HELP PLZ 50 POINTS
What code would add a new array item named "home" to the array below?

var titles = ["score", "points"];

titles.put("home");
titles.push("home");
titles.set("home");
array.push("home");

Answers

Answer 1

Answer:

titles.push("home");

Explanation:

        It depends on if you want to change the original array or not, but since you are just adding on I think this is the correct option.

        "... 5 ways to add an item to the end of an array. Push, splice, and length will mutate the original array. Whereas concat and spread will not and will instead return a new array. Which is the best depends on your use case" (www.samanthaming.com)

[] Attached is from the same source

-> I think this is correct

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather


Related Questions

when did brainly open?

Answers

Answer:

September 2009, Kraków, Poland

Explanation:

serch it up

can i get brainliest

thank you and have a great dayyyyy:)

An airplane manufacturer continues to hear from airlines that the landing gear indicator keeps flashing off and on, confusing the flight crew. Which step of the design process should the designers of the plane revisit? Explain your reasoning.

Answers

Answer:

  the applicable design step will depend on the findings as to the cause(s) of the problem

Explanation:

First of all, the affected airplane(s) should be examined to find the proximate cause(s) of the indicator flashing. Once that is known, corrective action can be investigated.

If we assume the airplane has been manufactured and maintained in accordance with all released and approved procedures (a big assumption), then the next step might be to revisit the analysis that sets rigging position and limits--both for manufacturing and for maintenance. Attention should be given to all allowable tolerances anywhere in the linkage related to the gear position sensor, and to the sensor behavior in relation to gear position.

__

As an engineer responsible for landing gear indication, I have had to deal personally with this issue. A number of factors are involved, including landing gear linkage and its tolerances; sensor rigging and its tolerances; sensor target size, position, and the geometry of its travel in relation to the sensor. Temperature can also be a factor, affecting both the mechanical linkage and the sensor behavior.

Up/down and locked/unlocked sensors for each gear can contribute to the problem. Each has its own geometry, which is not always easy to discern from the multitude of design drawings and different engineering groups involved. Sensor vendors like to work with a specific target geometry and motion that may not be duplicated on the airplane, so sensor behavior is not always well-specified. The specification to the vendor may need to be revisited.

When sensors are located on moving parts, wire routing and protection come into play. In some cases, wiring may be "in the wind" when landing gear is extended, so must be protected against a variety of assaults. When things rub on wires, damage always occurs eventually. The nature and extent of the protection provided can also be something to assess in the investigation.

Maintenance and repair procedures can also be scrutinized. We have seen issues related to the way splices and crimps to wiring are done, and where those are allowed to be located. Deicing fluid is corrosive to wiring, and travels up a wire as though it were a straw. So, careful protection is needed for wire ends exposed to areas where deicing fluid may be found.

Sensors that rely on magnetic properties of materials can be affected by residual magnetism. Manufacturing and maintenance procedures that detect and/or eliminate those effects may need to be reassessed.

The airplanes I worked on did not have a computer between the position sensor and the indicator light. I have worked with indicators that were computer driven, and that did flash. In one case, the intermittent flashing problem took years to solve, and was eventually traced to a poor design choice in the way internal wiring was routed in the computer chassis. So, the design of both computer software and computer hardware may also need to be revisited.

In short, every part of the design process may need to be revisited.

3.5 code practice
grade = str(input("What year of high school are you in?: "))

if ("grade ==Freshman"):

print("You are in grade: 9")

elif ("grade == Sophomore"):

print("You are in grade: 10")

elif ("grade == Junior"):

print("You are in grade: 11")

elif ("grade == Senior"):

print("You are in grade: 12")

else:

print("Not in High School")

It keeps printing your are in grade 9. Why?

Answers

The fixed code is shown below. input() function already returns string that's why you don't have to convert string again. Also the syntax in if-else scope is wrong.

grade = input("What year of high school are you in?: ")

if(grade.lower()=="freshman"):

print("You are in Grade 9.")

elif(grade.lower()=="sophomore"):

print("You are in Grade 10.")

elif(grade.lower()=="junior"):

print("You are in Grade 11.")

elif(grade.lower()=="senior"):

print("You are in Grade 12.")

else:

print("Wrong input!")

_____ merges each of the rows in the selected range across the columns in the range.

Answers

Answer:

Merge and Center

Explanation:

It is correct trust me

Caroline is collaborating with several writers who are creating multiple documents. There is a single list of content that must be eventually covered by all the documents, and Caroline needs a way to “flag” which writer is covering which content; all writers will be looking at the exact same online version of the list. Describe how Caroline could quickly use colors in Word to show which content goes with which writer; be specific about which Word tool she should use and how that tool operates.

