ashley has a lot of interests
Which phrase best describes a data scientist?
A. A person who develops advanced computing languages
B. A person who designs and develops hardware for computers
C. A person who builds and installs the memory chips for household
appliances
OD. A person who uses scientific and statistical methods to analyze
and interpret large, complex digital data sets
W
SUBMIT
Answer:
D. A person who uses scientific and statistical methods to analyze and interpret large, complex digital data sets.
Explanation:
Lab Goal : This lab was designed to demonstrate the similarities and differences in a for loop and a while loop.Lab Description : Write a for loop that accomplishes the same goal as a while loop and write a while loop that accomplishes the same goal as a for loop. Finally, write a loop your way: write either a for loop or a while loop that produces the appropriate output.Sample Output :***** While Loop String Cleaner ****I am Sam I am with the letter a removed by a while loop is I m Sm I m***** For Loop String Cleaner ****I am Sam I am with the letter a removed by a for loop is I m Sm I m***** For Loop Common Divisor ****The for loop determined the common divisors of 528 and 60 are12 6 4 3 2***** While Loop Common Divisor ****The while loop determined the common divisors of 528 and 60 are12 6 4 3 2***** My Total Loop My Way ****The total of even numbers from 1 to 1000 using a for loop is 250500The total of even numbers from 1 to 1000 using a while loop is 250500*Only one of the two output statements are required. For extra credit, do both
Answer:
See Explanation
Explanation:
Required:
Use for and while loop for the same program
(1) String Cleaner
#For Loop
name = "I am Sam"
result = ""
for i in range(0, len(name)):
if name[i]!= 'a':
result = result + name[i]
print(result)
#While Loop
name = "I am Sam"
result = ""
i = 0
while i < len(name):
if name[i]!= 'a':
result = result + name[i]
i+=1
print(result)
(2): Common Divisor
#For Loop
num1 = 528
num2 = 60
div = num2
if num1 > num2:
div = num1
for i in range(2,div):
if num1%i == 0 and num2%i==0:
print(i,end = " ")
print()
#While Loop
num1 = 528
num2 = 60
div = num2
if num1 > num2:
div = num1
i = 2
while i <div:
if num1%i == 0 and num2%i==0:
print(i,end = " ")
i+=1
The iterates statements show the difference in the usage of both loops.
For the for loop, the syntax is:
for [iterating-variable] in range(begin,end-1)
-------
---
--
For the while loop, the syntax is:
while(condition)
-------
---
--
a technician is replacing a cable modem. the cable from the cable company has an inner solid wire conductor and an outer mesh conductor separated by pvc plastic insulation. which of the following network cable types is being used?
The network cable type that is being used by the technician is a coaxial cable. Coaxial cables are typically used in cable television systems, office buildings, and other work-sites for local area networks.
These cables are designed with an inner solid wire conductor and an outer mesh conductor, which are separated by PVC plastic insulation.
The inner conductor is responsible for carrying the signal, while the outer conductor serves as a shield to protect the signal from interference. The PVC plastic insulation helps to further protect the cable and prevent any signal loss. Therefore, the technician is replacing a coaxial cable in this scenario.
Learn more about plastic insulation: https://brainly.com/question/28443351
#SPJ11
4.24 LAB: Exact change
Write a program with total change amount as an integer input, and output the change using the fewest coins, one coin type per line. The coin types are Dollars, Quarters, Dimes, Nickels, and Pennies. Use singular and plural coin names as appropriate, like 1 Penny vs. 2 Pennies.
Ex: If the input is:
0
or less than 0, the output is:
No change
Ex: If the input is:
45
the output is:
1 Quarter
2 Dimes
The Exact change program is an illustration of conditional statements;
Conditional statements are used to make decisions
The Exact change programThe Exact change program written in java programming language, where comments explain each action purposes
import java.util.*;
public class Money{
public static void main(String [] args){
Scanner input = new Scanner(System.in);
// Declare Variables
int amount, dollar, quarter, dime, nickel, penny;
// Prompt user for input
System.out.print("Amount: ");
amount = input.nextInt();
// Check if input is less than 1
if(amount<=0) {
System.out.print("No Change"); }
else {
// Convert amount to various coins
dollar = amount/100; amount = amount%100;
quarter = amount/25; amount = amount%25;
dime = amount/10; amount = amount%10;
nickel = amount/5; penny = amount%5;
// Print results
if(dollar>=1) {
if(dollar == 1) { System.out.print(dollar+" dollar\n");}
else { System.out.print(dollar+" dollars\n"); }
}
if(quarter>=1){
if(quarter== 1){System.out.print(quarter+" quarter\n");}
else{System.out.print(quarter+" quarters\n");}
}
if(dime>=1){
if(dime == 1){System.out.print(dime+" dime\n");}
else{System.out.print(dime+" dimes\n");} }
if(nickel>=1){
if(nickel == 1){System.out.print(nickel+" nickel\n");}
else{System.out.print(nickel+" nickels\n");}}
if(penny>=1){
if(penny == 1) {System.out.print(penny+" penny\n");}
else { System.out.print(penny+" pennies\n"); }}}}}
Read more about conditional statements at:
https://brainly.com/question/11073037
#SPJ1
Al is a subfield of
Answer:
G.o.o.gle says this
Explanation:
#1) Machine Learning. Machine learning is a feature of artificial intelligence that provides the computer with the capability to automatically gather ... #2) Deep learning. #3) Neural Networks. #4) Cognitive Computing. #5) Natural Language Processing.
How can styles be used in Word? Check all that apply. w to standardize the font size of a title in a Word document to standardize the top and bottom margin of a Word document to standardize the way a paragraph looks on a Word document to standardize the quality of images included in a Word document to standardize the color of the main headings of a Word document
Answer:
its a,c,e
Explanation:
How can styles be used in Word? Check all that apply.
a to standardize the font size of a title in a Word document
b to standardize the top and bottom margin of a Word document
c to standardize the way a paragraph looks on a Word document
d to standardize the quality of images included in a Word document
e to standardize the color of the main headings of a Word document
Answer:
1,3,5 is the answer will give brainless
Explanation:
Examine about the Internal & External Fragmentation methods give an example for each. essay
Internal Fragmentation occurs when a process needs more space than the size of allotted memory block or use less space. External Fragmentation occurs when a process is removed from the main memory. Internal Fragmentation occurs when Paging is employed. External Fragmentation occurs when Segmentation is employed.
A bigger chunk of RAM is set aside for the process. Some memory is left unused because it cannot be utilised by another function. By properly allocating the smallest division that is yet large enough for the process, internal fragmentation can be reduced.
When there is a mismatch between the quantity of memory needed and the amount of memory that is actually available, internal fragmentation becomes a problem.
When paging is used, internal fragmentation occurs.
When memory allocations are made but chunk sizes are fixed, internal fragmentation follows.
Internal process fragmentation occurs when a process consumes less memory or uses more than the allocated memory block can hold.
External FragmentationAlthough the total RAM is large enough to accommodate a process or handle a request, we are unable to use it since it is not contiguous. To lessen external fragmentation, we can condense or shuffle memory to free up a substantial amount of space. For compaction to be useful, relocation must be dynamic.
Internal fragmentation is largely controlled via Best Fit Block Search.
External fragmentation is fixed through compaction.
When the size of the allotted memory blocks fluctuates, external fragmentation occurs.
When segmentation is used, external fragmentation happens.
When small, non-contiguous memory blocks cannot be assigned to any process, external fragmentation results.
An affected process is deleted from the main memory as a result of external fragmentation.
Your online consumer identity is created by:
O A. the stores you visit when you go shopping at the local mall.
B. how you express yourself when you buy products online.
C. how you present yourself with the information you post.
D. the things you enter into your online search browser.
Answer: b
Explanation:
HI can someone help me write a code.
Products.csv contains the below data.
product,color,price
suit,black,250
suit,gray,275
shoes,brown,75
shoes,blue,68
shoes,tan,65
Write a function that creates a list of dictionaries from the file; each dictionary includes a product
(one line of data). For example, the dictionary for the first data line would be:
{'product': 'suit', 'color': 'black', 'price': '250'}
Print the list of dictionaries. Use “products.csv” included with this assignment
Using the knowledge in computational language in python it is possible to write a code that write a function that creates a list of dictionaries from the file; each dictionary includes a product.
Writting the code:import pandas
import json
def listOfDictFromCSV(filename):
# reading the CSV file
# csvFile is a data frame returned by read_csv() method of pandas
csvFile = pandas.read_csv(filename)
#Column or Field Names
#['product','color','price']
fieldNames = []
#columns return the column names in first row of the csvFile
for column in csvFile.columns:
fieldNames.append(column)
#Open the output file with given name in write mode
output_file = open('products.txt','w')
#number of columns in the csvFile
numberOfColumns = len(csvFile.columns)
#number of actual data rows in the csvFile
numberOfRows = len(csvFile)
#List of dictionaries which is required to print in output file
listOfDict = []
#Iterate over each row
for index in range(numberOfRows):
#Declare an empty dictionary
dict = {}
#Iterate first two elements ,will iterate last element outside this for loop because it's value is of numpy INT64 type which needs to converted into python 'int' type
for rowElement in range(numberOfColumns-1):
#product and color keys and their corresponding values will be added in the dict
dict[fieldNames[rowElement]] = csvFile.iloc[index,rowElement]
#price will be converted to python 'int' type and then added to dictionary
dict[fieldNames[numberOfColumns-1]] = int(csvFile.iloc[index,numberOfColumns-1])
#Updated dictionary with data of one row as key,value pairs is appended to the final list
listOfDict.append(dict)
#Just print the list as it is to show in the terminal what will be printed in the output file line by line
print(listOfDict)
#Iterate the list of dictionaries and print line by line after converting dictionary/json type to string using json.dumps()
for dictElement in listOfDict:
output_file.write(json.dumps(dictElement))
output_file.write('\n')
listOfDictFromCSV('Products.csv')
See more about python at brainly.com/question/19705654
#SPJ1
some commonly used word processors are ____ and _____
Answer:
Microsoft Word and Word doc if I understood the question correctly
Some commonly used word processors are Microsoft Word and Apple Page.
What is word processor?A word processor is a tool or computer application that allows for the entry, editing, formatting, and output of text.
It frequently includes some extra functionality as well. Current word processors are word processor programs operating on general purpose computers as opposed to the standalone machines that the earliest word processors were.
Microsoft Word, Docs, Apple Pages, and LibreOffice Writer are some examples of word processing software.
There are three different kinds of word processors: electronic, mechanical, and software.
Thus, these are some commonly used word processors.
For more details regarding word processor, visit:
https://brainly.com/question/14103516
#SPJ1
______ allows a thread to run on only one processor.
A) Processor affinity
B) Processor set
C) NUMA
D) Load balancing
What is your idea for creating a new and fresh Gaming experience around viewing occasions for Mike's?
My idea on creating a new and fresh Gaming experience around viewing occasions is that one should incorporate emotions into games that people around around viewing occasions can feel.
What is a gaming experience?Gaming is known to be that experience or one can say the origin of identity and also the community that is made for gamers.
Note that the experience is one that goes far more than the game itself, and as such, My idea on creating a new and fresh Gaming experience around viewing occasions is that one should incorporate emotions into games that people around around viewing occasions can feel.
Learn more about Gaming experience from
https://brainly.com/question/27355039
#SPJ1
DONT NEED HELL just showing correct results for future students :)
Use the drop-down menus to complete the steps for adding conditional formatting to a form. 1. Locate the switchboard in the navigation pane under Forms. 2. Open the switchboard in [Design ]view. 3. The conditional tab Form Design Tools will open 4. To edit the font, color, or image, click the conditional tab [ Format]. 5. Make all desired changes using [drop-down menus] the Control Formatting command group 6. Save and close. 7. Reopen in [ Form ] view to see the changes.
The steps on how complete the steps for adding conditional formatting to a form.
How to do conditional formatting to a form. Locate the switchboard in the navigation pane under Forms.Open the switchboard in Design view.The conditional formatting tab, Form Design Tools, will open.To edit the font, color, or image, click the conditional formatting tab, Format.Make all desired changes using the drop-down menus in the Control Formatting command group.Save and close the switchboard.Reopen the switchboard in Form view to see the changes reflected.Read more on conditional formatting https://brainly.com/question/25051360
#SPJ1
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
Please help me I don’t get this
Answer:
I think it's a? sorry if its wrong
Part 2 Graduate Students Only Architectural simulation is widely used in computer architecture studies because it allows us to estimate the performance impact of new designs. In this part of the project, you are asked to implement a pseudo-LRU (least recently used) cache replacement policy and report its performance impact. For highly associative caches, the implementation cost of true LRU replacement policy might be too high because it needs to keep tracking the access order of all blocks within a set. A pseudoLRU replacement policy that has much lower implementation cost and performs well in practice works as follows: when a replacement is needed, it will replace a random block other than the MRU (most recently used) one. You are asked to implement this pseudo-LRU policy and compare its performance with that of the true LRU policy. For the experiments, please use the default configuration as Question 3 of Project Part 1, fastforward the first 1000 million instructions and then collect detailed statistics on the next 500 million instructions. Please also vary the associativity of L2 cache from 4 to 8 and 16 (the L2 size should be kept as 256KB). Compare the performance of the pseudo-LRU and true-LRU in terms of L2 cache miss rates and IPC values. Based on your experimental results, what is your recommendation on cache associativity and replacement policy? Please include your experimental results and source code (the part that has been modified) in your report. Hint: The major changes of your code would be in cache.c.
The outline that a person can use to implement as well as compare the pseudo-LRU and that of the true-LRU cache replacement policies is given below
What is the code about?First, one need to make changes the cache replacement policy that can be see in the cache.c file of a person's code.
Thereafter one need to Run simulations with the use of the already modified or changed code via the use of the default configuration as said in Question 3 of Project Part 1.
Therefore, one can take detailed statistics, such as L2 cache miss rates and IPC (Instructions Per Cycle) values, for all of the next 500 million instructions. etc.
Learn more about code from
https://brainly.com/question/26134656
#SPJ1
I don't know who to do this assignment
An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Overtime pay equals the total overtime hours multiplied by 1.5 times the hourly wage. Write a program that takes as inputs the hourly wage, total regular hours, and total overtime hours and displays an employee’s total weekly pay.
wage=int(input("What the hourly wage?: "))
total_reg_hours=int(input("Enter total regular hours: "))
total_over_hours=int(input("Enter total overtime hours: "))
#Calculate the weekly pay.
print("The weekly pay of this employee is ",(total_reg_hours*wage)+(total_over_hours*(1.5*wage)))
C++:#include <iostream>
int main(int argc, char* argv[]) {
int wage,t_reg,t_over;
std::cout << "Enter wage: "; std::cin>>wage;
std::cout << "\nEnter total regular hours: "; std::cin>>t_reg;
std::cout << "\nEnter total overtime hours: "; std::cin>>t_over;
//Calculate the weekly pay.
std::cout << "The weekly pay of this employee is " << (t_reg*wage)+(t_over*1.5*wage) << std::endl;
return 0;
}
A large multinational client has requested a design for a multi-region database. The master database will be in the EU (Frankfurt) region and databases will be located in 4 other regions to service local read traffic. The database should be a managed service including the replication. The solution should be cost-effective and secure. Which AWS service can deliver these requirements
Answer:
RDS with cross-region Read Replicas
Explanation:
The Amazon Web Service, popularly known as the AWS is a subsidiary company of the Amazon.com which provides various cloud computing platforms on demand and Application Programming Interface or the API to other companies, governments and individuals.
The Amazon web services provides an effective RDS. RDS stands for Relational Database Service. The Amazon RDS is used to set up as well as operate and scale relational database in cloud. It provides resizable capacity and cost effective database.
In the context, Amazon Wen Services can deliver RDS with cross regional Read Replicas.
Monica, a network engineer at J&K Infotech Solutions, has been contracted by a small firm to set up a network connection. The requirement of the network backbone for the connection is of a couple of switches needing fiber-optic connections that might be upgraded later. Which one of the following transceivers should Monica use when the maximum transmission speed is of 8 Gbps?
For a network backbone requiring fiber-optic connections with a maximum transmission speed of 8 Gbps, Monica should use a transceiver that supports the appropriate fiber-optic standard and can handle the desired speed.
In this case, a suitable transceiver option would be the 8G Fiber Channel transceiver.
The 8G Fiber Channel transceiver is specifically designed for high-speed data transmission over fiber-optic networks.
It operates at a data rate of 8 gigabits per second (Gbps), which aligns with the maximum transmission speed requirement mentioned in the scenario.
Fiber Channel transceivers are commonly used in storage area networks (SANs) and other high-performance network environments.
When selecting a transceiver, it is crucial to ensure compatibility with the switches being used and the type of fiber-optic cable employed.
Monica should confirm that the switches she is working with support the 8G Fiber Channel standard and have the necessary interface slots or ports for these transceivers.
For more questions on fiber-optic
https://brainly.com/question/14298989
#SPJ8
Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks]
The Java code for the TestElection class that does the tasks is
java
import javax.swing.JOptionPane;
public class TestElection {
public static void main(String[] args) {
// Declare an array to store objects of the Election class
int length = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of candidates:"));
Election[] candidates = new Election[length];
// Request values from the user to initialize the instance variables of Election objects and assign these objects to the array
for (int i = 0; i < length; i++) {
String name = JOptionPane.showInputDialog("Enter the name of candidate " + (i + 1) + ":");
int votes = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of votes for candidate " + (i + 1) + ":"));
candidates[i] = new Election(name, votes);
}
// Determine the total number of votes
int totalVotes = 0;
for (Election candidate : candidates) {
totalVotes += candidate.getVotes();
}
// Determine the percentage of the total votes received by each candidate and the winner of the election
String winner = "";
double maxPercentage = 0.0;
for (Election candidate : candidates) {
double percentage = (double) candidate.getVotes() / totalVotes * 100;
System.out.println(candidate.getName() + " received " + candidate.getVotes() + " votes (" + percentage + "%)");
if (percentage > maxPercentage) {
maxPercentage = percentage;
winner = candidate.getName();
}
}
System.out.println("The winner of the election is " + winner);
}
}
What is the arrays about?In the above code, it is talking about a group of things called "candidates" that are being saved in a special place called an "array. " One can ask the user how long they want the list to be using JOptionPane and then make the list that long.
Also based on the code, one can also ask the user to give us information for each Election object in the array, like the name and number of votes they got, using a tool called JOptionPane.
Learn more about arrays from
https://brainly.com/question/19634243
#SPJ1
Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks] Write the Java code for the main method in a class called TestElection to do the following: a) Declare an array to store objects of the class defined by the UML above. Use a method from the JOptionPane class to request the length of the array from the user. [3 marks] b) Use a method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled. [5 marks] c) Determine the total number of votes and the percentage of the total votes received by each candidate and the winner of the election. The sample output of your program is shown below. Use methods from the System.out stream for your output.
Help pls.
Write python 10 calculations using a variety of operations. Have a real-life purpose for each calculation.
First, use Pseudocode and then implement it in Python.
For example, one calculation could be determining the number of gallons of gas needed for a trip based on the miles per gallon consumed by a car.
Sample code in a program:
print("A field 30 feet wide and 40 feet long. Area (square feet): ", area)
Sample output:
A field 30 feet wide and 40 feet long. Area (square feet): 120
If we are to make a python program that would perform the calculation to determine the number of gallons of gas needed for a trip, this is given below:
The Programdef printWelcome():
print ('Welcome to the Miles per Gallon program')
def getMiles():
miles = float(input('Enter the miles you have drove: '))
return miles
def getGallons():
gallons = float(input('Enter the gallons of gas you used: '))
return gallons
def printMpg(milespergallon):
print ('Your MPG is: ', str(milespergallon))
def calcMpg(miles, gallons):
mpg = miles / gallons
return mpg
def rateMpg(mpg):
if mpg < 12:
print ("Poor mpg")
elif mpg < 19:
print ("Fair mpg")
elif mpg < 26:
print ("Good mpg")
else:
print ("Excellent mpg")
if __name__ == '__main__':
printWelcome()
print('\n')
miles = getMiles()
if miles <= 0:
print('The number of miles cannot be negative or zero. Enter a positive number')
miles = getMiles()
gallons = getGallons()
if gallons <= 0:
print('The gallons of gas used has to be positive')
gallons = getGallons()
print('\n')
mpg = calcMpg(miles, gallons)
printMpg(mpg)
print('\n')
rateMpg(mpg)
Read more about python programming here:
https://brainly.com/question/26497128
#SPJ1
Which strategies should be used to answer short answer or essay questions? Check all that apply
D comparing items
O looking tor key words such as 'compare" or "contrast
Oallowing extra time to answer
Oidentifying warning words such as "absolutes"
D checking the space for writing the answer
Answer:
B
Explanation:
correct me if im wrong
The strategies that should be used to answer short answer or essay questions are as follows:
Looking for keywords such as 'compare" or "contrast.Checking the space for writing the answer.Thus, the correct options for this question are B and D.
What do you mean by writing strategy?The writing strategy may be defined as the entire sequence in which a writer engages in planning, composing, revising, and other writing-related activities in any literary work. In their opinion, writing strategies are a sequence of activities instead of a single one.
There are five writing strategies for writing simply but authoritatively and effectively are as follows:
Use simpler words and phrases.Minimize the number of negatives in a sentence.Write shorter sentences, but avoid choppiness.Use important key terms consistently.Balance the use of simple and sophisticated language.Therefore, the correct options for this question are B and D.
To learn more about Writing strategies, refer to the link:
https://brainly.com/question/27836380
#SPJ2
Problem: Longest Palindromic Substring (Special Characters Allowed)
Write a Python program that finds the longest palindromic substring in a given string, which can contain special characters and spaces. A palindrome is a word, phrase, number, or other sequence of characters that reads the same forward and backward. The program should find and return the longest palindromic substring from the input string, considering special characters and spaces as part of the palindrome. You do not need a "words.csv" as it should use dynamic programming to find the longest palindromic substring within that string.
For example, given the string "babad!b", the program should return "babad!b" as the longest palindromic substring. For the string "c bb d", the program should return " bb " as the longest palindromic substring.
Requirements:
Your program should take a string as input.
Your program should find and return the longest palindromic substring in the input string, considering special characters and spaces as part of the palindrome.
If there are multiple palindromic substrings with the same maximum length, your program should return any one of them.
Your program should be case-sensitive, meaning that "A" and "a" are considered different characters.
You should implement a function called longest_palindrome(string) that takes the input string and returns the longest palindromic substring.
Hint: You can use dynamic programming to solve this problem. Consider a 2D table where each cell (i, j) represents whether the substring from index i to j is a palindrome or not.
Note: This problem requires careful consideration of edge cases and efficient algorithm design. Take your time to think through the solution and test it with various input strings.
A Python program that finds the longest palindromic substring in a given string, considering special characters and spaces as part of the palindrome is given below.
Code:
def longest_palindrome(string):
n = len(string)
table = [[False] * n for _ in range(n)]
# All substrings of length 1 are palindromes
for i in range(n):
table[i][i] = True
start = 0
max_length = 1
# Check for substrings of length 2
for i in range(n - 1):
if string[i] == string[i + 1]:
table[i][i + 1] = True
start = i
max_length = 2
# Check for substrings of length greater than 2
for length in range(3, n + 1):
for i in range(n - length + 1):
j = i + length - 1
if string[i] == string[j] and table[i + 1][j - 1]:
table[i][j] = True
start = i
max_length = length
return string[start:start + max_length]
# Example usage
input_string = "babad!b"
result = longest_palindrome(input_string)
print(result)
This program defines the longest_palindrome function that takes an input string and uses a dynamic programming approach to find the longest palindromic substring within that string.
The program creates a 2D table to store whether a substring is a palindrome or not. It starts by marking all substrings of length 1 as palindromes and then checks for substrings of length 2.
Finally, it iterates over substrings of length greater than 2, updating the table accordingly.
The program keeps track of the start index and maximum length of the palindromic substring found so far.
After processing all substrings, it returns the longest palindromic substring using the start index and maximum length.
For more questions on Python program
https://brainly.com/question/30113981
#SPJ8
Because Java byte code is the same on all computers, compiled Java programs Group of answer choices Cannot run on Linux systems Must be re-compiled for each different machine it is run on Are highly portable Are non-existent
Answer:
Are highly portable.
Explanation:
Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995.
Java was designed by a software engineer called James Gosling and it is originally owned by Oracle. Also, worthy of mention is the fact that Java was originally known as Oak.
Generally, Java as a software application usually are developed having a ".jar", ".class" or ".java" filename extensions.
Because Java byte code is the same on all computers, compiled Java programs are highly portable. This simply means that, the Java byte code was designed such that it has very few implementation dependency, thus, once the code is written, it can run on all computer platforms that supports the Java programming language.
Hence, the Java byte code is a write once, run anywhere software program.
The Java byte code instructions are read and executed by a computer program known as a Java Virtual Machine (JVM).
Additionally, Java program is used for developing varieties of applications such as, mobile, desktop, games, web and application servers etc.
Pitch an idea for an app that would help with sustainability (examples could be recycling, food waste or energy). What features would it have, how would one of these features work and how would it positively impact the user of the app
you could do something like homeless help, it would be able to find homeless ppl if they signed up and get them a partner to help them with there life
Explanation:
Question # 18
Dropdown
A(n)
is the tool that will help you the most when developing the content you will use in your presentation.
Your answer is outline.
An outline is the tool that will help you the most when developing the content you will use in your presentation.
What is presentation?A presentation is a method of communicating information from a speaker to an audience.
Presentations are usually demonstrations, introductions, lectures, or speeches intended to inform, persuade, inspire, motivate, build goodwill, or introduce a new idea/product.
An outline is a list of the main topics and subtopics that you intend to cover in your presentation in a hierarchical order.
It can assist you in ensuring that your ideas flow logically and that no important points are overlooked.
A storyboard, on the other hand, is a visual representation of your presentation that shows the order of your slides, the images or videos you intend to use, and the text that will go with them.
Thus, the answer is outline.
For more details regarding presentation, visit:
https://brainly.com/question/938745
#SPJ7
Smart home appliances typically include which of the following?
Answer:
Smart home-enabled devices can include appliances like refrigerators, washing machines, dryers, and toaster ovens, as well as heating and air conditioning units and lighting devices.
Explanation:
Smart home appliances include;
Sensors that collect information.WIFI Combability.The ability to send notifications to a smartphone app.What is a smart home appliance?A smart home is known to be home equipment that helps homeowners to control appliances, thermostats, lights, etc.
They are known to be used remotely via a smartphone or tablet through the aid of internet connection. They homes are often set up via wireless or hardwired systems.
Learn more about home appliances from
https://brainly.com/question/18713901
which of the following tools or commands can be used to monitor resources in windows? select all that apply.
Another built-in Windows tool, Resource Monitor, offers more thorough data on resource consumption, including CPU, memory, disc, and network usage.
Which of the aforementioned instruments or commands can be used to check Windows' resource usage?Logman. A utility called Logman (logman.exe) is included with the Windows OS. At the command prompt, you can use it to create and maintain event trace session and performance logs.
What command would you enter on the command line to launch Resource Monitor?By hitting Win + R on the keyboard, you may bring up the Run window. Type "resmon" in the Open area and hit Enter on the keyboard or click OK. Resource Monitor is now accessible and ready for use.
To know more about Windows visit:-
https://brainly.com/question/13502522
#SPJ1
System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio
System testing is a crucial stage where the software design is implemented as a collection of program units.
What is Unit testing?Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.
It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.
Read more about System testing here:
https://brainly.com/question/29511803
#SPJ1