An argument does not always have to be made in words. A piece of music
can make an argument; however, the argument is usually a(n)
one.
A. unfocused
B. emotional
C. credible
D. logical
Answer:
B. emotional
Explanation:
An emotional argument. An argument does not always have to be made in words.
The piece of music that can make an argument is usually an emotional argument. Thus option B is correct.
What is an emotional argument?An emotional argument is an e that is made in words and expresses its deals in terms of feelings and thoughts. The emotional argument is characterized by the manipulation of the recipient's emotions and has an absence of factual evidence.
Find out more information about the argument.
brainly.com/question/3775579
ime: 30rning
Q1. Write appropriate declaration for each group of variables
. Integer variable: p, q
Answer:
Write appropriate declarations for each group of variables and arrays. ... Integer Variables: P, Q 3. ... 1) float x,y,z; The keyword float is used to create a variable declaration for the type float 2)int p,q; The keyword int is ...
In this exercise, you are asking the user to set a alpha numeric password for any website. Put some conditions.
Password must be 8 characters long.
There must be at-least one uppercase letter.
There must be at least one number.
Then show the user, you have set the correct password or not.
Sample output (Ex 6 and 7): Top 2 are for Ex-6 and bottom 2 are for Ex-7
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: Nidhi123
You have set the correct password.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: Nidhi12!
You have set the correct password.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: nidhi123
Your password doesn't meet the criteria.
Uppercase is missing.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: nidhi 234
Your password doesn't meet the criteria.
Uppercase is missing.
It's not 8 characters long correct size.
Answer:
The program in Python is as follows:
print("Create your password which must have these.\nMust be 8 characters long.\nAt least one uppercase letter.\nAt least one number.")
pwd = input("Enter your password: ")
chkLength = 0; chkUpper = 0; chkLower = 0; chkDigit = 0
if len(pwd) == 8:
chkLength = 1
if (any(x.isupper() for x in pwd)):
chkUpper = 1
if any(y.islower() for y in pwd):
chkLower = 1
if any(z.isdigit() for z in pwd):
chkDigit = 1
if chkLength == 1 and chkUpper == 1 and chkLower == 1 and chkDigit == 1:
print("You have set the correct password.")
else:
print("Your password doesn't meet the criteria.")
if chkLength == 0:
print("It's not 8 characters long correct size.")
if chkDigit == 0:
print("Digit is missing.")
if chkLower == 0:
print("Lowercase is missing.")
if chkUpper == 0:
print("Uppercase is missing.")
Explanation:
This prints the instruction
print("Create your password which must have these.\nMust be 8 characters long.\nAt least one uppercase letter.\nAt least one number.")
This prompts the user for password
pwd = input("Enter your password: ")
This initializes check variables to 0 (0 - false)
chkLength = 0; chkUpper = 0; chkLower = 0; chkDigit = 0
If password length is 8
if len(pwd) == 8:
Set check variable of length to 1 (1 - true)
chkLength = 1
If password has uppercase
if (any(x.isupper() for x in pwd)):
Set check variable of uppercase to 1
chkUpper = 1
If password has lowercase
if any(y.islower() for y in pwd):
Set check variable of lowercase to 1
chkLower = 1
If password has digit
if any(z.isdigit() for z in pwd):
Set check variable of digits to 1
chkDigit = 1
If all check variables is 1, then the password is correct
if chkLength == 1 and chkUpper == 1 and chkLower == 1 and chkDigit == 1:
print("You have set the correct password.")
If otherwise,
else:
The password is incorrect
print("Your password doesn't meet the criteria.")
The following prints the corresponding criteria that is not met, depending on the value of its check variable
if chkLength == 0:
print("It's not 8 characters long correct size.")
if chkDigit == 0:
print("Digit is missing.")
if chkLower == 0:
print("Lowercase is missing.")
if chkUpper == 0:
print("Uppercase is missing.")
10 POINTS!!!!
Which is a virtual meeting place for developers?
O an online help site
O a user manual
O a developer conference
O a developer forum
Answer:
A Developer Conference
Explanation:
Due to it being a meeting place, a conference has a high probability whereas a forum is not really a "live" meet but whereas a conference is live and virtual in many cases. Cannot guarantee tho.
Assume that Student, Employee and Retired are all extended classes of Person, and all four classes have different implementations of the method getMoney. Consider the following code where_______ indicates the required parameters for the constructors:
Person p = new Person(...);
int m1 = p.getMoney(); // assignment 1
p = new Student(...);
int m2 = p.getMoney(); // assignment 2
if (m2 < 100000)
p = new Employee(...);
else if (m1 > 50000)
p = new Retired(...);
int m3 = p.getMoney(); // assignment 3
Refer to above code The reference to getMoney() in assignment 1 is to the class:________
a. Person
b. Student
c. Employee
d. Retired
e. This cannot be determined by examining the code
Answer:
a. Person
Explanation:
The reference getMoney() is a method that is part of the Person class. This can be proven with the code since subclasses can access methods from the parent class but a parent class cannot access methods from the child classes. Since Student, Employee, and Retired are all child classes that extend to the Person parent class then they can access getMoney(), but unless getMoney() is in the Person class, then a Person object shouldn't be able to access it. Since the first object created is a Person object and it is accessing the getMoney() method, then we can assume that the getMoney() method is within the Person class.
lasses give programmers the ability to define their own types.
a. True
b. False
Answer:
TRUE.
Explanation:
Communication protocols, sets of rules agreed to by all parties, are designed in order to:
Group of answer choices.
A. Ensure that cell phones and laptops cannot communicate.
B. Give each country its own internet language.
C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.
D. Assure that computers and other devices don't pollute the environment.
Answer:
C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Each layer has its unique functionality which is responsible for the proper functioning of the communication services.
Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.
Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.
This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.
For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.
Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack comparable objects. Assume that pop and push operations are currently implemented using array a as follows, where item is a String and n is the size of the stack. Note: if x andy are objects of the same type, use x.compareTo(y) to compare the objects x and y public void push String item ) { [n++] = iten; } public String pop { return al--n]; } Implement the max operation in two ways, by writing a new method using array a (in 8.1), or updating push and pop methods to track max as the stack is changed (in 8.2). Q8.1 Implement method maxi 5 Points Write a method max() using Out) space and Oin) running time. public String max() {...} Enter your answer here Q8.2 Update push() and popo 5 Points Write a method max() using On) space and 011) run time. You may update the push and pop methods as needed public void push {...} public String pop() {...} public String max() {...}
Answer:
Following are the code to the given points:
Explanation:
For point 8.1:
public String max()//defining a method max
{
String maxVal=null;//defining a string variable that holds a value
for(int x=0;x<n;x++)
{
if(maxVal==null || a[i].compareTo(maxVal)>0)//defining if blok to comare the value
{
maxVal=a[i];//holding value in maxVal variable
}
}
return maxVal;//return maxVal variable value
}
For point 8.2:
public void push(String item)//defining a method push that accepts item value in a parameter
{
a[n]=item;//defining an array to hold item value
if(n==0 || item.compareTo(maxVals[n-1])>0)//use if to comare item value
{
maxVals[n]=item;//holding item value in maxVals variable
}
else
{
maxVals[n]=maxVals[n-1];//decreasing the maxVals value
}
n++;//incrementing n value
}
public String pop()//defining a method pop
{
return a[--n];//use return value
}
public String max()//defining a method max
{
return maxVals[n-1];//return max value
}
In the first point, the max method is declared that compares the string and returns its max value.In the second point, the push, pop, and max method are declared that works with their respective names like insert, remove and find max and after that, they return its value.What does the following code print?
public class { public static void main(String[] args) { int x=5 ,y = 10; if (x>5 && y>=2) System.out.println("Class 1"); else if (x<14 || y>5) System.out.println(" Class 2"); else System.out.println(" Class 3"); }// end of main } // end of class.
Answer:
It throws an error.
the public class needs a name.
like this:
public class G{ public static void main(String[] args) {
int x=5 , y = 10;
if (x>5 && y>=2) System.out.println("Class 1");
else if (x<14 || y>5) System.out.println(" Class 2");
else System.out.println(" Class 3"); }// end of main
}
if you give the class a name and format it, you get:
Class 2
Explanation:
HELP ME !!!!!!!
Consider the following website URL: http://www.briannasblog.com. What
does the "http://" represent?
A. FTP
B. Resource name
C. Protocol identifier
D. Domain name
Answer:
C. Protocol Identifier
The "http://" in a website URL represents the protocol identifier, specifically the Hypertext Transfer Protocol (HTTP). The correct option is C.
A protocol identifier is a string of characters that identifies the type of communication protocol being used to send data between network devices.
The protocol identifier, specifically the Hypertext Transfer Protocol, is represented by the "http://" in a website URL (HTTP).
HTTP is the World Wide Web's underlying protocol that defines how messages are formatted and transmitted between web servers and web browsers.
The domain name in the URL, in this case "briannasblog.com," identifies the specific website being accessed.
The "http://" in the URL is required to indicate that the browser should communicate with the web server and retrieve the website's resources using the HTTP protocol.
For more details regarding Protocol identifier, visit:
https://brainly.com/question/11763983
#SPJ7
Code in Python
Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the loop.
Sample output with input: 20
10.0
5.0
2.5
1.25
0.625
Note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds and report "Program end never reached." The system doesn't print the test case that caused the reported message.
My code, it only passes one test with correct outputs
what am I forgetting?
You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:
user_num = int(input())
while user_num>=1:
user_num/=2
print(user_num)
I wrote my code in python 3.8. I hope this helps.
Which is the correct option?
Answer:
C
Explanation:
Key logging is when a hacker can track every key u have clicked.
I sent a message to you thus morning did you check your ____?
a. blog
b. inbox
c. laptop
Answer:
inbox
Explanation:
messages go to your inbox mark me brainliest
Does anyone have any tips on what to buy and sell to make quick profits?
Answer:
lemonaid stand
Explanation:
Answer:
Or you can work in a store like a movie theater or smth
Explanation:
what is the mean of debugging
Answer:
the process of identifying and removing errors from computer hardware or software
Explanation:
Essentially just fixing programming errors, mainly in coding or software
A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is located in an urban city. Which of the following best describes a limitation of using a simulation for this purpose?
a) The model used by the simulation software cannot be modified once the simulation has been used.
b) The model used by the simulation software often omits details so that it is easier to implement.
c) Running a simulation requires more time to generate data from trials than observing the crowd exiting the arena at various events.
d) Running a simulation requires a large number of observations to be collected before it can be used to explore a problem.
Answer:
d)
Explanation:
The main limitation of simulations is that running a simulation requires a large number of observations to be collected before it can be used to explore a problem. In a real life situation there are thousands of variables to take into consideration which can drastically affect the way that the situation unfolds at any given time. Therefore, in order to replicate/simulate such a scenario all of these variables need to be taken into consideration. This data can take a large amount of time to observe and collect in order to implement into the simulation so that it provides an accurate depiction of the problem.
to copy and paste the image in MS Word the dash option is used
ur answer hope this will helps u
(Editing)
So I’m editing some videos for an assignment but the teacher is telling me to trim or splice, what’s the difference between those two?
Answer:
Cut means to another shot. Or cutting off part of a shot. Trim means to shorten the shot (and there are trim tools.)
Trimming usually refers to taking off either part of the beginning or end of a video clip. Sometimes this is referred to as trimming the top or tail (beginning or end)
Explanation:
~Hope this helps
Assert statements are a tool programmers employ to help them debug their code more efficiently.
a. True
b. False
Answer: True
Explanation:
The statement that assert statements are a tool programmers employ in order to help them debug their code more efficiently is true.
They help in debugging as they evaluate whether a statement is either true or false. When it's false, the assert statement will indicate an error which shows that there is a bug that need to be fixed.
Instruction: Decide what the total marketing budget will be, and make a list of at least four things you will spend money on and how much you think they will cost.
Answer:
Explanation:
ok?
By the 1970s, the acceleration of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics of the Middle Ages, fears that were confirmed beginning in the 1970s by the worldwide spread of:________
a. the Zika virus.
b. the HIV infection
c. severe acute respiratory syndrome (SARS)
d. the Asian flu virus
e. Ebola
Answer:
b. the HIV infection.
Explanation:
Around the 1970s, an increase in the use of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics such as tuberculosis, leprosy, smallpox, trachoma, anthrax, scabies, etc., that were evident during the Middle Ages, fears that were later confirmed by the worldwide spread of the HIV infection, beginning in the 1970s in the United States of America.
STD is an acronym for sexually transmitted disease and it can be defined as diseases that are easily transmissible or contractable from another person through sexual intercourse. Thus, STD spread from an infected person to an uninfected person while engaging in unprotected sexual intercourse. Some examples of STDs are gonorrhea, chlamydia, syphilis, HIV, etc.
HIV is an acronym for human immunodeficiency virus and it refers to a type of disease that destabilizes or destroy the immune system of a person, thus, making it impossible for antigens to effectively fight pathogens.
Generally, contracting STDs has a detrimental effect to a patient because it causes an opening (break) or sore in the body of the carrier (patient) and as such making them vulnerable to diseases that are spread through bodily fluids e.g human immunodeficiency virus (HIV), Hepatitis, staphylococcus, AIDS, etc.
which one of the following can be used in a Document name,when saving?
1.Numbers
2.Semi-colon
3.Forward dash
4.Question mark
Answer:
3. forward dash would you like an explanation?
Only number can be used in a Document name.
File names are shown in alphabetical order in the folder structure. It is critical to also include the zero for numbers 0-9. This helps to maintain the numerical order when file names contain numbers.
Most software packages are case sensitive, so use lowercase wherever possible. Instead of using commas and underscores, use a hyphen.
So, Option "1" is the correct answer to the following question.
Learn more:
https://brainly.com/question/17429689?referrer=searchResults
I bring my _____ computer to work
a. in box
b. ebook
2. List the differences between personal
computer operating systems and mainframe
operating systems.
Explanation:
Mainframes typically run on large boxes with many processors and tons of storage, as well as high-bandwidth busses. PCs are desktop or mobile devices with a single multi-core processor and typically less than 32GB of memory and a few TBs of disk space. Second, a mainframe OS usually supports many simultaneous users.
what is the different between information and data
Answer:
Information is the act of imparting knowledge and data is the recorded observation that are usually presented in a structured format
I bring my _____ computer to work
a. in box
b. ebook
c. attachment
d.blog.
e. delete
f. document
g. download
h. ebook
I. email address
j. file
k. inbox
l. keyboard
m. laptop
n. link
o. online
p. password
q. sign in
Answer:
I think it's laptop or sign in
hope this helps
have a good day :)
Explanation:
Pick which one you think is the best choice
Which type of query enables a user to move, append, or update matching records in a table?
action query
select query
static query
parameter query
Answer:
the query that allows these things is called an action query
Answer:
The answer is A-action query just finshed the review on edg 2021
Explanation:
what are events in computer programming?
Answer:
mnkn
Explanation:
Therese would now like to preview her slide show to make sure everything is working. She should___.
• switch to Normal slide view
•click on the first slide in the slide pane
• switch to Slide Show view
• click on Slide Show layout in the side pane
Answer:
c
Explanation:
The program below converts US Dollars to Euros, British Pounds, and Japanese Yen # Complete the functions USD2EUR, USD2GBP, USD2JPY so they all return the correct value def USD2EUR(amount): """ Convert amount from US Dollars to Euros. Use 1 USD = 0.831467 EUR args: amount: US dollar amount (float) returns: value: the equivalent of amount in Euros (float) """ #TODO: Your code goes here value = amount * 0.831467 return value
Answer:
The program in Python is as follows:
def USD2EUR(amount):
EUR = 0.831467 * amount
return EUR
def USD2GBP(amount):
GBP = 0.71 * amount
return GBP
def USD2JPY(amount):
JPY = 109.26 * amount
return JPY
USD = float(input("USD: "))
print("Euro: ",USD2EUR(USD))
print("GBP: ",USD2GBP(USD))
print("JPY: ",USD2JPY(USD))
Explanation:
This defines the USD2EUR function
def USD2EUR(amount):
This converts USD to Euros
EUR = 0.831467 * amount
This returns the equivalent amount in EUR
return EUR
This defines the USD2GBP function
def USD2GBP(amount):
This converts USD to GBP
GBP = 0.71 * amount
This returns the equivalent amount in GBP
return GBP
This defines the USD2JPY function
def USD2JPY(amount):
This converts USD to JPY
JPY = 109.26 * amount
This returns the equivalent amount in JPY
return JPY
The main begins here
This gets input for USD
USD = float(input("USD: "))
The following passes USD to each of the defined functions
print("Euro: ",USD2EUR(USD))
print("GBP: ",USD2GBP(USD))
print("JPY: ",USD2JPY(USD))
Note the program used current exchange rates for GBP and JPY, as the rates were not provided in the question