if a programming language does not support ____, the language is not considered object-oriented.

Answers

Answer 1

A programming language is not regarded as object-oriented if it does not enable polymorphism.

One method's ability to function properly for subclasses of the same parent class is known as subtype polymorphism.

You can access information with a level of security in between public and private access by using the phrase Protected.

When using a title with such a student class object and a Static method with the same name as a parent class method, the child method conceals the actual story.

The compiler decides to use this method to avoid the overhead of calling, thus you are unaware that inlining is happening.

Strive stating the two class names in conjunction in a statement with the word "is a" to determine which of two classes is the base class and which is the subclass (n)

To know more about polymorphism click here

brainly.com/question/28265937

#SPJ4


Related Questions

Declare a variable dp that can be assigned the address of a double variable. In other words, declare dp to be of type "pointer to double ".

Answers

A specific place in memory is assigned to a variable when it is declared so that it can store a value. Special variables called pointers are used to store double value to other variables' memory addresses.

What are Pointers?

In C++, a pointer is a variable that holds the address (or location in memory) of another variable. In other words, a pointer directs the user to the location of a different variable. Pointers in C++ have data types just like ordinary variables do. The data type of the a pointer and the variable it points to should match.

We specify the data type of pointers so that we can determine how many bytes of data the variable it contains the address of uses. When we increase (decrease) the value of a pointer, By the size of the data type it points to, the pointer is increased (or decreased).

How to use Pointers in C++?

To use pointers in C++, we must take the following actions:

Make a pointer variable first.  Use the & operator to provide the pointer the address of another variable. Use the operator to access the value at the address.

main ()

{

 Var = 10;

       // Pointer level-1

Integer* ptr1;

// Pointer level-2

 ptr2;

// Pointer level-3

ptr3;

// Storing address of variable Var

// to pointer variable ptr1

ptr1 = &Var;

// Storing address of pointer variable

ptr2 = &ptr1;

// Storing address of level-2 pointer

ptr3 = &ptr2;

// Displaying values

print ("Value of variable "

 "Var = %d\n",

 Var);

print("Value of variable Var using"

 " Pointer ptr1 = %d\n",

 *ptr1);

print("Value of variable Var using"

 " Pointer ptr2 = %d\n",

 **ptr2);

print("Value of variable Var using"

 " Pointer ptr3 = %d\n",

 ***ptr3);

return 0;

}

To know more about pointer to double visit:

https://brainly.com/question/14299488

#SPJ4

What function is used to draw a line in the frame?

Answers

Answer:

DrawLine is simply draws a line connecting the two points that are specified by the coordinate pairs. It should be noted that the drawLine() function is simply an inbuilt function in the GraphicsMagick library that is used to draw the line with specified coordinates.

in identity and access management (iam), which term applies to a person or application that uses the aws account root user, an iam user, or an iam role to sign in and make requests to aws?

Answers

A principal is an entity that can make requests to AWS and can be authenticated by the service. This includes the AWS Account root user, an IAM User, or an IAM Role.

What is a Principal in AWS Identity and Access Management?

Principal

A principal is the entity that uses the AWS Account root user, an IAM User, or an IAM Role to sign in and make requests to AWS. These requests are authenticated by the AWS service to ensure that only authorized individuals or applications are allowed access. By using a principal, users can create and manage their own resources, control access to them, and ensure that only those with permission can access the resources.

Learn more about AWS Identity: https://brainly.com/question/14647165

#SPJ4

the page view event is triggered whenever a website visitor views any page on your site. if you wanted to set up a new event to trigger when visitors land on a particular page (e.g., the homepage), which option would you choose once you've navigated to events in the analytics interface?

Answers

Once you have navigated to Events in the analytics interface, you would choose the option to Create New Event.

What is analytics interface?

Analytics interface is a user interface or platform that serves as a point of access to business intelligence or analytics data. It provides a visual representation of the data, allowing users to quickly and easily view, analyze, and report on large amounts of data. Analytics interfaces are typically used to monitor key performance indicators (KPIs) or trends in data, allowing users to make informed decisions about their business. They also provide detailed reports and dashboards that provide an instant snapshot of the current state of the business. Analytics interfaces can be used to track customer engagement, identify sales opportunities, predict future trends, and optimize processes. Analytics interfaces are becoming increasingly popular as businesses of all sizes strive to improve their decision-making capabilities.

You would then specify the name of the Event, the Event Category, and the Event Action associated with this page view. You could also set up a condition to trigger the Event only when a visitor lands on the homepage, by setting the Event Label to the URL of the homepage.

To learn more about analytics interface
https://brainly.com/question/29875446
#SPJ4

Which of the following protects the authors of a book from having their work copied by others? Due process Copyright law Patent protection Trade Secret law Fair Use Doctrine

Answers

The protects the authors of a book from having their work copied by others is option B: Copyright.

What are copyright and a patent?

New ideas, as well as procedures, or scientific discoveries are protected by patents; brands, logos, and catchphrases are protected by trademarks; and original literary works are protected by copyrights.

Therefore, based on the above, one can say that the Original works of authorship, such as poetry, books, movies, songs, computer software, and architectural designs are all protected by copyright, a type of intellectual property law.

Learn more about Copyright from

https://brainly.com/question/357686
#SPJ1

what is a broad-s[ectrum antibiotic? do any of the antibiotics used in this demonstration have a broad spectrum

Answers

Broad-spectrum antibiotic refers to an antibiotic with activity against a wide range of disease-causing bacteria.

What is broad-spectrum antibiotic used for?

Broad-spectrum antibiotics are used correctly in the following medical situations: Empirically prior to identifying the causative bacteria when there is a wide differential and potentially serious illness would result in delay of treatment.  This happens, for example, with meningitis, where unless broad-spectrum antibiotics are administered, patients can become so ill that they die within hours. Then, broad-spectrum antibiotics can be used for drug-resistant bacteria that do not respond to other narrow-spectrum antibiotics. Lastly, it can be used for superinfections, in which multiple types of bacteria cause disease, require either broad-spectrum or combination antibiotic therapy.

Learn more about broad-spectrum antibiotics https://brainly.com/question/15096120

#SPJ4

you are dual-booting between windows 10 and windows vista on your computer. you need to set up a secure file format structure that they can both use. which file system should you use?

Answers

The right response is NTFS. Utilize the System Image Recovery tool after starting the machine from the Windows 10 DVD.

Version 3.0 of NTFS introduces the Encrypting File System (EFS), a technology that offers filesystem-level encryption on Microsoft Windows. The technique makes it possible to transparently encrypt files to shield private information from hackers who have physical access to the machine. You can only use MBR with volumes that are 2 TBs or smaller. You can create as many partitions as you like with GPT. You can use GPT to create volumes of 2TB or more in size. To remotely connect to a Windows 10 PC, use Remote Desktop on your Windows, Android, or iOS device.

Learn more about technology here-

https://brainly.com/question/15059972

#SPJ4

Which phase of the data analysis process has the goal of identifying trends and relationship?O AnalyzeO PrepareO ProcessO Act

Answers

Answer:

Analyze

Explanation:

 The primary goal in this phase is to find the relationships, trends, and patterns that will help you solve your business problem more accurately.

Answer:

The phase of the data analysis process that has the goal of identifying trends and relationships is the "Analyze" phase. In this phase, data analysts will use various statistical and analytical techniques to identify patterns, trends, and relationships in the data. This might involve using tools like regression analysis, correlation analysis, or clustering algorithms to uncover insights and understand the data better. The "Analyze" phase follows the "Prepare" phase, in which the data is cleaned, transformed, and made ready for analysis, and precedes the "Act" phase, in which the findings from the analysis are used to inform decisions or take action.

Explanation:

Which of the following is the safest authentication method?

a. Authentication using an SMS OTP

b. Authentication using a smartphone

c. Authentication using security keys

d. Authentication using a smart card

Answers

The safest authentication method is authentication using a smart card.

Smart Card Authentication uses a physical card along with a smart card reader and software on the workstation to validate users into enterprise resources like workstations and applications. Although smart card authentication offers a terrible user experience and is expensive to deploy and maintain, it is very secure.

Because smart card authentication requires a physical credential, a hardware card reader, and software, it is expensive and difficult to administer. Smart cards are only used in the most secure workplaces, such as three-letter agencies of the federal government or privileged access at a financial institution, as these environments frequently forbid employees from carrying smartphones to and from work.

To learn more about Authentication click here:

brainly.com/question/17217803

#SPJ4

Which of the following is an example of unstructured data:

Group of answer choices
Clickstream data
University of Iowa payment amounts received for tuition
Transaction processing data
University of Iowa course registrations

Answers

Answer:

Clickstream data is an example of unstructured data.

Explanation:

Clickstream data is data that is collected about the actions that a user takes while browsing the internet, such as the websites that they visit and the links that they click on. This data is usually collected through the use of web analytics software and can be used to understand user behavior and improve website design and functionality. Clickstream data is typically unstructured, as it is not organized in a predefined format and may include a wide variety of different types of information.

The other options (University of Iowa payment amounts received for tuition, transaction processing data, University of Iowa course registrations) are examples of structured data, as they are organized in a predefined format and include specific types of information. Structured data is typically easier to analyze and manipulate than unstructured data, as it is organized in a way that makes it easier to extract specific pieces of information.

Let me know if you have any further questions.

software piracy relates to transferring programs and information from hard disks to floppy disks. group of answer choices true false

Answers

Software piracy relates to transferring programs and information from hard disks to floppy disks. This statement is false.

Software piracy is the unauthorized downloading, copying, use, or distribution of software. Downloading and using software without paying for it is a common tactic of pirated software users. However, software piracy also includes distributing software on multiple machines when a license was only purchased for one, as well as copying software and redistributing it.Hard-disk Loading-: It is the most common type of software piracy which mainly happens in PC resell shops. The shop owner buys a legal copy of the software and reproduces its copies in multiple computers by installing it. Most of the time customers/PC users are not aware of these things and get the pirated version of the software in the original S/W price or less than the original price. It is one type of Commercial software piracy.Software piracy may be easily avail the pirated software in a cheaper price, but users should aware about its bad effects on the system, data, security point of view as well as users should be aware about the strict consequences for offenders breaking the law.

To know more about piracy visit:

https://brainly.com/question/28155207

#SPJ4

What parameter can be used in the windows cli to force a user to change their password on the next logon?

Answers

To modify the password of another user, enter the password command along with their login name (the User parameter).

How can I have Windows compel a password change at the next logon?

Right-click the username of the user whose password you want to change, and then select Properties from the context menu. Check the box next to User must update password at next logon in the Account Options section. OK.

Passing the -e or —expire flag together with the user's username as shown when using the password command, which is used to update a user's password, causes a user's password to expire. The user will be forced to modify their password as a result.

User account passwords can be changed using the password command. The password for a superuser is the only accounts a typical user can change the password for are their own and any. The validity period associated with an account or password can also be changed with Password.

To learn more about  password command refer,

https://brainly.com/question/14310628

#SPJ4

hat are the defaults ports used in linux ftp server ? 2. what is active and passive mode? 3. how would you manage number of ftp clients that connect to your ftp server? 4. how to limit the ftp login attempts to fight against botnet/illegal login attempts? 5. is it possible to maintain log of ftp requests and responses?

Answers

FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port. Traditionally these are port 21 for the command port and port 20 for the data port.

what is active and passive mode?

The confusion begins however, when we find that depending on the mode, the data port is not always on port 20. The File Transfer Protocol (FTP) is a standard network protocol that is used to transfer files between computers. To download or upload files, a user uses an FTP client to connect to an FTP server. In Active mode, the server assigns a port and the IP address will be the same as the FTP client making the request. In other words, Passive mode lets the client dictate the port used, and active mode lets the server set the port. 1. Sensible first steps · Disable FTP · Limit access to FTP · Make logins harder to guess. Yes! We can log FTP requests and responses.

