Answers

Answer 1

Answer:

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation. 

Answer 2

This is my Opinion.

Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.

Hope this helps you :)


Related Questions

When considering the mobility aspect of cloud-based enterprise systems, it's important to consider that with a cloud-based system, employee can access information from _____.

Answers

Answer:

anywhere in the world

Explanation:

Employee can access information from anywhere in the world. That is the main upside of using cloud-based enterprise system. They run completely remote and are accessible from anywhere as long as you have an internet connection and authorized access to the system. This increased accesibility is crucial for companies that have employees that move from place to place solving problems and solves many of the problems with on-site systems.

Write a function, named FileLineCount(), that returns an integer and accepts a string. Pass the function the file name. It should then use a while loop to return the number of lines in a file. Hint: The function will be reading the file you just created above. g

Answers

Answer:

Explanation:

The following code is written in Python. It is a function that accepts a file string and uses that string to read the file in that location. Then it uses a while loop that keeps going until there are no more lines in the file. Each iteration it adds 1 to the count variables. Finally, it prints the count variable which contains the total number of lines in the file. The code has been tested and the output can be seen in the attached image below.

def countLines(file):

   file = open(file, 'r')

   count = 0

   while file.readline():

       count += 1

   print(str(count) + " total lines")

Create a function in Python called HalfList that will accept a list of integers and find the total for the first half of the list. The function needs to return the total or the sum of all these numbers.

Answers

._.-.....

...............

Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are some things he needs to keep in mind when he is using a Web site as a source

Answers

Answer and Explanation:

Ben needs to cite his source of information when including information from the Web in his academic paper. A common citation method that he could use to cite his source is APA style.

When citing a website using APA style of references, you need to include the author, the title of the page or article, the date of publication, , the website name, and the URL(ususally in brackets).

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.a. System.b. Satisfaction.c. Speedy.d. Subscriber.e. Switch.

Answers

Answer:

D. Subscriber

Explanation:

Digital Subscriber Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines.

The high speed data transmission property helps to transmit data in a fast and timely manner between two or more points or people during calls, texts and other activities.

describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality the earth takes longer to rotate around the sun. To account for the
difference in time every 4 years a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700 1800. etc.), the year must be evenly divisible by 400
Some example leap years are 600712 and 2016
Wirte a program that takes n a year and determines whether that year is a leap year.
Exif the inputs
1712

Answers

Answer:

The program in Python is as follows:

year = int(input("Enter a year: "))

print(year,end=" ")

if year % 4 == 0:

  if year % 100 == 0:

      if year % 400 == 0:           print("is a leap year")

      else:           print("is not a leap year")

  else:       print("is a leap year")

else:   print("is not a leap year")

Explanation:

This gets input for year

year = int(input("Enter a year: "))

This prints year, followed by a blank

print(year,end=" ")

If year is divisible by 4

if year % 4 == 0:

If yes, check if year is divisible by 100

  if year % 100 == 0:

If yes, check if year is divisible by 400; print leap year if true

      if year % 400 == 0:           print("is a leap year")

print not leap year if year is not divisible by 400

      else:           print("is not a leap year")

print leap year if year is not divisible by 100

  else:       print("is a leap year")

print leap year if year is not divisible by 4

else:   print("is not a leap year")

Answer:

def is_leap_year(user_year):    

   if(user_year % 400 == 0):        

       return True          

   elif user_year % 100 == 0:        

       return False        

   elif user_year%4 == 0:        

       return True          

   else:        

       return False

if __name__ == '__main__':    

   user_year = int(input())    

   if is_leap_year(user_year):        

       print(user_year, "is a leap year.")

   else:        

       print(user_year, "is not a leap year.")

Explanation:

Argue your points as to wether i.c.t tools in Africa is harmful or helpful to students​

Answers

Answer: It is helpful.

Explanation:

Access to more information.

ICT tools such as computers and laptops are able to connect to the internet which has a lot more information on most subjects than a student can find in school.

ICT tools will therefore broaden the information base for African students to enable them acquire more knowledge that could aid the continent in catching up to the west.

Skills acquisition.

The world is increasing moving online and this means that those capable of designing online tools and services will be very successful. This is why Jeff Bezos is so rich.

ICT tools in Africa will enable the students learn about these things from a younger age so that they would be able to launch their own online services for the benefit of the continent and the world.

Making schooling more accessible.

For a long time, there has been a shortage of teachers and schools in certain parts of Africa which has led to a lot of children going without education.

Like the Coronavirus pandemic showed us, with ICT tools, a teacher would be able to reach students that are far from them thereby increasing the number of children who can be educated in Africa even with a shortage of teachers and schools.

No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program that determines the number of months it will take to pay off a $1000 stereo. Write code also outputs the monthly status of the loan.

Answers

Answer:

10000

Explanation:

A __________ search engine focuses on a specific subject.

answer : Specialized

Answers

Answer:

Specialized fr just want point lol

Explanation:

Suppose that TCP's current estimated values for the round trip time (estimatedRTT) and deviation in the RTT (DevRTT) are 350 msec and 10 msec, respectively (see Section 3.5.3 for a discussion of these variables). Suppose that the next three measured values of the RTT are 220 msec, 260 msec, and 390 msec respectively.
(Compute TCP's new value of DevRTT, estimatedRTT, and the TCP timeout value after each of these three measured RTT values is obtained. Use the values of α = 0.125, and β = 0.25. Round your answers to two decimal places after leading zeros.)
What is the estimatedRTT after the first RTT?

Answers

Answer:

260

Explanation:

I hope it helps choose me the brainest

various sources of ict legislation

Answers

Answer:

oh ma ma my here it is

Explanation:

Legislation of ICT The purpose of legislation is to control and regulate the use of ICT. Different acts in result in different benefits to the end user or other people affected by the technology. ... Legislation protects people and ensures that there is no abuse by others to those investing in the technology

Discuss and illustrate the operation of the AND, OR, XOR and NOT gate of a Boolean logical operation giving examples of possible outcomes of 0 and 1 as input in a truth set tabular format.

Answers

Answer:

Use below picture as a starting point.

What is dialog box? ​

Answers

Answer:

a small area on a screen in which the user is prompted to provide information or select commands is called a dialog box.

I hope this will help you

Stay safe

IN C++
A. Create an abstract base class called Currency with two integer attributes, both of which are non-public. The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
B. Create one derived class - Money - with two additional non-public string attributes which will contain the name of the currency note (Dollar) and currency coin (Cent) respectively. DO NOT add these attributes to the base Currency class.
C. In your base Currency class, add public class (C++ students are allowed to use friend methods as long as a corresponding class method is defined as well) methods for the following, where appropriate:
Default Construction (i.e. no parameters passed)
Construction based on parameters for all attributes - create logical objects only, i.e. no negative value objects allowed
Copy Constructor and/or Assignment, as applicable to your programming language of choice
Destructor, as applicable to your programming language of choice
Setters and Getters for all attributes
Adding two objects of the same currency
Subtracting one object from another object of the same currency - the result should be logical, i.e. negative results are not allowed
Comparing two objects of the same currency for equality/inequality
Comparing two objects of the same currency to identify which object is larger or smaller
Print method to print details of a currency object
All of the above should be instance methods and not static.
The add and subtract as specified should manipulate the object on which they are invoked. It is allowed to have overloaded methods that create ane return new objects.
D. In your derived Money class, add new methods or override inherited methods as necessary, taking care that code should not be duplicated or duplication minimized. Think modular and reusable code.
E. Remember -
Do not define methods that take any decimal values as input in either the base or derived classes.
Only the print method(s) in the classes should print anything to console.
Throw String (or equivalent) exceptions from within the classes to ensure that invalid objects cannot be created.
F. In your main:
Declare a primitive array of 5 Currency references (for C++ programmers, array of 5 Currency pointers).
Ask the user for 5 decimal numbers to be input - for each of the inputs you will create one Money object to be stored in the array.
Once the array is filled, perform the following five operations:
Print the contents of the array of objects created in long form, i.e. if the user entered "2.85" for the first value, it should be printed as "2 Dollar 85 Cent".
Add the first Money object to the second and print the resulting value in long form as above.
Subtract the first Money object from the third and print the resulting value in long form as above.
Compare the first Money object to the fourth and print whether both objects are equal or not using long form for object values.
Compare the first Money object to the fifth and print which object value is greater than the other object value in long form.
All operations in the main should be performed on Currency objects demonstrating polymorphism.
Remember to handle exceptions appropriately.
There is no sample output - you are allowed to provide user interactivity as you see fit.

Answers

Answer:

I only do Design and Technology

sorry don't understand.

I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.

Answers

The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked

What is the SQL command to list the total sales by customer and by product, with subtotals by customer and a grand total for all product sales

Answers

Answer:

Please find the complete query and question in the attached file.

Explanation:

In this query, we use the select command in which we select the column that is "CUS_CODE, P_CODE" with the sum method that multiples the  "SALE_UNITS * SALE_PRICE" values and use them as and group by the clause that stores all the values in the column  that are "CUS_CODE, P_CODE WITH ROLLUP".

Write a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask user to guess number. Inform if high or low. Exit when entered number correct. Tell user how many tries it took to guess number.

Answers

Answer:

download the .txt file and change the file name to guess_number.py then run it in a python interpreter. I used Python 3.9.6 for this project and I used Visual Studio Code as my IDE.

Explanation:

The code has comments that tell you what is happening.

I hope this helped :) If it didn't please let me know what went wrong so I can fix it.

In a program named guess_number.py. Use NumPy to generate a random number between 1 and 100. Accept int input and ask the user to guess the number.

What are programming used for?

The motive of programming is to discover a series of commands with the intention to automate the overall performance of a task (which may be as complicated as a running system) on a computer, regularly for fixing a given problem.

Import NumPy as np def main(): # Random variety Random Number = np.random.randint(1, 100) # A begin variable Start = Try.# This value is the handiest used to decide if the person has been known that the fee is excessive or low   High Or Low Message Displayed Already = False # Amount of guesses that the person were given incorrectly. Guess Gotten Wrong 0 # The general quantity of guess AmountOfGuesses = 0 # Beginning of some time loop in order to maintain the software jogging till the person guesses the random variety print("The fee is excessive") High Or Low Message DisplayedAlready = True Elif RandomNumber <= forty nine and High OrLow MessageDisplayedAlready == False:

           print("The fee is low")

           High Or Low Message Displayed Already = True.

AmountOfGuesses += print("Wrong! You have gotten " + str(GuessGottenWrong) + " guesses incorrect. main()

Read more about the program :

https://brainly.com/question/1538272

#SPJ2

What are the advantages of using a database management system (DBMS) over using file-based data storage?

Answers

Answer:

Advantage of DBMS over file system

No redundant data: Redundancy removed by data normalization. No data duplication saves storage and improves access time.

Data Consistency and Integrity: As we discussed earlier the root cause of data inconsistency is data redundancy, since data normalization takes care of the data redundancy, data inconsistency also been taken care of as part of it

Data Security: It is easier to apply access constraints in database systems so that only authorized user is able to access the data. Each user has a different set of access thus data is secured from the issues such as identity theft, data leaks and misuse of data.

Privacy: Limited access means privacy of data.

Easy access to data – Database systems manages data in such a way so that the data is easily accessible with fast response times.

Easy recovery: Since database systems keeps the backup of data, it is easier to do a full recovery of data in case of a failure.

Flexible: Database systems are more flexible than file processing systems

Suppose that a disk unit has the following parameters: seek time s = 20 msec; rotational delay rd = 10 msec; block transfer time btt = 1 msec; block size B = 2400 bytes; interblock gap size G = 600 bytes. An EMPLOYEE file has the following fields: Ssn, 9 bytes; Last_name, 20 bytes; First_name, 20 bytes; Middle_init, 1 byte; Birth_date, 10 bytes; Address, 35 bytes; Phone, 12 bytes; Supervisor_ssn, 9 bytes; Department, 4 bytes; Job_code, 4 bytes; deletion marker, 1 byte. The EMPLOYEE file has r = 30,000 records, fixed-length format, and unspanned blocking.

Answers

Answer:

20

Explanation:

I hope it helps choose me the brainst

Write the correct statements for the above logic and syntax errors in program below.

#include
using namespace std;
void main()
{
int count = 0, count1 = 0, count2 = 0, count3 = 0;
mark = -9;
while (mark != -9)
{
cout << "insert marks of students in your class, enter -9 to stop entering";
cin >> mark;
count++;

if (mark >= 0 && mark <= 60);
count1 = count1 + 1;
else if (mark >= 61 && mark <= 70);
count2 = count2 + 1;
else if (mark >= 71 && mark <= 100);
count3 = count3 + 1;
}
cout <<"Report of MTS3013 course" << endl;
cout <<"Mark" << count << endl << endl;
cout << "0-60" << "\t\t\t\t" << count1 << endl;
cout << "61-70" << "\t\t\t\t" << count2 << endl;
cout << "71-100" << "\t\t\t\t" << count3 << endl<< endl << endl;
cout << "End of program";
}

Answers

Mark is gonna be the answer for question 1

3 features of digital computer​

Answers

Answer:

A typical digital computer system has four basic functional elements: (1) input-output equipment, (2) main memory, (3) control unit, and (4) arithmetic-logic unit. Any of a number of devices is used to enter data and program instructions into a computer and to gain access to the results of the processing operation.

Explanation:

GENERATIONS OF
ACTIVITY 12
In tabular form differentiate the first four generations of computers.

Answers

Learn about each of the 5 generations of computers and major technology developments that have led to the computing devices that we use today.

5 Generations of Computer - Logo for the Webopedia Study Guide.The history of computer development is a computer science topic that is often used to reference the different generations of computing devices. Each one of the five generations of computers is characterized by a major technological development that fundamentally changed the way computers

Write a function gcdRecur(a, b) that implements this idea recursively. This function takes in two positive integers and returns one integer.
''def gcdRecur(a, b):
'''
a, b: positive integers
returns: a positive integer, the greatest common divisor of a & b.
'''
# Your code here
if b == 0:
return a
else:
return gcdRecur(b, a%b)
#Test Code
gcdRecur(88, 96)
gcdRecur(143, 78)
© 2021 GitHub, Inc.

Answers

Answer & Explanation:

The program you added to the question is correct, and it works fine; It only needs to be properly formatted.

So, the only thing I did to this solution is to re-write the program in your question properly.

def gcdRecur(a, b):

   if b == 0:

       return a

   else:

       return gcdRecur(b, a%b)

gcdRecur(88, 96)

gcdRecur(143, 78)

How has Linux affected the market for proprietary software?​

Answers

Answer:

Linux is an operating system made up of free software, which can be installed and run on a wide variety of computer systems, from small devices such as mobile phones to large computer systems and supercomputers.

Linux is often offered to the user in various Linux distributions. A characteristic of the distributions is the great possibility of customization and selection that they offer since each one is aimed at a different type of user. Depending on the philosophy, each distribution can provide a greater foundation for ease of use, multimedia applications, ease of configuration, system simplicity, only free software, low resource requirements, and more.

Because of its low cost, high configurability and availability on various platforms, Linux is becoming increasingly popular not only among specialized users, but also among domestic users.

Which of the following is the BEST solution to allow access to private resources from the internet?

a. VPN
b. Subnet
c. Packet filters
d. FTP

Answers

FTP stands for file transfer protocol. FTP is used to transfer files between computers over the Internet. FTP servers can be setup to allow users to access the information anonymously or require registration for access.

Identify some advantages of using Excel over lists, paper files, or simple word documents? Describe some disadvantages of using Excel over lists, paper files, or simple word documents? Summarize one thing in you home life that could be improved or more easily managed using Excel?​

Answers

Excel

Excel is a software program that contains spreadsheet. Spreadsheet is an electric document that works numbers and display results in graphs. There are vertical columns and horizontal rows.

they are several advantages of excel which is;

Excel is very efficient to use, especially when you have to calculate your data, it's not hard to calculate the computer itself calculates it for you.

they are also disadvantages of excel which is;

some users might get a little bit problem when you send Microsoft Excel, here is one sometimes the spreadsheet are difficult to share internally.

Your new trainee is interested in ACLs (access control lists). He asks you want they can be used for. What should you tell him? A. Protect hosts from viruses.B. Classify network traffic.C. Provide high network availability.D. IP route filtering.

Answers

Answer:

B. Classify network traffic.

D. IP route filtering.

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a network or file.

In Computer networking, access control lists (ACLs) can be used to perform the following tasks;

I. Classify network traffic: it can be used to classify the different networks on a router and define whether packets are rejected or accepted.

II. Internet protocol (IP) route filtering: any internet protocol (IP) address that's is not on the accept list would be refused permission into accessing a network. Thus, ACLs can either deny or accept IP addresses depending on the routing table configured on the router.

What are some of the advantages and disadvantages of connection-oriented WAN/Man as opposed to connection-less?

Answers

Answer and Explanation:

Connection oriented WAN/MAN as opposed to connection less network is a type of wide area network that requires communicating entities in the network to establish a dedicated connection for their communication before they start communicating. This type of network will use these established network layers only till they release it, typical of telephone networks.

Advantages include:

Connection is reliable and long.

Eliminates duplicate data issues.

Disadvantages include:

Resource allocation while establishing dedicated connection slows down speed and may not fully utilize network resources.

There are no plan B's for network congestion issues, albeit occurring rarely with this type of network.

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. Which of the following is a step that the cloud administrator needs to perform as part of the move?
a. Migrate to an external DNS solution
b. Create a new VPC that will serve DNS needs for multiple other VPCs
c. Discontinue using DNS
d. Remove the DNS entries within the VPC that are no longer relevant

Answers

Answer:

Here the correct option is option b Create a new VPC that will serve DNS needs for multiple other VPCs.

Explanation:

Fictional Corp has a DNS server running within its VPC. It has decided to move one of the application servers to a different VPC. It's not possible to maneuver an existing instance to a different subnet or VPC. Instead, you'll manually migrate the instance by creating a new VPC Image from the source instance.  

b. Create a new VPC that will serve DNS needs for multiple other VPCs

Other Questions
What are the characteristics of urban legends? Your teacher gives you a low grade on project which you thought would at least get a grade of 90. what is your reaction Which of the following statements about condoms is not true?A. Condoms can help protect not only a woman from getting a sexually transmitted infection, but also her unborn baby.B. Condoms, even if used properly, do not completely eliminate the risk of contracting HIV, so you should use other prevention methods with them.C. Condoms, if used properly, make it impossible to contract sexually transmitted infection (STIs) that are passed through bodily fluids.D. Condoms provide only minimal protection against STIs such as genital herpes, human papillomavirus (genital warts), and syphilis. 3. Elige correcto o incorrecto. (24 points /2 points each correct sentence)Choose correct or incorrect for each sentence. a. Pedro es un peridico. correcto incorrectob. T coma chocolate. correcto incorrectoc. Mi nombre Ahmad. correcto incorrectod. Vivo en Australia. correcto incorrectoe. Ella es de sueca. correcto incorrectof. Cmo se dice hola en rabe?correcto incorrectog. Laura trabaja una tienda. correcto incorrectoh. La nia es italiano. correcto incorrectoi. Juan tiene doce ao. correcto incorrectoj. Como por la tarde. correcto incorrectok. Qu idiomas hablas?correcto incorrectol. Yo estudio de finanzas. correcto incorre In Shakespeare's "Romeo and Juliet," the main focus is the tragic love story betweenRomeo and Juliet. However the play also tells the story of fighting between theMontagues and Capulets. What is this called? A light bulb, attached (by itself) to an ideal 10 V battery, becomes hotter as time goes on. The bulb's filament is made of tungsten, a metal, which becomes more resistive as its temperature increases. Which statement below is true?a. As time goes on and the bulb grows hotter, the voltage across the bulb increases so the bulb would grow brighter.b. As time goes on and the bulb grows hotter, the current through the bulb increases so the bulb would grow brighter.c. As time goes on and the bulb grows hotter, the voltage across the bulb decreases so the bulb would grow dimmer.d. As time goes on and the bulb grows hotter, the current through the bulb decreases so the bulb would grow dimmer. Study the scatterplot and trend line. Which two points can be used to find the equation of the trend line?Which points are on the trend line?(1, 30) and (9, 95)(2, 30) and (6, 70)(2, 45) and (8, 90)(3, 50) and (7, 65) I bought this radio ...... rs. 1000.a. from b.by c. about d. away from If a=120 , find the measure of angles b, c and d.Explain your reasoning. RS=7y+4, ST=3y+6, and RT=90 HELP! A semi circle of radius 6 is centered at the origin as shown. A rectangle has two of its vertices at (5,0) and (-5,0) and the other two vertices on the semi-circle. What is the exact area of the rectangle? What is the equation of the semi circle? Which of the following materials contains a base?a. Stomach digestive juicesb. Orange juicec. Ammonia window cleanerd. Vinegar In "The Treasure of Lemon Brown" what did Greg do as he entered his house, knowing that he was about to receive alecture?A. defend himselfB. smileC. slam the doorD. stomp up the stairs 1. Urban sprawl has happed (fast) ____________ than ever How to find interquartilte range please help me with this /-////- what is 2/3 divide by 2/9 Alec pulled a couch 3 meters, using a force of 400 N. The couch weighed 200 N. How do you calculate the work done by Alec?A . Add 400 to 200 B . Divide 400 by 3C . Multiply 200 by 3 D . Multiply 400 by 3 Find the area of the shape: You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.