Answer:
print(5)
Explanation:
Passing an int argument into the method named print ;
print() ; Here, the print method has no argument as it is empty
print()+5; Here also, the print method has no argument and adding +5 is an invalid syntax.
print("5") ; Here, print takes in an argument, however, the argument is a string due to the fact that 5 is enclosed by quotation marks.
print(5) ; Here, the integer is 5 is passed to the print method.
List 2 end to end test commands.
Will mark Brainliest!!
Answer:
ibm pll
Explanation:
Write a function definition for a function which takes one parameter and returns twice that parameter
Answer:
The function in python is as follows:
def twice(num):
return 2 * num
Explanation:
This defines the function; The function receives num as its parameter
def twice(num):
This returns twice of num
return 2 * num
A town decides to publicize data it has collected about electricity usage around the city. The data is freely available for all to use and analyze in the hopes that it is possible to identify more efficient energy usage strategies. Which of the following does this situation best demonstrate?
a. Citizen science.b. Crowdfunding.c. Open data.d. Machine Learning.
explain 5 important of using a word processor
Answer:
Spelling
Word processors contain an electronic spell checker. The student writer has immediate feedback about misspelled words. Student must discern which of the computer-generated spellings is correct for the context. Teachers no longer have to red-ink spelling errors. They can focus on the few exceptions the spellchecker does not catch.
Security
Teachers and students gain a sense of security about losing assignments. When the student saves her work, she avoids the possibility of the assignment being lost or misplaced. If an assignment is ever misplaced, a replacement can be easily printed.
Legibility
Teachers benefit by receiving a readable copy that is easy to grade. Students with poor handwriting can increase their scores with better looking papers. Students should be instructed to turn in copies of work in a readable font.
Publishing
Work done on a word processor can easily published on a bulletin board. Teachers can create electronic anthologies of their students' writings. Each student can receive an electronic copy of published works with no printing costs.
Mobility
Work done on a word processor and saved on the Internet is highly portable and accessible from any computer with Internet access. Dogs do not eat papers in cyberspace. "I forgot it at home" is irrelevant. Just log onto the nearest computer and your work appears on the screen.
Explanation:
Answer:
1. they are faster creation of document.
2.document can be stored for future use.
3. quality document are created.
4. it has access to higher variation.
5. tiredness Is greatly reduced.
In this code, there's a Person class that has an attribute name, which gets set when constructing the object. Fill in the blanks so that 1) when an instance of the class is created, the attribute gets set correctly, and 2) when the greeting() method is called, the greeting states the assigned name. mtino 1-class Person: 2 - def __init__(self, name): self.name = def greeting(self): # Should return "hi, my name is " followed by the name of the Person. return Run 8 # Create a new instance with a name of your choice 9 some_person = 10 # Call the greeting method 11 print (some_person. ) 12 Press ESC to exit the code block at any time
Answer:
Explanation:
The following code is written in Python. It creates a Person class and creates the constructor which takes in the name of the person for that instance, as well as a greeting method which outputs the desired "Hi, my name is" string with the name of that person. The output of the code can be seen in the attached picture below. I have created a person object called John and called the greeting method so that you can see the output.
class Person:
name = ''
def __init__(self, name):
self.name = name
def greeting(self):
print('Hi, my name is ' + self.name)
The code containing the Person class definition and the greeting is found in the attached image
The Person class has a single instance field name that stores the name of the person.
The instance initializer, __init__, accepts an argument, name, and saves the value in the name attribute of the Person class.
The Person class also has a greeting method that is called by the main code segment. The main code segment creates a Person object, and calls it in the print function to display the greeting with the person's name.
Learn more about classes in Python here https://brainly.com/question/21065208
The Mac OS was the first to use a graphical user interface.
False
True
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print
b. random
c. else
d. while
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
Answer:d. while ✓
Explanation:
The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.
[tex] \\ \\ [/tex]
Hope it helps
-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀
The length of a list can be determined through the index function
True
False
Answer:
false
Explanation:
which data type uses %i as a format specifier
Answer:
A decimal integer
Explanation:
Hope this helps!
Make me laugh or tell me riddles
Answer:
What do u call cow in earthquake??
Explanation:
Answer:
ok i made these by myself hope you like it
What is wrong with a MOV BL, CX instruction?
Answer:
The MOV bl , cx instruction is wrong because the contents of cx are to big for bl .
I think this is the answer.
Question # 4
Fill in the Blank
Complete the following sentence.
The first email was sent in
.
Answer:
1971
Explanation:
If there is more detail needed i'm sorry
Answer:
1971
Explanation:
#Nova
Have a great day!
:)
A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a:
Answer:
True. A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a: Direct-action virus.
Explanation:
A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.
What is Direct-action virus?A direct action computer virus is known to be a virus class that is said to be self-multiplying malware that is known to be attached to any executable file.
Therefore, Note that A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.
Learn more about virus from
https://brainly.com/question/26128220
#SPJ2
any computer and technology experts?
1. what is a file
2. what is a folder
3. what is a subfolder
4. how files are organized in folders and subfolders
5. what is a file extension
6. types of file extensions
7.the importance of file extensions
Answer:
file is the common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file. A folder holds one or more files, and a folder can be empty until it is filled. A folder can also contain other folders, and there can be many levels of folders within folders.
a subfolder is an organizational folder on a computer that is located within another folder
Explanation:
sorry i dont know all
What can be viewed in the Tasks folder? Check all that apply
Answer: task details; appointments; to do list
Explanation:
Task folders, simply allows an individual organize their tasks in a logical manner. It performs an identical function just like a file directory.
Folders can be created in the root folder. Once can also create them as subfolder in the other files. The task details, appointments and the to do list can be viewed in the task folder.
Write code to take a String input from the user, then print the first and last letters of the string on one line. Sample run: Enter a string: surcharge se Hint - we saw in the lesson how to get the first letter of a string using the substring method. Think how you could use the .length() String method to find the index of the last character, and how you could use this index in the substring method to get the last character.
//import the Scanner class to allow for user input
import java.util.Scanner;
//Begin class definition
public class FirstAndLast{
//Begin the main method
public static void main(String []args){
//****create an object of the Scanner class.
//Call the object 'input' to receive user's input
//from the console.
Scanner input = new Scanner(System.in);
//****create a prompt to tell the user what to do.
System.out.println("Enter the string");
//****receive the user's input
//And store it in a String variable called 'str'
String str = input.next();
//****get and print the first character.
//substring(0, 1) - means get all the characters starting
//from the lower bound (index 0) up to, but not including the upper
//bound(index 1).
//That technically means the first character.
System.out.print(str.substring(0,1));
//****get and print the last character
//1. str.length() will return the number of character in the string 'str'.
//This is also the length of the string
//2. substring(str.length() - 1) - means get all the characters starting
// from index that is one less than the length of the string to the last
// index (since an upper bound is not specified).
// This technically means the last character.
System.out.print(str.substring(str.length()-1));
} // end of main method
} //end of class definition
Explanation:The code has been written in Java and it contains comments explaining important parts of the code. Kindly go through the comments.
The source code and a sample output have also been attached to this response.
To run this program, copy the code in the source code inside a Java IDE or editor and save it as FirstAndLast.java
Please help it’s timed
Answer:
you are proooooooooooooooooooo
Explanation:
if you were a developer of software, what kind of software package would you develop? why ?
Answer:
Software that would help my grandparents in the North end much money and help stop post harvest loss due to inadequate weather information Climate change etc
Explanation:
The app willbe able to tellif a soil is suitable forCropsthrough my othertechnologiesthat willcome with app it will alsodetect the whetherpattern accuratelyprovide securityin the farmand help farmers selltheir products online
Write a program that grades arithmetic quizzes as follows: Ask the user how many questions are in the quiz. Ask the user to enter the key (that is, the correct answers). There should be one answer for each question in the quiz, and each answer should be an integer. They can be entered on a single line, e.g., 34 7 13 100 81 3 9 10 321 12 might be the key for a 10-question quiz. You will need to store the key in an array. Ask the user to enter the answers for the quiz to be graded. As for the key, these can be entered on a single line. Again there needs to be one for each question. Note that these answers do not need to be stored; each answer can simply be compared to the key as it is entered. When the user has entered all of the answers to be graded, print the number correct and the percent correct.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
int main(){
int questions, answer;
cout<<"Questions: ";
cin>>questions;
int answerkey[questions];
cout<<"Enter answer keys: ";
for(int i = 0; i< questions; i++){
cin>>answerkey[i]; }
int correct = 0;
cout<<"Enter answers: ";
for(int i = 0; i< questions; i++){
cin>>answer;
if(answer == answerkey[i]){
correct++; } }
cout<<"Correct answers: "<<correct<<endl;
cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";
return 0;
}
Explanation:
This declares the number of questions and the answers submitted to each equation
int questions, answer;
Prompt to get the number of questions
cout<<"Questions: ";
This gets input for the number of questions
cin>>questions;
This declares the answerkey as an array
int answerkey[questions];
Prompt to get the answer key
cout<<"Enter answer keys: ";
This iteration gets the answer key for each question
for(int i = 0; i< questions; i++){
cin>>answerkey[i]; }
This initializes the number of correct answers to 0
int correct = 0;
Prompt to get the enter the answers
cout<<"Enter answers: ";
This iterates through the answer keys
for(int i = 0; i< questions; i++){
This gets the answer to each question
cin>>answer;
This compares the answer to the answer key of the question
if(answer == answerkey[i]){
If they are the same, correct is incremented by 1
correct++; } }
Print the number of correct answers
cout<<"Correct answers: "<<correct<<endl;
Print the percentage of correct answers
cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";
Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Risk Management and Information Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Answer:
Following are the response to the given question:
Explanation:
They are already talking business to business collects in which we are calling the client for collecting whenever the products which we have purchased are overdue and overdue inside 30 days. About business criteria, we should ensure no other websites mostly on agent acting open up so that nobody can misuse it; we also have to know the correct revising and trying to run off all systems and therefore all apps are organ systems because then the critical business work time has would not get out of the way. This is about the security of information. The agents also are adequately taught in IT policy according to the demand of the company.
They soon come towards the area of risk, experience, and skill. All agents ought to have proper refresh sessions to fulfill GAP knowledge but also improve their abilities for 100 percent cent accuracy on TAT on every appeal. Your Agency's response.
There ought to be a right party connect. We must keep up with 80-20 RULE which means that we can easily acquire the bigger amount earlier than somehow investing whatever money for future production if we concentrate on TOP 20 Overdue Current Passengers.
When we add up the current sum owing as well as the amount due by both the end of the month, so we will subtract all promises that were made by the end of each month. You can readily deduce how long and how much money will be received by the end of each month, and how long this will be due by the end of each month.
The total danger which we imagine to be cash flow issues is when a company is close to collapse or even has a money problem, they are few risks that any company has.
To solve this RISK to money flow clients, we have to provide them a payment plan so that we could at the very least invest some cash in additional production. Besides offering customers a pay system, you truly cannot help.
Another key potential risk is the unrequired quantity on the accounts of the consumer. Underneath the U.S. government, it'll be a direct responsibility of the government if there is an unclear and unapplied amount which has lied to an account for even more than 4 years.
Therefore it does have to do about risk, skills, knowledge the safety of information. All above theory helps explain everything which enables the execution of operations as well as, as project manager, we have to track input and output information. we need to charge, past due, credits, debits, PD percent every week and month, seeing the company's pattern, and also transform policies as to how the trend or even the forecast can enhance.
In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation, what is the more likely range involved
. Write the advantages and disadvantages of CLI?
1. ¿Qué es un cursograma?
Answer:
Un cursograma permite representar gráficamente procedimientos administrativos. Constituyen instrumentos importantes para la visualización global y esquemática del conjunto de tareas administrativas.
Justin Kace is promoting the metric system and wants people to be able to convert miles to kilometers and kilometers to miles. Develop a program that asks the user for a number of miles and converts miles to kilometers (multiplying miles by 1.609), and then asks for a number of kilometers and converts kilometers to miles (multiplying kilometers by 0.6214).
Solution :
//Program heading
Display "Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program"
//Get [tex]$\text{Miles}$[/tex]
Display "Enter the [tex]$\text{miles}$[/tex]: "
Input [tex]$\text{miles}$[/tex]
//Convert [tex]$\text{miles}$[/tex] to kilometers and display result
converted_km =[tex]$\text{miles}$[/tex] x 1.609
Display "Converted kilometers = " + converted_km
//Get Kilometers
Display "Enter the kilometers: "
Input km
//Convert kilometers to [tex]$\text{miles}$[/tex] and display result
converted_[tex]$\text{miles}$[/tex] = km x 0.6214
Display "Converted [tex]$\text{miles}$[/tex] = " + converted_[tex]$\text{miles}$[/tex]
//Thank the user for using this program
Display "Thank you for using this program. Good-bye!"
Stop
Sample Output:
Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program
Enter the [tex]$\text{miles}$[/tex]: 10
Converted kilometers = 16.09
Enter the kilometers: 10
Converted [tex]$\text{miles}$[/tex] = 6.214
Thank you for using this program. Good-bye!
Explain what the problems with the implementation of the function are, and show a way to fix them.// return true if two C strings are equalbool match(const char str1[], const char str2[]){bool result = true;while (str1 != 0 && str2 != 0) // zero bytes at ends{if (str1 != str2) // compare corresponding characters{result = false;break;}str1++; // advance to the next characterstr2++;}if (result) {result = (str1 == str2); // both ended at same time?}return( result );}int main(){char a[10] = "pointy";char b[10] = "pointless";if (match(a,b)){cout << "They're the same!" << endl;}}
Answer:
The code is not dereferencing the pointers. You have to place an asterisk in front of the pointer to read the value the pointer points to.
Explanation:
So "if (str1 != str2)" must be "if (*str1 != *str2)".
likewise:
while (*str1 != 0 && *str2 != 0)
and
result = (*str1 == *str2);
1. Which of the following is a new
generation optical storage device?
CD
DVD
Blu-ray disc
Pen drive
Answer:
CD or CD Rom
fhiykkoojnddeyui
User account
2. The system allows user to register and create the account
3. Users allowed by system to edit & modify the account
4. System allows users to view products
5. System allows users to comment on product
6. Perform sentiment analysis
7. Use APS to connect to product
8. Review website to collect comment of product
9. System dynamically analyze command of users
10. Matching keyword in database
11. system allots rank to product as good, bad and ugly
12. view product review
13. users can use system to view product
14. manage users account
15. all users account allowed to be added or modified , and deleted by administrator
Non Functional Requirements:
1. Efficiency
2. Interoperable
3. Portability
4. Security
Part A: Answer the following questions prefer to the previous requirements?
Question :
Three Use-Case Narrative. Choose one major use-case for each player (Customer, Shop Owner, and Administrator).
17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursion; a non-recursive function, or using the built-in function math.pow(), would be more common.
Answer:
The recursion function is as follows:
def raise_to_power(num, power):
if power == 0:
return 1
elif power == 1:
return num
else:
return (num*raise_to_power(num, power-1))
Explanation:
This defines the function
def raise_to_power(num, power):
If power is 0, this returns 1
if power == 0:
return 1
If power is 1, this returns num
elif power == 1:
return num
If otherwise, it calculates the power recursively
else:
return (num*raise_to_power(num, power-1))
What lets the computer's hardware and software work together?
Monitor
Central Processing Unit (CPU)
Computer Viruses
Operating System
Answer:
Operating System
Explanation:
The operating System lets the computer hardware and software work together.
% Write a procedure that calculates the sum of the numbers in % a given range. The parameters to this procedure should be % as follows: % % 1. The low end of the range % 2. The high end of the range % 3. The sum of the values in the range % % If the low end equals the high end, then the sum should be % whatever value is equal to the low/high end (the range is % inclusive). If the low end is greater than the high end, % then failure should occur.
Answer:
The procedure in python 3 is as follows:
def add_range(low,high):
if low<= high:
total = 0
for i in range(low,high+1):
total+=i
return total
else:
return "Failure"
Explanation:
This defines the function/procedure
def add_range(low,high):
If low is less or equal to high
if low<= high:
Initialize total to 0
total = 0
Add up numbers in the range
for i in range(low,high+1):
total+=i
Return the total
return total
If low is greater, then return failure
else:
return "Failure"