Answer:
If it's a bird than the bigger the wing span the faster it can fly... or possibly glide in the air longer. I think all plan wing sizes don't change the effect of how it goes. If it is something like the sky gliders than yes. It would most likely be in the sky longer.
In python please!! Write the definition of a function named countPos that needs integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.
Answer:
Explanation:
The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.
def countPos(number=input("Enter number: "), counter=0):
try:
number = int(number)
if number > 0:
counter += 1
newNumber = input("Enter number: ")
return countPos(newNumber, counter)
else:
newNumber = input("Enter number: ")
return countPos(newNumber, counter)
except:
print(counter)
print("Program Finished")
countPos()
Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.
The question is incomplete. The complete question is :
Drag the tiles to the correct boxes to compete the pairs. Identify the types of chemical reactions occurring in the chemical equations.
combustion reaction , photosynthesis , respiration
water + carbon dioxide + sunlight → oxygen + glucose
methane + oxygen → water + carbon dioxide + heat
glucose + oxygen → carbon dioxide + water + energy
Solution :
The chemical reactions that is occurring in the following chemical equations are :
Photosynthesis
water + carbon dioxide + sunlight → oxygen + glucose
Plants uses the light energy from the sun in the presence of water and carbon dioxide produces food by the process of photosynthesis. It produces glucose and oxygen.
Respiration
glucose + oxygen → carbon dioxide + water + energy
The cellular respiration process produces ATP with the breakdown of the glucose and oxygen. During respiration process, carbon dioxide is obtained along with water and energy.
Combustion reaction
methane + oxygen → water + carbon dioxide + heat
Combustion reaction is a chemical reaction in which methane is the main ingredient. Combustion takes place as things burn in the presence to methane and oxygen to form carbon dioxide, water and heat.
Hardware failure, power outages, and DOS attacks will affect:
data confidentiality.
data integrity.
data verification.
data availability.
Answer:
The answer should be data availability
Type the correct answer in the box. Spell all words correctly.
Alan maintains the efficiency of a printing plant by supervising plant operations and implementing safety procedures. What does he work as?
Alan is working as a _____________.
Answer:
Alan is a Maintenance Supervisor.
Explanation:
Answer:
printing plant manager
Explanation:
Two parter:
A.) What is wrong with the program segment below? The program does not contain syntax errors.
B.) Fix the programming error(s)
num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
Answer:
the variable num is not declared so the compiler doesn't define it.
add int before num:
int num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
now the code will run but it won't stop as it will never break the condition (num < 9).
how important the role of valet and butler service in the hospitality
When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
Answer:
lower-priced models offer more features
Explanation:
Low-level programming languages are (5 points)
a
closer to human languages
Ob
less readable by humans
O
C
more readable by humans
Od
written in human languages
Answer:
Low-level programming languages are essentially written as the computer interprets them (examples would be assembly and machine language), so the answer is B.
Explanation:
9.6 Code practice Edhesive
Answer:
N = [1,1,1,1,1],
[2,2,2,2,2],
[3,3,3,3,3],
[4,4,4,4,4]
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N=[]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
Explanation:
I got 100%.
In this exercise we have to use the knowledge of computational language in python to write the code.
We have the code in the attached image.
The code in python can be found as:
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N = [1,1,1,1,1], [2,2,2,2,2], [3,3,3,3,3], [4,4,4,4,4]
for r in range(4):
N.append([])
for r in range(len(N)):
value=1
for c in range(5):
N[r].append(value)
value=value + 1
printIt(N)
print("")
newValue=1
for r in range (len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
See more about python at brainly.com/question/26104476
Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False
List two examples of following types of communication
Answer:
Explanation:
sign language is communication
touch is communication
Three types of common program errors are syntax, runtime, and logic. (5 points)
O True
O False
Answer:
True
Explanation:
also have a good day people !!
Answer:
Thx u2!!
Explanation:
Everyone have a good day!
Answer:
You too and thank you for 50 points!!
Explanation:
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Answer:
The right approach is Option b (volume testing).
Explanation:
A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.Other options are not related to the given query. So the above is the right response.
what is the answer???
Answer:
I think it should be C
Explanation:
A group of two or more computers that are link together.
_______________is the career cluster that medical professionals are under.
Match each operating system drawback to its respective operating system.
1. more susceptible to viruses Linux. Operating System
2. fewer compatible applications Microsoft Windows Operating System
3. limited support system Apple Operating System
Answer:
Microsoft Windows - More susceptible to viruses
Linux - Limited support system
Apple - Fewer compatible applications
Explanation:
Generally windows is more susceptible to viruses.
Linux is open source meaning it's up to the community to help you.
Apple has been supporting more applications in these coming years but it still lacks the wide range of apps windows supports.
Answer:
1. Microsoft Windows is more susceptible to viruses
2. Mac OS X (Apple OS) has fewer compatible applications
3. Linux OS has a limited support system.
A security hole is a(n): Group of answer choices packet-level firewall small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system
Answer: malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
Explanation:
A security hole is the malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users.
A security hole is regarded as a software flaw that allows someone who isn't authorized to have access to the system. This vulnerability can be taken advantage of by a hacker or other threat factors.