Answer:
import datetime
user = input("Enter date in yyyy,m,d: ").split(",")
int_date = tuple([int(x) for x in user])
year, month, day =int_date
mydate = datetime.datetime(year, month, day)
print(mydate)
x = mydate.strftime("%B %d, %Y was a %A")
print(x)
Explanation:
The datetime python module is used to create date and time objects which makes it easy working with date-time values. The user input is converted to a tuple of integer items, then they are converted to date time objects and parsed to string with the strftime method.
What is the output?
numB = 25
while numB > 13:
numB = numB - 5
print(numB)
Output:
Answer:
The answer is 10
Explanation:
i got it right on the assignment
Answer: 10
Explanation: got it right on edgen
HOW TO BE A EXPRET PLAYING AMONG US
Answer:
Just keep playing
Explanation:
That’s so how
Answer:
If inposter look afk and they will think you are afk and vote everyone else out
(;
What is the fifth-generation wireless broadband technology based on the 802.11ac standard engineered to greatly increase the speed and responsiveness of wireless networks?
Answer:
The fifth-generation wireless broadband technology based on the 802.11ac standard is called the
5G.
Explanation:
The 5G is the newest baby in town in the area of wireless broadband technology. The technology is based on the IEEE 802.11ac standard. 5G operates with a 5Ghz signal and is set to offer out-of-this-world speeds of up to 1 Gb/s. This implies massive connectivity for everyone and everything. However, its trial has been fraught with many challenges. Questions have been raised, especially relating to some health concerns about the technology. However, many advantages have been ascribed to this wireless technology. They include more reliability, massive network capacity, increased availability, more uniform user experience, higher performance. and improved efficiency.
What are two options available for highlighting changes in the Highlight Changes dialog box?
A) for a specific website or by a specific user
B) by a specific user or in a specific file format
C) in a specific file format or for a specific website
D) within a specific time period or by a specific user
Answer: D
Within a specific time period or by a specific user
Explanation:
Answer:
D)
Explanation:
within a specific time period or by a specific user
by what other name can the folders in Windows 7 be called?
I think document folder
The other name for the folders in Windows 7 be called as Directories.
What is Windows 7?The Windows 7 operating system (OS) was made available for purchase in October 2009 to replace Windows Vista. Windows 7 was created as an update to the Windows Vista operating system and is based on the Vista kernel. It makes use of Windows Vista's original Aero user interface (UI).
The folder of the Windows 7 is also called as files, other folders, directory etc.
Additionally, folders enable you to have several files with the same name. The person might have a file named Resume.doc in your My Documents folder and a different file named Resume.doc in a folder called Resume templates, for example. Every file would require a distinct file name if they were all in one location.
Therefore, it can be concluded that The other name for the folders in Windows 7 be called as Directories.
Learn more about Windows 7 here:
https://brainly.com/question/1285757
#SPJ2
(TCOE) When a customer purchases software that displays a clickwrap agreement at the time of installation, the consumer has already purchased the product and is being asked to consent to the contract that purportedly memorializes the payment. Is the contract formed at the moment of purchase or later, when the buyer assents to the terms of the clickwrap agreement?
Answer:
The analysis is presented throughout the section described, as per the given situation.
Explanation:
Those requirements as well as agreements do not apply to something like the acquisition of the commodity. But perhaps the terms and agreements are all about the use of the name. This means that for illegal or immoral procedures, when and how to use the item and even the component shouldn't be used. The overall profitability certainly comes with either the commodity themselves as well as during implementation, trying to give one's authorization has always been about the service mostly with the supplier.However, during implementation, the contract is something different from the place where you live throughout your purchase.
The term Linux Intrusion Detection System ( LIDS) refers to a command that allows an administrator to run processes as root without actually logging in under the root account in a Linux or UNIX system. A. True B. False
Answer:
B. False
Explanation:
The term Super user do (sudo) refers to a command that allows an administrator to run processes as root without actually logging in under the root account in a Linux or UNIX system.
