Answer:
assert()
Explanation:
The assert function takes a boolean as an input, and when true, it just continues the flow, however if false it prints an error and calls exit.
Draw and implement of an organization which have 125 employees. use the following features 1.email services 2.lan communication 3.vlan 4.security 5.storage 6.server
An organisation usually hires employees which helps in the successful achievement of the goals of the organisation.
Implementation of an organisationThe implementation of an organisation can be carried out using the following features:
Email services: Email address can be assigned to different employees of the organisation.LAN communication: Local Area Network is used by organisation to connect their computer devices to a server using a common communication line.VLAN: This is known as Virtual Local Area Network which is created between two LAN's.Security: This is set up by a company to guide their data from theft.Storage: This is used by the organisation to store their data.Server: This is a device that provides internet services to another computer in an organisation.Learn more about LAN here:
https://brainly.com/question/26956118
#SPJ4
in which part of the scratch interface does a programmer combine code blocks to build the program?
a. sprite info pane
b. block palette
c. stage
d. scripts area
Answer:
D
Explanation:
The sprite info pane is for an overview over your sprites and their visibility, coordinates, etc.
The block palette is where you select blocks from.
The stage is where your figures move and do stuff.
The scripts area is where you combine blocks from the palette together.
i hs no life hahahaha
Answer:
PLEASE ANYONE HELP WITH THIS
Explanation:
Answer:
me too lol
Explanation:
Match the Job description with the job titles.
advantages and disadvantages of algorithm
Answer:
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
Explanation:
It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program
Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.
Question an administrator of a linux network is writing a script to transfer a list of local host names, contained in a file called hostnames, directly into the syslog file. predict the cli command the admin is likely to use to accomplish this. a.
The Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."
What is a Linux command?A Linux command simply refers to a software program that is designed and developed to run on the command line, in order to enable an administrator of a Linux network perform both basic and advanced tasks by entering a line of text.
In this scenario, the Linux command to be used by this administrator in transferring a list of local host names, directly into the syslog file is "logger -f hostnames."
Read more on Linux commands here: https://brainly.com/question/25480553
#SPJ1
Northern Trail Outfitters uses a custom object Invoice to collect customer payment information from an external billing system. The Billing System field needs to be filled in on every Invoice record. How should an administrator ensure this requirement
An administrator should ensure this requirement by creating a process builder to set the field.
What is a billing system?A billing system is a complex software that enables service providers' order to cash process (O2C) and sends invoices, tracks, and processes payments for different consumers.
It is the process by which a business bills and invoices customers. Billing systems often include payment software that automates the process of collecting payments, sending out recurring invoices, expense tracking, and invoice tracking.
Learn more about billing system here,
https://brainly.com/question/14315763
#SPJ1
What do you prevent when you use data validation in your database forms?
O code injection
O phishing
O botnet
O denial-of-service
Answer:
code injection
Explanation:
Validating the data in a database prevents someone from sneaking code to run without permission, aka code injection.
Phishing - this is disguising as a reputable company/person and trying to steal info (passwords, credit card numbers)
Botnet - this is a network of computers (most likely in the network because of a virus) that are used as a group for malicious purposes (like spam)
Denial-of-service - this is an attack which aims to deny users from accessing the content they want. a common example of this is flooding a server with spam requests, rendering it overloaded and unable to handle any user requests
write the c programming that takes the input of 25 employees salaries and count the number of employees who are getting salary between 30000 and 400000
Using the computational language in C++ it is possible to write a code that uses the salary values of the employees of a company dividing between the number of employees.
Writing the code in C++ is possible:#include<stdio.h>
#inc1ude<conio.h>
void main()
{
int i, n, count = 0;
Long int salary[25];
clrscr();
printf(“\n Input salary of 25 persons:- ");
for(i=0;i<25;i++)
scanf("%ld", &salary[i]);
for(i=0;i<25;i++)
{
if(Salary[i]>30000 && salary[i]<40000)
count++;
}
printf("There are %d persons whose salary is in between 30000 and 40000",count);
getch();
}
See more about C++ code brainly.com/question/17544466
#SPJ1
The entities on which data are collected are _____.
Answer:
The entities on which data are collected is known as variables.
Explanation:
what is a computer?write any four features of computer
Answer:
A computer is defined as an electronic device for storing and processing data, typically in binary form, according to instructions given to it in a variable program.
Four features of a computer would be CPU, GPU, Memory, and Motherboard.
Explanation:
Computer is an electronic machine which accepts raw data from the user , process the data according to the predefined set of instructions, gives and stores the result or instructions....
Or
A computer is an electronic device that can perform several task according to the given instructions...
The four features of computer are :
Speed Accuracy Versatility Diligence Storage etc....[tex]...[/tex]
What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.
What type of hackers are motivated by social or political issues?Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated aim or reason.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.
Learn more about Hacktivism from
https://brainly.com/question/5483494
#SPJ1
Why is it important for companies to invest in building a complete data and analytics platform?.
Companies need to invest in data and analytics platform as it generates insights by housing data in one place and converting it into easily consumable information at high speed.
Why is it vital to use the analytics of a platform?Analytics platforms is known to have helped a lot of data scientists as it has help to boast access to a lot of data sources and hardware.
Note that Companies need to invest in data and analytics platform as it generates insights by housing data in one place and converting it into easily consumable information at high speed.
See options below
It produces cultural support and alignment, a growth mindset, and new ideas and priorities to improve business processes.
It creates awareness of what data can do to improve business processes.
It generates insights by housing data in one place and converting it into easily consumable information at high speed.
It stores large amounts of data that are easily retrievable for future business growth.
Learn more about analytics platform from
https://brainly.com/question/26468036
#SPJ1
Give three reasons why it is important to have hci-based software programs.
need this soon
The three reasons why it is important to have HCI-based software programs As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.
What is HCI and why is it important?The Role of Human Computer Interaction withinside the Workplace. Human Computer Interaction (HCI) and User Experience (UX) are interdisciplinary fields that draw on human-focused disciplines like psychology and sociology to layout and increase technological merchandise that meet human needs.
As its call implies, HCI includes 3 parts: the user, the pc itself, and the methods they paint together.HCI is vital on account that it'll be important for items to be extra successful, safe, helpful, and functional. It will make the users revel in extra fun withinside the lengthy term. As a result, having a person with HCI capabilities concerned in all levels of any product or machine improvement is vital.
Read more about the software programs:
https://brainly.com/question/1538272
#SPJ1
Write a Java expression that converts the value of 'y' into an integer, and assigns the value to 'x'.
[tex]\huge{\purple{\underline{\underline{\mathfrak{\red{\bigstar answer:: \bigstar}}}}}}[/tex]
int y = (int) y;
int x = y;
Hope it helps..♪A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task
Thay is the malicious actor accomplishing this task is done by using the VBA code.
What is The Visual Basic button?It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.
To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.
Read more about the spreadsheet :
https://brainly.com/question/26919847
#SPJ1
pls help will mark as brainliest i need help in html.
Answer:
This is how I did it. Try it out and see if it works for you
Which programming best practice does saving code snippets help you achieve?
O using consistent indentation and formatting
O documenting all changes and tracking revisions
O avoiding repetition of the same code in a program
O avoiding having to re-create code that you or another programmer has already written
Answer:
When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.
Missing: tracking | Must include: tracking
Write a recursive, string-valued method, reverse, that accepts a string and returns a new string consisting of the original string in reverse. For example, calling reverse with the string goodbye returns the string eybdoog.Reversing a string involves:
The program is an illustration of recursive functions in Python;
Recursive functions are functions executed from within itself
The python programThe program written in python, where comments are used to explain each action is as follows:
#This defines the function
def revStr(myStr):
#This returns an empty string if the string is empty
if myStr == "":
return myStr
#If otherwise, this returns the reversed string recursively
else:
return revStr(myStr[1:]) + myStr[0]
Read more about python recursions at:
https://brainly.com/question/19089783
#SPJ1
Complete the following sentences using each of the words provided ONCE only. KEYBOARD DESKTOP STORE PRINTER COMPUTER MOUSE MONITOR CD Bay PRINTER TOWER CASE CENTRAL PROCESSINGENIT is an electronic device that retrieves, and processes shows you what is going on in the computer. is the first image you see on your screen when the computer is is used for telling the computer what to do. is used for typing documents. is used for putting documents on paper. you can insert a CD or Compact Disc. is is box inside and shaped 1) A 2) The 3) The data. switched on. 4) The 5) The 6) The 7) In the 8) The it
Answer:
Explanation:
Monitor is an electronic device that retrieves, and processes shows you what is going on in the computer.
Desktop is the first image you see on your screen when the computer is is used for telling the computer what to do.
keyboard
is used for typing documents. Printer is used for putting documents on paper. CD Bay you can insert a CD or Compact Disc. is is box inside and shaped
Which is a best practice that can prevent viruses and other malicious code from being downloaded.
A best practice that can prevent viruses from being downloaded is by not clicking on links in graphic email messages
How to prevent virus or malicious codes?Virus and malicious codes can be installed on a computer through several ways, which include:
Not using an antivirus on the computerClicking on untrusted links in graphic email messagesInsecure downloadsThe above can be prevented by
Installing a genuine antivirusNot clicking on trusted linksAccessing sites with secured downloadsRead more about virus at:
https://brainly.com/question/12543839
#SPJ1
what is a program answer these question
of grade-6
Consider the following method: public int mystery(int n) { if(n > 6) { return 1 mystery(n - 1); } return n % 3; } What is the value of mystery(10)
Answer:
Ans1--- The output is 9 Explanation--- mystery(5)=mystery(4)+2 mystery(4)=mystery(3)+2 mystery(3)=mystery(2)+2 mystery(2)=2+1=3
Suppose you need to create the variable fullname by concatenating the values of firstname, which contains first names, and lastname, which contains last names. what's the best way to remove extra blanks between first names and last names
The right way to remove extra blanks between first names and last names is
data temp;
set cert.maillist;length FullName $ 40;
fullname=trim(firstname)||' '||lastname;
run;
What is TempData?This is known to be a term that is used to transfer data from view to controller and it is one that saves the data temporarily.
Note that The right way to remove extra blanks between first names and last names is
data temp;
set cert.maillist;length FullName $ 40;
fullname=trim(firstname)||' '||lastname;
run;
Learn more about data from
https://brainly.com/question/25639778
#SPJ1
To notify the browser that we have JavaScript code, we should use .............
Answer:
almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console
This program has a bug. When the green flag is clicked, nothing happens. How would you fix it?
A. Change the number inside the “Move” block
B. Change the number inside the “repeat” block
C. Make the sound louder with the purple block
D. Connect the event block directly to the “repeat” block
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.
The option that can be used to identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.
What is OSPF about?The OSPF is known to be called an open Shortest Path First protocol.
It belongs to the family of IP Routing protocols as it serves as Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.
See full question below
A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.
Shared data
Low overhead, fast convergence
Stability
Multi-vendor routers
Learn more about OSPF from
https://brainly.com/question/14604232
#SPJ1
Which statement best describes one reason why assembly language is easier
to use than machine language?
Answer:
machine language uses binary code and assembly language uses mnemonic codes to write a program.
Explanation:
In a nutshell, machine language uses binary code, which is almost impossible for humans to decipher, whereas assembly language uses mnemonic codes to write a program. Mnemonic codes make it simpler for humans to understand or remember something, and so make the language a bit easier for humans to use than machine code.
What is the correct syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance
The right syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance is def __init__(self): pass.
What Is syntax ?Syntax is known to be the way or arrangement of any given words and phrases to create a kind of proper sentences.
Note that The correct syntax for defining an __init__() method that sets instance-specific attributes upon creation of a new class instance is def __init__(self): pass.
Learn more about syntax from
https://brainly.com/question/831003
#SPJ2