Lab 18. 16 Java Script Password Strength zybooks

Answers

Answer 1

Here is an example of a JavaScript function that checks the strength of a password:

The Java Script Function

function checkPasswordStrength(password) {

 var strength = 0;

 // check the length of the password

 if (password.length >= 8) {

   strength += 1;

 }

 // check for lowercase letters

if (password.match(/[a-z]/)) {

   strength += 1;

 }

 // check for uppercase letters

 if (password.match(/[A-Z]/)) {

   strength += 1;

 }

 // check for numbers

 if (password.match(/\d/)) {

   strength += 1;

 }

 // check for special characters

 if (password.match(/[^\w\s]/)) {

   strength += 1;

 }

 return strength;

}

This function takes a password as an argument and returns a strength score between 0 and 5, where 0 is the weakest and 5 is the strongest.

Read more about Javascript here:

https://brainly.com/question/28021308

#SPJ1


Related Questions

Imagine that your manager has asked you to write an email to all department heads. What are three important questions you should ask her before you start writing to ensure you create the most effective communication?

5 Sentences

Answers

The three important questions you should ask her before start writing most effective question is 1. What is the email's primary objective?

2. Is there any particular information or subject matter that ought to be included in the email?

3. Who is the email intended recipient?

Why is email such a useful communication tool?

Email provides a virtual paper trail of conversations and interactions that can be easily searched. Anyone with an internet connection can access email. An email message can be sent to multiple recipients at once. Email gives recipients time to consider the message and respond thoughtfully.

What is the purpose of email communication?

The internet-based exchange of computer-stored messages between one user and one or more recipients is known as electronic mail. Emails are a quick, low-cost, and easy way to communicate for personal or business purposes.

Learn more about Email communication :

brainly.com/question/20731943

#SPJ1

Question at position 5 a mathematician develops a program to solve systems of linear equations. When they use distributed computing techniques to run the program on two computers in parallel, they find a speedup of 2. In this case, what does a speedup of 2 indicate? a mathematician develops a program to solve systems of linear equations. When they use distributed computing techniques to run the program on two computers in parallel, they find a speedup of 2. In this case, what does a speedup of 2 indicate? the program completed in two minutes less time with two computers versus one computer. The program completed in half the time with two computers versus one computer. The program completed in twice as much time with two computers versus one computer. The program completed in two minutes more time with two computers versus one computer

Answers

A speedup of 2 means that the program completed in half the time with two computers versus one computer. Speedup is a measure of how much faster a program runs on multiple processors compared to a single processor, and a speedup of 2 indicates that the program runs twice as fast on two processors as it does on a single processor.

What does speedup of 2 indicate

A speedup of 2 in this case indicates that the program completed in half the time with two computers versus one computer. Speedup is a measure of how much faster a program runs when executed on multiple processors compared to a single processor. A speedup of 2 means that the program runs twice as fast on two processors than on a single processor. In other words, if the program takes T time to complete on a single processor, it takes T/2 time to complete on two processors.

Learn more on processor here;

https://brainly.com/question/474553

#SPJ1

Which of the following is not an advantage of software-defined networks (SDN) in relation to other types of WAN?
SDN is less vendor-specific.
SDN is more secure.
SDN is directly programmable.
SDN is easier to optimize to meet increasing network traffic.

Answers

The statement "SDN is less vendor-specific" is not an advantage of software-defined networks (SDN) in relation to other types of WAN.

What are the SDN's advantages over traditional WANs?

SDN's advantages over traditional WANs include the ability to be directly programmable, easier to optimize for increased network traffic, and improved security due to the centralized control of network policies.

However, the level of vendor-specificity does not necessarily differ between SDN and other types of WAN. It may depend on the specific vendor solutions chosen and the level of integration with other components in the network architecture.

