Honestly yeah. .-- .... .- -
Answer:
................. kinda?
Explanation:
Write a program that asks the user to enter the size of a triangle (an integer from 1 to 50). Display the triangle by writing lines of asterisks. The first line will have one asterisk, the next two, and so on, with each line having one more asterisk than the previous line, up to the number entered by the user. On the next line write one fewer asterisk and continue by decreasing the number of asterisks by 1 for each successive line until only one asterisk is displayed. (Hint: Use nested for loops; the outside loop controls the number of lines to write, and the inside loop controls the number of asterisks to display on a line.) For example, if the user enters 3, the output would be:_______.a. *b. **c. ***d. **e. *
Answer:
Implemented using Python
n = int(input("Sides: "))
if(n>=1 and n <=50):
for i in range(1,n+1):
for j in range(1,i+1):
print('*',end='')
print("")
for i in range(n,0,-1):
for j in range(i,1,-1):
print('*',end='')
print("")
else:
print("Range must be within 1 and 50")
Explanation:
This line prompts user for number of sides
n = int(input("Sides: "))
The line validates user input for 1 to 50
if(n>=1 and n <=50):
The following iteration uses nested loop to print * in ascending order
for i in range(1,n+1):
for j in range(1,i+1):
print('*',end='')
print("")
The following iteration uses nested loop to print * in descending order
for i in range(n,0,-1):
for j in range(i,1,-1):
print('*',end='')
print("")
The following is executed if user input is outside 1 and 50
else:
print("Range must be within 1 and 50")
A LinkedIn profile is required to be able to share your work experience and qualifications with potential employers.
True
False
Answer:
False
Explanation:
A LinkedIn profile is not required.
what is data abstraction and data independence?
Data abstraction and data independence are two key concepts in computer science and database management systems. They are closely related and aim to improve the efficiency, flexibility, and maintainability of data management.
What is data abstraction and data independence?The definitions of these two are:
Data Abstraction:
Data abstraction refers to the process of hiding the implementation details of data and providing a simplified view or interface to interact with it. It allows users to focus on the essential aspects of data without being concerned about the underlying complexities. In programming languages, data abstraction is often achieved through the use of abstract data types (ADTs) or classes.
By abstracting data, programmers can create high-level representations of data entities, defining their properties and operations.
Data Independence:
Data independence refers to the ability to modify the data storage structures and organization without affecting the higher-level applications or programs that use the data. It allows for changes to be made to the database system without requiring corresponding modifications to the applications that rely on that data. Data independence provides flexibility, scalability, and ease of maintenance in database systems.
Learn more about data at:
https://brainly.com/question/179886
#SPJ1
which country did poker originate from?
Poque, a game that dates back to 1441 and that was supposedly invented in Strasbourg, seems to be the first early evidence of the French origin of the game. Poque in particular used a 52-card deck
France/French
The new restaurant struggled to attract patrons
The words that which when inserted in the sentence to replace the blank or blanks best fits the meaning of the sentence is: Purvey (Option A).
Hence the full sentence is:
"The new restaurant struggled to attract patrons; it was the first to Purvey its type of cuisine to the neighborhood, and many people were unfamiliar with it.
What is the meaning of the word Purvey?Purvey means:
to offer for sale food, services, or information as a business orto to make available for sale goods or services as a business, or to provide information.It can also mean to offer for sale goods and services to those who need them and or who are willing and capable of purchasing them.
Other examples of the use of the word "Purvey" are:
They purvey very wrong images and slogans, appeal to emotional vulnerabilities, and foster biased expectations, rather than convey useful information about artificial intelligence.
On the other hand, the concept that 'real' fulfillment in life is found for women in the 'private', loving connections of home and family is still commonly held and "purveyed."
Learn more about words that best fit:
https://brainly.com/question/1493725
#SPJ1
Full Question:
Chose the word or words that, when inserted in the sentence to replace the blank or blanks best fits the meaning of the sentence
The new restaurant struggled to attract patrons; it was the first to ………… its type of cuisine to the neighborhood, and many people were unfamiliar with it.
1.Purvey
2.Asperse
3.Immure
4.Consort
5.coalesce
Date:
Difference between Chemical Equivalent and Electroche-
mical equivalent.
Answer:
chemical equivalent of an element is the value obtained by dividing the atomic weigh of the given element by valency
Consider the following method, which is intended to count the number of times the letter "A" appears in the string str.
public static int countA(String str)
{
int count = 0;
while (str.length() > 0)
{
int pos = str.indexOf("A");
if (pos >= 0)
{
count++;
/* missing code */
}
else
{
return count;
}
}
return count;
}
Which of the following should be used to replace /* missing code */ so that method countA will work as intended?
