What is hacking? Why is hacking a concern for law enforcement?

Answers

Answer 1

Answer:

hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.

Answer 2
Hacking is having unauthorized access to data in a computer or a system. It's a huge concern because everything nowadays depends on the internet, and every device connected to the Internet is at risk

Related Questions

Imagine a typical website that works as a storefront for a business, allowing customers to browse goods online, place orders, review information about past orders, and contact the business. What would a testing process for a website like that look like?

Answers

Answer: See explanation

Explanation:

Following the information given in the question, the testing process for the website will include testing the links that are on the site.

Another that ng to test is to check if the menus and the buttons are working properly. Furthermore, the layout should be ensured that it's consistent as well as the ease with which the website can be used.

H0: Protype design has at most 37mpg vs. HA: prototype design has greater than 37mpg. If H0 is rejected, the action will be move the protype deisgn to prpduction. What kind of test is required

Answers

Answer:

A one-tailed test with upper reject region

Explanation:

H0 : μ ≤ 37

H1 : μ > 37

This is a right tailed tailed test as indicated by the greater than symbol on the hypothesis defined. Hence, the critical region will lie to the right of the area under the curve.

Critical region which lies to the right of the curve is called the upper rejection region.

Rejecting the Null, H0 means that ; the value of the test statistic exceeds the critical value;

When the hypothesis is declared with the less than sign, rejection region lies to the left or lower region.

While a two tailed test has rejection region shares between each tail.

Juan has performed a search on his inbox and would like to ensure that the results only include those items with
attachments which command group will he use?
O Scope
O Results
O Refine
Ο Ορtions

Answers

Answer:

The Refine command group

Explanation:

Given the snippet of code: int x = 5; int bar(int j) { int *k = 0, m = 5; k = &m; return (j+m); } void main(void) { static int i =0; i++; i = bar(i) + x; } Which variables obtain their memory from the stack? A. iB. jC. kD. mE. x

Answers

Answer:

Variables j , k , m will be stored in the stack.

Explanation:

Variable x will not be in stack as is it a global variable.

Variable i will not be in stack as is it a static variable.

Variable j will be in stack as is it a local variable in the function.

Variable m will be in stack as is it a local variable in the function.

Variable k , a pointer will be in stack as it is in the function bar locally.

#Write a function called align_right. align_right should #take two parameters: a string (a_string) and an integer #(string_length), in that or

Answers

Full question:

#Write a function called align_right. align_right should #take two parameters: a string (a_string) and an integer #(string_length), in that order. # #The function should return the same string with spaces #added to the left so that the text is "right aligned" in a #string. The number of spaces added should make the total #string length equal string_length. # #For example: align_right("CS1301", 10) would return the #string " CS1301". Four spaces are added to the left so #"CS1301" is right-aligned and the total string length is #10. # #HINT: Remember, len(a_string) will give you the number of #characters currently in a_string.

Answer and Explanation:

Comments have been used in the code to explain the program

Using Python

#first define the function with #parameters a_string and string_length

def align_right(ourString,stringLength):

#test to see if string is longer than the length passed

if len(ourString) > stringLength:

print(ourString)

#If not define variable aligned and use #rjust function to justify string to the #left leaving space left in stringLength

else:

aligned=ourString.rjust(stringLength)

#print the variable aligned

print(aligned)

#Call function align_right

align_right("jelly", 15)

1. What does the word “processing” in data pro- cessing mean?
2. Give three examples in which raw data also serves as useful information.
3. Give three business examples (not mentioned in the text) of data that must be processed to provide useful information.
4. Give three examples of subsystems not operat- ing in the context of IT. Why are these consid- ered subsystems and not systems?
5. How do TPSs and DSSs differ?
6. What is a problem? Give an example of a busi- ness problem and discuss how a computer- based information system could solve it.
7. What is synergy? How is synergy accomplished when a person uses a computer? Explain the connection between synergy and increased productivity.
8. “An information system consists of hardware and software.” Why is this statement inadequate?
9. In which situations does one need to make a decision? Give three examples not mentioned in the chapter.
10. How can a DSS help make decisions?
11. Note the word “support” in decision support systems. Why are these applications not called decision-making systems?
12. Who is considered a knowledge worker? Will you have a career as a knowledge worker? Explain.
13. What is the most prevalent type of information system? Why is this type of IS so ubiquitous?
14. TPSs are usually used at the boundaries of the organization. What are boundaries in this context? Give three examples of boundaries.
15. Among IT professionals, the greatest demand is for network administrators and analysts. Why?

