Answer:
my only true question is C
Assume a file containing a series of names (as strings) is named names.txt and exists of computer's disk. Write a program that displays the number of names that are stored in the file. While open and read data - check it for the most common exceptions.
Answer:
The program in Python is as follows:
fname = open("names.txt","r")
num = 0
for line in fname:
try:
line = float(line)
except ValueError:
num+=1
fname.close
print(num,"names")
Explanation:
This opens the file for read operation
fname = open("names.txt","r")
This initializes the number of names to 0
num = 0
This iterates through the lines of the file
for line in fname:
This runs a value check exception on each name to check for valid strings
try:
line = float(line)
This increases num by 1 for each name read
except ValueError:
num+=1
Close the file
fname.close
Print the number of names read
print(num,"names")
Write function d2x() that takes as input a nonnegative integer n (in the standard decimal representation) and an integer x between 2 and 9 and returns a string of digits that represents the base-x representation of n.
Answer:
The function in Python is as follows:
def d2x(d, x):
if d > 1 and x>1 and x<=9:
output = ""
while (d > 0):
output+= str(d % x)
d = int(d / x)
output = output[::-1]
return output
else:
return "Number/Base is out of range"
Explanation:
This defines the function
def d2x(d, x):
This checks if base and range are within range i.e. d must be positive and x between 2 and 9 (inclusive)
if d >= 1 and x>1 and x<=9:
This initializes the output string
output = ""
This loop is repeated until d is 0
while (d > 0):
This gets the remainder of d/x and saves the result in output
output+= str(d % x)
This gets the quotient of d/x
d = int(d / x) ----- The loop ends here
This reverses the output string
output = output[::-1]
This returns the output string
return output
The else statement if d or x is out of range
else:
return "Number/Base is out of range"
how do you record your own video game Music and post Them on yt
Answer:I would try downloading a beat app and making a song,then posting
Explanation:
Develop a sorting algorithm. Your sorting algorithm may only be an implementation of a the shellsort, mergesort, or quicksort. Your algorithm must use an array of integers of at least 20 different items.
Answer:
Explanation:
The following function is created in Python and uses a mergesort algorithm implementation in order to sort a given array of integers which is passed as an argument. Once complete it returns the sorted array. This can then be printed in the main method as seen in the attached picture below.
def BrainlySort(arr):
if len(arr) > 1:
mid = len(arr) // 2 #First find the middle of the array
# Divide the array into two sections
left = arr[:mid]
right = arr[mid:]
#Sort each section seperately
BrainlySort(left)
BrainlySort(right)
i = j = k = 0
# Copy data to temp arrays left[] and right[]
while i < len(left) and j < len(right):
if left[i] < right[j]:
arr[k] = left[i]
i += 1
else:
arr[k] = right[j]
j += 1
k += 1
#Make sure no elements are left in the array
while i < len(left):
arr[k] = left[i]
i += 1
k += 1
while j < len(right):
arr[k] = right[j]
j += 1
k += 1
WHY THE HECK IS BRAINLY SHOWING UNSKIPPABLE ADS!?
I was looking for an answer on brainly and it told me to see an ad. When I clicked on it and waited for the ad to end, it didn't let me skip to the answer. In fact, I doesn't let me through AT ALL. Please fix this.
Billie downloads an email attachment from a co-worker. The attachment contains a virus. Within minutes of downloading the file, Billie's computer shuts down and will not turn back on. The company uses an intranet network. How did a virus most likely get into the original file sent to Billie? Explain your answer.
Answers:
You suspect that you have accidentally downloaded a virus.Turn off his computer and reboot from a clean system disk.She has no reason to expect a file from this person.Lisa has received a file attachment from a co-worker, James.The attachment contains a virus.The virus most likely get into the original file sent to Billie through a corrupt file that was sent and it automatically pitch itself to the file.
How do viruses get into files?A lot of Computer Viruses are known to often spread to other disk drives or computers mostly wen an infected files are gotten through downloads that are gotten from websites, email attachments, etc.
Note that the issue is that virus most likely get into the original file sent to Billie through a corrupt file that was sent and it automatically pitch itself to the file.
Learn more about email attachment from
https://brainly.com/question/17506968
#SPJ2
Write an assembly code to implement the y=(x1+x2)*(x3+x4) expression on 2-address machine, and then display the value of y on the screen. Assume that the values of the variables are known. Hence, do not worry about their values in your code.
The assembly instructions that are available in this machine are the following:
Load b, a Load the value of a to b
Add b, a Add the value of a to the value of b and place the result in b
Subt b, a Subtract the value of a from the value of b and place the result in b
Mult b, a Multiply the values found in a and b and place the result in b
Store b, a Store the value of a in b.
Output a Display the value of a on the screen
Halt Stop the program
Note that a or b could be either a register or a variable. Moreover, you can use the temporary registers R1 & R2 in your instructions to prevent changing the values of the variables (x1,x2,x3,x4) in the expression.
In accordance with programming language practice, computing the expression should not change the values of its operand.
mbly code to implement the y=(x1+x2)*(x3+x4) expression on 2-address machine, and then display the value of y on the screen. Assume that the values of the variables are known. Hence, do not worry about their values in your code.
The assembly instructions that are available in this machine are the following:
Load b, a Load the value of a to b
Add b, a Add the value of a to the value of b and pla
When adding several user accounts, you might want to use the newusers utility, which can process a text file full of entries to add user accounts. Use the man or info page to find out how to use this utility, and use it to add three users. When finished, view the /etc/passwd, /etc/shadow, and /etc/group files to verify that the users were added successfully.
Explanation:
Given - When adding several user accounts, you might want to use the new users utility, which can process a text file full of entries to add user accounts.
To find - Use the man or info page to find out how to use this utility, and use it to add three users.
Proof -
New Users Utility:
It is an utility which reads the file full of usernames and clear text passwords.
It then uses this information to update a group of the existing users to create new users.The format of the file consists of specified things like:
pw - passwd
pw - age
pw - gid
pw - dir
Use of the Utility:
The command is new users filename
The file should look like -
(Username : Password : UID : GID : User Information : Home Directory : Default Shell)
where ,
UID = User Identifier
GID = Group Identifier
Testing the Users:
Creating users from the file given above test User 1, directory Of File
Executing the create user new users directory Of File
Repeat this step to undergo all the users that are been noted down in the file to make them a user in the noted group policy.
Hence,
These are the steps of using the new Users utility.
How can you refer to additional information while giving a presentation? will help you emphasize key points on a specific slide. The Notes section is only to you in the Slide view and not in the main Slide Show view.
Explanation:
1. welcome your audience and introduce yourself.
2. capture their attention
3. identify your number one goal or topic of presentation.
4. give a quick shout out line of your presentation.
5.
candidates should identify at least three different types of information in any one presentation from text, drawing, images, tables, video ,audio .
Select the correct answer.
Which section of a research paper contains all the sources that are cited in the paper?
ОА.
abstract
OB.
bibliography
OC.
review of literature
OD
analysis
thing
Reset
Next
Answer:
abstract
Explanation:
as it includes the main finding of the work, usually in research papers References cited is where that information would be.
The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sumof the previous two, for example: 0, 1, 1, 2, 3, 5, 8, 13. Complete the bonacci() method, whichtakes in an index, n, and returns the nth value in the sequence. Any negative index valuesshould return -1.
The first 14 numbers in the Fibonacci sequence are: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 144, 233. As an illustration, the numbers 3 and 5 that come before the seventh number, 8, sum up to 8.
What is the role of Fibonacci sequence?Each number in the Fibonacci sequence is equal to the sum of the two numbers before it. The numbers increase slowly. The Fibonacci sequence is the source of the golden ratio of 1.618. The golden ratio of 1.618 is a dimension that is found in many objects in nature.
Many artists believe that this is the ideal canvas proportion. As you pick greater and larger Fibonacci numbers, the fraction that results when you divide each number in the sequence by the one before it (for example, 5/3) approaches the golden ratio.
