Answer:
The function in python is as follows:
def twice(num):
return 2 * num
Explanation:
This defines the function; The function receives num as its parameter
def twice(num):
This returns twice of num
return 2 * num
What component can you use to open windows?
Answer:
Start Windows 10 Component Services via the Run dialog box. Press Win+ R keyboard shortcuts to launch Run dialog box, type dcomcnfg or dcomcnfg.exe in the box and click OK/press Enter to open Component Services.
Explanation:
Amy’s new summer job at the pool will put $9 per hour. Which term describes this type of hourly income?
A. Salary
B. Take-home pay
C. Wage
D. All of the above
Answer:
d
Explanation:
The register in the CPU is not the same as the RAM.
Group of answer choices
True
False
A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.
Blank Are input instructions you give to a computer
Explanation:
A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.
A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such as word processing or spreadsheet, to hide virus code.
Answer: macro virus
Explanation:
The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.
A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.
1. Which of the following is a new
generation optical storage device?
CD
DVD
Blu-ray disc
Pen drive
Answer:
CD or CD Rom
fhiykkoojnddeyui
Please help I I decided to screen shot something in my laptop but now my screen isn’t working or moving can you give me a way to solve my problem this is for 24 points
Answer:
Just restart it. It would definitely work.
Explanation:
maybe try to do the discharge process?
close your laptop and take off your battery. then press on the power button for atleast 30 seconds or more. now put the battery back on and plug your laptop's charger in. then press power button......i think it'll open by then...I'm not sure tho
what is gradient descent in neural networks?
Answer:
radient Descent is a process that occurs in the backpropagation phase where the goal is to continuously resample the gradient of the model's parameter in the opposite direction
Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in this artwork?
A. emphasis
B. repetition
C. balance
D. alignment
E. proximity
Answer: Alignment
Explanation:
The principle of repitition indicates that some aspect of a design are repeated. This can be in form of bullet list, lines, color etc.
Balance has to do with how the weight is distributed.
The Principle of Alignment means that the pictures on a page should be connected visually to another thing.
Principle of Proximity simoly means that the items that are related on a page should be close to each other.
Therefore, the principles of page layout that Sam is planning to use in this artwork is alignment.
Answer:
D. alignment
Explanation:
At each step it should print out the move it makes and its performance score (e.g. S 0.2). Every 5 steps, it should print out a grid, with a "[ ]" on the square where the robot is now. Thus, with the above input, if the robot has done S U S L S, the output would be:
Answer:
The output would be S 0.2 U 0.2 S 0.2 U 0.2 L 0.2 S 0.2 [ ]
Explanation:
Given that at each step output prints for example S 0.2.
Also given after every 5 steps, it should print a grid "[ ]".
if robot has been given S U S L S, it prints output as
S 0.2 U 0.2 S 0.2 U 0.2 L 0.2 S 0.2 [ ]
Alani downloads a game called Kandy Krush from the app store. The app prompts her to enter her Social Security number (SSN) before playing. Alani asks her friend for advice. Which advice should her friend give
Answer:
"The game shouldn't need your SSN to be playable; don't enter it."
Explanation:
The game shouldn't need your SSN to be playable; don't enter it."
What is SSN?A numerical identification code known as a Social Security number (SSN) is given to residents and citizens of the United States in order to track income and calculate benefits.
As a component of The New Deal, the SSN was established in 1936 to offer benefits for retirement and disability. The SSN was first created to track earnings and offer benefits. Today, it is also utilized for other things including tracking credit reports and identifying people for tax purposes.
In the US, people are required to provide their SSN in order to open bank accounts, apply for government benefits, get credit, make large purchases, and more.
Therefore, The game shouldn't need your SSN to be playable; don't enter it."
To learn more about SSN, refer to the link:
https://brainly.com/question/2040269?
#SPJ5
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print
b. random
c. else
d. while
LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
Answer:d. while ✓
Explanation:
The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.
[tex] \\ \\ [/tex]
Hope it helps
-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀
Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. calcPyramidVolume() calls the given calcBaseArea() method in the calculation.
Answer:
The method in C++ is as follows:
double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){
double baseArea = calcBaseArea(baseLength, baseWidth);
double volume = baseArea * pyramidHeight;
return volume;
}
Explanation:
This defines the calcPyramidVolume method
double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){
This calls the calcBaseArea method to calculate the base area of the pyramid
double baseArea = calcBaseArea(baseLength, baseWidth);
This calculates the volume
double volume = baseArea * pyramidHeight;
This returns the volume
return volume;
}
See attachment for complete program that include all methods that is required for the program to function.
Write an algorithm to sum to values
Answer:
There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:
Let a,b be two numbers.
c=a+b;
print(c);
But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:
Let a be the variable where the input numbers are stored.
while(f==1)
{
printf(“Enter number”);
scanf(“Take number into the variable a”);
sum=sum+a;
printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);
scanf(“Take the input into the variable f”);
}
print(Sum)
Explanation:
hi there answer is given mar me as brainliest
17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursion; a non-recursive function, or using the built-in function math.pow(), would be more common.
Answer:
The recursion function is as follows:
def raise_to_power(num, power):
if power == 0:
return 1
elif power == 1:
return num
else:
return (num*raise_to_power(num, power-1))
Explanation:
This defines the function
def raise_to_power(num, power):
If power is 0, this returns 1
if power == 0:
return 1
If power is 1, this returns num
elif power == 1:
return num
If otherwise, it calculates the power recursively
else:
return (num*raise_to_power(num, power-1))
A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit will cost 100. Judge and print total cost for user. Plz give answer in C++.
Answer:
The program in C++ is as follows:
#include <iostream>
using namespace std;
int main(){
int qty;
float discount = 0;
cout<<"Quantity: ";
cin>>qty;
int cost = qty * 100;
[tex]i f (cost > 1000)[/tex] { [tex]discount=cost * 0.10[/tex]; }
cout<<"Cost: "<<cost - discount;
return 0;
}
Explanation:
This declares the quantity as integer
int qty;
This declares and initializes discount to 0
float discount = 0;
This prompts the user for quantity
cout<<"Quantity: ";
This gets input for quantity
cin>>qty;
This calculates the cost
int cost = qty * 100;
If cost is above 1000, a discount of 10% is calculated
[tex]i f (cost > 1000)[/tex] { [tex]discount=cost * 0.10[/tex]; }
This prints the cost
cout<<"Cost: "<<cost - discount;
Justin Kace is promoting the metric system and wants people to be able to convert miles to kilometers and kilometers to miles. Develop a program that asks the user for a number of miles and converts miles to kilometers (multiplying miles by 1.609), and then asks for a number of kilometers and converts kilometers to miles (multiplying kilometers by 0.6214).
Solution :
//Program heading
Display "Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program"
//Get [tex]$\text{Miles}$[/tex]
Display "Enter the [tex]$\text{miles}$[/tex]: "
Input [tex]$\text{miles}$[/tex]
//Convert [tex]$\text{miles}$[/tex] to kilometers and display result
converted_km =[tex]$\text{miles}$[/tex] x 1.609
Display "Converted kilometers = " + converted_km
//Get Kilometers
Display "Enter the kilometers: "
Input km
//Convert kilometers to [tex]$\text{miles}$[/tex] and display result
converted_[tex]$\text{miles}$[/tex] = km x 0.6214
Display "Converted [tex]$\text{miles}$[/tex] = " + converted_[tex]$\text{miles}$[/tex]
//Thank the user for using this program
Display "Thank you for using this program. Good-bye!"
Stop
Sample Output:
Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program
Enter the [tex]$\text{miles}$[/tex]: 10
Converted kilometers = 16.09
Enter the kilometers: 10
Converted [tex]$\text{miles}$[/tex] = 6.214
Thank you for using this program. Good-bye!
write down the multiples of three from 474 to 483
Answer:
474, 477, 480, 483
hope this helps
have a good day :)
Explanation:
. Write the advantages and disadvantages of CLI?
The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capture, store, and analyze. These big data may be unstructured or semi-structured and are not suitable for relational DBMS products. What are the new technologies developed to handle the big data
Answer:
Some of the new technologies developed to handle the big data are as follows:
1. In-memory Databases
2. Blockchain
3. NoSQL Databases
4. Edge Computing
5. Streaming Analytics.
6. Artificial Intelligence
Explanation:
Some of the new technologies developed to handle the big data are explained as follows:
1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.
2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.
3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.
4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.
5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.
6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.
what are the process of boots up a computer?
Answer:
a boat causes a computer start cutting cs and max contain built in instructions in a rom or flash memory chip that are automatically excited on started up these instructions search for the operating system load it and pass control to itSuppose a computer using set associative cache has 221 bytes of main memory, and a cache of 64 blocks, where each cache block contains 4 bytes. a) If this cache is 2-way set associative, what is the format of a memory address as seen by the cache, i.e., what are the sizes of the tag, set, and offset fields
Answer:
Tag = 1
Index = 5
Block offset = 2
Explanation:
From the given information:
The main memory bits(MM) = 221
number of block in the cache = 64 blocks
Block size = 4B
Recall that;
MM = log (memory size)
Thus;
main memory bits = log (221)
= 8 bits
Since this is a 2-way assoicative set;
the number of set in each cache = block size/2
64/2 = 32
Now, the index bit = log( no of set in each cache)
= log(32)
= 5 bits
Also since block size = 4B;
the block offset = log(4) = 2 bits
As such, tag = main memory bits - (index bit + block offset)
tag = 8 -(5 + 2)
tag = 8 -7
tag = 1
You need to build out the networking for your small local business. You have purchased a core switch and will pull home runs to each of the devices. What type of cabling will you use to connect your network
Answer: Use an Ethernet cable
Explanation:
Since the person will need to build out the networking for a small local business and wants to pull home runs to each of the devices after buying a core switch, the type of cabling that will be used to connect the network is an Ethernet cable.
An Ethernet cable is known to be the commonest network cable that's used on a wired network. The cable is required to connect the wired devices together to local network which is then vital for file sharing and Internet access.
Write a function that accepts a positive random number as a parameter and returns the sum of the random number's digits. Write a program that generates random numbers until the sum of the random number's digits divides the random number without remainder. assembly language
Answer:
Explanation:
The following Python program has a function called addDigits which takes a number as a parameter and returns the sum of the digits. Then the program creates a loop that keeps creating random numbers between 222 and 1000 and divides it by the value returned from the function addDigits. If the remainder is 0 is prints out a statement and breaks the loop, ending the program. The picture below shows the output of the program.
import random
def addDigits(num):
sum = 0
for x in str(num):
sum += int(x)
return sum
sum = addDigits(random.randint(222, 1000))
while True:
myRandomNum = random.randint(2, 99)
if (sum % myRandomNum) == 0:
print("No remainder between: " + str(sum) + " and " + str(myRandomNum))
break
Scenario: A robot is sitting in a chair with its arms facing down. Write an algorithm, using pseudocode, to make the robot:
1. stand up2. walk forward until it senses a wall3. turn around4. walk back to the chair5. sit down in its original starting positionFinally, output the total number of steps taken.Commands--------In addition to our standard pseudocode commands, you must also use the following robot control commands:sitstandstep (one step forward)raise arms (parallel to floor)lower arms (pointing to floor)sense (only if arms are raised)turn (90 degrees right)Immediately after issuing a sense command, you can check whether the robot is at the wall as follows:if at wallor alternativelyif not at wallAssumptions-----------You must assume the following facts:The robot's initial sitting position is directly facing the target wall.There are no obstacles between the robot and the wall.The wall is 1 or more exact steps from the chair.The wall is sensed when it is less than 1 step from the robot's arms.The length of the robot's arms are slightly less than the length of 1 step.Your solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps takenYour solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps taken
Solution :
[tex]\text{Algorithm to}[/tex] stand [tex]$\etxt{up:}$[/tex]
step [tex]1[/tex]: [tex]$\text{stand}$[/tex]
step 2: [tex]\text{raise arms}[/tex]
[tex]\text{Algorithm to}[/tex] walk [tex]$\text{until it senses}$[/tex] a wall:
step [tex]1[/tex]: [tex]$\text{stand}$[/tex]
step 2: [tex]\text{raise arms}[/tex]
step 3: [tex]$\text{wallSensed}$[/tex]=false
step 4: [tex]$\text{numberOfSteps}$[/tex] = 0
step 5: if([tex]$\text{wallSensed}$[/tex]==true) then
[tex]\text{lower arms}[/tex]
step
else
if(sense)
[tex]$\text{wallSensed}$[/tex]=true;
else
step
[tex]$\text{numberOfSteps}$[/tex]++;
step 6: display [tex]$\text{numberOfSteps}$[/tex] to reach the wall
[tex]\text{Algorithm to}[/tex] turn around:
Step [tex]1[/tex]: if([tex]$\text{wallSensed}$[/tex]==true) then
turn
[tex]\text{raise arms}[/tex]
turn
[tex]\text{Algorithm to}[/tex] walk back[tex]$\text{ to the chair}$[/tex]:
Step [tex]1[/tex]: [tex]$\text{turn around}$[/tex]
Step 2: for i=[tex]1[/tex] to [tex]$\text{numberOfSteps}$[/tex] do
step
[tex]\text{Algorithm to}[/tex] sit back down:
Step [tex]1[/tex]: sit
Step 2: Lower arms
three basic components to cloud computing are client, internet
Answer:
the basic components of cloud comuting in a simple topology
Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Explain why these tips are useful.
Answer:
1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons
2. Do not share your passwords because people can hack into your things
3. Don't make guessable passwords such as Cookies, ILovePizza, Money
Which of the following describes an iteration in a computer program?
Answer:
a set of instructions that can be run multiple times throughout a program
Explanation:
They need network security skills to know how to perform tasks such as:
A. Testing software before launching.
B. maintaining databases.
C. investigating virus attacks
Answer:
Your answer should be C
because in they will protect the data base from virus.