Answer:
The devices collects the most information on network activity are:
d. Packet sniffers.
Explanation:
Generally, a packet sniffer is a monitoring device which examines streams of data packets that flow between computers on a network and the larger Internet. One of the best packet sniffers is the Wireshark. As a packet sniffer, the Wireshark is also an analysis tool. It captures network traffic on local networks, storing the obtained data for offline analysis.
Which of the following statements is true when it comes to developing a web presence for a business?
Explanation:
Customers can learn about a business by downloading a mobile app, but they can’t place an order using an app
Building a new website requires a large budget
Using the Internet, search and discuss why naming conventions are important and why programmers should consistently follow them. What problems can arise in naming variables if one convention is not followed.
Answer:
Answered below
Explanation:
Some variable naming conventions include;
1) Variable should begin with either a letter or an underscore.
2) Variables having multiple words should have the first letter of every word after the first word, capitalized. This is the camelCase style.
3) variables should not be named after any of the inbuilt keywords except on special operations to override the original function of such keyword.
4) variable names are case-sensitive.
The importance of following these conventions is to maintain readability and consistency of code. Failure to follow these conventions may lead to chaotic codes, bugs and inefficient performance.
If an insurance policy covers individual losses up to $10,000 and has a deductible of
$500, the insured will be paid how much in the event of a covered loss of $5,000?
Answer: $4500
Explanation:
The deductible is the amount that the insured that is, the policy holder will have to pay. In this case, there is a covered loss of $5000 and the insured has a deductible of $500.
Therefore, the amount that the insured will be paid will be the difference between $5000 and the deductible of $500. This will be:
= $5000 - $500
= $4500
What would be the result of the following calculation in a spreadsheet?
=5+10/5-3*3-1
a. -1
b. -3
c. 1
d. 3
e. 0
answer: B. -3
Answer:
answer a -1
b-3 hi hello who are you
NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which statement best describes a characteristic of a relational database?
It contains tables that are completely independent of one another.
It contains tables with fields that are associated with one another.
It is a feature that is primarily used to navigate databases.
It is a feature that is primarily used to add queries to tables.
The relational database has the characteristic feature of the adjoining of data with one another.
What is a relational database?The relational database is given as the interconnection of the data with the digital database management system.
The relational database is given with the characteristics of the adjoining of data tables and fields associated with one another. Thus, option B is correct.
Learn more about relational database, here:
https://brainly.com/question/13262352
#SPJ2
Review the advantages of database management systems in the Connolly textbook. Which two advantages do you think are the most important
Answer:
The two advantages of database management systems that are the most important are:
1. Data sharing: Database management systems enable data to be shared among users from different locations. It provides access to many users of the data, who can make specific data requests to meet their information needs.
2. Data consistency: Database management systems make it possible for all users to have the same data. It eliminates the problem of inconsistent data for decision making.
Explanation:
Basically, a Database Management System (DBMS) is defined as the software that enables end-users to create, read, update, delete, and access data in each database. Among the most notable advantages of Database Management System (DBMS) are improved data sharing and security, minimized data inconsistency, better data integration, improved data access, improved decision making, and increased end-user productivity.
which of the following is not a type of operating system software?
a) windows b) linux
c)Macintosh d) Communications and organization
Answer:
the answer is communication abd organization
The option that is not a type of operating system software is called; D: Communications and organization
What are the types of Computer operating system?An operating system is defined as a type of software that manages the hardware and software of a computer as well as provision of common services.
The most popular Operating Systems for computers are Windows, Linux, Macintosh. Whereas, the popular types of operating systems for phones are iOS, Android, and Windows.
Read more about Computer Operating System at; https://brainly.com/question/1763761
#SPJ9
What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources
Answer: Trojan horse
Explanation:
Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.
It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.
. Else-if is good selection statement that help us to solve problems in C++,mostly times same problem of same nature can also be solved via switch statement. Which one you prefer to use and why?
Answer:
Else-If statements
Explanation:
Personally, I prefer using Else-If statements for conditional statements since you can start with and If statement and add to it if necessary. Aside from this, Else-If statements also allow you to add more than one condition to be met by using tags such as and or and not. Switch statements are better in scenarios where you have a set of possible inputs or results and need a specific event to happen for each input/result, but this is not as common of a scenario so Else-If is usually my go-to conditional statement.
In the graph shown here, by what percentage are the number of people in computer occupations in general projected to increase?
21%
26%
10%
12%
The number of people in computer occupations in general is projected to increase at 12%
The chartReading the charts, we have the following entries
Software developer applications = 26%Software developer = 21%Computer occupations = 12%Software developers, system software = 10%Using the above entries, we can conclude that:
The number of people in computer occupations in general is projected to increase at 12%
Read more about bar charts at:
https://brainly.com/question/25069221
Choose the type of collection created with each assignment statement
____ collection A = {5:2}
Options: tuple, dictionary, list
____ collection B = (5,2)
Options: tuple, dictionary, list
____ collection C = [5,2]
Options: tuple, dictionary, list
Answer:
dictionary
tuple
list
Explanation:
What is the BCC feature used for?
to format email message text in a custom font
to format email message text in a blind font
to send a courtesy copy of an email to someone who does not need to take action
to send an email to someone without revealing that person’s email address to others on the distribution list
Answer:
to send an email to someone without revealing that person’s email address to others on the distribution list
Explanation:
BAM
To send an email to someone without revealing that person’s email address to others on the distribution list.
What is BCC?
"Blind carbon copy" is referred to as BCC. BCC is a similar method to CC for forwarding copies of an email to additional recipients. When CC is used, a list of recipients is shown; when BCC is used, a list of recipients is not visible.
Because the other receivers won't be able to see that the email has been forwarded to another person, it is known as a blind carbon copy.
Carbon copy is referred to as a "CC" in email communication. When there was no internet or email, you had to sandwich a piece of carbon paper between the paper you were writing on and the paper you wanted to use as your copy in order to make a copy of the letter you were writing.
Therefore, To send an email to someone without revealing that person’s email address to others on the distribution list.
To learn more about BCC, refer to the link:
https://brainly.com/question/29398332
#SPJ6
Write a program that takes a set of numbers and determines which is the smallest. Ask the user for the following information, in this order: A terminating value (real number). The user will enter this value again later, to indicate that he or she is finished providing input. A sequence of real numbers. Keep asking for numbers until the terminating value is entered.
Answer:
This solution is implemented in C++:
#include<iostream>
#include<bits/stdc++.h>
using namespace std;
int main(){
double termnum;
cout<<"Terminating number: ";
cin>>termnum;
double num;
vector<double>numbers;
cout<<"Number: ";
cin>>num;
while(num!=termnum){
numbers.push_back(num);
cout<<"Number: ";
cin>>num;
}
double smallest = numbers.at(0);
for(double x:numbers){
if(x < smallest){
smallest = x;
}
}
cout<<"The smallest is "<<smallest;
return 0;
}
Explanation:
This declares the terminating variable as double
double termnum;
The next italicized lines prompts user for terminating value
cout<<"Terminating number: ";
cin>>termnum;
This declares the user input variable as double
double num;
This declares vector of numbers as double
vector<double>numbers;
The next italicized lines prompts user for number
cout<<"Number: ";
cin>>num;
The following iteration is repeated until the terminating value equals the number supplies by the user
while(num!=termnum){
This pushes the number to a vector
numbers.push_back(num);
The italicized lines prompts user for another number
cout<<"Number: ";
cin>>num;
}
This declares and initializes variable smallest
double smallest = numbers.at(0);
The following for loop determines the smallest of the number set
for(double x:numbers){
if(x < smallest){
smallest = x;
}
}
This prints the smallest of the set
cout<<"The smallest is "<<smallest;
return 0;
Also: See attachment
please help me please help me.
Answer:
dont know man thanks for points tho
but it is 209
Explanation:
A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by
O clicking on the View tab.
O saving a contact.
O creating an appointment.
O flagging an email.
A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.
What is a Variable Expense?Business expenses can be classified as either fixed (invariable) or variable. A fixed expense does not change based on a business’s other activities. Costs like rent and administrative salaries are fixed costs, which remain the same no matter how much a business is producing. Imagine a factory that produces pencils — the cost of renting the factory building will remain the same, month after month, no matter how many pencils the company actually produces.
Variable expense ratio expresses variable expenses as a proportion of a company's sales. To calculate the variable expense ratio, simply divide the company's total variable expenses by the company's total net sales. To express the result as a percentage, simply multiply it by 100.
Therefore, A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.
Learn more about variable expense on:
https://brainly.com/question/13097236
#SPJ5
The default for automatic replies in outlook is what?
Answer:
The default for automatic replies in outlook is turned off, so the user has to turn it on in order to use it.
Out.look is a program developed by Micro.soft for managing e-mails, being together with G.mail one of the most used worldwide. As in most of these programs, you can configure automatic responses in order to give a quick and generic response to certain types of messages (or even all). Now, this option is disabled by default, so the user must activate it through the configuration of the email box.
The default for automatic replies in Outlook is
disabled
It is best to
schedule automatic replies.
Automatic replies may validate your
email to spammers.
Automatic reply rules are for
conditional settings like forwarding a message to a coworker.
Which of the following methods can be used to solve the knapsack problem?
a. Brute Force algorithm
b. Recursion
c. Dynamic programming
d. All of the mentioned
Answer: D. All of those mentioned
Explanation:
The knapsack problem is a problem that typically occurs in combinatorial optimization and is also a 2D dynamic programming example.
We should note that all the methods given in the option such as recursion, brute force algorithm and dynamic programming can all be used to solve knapsack problem.
Therefore, the correct answer is D.
Which example can be used to perform a binary search?
Answer:
In any case, binary search can be used to solve more extensive scope of problem, for example, finding the next smallest or next-biggest element in an array comparative with the target regardless of whether it is present or missing in the array.
Explanation:
In computer science, binary search, otherwise called logarithmic search, is a search calculation that finds the position of an objective incentive inside an arranged array. Binary search compares the target value to the center component of the array. In the event that they are not equivalent, the half in which the value can't lie is dispensed with and the search proceeds on the other half, again taking the center value to contrast with the target value, and continues this until the target value is found. On the off chance that the search ends with the other half being empty, the target value isn't in the array.
Binary search is quicker than linear search aside from small arrays. Nonetheless, the array should be arranged first to have the option to apply binary search. There are particular data structures intended for quick looking, for example, hash tables, that can be looked through more effectively than binary search.
Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outpu
Answer:
Explanation:
The following program is written in Java and is a function that asks the user for an input and keeps doing so until a negative value is entered, in which case it calculates the average and max values and prints it to the screen.
public static void average () {
int num;
int sum = 0;
Scanner in = new Scanner(System.in);
System.out.println("Enter Number");
num = in.nextInt();
int count = 0;
int max = 0;
while(num >= 0)
{
sum+=num;
System.out.println("Enter Number");
num = in.nextInt();
count++;
if(num>=max){
max = num;
}
}
System.out.println(sum/count);
System.out.println(max);
}
Answer:hi
Explanation:
a user reports that her computer monitor will not allow her to switch back and forth between Microsoft word and internet explorer.
Answer: B. Interrupts
Explanation:
Interrupts is a feature of digital computers that enables the interruption of the process the computer is currently engaged in so that the computer can process the new command. Interrupts is the reason I am able to type this answer because interrupts is interrupting my browser to process my typing.
If a user reports that their computer monitor will not allow her or him to switch back and forth between Microsoft Word and Internet Explorer, it is possible that the interrupts function is not working effectively to enable the switch. by interrupting one of the programs.
Answer:
.....................
B. Interrupts
Recently, Walmart offered a wireless data contract based on bandwidth used, with a minimum monthly charge of $42 for up to 5 gigabytes (GB) of use. Additional GB can be purchased at the following rates: $12 for an additional 1 GB, $28 for an additional 3 GB, and $44 for a capacity of 10 GB. What is the cost for a user who is expecting to use 9 GB
Answer:
For 9GB of data the user would pay $82 monthly!
Explanation:
To start off, our end goal is 9GB. We have the equation 9 = ? We can add up to our solutions with 1GB, 3GB, and 10GB. We can immediately rule out 10GB, since 9GB ≠ 10GB. To cost the least amount of money we can add up 3GB and 1GB = 4GB + 5GB = 9GB!
So, our equation is 3GB + 1GB + 5GB = 9GB, now lets figure out the cost!
$28 + $12 + $42 = $82
For 9GB of data the user would pay $82 monthly!
Hope this Helps! :)
Have any questions? Ask below in the comments and I will try my best to answer.
-SGO
The motherboard
allows the different parts of a computer to communicate
helps to keep things cool inside the tower
is the memory of the computer
is where the computer is plugged into an outlet in the wall
Answer:
a:(allows the different parts of a computer to communicate)
Explanation:
The motherboard is the main command center for the whole pc which recieves your inputs and responds by sending outputs...
_______ is a standard protocol used for synchronous communication.
Answer:
TCP/IP
Explanation:
Synchronous communication possesses the clocks on easy transmission as well as receiving devices in a lot more significant ways.
So, synchronous communication usually permits more information to be disseminated over a circuit per unit time.
The standard protocol for this synchronous communication is TCP/IP.
Match the stages of the desktop publishing process with the corresponding actions.
(Design, Setup, Prepress, Printing, and Content)
enter text and images
create an initial outline or draft of the artwork
choose a specific document template with appropriate DTP software
perform the tasks to get the artwork ready for printing
choose either to print or publish the product online
Answer:
Enter text and images - Content
Create an initial outline or draft of the artwork - Design
Choose a specific document template with appropriate DTP software - Setup
Preform the tasks to get the artwork ready for printing - Prepress
Choose either to print or publish the product online - Printing
--------------
Explanation:
What will be the output of the following:
i) 10%2 ii)10**2
Answer:
The output of 10%2 is 0The output of 10**2 is 100Explanation:
We will see the output one by one.
i) 10%2
The statement consists of modulus operator also called as remainder operator. The remainder operator gives the remainder when the first operand is divided by the second operand. The remainder operator only works on integers.
So the output of the statement will be: 0
ii)10**2
The double asterisk is used for exponent. The second operand is the power and the first operand is the base.
So the output will be: 10**2 = 10^2 = 100
Hence,
The output of 10%2 is 0The output of 10**2 is 100When we add suffix L to a integer it is called as __________
Answer:
Long integer literal.
Explanation:
Integer literal can be defined as numbers that do not contain any decimal point or augmented part. An integer literals can be characterized as decimal, octal, or hexadecimal constant. When an integer liteal is added with prefix it tends to define its base, whereas suffix define its type.
The suffix L to an integer literal means long integer literal. The suffix can be written in any form, either upper case (L) or lower case (l).
Therefore, the correct answer is long integer literal.
we need to send 254 kbps over a noiseless channel with a bandwidth of 15 khz. how many signal levels do we need
Answer:
The level of the signal is 353.85
Explanation:
Data rate determines the speed of the data transmission.
The data rate depends on the following factors
The available bandwidthnumbers of signal levelsthe quality of the channel ( Means the level of noise )The data is transmitted either from a noiseless channel or a noisy channel.
The given quality of the channel in the question is noiseless.
Use the following formula to calculate the signal levels
Bit rate = 2 x bandwidth x [tex]Log_{2}[/tex] ( signal level )
where
Transmitted Data = 254 kbps = 254,000 bps
Bandwidth = 15 khz = 15,000 hz
Placing values in the formula
254,000 = 2 x 15,000 x [tex]Log_{2}[/tex] ( L )
254,000 = 30,000 x [tex]Log_{2}[/tex] ( L )
254,000 / 30,000 = [tex]Log_{2}[/tex] ( L )
8.467 = [tex]Log_{2}[/tex] ( L )
L = [tex]2^{8.467}[/tex]
L = 353.85 levels
Complete the getOdds method so it returns a new ArrayList of Integers containing all odd Integers from the parameter ArrayList vals in the order they originally appeared. The contents of vals should not change. For example if an ArrayList containing the Integers 2, 5, 8, 6, 7, 3, 12 in that order is passed as a parameter to getOdds, it should return an ArrayList containing the Integers 5, 7, 3 in that order. Write your getOdds method in the U7_L2_Activity_Three class. Use the runner class to test your method but do not add a main method to your U7_L2_Activity_Three.java file or your code will not be scored correctly.
Answer:
Answered below
Explanation:
//Program is written in Java programming language.
public ArrayList<Integer> getOdds( ArrayList<Integer> list){
// Create variables to hold the new list and the //indexes.
int i;
ArrayList<Integer> oddList = new ArrayList<Integer>()
//Loop over the list and add every odd element // to the new list
for ( i = 0; i < list.length; I++){
if ( list[i] % 2 != 0){
oddsList.add(list[i])
}
}
return oddList;
}
What is a variable?
A.a box (memory location) where you store values
B. a type of memory
C. a value that remains the same throughout a program
D. a value that loads when the program runs
Which are the steps in the process of creating a database
Answer:
Determine the purpose of your database. ...
Find and organize the information required. ...
Divide the information into tables. ...
Turn information items into columns. ...
Specify primary keys. ...
Set up the table relationships. ...
Refine your design. ...
Apply the normalization rules.
Answer:
identifying fieldnames in tables
defining data types for field names
Explanation:
sorry I'm late. future Plato users this is for you