David, a software engineer, recently bought a brand new laptop because his enterprise follows the BYOD (bring your own device) model. David was part of a software development project where the software code was leaked before its release. Further investigation proved that a vulnerability in David's laptop caused the exposure. David insists he never used the laptop to access any network or integrate any devices, and the laptop was kept in a vault while not in use. Which of the following attack vectors was used by the threat actor?
A. Direct Access
B. Wireless
C. Supply Chain
D. Removeable media

Answers

Answer 1

The attack vector used by the threat actor is the Supply Chain. The correct option is C.

What is an attack vector?

An attack vector is a strategy for breaking into a computer system or network without authorization. The entire number of attack vectors that an can use to influence a network or computer system or extract data is known as the attack surface.

Hacker can take advantage of system weak-nesses, including the human factor, using attack vectors. Viruses, mal-ware, email attachments, webpages, pop-up windows, instant messaging (IMs), rooms, and de-ceit are all common cyber-attack vectors.

Therefore, the correct option is C. Supply Chain.

To learn more about attack vectors, refer to the link:

https://brainly.com/question/27962411

#SPJ4


Related Questions

Write a program HousingCost.java to calculate the amount of money a person would pay in renting an apartment over a period of time. Assume the current rent cost is $2,000 a month, it would increase 4% per year. There is also utility fee between $600 and $1500 per year. For the purpose of the calculation, the utility will be a random number between $600 and $1500.
1. Print out projected the yearly cost for the next 5 years and the grand total cost over the 5 years.
2. Determine the number of years in the future where the total cost per year is over $40,000 (Use the appropriate loop structure to solve this. Do not use break.)

Answers

Answer:

import java.util.Random;

public class HousingCost {

public static void main(String[] args) {

int currentRent = 2000;

double rentIncreaseRate = 1.04;

int utilityFeeLowerBound = 600;

int utilityFeeUpperBound = 1500;

int years = 5;

int totalCost = 0;

System.out.println("Year\tRent\tUtility\tTotal");

for (int year = 1; year <= years; year++) {

int utilityFee = getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);

int rent = (int) (currentRent * Math.pow(rentIncreaseRate, year - 1));

int yearlyCost = rent * 12 + utilityFee;

totalCost += yearlyCost;

System.out.println(year + "\t$" + rent + "\t$" + utilityFee + "\t$" + yearlyCost);

}

System.out.println("\nTotal cost over " + years + " years: $" + totalCost);

int futureYears = 0;

int totalCostPerYear;

do {

futureYears++;

totalCostPerYear = (int) (currentRent * 12 * Math.pow(rentIncreaseRate, futureYears - 1)) + getRandomUtilityFee(utilityFeeLowerBound, utilityFeeUpperBound);

} while (totalCostPerYear <= 40000);

System.out.println("Number of years in the future where the total cost per year is over $40,000: " + futureYears);

}

private static int getRandomUtilityFee(int lowerBound, int upperBound) {

Random random = new Random();

return random.nextInt(upperBound - lowerBound + 1) + lowerBound;

}

}

In a block of addresses we know the IP address of one host is Roll no. Roll no. Roll no. Roll no./20.What is the first address and the last address of this block? Find the number of addresses in the block?
Hint: if your roll no is 33 then your ip address will look like this: 33.33.33.33/20

Answers

Answer:

If there’s one topic that trips people up (both new and experienced) in the networking industry, it is that of Subnetting.

One of the reasons this happens is that one has to perform (mental) calculations in decimal and also binary. Another reason is that many people have not had enough practice with subnetting.

In this article, we will discuss what Subnetting is, why it came about, its usefulness, and how to do subnetting the proper way. To make this article as practical as possible, we will go through many examples.

Note: While subnetting applies to both IPv4 and IPv6, this article will only focus on IPv4. The same concepts explained here can be applied to IPv6. Moreover, subnetting in IPv6 is more of a want rather than a necessity because of the large address space.

IP address network

For example, any traffic with a destination IP address of 192.168.1.101 will be delivered to PC1, while traffic addressed to 192.168.1.250 will be delivered to SERVER.

Note: This is an oversimplification of things just for understanding sake and refers to Unicast (one-to-one) IPv4 addresses. Traffic sent to Multicast (one-to-many) and Broadcast (one-to-all) IP addresses can be delivered to multiple devices. Also, features like Network Address Translation (NAT) allow one IP address to be shared by multiple devices.

To help your understanding of IP addresses and subnetting, you need to resolve the following fact in your head: Computers think in binary, that is, 0s and 1s. Therefore, even though we see an IP address represented like 192.168.1.250, it is actually just a string of bits – 32 bits in total for IPv4 addresses.

To make them more readable for humans, IPv4 addresses are represented in dotted decimal notation where the 32 bits are divided into 4 blocks of 8 bits (also known as an octet), and each block is converted to a decimal number.

For example, 01110100 in binary is 116 in decimal:

A unicast IPv4 address such as 192.168.1.250 can be divided into two parts: Network portion and Host ID. So what does this mean? Well, IPv4 addresses were originally designed based on classes: Class A to Class E. Multicast addresses are assigned from the Class D range while Class E is reserved for experimental use, leaving us with Class A to C:

Class A: Uses the first 8 bits for the Network portion leaving 24 bits for host IDs. The leftmost bit is set to “0”.

Class B: Uses the first 16 bits for the Network portion leaving 16 bits for host IDs. The two leftmost bits are set to “10”.

Class C: Uses the first 24 bits for the Network portion leaving 8 bits for host IDs. The three leftmost bits are set to “110”.

Note: The range of Class A is actually 1-126 because 0.x.x.x and 127.x.x.x are reserved.

With these classes, a computer/device can look at the first three bits of any IP address and determine what class it belongs to. For example, the 192.168.1.250 IP address clearly falls into the Class C range.

Looking at the Host ID portion of the classes, we can determine how many hosts (or number of individual IP addresses) a network in each class will support. For example, a Class C network will ideally support up to 256 host IDs i.e. from 00000000 (decimal 0) to 11111111 (decimal 255). However, two of these addresses cannot be assigned to hosts because the first (all 0s) represents the network address while the last (all 1s) represents the broadcast address. This leaves us with 254 host IDs. A simple formula to calculate the number of hosts supported

Explanation: Final answer is Start address: 192.168.58.0 + 1 = 192.168.58.1

End address: 192.168.58.16 – 2 = 192.168.58.14

Broadcast address: 192.168.58.16 – 1 = 192.168.58.15

How will Excel summarize the data to create PivotTables? summarize by row but not by column summarize by column but not by row summarize by individual cells summarize by row and by column

Answers

Answer:

D. summarize by row and by column

Answer:

D.

Explanation:

What is one outcome of an integration point?

Answers

Answer:

What is one outcome of an integration point? It provides information to a system builder to potentially pivot the course of action. It bring several Kanban processes to conclusion. It supports SAFe budgeting milestones.

These statements describe saving presentations.

Name your file in a way enables you to find it later.
Click on an icon to save.
It is a good idea to save often.
Select the Save option in the File menu to save.
Save by selecting the Save option in the Tools menu.
Saving once is enough.

[ DO NOT REPLY FOR POINTS YOU WILL BE REPORTED ]
(multiple choice) (edgenuitу)

Answers

Answer: answer 4 and 5

Explanation:

to save something on a device option 4 and 5 is the best fit for this

you have a 10vdg source available design a voltage divider ciruit that has 2 vdc , 5vdc , and 8 vdc available the total circuit current is to be 2mA

Answers

If you try to divide 10V in three voltages, the sum of the three voltages must be equal to the total voltage source, in this case 10V. Having said this, 2 + 5 + 8 = 15V, and your source is only 10V. So you can see is not feasible. You can, for example, have 2V, 5V and 3V, and the sum is equal to 10V. Before designing the circuit, i.e, choosing the resistors, you need to understand this. Otherwise, I suggest you to review the voltage divider theory.

