Answer:
Classical
Explanation:
Für Elise written by Beethoven was in Rondo form
Write a program that asks for 'name' from the user and then asks for a number and stores the two in a dictionary (called 'the_dict') as key-value pair. The program then asks if the user wants to enter more data (More data (y/n)? ) and depending on user choice, either asks for another name-number pair or exits and stores the dictionary key, values in a list of tuples and prints the list. Note: Ignore the case where the name is already in the dictionary. Example: Name: pransh
Answer:
Explanation:
The following is written in Python and does as the question requested. It asks the user for the information and adds it to the dictionary (the_dict) then it asks the user if they want to add more info and keeps adding to the_dict until the user states no. Once that happens the program places the dictionary into a tuple and prints out the results.
the_dict = {}
test_tup = ()
while True:
key = input("Please enter a name: ")
value = input("Please enter a number: ")
the_dict[key] = value
answer = input("More data (y/n)?").lower()
if answer != 'y':
break
test_tup = list(test_tup)
test_tup.append(the_dict)
test_tup = tuple(test_tup)
print(test_tup)
What is used to prevent all vlans from going across a trunk?
ou are using a GUI HTML editor to create a Webpage. How can you preview and test elements of your page while you are creating it?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
By exporting the page to a separate testing application
B
By viewing the page in a browser during development
C
By publishing the page on the Web when it is finished
D
By viewing the page in the GUI screen during development
Answer:
I think its A B and C, A and B seems most probable, you should consult the website called stackoverflow
Explanation:
Is there only one option or multiple choice?
qr code is more developed than barcode
While a barcode only holds information in the horizontal direction, a QR code does hold information in both horizontal and vertical directions. Due to this, a QR code holds hundreds of times more information than a barcode.
With that being said they have different purposes, and there about the same developed as each other, unless you count how much information they can store.
g Consider the turning point problem again, but this time you are given a sequence of at least three integers, which consists of a decreasing subsequence followed by an increasing subsequence. Using the divide and conquer technique, develop a recursive algorithm that finds the index of the turning point in the sequence (that is, the point where it transitions from a decreasing subsequence to an increasing subsequence). For example, in the sequence [43 30 16 10 7 8 13 22], the integer 7 is the turning point and its index is equal to 4 (assuming the starting index is 0). So, the algorithm should return 4
Answer:
Explanation:
The following code is written in Python, it creates a recursive function that takes in a list as a parameter, then compares the first two items in the list if the first is greater, it increases the index by one and calls the function again. This is done until the turning point is found, it then prints out the position of the turning point int the list.
def find_turning_point(list, x=0):
if list[x] > list[x + 1]:
x += 1
return find_turning_point(list, x)
else:
return "The turning point position is: " + str(x)
The rhythmic note that three beats is called a____half note.
Answer:
it is called a dotted half note
2.5 lesson practice edhesive
Answer:
Huh,.......? what.....?
Answer:
1. They are contained in the math module.
2. 0, 1, ... 7
3. 0.0 <= r < 5
Explanation:
can you help me with this question please
Question 5) What is a feature of podcasts?
A.
They rely on airwaves for broadcasting.
B.
They are inexpensive to produce.
C.
They are accessible only within a specific area.
D.
They require video equipment to create.
E.
They allow easy access to documents.
Answer: B
Explanation: They are inexpensive to produce.
Point out the wrong statement:
A. In theory, any application can run either completely or partially in the cloud.
B. The location of an application or service plays a fundamental role in how the application must be written.
C. An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program.
D. None of the mentioned.
Answer:
D. None of the mentioned.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
This ultimately implies that, a software can be defined as a computer program or application that comprises of sets of code for performing specific tasks on the system.
All of the following statements about a software application or program are true and correct;
A. In theory, any application can run either completely or partially in the cloud.
B. The location of an application or service plays a fundamental role in how the application must be written.
C. An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program.
How do you open the Font dialog?
Explanation:
Click the Home tab.
In the Fonts group, click the dialog box launcher button.
The button is found in the lower-right corner of the Font group.
The Font dialog box contains all the commands for formatting text, including quite a few that didn’t find their way into the Font group on the Ribbon. As with all text formatting, the commands you choose in the Font dialog box affect any new text you type or any selected text in your document.
When you’ve finished setting up your font stuff, click the OK button. Or click Cancel if you’re just visiting.
Use the Ctrl+D keyboard shortcut to quickly summon the Font dialog box.
hope my answer helps
pls mark this as brainlist
be sure to follow me and I will follow you back
stay safe
good day
state and explain 5 importance of ICT in an organization
Answer:
Explanation:
ICT simply refers to Information technology and it is the digital technologies used in various sectors to help economic agents make use of information.
The importance of ICT include:
1. Communication: ICT is vital for communicating in organizations as information are spread faster and employees have quicker access to information.
2. Marketing and Sales: ICT is vital for the marketing of products as products can be advertised on social medias etc.
3. Efficiency and effectiveness: There's efficiency and effectiveness on the part of the organization as the needs of the customers are attended to quickly.
4. Improvement in management decision: ICT is also vital in the enhancement of management decisions.
5. It is also vital is the storage of vital data's in the organization.
Saitama And Tatsumaki Both Go Shopping Together ,Both have Have 50 loafs of bread , And Saitama takes 43 , How much do Tatsumaki have left?
Answer:
7
Explanation:
Answer:
7- and a nut
Explanation:
What will be the output of using the element in the given HTML code?
1011 2
A.
10112
B.
10112
C.
21011
D.
21011
Answer:
i think c.
Explanation:
Answer:
Answer is B: 1011 with the two under
Explanation:
I got it right on plato
Describe the major elements and issues with system prototyping
Answer:
Pic attached...
Hope it helps!!!
What is it called when you remove some information from a file or remove a file from the disk ? A) save b) delete c) edit d) remove
Answer:
delete is the answer okkkkkkkkkkkkkkkk
1) Raj wants to create a presentation of 20 slides on MS PowerPoint. He wants that all the slides should have uniform background and theme. Suggest him which option in MS PowerPoint makes it possible.
Which is not a primary function of excel
Explanation:
Word Processor , it's really cra ppy btw
we are writing a program that takes a word and checks how many letters
Answer:
def word_count(word):
return len(word)
a = word_count('scream')
print(a
Explanation:
Using python3:
def word_count(word):
#defines a function named word_count which takes in a single argument which is the word to be counted
return len(word)
#The only thing the function does is to count the number letters in the word.
For instance :
return len(word)
Calling the function and attaching it to the variable named a
Counts the number of letters in scream and assigns the result to a
a = word_count('scream')
print(a)
a gives an output of 6 ; which is the number of letters in scream.
The Binder Prime Company wants to recognize the employee who sold the most of its products during a specified period. Write a query to display the employee number, employee first name, employee last name, email address, and total units sold for the employee who sold the most Binder Prime brand products between November 1, 2017, and December 5, 2017. If there is a tie for most units sold, sort the output by employee last name
Question 12)
What element should the introduction of an effective essay have?
A.
a call to action
B.
a main idea statement
C.
a summary of the topic
D.
evidence to support the details
E.
details to support the topic
Answer:
The introduction of your essay should have the summary of your topic.
Explanation:
You obviously need to know what to write for your essay otherwise you would have no ideas, clues, evidence, or any elaboration for what your writing about. Hope this helps
Which is a monthly cost associated with renting a house?
A utility bills
O B. property tax
O c.security deposit
Identify reasons that web designers had for using tables for layout in the early years of the web. Check all of the boxes that apply.
Using tables ensured the validity of HTML code.
Using tables let web designers mimic print layout.
HTML table code was designed for layout purposes.
Tables could be nested within other tables.
Answer:
2 & 4 and the one to the right of that is 1 & 4
Explanation:
Edge2021
How does an online discussion group differ from one that is held face-to-face?
There is no need for group roles when holding online meetings.
Online discussion groups do not allow members to develop critical-thinking skills.
Group members are more likely to bond together as a group online than they would when meeting face-to-face.
Facilitating an online conversation may require even more work, so that participants continue engaging with one another online.
Answer: they always will have a different thinkage from others
Explanation:Some people need actual in person learning for better grades it also keeps them from getting distracted easily, they have different brains in everyone in the world everyone thinks, acts and talks in different ways some people dont need in person school because they would rather be online wich are both ok so yes they do bond together online but better in person.
Online discussion group differ from one that is held face-to-face as Group members are more likely to bond together as a group online than they would when meeting face-to-face. Thus, option C is correct.
What is software organization?A system that defines how specific activities, in this case, the software development process, are directed to achieve corporate goals is referred to as an organizational structure. These activities could include putting rules, roles, and responsibilities in place.
There are four basic modes of collaboration, as illustrated by the exhibit "The Four Ways to Collaborate": a closed and authoritarian network (an elite circle), an open and hierarchical connectivity (an innovation mall), an open and flat network (an innovation community), and a shuttered and flat network (a consortium).
Groupware is software that allows a group of people to work together on the same system or application, regardless of where they are. Email, newsgroups, and many more are examples of groupware applications.
Thus, option C is correct.
For more details regarding collaborative applications, visit:
brainly.com/question/8453253
#SPJ3
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data in transit between end user devices and the reader in the kiosk. She then uses that information to masquerade as the original end user device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario
Answer:
Nfc relay attack
Explanation:
The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.
This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk
Antivirus is a program that detects error.True or False.
Answer: false
Explanation:
Because it isn't true.
Consider the following field and incomplete method of some class. The method calcTotal is intended to return the sum of all values in vals.
private int[] vals;
public int calcTotal()
{
int total = 0;
/* missing code */
return total;
}
Which of the code segments shown below can be used to replace /* missing code */ so that calcTotal will work as intended?
I.
for (int i : vals)
{
total += i;
}
II.
for (int pos = vals.length; pos > 0; pos--)
{
total += vals[pos];
}
III.
int pos = 0;
while (pos < vals.length)
{
total += vals[pos];
pos++;
}
I only
II only
I and III
II and III
III only
Answer:
I and III
Explanation:
We need a solution that iterates through the each item in the vals array and sums them (cumulative sum). The result should be held in total.
I:
This one uses enhanced for loop (i refers to the each value in vals) and sums the values.
II:
This one uses for loop, but the loop is not constructed well. The control variable of the loop, pos, initially set the length of the vals and the loop iterates while pos is greater than 0. If vals have 10, 20, 30 as values, the length would be 3. In this case, vals[pos] when pos is 3, would give us an error because last index would be 2 in that scenario. Also, you can't access the first value because loop will stop when pos is 0.
III:
This one uses a while loop and iterates each value in the vals and sums them. Note that in this case, the values pos have will be 0, 1, 2 ..., length-1 - which are valid to access each item.
why hackers hack?? in other people?
Answer:
Well, some people are paid, or asked to do so, some are told to by the government, and some do it as a form of protest. White Hat hackers hack people for good purposes, like stopping nuclear bombs and stuff like that, while black hat hackers hack for bad purposes like setting off nuclear bombs and stealing info from other people, and not in a good way.
Explanation:
Your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of:
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A
search engine optimization (SEO).
B
off-site Web analytics.
C
on-site Web analytics.
D
pay-per-click.
Answer:
B. off-site Web analytics.
Explanation:
Marketing can be defined as the process of developing promotional techniques and sales strategies by a firm, so as to enhance the availability of goods and services to meet the needs of the end users or consumers through advertising and market research. The pre-service strategies includes identifying the following target market, design, branding, market research, etc.
Market research can be defined as a strategic technique which typically involves the process of identifying, acquiring and analyzing informations about a business. It involves the use of product test, surveys, questionnaire, focus groups, interviews, etc.
Web analytics refers to a strategic process which typically involves the collection of data, as well as the study of user behavior in an attempt to enhance or boost market share and sales. It is divided into two main categories;
I. on-site Web analytics.
II. off-site Web analytics.
In this scenario, your tasks include identifying competitors, determining your company's market penetration and consulting market research sources. These tasks are examples of off-site Web analytics.
In half-wave rectification process, Vi=
Select one:
a. none of above
b. Vm
c. T/2
d. Sin wt
Answer:
the right answer is
(b.) Vm