In using cloud infrastructures, the client necessarily cedes control to the CP on a number of issues that may affect security
a. True
b. False

Answers

Answer 1

Answer:

A. True

Explanation:

The correct option is A. True.

Actually, in using cloud infrastructures, the client necessarily cedes control to the CP on a number of issues which may affect security. It may have to restrict port scans and even penetration testing. Moreover, the service level agreements may not actually guarantee commitment to offer such services on the part of the CP. This may result in leaving a gap in security defenses.

Also, when the control of the CP changes, it's evident that the terms and conditions of their services may also change which may affect security.


Related Questions

EAPOL operates at the network layers and makes use of an IEEE 802 LAN, such as Ethernet or Wi-Fi, at the link level.
A. True
B. False

Answers

B. False ....................

Write an interactive program to calculate the volume and surface area of a three-dimensional object.

Answers

Answer:

I am writing a Python program:

pi=3.14 #the value of pi is set to 3.14

radius = float(input("Enter the radius of sphere: ")) #prompts user to enter the radius of sphere

surface_area = 4 * pi * radius **2 #computes surface area of sphere

volume = (4.0/3.0) * (pi * radius ** 3) #computes volume of sphere

print("Surface Area of sphere is: ", surface_area) #prints the surface area

print("Volume of sphere is: {:.2f}".format(volume)) #prints the volume        

Explanation:

Please see the attachment for the complete interactive code.

The first three lines of print statement in the attached image give a brief description of the program.

Next the program assigns 3.14 as the value of π (pi). Then the program prompts the user to enter the radius. Then it computes the surface area and volume of sphere using the formulas. Then it prints the resultant values of surface area and volume on output screen.

The psuedocode for this program is given below:

PROGRAM SphereVolume

pi=3.14

NUMBER radius, surface_area, volume  

INPUT radius

COMPUTE volume = (4/3) * pi* radius ^3

COMPUTE surface_area = 4 * pi * radius ^ 2

OUTPUT volume , surface_area

END

Write a method that accepts a String object as an argument and returns a copy of the string with the first character of each sentence capitalized. For instance, if the argument is "hello. my name is Joe. what is your name?" the method should return the string "Hello. My name is Joe. What is your name?" Demonstrate the method in a program that asks the user to input a string and then passes it to the method. The modified string should be displayed on the screen.

Answers

Answer:

The programming language is not stated; However, the program written in C++ is as follows: (See Attachment)

#include<iostream>

using namespace std;

string capt(string result)

{

result[0] = toupper(result[0]);

for(int i =0;i<result.length();i++){

 if(result[i]=='.' || result[i]=='?' ||result[i]=='!')  {

 if(result[i+1]==' ') {

  result[i+2] = toupper(result[i+2]);

 }

 if(result[i+2]==' ')  {

  result[i+3] = toupper(result[i+3]);

 }

 } }

return result;

}

int main(){

string sentence;

getline(cin,sentence);

cout<<capt(sentence);

return 0;

}

Explanation:

The method to capitalize first letters of string starts here

string capt(string result){

This line capitalizes the first letter of the sentence

result[0] = toupper(result[0]);

This iteration iterates through each letter of the input sentence

for(int i =0;i<result.length();i++){

This checks if the current character is a period (.), a question mark (?) or an exclamation mark (!)

if(result[i]=='.' || result[i]=='?' ||result[i]=='!')  {

 if(result[i+1]==' '){  ->This condition checks if the sentence is single spaced

  result[i+2] = toupper(result[i+2]);

-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized

 }

 if(result[i+2]==' '){ ->This condition checks if the sentence is double spaced

  result[i+3] = toupper(result[i+3]);

-> If both conditions are satisfied, a sentence is detected and the first letter is capitalized

 }

}

}  The iteration ends here

return result;  ->The new string is returned here.

}

The main method starts here

int main(){

This declares a string variable named sentence

string sentence;

This gets the user input

getline(cin,sentence);

This passes the input string to the method defined above

cout<<capt(sentence);

return 0;

}

Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:
42 seconds
import java.util.Scanner;
public class PopcornTimer {
public static void printPopcornTime(int bagOunces) {
/* Your solution goes here */
}
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
int userOunces;
userOunces = scnr.nextInt();
printPopcornTime(userOunces);
}
}

Answers

Answer:

Replace

/* Your solution goes here */

with

if (bagOunces < 2) {

   System.out.print("Too Small");

}

else if(bagOunces > 10) {

   System.out.print("Too Large");

}

else {

   System.out.print((bagOunces * 6)+" seconds");

}

Explanation:

This line checks if bagOunces is less than 2;

if (bagOunces < 2) {

If yes, the string "Too Small" is printed

   System.out.print("Too Small");

}

This line checks if bagOunces is greater than 10

else if(bagOunces > 10) {

If yes, the string "Too Large" is printed

   System.out.print("Too Large");

}

The following condition is executed if the above conditions are false

else {

This multiplies bagOunces by 6 and adds seconds

   System.out.print((bagOunces * 6)+" seconds");

}

The program to check the highEst of n numbercan be done by ......,..

Answers

Answer: Given an array of numbers, arrange them in a way that yields the largest value. For example, if the given numbers are {54, 546, 548, 60}, the arrangement 6054854654 gives the largest value. And if the given numbers are {1, 34, 3, 98, 9, 76, 45, 4}, then the arrangement 998764543431 gives the largest value.

Explanation: If you need more help follow me on istagram at dr.darrien

-thank you

Define the missing method. licenseNum is created as: (100000 * customID) licenseYear, where customID is a method parameter. Sample output with inputs 2014 777:

Answers

Answer:

I am writing the program in JAVA and C++

JAVA:

public int createLicenseNum(int customID){  //class that takes the customID as parameter and creates and returns the licenseNum

       licenseNum = (100000 * customID) + licenseYear;  //licenseNum creation formula

       return(licenseNum);     }

In C++ :

void DogLicense::CreateLicenseNum(int customID){ //class that takes the customID as parameter and creates the licenseNum

licenseNum = (100000 * customID) + licenseYear; } //licenseNum creation formula

Explanation:

createLicenseNum method takes customID as its parameter. The formula inside the function is:

licenseNum = (100000 * customID) + licenseYear;

This multiplies 100000 to the customID and adds the result to the licenseYear and assigns the result of this whole expression to licenseNum.

For example if the SetYear(2014) means the value of licenseYear is set to 2014 and CreateLicenseNum(777) this statement calls createLicenseNum method by passing 777 value as customID to this function. So this means licenseYear = 2014 and customID  = 777

When the CreateLicenseNum function is invoked it computes and returns the value of licenseNum as:

licenseNum = (100000 * customID) + licenseYear;

                     = (100000 * 777) + 2014

                     = 77700000 + 2014

licenseNum = 77702014                                                                                                        

So the output is:

Dog license: 77702014          

To call this function in JAVA:

public class CallDogLicense {

public static void main(String[] args) {//start of main() function

    DogLicense dog1 = new DogLicense();//create instance of Dog class

dog1.setYear(2014); // calls setYear passing 2014

dog1.createLicenseNum(777);// calls createLicenseNum passing 777 as customID value

System.out.println("Dog license: " + dog1.getLicenseNum()); //calls getLicenseNum to get the computed licenceNum value

return; } }

Both the programs along with the output are attached as a screenshot.

Answer:

public int createLicenseNum(int customID){

  licenseNum = (100000 * customID) + licenseYear;

  return(licenseNum);    

}

Explanation:

Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Incremental Development d. Linear Development

Answers

Answer:

b. Both incremental and iterative development.

Explanation:

Agile software development is based on both incremental and iterative development. It is an iterative method to software delivery in which at the start of a project, software are built incrementally rather than completing and delivering them at once as they near completion.

Incremental development means that various components of the system are developed at different rates and are joined together upon confirmation of completion, while Iterative development means that the team intends to check again components that makes the system with a view to revising and improving on them for optimal performance.

Agile as an approach to software development lay emphasis on incremental delivery(developing system parts at different time), team work, continuous planning and learning, hence encourages rapid and flexible response to change.

Write a CREATE VIEW statement that defines a view named InvoiceBasic that returns three columns: VendorName, InvoiceNumber, and InvoiceTotal. Then, write a SELECT statement that returns all of the columns in the view, sorted by VendorName, where the first letter of the vendor name is N, O, or P.

Answers

Answer:

CREATE VIEW InvoiceBasic  AS

SELECT VendorName, InvoiceNumber, InvoiceTotal  

FROM Invoices JOIN Vendors ON Invoices.InvoiceID = Vendors.VendorID  

WHERE left(VendorName,1) IN ('N' , 'O ' , 'P' )

Explanation:

CREATE VIEW creates a view named InvoiceBasic  

SELECT statements selects columns VendorName, InvoiceNumber and InvoiceTotal   from Invoices table

JOIN is used to combine rows from Invoices and Vendors table, based on a InvoiceID and VendorsID columns.

WHERE clause specified a condition that the first letter of the vendor name is N, O, or P. Here left function is used to extract first character of text from a VendorName column.

Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a space. Ex: If origList = {40, 50, 60, 70} and offsetAmount = {5, 7, 3, 0}, print:45 57 63 70 #include using namespace std;int main() {const int NUM_VALS = 4;int origList[NUM_VALS];int offsetAmount[NUM_VALS];int i = 0;origList[0] = 40;origList[1] = 50;origList[2] = 60;origList[3] = 70;offsetAmount[0] = 5;offsetAmount[1] = 7;offsetAmount[2] = 3;offsetAmount[3] = 0;// your solution goes here

Answers

Answer:

Complete the program with the following code segment

for(int i =0;i<=3;i++)

{

cout<<offsetAmount[i]+origList[i]<<" ";

}

return 0;

}

Explanation:

The following line is an iteration of variable i from 1 to 3; It iterates through elements of origList and offsetAmount

for(int i =0;i<=3;i++){

This adds and prints the corresponding elements of origList and offsetAmount

cout<<offsetAmount[i]+origList[i]<<" ";

}  The iteration ends here

What is resource management in Wireless Communication? Explain its advantages

Answers

Answer:

This is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel.

Explanation:

Radio Resource Management is a management system in wireless communication that oversees radio resources and crosstalks between two radio transmitters which make use of the same channel. Its aim is to effectively manage the radio network infrastructure. Its advantages include;

1. It allows for multi-users communication instead of point-to-point channel capacity.

2. it increases the system spectral efficiency by a high order of magnitude. The introduction of advanced coding and source coding makes this possible.

3. It helps systems that are affected by co-channel interference. An example of such a system is the wireless network used in computers which are characterized by different access points that make use of the same channel frequencies.

PROGRAM 8: Grade Converter! For this program, I would like you to create a function which returns a character value based on a floating point value as

Answers

Answer:

This function will return a character grade for every floating-point grade for every student in the class.

function grade( floatPoint ){

      let text;

      switch ( floatPoint ) {

        case floatPoint < 40.0 :

             text= " F ";

             break;

        case floatPoint == 40.0 :

             text= " P ";

             break;

        case floatPoint > 40.0 && floatPoint <= 50.0 :

             text=  " C ";

             break;

        case floatPoint > 50.0 && floatPoint < 70.0 :

             text=  " B ";

             break;

        case floatPoint >=70.0 && floatPoint <= 100.0 :

             text= " C ";

             break;

        default :

            text= "Floating point must be between 0.0 to 100.0"

      }

     return text;

}

Explanation:

This javascript function would return a character grade for floating-point numbers within the range of 0.0 to 100.0.

What is the science and art of making an illustrated map or chart. GIS allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps? a. Automatic vehicle locationb. Geographic information systemc. Cartographyd. Edge matching

Answers

Answer:

c. Cartography.

Explanation:

Cartography is the science and art of making an illustrated map or chart. Geographic information system (GIS) allows users to interpret, analyze, and visualize data in different ways that reveal patterns and trends in the form of reports, charts, and maps.

Basically, cartography is the science and art of depicting a geographical area graphically, mostly on flat surfaces or media like maps or charts. It is an ancient art that was peculiar to the fishing and hunting geographical regions. Geographic information system is an improved and technological form of cartography used for performing a whole lot of activities or functions on data generated from different locations of the Earth.

Answer:

C. Cartography

Explanation:

An organization is planning to implement a VPN. They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. Which of the following would BEST meet this goal?a. Split tunnelb. Full tunnelc. IPsec using Tunnel moded. IPsec using Transport mode

Answers

Answer:

B. Full tunnel.

Explanation:

In this scenario, an organization is planning to implement a virtual private network (VPN). They want to ensure that after a VPN client connects to the VPN server, all traffic from the VPN client is encrypted. The best method to meet this goal is to use a full tunnel.

A full tunnel is a type of virtual private network that routes and encrypts all traffics or request on a particular network. It is a bidirectional form of encrypting all traffics in a network.

On the other hand, a split tunnel is a type of virtual private network that only encrypts traffic from the internet to the VPN client.

Hence, the full tunnel method is the most secured type of virtual private network.

The intention of this problem is to analyze a user input word, and display the letter that it starts with (book → B).

a. Create a function prototype for a function that accepts a word less than 25 characters long, and return a character.
b. Write the function definition for this function that evaluates the input word and returns the letter that the word starts with in capital letter (if it’s in small letters).
c. Create a function call in the main function, and use the function output to print the following message based on the input from the user. (Remember to have a command prompt in the main function requesting the user to enter any word.)

Computer starts with the letter C.
Summer starts with the letter S.

d. Make sure to consider the case where a naughty user enters characters other than the alphabet to form a word and display a relevant message.

%sb$ is not a word.
$500 is not a word.

e. Have the program process words until it encounters a word beginning with the character

Answers

Answer:

Here is the C++ program:

#include<iostream>  // to use input output functions

using namespace std;     //to identify objects like cin cout

void StartChar(string str)  {  // function that takes a word string as parameter and returns the first letter of that word in capital

   int i;  

   char c;

   do  //start of do while loop

   {

   for (int i = 0; i < str.length(); i++) {  //iterates through each character of the word str

       if(str.length()>25){  //checks if the length of input word is greater than 25

           cout<<"limit exceeded"; }  //displays this message if a word is more than 25 characters long

      c = str.at(i);   // returns the character at position i

       if (! ( ( c >= 'a' && c <= 'z' ) || ( c >= 'A' && c <= 'Z' ) ) ) {  //checks if the input word is contains characters other than the alphabet

            cout<<str<<" is not a word!"<<endl; break;}  //displays this message if user enters characters other than the alphabet

        if (i == 0) {  //check the first character of the input word

           str[i]=toupper(str[i]);  //converts the first character of the input word to uppercase

           cout<<str<<" starts with letter "<<str[i]<<endl;  }  // prints the letter that the word starts with in capital letter

   }   cout<<"Enter a word: ";  //prompts user to enter a word

      cin>>str;   //reads input word from user

}while(str!="#");   }    //keeps prompting user to enter a word until the user enters #

int main()   //start of the main() function body

{ string str;  //declares a variable to hold a word

cout<<"Enter a word: "; //prompts user to enter a word

cin>>str; //reads input word from user

   StartChar(str); }  //calls function passing the word to it

     

Explanation:

The program prompts the user to enter a word and then calls StartChar(str) method by passing the word to the function.

The function StartChar() takes that word string as argument.

do while loop starts. The for loop inside do while loop iterates through each character of the word string.

First if condition checks if the length of the input word is greater than 25 using length() method which returns the length of the str. For example user inputs "aaaaaaaaaaaaaaaaaaaaaaaaaaa". Then the message limit exceeded is printed on the screen if this if condition evaluates to true.

second if condition checks if the user enters anything except the alphabet character to form a  word. For example user $500. If this condition evaluates to true then the message $500 is not a word! is printed on the screen.

Third if condition checks if the first character of input word, convert that character to capital using toupper() method and prints the first letter of the str word in capital. For example if input word is "Computer" then this prints the message: Computer starts with the letter C in the output screen.

The program keeps prompting the user to enter the word until the user enters a hash # to end the program.

The output of the program is attached.

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page

Answers

Answer:

The correct answer is "List of posts with the most recent ones at the top".

Explanation:

A website that includes someone else's thoughts, insights, views, etc. about a writer or community of authors and that also has photographs as well as searching the web.It indicates that perhaps the blog should distinguish between different articles about the site because then customers who frequent the site will observe and experience the articles on everyone's blogs.

So that the above would be the appropriate one.

Where can you find detailed information about your registration, classes, finances, and other personal details? This is also the portal where you can check your class schedule, pay your bill, view available courses, check your final grades, easily order books, etc. A. UC ONE Self-Service Center B. Webmail C. UC Box Account D. ILearn

Answers

Answer:

A. UC ONE Self-Service Center

Explanation:

The UC ONE Self-Service Center is an online platform where one can get detailed information about registration, classes, finances, and other personal details. This is also the portal where one can check class schedule, bill payment, viewing available courses, checking final grades, book ordering, etc.

it gives students all the convenience required for effective learning experience.

The UC ONE platform is a platform found in the portal of University of the Cumberland.

Consider two different implementations of the same instruction set architecture (ISA). The instructions can be divided into four classes according to their CPI (class A, B, C, and D). P1 with a clock rate of 2.5 GHz have CPIs of 1, 2, 3, and 3 for each class, respectively. P2 with a clock rate of 3 GHz and CPIs of 2, 2, 2, and 2 for each class, respectively. Given a program with a dynamic instruction count of 1,000,000 instructions divided into classes as follows: 10% class A, 20% class B, 50% class C, and 20% class D.which implementation is faster?
a. What is the global CPI for each implementation?
b. Find the clock cycles required in both cases.

Answers

Answer: Find answers in the attachments

Explanation:

Write a Bash script that searches all .c files in the current directory (and its subdirectories, recursively) for occurrences of the word "foobar". Your search should be case-sensitive (that applies both to filenames and the word "foobar"). Note that an occurrence of "foobar" only counts as a word if it is either at the beginning of the line or preceded by a non-word-constituent character, or, similarly, if it is either at the end of the line or followed by a non-word- constituent character. Word-constituent characters are letters, digits and underscores.

Answers

Answer:

grep -R  '^foobar'.c > variable && grep -R  'foobar$'.c >> variable

echo $variable | ls -n .

Explanation:

Bash scripting is a language used in unix and linux operating systems to interact and automate processes and manage files and packages in the system. It is an open source scripting language that has locations for several commands like echo, ls, man etc, and globbing characters.

The above statement stores and appends data of a search pattern to an already existing local variable and list them numerically as standard out 'STDOUT'.

mplement the function fileSum. fileSum is passed in a name of a file. This function should open the file, sum all of the integers within this file, close the file, and then return the sum.If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.Please Use This Code Template To Answer the Question#include #include #include //needed for exit functionusing namespace std;// Place fileSum prototype (declaration) hereint main() {string filename;cout << "Enter the name of the input file: ";cin >> filename;cout << "Sum: " << fileSum(filename) << endl;return 0;}// Place fileSum implementation here

Answers

Answer:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

Explanation:

Which sentence best matches the context of the word reticent as it is used in the following example?

We could talk about anything for hours. However, the moment I brought up dating, he was extremely reticent about his personal life.

Which recovery method helps users boot into an environment to get them back into the system so they can begin the troubleshooting process

Answers

Answer:

sfadasda

Explanation:

dsadasdadas

If a schema is not given, you may assume a table structure that makes sense in the context of the question. (using sql queries)
Find all Employee records containing the word "Joe", regardless of whether it was stored as JOE, Joe, or joe.

Answers

Answer:

The correct query is;

select * from EMPLOYEE where Employee_Name = 'JOE' or Employee_Name = 'Joe' or Employee_Name = 'joe';

where EMPLOYEE refer to the table name and type attribute name is Employee_Name

Explanation:

Here, the first thing we will do is to assume the name of the table.

Let’s assume the table name is EMPLOYEE, where the column i.e attribute from which we will be extracting our information is Employee_Name

The correct query to get the piece of information we are looking for will be;

select * from EMPLOYEE where Employee_Name = 'JOE' or Employee_Name = 'Joe' or Employee_Name = 'joe';

list three components of a computer system​

Answers

Central Processing Unit,
Input devices and
Output devices.

Briefly describe the importance of thoroughly testing a macro before deployment. What precautions might you take to ensure consistency across platforms for end users?

Answers

Answer:

Answered below

Explanation:

A macro or macroinstruction is a programmable pattern which translates a sequence of inputs into output. It is a rule that specifies how a certain input sequence is mapped to a replacement output sequence. Macros makes tasks less repetitive by representing complicated keystrokes, mouse clicks and commands.

By thoroughly testing a macro before deployment, you are able to observe the flow of the macro and also see the result of each action that occurs. This helps to isolate any action that causes an error or produces unwanted results and enable it to be consistent across end user platforms.

g Write a method that accepts a String object as an argument and displays its contents backward. For instance, if the string argument is "gravity" the method should display -"ytivarg". Demonstrate the method in a program that asks the user to input a string and then passes it to the method.

Answers

Answer:

The program written in C++ is as follows; (See Explanation Section for explanation)

#include <iostream>

using namespace std;

void revstring(string word)

{

   string  stringreverse = "";

   for(int i = word.length() - 1; i>=0; i--)

 {

     stringreverse+=word[i];

 }

 cout<<stringreverse;

}

int main()

{

 string user_input;

 cout << "Enter a string:  ";

 getline (std::cin, user_input);

 getstring(user_input);

 return 0;

}

Explanation:

The method starts here

void getstring(string word)

{

This line initializes a string variable to an empty string

   string  stringreverse = "";

This iteration iterates through the character of the user input from the last to the first

   for(int i = word.length() - 1; i>=0; i--)   {

     stringreverse+=word[i];

 }

This line prints the reversed string

 cout<<stringreverse;

}

The main method starts here

int main()

{

This line declares a string variable for user input

 string user_input;

This line prompts the user for input

 cout << "Enter a string:  ";

This line gets user input

 getline (std::cin, user_input);

This line passes the input string to the method

 revstring(user_input);

 return 0;

}

А.
is the highest education degree available at a community college.

Answers

Answer:

The answer is "associate".

Explanation:

The two-year post-school degree is also known as the associate degree, in which the students pursuing any of this degree, which may take as little as 2 years to complete the course, although many prefer to do it at the same rate. Its first two years of a Bachelor (fresh and sophomore years) were covered by an Associate degree.

Although Python provides us with many list methods, it is good practice and very instructive to think about how they are implemented. Implement a Python methods that works like the following: a. count b. in: return True if the item is in the list c. reverse d. index: return -1 if the item is not in the list e. insert

Answers

Answer:

Here are the methods:

a) count

def count(object, list):  

   counter = 0

   for i in list:

       if i == object:

           counter = counter + 1

   return counter

b) in : return True if the item is in the list

def include(object, list):  

   for i in list:

       if i == object:

           return True

   return False

c)  reverse

def reverse(list):

   first = 0            

   last = len(list)-1    

   while first<last:

       list[first] , list[last] = list[last] , list[first]

       first = first + 1

       last = last - 1

   return list

d) index: return -1 if the item is not in the list  

def index(object, list):

   for x in range(len(list)):

       if list[x] == object:

           return x

   return -1

e)  insert

def insert(object, index, list):

   return list[:index] + [object] + list[index:]

Explanation:

a)

The method count takes object and a list as parameters and returns the number of times that object appears in the list.

counter variable is used to count the number of times object appears in list.

Suppose

list = [1,1,2,1,3,4,4,5,6]

object = 1

The for loop i.e. for i in list iterates through each item in the list

if condition if i == object inside for loop checks if the item of list at i-th position is equal to the object.  So for the above example, this condition checks if 1 is present in the list. If this condition evaluates to true then the value of counter is incremented to 1 otherwise the loop keeps iterating through the list searching for the occurrence of object (1) in the list.

After the complete list is moved through, the return counter statement returns the number of times object (i.e. 1 in the example) occurred in the list ( i.e. [1,1,2,1,3,4,4,5,6]  ) As 1 appears thrice in the list so the output is 3.

b)  

The method include takes two parameters i.e. object and list as parameters and returns True if the object is present in the list otherwise returns False. Here i have not named the function as in because in is a reserved keyword in Python so i used include as method name.

For example if list = [1,2,3,4] and object = 3

for loop for i in list iterates through each item of the list and the if condition if i == object checks if the item at i-th position of the list is equal to the specified object. This means for the above example the loop iterates through each number in the list and checks if the number at i-th position in the list is equal to 3 (object). When this if condition evaluates to true, the method returns True as output otherwise returns False in output ( if 3 is not found in the list). As object 3 is present in the list so the output is True.

c) reverse method takes a list as parameter and returns the list in reverse order.

Suppose list = [1,2,3,4,5,6]

The function has two variables i.e. first that is the first item of the list and last which is the last item of the list. Value of first is initialized to 0 and value of last is initialized to len(list)-1 where len(list) = 6 and 6-1=5 so last=5 for the above example. These are basically used as index variables to point to the first and last items of list.

The while loop executes until the value of first exceeds that of last.

Inside the while loop the statement list[first] , list[last] = list[last] , list[first]  interchanges the values of elements of the list which are positioned at first and last. After each interchange the first is incremented to 1 and last is decremented to 1.

For example at first iteration:

first = 0

last = 5

list[0] , list[5] = list[5] , list[0]

This means in the list [1,2,3,4,5,6] The first element 1 is interchanged with last element 6. Then the value of first is incremented and first = 1, last = 4 to point at the elements 2 and 5 of the list and then exchanges them too.

This process goes on until while condition evaluates to false. When the loop breaks  statement return list returns the reversed list.

d) The method index takes object and list as parameters and returns the index of the object/item if it is found in the list otherwise returns -1

For example list = [1,2,4,5,6] and object = 3

for loop i.e.  for x in range(len(list)):  moves through each item of the list until the end of the list is reached. if statement  if list[x] == object:  checks if the x-th index of the list is equal to the object. If it is true returns the index position of the list where the object is found otherwise returns -1. For the above examples 3 is not in the list so the output is -1  

e) insert

The insert function takes as argument the object to be inserted, the index where the object is to be inserted and the list in which the object is to be inserted.

For example list = [0, 1, 2, 4, 5, 6] and object = 3 and index = 3

3 is to be inserted in list  [1,2,4,5] at index position 3 of the list. The statement:

return list[:index] + [object] + list[index:]

list[:index] is a sub list that contains items from start to the index position. For above example:

list[:index] = [0, 1, 2]

list[index:] is a sub list that contains items from index position to end of the list.

list[index:] = [4, 5, 6]

[object] = [3]

So above statement becomes:

[0, 1, 2] + [3] + [4, 5, 6]

So the output is:

[0, 1, 2, 3, 4, 5, 6]    

what are the 21St century competencies or skills required in the information society?

Answers

Answer:

Communication

Collaboration

ICT literacy

Explanation:

These are some of the skills that are needed in the 21st century to compete and thrive in the information society.

To remain progressive, one needs to have good communication skills. These communication skills can include Active Listening and Passive Listening.

Collaboration is important because you'll have to work with other people as no man is an island, we need someone else so the skill of collaboration is necessary to compete and stay relevant in the information society in the 21st century.

IT literacy is also very important because one needs to have basic computer knowledge such as programming, computer essentials and applications, etc.

While interoperability and unrestricted connectivity is an important trend in networking, the reality is that many diverse systems with different hardware and software exist. Programming that serves to "glue together" or mediate between two separate and usually already existing programs is known as:

Answers

Answer:

Middleware

Explanation:

In today's technology like networking, software development, web development, etc, there is a need for connectivity. The problem at hand is the variation of the tech brands which results in the difference in operating systems, applications, and connectivity protocols. This problem is solved with the introduction of Middleware.

Middleware is the solution to conflicting software applications, interconnectivity between various tech platforms. It promotes cross-platform interactions.

How does the teacher know you have completed your assignment in Google Classroom?

Answers

Answer:

When students have completed the assignment, they simply click the Mark As Done button to let the teacher know they have finished.

Explanation: Note: The teacher does NOT receive an alert or email notification when work has been turned in, or marked as done.

Define Proportional spacing fornt.​

Answers

Answer:

Alphabetic character spacing based on the width of each letter in a font. ... Proportional spacing is commonly used for almost all text. In this encyclopedia, the default text is a proportional typeface, and tables are "monospaced," in which all characters have the same fixed width.

hope this answer helps u

pls mark me as brainlitest .-.

Other Questions
comment in some way the complex nature of slavery that can be discerned from the Stono Rebellion Because the neutron has no charge, its mass must be found in some way other than by using a mass spectrometer. When a neutron and a proton meet (assume both to be almost stationary), they combine and form a deuteron, emitting a gamma ray whose energy is 2.2233 MeV. The masses of the proton and the deuteron are 1.007 276 467 u and 2.013 553 212 u, respectively. Based on this data, what is the mass of the neutron underline nouns and circle the verbs1. Betty accomplished all the work herself.2. The doll was one that had been made in England.3.Mr. Jenkins gave a bonus to all of is employees and to himself as well.4. The audience was disappointed with the play and left before it was over.5. Magnolias are trees that grow in the south. if a is an even natural number such that a|208 and (a,b)=1, then find the value of bthis is gauss theroeam Which diagram accurately reflects how a historical society influenced the modern U.S. government ? Solve: 3a^2-4b a= -6 b= -5 If you could also leave an explanation that would be great! Thank you for your time! Almost every state during the Civil War: I NEED HELP PLEASE I GIVE 5 STARS FOR CORRECT ANSWER ! Determine whether each phrase describes carboxylic acids or esters.a. Do not form hydrogen bonds amongst themselves and have higher vapor pressureb. Form hydrogen bonds amongst themselves and have lower vapor pressurec. Notable for their pleasant fragrancesd. Their reactions with base are kn. own as saponificationse. Usually have a sour odorf. Their reactions with base are known as neutralizations The open interest on silver futures at a particular time is the Group of answer choices number of all long or short silver futures contracts outstanding. number of silver futures contracts traded during the day. number of silver futures contracts traded the previous day. number of outstanding silver futures contracts for delivery within the next month. Type the correct answer in the box. Use numerals instead of words. Use the order of operations to evaluate this expression: 7 + (5 9)2 + 3(16 8). What is beneficial about having committees in the House of Representatives? here are times where you will be provided with BUD dates. When you do not have access to the BUD dates, you will have to determine that date yourself. What is the appropriate BUD date for a water containing oral formulation? Not later than 14 days Not later than 30 days Urrea writes about the numerous moments of abuse in this chapter. How did you react to this chapter? Do the degrees of abuse matter? Why do you think the authority figures do not step in to stop the abuse? Russia .......... earlier this week that it ......... all its troops out of Georgea) had announced /pulled b) announces /would have pulled c) announced /had pulledd) announced / has pulled e) has announced /was pulling Nina is training for a marathon. She can run 4 1/2 kilometers in 1/3 of an hour. At this pace, how many kilometers can Nina run in 1 hour? Chinas famine of 1958-61 was a result of government policies. Explain. The net of a triangular prism is shown below. What is the surface area of the prism? A. 128 cm^2 B. 152 cm^2 C. 176 cm^2 D. 304 cm^2 Trevor Company discloses supplementary operating segment information for its three reportable segments. Data for 20X8 are available as follows: Segment A Segment B Segment CSales $500,000 $300,000 $200,000Traceable operating expenses 250,000 120,000 90,000Allocable costs for the year was $180,000. Allocable costs are assigned based on the ratio of a segment's income before allocable costs to total income before allocable costs. The 20X8 operating profit for Segment B was:_______.A) $180,000. B) $120,000. C) $126,000.D) $110,000. 6. Which is an example of partisanship?A. Elected officials avoid controversial policy choices.B. Elected officials support the policies of their party.C. Elected officials appear in ads for other candidates.D. Elected officials communicate with their constituents.