PHP is one of the most popular server-side scripting languages for web development. It is used to develop dynamic and robust web pages. A PHP script is a set of instructions that tell a web server how to respond to a user's request. There are many tasks that can be accomplished with PHP, including creating databases with tables appropriate for storing password / SHA pairs.
In this article, we will discuss how to create a PHP script that accomplishes two tasks: creating a database and creating tables to store password / SHA pairs. Creating a database with tables appropriate for storing password / SHA pairs Creating a database is the first step in creating tables appropriate for storing password / SHA pairs.
To create a database, we need to use the following PHP code:``````In the above code, we have created a connection to the MySQL server using the mysqli_connect() function. Then we have checked the connection using the mysqli_connect_error() function.
After that, we have created a database using the CREATE DATABASE statement. If the database is created successfully, the message "Database created successfully" will be displayed, otherwise, the error message will be displayed.
Creating tables appropriate for storing password / SHA pairs After creating a database, we need to create tables that are appropriate for storing password / SHA pairs. To create a table, we need to use the following PHP code:``````In the above code, we have created a connection to the MySQL server using the mysqli_connect() function.
To know more about accomplished visit:
https://brainly.com/question/31598462
#SPJ11
consider the 3-node packet-switched network: a –––––––– b –––––––– c each link has a propagation delay of 5 ???????????????? and a capacity of 1 gbps. the packet processing time at each node is negligible, and only one message of 100,000 bytes is sent as 200 packets, each with a 500-byte payload and a 40-byte header.
The total end-to-end delay for sending the message from node A to node C in the 3-node packet-switched network is 2 milliseconds.
In a packet-switched network, the end-to-end delay consists of various components, including propagation delay, transmission delay, and queuing delay. In this scenario, it is stated that each link has a propagation delay of 5 microseconds and a capacity of 1 Gbps.
To calculate the total end-to-end delay, we need to consider the following:
1. Transmission Delay: Each packet has a payload of 500 bytes and a header of 40 bytes, resulting in a total packet size of 540 bytes. The transmission delay can be calculated using the formula: Transmission Delay = Packet Size / Link Capacity. Therefore, the transmission delay for each packet is 540 bytes / 1 Gbps = 4.32 microseconds.
2. Propagation Delay: It is given that each link has a propagation delay of 5 microseconds. Since there are three links (A to B, B to C, and A to C), the total propagation delay is 5 microseconds * 3 = 15 microseconds.
3. Queuing Delay: The question mentions that the packet processing time at each node is negligible, indicating that there is no significant queuing delay at the nodes.
Now, we can calculate the total end-to-end delay by summing up the transmission delay, propagation delay, and queuing delay (which is negligible in this case):
Total End-to-End Delay = Transmission Delay + Propagation Delay + Queuing Delay
= 4.32 microseconds + 15 microseconds + negligible queuing delay
= 19.32 microseconds
Converting microseconds to milliseconds, the total end-to-end delay is approximately 0.01932 milliseconds or simply 2 milliseconds.
Learn more about packet-switched network
brainly.com/question/33457992
#SPJ11
happropriate Conduct When Using Digital
Technology
pset with Elizabeth for dumping him. He became even more upset when he found out that she was
ating someone else. Jerry wanted to get revenge on Elizabeth for breaking up with him. He decided to
mare a secret, sexual photo that Elizabeth sent to him when they were dating. Jerry sent Elizabeth's
exual photo to three of his friends. His three friends chose to send it to many of their friends. By the end
of the day, the sexual photo that Elizabeth thought was a secret had been shared with many people,
ncluding strangers.
What happened due to Jerry and Elizabeth sexting? How do you think Elizabeth feels? What do you think
Jerry's punishment should be for sending Elizabeth's photo?
Inappropriate Conduct using Digital Technology.
After reading the paragraph, due to Jerry and Elizabeth sexting, Elizabeth's sexual pictures got leaked since Jerry could not accept that he was dumped and he got offended when he saw that Elizabeth was already dating someone else.
I think that Elizabeth is right now in a state of depression where she cannot trust anyone and will obviously lose the way she had been living her life, this event might have even given her social anxiety where she cannot face anyone outside of her house.
I think that Jerry should be just boycotted everywhere, and he should be stripped of any social media presence, but even this wouldn't be enough for the mental damage he has done to Elizabeth.
How to stay safe while using digital technology?
Consider acquiring a new digital device like a new phone or obtaining a separate donated phone from a shelter for more privacy and security (e.g. a pay-as-you-go phone).To find out if a phone has been stowed away, mechanics or police enforcement can inspect the car.Contact your carrier to secure your digital account with a password or code to prevent unauthorized access.Additionally, see if your digital device has any installed programs that independently request access to and usage of your real-time location, such as for navigational purposes. Some hidden programs may become visible if "display all/hidden applications" is selected as a setting. Take into account shutting down or removing these programs.Change your Bluetooth's default password, make it hidden, and disable it using your phone's settings.In an emergency, call 911 and provide your location.To learn more about digital technology, use the link given
https://brainly.com/question/28079115
#SPJ1
Which behaviors leave the contents of a bag unaltered?
a. contains()
b. remove()
c. clear()
d. add()
The contents of a bag are unaltered by Contains() behaviour.
In Java, how does a bag function?The goal of a bag is to give customers the opportunity to collect items and then iterate through the collected items. Removing objects from a bag is not supported. A series of real data are read from standard input by the bag client Stats. java, which produces out the mean and standard deviation for each.
The same data type or a subtype of that data type must be present in all entries of a bag, right?The same data type, or a subtype of that data type, must be present in each entry in a bag. We can substitute the bag class with another class that implements the Bag Interface by declaring a data to be one. An object that is provided to a method as an argument can have its state changed. A unique kind of bag is a set.
To know more about unaltered visit:-
https://brainly.com/question/30575138
#SPJ4
find the execution time for a program that has 2 billion instructions running in a computer with at cpu speed at 4 ghz. assume that the clock per instructions is 3.5
The execution time for a program with 2 billion instructions running on a computer with a CPU speed of 4 GHz and a clock per instruction of 3.5 is approximately 1.142 seconds.
The execution time (T) for a program can be calculated by the formula:
T = (Number of Instructions * Clocks per Instruction) / Clock Rate
Here:
The number of instructions is 2 billion, or 2 x 10^9.
Clocks per instruction is 3.5.
The clock rate is 4 GHz, which is 4 x 10^9 Hz (cycles per second).
Plugging these values into the formula, we get:
T = (2 x 10^9 Instructions * 3.5 Clocks/Instructions) / 4 x 10^9 Hz
The 'Instructions' term cancels out, leaving us with:
T = (7 x 10^9 Clocks) / 4 x 10^9 Hz
The 'Clocks' term cancels out, yielding:
T = 7 / 4 = 1.75 seconds
So, the execution time for a program with 2 billion instructions running on a 4 GHz computer, given that it requires 3.5 clock cycles per instruction, is 1.75 seconds.
Learn more about execution time computation here:
https://brainly.com/question/31551343
#SPJ11
You are an advisor to the Minister of Telecommunications of the Republic of Symkaria.
The Minster has become aware that a number of social networking sites who operate
from Symkaria are extensively data mining their users' data and selling it to advertisers
who then flood the customers with unwanted emails, texts and calls offering services
and products. Their activities are legal because a clause in the terms and conditions
the social network site operators say their customers
their data in any way'
of Orkut but all are headquartered overseas and all have offshore servers. The Minister
is under pressure from Symkaria citízens to reduce the volume of unwanted messages
they are receiving.
The Minister has asked you to develop a strategy. Applying Lessigian theory describe
how the Minister may use:
1) Law
2) Architecture/Design/Code
3) Social Norms
4) Markets
o achieve his aims.
