Answer:
The following code are:
public void dissolve() {
setRed(getRed()+1);
setGreen(getGreen()+1);
setBlue(getBlue()+1);
alpha+=1;
}
Explanation:
Here, we define the void type function "dissolve()" inside it, we set three function i.e, "setRed()", "setGreen()", "setBlue()" and then we increment the variable "alpha" by 1.
Inside those three mutators method we set three accessor methods i.e, "getRed()", "getGreen()" , "getBlue()" and increment these accessor by 1.
The values will not be returned by the mutator functions, the accessor will be returned the values.
0.61 (rounded up)
Explanation:
You add both 700 and 450 which will give you 1150g
You then divide 1150 by 100 which gives you 11.5
Then divide 7 by 11.5 which will give you 0.61 as cost of every 100 grams
Answer:
#include<iostream>
using namespace std;
void main()
{
int townA_pop,townB_pop,count_years=1;
double rateA,rateB;
cout<<"please enter the population of town A"<<endl;
cin>>townA_pop;
cout<<"please enter the population of town B"<<endl;
cin>>townB_pop;
cout<<"please enter the grothw rate of town A"<<endl;
cin>>rateA;
cout<<"please enter the grothw rate of town B"<<endl;
cin>>rateB;
while(townA_pop < townB_pop)//IF town A pop is equal or greater than town B it will break
{
townA_pop = townA_pop +( townA_pop * (rateA /100) );
townB_pop = townB_pop +( townB_pop * (rateB /100) );
count_years++;
}
cout<<"after "<<count_years<<" of years the pop of town A will be graeter than or equal To the pop of town B"<<endl;
}
Explanation:
The type of file which can be PNG, Jpg, etc.
Answer:
Rainbow table attack
Explanation:
A rainbow table attack is a type of network attack or hacking where the hacker tries to utilize a rainbow hash table to crack the passwords in a database system. A rainbow table itself is a hash function used in cryptography for saving important data in a database. Especially passwords.
In this process, sensitive data are hashed two or multiple times with the same key or with different keys so as to avoid rainbow table attack. In a rainbow table attack, the hacker simply compares the hash of the original password against hashes stored in the rainbow table and when they find a match, they then identify the password used to create the hash.