Answer:
In Python:
def times(x,y):
if y<0:
return -1*times(x,y*-1)
if y == 1:
return x
return x + times(x,y-1)
x = int(input("x: "))
y = int(input("y: "))
print(times(x,y))
Explanation:
I answered the question using Python3
This defines the function
def times(x,y):
This checks for negative values
if y<0:
return -1*times(x,y*-1)
This is the base case where y = 1
if y == 1:
If true, the value of x is returned
return x
This returns the recursion and it is repeated until the base case is achieved
return x + times(x,y-1)
This prompts user for x value
x = int(input("x: "))
This prompts user for y value
y = int(input("y: "))
This calls the recursion and also prints the result
print(times(x,y))
Many electronic devices use a(n) ?, which contains all the circuit parts in a miniature form.
Answer:
An integrated circuit is a single, miniature circuit with many electronically connected components etched onto a small piece of silicon or some other semiconductive material. (A semiconductor is a nonmetallic material that can conduct an electric current, but does so rather poorly.)
Explanation:
Many electronic devices use a(n) integrated circuit which contains all the circuit parts in a miniature form.
The use of integrated circuit is known to be a kind of a single, miniature circuit that has a lot of electronically connected parts that are designed onto a small piece of silicon or semi conductive material.
A lot of electronic components are known to be capacitors, inductors, resistors, diodes, transistors and others.
Learn more about electronic devices from
https://brainly.com/question/11314884
Write a program that calculates the average of N integers. The program should prompt the
user to enter the value for N and then afterward must enter all N numbers. If the user enters a
negative value for N, then an exception should be thrown (and caught) with the message “ N
must be positive.” If there is any exception as the user is entering the N numbers, an error
message should be displayed, and the user prompted to enter the number again.
Answer:
def Average(num):
if num == 0:
return 0
val = 0
trueNum = num
for i in range(0, num):
try:
val += int(input("Enter value (%d out of %d): " % (i+1,num)))
except Exception as e:
print ("Error processing value. Non integer detected.")
try:
val += int(input("Enter value (%d out of %d): " % (i+1,num)))
except Exception as e:
print ("Error processing value. Non integer detected.")
print ("OMITTING value from average.")
trueNum -= 1
return val/trueNum
def main():
try:
num = int(input("Enter a value N for amount of items: "))
if num < 0:
raise(ValueError)
except ValueError:
print ("N must be positive integer.")
exit(1)
print("Average: ", Average(num))
exit(0)
if __name__ == "__main__":
main()
Explanation:
This program is written in Python to collect some integer value from the user as an upper bound of integers to be input for an average. Using this upper bound, the program checks to validate it is indeed an integer. If it not an integer, then the program alerts the user and terminates. If it is a user, the Average function is called to begin calculation. Inside the Average function, the user is prompted for an integer value repeatedly up until the upper bound. Using the sum of these values, the program calculates the average. If the user inputs a non integer value, the program will alert the user that the value must be an integer and ask again. If the user again inputs a non integer value, that iteration will be omitted from the final average. The program this prints the calculated average to the user.
Cheers.
Which of the following examples requires a citation in a paper you're writing?
A. General information you already knew but want to clarify or conform
B. The table of contents
C. A paraphrasing of your original work in a different section of your paper
D. A direct quotation that is marked off by quotation marks
Answer:
D. A direct quotation that is marked off by quotation marks
Explanation:
Quotation marks are responsible for indicating that some texts are explicitly referenced in a paper with no changes made. This type of quote must be very well referenced in the paper, both on lines where the quotes are written with author's surname, date of publishing, page referenced, and also on the bibliography at the end of the paper with all these references very well detailed, including text's title, translators (if any), number of editions, publishing house, and more. It is important to highlight it depends on the policies of publishing the paper must follow because there are different patterns for referencing and quoting.
1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
attackware D. malware Answer:
2. Some examples of malware include: A. robots, viruses, and worms B. trojans, worms, and bots C. computerware,
worms, and robots D.worms, system kits, and loggerware Answer:
3. Viruses and worms can affect a system by A. deleting hard drives B. slowing down the system C. improving system
functions D. producing fake applications Answer:
4. One tool that hackers use to get sensitive information from victims is/are A. loggerware B. keyloggers C.robots D.
phishing Answer:
5. One key feature of malware is that it A. can only work individually B. can only work on certain operating systems C.
can work jointly with other malware types D. can always be stopped by anti-malware software Answer:
6. One vulnerability that makes computers susceptible to malware is A. using anti-malware software B. using password
protection C. using old versions of software D. using encryption on sensitive files Answer:
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering
personal information C. give an attacker full control over a system D. all of the above Answer: -
8. Malware is a combination of which two words? A malevolent and software B. malignant and software C.
maladapted and software D. malicious and software Answer:
9. The most common way that malware is delivered to a system is through the use of A USB sticks B. damaged
hardware C. emails/attachments D.updated software Answer:
10. Mobile malware is A. malware that moves from one device to another B. malware that moves to different areas in
one system C. malware that deactivates after a period of time D. malware that infects smartphones and tablets
Answer:
Answer:
Explanation:
1. D Malware causes harm, the other answers seem irrevelant.
2. B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)
3. B I haven't heard of viruses deleting hard drives, but lots of viruses do slow
down your computer.
4. D Phishing is a way to obtain data so yes.
5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.
6. Obviously C? Using old versions can make your computer more
susceptible to malware.
7. D Because all of those can be uses.
8. D Malicous software
9. This is a hard one... Not D, Most likely not B and C is probably more
common.
10. D It's MOBILE malware
Learning Target: Students will work on final project.
You have leamed about video game industry and acquired basic skills to make basic
video games in this class so far. It is time to update your resume and cover letter.
Re-visit your assignments from 9/28-9/29 in this class. You can find that at your
submission in google classroom for this class for the dates mentioned. Type your
resume and cover letter using google docs or MS word professionally. First do
research to find a job opening in a real company. Craft your resume and cover letter
as if you are applying for the job listed. List game projects, coding skills etc. that
could benefit you in finding his job.
1. Check-in/Exit Ticket
2. Resume and Cover Letter
Answer:
I don't get this question
Choose the correct term to complete the sentence
The ____ function removes the element with an index of zero.
1)popleft
2)leftremove
3)leftpop
Answer:
popleft
Explanation:
Answer: pop left
Explanation: got it right on edgen
What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer among the given options to this question is:
Knowledge of HTML is not required.
Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”) editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”) automatically inserts the HTML for the form and button on a website page.
While other options are not correct because:
Using the WYSIWYG (“what you see is what you get”) editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”) website templates are mostly used and modified using WYSIWYG editor.
Answer:
(C):Knowledge of HTML is not required.
A part-time job performed while in high school must have the approval of your school counselor.
False
True
Answer:
False, it only needs approval of your parents/guardian
May I have brainliest please? :)
Answer:
False
Explanation:
What are stored procedures? What kind of attack do stored procedures protect from? Identify two reasons why stored procedures are a good mitigation against the specific attack. g
Answer:
Stored procedures or procedures are subroutines or subprograms in SQL written by the user to accomplish a certain task. it helps to mitigate SQL injection by using markers as placeholders for data input and it streams the query statement and data separately in the database.
Explanation:
The stored procedure used in SQL is a user-defined function. Unlike built-in functions like pi(), they must be called to use them.
SQL injection in query statements is written by hackers to bypass conditions, especially when trying to gain access to other user accounts. Stored procedures use markers or placeholders to prevent this.
A free-frame list Select one: a. is a set of all frames that are used for stack and heap memory. b. is a set of all frames that are currently unallocated to any process. c. is a set of all frames that are filled with all zeros. d. is a set of all frames that are currently being shared by at least two processes.
Answer:
b. is a set of all frames that are currently unallocated to any process
Explanation:
The free frame list is the list that used for all kind of the frames that presently non-allocated to any kind or process
Therefore as per the given situation, the correct option is b as it fits to the current situation
Hence, all the other options are wrong
So, only option b is correct
The same is to be considered
Answer:
b. is a set of all frames that are currently unallocated to any process.
In C 11, the ________ tells the compiler to determine the variable's data type from the initialization value.
Answer:
auto key word
Explanation:
the auto keyword in c++11 can be regarded as one of the features of
“Type Inference” . It should be noted that in In C ++11, the auto key word tells the compiler to determine the variable's data type from the initialization value.
JAVA...Write a statement that calls the recursive method backwardsAlphabet() with parameter startingLetter.
CODE BELOW
public class RecursiveCalls {
public static void backwardsAlphabet(char currLetter) {
if (currLetter == 'a') {
System.out.println(currLetter);
}
else {
System.out.print(currLetter + " ");
backwardsAlphabet(--currLetter);
}
}
public static void main (String [] args) {
char startingLetter;
startingLetter = 'z';
/* Your solution goes here */
}
}
Answer:
RecursiveCalls.backwardsAlphabet(startingLetter);
Explanation:
The statement that is needed is a single-line statement. Since the class RecursiveCalls is already in the same file we can simply use that class and call its function without making a new class object. Once we call that class' function we simply pass the variable startingLetter (which is already provided) as the sole parameter for the function in order for it to run and use the letter 'z' as the starting point.
RecursiveCalls.backwardsAlphabet(startingLetter);
If A = 5 and B = 10, what is A * B equal to?
Answer:
50
Explanation:
5 times 10 equals 50
Answer:
50
Explanation:
If A=5 and B= 10 you would do 5 times 10 which equals 50
What kind of number is 36A
If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/Algorithm to search the heavy orange, in how many steps would you be able to find it out?
Answer:
#include <iostream>
using namespace std;
void Search_heavy_orange(int arr[], int l, int r, int x)
{
int count = 0, m = 0;
while (l <= r) {
m = l + (r - l) / 2;
// Check if x is present at mid
if (arr[m] == x) {
count++;
}
// If x greater, ignore left half
if (arr[m] < x) {
l = m + 1;
count++;
}
// If x is smaller, ignore right half
else {
r = m - 1;
count++;
}
}
cout << "............For Worst Case......." << endl;
cout << "Orange with heavy weight is present at index " << m << endl;
cout << "Total number of step performed : " << count << endl;
}
int main()
{
// Assuming each orange is 100 gm and the weight of heavy
// orange is 150 gm
int orange_weight[128];
for (int i = 0; i < 127; i++) {
orange_weight[i] = 100;
}
// At worst case the heavy orange should be at last position
// inside the basket : 127
orange_weight[127] = 150;
// We will pass array , start index , last index and the search element
// as the parameters in the function Search_heavy_orange
Search_heavy_orange(orange_weight, 0, 127, 150);
return 0;
}
Explanation:
What is closed soruce nonproprietary hardware and software based on publicly known standards that allow third parties to create
Answer:
open system
Explanation:
An open system is a system that sets open-source standards and promotes the interoperability and portability standards between systems developing and running open-source programs.
An open-source application is a program in which its source code is readily available and free for public use and upgrade. Unlike closed-source, its users can add or update the features of the source code.
ong answer, but make sure to provi
you
reasoning
Sales Company:
W.D. Widgets is a small company that sells widgets. They're mostly made up of salespeople who work with lots of clients.
You've taken over as the sole IT person for this company of 80-100 people.
R teils you to provision a machine for a new employee, you order the hardware directly from a business vendor.
You keep one or two machines in stock, in case of emergency. The users receive a username that you generate for them.
You then give them an orientation on how to login when they start. You currently manage all of your machines using
Windows Active Directory. The company uses only Windows computers. When a new computer is provisioned, you have
to nistallots of sales-specific applications manually onto every machine. This takes a few hours of your time for each
15
machine. When someone has an IT-related request, they email you directly to help them.
Almost all software is kept in-house, meaning that you're responsible for the email server, local machine software, and
instant messenger. None of the company's services are kept on the cloud.
Customer data is stored on a single file server. When a new salesperson starts, you also map this file server onto their
local machine, so that they can access it like a directory. Whoever creates a folder on this server owns that folder and
everything in it. There are no backups to this critical customer data. If a user deletes something, it may be lost for
everyone.
Answer:
Umm just go what your gut tells you to do
Explanation:
Prompt
Using complete sentences post a detailed response to the following.
Have you ever tried to learn a new language or do you have friends who've had that experience? What are some of the
steps you would take to learn a new language, and what are some challenges that might arise? What are some things that
can help make the process easier?
Have you ever tried to learn a new language or do you have friends who've had that experience?
Yes, I tried to learn Python and I even managed to do two Discord bots which are (somewhat) functional, but I'm far to say that I've managed to lean the language completly. There are lots of things to learn on a language as Python.
I also leant PHP on my own and managed to do a website (somehow) functional.
What are some of the steps you would take to learn a new language, and what are some challenges that might arise?
The first steps in learning any computer language is learning the syntax. If you manage to do that, with the experience you gained from previous projects/languages you might be able to create something working. At times you might feel down if the project doesn't work as expected.
What are some things that can help make the process easier?
Video tutorials, experiments and searching questions and problems on Google is a very important resource.
Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?
Answer:
This is not true
Explanation:
The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.
The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;
= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits
This would be the same for both cases.
The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.
The ____ represents units of work application software performs in terms of its demand for low-level hardware services.
Answer:
application demand model
Explanation:
One vulnerability that makes computers susceptible to walmare is:
A. A using antimalware software
B. Using password software
C. Using old versions of software
D. Using encryption on sensitive files
URGENT
You are an art director working for a feature film studio. Create a set for an interior scene of your choosing. Write a description of your scene to give to the principal production team. Include details that an art director would focus time and energy on. Include other production team members with whom you would collaborate. Your description should be at least 150 words.
Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
numPtr1 = 44, numPtr2 = 99
#include
#include
int main(void) {
int* numPtr1 = NULL;
int* numPtr2 = NULL;
/* Your solution goes here */
*numPtr1 = 44;
*numPtr2 = 99;
printf("numPtr1 = %d, numPtr2 = %d\n", *numPtr1, *numPtr2);
free(numPtr1);
free(numPtr2);
return 0;
}
Answer:
#include <stdio.h>
#include <stdlib.h>
int main(void) {
int* numPtr1 = NULL;
int* numPtr2 = NULL;
/* Your solution goes here */
numPtr1 = (int *) malloc(10);
numPtr2 = (int *) malloc(20);
*numPtr1 = 44;
*numPtr2 = 99;
printf("numPtr1 = %d, numPtr2 = %d\n", *numPtr1, *numPtr2);
free(numPtr1);
free(numPtr2);
return 0;
}
Explanation:
The C library malloc function is used to assign memory locations (in bytes) to variables. It accepts the size parameter and returns a pointer to the specified variable location.
The two malloc statements above assign two memory locations 10 and 20 to the numPtr1 and numPtr2 integer variables respectively.
i can't find my grandson someone help
Answer:
i'm right here
Explanation:
grandma
Answer:
were did u lose him.
Explanation:
Suppose that the LC-3 instruction LD R1, DATA is located at x3100 in memory and the label DATA is located at x 310F. The machine code (in hex) for the above instruction is
Answer:
The machine code is located at x210F.
Explanation:
The DATA is located at x3100 while the DATA label is located at the x310F (in hex) in the memory which is F address away (8 bits) from the DATA itself. The machine code location is relative to the address of the DATA label.
Write a class that specify the characteristics of a car, like type (sedan, jeep, mini, SUV, etc), gear (auto, manual), maximum speed (mph), average fuel consumption (mpg), etc. Create few objects to illustrate your desired cars.
Answer:
Answered below
Explanation:
This is written in Kotlin programming language.
//Creating the class Car. The primary //constructor declares car's properties which //are initialized when it's objects are created.
class Car(
val type: String,
val gear: String,
val maxSpeed: Double,
val avgFuelConsumption: Double)
//Creating several objects of car.
val sedan: Car = Car("sedan", "auto", 23.4, 500)
val jeep: Car = Car("jeep", "manual", 40, 350)
val mini: Car = Car("mini", auto, 26.7, 86, 234)
explain the main components of a computer system
Answer:
A motherboard.
A Central Processing Unit (CPU)
A Graphics Processing Unit (GPU), also known as a video card.
Random Access Memory (RAM), also known as volatile memory.
Storage: Solid State Drive (SSD) or Hard Disk Drive (HDD)
Explanation:
They all work together to create a system
Describe one practical application of total internal reflection.
Answer:
The phenomenon of total internal reflection of light is used in many optical instruments like telescopes, microscopes, binoculars, spectroscopes, periscopes etc. The brilliance of a diamond is due to total internal reflection. Optical fibre works on the principle of total internal reflection.
Explanation:
thank me later but if it wrong. sorry
hello hello . please help me
Answer:
#include <iostream>
using namespace std;
int main() {
int num, check=0;
for(int num = 1; num<=100;num++){
for(int i = 2; i <= num/2; i++) {
if(num % i == 0) {
check=1;
break; } }
if (check==0) { cout <<num<<" "; }
check = 0;
}
return 0;
}
Explanation:
This line declares num as integer which represents digits 1 to 100.
A check variable is declared as integer and initialized to 0
int num, m=0, check=0;
This for loop iterates from 1 to 100
for(int num = 1; num<=100;num++){
This iterates from 2 to half of current digit
for(int i = 2; i <= num/2; i++) {
This checks for possible divisors
if(num % i == 0) {
If found, the check variable is updated to 1
check=1;
And the loop is terminated
break; } }
The following if statement prints the prime numbers
if (check==0) { cout <<num<<" "; }
check = 0;
}
Multiple Choice
Which method adds an element at the beginning of a deque?
appendleft
O insertleft
O popleft
addleft
Answer: appendleft
Explanation: Edge 2021
The method that adds an element for the information at the beginning of a deque is append left. Thus option (A) is correct.
What is an information?An information refers to something that has the power to inform. At the most fundamental level information pertains to the interpretation of that which may be sensed.
The digital signals and other data use discrete signs or alogrithms to convey information, other phenomena and artifacts such as analog signals, poems, pictures, music or other sounds, and the electrical currents convey information in a more continuous form.
Information is not knowledge itself, but its interpretation is important. An Information can be in a raw form or in an structured form as data. The information available through a collection of data may be derived by analysis by expert analysts in their domain.
Learn more about information here:
brainly.com/question/27798920
#SPJ5