Answer:A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a legitimate program
Explanation:
What property must be set on a menu item to have the user activate that option by pressing Ctrl C on the keyboard
Answer:
ShortcutKeys
Explanation:
ShortcutKeys is a term used in computing to describe a combination of two or more keys to perform specific actions in a faster way.
Some shortcut keys have been programmed on the operating system of the computer, while a user can also create some through scripting coding.
For example, Ctrl + B is for Bold, while Ctrl + A is for select all.
Hence, to have the user activate the SHORTCUT option by pressing Ctrl C on the keyboard, a SHORTCUTKEYS property must be set on a menu item
90 points can someone please write the code for this (HTML):
A text field to enter your name.
At least three multiple choice questions where only one answer can be chosen.
A word problem with a text area for the user to type in the answer.
At least three different math symbols using correct ampersand notation.
A Submit button at the end of the test.
Comment tags that indicate the start and end of the test.
I need to get this done really soon, please help. I couldn't find any text to HTML sites that included multiple choice and Interactive buttons.
Answer:
Explanation:
1.
First name:
Last name:
.
2.
What fraction of a day is 6 hours?
Choose 1 answer
6/24
6
1/3
1/6
Submit
</p><p> // The function evaluates the answer and displays result</p><p> function displayAnswer1() {</p><p> if (document.getElementById('option-11').checked) {</p><p> document.getElementById('block-11').style.border = '3px solid limegreen'</p><p> document.getElementById('result-11').style.color = 'limegreen'</p><p> document.getElementById('result-11').innerHTML = 'Correct!'</p><p> }</p><p> if (document.getElementById('option-12').checked) {</p><p> document.getElementById('block-12').style.border = '3px solid red'</p><p> document.getElementById('result-12').style.color = 'red'</p><p> document.getElementById('result-12').innerHTML = 'Incorrect!'</p><p> showCorrectAnswer1()</p><p> }</p><p> if (document.getElementById('option-13').checked) {</p><p> document.getElementById('block-13').style.border = '3px solid red'</p><p> document.getElementById('result-13').style.color = 'red'</p><p> document.getElementById('result-13').innerHTML = 'Incorrect!'</p><p> showCorrectAnswer1()</p><p> }</p><p> if (document.getElementById('option-14').checked) {</p><p> document.getElementById('block-14').style.border = '3px solid red'</p><p> document.getElementById('result-14').style.color = 'red'</p><p> document.getElementById('result-14').innerHTML = 'Incorrect!'</p><p> showCorrectAnswer1()</p><p> }</p><p> }</p><p> // the functon displays the link to the correct answer</p><p> function showCorrectAnswer1() {</p><p> let showAnswer1 = document.createElement('p')</p><p> showAnswer1.innerHTML = 'Show Corrent Answer'</p><p> showAnswer1.style.position = 'relative'</p><p> showAnswer1.style.top = '-180px'</p><p> showAnswer1.style.fontSize = '1.75rem'</p><p> document.getElementById('showanswer1').appendChild(showAnswer1)</p><p> showAnswer1.addEventListener('click', () => {</p><p> document.getElementById('block-11').style.border = '3px solid limegreen'</p><p> document.getElementById('result-11').style.color = 'limegreen'</p><p> document.getElementById('result-11').innerHTML = 'Correct!'</p><p> document.getElementById('showanswer1').removeChild(showAnswer1)</p><p> })</p><p> }</p><p>
3.<p> rows="5" cols="30"</p><p> placeholder="type text.">
4. <p>I will display €</p>
<p>I will display ∂</p>
<p>I will display ∃</p>
5. <input type="submit">
6. This code should be the first code
<!-- This is a comment -->
<p>Start Test.</p>
<!-- Remember to add more information here -->
This code should be the last and at the end of the of the html code
<!-- This is a comment -->
<p>End Test.</p>
<!-- Remember to add more information here -->
Notice: Answers may not be accurate and may be accurate. And pls endeavor to edit any part of the html code.
I need some help with this assignment. I'm having difficulty trying come up ideas to use here. Can I get any help?
Here's the question.
Think of three simple tasks where you believe sequence of instruction matters. Is there a way to modify it to where sequence doesn't matter? Find steps in each task where the sequence can be changed and still achieve the desired outcome. Write out the original and modified algorithms AND pseudocode for each task. Write a short paragraph for each task describing the changes in sequence.
Answer:
Abigail wants to attend a community college. Suppose x represents the number of credits she takes and y represents her total fees in dollars. Which of these statements are correct? Select all that apply.
A.
If tuition amounts to $125 plus $150 per credit, the function that would model this situation is y = 150x + 125.
B.
If tuition amounts to $200 plus $175 per credit, the function that would model this situation is x = 175y + 200.
C.
If tuition amounts to $175 plus $150 per credit, the function that would model this situation is y = 175x + 150.
D.
If tuition amounts to $250 plus $275 per credit, the function that would model this situation is x = 250y + 275.
E.
If tuition amounts to $225 plus $200 per credit, the function that would model this situation is y = 200x + 225.
F.
If tuition amounts to $100 plus $125 per credit, the function that would model this situation is y = 125x + 100.
Explanation:
What is a file type and why is it important? Give at least three examples of file
types, including the associated file extension and
program.
Write a loop that subtracts 1 from each element in lowerScores. If the element was already 0 or negative, assign 0 to the element. Ex: lowerScores = {5, 0, 2, -3} becomes {4, 0, 1, 0}.Sample program:#include using namespace std;int main() { const int SCORES_SIZE = 4; vector lowerScores(SCORES_SIZE); int i = 0; lowerScores.at(0) = 5; lowerScores.at(1) = 0; lowerScores.at(2) = 2; lowerScores.at(3) = -3; for (i = 0; i < SCORES_SIZE; ++i) { cout << lowerScores.at(i) << " "; } cout << endl; return 0;}Below, do not type an entire program. Only type the portion indicated by the above instructions (and if a sample program is shown above, only type the portion.)
Answer:
Replace <STUDENT CODE> with
for (i = 0; i < SCORES_SIZE; ++i) {
if(lowerScores.at(i)<=0){
lowerScores.at(i) = 0;
}
else{
lowerScores.at(i) = lowerScores.at(i) - 1;
}
}
Explanation:
To do this, we simply iterate through the vector.
For each item in the vector, we run a check if it is less than 1 (i.e. 0 or negative).
If yes, the vector item is set to 0
If otherwise, 1 is subtracted from that vector item
This line iterates through the vector
for (i = 0; i < SCORES_SIZE; ++i) {
This checks if vector item is less than 1
if(lowerScores.at(i)<1){
If yes, the vector item is set to 0
lowerScores.at(i) = 0;
}
else{
If otherwise, 1 is subtracted from the vector item
lowerScores.at(i) = lowerScores.at(i) - 1;
}
}
Also, include the following at the beginning of the program:
#include <vector>
A connection between files that allows data to be transferred from one file to another is a _______________________.
Answer:
Link
Explanation:
A Link is a term often used in computer application, data, or file management, that allows a user to carry out the operation of transferring data or information from one file to another often referred to as a target.
There are two types of major links, these include Symbolic links and Hard links.
Hence, in this case, A connection between files that allows data to be transferred from one file to another is a LINK
Daiki is creating a database for a paint store. Each color of paint would have its own record which will include the color name price and size. The price of the paint will be in its own a) table b) file c) field d) format
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is c)field.
As we know that the feature of an entity is represented by its attribute in the database table. A database table is a set of records of different fields. Each field represents a row in a database table. Each field can contain a set of attributes related to an entity such as a paint color.
So the price of paint will be in its own field. Because there are different colors in the database table. Each color has its own record in form of a field. As you know that each field is a row in the database table. So, each row has the price of a paint color.
Other options are not correct because:
The table contains a list of fields and each field contains its own paint price. The format and file is something different and does not have any relation with the question scenario.
Answer:
C) Field
Explanation:
I took the test
Consider the use of 1000-bit frames on a 1-Mbps satellite channel with a 270-ms delay. What is the maximum link utilization for,
a. Stop-and-wait flow control?
b. Continuous flow control with a window size of 7?
c. Continuous flow control with a window size of 127?
Write a code for function main, that does the following: creates a variable and assign it the value True. uses a while loop which runs as long as the variable of the previous step is True, inside the while loop, get three integer numbers n1, n2 and n3 from the user and
Answer:
def main():
is_true = True
while is_true == False:
try:
num1 = int(input("Enter first number: ")
num2 = int(input("Enter second number: ")
num3 = int(input("Enter third number: ")
except ValueError:
print("Input must be an integer number")
is_true = bool(input("do you want to end loop? True/False: "))
main()
Explanation:
The python main function above continuously creates three integer numbers in a while loop statement until a false input is received from the user.
Need help with 4.7 lesson practice
Answer: Question 1 is A Question 2 is C
Explanation:
what is suitable equipment to meet customer needs from
1 stand alone pcs
2 networked pcs
3 servers
4 network equipment
5 operating system
6 application software
An IT suspects that an unauthorized device is connected to a wireless network. This is a result of pastry sharing on a device brought from home. What is put in place to stop such activity.
1- Media Access Control Filtering
2- Channel Overlap
3-WiFi Protected Access 2
4- collision Domain
Answer:
3. WiFi Protected Access 2
Explanation:
Given that Wi-Fi Protected Access 2 often referred to as WAP 2 is a form of computer security or privacy measure to ensure that Wireless networks are furnished with powerful security of data network access control.
Hence, when a user employed or utilize WPA2. It gives such a user a high degree of maximum certainty of controlling the users that can have access to his wireless network.
Hence, in this case, what is put in place to stop such activity is Wi-Fi Protected Access 2
Compress
00eb:0000:0000:0000:d8c1:0946:0272:879
IPV6 Address
Answer:
Compress
00eb:0000:0000:0000:d8c1:0946:0272:879
IPV6 Addres
Explanation:
Read the following statements and select the
conditional statements. Check all that apply.
If my car starts, I can drive to work
It is inconvenient when the car does not start.
If my car does not start, I will ride the bus to
work
I purchased this car used, and it is not
reliable
Answer:
if my car does not start, i will ride the bus to work
if my car starts, i can drive to work
Explanation:
Need help with 4.7 lesson practice edhesive
Answer:
Question 4 => 4th answer: The first line should be for x in range (7, 10):
Question 5 => 2nd answer: 14 16 18 20 22 24 26 28 30 32
Explanation:
Question 4
"for" loops always need a variable (like "x") defined to iterate with different values. for x in range (7, 10): makes x to take values 7, 8, 9 and 10 successively and execute print(x) each time.
Question 5
The expression x in range (7, 16) makes x to take values from 7 up to 16 inclusive. So for each iteration it will execute print x*2 which prints the double of the actual value for x. Starting with x=7, it will print 14, then with x=8 will print 16, and so on. All values are shown on the table below:
X Prints
7 14
8 16
9 18
10 20
11 22
12 24
13 26
14 28
15 30
16 32
The code segments are illustrations of loops.
4: The first line should be for x in range(7,10):5: The output is 14 16 18 20 22 24 26 28 30The syntax of a for loop is:
for variable in range (begin,end+1):
The loop in question (4) is given as:
for range (7,10)
This means that, the variable is missing.
So, the first line of the code segment should be
for x in range(7,10):
For question 5, the value of x would range from 7 to 15.
The print statement prints twice x, followed by a space.
So, the output would be 14 16 18 20 22 24 26 28 30
Read more about loops at:
https://brainly.com/question/19323897
The _________ operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segment register.a) TYPEb) SIZEOFc) OFFSETd) LENGTHOFe) PTR
Answer:
C. Offset.
Explanation:
An offset operator can be defined as an integer that typically illustrates or represents the distance in bytes, ranging from the beginning of an object to the given point (segment) of the same object within the same data structure or array. Also, the distance in an offset operator is only valid when all the elements present in the object are having the same size, which is mainly measured in bytes.
Hence, the offset operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segment register.
For instance, assuming the object Z is an array of characters or data structure containing the following elements "efghij" the fifth element containing the character "i" is said to have an offset of four (4) from the beginning (start) of Z.
plsss help me
1)give 2 examples of systems that you use or see in your day-to-day life
Answer:
The modern world has numerous kinds of systems that influence daily life. Some examples include transport systems; solar systems; telephone systems; the Dewey Decimal System; weapons systems; ecological systems; space systems; etc.
What is the name of the setting that creates a Green Dashed line and allows you to set angular locks when activation
Answer:
Polar Tracking
Explanation:
Polar Tracking a term or function in AUTOCAD that is used to identify a point closest to a predetermined angle and define a distance along that angle. This helps creates a line (which is a green dashed line). Thereby enabling a user to set angular locks when or during activation.
Hence, in this case, the correct answer to the question is POLAR TRACKING
Given two integer arrays, largerArray with 4 elements, and smallerArray with 3 elements. What is the result after this code executes?for = 0; i < 45 ++) { LargerArray) = smallerArray(); A. All of the elements of secondArray will get copied to firstArray. B. Error: The two arrays are not the same size. C. All the elements of firstArray will get copied to secondArray D. Some of the elements of firstArray will get copied to secondArray,
Answer:
A. All of the elements of secondArray will get copied to firstArray.
Explanation:
The correct iteration code is:
for(i =0; i<4;++i) {
largerArray[i] = smallerArray[i];
}
From the question, we understand that the largerArray has a size of 4 elements while the smallerArray has a size of 3 elements
Take for instance largerArray is {1,2,3,4} and smallerArray is {5,6,7}
Next, we analyze the loop
1. for(i =0; i<4;++i) { --->This iterates from index 0 to index 3
2. largerArray[i] = smallerArray[i]; ---- > This assigns the elements of the smallerArray to largerArray.
However, it should be noted that the smallerArray has a maximum index of 2 while the largerArray has a maximum index of 3
The content of largerArray after the iteration will be:
largerArray = {5,6,7,5}
This is so because,
When i = 0
largerArray[0] = smallerArray[0] = 5
When i = 1
largerArray[1] = smallerArray[1] = 6
When i = 2
largerArray[2] = smallerArray[2] = 7
When i = 3
largerArray[3] = smallerArray[0] = 5
Notice that the last iteration refers to smallerArray[0]; this is so because index 3 do not exist in smallerArray. Hence, the index will be returned to the first index of the smallerArray
Taking largerArray as the firstArray and smallerArray as the secondArray.
We can conclude that option A answers the question because all elements in smallerArray is copied to firstArray
The long-run average cost curve is typically _______________________. a) downward-sloping at first but then b) upward-sloping upward-sloping at first but then c) downward-sloping always d) downward-sloping always upward-sloping
Answer:
A. downward-sloping at first but then upward-sloping
Explanation:
The long-run average cost curve is typical "downward-sloping at first but then upward-sloping." This can be shown as the long-run average cost curve is graphically represented in a U shape.
The reason is that the long-run average cost of production initially falls as a result of increase returns to scale as output is increased, however, at some stage beyond this certain this, the long-run average cost of production rises because of decreasing returns of scale.
(Decimal to binary) Write a recursive method that converts a decimal number into a binary number as a string. The method header is public static String dec2Bin(int value) Write a test program that prompts the user to enter a decimal number and displays its binary equivalent.
Answer and Explanation:
import java.util.Scanner;
public class convertToBinary {
public static String declToBin(int value){
if(value == 1){
return declToBin((value/2) + "" + (value%2);
}
else{
declToBin((value/2) + "" + (value%2);
}
}
public static void main(String args[]){
int number;
Scanner change = new Scanner(System.in);
System.out.print("Enter decimal value: ");
number = change.nextInt();
System.out.println(declToBin(number));
}
}
The recursive function declToBin(int value) keeps executing code until value==1. Recursive functions reduces lines of code and makes it more efficient.
Note: Decimal is number in base 10(denary). To convert a decimal number to base 2(binary), we keep dividing the decimal number entered by the user by 2 until the result is zero(when the number divided is one)
We use the Java programming language here. First we import the Scanner object(import.java.util.Scanner). We use the method nextint() from the object to convert the string value entered by the user to int value( because our declToBin function takes an int parameter).
Write a program that asks the user to input their first and last names. The first prompt should state:
Please input your first name:
The second prompt should state:
Please input your last name:
After accepting the inputs, your program should output the input in the form last name, first name.
Hint: Remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a comma as well and that the comma must be followed by a space.
first = input("Please input your first name: ")
last = input("Please input your last name: ")
print(last+", "+first)
I hope this helps!
_______________ is a computer networking protocol used by hosts to retrieve IP address assignments.
Answer:
DHCP
Explanation:
stands for dynamic host configuration protocol and is a network protocol used on IP networks where a DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints.
A computer is using a fully associative cache and has 216 bytes of memory and a cache of 64 blocks, where each block contains 32 bytes.
Required:
a. How many blocks of main memory are there?
b. What is the format of a memory address as seen by the cache, that is, what are the sizes of the tag and offset fields?
c. To which cache block will the memory address F8C9 (subscript) 16 map?
1) The number of blocks of main memory that are there are;
2^16/32 = 2^16/2^5 = 2^11
2) The format of a memory address as seen by the cache,that is the sizes of the tag and offset fields are;
16 bit addresses with 11 bits also in the tag field and the 5 bits in the word field.
3) The cache block that the memory address F8C9 (subscript) 16 map;
Since it is an associative cache, it can actually map anywhere.
That is, it has the ability of mapping anywhere.
) Printers today have many features that include improved quality, photo printing capabilities, digital camera connectivity, built-in flash memory card readers, wireless connectivity, and faster speed. Suppose you are in the market for a new personal printer. Make a list of the most important features needed to meet your needs, and then research printers to identify the best printer for your needs. Be sure to consider both the price of the printer and the price of consumables (such as paper and ink/toner) in your evaluation process. (3 marks)
Explanation:
Some of the most important features needed in a printer are:
fast printing speedsupport wireless connectivitysupport colored/uncolored printinginclude improved text quality,improved photo printing capabilitiesBased on market prices available on the Amazon website, a printer with the above capabilities start at a price range of at least $80.
What is a contact position ?
Answer:
the poses that connect the extremes in motion
Explanation:
Individuals who break into computer systems with the intention of doing damage are called _____________.
a. white hats
b. e-criminals
c. hackers
d. keyloggers
e. black hats
The individuals who made the unethical entry into a person's system with intentions of damage are termed, hackers. Thus, option C is correct.
What is a computer system?A computer system has been given as the network connection of the hardware and the software equipped with the objects that are used for the operation of the computer.
The computer system with the internet connection has been able to make the connection to the world. as well the invention mediates the work with ease as well.
The system thereby has the access to the passwords and the personal details of an individual as well. There are individuals who try to make access the computer system in an unethical way and intended to damage the system.
The computer viruses are used for the following purpose and were drawn by the hackers. Thus, option C is correct.
Learn more about the computer system, here:
https://brainly.com/question/14253652
#SPJ2
what are the types of slide show in powerpoint? define.
Answer:
normal view
slide sorter view
master view
notes page view
Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?
To be a digital media coordinator, Claire needs a bachelor’s degree in _______ digital media, or a related field. She also needs to have knowledge of _______ and emerging digital technologies.
1st blank:
psychology
public relations
finance
2nd blank:
computer programming
computer coding
search engine optimization
Answer:
1. Public Relations
2. Search Engine Optimization
Explanation:
Given that a public relations degree holder can work in various capacities such as Advertising, Media, Event, and Sale promotion position. Hence Claire needs a bachelor’s degree in PUBLIC RELATIONS.
Similarly, given that the knowledge of Search Engine Optimization is crucial in Digital media coordination, as it helps to drive and gain web or online traffic both in quality and quantity.
Hence, Claire also needs to know about Search Engine Optimization.
Write a sed command that will display all lines of the birthday file that do not contain the string March. What was the sed command?
Answer:
sed '/march/{d;}' birthdays.txt > result .txt
Explanation:
sed syntax is basically:
sed '/expression/{command;command;...;}' inputfile > outputfile
First, for the expression part, we use /march/ to match all lines containing that string. Then for the command part, we only use {d} command to delete every matching line found.The third part contains the input file to process, I have named it birthdays.txt, but it could have been any other file needed.Finally "> result .txt" makes the script output to be saved into a file named result.txt