Which statement is true? Select 3 options.
1. Deques can be created empty.
2. Deques are lists.
3. Lists are deques.
4. Deques can contain lists.
5. A deque is a type of collection.

Answers

Answer 1

Answer:

2nd statement is True dear!!!

Answer 2

Answer:

Deques can contain lists.

A deque is a type of collection.

Deques can be created empty.

Explanation:

Answers can be found in Edge instructions

"You can make a deque whose members are lists."

"You can create an empty deque or create a deque with a list or a string."

"You have used lists and deques, which are two types of collections used by Python. "


Related Questions

Select the three reasons that the gaming industry is set to grow.

A) more colleges offering jobs in game design

B) a decrease in the average age of gamers

C) an expanding market on mobile phones

D) expanding markets in Asia

E) new accessories that will attract more players

Answers

Answer:

expanding markets in Asia, new accessories that will attract more players, an expanding market on mobile phones

Explanation:

Nina visited an area that receives a large amount of precipitation during all twelve months and is typically warm year round. The area also has a large variety of organism diversity. What biome did Nina most likely visit?

Answers

Answer: Rainforest

Explanation:

A rainforest is an area that typically has tall, green trees and also has a high amount of rainfall. Rainforest can be found in the wet tropical uplands and lowlands. The largest rainforests can be seen in the Amazon River Basin.

Since the area visited by Nina has a large amount of precipitation during all twelve months, typically warm year round and has a large variety of organism diversity, then the biome thatcNina most likely visited is the rainforest.

Which headphones are a better option, the HyperX Cloud Stinger or the Logitech G432

Answers

Answer:

The Logitech ones.

Explanation:

Surprisingly I've used all 3 of them and the Logitech ones are the one with not only the best sound quality. And the mic isn't horrible either.

what type of computer system can be found in the computer lab at school?
A. mini
B. micro
C. Mainframe
D. super​

Answers

Answer:

B: micro

Explanations

a small computer that contains a microprocessor as its central processor.

Realiza una tabla acerca de los escenarios de usos más comunes de Excel.

Answers

Answer:

Microsoft Excel es una hoja de cálculo producida por Microsoft. La aplicación es ampliamente utilizada en empresas e instituciones, así como por usuarios domésticos. Su uso principal es realizar cálculos (por ejemplo, gastos) compilados en forma tabular. Para este uso, se aplican numerosas funciones matemáticas, financieras y de base de datos disponibles en el programa. La duplicación semiautomática de las fórmulas creadas con el uso de diferentes variantes de direccionamiento (direccionamiento relativo, direccionamiento absoluto, direccionamiento mixto) también es de gran importancia. Microsoft Excel también se utiliza para crear muchos tipos de gráficos, útiles, entre otros, en física, matemáticas y economía. También incluye un sistema para la elaboración de informes utilizando el llamado tablas dinámicas, utilizadas en la realización de análisis comerciales.

Why is computer called information processing maching???​

Answers

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine (IPM).

HOPE IT HELPS ❣️

Answer:

Since, the computer accepts raw data as input and converts into information by means of data processing, it is called information processing machine or IPM.

Explanation:

Why does brainly always say, "We're sorry, but we are not able to complete your registration at this time"?! Now I cant view any answers to any questions!

Answers

Answer and Explanation:

It's very likely a network issue. You could do a hard refresh on your browser or brainly app. Simply clear your application's cache or your browser data or cache and then try again. You could also try re-installing your app. If this doesn't work, please reach out to the Brainly customer support team for help.

A programmer for a weather website needs to display the proportion of days with freezing temperatures in a given month.


Their algorithm will operate on a list of temperatures for each day in the month. It must keep track of how many temperatures are below or equal to 32. Once it's done processing the list, it must display the ratio of freezing days over total days.
Which of these correctly expresses that algorithm in pseudocode?
A.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

DISPLAY(numFreezing/numDays)

}

B.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

C.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp < 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

D.
numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

numDays ← numDays + 1

}

}

DISPLAY(numFreezing/numDays)

Answers

Answer:

B.

Explanation:

The correct Pseudocode for this scenario would be B. This code makes two variables for the number of total days (numDays) and number of freezing days (numFreezing). Then it loops through the entire data set and checks if each temp is less than or equal to 32 degrees. If it is, it adds it to numFreezing, if it is not then it skips this step, but still adds 1 to the total number of days after each loop. Once the entire loop is done it prints out the ratio, unlike answer A which prints out the ratio for every iteration of the loop.

numFreezing ← 0

numDays ← 0

FOR EACH temp IN temps {

IF (temp ≤ 32) {

numFreezing ← numFreezing + 1

}

numDays ← numDays + 1

}

DISPLAY(numFreezing/numDays)

Choose the word that matches each definition. 1. IP Address 2. Server 3. Port Each term is only used once._____________ a number used within a computer to identify a specific process ____________ a numerical reference to a particular device in a network ___________ a computer that handles requests and returns data to other computers in a network

Answers

Answer:

  Port      a number used within a computer to identify a specific process.

