Answer:
Microsoft Windows File Manager
Create Python program code that will use a for loop to ask the user to enterfourintegers. Itwillcount how many of the integers are divisible by 2. The programwill print each of the 4integers and a message saying whether the integeris even or odd. The code will print the total number of even integers
Answer:
is_even = 0
int_numbers = []
for n in range(4):
n = int(input('press any four integer numbers')
int_numbers.append(n)
for n in int_numbers:
if n%2==0:
print(n, 'integer is even')
is_even+= 1
else:
print(n, 'integer is odd')
print('Total even numbers =', is_even)
Explanation:
is_even = 0 (initiates a counter to record the number of even integers).
int_numbers creates a list to store the inputs entered by the user.
int(input()) : allows users to enter an integer number
int_numbers.append(n) : adds user input to list list variable created.
n%==2 : checks if entered digit leaves a remainder of 0 when divided by 2; hence an even number
is_even+= 1: counter updates by 1 for every even number confirmed.
Is the IOT governable by frameworks? Explain your rationale.
Answer:
Absolutely yes.
Explanation:
IoT is an acronym for Internet of Things. This is a system of network devices connected together in order to transmit data over the internet. And since communication of these devices is over the internet, there's a need for some protocols for control and moderation. Hence, the need for IoT governance frameworks.
Some of the aspects that should be governed by these frameworks are;
i. Data confidentiality:
Data such as Social Security Numbers, Bank Verification Numbers and Credit card details, that are being transmitted in an IoT system should be assured of protection from unwanted usage or access.
ii. Data integrity:
These data should also be assured of consistency and accuracy over a long period of time.
iii. Accountability:
When there is a breach or some sort of mishappening, there has to be a body that would be held accountable.
convert thefollowing decimal number to its equivalent binary, octal, hexadecimal 255
Answer:
Binary: 11111111
Octal: 377
Hexadecimal: FF
Explanation:
Given
Decimal Number: 255
Required
Convert to
- Binary
- Octal
- Hexadecimal
Converting to binary...
To convert to binary, we take note of the remainder when the quotient is divided by 2 until the quotient becomes 0;
255/2 = 127 R 1
127/2 = 63 R 1
63/2 = 31 R 1
31/2 = 15 R 1
15/2 = 7 R 1
7/2 = 3 R 1
3/2 = 1 R 1
1/2 = 0 R 1
By writing the remainder from bottom to top, the binary equivalent is 11111111
Converting to octal...
To convert to octal, we take note of the remainder when the quotient is divided by 8 until the quotient becomes 0;
255/8 = 31 R 7
31/8 = 3 R 7
3/8 = 0 R 3
By writing the remainder from bottom to top, the octal equivalent is 377
Converting to hexadecimal...
To convert to hexadecimal, we take note of the remainder when the quotient is divided by 16 until the quotient becomes 0;
255/16 = 15 R 15
15/16 = 0 R 15
In hexadecimal, 15 is represented by F; So, the above division can be rewritten as
255/16 = 15 R F
15/16 = 0 R F
By writing the remainder from bottom to top, the hexadecimal equivalent is FF
a force of 50n acts on a body of mass 5kg. calculate acceleration produced .
Answer:
Force = 50n
mass = 5kg
Force = m * acc
50 = 5 * A
A = 50/5
A = 10 m/s^2
HOPE IT HELPS!!!
Explanation:
What is Relational Computerized Database
Answer:
Relational computerized database uses tables and columns to store data. each table is composed of records and each record is tied to an attribute containing a unique value. This helps the user use the data base by search query and gives the opportunity to build large and complex data bases
Whoever answers FRIST and it has to be correct so if you don’t know don’t waste your time pls. Anyway whoever answer frist I will give you brainliest and some of my points Which type of photography would you use if you wanted to photograph a fly?
Answer:
I think Ariel photography
Explanation:
I’m not sure, but I think so
Jasmine is using the software development life cycle to create a song-writing app. She wants to work with others to create music. What should Jasmine do to begin the process?
Analyze and document the requirements for building the app
Break up the work into chunks and begin writing the app code
Make improvements and enhancements to the app based on feedback Write pseudocode and create a mock-up of how the app will work and look
Answer:Python's built-in library of functions allows programmers to import pre-written applications.
Explanation:
Answer: Analyze and document the requirements for building the app
Explanation: I took a quiz with that question and guessed and got it right. Other than that, I got nothing
Which of the following statements about an inner class is true? An inner class is used for a utility class that should be visible elsewhere in the program. An inner class that is defined inside a method is publicly accessible. An inner class that is defined inside a method is not publicly accessible. An inner class that is defined inside an enclosing class but outside of its methods is not available to all methods of the enclosing class.
Answer:
(c) An inner class that is defined inside a method is not publicly accessible.
Explanation:
In programming languages such as Java, inner class (also called nested class) basically means a class inside another class or interface. The following are a few things to note about an inner class
i. Inner classes are used to group classes logically so that they are easy to use and maintained.
ii. An inner class defined inside a method of an enclosing class is not publicly accessible. They are called method local inner class
iii. An inner class that is defined inside an enclosing class but outside of its methods are available to all methods of the enclosing class
iv. An inner class has access to members, including private members, of its enclosing class.
what is a type of system software that allows a user to perform maintenance type tasks
Answer:
Computer
Explanation:
The type of system software that allows a user to perform maintenance-type tasks is a computer.
A computer has many programs and operating systems.
To build a user interface that contains graphical components, the components ____. must each be added to a separate panel. must be added directly to a frame component. must be added to a panel that is contained within a frame. must be added to a frame that is contained within a panel.
Answer:
To build a user interface that contains graphical components, the components must be added to a panel that is contained within a frame.
Explanation:
You work for a public relations (PR) firm and communicate regularly with the internal team and the clients on a PR campaign. You need to quickly send and receive professional messages that may contain text files and short media. These messages need to be accessible at any time of the day and in different time zones, and they should be able to reach all members (internal and external) relatively inexpensively. Which communication channel would best suit this purpose?
Answer:
You Need To Quickly Send And Receive Professional Messages That May Contain Text Files And Short Media. These Messages Need To Be Accessible At Any Time Of The Day And In Different ... You work for a public relations (PR) firm and communicate regularly with the internal team and the clients on a PR campaign.
Explanation:
Usually when i am using my windows 10 laptop and using the internet, it stops working and says "No Internet." So i disconnect from the wifi i was using, and then i reconnect to it and it works fine. But it keeps on doing the same thing and it is really annoying. please help!
Answer:
I used to have the same proble, have you tried rebooting it? That normally works. If not, you have to change your internet plan completely. That’s what I had to do. But first try rebooting.
Explanation:
convert the following decimal number to its equivalent binary ,octal,hexadecimal 1920
pls in step by step
pls help me bro
Answer:
0b11110000000 is binary
0o3600 is in octal
0x780 in hexa dec.
Explanation:its a bit complitcated to explain sorry bro!
HELP I WILL MARK BRAINLIEST!!! I NEED ASAP!!!
Python: With a program to store the list of all your friends, then sort the list and print them in alphabetical order. The program should create a loop to accept the names of all your friends. Exit the loop when the user has no more items to input. Then sort the list alphabetically and print out the new list. (Side Note: Make Sure Your Code Works Before Submitting) Note: You cannot predefine the list of friends. The list should be initialized to an empty list
#This is a way without a loop
friends = list(map(str,input("Enter Names: ").split()))
print(sorted(friends))
#This is a way with a loop (for&&while)
friends = list(map(str,input("Enter Names: ").split()))
cool = True
while cool:
cool = False
for i in range(len(friends)-1):
if friends[i] > friends[i+1]:
coo = friends[i]
friends[i] = friends[i+1]
friends[i+1] = coo
cool = True
print(friends)
When approved for a loan, an individual essentially applied for aid in the area of...
A. Increasing (and financing) immediate increase in cash flow
B. limited liability
C. future educational services
D. protections and insurance
Answer:
The correct answer is A. When approved for a loan, an individual essentially applied for aid in the area of increasing (and financing), as it implies an immediate increase in cash flow.
Explanation:
Every loan involves the delivery of money by a bank or a financial agency to a person or company, with the consideration that the latter will later return said amount, plus an additional amount for interest, within a specified period and may pay in a single payment and in full or through an installment plan. But, in any case, the immediate result of said loan is an increase in the cash flow of the person who obtains said loan, which can be used for the acquisition of goods or services, or to face different eventual expenses.
IANA has primarily been responsible with assigning address blocks to five regional internet registries (RIR). A tech needs to research address blocks assigned in the United States. Which RIR should the tech contact?
Answer:
The American Registry for Internet Numbers ARIN
Explanation:
The American Registry for Internet Numbers (ARIN) is a not for profit organization that serves as the administrator and distributor of Internet numeric resources such as IP addresses (IPv4 and IPv6) ASN for the United States, Canada, as well as North Atlantic and Caribbean islands
There are four other Regional Internet Registry including APNIC, RIPE NCC, LACNIC and AFRINIC.
Which object is a storage container that contains data in rows and columns and is the primary element of Access databases? procedures queries forms tables
Answer:
tables
Explanation:
For accessing the database there are four objects namely tables, queries, forms, and reports.
As the name suggests, the table is treated as an object in which the data is stored in a row and column format plus is the main element for accessing the database
Therefore in the given case, the last option is correct
Answer:
D. tables
Explanation:
took the test, theyre right too
Which of the following answers refers to a system containing mappings of domain names to various types of data, such as numerical IP addresses?
Answer:
DNS or Domain Name System
Explanation:
You can query a DNS server with a domain name to get an IP address.
what are reserved words in C programming?
Answer:
A word that cannot be used as an identifier, such as the name of a variable, function, or label. A reserved word may have no meaning. A reserved word is also known as a reserved identifier.
Explanation:
quick google search
Which statement is the best description of what a macro can do in Excel 2016? It is a type of formatting users can apply to enlarge the worksheet area. It is a file type that a user can save a workbook as. It is a series of instructions contained in one command that users can apply to automate complex and/or repetitive tasks. It is a recording function that allows you to save worksheets, audio recordings, and videos that are displayed on the screen.
Answer: It is a series of instructions contained in one command that users can apply to automate complex and/or repetitive tasks
One example would be a macro that goes through a list of numbers and highlights which are duplicates. Say you had the list {1,2,3,3,4,4,4,5}. You could use one color to highlight both 3 and 4 as they repeat themselves. Or you could use different colors to show the different values. With a small list, you could highlight by hand. However, macros are more efficient with larger lists.
Answer:
It is a series of instructions contained in one command that users can execute to automate complex and/or repetitive tasks.
Explanation:
edge 2022
The parallax perspective says that objects that are close up appear to move __________ than far away objects.
A. More smoothly
B. More randomly
C. Slower
D. Faster
Answer:
It appears to move faster.
Roger is getting a $5,000 loan. Which option will allow Roger to pay off the loan and keep his payments under $100?
Python Lists and Events: Write a program that generates 8 random scores (between 0 and 100), store them in an array, finds the best score, and then assigns grades based on the following scheme (use loops wherever possible): Grade is A if score >= best – 10 Grade is B if score >= best – 20 Grade is C if score >= best – 30 Grade is D if score >= best – 40 Grade is F otherwise.
Answer:
import random
scores = []
for i in range(8):
score = random.randint(0,100)
scores.append(score)
best_score = max(scores)
letter_grade = ""
for s in scores:
if s >= best_score - 10:
letter_grade = "A"
elif s >= best_score - 20:
letter_grade = "B"
elif s >= best_score - 30:
letter_grade = "C"
elif s >= best_score - 40:
letter_grade = "D"
else:
letter_grade = "F"
print(letter_grade)
Explanation:
Import the random module
Create an empty list to hold the scores
Create a for loop that iterates 8 times. Inside the loop, create 8 random scores and put them in the scores
When the loop is done, find the best_score using max method
Create another for loop that iterates through the scores. Check each score and set the letter_grade depending on the given conditions.
While working on an investigation, a colleague hands you a list of file creation and access times taken from a compromised workstation. To match the times with file access and creation times from other systems, what do you need to account for
Answer:
Record time offsets.
Explanation:
In this scenario, to match the times with file access and creation times from other systems, you will need to account for time offsets.
The time offset refers to the time stamp associated with different processes or tasks on a computer in nanoseconds through the operating system.
Since you've been handed a list of file creation and access times taken from a compromised workstation by your colleague, you'll need to match respectively the time the file was created to the time it was accessed by an unauthorized user.
Additionally, the time stamp varies depending on the operating system being used;
- For windows operating system, it uses a 64 bit time stamp.
- For Linux or Unix, it uses a 32 bit time stamp.
Which is the right way to give comment if you are using Internet explorer as the browser? a) <!-- My First Webpage --> b) <comment> My First Webpage </comment>
Answer:
(a) <!-- My First Webpage -->
Explanation:
Comments in programming languages are chunks of texts, written as part of program code, that are not executed as actual code but rather used for making the program code easily readable and understandable. They allow programmers to explain certain lines of a program code.
Every programming language has its own way of representing comments. In HTML - HyperText Markup Language - comments are written between the following tags :
<!--
and
-->
For example, to put the text "My comment goes here" in a comment, we write:
<!-- My comment goes here -->
From the question, the text to be put is: "My First Webpage". Therefore, we write;
<!-- My First Webpage -->
The acronym "HTTP' stands for
Answer:hypertext transfer protocol secure
Explanation:
Explanation:
http means hypertext transfer protocol secure
What form of note taking would be MOST beneficial for a visual learner who needs to see the connections between ideas?
Think link
Formal outline
Time lines
Guided notes
Answer:
Think link
Explanation:
A data set includes data from 500 random tornadoes. The display from technology available below results from using the tornado lengths (miles) to test the claim that the mean tornado length is greater than 2.2 miles. Use a 0.05 significance level. Identify the null and alternative hypothesis, test statistic, P-value, and state the final conclusion that addresses the original claim. LOADING... Click the icon to view the display from technology. What are the null and alternative hypotheses
Answer:
The answer is:
[tex]H_0:\mu=2.2\\H_1:\mu> 2.2[/tex]
Explanation:
[tex]H_0:\mu=2.2\\H_1:\mu> 2.2[/tex]
The test value of statistic t= [tex]\frac{\bar x-\mu}{\frac{s}{\sqrt{n}}}[/tex]
[tex]=\frac{2.31688-2.2}{0.206915}\\\\=0.56[/tex]
The value of P = P(T>0.56)
=1-P(T<0.56)
=1-0.712
=0.288
Since the P value exceeds its mean value (0.288>0.05), the null assumption must not be rejected. Don't ignore H0. This assertion, it mean length of the tornado is greater than 2.2 miles also isn't backed by enough evidence.Which statement is true?
a. When a method call is made, the called method must know how to return to its caller, so the return address is pushed onto the program execution stack.
b. Stacks support recursive method calls in the same manner as conventional, nonrecursive method calls.
c. The program execution stack contains the space created for a method's global variables on each invocation of that method during a program's execution.
d. When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.
Answer: D) When a method returns to its caller, the memory for that method's local variables is popped off the stack and those variables are no longer known to the program.
Explanation:
how to use command prompt
Answer:
The answer to this question can be defined as follows:
Explanation:
The Command Prompt is a program, which available in windows operating systems, which imitates an input field with windows GUI(Graphic User Interface). It provides a text-based user interface, that can be used to run instructions inserted and carry out advanced organizational activities, following are the step to open a command prompt:
There are two-step to open the command prompt in windows:
First, go to the start button the window. after open start type cmd on the search bar, It will provide the cmd to open it click with mouse or press enter button. With the help of keyboard press (window+R) key together, after pressing it will provide the run prompt in which we write cmd and press enter. It will open a command prompt panel.