Answer:
Its A
Debug
Explanation:
I took the test
Who are the founders of Microsoft?
Answer:
BILL GATES & PAUL ALLEN
Explanation:
HOPE IT HELPS!!!!!!!!!!!!!!!!!!!!!
The website allrecipes is a clearinghouse for recipes of all kinds, with users being able to post new ones as well as try and comment on the recipes of others. Members can get personalized recommendations and find ways to use ingredients they already have on hand. The allrecipes website would be considered
Answer:
The right answer is "web community ".
Explanation:
A digital community, commonly known as a social community as well as a web community, seems to be a virtual environment where representatives predominantly communicate over the internet. They become web-based community centers for stakeholders, specialists, collaborators, and many others to resolve issues, post feedback, including communicate with someone on the goods, services, and reputation of an organization. For several internet platforms, a "gang of silly superstitions" can feel most comfortable.The game begins with the player having 20 POINTS
The player rolls 2 six sided dice and the sum of faces on the two dice are calculated. That’s called the players POINT.
If the POINT is a 7 or 11, the player wins his POINT
If the POINT is a 2, 3, or 12, the player loses his POINT
If the POINT is anything else, then the game continues by the player rolling the two dice again and again recording and checking the sum until
The player makes his point (The sum of his dice roll equals his POINT value) and then he wins his POINT
The player rolls a 7 and then he loses his POINT.
The player is considered a winner if he can acquire 60 POINTS and is considered a loser when he runs out POINTS
After the program has finished, display the total number of rolls of the dice that were made in the entire game.
In need for python file grade 11 work
Answer:
Following are the code to this question:
import random#import package for using random method
def rolling_dice(): #defining method rolling_dice that uses a random number to calculate and add value in dice1 and dice2 variable
dice1 = random.randint(1,6)
dice2 = random.randint(1,6)
return dice1 + dice2
def rolling(): # defining method rolling
n_roll = 0 # defining num variable that initial value that is 0.
p = 20 # defining variable p for looping, that points in between 1 and 59
while p > 0 and p < 60: # defining loop that counts value dice value two times
d = rolling_dice()#defining d variable that hold method value
n_roll+= 1 #defining n_roll that increment n_roll value by 1
if d == 7 or d == 11:# defining if block that uses the d variable that checks either 7 or 11, player won d in p variable
p+= d # use p variable that adds d variable
elif d == 2 or d == 3 or d == 12:#defining elif block to that checks d variable by using or operator
p-= d#defining d variable that decreases d variable variable
else: # defining else block
p1 = d # using p1 variable that store d value
while True:# defining loop that calculates values
d = rolling_dice()#defining d variable that holds method values
n_roll += 1 #increment the n_roll value by 1
if d == 7:#defining if block that checks d value equal to 7
p -= p1#subtract the value of p1 in p variable
break # exit loop
elif d == p:#defining elif block to check d value is equal to p
p += p1#adds the value of p1 in p variable
break#using break keyword
if p<= 0:#defining if block that checks p-value is less then equal to 0
print('Player lost')#using print method
elif p>= 60:#defining else block that checks p-value is greater than equal to 60
print('Player won')#using print method to print the value
print('number of dice rolls:', n_roll)#use print method to print n_rolls value
rolling()
Output:
Player lost
number of dice rolls: 38
Explanation:
In the above-given python code, a method "rolling_dice" is declared, inside the method two-variable "dice1 and dice2" is declared, that uses the random method to calculate the value in both variable and use the return keyword to add both values.
In the next step, another method the "rolling" is declared, inside the method "n_roll and p" is declared that assigns the values and use the two while loop, inside the loop if block is defined that calculates the values. In the next step, a condition block is used that stores value in the p variable and use the print method to print the "n_roll" value.In python,_______ are used to define the conditions necessary for a while loop to run.
Answer:
Relational Operators
Explanation:
We can make a while loop run only when some variable or whatever is relative to something else.
The valid operators are:
<, >, =, <=, >=, and =!
Hope this helped!
Answer:
sorry not sure
Explanation:
Difference between switch case and if else statement.
Answer:
SWITCH CASE:☆ STATEMENT WILL BE EXECUTED IS DECIDED BY USER.
☆ SWITCH STATEMENT EVALUATES ONLY CHARACTER 《OR 》INTEGER VALUE.
☆ IT USING SINGLE EXPRESSION FOR MULTIPLE CHOICES.
IF - ELSE STATEMENT.☆ STATEMENT WILL BE EXECUTED DEPEND UPON THE OUTPUT OF THE EXPRESSION INSIDE.
☆ IF THE STATEMENT EVALUATES INTEGER, CHARACTER, POINTER《 OR 》FLOATING- POINT TYPE 《 OR 》BOOLEAN TYPE.
☆ IF USING MULTIPLE STATEMENT FOR MULTIPLE CHOICES.
HOPE IT HELP....
You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?
a. motherboard
b. CPU
c. graphics card
d. sound card
Answer:
all options
a, b and c the most important
Explanation:
When developing a new software package, logically, the software must be designed before the code is written, and the code must be written before it is tested. These activities are dependent on each other by _________ constraints.
Answer: Technical
Explanation: When making decisions, we may have to follow a certain pattern or order due to restrictions brought about by circumstances rules or conditions. These restrictions or limitations are regarded to as constraints. Technicality may be explained as the knowledge, expertise or initiative required for an operation, production or design. Therfore, we may view technical constraint as limitations or restrictions brought about by the technical guidelines or expertise required for a certain products. From a technical perspective, before a software package can be built, the engineer must know why and what he wants the software to be capable of doing, then he writes the code then tests the code. It is a sequence, a test cannot be performed without a written code and code cannot be written without a planned design.
Payroll deductions are the same for all employees. True False
Answer:
The answer is "False".
Explanation:
The Payroll deductions are the amount of each pay period, that is paid out of the paycheck of the employee. It is also considered as the money, which is deducted from its employees' paychecks so, if paid by the employers.
All staff members are not identical. Workers' paychecks determine the amount individuals receive during each pay cycle. It also is referred to it as payroll retainers.
what is the importance of personal computers in connecting to the internet ?
^please I need an answer, PLEASE ^
Answer:
if you dont you wont be able to do school work or check your email
Explanation
Answer:
security because it very important when we use internet
When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O
Answer:
The answer is "Option d".
Explanation:
In the question, the numbering of the choices is missing so, in the attached the file defines it numbering after that we provide its solution:
In the question the "option d" is correct, because when we call the function "stop", it ends the store space assigned to the local variables and "called" function parameters, since the variables are no longer used, so the memory is released and once the process is called, the memory is reassigned and then once again assigned when the function ends.
You work in a customer call center. Martin is on the phone asking about the difference between solid-state drives (SSDs), hybrids, and magnetic hard drives for his laptop. He is going to use for web surfing, emailing, and creating documents. Which hard drive would provide the best performance and reliability
Answer:
the hybrids will be better
Yara needs to provide step-by-step instructions to her staff on how to use a new system for
conducting performance reviews. What is the best tool for communicating this information?
A) Spreadsheet
B) Email
C) Direct messaging
D) Slides
Answer:
D) Slides
Explanation:
A slide is exactly one page of presentation commonly used in PowerPoint. It is usually shown via a series of image slides on a projected screen.
This is the best tool Yara needs to provide step-by-step instructions to her staff on how to use a new system for conducting performance reviews.
Slides would be very helpful as they would show the steps one at a time to the members of Yara's staff so they can learn better and faster.
can anyone please help me with this
Answer:
This should do it. I assume the alignment of the numbers is not important?
<!DOCTYPE html>
<html>
<head>
<style>
table {
border-collapse: collapse;
font: 15px Verdana;
font-weight: bold;
}
table, td {
border: 1px solid black;
}
td {
width: 80px;
height: 80px;
text-align: center;
}
</style>
</head>
<body>
<table>
<tr>
<td>1</td>
<td>2</td>
<td>3</td>
<td>4</td>
</tr>
<tr>
<td colspan="2">5</td>
<td>6</td>
<td rowspan="2">7</td>
</tr>
<tr>
<td>8</td>
<td>9</td>
<td>10</td>
</tr>
</table>
</body>
</html>
A system has defined specifications that describe how signals are sent over connections. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model provides this function
Answer:
"Transport" is the correct answer.
Explanation:
Two platforms resemble the transport layer: TCP, as well as UDP. This same different network IP protocol continues to provide a sequence number to the target server from some kind of destination node. That whenever a server user requests to another server, that indicates the enslaved person delivers a response to a network interface.So that the above would be the correct approach.
You are generating a derivatively classified piece of information and are looking for information in a classified database. While you are searching, you find a piece of information that is extremely helpful. It appears to include all of the classification markings including portion, banner, and classification authority block. Is this information authorized for use as a source of derivative classification?
Answer:
Yes
Explanation:
A classified information is piece of information that is hidden from public eyes as it could threaten national security if exposed
A derivatively classified piece of information is a piece of information document that extracts information from a classified information source and incorporates this information into the document. These classified documents bear classification markings which are used to show that the information is classified and give instructions on handling and dissemination. A derivative classifier is one who develops classified information using authorized classified information sources
Section 1.4 of Executive Order 13526 lists categories of information eligible for classification
Your company has assigned you to revise 22 scripts. Since you use the vi editor, how can you set it to automatically display lines as numbered so it is easier for you to work on these revisions
Answer:
To enable VI editor automatically display lines as numbered, the following steps must be taken:
Step 1: Press the Escape key to exit the insert or append mode.
Step 2. Press the colon key to trigger the cursor. The cursor will appear at the lower-left position of the screen next to a : prompt.
The Next step is to type the following command: set no number hit the enter button to execute the command. This will trigger a column of sequential line numbers will appear at the left side of the display. Each line number references the text located directly to the right of it.
Step 3: To enable this to happen automatically, the appropriate set statement as a line in must be inserted a file in your home directory named .exrc
Cheers!
You are replacing the toner cartridge for an old laser printer. You are concerned that several internal components are reaching their maximum age based on the printer's page count, and you need to replace the parts. However, you also know that certain components are included with the toner cartridge. You do not want to replace any components that are included in the toner cartridge. Which components are normally included in the cartridge
Answer:
The answer is "It is the photosensitive drum, that is electrostatically charged by the toner".
Explanation:
The laser printer uses the drum, which is also called a selenium-sensitive metal roller bearing. Its electrical circuit, which is mostly on the container, has been placed mostly on the printing business but instead, with exception of text a laser scans the ride cymbal 's surface.
In traditional printers, its electromagnetic loading wheel placed in addition to a drum.It rotates a picture-sensitive rotating disc, which would carry an electrical force on its substrate and while in the dark.how can development in ICT be utilized to speed up the development and integration efforts
Answer:
Explanation:
1. Sustainability and scale
2. Lack of knowledge
3. Pace of change
4. Funding
5. Changing roles and norms
You play guitar and keep two files on your computer. One file, called strings, lists the different brands of strings you keep on hand. Another file, called music, lists the music books and scores you own. When you enter the command paste strings music, what happens
Answer is given below
Explanation:
when performing in computer and we have two files on the computer first one is string and another one is the music list so when we enter the command paste strings music than there will they display side by side on the screen.and on the left side of lists the string in screen and the right side is columns list the music bookSelect the correct answer. In which area is composing for games similar to composing for movies?
A. royalties earned
B. success of song-based soundtracks
C. usage of audio software for mixing and editing
D. spotting sessions
Answer:
c
Explanation:
cuz im jus right
How do I make my mobile number appears switched off to a specific number not with truecaller app...(vivo user)
Answer:
Hello, there is no way you can make your mobile number appear switched off to a particular number unless you really switch it off.
However, you can set your phone to "Call Forwarding" on your Android device. What it would do is that when the person calls your number, he gets the message that you are unreachable.
