Answer:
import time
# Input yellow #
yellow = input("Enter yellow: ")
# If yellow #
if yellow == "yellow":
print("Correct")
else:
print("Nope")
Explanation:
24/3*2^2/2*3+(20-10)-40
Answer:
34
Explanation:
You use pemdas
important of microcomputer in some point
Answer:
A microcomputer uses memory to store the programs that control its operation, to store data waiting for processing, and to store the results of operations performed by the CPU. Primary memory, or storage, is electronic memory that is directly addressable by the CPU.
Explanation:
brainliest plzzzzzzz
You are a network technician for a small corporate network. The network is connected to the internet and uses DHCP for address assignment. The owner of the company in the executive office and a temporary employee in IT Administrator office both report that their workstations can communicate with some computers on the network, but cannot communicate with the internet. You need to diagnose and fix the problem.
In this lab, your task is to complete the following:
-Use the following troubleshooting tools to diagnose the problem in the network:
-the ping, ipconfig, or tracert command utility
-the network and sharing center in the windows 10 or windows server 2016 operating system
-the DHCP server console in the windows server 2016 operating system
Answer:
Explanation:
The first thing that you should do would be to ping the computer in the Networking Closet, if this fails then the next step would be to ping the service provider. If both of these pings fail it is most likely because the configuration of the IP addresses are configured wrong. In this case use the command prompt to type in the following
ipconfig /all
this will open up the entire configuration info. If the problem is truly the configuration then your DNS address should show up as not configured. This can happen when a DHCP is enabled. Check if DHCP is enabled, if so then you would need to type the following into the command prompt
ipconfig /renew
This will renew the ip address information from the DHCP server and should create the proper DNS configuration as well and solve the issue.
Following are the solution to the given question:
Initiate troubleshooting in the Executive by exploring the scope of the connectivity issue. Ping the laptop in the network closet from your workstation. A ping to a location failed.Ping your internet service provider. The ping to the address fails.Verify any connection issues here between workstations, the Network Closet computer, and also the ISP in the IT Administrator's office. (Pings to both locations failed.) The issue is now almost definitely due to the channel's IP setup.To examine the Local Area Connection setup, open the cmd in the Executive Office and type ipconfig /all. Some of the following issues must be noted: The workstation's default route and DNS server addresses have still not been configured.It implies that connectivity is confined to computers just on the local network.Its DHCP Enabled option has been enabled. Yes, a DHCP server is configured just on the workstation. Its line with the DHCP Server address wasn't shown. This means the workstation was unable to communicate with the DHCP server. This IP address corresponds to an APIPA domain (169.254.0.1 to 169.254.255.254). It shows that the computer assigns an IP address to it only. The workstation would be capable of communicating with the other hosts on the local network who have given their unique IP via APIPA.Verify that its DHCP service for the local area network is active and active in the Network Closet.CORPSERVER should be the first option in Hyper-V Manager. To see all the virtual machines, open the window. Join by correcting CorpDHCP (maximize the window for easier viewing if desired). For launch, the DHCP console in Server Manager, go to Tools > DHCP. CorpDHCP.CorpNet.com must be extended. IPv4 enlargement.Scope [192.168.0.1] Subnet1 has a dropdown, suggesting that this is not operational. Select Activate from the menu bar of Scope [192.168.0.1] Subnet1. The scope's "dislike" button has gone, and the DHCP service for the local network is now operational.Launch the command prompt inside the Executive and type ipconfig /renew. This will obtain the new Ip from the DHCP server and change the Ethernet connection settings.To check the Internet setup, type ipconfig /all. You should now see lines for the default gateway, DNS server, and DHCP server, and a new IP address in the DHCP scope for the local network.Ping the ISP in the Executive Office to confirm that the problem has been resolved. Your ping to the ISP is good.Rep step 6 in the IT Administrator Office to fix the dispute with the workstations.Learn more:
brainly.com/question/14728944
Leukemia is cancer of the body's blood-forming tissues, including the bone marrow and the lymphatic
system. Many types of leukemia exist. Some forms of leukemia are more common in children. Other forms
of leukemia occur mostly in adults. The first type of classification is by how fast the leukemia progresses:
Acute leukemia. In acute leukemia, the abnormal blood cells are immature blood cells (blasts). They can't
carry out their normal functions, and they multiply rapidly, so the disease worsens quickly. Acute leukemia
requires aggressive, timely treatment. . You should take input using GUI and scanner based at own choice.
You should display the result of this program using scanner. In the Chronic leukemia, There are many
types of chronic leukemia’s. Some produce too many cells and some cause too few cells to be produced.
Chronic leukemia involves more mature blood cells. These blood cells replicate or accumulate more slowly
and can function normally for a period of time. Some forms of chronic leukemia initially produce no early
symptoms and can go unnoticed or undiagnosed for years. Design a program that covers these Java
Topics: Multi-D Arrays, Inheritance, Exception Handling, Multi-Threding, File Handling, Collections and
Keywords like final, static, finalize, super, this, throw and throws. The second type of classification is by
type of white blood cell affected: Lymphocytic leukemia. This type of leukemia affects the lymphoid cells
(lymphocytes), which form lymphoid or lymphatic tissue. Lymphatic tissue makes up your immune system.
Myelogenous (my-uh-LOHJ-uh-nus) leukemia. This type of leukemia affects the myeloid cells. Myeloid
cells give rise to red blood cells, white blood cells and platelet-producing cells.
Plz answer this question for me quick for a Brainly
which bird is the symbol of peace ?
dove
Question # 5
Regulatory laws
Are based on customs
Are issued by agencies of the government
Have passed through the legislature
Are common laws
Answer:
Regulatory laws is described below in detailed explanation.
Explanation:
Regulatory law introduced to the law published by an executive department agency under a commission from a government. ... The law that commands the conduct of regulatory agencies (both promulgation of commands, and adjudication of requests or disputes), and judicial evaluation of agency judgments, is called administrative law.
I can’t get answers because the ads won’t load help me
Answer: Get better wifi
Explanation: This maybe a router problem, Go to your router and reset it by unplugging the power chord, After 30 seconds plug it back in and wait for your wifi to start back up. Your ads should load now. Have a good day.
Which of the following technologies does NOT facilitate the transferring of data between computers in adjacent buildings?
Answer:
modem....
Explanation:
i think thats what your asking
The technology which does NOT facilitate the transferring of data between computers in adjacent building is:
BluetoothAccording to the given question, we are asked to state the technology which does NOT facilitate the transferring of data between computers in adjacent building
As a result of this, we can see that from the complete question, we are asked to select the answer between the available options which included fiber optics, twisted pair, and microwave, and the correct answer is Bluetooth
Therefore, the correct answer is Bluetooth
Read more about bluetooth here:
https://brainly.com/question/14043588
Read a sentence from the console.
Break the sentence into words using the space character as a delimiter.
Iterate over each word, if the word is a numeric value then print its value doubled, otherwise print out the word, with each output on its own line.
Sample Run:
Sentence: Hello world, there are 3.5 items.
Output:
Hello
world,
there
are
7
items. C++
Answer:
Answered below
Explanation:
#Program is written in Python programming language
sentence = input ("Enter sentence: ")
list_of_words = sentence.split()
for i in list_of_words:
#check if it is a digit
if not i.isdigit( ):
print ( i, sep= "\n" )
else:
#convert string to digits and double it
number = float( i )
double = number + number
print(double, sep="\n")
In this exercise we have to use the knowledge of the python language to write the code, so we find that:
The code can be found in the attached image.
So to make it easier the code will be rewritten below as:
sentence = input ("Enter sentence: ")
list_of_words = sentence.split()
for i in list_of_words:
#check if it is a digit
if not i.isdigit( ):
print ( i, sep= "\n" )
else:
#convert string to digits and double it
number = float( i )
double = number + number
print(double, sep="\n")
See more about Python at brainly.com/question/26104476
Complete the program below named CountVowels so that it reads in a string, counts all the vowels in that string, and prints out the number of vowels in the string.
For example, given the input string of "Hello, World!", the program should print out the value 3 for the three vowels, "eoo", in that string.
Complete the following file:
CountVowels.java
import java.util.Scanner;
/**
Reads a string and counts all vowels contained in that string.
Vowels are A E I O U a e i o u.
Input: the value of s, a string
Output: the number of all the vowels in s
*/
public class CountVowels
{
public static void main(String[] args)
{
Scanner in = new Scanner(System.in);
String s = in.nextLine();
// your work here
System.out.println(count);
}
}
Answer:
Answered below
Explanation:
public class CountVowels{
public static void main (String[] args){
Scanner in = new Scanner(System.in);
String words = in.nextline();
String vowels = "aeiouAEIOU";
int count = 0;
for( int i =0; I< words.length-1; I++){
for( int j = 0; j < vowels.length - 1; j++){
if(words [I] == vowels[j]){
count++;
}
}
}
System.out.print(count);
}
}
The final stages of the data science methodology are an iterative cycle between Modelling, Evaluation, Deployment, and Feedback.
a. True
b. False
Answer: True
Explanation:
The Data Science Methodology is simply referred to as an iterative and continuous methods that is required by data scientists to guide them on the approach that they'll use to tackle and solve problems typically through a number of steps.
It should be noted that the final stages of the data science methodology are an iterative cycle between Modelling, Evaluation, Deployment, and Feedback. The main aspects involves:
• Problem
• Approach;
• Requirements
• Collection
• Understanding
• Preparation
• Modelling
• Evaluation
• Deployment
• Feedback.
Therefore, the above statement is true.
9 Which of these words is used to begin a conditional statement?
Answer:
The word used to begin a conditional statement is if.
Explanation:
In the syntaxes of most (if not all) programming languages, the word if is used to begin any conditional statement.
Take for instance:
Python:
if a == b:
print("Equal")
C++:
if(a == b)
cout<<"Equal";
Java:
if(a==b)
System.out.print("Equal")
The above code segments in Python, C++ and Java represents how conditional statements are used, and they all have a similarity, which is the "if" word
In 25 words or fewer, list some traits or qualities you think a manager
might need in order to do his or her job effectively.
Answer:
- Be understanding. Things arent always gonna go great. So, if your understanding issues can go way smoother.
- Be a great meditator. Employees arent always going to get along. But, when there is conflict you need to be a good mediator to help conflict. If you're taking sides because your closer to one employee or one employee likes the same song as you, your not a good meditator, and you shouldn't be a manager.
- Be kind. Being kind is always the #1 rule in life. It helps you in life. Being mean to your employees isn't good and will most definitely want them to quit their job.
Bob uses his own private key to encrypt the message. When Alice receives the ciphertext she finds that she can decrypt it with Bob's public key, thus proving that the message must have been encrypted by Bob. No one else has Bob's private key and therefore no one else could have created a ciphertext that could be decrypted with Bob's public key. Therefore the entire encrypted message serves as a
Answer:
The answer is "Digital signatures".
Explanation:
The digital signatures are also recognized as asymmetric authentication, which is based on popular data cryptography. It generates the individual virtual wrist, which identifies consumers and protects information into digital communications or files. The digital certificate algorithms like RSA can generate two keys, one is the person or one public, that can be connected numerically.
Tim has completed his work. What feelings toward his work will give him a sense of purpose, energize him, and also inspire him as an individual
to achieve more and build on his strengths?
Tim takes ____
in his work.
Which of the following are characteristics of RG-6 cabling specifications? (Select 3 answers)
a. Coaxial cabling
b. Suitable for long-distance cable runs
c. Used for cable television, satellite television and cable modems
d. Suitable for short-distance cable runs
e. Twisted-pair copper cabling
Answer:
a. Coaxial cabling
b. Suitable for long-distance cable runs
c. Used for cable television, satellite television, and cable modems
Explanation:
RG-6 cable is a coaxial cable type commonly used in television cable for transmitting the signal from the receiving antenna to the television port. It is also used in cable modems and satellite television. Unlike the ethernet cable, it is suitable for long-distance cabling.
The email_list function receives a dictionary, which contains domain names as keys, and a list of users as values. Fill in the blanks to generate a list that contains complete email addresses .
The code :
def email_list(domains):
emails = []
for ___:
for user in users:
emails.___
return(emails)
print(email_list({"yahoo.com": ["clark.kent", "diana.prince", "peter.parker"], "yahoo.com": ["barbara.gordon", "jean.grey"], "hotmail.com": ["bruce.wayne"]}))
Answer:
Following are the solution to this question:
Please find the attachment of this code.
Explanation:
In this code, an email_list method is declared, that accepts a domains parameter, and in the next step, an empty list and two for loop are defined, in which the first for loop is used for a count parameter value and in the second loop is use the append method to add the given value, and use the return method to print its value, and use the print method to call the "email_list" method.
5. Which one of these can connect directly to the internet?
a. Servers
b. Packets
C. Client
d. Internet Users
Answer:
Servers
Explanation:
A server can directly connect to the internet.
Internet users can connect directly to the internet is the answer to this question.
The server is what helps other networks or programs to function. They hosts websites and provide data to other computers. A client connects to a remote computer.
Packets are formatted units of data that are used to communicate over a TCP/IP network.
An internet user has direct connection to the internet. Just as the name internet users imply, we can tell that they can connect to the internet already.
read more at https://brainly.com/question/2662676?referrer=searchResults
someone help please!! i’ll give brainliest
Answer:
1-Mouse
2-Display
3-Printer
4-Keyboard
Explanation:
A town government is desinging anew bus system
Answer:
Umm what? Are you talking about the type of problem it is? If so it is an optimization problem.
Explanation:
I had something like this for one of my tests and I chose the optimization problem because it finds the values of decision variables that result in a maximum or minimum of a function.
But ion know if it's this that you are talking about
If you are to save something in your life what would it be
2.
and why?
A security administrator is adding a NAC requirement for all vpn users to ensure the connecting devices are compliant with company policy. Which of the following items provides the HIGHEST assurance to meet this requirement?
a. Implement a permanent agent.
b. Install antivirus software.
c. Use an agentless implantation.
d. Implement PKI.
Answer:
c. Use an agentless implementation.
Explanation:
A VPN is an acronym for Virtual Private Network and it's a secured, encrypted and private web-based service used for accessing region-restricted and censored internet content. A VPN protects web data from potential hackers and government surveillance by hiding the real IP address of the host and encrypting user's internet traffic.
Basically, the VPN is a computer software that enables internet users to create a secured connection (sends and receives data) over public or shared networks like they're directly connected to the private network.
In this scenario, a security administrator is adding a network access control (NAC) requirement for all vpn users to ensure the connecting devices are compliant with company policy. The item which provides the highest assurance to meet this requirement is to use an agentless implementation because the network access control (NAC) codes do not reside on the host device and the end user does not have to download any link to use it.
What are examples of Marketing, Sales, and Service careers? Check all that apply.
Receptionist
Construction Manager
Salesperson
Cashier
Personal Financial Advisor
Advertising Sales Agent
Purchasing Manager
Answer:
The correct alternatives are "Option C", "Option D", "Option F" and "Option G".
Explanation:
The built environment industry includes innovative developers, finance professionals, marketing strategies, and therefore all various advertising service delivery career opportunities. Sales configurations usually involve Corporate Development Management teams, Store executives, Call Centre Staff, Quality Assurance as well as Directorate Client Services.Some other given selections are not comparable to the circumstance in question. So above, there's the correct approach.
Answer:
Salesperson
Cashier
Advertising Sales Agent
Purchasing Manager
[C, D, F, & G]
Explanation:
1. TRUE AND FALSE (five points each)
T F 1. Scales are used to take measurements.
T F 2. All scales are made of plastic.
T F 3. The mechanical scale is the same of the metric scale.
T F 4. The full-divided scales has all of the main units subdivided.
T F 5. Scales are the second most commonly used Drafting tool.
Edhisive 3.5 code practice
Answer:
x = int(input("What grade are you in? "))
if (x == 9):
print ("Freshman")
elif (x == 10):
print("Sophomore")
elif (x == 11):
print ("Junior")
elif (x == 12):
print("Senior")
else:
print ("Not in High School")
Explanation:
Create an online order form for a car rental store and include the following items: input text box to enter the number of days input text box to enter the vehicle type (car, suv, ...) input text box to enter the number of designated drivers submit button to send form data to a server Note: the submit button is just to create a complete form. You do not have to define form action attribute for this assignment. Submit: HTML file and any other images and/or style sheets used to complete the design.
Answer:
Explanation:
The following is the barebones HTML code for the form which can be saved as is or implemented into your own site. No styling or images were added since that is done based on the overall styling of the website in which the code is being implemented.
<!DOCTYPE html>
<html>
<body>
<h2>Car Rental Store</h2>
<form action="/action_page.php">
<label for="fname">Number of Days:</label><br>
<input type="text" id="fname" name="fname" value="Ex. 20"><br><br>
<label for="lname">Vehicle Type:</label><br>
<input type="text" id="lname" name="lname" value="Ex. SUV"><br><br>
<label for="lname">Number of Designated Drivers:</label><br>
<input type="text" id="lname" name="lname" value="Ex. 2"><br><br>
<input type="submit" value="Submit">
</form>
</body>
</html>
Which is the incorrect statement
Answer:
Chain multiple ifs with ElseIf.
If you are able to anticipate that the components are likely to be reused in future projects then it is not advisable to use the Pub-Sub design pattern.
a. True
b. False
Answer:
b. False
Explanation:
Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.
Pub-Sub design pattern is an abbreviation for publish-subscribe design pattern and it refers to a type of architectural design pattern that typically involves using a framework that enables the exchange of messages from the senders (publishers) to the recipient of the messages (subscribers) without having to program the messages.
Hence, if you are able to anticipate that the components are likely to be reused in future projects then it is advisable to use the Pub-Sub design pattern.
What is the most likely to be a possible physical attack?
Answer:
Physical attacks (also called kinetic attack) are. intentional offensive actions which aim to destroy, expose, alter, disable, steal or gain unauthorised access to physical assets such as infrastructure, hardware, or interconnection.
Explanation:
Copy the skeleton of code below into your answer. Then in the space indicated, add your own code to prompt the user for two numbers and a string and then prints the difference of those numbers with a message to the user (text in bold is input entered by the user). Note that the final output should be on a line by itself. Recall that the difference of two numbers is found by subtracting the second number from the first.
Enter the first: 10
Enter the second: 3
Enter your name: Dinah Drake
Dinah Drake, the difference is 7
Answer:
import java.util.*;
public class Main
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.print("Enter the first: ");
int first = input.nextInt();
System.out.print("Enter the second: ");
int second = input.nextInt();
input.nextLine();
System.out.print("Enter your name: ");
String name = input.nextLine();
int difference = Math.abs(second - first);
System.out.println(name + ", the difference is " + difference);
}
}
Explanation:
*The code is in Java.
Create a Scanner object to get input from the user
Ask the user to enter the first, second, and name
Calculate the difference, subtract the second from the first and then get the absolute value of the result by using Math.abs() method
Print the name and the difference as in required format