Based on the provided requirements, here's a Python solution that adheres to the given instructions:
```python
def print_longest_movies():
movies = []
while True:
title = input("Movie title (or blank to finish): ")
if not title:
break
duration = int(input("Movie duration (minutes): "))
movies.append((title, duration))
movies.sort(key=lambda x: x[1], reverse=True)
print("= Longest movies in the collection -")
for i, movie in enumerate(movies[:3], 1):
print(f"{i}. {movie[0]} ({movie[1]} minutes)")
print_longest_movies()
```
This code prompts the user to enter movie titles and durations until they input a blank title. It then sorts the movies based on their durations in descending order using the `sort()` method. Finally, it prints the top three longest movies using a loop.
The output of the code execution will match the example runs provided, handling both cases of having more than three movies and fewer than three movies in the collection.
To learn more about Vertigo click on:brainly.com/question/28318503
#SPJ11
A testing lab wishes to test two experimental brans of outdoor pain long each wiil last befor fading . The testing lab makes six gallon s of each paint to test. The resultare Shown to see how
Answer:
The answer is "\(\bold{Brand \ A \ (35, 350, 18.7) \ \ Brand \ B \ (35, 50, 7.07)}\)"
Explanation:
Calculating the mean for brand A:
\(\to \bar{X_{A}}=\frac{10+60+50+30+40+20}{6} =\frac{210}{6}=35\)
Calculating the Variance for brand A:
\(\sigma_{A}^{2}=\frac{\left ( 10-35 \right )^{2}+\left ( 60-35 \right )^{2}+\left ( 50-35 \right )^{2}+\left ( 30-35 \right )^{2}+\left ( 40-35 \right )^{2}+\left ( 20-35 \right )^{2}}{5} \\\\\)
\(=\frac{\left ( -25 \right )^{2}+\left ( 25 \right )^{2}+\left ( 15\right )^{2}+\left ( -5 \right )^{2}+\left ( 5 \right )^{2}+\left ( 15 \right )^{2}}{5} \\\\ =\frac{625+ 625+225+25+25+225}{5} \\\\ =\frac{1750}{50}\\\\=350\)
Calculating the Standard deviation:
\(\sigma _{A}=\sqrt{\sigma _{A}^{2}}=18.7\)
Calculating the Mean for brand B:
\(\bar{X_{B}}=\frac{35+45+30+35+40+25}{6}=\frac{210}{6}=35\)
Calculating the Variance for brand B:
\(\sigma_{B} ^{2}=\frac{\left ( 35-35 \right )^{2}+\left ( 45-35 \right )^{2}+\left ( 30-35 \right )^{2}+\left ( 35-35 \right )^{2}+\left ( 40-35 \right )^{2}+\left ( 25-35 \right )^{2}}{5}\)
\(=\frac{\left ( 0 \right )^{2}+\left ( 10 \right )^{2}+\left ( -5 \right )^{2}+\left (0 \right )^{2}+\left ( 5 \right )^{2}+\left ( -10 \right )^{2}}{5}\\\\=\frac{0+100+25+0+25+100}{5}\\\\=\frac{100+25+25+100}{5}\\\\=\frac{250}{5}\\\\=50\)
Calculating the Standard deviation:
\(\sigma _{B}=\sqrt{\sigma _{B}^{2}}=7.07\)
What would the internet be like today if there was no World Wide Web?
Answer:
Non existent probably
Explanation:
What is a layer, in the context of this lesson?
the ethernet word for a packet
a device for remembering something
a logical unit of a system
a computer’s most basic program
Answer:
A logical unit of a system.
Explanation:
i'm thinking your are talking about system layers such as the ISO? Layers help identify the order of how the whole system works.
A logical unit of a system is a layer, was the based on the lesson in the main motive. Thus, option (c) is correct.
What is layer?The layer refers to the layering method of breaking up the delivery of messages into discrete components and activities. Communication programs are frequently multi-tiered. Layers are useful because they allow you to add components to an image and work on them one at a time without permanently affecting the original image.
A logical unit is a device or software program that allows an end user (an application program, a terminal user, or an input/output mechanism) to connect to a network. A logical unit number is a one-of-a-kind identifier for a single or group of physical or virtual storage devices that execute.
As a result, the logical unit of a system is a layer, was the based on the lesson in the main motive. Therefore, option (c) is correct.
Learn more about on layer, here:
https://brainly.com/question/13490759
#SPJ5
In this last step of initiation phase, projects are (blank). At this stage, the project is (blank) with projects that are running.
Answer:
Approved; compared.
Explanation:
Project management can be defined as the process of designing, planning, developing, leading and execution of a project plan or activities using a set of skills, tools, knowledge, techniques and experience to achieve the set goals and objectives of creating a unique product or service.
Generally, projects are considered to be temporary because they usually have a start-time and an end-time to complete, execute or implement the project plan.
Furthermore, the main purpose of project management is working toward a common goal.
This ultimately implies that, project managers should ensure adequate attention and time is taken to identify, analyze and manage capital, raw materials, people, system of tasks and other resources, so as to effectively and efficiently achieve a common goal with all project stakeholders.
The fundamentals of Project Management includes;
1. Project initiation
2. Project planning
3. Project execution
4. Monitoring and controlling of the project.
5. Adapting and closure of project.
In the last step of an initiation phase, projects are approved for execution. Also, at this stage, the project is compared with projects that are running or already being executed.
In conclusion, it is very important and essential that project managers in various organizations, businesses and professions adopt the aforementioned fundamentals in order to successfully achieve their aim, objectives and goals set for a project.
in a basic program with 3 IF statements, there will always be _________ END IIF's.
a)2
b)3
c)4
Answer:
c)4
Explanation:
Hope it could helps you
What are good components to preorder a PC with that are cheep? It would be my first PC by the way.
Answer:
Good Components
.CPU AMD Threadripper 3960X Amazon
.CPU cooler NZXT Kraken X63 (280mm AIO liquid cooler) Overclockers
.GPU Zotac Gaming GeForce GTX 1660 6GB CCLonline
.Memory 32GB Corsair Dominator Platinum RGB 3200MHz Scan
Explanation:
once an individual validates another individual's certificate, what is the use of the public key that is extracted from this digital certificate?
An organization can safely transfer its public key for use in asymmetric cryptography by using a public key certificate.
By using a public key certificate, Charlie can't pretend to be Alice and transmit Bob his public key if he makes his own private and public keys. These keys aid in both the authentication of the communication partners' or devices' identities as well as the encryption process. To confirm that it has the public keys of the right server, the client needs to have access to the trusted party's public keys. The secure distribution of the public keys is then made possible with the use of digital certificates.
Learn more about certificate here-
https://brainly.com/question/14570536
#SPJ4
In 2-5 paragraphs, describe how you would create a new database using your software.
Answer:
1. open the software
2. select a new blank database or database wizard
3. name the database
4. enter field names and select the type of field (text, number, date, currency)
5. make one of the fields the primary key
6. click done, or save and close
7. open the table and add records
a user has complained about not being able to remove a program that is no longer needed on a computer. the programs option is not available in control panel. you suspect that a policy is enabled that hides this option from the user. but after opening the local group policy editor, you see that the policy to hide programs is not configured. you know that other users in this domain can access the programs option. where should you look next to determine whether the policy is enabled?
If the policy to hide programs is not configured in the Local Group Policy Editor, there may be another policy that is preventing the user from accessing the Programs option in Control Panel.
Here are some additional procedures you can take to troubleshoot this issue:
Check if the user account has sufficient privileges: Make sure that the user account that is trying to remove the program has administrative privileges. Only users with administrative rights can install or remove programs on a computer.Check if the program is installed for all users: Some programs can be installed either for a specific user or for all users on the computer. If the program was installed for all users, only an administrator can remove it. If the user is not an administrator, they may not be able to remove the program.Check for any other policies that may be affecting the user: There may be other policies that are preventing the user from accessing the Programs option in Control Panel. To check for this, run the command "gpresult /r" in the Command Prompt. This will display all the group policies that are applied to the user and computer.Check if the program can be uninstalled from the Start menu: Some programs can be uninstalled from the Start menu. To check if this is possible, go to the Start menu, find the program, and right-click on it. If there is an option to uninstall the program, click on it and follow the instructions.If none of these steps work, it may be necessary to contact the system administrator for further assistance.
Learn more about programs:
https://brainly.com/question/23275071
#SPJ11
What virtual, logically defined device operates primarily at the data link layer to pass frames between nodes?.
This vSwitch (virtual switch) or bridge is a logically defined device that operates at the Data Link layer to pass frames between nodes.
WHAT ARE NODES?
To put it simply, a node is any device that connects other devices connected to one another over a network and permits data to be sent and received from one endpoint to the other. Network nodes include hardware like printers, switches, and routers.An electronic gadget called a node. The physical components are what have the ability to send, receive, or forward data.Besides being an electronic device, a computer can send, receive, or forward data. As a result, we can argue that a computer is a node in a computer network for this reason. An electronic gadget called a node. The physical components are what have the ability to send, receive, or forward data.Hence,A logically defined device called a vSwitch (virtual switch) or bridge operates at the Data Link layer to pass frames between nodes.
learn more about nodes click here:
https://brainly.com/question/13992507
#SPJ4
What is the maximum number of NTP Servers that an NTP client can be synchronized with?
A. 2
B. Unlimited
C. 1
D. 4
Answer:
it will be unlimited NTP
The maximum number of NTP Servers that an NTP client can be synchronized with unlimited server. Thus option B is correct.
what is server ?A server is a computer device which provides service to client as per their requirement with respect to space and data; it is nothing but a physical computer that runs a server program in a center called data center.
The machine can be act as a dedicated server, a model where the client service operated called client/server programming model, these program fulfils requests from client programs which can run on the same or different computers.
A computer application on the server can be operated as per the request from client or from other programmer, it can also keep the feature or component of the folders from a website, hooked up into the web and facilitates the sharing of stored information with certain network linked computers.
For more details regarding server, visit
brainly.com/question/7142205
#SPJ2
What are characteristics of fluent readers? Check all that apply. reading known words automatically pronouncing words correctly reading words as quickly as possible understanding the meanings of the words being read O looking up all unknown words in the text being read
it's A,B,D
Answer:
D,A,B hope this is it!!!!!
Answer:
The person above me is correct
Explanation: credit to him
A technique used to compromise a system is known as a(n)
A. Asset
B. Access method
C. Exploit
D. Risk
The right answer is C, which states that an exploit is a method used to breach a system.
What is the definition of a system simple?A system is a group of components or elements positioned in order to accomplish a specific objective. The phrase (which is semantically related to the word "method" in the statement "I have my own little system") can be used to refer to both the components of the system and the actual structure or design (as in "computer system").
Why is a computer system important?It controls the hardware, software, processes, and memory of the computer. Using this technique, you can communicate with the computer even if you don't comprehend its language. An operating system is essential to the operation of a computer.
To know more about system visit-
brainly.com/question/9171028
#SPJ4
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
what is an error in a program called?
What is one difference between low- and high-level programming languages? (5 points)
O a
Ob
Low-level programming languages are challenging for humans to read, while high-level programming languages are easier.
Low-level programming languages are more human-friendly, while high-level programming languages are more challenging for
humans to understand.
Ос
Low-level programming languages require interpreters and compilers, while high-level programming languages do not.
Od
Low-level programming languages use program code to communicate with computers, while high-level programming languages
use machine code.
Answer: Low-level programming languages are computer code at its most basic. They are difficult or sometimes impossible for humans to read, while high-level languages are designed to be easy for humans to understand. I believe the answer is A.
Answer:
Low-level programming languages require interpreters and compilers, while high-level programming languages do not.
Explanation: I AM SURE IT IS CORRECT 100% CORRECT
Write a program that uses an initializer list to store the following set of numbers in a list named nums. Then, print the first and last element of the list.
56 25 -28 -5 11 -6
Sample Run
56
-6
List and Print Elements.
Here's a possible implementation of the program in Python:
python
Copy code
nums = [56, 25, -28, -5, 11, -6]
print("First element:", nums[0])
print("Last element:", nums[-1])
The output of the program would be:
sql
Copy code
First element: 56
Last element: -6
In this program, we first define a list named nums using an initializer list with the given set of numbers. Then, we use indexing to access the first and last elements of the list and print them to the console. Note that in Python, negative indices can be used to access elements from the end of the list, so nums[-1] refers to the last element of the list.
ChatGPT
6.25 lab: even/odd values in a vector write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither. the input begins with an integer indicating the number of integers that follow. ex: if the input is:
def is_list_even(my_list):
for i in my_list:
if(i%2 != 0):
return False
return True
def is_list_odd(my_list):
for i in my_list:
if(i%2 == 0):
return False
return True
def main():
n = int(input())
lst = []
for i in range(n):
lst.append(int(input()))
if(is_list_even(lst)):
print('all even')
elif(is_list_odd(lst)):
print('all odd')
else:
print('not even or odd')
if __name__ == '__main__':
main()
Write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum
allowed absent percentage rate is 15%. As an optional challenge you may enhance the program by considering some absences are excused and shall not be counted.
To write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum allowed absent percentage rate is 15%, you would need an algorithm and it is given below.
The AlgorithmStep 1: Start the execution of the program
Step 2: Read mark and absent percentage
Step 3: Checking if the given mark is greater than 60, if yes, displays the preassigned message
Step 4: If the mark is above 60
Step 5: Display, "Checking your absent record"
Step 6: If the absent percentage record is less than or equals to 15%
Step 7: Display, "This is a pass mark"
Step 8: Else, display "You failed"
Step 9: End program
What is an Algorithm?This refers to the sequence of steps that are followed in order to help write a program for use.
Hence, To write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum allowed absent percentage rate is 15%, you would need an algorithm and it is given above.
.
Read more about algorithms here:
https://brainly.com/question/24953880
#SPJ1
Java is considered to be architecture neutral because it:.
Answer:
Runs in a vm
Explanation:
Java runs in a virtual machine. It is compiled into bytecode that is interpreted by said virtual machine, and as long as there is a java virtual machine for an architecture, it will be able to run java.
Carlos had 194 seeds and 11 flower pots he put the same number of seeds in each flower pot which is the best estimate for the number of seeds in each flower pot a.10 b.20 c.30 d.40
Answer:
20?
Explanation:
Answer:
yes, 20 is the answer you make 194 and divide it equily.
Explanation:
A occurs when you reset a mobile device but retain your installed applications and personal settings
Answer:
Soft Reset
Explanation:
A Soft Reset is a type of reset in which a gadget such as smartphones, PC, or other related gadgets undergo to refresh or reset the device or makes certain applications work or function well without user data, settings and applications.
Hence, a SOFT RESET occurs when you reset a mobile device but retain your installed applications and personal settings
Answer:
Soft Reset
Explanation:
Create a list that will contain 14 elements, with the first 12 elements having the value “badger” and the last two elements having the value “mushroom”.
A list that contains 14 elements, with the first 12 elements having the value “badger” and the last two elements having the value “mushroom” is as follows:
list1 = ["badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "badger", "mushroom" "mushroom"]
Code explanationList are used to store multiple items in a variable. The items stored accommodate different datatype. List are represented with a square bracket "[]". The elements stored are placed inside the square brackets.
The python list is stored in the variable list1The python list has the first 12 elements as "badger" and the last two elements as "mushroom".learn more on list here: https://brainly.com/question/24941798
Which page layout is most commonly used for a website with a large navigation menu?
Explanation:
The Name is called, (navigation menu..)
to direct users 2 info., they look up...
Computer Systems Servicing
what are the steps in 5s program
you can just search that up on googl and it will show up
\hope I helped :)
if bptr is assigned b (the name of an array), then array element b[3] can alternatively be referenced with the pointer expression
a) bPtr + 5 b) *b [bPtr + 5] c) b[bPtr + 5] d) *( bPtr + 5)
The correct option is c) b[bPtr + 5)
Given that bptr is assigned b (the name of an array), then array element b[3] can alternatively be referenced with the pointer expression b[bPtr + 5].Step-by-step explanation:Given that,bptr is assigned b (the name of an array).bPtr holds the base address of the array b.The expression `b[bPtr + 5]` is equivalent to *(b+8), because the value of bPtr is the address of b[0].Thus, b[bPtr + 5] is the same as b[3].
The definition of an array in C is a way to group together several items of the same type. These things or things can have data types like int, float, char, double, or user-defined data types like structures. All of the components must, however, be of the same data type in order for them to be stored together in a single array. The items are kept in order from left to right, with the 0th index on the left and the (n-1)th index on the right.
Know more about array here:
https://brainly.com/question/13261246
#SPJ11
Queries are a very useful object in a database, please explain why.
Answer:
they tell the producer what to do to make their website better
Explanation:
How a game is played has a huge impact on what the player will experience. What is immediately affected by the way your game is controlled by the player?
Question 2 options:
aesthetics
immersion
flow
game feel
How a game is played has a huge impact on what the player will experience. The correct answer is: game feel.
What is the game about?Game feel refers to the tactile and sensory feedback that players experience when interacting with a game. It encompasses the responsiveness, smoothness, and overall feel of the game's controls, mechanics, and interactions. The way a game is controlled by the player directly affects the game feel, which in turn has a significant impact on the player's experience.
For example, if the controls of a game are clunky, unresponsive, or difficult to use, it can negatively impact the player's immersion and flow within the game. It can also affect the aesthetics, as players may struggle to interact with the game world or perform desired actions, leading to a less enjoyable experience overall
Therefore, the way a game is controlled by the player has a direct and immediate impact on the game feel, which in turn influences the player's experience in terms of aesthetics, immersion, and flow.
Read more about game here:
https://brainly.com/question/27355039
#SPJ1
Which file format is an audio file format?
A.
GIF
B.
PNG
C.
SWF
D.
WMA
Answer:
D. WMA
Explanation:
Windows media file
Describing the technologies used in diffrent generation of computer
Windows 98, Windows XP, Windows vista, Windows 7, Windows 8 y Windows 10.
Answer:
Evolution of Computer can be categorised into five generations. The First Generation of Computer (1945-1956 AD) used Vacuum Tubes, Second Generation of Computer (1956-1964 AD) used Transistors replacing Vacuum Tubes, Third Generation of Computer (1964-1971AD) used Integrated Circuit (IC) replacing Transistors in their electronic circuitry, Fourth Generation of Computer (1971-Present) used Very Large Scale Integration (VLSI) which is also known as microprocessor based technology and the Fifth Generation of Computer (Coming Generation) will incorporate Bio-Chip and Very Very Large Scale Integration (VVLSI) or Utra Large Scale Integration (ULSI) using Natural Language.
Explanation: