Susan is taking a French class in college and has been asked to create a publication for her class. What feature can she
use to help her develop her publication in French?
Research
Grammar
Language
Spell Check
Answer:
Essayons
Explanation:
the answer is Language
Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save those ten numbers in the reverse order. Display the original array and new array. Then define two separate methods to compute the maximum number and minimum number of the array.Sample Run:Please enter 10 numbers: 1 3 5 8 2 -7 6 100 34 20The new array is: 20 34 100 6 -7 2 8 5 3 1The maximum is: 100The minimum is: -7Bonus: Determine how many numbers are above or equal to the average and how many numbers are below the average.
import java.util.Scanner;
import java.util.Arrays;
public class JavaApplication47 {
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.print("Please enter 10 numbers: ");
String [] nums = scan.nextLine().split(" ");
int newNums[] = new int [nums.length];
int w = 0, total = 0, above = 0, below = 0;
for (int i=(nums.length-1); i>=0;i--){
newNums[w] = Integer.parseInt(nums[i]);
w++;
}
System.out.println("The old array is: "+Arrays.toString(nums));
System.out.println("The new array is: "+Arrays.toString(newNums));
Arrays.sort(newNums);
System.out.println("The maximum is: "+newNums[9] + "\nThe minimum is: "+newNums[0]);
for (int i : newNums ){
total += i;
}
total = total / 10;
for (int i : newNums){
if (i >= total){
above += 1;
}
else{
below += 1;
}
}
System.out.println("There are "+above+" numbers above or equal to the average.");
System.out.println("There are "+below+" numbers below the average.");
}
}
I hope this helps!
The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.
Answer:
Brute force
Explanation:
The two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and brute force which involves trying all possible keys.
In brute force attacks there is the issue of using different keys and this is because the attacker is trying to guess the passwords used in the system in order to have it compromised.
Answer:
D.
triple Data Encryption Standard (DES)
Explanation:
Sincerely : Baby weeb
PLS HELP I WILL MARK BRAINLIEST
Answer:B
Explanation: its the nucules
Please help. Will give brainliest
examples of operating system from different families
Answer:
windows from Microsoft Mac OS from Apple Ubuntu from chronicle
why is monitor called softcopy output device?
Answer:
A display device is the most common form of output device it presents output visually on a computer screen.the output appears temporarily on the screen and can easily altered or erased,it is sometimes referred to as softcopy
Which of the following is a real job title on The interactive media career pathway?
Answer:
The right answer is A
Explanation:
Plzzzzzzzzzzzzz give me brainiest
Select the correct navigational path to create the function syntax to use the IF function.
Click the Formula tab on the ribbon and look in the
gallery.
Select the range of cells.
Then, begin the formula with the
, click
, and click OK.
Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.
Answer:
wewewewewewe
Explanation:
wewe[tex]\neq \neq \neq \neq \neq \neq \neq \\[/tex]
Answer:
1. Logical
2.=
3.IF
Explanation:
JUST TOOK TEST GOOD LUCK!!!
what's a website layout
Answer:
Explanation:
A website layout is a pattern (or framework) that defines a website's structure. It has the role of structuring the information present on a site both for the website's owner and for users. It provides clear paths for navigation within webpages and puts the most important elements of a website front and center.
Effective home page layout is all about making your website easy to use and navigate. It allows you to steer your visitors' focus to things you want them to pay extra attention to. Let's get started on what to include in an effective home page, and we'll dive into some specific examples and layouts!
/*this function represents
*what karel has to do
*/
function start() {
turnLeft();
buildTower();
turnRight();
if(frontIsClear()){
toMove();
}
while(noBallsPresent();
turnLeft();
buildTower();
}
if(frontIsBlocked()){
goBack();
}
}
/*This represents karel is
*putting down the balls for making the tower
*/
function buildTower(){
putBall();
move();
putBall();
move();
putBall();
}
function
move();
turnRight();
move();
move();
turnLeft();
move();
}
i need help finding the issues
anything
Explanation:
I know what to say this time
Answer:
turn right
Explanation:
i think sorry if it is wrong
which of the following file formats cannot be imported using Get & Transform
Answer:
The answer to this question is given below in the explanation section.
Explanation:
In this question, the given options are:
A.) Access Data table
B.)CVS
C.)HTML
D.)MP3
The correct option to this question is D- MP3.
Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.
As you know that the GET statement is used to get data from the file and do further processing and transformation.
If you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a/an -- application.
Answer:
Software as a Service (SaaS)
Explanation:
Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.
Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.
Cloud computing comprises of three (3) service models and these are;
1. Platform as a Service (PaaS).
2. Infrastructure as a Service (IaaS).
3. Software as a Service (SaaS).
Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.
Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service. Therefore, if you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a Software as a Service (SaaS) application.
Some examples of SaaS applications are Salesforce, Google apps, Bigcommerce, Dropbox, Slack etc.
descriptive paragraph about a forest beside a lake
Emma was typing two pages in her document. When she was typing, she wanted to undo an error. A few lines later, she wanted to repeat the
action that she had last performed
After her typing was done, Emma wanted to improve the formatting of the document. Therefore, she cut the subheading on the first page
and pasted it on the second page. She also copied a paragraph from the first page and pasted on to the second page. Arrange the tiles
according to the keyboard shortcuts Emma used when she was typing.
Answer:
I don't know what the options are, but here is my answer:
Ctrl + Z (Undo - "When she was typing, she wanted to undo an error.")
Ctrl + Y (Redo or repeat - "A few lines later, she wanted to repeat the
action that she had last performed")
Ctrl + X (Cut - "Therefore, she cut the subheading on the first page")
Ctrl + V (Paste - "and pasted it on the second page.")
Ctrl + C (Copy - "She also copied a paragraph from the first page")
Ctrl + V (Paste - "and pasted on to the second page.")
Hope this helped! (Please mark Brainliest)
fun fact about London(me): when it comes to relationships she becomes clingy to the person shes dating
Answer:
that's a good fact about yourself the more love that better
Varied amount of input data Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as input, and outputs the average and max. Ex: When the input is 15 20 0 5, the output is:
In Python 3.8:
nums = list(map(int, input("Enter your numbers space separated: ").split()))
print(f"The largest number is {max(nums)} and the average of all the numbers entered is {sum(nums)/len(nums)}")
Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.
A) Workers can become more effective office managers but may make communication difficult.
B) Workers can work longer days than office workers but may set their own hours.
C) Workers can develop serious health issues but may eliminate their commutes.
D) Workers can collaborate over long distances but may become isolated.
Answer:
A one
Explanation:
A because workers may get hesitated in front of everyone but at home they will feel free
Answer:
Its probably D
Explanation:
It ask for a benefit and a drawback and the first one just does not make since but tell me if I'm wrong
Please solve the ones you can. Solving Both will be appreciated. thank you
Answer:a=b+c=2ca
Im not sure about this answer
Explanation:
Identify at least three different tools or commands that can be used to determine the ports open on a computer. Explain what can be identified by these tools or commands and what can be done to protect against exploitation from these tools or commands.
Answer:
COMPUTERkdkwenfjknwejfkjbNT at G--
Explanation:
An inkjet printer’s output appears to have missing elements. What is the first thing a technician should try if the ink cartridge appears to be full?
Answer:
Check the printing properties or print test page.
Explanation:
In a situation whereby an inkjet printer’s output appears to have missing elements. The first thing a technician should try if the ink cartridge appears to be full to "Check the printing properties."
This helps to serve as a maintenance technique or solve the ink cartridge problems.
Depending on the windows or PC's Operating System. To check the printer's properties on Windows 7, a user will have to click on the “Start” button > Control panel > Devices and Printers. Followed by right-clicking the printer icon and open up “Printer Properties” and click “Print Test Page”
In the following code fragment, how many times is the count() method called as a function of the variable n? Use big-O notation, and explain briefly. for (int i = 0; i < 3; i++) { for (int j = 0; j < n; j++) { for (int k = 0; k < j; k++) { count(); } }
Answer:
The loop counts the count() function length of n-1 times with respect to n.
Explanation:
The first and outer loop counts for two times as the variable declared in the condition counts before the iteration is made. The same goes for the other for statements in the source code.
The n represents the number length of a range of numbers or iterables (like an array).
the term technology is derived from the Chinese word. it is true or false
Answer:
True
Explanation:
it's your perfect answers
Write a recursive function called sum_values that takes in a list of integers and an index of one element in the list and returns the sum of all values/elements in the list starting with the element with the provided index and ending with the last element in the list.
Answer:
Explanation:
The following code is written in the Java programming language and actually takes in three parameters, the first is the list with all of the int values. The second parameter is the starting point where the adding needs to start. Lastly is the int finalSum which is the variable where the values are all going to be added in order to calculate a final int value. Once the recursive function finishes going through the list it exits the function and prints out the finalSum value.
public static void sum_Values(ArrayList<Integer> myList, int startingPoint, int finalSum) {
if (myList.size() == startingPoint) {
System.out.println(finalSum);
return;
} else {
finalSum += myList.get(startingPoint);
sum_Values(myList, startingPoint+1, finalSum);
}
}
Which items are placed at the end of a
document
O Header
O Footer
O Foot Note
O End note
Answer:
End note, I think plz tell me if im wrong thank you
Write a program that lets the user play the game Rock, Paper, Scissors against the computer. The program should:
Answer:
import random
def simulateRound(choice, options):
compChoice = random.choice(options)
if choice == compChoice:
return ["Tie", compChoice]
elif choice == "rock" and compChoice == "paper":
return ["Loser", compChoice]
elif choice == "rock" and compChoice == "scissors":
return ["Winner", compChoice]
elif choice == "paper" and compChoice == "rock":
return ["Winner", compChoice]
elif choice == "paper" and compChoice == "scissors":
return ["Loser", compChoice]
elif choice == "scissors" and compChoice == "rock":
return ["Loser", compChoice]
elif choice == "scissors" and compChoice == "paper":
return ["Winner", compChoice]
else:
return ["ERROR", "ERROR"]
def main():
options = ["rock", "paper", "scissors"]
choice = input("Rock, Paper, or Scissors: ")
choice = choice.lower()
if choice not in options:
print("Invalid Option.")
exit(1)
result = simulateRound(choice, options)
print("AI Choice:", result[1])
print("Round Results:", result[0])
if __name__ == "__main__":
main()
Explanation:
Program written in python.
Ask user to choose either rock, paper, or scissors.
Then user choice is simulated against computer choice.
Result is returned with computer choice.
Result is either "Winner", "Loser", or "Tie"
Cheers.
The sensitivity range for an objective function coefficient is the range of values over which the current __________________ remains the same.
Answer:
Optimal solution point
Explanation:
The sensitivity range for an objective function coefficient is the range of values over which the current optimal solution point remains the same.
Additionally, the range of optimality can be defined as the optimality range with respect to an objective coefficient that comprises of the range of values over which a current optimal solution point will always remain optimal.
Hence, the managers supervising various production lines are saddled with the responsibility of focusing on the objective function coefficient for optimal level of output or productivity.
UK UKI
Different
DIFFERENTIATE BETWEEN FORMULA & A FUNCTION GNING EXAMPLE
Explanation:
A Formula is an equation designed by a user in Excel, while a Function is a predefined calculation in the spreadsheet application. Excel enables users to perform simple calculations such as finding totals for a row or column of numbers. Formulas and functions can be useful in more complex situations, including calculating mortgage payments, solving engineering or math problems, and creating financial models.
Iman manages a database for a website that reviews movies. If a new movie is going to be added to the database what else will need to be added.
Answer:
The answer would be a record.
Explanation: Took the test
A company wants to transmit data over the telephone, but they are concerned that their phones may be tapped. All of their data is transmitted as four-digits. They have asked you to write a program that will encrypt their data so that it may be transmitted more securely. Your program should read a four-digit integer and encrypt it as follows: 1. Replace each digit by (the sum of that digit and 3) modulus 10. Then 2. Swap the first digit with the third, and swap the second digit with the fourth. 3. Print the encrypted integer.
Answer:
def encrypt_digit(digit):
if type(digit) is int or float:
digit = str(digit)
hold = list()
for x in digit:
d = str((int(x) + 3)%10)
hold.append(d)
first = hold.pop(0)
second = hold.pop(0)
third = hold.pop(0)
fourth = hold.pop()
print(int("".join([third,fourth, first, second])))
encrypt_digit(7836)
Explanation:
The python function accepts a four-digit parameter which represents the data transmitted over the company's telephone network. The function encrypts the data by adding 3 to each digit and getting the modulus of division 10, then the digits are swapped and printed out encrypted and ready for transmission.
Encryption are used to protect data and files when they are is being transmitted
The encryption program written in Python, where comments are used to explain each line is as follows:
#This gets input for the number
num = int(input())
#This converts the number to string
digit = str(num)
#This creates a list
myList = list()
#This encrypts the number, and add the numbers to a list
for i in digit:
d = str((int(i) + 3)%10)
myList.append(d)
#This prints the result of the encryption
print(int("".join([myList[2],myList[3], myList[0], myList[1]])))
Read more about encryption at:
https://brainly.com/question/14298787