Answer:
Can you give choices.
Explanation:
Consumers who pay more than the minimum payment on credit cards...
are crazy, why pay more than you need to?
O pay less interest in the long run.
O see their credit scores decrease.
are able to buy more things.
Write a method named isVowel that returns whether a String is a vowel (a single-letter string containing a, e, i, o, or u, case-insensitively).public static boolean isVowel(String word){ for(int i=0;i
Answer:
public static boolean isVowel(String word){
for(int i=0;i
char vowels= word.toLowerCase(word.charAt(i));
if (vowels== "a" || vowels == "e" || vowels== "i" || vowels == "o" || vowels == "u" ){
return true;
} else {
return false;
}
}
}
Explanation:
The Java source code analyzes each character in a string object and returns true if it is a vowel letter.
What are two main components to using functions (there are three from you to choose from)? What do each do? Why are they important?
Answer:
function is a self-contained program segment that carries out some specific, well-defined task. Every C program consists of one or more functions. One of these functions must be called main. Execution of the program always begins by carrying out the instructions contained in main. Note that if a program contains multiple functions then their definitions may appear in any order. The same function can be accessed from several different places within a program. Once the function has carried out its intended action, control is returned to the point from which the function was accessed. Generally speaking, a function processes information passed to it from the calling portion of the program, and returns a single value. Some functions, however, accept information but do not return anything.
A function definition has two principal components: the first line (including the argument declarations), and the so-called body of the function.
The first line of a function takes the general form data-type name(type 1 arg 1, type 2 arg 2, ..., type n arg n)
where data-type represents the data type of the item that is returned by the function, name represents the name of the function, and type 1, type 2, ..., type n represent the data types of the arguments arg 1, arg 2, ..., arg n. The allowable data types for a function are:
int for a function which returns an integer value
double for a function which returns an floating-point value
void for a function which does not return any value
The allowable data types for a function's arguments are int and double. Note that the identifiers used to reference the arguments of a function are local, in the sense that they are not recognized outside of the function. Thus, the argument names in a function definition need not be the same as those used in the segments of the program from which the function was called. However, the corresponding data types of the arguments must always match.
The body of a function is a compound statement that defines the action to be taken by the function. Like a regular compound statement, the body can contain expression statements, control statements, other compound statements, etc. The body can even access other functions. In fact, it can even access itself--this process is known as recursion. In addition, however, the body must include one or more return statements in order to return a value to the calling portion of the program.
A return statement causes the program logic to return to the point in the program from which the function was accessed. The general form of a return statement is:
return expression;
This statement causes the value of expression to be returned to the calling part of the program. Of course, the data type of expression should match the declared data type of the function. For a void function, which does not return any value, the appropriate return statement is simply:
return;
A maximum of one expression can be included in a return statement. Thus, a function can return a maximum of one value to the calling part of the program. However, a function definition can include multiple return statements, each containing a different expression, which are conditionally executed, depending on the program logic.
Note that, by convention, the main function is of type int and returns the integer value 0 to the operating system, indicating the error-free termination of the program. In its simplest form, the main function possesses no arguments. The library function call exit(1), employed in previous example programs, causes the execution of a program to abort, returning the integer value 1 to the operating system, which (by convention) indicates that the program terminated with an error status.
The program segment listed below shows how the previous program factorial.c can be converted into a function factorial(n) which returns the factorial (in the form of a floating-point number) of the non-negative integer n:
double factorial(int n)
{
/*
Function to evaluate factorial (in floating-point form)
of non-negative integer n.
*/
int count;
double fact = 1.;
/* Abort if n is negative integer */
if (n < 0)
{
printf("\nError: factorial of negative integer not defined\n");
exit(1);
}
/* Calculate factorial */
for (count = n; count > 0; --count) fact *= (double) count;
/* Return value of factorial */
return fact;
}
Explanation:
In an IPv4 datagram, the fragflag bit is 0, the value of HLEN is 5 (Its unit is word or 32-bits ), the value of total length is 400 bytes and the fragment offset value is 400 (Its unit is 8 bytes). The position of the datagram, the sequence numbers of the first and the last bytes of the payload, respectively are
Answer:
i aint sure
Explanation:
Microsoft Excel is an example of a(n) application.
Answer:
Yes, it is an example of an app. It's downloadable (like apps normally are)
and it works through some of the same coding as an app.
-----------------------------------------------------------------------------------------------------------------Have a nice day person
<3
Microsoft created and released Excel, a spreadsheet program. It is a component of the Microsoft Office productivity software package.
What is the main use of Microsoft Excel?Spreadsheets can be formatted, organized, and computed by Microsoft Excel users.
By structuring data using programs like Excel, data analysts and other users may make information easier to study when it is added or changed. In Excel, the rectangular containers are known as cells, and they are organized into rows and columns.
It has calculating or computing capabilities, graphing tools, pivot tables, and the Visual Basic for Applications macro programming language (VBA). The Microsoft Office program package includes Excel.
Therefore, Microsoft produced Microsoft Excel, a spreadsheet, for Windows, macOS, Android, and iOS.
Learn more about Microsoft Excel here:
https://brainly.com/question/24202382
#SPJ2
A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. Which of the following would BEST meet these requirements?
a. HIDS
b. NIDS
c. NIPS
d. HIPS
Answer:
Option b (NIDS) is the correct choice.
Explanation:
NIDS helps to detect suspicious internet activity. Throughout order to determine all congestion, along with all network packets, unfaithful user information was indeed probably recommended. They were indeed technologies that are already constructively divided up in less than service providers that ineffectively investigate traffic through the systems on something they have been located.All those other available options aren't closely linked to the scenario in question. Therefore this obvious response is the correct one.
QUESTION 1
Which part of an Ethernet Frame uses a pad to increase the frame field to at least 64 bytes?
Answer:
Data field.
Explanation:
In Computer Networking, data encapsulation can be defined as the process of adding a header to a data unit received by a lower layer protocol from a higher layer protocol during data transmission. This ultimately implies that, the header (segment) of a higher layer protocol such as an application layer, is the data of a lower layer such as a transportation layer in the Transmission Control Protocol and Internet Protocol (TCP/IP).
Basically, an Ethernet Frame is one of the IEEE 802.3 data encapsulation standards.
An Ethernet Frame can be defined as the building blocks or bits contained in a single packet of data that is being transmitted over an Ethernet network or connection. When data are transmitted, a frame check sequence (FCS) containing a 4-bytes is used to detect or check for any error in a frame and to ensure no frame data was corrupted in the course of the transmission.
In the transmission control protocol (TCP), all frames that are being transmitted must have a minimum of 64-bytes in length and as such when small packets are encapsulated, some additional bits referred to as pad are typically used to increase the frame size to at least 64-bytes, which is the minimum size.
Hence, a data field is the part of an Ethernet Frame that uses a pad to increase the frame field to at least 64 bytes.
How will Excel summarize the data to create PivotTables? summarize by row but not by column summarize by column but not by row summarize by individual cells summarize by row and by column
Answer:
D. summarize by row and by column
Answer:
D.
Explanation:
What is the definition of an alert?
Answer:
quick to notice any unusual and potentially dangerous or difficult circumstances; vigilant.
Justify the importance of Computer and internet security system.
Cell address A4 in a formula means it is a _________Mixed cell reference
A. Relative cell reference
B. Mixed cell reference
C. Absolute cell reference
D. All of the above
Answer:
A. Relative cell reference.
Explanation:
A relative cell reference is like a pointer to a cell or range of cell in Excel. In Excel all cell references, by default, are relative cell references.
In the given instance, the cell address A4 in a formula means it is a relative cell reference. If there would have been a $ sign before A4, then it will be an absolute cell reference. But since, it is without dollar sign, it is a relative cell reference.
Therefore, option A is correct.
Cartesian Coordinate Robot is sometimes called? *
Answer:
rectilinear
Explanation:
Please Help Me I Need A Better Grade.____________________________ focuses on creating engaging interfaces with well thought out behaviors.
Question 9 options:
A)Information architecture
B)Interface elements
C)Visual design
D)Informational components
E)Interaction design
Answer:
The answer you are looking for is "E.) Interaction design" This design theory focuses on how someone might interact with the system, or fix problems early- it also expresses inventing new ways of doing things.
How would you open the web browser in Linux and still have access to the Linux terminal?
Answer:
Use the command "sensible-browser" I could be wrong I have not used linux in some time.
Explanation:
please tell fast plzzzzzz
Answer:
(1001) =9
(45)= 101101
Which view displays the records in columns and rows like excel worksheet
Answer:
Datasheet View
Explanation:
Chapter 1
A B
Database Template A preformatted database designed for a specific purpose.
Datasheet View The Access view that displays data organized in columns and rows similar to an Excel worksheet.
How much water does the Hill family use per week?
Answer:
The Hill family uses69 pints
Explanation:
bc why not
You are a network technician for a small network. Your ITAdmin workstation just stopped communicating with all other computers in the network. You need to diagnose and fix the problem. The following IP addresses are used in this lab:
Location Computer Name IP Address
Networking Closet CorpServer 172.25.10.10
Office 1 Office 1 172.25.10.60
Office 2 Office 2 172.25.10.61
Support Office Support 172.25.10.62
IT Administration ITAdmin 172.25.10.63
Executive Office Exec 172.25.10.64
Answer:
Ping the other workstations from the IT Admin workstation to confirm that connection has been lost, check the status of the network interface card in the workstation with command ifconfig in the terminal, then reset the connection using ifdown and ifup commands. If the problem is not resolved, check the cable connection.
Explanation:
Ping is an ICMP echo message sent by a network host to another to check for connectivity. If they are connected, the other workstation responds with an ICMP response message.
The ifconfig in Linux systems displays the network adapters and their individual IP configurations. If there is no connection even after the network is reset, then the cable connectors could be the problem.
An instruction for the computer. Many commands put together to
make up algorithms and computer programs.
1. Repeat
2. Command
3. Bug
Answer:
i think its command but not sure
Examples of applying successful visual design principles to bring a web page together are _________________. (Choose all that apply)
Question 2 options:
a)
balance, contrast, and unity
b)
balance, contrast, and similarity
c)
gestalt, unity, and hierarchy
d)
gestalt, scale, and simplicity
e)
balance, control, and dominance
Answer:
I believe it's b
Explanation:
I'm straight
(Numerical Data Representation) How many bits per word are required to represent the following positive decimal integers: a.0 through 100b.0 through 255c.0 through 256d.0 through 10,000,000
Answer:
a. 7 bits
b. 8 bits
c. 9 bits
d. 24 bits
Explanation:
Required
Number of bits per word
The formula to get the number of bits per word is:
[tex]2^n = N[/tex]
Where
n = bits
N = numbers
Solving (a) 0 to 100
There are 101 digits between 0 and 100 (inclusive)
So:
[tex]N = 101[/tex]
Substitute 101 for N in [tex]2^n = N[/tex]
[tex]2^n = 101[/tex]
101 can not be expressed as an exponent of 2.
So, we substitute 101 for the closest number greater than 101 that can be expressed as an exponent of 2.
So:
[tex]2^n = 128[/tex]
Express 128 as an exponent of 2
[tex]2^n = 2^7[/tex]
Apply law of indices
[tex]n = 7[/tex]
Hence, 7 bits are required
Solving (b): 0 through 255
There are 256 digits between 0 and 255 (inclusive)
So:
[tex]N = 256[/tex]
Substitute 256 for N in [tex]2^n = N[/tex]
[tex]2^n = 256[/tex]
Express 256 as an exponent of 2
[tex]2^n = 2^8[/tex]
Apply law of indices
[tex]n = 8[/tex]
Hence, 8 bits are required
Solving (c): 0 through 256
There are 257 digits between 0 and 256 (inclusive)
So:
[tex]N = 257[/tex]
Substitute 257 for N in [tex]2^n = N[/tex]
[tex]2^n = 257[/tex]
257 can not be expressed as an exponent of 2.
So, we substitute 257 for the closest number greater than 101 that can be expressed as an exponent of 2.
So:
[tex]2^n = 512[/tex]
Express 512 as an exponent of 2
[tex]2^n = 2^9[/tex]
Apply law of indices
[tex]n = 9[/tex]
Hence, 9 bits are required
Solving (d): 0 through 10000000
There are 10000001 digits between 0 and 10000000 (inclusive)
So:
[tex]N = 10000000[/tex]
Substitute 10000000 for N in [tex]2^n = N[/tex]
[tex]2^n = 10000000[/tex]
10000000 can not be expressed as an exponent of 2.
So, we substitute 10000000 for the closest number greater than 101 that can be expressed as an exponent of 2.
So:
[tex]2^n = 16777216[/tex]
Express 16777216 as an exponent of 2
[tex]2^n = 2^{24[/tex]
Apply law of indices
[tex]n = 24[/tex]
Hence, 24 bits are required
Question 3 of 10
How is plagiarism both easier and harder in the Internet age?
A. It is both easier and harder because you are never sure what is
copyrighted and what is public domain.
OB It is easier because people dont really expect you to follow the
copyright regulations. It is harder to find exactly what you want.
It is easier because you there are too many sources for teachers
to know them all, it is harder because you will be caught.
Dit is easier because you have access to more information. It is
harder to get away with because anyone can conduct a word-
Answer: D is your answer
Plagiarism is copying someone's work
Plagiarism both easier and harder in the Internet age because you have access to more information. It is harder to get away with because anyone can conduct a word D is your answer
Answer:
The answer you are looking for would be "B.) It is easier because people don't really expect you to follow the copyright regulations, but it is harder to find exactly what you want." When you look a question up for an essay, summary, or even a test, the answer you need may not always be on the web, and you may need to visit several different websites to mash together a conclusion on your topic. However, people often copy topics nowadays, and it is easier for them to change a few words and get away with it then every before. Teachers have become much more lenient, therefore it is much easier to plagiarize something.
what is star topology
explain the relevancy of computers in today's global society
Write a program that asks the user to enter a series of single digit numbers with nothing separating them. Read the input as a C-string or a string object. The program should display the sum of all the single-digit numbers in the string. For example, if the user enters 2514, the program should display 12, which is the sum of 2, 5, 1, and 4. The program should also display the highest and lowest digits in the string.
Answer:
#include <stdio.h>
#include <string.h>
int main(){
char number[100];
printf("Number: ");
scanf("%s", number);
int sum = 0;
for(int i =0;i<strlen(number);i++){
sum+= number[i] - '0';
}
printf("Sum: %d",sum);
return 0;
}
Explanation:
This declares a c string of 100 characters
char number[100];
This prompts user for input
printf("Number: ");
This gets user input
scanf("%s", number);
This initializes sum to 0
int sum = 0;
This iterates through the input string
for(int i =0;i<strlen(number);i++){
This adds individual digits
sum+= number[i] - '0';
}
This prints the calculated sum
printf("Sum: %d",sum);
return 0;
The program that ask the user to enter a series of single digit number and display the sum of all the single digit number, highest number and lowest number is as follows:
x = input("input the series of number: ")
y = []
for i in x:
y += i
integer_map = list(map(int, y))
print(sum(integer_map))
print(max(integer_map))
print(min(integer_map))
The code is written in python.
Code explanation:The first line of code ask the user for the series of numbers. The user input is stored in the variable "x"The y variable is an empty arraywe use the for loop to loop through the users series of number. Then add the looped items to the empty array.Then we map the string of list to an integersFinally, we print the sum , maximum and minimum number of the list.learn more on python program: https://brainly.com/question/16025032?referrer=searchResults
R6. Suppose N people want to communicate with each of N - 1 other peo- ple using symmetric key encryption. All communication between any two people, i and j, is visible to all other people in this group of N, and no other person in this group should be able to decode their communication. How many keys are required in the system as a whole
Answer:
N(N-1)/2
Explanation:
You would need a symmetric key for each pair of people, so you need the number of pairs.
Mathematically this can be written as
[tex]_NC_2 = \frac{N!}{2!(N-2)!} = \frac{N(N-1)}{2}[/tex]
Question 5
2 pts
The type of control structure that
causes a branch forward at some
point, causing a portion of the
program to be skipped, is:
a selection structure.
O a seguential structure
a repetition structure
a loop structure
Answer:
Selection structure.
Explanation:
In a decision structure (selection structure), there is a branch forward at some point, which causes a portion of the program to be skipped. A loop structure (repetition structure) contains a branch to a previous statement in the program module, which results in a block of statements that can be executed many times.
Match the IP Protections Patent, Copyright and Trademark into the following cases:
a. books, poems
b. music, movies, paintings
c. company logo
d. software
e. combinations of materials to make drugs
Answer:
A) copyright
B) copyright
C)Trade mark
D) copyright
E)Patent
Explanation:
Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.
trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.
Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.
Below is the match of the intellectual property with the examples.
a. books, poems<> Copyright
b. music, movies, paintings<> Copyright
c. company logo<> Trademark
d. software<>Copyright
e. combinations of materials to make drugs<> patent
g Write a program that allows a user to input any text in your program. Using the tools that we have discussed, your program should output how many unique words were in the input and then output how many words were unique.
Answer:
Explanation:
The following function/program is written in Java. It asks the user for a sentence as an input and then splits that sentence into an array of words. Then it creates an arrayList for all of the unique words, comparing each word in the sentence with all of those in the ArrayList. If a word is found in the ArrayList it cancels the loop and moves on the next word in the sentence. Finally, it counts all of the unique words in the ArrayList and prints that total to the screen.
public static void uniqueWords() {
Scanner in = new Scanner(System.in);
System.out.println("Enter a sentence:");
String sentence = in.nextLine();
String words[] = sentence.split(" ");
ArrayList<String> uniqueWords = new ArrayList<>();
for (int x = 0; x < words.length; x++) {
boolean exists = false;
for (int i = 0; i < uniqueWords.size(); i++) {
if (words[x].equals(uniqueWords.get(i))) {
exists = true;
break;
}
}
if (exists == false) {
uniqueWords.add(words[x]);
}
}
System.out.println(uniqueWords.size());
}
17. Write a SELECT query for the palateE4 database that produces a result grid listing paintName, and a count of the occurrences of each paintName value where the count for each paintName is greater than 2. Sort the result grid in ascending sequence by paintName.
Answer:
SELECT paintname, COUNT(paintname) as count_paintname
FROM paint
GROUP BY paintname HAVING COUNT(paintname) > 2
ORDER BY paintname
Explanation:
The structured query language or SQL statement returns two columns of paintname and the count of the distinct paint names in the paint table with rows of grouped paint names greater than two and in the ascending order of the names.