Answer:
c
Explanation:
i took test
3.4 on Edhesive and I can’t figure this question out on the quiz
Answer:
The answer is: ONE
Explanation:
I got a 100 but make sure that when you put ONE it is in caps
What does this comparison block indicate?
if
+
getItem
5
then
O
A. The comparison is true if the left side is not equal to the right side.
B. The comparison is true if the left side is less than the right side.
C. The comparison is true if the left side is greater than the right side.
D. The comparison is true if the left side is equal to the right side.
Answer:
This comparison block indicates that the comparison is true if the left side is equal to the right side.
Explanation:
The comparison uses the = operator, which is the assignment operator in most programming languages. This operator is used to assign a value to a variable. In this case, the comparison is checking whether the value of the getItem variable is equal to 5. If the value of getItem is equal to 5, then the comparison will evaluate to true. If the value of getItem is not equal to 5, then the comparison will evaluate to false.
List two types of system software and explain one of them with easy words
Answer:
Chrome, Windows Defender
Explanation:
Chrome is a browser made for using the web with good protection and could always be customized by using extensions.
Windows Defender blocks all the malware from your device to try and make it as safe as possible.
Operating system: Harnesses communication between hardware, system programs, and other applications. Device driver: Enables device communication with the OS and other programs. Firmware: Enables device control and identification.
Popular mobile OSs are:iPhone OS.iPhone OS.Android OS.iPhone OS.Android OS.Windows Phone OS.Hope It Will Help You!Who would win in a fight, Noble 6 from halo reach or Master Chief??
Answer:
The Master Chief would win. He is better than Noble Six in almost every way. Spartan III's were started to be cheap and disposable, Spartan II's were built to last. Not only were the Spartan II candidates stronger before augmentation, they were also given better augmentations and better armour than the Spartan III's.
Explanation:
Answer:
Master Chief without a doubt. While it probably would be a good match, Master Chief has the experience, personalized A.I. to enhanced his reflexes, better armor, and Spartan II's overall had the more effictive augementations. Six on the other hand is a Spartan III. While some select Spartan III's recieved Mjolnir Armor like the Spartan II's they never recieved the same training from 6 years old. They also didn't have as nearly as good of an augmentation process as the II's. Noble Team doesn't even have a smart A.I. (Dot is not a smart A.I.) This is just the bottom line on why Chief would win.
Explanation:
Write a program to input the TotalCost and display the Assured gift as per the following criteria TotalCost(TC) Assured Gift Less than or up to 2000 Wall Clock 32001 to 5000 School Bag 5001 to 10,000 Electric Iron More than 10,000 Wrist Watch
Answer:
The program in Python is as follows:
TotalCost = int(input("Total cost: "))
if TotalCost <= 2000:
print("Wall Clock")
elif TotalCost >= 2001 and TotalCost <= 5000:
print("School Bag")
elif TotalCost >= 5001 and TotalCost <= 10000:
print("Electric Iron")
else:
print("Wrist Watch")
Explanation:
This gets input for total cost
TotalCost = int(input("Total cost: "))
If the total cost is up to 2000, print wall clock as the assured gift
if TotalCost <= 2000:
print("Wall Clock")
If the total cost is between 2001 and 5000 (inclusive), print school bag as the assured gift
elif TotalCost >= 2001 and TotalCost <= 5000:
print("School Bag")
If the total cost is between 5001 and 10000 (inclusive), print electric iron as the assured gift
elif TotalCost >= 5001 and TotalCost <= 10000:
print("Electric Iron")
If the total cost is more than 10000, print wrist watch as the assured gift
else:
print("Wrist Watch")
Please read the Comments.
you will create a personal organizer. ask: name of an event, year it is happening, month and day it is happening. If the user incorrectly enters one of those values, they are to re-enter the information until it is correct.
After the user has entered all of the events, the whole list of events should be output to the user.
do this is with parallel lists: one for the eventName, eventMonth, eventDay and eventYear.
