Describe how to add images and shapes to a PowerPoint
presentation
In this assignment, you will describe how to add images and shapes to a PowerPoint presentation

Answers

Answer 1
You can use Microsoft paint to make the sales and then export them to Microsoft word or just go online and get the shapes images and copy and paste them on to the PowerPoint

Related Questions

As the network engineer, you are asked to design a plan for an IP subnet that calls for 25 subnets. The largest subnet needs a minimum of 750 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following lists a private IP network and mask that would meet the requirements?

a. 172.16.0.0 / 255.255.192.0
b. 172.16.0.0 / 255.255.224.0
c. 172.16.0.0 / 255.255.248.0
d. 172.16.0.0 / 255.255.254.0

Answers

Answer:

c. 172.16.0.0 / 255.255.248.0

Explanation:

The address will be 172.16.0.0 while the netmask will be 255.255.248.0.

Thus, option C is correct.

You have one address, 196.172.128.0 and you want to subnet that address. You want 10 subnets. 1. What class is this address

Answers

Answer:

This address is by default a class c network

Explanation:

This IP address in this question is a class c network because it has 196 as its first octet. A class c network is one which has its first octet to be between 192 and 223. the class c network begins with a 110 binary.  If ip is between 192 to 223 it belongs to this class. These first 3 octets are the representation of the network number in the address. Class c's were made to support small networks initially.

why must a satellite have distinct uplink and downlink frequencies.​

Answers

Answer:

The reason that a satellite must have a distinct uplink and downlink set of frequencies is because they help avoid any type of interference that may occur. The uplink receives the signal and amplifies it so that it can be transmitted to another frequency (downlink).

Which are technical and visual demands
that need to be considered when
planning a project?

Answers

Answer: Resolution or DPI, deliverables, and file types are important technical and visual demands to consider when planning a project.

Explanation: Keep in mind whether or not the project will be published in print or on the Web.

Look at the following assignment statements:

word1 = "rain"
word2 = "bow"

What is the correct way to concatenate the strings?

1 newWord = word1 == word2

2 newWord = word1 + word2

3 newWord = word1 * word2

4 newWord = word1 - word2

Answers

Answer: number 2 is the correct way to do it

Explanation:

Answer:

2 newWord = word1 + word2

Explanation:

In ……………cell reference, the reference of a cell does not change. ​

Answers

Answer:

In absolute cell reference, the reference of a cell does not change. 

Extend the class linkedListType by adding the following operations: Write a function that returns the info of the kth element of the linked list. If no such element exists, terminate the program. Write a function that deletes the kth element of the linked list. If no such element exists, terminate the program.

Answers

Answer:

Explanation:

The following code is written in Java. Both functions traverse the linkedlist, until it reaches the desired index and either returns that value or deletes it. If no value is found the function terminates.

public int GetNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.data;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

public int removeNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.remove;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

A low price point is an example of a ________. Choose one.

Answers

Answer:

of a bad product

Explanation:

An expression that returns a value is known as a​

Answers

Answer:

In computer programming, a return statement causes execution to leave the current subroutine and resume at the point in the code immediately after the instruction which called the subroutine, known as its return address. The return address is saved by the calling routine, today usually on the process's call stack or in a register. Return statements in many languages allow a function to specify a return value to be passed back to the code that called the function.

An expression that returns a value is known as a​ function. Check more about function  below.

What is a function?

A function is often seen as a kind of expression or rule, or law that often tells more about a relationship.

Conclusively, a function is known to often returns a value back to the instruction that is known also to be the function. This is regarded as the differences that exist between a method and a function.

Learn more about function  from

https://brainly.com/question/20476366

In this assignment we are going to practice reading from a file and writing the results of your program into a file. We are going to write a program to help Professor X automate the grade calculation for a course. Professor X has a data file that contains one line for each student in the course. The students name is the first thing on each line, followed by some tests scores. The number of scores might be different for each student. Here is an example of what a typical data file may look like: Joe 10 15 20 30 40 Bill 23 16 19 22 Sue 8 22 17 14 32 17 24 21 2 9 11 17 Grace 12 28 21 45 26 10 John 14 32 25 16 89 Program details Write a program that: Ask the user to enter the name of the data file. Read the data from the file and for each student calculate the total of the test scores, how many tests the student took, and the average of the test scores. Save the results in an output file (e.g. stats.txt) in the following order: studentName totalScore numberOfTests testAverage Note that the average is saved with 2 decimal places after the decimal point. Validation: Make sure your program does not crash if a file is not found or cannot be open.

Answers

Answer:

In Python:

import os.path

from os import path

fname = input("Filename: ")

if path.exists(fname):

with open(fname) as file_in:

 lines = []

 for line in file_in:

  lines.append(line.rstrip('\n'))

f = open("stat.txt","r+")

f.truncate(0)

f = open("stat.txt", "a")

f.write("Names\tTotal\tSubjects\tAverage\n")

for i in range(len(lines)):

 rowsum = 0; count = 0

 nm = lines[i].split()

 for j in nm:

  if (j.isdecimal()):

   count+=1

   rowsum+=int(j)

 average = rowsum/count

 f.write(nm[0]+"\t %3d\t %2d\t\t %.2f\n" % (rowsum, count, average))

f.close()

else:

print("File does not exist")

Explanation:

See attachment for explanation where comments were used to explain each line

For each student, the sum of the marks, total tests were taken and the average of marks is calculated and is stored in an output file, for example, stats.txt.

Python Code:

The code in Python asks the user for an input file name. If the input file is not found an error is printed else the data in the file is processed further.

Try:

  # take input file name

  file = input('Enter name of the data file: ')

# open the input file

  ip = open(file, 'r')

# store the lines from input file in a list

  lines = ip.readlines()

  # close the file

  ip.close()

# open the output file

  op = open('stats.txt', 'w')

# iterate over each line

  for line in lines:

 # split data using space as delimiter

      data = line.split()

 # get name

   name = data[0]

 # get marks and convert them to integer

      marks = list(map(int, data[1:]))

# get sum of marks

      total = sum(marks)

# get number of tests

      length = len(marks)

# calculate average of marks

      avg = total/length

# add the data to output file

      op.write('{} {} {} {:.2f}\n'.format(name, total, length, avg))

# close the output file

  op.close()

print('Stats have been save in the output file')

# catch FileNotFoundError

except FileNotFoundError:

# print error

  print('Error: that file does not exist. Try again.')

Learn more about the topic python code:

https://brainly.com/question/14492046

Assume we have two lists, list A and list B. List A contains the numbers [20,10,20], while list B contains the numbers [40,10,30,20,40,30]. We choose one number from list A randomly and one number from list B randomly. What is the chance that the number we drew from list A is larger than or equal to the number we drew from list B

Answers

Answer:

5/ 18

Explanation:

Given :

List A: [20,10,20]

List B: [40,10,30,20,40,30]

Chance that number drawn from list A is larger than or equal to that drawn dlfrom list B.

If:

A = 20

B ≤ 20 : [10,20] = 2

A = 10

B ≤ 10 : [10] = 1

A = 20

B ≤ 20 : [10,20] = 2

Probability = Required outcome / Total possible outcomes

Hence,

required outcome = (2 + 2 +1) = 5

Total possible outcomes = 3C1 * 6C1 = (3 * 6) = 18

Hence,

chance that the number we drew from list A is larger than or equal to the number we drew from list B

= 5 / 18

In this exercise we have to use the knowledge in computational language in python to describe a code that best suits, so we have:

The code can be found in the attached image.

To make it simpler we can write this code as:

import random

A=[20,10,20]

B=[40,10,30,20,40,30]

print(random.choice(A))

print(random.choice(B))

See more about python at brainly.com/question/19705654

1. Create a Java program.
2. The class name for the program should be 'EncryptTextMethods'.
3. In the program you should perform the following:
* You will modify the EncryptText program created in a previous assignment (see code below).
* You should move the logic for encrypting text from the main method into a method named encryptString.
* The encryptString method should have a single String argument and return a String value.
1. Create a second method.
2. The name of the method should be decryptString.
3. In the program you should perform the following:
* The method should have a single String argument and return a String value.
* This method should reverse the encryption process by subtracting one from each character in the String argument passed to it.
* The return value should be the result of the decrypting process.
4.The program should read an input String using the Scanner method.
5. The input value should be passed to the encryptString() method and the encrypted string should be passed to the decryptString() method.
6. The program should output the input string, the encrypted string and the decrypted string.
// Existing Code
import java.util.Scanner;
public class EncryptText {
private static String encodeMessage(String message) {
//convert string to character array
char stringChars[] = message.toCharArray();
//for each character
for(int i=0; i< stringChars.length; i++) {
char ch = stringChars[i];
//if character within range of alphabet
if(ch <= 'z' && ch >= 'a') {
//obtain the character value
//add 1 to the integer value
//enter modulus by 26 since z will become a
//once again add the remainder to 'a'
stringChars[i] = (char)('a' + ((int)(ch - 'a') + 1) % 26 );
}
}
//construct the string message
return String.valueOf(stringChars);
}
public static void main(String[] args) {
Scanner keyboard = new Scanner(System.in);
System.out.println("Please enter text to encode: ");
String message = keyboard.nextLine();
message = message.toLowerCase();
System.out.println("Encoded: " + encodeMessage(message));
keyboard.close();
}
}

Answers

Answer:

Explanation:

The following code was written in Java and follows all of the instructions provided. Some instructions were most likely written incorrectly as following them made no sense and would not allow the program to run. Such as placing the main method code into the encryptString method. Since the code inside the main method needed to stay inside the main method for the program to function accordingly. The code that most likely needed to be moved was the EncryptText code to the encryptString method.

package sample;

import java.util.Scanner;

class EncryptTextMethods {

   private static String encryptMessage(String message) {

       //convert string to character array

       char stringChars[] = message.toCharArray();

       //for each character

       for(int i=0; i< stringChars.length; i++) {

           char ch = stringChars[i];

           //if character within range of alphabet

           if(ch <= 'z' && ch >= 'a') {

           //obtain the character value

           //add 1 to the integer value

           //enter modulus by 26 since z will become a

           //once again add the remainder to 'a'

               stringChars[i] = (char)('a' + ((int)(ch - 'a') + 1) % 26 );

           }

       }

       //construct the string message

       return String.valueOf(stringChars);

   }

   public static String decryptString(String message) {

       char stringChars[] = message.toCharArray();

       String decrypted = "";

       for (int x = 0; x < stringChars.length; x++) {

           int charValue = stringChars[x];

           decrypted += String.valueOf( (char) (charValue - 1));

       }

       return decrypted;

   }

   public static void main(String[] args) {

       Scanner keyboard = new Scanner(System.in);

       System.out.println("Please enter text to encode: ");

       String message = keyboard.nextLine();

       message = message.toLowerCase();

       String encrypted = encryptMessage(message);

       String decrypted = decryptString(encrypted);

       System.out.println("Original Message: " + message);

       System.out.println("Encrypted: " + encrypted);

       System.out.println("Decrypted: " + decrypted);

       keyboard.close();

   }

}

Which of the followings is/are true about RISC (Reduced instruction set computing)?

a. RISC (Reduced instruction set computing) architecture has a set of instructions, so high-level language compilers can produce more efficient code
b. It allows freedom of using the space on microprocessors because of its simplicity.
c. Many RISC processors use the registers for passing arguments and holding the local variables.
d. RISC functions use only a few parameters, and the RISC processors cannot use the call instructions, and therefore, use a fixed length instruction which is easy to pipeline.
e. All of the above.

Answers

Answer:

e. All of the above.

Explanation:

An instruction set architecture (ISA) can be defined as series of native memory architecture, instructions, addressing modes, external input and output devices, virtual memory, and interrupts that are meant to be executed by the directly.

Basically, this set of native data type specifies a well-defined interface for the development of the hardware and the software platform to run it.

The two (2) main types of architectural design for the central processing unit (CPU) are;

I. Complex instruction set computing (CISC): it allows multi-step operation or addressing modes to be executed within an instruction set. Thus, many low-level operations are being performed by an instruction.

II. Reduced instruction set computing (RISC): it allows fixed length instructions and simple addressing modes that can be executed within a clock cycle.

All of the following statements are true about RISC (Reduced instruction set computing) because they are its advantages over complex instruction set computing (CISC);

a. RISC (Reduced instruction set computing) architecture has a set of instructions, so high-level language compilers can produce more efficient code.

b. It allows freedom of using the space on microprocessors because of its simplicity.

c. Many RISC processors use the registers for passing arguments and holding the local variables.

d. RISC functions use only a few parameters, and the RISC processors cannot use the call instructions, and therefore, use a fixed length instruction which is easy to pipeline.

The options that are true about RISC (Reduced instruction set computing) is; E: all of the above

We are dealing with instruction set computing which is a sequence of instructions, addressing modes, external input & output devices, virtual memory, and other interruptions that are designed to be executed by the user directly.

Now, in architectural design meant for the central processing unit (CPU) the benefit of a Reduced instruction set computing (RISC) is that it is a type that allows for a fixed length of instructions with simple addressing styles that can be executed within a clock cycle.

Looking at all the given options, we can say they are all true about RISC (Reduced instruction set computing) as they possess advantages over the other type of instruction set computing called complex instruction set computing (CISC).

Read more about instruction set computing at; https://brainly.com/question/17493537

Use the drop-down menu to complete the sentences about the benefits of flowcharts.

Flowcharts are a good choice because they -are easy-
to understand.
Flowcharts are -graphical-
representations of the solution.
Flowcharts can be used to -map out-
a solution.

Answers

Answer:

c,a,c using the drop down menus edge 2021

GOODLUCK

Explanation:

Answer:

C , A, and C

Explanation:


2. Which of the following is a shortcut key to Exit from any operation?
a) Ctrl+R
b) Ctrl+Q
c) Ciri-Y

Answers

Answer:

Its b) Ctrl+Q. Hope it helps.

Explanation:

Answer:

ctrl r

Explanation:

ctrl r is redo

Which of the following are features of the HTTPS protocol?

Answers

Answer:

All traffic is encrypted. No one on your network can see what is going on (except for knowing where those packets are going to).

The identity of the remote server can be verified using certificates. So you also know that it really is your bank that you are talking to.

Optionally (and not in wide-spread use), the identity of the client can also be verified using certificates. This would allow for secure login to a site using chip cards instead of (or in addition to) password

Hyper Text Transfer Protocol (HTTP) and Secure HTTP are the same protocol from a standpoint of passing or blocking them with a firewall is false.

What are HTTP's (Hyper Text Transfer) fundamental features?

Basic HTTP (Hyper Text Transfer) is the Characteristics. It has the protocol that has enables communication in between web browsers and the servers. It has the protocol for the requests and answers. By default, it connects to the secure TCP connections on port 80.

Hypertext Transfer Protocol Secure (HTTPS) is an add-on to the Hypertext Transfer Protocol. It has been used for safe communication over a computer network and is widely used on the Internet. In HTTPS, the transmit protocol is encrypted using Transport Layer Security(TLS) or, formerly, Secure Sockets Layer(SSL).

The difference between HTTPS uses TLS (SSL) to encrypt normal HTTP requests and responses. HTTPS is the secure version of HTTP, which is the primary protocol used to send data between a web browser and a website.

Learn more about HTML files on:

https://brainly.com/question/10663873

#SPJ3

COMPUTER STUDIES
31.
Which of the following information
ages lasted between the end of
Bronze age and the spread of Roman
Empire?
A.
B.
C.
D.
E.
Electronic
Industrial
Iron
Mechanical
Stone

Answers

Answer:

iron

Explanation:

In cell 14, calculate


the profit by


subtracting the


donation from the


streaming revenues.

Answers

Answer:

See Explanation

Explanation:

The question is incomplete as the cells that contains donation and streaming revenues are not given

So, I will make the following assumption:

H4 = Donations

G4 =  Streaming Revenues

So, the profit will be:

Enter the following formula in cell I4

=(G4 - H4)

To get the actual solution in your case, replace G4 and H4 with the proper cell names

Do any of these algorithms (Random Allocation, Round-Robin, Weighted Round-Robin, Round-Robin DNS Load Balancing, and Least Connections) compromise security?

Answers

Answer:

yes and

Explanation:

why do you need to know about a buildings security are you going to rob it ???

what is the portrait mode

Answers

Answer:

Explanation:

When your elecronic devices screen is positioned upright or the way a photo is taken

If you want an example look up portrait mode on go0gle or safar1

In a database table, the category of information is called ______________
Question 2 options:


Record


Tuple


Field


None of the above

Answers

Answer:

the answer is A.) A record

Explanation:

In database, the category of information is A. Record.

What is a database?

A database simply means the collection of information that can be accessed in future. This is important to safeguard the information.

In this case, in a database table, the category of information is called a record. This is vital to keep documents.

Learn more about database on:

https://brainly.com/question/26096799

Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, and evens (like the 10 or 90) go east/west. Auxiliary highways are numbered 100-999, and service the primary highway indicated by the rightmost two digits. Thus, I-405 services 1-5, and I-290 services -90. Given a highway number, indicate whether it is a primary or auxiliary highway. If auxiliary, indicate what primary highway it serves. Also indicate if the (primary) highway runs north/south or east/west. Ex: If the input is 90 the output is I-90 is primary, going east/west. Ex: If the input is 290 the output is I-290 is auxiliary, serving 1-90, going cast/west. Ex: If the input is: 0 the output is O is not a valid interstate highway number. See Wikipedia for more info on highway numbering. main.py Load default templ else 1 nighway_number - int(input) 2 Type your code here. " 4 if highway_number - 0: 5 print(highway_number, 'is not a valid interstate highway number.') 6 if highway_number in range(1, 99-1): 7 if highway..number % 2 - : 8 print('I-' highway number, "is primary, going east/west.") 9 print("I-' highway_number, "is primary, going north/south." 11 else: 12 served - highway_number % 100 13 if highway number - 1000: print highway_number, 'is not a valid Interstate highway number.') 15 if highway number in range(99, 999.1): 16 if highway_number 2 - 0 print('I..highway_number, 'is auxiliary, serving I.', 'x.f.' Xserved, 'going eastwest.) 18 else: print('1', highway_number, 'is auxiliary, rving I-','%.f.' Xserved, 'going north/south.) 10 14 17 19 Develop mode Submit mode When done developing your program press the Submit for grading button below. This will submit your program for auto-grading. Submit for grading Sature of your work Input 90 Your output I- 90 is primary, going east/west. Expected output I-90 is primary, going east/west. 0 2: Auxiliary (290) Output is nearly correct; but whitespace differs. See highlights below. Special character legend Input 290 Your output 1- 290 is auxiliary, serving I- 90, going east/west. I-290 is auxiliary, serving 1-90, going east/west. Expected output 3 Invalid (0) 1/1 Input 0 Your output is not a valid interstate highway number. 4. Compare output 0/2 Output is nearly correct; but whitespace differs. See highlights below Special character legend Input Your output

Answers

Answer:

See attachment for complete solution

Explanation:

The program in your question is unreadable.

So, I started from scratch (see attachment for complete solution)

Using the attached file as a point of reference.

The program has 15 lines

Line 1: Prompt the user for highway number (as an integer)

Line 2: Convert the user input to string

Line 3: Check if highway number is outside 1-999

Line 4: If line 3 is true, print a notice that the input is outside range

Line 5: If line 3 is not true

Line 6: Check if the number of highway digits is 2.

Line 7: If true, Check if highway number is an even number

Line 8: If even, print that the highway is primary and heads east/west

Line 9: If highway number is odd number

Line 10: Print that the highway is primary and heads north/south

Line 11: If the number of highway digits is 3

Line 12: Check if highway number is an even number

Line 13: If even, print that the highway is auxiliary and heads east/west

Line 14: If highway number is odd number

Line 15: Print that the highway is auxiliary and heads north/south

See attachment for complete program

Complete the function favoriteFlower(). Note that the program will not run as is because the function is incomplete. The purpose of the function is to determine if the given flower is in the top three of my favorite flowers. The starter file defines a list of favorite flowers that is ordered most favorite to least favorite. Please pass the flower name and the flower list as arguments in the function. The expected output is:

Answers

Answer:

What Language? Once you respond with a comment, I will be happy to write the code for you. I write code 24/7 (Because I have nothing better to do), so I will wait for you to comment. Also is there any pre-existing code?

Explanation:

does anybody know how to do 6.3 code practice on edhesive. NEED ASAP!!!​

Answers

Answer:

Hopes this helps if not comment and I'll change it

Explanation:

import simplegui

import random

def draw_handler(canvas):

for i in range (0, 1000):

x = random.randint(1, 600)

y = random.randint(1, 600)

r = random.randint(0, 255)

g = random.randint(0, 255)

b = random.randint(0, 255)

color = "RGB( " + str(r) + "," + str(g) + "," + str(b) + ")"

canvas.draw_point((x, y), color)

frame = simplegui.create_frame('Points', 600, 600)

frame.set_canvas_background("Black")

frame.set_draw_handler(draw_handler)

frame.start()

For this program you will build a simple dice game called Pig. In this version of Pig, two players alternate turns. Players each begin the game with a score of 0. During a turn a player will roll a six-sided die one or more times, summing up the resulting rolls. At the end of the player's turn the sum for that turn is added to the player's total game score If at any time a player rolls a 1, the player's turn immediately ends and he/she earns O points for that turn (i.e. nothing is added to the player's total game score). This is called "pig". After every roll that isn't a 1, the player may choose to either end the turn, adding the sum from the current turn to his/her total game score, or roll again in an attempt to increase the sum. The first player to 50 points wins the game
Details
Open a text editor and create a new file called pig.py. In the file
Write a function called print_scores that has four parameters - these hold, in this order, the name of the first player (a string), his/her score (an int), the second player's name (a string), and score (an int).
The function will
Print the following message, using the current parameter values for the player names and scores (NOT necessarily Ziggy, 18, Elmer, and 23) -SCORES Ziggy:18 Elmer 23--
Print an empty line before this line
There is a single tab between SCORES and the name of player 1 .
There is a single tab between player 1's score and player 2's name .
Every other gap is a single space

Answers

Answer:

In Python:

import random

p1name = input("Player 1: "); p2name = input("Player 2: ")

p1score = 0; p2score = 0

playerTurn = 1

print(p1name+" starts the game")

roll = True

while(roll):

   if playerTurn == 1:

       p1 = random.randint(1,6)

       print(p1name+"'s roll: "+str(p1))

       if p1 == 1:

           playerTurn = 2

           roll = True

       else:

           p1score+=p1

           another = input("Another Roll (y/n): ")

           if another == "y" or another == "Y":

               roll = True

           else:

               playerTurn = 2

               roll = True

   else:

       p2 = random.randint(1,6)

       print(p2name+"'s roll: "+str(p2))

       if p2 == 1:

           playerTurn = 1

           roll = True

       else:

           p2score+=p2

           another = input("Another Roll (y/n): ")

           if another == "y" or another == "Y":

               roll = True

           else:

               playerTurn = 1

               roll = True

   if p1score >= 50 or p2score >= 50:

       roll = False

print(p1name+":\t"+str(p1score)+"\t"+p2name+":\t"+str(p2score))

Explanation:

Note that the dice rolling is simulated using random number whose interval is between 1 and 6

This imports the random module

import random

This line gets the name of both players

p1name = input("Player 1: "); p2name = input("Player 2: ")

This line initializes the scores of both players to 0

p1score = 0; p2score = 0

This sets the first play to player 1

playerTurn = 1

This prints the name of player 1 to begin the game

print(p1name+" starts the game")

This boolean variable roll is set to True.

roll = True

Until roll is updated to False, the following while loop will be repeated

while(roll):

If player turn is 1

   if playerTurn == 1:

This rolls the dice

       p1 = random.randint(1,6)

This prints the outcome of the roll

       print(p1name+"'s roll: "+str(p1))

If the outcome is 1, the turn is passed to player 2

       if p1 == 1:

           playerTurn = 2

           roll = True

If otherwise

       else:

Player 1 score is updated

           p1score+=p1

This asks if player 1 will take another turn

           another = input("Another Roll (y/n): ")

If yes, the player takes a turn. The turn is passed to player 2, if otherwise

           if another == "y" or another == "Y":

               roll = True

           else:

               playerTurn = 2

               roll = True

If player turn is 2

   else:

This rolls the dice

       p2 = random.randint(1,6)

This prints the outcome of the roll

       print(p2name+"'s roll: "+str(p2))

If the outcome is 1, the turn is passed to player 1

       if p2 == 1:

           playerTurn = 1

           roll = True

If otherwise

       else:

Player 2 score is updated

           p2score+=p2

This asks if player 2 will take another turn

           another = input("Another Roll (y/n): ")

If yes, the player takes a turn. The turn is passed to player 1, if otherwise

           if another == "y" or another == "Y":

               roll = True

           else:

               playerTurn = 1

               roll = True

If either of both players has scored 50 or above

   if p1score >= 50 or p2score >= 50:

roll is updated to False i.e. the loop ends

       roll = False

This prints the name and scores of each player

print(p1name+":\t"+str(p1score)+"\t"+p2name+":\t"+str(p2score))

We can easily improve the formula by approximating the area under the function f(x) by two equally-spaced trapezoids. Derive a formula for this approximation and implement it in a function trapezint2( f,a,b ).

Answers

Answer:

Explanation:

[tex]\text{This is a math function that is integrated using a trapezoidal rule } \\ \\[/tex]

[tex]\text{import math}[/tex]

def [tex]\text{trapezint2(f,a,b):}[/tex]

      [tex]\text{midPoint=(a+b)/2}[/tex]

       [tex]\text{return .5*((midPoint-a)*(f(a)+f(midPoint))+(b-midPoint)*(f(b)+f(midPoint)))}[/tex]

[tex]\text{trapezint2(math.sin,0,.5*math.pi)}[/tex]

[tex]0.9480594489685199[/tex]

[tex]trapezint2(abs,-1,1)[/tex]

[tex]1.0[/tex]

In this exercise we have to use the knowledge of computational language in python to write the code.

the code can be found in the attachment.

In this way we have that the code in python can be written as:

   h = (b-a)/float(n)

   s = 0.5*(f(a) + f(b))

   for i in range(1,n,1):

       s = s + f(a + i*h)

   return h*s

from math import exp  # or from math import *

def g(t):

   return exp(-t**4)

a = -2;  b = 2

n = 1000

result = Trapezoidal(g, a, b, n)

print result

See more about python at brainly.com/question/26104476

what is computer sences​

Answers

Answer:

Computer science is the study of computers and computing as well as their theoretical and practical applications. Computer science applies the principles of mathematics, engineering, and logic to a plethora of functions, including algorithm formulation, software and hardware development, and artificial intelligence.

2. What is the implication of media killings in the Philippines?​

Answers

Answer:

Throughout the clarification below, the description of the query is mentioned.

Explanation:

In the Philippines, the Implication of media indicates that perhaps the Philippines isn't a safe environment for reporters, and therefore more remains to be improved to change this pattern.But it didn't start underneath Duterte before you could even say that, as well as he didn't order strikes. If he had instructions in which he would criticize, for perhaps a long period presently Ressa had died as one of his other very resolute and influential media commentators.

In order to restrict editing to a document, a user will go to Review, , Restrict Editing, and will then select what kinds of editing are allowed.

Answers

Answer: drafting

Explanation:

Servers can be designed to limit the number of open connections. For example, a server may wish to have only N socket connections at any point in time. As soon as N connections are made, the server will not accept another incoming connection until an existing connection is released. Please write pseudo-code to implement the synchronization using semaphore.

Answers

Answer:

The pseudocode is as follows:

open_server()

connections = N

while (connections>0 and connections <=N):

   if(new_client == connected):

       connections = connections - 1

   for i in 1 to N - connections

   if (client_i == done()):

         releast_client(client_i)

         connections = connections + 1

Explanation:

One of the functions of a semaphore is that, it is a positive variable whose value will never fall below 1. It is often shared among threads in order to keep a process running.

Having said that, what the above pseudocode does is that:

Once the server is opened, it initializes the number of connections to N.

When a new client, the semaphore decreases the number of connections is reduced by 1.

Similarly, when an already connected client is done, the client is released and the number of connections is increased by 1.

This operation is embedded in a while loop so that it can be repeatedly carried out.

Other Questions
Jessie needs 36 eggs. Cartons of 12 eggs cost $2.75 each. How much does Jessie need to spend for 36 eggs Select the correct answer. Simplify the following expression. 3x(4x 3) please help meh PLEASE HELP!!! GIVING BRAINLIEST!! ill also answer questions that you have posted if you answer this correctly!!!! (40pts) Due in a couple of hours pls help!!! A sculpture carved into the side of Stone Mountain honors men who fought in which war? ANSWER THIS NOW please. An amusement park constructed a new ride called the "Haunted Hotel." There are x2 3 floors in this hotel. Each floor is 2x2 + 5 feet high. Which expression shows the totalheight of this hotel? How do you open an application on the macOS? what represents the size of a population?A.the birth rateB.number of species in the areaC.the death rateD.number of individuals in a speciesplz helpme urgently the average of 3, 5, 15 and my number is 40. what is my number. Find the area of each figure. A rectangular prism has a volume of 60 cubed inches. The length of the prism is 4in and the width is 3in. What is the height? Use V=LWH to solve. Show your work. How would you convert a spring into a straight piece of metal using the same approach as topoisomerase in DNA replication? Find the value of x in (5,x),(x,14) so that the line line containing them is 7/2. Which of the following sentences uses the appositive correctly? A favorite toy, the purple elephant was lost somewhere underneath the bed. The purple elephant a favorite toy was lost somewhere underneath the bed. The purple elephant, a favorite toy, was lost somewhere underneath the bed. The purple elephant was lost somewhere underneath the bed, a favorite toy. Write five spelling words that are nouns. Find the magnitude of the sum of a 10m displacement and a 5 -m displacement when the angle between them is 45 Erica planted 9 seeds each in 2 big pots. She planted another 59 seeds, one in each small pot. How many seeds did she plant in all? Write an equation and solve. How do you make alot of moneyyyyy In EFG, the measure of G=90, the measure of F=47, and FG = 6.5 feet. Find the length of EF to the nearest tenth of a foot. If Matt earns eight dollars per hour and h is the number of hours Matt works, which expression represents how much money Matt earns?