Answer:
Check the explanation
Explanation:
The Python program that frequently asks the user what pets the user has,
until the user enters "rock", in which case the loop ends can be analysed in the written codes below.
'''
# count of pets
count = 0
# read the user input
pet = input()
# loop that continues till the user enters rock
# strip is used to remove the whitespace
while pet.strip() != 'rock':
# increment the count of pets
count += 1
# output the pet name and number of pets read till now
print('You have a %s with a total of %d pet(s)' %(pet.strip(),count))
pet = input() # input the next pet
#end of program
Following are the python program to use the loop to count the number of pets until the user enters the "rock":
Program:c = 0#defining a variable c that initilzes with 0
p = input()#defining a variable p that input value
while p != 'rock':#defining a loop that check p value not equal to rock
c += 1#using c variable for counts total number of pets
print('You have a %s with a total of %d pet(s)' %(p,c))#print total number of pet
p = input() #input value
Output:
Please find the attached file.
Program Explanation:
Defining a variable "c" that is initialized with 0, which is used to count input values.In the next line, a "p" variable is declared as the input value from the user end.A while loop is declared to check that the p-value is not equal to 'rock'.Inside this loop, the "c" variable is used for counting the total number of pets, and a print method is used to print the total number of pets.Another input method is used that works until the user inputs the value that is "rock".Find out more about the loop here:
brainly.com/question/17067964
Plz help, will guve brainliest to best answer (if i can)
Answer:
Online text:1,3,4
not online text:2,5
Write the definition of a function named count that reads all the strings remaining to be read in standard input and returns their count (that is, how many there are) So if the input was:
hooligan sausage economy
ruin palatial
the function would return 5 because there are 5 strings there.
Answer:
The function written in C++
int str(string word) {
int count = 1;
for(int i =0; i<word.length();i++) {
if(word[i] == ' ') {
count++;
}
}
return count;
}
Explanation:
This line defines the function
int str(string word) {
This line initializes count to 1
int count = 1;
This line iterates through the input string
for(int i =0; i<word.length();i++) {
This line checks for blank space
if(word[i] == ' ') {
Variable count is incremented to indicate a word count
count++;
}
}
return count;
}
See attachment for full program
Computer one on network A, with IP address of 10.1.1.8 want to send a package to computer to with IP address of 10.1.1.205. Taking in consideration that computer one is sending an FTP request to computer to the store support on computer one is 21086, which of the following contains the correct information for the first TCP segment of data
Note that the right information for the first TCP segment of data in the given scenario is -
Source Port - 21086Destination Port - 21Sequence Number - 1 Acknowledgment Number - 2 Why is this so?Since Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21 (FTP default port),the sequence number would start at 1, and the acknowledgment number would be 2.
A TCP segment is a unit of data encapsulatedin a TCP /IP packet used for communication between devices over a network.
Learn more about TCP at:
https://brainly.com/question/18956070
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 10.1.1.205. Taking in consideration that computer 1 is sending a FTP request to computer 2, and the source port on computer 1 is 21086, which of the following contains the correct information for the first TCP segment of data?
Source Port: 5000
Destination Port: 80
Sequence Number: 1
Acknowledgment Number: 2
Source Port: 21086
Destination Port: 21
Sequence Number: 1
Acknowledgment Number: 2
Source Port: 21
Destination Port: 21
Sequence Number: 4
Acknowledgment Number: 1
Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 1
Answer:
Explanation:
Note that the right information for the first TCP segment of data in the given scenario is -
Source Port - 21086
Destination Port - 21
Sequence Number - 1
Acknowledgment Number - 2
Why is this so?
Since Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21 (FTP default port),the sequence number would start at 1, and the acknowledgment number would be 2.
A TCP segment is a unit of data encapsulatedin a TCP /IP packet used for communication between devices over a network.
What is a complier in computers
Answer:
Explanation:
A compiler is a computer program that translates source code into object code.
You may review Chapter 2, pages 67-71 of the textbook or communication skills.
Now please answer the following questions:
• What communication systems do you believe are best to be used at a help desk?
• What may be a couple of reasons for the satisfaction disparity?
• How can you ensure that all employees are satisfied with the help desk's services regardless of how
Responses to Other Students: Respond to at least 2 of your fellow classmates with at least a 50-100-w
found to be compelling and enlightening. To help you with your discussion, please consider the following
• What differences or similarities do you see between your posting and other classmates' postings?
