Answer:
man this question is really about your personal experience but i'll try my best to answer this
Explanation:
onnline Web Conferencing is used by businesses and now schools who went to online because of the virus. for businesses i learned they use it to present and share with online collaboration on different applications including documents, web sites, data files, video, emails, and reduce the time and cost of business travel for meetings. i understand now that online conferencing can be used for Applications for web conferencing include meetings, training events, lectures, or presentations from a web-connected computer to other web-connected computers.
Allison is writing a program in Java and keeps getting an error. Which line of code is causing the error?
A. Int a = 0, b = 3, c;
B. for(i = 0, i <= 13, i++) {
C. c = (a * 2) + i;
D. System.out.println(c);
}
B will cause an error.
Allison needs to declare a type for variable i and use semi-colons.
The for statement should be for(int i = 0; i <=13; i++){
Write a script that inputs a line of plaintext and a distance value and outputs an encrypted text using a Caesar cipher.
The script should work for any printable characters. An example of the program input and output is shown below:
Enter a message: Hello world!
Enter the distance value: 4
Output: Lipps${svph%
Answer:
def encrypt_text(text,value):
encoded = ""
for i in range(len(text)):
char = text[i]
if (char.isupper()):
encoded += chr"po"ord'po'char'pc' + value -65'pc' % 26 + 65'pc'
else:
encoded += chr'po'ord'po'char'pc' + value -97'pc' % 26 + 97'pc'
return encoded
plaintext = input("Enter sentence of encrypt: ")
dist_value = int(input("Enter number: "))
encrypted = encrypt_text(plaintext, dist_value)
print(encrypted)
Explanation:
The python program above is a Ceasar cipher implementation. The encrypt_text function is defined to accept text input and a distance value, which is used to encrypt the plaintext.
The user can directly input text and the distance value from the prompt and get the encrypted text printed on the screen.
Help me! I’ll mark you brainly and give extra points!
Answer:
52 5,
Explanation:
Shrink-wrap, box-top, and click-wrap agreements are inherent to e-commerce. How you feel about them often depends on whether you are the vendor or purchaser. What are the best practices to assure shrink-wrap, box-top, and click-wrap agreements are legal? What are the best ethical practices that the e-commerce industry should adopt?
Answer:
Shrink-wrap, Box-top, and Click-wrap Agreements
a) The best practices to assure that shrink-wrap, box-top, and click-wrap agreements are legal include
1) having e-commerce terms and conditions separate from the normal trade terms and conditions,
2) ensuring that customers agree to the terms before entering into a transaction, and
3) laying the code of conduct for all visitors interacting with your site or doing any business transaction on your site.
b) The best ethical practices that the e-commerce industry should adopt are:
1) Put additional layers of protection like a web application firewall to their websites.
2) Ensure they always adhere to PCI (Payment Card Industry) compliance guidelines.
3) They should not store customers' data which they do not need.
4) Ensure privacy and security of customers' data.
5) Establish trust by safeguarding intellectual property rights.
6) Consider some environmental issues (customers care about them).
Explanation:
a) Websites' Terms and Conditions (T&C) establish some form of legal contract between the organization and its clients.
b)To ensure that organizations that process, store, or transmit credit card information maintain secure online environment, they are required to comply with PCI DSS. It is a set of Payment Card Industry requirements for all organizations involved in the use of online cards for payment for their goods and services.
Create a new program with a struct, Data, that contains: an int a char[80] Write a function newData(char[]), that takes char[] as a parameter
Answer:
#include <iostream>
#include <cstring>
using namespace std;
struct Data {
int userId;
char name[80];
}
void newData(string data char[]){
int counts= 0;
struct Data name;
data.userId = ++counts;
data.name = char[];
cout<< data.userId << "\n"<< data.name ;
}
int main( ) {
char myName;
string mydata;
cin>> myName;
cin>> mydata;
newData( myName, mydata);
}
Explanation:
The c++ source code above stores its data in a struct called "Data". The function newData dynamically creates new data from the struct defined.
A database has one physical schema and one conceptual (logical) schema but many external schemas (views).
a) True
b) False
Answer:
true
Explanation:
A database has one physical schema and one conceptual (logical) schema but many external schemas (views): a. True.
A database refers to a structured (organized) collection of data that are stored on a computer system and usually accessed in various ways such as electronically.
In database management, a database schema can be defined as a structure which is typically used to represent the logical design of the database. Thus, it denotes how data are stored (organized) and the relationships existing in a database management system (DBMS).
Generally, there are two (2) main types of a database schema and these include;
Physical database schema: it is only one per database.Conceptual (logical) schema: it is only one per database.However, there are multiple number of external schemas (views) for each database because it is what an end user is interested in.
Read more on database here: https://brainly.com/question/3259292
20 pts, please write in JAVA. need this ASAP
In the Lesson Slides for this activity, we developed a method findChar for figuring out if a character was in a String.
The implementation was:
public boolean findChar(String string, String key)
{
for(int index = 0; index < string.length(); index++)
{
String character = string.substring(index,index+1);
if(character.equals(key))
{
return true;
}
}
return false;
}
However, there is a much more efficient and simple algorithm that we can use to determine if a character is in a String. Using the method signature public boolean findChar(String string, String key), figure out a more efficient method with a lower exection count.
Hint: We’ve learned a couple of methods that can tell us what index a character is at - can we use those to determine if the character is in a String?
public class JavaApplication78 {
public boolean findChar(String string, String key){
if (string.contains(key)){
return true;
}
return false;
}
public static void main(String[] args) {
JavaApplication78 java = new JavaApplication78();
System.out.println(java.findChar("hello", "h"));
}
}
First I created the findChar method using the contains method. It checks to see if a certain sequence of characters is in another string. We returned the result. In our main method, we had to create a new instance of our main class so we could call our findChar method.