1. While a command is executing, the shell waits for the command to finish before executing the next command. If you do not want to wait for a command to finish before running another command, you can run the command in the background by appending an ampersand (&) at the end of the command. This allows you to continue using the shell while the command is executing.
2. Using sort as a filter, the sequence of commands can be rewritten as follows:
```
$ sort list > temp &
$ lpr temp
$ rm temp
```
In this sequence, the `sort` command is run in the background by appending `&` at the end. This allows the shell to execute the next command (`lpr`) without waiting for `sort` to finish. Once `lpr` is executed, the `rm` command removes the temporary file `temp`.
3. PID stands for Process IDentifier. PID numbers are unique numerical identifiers assigned to each running process on a computer system. These numbers are useful when running processes in the background because they allow you to identify and manage individual processes. The `ps` utility (or `ps -e` command) displays the PID numbers of the commands you are running, along with other process information.
4. Using wildcards, the commands to achieve the given tasks are:
a. `ls section*`
b. `ls section[1-3]`
c. `ls intro`
d. `ls section[13] ref[13]`
5. a. `grep -ci 'a'` (displays the count of lines containing the word 'a' or 'A')
b. `ls -d *.[cC]`
c. `ls -r`
d. `ls -S | lpr`
6. a. `sort numbers > phone_list`
b. `tr '[{]' '(' < permdemos.c | tr '[}]' ')' > modified_file`
c. `cat part1 part2 > book`
7. a. `cat`, `awk`
b. `grep`
c. `sort`
d. `cat file.txt | grep 'pattern' | wc -l`
8. a. `grep 'pattern' < input.txt > output.txt`
b. `grep 'pattern' < input.txt`
c. `grep 'pattern' > output.txt`
d. `cat file.txt | grep 'pattern'`
grep is used as a filter in cases (a), (b), and (d).
9. The error message "rm: cannot remove 'abc': No such file or directory" indicates that the file "abc" does not exist in the current directory. A subsequent `ls` command would display the following filenames: "abd", "abe", "abf", "abg", "abh".
10. To demonstrate that the shell creates the output file immediately, you can use the following command:
```
$ echo "Hello, world!" > output.txt
$ ls output.txt
```
Running the `ls` command immediately after the first command will display the "output.txt" file, indicating that it has been created before the command was executed.
11. If Max accidentally deletes his PATH variable, he may encounter problems when trying to execute commands that are not located in the current directory or specified with an absolute path. Without the PATH variable, the shell will not know where to find these commands. To easily return PATH to its original value, Max can open a new shell or terminal session, as it will inherit the default PATH variable from the system's configuration.
12. a. To empty a file without invoking an editor, you can use the following command:
```
$
> file.txt
```
This command uses the shell's output redirection to truncate the file and make it empty.
b. You might have permission to modify a file that you cannot delete if the file's permissions allow write access but do not allow the delete (unlink) operation. In such cases, you can modify the file's content, but you cannot remove the file itself.
13. If you accidentally create a filename that contains a nonprinting character, such as a control character, you can remove the file by specifying the filename using the appropriate escape sequence. For example, if the filename contains a control character represented by '^G', you can remove the file using the following command:
```
$ rm $'filename^G'
```
The `$'...'` syntax allows you to use escape sequences in the filename.
14. The noclobber variable in the shell, when enabled, prevents existing files from being overwritten by redirection operators (`>` or `>>`). However, the `cp` and `mv` commands do not respect the noclobber variable because they are designed to explicitly modify or move files, and not to redirect output. Therefore, the noclobber variable does not protect against overwriting existing files when using `cp` or `mv`.
