Please need help ASAP will mark brainliest
Answer:
x8 negakation with a false
Select the correct answer
What kind of approach should you follow to create a website a visually challenged person as well as a person with normal vision can use
with ease?
Answer:
Understand web standards and code using XHTML.
Explanation:
trust me
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
You find a picture of a famous department store online that would be great to include in a project of yours. What should you do before you copy the picture?
(I'm not a lawyer, I'm not your lawyer, and this isn't legal advice.)
You should ensure you have permission to use the image.
Most commonly, this will happen in one of two forms:
The image already has a free license allowing you to use it. (Generally, this will be a Creative Commons license.) Follow the terms specified and you should be all set!If the image isn't already licensed freely online, you'll need to ask the photographer or publisher for permission to use the image. In this case, a quick email is usually enough to get the ball rolling.In either case, you should generally have explicit permission from the person who created the picture for you to reuse and share it.
(There are some cases in which "fair use" will apply and you may not need permission from the copyright owner, but this varies on a case-by-case basis. I encourage you to do your research on that area if needed.)
What is the best way to deal with a spam
Simply ignoring and deleting spam is the best course of action. Avoid responding to or engaging with the spam communication because doing so can let the sender know that your contact information is still live and invite additional spam in the future. Additionally, it's critical to mark the email as spam using your email program or by reporting it to the relevant authorities. Make careful to report the spam to the proper authorities for investigation if it appears to be a phishing scheme or contains hazardous content.
4. What is the formula for calculating the file size?
Fill in the missing word in this program. class TooWide(Exception): pass answer = input('How wide is it? ') width = float(answer) try: if width > 30: raise TooWide else: print("Have a nice trip!") -------TooWide: print("Your luggage will not fit in the overhead bin.")
Answer:
Replace ______ with except
Explanation:
Your program is an illustration to try except in Python
When the Python interpreter sees a try statement, it expects a corresponding an except statement
So, the complete program is:
class TooWide(Exception): pass
answer = input('How wide is it? ')
width = float(answer)
try:
if width > 30:
raise TooWide
else:
print("Have a nice trip!")
except TooWide:
print("Your luggage will not fit in the overhead bin.")
Answer:
except
Explanation:
took test
You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
A. Buy the best software on the market.
B. Figure out who is the best public speaker.
O C. Look into file-sharing options so that everyone can work on the
same file at the same time.
OD. Ask if you have to give a slide presentation.
SUBMIT
Before giving a presentation as part of a sales group, it would be ideal to do option C. Look into file-sharing options so that everyone can work on the same file at the same time.
What is the presentation?Effective group presentations rely heavily on collaboration and coordination. Collaborative work on presentation files can be achieved by utilizing file-sharing features, such as shared drives or cloud-based platforms, enabling team members to work on the file concurrently.
By utilizing this feature, updates can be made instantly, contributions can be easily merged, and uniformity and coherence can be maintained throughout the presentation.
Learn more about presentation from
https://brainly.com/question/2998169
#SPJ1
Write the C Program in which the parent process will create the child process using the fork() system call. Following functionality be performed in the parent and child process. • In parent process you have to display your name, roll no and academic program at
University of Gujrat. • In the child process you have to execute the binary executable "pwd" by using execlp
system call to display the current working directory.
Using knowledge in C++ it is possible to write code that uses the parent process will create the child process using the fork() system call.
Writting in C++:#include<stdio.h>
#include <stdlib.h>
int cmpfunc(const void * a,
const void * b) { //function to return digit in asc order
return ( * (int * ) a - * (int * ) b);
}
int cmpfuncdesc(const void * a,
const void * b) { //function to return digit in desc order
return ( * (int * ) b - * (int * ) a);
}
int main() {
int n;
int result = 0;
int result1 = 0;
int rem;
int no;
int i = 1;
scanf("%d", & n);
if (fork() == 0) // Check for executing Child Process
{
while (result1 != n) {
result1 = result;
no = n;
int digits[4];
for (int i = 0; i < 3; i++) {
digits[i] = no % 10;
no = no / 10;
}
qsort(digits, 3, sizeof(int), cmpfunc); //Sorting in ascending order
int asc = 0;
for (int i = 0; i < 3; i++)
asc = asc * 10 + digits[i];
qsort(digits, 3, sizeof(int), cmpfuncdesc); //Sorting in Descending order
int desc = 0;
for (int i = 0; i < 3; i++)
desc = desc * 10 + digits[i];
result = abs(asc - desc);
printf("Child process %d: %dth %d\n", getppid(), i, result); //Printing the diff between max and min of number
n = result;
i++;
}
exit(0);
} else {
wait(NULL);
}
}
See more about C++ code at brainly.com/question/19705654
#SPJ1
public class Exercise_07 { public static void main(String[] args) { System.out.println(bin2Dec("1100100")); // Purposely throwing an exception... System.out.println(bin2Dec("lafkja")); } public static int bin2Dec(String binary) throws NumberFormatException { if (!isBinary(binary)) { throw new NumberFormatException(binary + " is not a binary number."); } int power = 0; int decimal = 0; for (int i = binary.length() - 1; i >= 0; i--) { if (binary.charAt(i) == '1') { decimal += Math.pow(2, power); } power++; } return decimal; } public static boolean isBinary(String binary) { for (char ch : binary.toCharArray()) { if (ch != '1' && ch != '0') return false; } return true; } }
Answer:
mhm
Explanation:mhm
solve this simple question 1) Let S = {a, bb, bab, abaab} be a set of strings. Are abbabaabab and baabbbabbaabb in S*? Does any word in S* have odd number of b’s?
Answer: a.
S = {aa ab ba bb}
This clearly shows that that every string that belongs to this language has an even length including 0 length.
This language can be depicted as following
S* = {∧ aa ab ba bb aaaa aaab aaba aabb bbaa . . .}
Regular Expression for this can be
RE = (aa+ab+ba+bb)*
So S* contains all the strings of a's and b's that have even length. This means all strings of even length.
Explanation:
b.
S* contains all possible strings of a's and b's that have length divisible by 3
This means some of the possible strings examples are:
aaa, bbb, aaabbb, aaaaaa, bbbbbb and so on.
Length divisible by 3 means the length of string such as aaa is 3 which is divisible by 3, also aaaaaa has length 6 which is divisible by 3
This should be something like this:
(( a + b ) ^3)*
For example a^3 = aaa which is divisible by 3
Regular expression can be:
RE of S* = (aaa + bbb)*
For example string bbbbbbbbb has length 9 which is divisible by 3
So the language is
S* = { ∧ aaa bbb aaabbb aaaaaa aaaaaabbb...}
Explanation:
How to overcome software quality dilemma
Explanation:
anytime software and business come together there is an inherent conflict between get it done fast and do a good job
A shot made while running is a ____________.
Answer:
A shot made while running is called a layup.
Zuzana is creating a report for her supervisor about the cost savings associated with cloud computing. Which of the following would she NOT include on her report on the cost savings?
a. Reduction in broadband costs
b. Resiliency
c. Scalability
d. Pay-per-use
In this question, the answer is "Resiliency".
It is crucial because it gives people the strength to deal with and overcome difficulties.These people lack resilience and can readily overcome dysfunctional techniques of control. Robust people draw on their strengths and processes to solve difficulties and deal with problems.In contrast, scalability increases cost savings with alternatives such as vertical and horizontal scaling. Costs saved also include reducing the cost of broadband and pay peruse.Therefore, the answer is "Resiliency" because it involves services which is the cost of the money.
Learn more:
brainly.com/question/9082230
Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, and distribute his work, but he would still like to retain his copyright on the content. What type of license should he u for his book?
Answer:
The correct answer will be "Project Gutenberg".
Explanation:
Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.So that the above is the right answer.
Using a for loop, write a function lastfirst() that takes a list of strings as a parameter. Each string in the list has the format 'Last, First' where Last is a last name and First is a first name. You should assume that there are no spaces between the last name and the comma and that there are an arbitrary number of spaces between the comma and the first name. The function lastfirst() returns a list containing two sub lists. The first sub list is a list of all the first names and the second sub list is a list of all the last names. The following shows how the function would be called on two example parameters:>>> lastfirst(['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])[['Evelyn', 'Tom', 'Elvis', 'Gordon'], ['Lulis', 'Jones', 'Presley', 'Sumner']]>>> lastfirst(['Ford, Harrison', 'Hepburn, Katharine', 'Tracy, Spencer'])[['Harrison', 'Katharine', 'Spencer'], ['Ford', 'Hepburn', 'Tracy']]
def lastfirst(lst):
newlst = []
newlst1=[]
for x in lst:
w = x.split(",")
newlst.append(w[1].strip())
newlst1.append(w[0].strip())
newlst2 = [newlst], [newlst1]
return newlst2
lst1 = (['Lulis, Evelyn', 'Jones, Tom', 'Presley, Elvis', 'Sumner, Gordon'])
print(lastfirst(lst1))
I hope this helps!
Drag each tile to the correct box.
Mike is writing an essay using Microsoft Word on a Windows computer. Match each keyboard shortcut that he can use with its purpose.
Ctrl + X
F1
Purpose
pastes text saved in memory
runs the spelling and grammar check
opens the Help menu
cuts selected text
Ctrl + V
F7
Keyboard Shortcut
The correct matching of the tiles to their correct boxes is given below:
Ctrl + X
cuts selected text
runs the spelling and grammar check
F7
opens the Help menu
F1
Ctrl + V
pastes text saved in memory
What is Word Processing?This refers to the device or program that is used to input data or information, make edits, process and format them, and then provide output to the finished product.
Hence, we can see that from the given question, it is clearly stated that Mike is writing an essay using Microsoft Word on a Windows computer and he needs to use the keyboard shortcuts.
With this in mind, the word processor he is using is known as MS Word or Microsoft Word and it has some keyboard shortcuts that can help Mike write, edit and format his essay so it would be in the right and proper way for him to output.
Read more about word processing here:
https://brainly.com/question/1596648
#SPJ1
HURRY GANG 100points!!!! How can you determine which hardware brands and models are the most reliable?
O read the information on the device's packaging
O find out how many of them are being sold per year
O read the manufacturer's website
O find customer reviews online
Answer: A, read the information on the device's packaging
Explanation:
The info in the packaging has to be accurate because it goes through tests and they cannot make up info on there. This means any info about the materials used is accurate.
Answer:
A. read the information on the device's packaging
Explanation:
Any information that's on packaging is made separately from the product manufacturers and needed to be checked and correct. If there is anything out of the ordinary on the device's packaging, then it is a good way to tell it's reliableness.
___________ is a global issue and there is a requirement to find out the interdependencies among the customers and suppliers.
Answer:
Supply chain disruption is a global issue and there is a requirement to find out the interdependencies among the customers and suppliers.
Explanation:
The context suggests we are discussing some type of challenge involving the relationships between customers, suppliers and a larger supply chain. A "global issue" involving "interdependencies among the customers and suppliers" points to potential supply chain disruption or issues in a supply network.
Since there is a "requirement to find out the interdependencies" between customers and suppliers, this suggests we need to identify and analyze how they are connected and dependent upon each other in order to resolve the broader "global issue." This information could then be used to make changes, build resilience or manage risks in the supply chain.
Hope this helps!
Answer:
Internet is global issues
The geographic coordinate system is used to represent any location on Earth as a combination of latitude and longitude values. These values are angles that can be written in the decimal degrees (DD) form or the degree, minutes, seconds (DMS) form just like time. For example, 24.5° is equivalent to 24°30'00''. Write a MATLAB script that will prompt the user for an angle in DD form and will print in sentence format the same angle in DMS form. The script should error-check for invalid user input. The angle conversion is to be done by calling a separate function in the script.
Answer:
Here is the script:
function dd = functionDMS(dd)
prompt= 'Enter angle in DD form ';
dd = input(prompt)
while (~checknum(dd))
if ~checknum(dd)
error('Enter valid input ');
end
dd = input(prompt)
end
degrees = int(dd)
minutes = int(dd - degrees)
seconds = ( dd - degrees - minutes / 60 ) * 3600
print degrees
print minutes
print seconds
print dd
Explanation:
The script prompts the user to enter an angle in decimal degree (DD) form. Next it stores that input in dd. The while loop condition checks that input is in valid form. If the input is not valid then it displays the message: Enter valid input. If the input is valid then the program converts the input dd into degrees, minutes and seconds form. In order to compute degrees the whole number part of input value dd is used. In order to compute the minutes, the value of degrees is subtracted from value of dd. The other way is to multiply remaining decimal by 60 and then use whole number part of the answer as minutes. In order to compute seconds subtract dd , degrees and minutes values and divide the answer by 60 and multiply the entire result with 3600. At the end the values of degrees minutes and seconds are printed. In MATLAB there is also a function used to convert decimal degrees to degrees minutes and seconds representation. This function is degrees2dms.
Another method to convert dd into dms is:
data = "Enter value of dd"
dd = input(data)
degrees = fix(dd);
minutes = dd - degrees;
seconds = (dd-degrees-minutes/60) *3600;
Complete the code to generate a pseudo-random integer between 1 and 44, including the possibility of both 1 and
44.
>>> import secrets
>>> secret
Answer:
Explanation:
.randbelow(44) + 1
The code above uses the secrets module, which is a part of the Python standard library and uses a cryptographically strong random number generator. The randbelow() function generates a random integer below the number given as an argument. In this case, the argument is 44, which means that the function will generate a random integer between 0 and 43. To get a random integer between 1 and 44, we add 1 to the result of the function.
Please help me I don’t know what I’m doing wrong.
Answer:
Explanation:
I noticed the \n, \n will cause the new line break, delete it.
try code below:
System.out.println(" " + " " + "NO PARKING");
System.out.println("2:00 - 6:00 a.m.");
Which of the following is a field whose value uniquely identifies each record in a
table?
Main key
Value key
Primary key
Element key
A field whose value uniquely identifies each record in a table is called: C. Primary key.
What is DBMS?DBMS is an acronym for database management system and it can be defined as a collection of software applications that enables computer users to create, store, modify, retrieve and manage data or information in a relational database.
This ultimately implies that, DBMS allow end users to efficiently store, retrieve and manage their data with an appropriate level of security.
In database management system (DBMS), a primary key is a field whose value uniquely identifies each record in a table or relational database.
Read more on primary key here: https://brainly.com/question/8131854
1. name of industry credential available to students taking this class
2. two reasons for acquiring the industry credential
Answer:
Explanation:
I need points to ask questions
53. A correct definition of Computer is_____
a. All of the options
b. Computer is a machine or device that can be programmed to perform arithmetical or logic operation sequences automatically
c. Computer understands only binary language which is written in the form of Os &, 1s
d. Computer is a programmable electronic device that stores, retrieves, and processes the data
Answer:
D
Explanation:
d. Computer is a programmable electronic device that stores, retrieves, and processes the data.
The primary purpose of a use case diagram is
Select one:
a. to uncover additional details such as attributes and methods of a class
b. to show the users interaction with the system
c. model the interaction between the system and its environment
The primary purpose of a use case diagram is to model the interaction between the system and its environment. Use case diagrams depict the functionality of a system from the user's perspective, focusing on the system's behavior as it responds to requests from the users or other external actors. They show the different use cases or scenarios that users can perform with the system and the actors that participate in these interactions. Use case diagrams are often used in requirements analysis and software design to help clarify and communicate the system's purpose and behavior. Option (c) correctly explains the primary purpose of a use case diagram.
Answer:
b. to show the users interaction with the system
Explanation:
A use case diagram is a type of UML diagram that shows the interactions between a system and the actors that use it. It is used to model the behavior of a system from the perspective of the users. A use case diagram does not show the internal details of the system, but only the interactions between the system and the actors.
The other options are incorrect.
Option a is incorrect because a use case diagram does not show the attributes and methods of a class. Option c is incorrect because a use case diagram does not model the interaction between the system and its environment.Describe how the data life cycle differs from data analysis
The data life cycle and data analysis are two distinct phases within the broader context of data management and utilization.
The data life cycle refers to the various stages that data goes through, from its initial creation or acquisition to its eventual retirement or disposal. It encompasses the entire lifespan of data within an organization or system.
The data life cycle typically includes stages such as data collection, data storage, data processing, data integration, data transformation, data quality assurance, data sharing, and data archiving.
The primary focus of the data life cycle is on managing data effectively, ensuring its integrity, availability, and usability throughout its lifespan.
On the other hand, data analysis is a specific phase within the data life cycle that involves the examination, exploration, and interpretation of data to gain insights, make informed decisions, and extract meaningful information.
Data analysis involves applying various statistical, mathematical, and analytical techniques to uncover patterns, trends, correlations, and relationships within the data.
It often includes tasks such as data cleaning, data exploration, data modeling, data visualization, and drawing conclusions or making predictions based on the analyzed data.
The primary objective of data analysis is to derive actionable insights and support decision-making processes.
In summary, the data life cycle encompasses all stages of data management, including collection, storage, processing, and sharing, while data analysis specifically focuses on extracting insights and making sense of the data through analytical techniques.
Data analysis is just one component of the broader data life cycle, which involves additional stages related to data management, governance, and utilization.
To know more about life cycle refer here
https://brainly.com/question/14804328#
#SPJ11
How many times will this loop be executed?
x = 5
while x < 10:
x = x + 3
print(x)
Responses
10
2
6
4
Answer:
well
Explanation:
couldnt be 10 as x is less than it
but i belivee u mean
x=X+3 so
2
A microchip in a smart card stores the same data as the _____ on a payment card.
Answer: magnetic stripe
Explanation:
Which of the following is an example of the rewards & consequences characteristic of an organization?
OOO
pay raise
time sheets
pay check
pay scale
Answer:
Pay raise is an example of the rewards & consequences characteristic of an organization.