Which filter allows you to impart a stamping or raising effect in an image?

Which Filter Allows You To Impart A Stamping Or Raising Effect In An Image?

Answers

Answer 1

Answer:I'm pretty sure it's A

Explanation:

Answer 2
Noise I’m pretty sure

Related Questions

An expression that returns a value is known as a​

Answers

Answer:

In computer programming, a return statement causes execution to leave the current subroutine and resume at the point in the code immediately after the instruction which called the subroutine, known as its return address. The return address is saved by the calling routine, today usually on the process's call stack or in a register. Return statements in many languages allow a function to specify a return value to be passed back to the code that called the function.

An expression that returns a value is known as a​ function. Check more about function  below.

What is a function?

A function is often seen as a kind of expression or rule, or law that often tells more about a relationship.

Conclusively, a function is known to often returns a value back to the instruction that is known also to be the function. This is regarded as the differences that exist between a method and a function.

Learn more about function  from

https://brainly.com/question/20476366

2. What is the implication of media killings in the Philippines?​

Answers

Answer:

Throughout the clarification below, the description of the query is mentioned.

Explanation:

In the Philippines, the Implication of media indicates that perhaps the Philippines isn't a safe environment for reporters, and therefore more remains to be improved to change this pattern.But it didn't start underneath Duterte before you could even say that, as well as he didn't order strikes. If he had instructions in which he would criticize, for perhaps a long period presently Ressa had died as one of his other very resolute and influential media commentators.

Make the following statement True by filling in the blank from the choices below: Reliance on information and communications technologies have ____ potential vulnerabilities to physical and cyber threats and potential consequences resulting from the compromise of underlying systems or networks.

Answers

Answer:

Increased.

Explanation:

An information system interacts with its environment by receiving data in its raw forms and information in a usable format.

Information system can be defined as a set of components or computer systems, which is used to collect, store, and process data, as well as dissemination of information, knowledge, and distribution of digital products.

Generally, it is an integral part of human life because individuals, organizations, and institutions rely on information systems in order to perform their duties, functions or tasks and to manage their operations effectively. For example, all organizations make use of information systems for supply chain management, process financial accounts, manage their workforce, and as a marketing channels to reach their customers or potential customers.

Additionally, an information system comprises of five (5) main components;

1. Hardware.

2. Software.

3. Database.

4. Human resources.

5. Telecommunications.

Reliance on information and communications technologies have increased potential vulnerabilities to physical and cyber threats and potential consequences resulting from the compromise of underlying systems or networks.

In order to mitigate this physical and cyber threats, information systems usually have an encryption, authentication and authorization system integrated into them.

Do any of these algorithms (Random Allocation, Round-Robin, Weighted Round-Robin, Round-Robin DNS Load Balancing, and Least Connections) compromise security?

Answers

Answer:

yes and

Explanation:

why do you need to know about a buildings security are you going to rob it ???

why must a satellite have distinct uplink and downlink frequencies.​

Answers

Answer:

The reason that a satellite must have a distinct uplink and downlink set of frequencies is because they help avoid any type of interference that may occur. The uplink receives the signal and amplifies it so that it can be transmitted to another frequency (downlink).

digital learning can help students who enjoy

structure and face to face interaction
flexibility and independence
homework and test
classrooms and support

Answers

Answer:

B

Explanation:

Hope this helps! :)

The digital learning can help students who enjoy classrooms and support. The correct option is 4.

What is digital learning?

Digital learning can be defined as a type of education in which the internet, a computer, or a network of computers, and softwares are used to connect students and teachers in order to provide educational services.

Digital learning brings together facilities such as classrooms and support in an effort to help and provide the necessary assistance to students who have chosen the digital medium but still enjoy the comfort of structure and face-to-face interaction.

Regardless of their learning style or preference, digital learning can benefit a variety of students.

It offers a variety of tools and resources to improve the learning experience while also accommodating various schedules and needs.

Thus, the correct option is 4.

For more details regarding digital learning, visit:

https://brainly.com/question/20008030

#SPJ7

In order to restrict editing to a document, a user will go to Review, , Restrict Editing, and will then select what kinds of editing are allowed.

Answers

Answer: drafting

Explanation:

Complete the function favoriteFlower(). Note that the program will not run as is because the function is incomplete. The purpose of the function is to determine if the given flower is in the top three of my favorite flowers. The starter file defines a list of favorite flowers that is ordered most favorite to least favorite. Please pass the flower name and the flower list as arguments in the function. The expected output is:

Answers

Answer:

What Language? Once you respond with a comment, I will be happy to write the code for you. I write code 24/7 (Because I have nothing better to do), so I will wait for you to comment. Also is there any pre-existing code?

Explanation:

Which search strategy is most similar to greedy search?

A.
depth-first search
B.
breadth-first search
C.
bidirectional search
D.
uniform-cost search

Answers

Answer:

I think the answer would be A.

Explanation:

If I'm wrong plz let me know (I think I may be wrong)

In ……………cell reference, the reference of a cell does not change. ​

Answers

Answer:

In absolute cell reference, the reference of a cell does not change. 

what is the portrait mode

Answers

Answer:

Explanation:

When your elecronic devices screen is positioned upright or the way a photo is taken

If you want an example look up portrait mode on go0gle or safar1

Assume we have two lists, list A and list B. List A contains the numbers [20,10,20], while list B contains the numbers [40,10,30,20,40,30]. We choose one number from list A randomly and one number from list B randomly. What is the chance that the number we drew from list A is larger than or equal to the number we drew from list B

Answers

Answer:

5/ 18

Explanation:

Given :

List A: [20,10,20]

List B: [40,10,30,20,40,30]

Chance that number drawn from list A is larger than or equal to that drawn dlfrom list B.

If:

A = 20

B ≤ 20 : [10,20] = 2

A = 10

B ≤ 10 : [10] = 1

A = 20

B ≤ 20 : [10,20] = 2

Probability = Required outcome / Total possible outcomes

Hence,

required outcome = (2 + 2 +1) = 5

Total possible outcomes = 3C1 * 6C1 = (3 * 6) = 18

Hence,

chance that the number we drew from list A is larger than or equal to the number we drew from list B

= 5 / 18

In this exercise we have to use the knowledge in computational language in python to describe a code that best suits, so we have:

The code can be found in the attached image.

To make it simpler we can write this code as:

import random

A=[20,10,20]

B=[40,10,30,20,40,30]

print(random.choice(A))

print(random.choice(B))

See more about python at brainly.com/question/19705654

In this assignment we are going to practice reading from a file and writing the results of your program into a file. We are going to write a program to help Professor X automate the grade calculation for a course. Professor X has a data file that contains one line for each student in the course. The students name is the first thing on each line, followed by some tests scores. The number of scores might be different for each student. Here is an example of what a typical data file may look like: Joe 10 15 20 30 40 Bill 23 16 19 22 Sue 8 22 17 14 32 17 24 21 2 9 11 17 Grace 12 28 21 45 26 10 John 14 32 25 16 89 Program details Write a program that: Ask the user to enter the name of the data file. Read the data from the file and for each student calculate the total of the test scores, how many tests the student took, and the average of the test scores. Save the results in an output file (e.g. stats.txt) in the following order: studentName totalScore numberOfTests testAverage Note that the average is saved with 2 decimal places after the decimal point. Validation: Make sure your program does not crash if a file is not found or cannot be open.

Answers

Answer:

In Python:

import os.path

from os import path

fname = input("Filename: ")

if path.exists(fname):

with open(fname) as file_in:

 lines = []

 for line in file_in:

  lines.append(line.rstrip('\n'))

f = open("stat.txt","r+")

f.truncate(0)

f = open("stat.txt", "a")

f.write("Names\tTotal\tSubjects\tAverage\n")

for i in range(len(lines)):

 rowsum = 0; count = 0

 nm = lines[i].split()

 for j in nm:

  if (j.isdecimal()):

   count+=1

   rowsum+=int(j)

 average = rowsum/count

 f.write(nm[0]+"\t %3d\t %2d\t\t %.2f\n" % (rowsum, count, average))

f.close()

else:

print("File does not exist")

Explanation:

See attachment for explanation where comments were used to explain each line

For each student, the sum of the marks, total tests were taken and the average of marks is calculated and is stored in an output file, for example, stats.txt.

Python Code:

The code in Python asks the user for an input file name. If the input file is not found an error is printed else the data in the file is processed further.

Try:

  # take input file name

  file = input('Enter name of the data file: ')

# open the input file

  ip = open(file, 'r')

# store the lines from input file in a list

  lines = ip.readlines()

  # close the file

  ip.close()

# open the output file

  op = open('stats.txt', 'w')

# iterate over each line

  for line in lines:

 # split data using space as delimiter

      data = line.split()

 # get name

   name = data[0]

 # get marks and convert them to integer

      marks = list(map(int, data[1:]))

# get sum of marks

      total = sum(marks)

# get number of tests

      length = len(marks)

# calculate average of marks

      avg = total/length

# add the data to output file

      op.write('{} {} {} {:.2f}\n'.format(name, total, length, avg))

# close the output file

  op.close()

print('Stats have been save in the output file')

# catch FileNotFoundError

except FileNotFoundError:

# print error

  print('Error: that file does not exist. Try again.')

