Answer:
Table
Explanation:
Microsoft Access uses an object called a _____ to enter and organize data.
The answer is table.
write a short paragraph (three to four sentences) that explains how it works for computers and internet communications in relation to cybersecurity.
Answer:
Public and private keys form the basis for public key cryptography, also known as asymmetric cryptography. In public key cryptography, every public key corresponds to only one private key. Together, they are used to encrypt and decrypt messages. If you encode a message using a person’s public key, they can decode it using their matching private key.
Explanation:
Change up the wording.
Tim Berners-Lee cultivated a way to interconnect and self-index data. He made a major contribution to the development of the Internet by creating _____.
A. graphic data
B. emoticons
C. the hyperlink
D. digital data
"""
Multiply.py - This program prints the numbers 0 through 10 along
with these values multiplied by 2 and by 10.
Input: None.
Output: Prints the numbers 0 through 10 along with their values multiplied by
2 and by 10.
"""
head1 = "Number: "
head2 = "Multiplied by 2: "
head3 = "Multiplied by 10: "
NUM_LOOPS = 10 # Constant used to control loop.
print("0 through 10 multiplied by 2 and by 10" + "\n")
# Initialize loop control variable.
# Write your counter controlled while loop here
# Multiply by 10.
# Multiply by 2.
print(head1 + str(numberCounter))
print(head2 + str(byTwo))
print(head3 + str(byTen))
# Next number.
Summary
In this lab, you use a counter-controlled while loop in a Python program. When completed, the program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. The data file contains the necessary variable declarations and output statements.
Instructions
Make sure the file Multiply.py is selected and opened.
Write a counter-controlled while loop that uses the loop control variable (numberCounter) to take on the values 0 through 10.
In the body of the loop, multiply the value of the loop control variable by 2 and by 10. Remember to change the value of the loop control variable in the body of the loop.
Execute the program by clicking the "Run Code" button at the bottom of the screen.
What type of system software manages memory?
Answer:
"Operating System"
Explanation:
The type of system software that manages memory is an operating system. To manage memory, the operating system employs a number of software strategies.
What is system software?The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer.
You can converse with the computer using this method even if you don't understand its language. Memory connections are the structures that come before and after all memory areas, whether they are allocated or available.
Working memory, short-term memory, and long-term memory are the three primary categories of memory. While long-term memory stores your enduring memories, working memory and short-term memory enable you to retain and use transient information.
Therefore, an operating system is a sort of system software that controls memory.
To learn more about system software, refer to the link:
https://brainly.com/question/12908197
#SPJ2
During boom times, which of the
following is true?
A. less tax revenue is being paid by businesses
B. less tax revenue is being paid by consumers
C. more tax revenue is being collected from businesses
and consumers
D. tax increases are causing unemployment and job
loss
During boom times, the option that was true is that less tax revenue is being paid by businesses.
How does the taxation system can boom a economy?The use of taxation is one that affect incentives, as taxes can influence supply and demand factors.
Note that by lowering marginal tax rates on wages and salaries, can bring about the zeal for people to work more and earn more.
Therefore, During boom times, the option that was true is that less tax revenue is being paid by businesses.
Learn more about boom times from
https://brainly.com/question/26020324
#SPJ2
Please hurry, it's a test! 30 POINTS. :)
What computing and payment model does cloud computing follow?
Cloud computing allows users to_____ computing resources and follows the ______
payment model.
1. Buy, Own, Rent, Sell
2. pay-as-you-go, pay-anytime-anywhere, pay-once-use-multiple-times
Consider our authentication protocol 4.0, in which Alice authenticates herself to Bob, which we saw works well (i.e., we found no flaws in it.). Now suppose that at the same time that Alice authenticates herself to Bob, Bob must authenticate himself to Alice. Give a scenario by which Trudy, pretending to be Alice, can now authenticate herself to Bob as Alice.
Implement a class named BankAccount. Every bank account has a starting balance of $0.00. The class should implement methods to accept deposits and make withdrawals. __init__(self): Sets the balance to 0. deposit(self, amount): Deposits money. Return True if transaction is successful. Return False if amount is less than 0 and ignore the transaction. widthdraw(self, amount): Withdraws money. Return True if transaction is successful. Return False if amount is more than the balance and ignore the transaction.
The BankAccount class implementation in Python 3.8 is found in the attached image
The deposit method uses an if statement to check if the amount to be deposited is negative. If so, it does nothing, but returns False signifying that the transaction failed.
However, if the test finds out that the amount to deposit is positive or zero, the deposit method increments the balance, then returns True, signifying a successful transaction.
The withdraw method is similar, but this time, it tests if the amount to be withdrawn is greater than the available balance. If so, it ignores the transaction, and returns False.
If the withdrawal amount is less or equal to the available balance, the withdraw method decrements the available balance, then returns True, signifying a successful transaction.
Learn more about Python programming here https://brainly.com/question/20379340
challenge encountered
Answer:
What challenge?
Explanation:
List and explain three ways study groups benefit your learning.
Answer:
Studying in groups can have many effective outcomes and be beneficial. Here are some ways studying in a group is benefical,
1. More support, limits chances of procrastination
With many people, everyone is assigned a role or there is more determination by all peoples to get the work done than an individual being the only one responsible than many trying to accomplish the completion of the project.
2. More people means more parts can get done effectively and taking notes is easier.
More people allow the work (depending on the project of assignment) for the work to get more focused and worked on faster with the designated roles given.
3. More interactive and allows (sometimes an enjoyable times) and to even learn faster than independently.
People, not all however, might like the company, there's support and even people skills is enhanced by being in the group.
Which meter would you use to determine which lamp is defective in the shortest possible time? Explain how you would use this meter and why.
Answer:
bla bla bla bla
Explanation:
I dont anther stand
List the four types of computer cases
Answer:
full-tower, mid-tower, mini-tower, and SFF(Small Factor Form).
I hope it helps.
Consider the following declaration:
String s = "cat";
Which of the following statements assigns the number of characters in s to k?
A. int k = s.length;
B. int k = s.length();
C. int k = s.size;
D. int k = s.size();
Consider the following declarations:
String s1 = "apple";
String s2 = "apple";
What is the result of s1.compareTo(s2)?
A. true
B. false
C. 0
D. 1
Consider the following declarations:
String s1 = "apple";
String s2 = "APPLE";
Which of the following expressions is true?
A. s1.equals(s2) && s1.equalsIgnoreCase(s2)
B. !s1.equals(s2) && s1.equalsIgnoreCase(s2)
C. s1.equals(s2) && !s1.equalsIgnoreCase(s2)
D. !s1.equals(s2) && !s1.equalsIgnoreCase(s2)
Answer:
B, C, B
Explanation:
According to my understanding of these questions, these are in Java.
For the first one, there is a built in function called .length() for a string, so it's answer B.
For the second one, this should come out as C, 0 since compareTo compares the ascii values of the characters.
The third one's answer should be B. s1.equals(s2) for characters that are caps and not caps comes out with false, so ! would negate it. s1.equalsIgnoreCase(s2) would come out as true, ignoring the cases of APPLE.
This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI
Answer:
GUI
Explanation:
seven characteristics of information
Answer:
1.Accuracy and Precision.
2.Legitimacy and Validity.
3.Reliability and Consistency.
4.Timeliness and Relevance.
5.Completeness and Comprehensiveness.
6.Availability and Accessibility.
7.Granularity and Uniqueness.
Explanation:
#carry on learning
what was the pascaline used for?
Answer:
Math like multiplication, addition, division, and subtraction
In the context of the data administration component of a database management system (DBMS), the acronym CRUD stands for _____.
CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete.
CRUD is an acronym in database management system (DBMS) that stands for Create, Read, Update, and Delete. It is the four basic functions of persistent storage.
CRUD operations are foundation operations every database developer and administrator needs to understand.
