Answer:
c. Motion Guide
B. Playhead
Explanation:
In Cascading Style Sheets 5 (CSS5), the playhead represents specific frame numbers and are displayed by a vertical line on the timeline window.
Motion Guide defines the path of the movement for an object so that there is no overlay issues.
) Python command line menu-driven application that allows a user to display, sort and update, as needed a List of U.S states containing the state capital, overall state population, and state flower. The Internet provides multiple references with these lists. For example:
Answer:
Explanation:
The following is a Python program that creates a menu as requestes. The menu allows the user to choose to display list, sort list, update list, and/or exit. A starting list of three states has been added. The menu is on a while loop that keeps asking the user for an option until exit is chosen. A sample output is shown in the attached picture below.
states = {'NJ': ['Trenton', 8.882, 'Common blue violet'], 'Florida':['Tallahassee', 21.48, 'Orange blossom'], 'California': ['Sacramento', 39.51, 'California Poppy']}
while True:
answer = input('Menu: \n1: display list\n2: Sort list\n3: update list\n4: Exit')
print(type(answer))
if answer == '1':
for x in states:
print(x, states[x])
elif answer == '2':
sortList = sorted(states)
sorted_states = {}
for state in sortList:
sorted_states[state] = states[state]
states.clear()
states = sorted_states
sorted_states = {}
elif answer == '3':
state = input('Enter State: ')
capital = input('Enter Capital: ')
population = input('Enter population: ')
flower = input('Enter State Flower: ')
states[state] = [capital, population, flower]
else:
break
9. Question
As sysadmin, you will have to prioritize issues. Which of these issues would be a top priority
A central printer is down
A server stopped provide service to 100 users
Auser has forgotten the AWON
A users computer Keupayashi
Countdown until matching digits Write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical. Ex: If the input is the output is 93 92 91 90 89 88 Ex: If the input is 11 the output is 11 Ex: If the input is 9 or any number not between 11 and 100 (inclusive), the output is: Input must be 11-100 For coding simplicity, follow each output number by a space, even the last one. Use a while loop. Compare the digits do not write a large if-else for all possible same-digit numbers (11,22,33...99), as that approach would be cumbersome for larger ranges. 29999.1122120 LAB ACTIVITY 4.13.1: LAB: Countdown until matching digits 7/10 main.c Load default template... 1 include 2 3 int main() 4 int n, i: 5 scanf("%d", &n); if (n < 20 Il n98) { 7 printf("%d",n); } else { i-n: 1e while (1) printf("%d", 1); if (icie - i/10) 13 14 15 16 17 } 18 printf("\n"); 19 return : 20 ) 12 break; Latest submission - 11:16 PM on 02/05/21 Total score: 7/10 Only show failing tests Download this submission 1: Compare output A 3/3 Input Your output 93 92 91 90 89 88 2: Compare Output A Input 11 Your output 11 3: Compare output a 3/3 Input 20 Your output 20 19 18 17 16 15 14 13 12 11 4: Compare output A 0/2 Output differs. See highlights below. Special character legend Input 101 Your output 101 Expected output Input must be 11-100 5. Compare output A 0/1 Output differs. See highlights below. Special character legend Input Your output Expected output Input must be 11-100
Answer:
The program in C is as follows:
#include <stdio.h>
int main(){
int n;
scanf("%d", &n);
if(n<11 || n>100){
printf("Input must be between 11 - 100"); }
else{
while(n%11 != 0){
printf("%d ", n);
n--; }
printf("%d ", n); }
return 0;
}
Explanation:
The existing template can not be used. So, I design the program from scratch.
This declares the number n, as integer
int n;
This gets input for n
scanf("%d", &n);
This checks if input is within range (11 - 100, inclusive)
if(n<11 || n>100){
The following prompt is printed if the number is out of range
printf("Input must be between 11 - 100"); }
else{
If input is within range, the countdown is printed
while(n%11 != 0){ ----This checks if the digits are identical using modulus 11
Print the digit
printf("%d ", n);
Decrement by 1
n--; }
This prints the last expected output
printf("%d ", n); }
Write an expression that executes the loop while the user enters a number greater than or equal to 0. Note: These activities may test code with different test values. This activity will perform three tests, with user input of 9, 5, 2, -1, then with user input of 0, -17, then with user input of 0 1 0 -1. See "How to Use zyBooks". Also note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "Test aborted."
Answer:
while ( num >= 0) { ... }
Explanation:
Required
Express to execute a while loop with the given condition.
The condition in the question is that: the user input must be greater than or equal to 0.
The statement for this is:
[tex]while[/tex] ( [tex]num[/tex] [tex]>=[/tex] [tex]0[/tex]) { [tex]...[/tex] }
Where num is the input variable
write the output of given program:
Answer:
24
16
80
0
Explanation:
A+B=>20+4=24
A-B=>20-4=16
A*B=>A x B = 20 x 4 = 80
A MOD B=> Remainder of A/B = 0
_ is a term used for license like those issues by creative commons license as an alternative to copyright
, . , .
Explanation:
'Which of the following statement is False? 1 point Context free language is the subset of context sensitive language Regular language is the subset of context sensitive language Recursively enumerable language is the super set of regular language Context sensitive language is a subset of context free language
Answer:
Context-sensitive language is a subset of context-free language
Explanation:
Considering the available options, the statement that is considered wrong is "Context-sensitive language is a subset of context-free language."
This is because generally every regular language can be produced through the means of context-free grammar, while context-free language can be produced through the means of context-sensitive grammar, and at the same time, context-sensitive grammars are produced through the means of Recursively innumerable.
Hence, the correct answer in this correct answer to the question is the last option *Context-sensitive language is a subset of context-free langage
sita didnt go to school. (affirmative)
me
Select the correct answer. Which is the bottom-most layer in the OSI model?
A application layer
B. physical layer
c. transport layer
D. presentation layer
Answer:
B.Physical layer
Explanation:
I am sure.Hope it helps
Aaron opens a bicycle store. Which of the
following gives the best example of how Aaron
uses the scarce resource of labor?
Answer: Aaron hired an employee to do bicycle repairs
Explanation:
Labor refers to the physical and mental effort put into production by human beings.
Since Aaron opens a bicycle store, he can hire an employee to do bicycle repairs. Therefore, in this case, labor will be put into productive use for the company.
each interior angle of a regular polygon is 150°.how many sides has the polygon
Answer:
12 sides
Explanation:
{(n-2)x180}÷n
150=[tex]\frac{(n-2)*180}{n}[/tex]
150n=(n-2) x 180
150n= 180n-360
150n-180n=- 360
-30n= -360
n= 12
Sides of polygon is 12
What does the abbreviation BBC stands for?
Answer:
British Broadcasting Corporation Microcomputer System
Explanation:
The British Broadcasting Corporation Microcomputer System, or BBC Micro, is a series of microcomputers and associated peripherals designed and built by the Acorn Computer company in the 1980s for the BBC Computer Literacy Project.
Answer:
British Broadcasting Corporation
Explanation:
This is a UK company which provides television and radio news in over 40 languages. This is the computer related meaning, there are other meanings to the abbreviation but they seem irrelevant in this case.
Hope this information was of any help to you. (:
Exercise#1: The following formula gives the distance between two points (x1, yı) and (x2, y2) in the Cartesian plane:
[tex] \sqrt{(x2 - x1) ^{2} + (y2 - y1) ^{2} } [/tex]
Given the center and a point on circle, you can use this formula to find the radius of the circle. Write a C++ program that prompts the the user to enter the center and point on the circle. The program should then output the circle's radius, diameters, circumference, and area. Your program must have at least the following methods: findDistance: This mehod takes as its parameters 4 numbers that represent two points in the plane and returns the distance between them. findRadius: This mehod takes as its parameters 4 numbers that represent the center and a point on the circle, calls the method findDistance to find the radius of the circle, and returns the circle's radius. circumference: This mehod takes as its parameter a number that represents the radius of the circle and returns the circle's circumference. area: This mehod takes as as its parameter a number that represents the radius of the circle and returns the circle's area. .
The _____ of the Open Systems Interconnection (OSI) modelspecifies the electrical connections between computers and the transmission medium and is primarily concerned with transmitting binary data, or bits, over a communication network.
Answer:
"Physical layer" is the correct answer.
Explanation:
It dealt mostly with bit-level transfer across various equipment as well as it provides industrial automation connections to meet quality standards to something like digital downloads.The purpose of this layer would be to consolidate essential networking system compatibility so that information is being sent successfully.Thus, the above is the correct answer.
The imperative programming paradigm is popular and is a part of object-oriented computing paradigm, because it: __________.
A. is based on computer organization and thus is efficient to execute on hardware.
B. matches the culture of doing things by following the step-wise instructions.
C. enforces the modularity and supports the development of large programs.
D. supports class inheritance and code reuse.
Answer:
B. Matches the culture of doing things by following the step-wise instructions.
Explanation:
Imperative programming paradigm follows a sequence of instructions and steps. The order of execution of the statement is necessary because their is sequence of statements. Operation is system oriented.
In imperative programming, the source code is a series of commands, this commands tell the computer what to do, when to do it and the order it will be done so as to achieve the best result. The code of imperative programming paradigm is quite easy to understand.
A company can either invest in employee training seminars or update its computer network. Since updating the computer network would result in more measurable benefits, the company would be best off updating its computer network. The argument above assumes that: Group of answer choices
Answer:
The more measurable a benefit, the greater value that benefit has to a company
Explanation:
Here, there are two choices ; organizing employee training seminars and computer network update. With an update in the company's computer network, accompanying benefits include ; Improved network performance, Extended feature accessibility, Enhanced firewall and security features, Enhanced efficiency leading to increased overall output. Employee training and seminar also comes with its own benefit which include enhanced employee knowledge. However , the measurable benefits of updating a computer network seems more numerous than employee training which could be a reason why the company chose to invest in its computer network as they feel that investments with more measurable benefits will impact more on the company.
what is function of java
Explanation:
Java is an object-orinted programming language used for software develpment.
Frames control what displays on the Stage, while keyframes help to set up
Answer: A keyframe is a location on a timeline which marks the beginning or end of a transition. So for example, you have a movie and it transitions to another scene, keyframes tell it when and where to start the transition then when and where to stop the transition.
seven and two eighths minus five and one eighth equals?
Answer: 2.125
Explanation
The clone() method expects no arguments when called, and returns an exact copy of the type of bag on which it is called.
Answer:
true
Explanation:
This statement is true. This is a method found in the Java programming language and is basically used to create an exact copy of the object that it is being called on. For example, in the code provided below the first line is creating a new object from the Cars class and naming it car1. The second line is creating an exact copy of car1 and saving it as a new object called car2. Notice how the clone() method is being called on the object that we want to copy which in this case is car1.
Cars car1 = new Cars();
Cars car2 = (Cars) car1.clone();
1. Imagine you are in a computer shop. Choose five things that would improve your digital lif
Answer:
definitley a mac
Explanation:
im not much of an apple company person but i would love to try a mac im more of that disney person who likes the animated stuff like raya and the last dragon which came out in march and luca which came out last friday
Conduct research to determine the best network design to ensure security of internal access while retaining public website availability.
Answer:
There are many benefits to be gained from network segmentation, of which security is one of the most important. Having a totally flat and open network is a major risk. Network segmentation improves security by limiting access to resources to specific groups of individuals within the organization and makes unauthorized access more difficult. In the event of a system compromise, an attacker or unauthorized individual would only have access to resources on the same subnet. If access to certain databases in the data center must be given to a third party, by segmenting the network you can easily limit the resources that can be accessed, it also provides greater security against internal threats.
Explanation:
The best method in network security to prevent intrusion are:
Understand and use OSI Model. Know the types of Network Devices. Know Network Defenses. Separate your Network. How can I improve security through network design?In the above case, the things to do is that one needs to focus on these areas for a a good network design. They are:
Physical security.Use of good firewalls. Use the DMZ, etc.Therefore, The best method in network security to prevent intrusion are:
Understand and use OSI Model. Know the types of Network Devices. Know Network Defenses. Separate your Network.Learn more about network security from
https://brainly.com/question/17090284
#SPJ6
What is the value of x after the following code is executed?
x = 0
while x < 20 :
x = x + 1
else :
x = 10
Consider the code below. When you run this program, what is the output if the temperature is 77.3 degrees Fahrenheit?
temperature = gloat(input('what is the temperature'))
if temperature >70:
print('Wear short sleeves')
else:
print('bring a jacket')
print ('Go for a walk outside')
Answer:
The output would be "Wear short sleeves"
Explanation:
The temperature is 77.3 degrees and 77.3 > 70
4.15 LAB: Smallest number
Write a program whose inputs are three integers, and whose output is the smallest of the three values.
Ex: If the input is:
7
15
3
the output is:
3
Answer:
The program in Python is as follows:
nums = []
for i in range(3):
num = int(input())
nums.append(num)
nums.sort()
print(nums[0])
Explanation:
This initiailizes a list
nums = []
This iteration is repeated for 3 inputs
for i in range(3):
This get input for each iteration
num = int(input())
The input is then appended to the list
nums.append(num)
Sort the list in ascending order
nums.sort()
Print the smallest
print(nums[0])
Following are the program to find the smallest number in the input value.
Program Explanation:
Defining header file.Defining main method.Inside the main method three integer variable "x,y, and z" is declared that is used for input value.After inputs the value a Else if Statement is declared that checks the smallest value from input value, and use print method that print its value.Program:
#include <iostream>//header file
using namespace std;
int main()//main method
{
int x,y,z;//defining integer variable
cout<<"Enter values: "<<endl;//print message
cin>>x>>y>>z;//input value
if(x<y&& x<z)//use if that check value of x less than y and x less than z
{
cout<<x;//print value
}
else if(y<x &&y<z)//use if that check value of y less than x and y less than z
{
cout<<y;//print value
}
else//else block
{
cout<<z;//print value
}
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/21447620
Which of the following statements regarding the SAP Hana product implemented by Under Armour is NOT true?
A. All of the statements are true.
B. The program allows legacy silos to remain intact.
C. The program can run across platforms and devices.
D. The program provides real-time results.
Answer:A
Explanation:i need points
help me with this please
In this module you learned about advanced modularization techniques. You learned about the advantages of modularization and how proper modularization techniques can increase code organization and reuse.
Create the PYTHON program allowing the user to enter a value for one edge of a cube(A box-shaped solid object that has six identical square faces).
Prompt the user for the value. The value should be passed to the 1st and 3rd functions as arguments only.
There should be a function created for each calculation
One function should calculate the surface area of one side of the cube. The value calculated is returned to the calling statement and printed.
One function should calculate the surface area of the whole cube(You will pass the value returned from the previous function to this function) and the calculated value results printed.
One function should calculate the volume of the cube and print the results.
Make a working version of this program in PYTHON.
Answer:
Following are the code to the given question:
def getSAOneSide(edge):#defining a method that getSAOneSide that takes edge patameter
return edge * edge#use return to calculate the edge value
def getSA(SA_one_side):#defining a method that getSA that takes SA_one_side patameter
return 6 * SA_one_side#use return to calculate the SA_one_side value
def volume(edge):#defining a method that volume that takes edge patameter
return edge * edge * edge#use return to calculate edge value
edge = int(input("Enter the length of edge of the cube:\n"))#defining edge variable that input value
SA_one_side = getSAOneSide(edge)#defining SA_one_side that holds getSAOneSide method value
print("Surface area of one side of the cube:", SA_one_side)
surfaceArea = getSA(SA_one_side)#defining a surfaceArea that holds getSA method value
print("Surface area of the cube:", surfaceArea)#print surfaceArea value
vol = volume(edge)#defining vol variable that holds Volume method value
print("Volume of the cube:", vol)#print vol Value
Output:
Please find the attached file.
Explanation:
In the code three method "getSAOneSide, getSA, and volume" method is declared that takes a variable in its parameters and use a return keyword that calculates and return its value.
In the next step,edge variable is declared that holds value from the user and defines three variable that holds method value and print its value with the message.
Select the correct answer. Which input device uses optical technology?
A. barcode reader
B. digital pen
C. digital camera
D. joystick
Answer:
barcode reader is the correct answer
What layer of the OSI model describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application?
A) Application Layer.
B) Presentation Layer.
C) Session Layer.
D) Transport Layer.
Answer:
C) Session Layer.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Basically, each layer has its unique functionality which is responsible for the proper functioning of the communication services.
Session layer is the layer of an Open Systems Interconnection (OSI) model which describes how data between applications is synced and recovered if messages don't arrive intact at the receiving application.