1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
9

Provide the user with a menu for the following 10 algorithms. Then ask which algorithm the user decides she/he wants to use. Fin

ally ask the correct questions to the user to solve for the algorithm selected.
1. Volume of a circle
2. Free fall
3. Polygon with same sides
4. Octaves frequency
5. BMI
6.Money breakdown
7. Chinese Zodiac
8.Quadratic formula
9. Employee raise
10. Register clerk
Computers and Technology
1 answer:
Vanyuwa [196]3 years ago
6 0

Answer:

foiydvoihivherqpiufhqeripufhwpjferifyhgeqwpufwhrfiouerhfpiwruhwriufhriughrpifuwrhfpouwerhfpir3gherqiughwrpijfheriughrgiuehgukjetnbgipuhiugtrihugtrhuigrtuhtrgihugtrihugtrihuggriughrgiuhgthgtehuighirihghtrihuetiughto[ughwer[igut4hg[owjg[toughjr[ough42ouhetgpou4t2gouhpoughogu4tpiu24hgpouthpgouwithjgop2tijgpotu4hgp4igjtoihj2p4oughroug2jt4poiughj2rpougrtihugtrjgtjipoijhuigtrfkopfgtrigtlrijgrijgtju9gt3i;gtju;lk3j3g00j835uj3ggy366j6jujep6ppjysbgtvrjgtroijpgtrijptgwiugtugtjteggteuegtiuogtgtutge5gtuogtuotguutytgju5t5iujugtteg5ut5gugt58ut54ut5grut5rd8u5trdu8jt5rd8ut5r8ut5tttfgig5ri;grgtrtgijpogte5ijopgtijogtri0tg45i0t45ij9gt54p98uhtrhuothjpiughtgutjhpwtoigj2rtg92tjhrwoipj[tigh9ughoghjergouehnpoutehgepogiujtr[ogihewupognetpoiuhqetoighqe[ou\epfouheq-g9uerhfhgprugqetughqe[ougjetiughnqetpoughnqet[ogujqreg[uijt

You might be interested in
A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review
kaheart [24]

Complete Question:

A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply.

A. Logs.

B. Full Disk Encryption (FDE).

C. Binary whitelisting software.

D. Security Information and Event Management (SIEM) system.

Answer:

A. Logs.

D. Security Information and Event Management (SIEM) system.

Explanation:

If a network security analyst received an alert about a potential malware threat on a user’s computer. In order to get a detailed information about this compromise, the analyst should review both the logs and Security Information and Event Management (SIEM) system.

In Computer science, logs can be defined as records of events triggered by a user, operating system and other software applications running on a computer. Log files are used to gather information stored on a computer such as user activities, system performance and software program.

Security Information and Event Management (SIEM) system is the process of gathering and integration of all the logs generated by a computer from various software application, service, process, or security tool.

These logs collected through the SIEM are shown in a format that is readable by the security analyst and this help in real-time detection of threats.

<em>Hence, logs and SIEM systems are important tools for network security analyst for detection of threats in real-time and event management functions.</em>

6 0
3 years ago
Which of these words is used to begin a conditional statement?<br> when<br> input<br> if<br> until
LiRa [457]

Answer:

'if'

Explanation:

The if word is used in an if-statement (a type of conditional statement) that allows the computer to do certain computations based on what the conditional statement evaluates to.

Hope this helps :)

5 0
3 years ago
What is the best option for sharing Word documents on a Microsoft network because it provides finer degrees of versioning contro
babymother [125]

Answer:

SharePoint Server

Explanation:

One drive you are not being provided with the opportunities like the versioning, check-outs and content approval. However, through SharePoint Server, you are being leveraged with all these features. Through versioning, you can update the document anytime, and also keep track of previous versions as well as the changes that you are making. Through content approval, you can ensure various members have approved permission privilege with them regarding the publication of the content.

Through checkout and check-ins the users can have control ob the new versions of the document as well as while the check-in the document, they can comment on the changes they have made.

6 0
3 years ago
Write a function that reads from a file the name and the weight of each person in pounds and calculates the equivalent weight in
spayn [35]

Answer:

#include <iostream>

#include <fstream>

#include <iomanip>

using namespace std;

int main(){

   string name;

   double weightKg, weightPd;

   cout<< fixed << setprecision(2);

   fstream myFile("filename.txt");

   while (getline( myFlie, name, weightPd)){

       weightKg = weight * 0.453592;

       cout<< name << weightPd <<weightKg;

   }

   myFile.close();

}

Explanation:

The C++ source code reads in the content of a file that has a name and weight value in pounds and outputs the name, weight in pounds and the weight in kilograms.

3 0
3 years ago
What is 11x12x12x14x15x16
ser-zykov [4K]

Answer:

11x12x12x14x15x16=5,322,240

Explanation:

11*12=132

12*14=168

15*16=240

132*168=22,176

240*22,176=5,322,240

Have a nice day! :)

4 0
2 years ago
Other questions:
  • _____ are special combinations of keys that tell a computer to perform a command.
    9·2 answers
  • What lets you do many things, like write book reports and stories?
    15·1 answer
  • . Write a short program that asks the user to input a string, and then outputs the
    15·1 answer
  • Which city is the largest within the Andean and midlatitude countries? A. Buenos Aires, Argentina B. La Paz, Bolivia C. Santiago
    11·2 answers
  • The ash and dust from a volcanic eruption can cause a ______ change in the environment.
    8·1 answer
  • Consider the following program where the zu format specifier is used to display as an integer the result of sizeof. #include #in
    11·1 answer
  • What keyboard functions lets you delete words
    9·2 answers
  • Determine what is printed by the following code.
    8·1 answer
  • Tips for staying safe using social media. Using in your own words.
    6·1 answer
  • Ajdbksjdnksnsd helppp​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!