1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vikentia [17]
3 years ago
6

Which composer below was not part of the classical period? A. Beethoven B. Bach C. Mozart

Computers and Technology
1 answer:
castortr0y [4]3 years ago
3 0

Explanation:

B. Bach

Thanks for your point

You might be interested in
Programming challenge description: Write a program that, given two binary numbers represented as strings, prints their sum in bi
Lubov Fominskaja [6]

Answer:

The program to this question can be given as:

Program:

#include<iostream>  //include header file

using namespace std;  

string add(string a, string b)  //define add function

{       //declare variable  

   string result = "";  

   int sum = 0,k,l;      

   cahr x;    

   k= a.size() - 1;

   l = b.size() - 1;  

   while (k>= 0 || l>= 0 || sum == 1) //loop

   {

   //addition 

       sum= sum+ ((k >= 0)? a[k] - '0': 0);  

       sum= sum+ ((l >= 0)? b[l] - '0': 0);

        x=sum%2;

      result=(x+'0') +result;

  // Compute carry

       sum =sum/ 2;  

       // Move to next digits  

       k--;  

       l--;  

   }  

   return result; //return value

}

int main()  //main method  

{  

   string a,b;  //string variable

   cout<<"Enter first binary digit: ";  //message.

   cin>>a;     //input from user

   cout<<"Enter Second binary digit: ";  //message.

   cin>>b;     //input from user

   cout <<"Addition :"<<add(a, b)<<endl; //print addition

   return 0;  

}

Output:

Enter first binary digit: 1101

Enter Second binary digit: 100

Addition :10001

Explanation:

In the above c++ program first, we include the header file. Then we define the add function in the add function we add two binary digits by passing value as arguments. In this function, we define a variable that is used on the addition of binary numbers. In this function we define the loop in the loop we check if two binary number is 1 then it will print 0 and pass 1 as the carry. after performing addition it will return value. In the main function, we take two binary numbers from the user and pass the value to the function and print function return value.

8 0
3 years ago
What is Server Message Block (SMB) used for in Windows and can a hacker still damage a network using SMB?
Aleksandr [31]

Answer:

The absolute most decimating ransomware and Trojan malware variations rely upon vulnerabilities in the Windows Server Message Block (SMB) to proliferate through an association's system. Windows SMB is a convention utilized by PCs for record and printer sharing, just as for access to remote administrations.  

A fix was discharged by Microsoft for SMB vulnerabilities in March 2017, yet numerous associations and home clients have still not applied it. So now, the unpatched frameworks permit dangers that exploit these vulnerabilities inside, helping dynamic malware crusades spread like Californian rapidly spreading fire.  

SMB vulnerabilities have been so effective for danger entertainers that they've been utilized in the absolute most unmistakable ransomware episodes and refined Trojan assaults of the most recent two years. Truth be told, our item telemetry has recorded 5,315 discoveries of Emotet and 6,222 of TrickBot in business systems—two Trojan variations that are utilizing the SMB vulnerabilities—over the most recent 30 days alone.

7 0
3 years ago
Read 2 more answers
Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not makin
Georgia [21]

Answer:

Check the explanation

Explanation:

Following are the things to be implemented immediately

Database should be maintained centralized manner so that any one can access data. Number should be given at the time of admission it should contain year of admission,course of admission …etc in the form of code eg. 2015FW1001 means year 2015 Fashion studies Winter admission no 1001. At the time of admission only they have to give the details of military status. Department which taking care of this issue should only have the permission to modify and delete the data. All the departments should be connected to the server by internet/intranet/network. Students should be given user id and password

Same database should be connected and given access through internet also with limited privileges so that user can update their status of military by submitting proof. By these information uploaded centralized administrative department update the status if they satisfied with the documents uploaded.

We can overcome the problem of mil status by giving the freedom to the student update their military status by uploading the documents.

7 0
3 years ago
Choose the correct vocabulary term from each drop-down menu
Korvikt [17]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Education that focuses on skills that can be used in the workplace is work-based learning.

Creating curriculum around learning goals established by the training or learning department is formal learning.

The continued pursuit of knowledge for either personal or professional reasons is lifelong learning.

Learning that focuses on goals established by the learner is informal learning.

7 0
2 years ago
A technician is building a thick client workstation that would be used to run a database and wants to ensure the best protection
Alexxandr [17]

Answer: ECC (Error-correcting code) memory

Explanation: Error correcting code memory is the memory that has the capability of detection and correcting the error arising in the data.The internal data is the most effected data from the corruption and damage.It is the memory used in the computer and other operating system because it has less tolerance towards data corruption.

The technician should use the ECC memory for the building of the client station.This will protect the system and the data from getting in any circumstance.

6 0
2 years ago
Other questions:
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • ?the single most effective security measure for digital devices is to password protect access to them.
    5·1 answer
  • What is client server relationship is the basic form of what
    6·1 answer
  • What file format can excel save files as
    10·1 answer
  • ​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
    10·1 answer
  • Write a function called simulate_several_key_strikes. It should take one argument: an integer specifying the number of key strik
    7·1 answer
  • Define a class named ComparableSquare that extends Square (defined above) and implements Comparable. Implement the compareTo met
    7·1 answer
  • In general, smartphones do NOT hold as much personal information as tablets.
    11·1 answer
  • The table button is present in the ……… tab.​
    14·2 answers
  • Your program will be used by many departments at the university. Your comments will be important to their IT people. What would
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!