Answer:
6
Explanation:
the answer would have to be 6
how to play here!!!!!!!!!!!
Answer:
what?
Explanation:
whaaattt????????????
Answer:
Choose a platform: Playing video games no longer requires a deicated console or a gaming computer
Explanation:
hello hello . please help me
Answer:
#include <iostream>
using namespace std;
int main() {
int num, check=0;
for(int num = 1; num<=100;num++){
for(int i = 2; i <= num/2; i++) {
if(num % i == 0) {
check=1;
break; } }
if (check==0) { cout <<num<<" "; }
check = 0;
}
return 0;
}
Explanation:
This line declares num as integer which represents digits 1 to 100.
A check variable is declared as integer and initialized to 0
int num, m=0, check=0;
This for loop iterates from 1 to 100
for(int num = 1; num<=100;num++){
This iterates from 2 to half of current digit
for(int i = 2; i <= num/2; i++) {
This checks for possible divisors
if(num % i == 0) {
If found, the check variable is updated to 1
check=1;
And the loop is terminated
break; } }
The following if statement prints the prime numbers
if (check==0) { cout <<num<<" "; }
check = 0;
}
Write a function that accepts a pointer to a C-string as an argument and returns the number of words contained in the string. For instance, if the string argument is 'Four score and seven years ago,' the function should return the number 6. Demonstrate the function in a program that asks the user to input a string and then passes it to the function. The number of words in the string should be displayed on the screen.
Answer:
To preserve the original format of the answer, I've added it as an attachment
Explanation:
This line defines the function
int countWords(const char ptr){
This line initializes number of words to 0
int words = 0;
The following iteration is repeated until the last character in the argument is reached
while(*(ptr) != \0){
This checks if current character is blank
if(*ptr== ){
If yes, then it increments number of words by 1
words++;
}
This moves the pointer to the next character
ptr++;
}
This returns the number of words in the argument
return words+1;
}
The main begins here
int main() {
This declares user input as a character of 200 length
char userinput[200];
This prompts user for input
cout << Enter a string: (200 max): ;
This gets user input
cin.getline(userinput, 200);
This passes the c-string to the function and also prints the number of words
cout << There are << countWords(userinput)<< words;
Which item is essential to know before sketching a navigation menu flowchart?
template specifics, such as horizontal or vertical menu layout
whether or not the site will implement a search feature
all of the pages in the site and the content each page will contain
who will be using the site and the design theme selected for them
Answer:
A, template specifics, such as horizontal or vertical menu layout
Explanation:
Answer:
D. who will be using the site and the design theme selected for them
Explanation:
I am doing the exam right now.
A .cache is made up of _____ , each of which stores a block along with a tag and possibly a valid/dirty bit
Answer:
Blocks
Explanation:
A .cache is made up of blocks, each of which stores a block along with a tag and possibly a valid/dirty bit.
Basically, each blocks that makes up the cache stores additional block and sometimes a bit.
Which type of error occurred in the following lines of code?
>>> print(9 / 0)
Traceback (most recent call last):
File " ", line 1, in
9/0
ZeroDivisionError: division by zero
Answer choices:
reserved word error
logical error
exception
syntax error
Answer: Logical Error
The division by 0 is a logical error.
Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.
Answer:
An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)
Explanation:
Many electronic devices use a(n) integrated circuit which contains all the circuit parts in a miniature form.
The use of integrated circuit is known to be a kind of a single, miniature circuit that has a lot of electronically connected parts that are designed onto a small piece of silicon or semi conductive material.
A lot of electronic components are known to be capacitors, inductors, resistors, diodes, transistors and others.
Learn more about electronic devices from
https://brainly.com/question/11314884
high level languages are closer to machine language than humans yes or no
Answer:
yes
Explanation:
because they were built from humans
What is the purpose of the Error Alert feature?
Answer:
When you add data validation to a cell, the Error Alert feature is automatically turned on. It blocks the users from entering invalid data in the cell.
Explanation:
There ya go.. -_-
Answer:
A) To alert the user to data entry mistakes
Explanation:
How might use of computer and knowledge of technology system affect personal and professional success
Answer:
social media
Explanation:
help:(What are the uses of various lights? How are they all different? How do you decide on their usage? How can you use natural light to your advantage? Discuss.
Answer:
This is one of the most common types of lighting. Ambient light is a soft glow that blankets your space just enough for you to function without causing a harsh glare. In photography and cinematography, ambient light is considered the "natural light" within a room. In décor, ambient light is very similar, except you create the ambient light by making the room's lighting as natural and flat as possible. While ambient light is meant to get you safely from point A-to-B, it is not ideal for working closely with things or to highlight things around your space. When used correctly, ambient light creates a fantastic environment to relax from an overly stressful day or to have a warm conversation with an old friend. Ambient lighting is often referred to as mood lighting, because this light captures the soft curves of your face and allows your pupils to dilate slightly (a physical sign of affection). Some yoga studios have even begun using the softer ambient lighting in their classes to help draw stress from the body. This is a smaller more concentrated light. You want task lighting around when you’re working. In fact, some people call it office lighting. Task lighting is meant to help you see when you’re doing projects in which you need a finer light, such as, reading, cooking, writing, sewing and many other things. Task lighting only works well when it is used as a contrasting light. For example, if you have a low lit room with a swing arm lamp turned on over your desk, the light over the desk surface will be more effective with less glare or shadow-effect than if the entire room was lit with a brighter light. Task lighting helps naturally stimulate your brain. The contrasting light allows you to be more alert and concentrated. This will help you see more details as you work, creating higher quality results. This is why many businesses choose to use task lighting in their offices.
Explanation:
Lights can perform functions such as the illumination of rooms, decorations, etc.
Light is a powerful tool that can be used in setting a particular mood or drawing attention to the products in a store. There are several types of light such as:
Ambient lighting: It is used for lighting up a room. It gives a uniform level of illumination as it creates an overview of a room. Examples include a chandelier, table lamp, track light, etc.
Task lighting: It illuminates the task that a person is carrying out. Such tasks include reading, computer work, cooking, etc.
Accent lighting: It's used to focus on a particular point of interest in order to achieve the desired effect. It is usually used to highlight an architectural feature, sculpture, or a collection of objects.
Read related link on:
https://brainly.com/question/22697935
write the code that writes access granted if the correct password, swordfish is entered and access denied! otherwise
In python 3.8:
if input("Enter password: ") == "swordfish":
print("access granted")
else:
print("access denied!")
One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files
In C 11, the ________ tells the compiler to determine the variable's data type from the initialization value.
Answer:
auto key word
Explanation:
the auto keyword in c++11 can be regarded as one of the features of
“Type Inference” . It should be noted that in In C ++11, the auto key word tells the compiler to determine the variable's data type from the initialization value.
________________ are piece of programs or scripts that allow hackers to take control over any system.
Answer:
Exploits
Explanation:
Exploits can be explained to be a piece of programmed softwares or scripts that can give hackers the opportunity to take control over any system and exploit this system's vulnerabilities. The vulnerability scanners that hackers use includes, Nessus, Nexpose e.tc.
They use these scanners above to search for vulnerabilities.
Networks and the interconnectivity of media have affected our society in that:
A. information is hard to get and has not been democratized.
B. countries have shifted away from a global economy.
C. ideas and information are shared quickly and easily.
O
D. the quantity of media now loses out to quality.
Ideas and information are shared quickly and easily
Answer:
C. Ideas and information are shared quickly and easily
Explanation:
Write a program (using functions) starting from directives to compute and display the transpose of a matrix of dimension m x n. [Note: Here, transpose of a matrix means the element at row r and column c in the original is placed at row c and column r of the transpose]. (Programming in C)
Answer:
#include <iostream>
#include <cstdlib>
using namespace std;
int m, n;
void transpose(int matrix[]){
int transp[m][n];
for (int i = 0; i < n; i++){
for (int j = 0; j < m; j++){
transp[j][i] = matrix[i][j];
cout<< transp[j][i]<< " ";
}
cout<< "\n";
}
}
int main(){
cout<< "Enter the value for n: ";
cin>> n;
cout>> "Enter the value for m: ";
cin>> m;
int mymatrix[n][m];
for (int i = 0; i < n; i++){
for (int j = 0; j < m; j++){
mymatrix[i][j] = (rand() % 50);
}
}
transpose(mymatrix);
}
Explanation:
The C source code defined a void transpose function that accepts a matrix or a two-dimensional array and prints the transpose on the screen. The program gets user input for the row (n) and column (m) length of the arrays. The C standard library function rand() is used to assign random numbers to the array items.
turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is not the case. What could be a possible cause?
write c++ program from 1to 100 to find prime numbers using statement.
#include <iostream> using namespace std; int isPrimeNumber(int); int main() { bool isPrime; for(int n = 2; n < 100; n++) { // isPrime will be true for prime numbers isPrime = isPrimeNumber(n); if(isPrime == true) cout<<n<<" "; } return 0; } // Function that checks whether n is prime or not int isPrimeNumber(int n) { bool isPrime = true; for(int i = 2; i <= n/2; i++) { if (n%i == 0) { isPrime = false; break; } } return isPrime; }
active cell is indentifed by its thick border true or false
Answer: It's identifed by its thick border so its true
Write an LC-3 assembly language program to read in a two-digit decimal number whose digits add up to less than 10 and display the sum of those digits in the next line.
Sample execution (user input underlined) : Please enter a two-digit decimal number > 27. The sum of the digits = 9
Answer:
Explanation:
.MODEL SMALL
.STACK 100H
.DATA
STR1 DB 0AH,0DH, 'THE SUM OF TWO DIGITS PRENT IN THE GIVEN NUMBER'
FNUM DB ?
STR2 DB ' AND '
SNUM DB ?
STR3 DB ' IS '
ANS DB ?
STR4 DB ' $'
.CODE
MAIN PROC
MOV AX, "at" DATA PLEASE NOTE: your "at" need to be in symbol
MOV DS,AX It is because this text editor who allow the sub-
mission of this answer if i use the symbol format
MOV AH,2 that is why put it in bold and parenthesis
MOV DL,3FH
INT 21H
MOV AH,1
INT 21H
MOV BL,AL
MOV FNUM,AL
INT 21H
MOV SNUM,AL
ADD BL,AL
SUB BL,30H
MOV ANS,BL
MOV AH,9
LEA DX,STR1
INT 21H
MOV AH,4CH
INT 21H
MAIN ENDP
END MAIN
What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g
Answer:
Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.
Explanation:
The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.
SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.
Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable.
Public class Employee
{
Private String empID;
Private boolean hourly;
) . .
_______
{
Hourly = isHourly;
}
}
A) public void setHourly(String isHourly)
B) public void getHourly()
C) public boolean getHourly()
D) public boolean setHourly(boolean isHourly)
Answer:
A)
Explanation:
In this code example the missing piece of code would be...
public void setHourly(String isHourly)
This piece of code is creating a function called setHourly which takes in one String variable as it's parameter. Based on the rest of the code, the function takes that parameter variable and places it into an instance variable called Hourly which can be used when the function is called.
what is meant by resources of computer
Explain how the use of Git and a shared public Git repository simplifies the process of managing opensource development when many developers may be working on the same code. Support your answer with an appropriate visual that you find from the internet.
Answer:
Git is a collaborative software used by members of a group to share and work on the same projects. Github is a web application that uses git to link people working together on a codebase. With git and Github, opensource projects can be accessed and collaborated on by volunteers.
Explanation:
Opensource development is a collaborative group of developers working together on a software or platform with a general public license. When working on an opensource project, each developer is able to folk or get a copy of the repository downloaded to a local computer which they can work on and push or update to the actual online repository if the condition for a change is met.
Assuming int numbers[SIZE]; is initialized somehow, write a function counter() that you can send the array to, plus an extra integer, and the function will return the number of times that value is found in the array. For example, if the array of SIZE 7 contains {1,2,3,2,3,3,3}then the call
x=counter(numbers,SIZE,3); will put 4 into x.
Answer:
Explanation:
The following function is written in Java and takes in three parameters the array, its size, and the chosenNumber that will be counted. The function then creates an instance variable called Counter and loops through the given array looking for the chosenNumber. Every time that the number is found in the array it adds 1 to the counter. Once the loop is done it returns the total value of the counter variable.
public static int counter(int[] numbers, int Size, int chosenNumber) {
int counter = 0;
for (int x = 0; x < Size; x++) {
if(numbers[x] == chosenNumber) {
counter++;
}
}
return counter;
}
Suppose that you have the following declaration:
stack Type stack(50); double num; and the input is
25 64-3 6.25 36-4.5 86 14 -129
Write a C++ code that processes this input as follows: If the number is non-negative, it pushes the square root of the number onto the stack; otherwise it pushes the square of the number onto the stack. After processing these numbers write a C++ code that outputs the elements of the stack.
Answer:
Explanation:
The code is written in C++:
#include <iostream>
#include <stack>
#include <math.h>
#include <iomanip>
using namespace std;
/*
* Supporting method to print contents of a stack.
*/
void print(stack<double> &s)
{
if(s.empty())
{
cout << endl;
return;
}
double x= s.top();
s.pop();
print(s);
s.push(x);
cout << x << " ";
}
int main(){
// Declaration of the stack variable
stack<double> stack;
//rray with input values
double inputs[] = {25,64,-3,6.25,36,-4.5,86,14,-12,9};
/*
* For each element in the input, if it is positive push the square root into stack
* otherwise push the square into the stack
*/
for(int i=0;i<10;i++){
if(inputs[i]>=0){
stack.push(sqrt(inputs[i]));
}else{
stack.push(pow(inputs[i],2));
}
}
//Print thye content of the stack
print(stack);
}
OUTPUT:
5 8 9 2.5 6 20.25 9.27362 3.74166 144 3
-------------------------------------------------------------------------
Process exited after 0.01643 seconds with return value 0
Press any key to continue . . . -
Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.
Answer:
Following are the program to this question:
import java.util.*;//import package for user input
public class Main//defining main class
{
public static String Cat (String name, String gender, int age)//defining string method Cat that accept parameter value
{
return name + ';' + gender + ';' + age;//return parameter value
}
public static void main(String[] args) //defining main method
{
String name,gender;//defining String variable
int age;//defining integer variable
System.out.println("Enter name, gender and age: ");//print message
Scanner obx=new Scanner(System.in);//creating Scanner class object for user input
name=obx.next();//input name value
gender=obx.next();//input gender value
age=obx.nextInt();// input age value
System.out.println(Cat(name,gender,age));//print return method value
}
}
Output:
Enter name, gender and age:
dani
Female
12
dani;Female;12
Explanation:
In the above-given code, a string method Cat is declared, that accepts three variable "name, gender, and age", inside the method return keyword is used that returns the parameter values.
In the main method, the above parameter variable is declared, which is used to input value from the user-end, and used the print method to print its return value.
What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption
Explanation:
Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major advantage of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main disadvantage of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.
In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. A major advantage of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), a disadvantage.
Advantage:
Because the content is contained throughout a non-secure file, the above strategy decreases the chance of an assault on classified info.Disadvantage:
This approach has the disadvantage that concealed information might be able to retrieve if somehow the documents have been changed or deleted as of a non-secure file.Once again to encrypt as well as decode information, symmetric encryption employs a unique key, but asymmetric encryption utilizes two different keys, something for encryption as well as someone else for decryption.
Advantage:
One such approach is superior to steganography throughout the level of protection.Disadvantage:
Because distinct keys have been needed to get access, such techniques of asymmetric encryption are considerably slower.Thus the approach above is correct.
Learn more about steganography here:
https://brainly.com/question/15187715
12. The best method of protecting the residential user with an Internet connection from intruders out on the Internet is to use
Answer:
Updated OS software patches
Explanation:
Firstly we need to know that patches are those software updates as well as operating system updates that addresses the vulnerabilities In a program or a products security. Software operators may decide to roll out new updates which have the power to fix performance bugs in a program as well as providing more enhanced methods of security.