   IP Address     a numerical reference to a particular device in a network.

   Server           a computer that handles requests and returns data to other computers in a network.

Explanation:

A port number is a number used to uniquely identify a particular process, application or program on a computer. From the networking parlance, it is a logical address that uniquely identifies a process, protocol or application communicating with other process, protocol or application over a network. For example;

i. a file transfer protocol (FTP) could use a port number of 20 or 21.

ii. a simple mail transfer protocol (SMTP) could use a port number of 25

Internet Protocol (IP) address is a numerical reference or label assigned to a particular device in a network which helps to uniquely identify the device on the network. IP addresses (version 4) are expressed as a group of four numbers separated by a dot. For example, an IP address may look like this: 192.168.0.90

A server is a computer that receives requests from other computers, processes these requests and returns some data to the other computers  in a network. In reality, these servers and the computers they serve can actually be some applications or programs. Servers provide resources, data, services or programs to other computers over a network.

Answer:

IP address: an Internet Protocol (IP) address is a numerical reference to a particular device in a network

port: a number used within a computer to identify a specific process

server: a computer that handles requests and returns data to other computers in a network

Explanation:

edge 2022

help please I would really appreciate

Answers

Answer:

the answer is address bar

Answer:

This is called an address bar

Explanation:

It tells your computer where to send the data and what website you are trying to communicate with.

:)

In terms of technology, wich of the four devices is the most recent?

a. keyboard
b. joystick
c. scanner
d. camera​

Answers

Joystick (1972)

They consider the typewriter a keyboard…late 1800’s
Scanner (1957)
Camera (late 1800)

Hadoop is : open source software framework designed for distributing data-processing over inexpensive computers. data mining platform designed for storing and analyzing big data produced by web communications and transactions. high-speed platform used to analyze large data sets pre-configured hardware-software system designed for analyzing big data. NoSQL database technology that stores both data and procedures acting on the data as object

Answers

Answer: open-source software framework designed for distributing data-processing over inexpensive computers.

Explanation:

Hadoop refers to the collection of open-source software utilities which are important in facilitating the use of a network of several computers to solve big data.

It provides huge storage for different kinds of data, and the ability to handle concurrent tasks virtually. Therefore, the correct option is "open-source software framework designed for distributing data-processing over inexpensive computers".

You are going to create multiple functions that will take in the appropriate measurements as parameters and calculate the area of the specific shape.

The following shapes must be included:
Square, Triangle, Circle, and Trapezoid

Feel free to add on more shapes if you want!!

Answers

Answer:

circle

Explanation:

Answer:

circle

Explanation:

Select the four bad password ideas.

A) lists of numbers in order, such as 1234

B) your name or your child's name

C) the word "password"

D) an inside joke you have with yourself

E) the name of the website

F) strings of random numbers

Answers

Answer:

the word "password", the name of the website, lists of numbers in order, such as 1234, your name or your child's name

Answer:

A,C,E,B

Explanation:

list any three positive impacts of computer technology in our society?

Answers

Answer:

nWhich statement about the origins of the American population is true?

A most Americans descend from people who first populated this continent about 20,000 years ago

b about 98 percent of Americans live in this country due to the waves of Irish and German people who came in mid 1800s

c immigration expander the American population before 1806 ,bur has no significantly contributed to it since then

d the vast majority. of Americans ms either descended from immigrats or are immigrants themselves

Explanation:

sjsikskakakakakkakznxjduwjawjieieiwiwiwiwiwiw idek computer mouse laptopdhsjsjsjsjjsjs

You are an IT technician for your company. Vivian has been receiving error messages indicating that some of her Windows system files are corrupt or missing. To fix this issue, you ran the Windows System File Checker tool (SFC.exe). Shortly after the files were repaired, Vivian calls again because she is still having the same issue. You now suspect that the corruption or renaming of the system files is being caused by malware. Which of the following is the next BEST step that should be taken?
A. Quarantine Vivian's computer.
B. Disable System Restore.
C. Perform a scan using anti-malware software.
D. Back up Vivian's critical files and perform a clean install of Windows.

Answers

Answer: D

Explanation: Using anti malware software is a good method but you can never be 100% sure it's gone and the software may not detect it, better to start off clean.

The answer is D hope it helps


A file format refers to the background in a presentation.
True
False

Answers

Answer:

False

Explanation:

Required

Describe file format

Literally, file format means file extension and it describes the type of file.

For instance:

. d o c is a file format of word documents

. j p g is a file format of  images

etc.

Hence, the statement is false

Answer: The answer is false

Explanation: File formats are linked to certain programs

Which option is not available in the Presenter view of a presentation?

Answers

Group of answer choices.

A. Next Slide Preview

B. Pen/Laser Pointer tools

C. Open Slide Show

D. Navigation Controls

Answer:

C. Open Slide Show

Explanation:

PowerPoint application can be defined as a software application or program designed and developed by Microsoft, to avail users the ability to create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Basically, the views that are available on the Microsoft PowerPoint application includes;

1. Slide Sorter.

2. Notes Page.

3. Reading Pane.

4. Presenter view.

Presenter view avails the user an ability to use two monitors to display his or her presentation. Thus, one of the monitors displays the notes-free presentation to your audience while the other monitor lets you view the presentation with notes that you have added to the slides, as well as the navigation and presentation tools.

Furthermore, the Presenter view was developed by Microsoft Inc. to have the following options;

I. Next Slide Preview.

II. Pen/Laser Pointer tools.

III. Navigation Controls.

However, Open Slide Show is an option which is not available in the Presenter view of a presentation.

In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users. This is an example of violation of ___________________.

Answers

Answer:

The answer is "Authentication"

Explanation:

The attacker had the opportunity to log into the legitimate users' stolen credentials in Boeing systems and other firms in this question. That's an example of a verification violation.

This is a recognition of the identification of a user. Various students typically require various kinds of certificates in order to create the identity of the user. The credentials are frequently a passcode that only people and the computer know and seem to be confidential.

Recently mobile phones have been used to pay for goods in stores and supermarkets. One method
of payment involves holding the phone close to a reader in the store.
Discuss the advantages and disadvantages of this method of payment compared with other methods
of credit/debit card transactions.

Answers

Answer on https://pastebin.com/raw/nHzXvbPP

list five function key
list two alphabet key
byEmmanuel okorie​

Answers

Explanation:

Function keys:F1,F2,F3,F4

Alphabetic keys H,A

What is the main device used on fourth generation computer​

Answers

Answer: Microprocessors were used to create the fourth generation of computers. In 1971, Intel built the first microprocessor, the 4004 chip.

Explanation: The microprocessor is a silicon chip with millions of transistors built using LSI and VLSI technologies.

hope this helps best of luck mate! :)

Can someone please type a code that makes a house in python and turtle graphics i need help

Answers

Answer:

import turtle  

turtle.speed(2)

#shape

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

turtle.left(45)

turtle.forward(100)

turtle.left(90)

turtle.forward(100)

#door

turtle.left(90)

turtle.forward(50)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(50)

#windows

turtle.penup()

turtle.right(90)

turtle.forward(20)

turtle.right(90)

turtle.forward(20)

turtle.pendown()

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

turtle.left(90)

turtle.forward(25)

turtle.left(90)

turtle.forward(40)

Explanation:

:)

Select three advantages of cloud computing.

A) large amount of storage capacity

B) no Internet access required

C) great flexibility

D) enhanced security

E) easily managed

Answers

Answer:

easily managed, large amount of storage capacity, great flexibility

Explanation:

describe the uses of computer in different fileds? please help me ​

Answers

Answer:

Computers are used to perform several industrial tasks. They are used to design products, control manufacturing processes, control inventory, manage projects, and so on. Computers are used to control and manage different manufacturing systems and continuous running of the industry.

Select the correct answer.
Carter, a graphic artist, is trying to apply color and tonal adjustments to an image without permanently changing pixel values. Which Image
editing tool or technique should Carter use?
OA the Color Replacement tool
ОВ.
an Adjustment layer
c. a vector Mask
OD.
a Curve adjustment
OE the Dodge tool

Answers

Answer: Adjustment layer

Explanation:

The image editing tool or technique that should be used by Carter use is an adjustment layer.

The adjustment layer that can be seen in Photoshop refers to an editing tool that's non-destructive image which can be used in adding color and tonal adjustments to a particular image without the pixels changing permanently.

By using the adjustment layers, one can be able to edit and then discard the adjustments. One can also be bake to restore the original image anytime that the person wants.

Answer: B: an Adjustment Layer

Explanation: Correct for Edmentum/Plato

Recently mobile phones have been used to pay for goods in stores and supermarkets.

One methodof payment involves holding the phone close to a reader in the store.Discuss the advantages and disadvantages of this method of payment compared with other methods of credit/debit card transactions.

Answers

Answer:

The advantages of using mobile phones to pay for goods in stores are;

1) The ability to pay for goods and/or services without having to carry a physical wallet, thereby making payments faster, more convenient, and safer as the contents of a money wallet or purse cannot be seen

2) The generation of security codes for each transactions, the use of PIN input and finger sprint scanning for payment, ensures access to payment authorization is limited and requires definitive authentication and that payment transactions will not need to be scrutinized by merchants to detect fraudulent transactions

3) Paying with the mobile phone increases privacy as the card used for payment will be known only to the person doing the payment, thereby a person can use a credit card with low limit without displaying them

The disadvantages of using mobile phones to pay for goods in stores includes;

1) The possibility of breach in security of the mobile phone during payment. Sensitive information of the mobile phone can be collected during payment and then used in other places without the permission of the owner of the phone

2) Mobile phone payment may not be suitable to people who prefer card or cash payment

3) The different mobile phone payment applications and platforms are not entirely compatible and can lead to payment challenges

Explanation:

1 punto
María tiene una empresa de mercancia
seca, dicha empresa brinda su servicio de
ventas de estas mercancías al por mayor y
menor para su clientela. ¿De qué tipo de
Comercio hablamos en este ejemplo?: *

Answers

Answer:

Retailing.

Explanation:

La venta al por menor o retailing es el suministro de bienes físicos a los consumidores para uso personal, sea en pequeña o grandes cantidades, siempre que esté destinado a consumidores finales. Es un sector que consta de diferentes ramas (como la industria alimentaria, la industria de la moda, la industria del mobiliario para el hogar, etc.). El comercio minorista es el último eslabón de la cadena de suministro que va desde el fabricante hasta el consumidor.

3 Negative ways of using the Internet​

Answers

Answer:

1. It rots the mind of children

2. It's to too addicting

3. can show bad things.

Explanation:

1. Cyber bullying.
2. Gambling (playing games where you win money)
3. Identity theft, hacking.

An input value has to be greater than 18 and less than 65 if a driving license is to be approved for issue. What type of input checking is appropriate?

Answers

Answer:

You should use an "if" statement to check whether the number is greater than 18 or less than 65.

Explanation:

You usually use "if" statements whenever you want to compare a number to another. Keep in mind that "if" statements are not only used for comparison!

Other Questions
5 plus 6 plus 7 plus 8 plus 9 plus 10 plus 11 plus ... if your answer is random you will be reported explanation would be appreciated, last word is indicated. BRAINLIEST PLS HELP(05.03)Identify the initial value and rate of change for the graph showninitial value:1,rate of change 3/5 initial value:3/5 ,rate of change 5/3 initial value :1,rate of change 5/3 initial value:5/3,rate of change:0 The equation of the line that has a slope and passes through the point (-1, -3) is 3x + 2y +3 = 0. In the month of agust, joes snack shack sold 400 sandwiches. If 40% of them were made with chicken, how many chicken sandwiches were sold? I dont know where to start Why does the author use a problem/solution text structure in the paragraph? Help plzzzz I know how do it but the fraction is confusing me please help will give branliest 15. What is the average low temperature forecastedfor the five days?Monday: (Low F) 42 (High F) 55 Tuesday (Low F) 44 (High F) 57 Wednesday (Low F) 45 (High F) 60 Thursday (Low F) 34 (High F) 45 Friday (Low F) 40 (High F) 50 How does the fishermans motivation move the plot forward?The fishermans determination to outwit the genii results in the climax.The fisherman fears dying slowly and asks a question that results in rising action.The fisherman makes a poorly worded demand, which results in exposition.The fishermans anger at the situation leads him to be fearless, causing the climax 1. 45 is what percent of 82? 2. What percent of 5 is 26? 3. 22% of what number is 84? Answer This Question In A Row. I checked my email in (an) internet caf or internet caf ? Discuss the primary assumptions of Mercantilism. Concretely illustrate how Mercantilist theory influenced both the foreign and domestic policy of ONE European State during the 17th and 18th centuries. please answer this question Calcalculate potential energy given to a potato sack having a mass of 2 kg as I raise it to a height of 450 CM 1. Design pseudocode for a program that will permit a user to store exactly 75 numbers in an array. Create an array big enough to hold the numbers and store each number in the array as it's entered. Be sure to PROMPT the user for each number before it's entered. You do not need to initialize the array. HINTS: Make sure you use a named constant when you declare the array (the number inside the brackets should be a named constant that you declared before the array declaration.) Use a for loop (or while loop if you'd like) to get each number from the user. The module has an example of pseudocode very similar to this problem. You're free to use this pseudocode as you create your program. 2. Identify three advantages of arrays. For each advantage, write at least one complete sentence explaining why the advantage you listed is an advantage. More detail is better. You may use outside resources but be sure to CITE those resources using APA format. cell produces a chemical that diffuses short distances to reach nearby cells. This type of cell-cell interaction is an example of _______. Use pascal triangle to expand and simplify (5x+4y) 2. R10 000 is invested for two years at 8% per year compounded quarterlya) Calculate the value of the investment after two years.b) Determine the Interest earned by the investment. Name the subatomic parts of the atom, their charges and where they are located.