1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ycow [4]
4 years ago
5

Which of the following loop conditions will read all the data in the file assuming that each line in the file contains two integ

er values, and you will read the first one into a variable named intOne, and the other into intTwo
Computers and Technology
1 answer:
PSYCHO15rus [73]4 years ago
3 0

Answer:

while(inFile >> intOne >> intTwo)

Explanation:

Options are missing but the line of code that does the illustration in the question is while(inFile >> intOne >> intTwo)

Considering two variables, intOne and intTwo

Suppose that a file location has been specified, the infile statement identifies file which could either be an external data or an in-stream data from which data should be read.

while(inFile >> intOne >> intTwo)

Declares a while loop, with the help of the inFile statement, values in the first column are entered into intOne while the second column are entered into intTwo through with the help of then input channel symbol (>>).

You might be interested in
Which web design concept is most closely related to elements that symbolize the real world? A. node B. landmark c.metaphor IN D.
sergij07 [2.7K]

Answer:

landmark

Explanation:

6 0
3 years ago
In the lab, you defined the information systems security responsibility for each of the seven domains of a typical IT infrastruc
vladimir1956 [14]

Answer:

Remote Access Domain

Explanation:

Remote access Domain allows users to enter into system network through VPN.

8 0
4 years ago
________ includes reviewing transactoin logs and uses real-time monitoring to find evidence
denpristay [2]

Complete Question:

________ includes reviewing transaction logs and uses real-time monitoring to find evidence.

Group of answer choices

A. Log analysis

B. Network analysis

C. Code analysis

D. Media analysis

Answer:

B. Network analysis

Explanation:

Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.

Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.

<em>Please note, network analysis is also known as network forensics in computer science.</em>

4 0
3 years ago
Research and discuss the similarities and differences between cloud computing and client-server computing. Discuss the pros and
harkovskaia [24]

Answer:

Cloud computing as a virtual hosting tool, is much more theoretical. Both servers, applications, and communications are hosted in the cloud, off property, rather than being available via computer machine whereas In computing client/server, a controller gets client requests mainframes and needs to share its services, programs and/or data of one sometimes more client systems on the internet, and a client would be a portable platform that specific portions with a server and make use of a finite resource.

Explanation:

<u>Similar to cloud computing and client-server computing: - </u>

  • The cloud computing and client-server networking underpinning principles are the same. That is contact between client and server.
  • Throughout networking and client-server networking, user nodes can communicate (queries) with databases that live locally or are located in many other networks.

<u>Difference between computing and client-server computing: </u><u>- </u>

Resources: -

  • In computing client-server, the corporation or association controls the tools.
  • The services are offered in cloud computing by third parties or other businesses.

<u>The purpose of cloud computing and client-server computing is different:- </u>

  • Client-server computing is targeted at use. In computation, client-server clients request a product from the cloud. The operating system runs the test, then returns it.
  • Cloud computing is a sort of system in which the IT-related services are leased to the clients as a contract.

<u>Pros and cons of Cloud Computing:- </u>

The Pros:-

  • Lower costs for business:-The cloud is saving a lot of money for a medium-sized or small enterprise.
  • Better Reliability:- A dedicated group of experts performs all programming with such a cloud computing alternative.

The Cons:-

  • Limited Control:- When a firm stores cloud data, they have very limited control of it.
  • There have been security issues. The cloud isn't too attuned for every company to position some information on even a cloud.

<u>Pros and cons of client-server computing:- </u>

The Pros:-

  • Improved data sharing:- Data stored via the normal business method and processed on a server is available over an approved connection for the intended users.
  • Security:- Database has stronger access control and methods to ensure data could only be accessed or abused by approved clients.

The Cons:-

  • Overloaded Servers:- When multiple simultaneous requests from the client are made, the server is significantly overloaded, causing congestion in traffic.
  • Impact of centralized architecture:- Because it is centralized if a vital server fails to satisfy customer requests, the client-server then lacks good network robustness.

5 0
4 years ago
With examples write short notes on any of the following terms below.
stepladder [879]

types of computer viruses

1. polymorphic virus

2. worm

3.trojan horse

4.directory virus

5.boot virus

6.directory virus

7. macro virus

8. web scripting virus

9. memory resident virus

10. overwrite virus

11. direct action virus

12. multipartite virus

5 0
3 years ago
Other questions:
  • To evaluate trends in the workforce, investigate
    14·1 answer
  • Jackson is teaching the decimal number system. He wants his students to know how to expand numbers by powers of 10. Which is the
    13·2 answers
  • To create an effective study schedule, a student must guess the amount of time needed for studying. write down all activities an
    11·2 answers
  • You are on vacation and want to see where all the restaurants and trendy shops are in relation to your hotel. You remember there
    15·1 answer
  • How do I attach a file on the computer?
    13·1 answer
  • Which of the following is true about images that are arranged in a collumn
    9·1 answer
  • What do you think is the meaning of the saying "Sticks and stones may break my bones, but words can never hurt me"? Do think tha
    5·1 answer
  • ¿Qué significa PPO a nivel de programación?
    15·1 answer
  • Which of the following represents a backup system that will aid in recovery for any type of disaster or disruption?
    8·1 answer
  • In a conditional statement, the______ symbol is used to separate a test expression from the expression to be processed if the te
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!