1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ipn [44]
3 years ago
15

Consider the following code segment.

Computers and Technology
1 answer:
Marizza181 [45]3 years ago
8 0

Answer:

21

Explanation:

You might be interested in
You are provided with the following program poem.cpp. All is good, and the memory is allocated dynamically, but it crashes your
Maslowich

Answer:

See explaination

Explanation:

#include <iostream>

using namespace std;

string * createAPoemDynamically()

{

string *p = new string;

*p = "Roses are red, violets are blue";

return p;

}

int main() {

while(true) {

string *p;

p = createAPoemDynamically();

if (!p)

{

cout << "Memory allocation failed\n";

}

cout<<*p<<"\n";

// assume that the poem p is not needed at this point

//delete allocated memory

delete p;

}

}

8 0
2 years ago
British mathematician Alan M. Turing wrote a number of papers on theoretical computer science. In one paper, written in 1936 bef
9966 [12]

Answer: D. Turing conceived the structure of a programmable computer.

Explanation: The passage describes how Alan M. Turing described the theoretical aspect of a programmable computer. There is no reference to a physical machine or Turing working on an actual (physical) computer.

The Turing machine, although it does sound like a physical computer was an abstract idea, conceived in mathematical form of what a programmable machine would be like. Alan Turing is considered one of the founding fathers of theoretical computer science.

4 0
3 years ago
What is the difference between the throw statement and the throws clause?
ruslelena [56]

Answer:

throw and throws represent different constructs in Java programming language.

Explanation:

throw is used to explicitly throw an Exception from within a code segment.

For example:

public void throw_test(String str){

        if(str==null) throw new NullPointerException();

}

throws is used to specify an exception list which may be thrown by a method:

For example:

public String readFromFile(File f) throws IOException {

.....

// Some code fragment which could throw a IOException

}

6 0
3 years ago
Why is it necessary to clear the cache before you retest the web server connections?
egoroff_w [7]
The cache stores copies of content retrieved from the web. In stead of hitting your webserver, your test may be satisfied from the cache, so you are not testing any changes that you made...

CSS files are notoriously stubborn in their caching behaviour.
7 0
3 years ago
Define three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was sto
emmainna [20.7K]

Security controls are measures that are put in place to control or prevent the attack of a threat on a system. The three security controls designed to mitigate the risk associated with a recent leak of sensitive information that was stored in cleartext files are;

  • Physical Controls
  • Technical Controls
  • Administrative Controls

Physical controls refer to the measures that are put in place so that unauthorized access to sensitive files is warded off.

It could imply Installing cameras and fingerprinting to prevent such access.

Technical controls are installed to protect the hardware and software. Systems might need to be configured and programmed in such a way that can resist any attack from threats.

Antivirus and data encryption are types of technical controls.

Administrative controls are installed through the policies and standards of operations of the organization.

Through training, new employees are educated on ways to protect the systems from attack.

Learn more here:

brainly.com/question/24674099

5 0
2 years ago
Other questions:
  • The following memo does not follow the correct format. What should be changed? To: Stacy, Allen, and Emma Date: August 12, 2012
    10·2 answers
  • A lever has an effort arm that is 8 meters long and the residence (load) arm that is 1.5 meters long, how much effort is needed
    7·1 answer
  • The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
    9·1 answer
  • Arman, a friend of your dad, has a computer running Windows 7 and wants to perform an upgrade. He has only 3GB of RAM in his com
    13·1 answer
  • Which organization plays a key role in development of global health informatics?
    9·1 answer
  • When you _____ a scroll bar, a shortcut menu appears with commands related to the scroll bar
    10·1 answer
  • Which of the following is not the disadvantage of closed
    7·2 answers
  • Which is a major drawback of muliuser procesing of a database
    13·1 answer
  •  A programming paradigm is a method used to program a computer that guides the solving of a problem or performing of a task. Whi
    8·1 answer
  • Transaction processing systems (TPSs) provide valuable input to management information systems, decision support systems, and kn
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!