Answer:
I think it's the example of
Explanation:
Data Storage.
Copy the skeleton of code below into your answer. Then in the space indicated, add your own code to prompt the user for two numbers and a string and then prints the difference of those numbers with a message to the user (text in bold is input entered by the user). Note that the final output should be on a line by itself. Recall that the difference of two numbers is found by subtracting the second number from the first.
Enter the first: 10
Enter the second: 3
Enter your name: Dinah Drake
Dinah Drake, the difference is 7
Answer:
import java.util.*;
public class Main
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter the first: ");
int first = input.nextInt();
System.out.print("Enter the second: ");
int second = input.nextInt();
input.nextLine();
System.out.print("Enter your name: ");
String name = input.nextLine();
int difference = Math.abs(second - first);
System.out.println(name + ", the difference is " + difference);
}
}
Explanation:
*The code is in Java.
Create a Scanner object to get input from the user
Ask the user to enter the first, second, and name
Calculate the difference, subtract the second from the first and then get the absolute value of the result by using Math.abs() method
Print the name and the difference as in required format
Which is the incorrect statement
Answer:
Chain multiple ifs with ElseIf.
If you are able to anticipate that the components are likely to be reused in future projects then it is not advisable to use the Pub-Sub design pattern.
a. True
b. False
Answer:
b. False
Explanation:
Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.
Pub-Sub design pattern is an abbreviation for publish-subscribe design pattern and it refers to a type of architectural design pattern that typically involves using a framework that enables the exchange of messages from the senders (publishers) to the recipient of the messages (subscribers) without having to program the messages.
Hence, if you are able to anticipate that the components are likely to be reused in future projects then it is advisable to use the Pub-Sub design pattern.
Meaning of ‘integrity of data’
Answer: i have no idea
Explanation:
24/3*2^2/2*3+(20-10)-40
Answer:
34
Explanation:
You use pemdas
I can’t get answers because the ads won’t load help me
Answer: Get better wifi
Explanation: This maybe a router problem, Go to your router and reset it by unplugging the power chord, After 30 seconds plug it back in and wait for your wifi to start back up. Your ads should load now. Have a good day.
Create an online order form for a car rental store and include the following items: input text box to enter the number of days input text box to enter the vehicle type (car, suv, ...) input text box to enter the number of designated drivers submit button to send form data to a server Note: the submit button is just to create a complete form. You do not have to define form action attribute for this assignment. Submit: HTML file and any other images and/or style sheets used to complete the design.
Answer:
Explanation:
The following is the barebones HTML code for the form which can be saved as is or implemented into your own site. No styling or images were added since that is done based on the overall styling of the website in which the code is being implemented.
<!DOCTYPE html>
<html>
<body>
<h2>Car Rental Store</h2>
<form action="/action_page.php">
<label for="fname">Number of Days:</label><br>
<input type="text" id="fname" name="fname" value="Ex. 20"><br><br>
<label for="lname">Vehicle Type:</label><br>
<input type="text" id="lname" name="lname" value="Ex. SUV"><br><br>
<label for="lname">Number of Designated Drivers:</label><br>
<input type="text" id="lname" name="lname" value="Ex. 2"><br><br>
<input type="submit" value="Submit">
</form>
</body>
</html>
In 25 words or fewer, list some traits or qualities you think a manager
might need in order to do his or her job effectively.
Answer:
- Be understanding. Things arent always gonna go great. So, if your understanding issues can go way smoother.
- Be a great meditator. Employees arent always going to get along. But, when there is conflict you need to be a good mediator to help conflict. If you're taking sides because your closer to one employee or one employee likes the same song as you, your not a good meditator, and you shouldn't be a manager.
- Be kind. Being kind is always the #1 rule in life. It helps you in life. Being mean to your employees isn't good and will most definitely want them to quit their job.
Bob uses his own private key to encrypt the message. When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob. No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key. Therefore the entire encrypted message serves as a
Answer:
The answer is "Digital signatures".
Explanation:
The digital signatures are also recognized as asymmetric authentication, which is based on popular data cryptography. It generates the individual virtual wrist, which identifies consumers and protects information into digital communications or files. The digital certificate algorithms like RSA can generate two keys, one is the person or one public, that can be connected numerically.
advantages and disadvantages of screen reading
Explanation:
do u mean screen reading as in reading books in ur mobile ?
if so then disadvantage is the amount of eye strain u get staring into the screen
and advantage is the portability.
Edhisive 3.5 code practice
Answer:
x = int(input("What grade are you in? "))
if (x == 9):
print ("Freshman")
elif (x == 10):
print("Sophomore")
elif (x == 11):
print ("Junior")
elif (x == 12):
print("Senior")
else:
print ("Not in High School")
Explanation:
The final stages of the data science methodology are an iterative cycle between Modelling, Evaluation, Deployment, and Feedback.
a. True
b. False
Answer: True
Explanation:
The Data Science Methodology is simply referred to as an iterative and continuous methods that is required by data scientists to guide them on the approach that they'll use to tackle and solve problems typically through a number of steps.
It should be noted that the final stages of the data science methodology are an iterative cycle between Modelling, Evaluation, Deployment, and Feedback. The main aspects involves:
• Problem
• Approach;
• Requirements
• Collection
• Understanding
• Preparation
• Modelling
• Evaluation
• Deployment
• Feedback.
Therefore, the above statement is true.
someone help please!! i’ll give brainliest
Answer:
1-Mouse
2-Display
3-Printer
4-Keyboard
Explanation:
A town government is desinging anew bus system
Answer:
Umm what? Are you talking about the type of problem it is? If so it is an optimization problem.
Explanation:
I had something like this for one of my tests and I chose the optimization problem because it finds the values of decision variables that result in a maximum or minimum of a function.
But ion know if it's this that you are talking about
Need help please asap
Answer:
Its C that is the answer hahahahha
Complete the statement below using the correct term.
The ___ phase in a project includes an analysis of what technology is in use.
*No multiple choice
Answer:
im pretty sure it is the implementation phase. But i can't be too sure about it.
What are examples of Marketing, Sales, and Service careers? Check all that apply.
Receptionist
Construction Manager
Salesperson
Cashier
Personal Financial Advisor
Advertising Sales Agent
Purchasing Manager
Answer:
The correct alternatives are "Option C", "Option D", "Option F" and "Option G".
Explanation:
The built environment industry includes innovative developers, finance professionals, marketing strategies, and therefore all various advertising service delivery career opportunities. Sales configurations usually involve Corporate Development Management teams, Store executives, Call Centre Staff, Quality Assurance as well as Directorate Client Services.Some other given selections are not comparable to the circumstance in question. So above, there's the correct approach.
Answer:
Salesperson
Cashier
Advertising Sales Agent
Purchasing Manager
[C, D, F, & G]
Explanation:
Which of the following statements are true? Check all of the boxes that apply. Networks are expensive to set up and maintain. Networks are easy to set up. Intruders into a network cannot disrupt network connectivity for users. Network staff need to keep accurate records on what has been done to a network.
Answer & Explanation:
I'm not expert on this, but I'm pretty sure that the correct answers are:
Networks are easy to set up. & Network staff need to keep accurate records on what has been done to a network.
These choices just generally make the most sense...
Hope this helps and have a great day!! ❤
9 Which of these words is used to begin a conditional statement?
Answer:
The word used to begin a conditional statement is if.
Explanation:
In the syntaxes of most (if not all) programming languages, the word if is used to begin any conditional statement.
Take for instance:
Python:
if a == b:
print("Equal")
C++:
if(a == b)
cout<<"Equal";
Java:
if(a==b)
System.out.print("Equal")
The above code segments in Python, C++ and Java represents how conditional statements are used, and they all have a similarity, which is the "if" word
Which of the following technologies does NOT facilitate the transferring of data between computers in adjacent buildings?
Answer:
modem....
Explanation:
i think thats what your asking
The technology which does NOT facilitate the transferring of data between computers in adjacent building is:
BluetoothAccording to the given question, we are asked to state the technology which does NOT facilitate the transferring of data between computers in adjacent building
As a result of this, we can see that from the complete question, we are asked to select the answer between the available options which included fiber optics, twisted pair, and microwave, and the correct answer is Bluetooth
Therefore, the correct answer is Bluetooth
Read more about bluetooth here:
https://brainly.com/question/14043588
5. Which one of these can connect directly to the internet?
a. Servers
b. Packets
C. Client
d. Internet Users
Answer:
Servers
Explanation:
A server can directly connect to the internet.
Internet users can connect directly to the internet is the answer to this question.
The server is what helps other networks or programs to function. They hosts websites and provide data to other computers. A client connects to a remote computer.
Packets are formatted units of data that are used to communicate over a TCP/IP network.
An internet user has direct connection to the internet. Just as the name internet users imply, we can tell that they can connect to the internet already.
read more at https://brainly.com/question/2662676?referrer=searchResults
A security administrator is adding a NAC requirement for all vpn users to ensure the connecting devices are compliant with company policy. Which of the following items provides the HIGHEST assurance to meet this requirement?
a. Implement a permanent agent.
b. Install antivirus software.
c. Use an agentless implantation.
d. Implement PKI.
Answer:
c. Use an agentless implementation.
Explanation:
A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.
Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.
In this scenario, a security administrator is adding a network access control (NAC) requirement for all vpn users to ensure the connecting devices are compliant with company policy. The item which provides the highest assurance to meet this requirement is to use an agentless implementation because the network access control (NAC) codes do not reside on the host device and the end user does not have to download any link to use it.
Which of the following are characteristics of RG-6 cabling specifications? (Select 3 answers)
a. Coaxial cabling
b. Suitable for long-distance cable runs
c. Used for cable television, satellite television and cable modems
d. Suitable for short-distance cable runs
e. Twisted-pair copper cabling
Answer:
a. Coaxial cabling
b. Suitable for long-distance cable runs
c. Used for cable television, satellite television, and cable modems
Explanation:
RG-6 cable is a coaxial cable type commonly used in television cable for transmitting the signal from the receiving antenna to the television port. It is also used in cable modems and satellite television. Unlike the ethernet cable, it is suitable for long-distance cabling.
Mary is a big fan of tropical fish. She has a few tanks of fish at home. To maintain a healthy environment for the fish, she needs to add conditioner to the water once a week. The amount of conditioner added is determined by the volume of the tank. According to the direction on the bottle, she has to add 1 ml of conditioner per 100 cubic inches of water. She wants a program to calculate exactly how much conditioner to add to a tank of water. All tanks are in rectangular shape. The program will ask for the length, the width and the height of the tank. It will calculate and display the amount of conditioner to be added. [Note: volume = length X width X height] Use the following two test cases for desk-checking [all in inches]:
length width height
20 22.5 10
16 10 15
Write a C++ programs that implements and then add code to write the result to an output file. Make sure you generate a description message with the data in the output file (i.e. The amount of conditioner to be added is 3 ml).
outFile << "The amount of conditioner to be added is "<< amount<<" ml"<
Name output data file "conditioner.txt" .
Answer:
Answered below
Explanation:
# Program is written in Python programming language
conditioner_in_ml = 0
width = float(input("Enter width in inches: "))
height = float(input("Enter height in inches: "))
length = float (input("Enter length in inches: "))
#Calculate the volume
volume = width * length * height
#Calculate the amount of conditioner per 100 #cubic inches of volume
conditioner_in_ml = volume/ 100
print("The amount of conditioner required for $volume cubic inches is $conditioner_in_ml ml")
What is the most likely to be a possible physical attack?
Answer:
Physical attacks (also called kinetic attack) are. intentional offensive actions which aim to destroy, expose, alter, disable, steal or gain unauthorised access to physical assets such as infrastructure, hardware, or interconnection.
Explanation:
You are a network technician for a small corporate network. The network is connected to the internet and uses DHCP for address assignment. The owner of the company in the executive office and a temporary employee in IT Administrator office both report that their workstations can communicate with some computers on the network, but cannot communicate with the internet. You need to diagnose and fix the problem.
In this lab, your task is to complete the following:
-Use the following troubleshooting tools to diagnose the problem in the network:
-the ping, ipconfig, or tracert command utility
-the network and sharing center in the windows 10 or windows server 2016 operating system
-the DHCP server console in the windows server 2016 operating system
Answer:
Explanation:
The first thing that you should do would be to ping the computer in the Networking Closet, if this fails then the next step would be to ping the service provider. If both of these pings fail it is most likely because the configuration of the IP addresses are configured wrong. In this case use the command prompt to type in the following
ipconfig /all
this will open up the entire configuration info. If the problem is truly the configuration then your DNS address should show up as not configured. This can happen when a DHCP is enabled. Check if DHCP is enabled, if so then you would need to type the following into the command prompt
ipconfig /renew
This will renew the ip address information from the DHCP server and should create the proper DNS configuration as well and solve the issue.
Following are the solution to the given question:
Initiate troubleshooting in the Executive by exploring the scope of the connectivity issue. Ping the laptop in the network closet from your workstation. A ping to a location failed.Ping your internet service provider. The ping to the address fails.Verify any connection issues here between workstations, the Network Closet computer, and also the ISP in the IT Administrator's office. (Pings to both locations failed.) The issue is now almost definitely due to the channel's IP setup.To examine the Local Area Connection setup, open the cmd in the Executive Office and type ipconfig /all. Some of the following issues must be noted: The workstation's default route and DNS server addresses have still not been configured.It implies that connectivity is confined to computers just on the local network.Its DHCP Enabled option has been enabled. Yes, a DHCP server is configured just on the workstation. Its line with the DHCP Server address wasn't shown. This means the workstation was unable to communicate with the DHCP server. This IP address corresponds to an APIPA domain (169.254.0.1 to 169.254.255.254). It shows that the computer assigns an IP address to it only. The workstation would be capable of communicating with the other hosts on the local network who have given their unique IP via APIPA.Verify that its DHCP service for the local area network is active and active in the Network Closet.CORPSERVER should be the first option in Hyper-V Manager. To see all the virtual machines, open the window. Join by correcting CorpDHCP (maximize the window for easier viewing if desired). For launch, the DHCP console in Server Manager, go to Tools > DHCP. CorpDHCP.CorpNet.com must be extended. IPv4 enlargement.Scope [192.168.0.1] Subnet1 has a dropdown, suggesting that this is not operational. Select Activate from the menu bar of Scope [192.168.0.1] Subnet1. The scope's "dislike" button has gone, and the DHCP service for the local network is now operational.Launch the command prompt inside the Executive and type ipconfig /renew. This will obtain the new Ip from the DHCP server and change the Ethernet connection settings.To check the Internet setup, type ipconfig /all. You should now see lines for the default gateway, DNS server, and DHCP server, and a new IP address in the DHCP scope for the local network.Ping the ISP in the Executive Office to confirm that the problem has been resolved. Your ping to the ISP is good.Rep step 6 in the IT Administrator Office to fix the dispute with the workstations.Learn more:
brainly.com/question/14728944
Plz answer this question for me quick for a Brainly
which bird is the symbol of peace ?
dove
Complete the program below named CountVowels so that it reads in a string, counts all the vowels in that string, and prints out the number of vowels in the string.
For example, given the input string of "Hello, World!", the program should print out the value 3 for the three vowels, "eoo", in that string.
Complete the following file:
CountVowels.java
import java.util.Scanner;
/**
Reads a string and counts all vowels contained in that string.
Vowels are A E I O U a e i o u.
Input: the value of s, a string
Output: the number of all the vowels in s
*/
public class CountVowels
{
public static void main(String[] args)
{
Scanner in = new Scanner(System.in);
String s = in.nextLine();
// your work here
System.out.println(count);
}
}
Answer:
Answered below
Explanation:
public class CountVowels{
public static void main (String[] args){
Scanner in = new Scanner(System.in);
String words = in.nextline();
String vowels = "aeiouAEIOU";
int count = 0;
for( int i =0; I< words.length-1; I++){
for( int j = 0; j < vowels.length - 1; j++){
if(words [I] == vowels[j]){
count++;
}
}
}
System.out.print(count);
}
}
Tim has completed his work. What feelings toward his work will give him a sense of purpose, energize him, and also inspire him as an individual
to achieve more and build on his strengths?
Tim takes ____
in his work.
advantages and disadvantages of screen reading
Answer:
Advantages:
1.) It allows a blind person to use the computer
2.) It allows a blind person to create a document using a word processor like MS Word
3.) With the help of a screen reader, blind musicians now use audio editing software to record, edit and save their songs for example
Disadvantages:
1.) Because visually impaired people only listen to a screen reader reading the text displayed on the screen, they don’t usually have the chance to know the correct spelling of a certain word especially when it’s not that common like medical terms etc. Sure they can make a screen reader to read character by character after they hear a word that they don’t know the spelling but I find it very time-consuming.
2.) Screen readers use a computer sounding voice and some people find this very boring. Some companies are doing their best to create speech synthesizers that can mimic how humans read a sentence; like the proper intonation, but so far I would say that even we see some big improvements for the past years, they are still far from achieving their goals.
Hope this helped!
Have a supercalifragilisticexpialidocious day!