For instance, see IMG2 in my previous post. If we were to design a single voltage divider for the 5VDC, i.e, 50% of the 10V source, you generally choose R1 = R2., and that would be the design equation.

class Main {

static int[] createRandomArray(int nrElements) {

Random rd = new Random();

int[] arr = new int[nrElements];

for (int i = 0; i < arr.length; i++) {

arr[i] = rd.nextInt(1000);

}

return arr;

}

static void printArray(int[] arr) {

for (int i = 0; i < arr.length; i++) {

System.out.println(arr[i]);

}

}

public static void main(String[] args) {

int[] arr = createRandomArray(5);

printArray(arr);

}

}

Modify your code to use an enhanced for loop.
ty in advance

Answers

See below for the modified program in Java

How to modify the program?

The for loop statements in the program are:

for (int i = 0; i < arr.length; i++) { arr[i] = rd.nextInt(1000); }for (int i = 0; i < arr.length; i++) { System.out.println(arr[i]); }

To use the enhanced for loop, we make use of the for each statement.

This syntax of the enhanced for loop is:

for(int elem : elems)

Where elem is an integer variable and elems is an array or arrayList

So, we have the following modifications:

i = 0; for (int num : arr){ arr[i] = rd.nextInt(1000); i++;}for (int num : arr) { System.out.println(num); }

Hence, the modified program in Java is:

class Main {

static int[] createRandomArray(int nrElements) {

Random rd = new Random();

int[] arr = new int[nrElements];

int i = 0;

for (int num : arr){

arr[i] = rd.nextInt(1000);

i++;

}

return arr;

}

static void printArray(int[] arr) {

for (int num : arr) {

System.out.println(num);

}

}

}

public static void main(String[] args) {

int[] arr = createRandomArray(5);

printArray(arr);

}

}

Read more about enhanced for loop at:

https://brainly.com/question/14555679

#SPJ1

Why is it important in manufacturing to determine allowances? How do allowances relate to tolerance dimensioning?​

Answers

Answer:

Sry I can’t really help you with this one

Explanation:

Consider the conditions and intentions behind the creation of the internet—that it was initially created as a tool for academics and federal problem-solvers. How might that explain some of the security vulnerabilities present in the “cloud” today?

Answers

It should be noted that the intention for the creation of the internet was simply for resources sharing.

The motivation behind the creation of the internet was for resources sharing. This was created as a tool for academics and federal problem-solvers.

It transpired as it wasn't for its original purpose anymore. Its users employed it for communication with each other. They sent files and softwares over the internet. This led to the security vulnerabilities that can be seen today.

Learn more about the internet on:

https://brainly.com/question/2780939

Is there anything you should be doing and / or do better at home to make sure your computer is always clean and running efficiently?

Answers

Answer:

Using the proper computer equipment and regularly performing a few small maintenance activities will help to keep your computer running smoothly and efficiently.

Organize your installation disks

Protect Your Computer Equipment from Power Surges. ...

Defragment Your Hard Drive. ...

Check Your Hard Disk for Errors. ...

Backup Your Data.

Update everything

Clean up your software.

Run antivirus and spyware scans regularly.

Explanation:

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

Given an integer n and an array a of length n, your task is to apply the following mutation to an: Array a mutates into a new array b of length n.

For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].

Answers

Answer: provided in the explanation section

Explanation:

import java.util.*;

class Mutation {

public static int[] mutateTheArray(int n , int[] a)

{

int []b = new int[n];

for(int i=0;i<n;i++)

{

b[i]=0;

if(((i-1)>=0)&&((i-1)<n))

b[i]+=a[i-1];

if(((i)>=0)&&((i)<n))

b[i]+=a[i];

if(((i+1)>=0)&&((i+1)<n))

b[i]+=a[i+1];

}

return b;

}

  public static void main (String[] args) {

      Scanner sc = new Scanner(System.in);

      int n= sc.nextInt();

      int []a = new int [n];

     

      for(int i=0;i<n;i++)

      a[i]=sc.nextInt();

     

      int []b = mutateTheArray(n,a);

for(int i=0;i<n;i++)

      System.out.print(b[i]+" ");

     

 

     

  }

}

cheers i hope this helped !!

