Consider the following UML Class Diagram: - row: int - col: int - symbol: char GamePiece + GamePiece(row: int, col: int, symbol: char) + getRow(): int + getCol(): int + getSymbol(): char setSymbol(symbol: char): void Write Java code to create the Java class GamePiece based off the UML diagram. Fully implement all methods.

Answers

Answer 1

Java code implementation of the GamePiece class based on the given UML class diagram:

```java

public class GamePiece {

   private int row;

   private int col;

   private char symbol;

   public GamePiece(int row, int col, char symbol) {

       this.row = row;

       this.col = col;

       this.symbol = symbol;

   }

   public int getRow() {

       return row;

   }

   public int getCol() {

       return col;

   }

   public char getSymbol() {

       return symbol;

   }

   public void setSymbol(char symbol) {

       this.symbol = symbol;

   }

}

```

In this implementation, the class `GamePiece` has private instance variables `row`, `col`, and `symbol` to represent the row, column, and symbol of the game piece respectively. The constructor `GamePiece` initializes these variables. The class also includes getter methods `getRow()`, `getCol()`, and `getSymbol()` to retrieve the values of the variables, and a setter method `setSymbol()` to update the symbol of the game piece.

You can further enhance the class by adding additional methods and functionality as per your requirements.

Learn more about Java code

https://brainly.com/question/31569985

#SPJ11


Related Questions

Write a program that reads the content of a text file. the program should create a dictionary in which the keys are individual words found in the file and the values are the amount of times the word appears in the file. For example, if the word 'the' appears in the file 128 times, the dictionary would contain an element with the key as 'the' and the value as 128. Write in Python

Answers

This software opens the file filename.txt, reads the text inside, and then uses the split() method to separate the text into individual words. After that, it loops and produces a new empty dictionary called freq dict.

How can I construct a Python program to count the number of times a word appears in a text file?

To calculate the frequency of each word in a sentence, create a Python program. In Python: counts = dict in def word count(str) () split() for word in words with words = str: If a word is counted, then counts[word] += 1. and if counts[word] = 1 then return counts The swift brown fox leaps over the slothful hound, print(word count('.

# Use the command open('filename.txt', 'r') as file to open and read the file's contents:

file.read content ()

# Separate the text into its component words.

Language is content.

split()

# Construct a blank dictionary by changing freq dict to.

# Determine the frequency of every word in words:

If word appears in freq dict, then freq dict[word] +=

if not, freq dict[word] =

# Use the freq dict.items() function to display the frequency count for each word individually:

print(word, count) (word, count)

To know more about software visit:-

https://brainly.com/question/985406

#SPJ1

Instructions
This is the second part of your semester long assignment. This is all about trying to build functions that will perform console printing.
When finished, take your my_os folder and ZIP it up (or .RAR or .TAR or .7Z, whatever you want! I just want you to submit ONE archive file).
You are going to generate a folder called include in the root of your my_os folder. Generate a file called console.h in that folder.
You are then going to create a folder called shell. Inside shell you are going to generate a file called console.c.
Since console.c is going to need to be compiled, make sure you adjust your Makefile so you compile the correct files.
console.h should be used to declare the function headers you will use in console.c and also declare any constant or static variables you will need (for example you will more than likely want to put the VGA_HEIGHT and VGA_WIDTH variables in there).
console.c will then contain three functions whose function header are defined as
void print_character(char)
void print_string(char*)
void print_line(char*)
The first function will take a single character as a parameter and print it to the screen at the current position of your terminal cursor.
The second function will take a string parameter given to it and print it to the screen starting at current position of your terminal cursor.
The third function will do the same as the second function, but will add a new line at the end to move the terminal print position to the beginning of the next line.
The first use of the function will print to the screen in the upper left corner starting at the first address in the video buffer.
To test this is working, alter your main function in kernel.c to make multiple calls to these functions such that
char* str1 = "HELLO";
char* str2 = "WORLD";
char* str3 = "TODAY";
print_string(str1);
print_line(str2);
print_string(str3);
Would make the output at your terminal read
HELLOWORLD
TODAY
Notice that you will have to keep a variable that holds where the current terminal position is! Your header file is a good file for this information.
A complete assignment is one that meets the following qualifications:
1) shell folder
2) console.c with function implementation in shell folder
3) console.h inside an include folder with function header and static / constant variables you will need
4) An adjusted kernel.c that includes the appropriate functions and is altered to show that your functions work
5) An adjusted Makefile to compile the correct code
Please upload your ZIP here.

