Below is the solution of the given question which contains the definition with the vocabulary word that best fits the definition.
Vocabulary with their matching definition:
1. A module or collection of statements that perform a specific task within a program:
Function
2. The statements that describe exactly how a function operates:
Function definition
3. A statement that executes a function:
Function call
4. Special variables that hold copies of function arguments:
Parameters
5. A piece of data that is passed back to the calling function:
Return value
6. Functions that don't return a value have this return type:
void
7. This "part" of the function is generally placed before main. It resembles the header of the function definition and describes the function's signature for the compiler:
Function prototype
8. The default parameter passing mechanism in C++. Changes made to the parameter value inside the function are not reflected in main because a copy of the parameter is passed into the function in the call:
Pass by Value
9. Use this parameter passing mechanism when you want to alter the value of the parameter in the function and have that new value reflected in main:
Pass by Reference
10. The symbol in C++ that is used to denote a reference parameter:
dot operator (.)
11. The area of a program in which a variable is known and can be used:
Scope
12. A variable that is defined and used inside a function definition:
Local Variable
13. A constant that is defined outside all functions, including main, and can be used throughout a program:
Global constant
14. A simple program used to test functions. It simply calls the functions to make sure that they work:
driver
15. Values that are sent into a function:
Arguments
16. The statement that causes a function to end immediately:
Return
17. A dummy function that is called instead of the function it represents so that you can focus on testing the parts of the program that call the function:
Stub
18. A local variable that retains it's value even after the function where it is defined has returned:
static variable
19. A file that is used to communicate information about a function or set of functions and the main program:
Header file
20. The one function that every program must have:
Main
To know more about Function, visit: https://brainly.com/question/20476366
#SPJ4
The administrative assistant of the company's CEO is asking about a printer for her use only. It seems the shared department printer is overused, making the assistant wait to print the CEO's last minute documents.
What will best meet the administrative assistant's request?(select 2)
A. remote printer
B. Bluetooth printer
C. Local printer
D. wireless printer
E. network printer
F. cloud printing
The best options for the administrative assistant in the given scenario are a local printer and a wireless printer. Both printers can solve the problem for the administrative assistant to get the printouts of the CEO's last-minute documents whenever she requires them.
A printer that can be used exclusively by the administrative assistant of the CEO is what the question is asking for. The assistant wants to print the last-minute documents, but the shared printer has become overused, causing the assistant to wait, which is causing problems. A printer that can help the administrative assistant to print last-minute documents immediately is required.
Here are the two best printers that meet the administrative assistant's request.
A printer that is directly connected to the computer or laptop is referred to as a local printer. The administrative assistant's computer or laptop must be linked directly to the printer, which will eliminate the need for the administrative assistant to go to the department printer every time. A local printer is ideal for administrative assistants since it is compact and occupies less space. The administrative assistant can obtain the printouts in a timely manner by using a local printer.
Wireless printers can be connected to computers or laptops without requiring a physical connection. Wireless printers, unlike local printers, can be connected to multiple devices, and the administrative assistant can print her documents without having to physically connect to the printer.
The wireless printer must be installed in the same room as the administrative assistant, and it must be linked to the wireless network so that the administrative assistant can access it. Because the assistant has to wait in line for printing, a wireless printer would be an excellent choice because it provides quick results.
Both local and wireless printers can help the administrative assistant in printing the documents immediately, thereby eliminating the need to wait for a long time. They are ideal for printing last-minute documents and require only a little bit of space. Thus, the correct answer is (C) Local printer and (D) wireless printer.
You can learn more about printers at: brainly.com/question/5039703
#SPJ11
A security engineer writes a report on recent threat activities. A threat included on the report is under investigation for being intentional or unintentional. The report includes which threat type?
A security engineer writes a report on recent threat activities. A threat included in the report is under investigation for being intentional or unintentional.
The report includes the "unintentional threat type. "As a security engineer, one is expected to write a report on recent threat activities. Such a report should include information on threats under investigation and their type, whether intentional or unintentional. A threat could be intentional or unintentional.
Intentional threats involve activities that are deliberately carried out to cause harm or damage to a network, system, or device. On the other hand, unintentional threats are caused by an accident or error and are usually not done with any harmful intent.
To know more about security visit:-
https://brainly.com/question/31309477
#SPJ11
1.a computer can create an output based on the input of the user.
process store retrieve communicate personal computer desktop computer laptop computer netbook tablet smartphone server game consoles
Answer:
But users are very much aware of the input and output associated with the computer. They submit input data to the computer to get processed information, the output. Sometimes the output is an instant reaction to the input. ... The output is the computer's instant response, which causes the forklift to operate as requested.
NEED HELP ON TEST!!!
Select the correct answer from each drop-down menu.
How can you refer to additional information while giving a presentation?
__1__will help you emphasize key points on a specific slide. The Notes section is only __2__ to you in the slide view and not in the main Slide Show view.
1. speaker notes,
slides,
handouts
2.invisible,
visible,
accessible
Answer:
\(1. \: speaker \: notes \\
2. \: accessible\)
How can you refer to additional information while giving a presentation?
(Answer below )
(Speaker notes) will help you emphasize key points on a specific slide. The Notes section is only (accessible) to you in the Slide view and not in the main Slide Show view.
Learn more about speaker notes here
https://brainly.com/
#JP42
import pickle
def enter():
f1=open("c:\\xics\\data.dat","wb")
n=int(input("Enter ni of students."))
for i in range(n):
rno=int(input("Enter roll no."))
name=input("Enter name")
marks=int(input("enter marks"))
d={"rno":rno,"name":name,"marks":marks}
pickle.dump(d,f1)
f1.close()
Answer:
Export ariana grande fort nite skin
Answer:
I M P O R T P I C K L E
Explanation:
Active directory is a useful case scenario for nano server. group of answer choices true false
Active directory is a useful case scenario for nano server. group of answer choices true false
Active directory is a useful case scenario for nano server is a false statement.
An active directory domain controller cannot be a typical use case scenario for Nano Server. Nano Server cannot function as a domain controller for your Active Directory and as a proxy server compared to Server Core or Server with Desktop Experience.
Learn more about active directory domain controller here:
https://brainly.com/question/28235161
#SPJ4
Safiya is a software engineer at a company that's developing software for self-driving cars. She's working on software that uses computer vision and machine learning algorithms to detect pedestrians walking near the car and trigger the brakes when needed. After training the algorithm on a large dataset of training data (videos of pedestrians walking near cars), they try it out in cars with backup drivers. The drivers report that it detected most pedestrians, but failed to detect people using wheelchairs and parents pushing strollers. The drivers had to manually respond in those cases. What's the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians? Choose 1 answer: 1. She can add videos of people using wheelchairs and strollers into the training data set (perhaps crowd-sourcing them if there are none already available). 2. She can double the size of the training data set by partnering with another company in the self-driving car industry. 3. She can program rules into the network about the shapes and movement patterns of wheelchairs and strollers. 4. She can reduce the size of the training data set, removing videos of single pedestrians walking on foot such that the resulting dataset has a higher fraction of pedestrians using wheelchairs and strollers.
The best way for Safiya to improve the machine learning algorithm's ability to detect all pedestrians is to add videos of people using wheelchairs and strollers into the training dataset.
By adding videos of people using wheelchairs and strollers into the training dataset, Safiya can improve the machine learning algorithm's ability to detect all pedestrians, including those in wheelchairs and parents pushing strollers. This will increase the algorithm's ability to identify and respond appropriately to a wider range of pedestrian scenarios. Partnering with another company in the self-driving car industry to double the size of the training dataset may also be useful, but it may not necessarily address the issue of the algorithm's inability to detect all pedestrians. Programming rules into the network about the shapes and movement patterns of wheelchairs and strollers may also help, but it can be difficult to identify all possible shapes and movements that wheelchairs and strollers can take, which may limit the effectiveness of this approach.
Learn more about algorithm here;
https://brainly.com/question/28724722
#SPJ11
You have been asked to build a computer from scratch. Before you begin, you need to know for what the computer will primarily be used. The computer’s use will have a significant impact on your choice of which two primary components of the motherboard and why?
Answer: because the mother board is the main component
Explanation:
Fix the two words that are used incorrectly.
As
apart
of
her
latest
woodworking
project
Isabella
is
carving
a
dragon
to
go
on
top
of
a
weather
vein
speaker system consists of a pair of standard stereo speakers—called _______________—combined with a subwoofe
a. satellites
b. vibrations
c. bit rate
d. wrapper
The speaker system consists of a pair of standard stereo speakers—called satellites—combined with a subwoofer.
The speaker system described consists of three components: a pair of standard stereo speakers (satellites) and a subwoofer. This configuration is commonly known as a 2.1 speaker system.
The stereo speakers, or satellites, are responsible for producing mid-range and high-frequency sounds. They are usually smaller in size and can be placed on a desk, shelf, or mounted on stands. These speakers provide stereo separation, allowing for a wider soundstage and better imaging.
On the other hand, the subwoofer is a specialized speaker designed to handle low-frequency sounds, typically below 100 Hz. It focuses on reproducing deep bass tones and provides a more immersive audio experience.
To know more about speakers visit: https://brainly.com/question/30092163
#SPJ11
The IT manager has asked you to create four new VLANs for a new department. As you are going through the VLAN configurations, you find some VLANs numbered 1002-1005. However, they are not in use.What should you do with these VLANs?
When going through the VLAN configurations numbered 1002-1005 which are not in use. what to do? The best course of action is to remove VLANs numbered 1002-1005.
These VLANs are part of the default VLANs and are not usable for normal use. VLANs 1002 through 1005 are the FDDI defaults, Token Ring defaults, and FDDI and Token Ring defaults for VLAN 1, respectively. None of these VLANs may be removed.VLANs are created and deleted using the VLAN configuration subcommand of the switch. VLAN IDs range from 1 to 4094, and not all numbers are created equal. These numbers are reserved for special purposes or are predefined by the IEEE. VLANs that are not in use should be removed, and VLANs that are in use should not be removed to maintain a clean and concise VLAN configuration. For proper VLAN configuration, users must define the VLAN's name, description, and ID number. VLANs can also be added to other switch configurations such as interfaces, IP addressing, and security policies.
Learn more about VLAN here: https://brainly.com/question/28635096
#SPJ11
What is an example of an outcome for a game?
A.
trying to save the world from an evil wizard
B.
rescuing Princess Peach from Bowser
C.
playing an ocarina to teleport across the land
D.
pressing Up, Up, Down, Down, Left, Right, Left, Right, Start on a controller as a “cheat code” to gain extra lives
The accuracy of digital indicators shall be _________ of the operating pressure at which they are used.
The accuracy of digital indicators is typically defined as a percentage or fraction of the operating pressure at which they are utilized.
This means that the precision and reliability of these indicators are specified in relation to the pressure range they are designed to measure. For example, if a digital indicator has an accuracy of ±1% of the operating pressure, it implies that the displayed value can deviate by up to 1% of the actual pressure within that range. This accuracy requirement ensures that the digital indicators provide reliable and consistent measurements within the specified pressure limits, allowing users to make informed decisions based on accurate data. By adhering to these accuracy standards, digital indicators can enhance the efficiency and safety of various industrial processes that rely on precise pressure monitoring.
To learn more about indicators click on the link below:
brainly.com/question/32454519
#SPJ11
includes both enlarging and reducing the size of a graphic is called____.
The process of both enlarging and reducing the size of a graphic is known as "scaling." Scaling allows for the adjustment of a graphic's dimensions while maintaining its proportions and overall visual integrity. It is a fundamental technique used in various fields, including graphic design, computer graphics, and image processing.
Scaling refers to the transformation of a graphic's size without distorting its proportions. It involves resizing an image or graphic to make it larger or smaller while preserving its original aspect ratio. The aspect ratio defines the relationship between the width and height of an image and ensures that objects in the graphic maintain their relative sizes.
When scaling up, the dimensions of the graphic are increased, resulting in a larger representation of the original image. Conversely, when scaling down, the graphic's size is reduced while retaining the same proportions as the original. This process involves adjusting the pixel dimensions or physical measurements of the image.
Scaling is a crucial technique employed in various applications. In graphic design, scaling allows designers to adapt graphics to different sizes and mediums, ensuring consistent visual appeal across various platforms. In computer graphics and image processing, scaling is used to enhance or reduce the size of images while minimizing quality degradation. It plays a vital role in fields such as printing, web design, video editing, and multimedia production.
