Answer:
array = input("Enter the list of computer memory: ").split(',')
int_arr = [int(x) for x in array]
segment = int(input("Enter the length of segment to analyze: "))
list_len = len(int_arr)
segList = []
mini = []
for x,i in enumerate(int_arr):
seg = int_arr[i-1:segment+i-1]
if len(seg) == segment:
segList.append(seg)
for x in segList:
mini.append(min(x))
result = mini.index(min(mini))
print("Segment with the minimum memory is: ",segList[result])
Explanation:
The python program prints out the segment after analysis, with the smallest disk memory space. The code gets the array of computer rows from the user input and segments the array with the number of segment input, then the minimum is compared for all segments in the network.
In python, Write a function (name: identi Substring) that, given a string S, returns an integer that represents the numbers of ways in which we can select a non-empty substring of S where all of the characters of the substring are identical. Two substrings with the same letters but different in locations are still considered different. For example, the string "zzzyz" contains 8 such substrings. Four instances of "z", two of "zz", one of "zzz" and one instance of "y". String "k" contains only one such substring:"k". The length of S will be between 1 and 100, inclusive. Each character in S will be a lowercase letter (a-z).
Answer:
def identiSubstring(S):
n = len(S)
inst = ""
count= 0
for Len in range(1,n+1):
for i in range(n-Len+1):
for k in range(i,i + Len):
inst =inst+S[k]
if(len(set(inst)) == 1):
count = count + 1
inst = ""
return count
S = input("Enter a string: ")
if(len(S)>=1 and len(S)<=100):
print("There are "+str(identiSubstring(S.lower()))+" possible occurrences")
else:
print("Length is invalid")
Explanation:
This line defines the required function
def identiSubstring(S):
This calculates the length of string S
n = len(S)
This initializes an instance of the required string to an empty string
inst = ""
This initializes count to 0
count= 0
This following iterations iterate through the length of the string
for Len in range(1,n+1):
for i in range(n-Len+1):
for k in range(i,i + Len):
This gets an instance of string S
inst =inst+S[k]
This checks if the characters of the instance are identical
if(len(set(inst)) == 1):
If yes, the counter is incremented by 1
count = count + 1
This instance is reset back to an empty string
inst = ""
This returns the number of instances of the substring
return count
The main begins here
This prompt user for a string
S = input("Enter a string: ")
This checks for valid length
if(len(S)>=1 and len(S)<=100):
If length is between 1 and 100 (inclusive), this calls the identiSubstring function
print("There are "+str(identiSubstring(S.lower()))+" possible occurrences")
If otherwise
else:
This prints invalid length
print("Length is invalid")
See attachment
how do you evaluate the use of the navigational aids and technology
Explanation:
A navigational aid or AtoN or navaid is any sort of marker that guides to mark safe waters and also help mariners in determining their position with respect to land or any navigational hazard or hidden danger. Traditionally aids to navigation have been physical aids such as lighthouses, buoys and beacons
Krista needs to configure the default paste options in PowerPoint 2016. Which area of the Options dialog box will she need to use to configure these options?
Proofing
General
Save
Advanced
Answer:
[tex]\red{\underline{\underline{\sf{Answer :-}}}} [/tex]
★ Advanced
Answer: General
Explanation:
Create a Java program that takes input of a list of integers from the user, stores them into an array and then finally uses the array contents to output the list of integers in reverse. The user's input begins with the number of integers to be stored in the array. For coding simplicity, follow each output integer by a space, including the last one. Assume that the list will always contain fewer than 20 integers.
Answer:
This question is answered using Java
import java.util.*;
public class Main{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Length of array: ");
int len = input.nextInt();
int[] intArray = new int[len];
for(int i = 0; i<len;i++){
intArray[i] = input.nextInt();
}
for(int i = len-1; i>=0;i--){
System.out.print(intArray[i]+" ");
}
}
}
Explanation:
This line prompts user for length of array
System.out.print("Length of array: ");
This gets the length of the arrau
int len = input.nextInt();
This declares the array as integer
int[] intArray = new int[len];
The following iteration gets input to the array
for(int i = 0; i<len;i++){
intArray[i] = input.nextInt();
}
The following iteration prints the array in reversed order
for(int i = len-1; i>=0;i--){
System.out.print(intArray[i]+" ");
}
For an interview, the most used microphone types are
A. Boom mics, long range mics
B. Strap, studio recording mics
C. Lapel or handheld
D.No mics are needed
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
Coding portion:
public class Password
{
public static void main(String[] args)
{
// Prompt the user to enter their password and pass their string
// to the passwordCheck method to determine if it is valid.
}
public static boolean passwordCheck(String password)
{
// Create this method so that it checks to see that the password
// is at least 8 characters long and only contains letters
// and numbers.
}
}
Answer:
import java.util.regex.*;
import java.util.Scanner;
public class Password
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.println("Please enter the Password. \n");
String passwordString = input.next();
System.out.println(passwordCheck(passwordString));
}
public static boolean passwordCheck(String password){
if(password.length()>=8 && password.matches("[a-z0-9A-Z]+")){
return true;
}
else{
return false;
}
}
}
Explanation:
The Java class "Password" is used by the program to make an instance of the password object and check its validity with the passwordChecker method defined within the Password class. The passwordChecker method only matches alphanumeric passwords, that is, passwords with alphabets and numbers. If a non-alphanumeric character is encountered, the boolean value false is returned.
hurry i need help swear to god i will give brainliest not lying
Answer:
finding area of a circle
def area(radius):
int(radius)
formula = radius * radius * 3.14
print(formula)
radius_input = int(input('Insert the radius of your circle: '))
area(radius_input)
hope this helped :D
C++
Write a program that reads in at most 100 integers that are between 1 and 100 and counts the occurrence of each number in the list. Assume the list ends when a zero is inputted.
Answer:
#include <iostream>
#include <map>
using namespace std;
int main()
{
map<int, int> numbers;
cout << "Enter numbers, 0 to finish" << endl;
int number;
while (true) {
cin >> number;
if (number == 0) break;
numbers[number]++;
}
for (pair<int, int> element : numbers) {
std::cout << element.first << ": occurs " << element.second << " times" << std::endl;
}
}
Explanation:
One trick used here is not to keep track of the numbers themselves (since that is not a requirement), but start counting their occurrances right away. An STL map< > is a more suitable construct than a vector< >.
Biodiversity explanation
explain the major innavotions made from the establishment of abacus
Answer:
The summary of that same question would be described throughout the following section.
Explanation:
Specification of simple or rough arithmetic has been accomplished through imaginative technologies with stone blocks, developers have always used computer systems again for the past decades. The varying forms of technology of the 5th generation were indeed desktops, notebooks, or laptops, and they can look at images of pieces of machinery that have been pioneered before today's computer systems.
if resistors were 10 times larger what would happen to output voltage
Answer:
is there a picture to go w the question?
The OpenMP critical-section compiler directive is generally considered easier to use than standard mutex locks, because
Complete question
A) management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors.
B) programmers don't need to worry about race conditions.
C) a thread cannot block inside a critical section.
D) deadlock cannot occur.
Answer:
A. Management of entry and exit code is managed by OpenMP library reducing the possibility of programming errors
Explanation:
This is a multiple choice question and this is the answer because:
1. OpenMp is inclusive of an APL/compiler directives:
2. any code which follows #pragma omp parallel is a parallel region and it is performed by large number of threads that are same as the number of processing cores that are in the system.
3. The critical-section compiler directive acts more like a binary semaphore or mutex lock,it makes sure that only one thread is active in the critical section at the same time.
Helen is working on her colleague’s photos. She came across this particular photo and was confused about which effect the photographer had used in the photo. Can you help her figure out the effect?
The effect used in the photo is
Answer:
it could be Tilt-shift - Tilt-shift effect - or Miniature faking.
Explanation:
Fill in the blank are always hard when the system has a set answer. But photographers commonly use the tilt-shift effect to focus on a certain part of the image while blurring the rest of the photograph. They refer to this as selective focus. You can use the tilt-shift effect and selective focus for miniature faking. This is where the subjects in the photograph appear miniaturized. Hope this helps
Answer: tilt-shift
Explanation:
If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color
Answer:
watermark
Explanation:
Course Aggregation Many times, departments are only interested with how students have done in courses relative to a specific major when considering applicants for admission purposes.
For this problem you are given a dictionary where the keys are strings representing student ids and the values are dictionaries where the keys represent a course code and the value represents a grade. Your task is to write a function that given a dictionary of the described format and a prefix for course codes, return a dictionary where each key is a student id and the corresponding value is the average grade of the student only in courses that start with the given prefix.
def course_grader (student_to_grades, course_prefix): ({str, {str, float}}) -> {str, float} I: a dictionary containing the grades of students (as described above) and a course code prefix P: compute and store the average grade of all students only for courses that start with the given course prefix 0: a dictionary of student ids to average grades as described in the Processing step pass
Answer:
def course_grader(student_to_grades, course_prefix):
student_grades = dict()
for key, value in student_to_grades.items():
grade_score = 0
for course,grade in value.items():
if course_prefix == course:
grade_score += grade
student_grades[key] = grade_score / len(value.keys())
return student_grades
Explanation:
The course_grader function is a python program that accepts two arguments, the student dictionary and the course prefix. The function returns a dictionary of the student id as the key and the average grade of the student as the value.
Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across?
Compatibility Checker
Accessibility Checker
Insights
AutoCorrect
Answer:
Accessibility Checker
Answer:
answer is accessibility checker or B on edge
Which contact field is used to control the name that would appear in the To field of an email message when a user is sending a message to a contact?
Display As
File As
Save As
Full Name
Answer:
Display as
Explanation:
Need the same question, but that's my guess, because display, means to show.
Answer: file as
Explanation:
correct on edg 2021
The material inspection and recieving report the multi-purpose document that serves as evidence of inspection and acceptance, shipping document, receiving document, and contractor invoice is designated as the:________.
Answer:
DD Form 250
Explanation:
DD Form 250 which is an acronym for Department of Defense Form 250.
It is the Material Inspection and Receiving Report that is used for contracts supplies and services including acquiring noncommercial commodities such as:
1. Acknowledgment of equipment by the Government
2. Contractor's invoice for expense.
3. loading record for hauling and acquiring.
4. Proof of Government Quality assessment.
Hence, in this case, the correct answer is DD Form 250.
Which tab should you use to change the text font color in your presentation?
Answer:
The Home Tab
Explanation:
PLS HELP ASAP- Select the correct text in the passage.
Which concept explained in the paragraph below means that data always remains consistent?
Specific programs have some tasks that a computer must perform in parallel with others. These tasks (such as the performance of the same set of operations on different data sets) often work in parallel clusters. In such cases, a separate thread of execution handles each separate task. You can think of a thread as a sequence of instructions that computers can manage independently.
It is possible for different threads to access the same data elements and change their values, and this can lead to an inconsistent state of information. For instance, if multiple programs access a shared variable x and change its value, the variable will not contain the correct value at the end of the programs. We can prevent such inconsistencies by using locks. A thread puts a lock on shared data, and releases this lock only after completing its operations.
Answer:
reread the text
Explanation:
I do it it helps
Answer:
A thread puts a lock on shared data, and releases this lock only after completing its operations.
The last sentance
Explanation: TRUST ME ISTG THATS THE ANSWER
g Create a Java program that takes input of a list of integers from the user, stores them into an array and then finally uses the array contents to output the list of integers in reverse. The user's input begins with the number of integers to be stored in the array. For coding simplicity, follow each output integer by a space, including the last one. Assume that the list will always contain fewer than 20 integers.Create a Java program Ex: If the input is: 8 5 2 3 4 10 6 8 9
Answer:
import java.util.Scanner;
public class Main{
public static void main(String[] args) {
int arraylent;
Scanner input = new Scanner(System.in);
System.out.print("Array Length: ");
arraylent= input.nextInt();
int[] myarray = new int[arraylent];
for(int i = 0; i<arraylent;i++)
myarray[i] = input.nextInt();
for(int i = arraylent-1; i>=0;i--)
System.out.println(myarray[i]);
}
}
Explanation:
This declares the length of the array
int arraylent;
This next two lines prompt and get the array length i.e. number of input
System.out.print("Array Length: ");
arraylent= input.nextInt();
This declares the array as type integer. And the length of the array is gotten from the user input
int[] myarray = new int[arraylent];
This gets the items of the array
for(int i = 0; i<arraylent;i++)
myarray[i] = input.nextInt();
This reverse and prints the array
for(int i = arraylent-1; i>=0;i--)
System.out.println(myarray[i]);
How can you get access to help? Check all that apply
Answer:
The answer is "F1"
Explanation:
Please find the complete question in the attachment file.
The F1 key is also known as the function key, which can be used to configure on a device or console key to cause such actions, a form of a soft button, to also be performed by a web browser control parser or software application. The main purpose of the F! key is to open the Help screen for all programs.
Write a program that reads a stream of integers from a file and prints to the screen the range of integers in the file (i.e. [lowest, highest]). You should first prompt the user to provide the file name. You should then read all the integers from the file, keeping track of the lowest and highest values seen in the entire file, and only print out the range of values after the entire file has been read.
Answer:
This question is answered using C++ programming language
#include <fstream>
#include<iostream>
using namespace std;
int main() {
string fname;
cout<<"Enter Filename: ";
cin>>fname;
int lowest = 0;
int highest = 0;
ifstream ifs(fname);
int x;
while (ifs >> x){
if(x < lowest){
lowest= x;
}
if(x > highest) {
highest = x;
}
}
ifs.close();
for(int i = lowest; i<=highest;i++)
{
cout<<i<<" ";
}
}
Explanation:
This line declares fname as string
string fname;
This prompts user for filename
cout<<"Enter Filename: ";
This gets filename
cin>>fname;
This declares and initializes lowest to 0
int lowest = 0;
This declares and initializes highest to 0
int highest = 0;
This defines the file using ifstream
ifstream ifs(fname+".txt");
This declares x as integer. x is used to read integers in the file
int x;
The following iteration will be repeated until there is no other integer to be read from the file
while (ifs >> x){
This checks for lowest
if(x < lowest){
lowest= x;
}
This checks for highest
if(x > highest) {
highest = x;
}
}
This closes the file. i.e. the file has been read
ifs.close();
The following iteration prints the range of values from lowest to highest
for(int i = lowest; i<=highest;i++) {
cout<<i<<" ";
}
Please note that the filename must be entered with its extension
The Boolean operators include which of the following?
A. and, or, not
B. to, for, from
C. a, an, the
D. is, are, not
Answer:
The answer is A. and, or, not
Explanation:
Using a Boolean search can help narrow your results. A Boolean search is a query that uses the Boolean operators AND, OR, and NOT, along with quotation marks, to limit the number of results. For example, searching the terms Alexander the Great AND conquests will provide results about Alexander, great, and their conquests.
cutting of trees is bad or not bad
Answer:
bad
Explanation:
it gives out air and oxygen
2. When You buy 4 GB memory unit (pendrive) you
will get memory less than 4 GB?
Answer:
Yes.
Explanation:
I believe so, because the pendrive takes some storage for it to actually function. If they wanted it to have exactly 4 GB of memory, they would have to add extra memory.
dad always arrives home from work thoroughly exhausted
Select the correct answer. Which type of computer application is Apple Keynote? OA. word processor O B. spreadsheet O C. presentation OD. database O E. multimedia
Answer:
Apple Keynote is presentation Software
The correct option is C
Explanation:
Now let explain each option
Word processor:
Word processor is incorrect because it is used to type text, format it add tables and figures, For example MS Word
Spread Sheet:
Spread Sheet is incorrect as it is used for calculation. Like MS Excel
Presentation:
Key tone is a presentation software. it is used to make presentation and add animation and transition to it.
Database
Database is incorrect because databases are used for storing data. Not for presentation.
The type of device which is 3 ½ inch floppy drive is
Answer:
That would be known as a floppy disk(literally)
Explanation:
It is a removable magnetic storage medium. They are used for moving information between computers, laptops or other devices.
dumb question but...for christmas should i get the animal crossing switch or the forrnite one which has a lot and a colored doc?
Answer:
Its your decision but I would go with animal crossing!