Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?
A. DMA.
B. BIOS.
C. CPU.
D. IPsec.
E. I/O.

Answers

Answer 1

Answer: CPU

Explanation:

The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.

Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.

Therefore, the correct option is C.


Related Questions

evaluate (0.999)^8, to six places of decimal​

Answers

Answer:

Here is your answer 0.99202794407

When an item is gray that means...
A. The item only works with another application
B. The item has been selected
C. The item is unavailable
D. The item has been deleted
A,B,C,orD, can anyone please help?

Answers

Answer:

B. The item has been selected

Answer:

C

Explanation:

When an item is unavailable, usually referring to the Technology field, it is gray. Gray items are things that are not created anymore, sold out or not enough supply. The color gray is usually used to symbol something bad, and not having a product is considered bad. Using our background knowledge, we can concude that the answer is option C.

NO LINKS
Write a C++ program to accept a 5 digit integer and to validate the input based on the following rules.

Rules

1) The input number is divisible by 2. 2) The sum of the first two digits is less than last two digits. if the input number satisfies all the rules, the system prints valid and invalid, otherwise,

Example 1:

Enter a value: 11222

Output: Input number is valid

Example 2:

Enter a value: 1234

Output: Input number is invalid​

Answers

Answer:

#include <iostream>

#include <string>

#include <regex>

using namespace std;

int main()

{

   cout << "Enter a 5-digit number: ";

   string number;

   cin >> number;

   bool valid = regex_search(number, regex("^\\d{4}[02468]$"));

   if (valid) {

       valid = stoi(number.substr(0, 1)) + stoi(number.substr(1, 1))  

           < stoi(number.substr(3, 1)) + stoi(number.substr(4, 1));

   }

   cout << number << (valid ? " is valid" : " is invalid");

}

Explanation:

Regular expressions can do all of your checking except for the sum of digits check. The checks are i.m.o. easiest if you don't treat the input as a number, but as a string with digits in it.

The regex means:

^ start of string

\d{4} exactly 4 digits

[02468] one of 0, 2, 4, 6 or 8 (this is what makes it even)

$ end of string

Provide a 3 to 4 sentence overview of the Microsoft Windows features.

Answers

Answer:

there is an app that can tell you everything

Explanation:

just go to Microsoft and go to details or something like that and copy and paste

The paragraph for Microsoft Windows features is written in explanation part.

What is Microsoft Windows?

Windows is a combination of a few restrictive graphical working framework families created and showcased by Microsoft.

Microsoft Windows (likewise alluded to as Windows or Win) is a graphical working framework created and distributed by Microsoft. It gives a method for putting away records, run programming, mess around, watch recordings, and interface with the Internet. Microsoft Windows was first presented with form 1.0 on November 10, 1983

Microsoft Windows Features on Demand is a component that permits framework managers to add or eliminate jobs and elements in Windows 8 and Windows Server 2012, and later variants of the client and server working framework to change the document size of those working frameworks.

Learn more about Microsoft Windows.

https://brainly.com/question/2312568

#SPJ2

What are the basic characteristics of the linear structure in data structure

Answers

Explanation:

A Linear data structure have data elements arranged in sequential manner and each member element is connected to its previous and next element. This connection helps to traverse a linear data structure in a single level and in single run. Such data structures are easy to implement as computer memory is also sequential.

Suppose that in a 00-11 knapsack problem, the order of the items when sorted by increasing weight is the same as their order when sorted by decreasing value. Give an efficient algorithm to find an optimal solution to this variant of the knapsack problem, and argue that your algorithm is correct.

Answers

Answer:

Following are the response to the given question:

Explanation:

The glamorous objective is to examine the items (as being the most valuable and "cheapest" items are chosen) while no item is selectable - in other words, the loading can be reached.

Assume that such a strategy also isn't optimum, this is that there is the set of items not including one of the selfish strategy items (say, i-th item), but instead a heavy, less valuable item j, with j > i and is optimal.

As [tex]W_i < w_j[/tex], the i-th item may be substituted by the j-th item, as well as the overall load is still sustainable. Moreover, because [tex]v_i>v_j[/tex] and this strategy is better, our total profit has dropped. Contradiction.

Assume that a file contains students’ ids, full names, and their scores (Assignments grade, quizzes grade, Midterm grade, Practical exam grade, and final exam grade) (each column is separated by $). You are required to write a C program to do the following:



• Using the concept of parallel arrays create records for students with above attributes (id, full name, score).(you are not allowed to use structure)

• Ask the user to enter the input file name and read it (suppose that, there are different files you could read data from). Read the data from the file and store it in record for students, which has IDs, Names, and Scores. The IDs should be declared as integers, the Names as a two-dimensional array of characters and the Scores as doubles. Assume that the maximum length of full name of any student is 50 characters. Also, you may assume that there will be No more than a 1000 student records in the file.

• Calculate the final grade as the flowing:

Grade= (Assignment)*15%+(Quizzes) *15%+(Midterm exam) *25%+(Practical Exam)

*10%+(Final) *35% Assuming that data in files are arranged in same order of the above equation with respect to grades



Hint: read form file, calculate the final score, and store it in the record before going to the next step.

• Display the following menu to the user and read the entered choice:

1) Sort data in ascending order according to students’ IDs and then display it.

2) Sort data in ascending order according to students’ names and then display it.

3) Sort data in descending order according to students’ scores and then display it.

Note: After running any of the above menus items, ask the user if he/she would like to save the current result, if so, prompt user to enter file name.

4) Ask the user to enter a student ID and display his score

5) Ask the user to enter a student name and display his score

6) Exit the program











 The program should keep displaying the menu until the user selects to exit from the program.

Implement each of the first five menu options as a separate function.

The attached file “data.txt” is for test.

Answers

Thank lord for you please

High-level modulation is used: when the intelligence signal is added to the carrier at the last possible point before the transmitting antenna. in high-power applications such as standard radio broadcasting. when the transmitter must be made as power efficient as possible. all of the above.

Answers

Answer:

Option d (all of the above) is the correct answer.

Explanation:

Such High-level modulation has been provided whenever the manipulation or modification of intensity would be performed to something like a radio-frequency amplifier.Throughout the very last phase of transmitting, this then generates an AM waveform having relatively high speeds or velocity.

Thus the above is the correct answer.

A Key Factor in Controlling Your Anger Is Using Passive behaviour.T/F

Answers

Answer:

The answer is "True".

Explanation:

Assertiveness means that others are encouraged to be open, honest about their thoughts, wishes and feelings so how they can act properly. Assertive behavior: be open and communicate wishes, ideas and feelings, as well as encourage others to do likewise. Please visit our Emotional Regulation page. A major aspect is the ability to control your anger. Once you are quiet or aggressive, work very hard.

Use the drop-down menus to complete the steps for rearranging the layout of a form.

1. Open the form in
✔ Design
view.

2.
✔ Press Ctrl+A
to highlight all of the fields.

3. Under Form Design Tools, select the
✔ Arrange
tab.

4. Choose the Remove Layout button.

5. Reorder and arrange the layout as desired.

6. Review the changes in the
✔ Layout
view.

7. Click Save.

Just did it.

Answers

Answer:

1. Open the Form

2. Arrange tabs

3. Layout view

4. Reoder and arrange the Layout as desired

5. Press Ctrl + A

6. Choose the remove Layout button

7. Click Save

I am not sure

The complete steps for rearranging the layout of a form are in the order:

1, 2, 3, 4, 5, 6, and 7.

What is a form layout?

A form layout is the arrangement of all elements, components, and attributes of your form and the placement of the form on a specific page.

When rearranging the layout of the form, the steps to take are as follows:

Open the form in Design View (this means that the form needs adjustment and rearrangement.Press Ctrl+A (this control all function) helps to highlight all the features in the form layout fields.Under Form Design Tools, select the Arrange tab.Choose the Remove Layout button.Reorder and arrange the layout as desired.Review the changes in the Layout view.Click Save.

Learn more about form layout arrangement here:

https://brainly.com/question/9759966

#SPJ2

Write a program that accepts a date in the form month/day/year and outputs whether or not the date is valid. For example, 5/24/1962 is valid, but 9/31/2000 is not. (September has only 30 days.)

Answers

Answer:

Here is the code.

Explanation:

#include <stdlib.h>

#include <stdio.h>

int check_month(int month);

int check_date(int year, int month, int day);

void display_date(int year, int month, int day);

int check_year(int year);

int main (void)

{

int year, month, day;

int valid;

printf("\t\t\t\tEnter Date \n");

printf("\nyear (yyyy): ");

scanf("%d",&year);

printf("month: ");

scanf("%d",&month);

printf("day: ");

scanf("%d", &day);

valid = check_month(month);

if (valid)

{

valid = check_date(year, month, day);

}

if (valid)

{

display_date(year, month, day);

printf("is a valid date. \n");

}

else

{

display_date(year, month, day);

printf("is a illegal date. \n");

}

system ("pause");

return 0;

}

int check_month(int month)

{

int flag;

if (month>=1 && month<=12)

flag = 1;

else

flag = 0;

return flag;

}

int check_date(int year, int month, int day)

{

int valid;

int leep_year;

switch (month)

{

case 1:

case 3:

case 5:

case 7:

case 8:

case 10:

case 12:

if (day>=1 && day<=31)

valid = 1;

else

valid = 0;

break;

case 2:

leep_year = check_year(year);

if (leep_year)

{ if (day>=1 && day<=29)

valid = 1;

else

valid = 0;

}

else

{ if (day>=1 && day<=28)

valid = 1;

else

valid = 0;

}

break;

case 4:

case 6:

case 9:

case 11:

if (day>=1 && day<=30)

valid = 1;

else

valid = 0;

break;

}

return valid;

}

int check_year(int year)

{

int leep_year;

if (year%4==0)

{

if (year%100==0)

{

if (year%400==0)

leep_year = 1; // 1600, 2000

else

leep_year = 0; // 1700, 1800, 1900, 2100

}

else

{

leep_year = 1; // 2004, 1996

}

}

else

{

leep_year = 0; // 2003, 2011

}

return leep_year;

}

void display_date(int year, int month, int day)

{

if (month == 1)

printf("January");

else if (month == 2)

printf("February");

else if (month == 3)

printf("March");

else if (month == 4)

printf("April");

else if (month == 5)

printf("May");

else if (month == 6)

printf("June");

else if (month == 7)

printf("July");

else if (month == 8)

printf("August");

else if (month == 9)

printf("September");

else if (month == 10)

printf("October");

else if (month == 11)

printf("November");

else if (month == 12)

printf("December");

else

printf("The Month enter is not valid.\n");

printf(" %d, %d ",day,year);

}

In Python, you can specify default arguments by assigning them a value in the function definition.

Answers

Answer:

use the input function to ask them their name like name = input(" enter name?: ") or

def greet(name, msg):

    # This function greets to  the person with the provided message

 print("Hello", name + ', ' + msg)  

greet("Andy", "Good morning!")

def greet(name, msg="Good morning!"):

   # This function greets to

     the person with the

     provided message.  

     If the message is not provided,

     it defaults to "Good

     morning!  

   print("Hello", name + ', ' + msg)

greet("Kate")

greet("Bruce", "How do you do?")

Explanation:

it's one of these three but not sure

A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as: Group of answer choices cybervandalism. driveby downloading. war driving. sniffing. driveby tapping.

Answers

Answer:

war driving.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Generally, the two (2) essential privacy concerns in the field of cybersecurity are knowing how personal data are collected and essentially how they're used by the beneficiaries or end users.

War driving can be defined as a form of cyber attack which typically involves having eavesdroppers in a moving vehicle drive by buildings or park outside so as to avail them the opportunity of intercepting a wireless network traffic using a smartphone or laptop computer and illegitimately obtain sensitive user informations for further unauthorized use or to perform other fraudulent activities.

Consider the following class, which uses the instance variable balance to represent a bank account balance.

public class BankAccount {

private double balance;


public double deposit(double amount) {

/* missing code */

}

}
The deposit method is intended to increase the account balance by the deposit amount and then return the updated balance. Which of the following code segments should replace /* missing code */ so that the deposit method will work as intended?
a.
amount = balance + amount;
return amount;
b.
balance = amount;
return amount;
c.
balance = amount;
return balance;
d.
balance = amount;, , return balance;,
balance = balance + amount;
return amount;
e.
balance = balance + amount;
return balance;

Answers

Answer:

e.

balance = balance + amount;

return balance;

Explanation:

Required

Code to update account balance and return the updated balance

The code that does this task is (e).

Assume the following:

[tex]balance = 5000; amount = 2000;[/tex]

So, code (e) is as follows:

balance = balance + amount; [tex]\to[/tex]

[tex]balance = 5000 + 2000[/tex] [tex]\to[/tex]

[tex]balance = 7000[/tex]

Here, the updated value of balance is 7000

So: return balance

will return 7000 as the updated account balance

Other options are incorrect

management is as old as human civilization. justify this statement​

Answers

Answer:

Indeed, management is as old as the human species, as human nature is itself dependent on the natural resources that it needs for its subsistence, therefore needing to exercise a correct administration of said resources in such a way as to guarantee that those resources can satisfy the greatest number of individuals. That is, the human, through the correct management of resources, seeks to avoid the scarcity of them.

find the summation of even number between (2,n)​

Answers

Answer:

The program in python is as follows:

n = int(input("n: "))

sum = 0

for i in range(2,n+1):

   if i%2 == 0:

       sum+=i

print(sum)

Explanation:

This gets input n

n = int(input("n: "))

This initializes sum to 0

sum = 0

This iterates through n

for i in range(2,n+1):

This checks if current digit is even

   if i%2 == 0:

If yes, take the sum of the digit

       sum+=i

Print the calculated even sum

print(sum)

what is the mean of "*" in wild card?​

Answers

Answer:

a playing card that can have any value,suit,color or other property in a game at the discretion of player holding it

plss. give me briniest ty.

how can you reduce the size of icons on the Taskbar by using the control panel is there another method of doing the same using right click explain​

Answers

Answer:

Right-click on any empty area of the taskbar and click “Taskbar Settings.” In the settings window, turn on the “Use small taskbar icons” option. As you can see, almost everything is the same except that the icons are smaller and you can cram a few more into the space.

Write a class named Pet, with should have the following data attributes:1._name (for the name of a pet.2._animalType (for the type of animal that a pet is. Example, values are "Dog","Cat" and "Bird")3._age (for the pet's age)The Pet class should have an __init__method that creates these attributes. It should also have the following methods:-setName -This method assigns a value to the_name field-setAnimalType - This method assigns a value to the __animalType field-setAge -This method assigns a value to the __age field-getName -This method returns the value of the __name field-getAnimalType -This method returns the value of the __animalType field-getAge - This method returns the value of the __age fieldWrite a program that creates an object of the class and prompts the user to enter the name, type, and age of his or her pet. This should be stored as the object's attributes. Use the object's accessor methods to retrieve the pet's name, type and age and display this data on the screen. Also add an __str__ method to the class that will print the attributes in a readable format. In the main part of the program, create two more pet objects, assign values to the attirbutes and print all three objects using the print statement.Note: This program must be written using Python language

Answers

Answer:

Explanation:

The following is written in Python, it contains all of the necessary object attributes and methods as requested and creates the three objects to be printed to the screen. The first uses user input and the other two are pre-built as requested. The output can be seen in the attached image below.

class Pet:

   _name = ''

   _animalType = ''

   _age = ''

   def __init__(self, name, age, animalType):

       self._name = name

       self._age = age

       self._animalType = animalType

   def setName(self, name):

       self._name = name

   def setAnimalType(self, animalType):

       self._animalType = animalType

   def setAge(self, age):

       self._age = age

   def getName(self):

       return self._name

   def getAnimalType(self):

       return self._animalType

   def getAge(self):

       return self._age

   def __str__(self):

       print("My Pet's name: " + str(self.getName()))

       print("My Pet's age: " + str(self.getAge()))

       print("My Pet's type: " + str(self.getAnimalType()))

name = input('Enter Pet Name: ')

age = input('Enter Pet Age: ')

type = input('Enter Pet Type: ')

pet1 = Pet(name, age, type)

pet1.__str__()

pet2 = Pet("Sparky", 6, 'collie')

pet3 = Pet('lucky', 4, 'ferret')

pet2.__str__()

pet3.__str__()

explain about primary memory?​

Answers

Answer:

Primary memory is computer memory that a processor or computer accesses first or directly. It allows a processor to access running execution applications and services that are temporarily stored in a specific memory location. Primary memory is also known as primary storage or main memory.

Explanation:

Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
O No messages will ever be blocked from the user's mailbox.
Messages can still be blocked at the server level.
O Messages cannot be blocked at the network firewall.
O Most obvious spam messages will still reach the client computer,
PLEASE ANSWER CORRECTLY WILL GIVE 15pts

Answers

No messages will ever be blocked from the users mailbox. Messages can still be blacked at the sever level

Globally, most cell phone carriers use GSM technology, a combination of time division and frequency multiplexing.
Why do you think this has become the multiplexing technology of choice for most carriers?
Why not code division, for example, which some major US cell phone carriers still use?

Answers

Answer:

The many reason why we still use Global System for Mobile communication is for the ability to transfer data and voice both at once. But others like Code Division does not have this feature.

Explanation:

asdcvnmn bvcdxszasdfghjk.

Answers

Answer:

fewrugbrubpwerivrib

Explanation:

vbhresibvhresiupvkbjriururbvurfiuibvuefsbiuiuvuib

The first PCI bus has a 32-bit data path, supplied 5 V of power to an adapter card, and operated at what frequency?
a. 88 MHz
b.64 MHz
c. 16 MHz
d. 33 MHz

Answers

Answer:

D. 33mhz

Explanation:

The PCI is short for peripheral component interconnect. This has speed and was made by Intel. At first it was made to be 32 bits and with a speed that 2as up to 33 megahertz. But other versions that followed had 64 bit and 66 megahertz.

This bus can stay with other buses and can work in synchronous or the asynchronous mode.

The keyboard is used to select pictures on the computer.
#True# or False#​

Answers

We use the keyboard to type. it's false.

Answer:

False is the answer of your question

hope it is helpful to you

Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #The first parameter represents how many apostrophes should #be in the string. The second parameter represents how many #quotation marks should be in the string. The third #parameter represen

Answers

Answer:

Explanation:

The following code is written in Java. It creates the function random_marks as requested. It uses three for loops to go concatenating the correct number of apostrophes, quotes, and pairs to the output string before returning it to the user. A test case was added in main and the output can be seen in the attached picture below.

class Brainly {

   public static void main(String[] args) {

       String output = random_marks(3,2,3);

       System.out.println(output);

   }

   public static String random_marks(int apostrophe, int quotes, int pairs) {

       String output = "";

       for (int x = 0; x < apostrophe; x++) {

           output += '\'';

       }

       for (int x = 0; x < quotes; x++) {

           output += '\"';

       }

       for (int x = 0; x < pairs; x++) {

           output += "\'\"";

       }

       return output;

   }

}

A buffer is filled over a single input channel and emptied by a single channel with a capacity of 64 kbps. Measurements are taken in the steady state for this system with the following results:

Average packet waiting time in the buffer = 0.05 seconds
Average number of packets in residence = 1 packet
Average packet length = 1000 bits

The distributions of the arrival and service processes are unknown and cannot be assumed to be exponential.

Required:
What are the average arrival rate λ in units of packets/second and the average number of packets w waiting to be serviced in the buffer?

Answers

Answer:

a) 15.24 kbps

b) 762 bits

Explanation:

Using little law

a) Determine the average arrival rate (  λ  ) in units of packets/s

λ  = r / Tr  --- 1

where ; r = 1000 bits , Tr = Tw + Ts = 0.05 + (( 1000 / (64 * 1000 ))  = 0.0656

back to equation 1

λ = 1000 / 0.0656 = 15243.9 = 15.24 kbps

b) Determine average number of packets w to be served

w =  λ * Tw =  15243.9 * 0.05 = 762.195 ≈ 762 bits

Selecting missing puppies 1 # Select the dogs where Age is greater than 2 2 greater_than_2 = mpr [mpr. Age > 2] 3 print(greater_than_2) Let's return to our DataFrame of missing puppies, which is loaded as mpr. Let's select a few different rows to learn more about the other missing dogs. 5 # Select the dogs whose Status is equal to Still Missing 6 still_missing = mpr[mpr. Status == 'Still Missing'] 7 print (still_missing) Instructions 100 XP • Select the dogs where Age is greater than 2. 9 # Select all dogs whose Dog Breed is not equal to Poodle 10 not-poodle = mpr [mpr.Dog Breed != 'Poodle'] 11 print(not_poodle) • Select the dogs whose Status is equal to Still Missing. • Select all dogs whose Dog Breed is not equal to Poodle. Run Code Submit Answer * Take Hint (-30 XP) IPython Shell Slides Incorrect Submission Did you correctly define the variable not_poodle ? Expected something different. # Select all dogs whose Dog Breed is not equal to Poodle not_poodle = mpr[mpr.Dog Breed != 'Poodle'] print(not_poodle) File "", line 10 not_poodle = mpr [mpr.Dog Breed != 'Poodle'] Did you find this feedback helpful? ✓ Yes x No SyntaxError: invalid syntax

Answers

Answer:

# the dog dataframe has been loaded as mpr

# select the dogs where Age is greater than 2

greater_than_2 = mpr [mpr. age > 2]

print(greater_than_2)

# select the dogs whose status is equal to 'still missing'

still_missing = mpr[mpr. status == 'Still Missing']

print(still_missing)

# select all dogs whose dog breed is not equal to Poodle

not_poodle = mpr [mpr.breed != 'Poodle']

print(not_poodle)

Explanation:

The pandas dataframe is a tabular data structure that holds data in rows and columns like a spreadsheet. It is used for statistical data analysis and visualization.

The three program statements above use python conditional statements and operators to retrieve rows matching a given value or condition.

Please in Paython. thank you.
Miles to track laps One lap around a standard high-school running track is exactly 0.25 miles. Write the function miles_to_laps() that takes a number of miles as an argument and returns the number of laps. Complete the program to output the number of laps. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value)) Ex: If the input is: 1.5 the output is: 6.00 Ex: If the input is: 2.2 the output is: 8.80 Your program must define and call the following function: def miles_to_laps(user_miles)

Answers

Answer:

Here is the code in python.

Explanation:

def miles_to_laps(user_miles):

   return user_miles / 0.25

if _name_ == '_main_':

   print("{:.2f}".format(miles_to_laps(float(input()))))

JavaAssignmentFirst, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==> Close All Projects).Then create a new Java application called "BackwardsStrings" (without the quotation marks) that:Prompts the user at the command line for one 3-character string.Then (after the user inputs that first 3-character string) prompts the user for another 3-character string.Then prints out the two input strings with a space between them.Finally prints on a separate line the two input strings 'in reverse' (see example below) with a space between them.So, for example, if the first string is 'usr' and the second string is 'bin', your program would output something like the following:The two strings you entered are: usr bin.The two strings in reverse are: nib rsu.Note that the reversed SECOND string comes FIRST when printing the strings in reverse.my result/*Name: Saima SultanaLab:PA - BackwardsStrings (Group 2)*/package backwardsstrings;import java.util.Scanner;public class BackwardsStrings { public static void main(String[] args) { //variables String first, second; // TODO code application logic here StringBuilder firstReversed= new StringBuilder(); StringBuilder secondReversed= new StringBuilder(); Scanner input = new Scanner(System.in); // read strings first=input.nextLine(); second=input.nextLine(); // print out the input strings System.out.println("The two string you entered are:"+ first+" "+second+"."); // reverse the strings for ( int i=first.length()-1;i>=0; i--) firstReversed.append(first.charAt(i)); for ( int i=second.length()-1;i>=0; i--) secondReversed.append(second.charAt(i));// print out the reverse string System.out.println("The two strings in reverse are:"+secondReversed+" "+ firstReversed+ ".");}}

Answers

Answer:

Your program would run without error if you declared the first and second string variables before using them:

Modify the following:

first=input.nextLine();  

second=input.nextLine();

to:

String first=input.nextLine();  

String second=input.nextLine();  

Explanation:

Required

Program to print two strings in forward and reversed order

The program you added is correct. The only thing that needs to be done is variable declarations (because variables that are not declared cannot be used).

So, you need to declared first and second as strings. This can be done as follows:

(1) Only declaration

String first, second;

(2) Declaration and inputs

String first=input.nextLine();  

String second=input.nextLine();  

Other Questions
Use the drop-down menus to complete each statement. The process of cellular respiration___ . Photosynthesis allows organisms to harvest the Suns energy to produce___ Read the dialogue from Act I, scene v of Romeo and Juliet.Capulet: Why, how now, kinsman! wherefore storm you so?Tybalt: Uncle, this is a Montague, our foe;A villain that is hither come in spite,To scorn at our solemnity this night.Capulet: Young Romeo, is it?Tybalt: Tis he, that villain Romeo.Capulet: Content thee, gentle coz, let him alone:Based on these lines, which statement is true?Tybalt is light-hearted, and Lord Capulet is downcast.Tybalt is downcast, and Lord Capulet is light-hearted.Tybalt is ready to fight, and Lord Capulet is less impulsive.Tybalt is less impulsive, and Lord Capulet is ready to fight. Drag each item to the correct location on the table.Classify each research source as a print or Internet source.Austen, Rob. Following theRiver. Washington, DC:Brownstein & Gould,.2004. Print.Bowerman, Katye. "HandlingEating Disorders in Teens.The Ohio Press Spinstein .Inc., 27 Mar.2006.Web. 1 Mar. 2015.Brown, Jackson. "The SonicBoom of Technology."News!News!News!Bronson Jakes, 6 July2011. Web. 1 Mar. 2015.Peterson, Evangeline. TheUnabridged Journals ofDouglas E. Johnson.1st ed. Vol. 1.Chicago: Anchor,1993. Print.Scoleville, Jason, andTabitha Huson. "Playing theGame." Egyptian Summit28 Feb. 2015. Print.Zeigler, Jasper. "Skydiving:Taking the Plunge." TheSpringdale Mirror. 24 June2012. Web. 1 Mar. 2015. In Centerville, 45% of the population is female, and 60% of the population commutes to work daily. Of the total Centerville population, 21% are females who commute to work daily. What percentage of the total Centerville population are males who do NOT commute to work daily? A 66.4 gram sample of Ba(ClO4)2 3 H2O was heated thoroughly in a porcelain crucible, until its weight remained constant. After heating, how many grams of the anhydrous compound remained? What is the correct ratio of each rational root of the polynomial Function two things every professional PowerPoint presentation should have New york 6 plains are ASAP show work pleaseee for all of them. 20pst MA + q A =gSomeone help me to do this Aquarian According to Money magazine, Maryland had the highest median annual household income of any state in at (Time website). Assume that annual household income in Maryland follows a normal distribution with a median of and standard deviation of . a. What is the probability that a household in Maryland has an annual income of or more (to 4 decimals) For this question, you will write an essay based on the passage(s). Your writing should Present and develop a central idea Provide evidence andior details from the passage(s). Use correct grammar, spelling, and punctuationBased on Bob, write an essay that explains the struggles Liv and Bobexperience in the passage. Be sure to use information from the passage todevelop your essayIn the box below, the total space provided is equal to about iwo pages What angle is supplementary to 123.9 Which of the following options could represent a possible set of interior angles of a triangle? 45, 105, and 120 O 60, 150 and 150 15. 35 and 40 35. 65, and 80 draw a poster that symbolizes-the importance of grammatical signals in developing patterns of idea in communiting to your readers.You will be graded according to the rubrics provided. .an example is provided as your guide. Debbie would probably have come with us if she didnt have homework.What is the verb phrase? - x-bIf f(x) = b.x-ab-a + a.x-ba - bProve that: f (a) + f(b) = f (a + b) How did the Constitution allow slavery? gary has $227.36 in his bank account. her must maintain a minimum balance of $550 in his account to avoid paying monthly service fee. how much money can gary deposit into his account to avoid paying this fee? PLEASE HELP: The exact value of cos 13/8 is: A. 0.99. B. 2- 2/4 c. 2+2/4 D. 0.38.