What is the term for a website that uses encryption techniques to protect its data?

virtual site

locked site

secure site===========

vault

Answers

Answer 1

Encryption is the process of transforming information into a secret code that hides its true intent. the research into coding and decoding

Which phrase best describes the software that cybercriminals use?

When individuals talk about cyber security, words like virus, trojan, ransomware, or rootkit may come up. These terms all refer to the same thing—programs that thieves employ to infect computers and other electronic devices. Malware is a phrase that is frequently used to describe all of these various applications.

What phrase best describes the process of limiting access to particular Web content?

An Internet filter is software that limits or regulates the content that a user of the Internet can access, particularly when it is used to limit content that is supplied over the Internet by way of the Web, email, or other channels. Software used to restrict content decides what will be allowed or forbidden.

To know more about encryption techniques visit:-

https://brainly.com/question/3017866

#SPJ4


Related Questions

ultimate marvel vs capcom 3 how to unlock golden herald outfits how do they unlock for the ps vita

Answers

At least in Ultimate Marvel vs Capcom 3, the only thing you can unlock is the Herald colors for each character, making them look like the Silver Surfer.

Although I'm not sure how to unlock them, I know it's hard to do. PC I think you can just download a save file or hack the game or something to get them.

To learn more about Ultimate Marvel vs Capcom 3 please click the below link.

https://brainly.com/question/19981482

#SPJ4

Waves propagate at 8. 0 m/s along a stretched string. The end of the string is vibrated up and down once every 1. 5 s. What is the wavelength of the waves that travel along the string?.

Answers

The wavelength of the waves that travel along the string is 12.0 m. The wavelength can be determined by divide velocity and frequency.

The wavelength of a wave is the distance between two consecutive peaks or troughs of the wave. To calculate the wavelength of the waves that travel along the stretched string, we can use the equation:

wavelength (λ) = velocity (v) / frequency (f)

Given that the waves propagate at 8.0 m/s along the string and the end of the string is vibrated up and down once every 1.5 s, we can substitute these values into the equation to find the wavelength:

λ = 8.0 m/s / (1/1.5 s) = 8.0 m/s * 1.5 s = 12.0 m

Learn more about wave length, here https://brainly.com/question/10715783

#SPJ4

how to turn on assistive touch without home button

Answers

Launch the Settings app. Step 2: Select AssistiveTouch under Accessibility > Touch. Step 3: Press the AssistiveTouch switch until it becomes green.

What is a computing device?

An electrical device used to manipulate data or information is called a computer.

It has the ability to store, retrieve, and process data. You may already be aware that you can use a computer to play games, send emails, browse the web, and type documents.

Additionally, it may be used to create or edit spreadsheets, movies, and presentations.

Hardware refers to any part of your computer with a physical structure, like the keyboard or mouse.

Software is any set of instructions that tells hardware what to do and how to do it.

Software includes, among other things, word processors, video games, and web browsers.

learn more about computing device click here:

brainly.com/question/24540334

#SPJ4

what methodologies emphasize data and process models as well as the core of the system concept? question 2 options: all of these object oriented methodologies data centered methodologies process centered methodologies

Answers

Object oriented methodologies emphasize data and process models as well as the core of the system concept.

What does "object-oriented methodology" mean?

The re-use of software components is encouraged and made easier by the object-oriented methodology (OOM), a system development technique. A computer system can be created using this methodology on a component basis, allowing for the efficient reuse of current components and facilitating the sharing of its components by other systems. A approach of looking at software components and their relationships is the object-oriented methodology.

Encapsulation, polymorphism, and inheritance are the three traits that set object-oriented languages apart. The three main stages of object-oriented software development are object-oriented analysis, object-oriented design, and object-oriented implementation. OMT employs three separate models that are coupled in a manner similar to the more traditional structured approaches.

To learn more about object oriented, visit:

https://brainly.com/question/28731103

#SPJ4

In addition to foreign travel requirements those with sci access must?

Answers

Ensure that employees who have access to SCI notify their servicing security organization of planned foreign travel.

Make sure that everyone with access to SCI informs the servicing security organization of any upcoming international travel.

What is servicing security?

A processing or communication service offered by a system to provide a particular level of protection for resources, where the resources themselves may be stored on the system providing the service or they may be stored on another system. Examples include an authentication service or a PKI-based document attribution and authentication service.

A service business is there to interact with clients and provide them with the services they need. When two or more people work together in a structured way to offer services to a client with the goal of serving that client, that is what is known as a service organization.

Your staff members and actual offices are kept secure from harm at work. Your workplace security plan should protect your company's sensitive data and information from cybercriminals and other security risks.

Thus, Make sure that everyone with access to SCI informs the servicing security organization.

For more information about servicing security, click here:

https://brainly.com/question/15847603

#SPJ2

Which if the following broad categories is not a type of analytic technique?a. manipulative analyticsb. descriptive analyticsc. predictive analyticsd. prescriptive analytics

Answers

Descriptive, Diagnostic, Predictive, and Prescriptive analytics are the four different categories.

Businesses rely on three different forms of analytics to help them make decisions: descriptive analytics, which explain what has actually occurred; predictive analytics, which show us what might happen; and prescriptive analytics, which explain what ought to occur going forward. Students use the mean, mode, median, and range to analyze the data and draw conclusions. Using both recent and old data, descriptive analytics seeks out patterns and connections. Because it only describes trends and associations without going any further, it is frequently referred to as the most basic type of data analysis.

Learn more about data here-

https://brainly.com/question/11941925

#SPJ4

(3 pts.) on average how many users are active simultaneously? (3 pts.) if each user transmits 10 percent of the time. will the answer in part (d) increase or decrease? why?

Answers

You can transmit average 200 users. Because more user time will be required here, the solution will be less.

On average how many users are active simultaneously?

Each user requires 500 kbps

Link is 10 Mbps = 10000 kbps

Total users = 10000/500

                  = 20

20 when all require 100% of time.

Now when each user needs 5% of time only.

so it means 20 * 20 = 400 users can be accomdated

For 10% of the time then time is distributed in 10 slots

As it was in 5% only 20 slots of times was there.

In each slot 20 users can be accomdated.

so here 10*20 = 200 users can transmit

The answer will decrease because here time taken by user will be more.

To know more about transmit average, visit:

https://brainly.com/question/22921081

#SPJ4

Terrell is taking an assessment of his typing skills. One of the things he's evaluating is how often he has to use the delete key. What will that give him the MOST information about?

Question 5 options:
the speed of his typing

the accuracy of his typing

whether he can touch type or uses the "hunt and peck" method

the type of communication he types most often

Answers

Answer:

the accuracy of his typing

Explanation:

A video conferencing application isn't working due to a Domain Name System (DNS) port error. Which record requires modification to fix the issue? O Service record (SRV) O Canonical name (CNAME) O Text (TXT) O Host (A)

Answers

A video conferencing application might not work due to a Domain Name System (DNS) port error, in this case the record that requires modification to fix the issue is the Service record (SRV) record.

what type of network connections should be used to transport dante traffic? (select all that apply.) fiberoptics

Answers

Dante does not support Wi-Fi; instead, you must physically connect all of your networked devices to the Dante network via Ethernet Cat5e or Cat6 cables, as well as a network switch that is Dante-compatible.

What is Ethernet ?

Ethernet was one of the original networking technologies that was developed roughly 50 years ago. Despite this, Ethernet continues to be the de facto standard for computer networking because of how simple it is to install the communications protocol and how well it can incorporate modern advancements without compromising backwards compatibility.

Ethernet, at its core, is a technology that permits communication between computers—from servers to laptops—across wired networks that use hubs, switches, and routers to control traffic. Ethernet and wireless technologies work together without any issues.

To know more about Ethernet, visit:

https://brainly.com/question/28314786

#SPJ4

For some services, AWS automatically replicates data across multiple AZs to provide fault tolerance in the event of a server failure or Availability Zone outage. Select TWO services that automatically replicate data across AZs.

