Answer:
I think it is computer virus I don't surly know
Write a python function that takes an array of integers and multiplies each one by 3.
def multiply(array):
return [x * 3 for x in array]
Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command
Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.
Writting the code:Database: employee
Owner: SYSDBA
PAGE_SIZE 4096
Number of DB pages allocated = 270
Sweep interval = 20000
Forced Writes are ON
Transaction - oldest = 190
Transaction - oldest active = 191
Transaction - oldest snapshot = 191
Transaction - Next = 211
ODS = 11.2
Default Character set: NONE
Database: employee
Owner: SYSDBA
PAGE_SIZE 4096
...
Default Character set: NONE
See more about SQL at brainly.com/question/19705654
#SPJ1
Question 4
Fill in the blank to complete the “increments” function. This function should use a list comprehension to create a list of numbers incremented by 2 (n+2). The function receives two variables and should return a list of incremented consecutive numbers between “start” and “end” inclusively (meaning the range should include both the “start” and “end” values). Complete the list comprehension in this function so that input like “squares(2, 3)” will produce the output “[4, 5]”.
The increment function will be written thus:
ef increments(start, end):
return [num + 2 for num in range(start, end + 1)]
print(increments(2, 3)) # Should print [4, 5]
print(increments(1, 5)) # Should print [3, 4, 5, 6, 7]
print(increments(0, 10)) # Should print [2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12]
How to explain the functionThe increments function takes two arguments, start and end, which represent the inclusive range of numbers to be incremented.
The goal is to create a list of numbers incremented by 2 (n+2) using a list comprehension.
Learn more about functions on
https://brainly.com/question/10439235
#SPJ1
Take a number N as input and output the sum of all numbers from 1 to N (including N).
Answer:
Incluint respuet
Explanation:
espero que te sirva
Need help with this python question I’m stuck
It should be noted that the program based on the information is given below
How to depict the programdef classify_interstate_highway(highway_number):
"""Classifies an interstate highway as primary or auxiliary, and if auxiliary, indicates what primary highway it serves. Also indicates if the (primary) highway runs north/south or east/west.
Args:
highway_number: The number of the interstate highway.
Returns:
A tuple of three elements:
* The type of the highway ('primary' or 'auxiliary').
* If the highway is auxiliary, the number of the primary highway it serves.
* The direction of travel of the primary highway ('north/south' or 'east/west').
Raises:
ValueError: If the highway number is not a valid interstate highway number.
"""
if not isinstance(highway_number, int):
raise ValueError('highway_number must be an integer')
if highway_number < 1 or highway_number > 999:
raise ValueError('highway_number must be between 1 and 999')
if highway_number < 100:
type_ = 'primary'
direction = 'north/south' if highway_number % 2 == 1 else 'east/west'
else:
type_ = 'auxiliary'
primary_number = highway_number % 100
direction = 'north/south' if primary_number % 2 == 1 else 'east/west'
return type_, primary_number, direction
def main():
highway_number = input('Enter an interstate highway number: ')
type_, primary_number, direction = classify_interstate_highway(highway_number)
print('I-{} is {}'.format(highway_number, type_))
if type_ == 'auxiliary':
print('It serves I-{}'.format(primary_number))
print('It runs {}'.format(direction))
if __name__ == '__main__':
main()
Learn more about program on
https://brainly.com/question/26642771
#SPJ1
Which sentence has correct parallel structure?
О А. The software allows users to create new documents, copying files from other sources, and saving new changes.
Users need a laptop, internet connection, and need an appropriate document editor.
SO B.
O C.
To install the application, connect the flash drive, run the setup, and restart the system.
OD.
The application bundle contains a DVD, the flash drive, and instruction manual.
The sentence that has parallel structure is "To install the application, connect the flash drive, run the setup, and restart the system." (opiton C)
What is parallel structure?The repeating of a certain grammatical form inside a phrase is known as parallel structure (also known as parallelism). A parallel construction is created by making each comparable object or notion in your phrase follow the same grammatical pattern.
Consider this example: "I forgave you when you lost my cat, when you left me at the airport, and when you threw out my favorite stuffed animal." The parallel structure is the recurrent usage of I forgave you when you.
Hence, option C is correct.
Learn more about parallel structure:
https://brainly.com/question/8055410
#SPJ1
e Highlight
fogy
ст)
4 uses of information
communication technology in the health sector
Answer: See explanation
Explanation:
The uses of information
communication technology in the health sector include:
• Improvement in the safety of patients through direct access to case story.
• Keeping track of the progress of the patient.
• Checking of the treatments for a disease it illness online.
• It's also vital for the electronic storage of the medical data.
You are working with a client who wants customers to be able to tap an image and see pricing and availability. As you are building the code in Java, what will you be using?
graphical user interface
icon public use
graphical public use
icon user interface
Answer:
A. Graphical user interface
Explanation:
In Java the graphical user interface is what manages interaction with images.
Answer: A.)
Explanation:
The answer is A because
I was born to rule the world
And I almost achieved that goal
(Giovanni!)
But my Pokémon, the mighty Mewtwo,
Had more power than I could control
(Giovanni!)
Still he inspired this mechanical marvel,
Which learns and returns each attack
(Giovanni!)
My MechaMew2, the ultimate weapon,
Will tell them Giovanni is back!
There'll be world domination,
Complete obliteration
Of all who now defy me.
Let the universe prepare,
Good Pokémon beware,
You fools shall not deny me!
Now go, go, go, go!
It will all be mine,
Power so divine
I'll tell the sun to shine
On only me!
It will all be mine,
Till the end of time
When this perfect crime
Makes history
Team Rocket! This is our destiny!
Listen up, you scheming fools,
No excuses, and no more lies.
(Giovanni!)
You've heard my most ingenious plan,
I demand the ultimate prize
(Giovanni!)
Now bring me the yellow Pokémon
And bear witness as I speak
(Giovanni!)
I shall possess the awesome power
In Pikachu's rosy cheeks!
There'll be world domination,
Complete obliteration
Of all who now defy me.
Let the universe prepare,
Good Pokémon beware,
You fools shall not deny me!
Now go, go, go, go!
It will all be mine,
Power so divine
I'll tell the sun to shine
On only me!
It will all be mine,
Till the end of time
When this perfect crime
Makes history
Team Rocket! This is our destiny!
To protect the world from devastation
To unite all peoples within our nation
To denounce the evils of truth and love
To extend our reach to the stars above
Jessie!
James!
There'll be total devastation,
Pure annihilation
Or absolute surrender.
I'll have limitless power,
This is our finest hour
Now go, go, go, go!
true or false you can create a. network with 2 computers?
Explanation:
true true jsjsdkdkskdkdksksksksk
Answer:
True :)
Explanation:
narrative report in computer system servicing
Computer servicing is the process of maintaining and repairing computers and computer peripherals. It can involve anything from malware removal and software updates to hardware repairs and troubleshooting. Servicing is often performed by IT professionals.
Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks?
Which type of metal will rust - ferrous or non-ferrous?
Explanation:
Ferrous metals contain IRON ... which will rust (form Iron oxide)
type two statements. the first reads user input into person name. the second reads user input into person age. use the int() function to convert person age into an integer. below is a sample output for the given program if the user's input is: amy 4
The code in which the first reads user input into person name and the second reads user input into person age is in the explanation part.
What is coding?We connect with computers through coding, often known as computer programming.
Coding is similar to writing a set of instructions because it instructs a machine what to do. You can instruct computers what to do or how to behave much more quickly by learning to write code.
The statement can be like::
person_name = input()
person_age = int(input())
print('In 5 years,', person_name,'will be',(5+person_age))
Thus, this can be the code for the given scenario.
For more details regarding programming, visit:
https://brainly.com/question/11023419
#SPJ1
A fileless malicious software can replicate between processes in memory on a local host or over network shares. What other behaviors and techniques would classify malware as fileless rather than a normal virus? (Select all that apply.
Malware that is fileless as opposed to a typical virus would exhibit the behaviors and methods listed below. uses thin shell code and low-observability attack methods
What type of malware replicates over a network?Worms. Worms, one of the most popular forms of malware, spread across computer networks by taking advantage of flaws in the operating system. A worm is a standalone application that copies itself to infect further computers without any human intervention.Worms are computer programs that can copy themselves from one system to another without using a host file. The spread of a host file that is infected by a virus is necessary for its infection. A self-replicating program is referred to as a worm. Without a host program, it is self-contained. Without any assistance from the user, the application makes the copy and makes it run. For the purpose of spreading to other computer systems, worms frequently use network services.To learn more about worm refer to :
https://brainly.com/question/23463888
#SPJ1
You are tasked with designing the following 3bit counter using D flip flops. If the current state is represented as A B C, what are the simplified equations for each of the next state representations shown as AP BP CP?
The number sequence is : 0 - 1 - 2 - 4 - 3 - 5 - 7 - 6 - 0
In the given 3-bit counter, the next state of A, B, and C (represented as A', B', and C') depends on the current state ABC.
The sequence is 0-1-2-4-3-5-7-6 (in binary: 000, 001, 010, 100, 011, 101, 111, 110).
The simplified next state equations for D flip-flops are:
A' = A ⊕ B ⊕ C
B' = A · B ⊕ A · C ⊕ B · C
C' = A · B · C
This counter follows the mentioned sequence and recycles back to 0 after reaching the state 6 (110). These equations can be implemented using XOR and AND gates connected to D flip-flops.
Read more about XOR and AND gates here:
https://brainly.com/question/30890234
#SPJ1
which of the following is a personal benifit of earning a college degree?
A) you have more friends
B) you are more likely to exercise
C) you are more likely to vote for the right candidate.
D) you have a longer life expectancy
Answer:
you have a longer life expectancy
Explanation:
Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.
Answer:
A better RPG game all the one that are existing are the same dull thing
Explanation:
Answer:
There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.
Which of these ports listed is the fastest? IEEE 1394 USB2.0 FIREWIRE ESATA
The port which is the fastest is ESATA.
What is ESATA?eSATA can be described as the SATA connector which can be access from outside the computer and it help to give the necessary signal connection that is needed for external storage devices.
The eSATA serves as a version of the eSATA port which is been regarded as the External SATA port, therefore, The port which is the fastest is ESATA.
Read more on the port here:
https://brainly.com/question/16397886
#SPJ1
Are AWS Cloud Consulting Services Worth The Investment?
AWS consulting services can help you with everything from developing a cloud migration strategy to optimizing your use of AWS once you're up and running.
And because AWS is constantly innovating, these services can help you keep up with the latest changes and ensure that you're getting the most out of your investment.
AWS consulting services let your business journey into the cloud seamlessly with certified AWS consultants. With decades worth of experience in designing and implementing robust solutions, they can help you define your needs while executing on them with expert execution from start to finish! AWS Cloud Implementation Strategy.
The goal of AWS consulting is to assist in planning AWS migration, design and aid in the implementation of AWS-based apps, as well as to avoid redundant cloud development and tenancy costs. Project feasibility assessment backed with the reports on anticipated Total Cost of Ownership and Return on Investment.
Learn more about AWS consulting, here:https://brainly.com/question/29708909
#SPJ1
TO EXIT WORD YOU CLICK WHAT
Answer:
To exit Word, you can click on the "File" menu and then click "Exit" or "Close".
Write a statement that takes a variable named file_object that contains a file object and reads its contents into a Python list of lines. Store the resulting list into a variable named file_contents.Write a statement that takes a variable named file_object that contains a file object and reads its contents into a Python list of lines. Store the resulting list into a variable named file_contents.
Answer:
Answered below
Explanation:
#file is first opened and saved into file_object variable.
file_object = open('new_file.txt', 'r')
file_contents = file_object.readlines()
#the readlines() reads the contents of the file, line by line and returns a list of lines. Therefore, file_contents contains a list of lines read from file object and can be iterated over to get each line.
12.2 question 3 please help
Instructions
Write a method swap_values that has three parameters: dcn, key1, and key2. The method should take the value in the dictionary dcn stored with a key of key1 and swap it with the value stored with a key of key2. For example, the following call to the method
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
swap_values(positions, "C", "PF")
should change the dictionary positions so it is now the following:
{'C': 'Jiang', 'PF': 'Anja', 'SF': 'Micah', 'PG': 'Devi', 'SG': 'Maria'}
Answer:
def swap_values(dcn, key1, key2):
temp = dcn[key1] # store the value of key1 temporarily
dcn[key1] = dcn[key2] # set the value of key1 to the value of key2
dcn[key2] = temp # set the value of key2 to the temporary value
positions = {"C": "Anja", "PF": "Jiang", "SF": "Micah", "PG": "Devi", "SG": "Maria"}
print("Initial dictionary: ")
print(positions)
swap_values(positions, "C", "PF")
print("Modified dictionary: ")
print(positions)
Explanation:
The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least
The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least 65 percent transfer efficiency.
What is the transfer efficiency
EPA lacks transfer efficiency requirement for auto refinishing spray guns. The EPA regulates auto refinishing emissions and impact with rules. NESHAP regulates paint stripping and coating operations for air pollutants.
This rule limits VOCs and HAPs emissions in automotive refinishing. When it comes to reducing overspray and minimizing wasted paint or coating material, transfer efficiency is crucial. "More efficiency, less waste with higher transfer rate."
Learn more about transfer efficiency from
https://brainly.com/question/29355652
#SPJ1
1. Railroad tracks present no problems for a motorcyclist.
A. O TRUE
B. O FALSE
2. Which of the following is considered to be a vulnerable road user?
A. Bicyclists
B. Motorcyclists
C. Pedestrians
D. all of the above
Answer: 1 is A
2 is D
Explanation:
Three friends decide to rent an apartment and split the cost evenly. They each paid $640 towards the total move in cost of first and last month's rent and a security deposit. If rent is $650 per month, how much was the security deposit?
a.
$10
b.
$207
c.
$620
d.
$1,270
Please select the best answer from the choices provided
Answer:
c. $620
Explanation:
To find the cost of the security deposit, we need to subtract the amount paid towards the first and last month's rent from the total move-in cost.
Each friend paid $640 towards the total move-in cost, which includes the first and last month's rent and the security deposit. Since they split the cost evenly, the total move-in cost is 3 times $640, which is $1920.
The monthly rent is $650 per month, so the first and last month's rent combined is 2 times $650, which is $1300.
To find the security deposit, we subtract the first and last month's rent from the total move-in cost:
Security deposit = Total move-in cost - First and last month's rent
Security deposit = $1920 - $1300
Security deposit = $620
Therefore, the security deposit was $620.
Option c. $620 is the correct answer.
Anyone know how to do this?
Answer:
bro it is simple click on text and click between the lines and u can write easily.
hope u mark me brainliest thank u ♡♡♡
yea you basically fill it in with the information that will be provided on another page
hope this helps : )
brainliest plz
Which of the following tasks are commonly performed in Restaurant and Food/Beverage Services jobs? Check all that apply.
Greeting customers
Handling luggage
Planning menus
Cooking food
Mixing drinks
Handling customer payments
Planning travel
Organizing fun activities
Answer:
a,c,d,e,f
Explanation:
Answer:
a,c,d,e,f
Explanation:
one edge
Project: Current Event: Cyber Bullying
Using the Internet, your local paper, or other resources, find a recent article on cyber bullying
(published in the last two years). Write an article review that includes:
1. a description of the article (was it a case of cyber bullying or ways to prevent cyber bulling?);
2. list five key points and describe how they apply to you and your use of social media;
3. make a suggestion of two important things that you think the article should have, but did not
cover; and
4. include the URL to the article or a copy of the article.
Sending, posting, or disseminating unfavorable, hurtful, or malicious content about someone else is considered cyberbullying. It can also involve disclosing sensitive or private information about another individual in a way that causes embarrassment or humiliation.
What are the research paper's impacts on cyberbullying?The current study contributes to the expanding corpus of research on the effects of being a victim of cyberbullying on depressive symptoms and bad thoughts in adolescents and young adults. According to our research, those who experience cyberbullying are more likely to have sadness and bad thoughts. Cyberbullying occasionally veers into illegal or criminal action.
Teenagers who experience cyberbullying report more severe bodily symptoms, anxiety, loneliness, and depression symptoms. Cyberbullying perpetrators are more likely to admit to abusing drugs, acting aggressively, and engaging in delinquent behavior.
To know more about the Cyber Bullying visit;
https://brainly.com/question/1460915
#SPJ1
Write a program in python that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.
Ex: If the input is:
6
the output is:
110
The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.
def int_to_reverse_binary(integer_value)
def string_reverse(input_string)
1:Compare output
2 / 2
Input
6
Your output
110
2:Unit test
0 / 2
Convert 19 to binary using int_to_reverse_binary() and string_reverse()
Your output
10011
Test feedback
string_reverse(user_input) did not return a value.
Your function may be missing a return statement.
3:Unit test
0 / 3
Convert 255 to binary using int_to_reverse_binary() and string_reverse()
Your output
11111111
Test feedback
string_reverse(user_input) did not return a value.
Your function may be missing a return statement.
def int_to_reverse_binary(int_number):
# print('i', int_number)
a = []
while int_number > 0:
a.append(int_number % 2)
int_number = int_number // 2
# print('a', a)
return a
def string_reverse(input_string):
print(''.join([str(i) for i in input_string])[::-1])
if __name__ == '__main__':
x = int(input())
# a = int_to_reverse_binary(x)
string_reverse(int_to_reverse_binary(x))
Answer: def int_to_reverse_binary(int_number):
a = []
while int_number > 0:
a.append(int_number % 2)
int_number = int_number // 2
return a
def string_reverse(input_string):
return ''.join([str(i) for i in input_string])[::-1]
if __name__ == '__main__':
x = int(input())
print(string_reverse(int_to_reverse_binary(x)))
Explanation:
The program in python that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary is in the explanation part.
What is python?Python is a general-purpose, high-level programming language. Its design philosophy prioritises code readability by employing significant indentation.
Here's the program in Python:
def decimal_to_binary(n):
binary_string = ""
while n > 0:
binary_string += str(n % 2)
n = n // 2
return binary_string[::-1]
# test the function
print(decimal_to_binary(13)) # output: "1101"
Thus, in this program, the decimal_to_binary function takes a positive integer n as input and returns a string of 1's and 0's representing n in binary.
For more details regarding python, visit:
https://brainly.com/question/30427047
#SPJ1
Current Tetra Shillings user accounts are management from the company's on-premises Active Directory. Tetra Shillings employees sign-in into the company network using their Active Directory username and password.
Employees log into the corporate network using their Active Directory login credentials, which are maintained by Tetra Shillings' on-premises Active Directory.
Which collection of Azure Active Directory features allows businesses to secure and manage any external user, including clients and partners?Customers, partners, and other external users can all be secured and managed by enterprises using a set of tools called external identities. External Identities expands on B2B collaboration by giving you new options to communicate and collaborate with users outside of your company.
What are the three activities that Azure Active Directory Azure AD identity protection can be used for?Three crucial duties are made possible for businesses by identity protection: Automate the identification and elimination of threats based on identity. Use the portal's data to research dangers.
To know more about network visit:-
https://brainly.com/question/14276789
#SPJ1