Answer:
5 indicators of happiness that might surprise you · Happiness is deep · Happy is busy · Can't buy me happiness · The happiness gene · No regrets.
Explanation:
I have a hw on convert to binary - functions but i recieved a message saying 'Could be your program never finished, due to an infinite loop, infinite recursion,
waiting for input, or other possibilities.'
my code:
import math
def integer_to_reverse_binary(integer_value):
remainder = ""
while integer_value>=1:
remainder+=str(integer_value % 2)
integer_value=math.floor(integer_value/2)
reverse_string(remainder)
def reverse_string(input_string):
binaryOutput=""
for i in range(len(input_string)-1,-1,-1):
binaryOutput = binaryOutput + input_string[i]
print(binaryOutput)
integer_value = int(input("Enter a Number : "))
integer_to_reverse_binary(integer_value)
The error message that you received means that the program ran into an infinite loop, recursion or is waiting for input. To avoid this, you will need to check your program for the infinite loop, recursion, or check if you have entered an input for the program.
Also, here are some issues with your code that need fixing to work as expected:
You forgot to add a return statement in the `integer_to_reverse_binary()` function. So you can't pass the output from that function to any other function.
In the `integer_to_reverse_binary()` function, you have to call the `reverse_string()` function. Currently, you have only mentioned its name but didn't call it.
In the `reverse_string()` function, you have to add a return statement to return the binaryOutput instead of just printing it.
To know more about program visit
https://brainly.com/question/30613605
#SPJ11
A user receives an email containing a co-workers birth date and social security number. The email was not requested and it had not been encrypted when sent. What policy does the information in the email violate
Answer:
PII
Explanation:
The information in the email violates the PII. That is Personally identifiable information. PII, are nothing but any data that could potentially be used to identify a person. Examples of which can be a full name, Social Security number, driver's license number, bank account number, passport number, and email address, etc.
any of my friends can you answer me plz?
Answer:
God is always your friend mate
Explanation:
what is robotic technology
Answer:
according to britannica :
"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"
Explanation:
A friend tells you that they cannot afford to pay for the standardized tests that need to be taken to apply for college and military academies. How could you respond?
Answer:
you could respond by giving your money to them.
Explanation:
Josh wants to convey his best wishes to johnathin for a meeting schedualed later diring the day. Which business documented would be most approperiate in his senario
Answer:
C. email
Explanation:
The Email should be termed as electronic mail which is to be used to convey a message in an instant seconds
It is to be expressed in a formal way of communicating any message, notice, The important thing, etc
It is a quick, easy to use and most convenient way to send a message
Here in the given situation, since John wants to convey the best wishes for a meeting that scheduled later so here the email is the best and appropriate way to communicated as it is business documented also
write a paragraph on plastic and pollution within 100 words
Plastic is everywhere nowadays. People are using it endlessly just for their comfort. However, no one realizes how it is harming our planet. We need to become aware of the consequences so that we can stop plastic pollution. Kids should be taught from their childhood to avoid using plastic. Similarly, adults must check each other on the same. In addition, the government must take stringent measures to stop plastic pollution before it gets too late.
Plastic has become one of the most used substances. It is seen everywhere these days, from supermarkets to common households. Why is that? Why is the use of plastic on the rise instead of diminishing? The main reason is that plastic is very cheap. It costs lesser than other alternatives like paper and cloth. This is why it is so common.
Secondly, it is very easy to use. Plastic can be used for almost anything either liquid or solid. Moreover, it comes in different forms which we can easily mold.
Furthermore, we see that plastic is a non-biodegradable material. It does not leave the face of the Earth. We cannot dissolve plastic in land or water, it remains forever. Thus, more and more use of plastic means more plastic which won’t get dissolved. Thus, the uprise of plastic pollution is happening at a very rapid rate.
Most importantly, plastic pollution harms the Marine life. The plastic litter in the water is mistaken for food by the aquatic animals. They eat it and die eventually. For instance, a dolphin died due to a plastic ring stuck in its mouth. It couldn’t open its mouth due to that and died of starvation. Thus, we see how innocent animals are dying because of plastic pollution.
In short, we see how plastic pollution is ruining everyone’s life on earth. We must take major steps to prevent it. We must use alternatives like cloth bags and paper bags instead of plastic bags. If we are purchasing plastic, we must reuse it. We must avoid drinking bottled water which contributes largely to plastic pollution. The government must put a plastic ban on the use of plastic. All this can prevent plastic pollution to a large extent.
Answer:
Plastic is everywhere nowadays. People are using it endlessly just for their comfort. However, no one realizes how it is harming our planet. We need to become aware of the consequences so that we can stop plastic pollution. Kids should be taught from their childhood to avoid using plastic. Similarly, adults must check each other on the same. In addition, the government must take stringent measures to stop plastic pollution before it gets too late.
Uprise of Plastic Pollution
Plastic has become one of the most used substances. It is seen everywhere these days, from supermarkets to common households. Why is that? Why is the use of plastic on the rise instead of diminishing? The main reason is that plastic is very cheap. It costs lesser than other alternatives like paper and cloth. This is why it is so common.
Secondly, it is very easy to use. Plastic can be used for almost anything either liquid or solid. Moreover, it comes in different forms which we can easily mold.
Furthermore, we see that plastic is a non-biodegradable material. It does not leave the face of the Earth. We cannot dissolve plastic in land or water, it remains forever. Thus, more and more use of plastic means more plastic which won’t get dissolved. Thus, the uprise of plastic pollution is happening at a very rapid rate.
How can you create a safe and secure password? Choose a password unassociated with your personal history. Choose the same password for every account you open. Choose a password consisting entirely of numbers. Choose two passwords and combine them into one.
Answer:
Choose a password unassociated with your personal history.
Explanation:
xio: fatal io error 17 (file exists) on x server "localhost:10.0" after 388 requests (388 known processed) with 0 events remaining.
The error message "xio: fatal io error 17 (file exists) on x server 'localhost:10.0' after 388 requests (388 known processed) with 0 events remaining" indicates a fatal input/output error with code 17 occurring on the X server. It suggests that there is a file conflict or that a file being created or accessed by the X server already exists.
This error commonly occurs when there is a problem with file permissions or when there is a leftover file from a previous session. The X server is unable to create or access the necessary file due to the existing file with the same name.
To troubleshoot this issue, you can try the following steps:
1. Restart the X server: Restarting the X server can help clear any lingering file conflicts or other issues. Log out of the session and log back in, or try restarting your computer.
2. Check file permissions: Ensure that the file or directory involved in the error has the correct permissions. Make sure the user running the X server has the necessary permissions to create or modify the file.
3. Remove conflicting files: If you know the specific file causing the conflict, you can manually remove it. Be cautious when deleting files, as removing critical system files can lead to further problems.
4. Clear X server caches: Clearing the cache files associated with the X server might help resolve the error. The location of these cache files can vary depending on your operating system and distribution.
If the error persists, it may be necessary to delve deeper into the specific configuration and logs of your X server or seek assistance from technical support or relevant online communities.
Learn more about server here:
https://brainly.com/question/30168195
#SPJ11
the expression "java " + 1 + 2 + 3 evaluates to ________.
The expression "java " + 1 + 2 + 3 evaluates to "java 123". In this expression, the addition operator is used to concatenate the given values.
The string "java " is concatenated with the integer 1, resulting in "java 1". Then, the integer 2 is converted into a string and concatenated, resulting in "java 12". Finally, the integer 3 is converted into a string and concatenated, resulting in the final string "java 123".in Java, the expression "java " + 1 + 2 + 3 evaluates to "java 123" because of how string concatenation works in Java.
When the expression is evaluated, it starts with the string "java ", followed by the concatenation operator (+) and the integer 1. Since one operand is a string, the integer 1 is automatically converted to a string and concatenated with "java ", resulting in "java 1".
Next, the concatenation operator is applied again with the resulting string "java 1" and the integer 2. Again, the integer is converted to a string and concatenated, resulting in "java 12". finally, the concatenation operator is applied once more with "java 12" and the integer 3. The integer is converted to a string and concatenated, giving us the final result of "java 123".
Learn more about java here:
https://brainly.com/question/12978370
#SPJ11
Write the correct word to complete the sentence:
According to ................., Bolster the Giant terrorised the people of Cornwall.
Answer:
Legend
Explanation:
In English language, a legend can be defined as a traditional narrative or story that is written about a particular person or past events and it's likely to either be a myth or historical facts. Thus, a legend is sometimes an unrealistic story or narration that describe a particular person or an extraordinary event that occured in the past. Also, it's a story about a particular figure, past human events or actions whose origin is unknown, unproven and undocumented in real history
Additionally, the word "legend" was derived from the Latin word "legendus" which simply means something which should be read.
Hence, the most appropriate word to complete the sentence is a legend because there are no proven and documented or written records about how Bolster the Giant terrorised the people of Cornwall. Thus, the complete mythical sentence is then written as;
"According to legend, Bolster the Giant terrorised the people of Cornwall."
data may be sorted in a table datasheet, a form, and a ____.
Data may be sorted in a table datasheet, a form, and a report.
In Microsoft Access, a report is a database object used to organize and present data in an organized manner. Reports are often used to present a summarized view of the data in a database. In a report, you can group and summarize data, perform calculations, and format the data to make it easier to read. A report can be based on a table, query, or a combination of tables and queries. Reports are customizable and allow you to control the layout, font, color, and other formatting options to meet your specific needs.
You can learn more about Microsoft Access at
https://brainly.com/question/24643423
#SPJ11
write a cpp program that takes hello , by using function that receives a string of character (name) and prints on screen the hello message
In a sample CPP program that takes "hello" and a character name as input using a function and prints out the hello message on the screen:
```
#include
using namespace std;
void printHello(string name) {
cout << "Hello " << name << "!" << endl;
}
int main() {
string name;
cout << "Please enter your name: ";
cin >> name;
printHello(name);
return 0;
}
```
In this program, we first define a function `printHello` that takes a string parameter called `name`. The function simply prints out the hello message with the name on the screen.
In the `main()` function, we first declare a string variable called `name` and prompt the user to enter their name using the `cout` and `cin` statements. Then, we pass this name to the `printHello` function to print out the hello message with the name on the screen.
To know more about cpp program please check the following link
https://brainly.com/question/13264456
#SPJ11
The algorithm below is used to find the largest element in a list of numbers.
By modifying one of the lines in the program it is possible to make the algorithm find the SMALLEST element. Which line would need to be modified and how?
The line that can be modified in the algorithm to return the smallest of the list is line 04
From the question, we understand that:
The algorithm returns the largest of all elements in a listThe above action is executed on line 04
To change the function of the algorithm to return the smallest, line 04 must be modified as follows:
IF (num < target)
Hence, the line that can be modified in the algorithm to return the smallest of the list is line 04
Read more about algorithms at:
https://brainly.com/question/24793921
which type of ipv6 address is not routable and used only for communication on a single subnet
The type of IPv6 address that is not routable and used only for communication on a single subnet is called a link-local address. These addresses are automatically assigned to network interfaces when they are initialized and are used for communication between devices on the same local network segment.
Link-local addresses are not routable, meaning they cannot be used for communication outside of the local network or subnet.
These addresses are automatically assigned to network interfaces when they are initialized and are used for communication between devices on the same local network segment.
Link-local addresses always start with the prefix "fe80::/10."
They are not globally unique, which means multiple devices within different local networks can have the same link-local address without causing conflicts.
Link-local addresses are typically generated automatically by the devices and do not require manual configuration.
In summary, link-local addresses in IPv6 are specific to a single subnet and are not routable, making them suitable for communication within a local network segment.
Learn more about link-local address:
https://brainly.com/question/31237108
#SPJ11
_______ codes are supplemental codes used to help researchers collect data, track illness and disease, and measure quality of care
Answer:
Category II CPT codes are supplemental tracking codes, also referred to as performance measurement codes. These numeric alpha codes [e.g., 2029F: complete physical skin exam performed] are used to collect data related to quality of care.
Sorry if it’s hard to read zoom in will give the thing if right
Explanation:
1. the intensities of each color beam
2. -
3. False
4. red
hope it helps!
PLS i need help - programming challenge
Write an algorithm that:
· Ask the user to input how many GCSE’s they have.
· They should then be allowed to enter a result for each GCSE grade.
· The computer should work out how many points they have got (9=9, 8=8, 7=7 etc).
· If their score is 40 or over it should output ‘You can go to the sixth form’
· If they their score between 35 and 39 it should output ‘A discussion is needed’
· Otherwise it should say ‘Sorry not enough points.’
This is written in python 3, so you need to have python and rename the file to GCSE.py
It runs in vanilla python, no addons required.
1. Explain the difference between a web browser and a search engine. (2 points)
2. What is indexing? How does it make search engines work more efficiently? (2 points)
3. What is a web directory? What are the key differences between web directories and search engines? (2 points)
4. What are page-ranking algorithms? Why are they so important? (2 points)
5. What can you look for on a website to indicate that the information it presents is reliable? (2 points)
Analyze (14 points)
Analyze various methods of conducting Internet research.
1. Magda is on a wellness committee at her company. As a member of the committee, she is planning to give a presentation to her coworkers about the flu in preparation for the upcoming cold and flu season. She wants to do some research on the history, diagnosis, and treatment of the flu.
a) Help her identify some effective keyword and Boolean search strategies by filling out the table below. (5 points)
Strategy What It Does Example
Quotation Marks
“flu vaccines”
Plus sign ( + )
flu+vaccine+history
Pipe symbol (|)
flu vaccine|antibiotics
OR
flu vaccine OR antibiotics
NOT
flu vaccine NOT availability
b) Magda was able to find the following sources when she searched "flu diagnosis" using her favorite search engine: Help her determine whether these sources are accurate, relevant, and valid by filling out the table below. (9 points)
Accurate? Relevant? Valid?
First website
Second website
Third website
Synthesize (16 points)
Apply methods of effective Internet search strategies.
Use your favorite search engine to research one of topics below.
Renewable energy
The Ebola virus
The Human Genome Project
1. List the keywords you typed in to your search engine. Then list the first three results. (3 points)
2. Now, use a different search engine and type in the same keyword. Did you get the same results as your first search? List the first three results from this search. (3 points)
3. You would like to narrow your search on this topic.
a) You want to look for information on this topic's history, but you don't want to include any information that pre-dates 1975. What Boolean operator would you use? (2 points)
b) You want to look up information on this topic as it relates to the U.S. government. What Boolean operator would you use? (2 points)
4. From all of your cumulative search results, list three reliable sources that you've found.
a) Cite these sources in MLA format. (3 points)
b) How can you confirm that these sites provide information that is accurate, relevant, and valid? (3 points)
Answer:
1. A browser is used to access websites and web pages whereas a search engine is used to search for particular information.
2. Indexing is the process by which search engines organise information before a search to enable super-fast responses to queries.
3.Search engines are used to find specialized data rapidly whereas web directory is used to find a list of different sites.
4. The working behind the PageRank algorithm is that a page with a large number of in- links(a link from an important page) to it, then its outgoing links to other pages also become important. It gives more importance to back links of a web page and propagates the ranking through links.
5. Look for Sites from Established Institutions 2. Look for Sites with Expertise 3. Steer Clear of Commercial Sites 4. Beware of Bias 5. Check the Date 6. Consider the Site's Look 7. Avoid Anonymous Authors 8. Check the Links
Explanation:
Complete each statement by choosing the correct answer from the drop-down menu.
The data type can hold whole positive and negative numbers.
The terms TRUE and FALSE are usually associated with data types.
Values such as 9.0, –1245.1, and 0.777 are examples of data types.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct matching answers for this question are given below. In this question, it is asked to identify the data type of the given scenario.
Integer short and integer long data type:
These data types can hold whole positive and negative numbers. however, you can also store positive and negative values in float and double data type also.
Boolean data type:
Boolean data type usually stores true or false values such as yer or no, true or false etc. It stores binary values i.e 1 or 0.
Float and Double data type: float and double data type can store positive and negative numbers with decimals. But, the float data type can store 4 bytes of data and sufficient for storing 7 decimal digits. while double data type has a size of 8 bytes of data and sufficient for storing 15 decimal digits.
However, for the given scenario in the question, the float data type can accomodate these values easily.
Answer: Integer, Boolean, Floating-Point!
Explanation:
I did it edge 2020
What is a closed source operating system?
Answer:
Answer- use code that is proprietary and kept secret to prevent its use by other entities
Explanation:
Explanation- Closed-source operating systems use code that is proprietary and kept secret to prevent its use by other entities. Traditionally, they are sold for a profit. Open-source operating systems use code that is freely-distributed and available to anyone to use, even for commercial purposes.
Answer:
closed-source operating systems use code that is proprietary and kept secret to prevent its use by other entities.
Explanation:
ttyyy!!
Explain why the receptionist responded as indicated in the following scenario.
Situation: Jim and Roger are meeting with the executives of the company. They are both wearing blue jeans, polo shirts, and ties. As they walk past the receptionist, he stops them and reminds them the dress code is white collar.
How to write a program that work for this task output
all possible test cases
5 The Second Task (20 marks) We will now encode the rules. Write a program that accepts the colour of the cell the ant is currently at, as well as its position and direction it is facing, and computes
To create a program, the program should accept the color of the cell, the ant's position, and its facing direction. It will then compute the appropriate action based on the given inputs.
This program will need to handle all possible test cases, considering different combinations of color, position, and direction, to accurately encode the rules for the ant's movement.
To write the program, start by defining the possible colors, positions, and directions that the ant can have. Consider creating appropriate data structures or variables to store this information. Next, implement the logic for encoding the rules. This could involve using conditional statements, such as if-else or switch-case, to determine the appropriate action based on the given inputs.
For each possible test case, ensure that the program handles all combinations of color, position, and direction. Consider using loops or nested loops to iterate over the possible values and test the program's functionality. It may be helpful to create test cases that cover various scenarios to validate the correctness of the encoded rules.
The program should output the computed action based on the provided inputs. This could be in the form of a message or a specific code representing the action.
By carefully considering all possible test cases and implementing the appropriate logic, the program will be able to accurately encode the rules for the ant's movement.
Learn more about program here
brainly.com/question/14368396
#SPJ11
Let's play Silly Sentences! [name] was planning a dream vacation to [place]. [name] was especially looking forward to trying the local cuisine, including [adjective 1] [food 1] and [food 2]. [name] will have to practice the language [adverb] to make it easier to [verb] with people. [name] has a long list of sights to see, including the [noun] museum and the [adjective 2] park.
Answer:
[Gibby] was planning a dream vacation to [Hawaii]. [Gibby] was especially looking forward to trying the local cuisine, including [running] [pizza] and [spaghetti]. [Gibby] will have to practice the language [sweetly] to make it easier to [leave] with people. [Gibby] has a long list of sights to see, including the [leaning tower of piza] museum and the [chubby] park.
Does anyone know? If you do please answer.
Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery. True or false
Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery is a true statement.
How is IoT used in automation?The Internet of Things (IoT) is known to be one of the main driving factor that is said to have brought a lot of power which has helped in the enabling of the growth as well as the development of industrial automation systems.
Note that IoT that is said to be used along with computer automation controls can be able to aid one to streamline industrial systems as well as improve data automation, with the aim of deleting errors and inefficiencies of people.
Therefore, Facility automation uses internet of things (iot) to integrate automation into business functions to reduce reliance on machinery is a true statement.
Learn more about internet of things from
https://brainly.com/question/19995128
#SPJ1
PLEASE HELP Type the correct answer in the box. Spell all words correctly. Ross wants to add a graph from a text file format into his database. Which feature will enable him to add the graph in his database? Ross can use the______data feature to add the graph in his database.
Answer:
the answer to your problem is (insert)
Explanation:
Click Chart under the Illustrations group on the Insert tab.The Insert Chart dialogue box's arrows can be used to cycle through the various chart kinds.Click OK after selecting the type of chart you like.
What insert data feature to add the graph?Select Data by selecting with the right mouse button on the chart. The Select Data Source dialogue box appears on the worksheet where the chart's source data are placed.
Click in the worksheet, then click and drag to choose all the data you wish to use for the chart, including the new data series, while keeping the dialogue box open.
The Insert SQL command is used to add new records or data to tables. Because it is used to alter database data, it is seen as falling within the umbrella of statements known as Data Manipulation Language (DML).
Therefore, insert data feature to add the graph in his database.
Learn more about insert data here:
https://brainly.com/question/14331259
#SPJ2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
23 24
Computing
L2 - Review the sentences below and fill in the blanks using the
list of words provided.
To connect together different devices, you need cables. The cables carry the messages sent between machines
communicating with one another. The most common type are called 'Ethernet cables'. The cable is made up of a
number of copper wires and has the ability to send data in_both directions.
A
connects a number of computers together within the same room or building. This means that each computer
does not need to have its own dedicated connection to every other computer in a network, which reduces the
number of needed.
A is often described as a powerful computer that provides services. One example of a service that it can
provide is shared access to such as text, images, sound, or
List of words: cables, server, files, video, hub, both
11
Click to add speaker notes
Answer: 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Explanation: x1
__ is a process of adding details to a model to make it less abstract.
• abstraction
• decomposition
• pattern recognition
• refinement
Answer:refinement
Explanation:
Answer:
refinement
Explanation: just checked
___ printers combine either inkjet or laser printing capabilities with scanning, photocopying, and faxing capabilities.
The type of printers that combine either inkjet or laser printing capabilities with scanning, photocopying, and faxing capabilities are called All-in-one printers.
What is an all-in-one printer?
All-in-one printers, also known as multifunction printers, are office devices that combine the features of a printer, scanner, copier, and sometimes a fax machine, into one machine. They are a great option for offices or home users who have limited space, as they save on space by combining the functions of multiple machines into one device. They can also be more cost-effective than purchasing each device separately.In addition to printing, all-in-one printers can scan and copy documents, and some models can also send and receive faxes. These printers come in different types such as inkjet and laser printers, depending on the model. They are designed to provide a variety of features and functionalities to meet the needs of users.
Learn more about All-in-one printers at https://brainly.com/question/29729075
#SPJ11