C++ "Simon Says" is a memory game where "Simon" outputs a sequence of 10 characters (R, G, B, Y) and the user must repeat the sequence. Create a for loop that compares the two strings starting from index 0. For each match, add one point to userScore. Upon a mismatch, exit the loop using a break statement. Assume simonPattern and userPattern are always the same length.
Ex: The following patterns yield a userScore of 4:
Ex: The following patterns yield a userScore of 9:
simonPattern: RRGBRYYBGY
userPattern: RRGBBRYBGY
Result: Can't get test 2 to occur when userScore is 9
Testing: RRGBRYYBGY/RRGBBRYBGY
Your value: 4
Testing: RRRRRRRRRR/RRRRRRRRRY
Expected value: 9
Your value: 4
Tests aborted.

Answers

Answer 1

Answer:

In C++:

#include <iostream>

using namespace std;

int main(){

   int userScore = 0;

   string simonPattern, userPattern;

   cout<<"Simon Pattern: ";    cin>>simonPattern;

   cout<<"User Pattern: ";    cin>>userPattern;

   for (int i =0; i < simonPattern.length();i++){

       if(simonPattern[i]== userPattern[i]){

           userScore++;        }

       else{            break;        }

   }

   cout<<"Your value: "<<userScore;

   return 0;

}

Explanation:

This initializes user score to 0

   int userScore = 0;

This declares simonPattern and userPattern as string

   string simonPattern, userPattern;

This gets input for simonPattern

   cout<<"Simon Pattern: ";    cin>>simonPattern;

This gets input for userPattern

   cout<<"User Pattern: ";    cin>>userPattern;

This iterates through each string

   for (int i =0; i < simonPattern.length();i++){

This checks for matching characters

       if(simonPattern[i]== userPattern[i]){

           userScore++;        }

This breaks the loop, if the characters mismatch

       else{            break;        }

   }

This prints the number of consecutive matches

   cout<<"Your value: "<<userScore;


Related Questions

A tactful representation of opposing views is essential when writing for the opposition. True or false

Answers

say that is it true i know

Harry wants to change the background of all of his presentation slides. Which slide will enable him to make this change to all the slides at once?
Harry needs to change the ___________ to change the background of all his presentation slides.

Answers

Answer:

settings

Explanation:

edmentum

Which statement in main() generates an error?
public class Players {
public void setName(String newName) { … }
public void setAge(int newAge) { … }
};
public class SoccerPlayers extends Players {
public void setDetails(String newName) { … }
public String getLeague() { … }
};
public static void main(String args[]) {
String leagueName;
Players newPlayers = new Players();
SoccerPlayers playerObject = new SoccerPlayers();
playerObject.setName("Jessica Smith");
playerObject.setAge(21);
leagueName = newPlayers.getLeague(); }
A. SoccerPlayers playerObject=new SoccerPlayers(); An object of a derived class cannot be created.
B. playerObject.setName("Jessica Smith"); setName() is not declared in SoccerPlayers.
C. leagueName=newPlayers.getLeague(); getLeague() is not a member of Players.
D. Players newPlayers=new Players(); An object of a base class cannot be created.

Answers

Answer:

C. leagueName=newPlayers.getLeague(); getLeague() is not a member of Players.

Explanation:

The main method in this code will case an error when trying to run the following line of code...

leagueName=newPlayers.getLeague();

This is because the method getLeague() is being called on a Player object which takes all of its methods from the Player class. Since getLeague() is not a method located in the player class then it cannot be called by an object from that class. Especially since the Player class does not extend to the SoccerPlayers class where the getLeague() method is actually located. Instead, it is the SoccerPlayers class which extends the Players class as its parent class.

my uh coding teacher would like the class to do little piggy with code.


Write code using def to create functions so that each line is printed in its own function. Turn in a gdb link so I can grade it.


This little pig went to the market.

This little pig stayed home.

This little pig had roast beef.

This little pig had none.

This little pig cried wee wee wee all the way home.


here's a example from him but i don't understand it


import time


def myFunction():

print('In the function called my function')

time.sleep(2)


def yourFunction():

print('In the function called your function')

time.sleep(2)


#*********MAIN**********

print ('In the main part of the program')

time.sleep(2)

myFunction()

print ('Back in the main')

time.sleep(2)

yourFunction()

print ('Back in the main after your function')


please help if you can

Answers

Answer:

see picture below

Explanation:

I added a parameter to factor out the first bit of each sentence into a global variable. If you change for example 'pig' into 'monkey', all sentences will change.

