THE SCENARIO You are a junior IT professional at a small startup company. You have been asked by your manager to prepare the marketing director's iPad and notebook computer for an upcoming conference she is attending. While working on the notebook computer, you noticed that the integrated Wi-Fi adapter is not working. 18 Click to view Windows 10 BACKGROUND It's not easy to find a definition of mobile device that everyone agrees on. However, many would agree on the following. They are Lightweight, usually less than two pounds, Small, designed to move with you in your hand or pocket), Touch or stylus interface; no keyboard or mouse. Sealed unit lacking any user-replaceable parts, Non-desktop Os; mobile devices that use special mobile operating systems and Device variants. Most modern mobile devices fall into one of a few categories: • Smartphones • Tablets Phablets Wearable technology Other mobile devices are purpose-built to be better at some task such as an e-reader.

Answers

Answer 1

As a junior IT professional, you have been asked to prepare the marketing director's iPad and notebook computer for an upcoming conference she is attending. In this scenario, it is important to ensure that both devices are in good working condition and that all necessary software and applications are installed and updated.

To troubleshoot the issue with the integrated Wi-Fi adapter on the notebook computer, you can try the following steps:

Check the device's Wi-Fi settings and ensure that the Wi-Fi adapter is turned on and the device is connected to the correct network.

Restart the device and try connecting to the Wi-Fi network again.

Check the device's Wi-Fi drivers and ensure that they are up to date. You can update the drivers through the device's manufacturer's website or by using a driver update tool.

If the above steps do not resolve the issue, try resetting the device's network settings. This can be done through the device's settings menu.

If the issue persists, you may need to contact the manufacturer or a professional repair service for further assistance.

It is also important to ensure that the marketing director's iPad is fully charged and has all necessary applications and documents installed and updated for the conference. You should also make sure that the iPad is backed up to ensure that no important data is lost in case of any issues.

To know more about softwares, visit: https://brainly.com/question/28266453

#SPJ4


Related Questions

a triangular number is a number that is the sum of the integers from 1 to some integer n. thus 1 is a triangular number because it is the sum of the integers from 1 to 1; 6 is a triangular number because 1 + 2 + 3 = 6.given the non-negative integer n, create a list of the first n triangular numbers. thus if n was 5, the list would be: {1, 3, 6, 10, 15}.assign the list to variable traingulars

Answers

Answer:

def triangular_numbers(n):

triangulars = []

sum = 0

for i in range(1, n+1):

sum += i

triangulars.append(sum)

return triangulars

# Test the function

print(triangular_numbers(5)) # Output: [1, 3, 6, 10, 15]

Explanation:

To create a list of the first n triangular numbers, you can use a for loop to iterate from 1 to n, and for each iteration, add the current number to the sum of the previous numbers.

This function will create a list of the first n triangular numbers and return it. You can then assign the returned list to the variable triangulars.

A public Wi-Fi risk that can be minimized by only visiting encrypted sites with an HTTPS indicator is: *
Junk Mail
Rogue Public Wi-Fi
Harmful Software Attacks
Snooping

Answers

Answer: Harmful software attacks is the answer

Explanation:

Looking at the code below, what are the possible values that could be generated? (Assume Random has been imported with a new Random object).

int randomInt = rand.nextInt(2);
randomInt = randomInt + 1;
System.out.print(randomInt);

Answers

Answer:

1 or 2

Explanation:

rand.nextInt(2) generats a number between 0 and 2 ( not including 2). randomInt = randomInt + 1 adds 1 to that number.

the presentation name displayed at the top of the PowerPoint window is the?
A. filename
B. current slide
C. title slide (false)
D. slide name​

the presentation name displayed at the top of the PowerPoint window is the? A. filename B. current slide

Answers

The Title bar displays the name of the presentation on which you are currently working.

The presentation name displayed at the top of the PowerPoint window is the title slide (false). Thus, option C is correct.

What is presentation?

A presentation programme sometimes known as presentation software, is a software package used to display information as a slide show. It includes three key functions: an editor that allows text to be input and formatted, a search engine, and a calendar.

A user can use PowerPoint on the PC, Mac, or mobile device to:

Create presentations from scratch or using a template.Text, photographs, art, and videos may all be added.Using PowerPoint Designer, choose a professional design.

