Answer:
Here you go :)
Explanation:
Change this however you'd like:
array = []
for n in range(10):
x = int(input("Enter integer: "))
array.append(x)
dup = set(array)
print(", ".join(str(i) for i in dup))
HELP PLS
Which technologies have made global communication instant and more effective? Choose THREE answers.
social media
wireless devices
smart phones
automobiles
printed newspapers
Answer:
(1). social media
(2). wireless devices
(3). smart phones
Explanation:
The three technologies that have made global communication instant and more effective are social media, wireless devices, and smart phones.
Here,
Social media platforms have revolutionized the way people communicate globally. They allow individuals to connect, share information, and communicate with others in real-time, regardless of geographical location.
Wireless devices, such as laptops, tablets, and smartwatches, have eliminated the need for physical connections like cables and wires. They allow users to access the internet and communicate with others from virtually anywhere with a wireless signal.
Smartphones combine the features of a mobile phone with advanced computing capabilities. They provide instant communication through voice calls, text messages, emails, and various messaging apps.
Smartphones also allow users to access social media platforms and use wireless internet, making global communication more convenient and efficient.
Know more about communication technologies,
https://brainly.com/question/33037966
#SPJ6
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file. When one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded
Answer:
The answer is below
Explanation:
Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.
When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.
Where are the kidneys located?
a) Attached to the bladder
b) Lower back
c) Upper back
d) Middle back
e) Chest cavity
f the following is acian of health
Answer:
B
Explanation:
Your kidneys are fist-sized organs shaped like beans that are located at the back of the middle of your trunk, in the area called your flank. They are under the lower part of your ribcage on the right and left sides of your backbone.
PLEASE HELP ME WITH THIS i will mark you brainlist
Answer: you have to check your email and click on the microsoft email they sent you and enter the code in the email.
Explanation: plz mark brainliest
of what is famous Ted Nelson?
Answer:
Nelson proposed a system where copying and linking any text excerpt, image or form was possible.
Explanation:
Ted Nelson is one of the theoretical pioneers of the world wide web who is best known for inventing the concept of hypertext and hypermedia in the 1960s. As one of the early theorists on how a networked world would work.
How I know:
I goggle it.
Select the correct answer.
Which of these is an adventure game?
A.
Duck Hunt
B.
Tetris
C.
Myst
D.
Sudoku
An algorithm to print a set of 10 integers in ascending order
Answer:
Program - Array Sorting
Author - Vishal Solanki
Language - C Language
Date - 03/02/2018 (dd/mm/yyyy)
*/
//IDE used for this code is "Visual Studio 2017"
#include <stdio.h> //including stdio.h for printf and other functions
#include<conio.h>
int main() //default function for call
{
int a[100],n,i,j;
printf("Array size: ");
scanf("%d",&n);
printf("Elements: ");
for(i=0;i<n;i++)
{
scanf("%d",&a[i]);
}
for (int i = 0; i < n; i++) //Loop for ascending ordering
{
for (int j = 0; j < n; j++) //Loop for comparing other values
{
if (a[j] > a[i]) //Comparing other array elements
{
int tmp = a[i]; //Using temporary variable for storing last value
a[i] = a[j]; //replacing value
a[j] = tmp; //storing last value
}
}
}
printf("\n\nAscending : "); //Printing message
for (int i = 0; i < n; i++) //Loop for printing array data after sorting
{
printf(" %d ", a[i]);
}
for (int i = 0; i < n; i++) //Loop for descending ordering
{
for (int j = 0; j < n; j++) //Loop for comparing other values
{
if (a[j] < a[i]) //Comparing other array elements
{
int tmp = a[i]; //Using temporary variable for storing last value
a[i] = a[j]; //replacing value
a[j] = tmp; //storing last value
}
}
}
printf("\n\nDescending : "); //Printing message
for (int i = 0; i < n; i++) //Loop for printing array data after sorting
{
printf(" %d ", a[i]); //Printing data
}
return 0; //returning 0 status to system
getch();
}
//Ouput
/*
Array size: 10
Elements : 3 4 7 6 5 1 2 8 10 9
Ascending : 1 2 3 4 5 6 7 8 9 10
Descending : 10 9 8 7 6 5 4 3 2 1
*/
Explanation:
Choose all items that represent essential tasks to do after an interview is over.
Send copies of the resume and cover letter.
Construct a career portfolio.
Ask about next steps and the best way to communicate.
Phone each person interviewed.
Send a follow-up email within 24 hours.
Submit the job application.
Answer:
Ask about next steps and the best way to communicate.
Send a follow-up email within 24 hours.
Explanation:
An interview is a well-organized conversation where one participant asks questions, and the other person gives answers to those questions.
Essential tasks that need to be done after an interview is over are as follows:
1. Ask about next steps and the best way to communicate.
2. Send a follow-up email within 24 hours.
Answer:
Ask about next steps and the best way to communicate.
Send a follow-up email within 24 hours.
Help plz brainliest.
Answer:
Follows are the solution to this question:
Explanation:
In this question, the equation will be written as the coefficients for each of the bases, that is from the above quantum states b is given as follows:
[tex]\to | b \rangle = 0.4 | 00 \rangle + 0.65 | 01 \rangle + 0.2 | 10 \rangle + 0.61 | 11 \rangle[/tex]
Therefore the equation can be written as in the state b:
[tex]\to \mathbf{state_b = [0.4, 0.65, 0.21, 0.61]}[/tex]
Question # 2
Dropdown
Identify the type of error described.
___5 / 0
___ float('two')
Answer:
ZeroDivisionError
ValuError
Explanation: Edg 2020-2021
Answer:
1.ZeroDivisionError
2.ValueError
Explanation:
took test
The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a selected destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send an packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure. a = IP() a.dst = ’1.2.3.4’ a.ttl = 3 b = ICMP() send(a/b) If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result.
Answer:
answer b
is correct
How do you add a space after a line in my terminal workspace?'
Example: I'd like my program to have a line space after
Line 2: "Computer Programming"
blank
Line 3: Author
blank
Line 4: Due Date
PLEASE HELP ITS CODING AND I INCLUDED A SCREENSHOT OF WHAT TO DO
Answer:
I need to have better photos in order to assist you...
Explanation:
I will attempt to get back with you if you can provide more clearer photos.
num1 = float(input("Enter your first number: "))
num2 = float(input("Enter your second number: "))
operation = input("What operation would you like to do? Type: add, subtract, multiply, or divide. ")
def add(n, n1):
return n + n1
def subtract(n, n1):
return n - n1
def multiply(n, n1):
return n*n1
def divide(n, n1):
return n/n1
if operation.lower() in ["add", "+"]:
result = add(num1, num2)
print(num1,"+",num2,"=",result)
elif operation.lower() in ["subtract", "-"]:
result = subtract(num1, num2)
print(num1,"-",num2,"=",result)
elif operation.lower() in ["multiply", "*"]:
result = multiply(num1, num2)
print(num1, "*", num2, "=", result)
elif operation.lower() in ["divide", "/"]:
result = divide(num1, num2)
print(num1, "/", num2, "=", result)
else:
print("Not a valid operation.")
I wrote my code in python 3.8. I hope this helps.
What are some ways you can work with templates? Check all that apply.
A. creating a new template from scratch
B. scanning a template from a printed page
C. using many different templates in one document
D. using a preexisting template
E. modifying a preexisting template
Answer:
Look at the other answer that guy knows what he is talking about
Explanation:
If we use 6 bits for representing positive and negative numbers using 2's
complement methods, what is the value of 11100?
Match the data type to the given data.
1. float
2. array
3. Boolean
4. character
false
с
c, o, m, p, u, t, er
26.2
When a program is adapted to run on multiple processors in a multiprocessor system, the execution time on each processor is comprised of computing time and the overhead time required for locked critical sections and/or to send data from one processor to another. Assume a program requires t = 100 s of execution time on one processor. When run p processors, each processor requires t/p s, as well as an additional 4 s of overhead, irrespective of the number of processors. Compute the per-processor execution time for 2, 4, 8, 16, 32, 64, and 128 processors. For each case, list the corresponding speedup relative to a single processor and the ratio between actual speedup versus ideal speedup (speedup if there was no overhead).
It's common to print a rotating, increasing list of single-digit numbers at the start of a program's output as a visual guide to number the columns of the output to follow. With this in mind, write nested for loops to produce the following output, with each line 60 characters wide: | | | | | | 123456789012345678901234567890123456789012345678901234567890
Answer:
The program in python is as follows:
for i in range(0,6):
for i in range(0,9):
print(" ",end='')
print("|",end='')
print()
for i in range(1,61):
print(i%10,end='')
Explanation:
See attachment for program output format
The next two instructions create a nested for loop
for i in range(0,6):
for i in range(0,9):
This prints 9 spaces
print(" ",end='')
This prints a vertical line at the top of the end of the spaces printed
print("|",end='')
This prints a new line
print()
This iterates from 1 to 60
for i in range(1,61):
This prints 1, 2, 3....9, then 0, 6 times on a straight line
print(i%10,end='')
Is the current month 12?
Select the correct answer.
A computer using a connectionless network protocol sends too many data packets to another computer, causing loss of a few packets. As a result, the message appears jumbled to the user at the destination computer. How does TCP overcome this issue?
A.
by using flow control
B.
by using cables
C.
by using terminals
D.
by using a larger IP address
Please only answer if you are 100% sure
Answer:
D by using a larger IP address correct
Explanation:
Correct answer I hope this helps you :)
Please help ASAP! will mark brianliest! 30 points!
Which popular VPN protocol allows segment access for users?
IPsec
PPTP
L2TP
SSL VPN
Answer:
SSL VPN
Explanation:
Secure Sockets Layer, or SSL VPN, is the second common VPN protocol.
A big plus for SSL VPNs is that they can allow segmented access for users. For example, users can be limited to checking email and accessing shared drives rather than having access to the entire network.
SSL VPNs come in two types, SSL portal and SSL tunnel.
SSL Portal VPNs
SSL Portal VPNs allow a user to securely access the web from a browser once the user logs into the VPN’s online portal using a specified method of authorization.
This type of SSL VPN gets its name because of how the user accesses it – through a single web page, or portal. The page acts as a single gateway to the other services available on the secured network.
SSL Tunnel VPNs
SSL Tunnel VPNs allow the user to not only access the web securely, but to also use applications and other network services that aren’t based on the web.
Due to their sophisticated segmentation capabilities, SSL VPNs often require more skill to implement.
VPNs are not a cure-all
Of course, what you could do is circumvent the entire debate around VPN SSL vs IPSEC. Our Gatekeeper offering is an enhanced alternative to VPN with no client, that still offers two-factor authentication to secure remote access.
Wherever you land between VPN SSL vs IPSEC, of if you join #TeamGatekeeper, having one of these tools to protect web traffic is a great way to help secure information, but it’s not an end-all be-all security solution.
After all, a VPN won’t protect your employees from social engineering attacks such as email phishing.
(hope this helps can i plz brainlist it will make my day :D hehe)
Use three or more sentences to explain to someone why they might need to use a virtual machine.
Answer:
Benefits of Virtualization
Reduced capital and operating costs.
Minimized or eliminated downtime.
Increased IT productivity, efficiency, agility and responsiveness.
Faster provisioning of applications and resources.
Greater business continuity and disaster recovery.
Simplified data center management.
Write a C console application that will be used to determine if rectangular packages can fit inside one of a set of spheres. Your program will prompt the user for the three dimensions that define a rectangular box; the length, the width, and the height. The interior diameter of a sphere is used to identify its size. Spheres are available in the following five sizes: 4- inch, 6-inch, 8-inch, 10-inch, and 12-inch. Your program will execute repeatedly until the user enters a value of zero for one or more of the rectangular box dimensions. After obtaining the dimensions of the rectangular box, your program will call a function named getSphereSize that determines if the box will fit inside one of the five spheres. The formula for calculating the diagonal of a rectangular box is:
Answer:
#include <cmath>
#include <iostream>
using namespace std;
int getSphereSize(double length, double breadth, double height) {
double diagonal = sqrt(length * length + breadth * breadth + height * height);
if (diagonal <= 4)
return 4;
if (diagonal <= 6)
return 6;
if (diagonal <= 8)
return 8;
if (diagonal <= 10)
return 10;
if (diagonal <= 12)
return 12;
return 0;
}
int main() {
double length, breadth, height;
int sphereCounts[5] = {0};
int sphereSize;
while (true) {
// Get dimensions of the box
cout << "Enter the dimensions of the box:\n";
cout << "Length: ";
cin >> length;
cout << "Breadth: ";
cin >> breadth;
cout << "Height: ";
cin >> height;
if (length <= 0 || breadth <= 0 || height <= 0)
break;
sphereSize = getSphereSize(length, breadth, height);
if (sphereSize == 0)
cout << "The box cannot fit in any of the spheres";
else
cout << "The box can fit in the " << sphereSize << "-inch sphere";
// Increment the counter
if (sphereSize == 4)
sphereCounts[0]++;
else if (sphereSize == 6)
sphereCounts[1]++;
else if (sphereSize == 8)
sphereCounts[2]++;
else if (sphereSize == 10)
sphereCounts[3]++;
else if (sphereSize == 12)
sphereCounts[4]++;
cout << "\n\n";
}
cout << "\nNumber of 4-inch spheres: " << sphereCounts[0];
cout << "\nNumber of 6-inch spheres: " << sphereCounts[1];
cout << "\nNumber of 8-inch spheres: " << sphereCounts[2];
cout << "\nNumber of 10-inch spheres: " << sphereCounts[3];
cout << "\nNumber of 12-inch spheres: " << sphereCounts[4];
cout << endl;
return 0;
}
Explanation:
The "cmath" library is included in the c++ program. The getSphereSize function is used to return the sphere size the rectangle dimension can fit into. It program continuously prompts the user for the length, breadth, and height of the rectangle and passes the values to the getSphereSize function in the while but breaks if any or all of the variable value is zero.
The sizes of the sphere objects in inches are collected in an array of five integer values of zeros and are incremented by one for every match with a rectangle.
A line graph is a great tool for showing changes over time. Why is a line graph better than other graphs at showing this type of data?
Answer:
Line graphs allow us to see overall trends such as an increase or decrease in data over time. Bar graphs are used to compare facts.
Which of the following are advantages of converting analog audio to digital audio? Choose all that apply
Reduction in editing time
Consistently accurate copies of audio recordings
Preservation
Susceptibility to computer viruses
Answer:
b and c
Explanation:
sorry if there wrong
Answer: A, B, and C
Explanation:
What is the correct order for writing the 3 dimensions for a 3D object? Here are the 3 dimensions:
Width
Height
Length
They need to be written in this format: ___________X___________X___________
Fill in the blanks.
for my sibling.
Answer:
Length x Width x Hight
Explanation:
What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
A. 0.067
B. 0.533
C. 8
D. 15
Answer:
8
Explanation:
Gear reduction = driven gear teeth / driving gear teeth
First stage reduction :
Driven gear teeth = 36
Driving gear teeth = 12
36 /12 = 3
Second stage reduction :
Driven gear teeth = 60
Driving gear teeth = 12
60 /12 = 5
First stage + second stage
3 + 5 = 8
What are the challenges of giving peer feedback in peer assessment
Answer:
There can some challenges when giving and receiving peer feedback in a peer assessment. Some people can be harsh in their assessments of your work. Some students cannot take that and because of that it can cause them to question a lot of their work. People can also be wrong when it comes to the assessment
which of these devices can not only manage traffic between local PCs in a network, but can also access outside networks?
network adapter
switch
router
repeater
Answer:
router
Explanation:
Pls awnser I will mark brainliest math
Answer:
2788 or 116
Explanation: