Answer:
dot commercial
Explanation:
.edu education
.gov goverment
Answer:
Commercial
Explanation:
At the beginning of the semester, we studied partially filled arrays. This is when the number of elements stored may be less than the maximum number of elements allowed. There are two different ways to keep track of partially filled arrays: 1) use a variable for the numberElements or 2) use a sentinel (terminating} value at the end of elements (remember c-strings?). In the code below, please fill in the details for reading the values into the an array that uses a sentinel value of -1. Complete the showArray function as well.
#include
using namespace std;
void showArray(int array[]);
// ToDo: Code showArray function with one array parameter
int main()
{
const int MAX_SIZE=16;
int array[MAX_SIZE]; // store positive values, using -1 to end the values.
cout <<"Enter up to " << MAX_SIZE-1 << " positive whole numbers, use -1 to stop\n";
//To do: Read the int values and save them in the static array variable.
// When the user enters -1 or the array has no more room, leave the loop..
//To do: store -1 at the end of elements in the array
// Show array function
showArray(array);
return 0;
}
// To do: print out for the array
void showArray(int array[])
{
}
Answer:
Complete the main as follows:
int num;
cin>>num;
int i = 0;
while(num!=-1 && i <16){
array[i] = num;
cin>>num;
i++; }
array[i+1] = -1;
The showArray() as follows:
int i =0;
while(array[i]!=0){
cout<<array[i]<<" ";
i++;
}
Explanation:
See attachment for complete program where comments are used to explain difficult lines
You are the IT administrator for a small corporate network. You have just changed the SATA hard disk in the workstation in the Executive Office. Now you need to edit the boot order to make it consistent with office standards. In this lab, your task is to configure the system to boot using devices in the following order: Internal HDD. CD/DVD/CD-RW drive. Onboard NIC. USB storage device. Disable booting from the diskette drive.
Answer:
this exercise doesn't make sense since I'm in IT
Explanation:
Write a recursive method called sumTo that accepts an integer parameter n and returns a real number representing the sum of the first n reciprocals. In other words, sumTo(n) returns (1 1/2 1/3 1/4 ... 1/n). For example, sumTo(2) should return 1.5. The method should return 0.0 if it is passed the value 0 and throw an IllegalArgumentException if it is passed a value less than 0.
Answer:
Sorry mate I tried it was wrong
Explanation:
Sorry again
You are helping a friend in college with his network connection. He would like a high speed connection between his computers so he can play Super Blast with others. In this lab, your task is to complete the following: Choose an appropriate router that will provide security and the fastest local connection. Connect the router to both computers and to the dorm internet connection. Request new TCP/IP information from the router on both computers. Configure Windows Firewall on both computers. Turn on Windows Firewall for both the Private and the Public network profiles. Add an exception for the SuperBlast program only for the Private network profile.
Solution :
Set up the router as follows:
On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet [tex]$100/1000TX$[/tex] router with the firewall to the Workspace.
Connection of the router as follows:
Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a [tex]$LAN$[/tex] port on the router. Above the Dorm-[tex]$PC2$[/tex] computer, select [tex]$\text{back}$[/tex] to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag the connector to the [tex]$LAN$[/tex] port on the computer. In the Selected Component window, drag the other connector to a [tex]$LAN$[/tex] port on the router. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag a connector to the [tex]$WAN$[/tex] port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.
Provide power to the router as follows:
On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.
Request new [tex]$TCP/IP$[/tex] information from the router for Dorm-PC as follows:
On the [tex]$\text{Dorm-PC}$[/tex] monitor, select Click to view [tex]$\text{Windows 10}$[/tex].In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter [tex]$\text{ipconfig}$[/tex] /renew and press [tex]$\text{Enter}$[/tex] to request new [tex]$TCP/IP$[/tex] information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.
Configure Windows Firewall on [tex]$\text{Dorm-PC}$[/tex] as follows:
In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.
This unit is used to print the picture on a paper
Answer:a printer
Explanation:
It prints things
Write a program that lets the user enter the loan amount and loan period in number of years and displays the monthly and total payments for each interest rate starting from 5% to 8%, with an increment of 1/8.