Therefore, option C is correct, that The title slide is the presentation name shown at the top of the PowerPoint window (false).

Learn more about the presentation, refer to:

https://brainly.com/question/820859

#SPJ2

def test_1():
test_3()
print("A")

def test_2():
print("B")
test_1()

def test_3():
print("C")
What is output by the following line of code?

test_1()

C

A
B
C

A
C

C
A

Answers

Answer:

The output is

C

A

Explanation:

Given

The given code segment

Required

The output of test_1()

When test_1() is called from main, the following is executed:

def test_1():

  test_3()  ---- This calls test_3()

  print("A") --- This is then executed after test_3() has been executed

For test_3()

def test_3():

print("C") --- This prints C

Back to test_1()

  print("A") --- This prints A

So, the output is:

C

A

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

def test_1():

 test_3()

 print("A")

def test_3():

print("C")

Back to test_1()

 print("A")

See more about python at brainly.com/question/26104476

def test_1(): test_3() print("A")def test_2(): print("B") test_1()def test_3(): print("C")What is output

which network type Is used in office or building?​

Answers

Answer:Local Area Network (LAN) is typically used in offices or  buildings.

Explanation:

which network type Is used in office or building?​

Answer:

LAN(local area Network

Explanation:

LAN(Local Area Network)

Local Area Network is a group of computers connected to each other in a small area such as building, office. LAN is used for connecting two or more personal computers through a

communication medium such as twisted pair, coaxial cable, etc.

i hope this helped

Type the correct answer in the box Spell all words correctly.
Jenny has entered data about models of laptops from company A and company B in a worksheet. She enters model numbers of laptops from company
A along with their details in different columns of the worksheet. Similarly, she enters details of all the laptop models from company B, Which option will
help Jenny view the data for company A and company B in two separate sections after printing?
The BLANK option will help her view the data for company A and company B in two separate sections after printing.

Answers

The option that will help Jenny view the data for company A and company B in two separate sections after printing is option A: Page Break View

The Split option will help her view the data for company A and company B in two separate sections after printing.

What does "page break" mean?

To conclude a page without adding more text, use page breaks. Put a page break after the graduation date on the title page, for instance, to ensure that the title page of your thesis or dissertation is distinct from the signature page.

Therefore, in the context of the above, Jenny can find the split option under the tab and the way to go about it is by: Select the Split command by clicking the View tab on the Ribbon. There will be several panes in the workbook. Using the scroll bars, you can navigate across each pane separately and compare various workbook portions.

Learn more about Page Break View from

https://brainly.com/question/6886781
#SPJ1

See full question below

Jenny has entered data about models of laptops from company A and company B in a worksheet. She enters model numbers of laptops from company A along with their details in different columns of the worksheet. Similarly, she enters details of all the laptop models from company B, Which option will help Jenny view the data for company A and company B in two separate sections after printing?

answer choices

Page Break View

Normal View

Margins View

Page Layout View

If you delete search results, you will a. clear the history on the computer. b. delete files from our computer. c. modify the results. d. be unable to search again.

Answers

Answer:

a. clear the history on the compute

Explanation:

If anybody goes through K through 12 can you please help me by putting the code for the 2.3.4 word definitions for coding​

If anybody goes through K through 12 can you please help me by putting the code for the 2.3.4 word definitions

Answers

Answer: if it helps there is a tutorial on YT that gives the answers if you just search  2.3.4 word definitions

Explanation:

Use a method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled. ​

Use a method from the JOptionPane class to request values from the user to initialize the instance variables

Answers

To use the JOptionPane class in Java to request values from the user and initialize instance variables of Election objects and assign them to an array, you can follow the steps given in the image:

What is the JOptionPane class

The code uses JOptionPane. showInputDialog to show a message box and get information from the user. IntegerparseInt changes text into a number.

After completing a process, the elections list will have Election items, and each item will have the information given by the user.

Learn more about JOptionPane class from

brainly.com/question/30974617

#SPJ1

Use a method from the JOptionPane class to request values from the user to initialize the instance variables

You are developing an Azure App Service web app that uses the Microsoft Authentication Library for .NET (MSAL.NET). You register the web app with the Microsoft identity platform by using the Azure portal.

You need to define the app password that will be used to prove the identity of the application when requesting tokens from Azure Active Directory (Azure AD).

Which method should you use during initialization of the app?

a. WithCertificate
b. WithClientSecret
c. WithClientId
d. WithRedirectUri
e. WithAuthority

Answers

Answer: b. WithClientSecret

Explanation: This method sets the application secret used to prove the identity of the application when requesting tokens from Azure Active Directory. WithCertificate is used to set the certificate that is used for the app to authenticate with Azure AD. WithClientId is used to set the client ID of the application, WithRedirectUri is used to set the redirect URI of the application and WithAuthority is used to set the authority to be used for the app's authentication.

where are for teypes of I .c.t

Answers

ICTs can be divided into four primary groups: internet, telecommunications, broadcasting, and computing and information technology.

ICT definition and kinds?

Any communication equipment, including radio, television, cell phones, computer and network hardware, satellite systems, and so on, as well as the various services and tools associated with them, such video conferencing and distant learning, falls within the broad definition of ICT.

What are the four ICT functions?

Creating, safeguarding, and storing the organization's electronic data, as well as assisting all functional areas of the business with the use of software and data management, are all included in the design and management of operational applications.

To know more about teypes I .c.t visit:-

https://brainly.com/question/14613945

#SPJ1

2. Write a C program that generates following outputs. Each of the

outputs are nothing but 2-dimensional arrays, where ‘*’ represents

any random number. For all the problems below, you must use for

loops to initialize, insert and print the array elements as and where

needed. Hard-coded initialization/printing of arrays will receive a 0

grade. (5 + 5 + 5 = 15 Points)

i)

* 0 0 0

* * 0 0

* * * 0

* * * *

ii)

* * * *

0 * * *

0 0 * *

0 0 0 *

iii)

* 0 0 0

0 * 0 0

0 0 * 0

0 0 0 *

2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional

Answers

Answer:

#include <stdio.h>

int main(void)

{

int arr1[4][4];

int a;

printf("Enter a number:\n");

scanf("%d", &a);

for (int i=0; i<4; i++)

{

for(int j=0; j<4; j++)

{

 if(j<=i)

 {

  arr1[i][j]=a;

 }

 else

 {

  arr1[i][j]=0;

 }

}

}

for(int i=0; i<4; i++)

{

for(int j=0; j<4; j++)

{

 printf("%d", arr1[i][j]);

}

printf("\n");

}

printf("\n");

int arr2[4][4];

int b;

printf("Enter a number:\n");

scanf("%d", &b);

for (int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  if(j>=i)

  {

   arr1[i][j]=b;

  }

  else

  {

   arr1[i][j]=0;

  }

 }

}

for(int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  printf("%d", arr1[i][j]);

 }

 printf("\n");

}

printf("\n");

int arr3[4][4];

int c;

printf("Enter a number:\n");

scanf("%d", &c);

for (int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  if(j!=i)

  {

   arr1[i][j]=c;

  }

  else

  {

   arr1[i][j]=0;

  }

 }

}

for(int i=0; i<4; i++)

{

 for(int j=0; j<4; j++)

 {

  printf("%d", arr1[i][j]);

 }

 printf("\n");

}

printf("\n");

return 0;

}

Explanation:

arr1[][] is for i

arr2[][] is for ii

arr3[][] is for iii

2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional
2. Write a C program that generates following outputs. Each of the outputs are nothing but 2-dimensional

Which of these are feasible/infeasible line sizes in a 2KB cache? Justify your answer with supportive arguments. a) 1B b) 32B c) 48B d) 64B e) 1KB

Answers

A cache is a hardware or software component in computing that stores data so that requests for it in the future can be processed more quickly. 2KB cache size have 32 B  size.

What is cache?

The data that is cached may be the output of a previous computation or a copy of data that is stored elsewhere. When the requested data can be located in a cache, it is called a cache hit; when it cannot, it is called a cache miss.

The more requests that can be satisfied from the cache, the faster the system operates because cache hits are satisfied by reading data from the cache, which is faster than recalculating a result or reading from a slower data store.

Caches must be relatively small to be economical and to allow for efficient data use.

Therefore, A cache is a hardware or software component in computing that stores data so that requests for it in the future can be processed more quickly. 2KB cache size have 32 B  size.

To learn more about cache, refer to the link:

https://brainly.com/question/15276918

#SPJ1

Joe, Kate and Jody are members of the same family. Kate is 5 years older than Joe. Jody is 6 years older than Kate . The sum of their ages squared is 961 years. What are their ages?

Answers

Answer:

5, 10 and 16

Explanation:

The sum of their ages is √961 = 31

If Joe is x years old, the equation that follows is:

x + (x+5) + (x+5+6) = 31

This simplifies to

3x = 31 - 11 - 5 = 15

so x=5

From that you can find

Joe = x = 5

Kate = x+5 = 10

Jody = x+5+6 = 16

Nia is editing a row in an Access table. The row contains the Pencil icon on the left end of the record
this icon indicate?
A. The record is committed.
B. The record has not been written.
C. The record has been written.
D. Nia is editing the record currently.

Answers

Answer:

The answer is D

Explanation:

That little pencil reminds you that you are entering or editing the current record, and that the changes you are making are not yet saved. The little pencil disappears as soon as you move off the current record. Take that as confirmation that Access has saved your new record, or the changes you made to an existing one.

In the case above, The row has the Pencil icon on the left end of the record this icon indicate Nia is editing the record currently.

What is record?

A record is known to be the state or fact of an act been put down or is been recorded.

Note that In the case above, The row has the Pencil icon on the left end of the record this icon indicate Nia is editing the record currently as it shows the pen icon.

Learn more about record  from

https://brainly.com/question/25562729

#SPJ9

GAME DESIGN
If you are designing a video game that will primarily be played on a smartphone or tablet, what considerations about the operation or control methods should you keep in mind?

Answers

If you are designing a video game that will primarily be played on a smartphone or tablet, the considerations about the operation or control methods that you should  keep in mind are:

The Orientation of the device; The processing power of the device; andThe size of the device in relation to the spacing of the controlls.

What are video games?

As a result, there is a growing need for mobile app development services and mobile app development companies. As a result of this demand, various smartphone app development businesses promise to provide excellent services.

Regardless of phone manufacturer improvements, there are still uses for the game design process, such as:

Feature Creep IssueNot Targeting the Correct AudienceGetting the Game NoticedManaging Security ConcernsOperating System Fragmentation.Creating the Monetization ModelUpkeep.

Learn more about video games:
https://brainly.com/question/28060919
#SPJ1

if you get a messge online saying you just won a game you just need to give ame email address and phone number to have it shipped what should you do

Answers

Answer:

block the number and cancel all notifications form that scammerrr

Explanation:

The third assignment involves writing a Python program to compute the cost of carpeting a room. Your program should prompt the user for the width and length in feet of the room and the quality of carpet to be used. A choice between three grades of carpeting should be given. You should decide on the price per square foot of the three grades on carpet. Your program must include a function that accepts the length, width, and carpet quality as parameters and returns the cost of carpeting that room. After calling that function, your program should then output the carpeting cost.
Your program should include the pseudocode used for your design in the comments. Document the values you chose for the prices per square foot of the three grades of carpet in your comments as well.
You are to submit your Python program as a text file (.txt) file. In addition, you are also to submit a test plan in a Word document or a .pdf file. 15% of your grade will be based on whether the comments in your program include the pseudocode and define the values of your constants, 70% on whether your program executes correctly on all test cases and 15% on the completeness of your test report.

Answers

Answer:

# price of the carpet per square foot for each quality.

carpet_prices=[1,2,4]

def cal_cost(width,height,choice):

 return width*height*carpet_prices[choice-1]  

width=int(input("Enter Width : "))

height=int(input("Enter Height : "))

print("---Select Carpet Quality---")

print("1. Standard Quality")

print("2. Primium Quality")

print("3. Premium Plus Quality")

choice=int(input("Enter your choice : "))

print(f"Carpeting cost = {cal_cost(width,height,choice)}")

Explanation:

The cal_cost function is used to return the cost of carpeting. The function accepts three arguments, width, height, and the choice of carpet quality.

The program gets the values of the width, height and choice, calls the cal_cost function, and prints out the string format of the total carpeting cost.

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
A) 14
B) 16
C) 254
D) none of the above

Answers

Answer:

tiddies

Explanation:

sukk

Translate the following C program to Pep/9 assembly language.
#include
int myAge;
void putNext(int age) {
int nextYr;
nextYr = age + 1;
printf("Age: %d\n", age);
printf("Age next year: %d\n", nextYr);
}
int main () {
scanf("%d", &myAge);
putNext(myAge);
putNext(64);
return 0;
}

Answers

In this exercise we have to use the knowledge of computational language in C code to write a code that Translate the following C program to Pep/9 assembly language.

Writting the code:

In C code:

#include <stdio.h>

int myAge;

void putNext(int age) {

int nextYr;

nextYr = age + 1;

printf("Age: %d\n", age);

printf("Age next year: %d\n", nextYr);

}

int main () {

scanf("%d", &myAge);

putNext(myAge);

putNext(64);

return 0;

}

In Pep 9 CODE-

myAge:

.zero 4

.LC0:

.string "Age: %d\n"

.LC1:

.string "Age next year: %d\n"

_Z7putNexti:

pushq %rbp

movq %rsp, %rbp

subq $32, %rsp

movl %edi, -20(%rbp)

movl -20(%rbp), %eax

addl $1, %eax

movl %eax, -4(%rbp)

movl -20(%rbp), %eax

movl %eax, %esi

movl $.LC0, %edi

movl $0, %eax

call printf

movl -4(%rbp), %eax

movl %eax, %esi

movl $.LC1, %edi

movl $0, %eax

call printf

nop

leave

ret

.LC2:

.string "%d"

main:

pushq %rbp

movq %rsp, %rbp

movl $myAge, %esi

movl $.LC2, %edi

movl $0, %eax

call scanf

movl myAge(%rip), %eax

movl %eax, %edi

call _Z7putNexti

movl $64, %edi

call _Z7putNexti

movl $0, %eax

popq %rbp

ret

See more about C code at  brainly.com/question/18502436

#SPJ1

Translate the following C program to Pep/9 assembly language.#include int myAge;void putNext(int age)

Asks the user to enter a name
2. Asks the user to enter a number "gross income"
3. Asks the user to enter a number "state tax rate"
4. Calculates the "Federal Tax". "FICA tax" and "State tax"
5. Calculates the "estimated tax" and round the value to 2 decimal places
6. Prints values for "name", "gross income" and "estimated tax"
The program should contain three additional variables to store the Federal tax, FICA tax, State tax, gross income, and estimated tax.
Federal Tax = gross income * 9.45%
FICA Tax = gross income * 7.65%
State Tax = gross income * your state tax percent
Estimated Tax = Federal tax + FICA tax + State tax
NOTE: Percentages must be converted to decimal values, for example:
15.9%=15.9*0.01=0.159
An example of the program's input and output is shown below:
Enter your name: Belinda Patton
Enter your gross income: 53398.12
Enter your state income tax rate: 4.27
Belinda Patton's estimated tax is $11411.08 based on a gross income of $53398.12

Answers

the program that calculates the estimated tax based on the given inputs:

python

Copy code

name = input("Enter your name: ")

gross_income = float(input("Enter your gross income: "))

state_tax_rate = float(input("Enter your state income tax rate: "))

federal_tax = gross_income * 0.0945

fica_tax = gross_income * 0.0765

state_tax = gross_income * (state_tax_rate * 0.01)

estimated_tax = federal_tax + fica_tax + state_tax

estimated_tax = round(estimated_tax, 2)

print(name + "'s estimated tax is $" + str(estimated_tax) + " based on a gross

Python is a high-level, interpreted programming language that is known for its simplicity and readability. It was created by Guido van Rossum and first released in 1991. Python has gained popularity among developers due to its clear and concise syntax, extensive standard library, and a large community that contributes to its ecosystem.

Python supports multiple programming paradigms, including procedural, object-oriented, and functional programming. It is widely used for various applications such as web development, scientific computing, data analysis, artificial intelligence, machine learning, automation, and more.

Learn more about python on:

https://brainly.com/question/30391554

#SPJ1

What additional uses of technology can u see in the workplace

Answers

Answer:

Here are some additional uses of technology in the workplace:

Virtual reality (VR) and augmented reality (AR) can be used for training, simulation, and collaboration. For example, VR can be used to train employees on how to operate machinery or to simulate a customer service interaction. AR can be used to provide employees with real-time information or to collaborate with colleagues on a project.Artificial intelligence (AI) can be used for a variety of tasks, such as customer service, data analysis, and fraud detection. For example, AI can be used to answer customer questions, identify trends in data, or detect fraudulent activity.Machine learning can be used to improve the accuracy of predictions and decisions. For example, machine learning can be used to predict customer churn, optimize marketing campaigns, or improve product recommendations.Blockchain can be used to create secure and transparent records of transactions. For example, blockchain can be used to track the provenance of goods, to manage supply chains, or to record financial transactions.The Internet of Things (IoT) can be used to connect devices and collect data. For example, IoT can be used to monitor equipment, track assets, or collect data about customer behavior.

These are just a few of the many ways that technology can be used in the workplace. As technology continues to evolve, we can expect to see even more innovative and creative uses of technology in the workplace.

Write a method LCM() that takes two integers as parameters and outputs the least common multiple of the two integers. That is, given two integers m and n, your method should return the smallest number k divisible by both m and n.
For example, the least common multiple of 3 and 7 is 21 since no smaller integer is divisible by both 3 and 7. However, the least common multiple of 3 and 12 is 12 – this shows that the LCM is not always the product of the two numbers!

Answers

Answer:

public static int LCM(int m, int n) {

   int lcm = 0;

   int a = Math.max(m, n);

   int b = Math.min(m, n);

   lcm = (a*b)/gcd(a,b);

   return lcm;

}

public static int gcd(int a, int b) {

   if (a == 0)

       return b;

   return gcd(b % a, a);

}

Explanation:

In C++, std::lcm() method has already defined in numeric header. You can use.

#include <numeric>

#include <iostream>

int main(int argc, char* argv[]) {

   

   //User variables.

   int x,y; std::cin>>x>>y;

   

   //Print the result by using std::lcm method in numeric header.

   std::cout << std::lcm(x,y) << std::endl;

   return 0;

}

Write a method LCM() that takes two integers as parameters and outputs the least common multiple of the

terms found in provider documentation (e.g., difficult, extensive, or unusual) would support adding modifier .... to a CPT code. A. -23 B.-22 C.-58 D. -99

Answers

Found in provider documentation would support adding modifier .... to a CPT code are .-58.

What is the modifier ?

A modifier is a word or phrase that modifies, or changes the meaning of, another word or phrase. It can be an adjective, adverb, or phrase that adds description or further detail. For example, in the sentence "The small dog barked loudly," "small" is the modifier that changes the meaning of the noun "dog" to give an idea of its size.A modifier is a word, phrase, or clause that provides additional information in a sentence, modifying or describing a noun or verb. Modifiers are used to add detail and precision to a sentence, and can be adjectives, adverbs, prepositional phrases, and participles.

To learn more about modifier

https://brainly.com/question/15108837

#SPJ4

You have been using your Microsoft cordless mouse for a year but it suddenly stopped
working. You did not install the mouse software (driver) from Microsoft when you got the
mouse because you did not care about using custom features. You have been using the
generic mouse software for Windows. List all of the troubleshooting steps you would do
before declaring that the mouse is defective.

Answers

A wireless mouse can be very portable and effective in our day-to-day work on the computer but can develop problems. one of the problems you might come across is that it suddenly stops working. this can be caused by either a software or hardware issue.

What are the possible issues?Possible software issuesCorrupt drivers Faulty operating system

Possible hardware issues:

Weak batteryFaulty dongleFaulty USB portsFaulty components on the mouse panel

Below are a list of troubleshooting steps

Check switchReplace batteryUninstall drivers and reinstallupdate drivers (if any available update)Reinstall OScheck dongleTry on another computer

Learn more about computer on:

https://brainly.com/question/24540334

#SPJ1

Which statement is NOT related to computational thinking?

Answers

The statement that is not related to computational thinking are option A, B and D:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions.  

Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

Computational thinking is a set of techniques used to help solve complex problems or understand complex systems.

What exactly is computational thought?

That difficult challenge is broken down into a succession of smaller, more manageable problems using computational thinking (decomposition).

Note that the ability to apply core ideas and logic from computer science and computing to address issues across all domains is known as computational thinking. CT is a set of problem-solving techniques used in education that entails describing issues and potential answers in a way that a computer might also carry out.

Therefore, The ability to solve problems in the actual world is computational thinking's greatest advantage.

Learn more about computational thinking  from

https://brainly.com/question/19189179
#SPJ1

See choices of this question below:

The result of computational thinking is a problem broken down into its parts to create a generalized model and possible solutions,

Computational thinking involves the techniques of decomposition, pattern recognition, abstraction, and algorithm development.

Computational thinking is basically synonymous with programming.

Computational thinking is a set of techniques used to help solve complex problems or understand complex systems

Understanding all of the minor details about a problem is critical in computational thinking

Our goal is to develop a very simple English grammar checker in the form of a boolean function, isGrammatical(wordList). To begin, we will define a sentence to be grammatical if it contains three words of form: determiner noun verb. Thus
[“the”, “sheep”, “run”] is grammatical but [“run”, “the”, “sheep”] is not grammatical nor is
[“sheep”, “run”]. By tagging convention, determiners are tagged as DT, nouns as NN, verbs as VB, and adjectives (which we discuss later) as JJ. The tagSentence function from the tagger module will help you convert your wordlist to tags; a challenge is that some words (such as swing) have multiple definitions and thus multiple parts of speech (as swing is a noun and swing is a verb). Carefully examine the results returned by tagSentence when defining the logic of isGrammatical.

Note that by our current definition, we are not concerned with other aspects of grammar such as agreement of word forms, thus “an sheep run” would be considered as grammatical for now. (We will revisit this concern later.)


[3 points]
Add the words “thief”, “crisis”, “foot”, and “calf” to the lexicon.txt file, and modify wordforms.py so that it generates their plural forms correctly (“thieves”, “crises”, “feet”, “calves”). In terms of categories for the lexicon.txt, thief is a person, crisis and feet are inanimates. Interestingly, ‘calf’ might be an animal (the young cow) but might be an inanimate (the part of the body).

We are not yet using plurals in our sentences, but you should be able to add additional tests within the wordforms.py file to validate that these new words and forms are handled properly.


[3 points]
The original lexicon includes singular nouns such as cat but not plural forms of those nouns such as cats, and thus a sentence such as “the cats run” is not yet deemed as grammatical. However, the wordforms module does include functionality for taking a singular noun and constructing its plural form.

Modify the code in tagger.py so that it recognizes plural forms of nouns and tags them with NNS. We recommend the following approach:


update the loadLexicon function as follows. Every time you encounter a word that is a noun from the original lexicon.txt file, in addition to appending the usual (word,label), add an extra entry that includes the plural form of that noun, as well as a label that adds an ‘s’ to the original label. For example, when encountering ‘cat’ you should not only add (‘cat’,’animal’) to the lexicon but also (‘cats’,’animals’).


Then update the the labelToTag function to return the new tag NNS when encountering one of those plural labels such as ‘animals’.


Test your new functionality on sentences such as “the cats run” as well as with your new plurals such as “thieves”.

[2 points]
The original lexicon includes verbs such as run but not 3rd person singular forms of those verbs that end in -s such as runs, and thus a sentence such as “the cat runs” is not yet deemed as grammatical. As you did with nouns in the previous step, modify the software so that 3rd person singular verbs are added to the lexicon and tagged as VBZ. Test this new functionality on sentences such as “the cat runs” and
“the sheep runs”.


[2 points]
Now we have both plural nouns and 3rd person singular verbs, however the grammar checker currently doesn’t match them and thus accepts sentences like
“the cat run” and “the cats runs”, neither of which is truly grammatical. Update the rules so that it requires the tag VBZ on the verb if the noun has the singular tag NN, and requires the tag VB on the verb if the noun has the plural tag NNS. Add some test cases to ensure the program is working as intended. Include tests with unusual forms such as the noun “sheep” that can be singular or plural; thus “the sheep runs” and “the sheep run” are grammatical. Make sure to update any previous tests to conform to these new expectations.


[2 points]
Update your grammar to allow any number of optional adjectives between the determiner and noun in a sentence, thereby allowing sentences such as
“the big sheep run” and “the big white sheep run”, though disallowing sentences such as “the cat sheep run”.

Answers

Using the knowledge in computational language in python it is possible to write a code that form of a boolean function, isGrammatical(wordList). To begin, we will define a sentence to be grammatical if it contains three words of form: determiner noun verb.

Writting the code:

# importing the library  

import language_tool_python  

 

# creating the tool  

my_tool = language_tool_python.LanguageTool('en-US')  

 

# given text  

my_text = 'A quick broun fox jumpps over a a little lazy dog.'  

 

# correction  

correct_text = my_tool.correct(my_text)  

 

# printing some texts  

print("Original Text:", my_text)  

print("Text after correction:", correct_text)  

See more about python at brainly.com/question/18502436

#SPJ1

Our goal is to develop a very simple English grammar checker in the form of a boolean function, isGrammatical(wordList).

public class Car {
public void m1() {
System.out.println("car 1");
}
â
public void m2() {
System.out.println("car 2");
}
â
public String toString() {
return "vroom";
}
}


public class Truck extends Car {
public void m1() {
System.out.println("truck 1");
}
}

And assuming that the following variables have been declared:

Car mycar = new Car();
Truck mytruck = new Truck();

What is the output from the following statements?

a. Sound F/X System.out.println(mycar);
b. mycar.m1();
c. mycar.m2();
d. System.out.println(mytruck);
e. mytruck.m1();
f. mytruck.m2();

Answers

Answer:

The Following are the outputs:

a. vroom

b. car 1

c. car 2

d. vroom

e. truck 1

f. car 2

Explanation:

The first statement System.out.println(mycar);  prints an instance of the Car object my car which calls the toString() method.

The second statement mycar.m1();  Calls the method m1() which prints car1

The third statement mycar.m2(); calls the method m2() which prints car2

Then another class is created Truck, and Truck inherits all the methods of Car since it extends Car. Truck has a method m1() which will override the inherited method m1() from the Car class.

The fourth statement System.out.println(mytruck); will print print vroom just as the first statement since it inherits that method toString()

The fifth statement calls m1() in the Truck class hence prints Truck 1

Finally the sixth statement will print car 2 because it also inherited that method and didnt overide it.

Before hard disk drives were available, computer information was stored on:

Floppy Disks

Cassette Tapes

Punch Cards

All of the Above

Answers

floppy disks . is the answer
Other Questions
to what temperature will 8800 j of heat raise 2.5 kg of water that is initially at 16.0 c ? the specific heat of water is 4186 j/kgc . Drew receives an inheritance that pays him $54,000 every three months for the next two years. Which of the following is closest to the present value (PV) of this inheritance if the interest rate is 8.9% (EAR)?A) $314,366B) $471,549C) $392,957D) $432,000 Can you please help me know which sets of values belong to the Domain and range of a relation? Manuel and Tammy are driving separate cars to los angles. What number gives a result of 3 when 7 is subtracted from the quotient of the number and 5? 1. A number cube is rolled 24 times and lands on 2 four times and on 6 three times. a. Find the experimental probability of landing on a 2. b. Find the experimental probability of not landing on a 6. Some time ago, Dak purchased land costing $67,900. Today, that land is valued at $62,800. If the land has been decreasing by 13 percent per year, how long has he owned this land? (Hint solving for N) Multiple Choice 3.09 years 5.97 years 4.02 years 4.91 years. 3.57 years Paint packaged in aerosol cans is dangerous because it has a risk of ___________.PollutingLeakingExplodingSpilling The post-second world war united states foreign policy that called for supporting european countries against communist invasions or communist revolutions was the? Differences between study skill and study methods? *what are things time when you study *what study methods will enable you to effectively prepare for exams a store sells 8 colors of balloons with at least 31 of each color. how many different combinations of 31 balloons can be chosen? apply the method of example 9.6.2 using balloons instead of cans of soft drinks to find that the number of different combinations of 31 balloons that can be chosen is 12620256 correct: your answer is correct. . When children reach school age, therapists often use a family intervention called parent management training to help treat which problem? In the following exercise eliminate the parameter t. Then use the rectangular equation to sketch the plane curve represented by the given parametric equations. Use arrows to show the orientation of the curve corresponding to increasing values of t. x=sqrt 3t, y=3t-8 How was Judaism so profound at the time of its conception ( ) . The Lorenzo family traveled 456 miles in 8 hours. how far will they travel in 12 hours Select all the expressions that are equivalent to 2525(15 20d). Why wasn't South Carolina upset when part of her land was given to Georgia? the length of a ractangle is 1 meter less than its width. the area of the rectangle is 42 square meters. Find the dimensions of the rectangle (using the x method) What are some of the Black American languages