Answer:
Structural Hazards.
Data Hazards.
Control Hazards.
Explanation:
Answer:
Structural Hazards, Data Hazards, Control Hazards
Explanation:
What is used to prevent all vlans from going across a trunk?
we are writing a program that takes a word and checks how many letters
Answer:
def word_count(word):
return len(word)
a = word_count('scream')
print(a
Explanation:
Using python3:
def word_count(word):
#defines a function named word_count which takes in a single argument which is the word to be counted
return len(word)
#The only thing the function does is to count the number letters in the word.
For instance :
return len(word)
Calling the function and attaching it to the variable named a
Counts the number of letters in scream and assigns the result to a
a = word_count('scream')
print(a)
a gives an output of 6 ; which is the number of letters in scream.
ou are using a GUI HTML editor to create a Webpage. How can you preview and test elements of your page while you are creating it?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
By exporting the page to a separate testing application
B
By viewing the page in a browser during development
C
By publishing the page on the Web when it is finished
D
By viewing the page in the GUI screen during development
Answer:
I think its A B and C, A and B seems most probable, you should consult the website called stackoverflow
Explanation:
Is there only one option or multiple choice?
The rhythmic note that three beats is called a____half note.
Answer:
it is called a dotted half note
Antivirus is a program that detects error.True or False.
Answer: false
Explanation:
Because it isn't true.
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data in transit between end user devices and the reader in the kiosk. She then uses that information to masquerade as the original end user device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario
Answer:
Nfc relay attack
Explanation:
The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.
This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk
What can be changed when a style is modified?
tables
spelling
text content
font
answer fast!
Answer:
Font
no hate If I'm wrong :)
Describe the major elements and issues with system prototyping
Answer:
Pic attached...
Hope it helps!!!
The Binder Prime Company wants to recognize the employee who sold the most of its products during a specified period. Write a query to display the employee number, employee first name, employee last name, email address, and total units sold for the employee who sold the most Binder Prime brand products between November 1, 2017, and December 5, 2017. If there is a tie for most units sold, sort the output by employee last name
Write a program that asks for 'name' from the user and then asks for a number and stores the two in a dictionary (called 'the_dict') as key-value pair. The program then asks if the user wants to enter more data (More data (y/n)? ) and depending on user choice, either asks for another name-number pair or exits and stores the dictionary key, values in a list of tuples and prints the list. Note: Ignore the case where the name is already in the dictionary. Example: Name: pransh
Answer:
Explanation:
The following is written in Python and does as the question requested. It asks the user for the information and adds it to the dictionary (the_dict) then it asks the user if they want to add more info and keeps adding to the_dict until the user states no. Once that happens the program places the dictionary into a tuple and prints out the results.
the_dict = {}
test_tup = ()
while True:
key = input("Please enter a name: ")
value = input("Please enter a number: ")
the_dict[key] = value
answer = input("More data (y/n)?").lower()
if answer != 'y':
break
test_tup = list(test_tup)
test_tup.append(the_dict)
test_tup = tuple(test_tup)
print(test_tup)
Which is a monthly cost associated with renting a house?
A utility bills
O B. property tax
O c.security deposit
Which is not a primary function of excel
Explanation:
Word Processor , it's really cra ppy btw
Question 12)
What element should the introduction of an effective essay have?
A.
a call to action
B.
a main idea statement
C.
a summary of the topic
D.
evidence to support the details
E.
details to support the topic
Answer:
The introduction of your essay should have the summary of your topic.
Explanation:
You obviously need to know what to write for your essay otherwise you would have no ideas, clues, evidence, or any elaboration for what your writing about. Hope this helps
How do you open the Font dialog?
Explanation:
Click the Home tab.
In the Fonts group, click the dialog box launcher button.
The button is found in the lower-right corner of the Font group.
The Font dialog box contains all the commands for formatting text, including quite a few that didn’t find their way into the Font group on the Ribbon. As with all text formatting, the commands you choose in the Font dialog box affect any new text you type or any selected text in your document.
When you’ve finished setting up your font stuff, click the OK button. Or click Cancel if you’re just visiting.
Use the Ctrl+D keyboard shortcut to quickly summon the Font dialog box.
hope my answer helps
pls mark this as brainlist
be sure to follow me and I will follow you back
stay safe
good day
1) Raj wants to create a presentation of 20 slides on MS PowerPoint. He wants that all the slides should have uniform background and theme. Suggest him which option in MS PowerPoint makes it possible.
How does an online discussion group differ from one that is held face-to-face?
There is no need for group roles when holding online meetings.
Online discussion groups do not allow members to develop critical-thinking skills.
Group members are more likely to bond together as a group online than they would when meeting face-to-face.
Facilitating an online conversation may require even more work, so that participants continue engaging with one another online.
Answer: they always will have a different thinkage from others
Explanation:Some people need actual in person learning for better grades it also keeps them from getting distracted easily, they have different brains in everyone in the world everyone thinks, acts and talks in different ways some people dont need in person school because they would rather be online wich are both ok so yes they do bond together online but better in person.
Online discussion group differ from one that is held face-to-face as Group members are more likely to bond together as a group online than they would when meeting face-to-face. Thus, option C is correct.
What is software organization?A system that defines how specific activities, in this case, the software development process, are directed to achieve corporate goals is referred to as an organizational structure. These activities could include putting rules, roles, and responsibilities in place.
There are four basic modes of collaboration, as illustrated by the exhibit "The Four Ways to Collaborate": a closed and authoritarian network (an elite circle), an open and hierarchical connectivity (an innovation mall), an open and flat network (an innovation community), and a shuttered and flat network (a consortium).
Groupware is software that allows a group of people to work together on the same system or application, regardless of where they are. Email, newsgroups, and many more are examples of groupware applications.
Thus, option C is correct.
For more details regarding collaborative applications, visit:
brainly.com/question/8453253
#SPJ3
PLEASE HELP ME WITH THIS PYTHON CODE::::: THANKS!!!
Lists are an example of a data abstraction.
A data abstraction can often contain different types of elements. It also provides a separation between the abstract properties of a data type (integer, boolean, string) and the concrete details of its representation. Basically, it doesn’t matter that the type are different!
Create an empty list. Append the integer 3, a string of "hello" and a boolean of False into the list. Print out each index individually. Now, remove the number 3 and False from the list.
Finally, print out the list again.
Answer:
Explanation:
The following Python code does exactly as requested. Once the list is created and the elements are added to it, it uses a for loop to print out each element individually. Then once the loop is over it removes the 3 and False elements from the list and creates another for loop to print the remaining element(s) individually again.
my_list = []
my_list.append(3)
my_list.append("hello")
my_list.append(False)
for x in my_list:
print(x)
my_list.remove(3)
my_list.remove(False)
for x in my_list:
print(x)
Add the following method to the Point class: public double distance(Point other) Returns the distance between the current Point object and the given other Point object. The distance between two points is equal to the square root of the sum of the squares of the differences of their x- and y-coordinates. In other words, the distance between two points (x1, y1) and (x2, y2) can be expressed as the square root of (x2 - x1)2 (y2 - y1)2. Two points with the same (x, y) coordinates should return a distance of 0.0.
public class Point {
int x;
int y;
// your code goes here
}
Answer:
public class Point
{
public int x;
public int y;
Point(int x,int y)
{
this.x=x;
this.y=y;
}
public static void main(String[] args)
{
Point p1=new Point(-2,3);
Point p2=new Point(3,-4);
System.out.println("distance:"+distance(p1,p2));
}
private static double distance(Point p1,Point p2)
{
return Math.sqrt(Math.pow(p2.x-p1.x, 2)+Math.pow(p2.y-p1.y, 2));
}
}
Explanation:
The java program defines the Point class and the public method 'distance' to return the total distance between the two quadrants passed to it as arguments (they are both instances of the Point class).
state and explain 5 importance of ICT in an organization
Answer:
Explanation:
ICT simply refers to Information technology and it is the digital technologies used in various sectors to help economic agents make use of information.
The importance of ICT include:
1. Communication: ICT is vital for communicating in organizations as information are spread faster and employees have quicker access to information.
2. Marketing and Sales: ICT is vital for the marketing of products as products can be advertised on social medias etc.
3. Efficiency and effectiveness: There's efficiency and effectiveness on the part of the organization as the needs of the customers are attended to quickly.
4. Improvement in management decision: ICT is also vital in the enhancement of management decisions.
5. It is also vital is the storage of vital data's in the organization.
A palindrome is a string that is the same when read left to right as when read right to left. Write a program that determines if an arbitrary string is a palindrome. Assume that the string can have blanks, punctuation, capital letters and lower case.
Answer:
In Python:
strng = input("String: ")
revstrng = strng[::-1]
if strng == revstrng:
print("True")
else:
print("False")
Explanation:
This prompts user for string input
strng = input("String: ")
This reverses the string input by the user
revstrng = strng[::-1]
This checks if strings and the reverse string are equal
if strng == revstrng:
Prints True, if yes
print("True")
Prints False, if otherwise
else:
print("False")
g Consider the turning point problem again, but this time you are given a sequence of at least three integers, which consists of a decreasing subsequence followed by an increasing subsequence. Using the divide and conquer technique, develop a recursive algorithm that finds the index of the turning point in the sequence (that is, the point where it transitions from a decreasing subsequence to an increasing subsequence). For example, in the sequence [43 30 16 10 7 8 13 22], the integer 7 is the turning point and its index is equal to 4 (assuming the starting index is 0). So, the algorithm should return 4
Answer:
Explanation:
The following code is written in Python, it creates a recursive function that takes in a list as a parameter, then compares the first two items in the list if the first is greater, it increases the index by one and calls the function again. This is done until the turning point is found, it then prints out the position of the turning point int the list.
def find_turning_point(list, x=0):
if list[x] > list[x + 1]:
x += 1
return find_turning_point(list, x)
else:
return "The turning point position is: " + str(x)
2.5 lesson practice edhesive
Answer:
Huh,.......? what.....?
Answer:
1. They are contained in the math module.
2. 0, 1, ... 7
3. 0.0 <= r < 5
Explanation:
Consider the following field and incomplete method of some class. The method calcTotal is intended to return the sum of all values in vals.
private int[] vals;
public int calcTotal()
{
int total = 0;
/* missing code */
return total;
}
Which of the code segments shown below can be used to replace /* missing code */ so that calcTotal will work as intended?
I.
for (int i : vals)
{
total += i;
}
II.
for (int pos = vals.length; pos > 0; pos--)
{
total += vals[pos];
}
III.
int pos = 0;
while (pos < vals.length)
{
total += vals[pos];
pos++;
}
I only
II only
I and III
II and III
III only
Answer:
I and III
Explanation:
We need a solution that iterates through the each item in the vals array and sums them (cumulative sum). The result should be held in total.
I:
This one uses enhanced for loop (i refers to the each value in vals) and sums the values.
II:
This one uses for loop, but the loop is not constructed well. The control variable of the loop, pos, initially set the length of the vals and the loop iterates while pos is greater than 0. If vals have 10, 20, 30 as values, the length would be 3. In this case, vals[pos] when pos is 3, would give us an error because last index would be 2 in that scenario. Also, you can't access the first value because loop will stop when pos is 0.
III:
This one uses a while loop and iterates each value in the vals and sums them. Note that in this case, the values pos have will be 0, 1, 2 ..., length-1 - which are valid to access each item.
Greedy Algorithm Design
A couple wants to buy n major items. They will buy one item per month. They will buy all of their items at the CrazySuperStore. Due to the current economy, it is known that at some point in the future there will be a single price hike on all items at the same time, but due to the uncertainty of economic processes, it is not known when that price hike will occur. For each of the n items the couple wants to buy, both the current price, ai and the future price, bi (bi > ai), are known. (Note that the individual price hikes on items may vary. For example, one item may go from $100 to $105 while another might go from $300 to $400. They only assumption you may make about the prices is that the second price is strictly higher than the first and that you have access to all before/after prices.) Devise a greedy strategy so that the couple is guaranteed to minimize the amount of money they spend on the items. Assume that no matter what, the couple will buy all items. Clearly describe your strategy and intuitively (or formally) prove why it's optimal.
Answer:
The algorithm is as follows:
1. Start
2. Get the number of items (n)
3. Get the current price of the n items (a1, a2..... an)
4. Get the possible hiked price of the n items (b1, b2..... bn)
5. Calculate the difference between the current and hiked prices for each item i.e. [tex]d_i = b_i - a_i[/tex]
6. Sort the differences in descending order (i.e. from the greatest to the least)
7. Buy items in this order of difference
8. Stop
Explanation:
The algorithm is self-explanatory; however, what it does is that:
It takes a list of the current price of items (say list a)
E.g: [tex]a = [100, 150, 160][/tex]
Then take a list of the hiked price of the items (say list b)
E.g: [tex]b = [110, 180, 165][/tex]
Next, it calculates the difference (d) between corresponding prices [tex]d_i = b_i - a_i[/tex]
[tex]d = [(110 - 100),(180-150),(165-160)][/tex]
[tex]d = [10,30,5][/tex]
Sort the difference from greatest to lowest (as the difference is sorted, lists a and b are also sorted)
[tex]d = [30,10,5][/tex]
[tex]a = [150, 100, 160][/tex]
[tex]b = [180, 110, 165][/tex]
If there is no hike up to item k, the couple would have saved (i = 1 to d[k-1])
Assume k = 3
The couple would have saved for 2 item
[tex]Savings = d[1] + d[2][/tex]
[tex]Savings = 30 +10[/tex]
[tex]Savings = 40[/tex]
The saved amount will then be added to the kth item in list a i.e. a[k](in this case k = 3) in order to buy b[k]
Using the assumed value of k
[tex]a[k] = a[3][/tex]
[tex]a[3] = 160[/tex]
[tex]b[3] = 165[/tex]
Add the saved amount (40) to a[3]
[tex]New\ Amount = 40 + 160[/tex]
[tex]New\ Amount = 200[/tex]
This new amount can then be used to buy b[3] i.e. 165, then they save the change for subsequent items
Your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of:
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
search engine optimization (SEO).
B
off-site Web analytics.
C
on-site Web analytics.
D
pay-per-click.
Answer:
B. off-site Web analytics.
Explanation:
Marketing can be defined as the process of developing promotional techniques and sales strategies by a firm, so as to enhance the availability of goods and services to meet the needs of the end users or consumers through advertising and market research. The pre-service strategies includes identifying the following target market, design, branding, market research, etc.
Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.
Web analytics refers to a strategic process which typically involves the collection of data, as well as the study of user behavior in an attempt to enhance or boost market share and sales. It is divided into two main categories;
I. on-site Web analytics.
II. off-site Web analytics.
In this scenario, your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of off-site Web analytics.
can you help me with this question please
The plot of a video game is developed by which of the following occupations?
O video game artist
O graphic artist
O video game designer
O computer game programmer
HELP PLSSS!!!
Answer:
c video game designer
Explanation:
Answer:
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Explanation:
What will be the output of using the element in the given HTML code?
1011 2
A.
10112
B.
10112
C.
21011
D.
21011
Answer:
i think c.
Explanation:
Answer:
Answer is B: 1011 with the two under
Explanation:
I got it right on plato
What is it called when you remove some information from a file or remove a file from the disk ? A) save b) delete c) edit d) remove
Answer:
delete is the answer okkkkkkkkkkkkkkkk
Point out the wrong statement:
A. In theory, any application can run either completely or partially in the cloud.
B. The location of an application or service plays a fundamental role in how the application must be written.
C. An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program.
D. None of the mentioned.
Answer:
D. None of the mentioned.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
This ultimately implies that, a software can be defined as a computer program or application that comprises of sets of code for performing specific tasks on the system.
All of the following statements about a software application or program are true and correct;
A. In theory, any application can run either completely or partially in the cloud.
B. The location of an application or service plays a fundamental role in how the application must be written.
C. An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program.