Answer:
The type of cookie that is set by a site other than the one you connected to is called a third-party cookie.
Explanation:
Third-party cookies are created by domains other than the one that the user is visiting. These cookies are often used for advertising and tracking purposes, allowing advertisers and analytics companies to collect information about the user's browsing habits across multiple websites.
Consider the following declarations:
class bagType
{
public:
void set( string, double, double, double, double);
void print() const;
string getStyle() const;
double getPrice() const;
void get( double, double, double, double);
bagType();
bagType(string, double, double, double, double);
private:
string style;
double l;
double w;
double h;
double price;
};
bagType newBag; // variable declaration
Requried:
a. How many members does class bagType have?
b. How many private members does class bagType have?
c. How many constructors does class bagType have?
d. How many constant functions does class bagType have?
e. Which constructor is used to initialize the object newBag?
Answer:
12, 5, 2, 3
bagType
Explanation:
I just did it
Tawni made some changes to her file and wants to save the changes in a document with a different title. How can she do this?
Answer:
By using the save as tab
Explanation:
The save as option allows a user to make another different copy of the same document, or to save the document in another location within the computer system. The shortcut key to quickly access the save as option, is F12. The save as option can also be accessed by going through the following steps
1) Click the File tab
2) Click on the Save as option
3) Select a location to save the file then click save to confirm selection and save the file.
Answer:save as tab
Explanation:
sharing resources.
b) What do you say for the picture given?
2) Write the advantages of
computer
networks
5
Answer:
Explanation:
2- Multitasking Multitasking – Multitasking Multitasking is one among the main advantage of computer. ...
Speed – Now computer isn't just a calculating device. ...
Cost/ Stores huge – Amount of knowledge it's a coffee cost solution. ...
Accuracy – ...
Data Security – ...
Task completer – ...
Communication – ...
Productivity –
More items...•
Mac or PC (Need more opinions!)
Just pick which one do you like and why. I need it for my research paper, please.
Answer:
PC because pc you can download anything without too much trouble and the Mac cost a lot and you will have a hard time with it.
For Questions, refer to Figure Q5.7
List all of the attributes of a movie.
Based on Figure Q5.7, the attributes of a movie include the title, director, actors/actresses, genre, length/duration, language, country of origin, release date, rating, and synopsis/summary. Based on your request, here's a list of some common attributes of a movie:
1. Title: The name of the movie.
2. Director: The person who directs the making of the movie.
3. Genre: The category or type of movie (e.g., action, comedy, drama, etc.).
4. Release Date: The date when the movie was first released.
5. Duration: The total running time of the movie.
6. Cast: The actors and actresses who play roles in the movie.
7. Rating: The classification given to the movie by the rating board (e.g., G, PG, PG-13, R, etc.).
8. Plot: A brief description of the storyline or events in the movie.
9. Production Company: The company responsible for producing the movie.
10. Country of Origin: The country where the movie was produced.
These are just some of the many attributes that can be associated with a movie.
To learn more about attributes click on the link below:
brainly.com/question/31656040
#SPJ11
Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood.
Computers that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and understood.
What is a protocol?A protocol can be defined as a formatted blocks of data that have been designed and established to obey a set of standard rules (conventions) such as the Transmission Control Protocol and Internet Protocol (TCP/IP).
In Computer networking, all computers and other network devices that communicate over a network must follow certain protocols or rules, in order to ensure that data are transmitted properly and well understood by end users.
Read more on protocol here: https://brainly.com/question/17387945
You are a cleared employee. You discovered fraud and waste of money related to a classified program within your agency. If you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19), Protecting Whistleblowers with Access to Classified Information.A. TrueB. False
Answer:
A. True.
Explanation:
If you are a cleared employee, who discovered fraud and waste of money related to a classified program within your agency. When you report this fraud and waste through appropriate channels, you may receive protection under the Presidential Policy Directive 19 (PPD-19): Protecting Whistleblowers with Access to Classified Information.
In the United States of America, President Barack Obama signed the Presidential Policy Directive 19 (PPD-19) in 2012. The PPD-19 is an executive order designed to provide significant protection for an employee who have access to classified informations such as waste of money and frauds, as well as prohibiting any form of retaliation against this cleared employee.
4.2 Code Practice: Question 2
Instructions
Write a loop that continually asks the user what pets the user has until the user enters rock, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have a dog with a total of 1 pet(s) if they enter dog, and so on.
Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? rock
------------
Sample Output
You have a lemur with a total of 1 pet(s)
You have a parrot with a total of 2 pet(s)
You have a cat with a total of 3 pet(s)
In python 3:
total = 0
while True:
pet = input("What pet do you have? ")
if pet == "rock":
break
total += 1
print("You have a {} with a total of {} pet(s)".format(pet, total))
I hope this helps!
Answer:
pet = input(str("What pet do you have?"))
totalPets = 1
while(pet!="rock"):
print("You have a " + str(pet) + " with a total of " + str(int(totalPets)) + " pet(s)")
totalPets = totalPets+ 1
pet = input(str("What pet do you have?"))
Does technology make us lazy? Explain. (Remember to support your
answer with citations and references)
The impact of technology on human laziness is a topic that has been widely debated and it is true to some extent.
Does technology make us lazy?Some argue it makes us lazy, while others say it can enhance productivity and efficiency.
Argument - technology makes us lazy. Advocates claim tech's conveniences can promote inactivity and a sedentary lifestyle. Tasks once done by hand can now be completed with machines, leading to possible over-reliance on technology and less physical activity, which causes health issues.
Tech improves productivity and efficiency. Tech revolutionized communication, info access, & task automation, enabling more accomplishment in less time.
Learn more about technology from
https://brainly.com/question/7788080
#SPJ1
In the table below, there are a few white collar crimes listed. After reviewing the link
above, define each crime and give an example of each white collar crime listed.
Money Laundering
Investment Fraud
Ponzi Scheme
Pyramid Scheme
Promissory Note
Fraud
Commodities Fraud
Broker Embezzlement
Market Manipulation
Answer:
Money Laundering: The process of hiding the source of illegally-obtained money.
Investment Fraud: A type of fraud that involves convincing a person to invest money in a fake
or worthless investment.
Ponzi Scheme: A type of investment fraud in which a person uses money from new investors
to pay off existing investors.
Pyramid Scheme: A type of investment fraud in which a person uses money from new investors
to pay their own personal expenses.
Promissory Note: A document that promises to pay a certain amount of money to a certain person
by a certain date.
Fraud: A type of white collar crime in which a person lies or uses deception in order to gain
something of value.
Commodities Fraud: A type of fraud that involves illegally manipulating the prices of
commodities.
Broker Embezzlement: A type of fraud in which a broker illegally uses their clients' money
for their own personal gain.
Market Manipulation: A type of fraud in which a person artificially inflates or deflates the
price of a security.
Explanation:
write a function named sum values whose parameter is an object/dictionary with strings as keys and decimal numbers as values. your function must returns the sum of the parameter's values.
The `sumValues` function is a useful utility function for working with objects that contain numeric data. It's also a good example of how to use loops and conditionals in JavaScript to process data in a structured way.
Here's one possible implementation of the function
```function sumValues(obj) {
let sum = 0;
for (let key in obj) {
if (typeof obj[key] === 'number') {
sum += obj[key];
}
}
return sum;
}
```
This function starts by initializing a variable called `sum` to 0. Then it loops through each key in the input object using a `for...in` loop. For each key, it checks if the value associated with that key is a number (using the `typeof` operator). If it is, then it adds that value to the running total in `sum`. Finally, it returns the total sum.
One thing to note is that this implementation assumes that all of the values in the input object are numbers. If there are any non-numeric values, they will be ignored. If you want to handle this case differently (e.g. by throwing an error or returning NaN), you can modify the code accordingly.
For such more question on sumValues
https://brainly.com/question/28996310
#SPJ11
computer cannot do anything without instructions true or false
Answer: True
Explanation:A computer (specifically the CPU, or central processing unit, within the computer system) needs instructions in order to do even the simplest things. Without instructions, it can't do anything. Just to boot your computer requires executing many many instructions.
Hope it helps✌✌
Which computer databases would you search if you had images of a cartridge casing that had been ejected during a shooting?
These databases include the National Integrated Ballistic Information Network (NIBIN), eTrace, and IBIS (Integrated Ballistic Identification System).National Integrated Ballistic Information Network (NIBIN)NIBIN is a computerized system used to acquire, store, and compare digital images of firearm-related evidence, including cartridge cases and bullets.
It is a repository for ballistic evidence that has been recovered from crime scenes and firearms-related incidents.
The database is searchable to provide leads in investigations and allows for the linking of ballistic evidence to other crime scenes and incidents. eTraceeTrace is a web-based system that provides firearm tracking capabilities to law enforcement agencies.
It enables law enforcement officials to trace firearms used in the commission of crimes, thereby facilitating investigations. Integrated Ballistic Identification System (IBIS)The Integrated Ballistic Identification System (IBIS) is a digital network that compares ballistic evidence to generate leads in an investigation.
It is utilized to analyze images of cartridge casings and bullets collected from crime scenes and weapons-related incidents. It enables the sharing of ballistic evidence between law enforcement agencies, allowing for faster identification and tracking of criminals.
To know more about National Integrated Ballistic Information Network visit :-
https://brainly.com/question/31259088
#SPJ11
a folder contains nencrypted files of which one is a special file. an attacker has access to the folder and withdraws kof these files one at a time. each selection is equally likely to be any one of the remaining files at the time. what is the probability that the intruder withdraws the special file?
The probability that the intruder withdraws the special file is 1/k.
What is the probability that the intruder withdraws the special file?The probability that the intruder withdraws the special file is dependent on the number of encrypted files in the folder and the number of files the intruder withdraws. If the folder contains n encrypted files and the intruder withdraws k of them one at a time, then the probability of the intruder withdrawing the special file is (1/n)^k. This means that the probability that the intruder withdraws the special file is increasing as the number of files in the folder decreases and the number of files the intruder withdraws increases.For example, if the folder contains 10 encrypted files and the intruder withdraws 5 of them one at a time, then the probability that the intruder withdraws the special file is (1/10)^5 or 0.0009765625. This means that the chances of the intruder withdrawing the special file are quite low, but not impossible.In general, the probability that the intruder withdraws the special file is inversely proportional to the number of encrypted files in the folder and proportional to the number of files the intruder withdraws. Therefore, the more files the intruder withdraws, the higher the probability that the special file will be withdrawn. Conversely, the more files that are in the folder, the lower the probability that the special file will be withdrawn.To learn more about dividing probability refer to:
https://brainly.com/question/29844780
#SPJ4
What is a path and how do you know that it is filled and selected
Explanation:
A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.
For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.
5. All of the following are part of a cylinder head EXCEPT:
OA. Water pump
OB. Combustion chamber
OC. Valve guides
OD. Valve seats
Answer:
Wouldn't it be B? I mean a combustion chamber is where the fuel and air mixture are injected to be ignited and burned to produce power to a vehicle.
Which option offers predesigned formatting and design elements to facilitate the process of creating a document?
A.
themes
B.
templates
C.
design
D.
layout
Answer:
The answer is B, templates
Explanation:
Answer:
B. templates
Explanation:
limitation of the 8-bit extended ASCII character set is that it can only represent up to 128 explain how can these limitations can be overcome?
Software engineering is not only concerned with issues like system heterogeneity, business and social change, trust, and security, but also with ethical issues affecting the domain. Give some examples of ethical issues that have an impact on this domain
Answer:
follows are the solution to this question:
Explanation:
Confidentiality:
It always agrees with all of this, even though there is no security arrangement, and the theoretically facilitates the free exchange of information between both the client as well as the worker or understands that perhaps the personal life of a client and then all the concerns and problems we have belongs to them.
Competence:
It didn't distort the skill level in such a specific field or topic, it is the talent or capacity, and being able to be doing something well or be sane enough just to face charges in court.
Intellectual property rights:
It will be mindful of regional intellectual property laws in which the individuals over its mind's constructs are given over a certain amount of time, which typically gives the maker the exclusive right to use his / her development.
The examples of the ethical issued that have an impact on the domain is as follows:
Confidentiality: When there is no security arrangement, and the theoretically facilitates the free exchange of information between both the client as well as the worker .Competence: It didn't distort the skill level in such a specific field or topic, it is the talent or capacity. Intellectual property rights: It will be mindful of regional intellectual property laws in which the individuals over its mind's constructs are given over a certain amount of time.Learn more: brainly.com/question/17429689
Will mobile banking catch on? Tell some good things about it. Then, explain the problems with it. Would you use a banking app? Why or why not? Use facts from the lesson in your answer.
Write your answer below.
Write a program to output The sum of the cubes of odd integers between 11 and 49
Answer:
779400
Explanation:
There are 20 odd integers between 11 and 49, they are 11, 13, 15, 17, 19, 21, 23, 25, 27, 29, 31, 33, 35, 37, 39, 41, 43, 45, 47, 49. There are 5 odd numbers before 11, and 25 odd numbers from 1 to 49.
Use the formula to calculate the sum
25^2 * (2 * 25^2 - 1) - 5^2 * (2 * 5^2 - 1)
= 25^2 * (2 * 625 - 1) - 5^2 * (2 * 25 - 1)
= 25^2 * (1250 - 1) - 5^2 * (50 - 1)
= 625 * 1249 - 25 * 49
= 780625 - 1225
= 779400
Verify:
11^3 + 13^3 + 15^3 + 17^3 + 19^3 + 21^3 + 23^3 + 25^3 + 27^3 + 29^3 + 31^3 + 33^3 + 35^3 + 37^3 + 39^3 + 41^3 + 43^3 + 45^3 + 47^3 + 49^3
= 1331 + 2197 + 3375 + 4913 + 6859 + 9261 + 12167 + 15625 + 19683 + 24389 + 29791 + 35937 + 42875 + 50653 + 59319 + 68921 + 79507 + 91125 + 103823 + 117649
= 779400
Here's a Python program that will output the sum of the cubes of odd integers between 11 and 49:
sum_of_cubes = 0
for i in range(11, 50):
if i % 2 == 1:
sum_of_cubes += i ** 3
print("The sum of the cubes of odd integers between 11 and 49 is:", sum_of_cubes)
This program initializes a variable called sum_of_cubes to 0, then uses a for loop to iterate through the range of numbers between 11 and 49. For each number in that range, it checks if the number is odd by using the modulus operator (%) to check if the number is divisible by 2 with a remainder of 1. If the number is odd, it adds the cube of that number to the sum_of_cubes variable.
Finally, the program prints out the total sum of the cubes of the odd integers between 11 and 49.
write a function that takes a string like 'one five two' and returns the corresponding integer (in this case, 152). a function just like this would be used in a speech recognition system (e.g. automated phone taxi bookings) to convert a spoken number into an integer value.
The function convertStringToNumber takes a string input representing a spoken number (e.g., "one five two") and returns the corresponding integer value (in this case, 152).
To implement this function, we can split the input string into individual words, convert each word into its numerical representation, and then concatenate them to form the final number. We can use a dictionary to map the word representations to their numerical values. Here's an example implementation in Python:
def convertStringToNumber(input_string):
word_to_number = {
'one': 1,
'two': 2,
'three': 3,
'four': 4,
'five': 5,
'six': 6,
'seven': 7,
'eight': 8,
'nine': 9,
'zero': 0
}
words = input_string.split()
number = ''
for word in words:
if word in word_to_number:
number += str(word_to_number[word])
return int(number)
By iterating over each word in the input string, we check if it exists in the word_to_number dictionary. If it does, we append the corresponding numerical value to the number string. Finally, we convert the number string to an integer and return it as the result.
To learn more about string
https://brainly.com/question/30392694
#SPJ11
question 4 fill in the blank: in ggplot2, the term mapping refers to the connection between variables and .
In ggplot2, the term mapping refers to the connection between variables and a plotting object like point, line, or other shape.
What is ggplot?
A geom in the gg plot2 system has "a plotting object like point, line, or other shape."A Geom is used in formulating different layouts, shapes, or forms of a ggplot2 such as bar charts, scatterplots, and line diagrams.
For example some different types of Geom can be represented as geom_bar(), geom_point(), geom_line() etc in ggplot2, the term mapping refers to the connection between variables and a Geom is used in formulating different layouts, shapes, or forms of a ggplot2 such as bar charts, scatterplots, and line diagrams.
Therefore, In ggplot2, the term mapping refers to the connection between variables and a plotting object like point, line, or other shape.
Learn more about variables on:
https://brainly.com/question/17344045
#SPJ1
You wrote a program to find the factorial of a number using recursion. 4! =
Answer:
24
Explanation:
Anything "factorial" is the result of multiplying the number by itself and all numbers below it, so:
4! = 4 × 3 × 2 × 1 = 24
There's no other info for this question so I assume you just wanted the answer, but as an example of a program here's a function that would work it out for you by using recursion in javascript, to use this you would call factorial(4) like at the bottom:
function factorial(num) {
if (num < 0)
return -1;
else if (num == 0)
return 1;
else {
return (num * factorial(num - 1));
}
}
factorial(4);
please help me out with answering the questions
10.
if "h" in letter:
#do something
11.
if value >= 13.6:
#do something
12.
if 5 < y < 11:
#do something
13.
if num1 == num2:
print("equal")
14.
num1 = int(input("Enter a number: "))
num2 = int(input("Enter a number: "))
if num1 > num2:
print(num1)
else:
print(num2)
15.
if number == 89 or number == 78:
print("Your number is equal to 89 or 78")
I hope this helps! If you have any other questions, I'll do my best to answer them.
What recreational activity was invented in fayetteville?.
Fayetteville is known for inventing disc golf.
What recreational activity originated in Fayetteville?Disc golf, a popular recreational activity, was invented in Fayetteville. Players throw a disc into a basket, aiming to complete each hole in the fewest number of throws. Similar to traditional golf, disc golf offers a challenging and enjoyable outdoor experience.
Courses are often set in parks or wooded areas, providing a scenic backdrop for players to navigate through trees and varying terrain. The game can be played casually with friends or competitively in organized tournaments. Disc golf has gained a significant following worldwide, attracting players of all ages and skill levels.
Learn more about Disc golf
brainly.com/question/29167866
#SPJ11
A) explain how traceroute works. assume in this traceroute the host is at least 9 hops away.
b) explain the meaning of flow control in routing?
Pointers contain memory addresses for other variables, but there are no means to access or change the contents of those variables True O False We use the & symbol to create a pointer. int& myPointer; O True O False Assuming a 32 Bit Architecture .. A pointer is how many bytes? 4. A double is how many bytes? 8
False. Pointers contain memory addresses for other variables and provide a means to access and change the contents of those variables. int& myPointer; is not how we create a pointer. A pointer is typically 4 bytes in a 32-bit architecture, while a double is 8 bytes.
Pointers are variables that store memory addresses. They allow us to indirectly access and manipulate the contents of other variables by pointing to their memory locations. In C and C++, we can use pointers to access and modify the values stored in variables.
The statement "Pointers contain memory addresses for other variables, but there are no means to access or change the contents of those variables" is incorrect. Pointers provide a means to access and change the contents of variables by dereferencing them. By using the dereference operator (*) on a pointer, we can access or modify the value stored at the memory address it points to.
For example, if we have a pointer `int* myPointer` pointing to an integer variable `num`, we can access the value of `num` by dereferencing the pointer like this: `int value = *myPointer;`. We can also change the value of `num` by assigning a new value to the dereferenced pointer: `*myPointer = 42;`.
The statement "int& myPointer; is how we create a pointer" is also incorrect. The syntax `int& myPointer;` declares a reference to an integer variable, not a pointer. References are different from pointers in that they must be initialized to refer to an existing variable and cannot be reassigned to refer to a different variable.
In a 32-bit architecture, a pointer typically occupies 4 bytes of memory. This means that the memory address it can hold ranges from 0 to \(2^(32-1)\). On the other hand, a double data type usually occupies 8 bytes of memory, allowing it to store larger and more precise floating-point values compared to a float or an integer.
Learn more about Pointers
brainly.com/question/30460618
#SPJ11
what is the main purpose of a web crawling program
A.two index web pages for quick retrieval full of content B.turn create meta tags for web contact C. to search illicit or illegal web activity D.to convert keywords to HTML
Please ANSWERRRRR
Answer:
the answer is A because Web crawlers enable you to boost your SEO ranking visibility as well as conversions.
Explanation:
the diagram that is most effective in describing the internal steps of a use case is
The diagram that is most effective in describing the internal steps of a use case is the Sequence Diagram.
A Sequence Diagram is a behavioral diagram in Unified Modeling Language (UML) that illustrates the interaction between objects or actors within a system over time. It depicts the chronological sequence of events and messages exchanged between different components, such as objects, actors, or system modules, during the execution of a use case.
In the context of a use case, a Sequence Diagram helps visualize the order of interactions and the flow of control between different entities involved in achieving the use case's objectives. It shows how objects or actors collaborate and exchange information to accomplish specific tasks or scenarios.
The Sequence Diagram typically represents the behavior of the system in response to various events and user interactions. It captures the dynamic aspect of a use case by illustrating the specific sequence of actions, method invocations, and responses between different entities.
Learn more about Sequence Diagram visit:
https://brainly.com/question/29812843
#SPJ11