Answer:
wait. is this even a question or is it just informing us?
Explanation:
either way it is cool
8 / 4 + 3 % 2
How do you do this problem? You have to do the order of operations for programming.
Answer:
Explanation:
3 (4 -6) = -8 is correct. The next step is to combine 4 and -6, obtaining
3(-2)
and this 3(-2) should equal -6, which is not the same as -8.
3(4 - 6) = 12 - 18, which differs from the student's solution. This is the reason for the wrong answer.
Answer:
3 (4 -6) = -8 is correct. The next step is to combine 4 and -6, obtaining
3(-2)
and this 3(-2) should equal -6, which is not the same as -8.
3(4 - 6) = 12 - 18, which differs from the student's solution. This is the reason for the wrong answer.
Explanation:
Using a while loop, create an algorithm extractDigits that prints the individual digits of a positive integer.
Answer:
The algorithm is as follows
1. Start
2. Declare Integer N
3. Input N
4. While N > 0:
4.1 Print(N%10)
4.2 N = N/10
5. Stop
Explanation:
This line starts the algorithm
1. Start
This declares an integer variable
2. Declare Integer N
Here, the program gets user input N
3. Input N
The while iteration begins here and it is repeated as long as N is greater than 0
4. While N > 0:
This calculates and prints N modulus 10; Modulus of 10 gets the individual digit of the input number
4.1 Print(N%10)
This remove the printed digit
4.2 N = N/10
The algorithm ends here
5. Stop
Bonus:
The algorithm in Python is as follows:
n = 102
while n>0:
print(int(n%10))
n= int(n/10)
explain why it is important for you to understand and describe the basic internal and external components of a computer in the work place
Answer:
you go to edit
Explanation:
List the do's and don'ts of secure online interactions
Answer:
The answer is below
Explanation:
The "dos" are the safe practice's website users should always do to provide themselves a form of security against potential hackers in online interactions.
Hence, are the "dos" based on the options listed.
1. Use a long password with mixed characters
2. Use antivirus and spyware protection
3. Don't write your password down and leave it where others can find it
4. Go through the terms and conditions, and privacy policies of social networking and other websites that you access.
On the other hand, the "don'ts" are the practices a website user or visitor should avoid doing to provide themselves a form of security against potential hackers in online interactions.
Hence, are the "don'ts" based on the options listed.
1. Keep yourself logged in when you leave your computer
2. Share your password with your friends
3. Retain cookies every time you visit a website.
3n - 12 = 5n - 2
how many solutions?
2) Module selection and verification:
The program must authenticate the student access using student ID and password.
Students should be able to choose two different modules out of the following modules (more than two modules is not possible):
Programming 1
Programming 2
Networking 1
Mathematics
Students should be able to view their current selected modules.
The program should allow the user to return to the main page.
3) Student account top-up:
The program must authenticate the student access using student ID and password.
Students should be able to deposit points in his/her point account. The program should confirm the requested points with the user before adding them into his/her account.
The program must return to the main page.
import random
database = {}
while True:
try:
user_choice = int(input("Enter your student id to bring up your information (Press enter if you don't have one) : "))
user_pass = input("Enter your password: ")
if user_choice in database.keys() and database[user_choice][5] == user_pass:
print("User Authenticated! Welcome, "+database[user_choice][1]+" "+database[user_choice][2])
while True:
choice = int(input("Do you wish to choose your modules, view your selected modules, deposit points, or go back to the main menu? (1,2,3,4): "))
if choice == 1:
modules = input("Choose up to two modules (comma separated): Programming 1, Programming 2, Networking 1, Mathematics ")
modules = modules.split(",")
if len(modules) > 2:
print("You're only allowed to select two modules at one time.")
else:
database[user_choice].append(modules)
elif choice == 2:
if len(database[user_choice]) == 8:
print("Your module(s) are:")
for x in database[user_choice][7]:
print(x.strip())
else:
print("You don't have any modules!")
elif choice == 3:
point_deposit = int(input("How many points would you like to deposit: "))
confirm = input("Do you want to deposit "+str(point_deposit)+" point(s) (y/n): ")
if confirm == "y":
database[user_choice][6] += point_deposit
print("Your point balance is now:",database[user_choice][6])
else:
print("Your deposit could not be confirmed! Deposit denied.")
elif choice == 4:
break
except ValueError:
name = input("Enter your first name: ")
last_name = input("Enter your last name: ")
phone_number = input("Enter your phone number: ")
email = input("Enter your email address: ")
password = input("Enter a password: ")
points = 100
student_id = random.randint(1,1000)
while student_id in database.keys():
student_id = random.randint(1,1000)
print("Hello,",name,"your student ID is:",student_id)
database[student_id] = [student_id,name, last_name, phone_number, email, password, points]
Although I tried to cover all the bases, I might've missed something. I hope this helps.
Vocational counselors group career and occupation specialties into
career clusters.
they group them into 16 career clusters
Answer:
16 career clusters
Explanation:
The other guy is right. I got it correct on edmentum
which type of webpages will automatically adjust the size of the content to display appropriately relative to the size of the screen of the device on which it is displayed
Answer:
Responsive.
Explanation:
HTML is an acronym for hypertext markup language and it is a standard programming language which is used for designing, developing and creating web pages.
Generally, all HTML documents are divided into two (2) main parts; body and head. The head contains information such as version of HTML, title of a page, metadata, link to custom favicons and CSS etc. The body of the HTML document contains the contents or informations of a web page to be displayed.
The responsiveness of a webpage is an ability of the design to respond to the end user's digital device and screen size.
In Computer programming, a responsive web design makes it possible for various websites to change layouts in accordance with the user's digital device and screen size.
This ultimately implies that, a responsive design is a strategic approach which enables websites to display or render properly with respect to the digital device and screen size of the user.
Hence, responsive webpages will automatically adjust the size of the content to display appropriately relative to the size of the screen of the device on which it is displayed.
Why did who made cocomelon name it cocomelon and why are babies so addicted to it
Answer:
Cocomelon
Explanation:
"Young children are drawn to the bright visuals — especially the focus on big eyes and faces — the repetitive music and sounds, and the constant movement and action on the screen." While young kids love the sounds and songs they hear on CoComelon, the animation and the bright colors are really what draws them in.
Sarah is a detail-oriented programmer. While testing her program, what other skill would she have to apply in order to detect all bugs?
A.
troubleshooting
B.
business skills
C.
managerial skills
D.
concentration
E.
time management
Answer:
A. troubleshooting
Explanation:
Troubleshooting is the process of trying to detect problems with a software or hardware component so as to apply solutions to it.
Therefore, Sarah would need troubleshooting skills to help her test her program to detect all bugs and fix it.
Which feature of a website takes you to a different part of the website or a totally different website when you click on it? A. graphics B. formal text C. hyperlink D. animation
Answer: C
Explanation:
Answer:
hyperlink
Explanation:
The feature of a website that takes you to a different part of the website or a totally different website when you click on it is called a hyperlink. Hyperlinks are typically underlined and appear in a different color than the surrounding text. They can be used to navigate between pages on the same website or to link to external websites.
ok so how do i get the expert title ??? i meet the requirements
Choose the correct climate association for: deciduous forest
Answer:
Mid Latitude Climate!
Explanation:
I've studied this! Hope this helps! :)
Answer:
mid-latitude climate
Explanation:
Correct answer on a quiz.
Think about the five steps to writing an algorithm. Why is each step necessary? Why is it important to be precise when writing computer code? Some problems are better solved by a computer and some are better solved by humans. How do you know when a problem should be solved by a computer or by a person? There’s a scientific theory out there that says that our brain uses an algorithm to create our thoughts and it’s called the Theory of Connectivity. This theory suggests that information comes into our brains, is processed, stored, and then results in an output. Does this process sound familiar to you? In what ways do our bodies take in input and respond, sometimes without our control? Give two examples. In what ways is the human brain like a computer? In what ways is it different?
Answer:
All steps in writing an algorithm are important because the output of each step is the input of the next. Computers are more useful for solving problems that deal with large data and require speed. The theory of connectivity is similar to data processing in computer systems. The human nose involuntarily inhales oxygen during respiration and exhales carbon dioxide and the ear picks sound waves and forwards it to the brain for decoding.
Explanation:
The computer system is a device, electronically built to accept, process and output information. The entirety of the computer system (input, output, storage and processing unit) can be compared to the human brain based on the concept of the theory of connectivity. The human nose and ears are two sensory organs that serve as an input to the brain as they unconsciously receive environmental data (external stimulus) and forward it to the brain.
click it to paste the content of clipboard
Ctrl + V
It is used for paste function.
Service Mesh is a framework that handles the cross-cutting concerns like logging, service registration, etc. true false
Answer: False
Explanation:
A service mesh is referred to as a communication layer that is used to foster communication in a micro service setup usually through the use of a sidecar proxy.
It should be noted that in this case, every requests would have to pass through the service mesh.
It should be noted that the statement that Service Mesh is a framework that handles the cross-cutting concerns like logging, service registration, etc is false.
Guess the output of this code:print( (3**2)//2 )
Answer:
Assuming that's in python, the answer would be 4
Explanation:
The ** operator is for raising a number to a power.
The // operator returns the number of times the right number can fit into the left (i.e round division).
So the answer would be three squared over two rounded down, or 4.
ways that Mass Media has affected your everyday life.
Answer:
Mass Media affects my life every day right now I am angry and almost embarrassed to say I live in America...
Answer:
Body Image and Self-Esteem.
Consumer Spending Habits.
Values.
Perception of Individuals and People Groups.
Femininity, Masculinity and Relationships.
Explanation:
52. An assignment statement will:
a. Perform a calculation
b. Store the results of a calculation
c. Display the results of a calculation
d. Both a and b.
Answer:
D.both a and b.
Explanation:
sana makatulong
Answer:
I believe that the answer is d. both a and b.
If a hacker targets a vulnerable website by running commands that delete the website's data in its database, what type of attack did the hacker perform
Answer:
SQL injection.
Explanation:
SQL injection is a way to exploit vulnerabilities in the handling of input data in some computer programs that work against a database. The injection takes place by a user submitting parameters to a database query, without the parameters being correctly transformed with respect to special characters, such as escape sequences. With custom parameters, a user can bypass login systems and manipulate data.
Microsoft Publisher - Assignment #1
True/False
Place a “T” if the statement is true or "F" if the statement is false, in the blank
I
2)
Three column layouts are formal and serious looking
3)
After you use ruler guidelines, you need to delete them so that they do not show
when you print your publication.
4)
When printing a double sided publication, heavier paper may be needed so that text
Answer:1
Explanation:
Do you still get messages and calls when silent your phone and power off it
Answer:
yes
Explanation:
it will just be muted so you wont hear when someone text or calls you.
explain mportance of using Microsoft Excel in pharmaceutical science
Answer:
research the question and go to setting and press advanced search and it will give answer
Create a spreadsheet that lists the ten currencies you chose. For each currency, enter an amount and create a
formula to convert it to U.S. dollars. Make sure to include dollar signs in the appropriate cells.
Answer:
its a very lengthy one
Explanation:
Can someone help me with this error? Will give brainliest and i will give more details if you need just please help
Answer:
From what I see, you're trying to convert an int to a double&. This is illegal. Do you have any arrays with ints?
Who first demonstrated the computer mouse ?
Answer:
Douglas Engelbart
Douglas Engelbart invented the computer mouse in 1963–64 as part of an experiment to find a better way to point and click on a display screen.
Explanation:
.
A network administrator determines who may access network resources by assigning users
ONICS
OUTPS
O permissions
O nodes
Answer: permissions
Explanation:
Users permissions is defined as the authorization that is given to users which in turn, allows such individual(s) to be able to have access to certain resources on a particular network.
Therefore, the user permission can be utilized by a network administrator so tht he or she can determines who can have access to network resources.
Please program this in Python
Write the function spell_name that will takes a name as its input, then returns a list where each character in their name is an element.
For example,
spell_name('Jessica')
# => ['J', 'e', 's', 's', 'i', 'c', 'a']
spell_name('Ariel')
# => ['A', 'r', 'i', 'e', 'l']
# fill in this function to return a list ontaining each character in the name
def spell_name(name):
return []
def spell_name(name):
return [x for x in name]
print(spell_name("Jessica"))
I wrote my code in python 3.8. I hope this helps.
The program returns list containing each individual letter in a string. The function written in python 3 goes thus :
def spell_name(str):
#initialize a function named spell_name which takes in a single parmater which is a string.
return [letter for letter in str]
#using list comprehension separate each individual letter in the string as an individual element.
print(spell_name('Aisha'))
#A sample run of the program with the string 'Aisha'.
The output of the sample program is attached.
Learn more : https://brainly.com/question/19012132
write a program that display your name c++
Answer:
#include <iostream>
#include <string>
int main() {
std::string name;
std::cout << "Please enter a name: ";
std::cin >> name;
std::cout << "Hello " << name<<"!";
}
Explanation:
Asks for your name and adds Hello {name}!
write a program that asks the user how far they ran and then how long they ran and prints out their speed in miles per hour javascript
Answer:
var distance = prompt("How far did you run? in miles");
var time = prompt("How long did you run? in hours");
function calSpeed(miles, hours){
var speed = miles / hours;
console.log(speed,"m/h")
calSpeed(distance, time);
Explanation:
The javascript uses the prompt function to get user inputs for the distance and time variables. The calSpeed function calculates and prints out the speed of the runner with the arguments, distance and time.