Find out more on CRUD at: https://brainly.com/question/651396
Write a program to repeatedly read integers from the standard input until it reads "-1" and exits. For each number before "-1," if it is positive and odd, do the following:
Answer:
#include <stdio.h>
int main() {
int p=0, n=0, z=0, inp=0;
printf("How do I write a C program to read numbers until -1 "
"is encountered and also count the number of positive, negative, "
"zeroes encountered by users using a while loop?\n\n\n");
printf("Enter an integer (-1 to quit): ");
scanf("%d",&inp);
while(inp != -1) {
if(inp > 0) p++;
else if(inp < 0) n++;
else z++;
printf("\nEnter next integer (-1 to quit): ");
scanf("%d",&inp);
}
n++; /* -1 is also a -ve number */
printf("You have entered ...\n");
printf("\t\tPositive numbers: %d\n",p);
printf("\t\tNegative numbers: %d\n",n);
printf("\t\t Zeroes: %d\n",z);
}
Explanation:
What is it called when a unique letter is assigned to a shared drive
Answer:
Assigning a drive letter to a network drive is called mapping the drive, or linking the drive, by network nerds.
Explanation:
A(n) __________ is a system where banks in the United States eventually figured out that they could print more __________ than the gold that they had in their vaults.
Based on the information given regarding money, the correct option will be fractional reserve; paper money.
It should be noted that in the United States, there are banking institutions that hold reserves which is simply the fraction of deposits of other banks.
The fractional reserve is equal to the fraction of the bank's deposit liabilities that are owed to customers.
Therefore, a fractional reserve is a system where banks in the United States eventually figured out that they could print more paper money than the gold that they had in their vaults.
Learn more about money on:
https://brainly.com/question/24556197
Compare and contrast the android and windows operating systems
what does PR stand for ?
Answer:
Public Relations or Pull Request (computer programming)
Explanation:
Hope this helps
what is office course
how to learn office course
Answer:
It includes Word, to create, polish, and share documents; Excel, to analyze and visualize data; PowerPoint, to create, collaborate, and effectively present ideas; OneNote, to organize ideas into a digital notebook; Outlook, to organize email, coordinate schedules, and stay up to date with contacts; Access, to create .Hope this helps you XD ✌️What was the main limitation of computer networking that the invention of the Robert website of the 1990s
Answer:
The TCP/IP protocol could only be used in universities, governments, and businesses. People around the world could not send data to one another.
how to download film
Apart from using secure networks, how else can Dhruv keep his deliverables safe in the office and on the go? Select all that apply.
It should be noted that data can be secured when working in the following way:
Establishing a cyber security policy.Using two-factor authentication.Keeping passwords strong.Using secure internet connections.Your information is incomplete. Therefore, an overview relating to the topic will be given. It should be noted that as telecommuting becomes a standard practice, the challenge regarding data security increases.
Employers should educate their employees about data security. The workers should know that data security is a priority and that all the internet connections are secure.
Learn more about data security on:
https://brainly.com/question/10091405
Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20.
The program performs the following tasks:
Read the file name of the tsv file from the user.
Open the tsv file and read the student information.
Compute the average exam score of each student.
Assign a letter grade to each student based on the average exam score in the following scale:
A: 90 = < X o
B: 80 = < x < 90
C: 70 = < X < 80
D: 60 = < x < 70
E: X < 60
• Compute the average of each exam.
• Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt. Output one student per row and separate the values with a tab character.
• Output the average of each exam, with two digits after the decimal point, at the end of report.txt. Hint: Use the setprecision manipulator to format the output.
Ex: If the input of the program is:
StudentInfo.tsv
and the contents of StudentInfo.tsv are: 70 45 59
Barrett Edan 96 97 88
Bradshaw Reagan 73 94 80
Charlton Caius 88 61 36
Mayo Tyrese 90 86 45
the file report txt should contain
Barrett Edan 70 45 59 F
Baadha Boagan 9e 157 89 A
Charlton Caius 73 94 80 B
Mayo and Tyrese 58 61 36 D
Stern and Brenda 90 36 45 C
Average midterm 83.40, midterm2 76.60, final 61.60
In this exercise we have to use the knowledge of the JAVA language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
using namespace std;
// Class student required to store the data
class Student{
public:
string lname;
string fname;
int marks[3];
char grade;
// Function which generates the grade for student
void calculate_grade(){
double sum = 0;
for(int i=0;i<3;i++){
sum+= marks[i];
}
double average = sum/3;
if(average>=90 && average<100)
this->grade = 'A';
else if(average>=80)
this->grade = 'B';
else if(average>=70)
this->grade = 'C';
else if(average>=60)
this->grade= 'D';
else this->grade = 'F';
}
};
// This function reads the file , and creates a vector of Students data
vector read_file(string fileName){
// Opening the file
fstream fin;
fin.open(fileName);
// Temp variables
vector list;
vector row ;
string line, word, temp;
// Read the data into vector
while(getline(fin,line)){
row.clear();
stringstream s(line);
while(getline(s,word,'\t')){
row.push_back(word);
}
Student st;
st.fname = row[0];
st.lname = row[1];
st.marks[0] = stoi(row[2]);
st.marks[1] = stoi(row[3]);
st.marks[2] = stoi(row[4]);
st.calculate_grade();
list.push_back(st);
}
fin.close();
return list;
}
// This function takes filname to be output as input, and list of student
void writeFile(string filename, vector list){
// Opening the new file
ofstream fin(filename);
for(int i=0;i string line = list[i].fname+"\t"+list[i].lname+"\t"+to_string(list[i].marks[0])+"\t"
+to_string(list[i].marks[1])+"\t"+to_string(list[i].marks[2])+"\t"+list[i].grade+"\n";
fin<
}
// Find the stats required
double average1 =0,average2 =0 ,average3 = 0;
for(int i=0;i average1+=list[i].marks[0];
average2+=list[i].marks[1];
average3+=list[i].marks[2];
}
average1/=list.size();
average2/=list.size();
average3/=list.size();
// Writting the stats
fin<<"\n"<<"Average: "<<"mid_term1 "<
// Closing the file
fin.close();
}
int main(){
// Taking the input
cout<<"Enter the filename: ";
string filename;
cin>>filename;
vector list;
// Reading and Writting to the file
list = read_file(filename);
writeFile("report.txt",list);
}
See more about JAVA at brainly.com/question/2266606
Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following algorithm. There is no need to create a class similar to how Java works.
3.1. User enters the first number.
3.2. User enters the second number.
3.3. If the first number is less than, greater than, or equal the second number, a message is displayed.
Please Help me. Thank You!
Marry Christmas!
x = int(input("Enter first number\n"))
y = int(input("Enter second number\n"))
if x > y:
print(x, "is greater than", y)
elif x < y:
print(x, "is less than", y)
else:
print(x, "is equal to", y)
i'm not the greatest coder, but it works :)
True or False: VLANs in cloud computing are most likely to be found on direct connections with a CSP.
O True
O False
Based on computing network operation, it is false that VLANs in cloud computing are most likely to be found on direct connections with a CSP.
What is VLAN?VLAN is an acronym of Virtual Local Area Network that establishes its broadcast domain which enables network admins to combine hosts regardless the hosts are connected on the same network switch or not.
Given that the VLAN created its broadcast domain, you are likely not found it on direct connections with a CSP.
Hence, in this case, it is concluded that the correct answer is False.
Learn more about VLAN here: https://brainly.com/question/6769174
When using wildcards and the matching case option, which of the following would not be found by entering on in the Find dialog box?
1. den
2. down
3.Dayton
4. documentation
There are different types of Wildcard. The option that would not be found by entering on in the Find dialog box is called Dayton.
Wildcard is commonly known wild character or wildcard character. It is known as a symbol that is often used in place of or to stand for one or more characters.
Some wildcards are;
The asterisk (*)The question mark (?) Percent ( % )Wildcards are said to be universally used. Dayton cannot be found because it is not a wildcard but a name of a person.
Learn more about Wildcard from
https://brainly.com/question/7380462