Design a program that gives simple math quizzes. The program should display two random numbers that are to be added, such as: 247 + 129 The program should allow the student to enter the answer. If the answer is correct, a message of congratulations should be displayed. If the answer is incorrect, a message showing the correct answer should be
Answer:
import random
num1 = random.randint(0, 1000)
num2 = random.randint(0, 1000)
print(str(num1) + " + " + str(num2) + " = ?")
result = int(input("Enter the answer: "))
if result == (num1 + num2):
print("Congratulations!")
else:
print("The correct answer is: " + str(num1 + num2))
Explanation:
*The code is in Python.
Import the random to be able to generate random numbers
Generate two numbers, num1 and num2, between 0 and 1000
Ask the sum of the num1 and num2
Get the input from the user
If the answer is correct, display a message of congratulations. Otherwise, display the correct answer
What type of edge does UML use to denote interface implementation? Group of answer choices A dotted arrow from the interface to the class terminated with a triangular tip. A dotted arrow from the interface to the class terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with a triangular tip.
Answer:
A. A dotted arrow from the class to the interface terminated with a triangular tip
Explanation:
As the security administrator for your organization, you must be aware of all types of attacks that can occur and plan for them. Which type of attack uses more than one computer to attack the victim?
Answer:
The answer is "DDoS "
Explanation:
The distributed denial of service attack (DDoS) occurs whenever a directed program's wireless data or assets, generally one or even more application servers, were also swamped by various machines. This attack is always the consequence of many affected systems, that fill up the target network with traffic.
This attack is aimed to avoid legal customers of one's website from accessing it. In being effective in a DDoS attack, further demands need to be sent to the hacker than even the victim's server could deal with. One other way to successfully attack is to send fake requests from the attacker.Which list method allows elements in a sequence to be removed and added at either end of the structure?
index
queue
stack
deque
Answer:
c.) stack
Explanation:
Answer:
the answer is c stack not only dose stack make the most since but i also got it right on edge 2020
Explanation:
Read the excerpt from The Code Book. Other attacks include the use of viruses and Trojan horses. Eve might design a virus that infects PGP software and sits quietly inside Alice's computer. When Alice uses her private key to decrypt a message, the virus would wake up and make a note of it. The next time that Alice connects to the Internet, the virus would surreptitiously send the private key to Eve, thereby allowing her to decipher all subsequent messages sent to Alice. One way to better connect with this excerpt is to
Answer:
Tell about an experience with a computer virus.
Explanation:
Simon Singh's "The Code Book," tells the history of how cryptography came into being and the secret messaging world of encryption. Through the detailed narration and diving into the history of encryption, the author traces the evolution of such a process and reveals how it has had a huge impact on the world's policies.
In the given excerpt, Singh gives an example of how viruses are planted and used to spy/ get access to other people's computers. But while it is possible to get the main point of the example, it would have been better if the writer includes experience with a computer virus so that readers will find it easier to connect with the given example. This will enable them to better understand the working of viruses and their effects.
Thus, the correct answer is the first option.
Answer:
b
Explanation:
Complete the body of the format_name function. This function receives the first_name and last_name parameters and then returns a properly formatted string. Specifically: If both the last_name and the first_name parameters are supplied, the function should return like so:
Answer:
Here is the Python program:
def format_name(first_name, last_name): #function definition of format_name that takes first_name and last_name as parameters
if first_name != '' and last_name != '': #checks if first_name and last_name both are not equal to " "
return ("Name: " + last_name + ", " + first_name) #returns first name and last_name in format: "Name: last_name, first_name"
elif first_name != '' or last_name != '': #checks if either of the first_name or last_name is not equal to " "
return ("Name: " + last_name + first_name) #returns first name and last_name in format: "Name: last_name" or "Name: first_name"
else: #if both names are blank
return '' #return ""
Explanation:
The working of the above function can be checked by using the following statements:
print(format_name("Ernest", "Hemingway"))
print(format_name("Voltaire", ""))
print(format_name("", "Madonna"))
print(format_name("", ""))
The program has a function format_name which takes two strings i.e. the first_name and last_name as parameters and returns the formatted string.
The first if condition checks if both the first_name and last_name are blank. For example if first_name = "Ernest" and last_name= "Hemingway" this means both the first_name and last_name are not blank or empty. So If this condition evaluates to true then the following statement is returned:
return ("Name: " + last_name + ", " + first_name)
This returns the last_name string first followed by a comma in between and then first_name string in the last. For the above example the string is printed in the following format:
Name: Hemingway, Ernest
The elif condition checks if either of the first_name or last_name is blank. For example if first_name = "Voltaire" and last_name= "" this means last_name is blank or empty. So if this condition evaluates to true then the following statement is returned:
return ("Name: " + last_name + first_name)
This returns the last_name string. For the above example the string is printed in the following format:
Name: Voltaire
IF none of the above condition is true and both the first_name and last_name are blank then the following statement is returned
return ''
This will just print and blank space in output.
The program and its output is attached.
Can someone please tell me how I can hack WiFi with a raspberry pi in Kali Linux do I need a wireless adapter for raspberry pi if so please tell me and me ASAP please thanks appreciate it
Well honestly i dont know how to. i personally don't own one but there is YT videos. Go on YT and look up network chuck. hehas what your looking for.
Which statement is true about teams?
Answer:
Which is true of jet streams
A The subtropical jet stream flows to the east while the polar jet stream flows to the west
B The subtropical jet stream lies between the westerlies and polar easterlies
C The polar jet stream is generally stronger than the subtropical jet stream
D The polar jet stream lies between the polar easterlies and trade winds
The subtropical jet stream lies between the westerlies and trade winds.
Jet stream is defined as "a narrow, variable band of very strong, predominantly westerly air currents encircling the globe several miles above the earth." Each hemisphere has 2 or 3 primary jet streams that follow their same basic courses.
Explanation:
A team is a more collaborative and joint organization of individuals that function to perform similar set of tasks. The team all members work in accords with each other and complete the tasks on time.
The team is formed by a like minded people and has all characteristics of cooperation, coordination and friendliness. Thus the option D is correct . A Teams is more productive than with fewer individuals.Learn more about the true about teams.
brainly.com/question/12078417.
The availability of the appropriate compiler guarantees that a program developed on one type of machine can be compiled on a different type of machine.A. TrueB. False
You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It appears to include all of the classification markings including portion, banner, and classification authority block. Is this information authorized for use as a source of derivative classification?
Answer:
Yes
Explanation:
A classified information is piece of information that is hidden from public eyes as it could threaten national security if exposed
A derivatively classified piece of information is a piece of information document that extracts information from a classified information source and incorporates this information into the document. These classified documents bear classification markings which are used to show that the information is classified and give instructions on handling and dissemination. A derivative classifier is one who develops classified information using authorized classified information sources
Section 1.4 of Executive Order 13526 lists categories of information eligible for classification
Could Anyone help me with these two questions?
Answer:1st is b
2nd is d
Explanation:
In 25 words or fewer, describe what Jaime could do at the guitar store to help customers satisfy their needs and wants.
Answer:
Jaime could allow the use of the guitars that are for sale within the store.
Explanation:
One of the biggest problems with these musical instrument stores is that you are not allowed to play the instruments unless you are going to buy them.
A store that allows the practice of these instruments within the establishment ensures that the customer tried to play the instrument, liked it, and decided to buy it.
It is a way to satisfy the customer.
Answer:
He could ask customers if they need help finding what they want. He can let his manager know if any product is running low.
Explanation:
legit the answer lol
50 POINTS!!!! What is HpseuHostLauncher, and can I disable it without any major impact on my laptop?
Answer:
????????
Explanation:
Carlos is using the software development life cycle to create a new app. He has finished coding and is ready to see the output it produces. Which stage of the software development life cycle is Carlos ready for next? Coding Design Maintenance Testing
Answer:
Testing
Explanation:
From the question, we understand that Carlos just finished the coding of the app.
In software development life cycle, the coding phase is where Carlos is expected to make use of his choice of programming language to design the app;
This stage is an integral part of the implementation process and according to the question, the coding has been completed;
The next phase or stage after the implementation phase is testing.
Hence, Carlos is getting ready to test the app.
Answer:
Testing I took the test I definetly testing <3
You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on hand. Another file, called music, lists the music books and scores you own. When you enter the command paste strings music, what happens
Answer is given below
Explanation:
when performing in computer and we have two files on the computer first one is string and another one is the music list so when we enter the command paste strings music than there will they display side by side on the screen.and on the left side of lists the string in screen and the right side is columns list the music book________is a nickname for social media tools which allows users to contribute content easily and to easily connect to each other. Instant Messaging Web 2.0 Cognitive surplus QR codes
Answer:
Web 2.0
Explanation:
The term that is being defined here is known as Web 2.0. As mentioned in the question this term refers to any and all social platform websites that emphasize user-generated content, ease of use, participatory culture, and interoperability for end users. Some examples of Web 2.0 features would be social media sites like FB, blogs, wikis, video sharing sites, image sharing sites, etc.
Which of the following is not a networking equipment?
Answer:
[tex]\boxed{\sf (C) \ mouse}[/tex]
Explanation:
A networking equipment can share data along a computer network. A mouse is not a networking equipment.
You work in a customer call center. Martin is on the phone asking about the difference between solid-state drives (SSDs), hybrids, and magnetic hard drives for his laptop. He is going to use for web surfing, emailing, and creating documents. Which hard drive would provide the best performance and reliability
Answer:
the hybrids will be better
Here is the first line of a method declaration with some parts missing. public ________ scoreAnswer (studentAnswer ) Fill in the blanks in the method declaration using the following information: If scoreAnswer returns nothing and studentAnswer is a Paragraph object.
Answer:
void
Explanation:
The code snippet illustrates an object oriented programming (OOP)
From the question, the method name is scoreAnswer and it is not expected to return anything.
In OOP, when a method is expected to return nothing, the method is declared as void.
So, the blank will be replaced with the keyword void and the full statement is
public void scoreAnswer(studentAnswer)
The properly marked source document states: (C) Operation Panda will take place on 29 September. The new document states: (C) On 29 September, Operation Panda will commence. What concept is used to derivatively classify the statement in the new document?
Answer:
The answer is "Contained in"
Explanation:
Its term refers to the classified information of the extraction process, even though outlined in an authorized categorization instruction origin without extra explanation or review, and incorporates these data in a new document.
In this concept, the information appears in the extracted word-for-word, its definition of 'in' will apply, or if its data has been paraphrased or restated from the current text, that's why we can say that this concept derivatively classifies the statement in new documents.
A user is unable to access websites and has reported connectivity issues with pop-ups on the screen. A technician removes malware, and then is able to ping the router and access the websites. Which of the following NEXT steps should the technician perform in troubleshooting this issue? (Choose two.)
A. Documents findings, actions, and outcomes.
B. Reboot the device to verify the fix.
C. Reconnect the device to the network.
D. Verify the settings in IPConfig.
E. Research the problem based on symptoms.
F. Run a virus scan.
Answer:
A. Document findings, actions, and outcomes.
F. Run a virus scan.
Explanation:
what is the importance of personal computers in connecting to the internet ?
^please I need an answer, PLEASE ^
Answer:
if you dont you wont be able to do school work or check your email
Explanation
Answer:
security because it very important when we use internet
What are the parts to an
email?
A)Recipient, Greeting, Body, Closing
B)Recipient, Subject, Body, Signature
C)Recipient, Subject, Greeting, Body, Closing, Signature
D)None of the above
Answer:
B) recipient subject body signature
You have an application that for legal reasons must be hosted in the United States when U.S. citizens access it. The application must be hosted in the European Union when citizens of the EU access it. For all other citizens of the world, the application must be hosted in Sydney. Which routing policy should you choose in order to achieve this
Question options:
A. Latency-based routing
B. Simple routing
C. Geolocation routing
D. Failover routing
Answer:
C. Geolocation routing
Explanation:
Geolocation routing is used in allocating resources for different traffic sources originating from different geographical locations. Consequently you are allocating a different resource to handle a different DNS query based on the location/origination of the DNS query. In the above example, you will need to for example to route all queries from any other place in the world that is not US or Europe to a load balancer for Sydney. Your application in their different locations using geolocation routing would have to be adapted and localized to the region so as to serve the audience there
Which step is common to both creating a new document and saving a document?
clicking the File tab
clicking the New tab
clicking the Save As tab
clicking the Blank document icon
Answer: clicking the File tab
Explanation: The file tab refers to a multifunctional tab in most Microsoft products such as Microsoft Word, Microsoft Excel and so on. The tab is located on the ribbon and usually the first located on the upper left corner. The tab houses the file functions. Clicking on the file tab, users can create a new document by clicking the File tab, click new, then click bank document to create a new document. Also, to save a file either using the 'save' or 'save as' command, just locate the file tab, click on it and select either the save or save as option. The save as function allows users to save a copy of a document without making changes to the already saved copy.
Answer:
clicking the File tab
Explanation:
I just took it
Different bosses have the authority to run their own departments in what department?
Answer:
Decentralized organization
Explanation:
A decentralized organization is an organization that decisions about the operation of the organizations units are made by the mid-level managers or lower-level managers as the case may be, instead from being made directly from the senior management or the company head
Fast-food franchise chain management is an example of a decentralized organization such that each outlet manages the planning income and expenditure of the unit business.
Decentralization is can be beneficial as it can lead to outstandingly broad creativity as demonstrated in Google,which is another good example of a decentralized structure of organizational management.
if you want to refine your google search by date, which option should you use?
Answer:
If you want to refine your Google search results by date, you should use Advanced search.
Explanation:
Answer:
Advanced Search.
Explanation:
Just go down to settings at the bottom of google and choose advanced search and fill in the boxes so your search comes up more specific.
What does the statement mean “To take a photograph is to participate in another’s person’s mortality, vulnerability, and mutability?
Answer:
probuly to take a photograph of ur childhood
Explanation:
idk
Answer:
To take photograph is to participate in another’s person’s mortality, vulnerability, and mutability. That means when you take a picture of someone you are participating in their lives, it may be just a small fragment of that life, but it still is a life.
Explanation:
Does anyone know how I can fix this? I don’t know what is wrong. When I click retry it restarts my laptop and returns back to this. Please help!
Answer:
Software Program Reinstallation
Use the following steps to reinstall factory installed software programs:
Click Start (), All Programs, Recovery Manager, and then Recovery Manager again.
Figure : Recovery Manager
Recovery Manager main screen
Under I need help immediately, click Software Program Reinstallation.
On the Software Program Reinstallation welcome screen, click Next.
Look in the Factory installed programs list for the software program you want to reinstall.
If your software program is listed, select the title.
If the program you want to reinstall is not listed, select The program is not in the list, and then click Next. Follow the instructions to reinstall the program.
Figure : Select program to reinstall
Software Program Reinstallation window
Click Next.
If you are not prompted to uninstall the program before reinstalling it, continue to the next step.
If you are prompted to uninstall the program before reinstalling it, follow these steps.
Click Start (), and then Control Panel.
Under Programs, Uninstall a program.
The Uninstall or change a program window opens.
Figure : Uninstall or change a program
Uninstall or change a program screen
Select the program you want to remove.
Click Uninstall or Uninstall/Change at the top of the program list.
Read and respond to any messages that appear while the software is being removed from your computer.
Once the program is uninstalled, resume the reinstallation from the Recovery Manager program.
When the reinstallation is complete, select Yes, and then Finish to restart the computer.
In a batch operating system, three jobs JOBI, JOB2, JOB3 are submitted for ex- ecution. Each job involves an I/O activity, a CPU time, and another 1/0 activity. JOB1 requires a total of 21 ms, with 3 ms CPC time. JOB2 requires 29 ms total time with 5 ms CPU time. JOB3 requires 14 ms total time with 4 is CPU time. 3.1 What will be the CPU utilisation for uniprogramming? Write down all interme diate steps. 3.2 What will be the CPU utilisation for multiprogramming? Write down all inter- mediate steps
Answer:
The answer to this question can be defined as follows:
In option 1, the answer is "18.75%".
In option 2, the answer is "33%".
Explanation:
Given:
JOB 1-Time of the CPU = 3ms, rest = 18ms, sum = 21
JOB 2-Time of the CPU = 5ms, rest = 24ms, sum = 29
JOB 3 -Time of the CPU =4ms, rest = 10ms, sum = 14
In option 1:
whenever the job has also been allocating the system, in the uni-programs system, which looks at the CPU until it is complete.
Formula:
[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]
[tex]=\frac{(3+5+4)}{(21+29+14)}[/tex]
[tex]=\frac{12}{64}\\\\= 0.1875\\\\=18.75%[/tex]
In option 2:
However, if any software is interested in other operations like I / o, it can assign to the CPU Processor to others Systems and other software may be carrying out I / o operations there while the processor is with any other application.
Formula:
[tex]\text{Utilization of CPU} =\frac{ \text{total time of CPU} }{ \text{full real time}}[/tex]
[tex]=\frac{12}{36}\\\\=\frac{1}{3}\\\\=.33\\\\= 33 \%[/tex]