Answer:
Steve Wozniak
Answer:
Steve Wozniak
Explanation:
Which of the following will increase the level of security for personal information on a mobile device if the device is lost or stolen
Answer:
this is a very cool day for me yeah know
(Python)Write an expression using Boolean operators that prints "Eligible" if user_age is greater than 17 and not equal to 25.
Sample output with input: 17
Ineligible
user_age = input("Input Age: ")
if int(user_age) <= 17:
print("Ineligible")
elif int(user_age) == 25:
print("Ineligible")
else:
print("Eligible")
:Here is some basic code. It takes an input, turns it into an int type value, and checks the parameters that you gave me. It errors out when you put in anything but a number.
Answer:
user_age = int(input())
if (user_age > 17) and (user_age != 25):
print('Eligible')
else:
print('Ineligible')
Explanation:
the code is very easy to do because it asks for it in Boolean operators. So user_age = int(input()) ## asks for user input
then it checks the status by seeing if the number is greater than 17 and not equal to 25. we know that > is greater and we know that != means not equal. Therefore, this will rule out both and then give the eligible or ineligible statement.
Which of the following tasks could be implemented as a filter using only a constant amount of memory (e.g., a couple of int or double variables and no arrays)? Mark all that apply.
For each, the input comes from standard input and consists of n real numbers between 0.0 and 1.0.
Print the sum of the squares of the n numbers
Print the maximum and minimum values of the n numbers
Print the percentage of numbers greater than the average of the n numbers
Print the median of the n numbers
Print the average of the n numbers
Print the n numbers in uniformly random order
Print the n numbers in increasing order
Answer:
Print the sum of the squares of the n numbers
Print the percentage of numbers greater than the average of the n numbers
Print the median f n numbers
Explanation:
The computer programs have different configurations based on the assigned tasks. The constant amount of memory is used by the cache. This is the new technology in the computer software which consumes only small amount of memory and activates once the task is assigned to it.
Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color vision for identifying differences in colored wires critical thinking and reasoning skills for analyzing information stress management for handling urgent tasks mechanical knowledge and ability to drive and operate machinery working well with customers and being friendly
Answer:
a, c, d
Explanation:
Answer:
it is just A
Explanation:
on edge. unit test review
Will, there be any presents this year
Answer:
no why
Explanation:
Best of Luck
for your work and
d
Best wishes for you
.
oh, why thank you same to you
Write a Python program segment, using a loop, to calculate and print the sum of the odd integers from 20 to 120. (Hint: 21 23 25 . . . 117 119)
Answer:
for x in range(20,120):
if x % 2 == 0:
continue
print(x)
Explanation:
in a range of 20 to 120 it does the following, if x is divisible by two as an int, then try again with a new number. If not, print that number.
Find the max and min of a set of values using recursion Find the max and min of a set of values using recursion. First input the values. The first value inputted is the number of additional data items to input. For instance, if the input is: 3 1 2 3
Answer:
This question is answered using Python programming language
def MaxSet(mylist, count):
if (count == 1):
return mylist[0]
return max(mylist[count - 1], MaxSet(mylist, count - 1))
def MinSet(mylist, count):
if (count == 1):
return mylist[0]
return min(mylist[count - 1], MinSet(mylist, count - 1))
count = int(input("Length of set: "))
mylist = []
for i in range(count):
inp= int(input("Input: "))
mylist.append(inp)
print("Minimum: "+str(MinSet(mylist, count)) )
print("Maximum: "+str(MaxSet(mylist, count)) )
Explanation:
This defines the recursion that returns the maximum
def MaxSet(mylist, count):
This following checks for the maximum using recursion
if (count == 1):
return mylist[0]
return max(mylist[count - 1], MaxSet(mylist, count - 1))
This defines the recursion that returns the minimum
def MinSet(mylist, count):
This following checks for the minimum using recursion
if (count == 1):
return mylist[0]
return min(mylist[count - 1], MinSet(mylist, count - 1))
The main begins here
This prompts user for length of set
count = int(input("Length of set: "))
This defines an empty list
mylist = []
The following iteration gets user input
for i in range(count):
inp= int(input("Input: "))
mylist.append(inp)
This calls the minimum function
print("Minimum: "+str(MinSet(mylist, count)) )
This calls the maximum function
print("Maximum: "+str(MaxSet(mylist, count)) )
The ________ feature introduced by instant messaging shows whether a person is logged in and available to answer a question, pick up the phone, or stop by for a brief meeting.
Answer:
The correct approach is "Presence awareness".
Explanation:
The willingness, at designated occasions, to see which one is available on the internet. When using the IM framework, that very many IM systems show a list of user groups attached to the system. A current model of the IGI Social website is being used by oneself. With either the growing prevalence of Internet chat apps, a Presence Awareness model has been proposed by German IT professionals.Is the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction
Answer:
customer-serious orientation
Explanation:
Customer-serious orientation can be defined as the willingness to put a customer’s needs above ones own needs and to go beyond a job description to achieve customer satisfaction.
This ultimately implies that, a customer-serious oriented business firm or company puts the needs, wants and requirements of its customers first without considering their own needs in a bid to satisfy and retain them.
Hence, customer-serious orientation requires the employees working in an organization to show and demonstrate positive attitudes and behaviors at all times.
If a system's instruction set consists of an 8-bit opcode, what is the maximum number of output signal lines required for the control unit?
A) 8 B) 64C) 128 D) 256
Answer:
D. 256
Explanation:
Given
[tex]Instructions = 8\ bit[/tex]
Required
Determine the maximum number of output
To get the required value, we make use of the following:
[tex]Maximum = 2^n[/tex]
Where n is the bits of the opcode.
i.e.
[tex]n = 8[/tex]
Substitute 8 for n in [tex]Maximum = 2^n[/tex]
[tex]Maximum = 2^8[/tex]
[tex]Maximum = 256[/tex]
Hence, option D answers the question
Lola wants to install an add-in in Excel.She has to unblock the add-in to allow Excel to open the add-in file automatically.To do this,she right clicks on the add-in file and selects an option from the menu. What could the option be?
A) Copy
B) Delete
C) Rename
D) Properties
Answer:
The correct answer is:
Properties (D)
Explanation:
First of all, option D (Properties) is the option that makes the most sense in this scenario, because the other options: Copy, Delete, and Rename are unrelated commands to what is to be achieved.
Secondly and more practically, an add-in file may not load in excel, and most of the time it is blocked by default and has to be unblocked. The following steps are used:
1. close Excel if it is open
2. open the folder where the add-in file is located, right-click on the add-in file, and select "properties"
3. a display tray will appear, having the attributes: Read-only, Hidden, Advanced, and unblock. Click the checkbox against "unblock" and make sure it is checked.
4. click Apply and Click Ok
Voila, your add-in file is unblocked.
N:B The Images are for steps 2 and 3
What study skill is being used when taking a large project and breaking it down into smaller manageable tasks?
Answer:
prioritization
Explanation:
this is the answer
select all the apply. Effective presentations
Answer:are influenced by their setting, are consistent in their message, and are tailored to their audience.
Explanation:
Correct on Edge 2020
Which program will have the output shown below?
15
16
17
>>> for count in range(17):
print(count)
>>> for count in range(15, 17):
print(count)
>>> for count in range(15, 18):
print(count)
>>> for count in range(18):
print(count)
Answer:
>>> for count in range(15, 18):
print(count)
is the correct answer
Explanation:
According to a survey of hikers on a trail, 50% of the hikers like Gatorade (G) and 40% like energy bars (E). 20% like both. Assume random selection:____________ a. Find the probability that a hiker likes Gatorade or energy bars b. If a hiker likes Gatorade, find the probability that he likes energy bars c. If a hiker likes energy bars, find the probability that he likes Gatorade.
Answer:
Explanation:
As per given data
Probability hikers like Gatorade (G) = P(G) = 50% = 0.5
Probability hikers like energy bars = P(E) = 40% = 0.4
Probability hikers like both = P(G and E) = 20% = 0.2
a)
To find the probability that a hiker likes Gatorade or energy bars use the following formula
P(G or E) = P(G) + P(E) - P(G and E )
P(G or E) = 0.5 + 0.4 - 0.2
P(G or E) = 0.7
b)
To find the probability that a hiker likes Gatorade or energy bars use the following formula
P(E|G) = P(E and G)/P(G)
P(E|G) = 0.2/0.5
P(E|G) = 0.4
c)
The probability that he likes Gatorade.
P(G|E) = P(G and E) / P(E)
P(G|E) = 0.2 / 0.4
P(G|E) = 0.5
Network Access Protection (NAP) analyses the ________ of a computer.
Answer:
virus in a virus
Explanation:
Write a method smallestPositive that takes an integer array argument and returns the smallest positive element in the array.
Answer:
public class Main
{
public static void main(String[] args) {
int[] arr = {28, 7, -51, -2, 221};
System.out.println(smallestPositive(arr));
}
public static int smallestPositive(int[] arr){
int heighest = arr[0];
for(int i=0; i<arr.length; i++){
if(arr[i] > heighest)
heighest = arr[i];
}
int lowest = heighest;
for(int i=0; i<arr.length; i++){
if(arr[i] < lowest && arr[i] > 0)
lowest = arr[i];
}
return lowest;
}
}
Explanation:
The code is in Java.
Create a method named smallestPositive that takes one parameter, arr
Inside the method:
Find the largest value in the array using the first for loop
Set the this value as lowest to find the smallest positive value (I assumed there is at least on positive value in the array)
Create another for loop to iterate through the array. If a value is smaller than the lowest and if it is greater than 0, set it as lowest
When the loop is done, return the lowest
Inside the main method:
Initialize an array with some numbers
Call the smallestPositive() with this array and print the result
(In our example, the result would be 7)
Olivia wants to send a report to her boss concerning an upcoming project. Which communication format should she use to send a formal message to her boss? A. email B. chat C. forum D. blog
Answer:
A. Email. It is formal
Explanation:
Answer:
Explanation:
Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management strategy? An indirect benefit? Provide examples.
Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.
It gives an illustration of the relationship of the National preparedness mission elements of risk.
Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.
However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.
Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.
When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.
THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.
"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.
Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.
Gus is developing new software in an environment in which incremental changes are released at regular intervals within a timebox. Shana is developing software for the minimum viable product stage in order to provide the development team with feedback on how to improve the application. Gus is employing the software methodology known as __________, while Shana is employing the software methodology known as __________.
Answer:
Answered below
Explanation:
Gus is employing a software methodology known as agile while Shana is employing the minimum viable product methodology.
In agile methodology, changes are built and released incrementally within a time frame.
Therefore the software product is continuously updated.
In the minimum viable product methodology, the basic aspect of the software is released for use and feedback is received from the users thereby informing what improvements to make.
Answer: Agile, Lean
Gus is employing the software methodology known as agile, while Shana is employing the software methodology known as lean.
Create a formula for sheet Inventory that highlights any rows where the Reorder level is below the On Hand level in yellow on excel 2016. Will mark brainliest if you can tell me how.
Answer:
Highlight the actual inventory level column and click on condition formatting, click on the drop-down button and select "Formula is" to input the formula "=B4 <= C4", select the color pattern to format the row if the condition is met and click ok.
Explanation:
Assuming the reorder level (column C4 and the on-hand level or actual inventory (column B starting at row 4) are columns in the Excel worksheet. The reorder level is the minimum level of inventory before inventory is populated. So the formula compares the value of the actual level with the reorder level, if any row is less than or equal to the reorder level, the row is formatted with the selected color.
Answer:
Highlight the actual inventory level column and click on condition formatting, click on the drop-down button and select "Formula is" to input the formula "=B4 <= C4", select the color pattern to format the row if the condition is met and click ok.
Explanation:
how do i change my desktop theme on my chromebook?
Answer:
open Chrome.
At the top right, click More. Settings.
Under "Appearance," click Themes. You can also go to the gallery by visiting Chrome Web Store Themes.
Click the thumbnails to preview different themes.
When you find a theme you'd like to use, click Add to Chrome.
Explanation:
Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following tasks is she likely to perform as part of a sequence of actions do that? Right-click the file and choose the Copy option. Open the application and select the File menu. Right-click the file and select the Delete option. Go to the location where you want to save the file. Right-click an empty area and select the Paste option.
Answer:
Right-click the file and choose the Copy option, Go to the location where you want to save the file, Open the application and select the File menu, and Right-click an empty area and select the Paste option.
Explanation:
You would not need to Right-click the file and delete it to back up her Halloween photos, but you would need to upload them to an external application. To do that, you would basically do every step besides right-clicking and deleting the file (Right-click the file and select the Delete option)
Answer: A, D, E
Explanation: correct on Plato, plus you wouldn’t select the file menu or delete the files.
Write a Python3 program to check if 3 user entered points on the coordinate plane creates a triangle or not. Your program needs to repeat until the user decides to quit, and needs to deal with invalid inputs.
Answer:
tryagain = "Y"
while tryagain.upper() == "Y":
x1 = int(input("x1: "))
y1 = int(input("y1: "))
x2 = int(input("x2: "))
y2 = int(input("y2: "))
x3 = int(input("x3: "))
y3 = int(input("y3: "))
area = abs(x1 *(y2 - y3) + x2 * (y1 - y3) + x3 * (y1 - y2))
if area > 0:
print("Inputs form a triangle")
else:
print("Inputs do not form a triangle")
tryagain = input("Press Y/y to try again: ")
Explanation:
To do this we simply calculate the area of the triangle given that inputs are on plane coordinates i.e. (x,y).
If the area is greater than 0, then it's a triangle
If otherwise, then it's not a triangle.
This line initializes iterating variable tryagain to Y
tryagain = "Y"
while tryagain.upper() == "Y":
The following lines get the coordinates of the triangle
x1 = int(input("x1: "))
y1 = int(input("y1: "))
x2 = int(input("x2: "))
y2 = int(input("y2: "))
x3 = int(input("x3: "))
y3 = int(input("y3: "))
This calculates the area
area = abs(x1 *(y2 - y3) + x2 * (y1 - y3) + x3 * (y1 - y2))
This checks for the condition stated above.
if area > 0:
print("Inputs form a triangle") This is printed, if true
else:
print("Inputs do not form a triangle") This is printed, if otherwise
tryagain = input("Press Y/y to try again: ") This prompts the user to try again with another set of inputs
which of the following players is on offence
Answer:
A baseball player trying to steal second base.
Explanation:
From a test I took, im hoping the answer choices were the same as yours tho.
Describe two circumstances where access services might get implemented by organizations please.
Answer:
Answered below
Explanation:
Remote access enables access to an organisations network from remote places. Certain conditions require such access. An organisation might require their workforce to work from home especially in this coronavirus health pandemic situation. Therefore remote access is necessary.
Also attending to customers needs, virtual meetings and connections to workers and clients all over the world, can only be made possible by the implementation of secured remote access, by the organisation.
The "persistent interrupt" is a bug in the code that exhibits a behavior that’s similar to an infinite loop. The ISR exits and gets called back immediately an infinite amount of times even though the interrupt event occurred once. The persistent interrupt occurs when three conditions are met. What are these conditions? How do we avoid a persistent interrupt from occurring?
Answer:
1. the 3 conditions have been listed below
2. to avoid persistent interrupt, we break any of the 3 conditions.
Explanation:
The persistent interrupt occurs when these three conditions below are met.
They are as follows:
1. GIE=1
2. xIE=1
3. xIFT=1
in avoidance of the persistent interrupt from occurring, we break any of these 3 conditions that I have listed above.
in order To break any one of the 3 conditions, we clear the flag that corresponds to the associated
we can also avoid the persistent interrupt occurrence by having the Interrupt Service Routine (ISR) clear maybe one or all of the three bits mentioned above before the ISR terminates, so it wouldn't get called back again. clearing any of the bits will not allow the ISR to be called again.
Write code that generates a random odd integer (not divisible by 2) between 50 and 99 inclusive.
import random
nums = [x for x in range(50,100) if x%2!=0]
print(random.choice(nums))
We use a list comprehension to create a list of the odd numbers between 50 and 99. Then we randomly choose one of those numbers using the random module.
A technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called:_______
a. assistive instruction.
b. UDL technology.
c. hypertext software.
d. adaptive instruction.
Answer:
c. hypertext software.
Explanation:
In Computer science, a hypertext can be defined as textual informations that are being displayed on a computer system and these texts usually links to other informations (texts) that the user can easily have access to in real-time.
Basically, some developers include encyclopedias and dictionaries in their software database, which makes other necessary informations or contents easier and immediately accessible to the users through the use of hypertexts that is activated by pointing and clicking on the link with a mouse, keypress set or soft touching the screen.
Hence, a technology that can help a student to increase his or her understanding of the vocabulary used in a classroom is called hypertext software.