what is C++ language ??

Answers

Answer 1

Answer:

C++ is an object-oriented programming language which gives a clear structure to programs and allows code to be reused, lowering development costs

Explanation:

there u go mate

Answer 2

Answer:

Hi brother I want to do friendship with you.


Related Questions

remove the last element, then add a 2 to the end of the array.

Answers

Removing the last element and adding 2 to the end of an array can be done using various programming languages. However, regardless of the programming language, the basic procedure to remove the last element of an array is to identify the last element using its index and then delete it.

Here is how you can remove the last element and add 2 to the end of the array in Python using some example code: ``` python #creating an array arr = [1, 2, 3, 4, 5] #removing the last element del arr[-1] #adding 2 to the end of the array arr.append(2) #printing the updated array print(arr) ```The output of the above code will be: `[1, 2, 3, 4, 2]`This code first creates an array `arr` and initializes it with values 1, 2, 3, 4, and 5.

Then, the last element of the array is removed using the `del` statement and the `arr[-1]` expression. Finally, the number 2 is added to the end of the array using the `append()` method.

To know more about Removing visit:

https://brainly.com/question/27125411

#SPJ11

how do you play pokemon go

Answers

Download the app and make an account hope this helps!

Answer:

download the app then tap your screen for the rest of your life

(And I'm being serious)

An end-user has reported that a legitimate sender sent an unexpected email stating the user needed to urgently update the password account information to a vendor website. Once the user clicked on the URL in the email, the user was taken to a landing page to update the user's credentials. The user entered the credentials, despite noticing the URL was slightly misspelled. What happened in this situation

Answers

Group of answer choices.

A) The attacker has sniffed the user's packets on the user's local network and has captured the user's credentials in plain text.

B) The user is a victim of a pharming attack by using social engineering to trick the user into clicking a link that redirected their traffic to a spoof website.

C) The user is the victim of an impersonation attack, where the attacker used intimidation by coaxing the target and engaging with them by putting them at ease.

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Answer:

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

This ultimately implies that, the user in this scenario is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website to make it look like a credible, authentic and original one.

Answer:

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

what is a system’s attack surface? why should it be minimized when possible?

Answers

A system's attack surface refers to the total number of entry points, including hardware, software, and network connections, that can be exploited by attackers to compromise the system's security.

The larger the attack surface, the more opportunities there are for attackers to find vulnerabilities and exploit them. Attackers can exploit these vulnerabilities to gain unauthorized access, steal sensitive data, or launch attacks on other systems. Therefore, it is crucial to minimize a system's attack surface by reducing the number of entry points and ensuring that each entry point is adequately secured. This helps to reduce the risk of successful attacks and improve overall system security.

To learn more about compromise  click on the link below:

brainly.com/question/29818306

#SPJ11

Describe two issues that you, as a developer, might encounter
when having to balance the different needs of the various
stakeholders that might be involved in your development project.
Provide a ratio

Answers

As a developer, you may encounter various issues when you have to balance the different needs of the various stakeholders that may be involved in your development project. Some of these issues are as follows:

1. Misalignment of Goals: It is very common for different stakeholders to have different goals and objectives in a project. A developer must balance these varying needs and objectives so that everyone involved can work together in harmony.

2. Limited Resources: Often, developers have to face the challenge of limited resources while working on a project. A project requires multiple resources like time, money, human resources, technology, etc.

But, every stakeholder might not be able to provide all the required resources to the project, thus creating an imbalance. Developers need to balance the different needs of stakeholders and provide the resources in an appropriate ratio, so that the project is executed in an optimal manner. The ratio of resources should be proportionate to the contribution of each stakeholder.

This will help to achieve the balance in the project.Explain in detail, two issues that you, as a developer, might encounter when having to balance the different needs of the various stakeholders that might be involved in your development project. The answer should include the ratio of resources that you have to provide to the stakeholders.

To know about stakeholder visit:

https://brainly.com/question/30241824

#SPJ11

a ________ uses electronic memory and has no motors or moving parts.

Answers

Answer:

a to uses electronic memory and has no motors or moving parts.

Explanation:

brainliest me and follow ty

difference between communication service and communication media​

Answers

Explanation:

Communication Devices :

A communication device is a hardware component that enables a computer to send (transmit) and receive data, instructions, and information to and from one or more computers or mobile devices. A widely used communication device is a modem.

2. communication Media :

Communication media means of sending or receiving information or data. And in telecommunication, Communication media refers to the channel or tool or device through which data will be transmitted. Different communication media’s used for sending the data or information from one computer or terminal to another inside some kind of network.
Communication Device

Communication service means the act of communicating using any system or the act of transmission and receipt of information between two or more points. Each point must be capable of both transmitting and receiving information if communication is to occur.


Media:

Communication media refer to the ways, means or channels of transmitting message from sender to the receiver. Communication media indicate the use of verbal or non-verbal language in the process of communication.

In your own words explain the following about the Domain Name System
What problem does the DNS solve?
How does the DNS help the world wide web scale so that billions of users can access billions of web pages?

Answers

Answer:

Suppose you want to access brainly.com.  You type that into your favorite browser and hit enter.  Your computer does not know how to get to brainly.com.  This is the DNS comes in.  The DNS looks for brainly.com and maps it to an IP address (eg. 104.17.74.91).  Your computer can easily find 104.17.74.91 in order to connect you to questions and answers on a variety of topics.

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___

Answers

Answer:

Ram or random access memory

Explanation:

Given a sorted list of integers, output the middle integer. assume the number of integers is always odd.
ex: if the input is:
2 3 4 8 11 -1
(a negative indicates the end), the output is:
4
the maximum number of inputs for any test case should not exceed 9. if exceeded, output "too many inputs".
hint: first read the data into a vector. then, based on the number of items, find the middle item.
#include
#include // must include vector library to use vectors
using namespace std;
int main() {
/* type your code here. */
return 0;
}

Answers

integer userInput

integer i

integer mid

integer array(20) number

userInput = 1

for i = 0; userInput >= 0; i = i + 1

  if number[i] > -1

     userInput = Get next input

     number[i] = userInput

i = i - 1

mid = i / 2

if i > 9

  Put "Too many inputs" to output

elseif i % 2 == 0

  Put number[mid - 1] to output

else

  Put number[mid] to output

A field in the logical design of a database corresponds to a ____ in the physical database.

Answers

In the logical design of a database, a field corresponds to a column in the physical database.

When designing a database, the logical design focuses on the structure and organization of the data, while the physical design deals with how the data is actually stored on a physical storage device.

In the logical design, a field represents a specific piece of information or attribute about an entity. For example, in a database for a customer management system, a field could be "customer name" or "customer email."

In the physical database, these fields are represented as columns in the actual storage. Each column in the physical database corresponds to a specific field in the logical design.

For instance, if we have a table in the logical design called "customers" with fields such as "customer name," "customer email," and "customer address," these fields will be represented as columns in the physical database. The physical columns would have corresponding names, data types, and other attributes to match the logical fields.

So, in summary, a field in the logical design of a database corresponds to a column in the physical database.

To know more about database visit:

https://brainly.com/question/6447559

#SPJ11

Which interface communicates over a parallel connection?

Answers

The interface that communicates over a parallel connection is parallel data transmission.

What is Parallel communication interface?

Parallel communication is a technique for transmitting several binary digits (bits) at once in data transmission.

This distinction is one method to describe a communications link in contrast to serial communication, which only transmits one bit at a time.

Therefore, note that there are numerous data bits are delivered over multiple channels at once when data is sent utilizing parallel data transmission. As a result, data can be transmitted significantly more quickly than with serial transmission techniques.

Learn more about parallel connection from

https://brainly.com/question/7888809
#SPJ1

A large storage location that can hold vast quantities of data (mostly unstructured) in its native/raw format for future/potential analytics consumption is referred to as a(n):data cloudrelational databasedata lakedata lake

Answers

A large storage location that can hold vast quantities of data (mostly unstructured) in its native/raw format for future/potential analytics consumption is referred to as a data lake.

Data is a collection of facts, figures, and other information that is gathered through observation, measurement, or research. Data can be structured or unstructured and can come in many forms, including text, images, audio, and video. In computing, data is typically represented in binary format, consisting of ones and zeros, and is stored in various types of storage media, such as hard drives, solid-state drives, and cloud-based storage systems. Data is the foundation for many applications and technologies, including artificial intelligence, machine learning, data analytics, and big data. However, the use of data also raises important ethical and privacy concerns, as it can be used to track and monitor individuals and groups, often without their knowledge or consent.

Learn more about Data here:

https://brainly.com/question/11941925

#SPJ11

How do you make the text bold?
Select one:
a. font-weight:bold;
b. font:bold;
c. style:bold;

Answers

Answer:

The correct answer is A. font-weight:bold;

What differentiates these DeFi dapps from their traditional banks? Select one: a. Global b. Permissionless c. Flexible user experience d. All of the Above

Answers

The answer is d. All of the Above. DeFi dapps (Decentralized Finance decentralized applications) differentiate themselves from traditional banks in various ways, including being global, permissionless, and offering a flexible user experience.

DeFi dapps are global in nature, meaning they are accessible to users from anywhere in the world. Unlike traditional banks that may have geographical limitations, DeFi dapps leverage blockchain technology to provide financial services on a global scale.
They are also permissionless, which means anyone can participate in DeFi without the need for intermediaries or gatekeepers. Traditional banks typically require customers to go through a lengthy onboarding process and meet certain eligibility criteria, whereas DeFi dapps allow anyone with an internet connection to access their services.
Furthermore, DeFi dapps offer a flexible user experience. They provide users with greater control over their finances, allowing them to manage their assets, make transactions, and participate in various financial activities directly through the dapp interface. This flexibility empowers users and enables them to customize their financial interactions according to their preferences and needs.
In summary, DeFi dapps differentiate themselves from traditional banks by being global, permissionless, and providing a flexible user experience, offering individuals serach access and control over their financial activities.

learn more about Decentralized Finance decentralized applications here

https://brainly.com/question/33552961

 #SPJ11

since 1989, central savings bank has tried to use new technologies to expand the services it offers to its customers. for example, depositors can obtain updated financial information about their accounts and handle certain types of transactions whenever they wish simply by visiting the bank's website and providing a user name and password. the type of technology central savings bank uses to provide these services is known as

Answers

It is to be noted that the type of technology central savings bank uses to provide these services is known as "Information technology" (Option C)

What is information technology?

The use of computers to generate, process, store, retrieve, and share various types of data and information is known as information technology. IT is a component of information and communication technology.

In its most basic form, the word IT (Information Technology) refers to any work that involves the use of a computer. IT refers to the use of technology in a company to crunch data and solve business problems, as well as to expedite and manage procedures.

Learn more about Information Technology:

https://brainly.com/question/14426682

#SPJ1

Full question:

Since 1989, Central Savings Bank has tried to use new technologies to expand the services it offers to its customers. For example, depositors can obtain updated financial information about their accounts and handle certain types of transactions whenever they wish simply by visiting the bank's website and providing a username and password. The type of technology Central Savings Bank uses to provide these services is known as

Multiple Choice

data processing.

systems processing.

information technology.

knowledge processing.

HURRRRY IM ON A TIME CRUNCH!!!!
Which of the following tasks are specifically related to the art director’s position? (Select all that apply.)


creating and animating characters

handling the creatives

designing a logo

editing copy and making decisions about illustrations

Answers

Answer:

-Editing copy and making decsisions about illustrations

-Handling the creatives

What are the main types of copper media used in networking?

Answers

The main types of copper media used in networking are unshielded twisted-pair (UTP) cabling, shielded twisted-pair (STP) cabling, and coaxial cabling.


Unshielded twisted-pair (UTP) cabling is the most commonly used type of copper media in networking. It is made up of two or more pairs of twisted wires that are not shielded from each other. This type of cabling is used in Ethernet networks, telephone systems, and other types of data networks.

Shielded twisted-pair (STP) cabling is similar to UTP cabling, but it includes a layer of shielding material around the twisted wires. This shielding helps to reduce interference from other electrical devices and can improve the performance of the network.

Coaxial cabling is another type of copper media used in networking. It is made up of a central conductor surrounded by an insulating layer, a metallic shield, and an outer insulating layer. Coaxial cabling is used in cable television systems, broadband internet connections, and other types of data networks.

Learn more about copper cable here:

https://brainly.com/question/30034490

#SPJ11

what does mark katz mean when he says that mp3 files are ""nonrivalrous""?

Answers

Mark Katz is referring to the fact that MP3 files can be copied and shared without reducing the quality or usability of the original file.

When Mark Katz uses the term "nonrivalrous," he is discussing the economic concept of rivalry. A rival good is one that can only be used by one person at a time, and its use by one person precludes its use by another. In contrast, a nonrivalrous good can be used by multiple people simultaneously without diminishing the quality or usefulness of the good. MP3 files are nonrivalrous because they can be copied and shared without reducing the quality of the original file, making them easily distributable and accessible.

