1. A php script that accomplishes 2 tasks. You will submit
queries from your PHP script to accomplish these 2 tasks. a. Create
a database with tables appropriate for storing your password / SHA
pairs

Answers

Answer 1

PHP is one of the most popular server-side scripting languages for web development. It is used to develop dynamic and robust web pages. A PHP script is a set of instructions that tell a web server how to respond to a user's request. There are many tasks that can be accomplished with PHP, including creating databases with tables appropriate for storing password / SHA pairs.

In this article, we will discuss how to create a PHP script that accomplishes two tasks: creating a database and creating tables to store password / SHA pairs. Creating a database with tables appropriate for storing password / SHA pairs Creating a database is the first step in creating tables appropriate for storing password / SHA pairs.

To create a database, we need to use the following PHP code:``````In the above code, we have created a connection to the MySQL server using the mysqli_connect() function. Then we have checked the connection using the mysqli_connect_error() function.

After that, we have created a database using the CREATE DATABASE statement. If the database is created successfully, the message "Database created successfully" will be displayed, otherwise, the error message will be displayed.

Creating tables appropriate for storing password / SHA pairs After creating a database, we need to create tables that are appropriate for storing password / SHA pairs. To create a table, we need to use the following PHP code:``````In the above code, we have created a connection to the MySQL server using the mysqli_connect() function.

To know more about accomplished visit:

https://brainly.com/question/31598462

#SPJ11


Related Questions

consider the 3-node packet-switched network: a –––––––– b –––––––– c each link has a propagation delay of 5 ???????????????? and a capacity of 1 gbps. the packet processing time at each node is negligible, and only one message of 100,000 bytes is sent as 200 packets, each with a 500-byte payload and a 40-byte header.

Answers

The total end-to-end delay for sending the message from node A to node C in the 3-node packet-switched network is 2 milliseconds.

In a packet-switched network, the end-to-end delay consists of various components, including propagation delay, transmission delay, and queuing delay. In this scenario, it is stated that each link has a propagation delay of 5 microseconds and a capacity of 1 Gbps.

To calculate the total end-to-end delay, we need to consider the following:

1. Transmission Delay: Each packet has a payload of 500 bytes and a header of 40 bytes, resulting in a total packet size of 540 bytes. The transmission delay can be calculated using the formula: Transmission Delay = Packet Size / Link Capacity. Therefore, the transmission delay for each packet is 540 bytes / 1 Gbps = 4.32 microseconds.

2. Propagation Delay: It is given that each link has a propagation delay of 5 microseconds. Since there are three links (A to B, B to C, and A to C), the total propagation delay is 5 microseconds * 3 = 15 microseconds.

3. Queuing Delay: The question mentions that the packet processing time at each node is negligible, indicating that there is no significant queuing delay at the nodes.

Now, we can calculate the total end-to-end delay by summing up the transmission delay, propagation delay, and queuing delay (which is negligible in this case):

Total End-to-End Delay = Transmission Delay + Propagation Delay + Queuing Delay

                    = 4.32 microseconds + 15 microseconds + negligible queuing delay

                    = 19.32 microseconds

Converting microseconds to milliseconds, the total end-to-end delay is approximately 0.01932 milliseconds or simply 2 milliseconds.

Learn more about packet-switched network

brainly.com/question/33457992

#SPJ11

happropriate Conduct When Using Digital
Technology
pset with Elizabeth for dumping him. He became even more upset when he found out that she was
ating someone else. Jerry wanted to get revenge on Elizabeth for breaking up with him. He decided to
mare a secret, sexual photo that Elizabeth sent to him when they were dating. Jerry sent Elizabeth's
exual photo to three of his friends. His three friends chose to send it to many of their friends. By the end
of the day, the sexual photo that Elizabeth thought was a secret had been shared with many people,
ncluding strangers.
What happened due to Jerry and Elizabeth sexting? How do you think Elizabeth feels? What do you think
Jerry's punishment should be for sending Elizabeth's photo?

Answers

Inappropriate Conduct using Digital Technology.

After reading the paragraph, due to Jerry and Elizabeth sexting, Elizabeth's sexual pictures got leaked since Jerry could not accept that he was dumped and he got offended when he saw that Elizabeth was already dating someone else.

I think that Elizabeth is right now in a state of depression where she cannot trust anyone and will obviously lose the way she had been living her life, this event might have even given her social anxiety where she cannot face anyone outside of her house.

I think that Jerry should be just boycotted everywhere, and he should be stripped of any social media presence, but even this wouldn't be enough for the mental damage he has done to Elizabeth.

How to stay safe while using digital technology?

