I need help plz it’s python

I Need Help Plz Its Python

Answers

Answer 1

Answer:

The output of the first question would be 9. And the answer the second question is 10.


Related Questions

Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs will be most helpful?

A. counter module

B. while loop

C. for loop

D. mean module

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is A: counter module.

Counter module in python or Python counter is a container that holds the count of each of the elements present in the container. It is a sub-class available in the dictionary class. Jamal can use this module in Python to write a program that will find the 10 most common words in Romeo and Juliet.

Other options are not correct because:

While loop: while loop only iterates its body until a specific condition is met. For loop is used to iterate to a pre-specified condition and iterate until the condition is reached. While the mean module of Python is used to calculate mean and average.

explain mechanical computer ,electromechanical and electronic computer with example

Answers

Answer:

A mechanical computer uses moving parts to do it’s calculations. Think old style adding machines.Electronic computers use electronic oscillators to generate a clock. The oscillator might include a mechanical element such as a crystal, but the majority of the clock signal is processed in the electrical domain.

Explanation:

An example of a mechanical computer clock is a Swiss watch movement, which needs no electronics. Movement is based upon springs coupled to other mechanical pieces. Swiss watches are high precision mechanical computers that do counting. There are other types of more sophisticated mechanical computers. Research the works of Konrad Zuse and his Z1 mechanical computer.

16. A
is an object you can insert in your document, type text in, but can then format in the
same ways you would other objects?
(5 Points)
formatting box
text holder
text box
typing box

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is the Text box.

You can insert a text box as an object in your document, type text in it and you can format it in the same way you would do for other objects.

You can insert the text box using the Insert tab then under Shapes that you can find under the Illustrations group. You can then find Text Box under basic shapes.

While the other options are not correct because:

Formatting box allows you to format the object, text holder and typing box does not mean in this context because text holder is something that can hold the text such as shapes or text box, etc. but these terms are not used in word or in a document.

How did DDE devices have made our daily life easier?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

DDE (direct data entry) devices are the devices that read data from a source and transfer it directly into the computer. Unlike, other input devices which require physical interaction which requires you to move physically or to do something for an output or feeding data into a computer.  

The DDE devices require no hard work while taking input into the computer as compared to other input devices. These DDE devices made our life very easy. Because these devices take input accurately and there are no chances of human error.

The example of DDE devices are magnetic stripe reader, chip reader, Pin pads, optical mark reader, and barcode reader, etc.

These devices have brought great advantages to human life. Because by using these data entry devices, information can be put into very quickly, more accurate than typing and information of the whole page transferred .very quickly and accurately into the system. These devices are also more secure and can hold lots of data, and the data is protected with the PIN (personal identification number). These are also used in ATM machines, handheld, and entry doors.

Answer:

wait is it a write in answer or a multiple choice?

Explanation:

The Mac’s GUI set it apart from earlier operating systems.
True or False

Answers

Answer:

Its true

Explanation:

Just took the test.

Which of the following server types is in the form of a single circuit board?
a. blade
b. tower
O c. rack
O d. dedicated
o

Answers

Answer:

A. Blade

Explanation:

Server Blade means a complete computer system on a single board which includes one or more CPUs, memory, operating system, network connections, and typically includes access to hard drives or other mass storage devices. A Server Blade is designed to be inserted into a space-saving rack, and each rack may contain a number of Server Blades served by one or more power supplies.

If this is multiple choice, a dedicated server can be too.

What game is this? helpppppp

Answers

Answer:

the sims lol

Explanation:

Write a loop that sets newScores to oldScores shifted once left, with element 0 copied to the end. Ex: If oldScores

Answers

Answer:

Explanation:

The following is written in Java. It is a method/function that takes the oldScore as an int input. It turns it into a String, separates all the digits, puts them into an array. Then adds the first digit to the end and removes it from the beginning, thus shifting the entire score one to the left. Then it turns the String variable back into an Integer called finalScore and prints it out.

public static void newScore(int oldScore) {

       ArrayList<Integer> newScore = new ArrayList<>();

       String stringOldScore = String.valueOf(oldScore);

       for (int x = 0; x < stringOldScore.length(); x++) {

           newScore.add(Integer.parseInt(String.valueOf(stringOldScore.charAt(x))));

       }

       newScore.add(newScore.get(0));

       newScore.remove(0);

       String newScoreString = "";

       for (int x:newScore) {

           newScoreString += String.valueOf(x);

       }

       int finalScore = Integer.parseInt(newScoreString);

       System.out.println(finalScore);

   }

References inserted initially as footnotes can be converted to endnotes through an option in the software.

A. True

B. False

Answers

The answer is A. True

The answer is: A) True

What was that show where lowe’s were based off eye colors and the main character had orange eyes that let her mind control people. It was either on netflix or hulu

Answers

The Innocents on Hulu i think

Answer:Raising Dion?

Explanation:

Was it Raising Dion?

so i am on a Chromebook with headphones , and I am wondering if you can make it that a tab only play sound on one side of the headphones and other tabs to the other side of the headphones

Answers

No you cannot do that with a single pair of headphones. If you had an dual aux split... you could plug in two pairs of headphones... even if you had two bluetooth pairs I don't think it'd be possible... What do you need to do that for? Maybe I can help find an alternative solution

Which software programs should students avoid using to create and submit course work? (Choose all that apply). Word, Pages, Numbers, Keynote

Answers

Answer:

tyafana

Explan

ation:n umbers

Let f(w) = 2w^3 - 5. Let z = 2. What is f(z)?​

Answers

Answer:

Hence f(z)=11

*This is what i think*

Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.

What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?

Answers

Answer:

You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.

It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.

Endnotes are indicated by

A. lowercase letters (a, b, c)

B. numbers (1, 2, 3)

C. Roman numerals (i, il, ill)

D. uppercase letters (A, B, C)
They

Answers

Answer:

The answer is D because u have the uppercase letter bold

Answer:

Endnotes are actually indicated by Roman Numerals so option C is correct.

Write a program with 2 separate functions which compute the GCD (Greatest Common Denominator) and the LCM (Lowest Common Multiple) of two input integers.

Answers

Answer:

The program written in Python is as follows

def GCD(num1, num2):

    small = num1

    if num1 > num2:

         small = num2

    for i in range(1, small+1):

         if((num1 % i == 0) and (num2 % i == 0)):

              gcd = i

    print("The GCD is "+ str(gcd))

def LCM(num1,num2):

    big = num2  

    if num1 > num2:

         big = num1

    while(True):

         if((big % num1 == 0) and (big % num2 == 0)):

              lcm = big

              break

         big = big+1

     print("The LCM is "+ str(lcm))

 print("Enter two numbers: ")

num1 = int(input(": "))

num2 = int(input(": "))

GCD(num1, num2)

LCM(num1, num2)

Explanation:

This line defines the GCD function

def GCD(num1, num2):

This line initializes variable small to num1

    small = num1

This line checks if num2 is less than num1, if yes: num2 is assigned to variable small

    if num1 > num2:

         small = num2

The following iteration determines the GCD of num1 and num2

    for i in range(1, small+1):

         if((num1 % i == 0) and (num2 % i == 0)):

              gcd = i

This line prints the GCD

    print("The GCD is "+ str(gcd))

   

This line defines the LCM function

def LCM(num1,num2):

This line initializes variable big to num2

    big = num2  

This line checks if num1 is greater than num2, if yes: num1 is assigned to variable big

    if num1 > num2:

         big = num1

The following iteration continues while the LCM has not been gotten.

    while(True):

This if statement determines the LCM using modulo operator

         if((big % num1 == 0) and (big % num2 == 0)):

              lcm = big

              break

         big = big+1

This line prints the LCM of the two numbers

     print("The LCM is "+ str(lcm))

The main starts here

This line prompts user for two numbers

print("Enter two numbers: ")

The next two lines get user inputs

num1 = int(input(": "))

num2 = int(input(": "))

This calls the GCD function

GCD(num1, num2)

This calls the LCM function

LCM(num1, num2)

See attachment for more structured program

Write an expression that will print "in high school" if the value of user_grade is between 9 and 12 (inclusive).

