The output is: 5, 7, 9, and 11 on separate lines.
The while loop just increments the value of c until c is greater than 10.
I hope this helps!
Multiple Choice
Which method adds an element at the beginning of a deque?
appendleft
O insertleft
O popleft
addleft
Answer: appendleft
Explanation: Edge 2021
The method that adds an element for the information at the beginning of a deque is append left. Thus option (A) is correct.
What is an information?An information refers to something that has the power to inform. At the most fundamental level information pertains to the interpretation of that which may be sensed.
The digital signals and other data use discrete signs or alogrithms to convey information, other phenomena and artifacts such as analog signals, poems, pictures, music or other sounds, and the electrical currents convey information in a more continuous form.
Information is not knowledge itself, but its interpretation is important. An Information can be in a raw form or in an structured form as data. The information available through a collection of data may be derived by analysis by expert analysts in their domain.
Learn more about information here:
brainly.com/question/27798920
#SPJ5
Which of the following is a factual statement about the term audience? Select all that apply.
Question 8 options:
Audience refers only to real readers or users.
Audience refers to both real and imagined readers or users.
Your message will only reach the audience it is intended to reach.
Being an effective communicator depends on how well you can tailor a message to an audience.
It is not necessary for an audience to be involved in usability testing of a product.
The correct statements are :
1. Audience refers to both real and imagined readers or users.
4. Being an effective communicator depends on how well you can tailor a message to an audience.
These two are factual about the term audience.
The first statement is not entirely true, as the term audience can refer not only to real readers or users but also to imagined or hypothetical readers or users that a writer or speaker is addressing in their communication.
The third statement is also not entirely true, as the intended audience may not always be the actual audience, and a message may reach unintended recipients or fail to reach the intended ones.
Being an effective communicator depends on how well you can tailor your message to your intended audience, taking into consideration their interests, values, needs, and level of knowledge.
Understanding your audience's characteristics and preferences can help you choose appropriate language, tone, style, and content to make your message more engaging, persuasive, and memorable.
It's important to note that the intended audience may not always be the actual audience, as a message may reach unintended recipients or fail to reach the intended ones due to various factors such as miscommunication, noise, or selective attention.
The right statements are:
1. Audience refers to both real and imagined readers or users.
4. Being an effective communicator depends on how well you can tailor a message to an audience.
For more questions on effective communication, visit:
https://brainly.com/question/26152499
#SPJ11
4) Create a text file (you can name it sales.txt) that contains in each line the daily sales of a company for a whole month. Then write a Java application that: asks the user for the name of the file, reads the total amount of sales, calculates the average daily sales and displays the total and average sales. (Note: Use an ArrayList to store the data).
Answer:
Here's an example Java application that reads daily sales data from a text file, calculates the total and average sales, and displays the results:
import java.util.ArrayList;
import java.util.Scanner;
import java.io.File;
import java.io.FileNotFoundException;
public class SalesDemo {
public static void main(String[] args) {
// Ask the user for the name of the file
Scanner input = new Scanner(System.in);
System.out.print("Enter the name of the sales file: ");
String fileName = input.nextLine();
// Read the daily sales data from the file
ArrayList<Double> salesData = new ArrayList<>();
try {
Scanner fileInput = new Scanner(new File(fileName));
while (fileInput.hasNextDouble()) {
double dailySales = fileInput.nextDouble();
salesData.add(dailySales);
}
fileInput.close();
} catch (FileNotFoundException e) {
System.out.println("Error: File not found!");
System.exit(1);
}
// Calculate the total and average sales
double totalSales = 0.0;
for (double dailySales : salesData) {
totalSales += dailySales;
}
double averageSales = totalSales / salesData.size();
// Display the results
System.out.printf("Total sales: $%.2f\n", totalSales);
System.out.printf("Average daily sales: $%.2f\n", averageSales);
}
}
Assuming that the sales data is stored in a text file named "sales.txt" in the format of one daily sale per line, you can run this program and input "sales.txt" as the file name when prompted. The program will then calculate the total and average sales and display the results.
I hope this helps!
Explanation:
the acronym PC stands of
Answer:
personal computer
Explanation:
It stands for personal computer
which function would ask excel to average the values contained in cells C5,C6,C7, and C8
Answer:
=AVERAGE(C5:C8)
Explanation:
The function calculates the average of the values in the cell range C5:C8 - C5, C6, C7, C8.
Please read this lab exercise thoroughly, before attempting to write the program.
Write a program that reads the pairs of group number and student count from the text file (user must enter name of file) and:
Displays the number of groups in the file (5 %)
Displays the number of even and odd student count (5%)
Displays the sum of the even student count and the sum of the odd student count as well as the sum of all the student count (5%)
Displays the group numbers of the largest student count and the smallest student count (5 %)
Computes the average of the largest and smallest student count (10 %)
Compute the sum of ALL the digits in the largest student count (i.e. 952 – Sum is 9+5+2 = 16) (15 %)
Assume the contents of the file are as follows but that the pairs of data can change later:
1 25
2 123
3 475
4 61
5 77
6 910
7 234
8 138
9 134
10 95
11 674
12 345
13 31
14 211
15 952
16 873
17 22
18 7
19 876
20 347
21 450
The following is a sample output: User input in red
What is name of the input file? integers.dat
The number of groups in the file is 21
There are 12 odd student count and 9 even student count
The sum of the odd student count is 2645
The sum of the even student count is 4390
The sum of all the student count is 7035
The group number of the largest student count is 15
The group number of the smallest student count is 18
The average of 952 and 7 is 479.5
The sum of all the digits in the largest student count is 16
NOTE:
Use two decimal point precision for the average
To check your code, adjust one of the student count in the file, recompile your code and run again (suggest changing the largest or smallest student count )
Even though there are 21 pairs of numbers in the file, the program should NOT presume there will always be 21 pairs of numbers. In other words, you should not solve this problem by declaring 21 pairs of values. If I choose to use another integers.dat file other than the one provided with the assignment, your program should still work correctly with that file as well. All you can assume is that a series of integers will be read in from the file. Therefore, you need to implement a solution that uses the repetition control structures (for, while, do…while) in the reading and processing of these values to produce your output.
Answer:
filename = input("Enter input file? ")
with open(filename, 'r') as data:
num_groups = []
num_counts = []
for line in data:
cols = line.split()
num_groups.append(int(cols[0]))
num_counts.append(int(cols[1]))
print("The number of num_groups in the file is "+str(len(num_groups)))
c_even = 0; c_odd = 0; s_odd = 0; s_even = 0
for i in num_counts:
if i%2 == 0:
c_even=c_even+1
s_even = s_even + i
else:
c_odd=c_odd+1
s_odd = s_odd + i
print("There are "+str(c_odd)+" odd student and "+str(c_even)+" even student")
print("The sum of odd student is "+str(s_odd))
print("The sum of even student is "+str(s_even))
print("The sum of all student is "+str(s_even+s_odd))
max_count = num_groups[num_counts.index(max(num_counts))]
print("The group number of the largest student is "+str(max_count))
min_count = num_groups[num_counts.index(min(num_counts))]
print("The group number of the smallest student is "+str(min_count))
print("The average of "+str(max(num_counts))+" and "+str(min(num_counts))+" is:",end=" ")
print("%.2f" % ((max(num_counts)+min(num_counts))*0.5))
bigkount = str(max(num_counts))
bigsum = 0
for i in range(len(bigkount)):
bigsum += int(bigkount[i])
print("The sum of all the digits in the largest student is: "+str(bigsum))
Explanation:
The program was written in Python.
Because of the length, I added an attachment where I used comments to explain the lines of the code
A question to determine your ability to use the reference materials effectively. Your boss has determined that you will be using the CIS-20 Security Controls. He has indicated that your organization must restrict access to client machine's use of wireless so that machines with a vital business purpose can only be allowed on approved wireless networks and not allowed on other wireless networks. His question is this: which Implementation Group does this security control apply toward
Answer:
The answer is "implement on group 2 and group 3".
Explanation:
In the given scenario, When technology workers are using in the project teams. People like to be stable, and we can't allow wireless network transmission to maintain their security and privacy. When we considering category 1 being the only ones who have links to a higher authority, that's why Group 2 and Group 3 were needing to be implemented.
