Answer:
The output is:
3
7
Explanation:
Given
The code segment
Required
The output
The given code segment has 3 independent if statements; meaning that, each of the if conditions will be tested and executed accordingly
This line initializes num to 7
num=7
This checks if num is greater tha 3; If yes, "3" is printed
if num > 3:
print("3")
The above condition is true; so, "3" will be printed
This checks if num is less than 5; If yes, "5" is printed
if num < 5:
print("5")
The above condition is false; so, "5" will not be printed
This checks if num equals 5; If yes, "7" is printed
if num ==7:
print("7")
The above condition is true; so, "7" will be printed
So, the output is:
3
7
What term refers to a person using a computer to perform routine tasks other than systems administration
Answer:
end user
Explanation:
An end user refers to a person using a computer system to perform routine tasks such as listening to music, formatting a document, creating graphic designs, surfing the web, etc., rather than perform systems administration. Thus, an end user is the individual for whom a software application or computer system is created for, especially to perform basic or routine tasks.
For example, a network or system administrator is saddled with the responsibility of implementing changes on an end user's network and network devices in order to get an optimum level of performance.
You're the administrator for a large bottling company. At the end of each month, you routinely view all logs and look for discrepancies. This month, your email system error reports a large number of unsuccessful attempts to log on. Its apparent that the mail server is being targeted. Which type of attack is most likely occurring
Answer:
It seems as though it would be a DDoS attack.
Explanation:
The characteristics are as follows:
A slow down of operations and attempting to get access into said service.
the user cannot use a computer system without.................... software
Answer:
the user cannot use a computer system without hardware and software
Answer:
the user cannot use a computer system without.........hardware.....and...... software
What is the bit pattern (raw binary) of the single precision representation of the decimal number 0.125 following IEEE 754 standard
Answer:
The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:
Sign (1 bit) = 0 (a positive number)
Exponent (8 bits) = 0111 1100
Mantissa (23 bits) = 000 0000 0000 0000 0000 0000
Explanation:
1. First, convert to the binary (base 2) the integer part: 0.
Divide the number repeatedly by 2.
Keep track of each remainder.
We stop when we get a quotient that is equal to zero.
division = quotient + remainder;
0 ÷ 2 = 0 + 0;
2. Construct the base 2 representation of the integer part of the number.
Take all the remainders starting from the bottom of the list constructed above.
0(10) = 0(2)
3. Convert to the binary (base 2) the fractional part: 0.125.
Multiply it repeatedly by 2.
Keep track of each integer part of the results.
Stop when we get a fractional part that is equal to zero.
#) multiplying = integer + fractional part;
1) 0.125 × 2 = 0 + 0.25;
2) 0.25 × 2 = 0 + 0.5;
3) 0.5 × 2 = 1 + 0;
4. Construct the base 2 representation of the fractional part of the number.
Take all the integer parts of the multiplying operations, starting from the top of the constructed list above:
0.125(10) =
0.001(2)
5. Positive number before normalization:
0.125(10) =
0.001(2)
6. Normalize the binary representation of the number.
Shift the decimal mark 3 positions to the right so that only one non zero digit remains to the left of it:
0.125(10) =
0.001(2) =
0.001(2) × 20 =
1(2) × 2-3
7. Up to this moment, there are the following elements that would feed into the 32 bit single precision IEEE 754 binary floating point representation:
Sign: 0 (a positive number)
Exponent (unadjusted): -3
Mantissa (not normalized): 1
8. Adjust the exponent.
Use the 8 bit excess/bias notation:
Exponent (adjusted) =
Exponent (unadjusted) + 2(8-1) - 1 =
-3 + 2(8-1) - 1 =
(-3 + 127)(10) =
124(10)
9. Convert the adjusted exponent from the decimal (base 10) to 8 bit binary.
Use the same technique of repeatedly dividing by 2:
division = quotient + remainder;
124 ÷ 2 = 62 + 0;
62 ÷ 2 = 31 + 0;
31 ÷ 2 = 15 + 1;
15 ÷ 2 = 7 + 1;
7 ÷ 2 = 3 + 1;
3 ÷ 2 = 1 + 1;
1 ÷ 2 = 0 + 1;
10. Construct the base 2 representation of the adjusted exponent.
Take all the remainders starting from the bottom of the list constructed above:
Exponent (adjusted) =
124(10) =
0111 1100(2)
11. Normalize the mantissa.
a) Remove the leading (the leftmost) bit, since it's allways 1, and the decimal point, if the case.
b) Adjust its length to 23 bits, by adding the necessary number of zeros to the right.
Mantissa (normalized) =
1 000 0000 0000 0000 0000 0000 =
000 0000 0000 0000 0000 0000
12. The three elements that make up the number's 32 bit single precision IEEE 754 binary floating point representation:
Sign (1 bit) = 0 (a positive number)
Exponent (8 bits) = 0111 1100
Mantissa (23 bits) = 000 0000 0000 0000 0000 0000
An aviation tracking system maintains flight records for equipment and personnel. The system is a critical command and control system that must maintain a global availability rate of 99%. The entire system is on a cloud platform that guarantees a failover to multiple zones within a region. In addition to the multi-zonal cloud failover, what other solution would provide the best option to restoring data and rebuilding systems if the primary cloud service becomes unavailable?
Answer:
offline backup solution
Explanation:
In such a scenario, the best option would be an offline backup solution. This is basically a local and offline server that holds all of the flight record data that the cloud platform has. This offline backup server would be updated frequently so that the data is always up to date. These servers would be owned by the aviation company and would be a secondary solution for the company in case that the cloud platform fails or the company cannot connect to the cloud service for whatever reason. Being offline allows the company to access the database regardless of internet connectivity.
Write a letter of application to your school as a chemistry teacher
Answer:
Dear Mr./Mrs (Employer's name), I am writing this in response to the ad, which you have listed in the newspaper (mention the name here) for the post of a chemistry teacher. I believe my extensive knowledge and writing skills make me an excellent candidate for the post.
You want to use your Windows workstation to browse the websites on the internet. You use a broadband DSL connection to access the internet. Which network protocol must be installed on your workstation to do this
Answer:
IP
Explanation:
What temperature is most commonly used in autoclaves to sterilize growth media and other devices prior to experimentation
Answer:
The most effective temparature used in autoclave is 121°C
4 Two people play a counting game.
The rules of the game are as follows:
The first player starts at 1
Each player may choose one, two or three numbers on their turn and the numbers must be in ascending order
Players take it in turns to choose
The player who chooses "15" loses the game. For example, if the first player chooses three numbers (1, 2, 3) then the second player could choose one number (4), two numbers (4, 5) or three numbers (4,5,6).
The first player then takes another go.
-Write an algorithm using pseudocode that allows two players to play this game.
The algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
--Display the numbers that the player has chosen Display a suitable message to say --which player has won once the number 15 has been displayed
Answer:
algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
An algorithm using pseudocode that allows two players to play the game is:
BEGIN Player One num "1"ASCENDING order num;TURN Player One num;TURN Player Two num;INCREMENT IF there is num "15"THENPLAYER losesWhat is a Pseudocode?This refers to the use of plain language to describe the sequence of steps for solving a problem.
Hence, we can see that from the given game rules about the input that is made by a player where he starts at 1 and any player that selects 15 loses the game and there is an increment is displayed in a rough form above.
Read more about pseudocodes here:
https://brainly.com/question/24953880
#SPJ2
which is known as accurate processing of computer gigo E mail MHz bug
GIGO is the considered as the accurate processing in computers.
In the field of computer science, the word GIGO stands for " garbage in, garbage out".
It is a concept that refers that if bad input is provided to the computers, the output will also be bad and useless.
It is the inability of the program to any bad data providing incorrect results.
Thus GIGO is the most accurate processing in a computer programs.
Learn more :
https://brainly.in/question/23091232
I m a rectangle in a flow chart? What do I represent?
Answer:
It represents processing box
Write a basic notation for
[tex]a = \frac{(b + d)}{2c} [/tex]
[tex]z = \frac{x}{y + c} [/tex]
[tex] c = \frac{9c + 32}{5} [/tex]
Answer:
[tex]a = (b + c)/(2 * c)[/tex]
[tex]z = x/(y + c)[/tex]
[tex]c = (9 * c + 32)/5[/tex]
Explanation:
Required
The expression in basic
To do this, we use () to group items, / as divide and * to combine factors
So, we have:
[tex](a)\ a = \frac{(b + d)}{2c}[/tex]
In basic, it is:
[tex]a = (b + c)/(2 * c)[/tex]
[tex](b)\ z = \frac{x}{y + c}[/tex]
In basic, it is:
[tex]z = x/(y + c)[/tex]
[tex](c)\ c = \frac{9c + 32}{5}[/tex]
[tex]c = (9 * c + 32)/5[/tex]
Why is data processing done in computer?
Answer:
The Data processing concept consists of the collection and handling of data in an appropriate and usable form. Data manipulation is the automated processing in a predetermined operating sequence. Today, the processing is done automatically using computers and results are faster and more accurate.
Explanation:
Data is obtained from sources such as data lakes and data storage facilities. The data collected must be high quality and reliable.By using a CRM, such as Salesforce and Redshift, a data warehouse, the data collected are translated into mask language.The data are processed for interpretation. Machine learning algorithms are used for processing. Their procedure varies according to the processed data (connected equipment, social networks, data lakes).These data are very helpful to non-data scientists. The information is transformed into videos, graphs, images, and plain text. Company members may begin to analyze and apply this information to their projects.The final stage of processing is the use of storage in future. Effective data storage to comply with GDPR is necessary (data protection legislation).A developer designed a process in UiPath Studio that is best-suited for a simple and linear process. Which Studio workflow type was used
Question options:
State Machine
Flowchart
Sequence
Global Exception Handler
Answer:
Sequence
Explanation:
Uipath is an RPA(Robotic process automation) software that is used by IT professionals and business executives in automating routine or iterative tasks in an organization. Uipath process projects incorporate different workflow types which include :sequence, flowchart, state machine and global exception handler. The sequence workflow type is used for simple linear projects that are not very complex and occupies a single activity block.
Calcula l'energia (Kwh) consumida per una màquina de 30 CV que funciona durant 2 hores.
Resposta:
44,76 Kwh
Explicació:
1 cavall = 746 watts
Per tant, 30 cavalls es convertiran en:
30 * 746 = 22380 watts
Temps = 2 hores
La quantitat d'energia consumida s'obté mitjançant la relació:
Energia consumida = Potència * temps
Energia consumida = 22380 watts * 2 hores
Energia consumida = 44760 Wh
A quilowatts (Kwh)
44760 Kwh / 1000 = 44,76 Kwh
Communication media that use an antenna for transmitting data through air or water are called _____.
Answer:
Guided media provide a physical path along which the signals are propagated; these include twisted pair, coaxial cable and optical fiber. Unguided media employ an antenna for transmitting through air, vacuum or water. Traditionally, twisted pair has been the workhorse for communications of all sorts.
Explanation:
douc54.cs.edinboro.edu /~bennett/class/csci475/spring2002/notes/chapter4/index.html
copy and paste that it might help!
hubs hardware advantage's and disadvantages
Answer:
answer in picture
hope it's helpful
If an element is present in an array of length n, how many element visits, on average, are necessary to find it using a linear search
Answer:
n/2
Explanation:
A linear search starts at the beggining of the array at index 0 and searches for the specific element by analyzing one element at a time. Meaning that if it does not exist in index 0 it moves to index 1 and if its not there it moves to index 2 and so on. If the element is not present in the array it finishes the array and ends, otherwise if it finds the element the search automatically ends. This means that on average the search would end early half of the time. This would mean that on average a total of n/2 elements are visited using a linear search.
You scan the network and find a counterfeit access point that is using the same SSID as an already existing access point. What is this an example of?
Answer:
base station is the answer
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Answer:
" CRL (certificate revocation list)" is the appropriate answer.
Explanation:
A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.MyProgramming Lab
It needs to be as simple as possible. Each question is slightly different.
1. An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers is the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.
Given the positive integer distance and the non-negative integer n, create a list consisting of the arithmetic progression between (and including) 1 and n with a distance of distance. For example, if distance is 2 and n is 8, the list would be [1, 3, 5, 7].
Associate the list with the variable arith_prog.
2.
An arithmetic progression is a sequence of numbers in which the distance (or difference) between any two successive numbers if the same. This in the sequence 1, 3, 5, 7, ..., the distance is 2 while in the sequence 6, 12, 18, 24, ..., the distance is 6.
Given the positive integer distance and the integers m and n, create a list consisting of the arithmetic progression between (and including) m and n with a distance of distance (if m > n, the list should be empty.) For example, if distance is 2, m is 5, and n is 12, the list would be [5, 7, 9, 11].
Associate the list with the variable arith_prog.
3.
A geometric progression is a sequence of numbers in which each value (after the first) is obtained by multiplying the previous value in the sequence by a fixed value called the common ratio. For example the sequence 3, 12, 48, 192, ... is a geometric progression in which the common ratio is 4.
Given the positive integer ratio greater than 1, and the non-negative integer n, create a list consisting of the geometric progression of numbers between (and including) 1 and n with a common ratio of ratio. For example, if ratio is 2 and n is 8, the list would be [1, 2, 4, 8].
Associate the list with the variable geom_prog.
Answer:
The program in Python is as follows:
#1
d = int(input("distance: "))
n = int(input("n: "))
arith_prog = []
for i in range(1,n+1,d):
arith_prog.append(i)
print(arith_prog)
#2
d = int(input("distance: "))
m = int(input("m: "))
n = int(input("n: "))
arith_prog = []
for i in range(m,n+1,d):
arith_prog.append(i)
print(arith_prog)
#3
r = int(input("ratio: "))
n = int(input("n: "))
geom_prog = []
m = 1
count = 0
while(m<n):
m = r**count
geom_prog.append(m)
count+=1
print(geom_prog)
Explanation:
#Program 1 begins here
This gets input for distance
d = int(input("distance: "))
This gets input for n
n = int(input("n: "))
This initializes the list, arith_prog
arith_prog = []
This iterates from 1 to n (inclusive) with an increment of d
for i in range(1,n+1,d):
This appends the elements of the progression to the list
arith_prog.append(i)
This prints the list
print(arith_prog)
#Program 2 begins here
This gets input for distance
d = int(input("distance: "))
This gets input for m
m = int(input("m: "))
This gets input for n
n = int(input("n: "))
This initializes the list, arith_prog
arith_prog = []
This iterates from m to n (inclusive) with an increment of d
for i in range(m,n+1,d):
This appends the elements of the progression to the list
arith_prog.append(i)
This prints the list
print(arith_prog)
#Program 3 begins here
This gets input for ratio
r = int(input("ratio: "))
This gets input for n
n = int(input("n: "))
This initializes the list, geom_prog
geom_prog = []
This initializes the element of the progression to 1
m = 1
Initialize count to 0
count = 0
This is repeated until the progression element is n
while(m<n):
Generate progression element
m = r**count
Append element to list
geom_prog.append(m)
Increase count by 1
count+=1
This prints the list
print(geom_prog)
You have a Windows 2016 Server with DFS. During normal operation, you recently experience an Event 4208. What should you do first to address this issue
Answer: Increase your staging folder quota by 20%
Explanation:
The Distributed File System (DFS) allows the grouping of shares on multiple servers. Also, it allows the linking of shares into a single hierarchical namespace.
Since there's a Windows 2016 Server with DFS and during normal operation, an Event 4208 was experienced, the best thing to do in order to address the issue is to increase the staging folder quota by 20%.
what is the use of a piano
1. digital ink pen
a miniature electronic circuit or device that electricity flows through. The circuit is made of silicon. It may also be called a chip
2. Electronic Paper Display
a pocket-sized card that can store data and process information
3. integrated circuit
an automatic identification device that lets you store and retrieve information
4. radio transceiver
a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor
5. RFID
display or sign with the ability to update the information electronically
6. smart card
an electronic device that uses an antenna to read and send information by way of a radio signal
Answer:
1. Integrated circuit.
2. Smart card.
3. RFID.
4. Digital ink pen.
5. Electronic Paper Display.
6. Radio transceiver
Explanation:
1. Integrated circuit: a miniature electronic circuit or device that electricity flows through. An integrated circuit (IC) is typically of a semiconductor element such as silicon. Also, it may be referred to as a chip.
2. Smart card: a pocket-sized card that can store data and process information. It's usually used in cable television decoder, transportation terminals, e-commerce services, etc.
3. RFID: an automatic identification device that lets you store and retrieve information. RFID is an acronym for radio frequency identification.
4. Digital ink pen: a device that captures handwritten notes and downloads it to the computer so that the text may be displayed on the monitor.
5. Electronic Paper Display: display or sign with the ability to update the information electronically.
6. Radio transceiver: an electronic device that uses an antenna to read and send information by way of a radio signal in the field of telecommunications.
You have just assembled your first PC. You hit the power button and the computer turns on. As the computer runs through POST, it starts beeping multiple times and you don't see anything displayed on the LCD. You notice there are no activity lights flashing for the HDD. However, when you check the inside of the computer, you can hear the drive spinning up. What is the NEXT thing you are going to check in order to get the PC functioning
Answer:
Explanation:
If the HDD is spinning, this means that the power cable is correctly connected and that the drive is receiving power and powering on. However, this does not mean that the HDD is functioning correctly and reading the information. Therefore, the next logical step would be to check the SATA cable that connects the drive to the motherboard. The cable may be broken or maybe the SATA slot on the motherboard. Switch out the cables and plug it into another slot. If this does not work, then it may be that the HDD is broken. Multiple Beeps can also mean that the RAM or CPU is not plugged in correctly or broken.
The logical structure in which one instruction occurs after another with no branching is a ____________.
Answer:
sequence
Explanation:
The logical structure in which one instruction occurs after another with no branching is a sequence.
List three ways of breaking a copyright law with the illegal copy of software.
Answer:
Using itSelling it Giving it to someone.Explanation:
Copyright law protects the unauthorized access to, reproduction and distribution of copyrighted material. The permission of the copyright holders is needed if any of these are to be done.
If copyrighted material is used without permission such as using software without buying it, that is illegal. If that software is sold or given to someone else, that is also illegal because it can only be distributed or redistributed by the copyright owners or people they have given access to.
en que consiste excel
Answer:
Microsoft Excel es un programa para calcular y simplificar las tareas de administración de datos que forma parte del paquete Microsoft Office de Microsoft Corporation. Microsoft Excel tiene funciones básicas que se pueden usar para trabajar con hojas de cálculo, usando una cuadrícula que consta de celdas. Las funciones también están disponibles para mostrar gráficos y datos visuales similares.
La historia de los productos tecnologicos
porfa
Answer:
La tecnología es el conocimiento y el uso de herramientas, oficios, sistemas o métodos organizativos. La palabra tecnología también se usa como un término para el conocimiento técnico que existe en una sociedad.
La demarcación entre tecnología y ciencia no es del todo fácil de hacer. Muchos programas de ingeniería tienen un gran elemento de ciencias y matemáticas, y muchas universidades técnicas realizan investigaciones exhaustivas en materias puramente científicas. La mayor parte de la ciencia aplicada generalmente se puede incluir en la tecnología. Sin embargo, una diferencia fundamental importante es que la tecnología tiene como objetivo "ser útil" en lugar de, como la ciencia en su forma ideal, comprender el mundo que nos rodea por sí mismo. El hecho de que comprender la realidad que nos rodea (sobre todo en forma de leyes y principios universales) sea muy útil para fines técnicos, explica por qué la ciencia y la tecnología tienen grandes similitudes. Al mismo tiempo, existen áreas de conocimiento e investigación en tecnología e ingeniería donde las propias ciencias naturales puras han hecho contribuciones muy limitadas, como la tecnología de producción, la tecnología de la construcción, la ingeniería de sistemas y la informática. En estas y otras áreas de la tecnología, por otro lado, puede haber depósitos de matemáticas, economía, organización y diseño.
who invented pascaline and when?
Pascaline, also known as Pascal's calculator or arithmetic machine, was invented by [tex]\sf\purple{Blaise\: Pascal}[/tex] between [tex]\sf\red{1642\: and\: 1644}[/tex].
[tex]\bold{ \green{ \star{ \orange{Mystique35}}}}⋆[/tex]