What uses clickstream data to determine the efficiency of the site for the users and operates at the server level?.

Answers

Answer 1

Answer:

Website traffic analytics

Explanation:


Related Questions

estefan is a network professional for an e-commerce company. the chief information officer (cio) wants the customer web portal downtime to be reduced from 5 minutes per year to 30 seconds per year. the change should occur over the next 6 months. which security objective must estefan employ to accomplish this goal? question 1 options: nonrepudiation authorization authentication availability g

Answers

Kind of security objective that estefan must employ to accomplish this goal is availability.

Security Objectives are the goals the patron establishes for his or her safety program. Without safety objectives, they do now no longer recognize what they're attempting to perform for safety and consequently will now no longer attain any goals. The U.S. Department of Defense has promulgated the Five Pillars of Information Assurance version that consists of the safety of confidentiality, integrity, availability, authenticity, and non-repudiation of consumer data. The CIA triad refers to a records safety version made of the 3 important components: confidentiality, integrity, and availability. Each element represents an essential goal of records safety.

Learn more about Security Objective at https://brainly.com/question/9978854

#SPJ4

you're the new systems administrator for a consulting firm, and you've been tasked with implementing an appropriate vpn option. the firm has salespeople and technicians spread out across the united states. you need to develop a vpn solution that will allow these users to remote into their network drive to upload various reports and data. because your users are so spread out, there's no easy way to hold a training for them. you want to reduce the number of help desk support calls regarding the vpn, so you need to create a solution that makes everything seamless and easy for your users. you decide to implement a vpn that's triggered only when the user opens the remote desktop connection application. this will allow your users to connect to the internet normally and shouldn't require extra steps to start the vpn or switch networks on the remote desktop connection application. you're working on a powershell script that users can run to enable and configure the app-triggered vpn. which powershell command enables the split tunneling option?

Answers

The  powershell command enables the split tunneling option is  Get-VPNConnection command

How can split tunneling be enabled?

Usually, enabling split tunneling is very simple. Here is how to go about it: All you have to do is choose Split tunneling in your VPN's Settings or Options. From there, it ought to provide you with choices to control your VPN connection for each individual program or URL.

Note that the  Split tunneling is a computer networking technique that enables a user to simultaneously access networks with different levels of security, such as a public network (like the Internet) and a local or wide area network, using the same or different network connections.

Hence, To enable split tunneling on the desired VPN Connection, type "Set-VPNConnection" -Name "Connection Name" -SplitTunneling $True and that is the The PowerShell VPN Split Tunneling Technique.

Learn more about powershell command   from

https://brainly.com/question/19340527
#SPJ1

which answer below describes what i am doing in the incident response process: what specifically happened? what was the entry point? what local computers/networks were affected? what remote computers/networks were affected? personnel interviews on scene response initial evaluation incident reporting

Answers

An entry point in a computer program is the section of the code where the program's execution starts and where it has access to command-line parameters.

What is meant by entry point?

An entry point in a computer program is the section of the code where the program's execution starts and where it has access to command-line parameters. The loader or operating system hands control to the entry point of a program to begin execution. The change from load time to run time is signaled by this.

An entry point is the point where code that is unable to inject its dependencies using Dagger can obtain objects given by Dagger. It marks the beginning of the introduction of code into the Dagger-managed object graph.

Therefore, the correct answer is option c) initial evaluation.

To learn more about entry point refer to:

https://brainly.com/question/28499342

#SPJ4

what are functions of modulation in music? (select all that apply.) multiple select question. create variety maintain a key keep instruments in tune provide contrast

Answers

The function  of modulation in music is used to help music to more effectively evoke a mood.

Kinds of modulation in music are Diatonic Common Chord. Altered Common Chord. Enharmonic Modulation the use of Mm7 Chord. Modulation effects are a selected class of audio effect (FX). The extrade from one key to another; also, the method with the aid of using which this variation is added about. Modulation manner a essential aid for kind in tonal music, specially in large forms. A brief piece which includes a song, hymn, or dance may also stay in a unmarried key. Modulation may be defined because the method of converting keys or the end result of the extrade in keys. Modulation takes locations inside a composition or a motion of a composition.

Learn more about modulation music at https://brainly.com/question/11105073

#SPJ4

developers and customers create use-cases to help the software team understand how different classes of end-users will use functions. a. true b. false

Answers

Developers and customers create use cases to aid the software team to understand how multiple groups of end-users will use functions. Thus, the given statement is true.

What are use cases?

Use cases define the users' interaction with the system with a progressive sequence of actions. Use cases provide a visual representation of how users use different functionalities of a system or website. Use cases can be represented both as graphically and textually. Use cases present different behaviors of a system under various scenarios that may be encountered when a user uses the system, such as successive scenarios, failure scenarios, and any critical exceptions or violations.

In simple words, use cases provide a structure to express functional requirements of a system and define the sequence of actions that yields specific outcomes as a result of using those functionlities of the system.

You can learn more about use cases at

https://brainly.com/question/12975184

#SPJ4

What would be the data type of "Number"+str(14)?

A string
An integer
It would produce an error

Answers

Answer:

string but see below.

Explanation:

Depending on the language, it would produce a string in most languages I know. More precisely it would convert an integer into a string that would be attached to the string "number". If it works for you, I would put a space between the r in number and the " mark. But you may want it to read as "Number14.

Iuanyware is a ________ application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

Answers

What is meant by IUanyWare?

Iuanyware is a service application that is designed to run within a computer browser such as firefox, chrome, opera, or edge.

What is meant by IUanyWare?

All IU staff, faculty, and students have access to IUanyWare. You may stream the IU-licensed apps and software you need from anywhere, on any device, without having to download, install, or utilize a VPN for each one.

While IUanyWare enables you to stream your program from a web browser or mobile app, IUware lets you install software straight to your hard drive.

Iuanyware is a service program made to function inside of a web browser like Firefox, Chrome, Opera, or Edge.

IUanyWare exists a service available to all staff, faculty, and students at IU. No matter where you exists or what device you're utilizing, you can stream the IU-licensed apps and software you required— without containing to install each one or utilize a VPN.

To learn more about IUanyWare refer to:

brainly.com/question/17493537

#SPJ4

what type of ids is beneficial for detecting all suspicious traffic that deviates from the well-known baseline and is excellent at detecting when an attacker probes or sweeps a network?

Answers

Kinds of IDS that is beneficial for detecting all suspicious traffic is called a stateful IDS.

An Intrusion Detection System (IDS) means a monitoring system that detects suspicious activities and generates alerts when they are detected. Based upon these alerts, a security operations center (SOC) analyst or incident responder can investigate the issue and take the appropriate actions to remediate the threat. IDS is used to send an alert immediately when it identifies any activity in the system. It recognizes various security incidents.

Learn more about IDS at https://brainly.com/question/29038449

#SPJ4

my web server logs give the 5-tuple for each web connection. specifically, the web server log includes the time of the web request, the 5-tuple, and the web page requested. can i use this log format to determine the web downloads made by user with ip address 192.168.2.3?

Answers

Yes, you can. The 5-tuple can be described as the five items (columns) that each rule (row, or tuple) in a firewall policy uses to define whether to block or allow traffic: source and destination IP, source and destination port, and protocol.

The 5-tuple well-known as quintuple. The tuple can be described as a 5-tuple are contain the source IP address, source port, destination IP address, destination port, and transport protocol. In phyton, tuples are used to store multiple things in a single variable. A tuple is one of 4 built-in data types in Python used to store collections of data, the other 3 are List, Set, and Dictionary, all with different qualities and usage. A tuple is a collection that is required and unchangeable.

You can learn more about The 5-tuple at https://brainly.com/question/20982723

#SPJ4

How is the aperture speed of three hundred and twentieth of a second displayed on a camera?

Answers

The aperture speed of three hundred and twentieth of a second displayed on a camera is known to be one that the shutter seen in your camera will be open for about three hundred and twentieth of a second of a second.

