Which of the following correctly identify National Institute of Standards and Technology (NIST) cloud computing deployment models? More than one answer may be correct.
Public cloud infrastructure is for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them.
Private cloud infrastructure is extended to a single organization with multiple consumers e.g., business units.
Community cloud infrastructure is a composition of two or more distinct cloud infrastructures that remain unique entities but are bound together by standardized or proprietary technology.

Answers

Answer 1

The public is free to use public cloud infrastructure. Private cloud infrastructure is made available to a single company . A combination of two or more distinct cloud infrastructures is called a community cloud infrastructure.

What is the NIST ?

Cloud computing is a model for making it possible to quickly provision and release a shared pool of configurable computing resources (such as networks, servers, storage, applications, and services)  from the service provider. This allows for ubiquitous, convenient, and on-demand network access. Four cloud deployment models are defined by NIST: private clouds, community clouds, hybrid clouds, and public clouds Where the infrastructure for the deployment is located and who controls that infrastructure define a cloud deployment model.

To learn more about NIST visit :

https://brainly.com/question/13507296

#SPJ1


Related Questions

True or False? A DoS attack targeting application resources typically aims to overload or crash its network handling software.

Answers

A class of cyberattacks that aim to make a service unavailable are known as "denial of service" or "DoS" assaults.

What type of threat is DoS?

The term "denial of service," or "DoS," refers to a class of cyberattacks whose main objective is to make a service unavailable. Since these are usually covered by the media, the DoS attacks that are most well-known are those that target popular websites.

An attempt to disable a computer system or network such that its intended users are unable to access it is known as a denial-of-service (DoS) attack. DoS attacks achieve this by providing information that causes a crash or by flooding the target with traffic.

Targets could be anything that uses a targeted network or computer, such as email, online banking, webpages, or any other service. Different DoS attacks exist, including resource exhaustion and flood attacks.

Therefore, the statement is false.

To learn more about  DoS attack refer to:

https://brainly.com/question/14390016

#SPJ4

What method of accessing a scaffold is unsafe and should never be used

Answers

Answer:

blocks, bricks, walk boards

Explanation:

Create a class RightTriangle which implements the API exactly as described in the following JavadocLinks to an external site..

Don't forget - you will need to use the Pythagorean theorem (Links to an external site.) to find the hypotenuse (and therefore the perimeter) of a right triangle. You can find the area of a right triangle by multiplying the base and height together, then dividing this product by 2.

Use the runner_RightTriangle file to test the methods in your class; do not add a main method to your RightTriangle class.

Hint 1 - Javadoc only shows public methods, variables and constructors. You will need to add some private member variables to your RightTriangle class to store the necessary information. Think carefully about what information actually needs to be stored and how this will need to be updated when methods change the state of a RightTriangle object.

Hint 2 - As in the previous lesson's exercise it's helpful to add your method/constructor headers and any dummy returns needed before implementing each one properly. This will allow you to test your code using the runner class as you go along.

This is the runner code:

import java.util.Scanner;

public class runner_RightTriangle{
public static void main(String[] args){
Scanner scan = new Scanner(System.in);
RightTriangle t = new RightTriangle();
String instruction = "";
while(!instruction.equals("q")){
System.out.println("Type the name of the method to test. Type c to construct a new triangle, q to quit.");
instruction = scan.nextLine();
if(instruction.equals("getArea")){
System.out.println(t.getArea());
}
else if(instruction.equals("getBase")){
System.out.println(t.getBase());
}
else if(instruction.equals("getHeight")){
System.out.println(t.getHeight());
}
else if(instruction.equals("getHypotenuse")){
System.out.println(t.getHypotenuse());
}

else if(instruction.equals("getPerimeter")){
System.out.println(t.getPerimeter());
}
else if(instruction.equals("toString")){
System.out.println(t);
}
else if(instruction.equals("setBase")){
System.out.println("Enter parameter value:");
double arg = scan.nextDouble();
t.setBase(arg);
scan.nextLine();
}
else if(instruction.equals("setHeight")){
System.out.println("Enter parameter value:");
double arg = scan.nextDouble();
t.setHeight(arg);
scan.nextLine();
}
else if(instruction.equals("equals")){
System.out.println("Enter base and height:");
double bs = scan.nextDouble();
double ht = scan.nextDouble();
RightTriangle tOther = new RightTriangle(bs, ht);
System.out.println(t.equals(tOther));
scan.nextLine();
}
else if(instruction.equals("c")){
System.out.println("Enter base and height:");
double bs = scan.nextDouble();
double ht = scan.nextDouble();
t = new RightTriangle(bs, ht);
scan.nextLine();
}
else if(!instruction.equals("q")){
System.out.println("Not recognized.");
}
}
}
}

My code so far:

class RightTriangle{
private double base;
private double height;
public RightTriangle(){
base = 1.0;
height = 1.0;
}
public RightTriangle(double ds, double ht){
base=ds;
height=ht;
}
public boolean equals​(RightTriangle other){
if(base==other.base && height==other.height ){
return true;
}
else
{
return false;
}
}
public double getArea()
{
return (base*height)/2;
}
public double getBase(){
return base;
}
public double getHeight()
{
return height;
}
public double getHypotenuse()
{
return Math.sqrt((base*base)+(height*height));
}
public double getPerimeter()
{
return base+height+Math.sqrt((base*base)+(height*height));
}
void setBase (double bs)
{
if(bs==0){
System.exit(0);
}
else{
base=bs;
}
}
public void setHeight(double ht){
if(ht==0){
System.exit(0);
}
height=ht;
}
public java.lang.String toString()
{
return "base: "+base+" hegiht: "+height+" hypothesis: "+ Math.sqrt((base*base)+(height*height));
}

}

MY CODE SAYS THAT THE setHeight and setBase and toString METHODS ARE INCORRECT.

Answers

Answer:

I don't see anything. Its blank

Explanation:

A partition is the _____.


an application that makes an operating system easier to use, also known as a shell

section of a hard drive

the core of an operating system that controls the basic functions

software that can be downloaded from the Internet at no cost

Answers

A partition is a section of a storage device

Write an assembly code to implement the y=(x1+x2)*(x3+x4) expression on 2-address machine, and then display the value of y on the screen. Assume that the values of the variables are known. Hence, do not worry about their values in your code.
The assembly instructions that are available in this machine are the following:
Load b, a Load the value of a to b
Add b, a Add the value of a to the value of b and place the result in b
Subt b, a Subtract the value of a from the value of b and place the result in b
Mult b, a Multiply the values found in a and b and place the result in b
Store b, a Store the value of a in b.
Output a Display the value of a on the screen
Halt Stop the program
Note that a or b could be either a register or a variable. Moreover, you can use the temporary registers R1 & R2 in your instructions to prevent changing the values of the variables (x1,x2,x3,x4) in the expression.
In accordance with programming language practice, computing the expression should not change the values of its operand.

Answers

mbly code to implement the y=(x1+x2)*(x3+x4) expression on 2-address machine, and then display the value of y on the screen. Assume that the values of the variables are known. Hence, do not worry about their values in your code.

The assembly instructions that are available in this machine are the following:

Load b, a Load the value of a to b

Add b, a Add the value of a to the value of b and pla

9. A change in the appearance of a value or label in a cell
a) Alteration
b) Format
c) Indentation
d) Design
10. The placement of information within a cell at the left edge, right ed
a) Indentation
b) Placement
c) Identification
d) Alignment
11. Spreadsheet can be best classified as
a) Word
b) Database
c) Excel
d) Outlook
12. Formulas in Excel start with​

Answers

Answer:

format

alignment

excel

=

Explanation: i'm an accountant

A change in the appearance of a value or label in a cell is format. The placement of information within a cell at the left edge, right edge is alignment, and spreadsheet can be best classified as Excel. The correct options are b, d, and c respectively.

What exactly does a spreadsheet mean?

A spreadsheet, also known as an electronic work sheet, is a computer program that organizes data into graph-like rows and columns. Formulas, commands, and formats can be used to manipulate each row and column.

Spreadsheets are most commonly used to store and organize data such as revenue, payroll, and accounting information. Spreadsheets allow the user to perform calculations on the data and generate graphs and charts.

Format is a change in the appearance of a value or label in a cell. The alignment of information within a cell at the left edge, the alignment of information within a cell at the right edge, as well as spreadsheets are usually best classified as Excel.

Thus, b, d, and c respectively are correct options.

For more details regarding spreadsheet, visit:

https://brainly.com/question/8284022

#SPJ6

Fill in the blank to complete the sentence.

In order to use the localtime() method, you need the following line in your program.

import ____.

Answers

To use the localtime() method, you need to import time.

In order to use the localtime() method, you need the following line in your program. The function will be import localtime().

What is Local time command in a program?

Localtime() method of Time module is generally used to convert a time which is expressed in seconds since the epoch to a time. The struct_time is an object in the local time. To convert the given time period in the seconds since the epoch to a time scale.

Local Time is an immutable date-time object which represents the time, it is often viewed as the hour-minute-second type of time format. Time is generally represented to as nanosecond precision. For example, the value "13:45.30. 123456789" can also be stored in a Local Time.

Learn more about Local time here:

https://brainly.com/question/27961003

#SPJ2

list the field in the tcp header that are missing from udp header

Answers

Answer:

Sequence number, acknowledgement number, data offset, res, flags, window size, checksum, urgent pointer, options.

Explanation:

Check out the picture for details. "Missing" is not really the right term, since UDP has a different purpose than TCP. TCP needs these headers to form a connection oriented protocol, whereas UDP is a fire-and-forget type of packet transfer.

list the field in the tcp header that are missing from udp header

Please send a response to this email! This is for an assignment on appropriately answering to negative feedback at work. "Your report on SHG is, frankly, substandard. We can’t send it out the door when it lacks last month’s sales figures, and it is even missing the data on user interactions. This is just not acceptable, and I don’t see how you can continue to work here if you can’t complete the simplest of your job duties."

Answers

Answer:

Explanation:

Receiving negative feedback about your work can be challenging, but it's important to approach it with professionalism and a willingness to improve. Here is a possible response to the feedback:

Thank you for bringing your concerns to my attention. I understand that the report I submitted on SHG was not up to the standards expected by the team, and I apologize for any inconvenience this may have caused. I appreciate your feedback and take full responsibility for the errors in the report.

I understand that the missing sales figures and user interaction data are critical components of the report, and I will work diligently to ensure that this information is included in any future reports. I am committed to improving my performance and ensuring that my work meets the expectations of the team.

Please let me know if there are any specific areas in which I need to improve or any additional resources that I can access to help me do my job better. I value your input and look forward to working with you to improve the quality of my work.

Thank you again for your feedback, and I am committed to doing my best to address any concerns you may have.

You want to allow users inside your organization to share your dashboard, and to edit your dashboard by adding tiles. How will you do this

Answers

To share your dashboard, one can click on Share your dashboard with internal users.

How do I share a dashboard with another user?

One can be able to share Dashboard data to people who are not able to access your Analytics account by clicking on the Share > Email option and then one can share it.

Conclusively, Note that one can still send the other teammate a customized email with an attached PDF file that depicts your Dashboard to them.

See options below

Select an answer:

Share your dashboard with internal users.

Publish the dashboard as a contact pack.

Publish the report on the web.

By creating a dashboard in a group.

Learn more about dashboard from

https://brainly.com/question/1147194

You need to connect the satellite television signal to your HD 4K flat screen TV using a coaxial cable. Which of the following is the BEST type of coaxial cable to use? F-typeRG-59BNCRG-6

Answers

The best type of coaxial cable to use for connecting the satellite television signal to an HD 4K flat screen TV is RG-6. RG-6 is a high-quality coaxial cable that is designed to handle high-frequency signals and is commonly used for cable and satellite television installations.

It is made of a thicker copper core and a higher quality insulation material, which results in a lower signal loss and better overall performance compared to other coaxial cables like RG-59 or BNC. RG-6 is also capable of delivering full-spectrum video, including HD and 4K, and has the bandwidth to handle multiple signals at the same time. In short, RG-6 is the most suitable cable for a high-quality satellite television connection to an HD 4K flat screen TV.

Learn more about signal: https://brainly.com/question/30365745

#SPJ4

Is there a point where preto distribution really takes over?

Answers

Answer:

Yes Preto distribution takes over when we apply 80/20 rule.

Explanation:

The Pareto distribution is derived from pareto principle which is based on 80/20 rule. This is main idea behind the Pareto distribution that  percent of wealth is owned by 20% of population. This 80/20 rule is gaining significance in business world. There it becomes easy to understand the input and output ratio. The input ratio helps to analyse the potential output using Pareto distribution.

a really excellent way of getting you started on setting up a workbook to perform a useful function.

Answers

Templates a really excellent way of getting you started on setting up a workbook to perform a useful function.

What is the workbook  about?

One excellent way to get started on setting up a workbook to perform a useful function is to begin by defining the problem you are trying to solve or the goal you want to achieve. This will help you determine the necessary inputs, outputs, and calculations required to accomplish your objective.

Once you have a clear understanding of your goal, you can start designing your workbook by creating a plan and organizing your data into logical categories.

Next, you can start building the necessary formulas and functions to perform the required calculations and operations. This might involve using built-in functions such as SUM, AVERAGE, or IF, or creating custom formulas to perform more complex calculations.

Read more about workbook here:

https://brainly.com/question/27960083

#SPJ1

Define a class StatePair with two template types (T1 and T2), a constructor, mutators, accessors, and a PrintInfo() method. Three vectors have been pre-filled with StatePair data in main():vector> zipCodeState: ZIP code - state abbreviation pairsvector> abbrevState: state abbreviation - state name pairsvector> statePopulation: state name - population pairsComplete main() to use an input ZIP code to retrieve the correct state abbreviation from the vector zipCodeState. Then use the state abbreviation to retrieve the state name from the vector abbrevState. Lastly, use the state name to retrieve the correct state name/population pair from the vector statePopulation and output the pair.Ex: If the input is:21044the output is:Maryland: 6079602

Answers

Answer:

Here.Hope this helps and do read carefully ,you need to make 1 .cpp file and 1 .h file

Explanation:

#include<iostream>

#include <fstream>

#include <vector>

#include <string>

#include "StatePair.h"

using namespace std;

int main() {

  ifstream inFS; // File input stream

  int zip;

  int population;

  string abbrev;

  string state;

  unsigned int i;

  // ZIP code - state abbrev. pairs

  vector<StatePair <int, string>> zipCodeState;

  // state abbrev. - state name pairs

  vector<StatePair<string, string>> abbrevState;

  // state name - population pairs

  vector<StatePair<string, int>> statePopulation;

  // Fill the three ArrayLists

  // Try to open zip_code_state.txt file

  inFS.open("zip_code_state.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file zip_code_state.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <int, string> temp;

      inFS >> zip;

      if (!inFS.fail()) {

          temp.SetKey(zip);

      }

      inFS >> abbrev;

      if (!inFS.fail()) {

          temp.SetValue(abbrev);

      }

      zipCodeState.push_back(temp);

  }

  inFS.close();

 

// Try to open abbreviation_state.txt file

  inFS.open("abbreviation_state.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file abbreviation_state.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <string, string> temp;

      inFS >> abbrev;

      if (!inFS.fail()) {

          temp.SetKey(abbrev);

      }

      getline(inFS, state); //flushes endline

      getline(inFS, state);

      state = state.substr(0, state.size()-1);

      if (!inFS.fail()) {

          temp.SetValue(state);

      }

     

      abbrevState.push_back(temp);

  }

  inFS.close();

 

  // Try to open state_population.txt file

  inFS.open("state_population.txt");

  if (!inFS.is_open()) {

      cout << "Could not open file state_population.txt." << endl;

      return 1; // 1 indicates error

  }

  while (!inFS.eof()) {

      StatePair <string, int> temp;

      getline(inFS, state);

      state = state.substr(0, state.size()-1);

      if (!inFS.fail()) {

          temp.SetKey(state);

      }

      inFS >> population;

      if (!inFS.fail()) {

          temp.SetValue(population);

      }

      getline(inFS, state); //flushes endline

      statePopulation.push_back(temp);

  }

  inFS.close();

 

  cin >> zip;

for (i = 0; i < zipCodeState.size(); ++i) {

      // TODO: Using ZIP code, find state abbreviation

  }

  for (i = 0; i < abbrevState.size(); ++i) {

      // TODO: Using state abbreviation, find state name

  }

  for (i = 0; i < statePopulation.size(); ++i) {

      // TODO: Using state name, find population. Print pair info.

  }

}

Statepair.h

#ifndef STATEPAIR

#define STATEPAIR

#include <iostream>

using namespace std;

template<typename T1, typename T2>

class StatePair {

private:

T1 key;

T2 value;

public:

// Define a constructor, mutators, and accessors

// for StatePair

StatePair() //default constructor

{}

// set the key

void SetKey(T1 key)

{

this->key = key;

}

// set the value

void SetValue(T2 value)

{

this->value = value;

}

// return key

T1 GetKey() { return key;}

 

// return value

T2 GetValue() { return value;}

// Define PrintInfo() method

// display key and value in the format key : value

void PrintInfo()

{

cout<<key<<" : "<<value<<endl;

}

};

#endif

In this exercise we have to use the knowledge in computational language in C++  to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

#include<iostream>

#include <fstream>

#include <vector>

#include <string>

#include "StatePair.h"

using namespace std;

int main() {

 ifstream inFS;

 int zip;

 int population;

 string abbrev;

 string state;

 unsigned int i;

 vector<StatePair <int, string>> zipCodeState;

 vector<StatePair<string, string>> abbrevState;

 vector<StatePair<string, int>> statePopulation;

 inFS.open("zip_code_state.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file zip_code_state.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <int, string> temp;

     inFS >> zip;

     if (!inFS.fail()) {

         temp.SetKey(zip);

     }

     inFS >> abbrev;

     if (!inFS.fail()) {

         temp.SetValue(abbrev);

     }

     zipCodeState.push_back(temp);

 }

 inFS.close();

 inFS.open("abbreviation_state.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file abbreviation_state.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <string, string> temp;

     inFS >> abbrev;

     if (!inFS.fail()) {

         temp.SetKey(abbrev);

     }

     getline(inFS, state);

     getline(inFS, state);

     state = state.substr(0, state.size()-1);

     if (!inFS.fail()) {

         temp.SetValue(state);

     }

     abbrevState.push_back(temp);

 }

 inFS.close();

 inFS.open("state_population.txt");

 if (!inFS.is_open()) {

     cout << "Could not open file state_population.txt." << endl;

     return 1;

 }

 while (!inFS.eof()) {

     StatePair <string, int> temp;

     getline(inFS, state);

     state = state.substr(0, state.size()-1);

     if (!inFS.fail()) {

         temp.SetKey(state);

     }

     inFS >> population;

     if (!inFS.fail()) {

         temp.SetValue(population);

     }

     getline(inFS, state);

     statePopulation.push_back(temp);

 }

 inFS.close();

 cin >> zip;

for (i = 0; i < zipCodeState.size(); ++i) {

  }

 for (i = 0; i < abbrevState.size(); ++i) {

  }

 for (i = 0; i < statePopulation.size(); ++i) {

 }

}

Statepair.h

#ifndef STATEPAIR

#define STATEPAIR

#include <iostream>

using namespace std;

template<typename T1, typename T2>

class StatePair {

private:

T1 key;

T2 value;

public:

StatePair()

{}

void SetKey(T1 key)

{

this->key = key;

}

void SetValue(T2 value)

{

this->value = value;

}

T1 GetKey() { return key;}

T2 GetValue() { return value;}

void PrintInfo()

{

cout<<key<<" : "<<value<<endl;

}

};

See more about C code at brainly.com/question/19705654

Define a class StatePair with two template types (T1 and T2), a constructor, mutators, accessors, and
Define a class StatePair with two template types (T1 and T2), a constructor, mutators, accessors, and

1 Refer to the plan below and write a Java program called PrintSum which outputs the sum of the (10 marks) ..umbers from 0 up to n, where n is input by the user: Plan Initialise total and counter to 0 Get n from the user
WHILE the counter is <=n
update the total
add 1 to counter print total

Answers

The java program that called "PrintSum" that follows the provided plan is given below.

What is the Java program?

import  java.util.Scanner  ;

public class PrintSum {

   public   static void main(String[] args){

       int   total =0;

       int counter = 0;

       Scanner   scanner = newScanner(System.in);

       System.out.print("Enter a   number (n):");

       int n = scanner.nextInt();

       while (counter <= n) {

           total += counter;

           counter++;

       }

       System.out.println("  The sum of numbers from 0 to " +n + " is: " + total);

   }

}

How does this work  ?

This program prompts the user to enter a number (n),then calculates the sum of numbers from 0 to n using  a while loop.

The total variable is updated in each   iteration of the loop,and the counter is incremented by 1. Finally, the program outputs the calculated sum.

Learn more about Java at:

https://brainly.com/question/26789430

#SPJ1

Which statement allows us to return values from functions?

Answers

Answer:

the return statement

Explanation:

The return statement

What are the two common places where files are saved?
O The Documents and The Hard Drive
O The Desktop and The Drawer
O The Desktop and the Documents folder
O The Files and The Desktop​

Answers

The files and the desktop

The back panel is the best place for which of the following?

Question 3 options:

charts appropriate for the brochure


main title and purpose of brochure


contact information and maps


touching story about cause

Answers

Answer:

Imma contact info and maps

Explanation:

It's the most reasonable

Answer:

contact information and maps

Can someone please help me answer these questions plz

Can someone please help me answer these questions plz

Answers

Explanation:

0001, 0010, 0101, 0110, 0111, 1000

true/false exogenous infection come from within your body ?

Answers

Answer:

False

Explanation:

Which are potential harmful effects of intellectual property rights? Select 2 options.
safe communication between businesses may be stifled
no two companies can create the same products
malware is easily added onto well-known apps by hackers
trademarks and patents may be over-enforced by companies
general patents can prevent innovative ones from being filed

Which are potential harmful effects of intellectual property rights? Select 2 options.safe communication

Answers

Potential harmful effects of intellectual property rights include stifling safe communication between businesses and over-enforcement of trademarks and patents by companies. Option A, D.

Stifling safe communication between businesses: Intellectual property rights can sometimes hinder collaboration and communication between businesses. Strict enforcement of intellectual property laws may discourage companies from sharing valuable information or technologies with each other due to fear of potential legal repercussions.

This can impede innovation and slow down the development of new products or services.

Over-enforcement of trademarks and patents: Companies may sometimes over-enforce their trademarks and patents, leading to negative consequences. Overly aggressive protection of intellectual property can stifle competition and limit consumer choices.

It may prevent other companies from developing similar or improved products, hindering market dynamics and potentially reducing innovation. This can create monopolistic practices and hinder fair competition.

It is important to note that intellectual property rights are crucial for promoting innovation, incentivizing creativity, and protecting the rights of creators and inventors.

They provide an incentive for individuals and businesses to invest in research and development by offering exclusive rights and economic benefits. However, excessive protection and misuse of intellectual property rights can have unintended negative effects.

Other potential harmful effects not mentioned in the options include the creation of patent thickets, where a large number of overlapping patents make it difficult for new innovations to emerge.

Additionally, intellectual property rights can contribute to increasing inequality by limiting access to essential goods, such as life-saving medications, in certain regions due to high costs or patent restrictions.

Balancing the protection of intellectual property with the need for innovation, fair competition, and access to knowledge is a complex task.

Striking the right balance requires thoughtful consideration of the societal impact and the promotion of policies that encourage both innovation and the sharing of knowledge. So Option A,D is correct.

For more question on communication visit:

https://brainly.com/question/28153246

#SPJ8

ndcdeviceid?????????????????????​

Answers

YESS

Explanation:

YESSssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss

Why is sequencing important?

A. It allows the programmer to test the code.
B. It allows the user to understand the code.
C. It ensures the program works correctly.
D. It makes sure the code is easy to understand.

Answers

Answer:

c i think but if not go with d

Answer:

C

Explanation:

It ensures the program works correctly

hope it helps!

1 #include 2 3 int max2(int x, int y) { 4 int result = y; 5 if (x > y) { 6 result = x; 7 } 8 return result; 9 } 10 11 int max3(int x, int y, int z) { 12 return max2(max2(x,y),z); 13 } 14 15 int main() { 16 int a = 5, b = 7, c = 3; 17 18 printf("%d\n",max3(a, b, c)); 19 20 printf("\n\n"); 21 return 0; 22 } What number is printed when the program is run?

Answers

Answer:

7

Explanation:

#include <stdio.h>

int max2(int x, int y) {

   int result = y;

   if (x > y) {

       result = x;

   }

   return result;

}

int max3(int x, int y, int z) {

   return max2(max2(x,y),z);

}

int main() {

   int a = 5, b = 7, c = 3;

   printf("%d",max3(a, b, c));

   printf("");

   return 0;

}

Hi, first of all, next time you post the question, it would be nice to copy and paste like above. This will help us to read the code easily. Thanks for your cooperation.

We start from the main function:

The variables are initialized → a = 5, b = 7, c = 3

max3 function is called with previous variables and the result is printed → printf("%d",max3(a, b, c));

We go to the max3 function:

It takes 3 integers as parameters and returns the result of → max2(max2(x,y),z)

Note that max2 function is called two times here (One call is in another call actually. That is why we need to first evaluate the inner one and use the result of that as first parameter for the outer call)

We go to the max2 function:

It takes 2 integers as parameters. If the first one is greater than the second one, it returns first one. Otherwise, it returns the second one.

First we deal with the inner call. max2(x,y) is max2(5,7) and the it returns 7.

Now, we need to take care the outer call max2(7, z) is max2(7, 3) and it returns 7 again.

Thus, the program prints 7.

You are an IT administrator for your company. you have been tasked with the assignment of installing 300 copies of Windows 10. You need to finish this task as quickly and efficiently as possible.
Which of the following booth methods would be the BEST methods for installing Windows under these circumstances?
PXE

Answers

Image Deployment is he best methods for installing Windows under these circumstances.

What is Window?
Window
is a software interface that allows users to interact with electronic devices, such as computers, phones, and tablets. It is a graphical user interface (GUI) that enables users to interact with the device by providing them with visual information, such as menus, buttons, icons, text, and images. Windows are used to open, close and organize applications, view and edit files, and access the internet. They provide an easy-to-use interface for users to interact with the device and navigate through its various applications and settings. Windows also allow users to customize their desktop, rearrange windows, and manage their files. Additionally, windows can be used to access system settings and programs, as well as download and install software applications.

To learn more about Window
https://brainly.com/question/28288938
#SPJ4

Which of the following do you do to select text?
a
press CTRL+T
b click and drag across the desired text
000
C right-click and drag across the desired text
d press CTRL+S

Answers

To select text, the following can be done: a. Press CTRL+T b. Click and drag across the desired text c. Right-click and drag across the desired text d. Press CTRL+S.

The correct answer to the given question are options a, b, c and d.

The above options can be used in selecting text. The most common methods used for selecting text include clicking and dragging, double-clicking, and triple-clicking.

To select text by clicking and dragging, click at the beginning of the text, and drag to the end of the text while holding down the left mouse button. This method is useful for selecting large blocks of text. Double-clicking on a word selects that word, and triple-clicking on a paragraph selects the entire paragraph.

Alternatively, to select a sentence, double-click on the sentence.

Similarly, to select a paragraph, triple-click the paragraph. To highlight text by dragging the mouse pointer over it, left-click and hold at the beginning of the selection, drag the pointer across the text while still holding down the left mouse button, and then release the button when the selection is complete. The cursor changes to a pointer when it is moved over text.

For more such questions on select text, click on:

https://brainly.com/question/26940131

#SPJ8

QUESTION 1 Choose a term from COLUMN B that matches a description in COLUMN A. Write only the letter (A-L) next to the question number (1.1-1.10) in the ANSWER BOOK. COLUMN A 1.1. Substances that provide nourishment to the body 1.2. How you think and feel about something 1.3. Helps to cope with the challenges of being a student Exercise relating to increasing your heart rate 1.5. Having traits or qualities traditionally associated with 1.4. men 1.6. Seeing, hearing, or sensing something that is not really there 1.7. 1.8. Leaving everything till the last minute Is Chapter 2 in the Constitution of SA 1.9. Group of people who share notes and information 1.10. Ability to exercise for extended period of time COLUMN B A hallucination B nutrients C study group D procrastinate E endurance F Bill of Rights G Cardio-vascular H masculine I attitude J resilience K strength L flexibility ​

Answers

Answer:

1.1 B nutrients 1.2 I attitude 1.3 J resilience 1.4 H masculine 1.5 L flexibility 1.6 A hallucination 1.7 D procrastinate 1.8 F Bill of Rights 1.9 C study group 1.10 E endurance

Explanation:

What statement best describes primary keys?

A. Primary keys cannot have duplicate values.

B. There can be two primary keys in a table.

C. Primary keys can be blank.

D. Primary keys are also known as foreign keys.

Answers

Answer:

B. There can be two primary keys in a table.


How does a fully integrated Data and Analytics Platform enable organizations to
convert data into consumable information and insight?

Answers

A  fully integrated Data and Analytics Platform enable organizations to  convert data into consumable information and insight by:

How does a fully integrated Data and Analytics Platform enable convert data?

This is done by putting together or  the archiving of all the captured data and also the act of getting them back if and when needed for business purpose.

Note that it is also done by making analytics reports and creating Machine Learning models to refine the data.

Learn more about Analytics Platform from

https://brainly.com/question/27379289

#SPJ1

why is it important to prepare the farm resources before you start working? explain​

Answers

The planning process helps to: Identify the goals of the farm business (what you want to accomplish); Identify the farm's inventory and resources (what you have to work with); Assess the farm business and the environment in which it operates (where you are and where you may want to go);

Other Questions
Perspective was first perfected and widely used by artists during the ________________.a.Twentieth Centuryc.Renaissanceb.Impressionist Periodd.Middle AgesPlease select the best answer from the choices providedABCD Select all the expreion that are irrational. A. 32 B. 2. 3 C. 27. 3 D. 57257 E. 632 Infer Xenon, a nonreactive gas used in strobe lights, is a poor conductor of heat and electricity. Would you expect xenon to be a metal, a nonmetal, or ametalloid? Where would you expect it to be on the periodic table? Explain. whats the hcf of 108 and 308 Which account of the balance of payment, will the following transactions be entered? what are the two kinds of hospital in the Philippines? Select all the ways 7/12, 1 whole, and 1 whole can be decomposed.A. 1 + 1 + 7/12B. 2 + 7/12C. 1 3/12 + 1 4/12 + 7/12D. 1 3/12 + 1 4/12E. 12/12 + 12/12 + 7/12F. 1 7/12 + 1 1/12PLEASE HELP I'LL MARK YOU BRAINLIEST 2020 was a year filled with problems being exposed, nationally and locally, to society as a whole. One of the major issues that is being taken into consideration is that of the role of police within society, including how to make new laws and policies within the justice system. Which type of movement, as mentioned within your text, would best fit this example?. answer for pregunta 4 how can a project manager better communicate goals and clarify those goals for a cross-functional team? formamide, hc(o)nh2, is prepared at high pressures from carbon monoxide and ammonia and serves as an industrial solvent. h-c-n-h (showing how atoms are bonded) ....|. | ...o h two resonance forms can be written for formamide which satisfy the octet rule (one with no formal charges and one with formal charges). write both resonance structures. for the resonance structure with no formal charges, what is the o-c-n bond angle ? Dan is going to rent a truck for one day. There are two companies he can choose from, and they have the following prices. Company A charges $88 and allows unlimited mileage. Company B has an initial fee of $55 and charges an additional $0.60 for every mile driven. For what mileages will Company A charge less than Company B? Use m for the number of miles driven, and solve your inequality for m. P, Q and R are points in the same horizontal plane. The bearing of Q from P is 60 and the bearing of R from Q is 060. If /PQ/=5m and /QR/=3m. Find the bearing of R from P, correct to the nearest degrees Three equal positive charges 'q' are at the corners of an equilateral triangle of side 'a'.a. Assuming that the three charges together create an electric field, find the location of a point other than the obvious one where the electric field is zero.b. What is the magnitude and direction of the electric field at the top corner due to the two charges at the base? In the article, Change Through Persuasion, Garvin and Roberto (2005) contend that to make change stick, leaders must conduct an effective persuasion campaign-one that begins weeks or months before the turn-around plan is set in concrete. From your personal experience (personal or professional) compare and contrast two examples where the persuasion was employed and one example where it was not. What the outcome? How was the change experienced by those involved? which biochemical test would be most appropriate for determining whether an organism uses oxidative or fermentative metabolism? A tiny pyramid whose faces are triangles is sliced off at each vertex of a large cube. How many vertices does the resulting polyhedron have? ZEK, and is the primary styl Snyder cursa singer, somety, USEU ESCORTSWE Cuts is incorporated in California and Zack is one of 4 shareholders. The other shareholders are his neighbor, Clark, his childhood pen pal Bruce, a US citizen living in England, as well as the state of Duane Snyder, a lifelong Californian who was the shop's founder and namesake. Zack earns $60,000 per year as manager and stylist. Clark is a newspaper reporter and earns $55,000. Duane Snyder's estate is worth approximately $65,000. Their Income/net worth corresponds to a 15% dividend tax rate, if applicable. Bruce is rich, but due to both clever accounting and his residency in England, he, like his fellow Snyder Cuts shareholders, pays US personal income taxes at a rate of 22% The barbershop is popular and usually records a sizable profit. The board of directors regularly declares and distributes dividends Is it more advantageous for the shareholders if Snyder Cuts is an S-Corp, a C-Corp or a close corporation? Why? a of Snyder Cuts issues only one class of stock it should form as a close corporation so that it can have take advantage of enhanced shareholder protection It does not matter whether Snyder Cuts is a C-Corp, S-Corp or close corp because it will still have to pay both state and federal taxes 1 Snyder Cuts is an independent entity, it should form as a C-Corp so it can take advantage of pass-thru entity taxation # all shareholders agree in writing. Snyder Cuts should form as an S-Corp so that it can avoid state level taxation Regardless of Bruce's residency, Snyder cuts should form as a C-Corp so it can be taxed like an ordinary corporation Snyder Cuts should form as an S-Corp because it can take advantage of the low corporate tax rate and low dividend tax rate. If Sryder Cuts issues only one class of stock, it should form as an S-Corp, so it can take advantage of pass-thru entity taxation Because Bruce is a non-resident, Snyder Cuts should form as a C-Corp so that the shareholders do not have to pay taxes on dividends How does the expression of Delta on the surface of a cell activate the expression of certain genes in the nucleus of its neighbor De cada parbola (y-2)^2=8 (x-3) HELP ASAP! WRITE ANSWERS FOR BOTH PLAN A AND B THEN COMPARE WHICH IS BETTER (LOOK AT IMAGE) 20 POINTS!!