Answer:
Terraform is an open-source infrastructure as code software tool that enables you to safely and predictably create, change, and improve infrastructure.
Type the correct answer in the box. Spell all words correctly.
John wants to use graphical elements on his web page. Which image formats should he use to keep the file size manageable?
John should use
formats to keep the file size manageable.
Answer:
PNG, GIF
Explanation:
Manny has drafted an email message and configured a delivery option "Do not deliver before: 5:00 P.M. and today's date." He shuts down his computer and leaves for the day at 4:30 p.m. What will happen at 5 p.m.?
Answer:
The Email will send.
Explanation:
The email will send as long as there is internet connection.
Answer: this isnt an answer but i really need ur help.. did u pass the microsoft unit test? I cant pass it if my life depended on it
Explanation:
Its on edge
How can presentation software be used in a
business or professional setting? Choose all that
apply.
to automate the ticket-purchasing process at
movie theaters through a kiosk
to teach lessons to high school students
to deliver a sales presentation to clients
to create charts and graphs from a table of
values
to compose letters and memos
DONE
Answer:
To automate the ticket purchasing process at the movie theaters through a kiosk
To teach lessons to high school students
To deliver a sales presentation to clients
Explanation:
I just used the answers above and got 2/3 wrong and edge said so
What symbol next to the records indicates that a table includes a subdatasheet? an asterisk a plus sign a question mark an exclamation point
Answer: a plus sign
Explanation: I just did the assignment and got it right
Answer:
B)A plus sign
Explanation:
B)A plus sign just finished assignment
Write a program that randomly (using the random number generator) picks gift card winners from a list of customers (every customer has a numeric ID) who completed a survey. After the winning numbers are picked, customers can check if they are one of the gift card winners. In your main function, declare an integer array of size 10 to hold the winning customer IDs (10 winners are picked). Pass the array or other variables as needed to the functions you write. For each step below, decide what arguments need to be passed to the function. Then add a function prototype before the main function, a function call in the main function and the function definition after the main function.
Answer:
Explanation:
Since no customer ID information was provided, after a quick online search I found a similar problem which indicates that the ID's are three digit numbers between 100 and 999. Therefore, the Java code I created randomly selects 10 three digit numbers IDs and places them in an array of winners which is later printed to the screen. I have created an interface, main method call, and method definition as requested. The picture attached below shows the output.
import java.util.Random;
interface generateWinner {
public int[] winners();
}
class Brainly implements generateWinner{
public static void main(String[] args) {
Brainly brainly = new Brainly();
int[] winners = brainly.winners();
System.out.print("Winners: ");
for (int x:winners) {
System.out.print(x + ", ");
}
}
public int[] winners() {
Random ran = new Random();
int[] arr = new int[10];
for (int x = 0; x < arr.length; x++) {
arr[x] = ran.nextInt(899) + 100;
}
return arr;
}
}
Using recursion, write a program that asks a user to enter the starting coordinates (row, then column), the ending coordinates (row then column), and calculates the number of paths from the starting coordinate to the ending coordinate.
Answer:
The program in Python is as follows
def Paths(row,col):
if row ==0 or col==0:
return 1
return (Paths(row-1, col) + Paths(row, col-1))
row = int(input("Row: "))
col = int(input("Column: "))
print("Paths: ", Paths(row,col))
Explanation:
This defines the function
def Paths(row,col):
If row or column is 0, the function returns 1
if row ==0 or col==0:
return 1
This calls the function recursively, as long as row and col are greater than 1
return (Paths(row-1, col) + Paths(row, col-1))
The main begins here
This prompts the user for rows
row = int(input("Row: "))
This prompts the user for columns
col = int(input("Column: "))
This calls the Paths function and prints the number of paths
print("Paths: ", Paths(row,col))
Write a program that prints the sum of the even numbers and the products of odd numbers on the screen
Answer:
The program in Python is as follows:
n = int(input("Number of inputs: "))
total = 0; product = 1
for i in range(n):
num = int(input(": "))
if num%2 == 0:
total+=num
else:
product*=num
print("Sum of even: ",total)
print("Product of odd: ",product)
Explanation:
This prompts the user for the number of inputs, n
n = int(input("Number of inputs: "))
This initializes sum (total) to 0 and products to 1
total = 0; product = 1
This iterates through n
for i in range(n):
This gets the inputs
num = int(input(": "))
If input is even, calculate the sum
if num%2 == 0:
total+=num
If otherwise, calculate the product
else:
product*=num
Print the required outputs
print("Sum of even: ",total)
print("Product of odd: ",product)
Why are iterators useful?
Select one:
a. Iterators prevent infinite loops
b. Iterators are easier to loop over than a while loop
c. Iterators walk down a collection faster than a for loop.
d. Iterators give you direct access to private variables.
e. Improve information hiding by not revealing how a collection class is implemented
Viruses and Malware Complete the case project on page 82 of the textbook by researching two types of viruses, two types of malware, and two types of denial of service attacks using the internet or any other type of resource available to you. Next, write at least a two page paper in current APA format that lists each of the researched items, how they are used to attack a system or network, and what types of defenses can be put in place to protect against those attacks. Find an article which describes the compromise of a company organization through a virus or malware. Write a one page paper in APA format summarizing the security incident and how it was resolved or what actions could have been taken to prevent it.
Hi, I provided you a general guide on how to go about your writing your research paper.
Explanation:
Note, the current APA (American Psychological Association) format is the APA 7th Edition. This format details how a researcher should state the findings, sources, conclusion, etc.
Hence, you can begin writing the assigned paper only after gathering the needed data.
Describe a cellular network, its principal components, and how it works.
Answer:
The final basic component of a cellular system is the Gateway. The gateway is the communication links between two wireless systems or between wireless and wired systems. There are two logical components inside the Gateway: mobile switching center (MSC) and interworking function (IWF).
Explanation:
calculate the total and average number from 1 to 100
Answer:
Thus, 50.5 is an average of numbers from 1 to 100.
Explanation:
getcalc.com's average calculator to find what is the mean or average of natural numbers upto 100.
50.5 is an average of numbers from 1 to 100 mentioned in the below table, by substituting the total sum and count of numbers in the below formula. The corresponding formulas, chart, examples & workout may help students, teachers or professionals to learn, teach or practice the average of natural numbers upto 100.
Address the formula, input parameters & values.
Formula: Average = Total Sum of Numbers / Total Count of Numbers
Input parameters & values:
The numbers from 1 to 100 are
1, 2, 3, 4, . . . . , 98, 99, 100
Total Count of Numbers = 100
step 2 Find the sum of numbers from 1 to 100.
sum = 1 + 2 + 3 + . . . . + 99 + 100
= 5050
step 3 Divide the sum by 100 Average = 5050/100 = 50.5
Thus, 50.5 is an average of numbers from 1 to 100.
Which of the following statements is TRUE of a peer-to-peer network?
A. Different parties have very different opinions on what can and can’t be shared through a peer-to-peer network.
B. In a peer-to-peer network, all files being shared are kept on one server. Anyone who wants to access one of those files can get it directly from the server.
C. A peer-to-peer network can create heavy traffic and makes download times increase significantly.
D. Creating a directory of which computers have certain files is an acceptable practice.
Answer:
A. Different parties have very different opinions on what can and can’t be shared through a peer-to-peer network.
Explanation:
CORRECT
Choice 'A' is very true. There have been many arguments and court cases over what content can and cannot be shared through a peer-to-peer network. Users of these networks often argue that free speech allows us to share whatever we want online. Content creators on the other hand frequently sue for copyright infringement.
INCORRECT
Choice 'B' is describing a centralized system, not a peer-to-peer network. In a peer-to-peer network, there is no central location of files. Files are transferred directly from one computer to another without a middleman.
Choice 'C' is also not true of peer-to-peer networks. These networks are actually much more efficient than centralized systems because there is no large server holding all the files. It takes less time to download files from a peer-to-peer network because there is no centralized source of information and files.
Choice 'D' is also false; this was decided in the court case about Napster, one of the first large peer-to-peer networks. Having a centralized directory of who has which files is not considered free speech.
The peer-to-peer network is said to have varying views that form the basis of what can and cannot be shared. Thus, option A is correct.
What is a peer-to-peer network?A peer-to-peer network is given as the connection of the computers that are linked with the following same responsibilities and permissions.
The network is said to have varying views. Many debates and court cases have erupted over what content can and cannot be shared over a peer-to-peer network.
Users of these sites frequently argue that freedom of speech allows us to share whatever we want on the internet.On the other hand, content creators frequently file copyright infringement lawsuits.Thus, option A is correct.
Learn more about peer-to-peer networks, here:
https://brainly.com/question/1172049
#SPJ2
17. What are the basic modes of operation of 8255?Write the features of mode 0 in 8255?
Answer:
There are two basic operational modes of 8255:
Bit Set/Reset mode (BSR mode).
Input/Output mode (I/O mode).
Features of 8255 Microprocessor:
Mode 0 : Simple Input/Output.
Mode 1 : Input/Output with handshake.
Mode 2 : Bi-directional I/O data transfer.
It has three 8-bit ports : Port A, Port B, and Port C, which are arranged in two groups of 12 pins.
The 8255 can operate in 3 I/O modes : (i) Mode 0, (ii) Mode 1, & (iii) Mode 2.
Dante needs to query a table to find all the references to a particular product and apply a 10%
discount. Which query should he utilize?
O make table query
O delete query
O update query
O append query
Answer:
update query
I hope this helps a little bit.
Answer:
update query
Explanation:
took the test
requires the receiver to guess the message by
using redundant bits.
Select one
O Forward error correction
OPanity check
ORetransmission
OBlock rolina
Answer:
Forward error correction requires the receiver to guess the message by using redundant bits.
hope it is helpful to you
Answer:
forward error correction
is the first one
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n's, if the number of times the characters appears is not exactly 1. g
Answer:
The program in Python is as follows:
string = input("String: ")
chr = input("Character: ")[0]
total_count = string.count(chr)
print(total_count,end=" ")
if total_count > 1:
print(chr+"'s")
else:
print(chr)
Explanation:
This gets the string from the user
string = input("String: ")
This gets the character from the user
chr = input("Character: ")[0]
This counts the occurrence of the character in the string
total_count = string.count(chr)
This prints the total count of characters
print(total_count,end=" ")
If the count is greater than 1
if total_count > 1:
Then it prints a plural form
print(chr+"'s")
If otherwise
else:
Then it prints a singular form
print(chr)
What symbol next to the records indicates that a table includes a subdatasheet? an asterisk a plus sign a question mark an exclamation point
Answer:
A plus sign
Explanation:
EDGE 2021
Answer: or in other words B
Explanation: on edg hop this helps
Which company provides a crowdsourcing platform for corporate research and development?
OA.
MTurk
OB.
WikiAnswers
O C.
MediaWiki
OD.
Innocentive
Answer:
OA.
MTurk(mechanical turk)
Explanation:
Mechanical Turk is a Microwork service provided by Amazon. Correct answer: C It is an online “crowdsourcing” marketplace that was launched in 2005 by Amazon.
This site (service) allows businesses and individuals to post short tasks and pay workers to complete them.
Mechanical Turk is a company that provides a crowdsourcing platform for corporate research and development.
What is Mechanical Turk?Mechanical Turk is a crowdsourcing platform that gather information and makes it possible for individuals and businesses to outsource jobs to people who have the ability to do the task online or virtually. These can include data entry, reasearch, survey participation and so on. to a distributed workforce who can perform these tasks virtually.
Crowdsourcing is a platform that gather information about jobs and service provider online.
Therefore, Mechanical Turk is a company that provides a crowdsourcing platform for corporate research and development.
Learn more of Crowdsourcing from the link below.
https://brainly.com/question/1788104.
What is Requirement Engineering process explain with the help of diagram? Find the functional and non-functional requirements of the given case study.
An automatic ticket issuing system sells rail ticket. User select their destination and input a credit card and a personal identification number. The rail ticket is issued and their credit account charged. When the user presses the start button, a menu display of potential destinations is activated, along with a message to the user to select a destination. Once a destination has been selected, users are requested to input their card. Its validity is checked and user is then requested to input a personal identifier. When the credit transaction has been validated, the ticket is issued
functional requirement defines a system or its component whereas a non-functional requirement defines the performance attribute of a software system. ... Types of Non-functional requirement are Scalability Capacity, Availability, Reliability, Recoverability, Data Integrity, etc
What is needed to broadcast a presentation on the internet using PowerPoint’s online service?
Answer:
a Microsoft account
Explanation:
Answer:
Its B
a Microsoft account
Explanation:
A project team using a linear, sequential model builds a software application over a long duration. All activities in the project are carried out one after the other. Once the product is tested, the team installs the application. Which phase of this model involves installation?
A.
system design
B.
coding
C.
deployment
D.
requirements gathering
E.
testing
Answer:
C. Deployment
Explanation:
Deployment is the phase at which the product is installed after testing.
Which is the least technically experienced technical support group?
O tier 2 support
tier 3 support
multi-channel support model
tier 1 support
Answer:
Tier 1 support
Explanation:
Of the given options, tier 1 support technical group is the least experienced group. This group of technicians is also referred to as level 1 technical group.
The tier 1 or level support are made up of junior technician, and they have few technical understandings.
Their roles include email response and basic troubleshooting, attending to phone calls, among others.
When a problem cannot be solved by tier 1 support technicians, they pass the problem to tier 2 support technicians,
-1
Draw a flowchart to input two
numbers in variables M and N and
print the multiplication table from 1*1
to M*N
Answer:A flowchart is a diagram that depicts the steps involved in solving a problem. The following flowchart shows how to output the multiplication table ( n * 1 to m * 1) of a number, n and m:
Which of the following protocols help IP in multicast service?
Select one:
ORARP
O CMP
O ARP
O IGMP
Answer:
I guess IGMP.............
Answer:
IGMP
Explanation:
The correct answer is actually IGMP snooping.
so from your options it's IGMP
are you interested in cyber security?
which shortcut can we use to make directional heading of a cuboid more obvious while in the lidar view
Answer:
cutting across
Explanation:
Good safety with the use of cellphones
Answer:
what kind of question is this ?
The EDI ____________layer describes the business application that i
driving EDI
a)EDI Semantic Layer c) EDI Transport Layer
b) EDI Standard Translation Layer d) Physical Layer
Answer:
a) EDI Semantic Layer
Explanation:
EDI is an acronym for electronic data interchange and it can be defined as a form of communication between interconnected computer systems and software applications with respect to business informations in standard digital formats.
This ultimately implies that, electronic data interchange (EDI) involves the transfer of business informations such as financial transactions between the computer systems of various organizations such as banks, companies, governmental agencies, etc. Thus, it avails businesses the ability to create strategic communications using computer to computer links to effectively and efficiently exchange business informations electronically or in digital formats.
Hence, the EDI Semantic layer describes the business application that is driving electronic data interchange (EDI).
Write a program that prompts the user to enter an oligonucleotide sequence, such as TATGAGCCCGTA.
If the user entered a valid oligo sequence consisting only of the characters A, C, G, or T, the program should then display the reverse complement of that sequence, in this case TACGGGCTCATA, along with text indicating that it is the reverse complement .
After displaying the reverse complement, the program should then prompt the user to enter another sequence. The program should continue this pattern of prompting the user for a new oligo sequence and displaying its reverse complement until the user enters a sequence with at least one character that is invalid (i.e. a character other than A, C, G, or T).
Answer:
Explanation:
The following code is written in Python. It continues looping and asking the user for an oligonucleotide sequence and as long as it is valid it outputs the reverse complement of the sequence. Otherwise it exits the loop
letters = {'A', 'C', 'G', 'T'}
reloop = True
while reloop:
sequence = input("Enter oligonucleotide sequence: ")
for x in sequence:
if x not in letters:
reloop = False;
break
if reloop == False:
break
newSequence = ""
for x in sequence:
if x == 'A':
newSequence += 'T'
elif x == 'T':
newSequence += 'A'
elif x == 'C':
newSequence += 'G'
elif x == 'G':
newSequence += 'C'
print("Reverse Complement: " + newSequence)
g Write a function called chain_words(str) which takes in one parameter which is a string that holds multiple words separated by spaces. Your function should return a string with the words chained together with an - (hyphen). You can first split the words at spaces and then join the words with - (hyphen). You can achieve this by using split and join methods respectively.
Answer:
Explanation:
The following is written in Python. The function takes in a string as a parameter. It then sperates the string at every space. Then it rejoins the list of strings with hyphens. Finally, returning the newly created string with hyphens.
def chain_words(str):
string_split = str.split(" ")
seperator = '-'
hyphen_string = seperator.join(string_split)
return hyphen_string
Which statement creates a StudentIDs object given the following code: public class StudentIDs> { private TheType item1; private TheType item2; public StudentIDs(TheType i1, TheType i2) { item1 = i1; item2 = i2; } }
a. StudentIDs newStudent = new StudentIDs(9, 5);
b. StudentIDs newStudent = new StudentIDs (Integer iVal1, Integer iVal2);
c. StudentIDs newStudent = new StudentIDs(int iVal1, int iVal2);
d. StudentIDs newStudent = new StudentIDs(9, 5);
Answer:
StudentIDs<TheType> newStudent = new StudentIDs<TheType>(9,5);
Explanation:
Required
Which statement creates a studentIDs object
The question has conflicting details as none of the options is true because some definitions that do not appear in the options.
So, I will answer the question based on the definition in the question.
From the question, we have the class definition to be:
public class StudentIDs<TheType extends Comparable<TheType>>
The above definition is a simple generic java class that follows:
public class Class-Name<Variable-name extends Comparable<Variable-name>>
The object of the class will be created using the following syntax:
Class-Name<TheType> Object-Name = new Class-Name<TheType>();
By comparison:
Class-Name = StudentIDs
Variable-name = TheType
So, the object will be defined as:
StudentIDs<TheType> newStudent = new StudentIDs<TheType>();
Solving further:
The class declares two variables (i1 and i2) as follows:
public StudentIDs(TheType i1, TheType i2)
This means that two TheType variables and/or values will be passed along with the definition of the class.
So, the object definition will be:
StudentIDs<TheType> newStudent = new StudentIDs<TheType>(9,5);