Answer:
The program written in python is as follows
persons = []
most = 0
personindex = 0
for i in range(1,11):
print("Person ",i)
pancake = int(input(": "))
persons.append(pancake)
if pancake > most:
most = pancake
personindex = i
print("Person ",personindex," ate most pancakes")
Explanation:
This line initializes an empty list
persons = []
This line initializes variable most to 0
most = 0
This line initializes variable personindex to 0
personindex = 0
This line iterates from 1 to 10
for i in range(1,11):
The next two line prompts user for input
print("Person ",i)
pancake = int(input(": "))
This line inserts the user input to the created list "persons"
persons.append(pancake)
The next if statement checks for the person with the most pancakes
if pancake > most:
most = pancake
personindex = i
This line prints the person with most pancakes
print("Person ",personindex," ate most pancakes")
An output device is also called a(n)
Write a program that prints all the numbers from 0 to 6 except 3 and 6. Expected output: 0 1 2 4 5
for x in range(7):
if (x == 3 or x==6):
continue
print(x, end=' ')
print("\n")
Output:>> 0 1 2 4 5
Explanation:The code above has been written in Python. The following explains each line of the code.
Line 1: for x in range(7):
The built-in function range(7) generates integers between 0 and 7. 0 is included but not 7. i.e 0 - 6.
The for loop then iterates over the sequence of number being generated by the range() function. At each iteration, the value of x equals the number at that iteration. i.e
For the first iteration, x = 0
For the second iteration, x = 1
For the third iteration, x = 2 and so on up to x = 6 (since the last number, 7, is not included).
Line 2: if (x == 3 or x == 6):
This line checks for the value of x at each iteration. if the value of x is 3 or 6, then the next line, line 3 is executed.
Line 3: continue
The continue keyword is used to skip an iteration in a loop. In other words, when the continue statement is encountered in a loop, the loop skips to the next iteration without executing expressions that follow the continue statement in that iteration. In this case, the print(x, end=' ') in line 4 will not be executed when x is 3 or 6. That means 3 and 6 will not be printed.
Line 4: print(x, end=' ')
This line prints the value of x at each iteration(loop) and then followed by a single space. i.e 0 1 2 ... will be printed. Bear in mind that 3 and 6 will not be printed though.
Line 5: print("\n")
This line will be printed after the loop has finished execution. This line prints a new line character.
The program is an illustration of loops.
Loops are used to perform repetitive operations.
The program in Python, where comments are used to explain each line is as follows:
#This iterates from 0 to 6
for i in range(7):
#This checks if the current number is not 3 or 6
if not i==3 and not i == 6:
#If yes, the current number is printed
print(i,end=" ")
Read more about similar programs at:
https://brainly.com/question/21863439
Which of the following components provides a number of critical services, including a user interface, memory management, a file system, multitasking, and the interface to hardware devices?a. RAMb. Operating system (OS)c. BIOSd. Hard drive
Answer:
b. Operating system (OS)
Explanation:
Operating System is a term that is mostly referred to as a computer system's component, program or software technology, that carry out various operations for the whole Computer System.
These operations include:
1. a user interface
2. memory management
3. a file system
4. multitasking
5. the interface to hardware devices.
Hence, in this case, the right answer is option B: Operating System.
_____It saves network service providers a lot of money by collecting relevant statistics on network device usage.
Answer:
Internet of things
Explanation:
Internet of things often referred to as IoT, is a term in the computer world, that describes an object or a form of the network between various but similar items, and is purposely designed or has the capacity to gather data without the need to have biological or human-computer data exchange.
Hence, the Internet of Things saves network service providers a lot of money by collecting relevant statistics on network device usage.
Many languages distinguish between uppercase and lowercase letters in user-defined names. What are the pros and cons of this design decision?
Answer:
Explanation:
The reasons why a language would distinguish between uppercase and lowercase in its identifiers are:
(1) So that variable identifiers may look different than identifiers that are names for constants, such as the convention of using uppercase for constant names and using lowercase for variable names in C.
(2) So that the catenated words such as names can have their first letter distinguished, as in Total Words. The primary reason why a language would not distinguish between uppercase and lowercase in identifiers is it makes programs less readable, because words that look very similar are actually completely different, such as SUM and Sum.
