Answer:
The answer is "All of these could make good functions
".
Explanation:
In the given question some information is missing, that is options which can be described as follows:
a. Ask the user to confirm an input with a yes/no answer
b. Sort some input data into an ordered list
c. All of these could make good functions
d. Calculate a complex mathematical expression
A method is a collection of ordered code and provides a generic code, that is used to execute a single, connected operation.
- A good function is a function, which takes values from the user and it will sort all the data and store in memory, and whenever we call the function, it will give the values.
- It is also used to calculate some complex values,
Answer:
A primary key is a special relational database table column (or combination of columns) designated to uniquely identify each table record. A primary key is used as a unique identifier to quickly parse data within the table. A table cannot have more than one primary key.
Primary Key.
Candidate Key.
Alternate Key.
Super Key.
Composite Key.
Foreign Key.
Unique Key.
In the relational model of databases, a primary key is a specific choice of a minimal set of attributes that uniquely specify a tuple in a relation. Informally, a primary key is "which attributes identify a record," and in simple cases constitute a single attribute: a unique ID.
Explanation:
Answer:
import java.util.Scanner;
public class Speed{
int speed;
public Speed(int speed){
this.speed = speed;
}
public void checkSpeed(){
if(speed >= 24 || speed <= 56){
System.out.println("Speed is normal");
}
else
System.out.println("Speed is abnormal");
}
public static void main(String...args){
Scanner input = new Scanner(System.in);
int userSpeed = 0;
System.out.println("Enter a speed: ");
userSpeed = input.nextInt();
Speed obj1 = new Speed(userSpeed)
obj1.checkSpeed();
}
Explanation:
Security/Insider threats.
As much as cloud computing is good for your organization, just know that someone is looking after your data. The cloud provider does everything for you from maintenance to managing security. The bigger picture here is that users are entrusting their data to someone else. Although the work of cloud providers is to ensure that your data is safe, some are not always looking after your best interests.
Cyber-attacks.
Any time your data is stored on the cloud, you are at a higher risk of cyber-attack. Vulnerabilities such as DDoS attacks might occur and this single point of failure is in the cloud. As cloud computing continues to become more sophisticated, so do cyberattacks. As much as the security is right, hackers will go to any lengths to penetrate the systems.
The answer & explanation for this question is given in the attachment below.