someone help.!!!!!!!!!!!!!!!!!!!

Someone Help.!!!!!!!!!!!!!!!!!!!

Answers

Answer 1

Answer:

1b True

1c True

1d True

...

Explanation:

This is how you evaluate an expression

8 <= (2+6) =>

8 <= 8

8 < 8 OR 8 == 8

false OR true

true

15==15

true

3 >= 3

3>3 OR 3==3

false OR true

true

etc...


Related Questions

Write a function called play_round that simulates two people drawing cards and comparing their values. High card wins. In the case of a tie, draw more cards. Repeat until someone wins the round. The function has two parameters: the name of player 1 and the name of player 2. It returns a string with format ' wins!'. For instance, if the winning player is named Rocket, return 'Rocket wins!'.

Answers

Answer:

Here you go, Change it however you'd like :)

Explanation:

import random as r

def play_round(p1, p2):

   cards = [1,2,3,4,5,6,7,8,9,10,"J","Q","K","A"]

   play1 = r.choice(cards)

   play2 = r.choice(cards)

   

   while play1 == play2:

       play1 = r.choice(cards)

       play2 = r.choice(cards)

   

   if cards.index(play1) > cards.index(play2):

       return f"{p1}'s Card: {play1}\n{p2}'s Card: {play2}\nThe Winner is {p1}"

   else:

       return f"{p1}'s Card: {play1}\n{p2}'s Card: {play2}\nThe Winner is {p2}"

print(play_round("Bob","Joe"))

which one of the following certificate formats is closely associated with windows binary certificate files?

Answers

The certificate format which is closely associated with windows binary certificate files is PFX. The correct option is C.

What is PFX certificate format?

A PFX file denotes a certificate in PKCS#12 format; it includes the private key for the certificate as well as the certificate, the intermediate authority certificate required for the certificate's trustworthiness, and the certificate.

Consider it an archive that contains all the information required to deploy a certificate.

Therefore, the correct option is C. PFX certificate format is used in windows binary.

To learn more about PFX certificate format, refer to the link:

https://brainly.com/question/13681474

#SPJ1

The question is incomplete. The missing options are given below:

A. DER B. PEM cD. P7B.

he ________ feature, located on the Ribbon, allow you to quickly search for commands or features.

Answers

Answer:

The Quick Access Toolbar feature, located on the Ribbon, allow you to quickly search for commands or features.

.

The Quick Access Toolbar feature, located on the Ribbon, allow you to quickly search for commands or features.

Where is the Quick Access toolbar?

Shortcuts to frequently used features, options, actions, or option groups are gathered in the Quick Access Toolbar. In Office programs, the toolbar is typically buried beneath the ribbon, but you can opt to reveal it and move it to appear above the ribbon.

Note that a toolbar that may be customized and contains a set of actions that are not dependent on the tab that is now shown is called the Quick Access Toolbar (QAT). It can be found in one of two locations: left upper corner, over the ribbon (default location) under the ribbon in the upper-left corner.

Learn more about Quick Access Toolbar from

https://brainly.com/question/13523749

#SPJ1

If a cell displaying #DIV/0! Contains the formula =C2/D9, what must be the value of cell D9?

Answers

Heya! The value of Cell D9 must have a 0. Have a good day!

Part 2 Graduate Students Only Architectural simulation is widely used in computer architecture studies because it allows us to estimate the performance impact of new designs. In this part of the project, you are asked to implement a pseudo-LRU (least recently used) cache replacement policy and report its performance impact. For highly associative caches, the implementation cost of true LRU replacement policy might be too high because it needs to keep tracking the access order of all blocks within a set. A pseudoLRU replacement policy that has much lower implementation cost and performs well in practice works as follows: when a replacement is needed, it will replace a random block other than the MRU (most recently used) one. You are asked to implement this pseudo-LRU policy and compare its performance with that of the true LRU policy. For the experiments, please use the default configuration as Question 3 of Project Part 1, fastforward the first 1000 million instructions and then collect detailed statistics on the next 500 million instructions. Please also vary the associativity of L2 cache from 4 to 8 and 16 (the L2 size should be kept as 256KB). Compare the performance of the pseudo-LRU and true-LRU in terms of L2 cache miss rates and IPC values. Based on your experimental results, what is your recommendation on cache associativity and replacement policy? Please include your experimental results and source code (the part that has been modified) in your report. Hint: The major changes of your code would be in cache.c.

Answers

The  outline that a person can use to implement as well as compare the pseudo-LRU and that of the  true-LRU cache replacement policies is given below

What is the code  about?

First, one need to make changes the cache replacement policy that can be see in the cache.c file of a person's code.

Thereafter one need to Run simulations with the use of the already modified  or changed code via the use of the default configuration as said in Question 3 of Project Part 1.

Therefore, one can take detailed statistics, such as L2 cache miss rates and IPC (Instructions Per Cycle) values, for all of the next 500 million instructions.  etc.

Learn more about code  from

https://brainly.com/question/26134656

#SPJ1

Question 2 of 10
When gathering information, which of the following tasks might you need to
perform?
OA. Seek out ideas from others and share your own ideas
OB. Study objects, conduct tests, research written materials, and ask
questions
C. Fill out forms, follow procedures, and apply math and science
O D. Apply standards, such as measures of quality, beauty, usefulness,
or ethics

Answers

Answer:

OA is the answer for the question

Lossy compression means that when you compress the file, you're going to lose some of the detail.
True
False
Question 2
InDesign is the industry standard for editing photos.
True
False
Question 3
Serif fonts are great for print media, while sans serif fonts are best for digital media.
True
False
Question 4
You should avoid using elements of photography such as repetition or symmetry in your photography.
True
False

Answers

Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

2. InDesign is the industry standard for editing photos is a true statement.

3. Serif fonts are great for print media, while sans serif fonts are best for digital media is a true statement.

4. You should avoid using elements of photography such as repetition or symmetry in your photography is a false statement.

What lossy compression means?

The term lossy compression is known to be done to a data in a file and it is one where the data of the file is removed and is not saved to its original form after  it has undergone decompression.

Note that data here tends to be permanently deleted, which is the reason  this method is said to be known as an irreversible compression method.

Therefore, Lossy compression means that when you compress the file, you're going to lose some of the detail is a true  statement.

Learn more about File compression from

https://brainly.com/question/9158961

#SPJ1

Which of the following statements about markup languages is true?
• Markup languages are used to write algorithms.
Markup languages are used to structure content for computers to interpret
JavaScript is an example of a markup language.
Markup languages are a type of programming language.

Answers

The most widely used markup languages are SGML (Standard Generalized Markup Language), HTML (Hypertext Markup Language), and XML (Extensible Markup Language).

B .Markup languages are used to structure content for computers to interpret is true.

What is a markup language in programming?

A markup language is a type of language used to annotate text and embed tags in accurately styled electronic documents, irrespective of computer platform, operating system, application or program.

What does a markup language used to identify content?

Hypertext markup language is used to aid in the publication of web pages by providing a structure that defines elements like tables, forms, lists and headings, and identifies where different portions of our content begin and end.

To learn more about A markup language, refer

https://brainly.com/question/12972350

#SPJ2

4 types of system software

Answers

Operating systems.
Device drivers.
Middleware.
Utility software.

4 types of system software: Operating Systems (OS), Device Drivers, Utilities, and Language Translators.

1. Operating Systems (OS): Operating systems are the core system software that manages computer hardware and software resources.

They provide an interface for users to interact with the computer and facilitate the execution of applications.

2. Device Drivers: Device drivers are software components that enable communication between the operating system and hardware devices like printers, graphics cards, and network adapters.

3. Utilities: System utilities perform various maintenance tasks, such as disk defragmentation, file management, backup, and system optimization.

4. Language Translators: These tools, including compilers and interpreters, translate high-level programming languages into machine code that the computer can execute.

Know more about system software:

https://brainly.com/question/30166062

#SPJ5

What do you need to start writing HTML?
Browser
Notes
Microsoft Word
Text Editor

Answers

Answer:

Text editor

Explanation:

You will need a text editor to start HTML

list ten beeping sounds in a computer system according to the hard ware​

Answers

Answer:

CMOS Shutdown Register Failure

Explanation:

a. Draw the hierarchy chart and then plan the logic for a program needed by Hometown Bank. The program determines a monthly checking account fee. Input includes an account balance and the number of times the account was overdrawn. The output is the fee, which is 1 percent of the balance minus 5 dollars for each time the account was overdrawn. Use three modules. The main program declares global variables and calls housekeeping, detail, and end-of-job modules. The housekeeping module prompts for and accepts a balances. The detail module prompts for and accepts the number of overdrafts, computes the fee, and displays the result. The end-of-job module displays the message Thanks for using this program.


b. Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.


Hierarchy chart and pseudocode required

Answers

The Hierarchy Chart for the program needed by Hometown Bank is given below:

                Main Program

                   |

               -------------

              |             |

      Housekeeping module  Detail module

              |             |

     Prompts for balance   Computes fee

         and accepts input  and displays result

              |

        -----------------

       |                 |

   End-of-job module    Detail loop (while balance >= 0)

       |

   Displays message "Thanks for using this program"

Pseudocode for Main Program:

Declare global variables

Call Housekeeping module

Call Detail module

Call End-of-job module

Pseudocode for Housekeeping Module:

Prompt for balance

Accept input for balance

Pseudocode for Detail Module:

Detail loop:

  while (balance >= 0)

     Prompt for number of overdrafts

     Accept input for number of overdrafts

     Compute fee: 1 percent of balance - 5 dollars * number of overdrafts

     Display result

     Prompt for balance

     Accept input for balance

Pseudocode for End-of-job Module:

Display message "Thanks for using this program"

Read more about pseudocode here:

https://brainly.com/question/24953880

#SPJ1

A petrol engine takes 1000J of chemical energy and produces 250J of useful energy

Answers

A petrol engine takes 1000J of chemical energy and produces 250J of useful energy the efficiency is 25%.

What is chemical energy?

Chemical energy is defined as  a chemical substances' potential energy, which is released as they experience chemical reactions and change into other substances.

As the petrol engine takes 1000J of chemical energy and produces 250J of useful energy.

So, Input = 1000 J

Output = 250 J

Efficiency = (250 / 1000) 100

                = 0.25 x 100

                = 25 %

Thus, a petrol engine takes 1000J of chemical energy and produces 250J of useful energy the efficiency is 25%.

To learn more about chemical energy, refer to the link below:

https://brainly.com/question/1371184

#SPJ1

Your question is incomplete, but probably your complete question was

A petrol engine takes 1000J of chemical energy and produces 250J of useful energy, calculate the efficiency?

1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:

4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
 WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
 WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:

Answers

Network controls that would meet the requirements is option a) Stateful Firewall

Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option  b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEP

What is the statement about?

A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.

A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.

Learn more about network administrator  from

https://brainly.com/question/28729189

#SPJ1

Perform the following for each 8 bit binary addition:

add the two binary numbers

interpret all there 8 bit binary numbers as a signed number (2’s complement)

interpret all three 8 bit binary numbers as unsigned numbers



Binary Number

Signed Decimal Value

Unsigned Decimal Value

Number 1

01111001




Number 2

00011110



Sum







Binary Number

Signed Decimal Value

Unsigned Decimal Value


Number 1

00011011



Number 2

00010100



Sum








Binary Number

Signed Decimal Value

Unsigned Decimal Value

Number 1

11110110




Number 2

10000011



Sum

Answers

Answer:

Where are options?

Explanation:

When does information become a liability for an organization

When does information become a liability for an organization

Answers

Answer:

A. When it is not managed properly

Explanation:

when stuff is not mananged as it should then it becomes a liablilty

Enter a formula in cell C8 that divides the product of cells C5 through C7 by cell C4.

Answers

Answer: =(C5*C6*C7)/C4

Example of mediated communication and social media

Answers

Answer: mediated communication: instant messages

social media: social platforms

Explanation:

Example of mediated communication and social media

The total number of AC cycles completed in one second is the current’s A.timing B.phase
C.frequency
D. Alterations

Answers

The total number of AC cycles completed in one second is referred to as the current's frequency. Therefore, the correct answer is frequency. (option c)

Define AC current: Explain that AC (alternating current) is a type of electrical current in which the direction of the electric charge periodically changes, oscillating back and forth.

Understand cycles: Describe that a cycle represents one complete oscillation of the AC waveform, starting from zero, reaching a positive peak, returning to zero, and then reaching a negative peak.

Introduce frequency: Define frequency as the measurement of how often a cycle is completed in a given time period, specifically, the number of cycles completed in one second.

Unit of measurement: Explain that the unit of measurement for frequency is hertz (Hz), named after Heinrich Hertz, a German physicist. One hertz represents one cycle per second.

Relate frequency to AC current: Clarify that the total number of AC cycles completed in one second is directly related to the frequency of the AC current.

Importance of frequency: Discuss the significance of frequency in electrical engineering and power systems. Mention that it affects the behavior of electrical devices, the design of power transmission systems, and the synchronization of different AC sources.

Frequency measurement: Explain that specialized instruments like frequency meters or digital multimeters with frequency measurement capabilities are used to accurately measure the frequency of an AC current.

Emphasize the correct answer: Reiterate that the current's frequency represents the total number of AC cycles completed in one second and is the appropriate choice from the given options.

By understanding the relationship between AC cycles and frequency, we can recognize that the total number of AC cycles completed in one second is referred to as the current's frequency. This knowledge is crucial for various aspects of electrical engineering and power systems. Therefore, the correct answer is frequency. (option c)

For more such questions on AC cycles, click on:

https://brainly.com/question/15850980

#SPJ8

Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation.

Answers

Two negative reviews and no positive reviews is enough to consider the website to have a negative reputation: False.

What is reputation?

In Computer technology, reputation can be defined as a metric which is used to determine the quality of a particular website, especially based on the opinions and ratings by its end users.

In this context, we can infer that two negative reviews and no positive reviews isn't an enough metric to consider a website as having a negative reputation.

Read more on negative reputation here: https://brainly.com/question/2343924

#SPJ1

Suppose you have been appointed by your local school principal as a network technician. You are tasked with setting up a computer lab with 30 desktop computers. Write a detailed report to the principal and the school governing body, entailing the system software and all the basic application software/s you will be installing. Justify your choice of the software’s

Answers

Report on the system and application software that will be installed in a computer lab with 30 desktops, along with arguments for the decisions made, in accordance with the guidelines given by the school's.

Which computer software is most commonly used?

Application software, sometimes known as applications, is the most popular kind of computer programme since it enables end users to carry out their activities. The person using the device is referred to as an end-user. These programmes may also be referred to as optional software by users.

An illustration of a desktop application is what is a desktop application list?

A desktop application is a piece of software that may be used by an end user to carry out a particular task on a standalone computer. Many desktop programmes, including word processors, photo editors, and media players.

To know more about software visit:-

https://brainly.com/question/985406

#SPJ1

Which of the following is not a characteristic of a good value log entry

Answers

What are we supposed to find? Help us

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

Cole has to edit and resize hundreds of photographs for a website. Which Adobe

software program would be the best choice to complete this task?

a.) Animate b.) Dreamweaver c.) Illustrator d.) Photoshop​

Answers

D.) Photoshop

Hope this helped, have a great day

A sum amounts to ₹2400 at 15% simple interest per annum after 4 years fond the sum.​

Answers

Answer: $1,500

Explanation:

The future value of value using simple interest is:

Future value = Value * ( 1 + rate * time)

2,400 = Value * (1 + 15% * 4)

2,400 = Value * 1.6

Value = 2,400 / 1.6

Value = $1,500

Do you think that it is acceptable to base employment decisions solely on historical data?
No, the historical data may be biased against some candidates.
Yes, because knowing what worked before leads to choosing qualified candidates.
No, previous decisions should not be considered.
Yes, since the data can be used to create a decision-making algorithm.

Answers

Answer:

no

Explanation:

No, the historical data may be biased against some candidates.

The employment decisions should base solely on historical data because the data can be used to create a decision-making algorithm.

What is historical data?

A historical data is the data that is collected based on past events and circumstances concerning an individual during an employment or about an organisation.

Employment decisions by human resource officers should be based solely on the historical data of their employees because it will give them insight on final decision to make.

Learn more about data here:

https://brainly.com/question/26711803

#SPJ2

Word, word, word and word are examples of different _____.


effects

styles

texts

fonts

Answers

Texts fonts styles effects etc. texts?

Answer:

Fonts

Explanation:

edge 2021

The software used to provide visual support such as slide show during lectures

Answers

Answer:

microsoft powerpoint

Explanation:

What can toxic substances do to your body?
Select all that apply.

Answers

Answer:

burn you, affect your whole body

Explanation:

hope this helps :) !!!

give one major environmental and
one energy problem kenya faces as far as computer installations are concerned?​

Answers

One considerable predicament that Kenya encounters pertaining to the utilization of computers is managing electronic waste (e-waste).

Why is this a problem?

The mounting number of electronic devices and machines emphasizes upon responsibly discarding outdated or defective hardware in order to avoid environmental degradation.

E-waste harbors hazardous materials such as lead, mercury, and cadmium which can pollute soil and water resources, thereby risking human health and ecosystem sustainability.

Consequently, a significant energy drawback with computer use within Kenya pertains to the insufficiency or instability of electrical power supply.

Read more about computer installations here:

https://brainly.com/question/11430725

#SPJ1

Other Questions
darwinian fitness is measured only in terms of the number of healthy offspring produced.T/F At a construction site there are a number of concrete bricks. We know that 6 concretebroks weigh 90 kilograms. Assuming each brick weighs exact same, fill out the table belowusing equivalent ratos.# of Concrete BlocksWeight (kilograms)What is the proportional relationshipbema represented?What is the constant of proportionality?360What volue belongs next to the in thetable? What does it mean in context of what condition must be met by pb2 and cl- for pbcl2 precipitate to form 2. How did the Pax Mongolica affect Asia and Europe? How does it compare with thePax Romana? No links ANSWER WILL GET BRAINLESTIn terms of ethnicity, both Korea and JapanA tend to be culturally and racially heterogeneous,tend to be culturally and racially heterogeneous,B are dominated by one major ethnic group.are dominated by one major ethnic group.C have no ethnic controversies.have no ethnic controversies.D have limited the influence of ethnic groups.have limited the influence of ethnic groups.E are made up of many ethnicity. K + F -> KF2K+F2->KFis this correct? Simplify 4/16 to lowest terms and find an equivalent fraction that has a denominator of 32.a) 8b) 4c) 1.32 the corn market is perfectly competitive. as a result, demand for farmer mcdonald's corn is perfectly elastic. why? group of answer choices a.corn is a normal good.b.farmer mcdonald's corn is a perfect substitute to the corn produced by other farmers.c.corn is a differentiated good. d.farmer mcdonald's corn is a perfect complement to the corn produced by other farmers. the patient is having premature ventricular contractions (pvcs). the nurses greatest concern should be in this clip, the filmmakers connect each shot using a technique called . these editing choices are intended to maintain cinematic and hide the edit. Explain what self-government means. *I The sum of two numbers is 75. Their difference is 25. Find the numbers. Select the correct statement about the function represented by the table.Plz help! In the U.S. Virgin Islands you can find beautifulrugged roads, iguanas, a few farms, and pristine beaches.O social scienceO physical geographyO geographyO landscapes 4. Explain Hofstedes cultural dimensions. Explainany two cultural dimensions with examples. (300 words) Is change an enemy of stability Expand and simplify5(2a)-7+3a How many signatures were there on the original Declaration of Independence? Identify the type of the pairs of angles.3 and 51 and 82 and 61 and 44 and 5 increase $32 in the ratio 2:5decrease 54 litter in the ratio 5:1