Answer:
public class ANot {
public static void main(String[] args) {
int numberOfSides = 20;
boolean isQuadrilateral;
if(numberOfSides==4){
isQuadrilateral = true;
System.out.println("The triangle is quadrilateral");
}
else{
isQuadrilateral=false;
System.out.println("The triangle is not quadrilateral");
}
}
}
Explanation:
- Create and Initilize the int variable numberOfSides (You can also receive this from a user using the scanner class for example).
- create a boolean variable isQuadrilateral
- Use if and else statement to check if numberOfSides ==4 and assign true to isQuadrilateral else assign false
Answer:
True
Explanation:
Computer security is basically divided into three main areas:
- Vulnerability/threat assessment and risk management refers to a process that requires the identification, quantification and ranking of a system's possible vulnerabilities.
- network intrusion detection and incident response refers to software that detects malicious activity or policy violations, and blocks them
- digital forensic investigation refers to the process of identifying, recovering and interpreting (or validating) electronic data.
Generally a single individual may specialize in one of these areas, that is why he/she may need help with the others.
Answer:
True is the correct answer for the above question.
Explanation:
- When any document file is opened then every point has some particular address. so there is a pointer which states that where the read operation and the write operation is going on.
- When any person writes any program to read a file or write a file then there is a need for some variable that is pointed for the reading and the write operation.
- The document which is used for the write data or read data is also designed and maintained by some software.
- Hence we can say that there are needs of some variable that point the operation of the file and it is also stated from the above question. Hence the above question statement is a true statement.
Answer:
Option A. is correct
Explanation:
It now not possible for a country to be "occupied" by an invisible invader that arrives through airwaves and wireless networks. It is almost impossible to block foreign countries’ satellite broadcasts and Internet transmissions inspite of Spy satellites and other communications technology and Global positioning systems.
Option A. is correct
Option B is the correct answer, Employers have flexibility in choosing a fall protection system they believe will work best in a situation selected. It is the primary duty of employer to provide safety to its workers. Employers must setup a suitable protection system at workplace from falling off from overhead platforms and from elevated workstations during construction for safety of its employees.
Further Explanation:
⦁ Employer must ensure compliance to OSHA-Fall protection in construction.
⦁ Generally, fall protection must be ensured by deploying guardrail systems at the edge of construction sites, safety systems built by nets or personal fall arrest.
⦁ OSHA requires to built fall protection system irrespective of fall distance to make sure safety conditions for workers/ employees.
Answer details:
Grade: High School
Subject: Computer Science and Technology.
Learn More:
Fall protection and compliance to OSHA rules and regulations
brainly.com/question/8910167
Employer responsibility in providing fall protection
brainly.com/question/5872956
Key Words: Fall protection, OSHA, workplace safety, guardrail systems etc.
Image of guardrail as an example is attached.