What is the difference between referential and entity integrity

Answers

Answer 1

Answer:

Explanation:

Referential integrity is the state in which all values of all foreign keys are valid. Referential integrity is based on entity integrity . Entity integrity requires that each entity have a unique key.

Hope this helped and have a good day


Related Questions

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

An external website permitting users to browse and purchase widgets

An internal intranet website for employees to use

Secure remote access for engineering employees

Reasonable, basic firewall rules

Wireless coverage in the office

Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

Authentication system

External website security

Internal website security

Remote access solution

Firewall and basic rules recommendations

Wireless security

VLAN configuration recommendations

Laptop security configuration

Application policy recommendations

Security and privacy policy recommendations

Intrusion detection or prevention for systems containing customer data

Answers

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

How to explain the information?

Authentication works as follows:  

Prompting the user to enter the credentials.  Send credentials to the authentication server.  Match the credentials.  Authorize the user and grants the acces

External Website security:  

Use of firewall.  Implement the access control.  Use of MVC (Model View Controller) Use of encryption.  Use of SSL certificate.Use of security plugins.  Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  Use of authorization to provide different user with the specific privileges and access.  Encrypt or hide sensitive web pages.  By implementing IT policies.  Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  Rules to prevent SQL injection and XSS.  Allow only the specific type of traffic.  Use access rules for IP security.  Implement certain IT policies.  

Wireless Security:  

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and the registering the laptop will provide laptop security. .  

Application policy recommendations:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

https://brainly.com/question/5939963

#SPJ1

What can quantum computers do more efficiently than regular computers?

Answers

A traditional computer uses bits to do computations, where 0 represents off and 1 represents on. It processes data in the form of what is known as computer binary language—sequences of zeros and ones. More transistors increase the processing power.

The principles of quantum mechanics are used by a quantum computer. like a traditional computer that just employs ones and zeros. Particles can reach these states because of their intrinsic angular momentum, or spin. The particle's spin can be used to represent the two states 0 and 1. For instance, a counterclockwise spin indicates 0, whereas a clockwise spin represents 1. The ability of the particle to exist in several states at once is one benefit of employing a quantum computer. Superposition is the name for this phenomena. This phenomenon allows a quantum computer to reach both the 0 and 1 states simultaneously. As a result, information in a traditional computer is conveyed as a single number, either 0 or 1. Quits, which are characterized as a 0 and a 1 occurring simultaneously, are used in quantum computers to increase processing power. For instance:

A 2 bit vintage computer must expand through each step in order to analyze the numbers 00 01 10 11 and arrive at a conclusion. A two-qubit quantum computer is capable of simultaneously analyzing every possibility. the passing of time.


Thank you,

Eddie

Explain the unique reasons why assembly language is preferred to high level language

Answers

The special reason why assembler language is preferred to high level language is that  It is said to be memory efficient and it is one that requires less memory.

Why is assembly language better than other kinds of high level?

It implies means that the programs that one uses to write via the use of high-level languages can be run easily on any processor that is known to be independent of its type.

Note that it is one that has a lot of  better accuracy and an assembly language is one that carries out a lot of better functions than any high-level language, in all.

Note also that the advantages of assembly language over high-level language is in terms of its Performance and accuracy as it is better than high-level language.

Hence, The special reason why assembler language is preferred to high level language is that  It is said to be memory efficient and it is one that requires less memory.

Learn more about assembler language from

brainly.com/question/13171889

#SPJ1

During the reverse engineering process, a is
performed which identifies the design elements and principles incorporated into
the product design.

Structural Analysis
O Functional Analysis
O Visual Analysis
O Design Analysis

Answers

During the reverse engineering process, the performed which identifies the design elements and principles incorporated into the product design is Visual Analysis.

What is reverse engineering process?

Reverse engineering process involves putting or separating into parts an already made equipment or machines.

It can be done in aircraft, structural designs and many other products. It  is done to generate information on materials and design that is used in fabricating a design.

It make use of visual observation and analysis for it judgement and data collection.

Therefore,

During the reverse engineering process, the performed which identifies the design elements and principles incorporated into the product design is Visual Analysis.

Learn more on engineering below

https://brainly.com/question/17169621

#SPJ1

How is a collapsed cubit similar to a bit?

Answers

Answer:

It can stay in a state of superposition. It is still dependent on its counterparts. It has a single value of either 0 or 1.

Explanation:

hope it's helpful to you

TensorFlow and Pytorch are examples of which type of machine learning platform?

