Given the code that reads a list of integers, complete the number_guess() function, which should choose a random number between 1 and 100 by calling random.randint() and then output if the guessed number is too low, too high, or correct.
Import the random module to use the random.seed() and random.randint() functions.

random.seed(seed_value) seeds the random number generator using the given seed_value.
random.randint(a, b) returns a random number between a and b (inclusive).

For testing purposes, use the seed value 900, which will cause the computer to choose the same random number every time the program runs.
Ex: If the input is:
32 45 48 80
the output is:
32 is too low. Random number was 80.
45 is too high. Random number was 30.
48 is correct! 80 is too low.
Random number was 97.

# TODO: Import the random module
import random
def number_guess(num):
# TODO: Get a random number between 1-100
# TODO: Read numbers and compare to random number

if__name__ == "_main_":
# Use the seed 900 to get the same pseudo random numbers every time
random. seed(900)

# Convert the string tokens into integers
user_input = input()
tokens = user_input.split()
for token in tokens:
num = int(token)
number_guess(num)

Answers

Answer 1

Answer:

Following are the code to this question:

import random #import package

def number_guess(num): #define method number_guess

   n = random.randint(1, 100) #define variable n that hold random number

   if num < n: #define if block to check gess number is less then Random number  

       print(num, "is too low. Random number was " + str(n) + ".") #print message

   elif num > n: #check number greater then Random number

       print(num, "is too high. Random number was " + str(n) + ".") #print message

   else: #else block  

       print(num, "is correct!") #print message

if __name__ == '__main__': #define main method

   random.seed(900) #use speed method

   user_input = input() #define variable for user_input

   tokens = user_input.split()  #define variable that holds split value

   for token in tokens: #define loop to convert value into string token  

       num = int(token) # convert token value in to integer and store in num  

       number_guess(num)  # call number_guess method

Output:

33

33 is too low. Random number was 80.

Explanation:

In the above-given python code, first, we import the random package, in the next line, a method number_guess is defined, that accepts num parameter,  in this method, we store the random number in n variable and check the value from the conditional statement.

In this, we check value is less than from random number, it will print message too low, and its Random number. otherwise, it will go in the elif section. In this section it will check the value is greater than from a random number, it will print the message to high, and its Random number. otherwise, it will go to else section. In this, it will prints number and it is correct. In the main method, we input value, and use a token variable to convert the value into string token, and then convert its value into an integer, and then call the method number_guess.

Related Questions

Instructions
Write a method named buildArray that builds an array by appending
a given number of random two-digit integers. It should accept two
parameters–the first parameter is the array, and the second is an
integer for how many random values to add.
Print the array after calling buildArray .

Sample Run
How many values to add to the array: 12

[14, 64, 62, 21, 91, 25, 75, 86, 13, 87, 39, 48)​

Answers

Answer:

import java.util.Arrays; import java.util.Random; public class Main {    public static void main(String[] args) {        int [] testArray = {};        buildArray(testArray, 12);    }    public static void buildArray(int [] arr, int size){        arr = new int[size];        Random rand = new Random();        for(int i=0; i < size; i++){            arr[i] = rand.nextInt(90) + 10;        }        System.out.println(Arrays.toString(arr));    } }

Explanation:

The solution code is written in Java.

Firstly, create a method buildArray that takes two parameters, an array and an array size (Line 10).

In the method, use the input size to build an array with size-length (Line 11). Next, create a Random object and use a for loop to repeatedly generate a random integer using the Random object nextInt method. The expression rand.nextInt(90) + 10 will return an integer between 10 - 99. Each generated random integer is assigned as the value for one array item (Line 16).

At last, print out the array to terminal (Line 19).

In the main program, we can test the method by passing an empty array and a value 12 as array size (Line 7). We will get a sample array as follow:

[81, 36, 15, 20, 32, 84, 10, 13, 98, 12, 45, 45]

in c Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the list. The output of the program is every word in the list that contains the character at least once. Assume at least one word in the list will contain the given character. Assume that the list will always contain less than 20 words. Each word will always contain less than 10 characters and no spaces.

Answers

Answer:

see explaination

Explanation:

//Include required header file.

#include <stdio.h>

//Define the function isWordContainChar() having the

//required parameters.

int isWordContainChar(char* req_word, char search_char)

{

//Declare required variable.

int i;

//Start a for loop to traverse the string given in

//the function parameter.

for(i = 0; req_word[i] != '\0' ; i++)

{

//If the current character in the gievn word is

//matched with the character which needs to be

//found in the word, then return 1.

if(req_word[i] == search_char)

{

return 1;

}

}

//Otherwise, return 0.

return 0;

}

//Start the execution of the main() method.

int main(void)

{

//Declare the required variables.

int num_words, index, word_index;

char str_word[20][10];

char searchCharacter;

//Prompt the user to enter the number of words.

scanf("%d", &num_words);

//Prompt the user to enter the required words using a

//for loop and store them into an array.

for(index = 0; index < num_words; index++)

{

scanf("%s", str_word[index]);

}

//Prompt the user to enter a required character which

//needs to be found in a word.

scanf(" %c", &searchCharacter);

//Traverse the words stored in the array using a for

//loop.

for(index = 0; index < num_words; index++)

{

//Call the function isWordContainChar() with

//required arguments in rach iteration and if the

//value returned by this function is not 0, then

//display the current string in the array.

if(isWordContainChar(str_word[index],

searchCharacter) != 0)

{

printf("%s\n", str_word[index]);

}

}

return 0;

}

4.24 LAB: Print string in reverse Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Quit", "quit", or "q" for the line of text. Ex: If the input is:

Answers

The program that takes in a line of text as input, and outputs that line of text in reverse is given in the explanation part below.

