Answer:
The poet praises the common man.
Explanation:
The poet states that being a “nobody” is a terrible thing to be
Who is Poet?One of America's greatest and most creative poets of all time is Emily Dickinson. She claimed definition as her domain and contested the established definitions of poetry and the task of the poet.
Like authors like Walt Whitman, Henry David Thoreau, and Ralph Waldo Emerson, she experimented with expression to liberate it from socially prescribed boundaries.
She created a novel kind of first-person identity, much like authors like Charlotte Bronte and Elizabeth Barrett Browning.
Therefore, The poet states that being a “nobody” is a terrible thing to be .
To learn more about Identity, refer to the link:
https://brainly.com/question/30699830
#SPJ2
You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?
Answer:
texts and music are best compressed using lossy compression and videos are best compressed using lossless compression
Explanation: texts and music are best compressed using lossy compression because there are not many details to leave out while pictures and videos are best compressed using lossless compression because they need to be in good quality
Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos
A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.
This type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.
However, a lossless compression is such that even after the file size is reduced, the quality remains unchanged. This type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.
Hence;
Lossy compression should be applied to text messages and musicLossless compression should be applied to images and videosRead more about file compressions at:
https://brainly.com/question/13663721
Which of the following activities is permissible for IT professionals in the conduct of computer access and authorizations?
viewing explicit content on a company computer
posting updates to social media networks during slow periods at work
using another company’s copyrighted images for the company’s website
using the company’s e-mail software to send work-related e-mails
Answer:
D
Explanation:
Answer: A, B, C, D
Explanation:
Which of the following accurately describes the overall trend in computing during the past 70-plus yearsa.
a. Toward physically larger, more powerful computers.
b. Toward physically larger, less powerful computers.
c. Toward physically smaller, less powerful computers.
d. Toward physically smaller, more powerful computers.
e. Toward physically smaller, single-use computers.
By simply reducing its size the computer can be speedier as indicated above, the concept of Einstein that messages can not spread faster than light speeds gives one of the limits to how quickly computers can work.
The computers have to become smaller to make them quicker. Therefore, Toward represents the total trend in the last 70+ years physically smaller, more powerful machines perfectly.The wrong choice can be defined as follows:
For option a, it is wrong because physically larger computers acquire larger space.For option b, it is wrong because physically larger computers are acquiring in a larger space and it is more powerful.For option c, it is wrong because a small computer acquires a small space but it is less powerful as compared to physically larger.For option e, it is wrong because it is also known as a microcomputer that is powerful for both single and multiple users.Therefore "Option d" is correct.
Learn more:
brainly.com/question/24504878
Learning Objectives
Implement 2 different machine learning algorithms
Stochastic Gradient Descent
ID3 Decision Tree
Description
This assignment is focused on machine learning, mainly on the implementation of 2 different algorithms - Stochastic Gradient Descent & ID3 decision tree. The assignment is divided into two sections, each for one unique ML algorithm.
Answer:
you just need to research
Explanation: its easy once you get the hang of it
A well-liked optimization technique for building models in machine learning is stochastic gradient descent. A well-liked decision tree technique for classification issues in machine learning is \(ID_3\)
What is stochastic gradient descent and \(ID_3\)?A well-liked optimization approach for training models in machine learning is stochastic gradient descent. As it changes the model weights based on a small batch of randomly chosen samples rather than the complete dataset, it is especially helpful for huge datasets. Implementing the SGD algorithm entails the following steps:
1. Initialize the model weights at random.
2. The dataset was divided into smaller groups.
3. Every batch:
Determine the loss function's gradient with respect to the weights.Utilize the gradient and a learning rate to update the weights.4. Until convergence or the maximum number of iterations is achieved, repeat steps 2-3.
A well-liked decision tree technique for classification issues in machine learning is ID3. The dataset is separated recursively depending on the feature that yields the greatest information gain, and this process is repeated until every instance in a leaf node belongs to the same class. Implementing the ID3 algorithm entails the following steps:
1. Determine the dataset's overall entropy.
2. For each attribute:
After the dataset has been divided based on that attribute, compute its entropy.Determine the feature's information gain.3. As the separating feature, pick the one that provides the most information gain.
4. The splitting feature should be the decision rule for a new node in the decision tree.
5. Apply steps 1-4 repeatedly until all subsets of the dataset produced by the splitting rule have been processed.
Therefore, a well-liked optimization technique for building models in machine learning is stochastic gradient descent. A well-liked decision tree technique for classification issues in machine learning is \(ID_3\)
Learn more about stochastic gradient descent, here:
https://brainly.com/question/30881796
#SPJ2
what is the factor of 200
The Factors of 200 are: 1, 2, 4, 5, 8, 10, 20, 25, 40, 50, 100 and 200.
What are factors of a number?In math, the factors of any number or algebraic expression is known to be that number that can be able to divides another number or expression in an even way.
Therefore, The Factors of 200 are: 1, 2, 4, 5, 8, 10, 20, 25, 40, 50, 100 and 200 because they can divide 200 evenly without reminder.
Learn more about Number factor from
https://brainly.com/question/2058395
#SPJ1
What is the Internet?
Answer:
a global computer network providing a variety of information and communication facilities, consisting of interconnected networks using standardized communication protocols
Explanation:
Explanation:
Hey there!
The internet is the largest computer networks which connects billions of computers around the world.
Hope it helps...
A website has recently seen a spike in activity due to a recent marketing campaign that has caused a decrease in performance. The operators want to improve performance to their website. What should they implement?
Answer:
THEY SHOULD ADD CHEESE!
Explanation:
cheese solves everything,
Give an example of a type of college, along with 3 benefits of attending that type of college.
A good example of a type of college is Community colleges and the 3 benefits of attending that type of college are:
You'll have higher marketability.Access to greater employment possibilities.Greater earning potential.in the US, what is a community college?Two-year courses at community colleges can be taken to earn an Associate of Arts (AA) or an Associate of Science (AS) degree. These universities also provide technical and vocational programs with strong ties to area secondary and high schools, civic organizations, and employers.
Note that Before moving to a four-year program, attending community college might be an economical method to test the water in higher education. But these institutions also provide a wide range of courses that let students skip college entirely.
Learn more about Community colleges from
https://brainly.com/question/9379517
#SPJ1
Anyone know this awnser computer science
Answer:
Smartphones, Satellite internet providers, smart speakers, and bluetooth headphones
Explanation:
What is the difference between laser jet printer and inkjet printer? 60 - 100 words
Answer:
A laser jet printer uses toner, while an inkjet printer sprays ink dots onto a page. Laser jet printers generally work faster than inkjet printers. Although inkjet printers are cheaper than laser jet printers, they are usually more expensive to maintain in the long run as ink cartridges have to be replaced more often. Thus, laser jet printers are cheaper to maintain. Laser jet printers are great for mass printing as they are faster and, as mentioned earlier, cheaper to replenish. Whereas inkjet printers are better for printing high quality images.
Read and Answer the Question.
After several years of driving long-haul trucks, Joe Blanka
founded his own trucking company, Blanka Transport Inc.
(BTI), which specialized in less-than-truckload shipments in the
midwestern part of the United States. Joe developed a successful
method for scheduling BTI’s runs that met or exceeded the
delivery expectations of its customers. As a result, BTI shipments were growing at a rate between 15 and 20 percent per
year. The growth, however, was not evenly distributed across
BTI’s territory. On some routes, capacity was overloaded in one
direction and underloaded in the other.
Joe noticed that the imbalance problem was not stable
across time. In some months, capacity was short in one direction, and in other months, it was short in another direction. He
thought that one way of solving the problem would be through
marketing, by offering incentives to customers whose shipments
would improve load balance. Another approach to the problem
was to analyze and restructure the route–equipment combinations. He also thought that it might be possible to warehouse
some less-urgent shipments for short periods in order to help
the balance.
Joe’s son, the first member of the Blanka family to attend
college, was a senior in engineering school. He had just completed a course in project management, and after briefly describing some of the basic concepts to his father, he suggested that a
process improvement project might be a good way to deal with
the balance problem. He thought that the Marketing Manager
and the Route Manager could serve as project co-managers. He
also felt that some of the older, more experienced drivers might
be helpful. The objective of the project would be to decrease the
size of the route imbalances by 75 percent in 1 year.
Questions: Is this a proper approach to the problem? Is this a “project”; if
so, what are the three triple constraints? What, if any, helpful
suggestions would you make to Joe?
Yes, the process improvement project suggested by Joe's son is a proper approach to address the balance problem in the trucking company. It can help decrease the route imbalances by 75 percent in one year.
What are the constraints?The three triple constraints in this project would be scope (reducing route imbalances), time (1 year), and resources (including the Marketing Manager, Route Manager, and experienced drivers).
Some helpful suggestions for Joe would be to consider implementing a combination of marketing incentives, route restructuring, and short-term warehousing to achieve better load balance.
Additionally, he should ensure effective communication and collaboration between the project co-managers and team members to maximize the project's success.
Read more about project development here:
https://brainly.com/question/27995740
#SPJ1
A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more than 15%. Which of the following components are the MOST likely causes the issue? (Select three.)
A. LCD power inverter
B. AC adapter
C. Battery
D. Processor
E. VGA card
F. Motherboard
G. Backlit keyboard
H. Wireless antenna
Answer:
A, B and C
Explanation:
When talking about a computer or laptop charging, there are ONLY 3 things that matter.
The Battery - This is where the electricity or "wall juice" is stored.
AC Adapter - This is how the Battery gets its juice, it plugs into the computer itself.
LCD Power Adapter - This plugs into the wall to pull the electricity from the grid into your computer passing through AC Adapter.
On a side note... the most logical reason the computer could not be going over 15% nor charge anymore than 30mins is because the battery has been shortened by either a storm or a power surge.
Write a 250-word essay on the benefits and dangers of collecting and storing personal data on online databases. Things to consider:
Does the user know their data is being collected?
Is there encryption built into the system?
Is that encryption sufficient to protect the data involved?
Does collecting the data benefit the end user? Or just the site doing the collecting?
Answer:
The collection and storage of personal data on online databases has both benefits and dangers. On the one hand, collecting and storing data can be incredibly useful for a variety of purposes, such as personalized recommendations, targeted advertising, and improved user experiences. However, it's important to consider the risks and potential consequences of this practice, particularly in regards to privacy and security.
One concern is whether or not users are aware that their data is being collected. In some cases, this information may be clearly disclosed in a site's terms of service or privacy policy, but in other cases it may not be as transparent. It's important for users to be aware of what data is being collected and how it is being used, so that they can make informed decisions about whether or not to share this information.
Another important factor is the level of encryption built into the system. Encryption is a way of encoding data so that it can only be accessed by authorized parties. If a system has strong encryption, it can help to protect the data involved from being accessed by unauthorized users. However, if the encryption is weak or flawed, it may not be sufficient to protect the data. It's important to carefully consider the strength and reliability of any encryption used on a system that stores personal data.
Ultimately, the benefits and dangers of collecting and storing personal data on online databases will depend on the specific context and how the data is being used. It's important to weigh the potential benefits and risks, and to carefully consider whether the collection and storage of this data is truly in the best interests of the end user, or if it is primarily benefiting the site doing the collecting.
Explanation:
Answer first before explanation please
Which of the following scenarios reflect the atomicity
property?
A) 1. A transaction has completed executing.
2: The changes are saved to volatile memory.
3. The changes are then saved to non-volatile
memory.
B) 1. The product quantity starts at 200.
2. Transaction 1 runs to read the quantity of the
product to be updated.
3. Transaction 2 attempts to read the quantity of
the same product.
4. Transaction 2 has to wait until transaction 1 is
complete.
5. Transaction 1 updates the product quantity to
reduce it by 100.
6. Transaction 2 is now able to read the quantity
to be updated.
7. Transaction 2 updates the product quantity to
reduce it by 5.
8. The product quantity ends at 95.
C) 1. The newsletter column can only accept Y or N
as options.
2. The user tries to attempt to enter in Maybe.
3. The transaction is denied.
D) 1. A transaction has two SQL requests.
2. Both successfully complete.
3. The data is then committed.
D) Transaction has two SQL requests, both successfully complete, the data is then committed.
Explanation: Atomicity requires that all SQL requests in a transaction should be fully completed and if not, the entire transaction should be aborted. The transaction should be viewed as a single logical unit of work that is indivisible.
A transaction has two SQL requests both successfully completed and then the data is committed. Option (d) is correct.
What do you mean by Transaction?An executed contract between a buyer and a seller to trade goods, services, or financial assets in exchange for money is known as a transaction. The phrase is also frequently used in business accounting.
Atomicity mandates that each SQL request inside a transaction be fully finished; otherwise, the transaction must be canceled. The transaction should be seen as a single, indivisible logical unit of work.
A database's atomicity assures that it adheres to the all or nothing principle. In other words, the database views each transaction as a single, complete entity. As a result, when a database processes a transaction, it either executes it in full or not at all.
Therefore, Option (d) is correct. A transaction has two SQL requests both successfully completed and then the data is committed.
Learn more about Transaction, here;
https://brainly.com/question/24730931
#SPJ2
Someone who creates a new product to sell and takes on all of the risks
and responsibility
An entrepreneur
An accountant
A venture capitalist
A corporation
Answer: an entrepreneur
Think about that the C, B and S parameters of a Cache. Think about what happens to compulsory, capacity, conflict misses, if only each of the following parameter changed (the other two are kept the same)?
(i) C is increased (S, B same)
(ii) S is increased (C, B Same)
(iii) B is increased (C, S Same)
Answer:
(i) C is increased (S, B same)
Explanation:
Cache are items which are stored in the computer at a hidden place. These are sometimes unwanted and they may hinder the speed and performance of the device. They exist to bridge speed gap.
Perfrom traceroute of an ip address in Australia
How to perform a typical traceroute on an IP address using CMD command is given below:
The StepsIn case you're striving to perform a traceroute operation on an IP address, either using Windows or Mac computer systems, the following guidelines will provide assistance.
Windows users may select the Windows key and R simultaneously, enter "cmd," hit Enter. In comparison, users operating with the Mac OS should navigate through Finder by visiting Applications -> Utilities and double-clicking Terminal.
To get started with the procedure, insert the word "traceroute," and proceed by entering the specific IP address that you desire to locate. Even if searching for information on 203.0.113.1, simply input "traceroute 203.0.113.1." At this stage, submit and wait until the validation is done.
This method ascertains the path taken by packets across the network. It indicates the number of jumps made, along with their response time at every stage. One aspect to bear in mind is some routers/firewalls may block access thereby leading to incomplete outcomes.
Read more about Ip addresses here:
https://brainly.com/question/14219853
#SPJ1
Write a program that accepts each element in the array from the user, and finds the following:
a. The minimum number in the array
b. The maximum number in the array
c. Average of all values in the array
d. Sum of the numbers present from index [2] to index [7]
e. Identify how many times ‘5’ was found in the array.
f. Identify all the odd numbers in the array
g. Sum of all odd numbers in the array
h. Identify even numbers in the array
i. Sum of all even numbers in the array
j. Identify count of even numbers and odd numbers in the array.
k. Identify numbers which are divisible by 2 and 5.
Answer:
Find four elements a, b, c and d in an array such that a+b = c+d
Given an array of distinct integers, find if there are two pairs (a, b) and (c, d) such that a+b = c+d, and a, b, c and d are distinct elements. If there are multiple answers, then print any of them.
Example:
Input: {3, 4, 7, 1, 2, 9, 8}
Output: (3, 8) and (4, 7)
Explanation: 3+8 = 4+7
Input: {3, 4, 7, 1, 12, 9};
Output: (4, 12) and (7, 9)
Explanation: 4+12 = 7+9
Input: {65, 30, 7, 90, 1, 9, 8};
Output: No pairs found
Expected Time Complexity: O(n2)
Explanation:
I hope this helps u have a nice dayEaster Sunday is the first Sunday after the first full moon of spring. To compute the date, you can use this algorithm, invented by the mathematician Carl Friedrich Gauss in 1800:
1. Let y be the year (such as 1800 or 2001).
2. Divide y by 19 and call the remainder a. Ignore the quotient.
3. Divide y by 100 to get a quotient b and a remainder c.
4. Divide b by 4 to get a quotient d and a remainder e.
5. Divide 8 * b 13 by 25 to get a quotient g. Ignore the remainder.
6. Divide 19 * a b - d - g 15 by 30 to get a remainder h. Ignore the quotient.
7. Divide c by 4 to get a quotient j and a remainder k.
8. Divide a 11 * h by 319 to get a quotient m. Ignore the remainder.
9. Divide 2 * e 2 * j - k - h m 32 by 7 to get a remainder r. Ignore the quotient.
10. Divide h - m r 90 by 25 to get a quotient n. Ignore the remainder.
11. Divide h - m r n 19 by 32 to get a remainder p. Ignore the quotient.
Then Easter falls on day p of month n. For example, if y is 2001:
a = 6 h = 18 n = 4
b = 20, c = 1 j = 0, k = 1 p = 15
d = 5, e = 0 m = 0
g = 6 r = 6
Therefore, in 2001, Easter Sunday fell on April 15. Write a program that prompts the user for a year and prints out the month and day of Easter Sunday.
Part 1: Problem-Solving Phase
Using the Design Recipe, write each of the following for this problem:
Contract
Purpose Statement
Examples, making sure to include counter-examples
Algorithm (based on the above algorithm, completed with input/output steps)
Make sure to test your algorithm by hand with the examples to verify it before continuing to Part 2.
Part 2: Implementation Phase
Using Eclipse, write the Java program for the algorithm formulated in Part 1, and test your program with the examples from Part 1.
Make sure to incorporate your Contract, Purpose Statement and Examples as one or more comment blocks, and your Algorithm as line comments in your Java source code.
Answer:
The program written in Java without comment is as follows
import java.util.*;
public class MyClass {
public static void main(String args[]) {
Scanner input = new Scanner(System.in);
System.out.print("Year: ");
int y = input.nextInt();
int a = y%19;
System.out.println("a = "+a);
int b = y / 100;
System.out.println("b = "+b);
int c = y%100;
System.out.println("c = "+c);
int d = b / 4;
System.out.println("d = "+d);
int e = b%4;
System.out.println("e = "+e);
int g = (8 * b + 13)/25;
System.out.println("g = "+g);
int h = (19 * a + b - d - g + 15)%30;
System.out.println("h = "+h);
int j = c/4;
System.out.println("j = "+j);
int k = c%4;
System.out.println("k = "+k);
int m = (a + 11 * h)/319;
System.out.println("m = "+m);
int r = (2 * e + 2 * j - k - h + m + 32)%7;
System.out.println("r = "+r);
int n = (h - m + r + 90)/25;
System.out.println("n = "+n);
int p = (h - m + r + n + 19)%32;
System.out.println("p = "+p);
}
}
Explanation:
I've added the full source code as an attachment where I use comments to explain difficult lines
Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a characteristic is necessary for successful completion of the job? Answer by writing a paragraph of two to three sentences.
Employing someone based on gender is unlawful because, it is the skill which matters to get the required job done and skills are not based on gender. There is no evidence that this particular gender cannot do this job and this particular gender can do. Everyone who posses the required skillsets are eligible to get employed irrespective of gender.
===============================================
I tried my best
To win an election in Ghana, a presidential candidate must have 50% plus one of the total valid votes counted.assuming x and y are two presidential candidates for party manU and Chelsea respectively, write a program to request for the total valid votes counted,total valid vote for x and y should any of them obtain 50% plus one of the total valid votes counted that candidate should be declared as winner if none of them obtained the 50% plus one of the total valid votes counted. The program should request for a re-run of the election
Answer:
Total valid votes:
X:
Y:
if X + Y >= 50% + 1 of total valid votes
if X > Y
print "X is the winner!"
elif X < Y
print "Y is the winner!"
else
print "It's a tie!"
else
print "Re-run the election"
5.19 LAB: Countdown until matching digits
PYTHON: Write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.
Using the knowledge of computational language in python it is possible to write a code that write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical.
Writting the code:n = int(input())
if 20 <= n <= 98:
while n % 11 != 0:
print(n)
n -= 1
print(n)
else:
print("Input must be 20-98")
See more about python at brainly.com/question/18502436
#SPJ1
How many fnaf games did Scott Cawthon make?
Answer:
8 but he is making FNaF security breach
Explanation:
there is FNaF VR help wanted
Answer:
8 or 10
Explanation:
An electron is released from rest at a distance d=87 m from an infinite conducting plane. The electron will begin to move towards the plane due to charge induction in the plane. How long will it take for the electron to strike the plane?.
The time it takes for the electron to strike the plane depends on the speed at which it is travelling.
What is electron?Electron is an open-source framework created by GitHub that enables developers to build cross-platform desktop applications with HTML, CSS, and JavaScript. Electron is a powerful tool for creating native desktop applications for Windows, MacOS, and Linux operating systems.
This speed is determined by the electric field induced in the plane. As the electron approaches the plane, the electric field increases, accelerating the electron. This acceleration leads to the electron reaching a terminal velocity known as the saturation velocity.
The saturation velocity of the electron is given by:
V_sat = \sqrt{\frac{2qE_d}{m}}
Where q is the electron's charge (1.60x10^-19 C), E_d is the electric field in the plane (in V/m), and m is the mass of the electron (9.11x10^-31 kg).
Assuming the electric field in the plane is 1 V/m, the saturation velocity of the electron will be:
V_sat = \sqrt{\frac{2(1.60x10^{-19})(1)}{9.11x10^{-31}}} = 1.37x10^7 m/s
Therefore, it will take the electron a time of:
t = \frac{d}{V_sat} = \frac{87}{1.37x10^7} = 6.36x10^{-7} s
to reach the plane.
To learn more about electron
https://brainly.com/question/30169645
#SPJ1
Write some keywords about touchscreen
\({\huge{\underline{\bold{\mathbb{\blue{ANSWER}}}}}}\)
______________________________________
\({\hookrightarrow{Keywords}}\)
touchscreentouch inputmulti-touchgesturesstylusresistivecapacitivehaptic feedbacktouch latencytouch accuracytouch sensitivitytouch screen technologytouch screen interfacetouch screen displaytouch screen monitortouch screen laptoptouch screen phonewhat is the purpose of file extensions apex
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The extension apex stands for the Android Pony Express Package file.
It is a zipped compressed package file that Google and other Android device manufacturers use for distributing updates to low-level system libraries on Android devices. It contains security updates deployed to Android devices. For example, instead of waiting to publish a full system upgrade, a device manufacturer can update an individual library to apply a patch or add a system feature.
A. They execute mail merge options
B. They tell the operating system what kind of document you are creating
C.They set up files in a organized hierarchy
D. They run spelling checker and grammar checker
This help y’all figure it out easier? These are the options apex shows
#define DIRECTN 100
#define INDIRECT1 20
#define INDIRECT2 5
#define PTRBLOCKS 200
typedef struct {
filename[MAXFILELEN];
attributesType attributes; // file attributes
uint32 reference_count; // Number of hard links
uint64 size; // size of file
uint64 direct[DIRECTN]; // direct data blocks
uint64 indirect[INDIRECT1]; // single indirect blocks
uint64 indirect2[INDIRECT2]; // double indirect
} InodeType;
Single and double indirect inodes have the following structure:
typedef struct
{
uint64 block_ptr[PTRBLOCKS];
}
IndirectNodeType;
Required:
Assuming a block size of 0x1000 bytes, write pseudocode to return the block number associated with an offset of N bytes into the file.
Answer:
WOW! that does not look easy!
Explanation:
I wish i could help but i have no idea how to do that lol
You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative
Answer:
The answer is:
A) Absolute cell reference
Explanation:
An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.
Hope this helped you!! Have a good day/night!!
Answer:
A is the right option absolute_________security may also be referred to as Information Technology security.
Answer:
Computer Security or Cybersecurity
Explanation:
Information Technology Security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data.
Make sure your animal_list.py program prints the following things, in this order:
The list of animals 1.0
The number of animals in the list 1.0
The number of dogs in the list 1.0
The list reversed 1.0
The list sorted alphabetically 1.0
The list of animals with “bear” added to the end 1.0
The list of animals with “lion” added at the beginning 1.0
The list of animals after “elephant” is removed 1.0
The bear being removed, and the list of animals with "bear" removed 1.0
The lion being removed, and the list of animals with "lion" removed
Need the code promise brainliest plus 100 points
Answer:#Animal List animals = ["monkey","dog","cat","elephant","armadillo"]print("These are the animals in the:\n",animals)print("The number of animals in the list:\n", len(animals))print("The number of dogs in the list:\n",animals.count("dog"))animals.reverse()print("The list reversed:\n",animals)animals.sort()print("Here's the list sorted alphabetically:\n",animals)animals.append("bear")print("The new list of animals:\n",animals)
Explanation: