what are the physical aspect of a presentation
Answer:
1. It has a clear objective.
2. It's useful to your audience.
3. It's well-rehearsed.
4. Your presentation deck uses as little text as possible.
5. Your contact information is clearly featured.
6. It includes a call-to-action.
Explanation:
Given the following tree, use the hill climbing procedure to climb up the tree. Use your suggested solutions to problems if encountered. K is the goal state and numbers written on each node is the estimate of remaining distance to the goal.
create slider in wordpress
Answer:
Adding a WordPress Slider in Posts/Page
Open the post editor, select the location where you want to add the slider, and click on the Add Slider button next to the media uploader. You will see boxes for each slider you have created. Choose the slider you want to insert and then click Insert Slider button.
Examine the following output:
4 22 ms 21 ms 22 ms sttlwa01gr02.bb.ispxy.com [154.11.10.62]
5 39 ms 39 ms 65 ms placa01gr00.bb.ispxy.com [154.11.12.11]
6 39 ms 39 ms 39 ms Rwest.plalca01gr00.bb.ispxy.com [154.11.3.14]
7 40 ms 39 ms 46 ms svl-core-03.inet.ispxy.net [204.171.205.29]
8 75 ms 117 ms 63 ms dia-core-01.inet.ispxy.net [205.171.142.1]
Which command produced this output?
a. tracert
b. ping
c. nslookup
d. netstat
Answer:
a. tracert
Explanation:
Tracert is a computer network diagnostic demand which displays possible routes for internet protocol network. It also measures transit delays of packets across network. The given output is produced by a tracert command.
Write a program that lets the user enter the total rainfall for each of 12 months into an array of doubles. The program should calculate and display the total rainfall for the year and the average monthly rainfall. Use bubble sort and sort the months with the lowest to highest rain amounts. Use the binary search and search for a specific rain amount. If the rain amount is found, display a message showing which month had that rain amount. Input Validation: Do not accept negative numbers for monthly rainfall figures.
Answer:
Program approach:-
Using the header file.Using the standard namespace I/O.Define the main function.Check whether entered the value is negative.Find the middle position of the array.Display message if value not found.Returning the value.Explanation:
Program:-
//required headers
#include <stdio.h>
#include<iostream>
using namespace std;
//main function
int main()
{ double rain[12], temp_rain[12], sum=0, avg=0, temp;
int month=0, i, j, n=12, low=0, mid=0, high=12, x, found=0;
char month_name[][12]={"January", "February", "March", "April", "May", "June",
"July", "August", "September", "October", "November", "December"};
//store input values to arrays rain and temp_rain
while(month<n)
{ cout<<"Enter the total rainfall for month "<<month+1<<" :";
cin>>temp;
//check whether the entered value is negative
if(temp<0)
{ cout<<"Enter a non negative value"<<endl;
}
else
{ rain[month]=temp;
temp_rain[month]=temp;
//total sum is found out and stored to sum
sum+=temp;
month++;
}
}
//find average rainfall
avg=sum/n;
//display total and average rainfall for the year
cout<<"Total rainfall for the year: "<<sum<<endl;
cout<<"Average rainfall for the year: "<<avg<<endl;
//perform bubble sort on temp_rain array
for(i=0; i<n-1; i++)
{ for (j=0; j<n-i-1; j++)
{ if (temp_rain[j]>temp_rain[j+1])
{
temp=rain[j];
temp_rain[j]=temp_rain[j+1];
temp_rain[j+1]=temp;
}
}
}
//get search value and store it to x
cout<<"Enter the value to search for a specific rain amount: ";
cin>>x;
//perform binary search on temp_rain array
while (low<=high)
{
//find the middle position of the array
int mid=(low+high)/2;
//if a match is found, set found=1
if(x==temp_rain[mid])
{ found=1;
break;
}
//ignore right half if search item is less than the middle value of the array
else if(x<temp_rain[mid])
high=mid-1;
//ignore left half if search item is higher than the middle value of the array
else
low=mid+1;
}
//if a match is found, then display the month for the found value
if(found==1)
{
for(i=0; i<n; i++)
{ if(x==rain[i])
cout<<"Found matching rainfall for this month: "<<month_name[i];
}
}
//display message if value not found
else
cout<<"Value not found.";
return 0;
}
The input to the function/method consists of two arguments.
a. True
b. False
Answer:
See Explanation
Explanation:
The function is not given. So, I will provide general explanation.
A function is defined as:
return-type function-name(argument-lists)
For instance, an int function that has 1 argument is:
int Myfunc(int num)
num is the argument of the function Myfunc
So, an example of a function with two arguments is:
int Myfunc(int num, string name)
So, examine the function in the complete question; then count the number of arguments to determine if the answer is true or false.
diagram of a central processing unit
PLS PAK I ANSWER NITO KAILANGAN LANGPO
1. E-gro.up
2. Faceb.ook
3. Gm.ail
4. Go to www.gm.ail.com
5. Gm.ail
6. Go to www.faceb.ook.com
These are the answers.
Identify the hardware components in your own computer. If you don't have a computer, use a friend's, or one at work or in an NVCC lab. The following list shows the components you should identify and how to find the information on a Windows computer. Describe model computer: type (laptop, desktop, notebook, tablet, etc.) Indicate your manufacturer (HP, Apple: iPad, MacBook Air, etc., Lenovo, Dell, etc.) of the computer. Input devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Output devices (include internal and external devices) - they usually have a model name and number somewhere on the device. Storage devices (include internal and external devices, and how much data each can hold) - Open Windows Explorer and right click on a drive name to open its properties. Amount of RAM - Open System Properties in the Windows Control Panel. Type and speed of CPU - Open System Properties in the Windows Control Panel. Ports (number and type) - Look for jacks into which a connector can be plugged on the front, back and sides of the machine. Compare the jacks to pictures in your textbook.
Solution :
A friend of mine have an old version of computer PC having the following components :
Input devices
Model name of the keyboard -- PUNTA , model number -- P-KB515
Model name of the mouse -- PUNTA, model number -- P-KB515
Output devices
Speaker : COMPAQ
Monitor : ACER, Model Number --- EB192Q
Storage : 500 MB capacity hard disk
RAM : 2 GB
Processor : Intel Pentium dual E1260 at the rate 1.80 GHz
It is provided with audio jacks
While saving a document to her hard drive, Connie's computer screen suddenly changed to display an error message on a blue background. The error code indicated that there was a problem with her computer's RAM. Connie's computer is affected by a(n) __________.
Answer:
The right answer is "Hardware crash".
Explanation:
According to the runtime error message, this same RAM on your machine was problematic. This excludes file interoperability or compliance problems as well as program error possibilities.Assuming implementation performance problems exist, the timeframe that would save the information would be typically longer, but there's still a lower possibility that the adequacy and effectiveness color will become blue but instead demonstrate warning would appear.Thus the above is the right solution.
After the explosion of the Union Carbide plant the fire brigade began to spray a curtain of water in the air to knock down the cloud of gas.a. The system of water spray pipes was too high to helpb. The system of water spray pipes was too low to helpc. The system of water spray pipes broked. The system of water spray pipes did not have sufficient water supply
Answer:
d. The system of water spray pipes did not have sufficient water supply
Explanation:
The Union Carbide India Ltd. was chemical factory situated at Bhopal that produces various pesticides, batteries, plastics, welding equipment, etc. The plant in Bhopal produces pesticides. In the year 1984, on the night of 2nd December, a devastating disaster occurred on the Bhopal plant which killed millions of people due to the leakage of the poisonous, methyl isocyanate. This disaster is known as Bhopal Gas tragedy.
Soon after the gas pipe exploded, the fire brigade started spraying water into the air to [tex]\text{knock down}[/tex] the cloud of the gases in the air but there was not sufficient amount of water in the water sprays and so it was not effective.
Thus the correct answer is option (d).
what is a network computer that processes requests from a client server
Answer:
computer processing unit
computer processing unit is a network computer that processes requests from a client server.
What is a computer processing unit?The main element and "control center" of a computer is the Central Processing Unit (CPU). The CPU, sometimes known as the "central" or "main" processor, is a sophisticated collection of electronic circuitry that manages the device's software and operating system.
A central processing unit, sometimes known as a CPU, is a piece of electronic equipment that executes commands from software, enabling a computer or other device to carry out its functions.
Computers use a brain to process information, much like people do. The brain is the central processing unit for a computer (CPU). The CPU is the component that carries out all of the computer's instructions. It connects with all the other hardware parts of the computer while being on the motherboard.
Thus, computer processing unit.
For more information about computer processing unit, click here:
https://brainly.com/question/29775379
#SPJ6
Give two examples of html structure
Answer:
semantic information that tells a browser how to display a page and mark up the content within a document
pleeeese help me for these questions
1 Account
2 online
3 access
4 password
5 internet
6 email
what is the meaning of antimonographycationalis
Answer:
Although this word was made up in order to be a contender for the longest word in English, it can be broken down into smaller chunks in order to understand it.
Anti- means that you are against something; monopoly means the exclusive control over something; geographic is related to geography; and the remaining part has to do with nationalism.
So this word means something like 'a nationalistic feeling of being against geographic monopoly,' but you can see that it doesn't have much sense.
(answer copied from Kalahira just to save time)
Read integers from input and store each integer into a vector until -1 is read. Do not store -1 into the vector. Then, output all values in the vector (except the last value) with the last value in the vector subtracted from each value. Output each value on a new line. Ex: If the input is -46 66 76 9 -1, the output is:
-55
57
67
Answer:
The program in C++ is as follows:
#include <iostream>
#include <vector>
using namespace std;
int main(){
vector<int> nums;
int num;
cin>>num;
while(num != -1){
nums.push_back(num);
cin>>num; }
for (auto i = nums.begin(); i != nums.end(); ++i){
cout << *i <<endl; }
return 0;
}
Explanation:
This declares the vector
vector<int> nums;
This declares an integer variable for each input
int num;
This gets the first input
cin>>num;
This loop is repeated until user enters -1
while(num != -1){
Saves user input into the vector
nums.push_back(num);
Get another input from the user
cin>>num; }
The following iteration print the vector elements
for (auto i = nums.begin(); i != nums.end(); ++i){
cout << *i <<endl; }
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent network analyzers from being able to read data in flight. What are considered as secure network protocols?
Answer:
SSH, HTTPS and SMTP
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
Hence, SSH, HTTPS and SMTP are considered as secure network protocols.
HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).
SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.
Write a function called rotateRight that takes a String as its first argument and a positive int as its second argument and rotates the String right by the given number of characters. Any characters that get moved off the right side of the string should wrap around to the left.
Answer:
The function in Python is as follows:
def rotateRight(strng, d):
lent = len(strng)
retString = strng[lent - d : ] + strng[0 : lent - d]
return retString
Explanation:
This defines the function
def rotateRight(strng, d):
This calculates the length of the string
lent = len(strng)
This calculates the return string
retString = strng[lent - d : ] + strng[0 : lent - d]
This returns the return string
return retString
Addition:
The return string is calculated as thus:
This string is split from the index passed to the function to the last element of the string, i.e. from dth to last.
The split string is then concatenated to the beginning of the remaining string
Write a procedure named Read10 that reads exactly ten characters from standard input into an array of BYTE named myString. Use the LOOP instruction with indirect addressing, and call the ReadChar procedure from the book's link library. (ReadChar returns its value in AL.)
Answer:
Following are the solution to the given question:
Explanation:
Since a procedure has the Read10 parameter, the 10 characters from the input file are stored in the BYTE array as myString. The LOOP instruction, which includes indirect addressing and also the call to the ReadChar method, please find the attached file of the procedure:
What is the name given to software that decodes information from a digital file so that a media player can display the file? hard drive plug-in flash player MP3
Answer:
plug-in
Explanation:
A Plug-in is a software that provides additional functionalities to existing programs. The need for them stems from the fact that users might want additional features or functions that were not available in the original program. Digital audio, video, and web browsers use plug-ins to update the already existing programs or to display audio/video through a media file. Plug-ins save the users of the stress of having to wait till a new product with the functionality that they want is produced.
Answer:
B plug-in
Explanation:
Edge2022
the grade point average collected from a random sample of 150 students. assume that the population standard deviation is 0.78. find the margin of error if c = 0.98.
Answer:
[tex]E = 14.81\%[/tex]
Explanation:
Given
[tex]n = 150[/tex]
[tex]\sigma = 0.78[/tex]
[tex]c = 0.98[/tex]
Required
The margin of error (E)
This is calculated as:
[tex]E = z * \frac{\sigma}{\sqrt{n}}[/tex]
When confidence level = 0.98 i.e. 98%
The z score is: 2.326
So, we have:
[tex]E = 2.326 * \frac{0.78}{\sqrt{150}}[/tex]
[tex]E = 2.326 * \frac{0.78}{12.247}[/tex]
[tex]E = \frac{2.326 *0.78}{12.247}[/tex]
[tex]E = \frac{1.81428}{12.247}[/tex]
[tex]E = 0.1481[/tex]
Express as percentage
[tex]E = 14.81\%[/tex]
computer is an ............. machine because once a task is intitated computer proceeds on its own t ill its completion.
Answer:
I think digital,versatile
computer is an electronic digital versatile machine because once a task is initiated computer proceeds on its own till its completation.
Describe computer in your own words on three pages
no entendi me explicas porfavor para ayudarte?
Explain why it is important for you to build proficiency with Microsoft Word.
Answer:
Listing proficiency in Microsoft helps push your resume through applicant tracking systems and into human hands for review. Advanced knowledge of Microsoft Office programs can also increase your earning potential.
Microsoft's skills on your resume can help it get past applicant tracking systems and into human hands for review. Additionally, having more in-depth knowledge of Microsoft Office applications can boost your earning potential.
What is Microsoft skills?Your proficiency and expertise with the Microsoft Office family of software products are collectively referred to as Microsoft Office skills.
Although MS Office has many various programs, employers may frequently assess your proficiency with some of the most widely used ones, such as MS Excel, MS PowerPoint, and MS Word.
The most popular business productivity software globally is Microsoft Office.
Therefore, Microsoft's skills on your resume can help it get past applicant tracking systems and into human hands for review.
Learn more about Microsoft, here:
https://brainly.com/question/28887719
#SPJ2
Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. The input file contains an unsorted list of number of seasons followed by the corresponding TV show. Your program should put the contents of the input file into a dictionary where the number of seasons are the keys, and a list of TV shows are the values (since multiple shows could have the same number of seasons).
Sort the dictionary by key (least to greatest) and output the results to a file named output_keys.txt, separating multiple TV shows associated with the same key with a semicolon (;). Next, sort the dictionary by values (alphabetical order), and output the results to a file named output_titles.txt.
Ex: If the input is:
file1.txt
and the contents of file1.txt are:
20
Gunsmoke
30
The Simpsons
10
Will & Grace
14
Dallas
20
Law & Order
12
Murder, She Wrote
the file output_keys.txt should contain:
10: Will & Grace
12: Murder, She Wrote
14: Dallas
20: Gunsmoke; Law & Order
30: The Simpsons
and the file output_titles.txt should contain:
Dallas
Gunsmoke
Law & Order
Murder, She Wrote
The Simpsons
Will & Grace
Note: There is a newline at the end of each output file, and file1.txt is available to download.
currently, my code is:
def readFile(filename):
dict = {}
with open(filename, 'r') as infile:
lines = infile.readlines()
for index in range(0, len(lines) - 1, 2):
if lines[index].strip()=='':continue
count = int(lines[index].strip())
name = lines[index + 1].strip()
if count in dict.keys():
name_list = dict.get(count)
name_list.append(name)
name_list.sort()
else:
dict[count] = [name]
return dict
def output_keys(dict, filename):
with open(filename,'w+') as outfile:
for key in sorted(dict.keys()):
outfile.write('{}: {}\n'.format(key,';'.join(dict.get(key))))
print('{}: {}\n'.format(key,';'.join(dict.get(key))))
def output_titles(dict, filename):
titles = []
for title in dict.values():
titles.extend(title)
with open(filename,'w+') as outfile:
for title in sorted(titles):
outfile.write('{}\n'.format(title))
print(title)
def main():
filename = input()
dict = readFile(filename)
if dict is None:
print('Error: Invalid file name provided: {}'.format(filename))
return
output_filename_1 ='output_keys.txt'
output_filename_2 ='output_titles.txt'
output_keys(dict,output_filename_1)
print()
output_titles(dict,output_filename_2)
main()
The problem is that when I go to submit and the input changes, my output differs.
Output differs. See highlights below. Special character legend Input file2.txt Your output 7: Lux Video Theatre; Medium; Rules of Engagement 8: Barney Miller;Castle; Mama 10: Friends; Modern Family; Smallville;Will & Grace 11: Cheers;The Jeffersons 12: Murder, She Wrote;NYPD Blue 14: Bonanza;Dallas 15: ER 20: Gunsmoke; Law & Order; Law & Order: Special Victims Unit 30: The Simpsons Expected output 7: Rules of Engagement; Medium; Lux Video Theatre 8: Mama; Barney Miller; Castle 10: Will & Grace; Smallville; Modern Family; Friends 11: Cheers; The Jeffersons 12: Murder, She Wrote; NYPD Blue 14: Dallas; Bonanza 15: ER 20: Gunsmoke; Law & Order; Law & Order: Special Victims Unit 30: The Simpsons
Answer:
Explanation:
The following is written in Python. It creates the dictionary as requested and prints it out to the output file as requested using the correct format for various shows with the same number of seasons.The output can be seen in the attached picture below.
mydict = {}
with open("file1.txt", "r") as showFile:
for line in showFile:
cleanString = line.strip()
seasons = 0
try:
seasons = int(cleanString)
print(type(seasons))
except:
pass
if seasons != 0:
showName = showFile.readline()
if seasons in mydict:
mydict[seasons].append(showName.strip())
else:
mydict[seasons] = [showName.strip()]
f = open("output.txt", "a")
finalString = ''
for seasons in mydict:
finalString += str(seasons) + ": "
for show in mydict[seasons]:
finalString += show + '; '
f.write(finalString[:-2] + '\n')
finalString = ''
f.close()
An array A[0..n - 2] contains `n-1` integers from 1 to `n` in increasing order. (Thus one integer in this range is missing.) Design an algorithm in $\Theta(\log n)$ to find the missing integer. Your algorithm should be given in **pseudo code**. For example, the array `A` could be `{1, 2, 3, 4, 6, 7, 8, 9, 10}` in which `5` is missing.
Answer:
I do not understand anything
In this project you will write a set of instructions (algorithm). The two grids below have colored boxes in different
locations. You will create instructions to move the colored boxes in grid one to their final location in grid two. Use the
example to help you. The algorithm that you will write should be in everyday language
(no pseudocode or programming language). Write your instructions at the bottom of the
page.
Example: 1. Move
the orange box 2
spaces to the right.
2. Move the green
box one space
down. 3. Move the
green box two
spaces to the left.
Write your instructions. Review the rubric to check your final work.
Rules: All 6 colors (red, green, yellow, pink, blue, purple) must be move to their new location on the grid. Block spaces are
barriers. You cannot move through them or on them – you must move around them
Answer:
Explanation:
Pink: Down 5 then left 2.
Yellow: Left 3 and down 2.
Green: Right 7, down 4 and left 1.
Purple: Up 6 and left 9.
Red: Left 7, down 5 and left 1.
You can do the last one, blue :)
Answer:
Explanation:
u=up, d=down, r=right, l=left
yellow: l3d2
pink: d5l2
green: r7d4l1
purple: u6l9
red: l7d5l1
blue: r2u7l5
which one is exit controllefd loop ?
1.while loop
2. for loop
3. do loop
4. none
Answer:
2 is the ans
Explanation:
bye bye, gonna go to studyy
full form of computer
Answer:
COMPUTER: Common Operating Machine Purposely used for Technological and Educational research.
Explanation:
By the way, a computer is not an acronym and is the name of an electronic device.
A computer is a simple machine that we can program for a lot of logical and arithmetic functions, and it executes our work according to our instructions.
in simple words, a computer is an electronic device that makes our work easy, and any computer that has been programmed for some set of works, it performs that task or works quickly and correctly.
¿Cuál es la diferencia de un ciudadano digital entre la vida real y la vida en línea?