Answer:
var is Good = FALSE needs to be fixed
bottom answer is method.
Explanation:
var is Good = FALSE because you are assigning a boolean and in js booleans are all lower case.
Functions that are stored in object properties are called “methods”
Which of the following is NOT provided by the Device
Manager?
List of attached external peripheral devices
List of installed software with versions
List of attached internal peripheral devices
List of installed drivers
Submit
Answer:
well techincly in windows 10 the only thing that is in the device manager is the services and software it doesn't tell you what devices are connected only what is running and the prefrmance
of your machine
Explanation:
*explain why computer literacy is vital to access in today’s business work
Answer:
Computer literacy is vital to access in today’s business work because of advanced technology which ensured that most companies run a computerized system as against the manual one which was existent in the past.
The use of computerized system enables work to be done faster and in a more accurate manner which is why bring a computer literate is widely embraced in the world today.
Write code to play a Tic-tac-toe tournament. Tic-tac toe is a game for two players who take turns marking the spaces with Xs and Os in a 3x3 grid. The purpose of the game is to place three of your marks in a horizontal, vertical or diagonal.
Answer:
Explanation:
The following code is written in Python and is a full Two player tic tac toe game on a 3x3 grid that is represented by numbers per square.
# Making all of the main methods of the game
board = [0,1,2,
3,4,5,
6,7,8]
win_con = [[0,1,2],[3,4,5],[6,7,8],
[0,3,6],[1,4,7],[2,5,8],
[0,4,8],[2,4,6]] # possible 3-in-a-rows
def show():
print(board[0],'|',board[1],'|',board[2])
print('----------')
print(board[3],'|',board[4],'|',board[5])
print('----------')
print(board[6],'|',board[7],'|',board[8])
def x_move(i):
if board[i] == 'X' or board[i] == 'O':
return print('Already taken!')
else:
del board[i]
board.insert(i,'X')
def o_move(i):
if board[i] == 'X' or board[i] == 'O':
return print('Already taken!')
else:
del board[i]
board.insert(i,'O')
# Creating the main loop of the game
while True:
turn_num = 1
board = [0,1,2,3,4,5,6,7,8]
print('Welcome to Tic-Tac-Toe!')
print('AI not implemented yet.')
while True:
for list in win_con: #check for victor
xnum = 0
onum = 0
for num in list:
if board[num] == 'X':
xnum += 1
elif board[num] == 'O':
onum += 1
else:
pass
if xnum == 3 or onum == 3:
break
if xnum == 3 or onum == 3: # break loops
break
if turn_num > 9: # Check if there are any more moves available
break
show()
if turn_num % 2 == 1:
print('X\'s turn.')
else:
print('O\'s turn.')
move = int(input('Choose a space. '))
if turn_num % 2 == 1:
x_move(move)
else:
o_move(move)
turn_num += 1
if xnum == 3: #If game ends
print('X Won!')
elif onum == 3:
print('O Won!')
else:
print('Draw!')
play_again = input('Play again? Y or N ')
if play_again == 'Y' or play_again == 'y':
continue
else:
break
Write a function in Java that implements the following logic: Given three ints, a, b, and c, one of them is small, one is medium and one is large. Return true if the three values are evenly spaced, so the difference between small and medium is the same as the difference between medium and large.
Answer:
Follows are the code to this question:
public class Main//defining a class Main
{
public static boolean evenly_Spaced(int a,int b,int c)//defining a method evenly_Spaced that accepts three integer parameter
{
if(a-b==b-c)//defining if block to check small and the medium is the same as the difference between medium and large.
return true;//return value true
else//else block
return false;//return value false
}
public static void main(String[] args) //defining the main method
{
int a,b,c;//defining integer variable
a=4;//assigning value
b=6;//assigning value
c=8;//assigning value
System.out.println(evenly_Spaced(a,b,c));//use print method to call evenlySpaced
}
}
Output:
True
Explanation:
In the above code, a boolean method "evenly_Spaced" is declared, that accepts three integer variables in its parameter and defined the if block to check the smallest and the medium value is the same as the difference value in between the medium and large value, and return its value.
In the next step, the main method is defined, and inside this three integer variable "a, b, and c" is declared, that holds a value and passes into the method and print its return value.
