Answer:
Could be a defect on the charge port for the Iphone s6. There are inexpensive way to fix that problem. Super cheap parts and kits to help online to buy.
find the summation of even number between (2,n)
Answer:
The program in python is as follows:
n = int(input("n: "))
sum = 0
for i in range(2,n+1):
if i%2 == 0:
sum+=i
print(sum)
Explanation:
This gets input n
n = int(input("n: "))
This initializes sum to 0
sum = 0
This iterates through n
for i in range(2,n+1):
This checks if current digit is even
if i%2 == 0:
If yes, take the sum of the digit
sum+=i
Print the calculated even sum
print(sum)
2. A data catalog identifies all of the following, except: a. Attribute data type b. Attribute range of values c. Attribute constraints d. Attribute value for Instructor ID
Answer:
c. Attribute constraints
Explanation:
A data catalog identifies all of the following, except: "Attribute constraints"
The above statement is TRUE because a Data Catalog, a metadata management service, operates by searching for key data, understand and manage data for usefulness.
Data Catalog checks on the BigQuery datasets, tables, and views and checks both technical and business metadata by identifying the following attributes:
1. Data type
2. Range of values
3. Value for Instructor ID
Please help me with this question
Answer:
2
Explanation:
evaluate the formula for n=2, then it says:
a₂ = 2a₁ - 3·2
So
a₂ = 2·4 - 3·2 = 8-6
a₂ = 2
A) Why should assembly language be avoided for general application development?
B) Under what circumstances would you argue in favor of using assembly language for developing an assembly language program?
C) What are the advantages of using a compiled language over an interpreted one?
D) Under what circumstances would you choose to use an interpreted language?
Answer:
(A) Assembly language should be avoided for general application development for the following reasons:
i. It is difficult to write assembly language codes. It does not contain many tools and in-built functions to help with the development of these applications.
ii. Since general application development requires that the application be machine independent, writing such applications in assembly language (which is a low level, machine dependent language) might be a pain as it would require that the writer have sufficient knowledge of hardware and operating systems.
(B) The following are the circumstances where assembly language should be used:
i. Assembly languages are low level languages that are very close to machine languages that the machine or processor understands. Therefore, when writing codes for programs that should directly communicate with the processor, assembly language should be used.
ii. Since assembly language codes are machine dependent, when there is a need to write applications for target machines, they should be used.
iii. If there is a need to have very great control of certain features of your application and resources to be consumed such as amount of RAM, clock speed e.t.c, assembly languages are a great tool.
(C) Some of the advantages of compiled language over an interpreted language are:
i. Compiled languages are way faster than interpreted languages because the compiled languages are converted directly into native machine codes that are easy for the processor to execute. Put in a better way, with compiled languages, codes are compiled altogether before execution and therefore reduces the overhead caused at run time. Interpreted languages on the other hand executes codes line after line thereby increasing the overhead at run time.
ii. Since codes are compiled first before execution in compiled languages, nice and powerful optimizations can be applied during the compilation stage.
(D) Interpreted languages could be chosen over compiled languages for the following reasons:
i. Interpreted languages are much more flexible and easier to implement than compiled languages as writing good compilers is not easy.
ii. Since interpreters don't need to convert first to intermediary codes as they execute these codes themselves, programs built with interpreters tend to be platform independent.
Horizontal Navigation List Styles
Go to the Horizontal Navigation List Styles section. Karen has added a second navigation list that she wants to display horizontally. For all list items within the horizontal navigation list, create a style rule that displays the items as blocks with a width of 12.5% floated on the left margin.
Here is my code:
/* Horizontal Navigation List Styles */
.horizontal li {
display: block;
width: 12.5%;
float: left;
}
It's coming through as just a line and I have no idea how to fix it, please help!
Answer:
Explanation:
The best way to do this would be to use the following line of code
clear: left;
This would make sure that there are no floating elements (li's in this scenario) on the left side of each element. Which in this navigation list would be each individual element, causing it to move each element underneath the previous element. Therefore the entire CSS code would be
.horizontal li {
display: block;
width: 12.5%;
float: left;
clear: left;
}
An example can be seen in the attached picture below.
List and describe at least two (2) very specific advantages of the CIF approach for enterprise-scale data warehousing for this company
Answer:
di ko po alam pa help po
Explanation:
pllssss
Write a program Ticket.py that will allow the user to enter actual speed
limit, the speed limit at which the offender was travelling, and the number
of previous tickets that person has received. The application should
calculate and display how many miles over the speed limit the offender
was travelling, the cost of the speeding ticket, and court cost. Use $10.00
as the amount to be charged for each mile per hour over the speed limit.
The court cost should be $50.00
Answer:
Following are the code to the given question:
def speedlimit():#defining a method speedlimit
a= int(input("Enter the offender's speed in mph: "))#defining a variable for input value
lim = int(input("Enter the speed limit in mph: "))#defining a variable for input value
n = int(input("The number of previous tickets that person has received: "))#defining a variable for input value
if (lim >= 20) and (lim < 70):#defining if block to check speed is between 20 to 70
if a > lim:#use if to check lim value greater than a
print("Driver was going", a-lim, "mph over the limit.")#print calculated value with message
print("The cost of the speeding ticket $",10*(a-lim))#print calculated value with message
else:
print( "Driver was going at a legal speed.")#print message
else:
print('Invalid speed limit.')#print calculated value with message
print("Court cost $",(50 + n*20))#print calculated value with message
speedlimit()
Output:
Please find the attached file.
Explanation:
In this code, a method "speedlimit" is declared that defines three variables that are "a, lim, and n" in which we input value from the user-end.
Inside the method, a nested conditional statement is used that checks the speed value is between 20 to 70 if it is true it will go to the next condition in which it checks lim value greater than a. It will use a print message that will print the calculated value with the message.
Write a C++ program that creates a map containing course numbers and the room numbers of the rooms where the courses meet. The dictionary should have the following key-value pairs:
Course Number (key) Room Number (value)
CS101 3004
CS102 4501
The program should also create a map containing course numbers and the names of the instructors that teach each course. The map should have the following key-value pairs:
Course Number (key) Instructor (value)
CS101 Haynes
CS102 Alvarado
The program should also create a map containing course numbers and the meeting times of each course. The map should have the following key-value pairs:
Course Number (key) Meeting Time (value)
CS101 8:00am
CS102 9:00am
The program should let the user enter a course number, and then it should display the course's room number, instructor, and meeting time.
Answer:
Program approach:-
Using the necessary header file.Using the standard namespace I/O.Define the integer main function.Mapping course numbers and room numbers.Explanation:
//header file
#include<iostream>
#include<map>
//using namespace
using namespace std;
//main function
int main(){
//creating 3 required maps
map <string,int> rooms;
map <string,string> instructors;
map <string,string> times;
//mapping course numbers and room numbers
rooms.insert(pair<string,int>("CS101",3004));
rooms.insert(pair<string,int>("CS102",4501));
//mapping course numbers and instructor names
instructors.insert(pair<string,string>("CS101","Haynes"));
instructors.insert(pair<string,string>("CS102","Alvarado"));
//mapping course numbers and meeting times
times.insert(pair<string,string>("CS101","8:00am"));
times.insert(pair<string,string>("CS102","9:00am"));
char choice='y';
//looping until user wishes to quit
while(choice=='y' || choice=='Y'){
cout<<"Enter a course number: ";
string course;
cin>>course;//getting course number
//searching in maps for the required course number will return
//an iterator
map<string, int>::iterator it1=rooms.find(course);
map<string, string>::iterator it2=instructors.find(course);
map<string, string>::iterator it3=times.find(course);
if(it1!=rooms.end()){
//found
cout<<"Room: "<<it1->second<<endl;
}else{
//not found
cout<<"Not found"<<endl;
}
if(it2!=instructors.end()){
cout<<"Instructor: "<<it2->second<<endl;
}
if(it3!=times.end()){
cout<<"Meeting Time: "<<it3->second<<endl;
}
//prompting again
cout<<"\nDo you want to search again? (y/n): ";
cin>>choice;
}
In a non-price rationing system, consumers receive goods and services first-come, first served. Give me an example of a time when a consumer may experience this.
When someone may be giving away something for free.
What new details are you able to see on the slide when the magnification is increased to 10x that you could not see at 4x? What about 40x?
Answer:
x=10
Explanation:
just need points because i can scan questions anymore
Which types of scenarios would the NETWORKDAYS function help calculate? Check all that apply.
Answer:
A. days of vacation time left
B. days of school left in the year
D. years of service someone performed
Explanation:
The NETWORKDAYS function is a built in excel function which makes it easy to calculate the number of days between two specified dates the start date and the end date, this function when applied excludes weekends from the days calculated and one has the opportunity of specifying certain holidays. With this function. The number of days till vacation, the number school days left. The NETWORKDAYS is a very versatile function.
what is the best motivation that you can do/give to make your employees stay?
i'd give fringe benefits to them every month
Explanation:
to encourage them to work on the mission statement and the business goal
Kesley has been hired to set up a network for a large business with ten employees. Which of the factors below will be
least important to her in designing the company's network?
the tasks performed by each computer on the network
the number of hours each employee works
O the number of computers that will be on the network
the way in which business documents are shared in the organization
TURN IT IN
NEXT QUESTION
ASK FOR HELP
Question 6 Which of the following statements about datasets used in Machine Learning is NOT true? 1 point Testing data is data the model has never seen before and is used to evaluate how good the model is Training subset is the data used to train the algorithm Validation data subset is used to validate results and fine-tune the algorithm's parameters Training data is used to fine-tune algorithm’s parameters and evaluate how good the model is
Answer:
Training data is used to fine-tune the algorithm’s parameters and evaluate how good the model is
Explanation:
The statement about datasets used in Machine Learning that is NOT true is "Training data is used to fine-tune algorithm’s parameters and evaluate how good the model is."
This is based on the fact that a Training dataset is a process in which a dataset model is trained for corresponding it essentially to fit the parameters.
Also, Testing the dataset is a process of examining the performance of the dataset. This refers to hidden data for which predictions are determined.
And Validation of dataset is a process in which results are verified to perfect the algorithm's details or parameters
For this activity, you will practice being both proactive and reactive to bugs. Both are necessary to get rid of errors in code.
Proactive:
Log in to REPL.it and open your Calculator program that you built in Unit 5.
In the index.js file, type and finish the following block of code that validates the input to make sure both are numbers (not letters or symbols):
try{
if (isNaN(…) || isNaN(…)){
throw …
}
else{
document.getElementById("answer").innerHTML = num1 + num2;
}
}
catch(e){
document.getElementById("answer")…
}
(Note: The || symbol is used in JavaScript to mean or . You can find this key to the left of the Z key if you’re using a PC or directly above the Enter key if you’re using a Mac.)
Add the finished code above to the correct place in your add() function. Make sure to delete this line since we moved it into the try block:
document.getElementById("answer").innerHTML = num1 + num2;
Paste the same code into the subtract() , multiply() , and divide() functions, making the necessary changes. Be careful with your divide() function since you already have an extra if else statement checking for a division by 0 mistake. (Hint: Cut and paste the entire if else statement inside the else block of your try statement.)
Test your program by typing in letters or symbols instead of numbers. Make sure you get the appropriate error message. (Note: The function is not supposed to check whether the text field is empty, only whether it contains non-numbers.)
When you are finished, share the link to your webpage with your teacher by clicking on the share button and copying the link.
Reactive:
The following Python program should print the sum of all the even numbers from 0 to 10 (inclusive), but it has two bugs:
x = 0
sum = 0
while x < 10:
sum = sum + x
x = x + 1
print(sum)
Complete a trace table and then write a sentence or two explaining what the errors are and how to fix them. You can choose whether to do the trace table by hand or on the computer. Turn in your trace table and explanation to your teacher.
Answer:
okk
Explanation:
Suppose that in a 00-11 knapsack problem, the order of the items when sorted by increasing weight is the same as their order when sorted by decreasing value. Give an efficient algorithm to find an optimal solution to this variant of the knapsack problem, and argue that your algorithm is correct.
Answer:
Following are the response to the given question:
Explanation:
The glamorous objective is to examine the items (as being the most valuable and "cheapest" items are chosen) while no item is selectable - in other words, the loading can be reached.
Assume that such a strategy also isn't optimum, this is that there is the set of items not including one of the selfish strategy items (say, i-th item), but instead a heavy, less valuable item j, with j > i and is optimal.
As [tex]W_i < w_j[/tex], the i-th item may be substituted by the j-th item, as well as the overall load is still sustainable. Moreover, because [tex]v_i>v_j[/tex] and this strategy is better, our total profit has dropped. Contradiction.
Write a python program that will accept monthly salary amounts greater than zero but less
than or equal to 400,000.00 until the user enters the character ‘e’. After the user
enters the character ‘e’, calculate the net pay of all salaries by deducting income tax at
a rate of 25%, pension of 5% and housing contribution of 2% from each salary
entered. Additionally, print the number of salaries that were entered in the program
along with the number of salaries that exceed 300,000.00
Answer:
b=0
c=0
lol=list()
while True:
salary=input("Enter your salary: ")
if salary=="e" or salary=="E":
print("Thankyou!!")
break
else:
a=int(salary)
if a>=300000 and a<=400000:
c=c+1
if a<0 or a>400000:
print("Your salary is either too small or too big ")
if a>0 and a<=400000:
a=a-(25/100*a)-(5/100*a)-(2/100*a)
lol.append(a)
b=b+1
if a>=300000:
c=c+1
print(lol)
print("The number of salaries entered is: "+ str(b))
print("The number of salaries that exceeded 300000 is: "+str(c))
Consider the following class definitions.
public class Apple
{
public void printColor()
{
System.out.print("Red");
}
}
public class GrannySmith extends Apple
{
public void printColor()
{
System.out.print("Green");
}
}
public class Jonagold extends Apple
{
// no methods defined
}
The following statement appears in a method in another class.
someApple.printColor();
Under which of the following conditions will the statement print "Red" ?
I. When someApple is an object of type Apple
II. When someApple is an object of type GrannySmith
III. When someApple is an object of type Jonagold
a. I only
b. II only
c. I and III only
d. II and III only
e. I, II, and III
mention 3 components that can be found at the back and front of the system unit
Answer:
Back
Power port, USB port, Game port
Front
Power button, USB port, Audio outlet
Explanation:
There are several components that can be found on the system unit.
In most (if not all) computer system units, you will find more component at the back side than the front side.
Some of the components that can be found at the back are:
Ports for peripherals such as the keyboard, mouse, monitor, USB ports, power port, etc.
Some of the components that can be found at the back are:
The power button, cd rom, audio usb ports, several audio outlets, video port, parallel ports, etc.
Note that there are more components on the system units. The listed ones are just a fraction of the whole components
It has been a hectic day for the cyber security team. The team is struggling to decide to which incident to devote the most resources. You are estimating the amount of time taken to recover from each incident Which scope factor are you considering?
Answer:
This definitely is a project management question. The scope factors to be considered are:
Varying Resource Levels Time FactorCompliance with Regulatory Factors Requirements of Stakeholders Quality of Management RisksLegal FactorsExplanation:
Any element or factor that can advantageously advance a project or negatively impact it is usually referred to as Project Scope Factor.
It is considered a desirable or nice-to-have ability to be able to spot these factors to the end that the positive ones are enhanced whilst negative ones are mitigated.
Failure, for instance, to timeously and properly identify factors that can negatively impact a project is most likely to result in a negative outcome.
Cheers
JavaAssignmentFirst, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==> Close All Projects).Then create a new Java application called "BackwardsStrings" (without the quotation marks) that:Prompts the user at the command line for one 3-character string.Then (after the user inputs that first 3-character string) prompts the user for another 3-character string.Then prints out the two input strings with a space between them.Finally prints on a separate line the two input strings 'in reverse' (see example below) with a space between them.So, for example, if the first string is 'usr' and the second string is 'bin', your program would output something like the following:The two strings you entered are: usr bin.The two strings in reverse are: nib rsu.Note that the reversed SECOND string comes FIRST when printing the strings in reverse.my result/*Name: Saima SultanaLab:PA - BackwardsStrings (Group 2)*/package backwardsstrings;import java.util.Scanner;public class BackwardsStrings { public static void main(String[] args) { //variables String first, second; // TODO code application logic here StringBuilder firstReversed= new StringBuilder(); StringBuilder secondReversed= new StringBuilder(); Scanner input = new Scanner(System.in); // read strings first=input.nextLine(); second=input.nextLine(); // print out the input strings System.out.println("The two string you entered are:"+ first+" "+second+"."); // reverse the strings for ( int i=first.length()-1;i>=0; i--) firstReversed.append(first.charAt(i)); for ( int i=second.length()-1;i>=0; i--) secondReversed.append(second.charAt(i));// print out the reverse string System.out.println("The two strings in reverse are:"+secondReversed+" "+ firstReversed+ ".");}}
Answer:
Your program would run without error if you declared the first and second string variables before using them:
Modify the following:
first=input.nextLine();
second=input.nextLine();
to:
String first=input.nextLine();
String second=input.nextLine();
Explanation:
Required
Program to print two strings in forward and reversed order
The program you added is correct. The only thing that needs to be done is variable declarations (because variables that are not declared cannot be used).
So, you need to declared first and second as strings. This can be done as follows:
(1) Only declaration
String first, second;
(2) Declaration and inputs
String first=input.nextLine();
String second=input.nextLine();
A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as: Group of answer choices cybervandalism. driveby downloading. war driving. sniffing. driveby tapping.
Answer:
war driving.
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Generally, the two (2) essential privacy concerns in the field of cybersecurity are knowing how personal data are collected and essentially how they're used by the beneficiaries or end users.
War driving can be defined as a form of cyber attack which typically involves having eavesdroppers in a moving vehicle drive by buildings or park outside so as to avail them the opportunity of intercepting a wireless network traffic using a smartphone or laptop computer and illegitimately obtain sensitive user informations for further unauthorized use or to perform other fraudulent activities.
Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
O No messages will ever be blocked from the user's mailbox.
Messages can still be blocked at the server level.
O Messages cannot be blocked at the network firewall.
O Most obvious spam messages will still reach the client computer,
PLEASE ANSWER CORRECTLY WILL GIVE 15pts
Why is Java declining in popularity?
Answer:
other languages are increasing in popularity
Explanation:
The simple main reason for this is that other languages are increasing in popularity. There are many open-source languages that are being optimized constantly and upgraded with new features. The ability for these languages to perform many tasks better than Java makes it the obvious choice when a developer is choosing a language to develop their program on. Two of these languages are Javascript and Python. Both can do everything that Java can and with less code, faster, and cleaner.
outline 3 computer system problem that could harm people and propose the way avoid the problem
Answer:
outline 3 computer system problem that could harm people and propose the way avoid the problem are :_
Computer Won't Start. A computer that suddenly shuts off or has difficulty starting up could have a failing power supply. Abnormally Functioning Operating System or Software. Slow Internet.
What is the use of Name Box in MS-Excel?
Answer:
To be able to set a variable or set value for a specific box or collum of boxes.
You are designing an application at work that transmits data records to another building in the same city. The data records are 500 bytes in length, and your application will send one record every 0.5 seconds
Is it more efficient to use a synchronous connection or an asynchronous connection? What speed transmission line is necessary to support either type of connection? Show all your work.
Solution :
It is given that an application is used to transmit a data record form one building to another building in the same city, The length of the data records is 500 bytes. and the speed is 0.5 second for each record.
a). So for this application, it is recommended to use a synchronous connection between the two building for data transfer as the rate data transfer is high and it will require a master configuration between the two.
b). In a synchronous connection, 500 bytes of data can be sent in a time of 0.5 sec for each data transfer. So for this the line of transmission can be either wired or wireless.
what is function of spacebar
Answer:
The function of a spacebar is to enter a space between words/characters when you're typing
To input a space in between characters to create legible sentences
You would like to upgrade the processor in your system to a 64-bit processor. Which of the components will you most likely need to upgrade as well to take full advantage of the new processor
Answer: Operating system
Explanation:
The components that will be required to upgrade as well to take full advantage of the new processor is the Operating system.
The operating system manages the software resources and the computer hardware, through the provision of common services for the computer programs. It simply supports the basic function of the computer like task scheduling
Write a C++ program that reads a number and determines whether the number is positive, negative or zero using Switch operator method
Answer:
#include <iostream>
using namespace std;
template <typename T> int sgn(T val) {
return (T(0) < val) - (val < T(0));
}
int main()
{
cout << "Enter a number: ";
int number;
cin >> number;
switch (sgn(number)) {
case -1: cout << "The number is negative";
break;
case 0: cout << "The number is zero";
break;
case 1: cout << "The number is positive";
break;
}
}
Explanation:
You need the special sgn() function because a switch() statement can only choose from a list of discrete values (cases).