To know more about passive mode visit:

https://brainly.com/question/29774534

#SPJ4

the pipelined mips datapath executes the following program. add $s1, $s2, $t0 sub $t0, $t1, $t2 lw $t3, 15($s1) sw $t5, 72($t0) or $t2, $s4, $s5 which register(s) are being read in the 5th clock cycle? (select all that apply)

Answers

Of these, only $s1 is written in the 5th cycle of the program. execution. This is because a specific writeback (WB) always occurs on the 5th cycle of that instruction.

where $s1, $t0, $t3, $t5, and $t2 are written throughout the program (all written on the 5th cycle of execution of their respective instructions). Of these, only $s1 is written in the 5th cycle of the program. execution.

The cycle goes this way :

[1M]----[REG]----[ALV]-----[DM]----[WB]

          [   ]------[       ]-------[      ]-----[DM]-----[   ]

                       [     ]--------[      ]-----[ALV]----[    ]

                                       [      ]------[REG]----[   ]----[     ]

                                                     [1M]------[    ]-----[   ]----[   ]

1            2           3             4            5           6         7       8

What is pipeline datapath?

Pipelined processors allow multiple instructions to execute simultaneously, each using a different functional unit in the datapath. ▪ This increases throughput and makes programs run faster. — One instruction can be executed in each clock cycle, and the simpler the stage, the shorter the cycle time.

What is the MIPS Pipeline?

To complete an order, the computer must perform a series of actions. These actions can use different parts of the CPU. Pipelining causes parts to run concurrently on different instructions. This is an important technique when looking for a more powerful computer.

Learn more about pipelined MIPS datapath :

brainly.com/question/15970715

#SPJ4

Division by zero is a ________ error that is caught when the program executes. A) compiler
B) runtime
C) syntax
D) logical

Answers

Option B is correct When the application runs, a runtime error called division by zero is detected.

We may utilize exception handling to gently override such actions. Dividing an integer by zero is a mathematical mistake (not defined). If you develop a program without employing exception handling, the result of dividing by zero will be shown as infinity and cannot be processed further. When an integer is divided by 0, Python's built-in ZeroDivisionError exception is raised. The second parameter of a division or modulo operation will raise an exception if it is zero, according to this. A syntax mistake is an improper usage of the language itself that is detected by the compiler or interpreter. For instance, the Python syntax for is incorrect. An issue that cannot be found before the code is executed but results in a problem that is discovered during program execution is known as a runtime error.

Learn more about runtime error here:

https://brainly.com/question/13106116


#SPJ4

what is the major difference between centralized and decentralized control and access? a. data collisions can occur on either centralized or decentralized access methods b. decentralized access methods must involve a process to handle occasional data collisions (e.g., csma/cd, csma/ca) c. centralized access control only works when csma methods are used d. csma/cd is used with decentralized access, while csma/ca is used with centralized access methods

Answers

The major difference between centralized and decentralized control and access is decentralized access methods must involve a process to handle occasional data collisions (e.g., CSMA/CD, CSMA/CA).

What is the difference between decentralized and centralized control?Decentralized control is a type of control where the logic and input/output operations are split up among several pieces of hardware or subsystems and operate effectively independently of one another. In most cases, the autonomous systems will have a way of exchanging critical information.Computing that is done centrally at terminals connected to a main computer is referred to as centralised computing. If the peripherals are physically linked to the main computer, the computer can control them all directly, or they can be connected via a terminal server.Certain insect colonies employ one of the most well-known instances of a "natural" decentralised structure.

Learn more about centralized decentralized control refer to : https://brainly.com/question/29490889

#SPJ4

the immediate result of a worm is . a. not noticeable until later b. complete data loss with little chance of recovery c. the slower processing time of legitimate work d. a computer crash with or without a blue screen

Answers

The immediate result of a worm is the slower processing time of legitimate work

What is a computer worm?

A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems.

A computer worm duplicates itself to spread to uninfected computers. It often does this by exploiting parts of an operating system that are automatic and invisible to the user.

Typically, a user only notices a worm when its uncontrolled replication consumes system resources and slows or halts other tasks. A computer worm is not to be confused with WORM, or write once, read many.

Learn more about Computer Worm here :

brainly.com/question/14772903

#SPJ4

Each slide in a presentation has a layout that includes playholders for certain types of content. True or false

Answers

The given statement ''Each slide in a presentation has a layout that includes play holders for certain types of content'' is true.

What is a slide as used in PowerPoint?

In a PowerPoint show, a slide is utilized to consolidate material like text, music, video, and movement components. The text area, content designing, and placeholders are totally remembered for the slide design.

A show's slide is a solitary show page. An assortment of slides is likewise alluded to as a slide deck. A slide show is the introduction of various slides or photos on a projection screen or an electronic gadget.

As an expansion to and supplement to a show made by the speaker. Data conveyed by the speaker is upheld with slides. Slides show visual components that further develop correspondence. Central issues are introduced on slides to additionally stress the material.

Learn more about PowerPoint slide refer to :

brainly.com/question/9111876

#SPJ4

Which of the following operating systems is found on Macintosh desktop and laptop computers? iOS Linux Mac OS OS X
Previous question

Answers

Option 3 is correct. The operating system that found on Macintosh desktop and laptop computers is Mac OS.

The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer. You can converse with the computer using this method even if you don't understand its language. A computer cannot function without an operating system.

Apple produces a series of operating systems under the name macOS (formerly known as OS X). All Mac computers, sometimes known as Macs, already have it installed. Mojave (launched in 2018), High Sierra (issued in 2017), and Sierra are a few of the specific versions.

MacOS users make up fewer than 10% of all operating systems worldwide, according to StatCounter Global Stats—a far lower percentage than Windows users, who make up more than 80%.

Know more about MacOS here:

https://brainly.com/question/17371989

#SPJ4

some operating systems perform buffered i/o. in this scheme, an output request is accepted from a user and the user is informed of the normal i/o completion. however, the actual physical write operation is performed later, at a time convenient to the operating system. discuss the effect of buffered i/o on integrity in a dbms

Answers

We had to provide input to the CPU in the operating system, and the CPU then carried out the instructions and produced the results. However, there was a drawback to this strategy.

In a typical scenario, we have to manage numerous processes, and we are aware that the time required for an I/O transaction is significantly longer than the time required by the CPU to execute an instruction. In the past, thus,

What is the  operating systems work ?

The following process begins its execution after displaying the output. As a result, the CPU sits idle the majority of the time, which is the worst situation for operating systems. Spooling is a notion that is used in this situation.

To learn more about Operating system from the given link:

https://brainly.com/question/13265286

#SPJ4

With respect to iot security, what term is used to describe the digital and physical vulnerabilities of the iot hardware and software environment?
a. Traffic Congestion
b. Device Manipulation
c. Attack Surface
d. Environmental Monitoring

Answers

Answer: Answer Surface

Explanation:

travis wants to make sure that his presentation is organized in the best arrangement. he needs to view as many slides as possible in one view. which feature of powerpoint should travis view?

Answers

Travis wants to ensure that the presentation is set up as efficiently as possible. He wants to look at as many slides as he can at once. The PowerPoint function Travis needs to see is "Slide Sorter."

Explain the features of PowerPoint?

It is a complete presentation graphics kit that comes with everything you need to make a presentation that looks polished.

Word processing, sketching, outlining, diagramming, and presentation management systems are all available in PowerPoint.You may easily rearrange or divide your slides into sections by moving and dropping them around the grid-like display of your slides thanks to the slide sorter. Right-click the very first slide of the new segment and choose Add Section to add a section.

Travis wants to ensure that the presentation is set up as efficiently as possible. He wants to look at as many slides as he can at once.

Thus,  the PowerPoint function Travis needs to see is "Slide Sorter."

