q1. select the correct instruction for creating an array a of 20 elements of double. a) int a[n]; b) double a[20]; c) double 20[a]; d) double a[n];

Answers

Answer 1

The correct instruction for creating an array a of 20 elements of double is int a[n];.

What is an array?

An array is a group of related data elements kept in close proximity to one another in memory. The sole way to retrieve each data element directly is by using its index number, making it the most basic data structure.

There is no need to declare separate variables for each subject, for example, if we wish to keep a student's grades across five disciplines. Instead, we can create an array that will keep the data pieces in close proximity to one another in memory.

The high-precision floating-point data or numbers are stored using the C double data type (up to 15 to 17 digits). Large decimal number values are stored there. The amount of data that can be stored in values is double what can be stored in float data. It is called a double data type as a result.

Learn more about Array click here:

https://brainly.com/question/19634243

#SPJ4


Related Questions

there is a command that allows you to make sure that all text based passwords on a switch are encrypted? what is this command?

Answers

With enable secret command we can make sure that all text-based passwords are encrypted

How to control and enable secret commands?

When using the enable secret command, the password is encrypted but is still viewable on the terminal. Utilize the masked-secret global configuration command to mask the password on the terminal. This password's default encryption type is type 9.

Utilize the enable secret command to add a second level of security on top of the enable password. The enable secret command improves security by using a nonreversible cryptographic function to store the enable secret password.

Hence we can conclude enable secret command can make sure that all text-based passwords are encrypted

To know more on encrypted passwords follow this link

https://brainly.com/question/20709892

#SPJ4

you are the administrator for a printing company. after you configure the password must meet complexity requirements policy, several users have problems when changing their passwords. which of the following passwords meet the minimum complexity requirements?

Answers

The passwords that meet the minimum complexity requirements criteria will be Abcde! and 1247445Np.

Since the password Abcde! it is at least six characters long as well as it contains a capital letter, a lowercase letter, as well as a symbol, this password is Abcde! satisfies the complexity criteria. Because it is at least six characters long and contains a capital letter, a lowercase letter, and numerals, the password 1247445Np satisfies the complexity criteria. Highly secure should have three of the four character types—uppercase characters, lowercase letters, digits, and symbols with also the inclusion of at least six characters in length.

Your question is incomplete, most probably the full question was:

You are the administrator of a printing company. After you configure the Password Must Meet Complexity Requirements policy, several users have problems when changing their passwords. Which of the following passwords meets the minimum complexity requirements? (Choose all that apply.)

aBc-1

Abcde!

1247445Np

Learn more about password complexity requirements here: https://brainly.com/question/29354399

#SPJ4

A menu might appear if a level is completed, if the user unlocks a special feature, or if the game is over. At what other time of the game is a menu usually presented? A. random times B. the middle C. the beginning D. the three-quarter point

Answers

A menu might appear if a level is completed, if the user unlocks a special feature, or if the game is over. The other time of the game is a menu, usually presented at the beginning. The correct option is C.

What is a menu?

Not offering too many options to your customers is another aspect of manageability. People who have too many options may become confused or, worse still may unconsciously become stressed.

In games, the menu is the display that tells about all the features of the  games.

Therefore, the correct option is C. at the beginning.

To learn more about the menu, refer to the link:

https://brainly.com/question/20370065

#SPJ1

One of the big components of UI design concerns where items are positioned on the screen. What is the term for this positioning?

A.
menu

B.
scale

C.
strategy

D.
layout

Answers

One of the big components of UI design concerns where items are positioned on the screen. The term for this positioning is "layout" (Option D)

What is UI Design?

User interface design, also known as user interface engineering, is the process of creating user interfaces for equipment and software such as laptops, household appliances, mobile devices, and other electronic devices with the goal of increasing usability and user experience.

Responsibilities of a UI/UX Designer include:

In coordination with product managers and engineers, gather and evaluate user needs. Using storyboards, process flows, and sitemaps to illustrate design concepts. Creating visual user interface components like menus, tabs, and widgets.

