If you position the key next to the subject so it shines from the side what type of effect will you create

Answers

Answer 1

Answer:

side lighting because it will reflect light to the side of the subject


Related Questions

Hacker Rank - Disk Space Analysis
C# solution for HackerRank's Disk space analysis challenge.
Example
For following array [2, 5, 4, 6, 8] with x = 3, the answer is 4 see below
The chunks would be:
[2, 5, 4] -> min: 2
[5, 4, 6] -> min: 4
[4, 6, 8] -> min: 4

Answers

For following array [2, 5, 4, 6, 8] with x = 3, the answer is 4.

What is C#?

You pronounce C# as "C-Sharp."

It is a Microsoft-developed object-oriented programming language that utilizes the.NET Framework.

C# is related to other widely used languages like C++ and Java and has roots in the C family.

In 2002, the initial version was made available. In November 2021, C# 10, the most recent version, was released.

What is Disk Space Analysis?

A disk space analyzer, also known as a storage analyzer, is a program that scans your computer and creates a report outlining everything that uses disk space, including videos, saved files, installation files for programs, and more.

The chunks would be:

[2, 5, 4] -> min: 2

[5, 4, 6] -> min: 4

[4, 6, 8] -> min: 4

(1) In this case we just need to compare current number with prev. found minimum, hence code below

s.Push(space[i] < space[peek] ? i: peek);

The prev. found minimum is NOT part of current chunk

(2) In this case we have to loop through current chunk to find the minimum

s.Push(i);

var j = chunkNum;

var count = 0;

while (count++ < x)

{

   if (space[j] < space[s.Peek()])

   {

       s.Pop();

       s.Push(j);

   }

   j++;

}

(3) Find the maximum between found minimums, thanks to LINQ, it is dead easy

s.Select(c => space[c]).Max();

Learn more about C# click on this link:

https://brainly.com/question/20211782

#SPJ4

partcipate in workplace meeting and discussions​

Answers

Aser:

Explanación:

para tu rspuesta tiens que explicar que participar en reuniones no es solo discuciones solo aprender de la pregunta

Ned has presented you with the following table. The table is for a project that wants to compare nicknames people use in videogames (“handles”) with the ages of the player. There are hundreds of rows in the table, and the table will be widely shared. Propose three distinct changes Ned could make to improve the quality of the table’s presentation and make it more useful, and explain how or why the changes would improve the table.

An Excel spreadsheet is displayed. The column A represents name values (ex: A1 value is "name", A2 value is "Stan", A3 value is "Peggy", A4 value is "Dan".). The column B represents age values (B1 value is "age", B2 value is "15", B3 value is "18", B4 value is "12".). The column C represents years playing value (C1 value is "years playing", C2 value is "5", C3 value is "1", C4 value is "2".). The column D represents handle value (D1 value is "handle", D2 value is "IStanforJustice", D3 value is "Ace4Life", D4 value is "LiketobuytheWorld".). E is represented as an empty column with some of D's handle values overflowing over E's cells.

Answers

The distinct changes that Ned could make to improve the quality of the table’s presentation and make it more useful are:

The values (figure) should be place in the rows.The names (all) should be place in the column.Like terms should follow each other in the column so that there will be no mix up.

Where can I use Excel?

Excel is most frequently utilized in professional contexts. It is utilized, for instance, in operations management, performance reporting, human resource management, and business analysis. Excel uses a sizable group of prepared cells to arrange and edit data as well as perform mathematical operations.

Note that Microsoft created the spreadsheet application. Excel allows you to perform mathematical operations and arranges data in columns and rows. Windows, macOS, Android, and iOS are all supported. The first version was released in 1985 and has undergone numerous alterations since then.

Hence, starting Excel Presentation made easy includes:

Getting online template to use. Give your worksheets proper names.Clarify your header and title.Font dos and don'ts. ...Make room so you have breathing room, etc.

Learn more about excel presentation from

https://brainly.com/question/24749457
#SPJ1

The latest web application, using default settings, is currently accepting application programming interface (API) calls over HyperText Transfer Protocol (HTTP). The environment has a moderate key management system. Even with basic server security, the API connection is vulnerable to which of the following?

Answers

The latest web application, using default settings, the API connection is vulnerable to option A and B:

Key DiscoveryImproper Error handlingDescribe an API connection.

Application Programming Interface, or API, is a software bridge that enables two applications to communicate with one another. You use an API every time you send a text message, check the weather on your phone, or use a social media app like Face book.

Therefore, note that When a user receives an error message that contains information about how a website or application functions, improper error handling has occurred.

Learn more about API connection from

https://brainly.com/question/28090326?source=archive
#SPJ1

Key Discovery

Improper Error handling

Resource exhaustion

Denial of service (DoS)

Amplification?

What did this command do?
mv ../* .cpp .
(In linux ubuntu)

Answers

Using the knowledge in computational language in linux it is possible to write a code that located in different directories and  files matching that glob exist.

Writting the code:

# REPLACES: mv /data/*/Sample_*/logs/*_Data_time.err /data/*/Sample_*/logs/*_Data_time_orig.err

for f in /data/*/Sample_*/logs/*_Data_time.err; do

 mv "$f" "${f%_Data_time.err}_Data_time_orig.err"

done

# REPLACES: cp /data/*/Sample_*/scripts/*.sh /data/*/Sample_*/scripts/*_orig.sh

for f in /data/*/Sample_*/scripts/*.sh; do

 cp "$f" "${f%.sh}_orig.sh"

done

# REPLACES: sh /data/*/Sample_*/scripts/*_orig.sh

for f in /data/*/Sample_*/scripts/*_orig.sh; do

 if [[ -e "$f" ]]; then

   # honor the script's shebang and let it choose an interpreter to use

   "$f"

 else

   # script is not executable, assume POSIX sh (not bash, ksh, etc)

   sh "$f"

 fi

done

See more about linux at brainly.com/question/1512214

#SPJ1

----is emerging as the most significat response to the demands of individual learning

Answers

Answer:

The most significant response to the demands of individual learning is the development of personalized learning.

Write a program to find 40%, 50%
and 60% of the input number.

Answers

inp = int(input("Enter a number: "))

print("%40 of this number is",(2*inp)/5,"\n%50 of this number is",inp/2,"\n%60 of this number is",(3*inp)/5)

Write a C++ program to generate the multiplication table of a number (entered by
the user) using While Loop

Answers

#include <iostream>

int main(int argc, char* argv[]) {

   int number, c=1; std::cin>>number;

   while(c<11) {

       std::cout << number << "x" << c << "=" << number*c << std::endl;

       c++;

   }    

   return 0;

}

Computers are used more extensively than ever for tasks such as banking,
investing, shopping and communicating. Do you see this trend as having a
positive or a negative impact on our society and economy? Give reasons to
support your answer.

Answers

More people than ever utilize computers for everyday functions including banking, investing, shopping, and chatting. I think that this trend is having a negative effect on our society and economy. I think so because although our lives have been made easy by the computer doing such tasks for us, in later years technology will be so advanced that we wouldn't even have to lift a finger to do anything and if something happens to the computers who are doing our tasks for us, our bodies and minds won't be able to have the same strength it once had when these tasks were done manually by us. Even the jobs of many will be lost and there will be a lot of poverty if these computers take over the jobs of people doing these tasks manually. These are my reasons for this trend having a negative impact on our society and economy.

How has technological advancement affected our world?

Our world and way of life have undergone a transformation thanks to technology. In addition, technology for seniors has produced incredible tools and resources that have put practical information at our fingertips.

Multipurpose devices like smartphones and smartwatches are now possible thanks to modern technology. Nowadays, computers are more powerful, portable, and faster than ever. Along with all of these breakthroughs, technology has contributed to making our lives easier, faster, better, and more fun.

