Answer:
Establish a connection with a Command and Control server
Launch a mass-mail spam attack
Launch a Distributed Denial of Service (DDoS) attack
Explanation:
The computer that has been infected and become part of a botnet will need to establish network connection to the "Command and Control" server of the bot-net. Then it might participate in whatever attack the control instructs.
The actions that can be initiated by the attacker are
Establish a connection with a Command and Control serverLaunch a mass-mail spam attackLaunch a Distributed Denial of Service (DDoS) attack.What is malware?Malware is a catch-all term for viruses, trojans, and other damaging computer programs that threat actors use to infect systems and networks and access sensitive data. Malware is software designed to obstruct a computer's regular operation.
The computer that has been infected and joined a botnet must create a network connection to the bot-"Command net's and Control" server. After that, it might take part in whichever attack the control orders.
Therefore, the correct options are:
Establish a connection with a Command and Control serverLaunch a mass-mail spam attackLaunch a Distributed Denial of Service (DDoS) attack.To learn more about malware, refer to the link:
https://brainly.com/question/22185332
#SPJ2
The question is incomplete. Your most probably complete question is given below:
1. Launch a Distributed Denial of Service (DDoS) attacks
2. Establish a connection with a Command and Control server
3. Launch a mass-mail spam attack
4. Launch a tailgating attack
Forms structure data input to help ensure data ___ meaning the information entered is accurate, timely, and useful.
Forms structure data input to help ensure data integrity meaning the information entered is accurate, timely, and useful.
Which of the following database features suggests data integrity? A relational database that holds data in a tabular format that can be connected to and utilized in a variety of ways must have entity integrity.It refers to a set of processes that guarantee appropriate and reliable data use and storage.Two different types of restrictions can be applied to SQL Server tables to ensure data integrity: primary keys and foreign keys.Data integrity refers to the total consistency, completeness, and accuracy of data across its entire existence.When data is secure, processes are in place to ensure that it cannot be altered by an unauthorized person or program while it is in use, in transit, or while it is at rest.To learn more about structure data refer
https://brainly.com/question/24268720
#SPJ4
Which list will be referenced by the variable number after the execution of the following code?
number = range(0, 9, 2)
a. [0, 1, 2, 3, 4, 5, 6, 7, 8, 9]
b. [1, 3, 5, 7, 9]
c. [2, 4, 6, 8]
d. [0, 2, 4, 6, 8]
The answer is Option d. [0, 2, 4, 6, 8].
What is Range?Range is a statistical measure of dispersion in mathematics, or how widely spaced a given data collection is from smallest to largest. The range in a piece of data is the distinction between the highest and lowest value.
Mean – The arithmetic mean of a set of numbers is its average (the sum of the numbers divided by the quantity of numbers)
Median – The statistical median is the middle number in an ordered set of numbers
Mode – The mode is the most commonly occurring number in a data set
Range – The range of a data set is the mathematical difference between the largest and smallest value.
Formula Fx
Range=Greatest value-Least value
To know more about Range refer to :
https://brainly.com/question/24266668
#SPJ4
Write a complete C++ program named lab23.cpp that does the following.
The program fills a 5x4 array with 20 randomly generated two-digit positive integers so that the first 4 numbers occupy the first row, the next 4 occupy the next row and so on until the fifth row.
Make sure that your code generates different random integers when the program is run each time.
Print the array where each element in a row is separated by a space and each row is on its own line.
Print the maximum gap between the adjacent elements of each row. For example, if the elements in the first row of the array store 19, 20, 33 and 11, the maximum gap between adjacent elements in the first row is 22.
For each row in the array, count and print the number of elements that are divisible by 3 or 5.
