is it possible to unlock a password without a password if you forgot​

Answers

Answer 1

Answer:

no

Explanation:

because u will need an code

Answer 2

Answer:

it should have a reset with email option

Explanation:


Related Questions

Outlines help you visualize the slides and the points you will include on each slide.
False
True

Answers

I don’t know I think true

Answer:

True

Explanation:

because it was correct

Write a function process_spec that takes a dictionary (cmap), a list (spec) and a Boolean variable (Button A) as arguments and returns False: if the spec has a color that is not defined in the cmap or if Button A was pressed to stop the animation Otherwise return True

Answers

Answer:

Explanation:

The following code is written in Python. The function takes in the three arguments and first goes through an if statement to check if Button A was pressed, if it was it returns False otherwise passes. Then it creates a for loop to cycle through the list spec and checks to see if each value is in the dictionary cmap. If any value is not in the dictionary then it returns False, otherwise, it returns True for the entire function.

def process_spec(cmap, spec, buttonA):

   if buttonA == True:

       return False

   

   for color in spec:

       if color not in cmap:

           return False

   return True

10.The front end side in cloud computing is​

Answers

Answer:

The front end is the side the computer user, or client, sees. The back end is the "cloud" section of the system.

The front end includes the client's computer (or computer network) and the application required to access the cloud computing system.

Explanation:

can i have brainliest please

Circle class
private members
double radius
double xPos
double yPos
public members
double diameter()
get the diameter of the Circle. It returns a value, diameter.
double area()
calculate the area of the Circle
double circumference()
calculate the circumference of the circle
double getRadius()
returns the radius
double getX()
returns the xPos value
double getY()
returns the yPos value
void setX(double x)
sets xPos, no requirements
void setY(double y)
sets yPos, no requirements
double distanceToOrigin()
returns the distance from the center of the circle to the origin
HINT: Find out how to calculate the distance between two points and recall the origin is at (0,0)
bool insersect(const Circle& otherCircle)
Take another Circle by const reference (see more notes below)
Returns true if the other Circle intersects with it, false otherwise
bool setRadius(double r)
sets the radius to r and returns true if r is greater than zero, otherwise sets the radius to zero and returns false
Remember, you will need a header file (.h) and an implementation file (.cpp)
You'll also need to update your Makefile
NOTE: The Circle class should not do any input or output.
CircleDriver class
private members
Circle circ1;
Circle circ2;
void obtainCircles()
Talk with the user to obtain the positions and radii for two Circles from the user. Repeats prompts until the user gives valid values for the radii
It does not validate the values, but rather checks the return value from a call to Circle's setRadius method
void printCircleInfo()
Prints the following information about each of the Circles to the screen:
The location of the Circle's center (xPos, yPos), the distance from the origin, each area, circumference, diameter
Lastly print whether or not the two circles intersect
Sample output from printCircleInfo().
Information for Circle 1:
location: (0, 50.0)
diameter: 200.0
area: 31415.9
circumference: 628.318
distance from the origin: 50.0
Information for Circle 2:
location: (50.0, 0)
diameter: 200.0
area: 31415.9
circumference: 628.318
distance from the origin: 50.0
The circles intersect.
public membersvoid run()
run merely calls all the other methods. Here's your definition for run()
//This will go in your CircleDriver.cpp
void CircleDriver::run()
{
obtainCircles();
printCircleInfo();
}
main
Main does very little. In fact, here is your main:
int main()
{
CircleDriver myDriver;
myDriver.run();
return(0);
}

Answers

Answer:

What was the actual the question? I am confused.

Explanation:

Mohammed needs to ensure that users can execute a query against a table but provide different values to the query each time it is run. Which option will achieve this goal?

parameter queries
dynamic queries
query joins
static queries

Answers

Answer:

the answer is B

Explanation:

describe how sodium ammonium chloride can be separated from a solid mixture of ammonium chloride and anhydrous calcium chloride​

Answers

Answer:

There are way in separating mixtures of chlorides salts such as that of sodium chloride and ammonium chloride. It can be done by crystallization, filtration or sublimation. If we want to separate the mixture, we have to heat up to 330-350 degrees Celsius and collect the gas that will be produced.

