Which statement best describes network security?
Network security means all information is open to the public, the network is not compromised, and everyone has access to the network.
Network security means personal information is kept safe, the network is not compromised, and only authorized users have access.
Network security means everyone has access to the network, the network is not compromised, and no one has authorization to use it.
Network security means everyone has access to the information, the network is not compromised, and only a handful of people are authorized users.

Answers

Answer 1

Answer:

B). Network security means personal information is kept safe, the network is not compromised, and only authorized users have access.

Explanation:

I just did the Assignment on EDGE2022 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

Which Statement Best Describes Network Security?Network Security Means All Information Is Open To The

Related Questions

Apply the Blue, Accent 1 fill color to the selected shape, is the filth option in the first row under Theme Cross, in power point

Answers

The theme cross row under the accent was fill

The function leap n, which takes an integer n as input, and returns True if the year n is a leap year, and False otherwise. NOTE: Please provide function declaration [2 marks]. Leap years are those that are evenly divisible by 4, except any year that is also evenly divisible by 100 unless that year is also evenly divisible by 400. So, for example, 1996, 2012, and 2020 are all leap years, but 2100, 2200, and 2300 are not leap years, because although they are all evenly divisible by 4, they are also evenly divisible by 100. However, 1600, 2000, and 2400 are leap years, because although they are divisible by 100, they are also divisible by 400. The Haskell interaction may look like: > leap 1996 True > leap 2000 True > leap 2100 False

Answers

Answer:

Explanation:

The following code snippet is a leap year checker written in Haskell which checks to see if the year is a leap year and then outputs a boolean value.

isDivisibleBy :: Integral n => n -> n -> Bool

isDivisibleBy x n = x `rem` n == 0

leap_n :: Integer -> Bool

leap_n year

 | divBy 400 = True

 | divBy 100 = False

 | divBy   4 = True

 | otherwise = False

where

  divBy n = year `isDivisibleBy` n

Find the reference angle of the angle = 850°​

Answers

Answer:

magine a coordinate plane. Let’s say we want to draw an angle that’s 144° on our plane. We start on the right side of the x-axis, where three o’clock is on a clock. We rotate counterclockwise, which starts by moving up. We keep going past the 90° point (the top part of the y-axis) until we get to 144°. We draw a ray from the origin, which is the center of the plane, to that point. Now we have a ray that we call the terminal side. But we need to draw one more ray to make an angle. We have a choice at this point. Our second ray needs to be on the x-axis. If we draw it from the origin to the right side, we’ll have drawn an angle that measures 144°. If we draw it to the left, we’ll have drawn an angle that measures 36°. This second angle is the reference angle. It’s always the smaller of the two angles, will always be less than or equal to 90°, and it will always be positive. Here’s an animation that shows a reference angle for four different angles, each of which is in a different quadrant. Notice how the second ray is always on the x-axis.

Explanation:

Where is the start frame delimiter found in the Ethernet frame

Answers

The start frame delimiter found in the Ethernet frame is A preamble and begin body delimiter are a part of the packet on the bodily layer. The first  fields of every body are locations and supply addresses.

What is the cause of the body delimiter?

Frame delimiting, Addressing, and Error detection. Frame delimiting: The framing procedure affords essential delimiters which might be used to pick out a set of bits that make up a body. This procedure affords synchronization among the transmitting and receiving nodes.

The Preamble (7 bytes) and Start Frame Delimiter (SFD), additionally referred to as the Start of Frame (1 byte), fields are used for synchronization among the sending and receiving devices. These first 8 bytes of the body are used to get the eye of the receiving nodes.

Read more about the Ethernet :

https://brainly.com/question/1637942

#SPJ1

What transport layer protocol does DNS normally use?

Answers

Explanation:

DNS uses the User Datagram Protocol (UDP) on port 53 to serve DNS queries. UDP is preferred because it is fast and has low overhead. A DNS query is a single UDP request from the DNS client followed by a single UDP reply from the server.

The transport layer protocol that DNS normally use is the User Datagram Protocol (UDP).

What is transport layer protocol?

The Internet Protocol (IP) is a network layer protocol, and the Transmission Control Protocol (TCP) is a transport layer protocol.

A network communication between applications is established and maintained according to the Transmission Control Protocol (TCP) standard. The Internet Protocol (IP), which specifies how computers send data packets to one another, works with TCP.

User Datagram Protocol (UDP) on port 53 is how DNS serves DNS requests. Due to its speed and low overhead, UDP is recommended. A single UDP request from the DNS client and a single UDP response from the server makes up a DNS query.

Therefore, the transport layer protocol used by DNS is User Datagram Protocol (UDP).

To learn more about transport layer protocol, refer to the link:

https://brainly.com/question/4727073

#SPJ12

Suppose a program is supposed to reverse an array. For example, if we have the array arr = {1, 2, 3, 4, 5}, after reversing the array we would have arr = {5, 4, 3, 2, 1}.

Most of the code for the program is shown here:
Const int SIZE = 5;
int arr[SIZE] = {1, 2, 3, 4, 5};
int firstindex =0, lastindex = SIZE-1, temp;

1 _______________________________

{
temp = arr[firstindex];
arr[firstindex] = arr[lastindex];
arr[lastindex] = temp;
firstindex++;
lastindex--;
}

All of the following options below could be correctly inserted at line 1 in the code shown above EXCEPT:

a. while(firstindex < lastindex)
b. while(firstindex <= lastindex)
c. for(int i=0; i<(SIZE/2-1); i++)
d. for(int i=0; i<(SIZE/2); i++)

Answers

Answer:

The answer is "Choice C".

Explanation:

In this question, the choice C is correct because all the other options will the output "5 4 3 2 1" and it will given "5 2 3 4 1" as output which is defined in the attached file. please find it.

5. A restore program generally is included with what type of utility?
O A. Screen saver
O B. Antivirus
O C. Uninstaller
D. Backup

6. The interface that allows interaction with menus, and visual images such as
buttons:
A. Touchscreen user interface
O B. Menu driven Interface
O C. Graphical user interface
O D. Command line interface​

Answers

The answer is B because the rest of them doesn’t make scenes

A video game controller contains the buttons: A, B, X, Y. When the player presses A their character Jumps. When the player presses BY their character Crouches. When the player presses X their character Punches. When the player presses Y their character Flies. When the player presses anything else Pause menu shows up Assume your program contains a variable named button that holds a character which indicates the button the player has pressed. Write the switch statement that displays a message explained the user the action that was taken.

Answers

Answer:

Explanation:

The following switch statement takes in the variable button as a parameter and outputs a statement saying what the character did due to the button being pushed.

switch (Character.toLowerCase(button.charAt(0))) {

           case 'a': System.out.println("Your character has Jumped"); break;

           case 'b': System.out.println("Your character has Crouched"); break;

           case 'x': System.out.println("Your character has Punched"); break;

           case 'y': System.out.println("Your character has Flown"); break;

           default: System.out.println("Pause Menu has appeared"); break;

       }

**PLEASE AN IPO CHART AND A C++ PROGRAM FOR EACH QUESTION**
20. When you borrow money to buy a house, a car, or for some other purpose, you repay the loan by making periodic payments over a certain period of time. Of course, the lending company will charge interest on the loan. Every periodic payment consists of the interest on the loan and the payment toward the principal amount. To be specific, suppose that you borrow $1,000 at an interest rate of 7.2% per year and the payments are monthly. Suppose that your monthly payment is $25. Now, the interest is 7.2% per year and the payments are monthly, so the interest rate per month is 7.2 / 12 5 0.6%. The first month’s interest on $1,000 is 1000 3 0.006 5 6. Because the payment is $25 and the interest for the first month is $6, the payment toward the principal amount is 25 2 6 5 19. This means after making the first payment, the loan amount is 1, 000 2 19 5 981. For the second payment, the interest is calculated on $981. So the interest for the second month is 981 3 0.006 5 5.886, that is, approximately $5.89. This implies that the payment toward the principal is 25 2 5.89 5 19.11 and the remain- ing balance after the second payment is 981 2 19.11 5 961.89. This process is repeated until the loan is paid. Write a program that accepts as input the loan amount, the interest rate per year, and the monthly payment. (Enter the interest rate as a percentage. For example, if the interest rate is 7.2% per year, then enter 7.2.) The program then out- puts the number of months it would take to repay the loan. (Note that if the monthly payment is less than the first month’s interest, then after each payment, the loan amount will increase. In this case, the program must warn the borrower that the monthly payment is too low, and with this monthly payment, the loan amount could not be repaid.)

28. (Apartment problem) A real estate office handles, say, 50 apartment units. When the rent is, say, $600 per month, all the units are occupied. However, for each, say, $40 increase in rent, one unit becomes vacant. Moreover, each occupied unit requires an average of $27 per month for maintenance. How many units should be rented to maximize the profit?

Write a program that prompts the user to enter:

a. The total number of units.

b. The rent to occupy all the units.

c. The increase in rent that results in a vacant unit.

d. Amount to maintain a rented unit.

The program then outputs the number of units to be rented to maximize the profit.

30. Let n be an integer. The value of the expression lim (1 1 1 ) is n→` n written as e. This number e appears in many places in mathematics. For example, it appears in the formula A 5 Pert to compute the total mount accumulated when the interest is compounded continuously. It also appears in problems relating to exponential growth and decay. It is known that e is an irrational number. The value of e to nine decimal places is e 5 2.718281827. Write a program that computes the value n of the expression lim (1 1 1 ) between certain values of n and then n→` n compare the values with e. For example, you can compute the values of the expression between 100 and 10,000 with an increment of 100, or between 1,000 and 1,000,000 with an increment of 1,000.

Answers

answer is b

rtyujhygtrcdxrtgyhgtfr

Alex, a webmaster, recently deployed a new web server. After checking external access to the new web server, he was unable to communicate on port 80. Alex verified that the host-based firewall's configuration had been changed and that the httpd service is running. What commands will most likely resolve the communication issue?

Answers

Answer:

systemctl restart firewalld

Explanation:

The command that will most likely resolve the communication issue being experienced by Alex ( i.e. his inability to communicate on port 80 ) is

systemctl restart firewalld  given that the host-based firewall's configuration has been changed

Given main() and the Instrument class, define a derived class, StringInstrument, for string instruments.
Ex. If the input is:
Drums Zildjian 2015 2500 Guitar Gibson 2002 1200 6 19
the output is:
Instrument Information: Name: Drums Manufacturer: Zildjian Year built: 2015 Cost: 2500 Instrument Information: Name: Guitar Manufacturer: Gibson Year built: 2002 Cost: 1200 Number of strings: 6 Number of frets: 19

Answers

Answer:

Explanation:

The following derived class called StringInstrument extends the Instrument class and creates the necessary private variables for number of Strings and number of Frets. Then it creates getter and setter methods for each of the variables. This allows them to be called within the main method that has already been created and output the exact sample output as seen in the question.

class StringInstrument extends Instrument {

   private  int numStrings, numFrets;

   public int getNumOfStrings() {

       return numStrings;

   }

   public void setNumOfStrings(int numStrings) {

       this.numStrings = numStrings;

   }

   public int getNumOfFrets() {

       return numFrets;

   }

   public void setNumOfFrets(int numFrets) {

       this.numFrets = numFrets;

   }

}

what is the full from of CPU?​

Answers

Answer:

CPU is known as Central Processing Unit.

Full form? Like CPU meaning central processing unit?

The process of converting an input file (stream of characters) into an understandable format is called syntax analysis.

a. True
b. False

Answers

Answer:

The given statement is "True".

Explanation:

The framework for considering a string of characters, throughout the basic language, database management system, or DS by formal grammatical codes or syntax, is considered as a Syntax analysis.During a lexical analysis stage, everything just accepts or considers the tokens created as an input as well as creates a parse tree as an output or outcome.

Thus the above is the correct response.

Ryan has a new Android tablet that does great voice dictation, but he keeps "fat-fingering" the built-in, on-screen keyboard. What device could increase his accuracy and cut down on his typos? *

Answers

Answer:

A tablet keyboard

Explanation:

This would be the device used

If you have downloaded this book's source code from the companion Web site, you will find a file named text.txt in the Chapter 12 folder. (The companion Web site is at www.pearsonhighered/gaddis.) The text that is in the file is stored as on sen- tence per line. Write a program that reads the file's contents and calculates the average of words per sentence.

Answers

Answer:

Explanation:

The following python code loops through each line within a file called text.txt and counts all the words, then it divides this count by the number of sentences in the text file. Finally, output the average number of words per sentence.

f = open("text.txt", "r")

all_words = 0

sentences = 0

for x in f:

   list = x.split(' ')

   all_words += len(list)

   sentences += 1

average = all_words / sentences

print("There are an average of " + str(average.__round__()) + " words in each sentence.")

Write an application that uses String method region-Matches to compare two stringsinput by the user. The application should input the number of characters to be compared andthe starting index of the comparison. The application should state whether the comparedcharacters are equal. Ignore the case of the characters when performing the comparison.

Answers

Answer:

Explanation:

The following program creates a function called region_Matches that takes in two strings as arguments as well as an int for starting point and an int for amount of characters to compare. Then it compares those characters in each of the words. If they match (ignoring case) then the function outputs True, else it ouputs False. The test cases compare the words "moving" and "loving", the first test case compares the words starting at point 0 which outputs false because m and l are different. Test case 2 ouputs True since it starts at point 1 which is o and o.

class Brainly {

   public static void main(String[] args) {

       String word1 = "moving";

       String word2 = "loving";

       boolean result = region_Matches(word1, word2, 0, 4);

       boolean result2 = region_Matches(word1, word2, 1, 4);

       System.out.println(result);

       System.out.println(result2);

   }

   public static boolean region_Matches(String word1, String word2, int start, int numberOfChars) {

       boolean same = true;

       for (int x = 0; x < numberOfChars; x++) {

           if (Character.toLowerCase(word1.charAt(start + x)) == Character.toLowerCase(word2.charAt(start + x))) {

               continue;

           } else {

               same = false;

               break;

           }

       }

       return same;

   }

}

3) Many people use the World Wide Web (Web) regularly, and search engines
provide vital access to Web resources. Textual and multimedia content is
accessible via web search engines. Informational, navigational, and
transactional intent are the three types of user intent classified for Web
searching. What is meant by navigational, informational, and transactional
search? Provide a comprehensive explanation with examples for each.

Answers

Answer: See explanation

Explanation:

Navigational search - This occurs when the user is looking for a certain website. Then the name of the website will be entered into the search bar.

Informational search - This occurs when the user wants to get a certain information. For example, if user enters "what is computer" into the search bar, different results relating to the word "computer" will be gotten.

Transactional search - This occurs when the user wants a website that is interactive it which possess more interaction. An example is when the user wants to buying something, register for something or maybe download something

Hi guys, I am in need of help. I have an HTML assignment due today at 11:59 PM and I have to work with video and animation. I am having trouble with working on keyframes because when I run my program, my video remains the same size. I do not know what I am doing wrong. I have attached a picture of my code. Please help me ASAP.

Answers

Answer:

Nothing much is wrong

Explanation:

Nothing much is wrong with it but then again I'm a full on computer geek, I assume you need to go back and re-read it and edit whatever you feel is wrong or incorrect it's like a gut feeling and you will have doubts on certain parts of what you are doing

Create a class called StockTester that has the following fucntionality. a. Create a main method with an ArrayList named dataStock that stores objects of type Stock. b. Add code that reads the content of StockInfo.csv and places it in dataStock. c. Create a new Stock object named newStock using the constructor in Question 1. Set the values to the following. Stock name: Gamma, Stock purchase date: 03/01/20, Number of Shares of Stock: 100, Stock Price: 50.5. Add newStock to dataStock. d. Print the information associated with newStock using printStock. e. Using the method requiredReturn, determine the rate of return required for your stock in Pitsco to have a value of $4,000 in 3 years. Print the result to the screen so that the user can clearly read the result.

Answers

Solution :

public class [tex]$\text{Stock}$[/tex] {

private [tex]$\text{String}$[/tex] stockName, [tex]$\text{purchaseDate}$[/tex];

private [tex]$\text{int}$[/tex] nShares;

private [tex]$\text{double}$[/tex] price;

 

public [tex]$\text{Stock}()$[/tex]

{

this.stockName = "";

this.purchaseDate = "";

this.nShares = 0;

this.price = 0.0;

}

public Stock(String stockName, String purchaseDate, int nShares, double price) {

this.stockName = stockName;

this.purchaseDate = purchaseDate;

this.nShares = nShares;

this.price = price;

}

public String getStockName() {

return stockName;

}

public void setStockName(String stockName) {

this.stockName = stockName;

}

public String getPurchaseDate() {

return purchaseDate;

}

public void setPurchaseDate(String purchaseDate) {

this.purchaseDate = purchaseDate;

}

public int getnShares() {

return nShares;

}

public void setnShares(int nShares) {

this.nShares = nShares;

}

public double getPrice() {

return price;

}

public void setPrice(double price) {

this.price = price;

}

 

public String toString()

{

return("Stock name: " + this.stockName + "\nPurchase date: " + this.purchaseDate

+ "\nNumber of shares of stock: " + this.nShares + "\nPrice: $" + String.format("%,.2f", this.price));

}

 

public void printStock()

{

System.out.println("Stock name: " + this.stockName + "\nPurchase date: " + this.purchaseDate

+ "\nNumber of shares of stock: " + this.nShares + "\nPrice: $" + String.format("%,.2f", this.price)

+ "\n");

}

}

StockTester.java (Driver class)

import [tex]$\text{java.io.}$[/tex]File;

import [tex]$\text{java.io.}$[/tex]File[tex]$\text{NotFound}$[/tex]Exception;

import [tex]$\text{java.util.}$[/tex]ArrayList;

import [tex]$\text{java.util.}$[/tex]Scanner;

[tex]$\text{public}$[/tex] class StockTester {

 

private static final String FILENAME = "StockInfo[tex]$.$[/tex]csv";

 

public static [tex]$\text{void}$[/tex] main([tex]$\text{String}[]$[/tex] args)

{

ArrayList[tex]$<\text{stock}>$[/tex] dataStock = [tex]$\text{readData}$[/tex](FILENAME);

 

System.out.println("Initial stocks:");

for(Stock s : dataStock)

s.printStock();

 

System.out.println("Adding a new Stock object to the list..");

Stock newStock = new Stock("Gamma", "03/01/20", 100, 50.5);

dataStock.add(newStock);

 

System.out.println("\nStocks after adding the new Stock..");

for(Stock s : dataStock)

s.printStock();

 

Stock targetStock = dataStock.get(3);

double reqReturn = requiredReturn(targetStock, 4000, 3);

System.out.println("Required rate of return = " + String.format("%.2f", reqReturn) + "%");

}

 

private static ArrayList<Stock> readData(String filename)

{

ArrayList<Stock> stocks = new ArrayList<>();

Scanner fileReader;

try

{

fileReader = new Scanner(new File(filename));

while(fileReader.hasNextLine())

{

String[] data = fileReader.nextLine().trim().split(",");

String stockName = data[0];

String purchaseDate = data[1];

int nShares = Integer.parseInt(data[2]);

double price = Double.parseDouble(data[3]);

 

stocks.add(new [tex]$\text{Stock}$[/tex](stockName, [tex]$\text{purcahseDate}$[/tex], nShares, price));

}

fileReader.close();

}catch(FileNotFoundException fnfe){

System.out.println(filename + " cannot be found!");

System.exit(0);

}

return stocks;

}

 

private static double requiredReturn(Stock s, double targetPrice, int years)

{

double reqReturn;

 

double initialPrice = s.getPrice() * s.getnShares();

reqReturn = ((targetPrice - initialPrice) / initialPrice * years) * 100;

 

return reqReturn;

}

}

Which Fiber implementation is often referred to as Fiber To The Premises (FTTP)? Check all that apply.

Answers

Answer:

FFTH Fiber to the home, FFTB Fiber to the building.

There are 2.54 centimeters in an inch, and there are 3.7854 liters in a U.S. gallon. Create a program named MetricConversion. Its main() method accepts an integer value from a user at the keyboard, and in turn passes the entered value to two methods. One converts the value from inches to centimeters and the other converts the same value from gallons to liters.

Answers

Answer:

Explanation:

The following Java code creates the program which calls asks the user for an input and then passes that input into two methods toInches, and toGallons. Then the main method saves the returned values in variables and prints out a statement for each.

import java.util.Scanner;

 

class Brainly {

   static Scanner in = new Scanner(System.in);

   public static void main(String[] args) {

      System.out.println("Enter a value: ");

      int answer = in.nextInt();

      double inches = toInches(answer);

      double gallons = toGallons(answer);

       System.out.println("There are " + inches + " inches in " + answer + " centimeters");

       System.out.println("There are " + gallons + " gallons in " + answer + " liters");

   }

   public static double toInches(int centimeters) {

       return (centimeters / 2.54);

   }

   public static double toGallons(int liters) {

       return (liters / 3.7854);

   }

}

Question 20
When looking to create video content for your marketing strategy, what three best practices
should you look to include?

Answers

Answer:

Short, technical, include a call to action.

Relevant, short, entertaining.

Short, entertaining, include a call to action.

Explanation:

A large computer repair company with several branches around Texas, TexTech Inc. (TTi), is looking to expand their business into retail. TTi plans to buy parts, assemble and sell computer equipment that includes desktops, monitors/displays, laptops, mobile phones and tablets. It also plans to sell maintenance plans for the equipment it sells that includes 90-day money back guarantee, 12-month cost-free repairs for any manufacturing defects, and annual subscription for repairs afterwards at $100 dollars per year. As part of a sales & marketing campaign to generate interest, TTi is looking to sell equipment in 5 different packages: 1. Desktop computer, monitor and printer 2. Laptop and printer 3. Phone and tablet 4. Laptop and Phone 5. Desktop computer, monitor and tablet TTi plans to sell these packages to consumers and to small-and-medium businesses (SMB). It also plans to offer 3-year lease terms to SMB customers wherein they can return all equipment to the company at the end of 3 years at no cost as long as they agree to enter into a new 3-year lease agreement. TTi has rented a warehouse to hold its inventory and entered into contracts with several manufacturers in China and Taiwan to obtain high-quality parts at a reasonable price. It has also hired 5 sales people and doubled its repair workforce to meet the anticipated increase in business. TTi has realized that it can no longer use Excel spreadsheets to meet their data and information needs. It is looking to use open source and has decided to develop an application using Python and MySQL. Your team has been brought in to design a database that can meet all of its data needs. Create a report that contains the following:

Required:
a. Data requirements of TTi: What are the critical data requirements based on your understanding of TTI business scenario described above.
b. Key Entities and their relationships
c. A conceptual data model in MySQL

Answers

Answer:

hecks

Explanation:

nah

Create a class called Dot for storing information about a colored dot that appears on a flat grid. The class Dot will need to store information about its position (an x-coordinate and a y-coordinate, which should both be integers) and its color (which should be a string for now). You can choose what to call your attributes, but be sure to document them properly in the class's docstring.

Don't forget that every function definition, including method definitions, must have a docstring with a purpose statement and signature.

Answers

Answer:

Explanation:

The following class is written in Python, it has the three instance variables that were requested. It also contains a constructor that takes in those variables as arguments. Then it has functions to update the positions of the Dot and change its color. The class also has functions to output current position and color.

class Dot:

   """Class Dot"""

   x_coordinate = 0

   y_coordinate = 0

   color = ""

   def __init__(self, x_coordinate, y_coordinate, color):

       """Constructor that takes x and y coordinates as integers and a string for color. It ouputs nothing but saves these argument values into the corresponding instance variables."""

       self.x_coordinate = x_coordinate

       self.y_coordinate = y_coordinate

       self.color = color

   def moveUp(self, number_of_spaces):

       """Moves the Dot up a specific number of spaces that is passed as a parameter. Updates y_position"""

       self.y_coordinate += number_of_spaces

       return ""

   def moveDown(self, number_of_spaces):

       """Moves the Dot down a specific number of spaces that is passed as a parameter. Updates y_position"""

       self.y_coordinate -= number_of_spaces

       return ""

   def moveLeft(self, number_of_spaces):

       """Moves the Dot left a specific number of spaces that is passed as a parameter. Updates x_position"""

       self.x_coordinate -= number_of_spaces

       return ""

   def moveRight(self, number_of_spaces):

       """Moves the Dot right a specific number of spaces that is passed as a parameter. Updates x_position"""

       self.x_coordinate += number_of_spaces

       return ""

   def dot_position(self):

       """Print Dot Position"""

       print("Dot is in position: " + str(self.x_coordinate) + ", " + str(self.y_coordinate))

       return ""

   def dot_color(self):

       """Print Current Dot Color"""

       print("Dot color is: " + self.color)

9.19 LAB: Words in a range (lists) Write a program that first reads in the name of an input file, followed by two strings representing the lower and upper bounds of a search range. The file should be read using the file.readlines() method. The input file contains a list of alphabetical, ten-letter strings, each on a separate line. Your program should output all strings from the list that are within that range (inclusive of the bounds). Ex: If the input is:

Answers

Answer:

9.2. Métodos del Objeto File (Python para principiantes)

Explanation:

Write a program that simulates a fishing game. In this game, a six-sided die is rolled to determine what the user has caught. Each possible item is worth a certain number of fishing points. The points will remain hidden until the user is finished fishing, and then a message is displayed congratulating the user depending on the number of fishing points gained.

Answers

Answer:

Answered below

Explanation:

//Python code

numberOfCasts = 3

j = 0

fishingPoints = 0

sum = 0

while j < numberOfCasts:

dieNum = randint(1 , 6)

if dieNum ==1:

fishingPoints = 2

elif dieNum == 2:

fishingPoints = 4

elif dieNum == 3:

fishingPoints = 6

elif dieNum == 4:

fishingPoints = 8

elif dieNum == 5:

fishingPoints = 10

elif dieNum ==6:

fishingPoints = 12

sum += fishingPoints

j++

if sum > 30:

print ("Great catch")

elif sum > 10 and sum <= 30:

print("Good catch")

else:

print ("Bad day")

Creating and modifying sets.
The top 3 most popular male names of 2017 are Oliver, Declan, and Henry according to babynames. Write a program that modifies the male_names set by removing a name and adding a different name.
Sample output with inputs: 'Oliver' 'Atlas'
{ 'Atlas', 'Declan', 'Henry' }
NOTE: Because sets are unordered, the order in which the names in male_names appear may differ from above.
1 male_names = { 'oliver', 'Declan', 'Henry' }
2 name_to_remove = input()
3 name_to_add = input()
4 male_names = { 'oliver', 'Declan', 'Henry' }
5
6 #The statement to remove 'oliver' from the set.
7
8 male_names.remove('oliver')
9
10 #Add the name 'Atlas' in the set ,ale_names.
11
12 male_names.add('Atlas')
13
14 print(male_names)
Testing with inputs: 'Oliver''Atlas'
Your output { 'Atlas', 'Declan', 'Henry' }
Testing with inputs: 'Declan' 'Noah'
Output differs. See highlights below.
Your output { 'Atlas', 'Declan', 'Henry' }
Expected output { 'Henry', 'Noah', 'Oliver' }

Answers

Answer:

Explanation:

The following Python code asks the user for inputs for the name to remove and add in the set. It then tries to remove the given name from the list. If it fails it prints out to the user saying that the name does not exist. If it does exist then it removes the name and adds the new name. Finally it prints out the current list of names.

male_names = {'oliver', 'Declan', 'Henry'}

name_to_remove = input("Enter name to remove: ")

name_to_add = input("Enter name to add: ")

try:

   male_names.remove(name_to_remove)

   male_names.add(name_to_add)

except:

   print("Name that you are trying to remove does not exist")

print("List of Names: ")

print(male_names)

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

male_names = {'oliver', 'Declan', 'Henry'}

name_to_remove = input("Enter name to remove: ")

name_to_add = input("Enter name to add: ")

try:

  male_names.remove(name_to_remove)

  male_names.add(name_to_add)

except:

  print("Name that you are trying to remove does not exist")

print("List of Names: ")

print(male_names)

See more about python at brainly.com/question/26104476

Suppose you are given a relation R with four attributes ABCD. For each of the following sets of FDs, assuming those are the only dependencies that hold for R, do the following: (a) Identify the candidate key(s) for R. (b) Identify the best normal form that R satisfies (1NF, 2NF, 3NF, or BCNF). (c) If R is not in BCNF, decompose it into a set of BCNF relations that preserve the dependencies.
1. C → D, C → A, B → C
2. B → C, D → A
3. ABC → D, D → A
4. A → B, BC → D, A → C
5. AB → C, AB → D, C → A, D → B

Answers

Solution :

1.

a). Candidate keys : [tex]$B$[/tex]

b). R is in [tex]$2F$[/tex] but not [tex]$3NF$[/tex]

c). C → [tex]$D$[/tex] and C → [tex]$A$[/tex], both causes violations of [tex]$BCNF$[/tex]. The way to obtain the join preserving decomposition is to decompose [tex]$R$[/tex] into [tex]$AC, BC$[/tex] and CD.

2.

a). Candidate keys : [tex]$BD$[/tex]

b). [tex]$R$[/tex] is in [tex]$1NF$[/tex] but not [tex]$2NF$[/tex].

c). Both B → [tex]$C$[/tex] and D → [tex]$A$[/tex] cause [tex]$BCNF$[/tex] violations. The decomposition : [tex]$AD $[/tex], [tex]$BC, BD$[/tex] is [tex]$BCNF$[/tex] and lossless and the join preserving.

3.

a). Candidate keys : [tex]$ABC, BCD$[/tex]

b). R is in [tex]$3NF$[/tex] but not [tex]$BCNF$[/tex]

c).[tex]$ABCD$[/tex] is not in [tex]$BCNF$[/tex] since D → [tex]$A$[/tex] and [tex]$D$[/tex] is not a key. But if we split up the [tex]$R$[/tex] as [tex]$AD,BCD$[/tex] therefore we cannot preserve dependency [tex]$ABC$[/tex] → D. So there is no [tex]$BCNF$[/tex] decomposition.

4.

a). Candidate keys : [tex]$A$[/tex]

b). R is in [tex]$2NF$[/tex] but not [tex]$3NF$[/tex]

c). BC → [tex]$D$[/tex] violates [tex]$BCNF$[/tex] since [tex]$BC$[/tex] does not contain the key. And we split up R as in [tex]$BCD, ABC$[/tex].

5.

a). Candidate keys : [tex]$AB, BC, CD, AD$[/tex]

b). [tex]$R$[/tex] is in [tex]$3NF$[/tex] but not [tex]$BCNF$[/tex].

c). C → [tex]$A$[/tex] and D → [tex]$B$[/tex] both causes a violations. The decomposition into [tex]$AC,BCD$[/tex] but this will not preserve [tex]$AB$[/tex] → C and [tex]$AB$[/tex] → D, and [tex]$BCD$[/tex] is still not [tex]$BCNF$[/tex] because [tex]$D$[/tex] → [tex]$B$[/tex]. So we need to decompose further into [tex]$AC,BD,CD$[/tex] However when we try to revive the lost functional dependencies by adding [tex]$ABC$[/tex] and [tex]$ABD$[/tex], we that these relations are not in [tex]$BCNF$[/tex] form. Therefore, there is no [tex]$BCNF$[/tex] decomposition.

match the cell reference to its definition

Answers

Answer:

which cell reference:-|

Answer:

absolute reference: the cell remains constant when copied or moved.

mixed reference: the cell has a combination of two other types of cell references.

relative reference: the cell changed based on the position of rows and columns.

______ lets people access their stored data from a device that can access the Internet.
______ are programs that help people work and play online.

Answers

Answer:

Cloud computing and applications

Explanation:

Answer: Cloud computing

Applications

Explanation:

Other Questions
I explained that I'd missed the bus, then stumbled and nearly sprained my ankle, but it didn't matter; Randy was angry and admonished me for being late.Which words from the sentence give a clue to the meaning of admonished?1) I explained2) Missed the bus 3)It didn't matter4) Randy was angry Find the distance between points. From the plot of N2O5 ] in moles/liter versus time in minutes,interpret the data for the concentration of NO at O minute 3 times the sum of 4 and 9 Base your answers to the following question on the structures represented in the diagram.Review Packet- Modern Genetics Name___________________________ Page 1What is the relationship between these three structures?Group of answer choicesProtein is composed of DNA that is stored in the cellThe cell is composed only of DNA and proteinDNA is made up of proteins that are synthesized in the cellDNA controls the production of protein in the cell What is the slope for a line containing the following points? (-3,5) (3,1) 1a. What 5 factors shape weather & climate?1b. How do weather & climate differ?2a. What parts of the Earth get the most heat from the sun?2b. Why do the poles receive less solar energy than the equator does?3a. What creates wind?3b. How do ocean currents & large bodies of water effect climate?4a. What is rain shadow?4b. Why might a mountain top & a nearby valley have widely different temperatures?5. Fill in the chart by listing the atmospheric conditions that are effected by each factor.all these question who got the answers HELP ME PLEASE!!A thesis statement provides organization for an informative essay by explaining how a significant event has led to lasting change. supporting a specific point of view instead of an objective one. summarizing what readers should take away from the essay. briefly stating points that will be discussed in body paragraphs. Pleaseee helppp!!! Im not sure plz hurry plzz Motezuma II did not attack Cortes becausea.he was crazy.c.he believed Cortes was the Aztec god Quetzalcoatl.b.Cortes forces outnumbered the Aztecs.d.he considered making Cortes an ally to help him take over the Yucatan. Can someone help with this too On the main floor of the Kodak Hall at the Eastman Theater, the number of seats per row increases at a constant rate. Lucas counts 31 seats in row 3 and 37 seats in row 6. How many seats are there in row 20?67616365 The area of a right triangle is 12 cm2. Which of the following could be the lengths of the legs of the triangle?2 cm and 6 cm4 cm and 6 cm3 cm and 2 cm3 cm and 4 cm Kedir bout 200 eggs for Birr 50 Birr and sells them for Birr 0.30 each.Did he get profit? If so find his profit percent. Step 4. How long is one term? * IT(1 Point)2 years4 years6 years PLEASE HELP ASAPPP I only need B and D Which of the following ordered pairs does not lie on the graph of y=log_(2)^x? (1/2, -1) (0, 1) (1, 0) Hich type of electromagnetic waves are dangerous enough to be used to kill cancerous cells? gamma rays visible light infrared light microwaves When the northern hemisphere experiences autum, the Southern Hemisphere experiences blank 1. A square pizza box has an area of 155 cm^2. Which is the best estimate of the side length of the pizza box? A 12 B. 129 C. 124 D. 121