Answer:
The answer to this question is given below in the explanation section.
Explanation:
The for-loop given in the question is:
for ( j = 0; j < 10; j++ )
{
appendItem (myList, aNumber); //this loop append a number to a list myList
}
This loop starts from J variable's value zero and when J's value is less than 10, the loop iterate through its body until J's value becomes greater or equal to 10. As J's value exceed nine, the loop will get terminated.
So this loop repeats 10 times its loop body, at the 11th time, the condition becomes false and the loop will get terminated.
HELP URGENTLY!!!!!
Elly supervises an eye doctors office. The office recently received new equipment. To keep that equipment working accurately and dependably, she should:
(Select all that apply.)
Copy the users manual and distribute to all the employees
Identify individuals to complete the tasks
Create a log to document maintenance
Set up auto reminders
Read the manual
List the maintenance tasks
Establish the frequency of the maintenance tasks
Update the software in the office
Note that where Elly supervises an eye doctor's office, and the office recently received new equipment, to keep that equipment working accurately and dependably, she should:
Copy the users manual and distribute to all the employeesCreate a log to document maintenanceSet up auto remindersRead the manualList the maintenance tasksEstablish the frequency of the maintenance tasksUpdate the software in the office.What is the rationale for the above response?In order to ensure that the equipment is working properly and optimally, Elly should distribute the user manual to all employees.
In addition, she should identify individuals to complete maintenance tasks, create a log to document maintenance, set up auto reminders, read the manual, list the maintenance tasks, establish the frequency of the maintenance tasks, and update the software in the office to keep new equipment working accurately and dependably. This will ensure optimal equipment maintenance and lifetime.
Learn more about equipment maintenance:
https://brainly.com/question/21853224
#SPJ1
Which keyboard command would you use to navigate to the left adjacent cell in a worksheet?
Answer:
Either scroll on a mouse or use the left arrow key.
I don't know if this is right.
Answer:
shift+tab
Explanation:
how many total bits do you need to represent 512?
Answer:
9 bits
Explanation:
hope it helps......
Answer:
9 bits
hope it helps...
References inserted initially as footnotes can be converted to endnotes through an option in the software.
A. True
B. False
The answer is: A) True
media literacy, information literacy and technology literacy are they similar in use? elaborate
Answer: Literacy means the ability to understand about a particular skill or discipline.
Explanation:
Media literacy: This is attaining the knowledge of mass media and broadcasting industry.
Information literacy: It helps in discover of necessary information, understanding of information and application of information for various purposes.
Technology literacy: The ability or understanding to explore new technology and its application for various fields.
Media literacy, Information literacy and Technology literacy are similar because they incorporate literacy but they mean different words.
Literacy basically means the ability to understand about a particular skill or discipline.
Media literacy means the attaining the knowledge of mass media and broadcasting industry.Information literacy means the discover of information, understanding of information and application of information for various purposes.Technology literacy means the ability to explore new technology and its application for various fields.In conclusion, the Media literacy, Information literacy and Technology literacy are similar because they incorporate literacy but they mean different words.
Read more about literacy
brainly.com/question/2650555
Which actions show the characteristics of a static website? (sentences with the * before and after them are the choices)
Ben created a website. He *chose bold font for the heading* of a web page. He *used a light-colored background.* On the Contact Us page, he *inserted a form* where you could *post a query.* He also posted links to external websites on another page in the website. On clicking these links, the user would be *directed to the external website*
The action that show the characteristics of a static website is that;
He *chose bold font for the heading* of a web page. He *used a light-colored background.What are the characteristics of a static website?A Static Website is known to be a term that is also called a flat or stationary page.
This is known to be a web that is displayed in a web browser in the same way as it is stored. It is made up of web pages that has fixed content coded in HTML and saved on a web server.
Learn more about static website from
https://brainly.com/question/1538272
If a small cheap computer can do the same thing as a large expensive computer,
why do people need to have a large one?
Answer:
Large ones are for more important thing. Such as gaming and special software.
Explanation:
Hope that helps
Large systems are the ones that are for more important thing. Such as gaming and special software.
Why is the size of a computer Important?Computer scientists and users value the classification of computers based on their size. It enables us to classify the computer system according to its size and processing capacity.
For gamers who desire the greatest possible gaming experience, expensive PCs are also wonderful.
You can play the most recent games smoothly and at high settings if you have a powerful computer. A costly PC also has the benefit of lasting longer than a less expensive model.
Most computer monitors have a diagonal measurement from corner to corner that falls between 19 and 34 inches. 22 to 24" screens will be sufficient for the majority of users.
Thus, it can be beneficial to use larger computers also.
For more details regarding computers, visit:
https://brainly.com/question/21080395
#SPJ2
Where should a range name be entered? in the Home tab on the ribbon in the title box in the status bar in the title bar in the name box in the formula bar
Answer:
in the name box in the formula bar
Explanation:
edg 2020!!
Answer:
D.
Explanation:
edg 2020
Write a method that accepts two string arrays and print common values between the two arrays (Perform case sensitive search while finding common values).
Answer:
public class Main
{
public static void main(String[] args) {
String[] s1 = {"Hi", "there", ",", "this", "is", "Java!"};
String[] s2 = {".", "hi", "Java!", "this", "it"};
findCommonValues(s1, s2);
}
public static void findCommonValues(String[] s1, String[] s2){
for (String x : s1){
for (String y : s2){
if(x.equals(y))
System.out.println(x);
}
}
}
}
Explanation:
*The code is in Java.
Create a method named findCommonValues that takes two parameters, s1 and s2
Inside the method:
Create a nested for-each loop. The outer loop iterates through the s1 and inner loop iterates through the s2. Check if a value in s1, x, equals to value in s2, y, using equals() method. If such a value is found, print that value
Inside the main method:
Initialize two string arrays
Call the findCommonValues() method passing those arrays as parameters
the notes added to slides can be seen during the presentation. TRUE OR FALSE
Answer:
It might be true
Explanation:
Because there's something you press, then it will appear, if you didn't press it, it won't appear
A wireless network administrator is using 3 access points (APs) to cover an area. At some locations, all 3 APs may be in range of a single wireless device. What wireless channels should be assigned to the APs?
(Hint: Pick 3 different channels.)
a. 6
b. 7
c. 1
d. 3
e. 2
f. 4
g. 5
h. 8
i. 10
j. 9
k. 11
Answer:
A, C, and K
Explanation:
Wireless networks use access points ( APs) for wireless communication. The APs provide a collision avoidance channel for the connected devices. Devices communicating at a channel of a given frequency would experience signal interference, so all the connected APs in a wireless network is configured to operate in different channels with considerable differences in their frequencies.
what do we use HTTP and HTML for?
HTML is a Language while HTTP is a Protocol.
HTML tags are used to help render web pages. The Hypertext Mark-up Language (or HTML) is the language used to create documents for the World Wide Web.
HTTP (Hypertext Transfer Protocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. HTTP is a generic and stateless protocol which can be used for other purposes as well using extensions of its request methods, error codes, and headers. Basically, HTTP is a TCP/IP based communication protocol, that is used to deliver data (HTML files, image files, query results, etc.) on the World Wide Web.
The coding system that has just two characters is called:
a
binary
b
dual.
c
basic.
d
double.
Answer:
A. Binary
Definition:
Pertaining to a number system that has just two unique digits 0 and 1. - binary code
the quality of the interpreter that shows the ability to envision future needs and demands and create products to meet these demands
A. Industries
B. innovative
C. Strategist
D. Risk Taker
Answer: B - Innovative
Explanation:
If you want a language that is relatively easy to write and which can be tested easily as it's being developed, you would choose an interpreter program.
a) True
b) False
True
False
Answer:
true
Explanation:
because it needs a interpreter so that it could be more developed
need help asap
Which statement is true of emerging technologies?
Advancements in communication technologies played a minor part in the rise of globalization.
Developments in communication helped remote locations connect with the world.
Malicious entities can misuse emerging technologies.
There are few disadvantages to the widespread growth of the internet.
The complexity of wireless communication prohibits it from being provided in remote locations
Answer:
Advancements on communication technologies played a minor part in the rise of globalization.
Explanation:
Answer:
Developments in communication helped remote locations connect with the world.
Explanation:
I took the test, plato/edemetuimedemetuim
Write a command that will list the names of all link files in the working directory, sorted by inode number.
Answer:
The answer is "Is command".
Explanation:
This command can be used to display the directory lists via input data throughout the command-line tool. It is a standard result of this report are described, that would be redirected to the command to display the directory information in alphabetical order. This command is part of its GNU core tool package, which is required on all Linux distributions.
The concept of the value chain focus on
Answer:
The overarching goal of a value chain is to deliver the most value for the least cost in order to create a competitive advantage.
Your Welcome:)
Assume you have 100 values that are all different, and use equal width discretization with 10 bins.
a) What is the largest number of records that could appear in one bin?
b) What is the smallest number of records that could appear in one bin?
c) If you use equal height discretization with 10 bins, what is largest number of records that can appear in one bin?
d) smallest?
e) Now assume that the maximum value frequency is 20. What is the largest number of records that could appear in one bin with equal width discretization (10 bins)?
f) . What about with equal height discretization (10 bins)?
Answer:
a) 10
b) 1
C) 10
D) 1
E) 20
F) 10
Explanation:
a) The largest number of records that could appear in one bin
= 10
B) The smallest number of records that could appear in one bin
= 1
C) The largest number of records that cab appear in one bin
= 10
d) smallest number
= 1
e) With frequency = 20. the largest number of records that could appear in one bin with equal width discretization (10 bins)
= 20
f ) with equal height discretization
= 10
Your manager has tasked you with implementing security controls to mitigate IP spoofing attacks against your network. IP spoofing is a method of attack that involves sending packets to a target network while hiding the attacker's address using a false source address.
What method outlined would achieve anti-spoofing, to mitigate private IP spoofing attacks against your network?
Answer:
You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.
It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.
4. Word Separator:Write a program that accepts as input a sentence in which all of thewords are run together but the first character of each word is uppercase. Convert the sentence to a string in which the words are separated by spaces and only the first word starts with an uppercase letter. For example the string “StopAndSmellTheRoses.” would be converted to “Stop and smell the roses.”
*python coding
sent = input("")
count = 0
new_sent = ""
for i in sent:
if count == 0:
new_sent += i
count += 1
else:
if i.isupper():
new_sent += " "+i.lower()
else:
new_sent += i
print(new_sent)
The above code works if the user enters the sentence.
def func(sentence):
count = 0
new_sent = ""
for i in sentence:
if count == 0:
new_sent += i
count += 1
else:
if i.isupper():
new_sent += " " + i.lower()
else:
new_sent += i
return new_sent
print(func("StopAndSmellTheRoses."))
The above code works if the sentence is entered via a function.
Your company has hired a group of new network techs, and you've been tasked to do their training session on networking standards organizations. Write a brief essay detailing the IEEE and its various committees.
Answer:
IEEE stands for Institute of Electrical and Electronics Engineers.
Explanation:
The Institute of Electrical and Electronics Engineers or more popularly known as the IEEE is a professional body that is associated with the electrical engineering, electronics engineering and computer engineering discipline. It has its headquarters at New York city.
It is one of the the world’s largest professional technical organization that is dedicated to the advancing technology for the welfare of the society and humanity.
It has various committees and communities. These committees are expert committees and take active participation in conferences, research, authorship, etc.
There are committees such as IEEE Awards Board, IEEE Fellow Committee, IEEE Governance Committee, etc.
Write a function named minMax() that accepts three integers arguments from the keyboard and finds the smallest and largest integers. Include the function minMax() in a working program. Make sure your function is called from main().Test the function by passing various combinations of three integers to it.
Answer:
public class Main
{
public static void main(String[] args) {
minMax(1, 2, 3);
minMax(100, 25, 33);
minMax(11, 222, 37);
}
public static void minMax(int n1, int n2, int n3){
int max, min;
if(n1 >= n2 && n1 >= n3){
max = n1;
}
else if(n2 >= n1 && n2 >= n3){
max = n2;
}
else{
max = n3;
}
if(n1 <= n2 && n1 <= n3){
min = n1;
}
else if(n2 <= n1 && n2 <= n3){
min = n2;
}
else{
min = n3;
}
System.out.println("The max is " + max + "\nThe min is " + min);
}
}
Explanation:
*The code is in Java.
Create a function named minMax() that takes three integers, n1, n2 and n3
Inside the function:
Declare the min and max
Check if n1 is greater than or equal to n2 and n3. If it is set it as max. If not, check if n2 is greater than or equal to n1 and n3. If it is set it as max. Otherwise, set n3 as max
Check if n1 is smaller than or equal to n2 and n3. If it is set it as min. If not, check if n2 is smaller than or equal to n1 and n3. If it is set it as min. Otherwise, set n3 as min
Print the max and min
Inside the main:
Call the minMax() with different combinations
One lap around a standard high-school running track is exactly 0.25 miles. Write the function miles_to_laps() that takes a number of miles as an argument and returns the number of laps. Complete the program to output the number of laps. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value))
Ex: If the input is: 2.2 the output is: 8.80 Your program must define and call the following function: def miles_to_laps(user_miles)
Answer:
def miles_to_laps(user_miles):
laps = user_miles / 0.25
return laps
miles = float(input("Enter number of miles: "))
print('{:.2f}'.format(miles_to_laps(miles)))
Explanation:
Create a function named miles_to_laps that takes one parameter, user_miles
Inside the function, calculate the number of laps, divide the user_miles by 0.25 (Since it is stated that one lap is 0.25 miles). Return the laps
Ask the user to enter the number of miles
Call the function with that input and print the result in required format
briefly describe what a variable is
Answer:
In mathematics, a variable is a symbol or letter, such as "x" or "y," that represents a value. In algebraic equations, the value of one variable is often dependent on the value of another. Variables are also used in computer programming to store specific values within a program
Explanation:
Compute the weakest precondition for each of the following assignment statements and postconditions:
a = 2 * (b - 1) - 1 {a > 0}
b = (c + 10) / 3 {b > 6}
a = a + 2 * b - 1 {a > 1}
x = 2 * y + x - 1 {x > 11}
Answer:
a) b > 3/2
b) c > 8
c) b > 1 - a/2
d) y > 6 - x/2
Explanation:
a)
a = 2 × (b - 1) - 1 {a > 0}
2 × (b - 1) - 1 > 0
2b - 2 - 1 > 0
2b - 3 > 0
2b > 3
b > 3/2
b)
b = (c + 10) / 3 {b > 6}
(c + 10) / 3 > 6
multiply both side by 3
((c + 10) / 3) × 3 > 6 × 3
c + 10 > 18
c > 18 - 10
c > 8
c)
a = a + 2 × b - 1 {a > 1}
a + 2 × b - 1 > 1
a + 2b - 1 > 1
a + 2b > 1 + 1
2b > 2 - a
divide both sides by 2
2b/2 > 2/2 - a/2
b > 1 - a/2
d)
x = 2 × y + x - 1 {x > 11}
2 × y + x - 1 > 11
2y + x - 1 > 11
2y + x > 11 + 1
2y + x > 12
2y > 12 - x
divide both sides by 2
2y/2 > 12/2 - x/2
y > 6 - x/2
HELP !!!
Which of the following statements best represents the difference in printing text and images in the era of moveable type?
Text was harder to print than images because it involved moving letters around for each line of print.
Text was created by arranging letter blocks, while images were created through an engraving process.
Text was created by engraving letter blocks on metal, while images were created by burning imprints onto wood.
Text was easier to print than images because it involved the same 26 letters used over and over.
Answer:
I think the answer is: Text was created by arranging letter blocks, while images were created through an engraving process.
Explanation:
in the article it explains these were the ways text and images were printed
Answer:
e
Explanation:
Building-block elements are available in the Building Blocks grouping include which of the following? Page Parts Calendars Advertisements Business Information
Answer: Page parts , calendar and advertisements
Explanation:
(I jus Finish the assignment)
The router can deliver packets directly over interfaces 0 and 1 or it can forward packets to Routers R2, R3, or R4. Describe what the router does with a packet addressed to each of the following destinations:
a. 128.96.39.10
b. 128.96.40.12
c. 128.96.40.151
d. 192.4.153.17
e. 192.4.153.90
Answer:
Following are the solution to this question:
Explanation:
In point A:
It applies the AND operation with the subnet-mask that is
[tex]=128.96.39.00001010 \ \ AND \ \ 255.255.255.10000000 \\\\= 128.96.39.0000000 \\\\= 128.96.39.0 \\\[/tex]
This corresponds to a 128.96.39.0 subnet. This is why the router sent the packet to 0.
In point B:
It applies the AND operation with the subnet-mask that is [tex]255.255.255.128[/tex]
[tex]= 128.96.40.00001100\ AND \ 255.255.255.10000000 \\\\ = 128.96.40.0000000\\\\= 128.96.40.0[/tex]
This suits the 128.96.40.0 subnet. The router then sent R2 to the packet. The packet.
In point C:
It applies the AND operation with the subnet-mask that is [tex]255.255.255.128[/tex]
[tex]=128.96.40.10010111 \ AND \ 255.255.255.10000000 \\\\= 128.96.40.1000000\\\\= 128.96.40.128[/tex]
It applies the AND operation with the subnet-mask that is [tex]255.255.255.192[/tex]
[tex]= 128.96.40.10010111 \ AND \ 255.255.255.11000000 \\\\= 128.96.40.1000000 \\\\= 128.96.40.128\\[/tex]
All of the matches of its sublinks above.
Its default R4 router was therefore sent to the router by router.
In point D:
It applies the AND operation with the subnet-mask that is [tex]255.255.255.192[/tex]
[tex]= 192.4.153.00010001 \ AND \ 255.255.255.11000000\\\\ = 192.4.153.0000000 \\\\= 192.4.153.0 \\\\[/tex]
It matches the 192.4.153.0 subnet. It router has sent packet to R3 then.
In point E:
It applies the AND operation with the subnet-mask that is [tex]255.255.255.128[/tex]
[tex]= 192.4.153.01011010\ AND \ 255.255.255.10000000 \\\\= 192.4.153.0000000 \\\\= 192.4.153.0[/tex]
There, neither of the subnet inputs correlate with the ip address with the same subnet mask.
It applies the AND operation with the subnet-mask that is [tex]255.255.255.192[/tex]
[tex]=192.4.153.01011010\ AND \ 255.255.255.11000000 \\\\ = 192.4.153.0100000 \\\\= 192.4.153.64[/tex]
It does not correlate to the subnet entries for same subnet mask, and therefore neither of the entries matches their corresponding ip address entries.
Mask of the subnet. That packet would therefore be sent to the default R4 router by the router.
how can i fix my code so that a teepee is properly formed? here is what i currently have (my output is uploaded as an image):
public static void teepee(int a){
for(int i=a; i>0; i--){
for(int j=a; j>0; j--){
System.out.print(" ");
}
System.out.print("/");
for(int k=i; k
System.out.print(" ");
}
System.out.println("\\");
}
}