What are the Edhesive 3.4 lesson practice answers

Answers

Answer 1

Answer:

import time

# Input yellow #

yellow = input("Enter yellow: ")

# If yellow #

if yellow == "yellow":

print("Correct")

else:

print("Nope")

Explanation:


Related Questions

24/3*2^2/2*3+(20-10)-40

Answers

Answer:

34

Explanation:

You use pemdas

important of microcomputer in some point​

Answers

Answer:

A microcomputer uses memory to store the programs that control its operation, to store data waiting for processing, and to store the results of operations performed by the CPU. Primary memory, or storage, is electronic memory that is directly addressable by the CPU.

Explanation:

brainliest plzzzzzzz

In the workplace, microcomputers have been used for applications including data and word processing, electronic spreadsheets, professional presentation and graphics programs, communications and database management systems.

You are a network technician for a small corporate network. The network is connected to the internet and uses DHCP for address assignment. The owner of the company in the executive office and a temporary employee in IT Administrator office both report that their workstations can communicate with some computers on the network, but cannot communicate with the internet. You need to diagnose and fix the problem.

In this lab, your task is to complete the following:

-Use the following troubleshooting tools to diagnose the problem in the network:
-the ping, ipconfig, or tracert command utility
-the network and sharing center in the windows 10 or windows server 2016 operating system
-the DHCP server console in the windows server 2016 operating system

Answers

Answer:

Explanation:

The first thing that you should do would be to ping the computer in the Networking Closet, if this fails then the next step would be to ping the service provider. If both of these pings fail it is most likely because the configuration of the IP addresses are configured wrong. In this case use the command prompt to type in the following

ipconfig /all

this will open up the entire configuration info. If the problem is truly the configuration then your DNS address should show up as not configured. This can happen when a DHCP is enabled. Check if DHCP is enabled, if so then you would need to type the following into the command prompt

ipconfig /renew

This will renew the ip address information from the DHCP server and should create the proper DNS configuration as well and solve the issue.

Following are the solution to the given question:

Initiate troubleshooting in the Executive by exploring the scope of the connectivity issue. Ping the laptop in the network closet from your workstation. A ping to a location failed.Ping your internet service provider. The ping to the address fails.Verify any connection issues here between workstations, the Network Closet computer, and also the ISP in the IT Administrator's office. (Pings to both locations failed.) The issue is now almost definitely due to the channel's IP setup.To examine the Local Area Connection setup, open the cmd in the Executive Office and type ipconfig /all. Some of the following issues must be noted: The workstation's default route and DNS server addresses have still not been configured.It implies that connectivity is confined to computers just on the local network.Its DHCP Enabled option has been enabled. Yes, a DHCP server is configured just on the workstation. Its line with the DHCP Server address wasn't shown. This means the workstation was unable to communicate with the DHCP server. This IP address corresponds to an APIPA domain (169.254.0.1 to 169.254.255.254). It shows that the computer assigns an IP address to it only. The workstation would be capable of communicating with the other hosts on the local network who have given their unique IP via APIPA.Verify that its DHCP service for the local area network is active and active in the Network Closet.CORPSERVER should be the first option in Hyper-V Manager. To see all the virtual machines, open the window. Join by correcting CorpDHCP (maximize the window for easier viewing if desired). For launch, the DHCP console in Server Manager, go to Tools > DHCP. CorpDHCP.CorpNet.com must be extended. IPv4 enlargement.Scope [192.168.0.1] Subnet1 has a dropdown, suggesting that this is not operational. Select Activate from the menu bar of Scope [192.168.0.1] Subnet1. The scope's "dislike" button has gone, and the DHCP service for the local network is now operational.Launch the command prompt inside the Executive and type ipconfig /renew. This will obtain the new Ip from the DHCP server and change the Ethernet connection settings.To check the Internet setup, type ipconfig /all. You should now see lines for the default gateway, DNS server, and DHCP server, and a new IP address in the DHCP scope for the local network.Ping the ISP in the Executive Office to confirm that the problem has been resolved. Your ping to the ISP is good.Rep step 6 in the IT Administrator Office to fix the dispute with the workstations.

