Answer: The answer is B Hope this helps :) Please mark Brainliest
Explanation:
what is the purpose of writing a topic sentence
Answer:
A topic sentence must highlight the main idea of a paragraph, letting the reader know what the paragraph will be about. The topic sentence must present an idea that will unify the rest of the paragraph while relating it back to the main thesis of the paper.
Explanation:
Answer:
To summarize the main point of paragraph
Explanation:
write algorithm and flowchart to calculate sum,difference, product and quotient of two integer number given by the user.
Answer:
Step1: Start
Step2: Initialize the count variable to zero
Step3: Initialize the sum variable to zero
Step4: Read a number say x
Step 5: Add 1 to the number in the count variable
Step6: Add the number x to the sum variable.
Step7: Is the count variable in the memory greater than 50?
If yes, display the sum: go to step 8.
If No, Repeat from step 4
Step8: Stop
Explanation:
2. When You buy 4 GB memory unit (pendrive) you
will get memory less than 4 GB?
Answer:
Yes.
Explanation:
I believe so, because the pendrive takes some storage for it to actually function. If they wanted it to have exactly 4 GB of memory, they would have to add extra memory.
For this program you are given a String that represents stock prices for a particular company over a period of time. For example, you may be given a String that looks like the following:
String stockPrices = "1,22,30,38,44,68,49,73,52,66";
Each number in this String represents the stock price for a particular day. The first number is day 0, the second number is day 1, and so on. You can always assume tha the supplied string will formatted using commas to separate daily stock prices. The individual stock prices will always be valid integers, but they many not always be the same number of digits (i.e. 1 is a valid stock price, as is 1000. Your program should work with strings of any length. The "split" method might come in handy for this problem. Your task is to analyze the supplied string and determine the following:
• The highest price for the stock
• The day when the highest price occurred
• The lowest price for the stock
• The day when the lowest price occurred
Here are two sample runnings of the program:
// First run
Please enter stock prices: 1,22,30,38,44,68,49,73, 52,66
Highest price: 73 ocurred on day # 7
Lowest price: 1 occurred on day # 0
// pecond run
Please enter stock prices: stock_prices - 41,37,40,54,51,63,54,47,23,33
Highest price: 63 occurred on day # 5
Lowest price: 23 accurred on day # 8
Write your program on the following page. You can use this page for rough work.
Answer:
price = input("Please enter stock prices: ")
x = price.split(",")
min = int(x[0])
max = int(x[0])
for i in x:
if int(i) < min:
min=int(i)
if int(i) > max:
max=int(i)
index = x.index(str(max))
print("Highest price: "+str(max)+" ocurred on day # "+str(index))
index = x.index(str(min))
print("Lowest price: "+str(min)+" ocurred on day # "+str(index))
Explanation:
This solution is implemented in Python
This prompts user for stock prices
price = input("Please enter stock prices: ")
This places the price in a list
x = price.split(",")
The next two lines initialize the lowest and highest to stock at index 0
min = int(x[0])
max = int(x[0])
This iterates through the list
for i in x:
The following if statement checks for the lowest
if int(i) < min:
min=int(i)
The following if statement checks for the highest
if int(i) > max:
max=int(i)
This gets the day for the highest stock
index = x.index(str(max))
This prints the highest price and the day it occurred
print("Highest price: "+str(max)+" ocurred on day # "+str(index))
This gets the day for the lowest stock
index = x.index(str(min))
This prints the lowest price and the day it occurred
print("Lowest price: "+str(min)+" ocurred on day # "+str(index))
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.
The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.
Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!
Coding portion:
public class Password
{
public static void main(String[] args)
{
// Prompt the user to enter their password and pass their string
// to the passwordCheck method to determine if it is valid.
}
public static boolean passwordCheck(String password)
{
// Create this method so that it checks to see that the password
// is at least 8 characters long and only contains letters
// and numbers.
}
}
Answer:
import java.util.regex.*;
import java.util.Scanner;
public class Password
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
System.out.println("Please enter the Password. \n");
String passwordString = input.next();
System.out.println(passwordCheck(passwordString));
}
public static boolean passwordCheck(String password){
if(password.length()>=8 && password.matches("[a-z0-9A-Z]+")){
return true;
}
else{
return false;
}
}
}
Explanation:
The Java class "Password" is used by the program to make an instance of the password object and check its validity with the passwordChecker method defined within the Password class. The passwordChecker method only matches alphanumeric passwords, that is, passwords with alphabets and numbers. If a non-alphanumeric character is encountered, the boolean value false is returned.
A device is sending out data at the rate of 1000 bps. How long does it take to send
out (a)10 bits, (b) a single character (8 bits) and (c)100,000 characters?
Answer:
0.01 second ; 0.008 seconds; 800 seconds
Explanation:
Given that:
Sending rate = 1000 bps
Rate of 1000 bps means that data is sent at a rate of 1000 bits per second
Hence, to send out 10 bits
1000 bits = 1 second
10 bits = x
1000x = 10
x = 10 / 1000
x = 0.01 second
2.)
A single character 8 - bits
1000 bits = 1 second
8 bits = (8 / 1000) seconds
= 0.008 seconds
3.)
100,000 characters = (8 * 100,000) = 800,000
1000 bits = 1 second
800,000 bits = (800,000 / 1000)
= 800 seconds
describe an activity to prove that sounds can travel in a liquid medium
in long
An activity to prove that sounds can travel in a liquid medium in long time is:
Use a tub that is filled with water, also take a bell in one of your hand and then one can dip it into the water. Note that you need to Keep one of your ears close to the surface of water and do not let the water go into the ear. Then ring the bell inside the tub water. You will be able to hear the sound very clearly. This tells that sound can travel via liquids.
How do sounds travel in liquids?Sound waves is known to be one that tends to travel a lot faster in denser forms or kinds of substances due to the fact that neighboring particles will be able to bump into each other.
Therefore, An activity to prove that sounds can travel in a liquid medium in long time is:
Use a tub that is filled with water, also take a bell in one of your hand and then one can dip it into the water. Note that you need to Keep one of your ears close to the surface of water and do not let the water go into the ear. Then ring the bell inside the tub water. You will be able to hear the sound very clearly. This tells that sound can travel via liquids.
Learn more about sounds from
https://brainly.com/question/1199084
#SPJ1
What’s the term for a current flow in which electrons move in one direction
Answer:
Direct Current
Explanation:
MARK ME BRAINLIEst pls
One of the following is NOT a basic linked list operation:_________.
a) search
b) insert
c) create
d) delete
e) traverse
f) destroy
g) build list from file
Answer:
One of the following is NOT a basic linked list operation:_________.
g) build list from file
Explanation:
Linked list operation is the creation of trees and graphs or a chain of data elements, which are called nodes. Each note points to the next using a pointer. In linked lists, each node consists of its own data and the address of the next node. A linked list, which may be single, double, or circular, forms a chain-like structure that builds from one node to the other.
8. T/F: At the bottom of a slide you are working on you can enter notes to indicate what yo
True
False
« BACK
LESSON 8.1 - INTRO TO PRESENTATIONS
Answer: True. Hope it helps!
Jordan uses a spreadsheet to keep track of how many hits each player on a baseball team has had in each game
throughout the season. For every game, each player's name appears in a column that Jordan has titled "Player."
Next to that, a column titled "Hits" shows the number of hits for each player in a single game.
What function should Jordan use to find the average number of hits per game for player A_Clemente?
O SUMIF(Hits, "A Clemente", Player)
O SUMIF(Player, "A Clemente". Hits)
O AVERAGEIF(Hits, "A Clemente", Player)
O AVERAGEIF(Player,"A_Clemente", Hits)
Answer:
AVERAGEIF(Player, "A_Clemente", Hits)
Explanation:
The AVERAGEIF function allows users to calcule the mean value of numerical columns while also Given certain constraints within a single function call. The AVERAGEIF takes in 3 arguments.
The first is a column which houses the range of the constraint we would like to apply on our function.
The second argument is the constraint itself which should reside within the values in the range defined in the first argument.
The third argument is the numerical column whose average is calculated based on the defined constraint.
Therefore, in the scenario above, Player is the column containing player names, which it's value will later be used as a constraint
"Clemente_A" the constraint, only values pertaining to Clemente_A will be defined.
Hits, the numeric column whose value is averaged based on the constraint given.
C:/Users/Documents/resume.docx Where is the "resume" document located in this file structure?
Answer:
"resume.docx" is located in "Documents"
Explanation:
[<drive-letter:: represents drive name>]:/Main_Directory/Sub_Directory/ETC..
The "resume" is located in the "Documents" according to the file structure.
Given the information C:/Users/Documents/resume.docx, this can be interpreted as Documents is in the Users folder and the resume can be found in the Document folder.
We can also say that the document folder was created by the user and the "resume" file is placed directly into the documents.
Based on the explanation, we can say that the "resume" is located in the "Documents" according to the file structure.
Learn more here: https://brainly.com/question/13715153
To make a window wider, you would move the pointer until it changes to the horizontal resize shape and then
Answer:double click it .
Explanation:
The quality of an image is compromised when, what are stretched ?
Answer:
pixels
Explanation:
The quality of an image is compromised when pixels are stretched the answer would be stretched.
What is resolution?The number of unique pixels that may be displayed in each dimension depends on the display resolution or display modes of a digital television, computer monitor, or display device.
As we know,
The smallest component on your screen is a pixel. Resolution: The size of the pixel is discussed here.
The resolution increases with pixel size. Although strictly a printing word, DPI (or dots per inch) refers to the number of actual ink dots on a printed object.
When pixels are stretched, an image's quality suffers.
Thus, the quality of an image is compromised when pixels are stretched the answer would be stretched.
Learn more about the resolution here:
https://brainly.com/question/989447
#SPJ6
1. Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z
2. Write an if statement that assigns 10 to the variable b, and 50 to the variable c if the
3. Write an if-else statement that assigns 0 to the variable b if the variable a is less
than 10. Otherwise, it should assign 99 to the variable b.
Has and how does it work?
Algorithm Workbench
of the variable x is greater than 100.
variable a is equal to 100.
Answer:
if x > 100:
y = 20
z = 40
Explanation:
In 200 words or more, please describe the Cyber Security Enhancement Act. Include when it was implemented and what it's purpose is
Answer:
The summary below was written by the Congressional Research Service, which is a nonpartisan division of the Library of Congress.
12/18/2014--Public Law. (This measure has not been amended since it was passed by the Senate on December 11, 2014. The summary of that version is repeated here.)
Cybersecurity Enhancement Act of 2014 - Title I: Public-Private Collaboration on Cybersecurity - (Sec. 101) Amends the National Institute of Standards and Technology Act to permit the Secretary of Commerce, acting through the Director of the National Institute of Standards and Technology (NIST), to facilitate and support the development of a voluntary, consensus-based, industry-led set of standards and procedures to cost-effectively reduce cyber risks to critical infrastructure.
Requires the Director, in carrying out such activities, to: (1) coordinate regularly with, and incorporate the industry expertise of, relevant private sector personnel and entities, critical infrastructure owners and operators, sector coordinating councils, Information Sharing and Analysis Centers, and other relevant industry organizations; (2) consult with the heads of agencies with national security responsibilities, sector-specific agencies, state and local governments, governments of other nations, and international organizations; (3) identify a prioritized, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls, that may be voluntarily adopted by owners and operators of critical infrastructure to help identify, assess, and manage cyber risks; and (4) include methodologies to mitigate impacts on business confidentiality, protect individual privacy and civil liberties, incorporate voluntary consensus standards and industry best practices, align with international standards, and prevent duplication of regulatory processes.
Prohibits the Director from prescribing a specific solution or requiring that products or services be designed or manufactured in a particular manner.
Prohibits information provided to NIST for purposes of developing cyber risk standards from being used by federal, state, tribal, or local agencies to regulate the activity of any entity.
Directs the Comptroller General (GAO) to submit biennial reports over a specified period concerning NIST's progress in facilitating the development of such standards and procedures. Requires such reports to address the extent to which such standards: (1) are voluntary and led by industry representatives, (2) have been promoted by federal agencies and adopted by sectors of critical infrastructure, and (3) have protected against cyber threats. Instructs the Comptroller General to include in such reports an assessment of the reasons behind decisions of sectors to adopt or not adopt such standards.
Title II: Cybersecurity Research and Development - (Sec. 201) Directs the following agencies, working through the National Science and Technology Council and the Networking and Information Technology Research and Development Program, to develop, and update every four years, a federal cybersecurity research and development strategic plan:
Explanation:
What is the name of the variable in the
following code?
Answer:
Lift
Explanation:
When coding, you use a variable name for an object, and assign it to move up, down, and/or sideways.
Which of the following calculates to 10?
3*(6+2/2)
(3* 6) + 2/2
(3* 6+ 2)/2
3*6+2/2
Answer:
C. (3* 6+ 2)/2
Explanation:
Arithmetic operation are performed sequentially using the rule known as bracket of division, multiplication, addition and subtraction (BODMAS).
(3* 6 + 2)/2
Simplifying the above mathematical expression, we have;
(18 + 2)/2
= 20/2 = 10