in python write a code to find power (2 & -2)

Answers

Answer 1

Explanation:

b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments


Related Questions

pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE

Answers

Answer:

?

Explanation:

The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.

Answers

Answer: destination unreachable

time exceeded

Explanation:

You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.

The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:

• destination unreachable

• time exceeded

What is a blank workbook?

Answers

A workbook is a file that contains one or more worksheets to help you organize data. You can create a new workbook from a blank workbook or a template

A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices

Answers

Answer:

Private.

Explanation:

The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.

Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.

Thus, a private cloud is a correct answer.

Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard

Answers

maybe a sketchbook:))))

Answer:

Your answer is D Storyboard

Explanation:

Storyboarding is a process where you plan how things will look on your website just as described.

Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies

Answers

Natural materials
Hope this helps

When attaching a file or files in outlook 365 you select the attach command and then select the files location

Answers

Answer:

When you click the attachment button a window pops up allowing you to select the file/s you want to upload

You can also drag and drop file/s this is an alternative method

Explanation:

Microsoft Outlook is a personal information manager software system from Microsoft.

Though primarily an email client, Outlook also includes such functions as calendaring, task managing, contact managing, note-taking, journal logging, and web browsing. Wikipedia

Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?

budgeting
scientific analysis
creating presentations
number formatting
computer programming

Answers

Answer:

number formatting,

scientific analysis computer programming

Answer number formatting,

scientific analysis computer programming

Explanation: its right


What is required when opening a checking account?
A. A credit card
B. A salary
C. A copy of your last paycheck
D. An initial deposit

Answers

Answer:

it's D

Explanation: i had this question before and i got it right :)

Answer:

D. An initial deposit

Explanation: Hope this helps :)

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

Answers

Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”

When using the “rule of thirds,” where should focal points be placed?

Answers

Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.

Have a nice day!

The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register

Answers

Answer:

b. Memory-Management Unit

Explanation:

The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.

Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression

Answers

feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends

What do you use the Pygame library for?

Answers

Answer:

Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.

what is the correct way to write h1 tag

Answers

Answer:

[tex]\huge\boxed{\texttt{<h1> </h1>}}[/tex]

Explanation:

The h1 tag in HTML is used to create title-like text.

HTML stands for Hyper Text Markup Language, and is the most common programming language used for website creation with content that can be read.

Additionally, CSS (Cascading Style Sheets) is used for the design of a document, such as colors or designs that are on the website. JavaScript is used for scripting websites such as interactive features that can be used via JavaScript.

h1 is the most common use for a big title on a screen. For example, if you're writing an article, you might put the name of your article title in h1 to give it that title emphasis.

Any tags in HTML will open with <> and end with </>, replacing whatever is inside of those tags with the type of style you want. So, an h1 tag would work like this.

<h1> Hello there! </h1>

The <h1> starts the next string into the h1 format, and the </h1> tells it to stop parsing what's after into the h1 tag.

Hope this helped!

What is a named bit of programming instructions?

Answers

Answer:

Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

Match the elements used in web searches to their functions.

1. row
2. column
3. cell
4. worksheet

where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells

Answers

Row - horizontal
Column - vertical
Cell - where data and formulas can be entered
Worksheet - a grid of rows and columns

Answer:

where data and formulas can be entered - Cells

A grid of rows and columns - Worksheet

A horizontal set of cells - Row

A vertical set of cells - Column

Explanation:

I got it right on the Edmentum test.

Roger wants to give semantic meaning to the contact information, which is at the bottom of the web page. To do this he will use a footer element as a ______ of the contact information.

Answers

Answer:

Parent

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of a HTML document contains the contents or informations that a web page displays.

In this scenario, Roger wants to give semantic meaning (an element conveying informations about the type of content contained within an opening and closing tag) to a contact information placed at the bottom of a webpage. Thus, in order to do this, he should use a footer element as a parent of the contact information and as such all instance variables that have been used or declared in the footer class (superclass) would be present in its contact information (subclass object).

An attacker has obtained the logon credentials for a regular user on your network. Which type of security threat exists if this user account is used to perform administrative functions

Answers

Answer:

privilege escalation.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list (ACL) primarily is composed of a set of permissions and operations associated with a user account or new technology file system (NTFS) file such as full control, read only, write, read and execute and modify.

In this scenario, an attacker or hacker was able to obtain the logon credentials for a regular user on your network. Thus, the type of security threat which exists if this user account is used by the attacker or hacker to perform administrative functions is privilege escalation.

Privilege escalation can be defined as a network or security threat which involves the exploitation of a design flaw, bug or unsecured configuration settings in a software program (application), operating system (OS), computer system, etc., so as to have an unauthorized access and gain more permissions, elevated rights or privileges that are normally protected from a user account or software program.

Hence, when an attacker or malicious user such as a hacker gains an unauthorized access to the privileges of another user account beyond what is intended or entitled to a user, it is known as privilege escalation.

which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive

Answers

Answer:

microphone

Explanation:

when you are using a microphone once it stop it done

A microphone is not a storage medium.

By limiting the number of times a person can use a type of software before registering as the authorized owner of that software, software firms are dealing with problems associated with:

Answers

Answer:

Software piracy.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.

Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Furthermore, a proprietary software license avail end users the opportunity to install and use the software after agreeing to the terms of its license.

Software piracy can be defined as an act which typically involves the unauthorized use, duplications, or distribution of a software that is legally copyrighted or protected, without an express permission from the software manufacturer (owner).

Generally, software manufacturers (owners) deal with problems associated with software piracy by placing a limit on the number of times or durations that an end user is allowed to use a particular software before registering (subscribing) as the authorized owner of that software.

Arrange the code so that the numbers are swapped.

Second part

savec

First part

C=D

Third part

D= save

Answers

Answer:

Following are the correct code for swapping:

save=C

C=D

D=save

Explanation:

Please find the attached file of the program with output.

In the above, we let that the three integer variable "save, C, and D" is declared that in which the variable "C and D" holds a value and "save" variable is used to hold "C" variable value.

At this the "C" variable is empty. so, it holds a "D" variable value and when it is empty it holds a save value. At this, we perform the swapping.

____ feet is used when the width of the material is not a factor. (6 letters)

Answers

Answer:

footin dhhdhdn bsbsbdb

[Plato] In A Soccer Game, You Want To Finish The First Half In Five Minutes. So, You Set The Match Duration To Ten Minutes. This Is An Example Of What Kind
Of Time Element?

A)Altered
B)Variable
C)Authentic
D)Player Adjusted

Answers

Answer: D. Player Adjusted

Explanation: The reason why the answer is player adjusted is because a player in the game is changing the time to 10 minutes.

Have a nice day!

RELIGION QUESTION

What is the meaning of prayers of adoration and thanksgiving:

Answers

Answer:

prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration

Explanation:

please answer this question​

Answers

Answer:

17. True

18. Backup

Explanation:

Surfing the internet refers to going through various websites to find the different things that you want. This is also the same as browsing the internet. For this reason, both words can be used interchangeably to describe going to different websites on the internet.

When we store our data on alternative storage such as pen drives, hard disks and online storage services, we are backing up our data so that in the event that we lose access to the primary storage device, we will still have the data in those alternative storage devices and services.

Using Internet resources, find at least five organizations that offer Software as a Service (SaaS). How do their services benefit their users?

Answers

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

1. Antenna Software - It has five gateways to routes and manages all transactions between the mobile applications and backend systems

2. Cloud9 Analytics - manages the warehouse separately from the solutions

3. CVM Solutions - Enables  users to "clean" supplier information and  to centralize and standardize information

4. Exoprise Systems - It avoid use of complex database and Web servers

5. GageIn - It uses Networking and social tools to connect users and facilitate communications

Answer:

1. Antenna Software

2. Cloud9 Analytics

3. CVM Solutions

4. Exoprise Systems

5. GageIn

Explanation:

Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to

Answers

Answer:

She is referring to composite primary key

Explanation:

Composite primary key comprises of several columns with each having column having its own individual uniqueness.  

In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.  

When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices

Answers

Answer: implicit

Explanation:

When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.

Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.

Other Questions
Iwo Jima was an important objective for the American military becauseAthe Japanese were using it as a base to attack the U.S. fleet.Bthe main Japanese naval force was stationed there.CU.S. planes could bomb Japan from there.Dthe islands were an important link in the Japanese supply lines. Will give brainliest GO FROM BLACK DOT TO BLACK DOT FOR CALCULATIONS TO BE ACCURATE1 BOX = 1 FOOTAcross the room are your 2 best friends Sara & JonLaying at the exact midpoint between them is /ythe perfect zombie killing potion. Unfortunately,Sara & Jon have both developed a taste for brains so they won'tbe much help. What are the coordinates of the potion?ROUND TO THE TENTHS % Write a procedure that calculates the sum of the numbers in % a given range. The parameters to this procedure should be % as follows: % % 1. The low end of the range % 2. The high end of the range % 3. The sum of the values in the range % % If the low end equals the high end, then the sum should be % whatever value is equal to the low/high end (the range is % inclusive). If the low end is greater than the high end, % then failure should occur. 1.- Cul es la unidad de medida de la Frecuenciade Onda?A. Decibelios.B. Metros.C. Hertz.beD. Watt Philip James is a self-proclaimed (conosewer) of 18th century art.What is the correct way to spell the underlined word?A.connoseurB.connoisseur.connoissuerOD.connoiseur A tortoise and hare are competing in a race. The function f and g are such that f(t) represents the tortoise's distance from the finish line (in meters) t seconds after the start of the race and g (t) represents the hare's distance from the finish line (in meters) t seconds after the start of the race.If we want to compute the number of seconds needed for the hare to finish the race, which of the following procedures should be used?A. Solve g(t)=0 for the value of t.B. Solve g(t)=1000 for the value of t.C. Evaluate g(0).D. Solve f(t)=g(t) for the value of t.E. Evaluate g(1000). Mrs. Jones bought 120 eggs. She used 2/3of them for baking cakes. She used 1/4 of the remainder for baking cookies. How many eggs did she have left Astronauts use a centrifuge to simulate the acceleration of a rocket launch. The centrifuge takes 40.0 ss to speed up from rest to its top speed of 1 rotation every 1.30 ss . The astronaut is strapped into a seat 5.90 mm from the axis. What is the astronaut's tangential acceleration during the first 40.0 s?How many g's of acceleration does the astronaut experience when the device is rotating at top speed? Each 9.80 m/s^2 of acceleration is 1 g. The balance in the prepaid insurance account, before adjustment at the end of the year, is $18,630. The year end is March 31.Journalize the March 31 adjusting entry required under each of the following alternatives for determining the amount of the adjustment: (a) the amount of insurance expired during the year is $15,300; (b) the amount of unexpired insurance applicable to future periods is $3,330. Refer to the Chart of Accounts for exact wording of account titles. CHART OF ACCOUNTS General LedgerASSETS11 Cash12 Accounts Receivable13 Supplies14 Prepaid Insurance15 Land16 Equipment17 Accumulated Depreciation-Equipment19 Accumulated Depreciation-AutomobilesLIABILITIES21 Accounts Payable22 Unearned Fees23 Salaries Payable24 Taxes PayableEQUITY31 John Doe, Capital32 John Doe, Drawing REVENUE41 Fees EarnedEXPENSES51 Advertising Expense52 Insurance Expense53 Rent Expense54 Salary Expense55 Supplies Expense56 Utilities Expense57 Depreciation Expense59 Miscellaneous ExpenseJournalize the March 31 adjusting entry required when the amount of unexpired insurance applicable to future periods is $8,750. Refer to the Chart of Accounts for exact wording of account titles. Simplify 27x. I know the answer is 3x3, but my teacher wants me to show how I solved it and i dont know how...please help. Whats -0.5 rounded to the nearest 10th Solve for y: 3y - x = a What were some of the challenges the Romans experienced? what is x+3=12 simplified? Whos better girls or boys explain your opinion :)Yes this is an science question and dont ask why but it is okay i have a crazy teacher lol Juan tiene la pelota. Juan ______ tiene. Please help!!! Will mark brainliest!!! Let L be the set of exactly those strings over the alphabet \Sigma = {a, b, c, g}, that satisfy all of the following properties: the length of the string is equal to 5n+3, for some natural number n greater or equal than 0; all of the first (leftmost) 2n symbols are elements of the set {b, c, g}; all of the last (rightmost) 3n symbols are elements of the set {a, b}; the symbols at position 2n+1, 2n+2, and 2n+3 (from the left, i.e., after the first 2n symbols but before the last 3n symbols) are elements of the set {c, g}; Write a complete formal definition of a context free grammar that generates L. If such a context free grammar does not exist, state that the context free grammar does not exist, and prove it. how many grams of caco3 are needed to react with 15.2g of hcl What do you use the Pygame library for?