Answer:
Following are the code to the given question:
#include<iostream>//header file
#include<math.h>//header file
using namespace std;
int main()//main method
{
long long x, x1, y, y1;//defining long variable
int count=0,i,j;//defining integer variable
cout<<"Enter a range for x coordinates: "<<endl;//print message
cin>>x>>x1;//input x and x1 value
cout<<"Enter a range for y coordinates: "<<endl;//print message
cin>>y>>y1; //input y and y1 value
for(i = x; i <= -x1; i++)//use nested loop that tests each coordinates
{
for(j = y; j <= y1; j++)//use nested loop that tests each coordinates
{
if(((2*pow(i,2)) + abs(2*i*j) + pow(j,2)) == 10000)//use if that checks condition as per the given question
{
cout<<"There is a planet at "<<i<<", "<<j<<endl;// print coordinates
count++;//incrementing count variable value
}
}
}
cout<<"Total number of planets detected are: "<<count<<endl;//print count value
return 0;
}
Explanation:
In this code, inside the main method long "x, x1, y, and y1" and integer "count, i, and j" type variable is declared that uses a long variable to input value from the user-end.
In the next step, two nested loops have defined that test each coordinate and define if block that checks condition as per the given question and use i, j, and count variable to print value with the message.
When a collection of honeypots connects several honeypot systems on a subnet, it may be called a(n) honeynet
Answer:
The given statement is true.
Explanation:
The honeynet is indeed a decoy network comprising a honey trap or even more. It appears to be a real network with multiple systems but is housed on one or a few servers, each of them together in one setting, which is why it is termed a honeynet when more than one honeypot is linked to an amount of honey pot system on one subnet. In the IDSs (Intrusion Detection Systems), a padded cell system has been used which is like a honeycomb.
Write an expression whose value is the concatenation of the three strigs name1, name2, and name3, separated by commas
Answer:
name1+","+name2+","+name3
Explanation:
Given
name1, name2 and name3
Required
Concatenate, separated by comma (,)
To concatenate, we simply use the + operator.
So, the expression is:
name1+","+name2+","+name3
What framework is used for transporting authentication protocols instead of the authentication protocol itself
Answer:
EAP (Extensible Authentication Protocol)
For transporting authentication protocols instead of the authentication protocol itself will be an Extensible Authentication Protocol.
What is the Extensible Authentication Protocol (EAP)?An architecture for authentication that is often used in network and internet connections is called Extensible Authentication Protocol (EAP). RFC 5247 updates RFC 3748's definition, which superseded RFC 2284's. EAP is a framework for authentication that enables the delivery and use of data and parameters produced by EAP techniques.
RFCs describe a large variety of tricks, and there are also several merchant methods and fresh proposals. EAP merely specifies the information from the interface and the formats; it is not a wire protocol. Each EAP-using protocol specifies a method for encasing user-generated EAP messages inside this messages of that connection.
For shipping confirmation conventions rather than the verification convention itself will be an Extensible Authentication Protocol.
More about the Extensible Authentication Protocol link is given below.
https://brainly.com/question/20813972
#SPJ12
In the context of computer and network security, _____ means that a system must not allow the disclosing of information by anyone who is not authorized to access it.
Answer:
Confidentiality
Explanation:
Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
In Cybersecurity, there are certain security standards, frameworks, antivirus utility, and best practices that must be adopted to ensure there's a formidable wall to prevent data corruption by malwares or viruses, protect data and any unauthorized access or usage of the system network.
In the context of computer and network security, confidentiality simply means that a computer system used for performing certain functions such as exchange of data must not allow the disclosing of information to and by anyone who is not authorized to access it.
Confidentiality refers to the act of sharing an information that is expected to be kept secret, especially between the parties involved. Thus, a confidential information is a secret information that mustn't be shared with the general public.
In conclusion, confidentiality requires that access to collected data be limited only to authorized staffs or persons.
………………….... controls the operations like reading data from input devices, transmitting information to output devices and checking the components of a computer.
Explanation:
hi the IP address of my colleague of mine that
SOMEONE PLEASE HELP ME DUE IS IN 30 MINUTES!!!⚠️⚠️⚠️⚠️
~WAP to accept a number and display the square of the number using SUB END SUB
Answer:
Display square root of an input number
REM PROGRAM TO DISPLAY SQUARE ROOT OF AN INPUT NUMBER. INPUT “ENTER ANY NUMBER”; N. S = N ^ (1 / 2) ...
DECLARE SUB SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...
SUB SQROOT (N) S = N ^ (1 / 2) ...
DECLARE FUNCTION SQROOT (N) INPUT “ENTER ANY NUMBER”; N. ...
FUNCTION SQROOT (N) SQ= N ^ (1 / 2)
Explanation:
hope this helps u
In data representation, what represents one character which may be a
letter, number, or punctuation mark.
Answer:
Binary ?
Explanation:
Im not 100% sure but it could be binary or 0
Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly
Explanation:
1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem
2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.
The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:
One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.In conclusion, the above method will be used for the troubleshooting.
Read related link on:
https://brainly.com/question/18275236
X = 10
y =
20
х» у
print("if statement")
print("else statement")
Answer:
"else statement"
Explanation:
Given
The above code segment
Required
The output of the program
Analyzing the program line by line, we have:
x = 10 ----> Initialize x to 10
y = 20 ----> Initialize y to 20
if x > y ----> check if x is greater than y
print("if statement") ----> Execute this line if the condition is true
The condition is false because 10 is less than 20, so: the statement will not be executed. Automatically, the else condition will be executed
else
print("else statement")
"else statement" without the quotes will be printed because the if condition is false
The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.
Cuando se introduce una fórmula en una celda primero que hay que introducir es
Answer:
El signo =.
Explanation:
La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.
Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.
Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called: cumulative sequence check batch sequence check suspense file of missing numbers computer agreement of batch totals
Answer:
batch sequence check.
Explanation:
A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.
The steps for checking an event data within a batch using a batch sequence check include the following;
I. You'll enter a range of serial numbers of the document in a batch.
II. You'll enter each serially pre-numbered document one after the other.
III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.
Which of these collections defines a LIST? ["apple", "banana", "cherry"] {"apple", "banana", "cherry"} {"name": "apple", "color": "green"} ("apple", "banana", "cherry") Next ❯
Answer:
["apple", "banana", "cherry"]
Explanation:
In programming lists are defined by using square brackets. Curly brackets are used to define sets or dictionaries. Dictionaries are similar to lists but are not really considered lists since they use a key: value system unlike lists. Parenthesis in programming are used to define tuples or in some languages object literals with curly brackets inside. A list uses only square brackets, and depending on the language can either contain elements of the same type of different types. Therefore, the only correct example of a LIST in this question would be
["apple", "banana", "cherry"]
The part (or statement) of a recursive function that decides whether the recursive loop is terminated is called: (Select all that apply)
Answer:
The base case
Explanation:
Required
The part that determines the termination of a recursion
This part of a recursion is referred to as the base case.
Take for instance, the following:
factorial(int n) {
if (n < = 1) { return 1; }
else { return n*factorial(n-1); } }
The base case of the above is if (n < = 1) { return 1; }
Because the recursion will continue to be executed until the condition is true i.e. n less than or equals 1
Color mixtures using light, for example those in digital displays, are called __________ color mixtures.
Answer:
Additive color mixtures
Explanation:
The process of mixing colored lights together is called additive color mixing. Red, green, and blue are the primary colors for additive mixing. If all of these three colors of light are shone onto a screen at the same time, white color is produced.
Hopefully, this helped. If I am incorrect feel free to correct me by commenting on my answer. :)
A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is that of the middle element in the middle row.
Answer:
tictactoe[1][1]
Explanation:
To access arrays, square boxes might be used which means specifying the row position and column position of a certain value in an array ::
Given a 2 - dimensional 3×3 array of integers :
Creating a dummy array assigned to the variable tictactoe :
[1 2 3]
[4 5 6]
[7 8 9]
We have a 3×3 array, that is 3 rows and 3 columns.
The middle element in the middle row is located in the second row ;second colum
Row and column Indexes starts from 0
Middle element in the middle row is the value 5 and it corresponds to :
tictactoe[1][1]
We call the variable name and the we use one square box each to house the row and column position.
Draw a flowchart to find greater number among three number
Answer:
See attachment for flowchart
Explanation:
First, we get input for the three numbers
The flowchart then checks if the first number is greater than the other two
If yes, the first is assigned the largest
If otherwise, the second number is tested
If it is greater than the other two, then the second is assigned the largest
If otherwise, the third is assigned the largest
Lastly, the largest is printed before the flowchart ends
state the use of an x-ray machine
Answer:
The use of an x-ray machine is used to take pictures of dense tissues such as teeth or bones. This is because bones absorb the radiation more than the less dense soft tissue. X-rays from a source pass through the body and onto a photographic cassette.
I hope this helps you!
Explanation:
All of the following are true of functions except: Group of answer choices They define specific tasks that can be used at many points in a program A function call must specify the name and arguments of the function The definition of a function usually is visible to other functions The implementation of a function is hidden from the caller
Answer:
The definition of a function usually is visible to other functions.
Explanation:
In Computer programming, a function can be defined as a group of organized, reusable sets of code that is used to perform a specific task i.e a single but related action. Thus, a function accepts data as an input, process the data and return a single result or a set of results.
A parameter can be defined as a value that can be passed to a function. This value can be passed to a function either by reference or by value.
This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.
Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.
Hence, when you create classes or variables in a function, you can can set the values for their parameters.
Furthermore, the true statements about a function includes;
I. A function define specific tasks that reusable at many points in a program.
II. The name and arguments of the function must be specified by a function.
III. The implementation of a function is generally hidden from the caller.
The core difference between phishing and spear-phishing is: a. spear-phishing has more specific targets than phishing b. phishing attacks via email, spear-phishing attacks via infected webpages c. phishing attacks via email, spear-phishing attacks via social media d. phishing is an outside attack; spear-phishing is an internal security check e. anti-virus software prevents phishing but not spear-phishing
Answer:
a. spear-phishing has more specific targets than phishing
Explanation:
The difference between phishing and spear-phishing basically lies in the target. Phishing is a form of malicious software sent to a large number of people, probably through their e-mails, with the hope that a small percentage will fall victim to the attack.
Spear-phishing, on the other hand, is targeted at just one person. The person and his itinerary are studied and a message is designed to apply to that person and elicit his interest. Clicking on the message or link exposes the person's device to attack and unauthorized information might be obtained or malware is installed.
Your friend want to make a copy of your new game you bought the previous day .
Why should you prevent him from doing that?
Answer:
It is copyright infringement
Explanation:
Required
Why you should prevent your friend from copying a software you bought
When you purchase a software, you claim ownership of the software (for using the software on your devices); however, your ownership is not a full ownership because the software is an intellectual property of the developer.
This means that, you cannot copy or redistribute the software without the consent of the developer. Doing so, without getting consent, is a copyright infringement.
give the difference between functional and functional tools in the middle of to the circle give importance
Answer:
hakkuna matata is the radious of a circle
__________ is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.
Answer:
Redundancy is a strategy of using multiple types of technology that prevent the failure of one system from compromising the security of information.
Explanation:
Redundancy means having extra or duplicate resources available to support the main system. It is a backup or reserve system that can step in if the primary system fails. The reserve resources are redundant most of the time as they are not being used if everything is working properly.
If there is only a stop sign posted at a railroad
crossing, that means that the track is no
longer in use.
True
False
PLEASEE HELP
Answer:
false , those are called passive railways
What type of display allows the user to access a large amount of vocabulary in one device, uses spelling to convey the message, is changeable by the user, depicts language in electronic form, uses context-based pages, and uses conversational pages
Answer:
Dynamic
Explanation:
As defined by Walter Woltos, DYNAMIC DISPLAY is a type of display that allows the user to access a large amount of vocabulary in one device, uses spelling to convey the message, is changeable by the user, depicts language in electronic form, uses context-based pages, and uses conversational pages.
For example, a dynamic display includes smartphones, laptops, etc. This is the opposite of Static display.
State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translates the machine language into programming language. Backup is a process of shrinking the files on a disk. VisiCalc was the first computer spreadsheet program. An interpreter translates the whole program into an equivalent code in one go.
Answer:
2. translates program written in any programming language into Machine language
last ko . false
Explanation:
aru aaunna
You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?
Answer: Static
Explanation:
Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.
Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.
What are the characteristics of an attachment in an email?
O The attachment will always appear in the body of the message.
O The paperclip icon indicates an attached file.
O Bold red type indicates an attached file.
O The attachment can only be viewed if it is in HTML format.
Which part of the packet contains the sequencing information that's used by TCP to reassemble packets
Answer:
During the TCP startup and teardown sequence, a "phantom byte" causes the sequence number and acknowledgment number fields to increment by 1 even though no data is exchanged. This phantom byte can be confusing when you have just learned that the sequence number field increments only when data is sent.
Explanation:
Write the steps of the following
i to change font name and size
ii to apply superscript
iii to change a paragraph into capital letter
quick thanks!
Answer:
i) To change the font name and size
1) Select the text that has the font and size that are to be changed
2) In the Home tab, in the Font group, select the drop down button next to the displayed font and select the desired font, from the drop down list that appears
3) With the text still highlighted, within the Home tab, click on the dropdown button next to the displayed font size in the Font group and select the desired font size from the displayed drop down list and save the changes
ii) To apply superscript
To format a text as a superscript;
1) Select the text to be formatted as superscript
2) In the Home tab, in the Font group, click on the superscript button x² to change the selected text to superscript
A text can also be changed to superscript by selecting the text and pressing the Ctrl, Shift, and Plus sigh (+) simultaneously
iii) To change a paragraph into capital letter
1) Select the paragraph that is to be changed into capital letter
2) From within the Font group in the Home tab, click on the Change Case button, Aa, then select UPPERCASE from the drop down menu
3) Save the changes
Explanation: