Answer:
will be
Explanation:
I'm not quite sure but I think that this is the answer for your question
What is hacking? Why is hacking a concern for law enforcement?
Answer:
hacking is the act of exploitation, and is typically used to steal other people's account. It is a major concern because people can easily lose their account to hackers if they're too gullible, and the hacker can use their victims' accounts to purchase the things that they want with their victims' money.
what is IBM 1401 used for? Write your opinion.
Explanation:
The 1401 was a “stored program computer,” allowing programmers to write (and share) applications loaded into the machine from punched cards or magnetic tape, all without the need to physically reconfigure the machine for each task.
discribe two ways to zoom in and out from an image
Option 1: Spread your fingers on your laptop's trackpad.
Option 2: Press Command (or control) and the + sign.
Hope this helps!
Have a wonderful day!
1. Create a pseudocode program that asks students to enter a word. Call a function to compute the different ways in which the letters that make up the word can be arranged.
2. Convert the pseudocode in question one to JavaScript and test your program.
Answer:
1)Pseudocode:-
Prompt user to enter string
Pass it to combination function which can calculate the entire combination and can return it in an array
In combination method -
Check if the string is length 2 size ie of 0 or 1 length then return string itself
Else iterate through string user entered
Get the present character within the variable and check if the variable is already used then skip
Create a string from 0 to i the index + (concatenate) i+1 to length and recursive call combination function and pass this string and store end in subpermutation array
For each recursive call push character + sub permutation in total arrangement array.
2)Code -
function combinations(userStr) {
/* when string length is less than 2 then simply return string */
if (userStr.length < 2) return userStr;
/* this array will store number of arrangement that word can be stored */
var totalArrangements = [];
/* iterate through string user enter */
for (var i = 0; i < userStr.length; i++) {
/* get the current character */
var character = userStr[i];
/*check if character is already used than skip */
if (userStr.indexOf(character) != i)
continue;
/* create a string and concanete it form 0 to i index and i+1 to length of array */
var str = userStr.slice(0, i) + userStr.slice(i + 1, userStr.length);
/* push it to totalArrangments */
for (var subPermutation of combinations(str))
totalArrangements.push(character + subPermutation)
}
/* return the total arrangements */
return totalArrangements;
}
/* ask user to prompt string */
var userStr = prompt("Enter a string: ");
/* count to count the total number of combinations */
let count = 0;
/* call function the return tolal number of arrangement in array */
totalArrangements = combinations(userStr);
/* print the combination in console */
for (permutation of totalArrangements) {
console.log(permutation)
}
/* total combination will be totalArrangements.length */
count = totalArrangements.length;
/*print it to console */
console.log("Total combination " + count)
Output:-
Which of the following expressions would you use to test if a char variable named choice is equal to "y" or "Y"? a. choice.tolower = "y" || "Y" b. choice.tolower = "y" c. tolower(choice) = "y" d. tolower(choice) = "y" || "Y"
Answer:
choice.tolower == "y"
Explanation:
The tolower method is a string method in c# that converts all characters in a string to lowercase characters(if they are not already lowercase letters) except special symbols which remain the same example "#" symbol.
The tolower method does not take any arguments, therefore to use it, we simply chain it to our string variable(dot notation) and use a comparison operator "==" that evaluates to true or false based on whether the values returned on both sides are equal.
In C, for variables of type int we use %i as the format specifier in printf and scanf statements. What do we use as the format specifier for variables of type float, if we want to output the floating point value, showing 3 decimal places?
Answer:
variable with a leading sign, three fractioned digits after the decimal point
What will be the pseudo code for this
Answer:
Now, it has been a while since I have written any sort of pseudocode. So please take this answer with a grain of salt. Essentially pseudocode is a methodology used by programmers to represent the implementation of an algorithm.
create a variable(userInput) that stores the input value.
create a variable(celsius) that takes userInput and applies the Fahrenheit to Celsius formula to it
Fahrenheit to Celsius algorithm is (userInput - 32) * (5/9)
Actual python code:
def main():
userInput = int(input("Fahrenheit to Celsius: "))
celsius = (userInput - 32) * (5/9)
print(str(celsius))
main()
Explanation:
I hope this helped :) If it didn't tell me what went wrong so I can make sure not to make that mistake again on any question.
How do l write a program which countdown from 10 to 3
Answer:
use loop
for(int i =10;i>2; i--)
{
System.out.println(i+"\n")
}
explain how data structures and algorithms are useful to the use of computer in data management
Answer:
programmers who are competent in data structures and algorithms can easily perform the tasks related to data processing ,automated reasoning ,or calculations . data structure and algorithms is significant for developers as it shows their problems solving abilities amongst the prospective employers .
Give one example of where augmented reality is used
Answer
Medical Training
From operating MRI equipment to performing complex surgeries, AR tech holds the potential to boost the depth and effectiveness of medical training in many areas. Students at the Cleveland Clinic at Case Western Reserve University, for example, will now learn anatomy utilizing an AR headset allowing them to delve into the human body in an interactive 3D format.
it is also use in retail ,. Repair & Maintenance,Design & Modeling,Business Logistics etc
1011 0110 10102 = ?16
Answer:
B6A
Explanation:
I think you want to convert binary to hex.
Hexadecimal or "hex" is a numbering system which uses 16 different numerals. We saw that decimal used ten numerals from 0 to 9. Hex expands on this by adding six more, the capital letters A, B, C, D, E and F.
0...1...2...3...4...5...6...7...8...9...A...B...C...D...E...F
Steps to Convert Binary to Hex
1. Start from the least significant bit (LSB) at the right of the binary number and divide it up into groups of 4 digits. (4 digital bits is called a "nibble").
2.Convert each group of 4 binary digits to its equivalent
hex value .
3.Concatenate the results together, giving the total hex number.
Mobile computing is growing in importance each and every day, and the IT manager must take that into account. Do some web research and develop a one-page description of the five most important things about HCI of mobile computing that the IT manager should know.
Answer:
phone grows everyday 82 percent
Explanation:
Imagine Frankie has a computer with a full hard drive. She needs to create and save a new document, so she deletes a bunch of old files, then writes and saves the document. Describe how the OS interacts with the disk to allow the new file to be written.
Answer:
Explanation:
In a situation like this, the OS erases the files from its core, and saves the document in its files compartment
The hard drive on Frankie's computer is completely full. In this case, the OS deletes the files from its core and saves the document in its files' compartment because it has to produce and save a new document.
What is a document?Everybody has a distinctive signature, and signatures are crucial in proving that a person actually signed a document and accepted its terms.
An operating system (OS) is the program that controls all other application programs in a computer after being installed into the system first by a boot program.
Through a specified application program interface, the application programs seek services from the operating system (API)
Therefore, the OS will erase the file from the scratch and save it in a different folder.
To learn more about the document, refer to the below link:
https://brainly.com/question/14980495
#SPJ2
Part 1 - Write the ingredients list to a file (10 points) Modify the program you developed for Lab 5 to make it output the data in the same format to a text file cake_ingredients_list.txt Note: Writing to a file is easier to code, so let's do that first. Hints: After the file has been opened, call the .write() function to write one line at a time to the file, in almost the exact fashion as calling print
Answer:
Explanation:
I do not have access to the ingredients list so instead I created the list and added the ingredients needed to make a cake. Then I used a for loop to loop throught the ingredients in the list and the .write() method to write the data to a text file with the same name as in the question. The code was tested and the output to the file can be seen in the attached image below.
ingredients = ['sugar', 'butter', 'eggs', 'vanilla', 'flour', 'baking powder', 'milk']
file = open('cake_ingredients_list.txt', 'w')
for ingredient in ingredients:
file.write(ingredient + '\n')
Develop a c program to display the following input output interphase enter a number 5
The table of 5 is
5*1=5
5*2=10
Answer:
int main()
{
int number;
printf("Enter a number: ");
scanf_s("%d", &number, sizeof(number));
for (int i = 1; i <= 2; i++) {
printf("%d*%d=%d\n", number, i, number * i);
}
}
Explanation:
I used the safe scanf_s() that takes a third parameter to indicate the size of the buffer. In this case it is the size of an integer.
hi, please help me, please help me.
Write a pseudocode method swap(aList, i, j) that interchanges the items currently in positions i and j of a list. Define the method in terms of the operations of the ADT list, so that it is independent of any particular implementation of the list. Assume that the list, in fact, has items at positions i and j. What impact does this assumption have on your solution
Answer:
Explanation:
The following pseudocode for this method using operations of the ADT list would be the following
swap(aList, indexI, indexJ) {
initialize temp_variable = Retrieve(indexI, aList)
Insert(Retrieve(indexJ, aList), indexI, aList)
Insert(Retrieve(indexI, aList), temp_variable, aList)
}
This code basically saves the aList index of i , into a temporary Variable. Then it sets the aList index of i to the value of the element in index of j. Then it does the same for the index of j with the tem_variable. If we assume that the indexes of i and j exist, then it can crash our entire program if those indexes are missing from the list when we try to access them.
The term __________ denotes data that is being stored on devices like a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server. The term __________ denotes data that exists in a mobile state on the network, such as data on the Internet, wireless networks, or a private network. A. data in transit, data on record B. data at rest, data in transit C. data in transit, data at rest D. data on record, data in motion
Answer:
B. data at rest, data in transit
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to effectively and efficiently create, store, modify, retrieve, centralize and manage data or informations in a database. Thus, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Generally, a database management system (DBMS) acts as an intermediary between the physical data files stored on a computer system and any software application or program.
Data at rest refers to a form of data that is stored on devices such as; a universal serial bus (USB) thumb drive, laptop, server, DVD, CD, or server.
Data in transit is simply any data that exists in a mobile or dynamic state on the network, such as data on the Internet, wireless networks, or a private network.
How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50
Answer:
Create boxes with the following content
Initialize sum to 0, product to 1 and number to 1Check if number is a prime. If yes, update sum += number and product *= numberIncrease number by 1If number is <= 50, go back to "check" block.The check block has a diamond shape.
At the "yes" branch of the check block, you can create separate blocks for updating the sum and the product.
Connect the blocks using arrows.
Indicate the start and the end of the flow using the appropriate symbols.
The block to check if a number is a prime you could further decompose into the steps needed to do such a check.
You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue.
a. False
b. True
Changing the resolution should work, it’s most likely true. :)
You connect another monitor to your machine and the image is coming up distorted or blurry. Adjusting the resolution of the external monitor could resolve the issue is the true statement.
What is meant by resolution?In order to cover the cost of the pixels on the horizontal and vertical axes, resolution is the total number of pixels individual points of colour on a display monitor.
The size of the monitor and its resolution affect how sharp an image appears on a display.
Thus, the statement is true.
For more details about resolution, click here:
https://brainly.com/question/14307212
#SPJ2
A security administrator is reviewing the following information from a file that was found on a compromised host: Which of the following types of malware is MOST likely installed on the compromised host?
A. Keylogger
В. Spyware
C. Trojan
D. Backdoor
E. Rootkit
Answer:
C. Trojan
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
In this scenario, a security administrator is reviewing the following information from a file that was found on a compromised host: "cat suspiciousfile.txt."
Some of the ways to prevent vulnerability in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
An engineer is writing above the HTML page that currently displays a title message in large text at the top of the page . The engineer wants to add a subtitle directly underneath that is smaller than the title but still longer than most of the text on page
<!DOCTYPE html>
<html>
<body>
<h1>Heading or Title</h1>
<h2>Sub heading or sub title</h2>
</body>
</html>
This will be the html code for the given problem.
cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]
Answer:
please translate
Thank you✌️
e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}
Explanation:
double e-d/5.6;is wrong it should return to c
In regard to segmentation, all of the following are examples of a customer's behavior or relationship with a product EXCEPT: a) user status. b) loyalty status. c) usage rate. d) demographics
Answer: demographics
Explanation:
Market segmentation refers to the process of dividing the consumers into sub-groups of consumers which are refered to as the segments based on the characteristics shared.
The examples of a customer's behavior or relationship with a product include user status, usage rate and loyalty status.
It should be noted that some examples of market segmentation are behavioral, demographic, geographic, and psychographic. From the options given, demographics is not an example of a customer's behavior with a product.
Binary search is a very fast searching algorithm, however it requires a set of numbers to be sorted.
a. True
b. False
Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
Answer:
gzvzvzvzbxbxbxb
Explanation:
hshzhszgxgxggdxgvdvsvzvzv
5. When you send your email to a bad address it may come back as a:
spam email
server email
bounced email
hypertext email
SAVE & E
Answer:
The answer is a bounced email
Write a program that generates an array filled up with random positive integer
number ranging from 15 to 20, and display it on the screen.
After the creation and displaying of the array , the program displays the following:
[P]osition [R]everse, [A]verage, [S]earch, [Q]uit
Please select an option:
Then, if the user selects:
-P (lowercase or uppercase): the program displays the array elements position and
value pairs for all member elements of the array.
-R (lowercase or uppercase): the program displays the reversed version of the
array
-A (lowercase or uppercase): the program calculates and displays the average of the
array elements
-S (lowercase or uppercase ): the program asks the user to insert an integer number
and look for it in the array, returning the message wheher the number is found and
its position ( including multiple occurences), or is not found.
-Q (lowercase or uppercase): the program quits.
NOTE: Until the last option (‘q’ or ‘Q’) is selected, the main program comes back at
the beginning, asking the user to insert a new integer number.
Answer:
#include <iostream>
#include <cstdlib>
using namespace std;
const int MIN_VALUE = 15;
const int MAX_VALUE = 20;
void fillArray(int arr[], int n) {
// fill up the array with random values
for (int i = 0; i < n; i++) {
arr[i] = rand() % (MAX_VALUE - MIN_VALUE + 1) + MIN_VALUE;
}
}
void displayArray(int arr[], int n) {
for (int i = 0; i < n; i++) {
cout << i << ": " << arr[i] << endl;
}
}
void main()
{
int myArray[10];
int nrElements = sizeof(myArray) / sizeof(myArray[0]);
fillArray(myArray, nrElements);
displayArray(myArray, nrElements);
char choice;
do {
cout << "[P]osition [R]everse, [A]verage, [S]earch, [Q]uit ";
cin >> choice;
choice = toupper(choice);
switch (choice) {
case 'P':
displayArray(myArray, nrElements);
break;
}
} while (choice != 'Q');
}
Explanation:
Here's a start. Now can you do the rest? ;-)
Where does change management play a major role in transforming a client
business into a data-driven, intelligent enterprise?
To manage a modern IT environment characterized by hybrid complexity and exponential data growth — and to make that same IT a driver of growth and innovation for the business — you need to build intelligence into every layer of your infrastructure.
Change management plays a major role in transforming a client business into a data-driven, intelligent enterprise in: data culture and literacy.
Data culture and literacy refer to all the processes involved in analyzing and understanding data within the framework of an organization.
The employees within such organizations are trained to read and understand data. It becomes a part of the organization's culture.
So data culture and literacy should be used when trying to transform a client business into a data-driven, intelligent enterprise.
Learn more about data culture here:
https://brainly.com/question/21810261