Answer: There are 16 daisies.
Explanation: In order to find this number, multiply 5 by 8. This will get you 40. Then, multiply 2 by 8. This will get you 16. Hope this helps. :)
The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a comma-separated collection of integers: ‘111, 22,3333,4’. Complete the function to return the indexth value (counting from zero) from the comma-separated values as an integer. For example, your code should return 3333 (not ‘3333 *) if the example string is provided with an index value of 2. Hints you should consider using the split() method and the int() function. print.py 1 – def get_nth_int_from_CSV(CSV_string, index): Show transcribed image text The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a comma-separated collection of integers: ‘111, 22,3333,4’. Complete the function to return the indexth value (counting from zero) from the comma-separated values as an integer. For example, your code should return 3333 (not ‘3333 *) if the example string is provided with an index value of 2. Hints you should consider using the split() method and the int() function. print.py 1 – def get_nth_int_from_CSV(CSV_string, index):
Answer:
The complete function is as follows:
def get_nth_int_from_CSV(CSV_string, index):
splitstring = CSV_string.split(",")
print(int(splitstring[index]))
Explanation:
This defines the function
def get_nth_int_from_CSV(CSV_string, index):
This splits the string by comma (,)
splitstring = CSV_string.split(",")
This gets the string at the index position, converts it to an integer and print the converted integer
print(int(splitstring[index]))
Information Technology
Answer:
whats the question
Explanation:
Answer: The study or use of systems. Especially computers and telecommunications for storing, retrieving, and sending information.
Explanation: I don't know what you're asking buddy. If you're asking for the definition then there you go. Next time add the question :)
Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, man-in-the-middle attacks, exploitation of commands/user accounts/passwords, or capture and replay of the data packets later to control devices or access remote connections.
Answer:You should note entries for each PCAP file in Wireshark that are of interest as from ENCM 369 at ... file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, ...
Explanation:
what is Windows software
Answer:
window software is a platform made by windows that is written in JavaScript and visual basic ,c
Explanation:
window software is a platform made by windows that is written in JavaScript and visual basic ,c .
Microsoft Windows, commonly referred to as Windows, is a group of several proprietary graphical operating system families, all of which are developed and marketed by Microsoft. Each family caters to a certain sector of the computing industry
a farmer cultivates 1/4 of his farm with ground nuts and 2/5 of it with maize what is the total landnarea that is cultivated
Answer:
13/20
egeringioerngierngineriogneirognoernogenroiernonoirenogneogneiong
Amelia is home alone, and her tablet will not turn on. How can she approach solving this problem?
Throw the tablet away because it's junk.
Try plugging the tablet in to see if it needs to charge.
Call her Dad and ask him to come home early.
Watch a movie instead.
Answer:
plug it in. sjjssjjsnsjsjsjsjs
Answer:
Try plugging the tablet in to see if it needs to charge.
Explanation: it’s the most logical approach that won’t cause any unnecessary promblems. If it doesn’t turn on then she can try something else.
Solving Systems of Equations by Substitution
pdf
The set of three integer values for the lengths of the sides of a right triangle is called a Pythagorean triple. These three sides must satisfy the relationship that the sum of the two sides is equal to the square of the hypotenuse. Find all integer Pythagorean triples for side1, side2, and the hypotenuse, all no larger than 500. Use a triple-nested for loop that tries all possibilities. This program is an example of brute force computing. You will learn in more advanced computer science courses that there are many interesting problems for which there is no algorithmic approach other than using sheer brute force. This program does not need any input from the user. Write at least one bool function that takes the 3 sides of the triangle and returns true or false based on if it is a right triangle or not.
Answer:
In Python:
def Pythagorean_triple(hyp,side1,side2):
if hyp**2 == side1**2 + side2*2:
return True
else:
return False
print("Hypotenuse\tSide 1\t Side 2\t Return Value")
for i in range(1,501):
for j in range(1,501):
for k in range(1,501):
print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))
Explanation:
This defines the function
def Pythagorean_triple(hyp,side1,side2):
This checks for pythagorean triple
if hyp**2 == side1**2 + side2*2:
Returns True, if true
return True
else:
Returns False, if otherwise
return False
The main method begins
This prints the header
print("Hypotenuse\tSide 1\t Side 2\t Return Value")
The following is a triple-nested loop [Each of the loop is from 1 to 500]
for i in range(1,501): -->The hypotenuse
for j in range(1,501): -->Side 1
for k in range(1,501):-->Side 2
This calls the function and prints the required output i.e. the sides of the triangle and True or False
print(str(i)+"\t"+str(j)+"\t"+str(k)+"\t"+str(Pythagorean_triple(i,j,k)))
there is a structure called employee that holds information like employee code, name, date of joining. Write a program to create an array of the structure and enter some data into it. Then ask the user to enter current date. Display the names of those employees whose service is 15 or more than 15 years according to the given current date.
Answer:
The program in C is as follows:
#include<stdio.h>
#include<conio.h>
struct employee{
char empname[50]; int empcode, day,mon,yr;
}employees[30];
int main(){
int total;
printf("Numbers of Employees : "); scanf("%d",&total);
for(int kt=0;kt<total;kt++){
printf("Employee Code : "); scanf("%d",&employees[kt].empcode);
printf("Name: "); scanf("%s",employees[kt].empname);
printf("Date of Joining [dd mm yyyy]: "); scanf("%d%d%d",&employees[kt].day,&employees[kt].mon,&employees[kt].yr); }
int year;
printf("\nCurrent Date [Year only]: "); scanf("%d", &year);
printf("Code\t\t\t Name\t\t\t Date of Joining\n");
for(int kt=0;kt<total;kt++)
if((year - employees[kt].yr) >= 15)
printf("%d\t\t\t %s\t\t\t %d/%d/%d\n",employees[kt].empcode,employees[kt].empname, employees[kt].day,employees[kt].mon,employees[kt].yr);
}
Explanation:
See attachment for explanation where comments were used to explain some lines
I need them on this question
Answer:
Extended wear contacts. ...
Toric contacts. ...
Colored (tinted) contacts
Explanation: hope this helps
Which wizard is a tool provided by Access that is used to scan the table's structure for duplicate?
O Query Design Wizard
O Table Design Wizard
O Table Analyzer Wizard
O Performance Analyzer Wizard
Answer:
The tool provided by access that’s used to scan the table’s structure for duplicate is “Table Analyzer Wizard”.
Kyla, a business analyst uses test scripts while testing an application before it is released to the client. Why do business analysts use test scripts?
A.
to perform acceptance testing
B.
to code functions correctly
C.
to write a test plan
D.
to create a test environment
E.
to review and update test cases
Answer:
D. to create a test environment
Explanation:
After releasing it will be "production"
____ occurs when weaker companies are eliminated and the strong companies survive
Answer:
sounds like a monopoly but is there a word bank?
Explanation:
"the exclusive possession or control of the supply of or trade in a commodity or service."-Oxford dictionary
The Zoom feature allows you to either increase or decrease the size of your document on the screen,
Please select the best answer from the choices provided
True or false
PLEASE HELP IM STUCK!!!!!!!!!!!!!!!!!!!!! Which of the following terms is described as "the art and design of using text”?
O typography
O elements of design
O typos
O graphic design
please answer in python language
An electronic tool that allows information to be input processed and output? A, operating system B.motherboard C.cpu D.computer
Answer:
This would be considered a CPU in that case.
Explanation:
A CPU does basic arithmetic, logic, controlling, input AND the output. It would be stated in the program's instructions.
Should you let your computer scan email attachments before opening them? Why?
no you shouldn't
Explanation:
you should just block them and report them
What element of art does this photograph show? A. shape B. space C. form D. tone E. line
I would for sure say form because it doesn't look like a flat surface, instead it looks 3-D, but If it is multiple choice then I say do C,D, and E.
Here is some advice tho, this question seems like an opinion question, soo, that means that you pick one that stands out to you and escribe why you think so in a descriptive way... if that is not the case then go ahead and use whatever i gave you. Just in case you may want to add a little more to the bolded answer I gave you, just to be professional, in case you do want to add more here is the defintion of form in case you need it
In addition to form, they include line, shape, value, color, texture, and space. As an Element of Art, form connotes something that is three-dimensional and encloses volume, having length, width, and height, versus shape, which is two-dimensional, or flat.
If this helps, I would like brainliest, when possible
Select the correct answer.
Kelly is trying to access her company fashion website through the wireless network. Even after repeated attempts, she is unable to access the
website. What must have probably happened?
ОА.
ОВ.
The network is under a war driving attack.
The network is under an eavesdropping attack.
The network is under a denial of service attack.
Ос.
OD
The network is under a frame injection attack.
The network is under a domain name cracking attack.
ОЕ.
Reset
Next
1 Edmentum. All rights reserved.
yes how many poly pockets if I had 10 and gave 2 to esmeraldas father who died and left 1 to his cat, sir whisker?
Answer:
Total 13 poly packets are there
Explanation:
Total number of poly packets = 10
Number of poly packets given to esmeraldas father = 2
Number of poly packets left with his cat = 1
Total remaining poly packets = 10 + 2 + 1 = 10 + 3 = 13
What is the data type of the following expression?
5/1
a) bool
b) str
c) float
d) int
Answer:
What do u mean by 5/1... And Sry for disturbing
Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we swizzle all pointers automatically, we can perform the swizzling in half the time it would take to swizzle each separately. If the probability that a pointer in main memory will be followed at least once is p, for what values of p is it more efficient to swizzle automatically than on demand?
Answer:Considerwehavenpointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we swizzle all pointers automatically, we can perform the swizzling in half the time it would take to swizzle each separately. If the probability that a pointer in main memory will be followed at least once is p, for what values of p is it more efficient to swizzle automatically than on demand?
Explanation:
Which term best describes these lines?
count = 0
loop through list
if “basketball” is found
add one to count
output count
Python 3 code
selection program
pseudocode
sequential program
13. Which statement is valid?
1 KB = 1024 bytes.
1 MB = 2048 bytes
1 MB = 1000 kilobytes
1 KB = 1000 bytes
Answer:
1 KB = 1024 bytes is correct
Explanation:
Answer:
1 KB = 1000 bytes
Is valid.
Hope it will help :)❤
how many pieces can be connected on to a to an SPS
Answer:
i dont know
Explanation:
convert 128 GB into KB
Answer:
1,073,741,274 KB
Explanation:
Use an unit convertor or an calculator.
Helllp me you will git 16 points
Answer:
False
Hope it helps...
Have a great day :P
Which entry by the user will cause the program to halt with an error statement?
#Get a guess from the user and update the number of guesses.
guess = input("Guess an integer from 1 to 10:")
guess = int(guess)
A two
B 100
C 3
D -1
Answer:
A
Explanation:
what is the structure of an HTML document. pls answer I don't want any links pls explain too
Answer:
What is a HTML document?
It's a text document saved with the extension . html or . htm that contains texts and some tags written between "< >" which give the instructions needed to configure the web page. These tags are fixed and definite and will be currently explained in the tutorials when applied and needed.
What is HTML structure?
An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.
What is the basic structure of HTML template?
An HTML document has two* main parts: head. The head element contains title and meta data of a web document.
How is an HTML document structured?
An HTML 4 document is composed of three parts: a line containing HTML version information, a declarative header section (delimited by the HEAD element), a body, which contains the document's actual content.
Explanation :
HELLOOOO ARMY! HOPE U HAVE A WONDERFUL DAY! MAY NAMJESUS BLESS U !
Stream life goes on and dynamite we are about o reach 1B!
And trend these hashtags:
#Westankings
#scammys
AND FINALLY , SARANGAE BOROHAEEE!!! ♡♡♡♡♡
Explanation:
An HTML Document is mainly divided into two parts: HEAD: This contains the information about the HTML document. For Example, Title of the page, version of HTML, Meta Data etc. BODY: This contains everything you want to display on the Web Page.