To learn more about technology, use the link given
https://brainly.com/question/25110079
#SPJ1

Assume planets is an ArrayList of Strings and it currently contains several elements. Also assume a String variable named first has been declared. Write a statement that will assign the first element of the ArrayList to the first variable.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Assume planets is an ArrayList of Strings and it currently contains several elements.

Writting the code:

ArrayList<Integer> intList=new ArrayList<Integer>();

   intList.add(1);

   intList.add(2);

ArrayList<String> strList=new ArrayList<String>();

   strList.add("Terra");

   strList.add("Marte");

   strList.add("Venus");

See more about JAVA at brainly.com/question/12975450

#SPJ1

Can you explain the process for this problem please.

num = 120

while num > 0:

digit = num % 10

print(digit, end='')

num //= 10

Answers

Answer:

Looks like a number reverser

Explanation:

The loop copies the last digit, prints it, then removes it by dividing by 10.

Prepare an algorithm and draw a corresponding flowchart to complete the sum and product of all prime numbers between 1 and 50

Answers

Using the knowledge in computational language in python it is possible to write a code that Prepare an algorithm and draw a corresponding flowchart to complete the sum and product of all prime numbers between 1 and 50.

Writing the code;    

using Lisp GNU Common Lisp (GCL) GCL 2.6.12  

Distributed under the GNU Public License. See the file COPYING.  

Dedicated to the memory of William Schelter.  

The function bug_report() provides bug reporting information.  

(%i1) primep(45);  

(%o1)  false  

(%i2) primep(11);  

(%o2)  true  

(%i3) primep(31);  

(%o3)  true  

(%i4)  

#!/usr/bin/env luajit

local bit = require("bit")

local band, bxor = bit.band, bit.bxor

local rshift, rol = bit.rshift, bit.rol

local m = tonumber(arg and arg[1]) or 100000

if m < 2 then m = 2 end

local count = 0

local p = {}

for i=0,(m+31)/32 do p[i] = -1 end

io.write(string.format("Found %d primes up to %d\n", count, m))

See more about python at brainly.com/question/12975450

#SPJ1

Suppose we want to put an array of n integer numbers into descending numerical
order. This task is called sorting. One simple algorithm for sorting is selection sort.
You let an index i go from 0 to n-1, exchanging the ith element of the array with
the maximum element from i up to n. Using this finite set of integers as the input
array {4 3 9 6 1 7 0}:
i. Perform the asymptotic and worst-case analysis on the sorting algorithm
been implemented. (AN)10 marks
ii. Write or draw all the iterations in the selection sort process on the
array.(AP)5 marks
iii. Write a java or C++ code implementing the algorithm.

Answers

The following C++ code will display all iterations of the selection sort process on the array:

Step-by-Step C++ Code:

#include <stdio.h>

#include <stdlib.h>

int main() {

int i, tempA, tempB;

  int string2[16] = { 0, 4, 2, 5, 1, 5, 6, 2, 6, 89, 21, 32, 31, 5, 32, 12 };

  _Bool check = 1;

  while (check) {

      tempA = string2[i];

      tempB = string2[i + 1];

      if (tempA< tempB) {

          string2[i + 1] = tempA;

          string2[i] = tempB;

          i = 0;

      } else {

          i++;

          if (i = 15) {

              check = !check;

          }

      }

  }

 return 0;

}

To know more about C++ programming, visit:

brainly.com/question/20339175

#SPJ9

Suppose, you have to develop a system for a garments owner. He had two garments located in Mirpur and Savar. Now for financial problems, he dosed one and now he has one garments located in Savar. There are three types of clothing in the system- summer clothing, winter clothing and spring clothing. Summer clothing is made out of cotton and has an average weight of 60 grams. Winter clothing has an average weight of 95 grams and is made out of wool. Silk is used to make spring clothing, which has an average weight of 75 grams.
Now, using appropriate design pattern(JAVA), create a Garments class from which client code can request clothing by mentioning type of fabrics or by mentioning the name of season.

