuming the balance of Allowance for Uncollectible Accounts before adjustment is $400 (debit). 3. On April 3, 2022, a customers account balance of $500 is written off as uncollectible. Record the write-off. 4. On July 17, 2022, the customer whose account was written off in requirement 3 unexpectedly pays $100 of the amount but does not expect to pay any additional amounts. Record the cash collection. A scientist observes that the electrical resistance of a superconducting material drops to zero when the material is cooled to very low temperatures. Which of the following statements best describes what the scientist is observing?The scientist is observing the electrical power of a superconductor.The scientist is observing the temperature of a superconductor.The scientist is observing an intensive property of a superconductor.The scientist is observing an extensive property of a superconductor