Learn more about the topic python code:

https://brainly.com/question/14492046


2. Which of the following is a shortcut key to Exit from any operation?
a) Ctrl+R
b) Ctrl+Q
c) Ciri-Y

Answers

Answer:

Its b) Ctrl+Q. Hope it helps.

Explanation:

Answer:

ctrl r

Explanation:

ctrl r is redo

For this program you will build a simple dice game called Pig. In this version of Pig, two players alternate turns. Players each begin the game with a score of 0. During a turn a player will roll a six-sided die one or more times, summing up the resulting rolls. At the end of the player's turn the sum for that turn is added to the player's total game score If at any time a player rolls a 1, the player's turn immediately ends and he/she earns O points for that turn (i.e. nothing is added to the player's total game score). This is called "pig". After every roll that isn't a 1, the player may choose to either end the turn, adding the sum from the current turn to his/her total game score, or roll again in an attempt to increase the sum. The first player to 50 points wins the game
Details
Open a text editor and create a new file called pig.py. In the file
Write a function called print_scores that has four parameters - these hold, in this order, the name of the first player (a string), his/her score (an int), the second player's name (a string), and score (an int).
The function will
Print the following message, using the current parameter values for the player names and scores (NOT necessarily Ziggy, 18, Elmer, and 23) -SCORES Ziggy:18 Elmer 23--
Print an empty line before this line
There is a single tab between SCORES and the name of player 1 .
There is a single tab between player 1's score and player 2's name .
Every other gap is a single space

Answers

Answer:

In Python:

import random

p1name = input("Player 1: "); p2name = input("Player 2: ")

p1score = 0; p2score = 0

playerTurn = 1

print(p1name+" starts the game")

roll = True

while(roll):

   if playerTurn == 1:

       p1 = random.randint(1,6)

       print(p1name+"'s roll: "+str(p1))

       if p1 == 1:

           playerTurn = 2

           roll = True

       else:

           p1score+=p1

           another = input("Another Roll (y/n): ")

           if another == "y" or another == "Y":

               roll = True

           else:

               playerTurn = 2

               roll = True

   else:

       p2 = random.randint(1,6)

       print(p2name+"'s roll: "+str(p2))

       if p2 == 1:

           playerTurn = 1

           roll = True

       else:

           p2score+=p2

           another = input("Another Roll (y/n): ")

           if another == "y" or another == "Y":

               roll = True

           else:

               playerTurn = 1

               roll = True

   if p1score >= 50 or p2score >= 50:

       roll = False

print(p1name+":\t"+str(p1score)+"\t"+p2name+":\t"+str(p2score))

Explanation:

Note that the dice rolling is simulated using random number whose interval is between 1 and 6

This imports the random module

import random

This line gets the name of both players

p1name = input("Player 1: "); p2name = input("Player 2: ")

This line initializes the scores of both players to 0

p1score = 0; p2score = 0

This sets the first play to player 1

playerTurn = 1

This prints the name of player 1 to begin the game

print(p1name+" starts the game")

This boolean variable roll is set to True.

roll = True

Until roll is updated to False, the following while loop will be repeated

while(roll):

If player turn is 1

   if playerTurn == 1:

This rolls the dice

       p1 = random.randint(1,6)

This prints the outcome of the roll

       print(p1name+"'s roll: "+str(p1))

If the outcome is 1, the turn is passed to player 2

       if p1 == 1:

           playerTurn = 2

           roll = True

If otherwise

       else:

Player 1 score is updated

           p1score+=p1

This asks if player 1 will take another turn

           another = input("Another Roll (y/n): ")

If yes, the player takes a turn. The turn is passed to player 2, if otherwise

           if another == "y" or another == "Y":

               roll = True

           else:

               playerTurn = 2

               roll = True

If player turn is 2

   else:

This rolls the dice

       p2 = random.randint(1,6)

This prints the outcome of the roll

       print(p2name+"'s roll: "+str(p2))

If the outcome is 1, the turn is passed to player 1

       if p2 == 1:

           playerTurn = 1

           roll = True

If otherwise

       else:

Player 2 score is updated

           p2score+=p2

This asks if player 2 will take another turn

           another = input("Another Roll (y/n): ")

If yes, the player takes a turn. The turn is passed to player 1, if otherwise

           if another == "y" or another == "Y":

               roll = True

           else:

               playerTurn = 1

               roll = True

If either of both players has scored 50 or above

   if p1score >= 50 or p2score >= 50:

roll is updated to False i.e. the loop ends

       roll = False

This prints the name and scores of each player

print(p1name+":\t"+str(p1score)+"\t"+p2name+":\t"+str(p2score))

We can easily improve the formula by approximating the area under the function f(x) by two equally-spaced trapezoids. Derive a formula for this approximation and implement it in a function trapezint2( f,a,b ).

Answers

Answer:

Explanation:

[tex]\text{This is a math function that is integrated using a trapezoidal rule } \\ \\[/tex]

[tex]\text{import math}[/tex]

def [tex]\text{trapezint2(f,a,b):}[/tex]

      [tex]\text{midPoint=(a+b)/2}[/tex]

       [tex]\text{return .5*((midPoint-a)*(f(a)+f(midPoint))+(b-midPoint)*(f(b)+f(midPoint)))}[/tex]

[tex]\text{trapezint2(math.sin,0,.5*math.pi)}[/tex]

[tex]0.9480594489685199[/tex]

[tex]trapezint2(abs,-1,1)[/tex]

[tex]1.0[/tex]

In this exercise we have to use the knowledge of computational language in python to write the code.

the code can be found in the attachment.

In this way we have that the code in python can be written as:

   h = (b-a)/float(n)

   s = 0.5*(f(a) + f(b))

   for i in range(1,n,1):

       s = s + f(a + i*h)

   return h*s

from math import exp  # or from math import *

def g(t):

   return exp(-t**4)

a = -2;  b = 2

n = 1000

result = Trapezoidal(g, a, b, n)

print result

See more about python at brainly.com/question/26104476

Servers can be designed to limit the number of open connections. For example, a server may wish to have only N socket connections at any point in time. As soon as N connections are made, the server will not accept another incoming connection until an existing connection is released. Please write pseudo-code to implement the synchronization using semaphore.

Answers

Answer:

The pseudocode is as follows:

open_server()

connections = N

while (connections>0 and connections <=N):

   if(new_client == connected):

       connections = connections - 1

   for i in 1 to N - connections

   if (client_i == done()):

         releast_client(client_i)

         connections = connections + 1

Explanation:

One of the functions of a semaphore is that, it is a positive variable whose value will never fall below 1. It is often shared among threads in order to keep a process running.

Having said that, what the above pseudocode does is that:

Once the server is opened, it initializes the number of connections to N.

When a new client, the semaphore decreases the number of connections is reduced by 1.

Similarly, when an already connected client is done, the client is released and the number of connections is increased by 1.

This operation is embedded in a while loop so that it can be repeatedly carried out.

Which are technical and visual demands
that need to be considered when
planning a project?

Answers

Answer: Resolution or DPI, deliverables, and file types are important technical and visual demands to consider when planning a project.

Explanation: Keep in mind whether or not the project will be published in print or on the Web.

Extend the class linkedListType by adding the following operations: Write a function that returns the info of the kth element of the linked list. If no such element exists, terminate the program. Write a function that deletes the kth element of the linked list. If no such element exists, terminate the program.

Answers

Answer:

Explanation:

The following code is written in Java. Both functions traverse the linkedlist, until it reaches the desired index and either returns that value or deletes it. If no value is found the function terminates.

public int GetNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.data;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

public int removeNth(int index)

       {

       Node current = head;

       int count = 0;

       while (current != null)

       {

       if (count == index)

       return current.remove;

       count++;

       current = current.next;

       }

       assert (false);

       return 0;

       }

Write an expression that will cause the following code to print "less than 18" if the value of userAge is less than 18.
import java.util.Scanner;
public class AgeChecker {
public static void main (String [] args) {
int userAge;
Scanner scnr = new Scanner(System.in);
userAge = scnr.nextInt(); // Program will be tested with values: 18, 19, 20, 21.
if (/* Your solution goes here */) {
System.out.println("less than 18");
}
else {
System.out.println("18 or more");
}
}
}

Answers

Answer:

Replace /* Your solution goes here */

with: userAge<18

Explanation:

Required

Complete the code

To complete the code, we simply write an expression that compares userAge and 18

From the question, we are to test if userAge is less than 18.

In C++, less than is written as: <

So, the expression that completes the code is: userAge<18

does anybody know how to do 6.3 code practice on edhesive. NEED ASAP!!!​

Answers

Answer:

Hopes this helps if not comment and I'll change it

Explanation:

import simplegui

import random

def draw_handler(canvas):

for i in range (0, 1000):

x = random.randint(1, 600)

y = random.randint(1, 600)

r = random.randint(0, 255)

g = random.randint(0, 255)

b = random.randint(0, 255)

color = "RGB( " + str(r) + "," + str(g) + "," + str(b) + ")"

canvas.draw_point((x, y), color)

frame = simplegui.create_frame('Points', 600, 600)

frame.set_canvas_background("Black")

frame.set_draw_handler(draw_handler)

frame.start()

what is computer sences​

Answers

Answer:

Computer science is the study of computers and computing as well as their theoretical and practical applications. Computer science applies the principles of mathematics, engineering, and logic to a plethora of functions, including algorithm formulation, software and hardware development, and artificial intelligence.

Look at the following assignment statements:

word1 = "rain"
word2 = "bow"

What is the correct way to concatenate the strings?

1 newWord = word1 == word2

2 newWord = word1 + word2

3 newWord = word1 * word2

4 newWord = word1 - word2

Answers

Answer: number 2 is the correct way to do it

Explanation:

Answer:

2 newWord = word1 + word2

Explanation:

8
A
Remains samo
Increases
Fluctuates
Decreases
9.
If the forward voltage in a diode is increased, the width of depletion region
Federal Board Past Board Paper 20/20
B
D.
The half life of 191 sr is 9.70 hours. What is decay constant?
A. 1.99x10 *s-
B
1.99x10's.'
D.
The ratio of minimum to maximum wavelength in Balmer series is:
A. 1/4
B.
5/9
D. 5/36
When a battery of cmf "E" and internal resistance "r" is connected across external
1.6x1045-1
1.69x 651
10
3/4
11
1
B.
D.
13.
B.
resistance R, the power consumed in R is max when T/R is
A. 1/2
C.
0
12.
A consequence of Einstein's theory of relativity is:
A.
moving clocks run more slowly than when they are at rest.
B moving rods are longer than when they are at rest.
light exhibits both wave and particle properties.
the laws of physics must appear the same to all observers moving with
uniforın velocity relative to each other.
If input power and output power of an electric motor are 540 W and 382 W
respectively. Then the efficiency is:
A. 100%
91%
C. 71%
D. 51%
14.
A wire has a resistance of 121. It is bent in the form of a circle. The effective
resistance between the two points on any diameter of the circle is:
A. 12Ω
2412
C. 612
D. 302
15.
The constant a of a transistor is 0.95. What would be the change in the collector
current corresponding to a charge of 0.4 mA in the base current in common-
emitter arrangement?
A. 8.6 mA
B. 7.6 mA
C. 10.6 mA
D. 10 mA
B.
16.
The velocity at which the relativistic length of a body reduces to half of its
original length is:
A. V =
B. V =
узс
C. V
D.
V =
2
3c
2
2
C
17.
The speed of electrons in 2nd Bohr orbit is:
A. 1.095 x106m/s
B.
C. 2.19 x 108m/s
D.
1.92 x106m/s
13.6 x107m/s.​

Answers

Answer:

i need more

Explanation:

i need more

Write a function which takes in a list lst, an argument entry, and another argument elem. This function will check through each item present in lst to see if it is equivalent with entry. Upon finding an equivalent entry, the function should modify the list by placing elem into the list right after the found entry. At the end of the function, the modified list should be returned. See the doctests for examples on how this function is utilized. Use list mutation to modify the original list, no new lists should be created or returned.

Answers

Answer:

Explanation:

The following code was written in Python and creates a function called add_elements . Whenever it finds the value within the lst that has the same entry it inserts the elem variable right infront of the entry within the list and breaks out of the loop. Finally, the function returns the newly modified list back to the user.

def add_element(lst, entry, elem):

   for value in lst:

       if value == entry:

           lst.insert(lst.index(value) + 1, elem)

           break

   return lst

In this exercise we have to use the knowledge of computational language in python to write the code.

the code can be found in the attachment.

In this way we have that the code in python can be written as:

def add_element(lst, entry, elem):

  for value in lst:

      if value == entry:

          lst.insert(lst.index(value) + 1, elem)

          break

  return lst

See more about python at brainly.com/question/26104476

1. Create a Java program.
2. The class name for the program should be 'EncryptTextMethods'.
3. In the program you should perform the following:
* You will modify the EncryptText program created in a previous assignment (see code below).
* You should move the logic for encrypting text from the main method into a method named encryptString.
* The encryptString method should have a single String argument and return a String value.
1. Create a second method.
2. The name of the method should be decryptString.
3. In the program you should perform the following:
* The method should have a single String argument and return a String value.
* This method should reverse the encryption process by subtracting one from each character in the String argument passed to it.
* The return value should be the result of the decrypting process.
4.The program should read an input String using the Scanner method.
5. The input value should be passed to the encryptString() method and the encrypted string should be passed to the decryptString() method.
6. The program should output the input string, the encrypted string and the decrypted string.
// Existing Code
import java.util.Scanner;
public class EncryptText {
private static String encodeMessage(String message) {
//convert string to character array
char stringChars[] = message.toCharArray();
//for each character
for(int i=0; i< stringChars.length; i++) {
char ch = stringChars[i];
//if character within range of alphabet
if(ch <= 'z' && ch >= 'a') {
//obtain the character value
//add 1 to the integer value
//enter modulus by 26 since z will become a
//once again add the remainder to 'a'
stringChars[i] = (char)('a' + ((int)(ch - 'a') + 1) % 26 );
}
}
//construct the string message
return String.valueOf(stringChars);
}
public static void main(String[] args) {
Scanner keyboard = new Scanner(System.in);
System.out.println("Please enter text to encode: ");
String message = keyboard.nextLine();
message = message.toLowerCase();
System.out.println("Encoded: " + encodeMessage(message));
keyboard.close();
}
}

Answers

Answer:

Explanation:

The following code was written in Java and follows all of the instructions provided. Some instructions were most likely written incorrectly as following them made no sense and would not allow the program to run. Such as placing the main method code into the encryptString method. Since the code inside the main method needed to stay inside the main method for the program to function accordingly. The code that most likely needed to be moved was the EncryptText code to the encryptString method.

package sample;

import java.util.Scanner;

class EncryptTextMethods {

   private static String encryptMessage(String message) {

       //convert string to character array

       char stringChars[] = message.toCharArray();

       //for each character

       for(int i=0; i< stringChars.length; i++) {

           char ch = stringChars[i];

           //if character within range of alphabet

           if(ch <= 'z' && ch >= 'a') {

           //obtain the character value

           //add 1 to the integer value

           //enter modulus by 26 since z will become a

           //once again add the remainder to 'a'

               stringChars[i] = (char)('a' + ((int)(ch - 'a') + 1) % 26 );

           }

       }

       //construct the string message

       return String.valueOf(stringChars);

   }

   public static String decryptString(String message) {

       char stringChars[] = message.toCharArray();

       String decrypted = "";

       for (int x = 0; x < stringChars.length; x++) {

           int charValue = stringChars[x];

           decrypted += String.valueOf( (char) (charValue - 1));

       }

       return decrypted;

   }

   public static void main(String[] args) {

       Scanner keyboard = new Scanner(System.in);

       System.out.println("Please enter text to encode: ");

       String message = keyboard.nextLine();

       message = message.toLowerCase();

       String encrypted = encryptMessage(message);

       String decrypted = decryptString(encrypted);

       System.out.println("Original Message: " + message);

       System.out.println("Encrypted: " + encrypted);

       System.out.println("Decrypted: " + decrypted);

       keyboard.close();

   }

}

Create a change-counting game that gets the user to enter the number of coins required to make exactly one dollar. The program should prompt the user to enter the number of pennies, nickels, dimes, and quarters and immediately verify whether they are positive integer numbers. If the total value of the coins entered is equal to one dollar, the program should congratulate the user for winning the game. Otherwise, the program should display a message indicating whether the amount entered was more than or less than one dollar.

Answers

Answer:

In Python:

pennies= int(input("Pennies: "))

while pennies<0:

   pennies= int(input("Pennies: "))

nickels = int(input("Nickels: "))

while nickels < 0:

   nickels = int(input("Nickels: "))

dimes = int(input("Dimes: "))

while dimes < 0:

   dimes = int(input("Dimes: "))

quarters = int(input("Quarters: "))

while quarters < 0:

   quarters = int(input("Quarters: "))

dollars = pennies * 0.01 + nickels * 0.05 + dimes * 0.1 + quarters * 0.25

if dollars == 1:

   print("Congratulations")

else:

   if dollars > 1:

       print("More than $1")

   else:

       print("Less than $1")

Explanation:

Prompts the user for pennies and also validates for positive values

pennies= int(input("Pennies: "))

while pennies<0:

   pennies= int(input("Pennies: "))

Prompts the user for nickels and also validates for positive values

nickels = int(input("Nickels: "))

while nickels < 0:

   nickels = int(input("Nickels: "))

Prompts the user for dimes and also validates for positive values

dimes = int(input("Dimes: "))

while dimes < 0:

   dimes = int(input("Dimes: "))

Prompts the user for quarters and also validates for positive values

quarters = int(input("Quarters: "))

while quarters < 0:

   quarters = int(input("Quarters: "))

Calculate the amount in dollars

dollars = pennies * 0.01 + nickels * 0.05 + dimes * 0.1 + quarters * 0.25

Check if amount is $1

if dollars == 1:

If yes, prints congratulations

   print("Congratulations")

If otherwise, print greater of less than $1

else:

   if dollars > 1:

       print("More than $1")

   else:

       print("Less than $1")

You have one address, 196.172.128.0 and you want to subnet that address. You want 10 subnets. 1. What class is this address

Answers

Answer:

This address is by default a class c network

Explanation:

This IP address in this question is a class c network because it has 196 as its first octet. A class c network is one which has its first octet to be between 192 and 223. the class c network begins with a 110 binary.  If ip is between 192 to 223 it belongs to this class. These first 3 octets are the representation of the network number in the address. Class c's were made to support small networks initially.

A low price point is an example of a ________. Choose one.

Answers

Answer:

of a bad product

Explanation:

Which of the followings is/are true about RISC (Reduced instruction set computing)?

a. RISC (Reduced instruction set computing) architecture has a set of instructions, so high-level language compilers can produce more efficient code
b. It allows freedom of using the space on microprocessors because of its simplicity.
c. Many RISC processors use the registers for passing arguments and holding the local variables.
d. RISC functions use only a few parameters, and the RISC processors cannot use the call instructions, and therefore, use a fixed length instruction which is easy to pipeline.
e. All of the above.

Answers

Answer:

e. All of the above.

Explanation:

An instruction set architecture (ISA) can be defined as series of native memory architecture, instructions, addressing modes, external input and output devices, virtual memory, and interrupts that are meant to be executed by the directly.

Basically, this set of native data type specifies a well-defined interface for the development of the hardware and the software platform to run it.

The two (2) main types of architectural design for the central processing unit (CPU) are;

I. Complex instruction set computing (CISC): it allows multi-step operation or addressing modes to be executed within an instruction set. Thus, many low-level operations are being performed by an instruction.

II. Reduced instruction set computing (RISC): it allows fixed length instructions and simple addressing modes that can be executed within a clock cycle.

All of the following statements are true about RISC (Reduced instruction set computing) because they are its advantages over complex instruction set computing (CISC);

a. RISC (Reduced instruction set computing) architecture has a set of instructions, so high-level language compilers can produce more efficient code.

b. It allows freedom of using the space on microprocessors because of its simplicity.

c. Many RISC processors use the registers for passing arguments and holding the local variables.

d. RISC functions use only a few parameters, and the RISC processors cannot use the call instructions, and therefore, use a fixed length instruction which is easy to pipeline.

The options that are true about RISC (Reduced instruction set computing) is; E: all of the above

We are dealing with instruction set computing which is a sequence of instructions, addressing modes, external input & output devices, virtual memory, and other interruptions that are designed to be executed by the user directly.

Now, in architectural design meant for the central processing unit (CPU) the benefit of a Reduced instruction set computing (RISC) is that it is a type that allows for a fixed length of instructions with simple addressing styles that can be executed within a clock cycle.

Looking at all the given options, we can say they are all true about RISC (Reduced instruction set computing) as they possess advantages over the other type of instruction set computing called complex instruction set computing (CISC).

Read more about instruction set computing at; https://brainly.com/question/17493537

Other Questions
Salt is an ionic compound that is produced when a cation and an anion from an acid-base reaction combine, and solutions of salts can be neutral, acidic, or basic, depending on the acid-base properties of the constituent cations and anions.a. Trueb. False PLZ HURRY Read the opening paragraph of Megans short story: I was eleven years old when I first realized that I was different from everyone else. As a girl growing up with only brothers, I could slug a baseball, hold my own in a rough-and-tumble game of tag football, and skate backward like my older brother. Sure, I played with dolls, too, and I really liked my dancing lessons. But most of all, I felt okay about me. Then something happened. I became the new kid in a new school; I became the kid nobody liked. And I didnt know why. Which of the following sentences is a conclusion that points back to the introduction of Megans story? A. I left school without a backward glance, knowing Id never have to go back. Goodbye and good riddance was all I could say. B. By my last year of high school, things had started to turn around. But by then, I no longer cared. I knew where I was going and what I was going to be. C. I learned that being an outsider isnt necessarily all bad. Im now stronger for it. I know and like who I am. Im not sure my tormentors can say the same about themselves. D. The air smelled like freedom on that last day of school. I emptied my locker, packed up my stuff, and sprinted off toward home on feet that barely touched the hot sidewalk. HELP PLEASE ANYONE STEP BY STEP TIMED Help me please with both of them If a 20 g cannonball is shot from a 5 kg cannon with a velocity of 100m/s, then the speed of recoil of the cannon is -0.4 m/s. true or false? WILL MAKE BRAINLIEST!!!what is the slope of each line? 1. Create a Java program.2. The class name for the program should be 'EncryptTextMethods'.3. In the program you should perform the following: * You will modify the EncryptText program created in a previous assignment (see code below). * You should move the logic for encrypting text from the main method into a method named encryptString. * The encryptString method should have a single String argument and return a String value.1. Create a second method.2. The name of the method should be decryptString.3. In the program you should perform the following: * The method should have a single String argument and return a String value. * This method should reverse the encryption process by subtracting one from each character in the String argument passed to it. * The return value should be the result of the decrypting process.4.The program should read an input String using the Scanner method.5. The input value should be passed to the encryptString() method and the encrypted string should be passed to the decryptString() method.6. The program should output the input string, the encrypted string and the decrypted string.// Existing Codeimport java.util.Scanner;public class EncryptText {private static String encodeMessage(String message) {//convert string to character arraychar stringChars[] = message.toCharArray();//for each characterfor(int i=0; i< stringChars.length; i++) {char ch = stringChars[i];//if character within range of alphabetif(ch = 'a') {//obtain the character value//add 1 to the integer value//enter modulus by 26 since z will become a//once again add the remainder to 'a'stringChars[i] = (char)('a' + ((int)(ch - 'a') + 1) % 26 );}}//construct the string messagereturn String.valueOf(stringChars);}public static void main(String[] args) {Scanner keyboard = new Scanner(System.in);System.out.println("Please enter text to encode: ");String message = keyboard.nextLine();message = message.toLowerCase();System.out.println("Encoded: " + encodeMessage(message));keyboard.close();}} Crash course world history #241. Which continent had a long history of trading slaves?2. On what part of the body did slave owners brand their newslaves?3. True or false: Many slaves in history had lives of greatpower, wealth, and influence.4. Who believed that some people were just naturally slaves?5. were the first to import large number ofBantu speaking Africans to their territory as slaves.6. True or false: The Muslims helped define the attitudes that characterized Atlantic slavery.Part C: Summary (4-6 sentences) Appearance of dry , scaly lesions with itching on various parts of the body are the Symptoms of_______plz I beg u I stuck in biology..... response will be saved automatically.Three students performed a science experiment using sugar and a beaker.The beaker contained 570.3 grams of sugar before the experimentstarted. During the experiment, each of the 3 students removed 42.34grams of sugar from the beaker.How much sugar, in grams, was left in the beaker at the end of theexperiment?Show your work.AnswergramsBT>x Please help me with the math please? Help me please?!?! Name one way a federal government program helped the Toso Family. There is a theory that children wearing superhero costumes are more likely to harm themselves because of the unrealistic impressions of invincibility that these costumes could create. Below there is data about the severity of injury (on a scale from 0, no injury, to 100, death) for children reporting to the emergency center at hospitals and information on which superhero costumes they were wearing (Spiderman, Superman, Batman).Spiderman Superman Batman55 68 2631 32 4758 85 3020 69 3547 58 5337 52 43Compute the following descriptive statistics for each group. (30 points total) a. Mean b. Sample size (n) for each group c. Standard Deviation d. Square root of n e. Standard error of the mean (SEM) Los barbijos de tela, a diferencia de los quirrgicos, poseen una filtracin de partculas de aproximadamente 0.000003979 [m]. Expresar dicho valor en notacin cientfica, de tal forma que tenga solo dos decimales 1:What is the area of the right triangle in this coordinate plane?235689A Which statement about the carbon cycle is most true?A. Energy is destroyed when organic matter decays.B. The total mass of carbon on Earth is always increasing.C. Carbon is lost from the cycle when it enters the atmosphere.D. Carbon changes form, but the total amount on Earth remains the same Researchers used DNA sequencing techniques to find similarities of Hox genes in roundworms, arthropods, mollusks, echinoderms, cephalochordates, and vertebrates. What did they find out about these genes? Select all that apply. A. Hox genes provide information about evolutionary relationships. B. Similarities among Hox genes suggest that they all arose from a single ancestral gene that duplicated many times. C. Hox genes are regulatory genes that determine body plans of animals. D. Only some animals that have been tested have Hox genes, suggesting that Hox genes have no function and only evolved recently. why can the hydrgoen ions not freely pass throufh the membrane without ATP synthase The graph of a sine function is shown. Plot the line that represents the midline of this periodic function.