Answers

Here we are creating console printing functions within a custom operating system. To achieve this, follow these steps:

1. Create a folder called "include" in the root of your "my_os" folder, and generate a file called "console.h" inside it.
2. Create a folder called "shell" and generate a file called "console.c" inside.
3. Update your Makefile to compile the necessary files.
4. Define the function headers and required constants or static variables in "console.h".
5. Implement the functions (print_character, print_string, and print_line) in "console.c".
6. Update "kernel.c" to include these functions and modify it to demonstrate that the functions work correctly.
7. Adjust the Makefile to compile the correct code.

In conclusion, by following these instructions, you will develop a custom console printing system for your operating system project. Don't forget to submit your zipped "my_os" folder once you have completed these steps.

To know more operating system visit:

brainly.com/question/31551584

#SPJ11

JAVA
Write a program that requests the user input a word, then prints every other letter of the word starting with the first letter.
Hint - you will need to use the substring method inside a loop to get at every other character in the String. You can use the length method on the String
to work out when this loop should end.
Sample run:
Input a word:
domain
dmi

Answers

import java.util.Scanner;

public class JavaApplication42 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Input a word:");

       String word = scan.nextLine();

       for (int i = 0; i < word.length(); i+=2){

           System.out.print(word.substring(i,i+1));

           

       }

   }

   

}

I hope this helps!

The program is an illustration of loops.

Loops are used to carry out repetition operations; examples are the for-loop and the while-loop.

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

public class Main {

public static void main(String args[]) {

//This creates a Scanner object

Scanner input = new Scanner(System.in);

//This prompts user for input

System.out.print("Input a word: ");

//This gets input from the user

String userinput = input.nextLine();

//The following iterates through every other character of userinput  

      for(int i =0;i<userinput.length();i+=2) {

//This prints every other characters

          System.out.print(userinput.charAt(i));

}

  }

}

The above program is implemented using a for loop

Read more about similar programs at:

https://brainly.com/question/19104397

identify a method that inserts new items at the front of an array

Answers

A method that inserts new items at the front of an array is called "unshift". The unshift method adds one or more elements to the beginning of an array and updates the length of the array accordingly. This method modifies the original array, pushing existing elements forward to make room for the new items.

In programming, an array is a collection of similar data types that are stored together in a single variable. Arrays provide an efficient way of storing and accessing data in a program. One common task when working with arrays is to insert new items at the front of the array.
There are various methods to accomplish this, but one commonly used method is to shift all the existing elements of the array one position to the right and then insert the new element at the first position. This can be achieved using a loop that iterates over all the elements in the array and moves them one position to the right. Once all the elements have been shifted, the new element can be inserted at the first position.
Another method to insert new items at the front of an array is to use the built-in insert() method in Python. This method allows you to insert an element at a specific position in an array. To insert an element at the front of the array, you can specify the index position 0, which represents the first element of the array.
In summary, there are multiple ways to insert new items at the front of an array, including using a loop to shift all the existing elements one position to the right and then inserting the new element at the first position or using the built-in insert() method in Python with an index position of 0.
Here's a basic example:
```javascript
let array = [1, 2, 3];
array.unshift(0);
console.log(array); // Output: [0, 1, 2, 3]
```
In this example, the unshift method adds the number 0 to the front of the array, resulting in the updated array [0, 1, 2, 3]. Unshift is a convenient and efficient way to insert new items at the beginning of an array.

Learn more about array here-

https://brainly.com/question/13261246

#SPJ11

Please help me !!!!!!!

Please help me !!!!!!!

Answers

Answer:

is this Espaniol??

Explanation:

explain methods that describe how to make forensically sound copies of the digital information.

Answers

Creating forensically sound copies of digital information is crucial in the field of digital forensics to ensure the preservation and integrity of evidence.

Several methods can be employed to achieve this:

1)Bitstream Imaging: This method involves creating an exact sector-by-sector copy of the original digital media, including all data and metadata.

Tools like dd or FTK Imager can be used to capture a bitstream image, which ensures that the copy is an exact replica of the original.

Hash values such as MD5 or SHA-256 can be computed for verification purposes.

2)Write-Blocking: Before making a copy, it is essential to use hardware or software write-blocking techniques to prevent any accidental modification of the original data.

Write-blockers, like Tableau or WiebeTech devices, intercept write commands, allowing read-only access during the imaging process.

3)Validation and Verification: Once the copy is created, it is crucial to validate its integrity.

Hash values generated during the imaging process can be compared with the hash values of the original media to ensure their match.

Additionally, tools like EnCase or Autopsy can perform file-level validation to verify the integrity of individual files within the copy.

4)Chain of Custody: Maintaining a proper chain of custody is essential to establish the integrity and admissibility of digital evidence.

Documenting each step of the imaging process, including who performed the copy, the date and time, and any changes made, ensures that the evidence is legally defensible.

5)Preservation: The forensically sound copy should be stored in a secure and controlled environment to prevent tampering or accidental modification.

Access to the copy should be restricted, and measures like write-protecting or storing it on write-once media, such as write-once DVDs or read-only drives, can enhance its preservation.

For more questions on digital information

https://brainly.com/question/12620232

#SPJ8

The length of time that a slide appears before automatically advancing to the next slide can be set in the

A. Timing group under the Transitions tab.
B. Transition to This Slide group under the Transitions tab.
C. Timing group in the Master Slide view.
D. Transition to This Slide group in the Master Slide view.

Answers

Answer:

A.

Explanation:

The transition time between slides can be specified in a presentation. The duration of transition can be set by going to the 'Transitions Tab' then in 'Timing Group/Section'. In the timing group, duration can be increased or decreased, as per the desire. The time is set in seconds in duration section.

So, the length of time between two slides can be changed by going to the 'Timing group' under the 'Transitions Tab'.

Therefore, option A is correct.

Answer:

A

Explanation:

The ________ specification supports a communication connection between the operating system and the SSD directly through a PCIe bus lane, reducing latency and taking full advantage of the wicked-fast speeds of high-end SSDs.

Answers

There are different kinds of items. The Non-Volatile Memory Express (NVMe) specification supports a communication connection between the operating system and the SSD directly.

Why is NVMe non volatile?

NVMe is known as Non-Volatile Memory Express. This is referred to as a kind of new protocol for looking through high-speed storage media that brings a lot of advantages when compared to legacy protocols.

The Non-Volatile Memory Express (NVMe) specification is known to aid supports a communication connection between the operating system and the SSD in a forward manner.

Learn more about communication from

https://brainly.com/question/26152499

given string userstr on one line and integers idx1 and idx2 on a second line, change the character at index idx1 of userstr to the character at index idx2. ex: if the input is: tiger 0 1 then the output is: iiger note: assume the length of string userstr is greater than or equal to both idx1 and idx2.

Answers

Using the knowledge of computational language in C++ it is possible to describe given string userstr on one line and integers idx1 and idx2 on a second line, change the character at index idx1 of userstr to the character at index idx2.

Writting the code:

#include <iostream>

#include <string>

using namespace std;

int main(){

   string inputStr;

   int idx1;

   int idx2;

   

   getline(cin, inputStr); // Input string by user

   cin >> idx1; // Input index 1 to to add a new character from index 2

   cin >> idx2; // Input index 2 to repalce the character in index 1

   

   char ch = inputStr[idx2]; // get character of index 2

   inputStr[idx1] = ch; // repalce character of index 2 in index 1

   // display new string

   cout << inputStr << endl;

   return 0;

}

See more about C++ at brainly.com/question/18502436

#SPJ1

given string userstr on one line and integers idx1 and idx2 on a second line, change the character at

A software engineer is writing code that allows internet users to interact with objects such as hyperlinks. Which computer discipline does this person most likely work in? O A. Applications development OB. Network development OC. Web development O D. Game development

Answers

Answer:C. Web development

Explanation:

The computer discipline that  this person most likely work in is option c: Web development.