To know more about the Powerpoint , here

https://brainly.com/question/23714390

#SPJ4

Which of the following statements about data mining is TRUE ? A. Logistic regression is appropriate if the response variable is continuous. B. Supervised learning is less profitable because of the high costs of hiring supervisors. C. Unsupervised learning algorithms predict or classify one and only one outcome variable at a time.
D. The more variables included in a model, the less the risk of overfitting the data. E. Human judgment may be required for individual cases to deal with missing values in records used for building prediction models.

Answers

Answer:

E. Human judgment may be required for individual cases to deal with missing values in records used for building prediction models.

Explanation:

Data mining is the process of discovering patterns and trends in large data sets, typically with the goal of predicting future outcomes or identifying important relationships within the data.

There are two main types of data mining: supervised learning and unsupervised learning. In supervised learning, the data are labeled with the correct outcomes, and the algorithm is trained to predict those outcomes based on the input data. In unsupervised learning, the data are not labeled, and the algorithm must discover patterns and relationships within the data without guidance.

One common technique used in data mining is logistic regression, which is appropriate for predicting a binary outcome (e.g., yes/no, pass/fail). This technique is not appropriate for predicting continuous variables, so statement A is incorrect.

Supervised learning is not necessarily less profitable than unsupervised learning. In fact, many data mining applications use supervised learning because it allows for more accurate predictions. Therefore, statement B is incorrect.

Unsupervised learning algorithms do not predict or classify one and only one outcome variable at a time. They are capable of discovering multiple patterns and relationships within the data, so statement C is incorrect.

The more variables included in a model, the greater the risk of overfitting the data. Overfitting occurs when a model is overly complex and captures too much of the random noise in the data, leading to poor generalization to new data. Therefore, statement D is incorrect.

In data mining, it is common to encounter missing values in records. In such cases, human judgment may be required to decide how to handle the missing values in order to build accurate prediction models. Therefore, statement E is correct.

in order to change keyboard layout if x windows can't detect the layout, you should use what cli command?

Answers

The starting point of the file system, or root directory. There won't likely be any subdirectories in the root directory. The Linux kernel and boot loader files are stored in this location.

Can you still use X Windows?

The X Window System is primarily used on Unix, Linux, and BSD systems, although it can also be used on many other platforms, including Microsoft Windows, Mac OS X, and a wide range of other operating systems.

The X Windows operating system: what is it?

A GUI is provided in a distributed network environment by the client-server, open source, cross-platform X Window System (X11). Versions of X, which are predominantly used on Unix variations, are also available for other operating systems.

To know more about x windows visit;

https://brainly.com/question/27637215

#SPJ4

research dns on azure and other network services that azure offers. write a minimum 1-page, apa formatted paper that addresses the following: what are the benefits by hosting your services in their cloud, as opposed to on-premises? some items to search for are high-availability, redundancy, and fault tolerance.

Answers

One of the benefits of hosting the services in the cloud are securing the data

What are the benefits of hosting services on a cloud?

The multi-server setup of cloud hosting allows for automatic backups of your data. Even if a single server fails, there will be no data loss. For cloud servers, data recovery is a simple process. Traditional hosting, on the other hand, keeps all of your data on a single server.

Many new cloud hosting services concentrate on automatic backups using many servers, fault tolerance,redundancy, and fault tolerance

Apart from those, the cloud is also capable of securing data and one of the well-known clouds is Azure cloud

The azure cloud offers many services while hosting the services

Thus we can say azure is one of the clouds that provides various hosting services

To know more on azure follow this link:

https://brainly.com/question/29508209

#SPJ4

Which of the following is an example of artificial intelligent agent/agents? a) Autonomous Spacecraft b) Human c) Robot d) All of the mentioned.

Answers

People could be categorized as agents. Sensors include things like the eyes, ears, skin, taste buds, and so on in contrast to effectors, which include the hands, fingers, legs, and mouth. Machines make up agents.

What is an artificial intelligence agent ?

Artificial sweetening agents are substances that add sweetness to food. Our bodies do not gain calories from them. They have no negative effects on our physical health. Aspartame, sucrose, sucralose, and alitame are a few examples.Using sensors and actuators, an AI agent detects its surroundings and takes appropriate action. It senses its surroundings via sensors and responds to them with actuators. Simple reflex agent, model-based reflex agent, reflex agent with goals, reflex agent with utility, and learning agent.

The Hong Kong-based company Hanson Robotics created Sophia, a social humanoid robot. In mid-March 2016 during South by Southwest (SXSW) in Austin, Texas, the United States, Sophia made its first public appearance after being activated on February 14. George Devol created the first digitally controlled and programmable robot in 1954, which he named the Unimate. The contemporary robotics industry was later built on the foundations laid by this.

To learn more about artificial intelligent refer to :

https://brainly.com/question/20339012

#SPJ4

1.5.5: Work Shift

5 points

Let's Go!

A doctor works 20 hours, 42 minutes, and 16 seconds in one shift at a hospital. Convert the total shift time into seconds and display that information.

NOTE: You must use at least ONE compound operator (+=, -=, *=, /=, %=) program.

Answers

The total works in seconds after we code in Java is 74536.

How to convert time in Java?

Operator in Java programming language is a symbol to perform mathematic operation. The compound operator is the compound symbol that combining two mathematic operation. For this code we gonna use compound operator +=, but before code I will provide you example.

a += b is equal to a = a + b.

The code is,

public class workshift {

   public static void main(String[] args) {

       int hours = 20, minutes = 42, seconds = 16;

       int tSeconds;

       tSeconds = (hours*60*60);

       tSeconds += (minutes*60);

       tSeconds += seconds;

       System.out.println(tSeconds);

   }

}

Learn more about operator here:

brainly.com/question/18088519

#SPJ4

Which of the following focuses primarily on the technical issues of keeping systems up and running?

Select one:

A. Business continuity planning

B. Security policies

C. Disaster recovery planning

D. An AUP

E. An information systems audit

Answers

Option C is correct. Disaster recovery planning focuses primarily on the technical issues of keeping systems up and running.

Disaster recovery plans are largely concerned with the technical aspects of maintaining systems, such as whether files should be backed up and how backup computer systems or disaster recovery services should be maintained. Disaster recovery planning creates strategies for resuming computing and communications operations following a disruption caused by an incident like an earthquake, flood, or terrorist attack. For instance, MasterCard keeps a backup computer facility in Kansas City, Missouri, that can be used in case of an emergency at its main facility in St. Louis. Many businesses hire disaster recovery companies, such as Comdisco Disaster Recovery Services in Rosemont, Illinois, and SunGard Recovery Services, with headquarters in Wayne, Pennsylvania, rather than building their own backup facilities. These catastrophe recovery companies offer hot sites with extra computers scattered across the nation so that paying companies can operate their vital programs in an emergency.

Know more about Disaster recovery here:

https://brainly.com/question/29479562

#SPJ4

The part of a computer that runs programs is called __________. a. RAM b. secondary storage c. main memory d. the CPU

Answers

The part of a computer that runs programs is called the CPU.

How do CPUs operate?

The central processing unit (CPU), sometimes referred to as a main processor, central processor, or simply processor, is the electrical device that carries out the instructions found in computer programs. The CPU performs crucial logical, regulating, mathematical, and input/output (I/O) activities as directed by the software. The opposite is true for unnecessary components like main memory, I/O circuits, and specialized processors like graphics processing units (GPUs). The brain of a computer is the central processing unit (CPU), which contains all the hardware needed to process input, store data, and output results. The CPU is always carrying out computer programs that tell it what data to process and in what sequence. Without a CPU, we couldn't run programs on a computer.

What various CPU kinds are there?

Processors with one, two, four, six, eight, or twelve cores are the most common types of CPUs.

To know more about CPU visit

https://brainly.com/question/16254036

#SPJ4

If a mistake is made after deleting text, use the redo option. True False The first line of a paragraph begins at the left margin, and the remaining lines of the paragraph are indented by inches. This format is known as a hanging indent. first-line indent. block indent. right indent.

Answers

The statement is true. A paragraph's first line starts at the left margin, and the subsequent lines are indented by an inch. This format is known as a hanging indent.

The initial line of a paragraph is set off by a hanging indent, often referred to as a second line indent, which also indents each consecutive line of the paragraph after the first line. To indent all lines of a paragraph other than the first, use a hanging indent.

In order to visually divide reference entries and make it simple for the reader to differentiate between sources, hanging indents are used in reference lists in the APA, MLA, and Chicago styles. In Microsoft Word, you can add a hanging indent to some or all of your text. Use Word's indentation features rather than manually indenting each line with the "Enter" and "Tab" keys.

Know more about hanging indent here:

https://brainly.com/question/24953659

#SPJ4

Other Questions
Parasympathetic innervation from the postganglionic axons of the pterygopalatine ganglion cause the lacrimal glands and small glands of the nasal cavity, oral cavity and palate to __________. The additional Medicare taxes assessed on high-income individuals carry differing tax rates depending on the tax base. True/False Function A is represented by the equation y= 2x+1. Function B is a linear function that goes through the points shown in the table. X 1 3 4 6 3 11 15 23 Which statement correctly compares the rates of change of the two functions? A. the rate of change of function a is 1 The rat of change of function b is 4B. the rate of change of function a is 2 the rate of change of function b is 8 C. the rate of change of function a is 1 the rate of change of function b is 8D. the rate of change of function a is 2 the rate of change of function b is 4 Which statement best explain the privileges and immunities clause of Article IV of the Constitution? aggression stems from feelings of anger and is aimed at inflicting pain, whereas aggression serves as a means to some goal other than pain.a.direct, passiveb.passive, directc.hostile, instrumentald.instrumental, hostile Seasonality causes comparability problems in ratio analysis. A common solution is to use an average account balance as opposed to an ending account balance. Carbon dioxide can combine with water in the body to produce carbonic acid. This can lead to a condition called acidosis. Explain how the bodys respiratory system will respond to acidosis. For each set of atoms, identify the isotopes Set I: Set 2: '8A YB Yc "D RE # #G #u Select the isotopes_ Select the isotopes: A cement mix calls for 2 cups of water and 1 1/4 pounds of mix to make five large tiles stick to the ground, Yolanda has plenty of water but only 4 3/8 pounds of mix. How many large tiles (including parts of a tile) can she stick to the ground? You MUST think conceptually and illustrate your thinking with a model. Do NOT use proportional reasoning. Find the two numbers which on multiplication with 360 gives a rational number. Are these numbers rational or irrational? Please explain in detail it is urgent 50 points. according to the text, one reason why medieval music sounds different from the music we generally hear today is that medieval music was not based on major and minor scales. t/f In which sentence is the adverbclause punctuated correctly? rights not given to the federal government are rights to the states, this is the principle of federalism a contractor is considering a sale that promises a profit of 240000.0 dollars with a probability of 0.76 or a loss (due to bad weather, strikes, and such) of 20000.0 with a probability of 0.24. what is the expected profit? in 2004, microsoft contested nearly a $613 million eu (european union) fine - the largest ever from the european commission. this fine was imposed after microsoft failed to comply with a ruling that it abused its market position. what environmental factor is most likely to explain what happened with microsoft in europe? Where does water vapor come from when you exhale?; When you exhale outside on a cold winter day the water vapor in your breath cools and changes into tiny water droplets?; When you breathe into a cold window and water droplets appear it is an example of blank?; When we breathe on a cold windowpane we find dust or drops of water? dr. rodriguez, a present-day psychiatrist in the us, most likely adheres to what model of mental illness and human behavior? How do you solve a/15 = 4/5 ? In triangle DEF, if mD = (2x), mE = (2x 4), and mF = (x + 9), what is the value of x?A: 35B: 37C: 44D: 71 How do you solve 2x+3=9?