Which is the first computer brought in nepal for the census of 2028 B.S​

Answers

Answer 1

Answer:

The first computer brought in Nepal was IBM 1401 which was brought by the Nepal government in lease (1 lakh 25 thousands per month) for the population census of 1972 AD (2028 BS). It took 1 year 7 months and 15 days to complete census of 1crore 12.5 lakhs population.


Related Questions

Which support function under Tech Mahindra is governing data privacy and protection related requirements

Answers

Answer:

Privacy Policy

Explanation:

PRIVACY POLICY is the support function under Tech Mahindra that is governing data privacy and protection-related requirements.

Given that support functions are functions which assist and in a way contribute to the company goal.

Other support functions are human resources, training and development, salaries, IT, auditing, marketing, legal, accounting/credit control, and communications.

The above statement is based on the fact that the Privacy Policy clarifies all the data protection rights, such as the right to object to some of the production processes that TechM may carry out.

What should businesses do in order to remain competitive under the current Cloud
landscape?

Answers

Answer:

Cloud Landscape

They must evangelize the benefits of cloud computing to company executives in order to assist them in developing and extracting business benefits that will give them a competitive advantage and increase profits

Explanation:

The most successful organisations carefully plan out a multiyear effort to improve their cloud adoption, focusing on multiple streams of work across several stages of maturity.

Cloud computing governance is difficult even when only one cloud provider is involved, and it becomes even more difficult as organisations move toward multi cloud.

Continuous workload placement analysis involves reassessing workloads at a regular cadence, evaluating whether the current execution venue sufficiently meets the organization’s needs and if migrating to an alternative model provides higher value without adding significant risk to the organization’s operations

They must evangelize the benefits of cloud computing to company executives in order to assist them in developing and extracting business benefits that will give them a competitive advantage and increase profits.

In this question, the response is "Cloud Landscape" which can be defined as follows:

The organizations should adopt these new technologies to benefit from the digital transformation offered by the cloud.New enterprises were embracing cloud computing management strategies, placing established companies at risk.In the multi-year efforts for improving cloud security were meticulously planned by even the most successful enterprises. In several contributing to higher at various maturity levels are addressed.The multi-cloud plan enables governance of cloud computing increasingly challenging, even and there is only one cloud service provider involved in the agreement.  

Learn more:

cloud computing: brainly.com/question/16026308

ITING THE ANSWER
1. According to Turner and Wilson (2018), Information Literacy consists of
tasks EXCEPT...
A applying previous knowledge.
C. finding appropriate information
B. determining information need.
2. Outlining your problem, developing research questions, selecting keywords a
developing concept charts are activities during...
D. using information ethically
A. communicating information.
B. determining information need.
C. evaluating search results.
D. finding appropriate resources,
3. Asking questions such as what, why, where and how is an effective way to
A. craft your research questions.
B. develop good keywords
C. find good information
D. understand your topic,
4. In asking "what" questions, you intend to find...
A. answers and solutions.​

Answers

Answer:

Answer my first question

What does the AVERAGE function calculate? the total sum of a list of values the arithmetic mean of a list of values the total number of values in a list the percentage of values in a list

Answers

Answer:

B) the arithmetic mean of a list of values

Explanation:

on Edge

The Average function calculates the arithmetic mean of a list of values. Therefore, option B is the correct option.

What is the average?

In its most general definition, an average can be considered as the representative number or figure from the whole list. The average of a list containing multiple values is obtained by adding all the values and dividing them up by the total number of values.

The ultimate objective of calculating the average is to discover the value that represents the whole list. Average is also known as mean, and it works as a central value in the list, which is comprehensive in nature. It works as an approximate or rough estimate, which helps us in making decisions in daily life.

Thus, the average function calculates the arithmetic mean of a list of values. Therefore, option B is the correct option.

To learn more about the average, visit the link below:

https://brainly.com/question/11265533

#SPJ2

describe what happens at every step of our network model, when a node on one network establishes a TCP connection with a node on another network. You can assume that the two networks are both connected to the same router.

Answers

Answer:

Each node on the network has an addres which is called the ip address of which data is sent as IP packets. when the client sends its TCP connection request, the network layer puts the request in a number of packets and transmits each of them to the server.

Explain how you would find a book on a given subject in the library.

Answers

Answer:

In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.

Write the correct statements for the above logic and syntax errors in program below.

#include
using namespace std;
void main()
{
int count = 0, count1 = 0, count2 = 0, count3 = 0;
mark = -9;
while (mark != -9)
{
cout << "insert marks of students in your class, enter -9 to stop entering";
cin >> mark;
count++;

if (mark >= 0 && mark <= 60);
count1 = count1 + 1;
else if (mark >= 61 && mark <= 70);
count2 = count2 + 1;
else if (mark >= 71 && mark <= 100);
count3 = count3 + 1;
}
cout <<"Report of MTS3013 course" << endl;
cout <<"Mark" << count << endl << endl;
cout << "0-60" << "\t\t\t\t" << count1 << endl;
cout << "61-70" << "\t\t\t\t" << count2 << endl;
cout << "71-100" << "\t\t\t\t" << count3 << endl<< endl << endl;
cout << "End of program";
}

Answers

Mark is gonna be the answer for question 1

You work as the IT Administrator for a small corporate network you need to configure configure the laptop computer in the Lobby to use the corporate proxy server. The proxy server is used to control access to the internet. In this lab, your task is to configure the proxy server settings as follows: Port: 9000

Answers

Answer:

okay if I am it administration I will port 10000

To configure the computer in the lobby to use the corporate proxy server, you will need to follow these steps:

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

What is Proxy Server?

A proxy server is a device or router that acts as a connection point between users and the internet.

Proxy Server settings would be the same for both Wifi and Ethernet connections, explaining about the configuration in Windows Operating System.

Open the internet browser on the laptop and go to the settings or preferences page. The exact location of the proxy settings will vary depending on the browser you are using.

In the settings or preferences page, look for the "Proxy" or "Network" section.

In the proxy settings, select the option to use a proxy server.

Enter the address of the corporate proxy server in the "Server" or "Address" field.

Enter the port number "9000" in the "Port" field.

Save the changes and close the settings or preferences page.

Test the proxy server configuration by attempting to access a website. If the configuration is correct, the laptop should be able to access the internet through the proxy server.

Settings > Networks&Internet > Proxy > Manual Proxy Setup > Address & proxy > save

To learn more about the Proxy Server settings click here:

https://brainly.com/question/14403686

#SPJ12

2.13 LAB: Branches: Leap Year
A year in the modern Gregorian Calendar consists of 365 days. In reality the earth takes longer to rotate around the sun. To account for the
difference in time every 4 years a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The
requirements for a given year to be a leap year are:
1) The year must be divisible by 4
2) If the year is a century year (1700 1800. etc.), the year must be evenly divisible by 400
Some example leap years are 600712 and 2016
Wirte a program that takes n a year and determines whether that year is a leap year.
Exif the inputs
1712

Answers

Answer:

The program in Python is as follows:

year = int(input("Enter a year: "))

print(year,end=" ")

if year % 4 == 0:

  if year % 100 == 0:

      if year % 400 == 0:           print("is a leap year")

      else:           print("is not a leap year")

  else:       print("is a leap year")

else:   print("is not a leap year")

Explanation:

This gets input for year

year = int(input("Enter a year: "))

This prints year, followed by a blank

print(year,end=" ")

If year is divisible by 4

if year % 4 == 0:

If yes, check if year is divisible by 100

  if year % 100 == 0:

If yes, check if year is divisible by 400; print leap year if true

      if year % 400 == 0:           print("is a leap year")

print not leap year if year is not divisible by 400

      else:           print("is not a leap year")

print leap year if year is not divisible by 100

  else:       print("is a leap year")

print leap year if year is not divisible by 4

else:   print("is not a leap year")

Answer:

def is_leap_year(user_year):    

   if(user_year % 400 == 0):        

       return True          

   elif user_year % 100 == 0:        

       return False        

   elif user_year%4 == 0:        

       return True          

   else:        

       return False

if __name__ == '__main__':    

   user_year = int(input())    

   if is_leap_year(user_year):        

       print(user_year, "is a leap year.")

   else:        

       print(user_year, "is not a leap year.")

