Answer:
nums = [14, 36, 31, -2, 11, -6]
print(nums)
Explanation: That should be 100%.
The Code Practice on Edhesive will be represented with the language of python language. there will be arrays and lists that will be presented. Thus, option A is correct.
What is code?A collection of commands that will be presented is referred to as computer code. It's also the name that was given to the source code. The translator has prepared for computer execution that will be presented.
Code is usually presented with a focus on producing various code-correct internet, application forms as well as a phone application.
The inputs will be
numbers = input()
Splits of numbers will be presented as
numList = numbers.split(' ')
Iterates will be presented with the list:
for i in range(len(numList)):
Conversion of every agreement will be;
numList[i] = int(numList[i])
The final line will be:
print(numList)
Learn more about code, here:
https://brainly.com/question/20712703
#SPJ6
The question is incomplete, Complete question probably will be is:
8.3 code practice adhesive
Write a program that uses an initializer list to store the following set of numbers in an array named nums. Then, print the array.
14 36 31 -2 11 -6
Sample Run
[14, 36, 31, -2, 11, -6]
what is computer memory measured in
Answer:
MB I think I learned it actually.
Explanation:
the best answer it requests services, data and other resources available on the server
Answer:
Explanation:
?
Which option is a means of reporting events via the Internet? O A. Taking photos to upload O B. Browsing for fun O C. Downloading music videos D. Searching with search engines
Answer:
your answer is A!
Explanation:
photos are often a great form of proof or example material when reporting something over the web!
HOW CAN YOU GET THE COOLEST FONTS ON GOGGLE SLIDES???
Hint: Im looking for like bubble letters or like stuff to like install for goggle slides, now mind u i do have a/am using a Chromebook so ya
Answer:
mhmm. you can go to www.bubbleimages.com
Explanation:
Fill in the blank with the correct response. Wanting to become a better archer is a what?
A video streaming website uses 32-bit integers to count the number of times each video is played. in anticipation of some videos being played more times than can be represented with 32 bits, the website is planning to change to 64-bit integers for the counter. which of the following best describes the result of using 64-bit integers instead of 32-bit integers? a. 2 times as many values can be represented. 32 times as many values can be represented. 2^32 times as many values can be represented. 32^2 times as many values can be represented. I know the answer is 2^32 but can someone explain it to me?
Answer:
2³² times as many values that can be represented
Explanation:
A 64 bit register can hold 2⁶⁴ different values, while a 32 bit register can hold 2³² different addresses
Therefore, a 64 bit can represent 2⁶⁴ ÷ 2³² = 2³² times as many values as can be represented by 32-bit
Therefore, the 64 bit can represent 2³² times as many values that can be represented by a 32 bit integer
write 3 things that can't be done without technology.
Answer:
Hacking Online Orders Math
Explanation:
while
norma
mean
cinta
to the user
a.) Define the term microcomputers.
Explanation:
Microcomputers are computers designed around a microprocessor, smaller than a minicomputers or a mainframes.
Hope it will help :)❤
Can someone tell me how this is a SyntaxError! (Python3)
Answer:
The expression on line 9 required 2 brackets
Explanation:
Given
The attached code
Required
Why syntax error.
The error points to line 10, but the error is actually from line 9
To get an integer input, the syntax is:
variable-name = int(input("Prompt"))
From the attached code, the line 9 is:
amount = int(input("Enter cheese order weight: ")
By comparing the syntax to the actual code on line 9, only 1 of the brackets is closed.
This, in Python 3 is a sytax error
Answer: it needs two brackets
Explanation: got it right on edgen
Would be easier to divide/fold a rectangular sheet of paper into 22 equal pieces or 24 equal pieces? Explain your answer. Please help !!!!!
Answer:
24 equal.
Explanation:
How do you think electronic spreadsheets have transformed businesses today?
9. Differentiate between bolding and highlighting
text.
(2 marks)
Answer:
Highlighting Text
- Highlighting text allows a user to move, copy, or cut that selected text. Highlighting an object, such as an icon, also allows it to be cut, copied, deleted, moved, viewed, opened, or otherwise manipulated.
Bolding Text
- A set of type characters that are darker and heavier than normal. A bold font implies that each character was originally designed with a heavier appearance rather than created on the fly from a normal character.
Explanation:
I hope it can help
I'm just putting this because I need to answer a question and I know nothing:)
Will this website ever get itself together to stop people from sending links?
Answer:
no
Explanation:
3.Choose the correct container for sugar
A:bag of sugar
B:Can of sugar
Answer:
bag of sugarrrrrrrrrrr
Answer:
The answer is A. bag of sugar
Here is the API for a robot library.
// moves the robot forward
function moveForward();
// turns the robot to the left
function rotateLeft();
// turns the robot to the right
function rotateRight();
// checks if a robot can move in any direction
// direction {string} - the direction to be checked
// return {Boolean} - true if the robot can move in that direction, otherwise returns false
function canMove(direction);
Which code segment will guarantee that the robot makes it to the gray square without hitting a wall or a barrier (black square)?
A.
B.
C.
D.
Answer:
hi
Explanation:
define file in context of computer programming
___are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
Answer:
Viruses
Explanation:
virusues are designed to infect and cause damage to operating system files, computer registry, and other locations on the motherboard
No matter what your fitness level is, you need to exercise more than 20 minutes to get any health or fitness benefit.
A.
True
B.
False
THE ANSWER IS FALSE!!!!!
Answer:
f
Explanation:
When you insert a copy of Excel data into a Word document the data is __________ in the Word document
Answer:
I don't know if I get a chance to get through
A cola container is in the shape of a right cylinder. The radius of the base is 4 centimeters, and the height is 12 centimeters. What is the volume of the container? A. B. C. D.
Answer:
Volume of cylinder = 603.42 cm² (Approx.)
Explanation:
Given:
Radius r = 4 cm
Height = 12 cm
Find:
Volume of cylinder
Computation:
Volume of cylinder = πr²h
Volume of cylinder = (22/7)(4)²(12)
Volume of cylinder = 603.42 cm² (Approx.)
Answer:
It is B, also know as 192π cm3
Explanation:
8. (a) Identify two advantages and four limitations of the Speech recognition devices.
Explanation:
Speech recognition technology allows computers to take spoken audio, interpret it and generate text from it
Activity in September 2014, the Federal Bureau of Investigation (FBI) announced that is next generation Idenufication system was fully functional The FBI named it the integrated Automated Fingerprint Identification system (IAFIS), Conduct online research on this system and answer the following questions 1. Which elements can be stored in IAFIS? 2. What is the response time of this system? 1. How has this system benefited the FBI
Answer:
(Answers may vary.)
In addition to fingerprints, IAFIS stores criminal histories, mug shots, and physical information like scars, tattoos, eye color, hair color, weight, and height. It also stores fingerprints of individuals who are or were employed by the US military and the federal government.
The system’s average response time for criminal fingerprint processing is about 27 minutes. Civil fingerprint processing takes over an hour.
Previously, the tenprint submission and identification was a manual, tedious process. It took the FBI weeks or months to process a single fingerprint submission. IAFIS has automated this process and added advanced identification capabilities. The submission and processing takes just few minutes. This has helped the FBI solve and prevent crime and tighten holds on criminals and terrorists.
Explanation:
In a blockchain, each block has a unique hash value which is dependent on the hash value of the previous block in the chain. What happens if any transaction data is changed or modified in the earlier existing blocks?
Answer: hello your question lacks the required option, below are the missing options
A. The transaction data in the tampered block is deleted, and a copy is created with the same hash value.
B. The hash values of transaction data of subsequent blocks are validated, and the chain is broken.
C. The hash value for the entire block is nullified, creating a domino effect on all subsequent blocks.
D. The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues.
answer : The hash values of subsequent blocks are updated as soon as they are tampered with, and the chain continues ( D )
Explanation:
What happens if a transaction data is changed in an earlier existing block in a Blockchain is that the Hash values of subsequent blocks will be updated as soon as they are tampered with and the chain will continue.
Blockchain is a specially design system for recording information, hence any change in data inputted in an earlier existing blocks that changes will automatically be updated as well in all preceding blocks.
Consider the following code:
x = "apple"
y = x
z = "banana"
print(x + " " + y + "\n" + 2)
Answer:
apple apple
banana
Explanation:
Given - Consider the following code:
x = "apple"
y = x
z = "banana"
To find - print(x + " " + y + "\n" + z)
It will print -
apple apple
banana
First will apple followed by '' '' that is space then y which is equal to x that is apple then followed by ''\n'' new line then banana.
So, The answer would be
apple apple
banana
Notation used -
'' '' represents space between two values
''\n'' represents new line
Discuss any five factors that hinder the application of computer application in business organization
Answer:
Many factors can cause inderdce to the application of computer application in any business organization
Explanation:
Various factors affect and hinder the use of computers in the business scenario such as Time and cost, that is business think that new and different computer application is a waste of time and money. lack of training of employees, most of the emptied are not properly trained and lack professionalism. Old and primitive software that cannot be replaced, due to the old tools and methodologies of the company the business may not feel the need to change. Risks of hacking and data leak, as new software, can contain hidden costs which may destroy or leak information or may be more vulnerable to risks. Low financial support, such as new startup or a low-paying corporation.what is the deck of a suspension bridge called
Answer:
that would be the tension in the cables and compression in the towers I believe, my aunt and my uncle work on technology stuff and I'm learning from them.
write 3 things that can't be done without technology. write your opinion?
Answer: Call a theater to get movie times, Use a phone book to find a company to do work around your house, and Park your used car on the street with a sign that says it’s for sale.
Explanation: my opinion is that it's fine to do each of those things without technology. Because technology is supposed to help the limited capacity of the human brain and improve things that make every day life quicker, easier, leaves more time to do something else.
Answer:
1) Filming, depending on the camera it is still technology that everyone uses on a daily bases with no hesitation for use.
2) Vehicles, I'm not sure if they are a type of technology but for this case lets just say they are. With vehicles we can get to places much faster then walking or taking a carriage.
3)Records, in this case music. Without records or anything of the sort we wouldn't exactly be able to listen to our favorite music at all times.
Philp has taken selfie wearing T-shirt that read "California 92." However, the text is mirrored in the selfie. He wants to upload this picture wothout the mirrored effect.
To correct the mirroring text, Philip can (flip, crop, distort) the picture (vertically, horizontal, diagonally).
Answer: flip the picture vertically
Explanation: horizontally would make it upsidedown. And diagonally isn’t right either.
How is this a SyntaxError?(python3)
Answer:
1 bracket, instead of 2 is closed in line 9
Explanation:
Given
The attached code
Required
Why is line 10 a syntax error?
The error points to line 10.
From the attached code, the line 9 is:
amount = int(input("Enter cheese order weight: ")
When converting an input to integer, the syntax is:
variable = int(input("Prompt"))
But, only 1 bracket is closed in the program, where 2 is required.
This is definitely a syntax error
Answer: theres only one bracket
Explanation: got it right on edgen
this not a queston but a warning
if you see a tnyInk link DO NOT DOWNLOAD THE FILE IN IT they most likley contain malware and if you see that link in a comment report it please it will help. and also show this to your freinds or someone.