Overall, scaling serves as a versatile tool for manipulating the size of graphics. Whether it's enlarging or reducing an image, maintaining proportionality is essential to ensure that the graphic retains its intended appearance and legibility.
To learn more about computer graphics click here : brainly.com/question/18068928
#SPJ11
_______ can identify key pieces of information like who created a file, when it was created, when it was last modified, and what the current status is.
File properties can identify key pieces of information like who created a file, when it was created, when it was last modified, and what the current status is.
What are the key properties of a file?The term file properties is known to be called Document properties or metadata. It is known to be one that often gives details about a file.
Files do have the characteristics of:
A file name.A file do take storage space.A file can be saved in different format.Therefore, File properties can identify key pieces of information like who created a file, when it was created, when it was last modified, and what the current status is.
Learn more about File properties from
https://brainly.com/question/1165635
#SPJ1
A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit will cost 100. Judge and print total cost for user.
Answer:
The program in Python is as follows:
qty = int(input("Quantity: "))
price = 100 * qty
if qty >1000:
price = (100 - 0.10 * 100) * qty
print("Cost: "+str(price))
Explanation:
This prompts the user for the quantity
qty = int(input("Quantity: "))
This calculates the price or cost, without discount
price = 100 * qty
This checks if the quantity is greater than 1000
if qty >1000:
If yes, this calculates the price or cost, after discount
price = (100 - 0.10 * 100) * qty
This prints the calculated cost
print("Cost: "+str(price))
how does software-defined networking reduce both the risk of human error and overall network support and operations costs?A. It ensures network resources such as printers are used correctlyB. It allows individualized configuration through manual inputC. It increases physical access to all network devicesD. It automates configuration, policy management and other tasks
Software-defined networking (SDN) reduces both the risk of human error and overall network support and operations costs by automating many of the manual configuration and policy management tasks that are traditionally completed by humans.
What is Networking ?Networking is the process of connecting computer systems and other electronic devices together to allow the transfer of data between them. It is the basis for digital communication, allowing devices to communicate with each other over a physical or wireless network. This type of communication is useful for sharing information between users, allowing for more efficient collaboration and the sharing of resources.
This automation ensures that network resources such as printers are used correctly and that individualized configurations can be applied with minimal manual input. Additionally, SDN increases physical access to all network devices, allowing for more efficient and cost-effective management of the network.
To learn more about Networking
https://brainly.com/question/29338740
#SPJ4
which if branch executes when an account lacks funds and has not been used recently? hasfunds and recentlyused are booleans and have their intuitive meanings.a.if (!hasfunds
Thus, when an account lacks funds and has not been used recently, the branch that executes is the one with the condition "if (!hasFunds && !recentlyUsed)".
If the boolean variable "hasfunds" is false (meaning the account does not have enough funds) and the boolean variable "recentlyused" is also false (meaning the account has not been used recently), then the code block inside the if statement will be executed.
Therefore, the if branch that executes when an account lacks funds and has not been used recently is:
if (!hasfunds && !recentlyused) {
// code block to be executed
}
When an account lacks funds and has not been used recently, the branch that executes is the one with the condition "if (!hasFunds && !recentlyUsed)".
This checks if the account does not have funds (indicated by !hasFunds) and has not been used recently (indicated by !recentlyUsed). If both conditions are met, this branch will execute.
know more about the boolean variable
https://brainly.com/question/26041371
#SPJ11
help? brainliest and point
Answer: second one
Explanation:
sorry lol
A(n) _____ is a software program or hardware appliance that can intercept, copy, and interpret network traffic.
Answer:
Packet Sniffer
Explanation:
A packet sniffer's primary purpose is to monitor a network. Plus it can be used for network administrators or hackers.
Hope this helps! :)
The formula for the trajectory of a ball is given by f(x)=xtanθ−12v20gx2cos2θ+y0 where x is a coordinate along the ground, g=9.81 is the acceleration due to gravity, v0 is the magnitude of the initial velocity which makes an angle θ with the x-axis, and (0,y0) is the initial position of the ball. Write a program to calculate the trajectory y=f(x) for 0≤x≤16, with y0=10, v0=10, θ=50∘. (Do Python trigonometric functions accept radians or degrees?) Let x vary between 0 and 16 with 101 points. You will need to:
Answer:
The program in python is as follows:
import math
def traj ect ory(th e ta,x,y,v):
t = ma th . tan(m ath . radians(theta))
c = math . cos(math . radians(theta))
g = 9 . 8
fx = x * t - (1/(2*v**2)) * ((g*x**2)/(c**2))+y
return round(fx,3)
print("x\t f(x)")
for x in range(0,17):
theta = 50
y= 10
v = 10
print(str(x)+"\t"+str(tr aje ctory (the ta,x,y,v)))
Explanation:
The question is incomplete. However, I have written the program to calculate the trajectory values f(x).
See attachment for complete program where comments were used as explanation
When using code completion, you can accept the current selection in the suggestions list with Ctrl+Shift+Enter. IntelliJ IDEA Community will not only insert the selected string, but also turn the current code construct into a syntactically correct one (balance parentheses, add missing braces and semicolons, and so on). T/F?
True. When using code completion in IntelliJ IDEA Community, you can accept the current selection in the suggestions list with Ctrl+Shift+Enter. IntelliJ IDEA will not only insert the selected string,
but also turn the current code construct into a syntactically correct one, including balancing parentheses, adding missing braces and semicolons, and so on. This feature is known as "smart completion" and can be a great time-saver for developers. When using code completion, you can accept the current selection in the suggestions list with Ctrl+Shift+Enter. IntelliJ IDEA Community will not only insert the selected string, but also turn the current code construct into a syntactically correct one (balance parentheses, add missing braces and semicolons, and so on).
learn more about IntelliJ IDEA here:
https://brainly.com/question/31678479
#SPJ11
Bob wants to launch a Kaminsky DNS cache poisoning attack on a recursive DNS
resolver; his goal is to get the resolver to cache a false IP address for the hostname
www.example.com. Bob knows that during the iterative process, a query will be sent
to the root server, then to the .COM nameserver, and finally to the example.com’s
nameserver. He can choose to spoof replies from any of these nameservers, after triggering
the iterative process from the resolver. He decides to spoof a reply from the .COM
server. Please describe whether Bob’s attack will be successful or not
Bob's attack will be successful.
In the Kaminsky DNS cache poisoning attack, the attacker sends a forged response to a DNS recursive resolver, in an attempt to redirect the resolver's queries to a malicious website. In this attack, Bob wants to launch a Kaminsky DNS cache poisoning attack on a recursive DNS resolver. His aim is to get the resolver to cache a false IP address for the hostname www.example.com. During the iterative process, a query will be sent to the root server, then to the .COM nameserver, and finally to the example.com's nameserver. After triggering the iterative process from the resolver, Bob decides to spoof a reply from the .COM server. Let's discuss whether Bob's attack will be successful or not.Bob's attack will be successfulSuppose that Bob was able to create and send a forged reply to the resolver from the .COM server. The resolver will cache the forged IP address for the hostname www.example.com, believing it to be the correct one. The resolver will then respond to future queries with the cached IP address instead of querying a nameserver for the correct one. The forged IP address can redirect the resolver's queries to a malicious website.In this scenario, Bob was able to exploit a vulnerability in the DNS protocol, where the resolver is susceptible to receiving forged replies. He managed to inject a false record into the cache of a DNS resolver.
Know more about DNS here:
https://brainly.com/question/31932291
#SPJ11
help
pls need quickly
Answer:
Themes
Explanation:
In the slide thumbnail pane on the left, select a slide.On the Design tab, in the Themes group, click the More button (illustrated below) to open the entire gallery of themes:Point the mouse at the theme you want to apply. Right-click it, and then select Apply to All Slides.an application programming interface (api) for a website tells you how to group of answer choices navigate the site download data from the site use jsonp to get data from the site use ajax to get data from the site
An application programming interface (api) for a website tells you how to option A: navigate the site.
What is the purpose of an API (application programming interface)?Application Programming Interface, or API, is a software bridge that enables communication between two applications. You utilize an API every time you use a mobile app like Face book, send an instant message, or check the weather.
Companies can make the data and functionality of their applications available to internal company departments as well as to external third-party developers and business partners through the use of application programming interfaces, or APIs.
Therefore, Application Programming Interface is referred to as API. An application programming interface for the Web is known as a Web API. A browser's capabilities can be increased by using a browser API. A server API can increase a web server's capabilities.
Learn more about application programming interface from
https://brainly.com/question/15059067
#SPJ1
Who invented the television and what year did color come out? Explain
The television was not invented by a single person, but its development involved contributions from several inventors and engineers.
How is this so?Philo Farnsworth is often credited as one of the key inventors of television, as he successfully demonstrated the first working electronic television system in 1927.
As for color television, it was first introduced commercially in the United States in 1953 by RCA.
The introduction of color television marked a significant milestone in broadcasting, enhancing the viewing experience for audiences worldwide.
Learn more about television at:
https://brainly.com/question/12079773
#SPJ1
Quilet ____ uses a number of hard drives to store information across multiple drive units. A. Legacy backup b. Continuous database protection c. RAID d. Virtualization
Quilet c. RAID uses a number of hard drives to store information across multiple drive units.
Redundant Array of Independent Disks (RAID) is a data storage technology that combines multiple physical hard drives into a single logical unit. This approach provides increased data reliability and performance by distributing and storing information across the multiple drive units. RAID configurations can be set up in various levels, each offering different benefits in terms of data redundancy, fault tolerance, and performance.
RAID systems can improve the overall performance of a computer or server, as they allow for faster read and write speeds by using multiple disks simultaneously. Moreover, RAID helps protect data from hardware failures, as it can store redundant copies of the data across the different drives. In case one drive fails, the system can still access the data from the remaining drives, ensuring continued operation and data safety.
In summary, option C. RAID is a data storage technology that uses multiple hard drives to enhance performance and reliability by distributing information across various drive units. It is an essential tool for organizations and individuals who require high-performance computing and robust data protection.
Learn more about RAID here: https://brainly.com/question/30036295
#SPJ11
A level designer would create which of the following features of a video game?
a. vehicle choices for a racing theme
b. location choices for a hunting theme
c. artillery choices for a war theme
d. team choices for a sports theme
Answer:
b. location choices for a hunting theme
Explanation:
A level game designer is a type of game developer that develops a particular level of a game that usually includes location of items, map features, etc.
Therefore, a level designer would create location choices for a hunting theme features of a video game.
Jessie will make and sell the trending Baked California Maki. Her Peso mark up is 5.00. Selling price PHP 15.000. How much will be the Paercentage mark up?Use the formula Percentage mark up= Peso markup/selling price. *
Answer:
50%
Explanation:
The markup is the difference between the selling price and the cost price. If the mark up is greater than zero, it means there is a profit, if the markup is less than 0, it means there is a loss and if the markup is equal to 0, it means there is breakeven.
Percentage markup = (markup/cost price) * 100%
Selling price - cost price = markup
15 - cost price = 5
cost price = 10
Percentage markup = (markup/cost price) * 100% = (5/10) * 100% = 50%
Hyper-Tech Enterprises manufactures mechanical parts used in air conditioning and heating units. The company employs over 300 workers at its Alabama facility. None of the Hyper-Tech employees belong to a union; however, management believes that unionization is in the near future. A representative of a local union has recently visited Hyper-Tech in an attempt to solicit members and have them sign authorization cards. Enough eligible employees have signed authorization cards to petition the NLRB for an election. Hyper-Tech's top executives are considering fighting the unionization efforts. Which of the following, if true, suggests Hyper-Tech has engaged in an unfair labor practice?
a. Hyper-Tech managers prohibited union representatives from soliciting employees who were on duty.
b. Hyper-Tech managers intervened when pro-union employees solicited other employees while both were on duty.
c. Hyper-Tech managers barred nonemployee union representatives from entering the firm's building.
d. Hyper-Tech managers prohibited distribution of union literature in the company cafeteria.
Answer:
d
Explanation:
The one action listed in the question that would suggest unfair labor practices would be if Hyper-Tech managers prohibited the distribution of union literature in the company cafeteria. This is because a company can prevent employees from partaking in other tasks and getting distracted while on duty. When an employee is on duty they are getting paid to focus and complete their responsibilities. An employer also has the right to prevent non-employee individuals from entering private property such as their facility. What a company cannot do is prevent their employees from deciding what the literature that they want to read or the decisions that they want to make outside of work hours. Therefore, preventing the employees from accepting literature while on their break time would be considered unfair labor practice.