Answer:
#include <iostream>
using namespace std;
int main() {
int start, end;
cout << "Enter start number: ";
cin >> start;
cout << "Enter end number: ";
cin >> end;
for(int n=start; n<=end; n+=5) {
cout << n << " ";
}
}
Explanation:
I output the numbers space separated.
In Python, a function is _____.
a group of instructions that can be used to organize a program or perform a repeated task
a value that can be passed back to the calling part of a program
a formula that pairs each x-value with a unique y-value
a value that can be passed
Answer:
a group of instructions that can be used to organize a program or perform a repeated task
Explanation:
A function is a group of commands that can be called upon with extra parameters if needed.
Example:
def foo(): #defining this function and naming it foo
return True #what is performed when foo is called on
if foo() == True: #foo() is calling on a function named foo
print('yes')
When entering information for a new contact in the address book, Outlook will automatically create a _____. A. Invitation B. Response email C. Business card D. Calender
A local pharmacy added a new regulation about wearing gloves when in contact with any drug. It also bought a new insurance policy. The pharmacy then replaced the pill counting machine that was incorrectly dispensing medications. Which best explains the actions the pharmacy has taken to promote safety?
Wearing gloves reduces risk, the insurance policy shares the risk, and the new machine is a quality-improvement strategy that will reduce the probability of errors.
Wearing gloves shares the risk, the insurance policy reduces the risk, and the new machine is a quality-improvement strategy that will reduce the negative effects of errors.
Wearing gloves shares the risk, the insurance policy reduces the risk, and the new machine is a quality-improvement strategy that will reduce the probability of errors.
Wearing gloves reduces risk, the insurance policy shares the risk, and the new machine is a quality-improvement strategy that will reduce the negative effects of errors.
Answer:
First option.
Wearing gloves reduces risk.
The insurance policy shares the risk.
The new machine is a quality improvement strategy that will reduce the probability of errors.
What is computer task bar
Answer:
It is a bar where you can see all of your tasks or pinned items.
Explanation:
You are an IT consultant. You are visiting a new client's site to become familiar with their network. As you walk around their facility, you note the following: When you enter the facility, a receptionist greets you and directs you down the hallway to the office manager's cubicle. The receptionist uses a notebook system that is secured to her desk with a cable lock. The office manager informs you that the organization's servers are kept in a locked closet. Only she has the key to the closet. When you arrive on site, you will be required to get the key from her to access the closet. She informs you that server backups are configured to run each night. A rotation of external USB hard disks are used as the backup media. You notice that the organization's network switch is kept in an empty cubicle adjacent to the office manager's workspace. You notice that a router/firewall/content filter all-in-one device has been implemented in the server closet to protect the internal network from external attacks. Which security-related recommendations should you make to this client
Answer: • Control access to the work area with locking doors and card readers.
• Relocate the switch to the locked server closet
Explanation:
Based on the information given, the security-related recommendations that should be made to this client include:
• Relocate the switch to the locked server closet: Since the organization's network switch is kept in an empty cubicle that is adjacent to the office manager's workspace, it can be easily accessible by anyone and this could lead to an external attack. Therefore, it should be moved to the locked server closet to prevent external attack.
• Control access to the work area with locking doors and card readers- Thus us necessary so that the work area won't be accessible to just anybody.
Using a trick or fraud to steal personal information is called (5 points)
A. hacking
B. identity theft
C. netiquette
D. scamming
Answer:
its D
Explanation:
ive done this before i remeber i got d
31) Listed below are four general means of authenticating a user's identity, which can be used alone or in combination, provide two examples of each mean. a) Something the individual knows b) Something the individual possesses: c) Something the individual is (static biometrics): d) Something the individual does (dynamic biometrics): 20 points 32) Explain the following attacks and provide the countermeasure for each on of then: a) Specific Account Attack The standard countermeasure b) Workstation Hijacking The standard countermeasure C)Password Guessing Against single user The standard countermeasure
Answer:
31) Examples of the means of authenticating a user's identity that can be used alone or in combination are;
a) Something the individual knows;
The Personal Identification Number (PIN)
The password to an account
Answer to a (complete) set of questions
b) Something the individual possesses
An ATM card
A SIM card
Other examples includes;
Physical keys to a lock
Smart cards
Electronic Key-Card used for physical entrance into an apartment
c) Something the individual is (Static biometrics)
The fingerprint
Face recognition
Retina recognition
d) Something the individual does (dynamic biometrics);
Recognition of typing rhythm
Characteristics of the users handwriting
Voice pattern recognition
32) a) Specific account attack
A specific account is targeted for the attack by the attacker attempting to gain access by submitting guesses of the account password with the aim of finding the correct password
Countermeasure;
Limiting the number of password guesses
The use of strong passwords having over 8 characters that includes special characters
Use of multi-factor authentication
b) Workstation Hijacking
The attacker takes advantage of an logged-in unattended workstation
Countermeasure;
The use of automatic lock functions that use time of inactivity on a system or the absence of a paired device
c) Password Guessing
Password guessing is the technique used while online in an attempt to prove to being the authentic particular user by means of trial and error of a user password
Countermeasure;
The use of a two or more of authentication method also known as a multi-factor authentication MFA
Explanation:
Tonya wants to keep her class schedule, assignments, and notes all in one place. Which online note-taking tool would be the best one to use?
A) electronic sticky notes
B) an electronic notebook
C)a web clipping tool
D) digital flash cards
PLS HELP AND PLS HURRY!!
Answer:
C) an electronic notebook
Explanation:
i just did it
The online note-taking tool that would be the best one to use is an electronic notebook. The correct option is B.
What is an electronic notebook?A computer application meant to replace paper laboratory notebooks is known as an electronic lab notebook (ELN). Scientists, engineers, and technicians utilize lab notebooks to document research, experiments, and procedures performed in a laboratory.
Some downsides include security problems, inability to upgrade, damage potential, and limited capability. Smart notebooks are one approach to bridge that gap: they allow you to write on actual paper with a real pen and then transfer your notes to your smartphone, tablet, or computer, albeit the method varies depending on the sort of smart notebook you use.
Therefore, the correct option is B) an electronic notebook.
To learn more about electronic notebooks, refer to the link:
https://brainly.com/question/1569710
#SPJ2
will give brainliest
The height or amplitude of a wave is related to the input of ________
a. energy
b.matter
c.energy and matter
Answer:
a. energy
Explanation:
The higher the amplitude, the higher the energy. To summarise, waves carry energy. The amount of energy they carry is related to their frequency and their amplitude. The higher the frequency, the more energy, and the higher the amplitude, the more energy.
Hope this helped!!!
condition of watering a plant
Answer:
Hydration?
Explanation:
Introduction to Database: Tutorial
10 of
Name
Nancy
Date of Birth Age Blood Type
9/17/97
17 o positive
10/23/97 17 A positive
Hobby
Talent Show Registration Unique ID
drawing and painting, music Yes
A_001
reading, creative writing Yes
A_002
William
Philip
2/22/97
18
B positive
Yes
A_003
Jean
7/25/97
17
No
A_004
playing guitar
sports
George
7/29/98
16
Yes
A_005
Allan
8/16/97
17
Yes
O positive
A negative
O positive
o positive
o negative
AB positive
computer games
sports
A_006
A_007
17
No
Roger 12/11/97
Kimberly 5/12/98
16
Yes
A_008
Anne
6/10/97
17
Yes
A_009
video games
watching TV
reading fiction
listening to music
William
5/22/98
16
O positive
Yes
A_0010
Diane
3/24/97
17
A positive
Yes
A_0011
Part A
What are the field names in the database? Explain what data type is appropriate for each field.
B I y X
Х.
Font Sizes
AA
= = 三 三 三 三
Answer: this is the best situation
Explanation: it shows the process
Answer:
PLATO ANSWER. Sample Answer
Explanation:
The field names in the database are Name, Date of Birth, Age, Blood Type, Hobby, Talent Show Registration, and Unique ID. Here are the types of data that you can enter into each field.
Name:This field has 5 to 10 characters and accepts text data only.
Date of Birth: This field accepts dates only. It uses a medium-length entry in the form of month/day/year (mm/dd/yy).
Age: This field is numerical and contains numerical data only.
Blood Type: This field contains text data, with a maximum of 11 characters.
Hobby: This field can be a memo, and it can accept large volumes of data in any format. This data type can include null values as well.
Talent Show Registration: This is a Boolean data field that contains the values Yes or No.
Unique ID: This field accepts alphanumeric data, so this, too, is a text field.
The Find and _______ commands allow you to easily locate and replace text. Bookmarks allow you to easily navigate to other parts of a document while _______ allow you to easily navigate to places within or outside the document. Use the _______ _______ to find out if your document contains personal information and comments. If the person receiving your document has a pre-2010 version of Microsoft Word, it makes sense to use the _______ _______. To make sure your document can be read by devices for the visually impaired, run the _______ _______.
Answer:
(a): Replace
(b): Hyperlinks
(c): Document Inspector
(d): Compatibility checker
(e): Accessibility checker
Explanation:
You will get the brief explanation of what each of the answers in the answer section does, when you complete the blanks with the answers.
However, further explanation is as follows;
(a): The find and replace tool or command allows the user to quickly replace a certain character or word or group of words with another character or word or group of words.
(b): Hyperlinks are used to link to a new document entirely or a point in the current document. Hyperlinks in Microsoft Office Word, are often in blue, and they are always double underlined.
(c): Document inspector checks hidden data such as personal information.
(d): Compatibility checker checks if a Word document is compatible with a previous edition of Microsoft Office Word.
(e): Accessibility checker checks if the people living with disabilities can use the Word document without issues.
The correct answer for each of the blanks in the given paragraph about commands and tools in computer are;
REPLACEHYPERLINKSDOCUMENT INSPECTOR COMPATIBILITY CHECKERACCESSIBILITY CHECKERA) The commands that allows the user to quickly locate and replace a text are called find and replace commands because they are used to replace a certain character or text or group of texts with another.
B) The means by which you are allowed to easily navigate to places within or outside the document is called Hyperlinks. This is because that are used to give us a link to a new document or a related one outside of the current document.
C) The tool used to find out if your document contains personal information and comments is called Document inspector. This is because it aids in checking personal information and other hidden data information.
D) The tool to use if the person receiving your document has a pre-2010 version of Microsoft Word, is called Compatibility checker. This is because a compatibility checker would help to find out if a particular Word document is compatible with a previous version of Microsoft Word.
E) The tool to run to make sure your document can be read by devices for the visually impaired is called Accessibility checker as it has inbuilt codes to assist in checking if the document can be effectively utilized by people living with disabilities.
Read more about tools and commands in Microsoft Word at; https://brainly.com/question/1323179
1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disabled?
Select one:
Backdoor
Rootkit
Logic Bomb
Trojan Horse
Answer:
it would be logic bomb.
Explanation:
I hope this helps
Internet search criteria can be refined by using ____.
• complete sentences
• Boolean operators
• alphabetized lists
• small words
Which element is the first thing you should complete when making a movie?
A script
A storyboard
Opening credits
A video segment
Answer:
storyboard!!!
Explanation:
its important to have the concept in mind before starting
This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste
Answer:
Drag or paste (im not 100% sure tho)
Explanation:
What is a System software that serve as a platform/supports other programs/software in a computer system
Answer:
Operating system.
Explanation:
An operating system is a program, or rather, a macro program or set of programs, whose function is to control the computer hardware, and allow the correct operation of the software installed on it, serving as a platform for it. In this way, the operating system allows, basically, the use of the computer in a functional way by the user, who will be able to run different programs and use different hardware thanks to the previous installation of the operating system. The most common operating systems today are Windows and macOS.
C++
Assume the existence of a Window class with integer data members width and height. Overload the << operator for the Window class-- i.e., write a nonmember ostream-returning function that accepts a reference to an ostream object and a constant reference to a Window object and sends the following to the ostream: 'a (width x height) window' (without the quotes and with width and height replaced by the actual width and height of the window. Thus for example, if the window had width=80 and height=20, << would send 'a (80 x 20) window' to the ostream object.) Don't forget to have the function return the proper value as well. Assume the operator has been declared a friend in the Window class.
Answer:
Following are the code to the given question:
#include <iostream>//header file
using namespace std;
class Window //defining a class Window
{
private:
int width, height;//defining integer variable
public:
friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters
{
return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values
}
Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters
{}
};
int main() //Main method
{
Window w(80,90);//calling class constructor
cout<<w;//print object value
return 0;
}
Output:
a (80 x 90) window
Explanation:
In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.
Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.
grouping keywords into separate lists for different sections for a website is known as
a. researching
b. comparing
c. organizing
d. brainstorming
Answer:
C
Explanation:
A is when you surf the web for facts.
B is just finding the difference between 2+ things.
D is when you think of a bunch of ideas firsthand before officially planning anything.
Brainliest? (❁´◡`❁)
What file format would be required a coworker need to edit a layer in a photoshop file 
-png
-psd
-pdf
-jpeg
PLS HELP ME I NEED HELP WILL GIVE BRAINLIEST
you would use conditional formatting on a cell when you want to _____
Answer:
to format a cell based on the value in it
Explanation:
you would use conditional formatting on a cell when you want to format a cell based on the value in it.
Reason -
Conditional formatting allows you to format a cell based on the value in it.
For example, if you want to highlight all the cells where the value is less than 30 with a red color, you can do that with conditional formatting.
How would you highlight cells with negative values in it?You can use conditional formatting.
What is an example of a composite key in a database table?
InvoiceID
CustomerID
ProductID
OrderID + ProductID
Answer:
b
Explanation:
OrderID + ProductID is an example of a composite key in a database table. The correct option is 4.
What is composite key?A composite key is a key in a database table that consists of two or more columns that uniquely identify each row.
In a database table, a composite key is the combination of OrderID and ProductID in a table that tracks sales transactions.
Because a single order can contain multiple products and multiple orders can contain the same product, neither column can uniquely identify a row by itself.
However, by combining the two columns, each row can be uniquely identified, ensuring that the data is accurate and complete.
Similarly, a combination of CustomerID and ProductID might be used in a sales system to track the products purchased by each customer.
Thus, the correct option is 4.
For more details regarding composite key, visit:
https://brainly.com/question/10167757
#SPJ3
Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in the file. Which shortcut can Brenda use to find this information quickly?
Brenda should use the Ctr+F shortcut to quickly find a specific information in the spreadsheet file.
The process of editing includes which of the following?
(A) Transferring photos to a computer
(B) Combining media
(C) Naming Files
(D) Keeping files secure
Ummmm pls helppp
Which are the features of conditional formatting?
Conditional formatting enables you to_______
and_______
Answer:
A conditional format changes the appearance of cells on the basis of conditions that you specify.
Explanation:
If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates to True or False).
Help! I don’t know what this is.
Answer:
Best: Option 4
Worst: Option 1
Explanation:
The co-worker might be oblivious to the detrimental effect of his actions on work atmosphere. Talking to him and telling him to stop is the first step to improve this.
Option 2 is not as effective, as the co-worker would not know the reason and might just talk behind people's backs to other people, thus no actual progress would be made, except less communication overall.
Option 3 is likely to antagonize people, with the engineers being unhappy about your co-worker, and the co-worker being mad at you for telling on him. This option is the most likely to end up with someone leaving the job.
Option 1 is just expanding the circle of bad behavior, hence probably the worst possible.
which type of protocol allows for a secure data transmission using encryption methods?
Answer:
The Transport Layer Security (TLS) protocol adds a layer of security on top of the TCP/IP transport protocols. TLS uses both symmetric encryption and public key encryption for securely sending private data, and adds additional security features, such as authentication and message tampering detection
I GOT A 65% LAST TIME AND IM DOING RETAKE! PLEASE DONT FAIL ME THIS TIME
which information will help you figure out how often your website should be updated
a. cost of updates
b. time for updates
c. visitor frequency
d. resources to update it
Answer:
Explanation: c vecause am pro
) Perform error checking for the data point entries. If any of the following errors occurs, output the appropriate error message and prompt again for a valid data point. If entry has no comma Output: Error: No comma in string. (1 pt) If entry has more than one comma Output: Error: Too many commas in input. (1 pt) If entry after the comma is not an integer Output: Error: Comma not followed by an integer. (2 pts)
Answer:
In Python:
entry = input("Sentence: ")
while True:
if entry.count(",") == 0:
print("Error: No comma in string")
entry = input("Sentence: ")
elif entry.count(",") > 1:
print("Error: Too many comma in input")
entry = input("Sentence: ")
else:
ind = entry.index(',')+1
if entry[ind].isnumeric() == False:
print("Comma not followed by an integer")
entry = input("Sentence: ")
else:
break
print("Valid Input")
Explanation:
This prompts the user for a sentence
entry = input("Sentence: ")
The following loop is repeated until the user enters a valid entry
while True:
This is executed if the number of commas is 0
if entry.count(",") == 0:
print("Error: No comma in string")
entry = input("Sentence: ")
This is executed if the number of commas is more than 1
elif entry.count(",") > 1:
print("Error: Too many comma in input")
entry = input("Sentence: ")
This is executed if the number of commas is 1
else:
This calculates the next index after the comma
ind = entry.index(',')+1
This checks if the character after the comma is a number
if entry[ind].isnumeric() == False:
If it is not a number, the print statement is executed
print("Comma not followed by an integer")
entry = input("Sentence: ")
If otherwise, the loop is exited
else:
break
This prints valid input, when the user enters a valid string
print("Valid Input")
Note that: entry = input("Sentence: ") is used to get input