Emerson needs to tell his browser how to display a web page. Which tool will he use? HTML Web viewer Operating system Translator
Answer:
HTML
Explanation:
yeah i just took test
What is Animation?
(A) A cartoon
(B) The apparent movement of an object
(C) A file format
(D) All of the above
Answer:
Hey!
Your answer should be B The apparent movement of an object
Explanation:
Animation is a method in which figures are manipulated to appear as moving images...often done with softwares where you take multiple images per scene and string them together WHICH MAKES THE OBJECT MOVE!
HOPE THIS HELPS!
6.21 LAB: Swapping variables Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is:
Answer:
Here is the C++ and Python programs:
C++ program:
#include<iostream> //to use input output functions
using namespace std; //to identify objects like cin cout
void swapvalues(int& userVal1, int& userVal2); //function to swap values
int main() { //start of main function
int integer1,integer2; //declare two integers
cout<<"Enter first integer: "; //prompts user to enter the first number
cin>>integer1; //reads first number from user
cout<<"Enter second integer: "; //prompts user to enter the second number
cin>>integer2; //reads second number from user
cout<<"Integers before swapping:\n"; //displays two numbers before swapping
cout<<integer1<<endl<<integer2;
swapvalues(integer1, integer2); //calls swapvalues method passing two integers to it
cout << "\nIntegers after swapping:\n"; //displays two numbers after swapping
cout<<integer1<<endl<<integer2; }
void swapvalues(int& userVal1, int& userVal2){ //method that takes two int type numbers and swaps these numbers
int temp; //temporary variable
temp = userVal1; //temp holds the original value of userVal1
userVal1 = userVal2; //the value in userVal2 is assigned to userVal1
userVal2 = temp; } //assigns value of temp(original value of userVal1) to userVal2
The program prompts the user to enter two integers and then calls swapvalues() method by passing the integers by reference. The swapvalues() method modifies the passed parameters by swapping them. The method uses a temp variable to hold the original value of first integer variable and then assigns the value of second integer variable to first. For example if userVal1 = 1 and userVal2 =2. Then these swapping statements work as follows:
temp = userVal1;
temp = 1
userVal1 = userVal2;
userVal1 = 2
userVal2 = temp;
userVal2 = 1
Now because of these statements the values of userVal1 and userVal2 are swapped as:
userVal1 = 2
userVal2 = 1
Explanation:
Python program:
def swap_values(user_val1, user_val2): #method to swap two numbers
return user_val2,user_val1 #returns the swapped numbers
integer1 = int(input('Enter first integer :')) #prompts user to enter first number
integer2 = int(input('Enter second integer :')) #prompts user to enter second number
print("Numbers before swapping") #displays numbers before swapping
print(integer1,integer2)
print("Numbers after swapping") #displays numbers after swapping
integer1,integer2 = swap_values(integer1,integer2) #calls method passing integer1 and integer2 to swap their values
print(integer1,integer2) #displays the swapped numbers
The screenshot of programs and outputs is attached.
The program that swaps variables will return the reverse of the users input. The second integer input will be printed first followed by the first integer input.
The program that swaps the user integer input.def swap_variables(first_input, second_input):
return second_input, first_input
first_input = input("input the first integer: ")
second_input = input("input the second integer: ")
print(f"numbers before swapping are {first_input} and {second_input}")
print(f"numbers after swapping are {second_input} and {first_input}")
Code explanation
The code is written in python.
The first line of code we defined a function named "swap_variables" and it accept parameters as first_input and second_inputs.Then we returned the swapped items.The first_input is used to store the users first inputThe second_input is use to store the users second inputThen, we print the original valuesFinally, we print the swapped users inputlearn more on python variables here: https://brainly.com/question/14039335
list the network characteristics of the wireless network(s) in the decode -- SSIDs, channels used, AP names, presence of Bluetooth, presence of RFID. Be sure to explain where/how one got each answer. [5 Points]
Answer:
SSIDs : service state identifiers are used to beacon for connect from an access point or wireless router. They are used to request for authentication in a wireless network.
Channels used: this is the frequency range used by a wireless network. It is spaced to avoid collision.
Ap names is the name of the wireless access point that is used to identify a beacon in a workstation. Bluetooth is a short range private network between two devices.
