isten
Dria is sending files to be printed on a printing press from a program like Adobe InDesign. Which files should Dria
include to ensure proper printing of all items?

Select all that apply.

- native InDesign file
- IDML file
- low resolution, watermarked -images
- placeholder text
- Linked images

Answers

Answer 1

Printing of the highest caliber is crucial for branding, marketing, and other company endeavors. In actuality, they are crucial to a company's success. A company's branding is their opportunity to make the best first impression; high-quality printing will not be disregarded. Thus option A, D,E is correct.

What ensure proper printing of all items?

The most common unit of measurement for print quality is DPI, which is quite similar to how pixels are defined in terms of digital images and even screen resolution.

Therefore,  DPI is the same as a printer's capacity to duplicate the quantity of pixels or the resolution of the original picture.

Learn more about printing here:

https://brainly.com/question/29851169

#SPJ1


Related Questions

a(n) _____ is a device that connects a user to the internet.

Answers

A modem is a device that connects a user to the internet. Therefore, the correct answer option is: B. modem.

What is a modem?

In Computer technology, a modem can be defined as a type of networking device that is designed and developed to convert the signals from the wire such as a telephone line, so that data can be sent and received by a computer.

In Computer networking, a modem simply refers to a network connectivity device that must be used by an end user to access the Internet through an internet service provider (ISP) or the Public Telephone Service Network (PSTN).

In this context, we can reasonably infer and logically conclude that a modem is a device that is designed and developed to connect an end user to the Internet.

Read more on modem here: brainly.com/question/7320816

#SPJ1

Complete Question:

A(n) _____ is a device that connects a user to the internet.

group of answer choices

drafter

modem

cookie.

write a line of java code that will declare a double variable named password that is initialized to the value 86.12.

Answers

A line of java code that will declare a double variable named password that is initialized to the value 91 is int passward= -91.

In assembly language, one machine instruction is typically created from one line of code. One line of code in a high-level language like C++ or Java produces several machine instructions in the form of assembly language instructions.

A class named Main is defined in the first line. Every line of Java code that is capable of execution must be contained within a class. A class named Main is declared in this line, and since it is public, any other class may access it.

A new line in Windows is indicated by the character "rn," sometimes known as a Carriage Return and Line Feed, or CRLF. Java makes it easy to add new lines by simply appending "n", "r", or "rn" to the end of our string.

Know more about Java here:

https://brainly.com/question/12978370

#SPJ4

which statement allows you to properly check the char variable code to determine whether it is equal to a c, and then output this is a check?

Answers

"This is a check," cout (if (code=='C'));

(if (code=='C')

cout<< "This is a check\n";)

What clause determines the program's branching by using the value of a variable or expression?

Where the program branches depends on the value of a variable or an expression, which is handled by the switch statement. In place of lengthy if statements, switch case statements are used. The switch statement uses multiple ways to branch.

What operators are utilized to determine whether a value or variable is a part of a sequence or not?

Check whether a value is present in a sequence using the "in" operator. Whether a variable is found in the given sequence will determine whether the evaluation is true or false.

To know more about operator visit :-

https://brainly.com/question/29696241

#SPJ4

what is the purpose of the oculus in the pantheon? to provide support to the massive columns it is strictly a decorative feature to let light in the interior of the structure to provide support to the dome

Answers

The oculus in the pantheon is primarily a decorative feature to bring light into the interior of the edifice to support the dome; its primary function is to support the heavy columns with light security.

The sole light enters the Pantheon through a circular hole known as the oculus. The oculus's main function was to light up the interior for security of the temple, but it was also designed to allow people to look up at the stars. Over the years, a number of tales, astrological investigations, and oddities have developed around the Pantheon's oculus. A mediaeval folktale claims that the devil escaping from God's temple was responsible for its creation. The oculus's function is to provide natural light for the pantheon.

