A list (in Python) can have

Answers

Answer 1

Answer:

It can have any number of items and they may be of different types (integer, float, string etc.). A list can also have another list as an item. This is called a nested list

Explanation:


Related Questions

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

Answers

Answer:

The correct solution is "Sponge ".

Explanation:

The method of transforming data into unreadable text is synonymous with cryptography, as well as vice-versa.The sponge configuration throughout cryptography seems to be a method of thought, based on a specific-length possible combination as well as a formatting law, which constructs a mechanism connecting variable-length information through variable-length release.

Referencing Microsoft Word:1. How can you save a document created using Word 2016 in a PDF format? Explain the process step by step.2. Assuming you are on the home tab, explain which tabs and buttons you would need to select to open a new blank document?3. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add the "Quick Print" icon to the Quick Access Toolbar.4. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add a bibliography to the document.5. Assuming you are on the home tab, explain which tabs and buttons you would need to select to put a picture within your document?6. Assuming you are on the home tab, explain which tabs and buttons you would need to select to change the page orientation to Landscape?7. What is the purpose of the "ribbon"?8. The Help button from previous versions of Office has been replaced by what words and what symbol?

Answers

Answer:

Referencing Microsoft Word:

1. How can you save a document created using Word 2016 in a PDF format? Explain the process step by step.

Step 1: Click on File Tab

Step 2: Click on Save As Button

Step 3: Select File Location for the document

Step 4: Name the document

Step 5: Save type: Select pdf

Step 6: Save

2. Assuming you are on the home tab, explain which tabs and buttons you would need to select to open a new blank document?

Step 1: Click on File Tab

Step 2: Click on New Button

Step 3: Select or Click Blank Document

3. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add the "Quick Print" icon to the Quick Access Toolbar.

Step 1: Click on File Tab

Step 2: Select Options Button

Step 3: Select Quick Access Toolbar

Step 4: Select Quick Print

Step 5: Click on Add

4. Assuming you are on the home tab, explain which tabs and buttons you would need to select to add a bibliography to the document.

Step 1: References Tab

Step 2: Click Bibliography

Step 3: Insert Bibliography or create as required.  

5. Assuming you are on the home tab, explain which tabs and buttons you would need to select to put a picture within your document?

Step 1: Click on File Tab

Step 2: Click the Open Button

Step 3: Click on Library

Step 4: Select Picture Location

Step 5: Select Picture

Step 6: Click Add

6. Assuming you are on the home tab, explain which tabs and buttons you would need to select to change the page orientation to Landscape?

Step 1: Click Layout Tab

Step 2: Select Orientation

Step 3: Click Landscape

7. What is the purpose of the "ribbon"?

The "ribbon" contains the 8 tabs on the Quick Access Toolbox: File, Home, Insert, Page Layout, References, Mailings, Review, and View.  The "ribbon" groups these specific command categories called tabs.

8. The Help button from previous versions of Office has been replaced by what words and what symbol?

It has been replaced with the lightbulb symbol with these words: “Tell me what you want to do…”  And you can also type Alt + Q to get the same help assistance.

Explanation:

The ribbon is a user interface element created by Microsoft and includes the roll of tabs and buttons.  The Ribbon tabs and buttons bring your favorite commands into the open by showing multiple commands grouped in specific categories.

There are eight tabs along on the ribbon: File, Home, Insert, Page Layout, References, Mailings, Review, and View. Each tab relates to different activities that you can carry out when creating a document.  For example, if you want to save a new document, you click on the File tab which takes you to the Save As button where you choose the file location and save as required.

Which of the following is typically used in a flowchart to indicate a decision?
a. square
b. rectangle
c. diamond
d. oval

Answers

Diamond is typically used in a flowchart or indicate a decision.

Decisions in flowcharts are indicated by diamonds.

What are flowcharts?

It is a pictorial or symbolic representation of the processes involved in achieving an aim.

In flowcharts, the following apply:

Ovals represent the beginning or end of a processRectangles represent key steps in the processArrows are used to indicate the flow or direction of the processDiamonds represent decision-making. When one of the available options has to be taken.

More on flowcharts can be found here: https://brainly.com/question/14598590

#SPJ2

which of the following characters cannot be used in filename?​

Answers

Answer:

# pound. % percent. & ampersand. { left curly bracket. } right curly bracket. ...

< left angle bracket. > right angle bracket. * asterisk. ? question mark. ...

$ dollar sign. ! exclamation point. ' single quotes. " double quotes. ...

+ plus sign. ` backtick. | pipe. = equal sign.

Explanation: You will get an error if you try to use these characters in a file name. - Google.

A computer has 38 address lines. How many locations in Mega bytes can it address?

Answers

Answer:

The computer can address 34359,738368 megabytes

Explanation:

Given

Address Lines (n) = 38

Required

Determine the number of location it can address

Number of addressable locations (N) in bits is calculated as thus

[tex]N = 2^n.[/tex]

Substitute 38 for n

[tex]N = 2^{38}[/tex]

[tex]N = 274877906944\ bits[/tex]

Next; is to convert from bits to megabytes

Start by converting to bytes

1 bit = 0.125 bytes;

So;

[tex]N = 274877906944 * 0.125\ bytes[/tex]

[tex]N = 34359738368\ bytes[/tex]

Convert from byte to megabyte

[tex]1\ byte = 10^{-6}\ megabyte[/tex]

So;

[tex]N = 34359738368\ * 10^{-6}\ MB[/tex]

[tex]N = 34359,738368\ MB[/tex]

Hence, the computer can address 34359,738368 megabytes

When should the architect begin the analysis?

Answers

Answer:

Right after the end user and the customer finalize the negotiations.

Explanation:

The architect's analysis is extremely important to ensure that a system acts correctly and efficiently. This analysis is carried out together with the implementation of codes and security systems, which will be responsible for the defense of the system. This analysis should begin immediately after the end user and the customer have completed negotiations that define all the requirements and information necessary to start the project.

What is Game Theory?
Study of strategic decision making
elements of support for effective support of a system
the imitation of the operation of real-world process or system over time
decentralized communications model

Answers

Answer:

the branch of mathematics concerned with the analysis of strategies for dealing with competitive situations where the outcome of a participant's choice of action depends critically on the actions of other participants

Explanation:

In simple terms Game theory is the study of how and why people make decisions.

This is C++
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
(2) Extend to also calculate and output the amount of paint in gallons needed to paint the wall. Assume a gallon of paint covers 350 square feet. Store this value using a const double variable. (2 pts)
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.514286 gallons
(3) Extend to also calculate and output the number of 1 gallon cans needed to paint the wall. Hint: Use a math function to round up to the nearest gallon. (2 pts)
Enter wall height (feet):
12
Enter wall width (feet):
15
Wall area: 180 square feet
Paint needed: 0.514286 gallons
Cans needed: 1 can(s)

Answers

Answer:

#include <cmath>

#include<iostream>

using namespace std;

int main()

{

double height, width;

cout<<"Enter wall height (feet): ";

cin>>height;

cout<<"Enter wall width (feet):  ";

cin>>width;

//1

double area;

area = width * height;

cout<<"Wall area: "<<area<<" square feet"<<"\n";

//2

const double gallon = area/350.0;

cout<<"Paint needed: "<<gallon<<" gallons"<<"\n";

//3

cout << "Cans needed :" << round(gallon) << " can(s)";  

return 0;

}

Explanation:

This line declares the height and width as double

double height, width;

This line prompts user for height

cout<<"Enter wall height (feet): ";

This line gets user input for height

cin>>height;

This line prompts user for width

cout<<"Enter wall width (feet):  ";

This line gets user input for width

cin>>width;

//1  Question 1 begins here

This line declares area as double

double area;

The line calculates area

area = width * height;

The line prints the calculated area

cout<<"Wall area: "<<area<<" square feet"<<"\n";

//2  Question 2 begins here

This line declares and calculates gallon as a constant double variable

const double gallon = area/350.0;

This line prints the calculated gallon

cout<<"Paint needed: "<<gallon<<" gallons"<<"\n";

//3  Question 3 begins here

This line rounds gallon to nearest whole number and prints the result

cout << "Cans needed :" << round(gallon) << " can(s)";  

Which section from the article BEST explains why humans could benefit from studying a particular type of extremophile?​

Answers

Answer:

The study of extremophiles provides an understanding of the physicochemical parameters defining life on Earth and may provide insight into how life on Earth originated. The postulations that extreme environmental conditions existed on primitive Earth and that life arose in hot environments have led to the theory.­NASA is studying an extremophile, Deinococcus radiodurans, which is extremely resistant to radiation. This microbe can withstand doses of radiation 500 percent higher than would be lethal to humans.

Hope this helped you!

Explanation:

What is a characteristic of maintaining logs in a system? A. Logging prevents security violations, but only deals with passive monitoring. B. Logging provides access control by authenticating user credentials. C. Logging helps an administrator to detect security breaches and vulnerable points in a network

Answers

Answer:

The correct answer is C

Explanation:

When analysed, logs can help to forestall security breaches to a network it can also help to identify and resolve any vulnerabilities within the system.

Due to the number of logs generated daily, it is almost impracticable to constantly monitor all logs generated by the system.

Cheers!

Overlay analysis is ____________, taking in data from two or more layers to create a single output layer.

Answers

Explanation:

Overlay analysis is an approach, taking in data from two or more layers to create a single output layer.

For example, if we have a layer of land use and a layer of soil fertility, we can derive from the two layers the percentage of agricultural land developed over fertile soil.

Which of the following is considered data?A. Quantity sold.B. Best customer by month.C. Best selling item by month.D. Worst selling item by month.

Answers

Answer:

A

Explanation:

A.

The Active Directory Users and Computers tool can be used to:______.

Answers

Answer:

add users, reset passwords, enable dial-In access, and manage computersin the domain.

Explanation:

Active Directory Users and Computers is an administrative tool, that is used to perform or carry out various tasks relating to administration processes. It can be utilized in the administration of an organization memberships and company server.

Hence, the Active Directory Users and Computers tool can be used to add users, reset passwords, enable dial-In access, and manage computers in the domain.

Which of the following is the fundamental unit of the virtualized client in an IaaS deployment? a)Workload b)Workspace c)Work unit

Answers

Answer:

a. Workload

Explanation:

The most fundamental unit of the virtualized client in an IaaS deployment is the workload because it simulates the potential of a certain server to perform a specific amount of work given.

When a hardware or software interrupt occurs, the CPU calls________

Answers

Answer:

Operating system

Explanation:

An interrupt is the signal sent to the processor that interrupts the current process. It may be generated by a hardware device or a software program.With each interrupt the CPU hardware does exactly the same thing, which is what enables operating systems to take control of the current user operation.

Mention five specific techniques you can use to improve your written documents.

Answers

Answer:

The answer is below

Explanation:

There are various techniques an individual can use to improve his or her written documents, some of which considered to be specific are:

1. Understand the targeted readers.

2. Do not be ambiguous or avoid ambiguity

3. Always use active voice pattern whenever possible

4. Perform second reading, and edit where necessary

5. Avoid repetition of words too often.

Which of the following is no longer necessary when you use HTML5 to develop Webpages? Please Hurry This Is For An Assignment due in 15 minutes :>

Answers

Answer:

Installing a third-party plug-in to include video

Explanation:

How to see the range of values of vty lines?

Answers

Answer:

To get the range of very lines in a switch or a router, in the global mode, type " line very" and the question mark after the space. It displays the ranges of valid very lines in the device.

Explanation:

Routers and switches are intermediate components of a computer network. They are used to connect various nodes and networks. For a remote connection, they use the virtual interface called vty to connect to computers for management purposes. These vty lines allows for SSH and telnet access from workstations and the range of very lines are predetermined and limited and varies for all switches and routers.

When you want to use the current backup of all of the files, which option should be selected?

Answers

Answer:

To use the current backup of all the files, the option to select is Browse for Folders.

This gives you access to select the most current back up with the latest timestamp.

Cheers!

Which of the following are offered by most
professional organizations? Check all of the boxes
that apply.
a code of conduct
access to resources, conferences, and job
boards
help with troubleshooting computer issues
skills validation

Answers

Answer:

1. A code of conduct

2. Access to resources, conferences,and, job boards

4. skills validation

Explanation:

I just answered it

A code of conduct is a collection of regulations describing an individual party's or organization's norms, standards, and duties or right procedures. The correct options are A, B, and D.

What is a code of conduct?

A code of conduct is a collection of regulations describing an individual party's or organization's norms, standards, and duties or right procedures. The most prevalent policy within a company is a code of conduct. This policy outlines the company's beliefs, standards, and moral and ethical expectations for workers and third-party interactions with the firm.

From the given set of options, the options that are offered by most professional organizations are,

A code of conductAccess to resources, conferences, and job boardsSkills validation

Hence, the correct options are A, B, and D.

Learn more about the Code of Conduct here:

https://brainly.com/question/12990307

#SPJ2

The user documents are stored in _______ format.

Answers

The user documents are stored in _______ format.

A. qvd.

B.  qvw

C.  None of the options

D.  qvs.

Answer:

B.  qvw

Explanation:

Given the options available, it can be inferred that the application the question is referring to is called QlikView which is a software application that is used for analytics explanation. This software applications saves documents created in a file extension specifically known as "QVW."

Hence, the right answer is that: in QlikView, the user documents are stored in QVW format.

The user documents are stored in QVW format.

It may well be deduced that perhaps the program referred to something throughout the question would be QlikView, a software platform utilized for analytics explanations or presentations.QVW documents seem to be QlikView layout software consisting incorporate presentations, charts, leading components, load scripts, expressions, as well as workplaces used in information displays.

Thus the above answer is right.

Learn more about the QVW format here:

https://brainly.com/question/10205740

Which of the following is the correct representation of -780,030,000 in exponential notation?

Answers

The answer is -7.8003 x 10^8

What is programming blocks?

Answers

Answer:

In computer programming, a block or code block is a lexical structure of source code which is grouped togethe

Explanation:

what is the principle that producers are entitled to make more money from a business than they invest

Answers

Answer: profit motive

Explanation: i don’t have and explanation but i just did it on apex and got it right

A maintenance schedule lists the procedure for defragmenting your hard drive true or false

Answers

I think it's true not sure sorry if it's wrong

Answer:

false

can i has brainliest

Explanation:

Given the list of customer segments below please create a new list of the names of the segments only using(a) a for loop(b) a list comprehension(c) a map().List would look something like ['Wallstreet','Gambler','Parents'] but of course using each tool as listed:segments = [{'name': 'Wallstreet', 'average_spend': 82.01}, {'name': 'Gambler', 'average_spend': 107.00}, {'name': 'Parents', 'average_spend': 10.52}]

Answers

Answer:

new_segment = [ ]

for segment in segments:

   new_segment.append({'name': segment, 'average_spend': money})

print( new_segment)

Using list comprehension:

new_segment =[{'name': segment, 'average_spend': money}  for segment in segments]

Using map():

def listing(a):

   contain =  {'name': segment, 'average_spend': money}

   return contain

new_segment = [ ]

new_segment.append(map( listing, segment))

print(list(new_segment)

Explanation:

The python codes above create a list of dictionaries in all instances using for loop, for loop in list comprehension and the map function which collect two arguments .

Check
Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked? Check all that
apply.

Answers

Which of these tasks can be accomplished when the drop-down menu of the Bullets icon is clicked? Check all that

apply.

Indent the ideas in the bulleted list.

Change the number level of the list.

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Pick the number format to be used in the list.

Answer:

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Explanation:

When using Microsoft Word text editor, when the drop-down menu of the bullet icon is clicked, the following tasks can be accomplished which are to choose the bullet to be used in the list and define the new bullet to be used in the list.

A bullet is used to identify or list out important items, sometimes in ascending order, and are used to organize information to make the important points easy to pick out.

Answer:

Choose the bullet to be used in the list.

Define the new bullet to be used in the list.

Explanation:

.

Which of the following best describes how computing devices represent information? A. A computer will either represent information as bits or bytes but not both B. A computer represents data as a byte which is either a 0 or a 1 C. A computer represents data as bits which is either a 0 or a 1 D. A computer represents information as bits which contain 8 bytes.

Answers

Answer:

The Answer is B

Explanation:

The reason the answer is B is because "bytes" are the correct form of storing memory in 0's and 1's.

Using concepts of data representation in a computer, it is found that the correct option is:

C. A computer represents data as bits which is either a 0 or a 1.

-----------------

In computer science, it is a common saying that "everything inside a computer is either a 0 or 1".The unit of measure that only has 0s and 1s is bits.If we load a file, either text or image, all the values at each position on the file are composed by 0's and 1's, for example.Thus, option C is correct.

A similar problem is given at https://brainly.com/question/17399642

Java Programming home > 1.14: zylab training: Interleaved input/output Н zyBooks catalog Try submitting it for grading (click "Submit mode", then "Submit for grading"). Notice that the test cases fail. The first test case's highlighting indicates that output 3 and newline were not expected. In the second test case, the-5 and newline were not expected 2 Remove the code that echoes the user's input back to the output, and submit again. Now the test cases should all pass 0/2 ACTIVITY 1.14.1: zylab training: Interleaved input/output DoubleNum.java Load default template 1 import java.util.Scanner; 3 public class DoubleNum public static void main(String args) { Scorner sehr = new Scanner(System.in); int x; 7 System.out.println("Enter x: "); 9 - scnr .nextInto: 10 11 System.out.println(); // Student mistakenly is echoing the input to output to match example 12 System.out.println("x doubled is".02 Develop mode Submit mode Run your program as often as you'd like, before submitting for grading. Below, type any needed Input values in the first box, then click Run program and observe the programs cutout in the second be Enter program input (optional) of your code requires input values, provide them here Ad Cat

Answers

Answer:

The following are the code to this question:

code:

System.out.println(x);  //use print method to print value.

Explanation:

In the given question, it simplifies or deletes code in the 11th line. This line has a large major statement.  

In the case, the tests fail because only 1 line of output is required by the tester, but two lines are obtained instead.

It's to demonstrate that the input/output or testing requirements function throughout the model.

Which firmware security standard can be used to store disk encryption keys?A. SLAB. TPMC. UEFID. USB

Answers

Answer:

Option B (TPM) is the appropriate choice.

Explanation:

A TPM seems to be a specific form of the protected crypto operating system which seems to be a specialized piece of hardware being used to perform cryptographic techniques such as collecting encrypted data to classified material that is typically was used to validate hardware by either the host machine.The pairing is kept or inside the chip as well as therefore can not be software-accessed.

Other alternatives given weren't concerning the circumstance mentioned. So the response to the above seems to be the right one.

Other Questions
Solve and graph the inequality. 22 nAscientist performs an investigation and discovers that increased temperature decreases the number of offspring that anorganism produces. Then, the scientist asks a new question about the impact of climate change on the species becauseO the scientist's first question was not a scientific question.the scientist modified the hypothesis for the investigation.the results of the investigation led to new scientific questions,questions about the impact of temperature reflect an opinion.Mark and retumSave and ExitNextSubmitSign outUS 18:0 Which represents the solution set of the inequality 5x-9 3 times an unknown number is 21. Find the unknown number. The unknow number is A store had a grand opening sale. During the sale, each person entering the store receiveda coupon for 10% off their entire purchase. The table lists the number of people who receiveda coupon. Example of nouns whose gender must be memorized because they don't follow the rules. The Mound Builders were American Indians who flourishedin the Great Plains.in the Southwest.in woodlands around the Great Lakes.in the Ohio and Mississippi River valleys. The unadjusted trial balance of the Manufacturing Equitable at December 31, 2011, the end of its fiscal year, included the following account balances. Manufacturings 2011 financial statements were issued on April 1, 2012.Accounts receivable $ 92,500Accounts payable 35,000Bank notes payable 600,000Mortgage note payable 1,200,000Other information:a. The bank notes, issued August 1, 2011, are due on July 31, 2012, and pay interest at a rate of 10%, payable at maturity.b. The mortgage note is due on March 1, 2012. Interest at 9% has been paid up to December 31 (assume 9% is a realistic rate). Manufacturing intended at December 31, 2011, to refinance the note on its due date with a new 10-year mortgage note. In fact, on March 1, Manufacturing paid $250,000 in cash on the principal balance and refinanced the remaining $950,000.c. Included in the accounts receivable balance at December 31, 2011, were two subsidiary accounts that had been overpaid and had credit balances totaling $18,000. The accounts were of two major customers who were expected to order more merchandise from Manufacturing and apply the overpayments to those future purchases.d. On November 1, 2011, Manufacturing rented a portion of its factory to a tenant for $30,000 per year, payable in advance. The payment for the 12 months ended October 31, 2012, was received as required and was credited to rent revenue.Required:(1) Prepare any necessary adjusting journal entries at December 31, 2011, pertaining to each item of other information (ad).(2) Prepare the current and long-term liability sections of the December 31, 2011, balance sheet. a rectangular picture has a length of 9 1/2 feet and width of 7 7/8 feet. How will you determine how much border is needed.a. add 9 1/2 and 7 7/8b. multiply 9 1/2 and 7 7/8c. estimate with length 9 feet and width 7 feetd.estimate with length 10 feet and length 8 feet Characteristics of Wrightland1. Decisions are made by majority rule.2. Prices are used to allocate resources.3. Consumer sovereignty is strong.What type of economic system does Wrightland have?Command economyCommunist economyTraditional economyMarket economy Brianna has $75 saved. She works $12 per hour babysitting.Part 1: Write an expression that represents how much money Brianna willhave total after workingh hours.Part 2 How much money will she have after babysitting for 6.5 hours? Write the polynomial in standard form that represents the perimeter of the quadrilateral3x - 22x12x+15x - 2The solution is What would happen if people stopped burning fossil fuels? *Climate change would be reducedPlants would struggle to growOcean water would become more acidicThe atmosphere would heat up faster A ________ is a temporary activity a company undertakes to create a unique product, service, or result. Helpppppppppppppppppppppppplz Serena wants to create snack bags for a trip she is going on. She has 6 granola bars and 10 pieces of dried fruit. If the snack bags should be identified without any food leftover, what is the greatest number of snack bags Serena can make? 40. (Wear, Were, Where) do we (way, weigh) in for wrestling?41. She didn't (wear, were, where) her new outfit because she was afraid itwould get dirty.42. There is a (right, write) (way, weigh) and a wrong (way, weigh) to(right, write) an essay.43. She felt (weak, week) when she didn't eat breakfast.44. Mom asked me to (grate, great) the cheese for the salad.Please I need help I speak little English Explain the difference between the justice system laws and scientific laws PLZZZZ HELP ME!!!!! I WiLL MARK U AS BRAINLIEST A freely suspended magnet does not point exactly at the geographical N-S direction