To learn more about software-defined networks (SDN), visit: https://brainly.com/question/29673450

#SPJ1

Question Workspace

Case Project 13-1

You have been asked to create a home automation device that can perform the following functions:

1. Turn a rod connected to window blinds to open or close the blinds. 2. The rod needs to turn about 90 degrees in either direction. 3. The blinds should close when direct sunlight is shining through the window. They should also close when it is dark, but only if someone is in the room. 4. The blinds should open when sunlight is no longer shining through the window but there is still daylight. For now, there is no network connection. Based on the description of the device, what components do you need to complete the project? Select only components that were discussed in this chapter

Answers

To complete the home automation device project described in Case Project 13-1, the following components may be required:Motor: A motor is required to rotate the rod that opens and closes the window blinds.

A servo motor or stepper motor can be used to achieve the required 90-degree rotation.Light Sensor: A light sensor is required to detect the amount of sunlight entering the room. This information is used to determine when to open or close the blinds. A photoresistor or photodiode can be used as a light sensor.Passive Infrared (PIR) Sensor: A PIR sensor is used to detect human presence in the room. This information is used to determine whether to close the blinds when it is dark. A PIR sensor can detect the heat signature of humans in the room.Microcontroller: A microcontroller is required to process the input from the light sensor and PIR sensor and control the motor to open or close the blinds. An Arduino or Raspberry Pi can be used as a microcontroller.Power Supply: A power supply is required to provide power to the motor, microcontroller, and sensors. A 5V power supply can be used to power the microcontroller and sensors, while a separate 12V power supply can be used to power the motor.These are some of the components that may be required to complete the home automation device project described in Case Project 13-1, based on the information provided.

To learn more about automation click the link below:

brainly.com/question/13261025

#SPJ4

Sheila wanted to contact her instructor and wondered what form of communication to use. Why should she avoid using text messages when communicating with her instructor?

A.
The instructor might not have a cell phone to receive texts.

B.
Emails are easier to use and understand for most people.

C.
It is typically considered impolite or too informal.

D.
The instructor might not understand your text speech.

Answers

Answer: The answer is C Am not 100% sure but if it's is right your welcome.

Explanation: because It is considered impolite or too informal and also using emails is helpful because it is quick and conversational. Students who text with friends often adopt shortcuts, such as not spelling out full words, ignoring capitalization and punctuation, and not focusing on grammar. So Sheila should use emails instead. Hope it helps!

Brady has a general topic he wants to research for his next paper, but he needs to define exactly what his research will address. What should he do next?

A.
develop a research question

B.
choose his sources

C.
write a bibliography

D.
select search parameters

Answers

Answer:The next step for Brady is to develop a research question. A general topic is usually too broad for research, and defining a specific research question helps to narrow the focus of the research and provide a clear direction. The research question should be a clear, specific, and answerable question that defines the purpose of the research. Once Brady has developed his research question, he can then proceed to choose his sources, select search parameters, and write a bibliography based on the specific research question he has developed. Therefore, the correct answer is A. develop a research question.

Explanation:

Use HTLM

1.A circle shape
2. And a semi-circle
3. A and a rectangle
Your animations must have the use of a rotate, and translate, and a scale. Your animations and draws can be as pain or as advanced as you want.
• A pt. for drawing a circle.
• I pt. for drawing a semi-circle.
• A pt. for drawing a rectangle.
• 0+ 1 pt. for using a translation to animate a shape.
• One pt. for using a rotation to animate a shape.
• One pt. for using a scale (dilation) to animate a shape.

Answers

Answer: Your welcome!

Explanation:

<svg width="400" height="400">

 <circle cx="200" cy="200" r="150" fill="red" />

 <defs>

   <clipPath id="semiCircle">

     <rect x="175" y="175" width="50" height="50" rx="25" ry="25" />

   </clipPath>

 </defs>

 <circle cx="200" cy="200" r="150" fill="blue" clip-path="url(#semiCircle)" />

 <rect x="100" y="100" width="200" height="200" fill="green" />

 <animateTransform attributeName="transform" attributeType="XML" type="translate" begin="0s" dur="2s" from="0 0" to="200 0" fill="freeze" />

 <animateTransform attributeName="transform" attributeType="XML" type="rotate" begin="0s" dur="2s" from="0 0 0" to="360 0 0" fill="freeze" />

 <animateTransform attributeName="transform" attributeType="XML" type="scale" begin="0s" dur="2s" from="1 1" to="2 2" fill="freeze" />

</svg>

What are ways to avoid exceeding the mailbox storage quota on a server? Check all that apply.
Use Cleanup tools to archive older messages.
Use Cleanup tools to empty the Deleted Items folder.
Delete messages, and empty the Deleted Items folder.
Save messages in different formats, such as Text Only.
Right-click a message, and move it to the Junk Email folder.
.

Answers

Answer:B C E

Explanation:

Mailbox storage consumption can't be decreased by saving messages in various formats, like Text Only, or shifting them to the Junk Email folder.

How can I make my Outlook inbox smaller without removing anything?

In the File tab, click. Click Account Settings once more after you've already done so. Click the data file you want to condense on the Data Files tab, then click Settings. To compact now, click.

What distinguishes an Outlook cleanup folder from an empty folder?

Empty Folder removes all of the messages from the folder's deleted items and junk email. You can't just get them back. Any unnecessary messages in the current folder are moved to the chosen "Cleanup" folder using the Clean up Folder function. These mails are only moved; they are not destroyed.

To know more about Email visit:-

https://brainly.com/question/14666241

#SPJ1

The robotics team wants more than a webpage for on the school website to show off their contest-winning robots. Ruby wants the website to be a wiki so multiple users can work on it. Opal thinks it should be a blog so they can add new posts every week. Who is right?
© Opal is right because a wiki doesn't let users add new posts.
O Ruby is right since blogs can only have one author and one moderator.
• They are both wrong. Blogs and wikis cannot be used for educational purposes.
• They are both right. Wikis and blogs can both get periodic updates and multiple users can work on them.

Answers

If the robotics team want to maintain a school website,then as said by ruby wiki would be good because blogs in general will have one author.

What is purpose of Wiki and Blog?

These both are websites which allow users to read content and comment on them. They contain pictures, hyperlinks,vedios and they can be seen by users.

These maintain information about some event.

What makes wiki different from a Blog?

1.Multiple authors

2.Edited by group or team

3.links to other wiki pages.

4.Evolving the same content over time.

When creating a blog it can be generally managed by a single person. But wiki is done by mutliple.

To know more about wiki visit:

https://brainly.com/question/12663960

#SPJ9

In step 5 of this activity, you created the number canceled column to represent the total number of canceled bookings. What value was returned in this column? 1 point 40234 44224 49550 52965

Answers

The value returned in the number canceled column was 44224. This number represents the total number of canceled bookings.

What is bookings?

Bookings is a term used to refer to the process of reserving or booking a service, product, or facility. This can be done through a variety of different methods, including online, over the phone, or in person. Bookings are often used in the hospitality industry to reserve hotel rooms, restaurant tables, and tickets to events. Booking systems have become increasingly popular with the advent of the internet, as they allow customers to book services without having to wait in line, call a customer service representative, or visit a physical location. Bookings also provide customers with a convenient way to check availability, compare prices, and make payment for their purchase.

To learn more about bookings

https://brainly.com/question/29992362

#SPJ1

a pneumatic lockout/tagout uses a _________ to prevent use .

Answers

Answer:

Lockable Valve

Explanation:

A pneumatic lockout/tagout typically uses a lockable valve to prevent the use of machinery or equipment.

I do not understand what the are asking in csys 1. 3. 6

And I would really prefer someone explaining it so I will understand the next one

Answers

Without further context, it is difficult to provide a specific answer to what is being asked in csys 1.3.6. However, it is possible that this is a reference to a specific command or function within a particular system or software.

To better understand what is being asked in csys 1.3.6, you may need to provide more information about the system or software you are working with. This could include the context in which the command is being used, any error messages or prompts that appear when you enter the command, and any documentation or resources that may provide additional information about the command.Alternatively, if you are encountering difficulty with a specific task or problem within the system or software, you may want to seek assistance from a support team or online community. They may be able to provide guidance and help you better understand the specific command or function within the system or software.

To learn more about command click the link below:

brainly.com/question/30585049

#SPJ4

Suppose we are using a three-message mutual authentication protocol, andAlice initiates contact with Bob. Suppose we wish Bob to be a stateless server, and thereforeit is inconvenient to require him to remember the challenge he sent to Alice. Lets modify theexchange so that Alice sends the challenge back to Bob, along with the encrypted challenge. So the protocol is:Step 1: Alice send a message [I’m Alice] to Bob. Step 2: Bob sends a random number, R. Step 3: Alice sends a message [R,KAlice−Bob{R}]. Is this protocol secure?

Answers

No, this protocol is not secure. A secure mutual authentication protocol must, among other things, support mutual authentication, which allows both parties to confirm the identities of one another.

Due to the fact that Bob cannot recall the challenge he gave to Alice, he is unable to confirm Alice's identity using this protocol. As a result, an attacker can read Alice and Bob's messages and then pretend to be Alice to Bob by simply playing back the message that Alice originally sent.

This problem can be resolved by changing the protocol so that Bob sends a challenge along with the random number R, and Alice must respond with the challenge as well. This way, Bob can verify Alice's identity by checking if the challenge in Alice's response matches the one he sent earlier.

For such more question on protocol:

https://brainly.com/question/8156649

#SPJ11

100 POINTS TO HELP ME

Your task is to identify two problems that you have encountered with computers. You will identify the problem and what may be causing it and then come up with a possible solution. Describe the steps you would use to diagnosis and solve the issue and what resources you need. Below are some issues you may choose to discuss:


not being able to connect to the Internet

the Internet is running very slowly

not being able to find a particular program

cannot located a saved file

having a slow system

having a slow Internet connection

any other internal problem you may have experienced

a printer not working

a printer jam

a mouse not working

a keyboard not working

I cannot get my digital pictures to upload from my camera.

speakers not working

microphone not working

You may write about experiences you have had personally, or you may choose to research the problems on the Internet. Be sure to use reputable sites, such as those associated with technical associations or well-respected technology magazines. You may choose some of the problems shown above or write about a different one not listed there.

Answers

Answer:

Problem 1: Slow Internet connection

Identifying the problem:

Symptoms: Pages are loading slowly, videos are buffering, and downloads are taking longer than usual.

Possible cause: A slow internet connection could be caused by several factors such as high traffic volume, outdated modem or router, signal interference, or incorrect network settings.

Diagnosis and solution:

Check the internet speed: Use an online speed test to check the actual speed of the internet connection. If the speed is much slower than what the service provider promises, contact the service provider to fix the issue.

Check the modem or router: If the modem or router is outdated, it can cause a slow internet connection. Check to see if the device is functioning properly, and update it if necessary.

Check the signal interference: Make sure that the modem or router is placed in a location with a clear signal path and free from interference. Remove any obstacles or electronics that might interfere with the signal.

Check the network settings: Verify that the network settings on the computer or device are configured correctly. For example, if using Wi-Fi, ensure that the network is selected, the password is correct, and the computer is within range.

Resources needed: Internet speed test, updated modem or router, network configuration settings.

Problem 2: Cannot locate a saved file

Identifying the problem:

Symptoms: Unable to locate a saved file on the computer, even though it was previously saved.

Possible cause: The file may have been saved in the wrong location, the file name may have been changed, or the file may have been accidentally deleted.

Diagnosis and solution:

Search for the file: Use the search function on the computer to locate the file by searching for the file name or file type.

Check the file location: Verify that the file was saved in the correct location. If not, search for the file in other folders or drives.

Check the recycle bin: If the file was accidentally deleted, check the recycle bin to see if it can be restored.

Check the file name: If the file name has been changed, search for the file using its original name or the file type.

Resources needed: Search function on the computer, knowledge of where the file was saved, knowledge of the file name and type, recycle bin.

how might b2b and b2c companies approach meeting customer needs differently

Answers

Businesses that cater to both B2B (business-to-business) and B2C (business-to-consumer) consumers frequently take a different approach to satisfying their demands because these customers have distinct needs.

What distinguishes B2B customers from B2C clients?

What distinguishes B2B e-commerce from B2C e-commerce? Business to business is known as B2B, whereas business to consumer is known as B2C. B2B ecommerce makes use of online channels to market to other businesses. B2C e-commerce focuses on individual customers.

How do the purchasing processes for B2B and B2C differ?

B2B: When purchasing a good or service involves business-related goals, the transaction requires a careful study, more thought, and continued support from the seller. Several business divisions are impacted by the choice. B2C: Typically, the sale is less logical

To know more about consumers  visit:-

https://brainly.com/question/28671114

#SPJ1

You are the IT security administrator for a small corporate network. You are performing vulnerability scans on your network. Mary is the primary administrator for the network and the only person authorized to perform local administrative actions. The company network security policy requires complex passwords for all users. It is also required that Windows Firewall is enabled on all workstations. Sharing personal files is not allowed.

In this lab, your task is to:

Run a vulnerability scan for the Office2 workstation using the Security Evaluator on the taskbar.

Remediate the vulnerabilities found in the vulnerability report on Office2 as follows:

Rename the Administrator account.

Disable the Guest account.

Set the password for the Mary account to expire.

Require a strong password for the Mary account.

Unlock the Susan account.

Remove the Susan account from the Administrators group.

Turn on Windows Firewall for all profiles.

Remove the file share on the MyMusic folder.

Re-run a vulnerability scan to make sure all of the issues are resolved

Answers

Answer:

To run a vulnerability scan for the Office2 workstation, you can use the Security Evaluator tool on the taskbar. The Security Evaluator scans the system for vulnerabilities and reports on any security weaknesses found.

Once you have run the vulnerability scan, you will need to remediate any vulnerabilities found. Here are the steps you can take to address the issues mentioned in the lab:

Rename the Administrator account - Change the name of the built-in Administrator account to something other than "Administrator".

Disable the Guest account - Disable the built-in Guest account.

Set the password for the Mary account to expire - Set the password for the Mary account to expire after a specified time period.

Require a strong password for the Mary account - Configure the Mary account to require a strong password, which includes a combination of uppercase and lowercase letters, numbers, and special characters.

Unlock the Susan account - Unlock the user account named Susan.

Remove the Susan account from the Administrators group - Remove the Susan account from the Administrators group and assign her a standard user account instead.

Turn on Windows Firewall for all profiles - Enable the Windows Firewall for all network profiles, including public, private, and domain.

Remove the file share on the MyMusic folder - Disable file sharing on the MyMusic folder and restrict access to authorized users only.

After completing the remediation steps, you can run another vulnerability scan to ensure that all issues have been resolved.

Explanation:

1) You are a digital media professional who wants to interview a senator as she stands on the steps of the capitol building. What kind of microphone would you select and why would you choose it ?

Answers

As a digital media professional, if I wanted to interview a senator as she stands on the steps of the Capitol building, I would select a directional or shotgun microphone.

A directional or shotgun microphone is a type of microphone that is designed to pick up sound primarily from one direction and reject sounds from other directions. This makes it ideal for outdoor interviews where there may be ambient noise, such as wind or traffic.

By using a directional or shotgun microphone, I can ensure that the senator's voice is captured clearly and with minimal background noise. This is important for the quality of the interview and for the audience's ability to hear and understand the senator's responses.

Additionally, a directional or shotgun microphone can be mounted on a boom pole, making it easy to position the microphone close to the senator's mouth without it being visible in the shot.

Overall, a directional or shotgun microphone would be the best choice for conducting an outdoor interview with a senator on the steps of the Capitol building due to its directional sensitivity, ability to reject ambient noise, and ease of positioning.

What is the output after this code snippet runs?

int[] scores = {80, 92, 91, 68, 88}; for(int i = 0; i < scores. Length; i--) { System. Out. Println(scores[i]); }

Answers

The output of this code snippet is an infinite loop that prints out the elements of the integer array scores in reverse order. The loop condition is i < scores.length, which is always true since i starts at 0 and is decremented in each iteration of the loop. Therefore, the loop will continue to run indefinitely, printing out the elements of the scores array in reverse order, starting with 88, then 68, 91, 92, and finally 80. After 80 is printed, the loop will start again from the end of the array, printing 88, 68, 91, 92, 80, and so on, infinitely.

OneDrive

Fles

De

Send her an email with the presentation attached


While it's been a long day, you're excited to present your idea tomorrow and see what the managers

think. Just as you're ready to shut down your computer, you remember that your boss wants to look

over the presentation this evening at home. How can you get it to her?

Answers

To send the presentation to your supervisor, use OneDrive. The presentation should be uploaded to your OneDrive account. Choose "Share" from the context menu when you right-click on the presentation.

How can a presentation be uploaded to OneDrive?

Choose File > Save As. Choose OneDrive. Save personal and professional files to your company's OneDrive by saving them there. You can also save somewhere else, such as your device.

How can I add a OneDrive video to PowerPoint?

Click the slide in Normal view where you wish to embed the video. Click the arrow next to "Video" in the Media group of the Insert tab. Choose Video from file, then select the video by browsing to its location. Click the down arrow on the Insert button.

To know more about OneDrive visit:-

https://brainly.com/question/17163678

#SPJ1

PLEASE HELP! WILL GIVE BRAINLIEST

Answers

Answer:

Explanation:find out

Why are the laws proposed by Asimov important?

Answers

Answer:

because Asimov’s suggested laws were devised to protect humans from interactions with robots.

Explanation:

The Asimov’s Law of Robotics was introduced as an added help to humans. Asimov envisioned a world where robots would act like servants and would require some programming rules to prevent them from causing harm. In the real world, Asimov’s laws are still referred to as a template for guiding our development of robots.

Network Layout

design a network and create a topology diagram. This diagram will show the logical layout of ther network.



In that class you talked about logical and physical topologies. create a network map for all these servers windows server, linux server, window workstation network map

A Domain Control

RDP
AD
DNS
Should have DNS entries for entire network
A Windows Professional Workstation (Joined to the Domain)
RDP
SSH Linux Server
SSH
You will need to show how the connect, their hostnames, Ips and subnet.



Deliverables:

Network Map
Includes icons deafferenting networking devices from servers from workstations
Hostname for each device or endpoint
IP address and CIDR noted subnet mask

Answers

Answer:

Network Layout:

The network will consist of a single domain with a Windows Server acting as a domain controller, running RDP, AD, and DNS services. The DNS server should have DNS entries for the entire network.

There will be a Windows Professional Workstation that will be joined to the domain, allowing users to access network resources and services.

Additionally, there will be a Linux Server with SSH access.

Topology Diagram:

The logical topology diagram for this network will consist of a single star topology with the Windows Server acting as the central hub. The Windows Professional Workstation and Linux Server will connect to the server via switches or routers. Each device or endpoint will have a unique hostname and IP address with the corresponding CIDR noted subnet mask.

Please note that the actual network layout and topology diagram may vary depending on the specific requirements and configurations of the network.

Explanation:

Did anyone else also do a Gary the snail challenge in CMU?
if so, how did you do the spiral for his shell?

Answers

One way to create a spiral is by using a mathematical equation known as the Archimedean spiral. This is a type of spiral that increases in radius at a constant rate as it revolves around a central point.

How to create the spiral

To create the spiral for Gary's shell, you can start by drawing a small circle at the center of the shell.

From there, you can draw a series of lines radiating outward from the center at equal angles.

Then, using the Archimedean spiral equation, you can calculate the radius of each point along the spiral and connect those points with a smooth curve to create the spiral shape.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

application of ai in agriculture

Answers

Answer:

Robots for Agriculture: Businesses are creating and programming autonomous robots to perform crucial agricultural tasks, such as harvesting crops more quickly and in greater quantities than human laborers.Crop and Soil Monitoring: Businesses are using computer vision and deep-learning algorithms to process data obtained from drones and/or software-based technology to keep track of the health of their crops and soil.Machine learning (ML) models are being developed to monitor and forecast the effects of various environmental factors, such as weather changes, on crop yield.

Emerging AI-driven technologies are addressing industry issues like crop yield, soil health, and herbicide resistance while also helping to increase efficiency. Robotic farming is set to become a highly regarded application of artificial intelligence. It's also conceivable that soon, agricultural robots will be created to carry out a wide range of tasks.

i hope this works......i literally went through the books to find those...lol

Answer:

eriuhewfiuefwuieqwb

Explanation:

In this lab, you complete a prewritten Java program for a carpenter who creates personalized house signs. The program is supposed to compute the price of any sign a customer orders, based on the following facts:


The charge for all signs is a minimum of $35. 0.

The first five letters or numbers are included in the minimum charge; there is a $4 charge for each additional character.

If the sign is made of oak, add $20. 0. No charge is added for pine.

Black or white characters are included in the minimum charge; there is an additional $15 charge for gold-leaf lettering.

Instructions

1. Ensure the file named HouseSign. Java is open.


2. You need to declare variables for the following, and initialize them where specified:


A variable for the cost of the sign initialized to 0. 00 (charge).

A variable for the number of characters initialized to 8 (numChars).

A variable for the color of the characters initialized to "gold" (color).

A variable for the wood type initialized to "oak" (woodType).

3. Write the rest of the program using assignment statements and if statements as appropriate. The output statements are written for you.


4. Execute the program by clicking Run. Your output should be: The charge for this sign is $82

Answers

Answer:

```Java

public class HouseSign {

   public static void main(String[] args) {

       // declare and initialize variables

       double charge = 0.00;

       int numChars = 8;

       String color = "gold";

       String woodType = "oak";

       // compute charge for sign

       charge = 35.00;

       if (numChars > 5) {

           charge = charge + (numChars - 5) * 4;

       }

       if (woodType.equals("oak")) {

           charge = charge + 20;

       }

       if (color.equals("gold")) {

           charge = charge + 15;

       }

       // print output

       System.out.println("The charge for this sign is $" + charge);

   }

}

``

Explanation:

Multiple Select Which of the following are advantages of a local area network, as opposed to a wide area network?
Select 3 options.

greater geographic reach
lower cost
provides access to more networks
more secure
higher networks ​

Answers

The advantages of local area network are It has greater geographic reach, Lower cost and Higher speed.

What is Local area Network?

A group of devices connected to one another in a single physical location, such as a building, office, or home, is known as a local area network (LAN).

A LAN can be tiny or big, with one user's home network or hundreds of users and devices in an office or school as examples.

The fact that a LAN connects devices that are located in a single, constrained region is its sole distinguishing feature, regardless of size. A wide area network (WAN) or metropolitan area network (MAN), in contrast, spans a wider geographic area. A few WANs and MANs link numerous LANs collectively.

Therefore, The advantages of local area network are It has greater geographic reach, Lower cost and Higher speed.

To learn more about Local area network, refer to the link:

https://brainly.com/question/15227700

#SPJ1

Question 15 (10 points)
A store has 20 apples in its inventory. How can you store this information in a JavaScript variable?

A 20 = numApples;
B var num apples = 20;
C var numApples = 20;
D var numApples == 20;

Answers

Answer:

c

Explanation:

because im right.....

Which of the variables have the value 50 after executing the code segment?

see the image below for reference

Answers

The segment of code that will have the value of 50 after executing the code segment is this:

C. X and Z only

What is the segment?

A segment is a section of code that instructs the computer to take certain actions. In the above code, we can see that the y value is set to return the value of 50.

Also, in the fourth instruction, the x value is instructed to return the value of y. So, the segment of code that is meant to execute and return the number, 50 is option c which contains x and z.

Learn more about coding here:

https://brainly.com/question/22654163

#SPJ1

Chantel wants to keep track of * what she is eating on a daily basis. She would like to enter this data into a word- processing document. Which option would best help Chantel organize this data? ​

Answers

Chantel wants to keep track of  what she is eating on a daily basis. She would like to enter this data into a word- processing document.

What is word processing software?

A word processing software has been known as an application software that generally provides the facility to write, store, and to modify the documents and just display them on the computer screen and this software also provides a facility to print a document.

Some of these software are the freely available on the internet, that has been used for the word processing, which are the websites.

Therefore, In word processing software we can only use the text documents.

Learn more about software on:

https://brainly.com/question/1022352

#SPJ9

How do u kiss someone and not feel werid about it afterwards

Answers

Answer: just don't kiss someone

Explanation: easy, but if you do then just leave. duh

Other Questions
Please help answer this question with correct explanation asap!!Thank you write a 500 word critique of a selected text based on its claim,context and properties as a written material using your ownwords Milton took out a loan for $2400 at 7% interest, compounded annually. If he makes yearly payments of $140, will he ever pay off the loan?. (b^((3)/(2))*a^(4))^(-(1)/(4)) Vrite your answer without us ssume that all variables are Describe the possible differences incustomer choice criteria between car rentals and outrightpurchases. in the diagram below FG is parallel to CD. if FG is 1 less than CF, FE=5 and CD=8, find the length of CF The product of the repeating decimals 0.3333 and 0.6666 is therepeating decimal 0.xxxx Find x A triangle has sides with lengths of 20 feet, 21 feet, and 29 feet. Is it a right triangle? blake collects stamps. He collected a total of 250 . If 84% of the stamps he collected were foreign, how many other stamps did he collect? A single share of stock in a company has a current price of 80. Suppose that there are only four possibilities for the stock's return over the course of the next year. These possibilities, along with the probability of each occurring, are provided in the table below. IR -17% -7% 8% 29% P[R] 0.13 0.34 0.37 0.16 Find the expected annual return for the stock. 3.31% 0 4.21% 3.91% 03.61% O3.01% Use the Jacobi method to find approximate solutions to 3x1 + 10x2 - 4x3 201 + 2x2 + 3x3 = 25 2x1 2 +5x3 = 6 I2 + 523 starting the initial values 1 =1,x2 1,and r3 1.2 and iterating until error is less than 2%. Round-off answer to 5 decimal places. Reminder: Arrange the system to be Diagonally Dominant before iteration. O x1 =1.00022, x2 =0.99960, x3 =0.99956 %3D O x1 =0.99893, x2 -1.00254.xg =1.00155 O x1 =1.00092, x2 -0.99867, x3 =0.99761 O x1 =0.99789, x2 =1.00353, x3 -1.00476 O none of the choices What is an economic concept that is related to inflation?2. Explain how the concept is related to inflation. What technique can students use to narrow down the amount of information their online search results give them? A. Learn to read lots information as quickly as possible. B. Stick mostly to only the top results of the search. C. Narrow results down to the most recently updated sites. D. Use precise keywords and refine their searches. lists of a washing machine proccesing The total cost of the kayak and paddleboard You are studying the organization of a single-pass transmembrane protein A at the plasma membrane cell membranes were isolated, processed for SDS-PAGE with (Lane 1) or without (Lane 2) treatment with 2-mercaptoethanol (a reducing agent), and the protein was detected by Western blot analysis using a specific antibody. Lane 1 Lane 2 TOP A+A+A A+A A Based on the observed results, answer the following THREE questions to best describe the likely arrangement of protein A at the plasma membrane. Protein A contains three transmembrane domains, and is embedded in the membrane contains one transmembrane domain, and is embedded in the membrane O contains three subunits, one embedded in the membrane, one in the cytoplasm and one in the extracellular medium Question 6 Protein A molecules interact with each other through O Disulphide bonds Non-covalent bonds Partially covalent bonds O Peptide bonds How much heat is required to raise the temperature of 16.1 g of water from 25 C to 175 C? identify two conflict of interests that credit rating agenciesface Should we continue to trust the ratings of credit ratingagencies? Indicate some possible ways in which foods may becomecontaminated with enteric organisms- list more than 1 way Select each equation that has no real solution