In python:
number = input("Enter a 10-character phone number: ")
for i in number:
if i.isalpha():
if i == "A" or i == "B" or i == "C":
i = "2"
elif i == "D" or i == "E" or i == "F":
i = "3"
elif i == "G" or i == "H" or i == "I":
i = "4"
elif i == "J" or i == "K" or i == "L":
i = "5"
elif i == "M" or i == "N" or i == "O":
i = "6"
elif i == "P" or i == "Q" or i == "R" or i == "S":
i = "7"
elif i == "V" or i == "T" or i == "U":
i = "8"
elif i == "W" or i == "X" or i == "Y" or i == "Z":
i = "9"
print(i, end="")
I hope this helps!
Code:
def phonenumber():
alpha = ['A','B','C','D','E','F','G','H','I','J','K','L','M','N','O','P','Q','R','S','T','U','V','W','X','Y','Z']
n =[2,2,2,3,3,3,4,4,4,5,5,5,6,6,6,7,7,7,7,8,8,8,9,9,9,9]
phone = input('Enter phone number in format of XXX-XXX-XXXX : ').upper()
index = 0
for index in range(len(phone)):
if phone[index].isalpha():
print (n[alpha.index(phone[index])], end = ' ')
else:
print (phone[index], end = ' ')
phonenumber()
Compilation output is attached below:
Learn More:https://brainly.com/question/15687460
The two statements belowchar dance1[ ] = {'F','o','x','t','r','o','t'};String dance2 = new String(dance1);will generate an error message:
a. because char variables and String variable do not mix.
b. will generate an error message because char variables and String variable do not mix.
c. show that a String variable, like dance2, is an array.
d. demonstrate that a character array can be used to construct a String object.
e. prove that character variables and String variables are identical.
Answer:
D. Demonstrate that a character array can be used to construct a String object.
Explanation:
Option D answers the question.
This is so because:
The first line of the code segment creates a char array element i.e. dance1
The second line of the code segment creates a String variable, dance2.
dance2 is then initialised by concatenating the elements in dance1.
i.e. The value of dance2 is
dance2 = "Foxtrot"
Hence, option D answers the question
China is selling school supplies in the United States for very low prices, even lower than the
preventing prices in China, and thus making it extremely difficult for American manufacturers to
compete. This is referred to as
Answer:
dumping.
Explanation:
dumping. China is selling school supplies in the United States for very low prices, even lower than the prevailing prices in China, and thus making it extremely difficult for American manufacturers to compete. This is referred to as DUMPING.
Which of the following is NOT solely an Internet-based company?
Netflix®
Amazon®
Pandora®
CNN®
Answer:
I think it's Pandora, though I am familiar with others
Answer:
CNN
Explanation:
QUICK!! URGENT!! I'll provide more point if u give me the right code for this specific program. I truly don't understand if statements :(
Answer:
5467373737474737377474747
The intentional defacement or destruction of a website is called: Group of answer choices spoofing. cybervandalism. cyberwarfare. phishing. pharming.
Answer:
cybervandalism
Explanation:
The intentional defacement or destruction of a website is called cybervandalism. This ultimately implies that, cybervandalism is carried out or done by someone through the use of computer technology such as an internet to destroy data (informations).
Additionally, the defacement or destruction of a website simply means changing the appearance and data relating a website. Some of the tools use for cybervandalism is a file transfer protocol (FTP), structured query language (SQL) injection etc.
In may 2005, President Donald Trump's Wikipedia web page was vandalized by an attacker.
It should be noted that intentional defacement or destruction of a website is called cybervandalism.
Cybervandalism can be regarded as the damage or destruction which is been carried out in digital form.
It may involves the cyber vandals which involves the defacing of a website.Therefore, cybervandalism serves as intentional defacement or destruction of a website.
Learn more about cybervandalism at;
https://brainly.com/question/11408596
Given the dictionary, d, find the largest key in the dictionary and associate the corresponding value with the variable val_of_max. For example, given the dictionary {5:3, 4:1, 12:2}, 2 would be associated with val_of_max. Assume d is not empty.
Answer:
Here is the Python program:
d = {5:3, 4:1, 12:2}
val_of_max = d[max(d.keys())]
print(val_of_max)
Explanation:
The program works as follows:
So we have a dictionary named d which is not empty and has the following key-value pairs:
5:3
4:1
12:2
where 5 , 4 and 12 are the keys and 3, 1 and 2 are the values
As we can see that the largest key is 12. So in order to find the largest key we use max() method which returns the largest key in the dictionary and we also use keys() which returns a view object i.e. the key of dictionary. So
max(d.keys()) as a whole gives 12
Next d[max(d.keys())] returns the corresponding value of this largest key. The corresponding value is 2 so this entire statement gives 2.
val_of_max = d[max(d.keys())] Thus this complete statement gives 2 and assigns to the val_of_max variable.
Next print(val_of_max) displays 2 on the output screen.
The screenshot of program along with its output is attached.
Write a program whose inputs are three integers, and whose output is the smallest of the three values. Use else-if selection and comparative operators such as '<=' or '>=' to evaluate the number that is the smallest value. If one or more values are the same and the lowest value your program should be able to report the lowest value correctly. Don't forget to first scanf in the users input.
Ex: If the input is: 7 15 3
the output is: 3
You should sketch out a simple flowchart to help you understand the conditions and the evaluations needed to determine what number is the correct answer. This type of tool can help determine flaws in a logical design.
Answer:
The Program written in C is as follows:
#include <stdio.h>
int main() {
int num1, num2, num3, smallest;
printf("Enter any three numbers: ");
scanf("%d", &num1); scanf("%d", &num2); scanf("%d", &num3);
if(num1 <= num2 && num1 <= num3) {
smallest = num1;
}
else if(num2 <= num1 && num2 <= num3) {
smallest = num2;
}
else {
smallest = num3;
}
printf("Smallest: ");
printf("%d", num3);
return 0;
}
Explanation:
This line declares necessary variables
int num1, num2, num3, smallest;
This line prompts user for input of three numbers
printf("Enter any three numbers: ");
This lines get input for the three numbers
scanf("%d", &num1); scanf("%d", &num2); scanf("%d", &num3);
The following if/else statements determine the smallest of num1, num2 and num3 and assigns to variable smallest, afterwards
if(num1 <= num2 && num1 <= num3) {
smallest = num1;
}
else if(num2 <= num1 && num2 <= num3) {
smallest = num2;
}
else {
smallest = num3;
}
The next two lines print the smallest value
printf("Smallest: ");
printf("%d", num3);
B1:B4 is a search table or a lookup value
Answer:
lookup value
Explanation:
In HTML5, the
(line break) tag does not require a closing tag.
true or false
40 POINTS IF YOu ANSWER FOR EACH STEP.
When your friend DaJuan turns on his computer, he hears four beeps. The computer won’t fully boot. DaJuan has a Dell computer with a quad core processor and has recently upgraded his RAM.
Apply the troubleshooting methodology to help DaJuan understand and resolve his problem. The steps of the methodology are listed for you. Copy them into a document and use them to write suggestions for DaJuan at each step.
1.Identify the Problem
2.Internet Research
3.Establish a Theory of Probable Cause
4.Test the Theory
5.Establish a Plan of Action
6.Implement the Solution or Escalate
7.Verify Full System Functionality
8.Document Findings.
Answer:
4 beeps indicate a Memory Read / Write failure. Try re-seating the Memory module by removing and reinserting it in the slot. This could mean it could've just jiggled loose after a while or dust, there could be a hundred other problems but those are the two most common.n
Explanation:
in your own experience,imagine if someone gained access to any of your social media accounts they could changed your account name,password and recovery data in order to lock you out and take total control. they could even go as far as pretending to be you and send out compromised messages to your contacts and this list is endless really. To help you stay safe from hackers and protect your social media accounts
Answer: yes
Explanation: because they now have your info
The purpose of performance profiling (experimental analysis) is to measure the program/algorithm performance. Assume that you have performed an experimental analysis of an algorithm, and profiling returned the following
times: for instances of sizes 2^10, 2^11, 2^12, 2^13, 2^14
the corresponding times are approximately 300 , 510 , 905 , 1750 , 3305 milliseconds.
In these collected running times, there is an extra overhead resulting from clocking program performance and OS functions calls, and this overhead has to be considered in analyzing data. That is, the measured time consists of two components: the time for executing the operations, plus the overhead from profiling.
The estimated overhead due to profiling is about 100 milliseconds independently of the input size. (that is, 100 is always an additive ``constant'' in the collected times).
Based on these experimental results, what is the running time, as a function of the problem size, for executing this algorithm? (c is a constant).
A. O(underroot(n)).
B. O(n^2).
C. O(n).
D. None of the listed.
E. O(n log n).
Answer:
C. O(n).
Explanation:
for better understanding, the os is a program that helps in telling how much resources can be used and when processor can be accessed.
to each programme data structures would load and unload every time that a programme is to be run.
while a programme is being managed there would be extra overheads and based on whatever type of os or programme that this is, it may or may not have fixed overhead
from our question overhead is fixed at 100ms
we have,
net time as: 300-100, 510-100, 905-100, 1750-100, 3305-100,
which is, 200, 410, 805, 1650, 3205
when we double 2¹⁰ to 2¹¹ to 2¹² etc, the programme ran is also doubling
this says that run time is same as size of instance n
O(n)
"Jean-luc Doumont notes that slide software is an effective presentation tool, especially when the speech goal is to:"
Hi, your question is incomplete. Here are the options:
A. persuade the audience.
B, encourage critical thinking.
C. increase discussion.
D. relay detailed information
Answer:
D. relay detailed information
Explanation:
Indeed, slide software (like MS Powerpoint) would be an effective presentation tool, especially when the speech goal is to relay detailed information.
For example, a graph showing the exponential growth in the number of smartphone users in the United States for the last 15 years would be effectively presented using a slide that shows this data because it will allow the audience to easily see the detailed information.
create a boolean variable called sucess that will be true if a number is between -10 and 10 inclusively python
Answer:
success = -10 <= number <= 10
Explanation:
I check that -10 is less than or equal to number, and number is less than or equal to 10.
In Microsoft windows which of the following typically happens by default when I file is double clicked
Answer:
when a file is double clicked it opens so you can see the file.
Explanation:
True or false? The following deterministic finite-state automaton recognizes the set of all bit strings such that the first bit is 0 and all remaining bits are 1’s.
Answer:gjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj
Explanation:
James uses a database to track his school's football team. Which feature in a database allows James to find a specific player by name?
Grid
Filter
Search
Sort
Answer:
search
Explanation:
Create a survey questionnaire with at least 10 questions to find out how teens are using social networking sites. Your data should contain a minimum of 30 valley questionnaires in each respondent must answer all the questions for that questionnaire to be valid. Analyze the data collected using charts or graphs. What are your findings from the survey? Collate the findings by summarizing the answers for each question. Present a graph or chart to represent the data you collected.
Possible Questions:
- What social media platforms do you use on a daily basis?
- Where did you hear about these social media platforms?
- What made you join these social media platforms?
- What social media platform(s) do you prefer the most?
- Why might you suggest these social media platforms to a friend?
- What does having and using this platform mean to you?
- What does your preferred platform allow you to do?
- Has using this platform changed you in any way? (Are you more connected, concerned, aware, etc.)
If the propagation delay through a full-adder (FA) is 150 nsec, what is the total propagation delay in nsec of an 8-bit ripple-carry adder
Answer:
270 nsec
Explanation:
Ripple-carry adder is a combination of multiple full-adders. It is relatively slow as each full-adder waits for the output of a previous full-adder for its input.
Formula to calculate the delay of a ripple-carry adder is;
= 2( n + 1 ) x D
delay in a full-adder = 150 nsec.
number of full-adders = number of ripple-carry bits = 8
= 2 ( 8 + 1 ) x 150
= 18 x 150
= 270 nsec
A Windows user is locked out of her computer, and you must log into the local administrator account HelpdeskAdmin. Which would you use in the username field?
Answer: .\HelpdeskAdmin
Explanation:
If you wanted to log in as the local administrator then for the Username put a dot (.) and a backslash (\) in front of the Admin username.
The dot(.) will ensure that Windows knows that you are logging into a local computer as the administrator and so will grant you access. The relevant username therefore is, ''.\HelpdeskAdmin''.
I will use .\HelpdeskAdmin as the username field.
What is a username field?The username-field is known to be a kind of command that is said to specifies the value for the name that shows the characteristics in the login form and it is one that identifies the username field.
Note that the use of the .\HelpdeskAdmin as the username field is the right thing to do as the dot(.) will make sure that the Windows knows that the user is logging into a computer as the administrator.
Learn more about local administrator from
https://brainly.com/question/14364696
A____server translates back and forth between domain names and IP addresses.
O wWeb
O email
O mesh
O DNS
Answer:
DNS
Explanation:
Hope this helps
what is scientific and
Answer:
And what??????????????
describe how to get started on a formal business document by using word processing software
Answer:Click the Microsoft Office button.
Select New. The New Document dialog box appears.
Select Blank document under the Blank and recent section. It will be highlighted by default.
Click Create. A new blank document appears in the Word window.
Explanation:
Plz answer me will mark as brainliest
Answer:
True
Operating System
Booting