Answers

Here is the samle code for a Garments class from which client code can request clothing by mentioning type of fabrics or by mentioning the name of season.

public abstract class Garments

{

private String size;

private String color;

private String fabric;

public Garments(String Size, String Color)

{

   this.size = size;

   this.color = color;

}

public String getSize()

{

   return this.size;

}

public String getColor()

{

   return this.color;

}

public String getFabric()

{

   return this.fabric;

}

What is Class in Programming?

A class is a fundamental building block in object-oriented programming. It is a template that describes the data and behavior associated with the instantiation of a class. Instantiating a class means creating an object (variable) of that class that can be used to access the class's member variables and methods.

A class is also known as a logical template because it is used to create objects that share common properties and methods.

An Employee class, for example, may contain all of the employee details in the form of variables and methods. When the class is instantiated, that is, when an object of the class (say e1) is created, we can access all of its methods and properties.

To learn more about Class in Programming, visit: https://brainly.com/question/14078098

#SPJ1

Without using parentheses, enter a formula in C4 that determines projected take home pay. The value in C4, adding the value in C4 multiplied by D4, then subtracting E4.

HELP!

Answers

Parentheses, which are heavy punctuation, tend to make reading prose slower. Additionally, they briefly divert the reader from the core idea and grammatical consistency of the sentence.

What are the effect of Without using parentheses?

When a function is called within parenthesis, it is executed and the result is returned to the callable. In another instance, a function reference rather than the actual function is passed to the callable when we call a function without parenthesis.

Therefore, The information inserted between parenthesis, known as parenthetical material, may consist of a single word, a sentence fragment, or several whole phrases.

Learn more about parentheses here:

https://brainly.com/question/26272859

#SPJ1

Can anyone help me in this question pls?...

Answers

Your characters need to be at least

8
What is a serial advanced technology attachment (SATA) cable used for?
O A.
to connect storage devices to the motherboard
to connect RAM to the CPU
to connect the heat sink to the motherboard
OB.

Reset
Next

Answers

SATA is used to know how data is transferred

What is SATA?

Hard disc drives (HDDs), optical drives, and solid-state drives are examples of mass storage devices. Serial ATA (Serial Advanced Technology Attachment, or SATA) is a command and transport protocol that outlines how data is transferred between a computer's motherboard and these types of mass storage devices (SSDs).

features of SATA:

Serial SATA controller hardware, which also controls data flow, is used to link HDDs and SSDs to a computer's motherboard. The hard disc may be detected as a PATA device when SATA is in IDE mode. Performance is compromised, but the arrangement makes it easier to use with older technology.

Performance is improved when a SATA controller is set to Advanced Host Controller Interface (AHCI) rather than IDE mode. The hot switching of discs and external interfaces is supported by AHCI. Both AHCI capabilities and RAID data security features are supported by the RAID mode.

Hence to conclude using SATA we can increase the performance

To know more on SATA please follow this link

https://brainly.com/question/29035982

#SPJ9

Choose the correct term to complete the sentence
A ____ has function that allow you to appendleft and pop left.
O Deck
O amplified list
O deque
O list

Answers

What do you mean by deque?

Image result for deque

Deque is a data structure that inherits the properties of both queues and stacks. Additionally, the implementation of this data structure requires constant time, i.e., time complexity = O(1). This means you can use deque to your advantage to implement both the queue and stack.

What does the #NULL error in a cell mean?

There are plus signs in the formula.
The value is multiplied by zero.
The value is close to zero.
The answer does not exist.

Answers

Answer:

The answer does not exist

Explanation:

Other guy is wrong lol

The #NULL error in a cell mean there are plus signs in the formula. Thus, option A is correct.

What happens when file opens?

