Answer:
Assuming this is in python:
def check_password(password):
correct_password = "qbasic"
if password == correct_password:
return True
else:
return False
def main():
user_input = input("Type in your password: ")
if check_password(user_input):
print("Correct!")
else:
print("Wrong, try again")
main()
Explanation:
Hope this helped :) If it wasn't suppose to be in python, tell me so I can make it in the correct programming language.
Have a good day :)
Which computer can perform the single dedicated task? a. Which commuter can perform the function of both analog and digital device
The computer can perform the single dedicated task is a Special-purpose computer.
Hybrid Computer can perform the function of both analog and digital device.What are Hybrid computers?This is known to be made up of both digital and analog computers as it is a digital segments that carry out process control through the conversion of analog signals to digital signal.
Note that The computer can perform the single dedicated task is a Special-purpose computer.
Hybrid Computer can perform the function of both analog and digital device.Learn more about computers from
https://brainly.com/question/21474169
#SPJ9
Modify the statistics program from this chapter so that client programshave more flexibility in computing the mean and/ or standard deviation.Specifically, redesign the library to have the following functions:mean(nums) Returns the mean of numbers in nums.stdDev(nums) Returns the standard deviation of nums.meanStdDev (nums) Returns both the mean and standard deviation of nums.
Answer and Explanation:
Using Javascript:
function mean(nums){
var array_numbers= new array(nums);
var meanofNums= array_numbers.reduce()/array_numbers.length;
Console.log(meanofNums);
}
Function Std(nums){
var OurArray= new Array(nums);
var meanOfnums= mean(nums);
var i;
for(i=0; i<=OurArray.length; i++){
OurArray[i]= OurArray[i]-meanOfnums*OurArray[i]-meanOfnums;
}
var al_stdOfnums= OurArray.reduce()/OurArray.length;
var stdOfnums= Math. sqrt(al_stdOfnums);
Console.log(stdOfnums);
}
function meanStdDev (nums){
mean(nums);
Std(nums);
}
/*From the code above, we have defined functions and used them in the last function definition meanStdDev (nums), making for code reusability. In defining the functions, we have followed the formulas for calculating mean and standard deviations and implemented in that order. Notice how we used a for loop in std(nums) function definition to iterate through the elements of the array nums, squaring each value and reassigning a new value for each element(using index value) in the array. We then added these values in array using reduce method, dividing by array length and square rooting the value using the math object method sqrt().*/
state 4 & circumstances under which warm
booting of a computer may be necessary
Answer:
to close an open application
On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?
Answer:
There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.
Select the item that best represents technology transfer?
Newtonian telescope
Magnetic Compass
Printing Press
Answer:
Printing Press
Explanation:
Technology transfer is the simple process of sharing or dissemination of information from person to person (or from one organisation to another)
Therefore, the item that best represents technology transfer from the given answer choices is the printing press.
This is because, the printing press helped to print paper containing information which was sent from one location to another.
Which unit of computer is used to processed data?
Please help!!!!!!
[tex]Hello[/tex] [tex]There![/tex]
[tex]AnimeVines[/tex] [tex]is[/tex] [tex]here![/tex]
Is it Central Processing Unit?
[tex]HopeThisHelps!![/tex]
[tex]AnimeVines[/tex]
Answer:
Central Processing Unit (CPU)
Explanation:
The Central Processing Unit (aka CPU), is used to process the data.
Spreadsheet allow three types of cell addressing. They include ______addresses, such as $E$1, ______addresses, such as R$3, and ______addresses, such as D4.
Answer:
The answer is below
Explanation:
Based on the Microsoft Excel Formatting style, Spreadsheet allows three types of cell addressing. They include:
1. ABSOLUTE CELL ADDRESSING addresses, such as $E$1,
2. MIXED CELL ADDRESSING addresses, such as R$3, and
3. RELATIVE CELL ADDRESSING addresses, such as D4.
what is technology in computer
Answer:
she is right or he :)
Explanation:
Answer:
well its somthing
Explanation:
Which option is used to insert a table in PowerPoint from another Office application?
In the Insert Object dialog box, choose Create from file.
In the Design tab, choose the Table Styles option.
In the Insert Table dialog box, choose Insert Table.
In the Layout tab, choose the Merge option.
Answer: In the Insert Object dialog box, choose Create from file.
Explanation:
To insert a table into PowerPoint from another Office application, go to the Insert Tab. In the Text ribbon on the far right, you will see "Object" next to Equation.
After clicking on that, select the "Create from File" option. It will allow you to browse a file you want to import from. PowerPoint will import the data from this file.
30points!!!! Plz answer quickly
Select the correct answer.
What should be the ideal position of the image in a video if it is the main feature of the video?
A. bottom
B. right
C. left
D. center
Answer:
center
Explanation:
that is the focal point
Answer:
D
Explanation:
since it's the main feature of the video it would be best to put it on the center so that all focus is on it because if you put it in the corner or another position it won't be the main feature and definitely not the center of attraction.
I hope you understand.and sorry if it's wrong
Which tab on the ribbon is used to access the global Access 2016 options?
Home
Create
Database Tools
File
Explanation:
the answer is Database Tools
explain the tearms alink and vlink
Answer:
The alink (active link) color appears while the mouse is clicking the link. The vlink (visited link) is the color of the link after the user has already visited it.
The HTML tag for the smallest heading is what
Answer:
The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.
Explanation:
Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As
Answer:
Explanation:
#include <stdio.h>
int main(void)
{
int num, rem;
printf("Enter a number: ");
scanf("%d", &num);
printf("Roman numerals: ");
while(num != 0)
{
if (num >= 1000) // 1000 - m
{
printf("m");
num -= 1000;
}
else if (num >= 900) // 900 - cm
{
printf("cm");
num -= 900;
}
else if (num >= 500) // 500 - d
{
printf("d");
num -= 500;
}
else if (num >= 400) // 400 - cd
{
printf("cd");
num -= 400;
}
else if (num >= 100) // 100 - c
{
printf("c");
num -= 100;
}
else if (num >= 90) // 90 - xc
{
printf("xc");
num -= 90;
}
else if (num >= 50) // 50 - l
{
printf("l");
num -= 50;
}
else if (num >= 40) // 40 - xl
{
printf("xl");
num -= 40;
}
else if (num >= 10) // 10 - x
{
printf("x");
num -= 10;
}
else if (num >= 9) // 9 - ix
{
printf("ix");
num -= 9;
}
else if (num >= 5) // 5 - v
{
printf("v");
num -= 5;
}
else if (num >= 4) // 4 - iv
{
printf("iv");
num -= 4;
}
else if (num >= 1) // 1 - i
{
printf("i");
num -= 1;
}
}
return 0;
}
1. Read the following scenario. What type of business letter do you think is required in this situation? (1 point)
Melissa and Melrose are both first-year students at a local community college. They both have interest in volunteering with a nonprofit organization. They decided to reach out to nonprofit organizations to ask about the steps they need to take in order to volunteer.
Answer:
It requires a formal letter.
Answer:
This would require a formal business letter, the type being a cover letter or inquiry.
Explanation: yes
The CPU is considered to be the............of a computer system
Answer:
The Central Processing Unit (CPU) is the brain or main source of the computer system.
BIOS has two jobs. One is to boot up, or start, the computer. What is the other? Maintain the computer’s software firewall. Ensure the fastest possible Internet speed. Provide the basic interface for the hardware. Perform regularly scheduled memory backups.
Answer:
Provide the basic interface for the hardware.
Explanation:
Suppose you are given a sequence that is described by a formula, starting at index n=0. If you need to change the starting index to n=1, then you just need to replace n in the formula by n+...?
Answer:
[tex]n+1[/tex]
Explanation:
Given
[tex]n = 0[/tex] --- starting index
Required
Change the starting index to [tex]n = 1[/tex]
We have:
[tex]n = 0[/tex]
To change the starting index to k, we simply rewrite as:
[tex]n+k[/tex]
In this case; k=1; so, the starting index will be: [tex]n+1[/tex]
10 ICTs that encourage reading...?
10 ICTs that encourage reading are given below:-
laptop / desktopprojectorphotocopierprinterIpadswebboardsinteractive white boardmicrophoneTablets Internet .Hope it is helpful to you
ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do
Answer:
Enable the Erase data optionDisable the simple passcode optionExplanation:
Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.
Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.
Write a Raptor program that will generate a random number between 1 and 10; do not display the randomly generated number. Let the user guess within 3 tries what the random number is. Display hints to help the user, for example "Your guess was too high!". Display appropriate messages based on each try, for example, "1 remaining try" or "You guessed correctly!"
Answer:
Using javascript, explanation with javascript comment
Explanation:
function guessNumber(){
var randomize= math.random()*10;
var roundrand= math.floor(randomize);
var getInput= prompt("guess number from 1 to 10");
var x= 3;
do(
if(getInput>roundrand){
Console.log("your guess is too high");
guessNumber();
}
if(getInput<roundrand){
Console.log("your guess is too high");
guessNumber();
}
else{
Console.log("you are correct pal!");
break;
}
)
while(x<=3)
}
/*Observe that we have used a recursive function that calls the function guessNumber again inside the function definition if the input fails the if condition and doesn't guess correctly. It checks for a correct number 3 times with the do... while loop and breaks out of the function once the user enters a correct input.*/
write chracteristics of all 5 generation of computer
Answer:
First generation — 1940–1956
-used vacuum tubes
ENIAC, UNIVAC I, IBM 650, IBM 701 etc.
mainframes taking up entire rooms
punched cards I/O
electrostatic and mercury delay line memory, beginning use of core
Second generation — 1956-1963
-used discrete transistors
IBM 7090 and 7094, UNIVAC 1107, PDP-1 and 8, etc.
first appearance of minicomputer (PDP-8)
punched cards I/O and line printers (mainframe), TTY (minicomputers)
core memory, magnetic tape for mass storage
Third generation — 1964-1971
-used integrated circuits
IBM System/360, UNIVAC 1108, PDP-8/I, PDP-11/20 and PDP-11/45, etc.
mostly same I/O and memory as second generation
Fourth generation — 1971-present
-use microprocessors
PDP-11/03 and PDP-11/34, Apple ][, IBM PC, Apple Macintosh, IBM z Series, etc.
transition from minicomputers to personal computers
video terminals used for I/O, specialty computer printers developed
fewer mainframes
semiconductor memory replaces core memory
hard drives and optical drives replace magnetic tape for mass storage, followed by solid-state drives (SSD)
Fifth generation — (current research)
-artificial intelligence and quantum computing
Answer:
The five generations of computer are characterized by electrical current flowing through the processing mechanisms listed below : The first within vacuum tubes The second within transistors The third within integrated circuits The fourth within microprocessors clips The fifth unveiled smart devices capable of artificial...
Explanation:
☆hope it is helpful to you ☆
☆MiraculousNisha^_^A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.
Answer:
prevent outsiders from using its information network.
Explanation:
The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.
Hoda needs to create a chart that is associated with an Excel spreadsheet. She needs to ensure that if the data in the spreadsheet changes, the chart in her presentation will be updated. Which option must she choose?
Embed the chart.
Link the chart.
Insert the chart as a picture.
This cannot be done.
Answer:
the awnser is B
Explanation:
Answer:
B, Link the chart.
Explanation:
Helllllllllppppppppppp
Answer:
9
Explanation:
"++" at the beginning increases your "x" by 1 before using it.
if it placed after your variable, it will increase it after your program used it.
what are binary code
Answer:
Binary code is a coding system using binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic device. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.
The most likely reason a firm would decide to establish an extranet would be the desire to Multiple Choice speed the flow of information on its private network by increasing the bandwidth. make the information on its network widely available to the general public. share information and collaborate with a select group of outside organizations or individuals. overcome the speed and capacity limitations of its external connection to the Internet by gaining access to the very-high-speed Backbone Network Service.
Answer: share information and collaborate with a select group of outside organizations or individuals.
Explanation:
When a company uses an intranet, it is for the purpose of sharing information within the company so in the same vein, an extranet is done to share information with entities outside the company be it people or organizations.
For information to be shared, the other companies and organizations need to have the means and authorization to join the extranet. Extranets are very useful as they enable collaboration across vast distances thereby increasing productivity.
The most likely reason a firm would decide to establish an extranet is B. share information and collaborate with a select group of outside organizations or individuals.
An extranet simply means a controlled private network that allows customers, vendors, partners, suppliers, etc to gain information about a company.
Extranet is vital to share information and collaborate with a select group of outside organizations or individuals. It is usually a private part of a website.
Read related link on:
https://brainly.com/question/10156285
How many characters should a strong password have? four six eight ten
Answer:
I say it have to be aleast 8 to complete a strong password
Explanation:
it's common sense
Answer:
8
Explanation:
The more the better but ten too much
Audience centered public speakers are inherently sensitive to the
Answer:
the diversity of their audiences
Explanation:
write a short note about applications of computer
Answer:
Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......