Sample run:
#include<iostream>
#include<cstdlib>
#include<ctime>
using namespace std;
int main()
{
int array[5][4];
srand(time(NULL)); //seed random number generator
//fill 5x4 array with random numbers
for (int i = 0; i < 5; i++)
{
for (int j = 0; j < 4; j++)
{
array[i][j] = rand() % 90 + 10;
}
}
//print array
for (int i = 0; i < 5; i++)
{
for (int j = 0; j < 4; j++)
{
cout << array[i][j] << " ";
}
cout << endl;
}
//calculate and print maximum gap between adjacent elements
for (int i = 0; i < 5; i++)
{
int maxGap = 0;
for (int j = 0; j < 3; j++)
{
int gap = array[i][j+1] - array[i][j];
if (gap > maxGap)
maxGap = gap;
}
cout << "The maximum gap between adjacent elements in row " << i + 1 << " is " << maxGap << endl;
}
//calculate and print number of elements divisible by 3 or 5
for (int i = 0; i < 5; i++)
{
int count = 0;
for (int j = 0; j < 4; j++)
{
if (array[i][j] % 3 == 0 || array[i][j] % 5 == 0)
{
count++;
}
}
cout << "The number of elements divisible by 3 or 5 in row " << i + 1 << " is " << count << endl;
}
return 0;
}
For more questions like Program click the link below:
https://brainly.com/question/13160963
#SPJ4
Write down the binary representation of the decimal number 23.25 assuming the IEEE 754 single precision format.
decimal number 23.25 converted to binary is equal:
10111.01irst individually converting the integer and fractional parts to obtain the equivalent binary number, as shown below:
Consider these steps to translate the number 23 to binary:
Divide 23 by 2, paying attention to the leftover and quotient. Divide the quotient by 2 again until you reach zero.
The comparable binary number will then be obtain
Calculation steps:The binary equivalent of the decimal number 23.25 is obtained by first individually converting the integer and fractional parts to obtain the equivalent binary number, as shown below:
Consider these steps to translate the number 23 to binary:Divide 23 by 2, paying attention to the leftover and quotient. Divide the quotient by 2 again until you reach zero.The comparable binary number will then be obtained by writing the remainders out in reverse order.23 / 2 Equals 11 with a remainder of 1, 11 / 2 = 5 with a remainder of 1, and 5 / 2 = 2 with a remainder of 0, respectively.1/2 = 0 with 1 as the remainder.Here is the binary equivalent of the decimal number 23:10111
Follow these steps to convert the decimal fraction 0.25 to a binary number:Add 0.25 to 2 and note the resulting fractional and integer parts. Once the resulting fractional component equals zero, keep multiplying by 2 until you reach that point (we calculate upto ten digits).Simply write out the integer components from each multiplication result to obtain the equivalent binary value.0.25 × 2 = 0 + 0.5\s0.5 × 2 = 1 + 0The binary equivalent of 0.25 in decimal form is as follows:0.01
Therefore, the binary equivalent of the decimal number 23.25 is 10111.01
To learn more about decimal fraction refer https://brainly.com/question/7980438
#SPJ4
The Contact entity has a LegalReports array. The LegalReportsLV List View displays the elements of the array.
Which two steps must be taken as part of the configuration to allow the user to add/remove rows to/from the LegalReportsLV?
These two steps must be taken as part of the configuration to allow the user to add/remove rows to/from the LegalReportsLV
1. Specify the Row Iterator widget's toRemove property
2. Specify the Iterator Buttons widget's toAdd property.
What is an array?An array is a collection of elements, such as numbers, images, or physical objects, formatted into rows and columns according to their nature. An array, also referred to as a database system, is a group of things, or data, that are stored together in one or more contiguous memory locations.
Multiple data items of the same type should be stored together in an array. The commutative property of multiplication, which shows that you can shuffle the factors or elements and the result of the shuffle remains the same, can be demonstrated mathematically using an array.
By assigning an offset to every value in an array, you can use computer programming to find and identify where you stored each piece of information, or element.
Learn more about array
https://brainly.com/question/28565733
#SPJ4
For a given real-world problem like the one below, which algorithm will you use to solve it? How would you map the input information into the input required by the algorithm? What computational complexity the chosen algorithm has? Blizzard has come over the whole state, covering all highways with 40 inches of snow. To keep the distribution of food, roads between major cities need to be cleared, so that each major city can be reached from each other. But getting rid of the snow from a highway is expensive - $1000 per mile. You, member of the Emergency Services, need to devise a plan that keeps all major cities connected through cleared roads, with the cost of clearing as small as possible. You are given the list of distances (in miles) of direct connections (i.e. not going through any other major city) between the major cities. You have to do the math, and choose which of those connections should be cleared.
An algorithm is a written formula that is part of software that, when triggered, tells the tech what to do to solve a problem. Computer algorithms work with input and output.
What is an algorithm's most basic definition?
An algorithm is a method for doing calculations or locating issues. Algorithms function as a precise set of instructions that carry out preset tasks consecutively in either machine or development tools programs. Algorithms play a significant role in every role of information technology.
What kind of algorithm would that be?
The approach we use to answer a long division problem, the process of doing laundry, and the functioning of a search engine are all examples of common examples of an
Briefing:
Minimal Spanning Tree(MST):
We also called this as a minimum weight spanning tree. It is the subset of the edges of connected vertices.
What is a spanning tree?
A graph is a sub graph that contains all the vertices and is a tree. Graph might have many spanning trees.
o---o
|\ /|
| X |
|/ \|
o---o
So the above graph has below spanning trees.
o---o o---o o o o---o
| | | | | |
| | | | | |
| | | | | |
o o o---o o---o o---o
o---o o o o o o o
\ / |\ / \ / \ /|
X | X X X |
/ \ |/ \ / \ / \|
o o o o o---o o o
o o o---o o o o---o
|\ | / | /| \
| \ | / | / | \
| \| / |/ | \
o o o---o o o o---o
o---o o o o o o---o
|\ | / \ | /|
| \ | / \ | / |
| \ |/ \| / |
o o o---o o---o o o
So these are possible spanning trees from the given graph.
Now what is Minimum Spanning Tree?
Now take your graph you have weights or length are given in it.
The Weight of the whole trees is: Sum of the weight of the edges.
Now, we have to find the minimum length spanning tree in the given graph.
To know more about algorithm visit:
https://brainly.com/question/22984934
#SPJ4
counter = 1
for i in range(1, 100) :
counter = counter + 1
print(counter)
Why is the answer 100 not 101
Answer:
The answer is 100 because the range() function in the for loop is set to go from 1 to 100, not 1 to 101. The range() function is inclusive of the start value and exclusive of the end value, so in this case it will only go up to 99, not 100. Additionally, the counter variable is not being incremented correctly within the for loop. The correct syntax for incrementing a counter variable would be "counter += 1" instead of "counter = counter + 1".
which systems analysis tool shows the relationship between input and output documents? (pick 1: automated design tool, data flow diagram, system flow chart, grid chart, program flow chart, spreadsheet, 3d chart, 2d chart)
A) flowchart
B) top-down analysis method
C) decision table
D) grid chart
The relationship between the incoming and outgoing documents may be seen using the top-down analysis approach.
What are documents and what sorts of documents are there?A document is described as a written, printed, or digitally formatted sheet of paper or collection of papers used to store records for private or professional reasons. It serves as a source of authority, proof, an authentic record, or a source of reference.
What does word document mean?A documents is a collection of work that has been stored when it is produced using a computer program like a word processor or spreadsheet. All digital document is also stored as a separate file with a name that sets it apart from all other papers.
To know more about Document visit :
https://brainly.com/question/2901657
#SPJ4
You have a plan for a program. Match the planning comment to the code that executes that part of the plan.
# Create a loop that continues until the user guesses the number.
# Get a guess from the user and update the number of guesses.
# Compare the guess to the correct answer.
guess = mput Guess an integer from 1 to 10: *)
quess = intouess)
attempts = attempts + 1
if guess == comect.
Tell the user the guess was conect print"You were conectr
keepGoing = False
ese
print"You were wrong.")
keepGong = True
while keepGoing:
Answer:
1. Create a loop that continues until the user guesses the number.
while keepGoing:2. Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10: ")guess = int(guess)attempts = attempts + 13. Compare the guess to the correct answer.
if guess == correct: print("You were correct.") keepGoing = Falseelse: print("You were wrong.") keepGoing = Trueadt deque in python you are to reimplement the adt deque in python using the python deque from the collections module, but with the interface from lecture 11-1.
The deque class in the Python collections module was created specifically to offer quick and memory-saving methods for appending and removing items from the two ends of the underlying data structure.
What does dequeue () do in python?If you frequently work with lists in Python, you probably already know that they don't operate quickly enough when you need to pop and append items to their left end. The deque class in the Python collections module was created specifically to offer quick and memory-saving methods for appending and removing items from the two ends of the underlying data structure.The most popular list-like data types in computing, queues and stacks, are easily implemented using Python's deque, a low-level and highly optimised double-ended queue.You will discover the following in this tutorial:How to make and use deque in PythonHow to pop and add objects from both ends of a deque effectivelyHow to create effective queues and stacks using dequeWhen to use deque instead of listYou should be familiar with the fundamentals of dealing with Python lists in order to better comprehend these topics. You'll also benefit from having a basic understanding of queues and stacks.Finally, you'll create a few examples that guide you through some typical deque use cases. Deque is one of Python's most potent data types.To Learn more About deque class refer to:
https://brainly.com/question/29738296
#SPJ4
evaluate the expressions
30 div 2 ,30 mod 2
Answer:
30 div 2 = 15, 30 mod 2 = 0
Explanation:
30 div 2 is equivalent to 30 divided by 2, which is just 15
30 mod 2 is equivalent to "the remainder of" 30 divided by 2, which is 0 because there is no remainder.
phonological memory represents the ability to code information phonologically for temporary storage in working or short-term memory. specifically the composite score provides an assessment of the functioning of the part of memory called the phonological loop, which provides a brief, verbatim storage of auditory information. a deficit does not inevitably lead to poor reading of familiar material but is more likely to impair decoding of new words, particularly words that are long enough to decode bit by bit, as a means of storing intermediate sounds. a deficit in phonological memory may not impair listening or reading comprehension for simple sentences but is likely to impair both listening and reading
Phonological memory is the capacity to retain knowledge based on speech in short-term memory. When reading and spelling, we place a lot of reliance on our phonological memory. Students are asked to repeat nonsensical words that are longer and more complicated or to memorize strings of numbers as a way of testing their memorization abilities.
What makes phonological memory crucial?
The development of vocabulary, processing of sentences and conversation, and learning to read are just a few of the skills that phonological working memory promotes (Perrachione et al., 2017).
How would one rate their phonological memory?
The "digit span," "digit span-running," and "nonword repetition" tasks are used to measure phonological working memory. Children must repeat lists of various lengths, ranging from 2 to 8 digits, as part of the "digit span" exercise. When kids are playing a game, this duty is provided to them.
To know more about phonological memory visit;
https://brainly.com/question/14842522
#SPJ4
Finally, add a personal reflection on what you have learned. What do think is the added value you have obtained?
The way to start a personal reflection include
Create a main theme. Brainstorm the ideas and experiences related to the topic Analyze how the ideas affect the topicWhat is self Reflection?Self-reflection (also known as "personal reflection") is the process of thinking about, meditating on, evaluating, and seriously considering your actions, thoughts, attitudes, motivations, and desires.
The ability to observe and evaluate our own cognitive, emotional, and behavioral processes is referred to as self-reflection. Other terms for this self-observation in psychology include'reflective awareness' and'reflective consciousness.'
Instead of doing things the same way you've always done them, reflecting allows you to improve your skills and assess their effectiveness.
Learn more about reflection on:
https://brainly.com/question/17190127
#SPJ1
John wants to make the sprite in his Scratch program speak out his name. However, he is not able to locate the speak block on the Scratch interface. List down the steps for him in order to get the speak block?
The region of your screen where the Scratch software is located is known as the Scratch user interface.
What role of Scratch program in Scratch interface?The screen is divided into a number of “panes” or parts, each of which performs a distinct task, such as allowing you to select coding blocks to use, code, and view the results of your work. We will go over each component of the user interface.
Students can make their own interactive stories, games, and animations using the visual programming language Scratch.
Therefore, Students develop their creative thinking, logical reasoning, and teamwork skills as they create Scratch projects.
