Answer:
Declare it as: char str[5][100]
Explanation:
The attachment completes the question
The options in the attachment shows that the programming language being described is more likely to be C language.
In C language, the following syntax is used to store an array of m number of strings and a maximum of n elements in each string,
char array-name[m][n]
From the question:
[tex]m = 5[/tex]
[tex]n = 100[/tex]
Let array-name be str.
The array will be declared as: char str[5][100]
when you heat a pot on a stove, the handle gets warm. which type of heat transfer is possible
Answer:
conduction
Explanation:
The handle will warm up until it's total heat losses equal the total heat coming in. Heat comes in mostly by conduction from the body of the pot.
Answer:
Conduction, I think
Explanation:
Conduction is the heat transfer through objects touching.
Hope this helps :)
What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital recording OD. Invention of the microphone O E. invention of the coaxial cable
Answer:
D. Invention of the microphone
Explanation:
Indeed, as a result of the invention of the Microphone, stereophonic recordings were made possible. Note that stereophonic recording in simple terms involves the recording of sound by simultaneously using two microphones in other enrich the human hearing experience.
Thus, without such a breakthrough, stereophonic recording technology might have not been facilitated.
tip! if you want to not see notifications, just go to settings, go to notifications, and turn off notifications!
Answer:
thanks that helps
Explanation:
Answer:
okok
Explanation:
Determine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
Distance =
(x2 – 21)2 + (y2 – yl)2
Answer:
2 feet
Explanation:
On early computers, every byte of data read or written was handled by the CPU (i.e., there was no DMA). What implications does this have for multiprogramming
Answer:
Multiprogramming will be extremely difficult to be achieved.
Explanation:
If every byte of data read or written is handled by the CPU the implications this will have for multiprogramming are not going to be satisfactory.
This is because, unlike before, after the successful completion of the input and output process, the CPU of a computer is not entirely free to work on other instructions or processes.
Select the correct answer.
Cynthia is using a social media app on her mobile device, but the device’s battery is running out. What trend in app development will enable her to continue using the app on another device?
A.
coding in HTML5
B.
cloud technology
C.
enterprise app development
D.
standardizing the hardware input in different devices
Answer:
B. cloud technology
Explanation:
There are various ways to make this possible but the best way would be using cloud technology. This would allow the entire media application to run on a server somewhere else and have the images and inputs completely streamed to and from the user's device. This allows the application to be able to run on any device that the user may have and even start on one device and transfer over to another while still having all your information and data saved and usable on each device.
How do professionals address their problems?
a.
With grace and malfeasance
b.
With grace and maturity
c.
With griping and maturity
d.
With griping and malfeasance
Answer:
b, with grace and maturity
have you ever had to adjust your communicatio style to egage a customer or roommate? what was the situation and outcome?
What is the advantage of using shortcuts
Answer: There can be advantages and disadvantages.
for example, if you were in the woods with a pathway, and a clear way that might be faster and a shorter way of getting out. You may take the shortcut leading to where you didn't want to go leading to you getting lost or, it could be the same time but with more challenges.
An example of shortcuts to it's advantage is when you're reading a text and you don't understand the word. It's much easier when you hear it being read out to you when the reader uses tone to kind of give you a hint if the connotation is negative or positive, A good example of this is the word unique let's use this sentence "She was very unique, and that's what made her cool!" We can use the words "cool" to see that unique is a positive connotation! For the word cool can usually mean that something is real nice or it's something/someone you'd typically like to be around. So therefore these are just a few examples of the advantages and disadvantages of shortcuts.
A pitch can help convey important information in pre-production for it to receive the green light into production. True or false
difference between Opacity and Alpha properties in CSS3?
Answer:
Opacity sets the opacity value for an element and all of its children; While RGBA sets the opacity value only for a single declaration. Opacity : The opacity property sets the opacity level for an element. ... The alpha parameter is a number between 0.0 (fully transparent) and 1.0 (fully opaque)
hope it helps
please mark me as brainliest.
follow me
What symbol should you look for to determine who owns the intellectual property of a website?
Answer:
the logo of the company or corporation
Explanation:
Usually, the symbol that determines who owns the intellectual property is the logo of the company or corporation. The logo of a website is technically the logo of the brand which has the rights to all of the information represented on the site and ultimately the intellectual property of the site itself. Since there are various board members that usually make up the company that owns the intellectual property, the logo is a way of representing all of these members as a single entity.
Answer: D the copyright symbol
Explanation: I hope this helps you out
To fix a problem you are having with you PC, you have determined that you must flash the computer's BIOS. Which of the following would MOST likely need to be completed prior to flashing the BIOS?
a. Download the flash utility or tool from the manufacturer's website
b. Properly identify the motherboard
c. Locate the flash utility or tool that was shipped with your PC
d. Test the memory to ensure that it is functioning properly
Answer:
a. Download the flash utility or tool from the manufacturer's website
b. Properly identify the motherboard
Explanation:
In this scenario, you are trying to fix a problem you are having with your PC, you have determined that you must flash the computer's BIOS. The following would most likely need to be completed prior to flashing the BIOS;
a. Download the flash utility or tool from the manufacturer's website
b. Properly identify the motherboard.
how do I make my own algorithms
Answer:
Step 1: Determine the goal of the algorithm. ...
Step 2: Access historic and current data. ...
Step 3: Choose the right model(s) ...
Step 4: Fine tuning. ...
Step 5: Visualise your results. ...
Step 6: Running your algorithm continuously.
Match the appropriate words to complete the paragraph.Wireless networks have no clear boundaries, therefore securing communications requires strong (a)_____, (b)_____, and (c)_____ protocols. One of the most common wireless security threats is the presence of (d)_____ access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an (e)_____ wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of (f)_____.
Answer:
a. Encryption.
b. Authentication.
c. Strong.
d. Rogue.
e. Insecure.
f. Hacking.
Explanation:
In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
Wireless networks have no clear boundaries, therefore securing communications requires strong encryption, authentication, and strong protocols. One of the most common wireless security threats is the presence of rogue access points (APs). Rogue points can be set up for the benign purpose of free wireless access or for malicious purposes, such as gaining access to confidential data. Using an insecure wireless hotspot, like so many found in public settings, leaves you vulnerable to become the victim of hacking.
Identify the letter of the choice that best matches the phrase or definition. Group of answer choices Having a current knowledge and understanding of computers, mobile devices, the web and related technologies [ Choose ] Thin, lightweight mobile computer with a screen in its lid and a keyboard in its base [ Choose ] An electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce information, and store the information for future use [ Choose ] A personal computer designed to be in a stationary location [ Choose ] A computer dedicated to providing one or more services to other computers or devices on a network [ Choose ] A computing device small enough to hold in your hand [ Choose ] An Internet-capable phone that usually also includes a calendar, an address book, a calculator, notepad, games, and several other apps [ Choose ] Any hardware component that allows you to enter data and instructions into a computer or mobile device [ Choose ] Any hardware component that conveys information from a computer or mobile device to one or more people [ Choose ] Where a computer keeps data, instructions, and information [ Choose ] Removable flash memory [ Choose ]
Answer:
1. Digital literacy.
2. Laptop.
3. Computer.
4. Desktop computer.
5. Server.
6. Mobile device.
7. Smartphone.
8. Input device.
9. Output device.
10. Storage media.
11. Memory card.
Explanation:
1. Digital literacy: having a current knowledge and understanding of computers, mobile devices, the web and related technologies.
2. Laptop: thin, lightweight mobile computer with a screen in its lid and a keyboard in its base.
3. Computer: an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce information, and store the information for future use.
4. Desktop computer: a personal computer designed to be in a stationary location.
5. Server: a computer dedicated to providing one or more services to other computers or devices on a network.
6. Mobile device: a computing device small enough to hold in your hand.
7. Smartphone: an Internet-capable phone that usually also includes a calendar, an address book, a calculator, notepad, games, and several other apps.
8. Input device: any hardware component that allows you to enter data and instructions into a computer or mobile device.
9. Output device: any hardware component that conveys information from a computer or mobile device to one or more people.
10. Storage media: where a computer keeps data, instructions, and information. It includes hardware devices such as solid-state drive (SSD), hard-disk drive (HDD), optical drive, and flash drive.
11. Memory card: Removable flash memory. In terms of size, it has a width and height of about 1.5 inches.
Consider an array of integers consisting of the numbers: 8 12 19 32 45 55 67 72 89 90 92. Suppose the binary search algorithm is applied to this list to search for the key 56 ( not in the list). Answer the following questions: What is the index of the first element in the array that is compared with the key and how is this index evaluated
Answer:
Answered below
Explanation:
Index of the first element compared to the key is 5. The element itself is 55.
This index is evaluated by the addition of the index of the first element which is 0(zero) and the the index of the last element which is 10.
( Index of the last element is determined by subtracting the one from the total number of elements)
After the addition, the result is divided by 2 to get the first index from which the binary search begins.
firstIndex = 0
lastIndex = array.length - 1
midpoint = (firstIndex + lastIndex) / 2
Write a java program to create and display unique three digit number using 1,2,3 and 4 also count how many three digit number are there.
Expected
123
124
---
---
431
432
Answer:
Answered below
Explanation:
Class Unique{
public static void main(String args[]){
int myArray[] = {1, 2, 3, 4};
int newArray[];
int i;. int j; int k;
for(i = 0; i < myArray.length; I++)
for(j = 0; j< myArray.length; j++)
for(k = 0; k< myArray.length; k++){
if(i != j && j!= k && i != k ){
newArray.add(myArray[i] + myArray[j] + myArray[k]);
}
}
int count = 0;
for(int m = 0; m < newArray.length; m++){
count++;
}
System.out.print(newArray, count)
}
}
describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach
Incomplete question. Here's part of the missing question;
The EducationS Review, a fictional company, is hit with a data breach that is making headlines. The Olianas-based educational service and test preparation provider inadvertently exposed files of at least 100,000 students in various parts of the country through its Web site. News of the breach was made public on Tuesday morning by a report in the local newspaper.
The files were exposed after the company switched the Internet service providers earlier this year. The sensitive information, which included personal data such as names, birth dates, ethnicities, and learning disabilities, as well as test performance, were easily accessed through a simple Web search and were available for at least seven weeks, according to the report. None of the information was password protected and was intended only to be viewed by EducationS authors.
Explanation:
It is important to note that the company did not make the information password protected, which creates a vulnerability.
Measures 1: only those with authentication password should have been allowed to access the information.
Measures 2: prior to switching to a new internet service provider, an information risk assessment should have been done to ensure information security.
A circle is represented as a set of x and y coordinates of the screen pixel, where the shape of the circle is drawn, and an integer represent the diameter of the circle. Please design and implement the Circle class with. A constructor that take in parameter to initialize the member data fields of the class A method to set the coordinates of the Circle to a different location Give code to create a Circle object
Answer:
Answered below
Explanation:
//Program is written in Kotlin programming language
Class Circle(xCoordinate: Double, yCoordinate: Double, diameter: Int){
var coordinateX = xCoordinate
var coordinateY = yCoordinate
var circleDiameter = diameter
fun diffLocation(x1: Double, y1: Double){
coordinateX = x1
coordinateY = y1
print (coordinateX, coordinateY)
}
}
//Tester class
Class Main{
fun main( ){
val circle = Circle(2.34, 4.56, 10)
print(circle.coordinateX)
print (circle.coordinateY)
circle.diffLocation( 3.4, 2.8)
}
}
When a new user visits your proprietary site, what is typically the first method of interaction with them
Answer:
Log file entry notifying you of new user activity
Explanation:
Log files are records of the timeline of activities in a computer system. These files contain information about new users of a site as well as the activities they performed on the site.
The internet protocol address of the visitor, the time of visit, as well as the features clicked on, or accessed by him, example, videos or images are all registered in the log file. The owner of the site can use the information sourced from the log files to perform site analytics.
What is the worst case time complexity of insertion sort where position of the data to be inserted is calculated using binary search
Answer:
O(n²)
Explanation:
The worse case time complexity of insertion sort using binary search for positioning of data would be O(n²).
This is due to the fact that there are quite a number of series of swapping operations that are needed to handle each insertion.
One problem with dynamic arrays is that once the array is created using the new operator the size cannot be changed. For example, you might want to add or delete entries from the array similar to the behavior of a vector. This project asks you to create a class called DynamicStringArray that includes member functions that allow it to emulate the behavior of a vector of strings.
The class should have:
A private member variable called dynamicArray that references a dynamic array of type string.
A private member variable called size that holds the number of entries in the array.
A default constructor that sets the dynamic array to NULL and sets size to 0.
A function that returns size.
A function named addEntry that takes a string as input. The function should create a new dynamic array one element larger than dynamicArray, copy all elements from dynamicArray into the new array, add the new string onto the end of the new array, increment size, delete the old dynamicArray, and then set dynamicArray to the new array.
A function named deleteEntry that takes a string as input. The function should search dynamicArray for the string. If not found, return false. If found, create a new dynamic array one element smaller than dynamicArray. Copy all elements except the input string into the new array, delete dynamicArray, decrement size, and return true.
A function named getEntry that takes an integer as input and returns the string at that index in dynamicArray. Return "" string if the index is out of dynamicArray’s bounds.
Overload the operator[] so that you can get and change an element by an index integer. If the index is out-of-bounds, return a "" string.
A copy constructor that makes a copy of the input object’s dynamic array.
Overload the assignment operator so that the dynamic array is properly copied to the target object.
A destructor that frees up the memory allocated to the dynamic array.
Create a suitable test program to test your class.
You should name the project ASG10. When you zip up the project folder, ASG10, include all the files (.sln, .cpp, etc) and subdirectories (Debug, etc.).
**************************************************
Copy your DynamicStringArray from Assignment 10. Fix the program so all 13 tests work properly. Modify the definition of the overloaded operator [] and getEntry so they throw an OutOfRange exception if an index that is out of range is used. OutOfRange is an exception class that you define. The exception class should have a private int member and a private string member, and a public constructor that has int and string arguments. The offending index value along with a message should be stored in the exception object. You choose the message to describe the situation. Modify your test program and add tests that catch the new exception class.
You should name the project ASG14. When you zip up the project folder, ASG14, include all the files (.sln, .cpp, etc) and subdirectories (Debug, etc.).
Answer:
Un problema con las matrices dinámicas es que una vez que se crea la matriz utilizando el nuevo operador, no se puede cambiar el tamaño. Por ejemplo, es posible que desee agregar o eliminar entradas de la matriz de manera similar al comportamiento de un vector. Este proyecto le pide que cree una clase llamada DynamicStringArray que incluye funciones miembro que le permiten emular el comportamiento de un vector de cadenas.
La clase debe tener:
Una variable miembro privada llamada dynamicArray que hace referencia a una matriz dinámica de tipo cadena.
Una variable de miembro privada llamada tamaño que contiene el número de entradas en la matriz.
Un constructor predeterminado que establece la matriz dinámica en NULL y establece el tamaño en 0.
Una función que devuelve el tamaño.
Una función llamada addEntry que toma una cadena como entrada. La función debe crear una nueva matriz dinámica un elemento más grande que dynamicArray, copiar todos los elementos de dynamicArray en la nueva matriz, agregar la nueva cadena al final de la nueva matriz, incrementar el tamaño, eliminar el antiguo dynamicArray y luego establecer dynamicArray en el nueva matriz.
Una función llamada deleteEntry que toma una cadena como entrada. La función debe buscar la cadena en dynamicArray. Si no lo encuentra, devuelva falso. Si lo encuentra, cree una nueva matriz dinámica con un elemento más pequeño que dynamicArray. Copie todos los elementos excepto la cadena de entrada en la nueva matriz, elimine DynamicArray, reduzca el tamaño y devuelva verdadero.
Una función llamada getEntry que toma un número entero como entrada y devuelve la cadena en ese índice en dynamicArray. Devuelve la cadena "" si el índice está fuera de los límites de dynamicArray.
Sobrecargue el operador [] para que pueda obtener y cambiar un elemento por un índice entero. Si el índice está fuera de los límites, devuelve una cadena "".
Un constructor de copia que hace una copia de la matriz dinámica del objeto de entrada.
Sobrecargue el operador de asignación para que la matriz dinámica se copie correctamente en el objeto de destino.
Un destructor que libera la memoria asignada a la matriz dinámica.
Cree un programa de prueba adecuado para evaluar su clase.
Debería nombrar el proyecto ASG10. Al comprimir la carpeta del proyecto, ASG10, incluya todos los archivos (.sln, .cpp, etc.) y subdirectorios (Debug, etc.).
************************************************
Copie su DynamicStringArray de la Tarea 10. Corrija el programa para que las 13 pruebas funcionen correctamente. Modifique la definición del operador sobrecargado [] y getEntry para que generen una excepción OutOfRange si se usa un índice que está fuera de rango. OutOfRange es una clase de excepción que define. La clase de excepción debe tener un miembro int privado y un miembro string privado, y un constructor público que tenga argumentos int y string. El valor del índice infractor junto con un mensaje deben almacenarse en el objeto de excepción. Tú eliges el mensaje para describir la situación. Modifique su programa de prueba y agregue pruebas que detecten la nueva clase de excepción.
Deberías nombrar
Explanation:
The code repeat 3 [forward 50 right 120] creates which shape?
a square
a circle
a pentagon
a triangle
Answer:
Triangle. D
Explanation:
I have no Idea, I was searching for the answer like most of you guys are doing. But my best guess is Triangle
Answer:
D. A triangle is your answer
Explanation:
The triangle is the only shape in this list that has 3 sides.
Answerer's Note:
Hope this helped :)
In the lab, you experimented with three different antivirus software applications: AVG, Windows Defender, and MalwareBytes. Why might someone use more than one application to protect their computer
Answer:
Explanation:
Different antivirus softwares use different techniques for analyzing data on a computer in order to find malware or any harmful data. This can provide extra layers of security to your computer and hopefully prevent harmful software from causing serious damage if they enter the system. Also every antivirus software has their own database of virus signatures which they use to compare and detect these viruses. Some may have info on these harmful viruses that others do not. Regardless it is not smart to have various antivirus software because they consume lost of computer resources and will ultimately slow down your computer.
Explain the iterative nature of the database requirements collection, definition, and visualization process.
Answer:
you can do a quizlet about it and you can get da answers from there
Explanation:
use the internet to research the SYSTEM account. Why is it nessesary to include this account with full control on a directory
Answer:
It is essential for the existence of a helicopter administration over all other users on the system.
Explanation:
A system account is a computer user account that is generated by an operating system (OS) during installation of the OS and that is utilized by the user in accordance to the parameters with which it has been designed and the purpose which it was created.
A System account is usually referred to as a privileged account because it comes with full control on one or more directories. A directory is simply a location for file storage on a computer. Full access or control includes the ability to:
read directorieswrite to directoriesmake changes to and delete files, folder and subfolders. alter authorization settings for all files and subdirectories.Besides control on the directory level, System Accounts which are also called Super Accounts which in addition to the above have permission to
install and remove software applicationsupdate and or upgrade the computers operating system access directories and files which normal users cannot and should not.System Accounts are therefore important for security reasons. They are configured to act as a supervisory account which can create, authorise and terminate other accounts and processes.
Some of their merits include the ability to:
Oversee, audit, and completely control all other privileges. forestall cyber attacks on the system from internal users or insiders. Establish and provide evidence for compliance with regulatory codesCheers
For C++ ONLY please,
Write a for loop to print all NUM_VALS elements of vector courseGrades, following each element with a space (including the last). Print forwards, then backwards. End with a newline. Ex: If courseGrades = {7, 9, 11, 10}, print:
7 9 11 10
10 11 9 7
Hint: Use two for loops. Second loop starts with i-courseGrades.size() - 1 (Notes)
Note: These activities may test code with different test values. This activity will perform two tests, both with a 4-element vector (vector int> courseGrades(4)). See "How to Use zyBooks".
Also note: If the submitted code tries to access an invalid vector element, such as courseGrades at(9) for a 4-element vector, the test may generate strange results. Or the test may crash and report "Program end never reached', in which case the system doesn't print the test case that caused the reported message.
1 #include
2 #include
3 using namespace std; DIIDII
4
5 int maino {
6 const int NUM_VALS - 4;
7 vector int> courseGrades (NUM_VALS);
8 int i;
9
10 for (i = 0; i < courseGrades.size(): ++) {
11 cin >> courseGrades.at(i); /*
12 }
13
14 Your solution goes here */
15
16 return ;
17 }
Answer:
Replace the comment
/*Your solution goes here */
with
for (i = courseGrades.size()-1; i >=0 ; i--) {
cout<<courseGrades.at(i)<<" ";
}
Explanation:
This line iterates through courseGrade in reverse order
for (i = courseGrades.size()-1; i >=0 ; i--) {
This prints each element of courseGrade in reverse followed by blank space
cout<<courseGrades.at(i)<<" ";
}
I added the full program as an attachment
Answer:
for (i = 0; i < NUM_VALS; i++) {
cout << courseGrades [i] << " ";
}
cout << endl;
for(i = NUM_VALS - 1; i >= 0; --i) {
cout << courseGrades[i] << " ";
}
cout << endl;
Explanation:
How does the Evaluate Formula dialog box help fix errors?
A. The dialog box checks the entire worksheet for any errors present.
B. A quick run of the entire worksheet checks all the formulas at once.
C. Each element of the formula is added to the box individually for checking.
D. The entire formula is entered into the dialog box and checked step by step. (:THE CORRECT ANSWER IS D :)
Answer:
D
Explanation: :)
Which sensitivity level is not a default available in Outlook 2016?
Normal
Personal
Confidential
Company Only
Answer:
Company only
Explanation: The sensitivity levels available for Outlook 2016 are Normal, personal,private and confidential, this sensitivity levels helps users to the intentions of the user of the product and it will help to give their plan on what and how to utilize the product. It is very important to make use of the sensitivity levels in your Outlook for better usage of the Microsoft Outlook.
Answer:
company only
Explanation:
because i took the test edge2020