What is the output?
answer = 0
for numA in [2,4]:
for numB in [3, 5]:
answer = answer + numA + numB
print (answer)
Output:
Answer:
The output is 28
Explanation:
Required
Determine the output of the code segment
The first line initializes "answer" to 0
The next two lines iterate through lists [2,4] and [3,5
Each of these lists have two elements; So, the number of iterations is 2 * 2 i.e. 4.
In the first iteration
numA = 2, numB = 3, answer = 0
So:
[tex]answer = answer + numA + numB= 0 + 2 + 3 = 5[/tex]
In the second iteration
numA = 2, numB = 5, answer = 5
So:
[tex]answer = answer + numA + numB= 5 + 2 + 5 = 12[/tex]
In the third iteration
numA = 4, numB = 3, answer = 12
So:
[tex]answer = answer + numA + numB= 12 + 4 + 3 = 19[/tex]
In the fourth iteration
numA = 4, numB = 5, answer = 19
So:
[tex]answer = answer + numA + numB= 19 + 4 + 5 = 28[/tex]
Lastly, the value of "answer" is printed
Hence, the output is 28
Answer: 28
Explanation: got it right on edgen
what are the three main components of an operating system? define each of them.
The three main components of an operating system are:
1. manage the computer's resources (this includes the central processing unit, memory, printers, and disk drives).
2. establish a user interface (this is where the human interacts with a computer, website or application. the UI, also known as user interface, is to make the user's experience easy and intuitive).
3. execute and provide services for applications software (this is the interface between the application program and the hardware, which gets carried out from OS).
Operands may be any of the following: (select all that apply) Group of answer choices constant or constant expression register name variable name (memory) reserved word
Answer:
constant or constant expression
register name
variable name (memory)
Explanation:
Literally, operand means data which an operation can be performed on. The operation could be an arithmetic or logical operation.
From the list of options, several operations can be performed on:
constants e.g. [tex]\pi = 3.14[/tex]registers andvariables e.g. (a + b)However, no operation can be performed on keywords and/or reserved words.
How can innovation,including technology, be sustained in schools?
Answer:
Answered below
Explanation:
Schools can encourage and sustain innovation and innovative ideas in technology through teaching, exposure and awareness of the benefits of using technology in solving our everyday problems.
Students should be invited to participate in tech roundtables and think about problems encountered in their society or environment and figure out how technology can be applied in such situations to providing a solution to those problems.
This encourages new, innovative and creative ideas, enthusiasm and opportunities.
g A string is represented as an array of characters. If you need to store an array of 5 strings with the maximum length of a string is 100, how would you declare it
Answer:
Declare it as: char str[5][100]
Explanation:
The attachment completes the question
The options in the attachment shows that the programming language being described is more likely to be C language.
In C language, the following syntax is used to store an array of m number of strings and a maximum of n elements in each string,
char array-name[m][n]
From the question:
[tex]m = 5[/tex]
[tex]n = 100[/tex]
Let array-name be str.
The array will be declared as: char str[5][100]
Define the following propositions: c: I will return to college. j: I will get a job. Translate the following English sentences into logical expressions using the definitions above: (a) Not getting a job is a sufficient condition for me to return to college. (b) If I return to college, then I won't get a job.
Answer:
Answered below
Explanation:
//Program is written in Kotlin programming language
//Initialize Boolean variables
var getJob:Boolean = true
var returnToCollege: Boolean = false
//First sentence. If no job then return to //college.
if( !getJob ) {
returnToCollege = true
}
//Second sentence. If you have returned to college then you cannot get a job.
if (returnToCollege == true){
getJob = false
}
Complete the program by writing and calling a method that converts a temperature from Celsius into Fahrenheit.
Missing Code:
import java.util.Scanner;
public class CelsiusToFahrenheit {
// FINISH: Define celsiusToFahrenheit method here
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
double tempF = 0.0;
double tempC = 0.0;
System.out.println("Enter temperature in Celsius: ");
tempC = scnr.nextDouble();
// FINISH
System.out.print("Fahrenheit: ");
System.out.println(tempF);
return;
}
}
Answer:
Replace // FINISH: Define celsiusToFahrenheit method here
with
public static double celsiusToFahrenheit(double tempC){
double tempF = (tempC * 9/5) + 32;
return tempF;
}
Replace // FINISH
with
tempF = celsiusToFahrenheit(tempC);
Explanation:
The first addition to the program:
This line defines the method
public static double celsiusToFahrenheit(double tempC){
This line calculates the Fahrenheit equivalent of the temperature in Celsius
double tempF = (tempC * 9/5) + 32;
This line returns the temperature in Fahrenheit back to the main method
return tempF;
}
The second addition to the program:
This line gets the returned tempF from the celsiusToFahrenheit module
tempF = celsiusToFahrenheit(tempC);
See attachment for complete program
There are several security frameworks and architectures available to use as templates for creating a secure environment. These include ISO, NIST, COBIT, ETSI, RFC, and ISA/IEC. Select three security frameworks/architectures and use the Internet to research each of them. How are they predominately used
Answer:
Answered below
Explanation:
The International Standards Organisation (ISO) security framework is very well recognised and used by businesses and companies worldwide because of its effectiveness and high quality standards.