Answers

Services that AWS automatically replicate data across AZs include S3 and DynamoDB.

The following AWS services offer fault tolerance.

A very reliable, secure, and fault-tolerant method of data storage is offered by Amazon S3. You just have to pay for the storage that you use; AWS takes care of availability and fault-tolerance maintenance.

What steps does AWS take to guarantee a fault-tolerant system?

Similar to high availability, several AWS services come standard with some level of fault tolerance. Data replication across various availability zones is automatic in some S3 storage levels. In the event of a disruption in one availability zone, data will continue to be accessible via the remaining zones without any delays or data loss.

To know more about AWS visit:-

https://brainly.com/question/30050268

#SPJ4

I need real helppppp ( computer silence ?

Answers

The code that would be used for this specific action is to instruct the computer to move your painter in the forward direction while they can move east.

What is the function of computer code?

The function of computer code is to simply “chunk” a kind of instruction that you can use over and over again, rather than writing it out multiple times. Functions enable programmers to break down or decompose a problem into smaller chunks, each of which performs a particular task.

In computer programming, computer code refers to the set of instructions, or a system of rules, written in a particular programming language (i.e., the source code). It is also the term used for the source code after it has been processed by a compiler and made ready to run on the computer.

Therefore, the code that would be used for this specific action is to instruct the computer to move your painter in the forward direction while they can move east.

To learn more about Computer code, refer to the link;

https://brainly.com/question/30057703

#SPJ1

Joe, a user, returned yesterday from a trip where he utilized the GPS function of his mobile device. He now notices the battery is rapidly draining. Which of the following can Joe MOST likely do to resolve the issue without a loss of data?
A. Restart the mobile device
B. Update the device's firmware
C. Uninstall the GPS-enabled app
D. Readjust the location settings

Answers

Answer: C. Uninstall the GPS-enabled app

Explanation: Your phone can’t enter sleep mode if GPS is turned on. The GPS chip is constantly listening for satellites, and if you head underground or are in a place that blocks the signal, like under a metal roof or a Costco, the phone will go into random search mode.

Which of the following names in a program is equivalent to the name int?
Int
INT
All of the above
None of the above

Answers

None of the above of the given names in a program is equivalent to the name int. Thus, option D is correct.

What is a int?

In computer programming, an integer(int) is a data type used to represent real numbers without fractional values.

Machines store various integer data types in various ways. For instance, the range of a short integer in many popular programming languages is restricted to 32,767 and -32,768. These constrained ranges demonstrate the connection between a numerical value as understood by humans and how these values are stored in computer memory.

Programming is supported in a number of ways by the use of integers as variables. For instance, a common technique is to create an integer variable and store a value in it that will affect computations or calculations made within the programme. Examples include simplistic counter-related examples of code.

Learn more about int

https://brainly.com/question/16856574

#SPJ4

why do we have so many programming languages? check all the reasons why a new language may be written.

Answers

To sum it up, the main reason why there are many programming languages out there is that different problems require different tools to solve them

What is a Programming Language?

This refers to the term that is used to describe and define the type of language that is written in machine-readable format or code that a computer can understand to achieve and execute commands.

Hence, it can be seen that when it comes to the use of programming languages, it must be noted that each programming language has certain features and characteristics that make it suitable for specific tasks.

Read more about programming languages here:

https://brainly.com/question/20533667

#SPJ1

which of these best describes what his program can draw? choose 1 answer: choose 1 answer: (choice a) a two equally-sized eyes ranging in size, with a minimum size of 6 pixels and a maximum size of 19 pixels. each eye has a black pupil that ranges in size from a minimum of 3 pixels to a max of 4 pixels. (choice b) b two equally-sized eyes ranging in size, with a minimum size of 6 pixels and a maximum size of 20 pixels. each eye has a black pupil that ranges in size from a minimum of 3 pixels to a max of 5 pixels. (choice c) c two equally-sized eyes ranging in size, with a minimum size of 5 pixels and a maximum size of 20 pixels. each eye has a black pupil that ranges in size from a minimum of 2 pixels to a max of 5 pixels. (choice d) d two equally-sized eyes ranging in size, with a minimum size of 5 pixels and a maximum size of 19 pixels. each eye has a black pupil that ranges in size from a minimum of 2 pixels to a max of 4 pixels.

