Answer:
The clause that turns a statement into question is called question tag. It consists of the statement, a comma and the question clausee.g You are Richa, aren't you?
Here aren't you is a question tag, it turns the statement into a question.
The words that is used to express strong emotion is called interjection. It can express emotion of excitement, joy, sorrow, pain and so on.The goods used by the consumers to fulfill their current demand rather that using it to produce another good. They are the end result of the production and manufacturing. You see these goods in showrooms, shops or stores. The law that is related with the things that a producer of goods must do to protect customers from harm is called consumer rights. These rights and laws came into existence through various legal disputes. Right to choose, right to be informed, right to safety and right to be heard are consumer rights. The organized collection of structured information that is stored electronically on a computer is called database. Most of the databases use structured query language to write and query data, databases are controlled by database management system. The divide between the people who have ready access to the internet and computer and those who do not is called digital divide.As important as it is to plan ahead, sometimes you _____. A. Need to throw all the rules of the road out the window B. Can't stop things from going wrong C. Have a higher priority than driving safely D. Will regret having made plans
Answer:
B
Explanation:
This seems the most appropriate..
if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next 10 seconds then he has Dash velocity
Answer:
[tex]\frac{1}{3}\ m/s[/tex]
Explanation:
The computation of the velocity by using the following formula is
As we know that
[tex]Velocity = \frac{Displacement}{Total\ time\ taken}[/tex]
where,
Displacement is 10 meters
Total time taken is 30 seconds
Now placing these values to the above formula
So, the velocity of Dash is
[tex]= \frac{10\ meters}{30\ seconds}[/tex]
[tex]= \frac{1}{3}\ m/s[/tex]
We simply applied the above formula so that we can get the velocity and the same is to be considered
You use a cisco 2900 router in your network. you are considering purchasing and implementing the Unifield communications feature set on this router. however, you would like to evaluatie this feature set for a period of time prior to pruchasing it whcih command activate the evaluation right to use license for this feature set?
Explanation:
License boot module c2900, technology-package uck9
Given the variable ip, already declared as a pointer to an integer, write the code to dynamically allocate memory for a single integer value, assign the resulting pointer to ip, and initialize the integer value to 27.
Answer:
In C++:
int *ip;
ip = new int;
*ip = 27;
Explanation:
First of all, let us have a look at the methods of memory allocation to a variable.
1. Compile Time: The memory gets allocated to the variable at the time of compilation of code only. It is also called static allocation of memory.
Code example:
int a = 5;
2. Run Time: The memory is allocated to the variable on the fly i.e. during the execution of the program. It is also called dynamic allocation of memory.
Now, we have to write code for a variable ip, which is an integer pointer to dynamically allocate memory for a single integer value and then initialize the integer value 27 to it.
Initializing a variable means assigning a value to variable for the first time.
Writing the code in C++ programming language:
int *ip; // Declaring the variable ip as a pointer to an integer
ip = new int; // Dynamically allocating memory for a single integer value
*ip = 27; // Initializing the integer value to 27.
What is the best offline route navigation app for Android?
Answer:
Google Maps
Explanation:
Answer:
Sygic GPS Navigation & Maps
Explanation:
what is a good electric fan for your room?
Answer: a box fan
Explanation:
the get you really cold easily and its easy to turn off and on
Pre-made, copyright-free illustrations are called __________. apps clip art graphic design stock photos
Answer: clip art
Explanation:
The clip arts are graphic images that are pre-made illustrations for the purpose of creating any medium (designs or art). It has no restrictions to use them, it can be used by anyone, hence its copyright-free.It comes in both electronic and printed form.But mostly they are designed and distributed and used by a person in an electronic form.Hence, the complete statement is "Pre-made, copyright-free illustrations are called clip art".
Answer:
B) clip art
Explanation:
I got this question correct
Which of the following is a valid constructor header for the Player class that accepts the player name as a parameter? public void Player(String playerName) private Player(playerName) private void Player(playerName) public Player(String playerName)
Answer: Player(String playerName)
Explanation:
A constructor is a code block of a class. It is always witnessed when a new instance of the class is created
In JAVA , a valid constructor header is given as " CLASS (parameter)"
here, Class → Player
parameter → player name (which is a string)
So, a valid constructor header for the Player class that accepts the player name as a parameter: Player(String playerName)
Consider the following code snippet. File hoursFile = new File("hoursWorked.txt"); Your program must read the contents of this file using a Scanner object. Which of the following is the correct syntax for doing this? Scanner in = new Scanner("hoursWorked.txt"); Scanner in = new Scanner(hoursFile); Scanner in = Scanner.open(hoursFile); Scanner in = Scanner("hoursWorked.txt");
Answer:
Scanner in = new Scanner(hoursFile);
Explanation:
The syntax to read the content of a file after the file has been created/initialized is as follows;
Scanner [variable-name] = new Scanner([object-name]);
From the question above, the [object-name] is hoursFile
Substitute [object-name] with hoursFile, the syntax becomes
Scanner [variable-name] = new Scanner(hoursFile);
[variable-name] can be anything as long as it follows variable naming convention;
From the list of given options, the option that answers the question is: Scanner in = new Scanner(hoursFile);
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information? a. LDAP poisoning b. LDAP injection c. Kerberos injection d. DAP hijacking
Answer: b. LDAP injection
Explanation:
LDAP (Lightweight Directory Access Protocol ) Injection is defined as
an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input. It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.So, LDAP injection is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.