Consider acquiring a new digital device like a new phone or obtaining a separate donated phone from a shelter for more privacy and security (e.g. a pay-as-you-go phone).To find out if a phone has been stowed away, mechanics or police enforcement can inspect the car.Contact your carrier to secure your digital account with a password or code to prevent unauthorized access.Additionally, see if your digital device has any installed programs that independently request access to and usage of your real-time location, such as for navigational purposes. Some hidden programs may become visible if "display all/hidden applications" is selected as a setting. Take into account shutting down or removing these programs.Change your Bluetooth's default password, make it hidden, and disable it using your phone's settings.In an emergency, call 911 and provide your location.

To learn more about digital technology, use the link given
https://brainly.com/question/28079115
#SPJ1

Which behaviors leave the contents of a bag unaltered?
a. contains()
b. remove()
c. clear()
d. add()

Answers

The contents of a bag are unaltered by Contains() behaviour.

In Java, how does a bag function?

The goal of a bag is to give customers the opportunity to collect items and then iterate through the collected items. Removing objects from a bag is not supported. A series of real data are read from standard input by the bag client Stats. java, which produces out the mean and standard deviation for each.

The same data type or a subtype of that data type must be present in all entries of a bag, right?

The same data type, or a subtype of that data type, must be present in each entry in a bag. We can substitute the bag class with another class that implements the Bag Interface by declaring a data to be one. An object that is provided to a method as an argument can have its state changed. A unique kind of bag is a set.

To know more about unaltered visit:-

https://brainly.com/question/30575138

#SPJ4

find the execution time for a program that has 2 billion instructions running in a computer with at cpu speed at 4 ghz. assume that the clock per instructions is 3.5

Answers

The execution time for a program with 2 billion instructions running on a computer with a CPU speed of 4 GHz and a clock per instruction of 3.5 is approximately 1.142 seconds.

The execution time (T) for a program can be calculated by the formula:

T = (Number of Instructions * Clocks per Instruction) / Clock Rate

Here:

The number of instructions is 2 billion, or 2 x 10^9.

Clocks per instruction is 3.5.

The clock rate is 4 GHz, which is 4 x 10^9 Hz (cycles per second).

Plugging these values into the formula, we get:

T = (2 x 10^9 Instructions * 3.5 Clocks/Instructions) / 4 x 10^9 Hz

The 'Instructions' term cancels out, leaving us with:

T = (7 x 10^9 Clocks) / 4 x 10^9 Hz

The 'Clocks' term cancels out, yielding:

T = 7 / 4 = 1.75 seconds

So, the execution time for a program with 2 billion instructions running on a 4 GHz computer, given that it requires 3.5 clock cycles per instruction, is 1.75 seconds.

Learn more about execution time computation here:

https://brainly.com/question/31551343

#SPJ11

You are an advisor to the Minister of Telecommunications of the Republic of Symkaria.
The Minster has become aware that a number of social networking sites who operate
from Symkaria are extensively data mining their users' data and selling it to advertisers
who then flood the customers with unwanted emails, texts and calls offering services
and products. Their activities are legal because a clause in the terms and conditions
the social network site operators say their customers
their data in any way'
of Orkut but all are headquartered overseas and all have offshore servers. The Minister
is under pressure from Symkaria citízens to reduce the volume of unwanted messages
they are receiving.
The Minister has asked you to develop a strategy. Applying Lessigian theory describe
how the Minister may use:
1) Law
2) Architecture/Design/Code
3) Social Norms
4) Markets
o achieve his aims.

Answers

The Minister of Telecommunications of the Republic of Symkaria is facing pressure to reduce the volume of unwanted messages received by Symkaria citizens resulting from data mining by social networking sites operating within the country. To address this issue, the Minister can employ the following strategies based on Lessigian theory: 1) Law - enact regulations to govern data usage and protect users' privacy, 2) Architecture/Design/Code - encourage or enforce technical measures that safeguard user data and limit data mining practices, 3) Social Norms - promote awareness campaigns and education to establish societal expectations around data privacy, and 4) Markets - incentivize responsible data practices through economic mechanisms.

To tackle the issue of unwanted messages resulting from data mining, the Minister can utilize the Lessigian framework, which focuses on four modalities of control: law, architecture/design/code, social norms, and markets.

1) Law: The Minister can introduce legislation and regulations that govern data usage, ensuring that social networking sites operating within Symkaria are legally bound to protect users' privacy and restrict the selling of user data to advertisers. By imposing legal consequences for non-compliance, the Minister can create a stronger framework for data protection.

2) Architecture/Design/Code: The Minister can encourage or enforce technical measures within the architecture, design, and code of social networking sites to prioritize user privacy. This can include implementing strong encryption protocols, providing users with granular control over their data, and limiting data mining practices. By incorporating privacy-enhancing technologies, the Minister can create technical barriers that safeguard user data.

3) Social Norms: The Minister can launch awareness campaigns and educational initiatives to inform Symkaria citizens about the importance of data privacy and the risks associated with extensive data mining. By fostering a culture of privacy and raising public awareness, the Minister can shape social norms that value and respect users' data rights, leading to increased public demand for privacy-focused platforms.