You can learn more about MP3 files at

https://brainly.com/question/29194231

#SPJ11

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

you need to create a report to display the names of customers with a credit limit greater than the average credit limit of all customers. which select statement should you use? a. select last name, first name from customer where credit limit > avg(credit limit); b. select last name, first name, avg(credit limit) from customer group by avg(credit limit); c. select last name, first name, avg(credit limit) from customer group by avg(credit limit) having credit limit > avg(credit limit); d. select last name, first name from customer where credit limit > (select avg(credit limit) from customer); e. select last name, first name from customer where credit limit

Answers

The correct select statement to display the names of customers with a credit limit greater than the average credit limit of all customers is option (d): "select last name, first name from a customer where credit limit > (select avg(credit limit) from customer);".

This statement uses a subquery to calculate the average credit limit of all customers and then compares each customer's credit limit with the average using the "where" clause. Option (a) is incorrect because it does not calculate the average credit limit of all customers, but rather the average credit limit of only the customers who meet the condition. Option (b) is incorrect because it includes the average credit limit in the output, which is not necessary for the report. Option (c) is incorrect because the "having" clause is used to filter groups based on a condition, not individual rows. Option (e) is incorrect because it does not compare the credit limit with the average credit limit.

Find out more about subquery

brainly.com/question/29575628

#SPJ4

An operating system can ensure that applications continue to run when hardware upgrades and updates occur. Group of answer choices True False

Answers

It is true that an operating system can ensure that applications continue to run when hardware upgrades and updates occur.

How do operating systems manage software and hardware?

The relationship between software and hardware is controlled by the operating system. The operating system installs a device driver for each piece of hardware in order to access and communicate with it. The hardware manufacturer creates a little program known as a device driver, which is included with the hardware component.

How are hardware resources managed by an operating system?

Keyboards, displays, printers, scanners, and cameras are just a few examples of peripheral input and output devices that the operating system controls. It regulates the transmission and reception of data. An application known as a device driver is used by the operating system to accomplish this. Device control manuals are found in device drivers.

To know more about operating system visit

brainly.com/question/24760752

#SPJ4

Write a letter to your friend explaining about the geographical confitions of Nepal's hilly region​

Answers

I don’t know your friend so you should be able to answer

Answer:

I don't know............

using the heredity i simulator program, you have mated flugals of two different eye colors.

Answers

In the Heredity I simulator program, the offspring of two different eye colors can be determined through Punnett square analysis. Offspring of two different eye colors can be determined using the Heredity I simulator program.

The program utilizes Punnett square analysis to predict the probability of eye color inheritance based on the parents’ genotypes. The genotypes of the parent flugals are represented by letters and the probability of each possible offspring is calculated. The results are then displayed in a chart showing the expected genotypic and phenotypic ratios. The Punnett square analysis shows that the offspring will have a 50% chance of inheriting each parent’s eye color. This is because eye color is controlled by multiple genes, making it a complex trait. The Heredity I simulator program is a useful tool for understanding the principles of genetics and how traits are passed from one generation to the next.

Know more about Heredity I simulator program, here:

https://brainly.com/question/29314515

#SPJ11

In addition to the format commands that are found in the ribbon, which option is available for more extensive formatting?

A: Fix Cells dialog box
B: Format Cells dialog box
C: Format dialog box
D: Quick Access tool bar

Answers

i think it would prolly be d

Answer:

A

Explanation:

1. Which of the following is an example of administrative data?
Group of answer choices
a. Blood pressure
b. Patient identification number
c. Respiration rate
d. Discharge plan

Answers

The correct answer is b

why are the download speeds on my computer slower than usual

Answers

Try restarting it and leave it turn off for 10 min then turn it back on

PLEASE ANSWER FAST IM TIMED
A WYSIWYG editor will save time and make the process of Web site design an artistic practice rather than a ------- practice.

Answers

This open source software helps you either create a website through code, or design it with the help of templates and facile customizations.

What is the difference between HTML and WYSIWYG?

A WYSIWYG editor shows you a rendered web page as you edit the page. You do not see the actual HTML. When using manual coding, you see the HTML, but you must load the document in a web browser to view the rendered page.

Is WYSIWYG easy to use?

An efficient free WYSIWYG Editor comes with an easy-to-use toolbar, keyboard shortcuts, and other features that allow you to easily add or edit content, images, videos, tables, or links. A WYSIWYG editor saves time and makes web content creation quick and easy.

To know more about  WYSIWYG visit:

https://brainly.com/question/12340404

#SPJ1

Answer:

Programming

Explanation:

WYSIWYG (sometimes pronounced "wizzy wig") is an acronym that stands for "What You See Is What You Get." It is a phrase that was coined when most word processing, desktop publishing, and typesetting programs were text and code based. HTML, at its code level, is much like the early interfaces on this sort of software. A WYSIWYG editor saves time and makes the process of website design an artistic practice rather than a programming practice.

What uses standard telephone lines to provide high speed connections?

Answers

Digital Subscriber Line (DSL). DSL uses standard telephone lines to provide high speed connections.

DSL separates the telephone signal from the data signal, allowing for simultaneous use of both services over one line. DSL technology can provide faster internet speeds than traditional dial-up connections, making it a popular choice for home and business internet services.

DSL is a technology that allows internet service providers to deliver high-speed internet connections over the existing copper telephone lines. It achieves this by utilizing a higher frequency range than that used for voice calls, allowing for simultaneous internet access and telephone use without interference.

To know more about DSL visit:-

https://brainly.com/question/31446992

#SPJ11

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which is initially in the top left square facing downwards.
Create a solution that would enable the robot to be in the position found below. Make sure to use CAN_MOVE () to receive credit.

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which

Answers

Using knowledge in computational language in python it is possible to write a code that Create a solution that would enable the robot to be in the position found below.

Writting the code:

import random

lis=[]

for i in range(0,10):

 num=random.randint(1,12)

 lis.append(num)

tot=sum(lis)

avg=tot/10

print(avg)

See more about python at brainly.com/question/18502436

#SPJ1

The following situation uses a robot in a grid of squares. The robot is represented by a triangle which
Other Questions
Suggest a mix of fiscal and monetary policy in a closed economy to achieve each of the following objectives: (a) Increase output Y while keeping interest rate r constant. (Sketch a fully labelled g using f(x)=2x^2 and g(x)=3x+4. whats (g of f)(5)? whats (f of g)(5)? Write the following statementas a conditional statement.Stars have ten vertices.If a figure is a star. then it has ten verticesIf figure has ten vertices. then it is a star.A figure is a star. If and only if it has ten verticesStar are figures with en vence: Plz help me i need it BRAINLIEST AND GOOD RATING IMMEDIATLYMarcus and Lily are running at the school track. The graphs below represent the distance in miles each person has run as function of time in minutes. Select all the statements that are true based on the graphs shown. According to "Blind, Yet Seeing," what kind of person is least likely to believe in blindsight?A. sighted peopleB. the most educated peopleC. people who become blind later in lifeD. people who have been blind since birth What motivated the charatcers in things fall apart the international criminal court: (select all that apply, there are one to four possible correct answers) decorative technique seen on many garments of the bagobo where it uses multi colored beads accompanied by bells sequins and pompons 11. The back part of the cerebrum deals with hearingTrueFalse If you are performing a left-tailed z-statistic test with a sample size n = 85 and a 0.01 significance level, what is the critical value?If your calculated value of the z-statistic is z = 1.95, what is your conclusion about the null hypothesis (reject the null hypothesis or fail to reject the null hypothesis)? PLEASE HELP.what is the theme from chapter 1-10 in funny in farsi. A plot of the residuals of a regression analysis should show some kind of pattern no pattern mostly small errors Mostly big errors Early-maturing girls tend to _____ than late-maturing girls. a. be less depressed b. be more popular c. have healthier body d. images have lower self-esteem __ is necessary for the existence of a healthy relationship Past tenses Grammar Reference 14. Identify the tenses in boid, then match them to the use. 1 She left university six years ago. 2 He was waiting for the bus when the accident happened. 3 He had just finished his report when his boss asked to see him. 4 She had been working as a cierk for two years before she got promoted. a.happened before another past action with emphasis on continuation b.happened at a specific time in the past c.happened before another past action d. was in progress at a certain time in the past The edge of a flying disc with a radius of 0.13 m spins with a tangential speed of 3.3 m/s. The centripetal acceleration of the edge of the disc is ?m/s2. Hulio and Helena work for Corporate Enterprise. Both see what they believe to be unethical treatment of a certain group of employees. The employees do not complain and do not say anything about this treatment. Hulio and Helena are not sure whether to report the potential violation. This is an example of an ethical________ find the function v(t) that satisfies the following differential equation and initial condition 10^2 dv(t)/dt + v (t) =0, v(0) = 100 V Write silent e" words that end with the -ing suffix. X^2(x+5) Help me PLS