A) str = str.substring(0, pos);
B) str = str.substring(0, pos + 1);
C) str = str.substring(pos - 1);
D) str = str.substring(pos);
E) str = str.substring(pos + 1);
The instruction that should replace /* missing code */ so that the method countA works as intended is (e) str = str.substring(pos+1);
MethodsThe program is an illustration of methods (or functions)
Methods are blocks of program statements that are executed when called or evoked
For the method to return the number of character A in a string, the loop body must check if the current character is A.
This is done using the substring method of a string
The syntax of this is: str.substring(pos + 1).
Where str represents the string, and pos + 1 represents the character index
Hence, the missing instruction is str = str.substring(pos+1);
Read more about methods at:
https://brainly.com/question/14284563
Drag each label to the correct location on the table.
Match the correct features to virtualization and cloud computing.
allows multiple operating systems
to run on a single machine
consolidates hardware devices into
a physical server
allows users to access data from anywhere
includes services such as platform
as a service and desktop as a service
uses a hypervisor that can be type 1 or type 2
allows users to run software applications
on web browsers without installing
the application locally
Match the correct features to virtualization and cloud computing is allows multiple operating systems to consolidates hardware and uses a hypervisor to allows users to access
Divide the statement in virtualization and cloud computing ?
sing virtualization, different operating systems can operate on a single machine using a type 1 or type 2 hypervisor.
Users can access data from anywhere using cloud computing, which combines hardware devices into a physical server and offers services like platform as a service and desktop as a service. Users can execute software applications on web browsers without having to install them locally.
Know more about virtualization Visit:
brainly.com/question/31037702
#SPJ1
Which three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI
Answer:
Primary DNS server
Secondary DNS server
Default gateway
Explanation:
The following tests are performed by ESXi:
Pings the subnet gateway that is stated.Pings the primary DNS server that is stated.Pings the secondary DNS server that is stated.Ensure that the hostname of the ESXi host is resolved by it.Based on the above, the three IP addresses may be pinged by the Test Management Network feature in the ESXi hosts DCUI are are therefore the following:
Primary DNS serverSecondary DNS serverDefault gatewayb) Develop a truth table for expression AB+ C.
what is the mean of debugging
Answer:
the process of identifying and removing errors from computer hardware or software
Explanation:
Essentially just fixing programming errors, mainly in coding or software
Write the SQL queries that accomplish the following tasks in the HAFH Realty Company Property Management Database:
The complete question is:
Write the SQL queries that accomplish the following tasks in the HAFH Realty Company Property Management Database:
a. Display the SMemberID and SMemberName for all staff members.
b. Display the CCID, CCName, and CCIndustry for all corporate clients.
c. Display the BuildingID, BNoOfFloors, and the manager’s MFName and MLName for all buildings.
d. Display the MFName, MLName, MSalary, MBDate, and number of buildings that the manager manages for all managers with a salary less than $55,000.
e. Display the BuildingID and AptNo, for all apartments leased by the corporate client WindyCT.
f. Display the InsID and InsName for all inspectors whose next inspection is scheduled after 1-JAN-2014. Do not display the same information more than once.
g. Display the SMemberID and SMemberName of staff members cleaning apartments rented by corporate clients whose corporate location is Chicago. Do not display the same information more than once.
h. Display the CCName of the client and the CCName of the client who referred it, for every client referred by a client in the music industry.
i. Display the BuildingID, AptNo, and ANoOfBedrooms for all apartments that are not leased.
Also a schema of the HAFH database is attached.
Answer:
Using SQL's SELECT, FROM, WHERE syntax, find below the queries for each question.
a.
SELECT SMemberID , SMemberName
FROM staffmember
b.
SELECT CCID, CCName, CCIndustry
FROM corpclient
c.
SELECT b.BuildingID, b.BNoOfFloors, m.MFName, m.MLName
FROM building b, manager m
WHERE b.ManagerID = m.ManagerID
d.
SELECT m.MFName, m.MLName, m.MSalary, m.MBDate, count(*) as buildings
FROM building b, manager m
WHERE m.MSalary<55000
AND b.ManagerID = m.ManagerID
GROUP BY m.ManagerID
e.
SELECT b.BuildingID, a.AptNo
FROM building b, apartment a, corpclient c
WHERE c.CCName = "WindyCT"
AND c.CCID = a.CCID
AND a.BuildingID = b.BuildingID
f.
SELECT DISTINCT i.InsID, i.InsName
FROM inspector i, inspecting x
WHERE i.InsID = x.InsID
AND x.DateNext > "2014-01-01"
g.
SELECT DISTINCT s.SMemberID, s.SMemberName
FROM staffmember s, cleaning c, apartment a, corpclient cc
WHERE s.SmemberID = c.SmemberID
AND c.AptNo = a.AptNo
AND a.CCID = cc.CCID
AND cc.CCLocation = "Chicago"
h.
SELECT cc1.CCName, cc2.CCName
FROM corpclient cc1, corpclient cc2
WHERE cc1.CCIDReferencedBy = cc2.CCID
AND cc2.CCIndustry = "Music"
i.
SELECT a.BuildingID, a.AptNo, a.ANoOfBedrooms
FROM apartment a
WHERE a.CCID NOT IN (SELECT c.CCID FROM corpclient c)
Complete the sentence about bias and equity.
To reduce bias in computational artifacts, mentally and physically challenged individuals need to be able to
as many aspects of the artifact as possible.
Develop
Control
Accomdate
To reduce bias in computational artifacts, and physically challenged individuals need to be able to control as many aspects of the artifact as possible.
What is computational bias?Machine getting to know bias, additionally now and again referred to as a set of rules bias or AI bias, is a phenomenon that takes place whilst a set of rules produces effects which might be systemically prejudiced because of faulty assumptions withinside the gadget getting to know the process.
Algorithms also can make biased predictions, main to what's now referred to as algorithmic bias. On the opposite hand, human's response to the output of gadgets getting to know strategies with algorithmic bias get worse the conditions with the aid of using making choice primarily based totally on biased information, in an effort to possibly up with the aid of using algorithms later.Read more about the bias :
https://brainly.com/question/24491228
#SPJ1
Answer:Complete the sentence about bias and equity.
Websites should
accommodate
mentally and physically challenged users by allowing them to control as many aspects of the website as possible.
Explanation:i got a 100% on edge
the internet is a network of only ten thousands computers true or false
With saying why true or why false
Thanks
Answer: False
Reason: There's a lot more then 10 thousand computers on the internet.
PHP Create a for loop that initialize with the variable $i = 10 The loop outputs $i as long as $i is greater than 1 using for loop Use echo statement to output $i Make sure to use operator based on the desired condition mentioned (increment $i++ / decrement $i–) Make sure each line of code ends with a semi colon i.e ;
Answer:
The PHP code is as follows
<?php
for ($i = 10; $i>1; $i--)
{
echo $i.' ';
}
?>
Explanation:
The code is self explanatory and doesn't require comments before it can easily understood.
The program starts with a php opening tag <?php
And it ends with the closing tag ?>
The interpretation of the question is to print integer values from 10 to 1
To do this, an iteration is needed.
The above program makes use of a for loop iteration.
Analysis;
for ( -> This shows that it is a for loop iteration
$i = 10; -> Iterating variable $i is initialized to 10 (that is; printing will start at 10)
$i>1; -> Iteration is valid while $i is greater than 1 (e.g. 2,3,4...10)
$i-- -> For every Iteration, decrease $i by 1
) -> End of Iterating condition
echo $i.' '; -> This line prints the valid values of $i. In this case, the values of $i is from 10 and stops at 2
The output is as follows
10 9 8 7 6 5 4 3 2
Write a Python program that will incorporate conditional looping to average a given number of assignment grades for a student. The program will calculate and display the average.
Pseudocode:
Enter number of grades to process.
Enter a student name
While loop counter is less than number of grades to process
Enter assignment grade
Add grade to grade tally
Increment loop counter
Calculate student average
Display student average
Answer:
Explanation:
Here is a Python program that incorporates conditional looping to average a given number of assignment grades for a student:
# Enter number of grades to process
num_grades = int(input("Enter the number of grades to process: "))
# Enter student name
student_name = input("Enter the student name: ")
# Initialize grade tally and loop counter
grade_tally = 0
counter = 0
# While loop to get grades and add them to grade tally
while counter < num_grades:
grade = int(input("Enter assignment grade: "))
grade_tally += grade
counter += 1
# Calculate student average
if num_grades > 0:
avg = grade_tally / num_grades
else:
avg = 0
# Display student average
print("The average grade for", student_name, "is", avg)
In this program, we first ask the user to enter the number of grades to process and the student name. We then use a while loop to get the specified number of grades and add them to the grade tally. After all grades have been processed, we calculate the student average by dividing the grade tally by the number of grades (if the number of grades is greater than 0). Finally, we display the student's name and average grade.