If we try to open a file for reading when that file does not exist, we will get an error message. For example, in Java we will encounter a FileNotFoundException as in the code below:

try {

FileInputStream fis = new FileInputStream("myFile.txt");

DataInputStream dis = new DataInputStream(fis);

BufferedReader br = new BufferedReader(new InputStreamReader(dis));

String str = null; while ((str = br.readLine()) != null) {

If the file myFile.txt does not exist we can expect to see an exception stack trace corresponding to FileNotFoundException. Procedural programming is a type of computer programming language that specifies a series of well structured steps and procedures  within its development period of time.

It contains a systematic order of statements, functions and commands to complete a computational task or program. It is centered on creating procedures.

Therefore, The #NULL error in a cell mean there are plus signs in the formula. Thus, option A is correct.

Learn more about programming on:

https://brainly.com/question/3224396

#SPJ2

The university student registration system is unable to cope with the high volume of telephone calls received at registration time. An online student registration system needs to be developed.


1. Perform a system investigation and analyze the system to determine the requirements (operational, functional, hardware, software, input, process, output, etc.) for such a system. (everything required in written no software will use)

Answers

The university student registration system is unable to cope with the high volume of telephone calls received at registration time. Among others, busy signals and long distance charges are inherent problems of the telephone registration system.

An online student registration system needs to be developed. In addition, students on campus, off campus, in-state, out of state, and out of country can easily and inexpensively take advantage of many of the services provided by the Office of the Registrar, which today require users to be on campus during business hours.

What is System investigation

System Investigation is the process of finding out what the system is being built to do and if the system is feasible. I

t is the process of finding out what the system is being built to do and if the system is feasible. This will help gain an understanding of the technical resources of the organization and their applicability to the needs of the system.

System Analysis and Design - Overview:

Systems Analysis:

It is a procedure for gathering and analyzing data, determining the issues, and breaking down a system into its constituent parts.

System analysis is done to investigate a system or its components in order to pinpoint its goals. It is a technique for solving problems that makes the system better and makes sure that all of its parts function effectively to serve their intended purposes.

Analysis lays out the system's proper course of action.

Systems Design:

Planning a new business system or replacing an existing system involves defining its modules or components to meet the necessary requirements. Prior to making any plans, it is essential to have a thorough understanding of the current setup and decide how to make the most effective use of computers.

To know more about System investigation, visit: https://brainly.com/question/14682150

#SPJ9

Which are behaviors to avoid in the computer classroom? Select 3 options.
Responses

Answers

The three examples of behaviors to avoid in the computer classroom include the following:

drinking a soda. changing the cords connected to the computer. opening emails from strangers.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

Monitor screenMouseKeyboardMotherboardSpeakers.Hard-disk drive

In a computer classroom, it is very important for all students to avoid taking or drinking any form of drink such as soda, water, etc., because it could spill on the computer hardware and damage it or cause electrocution. Additionally, students should avoid opening email sent by strangers and changing the cables (cords) that are used for computer connections.

Read more on computers here: brainly.com/question/14614871

#SPJ1

Complete Question:

Which are behaviors to avoid in the computer classroom? Select 3 options.

drinking a soda

changing the cords connected to the computer

treating others the way you would like to be treated

opening emails from strangers

Hacker Rank - Disk Space Analysis
C# solution for HackerRank's Disk space analysis challenge.
Example
For following array [2, 5, 4, 6, 8] with x = 3, the answer is 4 see below
The chunks would be:
[2, 5, 4] -> min: 2
[5, 4, 6] -> min: 4
[4, 6, 8] -> min: 4

Answers

For following array [2, 5, 4, 6, 8] with x = 3, the answer is 4.

What is C#?

You say "C#" instead of "C-Sharp."

It is an object-oriented programming language made by Microsoft that makes use of the.NET Framework.

C# has origins in the C family and is connected to other widely used languages like C++ and Java.

The first iteration was released in 2002. The most recent version of C#, version 10, was released in November 2021.

What is Disk Space Analysis?

An application called a disk space analyzer, also referred to as a storage analyzer, scans your computer and generates a report listing every file that uses disk space, including videos, saved files, program installation files, and more.

The chunks would be:

[2, 5, 4] -> min: 2

[5, 4, 6] -> min: 4

[4, 6, 8] -> min: 4

(1) In this case we just need to compare current number with prev. found minimum, hence code below

s.Push(space[i] < space[peek] ? i: peek);

The prev. found minimum is NOT part of current chunk

(2) In this case we have to loop through current chunk to find the minimum

s.Push(i);

var j = chunkNum;

var count = 0;

while (count++ < x)

{

  if (space[j] < space[s.Peek()])

  {

      s.Pop();

      s.Push(j);

  }

  j++;

}

(3) Find the maximum between found minimums, thanks to LINQ, it is dead easy

s.Select(c => space[c]).Max();

Learn more about C# click on this link:

https://brainly.com/question/28184944

#SPJ4

Suppose you work for a company that has just hired a new senior vice president. After reviewing the budgets of all departments, the new VP went on record saying that the amount of money spent on cybersecurity is too large in proportion to the size of the company. She recommends an immediate 23 percent reduction in the cybersecurity budget. she has decided on this amount after informal conversations with other companies that have about the same number of employees. However, these other companies perform completely different functions: one company is in manufacturing while the other is a service organization, neither of which is the same as your company. The new VP says she will retract her recommendation if someone can prove that there have been no significant attacks due to the money spent on cyber defenses and not just because your company is unattractive to threat actors

Answers

Spending on cybersecurity is critical for any business. The cybersecurity budget must be sufficient to keep unauthorized users from stealing the company's assets and sensitive data.

What is cyber security about?

Cyberattacks are becoming more common and sophisticated, and the cost of these targeted attacks, whether hardware or software-based, can be devastating for any company.

However, there is no hard and fast rule for determining how much should be spent on cyber defenses; it depends on the sensitivity of data stored in databases, the amount of data that must be shared among business units, the type of firm (e.g., manufacturing or service), and so on.

I recommend that this VP consider key performance indicators (KPIs) such as the number of data breaches, phishing attacks, and similar occurrences, as well as the cost of investigating, removing threats, and restoring/replacing. These figures are published by the FBI and are available on the internet. They may, however, define cyber security spending differently than your organization, which may skew the results.

Learn more about cyber security on:

https://brainly.com/question/28004913

#SPJ1

Write a client program and server program. The server uses a socket connection to allow a client to supply a filename and the server will send the file contents to the client or an error message if the file does not exist. The client will create a new file with the same contents. The client will supply the filename "input.txt" to the server and create as it's output "output.txt". Don't ask the user for these names. These files will be located in the top level folder of your project.. The Server sends whatever file the Client requests. Don't put "input.txt" in the Server. The client must get the contents from the Server. It must not read input.txt directly.
Do not use a path name when opening the files. I'll have it in the folder
2 classes, Server and Client

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that  server uses a socket connection to allow a client to supply a filename and the server will send the file contents to the client or an error message if the file does not exist.

Writting the code:

import java.io.*;

import java.net.*;

class Server { public static void main(String args[]) throws Exception { String fileName; String sentence = "Thank you ! Received your data ..."; ServerSocket welcomeSocket = new ServerSocket(6789); Socket connectionSocket = welcomeSocket.accept(); // Receiving from client BufferedReader inFromClient =new BufferedReader(new InputStreamReader (connectionSocket.getInputStream())); fileName = inFromClient.readLine(); System.out.println("Filename from server: " + fileName); try { File file = new File(fileName); if (file.exists()) { BufferedReader br = new BufferedReader(new FileReader(file)); String st, out=""; DataOutputStream outToClient=null; while ((st = br.readLine()) != null) { out += st; } outToClient = new DataOutputStream(connectionSocket.getOutputStream()); outToClient.writeBytes(out); } else { System.out.println("The file client requested is not found !"); } } catch (IOException ioe) { System.err.println(ioe); } connectionSocket.close(); welcomeSocket.close(); } }

See more about JAVA at brainly.com/question/12978370

#SPJ1

Which network configuration would be typical of a private deployment model?

A) IP address: 10.0.0.20
B) IP addresses: 10.0.0.20 and 54.238.123.12

Answers

A network configuration would be typical of a private deployment model is: A) IP address: 10.0.0.20.

What is an IP address?

In Computer technology, an IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a network device such as a computer, website or other network devices such as routers, switches, etc., in order to successfully differentiate them from one another in an active network system.

In Computer networking, the internet protocol (IP) address comprises two (2) main versions and these include;

Internet protocol version 4 (IPv4).Internet protocol version 6 (IPv6).

In this scenario, the IP address: 10.0.0.20 is an internet protocol (IP) address which most likely represent a private deployment model that can be used in homes.

Read more on IP address here: brainly.com/question/13590517

#SPJ1

Write an algorithm to find the cube of odd numbers and square of even numbers
from 1 to n where n is provided by user.

Answers

Using the knowledge of computational language in C++ it is possible to write a code that Write an algorithm to find the cube of odd numbers and square of even numbers from 1 to n where n is provided by user.

Writting the code:

#include<stdio.h>

int main (){

int limit;

scanf(“%d”, limit);

for(int i=1,i<=limit,i++){

if(i%2 ==1){

printf(“Cube of %d is %d”,i,i*i*i);

}

if(i%2==0){

printf(“Square of %d is %d”,i,i*i);

}

}

return 0;

}

See more about C++ at brainly.com/question/29225072

#SPJ1

50 POINTS, PLEASE HELP
When President Obama proposed increasing the minimum wage, he argued that a minimum-wage worker today should earn the same amount of money in real terms as a minimum-wage worker in 1979. But why pick 1979? Why not go back to 1938, the first year of the minimum wage? Why not 1999? For each of the years listed below, calculate what the minimum wage would be today if it had kept up with inflation since that year. Today, the minimum wage is $7.25 and the consumer price index (CPI) is 256. (Round your answer to two decimal places.)

Year minimum wage CPI wage today adjusted for inflation
1938 $0.25 14 ?
1979 $2.90 69 ?
1999 $3.80 127 ?

Answers

The minimum wage is highest is 1979 $2.90 69 if it had kept up with inflation since that year.

What is minimum wage?

A minimum wage is the lowest salary that businesses are legally permitted to pay their employees—the price floor below which employees are not permitted to sell their labour. By the end of the twentieth century, most countries had implemented minimum wage legislation. Companies frequently try to bypass minimum wage legislation by hiring gig workers, shifting labour to places with lower or nonexistent minimum wages, or automating job tasks because minimum wages increase the cost of labour. The minimum wage movement began as a means to prevent sweatshop workers from being exploited by employers who were deemed to have unfair negotiating power over them.

To learn more about minimum wage
https://brainly.com/question/26699459

#SPJ1

Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.

Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop
Sample Output
What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

Answer:

int counter = 0;
String userInput = "";
while (userInput != "stop") {
print "What pet do you have? ";
userInput = readInputLine();
if (userInput != "stop" ){
counter = counter + 1;
print "\nYou have one ";
print userInput;
print ". Total # of Pets: ";
print counter;
}
}

Explanation:

not sure what programming language you use, therefore the answer is pseudocode but it should give you an idea how to implement a piece of code for this problem.
Also, from the way you described the exercise I'm not sure if you always are supposed to reply with "you have one" + the pet or if you should count how often the same pet was entered.

Write pseudo code that reads 100 numbers and outputs the largest , smallest and
the average of the numbers input.

Answers

Using the knowledge in computational language in pseudocode it is possible to write a code that reads 100 numbers and outputs the largest , smallest and the average of the numbers input.

Writting the pseudocode:

int ave_of_100_numbers(){

int sum = 0;

for(int i = 0; i < 100; ++i){

sum += arbitrary_number;

}

return sum/100;

}

See more about pseudocode at brainly.com/question/18502436

#SPJ1

Case Study: Let's consider you are a Pentester, and you have now the task to perform a penetration test, both for intrusion detection and prevention. Consider any type of attack or intrusion, for example, a man-in-the-middle attack or SQL injection, and perform the penetration test together or individually for intrusion detection and prevention, employing 7 phases of penetration testing.

Guideline: You can assume that an intrusion detection and prevention mechanism is already implemented, however, you have to highlight or mention that mechanism, and perform the penetration testing.

Answers

Highlighting the points on the mechanism, penetration testing:

How to perform penetration testing for intrusion detection?

The following exercises are part of the security analyst exercises and intrusion detection system penetration testing:

Snort Intrusion Detection Using KFSensor Honeypot IDS for Intrusion Detection,

A lightweight intrusion detection tool called Snort logs and examines packets as they pass through the network. Snort compares the incoming packets to the user-written rules and generates alerts if any matches are discovered.

KFSensor is a Windows honeypot and an intrusion detection system in one. The term "honeypot" refers to its goal of attracting and identifying all network hackers. It achieves this by simulating a vulnerable system and disguising itself as a server.

So, the mechanisms are achievable by simulating system and identifying it as a server

Hence to conclude Intrusion detection systems are performed  using penetration testing

To know more on penetration testing follow this link:

https://brainly.com/question/28412839

#SPJ1

Other Questions
The american public grew increasingly aware of the political influence of corporations as?. Which part of Earth experiences physical weathering? (1 point)O crustO mantleO inner coreO outer core0AO Why is mathematics an important tool for scientist? For the given reaction, what volume of O would be required to react with 6.2 L of NO, measured at the same temperature andpressure?2 NO(g) + O(g) 2 NO(g) Suppose weve written a function drawcircle that we want to call every time the mouse is clicked. How can we do this?. What is a biosphere What is the most likely reason the film adaptation changes this scene so that general zaroff shoots arrows at rainsford and his companion?. X = 1/3 Y = 3/5 Z = 2 1/4Work out the value of X x Y x ZGive your answer as a fraction in its simplest form. Find an expression for d so the line that passes through (a, b) and (c, d) has a slope of 1/2 Can someone help mePls precursors of peptide neurotransmitters are synthesized in the _______ and packaged into vesicles in the _______. Approximately how many children will NOT tell about sexual abuse?A. 1/2B. 1/4C. 3/4 In the united states for the year 2020, the federal government had a ________ so the national debt was ________. painful swelling, partly due to accumulation of gas, and rapidly spreading subcutaneous tissue necrosis is characteristic of a wound infection by: group of answer choices clostridium tetani. streptococcus pyogenes. mycobacterium leprae. clostridium perfringens. bacillus anthracis. true or false? a hospital offers a coupon in the newspaper for a free heart-healthy assessment for individuals over age 60 for 2 weeks after opening the new heart center. this is an example of a sales promotion strategy. total revenue is question 4 options: a) the price of a good divided by the amount of the good sold. b) the price of a good times the quantity of the good that is sold. c) the price effect times the quantity effect. d) total sales less total cost. 8. Why can a + 100 not be factored using difference of squares? please help!!! when the demand for a country's currency falls, the currency will . a.) have inflationary results at home b.) be more valuable to foreigners c.) appreciate d.) depreciate the director is responsible for shaping the structure of the production through movement, pace, and rhythm. with this in mind, the faults most often associated with poor direction are blank . multiple select question. if the auteur director's concept of the production is flawed failure to establish a clear rhythm that holds or maintains interest when the audience fails to understand what is going on when the audience repeatedly misses the words being spoken assume that each of 2000 frogss living near a nuclear power plant is exposed to particles of a certain kind of radiation at an average rate of one per week. suppose that each hit by a particle is harmless with probability 1 - 10-5 , and produces a tumor with probability 10-5 . find the approximate distribution of