Answer:
it's 2
Explanation:
it goes 0, 1, 2.
The index of 5 in the following list [2, 3, 5, 1, 6] is 2. The correct option is b.
What is a list in computer language?A list is a collection of items that can be ordered or unordered. Adding, removing, and storing items are just a few of the many uses for lists. However, the software needs adequate memory to keep up with changes made to the list in order for the programmer to do the various duties for the list.
An ordered group of values is a list. The components of a list are referred to as its elements or items. An ordered list of numbers (or other items like geometric objects) is referred to as a sequence, and it frequently follows a certain pattern or function.
A list is a series of different variables that are all gathered under one common name. Rather than creating a program with numerous variables,
Therefore, the correct option is b, 2.
To learn more about the list, refer to the link:
https://brainly.com/question/14297987
#SPJ2
The question is incomplete. Your most probably complete question is given below:
O 4
02
O 1
03
What is the thickness of a character’s outline called
Answer:
actually is answer is font weight
hope it helped!
Display filters and capture filters can be interchanged because they use the same syntax. A. True B. False
Answer:
Very True
Explanation:
Describe the general strategy behind deadlock prevention, and give an example of a practical deadlock prevention method.
Multi-programming (or multi-tasking) enables more than a single process to apparently execute simultaneously. How this can be achieved on a uni-processor?]
Answer:
In multi-programming, you use semaphore constructs to protect shared resources. Your program thread or process will block if you want to claim a semaphore when another thread or process has it claimed.
Generally you need to keep the code scope of the claimed semaphore (a.k.a. the critical section) as small as possible, and also, prevent claiming another semaphore within a given critical section.
Course Aggregation Many times, departments are only interested with how students have done in courses relative to a specific major when considering applicants for admission purposes.
For this problem you are given a dictionary where the keys are strings representing student ids and the values are dictionaries where the keys represent a course code and the value represents a grade. Your task is to write a function that given a dictionary of the described format and a prefix for course codes, return a dictionary where each key is a student id and the corresponding value is the average grade of the student only in courses that start with the given prefix.
def course_grader (student_to_grades, course_prefix): ({str, {str, float}}) -> {str, float} I: a dictionary containing the grades of students (as described above) and a course code prefix P: compute and store the average grade of all students only for courses that start with the given course prefix 0: a dictionary of student ids to average grades as described in the Processing step pass
Answer:
def course_grader(student_to_grades, course_prefix):
student_grades = dict()
for key, value in student_to_grades.items():
grade_score = 0
for course,grade in value.items():
if course_prefix == course:
grade_score += grade
student_grades[key] = grade_score / len(value.keys())
return student_grades
Explanation:
The course_grader function is a python program that accepts two arguments, the student dictionary and the course prefix. The function returns a dictionary of the student id as the key and the average grade of the student as the value.
Janet needs to flag a message for follow-up in Outlook. Which option is not a default?
Today
Tomorrow
Next Week
Next Tuesday
Answer:
Next tuesday.
Explanation: Its to specific
Given all of the limitations of MBR, is it still relevant in current day use?
Explanation:
MBR does have its limitations. For starters, MBR only works with disks up to 2 TB in size. MBR also only supports up to four primary partitions—if you want more, you have to make one of your primary partitions an “extended partition” and create logical partitions inside it.
A value chosen by the responder to identify a unique IKE SA is a _________.
A. Initiator SPI
B. Responder SPI
C. Flag
D. Message identifier
Answer:
Responder SPI
Explanation:
Responder SPI : Cookie of an individual referring to an application from the SA organization, a message from the SA, or a delete from the SA.
Write a recursive function named double_digits that accepts an integer as a parameter and returns the integer obtained by replacing every digit with two of that digit. For example, double_digits(348) should return 334488. The call double_digits(0) should return 0. Calling your function on a negative number should return the negation of calling it on the corresponding positive number; for example, double_digits(-789) should return -778899.
Answer:
A recursive function known as double-digit is a function that accepts as a parameter and returns the integer that is obtained by changing each digit with double digits. For example 425 should be return as 442255.
In the given scenario
the function will be as follow
If
def double_digits:
n < 0:
return -1 * double_digits ( -1 * n )
elif n = 0
return o
else:
result
double_digits ( n // 10 )
return int ( str ( result ) + str ( n % 10 ) + str ( n % 10 )
Test the function as follow
print ( double_digits ( 348 ) )
Result
334488
Test the function as follow
print ( double_digits ( 0 ) )
Result
0
Test the function as follow
print ( double_digits ( -789 ) )
Result
-778899
If you are working on doing senior portraits and want a lens that will give you the best shallow depth of field which lens would you choose?
a) 55mm f1.2 (focal length of 55mm, maximum aperture of 1.2)
b) 28-80mm f4.5 (Zoom lens with focal length from 28-80mm, max aperture 4.5)
c) 18mm f5.6
d) 50mm f1.4
45 points and brainliest
Answer: The answer is C Hope this helps :) Please mark Brainliest
Explanation:
Answer:
c) 18mm f5.6
Explanation:
For the best lens that offers the best shallow depth of field, you need to choose the one with the maximum apertature but does not zoom.
Hence choice c) has the maximum aperture and does not zoom.
Hope this helps :)
Suppose a switch is built using a computer work station and that it can forward packets at a rate of 500,000 packets per second, regardless (within limits) of size. Assume the workstation uses direct memory access (DMA) to move data in and out of its main memory, which has a bandwidth of 2 Gbps, and that the I/O bus has a bandwidth of 1 Gbps. At what packet size would the bus bandwidth become the limiting factor
Answer:
When the transmission exceeds 667 packets
Explanation:
In computer networking, a packet is a chunk of data transmitted across the network. The packet size of an Ethernet network is 1.5kilobytes, while the packet size of an IP packet payload is 64 kilobytes.
A switch is a physical network device that connects nodes or workstations while communicating the packets (or frames). The I/O bus size bandwidth is 1Gbps which allows approximately 667 packets. Once this packet size is crossed, the bus becomes a limiting factor or bottle neck.
For an interview, the most used microphone types are
A. Boom mics, long range mics
B. Strap, studio recording mics
C. Lapel or handheld
D.No mics are needed
If I want to control the aperture and I want the camera to control the shutter speed which setting on the mode dial is most appropriate?
a)AV
b) TV
c) M
d) P
since this is my last question im giving 100 points and brainliest
Answer:
answer is a
hopes this helps
Analyze the needs of the National Security team and help them articulate its problems, develop solutions to meet its needs, and deliver a recommendation that is aligned with the extant national objectives.
Answer:
Following are the solution to this question:
Explanation:
The Council's role has been to assist and support the President regarding national security and foreign policies ever since its inception under Truman. This Committee often acts as the primary arm of a President to organize these initiatives between government agencies.
The Leader holds sway over the NSC. Its Secretary Of Defense offers a range of options for the Administration on policy issues. The director of national intelligence helps prepare the administration's foreign travel, among other tasks, and offers context memos and staffing for the administration's discussions and phone interviews involving global leaders.
Safety investments were taken for many years utilizing threat cost-benefit analysis wherein the effect metric has been largely focused on even a risk reduction comparative estimate. To evaluate investment decisions, most aim to conduct similar analyses.
Even so, the potential threat is much harder to measure for high-security installations that potential hazard since the likelihood of an attack is highly uncertain and depends strongly on undefinable psychological factors like deterrence as well as the intensity of enemy goals.
what stage is the most inner part of the web architecture where data such as, customer names, address, account numbers, and credit card info is the store?
Explain to Alana why she might not want to blast her boss on social media just yet.
Answer: She might get fired. And who knows, if she doesn't, she might get a raise!
Why do people want phones so bad??
To help explain this, take a look at these reasons why kids should have cell phones:
#1 To keep in touch. What happens if you're running late picking your child up from school? ...
#2 To talk to friends. ...
#3 To stay safe. ...
#4 To develop essential skills. ...
#8 To improve their organization. ...
#11 To encourage responsibility.
The material inspection and recieving report the multi-purpose document that serves as evidence of inspection and acceptance, shipping document, receiving document, and contractor invoice is designated as the:________.
Answer:
DD Form 250
Explanation:
DD Form 250 which is an acronym for Department of Defense Form 250.
It is the Material Inspection and Receiving Report that is used for contracts supplies and services including acquiring noncommercial commodities such as:
1. Acknowledgment of equipment by the Government
2. Contractor's invoice for expense.
3. loading record for hauling and acquiring.
4. Proof of Government Quality assessment.
Hence, in this case, the correct answer is DD Form 250.
Benjamin took a photo that focused on certain part of an image while blurring out the rest. What is this effect called?
A.
alternate focus
B.
major focus
C.
minor focus
D.
selective focus
Answer:
(D) selective focus
Explanation: hope this helps!
Answer:
D. Selective Focus
Explanation:
Photographers commonly use the tilt-shift effect to focus on a certain part of the image while blurring the rest of the photograph. They refer to this as selective focus.
You manage a Windows server that has an attached printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows:Sally needs to connect to a printer, print documents, and pause and resume her own print jobs.Damien needs to pause and resume documents for all users, but does not need to change printer properties.You want to assign the most restrictive permissions that meet the sales manager's requirements. What should you do
Answer:
Damien would be assign the Manage Documents permission while Sally on the other hand will be assign the permission to print.
Explanation:
Based on the information given in order for me to assign a restrictive permission that will meet the requirements of the sale manager's what I will do is for me to assign the Manage Documents permission to Damien reason been that Damien only needs to stop and resume the documents for all users in which he does not need to change the printer properties and to assign the permission to print to Sally reason been that Sally only needs to connect to a printer and to print documents in which she will then stop and resume her own print jobs.
g Create a Java program that takes input of a list of integers from the user, stores them into an array and then finally uses the array contents to output the list of integers in reverse. The user's input begins with the number of integers to be stored in the array. For coding simplicity, follow each output integer by a space, including the last one. Assume that the list will always contain fewer than 20 integers.Create a Java program Ex: If the input is: 8 5 2 3 4 10 6 8 9
Answer:
import java.util.Scanner;
public class Main{
public static void main(String[] args) {
int arraylent;
Scanner input = new Scanner(System.in);
System.out.print("Array Length: ");
arraylent= input.nextInt();
int[] myarray = new int[arraylent];
for(int i = 0; i<arraylent;i++)
myarray[i] = input.nextInt();
for(int i = arraylent-1; i>=0;i--)
System.out.println(myarray[i]);
}
}
Explanation:
This declares the length of the array
int arraylent;
This next two lines prompt and get the array length i.e. number of input
System.out.print("Array Length: ");
arraylent= input.nextInt();
This declares the array as type integer. And the length of the array is gotten from the user input
int[] myarray = new int[arraylent];
This gets the items of the array
for(int i = 0; i<arraylent;i++)
myarray[i] = input.nextInt();
This reverse and prints the array
for(int i = arraylent-1; i>=0;i--)
System.out.println(myarray[i]);
What is the name of the tab that becomes available after you add and select an image in your PowerPoint presentation?
Home
Insert
Picture
View
ASAP PLS
Answer:
INSERT
Explanation:
INSERT PCIURE
You need to update your router settings, so you log into the administration panel, Whose Internet protocol (IP) address is 192.168.0.1. which IP version is this?
A-IPv4
B-IPv2
C-IPv6
D-IPv1
Answer:
D
Explanation:
fast guys can u tell its answer
find the count of value from cells a5 through e12
Answer:
See the bottom status bar of excel, it will show the average, count and sum of values in the selection.
Which of the following apertures will give you the shallowest depth of field?
a)2.8
b)5.6
c)11
d)22
e)2
50 points and brainliest
Answer:
a.2.8
The f-stops work as inverse values, such that a small f/number (say f/2.8) corresponds to a larger or wider aperture size, which results in a shallow depth of field; conversely a large f/number (say f/16) results in a smaller or narrower aperture size and therefore a deeper depth of field.
What does Stand for in web design
Answer:
g
Explanation:
h
Jorge is sending a message to Thomas but would like a copy sent to his external email address as well. Jorge does not want Thomas to see this copy that was sent.
Which mail field will Jorge use to achieve this goal?
To:
From:
CC:
BCC:
Answer: BCC (fourth choice)
=================================================
Explanation:
CC stands for "carbon copy".
BCC stands for "blind carbon copy".
Filling out forms is a tedious process. It's even more tedious when you have to repeat yourself multiple times. Carbon copy paper technology allows you to fill out one form and have those inputted entries be copied to the layers below. In terms of email, a carbon copy (CC) email is just an email sent to more than one person. In the CC line, recipients can see who the other people are in the email chain.
In contrast, a blind carbon copy is where the recipients cannot see who is in the BCC line. This allows Jorge to send the message copy to an external address without Thomas knowing.
How can you get access to help? Check all that apply
Answer:
The answer is "F1"
Explanation:
Please find the complete question in the attachment file.
The F1 key is also known as the function key, which can be used to configure on a device or console key to cause such actions, a form of a soft button, to also be performed by a web browser control parser or software application. The main purpose of the F! key is to open the Help screen for all programs.
Is it important to study information systems
Answer:
There is massive importance if you want to study information study.
It can help you understand the data, organize, and process the data, using which we can generate and share information.
Explanation:
It largely depends on your interest and requirement, but a better knowledge or clue about information systems may help analyze the data especially if you want to become a data scientist, machine learning, Artificial intelligence or deep learning, etc.
It can help you understand the data, organize, and process the data, using which we can generate and share information.
A great understanding of information systems may exponentially increase the productivity, growth, performance, and profit of the company.
Most Professions get exposed to information Systems no matter what their career objective is, as it may help in having better decision making based on the information they get through data.
So, yes!
There is a massive importance if you want to study information study.
As you draw a star, pressing the shift key while you drag increases the number of points on the star. True or false
Answer:
true
Explanation:
User max owns a directory games, containing a text file called ourgames.txt that he shares with users belonging to the group gameplayers. Those users may read and execute this file, but not delete it. They may not add other files to the directory. Others may neither read, write, nor execute anything in games. What would be the appropriate ownerships and permissions for both directory games and the file ourgames.txt look like
Answer:
The directory games folder: drwxr-x---
ourgames.txt files : -rwxr-x---
Explanation:
The directory games and the ourgames.txt file are owned by max who has read, write and execute permissions for both, where the 'd' in the first column represents the directory. The gameplayers group has read and execute permissions represented by the 'r' and 'x' letters. The other group is the third section with just dashes which means no permission is granted for the file.