Learn more:

brainly.com/question/14728944

Leukemia is cancer of the body's blood-forming tissues, including the bone marrow and the lymphatic
system. Many types of leukemia exist. Some forms of leukemia are more common in children. Other forms
of leukemia occur mostly in adults. The first type of classification is by how fast the leukemia progresses:
Acute leukemia. In acute leukemia, the abnormal blood cells are immature blood cells (blasts). They can't
carry out their normal functions, and they multiply rapidly, so the disease worsens quickly. Acute leukemia
requires aggressive, timely treatment. . You should take input using GUI and scanner based at own choice.
You should display the result of this program using scanner. In the Chronic leukemia, There are many
types of chronic leukemia’s. Some produce too many cells and some cause too few cells to be produced.
Chronic leukemia involves more mature blood cells. These blood cells replicate or accumulate more slowly
and can function normally for a period of time. Some forms of chronic leukemia initially produce no early
symptoms and can go unnoticed or undiagnosed for years. Design a program that covers these Java
Topics: Multi-D Arrays, Inheritance, Exception Handling, Multi-Threding, File Handling, Collections and
Keywords like final, static, finalize, super, this, throw and throws. The second type of classification is by
type of white blood cell affected: Lymphocytic leukemia. This type of leukemia affects the lymphoid cells
(lymphocytes), which form lymphoid or lymphatic tissue. Lymphatic tissue makes up your immune system.
Myelogenous (my-uh-LOHJ-uh-nus) leukemia. This type of leukemia affects the myeloid cells. Myeloid
cells give rise to red blood cells, white blood cells and platelet-producing cells.

Answers

Leukemia is cancer of the body's blood-forming tissues, including the bone marrow and the lymphatic system.

Many types of leukemia exist. Some forms of leukemia are more common in children. Other forms of leukemia occur mostly in adults.

Leukemia usually involves the white blood cells. Your white blood cells are potent infection fighters — they normally grow and divide in an orderly way, as your body needs them. But in people with leukemia, the bone marrow produces abnormal white blood cells, which don't function properly.
What is your question

Plz answer this question for me quick for a Brainly

Answers

which bird is the symbol of peace ?

dove

Question # 5

Regulatory laws

Are based on customs

Are issued by agencies of the government

Have passed through the legislature

Are common laws

Answers

Answer:

Regulatory laws  is described below in detailed explanation.

Explanation:

Regulatory law introduced to the law published by an executive department agency under a commission from a government. ... The law that commands the conduct of regulatory agencies (both promulgation of commands, and adjudication of requests or disputes), and judicial evaluation of agency judgments, is called administrative law.

I can’t get answers because the ads won’t load help me

Answers

Answer: Get better wifi

Explanation: This maybe a router problem, Go to your router and reset it by unplugging the power chord, After 30 seconds plug it back in and wait for your wifi to start back up. Your ads should load now. Have a good day.

Which of the following technologies does NOT facilitate the transferring of data between computers in adjacent buildings?

Answers

Answer:

modem....

Explanation:

i think thats what your asking

The technology which does NOT facilitate the transferring of data between computers in adjacent building is:

Bluetooth

According to the given question, we are asked to state the technology which does NOT facilitate the transferring of data between computers in adjacent building

As a result of this, we can see that from the complete question, we are asked  to select the answer between the available options which included fiber optics, twisted pair, and microwave, and the correct answer is Bluetooth

Therefore, the correct answer is Bluetooth

Read more about bluetooth here:

https://brainly.com/question/14043588

Read a sentence from the console.
Break the sentence into words using the space character as a delimiter.
Iterate over each word, if the word is a numeric value then print its value doubled, otherwise print out the word, with each output on its own line.
Sample Run:
Sentence: Hello world, there are 3.5 items.
Output:
Hello
world,
there
are
7
items. C++

Answers

Answer:

Answered below

Explanation:

#Program is written in Python programming language

sentence = input ("Enter sentence: ")

list_of_words = sentence.split()

for i in list_of_words:

#check if it is a digit

if not i.isdigit( ):

print ( i, sep= "\n" )

else:

#convert string to digits and double it

number = float( i )

double = number + number

print(double, sep="\n")

In this exercise we have to use the knowledge of the python language to write the code, so we find that:

The code can be found in the attached image.

So to make it easier the code will be rewritten below as:

sentence = input ("Enter sentence: ")

list_of_words = sentence.split()

for i in list_of_words:

#check if it is a digit

if not i.isdigit( ):

print ( i, sep= "\n" )

else:

#convert string to digits and double it

number = float( i )

double = number + number

print(double, sep="\n")

See more about Python at brainly.com/question/26104476

Complete the program below named CountVowels so that it reads in a string, counts all the vowels in that string, and prints out the number of vowels in the string.
For example, given the input string of "Hello, World!", the program should print out the value 3 for the three vowels, "eoo", in that string.
Complete the following file:
CountVowels.java
import java.util.Scanner;
/**
Reads a string and counts all vowels contained in that string.
Vowels are A E I O U a e i o u.
Input: the value of s, a string
Output: the number of all the vowels in s
*/
public class CountVowels
{
public static void main(String[] args)
{
Scanner in = new Scanner(System.in);
String s = in.nextLine();
// your work here
System.out.println(count);
}
}

Answers

Answer:

Answered below

Explanation:

public class CountVowels{

public static void main (String[] args){

Scanner in = new Scanner(System.in);

String words = in.nextline();

String vowels = "aeiouAEIOU";

int count = 0;

for( int i =0; I< words.length-1; I++){

for( int j = 0; j < vowels.length - 1; j++){

if(words [I] == vowels[j]){

count++;

}

}

}

System.out.print(count);

}

}

The final stages of the data science methodology are an iterative cycle between Modelling, Evaluation, Deployment, and Feedback.

a. True
b. False

Answers

Answer: True

Explanation:

The Data Science Methodology is simply referred to as an iterative and continuous methods that is required by data scientists to guide them on the approach that they'll use to tackle and solve problems typically through a number of steps.

It should be noted that the final stages of the data science methodology are an iterative cycle between Modelling, Evaluation, Deployment, and Feedback. The main aspects involves:

• Problem

• Approach;

• Requirements

• Collection

• Understanding

• Preparation

• Modelling

• Evaluation

• Deployment

• Feedback.

Therefore, the above statement is true.

9 Which of these words is used to begin a conditional statement? ​

Answers

Answer:

The word used to begin a conditional statement is if.

Explanation:

In the syntaxes of most (if not all) programming languages, the word if is used to begin any conditional statement.

Take for instance:

Python:

if a == b:

   print("Equal")

C++:

if(a == b)

cout<<"Equal";

Java:

if(a==b)

System.out.print("Equal")

The above code segments in Python, C++ and Java represents how conditional statements are used, and they all have a similarity, which is the "if" word

In 25 words or fewer, list some traits or qualities you think a manager
might need in order to do his or her job effectively.

Answers

Answer:

- Be understanding. Things arent always gonna go great. So, if your understanding issues can go way smoother.

- Be a great meditator. Employees arent always going to get along. But, when there is conflict you need to be a good mediator to help conflict. If you're taking sides because your closer to one employee or one employee likes the same song as you, your not a good meditator, and you shouldn't be a manager.

- Be kind. Being kind is always the #1 rule in life. It helps you in life. Being mean to your employees isn't good and will most definitely want them to quit their job.

Bob uses his own private key to encrypt the message. When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob. No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key. Therefore the entire encrypted message serves as a

Answers

Answer:

The answer is "Digital signatures".

Explanation:

The digital signatures are also recognized as asymmetric authentication, which is based on popular data cryptography. It generates the individual virtual wrist, which identifies consumers and protects information into digital communications or files. The digital certificate algorithms like RSA can generate two keys, one is the person or one public, that can be connected numerically.

Tim has completed his work. What feelings toward his work will give him a sense of purpose, energize him, and also inspire him as an individual
to achieve more and build on his strengths?
Tim takes ____
in his work.

Answers

It should be Tim takes pride

Which of the following are characteristics of RG-6 cabling specifications? (Select 3 answers)

a. Coaxial cabling
b. Suitable for long-distance cable runs
c. Used for cable television, satellite television and cable modems
d. Suitable for short-distance cable runs
e. Twisted-pair copper cabling

Answers

Answer:

a. Coaxial cabling

b. Suitable for long-distance cable runs

c. Used for cable television, satellite television, and cable modems

Explanation:

RG-6 cable is a coaxial cable type commonly used in television cable for transmitting the signal from the receiving antenna to the television port. It is also used in cable modems and satellite television. Unlike the ethernet cable, it is suitable for long-distance cabling.

The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the blanks to generate a list that contains complete email addresses .

The code :

def email_list(domains):
emails = []
for ___:
for user in users:
emails.___
return(emails)

print(email_list({"yahoo.com": ["clark.kent", "diana.prince", "peter.parker"], "yahoo.com": ["barbara.gordon", "jean.grey"], "hotmail.com": ["bruce.wayne"]}))

Answers

Answer:

Following are the solution to this question:

Please find the attachment of this code.

Explanation:

In this code, an email_list method is declared, that accepts a domains parameter, and in the next step, an empty list and two for loop are defined, in which the first for loop is used for a count parameter value and in the second loop is use the append method to add the given value, and use the return method to print its value, and use the print method to call the "email_list" method.  

5. Which one of these can connect directly to the internet?
a. Servers
b. Packets
C. Client
d. Internet Users

Answers

Answer:

Servers

Explanation:

A server can directly connect to the internet.

Internet users can connect directly to the internet is the answer to this question.

The server is what helps other networks or programs to function. They hosts websites and provide data to other computers. A client connects to a remote computer.

Packets are formatted units of data that are used to communicate over a TCP/IP network.

An internet user has direct connection to the internet. Just as the name internet users imply, we can tell that they can connect to the internet already.

read more at https://brainly.com/question/2662676?referrer=searchResults

someone help please!! i’ll give brainliest

Answers

Answer:

1-Mouse

2-Display

3-Printer

4-Keyboard

Explanation:

1-mouse
2-printer
3-display
4-keyboard

A town government is desinging anew bus system

Answers

Answer:

Umm what? Are you talking about the type of problem it is? If so it is an optimization problem.

Explanation:

I had something like this for one of my tests and I chose the optimization problem because it finds the values of decision variables that result in a maximum or minimum of a function.

But ion know if it's this that you are talking about

If you are to save something in your life what would it be
2.
and why?​

Answers

i would save memories in my opinion thats the most important thing.

A security administrator is adding a NAC requirement for all vpn users to ensure the connecting devices are compliant with company policy. Which of the following items provides the HIGHEST assurance to meet this requirement?

a. Implement a permanent agent.
b. Install antivirus software.
c. Use an agentless implantation.
d. Implement PKI.

Answers

Answer:

c. Use an agentless implementation.

Explanation:

A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.

Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.

In this scenario, a security administrator is adding a network access control (NAC) requirement for all vpn users to ensure the connecting devices are compliant with company policy. The item which provides the highest assurance to meet this requirement is to use an agentless implementation because the network access control (NAC) codes do not reside on the host device and the end user does not have to download any link to use it.

What are examples of Marketing, Sales, and Service careers? Check all that apply.


Receptionist

Construction Manager

Salesperson

Cashier

Personal Financial Advisor

Advertising Sales Agent

Purchasing Manager

Answers

Answer:

The correct alternatives are "Option C", "Option D", "Option F" and "Option G".

Explanation:

The built environment industry includes innovative developers, finance professionals, marketing strategies, and therefore all various advertising service delivery career opportunities. Sales configurations usually involve Corporate Development Management teams, Store executives, Call Centre Staff, Quality Assurance as well as Directorate Client Services.

Some other given selections are not comparable to the circumstance in question. So above, there's the correct approach.

Answer:

Salesperson

Cashier

Advertising Sales Agent

Purchasing Manager

[C, D, F, & G]

Explanation:

1. TRUE AND FALSE (five points each)
T F 1. Scales are used to take measurements.
T F 2. All scales are made of plastic.
T F 3. The mechanical scale is the same of the metric scale.
T F 4. The full-divided scales has all of the main units subdivided.
T F 5. Scales are the second most commonly used Drafting tool.

Answers

1. Truth 2. False 3. False 4. True 5. True

Edhisive 3.5 code practice

Answers

Answer:

x = int(input("What grade are you in? "))

if (x == 9):

   print ("Freshman")

elif (x == 10):

   print("Sophomore")

elif (x == 11):

   print ("Junior")

elif (x == 12):

   print("Senior")

else:

   print ("Not in High School")

Explanation:

Create an online order form for a car rental store and include the following items: input text box to enter the number of days input text box to enter the vehicle type (car, suv, ...) input text box to enter the number of designated drivers submit button to send form data to a server Note: the submit button is just to create a complete form. You do not have to define form action attribute for this assignment. Submit: HTML file and any other images and/or style sheets used to complete the design.

Answers

Answer:

Explanation:

The following is the barebones HTML code for the form which can be saved as is or implemented into your own site. No styling or images were added since that is done based on the overall styling of the website in which the code is being implemented.

<!DOCTYPE html>

<html>

<body>

<h2>Car Rental Store</h2>

<form action="/action_page.php">

 <label for="fname">Number of Days:</label><br>

 <input type="text" id="fname" name="fname" value="Ex. 20"><br><br>

 

 <label for="lname">Vehicle Type:</label><br>

 <input type="text" id="lname" name="lname" value="Ex. SUV"><br><br>

 

 <label for="lname">Number of Designated Drivers:</label><br>

 <input type="text" id="lname" name="lname" value="Ex. 2"><br><br>

 

 <input type="submit" value="Submit">

</form>  

</body>

</html>

Which is the incorrect statement

Answers

Answer:

Chain multiple ifs with ElseIf.

If you are able to anticipate that the components are likely to be reused in future projects then it is not advisable to use the Pub-Sub design pattern.

a. True
b. False

Answers

Answer:

b. False

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Pub-Sub design pattern is an abbreviation for publish-subscribe design pattern and it refers to a type of architectural design pattern that typically involves using a framework that enables the exchange of messages from the senders (publishers) to the recipient of the messages (subscribers) without having to program the messages.

Hence, if you are able to anticipate that the components are likely to be reused in future projects then it is advisable to use the Pub-Sub design pattern.

What is the most likely to be a possible physical attack?

Answers

Answer:

Physical attacks (also called kinetic attack) are. intentional offensive actions which aim to destroy, expose, alter, disable, steal or gain unauthorised access to physical assets such as infrastructure, hardware, or interconnection.

Explanation:

Copy the skeleton of code below into your answer. Then in the space indicated, add your own code to prompt the user for two numbers and a string and then prints the difference of those numbers with a message to the user (text in bold is input entered by the user). Note that the final output should be on a line by itself. Recall that the difference of two numbers is found by subtracting the second number from the first.

Enter the first: 10
Enter the second: 3
Enter your name: Dinah Drake
Dinah Drake, the difference is 7

Answers

Answer:

import java.util.*;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

   

 System.out.print("Enter the first: ");

 int first = input.nextInt();

 System.out.print("Enter the second: ");

 int second = input.nextInt();

 input.nextLine();

 System.out.print("Enter your name: ");

 String name = input.nextLine();

 

 int difference = Math.abs(second - first);

 

 System.out.println(name + ", the difference is " + difference);

}

}

Explanation:

*The code is in Java.

Create a Scanner object to get input from the user

Ask the user to enter the first, second, and name

Calculate the difference, subtract the second from the first and then get the absolute value of the result by using Math.abs() method

Print the name and the difference as in required format

Other Questions
What is the name for a substance made of billions of oppositely charged ionsjoined together? Scientist are studying a bacteria sample. The function f(x)=360(1.07)^x gives the number of bacteria in the sample at the end of x days. Which statement is the best interpretation of one of the values of the function? Which of the following is not something you need to consider when creating your artist website?A. optimization for search enginesB. website name lengthC. click-through ratesD. marketing and branding Choose the letters below for their proper places on the Punnett Square. Cross a pink-flowered four-oclock with another pink-flowered four-oclock. This crossing would be Rr times Rr. (r, rr, Rr, RR, R) What are the four stages of the cell cycle? When you look at the dark side, careful you must be.Yodas syntax is confusing. Select the sentence with clear syntax from the choices below:When you look at the dark side, be careful you must.You must be careful when you look at the dark side.Be careful you must.When you look at the dark side, you be careful. Which of the following conclusions can be drawn from the data about the relationship between public opinion and the adoption of public policy?Average citizens demonstrate political apathy with regard to changing US public policy.Economically elite citizens place less value on influencing US public policy than average citizens do.Regardless of social class, Americans are generally apathetic about influencing US public policy. The government is more influenced by the economic elites than by average citizens when changing US public policy. Kelly's new snowboard is 120% longer than her old snowboard. If the new snowboard is 150 cm, how long is her old snowboard? plllllllls hellllp brainliest is going to first answer Ammonium Nitrate (NH4NO3), an important fertilizer, produces Dinitrogen monoxide gas (N2O) and water when it decomposes. Determine the mass of the water produced from the decomposition of 25.00 grams of solid Ammonium Nitrate. Mr. Lewis is having the exterior of his house painted. The painters charge $35 per hour plus the costof materials. After 20 hours of work, Mr. Lewis owes the painters $840. Which equation representsthis situation?A840 = 35 x + 20B840 = 35 x + 45Cy =mxD20=840 x + 20 Evaluate d-5 when d = 11 DIRECTIONS ON PAGE!! Mr. Peters made 5000 milliliters of fruit punch for a luncheon how many liters of fruit punch did she make (Fix mistakes )Captain john carter, the main character in a series offanntasie novels by Edgar Rice burroughs, is the perfectromantic Hero. Originally from Virginia Carter is a courteousman of good character-but he is not to be trifled with. Hewill quick draw his sword and fight to the death for what hebelieve in he is pursistant, rugged strong and imortal. Cartercannot recall having had a childhood, he has always beenabout 30 years old and never ages. One day, while searchingfor Gold in a arizona cave, he "dies unexpectdly.. or doeshe Carter awakens to find himself on mars. question (.1) A suit costs $300 to make. What is:(a) the profit(b) the selling priceif it is sold for a 12% profit?question (2.) Andrew Prescot bought his car for $63 500 and sold it at a 20% loss.(a) What was his loss?(b) What did he sell the car for? What were two events that led to the decline of each of the threeKingdoms of Egypt? Factorise P(x)= (x+3)(12x^2-3)+(2x-1)(x^2-9)AndQ(x)= 4x^4-x^2 A. 15/2B. 9/2C. 13/3D. 10/3 4. When did support for non interventionism disappear?