How is the shutter speed shown?

The diameter of the aperture stop is referred to as the "aperture" in photography (sometimes known as the "f-number") (the stop that determines the brightness in a photo at an image point). Contrarily, shutter speed refers to the overall amount of time the camera's shutter is open.

Therefore, Always express shutter speed in seconds or fractions of seconds. For instance, a single number with a quote mark or the letter "s" at the end, such as 1′′ or 1s, is often used to indicate a shutter speed of one second.

Learn more about  aperture speed from

https://brainly.com/question/13972212

#SPJ1

The aperture speed of three hundred and twentieth of a second is displayed on a camera as  [tex]f[/tex]/ 320.

What is aperture speed?

Aperture speed means how wide the aperture slot is. It's the diameter of the aperture slot. It also intensifies the amount of light that reaches the sensor of the camera.

There are two things displayed on the camera, the aperture speed is written as  [tex]f[/tex] and the number. The other is the shutter speed, which is written as; if the speed is supposed three hundred and twentieth of a second. Then it will be written as 1 / 320.

Therefore, on a camera, the aperture speed is shown as  [tex]f[/tex] / 320, or three hundred and twentieth of a second.

To learn more about aperture speed, refer to the below link:

https://brainly.com/question/28959586

#SPJ1

suppose the source port of the dns request from the recursive dns server, as well as the id field, is completely random. what is the ratio for the attacker to succeed if the attacker only sends out one fake dns response whose destination port and id are randomly selected?

Answers

There are 3: 1 ratio for the attacker to succeed in the battle, his forces should be at least three times the force of the defender. This somewhat vague statement has resulted in numerous interpretations and discussions from historical and military science points of view.

The force ratio can be described as to be the enemy total combat power divided by the friendly total combat power. In the current method, the staff assigns combat power indices (potentials) to each unit. The indices are connect to a base unit of 1. Traditionally it is accepted that a defending force has a 3:1 advantage over an attacker. A defending force can hold off three times its own number of attackers.

You can learn more about The force ratio at https://brainly.com/question/15726547

#SPJ4

write a function call with arguments tensplace, onesplace, and userint. be sure to pass the first two arguments as pointers. sample output for the given program: tensplace

Answers

Function call with arguments tensplace, onesplace, and userint.
#include <stdio.h>
void SplitIntoTensOnes(int* tensDigit, int* onesDigit, int DecVal){
 *tensDigit = (DecVal / 10) % 10;
 *onesDigit = DecVal % 10;
 return;
}
int main(void) {
 int tensPlace = 0;
 int onesPlace = 0;
 int userInt = 0;
 userInt = 41;
 SplitIntoTensOnes(&tensPlace, &onesPlace, userInt);
 printf("tensPlace = %d, onesPlace = %d\n", tensPlace, onesPlace);
 return 0;
}

What is function?
A function is a group of connected claims that together carry out a mathematical, analytic, or evaluative activity. Python functions are easy to define and crucial for programming at the intermediate level. The same standards apply to variable names and function names. The objective is to define a function by grouping together a few often performed actions. We can call the function and reuse the code contained within it with different variables rather than repeatedly writing the same code block for different input variables. User-defined or built-in functions are the two main categories of functions. It helps maintain the software condensed, unique, and well-structured.

To learn more about function
https://brainly.com/question/18521637
#SPJ4

Complete Question
Write a function call with arguments tensPlace, onesPlace, and userInt. Be sure to pass the first two arguments as pointers. Sample output for the given program: tensPlace = 4, onesPlace = 1

write a complete c program where you create a user defined function that calculates the circumference of a circle. the user has the option to provide the diameter or the radius of the circle.

Answers

The program is given below in C++ with a user defined function to calculate circumference of a circle.

#include <iostream>

#define PI 3.14

using namespace std;

void Cal_Crcmfrnc(float); // function prototype

int main()

{

   float radius;  // declaring variable

   cout<< "Enter Radius : ";   // prompting for input

   cin>> radius;  //

   Cal_Crcmfrnc(radius); // function call

   return 0;

}

void Cal_Crcmfrnc(float rds)  // function definition

{

   float crcumference;  //declaring variable

   crcumference = 2 * PI * rds;   // calculating circumference

   cout<< "Circumference of the Circle :  " << crcumference;  //displaying  output

}

Here, in the attachment the complete program with output is provided.

You can learn more about C++ Functions at

https://brainly.com/question/24172315

#SPJ4

An operating system uses available storage space on a startup drive for _____. Select all that apply.

Answers

The operating system and individual apps are stored on the hard drive so that they do not need to be loaded from discs every time the machine is turned on.When necessary, these programs are retrieved from the HDD and loaded into RAM.

Where on a computer is the operating system generally stored?

The operating system is often kept on the hard drive, but you can also load it from a CD or USB disk. The computer's operating system (OS) controls all of the hardware and software.It carries out fundamental duties such processing input and output, managing files, memory, and processes, and managing peripheral devices like disk drives and printers. An operating system is loaded into memory by a boot loader, which also handles system initialization and starts system execution.There are three standard ways to send operating system parameters. Although the operating system is stored on the hard drive, it is copied into RAM during startup to speed up the process. The operating system and individual apps are stored on the hard drive so that they do not need to be loaded from discs every time the machine is turned on.When necessary, these programs are retrieved from the HDD and loaded into RAM. The physical device that houses all of your digital stuff is a hard disk.Digital stuff that is kept on a hard drive includes your papers, photos, music, videos, applications, application preferences, and operating system.There are internal and external hard drives. The operating system and other programs will be put on and executed from the system drive (allthough nothing is stopping you running programs from the storage drive).Photos, films, papers, and other items would be kept on the storage disk. Using 1s and 0s, binary coding is used to store data on hard drives.The read heads, which 'float' above the surface due to the layer of air created by the ultra-rapid rotation of the disk, read or write data that is dispersed across the magnetic layer of the disk(s). File storage, block storage, and object storage are the three basic ways that data can be kept and saved. The combination of external hard drives for archiving needs and cloud storage for incremental backups to expedite the process is your best choice for backups.Additionally, the majority of cloud storage providers only offer a tiny amount for free—typically a few megabytes. An operating system performs three primary tasks: managing the computer's resources, including the CPU, memory, disk drives, and printers; creating a user interface; and running and supporting application software. functions of the operating systemmanages the backup storage and ancillary devices like scanners and printers.focuses on the movement of programs between memory.organizes how different applications use memory.organizes the processing flow between users and applications.maintains user access rights and security.

    To learn more about  operating system refer

   https://brainly.com/question/22811693

     #SPJ1

an intrusion detection and prevention system is one that determines whether activity is present that is contrary to organization policy and represents a(n) .

Answers

The Intrusion detection system is the one that works on detection and prevention systems and determines whether the activity is present that is contrary to organization policy.

What do you mean by an Intrusion detection system?

A monitoring system called an intrusion detection system (IDS) looks for abnormal activity and sends out alarms when it does. A security operations centre (SOC) analyst or incident responder can analyse the problem and take the necessary steps to eliminate the threat based on these notifications.

What is SOC?

The goal of the security operations centre (SOC) is to continuously monitor, stop, detect, look into, and react to cyber-attacks.

Intrusion detection and prevention system (IDPS) is the collective name for a set of hardware and software that checks for the presence of activity that is against organisational rules and constitutes an intrusion.

Hence, a(n) reprsents the intrusion.

To learn more about the SOC from the given link

https://brainly.com/question/15072085

#SPJ4

suppose that a tcp segment has a lifetime of 2 minutes in the network. calculate the maximum transmission speed (bits/second) at which a host can send out 1460-byte tcp segments so that there will not be two tcp segments from the same sender with the same sequence number in the network, i.e., without having the tcp sequence numbers wrap around?

Answers

The maximum transmission speed at which a host can send out 1460-bytes tcp segments from the same sender with the same sequence number in the network is 10 bits per second.

If the bandwidth is 10 Gbps, the link will be (10/8) 109 bps = 1.25 109 bps.

120 seconds is the maximum segment lifetime.

The amount of data transferred in 120 seconds is equal to 150 1.25 109 bps / 120. 1.5 x 1010 bytes Equals 109 bytes

As a result, the TCP will generate a 1.5 1010 sequence number in the 120 second period.

One needed to transfer data at the highest speed in order to create a 1.5 * 1010 unique sequence.

= ceiling(log(1.5 1010)

equals ceil(log(1.5) + log(1010))

= ceil(0.1761 + 10)

= ceil(10.1761) (10.1761)

= 10 bits in the field for the sequence number.

Therefore, a sustained maximum data transfer rate of 10 bits per second is needed between two hosts.

To know more about bytes click on the link:

https://brainly.com/question/2280218

#SPJ4

Which option best describes top-down design?
A. Breaking down a large task into smaller parts
B. Delegating tasks to the right team members
C. Identifying tasks and ordering them by priority
OD. Pulling several small tasks into one larger one

Answers

A.Breaking fine à large tas kongo anallergique partis

what are the two primary advantages of using e-ink vs. a traditional laptop or smartphone display? what is the main reason e-ink isn't being used for laptops or tablets?

Answers

The two primary advantages of e-ink are that it is very power efficient and has a wide viewing angle. The main reason e-ink is not used for laptops or tablets is that it is not suitable for video or fast scrolling.

What is e-ink?
Displays with the appearance of regular ink on paper, such as electronic paper, electronic ink, e-ink, or electrophoretic displays, are known as electronic paper or electronic ink. An electronic paper display reflects light source like paper, in contrast to traditional flat panel displays that emit light. The wider viewing angle compared to most light-emitting displays may make it easier for them to read. The contrast ratio of electronic displays as of 2008 is comparable to that of a newspaper, and newly manufactured displays from 2008 are marginally better. E-paper displays should be able to be read in bright sunshine with out image appearing to deteriorate. Numerous electronic paper technologies can operate without energy for an endless amount of time with static text and visuals. Plastic substrates & plastic electronics are used in flexible electronic paper's display backplane.

To learn more about e-ink
https://brainly.com/question/24167692
#SPJ13

an engineer is writing a web application that requires some user input. the engineer has put a submit button on their page and now needs a way for their program to recognize when the button has been clicked. the engineer should add a(n) to their javascript.

Answers

In order to make the program recognize the clicking of a button, the engineer should add an event listener to the JavaScript code.

An event is considered to be a vital part of JavaScript because a web page responds according to the event that occurred. Some events are generated by APIs and some are user-generated events. For example, clicking or moving the mouse button and pressing a key on the keyboard are user generated events.

In order to handle the user-generated events in JavaScript,  an event listener is used. An event listener is a function or procedure in a JavaScript program that waits for an event to occur; such as pressing a key on the keyboard or clicking the button. Therefore based on the scenario given in the question statement, the engineer should use an event listener to his JavaScript code so that the code can recognize the click of the button.

You can learnmore about event at

https://brainly.com/question/20169706

#SPJ4

What is the largest risk of a business selling its products or services on account?

Answers

Answer:

financial risk

Explanation:

they don't know if the product will work

When the goal, scope and product domain are not understood by the scrum team, the scrum master should.

Answers

The Scrum Master is supposed to assist them in resolving questions and facilitating the project's progress in his or her capacity as a coach, mentor, and guide.

When a Scrum Master encounters resistance from outside of the scrum team what should Scrum Master do?

Scrum Master may help the team become very effective by eliminating obstacles, assisting with dispute resolution, ensuring that team members receive the necessary training and coaching, and conducting superbly conducted meetings that foster understanding and do not waste time.

To effectively assist the PO and support the team's product understanding, the Scrum Master needs to have sufficient product domain knowledge.

The Scrum Master is supposed to assist them in resolving questions and facilitating the project's progress in his or her capacity as a coach, mentor, and guide.

To learn more about Scrum Master refer to:

https://brainly.com/question/4763588

#SPJ4

filter is a higher-order function that group of answer choices can check the equality of all types of data. allows a variable number of arguments. reduces a list of elements to a single element. applies a function to all elements of a list.

Answers

The built-in Python function filter() enables you to process an iterable and extract those elements that meet a specified condition. This action is frequently referred to as a filtering procedure.

Filter() is a built-in method in Python that lets you process an iterable and extract elements that match a specified condition. A filtering operation is the term used to describe this process. Apply a filtering function to an iterable using the filter() function to create a new iterable that only contains the elements that match the given condition. Filter() is one of the functional programming tools available in Python.

You'll be able to use filter() in your code effectively once you have this information. As an alternative, you can write more understandable and Pythonic code by using generator expressions or list comprehensions.

It would be beneficial for you to have some prior knowledge of iterables, for loops, functions, and lambda functions in order to better grasp filter().

To know more about python click on the link:

https://brainly.com/question/18502436

#SPJ4

Which of the following is not a valid way to write a string?

Using single quotation marks around the characters
Using double quotation marks around the characters
Using triple single quotation marks around the characters
Using parenthesis around the characters

Answers

The statement which is not a valid way to write a string is: C. Using triple single quotation marks around the characters.

What is a string?

In Computer technology, a string can be defined as a data type which is commonly used for data values that typically contains ordered sequences of characters.

This ultimately implies that, a string can either contain a single character or be entirely empty. Additionally, "Hello world" is a typical example of a string in computer programming.

In Computer programming, some of the valid way to write a string include the following:

Using single quotation marks around the characters.Using double quotation marks around the characters.Using parenthesis around the characters.

Read more on a string here: brainly.com/question/25619349

#SPJ1

the key discovery that triggered the development of data warehouses was: computer viruses. the recognition of the differences between transactional systems and informational systems. the invention of the ipad. new ways to present information using mobile devices.

Answers

The key discovery that triggered the development of data warehouses was called the recognition of the differences between transactional systems and informational systems. So the right answer to this question is B.

A data warehouse can be described as a kind of data management system that is designed to turn on and support business intelligence (BI) activities, especially analytics. Data warehouses are only intended to show queries and analysis and often conduct large amounts of historical data. A data warehouse that contains the key discovery that triggered the development was called the recognition of the differences between transactional systems and informational systems.

You can learn more about The data warehouse at https://brainly.com/question/14615286

#SPJ4

when an overridden method is called from within a subclass, it will always refer to the version of that method defined by the (a) super class (b) subclass (c) compiler will choose randomly (d) interpreter will choose randomly (e) none of the abvove.

Answers

Option b is correct. When an overridden method is called from within a subclass, it will always refer to the version of that method defined by the subclass.

Subclasses are classes that can be created by adding new functionality to a parent class, such as new object variables or new methods. In terms of automata theory, a subclass expands the state transition table with new rows and states. However, by overriding (changing) existing functionality, the majority of OO programming languages also enable us to derive subclasses from parent classes. When implementing a class, all that is required to be specified is the new or updated functionality thanks to inheritance mechanisms between parent class and subclass.

Lines connected through a circle connect the subclasses HourlyEmployee and SalaryEmployee to the superclass Employee. The circled letter "d" stands for disjointness, which demands that the specification's subclasses be distinct. As a result, an entity can belong to only one of the specification's subclasses. An individual employee can only be paid either hourly wages or a salary; they cannot be paid both. The open sides of the inheritance (arch) symbols face the superclass.

To know more about subclass click on the link:

https://brainly.com/question/13790787

#SPJ4

which term describes the method of identifying vulnerabilities and threats and assessing the possible damage to determine where to implement security safeguards?

Answers

Risk analysis describes the method of identifying vulnerabilities and threats and assessing the possible damage to determine where to implement security safeguards.

What do you mean by security safeguards?

Prescribed safeguards and controls to meet the security needs of an information system. Security safeguards, management limitations, human security, and physical structure, area, and device security are all examples of safeguards. Virus scanners, firewalls, monitoring operating system logs, software logs, version control, and document disposition certification are examples of these. For extremely sensitive personal health information, encrypted storage and transfer is required.

Threats and vulnerabilities are assessed to determine the possibility that known risk analysis would be able to exploit identified vulnerabilities to produce one or more undesirable events, as well as the repercussions if such events occur.

To learn more about security safeguards
https://brainly.com/question/9335324

#SPJ4

ron believes that an attacker accessed a highly secure system in his data center and applied high-voltage electricity to it in an effort to compromise the cryptographic keys that it uses. what type of attack does he suspect?

Answers

Side channel type of attack ron can suspect

What is the side channel effect?

A side-channel attack is a security vulnerability that targets the hardware or system as a whole rather than the program or its code directly in order to gather information from or modify the program execution of a system.

How can we reduce the side-channel effect?

Although they have been introduced, not many of the different attack prevention strategies are currently in use. To try to stop these side-channel attacks, here are a few strategies :

preventing the disclosure of private information or ensuring that this information is unrelated to your personal information.Power line conditioning, filtering, and noise emission are all done to prevent power monitoring attacks.Using a blinding technique, the algorithm's input is changed into an unpredictable state, which causes some or all of the leakage of useful information.

Therefore using the above steps we can avoid the side channel effect.

To know more on attacks and effects follow this link

https://brainly.com/question/14366812

#SPJ4

In MakeCode Arcade, which feature executes the code in a module?
OA. If-then statement
OB. Function call
O C. Repeat loop
о D. Return value

Answers

In MakeCode Arcade, the code in a module is executed when the module is called as a function call.

What is code?

In information processing, code is a set of rules that is used to convert information into another form, sometimes abbreviated or secret, for transmission across a communication channel or storage in a storage device. An early example is the advent of language, which allowed a person to communicate to others what they thought, saw, heard, or felt through speaking. However, speaking limits the range of communication to the distance a voice may travel and the audience to those present at the time the speech is delivered. Writing, which transformed spoken language into visual symbols, broadened the scope of communication beyond place and time.

A function allows you to write a chunk of code that you can reuse throughout your programme.

So, B is the right answer.

To learn more about code

https://brainly.com/question/26134656

#SPJ13

Answer: b

Explanation:

took quiz

which statement is not true in java language? (a) a public member of a class can be accessed in all the packages. (b) a private member of a class cannot be accessed by the methods of the same class. (c) a private member of a class cannot be accessed from its derived class. (d) a protected member of a class can be accessed from its derived class. (e) none of the above.

Answers

A private member of a class cannot be accessed by the methods of the same class is not a true statement in java language.

What is meant by Java language?

In order to have as few implementation dependencies as feasible, Java exists a high-level, class-based. Programming in Java is network-focused, object-oriented, and multi-platform. Java is an object-oriented, class-based, all-purpose programming language.

Millions of devices, including laptops, smartphones, gaming consoles, medical equipment, employ the object-oriented programming language and software platform known as Java. Java's syntax and principles are derived from the C and C++ languages.

Java exists easier to write, compile, debug, and learn than other programming languages since it stood created to be simple to utilize. It's object-oriented, like Java. This enables the development of modular applications and code that is reused. Java works across all platforms.

Therefore, the correct answer is an option (b) A private member of a class cannot be accessed by the methods of the same class.

To learn more about Java language refer to:

https://brainly.com/question/25458754

#SPJ4

What is supposed to be in the blank?


The following loop is intended to print the numbers


2 4 6 8 10


Fill in the blank:


for i in ________:


print (i)

Answers

Answer:

12

Explanation:

Because

Other Questions
Got another one for yall what is 503472 rounded to the nearest thousend what is the limiting and excess reactant if 15.0g of FePo4 reacts with 5.0g of Na2SO Since the passage is a biographical (not autobiographical), the reader is able to--A. follow an interesting fictional storyline.B.be persuaded to take action against racial injustice.C. see Harriet Tubman's achievements in a mostly objective way.D. relate to Harriet Tubman's personal descriptions of trial and triumph. Write a short story using these 5 words: engross, apathy, impending, deft, consciousplease and thank you If 1495 J of heat is needed to raise the temperature of a 315 g sample of a metal from 55.0C to 66.0C, what is the specific heat capacity of the metal? Solve the inequality and graph the solution on the line provided.3x+17 _ What is an analytical statement? A review of literature that includes quotes. A collection of ideas highlighting an author's perspective. A summary of a single historical text. A conclusion based on facts and inferences. Read Edward Corsis quotation from the book Immigrant Kids by Russell Freedman.Edward Corsi, who later became United States Commissioner of Immigration, was a ten-year-old Italian immigrant when he sailed into New York harbor in 1907:"Giuseppe and I held tightly to Stepfathers hands, while Liberta and Helvetia clung to Mother. Passengers all about us were crowding against the rail. Jabbered conversations, sharp cries, laughs and cheers a steadily rising din filled the air. Mothers and fathers lifted up babies so that they too could see, off to the left, the Statue of Liberty."How does this quotation add credibility to Freedmans statement that the immigrants never forgot seeing the Statue of Liberty for the first time?[A] It adds credibility because it comes from a worker on the ship who sailed past the Statue of Liberty.[B] It adds credibility because it comes from an immigrant who actually shares his memories of seeing the Statue of Liberty.[C] It adds credibility because it comes from a historian who studied immigrants and the Statue of Liberty.[D] It adds credibility because it comes from a journalist who researched the Statue of Liberty. The composition of functions ibis world predicts that the number of employees in the marketing research industry will expand at an average annual rate of 7% through 2022, with wages predicted to increase at an average annual rate of 11%. answer: false true false In 2011 Staci invested $13,000 in a savings account for her newborn son. The account pays 3.6% interest each year. Determine the accrued value of the account in the year 2029, when her son will go to college. Round your answer the nearest cent.In the year 2029, the accrued value will be $ Find the surface area of the rectangularprism.Answer:2 in4 in22 inin Which of the following explains why a country with a high physiological density (e.g., Japan, Egypt, or the Netherlands) risks exceeding its carrying capacity?) The population is clustered in key areas, so rural populations will not have easy access to public services such as schools and hospitalsB) The population places a large amount of pressure on the arable land to produce enough food without risking severe environmental degradationC) The population is evenly dispersed throughout the country, so it is difficult to maintain infrastructure such as roads and telecommunication networks for the entire countryD) There is a large number of people per unit of total land area, so there is no available land for farmers to raise crops and other food productsE) The amount of farmers per unit of land area in these countries is too low to be able to support their populations. An increase in the movements of particles in a substance is associated with an increase in energy a treasury bond with a 10 1/4% coupon due on july 1, has interest payment dates of jan. 1 and july 1. it is traded for settlement on feb. 24. what is the number of days of accrued interest? choose the correct letter ( this is not being graded it is review ) A basketball player's shooting percentage was 0.425 at the end of the season. What does that mean? (1) He made 4.25% of the baskets he attempted. (2) He made 4 out of every 25 baskets he attempted. (3) He made 42.5% of the baskets he attempted. (4) He made 17 out of every 40 baskets he attempted I survey found that 43 people like chocolate 39 people like peanut butter and 29 people like both draw an empty van diagram with intersections find how many people like only chocolate only peanut butter and both show your work fill in the V diagram according your numbers Calculate how many people are in the survey Read the excerpt from the congressional resolution.Whereas the confederation of the original Thirteen Colonies into one republic was influenced by the political system developed by the Iroquois Confederacy as were many of the democratic principles which were incorporated into the Constitution itself . . . (1)the Congress, on the occasion of the two hundredth anniversary of the signing of the United States Constitution, acknowledges the contribution made by the Iroquois Confederacy and other Indian Nations to the formation and development of the United States.House Concurrent Resolution 331, October 21, 1988What is the resolution honoring?the influence and contributions of the Iroquois Confederacythe formation and development of the United Statesthe organization of the 13 colonies into a confederationthe two hundredth anniversary of the signing of the US Constitution