The Minister of Telecommunications of the Republic of Symkaria is facing pressure to reduce the volume of unwanted messages received by Symkaria citizens resulting from data mining by social networking sites operating within the country. To address this issue, the Minister can employ the following strategies based on Lessigian theory: 1) Law - enact regulations to govern data usage and protect users' privacy, 2) Architecture/Design/Code - encourage or enforce technical measures that safeguard user data and limit data mining practices, 3) Social Norms - promote awareness campaigns and education to establish societal expectations around data privacy, and 4) Markets - incentivize responsible data practices through economic mechanisms.
To tackle the issue of unwanted messages resulting from data mining, the Minister can utilize the Lessigian framework, which focuses on four modalities of control: law, architecture/design/code, social norms, and markets.
1) Law: The Minister can introduce legislation and regulations that govern data usage, ensuring that social networking sites operating within Symkaria are legally bound to protect users' privacy and restrict the selling of user data to advertisers. By imposing legal consequences for non-compliance, the Minister can create a stronger framework for data protection.
2) Architecture/Design/Code: The Minister can encourage or enforce technical measures within the architecture, design, and code of social networking sites to prioritize user privacy. This can include implementing strong encryption protocols, providing users with granular control over their data, and limiting data mining practices. By incorporating privacy-enhancing technologies, the Minister can create technical barriers that safeguard user data.
3) Social Norms: The Minister can launch awareness campaigns and educational initiatives to inform Symkaria citizens about the importance of data privacy and the risks associated with extensive data mining. By fostering a culture of privacy and raising public awareness, the Minister can shape social norms that value and respect users' data rights, leading to increased public demand for privacy-focused platforms.
4) Markets: The Minister can influence the market dynamics by incentivizing responsible data practices. This can be achieved through various economic mechanisms such as tax incentives, subsidies, or preferential treatment for social networking sites that prioritize user privacy and limit data mining activities. By creating economic advantages for platforms that align with Symkaria's data protection goals, the Minister can encourage market forces to drive the adoption of privacy-friendly practices.
By employing a multi-faceted approach that combines legal regulations, technical measures, social awareness, and economic incentives, the Minister can address the issue of unwanted messages resulting from data mining by social networking sites. This comprehensive strategy leverages the different modalities of control to create a robust framework for data protection and privacy within Symkaria.
Learn more about mining here:
https://brainly.com/question/30199407
#SPJ11
What must devices that communicate with one another on the internet have in common?
The most devices that communicate with one another on the internet have in common is Use the identical net protocols. Website IP addresses together with 74.125. 65.91 and 72.21.
What is the IP Address?Every tool that communicates on the Internet, whether or not or not it's a non-public computer, a tablet, a smartphone, or something else, is assigned a completely unique figuring out range known as an IP (Internet Protocol) address.
Using the Internet, computer systems join and speak with one another, usually the usage of the TCP/IP (Transmission Control Protocol / Internet Protocol).
Read more about the internet :
https://brainly.com/question/1538272
#SPJ4
Applying a bug fix:
Addressing a security flaw:
Improving ease of use:
Adding new features:
<>
1.software update(patch)
2.software update(patch)
3.software upgrade(new version)
4.software upgrade(new version)
The matching of item A with respect to item B is as follows:
Software update (patch): Applying a bug fix. Software update (patch): Addressing a security flaw.Software Upgrade (new version): Improve ease of use:Software Upgrade (new version): Adding features. What is a Software update?A software update may be characterized as a set of changes to the software to update, fix or improve it. It also changes to the software will usually either fix bugs, fix security vulnerabilities, provide new features or improve performance and usability. It is also known as a patch.
Software updates provide more than just security updates, they often offer new and improved features and speed enhancements to make the end-user experience better. Developers are constantly working on ways to improve the software, giving greater efficiency to users.
Therefore, the matching of item A with respect to item B is well described above.
To learn more about the Software update, refer to the link:
https://brainly.com/question/5057366
#SPJ2
Question # 3 Dropdown Complete the sentence. During the phase of a software development project, developers create a detailed plan that specifically defines how each of the needed features will be implemented.
Answer: D
Explanation:
"During the "requirements and analysis" phase of a software development project, developers create a detailed plan that specifically defines how each of the needed features will be implemented."
The requirements gathering and analysis phase is a crucial step in the software development process. It involves collecting detailed information about each requirement and understanding its purpose. The focus of this phase is to determine the best way to fulfill each requirement and to plan for testing.
During this phase, input from testers is also valuable as they contribute to the analysis of the requirements. Additionally, this step includes a key decision-making aspect, the buy vs build decision. It is important to evaluate whether it is more cost-effective to purchase a third-party product instead of building one from scratch.
Learn more about software development project here: brainly.com/question/26135704
#SPJ1
A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the system? What is the resistance force if the effort force is 5 lb.
Answer:
15.7 ; 78.5
Explanation:
Mechanical advantage of a screw = Circumference / pitch
Circumference = pi × d
Where :
pi = 3.142, D = diameter
Therefore ;
Circumference = 3.142 × (1/4) = 0.785 in
Pitch = 1/TPI
TPI (thread per inch) = 20
Pitch = 1/ 20 = 0.05
Mechanical advantage = 0.785 / 0.05 = 15.7
Resistance force if effort force is 5lb
Mechanical advantage = Fr / Fe
Fe = effort force, Fr = resistance force
15.7 = Fr / 5
Fr = 15.7 × 5 = 78.5 lbs
the instance of entity type 'transaction' cannot be tracked because another instance with the same key value for {'id'} is already being tracked.
Another instance with the same key value for "id" is already being tracked, the instance of entity type "transaction" cannot be tracked as everal problems I've encountered have a common source.
What is Transaction in computer?
A transaction is typically defined in computer programming as a sequence of information exchange and related projects (such as database updating) that is treated as a unit for the reasons of satisfying a request and ensuring database integrity.
A transaction must be completed in its entirety for it to be completed and database changes to be made permanent. A catalog merchandise order phoned in by a client and entered into a desktop by a customer representative is an example of a typical transaction.
Checking an inventory records, confirming that the product is available, placing an order, and confirming that the order was placed and the timeframe of shipment are all part of the order transaction.
To learn more about Transaction, visit: https://brainly.com/question/13040489
#SPJ4
peter is a linux system administrator of a system using the iptables service. he wants to add a rule to block only incoming ping packets and not send a rejection message to the source. what command should he employ?
Peter can use the command below to prevent inbound ping packets without notifying the source: icmp --icmp-type echo-request -p iptables -A input -j drop.
Which kinds of hardware devices can you attach to a running Linux system?Character, block, and network hardware are the three types of hardware that Linux supports. Character devices, such as the system's serial ports /dev/cua0 and /dev/cua1, are read and written immediately without buffering.
What command should be used to setup an SSH key on a Linux server so that it may be used for passwordless logins?The ssh-copy-id command can be used to install an SSH key as an authorised key on the server once it has been created. The key grants access to SSH once it has been authorised.
To know more about command visit:-
https://brainly.com/question/30618865
#SPJ1
LAB: Word frequencies - methods Define a method named getWordFrequency that takes an array of strings, the size of the array, and a search word as parameters. Method getWordFrequency() then returns the number of occurrences of the search word in the array parameter (case insensitive). Then, write a main program that reads a list of words into an array, calls method getWordFrequency() repeatedly, and outputs the words in the arrays with their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words.
Ex: If the input is: 5 hey Hi Mark hi mark the output is: hey 1 Hi 2 Mark 2 hi 2 mark 2 Hint: Use the equalslgnoreCase() method for comparing strings, ignoring case. Hint: Use the equalslgnoreCase() method for comparing strings, ignoring case. The program must define and call a method: public static int getWordFrequency(String[] wordsList, int listSize, String currWord).
The program is an illustration of loops, functions and conditional statements
Loops are used for repetitionFunctions are used to group related code statements in a blockConditional statements are used to make decisionsThe program in JavaThe program written in Java, is as follows:
import java.util.Scanner;
public class Main {
public static int getFrequencyOfWord(String[] wordsList, int listSize, String currWord) {
int wordFreq = 0;
for (int i=0; i<listSize; i++){
if (wordsList[i].compareToIgnoreCase(currWord)==0){
wordFreq++;
}
}
return wordFreq;
}
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int N = input.nextInt();
String myArr[] = new String[N];
for (int i=0; i<N; i++){
myArr[i] = input.next();
}
for (int i=0; i<N; i++){
String searchWord = myArr[i];
int freqCount = getFrequencyOfWord(myArr,N,searchWord);
System.out.println(searchWord + " " + freqCount);
}
}
}
Read more about java programs at:
https://brainly.com/question/26642771
#SPJ1
can you fart and burp at the same time?
Answer:
Yes you can
Explanation:
Although farting and burping at the same time is a very rare phenomenon, it’s very possible. When this happens at the same time it is usually called a Furp.
This occurrence usually happens when there’s a lot of intake of foods which have a large percentage of gas . These gases often need to be expelled through processes such as burping and farting.
Suppose there are 100 items, numbered 1 to 100, and also 100 baskets, also numbered 1 to 100. Item i is in basket b if and only if i divides b with no remainder. Thus, item 1 is in all the baskets, item 2 is in all fifty of the even-numbered baskets, and so on. Basket 12 consists of items {1, 2, 3, 4, 6, 12}, since these are all the integers that divide 12. Answer the following questions: (a) If the support threshold is 5, which items are frequent? (b) If the support threshold is 5, which pairs of items are frequent?
(a) The frequent items with a support threshold of 5 are {1, 2, 3, 4, 6, 12}.
(b) The frequent pairs of items with a support threshold of 5 are:
{1, 2}
{1, 3}
{1, 4}
{1, 6}
{1, 12}
{2, 4}
{2, 6}
{2, 12}
{3, 6}
{4, 12}
(a) To determine the frequent items, we need to find the items that occur in at least 5 baskets. In this case, all items from 1 to 100 are present in at least 5 baskets since each item is present in its corresponding divisible baskets. Therefore, the frequent items are {1, 2, 3, 4, 6, 12}.
(b) To identify frequent pairs of items, we need to consider pairs of items that occur together in at least 5 baskets. We can analyze the pairs by considering the divisors of each basket. For example, item 1 is present in all the baskets, so it forms pairs with all other items. Similarly, item 2 is present in all even-numbered baskets, allowing it to form pairs with other items in those baskets.
By analyzing the divisors, we can determine the frequent pairs listed above. For instance, {1, 2} is a frequent pair since item 1 occurs in all baskets and item 2 occurs in all even-numbered baskets, resulting in at least 5 occurrences together.
The process is repeated for all possible pairs, considering the divisors and occurrences of each item. The resulting pairs are considered frequent if they occur in at least 5 baskets.
Learn more about Threshold:https://brainly.com/question/31084720
#SPJ11
Which statement is true? Select 3 options.
A function must have a return value.
A function can use variables as parameters.
The definition of a function must come before where the function is used.
A function can have more than one parameter.
The definition of a function can come before or after it is used.
Answer:
A,C, AND E
Explanation:
i got it wrong for the anwser
The statements that are true are as follows:
A function must have a return value.The definition of a function must come before where the function is used.The definition of a function can come before or after it is used.Thus, the correct options for this question are A, C, and E.
What is Function?A Function may be defined as a kind of expression, rule, or law that significantly determines a relationship between one variable which is known independent variable and another variable which is known as the dependent variable.
Each and every function must possess a return value. Apart from variables, there are several other parameters on which functions have to be worked on. So, the definition of a function must exist prior to its utilization. However, the actual definition of function may also exist after its utilization as well.
Therefore, the correct options for this question are A, C, and E.
To learn more about Functions, refer to the link:
https://brainly.com/question/22340031
#SPJ2
Understanding the various types of computing devices and their related components is important as you work to maintain, upgrade, or build a device. How are the PCI Slot and USB Port components related?
Both the PCI slot and USB port are components that are essential for connecting peripheral devices to a computing device. The PCI slot is a type of expansion slot that is used for connecting various types of expansion cards to the motherboard of a computer.
These expansion cards may include graphics cards, sound cards, and network interface cards, among others. On the other hand, the USB port is a type of interface that is used for connecting external devices to a computer. It allows users to connect a wide range of peripherals, including mice, keyboards, external hard drives, printers, and cameras, among others. The USB port is a universal interface, which means that it can support a wide range of devices and can be used to connect multiple devices simultaneously.
One way in which the PCI slot and USB port components are related is that some expansion cards may include USB ports that can be used to connect additional peripherals to the computer. For example, some sound cards may include a USB port that can be used to connect a microphone or other audio input device. Additionally, some motherboards may include both PCI slots and USB ports, providing users with a wide range of options for expanding the functionality of their computing device.
Learn more about USB port here:
https://brainly.com/question/5617051
#SPJ11
Directions: All your answers must be on a Word Document with any equations created using the Equation Editor. Verify your answer using Excel and the Constrained Optimization template posted on Canvas, copy and paste your Answer and Sensitivity Reports into the same Word Document and turn in Monday in class. 1) Suppose you are asked to Minimize the following function using the Lagrangian technique for solving for a relative extremum:
Min f(x,y)
s.t. x+y
=x
2
+y
2
=10
a) What is the optimal value of x ? b) What is the optimal value of y ? c) What is the optimal value of λ ? d) What is the mathematical interpretation of λ ? e) Be sure to attach your Answer Report to your Word Document. f) Be sure to attach your Sensitivity Report to your Word Document.
The problem requires minimizing a function using the Lagrangian technique and solving for a relative extremum. The objective function and constraints are provided, and the optimal values of x, y, and λ need to be determined. Additionally, an Answer Report and Sensitivity Report must be attached to the Word Document.
a) To find the optimal value of x, we need to solve the Lagrangian equation by setting the partial derivative of the objective function with respect to x equal to λ times the partial derivative of the first constraint with respect to x. By solving this equation along with the given constraints, we can determine the optimal value of x.
b) Similarly, the optimal value of y can be obtained by setting the partial derivative of the objective function with respect to y equal to λ times the partial derivative of the first constraint with respect to y and solving the resulting equation along with the given constraints.
c) The optimal value of λ, also known as the Lagrange multiplier, can be determined by solving the system of equations formed by the objective function and the constraints.
d) The Lagrange multiplier λ represents the rate of change in the objective function with respect to a small change in the constraint. It provides information about the sensitivity of the objective function to changes in the constraint.
e) An Answer Report should be generated, summarizing the optimal values of x, y, and λ, as well as the corresponding objective function value.
f) A Sensitivity Report should also be generated, providing insights into the sensitivity of the optimal solution to changes in the constraints and the objective function.
Both the Answer Report and the Sensitivity Report should be attached to the Word Document for submission.
Learn more about information here: https://brainly.com/question/31713424
#SPJ11
Select the correct answer from each drop-down menu.
What should companies and industries practice to avoid the dangers from AI and robots?
Companies and industries should train (BLANK ONE)
and implement effective (BLANK TWO).
Blank one options:
A- HR resources
B- AI resources
C- Customers
Blank two options:
A- Testing programs
B- incentive programs
C- Marketing programs
I accidentally started the test before doing the lesson, I need some help. I will give brainliest for a correct answer.
To avoid the potential dangers associated with AI and robots, companies and industries should practice AI resources and AI- Testing programs
Blank one: B- AI resources
Companies and industries should invest in training their AI resources.
This involves providing comprehensive education and training programs for employees who work directly with AI and robotics technologies.
This training should encompass not only technical skills but also ethical considerations and best practices in AI development and deployment.
By ensuring that their AI resources are well-trained, companies can minimize the risks associated with AI and make informed decisions about its implementation.
Blank two: A- Testing programs
Implementing effective testing programs is crucial in mitigating the dangers of AI and robots.
These programs involve rigorous testing and validation of AI algorithms and robotic systems before they are deployed in real-world settings.
Thorough testing helps identify potential biases, errors, or unintended consequences that could pose risks to individuals or society at large.
Companies should establish robust testing protocols that include simulations, controlled environments, and real-world scenarios to evaluate the performance, safety, and reliability of AI and robotic systems.
For more questions on AI
https://brainly.com/question/20339012
#SPJ8
TRUE/FALSE. when you copy and paste a formula to a new location, the formula's relative references do not change.
It is True when you copy and paste a formula to a new location, the formula's relative references do not change.
If a formula to a new location is copied, a relative cell reference will remain the same. It is presented as a relative cell reference by default when a cell reference is first used in a calculation (such that just the column and row references are provided). You are really referring to a cell that is two columns to the left (C minus A) and in the same row when you refer to cell A2 from cell C2 (2). As you duplicate a formula from one cell to another while using a relative cell reference, it changes. Relative and absolute cell references are the two different kinds. When copied and filled into other cells references that are relative or absolute act in distinct ways. When a formula is transferred to another cell, the relative references are altered. On the other hand, absolute references
Learn more about formula to a new location here:
https://brainly.com/question/28274554
#SPJ4
what is the best free website to learn phyton programming
Employees at Morning Buzz Coff ee Shop have been told they’ll get a bonus if they bring in enough pounds of recyclable newspapers. Th ey want a program to calculate the amount they need to bring in each day to make this total, based on the total number of pounds to be collected and the number of days they’ll be bringing in newspapers. Th e program should ask for these amounts and calculate how many pounds they need to bring in each day to make the total in that number of days. Th ey plan to run the program several times until they can find a number of pounds per day that seems reasonable. Using pseudocode, develop an algorithm to solve this problem. Include standard documentation and comments, and save your algorithm in a file named recyclingCalculator.txt in Notepad.
write this well, and add comments
223 AR 15's carbon 9's they all on me
There are different ways too write a code. Check more about this code below?
What is this code about?The fires thing to do is to Start with:
Declare Numeric totalAmountOfNewspapers
Declare Numeric daysUntilDeadline
Declare numeric newspaperRequired
//calculate amount needed per day
Display "How many days are left until the deadline?"
Input daysUntilDeadline
Display "Enter the amount of newspaper you need."
Input totalAmountOfNewspapers
newspaperRequired = totalAmountOfNewspapers / daysUntilDeadline
Display "You have" + newspaperRequired + "until you reach the goal."
Learn more are programming from
https://brainly.com/question/22654163
#SPJ2
if someone has become very attached to their mobile device and feels anxious if the cannot connect to the internet, what are they experiencing
Answer:
Anxiety
Explanation:
trust I have it
Which of the following is a set of security controls designed to protect payment account security such as a credit card transaction?
CIS Critical Security Control
ONIST Framework
OPII Framework
Payment Card Industry Data Security Standard (PCI DSS)
Consider the following code:
x=9 y = -2 z=2
print (x + y * z)
What is output?
Answer:
14
Explanation: The reason why is because adding a negative is pretty much subtracting by 2. 9-2=7. Then multiply 7 by 2 like add 7 to 7 and you get 14.
Describe to a person who knows nothing about encryption why public key encryption is secure and is hard to crack
Public-key encryption is a secure method for transmitting sensitive data over insecure channels. It is based on a pair of mathematically linked keys: one public key and one private key. The public key can be openly distributed to anyone, while the private key must be kept secret.
Public key encryption is considered secure because it utilizes complex algorithms that make it extremely difficult for hackers to decrypt the message without knowing the private key.The security of public key encryption is based on the fact that it is difficult to factor large numbers into their prime factors. The public key is derived from the product of two large prime numbers, which is easy to do.
Factoring the product of two large prime numbers into its component primes is currently believed to be computationally infeasible. This means that it is nearly impossible to compute the private key from the public key.Public key encryption is also secure because it uses a different key for encryption and decryption. The public key is used to encrypt the message, while the private key is used to decrypt it.
To know more about encryption visit:
https://brainly.com/question/30225557
#SPJ11
HELP PLEASE 100 POINTS
Use the drop-down menus to complete the steps to access the Compact & Repair tool.
1. Open the database.
2. Go to the
✔ Backstage
view.
3. Click Info and then_________
OR
1. Open the database.
2. Click the_____ tab.
3. In the Tools group, click ________
The program then reduces the size of the database.
Answer:
Explanation:
This is for MS Access:
1. Open the database.
2. Go to the
✔ Backstage
view.
3. Click Info and then__Compact and Repair__
OR
1. Open the database.
2. Click the__Database Tools__ tab.
3. In the Tools group, click ___Compact and Repair Database___
The program then reduces the size of the database.
Having multiple class methods of the same name where each method has a different number of or type of parameters is known as
A) encapsulation
B) information hiding
C) tokenizing
D) importing
E) method overloading
Method overloading is a feature in programming languages that allows multiple methods with the same name but different parameters to coexist, enabling more flexibility in method usage. E) Method overloading.
Method overloading refers to the ability to have multiple methods with the same name within a class, but each method differs in terms of the number or type of parameters it accepts. This allows programmers to create more flexible and versatile code by providing different ways to invoke the same method based on the specific requirements or inputs. The appropriate method is chosen by the compiler or runtime environment based on the arguments provided during the method call.
Learn more about Method overloading here:
https://brainly.com/question/19545428
#SPJ11
Exceptions of Java's RunTimeException class are thrown when a standard run-time program error occurs.
Group of answer choices
True
False
The superclass of objections that can be triggered during regular Java Virtual Machine execution is called Runtime Exception. Unchecked exceptions include Runtime Exception and its subclasses.
The correct answer is :true.
Why do we use executable exception in Java?When a user invokes a method incorrectly, it's standard practise to raise a Runtime Exception. For instance, a method can determine whether one of its parameters is actually null. The method may raise a Null Pointer Exception, an ignored exception, if a parameter is null.
What distinguishes an exception from a runtime exception?The parent class of all the Java code exceptions that are predicted to cause the programme or application to break or fail is known as the Runtime Exception. Unlike exceptions that are not recognised as Java Exceptions, Runtime Exceptions were not checked
To know more about Machine visit:
https://brainly.com/question/2641982
#SPJ4
the two basic principles in computer forensics are to ________.
The two basic principles in computer forensics are to:
preserve evidence.document the investigation.What is computer forensics?Computer forensics can be defined as a type of technology which is designed and developed to gather (obtain), access, and monitor the activities of a particular end user or users on a computer system and over the Internet.
This ultimately implies that, computer forensics simply refers to a type of technology that would be useful to an employee such as a manager to look into the activities of his or her fraudulent team member.
Generally speaking, the two (2) basic principles that must be adopted and upheld in computer forensics, and even cybersecurity is to ensure that all evidences are well preserved through documentation, as well as a documentation of the investigation for record purposes.
Read more on computer forensics here: https://brainly.com/question/19863626
#SPJ1
Which of the following methods causes the next slide to be displayed during a slide show? Select all the options that
apply.
A. Click the left mouse button.
B. Press SPACEBAR.
C. Press ESC.
D. Click the right mouse button.
For the next slide to display during a slide show, always click the left mouse button and press spacebar. That is options A and C.
What is a computer slide show?A computer slide show is a presentation of an information using the application software called power point presentation.
These information are represented as a slide show which is showing a single screen of information.
Input devices such as the keyboard and the mouse are used to navigate through these slides.
Therefore, for the next slide to display during a slide show, always click the left mouse button and press spacebar on the keyboard.
Learn more about keyboards here:
https://brainly.com/question/26152499