Write a Python function that takes as input a list, A, and returns two lists L and G. L constains all numbers in A, which are not A[0] and are less than or equal to A[0]. G contains all numbers in A, which are not A[0], and are greater than A[0].
Answer:
In Python:
def split(A):
L=[]; G=[]
for i in range(1,len(A)):
if (A[i] != A[0] and A[i] < A[0]):
L.append(A[i])
if (A[i] != A[0] and A[i] > A[0]):
G.append(A[i])
return L, G
Explanation:
This defines the function
def split(A):
This initializes the L and G lists
L=[]; G=[]
This iterates through the original list A
for i in range(1,len(A)):
This populates list L using the stated condition
if (A[i] != A[0] and A[i] < A[0]):
L.append(A[i])
This populates list G using the stated condition
if (A[i] != A[0] and A[i] > A[0]):
G.append(A[i])
This returns the two lists L and G
return L, G
Your manager asks you to get details on a computer crash. What Windows Administration Tool could you use?
A. System Information
B. Performance Monitor
C. Windows Memory Diagnostic
D. Event Viewer
E. Log Viewer
The wrong choices can be defined as follows:
In option a, it is wrong because the data warehouse transforms data into information that may be used by an organization's decision-making process.In option b, it is wrong because by using Metrics Collector Groups and logging the data, it was able to display real-time market data as well as collect and store data.In option d, it is wrong because this is a tool used in Windows, which displays detailed information about major events that have taken place on your machine.In option e, it is wrong because messages and trace logs could be viewed and sorted using the Log Viewer.Learn more:
Memory Diagnostic: https://brainly.com/question/13606234
Microsoft Security Essentials and Microsoft Forefront are: anti-malware software programs that can be used to harden workstation computers. port-scanning software utilities that scan for open ports on servers. software programs designed to remove or disable unnecessary user accounts. operating system administration software programs that create and maintain baselines.
Answer:
anti-malware software programs that can be used to harden workstation computers
Explanation:
Microsoft Security Essentials can be regarded as antivirus software which gives protection to our computers used in home or for business against types of malicious software. These malicious software could be
✓trojan horses.
✓ computer viruses
✓spyware
✓rootkits, trojan horses.
Microsoft Forefront can be regarded as
security software for business roduced
by Microsoft Corporation. It was
designed to offer protection to computer networks as well as network servers and individual devices. It should be noted that Microsoft Security Essentials and Microsoft Forefront are anti-malware software programs that can be used to harden workstation computers
Is this correct? I say its B, but my friend says its D.
Does anyone have the answers to edhesive 4.2 lesson practice I’ve been stuck on it for like 3 months
Answer:
1. 5, 10
2. 5, 7, 9, 11
3. 21
4. 10
Explanation:
"Wake up to reality! Nothing ever goes as planned in this world. The longer you live, the more you realize that in this reality only pain, suffering and futility exist.
Where is this quote from
Answer:
Naruto Shippuden and from madara uchiha
Explanation:
Answer:
Madara to Obito in Naruto Shippuden after Obito regains conscious from passing out under the rock from the third graet ninja war
Explanation:
⚠️⚠️⚠️⚠️⚠️⚠️Help! What is not an advantage of using virtual machines?
You can run multiple operating systems on one physical machine.
It doesn’t take up any storage space on the physical machine.
You can save the entire state of a VM to your files.
Provides fault and security isolation for the computer’s hardware
Answer:
It doesn’t take up any storage space on the physical machine.
Explanation:
The virtual machine does take up some storage space on the physical machine.
How are radio waves used on Earth?
Select ALL that apply
a
Traditional Radio Wave
b
Wireless Internet
c
Cell Phones
d
Light House
Answer:
A,B,C are the answers it cant be light house because it uses stored electricity which projects light energy
NO LINKS
Do you need to pay monthly to stream on Twitch?
Characteristics of RAM
Answer:
Short Data lifetime, Less Expensive, Needs to be refreshed often, Smaller in size, etc. tell me if you need more.
Q17. The most commonly used storage device is....
A. Steel
B. Optical
C. Magnetic
D. Flash
Q18. A DVD is an example of a (n).....
A. Hard Disk
B. Optical Disk
C. Output Device
D. Solid-State Storage Device
Answer:
Q17. Ans: Magnetic
Q18. Ans: Optical Disk
Explanation:
magnetic storage devices, such as hard disk drives. optical storage devices, such as CD, DVD and Blu-ray discs. solid state storage devices, such as solid state drives and USB memory sticks.
The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format
Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorillas. What feedback can Mattias give to improve his friend's presentation?
a I like your title, but did you not think to add pictures of gorillas?
b It's ok, but it would be better if I just added pictures to your presentation.
c Really great information, but I think adding a picture of a gorilla would be great.
d You're missing a gorilla picture. Add one.
Answer:
c
Explanation:
Answer:B
Really great information, but I think adding a picture of a gorilla would be great.
Explanation:
Mattias's friend asked him to critique his presentation about gorillas. Mattias noticed that there weren't any images of gorillas. What feedback can Mattias give to improve his friend's presentation?
Group of answer choices
A)You're missing a gorilla picture. Add one.
B)Really great information, but I think adding a picture of a gorilla would be great.
C)I like your title, but did you not think to add pictures of gorillas?
D)It's ok, but it would be better if I just added pictures to your presentation.
PLS HELP WILL MARK BRAINLINESS AND 30 POINTS
In your own words in at least two paragraphs, explain why it is important, when developing a website, to create a sitemap and wireframe. Explain which process seems most important to you and why you feel most drawn to that process.
(i.e. paragraph one is why is it important and paragraph two is which process felt most important to you and why)
When creating a website, it is important to create a sitemap so that a search engine can find, crawl and index all of your website's content. a sitemap makes site creation much more efficient and simple. A sitemap also helps site developers (assuming you have any) understand the layout of your website, so that they can design according to your needs.
A wireframe is another important step in the web design process. Creating a website is like building a house. To build the house, you first need a foundation on which to build it upon. Without that foundation, the house will collapse. The same goes for a website. If you create a wireframe as a rough draft of your website before going through and adding final touches, the entire design process will become much easier. If you do not first create a wireframe, the design process will be considerably more difficult, and you are more likely to encounter problems later on.
To me, the wireframe is the most important due to the fact that is necessary in order to create a good website. In order to create a sitemap, you first need a rough outline of your website. Without that outline, creating a sitemap is impossible.
PLZZZ HELP!!!
Select the correct answer.
A testing team has a new software application to test. While writing the test plan, the team enters some functions that are out of scope for the current phase of testing. In which section of the test plan will you find these functions?
A.
Introduction
B.
Features not to Test
C.
Deliverables
D.
Dependencies
Answer:
D the answer is D or c one of those 2
personal computer is the rise of what?
Answer:
Overuse injuries of the hand.
Obesity.
Muscle and joint problems.
Eyestrain.
Behavioural problems including aggressive behaviour.
Can someone please help me answer these questions plz
Explanation:
0001, 0010, 0101, 0110, 0111, 1000
what are the advantage of smaw welding process
Answer:
Explanation:
The most portable of all welding processes. No need for separate gas shielding. Can be used in a wide range of environments including outdoors, in fabrication shops, on pipelines and refineries, on ships and bridges, and more. Is not sensitive to wind and draft
HELP PLZZZZZZZZ!!!!!!!!!!!
Type the correct answer in the box. Spell all words correctly.
Before a new email application could be released to the public, it was released for a few days to some account holders of a website. The project team then collected feedback from this limited number of users and later made the email application available for public use. What type of testing did the project team use?
The project team used_____________testing for the email application.
Answer:
Its either business format franchise or business brokers
A customer opened a file attachment, and now her PC is infected with ransomware. She's unable to open any of her files. Which action would you take first?
A. Reinstall the operating system
B. Run an antivirus scan
C. Pay the ransom to recover the data
D. Disconnect the PC from the network
E. Restore files from backup
Answer:
D. Disconnect the PC from the network
Explanation:
I'd say this because it keeps the ransomware from spreading to other computers making it a bigger problem.
In this question, the answer is "Option D", which disconnects the PC from the network, which can be defined as follows:
A customer's PC has been attacked using ransomware after she opened a document file. She has been unable to access any of her files. She first had to detach the PC from the system to access the file.This type of malicious software (malware) threatens to publish or prevent information or computer access until the victim pays a ransom price to the attacker. Today, ransomware assaults are all too frequent. This attacker then demands a ransom from the victim, promising to restore access to the information in exchange for payment.The wrong option can be defined as follows:
In option a, it is wrong because when we reinstalling the OS is used to start the fresh without using the old files.In option b, it is wrong because the antivirus can't protect the ransomware maliciously. In option c, it is wrong because when a corporation can pay the ransom, their cash is dispersed across the dark web.In option e, it is wrong because creating copies of information could be recovered in the event of a primary information failure.Learn more:
Ransomware: brainly.com/question/14455233
Write a program that computes the sum of squares for a sequence of positive whole numbers. The program asks the user to enter the starting number. Then it asks the user to enter an ending number. It computes the square for each number from the starting number to the ending number. It also calculates the sum of these squares. It displays the numbers, their squares and the sum of the squares.
Answer:
In Python:
start = int(input("Start: "))
end = int(input("End: "))
total = 0
print("Number\t Squares")
for num in range(start,end+1):
print(num,"\t",num**2)
total+=num**2
print("Total: ",total)
Explanation:
This gets the starting number
start = int(input("Start: "))
This gets the ending number
end = int(input("End: "))
This initializes total to 0
total = 0
This prints the header
print("Number\t Squares")
This iterates through start to end
for num in range(start,end+1):
This prints each number and its square
print(num,"\t",num**2)
This calculates the total squares
total+=num**2
This prints the calculated total
print("Total: ",total)
HELPPPPP PLZZZZZZZZZZZZZZZ!!!!!!!!
Select the correct answer.
What type of diagram does the following image depict?
A.
class diagram
B.
deployment diagram
C.
activity diagram
D.
sequence diagram
E.
use case diagram
Answer:
A
Explanation:
Write a program that uses the Purchase class in 5.13. Set the prices to the following: Oranges: 10 for $2.99 Eggs: 12 for $1.69 Apples: 3 for $1.00 Watermelons: $4.39 each Bagels: 6 for $3.50 Set the purchased quantity to the following: 2 dozen oranges, 2 dozen eggs, 20 apples, 2 watermelons, 1 dozen bagels Display the total cost of the bill
Answer:
Explanation:
The following program is written in Java. Using the program code from Purchase class in 5.13 I created each one of the fruit objects. Then I set the price for each object using the setPrice method. Then I set the number of each fruit that I intended on buying with the setNumberBought method. Finally, I called each objects getTotalCost method to get the final price of each object which was all added to the totalCost instance variable. This instance variable was printed as the total cost of the bill at the end of the program. My code HIGHLIGHTED BELOW
//Entire code is in text file attached below.
//MY CODE HERE
DecimalFormat df = new DecimalFormat("0.00");
oranges.setPrice(10, 2.99);
oranges.setNumberBought(2*12);
eggs.setPrice(12, 1.69);
eggs.setNumberBought(2*12);
apples.setPrice(3, 1);
apples.setNumberBought(20);
watermelons.setPrice(1, 4.39);
watermelons.setNumberBought(2);
bagels.setPrice(6, 3.50);
bagels.setNumberBought(12);
totalCost = oranges.getTotalCost() + eggs.getTotalCost() + apples.getTotalCost() + watermelons.getTotalCost() + bagels.getTotalCost();
System.out.println("Total Cost: $" + df.format(totalCost));
}
}
Writing a function that implements a loop to collect a set amount of data. The function should use the serial object, the recording time, and the iteration (city number) as input arguments and return an N x 2 array with the time in the first column and the recorded light level in the second. (4 pts). Include in this function outputs to the Command Window noting the starting and stopping of the recording.
3. What category of error will
you get from the following:
*
a
11
20
b
30
C = b
a
10
d = 70/c
print(d)
Your answer
Answer:
B
Explanation:
An acceptable website design is one that meets
user design expectations and is also:
A.colorful
B.effective
C.template-based
D.standardized
Answer:
i'd say b
Explanation:
The computer boots normal but soon turns off. When rebooted, it dies again. It works for a few minutes in the morning, but throughout the day, it only boots after it has been turned off for over an hour, then turns off again as soon as the windows desktop appears. What are your troubleshooting steps and repairs that you, the on-call technician, will use to resolve this malfunction? What went wrong? How did you fix it? How much must you charge the customer?
Answer:
If I would have been there firstly I will not any for it second it has been happend to my PC 1 or 2 week ago if you are using Windows 7 cuz I have 7 . So two black screen appear press the reboot key and wait for 2nd screen, and if it would not come again reboot till it appear then press [Del]
key and some adjustments and press enter and it would ask for saving so press Y and enter you are all done
who was the first inventor of computer
Answer:
Explanation:
English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine.
Answer:
Charles Babage is the first inventor of computer.
For questions 3-6, consider the following two-dimensional array:
undervalue
will
knitting
pretzel
realize
honey
planetary
bandana
iron
employment
effort
fabric
What word is in [0][1] ?
Flag this Question
Question 41 pts
What word is in [1][1] ?
Flag this Question
Question 5
What word is in [3][2] ?
Flag this Question
Question 6
What word is in [2][1] ?
Answer:
3. Will
4. Realize
5. Fabric
6. Bandana
Realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1] . Arrays inside of arrays are what are known as two-dimensional arrays.
What is two-dimensional array?Arrays inside of arrays are what are known as two-dimensional arrays. 2D arrays, which are made up of rows and columns, are constructed as metrics. To create a database that resembles the data structure, 2D arrays are frequently used.
You may store a large amount of data using 2d arrays at once, which can then be supplied to as many different functions as necessary. Two indices are used to refer to the position of the data element in two-dimensional or multi-dimensional arrays. Row and column are the two dimensions indicated by the name. Realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1] .
Therefore, realize is in is in [1][1], Fabric is in [3][2], Bandana is in [2][1].
To know more about two-dimensional array, here:
https://brainly.com/question/30463245
#SPJ3
Describe the importance of human resource for business growth
Answer:
Having come a long way since traditional “personnel,” HR is a critical business function that helps companies succeed in hiring employees, keeping them engaged, and supporting their growth and development. HR Assists Managers and Team Leaders. ... HR Helps Employees Achieve Their Career Goals.
What do y’all think are the pros and cons to using technology?
Answer:
Explanation:
pros. convenient, easy to use, and educational cons. addictive, mentally draining, and creates a social divide.