Which statement is written correctly?
Space avatar

Answers

Answer 1
Answer:

Answer:

B.

Explanation:

In Javascript, the if should have a condition attached to it with parenthesis and curly braces.


Related Questions

Given the IPv4 address, 200.245.10.150/28, how many subnets are possible and how many hosts can be supported by each subnet?a. 228 = 268 subnets, 24 -2 = 14 hosts per subnetwork b. 24 = 16 subnets, 228 - 2 = 268E6 hosts per subnetwork c. 24 - 2 = 14 subnets, 24 = 16 hosts per subnetwork d. 24 = 16 subnets, 24 - 2 = 14 hosts per subnetwork
NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices around the world. When completed, this internal WAN will use Internet technology to link soldiers in the field with support personnel on bases, etc. NMCI is an example of a(n):
Hardware Name:Description:Picture:1. Motherboard2. Power Supply3. CPU (Central Processing Unit)4. Random Access Memory (RAM)5. Hard Disk Drive/Solid State Drive6. Video Card7. Optical Drives8. Input and Output Devices
Consider the method total below:public static int total (int result, int a, int b){ if (a == 0) { if (b == 0) { return result * 2; } return result / 2; } else { return result * 3; }}The assignment statementx = total (1, 1, 1);must result in:A. x being assigned the value 3 B. x being assigned the value 7C. x being assigned the value 5D. x being assigned the value 2E. x being assigned the value 0
Write a program that asks the user to enter the size of a triangle (an integer from 1 to 50). Display the triangle by writing lines of asterisks. The first line will have one asterisk, the next two, and so on, with each line having one more asterisk than the previous line, up to the number entered by the user. On the next line write one fewer asterisk and continue by decreasing the number of asterisks by 1 for each successive line until only one asterisk is displayed. (Hint: Use nested for loops; the outside loop controls the number of lines to write, and the inside loop controls the number of asterisks to display on a line.) For example, if the user enters 3, the output would be:_______.a. *b. **c. ***d. **e. *

Suppose that a is declared as an int a[99]. Give the contents of the array after the following two statements are executed: for (i = 0; i <99 ; i++) a[i] = a[a[i]];

Answers

Answer:

Each array position holds the position from which the information is going to be retrieved. After the code is run, each position will have the information retrieved from that position.

Explanation:

The best way to solve this problem is working as if we had a very small array. Then we can generalize for the large array.

For example

int a[3];

a[0] = 1; a[1] = 2; a[2] = 0;

for(i = 0; i < 3; i++)

a[i] = a[a[i]];

When i = 0, we have:

a[i] = a[a[i]] = a[a[0]] = a[1] = 2;

When i = 1, we have

a[i] = a[a[i]] = a[a[1]] = a[2] = 0;

When i = 2, we have

a[i] = a[a[i]] = a[a[2]] = a[0] = 1;

Basically, in our small example, each array position holds the index from which we are going to retrieve the information. The same is going to happen in the array of length 99. After the code is run, each position will have the information retrieved from that position

What are the things that a computer literate understands?Name thems.​

Answers

Answer:

•Determine your IP address.

•Verify physical connectivity to the network.

•Check that you have a logical connection to the network.

•Find out what path network traffic takes to get to its destination.

Translate from DNS names to IP addresses.

When applying scenario logic to technology commercialization we should not consider if there is enough social, political, and market support for commercialization to take place Select one: True False

Answers

Answer:

False

Explanation:

The revenue has to be considered when commercializing technology. Social, political and market support determine whether there will be customers or not. So when applying scenario logic to technology commercialization we have to consider if there is market for the technology, if the society is willing ot pay for the technology anf if politics of the region will allow the business to operate.

This problem will be discussed in Lab6. In Lab6, the TAs will also discuss about the solution of Function Problem 1 that required you to write several functions. Additionally, the last week's lab problems on loop will be discussed too, if you need more help on them. See the deadline. You should try your best to complete it within the lab time. First n prime numbers: Write a program that takes a positive integer n as input and prints all the prime numbers from 1 to n.

Answers

Answer:

C++.

Explanation:

#include <iostream>

using namespace std;

////////////////////////////////////////////////////////////////

void printPrime(int n) {

   if (n > 0) {

       cout<<2<<endl;

       

       for (int i=3; i<=n; i++) {

          bool isPrime = true;

           

           for (int j=2; j<i; j++) {

               if (i % j == 0) {

                   isPrime = false;

                   break;

               }

           }

           

           if (isPrime == true)

               cout<<i<<endl;

       }

   }

   else {

       cout<<"Invalid input";

   }

}

int main() {

   int n;

   cout<<"Enter positive integer: ";

   cin>>n;

   printPrime(n);

   return 0;

}

1. What is the host name that is resolved? 2. What is the probable IPv6 address of the attacker? 3. What is the probable IPv6 address of the attacked? 4. How do the IPv6 addresses you identified in questions b and c correlate to the top talkers list you made in Step 3?

Answers

Explanation:

The given question statement has been referenced from c h12_Osscan.pcapng document

The answers to the questions are;

Q1_Answer ; The host name that has been resolved is win7_03

Q2_Answer ; The likely IPv6 address of the attacker is 10.1.0.103

Q3_Answer ; The likely IPv6 address of the attacker is 10.1.0.102

Q4_Answer ; According to the document, it has been mentioned that the IP's stated above have been the top talkers meaning that there was significant communication or exchange of information between them

What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack?

Answers

Answer:

The answer is below

Explanation:

1.  Lack of password enforcement

2.  Outdated third party applications: this includes outdated software such as Apache, PHP, MySQL, OpenSSL, and VNC

3.  General lack of patch management for the OS

4.  General lack of system hardening:

5.  Lack of backups

Ways to hardened the Linux/Unix based computer system is do the following:

1.  Perform minimal Installation: this involves, installing softwares that are necessary, and limiting the number of admin users on the computer system.

2.  Carry out Code Auditing: this is a means of preventing security issues, by withing more secure softwares to prevent variable declarations, or otherwise unexpected logic.

3.  Ensure there is a Traffic filter firewall: this will helps to attacks from external users or hackers. Install, Web Applicatio firewall, which helps to filter out traffic.

4.  Carry out Softwares updates: a software update can help prevent or guide against security leaks in a software

5.  Install security updates only: this is done by filtering out the security-related programs and only upgrade packages which are referred to in the custom file.

Other Questions