Ashan Bhetwal wants to create a personal website to display and sell his artwork. He also wants to show the location of his studio, and a video of him painting. What features might he want to add to his website? What tools might he use to build the website?
The features and tools that might he use to build the website is the use of video embed and go ogle maps features.
What is the easiest method of website design?Using a website builder is the simplest approach to make a website. Utilizing one of their pre-made templates, you may build a website using these interactive, browser-based tools. However, just because the templates are "ready-made" doesn't imply you'll end up with a generic website.
A website, often known as a web site, is a collection of web pages and related material that is published on at least one web server and given a shared domain name.
Therefore, In social media posts or other web media, embedding describes the incorporation of links, photographs, videos, gifs, and other content. The inclusion of embedded content gives posts a visual component that promotes more clicks and engagement.
Learn more about website from
https://brainly.com/question/28114357
#SPJ1
(a) What are binary digits?
Answer: A binary digit, or bit, is the smallest unit of information in a computer.
Explanation:
The value of a bit is typically stored above or below an allocated level of an electrical charge within a capacitor inside a memory module. For devices that use positive logic, value 1 (true value or high) is positive voltage relative to the electrical ground and value 0 (false value or low) is 0 voltage.
https://www.techopedia.com/definition/2678/binary-digit-bit
Add the 3 program comments at the top of the program with the information needed:
Name:
Date:
Program:
Set appropriate variables for the maximum and minimum order amounts
Set an appropriate variable for the price per pound of 7.99
Get the order amount input and cast to a number and store it in a variable (Since it can contain decimals, what kind of number cast should you use?)
Write an if structure that compares the input value with the minimum and maximum values according to the creiteria below:
if over the maximum of 100 return a message indicating that
if under minimum of 0.25 return a message indicating that
if within the allowed range return a message with the calculated price rounded to 2 decimal places!
Test your program extensivel and compare with the example output below
#include <bits/stdc++.h>
typedef long double d;
int main(int argc, char* argv[]) {
d a=0.25,b=100,c;
std::cout << "Enter amount: "; std::cin>>c;
if(c>b) std::cout << "Huge amount!";
else if(c<a) std::cout << "Insufficient amount!";
else std::cout << "The price is: $" << std::ceil((c*7.99)*100.0)/100.0 << std::endl;
return 0;
}
For Python code, check the attachments.in java, when a character is stored in memory, it is actually the ________ that is stored.
In java, when a character is stored in memory, it is actually the Unicode number that is stored.
Every character in Unicode has a unique number, regardless of the platform, language, or software it is used with. There were hundreds of distinct encoding techniques for allocating this number prior to the creation of Unicode. Not enough characters could fit in a single encoding: To cover all of its languages, for instance, the European Union alone needs a number of distinct encodings.
No one encoding was sufficient for all the letters, punctuation, and technical symbols in regular usage, not even for a single language like English. Additionally, several encoding techniques clash with one another. The same number may be used by two distinct encodings for two different characters or by a single character in both.
Data always runs the danger of damage when it is transferred between multiple encodings or platforms, even if any particular computer (especially servers) needs to support a wide variety of encodings.
Both students and working professionals can benefit from our fundamental Java programming tutorial. Java is a general-purpose, concurrent, secured, object-oriented, class-based, and computer programming language. It is an established, reliable technique.
A platform is any hardware or software environment in which a program is run. Java is referred to as a platform since it has a runtime environment (JRE) and an API.
To know more about unicode click on the link:
https://brainly.com/question/17147612
#SPJ4
Design a flowchart and code for a program that tabulates contributions collected by an organization. The organization wishes to accept contributions until a total of $10,000,000 is met. Once this total is hit, no further contributions should be accepted.
The organization wants the program to read data from an input file (input.in). The following data should be written to a file called results.out
a.The total number of contributions needed to meet the goal of 10 million dollars
b.The amount of the largest and smallest contribution accepted
c.The average contribution size
d.The final total of the contributions accepted
In this exercise we have to use the knowledge of computational language in JAVA to write a code that Design a flowchart and code for a program that tabulates contributions collected by an organization.
Writting the code:import java.io.*;
import java.util.Random;
import java.util.Scanner;
class Contribution {
public static void main(String[] args) {
String fileInput = "contributions.txt"; // input file
String fileOutput = "results.out"; // the output file to write the result
final double UPPER_LIMIT = 10000000; // declare constant for 10,000,00
double min = 0, max = 0;
double contribution, total = 0;
int counter = 0;
try {
// read the input file using scanner class
Scanner fileReader = new Scanner(new File(fileInput));
// loop as long total contribution is less than max there are contributions in the file
// read line by line
while (fileReader.hasNextDouble() && total < UPPER_LIMIT) {
// read the contribution amount from the file
contribution = fileReader.nextDouble();
// increment counter
counter += 1;
// update the min value
if (counter == 1 || min > contribution) min = contribution;
// update the max value
if (counter == 1 || max < contribution) max = contribution;
// running total of all contribution so far
total += contribution;
}
// close the input file
fileReader.close();
// write the data to the output file now
double average = total / counter;
FileWriter writer = new FileWriter(new File(fileOutput));
writer.write(String.format("It took %d contributions to reach the goal.\r\n", counter));
writer.write(String.format("The maximum contribution received was $%,.2f\r\n", max));
writer.write(String.format("The minimum contribution received was $%,.2f\r\n", min));
writer.write(String.format("The average contribution received was $%,.2f\r\n", average));
writer.write(String.format("A total of $%,.2f was collected.\r\n", total));
writer.flush();
writer.close(); // close the output file
} catch (IOException e) {
System.out.println("Error: could not read/open file: " + fileInput);
}
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Which of the following is NOT true of summary notes?
a. They can be created with a computer.
b. They tie together content from all readings, lectures, and lab sessions.
c. They are the same as the notes you take throughout the term in class.
d. They are created specifically for test reviews.
The incorrect statement about the summary notes is they are the same as the notes you take throughout the term in class. The correct option is c.
What are summary notes?Summary notes are compact notes that are made for revision of purposes. These notes are the extract of all your studies. They contain main things and important subjects and topics.
They can be created on computers and phones, and they are smaller than the notes that are prepared in class.
Therefore, the correct option is c. They are the same as the notes you take throughout the term in class.
To learn more about summary notes, refer to the below link:
https://brainly.com/question/28176775
#SPJ1
A while loop reads characters from input. Write an expression that executes the while loop until character 's' is read.
An expression that executes the while loop until character 's' is read is given below:
The Expression// Takes character input, tallies periods, stops on dollar sign
#include <iostream>
using namespace std;
int main() {
char i; // input received
int j = 0; // counter for # of periods
cout << "This program will accept single-character entries and report the number of periods you've entered.\n";
for (;;) {
do {
cout << "Please enter a single character, using $ to stop: ";
cin >> i;
if(i == '.')
j++;
} while(i != '$');
if(i == '$')
cout << "Total number of periods entered is " < < j < < " .";
break;
}
return 0;
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Prompt the user to enter two words and a number, storing each into separate variables. Then, output those three values on a single line separated by a space
The coding for completing the program is by using two words and a number, storing each into separate variables.
What are variables?In coding or any computer language like python, the variables are the things that are taken in the subject.
def userdetails():
words = input("Enter a word: ")
word2 = input("Enter a word: ")
numm = input("Enter a number: ")
pw1 = words+"_"+word2
pw2 = numm+words+numm
print("You entered: {} {} {}" .format(words,word2,numm))
print("First password:",pw1)
print("Second password:",pw2)
print("Number of characters in",pw1,":",len(pw1))
print("Number of characters in",pw2,":",len(pw2))
Thus, the code for given words and numbers is given above.
To learn more about variables, refer to the below link:
https://brainly.com/question/14679709
#SPJ1
What malware is similar to a virus but is transmitted over a network?
A) anti-malware
B) adware
C) worms
D) spyware
the Answer is C worms
Answer:Worms
Explanation: Worms are self replicating. Worms also don’t need a host computer to run like viruses do.
answer in java.
Write a class named TestScores. The class constructor should accept an array of test scores as its
argument. You will need to do a deep copy of the array, don’t just copy the address of the array. The
class should have a method that returns the average of the test scores. If any test score in the array is
negative or greater than 100, the class should throw an IllegalArgumentException.
