what is phishing? what are the three types of phishing discussed in the activity

Answers

Answer 1

Phishing is a serious cyber threat that can result in identity theft, financial loss, and other harmful consequences.

Phishing is a fraudulent activity where an attacker, posing as a trustworthy entity, attempts to obtain sensitive information such as login credentials, credit card details, and other personal information from unsuspecting individuals. Phishing attacks are usually carried out through email, social media, and instant messaging.

There are three main types of phishing attacks that were discussed in the activity. The first type is called spear phishing, which targets a specific individual or organization. The second type is called whaling,  that targets high-profile individuals such as executives and government officials. The third type is called pharming, which is a more sophisticated form of phishing that involves redirecting users to a fake website without their knowledge.

To know more about Phishing visit:

https://brainly.com/question/24156548

#SPJ11


Related Questions

Select all statements from the given choices that are the negation of the statement:
Michael's PC runs Linux.
Select one or more:
a. It is not true that Michael's PC runs Linux.
b. It is not the case that Michael's PC runs Linux.
c. None of these
d. Michael's PC runs Mac OS software.
e. Michael's PC runs Mac OS software and windows.
f. It is false that Michael's PC runs Linux.
g. Michael's PC doesn't run Linux.
h. Michael's PC runs Mac OS software or windows.
i. Michael's PC runs Windows

Answers

The statements that are the negation of "Michael's PC runs Linux" are: a. It is not true that Michael's PC runs Linux. b. It is not the case that Michael's PC runs Linux. d. Michael's PC runs Mac OS software. e. Michael's PC runs Mac OS software and windows. f. It is false that Michael's PC runs Linux. g. Michael's PC doesn't run Linux. h. Michael's PC runs Mac OS software or windows. i. Michael's PC runs Windows.

The negation of a statement is the opposite or contradictory statement. In this case, the statement "Michael's PC runs Linux" can be negated in multiple ways.

Options a, b, f, and g all express the negation by denying the truth of the original statement. Option d states that Michael's PC runs Mac OS software, which contradicts the statement that it runs Linux. Option e extends the negation by adding the condition that Michael's PC runs both Mac OS software and Windows, further diverging from the original statement. Option h also offers a contradictory statement by stating that Michael's PC runs either Mac OS software or Windows, but not Linux. Finally, option i simply states that Michael's PC runs Windows, which excludes Linux.

In summary, options a, b, d, e, f, g, h, and i all provide statements that negate the original claim that Michael's PC runs Linux.

Learn more about software.

brainly.com/question/32393976

#SPJ11

Computer integrated manufacturing includes all of the following technologies except a. robotics b. materials requirements planning c. automated storage and retrieval systems d. computer aided design

Answers

Computer-integrated manufacturing (CIM) is a process of using computer technology to automate and integrate different manufacturing processes. It is an approach that enables manufacturers to improve their production efficiency, reduce costs, and increase productivity. The goal of CIM is to connect different manufacturing processes into one automated system


CIM includes several technologies that work together to automate different manufacturing processes. Some of the technologies that are included in CIM are robotics, materials requirements planning, automated storage and retrieval systems, and computer-aided design. Each of these technologies has its unique role to play in the CIM process.
Robotics, for example, involves the use of robots to perform manufacturing tasks that are repetitive or dangerous for humans. Materials requirements planning, on the other hand, is a system for managing the materials needed for production, including raw materials, finished goods, and work in progress. Automated storage and retrieval systems are used to automate the storage and retrieval of materials, tools, and products, while computer-aided design is used to create digital models of products and simulate manufacturing processes.
However, among these four technologies, computer-aided design is the only one that is not included in CIM. Computer-aided design is a technology that is used to create digital models of products, and it is often used in the product design phase before the manufacturing process begins. While it is an essential part of the manufacturing process, it is not a part of CIM, which focuses on the automation and integration of manufacturing processes.

Learn more about digital models here:

https://brainly.com/question/18711192

#SPJ11

what is computer development mean​

Answers

Answer:

Computer development refers to the ongoing process of advancements and improvements in the field of computers and their associated technologies. It involves the evolution of hardware, software, and systems that make up modern computing devices. Computer development encompasses a wide range of areas, including computer architecture, programming languages, operating systems, networking, artificial intelligence, and more.

Computer development can be understood from two perspectives:

Hardware Development: This aspect focuses on the design, manufacturing, and enhancement of computer components and devices. It involves innovations in areas such as processors, memory, storage devices, input/output devices, graphics cards, and other hardware components. Hardware development aims to improve the speed, efficiency, reliability, and capabilities of computers.

Software Development: This aspect involves creating, modifying, and optimizing software programs and systems that run on computers. It encompasses the development of operating systems, application software, programming languages, algorithms, and frameworks. Software development aims to provide new functionalities, enhance user experiences, and improve the efficiency and security of computing systems.

Both hardware and software development are interconnected and influence each other. Advancements in hardware often drive the need for software innovations to leverage the capabilities of new hardware, and vice versa. The continuous development of computers has led to significant improvements in processing power, storage capacity, connectivity, and the overall capabilities of computing devices. These advancements have transformed various aspects of our lives, including communication, entertainment, healthcare, education, business, and scientific research.

Explanation:

Explanation:

computer development means the act of computer to develop effectively

an application receiving data on a stream socket must call recv() repeatedly to assure that all transmitted data has been received. an application receiving data on a datagram socket needs to call recvfrom() only once to receive the entire message. why?

Answers

An application receiving data on a stream socket must call recv() repeatedly to assure that all transmitted data has been received. An application receiving data on a datagram socket needs to call recvfrom() only once to receive the entire message because datagram sockets deliver messages as a complete unit, whereas stream sockets deliver data in a continuous stream.

Stream sockets, also known as connection-oriented sockets, provide a reliable, ordered, and error-checked data transmission mechanism. The data transmitted over a stream socket is treated as a continuous stream of bytes, and the receiver must call the recv() function repeatedly until all the data has been received. On the other hand, datagram sockets, also known as connectionless sockets, provide an unreliable, unordered, and un-checked data transmission mechanism.

The data transmitted over a datagram socket is delivered as a complete message, and the receiver can retrieve the entire message by calling the recvfrom() function only once. However, because datagram sockets are unreliable, it is up to the application to ensure that the entire message has been received correctly.

You can learn more about socket at

https://brainly.com/question/29405031

#SPJ11

what are the methods used in research methodology?

Answers

Experiments. ...
Surveys. ...
Questionnaires. ...
Interviews. ...
Case studies. ...
Participant and non-participant observation. ...
Observational trials. ...
Studies using the Delphi method.

write an abstract about data encryption standard

Answers

Answer:

The Data Encryption standard is used to protect electronic data. DES algorithm uses symmetric block cipher for encrypting and decrypting data. Encryption converts data into gibberish language called cipher text. Decrypting the cipher text gives us back the original data that is plaintext. is also a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). 6.1.1 History In 1973, NIST published a request for proposals for a national symmetric-key cryptosystem. A proposal from IBM, a modifi cation of a project called Lucifer, was accepted as DES.

Explanation:

if this works can i have brainliest

In the list [0, 13, 5.4, "integer"], which element is at index 2?
A.0
B.13
C.5.4
D.“integer”

Answers

Answer: C) 5.4

The index starts at 0

index 0 = 0index 1 = 13index 2 = 5.4index 3 = "integer"

If there are n elements in a list, then the index ranges from 0 to n-1.

Create a C++ program to compute the average of three tests or quizzes and display the score and average on distinct lines, and do it using arithmetic operators.

Answers

#include <iostream>

#include <vector>

#include <numeric>

int main() {

   

   std::vector<int> store(3);

   

   for(int i=0;i<3;i++){

       std::cout << i+1 << ". test result: ";

       std::cin>>store[i];

   }

   

   for(int i=0;i<3;i++) {

       std::cout << i+1 << ". test score: " << store[i] << std::endl;

   }

   

   std::cout << "Average: " << double(std::accumulate(store.begin(),store.end(),0.0)/store.size()) << std::endl;

   return 0;

}

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

If the range_lookup argument to the VLOOKUP function is set to TRUE, then the leftmost column of the table_array argument must be in ascending order.Group of answer choicesTrueFalse

Answers

In Microsoft Excel, the leftmost column of the table_array argument must be in an ascending order when the range_lookup argument to the VLOOKUP function is set to TRUE.

What is VLOOKUP function?

A VLOOKUP function can be defined as a type of function that is typically used to look up a value in a specific column in Microsoft Excel.

In Microsoft Excel, the leftmost column of the table_array argument must be in an ascending order when the range_lookup argument to the VLOOKUP function is set to TRUE.

This ultimately implies that, you have to sort the leftmost column of the table_array argument in an ascending order (a through z), in order to get the right results when the range_lookup argument to the VLOOKUP function is set to TRUE.

Read more on VLOOKUP here: https://brainly.com/question/16986179

Create an ERD for a database that describes a criminal enterprise for which you are the kingpin. This could be for arms smuggling, bookmaking, textbook publishing, starting a social media company and stealing everyone's data... whatever you like. The important elements are the entities and the cardinality of the relationships between them. Include enough detail to explore the capabilities of the tool and to demonstrate that you learned something.

Answers

The ERD for the criminal enterprise's database is an important tool for identifying, capturing, and interpreting information related to the enterprise's entities and their relationships.

An entity-relationship diagram (ERD) is a model that depicts the relationships between entities in a database. In this scenario, we'll be developing an ERD for a criminal enterprise, with the kingpin as the central figure. The ERD will illustrate the entities involved in the enterprise as well as their relationships. We will begin by identifying the entities and then describing their relationships in terms of cardinality. We'll also keep track of any additional information that may be useful in building the enterprise's database.

In conclusion, the ERD for the criminal enterprise's database is an important tool for identifying, capturing, and interpreting information related to the enterprise's entities and their relationships.

To know more about entity-relationship diagram  visit:

brainly.com/question/33440190

#SPJ11

In a circular array-based implementation of a queue, what is the performance of the enqueue operation if you amortize the cost of resizing the array over all additions to the queue? a) O(1). b) O(n). c) O(log n). d) O(n2).

Answers

In a circular array-based implementation of a queue, the performance of the enqueue operation, when amortizing the cost of resizing the array over all additions to the queue, is O(1).

So, the correct answer is A.

This means that the average time complexity of enqueue remains constant, regardless of the number of elements in the queue.

The array is resized occasionally, but since the cost of resizing is distributed over several enqueue operations, the overall average performance remains constant.

Therefore, the correct answer is A) O(1).

Learn more about array at https://brainly.com/question/30891643

#SPJ11

Match the items (Companies) in the left-hand column, to the most appropriate item in the right-hand column. Motorola [Choose ] [Choose ] Just-in-Time Six Sigma ERP TORC Driverless Vehicles Toyota [Choose ] SAP [Choose ]

Answers

The defect levels reported by Motorola in their Six Sigma program were higher than expected because of the nature of their processes following an exponential distribution.

This means that Motorola only allowed for failure in one tail of the distribution, which increases the likelihood of failure and causes the defect levels to be higher than the standard normal table's capability calculations.

Additionally, Motorola had not accounted for a 1.5 sigma shift in the mean, which also contributed to the higher defect levels. Through their Six Sigma efforts, Motorola found that their process variation had increased, which explains why their defect levels were higher than expected.

To learn more about six sigma program refer :

brainly.com/question/30269340

#SPJ4

Look at the options below. Which one is a simulation?

Look at the options below. Which one is a simulation?
Look at the options below. Which one is a simulation?
Look at the options below. Which one is a simulation?
Look at the options below. Which one is a simulation?

Answers

Im going to guess the 2nd one.

The 1st one just shows how trees can make ____ and then goes to water, the sun, then the rain but it CAN be used as one.

The 2nd one seems to explain the best it can show about weather, water, landforms, the sun, and seems like a better one to choose.

With ______ voice mail, users can view message details, and in some cases read message contents without listening to them.

Answers

Answer:

Your answer is...

Visual.

With visual voicemail, users can view message details, and in some cases read message contents without listening to them.

I hope this helped at all.

40) The Museum of Natural History in Aarhus, Denmark uses ________ to collect detailed information about visitors' use of the exhibits to help determine visitors' behavior to identify high-demand exhibits.
A) group decision systems
B) algorithms
C) RFID
D) expert systems

Answers

C) RFID. The Museum of Natural History in Aarhus, Denmark uses RFID technology to collect detailed information about visitors' use of the exhibits to help determine visitors' behavior and identify high-demand exhibits.

Tags and readers are the two halves of the wireless system known as Radio Frequency Identification (RFID). The reader is an electronic gadget with one or more antennas that transmit radio waves and take in signals from RFID tags. Tags can be passive or active, using radio waves to transmit their identity and other information to adjacent readers. Without a battery, passive RFID tags are powered by the reader. Batteries are used to power active RFID tags. RFID tags can contain a variety of data, ranging from a single serial number to many pages of information. Readers can be fixed on a post or suspended from the ceiling, or they can be portable so they can be carried by hand.

Learn more about museum here-

https://brainly.com/question/28053036

#SPJ11

HURRY GIVING BRAINLIEST AND ALL MY POINTS and I only have 40


Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:


1. Decide on the message you would like to display to the screen. Some ideas include:

1. Your favorite book title or TV show and why you like it

2. A few sentences sharing information about you

3. Your favorite sport and team or athlete

4. Use two variables to store your message.

Answers

Answer:

Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:

1. Decide on the message you would like to display to the screen. Some ideas include:

1. Your favorite book title or TV show and why you like it

2. A few sentences sharing information about you

3. Your favorite sport and team or athlete

4. Use two variables to store your message

Explanation:

Answer:

A few sentences about you .

Explanation:

describe the difference between explicit typed variables and implicit typed variables using examples. in large scale applications, explain whether or not explicit declaration has a better impact over implicit declaration.

Answers

Although implicit typing can make the code shorter and more concise, the advantages of explicit typing in terms of readability, maintenance, and error prevention usually outweigh its benefits in large-scale applications.

Describe the difference between explicit typed variables and implicit typed variables?

The difference between explicit typed variables and implicit typed variables involves how the data type is specified during variable declaration.

In explicit typing, you explicitly declare the data type of a variable when it's defined. For example:

```csharp
int num = 42;
string text = "Hello, world!";
```

Here, the data types 'int' and 'string' are explicitly stated before the variable names 'num' and 'text', respectively.

In implicit typing, you use the 'var' keyword and let the compiler determine the data type based on the assigned value. For example:

```csharp
var num = 42;
var text = "Hello, world!";
```

The compiler infers the data types 'int' and 'string' for 'num' and 'text', respectively, based on the values assigned.

In large-scale applications, explicit declaration tends to have a better impact over implicit declaration. This is because explicit typing:

Improves code readability: Knowing the data type of a variable immediately helps understand its purpose and usage within the code.
Avoids unintended type inference: Using 'var' might lead to the compiler inferring a data type that is not what you intended, which could cause bugs or performance issues.


Eases code maintenance: Explicitly declaring data types makes it easier to identify errors and maintain the codebase.

Although implicit typing can make the code shorter and more concise, the advantages of explicit typing in terms of readability, maintenance, and error prevention usually outweigh its benefits in large-scale applications.

Learn more about  explicit  and implicit typed variables

brainly.com/question/12996861

#SPJ11

access to opportunities at cloud kicks should be restricted. sales users should only have access to two categories of opportunities: opportunities they own, and opportunities that are tied to accounts they own. what are two actions a consultant can take to meet the requirement? choose 2 answers

Answers

The correct option are-

B. Set opportunity access on the role to view all opportunities associated with their accounts.C. Set organization-wide defaults for opportunities to Private.Explain the term cloud kicks?

Using Data Loader, Cloud Kicks (CK) is transferring Account and Contact data from just a vintage CRM system into Salesforce.

Any hosted service that is offered online is referred to as cloud computing. These services frequently consist of servers, database, software, networks, analytics, and other cloud-operated computer tools.Users of the service can access files and applications stored on the cloud from any location, doing away with the need to constantly be close to actual hardware. For instance, user-created spreadsheets and documents used to need to be saved to just a physical hard disk drive, USB device, or disc.

For the stated question-

Opportunities from cloud kicks should only be accessible to certain people. Only the opportunities they possess and the opportunities connected to the accounts they own should be available to sales users.

There are two ways a consultant can fulfil the requirement:

To examine all opportunities connected to their accounts, the role must have opportunity access set.Set Opportunities' organization-wide defaults to Private.

To know more about the cloud kicks, here

https://brainly.com/question/30087928

#SPJ4

The complete question is-

Access to opportunities at cloud kicks should be restricted. sales users should only have access to two categories of opportunities: opportunities they own, and opportunities that are tied to accounts they own.

what are two actions a consultant can take to meet the requirement? choose 2 answers.

A. Set Territory Management to grant Read access to opportunities owned by others.

B. Set opportunity access on the role to view all opportunities associated with their accounts.

C. Set organization-wide defaults for opportunities to Private.

D. Set organization-wide defaults for opportunities to Public Read-Only

Each box on a spreadsheet is called a?
row
column
cell
box

Answers

c. a cell :))
got the right answer <3

if a host uses the transport control protocol (tcp) to send data using the router in part b), what is the efficiency for the standard tcp packet header size? what is the average tcp throughput?

Answers

If a host is using the transport control protocol (TCP) to send data through the router mentioned in part b), the efficiency for the standard TCP packet header size would depend on the size of the packet being sent. The standard TCP packet header size is 20 bytes, which means that if the packet being sent is smaller than 20 bytes, the efficiency would be lower as more data would be taken up by the header.

In terms of the average TCP throughput, this would depend on various factors such as the bandwidth of the network, the latency, and the congestion control algorithms being used. TCP is designed to adapt to changing network conditions and optimize throughput accordingly. Therefore, it is difficult to give a specific average TCP throughput without more information about the network and the data being sent.

To know more about TCP packet visit:

brainly.com/question/29562357

#SPJ11

In addition to file sharing and print sharing, a home server PC's basic roles include _______________.A.media streamingB.virtualizationC.video editingD.audio editing

Answers

The fundamental functions of a home server PC include file and print sharing, media streaming, virtualization, video editing, and audio editing.

A home server PC is a versatile tool that can fulfill a variety of roles beyond just file and print sharing. Some of the basic roles include media streaming, which allows you to stream music, videos, and other media files to other devices in the home network. Virtualization enables you to create and manage virtual machines on a single physical server, while video editing requires a more powerful system with specialized software. Similarly, audio editing requires specialized software and hardware. Overall, a home server PC can be a powerful tool for a variety of tasks beyond basic file and print sharing.

Learn more about Home server PC roles here.

https://brainly.com/question/13262932

#SPJ11

list three advantages of using computers for weather forecasting instead manual system

Answers

Answer:

1.enhace the speed and accuracy of work

2.Large historical data can be stored easily for future use.

3.Quick calculation and display of graphical and mathematical data.

Weather forecasting is a method of predicting how much climate is like in a certain location through using technology and scientific understanding to make meteorological measurements.Supercomputers at the NWS hold numerical simulation information for the climate prediction model. The software makes use of practically all the observational data that the NWS collects. Spacecraft, weather balloons, buoys, radar, and more provide the information.

Advantages:

The ability to retain or retrieve enormous amounts of past data.The ability to quickly combine data from numerous sites to monitor changes.Ability to swiftly create data visualization to make information accessible.

Learn more:

weather forecasting: brainly.com/question/12516408

list three advantages of using computers for weather forecasting instead manual system

1. How many lines would be required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm? What would the actual display tolerance be for this number of lines?

Answers

The number of lines required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm, we can calculate the circumference of the circle and divide it by the desired display tolerance.

Circumference of the circle = π * diameter

= π * 200 mm

Number of lines required = Circumference of the circle / Display tolerance

= (π * 200 mm) / 0.1 mm

To find the actual display tolerance for this number of lines, we divide the circumference of the circle by the number of lines:

Actual display tolerance = Circumference of the circle / Number of lines

= (π * 200 mm) / (Circumference of the circle / Display tolerance)

= Display tolerance

Therefore, the actual display tolerance for the calculated number of lines will be equal to the desired display tolerance of 0.1 mm. In summary, the number of lines required to display a circle of diameter 200 mm within a display tolerance of 0.1 mm is determined by dividing the circumference of the circle by the display tolerance. The actual display tolerance for this number of lines remains at 0.1 mm.

Learn more about tolerance calculations here:

https://brainly.com/question/30363662

#SPJ11

You create a new microflow from within the properties window of a button. your new microflow has a parameter with an object. what does this mean?

Answers

A parameter is a certain kind of variable that is utilized as an intake for the microflow.

What is microflow?Fluid passing through a microscale device is referred to as a microflow (plural: microflows). Nanoflows are another Mendix concept used for offline apps that run in the Mendix client. Microflows give us the ability to communicate the application's logic. A microflow can show pages, make decisions, and conduct actions such as creating, updating and removing items. The microflow actions are recorded using microflow expressions. Microflow expressions are used to specify a database query. Microflow expressions are used to modify, verify, and extract information from the values that are already there. Microflow consists of three parts: Activity, Exclusive split, and Parameter.

To learn more about parameter, refer to:

https://brainly.com/question/13794992

#SPJ4

Prezi is a web based presentation software that contains animations.
True
False

Answers

Answer:

True

Explanation:

Because Prezi is used for presentations and also contains animations.

How does a packet get delivered in a network?

Answers

When data is sent over a network, it is broken down into smaller pieces called packets. These packets contain the data being sent along with information about its destination, such as the IP address of the device it is intended for.

A packet gets delivered in a network through a process called routing. A router is a networking device that is responsible for directing packets from one network to another. When a packet is sent from one device to another, it first goes to the default gateway of the sending device.

The default gateway is the router that the device is connected to. The router then checks the packet's destination IP address to determine the next hop on the path to the destination device. This process is repeated at each router along the way until the packet reaches its destination.Once the packet has reached its destination, it is reassembled into the original data.

Overall, the delivery of a packet in a network involves multiple routers working together to direct the packet to its destination. The process of routing is essential for ensuring that data is sent quickly and reliably over a network.

Know more about the routing

https://brainly.com/question/27960570

#SPJ11

Which Access 2016 view shows the contents of a table as a datasheet? a. Design view b. Datasheet view c. Form view d. Table view.

Answers

The Access 2016 view that shows the contents of a table as a datasheet is the Datasheet view. The correct answer is option b.

Access 2016 is a relational database management system that allows users to store and manipulate large amounts of data. When working with tables in Access 2016, there are different views available to help users manage the data.

The Design view is used to create and modify the structure of a table, including its fields, data types, and relationships with other tables. This view is not used to view the contents of a table.

The Table view displays the contents of a table in a grid format, with each row representing a record and each column representing a field. However, this view does not provide the same level of functionality as the Datasheet view.

The Form view allows users to enter and edit data in a more user-friendly format. Forms can be customized to display specific fields and can include additional features such as drop-down menus and validation rules.

The Datasheet view is the view that shows the contents of a table as a datasheet, which is a grid format similar to the Table view. However, the Datasheet view provides additional functionality, such as sorting, filtering, and searching for specific data within the table. This view is commonly used for data entry and manipulation in Access 2016.

To learn more about database management system: https://brainly.com/question/24027204

#SPJ11

assslainsdffddsvvdesdssbhasasco5m

Answers

Hahahahaha I wanna was the day I wanna was the last time I got to
Uh okay?- Ksnsjsbwns del

Write a program that gets a list of integers from input, and outputs non-negative integers in ascending order (lowest to highest). Ex: If the input is: 10 -7 4 39 -6 12 2 the output is: 2 4 10 12 39

Answers

Answer:

Following are the code to this question:

#include <iostream>//defining header file

using namespace std;

int main()//defining main method

{

   int a[]={10,-7,4,39,-6,12,2};//defining single deminition array and assign value

   int i,x,j,t; //defining integer variable

   cout<<"Before sorting value: ";  

   for(i=0;i<7;i++) //using loop to print value

   {

       cout<<a[i]<<" ";//print value

   }

   cout<<endl <<"After sorting value: ";

   for(i=0;i<7;i++)//defining loop to sort value

{  

 for(j=i+1;j<7;j++)//count array value

 {

  if(a[i]>a[j]) //defining condition to inter change value

  {

      //performing swapping

   t=a[i];  //integer variable t assign array value

   a[i]=a[j];//swapp value

   a[j]=t;//assign value in array

  }

 }

}

for(i=0;i<7;i++) //defining loop to print value

   {

       if(a[i]>=0) //defining condition to check positive value  

       {

       cout<<a[i]<<" ";//print value

       }

   }

   return 0;

}

Output:

Before sorting value: 10 -7 4 39 -6 12 2  

After sorting value: 2 4 10 12 39  

Explanation:

Following are the description to the above code:

In the above program code, Inside the main method, an array a[] is declared that assign some value, and another integer variable "i, j, x, and t" is declared, in which variable "i and j" are used in the loop, and "x, t" is used to sort value.In the next step, three main for loop is declared, in which the first loop is used to print array value.In the second loop, inside another loop is used that sorts array values.In the last loop, a condition is defined, that check the positive value in the array and print its values.

Answer:

integers=[]

while True:

      number=int(input())

      if number<0:

       break

      integers.append(number)  

print("",min(integers))

print("",max(integers))

Explanation:

Other Questions
Consider thesolubility curve atright. Which gashas the greatestsolubility at 90 C?A. Substance AC. Substance D100908070Solute per 100 g of HO (g),605040ABB. Substance CD. Substance BO.30201000 10 20 30 40 50 60 70 80 90 100Temperature (C)C Write an equation in slope-intercept form for the line that passes through and is parallel to the line described by y = 2x +3 incorporating paraphrasing restating or generating in new form information that is already After Bradburn violated the mediation attempt, what course of action did Texan citizens embark upon? All of the energy comes from the sun but ______________ capture this energy.(Copy pasted)Please answer O'Reilly's Restaurant has advertised an opening for a cashier. The hours listed are Monday, Tuesday, and Friday from 4 to 10 p.m. The job pays $7.58 an hour.How much is this per week?$181.92$136.44$113.70$45.48 Marco climbed 2 feet down a ladder. He then climbed down4 more feet. Write a subtraction equation and an equivalentaddition equation to represent this situation. What was the totalchange in Marcos elevation? Solve the system of equations by graphing on a separate sheet of paper. Write your solutions as ordered pairs from least to greatest with respect to the x-coordinate.y=x2+6x+4 y=x Who was Thales In geometry? Faye is making muffins. The recipe calls for 1/2 cup of walnuts to sprinkle on the tops of the muffins. Faye plans to put nuts on only 1/4 Muffins.Write and expression for the amount of walnuts Faye needs for 1/4 of the muffinsPLEASE I REALLY NEED HELP THIS IS IREADY PLEASE JUST NEED IT RIGHT WILL GIVE 20 POINTS!!!! bill deposits $100 at the end of each year for 13 years into fund a. seth deposits $100 at the end of each year for 13 years into fund b. fund a earns an annual effective rate of 8% for the first 5 years and an annual effective rate of 5% thereafter. fund b earns an annual effective rate of i throughout the 13 years. the two funds have equal accumulated value at the end of the 13 years. find i The chief engineer is in charge of deciding the mountainous road-network that will be kept open (cleared of debris and maintained regularly) during the winter months. Each road connects different small towns in the mountains, and all towns are connected to each other either directly or indirectly. Each road is associated with a value indicating the level of danger in maintaining that road during winter months. There are many subsets of roads such that the roads in such subsets keep the towns connected directly or indirectly. Each subset is assigned a cost of maintenance, which is directly proportional to the highest danger level of the road present in that subset. The engineer wants to select the smallest subset that keeps the towns connected directly or indirectly and that also has the lowest cost of maintenance. Develop an algorithm to find such a subset. Justify the correctness of your algorithm and derive its runtime. what does the term advertising mean in marketing brain neurotransmitters that decrease pain and produce feelings of well-being are called: Find the orthogonal decomposition of v with respect to w. v = 1-1 , w = span| | 2 | , 2 projw(v)- | | | perpw(v) = Read It TII ( Talk to a Tutor l What is the total units per insulin box (5 pens)? the finding that a list of longer words is more difficult than the same size of a group of smaller words to remember is called? group of answer choices phonological loop articulatory suppression irrelevant speech effect word length effect Question 6 of 10What was true of the Treaty of Versailles? Sin(2/3+3/5) help please HELP me with this so i dont held back