A ____ risk assessment evaluates threats to and vulnerabilities of the network.

Answers

Answer 1

Answer:

Vulnerability

Explanation:

Vulnerability refers to a weakness in your hardware, software, or procedures


Related Questions

E-commerce Web sites can use many different hardware architectures to divide the work of serving Web pages, administering databases, and processing transactions.
Discuss in detail the TWO (2) types of web architectures generally used in ecommerce websites.

Answers

The two type of web architectures generally used in ecommerce websites are the business logic and the customer side application.

What are web architectures?

Web architectures are defined as a system that controls the communication between application components. The interconnections between web applications, databases, and middleware technologies are referred to as web application architecture.

The user interface is executed on the client side, which is the first, and database data is stored on the server side, which is the second. The business logic and the customer-side application are two web applications that operate on opposite sides of the architecture.

Thus, the two type of web architectures generally used in ecommerce websites are the business logic and the customer side application.

To learn more about web architectures, refer to the link below:

https://brainly.com/question/28560751

#SPJ1

common errors in writing Python

Answers

Answer:

1.not following the rules

2.misusing expression

Secure websites use technology that scrambles the information you send. This is known as
A. hacking.
B. encryption.
C. padlocking.
D. digital media.

Answers

Answer:

B. Encryption.

Explanation:

Encryption encrypts data so that it can not be understood if/when it is intercepted by a third party between the sender and the recipient.

For example, if you're encrypting via the keyword vanilla, and then sending an email to Bob saying "Hi Bob", it would get encrypted as something like Vjh D5xx. The recipient would then use the keyword vanilla to decrypt this message so they can read it as Hi Bob. Anyone who intercepts this wouldn't have the keyword, and would just see incoherent letters, numbers, and symbols that they couldn't make heads or tails of.

Secure websites use technology that scrambles the information you send. This is known as, Encryption. So, the correct option is B.

Given that,

Secure websites use technology that scrambles the information you send.

Since, Secure websites use encryption technology to scramble the information you send, ensuring that it remains secure and protected during transmission.

Encryption involves the use of mathematical algorithms to transform data into an unreadable format, making it extremely difficult for unauthorized parties to access or understand the information.

This is a fundamental method used to safeguard sensitive data on the internet.

So, Option B is true.

To learn more about Encryption visit:

https://brainly.com/question/30408255

#SPJ6

5. Define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2
and y2 and will calculate the distance between these two points using the formula
√((x2 – x1)² + (y2 – y1)²). You must use the SquareRoot function you defined previously.
[10 points]

Test case:
> (DistanceBetweenTwoPoints 2 5 3 2)
3.1622776601683795
Can anyone please help me to write this procedure in Scheme Language? I am stuck! Please help!

Answers

Using the knowledge in computational language in JAVA it is possible to write the code that define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2 and y2.

Writting the code:

package org.totalbeginner.tutorial;

public class Point {

   public double x;

   public double y;

   Point(double xcoord, double ycoord){

       this.x = xcoord;

       this.y = ycoord;

   }

   public double getX() {

       return x;

   }

   public double getY() {

       return y;

   }    

}

package org.totalbeginner.tutorial;

public class Line {

   double x;

   double y;

   Point p1 = new Point(2.0,2.0);

   Point p2 = new Point(4.0,4.0);

   Point mp = new Point(x,y);

   public void midpoint() {

       x = (p1.getX() + p2.getX()) / 2;

       y = (p1.getY() + p2.getY()) / 2;

   }

See more about JAVA at brainly.com/question/12975450

#SPJ1

A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?

Answers

Since the user launches an application on an Android device, the option that  is the cause of the issue is option (C) The application was not developed to react to changes to the gyroscope.

What is the gyroscope about?

The majority of Android devices have sensors available. One of them rotates the screen appropriately is the gyroscope.

Because the software or application is not set up to rotate in accordance with the gyroscope when the user runs an application on the tablet, the screen does not rotate when the tablet is turned by the user.

Therefore, The gyroscope keeps functioning properly by monitoring the rate of turn around one specific axis. An real value is determined when the rotations around an aircraft's roll axis are measured up until the item stabilizes.

