Eavesdropping occurs when an attacker records frames or datagrams and then retransmits them unchanged at a later time.
a. True
b. False

Answers

Answer 1

Answer:     A

Explanation:

Answer 2
answer : it’s true :) hope this helps

Related Questions

How much will your assignment be docked if you turn it in late?
O It won't, Ms. Frederick accepts late work for full credit
O None since Ms. Frederick doesn't accept late work
O 50%
O 30% ​

Answers

We don’t know ms.Fredrick, you’re on your own here

Answer:

This would be a classroom discussion, But here ill try I guess,

Maybe  None since Ms. Frederick doesn't accept late work  because I dont know her

Write a program whose inputs are three integers, and whose output is the largest of the three values. Ex: If the input is 7 15 3, the output is: 15

Answers

Answer:  

Here is the C++ program to find the largest of three integers.

#include <iostream> //to use input output functions

using namespace std; //to identify objects like cin cout

int main(){ //start of main function

int integer1, integer2, integer3;  // declare three integers

   cin>>integer1>>integer2>>integer3;  //reads values of three integers variables from user

   if (integer1 >= integer2 && integer1 >= integer3) //if value of integer1 variable is greater than or equal to both integer2 and integers3 values

       cout<<integer1;   //then largest number is integer1 and it is displayed

   else if (integer2 >= integer1 && integer2 >= integer3) //if value of integer2 variable is greater than or equal to both integer1 and integers3 values

       cout<<integer2;  //then largest number is integer2 and it is displayed

   else //in case value of integer3 variable is greater than or equal to both integer1 and integers2 values

       cout<<integer3; } //then largest number is integer3 and it is displayed

Here is the JAVA program to find the largest of three integers.

import java.util.Scanner; //to take input from user

public class Main{

public static void main(String[] args) {//start of main function

Scanner input= new Scanner(System.in); //a standard input stream.

int integer1= input.nextInt();//declare and read value of first integer

int integer2= input.nextInt();//declare and read value of second integer

int integer3= input.nextInt();//declare and read value of third integer

   if (integer1 >= integer2 && integer1 >= integer3) //if value of integer1 variable is greater than or equal to both integer2 and integers3 values

       System.out.println(integer1);   //then largest number is integer1 and it is displayed

   else if (integer2 >= integer1 && integer2 >= integer3) //if value of integer2 variable is greater than or equal to both integer1 and integers3 values

       System.out.println(integer2); //then largest number is integer2 and it is displayed

   else //when value of integer3 variable is greater than or equal to both integer1 and integers2 values

               System.out.println(integer3);  } } //then largest number is integer3 and it is displayed

Explanation:

The program is well explained in the comments attached with each statement of the program. I will explain the program with the help of an examples. Suppose

integer1 = 7

integer2 = 15

integer3 = 3

first if condition  if (integer1 >= integer2 && integer1 >= integer3) checks if value of integer1 variable is greater than or equal to both integer2 and integers3 values. Since integer1 = 7 so it is greater than integer3 = 3 but less than integer2. So this statement evaluates to false because in && ( AND logical operator) both of the conditions i.e integer1 >= integer2 and integer1 >= integer3 should be true. So the program moves to the else if part.

The else if condition else if (integer2 >= integer1 && integer2 >= integer3) checks if value of integer2 variable is greater than or equal to both integer1 and integer3 values. Since integer2 = 15 so it is greater than integer1 = 7 and also greater than integer3 = 3. So this statement evaluates to true as both parts of the else if condition holds true. So the else if part executes which has the statement: cout<<integer2; which prints the value of integer2 i.e. 15 on output screen.

Output:

15

Answer:

#include <stdio.h>

int main(void) {

 

 int num1;

 int num2;

 int num3;

 printf("Enter three integers: ");

 scanf("%d", &num1);

 scanf("%d", &num2);

 scanf("%d", &num3);

 if (num1 == 0 || num2 == 0 || num3 == 0)

 {

   printf("please input a number greater than zero :)\n");

 }

 if (num1 <= num2 && num1 <= num3)

 {

   printf("%i is the smallest number!\n", num1);

 }

 else if (num2 <= num1 && num2 <= num3)

 {

   printf("%i is the smallest number!\n", num2);

 }

 else

 {

   printf("%i is the smallest number!\n", num3);

 }

 return 0;

}

Explanation:

Alright so let's start with the requirements of the question:

must take 3 integers from user inputdetermine which of these 3 numbers are the smallestspit out the number to out

So we needed to create 3 variables to hold each integer that was going to be passed into our script.

By using scanf("%i", &variableName) we were able to take in user input and  store it inside of num1, num2, and num3.

Since you mentioned you were new to the C programming language, I threw in the first if statement as an example of how they can be used, use it as a guide for future reference, sometimes it's better to understand your code visually.

Basically what this if statement does is, it checks to see if any of the integers that came in from user input was the number zero, it told the user it does not accept that number, please input a number greater than zero.

if (num1 == 0 || num2 == 0 || num3 == 0)

 {

   printf("please input a number greater than zero :)\n");

 }

I used this methodology and implemented the heart of the question,

whichever number is smaller, print it out on the shell (output).

if (num1 <= num2 && num1 <= num3)

^^ here we're checking if the first variable we created is smaller than the second variable and the third ^^

 {

   printf("%i is the smallest number!\n", num1);

   ^^ if it is smaller, then print integer and then print a new line so the next line looks neat ^^

   ( incase if your wondering what "\n" is, its a special character that allows you so print a new line on the terminal, kind of like hitting the return or enter key )

 }

else if (num2 <= num1 && num2 <= num3)

^^ else if is used when your checking for more than one thing, and so for the second variable we checked to see if it was smaller than the first and third variable we created ^^

 {

   printf("%i is the smallest number!\n", num2); < -- and we print if it's smaller

 }

Last but not least:

else

^^ if it isn't num1 or num2, then it must be num3 ^^

 {

   printf("%i is the smallest number!\n", num3);

  we checked the first two options, if its neither of those then we have only one variable left, and thats num3.

 }

I hope that helps !!

Good luck on your coding journey :) ‍

An output device is also called a(n)

Answers

an output device is the opposite of an input because un is your what you add in

A student who sets a date to finish a goal is using which SMART goal? relevant, specific, attainable or timely

Answers

Answer:

timely

Explanation:A student who sets a date to finish a goal is using which SMART goal

Answer: D.) Timely

Explanation: Setting a date to finish a goal is using time.

A digital pen is an example of what type of device used in the information processing cycle ?

Answers

Answer:

Input is the answer

Answer:

im pretty sure its input..

Explanation:

The following binomial coefficient identity holds for any integer
n> 0. 2n
Prove this identity combinatorially by interpreting both sides in terms of fixed density binary strings

Answers

Answer:

hello your question is incomplete attached below is the complete question and answer

answer ; attached below

Explanation:

To prove this identity combination the right hand side has to be equal to the left hand side attached below is the prove showing that the right hand side is equal to the left hand side

Which of the following BEST defines digital citizen? a) a person who uses digital resources to research information b) a person who is digitally literate c) a person who is digitally connected d) a person who uses digital resources to engage in society

Answers

Answer:

a

Explanation:

Answer:

the answer is A

Explanation:

Which type of inheritance, when done continuously, is similar to a tree structure?a. Hierarchicalb. Multiplec. Multileveld. Hierarchical and Multiple

Answers

Answer:

Hierarchical inheritance

Explanation:

It is the  Hierarchical inheritance when one continuously, is similar to a tree structure. The  Hierarchical inheritance derives more than one class from the main class. And it is done continuously and subsequently. Thus, resulting a shape of tree tree of classes being linked.

If you wanted to securely transfer files from your local machine to a web server, what file transfer protocol could you use?

Answers

Answer:

SFTP protocol

Explanation:

FTP (file transfer protocol) is used for transferring files from local computers to a website or server but unfortunately, a file transfer protocol is not a secure method.

So, we have to used SFTP (secure file transfer protocol) at the place of file transfer protocol to move local files on the website server securely.

Which of the following arguments are valid? Explain your reasoning
a) I have a student in my class who is getting an A. Therefore, John, a student in my class is getting an A
b) Every girl scout who sells at least 50 boxes of cookies will get a prize. Suzy, a girl scout, got a prize. Therefore Suzy sold 50 boxes of cookies.

Answers

Answer:

a) the Statement is Invalid

b) the Statement is Invalid

Explanation:

a)

lets Consider, s: student of my class

A(x): Getting an A

Let b: john

I have a student in my class who is getting ab A: Зs, A(s)

John need not be the student i.e b ≠ s could be true

Hence ¬A(b) could be true and the given statement is invalid

b)

Lets Consider G: girl scout

C: selling 50 boxes of cookies

P: getting prize

s: Suzy

Now every girl scout who sells at least 50 boxes of cookies will get a prize: ∀x ∈ G, C(x) -> P(x)

Suzy, a girl scout, got a prize: s ∈ G, P(s)

since P(s) is true, C(s) need not be true

Main Reason: false → true is also true

Therefore the Statement is Invalid

The argument that is valid is B. Every girl scout who sells at least 50 boxes of cookies will get a prize. Suzy, a girl scout, got a prize. Therefore Suzy sold 50 boxes of cookies.

What is a valid argument?

It should be noted that a valid argument simply means the argument that's the conclusion can be derived from the premise given.

In this case, the argument that is valid is that every girl scout who sells at least 50 boxes of cookies will get a prize. Suzy, a girl scout, got a prize. Therefore Suzy sold 50 boxes of cookies.

Learn more about arguments on:

https://brainly.com/question/3775579

Which part of the Word application window should the user go to for the following activities?

Read a document: document area.

Find the name of the document: title bar.

Change the way a document is viewed: ribbon area.

Find help to do a certain activity on word: ribbon area.

Go up and down to different parts of a document: scroll bar.

Determine the page number of the document: status bar

Answers

Answer:

Correct

Explanation:

Indeed, the world application is a word processing software used by many professionals and students alike.

Read a document: To do this, the user should go to the document area  found at the top left corner of the tool bar.

Find the name of the document: By looking at the Title bar.

Change the way a document is viewed: The Ribbon area is located at the top right section of the screen near the minimize icon.

Find help to do a certain activity on word: Close to the Ribbon area there is a dialog box having the image of a bulb.

Go up and down to different parts of a document: By going to the scroll bar which found at the extreme right hand side (margin) of the page.

Determine the page number of the document: By going to the Status bar found at the bottom right of the page.

The part of the Word application window where the information van be found is illustrated thus:

Read a document: The user should go to the document area that can be found at the top left corner of the tool bar.

Find the name of the document: This can be seen by looking at the Title bar.

Change the way a document is viewed: This is located at the top right section of the screen near the minimize icon.

Find help to do a certain activity on word: This can be found close to the Ribbon area.

Go up and down to different parts of a document: This can be found on the scroll bar.

Determine the page number of the document: This can be found on the Status bar.

Learn more about word applications on;

https://brainly.com/question/20659068

A _____ is the useful part of a transmission through a network.

Answers

Answer: LAN

Explanation:

Attacks against previously unknown vulnerabilities that give network security specialists virtually no time to protect against them are referred to as:

Answers

Answer:

Explanation: malware

g Write a function that collects integers from the user until a 0 is encountered and returns then in a list in the order they were input.

Answers

Answer:

The function written in python is as follows;

def main():

      user_input = int(input("Input: "))

      mylist = []

      while not user_input == 0:

             mylist.append(user_input)

             user_input = int(input("Input: "))

      print(mylist)

 

if __name__ == "__main__":

      main()

Explanation:

This line declares a main function with no arguments

def main():

This line prompts user for input

      user_input = int(input("Input: "))

This line declares an empty list

      mylist = []

The following iteration checks if user input is not 0; If yes, the user input is appended to the list; otherwise, the iteration ends

      while not user_input == 0:

             mylist.append(user_input)

             user_input = int(input("Input: "))

This liine prints the list in the order which it was inputted

      print(mylist)

 

The following lines call the main function

if __name__ == "__main__":

      main()

Which connection configuration offers faster speeds, higher security, lower latencies, and higher reliability?

Answers

Answer:

ExpressRoute

Explanation: ExpressRoute is an Azure service that allows a user to create a private connection with other datacenters /infrastructures. It gives an enterprise the opportunities to effectively extend and expand its networks into cloud services offered by Microsoft cloud, it can also be described as a cloud Integration option that can be used by a private network to plug-in into a Microsoft cloud services.

The ______ stores permanent subscriber profile data and relevant temporary data such as current subscriber location

Answers

Answer:

Home Location Register

Explanation:

Home Location Register is a mobile network database that serves as storage for various information of different individuals or people referred to as customers or subscribers.

The information it stores includes the following:

1. Subscriber's service profile

2. Subscriber's current location information

3. Subscriber's activity status

Hence, the correct answer is HOME LOCATION REGISTER.

1.3 Code Practice: Question 3. On edhesieve.

Write a program to output the following:
^ ^
( o o )
v
Hint: Copying and pasting the code above into each line of the programming environment will help you ensure that you are accurately spacing out the required characters.
Using ¨print¨

Answers

Answer:

I'll answer this question using Python

print("  ^ ^")

print("( o o )")

print("   v")

Explanation:

To answer this question, you have to follow the hint as it is in the question

The hint says you should copy each line into a print statement and that's exactly what I did when answering this question;

In other words;

^ ^  becomes print("  ^ ^")

( o o )   becomes print("( o o )")

v becomes print("   v")

what is the first computer company​

Answers

Electronic Controls Company it was founded on 1949 by J.Presper and John Mauchly

Answer: Electronic Controls Company

Explanation: The first computer company was Electronic Controls Company and was founded in 1949 by J. Presper Eckert and John Mauchly, the same individuals who helped create the ENIAC computer.

Hope this helps^^

6.21 LAB: Swapping variables Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is:

Answers

Answer:

Here is the C++ and Python programs:

C++ program:

#include<iostream>  //to use input output functions

using namespace std;  //to identify objects like cin cout

void swapvalues(int&  userVal1, int& userVal2); //function to swap values

int main() {  //start of main function

  int integer1,integer2;  //declare two integers

  cout<<"Enter first integer: ";  //prompts user to enter the first number

  cin>>integer1;  //reads first number from user

     cout<<"Enter second integer: "; //prompts user to enter the second number

  cin>>integer2;  //reads second number from user

 cout<<"Integers before swapping:\n";  //displays two numbers before swapping

 cout<<integer1<<endl<<integer2;  

  swapvalues(integer1, integer2);  //calls swapvalues method passing two integers to it

  cout << "\nIntegers after swapping:\n"; //displays two numbers after swapping

 cout<<integer1<<endl<<integer2; }

void swapvalues(int&  userVal1, int& userVal2){  //method that takes two int type numbers and swaps these numbers

  int temp;  //temporary variable

  temp = userVal1;  //temp holds the original value of userVal1

  userVal1 = userVal2;  //the value in userVal2 is assigned to userVal1

  userVal2 = temp; } //assigns value of temp(original value of userVal1) to userVal2

The program prompts the user to enter two integers and then calls swapvalues() method by passing the integers by reference. The swapvalues() method modifies the passed parameters by swapping them. The method uses a temp variable to hold the original value of first integer variable and then assigns the value of second integer variable to first. For example if userVal1 = 1 and userVal2 =2. Then these swapping statements work as follows:

temp = userVal1;  

temp = 1

userVal1 = userVal2;  

userVal1 = 2

userVal2 = temp;

userVal2 = 1

Now because of these statements the values of userVal1 and userVal2 are swapped as:

userVal1 = 2

userVal2 = 1

Explanation:

Python program:

def swap_values(user_val1, user_val2):  #method to swap two numbers

   return user_val2,user_val1   #returns the swapped numbers

integer1 = int(input('Enter first integer :')) #prompts user to enter first number

integer2 = int(input('Enter second integer :'))  #prompts user to enter second number

print("Numbers before swapping") #displays numbers before swapping

print(integer1,integer2)

print("Numbers after swapping") #displays numbers after swapping

integer1,integer2 = swap_values(integer1,integer2) #calls method passing integer1 and integer2 to swap their values

print(integer1,integer2) #displays the swapped numbers

The screenshot of programs and outputs is attached.

The program that swaps variables will return the reverse of the users input.  The second integer input will be printed first followed by the first integer input.

The program that swaps the user integer input.

def swap_variables(first_input, second_input):

    return second_input, first_input

first_input = input("input the first integer: ")

second_input = input("input the second integer: ")

print(f"numbers before swapping are {first_input} and {second_input}")

print(f"numbers after swapping are {second_input} and {first_input}")

Code explanation

The code is written in python.

The first line of code we defined a function named "swap_variables" and it accept parameters as first_input and second_inputs.Then we returned the swapped items.The first_input is used to store the users first inputThe second_input is use to store the users second inputThen, we print the original valuesFinally, we print the swapped users input

learn more on python variables here: https://brainly.com/question/14039335

This technique is based on searching for a fixed sequence of bytes in a single packet Group of answer choices Protocol Decode-based Analysis Heuristic-based Analysis Anomaly-based Analysis Pattern Matching

Answers

Answer:

"Pattern Matching" is the correct choice.

Explanation:

In computational science, pattern matching seems to be the testing and location of similar information occurrences or variations of any form between raw code or a series of tokens. Pattern matching in various computing techniques or interfaces is something of several fundamental as well as essential paradigms.

The other choices don't apply to the specified instance. So that the choice above seems to be the right one.

importance of being having data on hand​

Answers

Answer:

Explanation:

Data is collected is to make the decisions that will positively impact the success of a company, improve its practices and increase revenue. It is also essential that the way in which data are collected, assembled and published respects Indigenous sensitivities, not least so as to ensure that Indigenous people understand the purposes for which the data is being collected and willingly provide accurate answers to data collectors.

Hope this helped you!

Which of the following is not a job title associated with a career in visual and audio technology? master control operator production assistant stagehand optometrist

Answers

Answer:

Optometrist

Explanation:

Optometrists are healthcare professionals who provide primary vision care ranging from sight testing and correction to the diagnosis, treatment, and management of vision changes. An optometrist is not a medical doctor.

Answer:

c

Explanation:

Which of the following components provides a number of critical services, including a user interface, memory management, a file system, multitasking, and the interface to hardware devices?a. RAMb. Operating system (OS)c. BIOSd. Hard drive

Answers

Answer:

b. Operating system (OS)

Explanation:

Operating System is a term that is mostly referred to as a computer system's component, program or software technology, that carry out various operations for the whole Computer System.

These operations include:

1. a user interface

2. memory management

3. a file system

4. multitasking

5. the interface to hardware devices.

Hence, in this case, the right answer is option B: Operating System.

how do you think calculator of a computer works? describe the procedure.
​plz answer quickly its urgent!!!

Answers

Explanation:

calculators work by processing information in binary form. We're used to thinking of numbers in our normal base-ten system, in which there are ten digits to work with: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. The binary number system is a base-two system, which means there are only two digits to work with: 0 and 1. Thus, when you input numbers into a calculator, the integrated circuit converts those numbers to binary strings of 0s and 1s.

The integrated circuits then use those strings of 0s and 1s to turn transistors on and off with electricity to perform the desired calculations. Since there are only two options in a binary system (0 or 1), these can easily be represented by turning transistors on and off, since on and off easily represent the binary option

Once a calculation has been completed, the answer in binary form is then converted back to our normal base-ten system and displayed on the calculator's display screen.

When troubleshooting Domain Name System (DNS) problems, which helpful feature do public servers usually support

Answers

Answer:

ICMP echo requests.

Explanation:

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address. This simply means that, DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

When troubleshooting Domain Name System (DNS) problems, one helpful feature the public servers usually support is an ICMP echo requests.

ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.

In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.

Hence, when troubleshooting Domain Name System (DNS) problems, a user should ping a public server such as a Google DNS server with the IP address (8.8.8.8 or 8.8.4.4), Cloudfare with 1.1.1.1 or the common 4.2.2.2 DNS server. If successful, it means the name-server was resolved properly into an IP address and therefore, there's an active connection on the network.

Based on the information given, the helpful feature that public servers usually support is the ICMP echo requests.

It should be noted that a Domain Name System simply means a naming database where the internet domain names are stored and translated into their respective internet protocol address.

It should be noted that when troubleshooting Domain Name System problems, the helpful feature that public servers usually support is the ICMP echo requests.

Learn more about domain on:

https://brainly.com/question/19195397

The first phase of setting up an IPsec tunnel is called ___________

Answers

Answer:

Internet Key Exchange

Explanation:

The first phase, setting up an IPsec tunnel, is called IKE phase 1. There are two types of setting up an IPsec tunnel.

What is an IPsec tunnel?

Phase 1 and Phase 2 of VPN discussions are separate stages. Phase 1's primary goal is to establish a safe, encrypted channel for Phase 2 negotiations between the two peers. When Phase 1 is successfully completed, the peers immediately begin Phase 2 negotiations.

When two dedicated routers are deployed in IPsec tunnel mode, each router serves as one end of a fictitious "tunnel" over a public network. In IPsec tunnel mode, in addition to the packet content, the original IP header containing the packet's final destination is also encrypted.

Therefore, the first phase, setting up an IPsec tunnel, is called IKE phase 1.

To learn more about IPsec tunnel, refer to the link:

https://brainly.com/question/14364468

#SPJ5

what is the name of the physical database component that is typically created from the entity component of an erd

Answers

Answer:

nijit

Explanation:

small nano bytes desind to kill a computers cellular compunds

Emerson needs to tell his browser how to display a web page. Which tool will he use? HTML Web viewer Operating system Translator

Answers

HTML Web viewer is the only one that could that

Answer:

HTML

Explanation:

yeah i just took test

Write a program that prints all the numbers from 0 to 6 except 3 and 6. Expected output: 0 1 2 4 5

Answers

Answer:

for x in range(7):

   if (x == 3 or x==6):

       continue

   print(x, end=' ')

print("\n")

Output:

>> 0 1 2 4 5

Explanation:

The code above has been written in Python. The following explains each line of the code.

Line 1: for x in range(7):

The built-in function range(7)  generates integers between 0 and 7. 0 is included but not 7. i.e 0 - 6.

The for loop then iterates over the sequence of number being generated by the range() function. At each iteration, the value of x equals the number at that iteration. i.e

For the first iteration, x = 0

For the second iteration, x = 1

For the third iteration, x = 2 and so on up to x = 6 (since the last number, 7, is not included).

Line 2: if (x == 3 or x == 6):

This line checks for the value of x at each iteration. if the value of x is 3 or 6, then the next line, line 3 is executed.

Line 3: continue

The continue keyword is used to skip an iteration in a loop. In other words, when the continue statement is encountered in a loop, the loop skips to the next iteration without executing expressions that follow the continue statement in that iteration. In this case, the print(x, end=' ')  in line 4 will not be executed when x is 3 or 6. That means 3 and 6 will not be printed.

Line 4: print(x, end=' ')

This line prints the value of x at each iteration(loop) and then followed by a single space. i.e 0 1 2 ... will be printed. Bear in mind that 3 and 6 will not be printed though.

Line 5: print("\n")

This line will be printed after the loop has finished execution. This line prints a new line character.

The program is an illustration of loops.

Loops are used to perform repetitive operations.

The program in Python,  where comments are used to explain each line is as follows:

#This iterates from 0 to 6

for i in range(7):

   #This checks if the current number is not 3 or 6

   if not i==3 and not i == 6:

       #If yes, the current number is printed

       print(i,end=" ")

Read more about similar programs at:

https://brainly.com/question/21863439

Create a VBScript script (w3_firstname_lastname.vbs) that takes one parameter (folder name) to do the following 1) List all files names, size, date created in the given folder 2) Parameter = Root Folder name The script should check and validate the folder name 3) Optionally, you can save the list into a file “Results.txt” using the redirection operator or by creating the file in the script. 4) Make sure to include comment block (flowerbox) in your code.

Answers

Answer:

Set args = Wscript.Arguments

If (WScript.Arguments.Count <> 1) Then

 Wscript.Echo "Specify the folder name as a command line argument."

Else

   objStartFolder = args.Item(0)

   Set objFSO = CreateObject("Scripting.FileSystemObject")

   if (Not objFSO.FolderExists(objStartFolder)) Then

       Wscript.Echo "Folder "&objStartFolder&" does not exist"

   Else

       Set objFolder = objFSO.GetFolder(objStartFolder)

       Set colFiles = objFolder.Files

       For Each objFile in colFiles

           Wscript.Echo objFile.Name, objFile.Size, objFile.DateCreated

       Next

   End If

End If

Explanation:

Here's some code to get you started.

Other Questions
Refer to the Newsela article "Rickie Fowler, Make-A-Wish and the walk of a lifetime at Detroit Golf Club." Which piece of textual evidence best supports the inference that Anthony Trudel's parents encouraged his love for golf? "So, about two years ago, Daniela wrote to the Make-A-Wish Foundation." "It helped that his dad loved the sport, too..." "As long as he paid attention in school...He could play as much as he wanted." "If they never met again, Fowler should know he has changed Trudel's life." Why might some prisoners, having been exposed to the outside world, choose to return to their shackled lives in the cave? When an incident occurs or threatens, local emergency personnel manage response using NIMS principles and ICS. If the incident is or becomes large or complex, what happens? State the amplitude and period of f(t) = -0.3sin t/3 Scientists measure mass with a(n) Helpppppppppppp me I really need help 3. Not all the busines contractsare legal. Justify. PLS HELP I NEED ASAP DUE TODAY 1.Which variable expression is a translation of the word phrase "three less than the product of a number and six"? 36n 6n3 6(3n) 6(n3) 2.Fatima is three times the age of her younger sister Melody. Which expresses both ages in terms of Melodys age m? Melody: m3 Fatima: m Melody: 3m Fatima: m Melody: m Fatima: 3m Melody: m Fatima: m + 3 Assessment navigation 3.A triangle has sides of length 10, 8, and y inches. Which is an expression for the perimeter of the triangle, and what is the perimeter when y = 7? y(10+8) The perimeter is 126 inches when y = 7. 10(y+8) The perimeter is150 inches when y = 7. 8(10+y) The perimeter is 136 inches when y = 7. y + 10 + 8 The perimeter is 25 inches when y = 7. What is 1/5 of 30???? What is the product of frequency and time period???? Find the standard equation of the circle defined by the equation x^2 + y^2 +8x - 12y + 43 = 0. ANSWERS ATTACHED, due in 2 HOURS, will give Brainliest! Suppose A has a coordinate of 8 and AB = 3. What are the possible midpoints of AB? You get paid $6.80 per hour and worked 4 hours of overtime last week .How much overtime pay will you receive for last week ? a rectangle has a height of w^2+3w+9 and a width of w^2+2 express the area of the entire rectangle Is the sentence : The kicker missed the point after the touchdown. A passive or active sentence. What's the best way to rewrite the roundabout expression "for the period of two weeks"?A. for the period of a half monthB. for two weeksC. for weeksD. for the period of at least two weeks Which of the following most accurately represents the various feeding relationships within an ecosystem?A. A feeding diagramB. A food webC. A food chainD. A biomass pyramid Read the following short excerpt of student writing. Use your vocabulary and grammar knowledge to determine which suggestions you would make to improve his or her grammar and word choice. I really thought she loved me but I discovered her grave betrayal one afternoon. It was easy to figure out because she accidentally sent a text to me that was meant for him. I was confused by the text because it said, "Don't tell Mike." I felt insulted that she thought she could get away with this infidelity. At first I felt very angry bitter and hateful but then I felt so hopeless and depressed. I longed for her to call me. I thought if I could just hear her pleasing voice, maybe then I would not be filled with such bitterness. Instead of calling her I talked to another friend who is good at listening and feeling my pain. Talking with her makes me feel euphoric. I think I may be on the road to recovery. What word would you suggest to replace the underlined word or words in this excerpt? At first I felt very angry but then I felt so hopeless and depressed. I longed for her to call me. euphonious amiable despondent euphoric A firm can produce steel with or without a filter on its smokestack. If it produces without a filter, the external costs on the community are $ 500,000 per year. If it produces with a filter, there are no external costs on the community, and the firm will incur an annual fixed cost of $ 300,000 for the filter. Use the Coase Theorem to answer how costless bargaining will lead to a socially efficient outcome, if the property rights are owned by the community. A. the community will have an incentive to pay the firm some price above $ 300,000 (perhaps $ 499,999) to induce the firm to install the filter. B. The firm would install the filter at a cost of $ 300,000. C. the socially efficient outcome is for the firm to not install the filter Combine like terms to create an equivalent expression. 2/5m - 4/5 - 3/5m.