**what communication system do you believe are best to be used at a help desk?
The communication systems that are said to be used at help desks are:
Phone as well as Call Center SystemThe use of Email SystemThe use of Ticketing SystemWhat is the communication systems?In terms of Phone as well as Call Center System: This is seen as a form of a traditional system of communication that is often used as help desks.
It is one that gives room for a lot of users to be able ot call as well as speak directly with the person who is a help desk agents for any form of assistance.
Hence the choice of communication the the person who is help desk wants to use can depend on a lot of factors.
Learn more about communication systems from
https://brainly.com/question/30023643
#SPJ1
TCPDump is used by Wireshark to capture packets while Wireshark own function is:
a. to provide a graphical user interface (GUI) and several capture filters.
b. to act as an intrusion prevention system (IPS) by stopping packets from a black-listed website or packets with payloads of viruses.
c. to defend the network against TCP SYN Flooding attacks by filtering out unnecessary TCP packets.
d. yet to be defined.
Answer:
a. to provide a graphical user interface (GUI) and several capture filters
Explanation:
TcPDump is a command line tool used to capture packets. TcPDump is used to filter packets after a capture has been done. To control network interfaces, TcPDump need to be assigned root privileges. Data is represented in form of text
Wireshark provide a graphical user interface (GUI) and several capture filters. It is a graphical tool used in packet capture analysis. Data is represented in wireshark as text in boxes.
The objective is to work with your partner to fix the HTML bugs so that none of the code is pink. In general, how do I change HTML code color?
Answer:
Click inspect then go to change color
Explanation:
there you go have a nice day!
what is the difference between hydra and hadoop?
Hadoop is batch oriented whereas Hydra supports both real-time as well as batch orientation.
The Hadoop library is a framework that allows the distribution of the processing of large data maps across clusters of computers using simple as well as complex programming models. batch-oriented analytics tool to an ecosystem full of multiple sellers in its own orientation, applications, tools, devices, and services has coincided with the rise of the big data market.
What is Hydra?
It’s a distributing multi - task-processing management system that supports batch operations as well as streaming in one go. It uses the help of a tree-based data structure and log algorithms to store data as well as process them across clusters with thousands of individual nodes and vertexes.
Hydra features a Linux-based file system In addition to a job/client management component that automatically allocates new jobs to the cluster and re-schedules the jobs.Know more about Big Data: https://brainly.com/question/28333051
PLEASE HELP!! QUICKLY! WILL GIVE BRAINLIEST!
Describe at least three important considerations when upgrading to new software in complete sentences.
Answer:
Storage
How it changes the layout
How it differs from the previous software
Explanation:
Storage is one of the most important things to think about because, if you do not have enough storage then the update only hurts you. Then plus you cannot even get the update in most cases. How it changes the layout and how it changes the computers is important because it can be what makes a person hate the newest software or not. If the layout changes to something you do not agree with, then it can leave a person all mixed up. Lastly how it differs is important because, how it differs from the previous can be the reason why or why not you even need the update. The differences could be good or bad. But whenever updating software always look at the terms and conditions, what it changes, and what it takes to update the software.
In which sections of your organizer should the outline be located?
The outline of a research proposal should be located in the Introduction section of your organizer.
Why should it be located here ?The outline of a research proposal should be located in the Introduction section of your organizer. The outline should provide a brief overview of the research problem, the research questions, the approach, the timeline, the budget, and the expected outcomes. The outline should be clear and concise, and it should be easy for the reader to follow.
The outline should be updated as the research proposal evolves. As you conduct more research, you may need to add or remove sections from the outline. You may also need to revise the outline to reflect changes in the project's scope, timeline, or budget.
Find out more on outline at https://brainly.com/question/4194581
#SPJ1
how do unblock a school chromebook
In the 1940s, computers were programmed using punch cards, or pieces of paper that had holes in them that represented binary code. If a mistake was made using this type of primitive programming, which of the following BEST describes what would need to be done to correct the problem?
A.
The entire program of punch cards had to be re-punched.
B.
The entire program of punch cards had to be loaded again and started over.
C.
The entire program needed to be rewritten and a different set of punch cards were used.
D.
The entire program could be fixed by adding or removing a card for the existing stack of papers.
Answer:
If a mistake was made using punch cards to program computers in the 1940s, the entire program of punch cards had to be re-punched to correct the problem. This was because punch cards were the primary means of input for the computer, and any changes or corrections to the program had to be physically made by punching new cards or modifying existing ones. Once the program was re-punched correctly, it could be loaded into the computer and executed.
Explanation:
Certain directors feel that the decision to increase the loan was a poor decision. Do you agree with this view? Explain. Quote TWO financial indicators and figures
Determining if the choice to amplify a loan was unwise or not is reliant on several factors and particularities specific to the situation at hand.
What are the financial indicators to use?There are two financial metrics that might provide insight into the situation, namely the debt-to-equity ratio and the interest coverage ratio.
An elevated ratio of debts-to-equity could imply elevated financial risk, whereas a meager ratio of interest coverage may indicate challenges in paying interest expenses.
In order to develop an informed viewpoint, a thorough evaluation of the company's financial situation supplemented by these crucial markers would be essential.
Read more aobut financial indicators here:
https://brainly.com/question/30453655
#SPJ1
After analyzing the following code, which statement is not True:
import sqlite3
connection = sqlite3.connect("aquarium.db")
a. import sqlite3 gives our Python program access to the sqlite3 module.
b. The sqlite3.connect() function returns a Connection object
c. The aquarium.db file is created automatically by sqlite3.connect() if aquarium.db does not already exist on our computer.
d. A syntax error, if aquarium.db does not already exist on our computer.
Answer:
d. A syntax error, if aquarium.db does not already exist on our computer.
Explanation:
The SQLite database is a relational database used readily in python backend web frameworks to store and retrieve data. The python packages like the sqlite3 are extensions of python proving its flexibility and power as a multi-purpose programming language.
The sqlite3 package is first installed and imported in the python file and a sqlite connection is made to the database which is automatically saved in the aquarium.db file ( created if it doesn't already exist ).
give one major environmental and
one energy problem kenya faces as far as computer installations are concerned?
One considerable predicament that Kenya encounters pertaining to the utilization of computers is managing electronic waste (e-waste).
Why is this a problem?The mounting number of electronic devices and machines emphasizes upon responsibly discarding outdated or defective hardware in order to avoid environmental degradation.
E-waste harbors hazardous materials such as lead, mercury, and cadmium which can pollute soil and water resources, thereby risking human health and ecosystem sustainability.
Consequently, a significant energy drawback with computer use within Kenya pertains to the insufficiency or instability of electrical power supply.
Read more about computer installations here:
https://brainly.com/question/11430725
#SPJ1
Discuss the Von-Neumann CPU architecture?
The Von Neumann architecture is a traditional CPU design named after John von Neumann and widely implemented since the mid-20th century.
What is the Von-Neumann CPU architecture?Basis for modern computers, including PCs, servers, and smartphones. Von Neumann architecture includes components for executing instructions and processing data. CPU is the core of Von Neumann architecture.
It manages operations, execution, and data flow in the system. Von Neumann architecture stores both program instructions and data in a single memory unit. Memory is organized linearly with each location having a unique address. Instructions and data are stored and retrieved from memory while a program runs.
Learn more about Von-Neumann CPU architecture from
https://brainly.com/question/29590835
#SPJ1
A programmer is developing a word game. The programmer wants to create an algorithm that will take a list of words and return a list containing the first letter of all words that are palindromes (words that read the same backward or forward). The returned list should be in alphabetical order. For example, if the list contains the words ["banana", "kayak", "mom", "apple", "level"], the returned list would contain ["k", "l", "m"] (because "kayak", "level", and "mom" are palindromes). The programmer knows that the following steps are necessary for the algorithm but is not sure in which order they should be executed. Executing which of the following sequences of steps will enable the algorithm to work as intended?
I. First shorten, then keep palindromes, then sort
II. First keep palindromes, then shorten, then sort
III. First sort, then keep palindromes, then shorten
Pilihan jawaban
a. I only
b. II only
c. I and III
d. II and III
Based on the above statement, pick (D) is the correct one. Prioritize palindromes, then shorten, and then sort III. Sorting was followed by shortening and retaining palindromes.
That would be what sort of an algorithm?Common examples of algorithms include the method for baking a cake, the approach we use to solve a long division challenge, washing laundry, and running a search query.
What is the simple definition of an algorithm?An algorithm is a technique used to do calculations or solve issues. Algorithms perform as a precise set of instructions which carry out preset activities consecutively in either hardware-based and software-based routines. Algorithms play a big role in information technology across the board.
To know more about Algorithm visit:
https://brainly.com/question/28650391
#SPJ4
Computers are used to input, store, process, find and share vast amounts of data and information, and they can do so in
fractions of a second. Discuss the concept of abstraction and abstract data types on computer programming
The concept of abstraction and abstract data types on computer programming is given below.
The use of abstraction to manage complexity is crucial. When anything is regarded abstractly, just the salient characteristics are highlighted. It is not necessary to recall or even notice the information that is left out.
What is abstraction?An abstraction of a data structure that merely provides the interface to which the data structure must conform is referred to as an abstract data type. No precise information about how something should be implemented or in what programming language is provided by the interface.
An object's behavior can be described by a set of values and a set of actions, and this behavior is known as an abstract data type (ADT). The definition of ADT merely specifies the actions that must be taken, not how they must be carried out.
Therefore, List data structures, stack data structures, and queue data structures are examples of abstract data types in data structures. The abstract data type defines a number of legitimate operations that can be performed on a specific data structure.
Learn more about abstraction from
https://brainly.com/question/7994244
#SPJ1
Which statements are true about mobile apps? Select 3 options.
The statements are true about mobile app development are;
Software development kits can provide a simulated mobile environment for development and testingMobile app revenues are expected to growWhether a mobile app is native, hybrid, or web, depends on how the app will be used and what hardware needs to be accessed by the appHow is this so?According to the question, we are to discuss what is mobile app and how it works.
As a result of this mobile app serves as application that works on our mobile phone it could be;
nativehybridwebTherefore, Software development kits can provide a simulated mobile environment.
Learn more about mobile apps at:
https://brainly.com/question/26264955
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Which of the following statements are true about mobile app development? Select 3 options.
• Software development kits can provide a simulated mobile environment for development and testing
• Testing is not as important in mobile app development, since the apps are such low-priced products
• Mobile apps can either take advantage of hardware features or can be cross-platform, but not both
• Mobile app revenues are expected to grow
• Whether a mobile app is native, hybrid, or web, depends on how the app will be used and what hardware needs to be accessed by the app
you have a desktop computer that provides a 250-watt power supply. you recently added a four-disk raid 10 array to the system, and now it spontaneously shuts down. which of the following would most likely solve this issue?
Upgrade to a power supply that provides more volts. The correct option is 4.
What is desktop computer?PC is an umbrella term for all Windows-based computers. Any computer that is stationary and is not a laptop is referred to as a desktop. PCs are all Windows-based desktops, but not all PCs are desktops.
Because you have a desktop computer with a 250-watt power supply. You recently added a four-disk raid 10 array to the system, and it is now shutting down on its own. Upgrade to a higher-voltage power supply.
Thus, the correct option is 4.
For more details regarding desktop computer, visit:
https://brainly.com/question/29130374
#SPJ1
Your question seems incomplete, the probable complete question is:
You have a desktop computer that uses a 250-watt power supply. You recently added a four-disk RAID 10 array to the system, and now it spontaneously shuts down.
Which of the following would MOST likely solve this issue?
Use the switch on the power supply to switch from 115 VAC to 230 VAC.Upgrade to a power supply that provides more watts.Upgrade to smaller capacity hard drives.Upgrade to a power supply that provides more volts.the time base for a timer instruction is 0.01 seconds. what is the delay time if the preset value is 3000
Answer:
suppose time base is set to 0.1 and delay increment is set to 50. timer has 5 sec delay (0.1*50)
not sure.
Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.
Answer:
Here's an example of a program that does what you've described:
# Get the number of elements in the array
n = int(input("Enter the number of elements to store in the array: "))
# Initialize the array
arr = []
# Get the elements of the array from the user
print("Enter the elements of the array:")
for i in range(n):
arr.append(int(input()))
# Print out which numbers are divisible by 5
print("The following numbers are divisible by 5:")
for i, x in enumerate(arr):
if x % 5 == 0:
print(f"{i}: {x}")
This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.
Explanation:
"our account has been moderated because one or more of the charges on the account were reported as unauthorized or disputed by the billing account holder". what notification is this?
This notification means that your account has been moderated because one or more of the charges on the account were reported as unauthorized or disputed by the billing account holder.
If you receive this notification, it means that your account has been moderated because one or more of the charges on the account were reported as unauthorized or disputed by the billing account holder.
This can happen if you make a charge that the account holder does not recognize, or if there is a dispute about a charge. If this happens, you will need to contact the billing account holder to resolve the issue.
For more questions like Notification click the link below:
https://brainly.com/question/6199558
#SPJ4
X565: Simple Text Parameter Output
The given method is incomplete, and there are errors in the examples and expected output provided. Here is the corrected method to print out the parameter in the explanation part.
What is programming?Making a set of instructions that instruct a computer how to carry out a task is the process of programming. Computer programming languages like JavaScript, Python, and C++ can all be used for programming.
The corrected method to print out the parameter is:
public void simplePrint(String a) {
System.out.println(a);
}
Examples and expected output:
simplePrint("Hello") outputs HellosimplePrint("Hello world!") outputs Hello world!simplePrint("hello") outputs hellosimplePrint("Hello World!") outputs Hello World!simplePrint("This is a sentence") outputs This is a sentencesimplePrint("1, 2, 3") outputs 1, 2, 3simplePrint("A new sentence") outputs A new sentenceThus, this can be the expected outputs.
For more details regarding programming, visit:
https://brainly.com/question/11023419
#SPJ9
Your question seems incomplete, the probable complete question is:
Simple Text Parameter Output Complete this method to print out the parameter.
Examples:
simpleprint (Hello) outputs Hello
simplePrint(Hello world!) outputs Hello world!
Your Answer: 1
public void simplePrint(String a) 2 { 3 43 5
simplePrint(Hello) outputs Hello -
simplePrint(hello) outputs hello
SimplePrint("hello") outputs "hello" expected:<[h]ello> but was:<[H]ello> simplePrint(Hello World!) outputs Hello World! SimplePrint("Hello World!") outputs "Her World!" expected:<Hello[ World!]> but w- <Hello[]>
simplePrint(This is a sentence) outputs TI is a sentence SimplePrint("This is a sentence") outputs "This is a sentence" expected:<[This is a sentence]> but was:<[Hello]>
simplePrint(1,2,3) outputs 1,2,3 SimplePrint("1, 2,3") outputs 1, 2, 3" expected:<[1, 2, 3]> but was:<[Hello]>
simplePrint(A new sentence) outputs A new
What type of system software manages memory?
Answer:
"Operating System"
Explanation:
The type of system software that manages memory is an operating system. To manage memory, the operating system employs a number of software strategies.
What is system software?The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer.
You can converse with the computer using this method even if you don't understand its language. Memory connections are the structures that come before and after all memory areas, whether they are allocated or available.
Working memory, short-term memory, and long-term memory are the three primary categories of memory. While long-term memory stores your enduring memories, working memory and short-term memory enable you to retain and use transient information.
Therefore, an operating system is a sort of system software that controls memory.
To learn more about system software, refer to the link:
https://brainly.com/question/12908197
#SPJ2
Array Basics pls help
Answer:
import java.util.Random;
class Main {
static int[] createRandomArray(int nrElements) {
Random rd = new Random();
int[] arr = new int[nrElements];
for (int i = 0; i < arr.length; i++) {
arr[i] = rd.nextInt(1000);
}
return arr;
}
static void printArray(int[] arr) {
for (int i = 0; i < arr.length; i++) {
System.out.println(arr[i]);
}
}
public static void main(String[] args) {
int[] arr = createRandomArray(5);
printArray(arr);
}
}
Explanation:
I've separated the array creation and print loop into separate class methods. They are marked as static, so you don't have to instantiate an object of this class type.
Which part of the Result block should you evaluate to determine the needs met rating for that result
To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.
What is the Result blockThe assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.
The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.
Learn more about Result block from
https://brainly.com/question/14510310
#SPJ1
Which four of the following are true about fair use?
D,C,B
Should be the correct answers. I'm not the best when it comes to copyright but I believe those are correct.
What is a common method used in social engineering?
Explanation:
they are phishing, pretexting, baiting, quid pro quo and tailgating.
What are the advantages, strengths and/or weaknesses of remote access methods and techniques such as RADIUS, RAS, TACACS+ and VPN?
Answer:
they store authentication details in the remote server and its retrieval is encrypted. But it can also be very slow when the network signal is down.
Explanation:
Private IP network like in a small or enterprise company needs access control methods to prevent unwanted access to files by unauthorized employees. The regular router ssh authentication is good for a small company but it has no backup storage to hold user login details and easily be hacked by attackers. So the AAA policy is adopted to prevent this. it stands for authentication, authorization and accounting, and uses protocols like the RADIUS, TACAS+, VPN, etc, to prevent unwanted access. it is fast and saves all the login details of all the employees in the network, but experiences slow or no authentication when network is down.