In python:
numA = [4, 1, 6, 10, 2, 3, 7, 9, 11, 12, 5, 8]
numB = [2, 12, 10, 11, 1, 3, 7, 9, 4, 8, 5, 6]
while True:
i = 0
userChoice = input("Adding or Multiplying? (a/m) ")
if userChoice == "a":
while i < len(numA):
answer = int(input("What is {} + {} ".format(numA[i],numB[i])))
if answer == numA[i] + numB[i]:
print("Correct!")
else:
print("That's incorrect. The right answer is {}".format(numA[i] + numB[i]))
i += 1
elif userChoice == "m":
while i < len(numA):
answer = int(input("What is {} * {} ".format(numA[i], numB[i])))
if answer == numA[i] * numB[i]:
print("Correct!")
else:
print("that's incorrect. The right answer is {}".format(numA[i] * numB[i]))
i += 1
The program will give them a choice of practicing adding or multiplying is true.
What is computer program?Computer program is defined as a series of instructions written in a programming language that a computer may follow. Computers can obey a set of instructions created through coding. Programmers can create programs, including websites and apps, by coding.
Python says:
numA = [4, 1, 6, 10, 2, 3, 7, 9, 11, 12, 5, 8]
numB = [2, 12, 10, 11, 1, 3, 7, 9, 4, 8, 5, 6]
though True:
I = 0
input("Adding or Multiplying? (a/m)") userChoice
when userChoice equals "a"
even when I = len(numA):
What is input("What is + ".format(numA[i],numB[i]))? answer = int
if response == numA[i] + numB[i]:
print("Correct! ")
else:
print( "That is untrue. The appropriate response is "Formatted as (numA[i] + numB[i])
I += 1
if userChoice == "m," then
even when I = len(numA):
answer = int("What is *? ".format(numA[i], numB[i]))
if the response equals numA[i] + numB[i]:
print("Correct! ")
else
print( "that is untrue. The appropriate response is ".format(numB * numA[i]
I += 1
Thus, the program will give them a choice of practicing adding or multiplying is true.
To learn more about program, refer to the link below:
https://brainly.com/question/11023419
#SPJ3
wht is RAM called Random Access memory and ROM IS called Read only memory
Answer: Computer memory is of two basic type – Primary memory(RAM and ROM) and Secondary memory(hard drive,CD,etc.). Random Access Memory (RAM) is primary-volatile memory and Read Only Memory (ROM) is primary-non-volatile memory.
Explanation: Hope this helps :)
Answer:
RAM is volatile memory that temporarily stores the files you are working on. ROM is non-volatile memory that permanently stores instructions for your computer.
Each page of notes should include
a.
Date, topic, class
c.
Page numbers, date and topic
b.
Class, homework assignment, date
d.
None of these
Please select the best answer from the choices provided
A
B
C
D
Answer:
A
Explanation:
Date, Topic, Class
Fill in the blank with the correct response.
A _
is an unknown network.
Answer:
ip address
Explanation:
please mark brainliest
What type of volatile memory is used on small systems such as laptops?
Select the correct answer.
A.
SODIMM
B.
ROM
C.
SRAM
D.
DIMM
Answer:
A. SODIMM
Explanation:
SODIMM is the "mini" version of desktop ram. it is smaller to accommodate the laptop's size.
Help me :)
Which of the following best explains a passive cyberattack?
The cybercriminal will attempt to bring down a target’s website.
The cybercriminal will attempt to remain undetected.
The cybercriminal might request ransom during the attack.
The cybercriminal might launch a denial of service attack.
describe source code escrow
Answer:
Source code escrow is the deposit of the source code of software with a third-party escrow agent.
Can a 775 socket be used for a i7 10700k?
The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?.
The miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.
What is Microprocessor?A Microprocessor may be defined as a kind of miniature electronic device that significantly stores the arithmetic, logic, and control circuitry mandatory to carry out the functions of a digital computer's central processing unit.
Microchips are silicon devices that remarkably function as the central processing unit in the computer. These chips possess numerous electronic components which are utilized to carry out specific mathematical operations.
Along with this, these chips also migrate data from one memory location to another with the support of microprocessors.
Therefore, the miniaturization of microchip inventions allowed integrated circuits to get smaller and leads to the creation of the microprocessor.
To learn more about Microprocessors, refer to the link:
https://brainly.com/question/13164100
#SPJ1
Your question seems incomplete. The most probable complete question is as follows:
The miniaturization of which of the following inventions allowed integrated circuits to get smaller, leading to the creation of the microprocessor?
microchipelectronic circuitvacuum tubetransistorIn a virtual-circuit packet-switched network, a packet switch maintains state information for each connection passing through the router
True
A virtual-circuit packet-switched network, a packet switch maintains state information for each connection passing through the router is true .
What is packet switching?Data is transferred from source to destination via a packet switched service. Data is transported via a network in the form of little units of data known as packets. Each packet contains a destination address that specifies where it should be sent. This sort of communication between the sender and the receiver is connectionless. The internet is also a network with no connections. The majority of internet traffic is carried by packet switched service.Voice over IP is a sort of packet switching in which each end of the conversation is broken into individual packets and afterwards reassembled into a complete message. Packets are made up of a header and a payload; the header directs the packet to its destination, and the data in the payload is the actual data to be conveyed.What is virtual circuit switching ?Switching between virtual circuits
It is a network that establishes a virtual link between the source and the destination. During any call, packets will be exchanged across this network. A dedicated physical circuit is formed by the path built between two places. As a result, it is referred to as a virtual circuit. It's a subset of packet switching.It is a connection-oriented service that sends the first packet and reserves resources for subsequent transmissions.Can learn more about virtual-circuit packet-switched network from https://brainly.com/question/28561061
#SPJ4
explain the structure of c program with example
Answer:
A C program typically consists of a number of components, including preprocessor directives, function prototypes, global variables, functions, and a main function.
Explanation:
Here's an explanation of each component, followed by an example C program that demonstrates their usage:
Preprocessor Directives: Preprocessor directives are instructions to the C preprocessor, which processes the source code before compilation. They usually start with a '#' symbol. Some common directives are #include for including header files and #define for defining constants.
Function Prototypes: Function prototypes provide a declaration of functions that will be used in the program. They specify the function's name, return type, and the types of its parameters.
Global Variables: Global variables are variables that can be accessed by any function in the program. They are usually defined outside of any function.
Functions: Functions are blocks of code that can be called by name to perform specific tasks. They can accept input parameters and return a value. Functions are generally declared before the main function.
Main Function: The main function is the entry point of the program. It's where the execution starts and ends. It has a return type of int and typically takes command-line arguments via two parameters: argc (argument count) and argv (argument vector).
Here's an example C program that demonstrates the structure:
// Preprocessor directives
#include <stdio.h>
// Function prototypes
void print_hello_world(void);
// Global variable
int global_var = 10;
// Functions
void print_hello_world(void) {
printf("Hello, World!\n");
}
// Main function
int main(int argc, char *argv[]) {
// Local variable
int local_var = 20;
printf("Global variable value: %d\n", global_var);
printf("Local variable value: %d\n", local_var);
print_hello_world();
return 0;
}
This simple C program demonstrates the use of preprocessor directives, a function prototype, a global variable, a function, and the main function. When run, it prints the values of a global and a local variable, followed by "Hello, World!".
you want to ensure that a query recordset is read-only and cannot modify the underlying data tables it references. How can you do that?
To guarantee that a query's recordset cannot make any changes to the original data tables, the "read-only" attribute can be assigned to the query.
What is the effective method?An effective method to accomplish this is to utilize the "SELECT" statement along with the "FOR READ ONLY" condition. The instruction signifies to the database engine that the query's sole purpose is to retrieve data and not alter it.
The SQL Code
SELECT column1, column2, ...
FROM table1
WHERE condition
FOR READ ONLY;
Read more about SQL here:
https://brainly.com/question/25694408
#SPJ1
You are working with a database table that contains invoice data. The table includes columns for billing state, billing_country, and total. You want to know the average total price for the invoices billed to the state of Wisconsin. You decide to use the AVG function to find the average total, and use the AS command to store the result in a new column called average_total. Add a statement to your SQL query that calculates the average total and stores it in a new column as average_total. NOTE: The three dots (...) indicate where to add the statement. 1 2 SELECT billing state, billing_country, 3 4 5 6 FROM invoice WHERE billing_state 7 Run 8 "WI" Reset What is the average total for Wisconsin?
