Answer: Provided in the explanation section
Explanation:
We will follow this question carefully with a well precise answer.
I hope at the end of the day, you find this useful.
Answer to First part:
-----------------------
Here as Charlie has not taken any one's permission even policy authority so using such keylogger tool is completely ethical violation on charlie's part. Because any decession that has taken by a company its not an issue until everyone agreed to it. Because without knowledge of such software the people will not be aware and they may get trap and also there is not any written document regarding the acknowledgement so its completely wrong or illegal to blame someone based on result of such softwares. And second illegal thing is to copy some else's encryption key because the policy should be equal to all the people and it should not be used for personal gain.
Answer to second part:
=================
No it is still not ethical action on Charle's part because the policy should be same for everyone and as Charlie is the one who installed this software so he should keep this secrate and not to misuse as its not a matter how Peter came to know his encryption key from Charlie but why should Charlie in first place copy the encryption key for peter and share the encryption code with Peter,its completely unethical.
cheers i hope this helped !!
Many treadmills output the speed of the treadmill in miles per hour (mph) on the console, but most runners think of speed in terms of a pace. A common pace is the number of minutes and seconds per mile instead of mph. Write a program that starts with a quantity in mph and converts the quantity into minutes and seconds per mile. As an example, the proper output for an input of 6.5 mph should be 9 minutes and 13.8 seconds per mile. If you need to convert a double to an int, which will discard any value after the decimal point, then you may use intValue
Answer:
This question is answered using C++ programming language.
This program does not make use of comments; However, see explanation section for detailed line by line explanation.
The program starts here
#include <iostream>
using namespace std;
int main()
{
double quantity,seconds;
int minutes;
cout<<"Quantity (mph): ";
cin>>quantity;
minutes = int(60/quantity);
cout<<minutes<<" minutes and ";
seconds = (60/quantity - int(60/quantity))*60;
printf("%.1f", seconds);
cout<<" seconds per mile";
return 0;
}
Explanation:
The following line declares quantity, seconds as double datatype
double quantity,seconds;
The following line declares minutes as integer datatype
int minutes;
The following line prompts user for input in miles per hour
cout<<"Quantity (mph): ";
User input is obtained using the next line
cin>>quantity;
The next line gets the minute equivalent of user input by getting the integer division of 60 by quantity
minutes = int(60/quantity);
The next statement prints the calculated minute equivalent followed by the string " minuted and " without the quotes
cout<<minutes<<" minutes and ";
After the minutes has been calculated; the following statement gets the remainder part; which is the seconds
seconds = (60/quantity - int(60/quantity))*60;
The following statements rounds up seconds to 1 decimal place and prints its rounded value
printf("%.1f", seconds);
The following statement prints "seconds per mile" without the quotes
cout<<" seconds per mile";
Following are the program to the given question:
Program Explanation:
Defining the header file.Defining the main method.Inside the method, three double variables "mph, sec, and min_per_mile", and one integer variable "min" is defined. After defining a variable "mph" is defined that inputs value by user-end.After input value, "sec, min_per_mile, and min" is defined that calculates the value and prints its calculated value.Program:
#include<iostream>//header file
using namespace std;
int main()//defining main method
{
double mph,sec,min_per_mile;//defining a double variable
int min;//defining integer variable
cout<<"Enter the speed of the treadmill in mph:";//print message
cin>>mph;//input double value
min_per_mile=(1/mph)*60;//defining a double variable that calculates minutes per mile
min=static_cast<int>(min_per_mile);//defining int variable that converts min_per_mile value into integer
sec=(min_per_mile-min)*60;//defining double variable that calculates seconds per mile value
cout<<"A common pace is the "<<min<<" minutes and "<<sec<<" seconds per mile"<<endl;//print calculated value with message
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/21278031
Write code for iterative merge sort algorithm. It is also known as bottom-up merge sort. There should not be any recursive call for this approach. Include your code and screenshot of output with the answer. You can choose any programming language for this problem.
Answer:
Here is the C++ program:
#include <iostream> // for using input output functions
using namespace std; // to identify objects as cin cout
void merge(int array[], int left, int mid, int right);
// to merge the array into two parts i.e. from left to mid and mid+1 to right
int minimum(int a, int b) { return (a<b)? a :b; }
//to find the minimum of the 2 values
void IterativeMergeSort(int array[], int num) { //function to sort the array
int size; //determines current size of subarrays
int left; //to determine the start position of left subarray
//to merge the sub arrays using bottom up approach
for (size=1; size<=num-1; size = 2*size) {
//to select start position of different subarrays of current size
for (left=0; left<num-1; left += 2*size) {
// To determine the end point of left sub array and start position of right //which is mid+1
int mid = minimum(left + size - 1, num-1);
int right = minimum(left + 2*size - 1, num-1);
// Merge the sub arrays from left to mid and mid+1 to right
merge(array, left, mid, right); } } }
// function to merge the array into two parts i.e. from left to mid and mid+1 //to right
void merge(int array[], int left, int mid, int right){
int i, j, k; // variables to point to different indices of the array
int number1 = mid - left + 1;
int number2 = right - mid;
//creates two auxiliary arrays LEFT and RIGHT
int LEFT[number1], RIGHT[number2];
//copies this mid - left + 1 portion to LEFT array
for (i = 0; i < number1; i++)
LEFT[i] = array[left + i];
//copies this right - mid portion to RIGHT array
for (j = 0; j < number2; j++)
RIGHT[j] = array[mid + 1+ j];
i = 0;
j = 0;
k = left;
//merge the RIGHT and LEFT arrays back to array from left to right i.e //arr[left...right]
while (i < number1 && j < number2) {
if (LEFT[i] <= RIGHT[j])
/*checks if the element at i-th index of LEFT array is less than or equals to that of j-th index of RIGHT array */
{ array[k] = LEFT[i];
//if above condition is true then copies the k-th part of array[] to LEFT //temporary array
i++; }
else //when the above if condition is false
{ array[k] = RIGHT[j];
//moves k-th part of array[] to j-th position of RIGHT temporary array
j++; }
k++; }
while (i < number1) { //copies remaining elements of LEFT array
array[k] = LEFT[i];
i++;
k++; }
while (j < number2) { //copies remaining elements of RIGHT array
array[k] = RIGHT[j];
j++;
k++; } }
int main() {
int Array[] = {9, 18, 15, 6, 8, 3}; // an array to be sorted
int s = sizeof(Array)/sizeof(Array[0]);
//sizeof() is used to return size of array
cout<<"Input array: ";
int i;
for (i=0; i < s; i++) //to print the elements of given array
cout<<Array[i]<<" ";
cout<<endl;
IterativeMergeSort(Array, s); //calls IterativeMergeSort() function
cout<<"Sorted array after applying Iterative Merge Sort:"<<endl;
for (i=0; i < s; i++) //to print the elements of the sorted array
cout<<Array[i]<<" "; }
Explanation:
The program is well explained in the comments mentioned above with each line of the code. The screenshot of the program along with its output is attached.
Write a python function average_sample_median(n,P), that return the average of 1000 samples of size n sampled from the distribution P.
* Sample run *
print(average_sample_median(10,[0.2,0.1,0.15,0.15,0.2,0.2])) print(average_sample_median(10,[0.3,0.4,0.3])) print(average_sample_median(10,P=[0.99,0.01])
* Expected Output *
3.7855
2.004
1
Answer:
Explanation: E(x)=np
E(x+y)=E(x)+E(y)
Y:p(y=1)=p
P(y-0)=1-p
I hope you can understand this example if not just tell me and I can Give you more examples thaks:-)
Write a program that calculates and prints the average of several integers. Assume the last value read with scanf is the sentinel 9999. A typical input sequence might be 10 8 11 7 9 9999
Answer:
Following are the program in C programming language
#include<stdio.h> // header file
int main() // main function
{
int n1;// variable declaration
int c=0; // variable declaration
float sum=0; // variable declaration
float avg1;
printf("Enter Numbers :\n");
while(1) // iterating the loop
{
scanf("%d",&n1); // Read the value by user
if(n1==9999) // check condition
break; // break the loop
else
sum=sum+n1; // calculating sum
c++; // increment the value of c
}
avg1=sum/c;
printf("Average= %f",avg1);
return 0;
}
Output:
Enter Numbers:
10
8
11
7
9
9999
Average= 9.000000
Explanation:
Following are the description of program
Declared a variable "n1" as int type Read the value by the user in the "n1" variable by using scanf statement in the while loop .The while loop is iterated infinite time until user not entered the 9999 number .if user enter 9999 it break the loop otherwise it taking the input from the user .We calculating the sum in the "sum " variable .avg1 variable is used for calculating the average .Finally we print the value of average .The program takes in several value numeric values until 9999 is inputed, the program calculates the average of these values. The program is written in python 3 thus :
n = 0
#initialize the value of n to 0
cnt = 0
#initialize number of counts to 0
sum = 0
#initialize sum of values to 0
while n < 9999 :
#set a condition which breaks the program when 9999 is inputed
n = eval(input('Enter a value : '))
#accepts user inputs
cnt += 1
#increases the number of counts
sum+=n
#takes the Cummulative sum
print(sum/cnt)
#display the average.
A sample run of the program is attached.
Learn more : https://brainly.com/question/14506469
1. Discuss why it is so important for all application builders to always check data received from unknown sources, such as Web applications, before using that data. 2. Why should Web site operators that allow users to add content, for example forums or blogs, carefully and consistently patch and configure their systems
Answer:
1. It is so important for all application builders to always check data received from unknown sources before using that data. This is because of the Security related reasons and vulnerabilities .For example the data received might contain harmful hidden viruses. Web applications are accessed by internet and these are the most vulnerable to attacks by hacker or intruders using harmful data containing malware. This can cause security breaches due to the security flaws or bugs in Web applications. So to overcome such security risks which can cause damage in the Web applications, data from unknown sources should be checked.
Explanation:
2. When the Website is being used and running, there is a room for possible glitches or other bugs and issues. To understand, handle and address issues successfully, the website operators carefully and consistently patch and configure their systems. The administrators collect the user data which enables them to have enough data in order to make the requisite alterations or improvements in the website. This also helps to improve the website performance. The patching and configuring of systems fix problems in the website which reduces the risk of website damage and the website works smoothly this way. Moreover it identifies vulnerabilities, solve configuration issues and upgrades in website features provide additional capabilities to the website.
Use an Excel function to find: Note: No need to use Excel TABLES to answer these questions! 6. The average viewer rating of all shows watched. 7. Out of all of the shows watched, what is the earliest airing year
Answer:
Use the average function for viewer ratings
Use the min function for the earliest airing year
Explanation:
The average function gives the minimum value in a set of data
The min function gives the lowest value in a set of data
State all the generations of computers.
Answer:
1 1st generation =vacuum tube based
2 nd generation =transistor based
3 rd generation intergrated circuit based
4rd generation =vlsi microprocessor based
5th generation =ulsi microprocessor based
Answer:
1940 – 1956: First Generation – Vacuum Tubes. These early computers used vacuum tubes as circuitry and magnetic drums for memory. ...
1956 – 1963: Second Generation – Transistors. ...
1964 – 1971: Third Generation – Integrated Circuits. ...
1972 – 2010: Fourth Generation – Microprocessors.
Explanation:
1. Suppose you purchase a wireless router and connect it to your cable modem. Also suppose that your ISP dynamically assigns your connected device (that is, your wireless router) one IP address. In addition, suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. How are IP addresses assigned to the five PCs
Answer:
In this example, the wireless router uses NAT to allocate private IP addresses to five PC's and router interface, since only one IP address is assigned or given to the wireless router by the ISP.
Explanation:
Solution
The Dynamic Host Configuration Protocol server provides the IP addresses to clients, dynamically.
Generally a wireless router contains DHCP server. a wireless router can also assign IP addresses dynamically to its clients.
So, the wireless router assigns IP addresses to five PC's and the router interface dynamically using the DHCP.
It is stated that the Internet Service Provider (ISP) assigns only one IP address to the wireless router. Here there are five PC's and one router interface need to be allocated IP addresses.
In such cases the NAT (Network Address Translation)protocol is important and allows all the clients of the home network to sue a single internet connection (IP address) assigned or given by the ISP.
NAT permits the router to allocate the private IP addresses to client from the private IP address space reserved for the private networks. these private IP addresses are valid only in the home or local network .
In a real pulley system, the work supplied must be the work accomplished.
Equal to
Less than
Greater than
sorry I was testing something
A software company assesses its developers more on their client support skills rather than their development skills. Which of the following terms would best describe the software company's performance management process?
A. Deficient
B. Contaminated
C. Unreliable
D. Inconsistent
E. Unspecified
Answer:
B. Contaminated
Explanation:
Based on the information provided regarding the scenario it seems that the software company's performance management process can be best described as contaminated. This occurs when the criterion of measurement for the employee performance includes aspects of performance that are not part of the job. Which in this case the main role of the employees is to apply their development skills in order to improve the software and not focus on their client support skills, but instead the "client support skills" is what the company is basing their performance review on.
public class Car {
public void m1() {
System.out.println("car 1");
}
â
public void m2() {
System.out.println("car 2");
}
â
public String toString() {
return "vroom";
}
}
public class Truck extends Car {
public void m1() {
System.out.println("truck 1");
}
}
And assuming that the following variables have been declared:
Car mycar = new Car();
Truck mytruck = new Truck();
What is the output from the following statements?
a. Sound F/X System.out.println(mycar);
b. mycar.m1();
c. mycar.m2();
d. System.out.println(mytruck);
e. mytruck.m1();
f. mytruck.m2();
Answer:
The Following are the outputs:
a. vroom
b. car 1
c. car 2
d. vroom
e. truck 1
f. car 2
Explanation:
The first statement System.out.println(mycar); prints an instance of the Car object my car which calls the toString() method.
The second statement mycar.m1(); Calls the method m1() which prints car1
The third statement mycar.m2(); calls the method m2() which prints car2
Then another class is created Truck, and Truck inherits all the methods of Car since it extends Car. Truck has a method m1() which will override the inherited method m1() from the Car class.
The fourth statement System.out.println(mytruck); will print print vroom just as the first statement since it inherits that method toString()
The fifth statement calls m1() in the Truck class hence prints Truck 1
Finally the sixth statement will print car 2 because it also inherited that method and didnt overide it.
You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on your validation set, but good performance on your training set. Your implementation has no bugs. Define various reasons that could be causing the problem?
Answer:
The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data
Explanation:
Solution
The various reasons that could be causing the problem is given as follows :
1. A wide number of parameters :
In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers. When the training is performed in this tree, then the model files the data too well. When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.2. Noisy Data:
The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values. When the tree is trained on this noisy data, then it sets its parameters according to the training data. As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.
The weekly pay for an employee is determined based on the following parameters:
Standard work hours by week is 40 hours.
Hourly pay rate is $10.00 per hour
Overtime hours are paid at time and a half the rate (that is $15.00 per hour).
Design and implement a program (name it WeeklyPay) that read number of hours worked per week (as integer value), prints out the entered hours, and then prints out the gross earning. Organized your output following these sample runs.
Sample run 1:
You entered 20 hours.
Gross earning is $200.0
Sample run 2:
You entered 40 hours.
Gross earning is $400.0
Sample run 3:
You entered 50 hours.
Gross earning is $550.0
Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates when "xxxxx" (five x characters) is read in. Other strings are ignored. After the loop, your code should print out 3 lines: the first consisting of the string "land:" followed by the number of "land" strings read in, the second consisting of the string "air:" followed by the number of "air" strings read in, and the third consisting of the string "water:" followed by the number of "water" strings read in. Each of these should be printed on a separate line. Use the up or down arrow keys to change the height.
Answer:
count_land = count_air = count_water = 0
while True:
s = input("Enter a string: ")
if s == "xxxxx":
break
else:
if s == "land":
count_land += 1
elif s == "air":
count_air += 1
elif s == "water":
count_water += 1
print("land: " + str(count_land))
print("air: " + str(count_air))
print("water: " + str(count_water))
Explanation:
*The code is in Python
Initialize the variables
Create a while loop that iterates until a specific condition is met. Inside the loop, ask the user to enter the string. If it is "xxxxx", stop the loop. Otherwise, check if it is "land", "air", or "water". If it is one of the given strings, increment its counter by 1
When the loop is done, print the number of strings entered in the required format
Give an example of a function from N to N that is:______.
a) one-to-one but not onto
b) onto but not one-to-one
c) neither one-to-one nor onto
Answer:
Let f be a function
a) f(n) = n²
b) f(n) = n/2
c) f(n) = 0
Explanation:
a) f(n) = n²
This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.
Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:
f(a) = f(b) ⇒ a² = b² ⇒ a = b
The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number. For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.
b) f(n) = n/2
The above function example is an onto function because every natural number, lets say n is a natural number that belongs to N, is the image of 2n. For example:
f(2n) = [2n/2] = n
The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:
When the value of n=1, then
n/2 = [1/2] = [0.5] = 1
When the value of n=2 then
n/2 = [2/2] = [1] = 1
c) f(n) = 0
The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image. The above function example is also not an onto function because every positive integer is not an image of any natural number.
Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as arguments. The function should determine and return the hypotenuse of the triangle. b. A main() function that should call right Triangle() correctly and display the value the function returns.
Answer:
The java program is as follows.
import java.lang.*;
public class Triangle
{
//variables to hold sides of a triangle
static double height;
static double base;
static double hypo;
//method to compute hypotenuse
static double rightTriangle(double h, double b)
{
return Math.sqrt(h*h + b*b);
}
public static void main(String[] args) {
height = 4;
base = 3;
hypo = rightTriangle(height, base);
System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);
}
}
OUTPUT
The hypotenuse of the right-angled triangle is 5.0000
Explanation:
1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.
2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.
3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.
4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().
5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.
6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.
7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.
8. In java, all the code is written inside a class.
9. The name of the program is same as the name of the class having the main() method.
10. The class having the main() method is declared public.
11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.
Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their way into their master’s degree directly from undergraduate. If you have a 3.5 GPA and graduate from one of our majors, you can continue on and get your masters without having to do a lot of the paperwork. For simplification, we have four undergraduate degrees: CS, SWE, IT, and CGDD – and three masters programs: MSCS, MSSWE and MSIT. For this assignment, you’re going to ask the user a few questions and determine if they qualify for the FastTrack option.
Sample Output:
Major: Frogmongering
GPA: 3.9
Great GPA, but apply using the regular application.
Sample Output #2:
Major: SWE
GPA: 3.3
Correct major, but GPA needs to be higher.
Sample Output #3:
Major: IT
GPA: 3.5
You can FastTrack.
Sample Output #4:
Major: Study Studies
GPA: 0.4
Talk to one of our advisors about whether grad school is for you.
Answer:
The programming language is not stated. However, I'll answer this question using Python programming language.
The program uses no comments; find explanation below
i = 0
while not (i == 4):
print("Sample Run: #"+str(i+1))
Major = input("Major: ")
GPA = float(input("GPA: "))
if not (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):
if GPA >= 3.50:
print("Great GPA, but apply using the regular application")
else:
print("Talk to one of our advisors about whether grad school is for you")
if (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):
if GPA >= 3.50:
print("You can FastTrack.")
else:
print("Correct major, but GPA needs to be higher.")
i = i + 1
Explanation:
Line 1 of the program initializes the sample run to 0
Line 2 checks if sample run is up to 4;
If yes, the program stops execution else, it's continues execution on the next line
Line 3 displays the current sample run
Line 4 and 5 prompts user for Major and GPA respectively
Line 6 to 10 checks is major is not one of CS, SWE, IT, and CGDD.
If major is not one of those 4 and GPA is at least 3.5, the system displays "Great GPA, but apply using the regular application"
If major is not one of those 4 and GPA is less than 3.5, the system displays "Talk to one of our advisors about whether grad school is for you"
Line 11 to 15 checks is major is one of CS, SWE, IT, and CGDD.
If major is one of those 4 and GPA is at least 3.5, the system displays "You can Fastrack"
If major is one of those 4 and GPA is less than 3.5, the system displays "Correct major, but GPA needs to be higher."
The last line of the program iterates to the next sample run
Using Python I need to Prompt the user to enter in a numerical score for a Math Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a English Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a PE Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a Science Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for an Art Class. The numerical score should be between 0 and 100. Call the letter grade function 5 times (once for each class). Output the numerical score and the letter grade for each class.
Answer:
The program doesn't use comments; See explanation section for detailed line by line explanation
Program starts here
def lettergrade(subject,score):
print(subject+": "+str(score))
if score >= 90 and score <= 100:
print("Letter Grade: A")
elif score >= 80 and score <= 89:
print("Letter Grade: B")
elif score >= 70 and score <= 79:
print("Letter Grade: C")
elif score >= 60 and score <= 69:
print("Letter Grade: D")
elif score >= 0 and score <= 59:
print("Letter Grade: F")
else:
print("Invalid Score")
maths = int(input("Maths Score: "))
english = int(input("English Score: "))
pe = int(input("PE Score: "))
science = int(input("Science Score: "))
arts = int(input("Arts Score: "))
lettergrade("Maths Class: ",maths)
lettergrade("English Class: ",english)
lettergrade("PE Class: ",pe)
lettergrade("Science Class: ",science)
lettergrade("Arts Class: ",arts)
Explanation:
The program makes the following assumptions:
Scores between 90–100 has letter grade A
Scores between 80–89 has letter grade B
Scores between 70–79 has letter grade C
Scores between 60–69 has letter grade D
Scores between 0–69 has letter grade E
Line by Line explanation
This line defines the lettergrade functions; with two parameters (One for subject or class and the other for the score)
def lettergrade(subject,score):
This line prints the the score obtained by the student in a class (e.g. Maths Class)
print(subject+": "+str(score))
The italicized determines the letter grade using if conditional statement
This checks if score is between 90 and 100 (inclusive); if yes, letter grade A is printed
if score >= 90 and score <= 100:
print("Letter Grade: A")
This checks if score is between 80 and 89 (inclusive); if yes, letter grade B is printed
elif score >= 80 and score <= 89:
print("Letter Grade: B")
This checks if score is between 70 and 79 (inclusive); if yes, letter grade C is printed
elif score >= 70 and score <= 79:
print("Letter Grade: C")
This checks if score is between 60 and 69 (inclusive); if yes, letter grade D is printed
elif score >= 60 and score <= 69:
print("Letter Grade: D")
This checks if score is between 0 and 59 (inclusive); if yes, letter grade F is printed
elif score >= 0 and score <= 59:
print("Letter Grade: F")
If input score is less than 0 or greater than 100, "Invalid Score" is printed
else:
print("Invalid Score")
This line prompts the user for score in Maths class
maths = int(input("Maths Score: "))
This line prompts the user for score in English class
english = int(input("English Score: "))
This line prompts the user for score in PE class
pe = int(input("PE Score: "))
This line prompts the user for score in Science class
science = int(input("Science Score: "))
This line prompts the user for score in Arts class
arts = int(input("Arts Score: "))
The next five statements is used to call the letter grade function for each class
lettergrade("Maths Class: ",maths)
lettergrade("English Class: ",english)
lettergrade("PE Class: ",pe)
lettergrade("Science Class: ",science)
lettergrade("Arts Class: ",arts)
Eddie creates one-of-a-kind brochures for his customers, and he wants to be able to customize the look of some of the headings in a given brochure. This special type of heading will be used throughout a given document, but it won't be reused in other documents. What type of construct should he create
Answer:
A template
Explanation:
The type of construct he should create is a Template.
Template: A template is a file that serves as a beginning point for a document that is new.
When you open a template, it is pre-formatted in a way. for instance you might make use of a template in Microsoft Word that is arranged as a business letter, the template would mostly have a space for your address also a name in the left (upper)corner, which is an area for the receivers's address.
Now a little below that on the left site, is an area for the message (body) and after that, is a spot for your signature at the bottom.
A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?
a. Establish a privileged interface group and apply read -write permission.to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work
Answer:
The correct option is (d) Use a service account and prohibit users from accessing this account for development work
Explanation:
Solution
As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:
By making use of a service account and forbids users from having this account for development work.
The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.
Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.
A list based on a simple array (standard array implementation) is preferable to a dynamically allocated list for the following reasons.
A. Insertions and deletions require less work.
B. You are guaranteed a space to insert because it is already allocated.
C. You can take advantage of random-access typically.
D You can mix and match the types of the items on the list. E. (b) and (c).
F. All of the above.
Answer:
A. Insertions and deletions require less work.
C. You can take advantage of random access typically
D. You can mix and match the types of the items on the list.
Explanation:
Standard array implementation is a process in which number of items are of same type and index is restricted at a certain range. This is preferable to dynamic allocated list because it requires less work in insertion and deletions. A dynamically allocated array does not use the fixed array size declaration.
What feature in the Windows file system allows users to see only files and folders in a File Explorer window or in a list of files from the dir command to which they have been given at least read permission?
Answer:
Access based enumeration
Explanation:
The access based enumeration is the feature which helps the file system to allow users for seeing the files and folders for which they have read access from the direct command.
Access based enumeration: This feature displays or shows only the folders and files that a user has permissions for.
If a user do not have permissions (Read) for a folder,Windows will then hide the folder from the user's view.
This feature only function when viewing files and folders are in a shared folder. it is not active when viewing folders and files in a local system.
discuss 5 ways in which computer has influence typography and lettering
Answer:
Five ways in which computer has affected typography and lettering are discussed below;
1. Introduction of unconventional typeface: Computers have introduced unconventional typeface texts to typography and lettering by offering a wide range of typeface and fonts that the user can choose from, depending on the type of typing job at hand. Some of these fonts are suitable for aesthetic purpose, and some have official rating. These fonts and type faces range from the Times New Roman, Gothic, Serif, etc.
2. Size and legibility: Computers now allows different sizes of character sizes in typography. These sizes can be chosen easily to suite the degree of readability of the intended message.
3. Specialization: Computer has opened up typography and lettering to lay users and people not specialized in typography. Prior to the digital age, typing jobs were limited to specialist typists who have been trained in typography. Nowadays, anybody with access to a computer can easily learn solo, and be employed as a typist.
4. General layout: The arrangement and layout of text and lettering in typing can now be easily manipulated with a computer, by just selecting from a wide choice of arrangement available on the typing platform.
5. Minimization of errors: The use of computer in typography and lettering has greatly reduced the incidence and occurrence of error in typing. Most computers have built in prediction tools, and auto-correcting software that reduces and sometimes prevent grammatical and spelling errors.
(Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds using the following header: def convertMillis(millis): The function returns a string as hours:minutes:seconds. For example, convertMillis(5500) returns the string 0:0:5, convertMillis(100000) returns the string 0:1:40, and convertMillis(555550000) returns the string 154:19:10. Write a test program that prompts the user to enter a value for milliseconds and displays a string in the format of hours:minutes:seconds. Sample Run Enter time in milliseconds: 555550000 154:19:10
Answer:
I am writing the Python program. Let me know if you want the program in some other programming language.
def convertMillis(millis): #function to convert milliseconds to hrs,mins,secs
remaining = millis # stores the value of millis to convert
hrs = 3600000 # milliseconds in hour
mins = 60000 # milliseconds in a minute
secs = 1000 #milliseconds in a second
hours =remaining / hrs #value of millis input by user divided by 360000
remaining %= hrs #mod of remaining by 3600000
minutes = remaining / mins # the value of remaining divided by 60000
remaining %= mins #mod of remaining by 60000
seconds = remaining / secs
#the value left in remaining variable is divided by 1000
remaining %= secs #mod of remaining by 1000
print ("%d:%d:%d" % (hours, minutes, seconds))
#displays hours mins and seconds with colons in between
def main(): #main function to get input from user and call convertMillis() to #convert the input to hours minutes and seconds
millis=input("Enter time in milliseconds ") #prompts user to enter time
millis = int(millis) #converts user input value to integer
convertMillis(millis) #calls function to convert input to hrs mins secs
main() #calls main() function
Explanation:
The program is well explained in the comments mentioned with each line of code. The program has two functions convertMillis(millis) which converts an input value in milliseconds to hours, minutes and seconds using the formula given in the program, and main() function that takes input value from user and calls convertMillis(millis) for the conversion of that input. The program along with its output is attached in screenshot.
Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then convert the temperature to Fahrenheit and display it to the screen. Finally, it should convert the Fahrenheit temperature to Kelvin and display that to the screen.
Answer:
c = float(input("Enter the temperature in Celsius: "))
f = c * 1.8 + 32
print("The temperature in Fahrenheit: " + str(f))
k = (f - 32) / 1.8 + 273.15
print("The temperature in Kelvin: " + str(k))
Explanation:
*The code is in Python.
Ask the user to enter the temperature in Celsius
Convert the Celsius to Fahrenheit using the conversion formula and print it
Convert the Fahrenheit to Kelvin using the conversion formula and print it
A company recently installed fingerprint scanners at all entrances to increase the facility’s security. The scanners were installed on Monday morning, and by the end of the week it was determined that 1.5% of valid users were denied entry. Which of the following measurements do these users fall under?
a. frr
b. far
c. cer
d. sla
Answer:
a. frr
Explanation:
False rejection rate is the rate which measure the incorrect rejection of access in the system. The scanners have rejected the access of 1.5% valid users. The entry was denied to the valid users which is considered as an attempt to unauthorized access to the scanner.
The topic sentence states a: thesis statement,
paragraphs main idea,
supporting idea,
papers conclusion
The topic sentence states paragraphs main idea. Check more about sentence below.
What is the a topic sentence?A topic sentence is known to be one that tells the main point of any given paragraph.
It is said to be a supporting sentences that has the details and gives proof of one's point.
Therefore, The topic sentence states paragraphs main idea.
Learn more about topic sentence from
https://brainly.com/question/5526170
#SPJ1
Answer:
paragraph's main idea
Explanation:
1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2. (1 point) Which flag is set when the result of a signed arithmetic operation is either too large or too small to fit into the destination? 3. (1 point) Which flag is set when an arithmetic or logical operation generates a negative result?
Answer:
(1) Carry flag (2) Overflow flag (3) Sign or negative Flag
Explanation:
Solution
(1) The carry flag : It refers to the adding or subtracting. a two registers has a borrow or carry bit
(2) The over flow flag: This flag specify that a sign bit has been modified during subtracting or adding of operations
(3) The sign flag: This is also called a negative sign flag is a single bit status in a register that specify whether the last mathematical operations generated a value to know if the most significant bit was set.
Who do you think larger or smaller clients will benefit most from MasterCard’s analytics tools? Why?
Answer:The key to analytics success is not about searching for answers, ... If you are trying to determine where to find new customers, there is a recipe for how to do that, and it ... As we work with small businesses, we help them answer their big ... Moving forward, there is going to be a lot more data of varying types.
Explanation:
What are the characteristics of SAAS? (Choose all that apply) a. Services are usually available during specified time periods b. Software is installed remotely with no local involvement c. Little, if any, software is installed on the user’s computer d. Costs are calculated on a "use" basis e. User data is stored and isolated on central computers f. SAAS company often deploys an on sight employee to assist the client
Answer:
The correct options are, option D (Costs are calculated on a "use" basis), option C (Little, if any, software is installed on the user’s computer), option E (User data is stored and isolated on central computers).
Explanation:
SAAS which is also known as cloud-based software, stands for "Software as a service". SAAS is Use free client software available to clients over the Internet that can be accessed from anywhere, where clients only pay for what they used. SAAS which embraced the concept of cloud computing allows data to be accessed from any device with an internet connection and a web browser allowing software to be delivered by cloud.
Some characteristics of SAAS are: Cloud-based apps that are used over the Internet are managed from a central location, Costs are calculated as "pay for what you used" method.
The characteristics of SAAS that apply are;
C) Little, if any, software is installed on the user's computer
D) Costs are calculated on a "use" basis
E) User data is stored and isolated on central computers
SAAS is an acronym which means Software as a service. This is a software distribution model whereby a cloud provider will host applications and also make them to be very much available to end users over the internet.
Now, this SAAS model is also known as "on demand software" because it is licensed on a subscription basis and is also centrally hosted.
Further more, In SAAS model, an independent software vendor could contract hosting of the application to a third-party cloud provider.
Looking at the options, the only ones that apply to SAAS are options C, D and E.
Read more on SAAS at; https://brainly.com/question/25226343