Learn more about UI Design:

https://brainly.com/question/15420719
#SPJ1

program specifications write a program to play an automated game of rock, paper, scissors. two players make one of three hand signals at the same time. hand signals represent a rock, a piece of paper, or a pair of scissors. each combination results in a win for one of the players. rock crushes scissors, paper covers rock, and scissors cut paper. a tie occurs if both players make the same signal. use a random number generator of 0, 1, or 2 to represent the three signals. note: this program is designed for incremental development. complete each step and submit for grading before starting the next step. only a portion of tests pass after each step but confirm progress. step 0. read starter template and do not change the provided code. integer constants are defined for rock, paper, and scissors. a random object is created and a seed is read from input and passed to the random object. this supports automated testing and creates predictable results that would otherwise be random. step 1 (2 pts). read two player names from input (string). read number of rounds from input. continue reading number of rounds if value is below one and provide an error message. output player names and number of rounds. submit for grading to confirm 2 tests pass. ex: if input is:

Answers

python RockPaperScissor.py

82

Anna

Bert

3

Anna vs Bert for 3 rounds

Bert wins with paper!

What does Python Programming means?

Python is a popular computer programming language used to create software and websites, automate processes, and analyze data. Python is a general-purpose language, which means it may be used to make many various types of applications and isn't tailored for any particular issues.

Code for the given problem:

import random

user_action = input("Enter a choice (rock, paper, scissors): ")

possible_actions = ["rock", "paper", "scissors"]

computer_action = random.choice(possible_actions)

print(f"\nYou chose {user_action}, computer chose {computer_action}.\n")

if user_action == computer_action:

   print(f"Both players selected {user_action}. It's a tie!")

elif user_action == "rock":

   if computer_action == "scissors":

       print("Rock smashes scissors! You win!")

   else:

       print("Paper covers rock! You lose.")

elif user_action == "paper":

   if computer_action == "rock":

       print("Paper covers rock! You win!")

   else:

       print("Scissors cuts paper! You lose.")

elif user_action == "scissors":

   if computer_action == "paper":

       print("Scissors cuts paper! You win!")

   else:

       print("Rock smashes scissors! You lose.")

Output:

Enter a choice (rock, paper, scissors): paper

You chose paper, computer chose rock.

Paper covers rock! You win!

Learn more about Python Programming click here:

https://brainly.com/question/28248633

#SPJ4

Eric is working on its website which sells products from his farm. He is thinking of different ways to improve his website so that it appears on more search engine results and gets more traffic. Which of these ideas will help improve his search visibility?.

Answers

He should open a page with his business advertising it

backlinks that are considered pure endorsements that will improve a webpage's ranking on any search engine is a(n) link.

Answers

Backlinks that are considered pure endorsements that will improve a webpage's ranking on any search engine is an editorial links. The correct option is a.

What is backlinks?

An anchor text link from one website to another is referred to as a backlink. Any article you come across with a link to another source or website is an example of a backlink.

Examples of website backlinks can be found all over the internet, particularly on well-known blog sites that link to pertinent content. A webpage is a page that is online, created with codes in a computer.

Therefore, the correct option is a. editorial.

To learn more about backlinks, refer to the link:

https://brainly.com/question/28390891

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. editorial

b. manual

c. neighborhood

d. manufactured

what would you enter at the command prompt to change the group ownership for the devstyle.txt file to rand in the present working directory?

Answers

Note that what you should enter at the command prompt to change the group ownership for the devstyle.txt file to rand in the present working directory is: chgrp rand devstyle.txt

What is Command Prompt?

Command Prompt, often known as cmddotexe or cmd, is the operating system's primary command-line interpreter for OS/2, eComStation, ArcaOS, Microsoft Windows, and ReactOS. It is known as the Command Processor Shell in Windows CE.NET 4.2, Windows CE 5.0, and Windows Embedded CE 6.0.

To launch Command Prompt in Windows, type cmd.

Search for "Command Prompt" under the Start menu. You may alternatively open the command prompt by hitting Ctrl + r on your keyboard, typing "cmd," and then clicking OK.

Learn more about the directory:
https://brainly.com/question/17407323
#SPJ1

the component that usually appears in a group to allow the user to select one of several options and can be either selected or deselected is

Answers

A checkbox is typically used in a group of options to allow the user to select one or more of those options. The checkbox can be selected or deselected, and usually appears as a small square box.

What is a checkbox?

A checkbox is a type of input element that can be either selected or deselected. Checkboxes are typically used in groups of options, where the user can select one or more of those options. The checkbox appears as a small square box, and is usually accompanied by a label describing the option that it represents. When the checkbox is selected, a checkmark is displayed inside the box, indicating that the option is selected. Checkboxes can be used to allow the user to select multiple options, or to select a single option from a group of options.

Learn more about Questions: https://brainly.com/question/25257437

#SPJ4

r packages include sample datasets. they also include reusable r functions and documentation about how to use the functions. True or False

Answers

r packages include sample datasets. they also include reusable r functions and documentation about how to use the functions.

The above statement is True.

What are R packages?

The statistical programming language R has extensions known as R packages. Users of R can install R packages by accessing a centralized software repository like CRAN, which often contains code, data, and documentation in a common collection format.

The "library" directory is where R packages are kept in the R environment. During installation, R automatically install a number of packages. Later, when additional packages are required for a particular task, they are added.

To learn more about R packages, use the link given
https://brainly.com/question/26125959
#SPJ4

Which consequences can victims of identity theft face? Check all that apply.
difficulty getting a loan or credit card
an increase in debt
O the loss of a job
difficulty keeping assets
O a loss of money
difficulty landing a new job

Answers

Identity theft victims may experience difficulties getting a loan or credit card, an increase in debt, problems keeping possessions, and a loss of money.

Identity theft can affect anyone, regardless of age or social standing, but it tends to target young people and the elderly.

As criminals steal people's identities in order to gain financial advantages, this crime can result in a variety of financial and psychological issues and make it difficult to conduct business in a number of fields.

It is crucial to contact the appropriate agencies and businesses as soon as you discover unlawful financial activity in your records in order to pursue the quickest resolution possible.

The following are the appropriate options:

acquiring a loan or credit card is difficult.the accumulation of debtdifficulties maintaining assetsan economic loss.

Learn more about identity theft here:

https://brainly.com/question/1531239

#SPJ1

What do HTML documents consist of? Three things

Answers

Answer:

Explanation:

An HTML 4 document is composed of three parts: a line containing HTML version information, a declarative header section (delimited by the HEAD element), a body, which contains the document's actual content

6. create a new query in query design view using the properties and stateabbreviations tables. join the properties and stateabbreviations tables using the state field from

Answers

the properties and stateabbreviations tables using the state field we have to create a database.

What is Database?

A database is a set of data that has been arranged for easy access and management.

To make it simpler to access important information, you can organize data into tables, rows, and columns and index it.

Database administrators build a database such that all users can access the data through a single set of tools.

By storing, retrieving, and managing data, the database's primary function is to manage a significant volume of information.

These days, the World Wide Web has a large number of dynamic websites that use databases to manage their content. As an illustration, consider a hotel room availability checking model. It serves as an illustration of a dynamic website utilizing a database.

Numerous databases, including MySQL, Sybase, Oracle, MongoDB, Informix, PostgreSQL, and SQL Server, are available.

The database management system oversees contemporary databases (DBMS).

A database's data is manipulated using SQL, or Structured Query Language. Relational algebra and tuple relational calculus are prerequisites for SQL.

The representation of a database is displayed on a cylinder.

To create a database we should follow these steps:

1. Click Create

2. Click the Query Design Button

3. Click add in the Show Table box

4. Click Close

5. Drag the ClientName field from the Clients field list to the first column of the query grid.

6. Drag the City field to the second column of the query grid.

7. Drag the State field to the third column.

8. On the top tab, click Run (!)

9. Click SAVE

10. Type ClientLocations in the text box.

11. Click OK.

To learn more about database click here:

https://brainly.com/question/24027204

#SPJ4

which of the following groups hold all the computers that have not been assigned to a wsus custom group?

Answers

Unassigned Computers. One of two techniques, client-side targeting or server-side targeting, can be used to assign computers to computer groups.

How can I add a device to WSUS?To start, select Computers from the WSUS Administration Console. Select the computer group you want to add to the wsus group by clicking it. The computer or computers that you want to add to the wsus group can be found in the list of computers. Change Membership by selecting it with your right mouse button.One of two techniques, client-side targeting or server-side targeting, can be used to assign computers to computer groups.System administrators utilize WSUS, a straightforward program installed on Microsoft Windows Server, to manage Microsoft Windows updates. Windows Server 2008 R2, 2012, 2012 R2, 2016, 2019, and Server 2022 all support it. Windows 8.1, 10 and 11 are only a few of the Microsoft client OSes that are compatible with WSUS.  

To learn more about WSUS refer to:

https://brainly.com/question/28238579

#SPJ4

a barcode is valid if the digits satisfy a certain constraint. for example, take the 13-digit barcode 1877455846014 and split the first 12 digits into two groups: (1,7,4,5,4,0) and (8,7,5,8,6,1). the first group contains every other digit starting with the first, and the second group contains every other digit starting with the second. take the sum of the digits in the second group, and multiply it by 3. add to that the sum of the digits in the first group. subtract the last digit of that number from 10, and it should match the last digit of the barcode.

Answers

Using knowledge of computational language in python to write a code that valid if the digits satisfy a certain constraint.

Writting the code:

   first_group = 0

   # set sum of second group to 0

   second_group = 0

   # loop the string and find the sum of first group

   for i in range(0, len(str1)-1, 2):

       first_group = first_group + int(str1[i])

   # loop the string and find the sum of second group

   for i in range(1, len(str1)-1, 2):

       second_group = second_group + int(str1[i])

   # multiply second group by 3

   second_group = second_group * 3

   # add first group and second group

   new_num = first_group + second_group

   # get the last digit and subtract from 10

   last_digit = 10 - (new_num % 10)

   # if it is equal to last digit of input barcode, then it is valid otherwise it is invalid.

   if (last_digit == int(str1[-1])):

       return True

   else:

       return False

if __name__ == '__main__':

   # take file name as input

   filename = input("Enter the name of the file: ")

   # set an empty list to store valid barcode list

   valid_barcode_list = []

   # open the file

   with open(filename) as data:

       # read all barcodes and store in a list

       all_barcode = data.readlines()

       # loop through all barcode of the list

       for code in all_barcode:

           # remove any extra characters

           code = code.strip()

 

See more about python at brainly.com/question/18502436

#SPJ1

Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data backups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will automatically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, and BackBlaze, and others you might find in your research. What the best service for him?

Answers

Given that Heinrich is a college student, he should consider iDrive for his cloud storage requirement/needs. This is because iDrive offers the cheapest plan per 100 gigabytes per annum. iDrive is also reputed to be one of the best cloud backup services. Hence there is a balance of costs and benefits.

What is an online backup service?

A remote, online, or managed backup service, often known as cloud backup or backup-as-a-service, is a service that offers consumers a method for backing up, storing, and recovering computer information. Companies that provide this sort of service to end consumers are known as online backup providers.

It should be noted that cloud backup is a service that backs up and stores data and apps on a business's servers on a distant server. Businesses use cloud backup to preserve files and data accessible in the case of a system failure, outage, or natural catastrophe.

Learn more about backup services;
https://brainly.com/question/28269783
#SPJ1

as you browse the internet, you notice that when you go to some sites, multiple additional windows are opened automatically. many of these windows contain advertisements for products that are inappropriate for your family to view. which tool can you implement to prevent these windows from showing?

Answers

AS you browse the internet, you notice that when you go to some sites, the tool that can you implement to prevent these windows from showing is called Pop-up blocker.

What does a pop Blocker do?

Any program that occasionally forbids a pop-up is referred to as a pop-up blocker. This could take the form of several online windows or real pop-ups brought on by coding on a website. Pop-up blockers are typically installed to prevent pop-up advertisements from websites.

Any program that occasionally forbids a pop-up is referred to as a pop-up blocker. This could take the form of several online windows or real pop-ups brought on by coding on a website. Pop-up blockers are typically installed to prevent pop-up advertisements from websites.

Therefore, Most people would prefer not to see pop-ups because they are typically ads and may contain malware. In order to prevent seeing these pop-ups, you should typically keep your browser's pop-up blocker turned on.

Learn more about Pop-up blocker from

https://brainly.com/question/14855239
#SPJ1

write a class named employee that holds the following data about an employee in attrib-utes: name, id number, department, and job title. once you have written the class, write a program that creates three employee objects to hold the following data

Answers

Writing the class called employees:

name: susan meyerid number: 47899department: accountingjob title: vice president

name: mark jonesid number: 39119department: itjob title: programmer

name: joy Rogersid number: 81774department: manufacturingjob title: engineer

class Employee:

   def __init__(self, name, id_number, department, job_title):

       self. name = name

       self. id_number = id_number

       self. department = department

       self. job_title = job_title

susan = Employee("Susan Meyer", 47899, "Accounting", "Vice President")

mark = Employee("Mark Jones", 39119, "IT", "Programmer")

joy = Employee("Joy Rogers", 81774, "Manufacturing", "Engineer")

Code Explanation:

class Employee:

defines the Employee class

def __init__(self, name, id_number, department, job_title):

is the constructor for the Employee class. It takes four parameters: name, id_number, department, and job_title.

self. name = name

self. id_number = id_number

self. department = department

self. job_title = job_title

susan = Employee("Susan Meyer", 47899, "Accounting", "Vice President")

creates an Employee object named susan and initializes the object with the name "Susan Meyer", id number 47899, department "Accounting", and job title "Vice President"

mark = Employee("Mark Jones", 39119, "IT", "Programmer")

creates an Employee object named mark and initializes the object with the name "Mark Jones", id number 39119, department "IT", and job title "Programmer"

joy = Employee("Joy Rogers", 81774, "Manufacturing", "Engineer")

creates an Employee object named joy and initializes the object with the name "Joy Rogers", id number 81774, department "Manufacturing", and job title "Engineer"

Learn more about programming :

https://brainly.com/question/16397886

#SPJ4

Now test yourself
1 The price of desktop computers is expected to rise. Draw two demand and supply diagrams to show
two ways in which this could occur and the resulting effects on price and quantity.

Answers

a. When the equilibrium quantity falls(uploaded in picture ):

b. The equilibrium price falls in each diagram(uploaded in picture b).

What is Equilibrium?

A situation where opposing forces or actions are evenly distributed and neither is stronger than the other. Both the supply and the demand were equal.

When the size of the decrease in demand is greater than the increase in supply, the quantity decreases.

According to the Graph (a), the leftward shift in the demand curve—caused by a greater demand for new chips—is greater than the forward shift in the supply curve. As a result, the amount decreases.

When the size of the demand decline is smaller than the supply growth, the quantity increases.According to the Graph (b), there is a greater forward shift in the supply curve than a greater backward shift in the demand curve, which causes the equilibrium quantity to increase.

Given that there is a rise in supply and a decline in demand, the price will decrease in both scenarios. The degree of change in supply and demand determines the change in quantity.

Learn more about Demand and Supply click here:

https://brainly.com/question/4804206

#SPJ1

The frequency at which a CPU operates, which determines how many instructions it can execute per second.​ What is it?

Answers

The number of cycles per second that a CPU can process is represented by its clock speed.

What does the frequency of a CPU determine?The speed and efficiency with which applications load and function greatly depend on the performance of your CPU, the "brain" of your computer. The performance of a CPU may be measured in a number different ways, though. The importance of clock speed, often known as "clock rate" or "frequency," cannot be overstated.If you're unsure how to verify your clock speed, just select "System Information" from the Start menu (or the Windows* key) and click. Under "Processor," information about your CPU's model and clock rate will be shown.In general, a faster CPU has a higher clock speed. However, there are a lot of other variables at play.Every second, your CPU executes several instructions (low-level operations like arithmetic) from various programs. Your CPU's clock speed, expressed in GHz, tracks how many cycles it completes per second (gigahertz).

Learn more about Clock speed refer to :

https://brainly.com/question/28902482

#SPJ9

The style of text used in word document is called
A. font
B. font size
C. font style
D. font size and style​

Answers

Answer:

OPTION C) FONT STYLE

Explanation:

IS THE CORRECT OPTION

Answer:

option c )) font style

Explanation:

hope it helps you

he is collecting system data for an upcoming internal system audit. he is currently performing vulnerability testing to determine what weaknesses may exist in the network's security. what form of assessment is he conducting?

Answers

Security testing is form of assessment is he conducting.

What is internal system audit?

An organization's internal controls, including its corporate governance and accounting procedures, are assessed via internal audits. These audits help to maintain accurate and timely financial reporting and data collecting while ensuring compliance with laws and regulations.

What is vulnerability testing?

An information system's security flaws are systematically examined during a vulnerability assessment. It determines whether the system is vulnerable to any known flaws, rates their seriousness, and, as necessary, makes remedy or mitigation recommendations.

Software testing with a security focus identifies risks, dangers, and weaknesses in software applications and guards against nefarious intrusions. The goal of security tests is to find any flaws or vulnerabilities in the software system that could allow workers or outsiders to steal information, money, or reputation from the organization.

The fundamental objective of security testing is to determine the system's risks and assess any potential vulnerabilities, so that threats can be encountered and the system can continue to operate without being compromised. Additionally, it aids in identifying any security vulnerabilities that might be present in the system and enables programmers to solve issues.

Learn more about security testing click here:

https://brainly.com/question/26701098

#SPJ4

design a program using flowgorithm or any flowcharting software that asks the user to enter a store's sales for each day of the week. the amounts should be stored in an array. use a loop to calculate the total sales for the week and display the result.

Answers

Flowcharts are diagrams that describe workflows, steps, or certain processes using symbols and arrows.

Flowchart Explanation

Flowgorithm is a software that can be used to learn computer programming logic. Easy and free use makes this application widely used to study computer algorithms. The following are some tutorials on using flowgorithm that can help you understand computer programming logic.

Learn more about Flowcharts:

brainly.com/question/24735155

#SPJ4

a video-streaming web site keeps count of the number of times each video has been played since it was first added to the site. the count is updated each time a video is played and is displayed next to each video to show its popularity. at one time, the count for the most popular video was about two million. sometime later, the same video displayed a seven-digit negative number as its count, while the counts for the other videos displayed correctly. which of the following is the most likely explanation for the error? responses the count for the video became larger than the maximum value allowed by the data type used to store the count. the count for the video became larger than the maximum value allowed by the data type used to store the count. the mathematical operations used to calculate the count caused a rounding error to occur. the mathematical operations used to calculate the count caused a rounding error to occur. the software used to update the count failed when too many videos were played simultaneously by too many users. the software used to update the count failed when too many videos were played simultaneously by too many users. the software used to update the count contained a sampling error when using digital data to approximate the ana

Answers

The statement which is most likely the reason for the given error is

The software used to update the count contained a sampling error when using digital data to approximate the analog count.

What is a software error?

Any kind of difference or discrepancy between the output of a software product's actual usage and its desired or expected output is referred to as a software error in the field of software engineering. A software error is one that permits program execution to finish and provides outputs that may be inaccurate but are difficult to identify as such. Typically, a developer introduces these error unknowingly and unfavorably into the software product.

A computer program or system that produces an inaccurate or unexpected output, behaves in an unexpected manner, or has another error, flaw, failure, or fault is said to have a software bug.

To learn more about software error, use the link given
https://brainly.com/question/24254789
#SPJ1

What is true about the location of the center of mass of a binary star system that consists of two stars with different masses?.

Answers

The center of mass is located closer to the higher mass star.

Moreover, In a binary system, each star moves on an elliptical path. The COM sits at the focus for both ellipses. By symmetry the centripetal force on the other star will be the same. That there is no body at the center of rotation of the system doesn't matter. It's still the center of mass of the system, and the two stars are orbiting it.

You can learn more about this at:

https://brainly.com/question/3662477#SPJ4

What are the benefits of using a programming language to work with your data? Select all that apply.
1. Easily reproduce and share your work
2. Choose a business task for analysis
3. Save time
4. Clarify the steps of your analysis

Answers

The benefits of using a programming language to work with your data are:

1. Easily reproduce and share your work.

4. Clarify the steps of your analysis.

What is a programming language?

A method of notation for creating computer programs is known as a programming language. The majority of formal programming languages are text-based, though they can also be graphical. They are a sort of programming language.

The different programming languages are java, python, etc.

Therefore, the correct options are 1. Easily reproduce and share your work and 4. Clarify the steps of your analysis.

To learn more about the programming language, refer to the link:

https://brainly.com/question/23959041

#SPJ1

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
a. creating a strong password to access the router
b. turning off remote management to the device
c. naming your router something you’ll remember, like your street address
d. utilizing guest access when needed and turning it off when guests leave

Answers

Answer:

Explanation:a

You can configure your wireless router to protect your devices in all of the following ways EXCEPT creating a strong password to access the router. Thus, option A is correct.

 

What is a router?

One or more bandwidth circuits or subdomains can be connected using a router. By sending datagrams to their correct IP addresses, it manages traffic across various domains and permits several devices to have a Broadband connection.

The router can not be secured with a strong password that is to be made by the people. All of the methods listed below, WITH THE EXCEPTION of setting a secure login and password to the router, can be used to set up your new network to safeguard your devices. This was termed as one of the disadvantages of the router.

Therefore, option A is the correct option.

Learn more about router, here:

https://brainly.com/question/15851772

#SPJ2

Suppose we’ve written a function drawcircle that we want to call every time the mouse is clicked. How can we do this?.

Answers

The way to to call every time the mouse is clicked use mouseClickMethod(drawCircle);

What is function click method?

Definition and Use. The Click event is fired when an item is clicked. The click() method either dispatches a click event or attaches a function to be executed when a click event occurs. click() is a convenience mouse event listener that allows you to pass in an arbitrary function or callback to be executed when a click is detected. Please take the time to review the general events. Mouse and keyboard events are the most common, but you'll find that there are other common categories as well.

Learn more about function of programming: https://brainly.com/question/23275071

#SPJ4

a class c address has been assigned for use in the network shown in the graphic. using vlsm, which bit mask should be used to provide for the number of host addresses required on router a, while wasting the fewest addresses?

Answers

/27 bit mask should be used to provide for the number of host addresses required on Router A, while wasting the fewest addresses.

What is Bit mask?

To access specific bits within a data byte, bit masks are used. When sending a byte of data serially out of a single pin, for instance, this is frequently helpful as an iteration technique.

What is Iteration technique?

Iterative methods typically involve mathematical simulations that produce a number of preliminary answers to the optimization problem under study. A computer runs the simulations up until the set requirements are met (Bhandari et al., 2015).

Subnetting is necessary numerous times in VLSM because subnets use block sizes based on requirements. Let's say there is a manager who is responsible for four departments. These include the 120 computers in the sales and purchasing department, the 50 computers in the development department, the 26 computers in the accounts department, and the 5 computers in the management department.

Learn more about VLSM click here:

https://brainly.com/question/14635994

#SPJ4

katie is giving her team a tour of an offset print shop. she uses this as an opportunity to discuss a number of complex topics about printing and setting up indesign documents to separate and print correctly. as a final lesson to her team, katie shows them a job that has already been preflighted and is now getting ready to be sent to the printer. now it just needs to be .

Answers

Katie says she placed her number in the slug area and used the registration swatch as a fill color. The correct option is D.

Who is a designer?

A designer is a person who designs things and places. They are a very innovative person, and they always use many things which seems to waste into useful things and unique things.

The output portion alludes to the printing itself, hence this printer possesses these two characteristics. Because you cannot touch an operating system, it cannot be an operating system, and because you cannot put anything in a printer, it cannot be a data storage device.

Therefore, the correct option is D. Slug/Registration.

To learn more about designers, refer to the link:

https://brainly.com/question/14035075

#SPJ1

The question is incomplete. Your most probably complete question is given below:

Katie tells her designers that her personal phone number is in the layout so that the printer can call her if there is a problem. Katie says she placed her number in the _____ area and used the _____ swatch as a fill color.

A. Bleed/Four-color tint

B. Pasteboard/Magenta

C. Footer/Black

D. Slug/Registration

Other Questions
Which of the following is NOT a reason the colonists fought the British? Everyone answering this incorrectly. Taxation without representationBecause the British army stayed in their housesBecause they did not have self-governmentThe lack of resources in the colonies Given: x-5> -10.Choose the solution set. Deferment and forbearance are options for postponing your federal loan payments. Who should you contact to apply for either one?. which exeception to the ucc statute of frauds should marko assert in a case against josip for breach of contract? What does the code of ethics say about dual relationships? Consider the following system at equilibrium where , and , at 1150 k: when 0.23 moles of o 2 are added to the equilibrium system at constant temperature: the value of increases decreases remains the same the value of is greater than is equal to is less than the reaction must run in the forward direction to reestablish equilibrium run in the reverse direction to reestablish equilibrium remain in the current position, since it is already at equilibrium the concentration of will increase decrease remain the same at the start of your shift how would you check to see where you're working and who your back up is you are going to develop an r-chart based on range statistics, and you are using a sample size of 15 for your charting purposes. which of the following is the upper control limit d4 factor for the chart? How does the probability of an earthquake occurring evolve with time, in between two different earthquakes?. Griffin wants to go hiking, but the weather is not cooperating. Right now, there is 2 inches of snow on the ground and snow is falling at a rate of 0.25 in/hr. (a) Write the linear equation that represents the represents the total amount of snow, y, after x amount of hours. (b) How much snow will be on the ground after 4 hours? You must use your equation above to solve, and you must show all of your work. (c) If Griffin does not want to be hiking when there is 6 inches of snow on the ground, how long does he have to complete his hike? Do you think he will finish his hike in time? You must use your equation above to solve, and you must show all of your work. paradoxical leadership accounts for the complex environments that leaders face by proposing leaders take on paradoxical qualities such as (though not limited to) . A train is approaching a station at a velocity of 40 m/s. The train brakes andwithin 10 seconds comes to a stop. What is the train's acceleration? An elected officials constituents are Whales and elephants have many more cells than humans, yet get much much less cancer than we do. What is one reason this happens?. What does John Locke view on Human RIGHTS !! please help out ASAP !!! florida broker devon has chosen to deposit the escrow funds he receives to a title company. after recieving funds from his clients, the hamptons, and depositing the funds with the title company, he must be sure to provide all of the following to the seller's broker except which one? 6. If only about one-third of registered voters state that they areRepublicans when they register to vote, how can a Republicancandidate win an election by getting, for example, 51% of the votes In what ways do Congress and the executive have the ability to check the other in the field of conducting war? prepare the journal entry to record double declining balance depreciation expense for the forklify for year 2 dumping _________. group of answer choices is an unfair form of competition can result in an import surge supports free markets all are true. only a and b are true.