Write an exception class named InvalidTestScore. Create a setScores() method in TestScores which
accepts an array of test scores. Validate each item in the array and if any test score in the array is
negative or greater than 100, the class should throw an InvalidTestScore Exception.
Next create another method in TestScore called getScoresFromFile(). This method should open a file
that you created in Notepad and it should contain a list of test scores, some valid and others not. Read
in each of these test scores and store into an array. The first entry in the file should be the number of
scores that should be read. This number should be used to properly create the test score array. The
method should properly handle the potential FileNotFoundException. If file does not exist the program
should stop and exit with your own error message. As each score is read from the file (use nextInt())
throw either an IllegalArgumentException or an InvalidTestScore if the number read is not between 1
and 100 inclusive. You also need to handle an InputMismatchException. This means that either a
string was encountered or a floating-point number was encountered while reading the file. When this
happens issue an error message, but continue processing the file until you reach end of file. Note:
When this happens the entry you will add to the test score array will contain 0. How you accomplish
this is up to you. Feel free to discuss with your instructor.
Demonstrate all this functionality in a main() program
Using the knowledge of computational language in JAVA it is possible to write a code that a class named TestScores. The class constructor should accept an array of test scores as its argument.
Writting the code:import java.util.Scanner;
class TestScores
{
int scores[];
TestScores(int array[])
{
scores=new int[array.length];
for(int i=0;i<array.length;i++)
{
scores[i]=array[i];
}
}
double calAverage()
{
double avg;
int sum=0;
for(int i=0;i<scores.length;i++)
{
sum=sum+scores[i];
}
avg=sum/scores.length;
return avg;
}
}
class TestDriver
{
public static void main(String args[])
{
try
{
Scanner s=new Scanner(System.in);
int count;
System.out.print("Enter number of test scores : ");
count=s.nextInt();
int array[]=new int[count];
System.out.println("\nEnter test scores ");
for(int i=0;i<count;i++)
{
array[i]=s.nextInt();
if(array[i]<0||array[i]>100)
{
throw new IllegalArgumentException("Test scores must have a value less than 100 and greater than 0.");
}
}
TestScores ts=new TestScores(array);
double avg=ts.calAverage();
System.out.println("\n Test Scores average is : "+avg);
}catch(IllegalArgumentException e)
{
System.out.println(e.getMessage());
}
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
3. What is a process in software engineering
please i need help asap i will mark brainlest
Which of the following are notes which can be electronically entered into documents without changing the content of the document?
Question 1 options:
Comparisons
Comments
Changes
Reviews
Comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.
What are the characteristics of word documents?The characteristics of word documents are as follows:
It allows a user to construct professional write-ups.It has editing and formatting tools that modify the existing documents.It authorizes the user to insert charts, tables, diagrams, etc. within the document to make it more attractive.In this question, the significance of a comment is better understood by the fact that it represents the notes a reader can normally insert within the existing document in order to modify or highlight the required text in the document.
Therefore, comments are notes which can be electronically entered into documents without changing the content of the document. Thus, the correct option for this question is B.
To learn more about Documents, refer to the link:
https://brainly.com/question/1218796
#SPJ1
Some one please help me
Answer:
Makes no sense
Explanation:
a program to search words in c++
Answer:
a starting point might be after you get this working, you can allow them to enter more words and iterate your search,
for each argument (not counting the first one that is the file name)
search for the word, show the lines...
and more files too, for that matter, for each file, for all the words... (at this point you MUST put flags on what each thing is, up to now, you can use the order of args)
just note that arg[] are c-strings. you can assign a string a c-string, so promotion lets you do things more normally, or you can process it as-is depending on what you use it for (see how I just used it in the file name but moved it to a string in the target?). I plan to use target a lot, but the file name only in one statement ever, no need to upcast it.
Explanation:
int main(int argc, char* argv[])
{
if(argc < 3) //if the user did not provide enough command line inputs.
//you can, and should probably, do more exhaustive input validation and maybe have them
//do flags as well rather than rely on the order of the arguments to be correct.
{
cout << "usage: mygrep filename word"
return 1;
}
ifstream infile(argv[1]); //attempt to open the first target as the file
string target = argv[2]; //assign target from the second argument
...