Identify the following terms being described. Write your answers on the space provided.

1. Worldwide Web
______________________
2.E-mail
________________________
3.Powerline networking
_______________________
5.Cable
_______________________

Answers

Answer:

Find answers below.

Explanation:

1. Worldwide Web: In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.

In a nutshell, the World Wide Web is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.

2.E-mail: An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.

It is considered to be one of the most widely used communication channel or medium is an e-mail (electronic mail).

3. Powerline networking: this is a wired networking technology that typically involves the use of existing electrical cables in a building to connect and transmit data on network devices through powerline network adapters.

4. Cable: this include network cables such as CAT-5, CAT-6 and fiber optic cables used for connecting and transmitting signals between two or more network devices.

Explain the five generations of computer

Answers

Answer:

1 First Generation

The period of first generation: 1946-1959. Vacuum tube based.

2 Second Generation

The period of second generation: 1959-1965. Transistor based.

3 Third Generation

The period of third generation: 1965-1971. Integrated Circuit based.

4 Fourth Generation

The period of fourth generation: 1971-1980. VLSI microprocessor based.

5 Fifth Generation

The period of fifth generation: 1980-onwards. ULSI microprocessor based.

The phrase "generation" refers to a shift in the technology that a computer is/was using. The term "generation" was initially used to describe different hardware advancements. These days, a computer system's generation involves both hardware and software.

Who invented the 5th generation of computers?

The Japan Ministry of International Trade and Industry (MITI) launched the Fifth Generation Computer Systems (FGCS) initiative in 1982 with the goal of developing computers that use massively parallel computing and logic programming.

The generation of computers is determined by when significant technological advancements, such as the use of vacuum tubes, transistors, and microprocessors, take place inside the computer. There will be five computer generations between now and 2020, with the first one starting around 1940.

Earlier models of computers (1940-1956)Computers of the Second Generation (1956-1963)Computers of the Third Generation (1964-1971)Computers of the fourth generation (1971-Present)Computers of the fifth generation

Learn more about generations of computers here:

https://brainly.com/question/9354047

#SPJ2

What is a principle of DevOps?​

Answers

Answer:

the main principles of DevOps are automation, continuous delivery, and fast reaction to feedback. You can find a more detailed explanation of DevOps pillars in the CAMS acronym: Culture represented by human communication, technical processes, and tools.

Suppose a TCP segment is sent while encapsulated in an IPv4 datagram. When the destination host gets it, how does the host know that it should pass the segment (i.e. the payload of the datagram) to TCP rather than to UDP or some other upper-layer protocol

Answers

Answer and Explanation:

A host needs some datagram where TCP is encapsulated in the datagram and contains the field called a protocol. The size for the field is 8-bit.

The protocol identifies the IP of the destination where the TCP segment is encapsulated in a datagram.

The protocol field is 6 where the datagram sends through TCP and 17 where the datagram is sent through the UDP as well

Protocol with field 1 is sent through IGMP.

The packet is basic information that is transferred across the network and sends or receives the host address with the data to transfer. The packet TCP/IP adds or removes the field from the header as well.

TCP is called connection-oriented protocol as it delivers the data to the host and shows TCL receives the stream from the login command. TCP divides the data from the application layer and contains sender and recipient port for order information and known as a checksum. The TCP protocol uses the checksum data to determine that data transferred without error.

6. Which of the following games will most likely appeal to a casual player?
a) Wii Sport
b) Contra
c) Farmville
d) Both A and C

Answers

Answer:

A

Explanation:

Wii sports is a good game for a casual player. :)

(Word Occurrences) Write a program word-occurrences.py that accepts filename (str) as command-line argument and words from standard input; and writes to standard output the word along with the indices (ie, locations where it appears in the file whose name is filename - writes "Word not found" if the word does not appear in the file. >_*/workspace/project 6 $ python3 word_occurrences.py data/Beatles.txt dead Center> dead -> (3297, 4118, 4145, 41971 parrot center> Word not found word occurrences.py from instream import InStream from symboltable import Symbol Table import stdio import sys # Entry point. def main (): # Accept filename (str) as command line argument. # Set in Stream to an input stream built from filename. # Set words to the list of strings read from instream # Set occurrences to a new symbol table object. for 1, word in enumerate (...) # For each word (having index 1) in words... # It word does not exist in occurrences, insert it with an empty list as the value. # Append i to the list corresponding to word in occurrences. while . #As long as standard input is not empty.. # Set word to a string read from standard input. # If word exists in occurrences, write the word and the corresponding list to standard Exercises word occurrences.py #output separated by the string Otherwise, write the message Word not found 1 else main()

Answers

Answer:

The solution in Python is as follows:

str = "sample.txt"

a_file = open(str, "r")

words = []

for line in a_file:

stripped_line = line.strip()

eachlist = stripped_line.split()

words.append(eachlist)

a_file.close()

word_list= []

n = int(input("Number of words: "))

for i in range(n):

myword = input("Enter word: ")

word_list.append(myword)

for rn in range(len(word_list)):

index = 0; count = 0

print()

print(word_list[rn]+": ",end = " ")

for i in range(len(words)):

 for j in range(len(words[i])):

  index+=1

  if word_list[rn].lower() == words[i][j].lower():

   count += 1

   print(index-1,end =" ")

if count == 0:

 print("Word not found")

Explanation:

See attachment for complete program where comments are used to explain difficult lines

Write a piece of code that constructs a jagged two-dimensional array of integers named jagged with five rows and an increasing number of columns in each row, such that the first row has one column, the second row has two, the third has three, and so on. The array elements should have increasing values in top-to-bottom, left-to-right order (also called row-major order). In other words, the array's contents should be the following: 1 2, 3 4, 5, 6 7, 8, 9, 10 11, 12, 13, 14, 15
PROPER OUTPUT: jagged = [[1], [2, 3], [4, 5, 6], [7, 8, 9, 10], [11, 12, 13, 14, 15]]
INCORRECT CODE:
int jagged[][] = new int[5][];
for(int i=0; i<5; i++){
jagged[i] = new int[i+1]; // creating number of columns based on current value
for(int j=0, k=i+1; j jagged[i][j] = k;
}
}
System.out.println("Jagged Array elements are: ");
for(int i=0; i for(int j=0; j System.out.print(jagged[i][j]+" ");
}
System.out.println();
}
expected output:jagged = [[1], [2, 3], [4, 5, 6], [7, 8, 9, 10], [11, 12, 13, 14, 15]]
current output:
Jagged Array elements are:
1
2 3
3 4 5
....

Answers

Answer:

Explanation:

The following code is written in Java and it uses nested for loops to create the array elements and then the same for loops in order to print out the elements in a pyramid-like format as shown in the question. The output of the code can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       int jagged[][] = new int[5][];

       int element = 1;

       for(int i=0; i<5; i++){

           jagged[i] = new int[i+1]; // creating number of columns based on current value

           for(int x = 0; x < jagged[i].length; x++) {

               jagged[i][x] = element;

               element += 1;

           }

       }

       System.out.println("Jagged Array elements are: ");

       for ( int[] x : jagged) {

           for (int y : x) {

               System.out.print(y + " ");

           }

           System.out.println(' ');

       }

       }

   }

In the code snippet below, pick which instructions will have pipeline bubbles between them due to hazards.

a. lw $t5, 0($t0)
b. lw $t4, 4($t0)
c. add $t3, $t5, $t4
d. sw $t3, 12($t0)
e. lw $t2, 8($t0)
f. add $t1, $t5, $t2
g. sw $t1, 16($t0)

Answers

Answer:

b. lw $t4, 4($t0)

c. add $t3, $t5, $t4

Explanation:

Pipeline hazard prevents other instruction from execution while one instruction is already in process. There is pipeline bubbles through which there is break in the structural hazard which preclude data. It helps to stop fetching any new instruction during clock cycle.

Which tab can be used to change the theme and background style of a presentation?
O Design
O Home
O Insert
O View

Answers

Answer:

Design

Explanation:

seems the most correct one..

I would say design as well.

The Basic premise of____is that objects can be tagged, tracked, and monitored through a local network, or across the Internet.
The basic premise of
a. artificial intelligence
b. intelligent workspaces
c. the Internet of Things
d. the digital divide

Answers

Answer:

C.

Explanation:

Internet of things

The Basic premise of the Internet of Things is that objects can be tagged, tracked, and monitored through a local network, or across the Internet option (c) is correct.

What is IoT?

The term "Internet of things" refers to actual physical items that have sensors, computing power, software, and other innovations and can link to those other systems and gadgets via the Internet or other communication networks and share files with them.

As we know,

Using a local network or the Internet, things may be identified, tracked, and monitored is the fundamental tenet of the Internet of Things.

Thus, the Basic premise of the Internet of Things is that objects can be tagged, tracked, and monitored through a local network, or across the Internet option (c) is correct.

Learn more about the IoT here:

https://brainly.com/question/25703804

#SPJ2

Which of the following is not an advantage of e-commerce for consumers?
a. You can choose goods from any vendor in the world.
b. You can shop no matter your location, time of day, or conditions.
c. You have little risk of having your credit card number intercepted.
d. You save time by visiting websites instead of stores.

Answers

Answer:  c. You have little risk of having your credit card number intercepted.

====================================

Explanation:

Choice A is false because it is an advantage to be able to choose goods from any vendor from anywhere in the world. The more competition, the better the outcome for the consumer.

Choice B can also be ruled out since that's also an advantage for the consumer. You don't have to worry about shop closure and that kind of time pressure is non-existent with online shops.

Choice D is also a non-answer because shopping online is faster than shopping in a brick-and-mortar store.

The only thing left is choice C. There is a risk a person's credit card could be intercepted or stolen. This usually would occur if the online shop isn't using a secure method of transmitting the credit card info, or their servers are insecure when they store the data. If strong encryption is applied, then this risk can be significantly reduced if not eliminated entirely.

Answer:

c. You have little risk of having your credit card number intercepted.

Explanation:

Hope this helps

Annapurno
Page
Date
corite
a programe to input length and the
breath of the rectangle and cliculate the
anecan perimeter .write a program to input length and breadth of the rectangle and calculate the area and perimeter ​

Answers

Answer:

The program in Python is as follows:

Length = float(input("Length: "))

Width = float(input("Width: "))

Area = Length * Width

print("Area: ",Area)

Explanation:

This gets input for length

Length = float(input("Length: "))

This gets input for width

Width = float(input("Width: "))

This calculates the area

Area = Length * Width

This prints the calculated area

print("Area: ",Area)

CHALLENGE ACTIVITY
1.6.1: Type casting: Computing average owls per zoo.
Assign avg_owls with the average owls per zoo. Print avg_owls as an integer.

Sample output for inputs: 1 2 4
Average owls per zoo: 2

-------------------------------------------------------------------
Someone please explain what I am doing wrong?

Answers

Answer:

avg_owls=0.0

num_owls_zooA = int(input())

num_owls_zooB = int(input())

num_owls_zooC = int(input())

num_zoos = 3

avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos

print('Average owls per zoo:', int(avg_owls))

Explanation:

There is a problem while you are trying the calculate the average owls per zoo.

As you may know, in order to calculate the average, you need to get the total number of owls in all the zoos, then divide it to the number of zoos. That is why you need to sum num_owls_zooA + num_owls_zooB + num_owls_zooC and divide the result by num_zoos

Be aware that the average is printed as integer value. That is why you need to cast the avg_owls to an int as int(avg_owls)

Commands from the Quick Access toolbar can be used by
Clicking on the command
Navigating to Backstage view
Selecting the appropriate options on the status bar
Selecting the function key and clicking the command​

Answers

Answer:

Clicking on the command.

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

A portion of the Outlook interface that contains commonly accessed commands that a user will require frequently and is able to be customized by the user based on their particular needs is referred to as the Quick Access toolbar.

Commands from the Quick Access toolbar can be used by clicking on the command.

Suppose the program counter is currently equal to 1700 and instr represents the instruction memory. What will be the access of the next instruction if:

instr[PC] = add $t0, $t1, $t2

Answers

Answer:

C

Explanation:

omputer chip

sorry btw


What is Microsoft Excel? Why is it so popular​

Answers

Answer:

Its a spreadsheet devolpment by Microsoft.

Explanation:

Write a script called fact.sh that is located in your workspace directory to calculate the factorial of a number n; where n is a non-negative integer between 1 and 20 that is passed as a parameter from the command line (e.g. ./fact.sh 5). The result should be echoed to the screen as a single integer (e.g. 120).
NOTE: Do not include any other output, just output the single integer result.
Submit your code to the auto-grader by pressing Check-It!
NOTE: You can submit as many times as you want up until the due date.

Answers

Answer:

hope this helps

Explanation:

The Freeze Panes feature would be most helpful for which situation?
A.when the functions used in a worksheet are not working correctly
B.when a large worksheet is difficult to interpret because the headings disappear during scrolling
C.when the data in a worksheet keeps changing, but it needs to be locked so it is not changeable
D.when a large worksheet is printing on too many pages

Answers

Answer:

i think a but not so sure

Explanation:

Answer: Option B is the correct answer :)

Explanation:

Define a class StatePair with two template types (T1 and T2), a constructor, mutators, accessors, and a PrintInfo() method. Three vectors have been pre-filled with StatePair data in main():vector> zipCodeState: ZIP code - state abbreviation pairsvector> abbrevState: state abbreviation - state name pairsvector> statePopulation: state name - population pairsComplete main() to use an input ZIP code to retrieve the correct state abbreviation from the vector zipCodeState. Then use the state abbreviation to retrieve the state name from the vector abbrevState. Lastly, use the state name to retrieve the correct state name/population pair from the vector statePopulation and output the pair.Ex: If the input is:21044the output is:Maryland: 6079602

Answers

Answer:

Here.Hope this helps and do read carefully ,you need to make 1 .cpp file and 1 .h file

Explanation:

#include<iostream>

#include <fstream>

#include <vector>

#include <string>

#include "StatePair.h"

using namespace std;

int main() {

  ifstream inFS; // File input stream

  int zip;

  int population;

  string abbrev;

  string state;

  unsigned int i;

  // ZIP code - state abbrev. pairs

  vector<StatePair <int, string>> zipCodeState;

  // state abbrev. - state name pairs

  vector<StatePair<string, string>> abbrevState;

  // state name - population pairs

  vector<StatePair<string, int>> statePopulation;

  // Fill the three ArrayLists

  // Try to open zip_code_state.txt file

  inFS.open("zip_code_state.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file zip_code_state.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <int, string> temp;

      inFS >> zip;

      if (!inFS.fail()) {

          temp.SetKey(zip);

      }

      inFS >> abbrev;

      if (!inFS.fail()) {

          temp.SetValue(abbrev);

      }

      zipCodeState.push_back(temp);

  }

  inFS.close();

 

// Try to open abbreviation_state.txt file

  inFS.open("abbreviation_state.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file abbreviation_state.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <string, string> temp;

      inFS >> abbrev;

      if (!inFS.fail()) {

          temp.SetKey(abbrev);

      }

      getline(inFS, state); //flushes endline

      getline(inFS, state);

      state = state.substr(0, state.size()-1);

      if (!inFS.fail()) {

          temp.SetValue(state);

      }

     

      abbrevState.push_back(temp);

  }

  inFS.close();

 

  // Try to open state_population.txt file

  inFS.open("state_population.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file state_population.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <string, int> temp;

      getline(inFS, state);

      state = state.substr(0, state.size()-1);

      if (!inFS.fail()) {

          temp.SetKey(state);

      }

      inFS >> population;

      if (!inFS.fail()) {

          temp.SetValue(population);

      }

      getline(inFS, state); //flushes endline

      statePopulation.push_back(temp);

  }

  inFS.close();

 

  cin >> zip;

for (i = 0; i < zipCodeState.size(); ++i) {

      // TODO: Using ZIP code, find state abbreviation

  }

  for (i = 0; i < abbrevState.size(); ++i) {

      // TODO: Using state abbreviation, find state name

  }

  for (i = 0; i < statePopulation.size(); ++i) {

      // TODO: Using state name, find population. Print pair info.

  }

}

Statepair.h

#ifndef STATEPAIR

#define STATEPAIR

#include <iostream>

using namespace std;

template<typename T1, typename T2>

class StatePair {

private:

T1 key;

T2 value;

public:

// Define a constructor, mutators, and accessors

// for StatePair

StatePair() //default constructor

{}

// set the key

void SetKey(T1 key)

{

this->key = key;

}

// set the value

void SetValue(T2 value)

{

this->value = value;

}

// return key

T1 GetKey() { return key;}

 

// return value

T2 GetValue() { return value;}

// Define PrintInfo() method

// display key and value in the format key : value

void PrintInfo()

{

cout<<key<<" : "<<value<<endl;

}

};

#endif

In this exercise we have to use the knowledge in computational language in C++  to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

#include<iostream>

#include <fstream>

#include <vector>

#include <string>

#include "StatePair.h"

using namespace std;

int main() {

 ifstream inFS;

 int zip;

 int population;

 string abbrev;

 string state;

 unsigned int i;

 vector<StatePair <int, string>> zipCodeState;

 vector<StatePair<string, string>> abbrevState;

 vector<StatePair<string, int>> statePopulation;

 inFS.open("zip_code_state.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file zip_code_state.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <int, string> temp;

     inFS >> zip;

     if (!inFS.fail()) {

         temp.SetKey(zip);

     }

     inFS >> abbrev;

     if (!inFS.fail()) {

         temp.SetValue(abbrev);

     }

     zipCodeState.push_back(temp);

 }

 inFS.close();

 inFS.open("abbreviation_state.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file abbreviation_state.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <string, string> temp;

     inFS >> abbrev;

     if (!inFS.fail()) {

         temp.SetKey(abbrev);

     }

     getline(inFS, state);

     getline(inFS, state);

     state = state.substr(0, state.size()-1);

     if (!inFS.fail()) {

         temp.SetValue(state);

     }

     abbrevState.push_back(temp);

 }

 inFS.close();

 inFS.open("state_population.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file state_population.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <string, int> temp;

     getline(inFS, state);

     state = state.substr(0, state.size()-1);

     if (!inFS.fail()) {

         temp.SetKey(state);

     }

     inFS >> population;

     if (!inFS.fail()) {

         temp.SetValue(population);

     }

     getline(inFS, state);

     statePopulation.push_back(temp);

 }

 inFS.close();

 cin >> zip;

for (i = 0; i < zipCodeState.size(); ++i) {

  }

 for (i = 0; i < abbrevState.size(); ++i) {

  }

 for (i = 0; i < statePopulation.size(); ++i) {

 }

}

Statepair.h

#ifndef STATEPAIR

#define STATEPAIR

#include <iostream>

using namespace std;

template<typename T1, typename T2>

class StatePair {

private:

T1 key;

T2 value;

public:

StatePair()

{}

void SetKey(T1 key)

{

this->key = key;

}

void SetValue(T2 value)

{

this->value = value;

}

T1 GetKey() { return key;}

T2 GetValue() { return value;}

void PrintInfo()

{

cout<<key<<" : "<<value<<endl;

}

};

See more about C code at brainly.com/question/19705654

what is the output of this line of code?
print("hello"+"goodbye")
-"hello"+"goodbye"
-hello + goodbye
-hello goodbye
-hellogoodbye

Answers

The first one
“hello” + “goodbye”

Answer:

“hello” + “goodbye”

Explanation:

What does getfenv() do?

Answers

Answer: getfenv() is a type of function. Particually a envirotment function. for a lua coding.

Explanation: What this does it goes thourgh  line of code in a particular order.

This means. getfenv is used to get the current environment of a function. It returns a table of all the things that function has access to. You can also set the environment of a function to another environment.

Forgot to include examples of where this could be used. Although not very common uses, there are some. In the past Script Builders used getfenv to get the environment of a script, and setfenv to set the environment of a created script’s environment to a fake environment, so they couldn’t affect the real one. They could also inject custom global functions.

Not entirely sure if this uses getfenv or setfenv, but the use in Crazyman32’s AeroGameFramework is making the environment of each module have access to other modules without having to require them, and having access to remotes without having to directly reference them.

Answer: ummm, who knows

Explanation:

Need help with 9.2 Lesson Practice edhesive asap please

Answers

Answer:

Can you add an attachment please

In this exercise we have to use the computer language knowledge in python, so the code is described as:

This code can be found in the attached image.

So the code can be described more simply below, as:

height = []

height.append([16,17,14])

height.append([17,18,17])

height.append([15,17,14])

print(height)

See more about python at brainly.com/question/26104476

a user called to inform you that the laptop she purchased yesterday is malfunctioning and will not connect to her wireless network. You personally checked to verify that the wireless worked properly before the user left your office. the user states she rebooted the computer several times but the problems still persists. Which of the following is the first step you should take to assist the user in resolving this issue?

Answers

1. Make sure most recent update has been installed.
2. Run Windows Network Trouble shooter to ensure proper drivers are up to date and existing.
3. Carefully Review Windows Event Log for more detailed troubleshooting.
4.Last resort install a fresh boot on the laptop.

-) Files are organized in:
i) RAM
iii) Directories
ii) Cache
iv) None of the above​

Answers

Answer:

iii) Directories.

Explanation:

Files are organized in directories. These directories are paths that describes the location wherein a file is stored on a computer system. Thus, it is generally referred to as file folders.

For example, a directory would be C:/Users/Lanuel/Music/songs of joy.mp3.

Other Questions
Evaporation is the process of rain, snow, sleet or hail falling from the sky.TRUE or FALSE Use the long division method to find the result when 3x^3+23x^2+23x+6 is divided by 3x+2. 3rd retry of this question! Please stop using bots to put in links as your answers!!! Please help me with this question! Thanks in advance!Darius makes a shirt for $8. He sells the shirt for $18. By what percentage did Darius increase the cost of the shirt? When walking between rides and attractions, most people walk about 3000 feet in 15 minutes. What is the unit rate in feet per minute? anyone plz help me do this What did you consider as you answered? Check all that apply.Millicent no longer wants to be part of the group.Millicent wants to be free.Millicent thinks about the free birds.Millicent values her friendship with Tracy. a cashier at the supermarket has $685 in 4 different denomination bills in her register at the end of the day. the number of $5 bills was 10 more than 4 times the amount of $10 bills. the register contained as many $1 bills as $5 bills and $10 bills combined, and two $50 bills. how many bills of each kind did the register contain? A fair die is cast four times. Calculatethe probability of obtaining exactly two6's.Round to the nearest tenth of apercent. What do scientists believe drives the evolution of zoonotic diseases such as Ebola? plsplsplsplspslplspspslpslpslpslspl Which best describes RNA?Single-stranded & contains uracil and riboseSingle-stranded & contains thymine and riboseDouble-stranded & contains uracil and riboseSingle-stranded & contains thymine and deoxyribose consider the quadratic equation x^2 + 8x + k = 0 where k is a constant The angle of elevation from a point on the ground to the top of a tower is 36 30'. The angle of elevation from a point 140 feet farther back from the tower is 25 51'. Find the height of the tower. Round your answer to the hundredths place. Shirley is 21 years older than Laura. In six years, Shirley will be twice as old as Laura. How old are they each now? Solve by first creating a system of equations and then solving the system of equations. Be sure to define clearly each variable used. Ann has been diagnosed with hypertension. Which exercise option would her doctor most likely recommend?A. anaerobic exercises such as push-upsB. aerobic exercises such as running and playing basketballC. flexibility exercises such as light stretching and bendingD. resistance training such as lifting weights I need to ask u two question for my Statistics Project. This is more of a survey. can i please get help? 3. Quin eran los criollos? A. Espaoles nacidos en Espaa. B. Personas nacidas en Mxico de padres espaoles. C. Kombres de ejrcito de Mxico. D. Hijos de Espaoles Why do atoms become anion and cations (remember the octet rule and how 8 is a very important number)? A line passes through the point (0,5) and has a slope of -1/2. Which is the equation of the line in slope-intercept form?A) 2x + y = 7B) y = 3x + 5C) y = -2x + 7D) y = -1/2x + 5thank you !!:)