Explanation:
customer order processingfinancial transactions production and inventory control payrollhope it is helpful to you
The step-by-step procedure to solve any problem is called an
Answer:
Algorithm
Explanation:
Assume there are two variables, k and m, each already associated with a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of perfect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square of another integer (in this case 3*3, 4*4, 5*5, 6*6 respectively).) Associate the number you compute with the variable q. For example, if k and m had the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36,.
PYTHON CODING
Answer:
import math
def isPerfectSquare(n):
s = int(math.sqrt(n))
return n == s*s
def countPerfectSquares(k,m):
q = 0
for i in range(k,m):
if isPerfectSquare(i):
q=q+1
return q
print(countPerfectSquares(10,40))
Explanation:
Note that this is including the k, but excluding m. If you want to include m, write m+1 in the range expression.
A company has recently adopted a hybrid cloud architecture and is planning to migrate a database hosted on-premises to AWS. The database currently has over 50 TB of consumer data, handles highly transactional (OLTP) workloads, and is expected to grow. The Solutions Architect should ensure that the database is ACID-compliant and can handle complex queries of the application.
Which type of database service should the Architect use?
A. Amazon Redshift
B. Amazon DynamoDB
C. Amazon Aurora
D. Amazon RDS
Answer: Amazon Aurora
Explanation:
Amazon Aurora is a fully managed service which is vital in saving time through the automation of time consuming tasks like recovery, backup, provisioning, patching, repair, and failure detection.
Amazon Aurora also allows the encryption of databases through the use of keys that are managed through the AWS Key Management Service. Therefore, based on the information given the question, type of database service that the Architect should use is Amazon Aurora.
i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?
Answer:
In theory yes it is gonna be pretty hard but it is very possible
1.can you identify the materials needed in making simple doorbell ???
2.what is the use of each material or tool needed in making simple doorbell?????
pakianswer po ng maayos
Answer:
1. rotary tool, spray paint, light, drill,
Explanation:
It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.
Answer:
A. after you've created the presentation.
Explanation:
A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.
Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.
Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to
Answer:
The program in Python is as follows:
#1
for i in range(10):
print("MrRoyal",end=" ")
print()
#2
for i in range(1,50,2):
print(i,end=" ")
print()
#3
for i in range(0,101,5):
print(i,end=" ")
print()
#4
i = 1
while i <=10:
print(i,end =" ")
i+=1
#5
myfile = open("People.txt", "r")
eachLine = myfile.readline()
while eachLine:
print(eachLine)
eachLine = myfile.readline()
myfile.close()
Explanation:
The program in Python is as follows:
Program #1
This iterates from 1 to 10
for i in range(10):
This prints the name for each iteration [modify to your name]
print("MrRoyal",end=" ")
This prints a new line
print()
Program #2
This iterates from 1 to 49 with an increment of 2
for i in range(1,50,2):
This prints the odd numbers in the above range
print(i,end=" ")
This prints a new line
print()
Program #3
This iterates from 0 to 100 with a step of 5
for i in range(0,101,5):
This prints every 5th number
print(i,end=" ")
Print a new line
print()
Program #4
This initializes the number to 1
i = 1
This opens the file in an append mode
f = open("myfile.txt", "a")
This loop is repeated from 1 to 10
while i <=10:
This writes each number to the file
f.write(str(i))
Increment the number by 1
i+=1
Close the file
f.close()
Program #5
This opens the file in a read mode
myfile = open("People.txt", "r")
This reads each line
eachLine = myfile.readline()
This loop is repeated for every line
while eachLine:
Print the content on the line
print(eachLine)
Read another line
eachLine = myfile.readline()
Close the file
myfile.close()
can you help me here please
Explanation:
1) ethiCal : he is a good person to be socialized .
unethical : he should not trust the people so easily that he have never met and gave the password to them
2) ethical: she is a good girl to login in time and kepp only respected points
unethical : she should have Ateach her friends that they should not fight and discuss the right answer correctly
If an if- else statement is true, it will include which kinds of results?
In an if...else statement, if the code in the parenthesis of the if statement is true, the code inside its brackets is executed. But if the statement inside the parenthesis is false, all the code within the else statement's brackets is executed instead.
Of course, the example above isn't very useful in this case because true always evaluates to true. Here's another that's a bit more practical:
#include <stdio.h>
int main(void) {
int n = 2;
if(n == 3) { // comparing n with 3 printf("Statement is True!\n");
}
else { // if the first condition is not true, come to this block of code
printf("Statement is False!\n"); } return 0;
}
Output:
Statement is False!
An attacker has been successfully modifying the purchase price of items purchased at a web site. The security administrators verify the web server and Oracle database have not been compromised directly. They have also verified the IDS logs and found no attacks that could have caused this.
What is the mostly likely way the attacker has been able to modify the price?
A. By using SQL injection
B. By changing hidden form values in a local copy of the web page
C. By using cross site scripting
D. There is no way the attacker could do this without directly compromising either the web server or the database
Steeler corporation is planning to sell 100,000 units for 2.00 per unit and will break even at this level of sales fixed expenses will be 75,000 what are the company's variable expenses per unit
Answer:
1.25 per unit
Explanation:
Number of units to sell = 100,000
Price per unit = 2
Fixed expense = 75000
At break even point :
Revenue = total expenses
Total expenses = fixed cost + variable cost
Let variable cost = x
Revenue = units to sell * price per unit
Revenue = 100,000 * 2 = 200,000
Hence,
Fixed cost + variable cost = Revenue
75000 + x = 200,000
x = 200, 000 - 75000
x = 125,000
Variable cost = 125,000
The variable expense per unit is thus :
Variable expense / number of units
125,000 / 100,000 = 1.25 per unit
Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.
Answer:
They are inappropriate
fallouts: Access denial and data theft
Explanation:
Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.
Access denial and data theft are the fallouts associated with DOS and DDos attacks
All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages
Answer:
hard copy attachments
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).
An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.
The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.
However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.
In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.
>What is the output of the following code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )
Answer:
Given code output is "786".
Explanation:
Code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter
print (list1[1] )#use a print method that prints list index value
In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.
Write a HTML code for displaying the following
i need an answer urgently
Answer:
Following are the code to the given question:
Explanation:
<html>
<body>
<p align="center" >VOCATIONAL SUBJECT</p>
<table align="center" border="2">
<tr>
<td rowspan="2">YEAR</td>
<td colspan="5">Vocational course</td>
</tr>
<tr>
<td rowspan="1">IT</td>
<td rowspan="1">CS</td>
<td rowspan="1">EL</td>
</tr>
<tr>
<td colspan="1">2016</td>
<td colspan="1">66</td>
<td colspan="1">68</td>
<td colspan="1">60</td>
</tr>
<tr>
<td colspan="1">2017</td>
<td colspan="1">77</td>
<td colspan="1">78</td>
<td colspan="1">80</td>
</tr>
<tr>
<td colspan="1">2018</td>
<td colspan="1">60</td>
<td colspan="1">67</td>
<td colspan="1">70</td>
</tr>
</table>
</body>
</html>
Select the correct answer.
Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?
A. A to F
B. A to H
C. A to M
D. A to J
Answer is Hexadecimal : A. A to F
What is the Full form of DC?
Answer:
Deputy Commissioner.
Answer:
the full form of DC is deputy commissioner
Two uses of mortise chisel
Answer:
Two uses of the mortise chisel are;
1) Mortise chisel are used for cutting across the grain of the wood directly and also
2) To lever waste materials out of the cut area and smoothen the cut area
Explanation:
A mortice is a recessed hole created in a part that is meant to accommodate a complementary projection part, which will enable the fastening of the two parts together
A mortise chisel are chisels used for the chopping out mortise joints, and are designed such that the heavy impact of a mallet
it is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together
Answer:
Cable ties
Explanation:
Used to bundle cables neatly inside and outside of a computer. It is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together.
>3
[tex]\boxed{Parts\: organizer}[/tex] is used to hold screws, jumpers, fasteners, and other small parts and prevent them from getting mixed together.
[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]
What are the uses of DVD Ram
Answer:
Like ordinary random access memory (RAM), it can be repeatedly read, written to, and erased. Intended mostly for removable computer storage, DVD-RAM provides the capabilities of Rewriteable CD (CD-RW) - users can run programs from the discs, copy files to them and rewrite or delete them.
Name the function for output in python.
Answer:
We use the print() function to output data to the standard output device (screen). We can also output data to a file, but this will be discussed later. An example of its use is given below.
Answer:print()
Explanation:As said above. Print is what we use in python (:
IT technicians are setting up a new file server for a school. Describe the benefits and
drawbacks of using a command line interface (CLI) rather than a graphical user interface
(GUI) to set up a new file server.
Answer:
The benefits of using the command line interface for setting up a file server are;
1) The command line interface (CLI) is faster than other interfaces and can easily handle tasks which are repeating such as creating folders for users on the server
2) The CLI requires less time for processing with the CPU, and it takes up less memory such that the file Server is not slowed down during the file setup process
3) The system resources required are few
The drawbacks are;
1) The CLI is confusing to those who are not exposed to programming as the commands the user needs to learn to before they can setup setup the new file server
2) The users needs to be very accurate in terms of spelling errors as that will lead to failure of the program, there are no spell check, and a mistype can lead to the entire coding process being restarted from the beginning
Explanation:
Draw an electic bettle and label 3.
Explanation:
hope it helps thank you❤
is solar energy reliable and powerful enough to be used in home or business
Answer:
It all depends on what you are prepared to spend and what sort of system you install. I have both grid tie and stand alone systems installed at my home, and both work really well, although we initially had some inverter problems with the grid tie system until we decided to only use top shelf gear.
We have 6.6 kW grid tie system on the roof of the house which supplies around 3 times our requirements, and a 1.5 kW stand alone system that supplies the backyard workshop and pool pump. The grid tie system cost around $6500 to install, and the small stand alone system cost $4500 although this was designed and built by myself, so a purchased system may well be more (batteries are still expensive, but this price is coming down).
In the current configuration (top tier panels, Fronius grid tie inverter and Victron stand alone inverter and charge regulator), we have had no failures in several years, and power bills are something that happen to other people.
My advice is look at what your requirements are, then double that when you spec out your system and don’t go for the cheapest price. Buy your components based on the quality and reputation of the manufacturer, it will be expensive, but you will save money in the long run. A good manufacturer will guarantee their products for at least 12 years and you should expect to get at least 20 years of life out of them.
Explanation:
Solar energy is more than enough for any business or home, but if you want to know if it is cost effective, you need to run the numbers. It does have to be grid-tied though to provide electricity at night or when cloudy for multiple days. In most cases, batteries are not cost-effective at this time.
♡●♡ jess bregoli ♡●♡#keep learning!!
can you plz answer me from the photo
help me pls i beg whoever types first ill mark them brainliest
Answer:
The answer is "Line 1,4,and 9".
Explanation:
Following are the complete code to the given question:
print ("What is your favourite football team? ")#print message
team = input()#define variable that use input method to input value
#this is the IF statement, If they enter Manchester City
if team == "Manchester City":#use if to check string value
#respond like this
print ("Manchester City is a great team! ")#print message
#alternatively, respond like this
else: #defining else block
print("I don't mind "+ team +", but Manchester City is better !")#print message
#don't forget concatenation!
output:
Please find the code with the output in the attached file.
Please find attached file that will explains errors.
there are 2048bytes in4megabytes true or false
Answer:
FALSE IS THE ANSWER.
I HOPE IT IS HELPFUL
Select the correct answer.
Frankle is trying to create an app. He creates a new ViewController and removes the default one. What should he keep in mind when building
the app?
OA
connect all the ViewControllers to the old ones
OB.
assigning the first ViewController as initial
Oc. creating a SplitViewController
OD. adding a segue from the last ViewController
od. adding a segue fro. the last viewcontroller
what is the difference between coding with html and coding with python
Answer:
Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.
(101101+10110) /110
101101-11001/101 please I need help
Answer:
000000000000000000000000000001111111111111111111