Answer:
The program in Python is as follows:
def ASCIIsum(str1,str2):
asciisum1 = 0; asciisum2 = 0
for chr in str1:
asciisum1 += (ord(chr) - 96)
for chr in str2:
asciisum2 += (ord(chr) - 96)
if asciisum1 > asciisum2:
return True
else:
return False
str1 = input("Enter first string: ")
str2 = input("Enter second string: ")
if ASCIIsum(str1,str2) == True:
print(str1,"has a higher ASCII value")
else:
print(str2,"has a higher ASCII value")
Explanation:
This defines the function
def ASCIIsum(str1,str2):
This initializes the ascii sum of both strings to 0
asciisum1 = 0; asciisum2 = 0
This iterates through the characters of str1 and add up the ascii values of each character
for chr in str1:
asciisum1 += (ord(chr) - 96)
This iterates through the characters of str2 and add up the ascii values of each character
for chr in str2:
asciisum2 += (ord(chr) - 96)
This returns true if the first string has a greater ascii value
if asciisum1 > asciisum2:
return True
This returns false if the second string has a greater ascii value
else:
return False
The main begins here
This gets input for first string
str1 = input("Enter first string: ")
This gets input for second string
str2 = input("Enter second string: ")
If the returned value is True
if ASCIIsum(str1,str2) == True:
Then str1 has a greater ascii value
print(str1,"has a higher ASCII value")
If otherwise
else:
Then str2 has a greater ascii value
print(str2,"has a higher ASCII value")
Ellen is working on a form in Access and clicks on the Design tab in the Form Design Tools section. Ellen then clicks on the Controls button and clicks the Label icon. What is Ellen most likely doing to the form?
A.adding a title
B.adding an existing field
C.changing the anchoring setting
D.changing the font of a label
Answer:
D. changing the font of a label
1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message. Save the file as SqrtException.java.
2. Create a ProductException class whose constructor receives a String that
consists of a product number and price. Save the file as ProductException.java.
Create a Product class with two fields, productNum and price. The Product
constructor requires values for both fields. Upon construction, throw a
ProductException if the product number does not consist of three digits, if the
price is less than $0.01, or if the price is over $1,000. Save the class as Product.java.
Write an application that establishes at least four Product objects with valid and invalid values. Display an appropriate message when a Product object is created
successfully and when one is not. Save the file as ThrowProductException.java.
Answer:
Hence the answer is given as follows,
Help Pls
I need about 5 advantages of E-learning
Answer:
Explanation:
E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...
E-learning leads to better retention. ...
E-learning is consistent. ...
E-learning is scalable. ...
E-learning offers personalization.
Answer:
E- learning saves time and money
E-learning makes work easier and faster
E- learning is convenient
E- learning is consistent
E- learning is scalable
Explanation:
when you learn using the internet, you save a lot of time by just typing and not searching through books
For the following scenario, indicate whether the action is a good practice or bad practice to safeguard your personally identifiable information.
Marina's personal computer requires a password to get access.
Answer:
This is most definitely a good practice to safeguard personal information. This way, people wouldn't be able to access her computer easily, since it requires a code that only she would know. of course, there is the possibility that someone can just guess or hack into her computer, but that's why computers usually have you create a unique code that consists of uppercases, lowercases, numbers, special characters, etc which would be difficult to guess. it's a good protection for anyone who wants to safely keep their personal information from everyone else.
cho dãy số a[] có n phần tử và dãy số b[]cõ m phần tử là các các số nguyên dương nhỏ hơn 1000 . Gọi tập hợp A là tập các số khác nhau trong a[], tập hợp B là các số khác nhau trong b[]
Answer:
please translate
Thank you✌️
Many Java programs that you create will receive and process user input. In order to ensure that user input is accurate, you will need to use input validation and exception handling.
a. True
b. False
Answer: True
Explanation: True
Write down the short history of COMPUTER?
Answer:
Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer",he conceptualized and invented the first mechanical computer in the early 19th century.
Shawn's supervisor has tasked him with determining how the company can increase the security of its Wi-Fi. Shawn plans to present several options to his supervisor and ask her to check his work. Which of the following is not a strong security method? (Select TWO.)
a. Disabling SSID
b. WPS
c. MAC filtering
d. Setting encryption
Answer:
The not strong security methods are:
a. Disabling SSID
b. WPS
Explanation:
When you disable SSID, you only make your Wi-Fi secure for the less determined attackers. By disabling the SSID (network name), those who are less technically inclined are prevented from connecting to the network but, this will not deter a more determined and technically savvy adversary. The best two options are MAC filtering and setting encryption. WPS (Wi-Fi Protected Setup) enables the process of connecting to a secure wireless network from a computer or other device easier instead of making it harder.
Draw AND, OR, XOR and XNOR gates with truth table and logic gates.
.
Answer:
see picture. let me know if you have questions.
If i took my SIM card out of my phone and put it in a router then connect the router and my phone with Ethernet cable would the ping change???
Answer:
ummmmmmmmmmmmm nooooo???
Write a program to print all odd numbers between 20 and 50(Qbasic)
Suppose a program written in language L1 must be executed on a machine running a program running in language L0. What important operation must take place
Question Completion with Options:
a. Translation of the entire L1 program into L0 code
b. Translation of the L0 program into L1 code
c. Creation of a language L3 that interprets L0 instructions
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Answer:
The important operations that must take place in this scenario are:
a. Translation of the entire L1 program into L0 code
d. Interpretation of each L1 statement using L0 code as the L1 program is running.
Explanation:
Translation enables decoding to take place. This means that the L1 program is decoded into a language that the L0 program can understand and execute. Without this translation, the higher level language of L1 will not be understood by the machine language of the L0 programs. Translation of a code creates a shared understanding, thereby easing program execution. Code translation is simultaneously accompanied by interpretation.
Select the pseudo-code that corresponds to the following assembly code. Assume that the variables a, b, c, and d are initialized elsewhere in the program. You may want to review the usage of EAX, AH, and AL (IA32 registers). Also recall that the inequality a > b is equivalent to b < a. i.e. If A is greater than B, that's equivalent to saying that B is less than A.
.data
; General purpose variables
a DWORD ?
b DWORD ?
c BYTE ?
d BYTE ?
upperLevel DWORD 18
lowerLevel DWORD 3
; Strings
yes BYTE "Yes",0
no BYTE "No",0
maybe BYTE "Maybe",0
code
main PROC
mov eax, 1
cmp AH, c
jg option1
jmp option3
option1:
mov edx, OFFSET yes
call WriteString
jmp endOfProgram
option2:
mov edx, OFFSET no
call WriteString
jmp endOfProgram
option3:
mov edx, OFFSET maybe
call WriteString
endOfProgram:
exit
main ENDP
END main
a) if (c > 0)
print (yes);
else
print (maybe);
b) if (c < 0)
print (yes);
else
print (maybe);
c) if (c < 1)
print (yes);
else
print (maybe);
d) if (c > 1)
print (yes);
else
print (maybe);
Answer:
ae
Explanation:
The pseudo-code that corresponds to the given assembly code is:
b) if (c < 0)
print (yes);
else
print (maybe);
What is the pseudo-codeIn assembly code, the command cmp AH, c checks if the high byte of the EAX register (AH) has the same value as the variable c. Then, if the value in AH is more than the value in c, the instruction jg option1 will move to option1.
Therefore, In the pseudo-code, one can check if c is smaller than 0. If it happens, we say "yes". If not, we say "maybe"
Read more about pseudo-code here:
https://brainly.com/question/24953880
#SPJ2
You are going to purchase (2) items from an online store.
If you spend $100 or more, you will get a 10% discount on your total purchase.
If you spend between $50 and $100, you will get a 5% discount on your total purchase.
If you spend less than $50, you will get no discount.
Givens:
Cost of First Item (in $)
Cost of Second Item (in $)
Result To Print Out:
"Your total purchase is $X." or "Your total purchase is $X, which includes your X% discount."
Answer:
Code:-
using System;
using System.Collections.Generic;
class MainClass {
public static void Main (string[] args) {
int Val1,Val2,total;
string input;
double overall;
Console.Write("Cost of First Item (in $)");
input = Console.ReadLine();
Val1 = Convert.ToInt32(input);
Console.Write("Cost of Second Item (in $)");
input = Console.ReadLine();
Val2 = Convert.ToInt32(input);
total=Val1+Val2;
if (total >= 100)
{
overall=.9*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else if (total >= 50 & total < 100)
{
overall=.95*total;
Console.WriteLine("Your total purchase is $"+overall);
}
else
{
Console.WriteLine("Your total purchase is $"+total);
}
}
}
Output:
Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using
Answer:
I'll let you make an educated guess off of this info! You always retain info better making an inference on a subject that you are having trouble with!
Explanation:
There are four types of wireless networks -- wireless local area networks, wireless metropolitan area networks, wireless personal area networks and wireless wide area networks -- each with its own function.
wireless local area networkA wireless local area network (WLAN) is a wireless distribution method for two or more devices. WLANs use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users to move around the coverage area, often a home or small office, while maintaining a network connection.
wireless metropolitan area networkA metropolitan area network (MAN) is a computer network that connects computers within a metropolitan area, which could be a single large city, multiple cities and towns, or any given large area with multiple buildings. A MAN is larger than a local area network (LAN) but smaller than a wide area network (WAN).
wireless personal area networkA PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assistants. PANs can be used for communication among the personal devices themselves, or for connecting to a higher level network and the Internet where one master device takes up the role as gateway.
wireless wide area networkWireless wide area network (WWAN), is a form of wireless network. ... WWAN connectivity allows a user with a laptop and a WWAN card to surf the web, check email, or connect to a virtual private network (VPN) from anywhere within the regional boundaries of cellular service.
I hope this helped!!
shania
The network type Genevieve uses is a wireless local area network.
What is a wireless local area network?
A wireless local area network (WLAN) exists as a wireless distribution procedure for two or more devices. WLANs utilize high-frequency radio waves and often contain an access issue to the Internet. A WLAN permits users to move around the coverage area, often a house or small office, while preserving a network connection.
Therefore, the correct answer is option (a) LAN.
Complete questions:
Genevieve is a student who attends classes at a campus downtown. She likes to study in the college's coffee shop, where she often accesses the Internet through the college's wireless network. Which network type is Genevieve using
(a) LAN
(b) MAN
(c) PAN
(d) WAN
To learn more about wireless local area networks refer to:
https://brainly.com/question/8985345
#SPJ2
Peter is a new business owner. Because Peter is on a strict budget, he uses an older Novell NetWare server. The NetWare server still relies on the legacy IPX/SPX network protocol suite. Peter needs to connect his server to the Internet. He decides to use a gateway instead of a router. What is the likely motive behind Peter's decision
The most likely motive of Peter's decision to use a gateway for connecting his serve to the internet is to get a wireless connection for the internet.
A gateway server is used to communicate to the internet service provider. It is used to receives the data. It helps to sends the data to the router in order to translate as well as distribute the wireless devices.
In the context, Peter who is on a strict budget uses gateway system to connect to the internet and he uses the older version of Novell NetWare server.
Learn More :
https://brainly.in/question/35731153
Write and application that reads five integers from the user and determines and prints the largest and the smallest integers. Use only the programming techniques your learned in this chapter (use only if statements) 1.2. Modify your first program to add 2 more functions, the first function should determines the largest number and the second smallest. Both new functions must get invoked from the main function.
Answer:
#include <stdio.h>
#include <limits.h>
/* Define the number of times you are going
to ask the user for input. This allows you
to customize the program later and avoids the
hard coding of values in your code */
#define NUMVALS 5
int main(void)
{
int i = 0;
int curval = 0;
/* Set your initial max as low as possible */
int maxval = INT_MIN;
/* Set your initial min as high as possible */
int minval = INT_MAX;
/* Loop through and ask the user for the defined
number of values */
for (i = 0; i < NUMVALS; i++)
{
/* Ask the user for the next value */
printf("Enter the next value: ");
/* Get the next value from the user */
scanf("%d", &curval);
/* Check to see if this is our biggest or
smallest value yet */
if (curval > maxval)maxval = curval;
if (curval < minval)minval = curval;
}
/* Output the results */
printf("The smallest value entered was: %d \n", minval);
printf("The largest value entered was: %d \n", maxval);
/* End the program */
return 0;
}
Explanation:
what is a computer memory
Answer:
it is your answer
Explanation:
it is the storage space where data is kept.
The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development.
Explanation:
With the great advances in computer systems today it is possible that we can connect and interact with people who are on the other side of the planet, we can study virtually without having to attend a university or school in person, we can even work from our own homes without having to travel to our workplace, which allows us to reduce transportation costs and time.
The above benefits have been possible thanks to the evolution of computer systems.But just as the evolution of computer systems brings great benefits, it also carries great risks for the future, in recent years there has been a considerable increase in cyber attacks, therefore it is necessary an advanced cybersecurity system that allows to quickly control and protect from external threats to organizations; As well as it is necessary to emphasize training in computer systems for people of all educational levels so that they are prepared and can give proper use to computer systems and thus also learn to protect themselves from cyber fraud.
(viii) Word does not allow you to customize margins.
true/false:-
How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array
Answer:
Explanation:
260 cost units, Big O(n) complexity for a push
Which of the following is not a data visualization technique?
Answer:
Normalization
Explanation:
From the options given :
Boxplot is a data visualization techniqye used for representing numerical data in the form of a box such that it adequately conveys the five number summary if the dataset which are the minimum, maximum, lower quartile, median and upper quartile, it also depicts the presence of outlines.
Scatter plot are used depict the relationship between two variables on the x and y axis of a graph. Each point is a representation of the (x, y) value pairs of the observation.
Tag clouds are usually used to represent word, metatdata and other free form text using different colors and font sizes to give information about the data.
Normalization is the odd option out as it is used to restructure data in other to promote integrity of data.
What is software? Why is it needed?
Explanation:
Software is a data and information collection of computer.
It needs to protect computer from viruses.
I hope this helps you
discribe two ways you can zoom in and out from an image
CONDUCT INTERVIEWS
Using your interview questions, interview at least three business professionals. Here are some useful tips for conducting the interviews:
Schedule an appointment for the interview for a time and place that is quiet and convenient.
Be on time and be prepared with paper and pen. You may also bring a recording device.
Be friendly and courteous; remember that the interviewee is giving you her valuable time!
Ask your questions clearly.
Don't interrupt!
Try to stay focused, but if something interesting comes up, go with it.
Take good notes. Ask the interviewee to repeat what she said if necessary, but only do this when it is something important.
Obtain all the information needed before ending the interview. If necessary, review your notes with the person.
Thank the interviewee for her time.
Write a description of the interviews in this text box.
Note that conducting a professional interview with business professionals is quite tasking and it does require skills and boldness,
Note that the questions that one need to ask are questions that are based on the field of those business professionals, the company, your background, their dreams and aspirations and as such one should not be personal about it.
What are the interview questions asked?The interview questions prepared were:
Do they have the skills, expertise, and experience to carry out the job?.Are they happy and interested in current job and the current firm they are working with?.Can I fit into their team, organization culture, and firm?. etc.Learn more about interview from
https://brainly.com/question/8846894
A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
Answer:
The answer is D.
Explanation:
because the other answers doesn't make sense.
what is 1 st genaration of computer
Explanation:
The period of first generation computer was from 1946-1959 AD .The computers of first generation used vacuum tubes as the basic components for memory and circuitry for CPU ( Central Processing Unit).These tubes, like electric bulbs, produced a lot of heat and were prone to frequent fusing of the installation.
Hope it helps...............
How can the system administrator give the executive assistant the ability to view, edit, and transfer ownership of all records, but not allow her to delete the records
disadvantage of monolithic programming
Answer:
=Tight coupling between components, as everything is in one application.
=Less reusability.
=Large code base; tough for developers and QA to understand the code and business knowledge.
=Less Scalable.
=Does not follow SRP (Single Responsibility Principle)
=More deployment and restart times.
Explain how communication has helped to the staff in organization to reach their maximum delivery of service with efficience and effectiveness
Answer:
i don't know
Explanation: