a. keyword
b. type
c. value
d. built-in function
1 tasis = ["Maths homework", "English homework
"Practise music", "Tidy up room")
What would the program outout de if the lines below were added to it?
4 print tas)
Answer:
65
Explanation:
the most popular method for connecting nodes on a network is circuit switching.
Circuit switching is a widely used method for connecting nodes on a network. It involves establishing a dedicated communication path between two nodes for the duration of a connection, ensuring a consistent and uninterrupted transmission.
Circuit switching works by reserving network resources, such as bandwidth, for the entire duration of a communication session. When a connection is established, a dedicated path is established between the sender and receiver, enabling the direct exchange of data packets. This method guarantees a fixed transmission capacity and low latency, making it suitable for real-time applications like voice and video calls. However, circuit switching requires significant resources even when the connection is idle, making it less efficient for sporadic or bursty traffic. Nevertheless, its reliability and consistent performance have made it popular for traditional telephone networks and certain dedicated communication systems.
Learn more about connection here; brainly.com/question/28337373
#SPJ11
NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.
Answer: B
Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.
Vivian and other members of her group are attending an event where they have to give short, uninterrupted speeches, one after the other. The moderator has a passive role during the course of the discussion, he or she has to simply introduce the presenters and manage the time frame of the event. At the end of the discussion, the moderator engages with the presenters and audience to ask questions and point to areas of agreement or disagreement.
Vivian is part of a _____.
Answer:
Panel discussion at a symposium
Explanation:
A symposium is a discussion held in public and arranged so that groups of experts in a particular field of study can come together and present information, papers, discoveries, and new researches and also to provide recommendations as to what is and not to be done
A moderator for the symposium and the panel members usually seat in front of an audience to whom a prepared brief report is presented by the panel group members after which the key point may be summarized by the moderator and the audience can take part in asking questions which are answered by the panel members
Therefore;
Vivian is part of a panel discussion at a symposium
Will give brainliest!!!
Which of the following defines telehealth?
the practice of using the internet to provide health care without going to a doctor’s office or hospital
the practice of using a fiber inserted in a vein to deliver medicine to a target inside the body
the practice of using telomeres to treat a disease
the practice of using a robot to perform a complicated microscopic surgery
Answer:It’s the second one
Explanation:
give brainliest plz
Telehealth is the delivery of health-related services and information via the use of electronic information and telecommunications technology. The correct option is A.
What is Telehealth?Telehealth is the delivery of health-related services and information via the use of electronic information and telecommunications technology. It enables long-distance interaction between patients and clinicians, as well as care, guidance, reminders, education, intervention, monitoring, and remote admissions.
The statement that best defines telehealth is "the practice of using the internet to provide health care without going to a doctor’s office or hospital".
Hence, the correct option is A.
Learn more about Telehealth:
https://brainly.com/question/22629217
#SPJ2
What is the output for the following program? numB = 2 while numB < 15: numB = numB + 5 print(numB) Output:
The following program is a while loop that will output the following data
7,12,17.
In the first iteration, the variable numB is 2, since 2 is less than 15, the program will run the command
numB = numB+5 and it will print 7
The second iteration is still valid because numB is now 7 and is less than 15, so the program will run the command
numB = numB+5 and it will print 12
The third iteration is still valid because numB is now 12 and is less than 15, so the program will run the command
numB = numB+5 and it will print 17
The fourth iteration is not valid because numB is now 17 and is greater than 15, so the program will not run the command
Learn more:
https://brainly.com/question/19344465
Answer: 7,12,17.
Explanation: got it right on edgen
Read the code below.
What will the computer print if the input for year_variable is 1700?
if year_variable == 1776:
print("Your answer is correct. The Declaration of Independence was signed in “year_variable”.")
elif year_variable 1776: compute_variable = year_variable - 1776
print("Subtract “compute_variable” years from your answer for the correct answer.")
Your answer is incorrect. The Declaration of Independence was signed in 1776.
Subtract 76 years from your answer for the correct answer.
Add compute_variable years to your answer for the correct answer.
Add 76 years to your answer for the correct answer.
PLEASE EXPLAIN HOW YOU GOT IT
Answer:
D. Add 76 years to your answer for the correct answer.
Explanation:
Write the code in python and make year_variable= 1700
Since the input value is 1700, it is less than 1776. This means the elif year_variable < 1776:
would run. This line of code makes whatever the input value is to be subtracted from 1776, then produce an answer labeled as "compute_variable"
This "compute_variable" is then shown to be in a print function, where it says to add whatever the compute variable is to the input, to get the correct answer.
Answer:
The answer is D.
Explanation:
Hope it helps! =D got it on edge
you are implementing security at a local high school that is concerned with students accessing inappropriate material on the internet from the library's computers. the students use the computers to search the internet for research paper content. the school budget is limited. which content filtering option would you choose? answer block all content except for content you have identified as permissible. block specific dns domain names. allow all content except for the content you have identified as restricted. restrict content based on content categories.
On the basis of content categories, that is how I would limit the content. With this option, you may filter objectionable information with more freedom and control while maintaining access to reliable research materials.
I would decide to impose content restrictions depending on content categories.
With this option, unsuitable materials may be blocked with more customisation and flexibility while still enabling access to reliable research materials. you may filter objectionable information with more freedom and control while maintaining access to reliable research materials. Also, it enables simpler filtering system upgrades and alterations as needed. The fact that it does not involve manually defining allowed material or restricting certain domain names makes it often more affordable than the other choices. Overall, this choice strikes a reasonable mix between security and usability for the requirements of the institution.
learn more about research here:
https://brainly.com/question/17057996
#SPJ4
which one is superior,human or computer?Give your reason
write a logical function isguest to determine if a name is on the guest list of an event. the function should operate independent of upper or lower case characters in the string. a string array contains the guest list. if there are multiple entries of the same name, a single logical must be returned.
To write a logical function isguest that determines if a name is on the guest list of an event, we first need to define the input parameters and output of the function. The input parameters would be a name (string) and a guest list (string array), while the output would be a logical value (true or false) indicating if the name is on the guest list or not.
1)To account for upper or lower case characters in the string, we can use a string method such as toLowerCase() to convert all characters in the name to lowercase before comparing it to the guest list. We can then use a for loop to iterate through the guest list and compare each name to the input name, ignoring case. If a match is found, we can return true, indicating that the name is on the guest list. If no match is found, we can return false.
2)To account for multiple entries of the same name, we can use a boolean variable to keep track of whether a match has been found. If a match has already been found, we can skip the rest of the loop and return the same value without checking the remaining entries on the guest list.
Here is an example implementation of the isguest function in JavaScript:
function isguest(name, guestList) {
var lowercaseName = name.toLowerCase();
var matchFound = false;
for (var i = 0; i < guestList.length; i++) {
if (guestList[i].toLowerCase() === lowercaseName) {
if (matchFound) {
return true;
}
matchFound = true;
}
}
return matchFound;
}
This function takes in a name and a guest list as input, converts the name to lowercase, and then iterates through the guest list to compare each name to the input name, ignoring case. If a match is found, the function checks if a match has already been found before returning true. If no match is found, the function returns false.
For such more question on parameters
https://brainly.com/question/29887742
#SPJ11
What are 2 ways to send a message to your client when signed in as an accountant user?.
Answer:
The use of Ask client and request are 2 ways to send a message to your client when signed in as an accountant user.
Business letters are preferred over e-mail when a permanent record is required, when a message is confidential, and when formality is necessary. true or false
The statement is true.
Business letters are preferred over e-mail when a permanent record is required, when a message is confidential, and when formality is necessary. Business letters provide a more formal and secure way of communication, while e-mails can be more easily intercepted or altered.
Business letters are often preferred over email in situations where a permanent record is required, when a message is confidential, and when formality is necessary. Business letters are typically printed on paper and physically delivered or mailed, and they are considered more formal and official compared to emails which are electronic and often more casual in tone. Business letters are often used for important communications that need to be documented, archived, or used as legal records. Additionally, business letters are often preferred in situations where confidentiality is a concern, as they provide a higher level of privacy compared to emails that can be easily forwarded, copied, or intercepted. Lastly, business letters are often used in formal settings where professional etiquette and formality are important, such as in official communications with clients, partners, or regulatory bodies. However, with the increasing use of electronic communication in modern business practices, the preference for business letters over email may vary depending on the organization and specific circumstances.
Know more about business letters:
https://brainly.com/question/30390939
#SPJ11
Add a calculated field named #OfWeeks in the last position that calculates how many weeks in advance the reservations were booked (the RSVPDate) before the CheckInDate. Sort in Ascending order by CheckInDate. Run the query, and then save it as qryWeeks. Close the query.
To add a calculated field named "#OfWeeks" to calculate the number of weeks in advance the reservations were booked, follow these steps:
Open the query in Design View that contains the fields "RSVPDate" and "CheckInDate". In the field row of the query grid, add a new column by clicking on the next available column and entering "#OfWeeks" as the field name.
In the criteria row of the "#OfWeeks" column, enter the following expression: DateDiff("ww",[RSVPDate],[CheckInDate])
This expression uses the DateDiff function to calculate the number of weeks between the RSVPDate and CheckInDate fields.
Optionally, you can specify a format for the "#OfWeeks" field by right-clicking on the field and selecting "Properties". In the property sheet, go to the "Format" tab and choose a desired format.
Save the query as "qryWeeks".
To sort the results in ascending order by CheckInDate, click on the CheckInDate column and select "Ascending" in the sort row of the query grid.
Run the query to generate the results.
After reviewing the results, close the query.
By following these steps, you will have added the "#OfWeeks" calculated field, sorted the results by CheckInDate in ascending order, and saved the query as "qryWeeks".
Learn more about reservations here
https://brainly.com/question/30130277
#SPJ11
if your website meets the coppa standards, you can display a _____ on your website.
If your website meets the COPPA (Children's Online Privacy Protection Act) standards, you can display a "Privacy Seal" on your website.
The COPPA is a US federal law designed to protect the privacy and online safety of children under the age of 13. If a website complies with the COPPA standards, it can display a privacy seal as a symbol of its adherence to these regulations. The privacy seal serves as a visual indicator to parents and guardians that the website has implemented measures to protect children's personal information and comply with COPPA requirements. It helps build trust and reassures users that the website follows responsible privacy practices. Option A is the correct answer.
You can learn more about website at
https://brainly.com/question/25871664
#SPJ11
create a comic strip about prepering hand tools for operation and safety
paaa helppp
Answer:
Hammer stools
ahsnsksns
James wants to buy a pair of pants for $60.
When he went to the store he found that the
price was marked down by 20%. How much do
they cost now?
What features in Excel are the same as in Word?
What features are differ?
Answer:
Following are the difference and similarity between word and Excel:
Explanation:
The similarity in word and excel:
The MS-word and MS-Excel both are the part of Microsoft, that is used for the word processing and the Spreadsheet (tablet program). In the word processing is used to create papers like essays while the spreadsheet is used for manipulating the mathematical formula, in another way we can say that both are used for type letters. In both spreadsheet and the word processing is used for insert images, graphs, and hyperlinks, it also uses the tools for formatting bars and the toolbars.The difference in word and excel:
In a word, it includes an application for text processing, and excel would be used for the tablet program. The word is used to create documents like assignments file data files, while excel is being used for the manipulation of numbers by mathematical equations.Which is the primary outcome of innovation?
collaboration
creativity
change
profit
Answer:
change
Explanation:
because innovation is a change and that change could be anything
Which tools are found in the Quick Analysis feature? Check all that apply.
Table
pivot table
sum
count
more
row evaluation
Answer:
A, C, E
Explanation:
Answer:
A,B,E
Explanation:
just did it on edge2020
what hardware and/or operating system support do you think would be needed to protect an application's data structures in memory from being corrupted by other applications?
It is needed to do fault isolation requires a guard. app memory is guarded by hardware, disk is guarded by the operating system kernel, while spam is harder to prevent. The correct option is C.
What is corrupted memory?
Memory corruption, also known as a violation of memory safety, happens when the contents of a memory location are changed as a result of programmed action that deviates from the original programmer's purpose or from program/language constructs.
A guard is necessary to perform fault isolation. Hardware protects app memory, the operating system kernel protects the disc, but spam is more difficult to stop.
Thus, the correct option is C.
For more details regarding memory corruption, visit:
https://brainly.com/question/2944613
#SPJ1
- Protect an application's data structures in memory from being corrupted by other apps
-Protecting one user's disk files from being accessed or corrupted by another user
-Protecting the network from a virus trying to use your computer to send spam
Problem 1 Write code to print the following shape to the console: Tip: you can do it in three lines of output instead of a single function Tip: Just find a way to print result, you do not need loop for this problem. But It is okay if you use a loop.
Sure, here is the code to print the shape to the console:
To print the following shape to the console, you can simply use three print statements to output each line of the shape:
print("*****")
print(" *** ")
print(" * ")
This will output the shape as follows:
*****
***
*
Note that you can also use a loop to print the shape, but it is not necessary for this problem since the shape is small and can be easily printed with just a few lines of code.
to print a specific shape using three lines of output without necessarily using a loop. Here's a solution in Python:
1. First, decide on the shape you want to print. For example, let's print a simple triangle:
```
*
***
*****
```
2. To print this shape, you can use the `print()` function in Python to output each line:
```python
print(" *")
print(" ***")
print("*****")
```
3. If you run this code, it will print the desired shape to the console. While this solution does not use a loop, it is an efficient and straightforward approach for this specific problem.
Learn more about loop
brainly.com/question/30706582
#SPJ11
Write a program to find the total ASCII value of vowels in a given string (one word / a phrase / a sentence). The ASCII value of vowels in the given string is calculated by adding the ASCII value of all the vowels in the string. Also, display the individual count of each vowel( number of times each and every vowel appears in the string.
In python 3:
def vowelAscii(txt):
vowels = "aeiouAEIOU"
total = 0
lst = ([])
for i in txt:
if i in vowels:
total += ord(i)
if i not in lst:
lst.append(i)
print(f"{i} appears {txt.count(i)} time(s) in the string with an individual ASCII value of {ord(i)}")
return f"The total ASCII value of the vowels in {txt} is {total}."
print(vowelAscii("hello, I'm learning python"))
This is what I managed to come up with. The last line is testing the function. If you need anymore help, just ask. Best of luck.
Why is the ISPM 15 Code/Marking used?
The ISPM 15 (International Standards for Phytosanitary Measures No. 15) code/markings are used for a specific purpose related to international trade and the movement of wood packaging materials (WPM). The primary objective of ISPM 15 is to prevent the spread of pests and diseases that can be carried by wood packaging materials.
Wood packaging materials, such as pallets, crates, and dunnage, can harbor harmful insects and pathogens. When these materials are transported across international borders, there is a risk of introducing pests or diseases to new regions, which can have devastating consequences for agriculture, forestry, and ecosystems.
To address this risk, the ISPM 15 code/markings set out guidelines for treating WPM through approved methods such as heat treatment or fumigation. Treated WPM is then marked with a specific stamp or branding that certifies its compliance with ISPM 15 standards. This marking serves as evidence that the wood packaging has undergone appropriate treatment, reducing the risk of pest or disease transmission.
The use of ISPM 15 code/markings promotes phytosanitary measures and helps ensure that international trade involving wood packaging materials is conducted in a manner that protects plant health and minimizes the spread of pests and diseases across borders.
To learn more about phytosanitary, visit:
https://brainly.com/question/33281097
#SPJ11
Compare and contrast the features of the four computer career fields. Write a paragraph on each and specify how the four career options differ from each other, and explain how they are similar to each other. For your research, you can browse through the Bureau of Labor Statistics website.
1.Big data engineer · 2. Applications architect · 3. Web developer · 4. Database administrator.
What is computer ?
A computer is a device that may be configured to automatically perform series of mathematical or logical operations (computation). Modern digital computers are capable of running programmes, which are generalised sets of operations. These apps give machines the ability to carry out a variety of tasks. A computer is a minimally functional computer that contains the peripheral devices, operating system (primary software), and hardware required for proper operation. This phrase may also apply to a collection of connected computers that work as a unit, such as a computer system or group of computers. Computers are used as control systems in a wide range of commercial and industrial goods.
To know more about computers visit:
brainly.com/question/21474169
#SPJ1
Which statement describes lossless compression?
OA. It is a method that converts temporary files into permanent files
for greater storage capacity.
B. It is a technique that accesses memory addresses to retrieve data.
C. It is a method that results in the loss of all the original data in a
file.
D. It is a technique that allows all of a file's data to be restored from
compressed data.
its d
D. It is a technique that allows all of a file's data to be restored from
compressed data. Lossless compression shrinks the image without sacrificing any crucial information.
More about lossless compressionA type of data compression known as lossless compression enables flawless reconstruction of the original data from the compressed data with no information loss. Since most real-world data exhibits statistical redundancy, lossless compression is feasible.
By utilizing a sort of internal shorthand to denote redundant material, lossless compression "packs" data into a smaller file size. Depending on the type of information being compressed, lossless compression can reduce an initial file that is 1.5 MB to roughly half that size.
Learn more about lossless compression here:
https://brainly.com/question/17266589
#SPJ1
Chose the devices you think you should use in order to…
Go to my friend’s house and watch some movies.
A. DVD
B.CD
C.Memory card
D. USB flash memory
Listen to music while I’m running..
A. DVD
B.CD
C.Memory card
D. USB flash memory
Save photos to my computer ..
A. DVD
B.CD
C.Memory card
D. USB flash memory
Answer:
I think it's B, D, C
Explanation:
Cd for movies
Usb for the phone music and
Memory card to be inserted into the computer
Answer:
USB flash memory is the answer of all these question.
Explanation:
USB flash memory is the answer of all these question because it is small in size so you can easily carry it anywhere in your pocket. Below is the photo of USB flash drive
what is the behavior of an element with static positioning in regard to the page layout?
Answer:
The element is positioned according to the normal flow of the document.
The top, right, bottom, left, and z-index properties have no effect. This is the default value.
The behavior of an element with static positioning in regard to the page layout is that it implies that one put the element in its original position in the aspect of document flow.
What does Static positioning implies?Static positioning is known to be the normal way that all element have or gets. It implies that one should "put the element into its original place in the document flow as there is nothing special that one needs to see here."
Hence, the behavior of an element with static positioning is known to be the same and thus If a person do save and refresh, there will be no changes except when there is an updated background color.
Learn more about page layout from
https://brainly.com/question/988590
The Show Formulas button is a toggle button—it is either on or off.
True
False
True. The Show Formulas button is used to toggle between displaying formulas and their calculated values in cells. When it is clicked, it will either show or hide the formulas in cells.
What is cells?Cells are the basic functional and structural unit of all living organisms. Cells are made up of a variety of components, including a plasma membrane, cytoplasm, organelles, and genetic material. They are responsible for the growth, maintenance, and reproduction of the organism. Cells come in a variety of shapes and sizes, including spherical, elongated, and irregularly shaped. All cells have similar properties, including the ability to replicate, process information, and respond to changes in their environment. Cells are able to interact with each other by exchanging chemicals, exchanging energy, and forming new cells.
To learn more about cells
https://brainly.com/question/30193293
#SPJ4
7.4 Code 1 Edhesive assignment
Answer:
I have attached a screenshot of the program. This ensures that the formatting is not destroyed
Explanation:
The isnumeric() method checks to see if the string is composed of only digits 0 - 9. So entering a float number such as 4.2 or a negative number will fail the test on line 3
what is saturating arithmetic and what are its advantages and disadvantages in typical multimedia applications?
Saturation arithmetic is a version of arithmetic under which all operations are limited to a fixed range.It aids in the modelling of actual physical processes and is inapplicable to standard mathematical operations.
What are the benefits of saturation in arithmetic?The necessity for overflows and underflows on MMX instructions is removed by saturating arithmetic. A result is saturated to the nearest permissible value if it is outside of boundaries. By minimising wraparound effects, saturating arithmetic is advantageous for many multimedia applications.
What is saturation arithmetic' flaw?On a system that can only perform modular arithmetic operations, it is difficult to efficiently implement saturation since basic solutions necessitate branches that cause significant pipeline delays.
Learn more about saturating arithmetic here:
https://brainly.com/question/15557985
#SPJ1