You are the network administrator for a company. The company's policy is that the users are allowed to set their own passwords but that they must change their password every 30 days. You have just received a call from a user who can't log on because she forgot her password. After you change her password, which of the password options listed would you set in the user's account so that she will have to change the password when she logs on using the password you assigned. True or False?

Answers

Answer 1

The above given question is incomplete as it does not contains the options that must be listed. Following are the options given for the above question:

a.

Password never expires.

b.

User cannot change password.

c.

User must change password at next logon.

d.

Account is disabled.

Answer:

Option c. User must change password at next logon.

is the correct answer.

Explanation:

In the password policy for different applications, it is the common practice that whenever the user can't access his/her account due to forgetting the password or due to hacking of its account, they are provided with the password by the network administrator so that they my log on to their profiles.

Now when the user will be notified of the new password that is changed by the administrator she must change her password at next logon so that she may secure the account and remember the new password created by herself for further logons.

i hope it will help you!


Related Questions

In general, what are reasons that someone would choose to use lossy compression? Write a brief response below including at least one example of a situation when lossy compression would be appropriate.In general, what are reasons that someone would choose to use lossy compression? Write a brief response below including at least one example of a situation when lossy compression would be appropriate.

Answers

Answer:

You can achieve better compression ratio as compared to lossless.

Lossy file sizes are very small as compared to lossless.

For example

If you want to upload a small image lossy compression can make photo 36KB that was 822Kb.

Loosely provide higher degree of  compression .

Lossy widely used JPEG method.

Most tool are available that will let you to choose the degree of compression.

If userA sends a secure message to userB using an asymmetric cryptographic algorithm, and userB sends a reply, what key is used if userA wants another user, userC to read the reply message

Answers

Answer:

The answer is Symmetric Key cryptography

Explanation:

Because this method of encryption allow both parties to use the same key and cipher to encode and decode the ciphertext.

Answer:The

The answer is User Cs uses the Public Key.

Explanation:

Public-key cryptography refers to a cryptographic system that uses pairs of keys:  one that is a private keys,which are seen only by the use and public keys, which may be used widely by different users.

The generation of such keys depends on algorithms that are cryptographic   based on mathematical problems to provide function that is one way. A strong  security only needs keeping the private key private; the public key can be openly distributed among users without compromising security.

Ensuring the uninterrupted flow of information' describes which key communications and information systems principle?
A. Security
B. Reliability, Scalability, and Portability
C. Resilience and Redundancy
D. Interoperability

Answers

Answer: C) Resilience and Redundancy

Explanation:

According to the principle of communication and information system , redundancy is the factor that maintains the continuous flow of message or data even when failure is experienced in network by adding alternate or extra component in infrastructure for support.Resilience is the factors that helps network to persist even in the state of faults by keeping the main function working and recovering the fault to maintain the flow of data.Other options are incorrect because security is protection of data. Reliability factor means dependency , scalibility is changing scale of network and portability is changing position of components. Interoperability is exchanging information with devices and making use of it.Thus, the correct option is option(C).

Answer:

C. Resilience and Redundancy

Explanation:

Robust systems are characterized by having the ability to maintain their essential performance conditions despite receiving disturbances or noise. Robustness is the ability of a system to absorb stress and continue functioning, particularly when the system is subjected to unpredictable variations in its scope of performance.

The redundancy, consisting of the duplication of the critical components of a system, is developed with the purpose of granting robustness to the systems, so that in the event of the failure of a component that could jeopardize the main task or objective of the system, there is an alternative capable of replacing the system that suffers from a failure.

Robustness or resilience is characterized by two important aspects, the first is resistance to change or flexibility that is expressed as the ability of a system to resist a disturbance without undergoing irreversible change and the second is the ability of a system to recover.

What is aperture priority mode? When might you use this mode on a camera? What is depth of field? How can you adjust the depth of field in a photograph? What is the relationship between aperture and shutter speed? How can you describe this relationship? What is the landscape mode? How does this mode adjust the aperture? What is the result of this adjustment? How is shutter speed generally measured? What do the measurements mean? How is aperture measured? What do the measurements mean? Why is learning to control aperture and shutter speed important? Which camera mode do you think you are most likely to use? Why? Have you tried to take some action photographs of people, animals, or other objects? How did the photographs turn out? What are some of the challenges with taking action photographs? What are some of the difficulties of taking night photographs? How can you reduce these challenges?

Answers

Answer:

Please check explanation

Explanation:

We abbreviate aperture priority by A or Av( which is used for aperture value) on the camera mode call up, which is an adjustment on some of the cameras which leverage the user to adjust the certain value of the aperture or the f-number as meanwhile the camera adjust the speed of the shutter ensuring it matches it, and which results in a good exposure depending on the condition of the light  as being measured via the light meter. And this is not the same as the manual mode, in which the user is compelled to make the decision for both the values, the priority of the shutter, the location the user selects the shutter speed while the camera picks up the correct aperture, as well as the program state, where camera picks each of them.

So the first two questions are answered. Let's see the third, the depth of the field.  It is the distance from the nearest to the furthest objects which provides an image being selected for being at the focus in a camera.

Hence the depth of the field means the range of the sharp focus in a certain photograph. And while you shoot with the help of the larger camera like the DSLR, you will be able to adjust the depth through the adjustment of the aperture of the lens. The aperture is nothing else but the opening within the lens which manages the amount of the light that is permitted via the lens.

Now come to the fifth question. The shutter speed and the aperture are being related directly. It improves the aperture (by a stop). And each of them comes up with the very best exposure through the permitted weight of light.

And both of them are related to each other in an inverse proportion. And both of them must be balanced for ensuring that the image is not being exposed or less exposed to the permitted light. And when the aperture is increased the shutter speed increased for balancing it as well as vice versa.

Landscape mode:

It is the kind of page orientation that prints out the picture in a horizontal manner rather than in a vertical manner. And it is being commonly used for printing the charts or various other types of pictures as well as the text which might not adjust properly with the page that is aligned vertically.

Consider the High Nikon DSLR. You need to hold down the "MODE" as meanwhile the rear control (dial)  is turned unless you view "A" over the LCD top. And your FCD then sets the aperture. And in almost all Canon SLRs as an example: You need to turn to "Av" your mode dial.

The results of these adjustments are certainly good.

And the shutter speed is being measured by the unit of time and ranges in less than fractions of one second. And as we say that the shutter speed is "5000", it means its 1/30000 th of a  minute. And the shutter speed which is of one second or more in length is being marked as a'. One example is 16'.

How we measure aperture. And what it means:

It is being measured with the help of the f-stop scale. And on the digital camera, you will find 'f/' which is being followed by an integer. And this f-number indicates the wideness of the aperture. As well as the size does affect the exposure as well as the field depth of the resultant image.

Now come to why we should learn to control the shutter speed and the aperture.

You should know that by selecting the shutter speed you permit yourself to freeze or otherwise blur motion, and sometimes you would like to do the first one or the second one. And the aperture permits you to select the field depth to either blur the background or make it sharper.

Thus, now you have an idea of each of the modes, and their merits. And if you will ask the best one, he will be up with the aperture priority or with auto ISO and full manual. If you are up with some specific requirements, then you should have a full manual mode in automatic mode, and that will be quite handy. You certainly need to learn by heart how to make use of the full manual, as it will improve your understanding of the photography, however, the semi-automatic mode is certainly your best friend.

And yes, as well as its a very great feeling. Its certainly quite hard to take the photographs of still objects while you are riding.

Some of the things that make it hard to take the action photographs are like the object, or the animal can move as well as you need to set the shutter speed as well as the aperture speed quite swiftly. Also, you need to focus your camera for ensuring a very good picture and ensure its not blurry or like the picture is out of the focus.

In night photography, the camera might shake because of the very low ambient brightness, the camera might move for very slow shutter speed. Various other challenges are the improper focus, white balances, less exposure, etc,

That solves all the questions asked.

Answer:

Select cell range B2:F29.

Select the Subtotals command under the Data menu.

In the Subtotals dialog, in the Group by dropdown list, select the option Region.

In the Calculate subtotals for field, select Country.

In the Use function field, select Count.

Click OK.

Explanation: Plato

In a Web-based database, middleware is used to transfer information from the organization's internal database back to the Web server for delivery in the form of a Web page to the user. True or False?

Answers

Answer: True

Explanation:

 Yes, the given statement is true that the web based database used the various types of database applications for transferring the information or data.

The web database applications are basically designed so that the users managed and easily access the information by using the internet. It is works as the middleware form for transferring the data from the internal database of an organization to the web server and it is known as web page for the user interface. We can store various types of business and also personal related data by using the web database.

Before programmers decide which programming language to use or start writing code, they develop a complete description of the task the program needs to accomplish. This is called a ________.

Answers

Answer:

Problem Statement

Explanation:

The problem statement is described the complete description of the task of the program. It gives a clear description of the program.

The main objective to develop a problem statement explain the program in a detailed manner The good programmer firstly create the problem statement of the program then it created the program by following the guidelines of the problem statement.

A programmer is writing a system that is intended to be able to store large amounts of personal data. As the programmer develops the data system, which of the following is LEAST likely to impact the programmer's choices in designing the structure of the system?
A. Maintaining privacy of the information stored in the data set. B. Scalability of the system. C. Structuring the metadata of the information for analysis. D. The frequency of a particular item occurring in a data set.

Answers

Answer:

D.

Explanation:

Based on the information provided within the one choice that will least likely impact the programmer's choice in design would be the frequency of a particular item occurring in a data set. This is because the system needs to be handle a large amount of data and be able to scale accordingly, regardless of how many frequent a particular item occurs.

How does Taylorism (scientific management used to streamline mass production) resemble a bureaucracy? Select one: a. Routinization is found in assembly line work as well as bureaucracy. b. Both assembly lines and bureaucracies depend on hierarchies. c. Specialization is a characteristic of both an assembly line and a bureaucracy. d. Assembly lines and bureaucracies require workers to assume a fixed role.

Answers

Answer:

C

Explanation:

thank god i've studied for this !!! :)❤

A TCP connection has reached a steady state and transmits data at a constant rate. List as many factors as you can that determine the transmission rate reached by the connection? Include the application and the operating system on both ends of the connection in your consideration.

Answers

TCP connection:

Once TCP connections reached steady state that makes end user that connectivity is stable. But end user has to do analysis the pinging time ready. for example in operating system command prompt mode ends user have  to ping designation tcpip address.

Computer A

In command prompt mode end user try ping 10.10.10.10 –t (i.e. Computer B tcpip Address). End user tries to ping destination tcpip address if result comes in milliseconds then it is good connectivity rate.

Same away

Computer B

In command prompt mode end user try ping 10.10.10.20 –t (i.e. Computer A tcpip Address). End user tries to ping destination tcpip address if result comes in milliseconds then it is good connectivity rate.

End user can also check by executing TRACERT commands on designation tcpip address.  End user can find how the flow of network packets travels.

The system cannot contact a domain controller to service the authentication request

Answers

Answer:  The correct answer is :  If it is not a DNS problem you can try to remove them from the domain by placing them in a workgroup, restart, then delete the computer trail in A / D Users & Computers, then re-enroll them in the domain and move them from the default location to their proper place in the A / D structure.

Which security technology inspects network traffic, attempting to find matches to suspected malicious or unauthorized activity based on the content of the packets, and is limited to being able to only log or send alerts on that malicious activity?

Answers

Answer:

Intrusion Detection System (IDS)

Explanation:

An Intrustion Detection System (IDS) is an application software or hardware device that monitors network traffics or systems. It searches the network or system for threats. These threats could be (but not limited to) suspicious activities or malicious activities or policy violations.

Once a threat is observed, it beeps or alerts the system administrator(s). Also, all these threats are then logged in a security information and event management (SIEM) system.

But an IDS cannot block or prevent threats on the system.

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

Answers

Answer:  

The answer is "SCMS".  

Explanation:  

MIS stands for management information systems. This system studies information systems and use in business and other organizations. This system is categories in many forms in which SCMS helps businesses manage inventories.  

The SCMS stands for Serial Copy Management System. It is a system that allows users to copy digital content by showing how much they would copy.  In this process, the user will be copying digital information via authorization flags.

Which of the following statements about constructors are true? Check all that apply.
a.A constructor is the code that is called when you use the 'new' keyword.
b.A constructor is declared without a return type.

Answers

Answer:

a. Partly True

b. True

Explanation:

(a) "new" keyword or syntax is used for the constructors while working in Perl and Moose object system for Perl.

For Visual Basics .Net, keyword "New" is used

For Python, "___new___" is used which allocates memory for instance and receives class as an argument.

For Objective-C, "alloc" and "init" are used for constructor method. "alloc" allocates memory for the instance and "init" handles the bulk of initializing the instance. Whereas, the "new" keyword calls both "alloc" and "init" for class instance.

(b) A constructor does not return any value because it is called by the memory allocation and object initialization code  in the runtime and not directly by your code.

A service-oriented architecture _________________. Question 5 options: a) Is one in which the servers are supporting multiple mobile devices b) Enables Web services to be reused across an organization c) Is a type of cloud computing d) Is focused on user response e) Places servers closest to the primary user

Answers

Answer:

Enables Web services to be reused across an organization

Explanation:

Option B is correct

The _____ is essentially the world’s largest computer network, linking hundreds of thousands of smaller networks and operating under a common set of rules for communication. a. Internet b. extranet c. cloud-based network d. intranet

Answers

Answer:

a. Internet

Explanation:

The internet is essentially the world’s largest computer network, linking hundreds of thousands of smaller networks and operating under a common set of rules for communication.

An extranet is a controlled private network that allows access to partners, vendors and suppliers or an authorized set of customers.

Cloud based networking is referred to the network communication and inter-connectivity between IT resources /application within a cloud computing infrastructure

An intranet is a computer network for sharing corporate information, collaboration tools, operational systems, and other computing services only within an organization, and to the exclusion of access by outsiders to the organization

Which line in the following program contains the header for the showDub function? 1 #include 2 using namespace std; 3 4 void showDub(int); 5 6 int main() 7 { 8 int x = 2; 9 10 showDub(x); 11 cout << x << endl; 12 return 0; 13 } 14 15 void showDub(int num) 16 { 17 cout << (num * 2) << endl; 18 } 1. 4 2. 6 3. 10 4. 1

Answers

The header for the showDub function is contained in line 4.

The header of a function in C++ is the first line where the function is declared before it is defined or called. It specifies the return type, the name of the function, and the parameters the function will take, if any. In this case, line 4, 'void showDub(int);' is where the function showDub is declared, making it the function's header. This is a forward declaration and tells the compiler what the function looks like. This allows the function to be called before it is fully defined, as seen in line 10 within the main function. The actual definition of the showDub function does not occur until line 15, where the function's operations are fully described.

In a(n) ____ design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen.A. closedB. distributedC. openD. centralized

Answers

Answer:

D. centralized

Explanation:

Centralized design is a type of computing architecture where all or most of the processing/computing is performed on a central server. Centralized computing enables the deployment of all of a central server's computing resources, administration and management. The central server, in turn, is responsible for delivering application logic, processing and providing computing resources to the attached client machines.

Therefore in centralized design, the remote user’s keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user’s screen

Final answer:

The correct answer is D. In a centralized design, a user's keystrokes are sent to the mainframe, which processes the input and sends the output back to the user's screen.