Learn more about application from

https://brainly.com/question/24264599
#SPJ1

See full question below

A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?

(A) The auto-adjust setting is not enabled in the operating system.

(B) The tablet is running low on power and disabled landscape mode.

(C) The application was not developed to react to changes to the gyroscope.

(D) The user did not switch the tablet to landscape mode.

What is variable view?

Answers

Answer:

Variable View contains descriptions of the attributes of each variable in the data file. In Variable View, rows are variables. Columns are variable attributes.

Explanation:

Data View is where we inspect our actual data and. Variable View is where we see additional information about our data.

Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.

Answers

An  idea to increase this title for the thesis is the role of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in the GDP of a country.

What is a research thesis?

It is a position or assertion that will be supported by your study. A compelling thesis statement outlines the subject to be covered, condenses the important points, and persuades the reader to keep reading.

Note that the essential points that will be discussed in the essay should be indicated in the thesis. Many thesis statements hint at what will be discussed in the essay in addition to stating the argument that will be presented. This gives the reader a "road map" so they can follow the thought the author is developing.

Learn more about thesis formation from

https://brainly.com/question/2094985
#SPJ1

Memory Management - Page fault and Page Thrashing
i) What is page fault?
ii) Describe the steps that take place after a page fault. Include both the actions taken within the handler and those that are taken in hardware before the handler is initiated. How segment defects might be found and treated should be mentioned in your response. Including diagrams may make it easier for you.
iii) What is page thrashing and how might it be avoided?

Answers

1) A page fault is an exception raised by the memory management unit when a process accesses a memory page without making the necessary preparations. To access the page, a mapping must be added to the process's virtual address space.

2) Once the virtual address that produced the page fault is determined, the system verifies that the address is genuine and that there is no protection access problem. If the virtual address is legitimate, the system determines if a page frame is available. If no frames are available, the page replacement procedure is used to delete a page.

3) Thrashing occurs when the page fault and switching occur at a higher frequency, requiring the operating system to spend more time exchanging these pages. This is referred to as thrashing in the operating system. The CPU utilization will be lowered or nonexistent as a result of thrashing.

Eliminating one or more running programs is a temporary remedy for thrashing. Adding extra RAM to the main memory is one of the recommended strategies to minimize thrashing. Another option for dealing with thrashing is to increase the size of the swap file.

What is Memory Management?

Memory management is a type of resource management that is used to manage computer memory. Memory management must include mechanisms for dynamically allocating parts of memory to programs at their request and freeing it for reuse when no longer required.

Management is the method of regulating and coordinating computer memory by allocating parts known as blocks to various operating applications in order to maximize system performance. The primary memory management function of an operating system is the most critical.

Learn more about Page Faults:
https://brainly.com/question/28557805
#SPJ1


Cloud computing is an example of a social networking site

Answers

Answer: no

Explanation:

cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet

No, cloud computing is not an example of a social networking site. Cloud computing refers to the delivery of computing services, including storage, databases, software, and networking, over the internet.

It involves the use of remote servers hosted on the internet to store, manage, and process data, rather than relying on local servers or personal devices.

On the other hand, social networking sites are web platforms that enable users to create profiles, connect with others, and share content, ideas, and interests.

While both cloud computing and social networking sites are technology-related concepts, they serve different purposes.

Cloud computing focuses on the delivery of computing services, while social networking sites focus on facilitating social interactions and content sharing among users.

Thus, the given statement is false.

For more details regarding cloud computing, visit:

https://brainly.com/question/30122755

#SPJ6

Describe how smartphones communicate. List and describe four popular types of messages you can send with smartphones. Write one well-written paragraph and answer the above question to earn 10 points.

Answers

The way that smartphones communicate is that people connect with each other and with businesses has been changed by mobile messaging. However, users and businesses can choose from a variety of mobile messaging types.

The Kinds Of Mobile Messaging are:

SMS & MMS MessagingPush Notifications.In-App Messages.RCS.

What is the messaging about?

