Please help with my assignment! Use python to do it.

Answers

Answer 1

Answer:

I cant see image

Explanation:

can you type it and I'll try to answer


Related Questions

An electrician uses a device called a volt meter. The volt meter is an example of
O hardware
software

Answers

Answer:

hardware

Explanation:

A voltmeter can be defined as an electrical device used for measure voltage level or the amount of voltage present in a circuit.

In this scenario, an electrician uses a device called a volt meter. The volt meter is an example of hardware.

A hardware refers to any device, machine or equipment that can be handled physically (touched) and seen with the naked eyes. Other hardware components of a computer includes monitor, speaker, central processing unit, motherboard, hard-drive, joystick, mouse, keyboard, etc.

On the other hand, software component of a computer comprises of software application or program that are used by the computer to manage or control software application, computer hardware and user processes. Some examples of software components are operating system, registry keys, antivirus, media player, word processor, etc.

When creating a budget you musk track both your budgeted expenses and your blank expenses

Answers

Answer:

actual

Explanation:

A budgeted cost refers to expenses for transactions and operations that the company and the management have to make in the future based on forecasts and future goals.

Actual costs refer to costs incurred on actual operations and transactions during the period recently ended.

When creating a budget you must track both your budgeted expenses and your actual expenses.

Which structural semantic will the given HTML code snippet form?



  • Laptop

    Mobile

    Tablet



A. table

B. paragraph

C. block

D. heading

E. list

Answers

Answer:

i think it is ...table

Explanation:

or....heading.

Writing on social media has helped users be:

A. more formal.

B. slower.

C. more concise.

D. wordy.​

Answers

Answer:

C

Explanation:

more concise

Photographing during the midday can produce which of the following?

More vibrant colors
Harsh shadows
Blurring
All of the above

Answers

It can produce harsh shadows

Answer:

Harsh Shadows

Explanation:

Which of the following would be better communicated with an image than with text?
Choose the answer.
the tone of a person's voice
an invitation to a museum opening
the decor at a wedding
the schedule for a conference

Answers

Answer:

A decor to a wedding

Explanation:

its bc who would want to know how its described when u could look of how it looks u might be speechless

The wedding's decor would've been best communicated through an image than through prose, and further calculation can be defined as follows:

Humans react and process new info more efficiently than every sort of data. Visual content is processed 60,000 seconds faster by the human brain than text. It is the picture is worth 60,000 words! Moreover, visual data accounts for 90% of the information conveyed to the mind.

Therefore, the final choice is "the decor at a wedding ".

Learn more:

brainly.com/question/16390691

the most common threats to your computer and your online safety come from what is called ____

Answers

Answer:

VIRUSES

Explanation:

Answer:

A Malware

Explanation:

Help! Please?? Am stuck on this

Answers

Answer:

Both B and C are correct.

Explanation:

In any case, you want the OR (age ≥ 18) in there, because that makes the expression true for people 18 and up. So that already disqualifies answer D.

The most precise answer is B, since it literally states the requirements.

A is incorrect, because learners can be 1 as well, and the age can be 18 as well, so you need ≥ in stead of >.

C is interestingly also correct. The left hand side of the OR would be true for ages over 16 or 17, but that's OK in this case.

what is your favorite coler and what do you like to do and

Answers

Answer:

Orange

Explanation:

I like orange because its vibrant.

What type of hacker would a company hire to check for vulnerabilities in their web page?

Answers

A white hat hacker or a certified ethical hacker.

Answer:

a hacker who can infiltrate a highly protected file but cant protect themselves against anime web site ads cant tell if this was a real question if so sorry

Explanation:

Who Has any idea How to code?

Answers

A bit I guess. I can only do C# though
i kinda know how to, took computer science last year

It is used between two or more computers. One computer sends data to or receives data from another computer directly.

Answers

Answer:

File transfer protocol (FTP)

Explanation:

An information can be defined as an organized data which typically sent from a sender to a receiver. When a data is decoded or processed by its recipient it is known as information.

Generally, there are several channels or medium through which an information can be transmitted from the sender to a receiver and vice-versa. One of the widely used media is the internet, a global system of interconnected computer networks.

There's a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport later, into small chunks called packets rather than as a whole.

The three (3) main types of TCP/IP protocol are;

I. HTTP.

II. HTTPS.

III. FTP.

File transfer protocol (FTP) is used between two or more computers. One computer sends data to or receives data from another computer directly through the use of network port 20 and 21.

Help!!!! Arrays 100 points

Answers

Answer:

2 weeks ago so i think your doe with the quiz

Explanation:

Answer:

i hate to do this but I'm desperate.

Explanation:

you have no keywords in the question and this was months ago, these points are just going to waste and I need them, sorry & thanks

The US government appropriates less than one million dollars in funding each year to STEM education programs. True False

Answers

Answer:

False.

Explanation:

A STEM course typically comprises of science, technology, engineering and mathematics.

The US government appropriates more than one million dollars in funding each year to STEM education programs. The government of the United States of America create scholarship opportunities for its citizens in order to assist students develop a career in STEM-related field.

Educate to Innovate campaign is an example of STEM education programs developed and established by the US government to fund STEM education programs.

Answer: False

Explanation:

I have this assignment

to gain a deeper understanding of a text, students should

Answers

Answer:

Should explain what they learned, be able to explain what is happening in great detail, and if its an informational text, then they should use what they learn and apply it in real life.

Explanation:

How to design remote access policy using the appropriate access controls for systems,applications, and data access

Answers

Answer:

All remote access users connect to the network and maintain all security standards on the device including

Valid and virus protection

Malware protection

Maintain the OS

Explanation:

The remote access policy applies to employees and other affiliates who owned devices to remotely access the Network CCC. The remote policy access connection is used to perform the work activities on the behalf of CCC. Remote access system, application and can be accessed with the internal CCC network. Example of application are as follow:

Internal Academic System

Internal websites

Documents files on internal file

Local colleges resources

Servers

Remote access will be managed by System Data Center and use security measures based on requirements.

Remote access is provided as an extension of the normal work environment.

Review the CCC information technology for protecting information via the remote method.

The employee will use remote procedures. Employees disclose the passwords and if the business is conducted from home.

All remote access includes a "time-out" system. In accordance with CCC and will time out the specified period of inactivity.

The access users accept the access and connection to networks and monitored to record dates, time. Identify accounts and have been compromised by external parties.

The remote access user may be listed in the remote access application.

is this right or not???????????

Answers

I think it’s true Bc some people may use different techniques

Answer:

yes you are correct

Explanation:

bcr is an out put device true or false​

Answers

Answer:

Hey mate....

Explanation:

This is ur answer......

True

Hope it helps!

mark me brainliest plz......

Follow me! :)

Answer:

False?

Explanation:

Would it be easier to divide/fold a rectangular sheet of paper into 6 equal pieces or 7 equal pieces? Explain your answer.

Answers

6 i’m guessing bc it would be harder to fold something into an odd number of pieces

In your own words, explain what it means to “buy low, sell high.”

Answers

Answer:

Resell value should be high like buying a used car for a low price fixing it a bit and double your money.

Explanation:

Answer:

Exactly what it says

Explanation:

You buy items at a low price then sell them at a higher price to ensure you get a profit

How can you rotate and resize your drawing?​

Answers

Answer:

Do one of the following:

To rotate the shape counterclockwise, on the Home tab, in the Arrange group, click Position, point to Rotate Shapes, and select Rotate Left 90º.

To rotate the shape clockwise, on the Home tab, in the Arrange group, click Position, point to Rotate Shapes, and select Rotate Right 90º

Answer:

By using the PICTURE application built into your computer, you can set a custom image editing type. It goes very easily from there

Explanation:

...

ok im asking a legit question cuz the teacher asked us what our favorite game was and how to play it and also what youve don in it recently .... its homework so help me out

Answers

Answer:

Mario Baseball, its where you form a team of your favorite mario characters and play baseball against the other team! Its the best!

Explanation:

What does each row represent?
What distinguishes one record from another?
What should you choose as the primary key for
this table?

Answers

Answer:

I think this is your answer broski.

Explanation:

Answer:

a..c,,c

Explanation:

drop down on edge

The value in this assignment statement ( age= textbox2.text)

Answers

Answer:

Is from property

Explanation:

because the value or your age in this case comes from the answer the user writes in the property (text box)

What is the use of Ellipse Tool in photoshop

Answers

The Ellipse Tool creates elliptical shapes and paths (shape outlines) it’s also used for elliptical, including circular, selections. You can easily select objects such as clocks, balls, and full moons by using this tool. There is a keyboard shortcut where if you see the elliptical tool in the tool box, you can press M on the keyboard, if you see a rectangular tool, press shift + M together on the keyboard. Hope that helped!

Using the table to the right, answer the following questions. Values shown in B5, B9, B13, and B17 represent ______. The value shown in B18 ______. ______ allows you to calculate the sum of selected values without duplicating values in the grand total.

Answers

Answer:

Values shown in B5, B9, B13, and B17 represent

✔ subtotals.

The value shown in B18

✔ does not include the values of B5, B9, B13, and B17.

✔ The subtotal function

allows you to calculate the sum of selected values without duplicating values in the grand total.

The values shown in B5, B9, B13, and B17 represent  subtotals. The value shown in B18  does not include the values of B5, B9, B13, and B17.

What is the SUBTOTAL Function in Excel?The subtotal function allows you to calculate the sum of selected values without duplicating values in the grand total.

The SUBTOTAL function in Excel is known to be a function that gives room to system users to make groups and then carry out any other Excel functions.

Conclusively, the functions such as sum that is used in Subtotal function in Excel can aid users when they are analyzing their data.

Learn more about subtotal function from

https://brainly.com/question/14465957

Which of the following is a distraction that you find when photographing animals at the zoo?

Fences
Enclosure glass
Other people
All of the above

Answers

Answer:

D all of the above

Explanation:

because fences, enclosure glass, and other people are all distracting from the real focus which is the animal.

Please Mark brainliest and give 5 star.

Answer:

All of the above (I did the test and got it right)

Explanation:

Amal wants to store a list of the average temperatures for the past month (for example 14.2, 14. 12.6). What data type can he use to store all these values?
A. Floating point number
B. Integer
C. Array
D. String

Answers

Answer: the correct answer is C

Explanation: array is 100% correct

I got the question right

this isn't really a question ,but a random fact about Fnaf William Aton

Springtrap is possessed by a man named William Afton, or known as Purple guy.William Afton murdered 6 children and stuffed them into suits, now the children posses those suits, Gabriel possessed Freddy Fazbear, Jeremy possessed Bonnie, Susie possessed Chica, and Fritz possessed Foxy, their was one more kid that hadn't had an original so she was stuffed into a Golden Freddy suit.
Who used to be known as Fred bear the bear was already possessed by a child named Evan Afton or C.C (The Crying Child).And since the suit was already possessed Evan Afton was forced out of the suit and now possess a shadow version of Golden freddy known as shadow Freddy.
Shadow Freddy (C.C) was a big part of William Aftons death, C.C lead the animatronics to be dismantled by William, but the animatronics saw that as a chance to get revenge and chased him into a springlock suit called Springbonnie, William Afton was then springlocked and died a slow and painful death from metal being forced in his body and loss of blood.
So you Learn/read that Springtrap is William Afton a serial killer who murdered 6 children and died a slow painful death due to springlocks.
So, thank you for your time.

Answers

Answer:

oop- welp. that's pretty cool

Explanation:

Answer:

this is a game but good job for doing your research

Explanation:

You already know how to use lists. What is the index of 5 in the following list?
[2, 3, 5, 1, 6]
O 4
02
O 1
03

Answers

The answer is 1, the 3rd circle
Other Questions
Why might the White Man's Burden be an important historical document? (How might this document help historians better understand this time period?) A number cube is rolled 24 times. It lands on 2 four times and 6 three times. Find the experimental probability of landing on a 2 and write as a fractions. Find the experimental probability of landing on a 6 and write as a fraction. What would be the theoretical probability of rolling on a 6? Place the following sequences in order of complexity from the simplest to the most complex.1. A story within a story2. Reflections made in the present about events that occurred in the past3. Events presented in the order in which they took place4. A story with several flashbacksChoose the number sequence below illustrates this.1, 2, 3, 42, 1, 4 33, 4, 1, 23, 1, 4, 2 PLEASE HELP ASAP I NEED THIS DONE BY TODAY. ILL GIVE YOU AN ADDITIONAL 50 points. You have to split the shape into two triangles and a rectangle and then add the sums of the areas. HELPPPPPPPPPPPPPPPPPPPPPPPP!!! please help me outt What element is found in water?1. Carbohydrate2. Carbon3. oxygen WILL GIVE BRAINLIEST!! DO NOT POST A LINK!!!Match the descriptions of characters in Jack Londons novel White Fang to their character types.Grey Beaver is White Fangs first master in thenovel. Beaver barely talks throughout the storyand reveals very few personality traits.As the title suggests, White Fang is thecharacter around whom the novel revolves.It focuses on his transformation froma scared puppy to a ferocious wolf and,finally, to a loyal house pet.Kiche is White Fangs mother. She undergoesalmost no changes before disappearing entirelyfrom the novel.Beauty Smith is a character who treats WhiteFang with much cruelty. Smith has a menacingpersonality ,and White Fang dislikes her.static characterantagonistprotagonistflat character How many molecules of CO2 at standard temperature and pressure in 5.4 moles of CO2 A fair con is tossed 80 times in an experiment. If the coin is fair, what would be a reasonable number of times tails should appearbased on your knowledge of the theoretical probability of this event? the treble clef is also known as In a few words, describe the differences in a recessive phenotype and a dominant genotype. The diagram shows a cuboid.8 cm15 cm20 cmWhat is the volume of the cuboid? 1.If you were to create a sixth act to Pygmalion, who would Eliza marry? Or doesshe marry at all? Use the lines and behavior of the characters throughout the firstfive acts to support the outcome of your finale. Finally, the old lady crossed the street safely and Juan was able to reach school on time In the compound interest equation, A(x)= 500(1.07)x, what does the 500 represent?The starting value the growth factorthe amount in the account after x yearsthe annual rate of interest I just need the introduction PLSS HELP!! ONLY ANSWER IF U KNOW!!Popular sovereignty means that people or citizens have powers and oneof those is voting and electing people to government positions. True or false? What is the total number of different 11-letter arrangements that can be formed usingthe letters in the word ORTHOGRAPHY? I'll give The BRAINLIEST think of a story you know really well. It can be a book, tv show, movie, etc. Think about the main character and answer the following questions: 1) Who are they? 2) Where and when are they? 3) What is the super objective? 4) What are some smaller objectives? 5) What obstacles are there?IF YOU DON'T ANSWER IT CORRECTLY ILL REPORT YOU FASTER THAN THIS NEEDS TO BE SUBMITTED. Nitrogen (N2) enters an insulated compressor operating at steady state at 1 bar, 378C with a mass flow rate of 1000 kg/h and exits at 10 bar. Kinetic and potential energy effects are negligible. The nitrogen can be modeled as an ideal gas with k 5 1.391. (a) Determine the minimum theoretical power input required, in kW, and the corresponding exit temperature, in 8C. (b) If the exit temperature is 3978C, determine the power input, in kW, and the isentropic compressor efficiency.