Main Answer:Web-based applications are application software which operate and can be accessed through a web browser.
Sub heading:
what is web browser?
Explanation:
1.web browser is application software for accessing the world wide web.
REFERENCE LINK:
https://brainly.com
Hashtag:
#SPJ4
The is_positive function should return True if the number received is positive, otherwise it returns None. Can you fill in the gaps to make that happen? 1 2 3
Python is a computer programming language often used to build websites and software, automate tasks, and conduct data analysis. Python is a general-purpose language, meaning it can be used to create a variety of other programs and isn't specialized for any specific problems.
Following are the python schedule to check input number is positive or negative:
Program: def is_positive(n):#defining the method is_positive that takes one variable in parameter
if (n > 0):#defining if block that check input number is positive
return True#return boolean value that is True
else:#else block
return "None"#return string value
n=int(input("Enter number: "))#defining n variable that input a number
print(is_positive(n))#using print process that calls and prints method return value
Output:
please find the connected file.
Program Explanation:
Defining the method "is_positive" that takes one variable "n" in the parameter.
Inside the method, if conditional block is determined that checks the input number is positive, if it's true, it will return a boolean value that is "True".
Otherwise, it will go to the else block, where it will produce a string value that is "None".
Outside the way, the "n" variable is declared to be an input number.
After the input value, a print method is used that calls the "is_positive" form and prints its return value.
To learn more about Python, refer
https://brainly.com/question/23916407
#SPJ4
Read-only memory chips are used to
A. record high scores and later, "save slots" for longer games
B. Translate input from players into visual output
C. Store data that cannot be modified
D. Secure game code so that it can't be copied or pirated
pls help ill mark branliest!!!
Answer:
C
Explanation:
Think of memory, you can remeber things. A memory chip is meant to "remember" things!
state 5 different between mouse and keyboard
Answer:
*here you go *
Explanation:
While the main purpose of a mouse is to guide the cursor on the computer monitor, a keyboard is a typewriter like device with some additional functions that allow human interaction with computer. ... While mouse is considered to be a pointing device, keyboard is the input device for a computer.
(Keyboard vs Mouse
Keyboard and mouse are integral parts of a computer system and one cannot even think of interacting with the computer or monitor with the use of these two devices. In a sense, these two devices are the user interface that allows working on a computer system, and without them it is not possible to do anything on a computer. While the main purpose of a mouse is to guide the cursor on the computer monitor, a keyboard is a typewriter like device with some additional functions that allow human interaction with computer. In fact, a keyboard is the only source of providing the input to the computer and it performs the functions we ask it only with the help of this device.
While mouse is considered to be a pointing device, keyboard is the input device for a computer. Despite touch screen having been developed that allows one to use virtual keyboard onscreen, physical keyboard remains first choice of most of the individuals. There are keys with symbols printed on them in a keyboard and with the lightest of touches; the numeral or alphabet gets written on the screen of the monitor using a keyboard. There are some instructions for which one has to press a key and holding it pressed, another key has to be pressed. There are many shortcuts also used with the help of a keyboard that help save time and effort. Many computer commands are the results of these shortcuts. The major function of a keyboard is when one is using a word processor or a text editor.
A mouse is a pointing device and consists of a right and left clicks with a wheel in between that allows on to scroll up and down on a web page. The major function of a mouse is to control the cursor on the monitor of the screen. Today there are wireless mouse available that work through infrared rays.)
When information from an erp or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____.
When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations),
it is called interoperability. Interoperability refers to the capacity of different software systems and devices to share data and cooperate. The term is often used in a technical systems engineering sense, or alternatively in a broad sense, taking into account social, political, and organizational factors that impact system-to-system performance.
Interoperability is the ability of software systems and devices to communicate and collaborate with one another, allowing for the integration of systems and the exchange of data between them. The ability of two or more systems or components to interact with one another in a way that achieves the desired outcome is referred to as interoperability.
To know more about ERP visit:
https://brainly.com/question/33366161
#SPJ11
security measures are sometimes described as a combination of physical, technical, and administrative safeguards (pta). physical safeguards may include:
Physical safeguards may include anti-malware software, device data encryption, and communications encryption.
Physical safeguards are actions taken physically to guard against natural disasters, environmental dangers, unlawful entry, and other risks to a covered entity's electronic information systems, as well as the buildings and equipment they are connected to.
Workstation use, workstation security, and device and media controls are among the requirements for physical safeguards. Whether these systems are housed on the covered entity's premises or somewhere else, the Security Rule requires covered entities to implement physical safeguard criteria for them.
Although they are sometimes disregarded, physical security measures are a crucial component of PHI security for every covered institution. A covered entity's overall health data security plan might readily prioritize both technical and administrative measures. However, physical security measures are also essential and must be compatible with the other two federal regulations.
To know more about physical safeguards click here:
https://brainly.com/question/14176905
#SPJ4
find the value of the following expression. log subscript a open parentheses fraction numerator x y cubed over denominator z squared end fraction close parentheses
The value of the expression logₐ((x * y³) / z²) can be simplified using logarithmic properties to logₐ(x) + 3 * logₐ(y) - 2 * logₐ(z).
To find the value of the given expression, we can apply the logarithmic properties to simplify it. According to the logarithmic properties, the logarithm of a quotient is equal to the difference of the logarithms of the numerator and denominator. Additionally, the logarithm of a power can be expressed as the product of the logarithm and the exponent.
Therefore, we can rewrite the expression as:
logₐ((x * y³) / z²) = logₐ(x * y³) - logₐ(z²)
Using the logarithmic property for the product, we have:
logₐ(x * y³) = logₐ(x) + logₐ(y³)
And using the logarithmic property for the power, we have:
logₐ(y³) = 3 * logₐ(y)
Substituting these simplified expressions back into the original expression, we get:
logₐ((x * y³) / z²) = logₐ(x) + 3 * logₐ(y) - 2 * logₐ(z)
This is the simplified form of the given expression, where the logarithms of the individual variables x, y, and z are combined using addition and subtraction.
Learn more about logarithmic here:
https://brainly.com/question/30226560
#SPJ11
►Write
a python program that will convert Fahrenheit Temperature to Celsius and
Celsius Temperature to Fahrenheit
►Formulae
needed:
►°C
= (°F – 32) x 5/9
►°F
= (°C × 9/5) + 32
Answer:
import math
C_or_F = input("Enter C for Celcius or F for Farenheit: ")
if C_or_F == 'F':
F = int(input("Enter degrees in Fahrenheit: "))
Fahrenheit =(F-32)*(5/9)
print(Fahrenheit,"°")
if C_or_F == 'C':
C = int(input("Enter degrees in Celcius: "))
Celcius = (C*(9/5))+32
print (Celcius,"°")
Explanation:
The first input determines if it is Fahrenheit or Celcius. The second inputs determine how many degrees in that unit of temperature.
simplify 0.2×0.03055 to 3 decimal places
Answer:
this 0.061 or this 0.0611
Explanation:
Lost passwords set for documents in Microsoft® Word® documents can be retrieved in the backstage view. True False
Answer:
I may be wrong but im pretty sure its true
Explanation:
True <3
how do i find the highest daily sales quantity per customer in
June 2014, using a pivot table on excel?
Using a pivot table in Excel is an effective way to analyze and summarize data. By following the steps outlined above, you can easily find the highest daily sales quantity per customer for a specific period, such as June 2014.
To find the most elevated day to day deals amount per client in June 2014 utilizing a turn table in Succeed, you can follow these means:
Guarantee that your information is coordinated in a plain organization, with every section addressing an alternate variable, (for example, "Client," "Date," and "Deals Amount"). Ensure you have a section for the date in a reasonable date design.
Choose the entire data range, which includes the aforementioned columns. This reach ought to incorporate segment headers and every single pertinent datum.
In Excel, go to the "Insert" tab and select "PivotTable." A window with dialog will open.
Make sure that the "Select a table or range" option is selected in the dialog box and that the appropriate range is shown in the "Table/Range" field. Pick a place for your pivot table, such as a new worksheet or an existing one.
To create the pivot table, select "OK." This will either insert a pivot table at the specified location or open a new worksheet.
In the turn table field list, drag the "Client" field to the "Lines" region and the "Date" field to the "Segments" region.
Drag the "Business Amount" field to the "Values" region. It will, by default, add up all of the sales. To change this, select "Value Field Settings" by clicking the drop-down arrow next to the "Sum of Sales Quantity" field in the pivot table.
Select the "Max" function from the "Value Field Settings" dialog box and click "OK."
A pivot table displaying the highest daily sales quantity for each customer will now be available to you. Locate the sections titled "Row Labels," which ought to display the customers, and "Column Labels," which ought to display the dates. The day's highest sales quantity will be displayed at the intersection of each customer and date.
Click the drop-down arrow next to the "Column Labels" field in the pivot table, uncheck the "Select All" option, and then select "June 2014" from the list of dates to display only June 2014.