Answers

TensorFlow and Pytorch are examples of Supervised Machine Learning (ML), in addition, both support Artificial Neural Network (ANN) models.

What is a Supervised Machine Learning?

Machine learning (ML) is a subcategory of artificial intelligence that refers to the process by which computers develop pattern recognition or the ability to continually learn or make predictions based on data, and then make adjustments without being specifically programmed to do so.

In the supervised machine learning, the computer is given a labeled dataset that allows it to learn how a human does a task. This is the least complex model as it attempts to replicate human learning.

see more about computing at: brainly.com/question/2175764

#SPJ1

Write a program to demonstrate circular linked list with operations using pointers – insert
(beginning, end, middle), delete (beginning, end, middle),view)

Answers

A program to demonstrate circular linked list with operations using pointers is:

struct Node *addToEmpty(struct Node *last, int data)

{

   // This function is only for empty list

   if (last != NULL)

     return last;

 

   // Creating a node dynamically.

   struct Node *temp =

         (struct Node*)malloc(sizeof(struct Node));

 

   // Assigning the data.

   temp -> data = data;

   last = temp;

   // Note : list was empty. We link single node

   // to itself.

   temp -> next = last;

 

   return last;

}

What is a Circular Linked List?

This refers to the type of linked list in which the first and the last nodes are also joined together other to form a circle

Read more about circular linked list here:

https://brainly.com/question/12974434

#SPJ1

const x = 0;
while(x < 5) {
alert(x);
x = x + 1;
}

In the above while loop, which line is responsible for checking the condition for whether or not the code within the while loop should execute?

const x = 0;

while(x < 5) {

alert(x);

x = x + 1;

Answers

The line responsible for checking the condition for whether or not the code within the while loop should execute is while(x < 5) {

What is a repeat structure in python?

The repetition structure is a feature of programming languages ​​responsible for executing a block of code repeatedly while a certain condition is met.

In Python, there are two types of looping structures: for and while.

The while command causes a set of commands to be executed while a condition is met. When the result of this condition becomes false, the loop execution stops.

With that being said:

Given

const x = 0;

while(x < 5) {

   alert(x);

   x = x + 1;

}

See more about python at: brainly.com/question/13437928

#SPJ1

write an algorithm to determine a student's final grade and indicate whether it is passing or failing. the final grade is calculated as the average of 4 marks.

Answers

Using the knowledge in computational language in algorithms it is possible to write the code being determine a student's final grade and indicate whether it is passing or failing.

Writting the algorithm :

Start

Take 4 integer inputs for the different 4 subject like math, english, physics, chemistry.

Then calculate the grade based upon the average of four marks .

            grade = ( math + english + physics + chemistry ) / 4

if the value of the grade is more than 40, it will print pass otherwise it shows fail.

END

See more about algorithm at brainly.com/question/22984934

#SPJ1

The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the network.

Answers

Answer:

Save of data is the answer

What (if any) are the same feature requirements that might be found in server software/OS environments

Answers

The same feature requirements that might be found in server software/OS environments

They include:

Server Hardware Requirements  such as  Quad-Core 2 Ghz or much more high,  8 GB RAM  or more  and also free disk space.

What are the software requirements for a server?

The Software requirements for any given database server includes;

Database server Operating system, etc.

Some of the key features of the key server operating system is made up of: the capability to access the server when using either GUI and command-level interface. the ability to execute all or a lot of processes from OS commands and others.

Learn more about software/OS environments from

https://brainly.com/question/26424062

#SPJ1

Even if we reached the state where an AI can behave as a human does, how do we measure if Al is acting like a human? and how can we be sure it can continue to behave that way? We can base the human-likeness of an AI entity with the: Turing Test, the Cognitive Modelling Approach, The Law of Thought Approach, and the Rational Agent Approach. Explain in detail these terms with suitable examples.​

Answers

We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.

What test tells you if an AI can think like a human?

The Turing Test is known to be the tool or the method that is unused in regards to the inquiry in artificial intelligence (AI) for a person to be able to known if or not a computer have the ability of thinking like a human being.

Note that the test is said to be named after Alan Turing, who was known to be the founder of the Turing Test and he was also known to be an English computer scientist, a cryptanalyst, a mathematician and also a theoretical biologist.

Therefore, in regards to the issues with AI, a person or We as humans can be able to measure if Al is acting like a human via the use of the Turing Test.

Learn more about Al  from

https://brainly.com/question/20463001

#SPJ1

How artifical intelligence will have more effect on our day to day life ? ​

Answers

Answer:

Artificial intelligence can dramatically improve the efficiencies of our workplaces and can augment the work humans can do. When AI takes over repetitive or dangerous tasks, it frees up the human workforce to do work they are better equipped for—tasks that involve creativity and empathy among others.

the implications your organization of providing email facilities to individuals in the workplace in terms of security and virus protection​

Answers

Make use of multifactor authentication and a password manager: One of the most important aspects of protecting your email information is using passwords.

What is email facilities in security and virus protection​?

The first line of defense against a security compromise is a strong password. We constantly advise against using any universal passwords.

Email security is a term that describes a variety of procedures and tactics for protecting email accounts, data, and communications from unauthorized access, theft, or compromise.

Email is regularly used to spread threats like spam, phishing, and others. Relying solely on your built-in protection could leave your business vulnerable to fraudsters who routinely use the top attack vector.

Therefore, it means for your business in terms of security and virus prevention when you allow people to use email at work. ​

Learn more about email facilities here:

https://brainly.com/question/6946185

#SPJ2

Use a password manager and multifactor authentication: Using passwords is one of the most crucial components of protecting your email data.

Thus, A strong password is the first line of defence against a security breach.

A range of practices and strategies are referred to as "email security" in order to safeguard email accounts, data, and conversations from unwanted access, theft, or compromise.

Spam, phishing, and other risks are frequently disseminated over email. Relying exclusively on your built-in defences could expose your company to fraudsters that frequently exploit the most popular attack vector.

Thus, Use a password manager and multifactor authentication: Using passwords is one of the most crucial components of protecting your email data.

Learn more about Email, refer to the link:

https://brainly.com/question/16557676

#SPJ7

In python please:

Assume the variable definitions references a dictionary. Write an ig statement that determined whether the key ‘marsupial’ exist in the dictionary. If so, delete ‘marsupial’ and it’s associated value. If the key is not the dictionary, display a message indicating so.

Answers

Answer:

"

if 'marsupial' in dictionary:

   del dictionary['marsupial']

else:

   print("The key marsupial is not in the dictionary")

"

Explanation:

So you can use the keyword "in" to check if a certain key exists.

So the following code:

"

if key in object:

   # some code

"

will only run if the value of "key" is a key in the object dictionary.

So using this, we can check if the string "marsupial' exists in the dictionary.

"

if 'marsupial' in dictionary:

   # code

"

Since you never gave the variable name for the variable that references a dictionary, I'm just going to use the variable name "dictionary"

Anyways, to delete a key, there are two methods.

"

del dictionary[key]

dictionary.pop(key)

"

Both will raise the error "KeyError" if the key doesn't exist in the dictionary, although there is method with pop that causes an error to not be raised, but that isn[t necessary in this case, since you're using the if statement to check if it's in the dictionary first.

So I'll just use del dictionary[key] method here

"

if 'marsupial' in dictionary:

   del dictionary['marsupial']

else:

   print("The key marsupial is not in the dictionary")

"

The last part which I just added in the code is just an else statement which will only run if the key 'marsupial' is not in the dictionary.

which of the following numbers may result from the following function: RANDBETWEEN 500, 700

Answers

512 is known to be the number that one can say may result from the following function: RANDBETWEEN 500, 700.

What is RANDBETWEEN function?

In regards to Excel, the term RANDBETWEEN function is known to be a kind of  a formula syntax and it is one whose usage of the RANDBETWEEN function can be seen only in Microsoft Excel.

The Description is that it helps to Returns a random integer number that exist between the numbers a person did specify.

Note that A new random integer number is said to be returned every time the worksheet is known to be calculated.

Therefore, 512 is known to be the number that one can say may result from the following function: RANDBETWEEN 500, 700.

Learn more about function from

https://brainly.com/question/179886

#SPJ1

• Provide a rationale for each part of your design, explaining the problem, approach, and why you made the choices you made.

Answers

In the network constructed, we need to use 3 switches to  be able to connect a single client PC to the single server. Therefore:

Connect server to switch 1        (225 m)Connect switch 1 to switch 2     (225 m)Connect switch 2 to switch 3    (225 m)Connect switch 3 to client PC   (225 m)

What is the network about?

The maximum distance for ethernet connection is known to be about 100 meters and it is one that is often used in the transmission speeds.

Note that when one has added to the network switches, the distance need to be increased to about 200 meters and thus about 900 meters of distance need to exist between the client PC and the server.

The Ethernet network need to be designed as:

Connect server to switch 1        (225 m)

Connect switch 1 to switch 2     (225 m)

Connect switch 2 to switch 3    (225 m)

Connect switch 3 to client PC   (225 m)

Note that Total distance covered = 225 + 225 + 225 + 225

                                                       = 900 meters

Therefore, In the network constructed, we need to use 3 switches to  be able to connect a single client PC to the single server.

Learn more about Ethernet from

https://brainly.com/question/16947988

#SPJ1

See full question below

• Ethernet network that connects a single client PC to a single server and label the locations of switches and transmission links.

Provide a rationale for each part of your design, explaining the problem, approach, and why you made the choices you made.


Question 9
The boom in collaboration between U.S. companies and workforces in India created a
need for blank

Answers

Answer:

Outsourcing

Explanation:

The boom in collaboration between U.S. companies and workforces in India created a need for Outsourcing.

I believe this is correct, but I'm not 100% certain.

Although they can display a wealth of data, why should chord diagrams be used with caution?
a-Chord diagrams are particularly susceptible to fisheye distortion as you focus on certain data points.
b-It is difficult to determine from the rectangles how much of the full data set a particular object accounts for.
c-All connections are shown by default, which can make seeing specific connections difficult.
d-It is difficult for readers to parse curving lines because of the way human perception works.

Answers

Although chord diagrams can display a wealth of data, a reason why chord diagrams should be used with caution is because: A. Chord diagrams are particularly susceptible to fisheye distortion as you focus on certain data points.

What is data?

Data can be defined as a representation of factual instructions (information) in a formalized manner, especially as a series of binary digits (bits) that are used on computer systems in a company.

In this scenario, the essential features of a data which every department manager should list include the following:

Strong securityCentralizationProgrammatic access.

What is a chord diagram?

A chord diagram can be defined as a type of chart that is typically designed and developed to graphically represent or display the inter-relationships (many-to-many relationship) between data in a matrix, especially as curved arcs within a circle.

Although chord diagrams can display a wealth of data, a reason why chord diagrams should be used with caution is because they are particularly susceptible, vulnerable, or prone to fisheye distortion as the end user focus on certain data points.

Read more on data here: brainly.com/question/13179611

#SPJ1

need help how to type the code please

Answers

Answer:

#include <stdio.h>

#define MAXIMUM_LOAN_PERIOD 14

#define FINE_RATE 0.20

#define SEPARATOR "----------------"

int main() {

 double amountFined;

 int numberOfBooks, daysLoan, daysOverdue;

 printf(SEPARATOR "\nBOOK LOAN SYSTEM\n" SEPARATOR "\n");

 

 printf("Enter the number of books  : ");

 scanf("%d", &numberOfBooks);

 printf("Enter the days of the loan : ");

 scanf("%d", &daysLoan);

 

 printf(SEPARATOR SEPARATOR SEPARATOR "\n");

 

 daysOverdue = daysLoan - MAXIMUM_LOAN_PERIOD;

 amountFined = FINE_RATE * numberOfBooks * daysOverdue;

 printf("Days overdue               : %d\n", daysOverdue);

 printf("Fine                       : RM %.2f\n", amountFined);

 return 0;

}

Explanation:

Reading integers can be done using scanf. What is missing in this code is checking for bad input, but the happy flow works!

Enterprise software is designed for organizations to __________.

Answers

Answer:

The goal of enterprise software is to enable the activities of large organizations, supporting a wide range of different user roles.

Rewrite the code below so that a transformation moves the div 100px to the right and 50px upward.

Relocate me!

Answers

Using the knowledge in computational language in HTML it is possible to write a code that  below so that a transformation moves the div 100px to the right and 50px upward.

Writting in HTML code:

<!DOCTYPE html>

<html>

<head>

<style>

div {

 width: 300px;

 height: 100px;

 background-color: yellow;

 border: 1px solid black;

 transform: translate(50px,100px);

}

</style>

</head>

<body>

<h1>The translate() Method</h1>

<p>The translate() method moves an element from its current position:</p>

<div>

This div element is moved 50 pixels to the right, and 100 pixels down from its current position.

</div>

</body>

</html>

See more about HTML at brainly.com/question/19705654

#SPJ1

Match the feature to its function.