Learn more about Scratch here:
https://brainly.com/question/13770820
#SPJ1
ou need sutures to close a cut on your hand, and lidocaine is used to numb the area. lidocaine works by
Lidocaine is a local anesthetic that can also be used to treat arrhythmias. Lidocaine functions by preventing sodium ions from entering the membrane surrounding neurons. This stops impulses from starting and moving through the nerve, which has an anaesthetic effect.
What is Lidocaine?A local anaesthetic is lidocaine. It is used to anaesthetize or numb the surgical area during small surgical operations including dental, oral, diagnostic, or other therapeutic treatments. Other skin, eye, or ear irritations are also treated with it to offer momentary relief.
UsesLidocaine topical (for use on the skin) is used to reduce pain or discomfort caused by skin irritations such as sunburn, insect bites, poison ivy, poison oak, poison sumac, and minor cuts, scratches, or burns. Lidocaine topical is also used to treat rectal discomfort caused by hemorrhoids.
WarningsWithout consulting a doctor, avoid applying excessive amounts of lidocaine topical or wrapping the skin that has been treated in plastic or bandages.Lidocaine skin patches should never be given to children or pets, whether they are used or not. If a child or animal swallows or sucks on one of the skin patches by accident, it could be dangerous due to the amount of lidocaine present.To know more about Lidocaine refer to :
https://brainly.com/question/28203073
#SPJ4
(Pick 5 Lotto) Write a program to simulate a pick-5 lottery game. Your program generates and stores 5 distinct random integers between 1 and 9 (inclusive) into an array. The program then prompts the user to enter 5 distinct integers between one and nine and stores the numbers into a second array. The program then compares and determines whether the two arrays are identical. If the two arrays are identical, then the user wins the game; otherwise, the program outputs the number of matching digits and their position in the array.
Use default_random_engine and unitform_int_distribution to generate the random numbers. See discussions to see engines and distributions details.
The way to write the program will be:
#include <stdio.h>
#include <stdlib.h>
int main(void) {
int seed;
printf("Enter an integer random seed: ");
scanf("%d", &seed);
srand(seed);
int comp_nums[5], user_nums[5];
int matchCount = 0;
int i=0;
printf("To play the Pick-5 game, enter five integers between 1 and 9 (inclusive): ");
for(i=0; i<5; i++) {
scanf("%d", &user_nums[i]);
}
printf("\n");
// generate comp_num
for(i=0; i<5; i++) {
comp_nums[i] = rand() % 9 + 1;
if(comp_nums[i] == user_nums[i]) {
matchCount++;
}
}
if(matchCount == 5) {
printf("\nCongratulations!!! You WIN!!!\n");
} else if(matchCount == 0) {
printf("You didn't match any numbers!\n") ;
} else {
printf("\nYou only matched %d numbers.\n", matchCount);
printf("Your numbers matched the Pick-5 numbers at position(s): ");
for(i=0; i<5; i++) {
if(comp_nums[i] == user_nums[i]) {
printf("%d ", i);
}
}
printf("\n");
}
printf("The winning numbers are: ");
for(i=0; i<5; i++) {
printf("%d ", comp_nums[i]);
}
printf("\n");
return 0;
}
How will the program be written?The appropriate steps include:
Define what the program should be able to do. It's also important to visualize the program running on the computer.
Then create a model of the program, check for logical errors and then write the program source code.
Learn more about program on:
https://brainly.com/question/26642771
#SPJ1
a technician is running a network above a dropped ceiling that is also used for ventilation. the cable must be twisted pair and must be capable of gigabit ethernet speeds. which of the following cables should the technician use?
A technician is managing a network above a ventilation- and dropped-ceiling system.
Twisted pair and gigabit capabilities on the cable are requirements. Vertical wiring or cabling are other names for the backbone wiring. It offers connectivity between entrance amenities, equipment rooms, and telecommunication rooms. Fiber optic cabling is immune to electromagnetic interference and enables for longer cable distances without the need for a repeater than other types of cabling. However, it is more expensive, and installation calls for specialised knowledge and tools. CMR cable should be used when extending cable across vertical shafts or risers between floors.
What is distribution frame?
An interconnection and termination method for communications and audiovisual cable systems is called a distribution frame. Typically,
distribution frames have parts.