Using the as command, you decide to create a new column called average total and use the avg function to determine the average total.
Fourth is the average of the invoice totals for each vendor, represented as VendorAvg, followed by the sum of the invoice totals for each vendor, represented as VendorTotal, VendorCount, and VendorCount. We use VendorID in the query since the result set needs to contain each vendor's unique invoices. You are utilizing a database table that holds information about invoices. The table has columns for total, billing state, and billing country. You're interested in learning the average total cost of the bills paid.
Learn more about command here-
https://brainly.com/question/3632568
#SPJ4
The position of a runner in a race is a type of analog data. The runner’s position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
The statement that best describes how the position of the runner is represented digitally is as follows:
The position of the runner is sampled at regular intervals to approximate the real-world position, and a sequence of bits is used to represent each sample.What is the explanation for this question?The explanation of this question relies on the position of the runner which is detected by sensors in a race. It is very difficult to keep track of every racer's position manually therefore computer programs are significantly utilized in order to keep exact recordings.
According to the context of this question, the data is sometimes recorded manually and is in the analog form which is converted into digital form for varieties of uses and applications.
Therefore, the position of the runner is sampled at regular intervals to approximate the real-world position, and a sequence of bits is used to represent each sample.
To learn more about Analog data, refer to the link:
https://brainly.com/question/26307469
#SPJ1
Your question seems incomplete. The most probable complete question is as follows:
The position of a runner in a race is a type of analog data. The runner’s position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
The position of the runner is determined by calculating the time difference between the start and the end of the race and making an estimation based on the runner’s average speed.The position of the runner is measured and rounded to either 0 or 1 depending on whether the runner is closer to the starting line or closer to the finish line.The position of the runner is predicted using a model based on performance data captured from previous races.The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sampleThe world has entered the threshold of Big Data Control economy and many nations have formed a magnificent digital colony within. The digital firestorm has emerged and weaponization of Data has taken center stage! Nations that control Data today will ultimately control the future. True or false?
An algorithm that could execute for an unknown amount of time because it depends on random numbers to exit a function may:_______
a. have a redundancy.
b. get caught in an infinite loop.
c. suffer from indefinite postponement.
d. issue a compiler error.
Answer:
c. suffer from indefinite postponement.
Explanation:
Algorithm is a set of rules that are followed in calculations or other problem solving operation by a computer. An algorithm may execute for unknown amount of time and it may suffer indefinite postponement. Algorithm depends on random numbers and it can execute continuously.
riel Sharry: Attempt 1
Question 3 (1 point)
What statement is true about Multi-level Lists?
If the top level is numeric, then the list can consist of numbers and/or Roman
numerals only.
If top level is bullet points, then the list can consist of round or square bullet
points only
If the top level is numeric, then the list can not contain letters in its sub-level
lists
The list can consist of any mix of numbers, bullet and /or letters
Question 4 (1 point)
Option D: The list can consists of any mix of numbers, bullets/or letters is true about multi level lists
What is the multi-level list?
A multidimensional data structure known as a multilevel linked list has two link pointers at each node: one point to the next node and the other to a child list that contains one or more nodes. A different list node may or may not be pointed to by this child pointer.
How to create a list:
Choose the text or numbered list that needs to be modified.
Click the arrow next to Multilevel List in the Paragraph group of the Home tab's Home tab.
Give your new list style a name.
Select the starting point for the list. ...
To apply your formatting, pick a level from the list.
Hence to conclude any multi-level list has mixture of numbers, bullets, letter
To know more on multilevel lists follow this link
https://brainly.com/question/14596364
#SPJ9
1timesinfinityequals
Answer:
1timesinfinity=1timesinfinity
any time your multiply a number buy one... its its self
Explanation:
Answer
1-time infinity is infinity and if infinity is multiplied with a negative it would be infinity and 0 multiplied by infinity will be........ Well none actually knows
describe each of the following circuits symbolically. use the principles you have derived in this activity to simplify the expressions and thus the design of the circuits
The Ohm's law states that the current passing through the conductor is proportional to the voltage applied across its ends. Kirchhoff's law applies to the conservation of charge and energy in an electric circuit. Series resistors are combined end-to-end, and their combined value is equal to the sum of the individual resistors. Parallel resistors, on the other hand, are combined side-by-side, and their combined value is equal to the reciprocal of the sum of the individual resistors.
In electronic circuit diagrams, symbols represent circuit components and interconnections. Electronic circuit symbols are used to depict the electrical and electronic devices in a schematic diagram of an electrical or electronic circuit. Each symbol in the circuit is assigned a unique name, and their values are typically shown on the schematic.In the design of circuits, it is crucial to use the principles to simplify expressions.
These principles include Ohm's law, Kirchhoff's laws, and series and parallel resistance principles. The Ohm's law states that the current passing through the conductor is proportional to the voltage applied across its ends. Kirchhoff's law applies to the conservation of charge and energy in an electric circuit. Series resistors are combined end-to-end, and their combined value is equal to the sum of the individual resistors. Parallel resistors, on the other hand, are combined side-by-side, and their combined value is equal to the reciprocal of the sum of the individual resistors. Therefore, in circuit design, simplification of the circuits can be achieved by applying these principles.
For more such questions on Ohm's law, click on:
https://brainly.com/question/231741
#SPJ8
Use the drop-down menus to describe how to add a data bar to a report.
1. Open the table in view.
2. Click the column of the desired numerical field.
3. Click the conditional tab Format, then .
4. In the Rules Manager dialog box, click .
5. Select to “compare to other records,” and determine whether you want the value and bar to show at the same time.
6. Adjust the desired length of the bar and the color. Click OK.
7. Once satisfied with your rule, click and then OK.
Answer:
1. layout
3. conditional formatting
4. new rule
7. apply
Explanation:
just did it on edge
Creating a company culture for security design document
Use strict access control methods: Limit access to cardholder data to those who "need to know." Identify and authenticate system access. Limit physical access to cardholder information.
Networks should be monitored and tested on a regular basis. Maintain a policy for information security.
What is a healthy security culture?Security culture refers to a set of practises employed by activists, most notably contemporary anarchists, to avoid or mitigate the effects of police surveillance and harassment, as well as state control.
Your security policies, as well as how your security team communicates, enables, and enforces those policies, are frequently the most important drivers of your security culture. You will have a strong security culture if you have relatively simple, common sense policies communicated by an engaging and supportive security team.
What topics can be discussed, in what context, and with whom is governed by security culture. It forbids speaking with law enforcement, and certain media and locations are identified as security risks; the Internet, telephone and mail, people's homes and vehicles, and community meeting places are all assumed to have covert listening devices.
To learn more about security culture refer :
https://brainly.com/question/14293154
#SPJ1
Which of the following is a digital advertising technology that helps a website or advertising network track a user's browsing activities, potentially across multiple websites visited?
Question options:
Pop-Up Ad
Adware
Beacon
Cookie
An advertising network or website can follow a user's browsing habits across potentially several websites by using a cookie, a digital advertising technique.
What does a cookie mean in marketing?They make it possible for advertising to profile their target consumers with never-before-seen precision. A simple bit of data that records every user's activity on a specific website is all that an advertising cookie really is.
In digital media, what does a cookie mean?As people visit various websites, cookies, which are little pieces of code, are added to their computer browsers. They provide a more personalized user experience by remembering past online activities including log-in information, location preferences, what is in your cart, and more.
To know more about Cookie visit:-
https://brainly.com/question/29359498
#SPJ1
Some non-health-care companies offer health and wellness programs that require employee participants to share personal data. They are required to employ standardized electronic transactions, codes, and identifiers under HIPAA regulations.
Some non-health-care companies offer health and wellness programs that require employee participants to share personal data is option A: True statement.
What is the employee participants about?To stop employees from visiting websites with offensive content, several businesses decide to install filters on their employees' computers. Unwanted exposure to such material by employees would be a significant indicator of harassment. Filters can help to prevent employees from wasting time on websites that are unrelated to their jobs.
Therefore, In order to prevent their employees from visiting websites that contain explicit videos or other unpleasant information, several businesses decide to install filters on their computers.
Learn more about wellness programs from
https://brainly.com/question/14553032
#SPJ1
Some non-health-care companies offer health and wellness programs that require employee participants to share personal data. They are required to employ standardized electronic transactions, codes, and identifiers under HIPAA regulations. A: true B: false
The time taken to complete a motorcycle race is normally distributed, with an average time (µ) of 2.5 hours and a standard deviation (sigma) of 0.5 hours.
What is the probability that a
The probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to finish the race is said to be 0.0781 = 7.81% probability.
What is the probability about?Probability is known to be the way or the measurement of the likelihood that a given event will take place.
Note that in the case above, the probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to finish the race is said to be 0.0781 = 7.81% probability.
See full question below
The time taken to complete a motorcycle race is normally distributed, with an average time (µ) of 2.5 hours and a standard deviation (sigma) of 0.5 hours.
What is the probability that a randomly selected cyclist will take between 2.35 and 2.45 hours to complete the race?
Learn more about race from
https://brainly.com/question/28062418
#SPJ1
How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.
Answer:
i choose choice D
Explanation:
reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit
In a team if someone gets stuck with the selected tasks for the iteration, what is the immediate next step?
Answer:
The team member has to immediately inform the lead or onsite coordinator without wasting time and take up another task
Explanation:
In a situation where someone in a team is unable to move further to another tasks the next step is for the team member to immediately inform the onsite coordinator in order for them to take up another task reason been that the onsite coordinator sole responsibility is to ensure the completion of tasks without any flaw and Secondly if the team members did not inform the onsite coordinator immediately it will eventually lead to waste of time due to the time spent on the tasks thereby affecting the next tasks.
Therefore the immediate next step is for the team member to immediately inform the lead or onsite coordinator without wasting time and take up another task.
What's the full meaning of BASIC in high level programming
Answer:
BASIC (Beginners' All-purpose Symbolic Instruction Code) is a family of general-purpose, high-level programming languages designed for ease of use.
Dynamic programming does not work if the subproblems: ___________
a. Share resources and thus are not independent
b. Cannot be divided in half
c. Overlap
d. Have to be divided too many times to fit into memory
Answer:
A. Share resources and thus are not independent
Explanation:
This would be the answer. If this is wrong plz let me know
What would game programmers do when decomposing a task in a modular program?
When decomposing a task in a modular program, game programmers follow a structured approach to break down the task into smaller, more manageable components.
This process is crucial for code organization, maintainability, and reusability. Here's an outline of what game programmers typically do:
1. Identify the task: The programmer begins by understanding the task at hand, whether it's implementing a specific game feature, optimizing performance, or fixing a bug.
2. Break it down: The task is broken down into smaller subtasks or functions that can be handled independently. Each subtask focuses on a specific aspect of the overall goal.
3. Determine dependencies: The programmer analyzes the dependencies between different subtasks and identifies any order or logical flow required.
4. Design modules: Modules are created for each subtask, encapsulating related code and functionality. These modules should have well-defined interfaces and be independent of each other to ensure reusability.
5. Implement and test: The programmer then implements the modules by writing the necessary code and tests their functionality to ensure they work correctly.
6. Integrate modules: Once individual modules are tested and verified, they are integrated into the larger game program, ensuring that they work together seamlessly.
By decomposing tasks into modules, game programmers promote code organization, readability, and ease of maintenance. It also enables parallel development by allowing different team members to work on separate modules simultaneously, fostering efficient collaboration.
For more such questions on programmers,click on
https://brainly.com/question/30130277
#SPJ8
Which of the following expressions in Java is equal to 4?
3% 7
7 % 3
17 % 7
11 % 7
28 % 7
Answer:
3% 7
Explanation:
because 7 because seven ate nine and three was lonely so seven decided to also eat three and became a lesser number somehow because three apparently was not as big as the number 9 so maybe eating three caused him to go down to 4
The expression "11 % 7" in Java is equal to 4.
The "%" operator calculates the remainder of a division operation.
In Java, the "%" operator is used to calculate the remainder of a division operation.
So, let's evaluate each expression and see which ones equal 4:
3 % 7 = 3 (remainder of dividing 3 by 7)
7 % 3 = 1 (remainder of dividing 7 by 3)
17 % 7 = 3 (remainder of dividing 17 by 7)
11 % 7 = 4 (remainder of dividing 11 by 7)
28 % 7 = 0 (remainder of dividing 28 by 7)
Based on these evaluations, the expression "11 % 7" is equal to 4.
To learn more about programming visit:
https://brainly.com/question/14368396
#SPJ3
Me Completan Pliiiis
Answer:
its in Spanish most people cant read Spanish
Explanation: