HELP ITS A TESTTT!!!Which symbol shows auto correct is in use?

A-a white light bulb
B-A green plus sign
C-A flashing red circle
D-A yellow lightning bolt

Answers

Answer 1
After careful consideration the answer to this problem looks to be D
Answer 2

Answer:

D

Explanation:


Related Questions

The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.
A. mathematical.
B. timing.
C. chosen ciphertext.
D. brute-force.

Answers

Answer:

chosen ciphertext

Explanation:

Chosen ciphertext attack is a scenario in which the attacker has the ability to choose ciphertexts C i and to view their corresponding decryptions – plaintexts P i . It is essentially the same scenario as a chosen plaintext attack but applied to a decryption function, instead of the encryption function.

Cyber attack usually associated with obtaining decryption keys that do not run in fixed time is called the chosen ciphertext attack.

Theae kind of attack is usually performed through gathering of decryption codes or key which are associated to certain cipher texts

The attacker would then use the gathered patterns and information to obtain the decryption key to the selected or chosen ciphertext.

Hence, chosen ciphertext attempts the use of modular exponentiation.

Learn more : https://brainly.com/question/14826269

Which of the following CALL instructions writes the contents of EAX to standard output as a signed decimal integer?
a. call WriteInteger
b. call WriteDec
c. call WriteHex
d. call WriteInt

Answers

Answer:

d. call WriteInt

Explanation:

Required

Instruction to write to decimal integer

Of the 4 instructions, the call WriteInt instruction is used write to a decimal integer.

This is so, because the WriteInt instruction writes a signed decimal integer to standard output.

This implies that the output will have a sign (positive or negative) and the output will start from a digit other than 0 (i.e. no leading zero)

What does Falstaff do to protect himself in battle? ​

Answers

bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark bark

Design a class named Employee. The class should keep the following information in member variables:
Employee name
Employee number
Hire Date
Write one or more constructors and the appropriate accessor and mutator functions for the class.
Next, write a class named ProductionWorker that is derived from the Employee class. The ProductionWorker class should have member variables to hold the following information:
Shift (an integer)
Hourly pay rate (a double)
The workday is divided into two shifts: day and night. The shift variable will hold an integer value representing the shift that the employee works. The day shift is shift 1 and the night shift is shift 2. Write one or more constructors and the appropriate accessor and mutator functions for the class. Demonstrate the classes by writing a program that uses a ProductionWorker object."
Now I have written out the program, it compiles without errors. However, when I run it It asks the first question "Employees name" after input it errors and closes itself down. Can anyone find where in my code it is causing it to do this please? To be clear, I am not asking for someone to write the program, I have already done this, just need to know why it compiles but does not run all the way through. Thank You!
#include
#include
#include
using namespace std;
class Employee
{
private:
string employeeName;
int employeeNumber;
int hireDate;
public:
void setemployeeName(string employeeName);
void setemployeeNumber(int);
void sethireDate(int);
string getemployeeName() const;
int getemployeeNumber() const;
int gethireDate() const;
Employee();
{

Answers

Answer:

Here is the code.

Explanation:

#include <iostream>

#include <cstdlib>

#include <string>

#include <iomanip>

using namespace std;

class Employee

{

private:

string employeeName;

int employeeNumber;

int hireDate;

public:

void setemployeeName(string employeeName);

void setemployeeNumber(int);

void sethireDate(int);

string getemployeeName() const;

int getemployeeNumber() const;

int gethireDate() const;

Employee();

};

void Employee::setemployeeName(string employeeName)

{

employeeName = employeeName;

}

void Employee::setemployeeNumber(int b)

{

employeeNumber = b;

}

void Employee::sethireDate(int d)

{

hireDate = d;

}

string Employee::getemployeeName() const

{

return employeeName;

}

int Employee::getemployeeNumber() const

{

return employeeNumber;

}

int Employee::gethireDate() const

{

return hireDate;

}

Employee::Employee()

{

cout << "Please answer some questions about your employees, ";

}

class ProductionWorker :public Employee

{

private:

int Shift;

double hourlyPay;

public:

void setShift(int);

void sethourlyPay(double);

int getShift() const;

double gethourlyPay() const;

ProductionWorker();

};

void ProductionWorker::setShift(int s)

{

Shift = s;

}

void ProductionWorker::sethourlyPay(double p)

{

hourlyPay = p;

}

int ProductionWorker::getShift() const

{

return Shift;

}

double ProductionWorker::gethourlyPay() const

{

return hourlyPay;

}

ProductionWorker::ProductionWorker()

{

cout << "Your responses will be displayed after all data has been received. "<<endl;

}

int main()

{

ProductionWorker info;

string name;

int num;

int date;

int shift;

double pay;

cout << "Please enter employee name: ";

cin >> name;

cout << "Please enter employee number: ";

cin >> num;

cout << "Please enter employee hire date using the format \n";

cout << "2 digit month, 2 digit day, 4 digit year as one number: \n";

cout << "(Example August 12 1981 = 08121981)";

cin >> date;

cout << "Which shift does the employee work: \n";

cout << "Enter 1, 2, or 3";

cin >> shift;

cout << "Please enter the employee's rate of pay: ";

cin >> pay;

info.setemployeeName(name);

info.setemployeeNumber(num);

info.sethireDate(date);

info.setShift(shift);

info.sethourlyPay(pay);

cout << "The data you entered for this employee is as follows: \n";

cout << "Name: " << info.getemployeeName() << endl;

cout << "Number: " << info.getemployeeNumber() << endl;

cout << "Hire Date: " << info.gethireDate() << endl;

cout << "Shift: " << info.getShift() << endl;

cout << setprecision(2) << fixed;

cout << "Pay Rate: " << info.gethourlyPay() << endl;

system("pause");

return 0;

}

x-1; while x ==1 disp(x) end, then the result a. infinity or b. (1) ​

Answers

Answer:

1 is the answer because ur trying to trick us

Explanation:

Examine the following output:
4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62]
5 39 ms 39 ms 65 ms placa01gr00.bb.ispxy.com [154.11.12.11]
6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14]
7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [204.171.205.29]
8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1]
Which command produced this output?
a. tracert
b. ping
c. nslookup
d. netstat

Answers

Answer:

a. tracert

Explanation:

Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.

Viết chương trình kiểm tra số nguyên dương N có phải là số nguyên tố không?

Answers

Could you say that in English please? I can try helping

Given two regular expressions r1 and r2, construct a decision procedure to determine whether the language of r1 is contained in the language r2; that is, the language of r1 is a subset of the language of r2.

Answers

Answer:

Test if L(M1-2) is empty.

Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M2-1) is empty.

Answer yes if and only if both answers were yes.

Explanation:

An algorithm must be guaranteed to halt after a finite number of steps.

Each step of the algorithm must be well specified (deterministic rather than non-deterministic).

Three basic problems:

Given an FA M and an input x, does M accept x?

Is x in L(M)

Given an FA M, is there a string that it accepts?

Is L(M) the empty set?

Given an FA M, is L(M) finite?

Algorithm for determining if M accepts x.

Simply execute M on x.

Output yes if we end up at an accepting state.

This algorithm clearly halts after a finite number of steps, and it is well specified.

This algorithm is also clearly correct.

Testing if L(M) is empty.

Incorrect "Algorithm"

Simulate M on all strings x.

Output yes if and only if all strings are rejected.

The "algorithm" is well specified, and it is also clearly correct.

However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.

COMMENT: Note we use the algorithm for the first problem as a subroutine; you must think in this fashion to solve the problems we will ask.

Correct Algorithm

Simulate M on all strings of length between 0 and n-1 where M has n states.

Output no if and only if all strings are rejected.

Otherwise output yes.

This algorithm clearly halts after a finite number of steps, and it is well specified.

The correctness of the algorithm follows from the fact that if M accepts any strings, it must accept one of length at most n-1.

Suppose this is not true; that is, L(M) is not empty but the shortest string accepted by M has a length of at least n.

Let x be the shortest string accepted by M where |x| > n-1.

Using the Pumping Lemma, we know that there must be a "loop" in x which can be pumped 0 times to create a shorter string in L.

This is a contradiction and the result follows.

COMMENT: There are more efficient algorithms, but we won't get into that.

Testing if L(M) is finite

Incorrect "Algorithm"

Simulate M on all strings x.

Output yes if and only if there are a finite number of yes answers.

This "algorithm" is well specified and correct.

However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.

COMMENT: Note we again use the algorithm for the first problem as a subroutine.

Correct Algorithm

Simulate M on all strings of length between n and 2n-1 where M has n states.

Output yes if and only if no string is accepted.

Otherwise output no.

This algorithm clearly halts after a finite number of steps, and it is well specified.

The correctness of the algorithm follows from the fact that if M accepts an infinite number of strings, it must accept one of length between n and 2n-1.

This builds on the idea that if M accepts an infinite number of strings, there must be a "loop" that can be pumped.

This loop must have length at most n.

When we pump it 0 times, we have a string of length less than n.

When we pump it once, we increase the length of the string by at most n so we cannot exceed 2n-1. The problem is we might not exceed n-1 yet.

The key is we can keep pumping it and at some point, its length must exceed n-1, and in the step it does, it cannot jump past 2n-1 since the size of the loop is at most n.

 This proof is not totally correct, but it captures the key idea.

COMMENT: There again are more efficient algorithms, but we won't get into that.

   Other problems we can solve using these basic algorithms (and other algorithms we've seen earlier this chapter) as subroutines.

       COMMENT: many of these algorithms depend on your understanding of basic set operations such as set complement, set difference, set union, etc.

Given a regular expression r, is Lr finite?

Convert r to an equivalent FA M.

COMMENT: note we use the two algorithms for converting a regular expression to an NFA and then an NFA to an FA.

Test if L(M) is finite.

Output the answer to the above test.

Given two FAs M1 and M2, is L(M1) = L(M2)?

Construct FA M1-2 from M1 and M2 which recognizes the language L(>M1) - L(>M2).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M1-2) is empty.

Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M2-1) is empty.

Answer yes if and only if both answers were yes.

Write a method that prints on the screen a message stating whether 2 circles touch each other, do not touch each other or intersect. The method accepts the coordinates of the center of the first circle and its radius, and the coordinates of the center of the second circle and its radius.

The header of the method is as follows:

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2)


Hint:

Distance between centers C1 and C2 is calculated as follows:
d = Math.sqrt((x1 - x2)2 + (y1 - y2)2).

There are three conditions that arise:

1. If d == r1 + r2
Circles touch each other.
2. If d > r1 + r2
Circles do not touch each other.
3. If d < r1 + r2
Circles intersect.

Answers

Answer:

The method is as follows:

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2){

    double d = Math.sqrt(Math.pow((x1 - x2),2) + Math.pow((y1 - y2),2));

    if(d == r1 + r2){

        System.out.print("The circles touch each other");     }

    else if(d > r1 + r2){

        System.out.print("The circles do not touch each other");     }

    else{

        System.out.print("The circles intersect");     }

}

Explanation:

This defines the method

public static void checkIntersection(double x1, double y1, double r1, double x2, double y2, double r2){

This calculate the distance

    double d = Math.sqrt(Math.pow((x1 - x2),2) + Math.pow((y1 - y2),2));

If the distance equals the sum of both radii, then the circles touch one another

    if(d == r1 + r2){

        System.out.print("The circles touch each other");     }

If the distance is greater than the sum of both radii, then the circles do not touch one another

   else if(d > r1 + r2){

        System.out.print("The circles do not touch each other");     }

If the distance is less than the sum of both radii, then the circles intersect

   else{

        System.out.print("The circles intersect");     }

}

What do application in productivity suites have in common

Answers

Answer:

The function of the suites application is to create presentations and perform numerical calculations.

Explanation:

The following pseudocode describes how a widget company computes the price of an order from the total price and the number of the widgets that were ordered. Read the number of widgets. Multiple the number of widgets by the price per widget of 9.99. Compute the tax (5.5 percent of the total price). Compute the shipping charge (.40 per widget). The price of the order is the sum of the total widget price, the tax, and the shipping charge. Print the price of the order

Answers

Answer:

The program in Python is as follows:

widget = int(input("Widgets: "))

price = widget * 9.9

tax = price * 0.55

ship = price * 0.40

totalprice = price + tax + ship

print("Total Price: $",totalprice)

Explanation:

The question is incomplete, as what is required is not stated.

However, I will write convert the pseudocode to a programming language (in Python)

Get the number of widgets

widget = int(input("Widgets: "))

Calculate price

price = widget * 9.9

Calculate the tax

tax = price * 0.55

Calculate the shipping price

ship = price * 0.40

Calculate the total price

totalprice = price + tax + ship

Print the calculated total price

print("Total Price: $",totalprice)

Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data backups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will automatically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.

Answers

Answer:

Acronis True Image is the one I would recommend out of these mentioned online backup services.

Explanation:

The evaluations and reviews of each of the online backup services are as follows:

a. iDrive

For this, we have:

Speed = 60% - fair

Security = 100% - excellent

Privacy = 88% - very good

Features = 95% - excellent

Pricing = 85% - Very good

Because of its various features, pricing, and usability, IDrive reviews suggest that it is a very efficient online backup solution. However, there have been complaints concerning its speed and the fact that there are no monthly plans available.

b. Carbonite

For this, we have:

Speed = 60% - fair

Security = 100% - excellent

Privacy = 87% - very good

Pricing = 85% - very good

File backup and restoration = 75% - good

Carbonite reviews reveal that it is simple to use and provides limitless backup for one device. The main drawback is that it has extremely poor backup speeds.

c. Acronis True Image

This is fast, simple and intuitive

It has complete control over the backup updates, including how and when they occur.

It is not expensive.

Acrnonis True image is a powerful backup storage service. It enables data and file backup and restoration from USB drives.

Many reviewers of Acrnonis True image have stated that they have had no issues with its service, that it is worth purchasing, and that there are no concerns.

d. Backblaze

For this, we have:

Speed = 75% - good

Security = 75% - good

Privacy = 70% - decent

Pricing = 100% - excellent

Support = 95% - excellent

Features = 65% - decent

File back-up and restoration = 70% - decent

Backblaze is one of the most popular internet backup services. This storage service, however, does not allow for ustomization.

Recommendation

Acronis True Image is the one I would recommend out of these mentioned online backup services. This is due to the fact that it delivers a large amount of accurate and high-quality data storage. It is quick, simple and intuitive, which is what most people care about. Furthermore, reviewers have stated that this service is quite effective and that there have been very few issues with it. The other services demonstrate that their services have flaws, such as lack of customization and slowness.

While saving a document to her hard drive, Connie's computer screen suddenly changed to display an error message on a blue background. The error code indicated that there was a problem with her computer's RAM. Connie's computer is affected by a(n) __________.

Answers

Answer:

The right answer is "Hardware crash".

Explanation:

According to the runtime error message, this same RAM on your machine was problematic. This excludes file interoperability or compliance problems as well as program error possibilities.Assuming implementation performance problems exist, the timeframe that would save the information would be typically longer, but there's still a lower possibility that the adequacy and effectiveness color will become blue but instead demonstrate warning would appear.

Thus the above is the right solution.

what's the difference between pseudo code and natural language​

Answers

Answer:

The pseudo-code describes steps in an algorithm or another system in plain language. Pseudo-Code is often designed for human reading rather than machine reading with structural conventions of a normal language of programming.

Natural languages consist of phrases, usually declarative phrases, with a sequence of information.

Explanation:

Pseudo-Code is often designed for human reading rather than machine reading with structural conventions of a normal language of programming. It usually omits information that is essential to the understanding of the algorithm by the machine, for example, variable declarations and language code.Easily human, but not machines, use the natural languages (like English).Natural languages also are creative. Poetry, metaphor, and other interpretations are permitted. Programming permits certain style differences, but the significance is not flexible.The aim of using pseudo-code is to make it easier for people to comprehensibly than standard programming language code and to describe the key principles of an algorithm efficiently and environmentally independently. It is usually used for documenting software and other algorithms in textbooks and scientific publications.

How are dates and times stored by Excel?​

Answers

Answer:

Regardless of how you have formatted a cell to display a date or time, Excel always internally stores dates And times the same way. Excel stores dates and times as a number representing the number of days since 1900-Jan-0, plus a fractional portion of a 24 hour day: ddddd. tttttt

Explanation:

mark me as BRAINLIEST

follow me

carry on learning

100 %sure

Dates are stored as numbers in Excel and count the number of days since January 0, 1900. Times are handled internally as numbers between 0 and 1. To clearly see this, change the number format of cell A1, B1 and C1 to General. Note: apparently, 42544 days after January 0, 1900 is the same as June 23, 2016

Ten examples of an interpreter

Answers

Answer:

Some popular examples of today's interpreters are:

Interpreter of PythonInterpreter for RubyPerl performerInterpreter for PHPMATLAB UCSD Pascal

Explanation:

An interpreter executes the commands directly in an object code or a machine code, written in a program or a scripting language.

The Interpreter can be referred to as system software that can read and execute the programme instead of interpreting programmes. This interpretation includes high-level source code, pre-compiled programmes and scripts.

It is important to note that the interpreter translates programme by programme line, meaning that one statement is translated on one go. This feature makes it easy for programmers to check any line on debugging but slows the whole programme running time.

computer is an ............. machine because once a task is intitated computer proceeds on its own t ill its completion.​

Answers

Answer:

I think digital,versatile

computer is an electronic digital versatile machine because once a task is initiated computer proceeds on its own till its completation.

Other Questions
In order to update a production process, a company can spend money now or four years from now. If the amount now would be $20,000, what equivalent amount could the company spend four years from now at a compound interest rate of 15% per year?(All the alternatives presented below were calculated using compound interest factor tables including all decimal places Select the correct answer. Which statement best expresses how the poet develops the theme in the poem? A. The speaker describes dreams as things people hold closely to their hearts. B. The speaker contrasts heart break to the joys of singing. C. The poet contrasts singing a song to pursuing one's dreams. D. The poet describes dreams as a repeated song. E. The poet compares giving up on a dream to death. What are you doing to keep yourself healthy and fit whats the answer :)?i will give brainslist I need some help; if you don't know the answer, don't answer llusFind the value of x that makes A || B.2435Z2 = 2x + 10 and 24 = 4x + 80x = [?]Enter Ivan is saving money to buy a game. So far he has saved 8, which is one-fourth of the total cost of the game. How much does the game cost? What is the formula of a palindrome? The enumeration in the Constitution, of certain rights, shallnot be construed to deny or disparage others retained bythe people.-Amendment IX, Bill of Rights, 1789 Future pension liabilities are estimated based on all of the following except a.expected employee compensation levels. b.federal withholding income tax. c.employee life expectancy. d.employee turnover. Find the Value of x Ive been stuck on this problem I cant seem to get 7 9/4 into the ABC form vit ch : ( ) Does this graph represent a function? Why or why not? What decimal is equivalent to 1/8 5. Do a SWOT analysis for the business idea you chose in question 2 above. Describe at least 2 strengths, 2 weaknesses, 2 opportunities, and 2 threats for that company idea. (1-8 sentences. 4.0 points) 6. Make a list of at least 3 people you would want to give copies of your business plan to, and explain why you chose each of those people. (1-5 sentences. 3.0 points) Worth 10 pts Plssssssssssssssssss help Will give brainliest The bacteria chromosome is pls help in this7.6x5.2 Circle A has a radius of 4 centimeters.