during an airline flight, a laptop user makes last-minute changes to a presentation that contains sensitive company information. which of the following would make it difficult for other passengers to view this information on the laptop display?

Answers

Answer 1

Privacy filter make it difficult for other passengers to view this information on the laptop display.

What is Privacy Filter?The privacy screen uses a patented, cutting-edge optical technology known as an ultra-fine louvre. Only the front side can see the content, and the back side is fully opaque, preventing passersby from peeping through the screen content's protective coating. The original anti-reflective, anti-UV, mirror, and anti-radiation films are integrated with the current anti-slip film products. Privacy filter enables you to utilise it anywhere without being concerned about peeks, whether you want to secure your bank information, your company's marketing strategy, or a private photo album. The benefit of the YIPI privacy filter is that it lessens glare, making it simpler to read the screen in dimly lit areas. Additionally, it narrows the screen's viewing angle to 45 degrees.

To learn more about Privacy Filter refer to:

https://brainly.com/question/9017156

#SPJ4


Related Questions

In a reaction, A+B→ Product, rate is doubled when the concentration of B is doubled and rate increases by a factor of 8 when the concentrations of both the reactants (A and B) are doubled. Rate law for the reaction can be written as :A. Rate =k[A][B]2B. Rate =k[A]2[B]2C. Rate =k[A][B]D. Rate =k[A]2[B]

Answers

The correct rate law for this reaction is option C: Rate = k[A][B].

What is rate of chemical reaction?

The rate of a chemical reaction is typically expressed as the change in the concentration of one of the reactants or products over time.

The rate law is an equation that describes how the rate of the reaction is related to the concentrations of the reactants.

In this case, the rate of the reaction is doubled when the concentration of reactant B is doubled, and the rate increases by a factor of 8 when the concentrations of both reactants are doubled.

This can be described by a rate law of the form Rate = k[A][B], where k is the rate constant for the reaction and [A] and [B] are the concentrations of reactants A and B, respectively.

To Know More About reactants, Check Out

https://brainly.com/question/29775547

#SPJ4

returning a value means that whenever any other function calls this function (such as the dosubmit() function), its name is essentially replaced by the value it returns.
a. true
b. false

Answers

Note that It is TRUE to state that returning a value means that whenever any other function calls this function (such as the dosubmit() function), its name is essentially replaced by the value it returns.

What is a function call?

When a function returns a value, it means that the function is essentially replaced by the value that it returns whenever it is called by another function. For example, if a function named "doSubmit()" calls a function named "getValue()" that returns a value of 5, then the doSubmit() function will effectively become the same as if it had been written as "return 5". This allows functions to return data or results to the calling function, which can be useful for a variety of purposes.

Learn more about Function Calls:
https://brainly.com/question/25762866?
#SPJ1

A single site visit usually gives true pictures, so it is unnecessary to visit more than one installation. True or False?

Answers

A single site visit usually gives true pictures, so it is unnecessary to visit more than one installation this statement is False.

Which of the following represents a typical illustration of a system need for the category of service?

System need for the performance category typical example: Identify. Five hours following the conclusion of registration, the records management system must deliver class lists. Find a typical illustration of a system demand for the input segment.

Why do we need several domains?

Utilizing numerous domains can assist you in ranking for a wider range of terms and phrases since your domain has a big impact on your keyword relevancy and rankings. A secondary domain can also be used to develop a completely distinct set of content themes.

To know more about domains visit

brainly.com/question/13153286

#SPJ4

Static binding occurs when the compiler binds a function call with the function call that resides in the same class as the call itself.
True
False

Answers

True. When the compiler ties a function call to a function call that belongs to the same class as the call itself, this is known as static binding.

What is Static binding?Static Binding: Also known as early binding, static binding is a binding that can be resolved by the compiler at the time of compilation. All static, private, and final methods are bound at compile time.Static binding provides better results (no extra overhead is required). These methods are not overridden by the compiler, therefore a local class object will always have access to them. The compiler therefore has no issue identifying the class object (local class for sure). This explains why these methods' binding is static.In dynamic binding, binding is resolved using objects, whereas in static binding, binding is resolved using type information.

To learn more about static binding. refer,

https://brainly.com/question/29833806

#SPJ4

wireless internet access points enable users with computers and mobile devices to connect to the internet wirelessly. TRUE

Answers

Wireless internet access points enable users with computers & mobile devices to connect to internet wirelessly. (True)

What is Wireless internet?

Wireless Internet service providers (WISP) who broadcast wireless Internet signals in a specific geographic area are typically the ones who offer wireless Internet. Satellite signals or radio waves are typically used to deliver wireless Internet.

Wireless Internet is typically slower than wired Internet connections because it is a communication medium that is dependent on the environment. A wireless Internet modem, wireless access card, or Internet dongle is typically needed by the end user to connect to wireless Internet.

Two popular types of wireless Internet are WiMax and EV-Do. Wi-Fi connections inside of a house, office, or local network may also be used to access the Internet wirelessly.

Learn more about wireless Internet

https://brainly.com/question/26956118

#SPJ4

True or False? A computer network is a collection of connected computing devices that may or may not be able to communicate

Answers

A network is made up of two or more computers connected to share resources (such CDs and printers), transfer files, and enable electronic communication. Cables, phone lines, radio waves, satellites, infrared laser beams, or other technologies can all be used to connect the computers on a network. Thus, it is true.

What computer network is a connected device?

A group of computers sharing resources that are available on or offered by network nodes is known as a computer network. Over digital links, the computers communicate with one another using standard communication protocols.

Therefore, it is true that a computer network is a collection of connected computing devices that may or may not be able to communicate.

Learn more about computer here:

https://brainly.com/question/14276789

#SPJ1

The system will support range queries, when stored in main memory, working on a dynamic database (supports inserts and deletes).
Binary Search Tree (assume that it is balanced)
Closed Hash Table
Linear Index
B+ Tree

Answers

When working with the dynamic database Binary Search Tree, the system will handle range queries when the data is kept in main memory.

How many nodes must there be in a binary tree with three levels?

23+1 - 1 = 15 nodes make up a complete binary tree of height 3. Consequently, 300 bytes are needed to store the tree. The tree will have 7 nodes if it has a minimum of 3 nodes and a height of 3.

In a tree, what is depth?

The depth of a tree is defined as all of the edges that connect the root node to a certain node. The depth of the tree is measured by counting all the edges along the longest path from the root node to the leaf node.

To know more about Binary Search visit :-

https://brainly.com/question/29734003

#SPJ4

In this project you will use selection lists to store long lists of hypertext links that might overwhelm a page if displayed within a navigation list. The name of a linked page is displayed as the text of a selection list option while the URL is stored as that option’s value. By selecting an item from one of the selection list options, the browser will open the web page with that selected URL. To script this action, you will use the event object. One of the properties associated with the event object is as follows:
where evt is the variable name assigned to event object and target is the object that received the event. In this project the target is the option selected by the user from one of the selection lists. The event will be the change event. A preview of the page is shown in Figure 6-39.
Figure 6-39
Completed Project 6-2
Do the following:
Use your code editor to open the project06-02_txt.html and project06-02_txt.js files from the js06 â–º project02 folder. Enter your name and the date in the comment section of each file and save them as project06-02.html and project06-02.js, respectively.

Answers

The name of a linked page is displayed as the text of a selection list option while the URL is stored as that html.

what is meant by URL?

A URL is nothing more than the Web address of a specific, particular resource. Theoretically, every legitimate URL leads to a different resource.These resources could be an image, a CSS file, an HTML page, etc. In actuality, there are a few exceptions, the most frequent of which is a URL leading to a resource that has either relocated or vanished.It is the owner of the web server's responsibility to properly maintain the resource that the URL represents as well as the URL itself because the Web server is in charge of both.Different components, some required and others optional, make up a URL.

To learn more about URL refer to

https://brainly.com/question/14716338

#SPJ4

A function can be defined in a Python shell, but it is more convenient to define it in an IDLE window, where it can be saved to a file.

Answers

Although it is possible to define a function in a Python shell, it is more practical to do it in an IDLE window where it may be saved to a file. The assertion that is made is accurate.

What is an idle window?

The typical Python programming environment is called IDLE. Its name is shortened to "Integrated Development Environment." Both Unix and Windows platforms support it well. You can access the Python interactive mode using the Python shell window that is present.

What makes Python and Python shell different from one another?

An interpreter language is Python. It implies that the code is executed line by line. The Python Shell, a feature of the language, can be used to run a Python command and display the results.

To know more about python visit:

https://brainly.com/question/13437928

#SPJ4

Write a short note on the following in Microsoft Excel

1). MAX FUNCTION.
2). MIN FUNCTION.
3). AVERAGE FUNCTION.
4). INT FUNCTION
5). POWER FUNCTION ​

Answers

Answer:

Explanation:

1). The MAX function in Microsoft Excel is used to find the maximum value in a range of cells. For example, if you have a range of cells A1:A10 containing a set of numbers, you can use the formula "=MAX(A1:A10)" to find the maximum value in that range.

2). The MIN function in Microsoft Excel is used to find the minimum value in a range of cells. It works in a similar way to the MAX function, but returns the minimum value instead of the maximum value.

3). The AVERAGE function in Microsoft Excel is used to calculate the average of a set of values. It takes a range of cells as input and returns the mean of the values in that range.

4). The INT function in Microsoft Excel is used to round a number down to the nearest integer. It takes a number as input and returns the integer part of the number.

5). The POWER function in Microsoft Excel is used to calculate the value of a number raised to a certain power. It takes two arguments: the base number and the exponent. For example, the formula "=POWER(2,3)" returns 8, because 2 raised to the power of 3 is 8.

internet-based document preparation sites are categorically forbidden by the aba model rules and operation of such a site always constitutes the unauthorized practice of law.

Answers

The practice of law without a license to do so.

What exactly is unlicensed legal practice?

The practicing of law without a legal license. Prohibits attorneys from practicing law in a jurisdiction “in violation of the regulation of the legal profession in that jurisdiction,” or supporting another in doing so. PDF Readers are the ideal example of a Document Management System since they allow you to access the PDF file offline and save it for viewing, printing, and publishing at any time and from any location.

The Bluebook syntax for quoting the ABA Model Rules of Professional Conduct is: Model Rules of Prof’l Conduct R. # (Year).A lawyer shall not speak about the subject of the representation with a person the lawyer knows to be represented by another lawyer while representing a client.

To learn more about ABA model refer:

https://brainly.com/question/29346237

#SPJ4

Answer

Explanation

use the memory tester to identify which, if any, of the installed memory modules are faulty. place any non-working memory modules on the shelf. install working 32-gb modules as needed. make sure the memory modules are working before installing them. after you install the memory, boot the computer in to the bios setup and verify that the correct amount of memory is detected.

Answers

The read-only memory (ROM) contains the computer's first set of instructions.

What kind of memory module enables BIOS flashing?

Initially, the PC motherboard's ROM chip served as the location for the BIOS firmware. The BIOS data is saved on flash memory in more recent computers so that it can be changed without removing the chip from the motherboard.

What kind of RAM is used during bootup?

ROM and RAM are the two main types of internal memory. Read-only memory is referred to as ROM. Since it is non-volatile, data can be stored on it even when there is no power. Typically, a computer is started or booted up using it.

To know more about memory visit:-

https://brainly.com/question/28754403

#SPJ4

3. Which of these TRUE about supporting ethical practices?
A. Employees are freely to use company software.
B. Employees can use any company resources.
c. Install and maintain a corporate firewall.
D. All the above.​

Answers

Answer:

D. All the above.​

Explanation:

Ron is a junior web developer working on a web site that will function as the primary public facing site of a video game development company called Amazing Games Inc. Ron's immediate, superior (Lucy) has asked Ron to prepare a development server on a cloud provider to serve as a staging server where Ron can verify his site functions properly prior to moving it to the live production server. After 2 weeks of working on a portion of the site on the development server, Ron finishes up the pages that he has been working on. Everything works fine. When he moves the site to the production server, none of the images or CSS files work properly. The images appear as broken links. What is the most likely cause for the problem? O Ron used image types that are not compatible with the staging server but are compatible with the deployment server O Ron used images type that are compatible with the staging server but not compatible with the deployment server O Ron modified the host file on the development server to redirect DNS on the development computer and did not do so on the deployment server O Ron used absolute pathing to reference the files on the development server

Answers

An absolute path is used to specify the complete precise file path, for instance, D:\http\project\lib\file.php. A relative path, on the other hand, is based on the script's location in the current working directory.

Comparing absolute and relative paths?

A relative path identifies a file's location in relation to the active (working) directory*. The distance from the root directory is specified by an absolute path. Relative file paths are frequently used while learning to access data files through programming.

What characteristics make a path an absolute path?

Any file in Windows can have its absolute path found by right-clicking it and selecting Properties. Look at the "Location:" entry in the file properties, which is the path to the file, first.

To know more about absolute pathing visit :-

https://brainly.com/question/28873563

#SPJ4

Part A:
We want to create a class that represents a geometric sequence. A geometric sequence is a sequence of numbers that begin at some value and then multiplies each value by some constant to get the next value. For example, the geometric sequence 1, 2, 4, 8, 16 starts at 1 and multiplies each term by 2 to get the next. The geometric sequence 10.8, 5.4, 2.7, 1.35 starts at 10.8 and multiplies each term by 0.5 to get the next. The basic framework of a geometric sequence class is below:
public class GeometricSequence {
private double currentValue;
private double multiplier;
}Assume that the parameters to the constructor are initialand mult. What should the body of the constructor be?
double currentValue = initial;
double multiplier = mult;
initial = currentValue;
mult = multiplier;
double initial = currentValue;
double mult = multiplier;
currentValue = initial;
multiplier = mult;
________________________________________________________________________________________________________
Part B:
We want to create a class that represents a date. A date has a day, month, and year. For example, the date March 16, 2014 has the day 16, month 3, and year 2014. The parameter variables in the constructor for month, day, and year should be m, d and y. The basic framework of a date class is below:public class Date {
private int day;
private int month;
private int year;
}
What should the body of the constructor be?
day = 1;
month = 1;
year = 1990;
int day = d;
int month = m;
int year = y;
d = day;
m = month;
y = year;
day = d;
month = m;
year = y;

Answers

A public class in Java is an object blueprint that details the properties and methods of objects that fall under that class.  

What is Public Class?An access modifier is a Java public keyword. It can be applied to classes, constructors, methods, and variables. It is the type of access modifier that is least constrained.Everywhere has access to the public access modifier. As a result, we have easy access to both the class and package's public.Any method that is being overridden must not be more restrictive than the original method, which must be stated in the subclass. Therefore, if you give a method or variable the public access modifier, only the public access modifier can be used to override it in a subclass.A programme may only designate one class as public if it has many classes.The name of the programme must be similar to the name of the public class if a class contains one.

To learn more about Public Class refer to:

https://brainly.com/question/15130605

#SPJ4

In general terms, the cloud refers to high-power, large-capacity physical _____ located in data centers, and each one typically hosts multiple _____.

Answers

A data center's high-power, large-capacity physical servers, each of which often houses several virtual servers, are referred to as the "cloud" in general.

By cloud computing, what do you mean?

A type of abstraction known as "cloud computing" is built on the idea of pooling real resources and presenting them to consumers as virtual resources. In the simplest terms, cloud computing refers to the practise of storing and accessing data and software on remote servers located online rather than a computer's hard drive or local server.

A virtual server: what is it?

In contrast to dedicated servers, virtual servers pool hardware and software resources with other operating systems (OS).

To learn more about cloud computing visit:

brainly.com/question/11973901

#SPJ4

A user has a problem accessing several shared folders on the network. After determining the issue is not from his computer's IP configuration, you suspect the shared folder are not currently connected.
Which of the following commands will MOST likely confirm your suspicions?

Answers

In essence, the "Net Use" command is used to confirm if the user is actively connected to the shred folder or not. The net use command is a Command Prompt command that can be used to access, or disable.

How would you browse all networks and shared folders in Windows 10? Which tool?

If you're using Windows 10 or 8.1, File Explorer, or Windows Explorer, if you're using Windows 7, is the easiest way to view the shared folders in Windows. Click or press on the name of your Windows PC after opening it, expanding the Network area from the left side of the window.

Why am I unable to open a shared folder?

The shared folder should be clicked or pressed while holding. On the Sharing tab, click Properties, and then choose Advanced Sharing. Check the box next to Allow for Full Control of Everyone under Permissions, then press Enter.

to know more about computers here:

brainly.com/question/21080395

#SPJ4

Connect to a website and then open a Command Prompt window and run this command to discover the IP address of the website.

Answers

To find the IP address of a website, use Netstat to connect to it, then launch a command prompt window and enter this command.

What command enables you to view a network quickly?

Ipconfig, arp -a, and ping are a few examples of commands that make debugging and scanning straightforward. The OS native commands located in the command line are the simplest approach to quickly retrieve a list of IP addresses and the devices they belong to that are connected to your network.

How can I find my private IP?

To access the private IP address, run ipconfig in the command line prompt after searching for cmd in the Windows search bar. Mac. To access the private IP address, click on network and then system preferences.

To know more about command visit:-

https://brainly.com/question/3632568

#SPJ4

One way to ensure that correct data is entered into a cell or range is to use the Excel data _____ feature.

Answers

Using the Excel data Validation tool is one approach to make sure the right data is entered into a cell or range.

What purpose does the feature for input messages serve?

Users are frequently instructed on the type of data you want them to enter in the cell using input messages. This type of message appears nearby the cell. You have the option of moving this message, and it remains displayed until you select an other cell or use the Esc key.

What does an Excel input formula mean?

The Input function returns every character it reads, including commas, carriage returns, linefeeds, quotation marks, and leading spaces, unlike the Input # statement.

To know more about cell visit:-

https://brainly.com/question/8029562

#SPJ4

the use of simulation in competitive situations such as military games and business games is known as .

Answers

The use of simulation in competitive situations such as military games and business games is known as  Monte Carlo methods.

What is Monte Carlo methods?In order to get numerical results, a large family of computational techniques known as "Monte Carlo procedures" or "Monte Carlo experiments" uses repeated random sampling. The fundamental idea is to employ randomness in order to find solutions to issues that, in theory, might be solved deterministically. They are frequently applied to mathematical and physical issues, and they are most helpful when using other ways is challenging or impossible. Creating draws from a probability distribution, numerical integration, and optimization are the three problem types where Monte Carlo methods are most frequently applied.Monte Carlo methods are helpful for simulating systems with numerous connected degrees of freedom, such as fluids, disordered materials, strongly coupled solids, and cellular structures, in physics-related problems (see cellular Potts model, interacting particle systems, McKean–Vlasov processes, kinetic models of gases).

To learn more about Monte Carlo methods refer to:

https://brainly.com/question/29737518

#SPJ4

Which statement correctly opens an input stream named in_file and attaches it to a file name project.txt?
in_file.open("project.txt");

Answers

in_file.open("project.txt"); Your application pulls characters out of the stream once they have been moved from the disk into it.

What does a C++ file stream mean?

A unique variable with a class as its data type is referred to as a C++ object. The pre-specified special objects in and out have various classes as their data types. The data written to out or read from in are examples of data flows into or out of programs in C++.

In C++, what do ofstream and ifstream mean?

This data type, which is used to create files and write data to them, represents the output file stream. two. if stream When reading data from files, this data type is used to represent the input file stream.

to know more about C++ languages here:

brainly.com/question/29750867

#SPJ1

From this menu you can shut down you computer, access configuration settings, update software, put your Mac to sleep, restart, log out, access recent items, and learn about your Mac.Apple Menu

Answers

The Apple menu is a menu located in the top left corner of the screen on a Mac computer, represented by the Apple logo.

What is Apple menu?

It is a central location from which you can access a variety of options and features related to your Mac, including shutting down or restarting your computer, accessing configuration settings, updating software, putting your Mac to sleep, logging out, accessing recent items, and learning about your Mac.

To access the Apple menu, you can click on the Apple logo in the top left corner of the screen.

This will bring up a drop-down menu with the various options and features mentioned above. You can then select the option you wish to access or use by clicking on it.

Some of the options and features available through the Apple menu may vary depending on the version of the operating system you are using and the specific settings and preferences you have configured.

To Know More About MAC, Check Out

https://brainly.com/question/29388563

#SPJ4

challenge: loops - summing two arrays write a function mergingelements which adds each element in array1 to the corresponding element of array2 and returns the new array.

Answers

The merging elements program is an example of a function and an array.

What is the function merging elements?In C, an array is a method of grouping multiple entities of the same type into a larger group. The above entities or elements may be of int, float, char, or double data type or can include user-defined data types too like structures.Functions are code segments that are executed when they are called.

The Java function for merging elements, where comments are used to explain each action, is as follows:

//The merging elements function is defined here.

public static int mergingelements[](int [] array1, int [] array2)

{

//declaring the new array

   int newArr = new int[array1.length];

//The code below loops through the arrays.

   for(int i=0; i<array1.length; i++ )

{

//This appends the corresponding elements from the two arrays to the new array.

       newArr[i] = array1[i] + array2[i];

   }

//This function returns the new array.

   return newArr;

}

To learn more about java program refer to :

https://brainly.com/question/18554491

#SPJ4

In Section 6.7, we use the following illustration as an incorrect use of semaphores to solve the critical-section problem:
wait(mutex);
... critical section ...
wait(mutex);
Explain why this is an example of a liveness failure.

Answers

The term "liveness" in information security refers to the transmission of data that is occurring right now rather than a replay of data that has already been delivered.

What is liveness failure?

When an activity reaches a point where it can no longer advance at all, it experiences a liveness failure. an example of life. An accidental endless loop where the code might happen in sequential programs.Consistently believe that a variable (memory location) can only have one value and never be "between values."

Instead of bits being scrambled, if processes A and B write a value to the same memory address at the same time, just one of the values from A or B will be written.To enforce mutual exclusion for one resource (let's say one variable or data structure), a straightforward procedure that may be executed by two processes uses busy waiting instead of specialized hardware (a spinlock).

To learn more about liveness failure refer to :

https://brainly.com/question/24540334

#SPJ4

in the c/c program write a separate function for bubble sort. set up a timer using the time() function and record the time difference for the assembly and for the c/c function for sorting. to get meaningful reading, the array should have 10,000 elements or more. the two functions should be given the same, unsorted array to work with. the recorded time differences should be displayed on the console.

Answers

#include <stdio.h>

#include <time.h>

#include <stdlib.h>

//Define the size

#define SIZE 12000

//Time

time_t start, stop;

//Array

int arr[SIZE];

void bubble_sort(int a[]) {

   for(int i=0;i<SIZE;i++) {

       for(int j=0;j<SIZE-i;j++) {

           if(a[j]>a[j+1]) {

               int tmp = a[j];

               arr[j] = arr[j+1];

               arr[j+1] = tmp;

           }

       }

   }

}

int main(int argc, char* argv[]) {

   //Random filling

   srand(time(NULL));

   //Array initialization

   for(int i=0;i<SIZE;i++) {

       arr[i] = rand() % 100;

   }

   //Bubble sort

   start = time(NULL);

   bubble_sort(arr);

   stop = time(NULL);

   //Print the time difference between stop and start.

   printf("Time difference is: %.2f s.\n",difftime(stop,start));

   return 0;

}

LAB: Circle with a Promise (please help)
The given web page displays a growing orange circle when the Show Circle button is clicked. Your goal is to show a text message inside the circle as show below, by creating callbacks for a Promise object.
The circle.js file contains a click event handler showCircleClick() for the Show Circle button that calls showCircle() to display the orange circle.
The showCircle() function returns a Promise object that may be fulfilled or rejected.
The promise is fulfilled in one second if showCircle() is not called a second time before the second elapses.
The promise is rejected if showCircle() is called a second time before the second elapses.
Modify the showCircleClick() to call showCircle() and handle the fulfilled or rejected callbacks using the returned Promise's then() method.
If the promise is fulfilled, the containing the circle is passed to the callback function. The message "Ta da!" should be added to the 's inner HTML.
If the promise is rejected, an error message is passed to the callback function. The error message should be displayed using alert().
If your modifications are written correctly, you should see the "Ta da!" message appear one second after the Show Circle button is clicked. If you click Show Circle twice quickly, you should see the error message appear in the alert dialog box, as shown below.
---------------------------------------------given code---------------------------------------------------
window.addEventListener("DOMContentLoaded", function () {
document.querySelector("#showCircleBtn").addEventListener("click", showCircleClick);
});
function showCircleClick() {
// TODO: Add modifications here
showCircle(160, 180, 120);
}
// Do not modify the code below
let timerId = null;
function showCircle(cx, cy, radius) {
// Only allow one div to exist at a time
let div = document.querySelector("div");
if (div !== null) {
div.parentNode.removeChild(div);
}
// Create new div and add to DOM
div = document.createElement("div");
div.style.width = 0;
div.style.height = 0;
div.style.left = cx + "px";
div.style.top = cy + "px";
div.className = "circle";
document.body.append(div);
// Set width and height after showCircle() completes so transition kicks in
setTimeout(() => {
div.style.width = radius * 2 + 'px';
div.style.height = radius * 2 + 'px';
}, 10);
let promise = new Promise(function(resolve, reject) {
// Reject if showCircle() is called before timer finishes
if (timerId !== null) {
clearTimeout(timerId);
timerId = null;
div.parentNode.removeChild(div);
reject("showCircle called too soon");
}
else {
timerId = setTimeout(() => {
resolve(div);
timerId = null;
}, 1000);
}
});
return promise;
}

Answers

Code modifications :

// modified code

window.addEventListener("DOMContentLoaded", function () {

document.querySelector("#showCircleBtn").addEventListener("click", showCircleClick);

});

function showCircleClick() {

// TODO: Add modifications here

showCircle(160, 180, 120).then(function(div) {

div.innerHTML = "Ta da!";

}, function(error){

alert(error);

});

}

// Do not modify the code below

let timerId = null;

function showCircle(cx, cy, radius) {

// Only allow one div to exist at a time

let div = document.querySelector("div");

if (div !== null) {

div.parentNode.removeChild(div);

}

// Create new div and add to DOM

div = document.createElement("div");

div.style.width = 0;

div.style.height = 0;

div.style.left = cx + "px";

div.style.top = cy + "px";

div.className = "circle";

document.body.append(div);

// Set width and height after showCircle() completes so transition kicks in

setTimeout(() => {

div.style.width = radius * 2 + 'px';

div.style.height = radius * 2 + 'px';

}, 10);

let promise = new Promise(function(resolve, reject) {

// Reject if showCircle() is called before timer finishes

if (timerId !== null) {

clearTimeout(timerId);

timerId = null;

div.parentNode.removeChild(div);

reject("showCircle called too soon");

}

else {

timerId = setTimeout(() => {

resolve(div);

timerId = null;

}, 1000);

}

});

return promise;

}

These are the modifications to be done in the code to make it properly  work to get the outcome.

What is code ?

For the purposes of communication and information processing, a code is a set of principles that technology is getting as a letter, word, sound, picture, or gesture—into another form, often shorter or secret, for storage on a storage device or for transmission over a channel of communication. An early example is the development of language, which allowed people to express verbally what they were thinking, seeing, hearing, or feeling to others. However, speaking restricts the audience to those present at the time the speech is delivered and limits that range of communication towards the distance a voice may travel. The ability to communicate across space and time was greatly expanded by the discovery of printing, which converted spoken language into pictorial symbols.

To know more about code

brainly.com/question/1603398

#SPJ4

Which statement produces a compilation error?
A. class A extends M implements I, L, J {// code was removed}
B. class A extends M, N implements I {// code was removed}
C. class A extends M implements I {// code was removed}
class B extends N implements I {// code was removed}
D. class A extends M implements I {// code was removed}

Answers

Class A extended M, and N implements I, however the sentence "/ code was removed" causes a compilation problem.

Compilation error: what is it?

When a compilers is unable to convert a section of code base for a programming language, it results in a compilation error. This can happen due to errors in the source code as well as, less frequently, due to issues with the processor. The source code can commonly be used by programmers to correct compilation issues.

Several things could cause a compilation error.

When the compiler detects a problem using your application but is unable to convert it into machine language, it produces a compile error. Compilation mistakes will show up. During assembly, the computer may find semantic errors, linker errors, and syntax problems.

To know more about compilation error visit:

https://brainly.com/question/13735734

#SPJ4

___________ search refers to an internet search on websites such as Yelp. ___________ search refers to knowledge based on personal experience

Answers

External search refers to an internet search on websites such as Yelp. Internal search refers to knowledge based on personal experience.

What is internet search?

An internet search, also referred to as a search query, is a submission to a search engine that produces both paid and organic results. Ads at the top and bottom of the page are considered paid results and are labelled as such. The unmarked results that show up in-between the ads are the organic results.

A keyword is the essential component of an internet search. Likewise, search engine marketing (SEM) and search engine optimization are driven by keywords (SEO). The practise of placing advertisements on search engine results pages is known as search engine marketing, also referred to as paid search (SERPs).

Learn more about search engine

https://brainly.com/question/512733

#SPJ4

suppose that an adversary, eve, creates a public and private key and tricks bob into registering pke as a trusted certificate authority (that is, bob thinks eve is a trusted certificate authority). assume that alice is a web server and bob a client and they connect to one another using ssl/tls. show a man in the middle attack allowing eve to listen in on all communication between alice and bob even if alice and bob use ssl/tls and even if alice (the server) has a certificate from a real certificate authority (alice does not trust eve as a ca).

Answers

Note that in a man-in-the-middle (MITM) attack, Eve acts as an intermediary between Alice and Bob, allowing her to intercept and potentially modify their communication.

What is a Man in the Middle Attack?

A man-in-the-middle (MITM) attack occurs when a perpetrator inserts himself into a dialogue between a user and an application, either to eavesdrop or to mimic one of the parties, giving the impression that a regular flow of information is taking place.

Here's how the attack could work:

Eve creates a public and private key and tricks Bob into registering PKE as a trusted certificate authority.

Alice and Bob establish an SSL/TLS connection using certificates from a real certificate authority (CA).

Eve intercepts the connection between Alice and Bob and establishes a separate SSL/TLS connection with each of them using her own certificate from PKE.

Bob trusts PKE as a CA, so he accepts Eve's certificate as valid.

Alice, however, does not trust PKE as a CA, so she may reject Eve's certificate. To bypass this, Eve can present Alice with a forged certificate from a real CA that Alice trusts.

Once Alice accepts the forged certificate, Eve has successfully established separate SSL/TLS connections with both Alice and Bob.

Eve can now intercept and potentially modify the communication between Alice and Bob, even though they are using SSL/TLS and have certificates from a real CA.

It's important to note that SSL/TLS and certificates from a real CA can still provide a high level of security against MITM attacks, but it is important for clients to carefully verify the identity of the certificate issuer and to ensure that they are not accepting forged certificates.

Learn more about MITM attack:
https://brainly.com/question/29851088?
#SPJ1

Currently, the iMAC is an important product for Apple. While the personal computer market is not growing very quickly, Apple maintains a large share___cash cow

Answers

The iMAC is a crucial item for Apple right now. Even though the personal computer market is not expanding significantly, Apple continues to be a cash cow with a sizable market share.

What do you mean by cash cow of Apple ?

A market leader with a large (or greatest) market share in a niche with little to no growth is considered a cash cow. Although I am unsure if Stanford's MS in Computer Science is the industry leader, I firmly believe that the market for computer science will continue to increase. The cash cow for Apple (AAPL) is the iPhone. Apple can put the extra money made by the iPhone's sales into other goods or projects since its return on assets is much higher than its rate of market growth.

In the Apple BCG matrix, there are two goods that are the money makers. These include iMacs, Apple MacBooks, and Apple iTunes. These goods have enhanced the company's cash flows and kept their market share over time.

To learn more about cash cow refer to:

https://brainly.com/question/13975134

#SPJ4

Other Questions
the quadtratic expression -3x^2 +6x + 72 will equal zero when x equals An airplane is preparing to land at an airport. It is 55800 feet above the ground and is descending at the rate of 3,500 feet per minute. At the same airport, another airplane is taking off and will ascend at the rate of 2,700 feet per minute. When will the two airplanes be at the same altitude and what will that altitude be? Use pencil and paper. Use two other methods to solve the problem. Explain which methods are easier to use and which are more difficult to use for the situation. Janice and Stephanie have been close friends for some time. When Stephanie recently lost her job, she couldn't afford her rent anymore and was on the verge of homelessness. Janice invited her to come and stay in her extra room for as long as needed to. In return, Stephanie insisted on doing housework and most of the cooking. According to equity theory, which of the following statements about this relationship scenario is true? If performance under a contract will vary materially on a delegation of its duties to a third party from that expected by the obligee, the delegation is Time Runnit Attempt due: 4 Minutes, 2 O prohibited. Opermitted on sufficient notice by the notice by the obligor. permitted if special trust has been place in the obligor. O permitted if the performance does not require the obligor's personal skills pertains to performance and the quality and quantity of task outputs as defined by team goals. a. commitment b. norm c. productive output d. capacity to adapt e. satisfaction 20Write "less" or "greater" in the blank.972 isthan 792 Which expression is equivalent to 10d+d-2d?d+89d9d1+8d1+8d11d11dpls help Larry has retired from his career as a city administrator, disengaging from his work life. In a case like this, disengagement in one area of life according to the us bureau of labor statistics (as cited in american association of colleges of nursing, 2019), over 200,000 new rns will be needed each year through 2026 to replace nurses who retire and to fill new positions. national council of state boards of nursing and the forum of state nursing workforce centers (as cited in american association of colleges of nursing, 2019) reported that about 51% of today's rns are 50 years old or older. these are dramatic numbers and represent a challenge for future nurse leaders and managers. if you were a nurse leader or manager, how would you retain the nurses you have? how would you recruit additional nurses? in your opinion, what do you think the future of the nursing workforce will look like in 50 years? Your company hires a third party vendor to design a "world class" intrusion detection system. Your network hosts 500 desktop computers and has two live (physically and logically) diverse Ethernet connections to the Internet. The vendor proposes the following solution: 1. A host based desktop intrusion detection system --$25 per copy 2. A host-based IDS server management system --$25,000 3. A network intrusion detection system (handles one Ethernet connection)--$7500 4. An off-site, third-party monitoring of the intrusion detection system--$9000 per month You have been tasked by your boss to determine the total cost of ownership for the first year for off-site monitoring versus in-house intrusion detection with the new UTSA hires. Complete the following calculations to help you compile your report. The estimated cost of the host-based IDSs will be $_____ The estimated cost of the IDS server will be $_____ The estimated cost of the NIDS server will be $_____ The estimated cost of on-site monitoring will be $_____ The estimated cost of the off-site monitoring will be $_____ The estimated on-site TCO will be $_____ The estimated off-site TCO will be $_____ a long, straight, thin-walled cylindrical shell of radius r carries a current i. find the magnetic field outside the cylinder (r > r) and inside the cylinder (r < r). The procurement process for indirect materials should focus on decreasing the transaction cost for each order. True or false identify one piece of evidence not found in the source that would support the author's claim regarding representative government. Analyze this weather map and provide five specific dxamples of weather conditions found in this map. Use the textbox below to record your observations and number your examples. Give detail. cardiorespiratory endurance is the ability of the heart and lungs to deliver oxygen to the muscles during physical activity. I Review According to the biogeochemical cycle shown below, which of the following processos can move carbon from the abiotic reservoir to the biotic reservoir? Geological processes contribute to the abicceservous. For example, erosion may transfermiers from rock to sol Abiotic reservers are non living components of an ecosystem where chemicals accumulate. For example, carbon cumulates in the atmosphere as Col while wygen accumulates when it is dissolved in seawater Preducers incorporate inorganic chemicals from an abiotic reservoir Into organic compounds For example, a plant uses Co, from the air to make glucose via photosynthesis When consumers feed, they incorporate the chemicals of food into their own bodies. For example, a deer munching on grass incorporates some of the nutrients from that grass into sing tissue. BIOTIC COMPONENTS Decomposers break down the organic molecules in wastes and dead organism. The sample compounds they release become part of the abiotic reservoir. the study of fresh water ecosystems is called O limnology.O EthologyO SynezologyO AutecologyAnswer: limnology. Check the answer that applies; there may be more than one answer This problem reads as follows:Use cylindrical coordinates to evaluate E = This problem reads as follows: Use cylindricax2 dV, where E is the solid that lieswithin the cylinder x2 + y2 = 9, above theplane z = 0, and below the conez2 = 36x2 + 36y2Similar to 16.8 #11 in James Stewart Calculus 5thedition. TRUE OR FALSE according to chapter 2, there is a theory that says we tend to develop a self concept based on the way we believe others see us. according to this theory, everyone we encounter influences our self concept.