Answer:
Following are the code to this question:
import java.util.*;//import package
public class Main //defining a class
{
public static void main(String[] axc)//main method
{
double Loan_Amount,years,Annual_Interest_Rate=5.0,Monthly_Interest_Rate,Total_Amount,Monthly_Payment;//defining variables
Scanner ax = new Scanner(System.in);//creating Scanner class object
System.out.print("Enter loan amount:");//print message
Loan_Amount = ax.nextDouble();//input Loan_Amount value
System.out.print("Enter number of years: ");//print message
years= ax.nextInt();//input number of years value
System.out.printf(" %-20s%-20s%-20s\n", "Interest Rate", "Monthly Payment","Total Payment");//print message
while (Annual_Interest_Rate <= 8.0) //use while loop to calculate Interest rate table
{
Monthly_Interest_Rate = Annual_Interest_Rate / 1200;//calculating the interest Rate
Monthly_Payment = Loan_Amount * Monthly_Interest_Rate/(1 - 1 / Math.pow(1 + Monthly_Interest_Rate,years * 12));//calculating monthly payment
Total_Amount = Monthly_Payment * years * 12;//calculating yearly Amount
System.out.printf("\t %-19.3f%-19.2f%-19.2f\n", Annual_Interest_Rate,Monthly_Payment,Total_Amount);//use print meethod to print table
Annual_Interest_Rate = Annual_Interest_Rate + 1.0 / 8;//use Annual_Interest_Rate to increating the yearly Rate
}
}
}
Output:
Please find the attached file.
Explanation:
In this code inside the class, several double variables are declared in which the "Loan_Amount and years" is used for input value from the user-end, and another variable is used for calculating the value.
In this code a while loop is declared that checks the "Annual_Interest_Rate" value and creates the interest rate table which is defined in the image file please find it.
6
Suppose the following formula is inputted into Excel:
=MROUND(1/4,100)
The output in the cell will be:
0
0.25
0.2500
1
Answer:
the output in the cell will be 0,2500
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link
Answer:
131 packets
Explanation:
Given
W (link ) =0.5 M bits, and Ping packets ( P ) = 500bytes
To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet
P ( required ) = 500 * 8 = 4000 bits
therefore the W /P packet is calculated as
= 0.5 M bits / 4000 bits
given that : 1 M bits = 1,048,576 bits
0.5 M bits / 4000 bits= 131.07
hence approximately 131 packets/ sec is required to flood the target organization
I need help solving this problem on Picoctf. The question is What happens if you have a small exponent? There is a twist though, we padded the plaintext so that (M ** e) is just barely larger than N. Let's decrypt this: ciphertext. The ciphertext is this. I tried using stack flow and the rsatool on GitHub but nothing seems to work. Do you guys have any idea of what I can do. I need to solve this problem asap
Explanation:
Explanation:
RSA encryption is performed by calculating C=M^e(mod n).
However, if n is much larger than e (as is the case here), and if the message is not too long (i.e. small M), then M^e(mod n) == M^e and therefore M can be found by calculating the e-th root of C.
Which of the following is necessary to appreciate features provided by software applications?
a package
O a basic understanding
O a basis of comparison
O coding concepts
Answer: a basic understanding
Explanation:
In other to appreciate the features that an application has, one must have a basic understanding of what the software is meant to do. That way, when the software does this duty, the person will recognize it and appreciate the software.
For instance, a person who does not understand the basic premise of Quickbooks will not be able to appreciate the various features provided by Quickbooks to make accounting easier for small to medium businesses.
wassup anybody tryna play 2k
Answer:
u dont want the smoke my boy u dont
Explanation:
Answer:
I only play 24k B)))))))))
Why is dark supereffective against ghost? (AGAIN)
I don't get it. I get why it is supereffective against psychic, because even the greatest minds are scared of criminal activities, but why would it be good against ghost?
AND GIVE ME AN ACTUAL ANSWER THIS TIME. DON"T ANSWER IF YOU DON"T KNOW OR IF YOUR ANSWER ISN'T IN ENGLISH.
Answer: Think of it in this way: People often warn others not to speak badly of the Dead. Why? This is because, it is believed that their souls get "restless", and this causes them to haunt others. Thus, Dark type moves, that symbolise the "evil" aspect of the Pokemon, are super-effective against Ghosts. Type chart, effectiveness and weakness explained in Pokémon Go
Type Strong Against Weak Against
Bug Grass, Psychic, Dark Fighting, Flying, Poison, Ghost, Steel, Fire, Fairy
Ghost Ghost, Psychic Normal, Dark
Steel Rock, Ice, Fairy Steel, Fire, Water, Electric
Fire Bug, Steel, Grass, Ice Rock, Fire, Water, Dragon
Explanation: hopes this helps
In a multimedia presentation, when might voice-over be a better choice than placing the text on the screen?
when you have very little to say
when your audience is bored
when you have a lot to say
when you don’t want to write
In a multimedia presentation, the option that might be the voice-over when you have a lot to say.
What is multimedia presentation?A multimedia presentation is known to be a presentation where a person is said to often stand by themselves to present information via slides, video, etc.
In a multimedia presentation, the option that might be in the case of voice-over is when you have a lot to say as it is better to put it in a video format.
Learn more about multimedia from
https://brainly.com/question/24138353
#SPJ2
Which option would allow you to watch an HD video, without delays in playback, on a computer with a Mac OS and a connection that has a lower bit rate? MPG QuickTime H.264 Flash Player
Answer:
H.264
Explanation:
A file type can be defined as the standard used to store digital data such as pictures, texts, videos, and audios. They all have unique file extension which determines the type of software program (application) to be used for opening a particular file and accessing its data e.g pictures (jpeg, png), texts (txt, docx, rtf), audios (mp3, acc), and videos (mp4, 3gp, avi, h.264, mkv).
Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.
H.265 is a high efficiency video codec (HEVC) and it's a standard video compression codec designed and developed to offer a better data compression, as an upgrade to the advanced video coding (AVC) standard.
Hence, the option or file extension (format) which would allow you to watch a high definition (HD) video, without delays in playback, on a computer with a Mac operating system (OS) and a connection that has a lower bit rate is the H.264 format.
what is a software house
Answer: a company whose primary products are various forms of software, software technology, distribution, and software product development. They make up the software industry.
this should be the answer
hoped this helped
Which of the following does cloud computing allow users to do? Check all of the boxes that apply.
access data from anywhere with an Internet connection
store pictures and music
store data
have a unique address for their computer
Answer:
a b c
Explanation:
there just right
Answer: a b c d
Explanation edge 2023
Which database item would show details such as a customer’s name, their last purchase, and other details about a customer?
A. file
B. field
C. record
D. table
E. index
Answer:
The answer is C. Record
Explanation:
....................
Answer:
*
* *
* * *
* * * *
* * * * *
i did it i guess?
You work for a small company that exports artisan chocolate. Although you measure your products in kilograms, you often get orders in both pounds and ounces. You have decided that rather than have to look up conversions all the time, you could use Python code to take inputs to make conversions between the different units of measurement.
You will write three blocks of code. The first will convert kilograms to pounds and ounces. The second will convert pounds to kilograms and ounces. The third will convert ounces to kilograms and pounds.
The conversions are as follows:
1 kilogram = 35.274 ounces
1 kilogram = 2.20462 pounds
1 pound = 0.453592 kilograms
1 pound = 16 ounces
1 ounce = 0.0283 kilograms
1 ounce = 0.0625 pounds
For the purposes of this activity the template for a function has been provided. You have not yet covered functions in the course, but they are a way of reusing code. Like a Python script, a function can have zero or more parameters. In the code window you will see three functions defined as def convert_kg(value):, def convert_pounds(value):, and def convert_ounces(value):. Each function will have a block showing you where to place your code.
Answer:
Answered below.
Explanation:
def convert_kg(value){
ounces = value * 35.274
pounds = value * 2.20462
print("Kilograms to ounces: $ounces")
print("Kilograms to pounds: $pounds)
}
def convert_pounds(value){
kg = value * 0.453592
ounce = value * 16
print("pounds to kg; $kg")
print ("pounds to ounce; $ounce")
}
def convert_ounces(value){
kg = value * 0.0283
pounds = value * 0.0625
print ("ounces to kg; $kg")
print ("ounces to pounds; $pounds")
}
how does such editing affect courtrooms where visual evidence is often presented?
Write a program that asks for the user's name, phone number, and address. The program then saves/write all information in a data file (each information in one line) named list.txt. Finally, the program reads the information from the file and displays it on the screen in the following format: Name: User's Name Phone Number: User's Phone Number Address: User's Street Address User's City, State, and Zip Code g
Answer:
Amazon prime
Explanation:
# change amount as an integer input, and output the change using the fewest coins, one coin type per line. The coin types are Dollars, Quarters, Dimes, Nickels, and Pennies. Use singular and plural coin names as appropriate, like 1 Penny vs. 2 Pennies
my code produces no output and i cant find why?
coin_change =int(input())
def coin_change(cents):
if cents <= 0:
print( 'Zero cents.')
else:
quarter = cents // 25
dime = (cents % 25) //10
nickle = cents % 25 % 10 // 5
penny = cents % 5
print (coin_change )
# produces no output
Answer:
Explanation:
The Python code provided was not producing any output because you were never printing out the coin variables that you created. The following code adds the needed print statements using the right singular or plural coin name as needed.
cents = int(input())
def coin_change(cents):
if cents <= 0:
print('Zero cents.')
else:
quarter = cents // 25
dime = (cents % 25) // 10
nickle = cents % 25 % 10 // 5
penny = cents % 5
if quarter == 0 or quarter > 1:
print(str(quarter) + " quarters")
else:
print(str(quarter) + " quarter")
if dime == 0 or dime > 1:
print(str(dime) + " dimes")
else:
print(str(dime) + " dime")
if nickle == 0 or nickle > 1:
print(str(nickle) + " nickels")
else:
print(str(nickle) + " nickel")
if penny == 0 or penny > 1:
print(str(penny) + " pennies")
else:
print(str(penny) + " penny")
coin_change(cents)
my code get an input of 1900 and it should output not a leap year but it fails first line of code. It should output not a Leap any number with 1500 not divisble by 4 with/out a remainder should output (not a leap year. )
input_year = int(input())
if input_year % 4 == 0: #fails on this step, 1900 should be false
print(input_year, "- is Leap Year")
elif input_year % 100 == 0:
print(input_year, "- leap year")
elif input_year % 400 ==0:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
Answer:
Explanation:
The code does not fail on the first step since 1900 divided by 4 is actually 475 and has no remainder, meaning that it should return True. The code won't work because the if statements need to be nested in a different format. The correct algorithm would be the following, which can also be seen in the picture attached below that if we input 1900 it would output is not a leap year as it fails on the division by 400 which gives a remainder of 0.75
input_year = int(input())
if input_year % 4 == 0:
if input_year % 100 == 0:
if input_year % 400 == 0:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
else:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
A slide contains three text boxes and three images that correspond to the text boxes. Which option can you use to display a text box with its
image, one after the other, in a timed sequence?
A. transition
В. table
C. animation
D. slide master
E. template
Answer:
animation
Explanation:
A client is
a computer that is disconnected from the network.
the same as a server.
a computer that requests a service.
a router.
Answer:
a computer that requests a service.
Answer:
A computer that requests a service
Explanation:
In computing, a client is a piece of computer hardware or software that accesses a service made available by a server as part of the client–server model of computer networks. The server is often (but not always) on another computer system, in which case the client accesses the service by way of a network.
plz mark as brainliest
Suppose Alice downloads a buggy browser that implements TLS incorrectly. The TLS specification says that, during the handshake, the browser should send a random 256-bit number RB. Instead of picking RB randomly the browser always sends all zeros. Describe an attack that is possible against this buggy browser and how to update the browser so that this attack is no longer feasible.
Solution :
It is given that Alice downloads the buggy browser which implements a TLS incorrectly. The specification of a TLS states that during a handshake, the browser sends a 256 bit number of RB randomly.
So in this case, a man-n-the-middle attack is possible. It can compromise the confidentiality of Alice. Updating the browser by visiting the website and checking its latest version of the browser or installing some other browser which has a more trust in the market for its security features.
Which of the following will display a string whose address is in the dx register: a.
mov ah, 9h
int 21h
b.
mov ah, 9h
int 22h
c.
mov ah, 0h
int 21h
d.
None of these
e.
mov ah, 2h
int 20h
Answer:
a)
Explanation:
Function 9 of interrupt 21h is display string.
A user has a computer with a single SSD, and the entire drive contains one partition. The user wants to install a second OS on the computer without having to reinstall the current OS. The user wants to be able to select which OS to use when booting the computer. Which Disk Management tools should the user utilize to accomplish this task?
Answer:
The correct approach is "Shrink partition". A further explanation is given below.
Explanation:
Shrinking partition shrinks or decreases this same disc size as well as unallotted disc space, unallotted space could be utilized to mount a secondary Operating system to operate as a double operating system.Whilst also diminishing everything into neighboring volatile memory on another disc, this same space required for area as well as drives could also be reduced.Thus the above is the correct answer.
If D3=30 and D4=20, what is the result of the function
=IF(D4 D3, D3-D4, "FULL")?
0-10
O Unknown
O 10
O Full
Answer:
c. 10
Explanation:
Given
[tex]D3 = 30[/tex]
[tex]D4 = 20[/tex]
Required
The result of: [tex]=IF(D4 < D3,D3-D4,"FULL")[/tex]
First, the condition D4 < D3 is tested.
[tex]D4 < D3 = 20 < 30[/tex]
Since 20 < 30, then:
[tex]D4 < D3 = True[/tex]
The condition is true, so:
D3 - D4 will be executed.
[tex]D3 - D4 = 30 - 20[/tex]
[tex]D3 - D4 = 10[/tex]
Hence, the result of the function is 10
Which examples demonstrate common qualifications for Marketing Information Management and Research careers? Check all that apply.
David has the physical strength to lift products on high shelves.
Alessandra analyzes and interprets information she gathered from surveys.
Eve is good at presenting and explaining information to others.
Franklin is a strong leader who is able to motivate others.
Gene is very organized and tracks information accurately and carefully.
Claire is confident and persuasive, which makes her good at selling products.
Answer:
2,3,5
Explanation:
Answer: the answer is 2 3 and 5
Explanation: