fill in the blank: a technique is used to balance traffic by iterating a list of items one by one from is known as .

Answers

Answer 1

Anycast is a technique is used to balance traffic by iterating a list of items such as location, congestion, or link health, This helps cut down on latency and bandwidth costs, improves load time for users, and improves availability.

What is Anycast?

Incoming requests can be routed to a variety of different locations, or "nodes," using the network addressing and routing technique known as "anycast."

Anycast typically directs incoming traffic to the closest data center with the ability to process the request quickly in the context of a CDN. Anycast networks can withstand high traffic volumes, network congestion, and DDoS attacks thanks to selective routing.

How does Anycast Work?

It is possible to distribute incoming connection requests among various data centers using anycast network routing. The Anycast network distributes data based on some prioritization methodology when requests arrive at a single IP address connected to the network.

The decision-making process for selecting a specific data center is typically optimized to reduce latency by choosing the data center that is closest to the requester. Anycast, one of the five main network protocol techniques used in the Internet protocol, is characterized by a 1-to-1 of many association.

To know more about Anycast, visit:https://brainly.com/question/15022651

#SPJ4


Related Questions

gwen is investigating an attack. an intruder managed to take over the identity of a user who was legitimately logged into gwen's company's website by manipulating hypertext transfer protocol (http) headers. which type of attack likely took place?

Answers

Hackers can access a target's computer or online accounts by using the session hijacking technique.

What is session hijacking?Hackers can access a target's computer or online accounts by using the session hijacking technique.A hacker who wants to acquire a user's passwords and personal information hijacks the user's browser session in a session hijacking attack. IP spoofing, the most popular technique for session hijacking, involves an attacker using source-routed IP packets to snoop into a conversation taking place between two network nodes while pretending to be one of the authenticated users.Depending on how they are carried out, there are two different types of session hijacking.Active hijacking is when the attacker actively interferes with the target, and passive hijacking is when the attacker only watches the communication. Attackers look for sessions where they can enter your accounts without authorization and take your data.To prevent session hijacking attacks, you should always validate your login credentials in a secure method.

To learn more about Session hijacking refer

https://brainly.com/question/13068625

#SPJ4

A while loop is called a pretest loop because the condition is tested after the loop has had one iteration. True or false?.

Answers

Answer:

True

Explanation:

The while loop tests the condition first then performs iteration.

You can change the calculation used in the values area by right-clicking a value in the values area to open the shortcut menu, and then clicking field settings to open the ____ dialog box.

Answers

You can change the calculation used in the values area by right-clicking a value in the values area to open the shortcut menu, and then clicking field settings to open the Value Field Settings dialog box.

Value fields are made up of their names, texts, a rule describing how they are consolidated across time features, and if they are volume fields or price fields.

Right-click any value field in the pivot table to see Value Field Settings. Options will be listed on the screen. Value field settings are third from the last on the list, at the very end. A dialog window will open after you tap on it.

The section where we drop fields for the pivot table is another place where we can access value field settings. Users might visit the numbers section. Select the little arrow head. Value Fields Settings is the last selection.

Learn more about Value Field Settings here:https://brainly.com/question/26849422

#SPJ4

12. what is the throughput (bytes transferred per unit time) for the tcp connection? explain how you calculated this value.

Answers

The TCP connection's throughput is calculated as 30.222 KByte/sec.

What is throughput?

Network throughput is the rate of successfully delivered messages via a communication channel in a communication network, such as Ethernet or packet radio. The information in these messages may be transmitted by logical or physical links, network nodes, or both.

The most important statistic for determining how well your production line is performing is throughput. Not merely a crucial metric, but the most crucial metric.

Solution Explained:

In this case, we choose to compute the throughput using the average time as the entire connection time. Then, the ratio of the total data and transmission time is used to calculate the average throughput for this TCP connection. The difference between the acknowledged sequence number of the last ACK (164091 bytes for segment No. 202), which is 1 byte for segment No. 4, and the sequence number of the first TCP segment, which is 1 byte, can be used to calculate the total amount of data transmitted. As a result, the total amount of data is 164091 - 1 = 164090 bytes. The total transmission time is the difference between the first TCP segment's time instant (0.026477 second for segment No. 4) and the last ACK's time instant (5.455830 second). The total transmission time is calculated as the difference between the time instants of the first TCP segment (i.e., 0.026477 second for segment No. 4) and the last ACK (i.e., 5.455830 second for segment No. 202)

Thus, 5.455830 minus 0.026477 = 5.4294 seconds constitute the total transmission time.

As a result, 164090/5.4294 = 30.222 KByte/sec is calculated as the throughput for the TCP connection.

To learn more about throughput, use the link given
https://brainly.com/question/9979447
#SPJ1

if a loop does not contain, within itself, a valid way to terminate, it is called a(n) loop question 2 options: a) for b) do-while c) while d) infinite

Answers

Option c is correct. If a loop does not contain, within itself, a valid way to terminate, it is called a while loop.

A while loop is a control flow statement that enables code to be performed repeatedly based on a specified Boolean condition in the majority of computer programming languages. The while loop can be viewed as an iterative version of the if statement.

When a condition is not satisfied, a "While" loop is used to repeat a certain piece of code an undetermined number of times. For instance, if we want to ask a user for a number between 1 and 10, but we don't know how often they might enter a greater number, we keep asking "while the value is not between 1 and 10."

To know more about while loop click here:

https://brainly.com/question/15172842

#SPJ4

why is it important to create a design specification

Answers

Answer:

aaaaaaaaaaaaaaaaaaaaaaaaaaa

aaaaaaaaaaExplanation:

aaaaaaaaaaaaaaaaaa

consider 2 level page table with outer page has 16 4kb pages, and each entry being 8 bytes long. how many entries can this 2-level page table contain? (show your steps)

Answers

The entries that can this 2-level page table contain are 4108 to 4108. A paging technique known as multilevel paging uses two or more tiers of page tables arranged hierarchically.

A paging technique known as multilevel paging uses two or more tiers of page tables arranged hierarchically. Another name for it is hierarchical paging. The level 1 page table's entries are pointers to the level 2 page table, the level 2 page table's entries are pointers to the level 3 page table, and so on. Actual frame data is stored in the last level page table entries. A single-page table is present in Level 1 and its address is stored in PTBR.

All page tables in a multilevel paging system, regardless of the number of levels of paging, are kept in the main memory.

To know more about multilevel paging click here:

https://brainly.com/question/29243422

#SPJ4

which is an advantage that link-state/shortest-path routing protocols have over distance-vector protocols?

Answers

Compared to link-state protocols, distance vector protocols demand higher processing power.

A network protocol is a set of rules that have been designed to control how data is moved between different devices connected to the same network. Essentially, it makes it possible for connected devices to communicate with one another regardless of differences in their internal workings, organizational systems, or aesthetics. Due to their ability to enable global communication, network protocols are crucial to modern digital communications.

Similar to how speaking the same language facilitates communication between two people, network protocols enable device interaction because predefined rules are built into the hardware and software of devices. Neither local area networks (LAN) nor wide area networks (WAN) could function as efficiently without the use of network protocols.

To know more about protocols click here:

https://brainly.com/question/27581708

#SPJ4

15) an object-oriented database structures the information into multidimensional data cubes. (1 point) true false

Answers

It is FALSE to state that an object-oriented database structures the information into multidimensional data cubes.

What are multidimensional data cubes?

A multidimensional data cube generally aids in the storage of vast volumes of data by utilizing a multidimensional array. It improves its efficiency by maintaining an index for each dimension. As a result, of is multi-dimensionality, it can obtain data quickly.

An object-oriented database (OOD) is a database system that can handle sophisticated data objects, such as those found in object-oriented programming languages. Everything in object-oriented programming is an object, and many objects are highly complicated, with various characteristics and actions.

Learn more about object-oriented database:
https://brainly.com/question/28298014
#SPJ1

a(n) is an attack that always maintains a primary focus on remaining in the network, operating undetected, and having multiple ways in and out.

Answers

Advanced Persistent Threats (APT) is an attack that always maintains a primary focus on remaining in the network, operating undetected, and having multiple ways in and out

About Advanced Persistent Threats (APT)

Advanced persistent threat (APT) refers to cyber attacks launched by attackers with substantial means, organization and motivation to carry out sustained attacks against targets.  APT is developed in the sense that it uses stealth and multiple attack methods to compromise targets, which are often high-value corporate or government resources.  These attacks are difficult to detect, remove, and attribute.  Once a target is breached, backdoors are often created to provide the attacker with ongoing access to the compromised system.  

APTs are persistent because an attacker can spend months gathering intelligence about a target and use that intelligence to launch multiple attacks over an extended period of time.  This is threatening because perpetrators are often looking for highly sensitive information, such as the layout of a nuclear power plant or the code to break into a US defense contractor.

Learn more about Advanced Persistent Threats (APT) at https://brainly.com/question/17328761.

#SPJ4

CYBERSECURITY. ITS THE ONLY ONE I GOT STUCK ON PLS HELP.
Two Windows features are “boot in safe mode” (with limited user abilities) and “boot from disk.” Windows also has a third, easy-to-access startup utility that allows users to control which applications are started automatically when the OS is reset. How might these features enhance cybersecurity for Windows users?

Answers

Answer:  How might these features enhance cybersecurity for Windows users:

1) Boot in safe mode - The safe mode only loads minimal and trusted drivers and services (excluding third-party options) thereby allowing isolation of potential issues, viruses, and trojan malware.

2) Boot from disk - The boot from disk option loads the operating system from a disk image, rather than loading it from the host system. This eliminates the loading of corrupted, infected, or altered boot loader files from a suspect system.

3) Start-up Utility - The startup utility provides the user with direct control over what applications, services, batch files, drivers, and scripts are run during the startup process. This can remove third-party bloatware or malware that can impact system performance or compromise cybersecurity for the user(s) data, access, identity, and applications.

Explanation:

All of these Windows tools enable different options for users to manage, troubleshoot, and protect their systems, data, identity, and applications from cybersecurity breaches, hackers, monitoring, and potential trojan malware. Used in together, they provide a comprehensive set of tools that can protect and disable cybersecurity threats and exploited vulnerabilities.

Please remember to vote this as Brainliest if I earn it!   :)

you need to define a new document type with a specific document number range to post customer invoices via interface from a non-sap system. how would you define the document number range? please choose the correct answer.

Answers

You have to use external number assignment for define a new document type with a specific document number range to post customer invoices via interface from a non-sap system.

What is number assignment?

The cell phone's NAM, or nonvolatile memory, is where the phone number, international mobile subscriber identity, and electronic serial number are kept. Users have the ability to register their phones with a local number in more than one market when using phones with dual- or multi-NAM functionality.

A fixed asset is identified exclusively by its asset number. It always includes both the primary asset number and the secondary asset number. In the system, assigning numbers can be done in one of two ways:

Assigning a number externallyInternal identifying number

In the event of external number assignment, the asset number is given out by the user directly. When a number is already assigned, the system issues an error message and only displays the defined number interval. When assigning internal numbers, the computer program chooses consecutive numbers at random.

Range Intervals for Numbers:

The ranges of numbers are set at the level of the company code. Indicate the number range for each company code in Customizing for the Asset Class, and indicate whether assignments from the number range should be made internally or externally. Only externally can alphanumeric intervals be assigned.

Learn more about number assignment click here:

https://brainly.com/question/27104886

#SPJ4

when hackers gain access to a database containing your personal private information, this is an example of:

Answers

Answer: Breach, database breach.

Explanation:

a(n) reviews the log files generated by servers, network devices, and even other idpss looking for patterns andsignatures that may indicate an attack or intrusion is in process or has already occurred.

Answers

Log file monitor (LFM) that may indicate an attack or intrusion is in process or has already occurred.

What is log files?

An event that happened at a specific time and may have contextual metadata is recorded in a log file. The events that take place within a system, including transactions, mistakes, and intrusions, are recorded historically in log files.

What is context metadata?

The web of relationships between data points is known as the data context. Those associations may be made as metadata or could just be found and correlated. The ability to extract information from data is fundamentally made feasible by contextual metadata, which adds value. A single data point is meaningless by itself.

What is intrusion?

A security incident is a security event, or collection of related security events, in which an unauthorized person gains access to, or makes an attempt to gain access to, a system or system resource.

Learn more about Log file monitor click here:

https://brainly.com/question/4595770

#SPJ4

aside from the merchant center diagnostic interface, what other way will you be notified of an account suspension?

Answers

Other way will you be notified of an account suspension Email notification in G**gle Merchant Center.

What is diagnostic interface?

Only management traffic is permitted through the diagnostic interface; no through traffic is permitted. Monitoring via SNMP or Syslog is handy with the Diagnostic interface. FTD interfaces can be installed in either the regular firewall mode or the IPS-only mode. The same device can have both firewall and IPS-only interfaces.

It's crucial to pay attention to email notifications of account violations and take appropriate action before the relevant deadlines pass. Your data will be reviewed again at the conclusion of the warning period if you don't request a review during that time.

Your account has been suspended, and you'll get an email telling you about it along with all the pertinent details regarding the problems with the data quality and what to do next. The Home and Diagnostics pages of your Merchant Center account will display your suspension status. Account suspension may result from persistent policy violations.

Additionally, some products cannot legally be promoted using Shopping advertisements. Your entire Merchant Center account will be suspended if you try to advertise prohibited goods.

Learn more about account suspension click here:

https://brainly.com/question/29314920

#SPJ4

which of the following components of a successful access control framework is the process of proving that you are who you say you are?

Answers

Access control is a technique for limiting access to confidential information. An access control gateway allows only individuals whose identities have been validated to access company data.

What are the Components of Access Control?Access control is essentially the process of limiting who has access to a resource. There are five key parts to every access control system, whether it is physical or logical.Authentication is the process of establishing the truth of a statement, such as a person's or a computer user's identity. It could entail authenticating personal identity documents, confirming login credentials against stored information, or using a digital certificate to confirm the legitimacy of a website.The process of defining privileges or access rights to resources is known as authorization. For instance, access to employee records is often granted for human resources workers, and this policy is typically defined as access control rules in a computer system.Access: The user or machine can access the resource after being authenticated and granted access.Manage: Managing an access control system entails adding and deleting user or system authentication and authorisation. To simplify the management process, some solutions will sync with G Suite or Azure Active Directory.Audit: A tool frequently used in access control to uphold the least privilege concept. Users may eventually get access they don't need, for example if they change roles. This danger is minimized by frequent audits.

To Learn more About  Access control refer to:

https://brainly.com/question/27961288

#SPJ4

When Stacy tries to delete the field "Image,” in the Design view image below, she receives no warning message and the field deletes. But when she attempts to delete "BotanicalOrigin,” a warning message appears. Which best explains this difference?

a. “Image” is a primary key, and “BotanicalOrigin” is not a unique identifier.
b. “Image” is not a unique identifier, but “BotanicalOrigin” is a primary key.
c. “Image” contains no data, but “BotanicalOrigin” does contain data.
d. “Image” contains data, but “BotanicalOrigin” does not contain data.

Answers

When Stacy attempts to delete "Botanical Origin,” a warning message appears. The best explanation of the difference is “Image” is not a unique identifier, but “Botanical Origin” is a primary key. The correct option is b.

What is the primary key?

The column or columns that each row in a table uses to uniquely identify itself is known as the primary key. For Optim to insert, update, restore, or delete data from a database table, the table must contain a primary key. The primary keys set for the database are used by Optim.

Therefore, the correct option is b.“Image” is not a unique identifier, but “Botanical Origin” is a primary key.

To learn more about the primary key, refer to the link:

brainly.com/question/27170818

#SPJ1

why would a network admin configure port security on a switch? group of answer choices to stop cdp packets from being sent out all ports. to prevent unauthorized hosts from accessing the lan to limit the number of layer 2 broadcasts on a particular switch port to prevent unauthorized telnet access to a switch port

Answers

Access to the LAN by unauthorized users is generally restricted or prevented via port security in a switch.

Port security enhances the safety of the network by preventing packets from being forwarded by unknown devices. When a link goes offline, all dynamically locked addresses become unlocked. The port security function offers the following benefits: On a given port, the number of MAC addresses may be limited. the maximum number of MAC addresses that can be used on a particular port. Only packets with a matching MAC address (secure packets) are forwarded; all other packets (unsecure packets) are limited. enabled based on the port. When locked, only packets with legitimate MAC addresses will be forwarded.

Learn more about address here-

https://brainly.com/question/16011753

#SPJ4

when implementing a multiprotocol label switching (mpls) wan, which data unit is managed by the routers at different sites?

Answers

Packets is the data unit is managed by the router at different sites in a multiprotocol label switching (mpls) wan because A packet is a condensed section of a message. Packets are used to transport data over computer networks like the Internet.

What is Multiprotocol Label Switching (MPLS)?

Data forwarding technology called Multiprotocol Label Switching (MPLS) quickens and regulates network traffic flow. With MPLS, data is routed through a path via labels as opposed to needing intricate routing table lookups at each stop.

This method is scalable and protocol independent and works with Asynchronous Transport Mode and Internet Protocol (IP).

In a conventional IP network, data is routed among network nodes using lengthy network addresses. With this approach, each router where a data packet lands must determine for itself where the packet will go next on the network based on routing tables. In contrast, MPLS gives each packet a label and directs it along a predetermined path.

To learn more about Multiprotocol Label Switching (MPLS), visit: https://brainly.com/question/13014120

#SPJ4

A hacker wants to gain illegal Elizabeth owns a Mac and is not careful about what websites she visits, what links she clicks on, or what she downloads. She says that it is impossible for Macs to get viruses because the operating system is sandboxed. Is she correct? A. Yes, it is impossible for a Mac to become infected with any malware. B. No, a Mac can get a virus and be affected just as bad as a PC. C. No, a Mac can get a virus but it is not susceptible to any other type of malware. D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine. Reset Next to Elizabeth owns a Mac and is not careful about what websites she visits, what links she clicks on, or what she downloads. She says that it is impossible for Macs to get viruses because the operating system is sandboxed. Is she correct? A. Yes, it is impossible for a Mac to become infected with any malware. B. No, a Mac can get a virus and be affected just as bad as a PC. C. No, a Mac can get a virus but it is not susceptible to any other type of malware. D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine. Reset Next passwords for a popular online website. Where should they direct their attack? A. a bank B. a server C. a removable USB drive D. a laptop

Answers

Since  Elizabeth says that it is impossible for Macs to get viruses because the operating system is sandboxed. The response is D. No, a Mac can still get viruses, but the viruses cannot get to the heart of the machine.

The place that they should direct their attack is option B. a server.

What is Mac's server name?

Go to Apple menu > System Settings, select General from the sidebar, and then select About from the right-hand menu on your Mac. The name of your Mac's computer can be found at the top of the About settings page (you might need to scroll down).

Malware can infect a Mac computer. Macs are susceptible to malware and viruses. Even while Mac infections are less frequent than PC malware, Mac machines aren't completely shielded from online dangers by the security mechanisms built into macOS.

Note that Sandboxing is widely used to analyze untested or untrusted code and is intended to stop dangers from entering the network. In order to prevent infection or damage to the host computer or operating system, sandboxing keeps the code confined to a test environment.



Learn more about viruses  from

https://brainly.com/question/26128220
#SPJ1





implement an algorithm to find the shortest path from the start node to the end node using an a* (a-star) heuristic search. use the straight-line distance to the end node as a heuristic function. show your pseudo code for this algorithm. is this an admissible heuristic function? why or why not?

Answers

The best pathways to all extended nodes are found by an A* using a consistent heuristic, with the result that g(n) = g*(n) for all expanded n. A method for step-by-step program execution is called an algorithm.

An algorithm (/aelrm/ (listen)) is a finite sequence of exact instructions used to solve a class of particular problems or carry out a calculation in mathematics and computer science. For performing calculations and processing data, algorithms are employed as specifications.

Advanced algorithms can do automated deductions (also known as automated reasoning) and employ logical and mathematical checks to reroute the execution of the code along several paths (referred to as automated decision-making). Alan Turing was the first to use terminology like "memory," "search," and "stimulus" to describe human traits as metaphorical descriptions of machines.

A heuristic, on the other hand, is a problem-solving strategy that, particularly in issue domains, may not be fully stated or may not guarantee correct or ideal solutions.

To know more about algorithm click here:

https://brainly.com/question/21172316

#SPJ4

write a select statement that lists all of the orders that included the fender precision select the order id, product id, product name, and order date sort the result by the product name in ascending order.

Answers

The select statement is SELECT product_code, product_name, list_price, discount_percent FROM products Order BY list_price DESC.

A SELECT query fetches 0–N rows from a set of tables or views in a database. The most frequently used data manipulation language (DML) command in most applications is SELECT statement. Due to the declarative nature of SQL, SELECT queries only indicate the result set they are looking for and not the methodology for doing so.

The query is converted by the database into a "query plan," which can differ depending on the execution, database version, and database software. The "query optimizer" capability is in charge of determining the query's optimal execution plan within any relevant limitations.

Because it can only access data in the database, the SELECT statement is a constrained type of DML query.

To know more about database click here:

https://brainly.com/question/6447559

#SPJ4

true or false? ux designers should consider only current internet users when designing user experiences

Answers

UX designers should consider only current internet users when designing user experiences is a false statement.

What does UX design really entail?

The method design teams employ to produce products that offer customers meaningful and pertinent experiences is known as user experience (UX) design. UX design includes components of branding, design, usability, and function in the design of the full process of obtaining and integrating the product.

Note that Making a product or service functional, pleasurable, and accessible is the responsibility of the UX designer. Although many businesses create user experiences, the phrase is most frequently connected to digital design for websites and mobile applications.

Therefore, Note also that UX design is a rewarding career, yes. UX Designers are one of the most sought-after jobs in technology since they are involved at so many phases of a project's life cycle.

Learn more about UX designers from

https://brainly.com/question/898119


#SPJ1

by default, the count function uses the distinct keyword when counting the values contained in a column. (true or false?)

Answers

the count function uses the distinct keyword when counting the values contained in a column is False.

What is count function?

The COUNT function counts the number of arguments in the list as well as the number of cells that contain numbers. Get the number of entries in a number field that is part of a range or array of numbers by using the COUNT function.

If we want to keep track of the number of cells in a particular range, it is helpful as a financial analyst when analyzing data.

Formula:

=COUNT(value1, value2,...)

Where:

Value1 is the initial item, cell reference, or range for which we want to count numbers (mandatory argument).

Value2... (optional parameter) - We can specify up to 255 extra items, cell references, or ranges to count numbers in.

Keep in mind that this function will just count numbers and disregard all other input.

Learn more about count function click here:

https://brainly.com/question/2945487

#SPJ4

write a c function (along with helper functions) that takes an unordered array of integers (with at least one value) and another integer value pivot and creates a new array of the same length that contains all the elements smaller than pivot followed by all the elements larger or equal to pivot

Answers

This function uses the final element as the pivot, positions the pivot element correctly in the sorted array, and positions all smaller elements to the left of the pivot and all larger elements to the right of the pivot.

QuickSort is a Divide and Conquer algorithm, just like Merge Sort. It chooses an element to act as a pivot and divides the supplied array around it. There are numerous variations of quickSort that select pivot in various ways.

As a rule, choose the first component as the pivot.

Always choose the final component as the pivot (implemented below)

Choose a pivot that is at random.

Decide on median as your pivot.

Partitioning is quickSort's primary operation (). The goal of partitions is to arrange an array with element x serving as the pivot so that all other elements smaller than x are placed before x and all other elements larger than x are placed after x in a sorted array.

To know more about quickSort click here:

https://brainly.com/question/17143249

#SPJ4

ext that was transformed into unreadable gibberish using encryption is called group of answer choices encryption text. private text. ciphertext. plaintext.

Answers

Answer: ext that was transformed into unreadable gibberish using encryption is called: Ciphertext.

Explanation: Ciphertext is the result of an encryption algorithm being applied to a plaintext message.

suppose that list is an array of 10 components of type int. which of the following codes correctly outputs all the elements of list?

Answers

In C++ suppose that list is an array of 10 components of Type int. The codes that correctly outputs all the elements of list is (Option C) given below:

for (int j = 0; j <= 9; j++)

cout << list[j] << " ";

cout << endl;

What is an Array?

Array programming in computer science refers to methods that allow operations to be applied to a whole collection of values at once. These kinds of solutions are frequently employed in scientific and technical contexts.

Arrays are utilized when several variables of the same type must be used. It is defined as a succession of items of the same data type. It is used to hold a group of data, and it is more practical to conceive of an array as a group of variables of the same class.

Learn more about codes:
https://brainly.com/question/1603398
#SPJ1

Full Question:

In C++ suppose that list is an array of 10 components of type int. Which of the following codes correctly outputs all the elements of list?

A)

for (int j = 1; j < 10; j++)

cout << list[j] << " ";

cout << endl;

B)

for (int j = 1; j <= 10; j++)

cout << list[j] << " ";

cout << endl;

C)

for (int j = 0; j <= 9; j++)

cout << list[j] << " ";

cout << endl;

D)

for (int j = 1; j < 11; j++)

cout << list[j] << " ";

cout << endl;

which features are important when you plan a program? select 4 options. responses knowing how to find the result needed. knowing how to find the result needed. knowing what you want the program to do. knowing what you want the program to do. knowing what information is needed to find the result. knowing what information is needed to find the result. knowing what the user needs the program to accomplish. knowing what the user needs the program to accomplish. knowing how many lines of code you are allowed to use. knowing how many lines of code you are allowed to use.

Answers

The important features when you plan a program are:

Knowing what the user needs the program to accomplish.Knowing how to find the result needed.Knowing what information is needed to find the result.Knowing what you want the program to do

What are the steps to create a programme?

The selection of project objectives and the formulation of a statement of work that outlines the project or program priorities and activities to be executed by the project partners are all part of planning and programming. At a minimum, the procedure will include: The project or program description.

The steps  to create

Define what the program should do. Visualize the program running on the computer. Use design tools to create a model of the program. Check the model for logical errors. Write the program source code. Compile the source code. Correct any errors found during compilation.

To learn more about program refer to:

https://brainly.com/question/23275071

#SPJ4

write a method called wordwrap that accepts a scanner representing an input file as its parameter and outputs each line of the file to the console, word-wrapping all lines that are longer than 60 characters. for example, if a line contains 112 characters, the method should replace it with two lines: one containing the first 60 characters and another containing the final 52 characters. a line containing 217 characters should be wrapped into four lines: three of length 60 and a final line of length 37.

Answers

A string that reaches a certain length is wrapped into new lines using the wordwrap() method.

Word wrap format: what is it?Word processing programs have a feature called "word wrap" that forces all text to fit inside specific margins.You can add line breaks from blocks of text with this online text wrap and line break tool. Use it to wrap the given text to a specified amount of characters. Text input: Text Warp: Text Wrap.When necessary, the multiline Textbox control's Word Wrap settings determine whether it should automatically wrap words to the start of the next line.A string that reaches a certain length is wrapped into new lines using the word wrap() method. It should be noted that this function might leave blank spaces at the start of lines.    

To learn more about Word wrap refer to:

https://brainly.com/question/26721412

#SPJ4

Drivers are concerned with the mileage obtained by their automobiles. one driver has kept track of several tankfuls of gasoline by recording miles driven and gallons used for each tankful. develop a sentinel-controlled-repetition script that prompts the user to input the miles driven and gallons used for each tankful. the script should calculate and display the miles per gallon obtained for each tankful. after processing all input information, the script should calculate and display the combined miles per gallon obtained for all tankfuls (that is, total miles driven divided by total gallons used)

Answers

CODE:

 result=[]  #declare an empty list

while True:   #loop until break

   gallons = float(input("enter the gallons used(-1 to end)")) #take no.of gallons from user  enter -1 to exit

   if gallons < 0 : break  #if -1 is entered break the loop

   miles=float(input("enter the miles"))  #take no.of miles from input

   m=miles/gallons   #calculate miles per gallon

   print('The miles/gallon for this tank is ',m)  #print miles per gallon

   result.append(m)   #add the miles per gallon to list

print("The overall average miles/gallon was",sum(result)/len(result)) #calculate average miles per gallon for all tanks

OUTPUT:

 

enter the gallons used(-1 to end)12.8

enter the miles287

The miles/gallon for this tank is  22.421875

enter the gallons used(-1 to end)10.3

enter the miles200

The miles/gallon for this tank is  19.41747572815534

enter the gallons used(-1 to end)5

enter the miles120

The miles/gallon for this tank is  24.0

enter the gallons used(-1 to end)-1

The overall average miles/gallon was 21.946450242718445

You can learn more through link below:

https://brainly.com/question/27491038#SPJ4

Other Questions
it takes the blacksburg shipyard twenty weeks with 200 workers to build an airplane. material costs are $15 million and overhead costs are $1.5 million. workers cost $35 per hour including benefits and work 40 hours per week. each airplane sells for $50 million. what is the multifactor productivity ratio? group of answer choices less than 1.0 greater than 2.0 but less than or equal to 3.0 greater than 1.0 but less than or equal to 2.0 greater than 3.0 Prior to the 20th century, the most common explanation of inheritance can best be described as?. what arethe bankruptcy abuse prevention and consumer protection act of 2005 requires both petition counseling. If the ozone in the atmosphere were to be destroyed, which of the following effects would you expect NOT to occur?Group of answer choicesThe thermal structure of the atmosphere would changeMore shortwave radiation would penetrate the atmosphereDecrease in the receipt of ultraviolet radiation at the surfaceAll of these would occur Which sector would make the most sense for someone who intends to create their own line of apparel and handmade jewelry? 1.) Tech Product2.) Education3.) Physical Product 4.)Service what are the four major groups of mollusks? give examples of each group. which one is distinctly different than the others? A single tube that carries urine from the urinary bladder to the exterior allows the urine to pass through _______________ to get to the exterior. which ion has the largest radius and which ion has the smallest radius in an isoelectronic series? why? There are 0.05216 mol ZnSO4 and 0.3609 mol H2O in the sample. Step 3: Divide each by the smallest number of moles to get the ratio. What is the ratio of ZnSO4:H2O? [?] mol ZnSO4: [?] mol H2O What effect might a young child's illness have on theparents, childcare staff, and health professional? For 201, after reading the lesson, choose and complete one of the labs on pg 8. Be sure to take any and all safety precautions and fill out the entire Lab Report.Use this link for the Teacher-made Template & Video Walkthrough.Understanding Energy Transfer & Properties of Water video (she speaks slow, so feel free to increase the speed)Remember: Unequally shared Covalent Bonds between the 1 Oxygen and the 2 Hydrogen atoms within a single water molecule create the partially Negative Oxygen side and the partially Positive Hydrogen side. This is how water is a Polar Molecule, which accounts for how the Hydrogen Bonds form between different water molecules, giving water the ability of Cohesion & Surface Tension, while also allowing those charges to tear apart other molecules making water a Universal Solvent.Important tips:When writing a Hypothesis, try to turn it into an "If..., then..." statement. It shows that you're making a testable prediction.Variables. Here's a trick to remembering Independent vs Dependent and what they do since we need to say which is which:Use DRY MIXDRY: D = Dependent, R= Response (what is/ has changed), Y = Y-axis of the graphMIX: M = Manipulated (What I change as the scientist),I = Independent, X = X-axisConclusion: When writing a conclusion, take any question prompts you are given and turn the answers into a paragraph. Note: Always refer back to specific Data. not all countries in europe are currently participating in the move to a single european currency, called the euro. how has monetary unification changed the ability of each country that is currently a participant to conduct independent countercyclical monetary policy? it had been rumored that greece would like to exit the euro. what benefits could greece gain in such a move? which is not a responsibility of a member of the house of representatives a. casework b. looking out for their constituency in terms of things like pork-barrell c. passing laws in the national interest d. all of the choices are correct You are fighting with your sibling over a 2 kg toy. you apply a force of tension on the toy equal to 8n. your sibling causes the toy to experience an acceleration of 4m/s2 in the opposite direction. what is the net force that the toy feels? 3. referring to your textbook terms, what factors might make the prisoners attribute brutality by the guards to their character, rather than to the situation the guards were in? which is not a sympathetic ganglion? which is not a sympathetic ganglion? superior mesenteric otic inferior mesenteric celiac sacral chain a spiral spring loaded with a piece of metal extends by 9.4cm. when the metal is fully immersed in water, the spring extends by 3.5cm. assuming Hooke's law is obeyed, calculate the relative density of the metal describe the trend in first ionization energy of Group 18 elements as the atomic number increases Describe the reaction of the other animals to the song the probability that a single radar station will detect an enemy plane is 0.65. (a) how many such stations are required to be 98% certain that an enemy plane flying over will be detected by at least one station? stations (b) if four stations are in use, what is the expected number of stations that will detect an enemy plane? (round your answer to one decimal place.)