Answers

A Word document can be shared with multiple users by selecting the File menu at the top ribbon and then select Share from the drop down menu

Several writers can work together on Microsoft Word by using the co-authoring, sharing, and co-editing features in MS Word

In order to co-author the content list, Caroline, should

1. Create the content list document

2. Click on Share icon on the top right corner of the document

3. Ensure to save the document in OneDrive

4. Input the email addresses of the other writers who are working on the list

5. Enter a message to the writers to add the title of the content they are working on in the list

When the other writers open the link to the document sent to them in the email they receive, and they open the document in a web browser, by selecting Edit Document > Edit in Browser

The presence of a writer and their real time changes to the content list document, showing the content they are working on are shown by colored flags that has the author (writer) name next to the content they are working on

Learn more about collaboration in Word here:

https://brainly.com/question/1877453

write a simulation in python to simulate spinning two wheels each numbered 1 through 16. run your simulation 10000 times and store your results in as a dataframe df with the columns wheel1 and wheel2.

Answers

A Python simulation of two rotating wheels with the numbers 1 through 16 on each one. Ten thousand times through your simulation, save the outcomes in a dataframe (df) with the columns wheel1 and wheel2 included.

What is meant by dataframe?A data structure called a dataframe is similar to a spreadsheet in that it arranges data into a two-dimensional table of rows and columns. Due to their flexibility and ease of use when storing and manipulating data, DataFrames are among the most popular data structures used in contemporary data analytics. With columns that could be of various types, DataFrame is a 2-dimensional labelled data structure. It is comparable to a spreadsheet, a SQL table, or a dictionary of Series objects. In general, the pandas object is the one that is most frequently used.The to csv() method of the Pandas DataFrame exports the DataFrame to CSV format. The CSV file will be the output if a file option is given. Otherwise, the return value is a string with the CSV format.

Therefore,

data=[]

for i in range (5000):

wheel1 = random.randint(1,16)

wheel2 = random.randint(1,16)

d = {"wheel1":wheel1, "wheel2":wheel2}

data.append(d)

# Make sure to store your simulation result as a DataFrame `df`:

df = pd.DataFrame(data)

To learn more about dataframe, refer to:

https://brainly.com/question/28016629

Question 1in the todo list assignment, the about and clear buttons are smaller than the add button

Answers

To make the about and clear buttons the same size as the add button in the todo list assignment, you can add a CSS  class to them with the same properties as the add button.

For example, if the CSS class for the add button is "add-btn", you can add this class to the about and clear buttons like this:

html

<button class="add-btn">About</button>

<button class="add-btn">Clear</button>

Then, in the CSS file, you can define the properties for the "add-btn" class:

css

.add-btn {

 background-color: #4CAF50;

 color: white;

 padding: 10px 20px;

 border: none;

 border-radius: 4px;

 cursor: pointer;

 margin: 5px;

}

This will make the about and clear buttons the same size and style as the add button. You can adjust the padding, margin, and other properties as needed to achieve the desired appearance.

To know more about   CSS click this link -

brainly.com/question/28506102

#SPJ11

which value should you give to the speed() function if you want the turtle to move as fast as possible?

a. 10

b. 0

c. 1

d. -1

Answers

The value you should give to the speed() function if you want the turtle to move as fast as possible is "0".

A function in computer programming is a block of code that performs a specific task. It is typically designed to take in inputs, process them, and return a result. Functions can be used to simplify code by breaking it down into smaller, more manageable pieces that can be reused across the program. They also help with code organization and make it easier to test and debug. Functions can be built into a programming language or created by the programmer. Common types of functions include mathematical operations, string manipulations, and file input/output. In addition, functions can be combined to create more complex programs and can be called recursively, allowing for the creation of powerful algorithms.

Learn more about function here:

https://brainly.com/question/28358915

#SPJ11

When going global with an internet presence, the best strategy may be to localize as much as possible. Online customers often want an experience that corresponds to their cultural context offline. What is a strategy for perfecting an online presence?
i. Choosing colours – A black and white is fine for many countries, but in Asia visitors may think you are inviting them to a funeral. In Japan and across Europe, websites in pastel colour schemes often work best.
ii. Watching the clock – If marketing to countries that use the 24 hour clock, adjust times stated on the site so it reads, "call between 9.00 and 17.00", instead of "call between 9 a.m. and 5 p.m."
iii. Avoiding slang – English in Britain is different from that in the United States, Spanish in Spain is different from that in Mexico, and French in France is different from that in Quebec. Avoid slang to lessen the potential negative impact of such differences.
iv. Getting feedback – Talk with customers to learn what they want to accomplish on your website. Then, thoroughly test the site to ensure that it functions properly.
A.
All of mentioned
B.
I, II, AND III
C.
I, III, AND IV
D.
II, III, AND IV
18. "In the global economy, companies increasingly sell goods and services to wholesalers, retailers, industrial buyers, and consumers in other nations. Generally speaking, there are three main reasons why companies begin exporting". Choose the best answer for the statement above.
i. To gain international business experience
ii. To diversify sales
iii. To switch trading
iv. To expand total sales
A.I, III, AND IV
B.I, II, AND IV
C.II, III, AND IV
D.I, II, AND III
20. Licensing involves a global entrepreneur who is a manufacturer (licensor) giving a foreign manufacturer (licensee) the right to use a patent, trademark, technology, production process, or product in return for the payment of a royalty. The process is low risk, yet provides a way to generate incremental income. What are several advantages to using licensing as an entry mode into a new market?
i. Licensors can use licensing to finance their international expansion
ii. Licensing can be a less risky method of international expansion for a licensor than other entry modes.
iii. Licensing can help reduce the likelihood than a licensor’s product will appear on the black market.
iv. Licensee can benefit by using licensing as a method of upgrading existing production technologies.
A.
All of mentioned
B.
I, II, AND III
C.
I, III, AND IV
D.
II, III, AND IV
19. To apply dual pricing successfully, how must a firm threaten its domestic and international buyers?
A.Keep domestic and international buyers not separate
B.Keep domestic and international buyers separate
C.Selling at a lower price for international and domestic buyers
D.Selling at a higher price for international and domestic

Answers

The strategy for perfecting an online presence when going global is to implement all of the mentioned approaches: choosing appropriate colors, adjusting time references, avoiding slang, and seeking feedback from customers. This comprehensive approach ensures that the online experience caters to the cultural context of the target audience and enhances user satisfaction.

To create an effective online presence in the global market, it is essential to consider cultural nuances and preferences. Choosing colors that resonate with the target audience's cultural context is important. For example, pastel color schemes are often preferred in Japan and Europe, while black and white may have different connotations in Asia.

Adapting time references is crucial to avoid confusion and ensure clarity. Using the 24-hour clock format in countries where it is commonly used helps users understand the timing accurately and avoids misinterpretation.

Language plays a significant role in communication. By avoiding slang and using neutral language, businesses can reduce the potential negative impact of linguistic differences. This ensures that the message is understood clearly and prevents misunderstandings.

Seeking feedback from customers allows businesses to understand their expectations and preferences. By incorporating customer insights and conducting thorough testing, companies can optimize their online presence and ensure that it meets the needs of their target audience.

By implementing all of these strategies, businesses can enhance their online presence and provide a localized experience that resonates with customers in different cultural contexts.

Learn more about online presence

brainly.com/question/30785061

#SPJ11

7.4 Code 1 Edhesive assignment

7.4 Code 1 Edhesive assignment

Answers

Answer:

I have attached a screenshot of the program. This ensures that the formatting is not destroyed

Explanation:

The isnumeric() method checks to see if the string is composed of only digits 0 - 9. So entering a float number such as 4.2 or a negative number will fail the test on line 3

7.4 Code 1 Edhesive assignment

Find solutions for your homework
engineering
computer science
computer science questions and answers
this is python and please follow the code i gave to you. please do not change any code just fill the code up. start at ### start your code ### and end by ### end your code ### introduction: get codes from the tree obtain the huffman codes for each character in the leaf nodes of the merged tree. the returned codes are stored in a dict object codes, whose key
Question: This Is Python And Please Follow The Code I Gave To You. Please Do Not Change Any Code Just Fill The Code Up. Start At ### START YOUR CODE ### And End By ### END YOUR CODE ### Introduction: Get Codes From The Tree Obtain The Huffman Codes For Each Character In The Leaf Nodes Of The Merged Tree. The Returned Codes Are Stored In A Dict Object Codes, Whose Key
This is python and please follow the code I gave to you. Please do not change any code just fill the code up. Start at ### START YOUR CODE ### and end by ### END YOUR CODE ###
Introduction: Get codes from the tree
Obtain the Huffman codes for each character in the leaf nodes of the merged tree. The returned codes are stored in a dict object codes, whose key (str) and value (str) are the character and code, respectively.
make_codes_helper() is a recursive function that takes a tree node, codes, and current_code as inputs. current_code is a str object that records the code for the current node (which can be an internal node). The function needs be called on the left child and right child nodes recursively. For the left child call, current_code needs increment by appending a "0", because this is what the left branch means; and append an "1" for the right child call.
CODE:
import heapq
from collections import Counter
def make_codes(tree):
codes = {}
### START YOUR CODE ###
root = None # Get the root node
current_code = None # Initialize the current code
make_codes_helper(None, None, None) # initial call on the root node
### END YOUR CODE ###
return codes
def make_codes_helper(node, codes, current_code):
if(node == None):
### START YOUR CODE ###
pass # What should you return if the node is empty?
### END YOUR CODE ###
if(node.char != None):
### START YOUR CODE ###
pass # For leaf node, copy the current code to the correct position in codes
### END YOUR CODE ###
### START YOUR CODE ###
pass # Make a recursive call to the left child node, with the updated current code
pass # Make a recursive call to the right child node, with the updated current code
### END YOUR CODE ###
def print_codes(codes):
codes_sorted = sorted([(k, v) for k, v in codes.items()], key = lambda x: len(x[1]))
for k, v in codes_sorted:
print(f'"{k}" -> {v}')
Test code:
# Do not change the test code here
sample_text = 'No, it is a word. What matters is the connection the word implies.'
freq = create_frequency_dict(sample_text)
tree = create_tree(freq)
merge_nodes(tree)
codes = make_codes(tree)
print('Example 1:')
print_codes(codes)
print()
freq2 = {'a': 45, 'b': 13, 'c': 12, 'd': 16, 'e': 9, 'f': 5}
tree2 = create_tree(freq2)
merge_nodes(tree2)
code2 = make_codes(tree2)
print('Example 2:')
print_codes(code2)
Expected output
Example 1:
"i" -> 001
"t" -> 010
" " -> 111
"h" -> 0000
"n" -> 0001
"s" -> 0111
"e" -> 1011
"o" -> 1100
"l" -> 01100
"m" -> 01101
"w" -> 10000
"c" -> 10001
"d" -> 10010
"." -> 10100
"r" -> 11010
"a" -> 11011
"N" -> 100110
"," -> 100111
"W" -> 101010
"p" -> 101011
Example 2:
"a" -> 0
"c" -> 100
"b" -> 101
"d" -> 111
"f" -> 1100
"e" -> 1101