To learn more about cabling from given link
brainly.com/question/14300574
#SPJ4
If the range of the numbers below is 8, what could the missing number be? 1 3 ?
At what age could you retire with $1 million if you started investing at age 25?
Answer:
65 years old
Explanation:
25-year-old would need to save approximately $400 a month to achieve a $1 million balance by age of 65
Which of the following terms is the encrypted form of a message that is unreadable except to its intended recipient?
a. plain text
b. encryption algorithm
c. ciphertext
d. steganography
c)Ciphertext is the encrypted form of a message that is unreadable except to its intended recipient.
What is encryption?Encoding data is the process of encryption in cryptography. This technique transforms the information's initial plaintext representation into an alternate version known as ciphertext. Only parties with the proper authorization should be able to convert ciphertext to plaintext and gain access to the original data. Although encryption does not by itself stop interference, it does hinder a potential interceptor from understanding the material.
An encryption technique typically employs a pseudo-random encryption key produced by an algorithm for technical reasons. Without the key, it is feasible to decrypt the message, but doing so requires a lot of computer power and expertise for a well-designed encryption scheme. With the key provided by the sender to recipients but not to unauthorized users, an authorized recipient can quickly decrypt the communication.
To know more about encryption visit:
https://brainly.com/question/29351801
#SPJ1
Write a C# program to evaluate the football match result. It displays whether the first team won, or the second team won, or it was a tie. The numbers must be inputted by the user. [Sample screenshot attached for your reference].
b. The electoral commission of Ghana is trying to find out the eligibility of voters in the country, on a trial bases you were tasked to come out with a program that request for:
i. A person's country of residence;
ii. The person's age;
iii. The person should be eligible to vote if he comes from Ghana and is at least 18 years of age.
NB: country and age should be declared as string and float respectively, You can use either "Scanner or JOptionPane" to collect the variables
Electoral System Features in Ghana. The following characteristics describe Ghana's electoral system. For citizens who are at least 18 years old, there is universal adult suffrage.
What exactly is an election system?An electoral system, often known as a voting system, is a set of regulations that govern how elections and referendums are held and how their outcomes are decided. voter registration continues. Voter registration and voting are optional and non-mandatory activities. Voting occurs at the registration location. anonymous voting. Electoral Commission regulation of political parties (EC).
What number of electoral constitutions does Ghana have?The 275 constituencies of the Republic of Ghana's Parliament are listed here as of the general election in December 2016.
To more about electoral commission visit :-
https://brainly.com/question/880848
#SPJ1
T/F the purpose of both hardwired control units and microprogrammed control units is to raise a series of signals that carry out operations inside a computer system
Both hardwired control units as well as microprogrammed control units have the same objective: to generate a series of signals that execute commands inside a computer system.
The given statement is True.
What are a microprogrammed control unit and a hardwired control unit?Logic circuits in the hardwired control unit produce the control signals required by the CPU. With the aid of microinstructions stored in the control memory, the microprogrammed control system generates the control signals.
What benefits do microprogrammed controls have over hardwired controls? What function does the operating system serve?Microprogramming offers benefits. It is quite versatile (compared to hard-wiring). The instruction sets might be highly complex or very straightforward while still being quite effective. You can generate what you need if your hardware isn't providing it, such as a complex instruction set.
To know more about operating system visit:
https://brainly.com/question/6689423
#SPJ4
Write a docstring for these functions
Answer:
import random
def shuffle_if_even(cards):
"""
Shuffle a deck of cards if the top card is even.
Args:
cards (list): The deck of cards to shuffle.
Returns:
None: The function does not return any value.
"""
if len(cards) > 1:
top_card = cards[-1]
if top_card.num in [2, 4, 6, 8, 10, "Q", "A"]:
random.shuffle(cards)
Ryan is working on the layout of his web page. He needs to figure out where the title, links, text, and images should go. Which of the following can help him?
O Color selection
Color theory
© Proofreading
Storyboarding
Storyboarding can help Ryan figure out where the title, links, text, and images should go. Storyboarding is a visual tool used to map out the layout of a web page by breaking it into sections and arranging the elements accordingly. This will help Ryan visualize how the content should be organized on his page.
Software redundancy techniques
When a software system provides the same functionality through the execution of distinct pieces, it is redundant.
What is redundancy?Redundancy has two functions: passive redundancy and active redundancy. Both features use excess capacity to avoid performance decreases from exceeding specification limitations without requiring human involvement. Excess capacity is used in passive redundancy to mitigate the impact of component failures.
Many software engineering techniques have made extensive use of redundancy, such as fault-tolerance and reliability engineering, as well as self-adaptive and self-healing programs.
Therefore, It is redundant when a software system provides the same functionality through the execution of distinct pieces.
To learn more about redundancy, refer to the link:
https://brainly.com/question/12972964
#SPJ1
Write three functions, float getNum(), float add(float, float), void outSum(float); that asks user for two numbers, finds the sum of two numbers, and displays the sum repeatly in a main program until the user enter “0” for either one of the numbers. For example, in the main, user enter 2, 4, output sum is 6. Then, 3,7, sum is 10, then 8, 7, sum is 15. When user enter one 0, the repeating process stops.C++ language only. No points will be given if other languages are used.
********************************
I have already written some code but I do not know where I am going wrong.
#include
using namespace std;
float getNum (float& x, float& y);
float add (float& x, float& y, float& z);
void outSum (float& z);
int main ()
{
float NumberOne = 0;
float NumberTwo = 0;
float Total = 0;
float getNum[2] = (NumberOne)(NumberTwo);
float add (NumberOne, NumberTwo, Total);
void outSum (Total);
}
float getNum (float& x, float& y)
{
cout << "Enter number one " << endl;
cin >> x;
cout << "Enter number two " << endl;
cin >> y;
}
float add (float& x, float& y, float& z) {
z = x + y;
}
void outSum (float& z) {
cout << "The total is " << z << endl << endl;
}
Answer:
#include <iostream>
using namespace std;
float getNum()
{
float num;
cout << "Enter a number: ";
cin >> num;
return num;
}
float add(float num1, float num2)
{
return num1 + num2;
}
void outSum(float sum)
{
cout << "Sum is " << sum << endl;
}
int main()
{
float num1, num2, sum;
num1 = getNum();
num2 = getNum();
while (num1 != 0 && num2 != 0)
{
sum = add(num1, num2);
outSum(sum);
num1 = getNum();
num2 = getNum();
}
return 0;
}
Answer:
#include <iostream>
float getNum()
{
float num;
std::cout << "Enter a number: ";
std::cin >> num;
return num;
}
float add(float num1, float num2)
{
return num1 + num2;
}
void outSum(float sum)
{
std::cout << "The sum of the two numbers is: " << sum << std::endl;
}
int main()
{
float num1, num2, sum;
while (true)
{
num1 = getNum();
num2 = getNum();
if (num1 == 0 || num2 == 0)
{
break;
}
sum = add(num1, num2);
outSum(sum);
}
return 0;
}
______software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive.
Off-the-shell software is less risky and leads to quicker deployment; however, maintenance and support costs may become expensive.
What is software development?The process of conceiving, defining, designing, programming, documenting, testing, and bug-fixing that goes into building and maintaining applications, frameworks, or other software components is known as software development. Program development comprises all activities from the conception of the desired software through to the ultimate manifestation of the software, often in a planned and organised process. It also involves authoring and maintaining the source code. [1] Research, new development, prototyping, modification, reuse, re-engineering, maintenance, and any other activities that lead to software products are also considered to be a part of software development. Requirements analysis is a crucial step in the software development process. Customers often have a general concept of the outcome they desire, but they are unsure of what the software should accomplish.
To know more about software development visit:
https://brainly.com/question/27588310
#SPJ1
Among the multitude of ways technology is inculcating itself in culture and civilization, cite and discuss one such arena where technology will have impact. Speculate such changes and back them with past or current trends.
It altered how, where, and how people worked as well as how and how they lived is one of the way of technology.
What is technology?Technology is defined as the process of applying scientific knowledge to improve the quality of human existence, or, as it is frequently referred to, to modify and manipulate the environment in which humans live. In essence, technology is used whenever we apply our scientific understanding to accomplish a certain goal.
Through the introduction of new weapons and counter-weapons, it altered the way conflicts were conducted. Numerous ways in which technology has altered civilization and history.
Thus, it altered how, where, and how people worked as well as how and how they lived is one of the way of technology.
To learn more about technology, refer to the link below:
https://brainly.com/question/9171028
#SPJ1
Build a program which should have two classes Employee and Client. Employee should be in package ACP.Employee while Client class should be in ACP.Client. Employee class should have the following data members and Functionalities
Data members:
Employee Name
Father name
Emp ID (Number)
Job Category (Teacher, Officer, Staff, Labour)
Date of birth (Date)
Education (Matric, FSc, BS, MS, PhD)
Pay scale (number)
NIC (String)
Functionalities:
SetEmpInformation
UpdateEmpInformation
DeleteEmpInformation
Search and View Emp record by
Emp ID
Employee Name
Age
Job Catagory
Client class should have main function where it may have capacity of maximum 50 Employee records and You are only allowed to use arrays(list is not allowed).
User should be given choice whether to
Add New Employee record
Update Employee Information
Delete Employee Record
Search & view Employee
BY Emp ID
By Employee Name
By Age
By Job Catagory
Choices may be taken by using Input Message dialogs.
When user selects Add New Employee record, It must be kept in mind that no Teacher can have education lower than MS while No Officer can have lower than BS, No Staff can be lesser education than FSc and Labour should be with at least Matric Education. In the same manner for the Teacher pay scale can not be lesser than 18 while for the officer it cant be lesser than 17, the staff should be in between 11 and 16 and the pay scale for labour will be in between 1 and 10.
On update Employee Information, only education payscale and Job category can be updated.
When program is closed all the records should be saved into the file named as EmpDB.dat. all the objects must be serialized into the file. When the program starts if file EmpDB.dat is already present then user should have all required choices to apply on records available in file.
You will use java serialization to implement object serialization.
Note: Inputs should be taken by using Input dialogs and View should be by using showMessageDialog.
Emp ID should be unique and should not be set by user. It should be automatically assigned and Emp ID should start from 9000.
Using knowledge in computational language in JAVA it is possible to write a code that build a program which should have two classes Employee and Client.
Writting the code:public class Employee ffffff
{
private String firstName; // instance variable that stores the first name
private String lastName; // instance variable that stores the last name
private double monthlySalary; // instance variable
// constructor initializes firstName, lastName and monthlySalary with String and double supplied as argument
public Employee (String fname, String lname, double msalary)
{
firstName = fname; // initialize firstName
lastName = lname; // initialize lastName
monthlySalary = msalary; // initialize monthlySalary
// if the monthly salary is not positive, set it to 0.0.
if (msalary < 0.0)
monthlySalary = 0.0;
} // end constructor
// method to set the first name
public void setFirstName (String fname)
{
firstName = fname; // store the first name
} // end method setFirstName
// method to retrieve first name
public String getFirstName ()
{
return firstName;
} // end method getFirstName
// method to set the last name
public void setLastName (String lname)
{
lastName = lname; // store the last name
} // end method setLastName
// method to retrieve last name
public String getLastName ()
{
return lastName;
} // end method getLastName
// method to set the monthly salary
public void setMonthlySalary (double msalary)
{
monthlySalary = msalary; // store the monthly salary
} // end method setMonthlySalary
// method to retrieve monthly salary
public double getMonthlySalary ()
{
return monthlySalary;
} // end method getMonthlySalary
// method to retrieve yearly salary
public double getYearlySalary()
{
double yearlySalary = monthlySalary * 12;
return yearlySalary;
} // end method getYearlySalary
// method to retrieve yearly salary after giving 10% raise
public double getRaiseSalary()
{
double raise = monthlySalary * 0.1 ;
double raiseSalary = ( monthlySalary + raise ) * 12;
return raiseSalary;
} // end method getRaiseSalary
} // end class Employee
See more about JAVA at brainly.com/question/12974523
#SPJ1