Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is:

Answers

Answer 1

Answer:

The program written in python is as follows

def countchr(phrase, char):

     count = 0

     for i in range(len(phrase)):

           if phrase[i] == char:

                 count = count + 1

     return count

phrase = input("Enter a Phrase: ")

char = input("Enter a character: ")

print("Occurence: ",countchr(phrase,char))

Explanation:

To answer this question, I made use of function

This line defines function countchr

def countchr(phrase, char):

This line initializes count to 0

     count = 0

This line iterates through each character of input phrase

     for i in range(len(phrase)):

This line checks if current character equals input character

           if phrase[i] == char:

The count variable is incremented, if the above condition is true

                 count = count + 1

The total number of occurrence is returned using this line

     return count

The main method starts here; This line prompts user for phrase

phrase = input("Enter a Phrase: ")

This line prompts user for a character

char = input("Enter a character: ")

This line prints the number of occurrence of the input charcater in the input phrase

print("Occurence: ",countchr(phrase,char))


Related Questions

1 #Write a function called phonebook that takes two lists as
2 #input:
3 #
4 # - names, a list of names as strings
5 # - numbers, a list of phone numbers as strings
6 #
7 #phonebook() should take these two lists and create a
8 #dictionary that maps each name to its phone number. For
9 #example, the first name in names should become a key in
10 #the dictionary, and the first number in numbers should
11 #become the value corresponding to the first name. Then, it
12 #should return the dictionary that results.
13 #
14 #Hint: Because you're mapping the first name with the first
15 #number, the second name with the second number, etc., you do
16#not need two loops. For a similar exercise, check back on
17 #Coding Problem 4.3.3, the Scantron grading problem.
18 #
19 #You may assume that the two lists have the same number of #items: there will be no names without numbers or numbers
20 #without names.
21 #Write your function here!
25
26
27
28 #Below are some lines of code that will test your function
29 #You can change the value of the variable(s) to test your
30 #function wit h different inputs 2 If your function works correctly, this ill originally
31
32 #print (although the order of the keys may vary):
33| #('Jackie': '404-555-1234., 'Joshua': .678-555-5678., "Marguerite': '778-555-9012
35
36 name_list ['Jackie', Joshua', 'Marguerite']
37 number list-['484-555-1234, 678-555-5678 770-555-9812']
38 print (phonebook (name list, numberlist))
39
40
41

Answers

Answer:

I am writing a Python program.

def phonebook(names, numbers):  #method phonebook that takes two parameters i.e a list of names and a list of phone numbers

   dict={}  #creates a dictionary

   for x in range(len(names)):  # loop through the names

       dict[names[x]]=numbers[x]  #maps each name to its phone number

   return dict #return dictionary in key:value form i.e. name:number

#in order to check the working of this function, provide the names and numbers list and call the function as following:

names = ['Jackie', 'Joshua', 'Marguerite']

numbers = ['404-555-1234', '678-555-5678', '770-555-9012']

print(phonebook(names, numbers))

Explanation:

The program has a function phonebook() that takes two parameters, name which is a list of names and numbers that is a list of phone numbers.

It then creates a dictionary. An empty dictionary is created using curly brackets. A dictionary A dictionary is used here to maps a names (keys) phone numbers (values) in order to create an unordered list of names and corresponding numbers.

for x in range(len(names)):  

The above statement has a for loop and two methods i.e. range() and len()

len method is used to return the length of the names and range method returns sequence of numbers just to iterate as an index and this loops keeps iterating until x exceeds the length of names.

dict[names[x]]=numbers[x]

The above statement maps each name to its phone number by mapping the first name with the first  umber, the second name with the second number and so on. This mapping is done using x which acts like an index here to map first name to first number and so on. For example dict[names[1]]=numbers[1]  will map the name (element) at 1st index of the list to the number (element) at 1st index.

return dict retursn the dictionary and the format of dictionary is key:value where key is the name and value is the corresponding number.

The screenshot of the program and its output is attached.

Availability is an essential part of ________ security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available. baseline infrastructure applications network

Answers

Answer:

Network.

Explanation:

Availability is an essential part of network security, and user behavior analysis and application analysis provide the data needed to ensure that systems are available.

Availability in computer technology ensures that systems, applications, network connectivity and data are freely available to all authorized users when they need them to perform their daily routines or tasks. In order to make network systems available regularly, it is very essential and important to ensure that all software and hardware technical conflicts are always resolved as well as regular maintenance of the systems.

A network administrator can monitor the network traffics and unusual or unknown activities on the network through the user behavior analysis and data gathered from the application analysis to ensure the effective and efficient availability of systems.

Which best describes the purpose of LoJack on a computer

Answers

Answer:The purpose of the lo jack on a computer  to the lock and delete files on the computer devices.

Explanation:The lo jack on a computer to locate all the lock and delete files.

lo jack can provides the computer on the passwords that contains different levels of the bios access.

lo jack perform on the computer operating system provides on the boot only the trusted by the computer operating system.

Lo jack computer on the function is used to the published  the exam answers on the websites.

Lo jack insures to the data into hard drives to the correct computer password.

JavaScript
Code Example 4-1
var name = prompt("Enter the name to print on your tee-shirt");
while (name.length > 12) {
name = prompt("Too long. Enter a name with fewer than 12 characters.");
}
alert("The name to be printed is " + name.toUpperCase());
What will happen if the user enters Willy Shakespeare at the first prompt?
A. The user will be prompted to enter a different name.
B. The alert will display The name to be printed is " + name.toUpperCase().
C. The alert will display The name to be printed is WILLY SHAKESPEARE.
D. The alert will display The name to be printed is WILLY SHAKES.

Answers

Answer:

(a) The user will be prompted to enter a different name

Explanation:

Given code;

--------------------------------------------------------------------------------------------------------

var name = prompt("Enter the name to print on your tee-shirt");

while (name.length > 12) {

name = prompt("Too long. Enter a name with fewer than 12 characters.");

}

alert("The name to be printed is " + name.toUpperCase());

--------------------------------------------------------------------------------------------------------

=>The first line of the code prompts the user to enter some name to be printed on their tee-shirt, and the input from the user is saved in a variable called name.

=> In the while block, the name variable is checked. If the length of the value of the variable is greater than 12 then a new prompt that says "Too long. Enter a name with fewer than 12 characters" is displayed.

=> In the last line, if the name variable is checked and the length is less than 12, then an alert statement showing the name in uppercase is displayed with some prepended texts.

Now, if the user enters Willy Shakespeare at the first prompt, the while block will be executed since Willy Shakespeare has over 12 characters.

In other words, the prompt in the while block, asking the user to enter a different name will be displayed. i.e

"Too long. Enter a name with fewer than 12 characters"

A cashier distributes change using the maximum number of five-dollar bills, followed by one-dollar bills. Write a single statement that assigns num_ones with the number of distributed one-dollar bills given amount_to_change. Hint: Use %. Sample output with input: 19 Change for $ 19 3 five dollar bill(s) and 4 one dollar bill(s)

Answers

Answer:

num_ones = amount_to_change % 5

Explanation:

It is given that the cashier has to change the money in the maximum number of 5 dollar bills and remaining as $1 bills.

We have to write a single statement of code to assign the value to variable num_ones to find the value of $1 bills given amount_to_change.

Let us solve this by taking example:

If amount_to_change = $19

Then total number of $5 bills that can be given is 3. And amount that can be given as $5 bills is [tex]\bold{3 \times 5 = \$15}[/tex]

So, the remaining amount i.e. $19 - $15 = $4 will be given as one dollar bills.

Out of these $19, 4 bills of $1 can be found using the Modulus (%) operator.

Modulus operator leaves the remainder i.e.

Output of p % q is the remainder when a number 'p' is divided by 'q'.

19 % 5 = 4

4 is the number of one dollar bills to be given.

So, single line of code for the number of one dollar bills can be written as:

num_ones = amount_to_change % 5

Let us try it for amount_to_change  = $30

We know that 6 number of $5 bills can be used to change the amount of $30 and no one dollar bill required.

num_ones = 30 % 5 = 0 (because 30 is completely divisible by 5 so remainder is 0)

So, the correct statement is:

num_ones = amount_to_change % 5

QUESTION 6 Which of the following is a class A IPv4 address? a. 118.20.210.254 b. 183.16.17.30 c. 215.16.17.30 d. 255.255.0.0

Answers

Answer:

a. 118.20.210.254

Explanation:

Here are the few characteristics of Class A:

First bit of the first octet of class A is 0.

This class has 8 bits for network and 24 bits for hosts.

The default sub-net mask for class A IP address is 255.0.0.0

Lets see if the first bit of first octet of 118.20.210.254 address is 0.

118 in binary (8 bits) can be represented as : 1110110

To complete 8 bits add a 0 to the left.

01110110

First bit of the first octet of class A is 0 So this is class A address.

For option b the first octet is : 183 in the form of bits = 10110111 So it is not class A address

For option c the first octet is 215 in the form of bits = 11010111 So it is not class A address

For option d the first octet is 255 in the form of bits = 11111111. The first bit of first octet is not 0 so it is also not class A address.

7. When using find command in word we can search?
a. Characters
b. Formats
c. Symbols
d. All of the above

Answers

Answer:

When using find command in word we can search all of the above

Implement function easyCrypto() that takes as input a string and prints its encryption
defined as follows: Every character at an odd position i in the alphabet will be
encrypted with the character at position i+1, and every character at an even position i
will be encrypted with the character at position i 1. In other words, ‘a’ is encrypted with
‘b’, ‘b’ with ‘a’, ‘c’ with ‘d’, ‘d’ with ‘c’, and so on. Lowercase characters should remain
lowercase, and uppercase characters should remain uppercase.
>>> easyCrypto('abc')
bad
>>> easyCrypto('Z00')
YPP

Answers

Answer:

The program written in python is as follows;

import string

def easyCrypto(inputstring):

      for i in range(len(inputstring)):

             try:

                    ind = string.ascii_lowercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

                           print(string.ascii_lowercase[ind+1],end="")

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

anystring = input("Enter a string: ")

easyCrypto(anystring)

Explanation:

The first line imports the string module into the program

import string

The functipn easyCrypto() starts here

def easyCrypto(inputstring):

This line iterates through each character in the input string

      for i in range(len(inputstring)):

The try except handles the error in the program

             try:

This line gets the index of the current character (lower case)

                    ind = string.ascii_lowercase.index(inputstring[i])

This line adds 1 to the index

                    pos = ind+1

This line checks if the character is at even position

                    if pos%2 == 0:

If yes, it returns the alphabet before it

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

It returns the alphabet after it, if otherwise

                           print(string.ascii_lowercase[ind+1],end="")

The except block does the same thing as the try block, but it handles uppercase letters

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

The main starts here

This line prompts user for input

anystring = input("Enter a string: ")

This line calls the easyCrypto() function

easyCrypto(anystring)

Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on the environment. HLN can handle large amounts of traffic more efficiently because __________.

Answers

Answer:

The networks are intelligent and send packets at the highest speed and most efficiently.

Explanation:

Alcatel-Lucent was founded in 1919, it was a French global telecommunications equipment manufacturing company with its headquarter in Paris, France. Alcatel-Lucent provide services such as telecommunications and hybrid networking solutions deployed both in the cloud and on properties.

Alcatel-Lucent’s High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on the environment. This high leverage network can handle large amounts of traffic more efficiently because the networks are intelligent and send packets at the highest speed and most efficiently. HLN are intelligent such that it delivers increased bandwidth using fewer devices and energy.

Generally, when the High Leverage Network (HLN) is successfully implemented, it helps telecommunications companies to improve their maintenance costs, operational efficiency, enhance network performance and capacity to meet the bandwidth demands of their end users.

The compare_strings function is supposed to compare just the alphanumeric content of two strings, ignoring upper vs lower case and punctuation. But something is not working. Fill in the code to try to find the problems, then fix the problems.

import re
def compare_strings(string1, string2):
#Convert both strings to lowercase
#and remove leading and trailing blanks
string1 = string1.lower().strip()
string2 = string2.lower().strip()

#Ignore punctuation
punctuation = r"[.?!,;:-']"
string1 = re.sub(punctuation, r"", string1)
string2 = re.sub(punctuation, r"", string2)

#DEBUG CODE GOES HERE
print(___)

return string1 == string2

print(compare_strings("Have a Great Day!", "Have a great day?")) # True
print(compare_strings("It's raining again.", "its raining, again")) # True
print(compare_strings("Learn to count: 1, 2, 3.", "Learn to count: one, two, three.")) # False
print(compare_strings("They found some body.", "They found somebody.")) # False

Answers

Answer:

There is a problem in the given code in the following statement:

Problem:

punctuation = r"[.?!,;:-']"

This produces the following error:

Error:

bad character range

Fix:

The hyphen - should be placed at the start or end of punctuation characters. Here the role of hyphen is to determine the range of characters. Another way is to escape the hyphen - using using backslash \ symbol.

So the above statement becomes:

punctuation = r"[-.?!,;:']"  

You can also do this:

punctuation = r"[.?!,;:'-]"  

You can also change this statement as:

punctuation = r"[.?!,;:\-']"

Explanation:

The complete program is as follows. I have added a print statement print('string1:',string1,'\nstring2:',string2) that prints the string1 and string2 followed by return string1 == string2  which either returns true or false. However you can omit this print('string1:',string1,'\nstring2:',string2) statement and the output will just display either true or false

import re  #to use regular expressions

def compare_strings(string1, string2):  #function compare_strings that takes two strings as argument and compares them

   string1 = string1.lower().strip()  # converts the string1 characters to lowercase using lower() method and removes trailing blanks

   string2 = string2.lower().strip()  # converts the string1 characters to lowercase using lower() method and removes trailing blanks

   punctuation = r"[-.?!,;:']"  #regular expression for punctuation characters

   string1 = re.sub(punctuation, r"", string1)  # specifies RE pattern i.e. punctuation in the 1st argument, new string r in 2nd argument, and a string to be handle i.e. string1 in the 3rd argument

   string2 = re.sub(punctuation, r"", string2)  # same as above statement but works on string2 as 3rd argument

   print('string1:',string1,'\nstring2:',string2)  #prints both the strings separated with a new line

   return string1 == string2  # compares strings and returns true if they matched else false

#function calls to test the working of the above function compare_strings

print(compare_strings("Have a Great Day!","Have a great day?")) # True

print(compare_strings("It's raining again.","its raining, again")) # True

print(compare_strings("Learn to count: 1, 2, 3.","Learn to count: one, two, three.")) # False

print(compare_strings("They found some body.","They found somebody.")) # False

The screenshot of the program along with its output is attached.

Following are the modified program to the given question:

Program Explanation:

Import package.Defining a method "compare_strings" that takes two parameters "string1, string2".Inside the method, parameter variables have been used that convert and hold string values into lower case.In the next step, a variable "punctuation" is defined that holds value.After this, a parameter variable is used that calls the sub-method that checks parameter value with punctuation variable value, and at the return keyword is used that check string1 value equal to string2.Outside the method, multiple print method is used calls the method, and prints its value.

Program:

import re #import package

def compare_strings(string1, string2):#defining a method compare_strings that takes two parameters

   string1 = string1.lower().strip()#defining a variable string1 that converts and holds string value into lower case  

   string2 = string2.lower().strip()#defining a variable string1 that converts and holds string value into lower case

   punctuation = r'[^\w\s]'#defining a variable that holds value

   string1 = re.sub(punctuation, '', string1)#using the variable that calls the sub method that checks parameter value with punctuation variable value  

   string2 = re.sub(punctuation, '', string2)#using the variable that calls the sub method that checks parameter value with punctuation variable value  

   return string1 == string2#using return keyword that check string1 value equal to string2

print(compare_strings("Have a Great Day!", "Have a great day?")) # calling method that prints the return value

print(compare_strings("It's raining again.", "its raining, again")) # calling method that prints the return value

print(compare_strings("Learn to count: 1, 2, 3.", "Learn to count: one, two, three.")) # calling method that prints the return value

print(compare_strings("They found some body.", "They found somebody.")) # calling method that prints the return value

Output:

Please find the attached file.

Learn more:

brainly.com/question/21579839

In Network Address and Port Translation (NAPT), which best describes the information used in an attempt to identify the local destination address?

Answers

Answer:

Hello your question lacks the required options here are the options

source IP and destination IPsource IP and destination portsource IP and source portsource port and destination IPsource port and destination port

answer : source IP and destination port

Explanation:

The information that is used in an attempt to identify the local destination address is the source IP and destination port

source IP is simply the internet protocol address of a device from which an IP packet is sent to another device while destination port are the ports found in a destination device that receives IP packets from source ports  they are found in many internet applications  

Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT a hashing algorithm?
A. SHA-256
B. MD5
C. DAT-1
D. SHA-1

Answers

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

Use the get_seconds function to work out the amount of seconds in 2 hours and 30 minutes, then add this number to the amount of seconds in 45 minutes and 15 seconds. Then print the result.

Answers

Answer:

Since the get_seconds function is not given, I'll implement it myself;

The full program (get_seconds and main) written in python is as follows:

def  get_seconds(hour,minute,seconds):

    seconds = hour * 3600 + minute * 60 + seconds

    return seconds

time1 = get_seconds(2,30,0)

time2 = get_seconds(0,45,15)

result = time1 + time2

print(result)

Explanation:

The get_seconds defines hour, minute and seconds as its arguments

This line defines the get_seconds function

def  get_seconds(hour,minute,seconds):

This line calculates the second equivalent of the time passed to the function

    seconds = hour * 3600 + minute * 60 + seconds

This line returns the the calculated seconds equivalent of time

    return seconds

The main starts here

This line calculates the number of seconds in 2 hours and 30 minutes

time1 = get_seconds(2,30,0)

This line calculates the number of seconds in 45 minutes and 15 seconds

time2 = get_seconds(0,45,15)

This line adds both together

result = time1 + time2

This line prints the result

print(result)

NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices around the world. When completed, this internal WAN will use Internet technology to link soldiers in the field with support personnel on bases, etc. NMCI is an example of a(n):

Answers

Answer:

The answer is "Intranet".

