which of the following programs will result in filterednames only containing the names of students who are 17 or older?O B- for var i=0 i

Answers

Answer 1

The program that will result in filtered names only containing the names of students who are 17 or older is for var i=0 i<ages, length, i++) age=ages [i] if (age<17) append items filtered names, age (17 and names). The correct option is b.

What is the program?

A computer program is a sequence or set of instructions in a programming language for a computer to execute. Computer programs are one component of software, which also includes documentation and other intangible components.

Computer programs include MS Word, MS Excel, Adobe Photoshop, Internet Explorer, Chrome, etc. To create graphics and special effects for movies, computer applications are used.

Therefore, the correct option is b.

To learn more about the program, refer to the link:

https://brainly.com/question/29945466

#SPJ4

The question is incomplete. Your most probably complete question is given below:

for (var i = 0; i < ages.length; i++){ age = ages[i]; if (age < 17){ }

appendItem(filteredNames, age)

REPEAT 2 TIMES

{

REPEAT 2 TIMES

{

}

MOVE FORWARD ()

TURN_LEFT()

}

for(var i = 0; i < ages.length; i++){

age = ages[i];

if (age < 17){

appendItem(filteredNames, names[i])

}

for (var i = 0; i < ages.length; i++){

age = ages[i];

if (age >= 17){

appendItem(filteredNames, names[i])

}

Answer 2

Answer:

D.   "Analise", "Ricardo", "Tanya"

Explanation:


Related Questions

Write a function that displays the following triangle pattern of asterisks whose lines is specified in integer parameter side. For example, if side is 4, the function displays the following ****************

Answers

The function that displays the following triangle pattern of asterisks whose lines is specified in integer parameter side is in the explanation part.

What is programming?

Writing code to support certain activities in a computer, application, or software programme and giving them instructions on how to do is known as computer programming.

Not only for cutting-edge research in artificial intelligence but also for the development of software, computer programming is a necessary talent.

The program for the given scenario will be:

using namespace std;

int main()

{

int side, i, j, space;

cout << "Enter number of rows: ";

cin >> side;

for(i = 1; i <= side; i++)

{

//for loop for displaying space

for(space = i; space < side; space++)

{

cout << " ";

}

//for loop to display star equal to row number

for(j = 1; j <= (2 * i - 1); j++)

{

cout << "*";

}

cout << "\n";

}

return 0;

}

Thus, this is the function for the given situation.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ4

Technological singularity is point at which artificial intelligence advances so far that we cannot comprehend what lies on the other side

Answers

When artificial intelligence reaches the technological singularity, humans will not be able to understand what is on the other side.

What does "technological singularity" mean?

The singularity in technology is a possible future in which unchecked and unstoppable technological advancement occurs. These sophisticated and potent technologies will fundamentally alter our reality in unpredictable ways.

What occurs when technology reaches its singularity?

The technological singularity, often known as the singularity, is a possible future time point at which technological advancement becomes unstoppable and irreversible, bringing about unexpected changes to human civilization.

To know more about artificial intelligence visit:-

https://brainly.com/question/23824028

#SPJ4

Question:

at which artificial intelligence advances so far that we cannot comprehend what lies on the other side?

question 6 :you are the network administrator for your organization. you are asked by a junior administrator when he should create restore points. which of the following are times when restore points should be created?

Answers

If no other automatic restore point has already been created, a restore point is additionally created every seven days.A manual system restore point is simple to make.

A system restore point is created how frequently? Before installing a Windows update, an unregistered driver, or a software from an MSI, an automated restore point is created.If no other automatic restore point has already been created, a restore point is additionally created every seven days.A manual system restore point is simple to make. Type recovery into the search bar in the Control Panel.Choose Recovery > Start a System Restore.Next should be selected in the Restore system files and settings box.Select the desired restore point from the list of outcomes, and then click Scan for Affected Programs.System-Restore Point .Install - The act of installing an application, provided that the application makes use of a System Restore-compatible installer.Auto Update installation is crucial.Restore the system in Undo.The Windows registry is essentially backed up by a restore point.You can use it to return the register to a previous state.A backup is a replica of your most valuable possessions, usually all of your drive's contents or just your data.

To learn more about automatic restore point refer

https://brainly.com/question/27960518

#SPJ4

which of the following are examples of data objects that a relational database management system (rdbms) may include? more than one answer may be correct.

Answers

RDBMS have features that support the quality and security of data. RDBMS allow users to view, add, revise, and remove data.

What is data object in DBMS?A data structure used to either store or refer to data is referred to as a database object in a relational database. The table is the item that people use the most frequently. Indexes, stored procedures, sequences, views, and many others are examples of other objects.Data objects resemble a collection of an entity's characteristics. A sales data item, for instance, may represent clients, sales, or purchases. A data object is referred to as such when it is stored in a database. A more complicated expression that refers to the object can be used to get each value instead of just using its identifier. Each item also has a distinct data type.

To learn more about RDMS refer to:

https://brainly.com/question/13262352

#SPJ4

which of the following works of art is from south america? how to: items can be selected or deselected by clicking anywhere on the box. selected items are highlighted in blue. O 1O 2O 3O 4

Answers

The works of art from south américa are: A and F.

The Beauty of South American Art: An Exploration of its Rich Cultural Heritage

South America is home to a vibrant and diverse culture, and this is reflected in its art. From the mysterious and captivating ancient art of the Incas and Aztecs, to the brightly coloured works of modern Latin American artists, South American art has something for everyone to enjoy. In this essay, I will explore the history, influences, and styles of art from South America, and discuss why it is so important to appreciate and celebrate the beauty of this art form.

Throughout history, South American art has been heavily influenced by the culture of the region. Pre-Columbian art, for example, was heavily influenced by the Incas, Aztecs, and other indigenous cultures. These works of art often featured religious and spiritual themes, as well as symbols and stories that were used to convey important messages and values.

Learn more about South America:

https://brainly.com/question/667544

#SPJ4

Consider the following incomplete method that is intended to return an array that contains the contents of its first array parameter follow by contents of its second array parameter.
public static int[] appen(int[] al, int[] a2)
{
int[] result = new int[al.length + a2.length]
for (int j = 0; j < al.length; j++)
result[j] = al[j];
for (int k = 0; k < a2.length; k++)
result[ / index / ] = a2[k]
return result;
}
Which of the following expressions can be used to replace / index / so that append will work as intended?
(A) j
(B) k
(C) k + al.length - 1
(D) k + al.length
(E) k + al.length + 1

Answers

Answer: (D) k + a1.length

Explanation:

The best way to learn these type of questions would be to create a main class, where you implement the appen() method and test all of the options A-E

Build a 2-3 Tree using the following values. After the tree is built, what value(s) is/are in the root? 27 49 19 24 39 71 48 44 27 44 71 39 19 88 24 49 38

Answers

The value is in the root is 24 and 48.

What is meant by computer programming?

Computer programming is the process of creating instructions and coding to enable certain tasks in a computer, application, or software program.

To create graphics and special effects for movies, computer applications are used. Medical examinations such as ultrasounds, X-rays, and other procedures are carried out using computer programs.

It is well known that one of the hardest subjects to master is programming. Given how different coding is from traditional educational techniques, including college degrees, it is not difficult to comprehend why some people find it impossible to learn how to code. in computer science.

To learn more about computer programming refer to :

https://brainly.com/question/23275071

#SPJ4

A website developer is working on a new e-commerce website and has asked an information security expert for the most appropriate way to store credit card numbers to create an easy reordering process. Which of the following methods would BEST accomplish this goal?
A. Salting the magnetic strip information
B. Encrypting the credit card information in transit
C. Hashing the credit card numbers upon entry
D. Tokenizing the credit cards in the database

Answers

The BEST way to achieve this would be to tokenize the credit cards in the database methods.

Which of the following best distinguishes a data owner from a data custodian?

While the data custodian is in charge of data backup, retention, and recovery, the data owners are largely responsible for setting the data's sensitivity or classification levels. These duties are given to the custodian by the data owner.

A risk register is used for which of the following?

To identify potential setbacks in a project, a risk register is a record that is used in risk management. Prior to problems developing, this method seeks to collectively detect, assess, and resolve risks.

To know more about database visit :-

https://brainly.com/question/6447559

#SPJ4

The information-processing approach to explaining cognitive development compares the brain to a __________; sensory impressions go in and behavior comes out.
A. calculator
B. computer
C. modem
D. telephone

Answers

The correct answer to the given question about  information-processing approach is option b) Computer.

The method of studying cognitive development known as information processing theory emerged from the American experimental tradition in psychology. Information processing-based developmental psychologists explain mental development in terms of maturational shifts in the fundamental parts of a child's mind. According to the notion, people think about the information they are given rather than just reacting to external stimuli. This viewpoint makes use of an analogy to explore how the brain functions similarly to a computer. In this way, the mind behaves like a biological computer that is in charge of processing data from the environment. The traditional information-processing model for mental development states that the mind's machinery consists of attention processes for bringing in information, working memory for actively manipulating information, and memory retrieval systems.

To learn more about  information processing click here

brainly.com/question/27178394

#SPJ4

Tony, a system administrator, set up a printer on John's workstation. During the setup, Tony was able to print a test page. Later, when John attempted to print a document, an error message was displayed that indicates access was denied to the printer. John tried to restart the printer and workstation, but the same error message is displayed when he attempts to print a document. Which of the following MOST likely caused this issue?
Options are :
O The user lacks adequate security permissions to the printer (Correct)
O The printer lacks the memory required to process the document
O The print spooler is hung and must be restarted
O The printer is offline

Answers

The correct answer to the given question about system administrator is option a)  The user lacks adequate security permissions to the printer.

A system administrator, also referred to as a sysadmin, administrator, or admin, is a person who is in charge of managing, setting up, and assuring the dependability of computer systems, especially multi-user computers like servers. The objective of the system administrator is to maintain the equipment under their control within a defined budget while meeting the users' expectations for uptime, performance, resources, and security. A system administrator can buy, install, or upgrade computer hardware and software, carry out routine automation, follow security policies, troubleshoot, manage employees, train staff, or provide technical support for initiatives in order to meet these requirements.

To learn more about system administrator  click here

brainly.com/question/29894226

 

#SPJ4

create one function to read the ids from the file employee.dat and tally how many belong to reach group. the function will need a temporary id variable to read into and evaluate.

Answers

To create one function to read the ids from the file employee.dat and tally how many belong to reach group and the function will need a temporary id variable to read into and evaluate, check the code given below.

What is variable?

A variable is a named piece of data that has a value. Even if the value changes, the name doesn't. Variables are a common feature of programming languages, and they can take many different forms, depending on the script or software programmer.

Some variables are mutable, which means that their values can be altered. Other variables, known as immutable ones, cannot have their values added, changed, or removed after they have been assigned.

When a variable's value must conform to a specific data type, it is said to be typed.

#include<iostream>

#include<fstream>

#include<iomanip>

 using namespace std;

 void display_data(int arr[4]){

         cout << "\n************************************************\n\n" ;

    cout << arr[0] << " Employees belong to group 01 - HR \n\n" ;

    cout << arr[1] << " Employees belong to group 02 - Purchasing \n\n" ;

    cout << arr[2] << " Employees belong to group 03 - IT \n\n" ;

    cout << arr[3] << " Employees belong to group 04 - Executive \n\n" ;

    cout << "************************************************\n\n" ;

 }

 void read_data(){

    ifstream ftp ;

    ftp.open("Employee.dat" , ios::in);

    int group[4] = {0, 0, 0, 0} ;

// Initialzing array of four integers to count number of employees in each section

    int Id = 0 ;

     while(!ftp.eof()){

        ftp >> Id ;

         if((Id >= 100) && (Id <= 299)){

            group[0] = group[0] + 1;

         }

        else if((Id >= 300) && (Id <= 499)){

            group[1] = group[1] + 1;

         }

        else if((Id >= 500) && (Id <= 799)){

            group[2] = group[2] + 1;

         }

        else if((Id >= 800) && (Id <= 899)){

            group[3] = group[3] + 1;

         }

        else{

            cout << "\nInvalid Id Found\n" ;

            break;

        }

     }

     display_data(group) ;

}

 int main(){

    read_data();

    return 0;

}

Learn more about variable

https://brainly.com/question/28463178

#SPJ4

TRUE OR FALSE in most modern relational dbmss, a new database implementation requires the creation of special storage-related constructs to house the end-user tables.

Answers

Answer:

Trueeee

Explanation:

:DD

Complete the implementation of the LinkedBST class, in the linkedbst.py file, discussed in this chapter. A main() has been provided in the file testbst.py to test the implementation of the LinkedBST class. You can reference this file to verify the requirements of the LinkedBST class.
"""
File: testbst.py
A tester program for binary search trees.
"""
from linkedbst import LinkedBST
def main():
tree = LinkedBST()
print("Adding D B A C F E G")
tree.add("D")
tree.add("B")
tree.add("A")
tree.add("C")
tree.add("F")
tree.add("E")
tree.add("G")
print("\nExpect True for A in tree: ", "A" in tree)
print("\nString:\n" + str(tree))
clone = LinkedBST(tree)
print("\nClone:\n" + str(clone))
print("Expect True for tree == clone: ", tree == clone)
print("\nFor loop: ", end="")
for item in tree:
print(item, end=" ")
print("\n\ninorder traversal: ", end="")
for item in tree.inorder(): print(item, end = " ")
print("\n\npreorder traversal: ", end="")
for item in tree.preorder(): print(item, end = " ")
print("\n\npostorder traversal: ", end="")
for item in tree.postorder(): print(item, end = " ")
print("\n\nlevelorder traversal: ", end="")
for item in tree.levelorder(): print(item, end = " ")
print("\n\nRemoving all items:", end = " ")
for item in "ABCDEFG":
print(tree.remove(item), end=" ")
print("\n\nExpect 0: ", len(tree))
tree = LinkedBST(range(1, 16))
print("\nAdded 1..15:\n" + str(tree))
lyst = list(range(1, 16))
import random
random.shuffle(lyst)
tree = LinkedBST(lyst)
print("\nAdded ", lyst, "\n" + str(tree))
if __name__ == "__main__":
main()
Here is the whole code link:
https://repl.it/repls/JauntyRecklessProperties#abstractcollection.py
due to restriction, I can't upload whole code here.
I got two error:
Unit Test Incomplete:
postorder() traverses nodes properly
Unit Test Complete:
postorder() does not traverse preorder
Unit Test ncomplete:
postorder() does not traverse in inorder
Unit Test Complete:
postorder() does not traverse in levelorder

Answers

The link class can properly establish relationships on its own with other classes in the system and can have any number of characteristics.

What is meant by link best class?

For each pair of related objects, a link class creates a single instance of the class. The link class can properly establish relationships on its own with other classes in the system and can have any number of characteristics.

The:link Unvisited elements are represented using CSS pseudo-classes. Every unvisited href-property-equipped a> or area> element is matched.

A link relationship is a type of association or communication path in the UML. A link is a relationship between objects or instances of the classifiers or nodes, as opposed to an association, which is a relationship between two classifiers. Another example of a communication path between two nodes is a link relationship.

To learn more about link refer to :

https://brainly.com/question/15134043

#SPJ4

The error doesn't seem to be in TESTBST.PY. No value is returned from the TREE.INORDER() method. The problem is in the LINKEDBST PYTHON file that defined the INORDER() method.

What is Python and its importance?

The Python programming language has become very popular language now a days. The Files with the . py extension contain the Python source code. Python can be used for system scripting, website and software development, task automation, data analysis, and data visualization. Because Python is relatively easy to learn, many non-programmers, such as accountants and scientists, have adopted it for a variety of day-to-day tasks, such as: Organize your finances.

How do I edit a Python file?

Python Toolbox (. pyt) is a plain text file that can be edited with any text editor or Python IDE. To edit a Python toolbox, right-click the toolbox and click Edit. Once you're done editing, close the editor and the Python toolbox will automatically refresh.

To learn more about  Python visit:

https://brainly.com/question/28691290

#SPJ4

what is the bounce rate?

Answers

It's ideal to have a bounce rate between 26 and 40 percent. The average ranges from 41 to 55 percent. Depending on the website, a percentage of 56 to 70 percent is over average but may not be alarming.

What are  bounce rate?Bounce rate, also known as single-page sessions divided by all sessions, is the proportion of all sessions on your site during which only one page was viewed and one request was made to the analytics server.User engagement can be evaluated using the bounce rate. You want people to visit your page and take action once there. even if only to look around If they don't, it can mean that your page's content, design, copywriting, or user experience are flawed.When the conversion rates are low and the bounce rates are in the 70s or higher, you have a problem. Low conversion rates and higher bounce rates are never good.A high bounce rate can indicate a number of issues with your website.

To learn more about bounce rate  refer to:

brainly.com/question/15062407

#SPJ1

note: this is a multi-part question. once an answer is submitted, you will be unable to return to this part. consider the following symbols and their frequencies: a: 0.20, b: 0.10, c: 0.15, d: 0.25, e: 0.30 since b and c are the symbols of least weight, they are combined into a subtree, which we will call t1 for discussion purposes, of weight 0.10 0.15

Answers

Average number of bits required to encode a character in Huffman code for the given weights and given frequencies is = 2 x 0.20 + 3 x 0.10 + 3 x 0.15 + 2 x 0.25 + 2 x 0.3 = 2.25

What is Huffman code?

A lossless data compression algorithm is huffman coding. Input characters are given variable-length codes, the lengths of which are determined by the frequency of the matching characters.

The character used the most often is given the smallest code, and the character used the least often is given the largest code.

The variable-length codes (bit sequences) assigned to input characters are Prefix Codes, which indicates that no other character will have a code that is the prefix of the code assigned to that character.

This is how Huffman Coding ensures that the produced bitstream cannot contain any ambiguities during decoding.

The concept of prefix code, which states that a code associated with a character should not be included in the prefix of any other code, is used by Huffman Coding to avoid any ambiguity in the decoding process.

To know more about Huffman code, visit: https://brainly.com/question/15709162

#SPJ4

TRUE/FALSE. users spend the majority of their time on smart phone using apps, and apps are incrasibly creating content specific alternatives to 's web based search

Answers

Users spend a majority of their time on smart phone using apps, and apps are increasingly creating content specific alternatives to Gσσgle's web based search. (True)

What is web?

The World Wide Web is also known as the "Web," and it is a portion of the Internet that consists of pages that can be accessed through a Web browser. Many people mistakenly believe that the Web and the Internet are one and the same thing and interchange the two terms.

However, the global server network that enables information sharing over the Web is referred to as the "Internet" in actuality. The Internet and the Web are therefore not the same thing, despite the Web comprising a sizable portion of the Internet.

A language called Hypertext Markup Language is used to format web pages (HTML). Users can navigate between Web pages using links thanks to this language.

Learn more about web

https://brainly.com/question/22650550

#SPJ4

Listen to the audio clip. Select all the ways in which Chopin conveys a feeling of passion in the conclusion of the Nocturne in E Flat Major.Rapidly increasing the tempo.Playing the melody in octaves.Introducing a sudden crescendo.

Answers

upping the tempo quickly. the melody being played in octaves. introducing a swift buildup.

Which topic did romantic composers most frequently explore?

Intense feelings, nationalism, radical views of nature, exoticism (a concentration on distant locations like Asia), and the macabre or otherworldly were common themes throughout this time. Berlioz's Symphonie Fantastique (1830) provides an illustration of a number of typical Romantic themes.

How should a crescendo be written?

Recording of Crescendo, You can use it by handwriting the word "crescendo," by using the abbreviation "cresc.," or by using a hairpin. You are viewing an illustration of a crescendo on the screen using the abbreviation "cresc." Up to the forte at the conclusion of the fourth measure, the crescendo will continue.

to know more about crescendo here:

brainly.com/question/10847437

#SPJ4

Match each layer of the TCP/IP model on the left with the corresponding layer of the OSI on the right. Each option on the left can be used more than once. Presentation LayerData Link layer Application layer Session layer Network layer Transport layer NetworkTransport Application Transport Internetwork

Answers

TCP/IP layer matching with the corresponding OSI layer:

TCP/IP                                                                      OSI

Application layer                                             Application layer

                                                                        Presentation layer

                                                                        Session layer

Transport layer                                             Transport layer

Internetwork layer                                          Network layer

Network access layer                                    Data link layer

What is TCP/IP layer?

TCP/IP governs how computers exchange data from one device to the next. This information must be kept up to date so that the receiver receives the same information that the sender sent.

So, what exactly is TCP/IP, and how does it work? To ensure that each communication reaches its intended destination intact, the TCP/IP model divides data into packets and then reassembles the packets into the complete message on the other end. When data is sent in small packets, it is easier to maintain accuracy than when data is sent all at once.

To know more about TCP/IP layer, visit: https://brainly.com/question/21344755

#SPJ4

ben works as a database designer for abc inc. He is designing a database that will keep track of all watches manufactured be each manufacturer. Each manufacturer produces a range of watches. Ben wants the database to be normalized. How many tables should he include in the database?

Answers

Since ben works as a database designer for abc inc., the numbers of tables that he include in the database is between 3- 5.

What is data table in database?

All of the data in a database is stored in tables, which are database objects. Data is logically arranged in tables using a row-and-column layout akin to a spreadsheet. Each column denotes a record field, and each row denotes a distinct record.

Therefore, one can say that database management system (or DBMS) is just a computerized data-keeping system. Users of the system are provided with the ability to carry out a variety of actions on such a system for either managing the database structure itself or manipulating the data in the database and thus 3-5 is ok.

Learn more about database from

https://brainly.com/question/518894

#SPJ1

Which of the following is a routing protocol proprietary to Cisco that combines the features of link-state and distance vector routing protocols? O a Enhanced Interior Gateway Routing Protocol Ob. NetBEUL O Both A and B Od. None of the above 4

Answers

On a computer network, the Enhanced Interior Gateway Routing Protocol (EIGRP) is a sophisticated distance-vector routing protocol used to automate routing design and decisions. The proprietary protocol was created by Cisco Systems and is exclusively supported by Cisco routers.

Is STP a protocol that Cisco only uses?

A proprietary variant of Rapid Spanning Tree Protocol was also released by Cisco. Similar to PVST, it builds a spanning tree for each VLAN.

A link-state protocol, is EIGRP?

Due to its similarities to both link-state and distance-vector protocols, EIGRP is frequently referred to as a hybrid routing protocol.

To know more about EIGRP visit:-

https://brainly.com/question/29376286

#SPJ4

Which of the following are defined as correspondence?
I Written letter to a client
II E-mail
III Instant message
IV Group e-mail
A. I only
B. II and IV only
C. I, II, III only
D. I, II, III, IV

Answers

Email and a written letter to a client are both considered forms of correspondence. A contingency table is subjected to a weighted main components analysis in simple correspondence analysis.

What class of words are letters?

Friendly conversation reciprocal interchange of manners, particularly correspondence between individuals. an agreement between events or things and the intended result.

What is the correspondence method?

Different ways that journal entries balance debit and credit accounts are identified by correspondence approaches. Each document adheres to one of the accounting types shown in the following table, depending on the batch type or document type. The number of underlying dimensions in a contingency table with r rows and c columns is equal to the smaller of (r 1) or (c 1).

To know more about Email visit:-

https://brainly.com/question/14380317

#SPJ4

Several users at an adjacent office building report intermittent connectivity issues after a new flag pole was installed between the two offices. The network technician has determined the adjacent office building is connected to the main office building via an 802.11ac bridge. The network technician logs into the AP and confirms the SSID, encryption, and channels are all correct. Which of the following is MOST likely the cause of this issue?

Answers

Signal attenuation is most likely the cause of the issue that users are facing in the given question.

Signal attenuation refers to the reduction in signal power in networking cables or connections. This is often expressed as a change in voltage or decibels (dB), and it can happen for a number of reasons. It can result in distorted or undetectable signals. Passive media elements like cables, cable splices, and connectors are what produce attenuation. Attenuation still happens during both multimode and single-mode transmission even if it is substantially less for optical fiber than for other media. Instead of reducing the length of the PCB routing, signal attenuation can be decreased by choosing lower loss materials, however this comes at a greater expense. By altering the epoxy used across the glass weave, materials with reduced attenuation can be produced with a lower dissipation factor.

To learn more about Attenuation click here

brainly.com/question/20368482

#SPJ4

In database access control area, which of following statement is the best to explain Authentication O Methods to restrict users to access the database system O Control to access to partial database o verifying whether a user is the claimed user o defining the scope of access O All above mentioned

Answers

In database access control area, which of following statement is the best to explain Authentication- verifying whether a user is the claimed user.

What exactly is authentication?

To the server or client, the user or computer must authenticate their identity. A user name and password are typically required for server authentication. Card-based authentication, retinal scanning, voice recognition, and fingerprint authentication are additional options.

3 distinct types of authentication?

Three categories of authentication factors exist: A token, like a bank card, is something you have; a password or personal identification number (PIN) is something you know; and biometrics, like voice and fingerprint recognition, are something you are.

To know more about Card-based authentication visit:-

brainly.com/question/29031868

#SPJ4

Build an AVL tree from the following values, which value is the first to become the Alpha node? 35, 49, 22, 27, 64, 60 O 35 O 60 O 64 O 49 O 27 O 22

Answers

Creating an AVL tree, the value indicating the first alpha node would be 49 because the alpha node is the node that needs to be rebalanced. A node is basic unit of data structures such as a linked list or tree data structure.

What does AVL tree mean?

AVL tree is a kind of binary search tree. Like a binary search tree, it consists of a "root" node and "leaf" nodes. Each node has at most two children, the left child being smaller than the parent and the right child being larger than the parent. However, binary search trees can be either unbalanced or balanced.

What is the balance factor of the nodes in the AVL tree?

The balance factor for a node in an AVL tree is the height difference between the left and right subtrees of that node. The self-balancing property of the AVL tree is maintained by the balancing factor. The correction factor value must always be -1, 0, or +1.

How can I find a node in the AVL tree?

Start at the root of the tree and compare the key to the node's value. Returns a node if the key is equal to the value. If the key is greater, search from the right child, otherwise continue searching from the left child.

To learn more about  AVL tree visit:

https://brainly.com/question/30005720

#SPJ4

given the following javascript function, which of the following is not a possible result? select all that apply. function tossit(){ return math.random() 1; }
O 0.5 O O O 1 O 0.8923871

Answers

In a JavaScript function, the result 1 cannot be achieved. A JavaScript function is a segment of code created to carry out a certain task.

Can math random () return 0?

Math.random() The Math.random() function returns a floating-point, pseudo-random number that is more than or equal to 0 and less than 1, with a roughly uniform distribution over that range, which you can adjust to your desired range.

What do JavaScript functions do?

In JavaScript, a function is comparable to a procedure—a group of statements that carry out an action or compute a value. However, in order for a process to be considered a function, it must accept an input and produce an output with an evident connection between the input and the result.

To know more about javascript visit :-

https://brainly.com/question/13266367

#SPJ4

directions: the question or incomplete statement below is followed by four suggested answers or completions. select the one that is best in each case. the ticket prices at a movie theater are given below. a table is shown with 2 columns and 4 rows. the first row of the table contains the column headers, from left to right, type of ticket and price in dollars. the table is as follows: regular, 12 child ages 12 and below, 9 senior ages 60 and above, 9 below the table is the text: additional 5 dollar fee for 3 d movies a programmer is creating an algorithm to set the value of one word, ticket price based on the information in the table. the programmer uses the integer variable age for the age of the moviegoer. the boolean variable one word, is 3 d is true when the movie is 3-d and false otherwise. which of the following code segments correctly sets the value of one word, ticket price ?

Answers

The following code segments correctly sets the value of one word, ticket price

if (age <= 12)

   ticketPrice = 9;

else if (age >= 60)

   ticketPrice = 9;

else if (is3D)

   ticketPrice = 12 + 5;

else

   ticketPrice = 12;

What is code segment?
Code
segment, also known as a segment of code or simply code, is a portion of computer code that performs a specific task or function. Code segments can be found in software programs, web pages, scripts, or any other type of programming language. A code segment is usually composed of several lines of code that are arranged in a specific order and are designed to perform a specific task. Code segments can range from very small snippets of code designed to perform a single, simple task to very large chunks of code that may be hundreds or thousands of lines long and are designed to perform a more complex task. Code segments are often used to repeat tasks or functions multiple times, as well as to organize code into a more readable format.

To learn more about code segment
https://brainly.com/question/25781514
#SPJ1

the distinction between application and infrastructure security: application security is designed to resist attacks. infrastructure security is the software configured to resist attacks

Answers

Application security is a difficulty for software engineers since the system must be made to withstand attacks. Configuring the infrastructure to defend against attacks is a key component of infrastructure security, which is a systems management challenges.

What is application security?

All tasks that introduce a secure software development life cycle to development teams are included in application security. Its ultimate purpose is to enhance security procedures and, through that, to identify, address, and ideally avoid security flaws in applications. Application security controls are strategies to increase an application's coding-level security, making it less susceptible to attackers. A lot of these options relate to how the application reacts to unforeseen inputs that a hacker might use to exploit a flaw.

One well-known instance is static code analysis, in which a testing tool gets direct access to the application's source code. White box testing can spot poor code quality problems, security setting errors, and unsafe coding techniques.

To learn more about application security, use the link given
https://brainly.com/question/26701098
#SPJ4

write a program that simulates the game rock, paper, and scissors. in this game, the player plays against the computer. recall the rules: 1) rock beats scissors, 2) scissors beat paper, and 3) paper beats rock

Answers

A high-level, class-based, object-oriented programming language with the least amount of implementation dependencies feasible is called Java.

What is the program?

A high-level, class-based, object-oriented programming language with the least amount of implementation dependencies feasible is called Java.

Java programming may be broken down into three simple steps:

Create the program by entering HelloWorld.java into a text editor and saving it.

Type "javac HelloWorld. java" to compile it in the terminal window.

Enter "java HelloWorld" to run (or execute) it in the terminal window.

import java.util.Scanner;

program:

import java.util.Random;

public class RockPaperScissors

{

public static void main (String[] args)

{    

   Scanner input = new Scanner(System.in);

   System.out.println("Would you like to play \"Rock, Paper, Scissors?\"");

   System.out.println("Answer \"yes\" or \"no\"");

   input.next();

   String answer = input.next();

}

To learn more about Java refer to:

https://brainly.com/question/26789430

#SPJ4    

When comparing controller-based networks and traditional networks what are some perceived benefits from a controller-based perspective?

Answers

Controller-based networks, also known as software-defined networking (SDN), offer a number of perceived benefits compared to traditional networks. Some of these benefits include:

Centralized control.Flexibility.Improved security.Better scalability.Enhanced visibility.

In a controller-based network, all network traffic is routed through a central controller, which makes it easier to manage and control the network. This can be especially beneficial in large, complex networks where it can be difficult to keep track of all the different devices and connections. By centralizing control of the network, it is easier to implement security measures such as firewall rules and access controls. This can help to improve the overall security of the network.

Learn more about Controller Based Network, here https://brainly.com/question/7582284

#SPJ4

a programmer is creating an algorithm to display the cost of a ticket based on the information in the table. the programmer uses the integer variable age for the age of the ticket recipient. the boolean variable includestour is true when the ticket is for a guided tour and is false when the ticket is for general admission. which of the following code segments correctly displays the cost of a ticket? responses

Answers

Below is the following code segments which correctly displays the cost of a ticket.

Coding Part:

cost - 6

if age > 12

cos - cost plus 2

if includes tour

cost - cost 2

display cost

What is a Code segment?

In the field of computing, a code segment, also recognized as a text segment or simply text, is a portion of a computer file that includes object code or an analogous section of the program's address space which contains executable commands and directives information.

When a program is processed and executed, it is saved in a computer file, which contains object code. The code segment is one of the divisions of this object file, which when the program is stored in memory by the loader as a result of it possibly being carried out and implemented, a variety of memory segments are assigned for a specific purpose, equivalently to both segments in object code based computer files and also segments that are only required at run time during execution.

To learn more about Code segment, visit: https://brainly.com/question/25781514

#SPJ4

Other Questions
What is the difference between a low risk investment and a high risk investment? The last phase in the NIST performance measures implementation process is to apply ____________________ actions; close the gap by implementing the recommended corrective actions in the security program or in the security controls. Is inference and conclusion the same? What is Zinn's primary argument in Chapter 18? Microsoft Project 2016 Essential Training1. You are given a deadline for a project. What is the drawback of using that specific date as your Project Finish Date when scheduling in the Project Information dialog box?There is no drawback. You should always begin by using a specific date as your Project Finish Date.Microsoft Project will work backward to determine your start date, but there will be no flexibility to accommodate delays along the way.You should never accept deadlines that are given to you by others.If you choose a Project Finish Date, you'll also have to manually determine your start date.2. Etna works on many projects. As she creates a new project file, she goes to the File tab, selects Options, and then goes to the advanced category for the General section to check a box. What is she trying to do?Create a new file with a set of parameters.Make sure the Save As dialog box opens every time there is lapse of five minutes when editing a project file.Set the security features for the file.Make sure the project information dialog box automatically opens when creating a new project file.3. Raj was concentrating so much while working on his project plan that he was late for a meeting. When he went back to his office, he noticed his system had restarted and his project file was not updated. What advice would you provide Raj in this situation?Get a timer app to remind you about meetings.Back up your system at least once per week.Save your files early and often.Call IT to see whether they can retrieve the file.4. You would like to place an image of your project plan in a presentation. Before you copy the image, what do you need to do?Increase your screen size as much as possible.Make sure you can see all columns and the Gantt chart.You don't need to do anything, because Project will condense the image.Choose the Selected rows and columns option.5. Rick is trying to figure out his project plan task values. Which equation would he use?Duration = Work * UnitsUnits / Duration = WorkDuration = Work + UnitsDuration = Work / Units6. What is the easiest way to find a command that you use often for projects?Right-click any tool icon in the Ribbon, then select Add to Quick Access Toolbar.Double-click any tool icon, then select Add to Quick Access Toolbar.Hover over any tool icon, then select Add to Quick Access Toolbar.Drag any tool icon to the Quick Access Toolbar.7. The _____ is a feature for managing the elements in your Project files and the Global Template.OrganizerElementorPlannerArranger8. Your coworker is confused about the baseline in a project. What is the best description of a baseline?It is the actual values of your schedule, scope, and costs.It is a snapshot of your initial schedule, scope, and costs.It is the estimated values for your schedule, scope, and costs as you progress.9. Mako is reorganizing some of the tasks in his project plan. He selects a Summary task and its subtasks. The pointer changes to a four-headed arrow. What does this tell Mako?He can copy the tasks, then paste somewhere else in the project plan.He can now drag and drop these tasks to another location in the project plan.He can delete the tasks, go to where he wants them to be, and then Undo.He can right-click, then choose to Move the tasks to another location.10. Kendra goes to the View tab, and turns on the Details checkbox. What does she now see in her project view?Timeline on the bottom, Details on the top, and Gantt to the leftDetails on the top, and Gantt view on the bottomGantt view on the top, Timeline to the right, and Details on the bottomGantt view on the top, with Details on the bottom keynesians: a. accept the countercyclical policy of doing nothing, that is, allowing market forces to work. b. focus on increasing aggregate demand in order to stimulate the economy. c. accept the fact that policymakers should eliminate inflation first before focusing on unemployment. d. believe that the level of aggregate demand in the 1930s was sufficient to generate full employment. How does the poem sea fever shift from person to person or between different times or places? How do you solve two parallel lines crossed by a transversal? Mastering A&P Chapter 12 - The Central Nervous System How do you write a chronological paragraph? 1Which sentence from the passage best supports the idea that interns should automatically get college credit for their internship? A. College interns should receive college credit for hours toward their degree plan as a matter of course from all colleges. B. The experience and knowledge an intern gains by working in the business environment is certainly more valuable thanhours spent in a classroom. C.The student could gain experience without incurring further debt. D.Yet, the intern receives no money for the work and often no college credit, unless they beg and plead and cry. Chemistry Worksheet, Atomic Number and Mass NumberAtoms are composed of electrons, protons, and neutrons. It is the difference in the numbers of protons in the atoms that determine the different elements. You can determine the composition of an atom of any element from its atomic number and its mass number. What is the difference between mass number and atomic number?What is meant by the statement "Atoms are electrically neutral" ?What does the atomic number of each atom represent? Some of my pleasantest hours were during the long rainstorms in the spring or fall, which confined meto the house for the afternoon as well as the forenoon, soothed by their ceaseless roar and pelting...Which type of sentence has Thoreau crafted in this example? How would the effect be different if Thoreau used a series of simple sentences? Review the graph. Given z = -1 - i, which letter represents z3? Explain what the category of price elasticity for the following products should be. -petrol -clothes -cars -travel -fillet steak What form is used to inform the SSS of your illness or injury? north company budgets overhead costs for the next year of $3,700,000 for indirect labor and $960,000 for factory utilities. the company uses machine hours as its overhead allocation base. if 125,000 machine hours are planned for this next year, what is the company's plantwide overhead rate? Answer the following question in 3-4 complete sentences. define the two main types of mixed media and their purpose(s). The graph below represents the number of miles, y, that the satellite Space Explorerflies in a hours. Find the rate of change.Miles90,00085,00080,00075,00070,00065,00060,00055,00050,00045,00040,00035,00030,00025,00020,00015,00010,0005,000Answer:0Space ExplorerSeve(10,10000)(5.5000)1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18Hoursmiles per hourSubmit Answer What kind of sequence is 6 12 24?