Learn more about security here

https://brainly.com/question/28112512

#SPJ4

The complete question is -

what is the purpose of the oculus in the pantheon?

you need to install wireless on multiple floors of a large building and maintenance area. what is your first concern before installing the aps?

Answers

If I need to install wireless on multiple floors of a large building and maintenance area, Channel overlap has to be my first concern before installing the aps.

What is Interference in WiFi networks?

Due to the 2.4GHz radio spectrum's open transmission, there are numerous issues that have a negative impact on WiFi signal quality. This implies that unlike mobile telephony, where licenses costing millions of dollars are necessary, there is no requirement for authorisation in order to broadcast on it.

As a result of its widespread use, wireless interference between devices increases.

There are 2 main causes for these interferences unless there are many devices connected to the network, usually no more than 50 depending on the router or access point

1. Being on the same or nearby channels as other WiFi networks is known as channel overlap.

2. 2.4GHz-emitting devices that are not WiFi-compatible, such as cordless phones, Bluetooth, Zigbee, and microwaves.

The signal strength is a deciding element when it comes to being influenced by these interferences, despite the fact that these causes, regrettably, virtually always occur.

To know more about WiFi networks, visit: https://brainly.com/question/26956118

#SPJ4

Which is not an example of CUI?.

Answers

Government-owned or created information, or CUI, must be protected and disseminated in accordance with applicable laws, rules, and government-wide policies.

What is Controlled unclassed information?CUI is not a sensitive piece of data. Unless it was made for or included in requirements connected to a government contract, it is not business intellectual property. CUI is the easiest target for attackers because it is subject to less restrictions than classified material. One of the biggest threats to national security is the loss of aggregated CUI, which directly affects the lethality of our warfighters. DoD Instruction 5200.48 assigned DCSA eight CUI-related duties in March 2020. DCSA created an implementation strategy to carry out these duties during the first half of 2021, and it will operationalize in stages.The rule's purpose is to ensure that all organizations handle information in a consistent manner. A Conversational User Interface (CUI) is a user interface that allows computers to interact with people through voice or text, simulating natural human communication. Natural-Language Understanding (NLU) technology can recognize and analyze conversational patterns in order to interpret human speech. CUI must be kept in secure locations that prevent or detect unauthorized access. At least one physical barrier, such as a cover sheet or a locked bin/cabinet, must protect printed CUI documents.

To learn more about CUI refer to:

https://brainly.com/question/13629038

#SPJ1

the assignment of roles and responsibilities to different actors in a program is known as what type of design?

Answers

Responsibility-driven design is another term for the process of allocating roles and duties to various participants in a program.

In the Unified Modeling Language, a collaboration diagram—also called a communication diagram—illustrates the connections and interactions between software elements (UML). These diagrams may be used to define each object's function as well as the dynamic behavior of a specific use case. Each variable (and every other named thing) in most programming languages has a defined scope that can change inside a particular program. The section of the program's text for which a variable's name has significance and for which it is considered to be "visible" is known as the variable's scope.

To learn more about Responsibility-driven design click the link below:

brainly.com/question/12974586

#SPJ4

software programs that work without direct human intervention to carry out specific tasks for individual users, business processes, or software applications, are called

Answers

Intelligent agents are software programs that operate without direct human input to complete specified tasks for individual users, corporate processes, or software applications.

A software package includes a number of computer programs as well as related documentation and data. In contrast, hardware is what the system is made of and what actually does the work.

Executable code, which is the most basic form of programming, is made up of machine language instructions that are supported by a single processor, most often a central processing unit (CPU) or a graphics processing unit (GPU). Machine language is made up of collections of binary values that represent instructions for the processor to change the state of the computer from its previous state. An instruction, for instance, might have an effect that the user cannot see directly, such as altering the value kept in a particular storage place in the computer. Another option for instruction is to use one of the various input or output operations.

Learn more about software here:

https://brainly.com/question/2919814

#SPJ4

if an encryption key is compromised, it must be replaced. if few people know the key, then replacing it is easier than if a large number of people know the key. which design principle is this an example of?

Answers

the design is a key of compromised, it must be replaced its an example of common design

you can use javascript to make sure information displayed in one frame is properly associated with the information in another frame true pr false

Answers

True, Javascript can be used to ensure that data displayed inside one frame is correctly related to data displayed in another frame.

What is Javascript?
Javascript
is a programming language used to create interactive web applications. It is a scripting language that runs in the browser and can be embedded into HTML. Javascript enables web developers to create dynamic and interactive websites or web applications. It is a client-side language that runs on the user's browser and can be used to create interactive elements like menus, forms, and games. It is also used to create animated graphics and effects, and to process user data. Javascript is an essential component of modern web development and is used to create complex and interactive web applications. It is also popular in back-end development, as it is often used to build server-side applications. It is one of the most popular scripting languages and is used by millions of developers worldwide.

To learn more about Javascript
https://brainly.com/question/28452505
#SPJ4

security issues are inevitable for your network. what type of policy includes a comprehensive set of steps that outline the proper response?

Answers

An extensive list of actions that define the appropriate reaction is included in incident response policies.

What policy lays out limitations and general principles for how the network should be used?

A document called an acceptable use policy (AUP) specifies the rules and procedures that a user must accept in order to use a corporate network, the internet, or other resources. Many companies and educational institutions demand that staff members or students sign an AUP before receiving a network ID.

What stage of a system life cycle is typically used in a network?

What stage of a system life cycle is typically used in a network? The steps of the life cycle that are often followed are conceptual design, preliminary system design, detailed design and development, production, and construction.

To know more about response policies visit :-

https://brainly.com/question/11262183

#SPJ4

what is the single most important feature of stream encryption that could prevent reused key streams

Answers

The single most important feature of stream encryption that could prevent reused key streams is incorporating nonce.

What is nonce?

Nonce is a randomly generated number or pseudo-number that been used in communication system to prevent the old communications to be reused. The nonce is issued by authentication protocol.

Encryption is a protocol to scrambling the data to prevent anyone to read or understand the information. Only authorized parties can read and understand the information with decryption method.

In stream encryption, encryption combines data with a pseudo number known as a keystream by using a nonce so that the same keystream will not be reused and will only use a new pseudo number.

Learn more about encryption here:

brainly.com/question/9979590

#SPJ4

1. Explain the team Disk Defragmenter, and give two advantages of this feature​

Answers

Disk Defragmenter is a utility that is built into the Windows operating system. It is designed to optimize the performance of a hard drive by rearranging the data stored on it so that it is organized more efficiently.

Here are two advantages of using Disk Defragmenter:

Improved performance: When a hard drive becomes fragmented, it can take longer for the computer to access and retrieve files. Defragmenting the hard drive can help improve the speed at which the computer accesses and retrieves data, resulting in better overall performance.

Increased lifespan: Defragmenting a hard drive can also help extend its lifespan. When a hard drive becomes heavily fragmented, it can put extra strain on the drive's mechanical components, which can lead to wear and tear. By defragmenting the drive, you can help reduce the amount of strain on these components, potentially prolonging the life of the drive.

It's worth noting that modern solid-state drives (SSDs) do not require defragmentation because they do not suffer from the same performance issues as mechanical hard drives.

create a 4x4 array of elements and add the diagonal elements. write an assembly code for the program

Answers

Below is the assembly code for the program to create a 4x4 array of elements and add the diagonal elements.

Coding Part:

.data #variable declaration section

   #matrix of 4x4 size with 1-16 values

   matrix: .word 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16

                 

   sumStr: .asciiz "sum:"

.text #code section

   main: #main program starts from here

   

       li $s0,0 #$s0(sum of diagonal) = 0 

       li $s1,4 #$s1(rows)=4

       li $s2,4 #$s1(column)=4

       la $s3,matrix #$s3 = address of matrix

       li $t0,0 #outer loop counter $t0 =0

       

   forLoop:

       #if $t0(row counter) equal to number of rows($s1) jump to printSum label

       beq $t0,$s1,printSum

       li $t1,0 #column counter $t1=0

       InnerLoop:

           #if column counter $t1 equal to number of columns($s2) jump to endOfInnerLoop label

           beq $t1,$s2,endOfInnerLoop

           beq $t0,$t1,addElement #if row counter equal to column counter jump to add element label

           add $t2,$t0,$t1 #t2 = row counter +column counter

           addi $t2,$t2,1  #$t2 =$t2+1

           beq $t2,$s2,addElement #if $t2 equal to number of columns jump to add Element label

           j skip #jump to skip label

           

       addElement: #addElement label 

           mul $t3,$t0,4 #$t3 = rowCounter*4(4 is word size in bytes)

           mul $t3,$t3,$s1 #t3= $t3*number of rows

           addu $t3,$t3,$s3 #t3 = $t3+base address of matrix

           mul $t4,$t1,4 #$t4 = columnCounter*4(4 is word size in bytes)

           addu $t3,$t3,$t4#t3 = $t3+t4

           #final formula is t5 =  matrix[rowcounter][column counter]= base address+(rowCounter*num. rows)+colucoun

           lw $t5,0($t3)

           add $s0,$s0,$t5 #sum  =sum +$t5

       skip:

           addi $t1,$t1,1 #increment inner loop counter by 1

           j InnerLoop

       

   endOfInnerLoop:

       

       addi $t0,$t0,1 #increment outer loop counter by 1

       

       j forLoop #jump to forLoop label

   printSum:

       #print sum string on console

       la $a0,sumStr #$a0 = address of sumStr

       syscall

       #$a0 = s0 (sum)

       move $a0,$s0 

       li $v0,1 #syscall 1 is used to print an integer.

       syscall

       

       #terminate program

       li $v0,10 #syscall 10 is used to terminate the program

       syscall 

To know more about array of elements, visit: https://brainly.com/question/19634243

#SPJ4

explain how an sql injection attack works and what types of systems are vulnerable to this type of attack.

Answers

A online application or website is susceptible to a SQL injection attack if it makes use of SQL databases like Oracle, SQL Server, or MySQL. In order to acquire critical business or personally identifiable information (PII), hackers utilize SQL injection attacks, which ultimately exposes more sensitive data.

Additionally, one of the most prevalent kinds of injection attacks is SQL injection. An attacker uses the program to provide malicious SQL statements to carry it out. These manage the database server in the background. The technology being utilized for the underlying application has no bearing on SQL injection. Any website or online application that makes use of a SQL database, such as MySQL, Oracle, SQL Server, or another one, may be vulnerable to a SQL Injection flaw. Your sensitive data, including customer information, personal information, trade secrets, intellectual property, and more, might be accessed by criminals without your permission.In an injection attack, an attacker feeds a program with questionable input. An interpreter will process this input as part of a command or query. This in turn modifies how that software is run.

To learn more about SQL databases click the link below:

brainly.com/question/29417398

#SPJ4

the small publishing company you work for wants to create a new database for storing information about all of their author contracts. what factors will influence how you design the database?

Answers

Establishment of a good data model, Which data is important, Possible technical difficulties, Contracts management, Consistency with other databases.

A database is a structured collection of data that is often stored electronically in a computer system. A database management system often controls a database. A database system often abbreviated to just database comprises the data, the DBMS, and any applications connected to them.

To facilitate processing and data querying, the most prevalent database types in use today typically describe their data as rows and columns in a set of tables. The information can then be easily accessible, managed, changed, updated, regulated, and structured. For writing and querying data, most databases use the structured query language (SQL).

Learn more about databases here:

https://brainly.com/question/6447559

#SPJ4

a strip of film- or digital images- produced by a single continuous run of the camera that is the basic unit with which the editor works is called a ...

Answers

The fundamental unit with which the editor works is a shot, which is a strip of film or digital images created by a single continuous run of the camera.

What is editor?
An editor is a person responsible for revising, correcting, and preparing written material for publication. They may work with text, images, audio, or video, depending on the type of publication. Editors are responsible for ensuring the accuracy, quality, and completeness of the material before publication. They may review and edit the material for grammar, punctuation, clarity, and readability. They may also suggest changes to the material to make it more effective or interesting. An editor must also be familiar with the company’s style guide and make sure the material follows it. They must also be aware of the company’s copyright policies to ensure that the material does not infringe on any other person’s rights. Editors often work with authors to help them craft their stories and make them more meaningful. Finally, when the material is ready, the editor is responsible for submitting it to the publisher or other outlet.

To learn more about editor
https://brainly.com/question/28423864
#SPJ4

a 12-bit analog to digital data acquisition module has an input range of 0 vdc to 10 vdc. calculate the least significant bit.

Answers

A 12-bit analog to digital data capture module may accept input voltages between 0 and 10. The least important bit is 2.441 millivolts.

The objective is to find the following and calculate the least significant bit

given,

A 12-bit analog to digital data N=12

The input range of 0vdc to +10vdc

LSB of DAC=[tex]V_{ref} (+)-V_{ref}(-)[/tex]

Here, N=12

[tex]V_{ref}[/tex](+)=10V

[tex]V_{ref}[/tex](-)=0

CSB of DAC=10-0/12

                   =10/4096

                   =2.441

∴CSB of DAC=2.441 mV

Digital data is information that, in information theory and information systems, is represented as a series of discrete symbols, each of which can only take one of a limited set of values from an alphabet, such as a letter or a number. Using a text document as an example, which is made up of a long string of alphabetic characters Modern information systems most frequently use binary data, which is a string of binary digits (bits) that can each have one of two values, either 0 or 1. Binary data is the most prevalent type of digital data and is represented by a binary digit (bit) string.

A value from a continuous range of real numbers is used to represent analog data, in contrast to digital data, which is represented by a digital value. A continuous analog signal, which also takes on the form of analog data, transmits it.

Learn more about Digital data here:

https://brainly.com/question/11983430

#SPJ4

What would happen if the move with buttons block was not included in the
program shown?
on start
set mySprite. to sprite
move mySprite with buttons
of kind Player
set banana to sprite C of kind Food
on sprite of kind Player overlaps otherSprite of kind Food
set banana position to x pick random 8 to 168 y pick random 10 to 120
OA. There would be only one sprite instead of two.
B. The player would be unable to enter an input.
OC. The first sprite would be a still object, not a variable.
D. The variables' movement would be entirely random.

Answers

The thing that could happen if the move with buttons block was not included in the shown is option B. The player would be unable to enter an input.

What is the program about?

If the "move with buttons" block was not included in the program, the sprite (presumably the player character) would not be able to move in response to input from the player. This means that the player would not be able to control the sprite's movement, and the sprite would remain stationary on the screen.

Additionally, the "overlaps" block would not be triggered because the player sprite would not be able to move and overlap with the other sprite (the food sprite). This means that the position of the food sprite would not be reset, and it would remain at its initial position on the screen.

Therefore, the game would not function as intended if the "move with buttons" block was not included in the program. It would essentially be a static screen with a stationary sprite and no way for the player to interact with the game.

Learn more about program from

https://brainly.com/question/1538272
#SPJ1

Not a graded question but how do I fix this error on Strongmind?


It keeps popping up on workbooks and checkpoints specifically, if anyone could help me with this that would be amazing, as I cannot continue my lessons until I fix it. I tried restarting my computer, clearing my cache, and switching to a different browser. I also e-mailed my teachers but it's pretty late and I'm not sure they'll respond.

Answers

Explanation:

delet the browser and open again

Question 1 of 20
Which of the following is an example of intellectual property?
OA. Pages of a book
OB. Journal of ideas
C. Lines of a poem
OD. New version of a novel
SUBMIT

Answers

Answer:

C

Explanation:

Answer:

C. Lines of a poem

Explanation:

Figured out the hard way

you are troubleshooting an older wireless network that is running wireless g (802.11g). this network appears to have a lot of collisions and interference. you look up the configuration on two of the three access points in the areas and see they are using channel 1 and channel 6. to prevent interference and ensure non-overlapping of the channels, what channel should the third access point utilize?

Answers

To prevent channel overlap, the third access point should use channel 11.

Are access points secure?

Modern access points have encryption already installed. If a strong enough password or passphrase is provided, the second and third generation encryption techniques, WPA and WPA2, are deemed secure. The first generation encryption scheme, WEP, proved to be simple to crack. Using RADIUS and other authentication servers, certain Access Points allow hotspot-style authentication.

Can an access point handle a certain number of wireless stations?

Access points typically enable 1-3 Mbps connectivity across distances of up to around 3 kilometers for spread spectrum communication in the 2.4 GHz band. A cell is the region that an access point covers. Generally speaking, an AP may support 15 to 25 wireless stations.

To know more about channel visit :-

https://brainly.com/question/18007468

#SPJ4

Channel 11 should be used by the third access point to avoid channel duplication.

Access points: Are they safe?

These days' access points are equipped with encryption. The second and third generation encryption methods, WPA and WPA2, are regarded as secure if a strong enough password or passphrase is given. WEP, a first-generation encryption method, proven to be easily cracked. Some Access Points support hotspot-style authentication using RADIUS and other authentication servers.

How many wireless stations can an access point support at once?

In the 2.4 GHz band, access points generally allow connectivity at speeds of 1-3 Mbps at distances of up to around 3 kilometers. An access point's coverage area is referred to as a cell. Typically, an AP may accommodate 15 to 25 wireless stations.

To know more about channel visit :-

brainly.com/question/18007468

#SPJ4

developer designed a process in uipath studio that is best-suited for a simple and linear process. which studio workflow type was used? review later flowchart sequence

Answers

A developer created a process in uipath studio that functions best as a straightforward, linear procedure. It was a sequence studio workflow type.

To put it simply, a functions is just a "chunk" of code that you can reuse rather than having to write it out repeatedly. Using functions, programmers can divide an issue into smaller, more manageable chunks, each of which can carry out a specific function. The specifics of a function's operation are almost impossible to remember once it has been built. This method of abstracting the details enables the programmer to concentrate on the larger picture.

(Some function types may also be referred to as subroutines or procedures. Later in this phase, we'll define this distinction; however, for the remainder of the course, we'll just refer to them all as functions.)

A function can be used whenever it is needed after being defined by a programmer.

Learn more about functions here:

https://brainly.com/question/27797076

#SPJ4

are tools that track the memory usage, status, and errors of currently running software. a. system information lists b. auditing instruments c. patch finders d. process managers

Answers

Process managers are tools that track the memory usage, status, and errors of currently running software. Hence option D is correct.

What is the role of a process manager?

The field of business process management involves using a variety of techniques to identify, model, analyze, measure, improve, optimize, and automate business processes. Any combination of techniques used to oversee the business operations of an organization is seen as BPM.

Therefore, one can say that a person who is a Process Manager, often referred to as the Process Development Manager, is in charge of seeing a product through to production while making sure that all technical requirements are met and that the product generates a profit that is acceptable to the organization.

Learn more about process managers from

https://brainly.com/question/1276995
#SPJ1

You are the administrator of a server, and you have root privileges. The it manager has asked you to install the cups package to enable printing on the server. In this lab, your task is to complete the following: use dnf to install the cups package. After the installation is complete, print the sales document in /home/wadams

Answers

To install the cups package, type dnf install cups and press Enter at the prompt.

In order to confirm the installation, press Y and then Enter.

To print the sales document, enter lpr /home/wadams/sales and press Enter.

What is a cups package?

CUPS was created in 1997 by Michael R Sweet at Easy Software Products, with the first beta release on May 14, 1999. Soon after, Till Kamppeter began packaging CUPS for Mandrake Linux and developing the Foomatic CUPS drivers, which aided in the adoption of CUPS for printing on Linux. In 2002, Apple licensed CUPS for macOS, and in February 2007, Apple bought CUPS and hired Michael to continue its development as an open source project.

Michael left Apple in December 2019 to launch Lakeside Robotics. In September 2020, he collaborated with OpenPrinting developers to fork Apple CUPS in order to continue its development. Today, Apple CUPS is the CUPS version included with macOS® and iOS®, whereas OpenPrinting CUPS is the CUPS version being developed by OpenPrinting for all operating systems.

To know more about OpenPrinting, visit: https://brainly.com/question/27962260

#SPJ4

in an interview, max was asked to tell one difference between a software firewall and a virtual firewall. how should max answer?

Answers

Max could answer one difference between a software firewall and a virtual firewall as software firewalls are locally installed on a device, whereas virtual firewalls run in the cloud.

In the field of computers and technology, software firewalls can be described as type of firewalls or protection systems that are present locally inside the computer. The software firewalls are installed in the computer using a hard-ware device such as a compact disk or by downloading them from the internet. The software firewall protects the internal folders of the computer.

On the other hand, a virtual firewall can be described as a security firewall that is used for online protection of your resources such as protection of the cloud of the user.

To learn more about firewall, click here:

https://brainly.com/question/13126092

#SPJ4

which scaled agile framework coordinates multiple scrum teams and integrates their work to create one larger, cohesive deliverable?

Answers

Nexus is a scaled agile framework that coordinates multiple scrum teams and integrates their work to generate one larger, cohesive deliverable.

Agile is a responsive and iterative software development methodology.  Nexus is an agile framework that is based on Scrum and used for scaling Scrum. The nexus scaled agile framework guides several Scrum teams on how to work together to produce results in every sprint. Nexus framework uses an iterative and incremental strategy to scale software development. Nexus lies on the basis of scaling that minimizes cross-team integration and dependencies issues.

You can learn more about agile framework at

https://brainly.com/question/27873158

#SPJ4

if a polymorphic pointer is used to access a new member of a derived class (a member that does not exist in the base class), what will happen?

Answers

No, even when pointing to an instance of a derived class, you cannot access any members of derived classes using base class pointers.

However, those values are accessible via derived class methods. Make careful to declare the methods in your base class as virtual. The public and protected members of a base class can be called in order to access the private members, which are never directly available from derived classes. Because a pointer is a type of base class and may access all of the public functions and variables of the base class, it is referred to as a binding pointer.

Learn more about variables here-

https://brainly.com/question/13375207

#SPJ4

the conditional and operator in java, c++, and c# is ____.

Answers

The conditional and operator in Java, C++, and C# is &&.

" && " is a logical operator that performs a logical AND operation on its operands. It returns true if both operands are true, and false if either operand is false.

     For Example;

                   if (x > 1 && y > 1) {

                   // both x and y are greater than 1

                    }

In the example above, the code inside the curly braces will only be executed if both x and y are greater than 1. If either x or y is not greater than 0, the code will not be executed.

The conditional and operator is often used in conjunction with the conditional or operator " || " to create more complex logical expressions.

To find more on conditional operators, look into:

brainly.com/question/29949119

#SPJ4

the person primarily responsible for identifying user requirements and designing an information system to implement these requirements is called a(n): group of answer choices systems analyst end-user computer programmer technical writer

Answers

An information technology (IT) expert with a focus on the analysis, design, and implementation of information systems is known as a systems analyst.

What part does a system analyst play in system analysis and design?

