Answer:
Phishing Victim
Explanation:
Replying to this email could make you a victim of a phishing scam. Phishing attacks are common challenges on security that internet users are faced with. It could lead to others getting hold of sensitive information like your password or bank details. email is one way the hackers used to get this information. replying to such an email could lead one to an unsecure website where information could be extracted
Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for loop. Sort the ArrayList using the method Collections.sort. Output the sorted List. Shuffle the list, and output the shuffled list. Note that Collections (with an s) is a class, while Collection is an interface. The Collections class has many useful static methods for processing interfaces, including the sort method. Search for a name in the list that exists; output the location where it was found. Search for a name that is not in the list. What location is reported? Convert the list to an array using toArray. Output the elements of the array. Convert the array back into a list using asList. Output the elements of the list.
Answer:
---------------------------
Explanation:
You are having a problem with your Windows computer that is isolated to a single graphics editing program that you use every day in your work. When you described the problem to the customer service support person for this product, she told you that the only fix for it is to edit a key under HKEY-LOCAL_MACHINE\SOFTWARE. She has assured you that this fix will work without causing any problems, but you are wary of doing this. Descript the steps and precautions taken.
Answer:
I'm not a big tech head but I know that creating a restore point is highly recommended for changing anything that you aren't 100% sure about to your computer.
When implementing a 1:1 relationship, where should you place the foreign key if one side is mandatory and one side is optional? Should the foreign key be mandatory or optional?
Answer:
When implementing a 1:1 relationship, the foreign key should be placed on the optional side if one side is mandatory and one side is optional.
When this is implemented, the foreign key should be made mandatory.
Explanation:
A foreign key (FK) is a primary key (PK) in relational databases. It is used to establish a relationship with a table that has the same attribute with another table in the database. A mandatory relationship exists when the foreign key depends on the parent (primary key) and cannot exist without the parent. A one-to-one relationship exists when one row in a data table may be linked with only one row in another data table.
Define a class named Point with two data fields x and y to represent a point's x- and y-coordinates. Implement the Comparable interface for the comparing the points on x-coordinates. If two points have the same x-coordinates, compare their y-coordinates. Define a class named CompareY that implements Comparator. Implement the compare method to compare two points on their y-coordinates. If two points have the same y-coordinates, compare their x-coordinates. Randomly create 100 points and apply the Arrays.sort method to display the points in increasing order of their x-coordinates, and increasing order of their y-coordinates, respectively.
Answer:
Here the code is given in java as follows,
Select the correct statement(s) regarding 4B5B encoding.
a. 4B5B is used to map four codeword bits into a five bit data word
b. 4B5B information bit rate is 80% of the total (information plus overhead) bit rate
c. 4B5B information bit rate is 20% of the total (information plus overhead) bit rate
d. all statements are correct
Answer:
b. 4B5B information bit rate is 80% of the total information plus overhead bit rate.
Explanation:
4B5B bit rate encoding means there is 80% of the bit rate which included all the information plus the overheads. There is 20% of lack in bit rate due to encoding code words which converts data into smaller bits.
Jane is a full-time student on a somewhat limited budget, taking online classes, and she loves to play the latest video games. She needs to update her computer and wonders what to purchase. Which of the following might you suggest?
a. A workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor.
b. A laptop system with a 3.2 GHz processor. 6 gigabytes of RAM, and a 17" monitor.
c. A desktop system with a 1.9 GHz processor, 1 gigabyte of RAM, and a 13" monitor
d. A handheld PC (with no smartphone functionality)
Answer:
a. A workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor.
Explanation:
From the description, Jane needs to be able to multitask and run various programs at the same time in order to be efficient. Also since she wants to play the latest video games she will need high end hardware. Therefore, from the available options the best one would be a workstation with a 3.9 GHz quad-core processor, 16 gigabytes of RAM, and a 24" monitor. This has a very fast cpu with 4 cores to process various threads at the same time. It also has 16GB of memory to be able to multitask without problems and a 24" monitor. From the available options this is the best choice.
How can an Outlook user search for contacts? Check all that apply.
the Search bar located above the list of contacts
the Search People bar on the Find command group
the Search People located on the People navigation icon
CTL + E to activate the search contacts box
advanced Find under the Search tab
the options menu in the backstage view
Answer: the Search bar located above the list of contacts.
the Search People bar on the Find command group.
the Search People located on the People navigation icon.
CTL + E to activate the search contacts box.
advanced Find under the Search tab.
Explanation:
An Outlook user can search for contacts through the following ways:
• the Search bar located above the list of contacts.
• the Search People bar on the Find command group.
• the Search People located on the People navigation icon.
• CTL + E to activate the search contacts box.
• advanced Find under the Search tab.
Therefore, the correct options are A, B, C, D and E.
A network has the ability to direct traffic toward all of the receiving service. what provides this ability in the transport layer?
Answer:
Multiplexing is the correct answer
Explanation:
End-to-end communication over a network is done by transport layer.
Provides a logical communication between various application processes running on different hosts and this layer is set in OSI(open system interconnection) model.
Transport layer also manages error and correction and also it provides reliability to users.
Multiplexing gets allowed by the transport layer which enables to transfer messages over a network and also the error and corrected data.
how to identify mistakes in a html code??
A _____ is a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, or any other entity that is a potential harm.
Answer:
Vulnerability assessment
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
A vulnerability assessment is a systematic and methodical evaluation used by network security experts to determine the exposure of network assets such as routers, switches, computer systems, etc., to attackers, forces of nature, or any other entity that is capable of causing harm i.e potential harms. Thus, vulnerability assessment simply analyzes and evaluate the network assets of an individual or business entity in order to gather information on how exposed these assets are to hackers, potential attackers, or other entities that poses a threat.
4) a) List two hardware devices that are associated with the Data Link layer. b) Which is the most commonly used in modern Ethernet networks
Answer:
Bridges and switches
Explanation:
4a) A bridge is an intelligent repeater that is aware of the MAC addresses of the nodes on either side of the bridge and can forward packets accordingly.
A switch is an intelligent hub that examines the MAC address of arriving packets in order to determine which port to forward the packet to.
4b) Twisted-pair cable is a type of cabling that is used for telephone communications and most modern Ethernet networks
1. What is memory mapped I/O?
Answer:
Memory-mapped I/O and port-mapped I/O are two complementary methods of performing input/output between the central processing unit and peripheral devices in a computer. An alternative approach is using dedicated I/O processors, commonly known as channels on mainframe computers, which execute their own instructions.
Being the Sales Manager of a company you have to hire more salesperson for the company to expand the sales territory. Kindly suggest an effective Recruitment and Selection Process to HR by explaining the all the stages in detail.
Answer:
In order to sales company to expand the sales territory in heeds to target those candidates that have long exposure in sales profile.
Explanation:
Going for a sales interview for the profile of a sales manager in a company. The HR department may require you to answer some questions. Such as what do you like most about sales, how to you motivate your team and how much experience do you have. What are philosophies for making sales Thus first round is of initial screening, reference checking, in-depth interview, employ testing, follow up, and making the selection. This helps to eliminate the undesired candidates.Briefly explain what an array is. As part of your answer make use of a labelled example to show the declaration and components of an array
Answer:
Explanation:
In programming an array is simply a grouping of various pieces of data. Various data elements are grouped together into a single set and saved into a variable. This variable can be called which would return the entire set which includes all of the elements. The variable can also be used to access individual elements within the set. In Java an example would be the following...
int[] myArray = {33, 64, 73, 11, 13};
In Java, int[] indicates that the variable will hold an array of integers. myArray is the name of the variable which can be called to access the array elements. The elements themselves (various pieces of data) are located within the brackets {}
Write a RainFall class that stores the total rainfall for each of 12 months into an array of doubles. The program should have methods that return the following: the total rainfall for the year the average monthly rainfall the month with the most rain the month with the least rain Demonstrate the class in a complete program and use java 8 examples to do so. Input Validation: Do not accept negative numbers for monthly rainfall figures.
Answer:
Explanation:
The following code is written in Java. It creates the Rainfall class with two constructors, one that passes the entire array of rainfall and another that initializes an array with 0.0 for all the months. Then the class contains a method to add rain to a specific month, as well as the three methods requested in the question. The method to add rain validates to make sure that no negative value was added. 8 Test cases were provided, and any methods can be called on any of the 8 objects.
class Brainly {
public static void main(String[] args) {
Rainfall rain1 = new Rainfall();
Rainfall rain2 = new Rainfall();
Rainfall rain3 = new Rainfall();
Rainfall rain4 = new Rainfall();
Rainfall rain5 = new Rainfall();
Rainfall rain6 = new Rainfall();
Rainfall rain7 = new Rainfall();
Rainfall rain8 = new Rainfall();
}
}
class Rainfall {
double[] rainfall = {0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0};
public Rainfall(double[] rainfall) {
this.rainfall = rainfall;
}
public Rainfall() {
}
public void addMonthRain(double rain, int month) {
if (rain > 0) {
rainfall[month-1] = rain;
}
}
public double totalRainfall() {
double total = 0;
for (double rain: rainfall) {
total += rain;
}
return total;
}
public double averageRainfall() {
double average = totalRainfall() / 12;
return average;
}
public double rainiestMonth() {
double max = 0;
for (double rain : rainfall) {
if (rain > max) {
max = rain;
}
}
return max;
}
}
how many copies of each static variable and each class variable are created when 10 instances of the same class are created
Answer:
Static variables are initialized only once
Explanation:
Only one copy of static variables are created when 10 objects are created of a class
A static variable is common to all instances of a class because it is a class level variable
Validate that the user age field is at least 21 and at most 35. If valid, set the background of the field to LightGreen and assign true to userAgeValid. Otherwise, set the background to Orange and userAgeValid to false.HTML JavaScript 1 var validColor-"LightGreen"; 2 var invalidColor"Orange" 3 var userAgeInput -document.getElementByIdC"userAge"); 4 var formWidget -document.getElementByIdC"userForm"); 5 var userAgeValid - false; 7 function userAgeCheck(event) 10 11 function formCheck(event) 12 if (luserAgeValid) { 13 14 15 16 17 userAgeInput.addEventListener("input", userAgeCheck); 18 formWidget.addEventListener('submit', formCheck); event.preventDefault); 3 Check Iry again
Answer:
Explanation:
The code provided had many errors. I fixed the errors and changed the userAgeCheck function as requested. Checking the age of that the user has passed as an input and changing the variables as needed depending on the age. The background color that was changed was for the form field as the question was not very specific on which field needed to be changed. The piece of the code that was created can be seen in the attached image below.
var validColor = "LightGreen";
var invalidColor = "Orange";
var userAgeInput = document.getElementById("userAge");
var formWidget = document.getElementById("userForm");
var userAgeValid = false;
function userAgeCheck(event) {
if ((userAgeInput >= 25) && (userAgeInput <= 35)) {
document.getElementById("userForm").style.backgroundColor = validColor;
userAgeValid = true;
} else {
document.getElementById("userForm").style.backgroundColor = invalidColor;
userAgeValid = false;
}
};
function formCheck(event) {};
if (!userAgeValid) {
userAgeInput.addEventListener("input", userAgeCheck);
formWidget.addEventListener('submit', formCheck);
event.preventDefault();
}
Create a function called GetColors that will accept two parameters. These parameters can only be red, blue or yellow. Your function needs to analyze these two colors and determine the color mix. Make sure your function returns the color mix back to where it was called.
Answer:
Explanation:
The following code is written in Java. It creates a GetColors method that takes in the two parameter colors of either red, blue or yellow. It combines those colors and returns the mix of the two colors back to the user. A test case has been used in the main method and the output can be seen in the attached image below.
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
System.out.println(GetColors("yellow", "red"));
}
public static String GetColors(String color1, String color2) {
if (color1 == "red") {
if (color2 == "blue") {return "purple";}
else if (color2 == "yellow") {return "orange";}
else {return "red";}
} else if (color1 == "blue") {
if (color2 == "red") {return "purple";}
else if (color2 == "yellow") {return "green";}
else {return "blue";}
} else if (color1 == "yellow") {
if (color2 == "red") {return "orange";}
else if (color2 == "blue") {return "green";}
else {return "yellow";}
} else {
return "Wrong Parameters";
}
}
}
Functions IN C LANGUAGE
Problem 1
Function floor may be used to round a number to a specific decimal place. The statement
y = floor( x * 10 + .5 ) / 10;
rounds x to the tenths position (the first position to the right of the decimal point). The
statement
y = floor( x * 100 + .5 ) / 100;
rounds x to the hundredths position (the second position to the right of the decimal
point).
Write a program that defines four functions to round a number x in various ways
a. roundToInteger( number )
b. roundToTenths( number )
c. roundToHundreths( number )
d. roundToThousandths( number )
For each value read, your program should print the original value, the number rounded to
the nearest integer, the number rounded to the nearest tenth, the number rounded to
the nearest hundredth, and the number rounded to the nearest thousandth.
Input Format
Input line contain a float number.
Output Format
Print the original value, the number rounded to the nearest integer, the number rounded
to the nearest tenth, the number rounded to the nearest hundredth, and the number
rounded to the nearest thousandth
Examples
Example 1
Input 1
24567.8
Output 1
24567.8 24568 24570 24600
You want to calculate a bonus if the sold price was at least equal to the listing price, and if the house sold within 30 days after being listed.
In cell L12, insert an IF function with a nested AND function to calculate a bonus. The AND function should ensure both conditions are met: Sold Price divided by the Listing Price is greater than or equal to 100% (cell L7) and the Days on Market are less than or equal to 30 (cell L8). If both conditions are met, the bonus is $1,000 (cell L9). Otherwise, the bonus is $0. Use mixed cell references to the input values in the range L7:L9. Copy the function to the range L12:L39.
BA Average Total Sold Highest 1 Location Sold Price Number Sold Dual Agent Total Sol Prices Sold Price Agent Codes and Commission Rates 2 Alpine Carey Buyer's Agent 2.75% 3 American Fork Hernandez DA Dual Agency 5.50% 4 Cedar Hills Pijuan SA Seller's Agent 3.25% 5 Lehi 6 Total Commission by Agent Input for Bonus 7 Carey Percent of List 100% 8 Hernandez Days on Market 30 9 Pijuan Bonus Amount $ 1,000 10 Days on Agent Number City Selling Agen Agent Type Agent Type List Price Sold Price Listing Date Sale Date Bonus 11 Market Commissio 12 1 Cedar Hills Pijuan DA Dual Agency $ 725,000 $ 705,000 4/1/2021 76 6/16/2021 13 4 Lehi Pijuan DA Dual Agency $ 350,799 $ 350,000 4/1/2021 5/25/2021 54 14 5 American Fork Pijuan DA Dual Agency $ 29 385,900 $ 385,900 4/1/2021 4/30/2021 15 6 Alpine Carey SA Seller's Agent $ 500,000 $ 495,800 68 4/3/2021 6/10/2021 16 7 Lehi Pijuan BA Buyer's Agent $ 345,999 $ 345,000 4/3/2021 59 6/1/2021 17 11 American Fork Hernandez DA Dual Agency $ 325,000 $ 320,000 48 4/12/2021 5/30/2021 18 Alpine 12 Pijuan DA Dual Agency $ 750,250 $ 725,900 4/12/2021 11/1/2021 203 19 $ DA 17 Alpine Dual Agency $ Carey 645,000 66 643,000 4/18/2021 6/23/2021 20 19 American Fork Pijuan BA Buyer's Agent $ 425,000 $ 415,000 4/18/2021 6/30/2021 73 21 21 Lehi Pijuan SA Seller's Agent $ 325,000 $ 330,000 4/28/2021 6/1/2021 34 22 24 American Fork Pijuan SA Seller's Agent $ 425,815 $ 418,000 4/28/2021 140 9/15/2021 23 27 Alpine DA Pijuan Dual Agency $ 700,000 $ 705,000 4/30/2021 6/19/2021 50 24 30 Lehi Hernandez SA Seller's Agent $ 365,000 $ 363,000 5/1/2021 6/18/2021 48 25 32 Cedar Hills Carey SA Seller's Agent $ 885,500 $ 800,000 5/1/2021 6/6/2021 36 26 34 Cedar Hills Carey SA Seller's Agent $ 610,000 $ 600,000 5/1/2021 6/26/2021 56 27 35 Cedar Hills Hernandez DA Dual Agency $ 560,700 $ 565,000 5/1/2021 5/30/2021 29 29 36 American Fork Hernandez BA . Buyer's Agent $ 450,000 $ 450,000 5/2/2021 9/30/2021 151 29 43 American Fork Carey BA 9 Buyer's Agent $ 375,000 $ 372,500 5/6/2021 5/15/2021 30 46 Cedar Hills Carey SA Seller's Agent $ 650,000 $ 625,750 5/15/2021 679/2021 25 48 31 Alpine Hernandez DA Dual Agency $ 545,000 $ 560,000 5/22/2021 6/16/2021 25 32 Lehi 53 Carey SA Seller's Agent $ 315,750 $ 320,000 5/28/2021 6/18/2021 21 33 61 Lehi Carey DA Dual Agency $ 300,000 $ 300,000 6/2/2021 9/2/2021 92 34 Alpine 69 Hernandez DA Dual Agency $ 589,000 $ 595,000 20 6/18/2021 7/8/2021 35 70 American Fork Hernandez DA Dual Agency $ 345,670 $ 102 345,000 6/20/2021 9/30/2021 36 73 Cedar Hills Carey BA Buyer's agent $ 555,000 $ 550,000 6 6/24/2021 6/30/2021 37 75 Alpine Carey BA Buyer's Agent $ 475,000 $ 485,000 86 6/24/2021 9/18/2021 38 78 American Fork Carey DA Dual Agency $ 400,000 $ 15 400,000 6/30/2021 7/15/2021 39 80 American Fork Pijuan SA Seller's Agent $ 380,500 $ 365,750 6/30/2021 63 9/1/2021 40 41 42 43 44 Details Map Loan +
Answer:
Following are the solution to the given question:
Explanation:
Please find the following Excel form for calculating the bonus as required. Please ensure the equation is duplicated even so, with the sign "=." It is possible to insert this formula into cell L12. Then cut/paste the cell into other L12:L39 cells.
[tex]=IF(AND(G12/F12 \geq \$L \$7,J12 \leq \$L\$8)=TRUE,\$L\$9,0)[/tex]
The mixed microbial reference here is used in L7, L8, and L9 so these cell references are not moved whenever the formula is copied to L12:L39.
Please verify that whenever the copy has also been copied, the cell formula appears beneath in each cell.
It must be as below in L12.
[tex]=IF(AND(G12/F12 \geq \$L\$7,J12\leq \$L\$8)=TRUE,\$L\$9,0)[/tex]
It must be as follows in L13.
[tex]=IF(AND(G13/F13\geq \$L\$7,J13\leq \$L\$8)=TRUE,\$L\$9,0)[/tex]
and so on.
Explain why you want a USB hub if there are already USB ports in the computer.
Answer:
Powered USB hubs provide their own power supply for devices. Typically, when you connect a device to your computer via USB, the device draws upon your computer's power to function. Powered USB hubs come with their own power source and provide power for your connected devices so your computer doesn't have to.
Explanation:
Please Mark me brainliest
In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
a) True
b) False
Answer:
b. False.
Explanation:
Delete function not used to remove data stored on the stack. It is only used to free memory on the heap. The C++ is programming language used to develop operating systems.
Which symbol is used to identify edge-triggered flip-flops
Answer:
A triangle on the Clock input.
Would you prefer to use an integrated router, switch, and firewall configuration for a home network, or would you prefer to operate them as separate systems
Answer:
I would prefer to use an integrated router, switch, and firewall configuration for a home network instead of operating my home devices as separate systems.
Explanation:
Operating your home devices as separate systems does not offer the required good service in information sharing. To share the internet connection among the home devices, thereby making it cheaper for family members to access the internet with one Internet Service Provider (ISP) account rather than multiple accounts, a home network is required. A home network will always require a network firewall to protect the internal/private LAN from outside attack and to prevent important data from leaking out to the outside world.
You know different types of networks. If two computing station high speed network link for proper operation which of the following network type should be considered as a first priority?
MAN
WAN
WLAN
LAN
All of these
Answer:
All of these.
PLZ MARK ME BRAINLIEST.
How does OOP keep both code and data safe from outside interference and
incuse?
Answer:
it is the process that binds together the data and code into a single unit and keeps both from being safe from outside interference and misuse. In this process, the data is hidden from other classes and can be accessed only through the current class's methods
(a) Define a goal for software product quality and an associated metric for that attribute. (b) Explain how you could show that the goal is validatable. (c) Explain how you could show that the goal is verifiable. 2. (a) Create a list of software product attributes and a list for software project attributes. (b) Rank these in the order of how difficult you consider them to be measured. (c) Discuss the reasons for your choices
Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy without having to continually set up an instrument True False
Answer:
The given statement is "True".
Explanation:
Batter panels seem to be platform frames that are used to temporarily suspend foundations plan threads. These same batter board members look like barriers once built.Its positioning is important for creating a foundation precisely as the plans state since some components of their development would have to be accurate. Placed correctly batter panels guarantee that the boundaries seem to be at the appropriate temperatures as well as positions._________________________ are the countable products resulting from a program, while ________________________ are the changes in clients that are achieved as a result of program participation.
Answer: Outputs; Outcomes.
Explanation:
Program refers to the collection of instructions which the computer can execute in order to perform a certain task.
Outputs are are the countable products resulting from a program, while on the other hand, outcomes are the changes in clients that are achieved as a result of program participation.
A ----------------has the least flexibility and is best suited for mass production. It has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.
Answer:
Job order production
Explanation:
A job order production has the least flexibility and is best suited for mass production.
It also has an arrangement of machines that process identical products in a predefined order, with automatic movement of materials between machines.
brainleist please..
Answer -------> Transfer line <---------
please click on the picture look at the PICTURE for the correct answer.