Brief Message Service (SMS): One of the most popular types of mobile communications is SMS. A basic text message sent via a cellular signal is known as an SMS, or short messaging service.

SMS is completely text-based and has a character restriction of 160. Users in the United States who don't have an unlimited messaging package pay cents per message.

Therefore, in Notifications through Push: It's possible that you mistakenly believe that the thing that's flashing on your cell phone's screen is a text message. Similar to SMS messages, push notifications are pop-up windows that appear while you're using your phone or on the lock screen rather than in your inbox with other texts.

Learn more about Mobile Messaging from

https://brainly.com/question/27534262
#SPJ1

which search algorithm uses three variables to mark positions within the array as it searches for the searchvalue?

Answers

A binary search algorithm that uses three variables to mark positions within the array as it searches for the searchvalue.

What is a binary search?

In Computer technology, a binary search simply refers to an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(logn)

Note: n is the total number of elements in a list.

Additionally, keywords and search operators are important variables (elements) that have a significant effect on search results. Therefore, searchvalue is a binary search algorithm that is designed and developed to make use of three (3) variables to mark positions within an array as it perform a searche operation.

Read more on binary search here: https://brainly.com/question/17180912

#SPJ1

when computer and communications are combined, the result is information and cominiations Technology (true or false)​

Answers

Answer: When computer and communication technologies are combined the result is Information technology.

Explanation: This is a technology that combines computation with high-speed data, sound, and video transmission lines. All computer-based information systems utilized by companies, as well as their underlying technologies, are referred to as information technology.

As a result, information technology encompasses hardware, software, databases, networks, and other electronic gadgets.

IT refers to the technological component of information systems, making it a subsystem of information systems.

Information systems, users, and administration would all be included in a broader definition of IT.

Many organizations rely on IT to support their operations, since IT has evolved into the world's primary facilitator of project activities. IT is sometimes utilized as a catalyst for fundamental changes in an organization's structure, operations, and management. This is because of the capabilities it provides for achieving corporate goals.

These competences help to achieve the following five business goals:

Increasing productivity,

lowering expenses,

improving decision-making,

improving customer interactions, and

creating new strategic applications.

What is output by the following code?

c = 1

sum = 0

while (c < 10):

c = c + 2

sum = sum + c




print (sum)

Answers

It is to be noted that the output of the code given above is Sum = 35.

What is Sum in programming?

The sum() method sums all of the elements in an iterable and returns the total.

sum = sum + inputValue; can be substituted with sum += inputValue; This sentence can be interpreted as "Add up inputValue to total." or "Increase sum by inputValue."

With regard to the above code, when a complier runs this:

c = 1

sum = 0

while (c < 10):  

c = c + 2  

sum = sum + c

print (sum)

Output: 35

The output is 35.

Learn more about codes:
https://brainly.com/question/13013054
#SPJ1

least privilege meaning in cybersecurity

Answers

Answer:

It is where each system is designed so that it only has the permissions necessary to operate, nothing more.

Explanation:

This is done for security concerns, which is the whole reason for cybersecurity.

What is output by the following code? Select all that apply.

c = 2




while (c < 12):

print (c)
c = c + 3

Answers

When the above code is run via a compiler, the output will be 5.

What is code in programming?

In computer programming, computer code is a set of instructions or a set of rules expressed in a specific programming language (i.e., the source code). It is also the name given to source code after it has been compiled and is ready to execute on a computer.

The print() method outputs the message supplied to the screen or another standard output device. The message can be a string or any other object, which will be transformed to a string before being displayed on the screen.

When the above code is correctly entered into the compiler and rightly indented, the output given is 5.

Learn more about compilers:
https://brainly.com/question/27882492

#SPJ1

the proper use of safety equipment in your vehicle has the potential to ___.

Answers

The proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.

Why safety equipment is required?

Safety equipment may be defined as a type of equipment that delivers a sense of protection that is significantly used by workers in order to avoid injuries, casualties, life-threatening situations, etc.

Safety equipment may include a set of numerous objects and things like gloves, safety glasses and shoes, earplugs or muffs, hard hats, respirators, coveralls, vests, and full-body suits. All these pieces of equipment possess a common intention behind the safety of an individual.

Therefore, the proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.

To learn more about Safety equipment, refer to the link:

https://brainly.com/question/28389789

#SPJ1

Carlos is studying human skin cells under a microscope during science class. He asks his teacher why cells are small. Which response does his teacher give him?

Answers

Since Carlos is studying human skin cells and he asks his teacher why cells are small. The response that his teacher give him will be: Larger cells could not efficiently transport nutrients.

Why are big cells not productive?

The plasma membrane won't have enough surface area if the cell enlarges too much to support the rate of diffusion needed to accommodate the larger volume. In other words, a cell gets less effective as it develops.

Any of the four major cell types that make up the epidermis may be referred to as "skin cells." These are the Langerhans cells, Merkel cells, keratinocytes, and melanocytes.

Note that Because there is less plasma membrane and a longer distance for molecules to travel, a large cell has more volume and is less effective at moving items into, out of, and through the cell. The cell needs its supplies to be received and transferred in a timely manner for many of its organelles.

Learn more about human skin cells from

https://brainly.com/question/27132976
#SPJ1

Write a function so that the main() code below can be replaced by the simpler code that calls function MphAndMinutes ToMiles().
Original main):
int main()
double milesPerHour;
double minutesTraveled;
double hoursTraveled;
double milesTraveled;
cin >> milesPerHour;
cin >> minutesTraveled;
hoursTraveled minutesTraveled / 60.0;
milesTraveled - hoursTraveled * milesPerHour;
cout ‹< "Miles:
<< milesTraveled ‹‹ endl;
return 0;

Answers

#include <iostream>

double mph_and_minutes_to_miles(double mph, double min) {

   return mph*double(min/60);

}

int main(int argc, char* argv[]) {

   double imph, imin; std::cin>>imph>>imin;

   std::cout << "Miles: " << mph_and_minutes_to_miles(imph,imin) << std::endl;

   return 0;

}

Akari is trying to use the input she receives from the user to calculate an average. But her program keeps crashing after the user types in their input.
What has she most likely forgotten to do?
A. declare a variable
B. validate the user input
C. use a loop
D. use a colon after an if statement

Answers

Since Akari is trying to use the input she receives from the user to calculate an average, she is most likely forgotten to do option  C. use a loop.

Is there a average function in Python?

Python mean() function: The statistics module in Python 3 includes a built-in function to determine the mean or average of a set of values. To determine the mean or average, utilize the statistics. mean() function.

Note that each element in the list will be iterated over by the for-loop, which adds and stores each number within the sum num variable. Python's built-in len() function is used to calculate the average of the list by dividing the sum num value by the count of the numbers in the list.

So, you start by making the list whose average you want to determine, and then you make a variable to hold the total of the numbers. We'll set the variable to zero. Then add to the sum variable by iterating through each item in the list. Lastly, divide the total by the length.

Learn more about loop from

https://brainly.com/question/16922594
#SPJ1

Welcome to Gboard clipboard, any text that you copy will be saved here.​

Answers

Answer: Welcome to Gboard clipboard, any text you copy will be saved here.

Tech A says that it is usually better to pull a wrench to tighten or loosen a bolt. Tech B says that
pushing a wrench will protect your knuckles if the wrench slips. Who is correct?

Answers

Tech A is correct because pulling a wrench to tighten or loosen a bolt secures it to the bolt threading, reducing the possibility of it slipping.

How to tighten nuts and bolts?

Place your socket on the wrench's head. To begin using your torque wrench, insert a socket that fits your nut or bolt into the torque wrench's head. If you have an extender or adaptor, you can insert it into the opening at the head instead.

Hand-tighten the nut or bolt until it catches the threading on the screw. Place the nut or bolt to be tightened over the threading for the screw or opening on your vehicle by hand. Turn the nut or bolt on the vehicle clockwise with your fingers until the threading on the screw catches. Turn the nut or bolt until it can no longer be turned by hand.

Place the wrench on top of the nut or bolt being tightened. Hold the torque wrench handle in your nondominant hand while the nut or bolt is set on the threading.

Tighten the nut or bolt by turning the handle clockwise. When the wrench starts clicking or stops moving, stop turning it.

To know more about wrench and bolts, kindly visit: https://brainly.com/question/15075481

#SPJ1


Create a loop to display all even numbers from 0 to 100. Describe the three elements that must be included in order for a loop to
perform correctly. What will happen if these statements are not included? Provide examples.
The three elements that must be included in order for a loop to perform correctly. What will happen if these statements are not included? Provide examples

Answers

A loop to display all even numbers from 0 to 100:

for(i= 0;i<= 100; i++) {  

       if(counter%2 == 0) {

           printf("%d ",i);

The loop consists of three important parts:

the initialization: the keyword that starts the loopthe condition: the condition being testedthe update: for each iteration.

By missing a condition statement in a for loop, it would loop forever.

Example:

void main() {  

int i = 10;

for( ; ;) {

printf("%d\n",i); }

}

As in the above code, the for loop is running for infinite times and printing the i value that is 10 infinitely.

What is a for loop used for?

A "For" Loop is used to repeat a specific block of code a known number of times.

What are the main types of loops?

There are two types of loops, “while loops” and “for loops”. While loops will repeat while a condition is true, and for loops will repeat a certain number of times.

What are the elements of a loop?

Loop statements usually have three components: initialization, condition, and update step, and it contains a loop body.

To know more about loop:

https://brainly.com/question/16922594

#SPJ1

Devision of floating binary
(100.0001)÷(10.1)

Answers

1.101 is the correct answer for floating-point binary (100.0001)÷(10.1).

The sign of a binary floating-point number is represented by a single bit. A 1 bit indicates a negative number, and a 0 bit indicates a positive number.

What is Binary Number System?

One of the four types of number systems is a binary number system. Binary numbers are represented in computer applications by only two symbols or digits, namely 0 (zero) and 1 (one). The binary numbers in this example are written in the base-2 numeral system. [tex]101_{2}[/tex] is an example of a binary number. In this system, each digit is referred to as a bit.

A binary number is defined in digital electronics and mathematics as a number expressed in the binary system or base 2 numeral system. It denotes numerical values with two distinct symbols: 1 (one) and 0. (zero). The positional notation with 2 as a radix is the base-2 system.

Because of its direct implementation in electronic circuits using logic gates, the binary system is used internally by almost all modern computers and computer-based devices. Every digit is known as a bit.

To know more about Binary Number, visit: https://brainly.com/question/8649831

#SPJ1

Which of the following could be considered an algorithm?


directions for assembling a bicycle


the pages in a book


a file system directory


an application
F

Answers

The best answer is an application

Below you can see stringSize, which is implemented in Java

Answers

Answer:

(a): Yes, it is logically correct as the code does a loop through the all characters of the string and outputs the total amount of them within the string.

(b): It is poorly designed because it is not the most efficient way to get the size of the string. There is a much better way in obtaining it through s.length() and it also accounts for spaces as characters as well.

Explanation:

Hello! Let's help you with your question here!

Now, it is split up into two parts so I will explain them both as such.

Part A:

For this part of the question. Yes, it would be logically correct. When the size is returned, it will return the number of characters in s. Let's break down the code step by step:

Code Rundown:int size = 0; (Initializing a size variable of type int and setting it to 0)for (int i = 0; i < s.length(); i++): We create what is known as an index i and have it loop until it reaches the length of the string (This is where we loop through the characters).size++; (For every loop, it'll just add 1 to size, essentially making it a counter).return size; (This returns the number within size after the loop is finished.)

As you can see from the rundown, it initializes a counter and loops through each character of the string and increases the counter as it goes. So for this part, it is logically correct as it does give us the total amount of characters within a string which is considered the string size.

Part B:

It is poorly designed under two reasons, one is more important than the other as the second one isn't really a requirement, it's just quality of life.

Reason 1 (The Important One):

The main reason why this is poorly designed is that it is not optimized. What it does here is going through the entire string and adds 1 to the counter every time there is a character. However, s.length() achieves the same thing. Instead of creating a counter and having it loop through the entire string and adding 1 to the counter for every character and then returning the counter. s.length() is a method that returns the length of a specified string. In this case, it returns the size of the string. To put it simply, the code in the example can be simplified to just:

private static int stringSize(String s) {

      return s.length();

}

This would still give us the same result as the example without having to go through a loop. In programming and algorithms, we learn about time complexity. To put it simply, it is the time it takes for the program to complete. The faster it does without any errors, the more efficient and optimal it becomes. For the code example above, we have time complexity O(n). What this means is that the program needs to run through a loop (multiple checks) before finishing the code, this is the second fastest time. However, with the code I showed you above, it has a time complexity of O(1). For this code, it doesn't need to run any checks, it can just finish the code immediately. Therefore, the code in the example is not efficient.

Reason 2 (Quality of Life One):

While the code does work well and does give you an accurate total size of the string every time, it however accounts for spaces as well. If you were to have a space in your string, it would bump the counter up as in Java, as spaces are considered a character because of this you won't get an accurate string size count if you want letters and symbols only. A way to improve it is to create a check within the loop that tells us if the character we are looking at, in the index, is a space or not. If it is a space, we subtract the size counter by 1 and move on. So the modified code would look like this:

public static int stringSize(String s) {

      int size = 0;

      for (int i = 0; i < s.length(); i++) {

            size++;

            char c = s.charAt(i);

            if (c == ' ') {

                 size--;

            }

      }

      return size;

}

Explanation:

In the code, I am still adding 1 to the size counter still. However, in the bold. I create a variable c of type char and take the character of the string where the index is currently and use an if statement to determine if it is a space or not. If it is not, then the code repeats until the loop is done and then returns the size of the string. However, if it is a space, it'll subtract 1 from the size counter and will loop through the entire string doing this check and then returns the size of the string when it is done.

Learn more about time complexity at https://brainly.com/question/28018274

Find advert in magazines or websites of working desktop computer systems or laptop as well as a monitor, keyboard and software you will also need additional devices such as mouse or printer. Reports outlines and explaining the details of the advertising

Answers

Because of our independence, you have complete control over your data. Your information is your information. Independent, open platform. MRC-accredited metrics Increase the effectiveness of advertising.

How do you write outlines for reports and explain the details of advertising?

Analyze market position information for the product and explain how that position is expected to change. Make a list of suggestions to improve your next advertisement.

Typically, advertising campaigns promote a product or service. A national automaker, for example, may launch a new vehicle model through print advertisements in newspapers and magazines. To reach the vehicle's target market, the company may also place graphics-rich ads on websites. This combined media blitz produces more desirable results than isolated advertisements without a central strategy.

This automobile manufacturer, or any business selling a product or service, evaluates its campaign's effectiveness based on defined criteria. A written report provides an objective campaign analysis, highlights favorable results and identifies areas in which advertising strategy adjustments are appropriate.

To learn more about details of advertising refer to:https://brainly.com/question/1658517

#SPJ1

What does it mean to say,"we are in a post-PC world?"

Answers

Answer:

The use of mobile devices rather than only desktop computers for games, Internet access, general computing and as a terminal to the corporate network. We are in the post-PC era today.

Write an SQL statement to display for every restaurant the name of the restaurant (where the name of the restaurant consists of more than 10 characters) and for every category of menu item its description (catdesc). Furthermore, display the average; cheapest or lowest; and highest or most expensive price of all menu items in that category at that restaurant. Use single row functions to format all the prices. The average price must be padded; the cheapest price must be rounded; but the highest price must not be rounded. Display only those menu items of which the average item price is more than R40. Sort your results according to the restaurant names and for every restaurant from the most expensive average menu item to the cheapest average menu item. Display your results exactly as listed below.

Answers

Using the knowledge in computational language in SQL it is possible to write the code that display for every restaurant the name of the restaurant  and for every category of menu item its description.