Hence, the correct option is b. LDAP injection.
Answer:
dap
Explanation:
you suck 1v1 me epic Jayden rock star
What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible by ten: " + counter); counter++; } else { System.out.println("Counter is not divisible by ten: " + counter); counter++; } Move the duplicated code outside of the if statement Shorten variable names Move the brackets to save several lines of code Add semicolons after the if condition and the else reserved word
Answer:
Move the duplicated code outside of the if statement
RSA is a public-key cryptosystem developed by MIT professors Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman in 1977 in an effort to help ensure Internet security. RSA uses modular arithmetic and elementary number theory to do computations using two very large prime numbers. Identify the statement which is true for RC6 algorithm:________.
a) Is a variable key-size stream cipher with byte-oriented operations and is based on the use of a random permutation
b) Includes integer multiplication and the use of four 4-bit working registers
c) Is a parameterized algorithm with a variable block size, key size, and a variable number of rounds
d) Is a 64 bit block cipher that uses a key length that can vary between 32 and 448 bits
Justify the statement "The same job title can have different job roles and different qualification criteria in different organizations." Compare job titles and their respective roles and qualifications from at least two organizations in different industries, and write a short essay explaining your reasoning.
Answer:
Below is an executive summary of this particular issue.
Explanation:
Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses. Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.Answer:
In the classified section of a local newspaper, I came across job openings for the post of a network engineer in two different companies. One was from the airline industry, while the other was from the food and beverage industry.
The airline company required an applicant to have a bachelor's degree in network administration. The job posting specified that applicants with supporting CCENT or CompTIA Security+ certifications would be preferred. The company was willing to consider candidates with no prior experience. The job responsibilities included: maintaining security, DNS, IP routing, firewalls, and troubleshooting IT-related problems. The role also required skills to manage multi-site network operations, operating systems, and other software applications in public as well as private facilities. Another responsibility was to complete the time logs in the company's records to facilitate timely and accurate billing.
For the role of a network engineer in the food and beverage industry, the required qualification was any bachelor's degree in computer science with a minimum of one year of relevant experience. Certifications were an added advantage, but they were not a necessity. The job role required skills to troubleshoot network glitches, monitor network usage, install software and hardware infrastructure, provide technical assistance to users, and suggest improvements in the system.
Explanation:
How to do this question , please answer quickly , I’ll give branliest
Answer:
First you analyze all the data that your program needs. You can do this by drawing UML diagrams or whatever you find convenient.
In your case you'll model an item, a stock, supplier and user. You may not end up implementing all of that, but it's good to get a feel for the extent of your assignment.
You can then define use-cases, i.e., tasks or flows through your program, in your case these would simply be the tasks of your 5 menu options. You can write down what happens to the modeled data for each of those flows.
The combination of the use-cases and data modeling will make clear what data structures you'll actually need. For example, the role of the supplier name is unclear. From the requirements it doesn't say if that has to be stored somewhere.
Note that we haven't talked about programming yet at this stage. This is your analysis.
Then you choose a programming language and start implementing. Test corner cases and unexpected input (like empty lists, quantities of zero and negative).
Unspecified a. typical IPv6 prefix used to indicate the network portion of the address. /64 b. IPv6 address represented as ::/128 (compressed form) and cannot be assigned to an interface Unique local c. Unique, internet-routable IPv6 address (dynamic or static) Loopback d. Used to communicate with other devices only on the same IPv6 subnet.
Answer:
The answer to this question can be defined as follows:
Explanation:
In the given statements there are some mistype errors so, in the explanation section, we define the question with their suitable answer.
In choice A:
The Internet Protocol version 6 (IPv6) Prefix Length is being used to identify however many bits are already in the network part of its Global Unicast IPv6 address. It uses the number 64 for employed to recognize the network part of the very first 64 bits, that's why in Option A answer is "/64".
In choice B:
An IP address is used to represent 8 classes, in which each representing 16 bits, in the representation IP address it uses:: that is unspecified, that's why in Option B answer is "Unspecified".
In choice C:
The global unicast is a single connection on each sender and receiver, it specified from each network address, through one position upon its network to the other, that's why in Option C answer is "global unicast".
In choice D:
The link-local is used to communicate with other devices with the same IPv6 subnet, that's why in Option D answer is "link-local".
Please find the attachment of the question:
Escribe todas las posibles combinaciones que pueden haber entre 4 bits.
Answer:
The answer is "[tex]\bold{2^n\ \ _{where} \ \ \ n \ is\ bit }[/tex]"
Explanation:
The Combinations could be produced by using n-bits [tex]2^n[/tex] . It s enables you to generate the 4-bit numbers that are:
[tex]\to 2^4 = 16[/tex] combinations.
for the 4-bit, the combination of 2 = 16, which are its possible combination and for the 10 variations appropriate 16 combinations are used, As we know for 4 bit 16 Combinations can be generated which are from 0 to 15.
urgent ..algorithm and flowchart to check weather a number is odd or even ???
Answer:
if it's 0 then the number is even.else number is odd
Explanation:
if it's divisible by 2.then the reminder will be 0,
then the number is even.
thanks
Answer:
Hello!!!
I'm not sure about first one but second is correct one.
no. means number (i didnt had place so)
so, i hope it helps you a little....
HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical controls D. Administrative, technical, and physical controls
Answer:
D
Explanation:
Based on HIPAA Privacy Rule requires that covered entities apply appropriate administrative, technical, and physical safeguards to protect the privacy of protected health information, in any form.
William plans to write a paper about computers. He wants to compare desktop and laptop computers. He is trying to decide how to use cubing to refine his topic. Which is an example of how cubing can be used to refine William’s topic? It can be used to write a thesis statement explaining the computer types being compared. It can be used to write a list of the levels and sublevels of the features of a laptop computer. It can be used to analyze and describe possible uses of each type of computer. It can be used to make a map showing all of the types of desktop computers.
Answer:
c) It can be used to analyze and describe possible uses of each type of computer.
Explanation:
I just did it on edge 100%
good luck
Answer:
c) It can be used to analyze and describe possible uses of each type of computer.
Explanation:
just did dis on edge hope dat helpssssssssss :)
You are on a committee tasked with researching and recommending a service that will allow employees the opportunity to save files from their mobile phones, laptop computers, and workstation computers to cloud file storage services.
Which of the following will need to be researched and considered in order to make a comprehensive recommendation?
a. Virtualization application streaming
b. Off-site email applications
c. Type 2 hypervisor application
d. Type 1 hypervisor
e. Synchronization apps
Answer:
e. Synchronization apps
Explanation:
The synchronization refers to the process in which a user keeps his or her data in a multiple-way i.e in different applications so that the chances of loss of data could be minimized. And at the same time, it also maintains the data integrity
It can be done by entering your credentials so that it appears as displayed before
Therefore according to the question, for saving the files from mobile phones, laptop computers, etc for cloud storage services the best and appropriate option is synchronization applications.
ment best describes the relationship between superclass and subclass types? a. A subclass reference cannot be assigned to a superclass variable and a superclass reference cannot be assigned to a subclass variable. b. A subclass reference can be assigned to a superclass variable and a superclass reference can be assigned to a subclass variable. c. A superclass reference can be assigned to a subclass variable, but a subclass reference cannot be assigned to a superclass variable. d. A subclass reference can be assigned to a superclass variable, but a superclass reference cannot be assigned to a subclass variable.
Answer:
d. A subclass reference can be assigned to a superclass variable, but a superclass reference cannot be assigned to a subclass variable.
Explanation:
A subclass is a class which is derived from another class. A subclass will have the characteristics of its ancestor class. A superclass is a class which is class direct ancestor. A superclass is an existing class from which new classes are derived whereas subclass is a class which is derived from superclass. The correct statement is that a subclass can be assigned to a superclass variable.
Eliza needs to share contact information with another user, but she wants to include only certain information in the
contact. What is the easiest way for her to achieve this?
A. Use the Edit Business Card dialog box to control the information included.
B. Export only select fields from the contact.
C. Save the contact as a VCF file.
D. Share your contacts foler with other user.
Answer:
A. Use the Edit Business Card dialog box to control the information included.
Explanation:
b was incorrect but A is correct on edge 2020 I did the unit test review
Using the Edit Business Card dialog box to control the information included is the easiest way for her to achieve this. Thus option A is correct.
What is information?Knowledge acquired by study, discussion, research, or education is referred to as information. Data is, in essence, the outcome of the data analysis and interpretation process. Info is the interpretation of those elements of knowledge, whereas data is the particular measurements, figures, or diagrams.
She can do this most easily while using the Edit Business Card Combobox to modify the material included. When you get a new email, a meeting submission, or a task plea, a notification called a pc alert flashes up on your computer. Desktop Alerts are on by default.
Depending on the product on the content you get in your Outlook, a Desktop Alert may or may not display certain information. Therefore, option A is the correct option.
Learn more about information, Here:
https://brainly.com/question/13629038
#SPJ5
Which of the following is true? a. Pseudocode is used to describe an algorithm. b. Pseudocode is not an actual computer programming language. c. Pseudocode is used to describe executable statements that will eventually be translated by the programmer into a program. d. All of the above.
Answer:
Correct answer is:
d. All of the above
Explanation:
First of all, let us learn about a pseudo code:
Pseudo code: It is an implementation of any algorithm written with the help of annotations and text using in simple English. (So, point a. is true)
It is written in English so its syntax is not like any actual programming language. (So, point b. is true)
Pseudo code describes what each line of pseudo code will do so the code writing becomes easier simply by translating the pseudo code to actual programming language syntax i.e. point c. is true.
Hence, point "d. All of the above" is true.
Advantages of Pseudo code :
It makes the readability of the program idea/approach better.Code writing becomes easier for the programmer.Correct answer is:
d. All of the above
why is know app downloading in my android phone even if I have 900 MB ???
Answer:
May be you have not signed in with Google
The ___________ button represents the start of a hyperlink in Table of contents.
Answer:
An LS button
Explanation:
It appears on the (structure line 3)on the structure line, place your cursor in the white field to the right of the E button (Recall that the E button represent the entry test).
what is a good wall adapter for your house?
Answer:
RAVPower Dual-Port*
Explanation:
How I to turn this ''loop while'' in ''loop for''? var i = 0; while (i < 20) { var lineY = 20 + (i * 20); line(0, lineY, 400, lineY); i++; }
Answer:
for(i = 0; i<20;i++){
lineY = 20 + (i * 20);
line(0, lineY, 400, lineY) }
Explanation:
First declare and initialize the variable i. You have not specified the data type of i so if the data type of i is integer i.e. int then you should declare i variable in the for loop as for(int i = 0; i<20;i++)
So the given while loop has a variable i which is initialized to 0. Then while(i<20) means that while loop executes until the value of i exceeds 20. If this while condition is true then the two statements inside its body will execute. The two statements are: lineY = 20 + (i * 20);
line(0, lineY, 400, lineY);
The value of i ins incremented after each iteration i.e. i++
So while loop has the following syntax"
1) initialization; ----> i = 0
2) while(condition) { ----> i<20
3) loop body -----> lineY = 20 + (i * 20); line(0, lineY, 400, lineY);
4) increment or decrement loop variable } ----> i++
For loop has the following syntax:
for( initialization of loop variable ; condition; decrement/increment loop variable) {
loop body }
Here:
initialization ----> i = 0
condition ----> i<20
loop body -----> lineY = 20 + (i * 20); line(0, lineY, 400, lineY);
increment or decrement loop variable ----> i++
Varun wants to start his own business. Suggest him at least four functions of an entrepreneur.
Answer:
● Creates innovation
● Takes and makes decision
● Organizing resources
● Takes and bears risks
Answer:
FOUR THINGS ARE DOWN
Explanation:
● Creates innovation
● Takes and makes decision
● Organizing resources
● Takes and bears risks
A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protocol (LDAP). The directory needs to be able to make changes to directory objects securely. Which of these common operations supports these requirements?
The options available are:
Search, modify.
StartTLS, delete.
Bind, modify.
Bind, add.
Answer:
StartTLS, delete
Explanation:
StartTLS is a computer networking term for email protocol command, in which a system administrator buses it to command an email server that an email client running in a web browser, wants to turn an existing insecure connection into a secure one. Thus, during this process, StartTLS permits a client to communicate securely using LDAPv3 over TLS.
On the other hand, the DELETE operation can make a change to a directory object.
According to the given question, the common operations that supports requirements where directory needs to be able to make changes to directory objects securely are;
Bind, addSearch, modifyBind, modifyStartTLS, deletAccording to the question, we are to discuss the common operations that supports some requirements as regards the changing of directory objects securely.
As a result of this we can see that making use of StartTLS, delete can serve this purpose and other function as well.
Therefore, common operations that supports requirements where directory needs to be able to make changes to directory objects securely is Search and modify.
Learn more about directory architecture at:
https://brainly.com/question/13171394
Write the steps to create labels in OpenOffice writer
1. Start up Open Office.Org.
2. Click on File >> New >> Labels.
3. In the label dialog box, click on the brand box. This will allow you to choose the type of paper that you use.
4. Select the type of document that you want. The usual standard is Avery, but feel free to explore and discover what you like.
5. Select if you want a single label, a document, and any other options. Some of the things you might want to do are:
- Create a variety of labels for folders or drawers
- Create a sheet of address labels
- Create decorative labels
6. Click New Document. Here, you see a sheet of blank labels.
7. Create the type of format/placement that you want for your labels. Once you are happy with it, copy it to the rest of the labels.
8. Fill your labels with necessary information.
9. Print them out.