Which navigation icon would you click on to add a new Contact?
O People
O Calendar
O Mail
O Tasks
An instruction for the computer. Many commands put together to
make up algorithms and computer programs.
1. Repeat
2. Command
3. Bug
Answer:
i think its command but not sure
True or False: The major advantage of Arrays over ArrayLists in Java is the fact that while ArrayLists are fixed in size, an Array can increase or decrease in size as needed.
Answer:
False
Explanation:
It's the other way round actually. Arraylists do not have fixed size and can increase or decrease in size as needed. On the other hand, Arrays are fixed from when they are declared; they have a particular size that number of elements cannot go beyond.
An arraylist in Java is a class that is part of a Java collection framework(java.util) that can have variable sizes and only store objects, not primitive data like strings or integers. An array is a data structure in Java and can store both primitive data and objects, while having a fixed size at declaration.
explain the relevancy of computers in today's global society
Write a program that lets the user enter a charge account number. Be sure to include comments throughout your code where appropriate. The program should determine if the number is valid by checking for it in the following list of valid account number
5658845, 4520125, 7895122, 8777541, 8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877, 1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002
The list of numbers above should be initialized in a single– dimensional array. A simple linear search should be used tolocate the number entered by the user. If the user enters a numberthat is in the array, the program should display a message sayingthat the number is valid. If the user enters a number that is notin the array, the program should display a message indicating thatthe number is invalid.
Answer:
#include <iostream>
using namespace std;
int main(){
int accountnum;
[tex]int\ accountnumbers[18] = \{5658845, 4520125, 7895122, 8777541,[/tex] [tex]8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877,[/tex] [tex]1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002\};[/tex]
cout<<"Account Number: ";
cin>>accountnum;
int arrlength =*(&accountnumbers + 1) - accountnumbers;
int exist = 0;
for(int i =0;i<arrlength;i++){
if(accountnum == accountnumbers[i]){
cout<<"Valid account number";
exist = 1;
break;
}
}
if(exist == 0)
cout<<"Invalid account number";
return 0;
}
Explanation:
The solution is implemented in C++ (See attachment)
This declares user account number as integer
int accountnum;
This initializes the list of account numbers to an array
[tex]int\ accountnumbers[18] = \{5658845, 4520125, 7895122, 8777541,[/tex] [tex]8451277, 1302850, 8080152,4562555, 5552012, 5050552, 7825877,[/tex] [tex]1250255, 1005231, 6545231,3852085, 7576651, 7881200, 4581002\};[/tex]
This prompt user for account number
cout<<"Account Number: ";
Here, user inputs the account number
cin>>accountnum;
This calculates the length of the array
int arrlength =*(&accountnumbers + 1) - accountnumbers;
This initializes a check variable to 0
int exist = 0;
This iterates through the array
for(int i =0;i<arrlength;i++){
This checks for valid account number.
if(accountnum == accountnumbers[i]){
If true, the following message is printed
cout<<"Valid account number";
The check variable is updated to 1, which implies that the account number is valid
exist = 1;
And the loop is terminated
break;
}
}
If the check variable is not updated, then the account number is invalid
if(exist == 0)
cout<<"Invalid account number";
return 0;
Write a method named isVowel that returns whether a String is a vowel (a single-letter string containing a, e, i, o, or u, case-insensitively).public static boolean isVowel(String word){ for(int i=0;i
Answer:
public static boolean isVowel(String word){
for(int i=0;i
char vowels= word.toLowerCase(word.charAt(i));
if (vowels== "a" || vowels == "e" || vowels== "i" || vowels == "o" || vowels == "u" ){
return true;
} else {
return false;
}
}
}
Explanation:
The Java source code analyzes each character in a string object and returns true if it is a vowel letter.
Discuss, in detail, the usefulness of graphics and images in program development. Explain the importance of the interface of a class of objects. Be sure to emphasize the importance of design, color scheme and clarity.
Answer:
Explanation:
The main importance of graphics and images in program development is user experience. These graphics, color schemes, clarity, images etc. all come together to create a user interface that individuals will be able to easily navigate and use with extreme ease in order to benefit from what the program is intended to do. An interface of a class of objects allows every button and object in the program to grab and share functionality in order for the entire program to run smoothly.
A _____ is a computer that is deliberately set up to be easily hacked into.
Answer:
A Honeypot is a computer that is deliberately set up to be easily hacked into.
Explanation:
Basically, a honeypot is a computer that is meant to be easily hacked into, to attract cybercriminals and hackers. Then, the honeypot collects information about hackers. It's sort of like a trap.
Hope I helped!
algorithm that has been coded into something that can be run by a machine.
1. algorithm
2. event
2. program
_____________________________ focuses on organizing, structuring, and labeling content in an effective and sustainable way.
Question 8 options:
A)Interaction design
B)Interface elements
C)Information architecture
D)Informational components
E)Visual design
You are comparing cryptographic solutions to implement at your organization. Which two items should you focus on when you are evaluating implementation versus algorithm selection
Answer:
effectiveness and efficiency
Explanation:
The two main things that you should focus on are effectiveness and efficiency. When evaluating implementation you need to make sure that what you are thinking of implementing will actually solve the problem that the organization is having, which is the entire reason for implementing the solution in the first place. It needs to be effective as a solution. When selecting the proper algorithm you need to focus more on efficiency, you already know that it will provide the correct solution but now you need to see which solution would be the fastest and therefore most efficient choice.
fill in the blanks the cut and copy commanda are used in combination with the................ command
Answer:
paste command.
Explanation:
The cut and copy commands are used in combination with the paste command. The cut, copy, and paste commands are related commands in human-computer interactions. These commands are interprocess communication in nature, helping to transfer data from one place in the user interface to another place in the user interface.
The cut, copy, and paste commands eliminate monotonous task of creating data which is already present somewhere else in the computer.
Therefore, the correct answer is paste command.
Match the IP Protections Patent, Copyright and Trademark into the following cases:
a. books, poems
b. music, movies, paintings
c. company logo
d. software
e. combinations of materials to make drugs
Answer:
A) copyright
B) copyright
C)Trade mark
D) copyright
E)Patent
Explanation:
Patent can be regarded as a form of intellectual property which helps the owner of an invention to others to sell or use the invention for some period of time. Example of this is a patent that protect microwave oven.
trademark is form of intellectual property, this could be inform of symbols, words that differentiate the product of a party from another. Example of this is a bite of apple that represents apple products.
Copyright can be regarded as a legal right given to those that owns a intellectual property which gives him/her right to copy and exclude others from reaping from where they did not sow. The owner get exclusive right to reproduce the copy.
Below is the match of the intellectual property with the examples.
a. books, poems<> Copyright
b. music, movies, paintings<> Copyright
c. company logo<> Trademark
d. software<>Copyright
e. combinations of materials to make drugs<> patent
Which of the following is NOT one of the four benefits of using email?
Answer:
Can you give choices.
Explanation:
Anyone down to play gta later i play on ps4?
Answer:
ok
Explanation:
user daboi1001001
explain how you can apply the computer in your field of study
Answer:
The computer can be used for international which can help give students useful information
Explanation:
Justify the importance of Computer and internet security system.
Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks. What does Nicole need to do to make the study group more effective?
Answer:
B
Explanation:
She did all of the work so the other students wherent able to do anything
The thing that Nicole needs to do to improve the study group is to involve others and give them tasks.
What is a Study Group?This refers to the collection of persons that forms a group with the aim of learning and revising together.
Hence, we can see that because Nicole does most of the tasks in the study group for the test on plant biology, she would have to involve the other students so they would handle some of the work.
Read more about study groups here:
https://brainly.com/question/23779014
#SPj2
what does it mean if you get the brainlyest ?and why does everyone want it so bad? and how do i give it to someone?
people mark the people who answered their question probably because they were asked to or their answer was what they were looking for and it helped them. and i don't know why people want it so bad, but personally for me i like getting brainliest because i guess it makes me look cool lol. also it's easy, to give brainliest, when you see a crown that's where you mark brainliest. but sometimes brainly doesn't show the crown i don't understand why, but it happens for some people including me.
Unwanted email sent to large groups of people who did not request the communication is called _____
Desired
Funmail
Returned
Spam
Which of the following would you use to search a table in excel?
Decenter
Merge
Find and select
Clear rules
Ask the user for two numbers. Print only the even numbers between them. You should also print the two numbers if they are even.
I've included the code in the picture below.
What is another word for: a location in memory that contains a value? A. integer B. Boolean C. variable D. float PLEASE HELP URGENT
Answer:
A
Explanation:
Integer because it contains digits that can undergo calculation within the memory
In order to move the file C:\Data\CustData.txt to C:\BackUp\CustData.txt in a VBScript program, which of the following command would be used( fso is a Scripting.FileSystemObject).
a. fso.MoveFile("C:\Data\CustData.txt","C:\BackUp\CustData.txt")
b. fso.MoveFile("C:\BackUp\CustData.txt", "C:\Data\CustData.txt")
c. fso.FileMove("C:\Data\CustData.txt","C:\BackUp\CustData.txt")
d. fso.FileMove("C:\BackUp\CustData.txt", "C:\Data\CustData.txt")
Answer:
fso.MoveFile("C:\Data\CustData.txt","C:\BackUp\CustData.txt")
Explanation:
Given
Source = C:\Data\CustData.txt
Destination = C:\BackUp\CustData.txt
Required
Code snippet to move file between directories using VScript
First, we need to write out the syntax.
The syntax to implement this is:
fso.MoveFile(Source Path, Destination Path)
The above line of code instructs the system to move the file from its source directory to its destination.
Note that the source path and destination path must include the full directories and the file extensions
In this case, the correct code is:
fso.MoveFile("C:\Data\CustData.txt","C:\BackUp\CustData.txt")
what is one reason you might want to change your document's margins
1. to change from portrait to landscape view
2. to split it into two columns
3. to decrease the font size
4. to adjust the amount of white space on document
Answer:
1. If there is a big table or picture needed to show in a single paper.
2. For showing differences between two things.
3. To have more words to fit in a paper
Explanation:
QUICK which statement about copyright is not correct
1. you must file the paperwork to own the copyright
2. you do not need permission when you create a hyperlink that links to another website.
Answer:
2. you do not need permission when you create a hyperlink that links to another website.
Explanation:
Why is it important to ensure that DNS Servers have been secured before implementing an e-mail system
Answer:
b. E-mail relies upon DNS MX records to identify hosts that are responsible for e-mail transmission.
Explanation:
It is important to ensure that Domain Name Servers have been secured before implementing an e-mail system because E-mail relies upon DNS MX records to identify hosts that are responsible for e-mail transmission.
In other word, this helps the DNS MX determines the mail server accountable for receiving email messages on behalf of a domain name.
Order the steps to use a logical argument as a rule type.
(Click New Rule.)
(Use a formula to determine)
(Click Conditional Formatting)
(Click the Home tab, then click )
(the Styles group)
Answer:
Click home tab, click conditional formatting, click new rule, use formula to determine
Answer:
1. Home Tab
2. Conditional Formatting
3. New Rule
4. Formula
Explanation:
Just did it on Edge 2021
Plz click the Thanks button!
<Jayla>
Given the message size of 16Kb, packet size of 2Kb, speed of 4Kbps over 3 links, how much time, will it take the message to travel from the source to the destination considering there are no packet delays?
Answer:
5 seconds
Explanation:
Given that :
Message size = 16kb
Packet size = 2kb
Speed = 4kbps
Number of links = 3
The time taken is calculated using the formula :
[Number of packets + (Number of links - 1)] * (packet size / speed)
Number of packets = message size / packet size
Number of packets = 16kb / 2 kb = 8
Hence,
[Number of packets + (Number of links - 1)] * (packet size / speed)
(8 + (3 - 1)) * (2 / 4)
(8 + 2) * (1 /2)
10 * 1/2
= 5 seconds
Which sorting algorithm is LEAST efficient when performed on an array in which the values are already in the desired sorted order
Answer:
Merge sort
Explanation:
The various types of sorting algorithms are
1. Quick sort
2. Bubble sort
3. Selection sort
4. Insertion sort
5. Merge sort
6. Heapsort
The algorithm that performs best for an already sorted list is the insertion sort
While the algorithm that performs worse for an already sorted list is the merge sort since it divides the sorted list into sub list before it operations