On the other hand, a Linux Intrusion Detection System can be defined as a patch to the operating system kernel of the Linux machine, as well as a set of administrative tools that is typically used to improve the security of the Linux kernel through the implementation of a mandatory access control known as MAC.
Hence, the Linux Intrusion Detection System can be used to deny any unauthorized use of the input or output device, memory, raw devices, file access and other network administrative functions.
To answer the research question "how I'm I going to find the information I need on the topic?" The best thing Georgia should do first is
Answer:
it is currently c
Explanation:
because i got it right on a quiz trust me!
Write code to complete RaiseToPower(). Sample output if userBase is 4 and userExponent is 2 is shown below. Note: This example is for practicing recursion; a non-recursive function, or using the built-in function pow(), would be more common.
4^2 = 16
#include
int RaiseToPower(int baseVal, int exponentVal){
int resultVal = 0;
if (exponentVal == 0) {
resultVal = 1;
}
else {
resultVal = baseVal * /* Your solution goes here */;
}
return resultVal;
}
int main(void) {
int userBase = 0;
int userExponent = 0;
userBase = 4;
userExponent = 2;
printf("%d^%d = %d\n", userBase, userExponent, RaiseToPower(userBase, userExponent));
return 0;
}
Answer:
Replace /* Your solution goes here */ with
RaiseToPower(baseVal, exponentVal-1);
Explanation:
From the question, we understand that the program uses recursion.
The essence of recursion is to call a function from the function itself.
This is done by RaiseToPower(baseVal, exponentVal-1);
Because it passed the baseVal and the exponentVal reduced by 1 to the RaiseToPower function.
This is repeated until exponentVal = 1.
However, I've added the full program as an attachment where I used comments to explain some lines.
In this exercise we have to use the knowledge of computational language in C++ to write the code.
This code can be found in the attached image.
To make it simpler the code is described as:
#include<iostream>
#include<stdio.h>
int RaiseToPower(int baseVal, int exponentVal){
int resultVal = 0;
if (exponentVal == 0) {
resultVal = 1;
}
else {
resultVal = baseVal * RaiseToPower(baseVal, exponentVal-1);
}
return resultVal;
}
int main(void) {
int userBase = 0;
int userExponent = 0;
userBase = 4;
userExponent = 2;
printf("%d^%d = %d\n", userBase, userExponent, RaiseToPower(userBase, userExponent));
return 0;
}
See more about C code at brainly.com/question/19705654
features present in most DUIs include _________________?
Answer:
"Common features provided by most GUIs include: -icons; ... The icons displayed on most desktops represent resources stored on the computer—files, folders, application software, and printers. Another icon commonly found on the desktop is a place to discard items."
Explanation:
plz mark braniliest i answered first
Viruses and worms can affect a system by:
A. Deleting hard drives
B. Slowing down the system
C. Improving system functions
D. Productive fake applications
Answer:
A
Explanation:
Worms can modify and delete files, and they can even inject additional malicious software onto a computer. Sometimes a computer worm's purpose is only to make copies of itself over and over — depleting system resources, such as hard drive space or bandwidth, by overloading a shared network
3. Which of the following components would not normally be found on an industry standard
motherboard?
A. Keyboard controller
B. CPU
C. Video controller
D. Modem
Answer:
B.
Explanation:
because it is computer science unit(CPU) is the portion of a computer that retrieves and executes instructions.
Write a SELECT statement that returns these four columns:
vendor_name-The vendor_name column from the Vendors table
invoice_number The invoice_number column from the Invoices table
invoice_date The invoice date column from the Invoices table
balance due The invoice total column minus the payment total and credit total columns from the Invoices table
Use these aliases for the tables: v for Vendors and i for Invoices.
Return one row for each invoice with a non-zero balance.
This should return 11 rows. Sort the result set by vendor_name in ascending order
Answer:
SELECT vendor_name, invoice_number, invoice_date,
(invoice_total - payment_total - credit_total) AS balance_due
FROM vendors AS v JOIN invoices AS i
ON vendors.vendor_id = Invoices.vendor_id
WHERE invoice_total - payment_total - credit_total > 0
ORDER BY vendor_name;
Explanation:
The query statement returns joint records of vendor name, invoice number, invoice date, and balance due from the vendor and invoice tables represented with aliases v and i respectively.
It returns an output with the WHERE clause condition to only return balance due greater than zero and the output is returned in ascending order of the vendor's names.
which of the following reflects the order of operations
Answer: PEMDAS
Parenthesis, Exponents, Multiplication, Division, Addition, Subtraction
Explanation:
A job placement agency helps match job seekers with potential employers. The agency
would like to design a simulation in order to help predict the likely job placement
outcomes for job seekers based on historical trends and patterns. Which of the following
is most likely to be a benefit of the simulation?
Answer:
The answer is "Option C".
Explanation:
Please find the complete question in the attached file.
The model presented above is an AI design. The specific variable within each AI model becomes reduced. There is also no AI model showing 100% reliability, or just not as reliable as just a man in certain situations. That is why the option C opposes this fact explicitly, and that model is least likely to benefit.
One key feature of malware is that it:
A. Can only work individually
B. Can only on certain operating systems
C. Can work jointly with other malware types
D. Can always be stopped by antimalware software
Answer:
Can work jointly with other malware types
how can e-group help in collaborating online
Answer:
Collaborative learning is an e-learning approach where students are able to socially interact with other students, as well as instructors. ... Collaborative learning is based upon the principle that students can enrich their learning experiences by interacting with others and benefiting from one another's strengths.
Explanation:
inclusion of collaborative activities in an online course leads to positive student performance outcomes. Collaborative group interactions facilitate active learning, shared knowledge, and promote social interaction and a supportive eLearning community
Which command provides the source reference on the last page of a document?
A.Citation
B.Endnote
C.Footnote
D.Reference
PLS help
Answer:
C. Footnote
Explanation:
Suppose we have a 4096 byte byte-addressable memory that is 32-way high-order interleaved, what is the size of the memory address module offset field?
a. 10
b. 7
c. 5
d. 4
Answer:
7
Explanation:
Given that :
Byte-addressable memory = 4096
Order = 32
Rwqritying such that they have the same base ;
4096 = 2^12
32 = 2^5
2^12 - 2^5
12 - 5 = 7
QOTD: What are some real-world situations that involve infinite loops, for loops, and while loops? (BRAINLIEST BEST ONE) Around 150 words needed (WILL GIVE BRAINLIEST)
Answer:
There's not many things that are infinite the earth not infinite sooner or later the sun will grow cold and all life on earth will vanish. The only real thing that's infinite is space and time there's nothing that can measure something that's infinite goes on for light years upon light years infinite thing. That and time that never ends nobody really knows how long that the world has been made. The universe could have been made long before the so called big boom happened. last but not least god he is the infinite thing way before the cosmos were made. He made the cosmos and everything that's in your head to. without him you would not even been born. There you go all the infinite things that are infinite.
Explanation:
Your Answer:
Infinite Loop: I would say time and space for it never ends but I would also say human life. Why? Once you die you will be revived and reincarnated and live forever once that happens.
While loop: The water cycle would be a while loop for it will go on as long as earth and water exist. But Earth will probably not live forever.
For loop: Like the other person said, people working hard each month would be considered a for loop.
---------------------------------------------------------------→I hope this helped!
--Juri Davis
Do you think the divide will fade in time? Write your opinion
Answer:
The answer is "true".
Explanation:
When ICTs are becoming more daunting and easier, that violation may eventually subside. However many people have reasons to believe that even in fact the racial literacy will persist, and even grow.
It is constantly shrinking by 5% every year in terms of raw figures, and increasing estimates show that just by 2028 100% of the world's population will have access to the internet.
Which option correctly describes a DDMS application?
OA. Software used to organize files and folders
OB.Software used to develop specialized images
OC.Software used to create effective presentations
OD. Software used to manage sets of information
Help quickly!!
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.
Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.
Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.
Write your pseudocode here:
Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
please help me I don't know what code to type in.
def main():
name = input("Enter your name: ")
age = input("Enter your age: ")
color = input("Enter you favorite color: ")
birth = input("Enter your birthday: ")
print(name + " is "+age+" year(s) old.")
print(name + "'s favorite color is "+color)
print(name + " was born on "+ birth)
main()
I hope this helps! The code runs perfectly fine for me.
In this exercise we want to write a pseudocode, so this way we will find how:
the code is in the attached image
What is pseudocode?Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.
To make it simpler to copy the code is below as:
def main():
name = input("Enter your name: ")
age = input("Enter your age: ")
color = input("Enter you favorite color: ")
birth = input("Enter your birthday: ")
print(name + " is "+age+" year(s) old.")
print(name + "'s favorite color is "+color)
print(name + " was born on "+ birth)
main()
See more about pseudocode at brainly.com/question/13208346
Write a complete program that reads a string and displays the vowels. The vowels are A, E, I, O, U and a, e, i, o, u. Here are three sample runs:
Sample Run 1
Enter a string: Welcome to Python
The vowels are eoeoo
Sample Run 2
Enter a string: Student Union
The vowels are ueUio
Sample Run 3
Enter a string: AREIOUaeiouRTE
The vowels are AEIOUaeiouE
Note: your program must match the sample run exactly.
using python
vowels = "aeiou"
txt = input("Enter a string: ")
print("The vowels are ",end="")
for x in txt:
if x.lower() in vowels:
print(x, end="")
I hope this helps!
How do you get a potion of fire-protection in the overworld because I am having a hard time in the Nether? I will give away 14 points and mark you as brainliest.
Answer:
It's physically impossible. You'd have to go to the nether and kill one of the nether slimes.
Explanation:
Or you can just cheat, give yourself creative and give yourself a fire res potion. Plus, you can't brew anything without a brewing stand or nether wart.
Answer:
Get a trident from a drowned and enchant it with Channeling and strike a villager with it. Contain the witch and burn it using flint&steel. It will try to drink the potion, but kill it as fast as you can. There now you can go through the Nether portal without having to worry about lava.
Explanation:
Write a function writel that will write the length of a side of a square. If only one argument is passed to the function, it is the length, and the output will go to the Command Window. If two arguments are passed, however, the first argument will be the length and the second argument will be the file identifier for an output file to which the length should be printed.
def writel(length, file_name = ""):
if file_name!="":
f = open(file_name, "w")
f.write(str(length))
f.close()
else:
print(str(length))
writel(3, "FileName.txt")
I hope this helps!
Remember, you must have the file created prior to running this program. Best of luck.
Answer: Answer to this question for MatLab
Explanation:
function out = write1(length,varargin)
if nargin == 1
disp(length)
end
if nargin == 2
fid = fopen(varargin{1},'w');
fprintf(fid,'%d',length) %
fclose(fid);
end
end
%varargin{1} needs to be the name of a file you already created
Reports produced by the United Nations are considered
O relevant sources, -A
O irrelevant sources. -B
O biased sources. -C
O disputed sources. -D
Answer:
The correct answer is Option A: "Relevant Sources"
Explanation:
Relevant sources are the reports and information regarding a specific field, profession or an area of study. The reports generated by United Nations are usually related to a specific subject or area of study i.e. report on security etc.
Hence,
The correct answer is Option A: "Relevant Sources"
Answer: relevant sources
Explanation:
BRAINLEST AND 20 POINTS! Most GUls provide all of the following except
-command prompts
-desktops
-icons
-menus
Answer:
command prompts
Explanation:
in what domain electrica energy is the most use
Answer:the main signal bearing entities are voltage and their current in circuit environments.
Explanation:
please tell fast plzzzzzzzz
Answer:
window.............
Answer:
Window
Explanation:
Im not sure if this is correct, but I'm pretty sure