Answer:Python's built-in library of functions allows programmers to import pre-written applications.
Explanation:
Answer: Analyze and document the requirements for building the app
Explanation: I took a quiz with that question and guessed and got it right. Other than that, I got nothing
who invented napier bone and when
Answer:
Inventor : John Napier in Year 1617
Explanation:
He was also the inventor of logarithms (which was invented to aid calculation known as 'Napier's Bones' in 1617.
Answer:
John Napier in 1617
Explanation:
Napier bones is a calculating device consisting of a set of graduated rods, that is used for multiplication and division, and is based on logarithms.
Write a paragraph suggesting at least five pieces of hardware that Maisy should consider purchasing. Make sure to justify why she needs each piece of equipment by describing what tasks they will perform. Also, explain how those different pieces of hardware will be installed.
Answer:
One piece of hardware Maisy should consider buying is the monitor for the visual display of the computer. She should also buy a mouse so she can select files so make her games. Another important piece of hardware she definitely should buy is a keyboard so she can type certain codes if needed. Maisy should get a disk drive so she can store her progress of the games she's making and not loose any important data. Conclusively, she very well should buy a sound card so she can create and hear the audio of her games.
Explanation:
It worked for me, so hopefully it worked for u too.
What two factors increase the effectiveness of a disinfectant on microorganisms?
- Concentration of disinfectant
- Time of exposure
- Material used to apply disinfectant
- Corrosiveness of the disinfectant
The two factors that increase the effectiveness of a disinfectant on microorganisms are the concentration of the disinfectant and the time of exposure.
The concentration of the disinfectant refers to the amount of the disinfectant present in the solution used for disinfection. Higher concentrations of the disinfectant can effectively kill a larger number of microorganisms. The time of exposure refers to the amount of time that the disinfectant is in contact with the microorganisms. Longer exposure times can ensure that all microorganisms are effectively killed. The material used to apply the disinfectant and the corrosiveness of the disinfectant can also have an impact on the effectiveness of the disinfectant, but they are not the primary factors that increase effectiveness.
learn more about disinfectant on microorganisms here:
https://brainly.com/question/30439973
#SPJ11
Authentication is concerned with determining _______.
Authentication can be described as the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology serves us to access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.
There are three basic kind of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.
You can learn more about authentication at https://brainly.com/question/28398310
#SPJ4
You learned that you can use the tags to insert a link to another webpage. One problem that webpage developers face is that, after a time, links may no longer work. Can you think of ways that you can avoid broken links?
Answer:
Create hyperlinks instead
Explanation:
What will be assigned to the variable s_string after the following code executes? special = '1357 country ln.' s_string = special[ :4] '7' 5 '1357' '7 country ln.'
Answer:
1357
Explanation:
s_string = special[ :4]
"[:4]" means the first character up to the third character
what is a goal of vulnerability testing?bypassing controlsdocumenting the lack of security control or misconfigurationexploiting vulnerabilitiesidentifying threats
The goal of vulnerability testing is to identify potential security weaknesses in a system or network before they can be exploited by malicious attackers. This process involves a thorough analysis of the system or network to identify any vulnerabilities or weaknesses that may exist.
One important goal of vulnerability testing is to document the lack of security controls or misconfigurations that may exist within the system. This documentation helps to identify areas that require improvement and allows for the implementation of additional security controls to better protect the system.
Another goal of vulnerability testing is to identify threats that may exist within the system. By identifying potential threats, organizations can take proactive steps to mitigate them and prevent potential attacks from occurring.
In addition, vulnerability testing may involve attempts to exploit vulnerabilities in the system. This process helps to determine the severity of the vulnerability and allows for the development of appropriate remediation strategies.
Overall, the primary goal of vulnerability testing is to ensure that organizations can maintain the highest level of security possible, by identifying and addressing potential weaknesses before they can be exploited by attackers.
For such more question on mitigate
https://brainly.com/question/3253852
#SPJ11
In Python: Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.
Sample Run:
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3
Answer:
python
Explanation:
list_of_numbers = []
count = 0
while count < 6:
added_number = int(input("Enter a number: "))
list_of_numbers.append(added_number)
list_of_numbers.sort()
print(f"Smallest: {list_of_numbers[0]}")
count += 1
Which type of memory has an essentially unlimited storage capacity
Cloud Storage is a type of memory that has an essentially unlimited storage capacity.
What is Cloud Storage?Cloud storage is a model of data storage in which digital data is stored in logical pools. The physical storage spans multiple servers (sometimes in multiple locations), and the physical environment is typically owned and managed by a hosting company.
This type of storage allows users to store data on a remote server, which is maintained and managed by a cloud computing provider. This type of memory is much more secure than traditional storage methods, and it also provides users with more flexibility and scalability. This type of storage also has no physical limits on the amount of data that can be stored, and it’s often much more cost-effective than other types of storage.
To learn more about Cloud Storage
https://brainly.com/question/26972068
#SPJ4
the drive: FIGURE 7-28 Synchrono belt drive for Example Problem 7-3 20pts) Looking at figure 7-28 the following is known about this new system. The driver sprocket is a P24-8MGT-30 and is attached to a Synchronous AC Motor with a nominal RPM of 1750rpm. The driven sprocket should turn about 850RPM and is attached to a Boring Mill that will run about 12 hours per day. The sprocket should have a center distance as close to 20" without going over. a. What sprocket should be used for the driver sprocket 2 b. What is a the number of teeth and pitch diameter of both sprockets What is the RPM of the driven sprocket
The RPM of the driven sprocket is calculated as 10.4kp. RPM stands for reels per nanosecond and is also shortened rpm. The cycle of the RPM is calculated as 174.9.
The calculations are attached in the image below:
This is a unit which describes how numerous times an object completes a cycle in a nanosecond. This cycle can be anything, the pistons in a internal combustion machine repeating their stir or a wind turbine spinning formerly all the way around.
Utmost wind turbines try to spin at about 15 RPM, and gearing is used to keep it at that speed. Gearing is also used with the crankshaft of a vehicle in order to keep the RPM reading in a range( generally 2000- 3000 RPM). Some racing motorcycles will reach further than 20,000 RPM.
Learn more about RPM cycle here:
https://brainly.com/question/32815240
#SPJ4
Type the correct answer in the box. Spell all words correctly.
Natasha came across a website that had a building image, where each window in the building was clickable. She clicked on one of the windows,
Upon clicking the link information was sent to another computer. This computer processed the information and returned the appropriate page
about a window. Which attribute is used in this case to identify the type of image map?
The
attribute is used in this case to identify the type of image map.
Answer:
Redirection
Explanation:
This is something called redirection, you can sometimes get paid for it, or just some sort of reward, sometimes even a virus scanner.
Answer:
The ismap attribute is used in this case to identify the type of image map.
Explanation:
Using ismap indicates to your browser that the link is processed by another computer (server). Once the server processes the information about the link, it returns the appropriate page.
Help! ASAP! 1 Question.........°○°
Answer: I think D)?
Explanation: Or B)
Here is one way to reduce hazards to human health.Use fewer harmful chemicals,or use chemicals in a more responsible way.
Answer:
The answer is below
Explanation:
A hazard is an agent that can cause severe damage to the health of people. property or the environment at large when being exposed to the hazard.
Here are some ways in which hazard can be prevented:
Make sure that the required personal protective equipment are worn at all times.Chemicals should be used and disposed in a safe manner.There should be barriers between people and barriers such as radiation.Machines should be used to lift heavy equipment.Can someone please tell me how to save a screenshot on windows 10?
I have to do this assignment for tec and I don't understand how to do it.
PLEASE DON'T USE ME FOR POINTS!! Please and Thank you!
Answer:
u just press windows botton and shift and s lol
Explanation:
u can also search up this by tyoing "How to take a screenshot on windows 10" if this does not work.
:)
i. Suresh participated in a 100m race and won a prize. This motivated him to go for practice every morning. What type
of Motivation is this?
a) None of these
b) Internal
c) Intermediate
d) External
ii. Rekha gets up at 5 am and goes for her dance classes. Then she comes home and finishes her homework before going
to school. This an example of ________.
a) Self Motivation
b) None of these
c) Self Awareness
d) Self Regulation
iii. The file name and file name extension are separated by a ________.
a) semicolon
b) none of these
c) period
d) comma
The 60-watt light bulb has a 400 hour life expectency how much will it cost to operate during its time
Answer:
$2.40
Explanation:
the unit electricity bill is kilo watt hour.
The 60-watt light bulb has a 400 hour life expectency means it will consume
60×400/1000 = 24 KWh units of electricity. Let us suppose each unit of electricity costs is 10 cents.
Then 24×10 = 240 cents = $2.40
Suppose you have four 1500 MB hard drives plus one 2.5 GB flash drive. How much GB of capacity is this overall?
1500mb = 1.5 gb
so four 1500mb hard drives are 1.5 x 4 = 6gb
so the total capacity is 6 + 2.5 = 8.5 gb
What are principles of an API test design?
Answer:
The five most important principles of an API test design are:
Setup: Create objects, start services, initialize data, etc
Execution: Steps to apply API or the scenario, including logging
Verification: Oracles to evaluate the result of the execution
Reporting: Pass, failed or blocked
Clean up: Pre-test state
One opportunity cot familie face i the time value of money. What doe thi refer to?
A.
the income one get from a part-time job
B.
the time pent with loved one
C.
the change in interet rate over a period of time
D.
the monetary increae found in earning intere
The given statement, "One opportunity cost that families face is the time value of money," refers to the income obtained from a part-time job. As a result, Option A is correct.
What exactly is an opportunity cost?
The concept of opportunity cost allows one to choose the best option from among those available. It allows us to make the best use of all available resources while maximising economic gains.
The opportunity cost is the profit lost when one option is chosen over another. The concept merely serves as a reminder to consider all viable options before making a decision.
When a company, for example, follows a specific business plan without first weighing the pros and cons of other options, they may overlook the opportunity costs involved and the possibility that they could have achieved even greater success had they taken a different path.
As a result, Option A is correct.
To learn more about opportunity cost, visit: https://brainly.com/question/14799130
#SPJ4
pls help
Question 2 (1 point)
True or false: when you use someone's copyrighted work in something you are
selling, you only have to cite them.
The given statement of copyrighted work is false.
What do you mean by copyright?
A copyright is a type of intellectual property that grants the owner the exclusive right to copy, distribute, adapt, display, and perform a creative work for a specific period of time. The creative work could be literary, artistic, educational, or musical in nature. The purpose of copyright is to protect the original expression of an idea in the form of a creative work, not the idea itself. A copyright is subject to public interest limitations, such as the fair use doctrine in the United States.
When you use someone's copyrighted work in something you are selling, you must get their permission first.
To learn more about copyright
https://brainly.com/question/357686
#SPJ13
what is a control flow statement? a programming statement that changes the order in which lines of code in a program are run a programming statement that sets up an if-then condition a line of code that counts down the number of times a loop should iterate a line of code that sets up a timer for how long a loop should iterate
A control flow statement is option A: programming statement that changes the order in which lines of code in a program are run.
What is control statement programming?The sequence in which a script's statements are executed by the computer is known as the control flow. Unless the computer comes across the (very common) structures that affect the control flow, such as conditionals and loops, code is executed from the first line in the file to the last line.
Control flow diagrams do Permit the programmer to alter the program's flow through the CPU. Halt. The simplest control flow statement instructs the program to stop running right away.
Therefore, Control statements are those that alter the order in which statements are executed. For instance, statements like If, If-else, Switch-Case, and while-do. Control statements within a program are those the flow of statement execution.
Learn more about control flow statement from
https://brainly.com/question/12908248
#SPJ1
What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digital cameras C. A game like Marco Polo on the Internet D. A way of tracking criminals using GPS
Answer:
C. A game like Marco Polo on the Internet
Explanation:
A digital scavenger hunt is a name for a scavenger hunt game originally made for mobile phones and works on any operating system or mobile platforms such as Android or iOS.
The game comprises of different missions in which players are expected to complete one after the other.
Hence, in this case, the correct answer is "A game like Marco Polo on the Internet."
ask the user to enter a number to add to the list. append the number to the list if the number does not already exist in the list. if the number already exists in the list notify the user.
In order to append a number to a list if the number does not already exist in the list, you can use an if statement and the "in" operator in Python. Here is an example code that asks the user to enter a number and appends it to the list if it is not already in the list:
```
list = [1, 2, 3, 4, 5] # create a list to add to
num = int(input("Enter a number to add to the list: ")) # ask user to enter a number
if num not in list: # check if the number is already in the list
list.append(num) # if not, append it to the list
print(f"{num} has been added to the list.")
else:
print(f"{num} is already in the list.")
```
The code first creates a list called "list" with some numbers already in it. Then it asks the user to enter a number using the input() function and stores it in the variable "num". The if statement checks if the number is not already in the list using the "not in" operator.
If the number is not in the list, it is appended to the list using the append() method and a message is printed to notify the user that the number has been added to the list. If the number is already in the list, a different message is printed to notify the user that the number is already in the list.
To know more about Python visit:
https://brainly.com/question/30391554
#SPJ11
Help !! -- Please ....................................................................................................
Answer:
1. Prompt user for input and get length and store in L
2. Prompt user for input and get width and store in W
3. Perform calculation p = 2LW and print out result
now you store, on the device, a file that is 7 file-blocks long (i.e. it uses 7 pages, not blocks!). (now you appreciate the terminology mess that the nand flash folks created!) you do this by writing to fileblock 0, then to fileblock 1, up to fileblock 6. you repeat the same operation (i.e., writing to fileblock 0 to fileblock 6) twice more. how many program operations are needed to do this? g
Assuming that each file-block can be programmed individually, writing to the 7 file-blocks three times requires a total of 21 programme operations (7 file-blocks x 3 writes = 21 programme operations).
You must write to each file-block in order to store a file that is 7 file-blocks long. You will need to do 7 programme operations to write to each of the 7 file-blocks for the first time, assuming that each file-block can be individually programmed. The same 7 programme operations must be completed for each of the three writes in order to repeat the procedure twice again, for a total of 21 programme operations (7 file-blocks x 3 writes). This implies that maintaining or wiping the NAND flash memory won't necessitate any additional overhead activities.
Learn more about NAND Flash: Program here.
https://brainly.com/question/13263511
#SPJ11
To store a file that is 7 file-blocks long on the device, you need to perform the following steps: (1)Write to file-block 0 (2)Write to file-block 1 (3)Write to file-block 2 (4)Write to file-block 3 (5)Write to file-block 4 (6)Write to file-block 5 (7)Write to file-block 6
Since you need to repeat this operation twice more, you will need to perform these 7 steps three times in total. Therefore, to store the file and complete the entire process, you will need to perform 7 x 3 = 21 program operations. A file-block is a file system structure in which the state of an open file is maintained.
Learn more about file-blocks : https://brainly.com/question/30530462
#SPJ11
Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.
Answer:
I am using normally using conditions it will suit for all programming language
Explanation:
if(minimum){
hours=10
}
Which of the following is NOT a process of the data management system?
Multiple Choice acquire,distribute,store,summarize
The question asks to identify which of the given options is NOT a process of the data management system. A data management system involves various processes to effectively handle and organize data.
Let's analyze each option to determine which one is NOT a process of the data management system.
(a) Data storage: This process involves storing data in a structured manner, typically using databases or file systems. It ensures data persistence and provides mechanisms for efficient data retrieval and update operations. Data storage is indeed a core process of data management systems.
(b) Data analysis: This process involves extracting insights and patterns from data through various techniques such as statistical analysis, data mining, and machine learning. Data analysis helps in making informed decisions and identifying trends and correlations within the data. It is an essential process of data management systems.
(c) Data visualization: This process focuses on presenting data in a visual format, such as charts, graphs, and dashboards, to facilitate easy understanding and interpretation of data. Data visualization helps in conveying complex information in a visually appealing and intuitive manner. It is also an important process in data management systems.
(d) Data encryption: This process involves securing data by converting it into an unreadable form using cryptographic algorithms. Data encryption ensures data confidentiality and protection against unauthorized access. While data encryption is crucial for data security, it is not inherently a process of the data management system itself. It is a complementary process that is often integrated into data management systems to enhance data protection.
Therefore, the correct answer is (d) Data encryption, as it is not a direct process of the data management system, but rather a security measure applied to protect the data within the system.
Learn more about data retrieval here:- brainly.com/question/30299992
#SPJ11
What is a named bit of programming instructions?
Answer:
Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
Yara needs to provide step-by-step instructions to her staff on how to use a new system for
conducting performance reviews. What is the best tool for communicating this information?
A) Spreadsheet
B) Email
C) Direct messaging
D) Slides
Answer:
D) Slides
Explanation:
A slide is exactly one page of presentation commonly used in PowerPoint. It is usually shown via a series of image slides on a projected screen.
This is the best tool Yara needs to provide step-by-step instructions to her staff on how to use a new system for conducting performance reviews.
Slides would be very helpful as they would show the steps one at a time to the members of Yara's staff so they can learn better and faster.
Which of the following is the fastest computer processing speed?
Group of answer choices
bytes
megahertz
megabytes
gigahertz