The Python language uses a compiler which is a program that both translates and executes the instructions in a high-level language. True False

Answers

Answer 1

Answer:

False.

Explanation:

A compiler is a computer program that has the function of translating a computer program developed in a certain programming language, so that it is readable through the use of another programming language. Thus, for example, a program designed in Python is translated so that it is readable in Java, etc.

The main objective of compilers is to connect the different programming languages, making the programs executable on different devices without the need to have the same programming language for it.


Related Questions

2) Module selection and verification:
The program must authenticate the student access using student ID and password.

Students should be able to choose two different modules out of the following modules (more than two modules is not possible):
Programming 1
Programming 2
Networking 1
Mathematics

Students should be able to view their current selected modules.

The program should allow the user to return to the main page.

3) Student account top-up:
The program must authenticate the student access using student ID and password.

Students should be able to deposit points in his/her point account. The program should confirm the requested points with the user before adding them into his/her account.

The program must return to the main page.

Answers

import random

database = {}

while True:

   try:

       user_choice = int(input("Enter your student id to bring up your information (Press enter if you don't have one) : "))

       user_pass = input("Enter your password: ")

       if user_choice in database.keys() and database[user_choice][5] == user_pass:

           print("User Authenticated! Welcome, "+database[user_choice][1]+" "+database[user_choice][2])

           while True:

               choice = int(input("Do you wish to choose your modules, view your selected modules, deposit points, or go back to the main menu? (1,2,3,4): "))

               if choice == 1:

                   modules = input("Choose up to two modules (comma separated): Programming 1, Programming 2, Networking 1, Mathematics ")

                   modules = modules.split(",")

                   if len(modules) > 2:

                       print("You're only allowed to select two modules at one time.")

                   else:

                       database[user_choice].append(modules)

               elif choice == 2:

                   if len(database[user_choice]) == 8:

                       print("Your module(s) are:")

                       for x in database[user_choice][7]:

                           print(x.strip())

                   else:

                       print("You don't have any modules!")

               elif choice == 3:

                   point_deposit = int(input("How many points would you like to deposit: "))

                   confirm = input("Do you want to deposit "+str(point_deposit)+" point(s) (y/n): ")

                   if confirm == "y":

                       database[user_choice][6] += point_deposit

                       print("Your point balance is now:",database[user_choice][6])

                   else:

                       print("Your deposit could not be confirmed! Deposit denied.")

               elif choice == 4:

                   break

   except ValueError:

       name = input("Enter your first name: ")

       last_name = input("Enter your last name: ")

       phone_number = input("Enter your phone number: ")

       email = input("Enter your email address: ")

       password = input("Enter a password: ")

       points = 100

       student_id = random.randint(1,1000)

       while student_id in database.keys():

           student_id = random.randint(1,1000)

       print("Hello,",name,"your student ID is:",student_id)

       database[student_id] = [student_id,name, last_name, phone_number, email, password, points]

Although I tried to cover all the bases, I might've missed something. I hope this helps.

Think about the five steps to writing an algorithm. Why is each step necessary? Why is it important to be precise when writing computer code? Some problems are better solved by a computer and some are better solved by humans. How do you know when a problem should be solved by a computer or by a person? There’s a scientific theory out there that says that our brain uses an algorithm to create our thoughts and it’s called the Theory of Connectivity. This theory suggests that information comes into our brains, is processed, stored, and then results in an output. Does this process sound familiar to you? In what ways do our bodies take in input and respond, sometimes without our control? Give two examples. In what ways is the human brain like a computer? In what ways is it different?

Answers

Answer:

All steps in writing an algorithm are important because the output of each step is the input of the next. Computers are more useful for solving problems that deal with large data and require speed. The theory of connectivity is similar to data processing in computer systems. The human nose involuntarily inhales oxygen during respiration and exhales carbon dioxide and the ear picks sound waves and forwards it to the brain for decoding.

Explanation:

The computer system is a device, electronically built to accept, process and output information. The entirety of the computer system (input, output, storage and processing unit) can be compared to the human brain based on the concept of the theory of connectivity. The human nose and ears are two sensory organs that serve as an input to the brain as they unconsciously receive environmental data (external stimulus) and forward it to the brain.

If a hacker targets a vulnerable website by running commands that delete the website's data in its database, what type of attack did the hacker perform

Answers

Answer:

SQL injection.

Explanation:

SQL injection is a way to exploit vulnerabilities in the handling of input data in some computer programs that work against a database. The injection takes place by a user submitting parameters to a database query, without the parameters being correctly transformed with respect to special characters, such as escape sequences. With custom parameters, a user can bypass login systems and manipulate data.

How should technology be used?

Answers

Make Sure You Use The Right Technology.

Use Incorporate Automation Tools.

Manage Passwords Effectively.

Only Use Technology Where You Need Help The Most.

Use Chrome Extensions.

Organize Your Time With A Calendar App.

Take Advantage Of Free Applications.

Hope it helps!

Answer:

I think technology should be used for education

Explanation:

Hope this helped have an amazing day!

Create a spreadsheet that lists the ten currencies you chose. For each currency, enter an amount and create a
formula to convert it to U.S. dollars. Make sure to include dollar signs in the appropriate cells.

Answers

Answer:

its a very lengthy one

Explanation:

Can someone help me with this error? Will give brainliest and i will give more details if you need just please help​

Answers

Answer:

From what I see, you're trying to convert an int to a double&. This is illegal. Do you have any arrays with ints?

Choose the correct climate association for: deciduous forest

Answers

Answer:

Mid Latitude Climate!

Explanation:

I've studied this! Hope this helps! :)

Answer:

mid-latitude climate

Explanation:

Correct answer on a quiz.

Which feature of a website takes you to a different part of the website or a totally different website when you click on it? A. graphics B. formal text C. hyperlink D. animation

Answers

Answer: C

Explanation:

Answer:

hyperlink

Explanation:

The feature of a website that takes you to a different part of the website or a totally different website when you click on it is called a hyperlink. Hyperlinks are typically underlined and appear in a different color than the surrounding text. They can be used to navigate between pages on the same website or to link to external websites.


Some commands listed in a menu cannot be selected.


True or False

Answers

True! Have a nice week

Answer:

Explanation:

it is true

Vocational counselors group career and occupation specialties into
career clusters.

Answers

they group them into 16 career clusters

Answer:

16 career clusters

Explanation:

The other guy is right. I got it correct on edmentum

8 / 4 + 3 % 2
How do you do this problem? You have to do the order of operations for programming.

Answers

Answer:

Explanation:

3 (4 -6) = -8 is correct.  The next step is to combine 4 and -6, obtaining

3(-2)

and this 3(-2) should equal -6, which is not the same as -8.

3(4 - 6) = 12 - 18, which differs from the student's solution.  This is the reason for the wrong answer.

Answer:

3 (4 -6) = -8 is correct.  The next step is to combine 4 and -6, obtaining

3(-2)

and this 3(-2) should equal -6, which is not the same as -8.

3(4 - 6) = 12 - 18, which differs from the student's solution.  This is the reason for the wrong answer.

Explanation:

How is a game designer different from a writer?

Answers

Answer:

Explanation:

when ur a desiner u design things when u are a writter u write thing :) ik this is wrong need points

Answer:

The game designer knows what kind of game they want because when done right, the rules are integral to the setting. ... Game writers will often familiarize themselves with a game's rules and setting in order to successfully contribute to a project; game designers will often do the same thing, but from their perspective

Explanation:

Arrange the tiles in the order of communication in the linear model.


The decoded message is sent to the destination.


A sender sends a message through a transmitter.


The encoded signal then travels through a channel.


At the receiver, the signal is decoded.


The transmitter converts the message into a signal through encoding.

Answers

Answer:

A sender sends a message through a transmitter.The transmitter converts the message into a signal through encoding.The encoded signal then travels through a channel.At the receiver, the signal is decoded.The decoded message is sent to the destination.

Explanation:

The linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

The order of communication in a linear model are;

I. A sender sends a message through a transmitter.

II. The transmitter converts the message into a signal through encoding.

III. The encoded signal then travels through a channel.

IV. At the receiver, the signal is decoded.

V. The decoded message is sent to the destination.

Generally, when a message is encoded by the sender, it requires a recipient to decode it for the communication process to be complete.

write a program that display your name c++

Answers

Answer:

#include <iostream>

#include <string>

int main() {

std::string name;

std::cout << "Please enter a name: ";

std::cin >> name;

std::cout << "Hello " << name<<"!";

}

Explanation:

Asks for your name and adds Hello {name}!

Guess the output of this code:print( (3**2)//2 )

Answers

Answer:

Assuming that's in python, the answer would be 4

Explanation:

The ** operator is for raising a number to a power.

The // operator returns the number of times the right number can fit into the left (i.e round division).

So the answer would be three squared over two rounded down, or 4.

ways that Mass Media has affected your everyday life.

Answers

Answer:

Mass Media affects my life every day right now I am angry and almost embarrassed to say I live in America...

Answer:

Body Image and Self-Esteem.

Consumer Spending Habits.

Values.

Perception of Individuals and People Groups.

Femininity, Masculinity and Relationships.

Explanation:

write a program that asks the user how far they ran and then how long they ran and prints out their speed in miles per hour javascript

Answers

Answer:

var distance = prompt("How far did you run? in miles");

var time = prompt("How long did you run? in hours");

function calSpeed(miles, hours){

   var speed = miles / hours;

   console.log(speed,"m/h")

calSpeed(distance, time);

Explanation:

The javascript uses the prompt function to get user inputs for the distance and time variables. The calSpeed function calculates and prints out the speed of the runner with the arguments, distance and time.

click it to paste the content of clipboard ​

Answers

Ctrl + V

It is used for paste function.

which type of webpages will automatically adjust the size of the content to display appropriately relative to the size of the screen of the device on which it is displayed

Answers

Answer:

Responsive.

Explanation:

HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.

Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.

The responsiveness of a webpage is an ability of the design to respond to the end user's digital device and screen size.

In Computer programming, a responsive web design makes it possible for various websites to change layouts in accordance with the user's digital device and screen size.

This ultimately implies that, a responsive design is a strategic approach which enables websites to display or render properly with respect to the digital device and screen size of the user.

Hence, responsive webpages will automatically adjust the size of the content to display appropriately relative to the size of the screen of the device on which it is displayed.

Service Mesh is a framework that handles the cross-cutting concerns like logging, service registration, etc. true false

Answers

Answer: False

Explanation:

A service mesh is referred to as a communication layer that is used to foster communication in a micro service setup usually through the use of a sidecar proxy.

It should be noted that in this case, every requests would have to pass through the service mesh.

It should be noted that the statement that Service Mesh is a framework that handles the cross-cutting concerns like logging, service registration, etc is false.

explain mportance of using Microsoft Excel in pharmaceutical science​

Answers

Answer:

research the question and go to setting and press advanced search and it will give answer

ok so how do i get the expert title ??? i meet the requirements

Answers

I think you just have to keep answering people’s questions ion know mate

Please program this in Python
Write the function spell_name that will takes a name as its input, then returns a list where each character in their name is an element.

For example,

spell_name('Jessica')
# => ['J', 'e', 's', 's', 'i', 'c', 'a']
spell_name('Ariel')
# => ['A', 'r', 'i', 'e', 'l']

# fill in this function to return a list ontaining each character in the name
def spell_name(name):
return []

Answers

def spell_name(name):

   return [x for x in name]

print(spell_name("Jessica"))

I wrote my code in python 3.8. I hope this helps.

The program returns list containing each individual letter in a string. The function written in python 3 goes thus :

def spell_name(str):

#initialize a function named spell_name which takes in a single parmater which is a string.

return [letter for letter in str]

#using list comprehension separate each individual letter in the string as an individual element.

print(spell_name('Aisha'))

#A sample run of the program with the string 'Aisha'.

The output of the sample program is attached.

Learn more : https://brainly.com/question/19012132

explain why it is important for you to understand and describe the basic internal and external components of a computer in the work place​

Answers

Answer:

you go to edit

Explanation:

how does operating system execute and provide services for application software​

Answers

An OS is a set of programs that lies between application software and the hardware. An OS is software that controls the hardware. It provides the interface between the hardware and the user. The most important program in the OS is the kernel, it manages the OS and most of it remains in memory.
Hope this helps and BRAINLIEST PLEASE! ❤️

Microsoft Publisher - Assignment #1
True/False
Place a “T” if the statement is true or "F" if the statement is false, in the blank

I
2)
Three column layouts are formal and serious looking
3)
After you use ruler guidelines, you need to delete them so that they do not show
when you print your publication.
4)
When printing a double sided publication, heavier paper may be needed so that text

Answers

Answer:1

Explanation:

Why did who made cocomelon name it cocomelon and why are babies so addicted to it

Answers

Jay neon made it. Baby’s like milk

Answer:

Cocomelon

Explanation:

"Young children are drawn to the bright visuals — especially the focus on big eyes and faces — the repetitive music and sounds, and the constant movement and action on the screen." While young kids love the sounds and songs they hear on CoComelon, the animation and the bright colors are really what draws them in.

What are the two parts of a cell reference? column intersection and row range column range and row intersection column letter and row number column number and row letter

Answers

Answer:

C - Column letter & row number

Answer: C

Explanation:

A network administrator determines who may access network resources by assigning users
ONICS
OUTPS
O permissions
O nodes

Answers

Answer: permissions

Explanation:

Users permissions is defined as the authorization that is given to users which in turn, allows such individual(s) to be able to have access to certain resources on a particular network.

Therefore, the user permission can be utilized by a network administrator so tht he or she can determines who can have access to network resources.

List the do's and don'ts of secure online interactions

Answers

Answer:

The answer is below

Explanation:

The "dos" are the safe practice's website users should always do to provide themselves a form of security against potential hackers in online interactions.

Hence, are the "dos" based on the options listed.

1. Use a long password with mixed characters

2. Use antivirus and spyware protection

3. Don't write your password down and leave it where others can find it

4. Go through the terms and conditions, and privacy policies of social networking and other websites that you access.

On the other hand, the "don'ts" are the practices a website user or visitor should avoid doing to provide themselves a form of security against potential hackers in online interactions.

Hence, are the "don'ts" based on the options listed.

1. Keep yourself logged in when you leave your computer

2. Share your password with your friends

3. Retain cookies every time you visit a website.

Other Questions
Which does not accurately describe the Treaty of Versailles? It left European borders virtually unchanged. Its war-guilt clause angered many Germans. It called for the creation of the League of Nations. It blamed Germany for World War Jacqueline is interested in helping her overweight cat lose weight so that he will be healthier and more active. She selects a new cat food based on the labels claim that it can help with weight loss. Jacqueline measures out the food carefully each day, has been weighing the cat every 48 hours, and records the measurement. What keeps this practice from being a scientific experiment? A. There is only one cat and one type of food being used. B. The cat should be weighed every day to collect more data. C. She has not considered whether the cat will like the new food. D. The food is not the brand that Jacquelines friend used for his overweight Which of the following goals stated in the Preamble to the Constitution appear to address weaknesses of the Articles of Confederation? Kimberly buys a jar of fruit punchmix. The jar holds 15 ounces ofpowder. If she uses 1 ounce a day.how long will the jar last? i didn't learn about asynchronous cause i missed school -8 = -19 + C plz answer this A local animal rescue group received a number of $10 donations (D) for its annual drive. Suppose the total of the donations (T) reached $930. Which equations apply to this situation? 3. She huddled in the corner, clutching her tattered blacked and shaking convulsively, as she feverishly searched the room for the unknown dangers that awaited her. 1. Hopeful2. Ominous3. Unpleasant4. InformalWhat clues helped You? How might the building of this shopping center affect the watershed? there may be -A. an increase in the amount of runoff water into the river and possible flooding B. a decrease in water pollution for the nearby city C. an increase in the amount of water that enters the soil D. a decrease in the amount of precipitation for the area Will give brainlest!! Solve the inequality: 3x + 12 X 18 Describe the differences between Civil and Criminal Court. Help me PLZZZ!!!!!All you have to do is find a multiplication equation that represents the balance. Also, the answer IS NOT 5 times 5, I already tried that. 10 POINTS FOR THE RIGHT ANSWER AND DON'T ANSWER IF YOU DON'T KNOW!!!!! How do paragraphs 3 and 4 support a key idea of the account? A They explain why the scrolls are so important. B They show just how old the scrolls really are. C They demonstrate how the scrolls are used by scholars. D They prove that the scrolls are as important as the Bible. In the Dead Sea scrolls read the sentence from paragraph 2, how does this information fit into the overall structure of the account? What areas would the Mayans need to be skilled in to complete the Kukulcn pyramid? Help pls its really hard To see if a website is using a secure connection, what should you look for? Select all that apply.A star icon to the right of the URL"https" at the very beginning of the URLA plus sign (+) to the right of the tabA lock icon to the left of the URL In Chapter 16 of The True Confessions of Charlotte Doyle, Charlotte is accused of a serious crime that she didn'tcommit. Think of the last time you were accused of or blamed for something that you didn't do. Write down how it madeyou feel in a journal entry of about 150 words. If you haven't had this experience recently, imagine how it might feel, andrecord your thoughts. plllllzzzzzzz help! :( ill make u brainlist ): PQRS is a kite. Find the mQ.