Answers

In python:

if 8 < user_grade < 13:

   print("in high school")

You would just need to supply the value of the user_grade variable.

Consider an instruction within a certain instruction-set architecture (ISA): ADD R1, R2, R3. This instruction adds the value in Register R1 with the value in Register R2, and stores the result in Register R3. What is the maximum number of physical memory accesses that may be caused by this single instruction?
a) 1
b) 2
c) 3
d) 4

Answers

Answer:

C = 3

Explanation:

The maximum number of physical memory accesses that may be caused by this single instruction is ; 3

This is because In the case of loading two values into R2 and R3 there is need for their memories to be accessed and after execution R1 value there will be a write back into memory hence another memory is also accessed and that makes the number of Physical memories accessed to be three(3) in Total

describe PROM, EPROM and EEPROM memories​

Answers

Answer:

Explanation:

PROM is a Read Only Memory (ROM) that can be modified only once by a user while EPROM is a programmable ROM that can be erased and reused. EEPROM, on the other hand, is a user-modifiable ROM that can be erased and reprogrammed repeatedly through a normal electrical voltage.

What is the benefit of encapsulation?

A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected

Answers

Answer:

B. To reuse code

A scared kangaroo clears a fence that is 2.44 meters tall. What is the vertical component of the kangaroos velocity at take off ? If the horizontal component of the kangaroos velocity is 4.80 m per s at what angle did the kangaroo take off the ground? (hint: at its maximum height the kangaroos vertical velocity is 0)

Answers

Answer:

a) The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.

b) The angle at which the kangaroo took off the ground is approximately 46.066º.

Explanation:

a) According to the statement, the kangaroo has an initial horizontal velocity and jumps to overcome the fence until velocity becomes zero. If effects from non-conservative forces can be neglected, then we represent the situation of the kangaroo by Principle of Energy Conservation:

[tex]K_{1}+U_{g,1} = K_{2}+U_{g,2}[/tex] (Eq. 1)

Where:

[tex]K_{1}[/tex], [tex]K_{2}[/tex] - Initial and final translational kinetic energies, measured in joules.

[tex]U_{g,1}[/tex], [tex]U_{g,2}[/tex] - Initial and final gravitational potential energies, measured in joules.

By definitions of translational kinetic and potential gravitational energies, we expand and simplify the equation above:

[tex]\frac{1}{2}\cdot m\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = m\cdot g \cdot (y_{2}-y_{1})[/tex]

[tex]\frac{1}{2}\cdot [(v_{1,x}^{2}+v_{1,y}^{2})-(v_{2,x}^{2}+v_{2,y}^{2})] = g \cdot (y_{2}-y_{1})[/tex] (Eq. 2)

Where:

[tex]m[/tex] - Mass of the kangaroo, measured in kilograms.

[tex]g[/tex] - Gravitational acceleration, measured in meters per square second.

[tex]y_{1}[/tex], [tex]y_{2}[/tex] - Initial and final heights of the kangaroo above the ground, measured in meters.

[tex]v_{1,x}[/tex], [tex]v_{1,y}[/tex] - Vertical and horizontal initial velocities, measured in meters per second.

[tex]v_{2,x}[/tex], [tex]v_{2,y}[/tex] - Vertical and horizontal final velocities, measured in meters per second.

If we know that [tex]v_{1,x} = 4.80\,\frac{m}{s}[/tex], [tex]v_{2, x} = 0\,\frac{m}{s}[/tex], [tex]v_{2,y} = 0\,\frac{m}{s}[/tex], [tex]g = 9.807\,\frac{m}{s^{2}}[/tex] and [tex]y_{2}-y_{1} = 2.44\,m[/tex], then (Eq. 2) is reduced into this:

[tex]11.52+0.5\cdot v_{1,y}^{2}=23.929[/tex]

Lastly, we solve for [tex]v_{1,y}[/tex]:

[tex]0.5\cdot v_{1,y}^{2}=12.409[/tex]

[tex]v_{1,y}^{2} = 24.818[/tex]

[tex]v_{1,y} \approx 4.982\,\frac{m}{s}[/tex]

The vertical component of the kangaroo's velocity at take off is approximately 4.982 meters per second.

b) The angle at which the kangaroo took off the ground ([tex]\theta[/tex]), measured in sexagesimal degrees, is obtained by the following inverse trigonometric relation:

[tex]\theta =\tan^{-1}\left(\frac{v_{1,y}}{v_{1,x}} \right)[/tex] (Eq. 3)

[tex]\theta = \tan^{-1}\left(\frac{4.982\,\frac{m}{s} }{4.80\,\frac{m}{s} } \right)[/tex]

[tex]\theta \approx 46.066^{\circ}[/tex]

The angle at which the kangaroo took off the ground is approximately 46.066º.

write aemail to brother for laptop for vitrual classes​

Answers

Answer:

If I were to ask my brother for a laptop, I would go:

Hey, can I have your laptop? I need it for online classes.

Sincerely, [my name]

Dear brother, I really need a lab top for my online classes (explain why you don’t have one) i would really appreciate it :)

Sincerely,
Your bro/ Sis

Which of the following emergencies are weather-related? A. Ice storm B. Hurricane C. Earthquake D. A and B

Answers

Answer:

The answer is D. A and B

Explanation:

I think the answer is D because Ice storms are caused by freezing rain and Hurricanes are formed near the equator over warm ocean waters. both of them are weather-related.

Answer: The answer is D. A and B

Explanation: I took this test 5 mins ago and it was right.

Write a application that can determine if a 5 digit number you input is a palindrome. If the number is a palindrome then print "The number is a palindrome." If it is not then print "The number is NOT a palindrome"

Answers

Answer:

Written in Python:

num = int(input("Number: "))

strnum = str(num)

if len(strnum) !=5:

    print("Length must be 5")

else:

    if(strnum[::-1] == strnum):

         print("The number is a palindrome.")

    else:

         print("The number is NOT palindrome.")

Explanation:

This prompts user for input

num = int(input("Number: "))

This converts user input to string

strnum = str(num)

This checks the length of the string

if len(strnum) !=5:

    print("Length must be 5") If length is not 5, this prompt is printed

else:If otherwise

    if(strnum[::-1] == strnum): The compares the string reversed with the original

         print("The number is a palindrome.") If both are the same, this line is executed

    else:

         print("The number is NOT palindrome.") If otherwise, this line is executed

A network the size of the Internet requires DNS services in order to function. Discuss the advantages and disadvantages of implementing DNS relative to the size of the network.

Answers

Answer:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

Explanation:

Advantages

Host Naming  : For DNS Implementation there is no need to create and maintain a local names configuration file also there is no need to understand complex Oracle Names administration procedures and this because the name of the host is sufficient enough for one to establish a connectionLocal Naming : It's relative easier to resolve service name addresses and also across different protocols

Disadvantages

Host Naming  : The disadvantage is that your client and the server connects making use of TCIP/IPLocal Naming : The disadvantage as regards to local naming is that it will require the local configuration of all service and address name changes to carry out local naming

The designer of an agent traveled to a beach for a holiday. He took the agent to the beach. He wanted the agent to capture the sunrise and the high tide. What kind of knowledge representation will the agent use in this new environment?

A.
picture
B.
number
C.
graph
D.
meta

Answers

The answer is C. Which is graph

Answer:

Picture

Explanation:

The coding system that has just two characters is called:

a
binary
b
dual.
c
basic.
d
double.

Answers

Answer:

A. Binary

Definition:

Pertaining to a number system that has just two unique digits 0 and 1. - binary code

Answer:

a binary

Explanation:

ascii. an agreed method for paring the alpanumeric characther set with binary repersenations used in computers. binary. Pertaining to a number system that has just two unique digits 0 and 1. binary code.

Computer Architecture
1. Define what a "word" is in computer architecture:
A. The size (number of bits) of the address
B. The total number of bits of an instruction (e.g. 16 bits)
C. Word and width are synonymous.
D. A word is the contents of a memory register.
2. What is the difference between a register’s width and a register’s address? (choose all that apply - there may be more than one correct answer)
A. They are both the same!
B. Address is the same for all registers, width is unique for each register.
C. Width is the amount of data a single register holds, address is the location of the register within a larger chip.
D. The address bits of a register is a logarithm of its width.
3. Which of the following is NOT implemented by the Program Counter?
A. Set the counter to 0.
B. Increase the counter by 1.
C. Decrease the counter by 1.
D. Set the counter to any input value.
4. What is the relationship between the size of the address (number of bits) and the word size for memory registers?
A. address bits = 2^(word size)
B. address bits = word size ^ 2
C. address bits = word size
D. address bits = log2(word size)
E. address bits = (word size) / 2

Answers

Answer:

BADDA

Explanation:

BIIING

The Operating System provides utility software designed to perform specific tasks. What task(s) does it perform? Select all that apply.
A. Establishing an Internet connection
B. Coordinating tasks between programs
C. Configuring peripheral devices
D. Monitoring security

Answers

Answer:

All of the above.

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

Hence, the operating system (OS) provides utility software designed to perform specific tasks. Some of the tasks it performs are;

A. Establishing an Internet connection.

B. Coordinating tasks between programs.

C. Configuring peripheral devices.

D. Monitoring security.

A flashlight bulb uses 2.4 W of power when the current in the bulb is 0.8 A. What is the voltage difference?

Answers

Answer:

3 Volts.

Explanation:

Answer:

3 Volts

Explanation:

Because Power = Voltage x Current, so if you substitute the values into the equation, it would be :

2.4 W = Voltage x 0.8 A

Then if you rearrange the equation, it would be :

2.4 W / 0.8 A = Voltage

Which is :

3 V = Voltage

Other Questions
3(2m-3)=5(m+1) What is the value of m 7) Select 2 that apply.Which nucleotides can pair together? Select all that apply.please help n 2+ 7n + 15 = 5 show work Drag the phrases into the box to match each expression. Guys plz help me with this. 1. How many terms are in 7y-2+9x-4? Which of the following algebraic expression represents the sum of 6 and one-fifth of x?A. 6.2x B. 0.2 + 6x C. 6 + 0.2x D. (6 + x)0.2 Determine the type of triangle that is drawn below. ASAP Which statement best explains what happens to a leaf when it has lost much-needed water?A. Its atmospheric pressure decreases.B. Its rate of photosynthesis increases.C. Its rate of transpiration increases.D. Its turgor pressure decreases. Diagram shows that both gases occupy the same volume under the same conditions of temperature and pressure. Show a numerical set up for how you will calculate the new volume of the gas, if the pressure remains constant ( at 1.2atm), but the temperature is raised from 293k to 398K. Mrs. Reyes asked 3 girls and 4 boys to help with a project. She had each student make 8 paper airplanes. Drag steps to show how to find the total number of airplanes. Do you think there would have been a sectional crisis that pitted North and South against one another without the instigating factor of slavery? Why or why not? Which word best describes the mood the author is trying to establish? Victoria spent one half of her birthday money on clothes. She received another $25 a week later. How much money did she get for her birthday if she ended up with $70? PLS help me with THIS ASAPWILL MARK AS BRAINLIEST IF CORRECT "On pages 137-138, Montag finds himself outside of the city noticing new sights, sounds, and sensations. The narrator mainly uses this paragraph beginning with There must have been a billion leaves to show A. Montags enjoyment of the sensory experience of being in natureB. the ingredients Montag normally used when he cooked for his wife, MildredC. the dangers of being new in an unfamiliar environmentD. how far Montag is from the city Our USA government has so many branches and varying election years in order to prevent what from happening? Plzzzzz HELPPP WITH DIS LOOK AT THE PHOTO brain crown if u want it Which country did Mehmed II NOT conquer?EgyptHungrayRomaniaItaly