It is possible to calculate the Fibonacci numbers without needing to calculate all the preceding numbers using a formula employing the golden ratio.
Learn more about Fibonacci sequence here:
https://brainly.com/question/26507758
#SPJ5
What type of software is used to create letters and papers?
Answer:a paper that haven’t been use
Explanation:
Blockquote
The page contains a review within a block quote. Go to the Blockquote Styles section and create a style rule for theblockquote element that sets the background color to rgb(173, 189, 227) and the text color to the rgb(255, 255, 255) with an opacity of 0.65.
For every paragraph within the blockquote element create a style rule that sets the top/bottom padding space to 2.5 pixels and the left/right padding space to 10 pixels.
My Code
/* Blockquote Styles */
blockquote {
background-color:rgb(173,189,227);
color:rgb(255,255,255);
opacity:0.65;
}
blockquote > p {
padding: (2.5, 10, 2.5, 10);
}
Answer:
I don't knowthe answer
Explanation:
I really don't know the answer
uses of electric bulbs
in points please
Answer:
-in electric circuits
- to produce light
- for heat
- to direct traffic
- in cars
- in houses
thenks and mark me brainliestt pls :))
• > Four 240-pin DDR3 SDRAM DIMM sockets arranged in two channels • > Support for DDR3 1600+ MHz, DDR3 1333 MHz, and DDR3 1066 MHz DIMMs • > Support for non-ECC memory • > Support for up to 16 GB of system memory 1. Of the given features, which one(s) would be applicable to this computer? (Select all that apply.)
Answer:
The memory used in this system does not perform checking error.
Explanation:
Non ECC memory is referred to the non error checking. In this configuration the computer is able to perform assigned tasks quickly but is unable to perform checking errors. The memory supports 16GB system and the 1333 MHz is the speed of the memory.
Discuss four uses of computer
1. It helps to the development of our career.
2. Through the internet, we can know the facts which were happening all over the world
3. Computer can be use as a calculator too
4. We can store any kind of information.
Hope This Helps You ❤️Consider a collection C of subsets of a nite set V . (V; C) is called a hypergraph. A hypergraph (V; C) is 3-regular if every subset in C contains exactly three elements. A subcollection M of C is matching if all subsets in M are disjoint. Show that there exists a polynomial-time 3-approximation for the maximum matching problem in 3-regular hypergraphs as follows: Given a 3-regular hypergraph, find a matching with maximum cardinality.
Explanation:
polynomial-time 3-approximation for the maximum matching problem in 3-regular hypergraphs as follows: Given a 3-regular hypergraph, find a matching with maximum cardinality.
With the addition of electric cars, we have a need to create a subclass of our Car class. In this exercise, we are going to create the Electric Car subclass so that we can override the miles per gallon calculation since electric cars don’t use gallons of gas.
The Car class is complete, but you need to complete the ElectricCar class as outlined in the starter code with comments.
Once complete, use the CarTester to create both a Car and ElectricCar object and test these per the instructions in the CarTester class.
Classes
public class CarTester
{
public static void main(String[] args)
{
// Create a Car object
// Print out the model
// Print out the MPG
// Print the object
// Create an ElectricCar object
// Print out the model
// Print out the MPG
// Print the object
}
}
////////////////////////////
public class ElectricCar extends Car {
// Complete the constructor
public ElectricCar(String model){
}
// Override the getMPG here.
// It should return: "Electric cars do not calculate MPG.
// Override the toString() here.
// (model) is an electric car.
}
//////////////////////////////////
public class Car {
//This code is complete
private String model;
private String mpg;
public Car(String model, String mpg){
this.model = model;
this.mpg = mpg;
}
public String getModel(){
return model;
}
public String getMPG(){
return mpg;
}
public String toString(){
return model + " gets " + mpg + " mpg.";
}
}
Which statement about parallax scrolling is true?
A.
Parallax scrolling distorts the position of the player character when playing the game.
B.
Parallax scrolling involves segmenting the playing area into background layers that move slower than the foreground layers.
C.
Parallax scrolling involves unifying the playing area into a single environment.
D.
Parallax scrolling involves segmenting the playing area into background layers that move faster than the foreground layers.
E.
Parallax scrolling involves segmenting the playing area into background layers and foreground layers that move at the same speed.
Answer:
The answer is B
Explanation:
I wrote down every slide of this lesson by hand lol. Good luck on the final <3
Evaluation of your strengths and weaknesses
a. Self Assessment b. Employee
c. Entrepreneurship d. Entrepreneur
いt 背lfまyべラテぇrべit is a lolololol idek ima just stop
What is the value of 8n when n= = 2?
Answer:
The value of 8n would be 16
8n
8(2)= 16
(uhh this is a math question right? Sorry if it has to deal with tech)
hardware and costs of adding two levels of hardware RAID. Compare their features as well. Determine which current operating systems support which RAID levels. Create a chart that lists the features, costs, and operating systems supported.
Explanation:
1. Redundant batch of Inexpensive Drives (or Disks) (RAID) is a term for data storage schemes that divide and/or replicate data amid multiple hard drives.
2. RAID can be designed to provide increased data accuracy or increased Input/Output performance
Hardware RAID exists as a customized processing system, utilizing various controllers or RAID cards to control the RAID design independently from the OS. Software RAID utilizes the processing capacity of that computer's operating system in which the RAID disks exists installed.
What are the two types of RAID?
We have two kinds of RAID implementation through. Hardware and Software. Both these implementation contains its own benefits and drawbacks.
Software RAID does not count any cost for a RAID controller and exists fairly effortless to estimate the cost of as you exist only buying additional drives. All of our usual dedicated servers come with at least two drives, indicating there exists NO cost for software RAID 1, and stands positively suggested. It exists positively suggested that drives in a RAID array be of the exact type and size. With RAID 0 or RAID 1, you'd require at least two drives, so you would require to buy one additional drive in most cases. With RAID 5 you'll require at least three drives, so two additional drives, and with RAID 6 or 10 you'd require at least four total drives. To earn additional implementation, redundancy, or disk space, you can count more disks to the collections as well.
To learn more about two types of RAID
https://brainly.com/question/19340038
#SPJ2
Write a function check_palindrome that takes a string as an input and within that function determines whether the input string is a palindrome or not (a word or phrase that is read the same forward as it is backward - i.e. kayak, dad, etc.). If it is a palindrome, return 'Hey! That's a palindrome!' If it is not a palindrome, return 'Bummer. Not a palindrome.' Remember that you created a function that can reverse a string above.
Answer:
The function in Python is as follows:
def check_palindrome(strn):
retstr = "Bummer. Not a palindrome."
if strn[len(strn)::-1] ==strn:
retstr = "Hey! That's a palindrome!"
return retstr
Explanation:
This defines the function
def check_palindrome(strn):
This sets the return string to not a palindrome
retstr = "Bummer. Not a palindrome."
This checks if the original string and the reversed string are the same
if strn[len(strn)::-1] ==strn:
If yes, the return string is set to palindrome
retstr = "Hey! That's a palindrome!"
This returns the expected string
return retstr
The function to reverse the string is not given; and the programming language. So, I solve the question without considering any function
Consider the dynamic partition allocation method. Assume at some time, there are five free memory partitions of 100KB, 500KB, 200KB, 300KB, AND 600KB(in order), how would the first-fit algorithms place processes of 212KB, 417KB, 112KB, and 426KB(in order)
Answer:
212KB is allocated to 500KB partition
417KB is allocated to 600KB partition
112KB is allocated to 288KB partition
426KB will wait
Explanation:
The first fit algorithm works by taking up the first available free partition which has a large enough enough space to accommodate it's size ; The 212KB takes up 500KB (it's the next available partition larger Than 212) ; then it leaves a space of (500KB - 212KB = 288KB) ; Then the 417KB takes up the next large enough storage space of 600KB (also leaving 600 - 417 = 183KB) ; the next large enough space for 112KB is the 288KB ; there is no space large enough to accommodate 426KB.
Describe a cellular network, its principle
components and how it works.
A cellular network is a contact network with a wireless last connection. The network is divided into cells, which are served by at least one fixed-location transceiver station each. These base stations provide network coverage to the cell, which can be used to send voice, data, and other types of information. It's often referred to as a mobile network.
The principal components of the cellular network will be explained below as follows-
BTS (Base Transceiver Station) - It is the most important part of a cell since it links subscribers to the cellular network for data transmission and reception. It employs a network of antennas that are dispersed across the cell.
BSC (Basic Station Controller) - It is a portion that interfaces between Basic Station Controllers and is connected to Basic Station Controllers via cable or microwave links, as well as routing calls between Basic Station Controllers and the MSC (Mobile Switching Center).
MSC (Mobile Switching Center) - The supervisor of a cellular network is linked to several Basic Station Controllers and routes cells between them. It also connects the cellular network to other networks such as the PSTN through fiber optics, microwave, or copper cable.
A cellular network works when the SIM card is organized into geographical cells, each of which has an antenna that transmits to all mobile phones in the city, cellular networks operate by knowing the exact location, which comes from the SIM card. A transmitter generates an electrical signal, which is converted by the transmit antenna into an electromagnetic wave, which is then radiated, and the RF wave is then converted back into an electrical signal. In cellular network networks, four multiple access schemes are used, ranging from the first analog cellular technologies to the most modern cellular technologies.
Arrays of structures ________. Group of answer choices None of the above. are automatically passed by reference cannot be passed by reference are automatically passed by value
Answer:
are automatically passed by reference.
Explanation:
A parameter can be defined as a value that can be passed to a function. Thus, a parameter refers to a value that must be passed into a function, subroutine or procedure when it is called.
This value can be passed to a function either by reference or by value.
This ultimately implies that, parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.
Basically, parameters can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.
In Computer programming, an array can be defined as data structure which comprises of a fixed-size collection of variables each typically holding a piece of data and belonging to the same data type such as strings or integers.
This ultimately implies that, when a programmer wishes to store a group of related data (elements) of the same type, he or she should use an array.
A character positions in arrays start counting with the number 0 not 1.
Hence, an array uses a zero-based indexing and as such the numbering or position of the characters (elements) starts from number 0. Thus, the first character (element) in an array occupies position zero (0), the second number one (1), the third number two (2) and so on.
Generally, arrays of structures are automatically passed by reference through the use of a REPLICATE function.
Which of the following is not one of the goals of technical recovery team members during the recovery phase of a BCP? Normalize operations. Restore temporary operations to critical systems. Repair damage done to original systems. Recover damage to original systems.
Answer:
Repair damage done to original systems
Explanation:
It is imperative that businesses brace up for moments or period of challenges whereby normal operation is impeded due to disruption in standard system condition. The ability of businesses to thrive and continue to deliver in these circumstances is catered for by the business continuity plan. The recovery team ensures that important processes critical to the business are restored in other to ensure that business operation isn't crippled. Once normalcy ahs been restored, the team ensures recoverabke day in the original system are taken care of. The repair of damage done is not a goal of the recovery ohase in the business continuity plan as repairsvare catered for after recovery event has been finalized.
Which of these statements regarding mobile games is true?
A.
They are typically played indoors.
B.
They have detailed environments.
C.
Their levels can be completed quickly.
D.
They are typically played for several hours at a time.
E.
They are played on large screens.
Answer:
C. The levels can be completed quickly
#PlatoLivesMatter
Explanation:
Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
debugging software
creating data sets
compiler software
error messages
Answer:
A C D
Explanation:
Answer:
Correct
Explanation:
What is the technology in community
Answer:
Community technology is the practice of synergizing the efforts of individuals, community technology centers and national organizations with federal policy initiatives around broadband, information access, education, and economic development. National organizations efforts include: Developing effective language.