Answer:
Python 3
Explanation:
The language's latest iteration, Python 3.9, was released on October 5, 2020. It includes even more new features such as relaxed grammar restrictions, flexible function and variable annotations, and new string methods to remove prefixes and suffixes.
New Programming Language 1: Python 3
The language's latest iteration, Python 3.9, was released on October 5, 2020. It includes even more new features such as relaxed grammar restrictions, flexible function and variable annotations, and new string methods to remove prefixes and suffixes.
Research the history of Internet in computers
Answer:
This allowed different kinds of computers on different networks to "talk" to each other. ARPANET and the Defense Data Network officially changed to the TCP/IP standard on January 1, 1983, hence the birth of the Internet. All networks could now be connected by a universal language.
At Universal Containers, the sales managers would like Opportunities that have NOT been updated in the past 30 days to automatically be flagged. How should a System Administrator implement this requirement
The System Administrator implement and Create a formula field to calculate the time since last update and display an image of a red flag if it meets the defined criteria.
What is a Formula field?This is known to be a read-only fields that often calculate a value through the use of other fields or a given formula.
Note that The System Administrator implement his requirement and Create a formula field to calculate the time since last update and display an image of a red flag if it meets the defined criteria.
Learn more about System Administrator from
https://brainly.com/question/27129590
#SPJ1
What are the real-life applications of coding? at least 5 to 6 lines anyone
The real-life applications of coding is that they are used in:
Traffic LightsCoffee Machines, etc.What are useful applications of codes?Coding is known to be a tool that helps to make a composition of instructions that a computers needs to follow.
Note that in real life, Coding helps programmers to create programs, such as websites and apps that are used in Traffic Lights, etc.
Learn more about coding from
https://brainly.com/question/22654163
#SPJ1
the japanese call the practice of stopping production when a defect occurs
Answer:
Jidoka
Explanation:
hope this helps:)
True or false. The send e-mail feature, listed under tools, will allow you to send an e-mail to your instructor and to fellow students directly from your online course in blackboard.
Answer:
TRUEExplanation: please mark me brainliest
a computer is made up of four different types of devices which are
A computer is made up of four different types of devices which are input, storage, processing and output devices.
What are computer devices?Computer devices are those components of computer known as the computer hardware that ensures the proper functioning of the system.
The four different types of devices found in the computer are :
Input devices: These are used to put in data into the system.Storage device:. These are used for storage of processed data.Processing device: This is the brain box of the computer.Output devices: They are used to display data.Learn more about hardware here:
https://brainly.com/question/24370161
#SPJ1
Alma will make the honor roll if she has at least a 3.80 GPA and misses less than 5 days of school in a year. In which of the following cases will Alma make honor roll?
1. Alma has a 3.84 GPA and misses 5 days of school
2. Alma has a 3.78 GPA and misses 2 days of school
3. Alma has a 3.68 GPA and misses 6 days of school
4. Alma has a 3.81 GPA and misses 3 days of school
Answer: 4. Alma has a 3.81 GPA and misses 3 days of school
Explanation: The others don't meet the requirments.
The only case where Alma will make honor roll is the fourth case where she has a 3.81 GPA and misses 3 days of school.
What is GPA?GPA stands for Grade Point Average, and it is a measure of a student's academic performance in a given period.
It is calculated by assigning a numerical value to each grade received in a course and then averaging those values.
Based on the given criteria, Alma will make honor roll if she has at least a 3.80 GPA and misses less than 5 days of school in a year.
Alma has a 3.84 GPA and misses 5 days of school: Alma has the required GPA, but she misses 5 days of school which is greater than the allowed 5 days. Therefore, she will not make honor roll.
Alma has a 3.78 GPA and misses 2 days of school: Alma misses less than 5 days of school, but her GPA is less than the required 3.80. Therefore, she will not make honor roll.
Alma has a 3.68 GPA and misses 6 days of school: Alma misses more than 5 days of school, and her GPA is less than the required 3.80. Therefore, she will not make honor roll.
Alma has a 3.81 GPA and misses 3 days of school: Alma has the required GPA and misses less than 5 days of school. Therefore, she will make honor roll.
Thus, Alma will only make honour roll if she has a 3.81 GPA and misses three days of school in the fourth case.
For more details regarding GPA, visit:
https://brainly.com/question/15170636
#SPJ2
Android os is developed by
Answer:
It is developed by G oogle
Explanation:
Android os is developed by G oogle. It launched in 2008.
Write a program that takes a 10-digit phone number and adds a hyphen in the correct location. Using an input field for the user to enter the information. Also, use a string for instructions on how to enter the phone in the input field.
The python program will request for a ten digit number from the user and formulate a real phone number from it.
How to write a python program to form a real phone number?The program is written in python.
Therefore,
x = input("please write a ten digit number: ")
if len(x) == 10:
a = f"({x[0:3]})"
b = x[3:6]
c = x[7:]
print(a + " " + b + "-" + c)
Code explanation:The variable x is used to store the user's input.If the length of x is equals to 10, then we get the first three terms in bracket, the second three terms and the last 4 terms.Finally, we use delimiters to join the variables as required and print it out.learn more on python here: brainly.com/question/13462052
#SPJ1
9.2 lesson practice
Answer:
6 columns/items
Explanation:
grid starts off as an empty list ( [ ] ), so right now it has 0 items/columns.
After that, 3 new items ("frog", "cat", "hedgehog") have been appended to grid, it now has 3 items
Finally another 3 items are appended to grid ("fish", "emu", "rooster"), finally grid ends up with 6 items in total.
Date Underline the correct answer from the options. 1. How many basic input devices does a desktop computer have? .. a)2 b)3 c) 1 d)4 2. The computer equipmentwhich feeds the computer with data is called. a) Storage device b) Processing device c) Diskette d) Input device 3.When an output is displayed in a printed form it is termed as a) Softcopy output b) File c) Document d) Hardcopy output
4. Which computer device will convert human voice into digital voice? a) Projector b) Loudspeaker c) Microphone d) Joy. 5) All the following are hardcopy output devices except a) Photocopier b) Printer c) Projector d) Plott
Answer:
1. 3
2. D (Input Device)
3. B (File)
4. C (Microphone
This is about a software called GIMP
Answer:
The answer is Stroke
Explanation:
Stroke outlines objects on a layer
Answer:
The correct answer is Stroke.
Explanation:
Go to the Edit menu now and from here, click on the Stroke Selection option. A dialog box will open up where you need to select the Stroke Line option and then set up various options like solid line, line style, dash pattern, line width, etc. After setting up these options, press the Stroke option, and wooo u did it!
Hope this helps:) Goodluck!
Because of the Patriot Act of 2001, law enforcement officials:
OA. can access your email
activity more easily.
OB. must periodically check your online activity.
OC. are not authorized to monitor your emails.
OD. need permission to view your text messages.
Based on the Patriot Act of 2001, law enforcement officials must periodically check your online activity.
What is the role of Patriot Act ?The USA Patriot Act is known to be an Act that hinders and punishes terrorist attacks that is done in any part of the United States and abroad via enhanced law enforcement and others.
Therefore, Based on the Patriot Act of 2001, law enforcement officials must periodically check your online activity to see if there is threat to national security.
Learn more about Patriot Act from
https://brainly.com/question/25741451
#SPJ1
Answer:
A, can access your email activity more easily
Explanation:
Trust me its correct
can I have some help?
100 POINTS ANSWER CORRECTLY AND ANSWER QUICKLY I DONT HAVE MUCH TIME
You are creating a function that will test whether a number is greater than 10 using these lines of code:
if a < 10:
print(a "is greater than 10")
Can you identify one syntax error and one logic error in these lines? Why do you think a programmer might have made the logic error?
Yes there's syntax error .
After if there's colon so the next line or code block should start after some spaces(min 4)
The correct code is
[tex]\tt def(a)[/tex]
[tex]\tt if\:a<10:[/tex]
[tex]\quad\tt print(a,"is\:greater\:than\:10")[/tex]
A family just changed to a different mobile phone and data service provider. They now need take some time to transfer their content to new phones and learn the features of the new service. This is an example of a:
The above scenario is an example of switching cost customers incur changing to a new supplier.
What id Switching costs?This is known to be the the costs that a consumer gets or has due to the effect of changing brands, or products.
Note that the above is an example of switching cost customers incur changing to a new supplier as they are said to be psychological, effort-based, and needs time.
Learn more about mobile phone from
https://brainly.com/question/917245
#SPJ1
You have the following code:
----------------------------------------------------------------------------------------------
fruit_list = ["strawberries", "bananas", "apples", "grapes"]
total_cost = 0
for fruit in fruit_list:
if fruit in ["apples","bananas"]:
total_cost += 3
elif fruit == "cantaloupe":
total_cost += 5
elif fruit in ["raspberries","strawberries","grapes"]:
total_cost += 4
-------------------------------------------------------------------------------------------------
What will be the value of total_cost?
A.13
B.14
C.15
D.7
Answer:
7
Explanation:
We already have the functions that tells us how much to add. If you add all this, you will get 12. HOWEVER because cantaloupe is in the list, the computer does not count that. So if we add that again without 5(how much the cantaloupe costs), we get 7.
Carl is beginning a digital forensic investigation. he has been sent into the field to collect a machine. when he arrives, he sees that the computer is running windows and has open applications. he decides to preserve as much data as possible by capturing data in memory. what should carl perform
Answer:
Volatile memory analysis
Explanation:
volatile data analysis in a computer's memory dump memory forensics is used by information security specialists to examine and identify assaults or harmful actions that leave no clearly identifiable trails on hard disk data which os what Carl decides to preserve as much data as possible by capturing data in memory
6.25 lab: even/odd values in a vector write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. the input begins with an integer indicating the number of integers that follow. ex: if the input is:
def is_list_even(my_list):
for i in my_list:
if(i%2 != 0):
return False
return True
def is_list_odd(my_list):
for i in my_list:
if(i%2 == 0):
return False
return True
def main():
n = int(input())
lst = []
for i in range(n):
lst.append(int(input()))
if(is_list_even(lst)):
print('all even')
elif(is_list_odd(lst)):
print('all odd')
else:
print('not even or odd')
if __name__ == '__main__':
main()
Mark this question for review To answer this question, complete the lab using information below. Launch Lab You are setting up on a small network. The owner of the network has decided to change his internet service provider (ISP) to EtherSpeed. The ISP has installed a connection to both RJ45 jacks on the wall plate. You are responsible for selecting the correct router to connect the network to the internet. You want to use the fastest connection speed available while maintaining security for the Home-PC and Home-PC2 computers. In this lab, your task is to complete the following: Use the appropriate network components to connect the two computers to the new ISP. • Place the Ethernet router with firewall capabilities on the Workspace. • Use the existing Cat5e Ethernet cables to connect the computers to the router's integrated Ethernet LAN ports. Use the AC to DC power adapter to plug in the device. • Use the Network and Sharing Center on both computers to confirm that the computers are properly connected to the network and internet. In this lab, the networking devices are preconfigured with the correct settings to make the connection to the internet service provider (ISP) and the internet.
The appropriate network components steps to take to connect the two computers to the new ISP is given below.
What is the network components about?In carryout the above task, the first thing to do is click the Shelf, and widen the Networking Devices.
Other steps are:
Take the Ethernet router and firewall to the Workspace.Beyond the router, Click on Back to switch and change to the back view.Beyond the switch, Click on Back to switch to change to back view of the switch.Beyond the cable modem, change by clicking on Back to switch to the back view as seen on the cable modem.Later on click on the Ethernet cable as found on the third switch port and then extend it to an open Ethernet LAN port on the router to link up the Home-PC down to the router.
Click also on the Ethernet cable as seen the third switch port and then take it also to an open Ethernet LAN port as seen on the router to link up the second Home-PC to the router.
Then also click on the last Ethernet cable on the switch and extend (drag) it to the open Ethernet WAN port as seen on the router to link up the router to the internet service.
Then click the Ethernet cable on the cable modem and extend it to a single of the RJ45 ports that can be found by going to the wall plate.
Make sure to select the DC power connector that can be seen on the switch and extend it to the power port seen on the router so that one can plug in the router.
Looking at the Home-PC, select to view Windows 10 to see if the system is properly linked to the network and also the internet.
Go to the notification aspect and the select the Network icon and click on the tool called Open Network and Sharing Center.
Lastly, One can know if the connection to Home-PC2 is working by clicking on bench as seen in the top menu, and then select to see Windows 10 to know if it is well linked to the network and internet and also follow the notification steps above.
Learn more about network components from
https://brainly.com/question/20535662
#SPJ4
You are researching a topic online. You follow a link on a science association's website, but the webpage will not load. What is the most reasonable hypothesis for this problem
The most reasonable hypothesis for this problem is that the domain name or uniform resource locator (URL) is invalid.
What is a website?A website is a collective name for a series of webpages that are interconnected with the same domain name, so as to provide certain information to end users.
In this scenario, since the Internet is active, the most reasonable hypothesis why the webpage will not load is that the domain name or uniform resource locator (URL) is invalid.
Read more on websites here: https://brainly.com/question/26324021
#SPJ1
How do smartphone screens work?
Answer:
Touchscreens work using electricity. The screen is made of glass, an insulating material – it cannot carry an electric current.
Explanation:
A system engineer enhances the security of a network by adding firewalls to both the external network and the internal company network. The firewalls are products of two separate companies. This is an example of what type of security control practice?
Answer:
Vendor diversity
Explanation:
Different cybersecurity companies maintain different codebases, which means an exploit that might poke holes in the security of one likely won't breach the other. In this situation, the network would still have an active and effective firewall from one vendor even as the exploit from the other vendor's firewall is being patched.
How have cloud and 5g helped make extended reality (xr) technology more accessible to a wide audience?.
Cloud and 5G helped make extended reality (XR) technology more accessible to a wide audience by tracking as well as managing activity of users in extended reality using blockchain databases.
What is Cloud and 5G?
5G technology is bringing major improvements to the cloud computing. Most technology innovations can be more efficient when they are cloud-dependent. 5G makes communications more smoother and faster.
This activity is managed by the database management.
Thus, Cloud and 5G helped make extended reality (XR) technology more accessible to a wide audience by tracking as well as managing activity of users in extended reality using blockchain databases.
Learn more about Cloud and 5G.
https://brainly.com/question/11973901
#SPJ1
Advantages of using Unicode to represent data
Development
Select the correct answer from each drop-down menu.
What is DHTML?
DHTML is ______ . It’s allows you to add functionality such as ______
The answer options for part 1 are A: an updated version of html B: a version of html meant for mobile devices or C: a set of technologies that allows developers to create interactive websites. Part 2 answer options are A:loading pages in the background B:automatic sign in or C: drop down menus and roll over text
Answer:
Part 1: C
Part 2: C
Explanations:
Answer
DHTML is ______. It allows you to add functionality such as ______
a set of technologies that allows developers to create interactive websites drop-down menus and rollover textI hope this help
BTW PLATO
Which email protocol allows an email client to download email messages to the local computer?.
Answer:
The protocol is called Post Office Protocol version 3(POP3)
Explanation:
Hope this helps!
what ctrl to show the font dialog box
Answer:
Ctrl + D key [Same time]
Explanation:
Using this imput will allow you to see the font dialog box :D
Have a great day <3
The main function of a(n) ____________________ is to centralize access control for the network by keeping an eye on both inbound and outbound traffic and preventing unauthorized users and malicious code from entering a network. .
Which draws a line while moving the pen 30 steps to the right?
from turtle import*
o drawright(30)
o move(30)
oright(30)
o forward(30)
Answer:
forward(30)
Explanation:
the turtle.forward command will move the turtle to the right