Answer:
#include <string>
#include <cstdlib>
using namespace std;
bool isbnCheck(string isbn) {
if (isbn.length() != 13) return false;
int sum = 0;
for (int i = 0; i < 13; i++) {
if (!isdigit(isbn[i])) return false;
int digit = isbn[i] - '0';
sum += (i % 2 == 0) ? digit : digit * 3;
}
return (sum % 10 == 0);
}
Explanation:
first checks if the length of the input string isbn is 13, and returns false if it is not. Then, a variable sum is initialized to keep track of the sum of the weighted digits, and a for loop is used to iterate through the digits in the ISBN number. For each digit, the isdigit function is used to check if the character is a digit, and the function returns false if it is not. The digit is then converted to an integer by subtracting the ASCII value of the character '0', and is added to the sum with a weight of 1 or 3, depending on the position of the digit. Finally, the function returns true if sum % 10 is equal to 0, which indicates a valid ISBN-13 number, and false otherwise.paraphrasing clarifies the message for both sender and receiver. paraphrasing clarifies the message for both sender and receiver. true false
True. Paraphrasing clarifies the message for both sender and receiver. Paraphrasing clarifies the message for both sender and receiver.
What is Paraphrasing?
Paraphrasing is a writing technique that involves taking an original text and rewriting it in your own words. It is used to make writing easier to read and understand, as well as to avoid plagiarism. Paraphrasing involves taking the ideas and information from a source and expressing them in a new way. This involves changing the words, structure and style of the text, while still conveying the same meaning. It is important to credit the original author when paraphrasing, as it is still their ideas and information that you are using.
To know more about Paraphrasing
https://brainly.com/question/5032491
#SPJ4
what type of security monitoring tool would be most likely to identify an unauthorized change to a computer system?
An intrusion detection system (IDS) is the most likely security monitoring tool to identify an unauthorized change to a computer system. An IDS monitors network traffic and system activities for malicious or suspicious activity and raises an alert when it detects a potential threat.
What is IDS?
Intrusion Detection System (IDS) is a network security technology that is used to detect malicious activities and threats like unauthorized access, malicious code execution, configuration changes, and unusual user activities. It works by monitoring network traffic and analyzing it for suspicious activities. It can detect malicious activities based on predetermined rules, signatures, and behavioral analysis.
To know more about IDS
https://brainly.com/question/20709626
#SPJ4
a lan design uses a layer 3 etherchannel between two switches sw1 and sw2, with port-channel interface 1 used on both switches. sw1 uses ports g0/1 and g0/2 in the channel. however, only interface g0/1 is bundled into the channel and working. think about the configuration settings on port g0/2 that could have existed before adding g0/2 to the etherchannel. which answers identify a setting that could prevent ios from adding g0/2 to the layer 3 etherchannel?
A different speed (speed value)
A default setting for switch port (switch port).
EtherChannel is a port-channel architecture or port-link aggregation technology predominantly utilized on Cisco switches. To provide fault-tolerance and fast links between switches, routers, and servers, it enables grouping together numerous physical Ethernet cables to create one logical Ethernet link.
With a layer 3 EtherChannel, two configuration settings especially the speed and the duplex should be identical on all the physical ports set with the speed and the duplex commands. For,
A different speed setting may stop the IOS from adding interface G0/2 to the Layer 3 EtherChannel.
Learn more about EtherChannel here
https://brainly.com/question/27132642
#SPJ4
in comparison with a flat file system, _____ in a database.
Storage space in a database is less than it is in a flat file system.
What distinguishes databases from flat file systems?The following list of differences between databases and flat files: Databases offer greater flexibility, whereas flat files offer less. Data consistency is provided by database systems, however it is not possible with flat files. A database is safer than flat files.
What distinguishes a relational database from a flat-file database?A relational database is made up of several tables of data that are connected to one another by unique key fields. Relational databases, which have more flexibility than flat file databases, which only have one table of data, are more difficult to design and maintain.
To know more about database visit:-
https://brainly.com/question/6447559
#SPJ4
3.14 program: divide by x write a program using integers usernum and x as input, and output usernum divided by x three times. ex: if the input is:
Program using integers usernum and x as input, and output usernum divided by x three times. ex: if the input is: #include <stdio.h> int main(void) {
Program using integers usernum :#include <stdio.h>
int main(void) {
int usernum, x;
printf("Enter a user number and x: ");
scanf("%d %d", &usernum, &x);
printf("%d / %d = %d\n", usernum, x, usernum / x);
usernum /= x;
printf("%d / %d = %d\n", usernum, x, usernum / x);
usernum /= x;
printf("%d / %d = %d\n", usernum, x, usernum / x);
return 0;
}
Integer programming: what is it?The optimization of a linear function under a set of linear constraints over integer variables is referred to as integer programming. The statements made in linear programming are as follows: Linear programming models are all examples of production planning.
Where is the use of integer programming?Job-shop modeling is just one of many industrial production uses for mixed-integer programming. The determination of the production yield for multiple crops that can share resources (such as land, labor, capital, seeds, fertilizer, etc.) is an important example in agricultural production planning.
Learn more about integer programming :
brainly.com/question/27855584
#SPJ4
computers with ai use human intelligence to make decisions.
True or false?
Answer:
True
Explanation:
Much of A.I. is trained or "taught" with the information humans provide it. Supervised A.I. needs human feedback so it knows what to learn.
For example, if you wanted to create an A.I. that identified pictures of dogs, you would need to provide a set of images that contained dogs. That's where the human aspect is. You need a human to know how a dog looks so the A.I. can be taught properly to identify dogs.
Hope that helps.
Why adjacent JSX elements must be wrapped in enclosing tag?
Adjacent JSX elements must be wrapped in an enclosing tag because JSX elements must have one parent element. This helps to ensure that the structure of the React application is consistent and valid.
What is Application?
Application is a computer program designed to perform a specific task or multiple tasks. Applications may be embedded in a larger software package or stand-alone. They are usually developed to run on a variety of platforms, including desktop computers, mobile devices, and even embedded systems such as those found in automotive and industrial machinery. Applications range from word processing programs to game engines, from financial software to medical imaging systems, and from web browsers to device drivers.
To know more about Application
https://brainly.com/question/24264599
#SPJ4
true or false? signature-based intrusion detection systems (idss) compare current activity with stored profiles of normal (expected) activity.
It is false that signature-based intrusion detection systems (idss) compare current activity with stored profiles of normal (expected) activity.
An instruction detection system IDS, also known as an instruction prevention system IPS, is a software program that helps us to monitor the systems for hostile or policy-violating activities.
It is a system. that monitors the network traffics, and immediately issues alert whenever suspicious activity is discovered.
Learn more about instruction detection systems here
https://brainly.com/question/26199042
#SPJ4
1. Which of the following key Data Analyst tasks is typically done last?
Visualizing data
Collecting data
Analyzing data
Cleaning data
The task of Visualizing data is typically done last among the listed options. The correct option is option (1).
After collecting, cleaning, and analyzing the data, the final step is to visualize the findings and insights in a meaningful and understandable manner through charts, graphs, or other visual representations.
Visualizations help communicate the results effectively to stakeholders and facilitate better decision-making.
Therefore, The task of Visualizing data is typically done last among the listed options. The correct option is option (1).
To know more about Visualizing data:
https://brainly.com/question/30328164
#SPJ4
According to the passage, which of the following best describes how a bottom-up cascade would reduce population size throughout the community?
Read Passage
A
The removal of the piscivorous fish population would cause an increase in the size of the smaller fish population. The smaller fish would then eat more of the zooplankton, leading to an increase in the size of the phytoplankton community.
B
The removal of the zooplankton population would allow phytoplankton to flourish. However, the smaller fish would no longer have a source of food, causing their population to decline rapidly. As the smaller fish died off, the piscivorous fish would also lose their food source, so their population size would also decline.
C
A small increase in the piscivorous fish population would lead to a slight decrease of the smaller fish. With less smaller fish present, the zooplankton population would increase slightly, leading to a slight decrease in the phytoplankton population.
D
The removal of the smaller fish would cause an increase in the size of the zooplankton population. With an excess of zooplankton, the phytoplankton population would decline rapidly. Additionally, without the smaller fish, the piscivorous fish would not have any source of food, and their population would also decline rapidly.
It can be inferred that the option that the correct option is
"The removal of the zooplankton population would allow phytoplankton to flourish. However, the smaller fish would no longer have a source of food, causing their population to decline rapidly. As the smaller fish died off, the piscivorous fish would also lose their food source, so their population size would also decline." (Option B)
What is the rationale for the above response?The loss of the zooplankton population would cause the smaller fish population to dwindle since they would no longer have a food supply. Because of a scarcity of food, the piscivorous fish population would diminish as the smaller fish population declined.
This would result in a decline in total fish numbers. Meanwhile, removing zooplankton would initially allow phytoplankton to grow, but over time, the excess phytoplankton would deplete available nutrients, resulting in a fall in the phytoplankton population.
Learn more about Zooplankton:
https://brainly.com/question/24681358
#SPJ1
true or false: it is legal to practice hacking public websites as long as you are a student learning about cybersecurity.
False. It is illegal to hack any website, regardless of whether you are a student learning about cybersecurity or not.
What is Cybersecurity?
Cybersecurity is the practice of protecting networks, systems, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cybersecurity involves a set of policies, technologies, and processes designed to protect networks, computers, programs, and data from attack, damage, or unauthorized access. It includes measures to prevent, detect, and respond to cyberattacks. Cybersecurity is important to protect organizations and individuals from malicious actors who seek to exploit their systems for financial gain or to cause disruption.
To know more about Cybersecurity
https://brainly.com/question/28004913
#SPJ4
warner bros announced 10 new dc film/tv projects this week, which one will feature the character john stewart?
Warner bros announced 10 new dc film/tv projects this week, in which John Stewart will feature the character of Green Lantern.
What is Warner bros?Warner Bros. Entertainment Inc., also known as Warner Bros. or simply WB, is a division of Warner Bros. Discovery and an American film and entertainment studio with headquarters at the Warner Bros. Studios complex in Burbank, California.
Harry, Albert, Sam, and Jack Warner founded the company in 1923. It quickly became a leader in the American film industry before branching out into television, video games, and animation. It is one of the "Big Five" major American film studios and a member of the Motion Picture Association (MPA).
The company is well-known for its film studio division, the Warner Bros. Pictures Group, which includes Warner Bros. Pictures, New Line Cinema, the Warner Animation Group, Castle Rock Entertainment, & DC Studios.
Learn more about Warner Bros.
https://brainly.com/question/23336168
#SPJ4
In comparison with a flat file system, _____ in a database.
In comparison with a flat file system,data organization in a database.
What is the database?A database is an organized collection of structured data, generally stored and accessed electronically from a computer system. It is the collection of schemas, tables, queries, reports, views, and other objects. Database systems are used to store and manage large amounts of data. They can provide quick and easy access to data for applications, as well as ensuring data integrity and accuracy. Databases are used for a variety of purposes, including data warehousing, e-commerce, online transaction processing, data mining, and more.
To learn more about database
https://brainly.com/question/24027204
#SPJ1
authorization management defines procedures to protect and guarantee database security and integrity. which of the following is a procedure of authorization management? a. user access management b. view definition c. dbms access control d. dbms usage monitoring e. all of the above. f. none of the above.
Access management is the method of authorisation management.
What does database security authorisation entail?During the authorization process, the database manager receives data about the authenticated user. Specifying which database procedures and data items a user may access is one aspect of the information. Business adoption of DAC will be facilitated by smaller to the applications.
What does a DBMS authorization manager do?By assessing whether a given person has the authority to do the requested activity or not, the Authorization Manager application ensures role-based access control. Every time the database is changed, the integrity manager reviews the integrity constraints.
To know more about about Access visit:-
https://brainly.com/question/14286257
#SPJ1
you can edit cell contents in the formula bar or in the cell itself. TRUE OR FLASE
Yes, You can edit the contents of a cell in the formula-bar or directly in the cell.
So, the given sentence is TRUE.
What is a Formula-bar?
The Formula-bar is a feature in spread-sheet software, that displays the contents of the selected cell. It is located above the spread-sheet and is usually labeled with the letter "fx" to indicate that it is used to enter formulas.
The Formula-bar allows you to view and edit the contents of a cell, including formulas, functions, and data. When you click on a cell, its contents will be displayed in the Formula-bar, and you can edit the contents directly in the bar. This is useful for making quick changes to cell contents without having to navigate to the cell itself.
In most spread-sheet software programs, such as
Editing in the Formula-bar: To edit cell contents in the Formula-bar, you can click on the cell that you want to edit. The cell contents will appear in the Formula-bar, and you can make changes directly in the bar. Once you have made the necessary changes, you can press the Enter key on your keyboard to apply them. This method is particularly useful for editing long or complex cell contents, as it allows you to view and edit the entire content without needing to scroll or expand the cell.
