Answer:
Yes because on online we can talk all we want and they don't know us irl so it's funny lol
Explanation:
How to write an algorithm to read and print a name?
I want the steps please
Answer:
Step 1: Obtain a description of the problem. This step is much more difficult than it appears. ...
Step 2: Analyze the problem. ...
Step 3: Develop a high-level algorithm. ...
Step 4: Refine the algorithm by adding more detail. ...
Step 5: Review the algorithm.
Explanation:
5.18 LAB: Output numbers in reverse Write a program that reads a list of integers, and outputs those integers in reverse. The input begins with an integer indicating the number of integers that follow. For coding simplicity, follow each output integer by a comma, including the last one. Ex: If the input is: 5 2 4 6 8 10 the output is: 10,8,6,4,2, To achieve the above, first read the integers into a vector. Then output the vector in reverse.
Answer:
In C++:
#include<iostream>
#include<vector>
using namespace std;
int main(){
int len, num;
vector<int> vect;
cout<<"Length: ";
cin>>len;
for(int i = 0; i<len;i++){
cin>>num;
vect.push_back(num);}
vector<int>::iterator iter;
for (iter = vect.end() - 1; iter >= vect.begin(); iter--){
cout << *iter << ", ";}
}
Explanation:
This declares the length of vector and input number as integer
int len, num;
This declares an integer vector
vector<int> vect;
This prompts the user for length
cout<<"Length: ";
This gets the input for length
cin>>len;
The following iteration gets input into the vector
for(int i = 0; i<len;i++){
cin>>num;
vect.push_back(num);}
This declares an iterator for the vector
vector<int>::iterator iter;
The following iterates from the end to the beginning and prints the vector in reverse
for (iter = vect.end() - 1; iter >= vect.begin(); iter--){
cout << *iter << ", ";}
Which situations are the most likely to use telehealth? Select 3 options.
Your doctor emails a suggested diet plan.
Your brother was tested for strep throat and now you think you have it.
Your doctor invites you to use the patient portal to view test results.
You broke your arm and need a cast
You request an appointment to see your doctor using your health app.
Answer:
Your doctor emails a suggested diet plan.
Your brother was tested for strep throat and now you think you have it.
Your doctor invites you to use the patient portal to view test results.
Answer:
Your doctor emails a suggested diet plan
You request an appointment to see your doctor using your health app
Your doctor invites you to use the patient portal to view test results
Explanation:
Edge 2022
Difference between a port and a connector
Explanation:
A connector is the unique end of a plug, jack, or the edge of a card that connects into a port. Port: The port has either holes or a slot that matches the plug or card being connected into the port. For example: cables are plugged into Ethernet ports, and cables and flash drives are plugged into USB ports.I have a question about this programming assignment. The outcome when the user puts in Taylor for guest one and Fernando for guest 2 should be, "Your party is ruined and another bad pop song will be written." However, it does not. What do I add to get this outcome? Do I need more brackets?
Use guestNumber1.equals(Fernando) instead of the double equal signs. You cant compare strings with ==
2. BIOS is contained in ROM and not in RAM. Can you guess why?
Answer:
Because RAM is only used for short term storage (and doesn't contain anything that will need to be accessed often) RAM it loses its contents when turned off. So when you power on a computer, it has to start running bootup code which has to be stored in ROM
Cole has to edit and resize hundreds of photographs for a website. Which Adobe
software program would be the best choice to complete this task?
a.) Animate b.) Dreamweaver c.) Illustrator d.) Photoshop
You are given the following segment of code:Line 1: PROCEDURE printScorePairs()Line 2: {Line 3: count <-- 0Line 4: sum <-- 0Line 5: i <-- 1Line 6: scores <-- [73, 85, 100, 90, 64, 55]Line 7: REPEAT UNTIL ( i > LENGTH (scores) )Line 8: {Line 9: sum <-- scores[i] scores[i 1]Line 10: DISPLAY ( sum )Line 11: i <-- i 2Line 12: }Line 13: }The ABC company is thrifty when it comes to purchasing memory (also known as RAM) for its computers. Therefore, memory is of the utmost importance and all programming code needs to be optimized to use the least amount of memory possible. What modifications could be made to reduce the memory requirements without changing the overall functionality of the code?
Answer:
Move Line 10 to after line 12
Explanation:
Required: Modify the program
From the procedure above, the procedure prints the sum at each loop. Unless it is really necessary, or it is needed to test the program, it is not a good practice.
To optimize the program, simply remove the line at displays the sum (i.e. line 10) and place it at the end of the loop.
So, the end of the procedure looks like:
Line 10: i <-- i 2
Line 11: }
Line 12: DISPLAY ( sum )
Line 13:
Write a python program that gets a number using keyboard input. If the number is positive, the program should call countdown
Answer:
def countdown():
print("This is countdown")
number = int(input("Enter number: "))
if (number > 0):
countdown()
Explanation:
This is literally what you asked, but what is the purpose?
Which of the following algorithms is the same as the flowchart shown below?
Start
mylum - RANDOM(1,10)
false
DISPLAY("Done
DISPLAY()
O Amylum - RANDOM (1, 19)
IF (byllum > 8)
(
DISPLAY("Done")
ELSE
(
DISPLAY(myNum)
}
OB. myllum - RANDOM(1, 18)
REPEAT UNTIL (byllum > 8)
{
DISPLAY(myNum)
myllum - RANDOM(1,18)
}
DISPLAY("Done")
Octylum - RANDOM(1, 18)
IF (myllum < 8)
{
DISPLAY("Done")
ELSE
{
DISPLAY(myllum)
)
O D. myllum - RANDOM(1, 18)
REPEAT UNTIL (myNun > 8)
{
DISPLAY("Done")
DISPLAY(byllum)
Answer:
choice b
Explanation:
The algorithms are the same as the flowchart shown below is myllum - RANDOM(1, 18), REPEAT UNTIL (byllum > 8) { DISPLAY(myNum)myllum - RANDOM(1,18)} DISPLAY("Done"). The correct option is B.
What is an algorithm?The definition of algorithms in computer science. An algorithm is a list of instructions used in computer science to solve problems or carry out activities based on knowledge of potential solutions.
Think of a "black box," or a container where nobody can see what is occurring within. The box accepts our input and produces the output we require, but the process by which input is transformed into the intended output—and which we may need to understand—is an ALGORITHM.
Therefore, the correct option is B. myllum - RANDOM(1, 18)REPEAT UNTIL (byllum > 8){DISPLAY(myNum)myllum - RANDOM(1,18)}DISPLAY("Done").
To learn more about an algorithm, refer to the link:
https://brainly.com/question/22984934
#SPJ5
. A digital computer has a memory unit with 24 bits per word. The instruction set consists of 150 different operations. All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
a) How many bits are needed for the opcode?
b) How many bits are left for the address part of the instruction?
c) What is the maximum allowable size for memory?
d) What is the largest unsigned binary number that can be accommodated in one word of memory?
Explanation:
d answer
gzjxubejeiizbtozueg
What is computer science
Answer:
computer science is the study of computer and computing as well as theoretical and practical applications.
pls give me thanks ☺️☺️
Hello! So I have been practising some coding, however, there seems to be an error in my code. I have been trying to figure out what is wrong, however, I just can't seem to find it. There is no syntax error but, there seems to be a problem with my input. I am currently using repl.it and I am making a calculator. I would input something like "multiply" however, the calculator would only square. I have tried changing the variables but it just keeps coming back to the first "if" statement. I would appreciate some help.
Answer:
You OR expressions are wrong.
Explanation:
Rather than writing:
if method == "Square" or "square":
You should write:
if method == "Square" or method == "square":
The expression should evaluate to something that is true or false.
In the above case, the expression is method == "Square" or method == "square" which can are actually two sub-expressions with an or in between them:
subexpr1 or subexpr2
each of the sub-expressions should evaluate to true or false.
method == "Square" is one of those sub-expressions.
That is how an expression is broken down by the compiler.
TIP: If you would add method = method.lower() right after the input, you could simplify all the if statements by removing the uppercase variants.
what is ergonomic in computer science
Answer:
Ergonomics is the science of fitting jobs to people. One area of focus is on designing computer workstations and job tasks for safety and efficiency. Effective ergonomics design coupled with good posture can reduce employee injuries and increase job satisfaction and productivity.
In Linux, users are internally represented using a unique number called user ID or uid.
a. True
b. False
Answer:
a. True
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
In Linux, users are internally represented using a unique number called user ID or UID. Thus, this unique number serves as an internal identifier in the Linux Kernel and as such determines what system resources may be accessible to each user. Oftentimes, these unique numbers are not put into use but rather a name is linked with the number and are used instead.
Also, users can be organized logically into a group and are represented uniquely with a group ID or GID, which serves as a global identifier for the users.
what, if anything, is returned by the method call rearrange ("apple")?
Answer:
[tex] \boxed{E} \to \boxed{nothing \: is \: returned \: due \: to \: run \: tie \: error}[/tex]
To copy an item, you would:
O Highlight the item, right click, and select copy
O Press Ctrl + X
O Press Ctrl + Z
O Highlight text
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send a packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we
This project is based on SEED labs by Wenliang Du, Syracuse University.
get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure
a = IP()
a.dst '1.2.3.4
a.ttl = 3
b = ICMP()
send (a/b)
If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result
Task: Sniffing and-then Spoofing
In this task, you will combine the sniffing and spoofing techniques to implement the following sniff- and-then-spoof program. You need two VMs on the same LAN. From VM A, you ping an IP X. This will generate an ICMP echo request packet. If X is alive, the ping program will receive an echo reply, and print out the response. Your sniff-and-then-spoof program runs on VM B, which monitors the LAN through packet sniffing. Whenever it sees an ICMP echo request, regardless of what the target IP address is, your program should immediately send out an echo reply using the packet spoofing technique. Therefore, regard-less of whether machine X is alive or not, the ping program will always receive a reply, indicating that X is alive. You need to use Scapy to do this task. In your report, you need to provide evidence to demonstrate that your technique works.
Answer:
kad ;ikajlfhdakjsfhadskfadhkjfahdjkfadk a jk h
Explanation:
Answer:
is this even a legit question
You are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remote access to your computer to enable them to act as you to fix situation. What type of must be installed on your machine to allow this type of action by another person
Answer:
Single User OS.
Explanation:
An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.
This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.
Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.
There are different types of operating systems (OS) used for specific purposes and these are;
1. Batch Operating System.
2. Multitasking/Time Sharing OS.
3. Multiprocessing OS.
4. Network OS.
5. Mobile OS.
6. Real Time OS .
7. Distributed OS.
8. Single User OS.
A Single User OS is a type of operating system that only allows one user to perform a task or use a system at any time.
In this scenario, you are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remote access to your computer to enable them to act as you to fix situation. Therefore, the type of OS which must be installed on your machine to allow this type of action by another person is called a Single User OS.
Write a program that computes how much each person in a group needs to pay (after tax and tip) when splitting the bill equally. Specifically, your program should: 1. Ask a user for the number of people in the party 2. Ask a user for the total bill amount before tax and tip 3. Output the amount due per person after tax and tip Assume that tax is 7.25%, and tip is 20% (tip is before tax).
A local real estate company can have its 25 computers upgraded for $1000. If the company chooses only to upgrade 10 systems, how much will the upgrade cost if the same rate is used?
Answer:
it is
Explanation:
400 dollars for 10 systems and 200 dollars for 5 systems
explanation
first
find the price of 1 system or computer which is done by dividing 1000 by 25
25)1000(40
100
____
00
00
__
0
then multiple it by 10 =40 ×10=$400
Answer:
400!!
Explanation:
Select the correct answer.
The idea that different aspects of health influence each other is known as _____ .
A.
Holistic health
B.
Happy health
C.
Integral health
D.
Perfect health
Answer:
A. Holistic health
Explanation:
Holistic health refers to the method of caring the entire body. It includes physical, mental and emotional health of the individual. The overall health of an individual depends on the fitness of al these aspects of the body. The mind, body and the soul are considered to be interdependent and therefore the fitness of the body depends on the fitness of all of these parts.
Answer:
A
Explanation:
The definition of holistic is relating to the idea that things should be studied as a whole and not just as a sum of their parts. An example of holistic is health care that focuses on the health of the entire body and mind and not just parts of the body.
It is important to create a strong password because it will
let someone steal your personal information
allow your friends to easily guess it
keep your private information safe and secure
give your computer a virus
1, How can technology serve to promote or restrict human rights? [2 points]
Answer:
Examples of how technology can be used as a powerful tool for human rights are ever expanding. Newer technologies such as artificial intelligence, automation, and blockchain have the potential to make significant positive contributions to the promotion and protection of human rights.
Create the HTML code for this
1.Font size for the text is 20px2.Background color for table dataiscyan and table headeris lightgrey.3.Text is center aligned.4.Height of the table is 200px andwidth is 500px.5.Border thickness 2px,colour black and collapsed
Answer:
index.html:
<!DOCTYPE html>
<html>
<head>
<title>Brainly</title>
<link href="style.css" rel="stylesheet" type="text/css" />
</head>
<body>
<table id="myTable">
<caption>Duty Roster for last two days</caption>
<tr><th>Day</th><th>Morning</th><th>Afternoon</th></tr>
<tr><td>Monday</td><td colspan="2">John</td></tr>
<tr><td>Tuesday</td><td rowspan="2">Tom</td><td>Peter</td></tr>
<tr><td>Wednesday</td><td>simon</td></tr>
</table>
</body>
</html>
style.css:
#myTable {
background-color: Cyan;
border-collapse: collapse;
height: 200px;
width: 500px;
font-size: 20px;
}
#myTable td,th {
border: 2px black solid;
text-align: center;
}
#myTable td:first-child, th {
background-color: lightgray;
font-weight: bold;
}
Suppose you present a project and your supervisor comments that the graphics need to be a higher quality and suggests you replace a circuit board. To what circuit board is your supervisor referring?
graphics card
video card
sound card
system card
Answer:graphics card
Explanation:
Answer:
graphics card
Explanation:
full meaning of ENDVAC
Answer:
EDVAC was one of the earliest electronic computers. Unlike its predecessor the ENIAC, it was binary rather than decimal, and was designed to be a stored-program computer. ENIAC inventors John Mauchly and J. Presper Eckert proposed the EDVAC's construction in August 1944.
Explanation:
Here is the full meaning
which among the following if absent, a computer is not complete.
A. mouse
B. DVD
C. user
D. projector
Answer:
user because all the other things the computer need
List and fully describe at least 3 examples of input devices and how they are applied in the real world. (In separate paragraphs.)
Answer:
1. Mouse
2.Graphic Tablet
3.Keyboard
Explanation:
1. A computer mouse (plural mice, rarely mouses) is a hand-held pointing device that detects two-dimensional motion relative to a surface. This motion is typically translated into the motion of a pointer on a display, which allows a smooth control of the graphical user interface of a computer.
2.Graphic tablets, because of their stylus-based interface and ability to detect some or all of pressure, tilt, and other attributes of the stylus and its interaction with the tablet, are widely considered to offer a very natural way to create computer graphics, especially two-dimensional computer graphics
3.A keyboard is for putting information including letters, words and numbers into your computer. You press the individual buttons on the keyboard when you type. The number keys across the top of the keyboard are also found on the right of the keyboard. The letter keys are in the centre of the keyboard.
How is QA done in agile projects
200+300-500.
Explanation:
rjfnvkfjfhfofgfohgighghgiggh