Answer:
1b True
1c True
1d True
...
Explanation:
This is how you evaluate an expression
8 <= (2+6) =>
8 <= 8
8 < 8 OR 8 == 8
false OR true
true
15==15
true
3 >= 3
3>3 OR 3==3
false OR true
true
etc...
Write a function called play_round that simulates two people drawing cards and comparing their values. High card wins. In the case of a tie, draw more cards. Repeat until someone wins the round. The function has two parameters: the name of player 1 and the name of player 2. It returns a string with format ' wins!'. For instance, if the winning player is named Rocket, return 'Rocket wins!'.
Answer:
Here you go, Change it however you'd like :)
Explanation:
import random as r
def play_round(p1, p2):
cards = [1,2,3,4,5,6,7,8,9,10,"J","Q","K","A"]
play1 = r.choice(cards)
play2 = r.choice(cards)
while play1 == play2:
play1 = r.choice(cards)
play2 = r.choice(cards)
if cards.index(play1) > cards.index(play2):
return f"{p1}'s Card: {play1}\n{p2}'s Card: {play2}\nThe Winner is {p1}"
else:
return f"{p1}'s Card: {play1}\n{p2}'s Card: {play2}\nThe Winner is {p2}"
print(play_round("Bob","Joe"))
which one of the following certificate formats is closely associated with windows binary certificate files?
The certificate format which is closely associated with windows binary certificate files is PFX. The correct option is C.
What is PFX certificate format?A PFX file denotes a certificate in PKCS#12 format; it includes the private key for the certificate as well as the certificate, the intermediate authority certificate required for the certificate's trustworthiness, and the certificate.
Consider it an archive that contains all the information required to deploy a certificate.
Therefore, the correct option is C. PFX certificate format is used in windows binary.
To learn more about PFX certificate format, refer to the link:
https://brainly.com/question/13681474
#SPJ1
The question is incomplete. The missing options are given below:
A. DER B. PEM cD. P7B.
he ________ feature, located on the Ribbon, allow you to quickly search for commands or features.
Answer:
The Quick Access Toolbar feature, located on the Ribbon, allow you to quickly search for commands or features.
.
The Quick Access Toolbar feature, located on the Ribbon, allow you to quickly search for commands or features.
Where is the Quick Access toolbar?Shortcuts to frequently used features, options, actions, or option groups are gathered in the Quick Access Toolbar. In Office programs, the toolbar is typically buried beneath the ribbon, but you can opt to reveal it and move it to appear above the ribbon.
Note that a toolbar that may be customized and contains a set of actions that are not dependent on the tab that is now shown is called the Quick Access Toolbar (QAT). It can be found in one of two locations: left upper corner, over the ribbon (default location) under the ribbon in the upper-left corner.
Learn more about Quick Access Toolbar from
https://brainly.com/question/13523749
#SPJ1
If a cell displaying #DIV/0! Contains the formula =C2/D9, what must be the value of cell D9?
Heya! The value of Cell D9 must have a 0. Have a good day!
Part 2 Graduate Students Only Architectural simulation is widely used in computer architecture studies because it allows us to estimate the performance impact of new designs. In this part of the project, you are asked to implement a pseudo-LRU (least recently used) cache replacement policy and report its performance impact. For highly associative caches, the implementation cost of true LRU replacement policy might be too high because it needs to keep tracking the access order of all blocks within a set. A pseudoLRU replacement policy that has much lower implementation cost and performs well in practice works as follows: when a replacement is needed, it will replace a random block other than the MRU (most recently used) one. You are asked to implement this pseudo-LRU policy and compare its performance with that of the true LRU policy. For the experiments, please use the default configuration as Question 3 of Project Part 1, fastforward the first 1000 million instructions and then collect detailed statistics on the next 500 million instructions. Please also vary the associativity of L2 cache from 4 to 8 and 16 (the L2 size should be kept as 256KB). Compare the performance of the pseudo-LRU and true-LRU in terms of L2 cache miss rates and IPC values. Based on your experimental results, what is your recommendation on cache associativity and replacement policy? Please include your experimental results and source code (the part that has been modified) in your report. Hint: The major changes of your code would be in cache.c.
The outline that a person can use to implement as well as compare the pseudo-LRU and that of the true-LRU cache replacement policies is given below
What is the code about?First, one need to make changes the cache replacement policy that can be see in the cache.c file of a person's code.
Thereafter one need to Run simulations with the use of the already modified or changed code via the use of the default configuration as said in Question 3 of Project Part 1.
Therefore, one can take detailed statistics, such as L2 cache miss rates and IPC (Instructions Per Cycle) values, for all of the next 500 million instructions. etc.
Learn more about code from
https://brainly.com/question/26134656
#SPJ1
Question 2 of 10
When gathering information, which of the following tasks might you need to
perform?
OA. Seek out ideas from others and share your own ideas
OB. Study objects, conduct tests, research written materials, and ask
questions
C. Fill out forms, follow procedures, and apply math and science
O D. Apply standards, such as measures of quality, beauty, usefulness,
or ethics
Answer:
OA is the answer for the question
Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False
Lossy compression means that when you compress the file, you're going to lose some of the detail is a true statement.
2. InDesign is the industry standard for editing photos is a true statement.
3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.
4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.
What lossy compression means?The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after it has undergone decompression.
Note that data here tends to be permanently deleted, which is the reason this method is said to be known as an irreversible compression method.
Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true statement.
Learn more about File compression from
https://brainly.com/question/9158961
#SPJ1
Which of the following statements about markup languages is true?
• Markup languages are used to write algorithms.
Markup languages are used to structure content for computers to interpret
JavaScript is an example of a markup language.
Markup languages are a type of programming language.
The most widely used markup languages are SGML (Standard Generalized Markup Language), HTML (Hypertext Markup Language), and XML (Extensible Markup Language).
B .Markup languages are used to structure content for computers to interpret is true.
What is a markup language in programming?A markup language is a type of language used to annotate text and embed tags in accurately styled electronic documents, irrespective of computer platform, operating system, application or program.
What does a markup language used to identify content?Hypertext markup language is used to aid in the publication of web pages by providing a structure that defines elements like tables, forms, lists and headings, and identifies where different portions of our content begin and end.
To learn more about A markup language, refer
https://brainly.com/question/12972350
#SPJ2
4 types of system software
4 types of system software: Operating Systems (OS), Device Drivers, Utilities, and Language Translators.
1. Operating Systems (OS): Operating systems are the core system software that manages computer hardware and software resources.
They provide an interface for users to interact with the computer and facilitate the execution of applications.
2. Device Drivers: Device drivers are software components that enable communication between the operating system and hardware devices like printers, graphics cards, and network adapters.
3. Utilities: System utilities perform various maintenance tasks, such as disk defragmentation, file management, backup, and system optimization.
4. Language Translators: These tools, including compilers and interpreters, translate high-level programming languages into machine code that the computer can execute.
Know more about system software:
https://brainly.com/question/30166062
#SPJ5
What do you need to start writing HTML?
Browser
Notes
Microsoft Word
Text Editor
Answer:
Text editor
Explanation:
You will need a text editor to start HTML
list ten beeping sounds in a computer system according to the hard ware
Answer:
CMOS Shutdown Register Failure
Explanation:
a. Draw the hierarchy chart and then plan the logic for a program needed by Hometown Bank. The program determines a monthly checking account fee. Input includes an account balance and the number of times the account was overdrawn. The output is the fee, which is 1 percent of the balance minus 5 dollars for each time the account was overdrawn. Use three modules. The main program declares global variables and calls housekeeping, detail, and end-of-job modules. The housekeeping module prompts for and accepts a balances. The detail module prompts for and accepts the number of overdrafts, computes the fee, and displays the result. The end-of-job module displays the message Thanks for using this program.
b. Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.
Hierarchy chart and pseudocode required
The Hierarchy Chart for the program needed by Hometown Bank is given below:
Main Program
|
-------------
| |
Housekeeping module Detail module
| |
Prompts for balance Computes fee
and accepts input and displays result
|
-----------------
| |
End-of-job module Detail loop (while balance >= 0)
|
Displays message "Thanks for using this program"
Pseudocode for Main Program:Declare global variables
Call Housekeeping module
Call Detail module
Call End-of-job module
Pseudocode for Housekeeping Module:
Prompt for balance
Accept input for balance
Pseudocode for Detail Module:
Detail loop:
while (balance >= 0)
Prompt for number of overdrafts
Accept input for number of overdrafts
Compute fee: 1 percent of balance - 5 dollars * number of overdrafts
Display result
Prompt for balance
Accept input for balance
Pseudocode for End-of-job Module:
Display message "Thanks for using this program"
Read more about pseudocode here:
https://brainly.com/question/24953880
#SPJ1
A petrol engine takes 1000J of chemical energy and produces 250J of useful energy
A petrol engine takes 1000J of chemical energy and produces 250J of useful energy the efficiency is 25%.
What is chemical energy?Chemical energy is defined as a chemical substances' potential energy, which is released as they experience chemical reactions and change into other substances.
As the petrol engine takes 1000J of chemical energy and produces 250J of useful energy.
So, Input = 1000 J
Output = 250 J
Efficiency = (250 / 1000) 100
= 0.25 x 100
= 25 %
Thus, a petrol engine takes 1000J of chemical energy and produces 250J of useful energy the efficiency is 25%.
To learn more about chemical energy, refer to the link below:
https://brainly.com/question/1371184
#SPJ1
Your question is incomplete, but probably your complete question was
A petrol engine takes 1000J of chemical energy and produces 250J of useful energy, calculate the efficiency?
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
Perform the following for each 8 bit binary addition:
add the two binary numbers
interpret all there 8 bit binary numbers as a signed number (2’s complement)
interpret all three 8 bit binary numbers as unsigned numbers
Binary Number
Signed Decimal Value
Unsigned Decimal Value
Number 1
01111001
Number 2
00011110
Sum
Binary Number
Signed Decimal Value
Unsigned Decimal Value
Number 1
00011011
Number 2
00010100
Sum
Binary Number
Signed Decimal Value
Unsigned Decimal Value
Number 1
11110110
Number 2
10000011
Sum
Answer:
Where are options?
Explanation:
When does information become a liability for an organization
Answer:
A. When it is not managed properly
Explanation:
when stuff is not mananged as it should then it becomes a liablilty
Enter a formula in cell C8 that divides the product of cells C5 through C7 by cell C4.
Answer: =(C5*C6*C7)/C4
Example of mediated communication and social media
Answer: mediated communication: instant messages
social media: social platforms
Explanation:
The total number of AC cycles completed in one second is the current’s A.timing B.phase
C.frequency
D. Alterations
The total number of AC cycles completed in one second is referred to as the current's frequency. Therefore, the correct answer is frequency. (option c)
Define AC current: Explain that AC (alternating current) is a type of electrical current in which the direction of the electric charge periodically changes, oscillating back and forth.
Understand cycles: Describe that a cycle represents one complete oscillation of the AC waveform, starting from zero, reaching a positive peak, returning to zero, and then reaching a negative peak.
Introduce frequency: Define frequency as the measurement of how often a cycle is completed in a given time period, specifically, the number of cycles completed in one second.
Unit of measurement: Explain that the unit of measurement for frequency is hertz (Hz), named after Heinrich Hertz, a German physicist. One hertz represents one cycle per second.
Relate frequency to AC current: Clarify that the total number of AC cycles completed in one second is directly related to the frequency of the AC current.
Importance of frequency: Discuss the significance of frequency in electrical engineering and power systems. Mention that it affects the behavior of electrical devices, the design of power transmission systems, and the synchronization of different AC sources.
Frequency measurement: Explain that specialized instruments like frequency meters or digital multimeters with frequency measurement capabilities are used to accurately measure the frequency of an AC current.
Emphasize the correct answer: Reiterate that the current's frequency represents the total number of AC cycles completed in one second and is the appropriate choice from the given options.
By understanding the relationship between AC cycles and frequency, we can recognize that the total number of AC cycles completed in one second is referred to as the current's frequency. This knowledge is crucial for various aspects of electrical engineering and power systems. Therefore, the correct answer is frequency. (option c)
For more such questions on AC cycles, click on:
https://brainly.com/question/15850980
#SPJ8
Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation.
Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation: False.
What is reputation?In Computer technology, reputation can be defined as a metric which is used to determine the quality of a particular website, especially based on the opinions and ratings by its end users.
In this context, we can infer that two negative reviews and no positive reviews isn't an enough metric to consider a website as having a negative reputation.
Read more on negative reputation here: https://brainly.com/question/2343924
#SPJ1
Suppose you have been appointed by your local school principal as a network technician. You are tasked with setting up a computer lab with 30 desktop computers. Write a detailed report to the principal and the school governing body, entailing the system software and all the basic application software/s you will be installing. Justify your choice of the software’s
Report on the system and application software that will be installed in a computer lab with 30 desktops, along with arguments for the decisions made, in accordance with the guidelines given by the school's.
Which computer software is most commonly used?Application software, sometimes known as applications, is the most popular kind of computer programme since it enables end users to carry out their activities. The person using the device is referred to as an end-user. These programmes may also be referred to as optional software by users.
An illustration of a desktop application is what is a desktop application list?A desktop application is a piece of software that may be used by an end user to carry out a particular task on a standalone computer. Many desktop programmes, including word processors, photo editors, and media players.
To know more about software visit:-
https://brainly.com/question/985406
#SPJ1
Which of the following is not a characteristic of a good value log entry
website is a collection of (a)audio files(b) image files (c) video files (d)HTML files
Website is a collection of (b) image files (c) video files and (d)HTML files
What is websiteMany websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.
To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.
Learn more about website from
https://brainly.com/question/28431103
#SPJ1
Cole has to edit and resize hundreds of photographs for a website. Which Adobe
software program would be the best choice to complete this task?
a.) Animate b.) Dreamweaver c.) Illustrator d.) Photoshop
A sum amounts to ₹2400 at 15% simple interest per annum after 4 years fond the sum.
Answer: $1,500
Explanation:
The future value of value using simple interest is:
Future value = Value * ( 1 + rate * time)
2,400 = Value * (1 + 15% * 4)
2,400 = Value * 1.6
Value = 2,400 / 1.6
Value = $1,500
Do you think that it is acceptable to base employment decisions solely on historical data?
No, the historical data may be biased against some candidates.
Yes, because knowing what worked before leads to choosing qualified candidates.
No, previous decisions should not be considered.
Yes, since the data can be used to create a decision-making algorithm.
Answer:
no
Explanation:
No, the historical data may be biased against some candidates.
The employment decisions should base solely on historical data because the data can be used to create a decision-making algorithm.
What is historical data?A historical data is the data that is collected based on past events and circumstances concerning an individual during an employment or about an organisation.
Employment decisions by human resource officers should be based solely on the historical data of their employees because it will give them insight on final decision to make.
Learn more about data here:
https://brainly.com/question/26711803
#SPJ2
Word, word, word and word are examples of different _____.
effects
styles
texts
fonts
Answer:
Fonts
Explanation:
edge 2021
The software used to provide visual support such as slide show during lectures
Answer:
microsoft powerpoint
Explanation:
What can toxic substances do to your body?
Select all that apply.
Answer:
burn you, affect your whole body
Explanation:
hope this helps :) !!!
give one major environmental and
one energy problem kenya faces as far as computer installations are concerned?
One considerable predicament that Kenya encounters pertaining to the utilization of computers is managing electronic waste (e-waste).
Why is this a problem?The mounting number of electronic devices and machines emphasizes upon responsibly discarding outdated or defective hardware in order to avoid environmental degradation.
E-waste harbors hazardous materials such as lead, mercury, and cadmium which can pollute soil and water resources, thereby risking human health and ecosystem sustainability.
Consequently, a significant energy drawback with computer use within Kenya pertains to the insufficiency or instability of electrical power supply.
Read more about computer installations here:
https://brainly.com/question/11430725
#SPJ1