Answers

Get codes from the treeObtain the Huffman codes for each character in the leaf nodes of the merged tree.

The returned codes are stored in a dict object codes, whose key (str) and value (str) are the character and code, respectively. make_codes_helper() is a recursive function that takes a tree node, codes, and current_code as inputs. current_code is a str object that records the code for the current node (which can be an internal node). The function needs be called on the left child and right child nodes recursively. For the left child call, current_code needs increment by appending a "0", because this is what the left branch means; and append an "1" for the right child call.CODE:import heapq
from collections import Counter
def make_codes(tree):
   codes = {}
   ### START YOUR CODE ###
   root = tree[0] # Get the root node
   current_code = '' # Initialize the current code
   make_codes_helper(root, codes, current_code) # initial call on the root node
   ### END YOUR CODE ###
   return codes
def make_codes_helper(node, codes, current_code):
   if(node == None):
       ### START YOUR CODE ###
       return None # What should you return if the node is empty?
       ### END YOUR CODE ###
   if(node.char != None):
       ### START YOUR CODE ###
       codes[node.char] = current_code # For leaf node, copy the current code to the correct position in codes
       ### END YOUR CODE ###
   ### START YOUR CODE ###
   make_codes_helper(node.left, codes, current_code+'0') # Make a recursive call to the left child node, with the updated current code
   make_codes_helper(node.right, codes, current_code+'1') # Make a recursive call to the right child node, with the updated current code
   ### END YOUR CODE ###
def print_codes(codes):
   codes_sorted = sorted([(k, v) for k, v in codes.items()], key = lambda x: len(x[1]))
   for k, v in codes_sorted:
       print(f'"{k}" -> {v}')
       
Test code:
# Do not change the test code here
sample_text = 'No, it is a word. What matters is the connection the word implies.'
freq = create_frequency_dict(sample_text)
tree = create_tree(freq)
merge_nodes(tree)
codes = make_codes(tree)
print('Example 1:')
print_codes(codes)
print()
freq2 = {'a': 45, 'b': 13, 'c': 12, 'd': 16, 'e': 9, 'f': 5}
tree2 = create_tree(freq2)
merge_nodes(tree2)
code2 = make_codes(tree2)
print('Example 2:')
print_codes(code2)

To know more about Huffman codes visit:

https://brainly.com/question/31323524

#SPJ11

Which devices are managed through device management?
Device management is the process of managing devices.
NEED ANSWER ASAP PLS HELP

Which devices are managed through device management?Device management is the process of managing devices.NEED

Answers

Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software

Which function would you insert to organize large or complex sets of information that are beyond the capabilities of lists?.

Answers

The function that you would insert to organize large or complex sets of information that are beyond the capabilities of lists is known as table.

What is the function of table in database?

All of the data in a database is stored in tables, which are database objects. Data is logically arranged in tables using a row-and-column layout akin to a spreadsheet. Each column denotes a record field, and each row denotes a distinct record.

A user-defined function that returns a table is known as a table function (also known as a table-valued function, or TVF). Anywhere a table may be used, so can a table function. Although a table function can take parameters, it behaves similarly to views.

Note that one can use tables to put together large or complex group of information, that are beyond the power of lists.

Learn more about Table function from

https://brainly.com/question/3632175

#SPJ1

in programming, what is a string? a cable connecting computer hardware with the code it needs to operate a sequence of letters, numbers, spaces, and symbols a short, written statement that prints the code in a text (sms) message a thread linking a programming language to the computer software

Answers

Traditionally, a string is just a list of characters that can be used as a literal constant or a variable. The latter can either have fixed length and allow for element mutations (after creation).

Is developing using C++ a good idea?

broadly employed The majority of resources are available in C++, which is why 75% of programmers worldwide believe it to be the greatest choice for competitive programming because it is typically faster than Java and Python.

How challenging is programming?

It is well known that one of the hardest subjects to master is programming. It is not difficult to understand why some people find it challenging to learn how to code given how different it is from conventional educational methods, including college degrees in computer science.

To know more about Programming visit;

https://brainly.com/question/11023419

#SPJ4

Which uofa mis researcher developed a system to use anonymized wifi data to identify person-density in buildings and spaces at the university using temporal and spatial data to help fight covid-19?.

Answers

The  UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19 is known to be  Dr. Sudha Ram.

What does "population density" mean?

The population density, or the number of people divided by the area's size, is one that is often determined by the number of people who reside there.

Note that a lot of different creatures' distribution, growth, as well as migration can all be described through the use of  population density.

Hence, The  UofA MIS Researcher developed a system to use anonymized WiFi Data to identify person-density in buildings and spaces at the University using temporal and spatial data to help fight Covid-19 is known to be  Dr. Sudha Ram.

Learn more about Covid-19  from

https://brainly.com/question/28347122
#SPJ1

The administrators of Tiny College are so pleased with your design and implementation of their student registra- tion and tracking system that they want you to expand the design to include the database for their motor vehicle pool. A brief description of operations follows:


* Faculty members may use the vehicles owned by Tiny College for officially sanctioned travel. For example, the vehicles may be used by faculty members to travel to off-campus learning centers, to travel to locations at which research papers are presented, to transport students to officially sanctioned locations, and to travel for public service purposes. The vehicles used for such purposes are managed by Tiny College’s Travel Far But Slowly (TFBS) Center.


* Using reservation forms, each department can reserve vehicles for its faculty, who are responsible for filling out the appropriate trip completion form at the end of a trip. The reservation form includes the expected departure date, vehicle type required, destination, and name of the authorized faculty member. The faculty member who picks up a vehicle must sign a checkout form to log out the vehicle and pick up a trip comple- tion form. (The TFBS employee who releases the vehicle for use also signs the checkout form. ) The faculty member’s trip completion form includes the faculty member’s identification code, the vehicle’s identifica- tion, the odometer readings at the start and end of the trip, maintenance complaints (if any), gallons of fuel purchased (if any), and the Tiny College credit card number used to pay for the fuel. If fuel is purchased, the credit card receipt must be stapled to the trip completion form. Upon receipt of the trip completion form, the faculty member’s department is billed at a mileage rate based on the vehicle type used: sedan, station wagon, panel truck, minivan, or minibus. (Hint: Do not use more entities than are necessary. Remember the difference between attributes and entities!)


* All vehicle maintenance is performed by TFBS. Each time a vehicle requires maintenance, a maintenance log entry is completed on a prenumbered maintenance log form. The maintenance log form includes the vehicle identification, a brief description of the type of maintenance required, the initial log entry date, the date the maintenance was completed, and the name of the mechanic who released the vehicle back into service. (Only mechanics who have an inspection authorization may release a vehicle back into service. )


* As soon as the log form has been initiated, the log form’s number is transferred to a maintenance detail form; the log form’s number is also forwarded to the parts department manager, who fills out a parts usage form on which the maintenance log number is recorded. The maintenance detail form contains separate lines for each maintenance item performed, for the parts used, and for identification of the mechanic who performed the maintenance. When all maintenance items have been completed, the maintenance detail form is stapled to the maintenance log form, the maintenance log form’s completion date is filled out, and the mechanic who releases the vehicle back into service signs the form. The stapled forms are then filed, to be used later as the source for various maintenance reports.


* TFBS maintains a parts inventory, including oil, oil filters, air filters, and belts of various types. The parts inventory is checked daily to monitor parts usage and to reorder parts that reach the "minimum quantity on hand" level. To track parts usage, the parts manager requires each mechanic to sign out the parts that are used to perform each vehicle’s maintenance; the parts manager records the maintenance log number under which the part is used.


* Each month TFBS issues a set of reports. The reports include the mileage driven by vehicle, by department, and by faculty members within a department. In addition, various revenue reports are generated by vehicle and department. A detailed parts usage report is also filed each month. Finally, a vehicle maintenance summary is created each month.


Given that brief summary of operations, draw the appropriate (and fully labeled) ERD. Use the Crow’s foot methodology to indicate entities, relationships, connectivities, and participations

Answers

Each month TFBS issues a set of reports. The reports include the mileage driven by vehicle, by department, and by faculty members within a department. In addition, various revenue reports are generated by vehicle and department. A detailed parts usage report is also filed each month. Finally, a vehicle maintenance summary is created each month.

TFBS maintains a parts inventory, including oil, oil filters, air filters, and belts of various types. The parts inventory is checked daily to monitor parts usage and to reorder parts that reach the "minimum quantity on hand" level. To track parts usage, the parts manager requires each mechanic to sign out the parts that are used to perform each vehicle’s maintenance; the parts manager records the maintenance log number under which the part is used.

Learn more about TFBS on:

https://brainly.com/question/30758245

#SPJ4

what is true about cisco discovery protocol? it discovers the routers, switches and gateways. it is network layer protocol it is physical and data link layer protocol it is proprietary protocol

Answers

Answer:

Explanation:

C. It can discover information from routers, firewalls, and switches. D. It runs on the physical layer and the data link layer.

The devices that can read, write, and erase data are called _________. Select your answer, then click Done.

Answers

The devices that can read, write, and erase data are called drives

How should you respond to the theft of your identity cyber awareness.

Answers

The way to respond to the theft of your identity cyber awareness is; To report the crime to the local commission which is the Federal Trade Commission (FTC).

Protection from Identity Theft

Identity Theft is basically a crime that happens happens when someone steals your personal information and uses it commit a fraudulent offence.

Now, the person that stole your identity may use the stolen information he got from you to apply for credit, file taxes, medical services or other government privileges.

The acts perpetuated above by the thief could lead to damage to your reputation with credit status and your good name too which could take years to rebuild.

Thus, it is very pertinent to report any case of such to the relevant government commission which in this case is Federal Trade Commission (FTC).

Read more about Identity Theft at; https://brainly.com/question/15252417

Read the integer numbers in the text file "1000 Random Number from 0 to 100.txt" into a list

PLEASE HELP THANK U!!

Answers

Answer:

random_number_file = open("1000 Random Number from 0 to 100.txt", 'r')

random_number_list = random_number_file.readlines()

print('random_number_list)

Explanation:

The name of the file containing the random integer text is ; "1000 Random Number from 0 to 100.txt"

The random_number_file variable stores the opened file ("1000 Random Number from 0 to 100.txt") using the open keyword and reads it ('r')

This file stored in the random_number_file variable is the read into a list by using the readlines() method on the random_number_file

what option to useradd creates a new user's home directory and provisions it with a set of standard files? (specify only the option name without any values or parameters.)

Answers

The -m. This option creates the user's home directory with the same name as the user and copies the skeleton directory (usually /etc/skel) into the home directory. It also sets the owner and group of the home directory to the user's UID and GID.

What is directory?
A directory is a type of hierarchical file system or database used to store and organize computer files and information. It is a way of categorizing and organizing files and data so that it is easily accessible. Directories can contain files and other directories, and can also be used to keep track of information such as usernames and passwords. The directory structure is often used to organize and store data in a way that is easy to manage and understand. It is also used to keep track of user access to files and folders, as well as to provide a secure environment for data storage. The directory structure can also be used to store information such as user profiles and settings, or to store files in a way that is easily searchable. Directories are often organized in a tree structure, with the root directory at the top of the tree and all other directories and files below it.

To learn more about directory
https://brainly.com/question/14364696
#SPJ1

If the following statement is performed: CD[ ] mycollection = new CD[200]; where CD is a previously defined class, then mycollection[5] is a CD object.

Answers

Yes, the statement is true CD[ ] mycollection = new CD[200]

In the statement CD[ ] mycollection = new CD[200];, a new array of 200 elements of type CD is created, and the reference to this new array is stored in the variable mycollection. Each element in the array is an instance of the CD class, so mycollection[5] would refer to the sixth element in the array, which would indeed be a CD object.

This syntax creates an array of objects, which can be useful when you need to store and manipulate a collection of objects of the same type. You can then access each individual object in the array using its index, as in the example above.

Learn more about use of arrays and classes in programming here:https://brainly.com/question/29537583

#SPJ11

what effect does the standby 2 track serial 0/0 25 interface configuration command have? (select two.)

Answers

The standby 2 track serial 0/0 25 interface configuration command has the effect of making Router A the backup router if the Serial 0/0 interface fails. You have two routers, A and B, and they should be setup for gateway redundancy.

What is an interface configuration command?

Interface configuration instructions change how the interface works. A global configuration command that defines the interface type is always followed by an interface configuration command.

To reach interface configuration mode, use the interface interface-id command. The new popup indicates that you are in interface setup mode.

The show interface command displays the interface state of the router. This output includes, among other things, the following: Status of the interface (up/down) The interface's protocol state.

The interfaces configuration file at /etc/network/interfaces may be used to configure the bulk of the network. Here, you may assign an IP address to your network card (or use DHCP), define routing information, create IP masquerading, establish default routes, and much more.

Learn more about Routers:
https://brainly.com/question/13600794
#SPJ1

It is possible for a computing device to be exposed to malicious software (malware) or reveal sensitive information:

Answers

Some of the most common sources of malware are email attachments, malicious websites, torrents, and shared networks.

What happens if your computer is infected by malware?

In short, malware can wreak havoc on a computer and its network. Hackers use it to steal passwords, delete files and render computers inoperable. A malware infection can cause many problems that affect daily operation and the long-term security of your company.

What is malicious software known as?

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.

To learn more about malicious software, refer

https://brainly.com/question/1308950

#SPJ4

You are working at a bank. People routinely come in to withdraw money from their accounts but always request that their money be given to them in the fewest number of bills possible. Write a program named change.c that asks the user how much money they would like to withdraw and then tells them how many of which bills they are to receive. You have bills in the following denominations: 1, 5, 10, 20, 50, and 100


Assumptions

All input is valid

The user will only ask for whole dollar ammounts (i.e. they won't ask for cents)

The examples provided do not represent all possible input you can receive

So make sure to test throughly on your machine

Answers

Here is a sample C program that satisfies the specifications you have provided:

#include

int main()

{  

int withdrawal_amount;    

int hundred_bills, fifty_bills, twenty_bills, ten_bills, five_bills, one_bills;    

printf("Enter the amount to withdraw: ");    

scanf("%d", &withdrawal_amount);    

hundred_bills = withdrawal_amount / 100;    

withdrawal_amount %= 100;    

fifty_bills = withdrawal_amount / 50;    

withdrawal_amount %= 50;    

twenty_bills = withdrawal_amount / 20;    

withdrawal_amount %= 20;    

ten_bills = withdrawal_amount / 10;    

withdrawal_amount %= 10;    

five_bills = withdrawal_amount / 5;    

withdrawal_amount %= 5;    

one_bills = withdrawal_amount;    

printf("Here are your bills:\n");    

printf("100's: %d\n", hundred_bills);    

printf("50's: %d\n", fifty_bills);    

printf("20's: %d\n", twenty_bills);    

printf("10's: %d\n", ten_bills);    

printf("5's: %d\n", five_bills);    

printf("1's: %d\n", one_bills);    

return 0;

}

In this program, the user is prompted to enter the amount of money they wish to withdraw. Then, the program calculates the number of bills of each denomination that the user should receive. Finally, the program prints out the results in a user-friendly format. The program works by first dividing the withdrawal amount by 100 to get the number of hundred-dollar bills the user should receive.

Then, it uses the modulus operator to obtain the remainder after the division. This remainder is then divided by 50 to get the number of fifty-dollar bills, and so on until the number of one-dollar bills is calculated.

To know more about program visit:

https://brainly.com/question/30613605

#SPJ11

Which term is generally used to describe the ways that users can view and analyze data to help them make decisions and complete their tasks

Answers

Reporting is the system that allows users to analyze and understand data through detailed analysis.

What is reporting?

Reporting is a classification system for relevant information that serves to make it accessible to users from different internal departments, according to their needs.

Characteristics of reporting

The preparation of reports is the result of a series of chained processes, which will vary depending on the objective to be achieved with the reporting.

The results of the analyzes have to be able to be shared, whose conclusions reached from the analytical process are those that allow directing the taking of actions or decisions in one direction or another.

Therefore, we can conclude that reporting allows users to perform searches, visualize data, prepare reports, and perform data analysis to help them make decisions.

Learn more about reporting here: https://brainly.com/question/1224013

what frame type should immediately follow a unicast data frame? question 13 options: a) rts b) cts c) ack d) probe response

Answers

The frame type that should immediately follow a unicast data frame is ACK (Acknowledgment). So, option c is correct.

When a unicast data frame is sent, the receiver sends an ACK frame to confirm that the data frame has been successfully received.

An ACK frame is used to confirm that the receiver has successfully received the unicast data frame. This ensures that the sender is aware that the data has been received and can continue with the next frame if required.

In wireless networks, it is essential to avoid collisions between frames sent by different devices. Therefore, when a device wants to send a unicast frame, it first senses the wireless medium to check if it is idle.

If the medium is busy, the device waits for some time and then retries to send the frame. Once the unicast data frame is successfully transmitted, the receiver sends an ACK frame to the sender to confirm the receipt of the frame.

An RTS (Request to Send) frame is used by the sender to request permission from the receiver to transmit data. The CTS (Clear to Send) frame is sent by the receiver to indicate that it is ready to receive data from the sender. However, these frames are not necessary after a unicast data frame has been transmitted, as the receiver has already received the data and acknowledged it through the ACK frame.

A Probe Response frame is used by wireless devices to provide information about their capabilities and network status. However, this frame type is not relevant to the transmission of unicast data frames.

So, option c is correct.

Learn more about unicast data frame:

https://brainly.com/question/32218725

#SPJ11

In Python, a function is _____.

a group of instructions that can be used to organize a program or perform a repeated task

a value that can be passed back to the calling part of a program

a formula that pairs each x-value with a unique y-value

a value that can be passed

Answers

Answer:

a group of instructions that can be used to organize a program or perform a repeated task

Explanation:

A function is a group of commands that can be called upon with extra parameters if needed.

Example:

def foo():                          #defining this function and naming it foo

    return True                 #what is performed when foo is called on

if foo() == True:               #foo() is calling on a function named foo

   print('yes')

The Fed: decreases the money supply when the economy contracts. performs banking services for commercial banks in districts where it operates. calculates the expected expenditure for the federal government every year. outlines expected revenue that is due from the collection of taxes and fees.

Answers

Answer:

performs banking services for commercial banks in districts where it operates.

Explanation:

The Federal Reserve System ( popularly referred to as the 'Fed') was created by the Federal Reserve Act, passed by the U.S Congress on the 23rd of December, 1913. The Fed began operations in 1914 and just like all central banks, the Federal Reserve is a United States government agency.

Generally, it comprises of twelve (12) Federal Reserve Bank regionally across the United States of America.

Hence, the Fed performs banking services for commercial banks in districts where it operates, as well as providing services to the general public.

T/F. Data flow anomalies are generally detected by dynamic techniques.

Answers

False. Data flow anomalies are generally detected by static techniques, such as program analysis and code reviews.

Dynamic techniques involve executing the program and observing its behavior during runtime. While dynamic techniques can also help detect some types of data flow anomalies, they may not be as effective in detecting all of them. For example, static analysis can identify potential data flow problems before the code is executed, which can save time and resources in testing and debugging. In contrast, dynamic techniques may not detect issues that only occur under specific conditions or inputs during program execution. Therefore, a combination of both static and dynamic techniques is often used to detect and prevent data flow anomalies in software.

Learn more about techniques here

https://brainly.com/question/12601776

#SPJ11

Other Questions
Radius 2 yd & height 5 yd When a catalyst is added to a reaction the rate of reaction,,, Athenians suffered further hardship [from the plague] owing to the crowding into the city of people from the country districts; and this affected the new arrivals especially. For since no houses were available for them, and they had to live in huts that were stifling in the hot season, they perished in wild disorder. Bodies of dying men lay one upon another and half-dead people rolled about in the streets and, in their longing for water, near all the fountains. The temples, too, in which they had quartered themselves were full of the corpses of those who had died in them; for the calamity which weighed upon them was so overpowering that men, not knowing what was to become of them, became careless of all law. . . . Thucydides, as quoted in Eyewitness to History Why did new arrivals to Athens live in huts? a. Huts were the cheapest form of housing. b. No houses were available for them. c. They preferred living in huts. d. Everyone in Athens lived in huts. Describe the basic pathway of information flow through neurons that causes you to turn your head when someone calls your name. the installation of the selector is completed after installing the trigger with the pin in place. If 3.0 moles of hydrogen react, how many grams of nitrogen will be used? Round your answer to the nearest whole number. N2 + 3H2 -> 2NH3 How did the rise of privately owned cable TV networks affect the revenue structure of European soccer teams? What would happen if the American bullfrog went extinct? NO LINKS!!!!!!!!!!!!!!!!!! Please help me! Ill name you brainiest!!! in dr. camara jones story of the gardeners tale, what does it represent when the gardener removes the struggling pink flower blossoms before they can seed more flowers? Explain in details how Galen , a physician during the Middle Ages, expanded on Hippocrates' theory of the four humors and explain what he believed each other humor represented ? the authors main purpose is to convince readers todevote less time to worrying about what to eat.resist working too much in favor of taking up the arts.avoid endangering themselves just so they can look better.spend as much time developing the mind as developing the body. -32 - 2(x4 10xc)-32 +- 50: 2(x2 10x + 25)18 = 2(x + 5)29 = (x + 5)2+=3 =x+ 5X=-20rX=-8 6. What actions did the Hongwu Emperor (ruled 136898) take to gain,consolidate, and maintain power ? 4. When rounding to the nearest ten and the nearest hundred, what number rounds to 400? a-295, b-299, c-390, d- 399 An image of a rhombus is shown.What is the area of the rhombus? What are some of the issues with benefits that employees bring up during negotiations? With health care now being one of the largest expenses for employers, how can health care be used to leverage negotiations? How do you make realistic goals?. You are trying to decide how much to save for retirement. Assume you plan to save $4,500 per year with the first investment made one year from now. You think you can earn 5.5% per year on your investments and you plan to retire in 35 years, immediately after making your last $4,500 investment. a. How much will you have in your retirement account on the day you retire? b. If, instead of investing $4,500 per year, you wanted to make one lump-sum investment today for your retirement that will result in the same retirement saving, how much would that lump sum need to be? c. If you hope to live for 17 years in retirement, how much can you withdraw every year in retirement (starting one year after rement will just exhaust your savings with the 17th withdrawal (assume your savings will continue to earn 5.5% in retirement)? d. If, instead, you decide to withdraw $90,000 per year in retirement (again with the first withdrawal one year after retiring), how many years will it take until you exhaust your savings? (Use trial-and-error, a financial calculator: solve for "N", or Excel: function NPER) e. Assuming the most you can afford to save is $900 per year, but you want to retire with $1,000,000 in your investment account, how high of a return do you need to earn on your investments? (Use trial-and-error, a financial calculator: solve for the interest rate, or Excel: function RATE) Match the following places with its description.