C. availability. The availability is required for information security that is addressed by implementing the plan. Availability is one of part in the CIA triad.
The elements of CIA are confidentiality, Integrity, and Availability. CIA triad is the security model that is used to guide the security's organization. Confidentiality, integrity and availability, is called as the CIA triad, refers to a concept that is used to guide policies for information security within an organization. The model is sometimes pointed to as the AIC triad (availability, integrity and confidentiality) to avoid confusion with the Central Intelligence Agency. The Central Intelligence Agency (CIA) is a civilian foreign intelligence service of the federal government of the United States, tasked with gathering, processing, and analyzing national security information from around the world, primarily through the use of human intelligence (HUMINT).
The missing part in the question can be sen below:
A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
(A) integrity
(B) scalability
(C) availability
(D) confidentiality
Learn more about CIA triad, here https://brainly.com/question/13267367
#SPJ4
corrective maintenance makes system changes to repair design flaws, coding errors, or implementation issues. group of answer choices true false
Corrective maintenance describes adjustments made to fix flaws in the system's design, coding, or implementation.
Corrective maintenance identifies and fixes problems in a system that is in use. The process of managing changes to the business requirements during the project is known as requirements management. Projects are often dynamic in nature, hence change should be anticipated and expected for a project to be completed successfully. After equipment malfunctions, corrective maintenance (CM) entails replacing or repairing it. When equipment malfunctions, CM tasks determine the malfunction (which could be an item or component of the equipment) and fix it so that the facility's production can be resumed and the equipment can be reinstated.
Learn more about system here-
https://brainly.com/question/14253652
#SPJ4
what is the problem in car mechanic dreams up a tool to erase birth
The problem in car mechanic dreams up a tool to erase birth realizing that the same gimmick could save a child who was blocked in the birth canal after removing a lost cork from a wine bottle.
What is the car mechanic issues about?Jorge Odón had the thought as he slept. He claimed that someway, while watching a You Tube video on removing a lost cork from a wine bottle, his unconscious made the connection between the parlor trick and the possibility of saving a baby who was trapped in the delivery canal.
Using a glass jar for a womb, his daughter's doll for the trapped baby, and a cloth bag and sleeve stitched by his wife as his rescuing device, Mr. Odón, a 59-year-old Argentine auto mechanic, created his first prototype in his kitchen.
Therefore, With the aid of the Odón Device, a caregiver places a plastic bag inside a greased plastic sleeve, wraps it around the baby's head, inflates it to secure it, then pulls the bag until the child is born.
Learn more about car mechanic from
https://brainly.com/question/28805218
#SPJ1
Is Linux a proprietary operating system?
Under the terms of the GNU General Public License, Linux is a free and open source operating system (GPL). The source code may be used, examined, altered, and distributed by anybody.
For desktops, servers, mainframes, mobile devices, and embedded devices, Linux is an open-source, community-developed operating system (OS) with Unix-like features.One of the most widely used operating systems, it works with almost all common computer architectures, including x86, ARM, and SPARC. These are Linux-based operating systems, sometimes referred to as "distros," and one of the most well-known of them is Ubuntu. Both servers and desktop PCs can have it installed. Ubuntu is open-source, as opposed to proprietary programs. An open system, which has publicly accessible source code and allows for updates at any level, is the antithesis of a proprietary system. Due to the fact that Linux and Android are not proprietary, there are several variations of both operating systems.
Learn more about Linux here:
https://brainly.com/question/28443923
#SPJ4
Please select the word from the list that best fits the definition. The gap between those with access to new technologies and those without.
a. the great divide
c. the knowledge-gap hypothesis
b. the digital divide
d. the spiral of silence
The gap between those with access to new technologies and those without is referred to as B: 'the digital divided'.
The gap between those people in a society who are computer literate and have access to information technology resources such as the Internet and those who do not are referred to as the 'digital divided'. In the term, 'digital divided' the word digital means information technology and the word divide means gap, differences, or disparity. Therefore, it is fine to state that the 'digital divided' refers to the socioeconomic differences between individuals in their access to technological resources.
You can learn more about digital divided at
https://brainly.com/question/7478471
#SPJ4
you are a new system administrator, and your company has just mandated that users need to work from home and connect to files and folders on the network. which option will allow users to connect to the corporate network remotely and securely?
It is to be noted that where you are a new system administrator, and your company has just mandated that users need to work from home and connect to files and folders on the network. The option that will allow users to connect to the corporate network remotely and securely is: "Create a virtual private network (VPN) on the server side and install the client on each remote user's laptop."
What is a Virtual Private Network?VPN (Virtual Private Network) refers to the ability to establish a secure network connection when utilizing public networks. VPNs hide your internet traffic and conceal your identity online. This makes it more difficult for third parties to follow your internet activities and steal information.
A virtual private network connects a private network to a public network, allowing users to transmit and receive data as though their computer equipment were directly linked to the private network.
A virtual private network connects one private network to some other public network, allowing users to send and receive data as though their computers were physically linked to the private network. Using a VPN provides more functionality, security, and control over the private network.
Learn more about system administrators:
https://brainly.com/question/13277281
#SPJ1
solomon arrives at his first day of work at a nuclear power plant. when putting on safety gear for the first time, he notices that everyone else is tucking their gloves into their sleeves, and he decides to do the same because he assumes this is part of the safety protocol. what kind of influence is solomon experiencing in this scenario?
In this situation, Solomon is under the grip of informational social influence.
By procedure, what do you mean?A policy is a collection of instructions for exchanging data. Each step and channel of communication with two or more devices has a set of rules that apply to it. For networks to transport data successfully, they must abide by certain guidelines.
The protocol is used where?A protocol is a collection of instructions for structuring and processing data in networking. Computers get a common language known as network protocols. Even if the software and hardware employed by the computers that comprise a network may be very dissimilar, the usage of protocols allows them to interact with one another.
To know more about Protocol visit:
https://brainly.com/question/27581708
#SPJ4
you're the network administrator for a consulting firm. your network consists of the following: 30 laptops in the sales department 10 computers for hr 5 laptops for management 20 computers in marketing 15 computers in it you're using microsoft intune to manage the company's devices. you've created a new update ring called testing and need to choose the appropriate servicing channel. this ring will be used by testing computers that are set up by it. you want to receive early builds of feature updates so you can begin testing them for any bugs. which servicing channel should you select?
Give John's account a new name. Microsoft Intune is what you're utilizing to control company devices. You've set up the Management update ring and added it to the Semi-Annual Servicing Channel.
Can devices be tracked by Intune?When you enroll a device in Microsoft Intune, your company cannot see any of your private information. When you enroll your device, IT administrators and support staff with administrator access can see details like the device model and serial number.
What does Microsoft Intune serve?While adjusting device settings to fulfill compliance requirements, Microsoft Intune assists enterprises in allowing their employees to use the devices and applications they enjoy. You may control your devices with Microsoft Intune while connecting to an existing System Center Configuration Manager infrastructure or via the cloud.
to know more about Microsoft Intune here:
brainly.com/question/29317883
#SPJ4
which type of software license allows a predetermined number of people to use the account at the same time?
The software license type that allows a predetermined number of people to use the account at the same time is concurrent user license.
What is software license?Software license is a legal document that allows a user to use and/or distribute one or more copies of the software without violating the copyrights held by the software vendors, software company, etc.
Software license have many type depend software vendor want to distribute them. Generally all software licenses belong to one of these three types public domain, open source, proprietary.
Proprietary software license is part of the company's intellectual property, the company own all right and user only can use and/or distribute with company permissions. One of these types of licenses is a concurrent user license.
Concurrent user license allow group of users to access at the same time with limit that has been set before.
Learn more about software license here:
brainly.com/question/14721871
#SPJ4
illustrate the first three levels of the apriori algorithm (set sizes 1, 2 and 3) for support threshold of 3 transactions, by identifying candidate sets and calculating their support. what are the maximal frequent sets discovered in the first 3 levels?
Look closely at the frequent item sets that are present on the dividing line between the frequent and infrequent item sets.
All of its immediate supersets should be listed. The itemset is maximally common if none of the immediate supersets are. This is comparable to using minsup 2 to find all frequent itemsets. What are closed and most frequent item sets then. An itemset is maximally common by definition if none of its immediate supersets are often occurring. If none of the itemset's immediate supersets share the same support, the itemset is said to be closed. Any frequent itemset for which none of its immediate supersets are frequent is said to be maximally frequent.
Learn more about Support here-
https://brainly.com/question/10776405
#SPJ4
according to the e-waste in south africa video case, what has resulted in a business opportunity for bolunga electronic waste company to provide recycling e-waste services?
According to the e-waste in south africa video case, the result in a business opportunity for bolunga electronic waste company to provide recycling e-waste services is that:
E-waste can be harmful, is not biodegradable, and builds up in the land, air, water, and other living things in the environment. Toxic substances are released into the environment when methods like open-air burning and acid baths are employed to recover valuable elements from electronic components.What effects does recycling e-waste have?Recycling e-waste allows for the recovery and reuse of important materials in the creation of new products, saving energy, lowering carbon emissions, and protecting Earth's limited natural resources.
Therefore, fact that it prevents those dangerous chemical-filled equipment from ending up in landfills is one of the main advantages of e-waste recycling for your company.
Learn more about e-waste from
https://brainly.com/question/22989582
#SPJ1
With respect to expanding opportunities for ICT environmental contributions, what term is associated with the issues such as LEED Certified Buildings, Smart Motors, and Industrial Robots?
With respect to expanding opportunities for ICT environmental contributions, automation is associated with the issues such as LEED certified buildings, smart motors, and industrial robots.
What is automation?Automation describes a range of technologies that reduce human intervention in processes, including predefined decision criteria, relationships between sub-processes and related actions, and time to express these predeterminations in machines. Automation has been achieved by a variety of means, including mechanical, hydraulic, pneumatic, electrical, electronic and computer equipment, often in combination. Complex systems, such as modern factories, aircraft, and ships often use a combination of all of these techniques. The benefits of automation include labor savings, waste reduction, electricity cost savings, material cost savings, and improved quality, precision, and accuracy.
Read more on automation brainly.com/question/11211656
#SPJ4
you have developed a new computer operating system and are considering whether you should enter the market and compete with microsoft. microsoft has the option of offering their operating system for a high price or a low price. once microsoft selects a price, you will decide whether you want to enter the market or not enter the market. if microsoft charges a high price and you enter, microsoft will earn $30 million and you will earn $10 million. if microsoft charges a high price and you do not enter, microsoft will earn $60 million and you will earn $0. if microsoft charges a low price and you enter, microsoft will earn $20 million and you will lose $5 million. if microsoft charges a low price and you do not enter, microsoft will earn $50 million and you will earn $0. In a simultaneous move game, Microsoft will and you will:___________
In a simultaneous move game, Microsoft will and you will If Microsoft asks for a higher price, it could be $30 million or $60 million. If the company were to charge the lower price, it would be $20 million or $50 million. The best strategy is to charge a higher price.
What is price market?Market price is the current price at which an asset or service can be bought or sold. The market price of an asset or service is determined by supply and demand. The market price is the price at which the quantity supplied equals the quantity demanded. Market prices depend on the interaction of supply and demand. Equilibrium price is the balance of demand and supply factors.
Learn more about market price: https://brainly.com/question/24877850
#SPJ4
what process, available on most routers, will help improve security by replacing the internal ip address of the transmitting device with a public ip address?
NAT is the process which is available on most routers, that will help improve security by replacing the internal Ip address of the transmitting device with a public Ip address.
What is Ip address?In order for the internet to send your emails, data, and lethal "monkey in a tutu" memes, your computer's IP address (Internet Protocol address) serves as its network address. Grandma Betty would never read your kind words if you wrote a heartfelt letter to her without including an address back when letters were still sent via snail mail and stamped and placed in the mailbox.
Similar principles govern how the Internet operates: without a place to land, the data sent there will just float aimlessly through the Internet.
You are already ahead of the majority of Internet users if you know the fundamentals of what an IP address is and what it stands for.
Learn more about IP address
https://brainly.com/question/14219853
#SPJ4
You can display active and inactive memory using the vmstat command with the _________ parameter.
You can display active and inactive memory using the vmstat command with the -a parameter.
What is vmstat?Vmstat is abbreviation for virtual memory statistics. Vmstat used in as a tool for computer system to monitoring information about system memory, interrupts, processes, paging and block I/O. Vmstat is mostly available in Unix based operating system such as Linux.
Vmstat use parameter command to display information, like -s to display memory statistics and -a to display active and inactive memory.
Attached image for example how to read information display, Inact in vmstat display is for inactive memory that is not being used and active in vmstat display is for active memory that is currently use.
Learn more about vmstat here:
brainly.com/question/29738509
#SPJ4
which method of the class is automatically called when you pass an object as an argument to the print function?
The str() method of the class is automatically called when you pass an object as an argument to the print function. The object's string representation is what this method returns.
When the print() or str() functions are used on an object, this method is called. The String objects must be returned by this procedure. The class must implement the str() magic method in order to alter how a class instance's string representation is displayed.
When an instance invokes the str() method, Python internally calls the str() method automatically. It should be noted that before displaying the string values, the print() function turns all non-keyword parameters into strings by giving them to the str() function.
The str() function is designed to return data in a human-readable format, which is suitable for logging or displaying object-related information. In contrast, the repr() function's intended return value is a string representation of the object that can be used to recreate it.
To learn more about print function click here:
brainly.com/question/25324400
#SPJ4
Question 2 0 / 1 pts What is output by the following code? Select all that apply. c = 2 while (c < 12): print (c) c = c + 3
Answer:
c = 2
while (c < 12):
print (c)
c = c + 3
The output of the following code will be:
2
5
8
11
Explanation:
The code uses a while loop to print the value of the c variable, starting from 2, and then incrementing c by 3 on each iteration. The loop continues until c is greater than or equal to 12, at which point the loop stops and the program ends.
Therefore, the output will be the values of c on each iteration of the loop: 2, 5, 8, and 11. These values will be printed on separate lines.
Imagine you work in data entry and, after taking a course in touch-typing, have been steadily improving your productivity over the past three months (your work tracks exactly how many cells of data you enter per 10 minutes, and you can see it’s been going up steadily for a while). Assuming you have access to anonymized results for all your data-entry peers, explain how you could take the data for your performance and create an illustration to argue to your boss that they should offer the course for all data entry workers and/or give you a raise.
To argue to your boss that they should offer the touch-typing course to all data entry workers, or give you a raise, you could use the data on your performance to create a visual representation, such as a line graph, that shows the improvement in your productivity over time. This would help to clearly demonstrate the positive effect that the touch-typing course has had on your work.
How would you create a graph?To create the graph, you would first need to gather data on your performance over the past three months. This could include the number of cells of data you entered per 10 minutes at regular intervals (e.g. weekly or monthly). You would then need to plot this data on the y-axis of the graph, with the x-axis representing the time period (e.g. weeks or months).
Once you have plotted the data, you could add a line to the graph to show the overall trend of your productivity over time. This would help to clearly demonstrate the improvement in your productivity since taking the touch-typing course.
In addition to the line graph, you could also include data on the performance of your peers who have not taken the course. This could be presented in a table or as a separate line on the graph and could help to show the relative improvement in your performance compared to your peers.
Overall, using data and a visual representation can be a powerful way to argue your case to your boss and make a compelling argument for offering the touch-typing course to all data entry workers, or giving you a raise.
Learn more about data entry:
https://brainly.com/question/13540091
#SPJ1
33. which of the following statements about binary trees is not true? a) every binary tree has at least one node. b) every non-empty tree has exactly one root node. c) every node has at most two children. d) every non-root node has exactly one parent.
The statement about binary trees not true is that every binary tree has at least one node. A non-linear data structure called a binary tree has up to two children for each parent and is shaped like a tree.
Each node in a binary tree additionally holds a left and right reference in addition to the data element. The node at the top of the hierarchy is known as the root node of a tree. The nodes that host the sub-nodes are known as parent nodes.
The two child nodes of a parent node are the left child and the right child. Hashing, data compression, data routing for network traffic, building binary heaps, and binary search trees are a few uses for a binary tree. A binary tree is said to be one where every node has either 0 or 2 children. fully developed. With the exclusion of leaf nodes, a full binary tree is a binary tree in which every node has two offspring.
A full binary tree is a special kind of binary tree that has either two children for each parent node and internal node, or none at all.
To learn more about binary trees click here:
brainly.com/question/29608280
#SPJ4
we are sending a 30 mbit mp3 file from a source host to a destination host. all links in the path between source and destination have a transmission rate of 10 mbps. assume that the propagation speed is 2 * 108 meters/sec, and the distance between source and destination is 10,000 km. now suppose there are two links between source and destination, with one router connecting the two links. each link is 5,000 km long. again suppose the mp3 file is sent as one packet. suppose there is no congestion, so that the packet is transmitted onto the second link as soon as the router receives the entire packet. the end-to-end delay is?
The transmission delay =30 Mbit/10 Mbps transmission latency equals three seconds.
The length of the packet will determine how long the transmission delay is, whereas the propagation delay is the amount of time required for a bit to travel to the other end of the network.
If only one bit can be transferred in a second. It would take 20 seconds to transfer 20 bits. These elements affect how long this delay will take: The delay will increase if there are more active sessions.
If the data size is L bits and the bandwidth is B bps, then the transmission delay is Tt = L/B.
These elements affect how long this delay will take:
• The latency will increase if there are several active sessions.
• Transmission delay is reduced as bandwidth is increased.
If the link is shared by several devices, the MAC protocol has a significant impact on the delay.
• Operating system context switches, which take a limited amount of time, are required for packet sending and receiving.
To learn more about transmission delay click here:
brainly.com/question/13152128
#SPJ4
why when i go to install windows i can't get past the partition and it wont allow me to format the drive
There are a few potential reasons for not able to format your drive:
Mass storage drivers and controllers are incompatible with Windows.It is no longer necessary to use a mass storage controller or driver.A dynamic disk is the hard drive that you want to use to install Windows Vista, Windows 7, or Windows Server 2008 R2.The PC has a loose data cord or there is a hardware problem.Damage to the Windows file system or the hard drive.You attempted to choose a partition type that is incompatible with Windows Vista, Windows 7, or Windows Server 2008 R2, such as the FAT32 format.In order to fix this issue, do any one of these:
Resolution 1: Ensure that the partition is Windows compatible.
Resolution 2: Update the hard disk controller's drivers
Resolution 3: Provide the proper hard disk controller's drivers
Resolution 4: Examine the Setupact.log file to confirm that the partition is active
Resolution 5: Check for system BIOS and firmware updates
Resolution 6: Confirm that the system BIOS correctly detects hard disks
Using Chkdsk.exe to look for issues is Resolution 7
Resolution 8: Run Windows Setup again after cleaning the disk with Diskpart.exe.
To learn more about Windows click here
brainly.com/question/17004240
#SPJ4
what type of malicious code could be installed in a system's flash memory to allow an attacker to access the system at a later date?
There are several types of malicious code that could be installed in a system's flash memory to allow an attacker to access the system at a later date. One type of malicious code that could be used for this purpose is known as a rootkit.
Malware called a "rootkit" is made to access systems with elevated privileges while avoiding detection by security programs. Rootkits are frequently stored in a computer's flash memory or other persistent storage because they can stay hidden and continue to function even when the system is rebooted.
When a rootkit is planted in a system's flash memory, it can later enable remote access to the machine, allowing an attacker to carry out a variety of tasks like installing other malware, stealing confidential information, or taking over the system. Rootkits can also be used to get around security measures and enter restricted regions of the system without authorization.
It's crucial to maintain a system updated with the most recent security patches, use antivirus software, and take other security precautions to guard against malware in order to avoid rootkits and other forms of harmful code from being installed in the system's flash memory. Additionally, it's critical to exercise caution while downloading and installing software from unreliable sources and to be alert to any potential security risks.
To know more about malicious code kindly visit
https://brainly.com/question/29549959
#SPJ4
Which of the following are provided by most
professional organizations? Check all of the boxes
that apply.
uniforms
a code of conduct
Olegal representation
a network of professionals
skills validation
DONE
a code of conduct
a network of professionals
skills validations
in order to terminate multiple network cables that converge in one location such as an electrical closet or server room, what should you use?
In order to terminate multiple network cables that converge in one location such as an electrical closet or server room, we can use patch panel.
What is patch panel?A patch panel is a device or unit with a series of jacks, usually of the same or similar type, used to connect and route circuits in order to monitor, connect, and test them in a convenient and flexible way. . Patch panels are commonly used in computer networks, recording studios, radio and television.
The term patch comes from its early use in telephony and radio studios, where spare equipment could be temporarily replaced with failed equipment. This reconnection was done using patch cords and patch panels, similar to jack panels on corded telephone switches.
Learn more about patch panel https://brainly.com/question/29484618
#SPJ4
1. a(n) programming practice is centered on creating modules and functions that are separate from the data that they work on. a. modular b. procedural c. functional d. object-oriented
A procedural programming practice is centered on creating modules and functions that are separate from the data that they work on. It relies on specified and well-planned processes, functions, or sub-routines in the program's architecture.
For this, it outlines every action that the computer must perform in order to achieve the intended state or result.
A program is divided into variables, functions, statements, and conditional operators using procedural language. To carry out a task, procedures or functions are applied to the data and variables. These procedures can be called or initiated by other procedures as well as from anywhere in the software hierarchy. One or more processes can be found in a program written in a procedural language.
One of the most popular categories of programming languages is a procedural language, which includes well-known languages like C/C++, Java, ColdFusion, and PASCAL.
To learn more about procedural programming click here:
brainly.com/question/11023419
#SPJ4
what type of power connector would you likely use to provide supplemental power to a high-end processor?
4+4 pin 12V type of power connector would be used to provide supplemental power to a high-end processor.
As long as you are not using the EPS12V connector, this 4-pin connector, which powers your CPU, must be connected to the motherboard. Most processors, whether they are Intel or AMD, use the 4-pin ATX12V connector.
Even AMD's power-hungry FX series, up until the hexa-core series, only needs a 4-pin CPU connector. Therefore, having a pair of them on the PSU is ideal because they are more crucial to have in the big picture.
High-end computing (HEC) is the term for computer systems that have hundreds or even thousands of times the amount of processing power of a typical computer system.
A processor is the logic circuitry that responds to and executes the fundamental commands that drive a computer (CPU). The CPU is thought of as the primary and most significant integrated circuit (IC) chip in a computer because it interprets the bulk of computer commands.
Question:
what type of power connector would you likely use to provide supplemental power to a high-end processor?
4 pin Molex 6+2 pin PCle 4+4 pin 12V 20+4 pin P1To learn more about Processor click here
brainly.com/question/28255343
#SPJ4
Why are scientists choosing to colonize mars rather than another planet? support your answer with information from the selection.
Mars is regarded as Earth's younger sister for a different reason since it is located in the "Goldilocks Zone," or the habitable zone.
The best planet to colonize initially, given our existing space technological capabilities, is this one.
Why do scientists want to colonize Mars?
Curiosity, the ability for people to conduct more in-depth observational study than unmanned rovers, a financial interest in its resources,
and the chance that human extinction may be lowered by colonizing other planets are some of the justifications and motives for colonizing Mars.
Colonists on Mars might take advantage of in-situ resources such subterranean water, Martian soil, and minerals. On Mars, there are few opportunities to produce electricity utilizing nuclear, solar, or wind energy.
The asteroid belt and the Earth's orbit are both near to Mars' orbit. Although Mars' day and general makeup resemble Earth's, the planet is inhospitable to life.
To know more Space Exploration, visit: https://brainly.com/question/1417422
#SPJ4
your php installation appears to be missing the mysql extension which is required by wordpress.
In PHP, initializing an object is as simple as taking its name and using "->" before the property name.
How do I install PHP?For information regarding the MySQL extension, open the same phpinfo.php file in your browser.There is a field called "Client API Library Version" that you can find.You'll see something that resembles MySQL 5.0 if the MySQL extension is installed.To install PHP on Windows, adhere to the methods listed below:Step 1: Open any web browser and go to Click on Downloads.Step 2: Select the "Downloads" button on Windows.Step 3: Select the Thread Safe version from the list of options on the new website, then click the zip button to download it. Verify the version of PHP you're using.Refresh WordPress.Refresh your plugins.Make sure the MySQL extension is set up.Make sure the PHP extension is set up properly.To learn more about php installation refer
https://brainly.com/question/13041434
#SPJ4
for this assignment, you will design and implement the class month that implements the month of the year in a program. the class month should store the month, such as jan for january. the program should be able to perform the following operations on an object of type month: a. set the month. b. print the month. c. return the month. d. return the next month. e. return the previous month. f. calculate and return the month by adding certain months to the current month. for example, if the current month is march and we add four months, the month to be returned is july. similarly, if today is the month of january and we add 13 month, the month to be returned is february. g. add the appropriate constructors. h. write the definitions of the methods to implement the operations for the class month, as defined earlier. i. write a program to test various operations on the class month.
Using knowledge in computational language in C++ it is possible to write a code that implement the class month that implements the month of the year in a program.
Writting the code:#include <iostream>
#include <iomanip>
#include <string>
#include <cstring>
using namespace std;
class Date
{
private:
int d = 0;
int m = 0;
int y = 0;
char format = 'D';
const int MonthDays[12] = {31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31};
const string MonthToString[12] = {"Jan", "Feb", "Mar", "Apr", "May", "June", "July",
"Aug", "Sept", "Oct", "Nov", "Dec"};
string GetDate(int m, int d, int y){
return to_string(m) + "/" + to_string(d) + "/" + to_string(y);
}
int CountLeapDays(){
int cnt = this->m > 2 ? this->y : this->y-1;
return cnt/4 - cnt/100 + cnt/400;
}
int CountDays(){
int numDays = this->y * 365 + this->d + this->CountLeapDays();
for(int i = 0;i<this->m-1;i++){
numDays += MonthDays[i];
if(i == 1 && this->IsLeapYear(this->y))
numDays += 1;
}
return numDays;
}
int NumDaysYear(){
int numDays = this->d;
for(int i = 0;i<this->m-1;i++){
numDays += MonthDays[i];
if(i == 1 && this->IsLeapYear(this->y))
numDays += 1;
}
return numDays;
}
int GetMonthDays(){
if(this->m==2 && this->IsLeapYear(this->y))
return this->MonthDays[this->m-1] + 1;
return this->MonthDays[this->m-1];
}
bool IsLeapYear(int y){
if(y%400 == 0)
return true;
else if(y%100 == 0)
return false;
else if(y%4 == 0)
return true;
return false;
}
void GetDateFromString(string dateString, int& m, int& d, int& y) {
int n = dateString.length();
char date[n + 1], *token = NULL;
strcpy(date, dateString.c_str());
const char s[2] = "/";
token = strtok(date, s);
if(token != NULL){
sscanf(token, "%d", &m);
token = strtok(NULL, s);
}
if(token != NULL){
sscanf(token, "%d", &d);
token = strtok(NULL, s);
}
if(token != NULL){
sscanf(token, "%d", &y);
token = strtok(NULL, s);
}
}
bool IsValidDate(string dateString){
int d=-1, y=-1, m=-1;
this->GetDateFromString(dateString,m,d,y);
if(m<=0 || d<=0 || y<=0) return false;
if(m>=1 && m<=12){
if((d>=1 && d<=31) && (m==1 || m==3 || m==5 || m==7 || m==8 || m==10 || m==12))
return true;
else if((d>=1 && d<=30) && (m==4 || m==6 || m==9 || m==11))
return true;
else if(d==29 && m==2 && (y%400==0 ||(y%4==0 && y%100!=0)))
return true;
else if((d>=1 && d<=28) && (m==2))
return true;
}
return false;
}
public:
Date(){
this->m = 1;
this->d = 1;
this->y = 2000;
}
Date(int m, int d, int y){
if(this->IsValidDate(this->GetDate(m,d,y))){
this->m = m;
this->d = d;
this->y = y;
}
else{
this->m = 1;
this->d = 1;
this->y = 2000;
}
}
int GetCountDays(){
return this->CountDays();
}
void Input(){
string s = "";
while(true){
cout<<" Please enter date in format m/d/yy:\n";
cin>>s;
if(this->IsValidDate(s)){
int d=-1, y=-1, m=-1;
this->GetDateFromString(s,m,d,y);
this->m = m;
this->d = d;
this->y = y;
return;
}
else{
cout<<"Invalid date. Try again:\n";
}
}
See more about C++ at brainly.com/question/12975450
#SPJ1
as a digital marketer managing a website, you would like to prevent a webpage on your site from appearing in search. what search console tool could provide a temporary fix?
URL Inspection tool is the search console tool that could provide a temporary fix to prevent a webpage on your site from appearing in search. This tool allows you to test live URLs and identify SEO issues on your site by showing you what data search engine has on file regarding your URL's accessibility and indexability.
Instead of other file formats like PDFs, pictures, and videos, this application is specifically made to analyze web pages.
The most beneficial tools in Search Console for identifying and resolving SEO issues are the URL Inspection Tool and the Index Coverage report. It has developed into a crucial tool for individuals looking to boost the SEO of their websites. This tool enables you to better comprehend how search engine views your website. As a result, website owners have the option to reorganize their sites using the information that this tool offers.
To learn more about search console click here:
brainly.com/question/29807297
#SPJ4
when using the function btreeremovekey(node, keyindex) to remove a key from a 2-3-4 tree node, which is not a valid value for keyindex? group of answer choices 1 2 3 0
When using the function b tree remove key(node, keyindex) to remove a key from a 2-3-4 tree node, 0 is not valid value for key index.
What is key index?An index key is an expression that defines a column, an ordered collection of columns, or an index. DB2 uses the index key to determine the order of index entries. Good candidates for index keys are columns or expressions that are commonly used in data selection, join, grouping, and ordering operations.
What is the primary key index?Automatically creates a primary index for the primary key to ensure that the primary key is unique. Objects can be retrieved and accessed from the database using the primary index. A unique index is a column or ordered collection of columns where each value identifies a unique row.
Learn more about key index:
brainly.com/question/9617712
#SPJ4