What is programming?

The implementation of logic to facilitate specified computing operations and functionality is known as programming.

It occurs in one or more languages that vary according to application, domain, and programming model.

The goal of programming is to find a set of instructions that will automate the execution of a task that may be as complex as an operating system on a computer, mostly to solve a specific problem.

import java.util.Scanner;

public class LabProgram

{

public static void main(String[] args)

{

Scanner in = new Scanner(System.in);

String line;

while (true)

{

line = in.nextLine();

if (line.equals("quit") || line.equals("Quit") || line.equals("q")) break;

for (int i = 0; i < line.length(); i++) {

System.out.print(line.charAt(line.length() - i - 1));

}

System.out.println();

}

}

}

Thus, above mentioned is the program for the given scenario.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ5

In the lab, you discovered that the server you scanned (10.20.1.2) was vulnerable to the WannaCry ransomeware attack. What ports are affected and what are the recommended remediations? Why is it important to perform penetration testing on networks and individual servers?

Answers

Answer:

Check the explanation

Explanation:

If Zenmap SYN scan did not work in your lab, then that means the application could not locate the network you were attempting to scan, i.e. 10.20.1.0/24. Recall that in Section 2.

Part 2. You added a Route for 10.20.1.0 to be routed via the 172.30.0.1 gateway. That route you added to communicate with the 10.20.1.0 network is a temporary route and will be replaced each time.

reAay ouyay aay hizway ithway igPay atin?Lay? (Translated: "Are you a whiz with Pig Latin?") Write a program that converts an English phrase into a pseudo-Pig Latin phrase (that is Pig Latin that doesn’t follow all the Pig Latin syntax rules). Use predefined methods of the Array and string classes to do the work. For simplicity in your conversion, place the first letter as the last character in the word and prefix the characters "ay" onto the end. For example, the word "example" would become "xam-pleeay," and "method" would become "ethodmay." Allow the user to input the English phrase. After converting it, display the new Pig Latin phrase.

Answers

Answer:

Check the explanation

Explanation:

package com.prt.test;

package com.prt.test;

  import java.util.Arrays;

  import java.util.Scanner;

  public class StringEncryption {

      public static void main(String[] args)

      {

  try{

          String concatedString1="";//testing();

          StringBuffer encryptedString=new StringBuffer();

Scanner scanner = new Scanner(System.in);

         

          System.out.println("enter the string ");

         

          String userInput = scanner.nextLine();// to read the string

         

          String[] words=userInput.split("\\s");//to split the words if user enter the string with period

         

          for(String word:words)

          {

              int numberOfSpacesadd=1;

              String subs=word.substring(0, 1);//to split the first letter

              String s1=word.substring(1);//to split the after the first letter

              String concatedString=s1+subs;

              concatedString1=concatedString+"ay";//to add the adding phrase

              String addSpace = String.format("%"+ numberOfSpacesadd +"s", " ");//for adding the space after the word

                 

              encryptedString.append(concatedString1+addSpace);

             

          }

         

System.out.println(encryptedString.toString().trim()+"?");

  }catch(Exception e)

  {

      System.out.println(" try another time");

  }  

      }

  }

 

Output :

enter the string

Are You a Whiz with Pig Latin?

reAay ouYay aay hizWay ithway igPay atin?Lay?

Write a menu-driven program for a user to store information about the media collection they own. This requires using an array of struct type called Media. Every element in the array represents one media item in a person's collection. Represent the information as an array of structs that needs to able to hold up to 100 media entries. However, the actual number of entries is probably much smaller so the program needs to keep track of how many actual entries are in the collection.

Answers

Answer:

Check Explanation and attachment.

Explanation:

Since the site does not allow me to submit my work(for you to easily copy and paste it), I will post some additional attachments.  

Please, note that there is category, unique ID, description for each media item.

#include <stdio.h>

#include <string.h>

struct Media {

int id;

int year;

char title[250];

char description[250];

char category[50];

};

void show_menu();

void add_item(struct Media arr[], int *c);

void print_all(struct Media arr[], int c);

void print_category(struct Media arr[], int c);

void delete_entry(struct Media arr[], int *c);

int main() {

struct Media collection[100];

int ch, count = 0;

// loop until user wants to quit

while (1) {

show_menu(); // display the menu

printf("Enter your choice: ");

scanf("%d", &ch);

if (ch == 1)

add_item(collection, &count);

else if (ch == 2)

print_all(collection, count);

else if (ch == 3)

print_category(collection, count);

else if (ch == 4)

delete_entry(collection, &count);

else if (ch == 0)

break;

else

printf("Invalid choice. Try again!\n");

}

return 0;

}

void show_menu() {

printf("1. Add a media item to the collection\n");

printf("2. Print all media in the collection\n");

printf("3. Print all media in a given category\n");

printf("4. Delete an entry\n");

printf("0. Quit\n");

}

void add_item(struct Media arr[], int *cnt) {

The function below tries to create a list of integers by reading them from a file. The file is expected to have a single integer per line and the code works correctly in that case. If any of the lines don't contain just an integer, than this code fails. Fix this code so that it ignores any lines that don't contain integers instead of raising an exception. Do this with try/except blocks. Your code should still return the list of integers from the lines that contain integers.

Answers

Answer:

Check the explanation

Explanation:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

 

File.txt:

Kindly check the output below.

In this exercise we have to use the knowledge of computational language in python to write the code.

This code can be found in the attached image.

To make it simpler the code is described as:

def get_list_of_integers_from_file(filename):

int_list=[]

for line in open(filename).readlines():

try:

int_list.append(int(line))

except:

continue

return int_list

print(get_list_of_integers_from_file('file.txt'))

See more about python at brainly.com/question/22841107

The length of a hailstone sequence is the number of terms it contains. For example, the hailstone sequence in example 1 (5, 16, 8, 4, 2, 1) has a length of 6 and the hailstone sequence in example 2 (8, 4, 2, 1) has a length of 4. Write the method hailstoneLength(int n), which returns the length of the hailstone sequence that starts with n. /** Returns the length of a hailstone sequence that starts with n, * as described in part (a). * Precondition: n > 0 */ public static int hailstoneLength(int n)

Answers

Answer:

Following are the program to this question:

#include <iostream> //defining header file

using namespace std;

int hailstoneLength(int n) //defining method hailstoneLength

{

int t=1; //defining integer variable assign  

while(n!=1) //define a loop that checks value is not equal to 1

{

if(n%2==0) // check even number condition

{

n=n/2; // divide the value by 2 and store its remainder value in n

t++; //increment value of t by 1.

}

else

{

n=n*3+1; //calculate and hold value in n  

t++; //increment value of t variable by 1  

}

}

return t; //return value

}

int main() //defining main method

{

int n; //defining integer variable

cout<<"Enter any number: "; //print message

cin>> n; //input value

cout<<hailstoneLength(n); //call method and print its value

return 0;

}

Output:

Enter any number: 3

8

Explanation:

Program description can be given as follows:

In the given C++ language program an integer method "hailstoneLength", is declared, that accepts an integer variable "n" in its parameter. Inside the method, an integer variable t is declared, that assign a value that is 1, in the next line, a while loop is declared, that uses if block to check even condition if number is even it divide by 2 and increment t variable value by 1. If the number is odd it will multiply the value by 3 and add 1 and increment t by 1 then it will go to if block to check value again. when value of n is not equal to 1 it will return t variable value. In the main method, an integer variable "n" is used that call the method and print its return value.

Write a program using integers userNum and x as input, and output userNum divided by x four times. Ex: If the input is 2000 2, the output is: 1000 500 250 125 Note: In Coral, integer division discards fractions. Ex: 6 / 4 is 1 (the 0.5 is discarded).

Answers

Answer:

import java.util.Scanner;

public class Division {

   public static void main(String[] args) {

    Scanner in = new Scanner(System.in);

       System.out.println("Enter an integer");

       int userNum = in.nextInt();

       System.out.println("Enter the divisor");

       int x = in.nextInt();

           int first = userNum/x;

           int second = first/x;

           int third = second/x;

           int fourth = third/x;

       System.out.println(first+" "+second+" "+third+" "+fourth);

   }

}

Explanation:

In Java programming langauge use the scanner class to receive the values from the user (userNum and x)Carryout integer division of userNum/x to obtain the first numberRepeat the sam step to obtain the second, third and fourth numberOutput the numbers to the user

The student's question was about writing a program to divide an integer by another integer four times using integer division. The provided code is written in Python, demonstrating the process of capturing input and repeatedly dividing and outputting the result.

To solve the student's question, we need to create a simple program that takes two integers as input, userNum and x, and outputs the result of userNum divided by x four times. Each division operation will use integer division, which discards any fractions that might result from the division.

Example Code in Python:

Assuming they are learning programming using Python, which is common in high school:

userNum, x = map(int, input("Enter two integers separated by a space: ").split())
for _ in range(4):
   userNum //= x
   print(userNum, end=' ')
This code snippet reads two integers from the user, then performs integer division of userNum by x in a loop that runs four times. After each division, the program prints the current value of userNum, followed by a space.

XYZ is a large real estate firm. Their core competence is their understanding of the real estate market, and their understanding of their customers and the customer needs. Their most critical tools are their CRM and email servers. They are growing, and so is their customer list and their IT and marketing costs are growing at an alarming rate. They currently use managed services to run their CRM, email, etc software but they have had to deal with significant delays as each growth spurt is bogged down by the time and cost it takes to provision new servers, install the software, test it and bring it online. Which cloud delivery model would be best suited for them?

Answers

Answer:

SaaS is the correct answer to the given question .

Explanation:

The saas is known as "software as a service is a model " In the software as a service is a model the software is authorized and distributed only when  software is approved on a subscription basis also it is distributed in the centralized manner .

The cost of software as a service is a model is not so expensive as compared to the other model  also the software as a service model is more Integrated  and extensible as compared to the other model of the cloud delivery.According to the given question only the SaaS i.e "  software as a service " model is best to implement cloud delivery.

Final answer:

XYZ's real estate firm should adopt a Software-as-a-Service (SaaS) cloud delivery model to tackle growth-related IT and marketing cost increases, ensuring scalability, reliability, and a focus on core business activities.

Explanation:

For a large real estate firm like XYZ, which is experiencing rapid growth and increasing IT and marketing costs, the most suited cloud delivery model would be Software-as-a-Service (SaaS). This model provides access to applications over the internet with flexibility and scalability. SaaS applications are updated regularly in the cloud, offering enhanced responsiveness without the need for XYZ to bear the costs of server provisioning, software installation, and maintenance.

Using SaaS for their CRM and email servers allows for a cost-effective approach with a subscription-based model that adjusts easily with the company's growth. Additionally, given the criticality of these tools for XYZ, the SaaS model will ensure uptime and reliability while delivering sophisticated features and functionalities that cater to the firm's understanding of the real estate market and customer needs.

Moreover, as echoed in the cases of Scandic Hotels and Zalando, relying on cloud services will enable XYZ to focus on their core business activities and customer engagement without being bogged down by the complexities of IT infrastructure management.

Which character goes at the end of a line of code that starts with if?

Answers

Answer:

Explanation:

tttttttttttt

Implement the function create_prefix_lists(list) that will return a sequence of lists, each containing a prefix of list. All the lists should be collected as one big list. For example, for [2, 4, 6, 8, 10] the function should return [[], [2], [2, 4], [2, 4, 6], [2, 4, 6, 8], [2, 4, 6, 8, 10]]. Note: recursion can not be used for this solution, if you are familiar with the concept.

Answers

Answer:

The below code was written in Python language, kindly let me know if you'll want to see the implementation done in another language.

Explanation:

As python is tab specific, you need align the as per the screenshot of the code that I have attached below the code and text version of the code is also provided.

Code:

======

result = []

def create_prefix_lists(lst):

for i in range(len(lst)):

l = []

for j in range(i):

l.append(lst[j])

result.append(l)

result.append(lst)

return result

lis = [2,4,6,8,10]

print create_prefix_lists(lis)

Code indentation screen and code output can be seen in the attached images below:

====================

Answer:

See Explaination

Explanation:

code below

import java.util.ArrayList;

import java.util.Collections;

import java.util.List;

public class Prefix_test_check {

public static void create_prefix_lists(List elementList) {

if (elementList.size() > 0) {

Collections.sort(elementList);

List newArrayList = new ArrayList();

newArrayList.add("[");

System.out.print(newArrayList);

System.out.print(",");

newArrayList.clear();

int counterDataObj = 0;

for (int iObjectData = 0; iObjectData < elementList.size(); iObjectData++) {

newArrayList.add(elementList.get(iObjectData));

counterDataObj++;

if (counterDataObj == elementList.size()) {

System.out.print(newArrayList);

System.out.print("]");

} else {

System.out.print(newArrayList);

if (counterDataObj != elementList.size()) {

System.out.print(",");

}

}

}

} else {

List emptyDataList = new ArrayList();

emptyDataList.add("]");

System.out.print(emptyDataList);

}

}

public static void main(String args[]) {

List elementList = new ArrayList();

elementList.add(2);

elementList.add(4);

elementList.add(6);

elementList.add(8);

elementList.add(10);

create_prefix_lists(elementList);

}

}

Which of the following is NOT correct concerning database design?
1. Identify all fields needed to produce the required information
2. Organize each piece of data into its largest useful part
3. Group related fields into tables
4. Determine each table’s primary key

Answers

Final answer:

The incorrect statement regarding database design is the directive to organize each piece of data into its largest useful part as data should actually be in the smallest useful part to avoid redundancy and maintain normalization.

Explanation:

The statement that is NOT correct concerning database design is Organize each piece of data into its largest useful part. Instead, data should be organized into the smallest useful part, to ensure normalization and avoid redundancy. The design process includes determining the purpose of the database, identifying fields, grouping related fields into tables, and establishing primary and foreign keys to ensure relationships between tables.

The purpose of the primary key is to ensure that each record in a table is unique, which is crucial to maintain data integrity. A good design also considers the use of foreign keys to link tables together and maintain referential integrity. The goal is to prevent redundant data, which avoids wasting space and reduces the occurrence of data entry errors.

escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. Justify your response with at least one credible source.Explain which of these features you would consider to be the most beneficial if you were a member of the IT team supporting a network. Justify your response with at least one credible source.

Answers

Answer:

Due to Brainly's policy on answering questions, posting links as "credible source." is prohibited, but you can let me know in case you'll still want to know the "credible source."

Explanation:

The three improvements you think came about with the introduction of intrusion prevention technology are:

1.The prevention of intruders from attacking the database

2.The data is protected and is more secured as the intruders are removed from the network.

3.The  data is not changed and misused as hackers cannot access it

The best feature which is can be termed as the most beneficial is that data is not changed neither can it be misused as the company's data is secured and protected from the outside world and the data can be used effectively and efficiently without any major changes.This means the company does not suffer any losses due to hacking of data.

Claire wants to be a digital media coordinator. What requirements does she need to fulfill in order to pursue this career?


To be a digital media coordinator, Claire needs a bachelor’s degree in (psychology, public relations, finance) , digital media, or a related field. She also needs to have knowledge of (computer programming, computer coding, search engine optimization) and emerging digital technologies.

Answers

To pursue a career as a Digital Media Coordinator, Claire should have a bachelor's degree in a relevant field.

Claire should have a good understanding of emerging digital technologies and trends. This includes staying up-to-date with the latest developments in digital media platforms, social media, and online advertising. Familiarity with digital marketing techniques and tools is essential.

Claire should be able to analyze digital media data and performance metrics. This includes using tools like Analytics to measure the effectiveness of digital campaigns and make data-driven decisions. Strong written and verbal communication skills are important for creating and conveying digital media content effectively. Claire may be responsible for writing web content, social media posts, or email campaigns.

Learn more about Digital Media Coordinator, here:

https://brainly.com/question/24032108

#SPJ3

Final answer:

Claire needs a bachelor's degree in public relations or a related field, knowledge of SEO, and practical experience in strategic communication. She should highlight her communication experiences and skills such as content creation and media planning. Starting as a communication technician can lead to more advanced roles.

Explanation:

To pursue a career as a digital media coordinator, Claire should ideally have a bachelor’s degree in public relations, digital media, or a related field such as marketing or communication studies. It is also essential for her to possess knowledge of search engine optimization (SEO) and stay updated on emerging digital technologies. Practical experience, whether through internships, work placements, or personal projects, is highly valued in this field; not only do they demonstrate Claire's skill set, but also her understanding of the practical aspects of strategic communication.

Claire should emphasize her communication major experience and any hands-on involvement she had with social media campaigns, event planning, or creating digital content. These experiences could range from managing social media accounts for a student organization to participating in a campaign focus group. Highlighting skills such as content creation, analytics, audience engagement, and media planning in her cover letter and application materials will be beneficial.

Starting as a communication technician could be a stepping stone in Claire's career, eventually leading up to a managerial role in public relations or advertising. To stay competitive and prepared for job opportunities, Claire should also consider developing a comprehensive portfolio that showcases her skills in business communication and strategic planning.

The primary purpose of an operating system is: To provide a software interface between the hardware and the application programs. To provide additional products for hardware manufacturers to sell. To give the user less versatility in using the computer. To maximize the productivity of the computer system user. To maximize the productivity of a computer system by operating it in the most efficient manner.

Answers

Answer:

To provide a software interface between the hardware and the application programs.

Explanation:

An operating system is a system software that is responsible to manage the hardware and software on our computer. Operating system play the role as a coordinator to handle how different software interact or communicate with hardware and produce a desired output to user. Operating system will also manage computer resources such as central processing unit (cpu), memory and storage required by software to perform its task. The common operating system exist in the today market includes Microsoft Windows, Mac OS X, and Linux.

1.3 Code Practice edhisive

Answers

Answer:

edhesive

Explanation:

Final answer:

The question is related to the practice of ethical guidelines in software engineering, focusing on the importance of following a professional code of conduct. This college-level topic is covered by resources such as CK-12, LibreTexts, and IEEE-CS/ACM Joint Task Force, providing exercises, ethical frameworks, and science practices essential in a computer science curriculum.

Explanation:

The Code Practice edhesive refers to exercises and ethical guidelines in software engineering. The exercise appears to be related to the application of the Software Engineering Code of Ethics and Professional Practice, which is essential for aspiring software engineers to learn and follow to ensure they act responsibly and professionally in their field.

In the context of computer science and technology education, such practices are commonly used to instill a sense of ethical responsibility and to prepare students to face various real-world scenarios that they may encounter in their professional careers. The content referenced from CK-12, LibreTexts, and the IEEE-CS/ACM Joint Task Force provides essential guidelines, exercises, and anecdotal historical investigations that enrich the learning experience.

Furthermore, understanding Science Practices through different exercises, including sections on the scientific method, the role of models, and the appropriate use of mathematics, is crucial in developing a well-rounded software engineering skill set. Materials shared under various licenses offer exercises and solutions to reinforce these concepts.

These are the characteristics of good blogs.


use corporate jargon and abbreviations

use industry-specific vocabulary

updated frequently

use a friendly, professional tone

enable users to edit corporate documents

Answers

Answer:

Updated Frequently

Use a friendly, professional tone.

Explanation:

A blog can be defined as an informal journal posted on a webpage either by an individual or group of people. A blog is written online and updated regularly.

There can be many purposes of writing a blog; it varies according to the writer. A blogger may write to express his/her feelings, views, etc. Or they can also write to share information related to anything such as education, etc.

The characteristics of a good blog are that it is updated regularly and written in a friendly and professional tone. A blog should be different from the existing ones, they should share the information which can not be found on other blogs.

Thus the correct answer is option third and fourth.

Write a script that will generate random integers in the range from

0 to 50, and print them, until one is finally generated that is greater

than 25. The script should print how many attempts it took.

Answers

Answer:

Explanation:

Let's do this in Python, we shall use the package random to generate a random double between 0 and 1. Then we multiply it with 50 and covert to integer to get a random integer between 0 and 50. Place a While function with condition to stop when it's greater than 25

from random import random

attempts = 1

random_int = int(random()*50)

print(random_int)

print("This is attempt " + attempts)

while random_int <= 25:

    attempts += 1

    random_int = int(random()*50)

    print(random_int)

    print("This is attempt " + attempts)

Modify class fraction to keep track of the number of the objects currently in memory Let the user input a denominator, and then generate all combinations of two such fractions that are between 0 and 1, and multiply them together. Create fractions and arrays dynamically based on the user input. Only positive fractions. No need to reduce. No vectors allowed. The well-formatted ou

Answers

Answer:

See explaination

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

int main() {

int dem,i,j;

cout<<"Enter denominator value"<<endl;

cin>>dem;

int** arr=new int*[dem];

for(i=0;i<dem;i++)

{

if(i!=0)

cout<<setw(5)<<i<<"/"<<dem;

cout<<"\t";

}

cout<<endl;

for(i=1;i<dem;i++)

{ cout<<setw(5)<<i<<"/"<<dem<<"\t";

arr[i] = new int[dem];

for(j=1;j<dem;j++)

{

cout<<setw(5)<<i*j<<"/"<<dem<<"\t";

}

cout<<endl;

}

return 0;

}

the eight bytes in the words y and z. If a byte is the code for a decimal number, output it to the console. Otherwise, simply ignore it and examine the next byte. The program must be a loop. That means that you must write a loop that will execute eight times to examine each byte, output if necessary, and continue. End the program as usual with a syscall 10. After completing the program answer this question: What numbers are output?

Answers

Answer:

See explaination

Explanation:

MIPS PROGRAM :-

.data

y: .word 0x32774b33

z: .word 0x2a276c39

y_prompt: .asciiz "Y= "

z_prompt: .asciiz "Z= "

new_line: .asciiz "\n"

.text

main:

la $s0, y

la $s1, z

li $t0, 8

loop:

beqz $t0, END_OF_LOOP

# checking fo y word

lb $t1, 0($s0)

#checking for whether the byte is decimal or not

li $t2, '0'

bltu $t1, $t2, check_for_z

li $t2, '9'

bltu $t2, $t1, check_for_z

#print new line

li $v0, 4

la $a0, new_line

syscall

#print y prompt

li $v0, 4

la $a0, y_prompt

syscall

#print the value

li $v0, 1

add $a0, $zero, $t1

syscall

check_for_z:

# checking fo z word

lb $t1, 0($s1)

#checking for whether the byte is decimal or not

li $t2, '0'

bltu $t1, $t2, next_element

li $t2, '9'

bltu $t2, $t1, next_element

#print new line

li $v0, 4

la $a0, new_line

syscall

#print y prompt

li $v0, 4

la $a0, z_prompt

syscall

#print the value

li $v0, 1

add $a0, $zero, $t1

syscall

next_element:

addi $s0, $s0, 1

addi $s1, $s1, 1

#decrease the counter

addi $t0, $t0, -1

j loop

END_OF_LOOP:

li $v0,10

syscall

Design and document an IP addressing scheme to meet ElectroMyCycle’s needs. Specify which IP address blocks will be assigned to different modules of your network design. Document whether you will use public or private addressing for each module. Document whether you will use manual or dynamic addressing for each module. Specify where (if anywhere) route summarization will occur.

Answers

Answer:

Given that: Design scenario - page 197 has a continuation of the chapter 1 design scenario for ElectroMyCycle

Explanation:

See attached image

Final answer:

An IP addressing scheme for ElectroMyCycle involves using private addresses for internal networks with a combination of manual and dynamic addressing, public addresses for the DMZ, and route summarization at the router connecting to the ISP.

Explanation:

To design an IP addressing scheme for ElectroMyCycle, one must consider both the size of the network and the security requirements. The following is a tentative plan:

Headquarters: Use private addressing (e.g., 192.168.1.0/24) because these IP addresses do not need to be routable to the Internet. Dynamic addressing through DHCP can be applied here for ease of management.

Production Facility: Use a separate block of private addresses (e.g., 192.168.2.0/24) and manual addressing for fixed assets like servers, while dynamic addressing can be used for employee devices.

Sales Offices: Smaller subnets of private addresses (e.g., 192.168.3.0/28) with dynamic addressing would be appropriate.

DMZ (Demilitarized Zone): This area, which contains public-facing servers, should use public IP addresses for accessibility from the Internet. Manual addressing is recommended for these critical assets.

Route summarization can occur at the router connecting the headquarters to the ISP, summarizing the multiple private subnets into a single entry in the routing table to simplify the routing process and reduce overhead.

Write a SQL query to find the population of the planet named 'Caprica' -- 10 points Find the first name, last name, and age of people from bsg_people whose last name is not 'Adama' -- 10 points Find the name and population of the planets with a population larger than 2,600,000,000 -- 10 points Find the first name, last name, and age of people from bsg_people whose age is NULL -- 12 points

Answers

The question is incomplete! Complete question along with answer and step by step explanation is provided below.

Please find the attached question.

Answer:

a) SQL Query:

SELECT population

FROM bsg_planets

WHERE name='Caprica';

b) SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE lname!='Adama';

c) SQL Query:

SELECT name, population

FROM bsg_planets

WHERE population > 2600000000

d) SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE age IS NULL;

Explanation:

a) Write a SQL query to find the population of the planet named 'Caprica'

Syntax:

SELECT  Column

FROM TableName

WHERE Condition;

For the given case,

Column = population

TableName  = bsg_planets

Condition = name='Caprica'

SQL Query:

SELECT population

FROM bsg_planets

WHERE name='Caprica';

Therefore, the above SQL query finds the population of the planet named 'Caprica' from the table bsg_planets.

b) Find the first name, last name, and age of people from bsg_people whose last name is not 'Adama'

Syntax:

SELECT  Column1, Column2, Column3

FROM TableName

WHERE Condition;

For the given case,

Column1 = fname

Column2 = lname

Column3 = age

TableName  = bsg_people

Condition = lname!='Adama'

SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE lname!='Adama';

Therefore, the above SQL query finds the first name, last name and age of people whose last name is not 'Adama' from the table bsg_people.

c) Find the name and population of the planets with a population larger than 2,600,000,000

Syntax:

SELECT  Column1, Column2

FROM TableName

WHERE Condition;

For the given case,

Column1 = name

Column2 = population

TableName  = bsg_planets

Condition = population > 2600000000

SQL Query:

SELECT name, population

FROM bsg_planets

WHERE population > 2600000000

Therefore, the above SQL query finds the name and population of the planets with a population larger than 2,600,000,000 from the table bsg_planets.

d) Find the first name, last name, and age of people from bsg_people whose age is NULL

Syntax:

SELECT  Column1, Column2, Column3

FROM TableName

WHERE Condition;

For the given case,

Column1 = fname

Column2 = lname

Column3 = age

TableName  = bsg_people

Condition = age IS NULL

SQL Query:

SELECT fname, lname, age

FROM bsg_people

WHERE age IS NULL;

Therefore, the above SQL query finds the first name, last name and age of people whose age is NULL from the table bsg_people.

Answer:

SQL Query : select population from bsg_planets where name='Caprica';

SQL Query : select fname,lname,age from bsg_people where lname!='Adama';

SQL Query : select name,population from bsg_planets where population > 2600000000;

SQL Query : select fname,lname,age from bsg_people where age='NULL';

Explanation:

using MySQL Workbench.

SQL Query : select population from bsg_planets where name='Caprica';

Because this sql query will return the population from bsg_planets where the name is Caprica;

SQL Query : select fname,lname,age from bsg_people where lname!='Adama';

Because this SQL query will return the first name ,last name and age from the bsg_people where last name is not adama.

SQL Query : select name,population from bsg_planets where population > 2600000000;

Because this SQL query will return the name and population where population is greater than 2600000000

SQL Query : select fname,lname,age from bsg_people where age='NULL';

Because this SQL query will return the first name ,last name and age from the bsg_people where age is NULL.

Provide the code to insert a subtitle track named "Spanish Version" using the track text in the spanish.vtt file and the Spanish source language. Make this the active track in the video clip.

Answers

Answer:

See explaination

Explanation:

<video id="video" controls preload="metadata"> <source src="video/sintel-short.mp4" type="video/mp4"> <source src="video/sintel-short.webm" type="video/webm"> <track label="English" kind="subtitles" srclang="en" src="captions/vtt/sintel-en.vtt" default> <track label="Deutsch" kind="subtitles" srclang="de" src="captions/vtt/sintel-de.vtt"> <track label="Español" kind="subtitles" srclang="es" src="captions/vtt/sintel-es.vtt"> </video>

A 64-bit word computer employs a 128KB cache. The address bus in this system is 32-bits. Determine the number of bits in each field of the memory address register (MAR) as seen by cache in the following organizations (show your calculations): A. Fully associative mapping with line size of 4 words. B. Direct mapping with the line size of 8 words. C. 2-way set associated mapping with the line size of 4 words. D. 8-way set associated mapping with the line size of 2 words.

Answers

Answer: provided in the explanation segment

Explanation:

taking a step by step process for this, we will analyze this problem,

we have that the Word size = 8 bytes

Cache size = 128 KB = 128×2¹⁰ bytes = 2¹⁷ bytes

(a). we are asked to cal for fully associative mapping with line size of  4 words.

fully associative mapping with line size of  4 words = 4 × 8 = 32 bytesoffset = log₂³² = 5 bittag = 32 - (5+0) = 27 bit index bit = 0

(b). Direct mapping with the line size of 8 words:

here  the line size = 8×8 = 64 bytes no of lines = 2¹⁷/2⁶ = 2¹¹ lines offset = log ₂(2⁶) = 6 bitindex = log ₂(2¹¹) = 11 bittag = 32 - (5 +11) = 15 bit

(c). 2-way set associated mapping with the line size of 1 word:

no of lines = 2¹⁷/2³ = 2¹⁴ linesoffset = log₂(2³) = 3 bitno of sets = 2¹⁴/2 = 2¹³ sets index = log₂(2¹³) = 13 bittag = 32 - (3+13) = 16 bit

(d). 8-way set associated mapping with the line size of 2 words:

8-way set associated mapping with the line size of 2 = 2*8 = 16  bytes

no of lines = 2¹⁷/2⁴ = 2¹³ linesno of sets = 2¹³/2³ = 2¹⁰ sets offset = log₂¹⁶ = 4 bitindex = log ₂(2¹⁰) = 10 bittag = 32 - (4+10) = 18 bit

cheers i hope this helps!!!!

Susan was recently fired from her executive IT position. You have concerns that she has enough knowledge and expertise to sabotage company documents—and you need to delete her access. However, upon beginning, you find information that should be retained in her user directory for future company needs. Consider the process you would take to ensure that Susan no longer has access and that data is retained. In situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not?

Answers

Answer:

The answer is No, the gains or benefit do not exceed the risk because, even if the data of the user seem very vital, the damage it would have on the long will affect the organisation in a negative way.

Explanation:

From the example given, stating that in situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not

I would say that  NO, the benefits do not outweigh the risk that will be enough to keep the user information because, just as the user data is important, but the damage it would yield or have could affect the organization on the long run.

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). c

Answers

Final answer:

A program can calculate the estimated monthly mortgage using the formula (currentPrice * 0.051) / 12 and determine the percentage change in house prices to analyze market trends.

Explanation:

Sites like Zillow provide summaries of house prices to give accurate estimates of home values. When writing a program to output a summary of the current price, last month's price, and the estimated monthly mortgage, one can use the formula provided in the question to calculate the mortgage. The estimated monthly mortgage is computed using the formula (currentPrice * 0.051) / 12. It's also important to note that the percentage change in house prices is an important metric when analyzing real estate data, which can be computed as [(current price - last month's price) / last month's price] * 100. This will help in understanding the real estate market trends.

This program has one small difference that will make it run a little differently. Again though, remember:
All your code outside the draw loop is run first, one time
All your code inside the draw loop is run over and over forever
What will this program do? Write your prediction below.

Answers

Answer:

Answer:

Add the following code after the line 3 that is:

numItems = numItems - 1;

Explanation:

In the following question, some information in the question is missing that is code block.

0 var numItems = promptNum("How many items?");

1 var total = 0;

2 while (numItems > 0){

3 total = total + promptNum("Enter next item price");

4 }

5 console.log("The total is" + total);

In the following scenario, Tiffany is developing a program to help with the handling of bake sales and she not write that part which is essential.

There would become an incorrect condition that requires any increment/decrement operations stating that perhaps the condition variable will be incorrect. Because there has to be the variable "numItems" operation because it engages in the while loop condition.

Read more on Brainly.com - https://brainly.com/question/15009132#readmore

Explanation:

Write which of the ovals (A, B, C, or D) is placed around code that best meets the criteria as a student-developed algorithm. Explain your answer using the criteria in the scoring guide.

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

In the given question, some information is missing, that attachment of the image files code, So, the code to the question can add in an image file, and explanation to this question can be described as follows:

In option 4, In drawSquare method, it is positioned across the abstraction, as it is across a method, that compresses many lines of code all in one. In option 1, The moveTo method is the rule. Throughout in option 4, and in option 2, is a request to function, which is defined in option 3, that is the for-loop.

In Section 8.5.4, we described a situation in which we prevent deadlock by ensuring that all locks are acquired in a certain order. However, we also point out that deadlock is possible in this situation if two threads simultaneously invoke the transaction () function. Fix the transaction () function to prevent deadlocks.

Answers

Answer:

See Explaination

Explanation:

Separating this critical section into two sections:

void transaction(Account from, Account to, double amount)

{

Semaphore lock1, lock2;

lock1 = getLock(from);

lock2 = getLock(to);

wait(lock1);

withdraw(from, amount);

signal(lock1);

wait(lock2);

deposit(to, amount);

signal(lock2);

}

will be the best solution in the real world, because separating this critical section doesn't lead to any unwanted state between them (that is, there will never be a situation, where there is more money withdrawn, than it is possible).

The simple solution to leave the critical section in one piece, is to ensure that lock order is the same in all transactions. In this case you can sort the locks and choose the smaller one for locking first.

Other Questions
HELP!!!While taking his clothes out of the dryer, Charles finds a sock clinging to his sweater. What is the best explanation for this common phenomenon? A. In the dryer, both the sock and the sweater lost electrons. B. In the dryer, both the sock and the sweater gained electrons. C. In the dryer, either the sock or the sweater gained electrons while the other item lost electrons. D. The cause of static cling is an unsolved scientific mystery. A publishing company has just published a new college textbook. Before the company decides the price at which to sell this textbook, it wants to know the average price of such textbooks in the market. The research department at the company took a sample of 25 comparable textbooks and collected information on their prices. This information produced a mean of $145 for this sample. It is known that the standard deviation of all such textbooks is $35 and the population of such prices is normal.a. What is the point estimate of the mean price of all such college textbooks? b. Construct a 90% confidence interval for the mean price of all such college textbooks. Which of the following quotes best illustrates the lighthearted mood in response to Windrider's"I came to help Not because I believe in your crazy dream. Call it an old man's wham if you like.""Look on it as an act of charity to accept our money. It would make us all feel much better.""And just as I saw the hill coming at me, I realized that my family meant more to me than flying"If you can perform the miracle of flying, Uncle can perform the miracle of making a loan without any interest due on it Under U.S. laws: A. Only private workers have the right to hold an election to choose what union they want to represent them, if any.B. Only public workers have the right to hold an election to choose what union they want to represent them, if any.C. Most private and public workers have the right to hold an election to choose what union they want to represent them, if any.D. Only the employer has the right to hold an election to choose what unions they want to represent the workers within the organization, if any. This is a little big easy Create a Visual Logic flow chart with four methods. Main method will create an array of 5 elements, then it will call a read method, a sort method and a print method passing the array to each. The read method will prompt the user to enter 5 numbers that will be stored in the array. The sort method will sort the array in ascending order (smallest to largest). The print method will print out the array. Solve the following equation by factoring. 9x^2 - 16 = 0 What did the US and its allies want during the Vietnam war? how did they try to meet their goals? I NEED THIS FASTWhich of the following is true of real machines?o work output is less then work inputo work output equals work inputo work input is decreased because of frictiono work output is greater than work input What characteristics did the architecture from the Gothic period possess? In the book animal farm what are two ways the humans have come to accept Animal Farm? His response was so___ that I thought he must be angry at my question Mischka is an amateur astronomer. Using her telescope, she looks out past the Earths atmosphere and observes an object with a long, bright, cloud-like tail behind it. What is Mischka observing? Find a solution to the system of equations by finding the reduced row-echelon form of the augmented matrix for the system ofequations4x - 2y - 5z = -514x - y - 2z = -364x - 2y + 4z = -24a. (-6, 6, 3)C (-6, 6, 62)b. (-62, 62, 30)d. (-62, 6, 62) Fill in the blanks in the following proof, which shows that the sequence defined by the recurrence relationsk=sk 1 + 2k, for each integer k 1s0=3.satisfies the formulasn = 3 + n(n + 1) for every integer n 0.Proof (by mathematical induction): Lets suppose you (USA dealer) imported a product from German on Dec 1, 2018 at 300, payable in 60 days. You sold the product in the US market at $400 in cash on Dec 15, 2018. The company's fiscal year ends on Dec 31. You paid to your German supplier on Feb 1, 2019. Below, please find the exchange rate information: Dec 1, 2018: 1.2 /$. Dec 31, 2018: 0.6 /$. Feb 1, 2019: 1.0 /$. What was gross profit for 2018 and 2019, respectively? Liam works at a zoo. He was looking at some data showing the masses of their 5 African elephants. The mean mass of the elephants was 3,800 kg, and the median mass was 3,600 kg . The smallest elephant, named Lola, weighed 2,700 kgLola then got very sick and lost weight until her mass reached 1,800 kgHow will Lola's mass decreasing affect the mean and median?(A) Both the mean and median will decrease.(B)The median will decrease, and the mean will stay the same.(C)The mean will decrease, and the median will stay the same.(D) The mean will decrease, and the median will increase. Cylinder A has a base of 3 and height of 3 cylinder be has the base of 2 and the height of 4. What is the ratio of the volume of cylinder A to the volume of cylinder B? Rainforests are characterized by thick groves of trees, high levels of rainfall, and a very diverse ecosystem with many types of plants and animals found nowhere else on Earth. In which region of the Earth are most rainforests found? The cats toy is lost is it a independent clause Steam Workshop Downloader