Modularize the program by adding the following 4 functions. None of them have any parameters. void displayMenu() void findSquareArea() void findCircleArea() void findTriangleArea() To do that you will need to carry out the following steps: Write prototypes for the four functions and place them above main. Write function definitions (consisting of a function header and initially empty body) for the four functions and place them below main. Move the appropriate code out of main and into the body of each function. Move variable definitions in main for variables no longer in main to whatever functions now use those variables. They will be local variables in those functions. For example, findSquareArea will need to define the side variable and findCircleArea will need to define the radius variable. All of the functions that compute areas will now need to define a variable named area. Move the definition for the named constant PI out of main and place it above the main function. In main, replace each block of removed code with a function call to the function now containing that block of code.

Answers

Answer 1

Answer:

It is a C++ program  :

#include <iostream>  // to use input output functions

using namespace std;  //to identify objects like cin cout

//following are the prototypes for the four functions placed above main

void displayMenu();  

void findSquareArea();  

void findCircleArea();

void findTriangleArea();

//definition for constant PI out of main

const float PI = 3.14159;  

int main(){  //start of main function

displayMenu(); //calls displayMenu() method

}

  void displayMenu(){  // to make user selection and calls relevant function to compute area according to the choice of user

int selection=0;  //to choose from 4 options

cout<<"Program to calculate areas of objects:\n" ;  //displays this message at start

do  {  //this loop asks user to enter a choice and this continues to execute and calculate depending on users choice until user enters 4 to exit

cout<<"\n1.Square \n2.Circle \n3.Right Triangle \n4.Quit";

cout<<"\nEnter your choice:";  //prompts user to enter choice

cin>>selection;  //reads the input choice

if(selection==1)  //if user enters 1

{  //computes area of square by calling findSquareArea

findSquareArea();  //function call to the findSquareArea function

}  

else if(selection==2)  //if user enters 2

{  //computes area of circle by calling findCircleArea

findCircleArea();  //function call to the findCircleArea function

}  

else if(selection==3)   //if user enters 3

{  //computes area of triangle by calling findTriangleArea

findTriangleArea();  //function call to the findTriangleArea function

}  

else if(selection==4)   //if user enters 4

{  

cout<<"\nTerminating!!.";  //exits after displaying this message

break;

}

else  // displays the following message if user enters anything other than the given choices

{

cout<<"\nInvalid selection";  //displays this message

}

}

while(1);  

}  

void findSquareArea(){  //function definition. this function has no parameters

float area=0.0;  //variable to store the area of square

float side=0;  //local variable of this method that stores value of side of square

cout<<"\nLength of side: ";  //prompts user to enter length of side

cin>>side;  //reads value of side from user

area=side*side;  //formula to compute area of square and result is assigned to area variable

cout<<"\nArea of Square: "<<area<<endl;   //displays are of the square

}  

void findCircleArea(){  //function definition. this function has no parameters

float area=0.0;  //variable to store the area of square

float radius=0.0;  //local variable of this method that stores value of radius of circle

cout<<"\nRadius of circle: ";  //prompts user to enter radius of circle

cin>>radius;  // reads input value of radius

area=PI*radius*radius;  //formula to compute area of circle

cout<<"\nArea of circle: "<<area<<endl;}  //displays are of the circle

void findTriangleArea(){  //function definition. this function has no parameters

   float area=0.0;  //variable to store the area of triangle

   float base=0.0;  //local variable of this method that stores value of base of triangle

   float height=0.0;  //holds value of height of triangle

cout<<"\nHeight of Triangle: ";  //prompts user to enter height

cin>>height;  //reads input value of height

cout<<"\nBase of Triangle: "; //prompts user to enter base

cin>>base;  //reads input value of base

area=0.5*height*base;  //computes area of triangle and assign the result to area variable

cout<<"\nArea of Triangle: "<<area<<endl;  //displays area of triangle

}

Explanation:

The program is modified as above. The prototypes for the four functions that are named as :

void displayMenu();  to display the Menu of choices and call relevant function to compute area

void findSquareArea();  To compute area of square

void findCircleArea(); To compute area of circle

void findTriangleArea();  To compute area of triangle

Note that these methods have no parameters and their return type is void. These 4 methods prototypes are placed above main() function.

Next the function definitions (consisting of a function header and initially empty body) for the four functions are written and placed below main() For example definition of findTriangleArea() is given below:

void findTriangleArea()

{

}

Next the code in the main is moved to the relevant methods. Then variables selection=0;  is moved to displayMenu method,  radius=0.0 to findCircleArea method , side=0; to findSquareArea float area=0.0;  to each method, float height=0.0;  and float base=0.0; to findTriangleArea method.

The relevant code moved to each method is shown in the above code.

The definition for the named constant PI is moved out of main and placed above the main function. const keyword before datatype of PI variable shows that PI is declared constant and its value is initialized once only to 3.14159.

Modularize The Program By Adding The Following 4 Functions. None Of Them Have Any Parameters. Void DisplayMenu()

Related Questions

What is the best way to show a complex data chart in word?

Answers

Answer:just do it

Explanation:

How different quantities are determined

When Windows deletes the driver package and driver files, in what situation might it not delete driver files used by the device that is being uninstalled?

Answers

Answer:

when there is no junk

Explanation:

If you choose the checkbox next to “Delete the driver software from this device,” your computer will no longer contain the driver or any associated registry keys. Either method will prevent you from using the device until you reinstall the device driver.

What is situation deletes driver files used by the device?

To connect and communicate with particular devices, a computer needs device drivers.

It may be taken out without any trouble. However, it also comes with the installers for your PC's drivers. You will need to go to the manufacturer's website to download them again if you accidentally delete them.

Therefore, No, unless your new driver is broken and corrupts data. Install the driver if it comes from a reliable source. It is not intended to. Having a backup system that keeps your data safe in case of issues is a good idea.

Learn more about driver files here:

https://brainly.com/question/10608750

#SPJ5

Which Azure networking component is the core unit, from which administrators can have full control over IP address assignments, name resolution, security settings and routing rules

Answers

Answer:

The correct answer will be "Virtual networks".

Explanation:

This networking seems to be the major element of azure connectivity that further keep track of almost all of the essential administrative responsibilities. Its function involves complete ownership over all the appointments of Ip addresses as well as the settlement of names.This decides based on the criteria for transferring the information from one place to another other.

Some network applications defer configuration until a service is needed. For example, a computer can wait until a user attempts to print a document before the software searches for available printers.
What is the chief advantage of deferred configuration?

Answers

Answer:

The drivers wont be loaded and the deamons will not be running in the background unnecessarily, that makes the processes to run more faster

Explanation:

The chief advantage of deferred configuration or the advantage when some network applications defer configuration until a service is needed is that the drivers won't be loaded and the deamons will not be running in the background unnecessarily or when idle, that makes the processes to run more faster.

Network configuration is the activity which involves setting up a network's controls, flow and operation to assist the network communication of an organization or network owner.

A function prototype can always be omitted when: A function is defined before it is first invoked. A function does not return a value. A function is invoked before it is first defined. A function takes no arguments.

Answers

Answer:

A function is defined before it is first invoked.

Explanation:

A function prototype is a term in computer programming that is used as the declaration of a function that specifies function's name, parameters and return type. However, unlike function itself, which specifies what it does, a function prototype specifies function's interface only and not what it does.

Hence, A function prototype can always be omitted when: a function is defined before it is first invoked.

Imagine you have a 10-character string stored in the variable myString. You want to pull out the first five characters. Which of the following lines of code would successfully generate a slice of the 10-character string holding only the first five characters?

a. myString[5]
b. myString[:-5]
c. myString[0:6]
d. myString-15:-5]
e. myString[0:10:2]

Answers

Answer:

b. myString[:-5]

d. myString[-15:-5]

Explanation:

I believe you have a typo in d. It must be d. myString[-15:-5]

Slicing can be done:

myString[starting_index, stopping_index, step] (step is optional). If you do not specify the starting index, it will start from the 0 as in b. If you write a range that is not in the range, as in d, Python will replace it with either 0 or length of the string (In this case, it is replaced with 0 because the starting index must be smaller than stopping index)

a. myString[5] → This will give you the sixth character

b. myString[:-5] → This will give you the first five characters

c. myString[0:6] → This will give you the first six characters

d. myString-15:-5] → This will give you the first five characters

e. myString[0:10:2] → This will give you the first, third, fifth, seventh, and ninth characters

When organizing your career portfolio, you should.
A. always assemble it by topic
B. highlight the skills and experiences most relevant to those
thinking of hiring you
C. highlight only your education and work experiences but not your
skills
D. always assemble it chronologically

Answers

Answer:

B

Explanation:

When organizing your career portfolio, you should highlight the skills and experiences most relevant to those thinking of hiring you. Thus, option B is correct.

A combination resume  can be described as the resume format  which was designed for highly-trained job seekers with previous work experience.

In a case whereby a chronological resume lists your work history in reverse order, starting with your current or most recent job and working backwards and many employers like this format because it presents your work history in a clear, easy-to-follow arrangement the type of resume will you choose to use is Combination resume.

It should be noted that it is been reffered to as combination”  as a result of how it combines the most notable features of both the functional resume format and the chronological resume.

Therefore, When organizing your career portfolio, you should highlight the skills and experiences most relevant to those thinking of hiring you. Thus, option B is correct.

Learn more about resume at:

brainly.com/question/14218463

#SPJ7

The new_directory function

Answers

Answer:The new directory method creates a new directory within the current working directory.

Explanation:The new directory function and returns the list of the files within that directory.The new directory function allow to with the built in function MK dir().

To the new directory function create a current working directory.

import OS

OS.MKdir()

The code creates the directory projects in the current working directory to specify the full path.

Write a function named twoWordsV2 that has the same specification as Problem 1, but implement it using while and not using break. (Hint: provide a different boolean condition for while.) Since only the implementation has changed, and not the specification, for a given input the output should be identical to the output in Problem 1.

Answers

Answer:

I am writing a Python program. Here is the function twoWordsV2:

def twoWordsV2 (length,firstLetter):#definition of function which takes length of the first word and first letter of the second word as parameter and returns these two words in a list

   word1 = "" # stores the first word

   word2= "" #holds the second word  

   while(len(word1)!=length): # checks if the input word1 length is not equal to the specified length

       word1 = input('A ' + str(length) + '-letter word please: ') #asks user to enter the input word1 of specified length

   while(word2!=firstLetter): #checks if the first character of input word2 is not equal to the specified firstLetter character

       word2 = input('A word beginning with ' + firstLetter+ ' please: ')#asks user to enter the input word2 begining with specified first letter

       if word2[0] == firstLetter.upper() or word2[0] == firstLetter.lower():#second word may begin with either an upper or lower case instance of firstLetter      

           return [word1,word2] #return the two words in a list                

   

#to check the working of the function use the following statement        

print(twoWordsV2(4,'B')) #calls twoWordsV2  method by passing 4 (length) and B (first letter)

Explanation:  

twoWordsV2 method has two parameters i.e length which is the length of the first word and firstLetter which is the first character of the the second word. This means the first word should be of specified length, and the second word should begin with a specified first letter. The function returns the two resultant words with the above specifications. These two words are displayed in a list. I will explain the working of the function with the help of an example:

Suppose length = 4 and firstLetter = 'B' and user enters "ok" as word1. input() method takes first word input from user.

The first while loop checks if the length of word1 i.e. ok is not equal to specified length i.e. 4. Length of word1 is checked using len function which returns 2 so length of word1 is 2. The loop condition is true because length of word1 i.e. 2 is not equal to specified length i.e. 4. So the body of the loop executes which displays this message:

A 4-letter word please:

Here notice that str(length) is changed to 4. This is because length=4 and str() converts this value into string.

So the above message keeps displaying until user enters a four letter word. Lets suppose user now enters "four". Now the while loop condition evaluates to false and the loop breaks. The program control  moves to the next line which is a while loop.

The second while loop checks if the first character of input word2 is not equal to the specified firstLetter character. Suppose word2 = "apple" and firstLetter= 'B'

Now the loop condition evaluates to true because word2 is not equal to first letter B. Now the main part of this while loop is the if condition: if word2[0] == firstLetter.upper() or word2[0] == firstLetter.lower() This statement checks if the first index of the word2 is equal to firstLetter. The word2 can contain a capital B or a small B so if condition checks both the cases by using upper and lower methods that converts the firstLetter to upper or lower and then match with the first letter of word2 i.e. the letter at index 0 of the word2. If this condition evaluates to true then next return statement returns the word1 and word2 in a list otherwise the second while loop keep asking user to enter the word2 with starting letter to be firstLetter i.e. 'B'.

The screenshot of the program and its output is attached.

The function for the given problem is:

def twoWordsV2 (length,firstLetter):word1 = "" # stores the first wordword2= "" #holds the second word   while(len(word1)!=length): word1 = input('A ' + str(length) + '-letter word please: ') while(word2!=firstLetter): word2 = input('A word beginning with ' + firstLetter+ ' please: ')if word2[0] == firstLetter.upper() or word2[0] == firstLetter.lower():    return [word1,word2]     print(twoWordsV2(4,'B')) Brief Explanation:

These 10 lines of code were written using the Python programming language and this was used to define, store and hold the function and then request input from the user, check if the given input was according to the required parameters, and then print the output.

Read more about python programming language here:
https://brainly.com/question/7015522

What is the absolute pathname of the YUM configuration file? REMEMBER: An absolute pathname begins with a forward slash

Answers

Answer:

/etc/yum.conf

Explanation:

The absolute pathname for YUM is /etc/yum.conf. The configuration file For yum and related utilities can be found there. The file has one compulsory section, and this section can be used to place Yum options with global effect, it could also have one or more sections, that can enable you to set repository-specific options.

if the bandwidth-delay product of a channel is 500 Mbps and 1 bit takes 25 milliseconds to make the roundtrip, what is the bandwidth-delay product

Answers

Answer:

2500 kb

Explanation:

Here, we are to calculate the bandwidth delay product

From the question, we are given that

band width = 500 Mbps

The bandwidth-delay product is = 500 x 10^6 x 25 x 10^-3

= 2500 Kbits

Write a program that reads ten integers, and then display the number of even numbers and odd numbers. Assume that the input ends with 0. Here is the sample run of the program

Answers

Answer:

I am writing  a JAVA program. Let me know if you want this program in some other programming language.

import java.util.Scanner;  // class to take input from user

class EvenOddNum{  //class name

   static void EvenOdd(int array[]) {  //function that takes an array as input and displays number of even numbers and odd numbers

       int even = 0;  // counts even numbers      

       int odd = 0;   //counts odd numbers

       for(int i = 0 ; i < array.length-1 ; i++){  //loop through the array elements till the second last array element

           if ((array[i] % 2) == 1) {  // if the element of array is not completely divisible by 2 then this means its an odd  number

               System.out.println(array[i]+" = odd");  //display that element to be odd

               odd++ ; }  //adds 1 to the count of odd every time the program reads an odd number

           else{  // if above IF condition evaluates to false then the number is an even number

                System.out.println(array[i]+" = even"); //display that element to be odd

                even++ ; } }  //adds 1 to the count of odd every time the program reads an odd number

       System.out.println( "Number of even numbers = " + even);  //counts the total number of even integers in the array

       System.out.println( "Number of odd numbers = " + odd);    }   //counts the total number of odd integers in the array      

   public static void main (String[] args){  //start of main function body

       Scanner scan= new Scanner(System.in); //creates Scanner class object

       int [] integers = new int[10];  //declares an array named integers that stores 10 integers

       System.out.print("Enter numbers: ");  //prompts user to enter the integers

       for(int i = 0;i<integers.length;i++){  //loops to read the input integers

           integers[i] = scan.nextInt(); }  //scans and reads each integer value

       EvenOdd(integers);    } }  //calls function EvenOdd to display number of even and odd numbers

Explanation:

The program has a method EvenOdd that takes an array of integers as its parameter. It has two counter variables even and odd. even counts the number of even input integers and odd counts the number of odd input integers. The for loop iterates through each element (integer) of the array except for the last one. The reason is that it is assumed that the input ends with 0 so the last element i.e. 0 is not counted. So the loop iterates to length-1 of the array. The number is odd or even is determined by this if condition: if ((array[i] % 2) == 1) A number is even if it is divisible by 2 otherwise its odd. If the element of array is not completely divisible by 2 i.e. the remainder of the division is not 0 then the number is odd. The modulo operator is used which returns the remainder of the division of number by 2. Each time when an odd or even number is determined, the array[i]+" = even" or  array[i]+" = odd" is displayed on the output screen for each integer in the array. Here array[i] is the element of the array and even or odd depicts if that element is even or odd. The last two print statement display the total number of even and odd numbers in the array.

Suppose that we want to multiply 500 matrices and we use the optimal parenthesization computed by the MATRIX-CHAIN-ORDER function discussed in class. After finding the optimal parenthesization, how many pairs of round brackets ( ) are printed by the procedure PRINT-OPTIMAL-PARENS(s, 1, 500)?
a. 249
b. 501
c. 251
d. 250
e. 499
f. 500

Answers

Answer:

síganme en las claves de ustedes pronto. Seré un buen día. He seguido un poco sobre el Is. He seguido un poco sobre el Is. He seguido un poco sobre el.

is (c)251? correct since i'm not really sure

Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT a hashing algorithm?
A. SHA-256
B. MD5
C. DAT-1
D. SHA-1

Answers

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

Assuming a Stop-and-Wait system, if the bandwidth-delay product of a channel is 500 Mbps and 1 bit takes 25 milliseconds to make the roundtrip, what is the bandwidth-delay product? If the data packets are 2500 bits in length, what is the utilization?

Answers

Answer:

Bandwidth delay product = 2500 Kbits

Utilization = 0.02%

Explanation:

We proceed as follows;

From the question, we are given that

band width = 500 Mbps

The bandwidth-delay product is = 500 x 10^6 x 25 x 10^-3

= 2500 Kbits

The system can send 12500 Kbits during the time it takes for the data to go from the sender to the receiver and then back again.

However, the system sends only 2500 bits.

The the link utilization =

2500/(12500 x 10^3) = 0.02%

What is displayed in the alert dialog box after the following code is executed? var scores = [70, 20, 35, 15]; scores[scores.length] = 40; alert("The scores array: " + scores);

Answers

Answer:

The scores array: 70,20,35,15,40

Explanation:

I will explain the code line by line:

var scores = [70, 20, 35, 15];  

The above statement declares and assigns values to an array named scores

scores[scores.length] = 40;  

The above statement uses length to set the length of the scores array. It sets the last element of the scores array to 40. So this means 40 is set as the last element of scores.

scores.length returns the length of the scores array i.e. 4 as there are 4 elements in scores array 70,20,35,15

So the statement becomes:

scores[4] = 40;

This assigns value 40 to the 4th index of the scores array. Do not confuse 4th index with 4th element of the array because array element location starts from 0. So scores[4] does not mean 4th element but scores[4] means 4th index position of scores array. This makes 5th element of scores. So set the element 40 as 5th element at 4th index of scores.

alert("The scores array: " + scores);

This displays an alert box with the following message:

The scores array: 70,20,35,15,40

Description:
Create a program that converts the number of miles that you walked on a hike to the number of feet that you walked.
Console:
Hike Calculator
How many miles did you walk?: 4.5
You walked 23760 feet.
Continue? (y/n): y
How many miles did you walk?: 2.5
You walked 13200 feet.
Continue? (y/n): n
Bye!
Specifications:
The program should accept a float value for the number of miles.
Store the code that gets user input and displays output in the main function.
There are 5280 feet in a mile.
Store the code that converts miles to feet in a separate function. This function should return an int value for the number of feet.
Assume that the user will enter a valid number of miles.

Answers

Answer:

The programming language is not stated (I'll answer using C++)

#include <iostream>

using namespace std;

int convert(float miles)

{

   return miles * 5280;

}

int main() {

   cout<<"Console:"<<endl;

   cout<<"Hike Calculator"<<endl;

   float miles;

   char response;

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   while(response == 'y')

   {

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   }

   cout<<"Bye!";

   return 0;

}

Explanation:

Here, I'll explain some difficult lines (one after the other)

The italicized represents the function that returns the number of feet

int convert(float miles)

{

   return miles * 5280;

}

The main method starts here

int main() {

The next two lines gives an info about the program

   cout<<"Console:"<<endl;

   cout<<"Hike Calculator"<<endl;

   float miles;

   char response;

This line prompts user for number of miles

   cout<<"How many miles did you walk?. ";

   cin>>miles;

This line calls the function that converts miles to feet and prints the feet equivalent of miles

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

This line prompts user for another conversion

   cout<<"Continue? (y/n): ";

   cin>>response;

This is an iteration that repeats its execution as long as user continue input y as response

   while(response == 'y')

   {

   cout<<"How many miles did you walk?. ";

   cin>>miles;

   cout<<"You walked "<<convert(miles)<<" feet"<<endl;

   cout<<"Continue? (y/n): ";

   cin>>response;

   }

   cout<<"Bye!";

Which statement is false?Structures are derived data types.Each structure definition must end with a semicolon.A structure can contain an instance of itself.Structures may not be compared using operators == and !=.

Answers

Answer:

A structure can contain an instance of itself

Explanation:

The statement which is known to be false out of the option given is that a structure may comprise or contain an instance of itself. Because to my knowledge, variables of diverse type are always most likely to attributed and contain by a structure.

It is worthy of note that object that aren't similar are utilize in constructing a structure. Another true statement about structure is that a semicolon usually end it's explanation.

A security administrator is investigating a report that a user is receiving suspicious emails. The user's machine has an old functioning modem installed. Which of the following security concerns need to be identified and mitigated? (Select TWO).
a) Vishing
b) Whaling
c) Spear phishing
d) Pharming
e) War dialing
f) Hoaxing

Answers

Answer:

Spear Phishing and War Dialing

Explanation:

So let's tackle these one at a time.

Vishing is simply any type of message (i.e., email, text, phone call, etc.) that appears to be from a trusted source but is not.

Whaling is simply a spear phishing attack of a high-value target such as a CEO or someone with high-level access at a company.

Spear phishing is simply a targeted phishing attack, usually towards a specific person or group of people.  (Phishing attack is simply a social attack to try and gain unauthorized access to a resource).

Pharming is an attack that attempts to redirect website traffic to a fake site.

War dialing is a technique to automatically scan a list of numbers in an area in attempt to search for exposed modems, computers, board systems, or fax machines, in order to breach the network.

Hoaxing is simply a social attack that describes a serious threat in attempts to retrieve unauthorized access or money from a victim.  (Think microsoft tech support scams)

Now that we have defined these things, let's identify the possible threats that need to be reported.

(a) Vishing?  The sec admin report doesn't mention the source of the message so we cannot associate this one

(b) Whaling? The sec admin report says a user, implying someone not high up in the company, but doesn't say it's not someone high up.  This is possible.

(c) Spear phishing?  The sec admin report says a user, implying that only this user is being targeted so this is definitely valid.

(d) Pharming?  The sec admin report says nothing about site redirection.

(e) War dialing? The sec admin report doesn't say anything about unauthorized scanning; however, it mentions the user has an old functioning modem, so this is possible.

(f) Hoaxing?  The sec admin report doesn't mention a pop up in the email or the content of the email so we are uncertain.

Thus with these considerations, the two threats that are identified and need mitigation are Spear phishing and War Dialing/Whaling.  Note that we aren't positive of the war dialing or whaling, but a case could be made for either; however, given the modem information, the question seems to indicate war dialing.

What is a real-life example of a Microsoft Access Query?

Answers

Explanation:

Microsoft Access is an information management tool that helps you store information for reference, reporting, and analysis. Microsoft Access helps you analyze large amounts of information, and manage related data more efficiently than Microsoft Excel or other spreadsheet applications.

A real-life example of a Microsoft Access Query is a table that stores the names of new customers at a supermarket.

What is Microsoft Access?

Microsoft Access is a database management software application designed and developed by Microsoft Inc., in order to avail its end users an ability to create, store and add data to a relational database.

In Microsoft Access, the options that are available on the File tab include the following:

Opening a database.

Selecting a template.

Creating a new database.

In conclusion, a database is an element in Microsoft Access which is an ideal data source and a query would always obtain, generate, or pick information from it.

Read more on Microsoft Access here: brainly.com/question/11933613

#SPJ2

nside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync

Answers

Complete Question:

Let's say that you handle the IT systems administration for your company. There's a server inside of your organization that checks how often client machines access it. If a client machine hasn't accessed the server in three months, the server won't allow the client machine to access its resources anymore. What can you set to make sure that your client machines and the server times are in sync?

Answer:

Network Time Protocol (NTP).

Explanation:

As the IT systems administrator, you can set the network time protocol (NTP) to make sure that your client machines and the server times are in synchronization.

A network time protocol (NTP) can be defined as an internet standard protocol which is used by an IT system administrator to synchronize a computer's clock to a particular time reference over packet switched or local area network (LAN) and variable-latency data networks. NTP was developed at the University of Delaware by Professor David L. Mills.

Basically, the network time protocol uses the coordinated universal time (UTC) and a client-server model to measure the total round-trip delay for a computer process.

Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the String is a palindrome, i.e., the String is the same if read forwards or in reverse. For example, "racecar" is a palindrome. The method should return false if the String is not a palindrome. Note: any single-letter word is considered a palindrome.

public class StringMethod {
public static boolean isPalindrome(String word) {
//TODO: Complete this method

}
}

Answers

Answer:

public static boolean isPalindrome(String word) {

   //TODO: Complete this method

   String reverse = "";  

       for (int i = (word.length()-1); i>=0; i--) {

           if(word.charAt(i)!=' '){

               reverse+=word.charAt(i);

           }

       }

   String without_space = word.replaceAll(" ", "");

   

   return reverse.equals(without_space);

   }

Methods are collections of named code blocks, that are executed when called or evoked.

The isPalindrome method written in Java, where comments are used to explain each line is as follows

//This defines the method

public static boolean isPalindrome(String word) {

   //This removes all the spaces in the word

   String newStr = word.replaceAll(" ", "");

   //This initializes an empty string

   String rev = "";  

   //This iterates through the word, in reverse order

   for (int i = (word.length()-1); i>=0; i--) {

       //This gets all the characters in the string (without the space)

       if(word.charAt(i)!=' '){

           rev+=word.charAt(i);

       }

   }

   //This returns true or false

   return reverse.equals(newStr);

}

Read more about methods at:

https://brainly.com/question/19360941

Why is a DNS cache poisoning attack dangerous? Check all that apply. A. Errrr...it's not actually dangerous. B. It allows an attacker to redirect targets to malicious webservers. C. It allows an attacker to remotely controle your computer. D. It affects any clients querying the poisoned DNS server.

Answers

Answer:

(B) It allows an attacker to redirect targets to malicious webserver.

(D) It affects any clients querying the poisoned DNS server.

Explanation:

DNS cache poisoning is a serious type of attack that is designed to exploit the vulnerabilities inherent in a Domain Name Server (DNS) where a user is redirected from a real server to a fake one. It is also called DNS spoofing.

Normally, when your browser tries to visits a website through a given domain name, it goes through the DNS server. A DNS server maintains a list of domain names and their equivalent Internet Protocol addresses. This server (DNS) then responds to the request with one or more IP addresses for the browser to reach the website through the domain name.

The computer browser then get to the intended website through the IP address.

Now, if the DNS cache is poisoned, then it has a wrong entry for IP addresses. This might be via hacking or a physical access to the DNS server to modify the stored information on it. Therefore, rather than responding with the real IP address, the DNS replies with a wrong IP address which then redirects the user to an unreal website.

Although they might not be able to control your computer remotely as long as you are not trying to visit a web page via the poisoned information, there are other dangers attached to this type of attack.

Once the DNS server has been poisoned, any client trying to query the server will also be affected since there is no direct way of knowing if the information received from the server is actually correct.

Draw the BST where the data value at each node is an integer and the values are entered in the following order 36,22,10,44,42,16,25,3,23,24 solution

Answers

Answer and Explanation:

A BST is the short form for Binary Search Tree. It is a special type of binary tree data structure in which nodes are arranged in a particular order such that;

i. the left subtree of a particular node should always contain nodes whose key values are less than that of the key value of the node itself.

ii. the right subtree of a particular node should always contain nodes whose key values are greater than that of the key value of the node itself.

iii. the right and left subtrees should also be a binary search tree.

For the given set of data:

36,22,10,44,42,16,25,3,23,24;

The equivalent binary search tree is attached to this response.

As shown in the attachment:

i. the first data value (36) is the root node value.

ii. the second value (22) is less than the root node value (36), therefore, 22 goes to the left of the root node.

iii. the third value is 10. This is less than 36 and then also less than 22, so 10 goes to the left of 22.

iv. the fourth value is 44. This is greater than the root node value (36), therefore, 44 goes to the right of the root node.

v. the fifth value is 42. This is greater than the root value (36) so it is going to be positioned somewhere at the right of the root node. But it is less than the value (44) of the direct right node of the root node. Therefore, 42 goes to the left of the direct right (44) of the root node.

vi. the sixth value is 16. This is less than the root node value (36). So it is going to be positioned somewhere at the left of the root node. It is also less than the value (22) of the direct left node of the root node. So it is going to be positioned somewhere at the left of the node with 22. But it is greater than the node with 10. Therefore, 16 is going to be to the right of the node with 10.

This trend continues until all data values have been rightly positioned.

PS: A binary tree is a data structure in which each node cannot have more than two nodes directly attached to it.

CHALLENGE ACTIVITY 2.1.3: Multiplying the current value of a variable. Write a statement that assigns cell_count with cell_count multiplied by 10. * performs multiplication. If the input is 10, the output should be: 100

Answers

Answer:

cell_count = int(input("Enter the value: "))

cell_count *= 10

print(cell_count)

Explanation:

Ask the user to enter a value and set it to the cell_count variable

Multiply the cell_count by 10 and assign it to the cell_count (It can also be written as cell_count = cell_count * 10)

Print the cell_count

An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:_______

a. have a redundancy.
b. get caught in an infinite loop.
c. suffer from indefinite postponement.
d. issue a compiler error.

Answers

Answer:

c. suffer from indefinite postponement.

Explanation:

Algorithm is a set of rules that are followed in calculations or other problem solving operation by a computer. An algorithm may execute for unknown amount of time and it may suffer indefinite postponement. Algorithm depends on random numbers and it can execute continuously.

What is displayed by the alert dialog box after the following code executes? var name = "Donny,Duck"; var index = name.indexOf(","); var lastName = name.substr(index + 1, name.length - 1);; alert("Last name: " + lastName);

Answers

Answer:

Last name: Duck

Explanation:

explanation is provided in the attached document.

Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which is either 1 or 2

Answers

Answer:

//import the Random class

import java.util.Random;

//Begin class definition

public class CoinFlipper {

   //The main method

    public static void main(String []args){

       

       //Create an object of the Random class

       Random ran = new Random();

       System.out.println("Result");    

       //Use the object and the number of times for simulation

       //to call the flipCoin method

       flipCoin(ran, 25);

    } //End of main method

   

   

    //Method to flip coin

    public static void flipCoin(Random ran, int nooftimes){

        //Create a loop to run as many times as specified in variable nooftimes

       for(int i=1; i<=nooftimes; i++)

           System.out.println(ran.nextInt(2) + 1);

    }

}   //End of class definition

====================================================

Sample Output:

Result

1

1

1

2

1

2

2

1

2

1

1

2

1

2

1

1

1

2

1

1

1

2

2

1

2

========================================================

Explanation:

The above code has been written in Java. It contains comments explaining every part of the code. Please go through the comments.

The sample output from the execution of the code is also given above.

The code is re-written as follows without comments.

import java.util.Random;

public class CoinFlipper {

    public static void main(String []args){

       Random ran = new Random();

       System.out.println("Result");    

       flipCoin(ran, 25);

    }

   

    public static void flipCoin(Random ran, int nooftimes){

       for(int i=1; i<=nooftimes; i++)

           System.out.println(ran.nextInt(2) + 1);

    }

}

C create a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the Plane class and test its functionality. Write a method called Check In() as part of the Plane class to handle the check in process Prompts the user to enter 1 to select First Class Seat (Choice: 1) Prompts the user to enter 2 to select Economy Seat (Choice: 2) Assume there are only 5-seats for each First Class and Economy When all the seats are taken, display no more seats available for you selection Otherwise it displays the seat that was selected. Repeat until seats are filled in both sections Selections can be made from each class at any time.

Answers

Answer:

Here is the C++ program:

#include <iostream>  //for using input output functions

using namespace std;  //to identify objects like cin cout

class Plane{  //class Plane

private:  // declare private data members i.e. first_class and eco_class

int first_class;  //variable for first class

int eco_class;  //variable declared for economy class

public:  // public access modifier

Plane(){  //constructor to initialize values of first_class and eco_class

first_class=0;  //initialized to 0

eco_class=0;}   //initialized to 0

int getFirst(){  // class method to get data member first_class

return first_class;}   //returns the no of reserved first class seats

int getEco(){  // class method to get data member eco_class

return eco_class;}  //returns the no of reserved eco class seats

void CheckIn(){  //method to handle the check in process

int choice;  //choice between first and economy class

cout<<"\nEnter 1 to select First Class Seat: "<<endl;  //prompts user to enter 1 to reserve first class seat

cout<<"\nEnter 2 to select Economy Class Seat: "<<endl;   //prompts user to enter 2 to reserve economy class seat

cin>>choice;   //reads the choice from user

switch(choice){  // switch statement is used to handle the check in process

case 1:  //to handle the first class seat reservation

if(getFirst()<5){  //if the seat is available and the seat limit has not exceed 5

first_class++;  //add 1 to the first_class seat to count that a seat is reserved

cout<<"You reserved First class seat! ";} //display the message about successful seat reservation in first class

cout<<"\nNumber of first class seats reserved: "<<getFirst()<<endl;}  //displays the number of seats already reserved

else{  //if all first class seats are reserved then display the following message

cout<<"No more seats available for you selection!"<<endl;  

if(getEco()>=5 && getFirst()>=5){  //if all seats from first class and economy class are reserved display the following message

cout<<"All seats are reserved!"<<endl;  

exit(1);}}  //program exits

break;  

case 2:  //to handle the economy seat reservation

if(getEco()<5){   //if the seat is available and the seat limit has not exceed 5

eco_class++;  //add 1 to the eco_class seat to count that a seat is reserved

cout<<"You reserved Economy class seat! "; //display the message about successful seat reservation in economy class

cout<<"\nNumber of Economy class seats reserved: "<<getEco()<<endl;}  //displays the number of seats already reserved

else{  //if all economy class seats are reserved then display the following message

cout<<"No more seats available for you selection!"<<endl;

if(getEco()>=5 && getFirst()>=5){  //if all seats from first class and economy class are reserved display the following message

cout<<"All seats are reserved!"<<endl;

exit(1);}}  //program exits

break;

default: cout<<"Enter a valid choice"<<endl; } } };   //if user enters anything other that 1 or 2 for choice then this message is displayed

int main(){  //start of main() function body

int select;  // choice from first or economy class

Plane plane;  //create an object of Plane class

cout<<"**************************"<<endl;

cout<<"Airline Reservation System"<<endl;  //display this welcome message

cout<<"**************************"<<endl;

while(true){  // while loop executes the check in procedure

plane.CheckIn();} }  //class CheckIn method of Plane classs using plane object to start with the check in process

Explanation:

The program is elaborated in the comments with each statement of the above code. The program has a class Plane that has a method CheckIn to handle the check in process. The user is prompted to enter a choice i.e. enter 1 to select First Class Seat and enter 2 to select Economy Seat. A switch statement is used to handle this process. If user enters 1 then the case 1 of switch statement executes which reserves a seat for the user in first class. If user enters 2 then the case 2 of switch statement executes which reserves a seat for the user in economy class.There are only 5 seats for each First Class and Economy. So when the limit of the seats reservation exceeds 5 then the no more seats available for you selection is displayed. If all the seats are taken in both the first and economy class then it displays the message All seats are reserved. If the user enters anything other than 1 or 2 then display the message Enter a valid choice. Whenever the user reserves one of first or economy class seats the relevant seat is incremented to 1 in order to count the number of seats being reserved. The program and its output are attached.

Which HTML tag is used to add a paragraph to a web page?

Answers

Answer:

the HTML tag for the paragraph is <p>.

Explanation:

To insert the paragraph in the website, use the <p> tag to start the paragraph and to end the paragraph, use the closing paragraph tag that is </p>.

The paragraph tag is used inside the body tag. for example,

<html>

 <head></head>

 <body>

   <p>this is a paragraph

   </p>

 </body>

</html>

Other Questions
01:Which expression can be used to model the phrase the sum of three and a number? if 2x+1/4 = 12/20 what is the value of x A substance contains 23.0 g sodium, 27.0 g aluminum, and 114 g fluorine. How many grams of sodium are there in a 102-g sample of the substance? Select one: a. 4.43 g b. 23.0 g c. 14.3 g d. 102 g e. None of these The reference base period for the CPI is 1982-1984. In May 2017, the CPI was 244.7. Complete the sentence. This CPI in May 2017 tells us that the ______ of the prices paid by urban consumers for a fixed basket of consumer goods and services was ______ . ordered pair for the point *PLEASE ANSWER TY* After World War II, many Africa countries called for the establishment of a free Africa. Which non African country's independence movement provided inspiration and a model for African nations seeking independence? a.) Canada b.) Mexico c.) Turkey d.) India Which is a true statement about an isosceles right triangle? A: Each leg is 3 times as long as the hypotenuse. B: The hypotenuse is 3 times as long as either leg. C: The hypotenuse is 2 times as long as either leg. D: Each leg is 2 times as long as the hypotenuse. Determine the equation for the total cost of snow tubing, the rest of the chart:8 . 2010 . 25PLEASE HELP ASAP!!! *grade 9 work* best answer gets brainliest :) Que relacion hay entre la cultura africana y la palabra "tango" ES PARA HOY!!!! doy puntos The exercise price on one of Chrisardan Companies call options is $20, its exercise value is $27, and its time value is $8. What are the options market value and the price of the stock Complete the recursive formula of the arithmetic sequence -17, -8, 1, 10,... a(1)= a(n)=a(n-1)+ Which of the following phrases describes valence electrons?O A. Electrons that are part of the core of the atomO B. Electrons that are closest to the nucleusO C. Electrons that are farthest from the nucleusD. Electrons identified by the period number of the element Last year, I had 92 APES students and this year I will have 63 APES students. By what percentage will the population of APES students increase. When doing blood testing for a viral infection, the procedure can be made more efficient and less expensive by combining partial samples of different blood specimens. If samples from five people are combined and the mixture tests negative, we know that all five individual samples are negative. Find the probability of a positive result for five samples combined into one mixture, assuming the probability of an individual blood sample testing positive for the virus is 0.06. Read the passage carefully and then answer the questions. The Peacock Who Wished to Fly . Taha, the Peacock was a kind and gentle bird. He lived in peace with all the other birds. But Taha had a dream. Instead of pecking at the ground, he wanted to fly to faraway lands. He wished he could see the all the beauty of nature for himself. But Taha, the Peacock couldn't even travel far in search for food. Some naughty birds mocked him. They left him alone whenever they went in search of food. Taha the Peacock thought to himself, If I am a bird, then I should be able fly. Why don't I have wings like other birds? Taha the Peacock thought hard. He decided that he would try to collect feathers from other birds.He crept up behind the Owl. He plucked a few feathers from her back without being noticed. The feathers were beautiful, long and dark. He did the same with the Parrot. He got beautiful green and yellow feathers. He stole feathers from many different birds. He even plucked feathers from Geese who were swimming in the river. The feathers were pretty and white. Taha kept his feather-gathering a secret. Taha, the Peacock even stole feathers from two Eagles while they were busy eating! By now he had collected a lot of beautiful feathers. He cleverly wove them together. He carefully fixed the feathers to his tail. When he stretched his tail, the feathers spread out like a fan. It was beautiful. The different colors made him look even more attractive. Now Taha the Peacock was the most attractive bird in the village. None of the other birds had feathers as beautiful as Taha, the Peacock. Taha the Peacock was happy. As the most beautiful bird in the jungle, he no longer wanted to fly. Other birds didn't mock or tease him anymore. They were too busy admiring his beauty! a. Describe Taha. (1) b. What did he wish for? (1) c. What did Taha do with the feathers? (1) which real life object is an example of a parabolic arc? a. objects being thrown straight into the air b. floating clouds c. the way light is focused in a flashlight d. the way a processor works in a computer e. the angle of the roof on a house f. how light is bent in eye glasses g. the heat of pavement in the summer Which word best describes the degree of overlap between the two data sets? none high low moderate Identify one example from the scientific literature of how a chemogenetic or optogenetic modulator was used to correct signaling in a disrupted cellular pathway. An arithmetic sequence is represented in the following table. Enter themissing term of the sequence. PLEASE HELP -The horizontal cross-sectional shapes of the given prism are all congruent.