1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
labwork [276]
3 years ago
6

Which of the following statements correctly instantiate the Rectangle object myRectangle? (i) myRectangle Rectangle = new Rectan

gle(10, 12); (ii) class Rectangle myRectangle = new Rectangle(10, 12); (iii) Rectangle myRectangle = new Rectangle(10, 12);
Computers and Technology
2 answers:
madreJ [45]3 years ago
5 0

Answer:

The answer is "option iii"  .

Explanation:

In the given question it is defined that a class "Rectangle" is defined in the class a parameter constructor is created that accepts two parameters. In this question, we create an instance of the class. In object creation first, we define class name then object name and use new keyword in the Instance of class and pass parameters.

  • In option i), An object name is used first and then class name. It is not correct.
  • In option ii), In instance creation of the class, we do not use class keyword that's why it is wrong.

Solnce55 [7]3 years ago
5 0

Answer:

Rectangle D is reflected over the x-axis and then translated 8 units right will result in rectangle E

Step-by-step explanation:

The coordinates of rectangle D are:

(-1, 1)

(-1, 4)

(-3, 1) and

(-3, 4)

The rule of reflection across x-axis is given by:

Next, translate this 8 unit right which is given by:

⇒(7, -1) , (5, -1) , (5, -4) and (7, -4) represents the coordinate of rectangle E.

Therefore, Rectangle D if reflected over the x-axis and then translated 8 units right will result in rectangle E

Read more on Brainly.com - brainly.com/question/11786577#readmore

You might be interested in
Intellectual property rights are exclusive rights that help protect both the created and the creation. IPR offers exclusively wh
dedylja [7]
IPR offers ownership of the intellectual property. The owner of the property has the right to a monetary gain from those who wish to use it.
8 0
2 years ago
Read 2 more answers
What is the default delay before scripts are executed?
kenny6666 [7]
Answer is 5 minutes

The default value for windows 8.1 joined to a server 2003 domain logon scripts delays is not configured. However, the windows 8.1 may have a delay processing logon scripts of 5 minutes. The script does not execute until 5 minutes are over. Users have a Group policy applied to them that is used to assign a logon script.


8 0
3 years ago
In a mailbox based message passing system, a process is not put in a waiting queue but receives an error signal upon sending to
Daniel [21]

Answer:

Yes.

Explanation:

Race condition can be described as a situation where at any time there are two or more processes or threads operating concurrently, there is potential for a particularly difficult class of problems. The identifying characteristic of race conditions is that the performance varies depending on which process or thread executes their instructions before the other one, and this becomes a problem when the program runs correctly in some instances and incorrectly in others. Race conditions are notoriously difficult to debug, because they are unpredictable, unrepeatable, and may not exhibit themselves for years.

6 0
3 years ago
Overview: For the final project in this course, you will assume the role of a training manager at a cybersecurity firm needing t
Free_Kalibri [48]

<u>Solution and Explanation:</u>

<u>INTRODUCTION </u>

A) Introduction Cybersecurity should be a priority for all businesses so that they can protect their information systems and data assets. Organizations all over the world have been experiencing cyber-attacks. Types of cybercrime include identity theft, ransomware, denial of service attacks, botnets, phishing and social engineering (Khanse, 2014).

Cybersecurity threats exist from both external sources and from within a company. Cybersecurity issues will have impacted businesses financially to the tune of $6 trillion dollars per year worldwide, which is double the amount since 2013. Cybercrime is projected to be more profitable than the global illegal drug trade (Morgan, 2017). CyberLeet Technologies can safeguard businesses against these threats by strictly adhering to the core tenets of cybersecurity which are confidentiality, availability and integrity. CyberLeet will ensure these tenets by identifying vulnerabilities in client systems, implementing data security policies and utilizing threat detection monitoring.

B) Your Role at CyberLeet The role of an information security analyst at CyberLeet Technologies is to enforce the cybersecurity tenets of confidentiality, integrity and availability. This will be accomplished by performing risk assessments of its client’s software, hardware and networks. The analyst must plan and implement security measures to protect client systems, networks and data. Finally, the role includes helping the client engage in security awareness training for its employees (New England College, 2017). The CyberLeet information security analyst will perform job functions which uphold the basic tenets of cybersecurity. The analyst will perform vulnerability assessments of the client systems to ensure the cybersecurity principle of availability. He or she will monitor the client network and systems to safeguard the cybersecurity tenet of confidentiality. Also, the analyst will safeguard the cybersecurity tenet of integrity by protecting client data through the use of data encryption. Other tasks that will be performed include malware analysis, enhancement of security standards, and investigation and documentation of any security breaches. The ultimate goal of an information security analyst at CyberLeet Technologies is to uphold the cybersecurity tenets of confidentiality, integrity and availability by protecting its client systems’ assets, networks and data from cyberattacks.

C) Purpose of This Manual The purpose of this manual is to train new CyberLeet information security analyst recruits about their job duties. These duties include understanding that their client’s organization is subject to information security issues and the fundamental core cybersecurity tenets of confidentiality, integrity and availability must be applied to develop security measures (Henderson, 2017). These threat mitigation security measures include the development of cybersecurity policies including password policies, acceptable use policies, employee training policies, and basic user polices. It is imperative that information security analysts apply the principles and practices outlined in this manual and provide high-quality services to the client. Failure to do so could result in the client experiencing cyber-attacks ranging from malware, phishing, denial of service and ransomware (Khanse, 2014).

CORE TENENTS OF CYBER SECURITY

A) Confidentiality One of the core tenets of cybersecurity is confidentiality. Confidentiality is the preservation of private and proprietary information, such as customer data or health records. Only authorized users should be able access protected information, while unauthorized users should be blocked. Information security requires control on access to protected information (Henderson, 2017). An example of enforcing confidentiality includes the restriction of access to company assets and information via the use authentication and authorization techniques.

B) Integrity The core tenet of integrity is the guarding against improper modification of data or system information. Data integrity is maintained when information remains unchanged during storage, transmission and usage (Henderson, 2017). An example of maintaining system integrity is the prevention of malware which can corrupt computer files. An example of maintain data integrity is the proper encryption of data prior to transmission between systems, to prevent unauthorized access and manipulation.

C) Availability The core tenet of availability is the accessibility of users to systems and data. Availability is maintained when all components of the information system are working properly. Problems in the information system could make it impossible to access information, thereby making the information unavailable (Henderson, 2017).

 

8 0
3 years ago
The next step in the translation of this mrna will be the formation of a peptide bond between which two of the numbered amino ac
blondinia [14]

The bond between Amino acid 2 and amino acid 3 two of the numbered amino acids. The correct option is A.

<h3>What is protein translation?</h3>

In genomics, translation is the process by which information encoded in messenger RNA (mRNA) directs the addition of amino acids during protein synthesis.

It is divided into three stages: initiation, elongation, and termination. After being processed, the mRNA transports the instructions to a ribosome in the cytoplasm.

The ribosome, which is made up of rRNA and proteins, is where translation takes place.

The bond formed by amino acids 2 and 3 (two of the numbered amino acids).

Thus, the correct option is A.

For more details regarding protein translation, visit:

brainly.com/question/16305501

#SPJ1

Your question seems incomplete, the missing part of question is attached below:

4 0
1 year ago
Other questions:
  • Who usually signs a collection letter?
    15·2 answers
  • Ooooooooooooooooooooooooooooh im blinded by the lightssssssssss
    11·1 answer
  • A viral video is one that can infect your computer with malware. <br> a. True <br> b. False
    6·1 answer
  • what aspect should you consider before adding pictures to a document? you should structure the first before you search for a rel
    15·2 answers
  • Suppose Alice, Bob, and Carol want to use secret key technology to authenticate each other. If they all used the same secret key
    10·1 answer
  • Double bar graphs compare multiple what
    11·1 answer
  • When using correct ergonomic technique be sure to _____.
    11·2 answers
  • you are working on creating a business document with two other co-workers. Based on just information, which of the following pre
    14·1 answer
  • Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
    8·1 answer
  • What is the name of the directory that contains symbolic links to unix sysv rc scripts for runlevel 2?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!