The system analyst is a person who has a good understanding of the system and who directs the system development project by providing the right instructions. He is a professional with the interpersonal and technical abilities to complete the growth duties necessary at each phase.

What is a system analyst's job?

Systems analysts examine how well software, hardware, and the larger IT system meet the business needs of an employer or a client. They create the specifications for new systems, and they might even aid in their implementation and monitoring of performance. Examining current systems is one of the duties of the position typically.

to know more about System analysis visit;

https://brainly.com/question/13567536

#SPJ4

Other Questions
you are considering whether to enter a holiday lights display contest that pays $1,000 to the winner. state whether each of the following constitutes private costs, private benefits, external costs, or external benefits. A stock's beta measures the:A) market risk premium on the stock.B) average return on the stock.C) sensitivity of the stock's returns to those of the market portfolio.D) difference between the return on the stock and the return on the market portfolioC Write a balanced equation for the double-replacement precipitation reaction described, using the smallest possible integer coefficients. A precipitate forms when aqueous solutions of cobalt(II) chloride and potassium hydroxide are combined. Use the pull-down boxes to include states such as (8) or (aq). Look at the figure Fiscal Policy Choices. If the government uses discretionary fiscal policy for the economy in panel (a) when real GDP is Y1, government spending is likely to be _____ and taxes are likely to be _______.1.) increased; cut2.) increased; increased3.) reduced; cut4.) reduced; increased1.) increased; cut during times of relaxation, the division of the autonomic nervous system utilizes discrete and localized innervation, stimulating only one or a few structures at the same time. The federal reserve can lower the money supply by conducting open-market group of answer choices purchases or by lowering the discount rate. sales or by raising the discount rate. sales or by lowering the discount rate. purchases or by raising the discount rate. next engineers may issue subjective and partial statements if such statements are in writing and consistent with the best interests of their employers, clients, or the public..A.TrueB.False in 1492, the native american population: group of answer choices lived exclusively in villages of no more than 1,000 individuals. declined catastrophically due to exposure to the black plague. lived mostly in central and south america. was at least 100 million. activities or behaviors that have the potential to be seen as violating gender norms in some way are called which of the following? 4. Choose all the equations that are trueif x = 8.A. 0/x = 6//B. x +11.5 = 20.5C. 23.42 - x = 15.42D. 11x = 88E. 40 x = 6 given that s is the central atom, draw a lewis structure of osf4 in which the formal charges of all atoms are zero. of these business management systems, which one is focused on how managers can develop a lasting relationship with individual customers that promotes long-term buying? What does the expression ymx help you find? select all that apply. pervades entire Biblevery specific in many casesoften deal with events far in the future and kingdoms that do not exist yetfulfillment constitutes a supernatural actCharacteristics of Biblical prophecy include: Complete the given reaction which is part of the electron transport chain. The abbreviation abbreviation for the product. represents coenzyme Q. Use this FADH,+Q- The reactant that is reduced is In complex III, electrons are transferred from coenzyme Q to cytochrome C, which contains iron. QH; +2 cyt (Fe) Q+2 cyt (Ft) +2H+ Determine the oxidation number for iron on the right side of the reaction arrow Kane i training for a marathon. He tart running 3 mile during every training eion. Each week he plan to increae the ditance of hi run by 1/4 mile. Let w be the number of week. Write an expreion to how the ditance Kane run in a training eion after w week Select the graph for the solution of the open sentence. Click until the correct graph appears.5|x| + 3 < 18 The financing cycle includes procedures for authorizing, executing, and recording transactions that involve: (Select all that apply)a. mortgagesb. deferred taxesc. unearned revenuesd. bank loanse. capital stock PLEASE HELP!! Find c.Round to the nearest tenth: Read this passage and then answer the following question.sta es la familia Rosario. La mam es muy simptica. El pap trabaja mucho. Nancy limpia la casa y Pablo ayuda a su mam. Todos ellos son muy felices.How many members are there in the Rosario family?