Answer:
Vulnerability
Explanation:
Vulnerability refers to a weakness in your hardware, software, or procedures
E-commerce Web sites can use many different hardware architectures to divide the work of serving Web pages, administering databases, and processing transactions.
Discuss in detail the TWO (2) types of web architectures generally used in ecommerce websites.
The two type of web architectures generally used in ecommerce websites are the business logic and the customer side application.
What are web architectures?Web architectures are defined as a system that controls the communication between application components. The interconnections between web applications, databases, and middleware technologies are referred to as web application architecture.
The user interface is executed on the client side, which is the first, and database data is stored on the server side, which is the second. The business logic and the customer-side application are two web applications that operate on opposite sides of the architecture.
Thus, the two type of web architectures generally used in ecommerce websites are the business logic and the customer side application.
To learn more about web architectures, refer to the link below:
https://brainly.com/question/28560751
#SPJ1
common errors in writing Python
Answer:
1.not following the rules
2.misusing expression
Secure websites use technology that scrambles the information you send. This is known as
A. hacking.
B. encryption.
C. padlocking.
D. digital media.
Answer:
B. Encryption.
Explanation:
Encryption encrypts data so that it can not be understood if/when it is intercepted by a third party between the sender and the recipient.
For example, if you're encrypting via the keyword vanilla, and then sending an email to Bob saying "Hi Bob", it would get encrypted as something like Vjh D5xx. The recipient would then use the keyword vanilla to decrypt this message so they can read it as Hi Bob. Anyone who intercepts this wouldn't have the keyword, and would just see incoherent letters, numbers, and symbols that they couldn't make heads or tails of.
Secure websites use technology that scrambles the information you send. This is known as, Encryption. So, the correct option is B.
Given that,
Secure websites use technology that scrambles the information you send.
Since, Secure websites use encryption technology to scramble the information you send, ensuring that it remains secure and protected during transmission.
Encryption involves the use of mathematical algorithms to transform data into an unreadable format, making it extremely difficult for unauthorized parties to access or understand the information.
This is a fundamental method used to safeguard sensitive data on the internet.
So, Option B is true.
To learn more about Encryption visit:
https://brainly.com/question/30408255
#SPJ6
5. Define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2
and y2 and will calculate the distance between these two points using the formula
√((x2 – x1)² + (y2 – y1)²). You must use the SquareRoot function you defined previously.
[10 points]
Test case:
> (DistanceBetweenTwoPoints 2 5 3 2)
3.1622776601683795
Can anyone please help me to write this procedure in Scheme Language? I am stuck! Please help!
Using the knowledge in computational language in JAVA it is possible to write the code that define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2 and y2.
Writting the code:package org.totalbeginner.tutorial;
public class Point {
public double x;
public double y;
Point(double xcoord, double ycoord){
this.x = xcoord;
this.y = ycoord;
}
public double getX() {
return x;
}
public double getY() {
return y;
}
}
package org.totalbeginner.tutorial;
public class Line {
double x;
double y;
Point p1 = new Point(2.0,2.0);
Point p2 = new Point(4.0,4.0);
Point mp = new Point(x,y);
public void midpoint() {
x = (p1.getX() + p2.getX()) / 2;
y = (p1.getY() + p2.getY()) / 2;
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?
Since the user launches an application on an Android device, the option that is the cause of the issue is option (C) The application was not developed to react to changes to the gyroscope.
What is the gyroscope about?The majority of Android devices have sensors available. One of them rotates the screen appropriately is the gyroscope.
Because the software or application is not set up to rotate in accordance with the gyroscope when the user runs an application on the tablet, the screen does not rotate when the tablet is turned by the user.
Therefore, The gyroscope keeps functioning properly by monitoring the rate of turn around one specific axis. An real value is determined when the rotations around an aircraft's roll axis are measured up until the item stabilizes.
Learn more about application from
https://brainly.com/question/24264599
#SPJ1
See full question below
A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?
(A) The auto-adjust setting is not enabled in the operating system.
(B) The tablet is running low on power and disabled landscape mode.
(C) The application was not developed to react to changes to the gyroscope.
(D) The user did not switch the tablet to landscape mode.
What is variable view?
Answer:
Variable View contains descriptions of the attributes of each variable in the data file. In Variable View, rows are variables. Columns are variable attributes.
