1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blsea [12.9K]
3 years ago
6

You designed a program to create a username using the first three letters from the first name and the first four letters of the

last name. Usernames cannot have spaces. You are testing your program with a user whose name is Jo Wen. What step in the program plan do you need to revisit
Computers and Technology
1 answer:
Pavel [41]3 years ago
7 0

Answer:

See Explanation

Explanation:

The question would be best answered if there are options to select from; since none is provided, I will provide a general explanation.

From the question, we understand that, you are to test for Jo Wen.

Testing your program with this name will crash the program, because Jo has 2 letters (3 letters are required), and Wen has 3 letters (4 letters are required)

So, the step that needs to be revisited is when the username is generated.

Since the person's name cannot be changed and such person will not be prevented from registering on the platform, you need to create a dynamic process that handles names whose lengths are not up to the required length.

You might be interested in
Wyjaśnij w jaki sposób wykonuje się nitowanie zakładkowe i nakładkowe, oraz wyjaśnij na czym polega pasowanie mieszane.
Ksenya-84 [330]

Answer:

????

Explanation:

i dont speak this language

7 0
3 years ago
1k bits equals to how many bits
ruslelena [56]

Answer:

1000 bits

Explanation:

hope it helps :D

8 0
3 years ago
Write an algorithm which gets a number N, and prints all the natural numbers less than or equal N. 3.
oksian1 [2.3K]

Answer:

Algorithm:

1.Create a variable N.

2.Read the value of N from user.

3.for i=1 to N.

 3.1 Print value of i.

4.end program.

Implementation in C++:

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variable

int N;

cout<<"Enter value of N:";

// read the value of N

cin>>N;

cout<<"Natural number from 1 to "<<N<<" are:";

for(int i=1;i<=N;i++)

{

// print the numbers

   cout<<i<<" ";

}

return 0;

}

Output:

Enter value of N:6                                                                                                        

Natural number from 1 to 6 are:1 2 3 4 5 6

3 0
3 years ago
Provide an example by creating a short story or explanation of an instance where confidentiality would be broken.​
Reil [10]

Explanation:

Personal Insurance

Confidentiality in the workplace: What you need to know

When you give advice to clients or patients for a living, you'll know that protecting sensitive and personal information is crucial. But are you clear on what counts as a breach of confidence or what to do if one occurs?

From how to protect confidential information, to what breaches of confidence look like for different jobs, here's what you need to know about confidentiality in the workplace.

What is a breach of confidentiality?

In short, a confidentiality breach is the disclosure of information to someone without the consent of the person who owns it. In other words, failing to respect a person's privacy or the confidence in which they gave the information or data to you, by passing it onto someone else.

Why is confidentiality important?

Protecting confidential information is vital. If you're in a position where you have access to or are given this type of data at work, your career relies on your ability to keep patient or client confidentiality. If you don't, you could lose trust and integrity in the eyes of your existing (and potential future) clients, who could terminate your contract and take legal action against you.

Therapist/patient confidentiality

Unsurprisingly, patient confidentiality is highly important for therapists and counsellors. It forms part of the therapeutic frame of appropriate boundaries, which creates a safe space for a good working relationship to form.

Here’re some examples of ways you could unintentionally break patient/therapist confidentiality:

Sharing confidential information about a client with a family member or friend

Talking about confidential information somewhere you can be overheard

Leaving your computer containing confidential information open to others

Continuing to work with a client when there's a conflict of interests (for example, they know one of your family members or friends)

When permission to share information is given but isn't specific, this can create confusion and result in a potential breach (for example, a patient may give permission for their information to be shared with a teacher but not their GP)

7 0
4 years ago
Databases that carry their data in the form of tables and represent relationships using foreign keys are called _____ databases.
Butoxors [25]
Relational databases.
7 0
4 years ago
Other questions:
  • Which of the encryption standards listed offers the greatest amount of security? A. WPA2 B. WEP2 C. WPA D. WEP
    5·1 answer
  • Which would be a responsible use of technology used by victims of cyberbullying? finding ways to strike back at bullies online.
    15·1 answer
  • Which device should be used for enabling a host to communicate with another host on a different network?
    9·1 answer
  • Which process alters readable data into unreadable form to prevent unauthorized access known as?
    8·1 answer
  • Professionalism is defined as what?<br> ASAP PLEASE!
    11·1 answer
  • Suppose a computer has 1GB of memory. Operating System takes 256 MB of memory. Imagine each task takes up 196 MB of memory and t
    12·1 answer
  • The __________ operator increases the value of the variable by 1 after the original value is used in the expression in which the
    7·1 answer
  • What are some limitations when it comes to testing and ensuring program quality? List at
    15·1 answer
  • Complete the procedure for creating a contact group by selecting the correct term from each drop-down menu. 1. Click . 2. Enter
    11·1 answer
  • To input lenth in meter and convert in to centimeter​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!