Answers

Two eyes of varying sizes, with a minimum size of 5 pixels and a maximum size of 20 pixels. Each eye has a black pupil that can be as small as 2 pixels or as large as 5 pixels.

What is pixels?

On a computer monitor display screen, a pixel is represented by a dot or a square. Pixels are the basic building blocks of a digital image or display and are generated using geometric coordinates.

The number, size, and colour combination of pixels varies depending on the graphics card and display monitor, and is measured in terms of display resolution. A computer with a display resolution of 1280 x 768, for example, will generate a maximum of 98,3040 pixels on a display screen.

The pixel resolution spread also influences display quality; more pixels per inch of monitor screen yields better image results. A 2.1 megapixel image, for example, contains 2,073,600 pixels due to its 1920 x 1080 resolution.

Learn more about pixels

https://brainly.com/question/15189307

#SPJ4

 Joe is configuring a new Windows laptop for an outside sales person. Which of the following steps should Joe take to secure the workstation?answer choicesDisable the guest account and disable Action Center pop-upsRename default accounts and disable the guest accountConfigure a single sign-on and disable Windows UpdateDisable Windows Update and rename the default accountsRun gpupdate tool and configure a single-sign on

Answers

Joe is configuring a new Windows laptop for an outside sales person. Configure the screen saver to require a password  should Joe take to secure the workstation.

What is windows configuration?

A Microsoft software program known as the Microsoft System Configuration (msconfig) utility is used to modify configuration settings, such as which software launches with Windows. The tabs General, Boot, Services, Startup, and Tools are all quite helpful.

                           Launch it by pressing Windows + R at the same time. Type "msconfig" into the box that appears, and then hit Enter or click/tap OK. Immediately after that, the System Configuration utility ought to launch.

What functions do system configurations perform?

Configuring the system Microsoft Windows starting issues can be resolved with the help of the system software MSConfig. It can modify boot parameters and turn off or on startup-running software, device drivers, or Windows services.

Learn more about Microsoft System Configuration

brainly.com/question/28903897

#SPJ4

What is the binary answer to the
addition 101 + 110?
O 1101
O 1010
O 1100
O 1011
What is the binary answer to the
addition 1010 +111?
O 110011
O 101010
10001
O 11100
What is the binary answer to the
addition 1100 + 1001?
110010
10101
110011
101101
* 1 point
*
*
1 point
1 point

please help on this and if you’ve done this one message me so please can u help with the other ones

Answers

Answer:

1011

Explanation:

101+110

from last digits-

1+0=1

0+1=1

1+1=10

so, answer will be 1011

Question 5/15 03 min 53 sec Hash Map implementations group key hashes into "buckets". In what situation would there be multiple key hashes in one bucket? Select the correct answer: When multiple value objects reference the exact same object in memory. When there has been a hash collision. When the Hash Map is optimized for look-up by concurrent threads. When the same key has been inserted more than once.

Answers

When the hash map is optimised to look up for concurrent threads, multiple key hashes in a single bucket may be performed.

Final Response: When the hash map is optimised to look up for concurrent threads, multiple key hashes in a single bucket may be performed.The value mapped by a specific key specified in the argument is retrieved or fetched using the get() function of the HashMap class. If there is no such mapping for the key in the map, NULL is returned. No matter how large set1 grows, it always takes around the same amount of time (SUPER FAST). This is so because set1 is a hash set, a hashmap or hashtable that only stores keys and doesn't store values.

To learn more about HASH MAP please click the below link.

brainly.com/question/14246558

#SPJ4

current environmental issues

Answers

Answer:

they are:

Explanation:

I think Global warming,Deforestation,Acid Rain,Climate change,Drought,Green house effect,Loss of Biodiversity,Sea level rise and acidification,Flood,Landslide,Soil erosion etc

Can anyone help me answer this question?
An operating system is a system software that controls and manages computer hardware and software.
Is this correct?

Answers

I think it’s correct but I’m not completely sure!

given that d refers to a dictionary, change the value mapped to by the key 'monty' to 'python'.

Answers

When the value mapped by the key'monty' to 'python,' d['Monty'] = 'Python'.

After applying the specified function to each item in a specified iterable, the map() method produces a map object (which is an iterator) of the results (list, tuple etc.)

map(fun, iter) (fun, iter)

It is a function to which the specified iterable's map transfers each of its elements.

Iter: The iterable that has to be mapped is an iter.

returns a list of the results after each item in an iterable has been subjected to the supplied function (list, tuple etc.)

When a function is applied to each item in an iterable, the map function in Python acts as an iterator to return a result (tuple, lists, etc.). When you wish to alter each iterable element using a single transformation function, you use it.

Learn more about Python here:

https://brainly.com/question/18502436

#SPJ4

you are worried that someone has been trying to log into your computer without your permission. how can you view a list of authorized and unauthorized log on attempts? the setup log in windows explorer the security log in the event viewer the application log in the event viewer the security log in windows explorer

Answers

The best place to look for a list of allowed and illegal log-on attempts is the Security Log in the Event Viewer.

Security – what is it?

By restricting others' freedom to act, security is resistance to possible damage (or other undesirable coercive change) inflicted by others. Beneficiaries of security might include people and social groups, things and institutions, habitats, and any other thing or phenomena that is susceptible to unwanted change. Refugees arrive on Lesbos Island in 2015 after fleeing conflict and instability in Iraq and Syria. Security has many other meanings outside being just safe from invading forces.

To know more about security  
https://brainly.com/question/15278726
#SPJ4

Using the house program we started in the 6.5 lesson, make additions to the house such as windows, doors,
and a roof to personalize it with different colors and fills. the expectation is to add at least one door, two
windows, and a roof to earn credit.

Answers

Discuss the style of home that have chosen as well as your options for windows and doors styles on the back of the mounted piece of coloured paper.

What is an example of a computer programme?

Computer programmes include MS Office, MS Excel, Adobe, Browser, Chrome, etc. To production experience and special effects for movies, computer applications are used.

What do programmes on computers do?

A series of instructions written in a programming languages for a computer to follow is referred to as a computer programme. Software, which also contains documentation and other immaterial components, comprises computer programmes as one of its components.

To know more about programs visit:

#SPJ4

Which one of the following is an internal command Mcq?
a.cut
b.expr
c.set
d.Is

Answers

Set statements are internal commands that assign their arguments to positional parameters such as 1, 2, and so on. Is, expr, and cut are external commands.

Which response is a command from within?

A MSDOS command that is loaded from cmdexe or command.com and kept in the system memory is referred to as an internal command. The picture demonstrates how the command.com file's commands are included in the command.com file.

What are commands from inside and from without?

A separate file is necessary for an external command to function, whereas an internal command is already included in the COMMAND COM file. A Bad command or file name error notice will appear, for instance, if your computer does not have the fd  isk exe file and you attempt to use the fdisk command.

To know more about Set statements visit :-

https://brainly.com/question/30037792

#SPJ4

Complementary Pairs A pair of strings form a complementary pair if there is some permutation of their concatenation that is a palindrome. For example, the strings "abac" and "cab" form a complementary pair since their concatenation is "abaccab" which can be rearranged to form a palindrome, i.e., "bcaaacb". Given an array of n strings, find the number of complementary pairs that can be formed.Note: Pairs of strings formed by indices (i,j) and (j,i) are considered the same. Example Consider stringData =["abc," "abcd", "bc", "adc"]. The following complementary pairs can be formed: - ("abc", "abcd"), concatenated string = "abcabcd" arranged as a palindrome - "abcdcba". - ("abc". "bc"), concatenated string = "abcbc" -> "bcacb". - ("abcd", "adc"), concatenated string = "abcdadc" -> "acdbdca". Return 3 , the number of complementary pairs. Function Description Complete the function countComplementaryPairs in the editor below. countComplementaryPairs has the following. parameter: string stringData[n]: the strings to pair Returns long. int:the number of complementary pairs that can be formed Constraints - 1≤n≤105 - 1≤ length(stringData[i]) ≤3∗105 - 1≤5um of the length of strings in stringData ≤3∗ 105 - All strings consist of lowercase English characters only.

Answers

Each sort or arrangement of a set or number of items is regarded as a distinct permutation of the set or number .

In C++, what is permutation?

The C++ Algorithm's next permutation() function allows for greater permutation by lexicographically rearranging the elements in the range [first, last) into the next. Each sort or arrangement of a set or number of items is regarded as a distinct permutation of the set or number.

The C++ code here:

let count = 0 for the function countComplementaryPairs(stringData);

for the reason that (assuming i = 0; i = length.stringData; i++)

for (let j equal i + 1; j = length.stringData;

let concat = stringData[i] + stringData[j]; j++)

    allow reverse to be equal to stringData[j] + stringData[i];

    if count++ = (isPalindrome(concat) || isPalindrome(reverse))

    the number of returns;

Let i equal 0 with the isPalindrome(str) function;

let j equal str.length minus 1;

while (i) j) if (str[i]!) return false == str[j])

  }

  i++;

  j--;

 true return;

Find out more about C++'s permutation here:

brainly.com/question/21990158

#SPJ4

our computer has been infected, and is sending out traffic to a targeted system upon receiving a command from a botmaster. what condition is your computer currently in?

Answers

The sentence makes reference to the computer's condition, which is referred to as a "Zombie condition."

What increases a computer's speed?

The performance of any system is mostly determined by ram, or Memory. As a result, your machine can perform multiple tasks simultaneously keep data in a kind of secondary storage. You'll been able to run more processes at once the more Storage you have.

Where does a computer store data?

Data is transferred from the random-access memory, or RAM, of the computer, and then saved to the hdd. The range of equipment that writes data toward the disk is known as the drive.

To know more about computers visit:

https://brainly.com/question/15707178

#SPJ4

Given two input integers for an arrowhead and arrow body, print a right-facing arrow. Ex: If the input is 0 1, the output is100000011000000111000000111(perferrably without if-else statements or loops)In Java

Answers

Java program to draw a geometric shape (right-facing arrow) with numbers, and using an array that roles as a canvas. Output image of the program is attached.

Java code

import java. io.*;

import java.math.*;

public class Main{

public static void main(String args[]) throws IOException {

 BufferedReader bufEntrada = new BufferedReader(new InputStreamReader(System. in));

// Define variables

 int a, b, intg[];

 String canva[][];

 canva = new String[5][5];

 intg = new int[2];

// Entry data (array length)

 System.out.println("Input two integers  ");

 for (a=1;a<=2;a++) {

  intg[a-1] = Integer.parseInt(bufEntrada.readLine());}

// Building the canvas with the entered numbers

 // row one

 canva[0][0] = " ";

 canva[0][1] = " ";

 canva[0][2] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[0][3] = " ";

 canva[0][4] = " ";

 // row two

 canva[1][0] = " ";

 canva[1][1] = " ";

 canva[1][2] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[1][3] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[1][4] = " ";

 // row three

 canva[2][0] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[2][1] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[2][2] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[2][3] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[2][4] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 // row four

 canva[3][0] = " ";

 canva[3][1] = " ";

 canva[3][2] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[3][3] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[3][4] = " ";

 // row five

 canva[4][0] = " ";

 canva[4][1] = " ";

 canva[4][2] = Integer.toString(intg[(int)Math.floor(Math.random()*2)]);

 canva[4][3] = " ";

 canva[4][4] = " ";

// Paint geometric shape (arrow)

 for (a=1;a<=5;a++) {

  for (b=1;b<=5;b++) {

   System.out.print("  "+canva[a-1][b-1]);}

  System.out.println(" ");}}}

To learn more about geometric shapes in java see: https://brainly.com/question/16009634

#SPJ4

What is the Abacus?
full explanation please

Answers

Answer:

The abacus (plural abaci or abacuses), also called a counting frame, is a calculating tool which has been used since ancient times.

Explanation:

It was used in the ancient Near East, Europe, China, and Russia, centuries before the adoption of the Hindu-Arabic numeral system.[1] The exact origin of the abacus has not yet emerged. It consists of rows of movable beads, or similar objects, strung on a wire. They represent digits. One of the two numbers is set up, and the beads are manipulated to perform an operation such as addition, or even a square or cubic root.

An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame. The abacus itself doesn't calculate; it's simply a device for helping a human being to calculate by remembering what has been counted.

Type casting: Computing average kids per family Compute the average kids per family. Note that the integers should be type cast to doubles. 1 #include 2 using namespace std; 3 4 int main() { 5 int numkidsA; 6 int numKidsB; 7 int numKidsC; 8 int numFamilies; 9 double avgkids; 19 11 cin >> numkidsA; 12 cin >> numkidsB; 13 cin >> numkidsC; 14 cin >> numFamilies; 15 16 /* Your solution goes here */ 17 18 cout << avgkids << endl; 19 20 return; 21 }

Answers

Calculate the typical number of kids per family. Keep in mind that doubles should be types cast onto the integers.

Describe type casting using an example.

Depending on just what we want to have the programme to accomplish, the type casting process causes the compiler to automatically switch through one type of data to another. For instance, if we assign an integer (int) value to a floating variable (floating point), the compiler will eventually transform this int number into the float value.

What does type casting look like in Java?

num = (int) data; The int word in this case indicates that the number variable has been changed to an int type. In the instance of Trying to narrow Type Casting, the larger-sized higher data types are changed into smaller types of data (having smaller size).

To know more about  type casting visit:

https://brainly.com/question/28272593

#SPJ4

Other Questions
during the civil rights movement (as in several other instances by members of protest movements in our history), people violated the positive law; in other words, they intentionally disobeyed the commands and rules of the sovereign government. how was that disobedience justified? If you see that your bank account has had some money taken out that you did not authorize, which of the following is one action you can take to defend yourself? A. File a police report. B. Add more money to the back account. C. Try to contact the person you think took your money. D. Leave the bank account open to see if more money is taken. In your class, you have scores of 83,70, 83, and 80 on the first four of five tests. To get a grade of , the average of the first five tests scores must be greater than or equal to 70 and less than 80 .a.Solve an inequality to find the least score you can get on the last test and still earn a C.b.What score do you need if the fifth test counts as two tests? what is anxiety{i need several answers} Considering the Mendelian traits tall (D) versus dwarf (d) and violet (W) versus white (w), consider the crosses below and determine the genotypes of the parental plants by analyzing the phenotypes of the offspring. Part A Parental Plants Offspring tall, violet x tall, white 1/2 tall, white 1/2 tall, violet Select all that apply. g the dual mandate of the federal reserve system is maximum employment and and a stock market that does not decline. true false Research by Langer & Rodin found that good care by the staff on behalf of the residents resulted in ______ becoming more debilitated, whereas ______ of the residents given choice and responsibility increased in their functioning.A. 71%; 93% B. 93%; 71% C. 53%; 47% D. 80%; 25% What effect did this act have on the U.S. economy? Describe the changes occur while mixing of two ideal gases Match the words in to the appropriate blanks in the sentence. Ideal gases mix because whilemong the ____ of Ideal gases ____Entropy, Increases, enthalpy, decreases, potential energy Answer the following question in 3-4 complete sentences.Examine the painting below by Pablo Picasso entitled Les Demoiselles d'Avignon. After looking at the painting and the elements of art used, read the quote below and answer the question that follows.An abstract painting of women using sharp angles and various colors.Picasso was the gateway to true modern art. His painting Les Demoiselles d'Avignon is considered the birth of modern art, which influenced many of the other great modern painters. Art doesn't need to be perfectly and accurately represented images to be beautiful; art is intended to invoke a mood to the viewer.Do you agree with the author regarding Picasso, the painting, and the definition of art? Why or why not? What is the degree of the polynomial 4w - 1?A. 1 B. 2 C. 3 D. 4 All of the employees at the acmesoft company are either programmers or salespeople. The programmers are always tell the truth, the salespeople always lie. Threes Acmesoft employees - A, B, and C-were standing together in the hallway. A visitor passed by and asked A. "Are you a programmer or a salesperson?" A mumbled an answer that the visitor could not hear clearly. The visitor then asked B, "what did A say?" B replied. "A said that he is a salesperson."At this point, the third employee, C, said ,"Don't believe B; he is lying! What are B and C? 1/ B and C are both programmers 2/ B is a programmer and C is a salesperson 3/ B is a salesperson and C is a programmer 4/ B and C are both salesperson Define each of the following as atomic element, molecular element, ionic compound, or molecular compound. select the least accurate statement about culture. a. culture is the basis for how we tell the world who we are and what we believe. b. culture can be both visible and invisible. c. because cultural norms are so deep-seated, they almost never change. d. the rules in any culture are inherently logical. Code to be written in python:Correct answer will get brainliest! :)For any positive integer S, if we sum up the squares of the digits of S, we get another integer S1. If we repeat the process, we get another integer S2. We can repeat this process as many times as we want, but it has been proven that the integers generated in this way always eventually reach one of the 10 numbers 0, 1, 4, 16, 20, 37, 42, 58, 89, or 145. Particularly, a positive integer S is said to be happy if one of the integers generated this way is 1. For example, starting with 7 gives the sequence {7, 49, 97, 130, 10, 1}, so 7 is a happy number.Your task is to write a function compute_happy_numbers(range1, range2) , where range1 and range2 are each tuples of the form (lower_bound, upper_bound), and returns a tuple containing: (1) the number of happy numbers in range1, (2) the number of happy numbers in range2, (3) the number of the range (1 or 2) containing more happy numbers, or None if both ranges have the same number of happy numbers.def compute_happy_numbers(range1, range2):"""Your code here"""Test Cases:compute_happy_numbers((1,1), (1,1))(1, 1, None)compute_happy_numbers((1, 10), (11, 100))(3, 17, 2) which explains why scarcity is a basic fact of life? responses technology has not advanced far enough yet. technology has not advanced far enough yet. demand will always be greater than supply. demand will always be greater than supply. there will always be too many people on the earth. there will always be too many people on the earth. people cannot make good allocation decisions. what type of a listing agreement allows the owner to appoint an exclusive agent to sell his property, but retains the right to sell the property himself? In a country called Nubaria, the capital share of GDP is 40 percent; the average growth in output is 4 percent per year; the depreciation rate is 5 percent per year; and the capital-output ratio is 2.5. Suppose the production function is Cobb-Douglas and Nubaria is in a steady state.What is the saving rate in the initial steady state?What is the marginal product of capital in the initial steady state? What is the economic interpretation of this number?What is the general definition of the "Golden Rule" steady state? Is this particular economy at that point? Find out by computing the marginal product of capital at the Golden Rule steady state, compare, and explain!Compute the capital-output ratio and the saving rate required to get to the Golden Rule point. Are they higher, lower or equal to those from before? Why? If you were given a chance to live in one of the civilizations that we discussed, e.i. ancient time, medieval times, renaissance, scientific revolution, industrial revolution, maya, inca, and egypt, which do you want to live and why? If you are having trouble making auto loan payments and are really following a tight budget, which recommendation below represents the WORST advice?(2 Points)OFind an extra source of income by taking a second job, working longer hours, or borrowing from familyif they can afford to helpStop making payments on some of your debts so you can focus on getting the most expensive orlargest debts under controlContinue making all payments and call your lenders and see if you can negotiate lower monthly pay-ments, lower interest rates, or longer termsO Explore whether a free or non-profit credit counseling service could help