The program is an illustration of loops and conditional statements.

Loops are used to perform repetitive operations, while conditional statements are statements whose execution depends on the truth value.

The program in Java, where comments are used to explain each line is as follows:

import java.util.*;

class Main {

   public static void main (String[] args) {

       //This creates a scanner object

       Scanner input = new Scanner(System.in);

       //This gets input for n

       int n= input.nextInt();

       //This declares array a

       int []a = new int [n];

       //The following loop gets input for array a

       for(int i=0;i<n;i++){

           a[i]=sc.nextInt();

       }

       //This declares array b

       int []b = new int [n];

       //The following loop mutates array a to b

       for(int i=0;i<n;i++){

           b[i]=0;

           if(((i-1)>=0)&&((i-1)<n)){

               b[i]+=a[i-1];

           }

           if(((i)>=0)&&((i)<n)){

               b[i]+=a[i];

           }

           if(((i+1)>=0)&&((i+1)<n)){

               b[i]+=a[i+1];

           }

       }

       //The following loop prints the mutated array b

       for(int i=0;i<n;i++){

       System.out.print(b[i]+" ");

       }

 }

}

At the end of the program, the elements of the mutated array b, are printed on the same line (separated by space).

Read more about similar programs at:

https://brainly.com/question/17478617

wite a short essay recalling two instance, personal and academic, of when you used a word processing software specifically MS Word for personal use and academic work

Answers

I often use MS Word for personal and academic work. Its features improved productivity. One use of MS Word was to create a professional resume. MS Word offered formatting choices for my resume, like font styles, sizes, and colors, that I could personalize.

What is MS Word

The software's tools ensured error-free and polished work. Using MS Word, I made a standout resume. In school, I often used MS Word for assignments and research papers.

Software formatting aided adherence to academic guidelines. Inserting tables, images, and citations improved my academic work's presentation and clarity. MS Word's track changes feature was invaluable for collaborative work and feedback from professors.

Learn more about MS Word  from

https://brainly.com/question/20659068

#SPJ1

What is something you can setup within your email account to prevent potentially harmful emails making their way to your inbox?.

Answers

The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:

Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.

Which feature helps to prevent spam messages from being sent to your inbox?

To avoid spam in one's email, one of the best thing to do is to Run your inbox through spam filter and virus filter.

Hence, The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:

Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.

Learn more about Email  from

https://brainly.com/question/24688558

#SPJ1

With clear examples, describe how artificial intelligence is applied in fraud detection

Answers

Answer:

AI can be used to reject credit transactions or flag them for review. Like at Walmart

Explanation:

I work with AI, i know what i'm talking about.

meet a person who is living far away from the family for a long time.ask question about her/his feelings about homesickness.Then write a report ?

Answers

The report based on the interview asked in the question is given below:

The Report

Interviewer: How do you feel about being away from your family for so long?

Person: It's tough. I'm homesick all the time. I miss my family and hometown, longing to share in their daily lives. I acknowledge personal growth from a distance but maintain contact through calls and visits. Staying connected grounds me and reminds me of the love back home, despite challenges.

Report: Emotional complexities of long-distance living revealed. They acknowledged personal growth and stay connected through regular communication despite their separation.

Read more about reports here:

https://brainly.com/question/23228258

#SPJ1

Python please!

On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies.


Output each floating-point value with two digits after the decimal point, which can be achieved as follows:

print('{:.2f} {:.2f} {:.2f} {:.2f} {:.2f}'.format(your_value1, your_value2, your_value3, your_value4, your_value5))


Ex: If the input is: 440

(which is the A key near the middle of a piano keyboard), the output is: 440.00 466.16 493.88 523.25 554.37


Note: Use one statement to compute r = 2(1/12) using the pow function (remember to import the math module). Then use that r in subsequent statements that use the formula fn = f0 * rn with n being 1, 2, 3, and finally 4.


I inserted what I've already done and what error message I'm getting.

Answers

We have that the output that frequency with the next 4 higher key frequencies  is mathematically given as

Output

120,127,13,134.8,142,1,151.19

From the question we are told

On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance (number of keys) from that key, and r is 2(1/12). Given an initial key frequency, output that frequency and the next 4 higher key frequencies.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:

Output and frequency

Generally the code will go as follows

# The key frequency

f0 = float(input())

r = math.pow(2, (1 / 12))

# The frequency, the next 4 higher key f's.

frequency1 = f0 * math.pow(r, 0)

frequency2 = f0 * math.pow(r, 1)

frequency3 = f0 * math.pow(r, 2)

frequency4 = f0 * math.pow(r, 3)

frequency5 = f0 * math.pow(r, 4)

# printing output

print('{:.2f} {:.2f} {:.2f} {:.2f} {:.2f}'.format(frequency1, frequency2, frequency3, frequency4, frequency5))

Therefore

Output

120,127,13,134.8,142,1,151.19

For more information on frequency visit

https://brainly.com/question/22568180

What advantages would there be to using both subsystems and logical partitions on the
same machine?

Answers

Answer:

Explanation:

Advantages of using subsystem and logical partitions on same machine

Subsystems and logical partitions on the same machine reduces the data backup function.Hence there is no need to take the backup regularly.It increases the hardware utilization.Resource availability is high and it provides security to the resources.

what is the meaning of Ram?​

Answers

Answer:

Random-Access Memory

Explanation:

used as a short-term memory for computers to place its data for easy access

Increase the value of cell c30 by 15%​

Answers

To increase the value of cell C30 by 15%, you can multiply the current value of C30 by 1.15.

To increase the value of cell C30 by 15%, you can follow these steps. First, multiply the current value of C30 by 0.15 to calculate 15% of the value. Then, add this calculated amount to the current value of C30. This can be expressed as C30 + (C30 * 0.15). For example, if the current value of C30 is 100, you would perform the calculation 100 + (100 * 0.15) to get the increased value. In this case, the result would be 115. This method ensures that the value in cell C30 is increased by 15% while retaining the existing value. Adjusting calculations accordingly based on the desired value and spreadsheet software used will allow you to increase the value of cell C30 by 15%.

For more such questions on Cell C30:

https://brainly.com/question/31706410

#SPJ8

The intent of a Do query is to accomplish a goal or engage in an activity on a phone.

Answers

False. The intent of a Do query is to accomplish a goal or engage in an activity on a phone.

The intent of a Do query

A computer query is a request for information or data made to a computer system or a database. It involves specifying specific criteria or conditions to retrieve relevant information from a database or perform a specific action.

Queries are commonly used in database management systems, where they allow users to search, filter, and sort data based on specific criteria. A query typically consists of a structured query language (SQL) statement that defines the desired data and any conditions or constraints to be applied.

Read mroe on  query here query

#SPJ1

Java Eclipse Homework Calories
Package : chall12A
Class : Calories

Use a “while loop” in the code to solve the following problem:

Over a 14-day period, calculate the total number of calories that the user consumed.
Use the following information to create the necessary code. You will use a while loop in this code.

1. The following variables will need to be of type “int”:
• day
• calories
• totalCalories
1. Show a title on the screen for the program.
2. Ask the user if they want to run the program.
3. Initialize (give values) to those variables that need starting values.
4. If their answer is a capital or lowercase ‘Y’, do the following:
• Use a while loop to loop through the days.
• Ask the user for the number of calories he/she consumed on each day. Please • include the day number in your question. Example: “How many calories did you consume on day 1?”
Include the calculation to keep a running total of the calories consumed.
1. After 14 days, the code should fall out of the loop. Include a print statement that looks like this: “After 14 days, you consumed ____ calories.” (Of course, the computer will need to fill in the total number.)
2. Include an “else” so that there is an appropriate response if the user decides not to run the program.

Answers

import java.util.Scanner;

public class Calories {

   public static void main(String[] args) {

       int day = 0, calories = 0, totalCalories = 0;

       System.out.println("Title");

       Scanner myObj = new Scanner(System.in);

       System.out.println("Do you want to continue?");

       String start = myObj.nextLine();

       if (start.toLowerCase().equals("y")){

           while (day < 14){

               day += 1;

               System.out.println("How many calories did you consume on day " +day + ":");

               calories = myObj.nextInt();

               totalCalories += calories;

               

           }

           System.out.println("After 14 days, you consumed " + totalCalories + " calories");

       }

       else{

           System.out.println("Goodbye!");

       }

   }

   

I hope this helps!

Anne needs to record the results of a business project that requires the analysis of varying or multiple changes. Which graph or chart can she use in a spreadsheet?
Anne can use
to record the results of a business project in a spreadsheet. It measures immediate or minute
of an event and plots the points using two axes.

Answers

Anne can use SCATTER PLOT GRAPH to record the results of a business project in a spreadsheet. It measures immediate or minute VALUES of an event and plots the points using two axes.

What is a scatter plot graph used for?

A person can be able to determine the link or correlation between two variables using a scatter plot. If  you attempting to determine whether the combination of your two variables might mean anything, you can be able to find out if there might be a relationship between your data points by plotting a scattergram with them.

The graphs that show the association between two variables in a data set are called scatter plots. It displays data points either on a Cartesian system or a two-dimensional plane.

Therefore, in the case of Anne, when two data sets need to be compared to one another to determine whether there is a relationship, a scatter analysis is used. She can plot the data points on a graph, you get a scattering of points that represent the relationship.

Learn more about scatter plot graph from

https://brainly.com/question/27874837


#SPJ1

See full question below

Anne needs to record the results of a science project that requires the analysis of varying or multiple changes. What graph or chart can she use in a spreadsheet?

Anne can use _______ (line graph , column chart , scatter plot graph) to record the results of a science project in a spreadsheet. It measures immediate or minute ______ (values , changes , sequences) of an event and plots the points using two axes.

flujograma de nómina ​

Answers

Explanation there is the rest in comments
flujograma de nmina

Computers are because they can perform many operations on their own with the few commands given to them

Answers

Computers are programmable because they can perform a wide range of operations on their own with just a few commands given to them. They are designed to carry out different functions through the execution of programs or software, which comprises a sequence of instructions that a computer can perform.

The instructions are expressed in programming languages, and they control the computer's behavior by manipulating its various components like the processor, memory, and input/output devices. Through these instructions, the computer can perform basic operations like arithmetic and logic calculations, data storage and retrieval, and data transfer between different devices.

Additionally, computers can also run complex applications that require multiple operations to be performed simultaneously, such as video editing, gaming, and data analysis. Computers can carry out their functions without any human intervention once the instructions are entered into the system.

This makes them highly efficient and reliable tools that can perform a wide range of tasks quickly and accurately. They have become an essential part of modern life, and their use has revolutionized various industries like healthcare, education, finance, and entertainment.

For more questions on Computers, click on:

https://brainly.com/question/24540334

#SPJ8

THIS IS PYTHON QUESTION
d = math.sqrt(math.pow(player.xcor() - goal.xcor(), 2) + math.pow(player.ycor()-goal.ycor(), 2))

here is the error message that I am getting when I run this using the math module in python: TypeError: type object argument after * must be an iterable, not int

Answers

Answer:

ok

Explanation:yes

Write a new version of the Guess My Number program in which the
player and the computer switch roles. That is, the player picks a number
and the computer must guess what it is. In C++.
Code is provided below.
#include
#include
#include
using namespace std;
int main()
{
srand(static_cast (time(0))); //seed random number generator
int secretNumber = rand() % 100 + 1; // random number between 1 and 100
int tries = 0;int guess;
cout << "\tWelcome to Guess My Number\n\n";
do{
cout << "Enter a guess: ";
cin >> guess;
++tries;
if (guess > secretNumber){
cout << "Too high!\n\n";
}else if (guess < secretNumber){
cout << "Too low!\n\n";
}else{
cout << "\nThat’s it! You got it in " << tries << " guesses!\n";
}
} while (guess != secretNumber);
}

Answers

A new version of the Guess My Number program in which the player and the computer switch roles.

#include  <iostream>
#include  <cstdlib>
#include  <ctime>
using namespace std;
int main()
{
int secretNumber; // the number the computer must guess
int guess; // the number the computer guesses
int tries = 0; // the number of tries the computer takes

// Get the secret number from the user
cout << "\tWelcome to Guess My Number\n\n";
cout << "Enter the number for the computer to guess: ";
cin >> secretNumber;

// Generate random numbers for the computer to guess
srand(static_cast (time(0))); //seed random number generator

do {

 guess = rand() % 100 + 1; //generate random number between 1 and 100
 ++tries;  

 if (guess > secretNumber){
  cout << "Computer guessed too high!\n\n";
 }
 else if (guess < secretNumber){
  cout << "Computer guessed too low!\n\n";
 }
 else{
  cout << "\nThe computer got it in " << tries << " guesses!\n";
 }
 

} while (guess != secretNumber);
return 0;
}

What is program?

Program is a set of instructions or commands that a computer follows in order to execute a task or achieve a desired output. It can also be defined as a collection of data or instructions that instruct a computer to perform certain tasks. A program is typically written in a high-level programming language that is understandable by humans, such as C++, Java, or Python. It is then compiled into an executable form that the computer can understand and execute.

To learn more about program
https://brainly.com/question/27359435
#SPJ1

proprofs: Universal Containers has setup a picklist dependency between Region and Zone on the Account object. The sales manager has requested that when a user selects a region a zone must also be selected.How can this be achieved

Answers

Answer:

To comply with the Sales Manager's request that a user who selects a region must also select a zone,

set up the picklist dependency between the region and the zone.

Explanation:

Setting up the picklist dependency depends on the creation of a module that has a source field and a target field. The target field (region) becomes the controlling field, while the source field (zone) becomes the checkbox field. This will ensure that the values picked for the target field (region) has valid values that depend on the value of the controlling field (zone).

which of the following is not the correct definition of an operating system

A.

it controls all other execution in a computer

B.

interface between hardware and application programs

C.

its a platform for ensuring that other executions has taken place

D.

maintains consistency of data loss during execution

Answers

The correct answer is C. An operating system is not a platform for ensuring that other executions have taken place. An operating system is a software program that manages the hardware and software resources of a computer and provides common services for computer programs. It acts as an interface between the hardware and application programs and controls all other execution in a computer. It also maintains consistency of data during execution.

Which is the correct option?

Which is the correct option?

Answers

Answer:

C

Explanation:

Key logging is when a hacker can track every key u have clicked.

Other Questions
Anyone have any clue what this is going to be The senior class want to play a practical joke on the principal, who was a former college basketball star. They want to fill his office full of basketballs. The diameter of a basket ball is 9.5 inches. The dimensions for his office are 20 feet long, 18 feet wide and 12 feet tall. If you assume there is not furniture in the office, then approximately how many basketballs would it take to fill up his entire office to the ceiling? (Model the basketball as a sphere). If the measure of angle is 3pie/4, which statements are true?The measure of the reference angle is 45.cos (0) = 2sin (0) = 2The measure of the reference angle is 60.The measure of the reference angle is 30.tan (0) = 1 You would like to travel in 5 years from now, and you can save $3,100 per y ear, beginning one year from today. You plan to deposit the funds in a mutu al fund that you think will return 8.5% per year. Under these conditions, how much would you have just after you make the 5th deposit, 5 years from no w? The brain and spinal cord are part of the _______ nervous system. The electrical charges that act as nervous signals are called _______. Jellyfish do not have a brain. Instead their nervous system is called a _______. After nervous systems began to develop in bilaterally symmetric animals, some developed ventral, or front, nerve cords, while chordates developed _______ nerve cords. Skeletons that allow for movement by using muscles and squeezing liquid to change the body shape are called _______ skeletons. _______ do not grow with arthropods, and so occasionally must be shed and regrown from chitin. Muscles move endo- and exoskeletons by _______. _______ is the joining of two gametes called sperm and egg. A fish that lays her eggs in a cluster is initiating _______ fertilization. _______ are an adaptation by reptiles to allow for reproduction and embryo development on land. Describe three different strategies used by three different animals to thermoregulate. If you see a snake coiled up in a sunny patch of grass, what can you probably conclude about the type of thermoregulator it is. Why? X/4-1=4 You may also use the flowchart for help if you wish need help asap its equation practice with angle addition The lowest temperature ever recorded on earth was -89.2C recorded in Antarctica in 1983.How many degrees Fahrenheit was that,to the nearest degree what jeans brand should i buy from? Shannon goes on vacation to Turkey with her family. Wanting to see if pizza is the same in all countries, she and her family go to a franchise pizza restaurant they visit frequently at home. They are astonished that the pizza that costs $10 at home costs 50 Turkish lira! They discuss why the pizza would cost more money, especially because it tastes almost the same.What might cause a $10 pizza to cost 50 lira in Turkey? A thin flat plate (L=0.657m, A=0.250 m^2, k=237 W/m.K , mc=3,171 J/K, E=0-7) is suspended vertically in quiescent air (T=296K , k=0.026 W/m.k) the plate cools from both surfaces by a combination of natural convection and radiation heat transfer. At a given instant in time a type-T thermocouple mounted on the plate to record the surface temperature yields an output voltage e0= 3.699mV the reference junction is maintained at 10 C. Assume the plate temperature is approximately uniform at any given time. The surroundings are extensive and at the air temperature. At given time an empirical correlation for the average Nusselt number yields NuL= 94.3.'1- Determine the instantaneous plate temperature (to the nearest C)'2- Calculate the natural convection heat transfer coefficient (W/m^2.K)'3- Evaluate the radiation heat transfer coefficient (W/m^2.K)'4- Approximate the instantaneous rate of change of the plate temperature (K/s) PLZ HELP!draw a straight line that is NOT parallel or perpendicular to the x or y axis The writer wants to avoid expressing the argument of the passage in absolute terms. Which of the following changesshould the writer make in order to achieve this goal? (A) In sentence 1, deleting "with remarkable frequency". (B) In sentence 2, changing "have undoubtedly uncovered the" to "may have uncovered a". (C) In sentence 7, adding "most likely" before "comes". (D) In sentence 9, changing "thanks to" to "due to". (E) In sentence 10, changing "they might have" to "the heart-shaped tail bones may have" I need help with this one Compare and contrast the alpine and taiga biomes. true or false: businesses should avoid using social and mobile media technologies. 6. Location Study the populationdensity map on page 412. Whereare the largest concentrations ofpeople in the region? Why arethey concentrated there?(30 points) Quentin's football team does a competition each year to see who can lift the most weight in one single bench press lift. last year, quentin won by lifting 250 pounds. what component of fitness does this most likely demonstrate? question 6 options: flexibility body composition muscular strength cardiovascular endurance which of the following statements about expert witness testimony is false? 1. a testifying expert does not fall under an attorney's work product privilege 2. an accountant may testify as a lay witness or an expert witness. 3. an expert witness can rely on inadmissible data or facts if the data/facts are reasonably relied upon by other experts in the field. 4. expert witness can testify only when they have personal knowledge of the matter that is being litigated. ________ means that the observed differences between scores is probably not due to chance variation between the samples.a) The rangeb) Statistical significancec) Standard deviationd) The normal curve