Answer:
Your answer should be C
because in they will protect the data base from virus.
write down the multiples of three from 474 to 483
Answer:
474, 477, 480, 483
hope this helps
have a good day :)
Explanation:
What are the characteristic features of TFTP?
Answer:
TFTP Server is used for simple file transfer
Explanation:
Example
boot-loading remote devices
Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should her friend give
Answer:
"The game shouldn't need your SSN to be playable; don't enter it."
Explanation:
The game shouldn't need your SSN to be playable; don't enter it."
What is SSN?A numerical identification code known as a Social Security number (SSN) is given to residents and citizens of the United States in order to track income and calculate benefits.
As a component of The New Deal, the SSN was established in 1936 to offer benefits for retirement and disability. The SSN was first created to track earnings and offer benefits. Today, it is also utilized for other things including tracking credit reports and identifying people for tax purposes.
In the US, people are required to provide their SSN in order to open bank accounts, apply for government benefits, get credit, make large purchases, and more.
Therefore, The game shouldn't need your SSN to be playable; don't enter it."
To learn more about SSN, refer to the link:
https://brainly.com/question/2040269?
#SPJ5
Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a program that generates random numbers until the sum of the random number's digits divides the random number without remainder. assembly language
Answer:
Explanation:
The following Python program has a function called addDigits which takes a number as a parameter and returns the sum of the digits. Then the program creates a loop that keeps creating random numbers between 222 and 1000 and divides it by the value returned from the function addDigits. If the remainder is 0 is prints out a statement and breaks the loop, ending the program. The picture below shows the output of the program.
import random
def addDigits(num):
sum = 0
for x in str(num):
sum += int(x)
return sum
sum = addDigits(random.randint(222, 1000))
while True:
myRandomNum = random.randint(2, 99)
if (sum % myRandomNum) == 0:
print("No remainder between: " + str(sum) + " and " + str(myRandomNum))
break
SummaryIn this lab, you complete a partially written C++ program that includes a function named multiplyNumbers() that multiplies two int values to find their product.Three ints should be passed to the multiplyNumbers() function, the two numbers to be multiplied (num1 and num2) should be passed by value, and another int (product) to hold the product of the two numbers should be passed by reference, enabling the multiplyNumbers() function to change its value.The source code file provided for this lab includes the necessary variable declarations and input and output statements. Comments are included in the file to help you write the remainder of the program.Instructions:Open the source code file named MultiplyTwo.cpp using the code editor.Write the multiplyNumbers() function, the function declaration, and the function call as indicated by the comments.Execute the program by clicking "Run Code."Rewrite the multiplyNumbers() function to pass the two numbers (num1 and num2) by value and to pass product by address.Execute the program. It should generate the same output.// MultiplyTwo.cpp - This program calculates the product of two numbers.// It demonstrates pass by reference and then pass by address.// Input: None// Output: The product of two numbers#include using namespace std;// Write function declaration hereint main(){int num1 = 10;int num2 = 20;int product = 0;// Print value of product before function callcout << "Value of product is: " << product << endl;// Call multiplyNumbers using pass by reference for product// Print value of calculated productcout << num1 << " * " << num2 << " is " << product << endl;return 0;} // End of main function// Write multiplyNumbers function here; use pass by reference for result of multiplication. Then use pass by address.
Answer:
Declare the method prototype using:
void multiplyNumbers(int x, int y,int &product);
Call the function using:
multiplyNumbers(num1, num2,product);
Lastly, the method is as follows:
void multiplyNumbers (int x, int y,int &product) {
product = x * y;
return; }
Explanation:
Declare the method prototype using
void multiplyNumbers(int x, int y,int &product);
Call the function using
multiplyNumbers(num1, num2,product);
The method is as follows; the & written in front of product implies that product is passed by reference
void multiplyNumbers (int x, int y,int &product) {
This calculate the product
product = x * y;
This returns nothing
return; }
See attachment for complete program
Give a name of the part responsible for memorising a cell phone number
cerebrum
Explanation:
it controls all voluntary actions and also controls all the higher thought processes such as memory, judgement and reasoning
how do computers help us with our homework
xD I don't know if you said this as a joke, or if you're serious, but here:
A computer can be a helpful tool to complete your homework by giving you access to countless sources of information, it can also provide you with educational games which can enhance a child's learning ability by presenting learning as something fun and interactive as opposed to boring loads of repeated work which barely stimulate learning at all. But keep in mind that a computer can also take the opposite effect on a child's brain, and can gradually turn into addiction.
I hope this helps! :D
(FYI, I spent an unreasonable amount of time typing this all in, so I hope it makes any difference at all :P)
What is blockchain in detail?
What is blockchain?
✯ AnswerBlockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. It is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems.
❄❄❄❄❄❄❄hope this helps you !!
enjoy your day
◕ ◡ ◕
Where do I look for a deep learning mentor who can assist me in my career?
The answer:
You have to pay for it man!
Explanation:
You can find a lot of services from Fiverr and Upwork etc. But that would need to pay a lot for it.
According to the Gabriela Colman talk, one of the main hackers in Anonymous was a(n) ____________________ agent.
Answer: FBI agent
Explanation:
According to Gabriela Colman talk, 4chan was the imageboard that Anonymous was organized on. According to Gabriela Colman, Anonymous had many faces.
According to the Gabriela Colman talk, one of the main hackers in Anonymous was also a FBI agent.
Advancements in technology often make computer
hardware and software more convenient to use as
well as able to fit a variety of budgets. As
technology advances, it usually gets
smaller and less expensive.
larger and more expensive.
Answer: smaller and less expensive.
Explanation:
As technology advances, the architects of the devices that we use are getting more efficient in the production of said devices such that they are using better materials and techniques in production.
This has led to a situation where devices are increasingly getting smaller in size and cheaper to afford as well. For instance, compare the computers of today to those of the 90's. We have laptops now which are really slim and cost a fraction of what the bulky computers of those days cost.
write a program to input a character (ch)convert the character into its opposite case. print the entered character in the new character the program should reject if the elector entered is not an alphabet A to z or a to z your program should continue as long as the user wants.
[tex]write \: in \: java [/tex]
Answer:
import java.util.Scanner;
import java.lang.*;
class Main {
public static void main(String[] args) {
boolean exit = false;
Scanner reader = new Scanner(System.in);
while(!exit) {
char c = '?';
while( !Character.isLetter(c)) {
System.out.print("Enter a letter or * to exit: ");
c = reader.next().charAt(0);
if (c == '*') {
exit = true;
break;
}
if (!Character.isLetter(c)) {
System.out.printf("Error: %c is not a letter!\n", c);
}
}
if (Character.isLowerCase(c)) {
System.out.printf("%c in uppercase is %c\n", c, Character.toUpperCase(c));
} else if (Character.isUpperCase(c)) {
System.out.printf("%c in lowercase is %c\n", c, Character.toLowerCase(c));
}
}
reader.close();
}
}
Explanation:
I decided to use the asterisk (*) as exit character.
Digital collaboration tools can ensure that clients are able to record their
requests or issues. This would be particularly important to people working in
which field?
A. Science and engineering
B. Customer service
C. Human resources
D. Internet and media
Answer:
Option B, Customer service
Explanation:
People working in customer service industry continuously record their conversation with the customer for future references. These recordings are used to tally order placed, issue raised or help seeked so that maximum customer satisfaction can be ensured.
Hence, option B is correct
Peter wants to make sure his code is going to work. He has Sally act as the computer mentally checking each step and its results for the entire set of computer instructor. Sally is performing a ________.
A) Inspections
B) Walk-throughs
C) Desk check
D) Unit test
The fact that Sally act as the computer by mentally checking each step means she's performing B. walk throughs.
What is a computer?A computer simply means an electronic machine that's important to make one's work easier and faster.
In this case, the fact that Sally act as the computer mentally checking each step means she's performing the walk throughs.
Learn more about computer on:
https://brainly.com/question/24540334
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs. Group of answer choices
The term [tex]\sf\purple{digital \:convergence}[/tex] refers to the use of a single unifying device that handles media, internet, entertainment, and phone needs.
[tex]\large\mathfrak{{\pmb{\underline{\red{Happy\:learning }}{\orange{.}}}}}[/tex]
In the header element, insert a navigation list containing an unordered list with the items: Home, Race Info, and FAQ. Link the items to the dr _index.html, dr_info.html, and dr_ faq.html files respectively.
Home
Race info
FAQ
Answer:
Explanation:
The following is a barebones HTML document that contains the Unordered List inside the header tag as requested. The list items are also wrapped around links so that they link to the requested pages and take you there when they are clicked. These html files need to be in the same folder as this code in order for it to take you to those pages. The code can be seen below.
<!DOCTYPE html>
<html>
<head>
<ul>
<li><a href="dr _index.html">Home</a></li>
<li><a href="dr_info.html">Race Info</a></li>
<li><a href="dr_ faq.html">FAQ</a></li>
</ul>
</head>
<body>
</body>
</html>
Topic: Graphs.1.) Bob loves foreign languages and wants to plan his courseschedule for the following years. He is interested in the followingnine language courses: LA15, LA16, LA22, LA31, LA32, LA126, LA127,LA141, and LA 169. The course prerequisites are.i.) LA15: (None)ii.) LA16: LA 15iii.) LA22: (None)iv.) LA31:LA 15v.) LA32:LA16, LA31vi.) LA126: LA22, LA32vii.) LA127: LA 16viii.) LA141:LA22, LA 16ix.) LA 169: LA32.Find the sequence of courses that allows Bob to satisfy allthe prerequisites.
Answer:
LA15; LA22
LA16; LA31; LA32
LA169; LA126;
LA127; LA141
Explanation:
Given
[tex]Courses: LA15,\ LA16,\ LA22,\ LA31,\ LA32,\ LA126,\ LA127,\ LA141,\ LA 169.[/tex]
Required
Course sequence to satisfy the prerequisite
From the course prerequisite, we have:
[tex]1.\ LA15 \to None[/tex] and [tex]3.\ LA22 \to None[/tex]
This means that LA15 and LA22 are the base courses, and they have no prerequisite. So, we have:
[tex][LA15; LA22][/tex]
LA16 and LA31 have LA15 as their direct course prerequisite. So, the sequence becomes
[tex][LA15 \to [LA16, LA31]; LA22][/tex]
To complete the sequence, we read each course and place them other their prerequisite.
See attachment for complete tree
From the tree, we have the sequence to be:
LA15; LA22
LA16; LA31; LA32
LA169; LA126;
LA127; LA141
For a processor with primary caches only, an instruction cache miss rate of 1%, a data cache miss rate of 5%, a instruction mix of 30% data accesses, and a cache miss penalty of 80 cycles, what will be the contribution to total CPI from the cache misses
Answer:
2
Explanation:
Instruction cache miss rate = 1% = 0.01
Data cache miss rate = 5% = 0.05
data access Instruction mix = 30% = 0.3
Cache miss penalty = 80 cycles
Determine the contribution to total CPI from the cache misses
Assume cache access time = 1 clock cycle
CpI ( average ) = 1 + (0.01 * 0.7 + 0.05 * 0.3) * 80 = 2.76
∴ contribution to total CPI from cache miss = 2.76 - 0.76 = 2
What lets you do many things, like write book reports and stories?
Application Programs
Antivirus Software
Email
Duct Tape
name the box where the name of the first cell of the selected range appears?
i need help i would be happy if u helped
Answer:
Name box
Explanation:
From the picture, the name box is at the top left corner with B1 written inside, here B1 is written because it is the active cell at the time which also happens to be the first cell of the selected range. The name box can be used to easily create a named ranges rather Than having to draw the mouse over a group of cells. It also helps to know which cell is the current active cell as the cell address in the name box is the active cell at any point in time.
A generic information systems planning methodology that identifies and defines IS development projects based upon solving operational business problems or taking advantage of some business opportunities defines:______.a. democratic planning.b. bottom-up planning.c. top-down planning.d. foundation planning.
Answer:
Option b (bottom-up planning ) is the correct approach.
Explanation:
This kind of planning gives clients additional emphasis to their program since a greater amount of individuals are participating, that every single person has its unique knowledge, which is termed as Bottom-up planning.it is always a positive thing promoting morality since it promotes the engagement of employees towards company strategy.All other three alternatives aren't connected to the given query. So the above would be the correct solution.
There are several types of software development methods, but almost all of them are based on the ________ model.
Answer:
Waterfall
Explanation:
The waterfall model development strategy may be classed as a flexible design architecture exhibiting a linear operational sequence with each phase being largely dependent on the preceeding phase. Each phase of the waterfall has clearly defined task ; usually starting with the requirement phase where use cases and required docs are gathered, then the design, which caters for the software architecture, the the implementation (which is the main software build) followed by verification and maintainance.
We can see that the waterfall method is sequential and not extremely complex as it follows an entirely linear process.
which is the best monitor and why?
Answer:
dksjnejknfkjssjhflkjZfijthajwhj
Explanation:
fjnskjenkjnewkjnfkjs
Suppose you joined a company that had a WAN composed of SONET, T carrier, and frame relay services, each selected to match a specific network need for a certain set of circuits. Would you say this was a well-designed network
Answer:
Colts, gan 8 This depends on depends on How suitable the varbus technolog. A axe fol the Applicationd Supporlds Today, increasingly Network...
Consider the following statements, taken from three different Jack programs. In each one of these programs, the identifier foo represents a different thing: let x = 5 + foo - a // program 1. Here foo represents a simple variable. let y = foo[12] - 3 // program 2. Here foo represents an array. let z = 2 * foo.val() // program 3. Here foo represents an object. Suppose that we are parsing any one of these statements (we don’t know which), and that the current token is foo. What kind of parser do we need to determine if we have a simple variable, an array reference or a method call?
Answer:
instanceOf
Explanation:
The parser that would be best suited for this scenario would be the instanceOf keyword, which is part of the javaParser class. This keyword allows you to check if a variable is a simple variable, an array reference or a method call through an IF statement. If it is equal to the compared type it will return a boolean value of True, otherwise it will return False. This keyword is used in Java and Javascript to check the type of the variables in scenarios such as this one.
what are the process of boots up a computer?
Answer:
The process of boot-up a computer are: Power On, POST, Load BIOS, Operating system load, and transfer of control to the OS.
Answer:
» Switch on the power from the power source.
» The power supply sends electric signals to the motherboard.
» The BIOS performs the POST ( Power On Self Test)
» The CMOS chip loads configurations in the RAM
» The kernel of the operating system loads files in the hard disk.
» The operating system loads the welcome screen, where the computer varifies the user to see if he or she is a legitimate user through a password.
» Load the desktop.
Discuss the impact of Python and other open source programming languages on electronic health records and the health care industry. What are the advantages of using open-source programming
Answer:
Explanation:
Python itself has had an enormous impact on all types of industries including the health care industry. This is mainly due to its ability to easily implement data analysis techniques and artificial intelligence. These combined allow developers to implement artificial intelligence that analyzes large sets of data to pinpoint interesting patterns, which can save lives and detect at-risk individuals using health care records. This is all made possible because it is an open-source language. This means that anyone can use it without having to pay for it. This basically allows anyone to build amazing new features and software without having to worry about gathering the money to pay for licensing fees.
Azzam is reviewing a paper he just wrote about kinetic friction for his physics class. On the third page, he realizes that every time he wrote "coefficient of friction," he should have written "coefficient of kinetic friction." He uses the Find and Replace tool and clicks on "Replace All" to fix the issue, but then when prints out the paper, he sees "coefficient of friction" in the first paragraph. What is most likely the reason why the phrase was not fixed? Azzam used Find and Replace instead of the Spell Checker. O Azzam clicked "Replace All" instead of "Replace." O Azzam used the tool while he was on the third page. Azzam did not set up the proper printing options.
Answer: Azzam used the tool while he was on the third page
Explanation:
The most likely the reason why the phrase was not fixed is because Azzam used the tool while he was on the third page.
This can be infered from the information given when we're told that he uses the Find and Replace tool and clicks on "Replace All" to fix the issue with regards to the error that he made and thus was done from the third page. Therefore, the tool might not have worked for the first page.
state the function of a URL in a website
Answer:
It's purpose is to access a webpage.
Explanation:
A URL contains detailed information on the webpage such as, the domain name, protocol, and path. This information directs the browser to the desired page.
A network engineer is troubleshooting a newly deployed wireless network that is using the latest 802.11 standards. When users access high bandwidth services such as streaming video, the wireless network performance is poor. To improve performance the network engineer decides to configure a 5 Ghz frequency band SSID and train users to use that SSID for streaming media services. Why might this solution improve the wireless network performance for that type of service
Answer:
it will make the wireless network faster and it is a performance network i am pretty sure.
Explanation: