Identify the possible error in each line. • For each line assume that the lines above it are part of the same code and have been fixed by the time you get to the line you are currently examining. . Yes there are some lines with No Errors - NONE is not a red herring. a) int intA = 10; NONE b) int& iptrA = *intA; SYNTAX int *arrA = (int) malloc("iptrA); SEMANTIC for(int i = 0; i < intA; d) i++) NONE e) arrA[ I ]=i; NONE f) for(int i = 1; i < intA; i++) [Select] { cout >>"index ::" g) >> >> "="; Select] 4 cout << *(arrA + i) h) << endl; [Select] } while((floatA % i) intA) != 0) Select] { j) if(arrA[ (int)floatA] % 2 == 0); [Select] cout << "EVEN!" << endl; floatA = floatA + 1; }

Answers

Answer 1
Twenty letters long okay

Related Questions

Which of the following substances increases in quantity during repititive muscle contraction during oxygen deficti ?
Lactic acid

Answers

Answer:

Lactic acid

Explanation:

Lactic acid builds up during strenuous exercise with limited amounts of oxygen.

What type of editor is used to edit HTML code?What type of editor is used to edit HTML code?

Answers

For learning HTML we recommend a simple text editor like Notepad (PC) or TextEdit (Mac).

mark me brainliestt :))

Answer:

If you want to use HTML editor in windows, you can use notepad. And if you want to use HTML editor on your phone than you need to install any editor on your phone.

Explanation:

If you want to use another app than notepad in pc, laptop, mac, OS or Linux, you can download a editor known as Visual Studio Code. If you want to do another language you can also do it in it. You can do all programming languages in it.

Describe computer in your own words on three pages

Answers

no entendi me explicas porfavor para ayudarte?

¿Cuál es la diferencia de un ciudadano digital entre la vida real y la vida en línea?

Answers

No podes ir a lugar sin tarjeta verde en los Estados Unidos Digitalmente podes comprar lo que puedas

full form of computer​

Answers

Answer:

COMPUTER: Common Operating Machine Purposely used for Technological and Educational research.

Explanation:

By the way, a computer is not an acronym and is the name of an electronic device.

A computer is a simple machine that we can program for a lot of logical and arithmetic functions, and it executes our work according to our instructions.

in simple words, a computer is an electronic device that makes our work easy, and any computer that has been programmed for some set of works, it performs that task or works quickly and correctly.

In a paragraph, describe in detail a practical real-world example of where you would implement a singly-linked list and why a singly-linked list is best for this use. Do not list the properties of a singly-linked list....
Rather identify a real-world example or application. If you identify this through research, cite your source.

Answers

Answer:

travel

Explanation:

One real world example of a singly-linked list would be travel. Imagine that you want to take a trip to your nearest neighbor state. To do so you would need to take a 2 buses and a train, but you can't just take any or in any order you wish. You first need to take the first bus at your current location, get off at the train station, take that train to the final stop, get off and take the bus to the final destination. Meaning there is a sequence of connected events that you must follow in order to get to your destination and the same opposite sequence of events to get back. This is exactly like a singly-linked list.

After performing addition operation such as AX=18, BX=19 which Flags will be
affected

Answers

Answer:

Carry Flag (CF) - this flag is set to 1 when there is an unsigned overflow. ...

Zero Flag (ZF) - set to 1 when result is zero. ...

Sign Flag (SF) - set to 1 when result is negative. ...

Overflow Flag (OF) - set to 1 when there is a signed overflow.

Define a class Person that represents a person. People have a name, an age, and a phone number. Since people always have a name and an age, your class should have a constructor that has those as parameters.

Answers

Answer:

public class Person {

   String name;

   int age;

   String phoneNumber;

   public Person(String name, int age, String phoneNumber){

          this.name = name;

          this.age = age;

          this.phoneNumber = phoneNumber;

   }

}

Explanation:

The code above is written in Java.

The following should be noted;

(i) To define a class, we begin with the keywords:

public class

This is then followed by the name of the class. In this case, the name is Person. Therefore, we have.

public class Person

(ii) The content of the class definition is contained within the block specified by the curly bracket.

(iii) The class contains instance variables name, age and phoneNumber which are properties specified by the Person class.

The name and phoneNumber are of type String. The age is of type int. We therefore have;

String name;

int age;

String phoneNumber;

(iv) A constructor which initializes the instance variables is also added. The constructor takes in three parameters which are used to respectively initialize the instance variables name, age and phoneNumber.

We therefore have;

public Person(String name, int age, String phoneNumber){

          this.name = name;

          this.age = age;

          this.phoneNumber = phoneNumber;

   }

(v) Notice also that a constructor has the same name as the name of the class. In this case, the constructor's name is Person.

Answer:

The class and constructor in C++ is as follows:

class Person {

 public:

   string name;     int age;     int phone;

   Person (string x, int y) {  

     name = x;       age = y;  

   }

};

Explanation:

This defines the class

class Person {

The specifies the access specifier

 public:

This declares the attributes; name, age and phone number

   string name;      int age;      int phone;

This defines the constructor for the name and age

   Person (string x, int y) {  

This gets the name and age into the constructor

     name = x;       age = y;  

   }

};

Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector (except the last value) with the last value in the vector subtracted from each value. Output each value on a new line. Ex: If the input is -46 66 76 9 -1, the output is:
-55
57
67

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> nums;

int num;

cin>>num;

while(num != -1){

 nums.push_back(num);

 cin>>num; }  

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

return 0;

}

Explanation:

This declares the vector

vector<int> nums;

This declares an integer variable for each input

int num;

This gets the first input

cin>>num;

This loop is repeated until user enters -1

while(num != -1){

Saves user input into the vector

 nums.push_back(num);

Get another input from the user

 cin>>num; }

The following iteration print the vector elements

for (auto i = nums.begin(); i != nums.end(); ++i){

    cout << *i <<endl; }

Design a function int maxDigit (int num) to find and return the greatest digit from the arguments value num.
Also write a function void result() by passing parameters to print the greatest digit.
please tell in java programming​

Answers

Answer:

Below is the required JAVA Code:

Explanation:

public static int largestDigit(int n) {

   if (n < 0) {

       return largestDigit(-1 * n);

   } else if (n == 0) {

       return 0;

   } else {

       int digit = n % 10;

       int maxDigit = largestDigit(n / 10);

       if (digit > maxDigit)

           maxDigit = digit;

       return maxDigit;

   }

}

\color{red}Method\;tested\;in\;a\;complete\;java\;program\;if\;you\;are\;interested.

public class LargestDigitRecursive {

   public static int largestDigit(int n) {

       if (n < 0) {

           return largestDigit(-1 * n);

       } else if (n == 0) {

           return 0;

       } else {

           int digit = n % 10;

           int maxDigit = largestDigit(n / 10);

           if (digit > maxDigit)

               maxDigit = digit;

           return maxDigit;

       }

   }

   public static void main(String[] args) {

       System.out.println(largestDigit(14263203));

       System.out.println(largestDigit(845));

       System.out.println(largestDigit(52649));

       System.out.println(largestDigit(3));

       System.out.println(largestDigit(0));

       System.out.println(largestDigit(-573026));

       System.out.println(largestDigit(-2));

   }

}

OUTPUT:

6

8

9

3

0

7

2

Design traffic lights at an intersection of a city.  North and South (up and down) are going to be a main highway, East and West (right and left) will be a smaller cross street.  There will be no turn signals and no cross walks.  You only need to build/code one set of lights for each street (one set of green, yellow, and red for the highway, and another set for the cross street).  You do not need to build actual traffic lights or an intersection. 

Answers

Answer:

Explanation:

The following code is written in Java. In order to code this efficiently, I created a class for the trafficLights. The class contains the currentLight, and the streetType as variables and contains a constructore, getter and setter methods, and a method to turn to the next light in the sequence. Then I created 4 objects of TrafficLights for the highways and the streets.

class Brainly {

   public static void main(String[] args) {

       TrafficLights highwaySouth = new TrafficLights("Highway", "green");

       TrafficLights highwayNorth = new TrafficLights("Highway", "green");

       TrafficLights streetEast = new TrafficLights("Street", "yellow");

       TrafficLights streetWest = new TrafficLights("Street", "red");

   }

}

class TrafficLights {

   String streetType, currentLight;

   public TrafficLights(String streetType, String currentLight) {

       this.streetType = streetType;

       this.currentLight = currentLight;

   }

   public void nextLight() {

       if (this.currentLight == "green") {

           this.currentLight = "yellow";

       } else if (this.currentLight == "yellow") {

           this.currentLight = "red";

       } else {

           this.currentLight = "green";

       }

   }

   public String getStreetType() {

       return streetType;

   }

   public void setStreetType(String streetType) {

       this.streetType = streetType;

   }

   public String getCurrentLight() {

       return currentLight;

   }

   public void setCurrentLight(String currentLight) {

       this.currentLight = currentLight;

   }

}

Given two regular expressions r1 and r2, construct a decision procedure to determine whether the language of r1 is contained in the language r2; that is, the language of r1 is a subset of the language of r2.

Answers

Answer:

Test if L(M1-2) is empty.

Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M2-1) is empty.

Answer yes if and only if both answers were yes.

Explanation:

An algorithm must be guaranteed to halt after a finite number of steps.

Each step of the algorithm must be well specified (deterministic rather than non-deterministic).

Three basic problems:

Given an FA M and an input x, does M accept x?

Is x in L(M)

Given an FA M, is there a string that it accepts?

Is L(M) the empty set?

Given an FA M, is L(M) finite?

Algorithm for determining if M accepts x.

Simply execute M on x.

Output yes if we end up at an accepting state.

This algorithm clearly halts after a finite number of steps, and it is well specified.

This algorithm is also clearly correct.

Testing if L(M) is empty.

Incorrect "Algorithm"

Simulate M on all strings x.

Output yes if and only if all strings are rejected.

The "algorithm" is well specified, and it is also clearly correct.

However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.

COMMENT: Note we use the algorithm for the first problem as a subroutine; you must think in this fashion to solve the problems we will ask.

Correct Algorithm

Simulate M on all strings of length between 0 and n-1 where M has n states.

Output no if and only if all strings are rejected.

Otherwise output yes.

This algorithm clearly halts after a finite number of steps, and it is well specified.

The correctness of the algorithm follows from the fact that if M accepts any strings, it must accept one of length at most n-1.

Suppose this is not true; that is, L(M) is not empty but the shortest string accepted by M has a length of at least n.

Let x be the shortest string accepted by M where |x| > n-1.

Using the Pumping Lemma, we know that there must be a "loop" in x which can be pumped 0 times to create a shorter string in L.

This is a contradiction and the result follows.

COMMENT: There are more efficient algorithms, but we won't get into that.

Testing if L(M) is finite

Incorrect "Algorithm"

Simulate M on all strings x.

Output yes if and only if there are a finite number of yes answers.

This "algorithm" is well specified and correct.

However, this is not an algorithm because there are an infinite number of strings to simulate M on, and thus it is not guaranteed to halt in a finite amount of time.

COMMENT: Note we again use the algorithm for the first problem as a subroutine.

Correct Algorithm

Simulate M on all strings of length between n and 2n-1 where M has n states.

Output yes if and only if no string is accepted.

Otherwise output no.

This algorithm clearly halts after a finite number of steps, and it is well specified.

The correctness of the algorithm follows from the fact that if M accepts an infinite number of strings, it must accept one of length between n and 2n-1.

This builds on the idea that if M accepts an infinite number of strings, there must be a "loop" that can be pumped.

This loop must have length at most n.

When we pump it 0 times, we have a string of length less than n.

When we pump it once, we increase the length of the string by at most n so we cannot exceed 2n-1. The problem is we might not exceed n-1 yet.

The key is we can keep pumping it and at some point, its length must exceed n-1, and in the step it does, it cannot jump past 2n-1 since the size of the loop is at most n.

 This proof is not totally correct, but it captures the key idea.

COMMENT: There again are more efficient algorithms, but we won't get into that.

   Other problems we can solve using these basic algorithms (and other algorithms we've seen earlier this chapter) as subroutines.

       COMMENT: many of these algorithms depend on your understanding of basic set operations such as set complement, set difference, set union, etc.

Given a regular expression r, is Lr finite?

Convert r to an equivalent FA M.

COMMENT: note we use the two algorithms for converting a regular expression to an NFA and then an NFA to an FA.

Test if L(M) is finite.

Output the answer to the above test.

Given two FAs M1 and M2, is L(M1) = L(M2)?

Construct FA M1-2 from M1 and M2 which recognizes the language L(>M1) - L(>M2).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M1-2) is empty.

Construct FA M2-1 from M1 and M2 which recognizes the language L(>M2) - L(>M1).

COMMENT: note we use the algorithm that is instrumental in proving that regular languages are closed with respect to the set difference operator.

Test if L(M2-1) is empty.

Answer yes if and only if both answers were yes.

Think about that the C, B and S parameters of a Cache. Think about what happens to compulsory, capacity, conflict misses, if only each of the following parameter changed (the other two are kept the same)?
(i) C is increased (S, B same)
(ii) S is increased (C, B Same)
(iii) B is increased (C, S Same)

Answers

Answer:

(i) C is increased (S, B same)

Explanation:

Cache are items which are stored in the computer at a hidden place. These are sometimes unwanted and they may hinder the speed and performance of the device. They exist to bridge speed gap.

After reading all L02 content pages in Lesson 02: Inheritance and Interfaces, you will complete this assignment according to the information below.Do not use the scanner class or any other user input request. You application should be self-contained and run without user input.Assignment ObjectivesPractice on implementing interfaces in JavaFootballPlayer will implement the interface TableMemberOverriding methodswhen FootballPlayer implements TableMember, FootballPlayer will have to write the real Java code for all the interface abstract methodsDeliverablesA zipped Java project according to the How to submit Labs and Assignments guide.O.O. Requirements (these items will be part of your grade)One class, one file. Don't create multiple classes in the same .java fileDon't use static variables and methodsEncapsulation: make sure you protect your class variables and provide access to them through get and set methodsAll the classes are required to have a constructor that receives all the attributes as parameters and update the attributes accordinglyAll the classes are required to have an "empty" constructor that receives no parameters but updates all the attributes as neededFollow Horstmann's Java Language Coding GuidelinesOrganized in packages (MVC - Model - View Controller)Contents

Answers

Solution :

App.java:  

import Controller.Controller;

import Model.Model;

import View.View;  

public class App

{  

public static void main(String[] args) // Main method

{  

Model model = new Model(); // Creates model object.    

View view = new View(); // Creates view object.    

Controller controller = new Controller(view, model); // Creates controller object that accepts view and model objects.    

}

}  

[tex]\text{Controller.java:}[/tex]  

package Controller;  

[tex]\text{impor}t \text{ Model.Model;}[/tex]

import View.View;  

[tex]\text{public class Controller}[/tex]

{

Model model; // Model object    

View view; // View object

public Controller(View v, Model m) // Method that imports both model and view classes as objects.

{

model = m;    

view = v;  

//view.basicDisplay(model.getData()); // basicDisplay method from View class prints FootballPlayer objects as Strings from Model class.  

view.basicDisplay(model.getMembers().get(1).getAttributeName(3));    

view.basicDisplay(model.getMembers().get(1).getAttribute(3));    

view.basicDisplay(model.getMembers().get(1).getAttributeNames());    

view.basicDisplay(model.getMembers().get(1).getAttributes());    

view.basicDisplay("size of names=" + model.getMembers().get(1).getAttributeNames().size());    

view.basicDisplay("size of attributes=" + model.getMembers().get(1).getAttributes().size());

}  

}  

FootballPlayer.java:

package Model;  

import java.util.ArrayList;  

public class FootballPlayer extends Person implements TableMember { // Used "extends" keyword to inherit attributes from superclass Person, while using "implements" to implement methods from TableMember interface.    

private int number; // Creating private attribute for int number.    

private String position; // Creating private attribute for String position.  

public FootballPlayer(String name, int feet, int inches, int weight, String hometown, String highSchool, int number, String position) // Full parameter constructor for FootballPlayer object (using "super" keyword to incorporate attributes from superclass).

{

super(name, feet, inches, weight, hometown, highSchool); // Used super keyword to include attributes from superclass.  

this.number = number; // Value assigned from getNumber method to private number instance variable for FootballPlayer object.  

this.position = position; // Value assigned from getPosition method to private position instance variable for FootballPlayer object.    

}  

public FootballPlayer() // No parameter constructor for FootballPlayer object.

{

this.number = 0; // Default value assigned to private number instance variable under no parameter constructor for FootballPlayer object.    

this.position = "N/A"; // Default value assigned to private position instance variable under no parameter constructor for FootballPlayer object.    

}  

Override

public String getAttribute(int n) // getAttribute method that is implemented from interface.

{

switch (n) { // Switch statement for each attribute from each FootballPlayer object. Including two local attributes, denoted by this. While the others are denoted by "super".

case 0:

return String.valueOf(this.number); // Use of the dot operator allowed me to discover String.valueOf method to output int attributes as a string.

case 1:

return this.position;

case 2:

return super.getName();

case 3:

return super.getHeight().toString();

case 4:

return String.valueOf(super.getWeight());

case 5:

return super.getHometown();

case 6:

return super.getHighSchool();

default:

return ("invalid input parameter");

}

}  

Override

public ArrayList<String> getAttributes() // getAttributes ArrayList method that is implemented from interface.

{

ArrayList<String> getAttributes = new ArrayList<>();    

for(int i = 0; i <= 6; i++){ // For loop to add each attribute to the getAttributes ArrayList from getAttributes method.    

getAttributes.add(getAttribute(i));    

}    

return getAttributes;

}  

Override

public String getAttributeName(int n) // getAttributeName method implemented from interface.

{

switch (n) { // Switch statement for the name of each attribute from each FootballPlayer object.

case 0:

return "number";

case 1:

return "position";

case 2:

return "name";

case 3:

return "height";

case 4:

return "weight";

case 5:

return "hometown";

case 6:

return "highSchool";

default:

return ("invalid input parameter");

}  

}  

Functions should contain only the code that performs a single task.
O True
O False

Answers

Answer:

false

Explanation:

function should contain more codes

With what software tool can you see the applications that are currently runni
your computer?
Application Manager
Task Scheduler
Task Manager
Device Manager
None of the above

Answers

Answer:

Task Manager

Explanation:

On windows, you can press Ctrl + Esc and it will open Task Manager.

You will see all the currently running programs and the amount of resources they are currently using.

what is a network computer that processes requests from a client server​

Answers

Answer:

computer processing unit

computer processing unit is a network computer that processes requests from a client server​.

What is a computer processing unit?

The main element and "control center" of a computer is the Central Processing Unit (CPU). The CPU, sometimes known as the "central" or "main" processor, is a sophisticated collection of electronic circuitry that manages the device's software and operating system.

A central processing unit, sometimes known as a CPU, is a piece of electronic equipment that executes commands from software, enabling a computer or other device to carry out its functions.

Computers use a brain to process information, much like people do. The brain is the central processing unit for a computer (CPU). The CPU is the component that carries out all of the computer's instructions. It connects with all the other hardware parts of the computer while being on the motherboard.

Thus, computer processing unit.

For more information about computer processing unit, click here:

https://brainly.com/question/29775379

#SPJ6

Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data backups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will automatically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.

Answers

Answer:

Acronis True Image is the one I would recommend out of these mentioned online backup services.

Explanation:

The evaluations and reviews of each of the online backup services are as follows:

a. iDrive

For this, we have:

Speed = 60% - fair

Security = 100% - excellent

Privacy = 88% - very good

Features = 95% - excellent

Pricing = 85% - Very good

Because of its various features, pricing, and usability, IDrive reviews suggest that it is a very efficient online backup solution. However, there have been complaints concerning its speed and the fact that there are no monthly plans available.

b. Carbonite

For this, we have:

Speed = 60% - fair

Security = 100% - excellent

Privacy = 87% - very good

Pricing = 85% - very good

File backup and restoration = 75% - good

Carbonite reviews reveal that it is simple to use and provides limitless backup for one device. The main drawback is that it has extremely poor backup speeds.

c. Acronis True Image

This is fast, simple and intuitive

It has complete control over the backup updates, including how and when they occur.

It is not expensive.

Acrnonis True image is a powerful backup storage service. It enables data and file backup and restoration from USB drives.

Many reviewers of Acrnonis True image have stated that they have had no issues with its service, that it is worth purchasing, and that there are no concerns.

d. Backblaze

For this, we have:

Speed = 75% - good

Security = 75% - good

Privacy = 70% - decent

Pricing = 100% - excellent

Support = 95% - excellent

Features = 65% - decent

File back-up and restoration = 70% - decent

Backblaze is one of the most popular internet backup services. This storage service, however, does not allow for ustomization.

Recommendation

Acronis True Image is the one I would recommend out of these mentioned online backup services. This is due to the fact that it delivers a large amount of accurate and high-quality data storage. It is quick, simple and intuitive, which is what most people care about. Furthermore, reviewers have stated that this service is quite effective and that there have been very few issues with it. The other services demonstrate that their services have flaws, such as lack of customization and slowness.

multimedia is an effective tool used in different fields such as business and education true or false​

Answers

Answer:

True

Explanation:

Multimedia is used in many fields. It is basically the ability to express something in many different ways. This allows you to more easily demonstrate a product, idea, or even a theory. Since this can be through art, video, presentation, text, live, etc. It allows you to find the best format for the specific product or idea that you are trying to present to a group of viewers. That is why it is an effective tool for various fields since it can just as easily help a company sell a product as well as help a teacher express a mathematical concept.

Identify the hardware components in your own computer. If you don't have a computer, use a friend's, or one at work or in an NVCC lab. The following list shows the components you should identify and how to find the information on a Windows computer. Describe model computer: type (laptop, desktop, notebook, tablet, etc.) Indicate your manufacturer (HP, Apple: iPad, MacBook Air, etc., Lenovo, Dell, etc.) of the computer. Input devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Output devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Storage devices (include internal and external devices, and how much data each can hold) - Open Windows Explorer and right click on a drive name to open its properties. Amount of RAM - Open System Properties in the Windows Control Panel. Type and speed of CPU - Open System Properties in the Windows Control Panel. Ports (number and type) - Look for jacks into which a connector can be plugged on the front, back and sides of the machine. Compare the jacks to pictures in your textbook.

Answers

Solution :

A friend of mine have an old version of computer PC having the following components :

Input devices

Model name of the keyboard -- PUNTA , model number -- P-KB515

Model name of the mouse -- PUNTA, model number -- P-KB515

Output devices

Speaker : COMPAQ

Monitor : ACER,  Model Number  --- EB192Q

Storage : 500 MB capacity hard disk

RAM : 2 GB

Processor : Intel Pentium dual E1260 at the rate 1.80 GHz

It is provided with audio jacks

The input to the function/method consists of two arguments.

a. True
b. False

Answers

Answer:

See Explanation

Explanation:

The function is not given. So, I will provide general explanation.

A function is defined as:

return-type function-name(argument-lists)

For instance, an int function that has 1 argument is:

int Myfunc(int num)

num is the argument of the function Myfunc

So, an example of a function with two arguments is:

int Myfunc(int num, string name)

So, examine the function in the complete question; then count the number of arguments to determine if the answer is true or false.

create slider in wordpress

Answers

Answer:

Adding a WordPress Slider in Posts/Page

Open the post editor, select the location where you want to add the slider, and click on the Add Slider button next to the media uploader. You will see boxes for each slider you have created. Choose the slider you want to insert and then click Insert Slider button.

Given the following tree, use the hill climbing procedure to climb up the tree. Use your suggested solutions to problems if encountered. K is the goal state and numbers written on each node is the estimate of remaining distance to the goal.

Answers

I see that using the hill climbing procedure to climb up a tree

Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent network analyzers from being able to read data in flight. What are considered as secure network protocols?

Answers

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

Marketing có phải là bán hàng hay không? Giải thích?

Answers

Answer:

Sự khác biệt giữa bán hàng và tiếp thị là bán hàng tập trung vào làm việc trực tiếp với khách hàng tiềm năng để khiến họ chuyển đổi, trong khi tiếp thị tập trung vào việc khơi dậy sự quan tâm đến sản phẩm của bạn.

Answer:

Marketing không phải là bán hàngg

Explanation:

Nó là công cụ hỗ trợ cho việc bán hàng

Viết chương trình kiểm tra số nguyên dương N có phải là số nguyên tố không?

Answers

Could you say that in English please? I can try helping

Saved In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity? Select all that apply. There must be a maximum of one attribute instance. There must be many instances of the attribute There must be at most one entity instance that each attribute instance describes. There must be at least one instance of the attribute. There must be zero or more instances of the attribute. Question 2 (2 points) True or false: A singular attribute is also known as a unique attribute. True False Question 3 (3 points) Saved Relationship names and types of relationship maxima or minima that each could have are listed below. Match each relationship in the list below to the type of relationship maxima or minima. Instructions: Choose your responses from the drop-down menus below. Response options cannot be used more than once. Minima is One-Zero 1 Person-Assigned Social SecurityNumber 4 Minima is Zero Zero 2 CubicleNumber-Assigned-to- Employee per shift 2 Maxima is One-Many 3. Birthdate-Recorded-for-a Person 1 Maxima is One One 4. Women-Bearing-Children Question 4 (2 points) Saved A ride-sharing app's discount system for riders is configured such that a ride discount is triggered only if at least two RiderlDs book a ride in the same Card at the same time. Which of the following is true of the relationship Ride Discount-is-Applicable?
The relationship minimum is Many-One.
The relationship minimum is Two-One.
The relationship maximum is One-Two.
The relationship minimum is One-Two.

Answers

Answer:

Saved In order to be used as a primary key, which of these characteristics must an attribute possess with respect to a single instance of the entity:

There must be a maximum of one attribute instance.

There must be many instances of the attribute.

There must be at most one entity instance that each attribute instance describes.

There must be at least one instance of the attribute.

A singular attribute is also known as a unique attribute. True

Saved Relationship names and types of relationship maxima or minima that each could have are listed below. True

Explanation:

Questions to ask people on how corona has affected the religion sectors​

Answers

Answer:

bcoz of corona all churches and temples are closed and pilgrimage are cancelled

Why might you use a navigation form instead of tab pages? The navigation form allows for several levels and sublevels to be collected. The navigation form allows for duplicate records of information to be collected. The navigation form requires all entries to be complete before adding to a database. The navigation form requires report headers and footers to make publication neater.

Answers

Answer:

Access includes a Navigation Control that makes it easy to switch between various forms and reports in your database. A navigation form is simply a form that contains a Navigation Control. Navigation forms are a great addition to any desktop database.

Explanation:

yes

Answer:

answer c

Explanation:

correct answer on edge



Every Java statement ends with: *

Period
Colon
Double quote
Semicolon

Answers

Answer:

semicolon is the answer

semi colon i did that test
Other Questions
given that the graph below is a transformation of the graph f(x)=x2, which transformation occurred? A restaurant has an average check of $15, with an average variable cost of $6. Fixed costs are $150000. What is breakeven sale revenue? ginagawang paggalang/pagsunod? I only have 3 more left pls help I am giving brainly throughout these questions A scientist collects a sample that has 2.00 1014 molecules of carbon dioxide gas.How many grams is this, given that the molar mass of CO2 is 44.01 g/mol? Which statement should Sarai use if she wants to appeal to emotion in her argument?I plan to ask my aunts and uncles if they will consider spaying or neutering their pets.The director of the city shelter says she is looking for 125 foster families.My best friend went to the shelter and adopted a neutered cat that made him smile every day.People who can ignore our pet crisis have no heart. Write an expression in simplest form for the perimeter of a right triangle with leg lengths of 12a5 and 9a5. Guanine bonds with???? Aaron rented a boat at $180 for 2 days. If he rents the same boat for 5 days, he has to pay a total rent of $375. Part A: Write an equation in the standard form to represent the total rent (y) that Aaron has to pay for renting the boat for x days. Part B: Write the equation obtained in Part A using function notation. Part C: Describe the steps to graph the equation obtained above on the coordinate axes. Mention the labels on the axes and the intervals. The only way workers in industrialized countries can compete with their counterparts in the developing world will be through: A) increased use of the cost leadership strategy. B) increased diversity within the organization. C) increased empowerment of employees. D) increased productivity by using technologically-intensive manufacturing technologies. E) increased flat organization structure. What are possible careers with a health science degree? what is something new you learned?Were there certain skills or behavior traits that you identified in this professionDo you believe that Health Administrator, Nutrition and Health and Wellness degree holders will in encounter each other within the healthcare field? At a school camp there is enough foot for 150 students for 5 days.Q: How long would the food last if there were only 100 students? Which of the following characteristics does a quality research question have Explorers made these treacherous voyages for three main reasons: religion, wealth, and competition. These voyages of discovery began in the eleventh century.Which of the following sentence paraphrases this excerpt correctly? Explorers made these difficult voyages for three main reasons: religion, wealth, and competition. These treacherous voyages of discovery began in the eleventh century where explorers searched for religion, wealth, and competition. In the eleventh century, explorers embarked on difficult voyages in search of religion, wealth, and competition. Religion, wealth, and competition are three examples of that explorers searched for. Help with #15 please PLEASE SOMEONE HELP MESS List 10 fractions between: -1 and -2. 3x+2y=4 2x-3y=7a) 2, - 1b)2 , 1c)1 , 2d)- 2 , - 1 Can someone help me with this? In the circle below, segment AB is a diameter. If the length of are ACB is 6pi what is the length of the radius of the circle?