Explanation:

I have a Dell laptop and last night it said that it needed to repair it self and asked me to restart it. So I did but every time I turn it on it shuts itself down. I had a problem exactly like this before with my old computer, was not a Dell though, and I ended up having to have it recycled. This computer I have now is pretty new and I really don't want to have to buy a new computer. What should I do to fix this problem? Please help, I'm a college student almost ready to graduate and all of my classes are online. I'm starting to panic. Thanks for helping me figure this situation out.

Answers

The same thing happened with my HP laptop but my dad refresh the laptop before restating it worked

In the revised version of the library system with Book and Periodical, Question 16 options: a) Book is a subclass of Periodical b) Periodical is a subclass of Book c) Book and Periodical are subclasses of LoanableItem d) Book and Periodical implement LoanableItem

Answers

Answer:

c. Book and Periodical are subclasses of LoanableItem

Explanation:

Books are kept in library in a periodical manner. Both classes are not superior, they are subclasses of LoanableItem. Library uses common guide which makes it easy to find a book.

A small e-commerce company uses a series of Robotic Process Automation solutions to manage the backup of data from individual workstations to an on-premise server. However, the company is opening another office and would like to more easily share data between locations, along with better protecting the data from loss.
Which technology could be combined with their current automated processes to do this?

Answers

Answer:

Cloud.

Explanation:

Cloud computing can be defined as a form of data computing which requires the use of shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offer individuals and businesses a fast, secured, effective and efficient way of providing services over the internet.

Basically, cloud computing comprises three (3) service models and these include;

1. Platform as a Service (PaaS).

2. Software as a Service (SaaS).

3. Infrastructure as a Service (IaaS).

Additionally, the two (2) main characteristics of cloud computing are;

I. Measured service: it allows cloud service providers to monitor and measure the level of service used by various clients with respect to subscriptions.

II. Resource pooling: this allows cloud service providers to serve multiple customers or clients with services that are scalable and provisional.

For example, the provisioning of On-demand computing resources such as storage, network, virtual machines (VMs), etc., so as to enable the end users install various software applications, database and servers.

Hence, the technology that could be combined by the small e-commerce company with its current automated processes is cloud storage.

There are different tools used in data sharing. The technology that could be combined with their current automated processes to do this is blockchain.

Blockchain is known to use different kinds of distributed ledger that is often shared across networked devices. Through this, people on the network can share files and values securely and even on a peer-to-peer basis. This is no need any middlemen.

Data protected in blockchain is very vital.  All records on a blockchain are known too be secured through the act of cryptography. Here, Network people do have their own private keys that are given to them for any  transactions they make.

Learn more about Blockchain from

https://brainly.com/question/25700270

1. What does the word “processing” in data pro- cessing mean?
2. Give three examples in which raw data also serves as useful information.
3. Give three business examples (not mentioned in the text) of data that must be processed to provide useful information.
4. Give three examples of subsystems not operat- ing in the context of IT. Why are these consid- ered subsystems and not systems?
5. How do TPSs and DSSs differ?
6. What is a problem? Give an example of a busi- ness problem and discuss how a computer- based information system could solve it.
7. What is synergy? How is synergy accomplished when a person uses a computer? Explain the connection between synergy and increased productivity.
8. “An information system consists of hardware and software.” Why is this statement inadequate?
9. In which situations does one need to make a decision? Give three examples not mentioned in the chapter.
10. How can a DSS help make decisions?
11. Note the word “support” in decision support systems. Why are these applications not called decision-making systems?
12. Who is considered a knowledge worker? Will you have a career as a knowledge worker? Explain.
13. What is the most prevalent type of information system? Why is this type of IS so ubiquitous?
14. TPSs are usually used at the boundaries of the organization. What are boundaries in this context? Give three examples of boundaries.
15. Among IT professionals, the greatest demand is for network administrators and analysts. Why?

Answers

Answer:

Word processing is the process of creating and editing documents on a computer. It allows a user to create documents that mimic the format and style of a typical typewriter. It requires a computer and word processing software. A printer may also be used to create a physical copy of the document.

Explanation:

1. Processing means any action that produces information from data, such as finding totals, averages, ratios, and. trends.
2. Names, addresses, and educational experience of employment candidates, consumers, and members of
professional organizations are some examples. They are data, but are also used as information, because they are
often needed as is, without processing.
5. A TPS merely records transactions and channels them into files and databases. It does not analyze the data nor
create any information. A DSS contains software that help make decisions. It provides useful information gleaned and manipulated from raw data.

When an external device becomes ready to be serviced by the processor the device sends a(n)_________ signal to the processor.

Answers

when an external device becomes ready to be serviced by the processor the device sends a(n) interrupt signal to the processor

In cell K8, create a formula using the SUM function that calculates the total of the range D17:D20 and subtracts it from the value in cell J8.

Answers

Answer:

so like what are you asking for so i can help u just tell me what u need and i will help u :)

Explanation:

IN C++
A. Create an abstract base class called Currency with two integer attributes, both of which are non-public. The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
B. Create one derived class - Money - with two additional non-public string attributes which will contain the name of the currency note (Dollar) and currency coin (Cent) respectively. DO NOT add these attributes to the base Currency class.
C. In your base Currency class, add public class (C++ students are allowed to use friend methods as long as a corresponding class method is defined as well) methods for the following, where appropriate:
Default Construction (i.e. no parameters passed)
Construction based on parameters for all attributes - create logical objects only, i.e. no negative value objects allowed
Copy Constructor and/or Assignment, as applicable to your programming language of choice
Destructor, as applicable to your programming language of choice
Setters and Getters for all attributes
Adding two objects of the same currency
Subtracting one object from another object of the same currency - the result should be logical, i.e. negative results are not allowed
Comparing two objects of the same currency for equality/inequality
Comparing two objects of the same currency to identify which object is larger or smaller
Print method to print details of a currency object
All of the above should be instance methods and not static.
The add and subtract as specified should manipulate the object on which they are invoked. It is allowed to have overloaded methods that create ane return new objects.
D. In your derived Money class, add new methods or override inherited methods as necessary, taking care that code should not be duplicated or duplication minimized. Think modular and reusable code.
E. Remember -
Do not define methods that take any decimal values as input in either the base or derived classes.
Only the print method(s) in the classes should print anything to console.
Throw String (or equivalent) exceptions from within the classes to ensure that invalid objects cannot be created.
F. In your main:
Declare a primitive array of 5 Currency references (for C++ programmers, array of 5 Currency pointers).
Ask the user for 5 decimal numbers to be input - for each of the inputs you will create one Money object to be stored in the array.
Once the array is filled, perform the following five operations:
Print the contents of the array of objects created in long form, i.e. if the user entered "2.85" for the first value, it should be printed as "2 Dollar 85 Cent".
Add the first Money object to the second and print the resulting value in long form as above.
Subtract the first Money object from the third and print the resulting value in long form as above.
Compare the first Money object to the fourth and print whether both objects are equal or not using long form for object values.
Compare the first Money object to the fifth and print which object value is greater than the other object value in long form.
All operations in the main should be performed on Currency objects demonstrating polymorphism.
Remember to handle exceptions appropriately.
There is no sample output - you are allowed to provide user interactivity as you see fit.

Answers

Answer:

I only do Design and Technology

sorry don't understand.

The Janitorial and Cafeteria departments are support departments. Samoa uses the sequential method to allocate support department costs, first allocating the costs from the Janitorial Department to the Cafeteria, Cutting, and Assembly departments. Determine the proportional (percentage) usage of the Janitorial Department by the:

Answers

Complete Question:

Departmental information for the four departments at Samoa Industries is provided below. Total Cost Cost Driver Square Feet Number of employees Janitorial $150,000 square footage serviced 200 Cafeteria 50,000 Number of employees 20,000 Cutting 1,125,000 4,000 120 Assembly 1,100,000 16,000 The Janitorial and Cafeteria departments are support departments Samoa uses the sequential method to allocate support department costs, first allocating the costs Department to the Cafeteria, Cutting and Assembly departments Determine the proportional (percentage) usage of the Janitorial Department by the a. Cafeteria Department b. Cutting Department c. Assembly Department

Answer:

Samoa Industries

Proportional (percentage) usage of the Janitorial Department:

Cafeteria = 50%

Cutting = 10%

Assembly = 40%

Explanation:

a) Data and Calculations:

                 Total Cost         Cost Driver             Square Feet       Number of

                                                                                                    employees

Janitorial   $150,000 Square footage serviced          200                40

Cafeteria      50,000 Number of employees        20,000                 12

Cutting     1,125,000                                                 4,000               120

Assembly 1,100,000                                               16,000                 40

Proportional (percentage) usage of the Janitorial Department:

Cafeteria = 50% (20,000/40,000 * 100)

Cutting = 10% (4,000/40,000 * 100)

Assembly = 40% (16,000/40,000 * 100)

Cost Allocation of the Janitorial Department:

Cafeteria = 50% * $150,000 = $75,000

Cutting = 10% * $150,000 =        15,000

Assembly = 40,% * $150,000 = 60,000

Total =                                    $150,000

Prime numbers can be generated by an algorithm known as the Sieve of Eratosthenes. The algorithm for this procedure is presented here. Write a program called primes.js that implements this algorithm. Have the program find and display all the prime numbers up to n = 150

Answers

Answer:

Explanation:

The following code is written in Javascript and is a function called primes that takes in a single parameter as an int variable named n. An array is created and looped through checking which one is prime. If So it, changes the value to true, otherwise it changes it to false. Then it creates another array that loops through the boolArray and grabs the actual numberical value of all the prime numbers. A test case for n=150 is created and the output can be seen in the image below highlighted in red.

function primes(n) {

   //Boolean Array to check which numbers from 1 to n are prime

   const boolArr = new Array(n + 1);

   boolArr.fill(true);

   boolArr[0] = boolArr[1] = false;

   for (let i = 2; i <= Math.sqrt(n); i++) {

      for (let j = 2; i * j <= n; j++) {

          boolArr[i * j] = false;

      }

   }

   //New Array for Only the Prime Numbers

   const primeNums = new Array();

  for (let x = 0; x <= boolArr.length; x++) {

       if (boolArr[x] === true) {

           primeNums.push(x);

       }

  }

  return primeNums;

}

alert(primes(150));

The Marietta Country Club has asked you to write a program to gather, then display the results of the golf tournament played at the end of March. The Club president Mr. Martin has asked you to write two programs.
The first program will input each player's first name, last name, handicap and golf score and then save these records in a file named golf.txt (each record will have a field for the first name, last name, handicap and golf score).
The second program will read the records from the golf.txt file and display them with appropriate headings above the data being displayed.
If the score is = Par, then display 'Made Par'
If the score is < Par, then display 'Under Par'
If the score is > Par, then display 'Over Par'
There are 16 players in the tournament. Par for the course is 80. The data is as follows:
Andrew Marks 11.2 72
Betty Franks 12.8 89
Connie William 14.6 92
Donny Ventura 9.9 78
Ernie Turner 10.1 81
Fred Smythe 8.1 75
Greg Tucker 7.2 72
Henry Zebulon 8.3 83
Ian Fleming 4.2 72
Jan Holden 7.7 84
Kit Possum 7.9 79
Landy Bern 10.3 93
Mona Docker 11.3 98
Kevin Niles 7.1 80
Pam Stiles 10.9 87
Russ Hunt 5.6 73

Answers

Answer:

Explanation:

The following program is written in Python. It creates two functions, one for writting the players and their scores to the file, and another function for reading the file and outputting whether or not they made Par. The functions can be called as many times that you want and the writeFile function allows for 16 inputs to be made when called. A test case has been provided with all of the players mentioned in the question. The output can be seen in the attached image below.

def writeFile():

   file = open('output.txt', 'w')

   for x in range(16):

       firstName = input("Enter First Name:")

       lastName = input("Enter Last Name:")

       handicap = input("Handicap:")

       score = input("Score:")

       file.write(str(firstName) + " " + str(lastName) + " " + str(handicap) + " " + str(score) + "\n")

   file.close()

def readFile():

   file = open('output.txt', 'r')

   for line in file:

       lineArray = line.split(" ")

       if int(lineArray[-1]) < 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Under Par" )

       elif int(lineArray[-1]) == 80:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Made Par")

       else:

           print(str(lineArray[0]) + " " + str(lineArray[1]) + " Over Par")

   file.close()

writeFile()

readFile()

hãy giúp tôi giảiiii​

Answers

Answer:

fiikslid wugx uesbuluss wuz euzsbwzube

Question: Name the person who originally introduced the idea of patterns as a solution design concept.

Answers

Answer:

architect Christopher Alexander is the person who originally introduced the idea of patterns as a solution design concept.

The person who originally introduced the idea of patterns as a solution design concept named as Christopher Alexander who was an architect.

What is architecture?

Architecture is referred to as an innovative technique or artwork based on buildings or physical structures that aims at creating cultural values for upcoming generations to understand the importance of history.

The external layout can be made to best support human existence and health by using a collection of hereditary solutions known as the "pattern language." It creates a set of helpful relationships by combining geometry and social behavior patterns.

Christopher Alexander, a British-American engineer and design theorist of Austrian heritage, is renowned for his several works on the design and construction process introduced the idea of patterns as a solution design concept.

Learn more about pattern language architecture, here:

https://brainly.com/question/4114326

#SPJ6

what is computer? write about computer.​

Answers

Answer:

Is an electronic device used for storing and processing data.

1) Declare an ArrayList named numberList that stores objects of Integer type. Write a loop to assign first 11 elements values: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024. Do not use Math.pow method. Assign first element value 1. Determine each next element from the previous one in the number List. Print number List by using for-each loop.

Answers

Answer:

Explanation:

The following is written in Java and uses a for loop to add 10 elements to the ArrayList since the first element is manually added as 1. Then it calculates each element by multiplying the previous element (saved in count) by 2. The program works perfectly and without bugs. A test output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       ArrayList<Integer> numberList = new ArrayList<>();

       numberList.add(0, 1);

       int count = 1;

       for (int i = 1; i < 11; i++) {

           numberList.add(i, (count * 2));

           count = count * 2;

       }

       for (Integer i : numberList) {

           System.out.println(i);

       }

   }

}

Write a program using a dictionary that reads in a single positive digit number [0 - 9] from the user at the keyboard. Your program will then be able to look up the digit key in the dictionary and print the digit value spelled out. If the user types in a number that is either more than one digit, negative, or a non int value, re-prompt the user for valid input. First, before demonstrating your test cases, print out a display copy of the key:value pairs in your dictionary in sorted order. Deliverable: yournameLab4.py Your source code solution and a copy of the run pasted into your source submission file. Be sure to comment out your run so that your .py file will still run in the grader test bed. Validate user input is a single positive digit [0 - 9].

Answers

Answer:

The program in Python is as follows:

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

num = input("Number: ")

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

print(dict)    

print(dict[int(num)])

Explanation:

#This initializes the dictionary

dict = {0:"Zero",1:"One",2:"Two",3:"Three",4:"Four",5:"Five",6:"Six",7:"Seven",8:"Eight",9:"Nine"}

#This gets input from the user

num = input("Number: ")

#This loop is repeated until the user enters a valid input

while(num.isdigit() == False or int(num)<0 or int(num)>9):

   num = input("Number: ")

#This prints the dictionary

print(dict)    

#This prints the value of the key

print(dict[int(num)])

See attachment for sample run

Write a function gcdRecur(a, b) that implements this idea recursively. This function takes in two positive integers and returns one integer.
''def gcdRecur(a, b):
'''
a, b: positive integers
returns: a positive integer, the greatest common divisor of a & b.
'''
# Your code here
if b == 0:
return a
else:
return gcdRecur(b, a%b)
#Test Code
gcdRecur(88, 96)
gcdRecur(143, 78)
© 2021 GitHub, Inc.

Answers

Answer & Explanation:

The program you added to the question is correct, and it works fine; It only needs to be properly formatted.

So, the only thing I did to this solution is to re-write the program in your question properly.

def gcdRecur(a, b):

   if b == 0:

       return a

   else:

       return gcdRecur(b, a%b)

gcdRecur(88, 96)

gcdRecur(143, 78)

Write a program that asks a user to enter a date in month day year format (for example 10 12 2016) and displays the day of the week for that date, in this case, Wednesday.

Answers

Answer and Explanation:

Using javascript:

function dayof_theweek(){

var TodayDate = window. prompt("enter today's date in the format 'year, month, day' ");

var Datenow=new date(TodayDate);

var Dayofweek=Datenow.getday();

var Days=["monday","Tuesday", "Wednesday", "Thursday", "Friday", "Saturday", "Sunday"];

if(Dayofweek==indexOf(Days[Dayofweek]))

{

document.createTextnode(Days[Dayofweek]);

}

}

The program above uses a date object which uses the method getday to get the day of the week(get day returns an integer from 0 to 6).we then use a comparison operator == to test the condition that returned value Dayoftheweek is same with the index of the array Days and then print to a html document. The program may need improvements such as the fact that errors may arise when proper input isn't given, and therefore must be handled.

A backbone network is Group of answer choices a high speed central network that connects other networks in a distance spanning up to several miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to thousands of miles). a network spanning exactly 200 miles with common carrier circuits.

Answers

Answer:

a high speed central network that connects other networks in a distance spanning up to several miles.

Explanation:

A backbone network functions just like the human backbone providing support for network systems by offering a network infrastructure that allows small, high speed internet connectivity. It is a principal data route between large interconnected networks which offers connection services spanning several miles. Most local area networks are able to connect to the backbone network as it is the largest data connection on the internet. This backbone networks are mainly utilized by large organizations requiring high bandwidth connection.

What happens when a dataset includes records with missing data?

Answers

Answer:

However, if the dataset is relatively small, every data point counts. In these situations, a missing data point means loss of valuable information. In any case, generally missing data creates imbalanced observations, cause biased estimates, and in extreme cases, can even lead to invalid conclusions.

It makes data analysis to be more ambiguous and more difficult.

Missing data is simply the same as saying that there are values and information that are unavailable. This could be due to missing files or unavailable information.

A dataset set with missing data means more work for the analyst. There needs to be a transformation in those fields before the dataset can be used.

Generally speaking missing data could lead to bias in the estimation of data.

A data scientist is a data expert who is in charge of data. He performs the job of data extraction, data analysis, data transformation.

read more at https://brainly.com/question/17578521?referrer=searchResults

Suppose you have some List of S List of Strings called List and a String prefix. Write a method that removes all the Strings from list that begin with prefix. public void removePrefixStrings(List-String- list, String prefix) 7. What is the time complexity of this algorithm?

Answers

Answer:

public void removePrefixStrings(List<String> list , String prefix) {

if(list==null || list.size()==0)

return;

for(int i=0; i<list.size();) {

if(list.get(i).startsWith(prefix))

list.remove(i);

else

++i;  

}  

}  

Time Complexity: If the prefix is the same as String length, Then finding all prefix match will take n *n = n2

Then removal is also n  

So the total time complexity is O(n3)

A desktop computer is a type of mobile device.

a. true
b. false

Answers

Answer:B.false
Answer B

A desktop computer is a type of mobile device: B. False.

What is a desktop computer?

A desktop computer simply refers to an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output that's usable by an end user.

Generally, desktop computers are fitted with a power supply unit (PSU) and designed to be used with an external display screen (monitor) unlike mobile device.

In conclusion, a desktop computer is not a type of mobile device.

Learn more about desktop computer here: brainly.com/question/959479

#SPJ9

Other Questions
5. Rectangle ABCD is graphed in the coordinate plane. The following are vertices of the rectangle: A(-1,-6), B(-1,-7), C(1,7), and D(1,-6). Given these coordinates, what is the length of side AB in this triangle? On the lines below, provide the length of the side as well as your reasoning for how you arrived at your answer. What volume of each solution contains 0.14 mol of KCl? Express your answer using two significant figures.1.8 M KCl what gender of offspring are most often affected by sextinked inheritance?-What gender-are-usmally-carriers-of the trait?-males, males -males, females -females, females -females, males O O What two dynasties were able to unite india ? 1) 1. What is the central idea of the article?A People have a large influence over others when they are in a group.B One can avoid a group's influence by staying aware of who they are.C People lose a sense of who they are as individuals when they are in a group.D One can look to group behavior for the cause of some of the worst atrocities in history. Simplify Square root (150n^2) Each of Professor A and Professor B at UTD has a private secretary, who can type four letters per hour. The letters are generated at a rate of three per hour by each of the two professors, who have been wondering if they would benefit from pooling the two secretaries. Perform a queuing analysis. What is the average waiting time of a letter in the system. 3000 dollars is invested in a bank account at an interest rate of 7 percent per year, compounded continuously. Meanwhile, 20000 dollars is invested in a bank account at an interest rate of 5 percent compounded annually.To the nearest year, when will the two accounts have the same balance? 40) what is the area of a rectangular porch measuring 8 ft x 12/f45) Create a stem and leaf plot to represent this set of data.30, 62, 32, 63, 43, 77, 48, 78, 49, 82, 51, 84, 60,please make sure to answer both questions 30 points PLEASE HELP!!!!Find the volume of the pyramid.76.34 ft3458.06 ft3916.11 ft3305.37 ft3 Simplify the expression.7(5 +t) - 4(t + 4)7(5 + t) - 4(t + 4) = [ Which of the following best captures Kants Formula of Humanity as End?a) I ought never to act in such a way that I could not also will that my maxim should become a universal law.b) Act in such a way that you treat humanity, whether in your own person or in any other person, only as an end, never as a means.c) Never make an exception for yourself.d) Act only on that maxim by which you can at the same time will that it should become a universal law.e) Act in such a way that you treat humanity, whether in your own person or in any other person, always at the same time as an end, never merely as means. 2. Which of the following statements is not accurate regarding extrinsic motivation?A. A personal trainer is not considered an example of extrinsic motivation since you are paying for her services.B. Attending a fitness class with your friends is a form of extrinsic motivation,C. Extrinsic motivation can help someone lacking confidence in their ability to complete a workout.D. Extrinsic motivation can help a person overcome a personal lack of motivation. "Student life is not the proper time to do things. It is the time to prepare for things to be done in future."How does it sound?? Please help me to find this answer What is the best revision of the error in sentence1?DC[1] On her way home from practice, Rebekkafound a gold man's watch. [2] She wasn't surewhat to do. [3] There was no name engravedon the back. [4] Looking at the gold links onthe band, the watch seemed to Rebekka to beexpensive. [5] She felt badly that someonehad lost such a nice watch."gold watch of a man""man's gold watch""man's watch of gold" What must happen to uranium before it can be used as a fuel source? why did exodusters migrate west? which constitutional amendment directly resulted fr the civil warA 1st B 10thC 13D 17E 21