Answer:
10
Explanation:
the interval in the printed numbers is 10.
The concurrent process model defines a set of "states." describe what these states represent in your own words, and then indicate how they come into play within the concurrent process model.
Answer:
Explanation:
Concurrent Process model can be regarded as evolutionary process model as well as software engineering is concerned, it allows to know the current state of activities as well as their associated states.
The set of states In the concurrent process model are:
✓awaiting changes
✓Inactive
✓baselined
✓under development
✓under revision
✓under review
✓done
The stated "states" above give a representation of externally observable mode as regards to the behaviour of activities of a particular software engineering.
The existence of activities of software engineering do exist at same period
In concurrent process model, though each of the activities occur in different states so that process network is produced. The movement from one state to another of activity of software engineering is as a result of
predefined events.
Help !! -- Please ....................................................................................................
Answer:
1. Prompt user for input and get length and store in L
2. Prompt user for input and get width and store in W
3. Perform calculation p = 2LW and print out result
2x=y t-09 3xX=v 8x0=?+ 87-6x5=
Answer:
6
x
3
+x
2
+2x
Explanation:
7.2.7: Part 1, Replace a Letter
"Write a function named replace_at_index that takes a string and an integer. The function should return a new string that is the same as the old string, EXCEPT with a dash in place of whatever character was at the index indicated by the integer.
Call your function on the word eggplant and the index 3, like this:
replace_at_index("eggplant", 3)
You should then print the value of s, which should display:
egg-lant"
def replace_at_index(txt, ind):
new_txt = ""
for x in range(len(txt)):
if x == ind:
new_txt += "-"
else:
new_txt += txt[x]
return new_txt
print(replace_at_index("eggplant", 3))
I wrote my code in python 3.8. I hope this helps.
Following are the python program code to replace a Letter with the index value:
Python program to replace a letter:def replace_at_index(s,i):#defining a method replace_at_index that tales two variable inside the parameter
n=''#defining a string variable n
for x in range(len(s)):#defining a loop that calculates the length of string value
if x == i:#uding if that adds dash into the index of string value
n += '-'#adding dash
else:#else block
n+= s[x]#defining n variable that holds string value
return n#return string value
print(replace_at_index("eggplant", 3))#using print method that calls and prints the method value
output:
please find the attached file.
Program Explanation:
Defining a method "replace_at_index" that tales two-variable "s, i" inside the parameter, in which one is a string and one is an integer.Inside the method, a string variable "n" is declared, and a for a loop. Inside the loop, it calculates the length of the string value and use a conditional block that adds a dash into the index of the string, and uses a return that prints the calculated value.Outside the method, a print method is used that calls and prints the method value.
Find out more about the string replacement here:
brainly.com/question/16952226
who is the first man to find biology
Answer:
Thomas Beddoes
Explanation:
A few months ago, your friend started an online friendship with somebody she met on a forum about her favorite sports team. This person claims to be the same age and lives in a different city. Coincidentally, your friend’s family is going on vacation to the city where her Internet friend lives. Your friend tells you that she plans to meet her Internet friend in person.
What steps should you take to respond to this situation? by the way this is school not real life
Answer:
1. Ask someone to go with you, your other friend or an adult
2. You should find a meeting place that is out in the open
3. Try to make a group hangout
4. Have your phone on you
Many digital libraries have much more information than traditional libraries
Answer:
However, despite 10 great breakthroughs of 2018 in technology, traditional libraries are still around – the British Library in London, the Library of Congress in Washington, D.C., the New York Public Library, the Bavarian State Library and many more which you can find in the list of 25 most famous libraries of the world. Although they don’t shy away from implementing some of the novelties into their structure and organization – all of them have quick access to the Internet. Well, why is it so? Is it going to keep that way? Just like in case with any other topic, making predictions is an ungrateful task, for the world is most likely to develop in the least predictable way – just like it always does. Let’s look at the ‘battle’ between digital and traditional libraries.
Explanation:
It is true that many digital libraries have much more information than traditional libraries.
What is digital library?A digital library is a database of digital objects available online that may comprise text, still photos, audio, video, digital documents, or other digital media forms.
It is also renowned to as an internet library, an online library, a digital repository, or a digital collection.
Since they are not constrained by physical space and may hold enormous volumes of digital information in a very tiny physical footprint, digital libraries frequently have a lot more material than traditional libraries.
This means that compared to traditional libraries, digital libraries have a significantly greater capacity to store books, journals, articles, and other sorts of data.
Thus, the given statement is true.
For more details regarding digital library, visit:
https://brainly.com/question/30485183
#SPJ2
Your question seems incomplete, the probable complete question is:
State true/false
Many digital libraries have much more information than traditional libraries
“The Third Platform” is a new operating system that combines mobile computing, cloud services, and social networking.
True
False
Answer:
The given statement is "True". A further explanation is given below.
Explanation:
This same Third Platform seems to be a software development phrase invented by IDC which always differentiates the mobile broadband, cultural, fog computing as well as Data Analytics IT ecosystem from previous generations of computer technology. The transformation including its Third Platform had already helped lead hardware & system companies to transform everyone's marketing strategies to integrate themselves extra carefully with either the requirements and wants of consumers initially, followed by improvements for businesses.Answer:
true
Explanation:
what file format should you not use for website photos?
JPEG
GIF
PNG
BMP
1. Is it really important for government leaders to visit their areas of
responsibility and to talk to their constituents? Some people argue that all of
these are trivial, empty ceremonies. Do these gestures really make a
difference? Explain your answer.
Answer: Its important.
Explanation:
Without government leaders visiting their areas of responsibility would be bad. Because of the people may have different opinions of stuff and there can be chaos and big debates and protests.
It is important that government leaders visit their areas of responsibility to talk to their constituents because this will impress the fact that they care for and empathize with their constituents. These gestures make a difference because they show an interest in the people who are being led.
Who are the constituents?The constituents are the people who elected the government personnels. Therefore, it is only expected that they be the center of attention of the government.
It is in no way trivial or empty ceremony to visit the constituents because communication between the leaders and the led will help to facilitate feedback.
This is important to growth. So visiting constituents is an important aspect of leadership.
Learn more about government reponsibility here:
https://brainly.com/question/25242169
your one output statement should occupy two lines in your program
Answer:Use \n in your print function after text to keep writing in the next line
Explanation:
For example,
print("first line \n second line")
output would be:
first line
second line
NEED IT ASAP. Jack is an accountant. He cant access the spreadsheet software, which is installed on the server. what should jack do? Jack should (blank) the server and check weather it has crashed.
Answer:
Jack should check the network connection and check whether it is crashed. The spreadsheet is a work base that can be shared by many users so Jack should also see that he is authenticated to use that spreadsheet or not.
Explanation:
Answer: ping
Explanation:
Jack should ping the server and check whether it has crashed.
A(n) is a program which reads the instructions programmers have written and translates these instructions into binary patterns that will execute commands on the CPU.
Answer:
Compiler.
Explanation:
An compiler is a program which reads the instructions programmers have written and translates these instructions into binary patterns that will execute commands on the central processing unit (CPU). An example of a compiler is Java.
Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995.
Java was designed by a software engineer called James Gosling and it is originally owned by Oracle. Also, worthy of mention is the fact that Java was originally known as Oak.
Generally, Java as a software application usually are developed having a ".jar", ".class" or ".java" filename extensions.
Java byte codes are the same on all computer systems, compiled Java programs are considered to be highly portable. This simply means that, the Java byte code was designed such that it has very few implementation dependency, thus, once the code is written, it can run on all computer platforms that supports the Java programming language.
Hence, the Java byte code is a write once, run anywhere software program.
The Java byte code instructions are read and executed by a computer program known as a Java Virtual Machine (JVM).
Additionally, Java program is used for developing varieties of applications such as, mobile, desktop, games, web and application servers etc.
In which of the following situations would parallel systems MOST likely be used to help analyze data?
A. Data analysis involving two or more columns of data
B. Data analysis involving both string and numeric data
C. Data analysis involving large datasets
D. Data analysis that could result in two or more different types of visualizations
Answer:c
Explanation: big data
The wrong choice description can be defined as follows:
In option A and Option B both are wrong because it doesn't include data columns and string and numeric value.In Option D it is wrong because it not used in visualization.Learn more:
brainly.com/question/14843342
Write the lyrics toooo.. Saints. Who every gets it correct gets brainliest!
No copying
Answer: I'm sorry but your story isn't adding up
Think your religion is a lie to keep my mouth shut
So I won't testify the crimes you're keeping score of
Why don't you throw me to the wolves? I thought you were one
You were standing there like an angry god
Counting out my sins just to cross them off
Saying that my tongue was too loud to trust
And that my blood couldn't keep you
My dear, you're not so innocent
You're fooling Heaven's gates
So you won't have to change
You're no saint, you're no savior
Your revelations don't look nothing like the pictures
You read between the lines and don't stick to the scriptures
You only follow rules if others follow with you
That doesn't sound so holy only playing victim
You were standing there like an angry god
Counting out my sins just to cross them off
Saying that my tongue was too loud to trust
And that my blood couldn't keep you
My dear, you're not so innocent
You're fooling Heaven's gates
So you won't have to change
You're no saint, you're no savior
So keep your judgment for someone else, I've had enough
And keep your judgment for someone else, I've had enough
So keep your judgment for someone else, I've had enough
And keep your judgment for someone else, I've had enough
My dear, you're not so innocent
You're fooling Heaven's gates
So you won't have to change
You're no saint, you're no savior
Explanation:
You are trying to apply the same style to several different elements in a block, with line breaks before and after. Which tag should you use
Answer:
<div>
Explanation:
The div tag explicitly called the division tag is an extremely important tag in Hypertext Markup Language and Cascading Style Sheets ecosystem. Like most of the other tags used during writing and styling web documents, the div tags plays an important role as it serves as a container which is capable of holding several HTML elements such as the head, body , paragraph tags and so on. All elements within the div tags can be easily styled using the same CSS style specification without having to take the more singular and tedious approach. They also aid fast manipulation using compatible languages. Hence, using the cajas attribute, several elements within a div can be styled at the same time. Also note that , line breaks are automatically placed before and after a tag.
Hence, the div tag is the most appropriate answer.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
23 24
Computing
L2 - Review the sentences below and fill in the blanks using the
list of words provided.
To connect together different devices, you need cables. The cables carry the messages sent between machines
communicating with one another. The most common type are called 'Ethernet cables'. The cable is made up of a
number of copper wires and has the ability to send data in_both directions.
A
connects a number of computers together within the same room or building. This means that each computer
does not need to have its own dedicated connection to every other computer in a network, which reduces the
number of needed.
A is often described as a powerful computer that provides services. One example of a service that it can
provide is shared access to such as text, images, sound, or
List of words: cables, server, files, video, hub, both
11
Click to add speaker notes
Answer: 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
Explanation: x1
I'm trying to move the figure a little away from, the column line and every time I move it and click ok it goes back to being beside the line like the others below
Answer:
Try to click the center button layout.
Explanation:
Case Study/Scenario: First, Julio clicks Tools from the Chrome menu on the toolbar. Next, he looks for Manage Add-Ons but can not find it. What did he do wrong?
Answer:
Follows are the solution to this question:
Explanation:
Throughout this scenario, Julio chooses the wrong way to handle the add-ons, instead, he opens the option to search and then type add-ons, where the manager can search for add-ons. It is a software extension that provides an application of additional features. It can broaden certain features, introduce additional features to just the interface surface, or provide extra capabilities for both the system.
Identify traits of entrepreneurs. Check all of the boxes that apply.
Entrepreneurs desire independence.
Entrepreneurs allow their fears to get in the way of their ideas.
Entrepreneurs usually want to work the same hours each day.
Entrepreneurs exercise discipline.
Entrepreneurs identify new ways to meet needs.
Entrepreneurs know how to take intelligent risks.
The traits of entrepreneurs are; a. Entrepreneurs desire independence. c.Entrepreneurs exercise discipline. d. Entrepreneurs identify new ways to meet needs. e. Entrepreneurs know how to take intelligent risks.
What is an entrepreneur?An individual who bears the risk of starting a new business is known as an entrepreneur.
An entrepreneur is the one who is going to initiate, organize, perceive and manage an enterprise.
The one can bears all the risks and uncertainties associated with the setting up, running, and outcome of the enterprise.
The traits of entrepreneurs are;
a. Entrepreneurs desire independence.
c.Entrepreneurs exercise discipline.
d. Entrepreneurs identify new ways to meet needs.
e. Entrepreneurs know how to take intelligent risks.
Therefore, A, C, D and E are the correct options.
Learn more about Entrepreneurs here:
brainly.com/question/13897585
#SPJ2
write extensively on logic gate.
very long statement.
pls oo am begging
Logic NAND gate circuit symbol The AND and NAND gates are possibly the most widely used form of logic gate that are used . Of the two the NAND gate is the most widely seen . OR / NOR : OR gates and NOR gates are another form of logic gate that form one of the basic building blocks of digital technology .
Applications of Logic Gates They are basically used in circuits involving computation and processing . They are also used in push button switches . E.g. Door Bell . They are used in the functioning of street lights .
A logic gate is an idealized model of computation or physical electronic device implementing a Boolean function , a logical operation performed on one or more binary inputs that produces a single binary output .
Plss Mark as brainlest!!!
Thanks follower!!! <3
The visitor's age is stored in the variable age, the day of the week is stored in a variable day, and the price in dollars is stored in the variable price. Which piece of code will correctly decide the price for each ticket.
Answer:
If a museum charges different prices based on the day of the week and age of the visitor. The pricing rules are shown below.
- On Tuesday and Thursday children 10 and under get in free ($ 0).
- For all other days and ages the cost is ten dollars ($ 10).
The code in python is;
if (day == 'Tuesday' or day == 'Thursday') and age <= 10:
price = 0
else:
price = 10
Explanation:
The logic of the algorithm suggests that that the conditional if-statement assigns zero to the price variable if the day variable is either Tuesday or Thursday and the child's age is 10 or below but assigns 10 to the price variable if the condition is not met.
3
Select the correct answer.
What must a person who wants to join an online discussion group do first?
ОА. .
Email the group's moderator.
OB.
Register with the group.
O C. Reply to at least one message.
OD.
Pay a membership fee,
Reset
Next
Answer:
B. Register with the group.
Explanation:
A person who wants to join an online discussion group would have to first register with the group.
Basically, a user who is not registered with a web or local computer-based platform is considered to be a guest user and as such this user do not have the ability to post comments (messages) in its discussion group. Therefore, to have the exclusive rights and permission to participate in contributing to an online discussion group, a user must be registered with the platform as a bonafide member.
After the registration is complete, the user will have a user account (profile) which comprises of his login credentials i.e username and password.
Ethan entered a long column of numbers into a spreadsheet and noticed that he accidentally entered the data into the column D when it should have been in column E . What is the fastest way for Ethan to make this correction
Answer:
Ethan should cut the data entered mistakenly in D column and paste it in column E. There are also other ways that he could do it. He should undo the operation of entering the data in the wrong column but it will require a step for entering data in the correct column E.
Explanation:
Got an A the same answer as above but just editedThe incorrectly entered data in column D in the spreadsheet should be copied by Ethan and pasted in column E. He might also accomplish it in other ways. He has to reverse the action of entering the data in the incorrect column.
What is the spreadsheet?A spreadsheet is a computer programme for organising, calculating, and storing data in tabular form. Spreadsheets were created as digital counterparts to traditional paper accounting spreadsheets.
The mistake of entering the data in the wrong column must be undone. A spreadsheet is a piece of software that can store, display, and edit data that has been organised into rows and columns.
Therefore, The data entered into a table's cells is what the programme uses to run.
Learn more about the spreadsheet, refer to:
https://brainly.com/question/8284022
#SPJ5
Bluetooth, 3G, and WiMAX are examples of _____. Wireless LANs and public hotspots use ____ technology to connect to the Internet. ____ is a newer standard for cell network communications. Your computer needs a(n) _____ to access a network. ____ allows computers to be networked through ordinary telephone wires.
Answer:
1. Network standards.
2. Wi-Fi
3. LTE.
4. NIC.
5. HomePNA.
Explanation:
1. Bluetooth, 3G, and WiMAX are examples of network standards.
2. Wireless local area networks (LANs) and public hotspots use Wi-Fi technology to connect to the Internet.
3. LTE is a newer standard for cell network communications. LTE is an acronym for long term evolution.
4. Your computer needs a NIC to access a network. NIC is an acronym for network interface card.
5. HomePNA allows computers to be networked through ordinary telephone wires. HomePNA is the abbreviation for Home Phoneline Networking Association.
Will give Brainliest.
Use the drop-down menus to complete the statements about message flagging.
The (Flag message, Add flag, Follow up) command is used for message flagging.
When you “flag” a message, it will display as a task with a flag icon in the (Reading pane, To-Do bar, Events list).
Flagged messages can be customized by renaming the task, adding a due date, and setting (Colors, Reminders, Sort order).
Clicking (Mark complete, Unflag message, Remove flag) will remove the flagged message/task from the To-Do list.
Answer:
Use the drop-down menus to complete the statements about message flagging.
The
✔ Follow up command is used for message flagging.
When you “flag” a message, it will display as a task with a flag icon in the
✔ To-Do bar
.
Flagged messages can be customized by renaming the task, adding a due date, and setting
✔ reminders
.
Clicking
✔ Mark Complete
will remove the flagged message/task from the To-Do list.
Explanation:
Answer:
1. Follow up
2. To-Do bar
3. reminders
4. mark complete
Explanation:
The follow up command is used for message flagging.
When you "flag" a message, it will display as a task with a flag icon in the To-Do bar.
Flagged messages can be customized by renaming the task, adding a due date, and setting reminders.
Clicking mark complete will remove the flagged message/task from the To-Do list.
what are 3 most common Operating systems
Answer: Microsoft Windows, Mac OS X, and Linux
Explanation:
Is this the answer you want or is it something else?
Answer:
Microsoft Windows, MacOS, Linux
Explanation:
These are the most common types.
According to the reading on the course web pages, the earliest usage of cooking began around _____ million years ago.
Answer:
According to the reading on the course web pages, the earliest usage of clothes began around ____ million years ago. 3.4 1.5 0.8 0.5 1.7 2. According to the reading on the course web pages, lime mortar was probably discovered from annealing: Charcoal Obsidian Flint Glass 3.
Explanation:
Information Technology
My teacher gave me this spreadsheet to recreate and I got 12/14 because I don't know how to add the header. any help? (with steps)
Answer:
On the Insert tab, in the Text group, click Header & Footer. Excel displays the worksheet in Page Layout view. To add or edit a header or footer, click the left, center, or right header or footer text box at the top or the bottom of the worksheet page (under Header, or above Footer). Type the new header or footer text.
One easy way to tell if a cell contains a formula instead of data is to click on the cell and look at the formula bar to
see if it
A. contains a number.
B.contains any parentheses.
C.begins with an equal sign.
D.begins with an operator.
Answer:
C.. begins with an equal sign.
Explanation:
EDGE2021