1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vladimir79 [104]
4 years ago
6

Write an application that allows a user to enter the names and birth dates of up to 10 friends. Continue to prompt the user for

names and birth-dates until the user enters the sentinel value “ZZZ” for a name or has entered 10 names, whichever comes first. When the user is finished entering names, produce a count of how many names were entered, and then display the names. In a loop, continuously ask the user to type one of the names and display the corresponding birth-date or an error message if the name has not been previously entered. The loop continues until the user enters “ZZZ” for a name.
Computers and Technology
1 answer:
mylen [45]4 years ago
5 0
Sorry I don’t know the answer I am really sorry
You might be interested in
A(n) ____________________ is a hardware device or software utility designed to intercept and prevent unauthorized access to a co
sesenic [268]

Answer:

hardware device

Explanation:

4 0
3 years ago
Which of these utility tools would you least expect a support agent to find useful to increase security for end users?
tia_tia [17]

Answer:

b. Network performance monitor

Explanation:

A utility tool can be defined as a software application or program designed to add more functionality to a computer system, as well as to improve its performance efficiently. Some examples of commonly used utility tools in computer are file and folder backup tools, file management, antivirus, hard disk diagnostics, registry cleaner, network performance monitor, screensavers etc.

In the context of increasing security for the end users, the most important utility tools are;

1. Antivirus utility: to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.

2. Rootkit utility: it can be used to detect and remove any rootkit program that is hidden in a computer.

3. Spyware utility: this is used to detect, remove and prevent malicious adware that are found in software applications.

<em>However, a network performance monitor is a utility tool that would be found to least support an agent in increasing security for end users because it is a utility tool that is primarily used to monitor network traffic and amount of data usage. </em>

7 0
3 years ago
What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets p
Bas_tet [7]

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

8 0
3 years ago
A_ is an object makerfirst program second object third class fourth method ​
liberstina [14]

Answer:

you will use the components object animator whether sjetchware or HTML

5 0
3 years ago
When using the red / yellow / green method to present status of a project, yellow can mean which of the following?
olga nikolaevna [1]

Answer:

Happiness is one of the obvious ones however I was not given any of the following so I am unsure as to what my options were.

Explanation:

the color is bright and is usually be thought to be the color of the sun which could give us happiness after a rainy day

8 0
3 years ago
Other questions:
  • A/An is a series of instructions or commands that a computer follows; used to create software
    10·2 answers
  • What is log in and log out?
    5·1 answer
  • When inside a closed work environment, its okay to openly talk with co-workers about PII
    6·1 answer
  • While ________ is centered on creating procedures, ________ is centered on creating objects. Procedural programming, class progr
    10·1 answer
  • What is key for evaluating internal controls such as human resources, logistics, information technology, risk, legal, marketing
    11·1 answer
  • Explain how Steve Jobs created and introduced the iPhone and iPad.
    9·1 answer
  • For some reason i cant see brainly answers
    11·1 answer
  • I need help picture above
    8·2 answers
  • Discuss the impact printer and its types in detail?
    7·1 answer
  • Como se juega robótica de cokitos
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!