Answer:
Tubbo is a goat or ram on the Dream SMP.
Explanation:
Since Jschlatt was his father and he's a ram, Tubbo is a ram.
Answer:
yes, the first person`s answer is correct! On the dsmp, Tubbo is a goat, since is father was one as well. The only place he is a bee is the osmp, or Origins smp. when Tubbo first joined the dsmp, he was known for his obsession with bees, which carried into his reputation entirely.
:]
4. Write a program to calculate square root and
cube root of an entered number .
Answer:
DECLARE SUB SQUARE (N)
CLS
INPUT “ENTER ANY NUMBER”; N
CALL SQUARE(N)
END
SUB SQUARE (N)
S = N ^ 2
PRINT “SQUARE OF NUMBER “; S
END SUB
How have technology and social media changed reading?
O A. Physical books can only be read on the web.
B. Now reading is a conversation of give and take.
O C. People no longer have to read anything at all.
D. Reading often takes much longer to undergo.
Answer:
B?
Explanation:
I'm super sorry if I get this wrong for you but after thinking so much I probably think it would be B
Answer:
the guy above is right it is B
Explanation:
because 2+2=4
Linda wants to change the color of the SmartArt that she has used in her spreadsheet. To do so, she clicks on the shape in the SmartArt graphic. She then clicks on the arrow next to Shape Fill under Drawing Tools, on the Format tab, in the Shape Styles group. Linda then selects an option from the menu that appears, and under the Colors Dialog box and Standard, she chooses the color she wants the SmartArt to be and clicks OK. What can the option that she selected from the menu under Shape Fill be
Answer: Theme colors
Explanation:
Based on the directions, Linda most probably went to the "Theme colors" option as shown in the attachment below. Theme colors enables one to change the color of their smart shape.
It is located in the "Format tab" which is under "Drawing tools" in the more recent Excel versions. Under the format tab it is located in the Shape Styles group as shown below.
g 4-6 you've been given the network 200.5.0.0 /24 and need to subnet it using vlsm as follows: bldg 1 30 hosts bldg 2 10 hosts bldg 3 10 hosts bldg 4 4 hosts what will be the network address for bldg 3
Answer:
The answer is "200.5.0.0 32/28".
Explanation:
The requirement of the Bldg is =30.
The number of the host bits which is needed = 5
Therefore the subnet mask will be =/27
for bldg 3 netmask could be= /28
and when the /28 after that the last octet will be= 00100000.
00100000 converting value into a decimal value that is = 32.
therefore the correct value is 200.5.0.32 /28.
Question #4
Math Formula
What will you see on the next line?
>>>int(3.9)
Answer:
3
Explanation:
The correct answer is 3. The int() function truncates the decimal part.
-Edge 2022
For which two reasons might a designer use contrasting colors on a web page?
Which of the following has the greatest impact on telecommunications design?
availability of resources used in manufacturing
consumer functionality demands
O cost of materials used in manufacturing
O currently trending fashion designs
Answer:
I don't know
Explanation:
Sorry if i'm not helpful. I just need to complete a challenge
Kyra needs help deciding which colors she should use on her web page. What can she use to help her decide? (5 points)
.Color selection
.Color theory
.Proofreading
.Storyboarding
Correct Answer: Color selection
Given a member function named set_age() with a parameter named age in a class named Employee, what code would you use within the function to set the value of the corresponding data member if the data member has the same name as the parameter
Answer:
Explanation:
This would be considered a setter method. In most languages the parameter of the setter method is the same as the variable that we are passing the value to. Therefore, within the function you need to call the instance variable and make it equal to the parameter being passed. It seems that from the function name this is being written in python. Therefore, the following python code will show you an example of the Employee class and the set_age() method.
class Employee:
age = 0
def __init__(self):
pass
def set_age(self, age):
self.age = age
As you can see in the above code the instance age variable is targeted using the self keyword in Python and is passed the parameter age to the instance variable.
write a program to enter 30 integer numbers into an array and display
Answer:
i764
Explanation:
Answer:
Explanation:
Python:
numberlist = []
for i in range(0, 29):
a = input("Enter a number: ")
numberlist[i] = a
print(*meh, sep = "\n")
hello! can someone write a c++ program for this problem
Problema 2018.3.2 - Cheated dice
Costica is on vacation and his parents sent him to the country. There he gets terribly bored and looking through his grandfather's closet, he came across a bag full of dice. Having no one to play dice with, but it seemed to him that some of the dice were heavier than the others, Costica chose a dice and started to test it by throwing it with him and noting how many times each face fell. He then tries to figure out whether the dice are rolled or not, considering that the difference between the maximum number of appearances of one face and the minimum number of occurrences (of any other face) should not exceed 10% of the total number of throws.