The Control Objectives for Information and related Technology (COBIT) framework, is a security framework widely used in finance companies for identification and mitigation of risks.
The US National Institute of Standards and Technology (NIST) framework has an abundance of information security best practices and standards and is trusted by large enterprises due to its legacy over the years.
Write a print statement that displays a random integer between 5 and 5000. Assume the random library is imported.
Answer:
Explanation:
The following code is written in Java. It is a very simple three line statement (assuming that the random library was imported) that chooses a random integer value between 5 and 5000 and prints it to the screen using the println statement.
Random rand = new Random();
int randomNum = rand.nextInt((5000 - 5) + 1) + 5;
System.out.println(randomNum);
The random number generator is initialized and given a value between 5 and 5000. Since random number Generator will generate a number between 0 and the given value then subtracting 5 from the initial generated number makes sure that it is not more than 5000 and then adding 1 and 5 after wards makes sure that it is more than 5 always.
The ability of a build system for handling a rise in the amount of code that it blends and analyzes is called ___________.
Answer:
Build integration
Explanation:
The ability of a build System to handle the rise in amount of code it blends/analyses is known as build integration.
It is the overall capacity of the build System to handle the growing amount of code. It is also a process where the system tries to handle potentials to accommodate growth. This is a very important condition.
Write a program that will read a line of text as input and then display the line with the first word moved to the end of the line
Answer:
The program in Python is as follows:
text_input = input("Enter text: ")
first_word = text_input.split(" ")
new_text = text_input.replace(first_word[0], "")
new_text = new_text + " "+ first_word[0]
print("New Text: " + new_text)
Explanation:
This line gets a line of text from the user
text_input = input("Enter text: ")
This line splits the text into list
first_word = text_input.split(" ")
This line deletes the first word of the string
new_text = text_input.replace(first_word[0], "")
This line appends the first word to the end of the string
new_text = new_text + " "+ first_word[0]
This line prints the new text
print("New Text: " + new_text)
What is the acronym that helps you remember the order of math operations?
Answer: BEDMAS
Explanation:
for business teachings its BEDMAS
Write a program in python whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase.
Answer:
Explanation:
The following is written in Python as requested and performs this task with a function called count_appearances. It first makes the character and the phrase into all lowercase and then loops through each word in the phrase and compares it to the character. If they are the same it adds 1 to the counter. Once the loop is over it returns the counter which is the number of times that the character appeared in the phrase.
def count_appearances(character, phrase):
count = 0
character = character.lower()
phrase = phrase.lower()
for x in phrase.split():
if x == character:
count += 1
return count
Brian gathers data from his classmates about the computers they own such as the type of operating system, the amount of memory, and the year the computer was purchased. Who/what are the individuals in this data set
Incomplete question. The Options read;
A. The year purchased
B. Brian's classmates
C. The amount of memory
D. The type of operating system
Answer:
B. Brian's classmates
Explanation:
Remember, the question is concerned about "the individuals" in the data set, so the year they purchased their computer, neither is the amount of memory of the computer and the type of operating system can be classified as individuals in the data set.
Hence, we can correctly say, only Brian's classmates are the individuals in this data set.
A string is represented as an array of characters. If you need to store an array of 5 strings with the maximum length of a string is 100, how would you declare it
Answer:
char str[5][100]
Explanation:
See attachment for options:
From the options, we can see that the programming language is C language.
The syntax to store an array of m strings with a maximum of n elements in C is:
char array-name[m][n]
In this case:
[tex]m = 5[/tex] --- Number of strings in the array
[tex]n = 100[/tex] --- Maximum character in each string
Assume the array name is str, the syntax can be expressed as:
char str[5][100]
how would i change this:
" try:
userChoice = input("Would you like to Add or Multipy?(A/M): ")
except:
print("Please enter 'A' or 'M'") "
so it only allows me to put "A" or "M" so that it runs the except part
You wouldnt use a try and except statement. Use a loop.
Which symbol would be used in a flowchart to represent a connection to another part of the flowchart on the same page
Answer:
The answer is "Connectors".
Explanation:
Please find the Connectors image in the attached file.
In this question, the connectors symbol is usually small throughout the flowcharts. It is used as a connection to display and changes throughout the flux. It was usually marked by major letters that indicate jump points. This diagram visually shows the sequence of events in a system and who is accountable.
An alternative design for a canary mechanism place the NULL value just below the return address. What is the rationale for this design decision
Answer:
This is to prevent attacks using the strcpy() and other methods that would return while copying a null character.
Explanation:
Canary is a mechanism used to monitor and prevent buffer overflow. The alternative canary design that places a null value just before the return address is called the terminator canary.
Though the mechanism prevents string attacks, the drawback of the technique is that the value of the canary is known which makes it easy for attackers to overwrite the canary.
What is syntax?
A. syntax is the rules of the programming language
B. It is used to read information
C. it is used to output information
D. syntax is the word used to describe an error
Answer:
A
Explanation:
what are the differences of location decisions between manufacturing establishment and service establishment?
True or false: The objective of an Enterprise Resource Planning (ERP) system is to create a customized software program that integrates the information of departments and functions of a company into a single computer system.
Answer:
True
Explanation:
How many times will the loop iterate, if the input is 105 107 99 103? cin >> x; while (x > 100) { // Do something cin >> x; }
Answer:
well since only 3 out of the 4 values are above 100 it would go 3 times and before your program returns to 0.
Explanation:
Answer:
Two times
Explanation:
Required
Determine the number of iteration of the loop
The first line: cin>> x; gets input for x
[tex]x = 105[/tex]
The while loop: while x > 100 is true because 105 > 100
So, the loop will be iterate as thus:
cin>>x:
Here, [tex]x = 107[/tex]
The while loop: while x > 100 is true because 107 > 100
So, the loop will iterate for the second time as thus:
cin>>x:
Here, [tex]x = 99[/tex]
The while loop: while x > 100 is false because 99 < 100
Hence, the loop will not iterate.
Number of iteration = 2
Ann Marie would like to test her hypothesis. To do that, she needs to show groups of data that are similar in some way. Which data-mining techniques should she use?
Answer:
Clustering Analysis
Explanation:
Clustering analysis or otherwise called cluster analysis is a task composed of grouping sets of objects in a way that objects in the same group tend to be more similar to each other than to objects in some other groups. Like the question said, Ann would love to show groups of data that are similar in some way. This makes Clustering analysis the perfect choice of pick, because of the similarity that's needed. A result of cluster analysis is capable of being used in the creation of something like customer profiling.
What computer part Connects to The outlet and provides power to the computer
Have you ever played the game Mad Libs? Basically, the goal is to build a story using a template and have other people fill in the blanks. They make for pretty funny stories because the people filling in the blanks don’t know what the story is about!
For this activity, you will be creating your own Mad Libs game. It’s similar to the way you created the Introduction paragraph in the unit.
Start by typing out your Mad Libs fill-in-the-blank story in a word processing document. Make it as creative as possible! Identify whether your blanks should be filled by nouns, verbs, adjectives, or adverbs. Your story should include at least 10 blanks.
Next, transform your story into one big Python print statement in REPL.it, using variables in place of the blanks.
Finally, create the variables you need for your template by putting them at the top of your program. You should use input statements to make the game interactive.
Test out your program thoroughly, fixing any syntax errors or bugs that arise. Once you are happy with it, take a screenshot of your code actually being run.
Copy and paste your code into the same document where you wrote your fill-in-the-blank story, so that you have the regular fill-in-the-blank version and the code version.
Have a friend or family member try your Mad Lib (the typed or the coded version). Record yourself reading the result.
Someone please help!
Answer:
oh hi i can answer now lol
Explanation:
Please go support me I started 3 weeks ago and I get no views
(PLEASE SHARE)
Answer:
ok ill go check you out!!!
Answer:
i got u!
Explanation:
No problem hon!