Write a program to output the following quote by Edsger W. Dijkstra:

"Computer Science is no more about computers
than astronomy is about telescopes"
- Edsger W. Dijkstra
Hint: Remember that the escape characters \n and \" can be used to create new lines and quotation marks in your code.

Answers

Answer 1

In python 3.8:

print("\"Computer Science is no more about \ncomputers\nthan astronomy is about telescopes\"\n-Edsger W. Dijkstra")

I hope this helps!


Related Questions

Compress
00eb:0000:0000:0000:d8c1:0946:0272:879
IPV6 Address

Answers

Answer:

Compress

00eb:0000:0000:0000:d8c1:0946:0272:879

IPV6 Addres

Explanation:

Question No. 5:
Convert the following by showing all the steps necessary
a) (1001111) 2 = ( ) 10
b) (11000001) 2 = ( ) 16
c) (E16) 16 = ( ) 10
d) (56) 10 = ( ) 16
e) (63) 10 = ( ) 2

Answers

Answer:

The answers are:

[tex]a) (1001111)_2 = (79 )_{10}\\b) (11000001)_2 = (C1 )_{16}\\c) (E16)_{16} = ( 3606)_{10}\\d) (56)_{10} = (38 )_{16}\\e) (63)_{10}= (111111 )_2[/tex]

Explanation:

a. (1001111) 2 = ( ) 10

In order to convert a base 2 number to base 10 number system the place values are used.

the procedure is as follows:

[tex](1001111)_2\\=(1*2^6)+(0*2^5)+(0*2^4)+(1*2^3)+(1*2^2)+(1*2^1)+(1*2^0)\\=(1*64)+(0*32)+(0*16)+(1*8)+(1*4)+(1*2)+(1*1)\\=64+0+0+8+4+2+1\\=79[/tex]

b) (11000001) 2 = ( ) 16

In order to convert a base 2 number into base 16, group of 4-bits are made starting from right to left

The groups from the given number are:

1100 0001

Then the groups are changed in to decimal/hexa

So,

[tex](1100)_2 = (1*2^3)+(1*2^2)+(0*2^1)+(0*2^0)\\=(1*8)+(1*4)+(0*2)+(0*1)\\=8+4+0+0=12=C\\\\0001=1[/tex]

Writing in the same order in which groups were:

[tex](C1)_{16}[/tex]

c) (E16) 16 = ( ) 10

[tex](E16)_{16}\\=(E*16^2)+(1*16^1)+(6*16^0)\\=(E*256)+(1*16)+(6*1)\\=3584+16+6\\=3606[/tex]

d) (56) 10 = ( ) 16

Dividing by 16 and noting remainders

16        56

           3 - 8

So,

The number in base 16 is 38

e) (63) 10 = ( ) 2

Dividing by 2

2         63

2         31 - 1

2         15 - 1

2          7 -  1

2          3 -  1

            1 - 1

So the  number after converting in base 2 is:

111111

Hence,

The answers are:

[tex]a) (1001111)_2 = (79 )_{10}\\b) (11000001)_2 = (C1 )_{16}\\c) (E16)_{16} = ( 3606)_{10}\\d) (56)_{10} = (38 )_{16}\\e) (63)_{10}= (111111 )_2[/tex]

Write a complete program that reads a string and displays the vowels. The vowels are A, E, I, O, U and a, e, i, o, u. Here are three sample runs:Sample Run 1Enter a string: Welcome to PythonThe vowels are eoeooSample Run 2Enter a string: Student UnionThe vowels are ueUioSample Run 3Enter a string: AREIOUaeiouRTEThe vowels are AEIOUaeiouENote: your program must match the sample run exactly.using python

Answers

text = input("Enter a string: ")

new_text = ""

vowels = "aeiou"

for x in text:

   if x.lower() in vowels:

       new_text += x

print(new_text)

I hope this helps!

what is the answer only right answers

Answers

Answer:

hmm....

Explanation:

this shows you where text will appear as you type.

Answers

Answer:  what?

