a _____ is a security event that constitutes a security incident in which an intruder gains access to a system without having authorization to do so.

Answers

Answer 1

A security incursion is a security event that results in a security incident in which an unauthorized user gains access to a system.

What are an intruder and an intrusion?

Attackers who try to compromise a network's security are known as intruders. They launch an attack on the network to gain illegal access. There are three different categories of intruders: miscreants, masqueraders, and covert users.

What is in charge of figuring out whether an intrusion has happened?

The analyzer is in charge of figuring out whether an intrusion has taken place. This component's output serves as a notification of an intrusion. An IDS's user interface enables a user to monitor system output or modify the system's behavior.

To know more about security visit:-

https://brainly.com/question/28070333

#SPJ4


Related Questions

TRUE OR FALSE it is important to know if a computer is byte or word addressable because we need to know how many addresses are contained in main memory, cache, and in each block when doing cache mapping.

Answers

TRUE Since we need to know how several addresses are included in main memory, cache, and each block when executing cache mapping, it is crucial to understand if a computer is bytes or word addressable.

Cache: What is it?

In a computing setting, a cache is a piece of hardware or program that is used to temporarily store something, typically data. To improve the speed of recently or often accessed data, a small quantity of quicker, more expensive memory is employed. Data that has been cached is transiently kept on a local storage medium that is available to the cache clients and unrelated to the main storage. Its central processing unit (CPU), programmes, web browsers, and operating systems all frequently use cache.

To know more about Cache
https://brainly.com/question/15276918
#SPJ4

A technician assist Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.Which of the following security practices was violated?

Answers

The following security procedures were broken in accordance with the assertion made above on the principle of least privilege.

Giving an example, what is a database?

A collection is a planned gathering of data. They enable the manipulation and storage of data electronically. Data administration is made simple by databases. Let's use a database as an example. A database is used to hold information on people, their mobile numbers, or other contact information in an online telephone directory.

What purposes serve databases?

Any set of data or information that has been properly structured for quick searching and retrieval by a machine is referred to as a database, often known as an electronic database. Databases are designed to make it easy to save, retrieve, edit, and delete data while carrying out various data-processing tasks.

To know more about Database visit:

https://brainly.com/question/6447559

#SPJ4

44.7.1: unit testing. add two more statements to main() to test inputs 3 and -1. use print statements similar to the existing one (don't use assert).

Answers

To add two more statements to main() to test inputs 3 and -1, check the given code.

What is statements?

A list of directives for a computer to follow constitutes a computer programme. These instructions for programming are referred to as statements in a programming language.

The parts of programmes called C++ statements govern the order and flow of execution of other programmes. Statements may either be one line of code with a semicolon ; at the end or a block of code enclosed in curly braces.

There are several different types of statement in C++.

Labeled statementsExpression statementsCompound statementsSelection statementsIteration statementsJump statementsTry-Catch blocksDeclaration statements

//CPDE//

cout << "3,

expecting 27,

got: " << CubeNum(3) << endl;

cout << "-1,

expecting -1,

got: " << CubeNum(-1) << endl;

Learn more about statements

https://brainly.com/question/14467883

#SPJ4

A clique of size k is a subgraph that consists of k vertices that are all connected to each via an edge, i.e., all k(k−1)/2 edges exists. In class we proved that the problem of finding whether a graph contains a k -elique is NP-complete. Consider a similar problem: a k -clique with spikes consists of 2k vertices such that the first k elements form a clique and the rest k vertices are connected via an edge a different vertex of the clique. onsider a similar problem: Given a graph G and a number k find whether a k -clique with spikes exists. Show that the problem is NP-conplete.

Answers

A k-clique is a relaxed clique in social network analysis, i.e. a quasi-complete sub-graph.In a graph, a k-clique is a subgraph where the distance between any two vertices is less than k.

What exactly is a K-clique subgraph? A k-clique is a relaxed clique in social network analysis, i.e. a quasi-complete sub-graph.In a graph, a k-clique is a subgraph where the distance between any two vertices is less than k.A graph can readily display a limited number of vertices.A clique of size k in a graph G is a clique of graph G with k vertices, which means that the degree of each vertex in that clique is k-1.So, if there is a subset of k vertices in the graph G that are related to each other, we say that graph has a k-clique.A clique is a subgraph of a graph that has all of its vertices linked. The k-clique problem is concerned with determining the biggest complete subgraph of size k on a network, and it has numerous applications in Social Network Analysis (SNA), coding theory, geometry, and so on.

To learn more about A clique refer

https://brainly.com/question/1474689

#SPJ4

___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan.
a. Panicking
b. Multiplexing
c. Multitasking
d. Firefighting
e. Fireflying

Answers

Instead of carrying out activities in accordance with a well-thought-out strategy, network administrators engage in "firefighting," where they address urgent issues and network outages.

What exactly does "network" mean?

A number of computers connected together to share data (such printers and CDs), online cloud, or enable electronic conversations make up a network. A network's connections to its computers can be made through cables, phone lines, radio frequencies, spacecraft, or infrared laser beams.

Why is a network crucial?

Simply simply, networking entails establishing relationships with other business people. Always consider the benefits to both sides when networking. A important good, higher exposure, a larger support network, enhanced company growth, and far more meaningful relationships are a few benefits of networking.

To know more about Network visit:

https://brainly.com/question/13102717

#SPJ4

You want to know which files are large files (at least 0.1MB) in your data directory, but you do not want to go through them one by one. So you decide to design a regular expression to help with this. Locate the rule under the p1 target in your Makefile. This rule uses the Is command to list the contents of the data directory in your current folder. The -I option produces the long listing for these contents, which includes their size in bytes. The output of this is command is then piped as input into grep command. The-E option for the grep command allows searching through this text with a regular expression. Replace the regular expression in this grep command to search for any 6 digit number. Since the size of these files are displayed in bytes, the smallest possible six digit number: 100000 corresponds to 0.1MB. When this regular expression is correct, running "make p1" should display the three large files that can be found within the provided data directory. Tip: Start by composing a regex that matches any single digit, and test this to make sure that it works as expected. If you encounter trouble with one specific way of matching single digits, like \d, then please try to find another way that works with grep - E. Once this is working, look for a way to extend this pattern so that it must be repeated exactly six times to be matched.

Answers

You must pipe the command's output through grep in order to utilize grep as a filter. " | " is the symbol for pipe.

Explain about the grep?

The full line containing the matched string is displayed by default when using grep. To display only the matched pattern, change this setting. Using the -o option, we may instruct grep to show only the matching string. Using grep -n, output should be displayed together with the line number: To display the file's line number where the matching line was found.

Within collections of files, the grep command can look for a string. It outputs the name of the file, a colon, the line that matches the pattern, and the pattern when it discovers a pattern that matches in more than one file.

Instead of putting a filename at the end of a grep command, use an asterisk to search all files in the current directory.

To learn more about string refer to:

https://brainly.com/question/16397908

#SPJ4

The ____ command saves your work, turns off the computer fans and hard disk, and then places the computer in a lower-power state. shut down.

Answers

The sleep command stores your work, disables the hard drive and computer fans, and then switches the computer to a lower-power mode. closing down.

What is Sleep mode?Electronic devices like computers, televisions, and remote control devices can operate in a low power mode called sleep mode (or suspend to RAM). These modes allow users to resume operations without having to issue new commands or wait for a machine to reboot, and they significantly reduce electrical consumption compared to leaving a device fully on.The computer goes into a lower-power state when the sleep command caches your work, turns off the hard disk and computer fans. Many gadgets use an LED power light that pulses or is red to indicate this power mode.In order to keep the RAM running and be ready to respond to a wake-up event, a computer needs to use some energy even when it is dormant. In several nations, standby power for a sleeping computer is regulated. For instance, the One Watt Initiative in the United States places restrictions on this power.

Hence, The sleep command stores your work, disables the hard drive and computer fans, and then switches the computer to a lower-power mode. closing down.

To learn more Sleep mode refer to:

https://brainly.com/question/27583320

#SPJ4

Virtual memory layout [20] You have a 64-bit machine and you bought 8GB of physical memory. Pages are 256KB. For all calculations, you must show your work to receive full credit. (a) [1] How many virtual pages do you have per process? (b) [1] How many bits are needed for the Virtual Page Number (VPN)? (Hint: use part (a)) (c) [1] How many physical pages do you have? (d) [1] How many bits are needed for the Physical Page Number (PPN)? (Hint: use part (c)) (e) [1] How big in bytes does a page table entry (PTE) need to be to hold a single PPN plus a valid bit? (f) [1] How big would a flat page table be for a single process, assuming PTEs are the size computed in part (e)? (g) [10] Why does the answer above suggest that a "flat page table" isn't going to work for a 64-bit system like this? Research the concept of a multi-level page table, and briefly define it here. Why could such a data structure be much smaller than a flat page table? (h) [4] Does a TLB miss always lead to a page fault? Why or why not?

Answers

We have 2^48 pages per person. The number of physical pages is 2^16.. 48 bits of VPN are mapped to 16 bits of PPN. The PTE size is 2B. The page table size is 2^49 B.

What are the steps to calculate pages per person, physical pages, VPN ,PTE size and the table size?

We know that;

Virtual Address = 64bits

Virtual Address Space = 2^Virtual Address = 2^64B

Physical Address Space = 4GB  = 4 X 2^30 B = 2^32 B

Physical Address = log_2(Physical Address Space )  = log_2(2^32)

                             = 32 * log_2(2) = 32 bits.

Page size = 64KB =2^16 B

a) No of Virtual Pages = Virutal Address Space/PageSize

                                      =  2^64B / 2^16 B = 2^48

b) NoOfPhysicalPages = PhysicalAddressSpace/PageSize

                                      =  2^32 B / 2^16 B = 2^16

c) VPN (in Bits) = log_2(NoOfVirtual Pages)   = log_2(2^48) = 48

    PPN(inBits)=log_2(NoOfPhysicalPages)=  log_2(2^16) = 16

Thus 48 bits of VPN are mapped to 16 bits of PPN.

d) PTE( Page Table Entry) holds the Physical Page Number of given Virtual Page along with many information about the page.

PTEsize = PPN(inBits) = 16 bits = 2B

e) Flat page table is single level page table. A page table contains the Physical Page number for a given page number. It helps in the translation of Vitual Address to Physical Address.

PageTableSize = NoOfVirtualPages*PTEsize = 2^{48}*2B = 2^49

To know moe about  pages refer:

https://brainly.com/question/1362653

#SPJ4

Determine all cache accesses and the state of the data cache at any given time. From this you can determine any additional cycles from data cache misses. You must calculate the number of bits for the offset, index, and tag, determine the number of hits and misses, show the contents of the cache, and use the number of misses to determine any additional clock cycles required. The total clock cycles would be the total cycles for all iterations from Part 2 plus any additional memory access cycles from cache misses from Part 3.

Answers

The smallest and fastest part of a computer system's memory is the cache. The registers, which make up a very minor portion of the computer CPU, are quick storage components.

Why does the cache memory access time take less time than the main memory access time?

Cache memory must be substantially smaller than main memory in order to be situated near to the CPU. As a result, it has less room for storage. Due to the increased performance of the more complicated chip, it is also more expensive than main memory.

What distinguishes Level 1 from Level 2 and Level 3 cache benefits?

Since it is the smallest and nearest to the CPU, Level 1 (L1) cache memory is the quickest type. On the processor chip, Level 2 (L2) has a larger capacity but a slower speed. The computer that uses the L2 cache has the biggest capacity Level 3 (L3) cache memory.

To know more about Cache memory visit:-

https://brainly.com/question/16091648

#SPJ4

Suppose that move is a member function of the class vehicleType. Which of the following statements declare move to be a pure virtual function.
(i) virtual void move(double a, double b) const = 0;
(ii) virtual void move(double a, double b) 0 = const;
A) Only (ii) B) Only (i) C) Both (i) and (ii) D) None of these.

Answers

Let's assume that move is a function of the vehicleType class. virtual void move(double a, double b) const = 0.

What accomplishes a class method?

A class method is a method that is tied to the class itself, not to its objects. Because the class parameter refers to the class rather than the object instance, they have access to the class's state. It can alter a class state so that it would affect every instance of the class.

What are the features and functions of a class?

It is used to describe and comprehend objects in more detail than just their label through the usage of feature, function, and class.

To know more about vehicleType visit :-

https://brainly.com/question/14567843

#SPJ4

which of the following would be considered an input device? cpu cpu microsoft word microsoft word keyboard keyboard printer

Answers

A keyboard is regarded as an input device. Examples of input devices include scanners, mice, joysticks, and digital cameras.

Which of the following statements—that an output device provides information to the computer and an input device receives it—is true?

A computer's output device transmits information to an input device, and the other way around. The computer provides information to an input device, which receives it, and the other way around. Both assertions are false.

What kind of hardware is used in computers?

Computer hardware refers to the actual physical components of a computer, such as the chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, and speakers.

To know more about input device visit :-

https://brainly.com/question/13014455

#SPJ4

which of the following statements are true? local variables do not have default values. data fields have default values. a variable of a primitive type holds a value of the primitive type. all of the above

Answers

True local variables do not all have default values. Data fields come with default options. A primitive type's value is stored in a variable of that type.

Exist default values for data fields?

Data fields come with default options. - No default values exist for local variables. A value of a primitive type is stored in a primitive type variable.

Which of the above techniques can be used to set up many variables with the same value at the beginning?

By using = back-to-back, you can give many variables the same value. This is helpful, for instance, when setting numerous variables to the same value at the beginning. After assigning a value, it is also possible to assign a different value.

To know more about primitive type's visit :-

https://brainly.com/question/16996584

#SPJ4

create a view called IBM_InvoiceData that will retrieve columns and rows from the Invoices table for the vendor named IBM.

Answers

Here is an example of a SQL query that can be used to create a view called IBM_InvoiceData that will retrieve columns and rows from the Invoices table for the vendor named IBM:

CREATE VIEW IBM_InvoiceData AS
SELECT * FROM Invoices
WHERE VendorName = 'IBM';

This query creates a view that selects all columns (*) from the Invoices table where the VendorName column is equal to 'IBM'. The view can then be used in subsequent queries to access the invoice data for the vendor named IBM without having to specify the vendor name in each query. For example, the following query can be used to retrieve the total amount of invoices for IBM:

SELECT SUM(InvoiceAmount) AS TotalInvoices FROM IBM_InvoiceData;

This query uses the IBM_InvoiceData view to select the sum of the InvoiceAmount column, and assigns the result to a column named TotalInvoices. The resulting query would return a single row with the total amount of invoices for IBM.

which of the following statements is true of firewalls? answer unselected they are placed all over the internet. unselected they are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet. unselected they completely prevent network penetration by outsiders and therefore should be viewed as the sole element required for the overall security plan. unselected they are implemented in hardware but not software.

Answers

Answer:

They are used to prevent unauthorized internet users accessing private networks.

Explanation:

in organisations that generate large number of transactions,.............are often a top priority in database designa. relationships among entitiesb.naming conventionsc.logical design standardsd.high processing speeds

Answers

In businesses that produce a lot of transactions, high processing speeds are frequently given top importance in database design.

Can I have ADHD if my processing speed is fast?

No matter what researcher A or B chooses to name it—sluggish cognitive tempo, pure inattentive ADHD, whatever—you can still be highly intelligent. High processing speeds are even possible.

What is Processor Speed and Why Is It Important?

When comparing computers, one of the most crucial factors to take into account is the processor speed (CPU speed). The CPU is frequently referred to as "the brain" of your computer, thus keeping it in good working order is crucial to the durability and functionality of your machine.

To know more Database design visit :-

https://brainly.com/question/14274993

#SPJ4

To select adjacent worksheet tabs, click the first tab, press down and hold down this key, and then click the last tab.Shift

Answers

To select the adjacent worksheet tabs, click the first tab, press down and hold down the shift key and then click the last tab.

What is Microsoft Word?

Microsoft Word is a word processor that may be used to create papers, letters, reports, and other types of writing of a professional calibre. It includes sophisticated capabilities that give you the best formatting and editing options for your files and projects.

What are examples of MS Word?

Application software that enables you to create, edit, and save any documents is an example of Microsoft Word. It was first developed by software engineers Richard Brodie and Charles Simoyi in 1983 and is now owned by Microsoft.

To know more about word processors visit:

https://brainly.com/question/14103516

#SPJ4

one of your customers wants you to build a personal server that he can use in his home. one of his concerns is making sure that he has at least one data backup stored on the server in the event that a disk fails. you have decided to back up his data using raid. since this server is for personal use only, the customer wants to keep costs down. therefore, he would like to keep the number of drives to a minimum. which of the following raid systems would best meet the customer's specifications? RAID 0 RAID 1 RAID 5 RAID 10

Answers

The customer's requirements would be best met by raid systems is Raid 1

Explain about the raid systems?

In order to protect data in the event of a drive failure, RAID (redundant array of independent discs) stores the same data in various locations on numerous hard discs or solid-state drives (SSDs).

Multiple hard drives are combined in RAID, which stands for Redundant Array of Independent Disks, to increase efficiency. RAID can speed up your computer while also offering you a single drive with a sizable capacity, depending on how it is set up. The reliability of RAIDs can also be improved.

Unlike RAID 0 and RAID 1, RAID 5 requires at least three disc drives to operate, making it one of the most popular RAID configurations.

To learn more about raid systems refer to:

https://brainly.com/question/9305378

#SPJ4

to assign a value to a global variable in a function, the global variable must be first declared in the function. T/F

Answers

False. Value can to assigned to a global variable in the function even if we dont declare it before.

How assigning the value of global variable is possible?

Any variable that has to be used inside the function but is declared outside the function is referred to as a global variable. When you need to declare a global variable inside of a function, you use the word global. Normal variables only have a scope that extends to the function's conclusion when they are declared inside.

Utilize the global keyword when declaring the variable if you wish to use it outside of the function as well.

In JavaScript, there are two scopes: local and global. When a variable is assigned directly without being declared, it becomes a global property of the window object.

To know moe about global variables refer:

https://brainly.com/question/29607031

#SPJ4

design a 32 bit counter that adds 4 at each clock edge the counter has reset and clock inputs upon reset the counter output is all 0

Answers

The counter is a digital sequencer, here a 4-bit counter. This simply means that you can count from 0 to 15 or vice versa depending on the counting direction (up/down).

The counter value (“count”) is evaluated on each positive (rising) edge of the clock cycle (“clk”).

If the "reset" input is logic high, the counter is set to zero.

If the "load" signal is logic high, the counter is loaded with the "data" input. Otherwise, count up or count down. If the "up_down" signal is logic high, the counter counts up, otherwise it counts down.

What are counters and their types

A counter is a sequential circuit. A well-known counter is a digital circuit used for counting pulses. Counters are the widest use of flip-flops. There are two types of counters. Asynchronous or ripple counter.

What are counters used for?

Counters are used not only to count, but also to measure frequency and time. increase memory address

To know more about counter visit;

https://brainly.com/question/29131973

#SPJ4

one drawback to the sequential search is that it cannot be used with an array that contains string elements. T/F

Answers

The sequential search has the limitation that it cannot be utilized with arrays containing string elements.Thus, it is false.

What sequential search, an array contains string elements?

Searching linearly over an array of strings for the supplied string is an easy fix. Performing a modified binary search is a better solution.

Get the list of arrays. Get each element of the Array List object using the for-each loop. Make sure the array list's elements all contain the necessary string. Print the elements if applicable.

We compare the given string with the middle string, just like in a standard binary search. If the middle string is empty, we linearly search on both sides for the nearest non-empty string x.

Therefore, it is false that one drawback to the sequential search is that it cannot be used with an array that contains string elements.

Learn more about string here:

https://brainly.com/question/17330147

#SPJ1

Two .o files have been linked together with the command line ld -o p main.o weight_sum.o. Consider the following statements:
(i) There are no more undefined symbols.
(ii) The file must be dynamically linked
(iii) The file is a relocatable object file.
(iv) The file is an executable object file.
(v) There might be one undefined symbol.
(vi) The .bss section consumes no file space.
Which of these statements are correct?
Select one:
a. Only (i) and (iv) are correct (this is not correct)
b. Only (i), (iv) and (vi) are correct (updating on my own -- this is the correct answer)
c. Only (ii) is correct
d. Only (i) and (iii) are correct
e. Only (ii) and (v) are correct
f. None of the above is correct

Answers

Only (i), (iv) and (vi) are correct, since all files are given and are connected with executables.

What is executable files?

An executable file is a file that can be used by a computer to carry out different tasks or operations. An executable file, in contrast to a data file, has been compiled and cannot be read. .BAT,.COM,.EXE, and.BIN are examples of common executable files on an IBM compatible computer.

The.DMG and.APP files can be executed on Apple Mac computers running macOS. Other executable files might also exist, depending on the operating system and its configuration.

You can run our download.exe file on your computer as an example test executable. Congratulations! You've successfully downloaded an executable programme file from the Computer Hope website, says the executable file that displays this message.

Learn more about executable files

https://brainly.com/question/28943328

#SPJ4

Which of the following applications would be a viable reason to use write-only memory in a computer?

Question 20 options:

Using a linked list that can remove elements from the head as well as the tail


Acquiring user input from the keyboard


Preparing geometric shapes for use on a graphics card


None of the above

Answers

Note that of the following applications the one that would be a viable reason to use write-only memory in a computer is: "None of the above" (Option D)

What is write-only memory?

Write-only memory, the inverse of read-only memory, started as a joking allusion to a memory device that could be recorded to but not read, as there appeared to be no practical purpose for a memory circuit that could not be retrieved.

ROM stores the instructions required for communication among various hardware components. As previously stated, it is required for the storage and functioning of the BIOS, but it may also be used for basic data management, to store software for basic utility tasks, and to read and write to embedded systems.

Learn more about write-only memory:
https://brainly.com/question/15302096?
#SPJ1

In the optimistic approach, during the phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values.
a. read b. validation
c. write d. shared

Answers

The correct answer for this problem is a. read

Why does it uses read phase?

In the optimistic approach to concurrency control in database systems, during the read phase, a transaction scans the database and reads the values it needs in order to execute the necessary computations.

This is often referred to as the "read" phase.

If the values have been modified by another transaction, the current transaction may need to abort and retry the process from the beginning. This ensures that transactions are able to execute without conflicting with one another and helps to maintain the integrity of the database.

To Know More About database, Check Out

https://brainly.com/question/29774533

#SPJ4

when producing a map in arcgis to emphasize the results of a suitability analysis, the largest element on the page should be: question 25 options: the location map the map legend the map frame containing the symbolized suitability feature class. the north arrow all these elements should be the same size

Answers

Making indicators for habitat suitability. The two main methods used to produce HSIs are as follows: Data-driven techniques ecological niche modeling This usually entails a statistical study of information about a species' present distribution. The so-called "environmental envelope" strategy is one of the easiest methods.

How do you determine whether a place is appropriate for GIS?

To identify appropriate locations for a project, use the ArcGIS Spatial Analyst extension. There are two approaches to locate appropriate places. To find places that meet your requirements, one method is to query your data. The second method involves creating a suitability map by merging datasets to determine each location's acceptability in the region.

What does the appropriateness test intend to achieve?

Investing firms conduct a suitability test to assess whether a client's investment goals, financial situation, knowledge, and experience are compatible with a particular portfolio management service or investment counseling service.

To know more about ArcGIS visit;

https://brainly.com/question/13431205

#SPJ4

Which of the following blocks would most likely be used to create a string constant from scanned code?

Question 15 options:

{ append_scan(yytext); return TOKEN_STRING; }


{ return TOKEN_STRING; }


{ append_scan(yytext); return TOKEN_STRING; }


{ $$ = createLiteral(scanned_text); }

Answers

The blocks that would most likely be used to create a string constant from scanned code is { append_scan(yytext); return TOKEN_STRING; }. The correct option is c.

What is scanned code?

Code scanning makes it possible to find vulnerabilities and fix them before they are released into production, removing the cybersecurity risks they present.

When scanning a string, the literal "EOL" means "end of the line." When Python encounters an EOL error, it means that it has reached the end of a line in a string. You might have done this by forgetting the closing quotes or by trying to make a string span more than one line. Single or double quotes around strings.

Therefore, the correct option is c, { append_scan(yytext); return TOKEN_STRING; }.

To learn more about scanned code, refer to the below link:

https://brainly.com/question/15098539

#SPJ1

Consider the following class definition
class rectangleType
{
public:
void setLengthWidth(double x, double y);
//Postcondition: length = x; width = y;
void print() const;
//Output length and width;
double area();
//Calculate and return the area of the rectangle;
double perimeter();
//Calculate and return the parameter;
rectangleType();
//Postcondition: length = 0; width = 0;
rectangleType(double x, double y);
//Postcondition: length = x; width = y;
private:
double length;
double width;
};
and the object declaration
rectangleType bigRect(14,10);
Which of the following statements is correct?
(Points : 4)bigRect.setLengthWidth();
bigRect.setLengthWidth(3.0, 2.0);
bigRect.length = 2.0;
bigRect.length = bigRect.width;

Answers

bigRect.setLengthWidth(3.0, 2.0); is the correct declaration of the class variable.

What is a class variable?

Class variables, also known as static variables, are declared using the static keyword within a class but outside of a method, constructor, or block. Regardless of how many objects are created from it, each class variable would only have one copy.

Instance variables are declared within a class but outside of a method. When heap space is allocated to an object, a slot is created for each instance variable value. Instance variables store values that must be referenced by multiple methods, constructors, or blocks, as well as essential parts of an object's state that must be present throughout the class.

Local variables are declared within methods, constructors, or blocks. Local variables are created when the method, constructor, or block is entered, and they are destroyed when the method, constructor, or block is exited.

To know more about Variable, visit: https://brainly.com/question/28463178

#SPJ4

Consider the following incomplete code segment, which is intended to print the sum of the digits in num. For example, when num is 12345, the code segment should print 15, which represents the sum 1 + 2 + 3 + 4 + 5. int num = 12345;int sum = 0;/ missing loop header /{sum += num % 10;num /= 10;}System.out.println(sum);Which of the following should replace / missing loop header / so that the code segment will work as intended?

Answers

The term  that should replace / missing loop header / so that the code segment will work as intended is option A: while (num > 0).

What is the header about?

The body of the code is executed once for each iteration, and the header specifies the iteration.

The body of a for loop, which is executed once each iteration, and the header, which specifies the iteration, are both components. A loop counter or loop variable is frequently declared explicitly in the header.

Therefore, the module and division action inside the loop must be our main attention in order to comprehend why. The crucial thing to remember is that we are adding the numbers in reverse order and that we must repeat this process until we reach the initial number (1%10 = 1). As a result, num must equal one in order to compute the final operation.

Learn more about loop header from

https://brainly.com/question/14675112
#SPJ1

See options below

Which of the following should replace /* missing loop header */ so that the code segment will work as intended?

while (num > 0)

A

while (num >= 0)

B

while (num > 1)

C

while (num > 2)

D

while (num > sum)

E

Which of the following activities is least likely to result in a segmentation fault?

Question 19 options:

Removing an element from the middle of a linked list without fixing the pointers afterwards


Growing the stack too large, such as with an unbounded recursive function


Trying to write into protected space, such as modifying the code segment of the program


Accessing a memory address outside its boundaries

Answers

From the following activities, the one that is least likely to result in a segmentation fault is: "Removing an element from the middle of a linked list without fixing the pointers afterwards" (Option A)

What is a segmentation fault?

A segmentation fault or accessibility violation is a fault, or failure condition, reported by memory-protected hardware that alerts an operating system that software has attempted to access a restricted portion of memory. This is a type of generic protection fault on ordinary x86 machines.

Check whether your compiler or library can be made to check limits on I at least in debug mode, to remedy a segmentation error. Buffer overruns that write trash over excellent pointers can trigger segmentation faults. These actions will significantly minimize the chance of segmentation faults and other memory issues.

Learn more about Segmentation Fault:
https://brainly.com/question/15412053
#SPJ1

To add drop-down lists to your worksheet with predetermined options for each city name, you decide to use _____

Answers

To add drop-down lists to your worksheet with predetermined options for each city name, you decide to use Data validation.

What is worksheet?

In the original sense of the word, a worksheet refers to a piece of paper used for work. They take many different forms, but are most frequently connected to tax forms, accounting, and other business settings. The worksheet made of paper is increasingly being replaced by software.

It might be a printed page that a kid fills out with a writing implement. There is no requirement for additional supplies. It is "a piece of paper used to record work schedules, working hours, special instructions, etc. a piece of paper used to jot down problems, ideas, or the like in a rough form." A worksheet used in education might contain questions for students and spaces for them to record their responses.

Learn more about worksheet

https://brainly.com/question/25130975

#SPJ4

in this lab, your task is to discover whether arp poisoning is taking place as follows: use wireshark to capture packets on the enp2s0 interface for five seconds. analyze the wireshark packets to determine whether arp poisoning is taking place. use the 192.168.0.2 ip address to help make your determination. answer the questions.

Answers

Open Wireshark and choose enp2so from the Capture menu. To start the capture, select Blue fin. Choose the red box to stop after 5 seconds. Enter arp to display those packets in the Apply a display filter box. Look for lines in the Info column that contain the IP 192.168.0.2.

What is meant by which of the following when an attacker sends phony packets to link their MAC address?

An attack known as ARP spoofing involves a malicious actor sending forged ARP (Address Resolution Protocol) packets across a local area network.

To find duplicate IP address traffic, which of the following wireshark filters is used?

For Wireshark to only show duplicate IP information frames, use the arp. duplicate-address-frame filter.

To know more about Wireshark visit :-

https://brainly.com/question/13127538

#SPJ4

Other Questions
Dna has an important role in making proteins, the biomolecules that help determine our traits as well as take part in chemical reactions throughout our bodies. Can you correctly label the steps/parts involved in protein synthesis?. ". Why did the prosecutor in thecase want PresidentNixon'stapes? A steam power plant operates on the simple ideal Rankine cycle between the pressure limits of 10 kPa and 10 MPa, with a turbine inlet temperature of 600 degree C. The rate of heat transfer in the boiler is 800 kJ/s. Disregarding the pump work, the power output of this plant is: A. 284 kW B. 800 kW C. 508 kW D. 243 kW E. 335 kW (ME1000P: Intro to Healthcare) Preconceived negative biases or prejudices about clients of different cultures hamper therapeutic relationships. How might the health care professional assess personal negative biases or prejudices?Write one well-written paragraph and answer the above questions. the records of alberta inc. included the following information: cost of goods sold $1,800,000 beginning inventory 435,000 ending inventory 465,000 use the information above to answer the following question. what is the inventory turnover ratio? a. 4.14 times b. 2.00 times c. 3.87 times d. 4.00 times What kind of sentence is this?In 2013, former vice president Al Gore decided to give up eating all animal productsincluding meat, dairy, and eggs.interrogativeSubmitdeclarativeexclamatory 2. what is it about lumbergh that makes employees loathe him as a manager? provide 3 specific examples. what should he have done instead? When you order a sweater from an L. L. Bean mail-order catalog, what type of marketing channel are you and the company using? james is x years old now, and the sum of his age and his brother's age is 10. how old is james's brother . n specifies fill in the blank 4 l specifies fill in the blank 5 ml specifies fill in the blank 6 ... a.the orbital orientation. b.the energy and average distance from the nucleus. c.the subshell - orbital shape. A sinusoidal function whose period is 2, maximum value is 10, and minimum value is 4 has a y-intercept of 10.What is the equation of the function described?Responsesf(x)=7cos(4x)+3f ( x ) = 7 cos ( 4 x ) + 3f(x)=7sin(4x)+3f ( x ) = 7 sin ( 4 x ) + 3f(x)=7cos(4x)+3f ( x ) = 7 cos ( 4 x ) + 3f(x)=7sin(4x)+3 A student releases the 4kg bob of a 0.47m longpendulum from the position shown.What is the period of the harmonic motion?SWhat is the frequency of the harmonic motion?HzHow many cycles would the pendulum make in45s?6(You may answer with a decimal)6 y= 1/2x + 1 y=-x + 7 Solve. Write answers as an imaginary number y^2+11=2 Based on your data and using deductive reasoning, what can you conclude about the trends in the solubilities of the compounds of the alkaline earth metals? sexual selection in a population choose one: a. can lead to physical differences between the males and females of a species. b. does not lead to evolution. c. reduces genetic variation in the population. d. always favors individuals with a higher survival potential. In AUVW, m/U = (3x - 10), m/V = (6x + 5), and m/W = (4x - 10). What is the value of x? when you deposit $200 in your savings account with the objective of withdrawing it later to buy a video game that is about to be offered in the market in the near future, then the $200 is serving which function? multiple choice medium of exchange store of real assets unit of account store of wealth Identify weather the sentence is ambiguous, remote, or broad reference then rewrite the sentence to eliminate them.1. Joe always knew it was time to feed his fish when he started blowing bubbles.2. Over the summer Frank learned a lot about installing and repairing computers. In fact, it changed his career path.3. We drove to the doctor's office only to find out that they were closed for the day.4. After I read Dickens' A Tale of Two Cities, he became my favorite author.5. We decided to enjoy a walk to the park after eating supper. This became a regular habit.6. We need new tires. I'm sure this makes it unsafe to drive on the freeway.7. Jason received a National Geographic subscription for Christmas, which is his favorite magazine.8. Since the car drips oil on the driveway, put a piece of cardboard under it.9. When Jill picked up Nancy on the way to the game, she said she had forgotten the tickets.10. If a person has income tax questions, the IRS can help you with it.11. If a car accident happens and you leave the scene before the police arrive, it is a crime. Name a product of cellular respiration that is used as a reactant in photosynthesis? (SC.912.L.18.9)02O ATPGlucoseCO 2