1. Normal View
provide rows of icons to perform different tasks
2. Notes View
displays thumbnails
3. Slide Pane
place where information for handouts can be added
4. Title Bar
provides filename and Minimize icon
5. Toolbars
working window of a presentation

Answers

The Matchup of the feature to its function are:

1. Normal view the place where creating and editing occurs .

2. Notes view an area in which information for handouts can be added.  

3. Slide pane the place where the slide order can be changed.

4. Menu bar contains lists of commands used to create presentations  

5. toolbars provide rows of icons to perform different tasks.

What is the normal view?

Normal view is known to be the view that is seen or used in editing mode and this is where a person can work a lot of items so that they can create their slides.

Note that Normal view is one that shows slide thumbnails on the left, that is a large window that depicts the current slide, and also has a  section that is often seen below the current slide.

The Matchup of the feature to its function are:

1. Normal view the place where creating and editing occurs .

2. Notes view an area in which information for handouts can be added.  

3. Slide pane the place where the slide order can be changed.

4. Menu bar contains lists of commands used to create presentations  

5. toolbars provide rows of icons to perform different tasks.

Learn more about Normal View from

https://brainly.com/question/14596820

#SPJ1

Project 12-2: Bird Counter
Help me make a Python program for birdwatchers that stores a list of birds along with a count of the
number of times each bird has been spotted.


Console
Bird Counter program

Enter 'x' to exit

Enter name of bird: red-tailed hawk
Enter name of bird: killdeer
Enter name of bird: snowy plover
Enter name of bird: western gull
Enter name of bird: killdeer
Enter name of bird: western gull
Enter name of bird: x

Name Count
=============== ===============
Killdeer 2
Red-Tailed Hawk 1
Snowy Plover 1
Western Gull 2


Specifications
 Use a dictionary to store the list of sighted birds and the count of the number of times
each bird was sighted.
 Use the pickle module to read the dictionary from a file when the program starts and
to write the dictionary to a file when the program ends. That way, the data that's
entered by the user isn't lost.

Answers

The program based on the information given is illustrated below.

How to illustrate the program?

It should be noted that a computer program is a set of instructions in a programming language for the computer to execute.

Based on the information, the program is illustrated thus:

Code:

import pickle

#function to read birds data

def readBirdsData():

try:

birdsFile = open("birdsData","rb")

birdWatcher = pickle.load(birdsFile)

birdsFile.close()

birdWatcher ={}

except EOFError:

birdWatcher ={}

return birdWatcher

#function to write the data into file using pickle

def writeBirdsData(birdWatcher):

if birdWatcher == {} :

return

sorted(birdWatcher)

birdsFile = open("birdsData","ab")

pickle.dump(birdWatcher,birdsFile)

birdsFile.close()

#function to display birds data in sorted order

def displayBirdsData(birdWatcher):

print("Name\t\tCount")

print("========\t===========")

for key in sorted(birdWatcher.keys()):

print("{}\t\t{}".format(key,birdWatcher[key]))

#main function

def main():

birdWatcher = readBirdsData()

print("Bird Counter Program")

print ("\nEnter 'x' to exit\n")

name = input("Enter name of bird: ")

while True:

#break the loop if x is entered

if name == 'x':

#if the name exists in dictionary then increase the value

if the name in birdWatcher.keys():

birdWatcher[name] = birdWatcher[name] + 1

else:

#dd it otherwise

birdWatcher[name] = 1

name = input("Enter name of bird: ")

displayBirdsData(birdWatcher)

writeBirdsData(birdWatcher)

#driver code

if __nam__ == '__main__':

main()

Learn more about programs on:

https://brainly.com/question/26642771

#SPJ1

Security hardware and software that control access to a company’s intranet and other internal networks is called a(n):_________

Answers

Answer:Firewall

Explanation:

ethics related to all
artificial intelligence?

Answers

Answer: autonomous systems (transportation, weapons), machine bias in law, privacy and surveillance,  AI governance, confirming the moral and legal status of intelligent machines (artificial moral agents), human-machine interaction, mass automation; (3) long-term (starting with the 2100s): technological singularity, mass unemployment, space colonization. etc

Explain how will you process identify and use texts according to the
function you wish for it to serve in the particular industry

Answers

The texts have different objectives that can be identified with the following tips:

Identify the major ideas.Identify the author's purpose.

What is a text?

A text is a term to refer to the set of phrases and words contained coherently to be interpreted and to share the ideas of an author (emitter or speaker).

Texts can have a variety of topics counting on the author's intention. For example:

Scientific texts: They are the texts that have the purpose of sharing scientific knowledge with exact data and results of experiments or others.Literary texts: They are the best known texts that stand out for including a variety of topics, they are marked by telling an in-depth story.News texts: They are the texts that reveal all the details of a news story and have the goal of objectively reporting.According to the above, to identify a text it is necessary to read it and remember the main ideas and the purpose of its author when writing it. Additionally, the texts are tools for different professions to teach crafts, knowledge and techniques counting on the requirement.

To learn more about  texts, refer

https://brainly.com/question/25862883

#SPJ9

can
Vehicles equipped with Anti-Lock Brakes (ABS)
stop in shorter distances than vehicles without ABS

Answers

No. Vehicles equipped with Anti-Lock Brakes cannot stop at shorter distances than vehicles without ABS.

A user may enter some text and the number of times (up to a maximum of 10) to repeat it. Display the text repeated that many times with no space in between. For example, if the user types in Hey and 3, the display would be HeyHeyHey. If the user provides no text or provides a number greater than 10, display only an error message.

Answers

The command that would be given to execute a code that asks for input and runs it repeatedly until it has satisfied the condition is a do-while loop.

What is a Do While Statement?

This is a conditional statement that is used in programming to run a set of code and check the conditions set and commands to execute and finally terminates when the conditions are satisfied.

Therefore, based on the fact that a loop would be used, and the displayed text would be repeated many times, the do-while loop would be used for this program.

Read more about do-while statements here:

https://brainly.com/question/13089591

#SPJ1

As data travels further over a wavelength or frequency, what goes down?

Answers

As data travels further over a wavelength or frequency, the radiation type goes down.

What is an electromagnetic spectrum?

An electromagnetic spectrum can be defined as a range of frequencies and wavelengths into which an electromagnetic wave is distributed into.

In Science, the electromagnetic spectrum consist of the following types of energy from highest to lowest frequency and shortest to longest wavelength:

Gamma raysX-raysUltraviolet radiationVisible lightInfrared radiationMicrowavesRadio waves

In this context, we can infer and logically deduce that as data travels further over a wavelength or frequency within the electromagnetic spectrum, the radiation type goes down.

Read more on electromagnetic spectrum here: brainly.com/question/23423065

#SPJ1

Other Questions
Why does naira devalue? The right of any political body to enact laws and enforce them, for the order, safety, health, morals and general welfare of the public is known as? A sociologist would use which theory to analyze husbands and wives fighting over controlling financial resources in the family? A point b on a segment with endpoints a (1,4) and c (8,2) partitions the segment in a 3:1 ratio. find the coordinates of point b Glycerin at a temperature of 30 degrees celcius flows at a rate of 8106m3/s through a horizontal tube with a 30mm diameter. what is the pressure drop in pascals per 100m? In which step would a ceo want to actually personally visit a country which is a finalist for locating a plant? Firms have access to ______________, also known as tax havens, locations that specialize in financing by nonresidents, where the taxation levels are low and the banking regulatory environment loose. Algebra 3, in the excercise size the graphs to determine the functions domain and range, x and y intercepts if any, and the functions values indicated below the graphs Sociologist andrew cherlin suggests that the u. s. s high divorce rates may be in part a reflection of a broad sense of ____ unique to american culture You should develop your social media budget before you create your social media plan.a) trueb) false need heeeelp please What happened to individuals who refused to enlist in the war due to religious reasons? Tina just started enjoying the game of peekaboo which stage of cognitive development is tina in? The bar graph shows the rents paid per month for apartments in an urban neighborhood. The curve shows that the rents are normally distributed. Estimate the percent of apartments residents who pay less than $650 per month. A. 99%B. 25%C. 68%D. 30% 30. You want to simulate an experiment to draw cards out of a deck. Youplan to draw 35 cards (with replacement), and list which card you drew. Howmany times would you expect to draw a face card?681210 Let x, y, z be three natural numbers such that x < y < z. If GCF(x, y, z) = 3, GCF (y, z) = 15, LCM (x, y, z) = 3150, and x is even number greater than 10, then find the values of x, y and z. Find the value of x.answer choicesA. 70B. 65C. 30D. 40 A car coasts 62. 2 meters along a hill that makes a 28. 3 angle with the ground. if the car's mass is 1234 kg, then what is the change in potential energy? Complete the proofs, ASAP!!! (Geometry) When running for office, when is a political candidate most likely to benefit from the media agenda-setting role?