15. Command names and filenames usually do not have embedded spaces because spaces are used as delimiters by the shell. If you want to create a filename containing a space, you can enclose the filename in quotes or use escape characters. For example, to create a filename "my file.txt", you can do either of the following:
```
$ touch "my file.txt"
$ touch my\ file.txt
```
To remove a filename containing a space, you can use the same quoting or escape character techniques. For example:
```
$ rm "my file.txt"
$ rm my\ file.txt
```
Learn more about Unix/Linux Shell here: brainly.com/question/3500453
#SPJ11
Define a class Sphere to input radius of a sphere and compute the volume of it. Volume = πr3 (where π=3.14)
Lets use Python
Program:-
\(\tt r=(float(input("Enter\:the\:radius\:of\:Sphere=")))\)
\(\tt V=4/3*3.14*r**3\)
\(\tt print("Volume\:of\:the\:sphere=",V)\)
Output:-
\(\tt Enter\:the\:radius\:of\:the\:sphere=3\)
\(\t Volume\:of\:the\:Sphere=103.4\)
What is the term for a male reproductive cell?
Answer:
I believe it is a sperm cell.
Explanation:
Not a sex cell because that can apply to both female and male reproduction.
4.8 code practice question 1 edhesive
Answer:
for x in range(5,76,5):
print(x, end=" ")
Explanation:
Hope this helps lovely :)
4.8 code practice question 1 adhesive for x in range(5,76,5): print(x, end="").
What is adhesive?Adhesive is defined as anything that has the ability to functionally hold materials together through surface adhesion that resists separation. PCs and laptops have numerous adhesive applications, primarily for joining electric components. In the construction of laptops, cyanoacrylates, acrylics, epoxies, UV curables, and hybrid adhesives are all utilized.
Code is defined as the collection of rules or instructions that are written in a specific programming language. In general, programming statements written by a programmer using a text editor or visual programming tool and then saved in a file are referred to as source code.
Thus, 4.8 code practice question 1 adhesive for x in range(5,76,5): print(x, end="").
To learn more about adhesive, refer to the link below:
https://brainly.com/question/29061431
#SPJ3
PD 1: effects of the development of transatlantic voyages from 1491 to 1607
The development of transatlantic voyages from 1491 to 1607 had a significant impact on the world. One of the most prominent effects was the exchange of goods and ideas between the Old and New Worlds.
Europeans brought over new crops, such as wheat and sugar cane, which greatly impacted the diet and agriculture of the Americas. Native Americans introduced Europeans to crops such as maize, tomatoes, and potatoes, which greatly impacted European cuisine. The transatlantic voyages also facilitated the colonization of the Americas by European powers, leading to the displacement and oppression of Indigenous peoples. The voyages also led to the forced migration of enslaved Africans to the Americas, which had a lasting impact on the development of the United States. Overall, the development of transatlantic voyages played a significant role in shaping the world we know today.
To learn more about transatlantic voyages visit;
https://brainly.com/question/28480291
#SPJ11
A good first step to understanding any kind of text is to :
A. take careful notes
B. create meaning
C. focus on the details
D. find the main idea
Answer:
find the main idea
Explanation:
Write about the history of computer.
Answer:
Charles Babbage, an English mechanical engineer and polymath, originated the concept of a programmable computer. Considered the "father of the computer", he conceptualized and invented the first mechanical computer in the early 19th century. ... The machine was about a century ahead of its time.
Explanation:
Hope it is helpful...
Which of the following is true of functions? * 2 points A. Programs written with functions run more quickly B. Functions can help remove repeated code from a program C. Replacing repeated code with a function will reduce the number of commands the computer needs to run D. Functions are called once but can be declared many times
Answer:
I’m sure if I remember that this is “B.”
Explanation:
I have taken computer science class before so I remembered!
The option that is true of functions is B. Functions can help remove repeated code from a program.
It should be noted that the fact that programs are written with functions doesn't mean that they will run quickly.
Functions can help remove repeated code from a program. Also, replacing repeated code with a function doesn't reduce the number of commands the computer needs to run.
Read related link on:
https://brainly.com/question/17691320
Question 2
2 pts
Intellectual and visual hierarchies are important considerations in creating maps. In general, the most appropriate relationship between the two is:
O The relationship between the two types of hierarchies depends on what the map maker is trying to represent
O It is important to decide which hierarchy is most important for a given map
O The visual hierarchy should reinforce the intellectual hierarchy
O The intellectual hierarchy should reinforce the visual hierarchy
O The two types of hierarchies need to be balanced Question 3
2 pts
In order to minimize the distortion on a map, a country in the temperate zone, such as the United States, would best be illustrated with what type of projection.
O Secant conic
O Secant planar
O Tangent conic
O Secant cylindrical
O Tangent cylindrical Question 4
2 pts
A conformal map is a map that preserves...
O ...distance.
O Conformal maps don't preserve distance, area, shapes, or angles.
O ...area.
O...shapes and angles. Question 5
2 pts
Which of the following statements is NOT true about a datum or reference ellipsoid?
O There is one agreed upon datum that is used in conjunction with latitude and longitude to mark the location of points on the earth's surface.
O If we think about making projections by wrapping a piece of paper around a globe, the datum would be the globe that we use.
O Datums are part of both projected and geographic coordinate systems.
O A datum is a model that removes the lumps and bumps of topography and differences in sea level to make a smoothed elliptical model of the world. Question 6
2 pts
What does it mean to 'project on the fly'?
O When a GIS projects a dataset on the fly, it does not change the projection or coordinate system that the data is stored in, but simply displays it in a different coordinate system.
O When a GIS projects a dataset on the fly, it transforms a dataset from one projection or coordinate system into another, changing the coordinate system in which the data is stored.
O When a GIS projects a dataset on the fly, it transforms it from a geographic coordinate system into a projected coordinate system .Question 7
2 pts
What type of coordinate reference system do we see below and how can we tell?
+proj=merc +lat_ts=0 +lon_0=0 +x_0=0 +y_0=0 +datum=WGS84 +units=m +no_defs
[Text reads: +proj=merc +lat_ts=0 +lon_0=0+x_0=0 +y_0=0 +datum=WGS84 +units=m +no_defs]
O This is a geographic coordinate system because it includes a datum.
O This is a projected coordinate system because all coordinate systems with the code '+proj' are projected coordinate systems.
O This is a geographic coordinate system because there are a lot of components and geographic coordinate systems tend to have more components than projected coordinate systems.
O This is a projected coordinate system because it includes a projection and linear units. Question 8
2 pts
Which of the following statements is NOT true about cartographic generalization?
O Cartographic generalization refers to the process of taking real world phenomena and representing them in symbolic form on a map.
O All of these statements are true statements about cartographic generalization.
O Classification, smoothing, and symbolization are all examples of cartographic generalization.
O Cartographic generalization includes choosing the location to be mapped, the scale of the map, the data to include, and what to leave off the map.
The most appropriate relationship between intellectual and visual hierarchies in creating maps is that the visual hierarchy should reinforce the intellectual hierarchy.
Intellectual hierarchy refers to the importance and organization of the information being presented on the map, such as the relative significance of different features or layers. Visual hierarchy, on the other hand, pertains to the visual cues and design elements used to communicate this information effectively, such as colors, sizes, and symbols. The visual hierarchy should support and enhance the intellectual hierarchy by using visual techniques that prioritize and highlight the most important information, ensuring that users can easily comprehend and interpret the map. This alignment between the two hierarchies helps to create clear and visually appealing maps that effectively communicate the intended message to the map readers.
Learn more about relationship
https://brainly.com/question/23752761?referrer=searchResults
#SPJ11
What are the benefits of setting up an nfs server? check all that apply. A) Connecting the printers B) Storing file on a network device C) Enabling files to be shared over a network D) Serving web content
A NAS server can be used to store files such as images, documents, videos, and other types of files.
The benefits of setting up an NFS server include:
A) Enabling files to be shared over a network: NFS allows clients to mount a server's file system, providing them with access to shared files over the network. This enables seamless file sharing and collaboration among multiple users or systems. Clients can access the shared files as if they were local, simplifying data management and facilitating efficient workflows.
B) Storing files on a network device: An NFS server allows files to be stored on a network device, such as a network-attached storage (NAS) device. NAS devices provide centralized storage for files and offer scalability, flexibility, and data redundancy. Storing files on a network device improves accessibility, data availability, and data backup options.
C) Enabling files to be shared over a network: Enabling files to be shared over a network is one of the key benefits of setting up an NFS server. NFS (Network File System) allows clients to access and share files located on a remote server over a network. This enables seamless collaboration and file sharing among multiple users or systems.
D) Serving web content: The benefits of setting up an NFS (Network File System) server are primarily related to file sharing and storage, rather than serving web content. NFS is designed to provide network access to files and directories, allowing clients to mount and access remote file systems. While NFS can be used in conjunction with web servers for file storage, it is not specifically geared towards serving web content.
By setting up an NFS server, organizations can enhance collaboration, streamline file management, and ensure data integrity through centralized storage solutions. A NAS server can be used to store files such as images, documents, videos, and other types of files.
Learn more about NFS server:
brainly.com/question/31822931
#SPJ11
if you decide to report something relating to online theft (stealing), computer hacking, or any similar type of suspicious or illegal activity, you should go to luoa
If you come across any suspicious or illegal activity relating to online theft, stealing, computer hacking, or any other similar activities, it is important that you take immediate action and report it to the appropriate authorities.
Reporting such activities can help prevent further harm or damage and can potentially bring the culprits to justice.
To report such activities, it is recommended that you go to your local law enforcement agency or cybercrime unit. You can also report it to the Federal Trade Commission (FTC) or Internet Crime Complaint Center (IC3). It is important to provide as much detail and evidence as possible when making the report, including screenshots, emails, or any other relevant information.
It is important to note that reporting suspicious or illegal activity is not only important but also a civic responsibility. Failure to report such activities can have serious consequences not just for you but for others as well. Therefore, it is always better to err on the side of caution and report anything that seems suspicious or illegal.
In conclusion, if you decide to report something relating to online theft, stealing, computer hacking, or any similar type of suspicious or illegal activity, it is best to go to your local law enforcement agency or cybercrime unit, the FTC, or IC3. Always provide as much detail and evidence as possible to ensure that the culprits are brought to justice.
Learn more about luoa here:
https://brainly.com/question/28235440
#SPJ11
who is the first man to find biology
Answer:
Thomas Beddoes
Explanation:
Assume that the variable name has the value 33. what is the value of name after the assignment name
Answer:
The operator * is used to multiply two values. The result 35 will come if value 1 is added to name.
Explanation:
The operator * is used to multiply two values. The result 35 will come if value 1 is added to name.
Bernard is creating an inventory of his comic book collection. He has documented the title, publisher name, production year, and
series number for each comic in his collection. He creates a spreadsheet of this information. Typically, each one of these
categories, such as production year, would be contained in:
A: a formula bar.
B: a cell.
C: a row.
D: a column.
Answer:
D: a column.
Explanation:
Since in the question it is mentioned that Bernard wants to develop an inventory. Now he created a spreadsheet of the given information
The categories like production year, publisher name, etc would be contained in a column as it represent the heading under these the year, name of the publisher are written
Therefore the option d is correct
Answer:
D: a columnExplanation:
Typically, each one of these
categories, such as production year, would be contained in a column.
Integrated marketing communications require a company's mass-market advertisements, web site, e-mail, and personal selling communications to all ________.
Integrated marketing communications need a company's mass-market advertisements, website, e-mail, and personal selling communications to all the same clear and compelling message.
What is Integrated Marketing?Integrated marketing exists as a strategy for delivering a unified message across all the marketing channels your brand uses. It furnishes consistency wherever customers select to interact with a company. Without an integrated marketing strategy, you risk delivering mixed messages or communicating in a disconnected voice.
The goal of integrated marketing communications exists to guarantee that customers receive the same message when they interact with a company's brand in different ways. Integrated marketing communication (IMC) can be described as the process utilized to unify marketing communication elements, such as public relations, social media, audience analytics, business development principles, and advertising, into a brand identity that stays consistent across distinct media channels.
A compelling message resonates with the audience's values and beliefs. It stands prepared to help the audience solve their problems, achieve their goals and dreams, and meet their requirements. It uses words and resolutions the audience understands and finds relatable.
Hence, Integrated marketing communications need a company's mass-market advertisements, website, e-mail, and personal selling communications to all the same clear and compelling message
To learn more about Integrated marketing communications refer to:
https://brainly.com/question/9696745
#SPJ4
Which of the following statements is true?
A. A Multi-AZ setup is aimed at fault tolerance, while a read replica setup is aimed at scalability.
B. Both read replicas and Multi-AZ configurations are aimed at fault tolerance.
C. A Multi-AZ setup is aimed at scalability, while a read replica setup is aimed at fault tolerance.
D. Both read replicas and Multi-AZ configurations are aimed at scalability.
The correct statement is A. A Multi-AZ setup is aimed at fault tolerance, while a read replica setup is aimed at scalability. Therefore, a Multi-AZ setup focuses on fault tolerance by providing automatic failover, while a read replica setup focuses on scalability by offloading read traffic.
In Amazon Web Services (AWS), a Multi-AZ setup involves replicating your primary database to a standby instance in a different Availability Zone (AZ). This provides high availability and fault tolerance by automatically failing over to the standby instance in case of a failure in the primary instance.
On the other hand, a read replica setup involves creating one or more copies of your database to offload read traffic from the primary instance. Read replicas are asynchronous replicas that can be used for scaling read-intensive workloads. They do not provide automatic failover or high availability.
To know more about tolerance visit:
https://brainly.com/question/30478622
#SPJ11
What is the mistake in this python code
emotion = input("How are you feeling today?")
print(f"Im feeling {emotion} too!")
if == sad:
print("I hope you have a good day")
if == happy:
print("Me too")
You will need to set the if statements to:
if emotion == "sad":
print("I hope you have a good day")
if emotion == "happy":
print("Me too")
Make sure to indent the print code, and the first part of your code is correct!
The mistake in this Python code is that the if statements are missing the variable name that they should be checking. The correct syntax for an if statement is `if condition:` where `condition` is some expression that evaluates to either True or False.
Also, the values `sad` and `happy` are not defined as strings in the code, so the comparison with these values will result in a NameError.
Here's the corrected code:
emotion = input("How are you feeling today?")
print(f"I'm feeling {emotion} too!")
if emotion == "sad":
print("I hope you have a good day.")
if emotion == "happy":
print("Me too.")
Note that I've added the variable name `emotion` to the if statements, and defined the comparison values as strings. Also, I've added indentation to the print statements so they are executed only when the condition is true.
match each artificial intelligence (ai) technique with its definition. - represent the knowledge of experts as a set of rules that can be programmed so that a computer can assist human decision makers. - software that can identify patterns in very large databases without explicit programming although with significant human training. - loosely based on human neurons, algorithms that can be trained to classify objects into known categories based on data inputs. - algorithms based loosely on evolutionary natural selection and mutation, commonly used to generate high-quality solutions to optimization and search problems. - algorithms that make it possible for a computer to understand and analyze natural human language. - systems that can view and extract information from real-world images. - use of machines that can substitute for human movements as well as computer systems for their control and information processing. - software agents that use built-in or learned knowledge to perform specific tasks or services for an individual. a. robotics b. computer vision systems c. neural networks d. genetic algorithms e. natural language processing f. machine learning g. intelligent agents h. expert systems
The top AI methods—heuristics, natural language processing, artificial neural networks, machine learning, support vector machines, and markov decision processes—will be covered in this essay.
How does artificial intelligence work?
The replication of human intelligence functions by machines, particularly computer systems, is known as artificial intelligence. Expert systems, natural language processing, speech recognition, and machine vision are some examples of specific AI applications.
What fundamental principle underpins artificial intelligence?
Artificial intelligence is founded on the idea that human intelligence can be described in a way that makes it simple for a computer to duplicate it and carry out activities of any complexity. Artificial intelligence aims to emulate cognitive processes in humans.
To know more about Artificial intelligence visit;
https://brainly.com/question/23824028
#SPJ4
what is an example of an absolute cell reference
Answer:
Absolute cell referencing uses dollar sign with the row number and column name. When any formula with absolute referencing is copied, the cell addresses used remain the same.
Explanation:
Compress this So_wake_me_up_when_it's_all_over_When_I'm_wiser_and_I'm_older_All_this_time_I_was_finding_myself_And_I_didn't_know_I_was_lost__Didn't_know_I_was_lost_I_didn't_know_I_was_lost_I_didn't_know_I_was_lost_I_didn't_know_(didn't_know,_didn't_know)
The given text seems to be a line from the song "Wake Me Up" by Avicii. It goes: "So wake me up when it's all over, when I'm wiser and I'm older. All this time I was finding myself, and I didn't know I was lost."
The given text is a segment of the lyrics from the song "Wake Me Up" by Avicii. The lyrics highlight the theme of self-discovery and realization. The repetition of "didn't know" emphasizes the speaker's lack of awareness about being lost and needing guidance. The phrase "wake me up when it's all over" indicates a desire to be awakened from a challenging or difficult phase in their life.
The lyrics suggest that the person singing has been searching for their true identity and has finally realized that they were lost without even realizing it. This realization marks a turning point towards personal growth and wisdom.
To know more about Avicii visit:-
https://brainly.com/question/14287477
#SPJ11
using a backdoor program, you can use your computer while you are away from the office.
T/F
False. Using a backdoor program does not allow you to use your computer while away from the office.
A backdoor program is a malicious software or code that provides unauthorized access to a system, allowing attackers to control and manipulate it without the knowledge or permission of the user. Its purpose is to exploit vulnerabilities and gain unauthorized access, which is unethical and illegal. It does not grant the ability to remotely use the computer, but rather poses a significant security risk to the user and their data.
A backdoor program is designed to create a secret entry point into a system, enabling unauthorized access. Its primary objective is to evade detection and allow attackers to control the compromised system remotely. However, this does not translate into legitimate remote access for the user who installed the backdoor program. Instead, it poses a serious threat to the user's privacy, security, and the confidentiality of their data. Using backdoor programs is against ethical standards and can lead to severe consequences, including legal actions and compromised systems. It is important to prioritize secure and authorized methods for remote computer access, such as using virtual private networks (VPNs) or remote desktop software.
Learn more about software here:
https://brainly.com/question/985406
#SPJ11
Computer _ rely on up to date definitions?
A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers
Answer: The correct answer is B. Malware Scan
Explanation:
The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.
A large part of Kelly's job with a software development company is to monitor the servers to ensure that they are not overloaded by the computers that are connected to them. Kelly holds the position of __________ in the organization. Infrastructure Manager Database Administrator Support Analyst Network Administrator
Kelly holds the position of Network Administrator in the software development company.
As a Network Administrator, Kelly is responsible for monitoring and managing the company's network infrastructure, including the servers. One of Kelly's key responsibilities is to ensure that the servers are not overloaded by the computers connected to them.
In this role, Kelly is tasked with implementing and maintaining network security measures, troubleshooting network issues, and optimizing network performance.
Kelly monitors network traffic and server performance to identify potential bottlenecks or signs of overload. By analyzing network usage patterns and implementing appropriate network management techniques, Kelly ensures that the servers operate smoothly and efficiently.
Furthermore, Kelly collaborates with other IT professionals, such as system administrators and database administrators, to ensure the overall stability and reliability of the company's infrastructure.
Kelly may also participate in the planning and implementation of network upgrades and expansions to support the growing needs of the organization.
Overall, as a Network Administrator, Kelly plays a crucial role in maintaining the stability, performance, and security of the company's network infrastructure, specifically focusing on preventing server overload caused by connected computers.
For more such questions on Network Administrator,click on
https://brainly.com/question/29462344
#SPJ8
phpmyadmin tried to connect to the mysql server, and the server rejected the connection. you should check the host, username and password in your configuration and make sure that they correspond to the information given by the administrator of the mysql server.
An error notice can inform you that phpMyAdmin requires a version of PHP that falls within a certain range.
This might occur if your version of MAMP is incompatible with a recent upgrade or if you're using an out-of-date PHP version. You will need to update your MAMP application's PHP version in this situation. How to find your PhpMyAdmin username and password: This is the step-by-step procedure that will be used to retrieve the credentials. Step 1: Ctrl+R, then enter C:xamppphpMyAdmin (or) Go there by navigating. Use the search box here to enter "config. inc." phpMyAdmin can be accessed using the following credentials: the root user name. Application password, please.
Learn more about password here-
https://brainly.com/question/28114889
#SPJ4
A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
a
A variable was declared before line 328
b
The variable was assigned a different value before line 328
c
The variable will be assigned a different value after line 328
d
The variable will be initialized after line 328
Answer:
the answer is A
Explanation:
I just did this
Answer:
a.328im preaty sure home u get this rigth :)
[Files, for loops, exceptions; 20pt] Using a for loop, write a function called countWord(). It takes 2 parameters: The name of a text file (e.g. gettysburg.txt that is included with this test) and a word to be searched within that file. Your code should return the number of times the given word appears in the file. Capitalization should not matter. Make certain to handle file exceptions gracefully.
def countWord(name, word):
try:
f = open(name, "r")
lst = ([])
w = ""
for x in f.readlines():
w += x.lower()
lst = w.split()
f.close()
return lst.count(word)
except FileNotFoundError:
print("Please create a file or use the name of an existing text file.")
print("Your word appears", countWord("gettysburg.txt", "random"), "time(s)")
The text file I used for testing looks like:
random words
random words
I'm putting random words in here
random
this is random
RaNdOm
I didn't really know what exceptions your professor is looking for so I just used the file not found one. Best of luck.
True or False? A list can be linear (items are arranged one after the other) or linked (each item has a pointer to the next item in the list).
Answer:
True
Explanation:
Write a method that makes the input string of sentences ending with and
combines them into a single sentence. The result should keep the final period.
For example,
runOnSentence("A sentence. That runs on.")
returns
"A sentence that runs on."
Had to send the code through a .txt since brainly doesn't support .py
Please tell me if you have any questions or if the code doesn't function correctly.
Professional communication is______
and enhances our credibility
verbose and polite
polite and curt
quick and civil
polite and civil
Answer:
polite and civil
Explanation:
got it right on edge GL
Professional communication is polite and civil and enhances our credibility. The correct option is D.
What is professional communication?Professional communication is done between professionals. These communications involve specific and professional words. Like a doctor, use a specific names of medicines and procedures which are unknown to common people.
Polite and civil are the manners which should be used when talking to someone, it shows our culture and behavior. Politeness can give you what you want from someone. It also improves relationships with others.
To make conservation civil or positive, we should use polite behavior. It shows a good attitude and makes the environment positive. We should act courteously if we want to make preservation civil or affirmative. It exudes positivity and fosters good surroundings.
Thus, the correct option is D. polite and civil.
To learn more about professional communication, refer to the link:
https://brainly.com/question/26696199
#SPJ5
subset the original data set based on the binary 1/0 values for x4. how many observations are in each of the two subsets?
1 Choose Data… Split File. 2 Select either Compare groups or Organise output by groups
In SPSS, how do you examine data subsets?1 Select Data... Split File. 2 Choose either Compare groups or Sort output by groups. The first option groups together corresponding bits of output from distinct subsets, but the second option lists all of the output from the first subset, then all of the output from the second subset, and so on.
To make a subset file, eliminate the observations from the current dataset that you don't need, then save it to a permanent file with File > Save [As] or the SAVE command.
A set A is a subset of another set B if all of its constituents are also members of the set B. To put it another way, the set A is contained within the
To learn more about subsets to refer;
https://brainly.com/question/13011569
#SPJ4
What type of file format is PSD?
Answer:
PSD (Photoshop Document)
Explanation:
PSD (Photoshop Document) is an image file format native its one of Adobe's popular Photoshop Application. PSD files are commonly used for containing high quality graphics data.
Answer:
PSD (Photoshop Document) is an image file format native to Adobe's popular Photoshop Application. It's an image editing friendly format that supports multiple image layers and various imaging options. PSD files are commonly used for containing high quality graphics data.
Format Creator: Adobe Inc.
Explanation: