The data type must be the same for each item in the array.
Most IT security threats originate with hackers.
Question 3 options:
True
False
How is the two point formula used to find the equation of a line when 2 points are known?
write an if statement to Test if a number stored in y is between 6 and 10 inclusive. only an if statement.
y = whatever value you want
if 5 < y < 11:
print("Your number is between 6 and 10")
what are 3 software programs for mobile computing?
Answer:
1.Communication Devices
2.Mobile hardware
3.Mobile software and apps
(smartphones, laptop, etc)
Spyware is malicious software installed on a computer without the owner’s knowledge. It is designed to monitor data and allow unauthorized remote access.
Question 6 options:
True
False
Answer:
True
Explanation:
1a. Ust Seven (7) Components of a Computer?
1b. Explain in Details the functions of Each one Mentioned Above
2a. What is Internet?
2b. Identity and Explain in Details the uses of internet to students of
Explanation:
1a. i know only 4 components of computer these are users, data,hardware & software
1b.users,the person who use the computer
data,it is the collection of raw facts and figures
hardware,is the physical part of the computer that can be seen and touch
software,is a set of program that instruct the computer to perform the certain action
2a,an internet is worldwide systen of interconnected computer network
2b.if some student want to now about something he can use internet and get the answer,to commenicate with others,and to learn online
Write a program that will input two numbers and print the larger number on the screen.
num1 = float(input("Enter the first number: "))
num2 = float(input("Enter the second number: "))
if num1 > num2:
print(num1)
else:
print(num2)
I hope this helps!
Choose the function required to have the code have the output shown.
>> alist = [10, 23, 'bye', 4.6]
>>> aList.
vo
4.6
>>> aList
[10, 23, 'bye']
A) pop B)remove C) clear
The function that will be required to have the code with the output 4.6 and the aList will be [10, 23, 'bye'] is pop.
Code explanation:The code is written in python.
alist = [10, 23, 'bye', 4.6]
According to the python code, we used the variable "aList" to store a list. The list has a length of 4. It contains integers, float and string.
Using the pop function, the last value of the list will be removed.
The pop function removes the last value in a list.
alist.pop() removes 4.6 and it is printed out .
Then when we ask for our list, the list is printed out without the last value(4.6).
learn more on function here: https://brainly.com/question/15782435
Answer: pop
Explanation: got it right on edgen
uses of diodes in the society
Answer:
The application areas of diodes include communication systems as limiters, clippers, gates; computer systems as logic gates, clampers; power supply systems as rectifiers and inverters; television systems as phase detectors, limiters, clampers; radar circuits as gain control circuits, parameter amplifiers, etc.
Explanation:
Explanation:
I should understand this answer
Where can a user find the set of tools used for adjusting the magnification of a slide
At the top left corner 6 small spots down, you can find it. (Highlighted Orange)
( Marking me Brainlyst will help my rank <3 )
Select the correct navigational path to change a chart's style in an Excel worksheet.
Select the correct navigational path to change a chart’s style in an Excel worksheet.
Select the table.
Click the
✔ Design
tab on the ribbon and look in the
✔ Chart Styles
group.
Select a new style from the templates available and release
Toggle the chart. The Design, Layout, and Format tabs have been added to the Chart Tools, which are displayed. Click the arrow in the Chart Elements box under the Current Selection group on the Format tab, then click the chart element you wish to alter the formatting style for.
What navigational path to change a chart's style?Click on the chart, then press Ctrl + Shift + C to swiftly switch the type of chart you're using. By using this shortcut, you may rapidly browse between the various chart kinds to pick the one that best fits your data. 3. Click on the chart and then press Ctrl + to add a trend line to it.
Therefore, Click Move Chart in the Location group under Chart Tools on the Design tab. Choosing one of the following, Click New sheet, enter a name for the worksheet in the New sheet box, and then click the chart to transfer it to the new worksheet.
Learn more about Chart Styles here:
https://brainly.com/question/12154998
#SPJ5
What game is this??????????????????????
Answer:
rocket league
Explanation: cars and balls
what could a company do if it was using a commercial wan and a vulnerability appered thst allowed attackers
Answer:
The answer is below
Explanation :
If a company was using a commercial WAN and a vulnerability appeared that allowed attackers find routing information and therefore be able to eavesdrop on corporate transmissions "It is expected that such a company should try to formulate and establish Virtual Private Networks between corporate sites.
This will ultimately lead to intercepted transmissions to be unreadable. Though such means have been seen as time-consuming."
please hurry
How are computers connected to one another?
through networks
through printers
through laptops
Answer:
networks
Explanation:
internet
Answer:
i know u dont need help anymore but the guy who said networks is correct
Explanation:
e
Complete the Car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information.
Ex:
If the input is:
2011
18000
2018
where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:
Car's information:
Model year: 2011
Purchase price: 18000
Current value: 5770
Note: print_info() should use three spaces for indentation.
This is what is given
class Car:
def __init__(self):
self.model_year = 0
# TODO: Declare purchase_price attribute
self.current_value = 0
def calc_current_value(self, current_year):
depreciation_rate = 0.15
# Car depreciation formula
car_age = current_year - self.model_year
self.current_value = round(self.purchase_price * (1 - depreciation_rate) ** car_age)
# TODO: Define print_info() method to output model_year, purchase_price, and current_value
if __name__ == "__main__":
year = int(input())
price = int(input())
current_year = int(input())
my_car = Car()
my_car.model_year = year
my_car.purchase_price = price
my_car.calc_current_value(current_year)
my_car.print_info()
Answer:
Just add this and yoyr code should work.
Explanation:
def print_info(self):
print("Car's information:")
print(" Model year:", self.model_year)
print(" Purchase price:", self.purchase_price)
print(" Current value:", self.current_value)
Classes are templates used when an object is to be created while methods are functions that are executed when called or evoked
To declare the attribute purchase_price (type int), we make use of the self keyword, and we initialize the value to 0
So, the declaration of the purchase_price attribute is:
self.purchase_price = 0
To define the print_info() method, we simply evoke the model_year and the purchase_price attributes.
So, the definition of the print_info() method is:
def print_info(self):
print("Car's information:")
print(" Model year:", self.model_year)
print("Purchase price:", self.purchase_price)
Read more about class and methods at:
https://brainly.com/question/15125793
4.15 LAB: Password modifier
I've included my code in the picture below. Best of luck.
The program written modifies inputted password, replacing certain characters to make it stronger. The program is written in python 3 thus ;
password = input("Set your password : ")
#accepts input from user meant for password
modified_password = ''
#initialize an empty string to hold the modified password
for val in password:
#loop through each password value
if val == 'i':
modified_password += "!"
elif val == 'a':
modified_password += ''
elif val == 'm' :
modified_password += 'M'
elif val == 'B' :
modified_password +='8'
elif val == 'o':
modified_password += '.'
else :
modified_password += val
#checks for certain values in the input and replaces them, with the output assigned to the modified password variable
print(modified_password+"q*s")
Sample run of the modified password with the string "q*s" concatenated at the end.
Learn more :https://brainly.com/question/15086326
What will be the output of the given code?
class BookName {
public void book() {
System.out.println(“new book”);
}
}
public class Check{
public static void main(String args[]) {
BookName c1[] = new BookName [5];
for (int i = 0; i<10 ;i++) {
c1[i] = new BookName();
c1[i].book();
}
}
}
A. to print new book five times
B. to print the numeral 5 five times
C. a runtime error
D. to print new book 10times
Answer:
B
Explanation:
What do people do when they navigate using GPS
Answer:
they use it when they are driving and when they dont know where they are doing
Explanation:
how i simplify this boolean expression ?A'.B'.C'+A'.B'.C+A'.B.C+A.B'.C+A.B.C
Answer:
A⁵+B⁵+C⁵
A+A+A+A+A= A⁵
B+B+B+B+B=B⁵
C+C+C+C+C= C⁵
Answer:
woah thats crazy i have no clue
im so sorry
Explanation:
What would give Lucy, an entry-level candidate, an edge over others while she seeks a programmer’s position? Lucy, an entry-level candidate, is looking for her first job. Lucy has a high GPA in her college transcripts, skill using a multitude of software, and skills in many extracurricular activities. She completed an internship at a reputed IT organization while she was at college. Her portfolio contains many self-made programs.
Answer:
She completed an internship at a reputed IT organization while she was at college.
Explanation:
Based on her accomplishments the one aspect that would give her an advantage and set her apart from the competition would be that she completed an internship at a reputed IT organization while she was at college. Having done this means that she gained extremely valuable and recognized work-place experience that would be extremely valuable to any IT company looking to hire someone. Her other traits are all things that every individual applying for such a position must have including the portfolio of self-made programs.
Which Tab contains the font style attributes?
The home tab.
This tab contains the most-used Word features, such as tools for changing fonts and font attributes, customizing paragraphs, using styles, and finding and replacing text.
Put the steps you would use to insert and label an endnote in order.
Answer:
2nd- step 1, 3rd- step 2, 1st- step 3, 4th- step 4
Explanation:
1. locate the reference tab
2. click the insert endnote option
3. type your endnote label
4. type the text you want the endnote to follow
Write the definition of a void function that takes as input an integer and outputs two times the number if it is even; otherwise it outputs five times the number.
Answer:
Written in C++
void number(int n){
if(n%2 == 0)
cout<<2 * n;
else
cout<<5 * n;
}
Explanation:
The programming language is not stated.
However, I answered using C++
This line defines the function as void
void number(int n){
This line checks if the number is even
if(n%2 == 0)
If yes, it doubles the number and prints the output
cout<<2 * n;
If otherwise,
else
It multiplies the number by 5 and prints the output
cout<<5 * n;
}
To call the function from main, use:
number(n);
Note than n must be declared as integer
See attachment
PLEASE HURRY AND BE SERIOUS
Which of the following statements is true of a hierarchical addressing scheme? Check all of the boxes that apply.
It includes different parts that represent the location of a computer or device on a network.
It presents numbers in a randomized format.
It is used for IP addresses.
Answer:
It is used for IP addresses. It includes different parts that represent the location of a computer or device on a network.
Explanation: My dad is a professional engineer
Answer:
Its A and C
Explanation:
I did it on ed2020
What solicits online input such as product ratings from consumers?
A qiuck response code
Computer forensics
Crowdsourcing
Or Crowdfunding?
Answer:
Crowdsourcing I think is the correct answer. "A quick response code" and "Computer Forensics" both don't make sense as answers, and Crowdfunding is specifically for money.
08408519 kahoot code
Answer:
ill join
Explanation:
Answer:
the code 08408519 dosent work
Explanation:
Type the correct answer in the box. Spell all words correctly.
Review the situation below and identify the television system in use.
Laura lives in the mountainous state of Nevada. She doesn’t receive very good television reception. She wonders whether there is a problem with her television set or the antenna she uses. Her neighbor Patsy does not have any problem with her television reception. Patsy also mentioned that she has no antenna. Patsy is possibly using a ___ television system.
Answer:
Patsy is possibly using a cable television system.
Explanation:
The cable television system is the private television service provision system that is provided not through signals captured by means of antennas, but through coaxial cables that are connected from the home to the poles belonging to the providers, located on the public road.
The advantages of wired televission are relatively high sound and image quality with a minimum of interference with the simplicity and low cost of subscriber receivers.
PLEASE HURRY AND BE SERIOUS
Which of the following statements describes the way networks are set up?
LANs are made up of LANs.
WANs are made up of WANs.
LANs are made up of WANs.
WANs are made up of LANs.
Answer: D: WANs are made up of LANs.
Explanation:
Answer:
answer is D WANS are made up of LANS
Explanation:
I want to make apps but I don't know how and which things I have to learn first ,so if you know mention from starting to ending
Answer:
There are a lot to learn, especially the basics. I'd suggest using SolorLearn for this.
Phishing (pronounced fishing) is malware sent through e-mail that looks like a legitimate message from a trusted sender. The goal is to convince the recipient into submitting personal information, such as passwords or bank account numbers.
Question 9 options:
True
False
Answer:
this is true
Explanation:
the answer is true