What is true about super computers?

Answers

Explanation:

Super Computer are expensive computer that are used to provide very quick results. Super computer are used in calculating complex mathematical calculations. Calculations such as weather forecast and Atomic energy research. Therefore Super Computer perform complex calculations rapidly.

What is also known as a visual aid in a presentation?
A. background
B. animation
C. review
D. slide
E. template

Answers

Visual aids are defined as charts, pictures or images that help to make a point or enhance a presentation, so I would say B. animation.

Hope this helps!!

Answer:

it is d slide

Explanation:

The place where an organism lives and that provides the things the organism needs is called it’s

Answers

Answer:

A habitat is a place where an organism makes its home. A habitat meets all the environmental conditions an organism needs to survive.

Explanation:

Why is myConcerto considered essential to Accenture's work with enterprise
systems?

Answers

Answer:

myConcerto can help clients envision, innovate, solution, deliver and support their transformation to an intelligent enterprise–providing the technology foundation to accelerate their journey and minimize risk along the way.

Hope it helps

Please mark me as the brainliest

Thank you

myConcerto is considered essential to the Accenture enterprise because it helps to do the following:

It can help the clients to envision more.It is useful for innovation.It provides solution.It helps to deliver and also support transformation to enterprises that make use of artificial intelligence.

What is myConcerto?

This platform is one that is digitally integrated. What it does is that it helps Accenture in the creation of great business outcomes.

Read more on Accenture here:

https://brainly.com/question/25682883

how does dual concepts work?​

Answers

The transaction that affects a business

Description
Military time uses 24 hours for the entire day instead of 12 for am/pm separately. Military time is a 4 digit (base-10) integer with the following rules:
The first two digits show the hour (between 00 and 23) and
The last two digits show the minutes (between 00 and 59)
There is no colon separating hours from minutes.
Military time starts at 0000 in the morning and counts up
When we get to the afternoon, we use 1300 for 1:00 PM and 2300 for 11:00 PM.
When we get to midnight, the hour is 00 (not 24).
TASK: Write a program that reads two times in military format and prints the number of hours and minutes between the two times (See example below).
NOTE: Your program should consider the difference between the times IN THE SAME DAY. For example: The time difference between 2359 and 0000 is 23 hours and 1 minute (NOT 1 minute).
Detailed Requirements
• Compose a written document (MS Word Document) describing your algorithm, feel free include a diagram if you like
• The program should prompt for two times separately, then print the duration of time between (see sample output below).
• The program should check the input for the correct military time format:
. Make sure the hours are between 00 and 23.
. Make sure the minutes are between 00 and 59
. If the validity check fails, it should print an appropriate error and prompt again.
• Your program should use io manipulators to produce military time with leading zeroes. e.g. 9 am should be printed 0900 (not 900).
• More points will be awarded to an implementation that can produce an accurate result regardless of the order of the inputs.
• Do not produce runtime errors that abruptly end your program (crash)
• Include descriptive comments, neat indentation, proper spacing for good readability, and appropriate and consistently named variables.
• Program source should have a comment block at the top with the student name, section, and description of your program.
Please enter a time: 1sykdf
Military Tine Format Required: Bad input, try again.
Please enter a time: 2580
Military Tine Format Required: Hours must be between 2 and 23, try again
Please enter a time: 2365
Military Tine Format Required: Minutes must be between me and 59, try again
Please enter a time: 0900 First time 0900 accepted.
Please enter a time: jdkjs
Military Time Forest Required: Bad input, try again.
Please enter a time: 39573
Military Tine Format Required: Hours must be between 28 and 23, try again
Please enter a time: 1799
Military Tine Format Required: Minutes must be between me and 59, try again
Please enter a time: 1730 Second time: 1738 accepted.
Time difference between 1988 and 1732 ts 8 hours and 30 minutes Dismissed solder!
Note! When I change the order of the time inputs. I get the same result!

Answers

Answer:

from datetime import time, datetime, timedelta, date

for _ in iter(list, 0):

   t1 = input("Please enter time one: ")

   t2 = input("Please enter time two: ")

   if t1.isdigit() == True and (int(t1[:2])<=23 and int(t1[2:]) <= 59)\

       and t2.isdigit() == True and (int(t2[:2])<= 23 and int(t2[2:])<=59):

       time_1 = time(hour=int(t1[:2]), minute=int(t1[2:]))

       time_2 = time(hour= int(t2[:2]), minute=int(t2[2:]))

       if time_1 > time_2:

           diff = datetime. combine (date. today( ), time_1) - datetime. combine(date. today ( ), time_2)

       else:

           diff = datetime. combine (date. today( ), time_2) -datetime. combine(date. today ( ), time_1)

       diff_list = str(diff).split(":")

       del diff_list[2]

       diff_t = "". join (diff_list)

       print(diff_t)

       break        

   if t1.isdigit() == False or t2.isdigit() == False:

       print("Military Time Forest Required: Bad input, try again.")

       continue

   elif int(t1[:2])> 23 or int(t2[:2])> 23:

       print("Military Tine Format Required: Hours must be between 00 and 23, try again")

       continue

   elif int(t1[2:])> 59 or int(t2[2:])> 59:

       print("Military Tine Format Required: Minutes must be between me and 59, try again")

       continue

Explanation:

The python Datetime package is used to manipulate date and time, creating immutable Datetime objects from the various python data types like integer and string. The block of code above is a conditional for-loop statement that gets two user time value inputs and prints out the difference as a string in Military forest time format.

what is output?
a include <iostreom.h>
void sub (float & x)
{ x + =2;
cout <<" \nx="<<x;
}
اے
void main ()
{ clrser ()
float x = 5.8
cout<<" \nx="<<x'
sob (x);
Cout <<"\nx="<<x
getch ();
}​

Answers

Answer:

x=5.8

x=7.8

x=7.8

Explanation:

I repaired the code somewhat (see below).

Since x is passed as a reference variable to the sub function, inside sub() the original variable is modified, so the changed value affects the variable declared in main().

If you would remove the & in sub, this wouldn't happen, and the variable in main would keep its value 5.8.

What is the second step in opening the case of working computer

Answers

Answer: 1. The steps of opening the case of a working computer as follows:

2. power off the device.

3. unplug its power cable.

4. detach all the external attachments and cables from the case.

5. Remove the retaining screws of the side panel.

6. Remove the case's side panel.

Explanation:

explain 3 components of the Visual Basic IDE (6 marks)​

Answers

Answer:

Explanation:

The IDE of Visual Studio 2008 contains numerous components, and it will take you a while to explore them. It’s practically impossible to explain in a single chapter what each tool, window, and menu command does. We’ll discuss specific tools as we go along and as the topics get more and more advanced. In this section, I will go through the basic items of the IDE — the ones we’ll use in the following few chapters to build simple Windows applications.

The IDE of Visual Studio 2008 contains numerous components, and it will take you a while to explore them. It’s practically impossible to explain in a single chapter what each tool, window, and menu command does. We’ll discuss specific tools as we go along and as the topics get more and more advanced. In this section, I will go through the basic items of the IDE — the ones we’ll use in the following few chapters to build simple Windows applications.The IDE of Visual Studio 2008 contains numerous components, and it will take you a while to explore them. It’s practically impossible to explain in a single chapter what each tool, window, and menu command does. We’ll discuss specific tools as we go along and as the topics get more and more advanced. In this section, I will go through the basic items of the IDE — the ones we’ll use in the following few chapters to build simple Windows applications.

The Edit menu contains the usual editing commands. Among these commands are the Advanced command and the IntelliSense command. Both commands lead to submenus, which are discussed next. Note that these two items are visible only when you’re editing your code, and are invisible while you’re designing a form.

Your program should include the following four functions:
check_length - This function should accept a password to evaluate as a parameter and should return a score based on the length of the password. A password that is less than 8 characters long gets a length score of 1. If it is between 8 and 11 characters long (inclusive), it gets a length score of 2. A password that is 12 characters or longer gets a length score of 3.
check_case - This function should accept a password to evaluate and return a case score of 1 or 2. If the letters in the password are all uppercase or all lowercase, the case score should be a 1. If there is a mix of uppercase or lowercase letters (or if there are no letters at all), it gets a case score of 2.
check_content - This function should accept a password to evaluate and return a content score. If the characters are all alphabetic characters, the content score is 1. If the characters include any numeric digits (either all numeric or a mix of letters and digits), the content score is 2. If there are any other types of characters (such as punctuation symbols), the content score is 3.
main - This function represents the main program. It accepts no parameters and returns no value. It contains the loop that allows the user to process as many passwords as desired. It function calls the other functions as needed, computing the overall score by adding up the scores produced by each function. All output should be printed in the main function.
python please

Answers

Answer:

def main():

   pwd = input("Password: ")

   print("Length: "+str(check_length(pwd)))

   print("Case: "+str(check_case(pwd)))

   print("Content: "+str(check_content(pwd)))

   

def check_length(pwd):

   lent = len(pwd)

   if lent < 8:

       return 1

   elif lent >=8 and lent <= 11:

       return 2

   else:

       return 3

   

def check_case(pwd):

   if(pwd.isupper() or pwd.islower()):

       return 1

   else:

       return 2

   

def check_content(pwd):

   if(pwd.isalpha()):

       return 1

   elif(pwd.isalnum()):

       return 2

   else:

       return 3

   

if __name__ == "__main__":

   main()

Explanation:

The main begins here

def main():

This prompts the user for password

   pwd = input("Password: ")

This calls the check_length function

   print("Length: "+str(check_length(pwd)))

This calls the check_case function

   print("Case: "+str(check_case(pwd)))

This calls the check_content function

   print("Content: "+str(check_content(pwd)))

The check_length function begins here    

def check_length(pwd):

This calculates the length of the password

   lent = len(pwd)

If length is less than 8, it returns 1

   if lent < 8:

       return 1

If length is less than between 8 and 11 (inclusive), it returns 2

   elif lent >=8 and lent <= 11:

       return 2

If otherwise, it returns 3

   else:

       return 3

The check_case function begins here    

def check_case(pwd):

If password contains only uppercase or only lowercase, it returns 1

   if(pwd.isupper() or pwd.islower()):

       return 1

If otherwise, it returns 2

  else:

       return 2

The check_content function begins here

def check_content(pwd):

If password is only alphabet, it returns 1

   if(pwd.isalpha()):

       return 1

If password is only alphanumeric, it returns 2

   elif(pwd.isalnum()):

       return 2

If otherwise, it returns 3

   else:

       return 3

This calls the main function    

if __name__ == "__main__":

   main()

Structural Styles
Go to the Structural Styles section. Within that section create a style rule to set the background color of the browser window to rgb(151, 151, 151).
Create a style rule to set the background color of the page body to rgb(180, 180, 223) and set the body text to the font stack: Verdana, Geneva, sans-serif.
Display all h1 and h2 headings with normal weight.
Create a style rule for every hypertext link nested within a navigation list that removes underlining from the text.
Create a style rule for the footer element that sets the text color to white and the background color to rgb(101, 101, 101). Set the font size to 0.8em. Horizontally center the footer text, and set the top/bottom padding space to 1 pixel.

Answers

Solution :

For Structural Styles the browser's background color.  

html {

background-color: rgb(151, 151, 151);

}

For creating style rule for the background color and setting the body text

body {

background-color: rgb(180,180,223);

font-family: Verdana, Geneva, sans-serif;  

}

For displaying all the h1 as well as h2 headings with the normal weight.

h1, h2 {

font-weight: normal;

}

For create the style rule for all the hypertext link that is nested within the  navigation list  

nav a {

text-decoration: none;

}

For creating style rule for footer element which sets the color of the text to color white and the color of the background to as rgb(101, 101, 101). Also setting the font size to 0.8em. Placing the footer text to horizontally center , and setting the top/bottom of the padding space to 1 pixel.

footer {

background-color: rgb(101, 101, 101);

font-size: 0.8em;

text-align: center;

color: white;

padding: 1px 0;

}

/* Structural Styles At one place*/

html {

background-color: rgb(151, 151, 151);

}

body {

background-color: rgb(180,180,223);

font-family: Verdana, Geneva, sans-serif;  

}

h1, h2 {

font-weight: normal;

}

nav a {

text-decoration: none;

}

footer {

background-color: rgb(101, 101, 101);

font-size: 0.8em;

text-align: center;

color: white;

padding: 1px 0;

}

Select the correct statement(s) regarding the signal-to-noise ratio (SNR).
A. SNR represents the ratio of transmit signal power over the noise power of all sources including thermal, impulse, IM, CCI, and crosstalk noise.
B. the noise (i.e., noise floor) in the signal-to-noise ratio, is a wideband noise product that is predominated by thermal noise.
C. the noise power, in the signal-to-noise ratio, occupies a narrow band in the frequency domain.
D. all of the above are correct statements.

Answers

Answer:

B. the noise (i.e., noise floor) in the signal-to-noise ratio, is a wideband noise product that is predominated by thermal noise.

Explanation:

Sound can be defined as mechanical waves that are highly dependent on matter for their propagation and transmission. Sound travels faster through solids than it does through either liquids or gases.

Signal-to-noise ratio (SNR) is simply the ratio of signal power to noise power or the ratio of desired information to the undesired signal. SNR doesn't have a unit i.e it is a unitless quantity.

Generally, the higher the signal-to-noise ratio (SNR), the better would be the quality of a signal.

Additionally, a negative signal-to-noise ratio (SNR) in decibel form simply means that the signal power is lesser than the noise power.

Hence, the correct statement regarding the signal-to-noise ratio (SNR) is that the noise (i.e., noise floor) in the signal-to-noise ratio, is a wideband noise product that is predominated by thermal noise.

Note: noise can be defined as an unwanted disturbance or undesired signal present in an electrical signal.

Given A=1101 and B=1001. What is the result of the boolean statement: A
AND B​

Answers

Answer:

B  (1001)

Explanation:

The AND operator gets you 1's where there are 1's in both inputs. So if you would "overlay" the two binary values, only 1001 remains.

Explain, step by step the process required to carry out drive error correction (disk check) on Windows 10​

Answers

Explanation:

Disk Error Checking in Windows 10

In Windows 8, Microsoft has redesigned chkdsk utility – the tool for detecting and fixing disk corruption. In Windows 8, Microsoft introduced a file system called ReFS, which does not require an offline chkdsk to repair corruptions – as it follows a different model for resiliency and hence does not need to run the traditional chkdsk utility.

The disk is periodically checked for file system errors, bad sectors, lost clusters, etc., during Automatic Maintenance and you now no longer need to really go and run it. In fact, Windows 8 now even exposes the state of the file-system and disk via the Action Center or under the Drive properties in File Explorer. If potential errors are found, you will be informed about it. You can continue to use the computer, while the scan is carried out in the background. If errors are found, you may be prompted via a notification to restart your computer.

Read: How to cancel ChkDsk in Windows.

Windows found errors on this drive that need to be repaired

At times you may see a message – Windows found errors on this drive that need to be repaired. If you see it, you may want to manually run a scan. Earlier you had to schedule Disk Error Checking for the system drive and for drives which had files or processes or folders opened. In Windows 10/8, error checking starts right away, even on the system drive – and it longer needs to be scheduled at start-up. Only if some errors are found, will you have to restart to let Windows 10/8 fix the errors.

How to run CHKDSK in Windows 10

To begin the scan, right-click on the Drive which you wish to check and select Properties. Next, click on Tools tab and under Error-checking, click on the Check button.  This option will check the drive for file system errors.

If the system detects that there are errors, you will be asked to check the disk. If no errors are found, you will see a message – You don’t need to scan this drive. You can, nevertheless, choose to check the drive. Click on Scan drive to do so.

I need help to pick what programming language is best to make videogames

Answers

Answer:

In my opion its java script

Explanation:

What happens when text is added to grouped objects that is larger than an object ?

Answers

Answer:

You have to select the picture and pick the text at first.

Then press context menu key on a keyboard or right mouse button and choose group/ungroup point.

Choose group.

And finally you can select and resize the object and text simultaneously.

Do drone batteries discharge 100% of their total capacity?

Answers

nope

As long as you dont leave them plugged in overnight when your not using it wont drain its capacity

What are the types of storage?

Answers

Answer:

Primary Storage: Random Access Memory (RAM) Random Access Memory, or RAM, is the primary storage of a computer. ...

Secondary Storage: Hard Disk Drives (HDD) & Solid-State Drives (SSD) ...

Hard Disk Drives (HDD) ...

Solid-State Drives (SSD) ...

External HDDs and SSDs. ...

Flash memory devices. ...

Optical Storage Devices. ...

Floppy Disks.

Answer:

The types of storage unit are 1)magnetic storage device 2)optical storage device

explain five unique features of word processor

Answers

Explanation:

Typing, editing and printing different types of document . Formatting text , paragraph , pages for making attractive document .Checking spelling and grammar of document for making it error free.Inserting and editing picture , objects,etc. Adding watermark, charts,quick flip , etc

1) Easy Typing : In MS Word, typing is so easy because :

we need not click enter button after the end of a line as in case of type writer. The word processor itself takes the matter to the next line of the document. This facility is called word wrapping.There is no limit for typing the matter in word processing. You can type the matter continuously without resorting to new page or file. But in a type writer, if you complete a page, you have to take another blank page and start typing.You can easily rectify mistakes as the typed matter appears on the screen.

2) Easy : The document so typed can be stored for future use. The process of storing is called saving. We can preserve the document for any number of years in word processing.

3) Adding, Removing and Copying Test : Documents can be modified easily in MS Office. We need not strike off any word as in the case of type writer. We can easily place a new word in place of existing one. The new word or paras will automatically be adjusted in the place of deleted or modified text. We can also copy a part or whole of the matter from one file or document to another document.

4) Spell Check of words : The spellings of words in the document can be rectified automatically. We can find alternative words to our typed words. Not only that, even the grammatical errors can also be rectified in word processor.

5) Change the Style and Shape of Characters and Paragraphs : The documents in word processor can be made attractive and appealing because the shape and style of characters or letters in the documents can be changed according to our requirements. You can even change the gap between one line and other line in the document. This process is called line spacing. Not only the lines but also paragraphs can be aligned to make it more appealing to the readers. This facility is called alignment in word processing.

HOPE IT HELPS

PLEASE MARK ME BRAINLIEST ☺️


Write a program in QBasic to enter two numbers and print the greater one.​

Answers

Answer:

REM

CLS

INPUT “ENTER ANY TWO NUMBERS”; A, B

IF A > B THEN

PRINT A; “IS GREATER”

ELSE

PRINT B; “IS GREATER”

END IF

END

class one

{

public static void main ( )

{

int a = 1,b = 2;

if ( a > b )

{

System.out.print (" greater number is " + a);

}

else if ( a < b )

{

System.out.print (" greater number is " + b);

}

}

}

Q.2 (A)
Write down the method for cooking pasta from the given ingredients.
% CUP
Ingredients and amounts
Dried pasta
Butter
Amul cheese spread
Milk
Salt
1 tablespoon
2-3 tablespoon
Va cup
pinch
ach line contains a letter o​

Answers

Answer:

First u need to soften pasta by boiling it .

Butter 1 tablespoon.

Then Fry wet pasta , And add veggies or spices

When it's about to prepare ,

Add Amul cheese ( if u want to make cheese pasta)

Add a pinch of salt ( if u want) not necessary.

Milk is not necessary though.

I hope this helps a little bit

Use the drop-down menus to complete the statements about the recall option in Outlook 2016.

Recalling a message stops its delivery before the recipient
it.

It only works about half the time, and it only works when recipients are in the same
.

Once it is recalled, the
will get a message informing them of the recalled message.

Be sure to check your message before you send it, and assume it will be read within 30
of sending the message.

Answers

Just put your username

Answer:

Recalling a message stops its delivery before the recipient  

opens it.

It only works about half the time, and it only works when recipients are in the same organization

.

Once it is recalled, the recipient will get a message informing them of the recalled message.

Be sure to check your message before you send it, and assume it will be read within 30 seconds of sending the message.

Explanation:

If we ignore the audio data in a video file, a video file is just a collection of many individual frames (i.e., images). What is the main reason that a video file can achieve a much higher compression ratio than a file that contains a single image file?

Answers

Answer:

It is compressing the video file to make it smaller, but doing so without actually losing any quality

Explanation:

The main reason for a video file that can achieve a much higher compression ratio than a file that contains a single image file is that it can reduce the size of the file without affecting its quality.

What is Video compression?

Video compression may be defined as a type of methodology that is significantly utilized in order to decline the size of a video file or alter the formatting of the video without compromising its quality.

The process of compression effectively permits you to reduce the number of storage resources that are needed to store videos and save costs. The importance of video compression includes smaller overall file sizes.

Therefore, the main reason for a video file that can achieve a much higher compression ratio than a file that contains a single image file is that it can reduce the size of the file without affecting its quality.

To learn more about Video compression, refer to the link:

https://brainly.com/question/28078112

#SPJ2

What is full form of (IP)​

Answers

answer:

internet protocol?

explanation:

the set of rules governing the format of data sent via the internet or local network

what is a cross-site scripting (XSS) attack?​

Answers

An XSS is a common type of online attack targeting web applications and websites, the attack manipulates the web application or website to give the user client-side scripts to install malware, obtain financial information or send the user to more malicious sites.

There are many types of XSS attacks including:

   Reflected XSS    Stored XSS    DOM-based XSS

Please use the tables in the flights database. Your deliverable should include a single SQL query that I can run against a "fresh copy" of the tables in the flights database.
1. Write a script to select all data from the planes table.
2. Update the planes table so that rows that have no year will be assigned the year 2013. (missing values will display as NULL).
3. Insert a new record to the planes table with the following values:
Tailnum: N15501
Year: 2013
type: Fixed wing single engine
Manufacturer: BOEING
Model: A222-101
Engines: 3
Seats: 100
Speed: NULL (notice this is not a text value but truly the absence of any value: "empty". As such, don't use single or double quotes around NULL when inserting this value).
Engine: Turbo-fan
4. Delete the newly inserted record on step 3.

Answers

Answer:

The scripts are:

1. SELECT * FROM planes

2. UPDATE planes SET YEAR = 2013 WHERE year IS NULL

3. INSERT INTO planes (Tailnum, Year, type, Manufacturer, Model, Engines, Seats) VALUES ('N15501',2013,'Fixed wing single engine', 'BOEING', 'A222-101',3,100,NULL)

4. DELETE FROM planes WHERE Tailnum = 'N15501'

Explanation:

1. SELECT * FROM planes

To select all from a table, use select * from [table-name]. In this case, the table name is planes

2. UPDATE [tex]planes\ SET[/tex] YEAR = 2013 WHERE year IS NULL

To do this, we use the update query which is as follows:

UPDATE [table-name] SET [column-name]= [value] WHERE [column] IS NULL

So: the above query will update all YEAR column whose value is NULL to 2014

3. INSERT INTO planes (Tailnum, Year, type, Manufacturer, Model, Engines, Seats) VALUES ('N15501',2013,'Fixed wing single engine', 'BOEING', 'A222-101',3,100,NULL)

To insert is very straight foward.

The syntax is:

INSERT INTO [table-name] (column names) VALUES (values)

4. DELETE FROM planes WHERE Tailnum = 'N15501'

To do this, we use the update query which is as follows:

DELETE FROM [table-name] WHERE [column] = [value]

So: The above query will delete the entry in (3) above

Other Questions
Explain how aerobic exercises directly impact your body; and your fitness levels. Helppppp Plzzz!!!!! 15+PTS and brainliest!!!!!!!!!What was the importance of the British East India Companys role in Great Britains growing empire? _____ is the name used to refer to the era of legalized segregation in the United States.African-American History: Select the correct answer from the choices provided.A. Affirmative actionB. AntebellumC. Jim CrowD. Reconstruction Use the Pythagorean Theorem to confirm the three sides of a right triangle. 3. a = 5, b = 12,c = 134. a = 4, b = 10,0 = 20 Find the value of x. How many gallons of pure water should be added to 10 gallons of a solution containing 15% juice so that the remaining solution contains 5% juice? Calculate the number of moles in 3.440 x 10^35 formula units of RbF. (Molar mass of RbF is 104.47g/mol). how do i find the volume in 3d shapes, please help i need to get better grades how far is 18 from -14 on a number line Where does the energy stored in fossil fuels come from? sedimentary rocks are mined and processed to make it stored solar energy in phytoplankton, zooplankton, and other organic material the stored energy in fossils petroleum and natural gas Who founded the USSR? Lenin Nicholas II Trotsky Stalin How did Islam affect northern and eastern Africa? Use at least two examples from your reading.whoever gets asnwer clearly and correct gets:thanks,rating 5.and brainliest. NEED IN ! MINETUTEWhich of the following BEST explains the significance of the Miranda v. Arizona trial of 1966?A.It proved that state court systems were inherently faulty.B.It resulted in the release of many convicted kidnappers.C.It ignited a battle between state supreme courts and federal supreme courts.D.It resulted in the creation of Miranda Rights, a statement that all police must read to suspects. 1. Rural African tribesmen that hunt wild game to provide food for the family and the tribe. This would be a component of what type of economy? Which of these is the quadratic parent function?f(x) = x2f(x) = |x|f(x) = xf(x) = 2x Seth invested a certain amount of money and got back an amount of $ 8400. Ifthe bank paid an interest of $ 700, find the amount Sam invested. * Alex was thinking of a number. Alex doubles it the adds 20 to get answer of 22.7. What was his original number. Is conflict bad True or false A comparison within a text can be used by the author to relate things that are Which is greater 45 RPM or 4.71 rad/s? Why?