Answer:
The brain and computer both memorize important information. A computer is technological and a human brain is not.
Explanation:
hope this helps :)
Both use electrical signals to transmit messages. In contrast to computers, which use electricity to transmit information, the brain uses chemicals to do it.
What ways is the human brain like a computer?They both have memory, both use electrical signals, both can retrieve and transmit data, both have partitions, and both connect data to arrive at logical and practical conclusions.
In essence, the computational theory of mind asserts that your brain functions similarly to a computer.
In other words, it processes algorithms to produce an output in the form of a mental state or an action after receiving information from the outside environment.
The cables of a computer allow electrical signals to move even more quickly than they do while moving via the nervous system. They both transfer data.
Therefore, The brain and computer both memorize important information. A computer is technological, and a human brain is not.
Learn more about human brain here:
https://brainly.com/question/7019189
#SPJ2
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
Write a palindrome tester in Java. a palindrome is any word, phrase, or sentence that reads the same forward and backward.
The following are some well-known palindromes.
Kayak
Desserts I stressed
Able was I ere I saw Elba
Create an advanced version of the PalindromeTester Program so that spaces, numbers, and
punctuations are not considered when determining whether a string is a palindrome. The only characters considered are roman letters, and case is ignored. Therefore, the PalindromeTester program will also, recognize the following palindromes:
A man, a plan, a canal, Panama
Madam, I'm Adam
Desserts, I stressed
Able was I, ere I saw Elba
Never odd(5,7) or even(4,6)
The Palindrome Tester will continue to run until the user enters a blank line. It will then print out how many palindromes were found. The following are sample interactions that occur when running the program .
Using knowledge in computational language in JAVA it is possible to write a code that create an advanced version of the PalindromeTester Program so that spaces, numbers, and punctuations are not considered when determining whether a string is a palindrome.
Writting the code:import java.util.Scanner;
public class PalindromeTester {
public static void main(String args[]){
System.out.println("Enter lines to check if the line is Palindrome or not.");
System.out.println("Enter blank line to stop.");
String inputLine = null;
Scanner sc = new Scanner(System.in);
int totalPalindromes = 0;
PalindromeTester pt = new PalindromeTester();
do{
inputLine = sc.nextLine();//read next line
if(inputLine!=null){
inputLine = inputLine.trim();
if(inputLine.isEmpty()){
break;//break out of loop if empty
}
if(pt.isPalindromeAdvanced(inputLine)){
totalPalindromes++; //increase count if palindrome
}
}
}while(true);
sc.close();//close scanner
System.out.println("Total number of palindromes: "+totalPalindromes);
}
/**
ivate boolean isPalindromeAdvanced(String str){
String inputStr = str.toLowerCase();
String strWithLetters = "";
for(char ch: inputStr.toCharArray()){
if(Character.isLetter(ch)){
strWithLetters +=ch;
}
}
boolean isPalindrome = isPalindrome(strWithLetters);
return isPalindrome;
}
/**
private boolean isPalindrome(String str){
boolean isCharMatched = true;
int strSize = str.length();
for(int i = 0; i < strSize; i++){
int indexFromFront = i;
int indexFromBack =(strSize-1) - i;
if(indexFromFront >= indexFromBack){
break;
}
if(str.charAt(indexFromFront) != str.charAt(indexFromBack)){
isCharMatched = false;
break;
}
}
if(isCharMatched)
return true;
return false;
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
Use the following cell phone airport data speeds (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.6 0.7 0.7 0.7 0.8 0.8
Answer:
\(P_{10} =0.1\)
Explanation:
Given
\(0.1, 0.1, 0.3, 0.3, 0.3, 0.4, 0.4, 0.4, 0.6, 0.7, 0.7, 0.7, 0.8, 0.8\)
Required
Determine \(P_{10}\)
\(P_{10}\) implies 10th percentile and this is calculated as thus
\(P_{10} = \frac{10(n+1)}{100}\)
Where n is the number of data; n = 14
\(P_{10} = \frac{10(n+1)}{100}\)
Substitute 14 for n
\(P_{10} = \frac{10(14+1)}{100}\)
\(P_{10} = \frac{10(15)}{100}\)
Open the bracket
\(P_{10} = \frac{10 * 15}{100}\)
\(P_{10} = \frac{150}{100}\)
\(P_{10} = 1.5th\ item\)
This means that the 1.5th item is \(P_{10}\)
And this falls between the 1st and 2nd item and is calculated as thus;
\(P_{10} = 1.5th\ item\)
Express 1.5 as 1 + 0.5
\(P_{10} = (1 +0.5)\ th\ item\)
\(P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item\)
From the given data; \(1st\ item = 0.1\) and \(2nd\ item = 0.1\)
\(P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item\) becomes
\(P_{10} =0.1 +0.5(0.1 - 0.1)\)
\(P_{10} =0.1 +0.5(0)\)
\(P_{10} =0.1 +0\)
\(P_{10} =0.1\)
A feature added for encrypting the drive on which the Windows OS resides and other drives beyond the system drive
Answer:
good really really good great nice
Lesson 3 - Calling All Operators
Exit
37 of 42
Test
Reset
order
75
do
create variable amount ToCoupon
75 +
order
print
"To receive a coupon, you will need to spend $ >
amount ToCoupon
print
Code
Check the customer's order amount. If it is less than $75, determine how much more
needs to be spent to reach $75 and give the customer that information.
< PREV
Answer:
.m
Explanation:
positive and negative of adblock plus
Answer:
Pros and cons of ad blockers
Remove distracting ads, making pages easier to read.
Make web pages load faster.
Keep advertisers from tracking you across websites.
Reduce bandwidth (especially important with mobile devices)
Reduce battery usage (again, important for mobile devices)
p
Word can only print documents on one size of paper.
True or false
Answer:
False
Explanation:
You can always go in the document settings to change the layout and make the paper wider (landscape).
Layout > Orientation
Choose portrait or landscape
How is a sound file downloaded from the internet different to a sound file on a cd
An audio file format is a file format for storing digital audio data on a computer system. The bit layout of the audio data (excluding metadata) is called the audio coding format and can be uncompressed, or compressed to reduce the file size, often using lossy compression. The data can be a raw bitstream in an audio coding format, but it is usually embedded in a container format or an audio data format with a defined storage layer.
The audio file format is a type of file used to store digital audio on devices like smartphones and PCs. Bit layout refers to the way that audio data is encoded in a file as bits. These bit layouts can be compressed using lossless or lossy encoding, or they can be left uncompressed.
What sound file downloaded from the internet?On a computer system, digital audio data is stored in an audio file format. The audio coding format, which refers to the bit structure of the audio data (excluding metadata), can be uncompressed or compressed to shrink the file size, frequently utilizing lossy compression.
Therefore, The data can be an audio coding format's raw bitstream, but it is typically embedded in a container format or an audio data format with a specified storage layer.
Learn more about internet here:
https://brainly.com/question/13308791
#SPJ2
Which action can users perform on all webmail sites and email programs?
A. Download images from the internet.
B. Store and organize contacts.
C. Find anyone's email address online.
D. Display web pages within an email.
Answer: B. Store and organize contacts
Explanation:
I did the quiz myself and it was correct, hope this helps you all. :)
Example of mediated communication and social media
Answer: mediated communication: instant messages
social media: social platforms
Explanation:
A disk drive has 2000 cylinders, numbered 0 to 1999. The drive is currently servicing a request at cylinder 783, with the previous request at cylinder 707. The queue of pending requests, in FIFO order, is 75, 678, 1623, 247, 248, 1529, 182. What distance, in tracks, must the disk read-write arm move in order to service the requests for each of the following disk scheduling algorithms?
a) FCFS
b) SSTF
c) SCAN
d) LOOK
e) C-SCAN
f) C-LOOK
Answer:
Suppose that a disk drive has 5000 cylinders, numbered 0 to 4999. The drive is currently serving a request at cylinder 143, and the previous request was at cylinder 125. The queue of pending requests, in FIFO order, is
Explanation:
Challenge activity 1.3.6:output basics.for activities with output like below,your output's whitespace(newlines or spaces) must match exactly.see this note.write code that outputs the following.end with a newline.This weekend will be nice.
In python:
print("This weekend will be nice.")
I hope this helps!
Use Mathematica
Given the two vectors u = <6, -2, 1> and v = <1, 8, -4> a) Find u * v, and find u*v
b) Find angle between vectors u and v.
c) Graph both u and v on the same system.
d) Now, graph vectors u, v and on the same set of axes and give u * v a different color than vectors u and v.
e) Rotate graph from part d and show two different views of the cross product.
f) Find the normal vector to vector u.
a) To find the dot product of the vectors u and v, we can use the Dot function in Mathematica. The dot product is calculated as follows:
u.v = Dot[u, v]
b) To find the angle between vectors u and v, we can use the ArcCos function in Mathematica. The angle is calculated as follows:
angle = ArcCos[(u.v)/(Norm[u]*Norm[v])]
c) We can graph both vectors u and v on the same system using the ListVectorPlot3D function in Mathematica. This will display the vectors in a 3D coordinate system.
ListVectorPlot3D[{u, v}]
d) To graph vectors u, v, and u * v on the same set of axes with different colors, we can use the Graphics3D function in Mathematica. We can assign a different color to u * v using the Directive function.
Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],
Directive[Red], Arrow[{{0, 0, 0}, u*v}]}]
e) To rotate the graph from part d and show two different views of the cross product, we can use the ViewPoint option in the Graphics3D function. By specifying different viewpoints, we can obtain different perspectives of the graph.
Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],
Directive[Red], Arrow[{{0, 0, 0}, u*v}]},
ViewPoint -> {1, -1, 1}]
Graphics3D[{Arrow[{{0, 0, 0}, u}], Arrow[{{0, 0, 0}, v}],
Directive[Red], Arrow[{{0, 0, 0}, u*v}]},
ViewPoint -> {1, 1, 1}]
f) To find the normal vector to vector u, we can use the Cross function in Mathematica. The normal vector is calculated as follows:
normal = Cross[u]
The function Cross[u] computes the cross product of u with the standard basis vectors. The resulting vector represents the direction perpendicular to the plane spanned by u.
For more such answers on dot product
https://brainly.com/question/30404163
#SPJ8
What is a benefit of applying Artificial Intelligence (Al) to Accenture's work?
O It will replace many of the current jobs held by Accenture employees.
O It will allow Accenture people to perform critical job functions more efficiently and effectively.
O It will redirect Accenture people's work toward administrative and data collection tasks.
O It will reduce the amount of time Accenture people interact with clients.
O I don't know this yet.
Submit answer
Answer:
The benefit of applying Artificial Intelligence (AI) to Accenture's work is that it will allow Accenture people to perform critical job functions more efficiently and effectively.
AI can help automate repetitive and time-consuming tasks, freeing up Accenture employees to focus on more complex and strategic work that requires human expertise and judgment. AI can also help Accenture employees make better decisions by providing insights and recommendations based on vast amounts of data.
Overall, the application of AI to Accenture's work can lead to increased productivity, improved quality of work, and better outcomes for clients, while also providing opportunities for Accenture employees to develop new skills and take on more challenging roles
what is fruit nursery?
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
➨ Fruit NurseryA Place where young plants and trees are grown for sale or for planting elsewhere is known as nursery. From this definition you can generate the definition of fruit nursery as well!
So, fruit nursery is a place where the local wild fruit seed is sown to grow seedlings. Apart from fruit nursery there are various kind of nursery
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
In North America, power cords must use a plug compatible with which of the following standards?
Answer:
NEMA 5-15
Explanation:
I hope this helps
Anna is promoted as database administrator for A company. To speed up process, she is granted all rights to the payroll and account tables, salary column in employee table. She can also grant same rights to others. Please complete the following two tasks (8 points):
a) grant the specified rights to Anna
b) Removing all rights from Anna after she leaves
The order "GRANT" is utilized to concede the consents to a client. A user's permissions can be revoked using the "REVOKE" command.
To grant permissions, use the syntax GRANT privileges_names ON object TO user.
The name of the table for which privileges are granted is "object."
The user to whom we grant privileges is referred to as the "user."
The various privileges that are available are listed under "privileges_names."
So the following two commands are used to grant the privileges for john on "payroll" and "account" to tables.
1) GRANT ALL, GRANT ON payroll TOAnna;
2) GRANT ALL, GRANT ON account TOAnna;
GRANT is included along with ALL because, ALL doesn't give the GRANT permission , we should include it separately.
Similarly,
The syntax for revoking the privileges is,
REVOKE privileges ON object FROM user;
So the following two commands are used to revoke the privileges afterAnna has left.
1) REVOKE ALL, GRANT ON payroll TOAnna;
2) REVOKE ALL, GRANT ON account TOAnna;
To know more about Database Administrator visit
brainly.com/question/9979302
#SPJ4
Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks.
Which of the following options should Merlyn choose?
SaaS
She doesn't want to deal with setting up the back-end configuration, including Windows Server 2019, IIS, and Web app frameworks. Should Merlyn select it, SaaS is a possibility.
Microsoft has been creating the Windows Server operating system (OS) for servers since July 27, 1993 (formerly known as Windows NT Server). Windows NT 3.1 Advanced Server was the first operating system made available for this platform. The name of the product was changed to Windows Server with the release of Windows Server 2003.
Since the release of Windows NT 3.1 Advanced Server edition, Microsoft has been creating operating systems for server computers. Active Directory, DNS Server, DHCP Server, and Group Policy were initially introduced with Windows 2000 Server edition.
Windows Server is typically supported by Microsoft for ten years, including five years of mainstream support and an extra five years of extended support. These updates also provide a full desktop experience.
Learn more about Windows Server here:
https://brainly.com/question/14631359
#SPJ4
which is true about artificial intelligence? a) can think b) act as body c) act as brain d) can learn.
Answer:
c). act as brain.
Explanation:
brain thinks and learns, so it covers a and d
\(.\)
chunk of data and its metadata, used to route and reassemble information on the internet.
A packet is a chunk of data and its metadata, used to route and reassemble information on the internet.
It is also a fundamental unit of data that is transmitted over a network.
Each packet contains two types of data:
The payload, which is the actual data being transmitted (e.g. a message, a file, etc.).The header, which contains metadata about the packet such as the source and destination IP addresses, the protocol being used, and error-checking information.Packets are used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) to transfer data over the internet. The Internet Protocol (IP) is used to route packets between networks, and the packets are reassembled into the original data stream at the destination.
Packets are also used by other protocols such as the Internet Control Message Protocol (ICMP) and the Internet Group Management Protocol (IGMP). ICMP is used to send error messages and operational information about network conditions, while IGMP is used to manage multicast group membership.
In conclusion, packets are the fundamental unit of data used to transmit information over the internet, they contain the data and the information to route and reassemble it at the destination.
To learn more about packets, use the link:
brainly.com/question/13901314
#SPJ4
During the projects for this course, you have demonstrated to the Tetra Shillings accounting firm how to use Microsoft Intune to deploy and manage Windows 10 devices. Like most other organizations Tetra Shillings is forced to make remote working accommodations for employees working remotely due to the COVID 19 pandemic. This has forced the company to adopt a bring your own device policy (BYOD) that allows employees to use their own personal phones and devices to access privileged company information and applications. The CIO is now concerned about the security risks that this policy may pose to the company.
The CIO of Tetra Shillings has provided the following information about the current BYOD environment:
Devices include phones, laptops, tablets, and PCs.
Operating systems: iOS, Windows, Android
Based what you have learned about Microsoft Intune discuss how you would use Intune to manage and secure these devices. Your answer should include the following items:
Device enrollment options
Compliance Policy
Endpoint Security
Application Management
I would utilise Intune to enrol devices, enforce compliance regulations, secure endpoints, and manage applications to manage and secure BYOD.
Which version of Windows 10 is more user-friendly and intended primarily for users at home and in small offices?The foundation package created for the average user who primarily uses Windows at home is called Windows 10 Home. It is the standard edition of the operating system. This edition includes all the essential tools geared towards the general consumer market, including Cortana, Outlook, OneNote, and Microsoft Edge.
Is there employee monitoring in Microsoft Teams?Microsoft Teams helps firms keep track of their employees. You can keep tabs on nearly anything your staff members do with Teams, including text conversations, recorded calls, zoom meetings, and other capabilities.
To know more about BYOD visit:
https://brainly.com/question/20343970
#SPJ1
Name three current problems in your life that might be solved through a heuristic approach. Explain why each of these problems is heuristic in nature.
Heuristics are mental shortcuts for solving problems in a quick way that delivers a result that is sufficient enough to be useful given time constraints.Heuristic methods can help ease the cognitive load by making it easy to process decisions. These include various basic methods that aren't rooted in any theory per se but rather rely on past experiences and common sense.
Three current problems that can be solved through Heuristic Approach:
1. Challenging and routine work
2. When a student decide what subject she will study at university, her intuition will likely be drawn toward the path that she envisions most satisfying, practical and interesting.
3. Trial and error, which can be used in everything from matching nuts and bolts
The three heuristics Mentioned are: availability, representativeness, and anchoring and adjustment.
To know more about Heuristic from the given link
https://brainly.com/question/24053333
#SPJ1
What is the difference between laser jet printer and inkjet printer? 60 - 100 words
Answer:
A laser jet printer uses toner, while an inkjet printer sprays ink dots onto a page. Laser jet printers generally work faster than inkjet printers. Although inkjet printers are cheaper than laser jet printers, they are usually more expensive to maintain in the long run as ink cartridges have to be replaced more often. Thus, laser jet printers are cheaper to maintain. Laser jet printers are great for mass printing as they are faster and, as mentioned earlier, cheaper to replenish. Whereas inkjet printers are better for printing high quality images.
Start with the following Python code. alphabet = "abcdefghijklmnopqrstuvwxyz" test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"] test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"] # From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press. def histogram(s): d = dict() for c in s: if c not in d: d[c] = 1 else: d[c] += 1 return d Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source. Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False. Implement has_duplicates by creating a histogram using the histogram function above. Do not use any of the implementations of has_duplicates that are given in your textbook. Instead, your implementation should use the counts in the histogram to decide if there are any duplicates. Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups. Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string. The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet. It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter. The function missing_letters should combine the list of missing letters into a string and return that string. Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters. For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz If the string has all the letters in alphabet, the output should say it uses all the letters. For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters Print a line like one of the above for each of the strings in test_miss. Submit your Python program. It should include the following. The provided code for alphabet, test_dups, test_miss, and histogram. Your implementation of the has_duplicates function. A loop that outputs duplicate information for each string in test_dups. Your implementation of the missing_letters function. A loop that outputs missing letters for each string in test_miss. Also submit the output from running your program. Your submission will be assessed using the following Aspects. Does the program include a function called has_duplicates that takes a string parameter and returns a boolean? Does the has_duplicates function call the histogram function? Does the program include a loop over the strings in test_dups that calls has_duplicate on each string? Does the program correctly identify whether each string in test_dups has duplicates? Does the program include a function called missing_letters that takes a string parameter and returns a string parameter? Does the missing_letters function call the histogram function? Does the missing_letters function use the alphabet global variable directly? Does the program include a loop over the strings in test_miss that calls missing_letters on each string? Does the program correctly identify the missing letters for each string in test_miss, including each string that "uses all the letters"?
Answer:
alphabet = "abcdefghijklmnopqrstuvwxyz"
test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"]
test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"]
# From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press.
def histogram(s):
d = dict()
for c in s:
if c not in d:
d[c] = 1
else:
d[c] += 1
return d
#Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.
def has_duplicates(stringP):
dic = histogram(stringP)
for key,value in dic.items():
if value>1:
return True
return False
# Implement has_duplicates by creating a histogram using the histogram function above. Write a loop over the strings in the provided test_dups list.
# Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string.
# For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups.
print("***Implementation of has_duplicates fuction***")
for sTr in test_dups:
if has_duplicates(sTr):
print(sTr+": has duplicates")
else:
print(sTr+": has no duplicates")
#Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string.
#The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet.
#It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter.
#The function missing_letters should combine the list of missing letters into a string and return that string.
def missing_letters(sTr):
missingLettersList = []
dic = histogram(sTr)
for l in alphabet:
if l not in dic:
missingLettersList.append(l)
missingLettersList.sort()
return "".join(missingLettersList)
#Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters.
#For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz
#If the string has all the letters in alphabet, the output should say it uses all the letters.
#For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters
#Print a line like one of the above for each of the strings in test_miss.
print("\n***Implementation of missing_letters fuction***")
for lTm in test_miss:
sTr = missing_letters(lTm.replace(" ",""))
if sTr!="":
print(lTm+" is missing letters "+sTr)
else:
print(lTm +" uses all the letters")
What is the value of grade after this program is executed? Assume the score is 71. if score >= 90: grade = "A" elif score >= 80: grade = "B" elif score >= 70: grade = "C" elif score >= 60: grade = "D" else: grade = "F" grade =
Answer:
C
Explanation:
if the score is 71 it would fall into 70 because it is not greater than 80 and not less than 70
Answer:
F= 50%
Fail is 50% grades.
Select the correct navigational path to set the name for a cell range.
Click the
tab on the ribbon and look in the
gallery.
Select the range of cells.
Select
.
Add the name and click OK.
Answer:
formula tab, defined names, name manager
Explanation:
Just did the assignment on Edge 2021
Plz click the Thanks button :)
<Jayla>
Click the Formula tab on the ribbon and look in the Defined Names gallery. Select the range of cells. Select name manager.
What is a navigational path?The events that would let users move between, inside, and outside of the various content elements in your app are referred to as navigation. The message comprises information that receivers can utilize to determine the observatories' positions and make other necessary changes for precise positioning.
The receiver determines the distance, or reach, from the sensor to the constellation using the lag time between the hour of signal receipt and the means higher.
To set a cell range the individual must click on the formula tab. This will make sure that a ribbon will appear. Then the user will name go to the defined names part in a gallery. From that he or she needs to select the cell range which they need to process. And in the end, select the name manager to complete the action.
Learn more about the navigational path, here:
https://brainly.com/question/30666231
#SPJ6
The question is incomplete, the complete question is:
Select the correct navigational path to set the name for a cell range.
Click the _____ tab on the ribbon and look in the _______ gallery.
Select the range of cells.
Select __________.
6. This interface uses only commands that you type:
Is it possible to beat the final level of Halo Reach?
An example of a function is ___________.
Python
In Python, an example of a function is the Built-in function.
What is the function in Python?In Python, the function may be characterized as a cluster of related statements that operates a specific task within the programming. They help in breaking your program into smaller and modular fragments which we called as chunks.
According to the context of this question, the examples of other functions in Python may include the Python Recursion function, Lambda function, and User-defined function (UDF). Each of the function plays a specific role and make programming user efficient.
Therefore, an example of a function is the Built-in function.
To learn more about the Functions of Python, refer to the link:
https://brainly.com/question/25755578
#SPJ1
To achieve asymmetrical balance, what might an artist do?
A.
Use a reflection so that the top and bottom half of the image are mirrored.
B.
Use objects that have a different visual weight.
C.
Use objects that have the same visual weight.
D.
Use objects that are repeated across the image.
Answer:
Answer: B. Use objects that have a different visual weight.