HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!
Python: With a program to store the list of all your friends, then sort the list and print them in alphabetical order. The program should create a loop to accept the names of all your friends. Exit the loop when the user has no more items to input. Then sort the list alphabetically and print out the new list. (Side Note: Make Sure Your Code Works Before Submitting) Note: You cannot predefine the list of friends. The list should be initialized to an empty list

Answers

Answer 1

#This is a way without a loop

friends = list(map(str,input("Enter Names: ").split()))

print(sorted(friends))

#This is a way with a loop (for&&while)

friends = list(map(str,input("Enter Names: ").split()))

cool = True

while cool:

   cool = False

   for i in range(len(friends)-1):

       if friends[i] > friends[i+1]:

           coo = friends[i]

           friends[i] = friends[i+1]

           friends[i+1] = coo

           cool = True

print(friends)


Related Questions

Consider the following scenario: The asset value of your company’s primary servers is
$2 million, and they are housed in a single office building in Anderson, Indiana. Field offices are scattered throughout the United States, but the workstations located at the field offices serve as thin clients and access data from the Anderson servers. Tornados in this part of the country are not uncommon, and it is estimated that one will level the building every 60 years. Which of the following is the SLE for this scenario?
a) $2 Million
b) $1 Million
c) $500,000
d) $33,333.33

Answers

Answer: A.) $2million

Explanation:

SLE (Single Loss Expectancy) can be explained the expected loss to be incurred whenever an asset is exposed to risk. The expected loss is valued or calculeltes in monetary terms.

The Single Loss Expectancy is calculated using the formula :

SLE = Asset value (AV) × Exposure factor

In the scenario above ;

Asset value = $2million

Exposure factor = 1 ; risk of exposure occurs once in 60 years

Therefore,

SLE = $2million × 1 = $2million

When approved for a loan, an individual essentially applied for aid in the area of...
A. Increasing (and financing) immediate increase in cash flow
B. limited liability
C. future educational services
D. protections and insurance

Answers

Answer:

The correct answer is A. When approved for a loan, an individual essentially applied for aid in the area of increasing (and financing), as it implies an immediate increase in cash flow.

Explanation:

Every loan involves the delivery of money by a bank or a financial agency to a person or company, with the consideration that the latter will later return said amount, plus an additional amount for interest, within a specified period and may pay in a single payment and in full or through an installment plan. But, in any case, the immediate result of said loan is an increase in the cash flow of the person who obtains said loan, which can be used for the acquisition of goods or services, or to face different eventual expenses.

The parallax perspective says that objects that are close up appear to move __________ than far away objects.

A. More smoothly
B. More randomly
C. Slower
D. Faster ​

Answers

Answer:

It appears to move faster.

An employee sets up Apache HTTP Server. He types 127.0.0.1 in the browser to check that the content is there. What is the next step in the setup process?

Answers

Answer:

Set up DNS so the server can be accessed through the Internet

Explanation:

If an employee establishes the HTTP server for Apache. In the browser, he types 127.0.0.1 to verify whether the content is visible or not

So by considering this, the next step in the setup process is to establish the DNS as after that, employees will need to provide the server name to the IP address, i.e. where the server exists on the internet. In addition, to do so, the server name must be in DNS.

Hence, the first option is correct

Your question is lacking the necessary answer options, so I will be adding them here:

A. Set up DNS so the server can be accessed through the Internet.

B. Install CUPS.

C. Assign a static IP address.

D. Nothing. The web server is good to go.

So, given your question, what is the next step in the setup process when setting up an Apache HTTP Server, the best option to answer it would be: A. Set up DNS so the server can be accessed through the Internet.

A server can be defined as a specialized computer system that is designed and configured to provide specific services for its end users (clients) on a request basis. A typical example of a server is a web server.

A web server is a type of computer that run websites and distribute web pages as they are being requested over the Internet by end users (clients).

Basically, when an end user (client) request for a website by adding or typing the uniform resource locator (URL) on the address bar of a web browser; a request is sent to the Internet to view the corresponding web pages (website) associated with that particular address (domain name).

An Apache HTTP Server is a freely-available and open source web server software designed and developed to avail end users the ability to deploy their websites on the world wide web (WWW) or Internet.

In this scenario, an employee sets up an Apache HTTP Server and types 127.0.0.1 in the web browser to check that the content is there. Thus, the next step in the setup process would be to set up a domain name system (DNS) so the server can be accessed by its users through the Internet.

In conclusion, the employee should set up a domain name system (DNS) in order to make the Apache HTTP Server accessible to end users through the Internet.

Find more information here: https://brainly.com/question/19341088

Which of the following statements about an inner class is true? An inner class is used for a utility class that should be visible elsewhere in the program. An inner class that is defined inside a method is publicly accessible. An inner class that is defined inside a method is not publicly accessible. An inner class that is defined inside an enclosing class but outside of its methods is not available to all methods of the enclosing class.

Answers

Answer:

(c) An inner class that is defined inside a method is not publicly accessible.

Explanation:

In programming languages such as Java, inner class (also called nested class) basically means a class inside another class or interface. The following are a few things to note about an inner class

i. Inner classes are used to group classes logically so that they are easy to use and maintained.

ii. An inner class defined inside a method of an enclosing class is not publicly accessible. They are called method local inner class

iii. An inner class that is defined inside an enclosing class but outside of its methods are available to all methods of the enclosing class

iv. An inner class has access to members, including private members, of its enclosing class.

Which statement is true?
a. When a method call is made, the called method must know how to return to its caller, so the return address is pushed onto the program execution stack.
b. Stacks support recursive method calls in the same manner as conventional, nonrecursive method calls.
c. The program execution stack contains the space created for a method's global variables on each invocation of that method during a program's execution.
d. When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.

Answers

Answer: D) When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.

Explanation:

convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920​
pls in step by step
pls help me bro

Answers

Answer:

0b11110000000 is binary

0o3600 is in octal

0x780 in hexa dec.

Explanation:its a bit complitcated to explain sorry bro!

Which object is a storage container that contains data in rows and columns and is the primary element of Access databases? procedures queries forms tables

Answers

Answer:

tables

Explanation:

For accessing the database there are four objects namely tables, queries, forms, and reports.

As the name suggests, the table is treated as an object in which the data is stored in a row and column format plus is the main element for accessing the database

Therefore in the given case, the last option is correct

Answer:

D. tables

Explanation:

took the test, theyre right too

a force of 50n acts on a body of mass 5kg. calculate acceleration produced .​

Answers

Answer:

Force = 50n

mass = 5kg

Force = m * acc

50 = 5 * A

A = 50/5

A = 10 m/s^2

HOPE IT HELPS!!!

Explanation:

What happens if you try to compile and run this program?
#include
int main(void) {
int i, t[4];
t[3] = 0;
for (i = 1; i >= 0; i--)
ti] =
= -131 ii
prints ("*", +(11);
return 0;

Answers

Your question is poorly formatted

#include <stdio.h>

int main(void) {

int i, t[4];

t[3] = 0;

for (i = 1; i >= 0; i--)

t[i] = t[3] * i;

printf("%d", +t[1]);

return 0;

}

Answer:

It outputs 0

Explanation:

I'll start my explanation from the third line

This line declares an integer variable i and an array of 4 elements of type integer

int i, t[4];

This line initialize the 3rd index element to 0

t[3] = 0;

The next two lines is an iteration;

The first line of the iteration iterates the value of i in descending order from 1 to 0

for (i = 1; i >= 0; i--)

This line of the iteration calculates t[1] as t[3] * i and t[0] as t[3] * i; Since t[3] is 0; both t[1] and t[0] will be 0

t[i] = t[3] * i;

This line prints t[1] which is 0

printf("%d", +t[1]);

how to use command prompt​

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The Command Prompt is a program, which available in windows operating systems, which imitates an input field with windows GUI(Graphic User Interface). It provides a text-based user interface, that can be used to run instructions inserted and carry out advanced organizational activities, following are the step to open a command prompt:

There are two-step to open the command prompt in windows:  

First, go to the start button the window. after open start type cmd on the search bar, It will provide the cmd to open it click with mouse or press enter button.    With the help of keyboard press (window+R) key together, after pressing it will provide the run prompt in which we write cmd and press enter. It will open a command prompt panel.    

Publication of flaws in encryption used for copy protection is a potential violation of: A. HIPAA B. U.S. Commerce Department regulations C. DMCA D. National Security Agency regulations

Answers

Answer:

Option C (DMCA) would be the correct choice.

Explanation:

DMCA is designed to govern electronic channels and tackle the problems the online revolution confronts regarding copyright. DMCA's mission seems to be to accommodate the rights of intellectual property producers and investors and investigate anything other than a copyrighted material that really occurs throughout the digital environment.

The other given choice are not related to the given content. So that option C is the right one.

A data set includes data from 500 random tornadoes. The display from technology available below results from using the tornado lengths​ (miles) to test the claim that the mean tornado length is greater than 2.2 miles. Use a 0.05 significance level. Identify the null and alternative​ hypothesis, test​ statistic, P-value, and state the final conclusion that addresses the original claim. LOADING... Click the icon to view the display from technology. What are the null and alternative​ hypotheses

Answers

Answer:

The answer is:

[tex]H_0:\mu=2.2\\H_1:\mu> 2.2[/tex]

Explanation:

[tex]H_0:\mu=2.2\\H_1:\mu> 2.2[/tex]

The test value of statistic t= [tex]\frac{\bar x-\mu}{\frac{s}{\sqrt{n}}}[/tex]

                                               [tex]=\frac{2.31688-2.2}{0.206915}\\\\=0.56[/tex]

The value of P = P(T>0.56)

                          =1-P(T<0.56)

                          =1-0.712

                          =0.288

Since the P value exceeds its mean value (0.288>0.05), the null assumption must not be rejected.  Don't ignore H0. This assertion, it mean length of the tornado is greater than 2.2 miles also isn't backed by enough evidence.

what is a type of system software that allows a user to perform maintenance type tasks​

Answers

Answer:

Computer

Explanation:

The type of system software that allows a user to perform maintenance-type tasks​ is a computer.

A computer has many programs and operating systems.

You work for a public relations (PR) firm and communicate regularly with the internal team and the clients on a PR campaign. You need to quickly send and receive professional messages that may contain text files and short media. These messages need to be accessible at any time of the day and in different time zones, and they should be able to reach all members (internal and external) relatively inexpensively. Which communication channel would best suit this purpose?

Answers

Answer:

You Need To Quickly Send And Receive Professional Messages That May Contain Text Files And Short Media. These Messages Need To Be Accessible At Any Time Of The Day And In Different ... You work for a public relations (PR) firm and communicate regularly with the internal team and the clients on a PR campaign.

Explanation:

Email would likely be the best communication channel to meet these requirements. Once an email is sent, it broadcasts across servers and arrives at the recipient’s/recipients’ mailbox(es) for access at the receiving party’s/(ies’) convenience. Email is also able to have attachments, and as such, will allow for text files and smaller media files (audio, video, or otherwise) to be attached and accessed easily.

32.
To give an existing document a different name
A. retype and give it another name,
B. use the save command
C. use the same as command
D. use windows explorer to copy.

Answers

Answer:

B.

Explanation:

If you are trying to save an existing document you would use the save command and you will be prompted if you want to rename it to what ever you wish

Hope this helps :)

which functions are performed by server-side code??​

Answers

Answer:

The answer is explained below

Explanation:

Server side code is a code built using the .NET framework so as to communicate with databases which are permanent. Server side code is used to store and retrieve data on databases, processing data and sending requested data to clients.

This type of code is used mostly for web applications inn which the code is being run on the server providing a customized interface for users.

What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?


Think link


Formal outline


Time lines


Guided notes

Answers

Answer:

Think link

Explanation:

What is Relational Computerized Database

Answers

Answer:

Relational computerized database uses tables and columns to store data. each table is composed of records and each record is tied to an attribute containing a unique value. This helps the user use the data base by search query and gives the opportunity to build large and complex data bases

Whoever answers FRIST and it has to be correct so if you don’t know don’t waste your time pls. Anyway whoever answer frist I will give you brainliest and some of my points Which type of photography would you use if you wanted to photograph a fly?

Answers

Answer:

I think Ariel photography

Explanation:

I’m not sure, but I think so

Is the IOT governable by frameworks? Explain your rationale.

Answers

Answer:

Absolutely yes.

Explanation:

IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.

Some of the aspects that should be governed by these frameworks are;

i. Data confidentiality:

Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.

ii. Data integrity:

These data should also be assured of consistency and accuracy over a long period of time.

iii. Accountability:

When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.

Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?

Answers

Answer:

DNS or Domain Name System

Explanation:

You can query a DNS server with a domain name to get an IP address.

Create Python program code that will use a for loop to ask the user to enterfourintegers. Itwillcount how many of the integers are divisible by 2. The programwill print each of the 4integers and a message saying whether the integeris even or odd. The code will print the total number of even integers

Answers

Answer:

is_even = 0

int_numbers = []

for n in range(4):

n = int(input('press any four integer numbers')

int_numbers.append(n)

for n in int_numbers:

if n%2==0:

print(n, 'integer is even')

is_even+= 1

else:

print(n, 'integer is odd')

print('Total even numbers =', is_even)

Explanation:

is_even = 0 (initiates a counter to record the number of even integers).

int_numbers creates a list to store the inputs entered by the user.

int(input()) : allows users to enter an integer number

int_numbers.append(n) : adds user input to list list variable created.

n%==2 : checks if entered digit leaves a remainder of 0 when divided by 2; hence an even number

is_even+= 1: counter updates by 1 for every even number confirmed.

what are reserved words in C programming?

Answers

Answer:

A word that cannot be used as an identifier, such as the name of a variable, function, or label. A reserved word may have no meaning. A reserved word is also known as a reserved identifier.

Explanation:

quick google search

Which is not a proper statement?

Answers

Answer:

leftisBlocked()

Explanation:

Answer: leftIsBlocked()

Hope it helps <3

Roger is getting a $5,000 loan. Which option will allow Roger to pay off the loan and keep his payments under $100?

Answers

No roger will not be able to do that

Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive. After the loop terminates, it prints out, on a line by itself, the sum of all the even integers read. Declare any variables that are needed. ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input

Answers

Answer:

Written in Java Programming Language

import java.util.Scanner;

public class Assign{

   public static void main(String [] args)    {

   Scanner stdin = new Scanner(System.in);

   int num,sum=0;

   System.out.println("Start Inputs: ");

   num = stdin.nextInt();

   while (num>=0) {

       if(num%2== 0)

       {

       sum+=num;    

       }      

       num = stdin.nextInt();

   }

   System.out.print("Sum of even numbers: "+sum);

   

   }

}

Explanation:

I'll start my explanation from line 4

This line initializes Scanner object stdin

Scanner stdin = new Scanner(System.in);

This line declares necessary variables and initializes sum to 0

   int num,sum=0;

This line prompts user for inputs

   System.out.println("Start Inputs: ");

This line reads user inputs

   num = stdin.nextInt();

This line checks is user input is not negative (It's a loop that will be repeated continually until a negative number is inputted)

   while (num>=0) {

This line checks if user input is an even number

       if(num%2== 0)

       {

If the above condition is true, this line calculates the sum of even numbers

       sum+=num;    

       }      

This line prepares the user for next input

       num = stdin.nextInt();

   }

This line prints the calculated sum of even number; If no even number is inputted, the sum will be 0

   System.out.print("Sum of even numbers: "+sum);

While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for

Answers

Answer:

Record time offsets.

Explanation:

In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.

The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.

Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.

Additionally, the time stamp varies depending on the operating system being used;

- For windows operating system, it uses a 64 bit time stamp.

- For Linux or Unix, it uses a 32 bit time stamp.

explain any five features of a spread sheet application​

Answers

The basic features of a spreadsheet program are :

Grids, Rows & Columns. A spreadsheet consists of a grid of columns and rows.

Functions. Functions are used in the Spreadsheet software to evaluate values and perform different kinds of operations.

Formulas.

Commands.

Text Manipulation.

Printing.

Title Bar.

Menu Bar

Hope u understood!

pls mark me brainliest!

#staysafestayhome

Write a program segment with a do-while loop that displays whether a user-entered integer is even or odd. The code should then ask the user if he or she wants to test another number. The loop should repeat as long as the user enters 'Y' or 'y' . Use a logical OR operator in the do-while loop test expression

Answers

Answer:

Following is the program in C++ program

#include<iostream> // header file

using namespace std; // namespace  

int main() // main function  

{

int num1 = 0; // variable declaration  

char test;// variable declaration  

do

{

cout << " Enter the number: ";

cin >> num1; //Read the input by the user  

if (num1 % 2 == 0) // check the condition of even

cout << " number is even.\n";

else // check the condition of odd

cout << "Number is odd.\n";

cout << " Do you wanted the another test of number (y/n)? ";

cin >> test; //Read the input by user

} while (test == 'y' || test == 'Y'); //terating the loop

return 0;    

}

Output:

Enter the number:45

number is even.

Do you wanted the another test of number (y/n) Y

Enter the number:5

Number is odd.

Do you wanted the another test of number (y/n) n

Explanation:

Following are the description of program

Declared a variable "num1" as integer type and initialized as 0 to them Declared a variable "test" as char type .After that iterating the do -while loop .Read the value by the user in the "num1" variable .Check the condition of even and odd by using % operator .Read the value of test by the user .If the user enter Y or y then loop again executing otherwise not .
Other Questions
Why would it be difficult to experimentally calculate the speed of sound in the classroom with a stopwatch and meter stick? What best describes the way in which German colonies became involved in the war? The theory of evolution through natural selection unites biology in ways that are not usually evident to most peoplE) A non-biologist might look at a lake and see ducks swimming and dragonflies flying. When a biologist looks at the lake, he/she probably would see 3. Which of the following is NOT a problem caused by rapid human population growth?unsafe waterovercrowded schoolsbarren landquality housing Evauluate 37/100+3/10 Find the equation of the line that passes through (3,-4) and is parallel to 3x+y+2=0 Leave your answer in the form y=mx+c Which substance is a nucleic acid? Which two practices are examples of how people use science?O A. Explaining natural events using facts and dataB. Developing theories using many lines of evidenceC. Explaining natural events using myths and legendsD. Developing stories that enhance culture and share beliefs Ethnographic evidence has revealed that traditionally, Pawnee women worked wood, and among the Hidatsa, women made boats. Cases such as these suggest that:_________ When Jaxson turned 13, he started to have migraine headaches. The migraines became so frequent that Jaxson could not attend school. The type of stressor Jaxson is experiencing is referred to as: Group of answer choices Environmental Stressor Thinking Stressor Biological Stressor Life Stressor If you had the following food chain: Sungrassmousesnakebird of prey Which of the following would NOT happen if the snake trophic level was removed? A. The mouse population would decrease B. The bird of prey population would decrease C. The sun would stay the same D. The grass population would decrease Read the excerpt from "Opening Ceremonies of the New York and Brooklyn Bridge" by Hon. Seth Low, Mayor of the City of Brooklyn. This Bridge is a landway over the water, connecting two cities bearing to each other relations in some respects similar. It is the function of such works to bless "both him that gives and him that takes." The development of the West has not belittled, but has enlarged New York, and Brooklyn will grow by reason of this Bridge, not at New York's expense, but to her permanent advantage. The Brooklyn of 1900 can hardly be guessed at from the city of to-day. The hand of Time is a mighty hand. To those who are privileged to live in sight of this noble structure every line of it should be eloquent with inspiration. Courage, enterprise, skill, faith, endurance--these are the qualities which have made the great Bridge, and these are the qualities which will make our city great and our people great. God grant they never may be lacking in our midst. Gentlemen of the Trustees, in accepting the Bridge at your hands, I thank you warmly in Brooklyn's name for your manifold and arduous labors. Based on the details in this excerpt, what is the purpose of this speech? to demonstrate to inform to entertain to persuade The love song of j. alfred prufrock" by t. s. eliot 1. the tone of this poem is:_______a. romantic longing.b. wistful joy.c. arrogant confidence.d. bitter remorse.e. weary resignation. What information is needed to set up sales tax in QuickBooks Online for a client who only does business in their home state? identify an equation in slope intercept form for the line parellel to y=-3x+7 that passes through (2,-4) what department was formed to centralize various domestic security related agencies The equal total payments pattern for installment notes consists of changing amounts of interest but constant amounts of principal over the life of the note.A. TrueB. False enzymes ___ the activation energy threshold required to start a chemical reaction lower or raise The Thirteenth Amendment was ratified in 1863 1864 1865 \ 1866 Joel is fertilizing an irregularly shaped garden. the grid has squares with side lengths of 2 m. Estimate the area of the garden. Given that the price of the fertilizer is $2.99 per square meter, find the cost of the fertilizer