What is a malicious actor essentially looking for when attempting a network attack?
Answer:
information of personnel
Explanation:
The malicious actor that is essentially looked for when attempting a network attack is information of personnel.
Who are malicious actors?
An entity that is partially or completely accountable for an occurrence. It has an impact on or the potential to have an impact on the security of an organization and is referred to as a threat actor, also known as a malicious actor or bad actor.
Actors are typically divided into three categories in threat intelligence: partner, internal, and external. Any individual or group that wreaking havoc online is referred to as a threat actor, also known as a malevolent actor.
They carry out disruptive assaults on people or organizations by taking advantage of holes in computers, networks, and other systems.
Therefore, when attempting a network attack, personnel information is the main harmful actor that is sought after.
To learn more about malicious factors, refer to the link:
https://brainly.com/question/29848232
#SPJ2
What is the defference between a direct and inairect address instruction?
The difference between a direct and indirect address instruction is given below
In a computer program, an instruction can be either a direct address instruction or an indirect address instruction.
A direct address instruction is one that tends to specifies the memory location of the data being accessed or the instruction being executed. In this case, the address of the data or instruction is specified directly in the instruction itself.An indirect address instruction, is one that can be, specified as a memory location that contains the address of the data being accessed or the instruction being executed. In this case, the instruction contains the address of a memory location that holds the actual address of the data or instruction.Therefore, the the instruction directly specifies the address of the data being accessed, in another case, the instruction specifies the address of a memory location that holds the actual address of the data being accessed.
Learn more about indirect address instruction from
https://brainly.com/question/24368373
#SPJ1
See full question below
What is the difference between a direct and indirect address instruction?
What does the list "car_makes" contain after these commands are executed?
car_makes = ["Ford", "Volkswagen", "Toyota"]
car_makes.remove("Ford")
1. ['', 'Porsche', 'Vokswagen', 'Toyota']
2. ['Volkswagen', 'Toyota']
3. ['Toyota', 'Ford']
4. [null, 'Porsche', 'Toyota']
Answer:
The correct answer is option 2: ['Volkswagen', 'Toyota']
Explanation:
After the remove method is called on the car_makes list to remove the element "Ford", the list car_makes will contain the elements "Volkswagen" and "Toyota"
You are the network administrator for the ABC Company. Your network consists of two DNS servers named DNS1 and DNS2. The users who are configured to use DNS2 complain because they are unable to connect to internet websites. The following shows the configuration of both servers:
Server Configurations:
DNS1: _msdcs.abc.comabc.com
DNS2: .(root)_msdcs.abc.comabc.com
The users connected to DNS2 need to be able to access the internet. What should be done?
Answer:
ABC Company
The action to take is to:
Delete the .(root) zone from the DNS2. Then configure conditional forwarding on the DNS2 server. If this is not done, the users will be unable to access the internet.
Explanation:
DNS forwarding enables DNS queries to be forwarded to a designated server, say DNS2, for resolution according to the DNS domain name. This stops the initial server, DNS1, that was contacted by the client from handling the query, thereby improving the network's performance and resilience and enabling the users to be connected to the DNS2 in order to access the internet.
What does the acronym SMART stand for
Specific, Measurable, Achievable, Relevant, Time-bound
write a script that creates and calls a stored procedure named insert_category. first, code a statement that creates a procedure that adds a new row to the categories table. to do that, this procedure should have one parameter for the category name. code at least two call statements that test this procedure. (note that this table doesn’t allow duplicate category names.)
The script that creates and calls a stored procedure named update_product_discount that updates the discount_percent column in the Products table is given below:
//This procedure should have one parameter for the product ID and another for the discount percent.
If the value for the discount_percent column is a negative number, the stored procedure should signal state indicating that the value for this column must be a positive number.//
Code at least two CALL statements that test this procedure.
*/
DROP PROCEDURE IF EXISTS update_product_discount;
DELIMITER //
CREATE PROCEDURE update_product_discount
(
product_id_param INT,
discount_percent_param DECIMAL(10,2)
)
BEGIN
-- validate parameters
IF discount_percent_param < 0 THEN
SIGNAL SQLSTATE '22003'
SET MESSAGE_TEXT = 'The discount percent must be a positive number.',
MYSQL_ERRNO = 1264;
END IF;
UPDATE products
SET discount_percent = discount_percent_param
WHERE product_id = product_id_param;
END//
DELIMITER ;
-- Test fail:
CALL update_product_discount(1, -0.02);
-- Test pass:
CALL update_product_discount(1, 30.5);
-- Check:
SELECT product_id, product_name, discount_percent
FROM products
WHERE product_id = 1;
-- Clean up:
UPDATE products
SET discount_percent = 30.00
WHERE product_id = 1;
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Kiera decided to enroll in college because her friends told her it was a good idea and they wanted her to follow their lead. Kiera’s not sure about becoming a college student. Which statement has the most impact on Kiera’s family’s future?
What symbol following a menu command lets you know that a dialog box will be displayed? an ellipse an arrow a check mark a radio button
cords and batteries or electric radio
Answer:
It would be an ellipse
Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT
Answer: C. Executive information system
Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.
An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.
Given that,
Most useful information about determining what direction to go in the next two years.
Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.
It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.
This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.
EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.
So, the correct option is,
C. Executive information system
To learn more about Executive information systems visit:
https://brainly.com/question/16665679
#SPJ6
Select the correct navigational path to create the function syntax to use the IF function.
Click the Formula tab on the ribbon and look in the ???
'gallery
Select the range of cells.
Then, begin the formula with the ????? click ?????. and click OK.
Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.
Answer:
1. Logical
2.=
3.IF
Explanation:
just did the assignment
Elena is a board game developer and has a website where she regularly posts about the work she is doing for her next game, mostly about the trials and tribulations of being a full-time game developer. What is the best description for Elena’s site?
Since Elena is a board game developer and has a website where she regularly posts about the work she is doing for her next game, the best description for Elena’s site is Blog
What a blog is used for?A blog, often known as a weblog, is a frequently updated online page that is used for commercial or personal comments. A area where readers can leave comments is usually included at the bottom of each blog article because blogs are frequently interactive.
Note that a blog is a web page that you frequently update. Brands frequently include blogs on their websites, making it simpler for visitors to find and interact with your postings. You can offer lengthy articles on your blog that cover subjects your target audience might be interested in reading or learning about and this is what Elena's site is all about.
Learn more about Blog from
https://brainly.com/question/16930663
#SPJ1
1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols
Answer:
e
Explanation:
e
Universal Containers (UC) is currently live with Sales Cloud and in the process of implementing Service Cloud. UC wants to create a sandbox to test its Service Cloud implementation with real Sales Cloud data. Which three Sandbox types can be used to accomplish this? Choose 3 answersA. Administrator SandboxB. Partial Copy SandboxC. Full SandboxD. Developer k Pro SandboxE. Test Sandbox
Answer:
B. Partial Copy Sandbox
C. Full Sandbox
D. Developer k Pro Sandbox
Explanation:
In this scenario Universal containers wants to implement a service cloud and test with real Sales Cloud data.
Service cloud is defined a system that allows automation of various customer service functions. It can listen to customers via different social media platforms and direct customers to agents that can solve their problems.
Sandbox is a testing environment that is isolated and allows for running of programs without affecting the application.
To test service cloud implementation with real data we use the following 3 sandboxes:
- Partial copy sandbox: copies only relevant data to test configurations with real data.
- Full Sandbox: makes a replica of data by copying all data such as attachments, metadata, and object records.
- Developer K pro sandbox: is used by developers to test software in an isolated environment and can use large data sets. It includes configuration data (metadata)
Describe three (3) software packages that can be used to capture data?
Answer:
SingleClick
SingleClick is an Optical Character Recognition (OCR) tool that can be used to capture machine produced characters in low volume ad-hoc capture applications and populating a line of business application.
OCR (Optical Character Recognition)
OCR as a technology provides the ability to successfully capture machine produced characters in preset zones or, full page. OCR systems can recognise many different OCR fonts, as well as typewriter and computer-printed characters. Dependent upon the capabilities of the particular OCR product, this can be used to capture low to high volumes of data, where the information is in consistent location(s) on the documents.
ICR (Intelligent Character Recognition)
ICR is the computer translation of hand printed and written characters. Data is entered from hand-printed forms through a scanner, and the image of the captured data is then analysed and translated by sophisticated ICR software. ICR is similar to optical character recognition (OCR) but is a more difficult process since OCR is from printed text, as opposed to handwritten characters.
(copied from Google)
; )