You are working as a marketing analyst for an ice cream company, and you are presented with data from a survey on people's favorite ice cream flavors. In the survey, people were asked to select their favorite flavor from a list of 25 options, and over 800 people responded. Your manager has asked you to produce a quick chart to illustrate and compare the popularity of all the flavors.
which type of chart would be best suited to the task?
- Scatter plot
- Pie Chart
- Bar Chart
- Line chart
In this case, a bar chart would be the most suitable type of chart to illustrate and compare the popularity of all the ice cream flavors.
A bar chart is effective in displaying categorical data and comparing the values of different categories. Each flavor can be represented by a separate bar, and the height or length of the bar corresponds to the popularity or frequency of that particular flavor. This allows for easy visual comparison between the flavors and provides a clear indication of which flavors are more popular based on the relative heights of the bars.
Given that there are 25 different ice cream flavors, a bar chart would provide a clear and concise representation of the popularity of each flavor. The horizontal axis can be labeled with the flavor names, while the vertical axis represents the frequency or number of respondents who selected each flavor as their favorite. This visual representation allows for quick insights into the most popular flavors, any potential trends, and a clear understanding of the distribution of preferences among the survey participants.
On the other hand, a scatter plot would not be suitable for this scenario as it is typically used to show the relationship between two continuous variables. Pie charts are more appropriate for illustrating the composition of a whole, such as the distribution of flavors within a single respondent's choices. Line charts are better for displaying trends over time or continuous data.
Therefore, a bar chart would be the most effective and appropriate choice to illustrate and compare the popularity of all the ice cream flavors in the given survey.
for more questions on Bar Chart
https://brainly.com/question/30243333
#SPJ8
In a gig setting (ie low light), the ISO should be set......?
Advanced Sounds is engaging in a full upgrade of its Windows Server 2003 network to Windows Server 2008. The upgrade includes using Windows Server 2008 Active Directory. Advanced Sounds has pioneered many technological innovations and is very concerned about keeping its network and computer systems secure. Advanced Sounds Information Technology (IT) Department hires you to help them implement Windows Server 2008 Active Directory. Assume the following:
All email servers have been consolidated back in the New York City Complex.
Most all the other applications running on Windows Servers are distributed at all sixteen locations.
Each location at minimum has a file server, a print server and a local application server.
All locations have adequate Wide Area network connections with available capacity; 10 Mbps links
The New York location has enough network capacity to serve all 16 locations.
There are 500 people at the New Your City complex.
There are 200 people at the Quebec City location and 200 at the Montreal location.
There are 40-50 people at each outlet store.
Advanced Sounds IT Department has formed a small installation planning committee consisting of the IT server operations manager, two system programmers, the current Active Directory administrator, and you. After the first meeting they have asked you to prepare a small report to address the following questions:
A. What information is required as input to the initial installation involving Active Directory? a=
B. How many Active directory servers do you propose?
C. Where will the Active directory server(s) be located?
Answer:
cs
Explanation:
The function below takes a single argument: data_list, a list containing a mix of strings and numbers. The function tries to use the Filter pattern to filter the list in order to return a new list which contains only strings longer than five characters. The current implementation breaks when it encounters integers in the list. Fix it to return a properly filtered new list.student.py HNM 1 - Hef filter_only_certain_strings (data_list): new_list = [] for data in data_list: if type (data) == str and len(data) >= 5: new_list.append(data) return new_list Restore original file Save & Grade Save only
Answer:
Explanation:
The Python code that is provided in the question is correct just badly formatted. The snippet of code that states
return new_list
is badly indented and is being accidentally called inside the if statement. This is causing the function to end right after the first element on the list regardless of what type of data it is. In order for the code to work this line needs have the indentation removed so that it lines up with the for loop. like so... and you can see the correct output in the attached picture below.
def filter_only_certain_strings(data_list):
new_list = []
for data in data_list:
if type(data) == str and len(data) >= 5:
new_list.append(data)
return new_list
how to match this things
1.we will cross bridge when we get to it ------- proactive,not reactive
2.privacy not displayed after collection of data---privacy embeeded into deisgn
3.we will have preticked check box on share my personal data with 3rd party-----visiboty and transparency
4.in acall recording privacy ntoice not shown to participants who were not part of invite but joined----privay by default
A proactive organization anticipates and responds to possible obstacles and opportunities.
This requires a clear vision of where you want to go as well as a strategy. Proactive organizations are forward-thinking and always looking for new ways to innovate and improve.
Learn more about privacy at:
https://brainly.com/question/27034337
#SPJ1
What techniques overcome resistance and improve the credibility of a product? Check all that apply.
Including performance tests, polls, or awards
Listing names of satisfied users
Sending unwanted merchandise
Using a celebrity name without authorization
Answer: Including performance tests, polls, or awards.
Listing names of satisfied users
Explanation:
For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.
The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.
Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.
Solve recurrence relation x (n) = x(n/3) +1 for n >1,x(1) =1. (Solve for n = 3k)
To solve this recurrence relation, we can use the iterative method known as substitution method. First, we make a guess for the solution and then prove it by mathematical induction.
Let's guess that x(n) = log base 3 of n. We can verify this guess by induction:
Base Case: x(1) = log base 3 of 1 = 0 + 1 = 1. So, the guess holds for n = 1.
Induction Hypothesis: Assume that x(k) = log base 3 of k holds for all k < n.
Induction Step: We need to show that x(n) = log base 3 of n holds as well. We have:
x(n) = x(n/3) + 1
= log base 3 of (n/3) + 1 (by induction hypothesis)
= log base 3 of n - log base 3 of 3 + 1
= log base 3 of n
So, x(n) = log base 3 of n holds for all n that are powers of 3.
Therefore, the solution to the recurrence relation x(n) = x(n/3) + 1 for n > 1, x(1) = 1, is x(n) = log base 3 of n for n = 3^k.
Which button in the Sort & Filter gallery of the Data tab would alphabetize from A to Z quickly?
Answer:
the answer is B (AZ down arrow)
Explanation:
When you create a table using the Management Studio, the table is automatically stored in the default schema. If you want to transfer the table to a different schema, you can use the which statement?
a. COPY SCHEMA
b. ALTER SCHEMA
c. SET SCHEMA
d. CREATE SCHEMA
Answer:
b. ALTER SCHEMA
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
Database schema is the logical design of a database. In database management, the term "schema" is used to denote a representation of data while the term "instance" is used to denote an instance of time.
A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.
A Management Studio refers to a software application or program designed and developed by Microsoft Corporation.
When you create a table using the Management Studio, the table is automatically stored in the default schema. If you want to transfer the table to a different schema, you can use the ALTER SCHEMA statement.
Which kind of file would be hurt most by lossy compression algorithm
Answer:
Answer is a text document
Explanation:
"Text document" is the file that would be hurt most by the lossy compression algorithm.
Audio, as well as picture data (text document), are compressed with crushing defeat to start taking benefit of the unique vision as well as listening or auditory shortcomings.More such documents including software should have been stored without any information leakage as well as corruption.
Thus the above answer is appropriate.
Learn more about the text document here:
https://brainly.com/question/18806025
We are developing a simulator for print queues in a network, where multiple printers can receive requests from several sources. A printer is limited in the amount of data (measured in blocks) it can print in a given time period (call the time period a "step" in the simulation). The print() method is called once for each printer in each step of the simulation. If multiple requests are sent to a printer while it is in the process of printing a document, it must store those requests in a queue, and then process them in a first-in first-out order. A printer can start printing a document at the beginning of a time step.
Required:
Complete the simulation (Doc, Printer, and PrintQueueTester). You will need to complete the Printer and Doc classes (do not add any fields to the Doc class, and do not change the API), and use the PrintQueueTester class to test your solution.
Answer:
True
Explanation:
The IT infrastructure comprises of seven major categories or domains. They are user, workstation, LAN, LAN/WAN, remote access, system /application storage, and WAN.
The user domain is the various accounts in the networked office within a workstation and other workstations in the network. The user domain provides a platform or medium to interact with the other six domains, making it possible for forensic investigation to be carried out, retrieving logs for easy account management.
Why is it important to organize your thoughts before you communicate technical information?
A.
to avoid appearing prideful
B.
to avoid rambling
C.
to appear competitive
D.
to show off your programming skills
(QUICK!!!!!!!!!!!!!!!!!!!!!!!!!!)
Answer:
B
Explanation:
Unless this were to be a debate, I think B would make the most sense, and most professional.
Answer: B
Explanation: When you are talking about tech you should know what to say so you don't ramble on.
running away from home
Answer:
wait what?
Explanation:
Well heads up
Be careful theres guys and woman to take advange of you so stay careful
Human trafficking is such a horrible thing :C
What is the controller in this image know as? Choose one
Answer:
mode dial
Explanation:
You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!
Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.
Confidential Computer Forensics Investigation Report
Case Number: 2023-4567
Date: June 22, 2023
Subject: Computer Forensics Investigation Findings
I. Introduction:
The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.
II. Computer Information:
The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.
III. Access and Usage:
During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.
IV. Forensic Tools and Findings:
Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.
Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.
File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.
Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.
V. Conclusion:
Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.
The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.
Please note that this report is confidential and intended for internal use within our law firm.
Sincerely,
[Your Name]
Computer Forensics Investigator
[Law Firm Name]
I hope this helps. Cheers! ^^
Create a program that will compute the voltage drop across each resistor in a series circuit consisting of three resistors. The user is to input the value of each resistor and the applied circuit voltage. The mathematical relationships are 1. Rt- R1 R2 + R3 It Vs/Rt Where Rt -Total circuit resistance in ohms R1,R2,R3 Value of each resistor in ohms It - Total circuit current in amps Vs -Applied circuit voltage Vn- Voltage drop across an individual resistor n (n-1, 2 or 3) in volts Rn-R1,R2, or R3
Use the values of 5000 for R1, 3000 for R2,2000 for R3, and 12 for Vs. The output of the program should be an appropriate title which identifies the program and include your name. All values should be accompanied by appropriate messages identifying each. Submit a printout of your program and the printed output to your instructor
Answer:
The program in Python is as follows:
R1 = int(input("R1: "))
R2 = int(input("R2: "))
R3 = int(input("R3: "))
Rt = R1 + R2 + R3
Vs = int(input("Circuit Voltage: "))
It = Vs/Rt
V1= It * R1
V2= It * R2
V3= It * R3
print("The voltage drop across R1 is: ",V1)
print("The voltage drop across R2 is: ",V2)
print("The voltage drop across R3 is: ",V3)
Explanation:
The next three lines get the value of each resistor
R1 = int(input("R1: "))
R2 = int(input("R2: "))
R3 = int(input("R3: "))
This calculates the total resistance
Rt = R1 + R2 + R3
This prompts the user for Circuit voltage
Vs = int(input("Circuit Voltage: "))
This calculates the total circuit voltage
It = Vs/Rt
The next three line calculate the voltage drop for each resistor
V1= It * R1
V2= It * R2
V3= It * R3
The next three line print the voltage drop for each resistor
print("The voltage drop across R1 is: ",V1)
print("The voltage drop across R2 is: ",V2)
print("The voltage drop across R3 is: ",V3)
Mối quan hệ giữa đối tượng và lớp
1. Lớp có trước, đối tượng có sau, đối tượng là thành phần của lớp
2. Lớp là tập hợp các đối tượng có cùng kiểu dữ liệu nhưng khác nhau về các phương thức
3. Đối tượng là thể hiện của lớp, một lớp có nhiều đối tượng cùng thành phần cấu trúc
4. Đối tượng đại diện cho lớp, mỗi lớp chỉ có một đối tượng
Answer:
please write in english i cannot understand
Explanation:
What kind of operating system is Windows? I
Label Masterson, in cell e2, enter a formula using the hlookup function to determine a student’s potential base hourly rate. Use a structure reference to look up in the post-Secondary years column, retrieve the value in the 2nd row of the table in the range p13:u1, using an absolute reference.
HLOOKUP is an Excel function that performs a lookup and obtains information from a particular table row. It looks for a value in the table's first row and, if it matches the condition, returns another value in the same column from a subsequent row.
What is the value?Values are the benchmarks or ideals by which we judge the acts, traits, possessions, or circumstances of others. Values that are embraced by many include those of beauty, honesty, justice, peace, and charity.
Life values are the essential core beliefs that direct your actions and objectives as well as assist you in determining your level of overall success in life. For many people, values start early in life as their parents instill in them some of what they consider to be the most crucial principles.
Therefore, it matches the condition and returns another value in the same column from a subsequent row.
Learn more about value here:
https://brainly.com/question/10416781
#SPJ1
Write a C++ program that displays the total running time of a given algorithm based on
different situations such as processor speed, input size, processor load, and software
environment (DOS and Windows).
Answer: Your welcome!
Explanation:
#include <iostream>
#include <cmath>
using namespace std;
int main()
{
int processorSpeed; //in MHz
int inputSize; //in Kb
int processorLoad; //in %
int softwareEnvironment; //1: DOS, 2: Windows
int runningTime; //in ms
cout << "Enter processor speed (MHz): ";
cin >> processorSpeed;
cout << "Enter input size (Kb): ";
cin >> inputSize;
cout << "Enter processor load (%): ";
cin >> processorLoad;
cout << "Enter software environment (1-DOS, 2-Windows): ";
cin >> softwareEnvironment;
if(softwareEnvironment == 1)
{
//DOS running time calculation
runningTime = (inputSize / processorSpeed) + (processorLoad / 10);
}
else
{
//Windows running time calculation
runningTime = (inputSize / (processorSpeed/2)) + (processorLoad / 10);
}
cout << "Total running time: " << runningTime << "ms" << endl;
return 0;
}
9.4 code practice edhesive. PLEASE PLEASE PLEASE HELP
Answer:
a = [[34,38,50,44,39],
[42,36,40,43,44],
[24,31,46,40,45],
[43,47,35,31,26],
[37,28,20,36,50]]
for r in range(len(a)):
for c in range (len(a[r])):
if (a[r][c]% 3 != 0):
a[r][c]=0
for i in range(len(a)):
for j in range (len(a[i])):
print(a[i][j], end=" ")
print(" ")
Explanation:
We start off by declaring an array called "a". As introduced in the previous lessons, we use two for loops to fully go through all the rows and columns of the two-dimensional arrays. We then add in the line that checks if the remainder of any of these is not equal to zero, then print them as zero on the grid.
(I also got 100%)
mark as brainliest pls hehe
In this exercise we have to use the knowledge in computational language in python to describe a code that best suits, so we have:
The code can be found in the attached image.
What is the function range?The range() function returns a number series in the range sent as an argument. The returned series is an iterable range-type object and the contained elements will be generated on demand. It is common to use the range() function with the for loop structure. In this way we have that at each cycle the next element of the sequence will be used in such a way that it is possible to start from a point and go incrementing, decrementing x units.
To make it simpler we can write this code as:
a = [[34,38,50,44,39], [42,36,40,43,44], [24,31,46,40,45], [43,47,35,31,26],
[37,28,20,36,50]]
for r in range(len(a)):
for c in range (len(a[r])):
if (a[r][c]% 3 != 0):
a[r][c]=0
for i in range(len(a)):
for j in range (len(a[i])):
print(a[i][j], end=" ")
print(" ")
See more about python at brainly.com/question/19705654
you are conducting a forensic investigation. the attack has been stopped. which of the following actions should you perform first? answer turn off the system. document what is on the screen. remove the hard drive. stop all running processes.
Document what is on the screen
After a threat has been nullified, computer systems might undergo a forensic examination to gather information and determine the attack's methodology. A trade-off occurs while trying to preserve evidence while performing a forensic investigation. Any attempt to gather evidence could end up destroying the very information needed to pinpoint an assault or attacker. Documenting what is on the screen is the option that is least intrusive and least likely to obliterate important evidence. Running processes may be stopped, broken down, or stopped, which could wipe any data necessary for tracking the intrusion.
To know more about forensic investigation : https://brainly.com/question/12640045?referrer=searchResults
#SPJ4
Cleo is working in Excel and encounters a word that she would like Excel to ignore permanently for all workbooks. Which of the following options should she select?
Ignore Once
Ignore All
Add to Dictionary
AutoCorrect
ANSWER IS C Add to Dictionary
Answer:
ignore all
Explanation:
The answer is ignore all not add to dictionary
Answer:
C
Explanation:
its C dont listen to anyone else i got you