Q1:most common cybercrimes?
Q2: Difference between Hacker and crackers
Q1: phishing and similar fraud
Q2: Hackers are good people who hack devices and systems with good intentions. They might hack a system for a specified purpose or for obtaining more knowledge out of it. Crackers are people who hack a system by breaking into it and violating it with some bad intentions.
Which of the following people will benefit the most from using a B2B website?
A person who would benefit the most from using a B2B website is: A. Akiko, who provides services to other smaller businesses which helps them establish themselves in the market.
The types of business models.Generally speaking, e-commerce comprises of four (4) main business models and these include the following;
Business to Consumer (B2C).Business to Government (B2G).Consumer to Consumer (C2C).Business to Business (B2B).What is B2B?B2B is an abbreviation for business-to-business and it can be defined as a type of market in which a business (manufacturer or producer) sells its products directly to other business agents such as:
RetailersWholesalersIn this context, we can reasonably infer and logically deduce that Akiko would benefit the most from using a business-to-business (B2B) website because she is a service provider to other smaller businesses.
Read more on B2B here: https://brainly.com/question/26506080
#SPJ1
Complete Question:
Which of the following people will benefit the most from using a B2B website?
A. Akiko, who provides services to other smaller businesses which helps them establish themselves in the market
B. Rahim, who wants to sell his old furniture before he moves to a different city
C. Rohan, who runs a company that sells organic cosmetics directly to consumers
D. Mika, who sells hand-made and inexpensive jewelry to college students
Effective PivotCharts should include as many metrics as possible.
O True
O False
It is true that effective pivot charts should include as many metrics as possible. Hence, the statement is true.
What is a Pivot Chart?A PivotTable to compile, examine, research, and display summary data In order to help you quickly see comparisons, patterns, and trends, PivotCharts add visualizations to the summary data in a PivotTable. You can use both pivot tables and pivot charts to make well-informed judgments regarding important business data.
You can connect to PivotTables in order to access other data sources such SQL Server tables, SQL Server Analysis Services cubes, Azure Marketplace, Office Data Connection (.odc) files, XML files, Access databases, and text files. Additionally, you can create new tables by utilizing already-existing pivot tables.
To get more information about Pivot Chart :
https://brainly.com/question/13198104
#SPJ1
Assume that c is a char variable that has been declared and already given a value. Write an expression whose value is true if and only if c is what is called a whitespace character (that is a space or a tab or a newline-- none of which result in ink being printed on paper).
The expression whose value is true if and only if c is what is called a whitespace character is ( c == " II c== '\n' || c == '\t').
The "white-space character" space, tab, line feed (newline), carriage return, form feed, and vertical tab serve the same function as the spaces between words and lines on a printed page: they facilitate reading. White-space characters and other tokens, including operators and punctuation, serve as token delimiters (bounded spaces).
The C compiler ignores white-space characters while parsing code unless you use them as separators, as parts of character constants, or as literal strings. To make a program easier to read, use white space characters. Take note that comments are also treated as white space by the compiler.
Any character or string of characters used to represent horizontal or vertical space in typography is known as whitespace in computer programming. A whitespace character usually takes up space on a page even though it does not correlate to a mark when it is rendered.
For instance, the standard whitespace symbol U+0020 SPACE (also known as ASCII 32) is a punctuation mark for a blank space that is used to separate words in Western scripts.
To know more about whitespace character click on the link:
https://brainly.com/question/14936585
#SPJ4
Que tecnología son afectadas por digital trust?
Estas 4 tecnologías de confianza digital monitoreo basado en IA, confianza de datos, cadena de bloques y tecnologías cuánticas pueden ser útiles cuando se usan en conjunto, ayudándolo a mejorar la reputación de su marca al proteger sus datos, además de mejorar y optimizar sus procesos.
(Monitoreo basado en IA, fideicomisos de datos, blockchain y tecnologías cuánticas)
i need big help so everyday my computer add new tabs when im working and what i do is check for viruses and watch vidoes how to fix and it dosent work i even resatrt my computer and scan for malware what shoul i do? and every day i fix it but then the next day it happens again pls help. and dont tell me to get a computer.
Answer:
1 Broken or malfunctioning keyboard: A broken key in your keyboard or a malfunctioning keyboard can cause such issues.
2 Problematic Keyboard Drivers: Outdated or corrupted keyboard drivers may trigger actions that make your computer alt tab on its own.
3Problematic Graphics Drivers: Corrupted graphics drivers may bug the overlay, which is likely why your games keep alt tabbing.
4Virus Or Malware: Virus and malware are known to take over applications and make them behave wierdly. This can be one of those situations.
5 A Task is running in the background: A task may be running in the background while you are playing a game on fullscreen. This may bug the task window and make it alt tab every few seconds.
6Background applications and services: Similar to a task running in the background, other applications, and services running in the background can also get bugged and alt tab on their own.
7Corrupted system files and outdated Windows: Outdated Windows and corrupted system files are also known instigators for such issue.
have great day
Please help
When communicating online, it is important to understand there is no vocal tone or body language, as there is in face-to-face conversation. What are some things you can do when communicating online to maintain appropriate netiquette? Use details to support your answer.
You see a picture of three people having fun in an IG post. Beneath the photo is a text about a prty. You wrongly assume this picture was taken at a prty when it was actually taken during a family dinner. This type of misunderstanding is an example of
From the information given this type of misunderstanding is an example of: Communication Barrier.
What are communication Barriers?Communication obstacles prohibit us from accurately receiving and accepting the messages used by others to transmit their information, thoughts, and ideas. Communication difficulties include information overload, selective perceptions, workplace gossip, semantics, gender disparities, and so on.
It is to be noted that the Assumption that you comprehend what the other person is saying is one of the most significant communication barriers. People frequently make assumptions based on their own experiences and interpretations. You don't always know you're not talking about the same subject.
Learn more about Communication Barrier:
https://brainly.com/question/8588667
#SPJ1
Answer:
error, i think.
What building on the Castle Crasher Playground will be the THIRD knocked over according to this project?
5 buildings on the Castle Crasher Playground will be the THIRD knocked over according to this project.
Project
A project is any individual or collaborative undertaking, possibly involving research as well as design, that is carefully planned to achieve a specific goal. An alternative viewpoint regards a project as a series of events: a "set of interrelated tasks to be completed over a fixed period of time and within certain cost and other constraints." A project is a temporary (rather than permanent) social system (work system) that may be staffed by teams (within or across organisations) to complete specific tasks under time constraints.
The algorithm should be written in such a way that the VR Robot can knock down all five buildings regardless of the layout of the Playground. Without modifying the project, knock down all buildings in five Castle Layouts.
To learn more about project
https://brainly.com/question/25009327
#SPJ9
This code is giving no error but is not printing my "goal." Which is to print a year of highschool when a number is input. Instead the code is only printing "Not in High School" every time, every number. Can someone please explain to me what I did wrong?
grade_number = input("What year of high school are you in? ")
if grade_number == 9:
print("Freshman")
elif grade_number == 10:
print("Sophomore")
elif grade_number == 11:
print("Junior")
elif grade_number == 12:
print("Senior")
else:
print("Not in High School")
Answer:
You must convert your input to an integer before the if statements.
Explanation:
input() returns a string, which should be converted to your desired type, OR you should compare against string literals.
See below for working code.
how often does windows automatically defragment a hard drive or trim a solid-state drive
If there is extraordinary fragmentation that is getting close to the "maximum fragmentation threshold," Windows will automatically consider partially defragmenting an SSD once a month.
In this post, we define defrag and discuss why doing it on an SSD is often a terrible idea.
However, that is a pretty straightforward response to a much more complex reality that most websites and forums get incorrect. If you want to know that, when left to Microsoft, defragging and optimizing an SSD are both excellent things, keep reading this article.
It saves time, energy, and wear and tear for disk read heads to not have to skip around your spinning disk in search of all the pieces by moving the thousands of file parts into sequential order during defragmentation of a spinning hard drive.
However, if there is extraordinary fragmentation that is getting close to the "maximum fragmentation threshold," Windows will automatically consider partially defragmenting an SSD once per month. After that point, the SSD will stop reading and writing because the "meta data" for the file fragments is too much for the SSD to manage. Microsoft will cautiously defrag the seldom potentially dangerous files because this is a negative thing.
To know more about fragmentation click on the link:
https://brainly.com/question/14127090
#SPJ4
For each of the following questions, be sure to choose not only the correct answer but the *canonically correct* answer. There may be one or more answers which are correct, but some of those answers may not be conventional use.
Question 1 (1 point)
Which of the following will allocate a buffer suitable for 4 integers?
Question 1 options:
int *ptr = (int *)malloc(sizeof(int) * 4);
int *ptr = (int * 4)malloc(sizeof(int));
int *ptr = (int *)malloc(4);
int *ptr = malloc[4];
Question 2 (1 point)
For the following program, which satement best fits as a parameter for the printf() call?
#include
typedef union u_foo {
int iValue;
float fValue;
} Foo;
void main(int argc, char **argv) {
Foo foo;
foo.iValue = 42;
printf("The value of foo is %d\n", );
}
Question 2 options:
foo.fValue
foo.iValue
(&foo)->iValue
(*(&foo)).iValue
Question 3 (1 point)
In the following makefile, what is the target `foo` dependent upon?
all: foo
foo: foo.c
gcc -o foo foo.c bar.c
bar: bar.c
gcc -o bar bar.c
clean:
rm foo bar
Question 3 options:
foo.c and bar.c
bar
all
foo.c
Question 4 (1 point)
For the following header file, which statement best declares a function that takes 2 integer parameters?
#ifndef SOMETHING__H
#define SOMETHING__H
#endif // SOMETHING__H
Question 4 options:
int foo(int a, int b);
extern int foo(int a, int b);
extern int foo(int *a, int *b);
static int foo(int a, int b);
Question 5 (1 point)
For the following program, what line is best applied to release the allocated memory?
#include
int main(int argc, char **argv) {
char *buf = malloc(32);
// assume buf is used appropriately here
}
Question 5 options:
release(buf);
free(buf);
free(32);
delete(buf);
Question 6 (1 point)
In the following program, which statement will properly copy the contents of `foo` to `bar`?
#include
#include
#include
int main(int argc, char **argv) {
char *foo = "This is a statement of intent";
char bar[16];
memset(bar, 0, 16);
}
Question 6 options:
memcpy(bar, foo, 15);
strncpy(bar, foo, 16);
strcpy(bar, foo);
strcpy(foo, bar);
Question 7 (1 point)
For the following program, which statement best fits as a parameter for the printf() call?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo foo = { 42 };
Foo *pFoo = &foo;
printf("The value of foo is %d\n", );
}
Question 7 options:
pFoo->value
*pFoo->value
pFoo.value
(*pFoo).value
Question 8 (1 point)
For the following program, which statement best fits as a parameter for the printf() call?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo foo = { 42 };
printf("The value of foo is %d\n", );
}
Question 8 options:
(*foo).value
foo->value
*foo.value
foo.value
Question 9 (1 point)
For the following header file, which line of code is missing?
#ifndef SOMETHING__H
extern int foo;
#endif
Question 9 options:
#define SOMETHING__H
// SOMETHING__H
static int foo();
typedef foo something;
Question 10 (1 point)
What is the size in bytes of the following structure?
struct t_foo {
int bar: 6;
int baz: 5;
int bat: 2;
};
Question 10 options:
12
13
16
2
Question 11 (1 point)
For the following program, what is the best way to get a block of memory on the heap for the variable `foo`?
#include
typedef struct t_foo {
int value;
} Foo;
void main(int argc, char **argv) {
Foo *foo = ;
}
Question 11 options:
malloc(sizeof(t_foo))
malloc(8)
{ 42 }
malloc(sizeof(Foo))
Question 12 (1 point)
For the following program, which line of code will place the contents of the file into the memory for the variable `buf`?
#include
void main(int argc, char **argv) {
FILE *fp = fopen("somefile.txt", "rt");
int fsize = // ASSUME WE GET THE SIZE OF THE FILE HERE
char buf[128];
// MORE PROGRAM CODE HERE
}
Question 12 options:
fread(fp, buf, fsize)
fread(buf, fp, fsize, 1)
fread(fp, fsize, buf, 1)
fread(buf, fsize, 1, fp)
Question 13 (1 point)
For the following program, which line of code will get the size of the file in question?
#include
void main(int argc, char **argv) {
FILE *fp = fopen("somefile.txt", "rt");
fseek(fp, 0, SEEK_END);
fseek(fp, 0, SEEK_SET);
}
Question 13 options:
int fsize = ftell(fp);
int fsize = fp.position;
int fsize = ftell(&fp);
int fsize = fread(fp, 1);
Question 14 (1 point)
For the following program, which is the best type for the variable `next`?
#include
typedef struct t_foo {
int value;
next;
} Foo;
void main(int argc, char **argv) {
Foo foo;
}
Question 14 options:
struct t_foo
Foo
struct t_foo*
Foo *
Question 15 (1 point)
In the following program, what is the value of `*ptr`?
#include
int main(int argc, char **argv) {
int foo[] = { 0, 1, 2, 3, 4 };
int *ptr = &foo;
do {
++ptr;
} while (!ptr);
}
Question 15 options:
foo[1]
2
0
1
Answer:
12
Explanation:
enters integral values
What is SDLC & Agile Development
An attacker discovered an input validation vulnerability on a website, crafted a URL with additional HTML code, and emailed the link to a victim. The victim unknowingly defaced (vandalized) the web site after clicking on the malicious URL. No other malicious operations occurred outside of the web application’s root directory. This scenario is describing which type of attack?
This scenario is describing attack of:
Computer BotsCommand & ControlWhat are computer bots?A computer programme known as a "bot," short for robot, executes automatic, repeated operations. Usually, bots mimic or take the place of human users. As automated systems, they perform tasks considerably more quickly than do consumers who are humans.
Which types of bots are there?Bots come in two flavours: good bots and bad bots, both of which are relevant to web security. Both make attempts to use web resources (such as websites, web applications, APIs, etc.) or carry out other normal human user actions on the web, but for quite different reasons.
How do computer bots work?A bot (short for robot) is a software application programmed to perform tasks through Robotic Process Automation, or RPA. Bots work by automatically going through a set of instructions, and they carry out tasks and processes much faster, more accurately, and at a higher volume than it would otherwise take humans.
What is computer bots malware?Here's a quick malicious bot definition: A malicious bot is an automated malware program that can infect a system, steal data, or commit other fraudulent activities.
To learn more about computer bots visit:
https://brainly.com/question/28540266
#SPJ10
Answer: (D) Cross-site scripting (XSS)
Explanation: Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
The Web Engineering methods landscape encompasses a set of technical tasks that enable a Web engineer to understand, characterize, and then build a high-quality Web Applications. Discuss the following Web Engineering methods:
a) Communication methods.
b)Requirements analysis methods.
c) Design methods.
d) Construction methods.
e) Testing methods.
Answer:
A
Explanation:
I did the test,
You're installing a new network for CSM Tech Publishing, a new publisher of technical books and training materials. There will be 10 client computers running Windows 10, and CSM Tech Publishing plans to run a web-based order processing/inventory program that for now is used only by in-house employees while they're on site. CSM Tech Publishing wants to be able to manage client computer and user policies and allow employees to share documents. Sign in and security should be centrally managed. What network model, workgroup, or domain, should be used? Explain your answer, including any server roles you may need to install.
The network model, workgroup, or domain, that should be used include TCP, Microsoft, and Windows domain respectively.
How to illustrate the information?The TCP/IP paradigm is employed in this scenario because it requires established protocols for packet and data transmission over a network of 10 clients and in-house personnel. TCP/IP is a connection-oriented protocol that aids in packet transport.
The workgroup that adheres to Microsoft Windows guidelines can be used. These workgroups play a significant role in the management of LAN PCs by offering peer-to-peer connectivity. Peer-to-peer networking facilitates file sharing and local resource sharing.
The PCs can be managed via the Windows Domain. The Windows Domain also aids in resource sharing. The network administrator plays a vital role in network monitoring by using a monitoring tool. The administrator scans the network for various vulnerabilities.
Learn more about network on:
https://brainly.com/question/1027666
#SPJ1