im confused sorry.. can i get help?

Im Confused Sorry.. Can I Get Help?

Answers

Answer 1

1.

If-then statements are used in a program to run certain code when ideal conditions are met.

2.

Since the variable word holds the word kangaroo and the if statement is asking if the variable word is equal to KANGAROO, the else statement will run. The output will be FALSE

3.

if (90 < = x <= 100) should be rewritten as Nothing, the if statement is correct.

4.

You use an else statement when you want your code to do something if your if statement is false.

5.

if (num1 != num2)

I hope this helps!


Related Questions

The CEO of CorpNet.xyz has hired your firm to obtain some passwords for their company. A senior IT network administrator, Oliver Lennon, is suspected of wrongdoing and suspects he is going to be fired from the company. The problem is that he changed many of the standard passwords known to only the top executives, and now he is the only one that knows them. Your company has completed the legal documents needed to protect you and the company. With the help of a CorpNet.xyz executive, you were allowed into the IT Admin's office after hours. You unplugged the keyboard from the back of the ITAdmin computer and placed a USB keylogger into the USB, then plugged the USB keyboard into the keylogger. After a week, the company executive lets you back into the IT Admin's office after hours again. In this lab, your task is to use the keylogger to recover the changed passwords as follows: Move the keyboard USB connector to a different USB port on ITAdmin. Remove the keylogger from ITAdmin. Move the consultant laptop from the Shelf to the Workspace. Plug the keylogger into the consultant laptop's USB drive. Use the SBK key combination to toggle the USB keylogger from keylogger mode to USB flash drive mode. Open the LOG.txt file and inspect the contents. Find the olennon account's password. Find the Administrator account's password. Answer the questions.

Answers

Answer:

The olennon account's password: See the attached file for this.

The Administrator account's password: 4Lm87Qde

Explanation:

Note: See the attached excel file for the olennon account's password as I was unable to save it here because I was instead getting the following message:

"Oh no! It seems that your answer contains swearwords. You can't add it!"

The olennon account's password and the Administrator account's password can be found as follows:

To see the rear of the computer, click Back from the menu bar above the computer.

Drag the USB Type A connector for the keyboard from the rear of the computer to another USB port on the machine.

Make sure the keyboard is plugged back in.

Expand System Cases on the shelf.

Add the Laptop to the Workspace by dragging it there.

To see the rear of the laptop, click Back from the menu above the laptop.

Drag the keylogger from the computer to the laptop's USB port.

Select Front from the menu above the laptop to see the front of the laptop.

Select Click to display Windows 10 on the laptop.

Toggle between keylogger and flash drive mode by pressing S + B + K.

To control what occurs with detachable drives, select Tap.

To view files, choose Open folder.

To open the file, double-click LOG.txt.

Select Answer Questions in the top right corner.

Respond to the questions.

Choose Score Lab as the option.

Therefore, we have:

The olennon account's password:

The Administrator account's password: 4Lm87Qde

Question 5 (5 points)

(01.03 MC)

When programming dictionaries in Python?

Answers

When programming dictionaries in Python, you should use curly braces {} to enclose the key-value pairs. The key-value pairs are separated by a colon, and each pair is separated by a comma.

In Python, dictionaries are an important data type that allow you to store key-value pairs. To create a dictionary, you use curly braces {} to enclose the key-value pairs. Each key-value pair is separated by a colon, and each pair is separated by a comma.

For example, here is how you would create a dictionary that stores the names of students and their corresponding grades:

```python
grades = {'Alice': 90, 'Bob': 85, 'Charlie': 80}
```

In this example, 'Alice', 'Bob', and 'Charlie' are the keys, and 90, 85, and 80 are the values.

You can access the values in a dictionary by referencing the key. For example, to get the grade for 'Alice', you would write:

```python
grades['Alice']
```

This would return the value 90.

You can also add new key-value pairs to a dictionary or modify existing ones by assigning a value to a key:

```python
grades['David'] = 95
grades['Charlie'] = 82
```

In this example, we added a new key-value pair for 'David' with a value of 95, and we modified the value for 'Charlie' to be 82.

Overall, dictionaries are a powerful tool in Python that allow you to store and manipulate key-value pairs.

Learn more about Python: https://brainly.com/question/30427047

#SPJ11

Sofia is reading a difficult text for class and worries that she won’t complete it by the given deadline. How can a text-to-speech tool best help her? It can improve her comprehension. It can help her with vocabulary words. It can increase the pace of her reading. It can provide her with a summary.

Answers

The text-to-speech tool best help the Sofia in her class work by it can increase the pace of her reading.

What is text-to-speech tool?

The text-to-speech tool is used to listen the text written over a platform. This technology let us enable to convert a written text into the speech form just like a human voice.

Sofia is reading a difficult text for class and worries that she won’t complete it by the given deadline.

While reading the difficult text which might consist of some difficult words, the text to speech tool help her by residing all the text in a speech form.

This way her speed of reading will be increased.

Thus, the text-to-speech tool best help the Sofia in her class work by it can increase the pace of her reading.

Learn more about text-to-speech tool here;

https://brainly.com/question/18066188

How is a sequential control structure read?

Answers

Answer:

"Sequence control structure” refers to the line-by-line execution by which statements are executed sequentially, in the same order in which they appear in the program. They might, for example, carry out a series of read or write operations, arithmetic operations, or assignments to variables.

Explanation:

The sequence control structure is the default or overriding structure. The sequence structure indicates instructions are to be executed one statement at a time in the order they occur from top to bottom unless a different control structure dictates otherwise.



a company buys a new software package. this package includes a user guide.
give two sections that should be included in this user guide.

Answers

A user manual must contain sections like user documentation and installation guide to the product or service.

What is a user manual?

A booklet, which contains guidelines regarding the features and specifications of the product along with which it is being sold, and also contains guidelines regarding setup is known as a user manual.

Hence, the significance of user manual is given above.

Learn more about a user manual here:

https://brainly.com/question/20805588

#SPJ1

Give the definition of c identifier​

Answers

Answer:

C identifiers represent the name in the C program, for example, variables, functions, arrays, structures, unions, labels, etc. An identifier can be composed of letters such as uppercase, lowercase letters, underscore, digits, but the starting letter should be either an alphabet or an underscore.

Explanation:

2.) write a script that can sum all the numbers from one to some arbitrary integer n by utilizing both a for loop and a while loop. then use these scripts to calculate the sum of the integers between one and fifty. check your answer using the command sum(1:50).

Answers

Here is a Python script that uses both a for loop and a while loop to sum all numbers from 1 to n: (Scroll down to view the whole code.)

What is Python's primary purpose?

Python is frequently used for creating websites and applications, automating repetitive tasks, and analyzing and displaying data. Python has been used by many non-programmers, including accountants & scientists, for just a variety of routine activities including managing finances since it is very simple to learn.

# For loop implementation

def sum_numbers_for(n):

sum = 0

for i in range(1, n+1):

sum += i

return sum

# While loop implementation

def sum_numbers_while(n):

sum = 0

i = 1

while i <= n:

sum += i

i += 1

return sum

# Calculate sum of numbers from 1 to 50

n = 50

sum_for = sum_numbers_for(n)

sum_while = sum_numbers_while(n)

print("Sum using for loop:", sum_for)

print("Sum using while loop:", sum_while)

The output of this code will be:

Sum using for loop: 1275

Sum using while loop: 1275

To know more about python visit :

https://brainly.com/question/14378173

#SPJ4

which term describes a process in which different stages are repeated when necessary
A. interface
B. prototype
C. recursive
D. troubleshoot

Answers

Answer:

I believe it B, because you need to test a prototype over and over to get it right.

Explanation:

Answer:

Recurcive would be the correct answer

How do cell phones negatively affect students in the classroom?

Answers

Cell phones negatively affect students with a divert attention and have a detrimental effect on cognitive ability, reaction times, performance, and enjoyment of focused tasks.

What is cognitive ability?

Any task, no matter how simple or difficult, requires cognitive abilities, which are brain-based skills. They are less concerned with actual knowledge and more with the processes by which we learn, remember, solve problems, and pay attention.

For instance, picking up the phone requires motor skills (lifting the receiver), language skills (talking and understanding language), perception (hearing the ring tone), decision-making (answering or not), and social skills.

Particular neuronal networks provide support for cognitive abilities or skills. For instance, the temporal lobes and some parts of the frontal lobes are primarily responsible for memory functions. Due to damaged neuronal regions and networks, people with traumatic brain injuries may have lower cognitive function.

Learn more about cognitive abilities

https://brainly.com/question/9741540

#SPJ4

ok so I have two accounts and like, the other account has -20 points??? what happened​

Answers

You need to do the questions to get more points

What number will be output by the console.log command on line 7? *
2 points
Captionless Image

Answers

Answer:

The output is 100

Explanation:

See attachment for complete question

I'll be making reference to the attachment time to time.

On line 1 of the attachment, variable fizz was declared

On line 2, variable bop was declared

Variable bop was initialised to 10 on line 3

Variable fizz was initialised to 20 on line 4

On line 5, 100 was assigned to bop

On line 6, 200 was assigned to fix

The value of bop was printed on line 7.

Note that, the current value of bop is not 100 (as updated on line 5).

Hence, the output of the program at line 7 is 100

What number will be output by the console.log command on line 7? *2 pointsCaptionless Image

Based on the program command displayed in the console, the output displayed by the console.log command would be 100.

The variable bop is assigned a value of 10 based on the command in line 3

In line 5 however, an update has been made to the bop variable, and the variable has been update to 100.

The newly assigned varibale value on line 5 would be the value of the bop variable unless updated again.

Hence, the output would be 100.

Learn more : https://brainly.com/question/20304083

Difference between web browser and search engine.​

Answers

Answer:

A search engine is like Bing, but a web browser is a browser you can search from anywhere in the world and end up with the same search results.

Explanation:

A ______ contains buttons and menus that provide quick access to commonly used commands.

Answers

A toolbar typically appears on the menu bar and includes buttons that provide shortcuts for quick access to commonly used commands.

A toolbar is defined as a graphical user interface element that is commonly found below the menu bar in various software applications.

This will consist of a horizontal or vertical row of buttons or icons that represent frequently used functions or commands. These buttons provide users with a quick and convenient way to access performed actions without navigating through menus or using keyboard shortcuts.

These are designed to enhance user productivity by offering easy access to frequently used features.

The buttons on a toolbar are accompanied by icons or labels to indicate their respective functions.

Additionally, toolbars may include dropdown menus that provide additional options or settings.

Learn more about toolbar:

brainly.com/question/31553300

#SPJ4

a method that returns the position (index) of a specific element in an arraylist would have a complexity of

Answers

The method that returns the position (index) of a specific element in an array list would have a complexity of O(n), where n is the size of the array list.

ArrayList is a class in Java that is a resizable array or a dynamic array. It can have a variable number of elements, which means that the size of the array can be changed according to the user's needs. ArrayList is available in the java.util package since Java 1.2. It can be used to store objects of any type, including primitive data types. Because the size of the array can be changed, an ArrayList is similar to a dynamic array.  However, unlike a standard array, an ArrayList may store null values.

Learn more about ArrayList here: https://brainly.com/question/30000210

#SPJ11

why over the course of time have more programming language been developed​

Answers

technology and being able to communicate?

Your wireless network consists of multiple 802.11n access points that are configured as follows: SSID (hidden): CorpNet Security: WPA2-PSK using AES Frequency: 5.75 GHz Bandwidth per channel: 40 MHz Because of the unique construction of your organization's facility, there are many locations that do not have a clear line of sight between network clients and access points. As a result, radio signals are reflected along multiple paths before finally being received. The result is distorted signals that interfere with each other. What should you do

Answers

Answer:restart your internet box

Explanation:

the privilege ____ can be granted to retrieve data.

Answers

The privilege read can be granted to retrieve data.

It is important to understand that in computing, access control is the selective restriction of access to a resource or facility. In access control, there are various methods that can be used to identify an individual, such as passwords, biometric authentication, and security tokens. Access control is used to control who can access resources, what actions they can perform on the resources, and when they can access the resources.There are two types of access control: physical and logical access control.Physical access control limits access to buildings, rooms, and physical IT resources such as servers, routers, and switches.

Logical access control, on the other hand, restricts access to system and network resources based on user credentials and roles.There are different levels of access control, ranging from basic to advanced. In most organizations, access control is implemented through an access control list (ACL). An ACL is a list of permissions attached to an object, such as a file, folder, or network resource. ACLs specify which users or groups have access to the object and what actions they can perform on it.ACLs can be applied to different resources such as files, folders, applications, and network devices.

One privilege that can be granted to retrieve data is the read privilege. The read privilege allows a user or group to view the contents of a resource but not make any changes to it.

Learn more about Organizations here,https://brainly.com/question/19334871

#SPJ11

Indicate which PCB fields may change during a process's lifetime.
parent
a)May change
b)Will not change

Answers

The parent field in a PCB design may change during a process's lifetime. The parent field is used to indicate the hierarchical relationship between different components on the PCB. For example, the parent of a resistor component may be the circuit board on which it is mounted, while the parent of a circuit board may be the assembly that it is a part of.

In summary, the parent field in a PCB design may change during a process's lifetime, depending on the current hierarchical relationship between the components and any changes to the design or manufacturing processes.It is not accurate to say that the parent field will not change during a process's lifetime, as the field reflects the hierarchical relationship between the components on the PCB, which may evolve over time. However, proper project management practices, such as regular communication between team members and maintaining up-to-date documentation, can help ensure that the parent field is always accurate and reflects the current hierarchical relationships between the components.

To learn more about assembly  click on the link below:

brainly.com/question/21305476

#SPJ11

Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?

A.
alongside the development of the app

B.
after the app has been developed

C.
during the testing phase

D.
during the design phase

Answers

Answer:

C option

Explanation:

Because in testing phase the game has been developed and test for errors in game.

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.

Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop
Sample Output
What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

The loop that continually asks the user what pets the user has until the user enters stop is written below.

What is a loop?

As long as the condition is met, a for loop in Python is a control flow statement that is used to continually execute a set of instructions.

'''

# count of pets

count = 0

# read the user input

pet = input()

# loop that continues till the user enters rock

# strip is used to remove the whitespace

while pet.strip() != 'rock':

 # increment the count of pets

 count += 1

 # output the pet name and number of pets read till now

 print('You have a %s with a total of %d pet(s)' %(pet.strip(),count))

 pet = input() # input the next pet

#end of program

Therefore, the loop is written above.

To learn more about the loop, visit here:

https://brainly.com/question/14390367

#SPJ1

Name the tools in plant propagation.
Q
18.
16.
17.
19.
20.
please po asap​

Name the tools in plant propagation.Q18.16.17.19.20.please po asap

Answers

16. Branch or tree cutter
17.paint tape
18. Knife
19. Pots
20. Waterer

Which of the following is the most accurate definition of a botnet? a small text file passed to a Web browser on a user's computer by a Web server destructive software robots working together on a collection of zombie computers via the Internet spider software used by a search algorithm to crawl various Web sites to return a query a common platform used by search engines to index the contents of a Web site a fraudulent e-mail attack that targets a specific person or organization by personalizing the message

Answers

Answer:

destructive software robots working together on a collection of zombie computers via the Internet

Explanation:

Botnets are devices controlled via the internet to achieve a goal that requires multiple computers working towards a shared task. e.g. Denial of service attacks and mass email messaging.

When should the Clean Up command be used?
to move all message conversations to the deleted items folder
to ensure that no future messages of that type are delivered to him
to remove redundant messages to free up space in his inbox
to clean up the deleted items folder and permanently delete messages

Answers

Answer:

the correct option in c

Explanation:

Answer: The person below me is right, its C.

Explanation: I did it on Edg and I got it right.

please convert this for loop into while loop

please convert this for loop into while loop

Answers

Answer:

The code segment was written in Python Programming Language;

The while loop equivalent is as follows:

i = 1

j = 1

while i < 6:

     while j < i + 1:

           print('*',end='')

           j = j + 1

     i = i + 1

     print()

Explanation:

(See attachment for proper format of the program)

In the given lines of code to while loop, the iterating variables i and j were initialised to i;

So, the equivalent program segment (in while loop) must also start by initialising both variables to 1;

i = 1

j = 1

The range of the outer iteration is, i = 1 to 6

The equivalent of this (using while loop) is

while ( i < 6)

Not to forget that variable i has been initialized to 1.

The range of the inner iteration is, j = 1 to i + 1;

The equivalent of this (using while loop) is

while ( j < i + 1)

Also, not to forget that variable j has been initialized to 1.

The two iteration is then followed by a print statement; print('*',end='')

After the print statement has been executed, the inner loop must be close (thus was done by the statement on line 6, j = j + 1)

As seen in the for loop statements, the outer loop was closed immediately after the inner loop;

The same is done in the while loop statement (on line 7)

The closure of the inner loop is followed by another print statement on line 7 (i = i + 1)

Both loops were followed by a print statement on line 8.

The output of both program is

*

*

*

*

*

please convert this for loop into while loop

game development is a time-consuming and expensive endeavor, and being a Lone Ranger is a recipe for disaster
True or False

Answers

False although depends on the future of the person's ideas

The statement that game development is a time-consuming and expensive endeavor is false.

What is game development?

Game development is designing or creating game software. It also involves generating new concepts of game and new graphics software and new technologies.

Thus, the correct option is false.

Learn more about game development

https://brainly.com/question/19837091

#SPJ2

1) According to the text, what is a common cause of collisions ?
O taking a call on a cell phone
O defensive driving
O checking your surroundings
O no answer applies
Oscanning for hazards
is a common cause of collisions.

Answers

Answer:

Taking a call on a cell phone.

Windows 7 search could search for files and folders on the local system as well as on the network shares.

Answers

Windows 7 operating system provides a user with multiple methods for searching files and folders. One of them is the Search box that is located on the Start menu. This box facilitates users to search for files, folders, and programs on the local computer system.

With Windows 7, users can search for files and folders on network shares as well.Windows 7 provides network administrators and users with the capability to search network shares and directories using the search engine that is integrated with Windows Explorer. The indexing service that operates in the background indexes the contents of files on network shares that are set to index, making them available for instant search results.

When the user searches for files and folders, the operating system inspects and searches the index in addition to searching through the contents of files and folders present in the folder where the search is being performed. A user can limit a search to a network share by selecting the option to search network folders and libraries in the Search tab of the Folder options dialog box that is located in the Control Panel.

To know more about system visit:

https://brainly.com/question/19843453

#SPJ11

Rebbeca has finished with the research and outline portion of her slide presentation. Now, the next logical step is to begin working on what part of her slide?

Answers

Answer:

The next step is creating the layout and template style

Explanation:

As we know that the power point presentation is used for preparing the slides  i.e. easy for the company to describe them by adding the images, videos with sounds.

As in the situation it is given that the Rebbeca completed with the portion of the research and outline now the next and logical step would be that she could create the layout and the style of the template so that it looks attractive to the audience

Therefore the above represents the answer  

Can someone write this on a piece of paper for me please

Can someone write this on a piece of paper for me please

Answers

Written includes handwritten, typewritten, printed, lithographed, photographed, telexed, telefaxed, and any other alternative for writing, whether electronic or not, or a combination of both.

What mean in writing?

A pen, pencil, or other instrument is used to etch or inscribe (characters, letters, words, etc.) on something's surface. Name-dropping is encouraged. giving a written account of; expressing or corresponding in writing; She expressed her gratitude via letter for our kindness.

Anything that is "in writing" may be expressed verbally, printed, lithographed, photographed, telexed, telefaxed, or represented in any other form, whether electronically or otherwise, or in some combination of all of these ways.

Good writing exhibits efficient organisation or structure. The writer's organisation of the ideas in this text and the way she moves from one to the next feel natural. Sentences written with sentence fluency feel organic, effortless, and expressive.

To learn more about writing refer to:

https://brainly.com/question/1643608

#SPJ1

Other Questions
what actions could be taken to stabilize output in response to a large decrease in u.s. net exports? group of answer choices increase taxes or increase the money supply increase taxes or decrease the money supply decrease taxes or increase the money supply decrease taxes or decrease the money supply I need help with a problem if the reaction rate is 1.75 107 mol l1 min1 when the concentration of sulfur trioxide is 5.4 103 mol l1, what is the value of the rate constant k? bateman corporation sold an office building that it used in its business for $800,400. bateman bought the building 10 years ago for $599,800 and has claimed $200,600 of depreciation expense. what is the amount and character of bateman's gain or loss? What are the solutions to the equation?x^3 6x^2 9x + 54 = 0 Enviro Company issues 8%,10-year bonds with a par value of $290,000 and semiannual Interest payments. On the issue date, the annual market rate for these bonds is 10%, which implies a selling price of 8712 . The straight-line method is used to allocate interest expense. 1. What are the Issuer's cash proceeds from Issuance of these bonds? 2. What total amount of bond interest expense will be recognized over the life of these bonds? 3. What is the amount of bond interest expense recorded on the first interest payment date? [repost with picture] question #4, show steps pleaseAnswer choices:A) 2 onlyB) 4 onlyC) 2 and 5 onlyD) 2, 4, and 5E) 0, 4, and 6 Computers and Technology:"Sanjay sent 23 text messages on Monday, 25 on Tuesday and 40 on Wednesday." "Develop an algorithm (pseudocode or flowchart) which accepts the number of text messages sent each day, and computes and outputs the average number of text messages sent daily. Remember that a fraction of a text message cannot be sent!Also, show the answer in pascal code."Please help me. Malice is a necessary component to be able to charge the crime of:a Murderb Arsonc Involuntary manslaughterd Voluntary manslaughter Which founding father contributed the least to American independence? If f(x)=1/3x+8, find the value of 3f(-12)+4. What was Sam Houstons role in the government after Texas was annexed? can someone give me an answer and explain it? Instrucciones: Translate the sentences from English to Spanish be accurate as possible in your translation You have been contracted by the Ministry of finance to provide for them ways through which they can increase public sector financial management with special emphasis on accountability and corruption. Your task is to provide a working document that involves the selection of any public sector organisation and1. reviewing their activities vis-a-vis their financial performance over the past year or two (4 marks)2. Reviewing their audit performance as presented in the Auditor general's report (4 marks)3. classifying the infractions found in the auditor General's report under the various typologies of corruption (4 marks)4. Discussing the implications of the infractions on the performance of their duties, productivity and public sector efficiency. (4 marks)5. Presenting clear pathways through which the identified infractions can be addressed and prevented (4 marks) The average salary for a sales representative in a medical billing company is $46,600 with a standard deviation of $6,400. The coefficient of variation for salaries at this company is Mike is looking for a loan. He is willing to pay no more than an effective rate of 8. 000% annually. Which, if any, of the following loans meet Mikes criteria? Loan X: 7. 815% nominal rate, compounded semiannually Loan Y: 7. 724% nominal rate, compounded monthly Loan Z: 7. 698% nominal rate, compounded weekly a. Y only b. X and Z c. Y and Z d. None of these meet Mikes criteria. Please answer it as soon as possible. Grade: 9th Subject: Science Honey is a treasure for sure, but the real gold is in the strawberries, apples, peaches, and green beans we eat and need to stay healthy ourselves. Q-1: Write a program in Assembly language using MIPS instruction set that reads 10 integer numbers from user and stores all the numbers in the array score. Now, print all the numbers that is stored in the integer array score. Sample Input/Output: Enter 10 integer number: 45 15 25 35 185 55 75 115 65 95 All numbers in the Array Score = 45 15 25 35 185 55 75 115 65 95