In the code segment below, the int variable temp represents a temperature in degrees Fahrenheit. The code segment is intended to print a string based on the value of temp. The following table shows the string that should be printed for different temperature ranges.
31 and below --> "cold"
32-50 --> "cool"
51-70 --> "moderate"​
71 and above --> "warm"
String weather;
if (temp <= 31)
{weather = "cold";}
else
{weather = "cool";}
if (temp >= 51)
{weather = "moderate";}
else
{weather = "warm";}
System.out.print(weather);
Which of the following test cases can be used to show that the code does NOT work as intended?
1. temp = 30
11. temp = 51
111. temp = 60
A
I only
B
II only
C
I and II only
D
II and III only
E
I, II, and III

Answers

Answer 1

The code segment is intended to print a string based on the value of temp.

Option(D) can be used to show that the code does NOT work as intended

What is a string?

A string is typically a series of characters in computer programming, either as a literal constant or as some sort of variable. The latter can either have a set length or allow its elements to be altered.

A String Array is an Array with a predetermined number of String items. Similar to other Array data types, the String Array functions similarly. An example of a string of characters is "Hello World."

To learn more about a string, use the link given
https://brainly.com/question/24275769
#SPJ4


Related Questions

Which indent type is applied when you choose bullets or numbering with a list of items?.

Answers

When you select bullets or numbers for a list of items, a hanging indent is used.

What is  indent?

The term "indent" refers to the separation of the text from the page margins. Three different styles of indents exist: 1. Left indent before text: This style is also known as an indent. A value will cause the left margin to reclaim the space, and vice versa. 2. Right indent after text: This is another name for this indent. When a value is positive, the right margin will fill the corresponding space, and vice versa. 3. First line indent: Using this option, you can set the indent values for the document's first line.

To know more about Indent
https://brainly.com/question/24953659
#SPJ4

after creating a self-signed certificate in internet information services (iis) manager for the windows server update services (wsus) server, what is the next step you need to perform?

Answers

The next step that has to be taken by an individual after  creating a self-signed certificate in Internet Information Services (IIS) Manager for the Windows Server Update Services (WSUS) server is: “Bind the certificate to the HTTPS port in IIS.”

What is a self-signed certificate?

A public-key certificate whose public key can be used to verify the digital signature on the certificate. The authenticity of the information contained in a self-signed certificate is not ensured by the signature, but it does maintain its integrity.

"Bind the certificate to the HTTPS port in IIS," is the next action a user must perform after creating a self-signed certificate in Internet Information Services (IIS) Manager for the Windows Server Update Services (WSUS) server.

Learn more about signed certificate from here:

https://brainly.com/question/6333238

#SPJ1

question 4 a data analyst is creating a dashboard using tableau. in order to layer objects over other items, which layout should they choose? floating layout.

Answers

OLAP (online analytical processing) software is the software to perform various high-speed analytics of large amounts of data from a data center, data mart, or other integrated, centralized data store.

What is the use of Online Analytical Processing (OLAP)?

OLAP provides pre-calculated data for various data mining tools, business modeling tools, performance analysis tools, and reporting tools.

OLAP can help with Planning and Budgeting andFinancial Modeling. Online Analytical Processing (OLAP) is included in many Business Intelligence (BI) software applications. It is used for a range of analytical calculations and other activities.

Therefore, OLAP (online analytical processing) software is the software to perform various high-speed analytics of large amounts of data from a data center, data mart, or other integrated, centralized data store.

Learn more about Online Analytical Processing (OLAP):

brainly.com/question/13286981

#SPJ1

explain why the array implementation of a stack does not require elements to be shifted but the noncircular array implementation of a queue does.

Answers

The array implementation of the stack does not require elements to be shifted because the stack inserts and removes elements from one end, meaning there is no need to shift elements after insertion or removal of elements as the latter. Meanwhile, noncircular arrays require elements to be shifted because a circular queue is an extended version of a regular queue where the last element is connected to the first element. Thus forming a circle-like structure.

The array space, which is used to store queue elements, can never be reused to store those queue elements because elements can only be inserted at the front end and the leading value may be so high that, all space before it, can never be filled. The queue data structure can be implemented using a one-dimensional array. Queues implemented using arrays store only a fixed number of data values. The implementation of the queue data structure using an array is very simple.

Learn more about array here https://brainly.com/question/13107940

#SPJ4

the advertisement below is an example of a(n) the advertisement below is an example of a(n) informative advertising objective persuasive advertising objective reminder advertising objective slander advertising objective

Answers

The advertisement below is an example of an informative advertising. Thus, option A is the correct option.

What is informative advertising?

Utilizing facts to highlight the advantages of a product's features rather than pandering to consumers' emotions is used in informative advertising.

Any advertisement has one main objective: to sell products. The choice of methods represents the only distinction. To achieve a particular objective, each of them offers unique opportunities. Additionally, different industries seem to benefit from particular techniques more than others.

Through the use of data and statistics that demonstrate the worth and applicability of a product, informative advertising attempts to influence a user's choice. The ability for users to verify any statement is crucial. Consumers are therefore more likely to trust a company when they are informed, and this increases the authority of brands.

Learn more about informative advertisement

https://brainly.com/question/15734780

#SPJ4

which component of the apple ios architecture involves passwords, pins, and remote wipe?

Answers

The component of the Apple IOS architecture that involves passwords, pins, and remote wipes is known as device access.

What is Apple IOS architecture?

Apple IOS architecture may be defined as a proprietary mobile operating system that runs on mobile devices such as the iPhone, iPad, and iPod Touch. This IOS system is remarkably based on the Mac OS X operating system for desktop and laptop computers.

According to the context of this question, the architecture of IOS is a layered architecture. Due, to this, it is characterized as the uppermost level iOS functions as an intermediary between the underlying hardware and the apps you make.

Therefore, device access is a component of the Apple IOS architecture that involves passwords, pins, and remote wipes.

To learn more about IOS operating system, refer to the link:

https://brainly.com/question/12377063

#SPJ1

retail online sales hires esteban to finish the computer programming required on the project. with respect to the miracle view's contract with retail online sales, esteban is miracle view llc signs a contract with retail online sales inc., by which retail online sales will develop mobile view's mobile app. retail online sales hires esteban to finish the computer programming required on the project. with respect to the miracle view's contract with retail online sales, esteban is an intended beneficiary. a promisee. a promisor. an incidental beneficiary.

Answers

With respect to the miracle view's contract with retail online sales, esteban is an intended beneficiary is a promisor.

A method that enables customers to look for, choose, and buy goods, services, and information remotely over the Internet. By 2034, it is anticipated that India's e-commerce market will overtake the rest of the world. On the other hand, India's e-retail online sales sector is poised to attract close to 300 to 350 million customers in the next five years. a theory of retail competition that claims that just like the goods they sell, retailing establishments go through a cycle that can be seen. They are the individuals who are most likely to purchase your goods or services, and they share a number of traits in common with one another, including behaviors and demographics. Your ability to comprehend how and where to reach your ideal potential customers will improve the more precisely you can define your target market.

Learn more about retail online sales here:

https://brainly.com/question/24183032

#SPJ4

your task is to implement a simulation of a change directory command. this command changes the current working directory to the specified one. the initial working directory is root i.e. /. you are given a list of cd commands commands

Answers

This command changes the current working directory to the specified one. The initial working directory is root i.e. You are given a list of commands There

What is the command?

we refer to as "imperative verbs" are the building blocks of command words. As they command someone to do something, these are also referred to as "bossy verbs." For instance, the directive "Eat your food" uses the imperative verb eat. We refer to a statement as an imperative when an imperative verb is present.

This command changes the current working directory to the specified one. the initial working directory is the root command that changes the current working directory to the specified one. The initial working directory is root i.e. You are given a list of commands There

Therefore, This command changes the current working directory to the specified one

Learn more about the command here:

https://brainly.com/question/14548568

#SPJ1

a binary variable can help a modeler maintain the linearity of a model when looking to avoid an if function. true false

Answers

The assertion is accurate. When trying to avoid an if function, a modeler can retain the linearity of a model with the use of a binary variable.

Using linear programming has advantages across a wide range of academic areas. It is extensively used in mathematics and, to a lesser extent, in problems involving business, economics, and various forms of engineering. Manufacturing, telecommunications, energy, and transportation are some industries that employ linear programming techniques. Simulating a variety of planning, routing, scheduling, assignment, and design issues has shown promise. Linear functions are represented by concave and convex shapes. The feasible solution to a system of linear inequalities is a linear programming problem in which the objective function is the zero function. However, some problems have distinct optimal solutions.

Learn more about programming here-

https://brainly.com/question/11023419

#SPJ4

true or false? network address translation (nat) prevents hosts on a lan from sharing the global ip address assigned by the isp.

Answers

It is false that network address translation (nat) prevents hosts on a lan from sharing the global ip address assigned by the isp.

What is Network address translation (NAT)?

NAT is an acronym which stands for network address translation. It's a method of mapping numerous local private addresses to a public one before transferring the data. Most home routers and organizations that want multiple devices to share a single IP address use NAT.

How Does NAT Work?

Assume your laptop is linked to your home router. Someone uses their laptop to look up directions to their favorite restaurant. The laptop sends this request in the form of a packet to the router, which forwards it to the web. However, the router must first change the incoming IP address from a private local address to a public address.

If the packet retains a private address, the receiving server will have no idea where to send the information back to — this is analogous to sending physical mail and requesting return service but providing an anonymous return address. By using NAT, the information is routed back to the laptop using the router's public address rather than the laptop's private address.

To learn more about NAT, https://brainly.com/question/13105976

#SPJ4

trevor is working as a network engineer at spring oaks high school. the school's management has been facing some issues while handling network traffic. trevor wants to check the bandwidth as he assumes that the issues faced by the management are related to bandwidth errors. which of the following technologies should trevor use to ensure some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion?

Answers

NTP is the technology that trevor should use to ensure some some traffic gets priority over other traffic so the most important traffic gets through even during times of congestion.

An internet protocol called Network Time Protocol (NTP) is used to synchronize with networked computer clock time sources. It is a component of the TCP/IP suite and one of the original components. Both the protocol and the client-server computer programs are referred to as NTP.

A system called Network Time Protocol (NTP) is used to time-synchronize a network of computers. User Datagram Protocol (UDP), which is based on IP, is used by NTP. RFC 1305 contains documentation on NTP Version 3. How to set up Network Time Protocol on Cisco hardware is covered in this module.

To know more about NTP click here:

https://brainly.com/question/28468595

#SPJ4

which of the following interface evaluation techniques involves a highly structured assessment of the users' interaction with the system, usually in a lab environment?

Answers

Usability testing interface evaluation technique involves a highly structured assessment of the users' interaction with the system, usually in a lab environment.

What is an interface?

In the Java programming language, an interface is an abstract type used to specify a behavior that classes must implement. They are a lot like protocols. Only method signature and constant declarations may be included in an interface, which is declared using the interface keyword.

An interface in Java provides an abstract type to specify how a class will behave. Abstraction, polymorphism, and multiple inheritances are enabled by this technology since they are fundamental ideas in the Java programming language. In Java, an interface is used to accomplish abstraction.

To learn more about an interface, use the link given
https://brainly.com/question/28503096
#SPJ4

Brody and his two business partners started a food-order delivery company about two years ago. Customers place orders for meals from local restaurants, and the company picks up and delivers their orders. Because so many local restaurants don't have their own delivery service, the company has grown exponentially over the past year as satisfied customers recommend their service to business associates. However, Brody has gotten word that a competitor is about to open a similar service in their area, and he's looking for ways to protect their market share.Brody already collects customer information in his company's CRM with every order placed, such as contact information and delivery address. However, he'd like to target the top 20-30% of his customer base to develop more extensive data on these customers and cultivate a more durable relationship. What tool can best help Brody collect this kind of information on his most frequent customers? a. Upselling b. Data warehousing c. Loyalty program d. Web site customization

Answers

Tool can best help Brody collect this kind of information on his most frequent customers is Loyalty program.

With a customer loyalty program, a company can reward regular customers with discounts and other benefits. It's a strategy used in business to entice clients to purchase from you on a regular basis. Customers can earn points through purchases or other straightforward actions on your store according to the most popular loyalty program models. Customers receive points for each purchase they make, and they can exchange those points for rewards to entice them to make additional purchases. Examples include loyalty programs from hotels like Hilton or airlines like American Airlines, which encourage customers to keep making purchases from them by offering free sign-ups. Customers can advance to higher tiers as they make more purchases and accumulate more rewards over time. This lifecycle has been divided into five separate stages.

Learn more about loyalty programs here:

https://brainly.com/question/4945766

#SPJ4

recursive function that accepts a stack of integers as a parameter and replaces every even value in the stack with two occurrences of that value

Answers

The solution is to keep all values in the Function Call Stack until the stack is empty. When the stack is empty, place all held items at the bottom of the stack one by one.

What is Recursive Function?

Recursive functions in code frequently rely on loop setups, in which the initial variable is called on multiple times while the loop is changing it. The factorial is a simple example of a recursive function in which an integer is multiplied by itself while being incrementally lowered. Many other self-referencing functions in a loop, for example, where n = n + 1 given an operating range, could be called recursive functions.

In addition to simpler recursive functions, programmers and others have created much more complex functions that also use recursion principles. Some, such as the Fibonacci sequence, have applications in finance and other fields, while others are esoteric and largely restricted to the IT community.

To learn more about Recursive Function, visit: https://brainly.com/question/28540529

#SPJ4

some e-mail systems store messages in flat plaintext files, known as a(n) ____ format.

Answers

Some e-mail systems store messages in flat plaintext files, known as a(n) mbox format.

What is MBOX?