RFID: radio frequency identifier or identification is a chip that hold information of an individual electronically.
Explanation:
These are some examples of wireless communication devices.
importance of being having data on hand
Answer:
Explanation:
Data is collected is to make the decisions that will positively impact the success of a company, improve its practices and increase revenue. It is also essential that the way in which data are collected, assembled and published respects Indigenous sensitivities, not least so as to ensure that Indigenous people understand the purposes for which the data is being collected and willingly provide accurate answers to data collectors.
Hope this helped you!
When troubleshooting Domain Name System (DNS) problems, which helpful feature do public servers usually support
Answer:
ICMP echo requests.
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address. This simply means that, DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
When troubleshooting Domain Name System (DNS) problems, one helpful feature the public servers usually support is an ICMP echo requests.
ICMP is an acronym for Internet Control Message Protocol and it is a standard protocol for communicating network errors in the form of messages such as Time exceeded and Destination unreachable.
In Computer Networking, an echo reply and echo request are implemented with a command utility referred to as ping. When a user sends an echo request message with the ping program, a successful attempt will return an echo reply message.
Hence, when troubleshooting Domain Name System (DNS) problems, a user should ping a public server such as a Google DNS server with the IP address (8.8.8.8 or 8.8.4.4), Cloudfare with 1.1.1.1 or the common 4.2.2.2 DNS server. If successful, it means the name-server was resolved properly into an IP address and therefore, there's an active connection on the network.
Based on the information given, the helpful feature that public servers usually support is the ICMP echo requests.
It should be noted that a Domain Name System simply means a naming database where the internet domain names are stored and translated into their respective internet protocol address.
It should be noted that when troubleshooting Domain Name System problems, the helpful feature that public servers usually support is the ICMP echo requests.
Learn more about domain on:
https://brainly.com/question/19195397
1.3 Code Practice: Question 3. On edhesieve.
Write a program to output the following:
^ ^
( o o )
v
Hint: Copying and pasting the code above into each line of the programming environment will help you ensure that you are accurately spacing out the required characters.
Using ¨print¨
Answer:
I'll answer this question using Python
print(" ^ ^")
print("( o o )")
print(" v")
Explanation:
To answer this question, you have to follow the hint as it is in the question
The hint says you should copy each line into a print statement and that's exactly what I did when answering this question;
In other words;
^ ^ becomes print(" ^ ^")
( o o ) becomes print("( o o )")
v becomes print(" v")
Which of the following BEST defines digital citizen? a) a person who uses digital resources to research information b) a person who is digitally literate c) a person who is digitally connected d) a person who uses digital resources to engage in society
Answer:
a
Explanation:
Answer:
the answer is A
Explanation:
Which of the following information security technology is used for avoiding browser-based hacking?
Anti-malware in browsers
Remote browser access
Adware remover in browsers
Incognito mode in a browser
Answer:
B
Explanation:
if you establishe a remote browsing by isolating the browsing session of end user.. you'll be safe
Write a program that asks the user for three names, then prints the names in reverse order. Sample Run: Please enter three names: Zoey Zeb Zena Zena Zeb Zoey
Solution:
Since no language was specified, this will be written in Python.
n1, n2, n3 = input ("Enter three names: ").split()
print(n3)
print(n2)
print(n1)
Cheers.
What makes Group Policy such a powerful tool is its ability to enable security administrators to:_________.
Answer: Enforce the organization's security policy
Explanation: Group policy provides a robust and centralized control to systems or computers on a particular network by providing a quick and efficient means of maintaining network security by affording network administrators the ability to several policies they wish to apply on users and computers in their network. This way the changes or policies can be applied to every computer on it's network. Hence it allows the network administrators to enforce the organization's security policy which may include restricting access to certain websites, directories, files or settings for all computers on the organization's network.
Which of the following is not a job title associated with a career in visual and audio technology? master control operator production assistant stagehand optometrist
Answer:
Optometrist
Explanation:
Optometrists are healthcare professionals who provide primary vision care ranging from sight testing and correction to the diagnosis, treatment, and management of vision changes. An optometrist is not a medical doctor.
Answer:
c
Explanation:
Design a 4-to-16 line Decoder by using the two 3*8 decoder-line decoders. The 3-to-8 line decoders have an enable input ( '1' =enabled) and the designed 4-to-16 line decoder does not have an enable. Name the inputs A0........A3 and the outputs D0.......D15.
Answer:
- Connect A0, A1 and A2 to the inputs of the two 3-to-8 decoders
- Connect A3 to the enable input of the first 3-to-8
- Connect A3 also to an inverter, and the output of that inverter to the enable input of the second 3-to-8
- D0 to D7 of the first 3-to-8 is D0 to D7 of your 4-to-16
- D0 to D7 of the second 3-to-8 is D8 to D15 of your 4-to-16
Write a GUI program that translates the Spanish words to English. The window should have three buttons, one for each Spanish word. When the user clicks a button, the program displays the English translation in a label.
Answer:
Here is the Python program:
import tkinter #to create GUI translator application
class Spanish2English: # class to translate Spanish words to English
def __init__(self): # constructor of class
self.main_window = tkinter.Tk() # create a main window
self.top_frame = tkinter.Frame() # create a frame
self.middle_frame = tkinter.Frame()# # create a middle frame
self.bottom_frame = tkinter.Frame() #create a frame at bottom
self.top_label = tkinter.Label(self.top_frame,text="Select a spanish word to translate") #creates a label at top frame with text: Select a Spanish word to translate
self.top_label.pack() # to organize the widgets
self.first_button=tkinter.Button(self.middle_frame, text="uno",command=self.word1)
#create first button with Spanish word uno and place it in middle frame
self.second_button = tkinter.Button(self.middle_frame, text="dos",command = self.word2)
# create second button with Spanish text dos and place it in middle frame
self.third_button = tkinter.Button(self.middle_frame, text="tres",command = self.word3)
# create third button with Spanish text tres and place it in middle frame
self.first_button.pack(side='top') #place first button at top
self.second_button.pack(side='top') #place second button next
self.third_button.pack(side='top') #place third button in end
self.bottom_left_label = tkinter.Label(self.bottom_frame,text="English translation: ") #creates label with text English translation:
self.translation = tkinter.StringVar() #creates String variable to hold the English translation of the Spanish words
self.trans_label = tkinter.Label(self.bottom_frame, textvariable=self.translation) #creates and places label at the bottom frame which contains the English translation of Spanish words
self.bottom_left_label.pack(side = 'left')
#organizes the labels
self.trans_label.pack(side = 'right')
#organizes the frames
self.top_frame.pack()
self.middle_frame.pack()
self.bottom_frame.pack()
tkinter.mainloop() #to run the application
def word1(self): #method to translate word1 i.e. uno
self.translation.set('one') #set the value of object to one
def word2(self): #method to translate word2 i.e. dos
self.translation.set('two') #set the value of object to two
def word3(self): #method to translate word3 i.e. tres
self.translation.set('three') #set the value of object to three
translator = Spanish2English() #run the translator application
Explanation:
The program is well explained in the comments mentioned with each line of program
The program creates a GUI translator application using tkinter standard GUI library. In class Spanish2English first the main window is created which is the root widget. Next this main window is organized into three frames top, middle and bottom. A label is placed in the top frame which displays the text "Select a Spanish word to translate". Next, three buttons are created, for each Spanish word. The first button displays the Spanish word 'uno', second button displays the Spanish word 'dos' and third button displays the Spanish word 'tres'. Next, the two labels are created, one label is to display the text: "English translation: " and the other label is to display the English translation of the Spanish words in each button. In the last, three methods, word1, word2 and word3 are used to set the value of the translation object.
The program along with its output is attached.
What additional features on your router would you implement if you were setting up a small wired and wireless network
Answer:
Explanation: The following features will be implemented:
1) Guest networks,
2) Networked attached storage,
3) MAC filtering
A guest Wi-Fi network is essentially a separate access point on your router. All of your home gadgets are connected to one point and joined as a network, and the guest network is a different point that provides access to the Internet, but not to your home network. As the name implies, it's for guests to connect to.
Network Attached Storage
is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity. Users on a local area network (LAN) access the shared storage via a standard Ethernet connection.
MAC address filtering allows you to define a list of devices and only allow those devices on your Wi-Fi network.
Which connection configuration offers faster speeds, higher security, lower latencies, and higher reliability?
Answer:
ExpressRoute
Explanation: ExpressRoute is an Azure service that allows a user to create a private connection with other datacenters /infrastructures. It gives an enterprise the opportunities to effectively extend and expand its networks into cloud services offered by Microsoft cloud, it can also be described as a cloud Integration option that can be used by a private network to plug-in into a Microsoft cloud services.
what is the first computer company
Electronic Controls Company it was founded on 1949 by J.Presper and John Mauchly
Answer: Electronic Controls Company
Explanation: The first computer company was Electronic Controls Company and was founded in 1949 by J. Presper Eckert and John Mauchly, the same individuals who helped create the ENIAC computer.
Hope this helps^^
how do you think calculator of a computer works? describe the procedure.
plz answer quickly its urgent!!!
Explanation:
calculators work by processing information in binary form. We're used to thinking of numbers in our normal base-ten system, in which there are ten digits to work with: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. The binary number system is a base-two system, which means there are only two digits to work with: 0 and 1. Thus, when you input numbers into a calculator, the integrated circuit converts those numbers to binary strings of 0s and 1s.
The integrated circuits then use those strings of 0s and 1s to turn transistors on and off with electricity to perform the desired calculations. Since there are only two options in a binary system (0 or 1), these can easily be represented by turning transistors on and off, since on and off easily represent the binary option
Once a calculation has been completed, the answer in binary form is then converted back to our normal base-ten system and displayed on the calculator's display screen.
The first phase of setting up an IPsec tunnel is called ___________
Answer:
Internet Key Exchange
Explanation:
The first phase, setting up an IPsec tunnel, is called IKE phase 1. There are two types of setting up an IPsec tunnel.
What is an IPsec tunnel?Phase 1 and Phase 2 of VPN discussions are separate stages. Phase 1's primary goal is to establish a safe, encrypted channel for Phase 2 negotiations between the two peers. When Phase 1 is successfully completed, the peers immediately begin Phase 2 negotiations.
When two dedicated routers are deployed in IPsec tunnel mode, each router serves as one end of a fictitious "tunnel" over a public network. In IPsec tunnel mode, in addition to the packet content, the original IP header containing the packet's final destination is also encrypted.
Therefore, the first phase, setting up an IPsec tunnel, is called IKE phase 1.
To learn more about IPsec tunnel, refer to the link:
https://brainly.com/question/14364468
#SPJ5
Xanadu was to be a full-blown multimedia computer that could embody any medium.a. Trueb. False
Answer:
b. False
Explanation:
Xanadu is a project formulated by a certain Ted Nelson, and was originally intended to be a machine-language program with the capability of saving and showing various documents side by side, while the availability of editing function is also available.
Hence, in this case, it is FALSE that Xanadu was to be a full-blown multimedia computer that could embody any medium
If you wanted to securely transfer files from your local machine to a web server, what file transfer protocol could you use?
Answer:
SFTP protocol
Explanation:
FTP (file transfer protocol) is used for transferring files from local computers to a website or server but unfortunately, a file transfer protocol is not a secure method.
So, we have to used SFTP (secure file transfer protocol) at the place of file transfer protocol to move local files on the website server securely.
A student who sets a date to finish a goal is using which SMART goal? relevant, specific, attainable or timely
Answer:
timely
Explanation:A student who sets a date to finish a goal is using which SMART goal
Answer: D.) Timely
Explanation: Setting a date to finish a goal is using time.
a town with 4 lakh inhabitants is to be supplied with water from a reservoir 6.4 km away from a town with 25 m available head calculate the size of pipeline
Answer: B
Explanation:
For successful completion of an 8-Week course, how often should I visit the course web site to check for new e-mail and any instructor announcements?
Answer: The course web should be visited daily to check for new e-mail and any instructor announcement.
Explanation:
For any serious-minded and Intellectually inclined individual, who aimed for a successful completion of an 8-Week course, it's imperative for him/her to visit the course web site daily to check for new e-mail and any instructor announcements.
Friend Functions of a class are________members of that class.
Answer:
Friend Functions of a class are not members of that class.
Explanation:
A friend function of a class is defined outside the class' scope, but has the access rights to all private and protected members of that class.
Cheers.