Writting the code:

INSERT INTO Dish Values(13, 'Spring Rolls', 'ap');

INSERT INTO Dish Values(15, 'Pad Thai', 'en');

INSERT INTO Dish Values(16, 'Pot Stickers', 'ap');    

INSERT INTO Dish Values(22, 'Masaman Curry', 'en');  

INSERT INTO Dish Values(10, 'Custard', 'ds');  

INSERT INTO Dish Values(12, 'Garlic Bread', 'ap');    

INSERT INTO Dish Values(44, 'Salad', 'ap');    

INSERT INTO Dish Values(07, 'Cheese Pizza', 'en');  

INSERT INTO Dish Values(19, 'Pepperoni Pizza', 'en');    

INSERT INTO Dish Values(77, 'Veggie Supreme Pizza', 'en');

INSERT INTO MenuItem Values(0, 0, 13, 8.00);

INSERT INTO MenuItem Values(1, 0, 16, 9.00);

INSERT INTO MenuItem Values(2, 0, 44, 10.00);

INSERT INTO MenuItem Values(3, 0, 15, 19.00);

INSERT INTO MenuItem Values(4, 0, 22, 19.00);

INSERT INTO MenuItem Values(5, 3, 44, 6.25);

INSERT INTO MenuItem Values(6, 3, 12, 5.50);

INSERT INTO MenuItem Values(7, 3, 07, 12.50);

INSERT INTO MenuItem Values(8, 3, 19, 13.50);

INSERT INTO MenuItem Values(9, 5, 13, 6.00);

INSERT INTO MenuItem Values(10, 5, 15, 15.00);

INSERT INTO MenuItem Values(11, 5, 22, 14.00);

See more about SQL atbrainly.com/question/13068613

#SPJ1

How is the logo for a popular sportswear company protected?
A) by a copyright
B) by a patent
C) by a trademark
D) by a trade secret

Answers

Answer:

C) by a trade mark

Explanation:

By using a trademark they'll be able to tell other companies that the logo is theirs

Answer:

answer is C.

Explanation:

on What is the output of the following code: int i = 1; while (i <= 9)
{
system. out.print(i+"");
i=i+2;
}​

Answers

Answer:

13579

java

Explanation:

notice that the System.out.print call does not output a new line.

so... it is going to print 1, then what is 1 plus 2? the answer is 3.

what is 3 plus 2? the answer is 5.

what is 5 plus 2? the answer is 7.

what is 7 plus 2? the answer is 9.

now if we proceeded, i is more than 9, thus ends the while loop.

the output is 13579

because there are no newlines, the numbers are all squished together on the same line.

Other Questions
An 80 kg jumper in flight accelerates at a rate of 8 m/s^2. What is the force of the long jumper? F = ma Select the correct answer.Consider the function given below.f(x) = lx-5l +2Which of the following statements about the y-values of the graph of the function is true?A. The y-values are all greater than or equal to 5.B. The y-values are all greater than or equal to 2.C. The y-values are all less than or equal to 2.D. The y-values are all less than or equal to 5. Stan argues that momentum cannot be conserved when a collision is not a head-on collision. Rachel insists it is conserved because each body receives an impulse of equal magnitude. Rachel is correct because?. a high school theater club has 40 student, 6 of whom are left handed. two student will be selected at random, one at a time without replacement. what is the pobability that the 2 student selected will both be left-handed/ a high-pressure, fast-moving (more than 300 km/h) mixture of pyroclastic debris, including fragments and gas typically ejected vertically from a volcanic vent, is called If the antenna complex did not exist in a particular plant mesophyll cell, what effect would that have on photosynthesis?. Which word from the passage offers the best synonym for conscientious.Max was careful to cover his world map for social studies class with plastic and then roll it up to protect it from getting damaged on the school bus. After the hours he spent drawing it, he definitely wanted to be conscientious about making sure it didn't get bent or wrinkled.A.carefulB.wrinkledC.coverD.protect Complete the table. Round percent change to the nearest tenth of a percent. Each contestant in the men's wrestling tournament will need to bring _______ registration form to the front desk on the day of competition bullying younger children earns diego the attention and respect of many classmates. as a result, his bullying behavior increases. this most clearly suggests that his aggression is a(n): please choose the correct answer from the following choices, and then select the submit answer button. answer choices reaction to frustration. instinctive behavior. learned response. product of deindividuation. URGENT AND BRAINLY can someone please write a short speech explaining what the La Tomatina (tomato- war festival) is? you can do research obviously.regards :) PART 1 DIRECTIONS (CCSS R.5): There are few stage directions of Hales interrogation of Abigail. The few stage directions that do exist in this scene are highlighted below in orange. Begin by rereading the scene in your book on pages 39-40. The text is also written below. Then add five (5) different stage directions that Arthur Miller could have included. Do not change the directions that Miller included; you should be adding additional directions in different lines. You should add your stage directions to the text below in italics and highlight your new stage directions in a new color. Your stage directions should reflect the appropriate facial expressions, vocal tones, and gestures that make sense in the scene. HALE: [...] Abigail, what sort of dancing were you doing with her in the forest?PARRIS: I think I ought to say that I-I saw a kettle in the grass where they were dancing. ABIGAIL: That were only soup. HALE: What sort of soup were in this kettle, Abigail?ABIGAIL: Why, it were beans-and lentils, I think, and-HALE: Mr. Parris, you did not notice, did you, any living thing in the kettle? A mouse, perhaps, a spider, a frog-?PARRIS, fearfully: I- do believe there were some movement-in the soup. ABIGAIL: That jumped in, we never put it in!HALE, quickly: What jumped in? ABIGAIL: Why, a very little frog jumped-PARRIS: A frog, Abby!HALE, grasping Abigail: Abigail, it may be your cousin is dying. Did you call the Devil last night?ABIGAIL: I never called him! Tituba, Tituba...[...]HALE: How did she call him?ABIGAIL: I know notshe spoke Barbados.HALE: Did you feel any strangeness when she called him? A sudden cold wind, perhaps? A trembling below the ground?ABIGAIL: I didnt see no Devil! Shaking Betty: Betty, wake up, Betty! Betty!HALE: You cannot evade me, Abigail. Did your cousin drink any of the brew in that kettle?ABIGAIL: She never drank it!HALE: Did you drink it?ABIGAIL: No, sir!HALE: Did Tituba ask you to drink it?ABIGAIL: She tried, but I refused.HALE: Why are you concealing? Have you sold yourself to Lucifer?ABIGAIL: I never sold myself! Im a good girl! Im a proper girl!Mrs. Putnam enters with Tituba, and instantly Abigail points at Tituba. ABIGAIL: She made me do it! She made Betty do it!PART 2 DIRECTIONS (CCSS R.1): Thinking about your new stage directions, answer the following question in complete sentences. Your answer should be written below the question. Why would Arthur Miller leave out stage directions in this exchange? Be sure to explain. what is the total force on the bottom of a swimming pool 15.0 m by 5.7 m whose uniform depth is 2.1 m ? express your answer using two significant figures. What was happening in 1940 when Auden first published "The Unknown Citizen" and how may national or world events have impact the poet's perspective? Write your answer using complete sentences. (You may wish to use a trusted internet browser to research the time period.) A company that wanted to provide a single, unified entry point to its network that would allow different types of users access to different types of resources could do so by establishing a(n) match the layer of earth with the correct description. crust crust drop zone empty. mantle mantle drop zone empty. core Help me please its confusing I need some URGENT HELP!!! Like RIGHT NOW!!Claim, Evidence, and Reasoning Paragraph Practice With Edgar Allan Poes The Tell-Tale Heart Claim: Answer the question/make a claim. Evidence: Cite one or more pieces of evidence from the text as support or as an example. Reasoning: Explain why the evidence you gave supports your answer or claim; this is called reasoning. Question: How do the police discover the murder at the end of The Tell-Tale Heart?The police discovered the murder of the old man when he told them to tear up the planks of the floorboard because he couldnt take the ringing sound in his ear any longer. bizonline uses an electronic agent, or e-agent, to perform certain tasks in e-commerce. with respect to the e-agent's actions, bizonline is bound by how does english create a network in nyc by serving as a langue franca