The term "MBOX" (sometimes referred to as "Berkeley format") refers to a group of closely comparable file formats that are used to store collections of electronic mail messages. New messages are added to the end of the database file that contains all of the messages in a folder, not a mailbox, as is the case with MBOX formats.

Therefore in the context of email system, a common format for storing messages is an mbox file. It includes all of the exported message information, including the message content and any attachments. The message's metadata as it was captured by Go ogle is reflected in the metadata file.

Learn more about e-mail from

https://brainly.com/question/23902582
#SPJ1

g go to the depreciation worksheet. pranjali needs to correct the errors on this worksheet before she can perform any depreciation calculations.

Answers

Steps for correction :

1. cells D3:D4 must be merged

2. the labels in cells D6:D8 must be centered

3. the border around cells B11:E11 must be removed

4. the border around cells B13:E13 must be removed

5. the font in cells B6:E8 must be changed to bold

6. the font in cells B10:E10 must be changed to bold

7. the font in cells B12:E12 must be changed to bold

8. the alignment in cells B14:E14 must be changed to center

9. the alignment in cells B15:E15 must be changed to center

What is worksheet?

A worksheet is a spreadsheet that is used to enter and store data.

To know more about worksheet
https://brainly.com/question/1234279
#SPJ4

which of the following statements is false? use the private keyword to encapsulate data fields. encapsulating data fields makes the program easy to maintain. encapsulating data fields makes the program short. encapsulating data fields helps prevent programming errors.

Answers

Encapsulating data fields makes the program short is false. Thus option C is the correct option.

What is data fields?

A data field is a place where a specific kind of data can be stored, and when combined with other data fields, they describe the location where the data is stored. The most typical illustration is a column in a data table that describes the row with which it intersects, though other examples include class variables in programming languages like Java.

Consider an object and its various manifestations as data fields to help you think about them more clearly. Let's use beds as an illustration. King-sized, wooden, spring-suspended bed: that's the one. An additional metal queen bed with elastic suspension is available.

Learn more about data fields

https://brainly.com/question/27362402

#SPJ4

your software development team recommends building a new custom software application as an n-tiered application. which of the following are benefits that will be realized from this design strategy? (choose three.)

Answers

An N-tier architecture would divide an application into three distinct tiers. These are the examples.

There are three tiers: the logic tier, the presentation tier, and the data tier.

What is N-Tier Architecture?

N-tier architecture is also known as multi-tier architecture because the software is designed to physically and logically separate the processing, data management, and presentation functions.

This means that these various functions are hosted on multiple machines or clusters, ensuring that services are provided without sharing resources and, as a result, are delivered at maximum capacity. The "N" in n-tier architecture refers to any number starting with 1.

Not only will your software benefit from being able to obtain services at the lowest possible cost, but it will also be easier to manage. This is due to the fact that when you work on one section, the changes you make will have no effect on the other functions. And if there is a problem, it is simple to locate its source.

To learn more about N-Tier Architecture, visit: https://brainly.com/question/15878398

#SPJ4

a(n) is a range of data excel treats as a single object that can be managed independently from other data in the workbook.

Answers

A table is a range of data excel treats as a single object that can be managed independently from other data in the workbook. The correct option is C.

What is a workbook?

A workbook contains numerous sheets, such as worksheets and chart sheets. The Excel Starter startup screen appears, followed by a blank spreadsheet.

A spreadsheet is called a worksheet in Excel Starter, and worksheets are stored in a file called a workbook.

A table is a collection of data that Excel treats as a single object that can be managed separately from the rest of the data in the workbook.

Thus, the correct option is C.

For more details regarding workbook, visit:

https://brainly.com/question/18273392

#SPJ1

Your question seems incomplete, the missing options are:

a. Outline

b. Summary

c. Table

d. Dashboard

Given a text file containing the availability of food items, write a program that reads the information from the text file and outputs the available food items. The program should first read the name of the text file from the user. The program then should read the text file, line by line. If a food is available, the program should output the available food item in the following format: name (category) -- description
Assume the text file contains the category, name, description, and availability of at least one food item, separated by a tab character ('\t').
Hints: Use the find() function to find the index of a tab character in each row of the text file. Use the substr() function to extract the text separated by the tab characters.

Answers

1. C program:

#include <stdio.h>

#include <string.h>

int main(void) {

   const int MAX_LINES = 25; // Maximum number of lines in the input text file

   const int MAX_STRING_LENGTH = 100; // Maximum number of characters in each column of the input text file

   const int MAX_LINE_LENGTH = 200; // Maximum number of characters in each line of the input text file

   // Declare 4 string arrays to store the 4 columns from the input text file

   char column1[MAX_LINES][MAX_STRING_LENGTH];

   char column2[MAX_LINES][MAX_STRING_LENGTH];

   char column3[MAX_LINES][MAX_STRING_LENGTH];

   char column4[MAX_LINES][MAX_STRING_LENGTH];

  /* Type your code here. */

// string for storing input file name

 char filename[20];

 // read the file name from the user

   printf("Enter the file name: ");

   scanf("%s%*c",filename);

 // open the file in read mode

   FILE *fp = fopen(filename,"r");

 printf("\n");

// check if the file is present or not

  if(fp)

  {

   // read the data from the file

 // string to read each line from the file

  char line[MAX_STRING_LENGTH];

// integer n for storing number of lines read from file

  int n=0

 int i,k;

  // read all the lines from the file

  while(fgets(line,MAX_LINE_LENGTH,fp)!=NULL)

     {

    i=0,k=0;

     // read the data in the first column of the line

      // read until a tab is encountered

      while(line[i]!='\t')

        {

         // copy the character

          column1[n][k] = line[i];

           k++,i++;

           }

          // make the last character as null to make it a string

           column1[n][k]='\0';

           i++,k=0;

           // read the data in the second column of the line

           // read until a tab is encountered

           while(line[i]!='\t')

           {

               // copy the character

               column2[n][k] = line[i];

               k++,i++;

           }

           // make the last character as null to make it a string

           column2[n][k]='\0';

           i++,k=0;

           // read the data in the third column of the line

           // read until a tab is encountered

           while(line[i]!='\t')

           {

               // copy the character

               column3[n][k] = line[i];

               k++,i++;

           }

           // make the last character as null to make it a string

           column3[n][k]='\0';

           i++,k=0;

           // read the data in the fourth column of the line

           // read until a new line is encountered

           while(line[i]!='\n')

           {

               // copy the character

               column4[n][k] = line[i];

               k++,i++;

           }

           // make the last character as null to make it a string

           column4[n][k]='\0';

// increase the number of lines

           n++;

       }

// traverse through all the items

       for(int i=0;i<n;i++)

       {

        // check if the item is available

           if(strcmp(column4[i],"Available")==0)

           {

            // print the item in the format: name (category) -- description

               printf("%s (%s) -- %s\n",column2[i],column1[i],column3[i]);

           }

       }

 // close the file

       fclose(fp);

   }

   else

   {

       // print error if the file is not present

       printf("Error! File not found!");

   }

return 0;

}

What is C programming?

C programming is a general purpose programming language that is very popular, easy and flexible to use. It is a structured programming language that is machine-independent and widely used to write various applications, operating systems such as Windows, and many other complex programs such as Oracle database, Git, Python interpreter and others.

It is said that "C" is God's programming language. C can be said to be the foundation of programming. If you know C, you can easily understand the knowledge of  other programming languages ​​that use C concept.

It is imperative that you have a background in computer memory mechanisms, as this is an important aspect of dealing with the C programming language.

To learn more about programming language, refer;

https://brainly.com/question/12696037

#SPJ4

write a for loop that assigns summedvalue with the sum of all odd values from 1 to usernum. assume usernum is always greater than or

Answers

A for loop that assigns summedvalue with the sum of all odd values from 1 to usernum is here using python:

def summedvalue( usernum):

     oddcount = 0

      for num in range (1, usernum + 1):

              if (num % 2 != 0):

                      oddcount = oddtotal + num

     print(oddcount)

sumvalue(10)

What is python?

Python is an interpreted, item, high-level language to dynamic semantics that was developed by Guido van Rossum. The play just on British comedy troupe Monty Python's name, "Python," aims to be both straightforward and entertaining.

Python has displaced Java to become the most popular introduction language due to its reputation as just a beginner-friendly language. This is so that beginners can focus on fully grasping programming concepts instead of minute details because Python manages a sizable portion of a complexity for the user.

Python is used for system scripting, software development, and server-side web development. Because of its high-level, constructed data structures, datatypes, and dynamic binding, it is also well-liked for quick application development as well as a scripting as well as glue language to link existing components.

Learn more about python

https://brainly.com/question/26497128

#SPJ4

which type of bluetooth attack accesses unauthorized information from a wireless device through a bluetooth connection, often between cell phones and laptop computers?

Answers

A type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers is generally referred to as: C. Bluesnarfing.

What is a Bluetooth?

A Bluetooth simply refers to a 802. 15 wireless networking standard and it can be defined as a network protocol that is designed and developed to avail the network devices of an end user to communicate with each other over a short range, which is usually less than 30 feet or 9 meters in distance.

In Cyber security, Bluesnarfing simply refers to a type of BlueTooth attack which is designed and developed to gain an unauthorized access to sensitive user information from a wireless device, especially through a Bluetooth connection, usually between mobile phones and laptop computers.

