1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alenkinab [10]
3 years ago
9

Which of the following is NOT true about procedural abstraction?

Computers and Technology
1 answer:
solniwko [45]3 years ago
3 0

Answer:

Should be C.

Explanation:

Just took the test.

You might be interested in
(5 points) Create a user-defined data structure (i.e., struct) called Point that represents a two-dimensional Cartesian coordina
Harlamova29_29 [7]

Answer:

Here is the C++ program:

#include<iostream>  //to use input output functions

#include <math.h>  //to use sqrt and pow function

#include<iomanip>  //to use setprecision

using namespace std;   //to identify objects cin cout

struct Point  {  // structure name

float x,y;  // member variables

};  

float calculateDistance (Point a, Point b)  {  //function that that takes two parameters of type Point

float distance;  //stores the distance between two points

distance=sqrt(pow(a.x-b.x,2)+pow(a.y-b.y,2));  //formula to compute distance between two points

return distance;  }  //returns the computed distance

int main()  {  //start of main function

Point p1,p2;  //creates objects of Point

cout<<"Enter point 1 coordinates: "<<endl;  //prompts user to enter the value for coordinates of first point

cin>>p1.x;  //reads input value of x coordinate of point 1 (p1)

cin>>p1.y;  //reads y coordinate of point 1 (p1)

cout<<"Enter point 2 coordinates: "<<endl;  //prompts user to enter the value for coordinates of second point

cin>>p2.x;  //reads input value of x coordinate of point 2 (p2)

cin>>p2.y;  //reads y coordinate of point 2 (p2)

cout<<"The distance between two points is "<<fixed<<setprecision(2)<<calculateDistance(p1,p2);} //calls function by passing p1 and p2 to compute the distance between p1 and p2 and display the result (distance) up to 2 decimal places

Explanation:

The program has a structure named Point that represents a two-dimensional Cartesian coordinate (x, y). The member variables of this struct are x and y, which are both floating-point values. A function called calculateDistance takes two parameters, a and b of type Pointer and returns the distance between the two given points using formula:

\sqrt{(x_{2}-x_{1} )^{2} +(y_{2}-y_{1} )^{2}  }

It uses pow function to compute the power of 2 and sqrt function to compute the square root.

Then in main() method the program prompts the user to enter coordinates for two points and calls calculateDistance method to compute the distance between two points and display the result up to 2 decimal places using setprecision(2).

The program along with the output is attached in a screenshot.

6 0
3 years ago
You are the IT security manager for a retail merchant organization that is just going online with an e-commerce website. You are
lions [1.4K]

Answer:

Input validation, Allowing script input, and Escaping metacharacters

Explanation:

A programmer can implement the most effective way to prevent XSS by validating input, coding defensively, escaping metacharacters, and rejecting all script-like input.

4 0
3 years ago
Enabling encryption of all data on a desktop or laptop computer is generally considered:______.
Nezavi [6.7K]

Enabling encryption of all data that are stored on a desktop or laptop computer is generally considered: essential for any computer.

<h3>What is information security?</h3>

Information security can be defined as a preventive practice which is typically used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technologies, encryption, frameworks, processes and network engineers.

<h3>The types of security control.</h3>

In Cybersecurity, there are three (3) different types of security control and these include the following:

  • Management security.
  • Physical security.
  • Operational security.

In this context, we can infer and logically deduce that the use of encryption, endpoint security, firewalls, intrusion detection systems (IDS), and biometric fingerprint readers is generally considered essential for any computer that stores data, unless they aren't sensitive information.

Read more on information security here: brainly.com/question/14286078

#SPJ4

4 0
2 years ago
A. which chip is thought to be the first microprocessor? how many transistors roughly did it use?
vaieri [72.5K]
A micro processor is an integrated circuit that have all the functions of a central processing unit of a computer.
The chip which is thought to be the first microprocessor is INTEL 4004. It was manufactured by Intel in 1971. Intel 4004 has 2,300 transistors. 
4 0
4 years ago
Please describe in a few sentences
myrzilka [38]

Because a theorie is someones scientific quess on a matter so soon they get a understanding and change them. They are not discarded because they usually keep the same wording but not all so that it is correct then.

:)

4 0
3 years ago
Other questions:
  • one business rule is that each project has one manager. Identify two (and no more than two) problems with the data structure or
    9·1 answer
  • 5.William travels a lot on business purpose. He needs to regularly communicate with his business partner. He also needs to send
    15·1 answer
  • Public static void prefixmerge(customer[] list1, customer[] list2, customer[] result {
    6·1 answer
  • Explain chart elements​
    12·1 answer
  • What happens when you send a fax to a phone?
    9·1 answer
  • What adds the element carbon to the environment
    10·2 answers
  • Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is d
    14·1 answer
  • ICD-10-CM diagnosis codes are entered in Block 21 of the CMS-1500 claim. A maximum of __________ ICD-10- CM codes may be entered
    14·1 answer
  • Can anybody do Algorithm 2 for me (with Python).<br> Answer = 25 points.
    13·1 answer
  • 1. What is the difference between the wireless network that you provide to your customers versus the wireless network that you w
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!