Explanation:
Here's how to set Call Forwarding on your android
Open your phone dialerGo to your Phone Settings Click on Call SettingsSelect Call Forwarding (in some Androids, you'll have to select 'Calling Accounts' first)Select 'Always Forward', 'When Busy', 'When Unanswered' or 'When Unreachable'After selecting your preferred option, you can set the forwarding numberEnable the settings or click 'Ok'client, Warren, reports CMOS mismatch errors at startup. Further conversation with Warren reveals that he had forgotten the startup password he assigned in CMOS, and he had to clear all CMOS settings for his computer to complete a successful startup. Although he can now start his computer, he continues to observe CMOS errors each time he starts the computer. He replaced the CMOS battery, but the problem continues. Which component should you investigate first to resolve the problem
Answer:
The answer is "The system board jumper settings "
Explanation:
It must first look only at jumpers configurations of its computer motherboard, especially that runner used it to clear the CMOS configuration.
This Jumper is a couple of connecting points positioned also on computer CPU socket or connector card, electric contacts. It placed to jump on the pads, which completes a contact, once they set a jumper. It acts as a switch if an electrical grid is closed or opened.ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the new file name you used was the same as the name you used for the report, and now your report is gone. What should you do next time to prevent this from happening
Answer:
The answer is "Set -o noclobber command before starting."
Explanation:
Whenever this prevent is happening we set the -o noclobber command, this command( -o noclobber ) is used to prevents its > driver to overwrite system files. Or whenever the user may want to violate their file in certain cases. For this case, users can use > instead of just turn -o noclobber off! Push the formal file.
Which statement is true about teams?
Answer:
Which is true of jet streams
A The subtropical jet stream flows to the east while the polar jet stream flows to the west
B The subtropical jet stream lies between the westerlies and polar easterlies
C The polar jet stream is generally stronger than the subtropical jet stream
D The polar jet stream lies between the polar easterlies and trade winds
The subtropical jet stream lies between the westerlies and trade winds.
Jet stream is defined as "a narrow, variable band of very strong, predominantly westerly air currents encircling the globe several miles above the earth." Each hemisphere has 2 or 3 primary jet streams that follow their same basic courses.
Explanation:
A team is a more collaborative and joint organization of individuals that function to perform similar set of tasks. The team all members work in accords with each other and complete the tasks on time.
The team is formed by a like minded people and has all characteristics of cooperation, coordination and friendliness. Thus the option D is correct . A Teams is more productive than with fewer individuals.Learn more about the true about teams.
brainly.com/question/12078417.
state the function of font group in the home tab
Explanation:
This group provides access to all the Character Formatting commands.
You have a scenario where you need to disable the guest network on your wireless router. You try to log in, but your password does not work. After several attempts, you realize that you forgot your password. What can you do?
Answer:
Reset the router by holding down the reset button for 30 seconds. The reset button can be located in the back or bottom area of the router. The function of the reset button is to turn restore the wireless router to default factory setting such that customized settings including the DNS, the static IP address setup, stored personal passwords DHCP parameter settings port forwarding and routing settings are erased.
Explanation:
Design a webpage on Artificial Intelligence/augmented reality
Answer: is there even an answeR for this? Anyway plz do my question. If you are looking for web page options thou I would offer a Alexa vs VR
Explanation:
An IP subnetting design requires 200 subnets and 120 hosts/subnet for the largest subnets, and requires that a single mask be used throughout the one private IP network that will be used. The design also requires planning for 20 percent growth in the number of subnets and number of hosts/subnet in the largest subnet. Which of the following answers lists a private IP network and mask that, if chosen, would meet the requirements?a. 10.0.0.0/25b. 10.0.0.0/22c. 172.16.0.0/23d. 192.168.7.0/24
Answer:
b. 10.0.0.0/22
Explanation:
Variable length subnet masking is a concept in networking that helps minimize wasting of Ipv4 ( IP version 4) network addressing. It takes a networking address and splits it to variable length.
The question above requires 120 hosts and a future host update of 20%, which is 144 hosts and a subnet of the same address of 200 to 240 in update. The host octet of the network address is totally used, which gives 254 hosts, that is extract 110 hosts. This can be further subnetted.
The two bits from the third octet is used for subnetting to give over 240 subnet mask.
Could Anyone help me with these two questions?
Answer:1st is b
2nd is d
Explanation:
What are the Typical application
of mini computer
Answer:
calls, messages, photos, emails
Explanation:
as in mobile phones
Answer:Minicomputers are used for scientific and engineering computations, business-transaction processing, file handling, and database management, and are often now referred to as small or midsize servers.
Explanation: