The question is incomplete. The complete question is :
Holly the Hacker has a list of 100,000 common passwords. She wants to use this list to break into UNIX-like systems that use a password file with lines consisting of:
The user's ID in plaintext.
10 bits of randomly chosen "salt," in plaintext.
The user's password, concatenated with the salt, and then encrypted.
There are very many such systems around the world, and Holly plans to steal the password files from as many as she can. The average system has 50 users in its password file.
Holly wants to create a master list of the encrypted versions of all the 100,000 passwords on her list, encrypted with all possible salt values. To create this master list, approximately how many encryptions of a password-concatenated-with-salt would Holly have to perform?
A. 2 million
B. 5 million
C. 100 million
D. 1 million
Solution :
It is given that the hacker, Holly wants break into the UNIX-like systems using 100,000 common passwords that she has on her list. The system has at an average of 50 users in the password files.
Therefore, to create a master list, Holly have to perform about 50 x 100,000 = 5,000,000 encryptions for the password concatenated-with-salt.
Thus the correct option is option (B). 5 million
Write a static method named lowestPrice that accepts as its parameter a Scanner for an input file. The data in the Scanner represents changes in the value of a stock over time. Your method should compute the lowest price of that stock during the reporting period. This value should be both printed and returned as described below.
Answer:
Explanation:
The following code is written in Java. It creates the method as requested which takes in a parameter of type Scanner and opens the passed file, reads all the elements, and prints the lowest-priced element in the file. A test case was done and the output can be seen in the attached picture below.
import java.io.File;
import java.io.FileNotFoundException;
import java.util.Scanner;
class Brainly{
public static void main(String[] args) throws FileNotFoundException {
Scanner console = new Scanner(System.in);
System.out.print("file location: ");
String inputLocation = console.next();
File inputFile = new File(inputLocation);
Scanner in = new Scanner(inputFile);
lowestPrice(in);
}
public static void lowestPrice(Scanner in) {
double smallest = in.nextDouble();
while(in.hasNextDouble()){
double number = in.nextDouble();
if (number < smallest) {
smallest = number;
}
}
System.out.println(smallest);
in.close();
}
}
You're installing two new hard drives into your network attached storage device. Your director asks that they be put into a RAID solution that offers redundancy over performance. Which would you use?
a. RAID 0
b. RAID 1
c. RAID 5
d. RAID 6
e. RAID 10
Answer:
d. RAID 6
Explanation:
RAID is a data storage technology that combines multiple physical disk drive components into a single logical unit. The functions of RAID is to provide performance and redundancy.
RAID 0 provides data stripping but it does not offer data stripping.
RAID 1 increases performance to about 2x but it limits the disk capacity to about 50%
RAID 5 provides redundancy and increased perfomance but it is limited to small disk drive.
RAID 6 also provides redundancy but it slows performance
RAID 10 increases performance and data protection.
RAID 6 is the best drive that offers redundancy over performance.
what is a microscope
Answer:
an optical instrument used for viewing very small objects, such as mineral samples or animal or plant cells, typically magnified several hundred times
Answer:
A microscope is a laboratory instrument used to examine objects that are too small to be seen by the naked eyes.
two things every professional PowerPoint presentation should have
Which XXX declares a student's name. public class Student { XXX private double myGPA; private int myID; public int getID() { return myID; } } Group of answer choices String myName; public String myName; private myName; private String myName;
Which XXX declares a student's name.
public class Student {
XXX
private double myGPA;
private int myID;
public int getID() {
return myID;
}
}
Group of answer choices
a. String myName;
b. public String myName;
c. private myName;
d. private String myName;
Answer:private String myName;
Explanation:To declare a student's name, the following should be noted.
i. The name of the student is of type String
ii. Since all of the instance variables (myGPA and myID) have a private access modifier, then myName (which is the variable name used to declare the student's name) should be no exception. In other words, the student's name should also have a private access.
Therefore, XXX which declares a student's name should be written as
private String myName;
Option (a) would have been a correct option if it had the private keyword
Option (b) is not the correct option because it has a public access rather than a private access.
Option (c) is not a valid syntax since, although it has a private access, the data type of the variable myName is not specified.
Option (d) is the correct option.
What help in executing commands quickly
Answer:99
Explanation: Last summer, my family and I took a trip to Jamaica. My favorite part of the trip was when we went to a place called the Luminous Lagoon. We ate dinner and waited for the sun to go down. Then we boarded a boat and went out into the lagoon. That’s when the magic started.
At first we could not see very much in the darkness except for the stars in the sky. After a few minutes, however, I noticed some fish swimming in the water. They didn’t look like ordinary fish. These fish were glowing! Our guide explained that the glow came from tiny creatures in the water called dinoflagellates. These little animals are not visible to us, but their bodies produce light using something called bioluminescence, just like fireflies. There are so many of these creatures in Luminous Lagoon that the water around them seems to glow.
After our guide explained these facts to us, he told us to put our hands in the water. I was not sure if it would work, but I tried it. When I did, my hand looked like it belonged to a superhero! It was glowing bright blue. I hope someday I get to return to the Luminous Lagoon. The lights in the water were much more entertaining than the ones in the sky.
Problem:
audio
The Greek prefix dinos- means “whirling” and the Latin root word flagellum means “whip”. What does dinoflagellate most likely mean as it is used in the passage?
audio
the production of light from an organism’s body
audio
the study of creatures that live in the ocean
audio
to move around underwater water like a fish
audio
an organism with a whip-like part it uses to move around in the water
how we can richer interaction
A beneficial and pleasing user experience when operating an electronic device. In the future, rich interaction will be voice and speech recognition that actually recognizes anyone's spoken command and robotic devices that automatically assist people.
Write a program that reads a string and outputs the number of times each lowercase vowel appears in it. Your program must contain a function with one of its parameters as a string variable and return the number of times each lowercase vowel appears in it. Also write a program to test your function. (Note that if str is a variable of type string, then str.at(i) returns the character at the ith position. The position of the first character is 0. Also, str.length() returns the length of the str, that is, the number of characters in str.)
Answer:
Here the code is given as follows,
Explanation:
#include <iostream>
#include <string>
using namespace std;
void Vowels(string userString);
int main()
{
string userString;
//to get string from user
cout << "Please enter a string: ";
getline(cin,userString,'\n');
Vowels(userString);
return 0;
}
void Vowels(string userString)
{
char currentChar;
//variables to hold the number of instances of each vowel
int a = 0, e = 0, i = 0, o = 0, u = 0;
for (int x = 0; x < userString.length(); x++)
{
currentChar = userString.at(x);
switch (currentChar)
{
case 'a':
a += 1;
break;
case 'e':
e += 1;
break;
case 'i':
i += 1;
break;
case 'o':
o += 1;
break;
case 'u':
u += 1;
break;
default:
break;
}
}
// to print no of times a vowels appears in the string
cout << "Out of the " << userString.length() << " characters you entered." << endl;
cout << "Letter a = " << a << " times" << endl;
cout << "Letter e = " << e << " times" << endl;
cout << "Letter i = " << i << " times" << endl;
cout << "Letter o = " << o << " times" << endl;
cout << "Letter u = " << u << " times" << endl;
}
Hence the code and Output.
Please enter a string
Out of the 16 characters you entered.
Letter a = 2 times
Letter e = 1 times
Letter i = 0 times
Letter o = 1 times
Letter u = 0 times.
asdcvnmn bvcdxszasdfghjk.
Answer:
fewrugbrubpwerivrib
Explanation:
vbhresibvhresiupvkbjriururbvurfiuibvuefsbiuiuvuib
01 Describe all the possible component of a chart
Answer:
Explanation:
1) Chart area: This is the area where the chart is inserted. 2) Data series: This comprises of the various series which are present in a chart i.e., the row and column of numbers present. 3) Axes: There are two axes present in a chart. ... 4)Plot area: The main area of the chart is the plot area
To create a manual metric draft you should use: A. The architect scale B. The engineer scale C. The metric 1:100 scale
Answer:
Option C, The metric scale
Explanation:
The metric scale is used to draft manual metric draft drawings. The metric scale is generally represented as 1:100
Architect scale is used for interior and exterior dimensions of structures and buildings
Engineer's scale is used for detail drawings of structures referred to as working plans
Hence, option C is correct
You are tasked with writing a program to process sales of a certain commodity. Its price is volatile and changes throughout the day. The input will come from the keyboard and will be in the form of number of items and unit price:36 9.50which means there was a sale of 36 units at 9.50. Your program should read in the transactions (Enter at least 10 of them). Indicate the end of the list by entering -99 0. After the data is read, display number of transactions, total units sold, average units per order, largest transaction amount, smallest transaction amount, total revenue and average revenue per order.
Answer:
Here the code is given as,
Explanation:
Code:
#include <math.h>
#include <cmath>
#include <iostream>
using namespace std;
int main() {
int v_stop = 0,count = 0 ;
int x;
double y;
int t_count [100];
double p_item [100];
double Total_rev = 0.0;
double cost_trx[100];
double Largest_element , Smallest_element;
double unit_sold = 0.0;
for( int a = 1; a < 100 && v_stop != -99 ; a = a + 1 )
{
cout << "Transaction # " << a << " : " ;
cin >> x >> y;
t_count[a] = x;
p_item [a] = y;
cost_trx[a] = x*y;
v_stop = x;
count = count + 1;
}
for( int a = 1; a < count; a = a + 1 )
{
Total_rev = Total_rev + cost_trx[a];
unit_sold = unit_sold + t_count[a];
}
Largest_element = cost_trx[1];
for(int i = 2;i < count - 1; ++i)
{
// Change < to > if you want to find the smallest element
if(Largest_element < cost_trx[i])
Largest_element = cost_trx[i];
}
Smallest_element = cost_trx[1];
for(int i = 2;i < count - 1; ++i)
{
// Change < to > if you want to find the smallest element
if(Smallest_element > cost_trx[i])
Smallest_element = cost_trx[i];
}
cout << "TRANSACTION PROCESSING REPORT " << endl;
cout << "Transaction Processed : " << count-1 << endl;
cout << "Uints Sold: " << unit_sold << endl;
cout << "Average Units per order: " << unit_sold/(count - 1) << endl;
cout << "Largest Transaction: " << Largest_element << endl;
cout << "Smallest Transaction: " << Smallest_element << endl;
cout << "Total Revenue: $ " << Total_rev << endl;
cout << "Average Revenue : $ " << Total_rev/(count - 1) << endl;
return 0;
}
Output:
explain any two factors to consider when classifying computer systems
Answer:
The following classifications can be made of the computer systems:
1. According to size.
2. Functionality based on this.
3. Data management based.
Explanation:
Servers:-
Servers are only computers that are configured to offer clients certain services. Depending on the service they offer, they are named. For example security server, server database.
Workstation:-
These are the computers which have been designed mainly for single users. They operate multi-user systems. They are the ones we use for our daily business/personal work.
Information appliances:-
They are portable devices that perform a limited number of tasks such as basic computations, multimedia playback, internet navigation, etc. They are commonly known as mobile devices. It has very limited storage and flexibility and is usually "as-is" based.
Dan frequently organizes meetings and would like to automate the handling of the meeting responses. What should he
do to automatically move those responses into a subfolder?
O Configure an automatic reply.
O Configure the default meeting request options.
O Configure a Meeting Response Rule.
O Nothing, Dan must respond individually.
Answer:
Configure an automatic reply.
Explanation:
Dan's best option would be to configure an automatic reply. This reply will instantly be sent to any individual that messages Dan requesting a meeting. Once configured, Dan will no longer need to manually respond to each one of the messages and it will instead be handled automatically. These messages will also be automatically moved to the outbox where the messages that have been sent usually go.
Answer:
C
Explanation:
how can you reduce the size of icons on the Taskbar by using the control panel is there another method of doing the same using right click explain
Answer:
Right-click on any empty area of the taskbar and click “Taskbar Settings.” In the settings window, turn on the “Use small taskbar icons” option. As you can see, almost everything is the same except that the icons are smaller and you can cram a few more into the space.
A palindrome is a string that reads the same from left to right and from right to left. Design an algorithm to find the minimum number of characters required to make a given string to a palindrome if you are allowed to insert characters at any position
Answer:
Explanation:
The following code is written in Python. It is a recursive function that tests the first and last character of the word and keeps checking to see if each change would create the palindrome. Finally, printing out the minimum number needed to create the palindrome.
import sys
def numOfSwitches(word, start, end):
if (start > end):
return sys.maxsize
if (start == end):
return 0
if (start == end - 1):
if (word[start] == word[end]):
return 0
else:
return 1
if (word[start] == word[end]):
return numOfSwitches(word, start + 1, end - 1)
else:
return (min(numOfSwitches(word, start, end - 1),
numOfSwitches(word, start + 1, end)) + 1)
word = input("Enter a Word: ")
start = 0
end = len(word)-1
print("Number of switches required for palindrome: " + str(numOfSwitches(word, start, end)))
What are the basic characteristics of the linear structure in data structure
Explanation:
A Linear data structure have data elements arranged in sequential manner and each member element is connected to its previous and next element. This connection helps to traverse a linear data structure in a single level and in single run. Such data structures are easy to implement as computer memory is also sequential.
Write a program named prices.c that repeatedly asks users to enter the price of an item until they enter zero. Prices less than zero will be ignored. The program will then print the number of items purchased, the subtotal of the prices, the sales tax charged (at a rate of 7.5%), and the grand total.
Answer:
Explanation:
The following is written in Java. It creates a while loop that requests price from the user and goes adjusting the quantity and subtotal as more prices are added. If 0 is entered it breaks the loop and outputs the quantity, subtotal, tax, and grand total to the user.
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
int quantity = 0;
double subtotal = 0;
double tax, grandTotal;
while (true) {
System.out.println("Enter a price: ");
double price = in.nextDouble();
if (price == 0) {
break;
} else if (price > 0) {
quantity += 1;
subtotal += price;
}
}
tax = subtotal * 0.075;
grandTotal = subtotal + tax;
System.out.println("Quantity: $" + quantity);
System.out.println("Subtotal: $" + subtotal);
System.out.println("Tax: $" + tax);
System.out.println("GrandTotal: $" + grandTotal);
}
}
Which of the following Python methods is used to perform hypothesis testing for a population mean when the population standard deviation is unknown?
a. uttest(dataframe, null hypothesis value)
b. ztest(dataframe, null hypothesis value)
c. prop_1samp_hypothesistest(dataframe, n, alternative hypothesis value)
d. ttest_1samp(dataframe, null hypothesis value)
Answer:
B: ztest(dataframe, null hypothesis value)
The Python method that is used to perform a test of hypothesis for a population mean with an unknown population standard deviation is d. ttest_1samp(dataframe, null hypothesis value).
A t-test is normally applied when the population standard deviation is not known. The researcher will use the sample standard deviation.While the z-test can also be used in Python to perform hypothesis testing with a known population standard deviation and a sample size that is larger than 50, only the t-test can be applied with an unknown population standard deviation or a sample size less than 50.Thus, the only Python method to carry out hypothesis testing with unknown population standard deviation is the t-test, which is given in option d.
Learn more about hypothesis testing at https://brainly.com/question/15980493
Write a function called reverse Return that is almost the same job as reverse, but instead of printing the letters straight to the screen, it returns a String in which the letters have been reversed. The function call would look like:
Answer:
The function in Python is as follows:
def reverse(inputstr):
outputstr = ""
for i in inputstr:
outputstr = i + outputstr
return outputstr
Explanation:
This defines the function
def reverse(inputstr):
This initializes the output string
outputstr = ""
This iterates through the input string
for i in inputstr:
This generates the output string by reversing the input string
outputstr = i + outputstr
This returns the reversed string
return outputstr
Someone help in test ASAP
1. What is your biggest concern about cybercrime and why?
(please answer in at least 3 complete sentences)
Answer:
While it may seem like we are already overwhelmed by the amount of cyberattacks occurring daily, this will not slow down in 2018. In fact, with a recent increase in cybercriminal tools and a lower threshold of knowledge required to carry out attacks, the pool of cybercriminals will only increase. This growth is a likely response to news media and pop culture publicizing the profitability and success that cybercrime has become. Ransomware alone was a $1 billion industry last year. Joining the world of cybercrime is no longer taboo, as the stigma of these activities diminishes in parts of the world. To many, it’s simply a “good” business decision. At the same time, those already established as “top-players” in cybercrime will increase their aggressive defense of their criminal territories, areas of operations and revenue streams. We may actually begin to see multinational cybercrime businesses undertake merger and acquisition strategies and real-world violence to further secure and grow their revenue pipeline.
Explanation:
Write a public static method named print Array, that takes two arguments. The first argument is an Array of int and the second argument is a String. The method should print out a list of the values in the array, each separated by the value of the second argument.
For example, given the following Array declaration and instantiation:
int[] myArray = {1, 22, 333, 400, 5005, 9}; printArray(myArray, ", ") will print out 1, 22, 333, 400, 5005, 9
printArray(myArray, " - ") will print out 1 - 22 - 333 - 400 - 5005 - 9
Answer:
Here is the output.
Explanation:
import java.util.Arrays;
public class Main{
public static void main(String[] args){
int[] array={43,42,23,42,4,56,36,7,8,676,54};
System.out.println(Arrays.toString(array));
printArray(array,"*");
System.out.println(""+getFirst(array));
System.out.println(""+getLast(array));
System.out.println(Arrays.toString(getAllButFirst(array)));
System.out.println(""+getIndexOfMin(array));
System.out.println(""+getIndexOfMax(array));
System.out.println(Arrays.toString(swapByIndex(array, 1,2)));
System.out.println(Arrays.toString(removeAtIndex(array,3)));
System.out.println(Arrays.toString(insertAtIndex(array,3,65)));
}
//---1----
public static void printArray(int[] arr, String sep){
for(int i=0; i<arr.length-1;i++){
System.out.print(" "+arr[i]+" "+sep);
}
System.out.println(" "+arr[arr.length-1]);
}
//---2----
public static int getFirst(int[] arr){
return arr[0];
}
//---3----
public static int getLast(int[] arr){
return arr[arr.length-1];
}
//---4-----
public static int[] getAllButFirst(int[] arr){
int[] anotherArray=new int[arr.length-1];
for(int i=1; i<arr.length;i++){
anotherArray[i-1]=arr[i];
}
return anotherArray;
}
//---5------
public static int getIndexOfMin(int[] arr){
int index=0;
int min=arr[0];
for(int i=1; i<arr.length;i++){
if(min>arr[i]){
min=arr[i];
index=i;
}
}
return index;
}
//---6------
public static int getIndexOfMax(int[] arr){
int index=0;
int max=arr[0];
for(int i=1; i<arr.length;i++){
if(max<arr[i]){
max=arr[i];
index=i;
}
}
return index;
}
//---7------
public static int[] swapByIndex(int[] arr, int a , int b){
int temp=arr[a];
arr[a]=arr[b];
arr[b]=temp;
return arr;
}
//---8------
public static int[] removeAtIndex(int[] arr, int index){
int[] anotherArray = new int[arr.length - 1];
for (int i = 0, k = 0; i < arr.length; i++) {
if (i == index) {
continue;
}
anotherArray[k++] = arr[i];
}
// return the resultant array
return anotherArray;
}
//---9------
public static int[] insertAtIndex(int[] arr, int index, int element){
int[] anotherArray = new int[arr.length + 1];
for (int i = 0, k=0;k < arr.length+1; k++) {
if (k == index) {
anotherArray[k]=element;
continue;
}
anotherArray[k] = arr[i++];
}
// return the resultant array
return anotherArray;
}
//---10------
public static boolean isSorted(int[] arr){
for(int i=0; i<arr.length-1;i++){
if (arr[i+1]<arr[i]){
return false;
}
}
return true;
}
}
21
22
23
24
25
26
27
28
29
30
TIME REMA
01:08:
Which view is most often used to reorder slides in a presentation that has already been created?
HERE
ОО
Outline view
Slide Sorter view
O Reading view
O Normal view
Answer:
slide sorter view
Explanation:
Explanation: while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.
Slide sorter view. while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.
What is Slide sorter view?
You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view.
The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here.
All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in the PowerPoint Slide Sorter view
Therefore, Slide sorter view. while you can use 3/4 of these options to reorder slides, it is more common to use slide sorter view.
To learn more slide sorter view, refer to the link:
https://brainly.com/question/7696377
#SPJ7
4. All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent
through visual and auditory channels.
Communication includes both the verbal and nonverbal messages sent and received.
The goal of effective communication is mutual understanding.
You can improve your communication by improving your understanding of yourself, others,
and the context of the communication.
When you are listening to another person speak, you can avoid sending any messages by not
speaking and not making eye contact.
Answer:
D
Explanation:
Communication are happen when 2 people are response each other
It is not true that when you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact. The correct option is 4.
What is communication?The process of communicating information, concepts, ideas, or sentiments between two or more people through a variety of means and channels, including verbal and nonverbal communication, is referred to as communication.
It is a myth that you may avoid transmitting any messages when you are listening to someone else speak by remaining silent and avoiding eye contact.
Your body language and nonverbal communication, such as your facial expressions and eye contact, can still convey information to the speaker even if you are not replying verbally or establishing eye contact.
Hence, even if a message is unintended or nonverbal, all types of communication entail sending and receiving messages.
Thus, the correct option is 4.
For more details regarding communication, visit:
https://brainly.com/question/22558440
#SPJ2
Your question seems incomplete, the probable complete question is:
All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent through visual and auditory channels.Communication includes both the verbal and nonverbal messages sent and received. The goal of effective communication is mutual understanding.You can improve your communication by improving your understanding of yourself, others, and the context of the communication.When you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact.Write a C class, Flower, that has three member variables of type string, int, and float, which respectively represent the name of the flower, its number of pedals, and price. Your class must include a constructor method that initializes each variable to an appropriate value, and your class should include functions for setting the value of each type, and getting the value of each type.
Answer and Explanation:
C is a low level language and does not have classes. The language isn't based on object oriented programming(OOP) but is actually a foundation for higher level languages that adopt OOP like c++. Using c++ programming language we can implement the class, flower, with its three variables/properties and functions/methods since it is an object oriented programming language.
the brain of the computer that does calculation moving and processing of information
Explanation:
The computer brain is a microprocessor called the central processing unit (CPU). The CPU is a chip containing millions of tiny transistors. It's the CPU's job to perform the calculations necessary to make the computer work -- the transistors in the CPU manipulate the data. You can think of a CPU as the decision maker.
which of the following is not a hardware component a) input devices b)storage devices c)operating systems d)processing
Answer:
C. Operating systems
Explanation:
Operating systems are software components, not hardware. (Think about Apple OS or Android, they are softwares that are ON the hardware, which is the physical device.)
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on the user’s/attacker’s screen and does not modify data stored on the server.
Answer:
" Non-persistent" is the right response.
Explanation:
A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.Matts has finished running some security automation scripts on three newly deployed Linux servers. After applying intrusion detection, virus, and malware protection on the Linux images, he notices an increase in which VM metric on his server management dashboard?
A. DMA.
B. BIOS.
C. CPU.
D. IPsec.
E. I/O.
Answer: CPU
Explanation:
The management dashboard refers to the tool that's used in the presentation of the vital k management KPIs in a single place, which is efficiently managed in order to make faster and better decisions.
Based on the information given, after the application of intrusion detection, virus, and malware protection on the Linux images, he will notices an increase in CPU on his server management dashboard.
Therefore, the correct option is C.
LAB: Warm up: Drawing a right triangle This program will output a right triangle based on user specified height triangle_height and symbol triangle_char. (1) The given program outputs a fixed-height triangle using a character. Modify the given program to output a right triangle that instead uses the user-specified triangle_char character. (1 pt) (2) Modify the program to use a loop to output a right triangle of height triangle_height. The first line will have one user-specified character, such as % or* Each subsequent line will have one additional user-specified character until the number in the triangle's base reaches triangle_height. Output a space after each user-specified character, including a line's last user-specified character. (2 pts) Example output for triangle_char = % and triangle_height = 5: Enter a character: Enter triangle height: 5 273334.1408726 LAB ACTIVITY 16.6.1: LAB: Warm up: Drawing a right triangle 0/3 main.py Load default template... 1 triangle_char - input('Enter a character:\n') 2 triangle_height = int(input('Enter triangle height:\n')) 3 print('') 4 5 print ('*') 6 print ("**') 7 print ("***') 8
Answer:
The modified program in Python is as follows:
triangle_char = input('Enter a character:\n')
triangle_height = int(input('Enter triangle height:\n'))
for i in range(triangle_height):
print(triangle_char * (i+1))
Explanation:
This gets the character from the user
triangle_char = input('Enter a character:\n')
This gets the height of the triangle from the user
triangle_height = int(input('Enter triangle height:\n'))
This iterates through the height
for i in range(triangle_height):
This prints extra characters up to the height of the triangle
print(triangle_char * (i+1))
Here's the modified program that incorporates the requested changes:
python
Copy code
triangle_char = input('Enter a character:\n')
triangle_height = int(input('Enter triangle height:\n'))
print('')
for i in range(1, triangle_height + 1):
line = triangle_char * i + ' ' * (triangle_height - i)
print(line)
This program uses a loop to iterate from 1 to triangle_height. In each iteration, it creates a line by concatenating triangle_char repeated i times with spaces (' ') repeated (triangle_height - i) times. The resulting line is then printed.
For example, if the user enters % as the character and 5 as the height, the output will be to make sure to maintain the indentation properly in your code for it to work correctly.
Learn more about python on:
https://brainly.com/question/30391554
#SPJ6