Write the definition of a public class Simple. The class has no constructors, methods or instance variables.

Answers

Answer 1

Answer:

public class Simple{}

Explanation:


Related Questions

which one of the following is not hardware​

Answers

Firewall is not hardware. It is only software.

Answer:

There r no options

Explanation:

I think the application r not the hardware.

To add a picture file to a PowerPoint slide, a user should first go to the

Answers

Answer:

insert

Explanation:

go to power point presentation insert tab

A client calls to complain that his computer starts up, but crashes when Windows starts to load. After a brief set of questions, you find out that his nephew upgraded his RAM for him over the weekend and couldn't get the computer to work right. What could be the problem

Answers

Answer:

It may be that the amount of ram is not compatible with that computer, it may not support ram that is over 8 GB or higher, it may not be properly installed in the hardware, or the motherboard may not be able to read it.

Explanation:

Hardware and software is very unbalanced when it comes to new RAM being installed, as people complain about this exact same issue many times.

A level 3 security system focuses on protecting the _____ against intrusion, denial-of-service attacks, and unauthorized access.

Answers

Answer:

corporate network

Explanation:

A level 3 security system focuses on protecting the corporate network against intrusion, denial-of-service attacks, and unauthorized access.

You often travel away from the office. While traveling, you would like to use a modem on your laptop computer to connect directly to a server in your office and access files.You want the connection to be as secure as possible. Which type of connection will you need?

Answers

Answer:

The answer is "Remote access "

Explanation:

The capacity to access another computer or network that you do not have. Remote computer access provides an employee with remote access to the desktop and file. This assists an employee, for example, who works at home efficiently.

Remote users access documents or other resources on any network-connected device or server, enhancing organizational efficiency and increase there are to cooperate more interact with peers nation.

1) a program that is designed to perform only one task.

Answers

Answer:

special purpose application software

Explanation:

it is a type of software created to execute one specific task.for example a camera application on your phone wul only allow you to take and share pictures.

Other example of special purpose application are web browsers,calculators,media playors,calendar programs e.t.c.

computer can do work very___​

Answers

Answer:

Explanation:

quickly      

Answer:

fast......................

What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?

Answers

Answer:

Salting

Explanation:

Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.

Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks

The salt for each user is a unique value that is stored along with the username in a database

When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variable

Answers

Answer:

The value of the primitive type variable is passed into the receiving method

Explanation:

Examples of primitive data types are integers, floats, real, double, character, byte, etc.

When any of these data types variables are passed to a method, the method which receives the variables receives the value of the variable being passed.

Take, for instance; the following code segment:

int doubleNum(int num){ ..... }

int main(){ ... num = 2; doubleNum(num);}

The above function doubleNum will receive the value of num (which is 2).

A computer is assigned an IP address of 169.254.33.16. What can be said about the computer, based on the assigned address?

Answers

Group of answer choices.

A. It can communicate with networks inside a particular company with subnets.

B. It can communicate on the local network as well as on the Internet.

C. It has a public IP address that has been translated to a private IP address.

D. It cannot communicate outside its own network.

Answer:

D. It cannot communicate outside its own network.

Explanation:

Dynamic Host Configuration Protocol (DHCP) is a standard protocol that assigns IP address to users automatically from the DHCP server.

Basically, a DHCP server is designed to automatically assign internet protocol (IP) address to network devices connected to its network using a preconfigured DHCP pool and port number 67.

When a computer that is configured with DHCP cannot communicate or obtain an IP address from the DHCP server, the Windows operating system (OS) of the computer automatically assigns an IP address of 169.254.33.16, which typically limits the computer to only communicate within its network.

Generally, a computer cannot communicate outside its own network when it is assigned an IP address of 169.254.33.16.

why are computer important these days?write in short


Answers

Computer has become very important nowadays because it is very much accurate, fast and can accomplish many tasks easily. Otherwise to complete those tasks manually much more time is required. It can do very big calculations in just a fraction of a second. Moreover it can store huge amount of data in it.

explain the following terms

copyleft:

creative Commons:

GNU/GPL:​

Answers

Answer:

Explanation:

copyleft:

Copyleft is the practice of granting the right to freely distribute and modify intellectual property with the requirement that the same rights be preserved in derivative works created from that property.

creative Commons:Creative Commons (CC) is an internationally active non-profit organisation that provides free licences for creators to use when making their work available to the public. These licences help the creator to give permission for others to use the work in advance under certain conditions. Every time a work is created, such as when a journal article is written or a photograph taken, that work is automatically protected by copyright. Copyright protection prevents others from using the work in certain ways, such as copying the work or putting the work online. CC licences allow the creator of the work to select how they want others to use the work. When a creator releases their work under a CC licence, members of the public know what they can and can’t do with the work. This means that they only need to seek the creator’s permission when they want to use the work in a way not permitted by the licence. The great thing is that all CC licences allow works to be used for educational purposes. As a result, teachers and students can freely copy, share and sometimes modify and remix a CC work without having to seek the permission of the creator3. GNU/GPL:​

GPL is the acronym for GNU's General Public License, and it's one of the most popular open source licenses. Richard Stallman created the GPL to protect the GNU software from being made proprietary. It is a specific implementation of his “copyleft” concept.

Software under the GPL may be run for all purposes, including commercial purposes and even as a tool for creating proprietary software, such as when using GPL-licensed compilers. Users or companies who distribute GPL-licensed works (e.g. software), may charge a fee for copies or give them free of charge.

4 Two people play a counting game.
The rules of the game are as follows:
The first player starts at 1
Each player may choose one, two or three numbers on their turn and the numbers must be in ascending order
Players take it in turns to choose
The player who chooses "15" loses the game. For example, if the first player chooses three numbers (1, 2, 3) then the second player could choose one number (4), two numbers (4, 5) or three numbers (4,5,6).
The first player then takes another go.
-Write an algorithm using pseudocode that allows two players to play this game.
The algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
--Display the numbers that the player has chosen Display a suitable message to say --which player has won once the number 15 has been displayed​

Answers

Answer:

algorithm should:

--Alternate between player 1 and player 2

--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3

An algorithm using pseudocode that allows two players to play the game is:

BEGIN Player One num "1"ASCENDING order num;TURN Player One num;TURN Player Two num;INCREMENT IF there is num "15"THENPLAYER loses

What is a Pseudocode?

This refers to the use of plain language to describe the sequence of steps for solving a problem.

Hence, we can see that from the given game rules about the input that is made by a player where he starts at 1 and any player that selects 15 loses the game and there is an increment is displayed in a rough form above.

Read more about pseudocodes here:

https://brainly.com/question/24953880

#SPJ2

Which practices promote efficient keyboarding? Check all that apply.

curving your fingers a little when you rest them lightly on the home keys
returning to the home key after you have typed another key
keeping your eyes on your hands when typing
working at a comfortable pace when typing
using your thumbs for the space bar
never using a shortcut

Answers

Answer:

Curving your fingers a little when you rest them lightly on the home keys returning to the home key after you have typed another key

Explanation:

It is important to position the fingers on the keyboard in such as way that they are prepared to move when selecting keys. The fingers should be slightly curved and the hands should be down

At the start of typing, the left fingers should be placed on the A, S, D, and F keys, while the right fingers should be placed on the J, K, J, and ; keys

Answer: both thumbs should be on the spacebar

Explanation:

An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement. True False

Answers

Answer:

True

Explanation:

An end user license agreement (EULA) is usually designed by a software developer to take the form of an electronic notification that would appear on the screen of the device of an end user when he or she is installing a software.

Furthermore, an end user has a choice to accept or decline the terms of this agreement.

If you have a small Routing Information Protocol (RIP) network of 10 hops, how will RIP prevent routing loops

Answers

Answer:

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

Explanation:

Routing Information Protocol (RIP) is a type of dynamic routing protocol which finds the best path between the source and the destination network through the use of hop count as a routing metric. The path with the lowest hop count from source to destination is considered as the best route. Routing Information Protocol (RIP) is a distance-vector routing protocol.

RIP prevents routing loops by limiting the number of hopes allowed in a path from source and destination.

The _____ component of a decision support system (DSS) includes mathematical and statistical models that, along with the database, enable a DSS to analyze information.

Answers

Model Base. Hope it helps

write history of computer virus. I will mark as brainliest answer ​

Answers

Answer:

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US. The first computer virus for MS-DOS was "Brain" and was released in 1986.

Mark Brainliest please

Computer viruses have been around for quite a bit and nearly all of them have been spread through the Internet or its predecessors. Most viruses have been designed to steal users' information, processing power and/or disable the system all together.

The first computer virus, called "Creeper system", was an experimental self-replicating virus released in 1971. It was filling up the hard drive until a computer could not operate any further. This virus was created by BBN technologies in the US.

The first computer virus for MS-DOS was "Brain" and was released in 1986. It would overwrite the boot sector on the floppy disk and prevent the computer from booting. It was written by two brothers from Pakistan and was originally designed as a copy protection.

"The Morris" was the first Computer virus which spread extensively in the wild in 1988. It was written by Robert Morris, a graduate student from Cornell University who wanted to use it to determine the size of the internet. His approach used security holes in sendmail and other Unix applications as well as weak passwords, but due to a programming mistake it spread too fast and started to interfere with the normal operation of the computers. It infected around 15,000 computers in 15 hours, which back then was most of the internet.

Since then, many new viruses have been introduced and the trend is growing exponentially every year.

Infamous viruses of the digital age
Following are some of the most well-known or significant viruses that have grown in step with the role of information technology in society:

In 1991, the "Michelangelo" virus was first discovered in Australia. It would lay dormant until 6th March every year and then overwrite the first one hundred sectors on the storage devices with zeros, preventing the computer from booting. Only 20,000 computers were reported infected.

In 1998, CIH was released. It infected around 60 million computers and caused significant damages by overwriting important system files. It was written by a Taiwanese student.

In 1999, "Melissa" was released. This one, was the first wide spread Word Macro Virus. It was distributed via email and would automatically send itself to the first 50 people in the Outlook address book. It did not harm the computer as it was sending out passwords for some erotic websites which required membership. It caused so much email traffic resulting in email servers to crash.

2000 was the year of "iloveyou". Again, it came via email however it sent itself to all contacts. It also overwrote office, image, and audio files. The virus came from the Philippines and infected over 50 million computers in less than 10 days. Most companies back then decided to turn off their email servers to stop spreading the virus.

Since 2000, so many new viruses have been unleashed to wreak havoc on the world at large that it is difficult to list the most infamous. "Anna Kournikova", Code Red, Nimba, Beast, SQL Slammer, Blaster, Sobig, Sober, MyDoom, Netsky, Zeus, Conficker, Stuxnet, CryptoLocker, Locky, Mirai and WannaCry, are a few examples that come to mind.

a.
5. A red circle and diagonal slash on a sign means
that
a hazard is ahead.
b. the action is not allowed.
c. diagonal crossing is permitted.
d. two roads intersect ahead.

Answers

Answer:

b. the action is not allowed.

Explanation:

Traffic signs are established rules and regulations designed to direct and guide commuters and other road users.

A red circle and diagonal slash on a sign simply means that the action is not allowed.

A hortatory technique is focused on encouraging, exhorting and urging people to do that which is right, acceptable and worthy of emulation by others.

For example, commuters and road users are being urged not to litter the highway with thrash, waste, or dirt, in order to protect the planet from environmental degradation and pollution. This would help in conserving and mitigating risks posing as a threat to our dear planet and habitat.

Hence, a hortatory technique in policy implementation and enactment is primarily aimed at appealing to the sense and conscience of individuals, to engage in socially responsible acts.

In _____ conversion of the implementation phase of the systems development life cycle (SDLC), as each module of a new system is converted, the corresponding part of an old system is retired.

Answers

Explanation:

Phased-In-Phased-Out Conversion

One property of light that makes it possible to record the image of an object with the camera

Answers

Answer:

Reflection

Explanation:

Reflection is the property of light in which when a ray of light hits a smooth surface, it bounces back in the direction in which it came from. If i is the angle between the normal to the surface and the incident ray, and r is the angle between the normal and reflected ray, the law of reflection states that the angle of incidence equals the angle of reflection. That is, i = r.

So, to record the image of an object with a camera, one property of light that makes that possible is reflection because, the incidence rays form an image of the object in the camera, while the reflected rays reflect the image so that it is visible to the eye.

Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entregar esto hoy. >﹏<

Answers

Answer:

1. Software de aplicación: Microsoft Word.

2. Software de diagnóstico: Speccy.

3. Software de sistema: Windows operating system (OS).

Explanation:

Un software puede definirse como un conjunto de instrucciones ejecutables (códigos) o una colección de datos que se utiliza normalmente para instruir a una computadora sobre cómo realizar una tarea específica y resolver un problema en particular.

Básicamente, los softwares se clasifican en tres (3) categorías principales y estas son;

1. Software de aplicación: es un software de usuario final que normalmente está diseñado para realizar tareas y funciones específicas.

Algunos ejemplos de software de aplicación son Microsoft PowerPoint, Notepad, Windows Media player, Firefox, Go-ogle Chrome, Adobe Photoshop, AutoCAD, etc.

2. Software de diagnóstico: estos son programas de software que se utilizan para solucionar problemas y posiblemente reparar un sistema informático.

Algunos ejemplos de software de diagnóstico son Speccy, Windows Sysinternals Suite, System Explorer, hddscan, HWiNFO, SIW (System Information for Windows), CPU-Z, HD Tune, etc.

3. Software de sistema: es un software que normalmente está diseñado para ejecutar el hardware de la computadora y todas las demás aplicaciones de software.

Algunos ejemplos de software del sistema son Linux, Windows OS, Mac OS, WinZip, McAfee antivirus, Norton antivirus, Avast antivirus, Piriform CCleaner, Ubuntu, etc.

A _____ is a collection of rules for formatting, ordering, and error checking data sent across a network.

Answers

Answer:

Protocol

A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design. Network protocols are the reason you can easily communicate with people all over the world, and thus play a critical role in modern digital communications.

You are the network administrator for a small company that implements NAT to access the internet. However, you recently acquired five servers that must be accessible from outside your network. Your ISP has provided you with five additional registered IP addresses to support these new servers, but you don't want the public to access these servers directly. You want to place these servers behind your firewall on the inside network, yet still allow them to be accessible to the public from the outside.Which method of NAT translation should you implement for these servers?

Answers

Answer: Static

Explanation:

Network Address Translation is simply designed for the conservation of IP address. It allows private IP networks which makes use of unregistered IP addresses to be able to connect to the Internet.

Static Network Address Translation enables port number translatation and IP addresses from inside to the outside traffic likewise from the outside to the inside traffic.

hubs hardware advantage's and disadvantages​

Answers

Answer:

answer in picture

hope it's helpful

please answer me fast​

Answers

Answer:

microsoft

Explanation:

this may help u

Answer:

Microsoft

because its a 2013 worldwide partner conference and Microsoft server operations

Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly

Answers

Explanation:

1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem

2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.

The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:

One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.

In conclusion, the above method will be used for the troubleshooting.

Read related link on:

https://brainly.com/question/18275236

A program that allows employees to choose their starting and ending times, as long as they are at work during a specified core period, is called ______.

Answers

Answer:

flextimes

Explanation:

Flex times is defined as the flexible time that is scheduled for allowing the workers to alter the workday start and their finish times. This is in contrast to the traditional work arrangements which require for the employees to start work at a standard 9 a.m. and to finish at 5 p.m.

It is program which allows the employees to choose a suitable starting time as an ending time for doing their work during the specified core period.

When power is completely removed from your computer

Answers

Explanation:

The only way that would work is if you had access a very cold liquid such as liquid helium or liquid nitrogen.

An online retailer is looking to implement an enterprise platform. Which component of the enterprise platform will help the company capture, curate, and consume customer information to improve their services?

Answers

Answer: Data and Insights

Explanation:

Data and Insights in an enterprise platform is very important as it helps users better understand their customers so that they may be able to offer them the best services.

Data allows the platform to capture the data of the customer and insights then curates and consumes the data for analysis. The result of this analysis will enable the company to better understand the customer so that they might be able to offer preferable products.

Other Questions
Match the pairs of equivalent exMatch the pairs of equivalent expressions. pressions. Hy gip ti ln bi tp ny which equation has the steepest graph ? About 6% of the population has a particular genetic mutation. 100 people are randomly selected. Find the standard deviation for the number of people with the genetic mutation in such groups of 100. 1) The brave soldier was rewarded ...... a medai. (by/with/in/from) 2) I think it ........ in the evening. (be rain/raining/rained/will rain) 3) The man ..... is honest is trusted. (whom/who/whose/which 4) A page of ..... book is torn. (a/an/the/nothing) 5) Neither of the two applicants ..... suitable. (is/am/are/be) 6) The bus ....... an hour ago. (leave/left/leaving/leaved) 7) He is a student ........ class ten. (of/in/on) 8) It's . good car. (a/an/the) 9) When I ...... the book, I will lend it to you. (finish/finishes/finished/will finish) 10) Each of the girls ....... brilliant. (is/are/were/have been) when do we use SAVE and SAVE AS in saving artwork in adobe illustrator?PLEASE HELP ASAP Let u = . Find 8u. DANCE Most people start tapping their feet when they hear lively music. This is not (1. nature).. since dance is the oldest art form; people have enjoyed it since (2. history).. times, as cave paintings in northern Spain show. Early dancing was associated with (3. religion)..ceremonies and tended to be ritualistic. Later, it became a form of public (4. entertain).., then a social event. In traditional folk dancing, basic types of movement reflect cultural (5. ground)... The dances are comprised of stylised, (6. repeat)..versions of everyday activities such as hunting or harvesting. They also frequently use social (7. pursue).. as sources: many folk dances are simplified mimes of courtship rituals, for instance. The fact that these dances have remained virtually (8. change) ..for hundreds of years indicates that they serve a function far more important than mere enjoyment. Rather, they act as a confirmation of the participants' way of life, (9. symbol).. rendering familiar tasks, events and conventions. As everyone jumps, twists and turns in unison, a feeling of (10.together).. is engendered. In fact, folk dancing is probably one of the earliest forms of bonding. The height of one right circular cylinder is 7 centimeters and its radius is 2 centimeters. The height of the second right circular cylinder is 28 centimeters and its radius is also 2 centimeters. What is the ratio of the volume of the larger cylinder to the volume of the smaller cylinder? A. 4:1 B. 5:1 C. 10:1 D. 25:1 In this triangle, D is the midpoint of AB and E is the midpoint of BCIf AC = 36 what is the length of DE? \int (x+1)\sqrt(2x-1)dx price controls are what? the device that is used to measure the level of hemoglobin that is saturated with oxygen is known as The weight of a body is 600 N. What is the mass of the body on the surface of the earth? which expression is equal to sin w The table shows the ratio between the number of packets and the number of seeds of a certain plant contained in them: Number of packets Number of seeds 5 10 6 12 7 14 Which graph shows equivalent ratios? A graph is drawn. The horizontal axis and vertical axis values are 0 to 15 in increments of 1. The horizontal axis label is Number of Packets, and the vertical axis label is Number of Seeds. Points are plotted on the ordered pairs 1, 2 and 2, 4 and 3, 6. A graph is drawn. The horizontal axis and vertical axis values are 0 to 15 in increments of 1. The horizontal axis label is Number of Packets and the vertical axis label is Number of Seeds. Points are plotted on the ordered pairs 1, 2 and 2, 2 and 3, 2. A graph is drawn. The horizontal axis and vertical axis values are 0 to 15 in increments of 1. The horizontal axis label is Number of Packets, and the vertical axis label is Number of Seeds. Points are plotted on the ordered pairs 1, 1 and 2, 2 and 3, 3. A graph is drawn. The horizontal axis and vertical axis values are 0 to 15 in increments of 1. The horizontal axis label is Number of Packets, and the vertical axis label is Number of Seeds. Points are plotted on the ordered pairs 2, 1 and 4, 2 and 6, 3. Actual indirect materials costs$11,800 $6,700 Actual indirect labor costs 55,600 45,900 Other overhead costs 16,000 49,900 Overhead applied 91,400 96,700 Storm Concert Promotions Determine whether overhead is overapplied or underapplied. Prepare the journal entry to allocate (close) overapplied or underapplied overhead to Cost of Goods Sold. Valle Home Builders Determine whether overhead is overapplied or underapplied. Prepare the journal entry to allocate (close) overapplied or underapplied overhead to Cost of Goods Sold. Write the range of the function using interval notation. What section on a food label can be used to determine the percentage of vitamin value?serving sizepercent daily valueamount per servingcalories per serving PLS HELP ASAP!!!solve for f(3) if f(x)=x^3+2x^2-x-1