1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mrs_skeptik [129]
2 years ago
15

PART 2 - Exercise 2 - Programming Assignment

Computers and Technology
1 answer:
Oliga [24]2 years ago
5 0

Suppose that a linked list is used as a data structure for the hash table, create a program that includes steps his application counts the number of phrases in documents decided on via way of means of the user #include.

<h3>What is Programming?</h3>

It is the manner of making hard and fast commands that inform a pc the way to carry out a task. Programming may be finished the usage of lots of pc programming languages, inclusive of JavaScript, Python, and C++.

  1. This application counts the quantity of phrases in documents decided on via way of means of the user.
  2. #include
  3. #include
  4. #include the usage of namespace std; //Function 1 int count(string word)go back word.size();
  5. }
  6. //Function 2
  7. int vowel(string word)> filename;
  8. //Open the {input|enter">enter file.
  9. inputfile.open(filename.c_str()); cout<<"nWord listing after format";
  10. cout<<"n____nn"; //If the file succesfully opened, process it.if (inputfile).

Read more about program :

brainly.com/question/1538272

#SPJ1

You might be interested in
attackers typically use ack scans to get past a firewall or other filtering device. how does the process of an ack scan work to
bogdanovich [222]

Attackers frequently use ACK scans to circumvent a firewall or other filtering tools. During a NULL scan, all packet flags are enabled. The most recent versions of Nessus Server and Client are compatible with Windows, Mac OS X, FreeBSD, and the vast majority of Linux variants.

<h3>What is ack scan ?</h3>
  • ACK scans are used to identify hosts or ports that have been blocked or are resistant to other types of scanning. An attacker uses TCP ACK segments to learn about firewall or ACL configuration.
  • Attackers probe our router or send unsolicited SYN, ACK, and FIN requests to specific UDP/TCP ports.
  • TCP ACK Scan sends an ACK message to the target port to determine whether or not it is filtered.
  • On unfiltered ports, a RST reply packet will be sent for both open and closed ports. Filtered ports will either generate no response or generate an ICMP reply packet with an unreachable destination.
  • The TCP ACK scanning technique attempts to determine whether a port is filtered by using packets with the ACK flag set.

To learn more about ask scan refer to:

brainly.com/question/13055134

#SPJ4

3 0
1 year ago
What is the outlined area called?
Yakvenalex [24]

Answer:

Ribbon

Explanation:

I would want to believe that this question is asking us about the outlined area in the image attached below. The ribbon consists of the main tabs you see when you open up your Word document by default. They include the home, insert, page layout, in that order, all the way upto the view tab. The main tabs are split into groups and these groups are further split into command options that help users complete a task. If you want to, you can minimize the ribbon and remain with the tab names only by hitting CTRL + F1

5 0
4 years ago
Organizations following Waterfall methodology usually begin with requirements gathering, in which the development team attempts
Aleks04 [339]

Answer:

Project teams do smaller portions of the entire project in small sprints.

Teams can interact to handle different steps simultaneously if needed.

Documentation is still required to keep everybody on track. This documentation allows teams to keep control over what version of the project they are working on and how the project has changed along the way.

As an approach to rapid development, the focus is on development rather than planning, enabling teams to start work more quickly.

hope this helps you

:)

7 0
3 years ago
Megan says she never needs to look at the Transport Layer when she is searching for what went wrong with the network she support
lara31 [8.8K]

I'd say D: Wrong, because transporting information is what a network does, and the Transport Layer is at the heart of that layer.

Transport layer is truly at the heart of the OSI model. Its main function is to transfer application data from the source to destination. This layer provides a reliable end-to-end communication service and transfers data for the user layers above it, as well as shielding the rest of the layers below from details like message error and flow control functions. If packets get destroyed or lost during transmission, it is in the best interest of Megan to check the transport layer. Transport layer ensures that whenever something like this happens, packets must be re-transmitted.

3 0
3 years ago
Read 2 more answers
Identify the type of error described
Arturiano [62]

Answer:

ZeroDivisionError

ValueError

Explanation:

ZeroDivisionError occurs when you attempt to divide a number by 0.

ValueError occurs when the argument passed into a function holds the wrong value. In this case, the string is not numeric which cannot be passed into the float() function.

Hope this helps :)

5 0
3 years ago
Other questions:
  • Which of the following is true about a point-and-shoot camera? They always have lenses that you can take on and off. They are of
    8·2 answers
  • When first created all charts always include___and a chart area
    8·2 answers
  • You are in a library to gather information from secondary sources, and you want to find a current print resource that can supple
    6·1 answer
  • The temperature of a plastic cube is monitored while the cube is pushed 8.7 m across a floor at constant speed by a horizontal f
    8·1 answer
  • What is 1/2 minus 1/16?
    7·2 answers
  • What are the examples of personal computers ?
    8·1 answer
  • Which of the following statements is true?A)Implicit data type conversion is performed when you mix values of different data typ
    5·1 answer
  • 97 points pleaseeee helpppp
    8·2 answers
  • Explain any two features of a computer​
    15·1 answer
  • .WAP to enter monthly sale of Salesman and give him commission i.E. If the monthly sale is more than 500000 then commision will
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!