Requirement
Given a number N of dice rolls and then N natural numbers in the range [1: 6] representing the numbers obtained on the rolls, determine whether the dice is tricked according to the above condition.
Input data
From the input (stdin stream) on the first line reads the natural number N, representing the number of rolls. On the following N lines there is a natural number in the range [1: 6] representing the numbers obtained on throws.
Output data
At the output (stdout stream) a single number will be displayed, 0 or 1, 0 if the dice are normal, and 1 if it is cheated.
ATTENTION to the requirement of the problem: the results must be displayed EXACTLY in the way indicated! In other words, nothing will be displayed on the standard output stream in addition to the problem requirement; as a result of the automatic evaluation, any additional character displayed, or a display different from the one indicated, will lead to an erroneous result and therefore to the qualification "Rejected".
Restrictions and clarifications
1. 10 ≤ N ≤ 100
2. Caution: Depending on the programming language chosen, the file containing the code must have one of the extensions .c, .cpp, .java, or .m. The web editor will not automatically add these extensions and their absence makes it impossible to compile the program!
3. Attention: The source file must be named by the candidate as: . where name is the last name of the candidate and the extension (ext) is the one chosen according to the previous point. Beware of Java language restrictions on class name and file name!
Input data
10
6
6
6
6
6
6
6
6
6
6
Output data
1
Roll the dice 10 times, all 10 rolls produce the number 6. Because the difference between the maximum number of rolls (10) and the minimum number of rolls (0) is strictly greater than 10% of the total number of rolls (10% of 10 is 1), we conclude that the dice are oiled.
Input data
10
1
4
2
5
4
6
2
1
3
3
Output data
0
Throw the dice 10 times and get: 1 twice, 2 twice, 3 twice, 4 twice, 5 and 6 at a time. Because the difference between the maximum number of appearances (two) and the minimum number of occurrences (one) is less than or equal to 10% of the total number of throws (10% of 10 is 1), we conclude that the dice are not deceived.
Answer:
f0ll0w me on insta gram Id:Anshi threddy_06 (no gap between I and t)
list and describe each of the activities of technology
Answer:
network has led to exposure of dirty things to young ones.
air transport has led to losing of lives
Which three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI
Answer:
Primary DNS server
Secondary DNS server
Default gateway
Explanation:
The following tests are performed by ESXi:
Pings the subnet gateway that is stated.Pings the primary DNS server that is stated.Pings the secondary DNS server that is stated.Ensure that the hostname of the ESXi host is resolved by it.Based on the above, the three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI are are therefore the following:
Primary DNS serverSecondary DNS serverDefault gatewayWhy computer is known as versatile and diligent device? Explain
They work at a constant speed to do the task. Unlike a human, they will not slow down or get bored or start making mistakes that they were not doing earlier. So once they are programmed correctly to do a task, they will do it diligently.
They are versatile because they can be used for all sorts of tasks. They can also do many of the same tasks in different ways. They are diligent because they will do a task thoroughly until it is finished.
Which of the following is NOT a computer hardware?
A) monitor
B) scanner
C) modem
D) Windows 10
tell me the most scariest website you know and i'll give you brainlest
Answer:
it's not a website but on insta there's an account that freezes people's phone when you click on their story.
Explanation:
If AX contains hex information 2111 and BX contains hex information 4333, what is the content in BX in hex format after performing ASM instruction ADD BX, AX
Answer:
BX will hold 6444 in hex format.
Explanation:
From the given information:
We need to understand that AX is 64-bit hex number.
When performing ASM instruction (Assembly language instruction),
The addition of 2111 + 4333 = 6444 will be in BX.
This is because ADD, BX, AX will add bx and ax; and the final outcome will be stored in BX.
∴
BX will hold 6444 in hex format.
If you were an attacker who wanted to gain access to a network, would you focus on breaching technical controls for applying social engineering techniques
Answer:
Baiting. As its name implies, baiting attacks use a false promise to pique a victim's greed or curiosity. ...
Scareware. Scareware involves victims being bombarded with false alarms and fictitious threats. ...
Pretexting. Here an attacker obtains information through a series of cleverly crafted lies. ...
Phishing. ...
Spear phishing
Explanation:
thank me later
By convention only, either the first usable address or the last usable address in a network is assigned to the router (gateway) connected to that network. (true or false)
Answer:
t
r
u
e
n .....................................................
Write a function that displays the character that appears most frequently in the string. If several characters have the same highest frequency, displays the first character with that frequency. Note that you must use dictionary to count the frequency of each letter in the input string. NO credit will be given without using dictionary in your program
Answer:
The function is as follows:
def getMode(str):
occurrence = [0] * 256
dict = {}
for i in str:
occurrence[ord(i)]+=1;
dict[i] = occurrence[ord(i)]
highest = max(dict, key=dict.get)
print(highest)
Explanation:
This defines the function
def getMode(str):
This initializes the occurrence list to 0
occurrence = [0] * 256
This creates an empty dictionary
dict = {}
This iterates through the input string
for i in str:
This counts the occurrence of each string
occurrence[ord(i)]+=1;
The string and its occurrence are then appended to the dictionary
dict[i] = occurrence[ord(i)]
This gets the key with the highest value (i.e. the mode)
highest = max(dict, key=dict.get)
This prints the key
print(highest)
how you use ict today and how will you use it tomorrow
Answer:
you use it in water today
Explanation:
tomorrow you'll use it in soda
In python, Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non-negative" otherwise.
I am assuming that user_val is an inputted variable and a whole number (int)...
user_val = int(input("Enter a number: "))
if user_val < 0:
print("negative")
else:
print("non-negative")
Select the correct term to complete the sentence.
The
file format is used for video files.
A. .pptx
B. .mp3
C. .jpeg
D. .mp4
Answer: D. mp4
its mp4 because its always on video files
Suppose the CashRegister needs to support a method void undo() that undoes the addition of the preceding item. This enables a cashier to quickly undo a mistake. What instance variables should you add to the CashRegister class to support this modification
Answer:
previousAddition instance variable
Explanation:
In order to accomplish this you would need to add a previousAddition instance variable. In this variable you would need to save the amount that was added at the end of the process. Therefore, if a mistake were to occur you can simply call the previousAddition variable which would have that amount and subtract it from the total. This would quickly reverse the mistake, and can be easily called from the undo() method.
Write a program to implement problem statement below; provide the menu for input N and number of experiment M to calculate average time on M runs. randomly generated list. State your estimate on the BigO number of your algorithm/program logic. (we discussed in the class) Measure the performance of your program by given different N with randomly generated list with multiple experiment of Ns against time to draw the BigO graph (using excel) we discussed during the lecture.
Answer:
Explanation:
#include<iostream>
#include<ctime>
#include<bits/stdc++.h>
using namespace std;
double calculate(double arr[], int l)
{
double avg=0.0;
int x;
for(x=0;x<l;x++)
{
avg+=arr[x];
}
avg/=l;
return avg;
}
int biggest(int arr[], int n)
{
int x,idx,big=-1;
for(x=0;x<n;x++)
{
if(arr[x]>big)
{
big=arr[x];
idx=x;
}
}
return idx;
}
int main()
{
vector<pair<int,double> >result;
cout<<"Enter 1 for iteration\nEnter 2 for exit\n";
int choice;
cin>>choice;
while(choice!=2)
{
int n,m;
cout<<"Enter N"<<endl;
cin>>n;
cout<<"Enter M"<<endl;
cin>>m;
int c=m;
double running_time[c];
while(c>0)
{
int arr[n];
int x;
for(x=0;x<n;x++)
{
arr[x] = rand();
}
clock_t start = clock();
int pos = biggest(arr,n);
clock_t t_end = clock();
c--;
running_time[c] = 1000.0*(t_end-start)/CLOCKS_PER_SEC;
}
double avg_running_time = calculate(running_time,m);
result.push_back(make_pair(n,avg_running_time));
cout<<"Enter 1 for iteration\nEnter 2 for exit\n";
cin>>choice;
}
for(int x=0;x<result.size();x++)
{
cout<<result[x].first<<" "<<result[x].second<<endl;
}
}
Write a 3-4 page paper (500-800 words) about your project that explains your project, the type of conditioning you used, and the methods and procedures used to execute your project. You should explain the process of shaping the behavior and utilize any or all appropriate vocabulary. Finally, include a discussion of the results and an analysis of recommendations for improvement or future changes.
Answer:
Following are the responses to the given question:
Explanation:
I have decided to take up my project as a change in my behavior of not working out and exercising on daily basis. To execute this project, I decided to use ‘Operant conditioning’ to be able to complete it successfully. The reason for choosing this as my project is to be able to change my unhealthy behavior of not exercising daily, which is now having an impact on my weight as well as on my mind.
Operant Conditioning is also known as instrumental conditioning was used by the behaviorist B.F Skinner. Through operant conditioning, Skinner explained how we adapt to several learned behaviors in our everyday life. Its idea of such conditioning would be that the acts that accompany reinforcement will most likely occur in the future.
They may call it a punishment for actions and retribution. A relationship is formed between that action as well as its consequences. I began my project with an order of a watch to keep track of my daily workout and even downloaded a phone-based software to track my calorie each day. The concept behind it was to understand my everyday work and my calorie consumption because these variables inspire me to choose more to achieve my aim to practice and maintain my weight safely.
So, to find any way to miss it I did the routine calendar. We also made a small and comprehensive strategy for the first few weeks such as early awakening and 10 minutes getting warmed up. I concentrated on the operating conditioning function and reaction. I've been honored by enjoying my important topics for one hour every week that I finished my practice according to my planned routine. I wanted and award myself quarterly rewards in addition to daily rewards. When the goal of a daily exercise is also achieved, I decided to go out to my favorite coffee just at end of November.
It's not a matter of giving one of my favorite stuff to my cousins to affirm my everyday life except for one year within a week (except when I'm unwell). The fear of missing one of my items that I'd always agreed only at beginning of the week prevented me from achieving my target of exercise every day and made me very content to go to my favorite coffee shop. It made it more motivating for someone like me to proceed with the positive and negative reinforcement of doing my everyday exercise routine. I also get used to my fresh and safe routine every day, but also the results are impressive.
Even though I don't feel about rewarding myself with something that I like, I am very much happy because of the positive result which I have a fit body and maintain a healthy lifestyle. Those who removed my daily positive and negative exercise reinforcements, as well as the monthly incentive, could not be required in the future. Moreover, I can work on a closer look for 6 abs.
Write a recursive function that has an argument that is an array of characters and two arguments that are bounds on array indexes. The function should reverse the order of those entries in the array whose indexes are between the two bounds. For example, if the array is a[0]
Answer:
The function is as follows:
void revArray(char arr[], unsigned int low, unsigned int high) {
if (low >= high){
return; }
swap(arr[low], arr[high]);
revArray(arr, low + 1, high - 1); }
Explanation:
This declares the function. It receives a char array and the lower and upper bounds to be reversed
void revArray(char arr[], unsigned int low, unsigned int high) {
This is the base case of the recursion (lower bound greater than or equal to the upper bound).
if (low >= high){
return; }
This swaps alternate array elements
swap(arr[low], arr[high]);
This calls the function for another swap operation
revArray(arr, low + 1, high - 1); }
Write a method called lexLargest that takes a string object argument containing some text. Your method should return the lexicographical largest word in the String object (that is, the one that would appear latest in the dictionary).
public static String lexLargest(String text){
//split the text based on whitespace into individual strings
//store in an array called words
String[] words = text.split("\\s");
//create and initialize a temporary variable
int temp = 0;
//loop through the words array and start comparing
for(int i = 0; i < words.length; i++){
//By ignoring case,
//check if a word at the given index i,
//is lexicographically greater than the one specified by
//the temp variable.
if(words[i].compareToIgnoreCase(words[temp]) > 0){
//if it is, change the value of the temp variable to the index i
temp = i;
}
}
//return the word given by the index specified in the temp
// variable
return words[temp];
}
Sample Output:If the text is "This is my name again", output will be This
If the text is "My test", output will be test
Explanation:
The code above has been written in Java. It contains comments explaining the code. Sample outputs have also been given.
However, it is worth to note the method that does the actual computation for the lexicographical arrangement. The method is compareToIgnoreCase().
This method, ignoring their cases, compares two strings.
It returns 0 if the first string and the second string are equal.
It returns a positive number if the first string is greater than the second string.
It returns a negative number if the first string is less than the second string.
What is the function of the NOS? Select all that apply.
•network management
•connects network nodes
•network security
•provides MACs
•gives access to privileges
•data protection
Answer:
.network management
Explanation:
pls need brainliest
Answer:
gives access privileges
network management
network security
data protection
Explanation:
Which of the following is true? a. There are RFCs that describe challenge-response authentication techniques to use with email. b. Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam. c. Spam relies heavily on the absence of email authentication. d. All of the above.
The option that is true is option b. Filtering for spam sometimes produces a false positive, in which legitimate email is identified as spam.
How is spam filtration carried out?The processing of email to organize it in accordance with predetermined criteria is known as email filtering. The word can allude to the use of human intelligence, although it most frequently describes how messages are processed automatically at SMTP servers, sometimes using anti-spam tactics.
Therefore, Email filtering operates as previously stated by scanning incoming messages for red flags that indicate spam or phishing content and then automatically transferring such messages to a different folder. Spam filters evaluate an incoming email using a variety of criteria.
Learn more about Filtering for spam from
https://brainly.com/question/13058726
#SPJ1