Explanation:

The intranet becomes an information exchange computer network, in which the resources collaborate with OS and other computing infrastructure within the organization. It is usually done without access from third parties and primarily uses for analysis of the data.

Here, the NMCI links the computer network of navy and maritime bodies on the bases of both the boats and the regional offices, that's why we can say that it is the example of the Internet.

Identify five key technologies/innovations and discuss their advantages and disadvantages to developing countries like Ghana.​

Answers

Answer:

The key technology/ innovation advantage and disadvantage can be defined as follows:

Explanation:

Following are the 5 innovations and technology, which promote the other development goals, like renewable energy, quality of jobs, and growth of economic with the good health and very well-being:

1) The use of crop monitoring drone technology promotes sustainable farming.  

2) The production of plastic brick including highways, floors, and houses.  

3) The new banking market or digital banking.  

4) E-commerce site.    

5) Renewable energy deployment such as solar panels.  

Advantage:

It simple insect control, disease, fertilizer, etc.   It helps in aid in environmental purification and job formation.It is also fast and easy,  Funds are transferred extremely easily through one account to another.  Minimal prices, quick customer developments, and competition in the industry.  It saves them money in the medium-haul, less servicing.

Disadvantage:

The drones are too expensive to use, so poor farmers can be cut off.  Specialist technicians and gaining popularity are required.  The financial services data can be distributed through many devices and therefore become more fragile.  The personal contact loss, theft, security problems, etc. The higher operating costs, geographical limitations, and so on.

What is displayed by the alert dialog box after the following code executes? var name = "Donny,Duck"; var index = name.indexOf(","); var lastName = name.substr(index + 1, name.length - 1);; alert("Last name: " + lastName);

Answers

Answer:

Last name: Duck

Explanation:

explanation is provided in the attached document.

How many times does the following loop execute? double d; Random generator = new Random(); double x = generator.nextDouble() * 100; do { d = Math.sqrt(x) * Math.sqrt(x) - x; System.out.println(d); x = generator.nextDouble() * 10001; } while (d != 0); exactly once exactly twice can't be determined always infinite loop

Answers

Answer:

The number of execution can't always be determines

Explanation:

The following points should be noted

Variable d relies on variable x (both of double data type) for its value

d is calculated as

[tex]d = \sqrt{x}^2 - x[/tex]

Mere looking at the above expression, the value of d should be 0;

However, it doesn't work that way.

The variable x can assume two categories of values

Small Floating Point ValuesLarge Floating Point Values

The range of the above values depend on the system running  the application;

When variable x assumes a small value,

[tex]d = \sqrt{x}^2 - x[/tex] will definitely result in 0 and the loop will terminate immediately because [tex]\sqrt{x}^2 = x[/tex]

When variable x assumes a large value,

[tex]d = \sqrt{x}^2 - x[/tex] will not result in 0  because their will be [tex]\sqrt{x}^2 \neq x[/tex]

The reason for this that, the compiler will approximate the value of [tex]\sqrt{x}^2[/tex] and this approximation will not be equal to [tex]x[/tex]

Hence, the loop will be executed again.

Since, the range of values variable x can assume can not be predetermined, then we can conclude that the number of times the loop will be executed can't be determined.

What is a real-life example of a Microsoft Access Query?

Answers

Explanation:

Microsoft Access is an information management tool that helps you store information for reference, reporting, and analysis. Microsoft Access helps you analyze large amounts of information, and manage related data more efficiently than Microsoft Excel or other spreadsheet applications.

A real-life example of a Microsoft Access Query is a table that stores the names of new customers at a supermarket.

What is Microsoft Access?

Microsoft Access is a database management software application designed and developed by Microsoft Inc., in order to avail its end users an ability to create, store and add data to a relational database.

In Microsoft Access, the options that are available on the File tab include the following:

Opening a database.

Selecting a template.

Creating a new database.

In conclusion, a database is an element in Microsoft Access which is an ideal data source and a query would always obtain, generate, or pick information from it.

Read more on Microsoft Access here: brainly.com/question/11933613

#SPJ2

The code below takes the list of country, country, and searches to see if it is in the dictionary gold which shows some countries who won gold during the Olympics. However, this code currently does not work. Correctly add try/except clause in the code so that it will correctly populate the list, country_gold, with either the number of golds won or the string "Did not get gold".
1
​2 gold = {"US":46, "Fiji":1, "Great Britain":27, "Cuba":5, "Thailand":2, "China":26, "France":10}
3 country = ["Fiji", "Chile", "Mexico", "France", "Norway", "US"]
4 country_gold = []
5
​6 for x in country:
7 country_gold.append(gold[x])
8 country_gold.append("Did not get gold")

Answers

Answer:

Modify your program by replacing

for x in country:

       country_gold.append(gold[x])

       country_gold.append("Did not get gold")

with

for x in country:

       try:

               country_gold.append(gold[x])

       except:

               country_gold.append("Did not get gold")

Explanation:

The addition of try/except clause in the program is to let the program manage error;

In this case, the program checks for a country in the list country; This is implemented using the following line

for x in country:

If the country exists, the statement in the try block is executed

try:

 country_gold.append(gold[x])  ->This appends the country name to the country_gold list

Otherwise, the statement in the except clause is executed

except:

 country_gold.append("Did not get gold")  -> This appends "Did not get gold" to the country_gold list

To confirm what you've done, you may add the following line of code at the end of the program: print(country_gold)

An app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. What type of cloud service is he looking for?

Answers

Answer:

Platform as a Service (PaaS).

Explanation:

In this scenario, an app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. The type of cloud service he is looking for is a platform as a service (PaaS).

In Computer science, Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Hybrid PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Open PaaS.

The software developers can choose any of the aforementioned types of PaaS that is suitable, effective and efficient for their applications development. Some examples of PaaS providers are Google, Microsoft, IBM, Oracle etc.

CHALLENGE ACTIVITY 2.1.3: Multiplying the current value of a variable. Write a statement that assigns cell_count with cell_count multiplied by 10. * performs multiplication. If the input is 10, the output should be: 100

Answers

Answer:

cell_count = int(input("Enter the value: "))

cell_count *= 10

print(cell_count)

Explanation:

Ask the user to enter a value and set it to the cell_count variable

Multiply the cell_count by 10 and assign it to the cell_count (It can also be written as cell_count = cell_count * 10)

Print the cell_count

Suppose we have the following page accesses: 1 2 3 4 2 3 4 1 2 1 1 3 1 4 and that there are three frames within our system. Using the FIFO replacement algorithm, what is the number of page faults for the given reference string?

Answers

Answer:

223 8s an order of algorithm faults refrénce fifio 14 suppose in 14 and 123 no need to take other numbers

Use the following cell phone airport data speeds​ (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.6 0.7 0.7 0.7 0.8 0.8

Answers

Answer:

[tex]P_{10} =0.1[/tex]

Explanation:

Given

[tex]0.1, 0.1, 0.3, 0.3, 0.3, 0.4, 0.4, 0.4, 0.6, 0.7, 0.7, 0.7, 0.8, 0.8[/tex]

Required

Determine [tex]P_{10}[/tex]

[tex]P_{10}[/tex] implies 10th percentile and this is calculated as thus

[tex]P_{10} = \frac{10(n+1)}{100}[/tex]

Where n is the number of data; n = 14

[tex]P_{10} = \frac{10(n+1)}{100}[/tex]

Substitute 14 for n

[tex]P_{10} = \frac{10(14+1)}{100}[/tex]

[tex]P_{10} = \frac{10(15)}{100}[/tex]

Open the bracket

[tex]P_{10} = \frac{10 * 15}{100}[/tex]

[tex]P_{10} = \frac{150}{100}[/tex]

[tex]P_{10} = 1.5th\ item[/tex]

This means that the 1.5th item is [tex]P_{10}[/tex]

And this falls between the 1st and 2nd item and is calculated as thus;

[tex]P_{10} = 1.5th\ item[/tex]

Express 1.5 as 1 + 0.5

[tex]P_{10} = (1 +0.5)\ th\ item[/tex]

[tex]P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item[/tex]

From the given data; [tex]1st\ item = 0.1[/tex] and [tex]2nd\ item = 0.1[/tex]

[tex]P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item[/tex] becomes

[tex]P_{10} =0.1 +0.5(0.1 - 0.1)[/tex]

[tex]P_{10} =0.1 +0.5(0)[/tex]

[tex]P_{10} =0.1 +0[/tex]

[tex]P_{10} =0.1[/tex]

You turn on your Windows computer and see the system display POST messages. Then the screen goes blank with no text. Which of the following items could be the source of the problem?
1. The video card
2. The monitor
3. Windows
4. Microsoft word software installed on the system.

Answers

Answer:1)The video card
***HOPE THIS HELP YOU***

Assume a PHP document named hello.php has been saved in a folder named carla inside the htdocs folder on your computer. Which is the correct path to enter to view this page in a browser?

Answers

The available options are:

A. localhost/Carla/hello.php

B. localhost/htdocs/hello.php

C. localhost/htdocs/Carla/hello.php

D. carla/hello.php5

Answer:

C.  localhost/htdocs/Carla/hello.php  

Explanation:

A path in computer programming can be defined as the name of a file or directory, which specifies a unique location in a file system.

Therefore, to get the correct path to enter to view this page in a browser, one needs to follow the directory tree hierarchy, which is expressed in a string of characters in which path components, separated by a delimiting character, represent each directory.

Hence, correct path to enter to view this page in a browser is "localhost/htdocs/Carla/hello.php"

Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques such as PCA and SVD.

Answers

Answer:

Following are the difference to this question can be defined as follows:

Explanation:

In terms of projections of information into a reduced dimension group, we can consider the dimension structure of PCA and SVD technologies.  In cases of a change in the length, based on consolidation, there's also a unit with dimensions. When we consider that the days have been aggregated by days or the trade of a commodity can be aggregated to both the area of the dimension, accumulation can be seen with a variance of dimension.

Dimensionality reduction based on aggregation involves selection of important character and variable from a large variable and dimensionality reduction based on techniques with the use of PCA and SVD.

What is dimensionality?

Dimensionality involves reducing features that have been written or identified or constructing less features from a pool of important features.

Principal components analysis(PCA) and Single value decomposition(SVD) is a form or analysis that can be used to reduce some character that are not important to an information and can also help to select important variables from among many variables.

Therefore, dimensionality reduction based on aggregation involves selection of important character and variable from a large variable and dimensionality reduction based on techniques with PCA and SVD.

Learn more on dimensional analysis here,

https://brainly.com/question/24514347

1. Railroad tracks present no problems for a motorcyclist.
A. O TRUE
B. O FALSE

2. Which of the following is considered to be a vulnerable road user?
A. Bicyclists
B. Motorcyclists
C. Pedestrians
D. all of the above

Answers

Answer: 1 is A

2 is D

Explanation:

Without data compression, and focusing only on the data itself without any overhead, what transmission rate is required to send 30 frames per second of gray-scale images with resolution 1280 x 1024?

Answers

Answer:

315 Mbps

Explanation:

Given data :

30 frames per second

resolution = 1280 * 1024

what transmission rate is required can be calculated as

frames per second = rendered frames / number of seconds passed

30 = 30 / 1

Transmission rate = the rate at which the images are transmitted from source to destination =315 Mbps without data compression

Teachers in most school districts are paid on a schedule that provides a salary based on their number of years of teaching experience. For example, a beginning teacher in the Lexington School District might be paid $30,000 the first year. For each year of experience after this first year, up to 10 years, the teacher receives a 2% increase over the preceding value. Write a program that displays a salary schedule, in tabular format, for teachers in a school district. The inputs are:

Answers

Answer:

Here is the python code:

StartingSal = int(input("Enter the starting salary: "))

AnnualIncrease = (int(input("Enter the annual % increase: ")) / 100)

Years = int(input("Enter the number of years: "))

for count in range(1,Years+1):  

  print("Year ", count, " Salary: ", StartingSal*((1+AnnualIncrease)**(count-1)))

  

Explanation:

This program prompts the user to enter starting salary, percentage increase in salary per year and number of years.

The for loop has range function which is used to specify how many times the salaries are going to be calculated for the number of years entered. It starts from 1 and ends after Years+1 means one value more than the year to display 10 too when user inputs 10 days.

The year and corresponding salary is displayed in output. At every iteration the starting salary is multiplied by annual percentage increase input by user. Here count is used to count the number of salaries per year, count-1 means it will start from 30000.

ntify five key technologies/innovations and discuss their advantages and
disadvantages to developing countries like Ghana

Answers

Answer:

1. Blockchain Technology: Blockchain is a distributed ledger technology that lets data to be stored globally on its servers and it is based on a P2P topology which makes it difficult for someone to tamper with the network.

It can be used as a cryptocurrency wallet that supports BitCoin, Ethereum, etc.

An advantage of it is that it is distributed among several users and stable.

A disadvantage for a developing country like Ghana is that once a blockchain is sent, it cannot go back which brings up the question of security.

2.Artificial Intelligence: This technology is simply the simulation of human intelligence in machines. AI can be used for problem-solving and learning. An advantage of AI is that it reduces human error and is fast in solving problems. A disadvantage of AI is that its expensive to maintain and also it does not improve with experience.

3. Global Positioning System: GPS is a satellite-based positioning system that is used to pinpoint and track location. It has the advantage of being available worldwide and information is provided to users in real-time. One disadvantage of the GPS for a developing country like Ghana is that electromagnetic interference can affect the accuracy of the GPS.

4. 5G Network: This is the 5th generation of mobile internet connectivity that gives super fast download and upload speeds when compared to its predecessors 4G, 3G, 2G, and Edge networks.

One major disadvantage of 5G for a developing country like Ghana is that it is expensive and quite unknown and its security and privacy issues are yet to be resolved.

5. Lasers: This isn't a new technology as it has been in use for some time already but its importance cannot possibly be over-emphasized. LASER is an acronym that means Light Amplification by the Stimulated Emission of Radiation.

It is precise and accurate in cutting when compared to thermal and other conventional cutting methods. It is being used in surgeries that require the highest levels of accuracy with great success.

A disadvantage of Laser technology is that it is expensive to use and maintain.

Other Questions
Gene expression within the body is controlled by the cells, which determine when a specific gene should or should not be expressed. Influenza (the flu) is caused by a virus that attacks the respiratory system. Which type of gene is likely to be widely expressed in the body of someone who contracts the influenza virus? The gene that controls production of stem cells. The gene that controls production of skin cells. The gene that controls production of red blood cells. The gene that controls production of white blood cells. Based on past experience, it is estimated that a restaurant will serve 122 guests on a weekday evening. This is an example of which type of probability Which is most likely to happen during a precipitation reaction?A. A solid substance will break down into two new substances thatare gases.B. An insoluble solid will form when ions in dissolved compoundsswitch places.C. A substance will react with oxygen to form water and carbondioxide.D. A gas will form when positive ions switch places to form newcompounds. write a Review about a restaurant online The graph of a function is shown: In which interval is the graph decreasing? Answers: A - AB B - BC C - CD D - DE A 20 g bullet strikes a 1.5 kg wood block and becomes embedded in it (all horizontal motion). The coefficient of friction between the block and the surface is 0.3 and the impact makes the block move a distance of 7 m before it comes to rest. What was the muzzle speed (in m/s) of the bullet? Report your answer with two significant figures. What do references to sunlight most likely symbolizing the play Hyponatremia is a condition in which the sodium in the blood is too low. Uncontrolled spasms, which are sudden, involuntary contractions of muscles, are among the symptoms of hyponatremia. Why do they occur?A. Sodium is needed to generate an action potential.B. Sodium makes up most of the myelin sheath.C. Sodium is the signaling molecule that transmits impulses across a synapse.D. Sodium controls voluntary movement, and potassium controls involuntary movement.Reset Next A town is severely affected by water pollution following a natural disaster. Toilets are backed up and clean drinking water is scarce. Which step can the local health department take to help? Anton Chekhovs The cherry Orchard what does the emphasis on time mean? Suppose that the duration of a particular type of criminal trial is known to be normally distributed with a mean of 22 days and a standard deviation of 6 days. 72% of all of these types of trials are completed within how many days What is the length of the line? Research online and find two software tools for bank account reconciliation. Write a 500-word report comparing their features and benefits. calculate EG if a=5 and b=15 When the magnet falls toward the copper block, the changing flux in the copper creates eddy currents that oppose the change in flux. The resulting braking force between the magnet and the copper block always opposes the motion of the magnet, slowing it as it falls. The rate of the fall produces a rate of flux change sufficient to produce a current that provides the braking force. If the copper is cooled with liquid nitrogen, the resistivity of the copper drops dramatically. How will this affect the speed at which the magnet falls toward the copper Using a material on the internet for your assignment without acknowledging the source is known as A. Plagiarism B. Piracy C. Ethical D. Copyright Since the probability that a new marriage will end in divorce varies based on whether either of the newly-weds has been divorced before, these two outcomes (the fate of the new marriage and the previous divorce record of the newly-weds) are: Group of answer choices What is its molecular formula for C5H4 if its molar mass is 128.17g/mol What is the value of the expression need help plzz!!!!!!