To quickly identify the customer(s) with the highest daily sales quantity in June 2014, the pivot table can be sorted by sales quantity in descending order.
To know more about Excel, visit
brainly.com/question/24749457
#SPJ11
How to fix "the number you are trying to call is not reachable"?
The number you are trying to call is not reachable" typically indicates that the phone number you are trying to call is currently unavailable or out of service. To fix this issue, you can try the following:
Check the phone number you are trying to call to make sure it is correct.Ensure that your phone is connected to a network with good signal strength.Restart your phone and try calling againTry calling the number from a different phone or from a landline to see if the issue is with your phone.If the issue persists, contact your phone service provider for further assistance.It's also possible that the number you are trying to call has been disconnected or is no longer in service. In this case, you will not be able to reach the number. Troubleshooting is the process of identifying and resolving problems or issues with a system or device. In this case, the system or device is a phone, and the problem is that a call to a certain phone number is not going through and the message "the number you are trying to call is not reachable" is being received.
Learn more about fix problem, here https://brainly.com/question/20371101
#SPJ4
Which of the following agile mis infrastructure characteristics refers to the ability of an application to operate on different devices or software platforms, such as different operating systems?.
Agile MIS infrastructure is based on the Agile Manifesto for software development. It emphasizes flexibility and rapid iteration. In Agile MIS infrastructure, information systems are developed and deployed using short, iterative development cycles. These cycles typically last two to four weeks, and each cycle is followed by a testing phase.
This enables the development team to quickly identify and address any issues that arise during the development process.
The characteristic that refers to the ability of an application to operate on different devices or software platforms, such as different operating systems is interoperability. Interoperability is the ability of different systems to work together, share data, and exchange information. It is an essential characteristic of modern information systems.
Interoperability is particularly important in today's world because there are many different types of devices and software platforms. For example, there are desktop computers, laptops, tablets, smartphones, and other devices, all of which run different operating systems.
To know more about infrastructure visit:
https://brainly.com/question/17737837
#SPJ11
One driving technique to increase fuel efficiency is.
Answer:
One driving technique to increase fuel efficiency is accelerating and braking gradually and gently.
"...can improve the fuel economy of your vehicle by 15%–30% at highway speeds and 10%–40% in stop-and-go traffic. Driving more sensibly is also much safer for you and others." -Alternate Fuels Data Center website
a string of characters assigned by the dba to a database that the user must enter to access the database is known as a(n) .
A string of characters assigned by the dba to a database that the user must enter to access the database is known as a password.
A password is a word, phrase, or group of characters used to distinguish between an authorized user or process and an unauthorized user (in order to grant access). To put it another way, a password is used to establish one's identity or grant access to a resource. There is a strong implication that a password is private. A username or other authentication method is typically used in conjunction with a password to ensure security. A password with a minimum of 12 characters.
Passwords should be different, complex, and illogical. They should be made up of a combination of upper- and lower-case letters, numbers, and symbols, and should not contain dictionary words from any language or be related to anything that could be guessed (employee ID, dates, etc.). They should also not be sequences from a keyboard like "qwerty" or "zxcvb."
To know more about password click here:
https://brainly.com/question/14580131
#SPJ4
Which option is an example of iteration in an algorithm?
A. Instructing the computer to use a certain amount of its memory to
save the algorithm's data
B. Including a rigid sequence of events that the computer must
perform in an exact order
OC. Instructing the computer to repeat a step over and over while a
certain condition is met
D. Including an if-then statement to account for a specific condition
An example of an iterative algorithm is the ABO allele frequency estimation method that is stated at the bottom of the preceding page because it repeatedly uses one value of (p, p, p) to obtain another value of (p, p, p). ´µ Ç ). /(2 x521) = . 688.
What does an algorithmic iteration mean?An algorithm may need to repeat some operations until instructed to stop doing so or until a certain condition is satisfied. The repetition of stages is known as iteration. Iteration is the process of repeatedly performing the same action. Long division, the Fibonacci sequence, prime numbers, and the calculator game are a few examples. Some of these, but not all, made use of recursion. a collection of succeeding integers, or do a task a predetermined number of times. The process of doing laundry, the way we solve a long division problem, the ingredients for making a cake, and the operation of a search engine are all instances of algorithms.
To learn more about algorithm refer to
https://brainly.com/question/19021194
#SPJ1
Answer:
I believe the asnwer is C. Instructing the computer to repeat a step over and over while a certain condition is met
Explanation:
Beucase i took the cst
if its not correct please correct me
heat is released when select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a water freezes. b water evaporates. c ice melts. d all of these are correct. e none of these is correct.
When water freezes, latent energy from freezing and its equivalent are released into the environment. The release of energy is essential for the change in state to occur.
Latent heat is released into the environment when water freezes, but how?The latent heat of freezing is the energy that is lost. The latent heat of freezing energy was released as the water froze. Indeed, heat energy was being emitted. Once the temperature reached 32 degrees Fahrenheit, this heat energy stopped the temperature from dropping any further.
What is the name for the latent heat released by water molecules?The transformation of water vapor into a liquid is known as condensation. The 600 cal/gm of latent heat that was added during evaporation is removed from water molecules during the condensation process.
to know more about keyboard navigation here:
brainly.com/question/16860977
#SPJ1
The VLOOKUP function looks up values in a table with which feature?
column labels in the top row
column labels in the bottom row
row labels in the leftmost column
row labels in the rightmost column
The VLOOKUP function looks up values in a table with the feature that allows row labels in the leftmost column. Thus, the correct option for this question is C.
What is the VLOOKUP function?The VLOOKUP function may be characterized as a built-in Excel function that helps you look for a specified value by searching for it vertically across the sheet. This function in Excel may sound complicated, but you will find out that it is a very easy and useful tool once you try it.
The VLOOKUP function lets you search the leftmost column for a value and return another value on the same row in a column you specify. The range of cells in which the VLOOKUP will search for the lookup_value and the return value.
Therefore, row labels in the leftmost column are the feature through which the VLOOKUP function looks up values in a table. Thus, the correct option for this question is C.
To learn more about VLOOKUP function, refer to the link:
https://brainly.com/question/29646445
#SPJ1
Answer:
A -column labels in the top row.
Explanation:
Is the correct answer.
in order to set all of the special permissions on a certain file or directory, which command should be used on a file named filename? a. chmod 7777 filename b. chmod 777 filename c. chmod 0000 filename d. chmod 6666 filename
To set all of the special permissions on a file or directory named "filename," the correct command to use is "Option B. chmod 777 filename."
1. In the context of file permissions in Unix-like systems, the "chmod" command is used to change the permissions of a file or directory. The numerical value "777" represents the permission settings for the file.
2. Each digit in the value corresponds to a specific category: owner, group, and others. The first digit (7) sets the permissions for the owner, the second digit (7) sets the permissions for the group, and the third digit (7) sets the permissions for others.
3. In this case, "7" signifies that all permissions (read, write, and execute) are granted for the respective category. The read permission allows users to view the contents of the file, the write permission enables users to modify or delete the file, and the execute permission grants users the ability to run the file as a program or access a directory.
4. By using "chmod 777 filename," command all users, including the owner, group, and others, will have full access to the file. However, it's important to note that setting permissions to 777 may have security implications, as it grants unrestricted access to the file. It is generally recommended to use more restrictive permissions based on the specific needs and security requirements of the file or directory.
To learn more about chmod command visit :
https://brainly.com/question/31755298
#SPJ11
What is the sandbox detection method known as? select one: rule-based detection signature-based detection check sum detection heuristic detection
The sandbox detection method known as heuristic detection. By looking for suspicious aspects in the code, heuristic analysis is a technique for identifying viruses.
By comparing a program's code to the code of known virus kinds that have already been seen, examined, and stored in a database, or by using signature detection, traditional techniques of virus detection discover malware.
The introduction of new threats, which emerged around the turn of the century and are still emerging today, has made signature detection technology less effective even if it is still in use.
Learn more about heuristic detection https://brainly.com/question/14811551?
#SPJ4
What will you see on the next line? >>> int(6.5)
Answer:
6
Explanation:
The int functions founds down to the nearest whole number, which in this case would be 6.
Answer:
6
Explanation:
Create a function get_longest_sublist that takes a single parameter, which is a list of lists. Complete the function such that it returns the longest sublist in lists. If the parameter is empty then simply return an empty list.
Using the knowledge in computational language in python it is possible to write the code that create a function get_longest_sublist that takes a single parameter, which is a list of lists.
Writting the code:import ast
def get_longest_sublist(l):
max=len(l[0])
for i in l:
if len(i)>max:
max=len(i)
p=i
return p
str=input()
print(get_longest_sublist(ast.literal_eval(str)))
See more about python at brainly.com/question/18502436
#SPJ1
what kind of damage is done by viruses
Answer:
well theres different kind
Explanation:
there some in your body, theres some in a computer... and other things lol
we cannot share software in computer network true or false
Answer:
false
Explanation:
false but other thing is that it can be very risky increasing the chances of getting infected by a virus
What is the first thing you need to specify when you create a table in a word-processing document?
A
The colors to be applied to the columns and rows
B
The border thickness and style
C
The number of columns and rows
D
The width of each column and the height of each row
The first thing an end user need to specify when creating a table in a word-processing document is: C . The number of columns and rows.
A word processor refers to a software application that is typically designed for typing and formatting text-based documents. Thus, it is an application software that can be used to create a table in a word-processing or text-based document.
In Computers and Technology, some examples of a word processor are:
Microsoft WordSublime textNotepadFurthermore, all table in a word-processing or text-based document is typically made up of columns and rows. Thus, the first thing an end user need to specify when creating a table in a word-processing document is the number of columns and rows, depending on the project at hand.
Read more on word-processing here: https://brainly.com/question/24849072
A unique file with a unique name and address that can display ancombination of text, graphics, video,
audio, or animation defines what?
A. web browser
B. web page
C. website
D. web server
Answer:
B. web page....
declare a reference variable of type file named myfile.
In order to declare a reference variable of type "file" named "myfile" in a programming language like C++, you would use the following syntax: " file& myfile;".
This statement declares a reference variable named "myfile" of type "file". The "file" type represents a file object or handle that can be used for performing file operations in the programming language.
By declaring a reference variable, you create an alias for an existing object. The reference variable "myfile" can then be used to interact with the file object it refers to, allowing you to read from or write to the file, close the file, or perform other operations as needed.
You can learn more about reference variable at
https://brainly.com/question/31201214
#SPJ11
Write a program to simulate a Fruit Machine that displays three symbols at random from Cherry, Bell, Lemon, Orange, Star, Skull.
The player starts with £1 credit, with each go costing 20p. If the Fruit Machine “rolls” two of the same symbol, the user wins 50p. The player wins £1 for three of the same and £5 for 3 Bells. The player loses £1 if two skulls are rolled and all of his/her money if three skulls are rolled. The player can choose to quit with the winnings after each roll or keep playing until there is no money left.
1. Write pseudo or flowchart for this task ready for it to be coded in class tomorrow - 1/12/2020
2. needs - variable, iteration - while because of some condition, selection - it's all the IFs, Sequence - be careful of sequence
please this is urgent i beg u
Answer:
please read these terms and search for Google app
What is read by the system, to ensure that only authorized devices or users are allowed to access a resource on the system
Sunil’s basketball coach asks him to prepare a presentation for his teammates on the proper way to shoot a basketball. After researching the topic online, Sunil decides to add a visual aide to his report.
Which visual aide is the best fit for Sunil’s presentation?
a podcast describing how to shoot a basketball
a video tutorial showing how to shoot a basketball
a graph showing how many players shot a basketball
a sound bite describing a player shooting a basketball
Answer: a video tutorial showing how to shoot a basketball
Explanation:
It will show them how to shoot the basketball
Answer:
a video
Explanation:
When we read code and predict its output, it is called tracing code.
For this lesson, you will come up with your own challenging algorithm for other students to trace. It must contain at least 5 if statements and use at least one AND or OR boolean condition.
Note: Elif or else statements will not count - your statements must be if statements. Each if statement should use a unique variable name.
For this challenge, try reading 3 or 4 of your classmates' code as well. Trace their code and predict what it will output, then check the code by running it to see if you got it right, and submit your work for a grade.
Answer:
Answer:
PYTHON
a = 2
b = 0
c = 4
d = -1
e = 9
g = 77
if -1 < a < 2:
print(a % 2)
if not c and b:
print(c//a)
if 50 >= d or 2 <= d >= 8:
print(d*d)
if 0 == e and e < 100:
print(e**e)
if g and g > 77:
print(g)
The program involves tracing the possible output of the code which contains a total of 5 variables. The program is written in python 3 ;
a , b, c, d, e = (10, 5 , 6, 2, 9)
#using tuple unpacking, assigns values to the variables a, b, c, d, e
if a > b:
#first if statement, tests if variable a is greater than b
e = b + 1
#if it is. Set variable e = b + 1
if b > c :
#if the above check is false, then check if b > c
e = b * 2
#if it is, set variable e = b×2
if c > d :
#if the above is false, check if c >d
e = c /2
#if it is, set, variable e to c divided by 2 ; if not
if (d>e) or (d > c):
#if either condition is true,
e = d -2
#set e to d - 2 ; if not
if e < a :
#Check if e > a
e = e * 5
# set e to e multiplied by 5
print(e)
#display the final value of e
Learn more on python programs :https://brainly.com/question/14786286