Answer:
FALSE IS THE ANSWER.
I HOPE IT IS HELPFUL
Write a loop that displays your name 10 times. 2. Write a loop that displays all the odd numbers from 1 through 49. 3. Write a loop that displays every fifth number from 0 through 100. 4. Write a code sample that uses a loop to write the numbers from 1 through 10 to a file. 5. Assume that a file named People.txt contains a list of names. Write a code sample that uses a while loop to
Answer:
The program in Python is as follows:
#1
for i in range(10):
print("MrRoyal",end=" ")
print()
#2
for i in range(1,50,2):
print(i,end=" ")
print()
#3
for i in range(0,101,5):
print(i,end=" ")
print()
#4
i = 1
while i <=10:
print(i,end =" ")
i+=1
#5
myfile = open("People.txt", "r")
eachLine = myfile.readline()
while eachLine:
print(eachLine)
eachLine = myfile.readline()
myfile.close()
Explanation:
The program in Python is as follows:
Program #1
This iterates from 1 to 10
for i in range(10):
This prints the name for each iteration [modify to your name]
print("MrRoyal",end=" ")
This prints a new line
print()
Program #2
This iterates from 1 to 49 with an increment of 2
for i in range(1,50,2):
This prints the odd numbers in the above range
print(i,end=" ")
This prints a new line
print()
Program #3
This iterates from 0 to 100 with a step of 5
for i in range(0,101,5):
This prints every 5th number
print(i,end=" ")
Print a new line
print()
Program #4
This initializes the number to 1
i = 1
This opens the file in an append mode
f = open("myfile.txt", "a")
This loop is repeated from 1 to 10
while i <=10:
This writes each number to the file
f.write(str(i))
Increment the number by 1
i+=1
Close the file
f.close()
Program #5
This opens the file in a read mode
myfile = open("People.txt", "r")
This reads each line
eachLine = myfile.readline()
This loop is repeated for every line
while eachLine:
Print the content on the line
print(eachLine)
Read another line
eachLine = myfile.readline()
Close the file
myfile.close()
For what purpose do the hackers create the zombies army?
A. DDoS Attacks
B. DoS Attacks
C. Warm Attacks
Answer:
A. DDoS Attacks
Explanation:
A zombie, in computer terminology, is a hacker, computer worm, trojan horse, or virus compromised internet connected computer, which can be remotely directed to perform malicious tasks
E-mail spams and denial-of-service, DoS attacks are spread and launched by botnets of zombie computers
Botnets which are also known as "zombie army", are used by hackers mainly for spam and distributed-denial-of-service, DDoS, attacks
While a DoS attack involves one machine, while a DDoS attack consist of multiple computing devices and machines
A botherder is the originator of a botnet and common botnets include Mr Black. Pushdo, and cyclone
All of the following items may be sent via email EXCEPT *
1 point
soft copy attachments
hard copy attachments
web links
web pages
Answer:
hard copy attachments
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
One of the most widely used communication channel or medium around the world is an e-mail (electronic mail).
An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send and receive texts and multimedia messages over the internet.
The following documents or files such as soft copy attachments, web links and web pages may be sent from one user to another through the use of an email.
However, hard copy attachments cannot be sent via email because they're physical documents and as such requires that they be delivered physically to the recipient.
In conclusion, you can only send soft copy documents that you cannot feel or touch with your hands over the internet and via email. Thus, an email is only designed to accept soft copy documents or files (attachments) but certainly not hard copy documents (attachments) in our technological era.
It's usually easier to change the design of a photo album slide show A.after you've created the presentation. B.before you've created the presentation. C.before you've planned out the presentation. D.after you've planned out the presentation but before creating it.
Answer:
A. after you've created the presentation.
Explanation:
A power point presentation is defined as a presentation program where one can create any presentation or design any layout like the photo album slide show to present it to others.
Once the album is created in the PowerPoint, it can be changed by going to the slide show and editing the content of the photo album of the slide show. Thus it is easier to make any changes in the design of the photo album slide show after the presentation have been created.
What is the Full form of DC?
Answer:
Deputy Commissioner.
Answer:
the full form of DC is deputy commissioner
rem wap a programe using function procedure to calculate simple interest
Answer:
The program in Python is as follows:
def interest(P,R,T):
[tex]I = P * R * T/100[/tex]
return I
P = float(input("Principal: "))
R = float(input("Rate (%): "))
T = float(input("Time (years): "))
print(interest(P,R,T))
Explanation:
Required
Simple interest program using function
This defines the function
def interest(P,R,T):
This calculates the simple interest
[tex]I = P * R * T/100[/tex]
This returns the calculated interest
return I
The main begins here
These get inputs for principal, rate and time
P = float(input("Principal: "))
R = float(input("Rate (%): "))
T = float(input("Time (years): "))
This calls the interest function
print(interest(P,R,T))
Create the following dataframe Student from dictionary of series and display
the details of each student. (row wise).
Name Subject Marks
1 Anjan English 78
2 Shreya Science 87
3 Meena Science 81
4 Karan Maths 91
Answer:
import pandas as pd
pd.Dataframe(information)
Explanation:
Given :
Name Subject Marks
1 Anjan English 78
2 Shreya Science 87
3 Meena Science 81
4 Karan Maths 91
information = { 'Name' : ['Anjan', 'Shreya', 'Meena', 'Karan'], 'Subject' : ['English', 'Science', 'Science', 'Maths'], 'Marks' : [ 78, 87, 81, 91]}
The information in the table can be embedded in dictionary list as given above.
Using the pandas library in python :
The Dataframe method in pandas will create the table as shown by putting the variable as an argument in the DataFrame method.
How do you reset a g.mail password?
Answer:
put: forgot password to reset it
Answer:
Change your pass word
Open your Go ogle Account. You might need to sign in.
Under "Security," select Signing in to G oo gle.
Choose Password. You might need to sign in again.
Enter your new password, then select Change Password.
what is the difference between coding with html and coding with python
Answer:
Python is an object-oriented programming language that is designed to be accessible and simple for all users, HTML is a web language and is used globally to define the structure of web pages by using various tags. HTML is not a programming language it's a markup language which is used to formatting web pages. Python is a general purpose scripting language which can be used to develop a wide range of programs.
1.can you identify the materials needed in making simple doorbell ???
2.what is the use of each material or tool needed in making simple doorbell?????
pakianswer po ng maayos
Answer:
1. rotary tool, spray paint, light, drill,
Explanation:
Name the function for output in python.
Answer:
We use the print() function to output data to the standard output device (screen). We can also output data to a file, but this will be discussed later. An example of its use is given below.
Answer:print()
Explanation:As said above. Print is what we use in python (:
Can someone please type a code that makes a house in python and turtle graphics i need help
Answer:
import turtle
turtle.speed(2)
#shape
turtle.forward(100)
turtle.left(90)
turtle.forward(100)
turtle.left(45)
turtle.forward(100)
turtle.left(90)
turtle.forward(100)
turtle.left(45)
turtle.forward(100)
turtle.left(90)
turtle.forward(100)
#door
turtle.left(90)
turtle.forward(50)
turtle.left(90)
turtle.forward(25)
turtle.left(90)
turtle.forward(50)
#windows
turtle.penup()
turtle.right(90)
turtle.forward(20)
turtle.right(90)
turtle.forward(20)
turtle.pendown()
turtle.forward(25)
turtle.left(90)
turtle.forward(40)
turtle.left(90)
turtle.forward(25)
turtle.left(90)
turtle.forward(40)
Explanation:
here :)
In cell K2 enter a formula using the IF and OR functions, as well as structured references, to determine if Adam Moriarty can be a group leader. a. The IF function should first determine if the staff member’s Service Years is greater than 3 OR if the staff member’s college graduate status is "Yes". Remember to use a structured reference to the Service Years and the College Graduate columns.
Solution :
The value of the K2 cell is filled by IF and OR functions with structured references as :
[tex]K2=IF(OR([CBF\ \text{Staff[ Service years]} > 3, \text{CBF Staff[College graduate]}="Yes"),"Yes","No")[/tex]
Now if the syntax of the formula is not provided, then we can use :
[tex]$K2=IF(OR([[\text{Service Years}]]>3,[[\text{College Graduate}]]="Yes"),"Yes","No")$[/tex]
The staff member are required to satisfy one of the two or both the conditions so as to become a group leader. The conditions are :
--- staff member should served for more than 3 years
--- staff members should be college graduate
Describe how serial data access finds data
Answer:
Serial data access will go through all the data by order until the target data is reached
Explanation:
This is opposite of direct data access which immediately finds the desired
data
Answer:
Serial access works by accessing the data at the beginning and then working through it bit-by-bit until the end.
...
Examples of storage medium that use serial access are:
Video cassettes.
Music cassettes.
Backup tape cartridges(hold lots of tape for backing up large amounts of data)
A company has recently adopted a hybrid cloud architecture and is planning to migrate a database hosted on-premises to AWS. The database currently has over 50 TB of consumer data, handles highly transactional (OLTP) workloads, and is expected to grow. The Solutions Architect should ensure that the database is ACID-compliant and can handle complex queries of the application.
Which type of database service should the Architect use?
A. Amazon Redshift
B. Amazon DynamoDB
C. Amazon Aurora
D. Amazon RDS
Answer: Amazon Aurora
Explanation:
Amazon Aurora is a fully managed service which is vital in saving time through the automation of time consuming tasks like recovery, backup, provisioning, patching, repair, and failure detection.
Amazon Aurora also allows the encryption of databases through the use of keys that are managed through the AWS Key Management Service. Therefore, based on the information given the question, type of database service that the Architect should use is Amazon Aurora.
What is a header row?
O the title of a document when it is centered
O the top row of a table that shows titles for the cells below
O the bottom row in a table that shows sums of numbers in cells
O the hidden space at the top of each page
Please help ASAP taking unit test
Answer:
b. the top row of a table that shows titles for the cells below
Explanation:
A header row is the first row of a given table that shows titles of the cells below it. In many cases, the header row has different styles from the other rows in the table. A header row can be found in, among others, both Microsoft's Excel and Word applications.
In the attached figure, the first row with a darker shade of background color is the header row for the table.
State two pieces of information that need to be labeled on the idea development sketch. 1 .________________________________________________. 2 .___________________________________________.
Answer:
Design drawings should show details on layout, measurements, plan, cross-sectional and vertical profiles. This information is prepared as scale drawings of the works to be constructed. they are legible they include all information from previous revisions and updates.
Explanation:
is solar energy reliable and powerful enough to be used in home or business
Answer:
It all depends on what you are prepared to spend and what sort of system you install. I have both grid tie and stand alone systems installed at my home, and both work really well, although we initially had some inverter problems with the grid tie system until we decided to only use top shelf gear.
We have 6.6 kW grid tie system on the roof of the house which supplies around 3 times our requirements, and a 1.5 kW stand alone system that supplies the backyard workshop and pool pump. The grid tie system cost around $6500 to install, and the small stand alone system cost $4500 although this was designed and built by myself, so a purchased system may well be more (batteries are still expensive, but this price is coming down).
In the current configuration (top tier panels, Fronius grid tie inverter and Victron stand alone inverter and charge regulator), we have had no failures in several years, and power bills are something that happen to other people.
My advice is look at what your requirements are, then double that when you spec out your system and don’t go for the cheapest price. Buy your components based on the quality and reputation of the manufacturer, it will be expensive, but you will save money in the long run. A good manufacturer will guarantee their products for at least 12 years and you should expect to get at least 20 years of life out of them.
Explanation:
Solar energy is more than enough for any business or home, but if you want to know if it is cost effective, you need to run the numbers. It does have to be grid-tied though to provide electricity at night or when cloudy for multiple days. In most cases, batteries are not cost-effective at this time.
♡●♡ jess bregoli ♡●♡#keep learning!!
A car manufacturer uses'simulation software during the design process for a new car. Which of the
following are reasons to use simulation software in this context?
1. Using simulation software can save the company money by helping to compare designs early in
the process, before prototype cars are built.
II. Using simulation software can help to identify safety issues by providing data about how different
mechanical components will interact in a wide variety of situations.
III. The manufacturer can present simulation software to customers to demonstrate different design
possibilities
А
I and II only
B
I and III only
С
II and III only
D
I, II, and III
D I,II and III is the answer i think
The reasons to use simulation software in this context are I, II, and III. The correct option is D.
What is simulation software?The process of simulating a genuine phenomenon with a set of mathematical formulas is the foundation of simulation software. It is essentially a program that allows the user to simulate an operation and view it without really conducting it.
Simulation is a decision-making and decision-support tool. You can use simulation software to assess, compare, and optimize different designs, programs, and policies. As such, it can be used to explain and defend decisions to multiple stakeholders.
By allowing the corporation to evaluate concepts early in the process before prototype automobiles are constructed, simulation software can save the company money.
Therefore, the correct option is D, I, II, and III.
To learn more about simulation software, refer to the link:
https://brainly.com/question/16192324
#SPJ2
>What is the output of the following code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]
print (list1[1] )
Answer:
Given code output is "786".
Explanation:
Code:
list1 = [ 'cyber', 786 , 2.23, 'square', 70.2 ]#defining a list list1 that holds value in parameter
print (list1[1] )#use a print method that prints list index value
In the given code a list "list1" is declared that holds value in it and in the next step a print method is declared that prints the first index value of the list.
complete the sentence: hexadecimal numbers use base ____
Hexadecimal numbers use base-16
Write a pseudocode to calculate the factorial of a number
Answer:
Answer CODE from C# Sharp Language
Explanation:
using System;
namespace test
{
class Program
{
public void silnia()
{
decimal liczba;
decimal silnia = 1;
Console.WriteLine("Obliczanie Silni ");
Console.WriteLine("Podaj liczbę: ");
liczba = Convert.ToInt32(System.Console.ReadLine());
//liczba = int.Parse(Console.ReadLine());
for (int i = 1; i <= liczba; i++)
silnia *= i;
Console.WriteLine("Wynik Silni Wynosi : " +silnia +" \n ");
}
static Program ćwiczeniaA;
static void Main(string[] args)
{
ćwiczeniaA = new Program();
ćwiczeniaA.silnia();
Console.WriteLine("Koniec Programu");
System.Console.ReadLine();
}
}
}
i have a question about Razer headsets. Is it possible to mix microphones? For example:
I have an "Electra V2" headset and microphone and I want to change it's microphone to Kraken.
Is it possible?
Answer:
In theory yes it is gonna be pretty hard but it is very possible
list 5 uses of computer
Answer:
if you a student..then you need it for sure
Explanation:
Microsoft Office
Doing assignment
doing report
answer online test/quiz
movie
make money
typing
play game
Your company resides in an area with rapid growth in both the corporate and residential areas surrounding your office. As such, your company has been experiencing several brownouts due to power grid problems (too much demand and not enough electricity). Fearing that your computers (especially the servers) could be damaged by these brownouts, your manager has asked you to find a solution to this problem.
Which of the following would be the BEST device to recommend to your manager for computer protection?
A. Surge suppressor
B. Power strips
C. UPS
D. Wall Outlet
Answer:
The correct answer is option C (UPS).
Explanation:
Since brownouts are reduced voltages that might not be good enough for the required electricity capacity for your company, fearing that your computers (especially the servers) could be damaged, it is best to use UPS for your computer protection.
A UPS also called (Uninterruptable Power Supply) can function as a Surge suppressor when the voltages entering your company might be higher than normal, it can also function too in protecting your computers (especially the servers) in the case of a brownout when voltage required by your computers dropped below the required level. In the case of a brownout, the UPS supplies energy stored in its batteries to make the computers keep working without going off from lack of electricity.
Are DoS and DDos tactics appropriate for legitimate organizations to use against others? What fallout is considered appropriate fallout should an attack be used on others? Explain your answer.
Answer:
They are inappropriate
fallouts: Access denial and data theft
Explanation:
Dos ( denial of service ) and DDos ( distributed denial of service ) are inappropriate for legitimate organizations to use against each other. because DOS or DDos attacks are attacks on the server of an organization by sending an unusual amount of traffic to the server, thereby denying the devices and users connected to the server access to the server.
Access denial and data theft are the fallouts associated with DOS and DDos attacks
(101101+10110) /110
101101-11001/101 please I need help
Answer:
000000000000000000000000000001111111111111111111
que significa DESFRAGMENTAR EL DISCO DURO?????
Answer:
DESFRAGMENTAR
Explanation:
es el proceso de reorganizar los datos almacenados en el disco duro para que los datos relacionados se vuelvan a juntar, todos alineados de manera continua.
Select the correct answer.
Susan is a programmer and uses the hexadecimal number system to represent instructions. Which letters of the alphabet do you think Susan uses to represent the numbers 10 to 15 in this number system?
A. A to F
B. A to H
C. A to M
D. A to J
Answer is Hexadecimal : A. A to F
What is machine level language ?
Explanation:
The machine-level language is a language that consists of a set of instructions that are in the binary form 0 or 1. As we know that computers can understand only machine instructions, which are in binary digits, i.e., 0 and 1, so the instructions given to the computer can be only in binary codes.