Answer:
FamilyVacation FamilyVacation::operator+(int moreDays) {
FamilyVacation copy = *this;
copy.numDays += moreDays;
return copy;
}
Explanation:
You create a copy (which is simple because the class contains no pointers), then you modify the copy and return it.
Mia is disappointed with how her latest video games are playing on her computer; the images are slow
and grainy, and what she sees onscreen seems to lag behind what she is inputting through her
controls. Which of these components does Mia most likely need to upgrade?
O USB
O GPU
ONIC
O loT
Answer:
she is complaining about her images being slow and lagging she should get a new gpu because, well it should be pretty self explnitory gpu stands for graphics processing unit, so putting 2 and 2 together...
Answer:
B. GPU
The Graphics proccessing unit or GPU is what decides how good or bad your graphics are. If you are having problems with the speed or look of your graphics, then it would be a good idea to upgrade the GPU.
I hope this helps. Cheers! ^^
Database __________ , which is the logical design of the database, and the database _______,which is a snapshot of the data in the database at a given instant in time.
A. Relation, Domain
B. Relation, Schema
C. Instance, Schema
D. Schema, Instance
Answer:
D. Schema, Instance.
Explanation:
Database schema, which is the logical design of the database, and the database instance, which is a snapshot of the data in the database at a given instant in time.
In database management, the term "schema" is used to denote a representation of data while the term "instance" is used to denote an instance of time.
A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.
A database instance is a snapshot of the data in the database at a given instant in time and as such represents an operational database by following the conditions, validation and constraints set for a database management system.
1.15) Many computers use one byte (8 bits) of data for each letter of the alphabet. There are 44 million words in the Encyclopedia Britannica. (a) What is the bit density (bits/in2) of the head of a pin if the entire Encyclopedia is printed on it
Answer: provided in the explanation section
Explanation:
the complete questions is given thus:
Many computers use one byte (8 bits) of data for each letter of the alphabet. There are 44 million words in the Encyclopedia Britannica.
(A). (What is the bit density (bits/in2) of the head of a pin if the entire encyclopedia is printed on it? Assume the average word is five letters long. (B). What is the byte density?
(C). What is the area of a single bit in nm2?
(D). A CD-ROM has a storage density of 46 megabytes/in2 and a DVD has a storage density of 329 megabytes/in2. Is the pinhead better or worse than these two storage media? How much better or worse?
ANSWER PROVIDED:
So both quest. a and b will be solved using the same principle.
Let us say we have the Head of the pin as (1/16)th of an inch in diameter.
Then the area is = pi*(1/(2*16))2 = pi*(1/32)2
Where each word is on an average 5 letters long, and there are 44 million words.
we have a total of 220000000 bytes.
220000000 bytes = 1.76 billion bits ( Since,1 Bytes=8 bits)
hence there are 1.76 billion bits total over the head of the pin.
Note that the bit density is bits per unit area;
since we know that now, let us proceed
Bit density = 1.76billion bits/(pi*(1/32)2 bits(inch)-2
approx 574 trillion bits per (inch)2
(b). Byte density tells us the measure of the quantity of information bytes that can be stored on a given length of track, area of surface, or even in a given volume of a computer storage medium.
⇒ Byte density is bit density divided by 8
(c). asked to find the area;
given that the inch2 = (2.54cm2) = (25.4e-6nm)2.
So to get the area,we will simply divide 574billion by (25.4e-6nm)2
(d). The pin head is WAY better.
what we mean is;
574 trillion bits per inch2 = around 75 trillion bytes per inch2
= 75 terabytes per inch2
cheers i hope this helped !!!
Explain Basies Uses of spreadsheet ,
Answer:
The three most common general uses for spreadsheet software are to create budgets, produce graphs and charts, and for storing and sorting data. Within business spreadsheet software is used to forecast future performance, calculate tax, completing basic payroll, producing charts and calculating revenues.
Explanation:hope this helped hun
o maintain reasonable key security (mark all that apply): Ensure that someone else always has an extra key. Ensure that no extra duplicates are made. Maintain strict control over master keys and control keys. Ensure that the key cannot be linked to the lock it operates.
Answer:
The answer is "second, third, and fourth choices"
Explanation:
In the question the numbering of the choices were missing if we numbering the choices so, the first choice will be one first number and second choice is in second and so on, and its explanation can be defined as follows:
The network safety key is a type of network login credentials or passwords which is used for provides authorization as well as access the network or device upon which client requests to communicate throughout the form of physical, digital, or biometrical information login.
It doesn't ensure the extra key. It helps ensure there were no additional duplicates. It keeps strict access codes as well as keys command. It makes sure, that its key could not be linked to able to operate the lock.A DATABASE IS A COLLECTION OF _____ DATA
Answer:
related
Explanation:
Database is an integrated collection of logically related records or files. A database consolidates records previously stored in separate files into a common pool of data records that provides data for many applications. The data is managed by systems software called database management systems
Out of the choices provided above, it can be concluded to state that A database is a collection of related data. Therefore, the option A holds true.
What is the significance of a database?A database can be referred to or considered as a data that contains a collection or compilation of different sets of data observations. These observations are having a common characteristic, which is always predefined for easy access of the user of the data.
A database set can never have data about two or more things, which are completely unrelated to each other, simply because it does not make any sense or utility to use such database as one whole set of observation. The data must be related in some way or the other.
Therefore, the option A holds true and states regarding the significance of database.
Learn more about database here:
https://brainly.com/question/6447559
#SPJ6
The missing choices are added below for better reference.
A. Related
B. Unrelated
C. Scattered
Complete the sentence about a presentation delivery method.
A(n) ____ allows you to transmit your presentations over the Internet using ____.
1: A. Presentation software
B. webcast
C. external monitor
2: A. Projectors
B. CDs
C. Streaming technology
Answer:
A Presentation software allows you to transmit your presentation over the internet using CDs??????????????????C
A ________ uses the Internet communications infrastructure to build a secure and private network. HAN PAN VPN WAN
Answer:
VPN is a correct answer
Answer:
VPN
Explanation:
Let S be an NP-complete problem and Q and R be two other problems not known to be in NP. Q is polynomial time reducible to S and S is polynomial time reducible to R. Which of the following statements are true?
A. R is NP complete
B. R is NP Hard
C. Q is NP complete
D. Q is NP hard
Answer:
B. R is NP Hard
Explanation:
Given:
S is an NP complete problem
Q is not known to be in NP
R is not known to be in NP
Q is polynomial times reducible to S
S is polynomial times reducible to R
Solution:
NP complete problem has to be in both NP and NP-hard. A problem is NP hard if all problems in NP are polynomial time reducible to it.
Option B is correct because as given in the question S is an NP complete problem and S is polynomial times reducible to R.
Option A is not correct because R is not known to be in NP
Option C is not correct because Q is also not known to be in NP
Option D is not correct because Q because no NP-complete problem is polynomial time reducible to Q.
________ is the branch of computer science that deals with the attempt to create computers that think like humans.
Answer:
Artificial Intelligence (AI)
Explanation:
Artificial intelligence is a way of making computers to think critically, or act like humans. It involves the application of computer science and technology to produce critical problem solving device as humans.
It is a welcomed development and well accepted innovation to complement humans in proffering solutions to logical and critical problems. It has various applications in influencing the result or solution to mentally demanding tasks that require high intelligence.
The so-called WAP gap involves the __________ of information where the two different networks meet, the WAP gateways.
Complete Question:
The so-called WAP gap involves the ______ of information where the two different networks meet, the WAP gateways.
Group of answer choices
A. integrity.
B. confidentiality.
C. authentication.
D. WTLS.
Answer:
B. confidentiality.
Explanation:
WAP is an acronym for wireless application protocol and it is a standard communications protocol used for accessing, formatting and filtering of data (informations) on wireless devices such as mobile phones over the internet or mobile wireless network.
Simply stated, a wireless application protocol (WAP) is a lightweight and easy to use protocol designed and developed for devices with low computing power e.g mobile devices.
There are two (2) main standard protocols that are being used for the wireless application protocol (WAP), these are;
1. Transport Layer Security (TLS).
2. Wireless Transport Layer Security (WTLS).
The so-called WAP gap involves the confidentiality of information where the two different networks (WTLS and TLS) meet, the WAP gateways.
In wireless communications, the wireless transport layer security was an improvement on the transport layer security. However, it created a major problem of confidentiality in the translation of the two protocols in a WAP architecture.
First, the user data is encrypted with a public key of an application server and then encrypted again from the client mobile device to the WAP gateway using the wireless transport layer security (WTLS) and lastly, the transport layer security (TLS) is used from the WAP gateway to the enterprise server. The TLS translates the WTLS data by decrypting it first and then encrypting it again.
The security concerns or confidentiality issues associated with using WAP is that, all messages are seen in plain text by the WAP gateways in the translation at the TLS point, thus causing the so called WAP gap.
Answer:
FROM THE TOP MAKE IT DROP THATS SOME WAP WAP WAP WAP
Explanation:
What is the advantage of utilizing trees as a data structure? Describe a scenario where you may use either a linear data structure or a tree and show which would be more effective and why?
Answer:
The tree data structure provides more flexibility and practicality.
Explanation:
The tree data structure is more advantageous because of it's practicality in terms of forming relationships within the data.
A tree data structure would be preferable for an e-commerce website or database because it provides the ability to be able to links different products and group them under sub categories etc. Basically it makes a more reliable database in this situation.
I hope this answer helps.
Someone receives and email that appears to be from their bank requesting them to verify account information, this type of attack is:
Answer:
This is Phishing attackExplanation:
What is Phishing attack?
Phishing attack involves sending of sending of unwanted spam mails, well disguised mails to potential victims, it was designed to steal the potential victim's information such as passwords and mails to his/her banking platform.
The goal is to deceive victims into clicking on a link and taking them to a website that asks for their login and password, or perhaps their credit card or ATM number.
People who attack using phishing are called cyber attackers
The description of a barcode mainly serves to:________.
A. trivialize the complexity of a particular research practice.
B. use a familiar concept to communicate an idea.
C. question the novelty of a scientific phenomenon.
D. inject a note of levity into an otherwise serious argument.
Answer:
B. use a familiar concept to communicate an idea.
Explanation:
From the article written by Tim Heupink, et al, and titled "Dodos and Spotted Green Pigeons are Descendants of an Island Hopping Bird"
Following the scientist's analysis on DNA from two feathers of green pigeon which were seen they examined the minor area of DNA that are distinct for most bird species. This minor area comprises three DNA “mini barcodes." It was concluded from the analysis of mini Barcodes that the green pigeon that were discovered is certainly a different species, indicating a distinct DNA barcode compared
Hence, it can be concluded that the description of a barcode mainly serves to use a familiar concept to communicate an idea.
Which of these is an example of output?
typing on a keyboard
a smartphone ringing
using a mouse
a fingerprint sensor
Answer:
a smartphone ringing
Explanation:
An output device is a computer hardware that converts data or signals into readable form like text, graphic, audio, video, tactile. Example of output devices are monitor, speaker, printer, projector. A smartphone ringing is a computer hardware because it converts the information into readable form in the form of sound.
Input devices is a computer hardware that sends information to the computer for interaction and control. Examples are mouse, keyboard, fingerprint sensor, scanner e.t.c.
A termination condition in a loop is analogous to________in a recursive method.
a) call.
b) iteration.
c) initialization condition.
Answer:
b) iteration.
Explanation:
There are various algorithms which are used in computer programming. Iteration is also a type of algorithm which is used to create loops. The instructions are inserted once and then these instructions are repeated to create a loop function.
Write a program that asks the user for three strings. Then, print out whether the first string concatenated to the second string is equal to the third string. Here are a few sample program runs: Sample Program 1: First string
Answer:
import java.util.Scanner;
public class Main {
public static void main(String[] args) throws Exception {
Scanner myObj = new Scanner(System.in);
//Request and receive first String
System.out.println("Enter username");
String firstString = myObj.nextLine();
//Request and receive second string
System.out.println("Enter second string");
String secondString = myObj.nextLine();
//Request and receive third string
System.out.println("Enter third string");
String thirdString = myObj.nextLine();
//Concatenate the first and second string
String concatA_B = firstString + secondString;
if(concatA_B.equals(thirdString)){
System.out.println("First String Concatenated to Second String is equals to the third String");
}
else{
System.out.println("First String Concatenated to Second String is NOT equals to the third String");
}
}
}
Explanation:
Import Scanner ClassRequest and Receive three variables from the user using the Scanner ClassConcatenate the first and secondUse the .equals() method to check for equalityWhich of the following is true about the strategy that uses page fault frequency (PFF) to prevent thrashing?
A. A new process may be swapped in if PFF is too low.
B. A new page is allocated to a process if PFF is too high.
C. A page is deallocated from a process if the PFF is too low.
D. All of the above.
Answer:
The answer is "option B"
Explanation:
Thrashing arises whenever the virtual machine assets of a device are overused, leading to constant paging and page defect, that affects the processing of most programs.
In the given-question, only choice b is correct because this mechanism can be allocated to avoid the thumping of new pages if PFF is too high by increasing several frames or by removing expulsion frames.
Answer:
B. A new page is allocated to a process if PFF is too high.
Explanation:
Page fault frequency: In computer science, the term "page fault frequency" is also referred as PFF, and is described as a direct approach that is being utilized to handle thrashing and is considered as the one that tends to use "page-fault frequency concept". However, the problem that is connected with the "thrashing" is the "high-page fault rate" and therefore it is responsible for controlling the "page fault rate". However, if the "page-fault rate" is considerably too high, then it tends to indicate that the process consist of only few frames that is being allocated to it.
The SQL WHERE clause: Limits the row data that are returned. Limits the column data that are returned. ALL Limits the column and row data that are returned.f the options
Answer: Limits the row data that are returned.
Explanation: In structured query language (SQL), The where clause is used as a filter. The filter is applied to a column and as such the filter value or criteria determines the values that are spared in the column on which the WHERE clause is applied. All rows in which the column value does not meet the WHERE clause criteria are exempted from the output. This will hence limit the number of rows which our command displays.
For instance,
FROM * SELECT table_name WHERE username = 'fichoh' ;
The command above filters the username column for username with fichoh, then displays only rows of Data with fichoh as the username. All data columns are displayed but rows of data which do not match fichoh are exempted.
I microwaved my phone and this Bluetooth popup won't go away and I can't connect to Bluetooth. Help. I have a Google pixel 3XL I'm no phone expert.
Answer: Why'd you'd Microwave your phone?
Explanation: Ok first don't do that, it can make it explode, and since you did that, it messed up something, you'll have to get it fixed or buy a new one
Hope this helps^^
Answer: C
Explanation:
I just took the test, and i am Smart
token is 64 bytes long (the 10-Mbps Ethernet minimum packet size), what is the average wait to receive the token on an idle network with 40 stations? (The average number of stations the token must pass through is 40/2 = 20.
Given that,
Token is 64 bytes long
The average number of stations that the token must pass = 20
We need to calculate the transmission delay for token
Using formula of transmission delay
[tex]Transmission\ delay=\dfrac{token\ size}{minimum\ size}[/tex]
Put the value into the formula
[tex]Transmission\ delay=\dfrac{64\ bytes}{10\ Mbps}[/tex]
[tex]Transmission\ delay=\dfrac{64\times8}{10\times10^6}[/tex]
[tex]Transmission\ delay=0.0000512\ sec[/tex]
[tex]Transmission\ delay=5.12\times10^{-5}\ sec[/tex]
We need to calculate the average wait to receive token on an idle network with 40 stations
Using formula of average wait
[tex]\text{average wait to receive token}=\text{average number of stations that the token must pass}\times transmission\ delay[/tex]
Put the value into the formula
[tex]\text{average wait to receive token}=20\times5.12\times10^{-5}[/tex]
[tex]\text{average wait to receive token}= 0.001024\ sec[/tex]
[tex]\text{average wait to receive token}= 1.024\ ms[/tex]
Hence, The average wait to receive token on an idle network with 40 stations is 1.024 ms.
-How long does a copyright last?
Answer:
95 years
Explanation:
the dura- tion of copyright is 95 years from first publication or 120 years from creation, whichever is shorter (unless the author's identity is later revealed in Copyright Office records, in which case the term becomes the author's life plus 70 years).
write a function solution that given an integer n returns a string consisting of n lowercase lettersn
Answer:
Following are the method to this question:
def solution(s):#defining a method solution
x=0#defining variable x that assign value 0
for i in s:#defining for loop to count string value in number
if(i.islower()):#defining if block that check input character is in lowercase
x=x+1#increment the value of x by 1
return x#return x
s=input("Enter string:")#defining s variable that input string value
print(solution(s))#defining print method to solution method
Output:
Enter string:Database is the colloection
22
Explanation:
In the given question some data is missing, that's why we define the answer as follows:
In the above code, a solution method is defined, which takes "s" variable as the parameter, and inside the method, an integer variable "x" is defined, that holds a value that is "0". In the next line, for loop is declared, that counts string value without space and inside the loop, if block is defined, that checks only the lowercase character and adds the value in x variable, and returns its value. Outside the method s variable is defined, that inputs the string value from the user end, and use the print method to call it and print its calculated value.The function returns a string of lowercase alphabets of length n, which is prescribed in the function. The function written in python 3 goes thus ;
import string, random
#import the string and random modules
l_case = [x for x in string.ascii_letters if x.islower()]
#use list comprehension to take a list of lower case alphabets
def n_letters(n):
#initialize a function which takes a single parameter, number of letters
lett = random.sample(l_case, n)
#take a random sample of n letters
return "".join(lett)
#use the join function to concatenate the string
print(n_letters(6))
# A sample run of the program is attached.
Learn more :https://brainly.com/question/15086326
Can the teacher provide your feedback through Google Classroom?
Answer:
Yes
Explanation:
The teacher always answers all queries if she/he is online and the question u ask is understandable
Answer:
Yes
Explanation: A teacher can give the feedback individual/privately or publicity
Why escape sequence is used? Explain with example?
Answer:
They are especially used to specify actions for eg. carriage returns and tab movements on terminals or printers.
They are also used to provide literal representation.
hope it helps!
assume your using a three button mouse. to access the short cut menus you would
On the 80x86 CPU, the ESP register keeps track of the value on the top of the runtime stack.
a) true
b) false
Answer:
True
Explanation:
The ESP register acts as an indirect operand pointing to the top of the stack at any time.
Stack grows downwards from high memory when a program adds to the stack. However, when items are removed from the stack, it shrinks upwards from low to high memory.
The assembler reduces the stack pointer(ESP) register by 2, when a word value is pushed on to the stack. On the other hand, the assembler increases the stack pointer by 2 when a word value is popped off.
The assembler decreases or increases the ESP register by 4 when a double word value is pushed or popped off the stack respectively. Therefore the ESP register changes in multiples of 4.
Which type of cluster does NOT belong? a. Density-based b. Shared-Property c. Prototype-based d. Hierarchical-based
Answer:
b. Prototype-based
Explanation:
In clustering, certain methods are used to identify groups. This identifies groups of similar objects in a multivariate sets of data which is collected from different fields.
Shared-property clusters shares some property.
Hierarchical cluster builds a hierarchy.
Density-based identifies clusters in a data. While the prototype based sents observation to nearest prototype.
In today’s fast-paced, often "agile" software development, how can the secure design be implemented?
Answer:
Answered below
Explanation:
The agile approach to software development involves development through the collaborative efforts of integrated and organised teams and users. Nowadays, people follow this approach because it allows for faster deployment, continuous updates as well as flexibility in development.
In the face of this rapid development and deployment, security design can be a challenge to keep up with.
Some steps to implement security in an agile environment include;
- Approaching security implementation in the same agile way as software development.
- Making software developers responsible for secure development and implementation.
- Utilising continuous integration of security practices by integrating security solutions with the development tools.
Answer the following
1. Explain the difference between likelihood and probability.
2. Give an example of a set of clusters in which merging based on the closeness of clusters leads to a more natural set of clusters than merging based on the strength of connection (interconnectedness) of clusters.
Answer:
zero, foresight
Explanation:
figure it out