Editing in the Cell itself: To edit cell contents directly in the cell, you can double-click on the cell that you want to edit, and then make the necessary changes. Alternatively, you can select the cell and then start typing, which will overwrite the existing content. This method is particularly useful for editing short or simple cell contents, as it allows you to quickly edit them without needing to navigate away from the cell.
Hence, In both cases, you can edit cell contents in both the formula-bar and the cell itself. To edit the formula-bar, click on the cell and make changes in the bar. To edit in the cell, double-click on the cell or start typing when the cell is selected.
To learn more about the Formula-bar click here
https://brainly.in/question/26465076
#SPJ4
you can edit cell contents in the formula bar or in the cell itself. true/false
It's true what is said here. The cell's contents in the formula bar can be changed. Click anywhere on the formula bar, then click the cell containing the data you want to change.
How can I display the contents of a cell in a formula bar?The Excel Options dialogue box's Advanced options. Select Show Formula Bar by checking the box. The Formula Bar is shown when it is selected; if it is not selected, it is not seen. Select OK.
How should a cell be included in a formula?To insert a formula, click the cell and then write =. (equal sign). Choose the cell that the desired value is located in, or type the cell reference. A single cell, a group of cells, a place in another worksheet, or a location in another workbook can all be referred to.
Learn more about cell here:
https://brainly.com/question/2986035
#SPJ1
domain expertise and text, numeric, and visual data are all inputs to what phase of the spiral methodology for the data mining process?
The engineering step of the spiral technique for data mining uses domain knowledge as well as text, quantitative, and visual data as inputs.
The spiral model technique is what?The Spiral Model replicates project phases by beginning with small objectives and spiraling outward in ever-wider arcs (called rounds). Each spiral round represents a project, or each round may use a modified version of a typical software development approach like waterfall. Each round involves doing a risk analysis.
What is an example of a spiral model?Microsoft employed the spiral approach when creating the first iterations of Windows. The software for Gantt charts was likewise developed using a spiral methodology. Another industry that uses the spiral model to create games is game development.
To know more about Spiral Methodology visit :
https://brainly.com/question/30670364
#SPJ4
what are the steps to save work with title on word
The step to save work with a title on the word is Click FILE > Save, pick or browse to a folder, type a name for your document in the File name box, and click Save.
How do you put a title on a Word document?To put a title in a word document, follow these steps:
Choose File. Open Word and click the File menu item in the Main Tabs.Enter the Title here. Enter your evocative title in the text box labeled Title on the Info screen. Feedback.Therefore, the step to save work with a title on the word is Click FILE > Save, pick or browse to a folder, type a name for your document in the File name box, and click Save.
To learn more about the title page in Word, refer to the link:
https://brainly.com/question/28499338
#SPJ9
which is the sorting algorithm with the best growth rate (i.e., slowest growing) when the list is nearly sorted? group of answer choices
When the list is almost sorted, insertion sort has the best growth rate (that is, the slowest growing).
Which sorting algorithm is the slowest?A sorting algorithm is called Slowsort. It lacks use and is comical in nature. It is a hesitant algorithm built on the multiply-and-surrender approach (a parody formed by taking the opposites of divide and conquer).
How is Quicksort superior?An in-place sorting algorithm is a quick sorting. No additional storage space is required for sorting when it is done in place. While Merge Sort does not exist, Fast Sort has the advantage of space since Merge Sort needs a temporary array to join the sorted arrays.
to know more about sorting algorithms here:
brainly.com/question/13098446
#SPJ4
when you can determine the value of a field using information from existing fields in a record in a query, you should create a(n) .
the expression is complete, you can save the calculated field in the query and it will be available for use in the query.
1. A calculated field is a field in a query that is created by performing calculations on existing fields.
2. To create a calculated field, you need to determine the value of a field using information from existing fields in a record.
3. This can be done by using an expression in the query, which will involve performing calculations on the existing fields in the record.
4. Once the expression is complete, you can save the calculated field in the query and it will be available for use in the query.
Learn more about query here
https://brainly.com/question/14311643
#SPJ4
What are software solutions that allow the firm to collect customer-specific data? a) MRP b) CRM c) ERP d) JIT e) ISO.
There are several software solutions that allow a firm to collect customer-specific data, including CRM (customer relationship management) and ERP (enterprise resource planning).
CRM software solutions are designed to help businesses manage customer data and interactions, track leads, and automate marketing and sales processes. ERP software solutions are used to manage a company's business processes, including financials, procurement, inventory, and customer service. Both of these software solutions can be used to collect customer-specific data and use it to improve business operations and customer relationships.
ISO (International Organization for Standardization) is not a software solution, but rather an independent organization that develops and publishes international standards for various industries.
Learn more about software solutions here:https://brainly.com/question/28224061
#SPJ11
1. Which team had the most accurate device? How can you tell (justify)?
2. Which team had the most precision with their device? How can you tell( (justify)?
Answer:
please man me brainliest i don't have the right answer but hope this helps
Explanation:
You can measure precision by finding the average deviation, which calculates the average of the differences in measurements. Data can be precise without being accurate, but ideally, the measurements are both precise and accurate to produce quality results.
write a program that runs on spim that allows the user to enter the number of hours, minutes and seconds and then prints out the total time in seconds.
Answer:
.data
hours: .word 0
minutes: .word 0
seconds: .word 0
.text
.globl main
main:
# Prompt the user to enter the number of hours
li $v0, 4
la $a0, hours_prompt
syscall
# Read the number of hours
li $v0, 5
syscall
sw $v0, hours
# Prompt the user to enter the number of minutes
li $v0, 4
la $a0, minutes_prompt
syscall
# Read the number of minutes
li $v0, 5
syscall
sw $v0, minutes
# Prompt the user to enter the number of seconds
li $v0, 4
la $a0, seconds_prompt
syscall
# Read the number of seconds
li $v0, 5
syscall
sw $v0, seconds
# Calculate the total time in seconds
lw $t0, hours
lw $t1, minutes
lw $t2, seconds
li $t3, 3600 # number of seconds in an hour
mul $t0, $t0, $t3
li $t3, 60 # number of seconds in a minute
mul $t1, $t1, $t3
add $t0, $t0, $t1
add $t0, $t0, $t2
# Print the result
li $v0, 4
la $a0, result
syscall
li $v0, 1
move $a0, $t0
syscall
# Exit the program
li $v0, 10
syscall
hours_prompt: .asciiz "Enter the number of hours: "
minutes_prompt: .asciiz "Enter the number of minutes: "
seconds_prompt: .asciiz "Enter the number of seconds: "
result: .asciiz "The total time in seconds is: "
Explanation:
The program starts by defining three variables hours, minutes, and seconds to store the input from the user.The program then prompts the user to enter the number of hours, minutes, and seconds using the syscall instruction with $v0 set to 4 to print a message.The program reads the input using the syscall instruction with $v0 set to 5 to read an integer.The program calculates the total time in seconds by multiplying the number of hours by the number of seconds in an hour (3600) and the number of minutes by the number of seconds in a minute (60). The result is stored in the register $t0.The program then prints the result by first printing a message and then the total time in seconds using the syscall instruction with $v0 set to 4 to print a message and $v0 set to 1 to print an integer.Finally, the program exits using the syscall instruction with $v0 set to 10.which of the following types of software vulnerability occurs due to coding errors and allows attackers to gain access to the target system? question 2 options: open services buffer overflow misconfiguration unpatched servers
Software vulnerabilities that cause resource exhaustion are caused by code flaws and provide attackers access to the target machine.
What makes buffer overrun a security risk?This error happens when a buffer can't hold all the data, which leads to data overflowing into nearby storage. This flaw has the potential to crash the system or, worse yet, serve as a gateway for a cyberattack.
A code execution vulnerability is what?A security flaw known as remote code execution (RCE) enables attackers to connect to a remote system via public or private networks and execute arbitrary code on it. The many types of cyber-attacks include SQL injection assaults, phishing attacks, malware attacks, and password attacks.
To know more about Software vulnerabilities visit:-
https://brainly.com/question/25259992
#SPJ1
utilizing big data becomes problematic when it is structured unstructured or semi-structured. True or False
False. Utilizing big data can be challenging regardless of whether it is structured, unstructured, or semi-structured.
How is structured data organized?
Structured data is organized and easy to process using traditional database tools.
Unstructured data, on the other hand, can include text, images, audio, and other data types that are not easily organized or processed using traditional tools.
Semi-structured data falls somewhere in between, with some level of organization or structure, but not enough to fit into a traditional database schema.
Read more about big data here:
https://brainly.com/question/28333051
#SPJ1
write program fragments (i.e., you do not need to write complete programs) that read a line of input as a string and print: only the uppercase letters in the string every second letter of the string the string with all vowels replaced by an underscore the number of vowels in the string the positions of all vowels in the string
The program fragments (i.e., you do not need to write complete programs) that read a line of input as a string and print.
// only the uppercase letters in the string
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter a string: ");
String str = input.nextLine();
for (int i = 0; i < str.length(); i++) {
char ch = str.charAt(i);
if (Character.isUpperCase(ch)) {
System.out.print(ch);
}
}
System.out.println();
// every second letter of the string
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter a string: ");
String str = input.nextLine();
for (int i = 0; i < str.length(); i += 2) {
System.out.print(str.charAt(i));
}
System.out.println();
}
// the string with all vowels replaced by an underscore
public
What is the void?A state of nothingness or empty space is referred to as a void. It is frequently used to describe a space that does not contain any material objects, like a vacuum. A lack of emotion or a sense of emptiness can also be referred to as void.
What is a fragment of a program?A program fragment is, roughly speaking, any program term that is syntactically correct and may contain free variables. The separate typechecking and code generation of program fragments is the goal of separate compilation.
Learn more about program fragments:
brainly.com/question/20308250
#SPJ4
when coded in a where clause, which search condition will return invoices when paymentdate is not null and invoicetotal is greater than or equal to $500?
When coded in a WHERE clause, return invoices when the payment date is not null and the invoice total is higher than or equal to $500.
Which clause defines how many rows should be obtained after the predetermined number of rows have been skipped?The number of rows in the result table to skip before any rows are retrieved is specified by the offset clause. The offset clause states that before rows are obtained, the number of rows given by offset-row-count should be skipped.
Which of the following clauses is used to extract rows from a grouped result that match the stated condition?Following the grouping of the rows using the where clause, which also does aggregate calculations, the groups are filtered using the having clause.
To know more about invoices visit:-
https://brainly.com/question/24076114
#SP
what are three media types found at the physical layer? what does each media types use to transmit data
Information that is broadcast to the public by radio waves or digital data is known as broadcast media.
Internet is a medium for technological communication that reaches individuals via gadgets Print media are written works that are printed on paper and distributed to various audiences. The term "media" is well known as a term that is frequently used to refer to a method of communication through which individuals frequently exchange news, etc. In conclusion, broadcast media is information that is transmitted to individuals over radio waves or digital data. Make the media signals that go with each frame's bits. The OSI physical layer enables the bits that comprise a frame to traverse the network media. The OSI Physical layer, which is in charge of converting binary digits that stand in for Data Link layer frames into signals and transmitting and receiving those signals, connects copper cables, optical fiber, and wireless network devices.
Learn more about Media here:
https://brainly.com/question/21789255
#SPJ4
How do I fix Ffmpeg not found?
Ffmpeg refers to a Fast Forward Moving Picture Expert Group. It is an open and free software group that provides a variety of tools for the processing of audio and video.
This error that FFmpeg was not found could probably mean that your system may not have this application installed. To fix this error, Make sure that all the drivers in your system are updated.
Close all the other running applications in the background except for your system processes(use the task manager if needed).
Or else, you can try reinstalling the application.
Learn more about Moving picture here
https://brainly.com/question/7382735
#SPJ4
on print eo4.1 (1 of 4), what does the square symbol with an f inside and an attached triangle represent?
The square symbol with an f inside and an attached triangle represents a fire alarm audio/visual signaling device. The correct option is b.
What is a square?An item used in engineering and technical design with the purpose of supplying a straightedge at a right angle or another specific planar angle to a baseline is known as a set square or triangle.
Deaf and hard of hearing people are warned of a fire using visual alarm devices (VADs). To warn individuals who cannot hear the fire alarm system's sounder, they generate flashing light pulses.
Therefore, the correct option is b. Fire alarm audio/visual signaling device.
To learn more about the square, refer to the link:
https://brainly.com/question/19711761
#SPJ1
The question is incomplete. The missing options are given below:
4" square box
Fire alarm audio/visual signaling device
Fire alarm pull station
Fountain for drinking water