Answers

Answer:

Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.

Explanation:

1. Processing means any action that produces information from data, such as finding totals, averages, ratios, and. trends.
2. Names, addresses, and educational experience of employment candidates, consumers, and members of
professional organizations are some examples. They are data, but are also used as information, because they are
often needed as is, without processing.
5. A TPS merely records transactions and channels them into files and databases. It does not analyze the data nor
create any information. A DSS contains software that help make decisions. It provides useful information gleaned and manipulated from raw data.

describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

What command would you use to see how many concurrent telnet sessions you can run on the IFT MAIN router and how many could can you have on that router

Answers

"Computer, I demand information about how many concurrent telnet sessions I can run on the IFT MAIN router and how many I could have on that router, quickly!"

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.a. System.b. Satisfaction.c. Speedy.d. Subscriber.e. Switch.

Answers

Answer:

D. Subscriber

Explanation:

Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.

The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.

Write a function, named FileLineCount(), that returns an integer and accepts a string. Pass the function the file name. It should then use a while loop to return the number of lines in a file. Hint: The function will be reading the file you just created above. g

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that accepts a file string and uses that string to read the file in that location. Then it uses a while loop that keeps going until there are no more lines in the file. Each iteration it adds 1 to the count variables. Finally, it prints the count variable which contains the total number of lines in the file. The code has been tested and the output can be seen in the attached image below.

def countLines(file):

   file = open(file, 'r')

   count = 0

   while file.readline():

       count += 1

   print(str(count) + " total lines")

Write a program to input the radius of the base and height of a cylinder, and calculate and print the surface area, volume, and area of the base of the cylinder.According to the problem statement above, which of the following would be a data member?a) Radius of the baseb) Surface areac) Volumed) Input

Answers

Data members and member functions jointly determine the characteristics and actions of the objects in a Class. Data members are the variables that make up the data, and member functions are the methods used to modify these variables.

What are the data member in a program?

Members declared using any of the basic kinds as well as other types, such as pointer, reference, array types, bit fields, and user-defined types, are referred to as data members.

Any class may contain however many data members are necessary. The only situation in which a limitation might occur is when there is not enough memory.

Member data — information about the thing. Member functions — behavior-related aspects of the object-related functions A class is an object's blueprint. A class is a user-defined type that specifies the appearance of a certain type of object.

Therefore, radius, cylinder, print would be a data member.

Learn more about program here:

https://brainly.com/question/15706343

#SPJ5

Create a function in Python called HalfList that will accept a list of integers and find the total for the first half of the list. The function needs to return the total or the sum of all these numbers.

Answers

._.-.....

...............

A school’s administration stores the following data for each student in an online system: name, class, and five electives. Select the data type that the school should use to store information on the electives.

Answers

Answer:

Array of Strings

Explanation:

I believe the best data type for this information would be an Array of Strings. This array would have a fixed size of 5 elements. One for each one of the five electives that the student will have. Then the individual electives will be String elements that are saved in the 5 indexes of the Array. This would allow all of the electives to be bundled into a single variable and accessed together or individually by the user. This would be the best and most efficient data type to store this information.

Answer:

Arrays

Explanation:

plato haha

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6.
Let’s consider that you’ve been appointed as the IPv6 transition manager at a relatively small branch of a government agency (e.g., a branch of the Social Security agency in a medium-size town). Your main responsibility is to produce a plan with a timetable for achieving compliance with the IPv6 mandate. The plan should specify the guidelines, solutions, and technologies for supporting IPv6 throughout the agency branch. The plan should include the following, among other things:
Summary of the applicable government IPv6 mandate
Brief description of the networking facility at the branch (LANs, servers, routers, etc.)
Summary of the main IPv6-related RFCs that pertain to the IPv6 support
Cooperation with ISPs and equipment vendors to implement IPv6 support
Summary of the solutions and technologies to be employed in implementing IPv6 (e.g., dual-stack, tunneling, translation)
Timetable for completion of IPv6 transition
Plan for testing the IPv6 compliance in expectation of an audit by the government
The deliverable is a report (in Word) of 6 to 10 pages, excluding the name and biblio pages, with 3 to 5 solid references (APA format), at least. The use of drawings and other graphics is highly recommended.

Answers

Answer:

The U.S. Government has put in place an IPv6 mandate that comes into affect on September 30th. That new mandate requires all government agencies to have their public facing websites and email services available over IPv6.

At this point, it’s not likely that every government website will meet the deadline, though a large number of them will. Christine Schweickert, senior engagement manager for public sector at Akamai, told EnterpriseNetworkingPlanet that she expects over 1,800 U.S Government websites will be on IPv6 by the mandate deadline.

From an Akamai perspective, the company has a large number of U.S. Government customers that it is enabling for IPv6 with dual-stack servers. In a dual-stack implementation, a site is available natively over both IPv4 and IPv6. Akamai’s Content Delivery Network has a mapping technology that optimizes traffic around the Internet. Getting the government websites to run on IPv6 is just a matter of putting the site configuration on the Akamai dual-stack server maps.

“So if a request comes in to a government website from an IPv6 client, we will go ahead and route them to the best performing Akamai Edge server that can speak IPv6 back to that request,” Schweickert explained.

Another approach that some network administrators have tried for IPv6 support has been to tunnel the IPv6 traffic over an IPv4 network, or vice-versa. In Schweickert’s view, that’s not an ideal solution as it tends to break things.“When you’re tunneling, you’re routing through IPv4 packets and that’s not in the spirit that we have to operate in globally,” Schweickert said.

In contrast, Schweickert noted that with dual-stack, the server will respond to IPv4 requests with IPv4 content and to IPv6 requests with IPv6 content. “If you’re using tunneling, you’re really just doing a workaround,” Schweickert said.

To make it even easier for the U.S. Government websites, Akamai isn’t actually charging more money for the dual-stack service either. Schweickert noted that the dual-stack capability is a feature that is already part of the delivery service that Akamai is providing to its U.S Government customers.

David Helms, Vice President, Cyber Security Center of Excellence at Salient Federal Solutions is among those that are backers of the Akamai approach to meeting the September 30th IPv6 mandate. In his view, it’s all about enabling interesting services and locations over IPv6 in order to spur adoption.

How do operating system work?

Answers

Answer:

I tv2btb2tnyb3ngng3n3yny4n4yny4m4um

Explanation:

I g4hrb3nu4m4ym4umu4my3my3n3

The Fourth Amendment does not allow police to randomly test people for drunk driving. True or False

Answers

Answer:

False

Explanation:

Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are some things he needs to keep in mind when he is using a Web site as a source

Answers

Answer and Explanation:

Ben needs to cite his source of information when including information from the Web in his academic paper. A common citation method that he could use to cite his source is APA style.

When citing a website using APA style of references, you need to include the author, the title of the page or article, the date of publication, , the website name, and the URL(ususally in brackets).

Write a program using a dictionary that reads in a single positive digit number [0 - 9] from the user at the keyboard. Your program will then be able to look up the digit key in the dictionary and print the digit value spelled out. If the user types in a number that is either more than one digit, negative, or a non int value, re-prompt the user for valid input. First, before demonstrating your test cases, print out a display copy of the key:value pairs in your dictionary in sorted order. Deliverable: yournameLab4.py Your source code solution and a copy of the run pasted into your source submission file. Be sure to comment out your run so that your .py file will still run in the grader test bed. Validate user input is a single positive digit [0 - 9].

Answers

Answer:

The program in Python is as follows:

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

num = input("Number: ")

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

print(dict)    

print(dict[int(num)])

Explanation:

#This initializes the dictionary

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

#This gets input from the user

num = input("Number: ")

#This loop is repeated until the user enters a valid input

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

#This prints the dictionary

print(dict)    

#This prints the value of the key

print(dict[int(num)])

See attachment for sample run

In cell K8, create a formula using the SUM function that calculates the total of range D17:D20 and subtracts it from the value in J8

Answers

Answer:

=(J8 - SUM(D17:D20))

Explanation:

Required

Add D17 to D20

Subtract the result from J8

Save the result in K8

To do this, we make use of a nested bracket.

The innermost bracket is to add up D17 To D20 using the sum function.

i.e. SUM(D17:D20)

While the outermost bracket will subtract the calculated sum from J8.

=(J8 - SUM(D17:D20))

The SUM function is used to Adds values, in which users can add different values, in cells or range references or a mix of each of them, and the further calculation can be defined as follows:

In this question, we use the "=(J8 - SUM(D17:D20))" function that's description can be defined as follows:

D17 to D20 AddSubtract the J8 resultSave K8 resultsWe use a nested bracket to do this.D17-D20 is added to the innermost bracket with the sum function.SUM, i.e. (D17:D20)The calculated amount from J8 is taken from the outermost bracket.

Therefore the final answer is "=(J8 - SUM(D17:D20))".

Learn more:

brainly.com/question/24245

Write a method crawl that accepts a File parameter and prints information about that file. if the File object represents a normal file, just print its name. if the File object represents a directory, print its name and information about every file/directory inside it, indented.

Answers

I have to go answer is 36

program 3.Study the code carefully and write out the line where there is error, debug it and write out the correct code
1. ModuleModule1
2. Sub Main0
3. Dim num AsDouble
4. Num=10.0
5. Console.writeLine('The square root of '&num & "is"$Math.sqrt(num))
6. Console.ReadKey0
7. EndSub
8. EndModule​

Answers

Answer:

Several errors:

0 where ( ) was intended (probably OCR problem)space between As and DoubleSingle quote in stead of double quote in text string$ in stead of & near Math.sqrtmissing spaces around "is" for proper formatting

Note: See 1 Submission Instructions for the instructions regarding images in exercise solutions. On the next page is a UML class diagram that shows several classes that are associated in various ways. This class diagram is included in the Homework Assignment 1 zip archive as an Umlet file named class-relation.urf so if you use Umlet, you can load and modify this diagram. If you are using a different UML class diagramming tool, then you will have to create the diagram from scratch. (a) Note that in Course there is 7.2 an instance variable mRoster which is an instance of Roster. When Course object is deleted, the Roster instance mRoster will also be deleted. Given that, what type of class a relationship, if any, exists between Course and Roster? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.
(b) Note that in Roster there is an instance variable mStudents which is an ArrayList of Student objects. When a Roster object is deleted, mStudents is also deleted, but each Student object within mStudents is not deleted. Given that, what type of class relationship, if any, exists between Roster and Student. If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.
(c) What type of class relationship, if any, exists between Student and UndergradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.
(d) What type of class relationship, if any, exists between Student and GradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.
(e) What type of class relationship, if any, exists between UndergradStudent and GradStudent? If there is a relationship, modify the diagram to indicate the relationship and label each end of the relationship with a multiplicity.

Answers

Answer:

that is very very true

Explanation:

What is the difference between ROM and RAM

Answers

Answer:

ROM : Read Only Memory.

RAM : Random Ascess Memory.

Answer:

RAM is the random access memory of your computer and ROM, which is a read-only memory.

RAM is a volatile storage memory that temporarily saves your files. ROM is non-volatile memory, which stores your computer instructions permanently.

Explanation:

RAM:-

RAM is a volatile memory that can store data while power is delivered.

It is possible to retrieve and modify data saved on RAM.

It is used to store data that must be processed temporarily by the CPU.

The CPU is able to access the saved data.

It's a memory of high speed.

ROM:-

ROM is a non-volatile memory that can retain information even when power is off.

ROM data can be read-only.

During computer bootstrap, it saves the necessary instructions.

The data stored on it cannot be accessed by the CPU without data being stored in RAM.

It's a lot lighter than RAM.

When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloud-based system, employee can access information from _____.

Answers

Answer:

anywhere in the world

Explanation:

Employee can access information from anywhere in the world. That is the main upside of using cloud-based enterprise system. They run completely remote and are accessible from anywhere as long as you have an internet connection and authorized access to the system. This increased accesibility is crucial for companies that have employees that move from place to place solving problems and solves many of the problems with on-site systems.

Which tool, first introduced in Windows Server 2008 but remains in Windows Server 2019, provides one location to set up, deploy, and manage servers and server roles

Answers

Answer:

Server Manager

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM, Windows Server 2008, Windows Server 2009, etc.

Windows Server 2008 is a Microsoft Windows Server operating system and released to the general public on the 27th of February, 2008, as part of the Windows NT family.

Server Manager is a tool that was first introduced in Windows Server 2008 (OS) but remains in Windows Server 2019 (OS). It was designed and developed by Microsoft to provide end users with one location to set up, deploy, and manage servers and server roles.

On the 14th of January, 2020, Microsoft stopped providing online technical content update, free support options, non-security and free security updates on-premises for Windows Server 2008 and Windows Server 2008 R2, as they have reached the end of their support lifecycle.

The Marietta Country Club has asked you to write a program to gather, then display the results of the golf tournament played at the end of March. The Club president Mr. Martin has asked you to write two programs.
The first program will input each player's first name, last name, handicap and golf score and then save these records in a file named golf.txt (each record will have a field for the first name, last name, handicap and golf score).
The second program will read the records from the golf.txt file and display them with appropriate headings above the data being displayed.
If the score is = Par, then display 'Made Par'
If the score is < Par, then display 'Under Par'
If the score is > Par, then display 'Over Par'
There are 16 players in the tournament. Par for the course is 80. The data is as follows:
Andrew Marks 11.2 72
Betty Franks 12.8 89
Connie William 14.6 92
Donny Ventura 9.9 78
Ernie Turner 10.1 81
Fred Smythe 8.1 75
Greg Tucker 7.2 72
Henry Zebulon 8.3 83
Ian Fleming 4.2 72
Jan Holden 7.7 84
Kit Possum 7.9 79
Landy Bern 10.3 93
Mona Docker 11.3 98
Kevin Niles 7.1 80
Pam Stiles 10.9 87
Russ Hunt 5.6 73

Answers

Answer:

Explanation:

The following program is written in Python. It creates two functions, one for writting the players and their scores to the file, and another function for reading the file and outputting whether or not they made Par. The functions can be called as many times that you want and the writeFile function allows for 16 inputs to be made when called. A test case has been provided with all of the players mentioned in the question. The output can be seen in the attached image below.

def writeFile():

   file = open('output.txt', 'w')

   for x in range(16):

       firstName = input("Enter First Name:")

       lastName = input("Enter Last Name:")

       handicap = input("Handicap:")

       score = input("Score:")

       file.write(str(firstName) + " " + str(lastName) + " " + str(handicap) + " " + str(score) + "\n")

   file.close()

def readFile():

   file = open('output.txt', 'r')

   for line in file:

       lineArray = line.split(" ")

       if int(lineArray[-1]) < 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Under Par" )

       elif int(lineArray[-1]) == 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Made Par")

       else:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Over Par")

   file.close()

writeFile()

readFile()

Kirsten manages the infrastructure that hosts her company's CRM platform. She currently has a production environment that all of the users access. However, she was recently reading about the concept of creating a second production environment where patches and updates are applied and then traffic is shifted over to the second environment once it has been tested. Which of the following describes the methodology that she is considering implementing?

a. Rolling deployment
b. Blue-green deployment
c. Duplicate deployment
d. Canary deployment

Answers

Answer:

The methodology that Kristen is considering to implement is:

d. Canary deployment.

Explanation:

This deployment type creates a second production environment (better called a testing environment).  Here, patches and updates are first applied for testing purposes before shifting traffic to the main production environment.  In a server environment, the idea of canary deployment is to first deploy the changes to a small subset of servers, test them before rolling out the changes to the rest of the servers. It enjoys some advantages over other deployment strategies because it allows for testing.

In Scheme, the form (symbol-length? 'James) will return: Group of answer choices 0 5 6 error message

Answers

Answer:

an error message

Explanation:

The return value is the value which is sent back by the function to a place in the code from where the [tex]\text{function}[/tex] was called from. Its main work is to return a value form the function.

In the context, the form of  "(symbol-length? 'James)" in Scheme will return the  value --- ' an error message'.

Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences of every word in the file. You function should be case-insensitive so 'Hello' and 'hello' are treated as the same word. You should ignore words of length 2 or less. The results printed will be ordered from the most frequent to the least frequent. Hint: dictionary and list. Test your implementation on file great_expectations.txt

Answers

Answer:

Explanation:

The following Python program uses a combination of dictionary, list, regex, and loops to accomplish what was requested. The function takes a file name as input, reads the file, and saves the individual words in a list. Then it loops through the list, adding each word into a dictionary with the number of times it appears. If the word is already in the dictionary it adds 1 to its count value. The program was tested with a file named great_expectations.txt and the output can be seen below.

import re

def wordCount(fileName):

   file = open(fileName, 'r')

   wordList = file.read().lower()

   wordList = re.split('\s', wordList)

   wordDict = {}

   for word in wordList:

       if word in wordDict:

           wordDict[word] = wordDict.get(word) + 1

       else:

           wordDict[word] = 1

   print(wordDict)

wordCount('great_expectations.txt')

LAB: Parsing food data in C++
Write the code in c++
Given a text file containing the availability of food items, write a program that reads the information from the text file and outputs the available food items. The program first reads the name of the text file from the user. The program then reads the text file, stores the information into four separate arrays, and outputs the available food items in the following format: name (category) -- description
Assume the text file contains the category, name, description, and availability of at least one food item, separated by a tab character ('\t').
Hints: Use the find() function to find the index of a tab character in each row of the text file. Use the substr() function to extract texts separated by the tab characters.
Ex: If the input of the program is:
food.txt
and the contents of food.txt are:
Sandwiches Ham sandwich Classic ham sandwich Available
Sandwiches Chicken salad sandwich Chicken salad sandwich Not available
Sandwiches Cheeseburger Classic cheeseburger Not available
Salads Caesar salad Chunks of romaine heart lettuce dressed with lemon juice Available
Salads Asian salad Mixed greens with ginger dressing, sprinkled with sesame Not available
Beverages Water 16oz bottled water Available
Beverages Coca-Cola 16oz Coca-Cola Not available
Mexican food Chicken tacos Grilled chicken breast in freshly made tortillas Not available
Mexican food Beef tacos Ground beef in freshly made tortillas Available
Vegetarian Avocado sandwich Sliced avocado with fruity spread Not available
the output of the program is:
Ham sandwich (Sandwiches) -- Classic ham sandwich
Caesar salad (Salads) -- Chunks of romaine heart lettuce dressed with lemon juice
Water (Beverages) -- 16oz bottled water
Beef tacos (Mexican food) -- Ground beef in freshly made tortillas
Food.txt file
Sandwiches Ham sandwich Classic ham sandwich Available
Sandwiches Chicken salad sandwich Chicken salad sandwich Not available
Sandwiches Cheeseburger Classic cheeseburger Not available
Salads Caesar salad Chunks of romaine heart lettuce dressed with lemon juice Available
Salads Asian salad Mixed greens with ginger dressing, sprinkled with sesame Not available
Beverages Water 16oz bottled water Available
Beverages Coca-Cola 16oz Coca-Cola Not available
Mexican food Chicken tacos Grilled chicken breast in freshly made tortillas Not available
Mexican food Beef tacos Ground beef in freshly made tortillas Available
Vegetarian Avocado sandwich Sliced avocado with fruity spread Not available

Answers

Answer:

Implementation of the given problem in C++:

#include <bits/stdc++.h>

using namespace std;

int main() {

 vector<string> category, name, description, availability;

 string str;

 cout << "Enter the name of text file to open: ";

 cin >> str;

 ifstream file(str);

 while (getline(file, str)) {

   size_t pos1 = str.find('\t');             // to find the first tab delimiter

   size_t pos2 = str.find('\t', pos1 + 1);   // to find the second tab delimiter

   size_t pos3 = str.find('\t', pos2 + 1);   // to find the third tab delimiter

   category.push_back(str.substr(0, pos1));

   name.push_back(str.substr(pos1 + 1, pos2 - pos1 - 1));

   description.push_back(str.substr(pos2 + 1, pos3 - pos2 - 1));

   availability.push_back(str.substr(pos3 + 1, str.length() - pos3));

 }

 for (int i = 0; i < name.size(); i++)

   if (availability[i] == "Available")

     cout << name[i] << " (" << category[i] << ") -- " << description[i] << endl;

}

Output:-

The program is an illustration of file manipulations in C++.

File manipulation involves writing to and reading from a file

The program in C++ where comments are used to explain each line is as follows:

#include <bits/stdc++.h>

using namespace std;

int main() {

   //This declares all vector variables

   vector<string> catg, name, desc, status;

   //This declares the file name as a string variable

   string fname;

   //This prompts the user for the filename

   cout <<"Filename: ";

   //This gets input for the filename

   cin >> fname;

   //This opens the file

   ifstream file(fname);

   //The following is repeated till the end of the file

   while (getline(file, fname)) {

       //This finds the first tab delimiter

       size_t pos1 = fname.find('\t');

       //This finds the second tab delimiter

       size_t pos2 = fname.find('\t', pos1 + 1);

       //This finds the third tab delimiter

       size_t pos3 = fname.find('\t', pos2 + 1);

       //The next four lines populate the vector variables

       catg.push_back(fname.substr(0, pos1));

       name.push_back(fname.substr(pos1 + 1, pos2 - pos1 - 1));

       desc.push_back(fname.substr(pos2 + 1, pos3 - pos2 - 1));

       status.push_back(fname.substr(pos3 + 1, fname.length() - pos3));

   }

   //This iterates through the file, line by line

   for (int i = 0; i < name.size(); i++){

       //This prints each line

       if (status[i] == "Available"){

           cout << name[i] << " (" << catg[i] << ") -- " << desc[i] << endl;

       }

   }

   return 0;

}

Read more about similar programs at:

https://brainly.com/question/15456319

Other Questions
Qu oraciones usan el subjuntivo en una expresin impersonal correctamente?Hay ms de una respuesta correcta. Elige todas las opciones correctas.Es necesario que calienten los totopos de maz.Es terrible que salpimienten el pat. Es curioso probar totopos de maz calientes.Le fastidia que su madre agregue especias.Le aburre que le enseen a cocinar.multiple choice If the temperature of a volume of dieal gas ncreases for 100 to 200, what happens to the average kinetic energy of the molecules? Discuss how epidemiologic methods are used to evaluate Healthy People 2020 objectives. Give an example. The example can be one you created or one from an actual study. Include the primary goal/purpose of the descriptive or analytical study, design type in the category chosen, uses of analytic or descriptive type, at least one advantage and disadvantage of the design type. a neon light flashes 5 times every 10 seconds. show that the light flashes 43200 times in a day During weekly conference calls, Zeke, a sales manager for a national chain of clothing stores, and the other managers in his district explain to their district manager the reasons for different decisions; they also explain why certain costs and sales were higher or lower than they were the previous week. ________ is the explanation of their decisions and work results. Group of answer choices Accountability Touching A stepped decision A hierarchy of authority Power which two consecutive integers does q lie Select the correct text in the passage.Which part of the sentence needs to be revised to eliminate wordiness and redundancy?First and foremost, take time to plan your essay to create a stress-free environment when it's time to create your draft. Help me please guyyyyy please help! What is the definition of thermal chemistry?a.The study of change that involves warm objectsb.The study of change that involves heatc.The study of change that involves cool objectsd.The study of change that involves temperature Question 1 of 10 What is the plural form of l'tudiante? A. Des tudiantes. B. Une tudiante. C. Les tudiantes. D. Les tudiants. What is the value of A?Im confused on this one write 7 pi divided by 60 in degrees The length of the sides of a triangle are 1115 and 20 classify the triangle 7. What is transformation and describe how it has been done in a famousexperiment. What is an approximate average rate of change of the graph from X =22 and x = 26 Are there any combinations that give rise to both black and white-fur offspring? HELPPPP PLSSSS Which is true about the polynomial ? It is a binomial with a degree of 2. It is a binomial with a degree of 3. It is a trinomial with a degree of 2. It is a trinomial with a degree of 3. Thermodynamic Processes: An ideal gas is compressed isothermally to one-third of its initial volume. The resulting pressure will be Why is chlamydia less likely to be treated than pubic lice?O Chlamydia symptoms are often mild or absent, but pubic lice is visible and often causes itching.Chlamydia is a viral infection that cannot be treated, but pubic lice is an easily treated bacterial infection.O Chlamydia advances quickly to a stage-three incurable infection, but pubic lice has only one stage of infection.O Chlamydia only affects females, who seldom seek treatment for STIs, but pubic lice affects both males andfemales. CHANGE THE FOLLOWING SENTENCES INTO INDIRECT SPEECH1. Anuj said, I will leave for Delhi tomorrow.2. My uncle said to me, I am tired now.3. I said, I am waiting for my sister to arrive.4. The teacher said to us, you are very naughty.5. Veena said to her mother, I have finished my homework.6. Mr. Ravi said to his neighbor, My house is being built.7. Mrs. Gupta said to the doctor, My baby was crying all night.8. Chitra said, I will go to the shop today.9. The old man said to me, I have been trying to cross the road, but have not beenable to do so.10. Poonam said, I do not know how to make tea.