Read more on Bluetooth here: brainly.com/question/29236437

#SPJ1

Complete Question:

Which type of BlueTooth attack accesses unauthorized information from a wireless device through a Bluetooth connection, often between cell phones and laptop computers?

Bluephising

Bluesurfing

Bluesnarfing

Bluejacking

5.23 lab: contains the character write a program that reads an integer, a list of words, and a character. the integer signifies how many words are in the list. the output of the program is every word in the list that contains the character at least once. for coding simplicity, follow each output word by a comma, even the last one. add a newline to the end of the last output. assume at least one word in the list will contain the given character.

Answers

To write the program:

The program starts by declaring the variables that we will use, count, ch, and words. Then, we prompt the user for input, asking for the number of words in the list, the character, and then the words. We then move on to the output portion of the program. We start by printing the statement “The words containing the character [x] are:” with [x] being the character the user entered. We then use a for loop to iterate through the list of words. Inside the loop, we create an integer variable to keep track of whether or not the word contains the character. We then use another for loop to iterate through the characters in the current word. If a character matches the given character, we set contains to 1 and break out of the loop. Finally, if contains is 1, we print the word followed by a comma. We then add a newline character to the end of the last output.

The program Code:

#include <stdio.h>

int main(void) {

   int count;

   char ch;

   char words[20][20];

   

   // get the input from the user

   printf("Enter the number of words in the list: ");

   scanf("%d", &count);

   printf("Enter the character: ");

   scanf(" %c", &ch);

   printf("Enter the words: \n");

   for (int i = 0; i < count; i++) {

       scanf("%s", words[i]);

   }

   

   // print the output

   printf("The words containing the character %c are: ", ch);

   for (int i = 0; i < count; i++) {

       int contains = 0;

       // check if the word contains the character

       for (int j = 0; words[i][j] != '\0'; j++) {

           if (words[i][j] == ch) {

               contains = 1;

               break;

           }

       }

       // print the word if it contains the character

       if (contains) {

           printf("%s, ", words[i]);

       }

   }

   printf("\n");

   

   return 0;

}

Learn more about programming:

https://brainly.com/question/23275071

#SPJ4

you have a popular web application that accesses data stored in an amazon simple storage service (s3) bucket. developers use the sdk to maintain the application and add new features. security compliance requests that all new objects uploaded to s3 be encrypted using sse-s3 at the time of upload. which of the following headers must the developers add to their request?

Answers

The header that must the developers add to their request is as follows:

'x-amz-server-side-encryption': 'AES256'.

Which AWS service allows you to connect to storage?

An AWS service that allows you to connect to storage is known as the AWS Storage Gateway. It is a hybrid cloud storage service that gives you on-premises access to virtually unlimited cloud storage.

Storage Gateway provides a standard set of storage protocols such as iSCSI, SMB, and NFS, which allow you to use AWS storage without rewriting your existing applications.

Therefore, The header that must the developers add to their request is well-mentioned above.

To learn more about AWS services, refer to the link:

https://brainly.com/question/28145530

#SPJ1

BTW this is for python also don't make it complicated make it easy
1. You are beginning to prepare for post-secondary education! You are looking to see if your marks are good enough to get into various schools. You will:
a. Prompt user input for their name and their marks. You will always be in exactly 4 courses and your marks will be integers (i.e. you cannot receive a 90.5% in a course).
b. Prompt the user for a post-secondary school and the average needed to get into that school.
c. If the user enters a mark or average that is not an integer, below 0, or above 100, prompt them again.
d. Calculate the average mark of the user. Round the average to one decimal place.
e. Output the user’s average, their letter grade and whether the user has a high enough average to get into the school they have entered.
Sample Input:
Name = Mr. Slater
Mark 1 = 90
Mark 2 = 90
Mark 3 = 90
Mark 4 = 90
School 1 = Queen’s
Average 1 = 85Sample Output:
Mr. Slater’s average is 90.0%! That is an A.
Mr. Slater has a high enough average for Queen’s!

Answers

Answer:

name = input('Enter name: ')

grades = [input("Enter Grade #" + str(i+1) + ": ") for i in range(4)]

dream_school = input('Enter school: ')

average = round(sum(grades)/len(grades), 1)

if average < 60:

   letter = 'F'

elif average < 70:

   letter = 'D'

elif average < 80:

   letter = 'C'

elif average < 90:

   letter = 'B'

else:

   letter = 'A'

print(name + "'s average is " + str(average) + ". That is a " + letter)

if letter == 'A': print(name + "has enough for " + dream_school)

check my work write the encrypted text of each of the following words using a caesar cipher with a distance value of 3: a. python b. hacker c. wow

Answers

The caesar cipher encrypted text for the words python, hacker and wow are sbwkrq, kdfnhu and zrz.

What is Caesar Cipher?

Julius Caesar is credited with inventing the Caesar Cipher, which he used to communicate with his officials.

Each letter of a given text is replaced by another letter at some distance in this method.

when distance = 3  then A wil be replaced by D , B will be relaced by E , C will be replaced by F and so on.

python - sbwkrqhacker - kdfnhuwow - zrz

To learn more about Caesar Cipher, visit: https://brainly.com/question/14298787

#SPJ4

run the mergesort on the following list of numbers: [21, 1, 26, 45, 29, 28, 2, 9, 16, 49, 39, 27, 43, 34, 46, 40] which answer shows the sub-list that is currently being zipper-merged after 3 recursive calls to mergesort?

Answers

the answer is 21

Below is 3 Recursive calls ro mergersort :

When the mergesort firstly runs it breaks the list in two parts

part 1 = 21, 1, 26, 45, 29, 28, 2, 9

part 2 = 16, 49, 39, 27, 43, 34, 46, 40

First recursive call will take part1 as input and break into again two parts

Part 1.a = 21, 1, 26, 45

Part 1.b =  29, 28, 2, 9

Second recursive call will take part1.a  as input and break into again two parts

Part 1.a.1 =  21, 1

Part 1.a.2 = 26, 45

Third recursive call will take part1.a.1 as input and break into again two parts

Part 1.a.1.x =  21

Part 1.a.1.y =  1

The answer just takes a value Part 1.a.1.x = 21

Learn more about iterative merge sort algorithm: https://brainly.com/question/16929607

#SPJ4

Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far. Sample run enter a number: 9 smallest: 9 enter a number: 4 smallest: 4 enter a number: 10 smallest: 4 enter a number: 5 smallest: 4 enter a number: 3 smallest: 3 enter a number: 6 smallest: 3.

Answers

The code of a program to input 6 numbers and print de smallest:

#include <stdio.h>

int main()

{

   int n, min = 0;

   for (int i = 0; i < 6; i++)

   {

       printf("Enter a number: ");

       scanf("%d", &n);

       if (i == 0)

       {

           min = n;

       }

       else

       {

           if (n < min)

           {

               min = n;

           }

       }

       printf("Smallest: %d\n", min);

   }

   return 0;

}

Code Explanation:

This program takes 6 numbers as inputs from the user and stores the smallest number in the variable min. The variable min is initialized with 0. The for loop is used to iterate 6 times and the if else statement is used to compare the current number with the minimum number stored in the variable min.

If the current number is smaller than the minimum number then the current number is stored in the variable min. After each iteration, the smallest number is printed on the console.

Learn more about programming:

https://brainly.com/question/18900609

#SPJ4

which of the following can be thought of as a self-contained unit that consists of data attributes and the methods that operate on the data attributes?

Answers

The data attributes in a class have constant values across all instances. Consider a class as a set of instructions for building an object.

The object is theoretically a complete entity made up of data attributes. encapsulation. refers to the creation of a single entity from both code and data. concealing of data. refers to an object's capacity to keep its data characteristics a secret from outside code. a self-contained software object that comprises of methods that act on data attributes and data attributes themselves; it is essentially a resource that programs employ to carry out a particular task. A typical object hides its data but makes its methods accessible to outside code. A class is a section of code that describes the data attributes and methods for a specific kind of object. A class is a description of the properties and operations that a class will include.

Learn more about data attributes here:

https://brainly.com/question/28393244

#SPJ4

the use of a motor starter seal-in contact in place of a programmed contact provides positive feedback about the exact status of the motor.

Answers

The magnetic contactor and an overload relay are the two fundamental components of a magnetic motor starter.

The magnetic contactor is a solenoid relay made up of moveable contacts that are connected to movable armatures, stationary contacts that are linked in series with the lines to the motor, and an inductive coil that is wrapped around a magnetic core. A magnetic field is produced when an electric current is run through the wire coil. The armature is drawn toward this field, which in turn causes the movable contacts to span the space between the stationary contacts, igniting the motor. The contacts are constantly being attempted to be opened by a spring, but as long as there is voltage at the coil, magnetic forces will prevail.

Learn more about component here-

https://brainly.com/question/28434845

#SPJ4

Other Questions
When magnesium (mg2+) and fluorine (f1-) combine in an ionic bond, the resulting formula will be. What are the 4 essential parts to creating a business plan?. What is the primary goal of the central bank?. According to Hamilton, what was a failure of the Articles of Confederation that would be corrected by the new Constitution? A) The government could not make laws under the Articles, but would be able to under the Constitution. B) The government could make laws under the Articles, but would be able to enforce them under the Constitution. C) The government could collect taxes under the Articles, but could now lawfully spend money under the Constitution. D) The government could not collect taxes under the Articles, and would still not be able to under the Constitution. which of the following health care plans would get kendall's employees involved as consumers to make decisions to lower costs? multiple choice hmos hdhps ppos ewps in the early 1980s, what brought the worst economic slump in the united states since the great depression? 50 POINTS!! Triangle ABC with vertices A(4, 6), B(2, 8), and C(10, 4) is dilated by a scale factor of 2 to obtain triangle ABC. Which statement best describes triangle ABC? A) It is similar to triangle ABC and has coordinates A(2, 3), B(1, 4), and C(5, 2).B) It is similar to triangle ABC and has coordinates A(8, 12), B(4, 16), and C(20, 8).C) It is congruent to triangle ABC and has coordinates A(2, 3), B(1, 4), and C(5, 2).D) It is congruent to triangle ABC and has coordinates A(8, 12), B(4, 16), and C(20, the following information relates to lykon products company: division a - costs per unit $3 division b - costs per unit $5 selling price per unit $15 division b - operating income per unit $6 calculate the operating income per unit for division a. PA10-3 Evaluating Managerial Performance, Proposed Project Impact on Return on Investment, Residual Income [LO 10-4, 10-5]. Wescott Company has three divisions: A, B, and C. The company has a hurdle rate of 8 percent. Selected operating data for the three divisions are as follows:Division A Division B Division CSales revenue $ 1,255,000 $ 920,000 $ 898,000Cost of goods sold 776,000 675,000 652,000Miscellaneous operating expenses 64,000 52,000 53,100Interest and taxes 48,000 41,000 41,500Average invested assets 8,300,000 1,930,000 3,215,000. Wescott is considering an expansion project in the upcoming year that will cost $5 million and return $450,000 per year. The project would be implemented by only one of the three divisions.Required:1. Compute the ROI for each division. (Do not round your intermediate calculations.)2. Compute the residual income for each division. (Loss amounts should be indicated by a minus sign.)3.Rank the divisions according to the ROI and residual income of each.4-a. Compute the return on the proposed expansion project.4-b. Is this an acceptable project? No Yes5.Without any additional calculations, state whether the proposed project would increase or decrease each divisions ROI and state whether the division manager would accept or reject the proposed project.6. Compute the new ROI and residual income for each division if the project was implemented within that division. (Loss amounts should be indicated by a minus sign. Do not round your intermediate calculations. Round "ROI" answers to 2 decimal places. How is Pyrrhus a foil to Hamlet?. What is a common characteristic of scientific models?. What is the proper way for transporting food?. Calculate the resulting change in GDP for each of the following MPCs when the government increases its spending by $250 billion. Instructions: Round your answers to one decimal place. a. The marginal propensity to consume (MPC) = 0.2. The change in GDP is $ billion. b. The marginal propensity to consume (MPC) = 0.5. The change in GDP is $ billion. c. The marginal propensity to consume (MPC) = 0.8. The change in GDP is $ billion. What question did the Christopher Simmons case raise for the American justice system?Question 13 options:Does the death penalty violate an American's civil rights?Should juveniles be treated as adults in the court system?Is there ever a reason to doubt confessions made by a suspect?What statute of limitations should there be on a crime of murder? marion industries has an average accounts receivable turnover ratio of 12 times per year whereas most of its competitors have a ratio nearer to 8 times. this suggests that marion's management should consider to answer this question, complete the lab using the information below. you have been asked to perform administrative tasks for a computer that is not a member of a domain. to increase security and prevent unauthorized access to the computer, you need to configure specific password and account lockout policies. in this lab, your task is to use the local security policy to configure the following password and account lockout policies: configure password settings so that the user must: cycle through 10 passwords before reusing an old one. change the password every 90 days. keep the password at least 14 days. create a password at least eight characters long. create a password that meets complexity requirements, such as using uppercase letters, lowercase letters, numbers, or symbols. configure the account lockout policy to: lock out any user who enters five incorrect passwords. unlock an account automatically after 60 minutes. configure the number of minutes that must elapse after a failed logon attempt to 10 minutes. Which psychological disorder is characterized by psychosis and major disturbances in thought, perception, and behavior?. is the graph a function? A subject who does not speak English in the U.S. may indicate other areas that must be considered and addressed by researchers. Which of the following is most typically an associated concern? A substance has a molar mass of 60 g/mol with 40.0 percent carbon, 6.7 percent hydrogen, and 53.3 percent oxygen. What is its empirical formula? 1. C3H3O2 2. CHO 3. C2H4O2 4. C2H2O3 5. CH2O 6. C2HO 7. C3H2O2 8. CHO2 9. C2H3O2