Answer:
Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.
Explanation:
The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.
SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.
What are url addresses for visiting websites? And what are the different parts of a URL? Answer it in a 1-2 paragraph
Answer:
Please read explanation
Explanation:
URL is the short form for "Uniform Resource Locator". A uniform resource locator tells the location of a website to the browser.
Parts of URL:
There are three main parts of URL
ProtocolDomain nameExtensionProtocol defines the type of protocol used for communicating with the website while the domain name is the name assigned to the IP address and the mapping is stored in domain name server and extension tells the type of website i.e.
.com means commercial
.org means non-profitable organization
.edu means educational website
An additional element is path which change with the website navigation.
If a function is called more than once in a program, the values stored in the function's local variables do not _________ between function calls. g
Answer:
persist
Explanation:
Calling a function Within a program, can be regarded to as specifying of the name of the function when it is within a statement or it could be by the function itself, it possible for a particular function to call another function, in a case wherby a function returns a value, assignment or using the value to variable is not necessary. It should be noted that If a function is called more than once in a program, the values stored in the function's local variables do not persist between function calls
URGENT
You are an art director working for a feature film studio. Create a set for an interior scene of your choosing. Write a description of your scene to give to the principal production team. Include details that an art director would focus time and energy on. Include other production team members with whom you would collaborate. Your description should be at least 150 words.
Files can be stored on hard drives, network drives, or external drives, but not in the cloud.
True
False
Folders provide a method for organizing files.
True
False
Answer: (1) False, (2) True
Explanation:
A .cache is made up of _____ , each of which stores a block along with a tag and possibly a valid/dirty bit
Answer:
Blocks
Explanation:
A .cache is made up of blocks, each of which stores a block along with a tag and possibly a valid/dirty bit.
Basically, each blocks that makes up the cache stores additional block and sometimes a bit.
ong answer, but make sure to provi
you
reasoning
Sales Company:
W.D. Widgets is a small company that sells widgets. They're mostly made up of salespeople who work with lots of clients.
You've taken over as the sole IT person for this company of 80-100 people.
R teils you to provision a machine for a new employee, you order the hardware directly from a business vendor.
You keep one or two machines in stock, in case of emergency. The users receive a username that you generate for them.
You then give them an orientation on how to login when they start. You currently manage all of your machines using
Windows Active Directory. The company uses only Windows computers. When a new computer is provisioned, you have
to nistallots of sales-specific applications manually onto every machine. This takes a few hours of your time for each
15
machine. When someone has an IT-related request, they email you directly to help them.
Almost all software is kept in-house, meaning that you're responsible for the email server, local machine software, and
instant messenger. None of the company's services are kept on the cloud.
Customer data is stored on a single file server. When a new salesperson starts, you also map this file server onto their
local machine, so that they can access it like a directory. Whoever creates a folder on this server owns that folder and
everything in it. There are no backups to this critical customer data. If a user deletes something, it may be lost for
everyone.
Answer:
Umm just go what your gut tells you to do
Explanation:
write passage on computer virus
Answer:
A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.
hope it helpsexplain the main components of a computer system
Answer:
A motherboard.
A Central Processing Unit (CPU)
A Graphics Processing Unit (GPU), also known as a video card.
Random Access Memory (RAM), also known as volatile memory.
Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)
Explanation:
They all work together to create a system
Do you think GE will become one of the top 10 U.S. software companies? Why or why not?
Answer: I do belive GE will be one of the top 10 software companies because each year the software side of GE is growing 20 perecnt per year which is a big deal!
Explanation:
There are different kinds of firms. I think GE will become one of the top 10 U.S. software companies. The world is gradually turning to the production of electric cars and much more appliances and with this, I believe they would grow to the top 10 in no time.
General Electric Company (GE) is known to be one of the top American multinational conglomerate that is seen in New York State.It has its headquartered in Boston and thy have been ranked 33rd in the 2020 ranking, among the Fortune 500 in the United States using their gross revenue.
Learn more about General Electric Company from
https://brainly.com/question/26379157
A switch is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. True False
Answer:
True
Explanation:
A network switch is also called switching hub or a bridging hub. It is a device that connects multiple computers into a network in which multiple communications links can be in operation simultaneously. It makes use of Mac addresses in the forwarding of the data link layer (layer 2) of the OSI model. Types include managed switches, unmanaged switches, smart switches but to mention a few.
turns on her laptop and gets the error message "OS NOT FOUND." She checks the hard disk for damage or loose cable, but that is not the case. What could be a possible cause?
Which statement is true?
1)A deque is a type of collection,
2)A collection is a type of deque.
3)A list is a type of deque.
4)A deque is a type of list.
Answer:
1. A deque is a type of collection.
Explanation:
The statement that is true is as follows:
A deque is a type of collection.Thus, the correct option for this question is A.
What is Deque?Deque may be defined as an ordered and systematic collection of items similar to the queue. It is also known as a double-ended queue. It consists of two ends, a front, and a rear, and the items remain positioned in the collection.
According to the context of this question, a deque is a kind of collection that holds data and information identical to a queue. From here, elements can be added to or eliminated from either the front or back very efficiently.
It is also often called a head-tail linked list. Though properly this signifies specific data with appropriate structure that has been the implementation of a deque.
Therefore, a deque is a type of collection that is a true statement. Thus, the correct option for this question is A.
To learn more about Deque, refer to the link:
https://brainly.com/question/16750037
#SPJ2
While your hands are on home row, both of your thumbs are on _____.
Answer:
While your hands are on home row, both of your thumbs are on Space-barI know this will definitely help✍️✍️✍️hello hello . please help me
Answer:
#include <iostream>
using namespace std;
int main() {
int num, check=0;
for(int num = 1; num<=100;num++){
for(int i = 2; i <= num/2; i++) {
if(num % i == 0) {
check=1;
break; } }
if (check==0) { cout <<num<<" "; }
check = 0;
}
return 0;
}
Explanation:
This line declares num as integer which represents digits 1 to 100.
A check variable is declared as integer and initialized to 0
int num, m=0, check=0;
This for loop iterates from 1 to 100
for(int num = 1; num<=100;num++){
This iterates from 2 to half of current digit
for(int i = 2; i <= num/2; i++) {
This checks for possible divisors
if(num % i == 0) {
If found, the check variable is updated to 1
check=1;
And the loop is terminated
break; } }
The following if statement prints the prime numbers
if (check==0) { cout <<num<<" "; }
check = 0;
}
Define a toString prototype method that returns the cat's name, gender, and age separated by semicolons.
Answer:
Following are the program to this question:
import java.util.*;//import package for user input
public class Main//defining main class
{
public static String Cat (String name, String gender, int age)//defining string method Cat that accept parameter value
{
return name + ';' + gender + ';' + age;//return parameter value
}
public static void main(String[] args) //defining main method
{
String name,gender;//defining String variable
int age;//defining integer variable
System.out.println("Enter name, gender and age: ");//print message
Scanner obx=new Scanner(System.in);//creating Scanner class object for user input
name=obx.next();//input name value
gender=obx.next();//input gender value
age=obx.nextInt();// input age value
System.out.println(Cat(name,gender,age));//print return method value
}
}
Output:
Enter name, gender and age:
dani
Female
12
dani;Female;12
Explanation:
In the above-given code, a string method Cat is declared, that accepts three variable "name, gender, and age", inside the method return keyword is used that returns the parameter values.
In the main method, the above parameter variable is declared, which is used to input value from the user-end, and used the print method to print its return value.
i can't find my grandson someone help
Answer:
i'm right here
Explanation:
grandma
Answer:
were did u lose him.
Explanation:
Drag the tiles to the correct boxes to complete the palrs.
Match the types of letters with their descriptions.
letter of interest
cover letter
thank you letter
letter of recommendation
discusses how you meet job requirements
>
reiterates why you're the best candidate for the job
>
tells more about your character and who you are
expresses your interest in working for a company
Answer:
Letter of interest> tells you more about your character and who you are expresses your interest in working for a company
Letter of recommendation> reiterates why you're the best candidate for the job
Cover letter> discusses how you meet job requirements
Hope this helped!
Answer:
Discusses how you meet job requirements = Cover Letter
Expresses your interest in working for a company = Letter of Interest
Tells more about your character and who you are = Letter of Recommendation
Reiterates why you're the best candidate for the job = Thank You Letter
Describe one practical application of total internal reflection.
Answer:
The phenomenon of total internal reflection of light is used in many optical instruments like telescopes, microscopes, binoculars, spectroscopes, periscopes etc. The brilliance of a diamond is due to total internal reflection. Optical fibre works on the principle of total internal reflection.
Explanation:
thank me later but if it wrong. sorry
Select all examples of proper keyboarding technique.
Look at the keys while keyboarding.
Keep your hands higher than your elbows.
Sit up straight.
Relax your fingers.
Aim to make no mistakes.
Answer:
all except keeping your hands higher than your elbows
Answer:
Sit up straight.
Relax your fingers.
Aim to make no mistakes.
Explanation:
The ____ represents units of work application software performs in terms of its demand for low-level hardware services.
Answer:
application demand model
Explanation: