Answer:
C) OpenID Connect
Explanation:
The best option is OpenID Connect because is based in OAuth, and supports multiple web based and mobile clients, and supports REST.
With OAuth, we cannot make any user authentication just provide a token to access data.
RADIUS is a networking protocol, and Shibboleth is a single sign-on log-in system for computer networks and the Internet, both not support REST.
Lenovo's ThinkPad laptop computers is designed in the United States, the case, keyboard, and hard drive are made in Thailand; the display screen and memory in South Korea; the built-in wireless card in Malaysia; and the microprocessor in the United States. In each case, these components are manufactured and sourced from the optimal location given current factor costs. In this example, Lenovo has:a. Vertical integration advantagesb. A global web of value creation activitiesc. High local responsivenessd. Learning effects
Answer:
b. A global web of value creation activities
Explanation:
Multinational companies can benefit from creating a global network of value creation activities. With this strategy various phases of the value chain are distributed in several global locations where the cost of value creation is greatly reduced and value maximized. In this scenario Lenovo strategically chooses locations for the manufacturing of components for their ThinkPad laptops, while factoring costs involved and ensuring they are at a minimum. As with any strategy, it has its limitations that can reduce effectiveness such as trade barriers and other political risks.
Implement a function which takes as input an array and a key and updates thearrayso that all occurrencesof the input key have been removed and the remaining elements have been shifted left to fill the emptied indices. Return the number of remaining elements. There are no requirements as to the values stored beyond the last valid element.
The function in cpp language is given.
void shift(int n[], int num)
{
// integer variable to keep count of remaining elements
int count=10;
for(int j=0; j<10; j++)
{
// key element is compared to each element in the array
if(n[j] == num)
{
n[j] = n[j+1];
// decremented after each occurrence of key element in the array
count--;
}
}
std::cout<<count<<" elements are remaining out of 10 elements "<<std::endl;
}
1. The method accepts two parameters, one array and one element.
2. The integer array, arr, and integer element, key, passed to this function are declared outside all the methods.
3. The integer variable, count, is initialized to the size of the integer array, i.e., count contains the number of elements present in the array, arr.
4. Inside the for loop, the element is compared with each element in the array. If they match, the integer variable, count, is decremented each time the element occurs in the array.
5. After the loop completes, the number of remaining elements are displayed.
This function is implemented inside a cpp program as shown below.
#include <stdio.h>
#include <iostream>
// integer array declared and initialized
int arr[10] = {1, 2, 3, 4, 5, 6, 7, 2, 8, 2};
// element to be removed from the array
int key = 2;
void shift(int n[], int num)
{
// integer variable to keep count of remaining elements
int count=10;
for(int j=0; j<10; j++)
{
if(n[j] == num)
{
n[j] = n[j+1];
count--;
}
}
std::cout<<count<<" elements are remaining out of 10 elements "<<std::endl;
}
int main()
{
// function called having array and key as parameters
shift(arr, key);
return 0;
}
The program begins when the array and the element are declared and initialized at the beginning of the program.
Inside the main() method, the method shift() is called by passing two parameters to this method.
The main() method has return type of integer. Hence, this program ends with a return statement.
A crossover cable would normally be used in a 100BaseT network to connect __________.
Answer:
The answer is "directly computing device"
Explanation:
The Ethernet crossover cable used to connect computers directly. Two computers are used in the same form in this method and are mostly related.
The system is connected to two or more switches, and a mini LAN connected to one LAN or two separate hosts. It allows the connection to two hosts or a server to a customer without having a hub.Final answer:
A crossover cable is used in a 100BaseT network to directly connect two similar devices, such as computers, or networking equipment like switches and routers. This cable type crosses transmit and receive lines to enable direct communication, employing twisted pair wiring to minimize crosstalk and interference.
Explanation:
A crossover cable is typically used in a 100BaseT network to connect two similar devices directly to each other without the need for a switch or hub. This type of cable is useful for linking two computers together to form a small network or for connecting switches and routers without uplink ports. The wires within a crossover cable are crossed so that the transmitting signals on one end of the cable line up with the receiving signals on the other end, enabling two devices to communicate directly. Connections utilizing a crossover cable are critical in networks that operate at frequencies up to a few hundred kHz, and they also apply to systems such as Ethernet which can operate near 1 GHz. The use of twisted pair cables, like those in crossover cables, help to reduce crosstalk and other electromagnetic interference which would otherwise be problematic in both power and data transmission.
The Mobile Agricultural Machinery and Equipment Coverage Form does not include coverage for:__________.
Answer:
Aircraft, watercraft, their equipment or parts; automobiles; dealers' demonstration equipment, machinery and vehicles; dirt bikes, house trailers, mobile homes, mopeds, motorcycles, motorized bicycles or tricycles, snowmobiles, trucks, vehicles primarily designed and licensed for road use (other than wagons and trailers designed for farming purposes and used principally on the insured location); Barn cleaners, boilers, bulk feed tanks or bins, bulk milk tanks, pasteurizers or any permanent fixtures attached to or within a building; c. Cotton pickers, harvester-thresher combines and four-wheel all-terrain vehicles not specifically declared and described in the Declarations with a Limit of Insurance for each item; Irrigation equipment; or Contraband, or property in the course of illegal transportation or trade.Explanation:
Aircraft, watercraft, their equipment or parts; automobiles; dealers' demonstration equipment, machinery and vehicles; dirt bikes, house trailers, mobile homes, mopeds, motorcycles, motorized bicycles or tricycles, snowmobiles, trucks, vehicles primarily designed and licensed for road use (other than wagons and trailers designed for farming purposes and used principally on the insured location); Barn cleaners, boilers, bulk feed tanks or bins, bulk milk tanks, pasteurizers or any permanent fixtures attached to or within a building; c. Cotton pickers, harvester-thresher combines and four-wheel all-terrain vehicles not specifically declared and described in the Declarations with a Limit of Insurance for each item; Irrigation equipment; or Contraband, or property in the course of illegal transportation or trade.What should you enter at the command prompt to check the tcp wrapper configuration on your system?
Answer:
The correct answer to the following question will be tcpdchk.
Explanation:
tcpdchk stands for tcp wrapper configuration checker.
It is used to report the problems which will found on your tcp wrapper configuration while surveying and try to fix it where possible.
Type of problems that can reported by the tcpdchk. These are as follows:
Non-existent path names,Unsuitable use of pattern,Unreasonable arguments, etcHence, tcpdchk is the correct answer.
When reading data across the network (i.e. from a URL) in Python 3, what string method must be used to convert it to the internal format used by strings?
Answer:
decode( )
Explanation:
We can use the method decode( ) to decode the string using the codec registered for encoding.
There are two parameters
encoding: We can encode with this parameter.
errors: If used to manage the errors.
For example:
String = "this is string example....wow!!!";
String = Str.encode('base64','strict');
If we print these variables we have:
String = b'dGhpcyBpcyBzdHJpbmcgZXhhbXBsZS4uLi53b3chISE='
String = this is string example....wow!!!
Below is a piece of text that has already been compressed, and shows some of the information about it. Show you know how this works by reconstructing the original text from the dictionary and compressed version?
Answer:
Explanation:
There is a web application where we compress text with some symbols.
For example:
A simple example can be
aaaaaaaaaaaaaaaaa = ☀
But we can make more complex example
☂☃☄☀ = hola
If we use this same rule, we can compress more long sentence
h = ☂
o = ☃
l = ☄
a = ☀
☂☃☄☀_☀_t☃d☃_e☄_mund☃_est☃y_☀qui_p☀r☀_c☃mprimir_text☃
Without the compress
hola_a_todo_el_mundo_estoy_aqui_para_comprimir_texto
Even we can make this compress with entire words
☀_☉_★_☊_☂_☈_☇_☆_☃_☄ = hola a todo el mundo estoy aqui para comprimir texto .
Compressed text size: 19 bytes
Original text size: 52 bytes
The rule is:
hola = ☀
mundo = ☂
comprimir = ☃
texto = ☄
todo = ★
para = ☆
aqui = ☇
estoy = ☈
a = ☉
el = ☊
A graphic designer purchased a new device. The purpose is to convert her sketches that she drew on paper to a digital format. She connects the device to her computer via USB. However, the device is not recognized by her computer.
What is the next step?
a. She must locate and install the driver for her stylus.
b. This output device is not compatible.
c. She must purchase a device manufactured by the same manufacturer as her computer.
d. She must locate and install the driver for her scanner.
Final answer:
The correct step when a computer does not recognize a newly connected device is to locate and install the appropriate driver for that device, in this case, a driver for her scanner.
Explanation:
When a graphic designer's new device is not recognized by the computer after being connected via USB, the next step would typically involve troubleshooting to ensure proper installation and connectivity. In this scenario, the correct course of action would be to locate and install the driver for the device in question. If the device in question is a scanner, which is commonly used to digitize sketches, option d would be the appropriate choice:
She must locate and install the driver for her scanner.
Drivers are software components that enable the operating system to communicate with hardware devices. Without the proper driver, the system may fail to recognize the device. Installing the correct driver normally resolves issues of device detection. It is unnecessary to purchase a device from the same manufacturer as the computer or to assume that the device is not compatible without first attempting driver installation.
Write a method called all Less that accepts two arrays of integers and returns true if each element in the first array is less than the element at the same index in the second array. For example, if the two arrays passed are {45, 20, 300} and {50, 41, 600}, your method should return true. If the arrays are not the same length, you should return false.Test your method and print out to the screen in main() function the following callsa. all Less(arr1, arr2); (where arr1 = [1,2,3,4,5], arr2 = [4,5,6,7,8])b. all Less(arr1, arr2); (where arr1 = [1,2,3,4,5], arr2 = [5,6,7,8])c. all Less(arr1, arr2); (where arr1 = [5,2,3,4,1], arr2 = [4,5,6,7,8])d. all Less(arr1, arr2); (where arr1 = [5,5,3,4,5], arr2 = [9,9,9,9,1])
Answer:
The program to this question can be given as:
Program:
#include<iostream> //header file
using namespace std; //using name space
bool allLess (int arr1[], int arr2[]) //defining method allLess
{
int a,b; //define variable
a= *(&arr1 + 1) - arr1; //hold length of arr1
b= *(&arr2 + 1) - arr2; //hold length of arr2
if(a!=b) //checking condition
{
return 1; //return value
}
for(int i=0; i<a; i++) //loop
{
if( arr1[i]>=arr2[i]) //checking condition
{
return 1; //return value
}
}
return 0; //return value
}
int main() //define main method.
{
int arr1[]={1,2,3,4,5}; //define array arr1 and assign value.
int arr2[]={4,5,6,7,8}; //define array arr2 and assign value.
cout<< allLess(arr1,arr2); //function calling
return 0;
}
Output:
1
Explanation:
The Explanation of the C++ language program can be given as follows:
In the above program firstly we include the header file. Then a method is defined that is "allLess" this method accepts two arrays that are "arr1 and arr2". This function returns a boolean value that is true or false. Inside a function, we define a conditional statement and a loop in the if block we check the length of the arr1 array variable is not equal to arr2 array length. if this condition is true it will return false. In the loop, we define another if block in this block we check that if arr1 array elements are grater then equal to arr2 array element if this condition is true it will return false. At the end of both if block and loop the function will return a value that is "true". In the main method, we define two arrays and pass to the function and use (cout function) for print return value.Pick the two statements about packets and routing on the Internet which are true. a. Packets travelling across the Internet take a standardized amount of time and so can be counted on to arrive in the order they were sent b. TCP ensures messages can be reliably transmitted across the Internet c. TCP depends on the infrastructure of the Internet to be reliable enough to ensure no packets are lost in transmission d. TCP must account for the fact that packets may not arrive at a destination computer in the intended order
Answer:
B. TCP ensures messages can be reliably transmitted across the Internet.
D. TCP must account for the fact that packets may not arrive at a destination computer in the intended order
Explanation:
TCP or transmission control protocol is a connection oriented protocol that divides a packet to segments, and reliably sends them to their destination.
TCP is a layer 4 (transport layer) protocol in the OSI network model. Its packets data unit, PDU, is called segment.
For TCP connection to be successful, a three way handshake must be established between the client and server.
When a connection is established, tcp sends the packets in sequenced segments to the destination through various routes, the source receives acknowledgement for segments received by the destination and the source resend segment that were lost. In the destination, the TCP arranges the segments to its proper sequence.
_____ was invented to standardize computer interfaces around one type of connection.A: The expansion cardB: The USB portC: Blu-rayD: OLED
Answer:
The USB port
Explanation:
USB port is a connection interface for computers and other electronic devices via cable. It is a standard established in 1996 for short distance communication.
USB means Universal Serial Bus. There are four versions till now: USB1, USB2, USB3 and USB4.
USB ports can connect computers with variety of devices like printers, projections, mobile devices, scanners.
Two technicians are discussing MAP sensors. Technician A says that the MAP sensor should be replaced if anything comes out of the sensor when the vacuum hose is removed from the sensor. Technician B says that the injector pulse width should increase when vacuum to the MAP sensor is increased. Who is right?
Answer:
Both are correct.
Explanation:
Both technicians are correct in this scenario. Technician A point of view is correct as well as technician B.
You are on a roller coaster and enter a loop, traveling on the inside of the loop. You pull positive Gs. What provides the centripetal force to make you move in a circle?
Answer:
While traveling on the inside of the loop, you will pull positive Gs and acceleration provides the centripetal force that pushes you against your roller coaster seat.
Explanation:
Due to acceleration, centripetal force keep roller coasters on their tracks and people in their seats. Centripetal force points to the inside of the loop and the car needs to travel fast in order to apply enough centripetal acceleration the roller coaster entering the loop.
When the cars are on the track, gravity pulls downward at a constant magnitude, but as it speeds up almost at the top of the loop, it and the track add together with the centripetal force.
You are helping your friend troubleshoot a problem with his Linux server. You enter a common Linux command and discover it doesn’t work exactly as you expected. What might be the problem and what do you do next?
Answer:
The syntaxis of the command.
Depending on which command you are trying to execute (there are a lot of commands), if you are getting an error or your command doesn't give you the results you expected, there might be something wrong with the syntaxis of your command, like:
Missing part of the command.Incorrect values in the command.Incorrect symbols in the command.Spaces or punctuation marks.While cloud services are useful for small and midsize analytic applications, they are still limited in their ability to handle Big Data applications.1. True
2. False
Answer:
False
Explanation:
There are cloud applications which can effectively handle big data.
For example processing and handling big data technologies like Hadoop, Spark can be used on cloud.
Services like Amazon Web Services or Google Cloud Services allows users analyze big data with various tools.
You want to equip yourself with FRUs for a laptop. What would you take with you? (Choose two)A. RAMB. SD card readerC. Video cardD. NICE. Hard drive
Answer:
RAM and Hard Drive
Explanation:
An FRU is also called a Field-repleacable Unit and is usually an assembly that is easily removed from an electronic equipment, laptop or just a computer and replaced so that one does not have to take the entire system for repairs. When trying to equip yourself with this unit of a laptop, you must take your Random Access Memory and your hard drive as they contain the whole information on the laptop.
Wi-Fi networks operate in basically the same way as cellular telephony networks that are designed, installed, and maintained by the wireless telephone carriers.
A) True
B) False
Answer: B) False
Explanation:
Wi-Fi network works by using radio signals to share or transfer data between devices, Wi-Fi networks are not designed,installed and maintained by wireless telephone carriers are parts of the features of modern telephones, computer etc installed by the telephone,Computer etc manufacturers.
Wi-Fi is a trademarked term meaning IEEE 802.11x,it is also a short range wireless connection to a wireline broadband connection.
Which of the following is true of the learning phase of Web site production? It orients the designer to consider how audiences will use the Web site and where they will access it. It involves seeking information from clients about what they want in a Web site. The wireframe is developed to look like the final product, often in Photoshop or some other graphics program. The template is transformed into a working Web site. The completed and approved site is launched into the world.
Answer:
Option B is the correct answer to the following question.
Explanation:
Because the website production involves in looking for the information or data from the clients as related to the website, without the information the website developer unable to create our clients website and the first thing before creating the website is the information about what type of website the client wants after that, developer plan how to create his website before start.
The learning phase of website production is crucial for understanding how users interact with the site and for gathering client requirements. It involves creating a wireframe that outlines content placement without final design elements, followed by storyboarding with initial designs
During the learning phase of website production, designers must consider various important aspects before the actual development of the website begins. The main purpose of this phase is to orient the design around how audiences will interact with the website and to gather an understanding of the website's goals from the client. Often this phase includes developing a site wireframe, which serves as a blueprint for the website layout, highlighting the placement and size of content elements, but not the design specifics such as style or color.
Site wireframes are created keeping in mind the content elements and their locations, without delving into specific design attributes. The process extends into storyboarding, where initial designs including color schemes, typography, and rough images are added using graphic editors. This is completed before any coding begins, allowing for a thorough understanding of the website's structure, which ultimately facilitates the development process.
John works as a sales representative with Northwind Traders. He has to make a presentation to his customers in another town. The presentation occupies 10 gigabytes (GB) on his computer. He wants to make some final changes to this presentation while he is traveling.
Which of the following types of computers will help John carry this data with him?
A. Mainframe
B. Personal digital assistant (PDA)
C. Laptop
D. Desktop computer
Answer:
C
Explanation:
A laptop is a computer you can carry around because it is portable and at the same time has enough gigabytes for John to store 10 gigabytes of information. It can also be transported around without feeling like you are carrying a large box around. He can also edit his work, making some final changes to his presentation while he is travelling.
Answer:
c
Explanation: laptops are portable and usually light so their easy to transport as john being able to acess the data easily.
int puzzle(int start, int end) { if (start > end) return start - end; else if (start == end) return start + end; else return end * puzzle(start + 1, end - 1); } Consider the accompanying definition of a recursive function. What is the output of the following statement? cout << puzzle(3, 7) << endl; a. 10 b. 21 c. 42 d. 420
Answer:
d. 420
Explanation:
Two technicians are discussing bleeding air from the brake hydraulic system. Technician A says to depress the brake pedal slowly and not to the floor to prevent possible seal damage inside the master cylinder. Technician B says to wait 15 seconds between strokes of the brake pedal.
Answer:
Both
Explanation:
Where should the Analytics tracking code be placed in the HTML of a webpage for data collection?
Answer:
Just before the closing </head> tag
Explanation:
The Analytics tracking code is usually a small pieces of JavaScript snippet install on a page of a website (just before the closing </head>tag) but runs in the viewer's browser. it is responsible for tracking and collection of all of the users data when they visit the pages.
When designing your navigation, your primary objective should be to include keywords for search engines.
a) true
b) false
Answer:
Option b is the correct answer for the above question.
Explanation:
When a user creates a website then he should need to put navigation on that because navigation is a collection of the list followed by a link which is used to transfer the user to the other page of that website. For example, if a user makes a website of the student, then the navigation will hold the link of student detail, about us and login.
But search engine keywords are used to find the website easily on the internet which is important when a user lives his website but it is not important when a user creates a website. But the above question statement says that it is important while creating a website in the navigation bar which is not correct.
Hence Option b is the correct answer which states that the question statement is a false statement.
Larry is responsible for NIDS/NIPS in his company and has configured a new NIPS solution. What part of this device collects data?
Answer:
Sensor collects data of this device
Explanation:
A network intrusion protection system (NIPS) includes hardware and software systems that protect computer networks and prevent unauthorized access and malicious events.
NIPS hardware consists of a Network Intrusion Detection System (NIDS) which detects malicious activities, denial of service attacks on a computer or network by monitoring network traffic and detecting suspicious patterns in data packets. Three basic component of this system are sensor, control unit, and annunciator. This intrusion detection system collect data using sensor.
NIDS consists of sensors, which passively inspect network traffic for malicious activity. A sensor is a software and hardware device. A sensor can work as a Network Terminal Access Point (TAP) or a firewall log. It collects information about network. Sensor can be used to make decisions about your network’s security. Data collected from multiple sensors make information and traffic monitoring efficient as it generate different types of data and can be created to perform different functions.
The following statement calls a function named half, which returns a value that is half that of the argument. (Assume the number variable references a float value.) Write code for the function.
Answer:
The function definition to this question can be given as:
def half (number): #defining a function half and pass a variable number in function parameter
return number/2 #returns value.
data=half(12) #defining variable data that holds function return value
print(data) #print value.
Output:
6.0
Explanation:
In the above python program, a function that is half is declare that includes a variable number in the function parameter. Inside the function, the parameter value that is number is divided by 2 and returns its value. In calling time a data variable is defined that holds the function half() value.
In calling time function holds value that is "12" in its parameter and return a value that is "6.0".
Final answer:
The student requested code for a function named 'half' that returns half the value of a float argument. The Python function 'def half(number): return number / 2.0' fulfills this request.
Explanation:
The student has asked for code to be written for a function named half, which returns a value that is half that of its argument, where the argument is a float value. Let's define this function in Python, as it is commonly used in educational contexts:
def half(number):
return number / 2.0
To use this function, you would just call half with the number variable as its argument like this: result = half(number). This function simply takes the argument number, divides it by 2, and returns the result. If number is a float, the result will also be a float representing half of the original value.
You are tasked with securing a small network for a client in which the following requirements must be met:
a. If a user on the private network attempts to send confidential company information to an unauthorized entity, an alert should be triggered.
b. The private trusted network should not be accessible from the public untrusted network.
c. Of attacks are coming from the external network, the system should detect and prevent malicious activity.
d. All incoming and outgoing email should be scanned for malware.
While tasked with securing a small network for a client in which the following requirements must be met: All incoming and outgoing email should be scanned for malware.
d. All incoming and outgoing email should be scanned for malware.
Explanation:
Since network administrator assigned a task to scan the mail for every users. Network administrator has to installed local mail server such as lotus dominos or any other third part tools. So which will scanned the documents, excel sheet or any files and generated a logs.
Through third party software network administrator allows user to receive or send documents or excel sheet or any other files. Moreover other user can be control only receive the documents or sheet or any other files.
So that organization is protected, by not sharing g files outside the networks. Moreover each email is scanned for malware check and generated the report so that network administrator can do analysis and give report to management.
Answer:
Implement a UTM appliance.
Explanation:
A UTM appliance will usually include functions such as: antivirus, anti-spyware, anti-spam, network firewalling, intrusion detection and prevention, content filtering and leak prevention
You are concerned about fault tolerance for the database server you manage. You need to ensure that if a single drive fails, the data can be recovered. What RAID level would be used to support this goal while simultaneously distributing parity bits?
A) RAID 0
B) RAID 1
C) RAID 3
D) RAID 5
Answer:
D. RAID 5
Explanation:
Raid ( Redundancy array of inexpensive disk or drives) levels are used to boost performance and reliability of storage devices. They consist of hard drives or solid state drives working parallel to each other.
There are different levels of RAID, they are;
Raid 0, 1, 2, 3, 4, 5 and 10. Raid 2, 3, 4 and 7 are not really is use, so, we pay attention to 0, 1, 5 and 10.
Raid 0 only splits data to not list two drives and are not redundant. Raid 1 mirrors or reflects data on at least two drives and are also not redundant.
Raid 5 is redundant as it share data and parity bits between 16 or more drives.
Unlike Raid 5, Raid 10 does not have parity bits.
You are a desktop administrator for Nutex Corporation. A user reports that he is unable to access network resources. You notice a break in the network cable.You need to create a new network cable to connect the computer to the RJ-45 jack in the wall. What should you use to connect the end of the cable to an RJ-45 connector?
Answer:
The right answer is wire crimper tool.
Explanation:
According to the scenario, the most appropriate answer is the wire crimping tool because the wire crimping tool is a tool that can strip the wire then cut it in proper shape and then crimp the wire in the RJ45 connector very effectively.
RJ45 connector is a connector which is used in ethernet cables to connect to computers i.e. cat 5, cat 5e, cat 6, etc. these cable has 4 pairs of different color codes.
A wire crimper effectively connects the end of the cable to an RJ45 connector.
The order in which statements are executed during a program run. Answer 1 The first part of a compound statement begins with a keyword and ends with a colon ( : )
This is an incomplete question. The question I was able to find as the complete one is as follows:
Match the following terms and definitions
stack diagram flow of execution local variable function call header-The order in which statements are executed during a program run. Answer 1
-The first part of a compound statement, begins with a keyword and ends with a colon ( : ) Answer 2
-A statement that executes a function. It consists of the name of the function followed by a list of arguments enclosed in parentheses. Answer 3
-A variable defined inside a function that can only be used inside its function. Answer 4
-A graphical representation of functions, their variables, and the values to which they refer. Answer 5
Answer with Explanation:Flow of Execution: The order in which statements are executed during a program run. This is done from top to bottom which means the statement written first is executed first.Header: The first part of a compound statement, begins with a keyword and ends with a colon ( : ). A header is given usually at the top. It can contain libraries being used in the program body.Function Call: A statement that executes a function. It consists of the name of the function followed by a list of arguments enclosed in parentheses. It is used to perform specific functions that are defined before calling a function. A program can be called as many times as needed.Local Variable: A variable defined inside a function that can only be used inside its function. A local variable with same name can be used inside two different functions but they are needed to be defined first.Stack Diagram: A graphical representation of functions, their variables, and the values to which they refer. It is the tool for knowing the state of program at the time given.
i hope it will help you!
Which key on a laptop keyboard is often used to help pair a mobile device with another device for communication purposes?
Bluetooth
Cellular
Dual Display
Wireless
BLUETOOTH IS your answer
cause dual display is when you show whats on one device on another too