Answer:
- The graph of the function is attached below.
- The x-intercepts will be: (2, 0), (-2, 0)
- The y-intercept will be: (-20, 0)
Explanation:
Given the function

As we know that the x-intercept(s) can be obtained by setting the value y=0
so

switching sides

Add 20 to both sides


Dividing both sides by 5





so the x-intercepts will be: (2, 0), (-2, 0)
we also know that the y-intercept(s) can obtained by setting the value x=0
so



so the y-intercept will be: (-20, 0)
From the attached figure, all the intercepts are labeled.
Answer:
cout <<showpoint << x; is the statement which prints the decimal point, but without forcing scientific.
Explanation:
The showpoint function in c++ print the decimal point number without forcing scientific.The showpoint function set the showpoint format flag for the str stream in c++.
Following are the program in c++
#include<iostream> //header file
using namespace std; // namespace
int main() // main function
{
double x=90.67; // double variable
cout <<showpoint << x; // display x without forcing scientific
return 0;
}
Output
90.6700
Answer:
Password Settings object
Explanation:
Active Directory is made up of different services that are aimed at handling the access and permissions to resources over a network. It was developed by Microsoft and was originally used for centralized domain management but has evolved past that now.
In AD, the data stored are also known as Objects, these objects can be
- users or a group that has been given passwords and/or
- resources such as computers or printers.
- Organizational Units (OUs)
The object responsible for handling the configuration of passwords configuration is the Password Settings object.
Here, all settings relating to password setup, configuration, reset and so on takes place here. The settings can be applied to groups or users which can show the complexity, length, history of the password and so on.
Answer:
please give me brainlist and follow
Explanation:
There are various phishing techniques used by attackers:
Installing a Trojan via a malicious email attachment or ad which will allow the intruder to exploit loopholes and obtain sensitive information. Spoofing the sender address in an email to appear as a reputable source and request sensitive information.
<h3>Answer(:</h3>
•concatenation
• scanning
• substringing
• translation
• verification
<h3>if you want to remember means csstv;-)</h3>