Which of the following is important to optimize your Website for viewing on mobile devices?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

Use more images than text to take advantage of mobile device technology.
B

Target the user who wants to browse.
C

Optimize your site to a larger screen size.
D

Keep your Webpages simple and uncluttered.

Answers

Answer 1
its messy i cant tell which one is d and b

Related Questions

Antivirus is a program that detects error.True or False.​

Answers

Answer:  false

Explanation:

Because it isn't true.

Write a program that calculates the amount of money in a savings account that earns a guaranteed yearly interest rate. The program will accept from the user the account is present value (i.e. what is in the savings account now), the annual interest rate (in a percentage), and the number of years the money will be left in the account (years). The program should display the savings account future value and the number of years the money will be left in the account.

Answers

Solution :

# Reading principle amount from user

[tex]$\text{accountPresentValue}$[/tex] = eval([tex]$\text{inpu}t("$[/tex]Enter principle amount: "))

# Reading time duration in number of year from user

years = eval(input("Enter time duration in number of year: "))

# Reading interest rate from user

annualInterestRate = eval(input("Interest rate: "))

# calculating futureValue using user input data

futureValue = accountPresentValue * (1 + annualInterestRate / 100) ** years

# printing calculated futureValue to console

print("Final balance =",futureValue)

Alyssa Steiner volunteers at an animal shelter and helps with their fundraising efforts. She has shot a video of the animals and wants to post it on the web to encourage donations. However, the video she shot is a huge MOV file. What can Alyssa do to reduce the size of the video to about 20 MB so it loads quickly on the shelter’s webpage?

Answers

Answer:

See Explanation

Explanation:

Required

What to do, to upload a large video on a webpage

Alyssa has several options to pick from, one of which is to divide the videos into various segments and then upload each segment separately or to compress the huge MOV file and then upload.

Of the two options I highlighted in the first paragraph, the best is to compress the video using a video compressor software and then upload the compressed video.

Also;  MOV files are always huge files, she could convert the video file from MOV file format to mp4 or other compatible video formats. However, this will reduce the video quality (though the reduction may not be visible).

(1) Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output those four values on a single line separated by a space. (2 pts) Note: This zyLab outputs a newline after each user-input prompt. For convenience in the examples below, the user's input value is shown on the next line, but such values don't actually appear as output when the program runs. Enter integer: 99 Enter double: 3.77 Enter character: 2 Enter string: Howdy 99 3.77 z Howdy (2) Extend to also output in reverse (1 pt) Enter integer: 99 Enter double 3.77 Enter characteri Enter string: Howdy 99 3.772 Howdy Howdy z 3.77 99 (3) Extend to cast the double to an integer, and output that integer (2 pts) 0 en soa Enter integer: 99 Enter double: 3.77 Enter character: 2 Enter string: Howdy 99 3.77 z Howdy Howdy z 3.77 99 3.77 cast to an integer is 3 LAB ACTIVITY 14.1.1: Prog 1: Variables, input, and casting 0/5 BasicInput.java Load default template. 1 ort java.util.Scanner: 2 3 lic class Basic Input I 4 public static void main(String args) { 5 Scanner ser-new Scanner(System.in); 6 int userint; 7 double userDouble; B // FTOME Define chor and string variables similarly 9 char UserChar: 10 String userString: 11 12 System.out.println("Enter integer"): 13 user Int - ser.nextInto: 14 15 // FTXMC (1): Finish reading other items inte variables, then output the four values on a single line separated by a space

Answers

Answer:

import java.util.*;

public class Main{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

 int intgVal; double dblVal; char chrVal; String strVal;

 System.out.print("Enter integer: ");  

 intgVal = input.nextInt();

 System.out.print("Enter double: ");  

 dblVal = input.nextDouble();

 System.out.print("Enter character: ");  

 chrVal = input.next().charAt(0);

 input.nextLine();

 System.out.print("Enter string: ");  

 strVal = input.nextLine();

 System.out.println(intgVal+" "+dblVal+" "+chrVal+" "+strVal);

 System.out.println(strVal+" "+chrVal+" "+dblVal+" "+intgVal);

 int IntValue = (int) dblVal;

 System.out.print("Cast to an integer: "+IntValue);

}

}

Explanation:

See attachment for complete program where comments were used to explain each line of the program

An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data in transit between end user devices and the reader in the kiosk. She then uses that information to masquerade as the original end user device and establish an NFC connection to the kiosk. What kind of attack has occurred in this scenario

Answers

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

What is result of executing the following code?
public class Question11 {
private static int x = 1;
public static void main(String[] args) {
int x = 5;
System.out.printf("local x in main is %d%n", x);
useLocalVariable();
useField();
useLocalVariable();
useField();
System.out.printf("%nlocal x in main is %d%n", x);
}
public static void useLocalVariable() {
int x = 25;
System.out.printf(
"%nlocal x on entering method useLocalVariable is %d%n", x);
++x;
System.out.printf(
"local x before exiting method useLocalVariable is %d%n", x);
}
public static void useField() {
System.out.printf(
"%nfield x on entering method useField is %d%n", x);
x *= 10; // modifies class Scope’s field x
System.out.printf(
"field x before exiting method useField is %d%n", x);
}
}

Answers

Answer:

Explanation:

With the main method int the question calling the useLocalVariable and useField variable various times and then also printing out the variable using the printf method. The output of executing this code would be the following...

local x in main is 5

local x on entering method useLocalVariable is 25

local x before exiting method useLocalVariable is 26

field x on entering method useField is 1

field x before exiting method useField is 10

local x on entering method useLocalVariable is 25

local x before exiting method useLocalVariable is 26

field x on entering method useField is 10

field x before exiting method useField is 100

local x in main is 5


8. Explain what the following spredications of a monitor refer to their significance for the user and how
they are measured:
b) 1800 / 900

Answers

Answer:

A computer monitor is an output device that displays information in pictorial form. A monitor usually comprises the visual display, circuitry, casing, and power supply. The display device in modern monitors is typically a thin film transistor liquid crystal display (TFT-LCD) with LED backlighting having replaced cold-cathode fluorescent lamp (CCFL) backlighting. Previous monitors used a cathode ray tube (CRT). Monitors are connected to the computer via VGA, Digital Visual Interface (DVI), HDMI, DisplayPort, USB-C, low-voltage differential signaling (LVDS) or other proprietary connectors and signals.

Originally, computer monitors were used for data processing while television sets were used for entertainment. From the 1980s onwards, computers (and their monitors) have been used for both data processing and entertainment, while televisions have implemented some computer functionality. The common aspect ratio of televisions, and computer monitors, has changed from 4:3 to 16:10, to 16:9.

Modern computer monitors are easily interchangeable with conventional television sets and vice versa. However, as computer monitors do not necessarily include integrated speakers nor TV tuners (such as Digital television adapters), it may not be possible to use a computer monitor as a TV set without external components.[1]

History

Early electronic computers were fitted with a panel of light bulbs where the state of each particular bulb would indicate the on/off state of a particular register bit inside the computer. This allowed the engineers operating the computer to monitor the internal state of the machine, so this panel of lights came to be known as the 'monitor'. As early monitors were only capable of displaying a very limited amount of information and were very transient, they were rarely considered for program output. Instead, a line printer was the primary output device, while the monitor was limited to keeping track of the program's operation.[2]

Computer monitors were formerly known as visual display units (VDU), but this term had mostly fallen out of use by the 1990s.

Technologies

Further information: Comparison of CRT, LCD, Plasma, and OLED and History of display technology

Multiple technologies have been used for computer monitors. Until the 21st century most used cathode ray tubes but they have largely been superseded by LCD monitors.

Cathode ray tube

Main article: Cathode ray tube

The first computer monitors used cathode ray tubes (CRTs). Prior to the advent of home computers in the late 1970s, it was common for a video display terminal (VDT) using a CRT to be physically integrated with a keyboard and other components of the system in a single large chassis. The display was monochrome and far less sharp and detailed than on a modern flat-panel monitor, necessitating the use of relatively large text and severely limiting the amount of information that could be displayed at one time. High-resolution CRT displays were developed for the specialized military, industrial and scientific applications but they were far too costly for general use.

Some of the earliest home computers (such as the TRS-80 and Commodore PET) were limited to monochrome CRT displays, but color display capability was already a standard feature of the pioneering Apple II, introduced in 1977, and the speciality of the more graphically sophisticated Atari 800, introduced in 1979. Either computer could be connected to the antenna terminals of an ordinary color TV set or used with a purpose-made CRT color monitor for optimum resolution and color quality. Lagging several years behind, in 1981 IBM introduced the Color Graphics Adapter, which could display four colors with a resolution of 320 × 200 pixels, or it could produce 640 × 200 pixels with two colors. In 1984 IBM introduced the Enhanced Graphics Adapter which was capable of producing 16 colors and had a resolution of 640 × 350.[3]

By the end of the 1980s color CRT monitors that could clearly display 1024 × 768 pixels were widely available and increasingly affordable. During the following decade, maximum display resolutions gradually increased and prices continued to fall. CRT technology remained dominant in the PC monitor market into the new millennium partly because it was cheaper to produce and offered to view angles close to 180°.[4] CRTs still offer some image quality advantages[clarification needed] over LCDs but improvements to the latter have made them much less obvious. The dynamic range of early LCD panels was very poor, and although text and other motionless graphics were sharper than on a CRT, an LCD characteristic known as pixel lag caused moving graphics to appear noticeably smeared and blurry.

Explanation:

Point out the wrong statement:
A. In theory, any application can run either completely or partially in the cloud.
B. The location of an application or service plays a fundamental role in how the application must be written.
C. An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program.
D. None of the mentioned.

Answers

Answer:

D. None of the mentioned.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

This ultimately implies that, a software can be defined as a computer program or application that comprises of sets of code for performing specific tasks on the system.

All of the following statements about a software application or program are true and correct;

A. In theory, any application can run either completely or partially in the cloud.

B. The location of an application or service plays a fundamental role in how the application must be written.

C. An application or process that runs on a desktop or server is executed coherently, as a unit, under the control of an integrated program.

What is the first step in finding a solution to a problem? Choose a solution. Think of options to solve the problem. Try the solution. Turn the problem into a question.\

Answers

Answer: Summarize the six steps of the problem solving process.

Explanation:

Answer:

turn the problem into a question

Explanation:

I got it right on a test!

The rhythmic note that three beats is called a____half note.

Answers

Answer:

it is called a dotted half note

Answer:
Dotted half note

is a device connected to a sound card in the system.

Answers

Answer:

Yes

Explanation:

A sound card (also known as an audio card) is an internal expansion card that provides input and output of audio signals to and from a computer under control of computer programs. The term sound card is also applied to external audio interfaces used for professional audio applications.

The cash register program will have items. For each item, the name and cost are saved. For a transaction, it will accept any number of items (not known in advance) and any number of payments of different payment types (not known in advance). For each transaction, it calculates the total including a 7% sales tax and keeps prompting for a payment until the total has been paid. It also determines if any change is required. Thus, a transaction is responsible for calculating the amount of money that needs to be paid, accepting money, and generating a receipt. A receipt holds information about a transaction so that it can display how much each item cost, how the transaction was paid for, etc. (see example outputbelow).Payment type includes CASH, DEBIT_CARD, CREDIT_CARDandCHECK. Each payment consists of an amount and payment type
Hints
1. All fields should be private.
2. The PaymentType class should be an enum class with values: CASH, DEBIT_CARD, CREDIT_CARD, CHECK
3. Payment type information should not print the enum directly
4. Use final to store the transaction for each receipt.
5. Output:
A. The values for subtotal, tax, total, and payment information are all aligned. You can achieve this by using the tab character '\t' in your Strings. The item lines do not need to be aligned.
B. Do not worry about only using 2 decimal places. Let Java decide how many decimal places to use.
6. Create a main class to house the main method. In the main method, create some items, a transaction, and display the receipt.
A. Example outputs
Example: Pay everything with one payment
Transaction listing the items and asking for payment:
Item 1: apple: 0.5
Item 2: pear: 0.75
Item 3: pineapple: 0.75
Total: 2.14
Please enter payment type.
1. Cash
2. Debit card
3. Credit card
4. Check
2
Enter the amount to pay with this type.
2.14
Total after payment: 0.0
Receipt printed:
apple: 0.5
pear: 0.75
pineapple: 0.75
----------------------------------------------------------
Subtotal:
Tax:
Total:
Debit:
Change: 2.0 0.14 2.14 2.14 0.0
Example: Paying with multiple payments and payment type
Item 1: refrigerator: 800.71
Total: 856.7597000000001
Please enter payment type.
1. Cash
2. Debit card
3. Credit card
4. Check
1
Enter the amount to pay with this type.
400
Total after payment: 456.75970000000007
Please enter payment type.
1. Cash
2. Debit card
3. Credit card
4. Check
2
Enter the amount to pay with this type.
475
Total after payment: -18.240299999999934
refrigerator: 800.71
3
Subtotal: 800.71
Tax: 56.04970000000001
Total: 856.7597000000001
Cash: 400.0
Debit: 475.0
Change: 18.240299999999934
Example: Using the same payment type multiple times
Item 1: apple: 0.5
Item 2: pear: 0.75
Item 3: pineapple: 0.75
Total: 2.14
Please enter payment type.
1. Cash
2. Debit card
3. Credit card
4. Check
1
Enter the amount to pay with this type.
1.25
Total after payment: 0.8900000000000001
Please enter payment type.
1. Cash
2. Debit card
3. Credit card
4. Check
1
Enter the amount to pay with this type.
10.50
Total after payment: -9.61
apple: 0.5
pear: 0.75
pineapple: 0.75
Subtotal: 2.0
Tax : 0.14
Total: 2.14
Cash: 1.25
Cash: 110.5
Change: 9.61

Answers

Answer:

Explanation:

package sample;

import java.util.Scanner;

public class Main extends newOrder{

   public static void main(String[] args) {

       newOrder order = new newOrder();

       order.newOrder("apple", 0.5);

       order.newOrder("pear", 0.75);

       order.newOrder("pineapple", 0.75);

       double newTotal = order.getTotal();

       order.printItems();

       order.printTotal();

       while (newTotal != 0) {

           Scanner in = new Scanner(System.in);

           System.out.println("Please enter payment type.\n" + "Cash \nDebit card \nCredit card \nCheck");

           String paymentType = in.nextLine();

           System.out.println("Enter the amount to pay with this type: ");

           double amount = in.nextDouble();

           newTotal -= amount;

           System.out.println("Total after payment: " + newTotal);

       }

       System.out.println("Receipt Printed:");

       order.printItems();

       order.printSubtotal();

       System.out.println("Tax: 7%");

       order.printTotal();

   }

}

------------------------------------------------------------------------------------------------------------

package sample;

public enum PaymentType {

   CASH, DEBIT_CARD, CREDIT_CARD, CHECK

}

-----------------------------------------------------------------------------------------------------------

package sample;

import java.util.HashMap;

class newOrder {

   private String name;

   private double cost;

   private double total;

   private double subtotal;

   HashMap<String, Double> itemList = new HashMap<>();

   public void newOrder(String name, double cost) {

       this.name = name;

       this.cost = cost;

       this.total += cost;

   }

   

   public void printItems() {

       for (String i: itemList.keySet()) {

           System.out.println( i + ": \t" + itemList.get(i));

       }

   }

   public double getTotal() {

       return (total * 1.07);

   }

   public void printSubtotal() {

       for (double i : itemList.values()) {

           subtotal += i;

       }

       System.out.println("Subtotal: " + subtotal);

   }

   

   public void printTotal() {

       double total = subtotal * 1.07;

       System.out.println("Total: " + total);

   }

}

The following are the CPU and I/O behavior of three processes, timings in seconds.
Process P1 has 1 second CPU burst followed by 3s I/O followed by 1s CPU burst
Process P2 has 2 second CPU burst followed by 2s I/O followed by 2s CPU burst
Process P2 has 4 second CPU burst followed by 1s I/O followed by 4s CPU burst
Please provide approximate sketches of Gantt charts, and average turnaround times for the following scheduling algorithms:
Round Robin with a smallish time quanta (below 0.1s)

Answers

Answer:

Explanation:

From the given information:

The  CPU and I/O behavior of three process timings in seconds are as shown in the image below. Not only that, the Gantt Charts and the Average Turnaround time for the scheduling algorithms were also calculated.

NOTE:

AT = arrival time

BT = Brief-time

TAT = turn around time

Turnaround Time TAT = CT - BT

Waiting Time = TAT - BT

Average TAT = 32.7/3

= 10.9 sec

Average TAT = 10.9 sec

From the attached images below showing the process and charts; we can conclude that it implies that P1, P2, P3 are scheduling in these sequences from time to time period.

1) Raj wants to create a presentation of 20 slides on MS PowerPoint. He wants that all the slides should have uniform background and theme. Suggest him which option in MS PowerPoint makes it possible.​

Answers

Raj wants to create a presentation of 20 slides on MS PowerPoint. He wants that all the slides should have uniform background and theme. Suggest him which option in MS PowerPoint makes it possible. Ans:- Slide Master option.

explain the defference in reference to version and edition in windows operating system​

Answers

Answer: It depened on what the other version is

Explanation:

question: define oprators​

Answers

Answer:

Explanation:

Operator can be defined as

a character or characters which gives determination of actions that are needed to be performed/ considered. Operators are symbols that gives the compiler information to perform specific mathematical/logical manipulations.They are special type of functions, which are capable of taking one or more arguments, then produces a new value. Different types of operator are;

✓arithmetic operators(addition "+" substraction "-"

✓relational operators( greater than ">"

lesser than"<"

✓Logical operators.( Connective words/symbols such as AND, NOT, OR)

Arithmetic Operators: These include "+" (addition), "-" (subtraction), "*" (multiplication), "/" (division), "\" (integer

You can write a function to find Fibonacci numbers using recursion.

How do you find the next number?


add five to the previous number

add one to the previous number

multiply the two previous numbers

add the two previous numbers

Answers

Answer:

Add the two previous numbers

Explanation:

A recursive definition of the Fibonacci sequence would look like this, in python:

def fibonacci(n)

   if n <= 1:

       return n

   else:

       return(fibonacci(n-1) + fibonacci(n-2))

Write a program that accepts a positive integer N as command-line argument, and outputs True if N is the square of some integer, and False otherwise. Do not use math.sqrt() or similar! Hint: Clearly, all candidates i which may satisfy i2 = N must be at most N (for which "corner case" of N is i equal to N?). Therefore, it is sufficient to check if there exists an i in the range 1 ≤ i ≤ N such that i2 = N. In other words, you want to evaluate the expression (12 == N)or (22 == N)or (32 == N)or ··· or ((N − 1)2 == N) or (N2 == N). Practice goal: A variation of the primality checking program we have seen in class; follows a Boolean accumulation pattern, with logical or.

Answers

Answer:

In Python:

N = int(input("Positive integer: "))

if N > 0:

   flag = False

   for i in range(1,N+1):

       if i * i == N:

           flag = True

           break

   print(str(flag))

else:

   print("Positive integer only")

   

Explanation:

N = int(input("Positive integer: "))

If the number is positive

if N > 0:

This initializes a boolean variable to false

   flag = False

This iterates from 1 to the input integer

   for i in range(1,N+1):

This checks if th number is a square of some integer

       if i * i == N:

If yes, flag is set to true

           flag = True

The loop is exited

           break

This prints either true or false, depending on the result of the loop

   print(str(flag))

If otherwise, that the number is not positive

else:

   print("Positive integer only")

Which of the following are good ways to keep your information and your computer secure?

A. Group of answer choices
B. Make sure you install updates whenever they are released.
C.Make sure you keep backups of your work.
D. Keep a password on your devices so only authorized people can access them.
E. All of these are correct.

Answers

Answer:

the correct answer is E

I do all of these so I would assume E

Answer:

E

Updating your computer makes your security system (like Windows Defender) up to date

Keeping backups of your work can ensure that you dont lose them to a virus or a hacker.

Keeping a password on your computer can prevent people from breaking in to your personal business.

Hope the Heps

Which of the following is the best reason for aspiring visual artists and designers to create greeting cards? a-popularity of greeting cards b-innovative design techniques used in cards c-ease of production d-Low cost of production

Answers

Answer:

ease of production

Explanation:

what is the role of information system in bank?

Answers

Explanation:

The main goal of these systems is to organise all data collected from every level of the company, summarize it, and present it in a way that facilitates and improve the quality of the decisions being made to increase the company's profitability and productivity.

What is Web analytics?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

An integration of communications, data management and security capabilities to allow organizations and consumers to exchange information related to the sale of goods and services
B

A process of improving the volume and quality of traffic to a Website by structuring content to improve search engine ranking
C

An Internet marketing technique that enables you to list your site high in search engine rankings by advertising on keywords that describe your product or service
D

A practice of collecting data and studying user behavior in an attempt to increase market share and sales

Answers

Answer:

D. A practice of collecting data and studying user behavior in an attempt to increase market share and sales.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.

In a data dictionary, data elements are combined into records, which are meaningful combinations of data elements that are included in data flows or retained in data stores.

This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.

Web analytics can be defined as a practice of collecting data and studying user behavior in an attempt to increase market share and sales. Some examples of web analytics software are Goo-gle analytics, Piwik, etc.

It includes gathering the following informations from customers;

I. A customers' favorite product.

II. Preferred means of payment.

III. Most widely used features.

IV. Frequently visited sections.

What
are
the main technologies that have
contributed to the growth and commercialization of the intereret?

Answers

Answer: Computers and cellular devices
Reason: Everyone every day watched entertainment with commercials of the internet all day on these technologies and proven by 92 percent. Make this brainly answer for everyone else that needs this. Hope this helps:)

Let us build on the solution that we previously created and write a program that takes any number of values as input, and outputs the average, min, and max only if the input values were all numeric Ex If the input is 15 20 0 5 the output is 100.20 Use (1.0f) to format the output of the computed average Define and use in your program the following functions to make your code more modular • convert_str_to_numeric_1int-taken an input string, splits it into tokens, and returns the tokens stored in a list on all tokens were numeric, otherwise, returns an empty list • get_avg-if the input list is not empty and stores only numerical values, returns the average value of the elements, otherwise, returns • get_min if the input list is not empty and stores only numerical values, returns the minimum value in the list otherwise, returns • get_max of the input list is not empty and stores only numerical values, returns the maximum value in the list otherwise, returns None None None Hint. The string method atr. indigit() will help determine if an input string contains only the numbers 0-9 (see the Section on String mathadh

Answers

Answer:

Following are the code to these question:

def convert_str_to_numeric_list (numbers):#defining a method convert_str_to_numeric_list that holds number as a parameter

   numbers_list = numbers.split ()#defining a list that hols list value by using splits method

   for i in range (len (numbers_list)):#use loop for calculate the length of list

       if (numbers_list[i].isdigit ()):#use if that check digits in list

           numbers_list[i] = int (numbers_list[i])#convert list value into numbers  

       else:#else block

           return[] #use return to return list v

   return numbers_list #returning list

def get_avg (numbers_list):#defining a method get_avg that holds list in parameter

   if (len (numbers_list) != 0):#use if to check lenght of the list is not equal to 0

       return sum (numbers_list) / len (numbers_list)#use return to calculate average of the list

   else:  #use else block

       return None #return None value

def get_min (numbers_list):#defining get_min method that holds list in parameter

   if (len (numbers_list) != 0):#use if to check lenght of the list is not equal to 0

    return min (numbers_list) #use return to calculate the minimum element in list

   else: #use else block

    return None #return None

def get_max (numbers_list):#defining get_max method that holds list in parameter

   if (len (numbers_list) != 0): #use if to check lenght of the list is not equal to 0

       return max (numbers_list) #return minimum number in the list elements

   else:# use else block

       return None #return None

numbers = input () #defining numbers that use input method to input value

numbers_list = convert_str_to_numeric_list (numbers) #use list that pass hold the method value

average = get_avg (numbers_list)#defining average variable that calls get_avg method

minimum = get_min (numbers_list)#defining minimum variable that calls get_min method

maximum = get_max (numbers_list)#defining maximum variable that calls get_max method

if (len (numbers_list) != 0):#if to check lenght of the list is not equal to 0

   print ("{:.0f} {} {}".format (average, minimum, maximum)) #print calculated values.

Output:

15 20 0 5

10 0 20

Explanation:

In this code,  a method "convert_str_to_numeric_list"  is declared that holds a numbers variable as a parameter and inside this, a list is declared that

that splits the lists and in the for loop, it checks the length of the array and converts the list value into the numbers, and returns its values.

In the next step, "get_avg, get_min, and get_max" three methods are declared, that check the length of the list and return its respective values.

At the last, the numbers are declared that inputs values and passes into the list and use "average, minimum, and maximum" variable to call the method holds its value and at the last, it uses the print method to print its values.

qr code is more developed than barcode​

Answers

While a barcode only holds information in the horizontal direction, a QR code does hold information in both horizontal and vertical directions. Due to this, a QR code holds hundreds of times more information than a barcode.

With that being said they have different purposes, and there about the same developed as each other, unless you count how much information they can store.

On the MarketingConsultants worksheet, in cells D10:H13, use a PMT function to calculate the end of the month payment amount. Enter one formula that can be entered in cell D10 and filled to the remaining cells. To calculate the amount for the pv argument, subtract the down payment amount from the retainer amount. The formula results should be positive.
Hiring Marketing Consultants Analysis ainted Paradise RESORT&SPA $ 125,000 5 4 Retainer Amount Term (Years) Monthly Loan Payments Down Payment $ 10,000 15,000 20,000 $25,000$30,000 2.0%, 2.5% 3.0% 3.5%. 10 12 13 15 16

Answers

Answer:

sdddddddde22

Explanation:

A license plate has 7 characters. Each character can be a capital letter or a digit except for 0. How many license plates are there in which no character appears more than once and the first character is a digit?

a. 9 P(35, 6)
b. 9 P(34,6)
c. 9.(35)^6
d. 9.(35)^6

Answers

Answer:

b. 9 P(34,6)

Explanation:

Since the 1st character of the number plate is the digit, therefore, there are nine possible ways to select them from digits 1 to 9.

And in the license plate there are 7 characters, the first character is counted before and the remaining 6 characters that can either be a digit or a letter has to be considered.

Now there are in total 34 symbols remaining form a total of 26 letters and 8 digits. They can be placed as 34x33x32x31x30x29 ways = P(34, 6) ways.

Therefore in total for all the characters there are 9 x P(34, 6) different ways.

An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot conform to the secure baseline, the organization must process a risk acceptance and receive approval before the system is placed into production. It may have non-conforming systems in its lower environments (development and staging) without risk acceptance, but must receive risk approval before the system is placed in production. Weekly scan reports identify systems that do not conform to any secure baseline. The application team receives a report with the following results:
Host Environment Baseline deviation ID(criticality)
NYAccountingDev Development
NYAccountingStg Staging
NYAccounting Prod Production 2633 (low), 3124 (high)
There are currently no risk acceptances for baseline deviations. This is a mission-critical application, and the organization cannot operate if the application is not running. The application fully functions in the development and staging environments. Which of the following actions should the application team take?
A. Remediate 2633 and 3124 immediately.
B. Process a risk acceptance for 2633 and 3124.
C. Process a risk acceptance for 2633 and remediate 3124.
D. Shut down NYAccounting Prod and investigate the reason for the different scan results.

Answers

Answer:

C. Process a risk acceptance for 2633 and remediate 3124.

Explanation:

There are various business risks. Some are inherited risks while other are risks are associated with nature of business. It is dependent on business owners that they want to accept risk or mitigate the risk. Risk acceptance is based on the strategy of the management. In the given scenario Accounting Prod Production has low risk 2633 which is accepted while 3124 is high risk which is remediated.

ou are using a GUI HTML editor to create a Webpage. How can you preview and test elements of your page while you are creating it?
This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
A

By exporting the page to a separate testing application
B

By viewing the page in a browser during development
C

By publishing the page on the Web when it is finished
D

By viewing the page in the GUI screen during development

Answers

Answer:

I think its A B and C, A and B seems most probable, you should consult the website called stackoverflow

Explanation:

Is there only one option or multiple choice?