Explanation:

UK UKI
Different
DIFFERENTIATE BETWEEN FORMULA & A FUNCTION GNING EXAMPLE​

Answers

Explanation:

A Formula is an equation designed by a user in Excel, while a Function is a predefined calculation in the spreadsheet application. Excel enables users to perform simple calculations such as finding totals for a row or column of numbers. Formulas and functions can be useful in more complex situations, including calculating mortgage payments, solving engineering or math problems, and creating financial models.

3. Answer the following questions.
a. How does computer number system play
calculations?
a vital role in a
computer​

Answers

Answer:

Computers use the binary number system to store data and perform calculations.

Explanation:

BOTH QUESTIONS ONLY FILL IN C++ CODEWrite a copy constructor for CarCounter that assigns origCarCounter.carCount to the constructed object's carCount. Sample output for the given program:Cars counted: 5Sample program:#include using namespace std;class CarCounter { public: CarCounter(); CarCounter(const CarCounter& origCarCounter); void SetCarCount(const int count) { carCount = count; } int GetCarCount() const { return carCount; } private: int carCount;};CarCounter::CarCounter() { carCount = 0; return;}// FIXME add copy constructorvoid CountPrinter(CarCounter carCntr) { cout << "Cars counted: " << carCntr.GetCarCount(); return;}int main() { CarCounter parkingLot; parkingLot.SetCarCount(5); CountPrinter(parkingLot); return 0;}QUESTION #2!!!!!!!!!!!!!!!!_______________----------------------------------------------_______________________________Overload the + operator as indicated. Sample output for the given program:First vacation: Days: 7, People: 3Second vacation: Days: 12, People: 3Sample program:#include using namespace std;class FamilyVacation{ public: void SetNumDays(int dayCount); void SetNumPeople(int peopleCount); void Print() const; FamilyVacation operator+(int moreDays) const; private: int numDays; int numPeople;};void FamilyVacation::SetNumDays(int dayCount) { numDays = dayCount; return;}void FamilyVacation::SetNumPeople(int peopleCount) { numPeople = peopleCount; return;}// FIXME: Overload + operator so can write newVacation = oldVacation + 5,// which adds 5 to numDays, while just copying numPeople. void FamilyVacation::Print() const { cout << "Days: " << numDays << ", People: " << numPeople << endl; return;}int main() { FamilyVacation firstVacation; FamilyVacation secondVacation; cout << "First vacation: "; firstVacation.SetNumDays(7); firstVacation.SetNumPeople(3); firstVacation.Print(); cout << "Second vacation: "; secondVacation = firstVacation + 5; secondVacation.Print(); return 0;}

Answers

Answer:

im lost tell me a question then ill answer

Explanation:

Most operating systems perform these tasks. coordinating the interaction between hardware and software allocating RAM to open programs creating and maintaining the FAT modifying word processing documents correcting spreadsheet formulas displaying the GUI

Answers

Answer:

The answer are A.) Coordinating the interaction between hardware and software And B.) Allocating RAM to open programs

Explanation:

Hope this helps :)

Tasks that are been performed by most operating systems are;

Coordinating the interaction between hardware and software.Allocating RAM to open programs.

An operating system can be regarded as system software which helps in running of computer hardware as well as software resources and mange them.

This system provides common services for computer programs.

It should be noted that  operating system coordinating the interaction between hardware as well software.

Therefore, operating system, allocate RAM to open programs.

Learn more about operating system at:

https://brainly.com/question/14408927

When you read in data from a file using the read() method the data is supplied to Python in the form of:
A. A list of Strings
B. A String
C. A list of lists
D. Raw ASCII values

Answers

Answer:

B. A String

Explanation:

Remember, there are other methods or ways to read data from a file such as readlines(), and the for ... in loop method.

However, if you read in data from a file using the read () method the data would be supplied to Python in the form of a String (or single String). This is the case because a String supports only characters, unlike lists that could contain all the data types.

Using the read() method in python is used to read in files such as text files, csv and other file types. The read() method will render the read in data as as a string.

In general, the read in data from the file is supplied in the form of a string, however, depending on the version of python which is being used, the string type may vary.

When using python 2, the data is supplied as a bytestring while the data is supplied a unicode string in python 3.

Hence, the read() method renders data as a string.

Learn more : https://brainly.com/question/19973164

Individuals who break into computer systems with the intention of doing damage are called​ _____________.

a. white hats
b. ​e-criminals
c. hackers
d. keyloggers
e. black hats

Answers

I think the answer is hackers

The individuals who made the unethical entry into a person's system with intentions of damage are termed, hackers. Thus, option C is correct.

What is a computer system?

A computer system has been given as the network connection of the hardware and the software equipped with the objects that are used for the operation of the computer.

The computer system with the internet connection has been able to make the connection to the world. as well the invention mediates the work with ease as well.

The system thereby has the access to the passwords and the personal details of an individual as well. There are individuals who try to make access the computer system in an unethical way and intended to damage the system.

The computer viruses are used for the following purpose and were drawn by the hackers. Thus, option C is correct.

Learn more about the computer system, here:

https://brainly.com/question/14253652

#SPJ2

Iman manages a database for a website that reviews movies. If a new movie is going to be added to the database what else will need to be added.

Answers

Answer:

The answer would be a record.

Explanation: Took the test

PLS HELP I WILL MARK BRAINLIEST

Answers

Answer:B

Explanation: its the nucules

The answer most likely is B

how does computer number system play a Vital role in a computer calculation. ​

Answers

Answer:

When we type some letters or words, the computer translates them in numbers as computers can understand only numbers. A computer can understand the positional number system where there are only a few symbols called digits and these symbols represent different values depending on the position they occupy in the number

Explanation: SAME AS

Please help. Will give brainliest

Answers

I don’t understand it sorry :(.

fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating

Answers

Answer:

that's a good fact about yourself the more love that better

What happens if you try to compile and run this program?
#include <stdio.h>
int main (void) {
int i = 1, j = 0, k;
k = (i >> j) + G >> i) + (i >> i) + (j >>
k <<= i;
printf("%d", k):
return 0;
}​

Answers

Answer:

identifier "G" is undefined

Explanation:

The syntax of the code you provided is incorrect, so you cannot run this program.

For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastructure to help mitigate risk

Answers

Answer:

 a. User Domain: Create awareness for acceptable user-policies and security risk to educate employees of pending risk.

b. Workstation Domain: Install anti-virus and constantly update the system software.

c. LAN Domain:  Access control list or ACL should be configured in routers and port security in switches to avoid hackers physically connecting to the network.

d. LAN-to-WAN Domain: Configure firewalls and intrusion detection and prevention protocols to mitigate unwanted access.

e. WAN Domain: Configure demilitarized or demarcation zone to provide secure access and prevent unwanted users from accessing network information.

f. Remote Access Domain: The use of VPNs to grant remote access to users or employees working from home and internet protocol security (IPsec) to encrypt the packet transmission.

g. Systems/Applications Domain: Administration should be well trained and ensure to get security software patches from appropriate vendors and testing them before use.

Explanation:

Risk monitoring is one of the IT infrastructure risks management plan that observes and analyzes the threats of risk in an IT infrastructure.

2.4 Code Practice: Question 2
Write a program that accepts a number as input, and prints just the decimal portion. Your program should also work if a negative number is inputted by the user.

Sample Run
Enter a number: 15.789
Sample Output
0.789
Hints:
You'll likely need to use both the int() and float() commands in your program.
Make sure that any number the user inputs is first stored as a float.
You'll need to use at least two variables in your program: one that stores the original value entered by the user, and one that represents the integer value entered by the user.
These two variables can be subtracted from one another, to leave just the decimal portion remaining.
Don't forget to have your program print the decimal portion at the end!

Answers

num = float(input("Enter a number: "))

num1 = int(num)

print(num - num1)

I hope this helps!

Following are the C++ program to calculate the decimal part:

Program Explanation:

Defining the header file. Defining the main method. Inside the method, a float variable "num" is declared that inputs the value. In the next step, an integer variable "x" is declared that converts float value into an integer that holds the whole part number.In the next step, "num" is declared that removes the whole number part from the decimal value, and prints its value.

Program:

#include <iostream>//header file

using namespace std;

int main()//main method  

{

float num;//defining a string variable

cout<<"Enter password: ";//print message

cin>>num;//input float value

int x=int(num);//defining integer variable that converts float value into integer that hold whole part number

num=num-x;//remove whole number part from the decimal value  

cout<<num;//print decimal number

  return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/17554487

which devices are used in networking

Answers

Answer:

Hub.

Switch.

Router.

Bridge.

Gateway.

Modem.

Repeater.

Access Point.

Explanation:

Let's play Silly Sentences!

[name] was planning a dream vacation to [place].
[name] was especially looking forward to trying the local
cuisine, including [adjective 1] [food 1] and [food 2].

[name] will have to practice the language [adverb] to
make it easier to [verb] with people.

[name] has a long list of sights to see, including the
[noun] museum and the [adjective 2] park.

Answers

Answer:

Miah was planning a dream vacation to paris.

James was especially looking forward to trying local cuisine, including a barber shop , pizza joint, ice cream shop.

Mathew will have to practice the language slower to make it easier to communicate with people.

Jozlynn has a long list of sights to see, including the chicago museum and the lila arboretum park in michigan

Explanation:

Answer:

Ooh, ok ok.

Michelle was planning a dream vacation to Costa Rica. She was especially looking forward to trying the local cuisine, including picadillo, crema de fruta, and quesadillas.

Michelle will have to practice the language thoroughly to make it easier to socialize with people.

Michelle has a long list of sights to see, including the Jade Museum and the dog park.

If you don't mind will you please mark brainliest?! Thanks!  :)

Write a program that asks the user for the name of a text file. The program should display the first 10 lines of the file on the screen. If the file has fewer than 10 lines, the entire file should be displayed along with a message indicating the entire file has been displayed.

Answers

Answer:

Written in Python

filenm = input("File name: ")

myfile = open(filenm+".txt")

for i in range(10):

     line = myfile.readline()

     print(line)

print("End of file")

Explanation:

This line prompts user for file name

filenm = input("File name: ")

This line creates an instance of the file

myfile = open(filenm+".txt")

This line iterates through the 10 lines

for i in range(10):

This line reads the line

     line = myfile.readline()

This line prints each line

     print(line)

This line prints a message indicating that all possible lines have been printed

print("End of file")

20 POINTS Which of the following statements is true of subroutines? Check all that apply.

They can be used in multiple places.

They can be used in one place only.

They save a programmer time since they are reusable.

They can be used only once.

They can contribute to excessive use of a computer’s resources.

Answers

Answer:

1,3,5?

Explanation:

The following statements are the rules to be followed in maintaining good health standards in the workplace EXCEPT.
A. Adequate sanitary facilities
B. Wellness of workers
C. Promoting a positive social climate
D. Establishing good relationship with co-workers​

Answers

I think all the statements are the rules to be followed in maintaining good health standard in the workplace

Which of the following is a real job title on The interactive media career pathway?

Answers

Answer:

The right answer is A

Explanation:

Plzzzzzzzzzzzzz give me brainiest

The answer to your question is B

Please solve the ones you can. Solving Both will be appreciated. thank you

Answers

Answer:a=b+c=2ca

Im not sure about this answer

Explanation:

Florian and Tobias would like to begin communicating using a symmetric cryptosystem, but they have no prearranged secret and are not able to meet in person to exchange keys. What algorithm can they use to securely exchange the secret key?

a. IDEA
b. Diffie-Hellman
c. RSA
d. MD5

Answers

The answer is MD5

Hope this helps you have a great thanksgiving

The CEO, calls you into her office and tells you that she's learned that the company needs a database to keep track of supplier contact data as well as the experiences that buyers and operations personnel have with the suppliers. She asks you to begin developing this database. What is your first step in developing the database?

Answers

the database has been a very unique way to park in

Where in the computer is a variable such as "X" stored?

Answers

Answer:

The value of "x" is stored at "main memory".

Explanation:

Simply Central processing unit, input device and output device can not store the data.

_______________ is a computer networking protocol used by hosts to retrieve IP address assignments.

Answers

Answer:

DHCP

Explanation:

stands for dynamic host configuration protocol and is a network protocol used on IP networks where a DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints.

Other Questions
What happens to the atoms in a scoop of ice cream as it melts? They decrease in temperature. They lose energy. They vibrate faster. They are held tightly in a fixed position. Which of the following expressions are greater than 7 and less than 14? Select three that apply.A. 44B. 53C. 97D. 159 Frozen foods tend to be high inA. fat and sodium.B. cost per serving.C. essential minerals.D. nutrients and vitamins.Will give brainliest Why is a backstory important in a myth? I will write any essay for 40 - 50 points or for Brainliest Parallel to the line y=-3x + 5 passes through (-4,5) What is the main factor influencing housing styles in many folk cultures?religious values and other customary beliefsenvironmental factors such as resources availableclimate factors such as temperature and moistureregulations imposed by the ruling classestrends in popular housing styles at a given time One day, for some reason or other, Mr. Gibson came home unexpectedly. He was crossing the hall, having come in by the garden-doorthe garden communicated with the stable-yard, where he had left his horsewhen the kitchen door opened, and the girl who was underling in the establishment, came quickly into the hall with a note in her hand, and made as if she was taking it upstairs; but on seeing her master she gave a little start, and turned back as if to hide herself in the kitchen. If she had not made this movement, so conscious of guilt, Mr. Gibson, who was anything but suspicious, would never have taken any notice of her. As it was, he stepped quickly forwards, opened the kitchen door, and called out, Bethia so sharply that she could not delay coming forwards.Give me that note, he said. She hesitated a little.It's for Miss Molly, she stammered out.Give it to me! he repeated more quietly than before. She looked as if she would cry; but still she kept the note tight held behind her back.He said as I was to give it into her own hands; and I promised as I would, faithful.Cook, go and find Miss Molly. Tell her to come here at once.He fixed Bethia with his eyes. It was of no use trying to escape: she might have thrown it into the fire, but she had not presence of mind enough. She stood immovable, only her eyes looked any way rather than encounter her master's steady gaze.Molly, my dear!Papa! I did not know you were at home, said innocent, wondering Molly.Bethia, keep your word. Here is Miss Molly; give her the note.Indeed, Miss, I couldn't help it!Molly took the note, but before she could open it, her father said,That's all, my dear; you need not read it. Give it to me. Tell those who sent you, Bethia, that all letters for Miss Molly must pass through my hands. Now be off with you, goosey, and go back to where you came from.Papa, I shall make you tell me who my correspondent is.We'll see about that, by-and-by.She went a little reluctantly, with ungratified curiosity, upstairs to Miss Eyre, who was still her daily companion, if not her governess. He turned into the empty dining-room, shut the door, broke the seal of the note, and began to read it. It was a flaming love-letter from Mr. Coxe; who professed himself unable to go on seeing her day after day without speaking to her of the passion she had inspiredan 'eternal passion,' he called it; on reading which Mr. Gibson laughed a little. Would she not look kindly at him? Would she not think of him whose only thought was of her? and so on, with a very proper admixture of violent compliments to her beauty. 3. In line 35, admixture most nearly means ________.A. advertisementsB. assortmentC. scientific compoundD. confusion4. What does the phrase communicated with mean in line 2?A. was connected toB. held conversations withC. contained a mailboxD. sent letters between how do antibiotics seek out antibacterial cells? 30 points Which of the following sentences is in active voice?A. The athlete was penalized for cheating in the first quarter of the game.B. He was convinced to purchase the house by his realtor.C. The child was fed spinach, despite her protests.D. The flower bloomed earlier than expected. 2. A 75 kg runner accelerates from 0.00 m/s to 10.0 m/s in 1.5 seconds.a) What is the runner's acceleration?b) How much Kinetic Energy does the runner have at 0.0m/s, 5.0m/s, 10.0 m/s?c) graph his kinetic energy. Use velocity on the x-axis and KE on the y-axisGiven, Unknown: Equation, Substitute: Solution: need help if you can.... 7th grade social studies help me pleaseeee Though the United States is dominated by the two major political parties, there are times when a third party candidate might step and play the__________ in an election. This happens when the third party candidate joins the election and steals votes away from one of the major party candidates causing their opponent to win. O Caucus O Electoral College Split Ticket O Spoiler Role Which of the following is true regarding the atoms involved in a chemical reaction? Select all that apply.A graph shows _____ in picture form.variablesfactscolorstatisticssumsdata what is (9x+8)^2-54x+48y Help please!!!!!!!!!!!!!!!!!! The volume of a solid cube is 1700m3.Work out the surface area.Give your answer rounded to 1 DP. Find the volume of the solid. *7)