1. Using VPN : Using VPN changes the IP address of your computer, changing the server for VPN again and again will change the IP and thus the omegle may suspect you as a robot or someone trying to load their server traffic and thus their algorithm banns it.
2. Leaving the account logged in : Sometimes when we shut a laptop from a friends house or another computer in house we leave the account logged in and thus if the account is logged in more then 5-6 times the server may think that the account is being used by someone else and thus banns it.
Answer:
Using VPN changes the IP address of your computer.
Send a message to the site and let them know what happened, they can take the best action.
Explanation:
Which black inventor patented fifty different devices, most of them dealing with the lubrication of machines, and successfully contested claims against the genuineness of his designs?
Answer:
American engineer Elijah McCoy was born in Canada but became US citizen very young, and and made vital contributions in the United States after the Civil War such as in the progress of locomotives design and railroads in America, the automatic lubrication systems for steem engines and many other inventions among his 57 U.S. patents that made train travel more efficient.
Explanation:
Given a String variable named line1 and given a Scanner reference variable stdin that has been assigned a reference to a Scanner object, read the next line from stdin and save it in line1. (Do not concern yourself with any possible exceptions here-- assume they are handled elsewhere.)
Answer:
Scanner stdlin = new Scanner(System.in);
line1 = stdlin.readline();
Explanation:
1.stdlin is the referenced input variable made by using built in Scanner class of Java language.
2.Than in line1 the next line from the console will be assigned by using readline function.
The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program. __________
Answer: This Information Security Handbook assist and guide managers to establish and implement an information security program.
Explanation:
The handbook looks to implement adequate security programs and also to demonstrate their effectiveness.
a) True, The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program.
This handbook is published by the National Institute of Standards and Technology (NIST). Offers comprehensive advice and strategies on:
Creating effective information security policiesMaintaining effective information security practicesIntended to assist organizations in protecting their information systemsProvides detailed recommendations on:
Security controls Risk managementOther critical aspects of information securityThe NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program.
a) True
b) False
An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE. What information must be supplied to the IDE during this process? Choose 3 answers: - The environment into which the changes was deployed - The related change set connection Information - The username and password of the destination environment - The data of the fields which are being deployed - The metadata components that need to be deployed
Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.
Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.
Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.
Rejected Options :
Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.
In a class hierarchy A. The more general classes are toward the bottom of the tree and the more specialized are toward the top B. The more general classes are toward the top of the tree and the more specialized are toward the bottom C. The more general classes are toward the left of the tree and the more specialized are toward the right D. The more general classes are toward the right of the tree and the more specialized are toward the left
Answer:
Option B
Explanation:
Option A is rejected because the general behavior of the objects are the reason that the classes concept was introduced and thus the general class should be on the top.
Option B is selected because down the hierarchy the common behavior in classes are reduced and thus they became more specialized and thus the specialized classes should be bottom to the general ones.
Option C is rejected because hierarchy works from top to bottom not from left to right.
Option D is not answer because hierarchy has nothing to do with left and right.
Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is considered a consecutive duplicate. In this example, there are three such consecutive duplicates: the 2nd and 3rd 5s and the second 6. Note that the last 3 is not a consecutive duplicate because it was preceded by a 7. Write some code that uses a loop to read such a sequence of non-negative integers , terminated by a negative number. When the code finishes executing, the number of consecutive duplicates encountered is printed. In this case, 3 would be printed. Assume the availability of a variable, stdin, that references a Scanner object associated with standard input. That is, stdin = new Scanner(System.in); is given.
// Variable to keep track of array size
int length = 0;
// Array itself
int array[] = {};
// while loop will take input in the array until a negative number is entered
while(input>=0){
stdin = new Scanner(System.in);
array[length] = stdin;
length +=1;
}
// int variable to terminate while loop
int i =0;
// keep track of index of output array
int y =0;
while(arr[i] != length){
// making output array
int output[]={}; bool flag;
// put the element in out put array considering if it the desired one
output[y] = array [i];
// Now check if it was the desired?
for(int z=1;z<=length;z++){
if(array[i+z]!=output[y]){
flag = true;
}
else
{
output[y]=0;
y+=1;
}
if(array[i+z+1]=output[y] && flag == true){
output[y] = array[i];
y+=1;
}
}
//output the array
for(int o=0;o<y;o++)
System.out.println(output[o];
To solve this problem, use a loop to read the sequence of non-negative integers terminated by a negative number. Compare each number with the previous number and increment a counter if they are the same. Print the value of the counter representing the number of consecutive duplicates encountered.
Explanation:To solve this problem, we can use a loop to read the sequence of non-negative integers terminated by a negative number. We can keep track of the consecutive duplicates encountered by comparing each number with the previous number. If they are the same, we increment a counter. If they are different, we continue with the next number. Finally, we print the value of the counter, which represents the number of consecutive duplicates encountered.
A(n) ____________ for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.
Answer:
algorithm
Explanation:
A(n) algorithm for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution.
A(n) algorithm is a collection of instructions for a computer program that describes how to start with information. That is already known and is defined in a problem statement, and how to use that knowledge to modify it in order to find a solution.
What algorithm information specified in an issue statement?A set of instructions called an algorithm is what a computer must follow in order to conduct calculations or other problem-solving tasks. A formal definition of an algorithm is that it is a finite set of instructions that are followed in a particular order to complete a specified goal.
Algorithms include maths equations and recipes. Algorithms are used in programming. Algorithms power the internet, which is how all online searching is done.
Therefore, an (algorithm ) for a computer program is a set of steps that explains how to begin with known information specified in an issue statement and how to manipulate that information to arrive at a solution.
Learn more about algorithm here:
https://brainly.com/question/22984934
#SPJ5
What is drill-down capability?
Multiple Choice
a. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
b. The ability to look at information from different perspectives.
c. Finds the inputs necessary to achieve a goal, such as a desired level of output.
d. Enables users to get details, and details of details, of information.
Answer:
Enables the users to get details ,and details if details ,of information.
Explanation:
Drill - Down Capability is the capability that lets user to see more information by pointing and clicking on the specific element.For example - a report that displays literacy rate by state can allow the user to select a state and by clicking on it and user can see the literacy rate by county or city within that state.
Hence we conclude that option d is the correct answer that is
One who is capable of identifying existing and predictable hazards in the surroundings, or working conditions
which are unsanitary, hazardous, or dangerous to employees, and who has authorization to take prompt
corrective measures to eliminate them is a/n
O A. Competent person
O B. OSHA Compliance Officer
O C. Qualified person
O DOSHA Outreach Trainer
Answer:
A: Competent Person
Explanation:
An OSHA “competent person”, by way of training and/or experience, has knowledge of applicable standards and authority to stop work deemed hazardous or that may cause harm to an employee. He/she has the authority, given from above, to correct workplace hazards. Such authority sets OSHA’S competent person apart from OSHA’S qualified person.
PowerPoint displays many that are varied and appealing and give you an excellent start at designing a presentation. However, you have a specific topic and design concept and could use some assistance in starting to develop the presentation.
(A) Icons
(B) Themes
(C) Advertisements
(D) Catalogs
Answer:
The answer is themes.
Power point displays many themes
Explanation:
A power point theme is a combination of effects,fonts and colors that can be applied to the presentation.It makes the presentation more attractive and beautiful if used properly and smartly.Power point has built in themes that gives excellent start to your presentation.
Which statement is NOT CORRECT?
In a file approach to data management, the data definitions are included in each application separately.
The file approach to data management causes the same information to be stored separately for different applications.
In a file approach to data management, a change in the structure of a data file is easily handled because each application has its own data files.
In a file approach to data management, different applications could be using older and newer versions of the same data."
Option C is not correct because in file system there is problem of using same data at different place with old and new updated versions and thus change in the data on one file is not reflected on the other related files implicitly rather we will have to change the data in each file manually which is indeed not easy task. In fact that is one of the biggest drawback of file system.
Option A is correct because the files of different data has separate definitions of the topics they are about.
Option B is correct because has no reversibility and thus same data can be present on different files.
Option D is correct because because of no reversibility the files can have same records with new or old versions
Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The following methods provide these behaviors: turnOn and turnOff. Both methods accept no arguments and return no value. Assume there is a reference variable officeAC of type AirConditioner. Create a new object of type AirConditioner and save the reference in officeAC. After that, turn the air conditioner on using the reference to the new object.
//making reference object.
// the following line will declare a officeAC object of type AirAconditioner by //calling the class constructor by reference using "new" operator.
AirConditioner officeAC = new AirConditioner();
// the following line will can the method of class AirConditioner to turonOn //the AC
officeAC.turnOn();
Given a int variable named yesCount and another int variable named noCount and a char variable named response, write the necessary code to read a value into response and then carry out the following: if the character typed in is a y or a Y then increment yesCount and print out "YES WAS RECORDED" if the character typed in is an n or an N then increment noCount and print out "NO WAS RECORDED" If the input is invalid just print the message "INVALID" and do nothing else.
// reading the value in response variable
cout<<"Enter the value :";
cin>>response;
// checking the value and printing the results
if(response == 'y' || response == 'Y')
{
yesCount+=1;
cout<<"YES WAS RECORDED";
}else if(response == 'n' || response == 'N')
{
noCount+=1;
cout<<"NO WAS RECORDED";
}else
cout<<INVALID";
Final answer:
To record yes or no responses, the code reads a char input, then increments corresponding counters based on the input value, and prints out a message. The counters maintain a count and total of the responses.
Explanation:
To handle the described scenario in a programming task, we would need to write a code block that checks the value of the char variable named response and, based on its value, increments either yesCount or noCount. Let's assume we're working with a language like Java, the following code snippet would achieve the desired functionality:
Scanner scanner = new Scanner(System.in);
char response = scanner.next().charAt(0);
if (response == 'y' || response == 'Y') {
yesCount++;
System.out.println("YES WAS RECORDED");
} else if (response == 'n' || response == 'N') {
noCount++;
System.out.println("NO WAS RECORDED");
} else {
System.out.println("INVALID");
}
The code starts by waiting for the user to input a character. If the character is 'y' or 'Y', yesCount is incremented and a message is printed out. Similarly, if the character is 'n' or 'N', noCount is incremented and a corresponding message is issued. If the input is neither of these, the input is deemed invalid and an "INVALID" message is printed. This process helps in maintaining a count and total of the 'yes' and 'no' responses.
Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. A boolean variable named recalled has been declared. Given a variable modelYear write a statement that assigns true to recalled if the value of modelYear falls within the two recall ranges and assigns false otherwise. Do not use an if statement in this exercise!
//Making a variable bool to save answer
bool recalled = false;
//Making the modelyear variable
int modelYear = 0;
//taking input from user
Scanner input = new Scanner(System.in);
modelYear = input.nextInt();
//check statement to see if the input is in range
if((modelYear >=1995 && modelYear <=1998) || (modelYear <=2004 && modelYear <=2006 )
{
recalled = true;
}else{
recalled = false ;
}
Write three separate code which would use a while loop, for loop and do ..while loop to output integers 200 down to 50 with their squares listed besides the integers which increments by steps of -10
Answer:
The c++ program using for loop is given below.
#include <iostream>
using namespace std;
int main() {
int sq, i;
cout<<"Integer"<<"\t"<<"Square"<<endl;
for(i=200;i>=50;i=i-10)
{
cout<<i<<"\t"<<"\t";
sq=i*i;
cout<<sq<<endl;
}
return 0;
}
The c++ program using do-while loop is given below.
#include <iostream>
using namespace std;
int main() {
int sq, i=200;
cout<<"Integer"<<"\t"<<"Square"<<endl;
do
{
cout<<i<<"\t"<<"\t";
sq=i*i;
cout<<sq<<endl;
i=i-10;
}while(i>=50);
return 0;
}
The c++ program using while loop is given below.
#include <iostream>
using namespace std;
int main() {
int sq, i=200;
cout<<"Integer"<<"\t"<<"Square"<<endl;
while(i>=50)
{
cout<<i<<"\t"<<"\t";
sq=i*i;
cout<<sq<<endl;
i=i-10;
}
return 0;
}
OUTPUT
Integer Square
200 40000
190 36100
180 32400
170 28900
160 25600
150 22500
140 19600
130 16900
120 14400
110 12100
100 10000
90 8100
80 6400
70 4900
60 3600
50 2500
Explanation:
The integer variables sq and i are declared to hold the square and the integer respectively. The square of an integer is also a square hence, it is also declared as integer and not float.
The variable i is initialized to 200 as required by the question. All the three loops continue till value of i reaches 50. Once, the value goes below 50, loop is discontinued.
In for loop initialization, condition and decrement, all are done simultaneously.
for(i=200;i>=50;i=i-10)
In do-while and while loops, variable declaration and initialization are done simultaneously. The condition and decrement logic is contained within the loop.
This loop executes once irrespective whether the condition is satisfied or not. From the second execution onwards, the condition is taken into account.
do
{
cout<<i<<"\t"<<"\t";
sq=i*i;
cout<<sq<<endl;
i=i-10;
}while(i>=50);
The while loop is similar to do-while loop except that the while loop executes only if the condition is satisfied.
The output for all the three loops is the same hence, output is shown only once.
Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia") Write some code that reads a value into name then prints the message "Greetings, NAME" where NAME is replaced the value that was read into name.
// i am writing c++ code for the given problem...
// taking input
cout<< " Enter the name : ;
cin>>name;
// printing the message
cout << " Greetings, " << name << endl;
You are building a small network in the office. You will need to connect two different network segments that have different network addresses. What device will you use to connect them?
Answer:
Router device
Explanation:
whenever there is need to connect two networks with different IP addresses over the internet, they are connected by routers which has the ability to define these networks uniquely over the internet.
What type of slide show is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer? A. Photo album B. OLE C. Office Clipboard D. Brochure
Answer:
C. Office Clipboard
Explanation:
An Office Clipboard is a type of slide show that is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer.
Answer:
A:Photo album
Explanation:
Organizing photos into a slide show is an effective technique for a business to showcase its products and services. Rather than a static brochure, a slide show is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer. Photo album slide shows can be presented at a conference booth, online, or distributed through email.
Pete is designing a web page for a clothing company. He wants to show the different types of clothing lines available through a video. He wishes to use Adobe Flash Player to play the videos on the website.Pete wants to set the playback quality parameter of the movie where the display quality of the video is favored over the playback speed. Which of the following values of the quality parameter must he apply to accomplish this?falsetruelowhigh
Final answer:
Pete should set the quality parameter of the video to 'high' in Adobe Flash Player to prioritize display quality over playback speed.
Explanation:
Pete is designing a web page and wants to use Adobe Flash Player to play videos with a focus on display quality over playback speed. To achieve this, Pete should set the quality parameter of the video to 'high'. When the quality parameter is set to high, it ensures that the video will be displayed with the best quality possible, even if this means that the video might buffer or play back with less speed on slower internet connections or less capable devices. This setting prioritizes the visual experience for users who want to see the clothing lines with the highest image clarity and detail.
What is the most downloaded iphone application of all time?
Answer:
You
Tube is the most popular.
Pick two programming languages. Please describe: - The major differences between those two languages; and - If you were assessing an application and determining what language would be best for the programming, why you would choose each language.
First language : JAVA
Second Language : C++
Major Difference :
1. Platform Dependency :
Java is platform independent which means that its code can be run on any machine. It uses JVM ( Java virtual machine ) which converts the code in byte form and then run it which makes it flexible enough to be used on any system. So .exe file can run on any OS.
C++ is not platform independent and thus its .exe file cannot be run on different OS.
2. Objects
In JAVA everything is reference typed and is inherited from the class objects that are predefined in it.
In C++ not everything is class or reference typed.
3. Garbage Collector
Java has built in garbage collector when we use classes in java.
C++ make developer to collect garbage when he uses reference types like pointers.
Why choose Java and C++ ?
People are very confused about the platform in-dependency of JAVA, so i decided to choose Java and compared that concept with c++ which is mother of all languages.
Given an int variable n that has been initialized to a positive value and, in addition, int variables k and total that have already been declared, use a for loop to compute the sum of the cubes of the first n whole numbers, and store this value in total. Thus if n equals 4, your code should put 1*1*1 + 2*2*2 + 3*3*3 + 4*4*4 into total. Use no variables other than n, k, and total.
Explanation & answer:
We do not know which language you are using, so a pseudocode will be given, it will be similar to java or C/C++. For other languages, you can adapt to the syntax of the target language.
int n=5;
//
total = 0 // initialize variable to store total value, already declaired.
// k will be used as a dummy variable, already declared
for (k=1; k<=n; k++){
total+=k*k*k; // k*k*k works for almost all languages. adapt as needed
}
print(n, total)
Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y, the message Your request is being processed is printed if response is n, the message Thank you anyway for your consideration is printed if response is h, the message Sorry, no help is currently available is printed for any other value of response, the message Invalid entry; please try again is printed.
// Here is the required switch statement on response character
switch(response){
case 'y': // case to check if the response is y
cout<<" Your request is being processed ";
case 'n': // case to check for n
cout<<" Than you, anyway for your consideration";
case 'h': // case to check for h
cout<<"Sorry \, no help is currently available.";
default : // default case
cout<< Invalid entry: please try again.";
}
Write an if/else statement that adds 1 to the variable minors if the variable age is less than 18, adds 1 to the variable adults if age is 18 through 64, and adds 1 to the variable seniors if age is 65 or older.
Answer:
Explanation:
data is a statement like
data 10,20, 30 , 40 , 50, 60 , 70, 80
\\the numbers represent ages.
For x := 1 to end of data do a[x]:=read(data)
\\ This is a comment. You could do this much easier if you just use three if statements rather than the if then else.
minor:=0;adult:=0;senior:=0;
while a[x] <> 0 do begin
age:= a[x]
if age < 19 then minor:=minor + 1;
If age > 18 then if age < 65 the adult:=adult + 1;
if age > 64 then senior := senior + 1;
end;
I have not declared the variables anywhere. That depends on what language you are using. The key step you want are the three if statements. How you find out what's in them is another matter.
You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial?
What are the following advertising methods?
Assume that two parallel arrays have been declared and initialized: healthOption an array of type char that contains letter codes for different healthcare options and annualCost an array of type int. The i-th element of annualCost indicates the annual cost of the i-th element of healthOption. In addition, there is an char variable, best2.Write the code necessary to assign to best2 the health option with the lower annual cost, considering only the first two healthcare options.
/*
Since we have to check the first two options only as mentioned in last part of question the loop will work 2 times only and will compare the cost of first element and second and assign the healthoption accordingly
*/
for(int i =0;i<=1;i++){
if(annualCost[i]<annualCost[i+1]
best2 = healthOption[i]
else
best2 = healthOption[i+1]
}
Joan owns a dog walking business and read a blog post that explained search engines are a great place to generate ideas on what people are searching for. Joan starts off her research by typing in 'dog walking tip' to see what insight she can find. Fill in the blank: Joan notices that when she types in 'dog walking tip' the search engine offers some helpful suggestions on popular searches, like 'dog walking tips and tricks.' This is known as _________.
related searches
autocomplete
suggestion finder
Google search queries
Answer: autocomplete
Explanation:
autocomplete is a feature of the search engine whereby it it able to complete sentences we type based on our browsing or surfing experiences. It has a database that store all related words and phrases people use and when we type any words it provides us hints in respect of what we type next.
On which tab are import and export commands located in Access? A. Home B. Database Tools C. External Data D. Create
Answer:
C. External Data
Explanation:
On the External Data tab, you can find import and export commands located in Access.
The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.
Answer:
Basic
Explanation:
The 3rd generation programming language that most students learned when most computers used MS DOS was basic. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.
The 3rd generation programming language widely learned during the dominance of MS-DOS was C. It remains a popular language due to its safety in using third-party code and its compatibility with other languages.
Explanation:The 3rd generation programming language that most students learned when most computers used MS-DOS was C. C language remains a safe programming language for using third-party code and provides a coding standard that integrates easily with other programming languages. This language is widely recognized for its efficiency and control. It's also notable for its capability to produce programs that are more compact and run faster than those written in other languages.
Learn more about Programming Languages here:
https://brainly.com/question/32924876
#SPJ2
1. You want to find if TCP/IP Services are working properly on your Computer, you would use which command? a. PING LOCALHOST b. IPCONFIG /STATUS c. NETSTAT LOOPBACK
Answer:
Option A
Explanation:
Option B is rejected because it is used to get the startup network settings, processes extra features used by the network.
Option C is rejected because it is used to check the stats like ping,fps of the network by using a loop back.
Option A is selected because PING command is used to check the data packets transfer rate between two ends using ICMP protocol. Local host means that you are specifying the one end as your side. If the packets are there then it is working else the IP service is down.