Explanation:

In a centralized design, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back to the user's screen.

This setup is typical of traditional mainframe environments, where a powerful central computer (the mainframe) handles processing and storage, while user terminals mainly serve as input and output points.

The centralized computing model contrasts with distributed computing, where processing is spread across multiple machines.

In cell c11, enter a formula to reference the date stored in cell b7. insert a nested function in cell c12 to calculate the date for the next payment. nest the year, month, and day functions within the date function. add 1 to the month result. copy the function to the range c13:c34.

Answers

Final answer:

The student needs to reference a date in one cell and create a formula for the next payment date in another cell using spreadsheet functions. In cell C11, they will reference the date with =B7, and in cell C12, they will use a nested formula =DATE(YEAR(B7), MONTH(B7) + 1, DAY(B7)) which is then copied down to subsequent cells.

Explanation:

The student is asking about how to use spreadsheet functions to reference and manipulate dates. In cell C11, the formula to reference the date stored in cell B7 would simply be =B7. For cell C12, the nested function to calculate the next payment date, adding one month to the current date, would be something like =DATE(YEAR(B7), MONTH(B7) + 1, DAY(B7)). This uses the YEAR, MONTH, and DAY functions nested within the DATE function to construct the new date. Once the function is entered in cell C12, it can be copied down the range C13:C34 to apply to additional cells. Remember, these functions and formulas are typical of spreadsheet software like Microsoft Excel ora Sheets.

You have a small wireless network that uses multiple access points. The network uses WPA and broadcasts the SSID. WPA2 is not supported by the wireless access points.
You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop? (Select two.)
a) AES encryption
b) TKIP encryption
c) Channel
d) BSSID
e) Preshared key

Answers

Answer:

b) TKIP encryption,e) Preshared key

Explanation:

The parameters that need to be configured on the laptop include the Temporal Key Integrity Protocol (TKIP) and the Preshared key. TKIP is an older wireless protocol that encrypts data at bit level. It is less secure as compared to the Advanced Encryption Standard (AES), AES works well with WPA2 which is not supported by the access point. The preshared key is the access password used on a shared secure channel. It is also used to validate users on the WiFi network. Once the two parameters are configured the laptop will have access to the network

Final answer:

To connect a laptop to a WPA wireless network, configure TKIP encryption and enter the preshared key. AES is used with WPA2 and is not applicable here, while the channel and BSSID are generally managed automatically.

Explanation:

When connecting a laptop computer to a wireless network that uses WPA and broadcasts the SSID but does not support WPA2, you will need to configure certain parameters on the laptop. Since the network uses WPA, the compatible encryption that should be set up on the laptop is TKIP encryption since AES is typically used with WPA2. Additionally, you will need to enter the preshared key, which is a secret password or passphrase used to authenticate devices and grant access to the wireless network. Channels and BSSIDs are generally managed by the access points and are not typically configured manually on client devices unless troubleshooting specific connection issues or optimizing the network.

Alison retrieved data from a company database containing personal information on customers. When she looks at the SSN field, she sees values that look like this: "XXX-XX-9142." What has happened to these records?
a. Encryption.
b. Truncation.
c. Hashing.
d. Masking

Answers

Answer:

The correct option to the following question is an option (D) Masking.

Explanation:

The following option is correct because Masking is the ability to apply mask on the value with the help of bitwise AND, OR and XOR,  

That's why, when Alison looks the Social Security Number then it looks different and this is the 9 digits of Social Security Number which is in three parts, the first part is for the area, the next part is for group number and last part is for the serial number.

What are options in the Advanced tab in the Share Workbook dialog box? Check all that apply.

Don’t keep change history
Show comments made by all users
Update changes when file is saved
Track changes for certain amount of days
Allow changes by more than one user at a time
Automatically update changes in certain time periods

Answers

All options in the Advanced tab in the Share Workbook dialog box.

Don’t keep change history Show comments made by all users Update changes when file is saved Track changes for certain amount of days Allow changes by more than one user at a time Automatically update changes in certain time periods

Explanation:

In shared workbook in advanced tab it has following options. Based on end user selection changes are applied on shares workbook.

1. Either keep the history for certain period or don’t keep the history on shared workbook.

2. On share work Save changes on period schedule (automatically update) or just see other user changes.

3. Before changes are made for share workbook either prompt for save option or last modified saved.

4.  Printer review and filter setting for personal view.

My life is a lie.

Allow changes by more than one user at a time

Automatically update changes in certain time periods

you are the server managert for your company you hae just installed a new windows server you need to design a backup and recovery strategy for the server that meets the following requirements you will use windows tools for the backups backups are to be taken to an offsiet location for storage aftrer they are performed backups should only save data changed since the lasty backup you need to be able to recover invidual files and folders whaty should you do

Answers

Answer:

We should use the Windows Server Backups options to create a scheduled backup to the drives or the removable hard disk.

Explanation:

WSB(Windows Server Backup)is referred to as it is one of the best features or options of the Windows server by which we can create backups of our data and recover that data when we have lost them.

This option provides you the full security of your files, if you create a backup of those files then you have recover them when the file will be corrupted or you lose those file

Remember that ""state space"" refers to the space of all potential possibilities. Which dichotomous questions below will successfully narrow down the entire state space of ""flipping a coin and rolling a normal six-sided die"" to 1 or fewer possible outcomes regardless of the answers given?

Answers

Answer:

Please check options are not given. Please check explanation for corrected version.

Explanation:

Options are not mentioned. Please post the complete question.

However, if "below" is removed, the question makes sense. I am taking it that way.

Dichotomous question means those questions which has two outcomes: true or false.

For the given condition, this is possible only if:

coin shows head and dice shows 1coin shows head and dice shows 2head, 3head, 4head, 5head, 6tails, and all above cases

However, each time, each mentioned condition should be strictly followed.

And fewer outcome than 1 is virtually or realistically impossible, as both coin and dice will roll out one outcome in any condition certainly.

The __________ is a center of Internet security expertise and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University.a. Bug/CERT b. Bugtraq/CERT c. CC/CERTd. CERT/CC

Answers

Answer:

d. CERT/CC

Explanation:

Option D is correct

Jed is a database administrator for a mid-sized computer component manufacturer. Part of his duties include managing security, tracking problems, and monitoring the performance of the database. This is an example of Jed's ________ tasks.

Answers

Answer:

operational

Explanation:

Based on the information provided within the question it can be said that this is an example of Jed's operational tasks. These are tasks that maintain a system and make sure that everything is running efficiently as opposed to creating something new or innovating. Which is what Jed does by monitoring and managing security and problems in order to make sure everything is running as it should be.

You have just connected a brand new workstation to your local network. As per company policy, you have used a static IP configuration. However, all attempts to reach the Internet from the workstation fail. You have verified that you can communicate with servers and other workstations on the local network, and that you are the only one having an issue reaching the Internet. What is most likely the issue?

Answers

IP addresses are unique codes identifying devices on a network broken down into Network ID and Host ID.

IP Address: An IP (Internet Protocol) address is a unique code that identifies a piece of equipment connected to a network. These addresses are used in messages between network devices like the network or wireless card in your computer and the equipment from your ISP. Each IP address can be broken down into the Network ID and Host ID.

An easy way to remember the difference between encoding and decoding within the communication process is to think of encoding as the message the sender intends to say, whereas decoding can be thought of as what the receiver actually ______.

Answers

Answer:

An easy way to remember the difference between encoding and decoding within the communication process is to think of encoding as the message the sender intends to say, whereas decoding can be thought of as what the receiver actually hears.

Explanation:

Encoding and decoding are the terms used in communication.Encoding can be defined as the process or way in which the message you want to convey is created. This means the words we expel to demonstrate that what we want to say are known as encoding. Decoding on the other hand involves the interpreting of the message. It means, understanding the message that has been sent is known as decoding.As communication process have two members say sender and receiver, so sender is associated with encoding and receiver with decoding.

i hope it will help you!

You are working on a small network. You recently created a wireless network to allow the owners laptop and mobile devices to make a connection to the wired network and the internet. However, without additional configuration, the wireless access point will allow connections from any laptop or mobile device. You need to secure the wireless network from unauthorized access.

Answers

Answer: enable network encryption to prevent authorized computer from accessing the wireless network.

Explanation:

1.open the wireless security settings on your router’s configuration page.

2. select security method you wish to use.

3.Enter a passphrase needed to access the network whenever authorizes personnel want access to network.

A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage is called a(n) _____.
- activist cyber
- agitator hacktivist
- ethical hacker
- cybersquatter

Answers

Answer:

- agitator hacktivist

Explanation:

There are various terms which are described below:

activist cyber: when a person uses online campaigning by non-violation means like social media or other online platforms to create their activism is known as activist cyber.

agitator hacktivist: when a person uses illegal ways to bring change in political point by hacking or theft the information from the internet or bring the system down is known as agitator hacktivist.

ethical hacker: when a person uses legal ways to make a system safe from any type of malicious attack by removing the weakness of the system is known as the ethical hacker.

cybersquatter: when a person buys a domain name with the vision of selling it to the company needed it at very high prices, it is known as a cyber squatter.

so, according to the scenario the most appropriate answer is agitator hacktivist.

Add a String instance variable, messageUponExiting, to the Window class. This variable will be used to display a message when the user closes the window (for example, "Are you sure you want to quit?"). Furthermore, this variable should be accessible to all subclasses of the Window class, as each sort of window may require a different message upon exiting. Please provide the declaration of the instance variable only—nothing else.

Answers

Answer:

Following are the Declaration of instance variable which is mention above .

protected String messageUponExiting; // variable declaration

Explanation:

Here we declared a variable "messageUponExiting "  as string type.The String datatype parameter will hold the string value .We can use Protected access modifier because as mention in the question the variable must be accessible  in all of the subclass of windows.

Syntax of declaring any instance variable .

Access-modifier datatype variable-name;

Other Questions
Explain the motivations behind and effects of the Homestead Acts. Which of the following variables for data about a track team is a discrete variable?a) The height of a team memberb) The weight of a team memberc) The number of times that a team member finished first in a raced) The time recorded for the last race that was run by a team membere) The time recorded for a one-mile race by a team member I need the answer and if you could please explain step by step yo / llevar / este / reloj / la semana pasada Question 2 with 1 blankcundo / encontrar / (t) / ese / corbata? Question 3 with 1 blankayer / nosotros / or / este / msica / en la fiesta Question 4 with 1 blankJuanjo / venderle / aquel / libros / a Raquel A person who weighs 685 N steps onto a spring scale in the bathroom, and the spring compresses by 0.88 cm. (a) What is the spring constant? N/m (b) What is the weight of another person who compresses the spring by 0.38 cm? 1. _____ los anuncios del peridico y _____. (Leer, guardarlos)2. _____ personalmente y _____ las casas usted misma. (Ir, ver)3. Decida qu casa quiere y _____ al agente. _____ un contrato de alquiler. (llamar, Pedirle)4. _____ un camin (truck) para ese da y _____ la hora exacta de llegada. (Contratar, preguntarles)5. El da de la mudanza (On moving day) _____ tranquila. _____ a revisar su lista para completar todo lo que tiene que hacer. (estar, Volver)6. Primero, _____ a todos en casa que usted va a estar ocupada. No _____ que usted va a hacerlo todo. (decirles, decirles)7. _____ tiempo para hacer las maletas tranquilamente. No _____ las maletas a los nios ms grandes. (Sacar, hacerles)8. No _____. _____ que todo va a salir bien. (preocuparse, Saber) Anaphora is the use of a repeated word or phrase that concludes a speech. Urges political action. Imitates the rhythm of poetry. Introduces a clause or sentence. Which new technologies expanded trade in the late 1400s? Dr. Frankenstein made a mistake during neurosurgery on his monster. After the operation, the monster "saw" with his ears and "heard" with his eyes. It is likely that Dr. Frankenstein "rewired" neural connections in the monsters______. The system of equations is graphed on the coordinate plane.y=x1y=2x4What are the coordinates of the solution to the system of equations. Read the sentence from paragraph 1.As he sat on the grass and looked across the river, a darkhole in the bank opposite, just above the water's edge,caught his eye, and dreamily he fell to considering what anice, snug dwelling-place it would make for an animal withfew wants and fond of a bijou riverside residence, aboveflood level and remote from noise and dust.What does the word remote mean as it is used in the sentence?bothereddelayed isolated reserved The double-entry system requires that each transaction must be recorded a. in two sets of books. b. in a journal and in a ledger c. in at least two different accounts. d. first as a revenue and then as an expense. 11. An accountant has debited an asset account for $1,500 and credited a liability What can be done to complete the recording of the transaction? a. Credit another asset account for S700. b. Credit another liability account for $800. c. Dredit an equity accont for $700. d. Dredit an equity accont for $800. account for $700. A student showed the steps below while solving the equation by graphing. Step 1: Write a system of equations: Step 2:Use the change of base formula to rewrite the equations: Step 3:Graph the two equations: Step 4:Identify the x-value at the point of intersection: In which step did the student make the first mistake? step 1 step 2 step 3 step 4 The second and forth pic is the answers to the first and third pic.. second pic is the answers to first pic and the forth pic is the answer for the third pic.. pancreatic and intestinal enzymes operate optimally at a ph that is slightly alkaline yet the chyme entering the duodenum from the stomach is very acid. How is the proper pH for the functioning of the pancreatic-intestinal enzymes ensured? The radius of a cylindrical water tank is 5.5 ft, and its height is 13 ft. What is the volume of the tank?Use the value 3.14 for at, and round your answer to the nearest whole number.Be sure to include the correct unit in your answer. Read the views of two modern-day historians:Historian A:The American Revolution was caused by the American colonists' greedy desire for more money. They were simply tired of paying their fair share of taxes to the British government, even though British troops protected the colonies during the French and Indian War! Furthermore, their claims to be fighting for freedom and liberty are totally wrong. Many of the colonists still owned slaves at the time of the Revolution! The traitorous American colonists simply wanted to steal land that was already claimed by Great Britain.Historian B:The American Revolution was completely justified due to Great Britain's repeated abuse of the colonists. The British passed enormous taxes on goods in the colonies, even though the Americans had no say in the British government. British soldiers were also allowed to live in American houses and eat common people's food without paying. During the Boston Massacre, British soldiers even fired their muskets into a crowd of civilians! Under such oppressive conditions, it's no wonder that the patriotic colonists would want to fight for the freedom and liberty of all people!Which statement best describes a similarity between the two historians' arguments? A.Both try to confuse the reader with unrelated details rather than making any strong claims.B.Neither can be considered a credible source because they did not experience the American Revolution.C.Neither uses any historical evidence to support his claims about the American Revolution.D.Both try to persuade the reader by only including details that support their arguments. I need help I am running out of time and I need the answers to the questions in the document Which of the following statements best explains why a city on the windward side of a mountain gets more precipitation than one on the leeward side of the mountain ?A.Cool, dry air descends and looses its moistureB. Cool, dry air rises and looses its moistureC.Warm, moist air rises and looses its moistureD.Warm, moist air descends and looses its moisture The Thirteenth, Fourteenth, and Fifteenth Amendments were all important additions to the Constitution because theyA)repealed previous amendments.B)granted more freedom to women.C)addressed issues that contributed to the Civil War.D)were passed over the objection of the majority of the states.