1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka [24]
3 years ago
15

Rewrite this pseudocode so that, instead of indicating whether or not the target was found in the list, the output is the number

of occurrences of the target. For instance, if list were {8, 3, 5, 1, 3, 9, 2, 8, 3, 3} and target were 3, then the output should be 4, since the number 3 occurs four times in the list.
Computers and Technology
1 answer:
ElenaW [278]3 years ago
4 0

Answer:

THE ANSWER IS EASY

Explanation:

You might be interested in
Write a paper, 2-3 paragraphs that discuss how to defend ideas objectively through effective communication. Include the skills n
mojhsa [17]

Wot in tarnation? -_-

  • how to defend ideas objectively the effective communication
  1. Being clear and concrete so that your point gets across without any ambiguity that might make someone else interpret your idea in the wrong way
  2. Use language that is neutral and does not have any negative or positive connotations that might the listener or reader assume you have a bias
  3. Use evidence and data to back up your claim from reputable sources and not just your own personal opinion

  • Skills to prevent conflicts and promote buy-ins
  1. You need to know how to listen in order to communicate effectively, pay attention to how other people respond to what you say so you can either apologize for your behavior or look out for in the future. Listening also shows that you value the other person's opinion and thus might make them more likely to treat you with the same respect
  2. Encourage other people to buy into your ideas by being confident about them and again using evidence so that people can trust what you're saying has some merit to it.
8 0
3 years ago
After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and
Ad libitum [116K]

Complete Question:

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and:

Group of answer choices

A. Describes how the vulnerabilities could impact the organization.

B. Provides recommendations for system configuration changes.

C. Lists them in alphabetical order.

D. Provides recommendations for additional personnel needed.

Answer:

B. Provides recommendations for system configuration changes.

Explanation:

The Microsoft Baseline Security Analyzer (MBSA) is a software program or application developed by Microsoft and it helps network security administrators to check for security updates, Structured Query Language (SQL) administrative vulnerabilities, Windows administrative vulnerabilities, Internet Information Services (IIS) administrative vulnerabilities, weak passwords, identifying missing security patches and common security misconfigurations.  

After completing a scan, Microsoft Baseline Security Analyzer (MBSA) will generate a report which identifies security issues and provides recommendations for system configuration changes.

<em>Microsoft Baseline Security Analyzer (MBSA) is a legacy software that scores the results of a scan and displays the items posing the highest risk first, based on Microsoft’s security recommendations</em>.

7 0
3 years ago
Lonic compounds are also known as <br> a. salts <br> b. valence <br> c.organic <br> d.elements
shutvik [7]
I'm not quite sure but it maybe b
6 0
4 years ago
Read 2 more answers
What percentage of jobs work in the entertainment industry?
Masja [62]
Your answer is A hope this helps
6 0
3 years ago
What is the easiest way to remeber all of the field , entry, and record on a Database table ?
svet-max [94.6K]
Well, you can always write it down on a sheet of paper, then(if you have one), you can save it in your folder. That way you can finfd it easilt
8 0
3 years ago
Other questions:
  • The internet is an example of
    12·2 answers
  • Carmen wanted to clear up space on her computer and remove unwanted files. What would be the best for her to delete?
    6·2 answers
  • How do you think calculator of a computer works? describe the procedure.
    7·1 answer
  • What is a service-oriented architecture? Group of answer choices A business-driven enterprise architecture that supports integra
    13·1 answer
  • ________ refers to the ICT architecture, where users access software applications and information systems remotely over the Inte
    7·1 answer
  • In the space provided, analyze the pros and cons of becoming a member of an artistic guild. Your answer should be at least 150 w
    12·1 answer
  • How to prepare and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50
    7·1 answer
  • Plz help me to learn python and thx
    7·1 answer
  • Assume three jobs arrive at approximately the same time (arrival time are all 0), but Job A arrives slightly before Job B, and J
    13·1 answer
  • ____________ is a process of reverse calculation to achieved a desired result. a. Data Consolidation
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!