Explanation:
Data View is where we inspect our actual data and. Variable View is where we see additional information about our data.
Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.
An idea to increase this title for the thesis is the role of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in the GDP of a country.
What is a research thesis?It is a position or assertion that will be supported by your study. A compelling thesis statement outlines the subject to be covered, condenses the important points, and persuades the reader to keep reading.
Note that the essential points that will be discussed in the essay should be indicated in the thesis. Many thesis statements hint at what will be discussed in the essay in addition to stating the argument that will be presented. This gives the reader a "road map" so they can follow the thought the author is developing.
Learn more about thesis formation from
https://brainly.com/question/2094985
#SPJ1
Memory Management - Page fault and Page Thrashing
i) What is page fault?
ii) Describe the steps that take place after a page fault. Include both the actions taken within the handler and those that are taken in hardware before the handler is initiated. How segment defects might be found and treated should be mentioned in your response. Including diagrams may make it easier for you.
iii) What is page thrashing and how might it be avoided?
1) A page fault is an exception raised by the memory management unit when a process accesses a memory page without making the necessary preparations. To access the page, a mapping must be added to the process's virtual address space.
2) Once the virtual address that produced the page fault is determined, the system verifies that the address is genuine and that there is no protection access problem. If the virtual address is legitimate, the system determines if a page frame is available. If no frames are available, the page replacement procedure is used to delete a page.
3) Thrashing occurs when the page fault and switching occur at a higher frequency, requiring the operating system to spend more time exchanging these pages. This is referred to as thrashing in the operating system. The CPU utilization will be lowered or nonexistent as a result of thrashing.
Eliminating one or more running programs is a temporary remedy for thrashing. Adding extra RAM to the main memory is one of the recommended strategies to minimize thrashing. Another option for dealing with thrashing is to increase the size of the swap file.
What is Memory Management?Memory management is a type of resource management that is used to manage computer memory. Memory management must include mechanisms for dynamically allocating parts of memory to programs at their request and freeing it for reuse when no longer required.
Management is the method of regulating and coordinating computer memory by allocating parts known as blocks to various operating applications in order to maximize system performance. The primary memory management function of an operating system is the most critical.
Learn more about Page Faults:
https://brainly.com/question/28557805
#SPJ1
Cloud computing is an example of a social networking site
Answer: no
Explanation:
cloud computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet
No, cloud computing is not an example of a social networking site. Cloud computing refers to the delivery of computing services, including storage, databases, software, and networking, over the internet.
It involves the use of remote servers hosted on the internet to store, manage, and process data, rather than relying on local servers or personal devices.
On the other hand, social networking sites are web platforms that enable users to create profiles, connect with others, and share content, ideas, and interests.
While both cloud computing and social networking sites are technology-related concepts, they serve different purposes.
Cloud computing focuses on the delivery of computing services, while social networking sites focus on facilitating social interactions and content sharing among users.
Thus, the given statement is false.
For more details regarding cloud computing, visit:
https://brainly.com/question/30122755
#SPJ6
Describe how smartphones communicate. List and describe four popular types of messages you can send with smartphones. Write one well-written paragraph and answer the above question to earn 10 points.
The way that smartphones communicate is that people connect with each other and with businesses has been changed by mobile messaging. However, users and businesses can choose from a variety of mobile messaging types.
The Kinds Of Mobile Messaging are:
SMS & MMS MessagingPush Notifications.In-App Messages.RCS.What is the messaging about?Brief Message Service (SMS): One of the most popular types of mobile communications is SMS. A basic text message sent via a cellular signal is known as an SMS, or short messaging service.
SMS is completely text-based and has a character restriction of 160. Users in the United States who don't have an unlimited messaging package pay cents per message.
Therefore, in Notifications through Push: It's possible that you mistakenly believe that the thing that's flashing on your cell phone's screen is a text message. Similar to SMS messages, push notifications are pop-up windows that appear while you're using your phone or on the lock screen rather than in your inbox with other texts.
Learn more about Mobile Messaging from
https://brainly.com/question/27534262
#SPJ1
which search algorithm uses three variables to mark positions within the array as it searches for the searchvalue?
A binary search algorithm that uses three variables to mark positions within the array as it searches for the searchvalue.
What is a binary search?In Computer technology, a binary search simply refers to an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(logn)
Note: n is the total number of elements in a list.
Additionally, keywords and search operators are important variables (elements) that have a significant effect on search results. Therefore, searchvalue is a binary search algorithm that is designed and developed to make use of three (3) variables to mark positions within an array as it perform a searche operation.
Read more on binary search here: https://brainly.com/question/17180912
#SPJ1
when computer and communications are combined, the result is information and cominiations Technology (true or false)
Answer: When computer and communication technologies are combined the result is Information technology.
Explanation: This is a technology that combines computation with high-speed data, sound, and video transmission lines. All computer-based information systems utilized by companies, as well as their underlying technologies, are referred to as information technology.
As a result, information technology encompasses hardware, software, databases, networks, and other electronic gadgets.
IT refers to the technological component of information systems, making it a subsystem of information systems.
Information systems, users, and administration would all be included in a broader definition of IT.
Many organizations rely on IT to support their operations, since IT has evolved into the world's primary facilitator of project activities. IT is sometimes utilized as a catalyst for fundamental changes in an organization's structure, operations, and management. This is because of the capabilities it provides for achieving corporate goals.
These competences help to achieve the following five business goals:
Increasing productivity,
lowering expenses,
improving decision-making,
improving customer interactions, and
creating new strategic applications.
What is output by the following code?
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)
It is to be noted that the output of the code given above is Sum = 35.
What is Sum in programming?The sum() method sums all of the elements in an iterable and returns the total.
sum = sum + inputValue; can be substituted with sum += inputValue; This sentence can be interpreted as "Add up inputValue to total." or "Increase sum by inputValue."
With regard to the above code, when a complier runs this:
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)
Output: 35
The output is 35.
Learn more about codes:
https://brainly.com/question/13013054
#SPJ1
least privilege meaning in cybersecurity
Answer:
It is where each system is designed so that it only has the permissions necessary to operate, nothing more.
Explanation:
This is done for security concerns, which is the whole reason for cybersecurity.
What is output by the following code? Select all that apply.
c = 2
while (c < 12):
print (c)
c = c + 3
When the above code is run via a compiler, the output will be 5.
What is code in programming?In computer programming, computer code is a set of instructions or a set of rules expressed in a specific programming language (i.e., the source code). It is also the name given to source code after it has been compiled and is ready to execute on a computer.
The print() method outputs the message supplied to the screen or another standard output device. The message can be a string or any other object, which will be transformed to a string before being displayed on the screen.
When the above code is correctly entered into the compiler and rightly indented, the output given is 5.
Learn more about compilers:
https://brainly.com/question/27882492
#SPJ1
the proper use of safety equipment in your vehicle has the potential to ___.
The proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.
Why safety equipment is required?Safety equipment may be defined as a type of equipment that delivers a sense of protection that is significantly used by workers in order to avoid injuries, casualties, life-threatening situations, etc.
Safety equipment may include a set of numerous objects and things like gloves, safety glasses and shoes, earplugs or muffs, hard hats, respirators, coveralls, vests, and full-body suits. All these pieces of equipment possess a common intention behind the safety of an individual.
Therefore, the proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.
To learn more about Safety equipment, refer to the link:
https://brainly.com/question/28389789
#SPJ1
Carlos is studying human skin cells under a microscope during science class. He asks his teacher why cells are small. Which response does his teacher give him?
Since Carlos is studying human skin cells and he asks his teacher why cells are small. The response that his teacher give him will be: Larger cells could not efficiently transport nutrients.
Why are big cells not productive?The plasma membrane won't have enough surface area if the cell enlarges too much to support the rate of diffusion needed to accommodate the larger volume. In other words, a cell gets less effective as it develops.
Any of the four major cell types that make up the epidermis may be referred to as "skin cells." These are the Langerhans cells, Merkel cells, keratinocytes, and melanocytes.
Note that Because there is less plasma membrane and a longer distance for molecules to travel, a large cell has more volume and is less effective at moving items into, out of, and through the cell. The cell needs its supplies to be received and transferred in a timely manner for many of its organelles.
Learn more about human skin cells from
https://brainly.com/question/27132976
#SPJ1
Write a function so that the main() code below can be replaced by the simpler code that calls function MphAndMinutes ToMiles().
Original main):
int main()
double milesPerHour;
double minutesTraveled;
double hoursTraveled;
double milesTraveled;
cin >> milesPerHour;
cin >> minutesTraveled;
hoursTraveled minutesTraveled / 60.0;
milesTraveled - hoursTraveled * milesPerHour;
cout ‹< "Miles:
<< milesTraveled ‹‹ endl;
return 0;
#include <iostream>
double mph_and_minutes_to_miles(double mph, double min) {
return mph*double(min/60);
}
int main(int argc, char* argv[]) {
double imph, imin; std::cin>>imph>>imin;
std::cout << "Miles: " << mph_and_minutes_to_miles(imph,imin) << std::endl;
return 0;
}
Akari is trying to use the input she receives from the user to calculate an average. But her program keeps crashing after the user types in their input.
What has she most likely forgotten to do?
A. declare a variable
B. validate the user input
C. use a loop
D. use a colon after an if statement
Since Akari is trying to use the input she receives from the user to calculate an average, she is most likely forgotten to do option C. use a loop.
Is there a average function in Python?Python mean() function: The statistics module in Python 3 includes a built-in function to determine the mean or average of a set of values. To determine the mean or average, utilize the statistics. mean() function.
Note that each element in the list will be iterated over by the for-loop, which adds and stores each number within the sum num variable. Python's built-in len() function is used to calculate the average of the list by dividing the sum num value by the count of the numbers in the list.
So, you start by making the list whose average you want to determine, and then you make a variable to hold the total of the numbers. We'll set the variable to zero. Then add to the sum variable by iterating through each item in the list. Lastly, divide the total by the length.
Learn more about loop from
https://brainly.com/question/16922594
#SPJ1
Welcome to Gboard clipboard, any text that you copy will be saved here.
Tech A says that it is usually better to pull a wrench to tighten or loosen a bolt. Tech B says that
pushing a wrench will protect your knuckles if the wrench slips. Who is correct?
Tech A is correct because pulling a wrench to tighten or loosen a bolt secures it to the bolt threading, reducing the possibility of it slipping.
How to tighten nuts and bolts?
Place your socket on the wrench's head. To begin using your torque wrench, insert a socket that fits your nut or bolt into the torque wrench's head. If you have an extender or adaptor, you can insert it into the opening at the head instead.
Hand-tighten the nut or bolt until it catches the threading on the screw. Place the nut or bolt to be tightened over the threading for the screw or opening on your vehicle by hand. Turn the nut or bolt on the vehicle clockwise with your fingers until the threading on the screw catches. Turn the nut or bolt until it can no longer be turned by hand.
Place the wrench on top of the nut or bolt being tightened. Hold the torque wrench handle in your nondominant hand while the nut or bolt is set on the threading.
Tighten the nut or bolt by turning the handle clockwise. When the wrench starts clicking or stops moving, stop turning it.
To know more about wrench and bolts, kindly visit: https://brainly.com/question/15075481
#SPJ1
Create a loop to display all even numbers from 0 to 100. Describe the three elements that must be included in order for a loop to
perform correctly. What will happen if these statements are not included? Provide examples.
The three elements that must be included in order for a loop to perform correctly. What will happen if these statements are not included? Provide examples
A loop to display all even numbers from 0 to 100:
for(i= 0;i<= 100; i++) {
if(counter%2 == 0) {
printf("%d ",i);
The loop consists of three important parts:
the initialization: the keyword that starts the loopthe condition: the condition being testedthe update: for each iteration.By missing a condition statement in a for loop, it would loop forever.
Example:
void main() {
int i = 10;
for( ; ;) {
printf("%d\n",i); }
}
As in the above code, the for loop is running for infinite times and printing the i value that is 10 infinitely.
What is a for loop used for?
A "For" Loop is used to repeat a specific block of code a known number of times.
What are the main types of loops?
There are two types of loops, “while loops” and “for loops”. While loops will repeat while a condition is true, and for loops will repeat a certain number of times.
What are the elements of a loop?
Loop statements usually have three components: initialization, condition, and update step, and it contains a loop body.
To know more about loop:
https://brainly.com/question/16922594
#SPJ1
Devision of floating binary
(100.0001)÷(10.1)
1.101 is the correct answer for floating-point binary (100.0001)÷(10.1).
The sign of a binary floating-point number is represented by a single bit. A 1 bit indicates a negative number, and a 0 bit indicates a positive number.
What is Binary Number System?
One of the four types of number systems is a binary number system. Binary numbers are represented in computer applications by only two symbols or digits, namely 0 (zero) and 1 (one). The binary numbers in this example are written in the base-2 numeral system. [tex]101_{2}[/tex] is an example of a binary number. In this system, each digit is referred to as a bit.
A binary number is defined in digital electronics and mathematics as a number expressed in the binary system or base 2 numeral system. It denotes numerical values with two distinct symbols: 1 (one) and 0. (zero). The positional notation with 2 as a radix is the base-2 system.
Because of its direct implementation in electronic circuits using logic gates, the binary system is used internally by almost all modern computers and computer-based devices. Every digit is known as a bit.
To know more about Binary Number, visit: https://brainly.com/question/8649831
#SPJ1
Which of the following could be considered an algorithm?
directions for assembling a bicycle
the pages in a book
a file system directory
an application
F
Below you can see stringSize, which is implemented in Java
Answer:
(a): Yes, it is logically correct as the code does a loop through the all characters of the string and outputs the total amount of them within the string.
(b): It is poorly designed because it is not the most efficient way to get the size of the string. There is a much better way in obtaining it through s.length() and it also accounts for spaces as characters as well.
Explanation:
Hello! Let's help you with your question here!
Now, it is split up into two parts so I will explain them both as such.
Part A:For this part of the question. Yes, it would be logically correct. When the size is returned, it will return the number of characters in s. Let's break down the code step by step:
Code Rundown:int size = 0; (Initializing a size variable of type int and setting it to 0)for (int i = 0; i < s.length(); i++): We create what is known as an index i and have it loop until it reaches the length of the string (This is where we loop through the characters).size++; (For every loop, it'll just add 1 to size, essentially making it a counter).return size; (This returns the number within size after the loop is finished.)As you can see from the rundown, it initializes a counter and loops through each character of the string and increases the counter as it goes. So for this part, it is logically correct as it does give us the total amount of characters within a string which is considered the string size.
Part B:It is poorly designed under two reasons, one is more important than the other as the second one isn't really a requirement, it's just quality of life.
Reason 1 (The Important One):
The main reason why this is poorly designed is that it is not optimized. What it does here is going through the entire string and adds 1 to the counter every time there is a character. However, s.length() achieves the same thing. Instead of creating a counter and having it loop through the entire string and adding 1 to the counter for every character and then returning the counter. s.length() is a method that returns the length of a specified string. In this case, it returns the size of the string. To put it simply, the code in the example can be simplified to just:
private static int stringSize(String s) {
return s.length();
}
This would still give us the same result as the example without having to go through a loop. In programming and algorithms, we learn about time complexity. To put it simply, it is the time it takes for the program to complete. The faster it does without any errors, the more efficient and optimal it becomes. For the code example above, we have time complexity O(n). What this means is that the program needs to run through a loop (multiple checks) before finishing the code, this is the second fastest time. However, with the code I showed you above, it has a time complexity of O(1). For this code, it doesn't need to run any checks, it can just finish the code immediately. Therefore, the code in the example is not efficient.
Reason 2 (Quality of Life One):While the code does work well and does give you an accurate total size of the string every time, it however accounts for spaces as well. If you were to have a space in your string, it would bump the counter up as in Java, as spaces are considered a character because of this you won't get an accurate string size count if you want letters and symbols only. A way to improve it is to create a check within the loop that tells us if the character we are looking at, in the index, is a space or not. If it is a space, we subtract the size counter by 1 and move on. So the modified code would look like this:
public static int stringSize(String s) {
int size = 0;
for (int i = 0; i < s.length(); i++) {
size++;
char c = s.charAt(i);
if (c == ' ') {
size--;
}
}
return size;
}
Explanation:In the code, I am still adding 1 to the size counter still. However, in the bold. I create a variable c of type char and take the character of the string where the index is currently and use an if statement to determine if it is a space or not. If it is not, then the code repeats until the loop is done and then returns the size of the string. However, if it is a space, it'll subtract 1 from the size counter and will loop through the entire string doing this check and then returns the size of the string when it is done.
Learn more about time complexity at https://brainly.com/question/28018274
Find advert in magazines or websites of working desktop computer systems or laptop as well as a monitor, keyboard and software you will also need additional devices such as mouse or printer. Reports outlines and explaining the details of the advertising
Because of our independence, you have complete control over your data. Your information is your information. Independent, open platform. MRC-accredited metrics Increase the effectiveness of advertising.
How do you write outlines for reports and explain the details of advertising?Analyze market position information for the product and explain how that position is expected to change. Make a list of suggestions to improve your next advertisement.
Typically, advertising campaigns promote a product or service. A national automaker, for example, may launch a new vehicle model through print advertisements in newspapers and magazines. To reach the vehicle's target market, the company may also place graphics-rich ads on websites. This combined media blitz produces more desirable results than isolated advertisements without a central strategy.
This automobile manufacturer, or any business selling a product or service, evaluates its campaign's effectiveness based on defined criteria. A written report provides an objective campaign analysis, highlights favorable results and identifies areas in which advertising strategy adjustments are appropriate.
To learn more about details of advertising refer to:https://brainly.com/question/1658517
#SPJ1
What does it mean to say,"we are in a post-PC world?"
Answer:
The use of mobile devices rather than only desktop computers for games, Internet access, general computing and as a terminal to the corporate network. We are in the post-PC era today.
Write an SQL statement to display for every restaurant the name of the restaurant (where the name of the restaurant consists of more than 10 characters) and for every category of menu item its description (catdesc). Furthermore, display the average; cheapest or lowest; and highest or most expensive price of all menu items in that category at that restaurant. Use single row functions to format all the prices. The average price must be padded; the cheapest price must be rounded; but the highest price must not be rounded. Display only those menu items of which the average item price is more than R40. Sort your results according to the restaurant names and for every restaurant from the most expensive average menu item to the cheapest average menu item. Display your results exactly as listed below.
Using the knowledge in computational language in SQL it is possible to write the code that display for every restaurant the name of the restaurant and for every category of menu item its description.
Writting the code:INSERT INTO Dish Values(13, 'Spring Rolls', 'ap');
INSERT INTO Dish Values(15, 'Pad Thai', 'en');
INSERT INTO Dish Values(16, 'Pot Stickers', 'ap');
INSERT INTO Dish Values(22, 'Masaman Curry', 'en');
INSERT INTO Dish Values(10, 'Custard', 'ds');
INSERT INTO Dish Values(12, 'Garlic Bread', 'ap');
INSERT INTO Dish Values(44, 'Salad', 'ap');
INSERT INTO Dish Values(07, 'Cheese Pizza', 'en');
INSERT INTO Dish Values(19, 'Pepperoni Pizza', 'en');
INSERT INTO Dish Values(77, 'Veggie Supreme Pizza', 'en');
INSERT INTO MenuItem Values(0, 0, 13, 8.00);
INSERT INTO MenuItem Values(1, 0, 16, 9.00);
INSERT INTO MenuItem Values(2, 0, 44, 10.00);
INSERT INTO MenuItem Values(3, 0, 15, 19.00);
INSERT INTO MenuItem Values(4, 0, 22, 19.00);
INSERT INTO MenuItem Values(5, 3, 44, 6.25);
INSERT INTO MenuItem Values(6, 3, 12, 5.50);
INSERT INTO MenuItem Values(7, 3, 07, 12.50);
INSERT INTO MenuItem Values(8, 3, 19, 13.50);
INSERT INTO MenuItem Values(9, 5, 13, 6.00);
INSERT INTO MenuItem Values(10, 5, 15, 15.00);
INSERT INTO MenuItem Values(11, 5, 22, 14.00);
See more about SQL atbrainly.com/question/13068613
#SPJ1
How is the logo for a popular sportswear company protected?
A) by a copyright
B) by a patent
C) by a trademark
D) by a trade secret
Answer:
C) by a trade mark
Explanation:
By using a trademark they'll be able to tell other companies that the logo is theirs
Answer:
answer is C.
Explanation:
on What is the output of the following code: int i = 1; while (i <= 9)
{
system. out.print(i+"");
i=i+2;
}
Answer:
13579
java
Explanation:
notice that the System.out.print call does not output a new line.
so... it is going to print 1, then what is 1 plus 2? the answer is 3.
what is 3 plus 2? the answer is 5.
what is 5 plus 2? the answer is 7.
what is 7 plus 2? the answer is 9.
now if we proceeded, i is more than 9, thus ends the while loop.
the output is 13579
because there are no newlines, the numbers are all squished together on the same line.