Answer:
You can't call a function unless you've already defined it. Move the def createDirs(): block up to the top of your file, below the imports.
Explanation:
Some languages allow you to use functions before defining them. For example, javascript calls this "hoisting". But Python is not one of those languages.
Answer:
B = Create a variable
Explanation:
First off to understand this question, you need to understand what a NameError is. A NameError is when a function or variable isn't valid, or is not defined. So what you need to do it make a variable that is valid/defined. Therefore the answer is B create a variable
I hope this helps!
Which external reference is formatted correctly?
=[My_Sales.xlsx]!Quarter1:C12
O ='(My_Sales.xlsx)!Quarter1':C12
O ="[My_Sales.xlsx]Quarter1'!$C$12
O =(My_Sales.xlsx)!Quarter1:$C$12
C on edge.
Answer:
= '[My_Sales.xlsx]quarter1'!C12
Explanation:
The formula gets the value of the cell C12 in the quarter worksheet of the My_Sales.xlsx workbook.
Answer:
C
Explanation:
got it right on edge
HELP ASAP! Prompt
What are keywords?
A computer is performing a binary search on the sorted list of 7 numbers below.
What is the maximum number of iterations needed to find the item?
[1, 5, 20, 50, 51, 80, 99]
A. 1
B. 3
C. 6
D. 7
Answer:
B
Explanation:
Binary search will start in the middle of the list, find which side the value is at, then look at the middle of those values. This is incredibly efficient for larger values (Although it needs to be sorted) and practical in many instances. Let's say that the desired number is 1, the binary search would look at "50" first, then proceed to compare with "5" and finally on it's third iteration, pick 1.
The maximum number of iterations needed to find the item is; Option B: 3
We are given the list of numbers as;
[1, 5, 20, 50, 51, 80, 99]
Now, when conducting binary search, it usually starts in the middle of the list of given numbers.Thereafter, the next step is to find the side that the value being searched for is located before looking at the middle of those values.Now, if the number being searched for in the given list is 1, it means that the binary search would first look at the middle number which is 50. Thereafter, it will proceed to compare it with the second number 5 and the lastly with the third iteration, will be 1.Thus,the number of iterations needed to find the item is 3 iterations.
Read more about binary search at; https://brainly.com/question/24786985
Draw a parallel line to XY
Answer:
cant draw on this app sorry man
ANSWER ASAP, I'LL MARK THE BRAINLIEST
A designer has created a doorbell that rings when it is pressed. What is the input in this system?
a) ringing sound
b) push-to-make switch
c) motion sensor
d) temperature sensor
Answer:
Push to make switch
Explanation:
The sound is created after you push it. Pushing it is the input and the sound is the output
While you are working on your computer, it shuts down unexpectedly, and you detect a burning smell. When you remove the case cover, you notice a distended capacitor. What can you do to fix this problem
Answer:
fire
Explanation:
hydrant
Answer:
Replace the motherboard
Explanation:
please help me i dont know
What happens when a bookmark is added to a document?
-An item is added to the index.
-The list of citations becomes longer.
-The content that the bookmark links to appears.
-A shortcut for navigating to a specific location appears.
Answer:
The content that the bookmark...
What are the difference between immediate window and view window.
(wrong answers will be reported)
Answer:
mmediate window is used to debug and evaluate expressions, execute statements, print variable values, and so forth. It allows you to enter expressions to be evaluated or executed by the development language during debugging.
The Command Window is used to execute commands or aliases directly in the Visual Studio integrated development environment (IDE).
Explanation:
The cost of manufacturing one complete high chair are shown below: High Chair £8.50 Legs £22.75 Strap £1.90 Labour £2.60 Calculate how much one high chair would be sold for, if the manufacturer included a 30% profit margin. Round to the nearest pence.
Answer:
£69 (nearest pound)
Explanation:
Given the cost breakdown for the manufacture of 1 complete high chair :
High Chair __ £8.50
Legs ______ £22.75
Strap _______ £1.90
Labour ______£2.60
Total : £(8.50 + 22.75 + 1.90 + 2.60)
Total manufacturing cost = £35.75
Profit margin = 30%
Sales price = (100 + profit margin)% * total manufacturing cost
Sales price = (100+30)% * 35.75
Sales price = 130% * 35. 75
Sales price = 1.3 * 35.75
Sales price = £68.575
plz answer -----------
Answer:
1
Explanation:
5x4=20 20
------------ = --------
6x4=24 24
1x4=4 4
------------ = ----------
4x6+24 24
4 + 20
--------------- = 24/24 OR 1
24 + 24
Answer:
1
Explanation:
Which of the following scenarios describes an IT
professional using the Internet and computer
system access in an unprofessional or
inappropriate way? Check all of the boxes that
apply.
Answer:
-checking social media networks during working hours
-surfing the Internet during working hours for what to do on the weekend
-downloading a favorite band’s latest album from a file-sharing service
Explanation:
they are all correct on edg.
Answer:1 2 3 they are all correct
Explanation:
yo can someone hook me up with some uranium
Answer:
now how we gon do dat
Explanation:
...
Kyra is teaching a photography class. She would like her students to share photos. She would also like the students to be able to review other students' photos and offer feedback. What technology should Kyra use?
a blog
a wiki
a domain
e-mail
Answer:
A blog.
Explanation:
A blog can be defined as an informative or discussion-based website that is updated regularly and published over the internet. The informations that are posted on a blog are usually done chronologically and it includes pictures, videos, music, movies, novels, etc.
In this scenario, Kyra is teaching a photography class. She would like her students to share photos, be able to review other students' photos and offer feedback.
Hence, the technology Kyra should use is a blog because it would avail the users (students) to post photos, make comments on blog posts and review items posted by others.
You are finally at the stage of the software life cycle where you begin programming. What is this stage called?
Group of answer choices
analysis
development
coding
implementation
What kind of music inspires you? Why? (:
Answer:
Punk rock
Explanation:
The songs tell stories and/or teach lessons. Its all about doing it yourself and not letting anyone decide anything for you.
How do I make someone "Brainiest".
First person to reply will get "Brainiest"
Answer:
Usually when someone answers a question there would be an option to mark the brainliest. However, you only get one every like 24 hrs so if you already gave someone brainliest you can't give it to someone else for a while
Explanation:
Answer:
Brainiest
Explanation:
1. Would it be possible for two people to have the same email address? Explain.
Answer: No
Explanation:
For the same reason that two people cannot have the same address, it's just a virtual address.
Answer:
no
Explanation:
because if i email you then the computer would not know which one to send it to so the answer is no
what tasks should a laptop accomplish?
Answer:
general & personal used for computing.
Which of the following behaviors does not harm a company if your employment is terminated?
A. getting a copy of word-processing software before leaving
B. selling trade secrets to competing companies or to your future employer
C. creating a username and password so you can access company information after you have left
D. notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave
Answer:
Notifying your employer of all accounts you have access to, and requesting that they change all passwords before you leave.
Answer:
its D
Explanation:
took the test
8. Cloud Storage is
a) Computer technology to control the weather.
b) Computer technology to make computers faster.
c) Computer technology to make computers slower.
d) Computer technology to store files on the Internet,
Answer:
The correct option;
Computer technology to store files on the internet
Explanation:
Cloud Storage provides a means where data files originally locally stored on a computer are stored in remote or off-site locations which are then accessible through a public internet source or through a private network
The provider of the cloud services takes responsibility for data which are stored in the site
A cloud storage consists of a data server that is connected to the internet to which files are transferred to by a user manually or by automation. The data server then sends the data further to other server. The user can then access the stored data through the cloud storage provider's users web interface.
Answer:
D
Explanation:
d) Computer technology to store files on the Internet,
A security administrator is conducting a penetration test on a network. She connects a notebook system to a mirror port on a network switch. She then uses a packet sniffer to monitor network traffic to try and determine which operating systems are running on network hosts. Which process did the administrator use in the penetration test in this scenario
Answer:
Active fingerprinting
Explanation:
PLEASE ANSWRR ALL ASAP
ILL GIVE BRAINLY PLEASE HELP
Answer:
2D from hexadecimal to denary is 13 + 2*16 = 45
68 from hexadecimal to denary, using the same logic as above, is 104.
AB from hexadecimal to denary, using the same logic as above, is 171.
Lastly, F9 from hexadecimal to denary is 249.
31 from denary to hexadecimal is 1F (notice that it is one less than 32, which is 2*16).
73 from denary to hexadecimal is 49.
184 from denary to hexadecimal is B8
Lastly, 255 is FF (notice that it is one less than 256, which is 16*16)
200 points if answered correctly. Including variability in your video games is completely unnecessary and adds nothing to the player’s experience.
Group of answer choices
True
False
........
my guess is false.
Answer:
true
Explanation:
Help
Which of these lines of code will increment a variable?
A.
print(variable)
B.
count(variable)
C.
inc(variable)
D.
variable = variable + 1
name three computer hardware manufacturers.
Answer:
Acer, Inc.
Advantech Co., Ltd.
Akar Auto Industries Ltd.
Explanation:
Explanation:
apple chrome yoga hope this helps
Examples of email use that could be considered unethical include _____.
sending a quick message to your friend about last weekend
sharing a funny joke with other employees
denying receiving an e-mail requesting that you work late
sending your boss the monthly sales figures in an attachment
forwarding a chain letter asking for donations to a good cause
setting up a meeting with your co-worker
Answer:
"Denying receiving an e-mail requesting that you work late "
"Sending a quick message to your friend about last weekend "
"Sharing a funny joke with other employees"
Explanation:
Based off of the questions, I assume it means while you are at work. If you're at home or something, all of these are fine.
Answer:
"Denying receiving an e-mail requesting that you work late "
"Sending a quick message to your friend about last weekend "
"Sharing a funny joke with other employees"
Explanation:
What is the largest place value in a 12 bit binary number?
Deep-Learning vs Machine Learning, differences?
Answer:
one is in bricks and mortar and the other is on a machine
Explanation:
jk its one is learning threw trial and error and the other is through one set of code that tells it how to to the task one way that makes it have one path
what is a type of transition used for music in Earsketch
Answer:
In order to compose music, EarSketch coders can use samples. Audio samples are located in the sound browser, in the left window, which allows for sound file search, and personal sound file upload. In the left section, users can also show the script browser.
No account is required to create projects or view existing projects. EarSketch comprises different elements: a curriculum, a digital audio workstation (or DAW), a code editor and console, and a sound browser.
Dissolves The dissolve is probably the most used transition in video editing. Also known as a cross-dissolve, this effect layers two clips together so there is a seamless transition from one picture to another. You see it everyday and probably don’t even notice it: and that’s the point.
Explanation:
EarSketch is web-based, which means users can access it with their web-browsers, and with no installation. No account is required to create projects or view existing projects. EarSketch comprises different elements: a curriculum, a digital audio workstation (or DAW), a code editor and console, and a sound browser.