Answer:
Link
Explanation:
A Link is a term often used in computer application, data, or file management, that allows a user to carry out the operation of transferring data or information from one file to another often referred to as a target.
There are two types of major links, these include Symbolic links and Hard links.
Hence, in this case, A connection between files that allows data to be transferred from one file to another is a LINK
write an essay about yourself based on the dimensions of ones personality
Write a program to output the following quote by Edsger W. Dijkstra:
"Computer Science is no more about computers
than astronomy is about telescopes"
- Edsger W. Dijkstra
Hint: Remember that the escape characters \n and \" can be used to create new lines and quotation marks in your code.
In python 3.8:
print("\"Computer Science is no more about \ncomputers\nthan astronomy is about telescopes\"\n-Edsger W. Dijkstra")
I hope this helps!
fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
Answer:
that's a good fact about yourself the more love that better
The CEO, calls you into her office and tells you that she's learned that the company needs a database to keep track of supplier contact data as well as the experiences that buyers and operations personnel have with the suppliers. She asks you to begin developing this database. What is your first step in developing the database?
what will be output of this program a. less than 10 b. less than 20 c. less than 30 d. 30 or more
Answer:
D. 30 or more
Explanation:
The score value is passed in as var, meaning, its value could change. In this instance score started at zero and 30 was added to it. The last condition is the only condition that fits score's value(if that makes sense). So its in fact D.
hope i was able to help ;)
UK UKI
Different
DIFFERENTIATE BETWEEN FORMULA & A FUNCTION GNING EXAMPLE
Explanation:
A Formula is an equation designed by a user in Excel, while a Function is a predefined calculation in the spreadsheet application. Excel enables users to perform simple calculations such as finding totals for a row or column of numbers. Formulas and functions can be useful in more complex situations, including calculating mortgage payments, solving engineering or math problems, and creating financial models.
Consider the use of 1000-bit frames on a 1-Mbps satellite channel with a 270-ms delay. What is the maximum link utilization for,
a. Stop-and-wait flow control?
b. Continuous flow control with a window size of 7?
c. Continuous flow control with a window size of 127?
Susan is taking a French class in college and has been asked to create a publication for her class. What feature can she
use to help her develop her publication in French?
Research
Grammar
Language
Spell Check
Answer:
Essayons
Explanation:
the answer is Language
Write an application named Hurricane that outputs a hurricane’s category based on the user’s input of the wind speed. Category 5 hurricanes have sustained winds of at least 157 miles per hour. The minimum sustained wind speeds for categories 4 through 1 are 130, 111, 96, and 74 miles per hour, respectively. Any storm with winds of less than 74 miles per hour is not a hurricane. If a storm falls into one of the hurricane categories, output This is a category # hurricane, with # replaced by the category number. If a storm is not a hurricane, output This is not a hurricane.
Answer:
def Hurricane(wind_speed):
if wind_speed >= 157:
print("Category 5 hurricane")
elif wind_speed >= 130:
print("Category 4 hurricane")
elif wind_speed >= 111:
print("Category 3 hurricane")
elif wind_speed >= 96:
print("Category 2 hurricane")
elif wind_speed >= 74:
print("Category 1 hurricane")
else:
print("Not a hurricane")
Hurricane(121)
Explanation:
The function "Hurricane" in the python code accepts only one argument which is the recorded speed of a hurricane. The nested if-statement evaluates the speed of the hurricane and output the appropriate category of the hurricane based on the speed.
_______________ is a computer networking protocol used by hosts to retrieve IP address assignments.
Answer:
DHCP
Explanation:
stands for dynamic host configuration protocol and is a network protocol used on IP networks where a DHCP server automatically assigns an IP address and other information to each host on the network so they can communicate efficiently with other endpoints.
In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation, and explain briefly. for (int i = 0; i < 3; i++) { for (int j = 0; j < n; j++) { for (int k = 0; k < j; k++) { count(); } }
Answer:
The loop counts the count() function length of n-1 times with respect to n.
Explanation:
The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.
The n represents the number length of a range of numbers or iterables (like an array).
which of the following file formats cannot be imported using Get & Transform
Answer:
The answer to this question is given below in the explanation section.
Explanation:
In this question, the given options are:
A.) Access Data table
B.)CVS
C.)HTML
D.)MP3
The correct option to this question is D- MP3.
Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.
As you know that the GET statement is used to get data from the file and do further processing and transformation.
hey yall wanna send me some just ask for my phone #
Answer:
Send you some what?
Explanation:
the answer is 12
) Printers today have many features that include improved quality, photo printing capabilities, digital camera connectivity, built-in flash memory card readers, wireless connectivity, and faster speed. Suppose you are in the market for a new personal printer. Make a list of the most important features needed to meet your needs, and then research printers to identify the best printer for your needs. Be sure to consider both the price of the printer and the price of consumables (such as paper and ink/toner) in your evaluation process. (3 marks)
Explanation:
Some of the most important features needed in a printer are:
fast printing speedsupport wireless connectivitysupport colored/uncolored printinginclude improved text quality,improved photo printing capabilitiesBased on market prices available on the Amazon website, a printer with the above capabilities start at a price range of at least $80.
Write a recursive function called sum_values that takes in a list of integers and an index of one element in the list and returns the sum of all values/elements in the list starting with the element with the provided index and ending with the last element in the list.
Answer:
Explanation:
The following code is written in the Java programming language and actually takes in three parameters, the first is the list with all of the int values. The second parameter is the starting point where the adding needs to start. Lastly is the int finalSum which is the variable where the values are all going to be added in order to calculate a final int value. Once the recursive function finishes going through the list it exits the function and prints out the finalSum value.
public static void sum_Values(ArrayList<Integer> myList, int startingPoint, int finalSum) {
if (myList.size() == startingPoint) {
System.out.println(finalSum);
return;
} else {
finalSum += myList.get(startingPoint);
sum_Values(myList, startingPoint+1, finalSum);
}
}
A computer is using a fully associative cache and has 216 bytes of memory and a cache of 64 blocks, where each block contains 32 bytes.
Required:
a. How many blocks of main memory are there?
b. What is the format of a memory address as seen by the cache, that is, what are the sizes of the tag and offset fields?
c. To which cache block will the memory address F8C9 (subscript) 16 map?
1) The number of blocks of main memory that are there are;
2^16/32 = 2^16/2^5 = 2^11
2) The format of a memory address as seen by the cache,that is the sizes of the tag and offset fields are;
16 bit addresses with 11 bits also in the tag field and the 5 bits in the word field.
3) The cache block that the memory address F8C9 (subscript) 16 map;
Since it is an associative cache, it can actually map anywhere.
That is, it has the ability of mapping anywhere.
Need help with 4.7 lesson practice
Answer: Question 1 is A Question 2 is C
Explanation:
Some of the latest smartphones claim that a user can work with two apps simultaneously. This would be an example of a unit that uses a __________ OS.
Answer:
MULTITASKING OS
Explanation:
MULTITASKING OPERATING SYSTEM is an operating system that enables and allow user of either a smartphone or computer to make use of more that one applications program at a time.
Example with MULTITASKING OPERATING SYSTEM smartphones user can easily browse the internet with two applications program like chrome and Firefox at a time or simultaneously
Therefore a user working with two apps simultaneously is an example of a unit that uses a MULTITASKING OS.
What was the name of first computer?
Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save those ten numbers in the reverse order. Display the original array and new array. Then define two separate methods to compute the maximum number and minimum number of the array.Sample Run:Please enter 10 numbers: 1 3 5 8 2 -7 6 100 34 20The new array is: 20 34 100 6 -7 2 8 5 3 1The maximum is: 100The minimum is: -7Bonus: Determine how many numbers are above or equal to the average and how many numbers are below the average.
import java.util.Scanner;
import java.util.Arrays;
public class JavaApplication47 {
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.print("Please enter 10 numbers: ");
String [] nums = scan.nextLine().split(" ");
int newNums[] = new int [nums.length];
int w = 0, total = 0, above = 0, below = 0;
for (int i=(nums.length-1); i>=0;i--){
newNums[w] = Integer.parseInt(nums[i]);
w++;
}
System.out.println("The old array is: "+Arrays.toString(nums));
System.out.println("The new array is: "+Arrays.toString(newNums));
Arrays.sort(newNums);
System.out.println("The maximum is: "+newNums[9] + "\nThe minimum is: "+newNums[0]);
for (int i : newNums ){
total += i;
}
total = total / 10;
for (int i : newNums){
if (i >= total){
above += 1;
}
else{
below += 1;
}
}
System.out.println("There are "+above+" numbers above or equal to the average.");
System.out.println("There are "+below+" numbers below the average.");
}
}
I hope this helps!
90 points can someone please write the code for this (HTML):
A text field to enter your name.
At least three multiple choice questions where only one answer can be chosen.
A word problem with a text area for the user to type in the answer.
At least three different math symbols using correct ampersand notation.
A Submit button at the end of the test.
Comment tags that indicate the start and end of the test.
I need to get this done really soon, please help. I couldn't find any text to HTML sites that included multiple choice and Interactive buttons.
Answer:
Explanation:
1.
First name:
Last name:
.
2.
What fraction of a day is 6 hours?
Choose 1 answer
6/24
6
1/3
1/6
Submit
</p><p> // The function evaluates the answer and displays result</p><p> function displayAnswer1() {</p><p> if (document.getElementById('option-11').checked) {</p><p> document.getElementById('block-11').style.border = '3px solid limegreen'</p><p> document.getElementById('result-11').style.color = 'limegreen'</p><p> document.getElementById('result-11').innerHTML = 'Correct!'</p><p> }</p><p> if (document.getElementById('option-12').checked) {</p><p> document.getElementById('block-12').style.border = '3px solid red'</p><p> document.getElementById('result-12').style.color = 'red'</p><p> document.getElementById('result-12').innerHTML = 'Incorrect!'</p><p> showCorrectAnswer1()</p><p> }</p><p> if (document.getElementById('option-13').checked) {</p><p> document.getElementById('block-13').style.border = '3px solid red'</p><p> document.getElementById('result-13').style.color = 'red'</p><p> document.getElementById('result-13').innerHTML = 'Incorrect!'</p><p> showCorrectAnswer1()</p><p> }</p><p> if (document.getElementById('option-14').checked) {</p><p> document.getElementById('block-14').style.border = '3px solid red'</p><p> document.getElementById('result-14').style.color = 'red'</p><p> document.getElementById('result-14').innerHTML = 'Incorrect!'</p><p> showCorrectAnswer1()</p><p> }</p><p> }</p><p> // the functon displays the link to the correct answer</p><p> function showCorrectAnswer1() {</p><p> let showAnswer1 = document.createElement('p')</p><p> showAnswer1.innerHTML = 'Show Corrent Answer'</p><p> showAnswer1.style.position = 'relative'</p><p> showAnswer1.style.top = '-180px'</p><p> showAnswer1.style.fontSize = '1.75rem'</p><p> document.getElementById('showanswer1').appendChild(showAnswer1)</p><p> showAnswer1.addEventListener('click', () => {</p><p> document.getElementById('block-11').style.border = '3px solid limegreen'</p><p> document.getElementById('result-11').style.color = 'limegreen'</p><p> document.getElementById('result-11').innerHTML = 'Correct!'</p><p> document.getElementById('showanswer1').removeChild(showAnswer1)</p><p> })</p><p> }</p><p>
3.<p> rows="5" cols="30"</p><p> placeholder="type text.">
4. <p>I will display €</p>
<p>I will display ∂</p>
<p>I will display ∃</p>
5. <input type="submit">
6. This code should be the first code
<!-- This is a comment -->
<p>Start Test.</p>
<!-- Remember to add more information here -->
This code should be the last and at the end of the of the html code
<!-- This is a comment -->
<p>End Test.</p>
<!-- Remember to add more information here -->
Notice: Answers may not be accurate and may be accurate. And pls endeavor to edit any part of the html code.
The TCP/IP Application Layer and the OSI Application Layer are relevant mainly to programmers, not to network technicians.
True/False
Answer:
Yes they are to programmer
Explanation:
Plz give me brainiest
Answer:
true
Explanation:
Comment on the following 2 arrays. int *a1[8]; int *(a2[8]); a1 is pointer to an array; a2 is array of pointers a1 is pointer to an array; a2 is pointer to an array a1 is array of pointers; a2 is pointer to an array a1 is array of pointers; a2 is array of pointers
Answer:
The answer is "a1 and a2 is an array of pointers".
Explanation:
In this question, A collection of pointers refers to an array of elements where each pointer array element points to a data array element. In the above-given statement, the two-pointer type array "a1 and a2" is declared that holds the same size "8" elements in the array, and each element points towards the array's first element of the array, therefore, both a1 and a2 are pointer arrays.
What does cpu mean
Answer:
CPU or Central processing unit is the principal part of any digital computer system, generally composed of the main memory, control unit, and arithmetic-logic unit.
Hope this helps and if you could mark this as brainliest. Thanks!
In a program a menu shows a list of?
Answer:
implemented instructions
What is the name of the setting that creates a Green Dashed line and allows you to set angular locks when activation
Answer:
Polar Tracking
Explanation:
Polar Tracking a term or function in AUTOCAD that is used to identify a point closest to a predetermined angle and define a distance along that angle. This helps creates a line (which is a green dashed line). Thereby enabling a user to set angular locks when or during activation.
Hence, in this case, the correct answer to the question is POLAR TRACKING
Individuals who break into computer systems with the intention of doing damage are called _____________.
a. white hats
b. e-criminals
c. hackers
d. keyloggers
e. black hats
The individuals who made the unethical entry into a person's system with intentions of damage are termed, hackers. Thus, option C is correct.
What is a computer system?A computer system has been given as the network connection of the hardware and the software equipped with the objects that are used for the operation of the computer.
The computer system with the internet connection has been able to make the connection to the world. as well the invention mediates the work with ease as well.
The system thereby has the access to the passwords and the personal details of an individual as well. There are individuals who try to make access the computer system in an unethical way and intended to damage the system.
The computer viruses are used for the following purpose and were drawn by the hackers. Thus, option C is correct.
Learn more about the computer system, here:
https://brainly.com/question/14253652
#SPJ2
PLS HELP I WILL MARK BRAINLIEST
Answer:B
Explanation: its the nucules
Write a program that asks the user to input their first and last names. The first prompt should state:
Please input your first name:
The second prompt should state:
Please input your last name:
After accepting the inputs, your program should output the input in the form last name, first name.
Hint: Remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a comma as well and that the comma must be followed by a space.
first = input("Please input your first name: ")
last = input("Please input your last name: ")
print(last+", "+first)
I hope this helps!
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data is transmitted as four-digits. They have asked you to write a program that will encrypt their data so that it may be transmitted more securely. Your program should read a four-digit integer and encrypt it as follows: 1. Replace each digit by (the sum of that digit and 3) modulus 10. Then 2. Swap the first digit with the third, and swap the second digit with the fourth. 3. Print the encrypted integer.
Answer:
def encrypt_digit(digit):
if type(digit) is int or float:
digit = str(digit)
hold = list()
for x in digit:
d = str((int(x) + 3)%10)
hold.append(d)
first = hold.pop(0)
second = hold.pop(0)
third = hold.pop(0)
fourth = hold.pop()
print(int("".join([third,fourth, first, second])))
encrypt_digit(7836)
Explanation:
The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.
Encryption are used to protect data and files when they are is being transmitted
The encryption program written in Python, where comments are used to explain each line is as follows:
#This gets input for the number
num = int(input())
#This converts the number to string
digit = str(num)
#This creates a list
myList = list()
#This encrypts the number, and add the numbers to a list
for i in digit:
d = str((int(i) + 3)%10)
myList.append(d)
#This prints the result of the encryption
print(int("".join([myList[2],myList[3], myList[0], myList[1]])))
Read more about encryption at:
https://brainly.com/question/14298787