Answer:
The font group............. ...The designer of an agent traveled to a beach for a holiday. He took the agent to the beach. He wanted the agent to capture the sunrise and the high tide. What kind of knowledge representation will the agent use in this new environment?
A.
picture
B.
number
C.
graph
D.
meta
Answer:
Picture
Explanation:
Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs will be most helpful?
A. counter module
B. while loop
C. for loop
D. mean module
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is A: counter module.
Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.
Other options are not correct because:
While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.
Write a command that will list the names of all link files in the working directory, sorted by inode number.
Answer:
The answer is "Is command".
Explanation:
This command can be used to display the directory lists via input data throughout the command-line tool. It is a standard result of this report are described, that would be redirected to the command to display the directory information in alphabetical order. This command is part of its GNU core tool package, which is required on all Linux distributions.
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.
What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?
Answer:
You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.
It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.
What is the benefit of encapsulation?
A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected
Answer:
B. To reuse code
Select the items that can be measured.
capacity
smoothness
nationality
thickness
distance
scent
income
Answer:
distance
capacity
smoothness
thickness
A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?
Answer:
3 Volts.
Explanation:
Answer:
3 Volts
Explanation:
Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :
2.4 W = Voltage x 0.8 A
Then if you rearrange the equation, it would be :
2.4 W / 0.8 A = Voltage
Which is :
3 V = Voltage
Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Pay the hourly rate for the hours up to 40 and 1.5 times the hourly rate for all hours worked above 40 hours. Use 45 hours and a rate of 10.50 per hour to test the program (the pay should be 498.75). You should use input to read a string and float() to convert the string to a number. Do not worry about error checking the user input - assume the user types numbers properly.
I've included my code in the picture below. Best of luck.
A scared kangaroo clears a fence that is 2.44 meters tall. What is the vertical component of the kangaroos velocity at take off ? If the horizontal component of the kangaroos velocity is 4.80 m per s at what angle did the kangaroo take off the ground? (hint: at its maximum height the kangaroos vertical velocity is 0)
Answer:
a) The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.
b) The angle at which the kangaroo took off the ground is approximately 46.066º.
Explanation:
a) According to the statement, the kangaroo has an initial horizontal velocity and jumps to overcome the fence until velocity becomes zero. If effects from non-conservative forces can be neglected, then we represent the situation of the kangaroo by Principle of Energy Conservation:
[tex]K_{1}+U_{g,1} = K_{2}+U_{g,2}[/tex] (Eq. 1)
Where:
[tex]K_{1}[/tex], [tex]K_{2}[/tex] - Initial and final translational kinetic energies, measured in joules.
[tex]U_{g,1}[/tex], [tex]U_{g,2}[/tex] - Initial and final gravitational potential energies, measured in joules.
By definitions of translational kinetic and potential gravitational energies, we expand and simplify the equation above:
[tex]\frac{1}{2}\cdot m\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = m\cdot g \cdot (y_{2}-y_{1})[/tex]
[tex]\frac{1}{2}\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = g \cdot (y_{2}-y_{1})[/tex] (Eq. 2)
Where:
[tex]m[/tex] - Mass of the kangaroo, measured in kilograms.
[tex]g[/tex] - Gravitational acceleration, measured in meters per square second.
[tex]y_{1}[/tex], [tex]y_{2}[/tex] - Initial and final heights of the kangaroo above the ground, measured in meters.
[tex]v_{1,x}[/tex], [tex]v_{1,y}[/tex] - Vertical and horizontal initial velocities, measured in meters per second.
[tex]v_{2,x}[/tex], [tex]v_{2,y}[/tex] - Vertical and horizontal final velocities, measured in meters per second.
If we know that [tex]v_{1,x} = 4.80\,\frac{m}{s}[/tex], [tex]v_{2, x} = 0\,\frac{m}{s}[/tex], [tex]v_{2,y} = 0\,\frac{m}{s}[/tex], [tex]g = 9.807\,\frac{m}{s^{2}}[/tex] and [tex]y_{2}-y_{1} = 2.44\,m[/tex], then (Eq. 2) is reduced into this:
[tex]11.52+0.5\cdot v_{1,y}^{2}=23.929[/tex]
Lastly, we solve for [tex]v_{1,y}[/tex]:
[tex]0.5\cdot v_{1,y}^{2}=12.409[/tex]
[tex]v_{1,y}^{2} = 24.818[/tex]
[tex]v_{1,y} \approx 4.982\,\frac{m}{s}[/tex]
The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.
b) The angle at which the kangaroo took off the ground ([tex]\theta[/tex]), measured in sexagesimal degrees, is obtained by the following inverse trigonometric relation:
[tex]\theta =\tan^{-1}\left(\frac{v_{1,y}}{v_{1,x}} \right)[/tex] (Eq. 3)
[tex]\theta = \tan^{-1}\left(\frac{4.982\,\frac{m}{s} }{4.80\,\frac{m}{s} } \right)[/tex]
[tex]\theta \approx 46.066^{\circ}[/tex]
The angle at which the kangaroo took off the ground is approximately 46.066º.
What is an example of an absolute cell reference? 52% D2 $B$5 !90!
Answer:
$B$5 is an example of absolute cell reference
Explanation:
There are two types of referencing in MS Excel.
1. Relative
2. Absolute
Relative cell referencing changes according to the corresponding new cells when it is copied in other cells. MS Excel uses relative cell referencing by default.
Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.
From the given choices in question,
$B$5 is an example of absolute cell reference
An example of an absolute cell reference is "$B$5".
Thus, option (C) is correct.
Cell references can be either relative or absolute.
A relative cell reference changes when it is copied to another cell.
For example, if you have a formula in cell C2 that references cell A2 as "=A2+1", and you copy this formula to cell C3, it will automatically adjust to "=A3+1".
An absolute cell reference remains constant, regardless of where it is copied. When a cell reference is made absolute, the dollar sign ($) is used to indicate this.
For example, if you have a formula in cell C2 that references cell B5 as "=B$5+1", and you copy this formula to cell D3, it will still refer to cell B5 as "=B$5+1". The row and column references remain fixed.
Therefore, "$B$5" is an absolute cell reference.
Thus, option (C) is correct.
Learn more about Cell Reference here:
https://brainly.com/question/30714866
#SPJ6
how do you keep word from trying to capitalize every isolated letter "i"
Write a JavaScript script that has subprograms nested three deep and in which each nested subprogram references variables defined in all of its enclosing subprograms.
Answer and Explanation:
Subprograms are nested three deep hence we would have three subprograms/functions under one program(function)
We call the program/function MotherFunction( using camel case variable naming rules)
function MotherFunction() {
var mother= 8;
console.log(mother);
function subDaughter1() {
var subDaughter1X = mother + 12;
console.log(subDaughter1X);
function subDaughter2() {
var subDaughter2X= mother + 5;
console.log(subDaughter2X);
function subDaughter3() {
var subDaughter3X= mother + 3;
console.log(subDaughter3X);
alert("sum="+subDaughter1X+subDaughter2X+subDaughter3X);
}
}
}
}
MotherFunction();
We created the first function and nested subfunctions under it, adding up the variable from the parent function(mother function) to its subfunctions and then alerting the total value of all the subfunction variables summed in the last/third subfunction. We then called the function after defining it.
What game is this? helpppppp
Answer:
the sims lol
Explanation:
To help mitigate the Target breach, system administrators should have implemented a system that only allowed certain programs to run on the POS (Point of Sale) system. What is the term for this concept?
Answer:
application whitelisting
Explanation:
Application Whitelisting is a term used in computer engineering to describe a situation where a system administrator implemented a system that only allowed certain programs or applications that have been approved to run or functions exclusively on a computer or network. It is considered to be more secure.
Hence, in this case, the correct answer is called APPLICATION WHITELISTING
explain mechanical computer ,electromechanical and electronic computer with example
Answer:
A mechanical computer uses moving parts to do it’s calculations. Think old style adding machines.Electronic computers use electronic oscillators to generate a clock. The oscillator might include a mechanical element such as a crystal, but the majority of the clock signal is processed in the electrical domain.
Explanation:
An example of a mechanical computer clock is a Swiss watch movement, which needs no electronics. Movement is based upon springs coupled to other mechanical pieces. Swiss watches are high precision mechanical computers that do counting. There are other types of more sophisticated mechanical computers. Research the works of Konrad Zuse and his Z1 mechanical computer.
Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).
In python:
if 8 < user_grade < 13:
print("in high school")
You would just need to supply the value of the user_grade variable.
What causes them to catch your attention in advertisements?
Answer:
advertisement should be nice and attractive to get attention of people
We can create tables in MS. Word from *
2 points
Insert Tab
Home Tab
Mailings Tab
Answer:
insert tab
Explanation:
hope it helps
Answer:
we can create tables in ms word from Insert table
Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4
Answer:
C = 3
Explanation:
The maximum number of physical memory accesses that may be caused by this single instruction is ; 3
This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total
Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores
Answer:
Explanation:
The following is written in Java. It is a method/function that takes the oldScore as an int input. It turns it into a String, separates all the digits, puts them into an array. Then adds the first digit to the end and removes it from the beginning, thus shifting the entire score one to the left. Then it turns the String variable back into an Integer called finalScore and prints it out.
public static void newScore(int oldScore) {
ArrayList<Integer> newScore = new ArrayList<>();
String stringOldScore = String.valueOf(oldScore);
for (int x = 0; x < stringOldScore.length(); x++) {
newScore.add(Integer.parseInt(String.valueOf(stringOldScore.charAt(x))));
}
newScore.add(newScore.get(0));
newScore.remove(0);
String newScoreString = "";
for (int x:newScore) {
newScoreString += String.valueOf(x);
}
int finalScore = Integer.parseInt(newScoreString);
System.out.println(finalScore);
}
Which is the highest level of the hierarchy of needs model?
A.
humanity
B.
intrapersonal
C.
team
D.
interpersonal
The answer is A
Answer:
A
Explanation:
A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.
Answer:
Advantages
Host Naming : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocolsDisadvantages
Host Naming : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local namingExplanation:
Advantages
Host Naming : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocolsDisadvantages
Host Naming : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local namingWhich software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote
Answer:
tyafana
Explan
ation:n umbers
Compute the weakest precondition for each of the following assignment statements and postconditions:
a = 2 * (b - 1) - 1 {a > 0}
b = (c + 10) / 3 {b > 6}
a = a + 2 * b - 1 {a > 1}
x = 2 * y + x - 1 {x > 11}
Answer:
a) b > 3/2
b) c > 8
c) b > 1 - a/2
d) y > 6 - x/2
Explanation:
a)
a = 2 × (b - 1) - 1 {a > 0}
2 × (b - 1) - 1 > 0
2b - 2 - 1 > 0
2b - 3 > 0
2b > 3
b > 3/2
b)
b = (c + 10) / 3 {b > 6}
(c + 10) / 3 > 6
multiply both side by 3
((c + 10) / 3) × 3 > 6 × 3
c + 10 > 18
c > 18 - 10
c > 8
c)
a = a + 2 × b - 1 {a > 1}
a + 2 × b - 1 > 1
a + 2b - 1 > 1
a + 2b > 1 + 1
2b > 2 - a
divide both sides by 2
2b/2 > 2/2 - a/2
b > 1 - a/2
d)
x = 2 × y + x - 1 {x > 11}
2 × y + x - 1 > 11
2y + x - 1 > 11
2y + x > 11 + 1
2y + x > 12
2y > 12 - x
divide both sides by 2
2y/2 > 12/2 - x/2
y > 6 - x/2
Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B
Answer:
The answer is D. A and B
Explanation:
I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.
Answer: The answer is D. A and B
Explanation: I took this test 5 mins ago and it was right.
Write a program with 2 separate functions which compute the GCD (Greatest Common Denominator) and the LCM (Lowest Common Multiple) of two input integers.
Answer:
The program written in Python is as follows
def GCD(num1, num2):
small = num1
if num1 > num2:
small = num2
for i in range(1, small+1):
if((num1 % i == 0) and (num2 % i == 0)):
gcd = i
print("The GCD is "+ str(gcd))
def LCM(num1,num2):
big = num2
if num1 > num2:
big = num1
while(True):
if((big % num1 == 0) and (big % num2 == 0)):
lcm = big
break
big = big+1
print("The LCM is "+ str(lcm))
print("Enter two numbers: ")
num1 = int(input(": "))
num2 = int(input(": "))
GCD(num1, num2)
LCM(num1, num2)
Explanation:
This line defines the GCD function
def GCD(num1, num2):
This line initializes variable small to num1
small = num1
This line checks if num2 is less than num1, if yes: num2 is assigned to variable small
if num1 > num2:
small = num2
The following iteration determines the GCD of num1 and num2
for i in range(1, small+1):
if((num1 % i == 0) and (num2 % i == 0)):
gcd = i
This line prints the GCD
print("The GCD is "+ str(gcd))
This line defines the LCM function
def LCM(num1,num2):
This line initializes variable big to num2
big = num2
This line checks if num1 is greater than num2, if yes: num1 is assigned to variable big
if num1 > num2:
big = num1
The following iteration continues while the LCM has not been gotten.
while(True):
This if statement determines the LCM using modulo operator
if((big % num1 == 0) and (big % num2 == 0)):
lcm = big
break
big = big+1
This line prints the LCM of the two numbers
print("The LCM is "+ str(lcm))
The main starts here
This line prompts user for two numbers
print("Enter two numbers: ")
The next two lines get user inputs
num1 = int(input(": "))
num2 = int(input(": "))
This calls the GCD function
GCD(num1, num2)
This calls the LCM function
LCM(num1, num2)
See attachment for more structured program
so i am on a Chromebook with headphones , and I am wondering if you can make it that a tab only play sound on one side of the headphones and other tabs to the other side of the headphones
No you cannot do that with a single pair of headphones. If you had an dual aux split... you could plug in two pairs of headphones... even if you had two bluetooth pairs I don't think it'd be possible... What do you need to do that for? Maybe I can help find an alternative solution
The coding system that has just two characters is called:
a
binary
b
dual.
c
basic.
d
double.
Answer:
A. Binary
Definition:
Pertaining to a number system that has just two unique digits 0 and 1. - binary code
Answer:
a binary
Explanation:
ascii. an agreed method for paring the alpanumeric characther set with binary repersenations used in computers. binary. Pertaining to a number system that has just two unique digits 0 and 1. binary code.
How can we use variables to store information in our programs?
discuss data and its types from computer programming and data analysis prospectively?
Answer:
With the use of data and their types the extent of how much data can be stored can get insanely large. types like doubles and longs allow for a range of values nearly incomprehensible in their size for storing user information, web pages, games ect. Using them essentially allows you to plan for the future of the size of whatever you're creating. On top of that, it allows for a preciseness not typically able to be reached without these types.
Raw information that is made up of simple facts and figures is referred to as data. Computer data can take many different forms, including financial data, notes, photographs, and coding.
What is data?The amount of data that may be kept can become absurdly vast depending on how it is used and the categories of data. For storing user information, web pages, games, etc., types like doubles and longs provide for a range of values almost incomprehensible in their vastness.
Utilizing them effectively enables you to plan for the magnitude of whatever you're developing in the future. Additionally, it enables a level of precision that is often not possible without these types.
Therefore, raw information that is made up of simple facts and figures is referred to as data. Computer data can take many different forms, including financial data, notes, photographs, and coding.
To learn more about data, refer to the link:
https://brainly.com/question/10980404
#SPJ5