What is hyperlink in web designing?

In the act of designing a website, the use of the hyperlink (or link) is known to be an element or an item such as a word or button that is said to help one to points to another different location.

Note that if a person click on a link, the link will be the one to take you to the target  area of the link, which can be said to be a webpage, document or others.

Therefore, The computer discipline that  this person most likely work in is option c: Web development.

Learn more about Web development from

https://brainly.com/question/25941596

#SPJ1

While importing a series of photos, Christian made sure that the import was set to attach to each image. What is this called?

a)description
b)title
c)copyright
d)hashtag

Answers

i believe the answer is b

______ is a human-readable text format for data interchange that defines attributes and values in a document.

Answers

Answer:

JavaScripts Object Notation (JSON)

Explanation:

Document accurately describes the differences between servers and computers and between local and wide area networks. Document provides at least four suggestions including password managers and safe browsers.

Thinks someone could help me out with this? ​

Answers

Answer:

Cell towers and internet uses allow local and wide area networks, but they also allow you to steal IP and things like that.

Explanation:

This is quite difficult. I appologize if I get this wrong.

(Also if you upload a file for someone to answer, and they give you a link, don't click on it!! They track your IP address and things like that!)

What is output by the following code?
C = 1
sum = 0
while (c< 10):
C=C+2
sum = sum + c
print (sum)

Answers

The output of the code is 17. The output is simply what happens once all of the code is completed, the end result. It is what is entered into the console after all of the calculations have been completed.

What is Python ?

Python is a general-purpose, high-level programming language. Its design philosophy prioritises code readability by employing significant indentation. Python is garbage-collected and dynamically typed. It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming.

It is compatible with a variety of programming paradigms, including structured, object-oriented, and functional programming. Because of its extensive standard library, it is frequently referred to as a "batteries included" language.

Guido van Rossum began developing Python as a successor to the ABC programming language in the late 1980s, and it was first released in 1991 as Python 0.9.0.

To find out output let first write the question:

C=1

sum = 0

while(C<10):

C=C+3

sum=sum + C

print(sum)

Now Focus on

while(C<10):

C=C+2

sum=sum + C

The value of C is initially 1

C=1+2

Sum= 0+3

In second loop the value of C will become 3

c=3+3

sum=3+6

In third loop the value of C will be 6

c=6+2

sum=9+8

so the answer is 9+8 = 17

To learn more about Python refer :

https://brainly.com/question/26497128

#SPJ1

Which one is not considered part of the cinematography team?

cinematographer
sound recorder
director of photography
camera operator

Answers

sound recorder

Explanation:

i hope it works

Sound recorder since it lists in the non living things and is a machine used

If you were asked to make a presentation to your class that requires you to show pictures, text and video, which program would be the best choice? A. Internet explorer B. Photoshop C. Microsoft word D. Microsoft PowerPoint

Answers

Answer:

D

Explanation:

Microsoft PowerPoint is a presentation program.

Are passwords and user-IDs different words for the same thing?​

Answers

Answer:

In many cases, the terms "user ID" and "username" are synonymous. For example, a website may provide a login interface with two fields labeled Username and Password. Another website may label the two fields as User ID and Password, which refer to the same thing. Technically, however, usernames are a subset of user IDs, since a user ID may be an email address, number, or other unique identifier that is not necessarily a name.

(Credits to the rightful owner because this isn't my answer but have a good day :)

a polygon is convex if it contains any line segment that connects two points of the polygon. write a program that prompts the user to enter the number of points in a convex polygon, then enter the points clockwise, and display the area of the polygon.sample runenter the number of points: 7enter the coordinates of the points:-12 0 -8.5 10 0 11.4 5.5 7.8 6 -5.5 0 -7 -3.5 -5.5the total area is 244.575

Answers

Here's a Python program that prompts the user to enter the number of points in a convex polygon, then enter the points clockwise, and displays the area of the polygon:

import math

# Prompt the user to enter the number of points

n = int(input("Enter the number of points: "))

# Prompt the user to enter the coordinates of the points

points = []

for i in range(n):

   x, y = map(float, input("Enter the coordinates of point %d: " % (i + 1)).split())

   points.append((x, y))

# Calculate the area of the polygon

area = 0

for i in range(n):

   j = (i + 1) % n

   area += points[i][0] * points[j][1] - points[j][0] * points[i][1]

area /= 2

area = abs(area)

# Display the area of the polygon

print("The total area is %.3f" % area)

Sample run:

Enter the number of points: 7

Enter the coordinates of point 1: -12 0

Enter the coordinates of point 2: -8.5 10

Enter the coordinates of point 3: 0 11.4

Enter the coordinates of point 4: 5.5 7.8

Enter the coordinates of point 5: 6 -5.5

Enter the coordinates of point 6: 0 -7

Enter the coordinates of point 7: -3.5 -5.5

The total area is 244.575

Note that the program uses the Shoelace Formula to calculate the area of the polygon.

Learn more about the polygon:

https://brainly.com/question/1592456

#SPJ11

a polygon is convex if it contains any line segment that connects two points of the polygon. write a
a polygon is convex if it contains any line segment that connects two points of the polygon. write a

Computer science student Jones has been assigned a project on how to set up sniffer. What must he keep in mind as part of the process

Answers

Setting up a sniffer requires certain considerations to be taken into account, such as ensuring that the sniffer is being used legally, selecting the appropriate hardware and software for the task, and configuring the sniffer correctly to capture and analyze network traffic.

The use of a sniffer or packet analyzer can be subject to legal restrictions and ethical considerations, as capturing and analyzing network traffic may violate privacy laws or ethical norms. As such, Jones needs to ensure that the use of the sniffer is authorized and that he is aware of any legal or ethical considerations that may apply.

When selecting hardware and software for the sniffer, Jones should consider factors such as the intended use of the sniffer, the complexity of the network, and the level of analysis required. Different sniffer tools may be better suited for different tasks, such as capturing traffic on wired or wireless networks, analyzing specific protocols, or detecting security threats.

Once the hardware and software have been selected, Jones needs to configure the sniffer correctly to ensure that it is capturing the desired traffic and providing accurate results. This may involve setting filters to capture specific types of traffic, configuring the interface to ensure that packets are being captured properly, and adjusting the settings to optimize the performance of the sniffer.

To learn more about Sniffer, visit:

https://brainly.com/question/29872178

#SPJ11

Write a program to work out how many days you have been alive for (to the nearest year for the moment - there are 365 days in a year). Get the program to ask for the person’s name and age. Develop this to work out how many hours this is – 24 hours per day

Answers

The program will calculate the number of days and hours a person has been alive based on their age. It will ask for the person's name and age, and then perform the necessary calculations.

The program will begin by prompting the user to enter their name and age. Once the inputs are provided, the program will calculate the number of days the person has been alive by multiplying their age by 365 (assuming there are 365 days in a year). This will give an approximate count of the number of days to the nearest year.

The number of hours, the program will multiply the number of days by 24 (since there are 24 hours in a day). This calculation will provide an estimate of how many hours the person has been alive. The program can then display the results, showing the number of days and hours the person has lived.

To learn more about program click here : brainly.com/question/30613605

#SPJ11

Design a 4-to-16-line decoder with enable using five 2-to-4-line decoder.

Answers

a 4-to-16-line decoder with enable can be constructed by combining five 2-to-4-line decoders. This cascading arrangement allows for the decoding of binary inputs into a corresponding output signal, controlled by the enable line. The circuit diagram illustrates the configuration of this decoder setup.

A 4-to-16-line decoder with enable can be created using five 2-to-4-line decoders. A 2-to-4-line decoder is a combinational circuit that transforms a binary input into a signal on one of four output lines.

The output lines are active when the input line corresponds to the binary code that is equivalent to the output line number. The enable line of the 4-to-16-line decoder is used to control the output signal. When the enable line is high, the output signal is produced, and when it is low, the output signal is not produced.

A 4-to-16-line decoder can be created by taking five 2-to-4-line decoders and cascading them as shown below:

Begin by using four of the 2-to-4-line decoders to create an 8-to-16-line decoder. This is done by cascading the outputs of two 2-to-4-line decoders to create one of the four outputs of the 8-to-16-line decoder.Use the fifth 2-to-4-line decoder to decode the two most significant bits (MSBs) of the binary input to determine which of the four outputs of the 8-to-16-line decoder is active.Finally, use an AND gate to combine the output of the fifth 2-to-4-line decoder with the enable line to control the output signal.

The circuit diagram of the 4-to-16-line decoder with enable using five 2-to-4-line decoders is shown below: Figure: 4-to-16-line decoder with enable using five 2-to-4-line decoders

Learn more about line decoder: brainly.com/question/29491706

#SPJ11

A typical IT infrastructure has seven domains: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, WAN Domain, Remote Access Domain, and System/Application Domain. Each domain requires proper security controls that must meet the requirements of confidentiality, integrity, and availability.

Question 1

In your opinion, which domain is the most difficult to monitor for malicious activity? Why? and which domain is the most difficult to protect? Why?

Answers

The most difficult domain to monitor for malicious activity in an IT infrastructure is the Remote Access Domain, while the most difficult domain to protect is the System/Application Domain.

The Remote Access Domain is challenging to monitor due to the nature of remote connections. It involves users accessing the network and systems from outside the organization's physical boundaries, often through virtual private networks (VPNs) or other remote access methods.

The distributed nature of remote access makes it harder to track and detect potential malicious activity, as it may originate from various locations and devices. Monitoring user behavior, network traffic, and authentication attempts becomes complex in this domain.

On the other hand, the System/Application Domain is the most challenging to protect. It encompasses the critical systems, applications, and data within the infrastructure. Protecting this domain involves securing sensitive information, implementing access controls, and ensuring the availability and integrity of systems and applications.

The complexity lies in the constant evolution of threats targeting vulnerabilities in applications and the need to balance security measures with usability and functionality.

To learn more about Remote Access Domain, visit:

https://brainly.com/question/14526040

#SPJ11

will choose one famous of animation and describe it
and add its picture.
-Why did you choose this character?

Answers

Answer: Toy Story 4

Explanation:this is great animated movie you should try it

Name a software program?​

Answers

Answer:

mathematica ,is a software program helps to solve maths equation ...

Explanation:

mark me as brainliest ❤️

which of the following items would be implemented at the data layer of the security model


Cryptography

Cryptography is implemented at the Data layer.

Authentication, authorization, and group policies are implemented at the Application layer.

Auditing is implemented at the Host layer.

Answers

Cryptography would be implemented at the data layer of the security model.

We know that,

Cryptography is typically implemented at the data layer of the security model to protect the confidentiality, integrity, and authenticity of the data.

Cryptography involves the use of various techniques and algorithms to encrypt and decrypt data, making it unreadable and unusable by unauthorized users.

Authentication, authorization, and group policies are usually implemented at the application layer, as these security measures are concerned with controlling access to software applications and their functionality.

Auditing is typically implemented at the host layer, as it involves monitoring and logging activities happening on the host or operating system level.

To learn more about Cryptography visit:

https://brainly.com/question/88001

#SPJ4

Which technology can be used to avoid collision?

Answers

But there is technology out there that can assist drivers more. A collision avoidance system, or CAS, uses radars, sensors, cameras, or even lasers to determine whether or not a collision is about to occur. It employs this data to issue a warning to the driver.

An advanced driver-assistance system called a collision avoidance system (CAS), often called a pre-crash system, forward collision warning system, or collision mitigation system, is intended to prevent or lessen the severity of a collision. In its most basic version, a forward collision warning system tracks a car's speed, the speed of the car in front of it, and the space between the two so that it can alert the driver if the cars are becoming too close and perhaps even prevent an accident. To detect an impending crash, a variety of technologies and sensors are utilised, such as radar, occasionally laser, and cameras. Through a position database, GPS sensors can identify stationary risks like approaching stop signs.

Learn more about collision from

brainly.com/question/29639929

#SPJ4

what actions can be performed via voice commands using 2022 sentra’s siri® eyes free?

Answers

New mobile cars produce nowadays often have new features that follows it. The actions that can be performed via voice commands using 2021 Sentra's Siri® Eyes Free are;

Send and receive text messages

Make and receive calls

Select and play music

Siri® Eyes Free command can be used to play music, report on the news, show  movies, play games, and give us navigation from one place to the other.

It ha been made available in some selected cars and it often use one's voice to control features of your iPhone without viewing or touching the phone.

Learn more from

https://brainly.com/question/13429053

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

What does each row represent?
What distinguishes one record from another?
What should you choose as the primary key for
this table?

Answers

Answer:

I think this is your answer broski.

Explanation:

What does each row represent?What distinguishes one record from another?What should you choose as the

Answer:

a..c,,c

Explanation:

drop down on edge

a firm that wanted to enable its employees to use and share data without allowing outsiders to gain access could do so by establishing an) internet internet. extranet. intranet.

Answers

A firm that wanted to enable its employees to use and share data without allowing outsiders to gain access could do so by establishing an intranet. The correct option is D.

What is an intranet?

An intranet is a computer network used within an organization to share information, facilitate communication, provide collaboration tools, operational systems, and other computing services, usually with no outside access.

An intranet is a network that allows employees to create content, communicate, collaborate, and grow the company culture.

Meanwhile, an extranet gives authorized customers, vendors, partners, or others outside the company controlled access.

Thus, the correct option is D.

For more details regarding intranet, visit:

https://brainly.com/question/19339846

#SPJ1

Other Questions
You can buy 10 cherry tomatoes for $6. How much would it cos to buy 15 tomatoes answer. 1. Who is the speaker and what is his position? A student has gotten the following grades on his tests: 87, 95, 76, and 88. He wants an 85 or better overall. What is the minimum grade he must get on the last test in order to achieve that average? A(n) _____ strategy is appealing because it attracts two distinct market segments: those who are not price sensitive along with more price-sensitive customers. Write a narrative in which you describe an encounter with a samurai in the 1300s. This samurai tells you about the code of Bushido. Be sure to include how the samurai dresses and acts. Proviene del griego theatron, del verbo theodomai, que significa veo, miro, soy espectador:Seleccione una:a. Ensayo.b. Verso.c. Teatro.d. Narracin. Is Figure B a scale copy of Figure A? A student wants to use objects she finds around the house to model Mercury, Venus, and Earth. Which model best compares the relative sizes of these three planets? a. Three basketballs b. Two basketballs and one softball c. Two softballs and one basketball d. One marble, one softball, and one basketball what is dental decay? Find the equation of the line thatis perpendicular to y =contains the point (4,-8).- 2/3 x What is the source of the roots that the woman from the sky planted on the turtles back? 1. Which of the following are sets? Justify your answer. (a) The collection of all the days in a week beginning with the letter "T". (b) The collection of all difficult questions in the chapther on sets.(c) The collection of girls in your class. (d) The collection of all vers in India. (e) The collection of all active teachers in the school (f) The collection of all integers more than 3. (g) The collection of all beautiful lower in the park. the chapter on sets. a ____ is a tool with application programming interfaces (apis) that allow reconfiguring a cloud on the fly; it's accessed through the application's web interface. Find the distance between the points L(7, -1) and M(-2,4) Help just one question can you show steps You bring 1.5 dozen bagels to school.A dozen bagels cost $5.98.You used a coupon that took $1.00 off the total. Abigail is going to cover the label on a Pringle's can and decorate it forMother's Day. The can has a diameter of 4.5 inches and a height of 14inches. What is the minimum amount of paper that she needs for theproject? Need help fast please Which of the following events has a probability of 75% or higher? a. choosing a consonant from the word leopards b. landing on heads when flipping a coin c. rolling a number greater than 1 on a die d. choosing a consonant from the word horse 1.) Jimmy has rowed his canoe 3/8 of the length of the course. He has rowed 60 meters. How long is the entire course?2.) Melanie has written 5/6 of her essay. She has written 15 pages so far. How long does her entire essay have to be?PLEASE GIVE A DETAILED ANSWER TO BE TURNED INTO A PICTURE!