answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liubo4ka
20 days ago
6

3. What is the error in the following pseudocode? // The searchName function accepts a string containing the name // to search f

or, an array of strings containing the names, and // an integer specifying the size of the array. The function // searches for the name in the array. If the name is found, the // string containing the name is returned; otherwise a message // indicating that the name was not found in the array is // returned. Function String searchName(String name, String names[], Integer size) Declare Boolean found Declare Integer index Declare String result // Step through the array searching for the // specified name. While found == False AND index <= size − 1 If contains(names[index], name) Then Set found = True Else Set index = index + 1 End If End While // Determine the result. If found == True Then Set result = names[index] Else Set result = "That name was not found in the array." End If Return result End Function
Computers and Technology
1 answer:
zubka84 [942]20 days ago
5 0
The answer is "In the provided pseudo-code, there are three inaccuracies."
You might be interested in
In the lab, you used the filter box in Wireshark to remove traffic from port 3389. What is that port used for? What filter synta
8_murik_8 [892]

Answer:

Port 3389 is designated for remote desktop access to graphical user interfaces.

The syntax for tracking ping traffic is " tcp.port eq 25 or icmp".

Explanation:

Wireshark serves as a network packet sniffer utilized for analyzing and troubleshooting packet transmission within a network.

The ping command is employed in networks to verify connectivity between two devices. It sends ICMP echo messages to an IP address and awaits their return if the connection exists. To filter ping traffic in Wireshark, the syntax " tcp.port eq 25 or icmp" is applied.

This port 3389 acts as a listening port for the Microsoft proprietary remote desktop protocol, allowing remote connections to graphical interfaces of systems running the RDP server.

6 0
1 month ago
A regional trucking company landed a contract to supply products for a major retailer. To do this, it needs to hire an IT profes
zubka84 [942]
I believe the answers are F and A
.
8 0
13 days ago
Which of the following is a true statement about cloud computing?
amid [800]

There are heightened security challenges linked with cloud computing as opposed to local data storage.

Explanation:

Cloud computing: This term refers to accessing and storing different programs and data over the internet instead of on a computer's "hard drive". The word "cloud" serves as a metaphor for the internet.

Categories:

1. Software-as-a-Service (SaaS).

2. Platform-as-a-Service (PaaS).

3. Infrastructure-as-a-Service (IaaS).

In this context, the first option is correct because the other choices do not pertain to cloud computing.

3 0
1 month ago
Which of the following statements is true? A. Marking a presentation as final is stronger security than password protection. B.
Amiraneli [921]

The answer is B.

5 0
1 month ago
Read 2 more answers
Provide an example by creating a short story or explanation of an instance where availability would be broken.
Amiraneli [921]

Explanation:

Personal Insurance

Understanding workplace confidentiality: Key points

In professions where you advise clients or patients, safeguarding private and sensitive information is essential. But are you knowledgeable about what constitutes a confidentiality breach and how to handle it if it happens?

This passage provides insights into protecting confidential data and identifying breaches in various jobs, emphasizing the significance of confidentiality at work.

What does a breach of confidentiality entail?

Essentially, a breach occurs when information is shared with someone without the explicit consent of its owner. This refers to the failure to respect an individual's privacy or the trust they placed in you while sharing their information.

Why is maintaining confidentiality critical?

Safeguarding confidential information is crucial for those who access or handle such data at work. If confidentiality is compromised, it can jeopardize your professional reputation and relationships with current and future clients, which may lead to termination of contracts or legal consequences.

Therapist/patient confidentiality

Confidentiality for patients is especially vital for therapists and counselors. It plays an essential role in establishing proper boundaries, fostering a trusting therapeutic relationship.

Here are some examples of unintentional breaches of therapist/patient confidentiality:

Disclosing confidential client information to friends or family

Discussing confidential details in public spaces where others can overhear

Leaving computers with confidential information accessible to others

Continuing treatment for a client with known conflicts of interest (e.g., if they are acquainted with family or friends)

When individuals give permission to share information but without clarity, it may lead to misunderstandings and potential breaches (e.g., a patient may consent to share details with a teacher but not with their doctor).

7 0
1 month ago
Other questions:
  • Your computer science teacher asks you to sample a black and white image that is 4" x 6". How would you sample the image to prov
    8·1 answer
  • A client is currently struggling with late-stage integration and manual deployments. They want to find another method that will
    5·1 answer
  • Describe a strategy for avoiding nested conditionals. Give your own example of a nested conditional that can be modified to beco
    11·1 answer
  • What is the other name designated to a game master of multiplayer online games (MMOs)?
    11·2 answers
  • Rewrite following program using for loop no=3456 while no&gt;0 : print(no%10) no=no/10
    13·2 answers
  • An array subscript can be an expression, but only as long as the expression evaluates to what type?
    7·1 answer
  • Given main(), define the Team class (in file Team.java). For class method getWinPercentage(), the formula is:teamWins / (teamWin
    15·1 answer
  • James is an intern in a film production company. On his first day, James’ boss, Monica, tells him, “Before anything else, let me
    9·1 answer
  • Your computer uses 4 bits to represent decimal numbers (0, 1, 2, 3 and so on) in binary. What is the SMALLEST number for which a
    8·1 answer
  • The engineering firm you work for is submitting a proposal to create an amphitheater at a state park. Proposals must be submitte
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!