Answer:
1. for what purpose?
2. the pattern design of web
3. what the client wants to add in the web
4. his contact number and email
5. the logo of the business
6. talk about pricing
Explanation:
Discusstheimportanceofbackingupdatainorganizations,pointingoutthebenefits
ofcloudbackupoption
Addition helps kids master the relationships between numbers and understand how quantities relate to one another. Even when kindergartners can't reliably answer addition problems or manipulate large numbers, basic addition skills give them a framework for mastering math in elementary schoo
Consider a model of a drone to deliver the orders of the customers within the range of 20 km of the coverage area.
Identified at least 5 factors (inputs) required to experiment with the above mention system model (e.g. speed of the drone).
Write down the levels (range or setting) for each factor mentioned above. (e.g. speed ranges from 10km/h to 30km/h).
On what responses (results) will you analyses the experiment’s success or failure (e.g. drone failed to deliver the package on time), mention at least 3 responses
Answer:
Explanation:
suna shahani kesa a ..
web analytics can tell you many things about your online performance, but what can analytics tools not tell you
Answer:
The answer is below
Explanation:
While web analytics such as Góogle analysts is known to help online marketers to map out a clear strategy and thereby improve their outreach, there are still some specific things the current web analytics can not do for the user. For example:
1. Web Analytics can’t accurately track leads
2. Web Analytics can’t track lead quality
3. Web Analytics can’t track the full customer journey
4. Web Analytics can’t highlight the true impact of payment.
Phone numbers and PIN codes can be easier to remember when you find words that spell out the number on a standard phone keypad. For example, instead of remembering the combination 2633, you can just think of CODE. Write a recursive function that, given a number, yields all possible spellings (which may or may not be real words).
Answer:
Explanation:
The following is written in Python and the code first creates a simulated keypad with all the characters. Then the function detects the number passed as an input argument and outputs all the possible spelling combinations.
keypad = {
'2': 'abc',
'3': 'def',
'4': 'ghi',
'5': 'jkl',
'6': 'mno',
'7': 'pqrs',
'8': 'tuv',
'9': 'wxyz',
}
def word_numbers(number):
number = str(number)
wordList = ['']
for char in number:
letters = keypad.get(char, '')
wordList = [prefix+letter for prefix in wordList for letter in letters]
return wordList
Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO THE RIGHT ANSWER
aspect-oriented
data-oriented
fourth-generation
logic-based
Answer:
I think it is fourth-generation.
Explanation:
Explain what an IM is, and what is the technology shown in the accompanying figure
Answer: Instant Message
Explanation:
Answer:the technology that is shown is a ch't rooms, a website or application that permits users to ch't with others who are online at the same time. as you type others can see what you type may i get brainiest plz
Explanation:
Can someone help me with this lab assignment? I really do not know what should I do?
This assignment
The program you wrote in Stacks 1 is incomplete. Without a destructor it creates a memory leak. A destructor has been defined in this program but it is incorrect. To visualize how the destructor works, a cout statement has been added. Fix the errors, including the cout statement, to display the value in each node of the stack before releasing the memory.
Write a loop in main() to enter an unknown number of positive integers. The loop stops when you enter 0 or a negative number. As you are entering integers, they are to be pushed onto a stack.
Ex.: If the user enters '10 20 30 -1` the output (from the destructor) should be:
30 - deleted!
20 - deleted!
10 - deleted!
Empty stack!
Ex.: If the user enters '-1` the output should be:
Empty stack!
This is the code:
#include
using namespace std;
class Stack_int
{
private:
// Structure for the stack nodes
struct StackNode {
int value; // Value in the node
StackNode *next; // Pointer to next node
};
StackNode *top; // Pointer to the stack top
int length; // Number of nodes
public:
Stack_int(){ top = NULL; length = 0; } //Constructor
~Stack_int(); // Destructor
// Stack operations
// bool isEmpty();
bool push(int);
// int pop();
// int peek();
// int getLength();
};
/**~*~*
Member function push: pushes the argument onto the stack.
*~**/
bool Stack_int::push(int item)
{
StackNode *newNode; // Pointer to a new node
// Allocate a new node and store num there.
newNode = new StackNode;
if (!newNode)
return false;
newNode->value = item;
// Update links and counter
newNode->next = top;
top = newNode;
length++;
return true;
}
/**~*~*
Destructor
*~**/
Stack_int::~Stack_int()
{
StackNode *currNode;
// Position nodePtr at the top of the stack.
currNode = top;
// Traverse the list deleting each node.
while (currNode)
{
cout << currNode->value << " - deleted!" << endl;
delete currNode;
currNode = NULL;
currNode = currNode->next;
}
cout << "Empty stack!" << endl;
}
int main() {
Stack_int s;
int item;
return 0;
}
Answer:
your question is too long to read
Explanation:
try explaining it in fewer words
8.9 Lesson Practice edhesive
Answer:
1. search
2. False
3. Our algorithm did not find the element we were looking for.
Explanation:
help asapp!!!!!! give the technical name means (write the name in one word) . the feature of virus which copies itself..
Answer:
if a computer is made out of many copies it can cause a virus with a definition of a tro Jan by a virus
Explanation:
what follows is a brief history of the computer virus and what the future holds for this once when a computer is made multiple copies of it's so several reducing malicious intent here but animal and prevade fit the definition of a Trojan buy viruses worms and Trojans paint the name Malwar as an umbrella term
Question 4
What methods do phishing and spoofing scammers use? List and explain methods to protect
against phishing and spoofing scams. (10 marks
Answer:
The answer is below
Explanation:
There are various methods of phishing and spoofing scammers use, some of which are:
Phishing:
1. Descriptive phishing: here the scammer use fake email to pretend to be a genuine company and steal people's vital details
2. Spear Phishing: here the scammer creates an email that appears there is a connection on the potential victim
3. CEO Fraud: here the scammer target CEO of a company, thereby if successful can fraudulently attack the company due to his access.
Other phishing attacks are vishing, smishing, and pharming, etc.
Spoofing:
1. Email spoofing: here the attacker sends an email through a fake email address to get personal details of a potential victim
2. Caller ID Spoofing: here the attacker makes it appear that he is one specific person, but he is not in the real sense.
3. GPS Spoofing: here the attacker makes it appear he is in a specific location, whereas, he is not.
Others include website spoofing, text message spoofing, Io spoofing etc.
Which of the following enables robots to do things such as understand itself, walk, talk, and develop skills?
Group of answer choices
self-modeling
gigabit ethernet
political awareness
social distancing
binary verificationism
Answer:
self-modeling
Explanation:
Robots, which are man-made machines which mimics the actions of man like walking, talking, rendering assistance are part of the future plans to make the society easier. It was mans' attempt to improve the society but still happens to be work in progress.
For the robots to be able to carryout its function, there is need for it to be self modelling in the sense of initiating and executing the commands which was already programmed into it. For example, telling it to walk will be initiated by him as a command, after processing the command, it will execute it without any other information.
For two integers m and n, their GCD(Greatest Common Divisor) can be computed by a recursive function. Write a recursive method gcd(m,n) to find their Greatest Common Divisor. Once m is 0, the function returns n. Once n is 0, the function returns m. If neither is 0, the function can recursively calculate the Greatest Common Divisor with two smaller parameters: One is n, the second one is m mod n. Although there are other approaches to calculate Greatest Common Divisor, your program should follow the instructions of this question, otherwise you will not get the credit. Then write a testing program to call the recursive method.
Answer:
In Python:
def gcd(m,n):
if n == 0:
return m
elif m == 0:
return n
else:
return gcd(n,m%n)
Explanation:
This defines the function
def gcd(m,n):
If n is 0, return m
if n == 0:
return m
If m is 0, return n
elif m == 0:
return n
If otherwise, calculate the gcd recursively
else:
return gcd(n,m%n)
To call the function to calculate the gcd of say 15 and 5 from main, use:
gcd(15,5)
Ling has configured a delegate for her calendar and would like to ensure that the delegate is aware of their permissions. Which option should she configure?
Delegate can see my private Items
Tasks > Editor
Inbox > None
Automatically send a message to delegate summarizing these permissions
Answer:
Tasks>Editor (B)
Explanation:
I just did the test
Answer:
Tasks > Editor
Explanation:
Did the test
How can the adoption of a data platform simplify data governance for an organization?
Answer:
by implementing models that predict compliance with data protection and data privacy policies.
Explanation:
A data platform is an IT system that helps an organization to organize, control and coordinate a large volume of data with the aim of making organizational systems faster and optimizing the decision-making process with effective strategic solutions for organizational success .
A database can simplify data governance for an organization by the fact that data is available to users determined by the organization itself, which increases the security and control of business-critical data.
why do we need to settle technology in business?
Answer:
Technology has important effects on business operations. No matter the size of your enterprise, technology has both tangible and intangible benefits that will help you make money and produce the results your customers demand. Technological infrastructure affects the culture, efficiency and relationships of a business.
State
any three (3) reasons why users attach speakers to their computer?
Answer:
To complete the computer setup, to hear audio, to share audio.
Explanation:
A computer is not really complete without speakers.
So that you can actually hear the computer's audio.
So that you can have multiple people hear the same audio. (Headphones do not do this)
In which category would Jamal most likely find an appropriate template for his report?
Designs
Diagrams
Education
Personal
Answer:
Education
Explanation:
what is the relationship between a base and the number of symbols in a positional number system?
Answer:
the value of a symbol is given by the weight of it's position expressed in the bases of the system (or radices)
IPSec or internet Protocol Security is an extension of the Internet Protocol. What does IPSec use to provide network security?
Answer:
In computing, Internet Protocol Security ( IPSec ) is a secure network protocol suite that authenticates and encrypts the packets of data to provide secure encrypted communication between two computers over on internet protocol network. It is used in virtual private networks ( VPNs ).
Three reasons why users attach speakers to their computers.
Answer:
Iv'e answered this question 2 times already lol. The purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.
Explanation: I hope this helps!
What are some examples and non-examples of digital etiquette?
Answer:
saying hello to strangers and standing up to cyber bullies
using all caps. cyber bullying. cursing. stalking
dont download that file
Which item can you add using the tag?
OA.
a movie
OB.
an image
OC.
a documentary
OD.
a music file
Answer:
The answer to this would be D: A music file
Explanation:
Since this tag is is <audio>, all of the other ones are visual and have sound. This means that a tag would need to be able to display visuals as well. Making a music file the only item you would be able to include with the given tag.
unanswered questionl
¿ ? ¿ ? Whattttt ? ¿ ? ¿
Answer: What
Explanation:
For this lab you will write a class to create a user-defined type called Shapes to represent different shapes, their perimeters and their areas. The class should have three fields: shape, which is of type string, and perimeter and area of type double. The program will have to be able to calculate perimeters and areas for circles, triangles, squares and rectangles, which are the known shapes.
2.1 Constructors
Write these constructors:
1. Default constructor that sets the shape to "unknown" and the perimeter and area to 0
2. Constructor with one parameter, shape, that sets the shape, other fields are 0
2.2 Accessors & Mutators
Write the following member methods:
1. setShape()
Modifies the shape field
2. getShape()
Returns the shape field
3. getPerimeter()
Returns the perimeter field
4. getArea()
Returns the area field
Arithmetic Methods in Interface
Write the following member methods to perform arithmetic:
1. setPerimeter(Scanner scnr)
Depending on the shape, prompts the user for appropriate variables (ie width & height for a square, radius for a circle, etc.) and calculates the perimeter of the appropriate shape. The perimeter field should be updates with the new value. If the shape is unknown, then print to the screen that the user must first define a shape before a perimeter can be calculated and set the perimeter to 0.
2. setArea(Scanner scnr)
Depending on the shape, prompts the user for appropriate variables (ie width & height for a square, radius for a circle, etc.) and calculates the area of the appropriate shape. The area field should be updates with the new value. If the shape is unknown, then print to the screen that the user must first define a shape before an area can be calculated and set the area to 0.
2.3 Additional Methods
Create two additional methods of your choice. Be sure to clearly label both of these methods as your own.
2.4 Using another .java file called ShapesTest.java that tests that all of your methods work correctly
========= Shape.java ===========
//import the Scanner class
import java.util.Scanner;
public class Shape{
//required fields
private String shape;
private double area;
private double perimeter;
//default constructor
public Shape(){
this.shape = "unknown";
this.area = 0.0;
this.perimeter = 0.0;
}
//constructor with one parameter
public Shape(String shape){
this.setShape(shape);
this.area = 0.0;
this.perimeter = 0.0;
}
//accessors and mutators
public void setShape(String shape){
this.shape = shape;
}
public String getShape(){
return this.shape;
}
public double getPerimeter(){
return this.perimeter;
}
public double getArea(){
return this.area;
}
public void setPerimeter(Scanner scr){
if(this.getShape().equals("circle")){
System.out.println("Enter the radius of the circle");
double radius = scr.nextDouble();
this.perimeter = 2 * 3.142 * radius;
}
else if(this.getShape().equals("rectangle")){
System.out.println("Enter the width");
double width = scr.nextDouble();
System.out.println("Enter the height");
double height = scr.nextDouble();
this.perimeter = 2 * (width + height);
}
else if(this.getShape().equals("square")){
System.out.println("Enter the height or width");
double height = scr.nextDouble();
this.perimeter = 4 * height;
}
else if(this.getShape().equals("unknown")){
System.out.println("You must define a shape first before calculating perimeter");
this.perimeter = 0.0;
}
else {
System.out.println("You must define a shape first before calculating perimeter");
this.perimeter = 0.0;
}
}
public void setArea(Scanner scr){
if(this.getShape().equals("circle")){
System.out.println("Enter the radius of the circle");
double radius = scr.nextDouble();
this.area = 3.142 * radius * radius;
}
else if(this.getShape().equals("rectangle")){
System.out.println("Enter the width");
double width = scr.nextDouble();
System.out.println("Enter the height");
double height = scr.nextDouble();
this.area = width * height;
}
else if(this.getShape().equals("square")){
System.out.println("Enter the height or width");
double height = scr.nextDouble();
this.area = height * height;
}
else if(this.getShape().equals("unknown")){
System.out.println("You must define a shape first before calculating area");
this.area = 0.0;
}
else {
System.out.println("You must define a shape first before calculating area");
this.area = 0.0;
}
}
//Own methods
//1. Method to show the properties of a shape
public void showProperties(){
System.out.println();
System.out.println("The properties of the shape are");
System.out.println("Shape : " + this.getShape());
System.out.println("Perimeter : " + this.getPerimeter());
System.out.println("Area : " + this.getArea());
}
//2. Method to find and show the difference between the area and perimeter of a shape
public void getDifference(){
double diff = this.getArea() - this.getPerimeter();
System.out.println();
System.out.println("The difference is " + diff);
}
}
========= ShapeTest.java ===========
import java.util.Scanner;
public class ShapeTest {
public static void main(String [] args){
Scanner scanner = new Scanner(System.in);
// create an unknown shape
Shape shape_unknown = new Shape();
//get the shape
System.out.println("The shape is " + shape_unknown.getShape());
//set the area
shape_unknown.setArea(scanner);
//get the area
System.out.println("The area is " + shape_unknown.getArea());
//set the perimeter
shape_unknown.setPerimeter(scanner);
//get the perimeter
System.out.println("The perimeter is " + shape_unknown.getPerimeter());
// create another shape - circle
Shape shape_circle = new Shape("circle");
//set the area
shape_circle.setArea(scanner);
//get the area
System.out.println("The area is " + shape_circle.getArea());
//set the perimeter
shape_circle.setPerimeter(scanner);
//get the area
System.out.println("The perimeter is " + shape_circle.getArea());
//get the properties
shape_circle.showProperties();
//get the difference between area and perimeter
shape_circle.getDifference();
}
}
Sample output:
The shape is unknown
You must define a shape first before calculating area
The area is 0.0
You must define a shape first before calculating perimeter
The perimeter is 0.0
Enter the radius of the circle
>> 12
The area is 452.448
Enter the radius of the circle
>> 12
The perimeter is 452.448
The properties of the shape are
Shape : circle
Perimeter : 75.408
Area : 452.448
The difference is 377.03999999999996
Explanation:
The code above is written in Java. It contains comments explaining important parts of the code. Please go through the code for more explanations. For better formatting, the sample output together with the code files have also been attached to this response.
Write a C++ function for the following:
Suppose that Account class has a method called withdraw, which will be inherited by Checking and Savings class. The withdraw method will perform according to account type. So, the late bind is needed. Declare the withdraw method in Account class. The method should take a double input as withdraw amount and output true if the withdraw successfully and false if the withdraw unsuccessfully.
Solution :
class Account
[tex]$ \{ $[/tex]
public:
[tex]$\text{Account}()$[/tex];
double [tex]$\text{getBalance}$[/tex]();
void [tex]$\text{setBalance}$[/tex]();
[tex]$\text{bool withdraw}$[/tex](double bal);
[tex]$\text{private}:$[/tex]
double [tex]$\text{balance}$[/tex];
}:
[tex]$\text{Account}()$[/tex] {}
double [tex]$\text{getBalance}$[/tex]()
[tex]$ \{ $[/tex]
[tex]$\text{return balance}$[/tex];
}
void [tex]$\text{setBalance}$[/tex](double [tex]$\text{balance}$[/tex])
[tex]$ \{ $[/tex]
this.[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex];
}
[tex]$\text{boolean}$[/tex] withdraw([tex]$\text{double bal}$[/tex])
[tex]$ \{ $[/tex]
if([tex]$\text{balance}$[/tex] >= bal)
[tex]$ \{ $[/tex]
[tex]$\text{balance}$[/tex] = [tex]$\text{balance}$[/tex] - bal;
[tex]$\text{return}$[/tex] true;
}
[tex]$\text{return}$[/tex] false;
}
}
els
2.4
The SPCA receives an amount of R8 500 per annum from an undisclosed
donor. The amount has been growing at a rate of 7.5% per annum
IE
REQUIRED
Calculate how much the donor must have invested as a lump sum to be able
to continue with these payments indefinitely.
(2)
Answer:
ds2d2d2d2dd
Explanation:
what is the determinant of the identity matrix I?
Answer:
Explanation:
The ith column of an identity matrix is the unit vector ei (the vector whose ith entry is 1 and 0 elsewhere) It follows that the determinant of the identity matrix is 1, and the trace is n. When the identity matrix is the product of two square matrices, the two matrices are said to be the inverse of each other.
The city of Green Acres is holding an election for mayor. City officials have decided to automate the process of tabulating election returns and have hired your company to develop a piece of software to monitor this process. The city is divided into five precincts. On election day, voters go to their assigned precinct and cast their ballots. All votes cast in a precinct are stored in a data file that is transmitted to a central location for tabulation.
Required:
Develop a program to count the incoming votes at election central.
Answer:
Explanation:
The following program asks the user to enter the precinct number and then loops to add votes until no more votes need to be added. Then it breaks the loop and creates a file called results to save all of the results for that precinct.
precinct = input("Enter Precinct Number: ")
option1 = 0
option2 = 0
while True:
choice = input("Enter your vote 1 or 2: ")
if int(choice) == 1:
option1 += 1
else:
option2 += 1
endVote = input("Vote again y/n")
if endVote.lower() != 'y':
break
f = open("results.txt", "w")
f.write("Precinct " + precinct + ": \nOption 1: " + str(option1) + "\nOption 2: " + str(option2))
What is the first thing you should do when you discover a computer is infected with malware? The second thing?
Answer:
Quarantine the computer.
Explanation:
Malware can be characterized with negative software capable of causing various damages to a computer, such as theft of data and information, in addition to damage to devices.
In order to avoid having your computer infected with malware, it is essential to have installed reliable malware-checking software, in addition to taking all appropriate security measures when accessing the internet and never clicking on unknown or suspicious links.
Therefore, when realizing that the computer has been infected by malware, it is necessary to quarantine the computer and immediately disconnect from a network so that it does not infect other computers. The quarantine acts as an action where the infected file is moved to an encrypted folder where the malware cannot be executed and spread by the operating system.
Which best describes the possible careers based on
these employers?
Yoshi worked in Logistics Planning and Management
Services, Dade worked in Sales and Service, Lani
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation, and Miki
worked in Transportation Operations.
Yoshi worked in Transportation Operations, Dade
worked in Logistics Planning and Management
Services, Lani worked in Sales and Service, and Miki
worked in Transportation Systems/Infrastructure
Planning, Management, and Regulation
Yoshi worked in Health, Safety, and Environmental
Management, Dade worked in Transportation
Operations, Lani worked in Facility and Mobile
Equipment Maintenance, and Miki worked in
Warehousing and Distribution Center Operations.
Answer:
It's c bodie I'm fr on this question rn lol
Answer:
the guy above is right, its c
Explanation:
edge 2021