Write a method, findMax(), that takes in two integers and returns the largest value. Ex: If the program input is: 4 2 the method findMax() returns: 4 Note: Your program must define the method: public int findMax(int num1, int num2)

Answers

Answer 1
Answer:

public int findMax(int num1, int num2){

      if(num1 > num2){

           return num1;

      }

 

      else {

          return num2;

      }

}

Explanation:

The code has been written in Java and the following explains every part of the code.

i. Start with the method header:

public int findMax(int num1, int num2)

ii. Followed by a pair of curly braces representing the block for the method.

public int findMax(int num1, int num2){

   

}

iii. Within the block, write the statements to find out which is greater between num1 and num2

This is done with an if..else statement. To check if num1 is greater than num2, write the following within the block.

if(num1 > num2){

   return num1;

}

else {

 return num2;

}

The if block tests if num1 is greater than num2. If it is, then num1 will be returned.

The else block is executed only if num1 is not greater than num2. In this case, num2 will be returned since it is greater.

iv. Put all together

public int findMax(int num1, int num2){

   if(num1 > num2){

       return num1;

   }

  else {

      return num2;

   }

}


Related Questions

1) It is possible to email a document
directly from the Word application.
O FALSE
O TRUE

Answers

Answer:

True

Explanation:

Select all that apply to Enums: Group of answer choices While mainly a readability feature, we can technically use Enum to do things like spoof a boolean type in C allowing us some level of functionality Enums let us build a series of any kind of constant Enums allow us to print names for integers instead of numbers Enums are great for representing states and other common constants like colors Enums let us specifically value each constant we create Flag question: Question 59 Question 59

Answers

Answer:

-- While mainly a readability feature, we can technically use Enum to do things like spoof a Boolean type in C allowing us some level of functionality.

-- Enums are great for representing states and other common constants like colors.

-- Enums let us specifically value each constant we create.

Explanation:

Enums is a part of a programming language which helps a developer or a programmer to defined a set of the named constants. Using the enums will help in making it easier to document the intent and also to create set of distinct cases.

Option 1 is applicable as in the Boolean there are only TRUE and FALSE values. By using enum one can add more state like that of being difficult or normal or easy.

Option 4 is applicable because enums are used to represent various states and also other constants.

Option 5 is also applicable they allow the developer to create each value constant.

As a basic user of SAP Business One, which feature of the application do you like most?

Answers

Answer:

I like the software most because it is completely for the sales department. I am very satisfied with what this software provides since I work as a sales specialist.

Explanation:

As an internal auditor, I first have to check and make sure the business is going through all reports and operations and that SAP Business One has helped me a lot with reporting features. I'm a huge fan of SAP Business One. And how this software is incredibly fully integrated when an accountancy provider creates a new customer name or adds a new item in every module, and the non-duplicate data feature secures the master data from any duplicate item.

Intuitive sales quotation and sales order functions help salespeople to develop deals that they can conclude. The mobile app adds to the software's usefulness fantastically.

In general, the system has a good monetary value. I would recommend it to everyone involved in the decision-making process and it is my favorite.

Write a C class, Flower, that has three member variables of type string, int, and float, which respectively represent the name of the flower, its number of pedals, and price. Your class must include a constructor method that initializes each variable to an appropriate value, and your class should include functions for setting the value of each type, and getting the value of each type.

Answers

Answer and Explanation:

C is a low level language and does not have classes. The language isn't based on object oriented programming(OOP) but is actually a foundation for higher level languages that adopt OOP like c++. Using c++ programming language we can implement the class, flower, with its three variables/properties and functions/methods since it is an object oriented programming language.

Write a static method named lowestPrice that accepts as its parameter a Scanner for an input file. The data in the Scanner represents changes in the value of a stock over time. Your method should compute the lowest price of that stock during the reporting period. This value should be both printed and returned as described below.

Answers

Answer:

Explanation:

The following code is written in Java. It creates the method as requested which takes in a parameter of type Scanner and opens the passed file, reads all the elements, and prints the lowest-priced element in the file. A test case was done and the output can be seen in the attached picture below.

import java.io.File;

import java.io.FileNotFoundException;

import java.util.Scanner;

class Brainly{

   public static void main(String[] args) throws FileNotFoundException {

       Scanner console = new Scanner(System.in);

       System.out.print("file location: ");

       String inputLocation = console.next();

       File inputFile = new File(inputLocation);

       Scanner in = new Scanner(inputFile);

       lowestPrice(in);

   }

   public static void lowestPrice(Scanner in) {

       double smallest = in.nextDouble();

       while(in.hasNextDouble()){

           double number = in.nextDouble();

           if (number < smallest) {

               smallest = number;

           }

       }

       System.out.println(smallest);

       in.close();

   }

}

A student is conducting an experiment in which he adds an inhibitor to an enzyme-catalyzed reaction that contains alkaline phosphatase. When the student first adds the inhibitor, the reaction rate decreases, however, he can return the reaction rate to normal by adding a large quantity of substrate. What type of inhibitor is the student using, non-competitive or competitive?

Answers

Answer:

competitive

Explanation:

An inhibitor is a substance that hinders the action of an enzyme. An inhibitor may be competitive or non competitive.

A competitive inhibitor is an inhibitor that is very similar to the substrate hence it binds to the enzyme instead of the substrate. A noncompetitive inhibitor binds to a site that is different from the active site. This site is called an allosteric site.

If we look at the experiment described in the question, the reaction rate decreases upon addition of the inhibitor. This effect is reversed by adding a large quantity of substrate.

The implication of this observation is that the enzyme and the inhibitor compete for the active site on the substrate.

Hence the inhibitor is a competitive inhibitor.

Answer:

competitive inhibitor is the students using

Assume that a file contains students’ ids, full names, and their scores (Assignments grade, quizzes grade, Midterm grade, Practical exam grade, and final exam grade) (each column is separated by $). You are required to write a C program to do the following:



• Using the concept of parallel arrays create records for students with above attributes (id, full name, score).(you are not allowed to use structure)

• Ask the user to enter the input file name and read it (suppose that, there are different files you could read data from). Read the data from the file and store it in record for students, which has IDs, Names, and Scores. The IDs should be declared as integers, the Names as a two-dimensional array of characters and the Scores as doubles. Assume that the maximum length of full name of any student is 50 characters. Also, you may assume that there will be No more than a 1000 student records in the file.

• Calculate the final grade as the flowing:

Grade= (Assignment)*15%+(Quizzes) *15%+(Midterm exam) *25%+(Practical Exam)

*10%+(Final) *35% Assuming that data in files are arranged in same order of the above equation with respect to grades



Hint: read form file, calculate the final score, and store it in the record before going to the next step.

• Display the following menu to the user and read the entered choice:

1) Sort data in ascending order according to students’ IDs and then display it.

2) Sort data in ascending order according to students’ names and then display it.

3) Sort data in descending order according to students’ scores and then display it.

Note: After running any of the above menus items, ask the user if he/she would like to save the current result, if so, prompt user to enter file name.

4) Ask the user to enter a student ID and display his score

5) Ask the user to enter a student name and display his score

6) Exit the program











 The program should keep displaying the menu until the user selects to exit from the program.

Implement each of the first five menu options as a separate function.

The attached file “data.txt” is for test.

Answers

Thank lord for you please

Use the drop-down menus to complete the steps for rearranging the layout of a form.

1. Open the form in
✔ Design
view.

2.
✔ Press Ctrl+A
to highlight all of the fields.

3. Under Form Design Tools, select the
✔ Arrange
tab.

4. Choose the Remove Layout button.

5. Reorder and arrange the layout as desired.

6. Review the changes in the
✔ Layout
view.

7. Click Save.

Just did it.

Answers

Answer:

1. Open the Form

2. Arrange tabs

3. Layout view

4. Reoder and arrange the Layout as desired

5. Press Ctrl + A

6. Choose the remove Layout button

7. Click Save

I am not sure

The complete steps for rearranging the layout of a form are in the order:

1, 2, 3, 4, 5, 6, and 7.

What is a form layout?

A form layout is the arrangement of all elements, components, and attributes of your form and the placement of the form on a specific page.

When rearranging the layout of the form, the steps to take are as follows:

Open the form in Design View (this means that the form needs adjustment and rearrangement.Press Ctrl+A (this control all function) helps to highlight all the features in the form layout fields.Under Form Design Tools, select the Arrange tab.Choose the Remove Layout button.Reorder and arrange the layout as desired.Review the changes in the Layout view.Click Save.

Learn more about form layout arrangement here:

https://brainly.com/question/9759966

#SPJ2

A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on the user’s/attacker’s screen and does not modify data stored on the server.

Answers

Answer:

" Non-persistent" is the right response.

Explanation:

A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.

Create a method called nicknames that passes an array as a parameter. Inside the method initialize it to hold 5 names of your choice. Use the for each enhanced loop to print the elements of the array.

Answers

Answer:

    //======METHOD DECLARATION=========//          

    //method name: nicknames                                          

    //method return type: void                                            

    //method parameter: an array reference                    

    public static void nicknames(String [] names){      

       //initialize the array with 5 random names              

       names = new String[] {"John", "Doe", "Brian", "Loveth", "Chris"};

       //using an enhanced for loop, print out the elements in the array

       for(String n: names){

           System.out.print(n + " ");

       }

       

    }

Explanation:

The program is written in Java. It contains comments explaining important parts of the code. Kindly go through these comments.

A few things to note.

i. Since the method does not return any value, its return type is void

ii. The method is made public so that it can be accessible anywhere in and out of the class the uses it.

iii. The method is made static since it will most probably be called in the static main method (at least for testing in this case)

iv. The method receives an array of type String as parameter since the names to be stored are of type String.

v. The format of initializing an array manually should follow as shown on line 7. The new keyword followed by the array type (String), followed by the square brackets ([]) are all important.

vi. An enhanced for loop (lines 9 - 11) is a shorthand way of writing a for loop. The format is as follows;

=> The keyword for

=> followed by an opening parenthesis

=> followed by the type of each of the elements in the array. Type String in this case.

=> followed by a variable name. This holds an element per cycle of the loop.

=> followed by a column

=> followed by the array

=> followed by the closing parenthesis.

=> followed by a pair of curly parentheses serving as a block containing the  code to be executed in every cycle of the loop. In this case, the array elements, each held in turn by variable n, will be printed followed by a space.

A complete code and sample output for testing purposes are shown as follows:

==================================================

public class Tester{

    //The main method

    public static void main(String []args){

       

       String [] names = new String[5];

       nicknames(names);

    }

   

  //The nicknames method

    public static void nicknames(String [] names){

       names = new String[] {"John", "Doe", "Brian", "Loveth", "Chris"};

       for(String n: names){

           System.out.print(n + " ");

       }

       

    }

}

==================================================

Output:

John Doe Brian Loveth Chris

NB: To run this program, copy the complete code, paste in an IDE or editor and save as Tester.java

Using the celsius_to_kelvin function as a guide, create a new function, changing the name to kelvin_to_celsius, and modifying the function accordingly. Sample output with input: 283.15 10.0 C is 283.15 K 283.15 K is 10.0 C 1 def celsius_to_kelvin value.celsius): value_kelvin 0.0 value_kelvin - value.celsius + 273.15 return value kelvin DIO! 5 7. Your solution goes here 9 value c - 10.0 10 print(value.c, Cis', celsius.to kelvin(value.c), 'K) 12 value floatinput ) 13 print(value, Kis', kelvin_to_celsius(value. ). 'C"> Run

Answers

Answer:

The function is as follows:

def  kelvin_to_celsius(value_kelvin):

   value_celsius = 0.0

   value_celsius = value_kelvin - 273.15

   return value_celsius

Explanation:

This defines the function

def  kelvin_to_celsius(value_kelvin):

This initializes value_celsius to 0

   value_celsius = 0.0

This calculates value_celsius

   value_celsius = value_kelvin - 273.15

This returns the calculated value_celsius

   return value_celsius

When performing the ipconfig command, what does the following output line depict if found in the tunnel adapter settings?
IPv6 Address: 2001:db8:0:10:0:efe:192.168.0.4
a. IPv6 is disabled.
b. The addresses will use the same subnet mask.
c. The network is not setup to use both IPv4 and IPv6.
d. IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe

Answers

Answer:

d. IPv4 Address 192.168.0.4 is associated with the globe IPv6 address 2001:db8:0:10:0:efe

Explanation:

The adapter setting will be associated with the global IP address. When Ipconfig command is operate the IP address finds the relevant domain and then address will use a different subnet. The network will use both IPv4 and IPv6 subnets in order to execute the command.

In the tunnel adapter settings, when performing the ipconfig command, the given output line depicts: D. IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe.

What is a tunnel adapter?

A tunnel adapter can be defined as a virtual interface which is designed and developed to encapsulate packets as a form of tunnel or virtual private network (VPN) protocol while sending them over another network interface.

In Computer networking, an output line of "IPv6 Address: 2001:db8:0:10:0:efe:192.168.0.4" in the tunnel adapter settings simply means that an IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe.

Read more on IP address here: https://brainly.com/question/24812743

Compare and contrast the older multiplexing techniques such as frequency division and time division multiplexing with the newer techniques such as discrete multitone and orthogonal frequency division multiplexing. What appears to be the trend in these newer protocols?

Answers

Answer:

As compared to new multiplexing techniques, older techniques like FDM frequency-division multiplexing (FDM) may be a technique by which the entire bandwidth available during a communication medium is split into a series of non-overlapping frequency sub-bands, each of which is employed to hold a separate signal.

Explanation:

Especially used for Radio and tv Broadcasting and TDM ( Time-division multiplexing (TDM) may be a method of transmitting and receiving independent signals over a standard signal path by means of synchronized switches at each end of the cable in order that each signal appears on the road only a fraction of your time in an alternating pattern, especially used for telegraphy) are simple; they'll be suffering from noise and their transmission speeds are high. New techniques are far more complex, they will be suffering from more noise and transmission speeds are very high as compared to older techniques.

which of the following is not a hardware component a) input devices b)storage devices c)operating systems d)processing​

Answers

Answer:

C. Operating systems

Explanation:

Operating systems are software components, not hardware. (Think about Apple OS or Android, they are softwares that are ON the hardware, which is the physical device.)

C operating system. An operating system is a system/software in a computer or electronic device

In C complete the following:

void printValues ( unsigned char *ptr, int count) // count is no of cells
{
print all values pointed by ptr. //complete this part
}
int main ( )
{

unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;
call the printValues function passing the array data //complete this part
}

Answers

Answer:

#include <stdio.h>

void printValues ( unsigned char *ptr, int count) // count is no of cells

{

 for(int i=0; i<count; i++) {

   printf("%d ", ptr[i]);

 }

}

int main ( )

{

 unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;

 printValues( data, sizeof(data)/sizeof(data[0]) );

}

Explanation:

Remember that the sizeof() mechanism fails if a pointer to the data is passed to a function. That's why the count variable is needed in the first place.

4. All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent
through visual and auditory channels.
Communication includes both the verbal and nonverbal messages sent and received.
The goal of effective communication is mutual understanding.
You can improve your communication by improving your understanding of yourself, others,
and the context of the communication.
When you are listening to another person speak, you can avoid sending any messages by not
speaking and not making eye contact.

Answers

Answer:

D

Explanation:

Communication are happen when 2 people are response each other

It is not true that when you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact. The correct option is 4.

What is communication?

The process of communicating information, concepts, ideas, or sentiments between two or more people through a variety of means and channels, including verbal and nonverbal communication, is referred to as communication.

It is a myth that you may avoid transmitting any messages when you are listening to someone else speak by remaining silent and avoiding eye contact.

Your body language and nonverbal communication, such as your facial expressions and eye contact, can still convey information to the speaker even if you are not replying verbally or establishing eye contact.

Hence, even if a message is unintended or nonverbal, all types of communication entail sending and receiving messages.

Thus, the correct option is 4.

For more details regarding communication, visit:

https://brainly.com/question/22558440

#SPJ2

Your question seems incomplete, the probable complete question is:

All of the following statements are true EXCEPT one. Which

statement is NOT true?

Select the best option.

Communication occurs between senders and receivers within a context by messages sent through visual and auditory channels.Communication includes both the verbal and nonverbal messages sent and received. The goal of effective communication is mutual understanding.You can improve your communication by improving your understanding of yourself, others, and the context of the communication.When you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact.

Given that n refers to a positive int use a while loop to compute the sum of the cubes of the first n counting numbers, and associate this value with total. Use no variables other than n, k, and total in python

Answers

Answer:

The program in Python is as follows:

n = int(input("n:"))

total = 0

for k in range(1,n+1):

   total+=k**3

print(total)

Explanation:

This gets input for n

n = int(input("n:"))

This initializes total to 0

total = 0

This iterates from 1 to n

for k in range(1,n+1):

This adds up the cube of each digit

   total+=k**3

This prints the calculated total

print(total)

You trained a binary classifier model which gives very high accuracy on thetraining data, but much lower accuracy on validation data. The following maybe true:
a. This is an instance of overfitting.
b. This is an instance of underfitting.
c. The training was not well regularized.
d. The training and testing examples are sampled from different distributions.

Answers

Answer:

a. This is an instance of overfitting.

Explanation:

In data modeling and machine learning practice, data modeling begins with model training whereby the training data is used to train and fit a prediction model. When a trained model performs well on training data and has low accuracy on the test data, then we say say the model is overfitting. This means that the model is memorizing rather Than learning and hence, model fits the data too well, hence, making the model unable to perform well on the test or validation set. A model which underfits will fail to perform well on both the training and validation set.

A Key Factor in Controlling Your Anger Is Using Passive behaviour.T/F

Answers

Answer:

The answer is "True".

Explanation:

Assertiveness means that others are encouraged to be open, honest about their thoughts, wishes and feelings so how they can act properly. Assertive behavior: be open and communicate wishes, ideas and feelings, as well as encourage others to do likewise. Please visit our Emotional Regulation page. A major aspect is the ability to control your anger. Once you are quiet or aggressive, work very hard.

asdcvnmn bvcdxszasdfghjk.

Answers

Answer:

fewrugbrubpwerivrib

Explanation:

vbhresibvhresiupvkbjriururbvurfiuibvuefsbiuiuvuib

१८. तलका शीर्षकमा १५० शब्दसम्मको निबन्ध लेख्नुहोस् :
(क) सुशासन र विकास

Answers

Answer:

n

Explanation:

Answer:

kkkkkkkkikkkkkkkkkkkiikkiiii

Globally, most cell phone carriers use GSM technology, a combination of time division and frequency multiplexing.
Why do you think this has become the multiplexing technology of choice for most carriers?
Why not code division, for example, which some major US cell phone carriers still use?

Answers

Answer:

The many reason why we still use Global System for Mobile communication is for the ability to transfer data and voice both at once. But others like Code Division does not have this feature.

Explanation:

List the four workplace trends discussed in the lecture.













Answer:
The global economy, teamwork, technology, and diversity

Answers

Answer:

Trends in the workplace are constantly evolving and the latest trends are tough to maintain. Ten years ago, employers did not care about open businesses, advantages like ping pong tables and lunches on Fridays, or standing desks and unbounded time off. As times change, however, companies have to adopt trends to increase productivity and employee involvement in the workplace.

Explanation:

Global economy: The global economy refers to the worldwide interconnected economic activities between several countries. These economic activities could impact the countries concerned either positively or negatively.

There are several features in the global economy, for example:

Globalization.International trade.International finance.Global investment.TEAMWORK: "To work together with a group of people to achieve an objective. Teamwork is often an important part of a company, as colleagues often have to work together well and to try their best in all circumstances. Work in a team means that, despite any personal conflicts between people, people will try to cooperate, use their individual abilities, and provide constructive feedback."

It is selfless teamwork. It concentrates on the ultimate objective. Teamwork is based on the idea that the whole exceeds the sum of its components. It's the traditional idea of "one plus one is equal to three." Personalities and the ability to create personal conflicts are different. However, the differences between the members of the team become strengths and goals, if the whole team focuses on doing great work.

TECHNOLOGY: The skills, methods, and processes used to achieve objectives are technology. The technology to use is:

Manufacture products and servicesachieve objectives such as scientific research or sending a moon spaceshipSolve issues like sickness or starvationWe already do things, but easier.

Knowledge of how to do things maybe technology. Embedding machines are examples. This enables others to use the machines without knowing how they function. By taking something, changing it, and producing results, the technological system uses the technology. They are also known as systems of technology.

Developing and using fundamental tools is the simplest form of technology. The discovery of fire and the Revolution made food more readily available. Additional inventions such as the ship and the wheel have helped people and themselves to transport goods. IT, like the printer, the phone, and the internet, has led to Globalization.

DIVERSITY:

Diversity is a range of differences in the human race, ethnicity, sexuality, age, social class, physical capacity or attributes, religious or ethical values systems, nationality, and political faith.

Inclusion is participation and empowerment, which recognize everybody's inherent worth and dignity. An included university supports and promotes the sense of belonging; respects its members' talents, beliefs, backgrounds, and livelihoods. They respect and practice them.

Answer:

The global economy, teamwork, technology, and diversity

Explanation:

Which of the following statement is true? Single choice. (2 Points) Views are virtual tables that are compiled at run time All of the Mentioned Views could be looked as an additional layer on the table which enables us to protect intricate or sensitive data based upon our needs Creating views can improve query response time

Answers

Answer:

All of the mentioned views could be looked as an additional layer in the table which enables us to protect intricate or sensitive data based upon our needs.

Explanation:

View is a virtual table which executed a pre compiled query. It is a table in which selective portion of the data can be seen from one or more tables. Queries are not allowed in indexed views and adding column is not possible. Views can be looked as an additional layer in the virtual table which protects sensitive data.

what are Manuscript signs​

Answers

Answer: See explanation

Explanation:

Manuscript signs, refers to the marks or the symbols that are used within a manuscript in order to show the necessary corrections which should be made during the preparation of a document.

Manuscript formatting is vital as it makes the manuscript easier to assess. In a situation whereby manuscripts are poorly formatted, it can be turned down by agents and publishers.

Design a class named largeIntegers such that an object of this class can store an integer of any number of digits. Add operations to add, subtract, multiply, and compare integers stored in two objects. Also add constructors to properly initialize objects and functions to set, retrieve, and print the values of objects. Write a program to test your class. g

Answers

Answer:

Here the code is given as follows,

Explanation:

Code:

import java.util.Scanner;

//created class named largeintegers

class largeintegers{

   //class can hold a long number

   long number;

   //constructor to set number

  largeintegers(long number){

      this.number=number;

  }

  //getNumber method to get number

  long getNumber(){

      return number;

  }

  //below are some basic operations

  long addition(long num1,long num2){

       return num1+num2;

   }

   long subtract(long num1,long num2){

       return num1-num2;

   }

   long multiply(long num1,long num2){

       return num1*num2;

   }

   boolean compare(long num1,long num2)

   {

       return num1>num2;

   }

  public static void main(String[] args) {

      //declared to long numbers

      long number1,number2;

      //scanner class to take user input

      Scanner sc= new Scanner(System.in);

      //taking input numbers

      System.out.println("Enter a Number ");

      number1=sc.nextLong();

      System.out.println("Enter 2nd Number :");

      number2=sc.nextLong();

      //created two objects

      largeintegers object=new largeintegers(number1);

      largeintegers object2=new largeintegers(number2);

      //displaying two numbers

      System.out.println("Entered Numbers ");

      System.out.println(object.getNumber());

      System.out.println(object2.getNumber());

      //calling basic methods using created objects

      System.out.println("Some Operations on Given two Numbers ");

      System.out.println("Addition:"+object.addition(object.getNumber(), object2.getNumber()));

      System.out.println("Subtraction:"+object.subtract(object.getNumber(), object2.getNumber()));

      System.out.println("Multiplication:"+object.multiply(object.getNumber(), object2.getNumber()));

      System.out.println("Comparison:");

      if(object.compare(object.getNumber(), object2.getNumber())==true)

      {

          System.out.println("First Number is Greater than Second Number ");

      }

      else

      {

          System.out.println("Second Number is Greater than First Number ");

      }

      sc.close();

  }

}

Output:-

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

Answers

The question is incomplete. The complete question is :

Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:

The user's ID in plaintext.

10 bits of randomly chosen "salt," in plaintext.

The user's password, concatenated with the salt, and then encrypted.

There are very many such systems around the world, and Holly plans to steal the password files from as many as she can. The average system has 50 users in its password file.

Holly wants to create a master list of the encrypted versions of all the 100,000 passwords on her list, encrypted with all possible salt values. To create this master list, approximately how many encryptions of a password-concatenated-with-salt would Holly have to perform?

A. 2 million

B. 5 million

C. 100 million

D. 1 million

Solution :

It is given that the hacker, Holly wants break into the  UNIX-like systems using 100,000 common passwords that she has on her list. The system has at an average of 50 users in the password files.

Therefore, to create a master list, Holly have to perform about 50 x 100,000 = 5,000,000 encryptions for the password concatenated-with-salt.

Thus the correct option is option (B).  5 million

in order to switch from paper to digital medical records the hospital bought in several individuals to introduce and implement the tools needed to organize the files . These individuals would best be described as

Answers

Available options are:

A. Technical champions

B. Engaged filmmakers

C. Business partners

D. Compliance champions

Answer:

Technical champions

Explanation:

Given that a "Technical Champion" is someone whose responsibility is to introduce and perform the role of enabling the use of technology, development of skills across the organization, and strengthen communication between Information Technology and the staff or employees.

Hence, in this case, considering the job descriptions described in the question above, these individuals would best be described as TECHNICAL CHAMPIONS

NO LINKS
Write a C++ program to accept a 5 digit integer and to validate the input based on the following rules.

Rules

1) The input number is divisible by 2. 2) The sum of the first two digits is less than last two digits. if the input number satisfies all the rules, the system prints valid and invalid, otherwise,

Example 1:

Enter a value: 11222

Output: Input number is valid

Example 2:

Enter a value: 1234

Output: Input number is invalid​

Answers

Answer:

#include <iostream>

#include <string>

#include <regex>

using namespace std;

int main()

{

   cout << "Enter a 5-digit number: ";

   string number;

   cin >> number;

   bool valid = regex_search(number, regex("^\\d{4}[02468]$"));

   if (valid) {

       valid = stoi(number.substr(0, 1)) + stoi(number.substr(1, 1))  

           < stoi(number.substr(3, 1)) + stoi(number.substr(4, 1));

   }

   cout << number << (valid ? " is valid" : " is invalid");

}

Explanation:

Regular expressions can do all of your checking except for the sum of digits check. The checks are i.m.o. easiest if you don't treat the input as a number, but as a string with digits in it.

The regex means:

^ start of string

\d{4} exactly 4 digits

[02468] one of 0, 2, 4, 6 or 8 (this is what makes it even)

$ end of string

An entertainment application would most likely do which of the following?
A. allow users to watch popular movies and TV shows
B. connect users with social and business contacts
C. confirm users' travel plans
D. teach users a new language

Answers

Answer:

A is the answer to this question

Answer:

A. allow users to watch popular movies and TV shows

Explanation:

Other Questions
Find the value of x and the value of y. The molar mass of copper(II) chloride (CuCl2) is 134.45 g/mol. How many formula units of CuCl2 are present in 17.6 g of CuCl2? Ill fail if I dont get this right pls help 1. Explain how to find the area of a complex figure. Draw an example to help illustrateyour understanding. Please help! 2. What do you mean by religious tolerance? how can we maintain religious Tolerance?What are its importance? Firm K is planning on merging with Firm L. Firm K currently has 5,500 shares of stock outstanding at a market price of $28 a share. Firm L has 500 shares outstanding at a price of $16 a share. The merger will create $600 of synergy. Firm K plans to offer a sufficient number of its shares to acquire Firm L at an acquisition cost of $8,200. How many total shares will be outstanding in the merged firm PLEASE HELP I'M SORRY FOR A LOT OF QUESTIONS but I need help Which function is an even function? Why are regions with moderate climates heavily populated?A. They experience strong winds.B. They receive excessive rainfall.C. They have a climate that is good for agriculture.D. They are home to diverse wildlife species. E.They are immune from pollution.ResetNext Number of molecules in 16 grams of h2co3 Trong my pht in xoay chiu ba pha khi tng in p tc thi ca cun 1,2 l e1+e2=120V th in p tc thi ca cun 3 l Pls help me so I can pass my math if I dont pass Ill get left back Please help me with my maths Instructions: Write complete sentences to say what each person is doing. Follow the model.modelo: nosotros / estudiar mucho: Nosotros estudiamos mucho.1.) T / siempre / tomar apuntes2.) Fernando y Clara / casi nunca / montar en bicicleta.3.) Yaliza y yo / nunca / sacar malas notas.4.) Usted / ensear matemticas. Which work from the Italian Renaissance is an example of mannerism?A. The sculpture onlyO, aB. The left painting onlyC. The two paintings onlyD. The right painting only zodwa needs R450550.00 to buy a house, the bank approved her loan for the full amount at an interest rate of 25% per year, compounded quarterly, the loan must be paid off in ten years time. determine the size of zodwas quarterly payments? In 2015, Tamya spent 100 hours reading. In 2016, she has only read 9.5 hours. How many more hours does she have to read in order to also read 100 hours in 2016? A scientist studied a population of birds for 10 years. During that time, the population was never fewer than 30 birds and never more than 50. Her data showed that over half of the birds born did not survive to reproduce, because of competition for food and predation. She noticed that In a single generation, about 90% of the birds that were born lived to reproduce, and the population increased to 90. Which inference(s) about this population might be true When naming a molecule, how do you indicate that the carbons on either sideof the double bond are pointing in opposite directions? which of the following statement is true?