What is needed to highly secure a system?* Select one Lots of time is needed to highly secure a system More money is needed to highly secure a system A system update is needed to highly secure a system A disabled administrator account is needed to highly secure a system

Answers

Answer 1

Cash is spent on security. Generally speaking, the more money you invest, the more safe your data or resources will indeed be computer systems.

By maintenance costs, what do you mean?

Any costs made by an individual or corporation to maintain their assets in good operating order are referred to as maintenance expenses. These expenses could go toward general upkeep, such as installing antivirus software on computer systems, or they could be used toward repairs, like mending a vehicle or piece of machinery.

When may you request security for fees?

The guidelines give the court the authority to require a claimant to provide security for costs when there is a high likelihood that, in the event of a defendant's victory, it will be unfair for it to have to defend the action without having a realistic chance of being able to recoup its expenses.

To know more about  computer systems visit:

https://brainly.com/question/30146762

#SPJ4

Answer 2
Final answer:

Securing a system requires not just one but a combination of actions; these include regular system updates, sensible financial investments in security tools, efficient time allocation for security upkeep, and potentially disabling the administrator account. However, this must be bolstered with strong password policies, multi-factor authentication, and user education.

Explanation:

The question of 'What is needed to highly secure a system?' carries different answers considering the varied aspects of system security. However, collectively, none of the options provided exclusively ensure a highly secure system. It requires a holistic approach involving regular system updates to patch vulnerabilities, prudent financial investment in reliable security tools, and efficient time management to maintain the security systems. Moreover, a disabled administrator account can enhance security, but it's best used in combination with other security measures such as strong password policies, multi-factor authentication, and user education.

Learn more about System Security here:

https://brainly.com/question/34700528

#SPJ6


Related Questions

For a single-frequency sine wave modulating signal of 3 khz with a carrier frequency of 30 khz, what is the spacing between sidebands?.

Answers

The spacing between sidebands would be 6 kHz. In physics and engineering, the term "frequency" refers to the number of occurrences of a repeating event per unit of time.

Frequency is typically measured in hertz (Hz), which is the number of cycles or occurrences per second. For example, a frequency of 1 Hz means that an event is happening once per second, while a frequency of 2 Hz means that the event is happening twice per second.

In a single-frequency sine wave modulating signal, the sidebands are located at the sum and difference frequencies of the carrier frequency and the modulating frequency.

For a carrier frequency of 30 kHz and a modulating frequency of 3 kHz, the upper sideband will be located at:

30 kHz + 3 kHz = 33 kHz

And the lower sideband will be located at:

30 kHz - 3 kHz = 27 kHz.

The spacing between sidebands is the difference between the frequency of the upper sideband and the frequency of the lower sideband. In this case, the spacing between sidebands is:

33 kHz - 27 kHz = 6 kHz.

Learn more about frequency here, https://brainly.com/question/5102661

#SPJ4

How do I do this in Access? Please list all steps in detail.

Create a new relationship between the EmployeeID field in the Professor table and the Advisor field in the Student table. Ensure that values in the Advisor field have a corresponding value in the EmployeeID field.

Answers

The Access database with the relationships you want to print should be opened. Choose Relationships from the Database Tools tab. Select Relationship Report from the Tools category on the Design tab. In Print Preview mode, a report that shows the Relationships pane opens.

In Access 2010, how do I construct a relationship?

By clicking and dragging the shared field from one table and dropping it on top of the common field in the associated table, Access will construct a relationship between the two common table fields based on the values in the common field.

What is a relationship, and how do you establish one using tables?

Click Relationships in the Relationships group under the Database Tools tab.

To know more about database visit:-

https://brainly.com/question/28391263

#SPJ4

you can set play options for a video clip with buttons in the video options group on the ____ tab.

Answers

The buttons in the video settings group on the Playback tab can be used to customize how a video clip plays.

How do I get a video to play in PowerPoint?

Click the slide's video in Normal view. Click the Playback tab under Video Tools. Click the down arrow next to Start, then choose Automatically. in Slide Show View while you deliver your presentation.

After applying an animation What is the initial setting for the animation?

Begin Upon Click ( ) Clicking the mouse will initiate the animation effect. The default setting is this. Prior To Beginning (no icon) When the preceding effect commences, the animation effect will follow. This enables you to combine numerous effects such that they operate concurrently as one effect.

To know more about Playback tab visit:-

https://brainly.com/question/29805646

#SPJ4

The ____ suite was not created by a standards-making organization but by a group of computer scientists.
a.OSI model
c.OSI model
b.FTP protocol
d.TCP/IP protocol

Answers

The ​TCP/IP protocol suite suite was not created by a standards-making organization but by a group of computer scientists.

Are the machines that house shared and private user files as well as network software?

Computers known as servers house the network operating system, shared files, and programs.All network users have access to the network's resources through servers.

Which of the subsequent is utilized to link your computer to other computers Mcq?

Notes:Patch cable is another name for straight-through cable.Computers as well as other end customer devices are connected to networking hubs and switches via straight-through wire.

To know more about TCP/IP protocol visit:

https://brainly.com/question/30114641

#SPJ4

prina is a database manager. prina is allowed to add new users to the database, remove current users and create new usage functions for the users. prina is not allowed to read the data in the fields of the database itself. this is an example of: (d3, l3.3.1)

Answers

Prina is not allowed to read the data in the fields of the database itself. this is an example of role-based access controls (RBAC).

What is role-based access control?

Role-based access control, often known as role-based security, is a method for only allowing authorized users to access a system. It is a method for implementing either mandatory or optional access controls. The method of limiting network access based on the responsibilities of certain users within a business is known as role-based access control (RBAC).

Employees cannot access information that does not concern them since RBAC ensures that they only have access to the data necessary to do their duties. The permissions required to carry out specific duties within an organization are often reflected by role permissions, which may be passed down through a role hierarchy.

To learn more about access controls, visit:

https://brainly.com/question/14014672

#SPJ4

To use a single image to access multiple target, you must set up ____ within the image.
a) hotspots
b) links
c) icons
d) alt tags

Answers

The correct answer is c) icons To use a single image to access multiple target.

An icon in today's context is a picture on a computer screen that stands in for a programme, a feature, or another idea or distinct entity that has value for the user. A typeface that only includes icon glyphs—not alphanumeric glyphs—is called an icon font. Examples include Material Symbols, a variable typeface that enables fine-tuning via variable axes, and Material Icons, both of which are icon fonts. a visual representation of an application, an item (like a file), or a function (like the save command) on a computer display screen: a symbol or word (for example) whose shape communicates its meaning. archaic: a depiction that is often visual.

To learn more about icons click the link below:

brainly.com/question/14593142

#SPJ4

A application gateway is also known as a(n) ____________.
A. Application proxy
B. Host proxy
C. Circuit-level gateway
D. Domain gateway

Answers

Additionally referred to as an application proxy, an application gateway.

A is the proper answer.

What else do you call a gateway for applications?

Proxy servers, often referred to as application gateways or proxy servers, operate similarly to packet filters in that they look at the destination of the packets as well as the kind of data they include.

An application gateway is what?

The use of the same logon information and techniques to access traditional web applications stored in corporate data centres as they do for mobile apps and cloud services is known as an app gateway, which is a type of enterprise security solution.

To know more about Application proxy visit:-

https://brainly.com/question/13827808

#SPJ4

Is a string function that returns the number of characters in a string value. CONCAT LENGTH SUBSTRING UCASE

Answers

LENGTH  Is string function that returns the number of characters in a string value.

What does a string's length return?

length() function. A method that can be used with string objects is the Java String length() method. The length() method displays the total number of characters in the string.

length (): What does it mean?

length() The String class has a static function called length(). A string object's length, or the number of characters stored in an object, is returned by the length() function. Because the length of a string can be changed using different operations on an object, the String class employs this technique.

To know more about string function visit:-

https://brainly.com/question/16203207

#SPJ4

You work for a small printing company that has 75 workstations. Most of them run standard office applications such as word processing, spreadsheets, and accounting programs. Fifteen of the workstations are constantly processing huge graphics files and then sending print jobs to industrial-sized laser printers. You have now migrated your network to Windows 10 and into Windows Server 2016 and have decided to take advantage of the routing capability built into Windows Server 2016. You choose that appropriate server and place tow NICs in the machine, but you realize that you have only one network address, 201.102.34.0, which you obtained years ago. How should you subnet this address to segment the bandwidth hogs from the rest of the network while giving everyone access to the entire network

Answers

255.255.255.19, A class C network would have a subnet mask of indicating that the network is constructed using 24 bits. This is indicated by adding a /24 to the end of the IP address in the CIDR notation.

What kind of encryption works the best?

AES. The U.S. Government and several organizations trust the Advanced Encryption Standard (AES) algorithm as the industry standard. Despite being quite effective in 128-bit form, AES also employs keys of 192 and 256 bits for use in heavy-duty encryption.

Which is more effective, RSA or AES?

A more precise and elegant encryption technique is the Advance Encryption Standard (AES) cipher text method. The Data Encryption Standard (DES) and RSA algorithms are outperformed by the AES algorithm, according to test results and the text files used.

to know more about IP addresses here:

brainly.com/question/16011753

#SPJ4

Automating workflow can improve which of the following? (select all that apply)O Defining how information flows from one step to the next O Reporting on how well each person performed his/her step in the process O Defining who is responsible for what O Defining the sequence of tasks to be performed

Answers

Automating workflow can improve A: "Defining how information flows from the one step to the next, C: "Defining who is responsible for what, and D: "Defining the sequence of tasks to be performed".

Workflow Automation is described as the design, execution, deployment and automation of business processes according to predefined rules where work tasks are automatically triggered and routed between technology, data and  people. Using automating workflow mechanism, businesses can reduce error rates as well can save time to accomplish tasks.

You can learn more about automating workflow at

https://brainly.com/question/29525249

#SPJ4

spreading insults and rumors by means of e-mails, text messages, or web postings is called:

Answers

The use of technology to annoy, threaten, humiliate, or target another person is known as cyberbullying. Threats made online and cruel, violent, or nasty texts, tweets, postings, or communications all count.

What term describes the capacity to start with particulars, such as a collection of facts, and then draw broad generalizations?

Inductive reasoning starts with observations that are narrowly focused and specialized before moving on to a generalized conclusion that is plausible but uncertain in the context of the body of supporting data.

Which of the following best characterizes the plan that establishes a company's social media objectives?

The organization's goal and guiding principles are discussed in the strategic plan. Goals and objectives for the social media plan are decided upon by the strategic plan.

To know more about cyberbullying visit :-

https://brainly.com/question/8142675

#SPJ4

the most likely reason that an organization should not consider using the cloud is ______. A.
the organization wants to wait for the cloud to mature
B.
the organization is not technically sophisticated
C.
the organization is legally prohibited from losing physical control over its data
D.
the organization faces too much competition in its industry segment
E.
the organization feels the clouds benefits are unclear
C
Which of t

Answers

The most likely justification for a company not using the cloud web is that it is forbidden by law to relinquish physical custody of its data.

Which of the following attributes of the cloud is a disadvantage?

One of the most significant possible drawbacks of utilizing cloud computing is downtime. Technical issues that affect cloud providers occasionally may arise for a variety of reasons, including power outages, poor Internet connectivity, the need for maintenance at data centers, etc.

What is the most accurate definition of cloud computing?

Utilizing hosted services over the internet, such as servers, databases, networking, and software, is referred to as cloud computing. since the advent of cloud computing.

To know more about cloud web visit :-

https://brainly.com/question/9759640

#SPJ4

Grant has a mechanical engineering degree and he works for a large automobile manufacturer. When one of the robotic installers has issues, grant is there to problem solve and get things up and running. Grant's career falls in the _____ pathway of the manufacturing career cluster.

Answers

Since it states "robotic installers," which implies that he is performing instals, I would choose maintenance, installation, and repair.

You're beginning from scratch: Robots have not yet been developed. You're considering automation but are unsure of which jobs to automate. It can be challenging to determine early on whether a specific activity can or should be automated. When implementing a new robot system in this circumstance, there are tools available to provide you peace of mind. Planning, creating, and installing robotic systems are frequently the responsibilities of a specialist engineering company called Robotic System Integrator (robot SIer). In general, the SIer functions as a conduit between the user and the robot maker and directs users to the system installation. Kawasaki is a reputable robot manufacturer that is capable of acting as a robot system.

Learn more about Installation here:

https://brainly.com/question/14356368

#SPJ4

Answer:

Maintenance, Installation, and Repair.

Explanation:

I took the test

Assume s is " abc ", the method __________ returns a new string "abc".
A. s.trim(s)
B. trim(s)
C. String.trim(s)
D. s.trim()

Answers

D. s.trim(). Assume s is " abc ", the method s.trim() returns a new string "abc".

Which one of the following describes how a wrapper object is directly given a value of a primitive data type?

Autoboxing is the process of transforming a primitive variable into such an object of a relevant wrapper class.Changing an int to the Integer class, for instance.

What distinguishes string from new string?

There is no distinction.We're at it again, oh no.Integer str = "Hello"; establishes a pointer ('str') to an already-existing given string with the text "Hello" that the compiler built in the constant pool.

To know more about string visit:

https://brainly.com/question/30099412

#SPJ4

Which task should be easier? Keeping an image of a block letter ""F"" in your mind AND:
a) "saying ""yes"" for each corner that is an inside corner and ""no"" for each corner that is an outside corner?"
b) "pointing to the letter ""Y"" for each inside corner and ""N"" for each outside corner?"
c) "saying ""no"" for each corner that is an inside corner and ""yes"" for each corner that is an outside corner?"
d) "pointing to the letter ""N"" for each inside corner and ""Y"" for each outside corner?"

Answers

stating "yes" for every corner that is an inner corner and "no" for every corner that is an outer corner.

What is the purpose of working memory?

Working memory is the ability to store a small amount of information in a convenient fashion. It facilitates planning, comprehension, thought, and problem-solving.

Which memory serves as the system's working memory?

Even though the terms working memory and short-term memory are frequently used interchangeably, some theorists contend that the two memory types are distinct from one another because working memory permits the manipulation of information that has been stored while short-term memory only refers to the temporary storing of information.

To know more about outside corner visit:-

https://brainly.com/question/13243991

#SPJ4

if active cell d12 contains the formula =d10+d11, cells d10 and d11 are _______ cells for d12.

Answers

The predecessor cells for active cell d12 are d10 and d11 if active cell d12 contains the formula =d10+d11.

What occurs to the formula's cell references when you transfer it from cell A10 to cell B10?

To reflect the changed position of the formula, Excel modifies the cell references in the copied formula.

Which equation should you use to sum the values in cells A3 and A10?

Although the SUM function is more user-friendly when working with many numbers, you may sum the values in a range (a collection of cells) using a straightforward formula. For instance, =SUM(A2:A6) is less prone to typos than =A2+A3+A4+A5+A6.

To know more about predecessor cells visit :-

https://brainly.com/question/30034909

#SPJ4

A ____ represents a picture or sketch of a screen the user will see when running a program.a.frameworkb.wireframec.sketch-upd.page frame

Answers

A wireframe is a representation of a screen that a user will view while a programme is being performed. A framework, a wireframe, a sketch-up, and a page frame.

What is a wireframe, then? Let's begin with the obvious question.

A wireframe is the two-dimensional skeletal outline of a webpage or app, analogous to an architectural plan. Wireframes give a detailed picture of the page's layout, information architecture, user flow, functionality, and desired behaviours. The styling, colour, and graphics in a wireframe are limited to a minimum because they often depict the basic product concept.

Depending on how much information is needed, wireframes can either be digitally or manually constructed.

Most frequently, UX designers utilise the technique of wireframing. Prior to the developers writing the interface's code, this procedure enables all parties involved to agree on where the information will be stored.

Learn more about Wireframe here:

https://brainly.com/question/28694672

#SPJ4

one major problem affecting supply chains are ripple effects referred to as the ________ effect.

Answers

one major problem affecting supply chains are ripple effects referred to as the multiplier effect.

Which one of the above is a significant issue that might have an impact on supply chains?

The multiplier effect, often known as ripple effects, is a significant issue that affects supply networks.The collaboration of suppliers, the manufacturing of goods and services, and distribution are all improved by supply chain management.

What is the ripple effect of distorted product demand information?

From one end of the a supply chain from the other, distorted information can cause significant inefficiencies, including unnecessary inventory investment, subpar customer service, lost sales, incorrect capacity planning, inefficient transportation, and missing production schedules.

To know more about multiplier effect visit:

https://brainly.com/question/1412014

#SPJ4

raw data must be properly ____________________ for storage, processing and presentation. T/F

Answers

Raw data must be properly  formatted  for storage, processing and presentation. false

What is it called when raw data is processed and made useful?

The term "cooked data" can refer to raw data that has undergone processing. Although raw data has the potential to become "information," it first needs to be organized, selectively extracted from, occasionally analysed, and formatted for presentation.

What sort of raw data would that be?

a list of all purchases made within a month at a particular store, without any further organization or analysis. Every frame captured overnight by a security camera. grades for a quarter for each kid in a school district. an inventory of all the movies that the streaming service offers.

To know more about  formatted visit:-

https://brainly.com/question/14991834

#SPJ4

the expression =sum([invoiceamt]) might be found in which type of control added to a form?

Answers

It's possible to find the expression =sum([invoiceamt]) in the Calculated control that was added to a form. Unbound controls that display arithmetic computations on a form are known as calculated controls.

Calculated controls are used to display a calculation's output on forms and reports in Access databases. For instance, if your report shows the quantity sold and the cost per unit, you may include a calculated text box that multiplies the two values to provide the overall cost. An expression that multiplies two fields is found in the Control Source attribute of the computed text box.

To create a calculated control the following steps should be followed:

1) Click Design View from the context menu when you right-click the form or report in the Navigation Pane.

2) Select the tool for the sort of control you wish to create on the Design tab's Controls group. See the section Learn which types of controls can be used as calculated controls for a list of control types that can be used in this way.

3) Place the pointer on the area of the form or report where you want the control to appear, and then click to insert the control.

4) To end a control wizard if one appears, click Cancel.

5) After choosing the control, enter F4 to show the control's property sheet, and then enter a control source expression in the box provided. Click next to the Control Source property box to open the expression builder.

6) Change to Form view or Report view and ensure the calculated control behaves as you want.

Learn more about Navigation Pane

brainly.com/question/14966390

#SPJ4

in python, the ________ symbol is used as the not-equal-to operator.

Answers

Python's!= Not Equal operator returns false when the values being compared are not identical. The not equal operator is denoted by the symbol!=.

What does the Python not operator mean?

Boolean expressions and objects can have their truth values reversed using Python's not operator. This operator can be used in boolean settings like while loops and if expressions. You can flip your variables' truth values because it also functions in non-Boolean circumstances.

The and in Python: How to Use It?

Expression1 and Expression2 are both subexpressions, and if both of them evaluate to True, then the compound expression is True. The outcome is False if at least one subexpression has a False evaluation.

To know more about Not Equal operator visit :-

https://brainly.com/question/28192577

#SPJ4

---UNIX--
Which of the following regular expressions will NOT match any part of the following line;
The ASU Solution center can be reached 24/7 at; 1(855) 278-5080
O .+
O ([0-8]+)
O ([0-9]{3}) [0-9]{3}-[0-9]{3}
O [0-9\(\)\- ]+

Answers

The regular expression that will not match any part of the following line; is  ([0-9]{3}) [0-9]{3}-[0-9]{3}. The correct option is C.

What is coding?

Coding, often known as computer programming, is the method through which we connect with computers.

Code informs a machine what to do, and writing code is similar to writing a set of instructions. You can teach computers what to do or how to behave considerably more quickly if you learn to write code.

The reason behind it is as follows:

It requires {3} to match the three preceding codes, which is not in the case.

Hence, the regular expression won't match any part of the given line.

Therefore, the correct option is C. ([0-9]{3}) [0-9]{3}-[0-9]{3}.

To learn more about coding, refer to the link:

https://brainly.com/question/13096462

#SPJ1

Contact sheets are totally useless in planning your photography show as they are really a thing of the past.


True


False

Answers

Contact sheets are totally useless in planning your photography show as they are really a thing of the past is False.

What are Contact sheets?

Contact sheets are still widely used by photographers and curators as a reference and planning tool to help organize and review the images that will be included in an exhibition.

They tend to provide a convenient way to view thumbnails of all of the images at once, which can help to identify any gaps or weaknesses in the selection, as well as to plan the overall layout and flow of the show.

Therefore, while technology has made it easier to view images digitally and to create digital versions of contact sheets, the basic concept of a contact sheet remains relevant and useful for photographers and curators.

Learn more about Contact sheets  from

https://brainly.com/question/29761738

#SPJ1

Which tool is inserted into a lock shackle and struck with a maul or flat-head ax until the padlock shackles break

Answers

a lock shackle and struck with a maul or flat-head ax until the padlock shackles break inserting tool is Duck billed lock breaker.

what is lock shackle and padlock shackle break?

The shackle or shank is the U-shaped bar that loops round from, and back into, the padlock body. This is the most exposed part of the padlock and more susceptible to be attacked. Once again, as the overall size of the padlock increases, the larger the shackle can be making it more secure.

4 way to break a lock:

Pull up on the shackle to create tension. The simplest way to do this is to insert two fingers into the shackle loop and use them to force the shackle away from the top of the lock. This will put the locking pins inside the lock into the right position for a quick crack-job.Tap the side of the lock with a hammer or similar tool repeatedly. More specifically, you want to target the side that contains the fixed end of the shackle, as the pins are located just underneath. Pound the lock over and over again using quick, short strikes. Eventually, you’ll disengage enough of the pins to “bump” the lock open.Reuse your lock when you’re finished. The best part about coaxing a padlock open with a hammer is that it should still work like nothing ever happened afterwards, so long as you don’t hit it hard enough to damage any of the pins. As soon as you get done breaking your lock, give it a test run. If it fastens properly, hold onto it for future usage. If not, chuck it in the trash.Fish out both halves of the shackle to remove the lock. Now that you’ve successfully snapped the shackle, all you have to do is pull out the broken pieces. You may need to twist or jiggle them a few times to get them to come free, as the ends will still be secured in the locking mechanisms inside the lock.

To learn more about padlock shackles break refers to;

https://brainly.com/question/10755015

#SPJ4

to change an inline object to a floating object, you need to _______.

Answers

Then, choose "Inline (moves with text)" or "Floating (doesn't move with text)" from the menus after selecting the floating or inline object you wish to convert.

Is inline all one word?

These words are the same as their alternate spellings in the adjective sense. According to my experience, the one without a hyphen is more frequent in computer-related scenarios, such as "an inline function," but the one with a hyphen is more frequent in mechanical or manufacturing situations, such as "in-line manufacturing" and "in-line engine." The term "programming" and its associated meanings now apply to a variety of elements and entities that may be defined separately and used elsewhere rather than being inserted where they are not required.

Know more about compare an convert Visit:

https://brainly.com/question/29497540

#SPJ4

This class represents a piñata. If you aren't familiar with piñatas, according to Wikipedia, a piñata is a shape or animal made out of paper mache and is filled with candy or toys. People take turns trying to break open the piñata while wearing a blindfold! The class only has a constructor without parameters. Your job is to add three more constructors so the user can design their own pinatas: 1. A constructor that allows users to customize all the instance variables. 2. A constructor that allows users to customize the color and the shape. 3. A constructor that allows users to customize the candy. You can see the descriptions in the Pinata class. You can also see how the constructors should be able to be used in Pinatatester.java. Note: The additional constructors will take values as formal parameters. You do not need to prompt the user for these values. After you make the constructors, you should be able to run your program without changing code in PinataTester.java. In the constructors, use the default values given in the default constructors to fill in any values that were not passed as parameters. Pinata Source: https://en.wikipedia org/wiki PC3%Blata Status: Not Submitted 2.3.8: Custom Piñatas Save Submit Continue 1 public class Pinata 2-1 FILES N N 00 OM 3 4 5 6 Pinata java // Instance variables private String candy: // what kind of candy is inside private String color; private String shape; // Constructor without parameters public Pinata() { candy "hard candy": color - "rainbow": shape - "donkey": D Pinotalester java 10- 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 20 27 28 29 1/constructor 1 to customize all of instance variable public Pinata(String candy, String color, String shape) this.candy candy: this color-color this shape shape; constructor 2 to customize color and shape publi Pinata (string color Stringshape) this candy-new candy" the color color Status: Not Submitted 2.3.8: Custom Piñatas Save Submit Continue this.color = colors this. shape - shape; } FILES //constructor 3 to customize candy public Pinata (String candy) Pinata java Pinata Testet java 29 38 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 this.candy - candy: this.color "white": this.shape - "monkey": 47 48 49 5e 51 52 52 11 Add an overloaded constructor that allows the user W to customize all of the instance variables 77 Add an overloaded constructor that allows the user W to customize the color and shape // Add an overloaded constructor that allows the user to customize the candy public String toStringtoString() 55 56 return color + Shape pinata filled with " + candy: 57 Status: Not Submitted 2.3.8: Custom Piñatas Save Submit Continue 2 3-1 FILES 4 1 import java.util.Scanner; 2 public class Pinatatester public static void main(String[] args) 5 //TODO Auto-generated method stub 7 Scanner input; 9 input-new Scanner(System.in); String candy, color, shape; 6 8 Pinata java D PinatoTester java 10 11 12 13 14 15 16 17 18 19 20 21 22 W/ Make Pinatas! Pinata p. new pinata(): ///constructor without parameters call Pinata new Pinata(candy, color, shape); //constructor 1 call Pinata p2 = new Pinata(color, shape); //constructor 2 call Pinata p = new Pinata(candy)://constructor 3 call Print the pinatas System.out.println("Enter the candy type) candy-Input next; System.out.println("Enter the color type"); color input.next(); system.out.println("Enter the shape"); shape-Input.next() 24 25 26 27 28 29 Test Cases ✓ Check Code Expand All Minimize All Test Pass Message Test results will show here. Errors: PinataTester.java: Line 15: variable candy might not have been initialized PinataTester.java: Line 15: variable color might not have been initialized PinataTester.java: Line 15: variable shape might not have been initialized

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that is to add three more constructors so the user can design their own pinatas.

Writting the code:

public class Pinata

{

   // Instance variables

   private String candy; // what kind of candy is inside

   private String color;

   private String shape;

   // Constructor without parameters

   public Pinata()

   {

       candy = "hard candy";

       color = "rainbow";

       shape = "donkey";

   }

   // Add an overloaded constructor that allows the user

   // to customize all the instance variables

   public Pinata(String Candy, String Color, String Shape)

   {

       candy = Candy;

       color = Color;

       shape = Shape;

   }

   // Add an overloaded constructor that allows the user

   // to customize the color and shape

   public Pinata(String Color,String Shape)

   {

       color = Color;

       shape = Shape;

   }

   // Add an overloaded constructor that allows the user

   // to customize the candy

   public Pinata(String Candy)

   {

       candy = Candy;

   }

   public String toString()

   {

       return color + " " + shape + " pinata filled with " + candy;

   }

}

See more about JAVA at brainly.com/question/29897053

#SPJ1

development of software is not a frequent user support function"" is an example of ____.

Answers

development of software is not a frequent user support function"" is an example of nominalization.

Which of these documentation types frequently includes links to related subjects?

The hypertext system allows for the connecting of similar text documents by a number of different persons. It is possible to "hyperlink" any word or phrase in a hypertext document to information about it that is either existing in the same document or in another document.

What are the sorts of source documents?

Companies may also utilize a source document as evidence in negotiations with business partners, typically in connection with payments. Cancelled checks, credit memos, deposit slips, expense reports, invoices, material requisition forms, purchase orders, time sheets, and sales receipts are a few examples of source documents.

To know more about software visit:-

https://brainly.com/question/29852139

#SPJ4

when you use the ____ function, you can use the asterisk (*) to represent any column.

Answers

The asterisk (*) can be used to represent any column when using the COUNT function.

An asterisk (*) in a SELECT statement's SELECT clause denotes what.

Asterisk notation All columns of the table or tables listed in the FROM clause are denoted by an asterisk (*). All columns from all tables are included in the FROM clause when an asterisk is not prefixed with a table name; however, when it is

Which operator has the definition of inclusive?

The bit pattern of the value produced by the | (bitwise inclusive OR) operator reveals which bits in each operand have the value 1. This operator compares the values of each operand. The result of that bit is 0 if both bits are 0, otherwise it is

To know more about COUNT function visit :-

https://brainly.com/question/28272296

#SPJ4

Digital audio is stored in a variety of file formats, including ___________. A. WMA B. WAV C. MP3 D. all of the aboveTerm

Answers

Digital audio is stored in a variety of file formats, including MP3 files.

What are MP3 files?

Techniques for video data compression were developed by the Moving Picture Experts Group (MPEG).

For example, MPEG compression is used to reduce the amount of video and movie data that is transmitted for HDTV broadcasts, DSS satellite systems, and DVD movies.

Audio is compressed using the MPEG Audio Layer-3 subsystem of the MPEG compression system. It is known to us by the abbreviation MP3.

The MP3 format allows for music to be compressed by a factor of 10 or 12 while still coming near to CD quality. In MP3, a CD's audio file that is 30 megabytes in size takes up only roughly 3 megabytes.

When you download and play the MP3 file, it practically has the same high-quality audio as the original. An MP3 file could be downloaded and expanded if you so desired.

Hence, Digital audio is stored in a variety of file formats, including MP3 files.

learn more about MP3 files click here:

https://brainly.com/question/1623465

#SPJ4

Question 1 a junior data analyst is seeking out new experiences in order to gain knowledge. They watch videos and read articles about data analytics. They ask experts questions. Which analytical skill are they using?.

Answers

The junior data analyst is using the skill of self-directed learning. They are actively seeking out new experiences, such as watching videos and reading articles, to gain knowledge and improve their skills in data analytics.

Asking questions of experts is also a good way to learn, as it allows the analyst to gain insights and perspectives from people who have more experience in the field. This skill is important for a data analyst because the field is constantly evolving and new tools and techniques are being developed all the time. Being able to teach themselves new skills will help the analyst stay current and be able to handle new challenges that may arise in their work.

Learn more about analytical skill here, https://brainly.com/question/1086200

#SPJ4

Other Questions
E 30 10 Cm X 10 Part A What is the electric flux through the surface shown in the figure? Assume that E=300N/C. Add a nonrestrictiveelement using commas.My brother-keeps taking mythings. How do you set a formal table? Find the value of each variable in each parallelogram. In this excerpt from the poem "Old Ironsides" by Oliver Wendell Holmes, what is the meaning of the word tread?Her deck, once red with heroes' blood Where knelt the vanquished foe, When winds were hurrying o'er the flood And waves were white below, No more shall feel the victor's tread, Or know the conquered knee; What is the most important element in building cardiorespiratory endurance? a. Anaerobic exercise b. Isometric exercise c. Aerobic exercise What was Jesus's full name? As a solid, water floats. This means that Multiple Choice O solid water is less dense than liquid water O organisms in ponds, lakes, and reservoirs can survive under the ice cover O the hydrogen bond arrangement differs between ice and liquid water You are traveling from Minneapolis (3, 19) to Denver (-9, 11). You want to stop at a rest stop at exactly halfway. What are the coordinates of the halfway point? Each of the different colors that make up white light has a different? What should be used to measure the temperature of soup? How do you recover a project that is falling behind schedule which action could you immediately take to get the project back on track? to retrieve data from multiple tables in a query you can use the ____ operator with a subquery. in the northern hemisphere about ________ percent of the surface is land.a. 39b. 13.9c. .039d. 91e. 76 Is social media is safe or not? 1. What is the standard deviation, a, in the heights of tenth grade girls shown in the table below? 01.2076 O 1.4076 O~1.5076 O~1:3076 Heights of Girls (Inches) 64.25 65.50 63.75 64.25 66.50 62.75 What was the result of the Taiping Rebellion ? A man invested $ in a company at the start of January 2020, on which he earns quarterly dividends. At the end of the second, third and fourth quarter in 2021, he earns $100, $115 and $130 respectively.Calculate the total dividends on his investment by the end of 2026.Please help ________ is the study of language in use in specific situations to accomplish goals. Can anyone please help me with this math question for 15 points