Help asap no links to other sites please​

Answers

AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaaa

AAAAA

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

aa

a

a

a

a

aa

a

a

a

a

a

a

aa

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

aa

a

a

a

a

a

a

aa

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

aa

aa

a

a

a

a

aa

a

a

a

aa

a

aa

a

a

a

a

a

a

a

a

a

a

a

aa

a

a

a

a

a

a

a

a

a

a

a

a

a

aa

aa

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

a

aa

a

a

a

a

a

a

a

a

a

a

a

a

a

aa

a

a

a

a

a

aa

a

aa

a

a

aa

aa

a

a

aa

a

a

aa

a

a

a

a

a

a

aa

aa

aa

aa

a

aaaaaaaaaaaaaa

a

a

a

a

a

aa

a

aa

a

a

a

a

a

a

a

aa

a

a

a

a

Other Questions
what type of angels are shown please help i will give brainest Succeeding at school is a goal for all students (Compare/Contrast) Budgeted sales for the month at 4,600 units. Budgeted variable selling and admin expense is $7.30 per unit. Budgeted fixed selling and admin expense is $51,980 of which $6,440 is depreciation. What is the budgeted cash disbursement amount for selling and administrative expense for the month? how many mole of diphosphorus pentoxide are represented by 2.6310 molecules A theory is supported by _____ which is the distance between the point with the coordinates (-2,3) and the line with the equation 6x-y=-3 If the sales tax rate is 8.5%, how much would you pay for an item that costs $26.00? A physical examination was used to screen for breast cancer in 7600 women with biopsy proven adenocarcinoma of the breast and in 11,000 age and race matched control women. The results of the physical examination were positive (i.e. a mass was palpated) in 5,500 cases and 1,700 control women (who showed no evidence of cancer at biopsy). The total population is 18,600. The sensitivity of the physical examination was:______. anyone have idea for story about a mystery (thriller/ghost/horror, something mysterious). Asim mixed 5 gallons of paint.Which of the following can be used tofind the number of pints of paint thatIs Asim mixed? a.5 4 2b. 5 4 , 2 c.5 2 2 d.5 , 2 2is it a.b.c.d? Marking as brainliest!! Agree or disagree with them What important role did York play in Lewis and Clarks expedition?A.he was a skilled biologistB.he was a cartographer (map maker)C.he built ties with Native AmericansD.he was Clark's secretary From both passages, it may be established thatA)the Peachtree Road Race features Olympic-status runners.B)lots of people struggle to finish the Peachtree Road Race.C)the Peachtree Road Race is a bigger event than the Boston Marathon.D)people from all over the world take part in the Peachtree Road Race. write the equation fully simplified slope intercept form The goal of nonverbal communication in a recorded speech is toShow off some nerves at it shows you are humanKeep it to a minimum as not to show off too much emotionAppear professional, relaxed, and confidentNone of the above Angle AOC has the measure of 87, determine the measure of the angle in radians. Traditionally, what is a characteristic of a sonnet? Read the excerpt below from Cooper's essay and answer the question.The earnest well-trained Christian young woman, as a teacher, as a home-maker, as wife, mother, or silent influence even, is as potent a missionary agency among our people as is the theologian; and I claim that at the present stage of our development in the South she is even more important and necessary. Let us then, here and now, recognize this force and resolve to make the most of it--not the boys less, but the girls more (p. 79).Cooper believed that to help advance equality _____.boys should have less than girlsgirls should have resources equal to those given to boyswomen should remain silentwomen should be given the opportunity to become missionaries -3x + y = 1 4x + y = 8 Where should quotation marks be added in the sentence below?Were playing hide-and-go-seek, Eli mumbled.Group of answer choicesbefore Eli and after mumbled.before Were and after hide-and-go-seek,before Were and after mumbled.before hide-and-go-seek, and after Eli