4) Markets: The Minister can influence the market dynamics by incentivizing responsible data practices. This can be achieved through various economic mechanisms such as tax incentives, subsidies, or preferential treatment for social networking sites that prioritize user privacy and limit data mining activities. By creating economic advantages for platforms that align with Symkaria's data protection goals, the Minister can encourage market forces to drive the adoption of privacy-friendly practices.

By employing a multi-faceted approach that combines legal regulations, technical measures, social awareness, and economic incentives, the Minister can address the issue of unwanted messages resulting from data mining by social networking sites. This comprehensive strategy leverages the different modalities of control to create a robust framework for data protection and privacy within Symkaria.

Learn more about mining here:

https://brainly.com/question/30199407

#SPJ11

What must devices that communicate with one another on the internet have in common?

Answers

The most devices that communicate with one another on the internet have in common is Use the identical net protocols. Website IP addresses together with 74.125. 65.91 and 72.21.

What is the IP Address?

Every tool that communicates on the Internet, whether or not or not it's a non-public computer, a tablet, a smartphone, or something else, is assigned a completely unique figuring out range known as an IP (Internet Protocol) address.

Using the Internet, computer systems join and speak with one another, usually the usage of the TCP/IP (Transmission Control Protocol / Internet Protocol).

Read more about the internet :

https://brainly.com/question/1538272

#SPJ4

Applying a bug fix:
Addressing a security flaw:
Improving ease of use:
Adding new features:
<>
1.software update(patch)
2.software update(patch)
3.software upgrade(new version)
4.software upgrade(new version)

Answers

Applying a bug fix: software update (patch)

Addressing a security flaw: software update (patch)

Improve ease of use: Software Update (new version)

Adding features: Software Update (new version)

This is what I believe the answer is! Hope this helped!

The matching of item A with respect to item B is as follows:

Software update (patch): Applying a bug fix. Software update (patch): Addressing a security flaw.Software Upgrade (new version): Improve ease of use:Software Upgrade (new version): Adding features.

What is a Software update?

A software update may be characterized as a set of changes to the software to update, fix or improve it. It also changes to the software will usually either fix bugs, fix security vulnerabilities, provide new features or improve performance and usability. It is also known as a patch.

Software updates provide more than just security updates, they often offer new and improved features and speed enhancements to make the end-user experience better. Developers are constantly working on ways to improve the software, giving greater efficiency to users.

Therefore, the matching of item A with respect to item B is well described above.

To learn more about the Software update, refer to the link:

https://brainly.com/question/5057366

#SPJ2

Question # 3 Dropdown Complete the sentence. During the phase of a software development project, developers create a detailed plan that specifically defines how each of the needed features will be implemented.

Answers

Answer: D

Explanation:

"During the "requirements and analysis" phase of a software development project, developers create a detailed plan that specifically defines how each of the needed features will be implemented."

The requirements gathering and analysis phase is a crucial step in the software development process. It involves collecting detailed information about each requirement and understanding its purpose. The focus of this phase is to determine the best way to fulfill each requirement and to plan for testing.

During this phase, input from testers is also valuable as they contribute to the analysis of the requirements. Additionally, this step includes a key decision-making aspect, the buy vs build decision. It is important to evaluate whether it is more cost-effective to purchase a third-party product instead of building one from scratch.

Learn more about software development project here: brainly.com/question/26135704

#SPJ1

A mechanic uses a screw driver to install a ¼-20 UNC bolt into a mechanical brace. What is the mechanical advantage of the system? What is the resistance force if the effort force is 5 lb.

Answers

Answer:

15.7 ; 78.5

Explanation:

Mechanical advantage of a screw = Circumference / pitch

Circumference = pi × d

Where :

pi = 3.142, D = diameter

Therefore ;

Circumference = 3.142 × (1/4) = 0.785 in

Pitch = 1/TPI

TPI (thread per inch) = 20

Pitch = 1/ 20 = 0.05

Mechanical advantage = 0.785 / 0.05 = 15.7

Resistance force if effort force is 5lb

Mechanical advantage = Fr / Fe

Fe = effort force, Fr = resistance force

15.7 = Fr / 5

Fr = 15.7 × 5 = 78.5 lbs

the instance of entity type 'transaction' cannot be tracked because another instance with the same key value for {'id'} is already being tracked.

Answers

Another instance with the same key value for "id" is already being tracked, the instance of entity type "transaction" cannot be tracked as everal problems I've encountered have a common source.

What is Transaction in computer?

A transaction is typically defined in computer programming as a sequence of information exchange and related projects (such as database updating) that is treated as a unit for the reasons of satisfying a request and ensuring database integrity.

A transaction must be completed in its entirety for it to be completed and database changes to be made permanent. A catalog merchandise order phoned in by a client and entered into a desktop by a customer representative is an example of a typical transaction.

Checking an inventory records, confirming that the product is available, placing an order, and confirming that the order was placed and the timeframe of shipment are all part of the order transaction.

To learn more about Transaction, visit: https://brainly.com/question/13040489

#SPJ4

peter is a linux system administrator of a system using the iptables service. he wants to add a rule to block only incoming ping packets and not send a rejection message to the source. what command should he employ?

Answers

Peter can use the command below to prevent inbound ping packets without notifying the source: icmp --icmp-type echo-request -p iptables -A input -j drop.

Which kinds of hardware devices can you attach to a running Linux system?

Character, block, and network hardware are the three types of hardware that Linux supports. Character devices, such as the system's serial ports /dev/cua0 and /dev/cua1, are read and written immediately without buffering.

What command should be used to setup an SSH key on a Linux server so that it may be used for passwordless logins?

The ssh-copy-id command can be used to install an SSH key as an authorised key on the server once it has been created. The key grants access to SSH once it has been authorised.

To know more about command visit:-

https://brainly.com/question/30618865

#SPJ1

LAB: Word frequencies - methods Define a method named getWordFrequency that takes an array of strings, the size of the array, and a search word as parameters. Method getWordFrequency() then returns the number of occurrences of the search word in the array parameter (case insensitive). Then, write a main program that reads a list of words into an array, calls method getWordFrequency() repeatedly, and outputs the words in the arrays with their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words.
Ex: If the input is: 5 hey Hi Mark hi mark the output is: hey 1 Hi 2 Mark 2 hi 2 mark 2 Hint: Use the equalslgnoreCase() method for comparing strings, ignoring case. Hint: Use the equalslgnoreCase() method for comparing strings, ignoring case. The program must define and call a method: public static int getWordFrequency(String[] wordsList, int listSize, String currWord).

Answers

The program is an illustration of loops, functions and conditional statements

Loops are used for repetitionFunctions are used to group related code statements in a blockConditional statements are used to make decisions

The program in Java

The program written in Java, is as follows:

import java.util.Scanner;

public class Main {

   public static int getFrequencyOfWord(String[] wordsList, int listSize, String currWord) {

       int wordFreq = 0;

       for (int i=0; i<listSize; i++){

           if (wordsList[i].compareToIgnoreCase(currWord)==0){

               wordFreq++;

           }

       }

       return wordFreq;

   }

       public static void main(String[] args) {

           Scanner input = new Scanner(System.in);

           int N = input.nextInt();

           String myArr[] = new String[N];

           for (int i=0; i<N; i++){

               myArr[i] = input.next();

           }

           for (int i=0; i<N; i++){      

               String searchWord = myArr[i];

               int freqCount = getFrequencyOfWord(myArr,N,searchWord);

               System.out.println(searchWord + " " + freqCount);

       }              

  }

}

Read more about java programs at:

https://brainly.com/question/26642771

#SPJ1

can you fart and burp at the same time?

Answers

Answer:

Yes you can

Explanation:

Although farting and burping at the same time is a very rare phenomenon, it’s very possible. When this happens at the same time it is usually called a Furp.

This occurrence usually happens when there’s a lot of intake of foods which have a large percentage of gas . These gases often need to be expelled through processes such as burping and farting.

Suppose there are 100 items, numbered 1 to 100, and also 100 baskets, also numbered 1 to 100. Item i is in basket b if and only if i divides b with no remainder. Thus, item 1 is in all the baskets, item 2 is in all fifty of the even-numbered baskets, and so on. Basket 12 consists of items {1, 2, 3, 4, 6, 12}, since these are all the integers that divide 12. Answer the following questions: (a) If the support threshold is 5, which items are frequent? (b) If the support threshold is 5, which pairs of items are frequent?

Answers

(a) The frequent items with a support threshold of 5 are {1, 2, 3, 4, 6, 12}.

(b) The frequent pairs of items with a support threshold of 5 are:

{1, 2}

{1, 3}

{1, 4}

{1, 6}

{1, 12}

{2, 4}

{2, 6}

{2, 12}

{3, 6}

{4, 12}

(a) To determine the frequent items, we need to find the items that occur in at least 5 baskets. In this case, all items from 1 to 100 are present in at least 5 baskets since each item is present in its corresponding divisible baskets. Therefore, the frequent items are {1, 2, 3, 4, 6, 12}.

(b) To identify frequent pairs of items, we need to consider pairs of items that occur together in at least 5 baskets. We can analyze the pairs by considering the divisors of each basket. For example, item 1 is present in all the baskets, so it forms pairs with all other items. Similarly, item 2 is present in all even-numbered baskets, allowing it to form pairs with other items in those baskets.

By analyzing the divisors, we can determine the frequent pairs listed above. For instance, {1, 2} is a frequent pair since item 1 occurs in all baskets and item 2 occurs in all even-numbered baskets, resulting in at least 5 occurrences together.

The process is repeated for all possible pairs, considering the divisors and occurrences of each item. The resulting pairs are considered frequent if they occur in at least 5 baskets.

Learn more about Threshold:https://brainly.com/question/31084720

#SPJ11

Which statement is true? Select 3 options.

A function must have a return value.
A function can use variables as parameters.
The definition of a function must come before where the function is used.
A function can have more than one parameter.
The definition of a function can come before or after it is used.

Answers

Answer:

A,C, AND E

Explanation:

i got it wrong for the anwser

The statements that are true are as follows:

A function must have a return value.The definition of a function must come before where the function is used.The definition of a function can come before or after it is used.

Thus, the correct options for this question are A, C, and E.

What is Function?

A Function may be defined as a kind of expression, rule, or law that significantly determines a relationship between one variable which is known independent variable and another variable which is known as the dependent variable.

Each and every function must possess a return value. Apart from variables, there are several other parameters on which functions have to be worked on. So, the definition of a function must exist prior to its utilization. However, the actual definition of function may also exist after its utilization as well.

Therefore, the correct options for this question are A, C, and E.

To learn more about Functions, refer to the link:

https://brainly.com/question/22340031

#SPJ2

Understanding the various types of computing devices and their related components is important as you work to maintain, upgrade, or build a device. How are the PCI Slot and USB Port components related?

Answers

Both the PCI slot and USB port are components that are essential for connecting peripheral devices to a computing device. The PCI slot is a type of expansion slot that is used for connecting various types of expansion cards to the motherboard of a computer.

These expansion cards may include graphics cards, sound cards, and network interface cards, among others. On the other hand, the USB port is a type of interface that is used for connecting external devices to a computer. It allows users to connect a wide range of peripherals, including mice, keyboards, external hard drives, printers, and cameras, among others. The USB port is a universal interface, which means that it can support a wide range of devices and can be used to connect multiple devices simultaneously.
One way in which the PCI slot and USB port components are related is that some expansion cards may include USB ports that can be used to connect additional peripherals to the computer. For example, some sound cards may include a USB port that can be used to connect a microphone or other audio input device. Additionally, some motherboards may include both PCI slots and USB ports, providing users with a wide range of options for expanding the functionality of their computing device.

Learn more about USB port here:

https://brainly.com/question/5617051

#SPJ11

Directions: All your answers must be on a Word Document with any equations created using the Equation Editor. Verify your answer using Excel and the Constrained Optimization template posted on Canvas, copy and paste your Answer and Sensitivity Reports into the same Word Document and turn in Monday in class. 1) Suppose you are asked to Minimize the following function using the Lagrangian technique for solving for a relative extremum:
Min f(x,y)
s.t. x+y


=x
2
+y
2

=10

a) What is the optimal value of x ? b) What is the optimal value of y ? c) What is the optimal value of λ ? d) What is the mathematical interpretation of λ ? e) Be sure to attach your Answer Report to your Word Document. f) Be sure to attach your Sensitivity Report to your Word Document.

Answers

The problem requires minimizing a function using the Lagrangian technique and solving for a relative extremum. The objective function and constraints are provided, and the optimal values of x, y, and λ need to be determined. Additionally, an Answer Report and Sensitivity Report must be attached to the Word Document.

a) To find the optimal value of x, we need to solve the Lagrangian equation by setting the partial derivative of the objective function with respect to x equal to λ times the partial derivative of the first constraint with respect to x. By solving this equation along with the given constraints, we can determine the optimal value of x.

b) Similarly, the optimal value of y can be obtained by setting the partial derivative of the objective function with respect to y equal to λ times the partial derivative of the first constraint with respect to y and solving the resulting equation along with the given constraints.

c) The optimal value of λ, also known as the Lagrange multiplier, can be determined by solving the system of equations formed by the objective function and the constraints.

d) The Lagrange multiplier λ represents the rate of change in the objective function with respect to a small change in the constraint. It provides information about the sensitivity of the objective function to changes in the constraint.

e) An Answer Report should be generated, summarizing the optimal values of x, y, and λ, as well as the corresponding objective function value.

f) A Sensitivity Report should also be generated, providing insights into the sensitivity of the optimal solution to changes in the constraints and the objective function.

Both the Answer Report and the Sensitivity Report should be attached to the Word Document for submission.

Learn more about  information here: https://brainly.com/question/31713424

#SPJ11

Select the correct answer from each drop-down menu.
What should companies and industries practice to avoid the dangers from AI and robots?

Companies and industries should train (BLANK ONE)
and implement effective (BLANK TWO).

Blank one options:
A- HR resources
B- AI resources
C- Customers

Blank two options:
A- Testing programs
B- incentive programs
C- Marketing programs


I accidentally started the test before doing the lesson, I need some help. I will give brainliest for a correct answer.

Answers

To avoid the potential dangers associated with AI and robots, companies and industries should practice AI resources  and  AI- Testing programs

Blank one: B- AI resources

Companies and industries should invest in training their AI resources.

This involves providing comprehensive education and training programs for employees who work directly with AI and robotics technologies.

This training should encompass not only technical skills but also ethical considerations and best practices in AI development and deployment.

By ensuring that their AI resources are well-trained, companies can minimize the risks associated with AI and make informed decisions about its implementation.

Blank two: A- Testing programs

Implementing effective testing programs is crucial in mitigating the dangers of AI and robots.

These programs involve rigorous testing and validation of AI algorithms and robotic systems before they are deployed in real-world settings.

Thorough testing helps identify potential biases, errors, or unintended consequences that could pose risks to individuals or society at large.

Companies should establish robust testing protocols that include simulations, controlled environments, and real-world scenarios to evaluate the performance, safety, and reliability of AI and robotic systems.

For more questions on AI

https://brainly.com/question/20339012

#SPJ8

TRUE/FALSE. when you copy and paste a formula to a new location, the formula's relative references do not change.

Answers

It is True when you copy and paste a formula to a new location, the formula's relative references do not change.

If a formula to a new location is copied, a relative cell reference will remain the same. It is presented as a relative cell reference by default when a cell reference is first used in a calculation (such that just the column and row references are provided). You are really referring to a cell that is two columns to the left (C minus A) and in the same row when you refer to cell A2 from cell C2 (2). As you duplicate a formula from one cell to another while using a relative cell reference, it changes. Relative and absolute cell references are the two different kinds. When copied and filled into other cells references that are relative or absolute act in distinct ways. When a formula is transferred to another cell, the relative references are altered. On the other hand, absolute references

Learn more about formula to a new location here:

https://brainly.com/question/28274554

#SPJ4

what is the best free website to learn phyton programming

Answers

That is something you should may research on with yourself! Don’t accept a link
From strangers it’s preferred to find one that best suits you!

Employees at Morning Buzz Coff ee Shop have been told they’ll get a bonus if they bring in enough pounds of recyclable newspapers. Th ey want a program to calculate the amount they need to bring in each day to make this total, based on the total number of pounds to be collected and the number of days they’ll be bringing in newspapers. Th e program should ask for these amounts and calculate how many pounds they need to bring in each day to make the total in that number of days. Th ey plan to run the program several times until they can find a number of pounds per day that seems reasonable. Using pseudocode, develop an algorithm to solve this problem. Include standard documentation and comments, and save your algorithm in a file named recyclingCalculator.txt in Notepad.

write this well, and add comments

Answers

223 AR 15's carbon 9's they all on me

Employees at Morning Buzz Coff ee Shop have been told theyll get a bonus if they bring in enough pounds

There are different ways too write a code. Check more about this code below?

What is this code about?

The fires thing to do is to Start with:

Declare Numeric totalAmountOfNewspapers

Declare Numeric daysUntilDeadline

Declare numeric newspaperRequired

//calculate amount needed per day

Display "How many days are left until the deadline?"

Input daysUntilDeadline

Display "Enter the amount of newspaper you need."

Input totalAmountOfNewspapers

newspaperRequired = totalAmountOfNewspapers / daysUntilDeadline

Display "You have" + newspaperRequired + "until you reach the goal."

Learn more are programming from

https://brainly.com/question/22654163

#SPJ2

if someone has become very attached to their mobile device and feels anxious if the cannot connect to the internet, what are they experiencing

Answers

Answer:

Anxiety

Explanation:

trust I have it

Which of the following is a set of security controls designed to protect payment account security such as a credit card transaction?
CIS Critical Security Control
ONIST Framework
OPII Framework
Payment Card Industry Data Security Standard (PCI DSS)

Answers

It’s the ONIST Framework
It onsit framework hope it helps

Consider the following code:
x=9 y = -2 z=2
print (x + y * z)
What is output?

Answers

Answer:

14

Explanation: The reason why is because adding a negative is pretty much subtracting by 2. 9-2=7. Then multiply 7 by 2 like add 7 to 7 and you get 14.

Describe to a person who knows nothing about encryption why public key encryption is secure and is hard to crack

Answers

Public-key encryption is a secure method for transmitting sensitive data over insecure channels. It is based on a pair of mathematically linked keys: one public key and one private key. The public key can be openly distributed to anyone, while the private key must be kept secret.

Public key encryption is considered secure because it utilizes complex algorithms that make it extremely difficult for hackers to decrypt the message without knowing the private key.The security of public key encryption is based on the fact that it is difficult to factor large numbers into their prime factors. The public key is derived from the product of two large prime numbers, which is easy to do.

Factoring the product of two large prime numbers into its component primes is currently believed to be computationally infeasible. This means that it is nearly impossible to compute the private key from the public key.Public key encryption is also secure because it uses a different key for encryption and decryption. The public key is used to encrypt the message, while the private key is used to decrypt it.

To know more about encryption visit:

https://brainly.com/question/30225557

#SPJ11

HELP PLEASE 100 POINTS

Use the drop-down menus to complete the steps to access the Compact & Repair tool.

1. Open the database.

2. Go to the
✔ Backstage
view.

3. Click Info and then_________
OR
1. Open the database.
2. Click the_____ tab.

3. In the Tools group, click ________
The program then reduces the size of the database.

Answers

Honestly I’m not too sure because I think different models have different steps to use, but I’d guess the second steps... sorry Im not too sure but that is what I think. If you were leaning towards that one then I’d probably go with it.

Answer:

Explanation:

This is for MS Access:

1. Open the database.

2. Go to the

✔ Backstage

view.

3. Click Info and then__Compact and Repair__

OR

1. Open the database.

2. Click the__Database Tools__ tab.

3. In the Tools group, click ___Compact and Repair Database___

The program then reduces the size of the database.

Having multiple class methods of the same name where each method has a different number of or type of parameters is known as
A) encapsulation
B) information hiding
C) tokenizing
D) importing
E) method overloading

Answers

Method overloading is a feature in programming languages that allows multiple methods with the same name but different parameters to coexist, enabling more flexibility in method usage. E) Method overloading.

Method overloading refers to the ability to have multiple methods with the same name within a class, but each method differs in terms of the number or type of parameters it accepts. This allows programmers to create more flexible and versatile code by providing different ways to invoke the same method based on the specific requirements or inputs. The appropriate method is chosen by the compiler or runtime environment based on the arguments provided during the method call.

Learn more about Method overloading here:

https://brainly.com/question/19545428

#SPJ11

Exceptions of Java's RunTimeException class are thrown when a standard run-time program error occurs.
Group of answer choices
True
False

Answers

The superclass of objections that can be triggered during regular Java Virtual Machine execution is called Runtime Exception. Unchecked exceptions include Runtime Exception and its subclasses.

The correct answer is :true.

Why do we use executable exception in Java?

When a user invokes a method incorrectly, it's standard practise to raise a Runtime Exception. For instance, a method can determine whether one of its parameters is actually null. The method may raise a Null Pointer Exception, an ignored exception, if a parameter is null.

What distinguishes an exception from a runtime exception?

The parent class of all the Java code exceptions that are predicted to cause the programme or application to break or fail is known as the Runtime Exception. Unlike exceptions that are not recognised as Java Exceptions, Runtime Exceptions were not checked

To know more about Machine visit:

https://brainly.com/question/2641982

#SPJ4

the two basic principles in computer forensics are to ________.

Answers

The two basic principles in computer forensics are to:

preserve evidence.document the investigation.

What is computer forensics?

Computer forensics can be defined as a type of technology which is designed and developed to gather (obtain), access, and monitor the activities of a particular end user or users on a computer system and over the Internet.

This ultimately implies that, computer forensics simply refers to a type of technology that would be useful to an employee such as a manager to look into the activities of his or her fraudulent team member.

Generally speaking, the two (2) basic principles that must be adopted and upheld in computer forensics, and even cybersecurity is to ensure that all evidences are well preserved through documentation, as well as a documentation of the investigation for record purposes.

Read more on computer forensics here: https://brainly.com/question/19863626

#SPJ1

Which of the following methods causes the next slide to be displayed during a slide show? Select all the options that
apply.

A. Click the left mouse button.
B. Press SPACEBAR.
C. Press ESC.
D. Click the right mouse button.

Answers

B (spacebar) and D (right mouse button)

For the next slide to display during a slide show, always click the left mouse button and press spacebar. That is options A and C.

What is a computer slide show?

A computer slide show is a presentation of an information using the application software called power point presentation.

These information are represented as a slide show which is showing a single screen of information.

Input devices such as the keyboard and the mouse are used to navigate through these slides.

Therefore, for the next slide to display during a slide show, always click the left mouse button and press spacebar on the keyboard.

Learn more about keyboards here:

https://brainly.com/question/26152499

Other Questions
what is the cost variance, schedule variance, cost performance index (cpi), and schedule performance index (spi) for the project? What is the central idea?Fat-Free Chocolate Milk BoxThere I was, staring at that fat-free chocolate milk box, so common, so simple, yet something completely new for me, completely different from the bagged yogurts my grandmother packed in my lunchbox along with little snack-sized cakes wrapped in colorful packages. After two days of having arrived in New York City, The fact of being in a completely different place was just starting to hit me, surrounded by a different culture and a different language. I wondered what that little milk box wouldve thought if it found itself surrounded by the fresh bagged whole milk and yogurts I previously had in my school lunches. The smelly, dry, brownish rice on my tray didn't look tasty at all and on top of that, being there made me nervous so I did not feel like eating. Staring at my tray in order to avoid eye contact with the other kids was starting to get boring and weird so opening the milk seemed like my best choice. I wanted to open it, but how? Am I supposed to get a straw and poke it?... Am I supposed to rip the whole thing?... What if I spill it? I dont want to spill it Should I ask for help? No. Reflect the point (-9,7) across the y -axis: You are the forecaster responsible for hurricane warnings on the southeast corner of the United States in September. Anyone that has lived in North Carolina for a while knows what is it is like at that time of the year, for example. The cost of issuing a warning like a hurricane involves people taking shelter, business stopping, the areas's economy paused - a moderate cost of C dollars. You also know the preventable loss should a hurricane come and the area be unprepared: property damage, lives lost -an extremely high loss of L dollars. Your weather forecast indicates hurricane with a probability of p. (a) Should you issue a warning? Use expectations to create a decision rule for whether issuing or not a warning. Explain your rule. (b) For what kind of extreme weather warnings is the decision more likely to be "do not warn" than "warn"? Explain. 8. A bag contains 2 black marbles, 3 red marbles and 4 orange marbles. Two marbles are drawn from the bag, without replacement. Use tree diagram to find the probability that the marbles drawn are of different colours. Em um jogo de futebol, atletas masculinos percorrem em mdia 11Km, sendo que a distncia percorrida ao longo do primeiro tempo superior em 5% com relao ao segundo tempo (EKBLOM, 1986; RIENZI et al., 2000). Levando em considerao que um time de futebol tem 10 jogadores de linha e todos eles percorrem a mesma distncia e no so substitudos, qual a distncia mdia total que um time pode percorrer em uma partida? * Domain or range function or not And explain What is most important to Kira in gathering blue Find the value of x when 6 - 4x = 6x - 8x + 4. The value of x >Part AUsing your hospital's information portal, your patient reviews the report from herrecent biopsy, which includes a reference to "smooth muscle." She asks you ifthis means her muscles are abnormal. What is the best explanation is?Smooth muscle tissue is called smooth because it moves blood anddigestive secretions smoothly through the blood vessels anddigestive tract.Smooth muscle tissue controls involuntary movements, including thepumping of the heart.Smooth muscle tissue controls many involuntary functions. Unlike themuscles that control voluntary movement and the heart, it has no"stripes" or striations and so is "smooth."Smooth muscle tissue is found in abundance in athletes and dancers,allowing them to move more smoothly than the average person.Submit Request Answer What became the western border of the united states after the treaty of paris 1783 was signed? Read the passage from "The Songwriting Diaries."What rhymes with fun?Yuki thought aloud. "Doneour song is done? Thats kind of corny. Nonerainy days are second to none? Nah, that doesnt sound like the way people talk. Pun, tontoo hard to work those in. Oh, I know. SUN! We can say something about how the sun finally comes out! "Yes, let me think . . . its coming to me . . . While Anya thought, Yuki softly played the song on her guitar."Got it! Anya yelled. "We wont even notice that theres no suntheres so much to do, and all of its fun!What is the effect of rhyming fun with sun in the last line of Anya and Yukis song? ResponsesA: This rhyme shows that the characters are impatient for the sun. B: This rhyme communicates the overall positive feeling of the song. C: This rhyme emphasizes that people have more fun in the sun.D: This rhyme shows the kinds of things the characters do for fun. What is the minimum diameter of a steel wire if it is to support a mass of 80 kg? the elastic limit of steel is 5.0*10^8 pa In class, we measured the area of a large equilateral triangle by counting how many tiny equilateral triangles it took to cover the larger triangle. If a large equilateral triangle measures 84 on each side (that is, it is made of 84 rows of tiny triangles), how many tiny triangles are in that large triangle Thibodeaux Company has $100,000 of income before payment of $100,000 of salaries to its owners/employees. If Thibodeaux Company is formed as either a Partnership, Regular (C) Corporation or S Corporation, the total combined Federal Income Tax effect of the entity and the owners will be the same for each entity. False O True QUESTION ---Bradford contributed cash of $25,000 and Land with an Adjusted Basis of $45,000 and a Fair Market Value of $75,000 to an entity for a seventy-five percent (75%) ownership interest in the entity. There is no debt on the Land. The entity was created three (3) years ago. If the entity is a Partnership, Bradford has no Recognized Gain and an initial basis in her Partnership Interest of $70,000. O False True QUESTION ---Paying "reasonable" compensation (salary) to a shareholder/employee of a Regular (C) Corporation avoids Double Taxation on the amount of the compensation (salary). O True O False Amplitude of damped oscillations reduces twice during one second. Find the time of its five-fold decrease. please help me its about solving system by substitution conflict begins with: perception. dislike. conflicting goals. irritating partner behaviors. Frank experiences schizophrenia. He has allegedly severely beaten another man in the park after an argument. While he is being examined by a psychologist to see if he is fit to stand trial, he is mandated to a mental health institution. This is an example of:_____________ simplify [tex]\sqrt{-121}[/tex]