Benchmarks
In the MAIN portion of your program, four lists are already created:
eventName: to store the event name
eventMonth: to store the event month
eventDay: to store the event day
eventYear: to store the event year
addEvent
Let's first edit the addEvent() function - there are no parameters necessary. Notice that the addEvent() function is already defined right above the MAIN portion of your program. Inside of the addEvent() function, do the following:
Prompt the user for the event name (entered as a string), and event year (entered as an integer).
Prompt the user for the event month (entered as an integer)
Then, call the function validateMonth(parameter1) which takes one parameter - the month that the user entered. This function should return a number from 1 - 12 and replace the month value that the user originally entered.
validateMonth
Now, work inside of the validateMonth() function. Notice that this function is already defined at the top of the starter code, but is commented out.
Inside of the validateMonth() function, check to see if the value of the parameter is valid (1 - 12).
If it is an invalid number, prompt the user to enter a new month. Continue doing this until a valid month is entered (hint: use a while loop).
Then return this value.
Back in the addEvent() function, prompt the user for an integer input for the day, then call the function validateDay(parameter1, parameter2, parameter3) which takes three parameters - the month, the day, and the year the user entered, in that order. This function should return a number from 1 - 31 and replace the day value that the user originally entered.
validateDay
Now, work inside of the validateDay() function. Notice that this function is already defined at the top of the starter code, but is commented out.
Inside of the validateDay() function, first work out the number of days in the month represented by the first parameter (28, 29, 30 or 31).
Remember! September, April, June and November only have 30 days, February has 28 or 29 days, and the rest of the months have 31 days. Your code should check that the day entered by the user actually exists in the month they entered. For example entering 31 as the day and 6 as the month (June) is not valid.
Remember! During a leap year, February has 29 days. A leap year happens once every four years. In your code, you can check for a leap year using math:
If the year entered by the user is divisible by 4, but not divisible by 100, it is a leap year.
If the year is divisible by 4, and divisible by 100, check that it is also divisible by 400. If so, it is a leap year.
Example: 2016 is divisible by 4, but not 100. 2016 was a leap year.
Example: 2000 is divisible by 4, 100, and 400. 2000 was a leap year.
Example: 1900 is divisible by 4 and 100, but is not divisible by 400. 1900 was not a leap year.
After you've written code to find the number of days in the month, check that the day entered is a valid date in that month (between 1 and the number of days inclusive).
If it is an invalid number, prompt the user to enter a new day. Continue doing this until a valid day is entered, then return this value.
Finally, back in the addEvent() function, append the values entered by the user to their corresponding lists in the MAIN portion of the program. Append the event name entered by the user, the month (re-entered if what the user originally entered was invalid), the day (re-entered if what the user originally entered was invalid), and the year.
Here's an implementation of the program based on the provided instructions:
eventName = []
eventMonth = []
eventDay = []
eventYear = []
def validateMonth(month):
while True:
if month < 1 or month > 12:
print("Invalid month. Please enter a number from 1 to 12.")
month = int(input("Enter the month: "))
else:
return month
def validateDay(month, day, year):
while True:
days_in_month = 31
if month == 4 or month == 6 or month == 9 or month == 11:
days_in_month = 30
elif month == 2:
if year % 4 == 0 and (year % 100 != 0 or year % 400 == 0):
days_in_month = 29
else:
days_in_month = 28
if day < 1 or day > days_in_month:
print("Invalid day. Please enter a valid day for the given month.")
day = int(input("Enter the day: "))
else:
return day
def addEvent():
name = input("Enter the name of the event: ")
year = int(input("Enter the year of the event: "))
month = int(input("Enter the month of the event: "))
month = validateMonth(month)
day = int(input("Enter the day of the event: "))
day = validateDay(month, day, year)
eventName.append(name)
eventMonth.append(month)
eventDay.append(day)
eventYear.append(year)
def main():
num_events = int(input("Enter the number of events you want to add: "))
for i in range(num_events):
print(f"Event {i+1}:")
addEvent()
print("\nEvent List:")
for i in range(len(eventName)):
print(f"Event {i+1}: {eventName[i]}, {eventMonth[i]}/{eventDay[i]}/{eventYear[i]}")
main()
This program allows the user to enter multiple events, providing the event name, year, month, and day. It validates the month and day inputs, ensuring they are within the valid range for each. The validated inputs are then appended to their respective lists. Finally, the program displays the complete list of events entered by the user.
Please note that this is just one possible implementation of the given requirements, and there are multiple ways to achieve the same functionality.
For more questions on program
https://brainly.com/question/16936315
#SPJ11
Which function will add a grade to a student's list of grades in Python? add() append() print() sort()
Answer:
It will be add()
Answer:
A
Explanation:
How have developments clearly contributed to facilitating the growth of decision support and analytic technologies?
Advancements in technology, such as the Internet and software programs, have facilitated the growth of decision support and analytic technologies. These developments provide easy access to data and tools for analyzing and interpreting it, improving decision-making processes and overall business performance.
Developments have contributed to the growth of decision support and analytic technologies. Advancements in internet and software programs enable businesses to access and analyze data, improving decision-making and overall performance.
Decision support and analytic technologies are crucial for business growth, enhancing productivity and competitiveness in the evolving business landscape.
Learn more about software programs here:
https://brainly.com/question/18661385
#SPJ11
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
is it possible in general to have two clustering indices on the same relation for different search keys? explain your answer.
The tuples in a relation would need to be stored in a different order to have the same values stored together, it is generally not viable to have two main indices on the same relation for distinct keys.
What is distinct data?
A number of supplementary indices because, There is just one physical way to arrange the actual data and A secondary index is a distinct data structure with references to the rest of the data that is arranged around its own keys. A tiny table with only two columns is used for indexing. Secondary Indexing is one of two primary categories of indexing techniques.
The Primary Index is a fixed-length, ordered file containing two fields. Two different forms of sparse indexes make up the primary indexing.
To learn more about techniques from given link
brainly.com/question/17130704
#SPJ4
Which computer can perform the single dedicated task? a. Which commuter can perform the function of both analog and digital device
The computer can perform the single dedicated task is a Special-purpose computer.
Hybrid Computer can perform the function of both analog and digital device.What are Hybrid computers?This is known to be made up of both digital and analog computers as it is a digital segments that carry out process control through the conversion of analog signals to digital signal.
Note that The computer can perform the single dedicated task is a Special-purpose computer.
Hybrid Computer can perform the function of both analog and digital device.Learn more about computers from
https://brainly.com/question/21474169
#SPJ9
this question is for zach bass
Answer:
I Heavily agree, the computer technology used for this is outstanding!
Explanation:
a router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents. true or false
The given statement "a router is a hardware- or software-based network security system that is able to detect and block sophisticated attacks by filtering network traffic dependent on the packet contents" is False.The router is a networking device that is used to connect multiple devices within a local area network (LAN) or wide area network (WAN). Routers are capable of routing network traffic between multiple network protocols.
They examine the destination IP address of packets and, depending on the routing protocol and the packet's destination, forward it to the next network on its route to the destination network. Furthermore, routers may be used to filter traffic based on specific criteria. However, a router is not a network security system. A router's main function is to route traffic between different networks, such as between a LAN and the internet.
The term router does not have anything to do with security, and routers are not designed to detect and block sophisticated attacks by filtering network traffic based on packet contents. Therefore, the given statement is False.Hope this helps!
To know more about sophisticated visit:
brainly.com/question/31173048
#SPJ11
How do you reset a g.mail password?
Answer:
put: forgot password to reset it
Answer:
Change your pass word
Open your Go ogle Account. You might need to sign in.
Under "Security," select Signing in to G oo gle.
Choose Password. You might need to sign in again.
Enter your new password, then select Change Password.
Question 7 of 15 Time spent: 1:30 of 02:00:00 X To answer this question, complete the lab using information below. You will only be allowed one attempt to complete this lab. Launch Lab You are a network technician for a small corporate network that has recently upgraded to Gigabit Ethernet. The company owner has asked you to connect a new workstation to the network while a new employee is in an orientation meeting. In this lab, your task is to complete the following: 1. Connect the workstation in the Support Office to the local area network. 2. Statically configure the IP address for the Local Area Connection on the workstation to meet the following requirements: • Use the last available host address in the 172.25.0.0/16 subnet with the appropriate subnet mask. . For the Default Gateway, use the address of the router shown in the exhibit For the Preferred DNS server, use the address of the external DNS server shown in the exhibit Note: If you complete the tasks correctly, you will see that the Support workstation in the Network and Sharing Center has a connection to the local network and the internet.
In this lab, the task is to connect a new workstation to the network and configure its IP address settings. The specific requirements are to use the last available host address in the 172.25.0.0/16 subnet, set the appropriate subnet mask, use the provided router address as the Default Gateway, and use the provided external DNS server address as the Preferred DNS server.
To complete the lab, follow these steps:
Connect the workstation in the Support Office to the local area network using an Ethernet cable.
Access the network settings on the workstation and locate the configuration for the Local Area Connection.
Set the IP address by choosing the last available host address in the 172.25.0.0/16 subnet. Use the appropriate subnet mask based on the network's requirements.
Specify the Default Gateway by entering the provided router address shown in the exhibit.
Set the Preferred DNS server by entering the provided external DNS server address shown in the exhibit.
Apply the settings and verify the connection by checking the Network and Sharing Center. The Support workstation should now be connected to the local network and have access to the internet.
Learn more about workstation here
https://brainly.com/question/13085870
#SPJ11
With Slide 5 (Standards for Review") still displayed, modify shapes as follows to correct problems on the slide:
a. Send the rounded rectangle containing the text "Goal is to or property" to the
back of the slide. (Hint: Select the cuter rectangle.)
b. Enter the text Renovate in the brown rectangle.
C. Insert a Rectangle from the Rectangles section of the Shapes gallery.
d. Resize the new rectangle to a height of 2.5" and a width of 2"
e. Apply the Subtle Effect-Brown, Accent 5 (6th column, 4th row in the Theme Styles palette) shape style to the new rectangle
f. Apply the Tight Reflection: Touching shape effect from the Reflection gallery.
g. Use Smart Guides to position the shape as shown in Figure 1.
The steps involved in implementing the aforementioned alterations in PowerPoint are:
To move the rectangular shape with rounded edges towards the bottom of the slide:Choose the shape of a rounded rectangle that encloses the phrase "Aim is to achieve or possession. "To move the shape backwards, simply right-click on it and choose either "Send to Back" or "Send to Backward" from the options presented in the context menu.What is the Standards for ReviewFor b, To input the word "Renovate" within the brown square, one can:
Choose the rectangular shape that is brown.To substitute the current text, initiate typing "Renovate" within the shape.One way to add a rectangle is by selecting it from the available shapes in the gallery. Access the PowerPoint ribbon and navigate to the "Insert" tab.In the "Illustrations" group, select the "Shapes" button. Them , Choose the rectangular shape from the options listed in the drop-down menu.
Learn more about Slide making from
https://brainly.com/question/27363709
#SPJ4
Your company emphasizes the important of conserving (not wasting)
resources. How can you support that value when you print an 8-page report
you were asked to bring to your department's monthly meeting?
A. Use the Save option to choose a format readers can open.
B. Post the report online before printing it.
C. Use the Print option to create extra copies.
D. Use the Print option for two-sided printing.
SUBMIT
Answer:
D. Use the Print option for two-sided printing.
Explanation:
ape x
Answer:
D
Explanation:
The
command is used to fix a mistake immediately after you make it.
Redo
Undo
Correct
Fix
A different implementation of a function is required in an existing system. the best way to integrate this function into the system is?
The best way to integrate this function into the system with the adapter pattern.
An adapter pattern can be defined as a structural pattern. This turns the class interface into another interface that the client expects. That is, let's say if we have two incompatible components in our system and we want to use them, because we can't use them directly, we can use the adapter pattern to make them work together.
The adapter design pattern allows incompatible classes to work together by turning the interface of one class into the interface the client expects. Adapters can be used when the wrapper must respect a specific interface and must support polymorphic behavior.
You can learn more about adapter pattern here https://brainly.com/question/10146498
#SPJ4
Which three elements are required to have a Trade Secret?
The three elements that are required to have a trade secret are as follows:
It bestows a competitive lead on its owner.It is subject to sensible endeavor to control its secrecy.It is confidential in nature. What do you mean by Trade secret?A Trade secret may be defined as a type of intellectual property that significantly consists of secret information that might be sold or licensed specifically in order to main its secrecy.
Trade secrets can take many forms such as formulas, plans, designs, patterns, supplier lists, customer lists, financial data, personnel information, physical devices, processes, computer software, etc. These secrets must not be generally known by or readily ascertainable to competitors.
Therefore, the three elements that are required to have a trade secret are well mentioned above.
To learn more about Trade secrets, refer to the link:
https://brainly.com/question/27034334
#SPJ1
What is the difference between special purpose software and customized software
Answer:
im trying to do a challenge because this kid deleted all my answers
Explanation:
Quick!
who can solve this?
:}
:}
:}
:}
:}
Answer:
1.server
2.container
3.empty
4.lead
5.body
6.conttribute
i just know this much
sry
How is the search engine different from web directory and pls within 5 mins
Answer:
The search engine is different from a web directory because a web directory is a written list of websites to aid in exploring the Web, whilst a search engine finds the best and closest matched websites to what you typed in the search bar to help you with what you searched up.
state 5 functions of an operating system
Answer:
Memory Management.
Processor Management.
Device Management.
File Management.
Security.
Explanation:
hope this helps mate.
Answer:
manages computer hardware. manages software resorces. provides common services for computer programs. scheduling tasks. running/opening processes/programs.
Explanation:
Which computer use microprocessor as its CPU ?
Microcomputer was formerly a commonly used term for personal computers, particularly any of a class of small digital computers whose CPU is contained on a single integrated semiconductor chip. Thus, a microcomputer uses a single microprocessor for its CPU, which performs all logic and arithmetic operations.
a process that has input data flow but produces no output is known as what type of process?
A process that has input data flow but produces no output is known as a black hole process.
This type of process is characterized by its ability to consume data, but not produce any output or provide any feedback to the sender.
Black hole processes are commonly used in computer networks, where they are used to filter out unwanted traffic or to test network connectivity.
For example, a network administrator might use a black hole process to redirect all incoming traffic to a test server, which would consume the traffic but not respond to it.
This would allow the administrator to test the network without impacting the normal operation of the system.
In addition to network testing, black hole processes can also be used in software development and testing.
In this context, a black hole process might be used to simulate the behavior of a particular system component, without actually executing any code.
This can be useful for testing complex systems or for debugging difficult issues.
For more questions on input data
https://brainly.com/question/29949210
#SPJ11
Select the correct answer. In which area is composing for games similar to composing for movies?
A. royalties earned
B. success of song-based soundtracks
C. usage of audio software for mixing and editing
D. spotting sessions
Answer:
c
Explanation:
cuz im jus right
Which table option enables you to combine the contents of several cells into one cell?
How would you describe the relationship between blocks of code and commands?
The aesthetics of a game relate to the look and feel that the game has.
True
False
The aesthetics of a game relate to the look and feel that the game has.
True
False