def mystery (a):
for i in range (len(a)):
if (i % 2 == 1):
#*****
S
=
**** MAIN **********
[63, 72, 21, 90, 64, 67, 34]
print(a[i], end = "")
mystery(s)

Answers

Answer 1

Answer: The code defines a function named "mystery" that takes a list as an input argument. Within the function, a for loop iterates over the elements of the input list. If the index of the element is odd (i.e., has a remainder of 1 when divided by 2), the function prints the element without a newline character. The function is then called with the input list [63, 72, 21, 90, 64, 67, 34]. However, the function call is indented incorrectly and is not part of the function definition.


Related Questions

Which type of evidence should victims collect to help officials catch cyber bullies ?

-home addresses
-birthdays
-social media
-usernames user
-passwords

Answers

Answer:

Social media

Explanation:

Social media and usernames user so that they can find them without any problem : D

You are given an array of integers, each with an unknown number of digits. You are also told the total number of digits of all the integers in the array is n. Provide an algorithm that will sort the array in O(n) time no matter how the digits are distributed among the elements in the array. (e.g. there might be one element with n digits, or n/2 elements with 2 digits, or the elements might be of all different lengths, etc. Be sure to justify in detail the run time of your algorithm.

Answers

Answer:

Explanation:

Since all of the items in the array would be integers sorting them would not be a problem regardless of the difference in integers. O(n) time would be impossible unless the array is already sorted, otherwise, the best runtime we can hope for would be such a method like the one below with a runtime of O(n^2)

static void sortingMethod(int arr[], int n)  

   {  

       int x, y, temp;  

       boolean swapped;  

       for (x = 0; x < n - 1; x++)  

       {  

           swapped = false;  

           for (y = 0; y < n - x - 1; y++)  

           {  

               if (arr[y] > arr[y + 1])  

               {  

                   temp = arr[y];  

                   arr[y] = arr[y + 1];  

                   arr[y + 1] = temp;  

                   swapped = true;  

               }  

           }  

           if (swapped == false)  

               break;  

       }  

   }

Please help me!! It's due today!

Please help me!! It's due today!

Answers

Answer: whats the options?  

Explanation:

List safety considerations when downloading shareware, freeware, or public-domain software.

Answers

Answer:

Don't use obsolete software, avoid download managers, check downloads for malware and viruses, check the open source if this option is made available to you.

The safety considerations when downloading shareware, freeware, or public-domain software are don't use obsolete software, avoid download managers, check downloads for malware and viruses, check the open source.

What are freeware?

People use freeware software because it is lifetime free of cost software.

Freeware software consists of all the mail related software.

People use shareware software because of it free use for a limited period of time before buying it and it is available free of cost.

Shareware software includes Adobe acrobat 8 professional, Winzip, Getright.

Thus, precaution need to be taken care of while downloading freeware, share ware or public domain software is avoid using obsolete software, download managers, keep checking downloads for any kind of malware and viruses, check the open source.

Learn more about freeware.

https://brainly.com/question/20260620

#SPJ2

1. Define Primary Key. Why do we need primary key ?

2. Define Field size.

3. Define Validation Rule.

4. . Not leaving the house and a lack of exercise can cause health problems like obesity. TRUE OR FALSE

5. Rebecca only works 3 days in a week but she works longer hours each day to ensure she hits the 40-hour work week.
-art-time working
-Compressed hours
-Job sharing
-Flexible hour

Answers

Answer:

1 .The main purpose of primary key is to identify the uniqueness of a row, where as unique key is to prevent the duplicates, following are the main difference between primary key and unique key.

Explanation:

2. Field size means the dimensions along the major axes of an area in a plane perpendicular to the central axis of the useful beam of incident radiation at the normal treatment distance and defined by the intersection of the major axes and the 50 percent isodose line.

Which part of the Result block should you evaluate to determine the needs met rating for that result

Answers

To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.

What is the  Result block

The assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.

The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.

Learn more about Result block from

https://brainly.com/question/14510310

#SPJ1

Which of the following is a positional argument?
a) ABOVE
b) MIN
c) AVERAGE
d) MAX

Answers

D) MAX is a positional argument

What is the most flexible way to modify a report?

Use the Design view.

Use the Report button.

Click Report Wizard.

Select the Preview view.

Answers

Answer: Use the Design view

Explanation: Using a Design view to modify a report is the most flexible way to modify a report as opposed to a layout view which is another way to modify a report .  The design view  is flexible in the sense that it provides a more outlined structured view of your report that you can see the header and footer for the report. it also affords you the ability to control your  report in terms of changing many properties, adjusting images, labels  and editing  text box, etc.

Answer:

The answer is A: Use the Design view.

Explanation:

Are there measures that organizations and the U.S. government can take together to prevent both real-world terrorist violence and cyberattacks?

Answers

The counterterrorism alert system, it warns the government and key sectors ( such as drinking water companies and the energy sector) about terrorist threats

Bob approaches a beverage vending machine at a fast food kiosk. He has the option of choosing between hot and cold beverages. What control
structure would Bob be using if he chose a cold beverage? In contrast, if he made fresh fruit juice at home using a set of instructions, what
control structure would Bob be using?
Bob would be using the [__]
control structure if he chose a cold beverage. He would be using the [__]
control.
structure if he made fresh fruit juice at home using a set of instructions

Answers

Answer: I took the test and selection was correct for the first blank,

for the second blank its sequence

Explanation:

Admission to attend a show are as follows:
Adults: $20
Children:$15

Write a program that reads the number of children attending the show, as well as the number of adults. Calculate and print the total revenue made.(Pascal)

Answers

Answer:

#include <bits/stdc++. h>

using namespace std;

int main(){



int AdultPrice = 20;

int ChildrenPrice = 15;

int numChildren, numAdults;

cin >>numChildren >> numAdults;

int revChildren = numChildren*ChildrenPrice;

int revAdult = numAdults*AdultPrice;

cout << revChildren+revAdult << endl;

return 0;

}

Given a variable s that contains a non-empty string, write some statements that use a while loop to assign the number of lower-case vowels ("a","e","i","o","u") in the string to a variable vowel_count.

Answers

Answer:

Following is the program in the python language

s="Hellooo" #string initialization

k=0 # variable declaration

vowel_count=0 #variable declaration

while k<len(s): #iterating the loop

   c1=s[k] #store in the c1 variable  

   if c1=='a' or c1=='e' or c1=='i' or c1=='o' or c1=='u': #check the condition

       vowel_count= vowel_count +1; # increment the variable vowel_count  

   k = k+1

print(vowel_count) #display

Output:

4

Explanation:

Following is the description of program

Create the string "s" and store some characters on them.Declared the variable "k" and initialized 0 on them .Declared the variable "vowel-count" and initialized 0 on them .Iterating the while loop ,inside that loop we shifted the string "s" into the " c1" variable and checking the condition in the if block by using or operator if the condition is true then it increment the "vowel_count"  variable by 1 .Finally outside the loop we print the value of "vowel_count".

Check your knowledge
14
Anna specialises in portrait
photography. She uses her website
to reach potential customers and
has recently set up an SEM
campaign to draw more traffic to her
site.
min
She wants to use negative keywords
to make sure her ads don't appear
for people who aren't potential
customers.
min
Which of the following keywords are
the negative keywords?

photographer
portrait
landscape
family photo
watercolour

Answers

Answer:

Landscape and Watercolour are the negative keywords.

A motor takes a current of 27.5 amperes per leaf on a 440-volt, three-phase circuit. The power factor is 0.80. What is the load in watts? Round the answer to the nearer whole watt.

Answers

The load in watts for the motor is 16766 watts

To calculate the load in watts for the given motor, you can use the following formula:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

In this case:
Voltage (V) = 440 volts
Current (I) = 27.5 amperes per phase
Power Factor (PF) = 0.80
√3 represents the square root of 3, which is approximately 1.732

Now, plug in the values:

Load (W) = Voltage (V) × Current (I) × Power Factor (PF) × √3

Load (W) = 440 × 27.5 × 0.80 × 1.732

Load (W) = 16765.7 watts

Rounded to the nearest whole watt, the load is approximately 16766 watts.

Know more about the motor here :

https://brainly.com/question/29713010

#SPJ11

In a hash table both the keys and values are integers. We iterate over the key value pairs of a hash table and print each of the pairs of values in the format Key=a Value=b . Which of the following could be a valid out put?

In a hash table both the keys and values are integers. We iterate over the key value pairs of a hash

Answers

Note that the valid output with regard to the hash table is:  "Key=1, Value=10 Key=2, Value=10 Key=3, Value=100"

What is the explanation for the above response?

The correct answer is "Key=1, Value=10 Key=2, Value=10 Key=3, Value=100", as it shows a valid output for iterating over key value pairs of a hash table.

The order of the keys and values may vary, but each key should be associated with its corresponding value. Option "Key=1, Value=11" is not a valid output because it implies that there are two values associated with the same key. The other options either have duplicate keys or values, or missing keys.

Learn more about hash table at:

https://brainly.com/question/29970427

#SPJ1

For which two reasons might a designer use contrasting colors on a web page?

For which two reasons might a designer use contrasting colors on a web page?

Answers

Check box 2 and 3. Those are both correct.
Contrasting colours are bound to bring attention to certain things such as messages and it could also be a pretty aesthetic which is appealing and will improve and boost interactions

Dr. Bloom is writing a test for a history class and wants to ask a question that will have a Boolean value for the answer. Which of these should Dr. Bloom
use?
O A
OB.
OC.
O D. true-false questions
essay questions
short-answer questions
multiple choice questions
Reset
Next

Answers

D. true-false question

Answer:

O A

It should be the right answer!

1 pts Question 9 is what we use to communicate day to day.​

Answers

A phone?? I need some context to the question though.

How can styles be used in Word? Check all that apply. w to standardize the font size of a title in a Word document to standardize the top and bottom margin of a Word document to standardize the way a paragraph looks on a Word document to standardize the quality of images included in a Word document to standardize the color of the main headings of a Word document​

Answers

Answer:

its a,c,e

Explanation:

How can styles be used in Word? Check all that apply.

a to standardize the font size of a title in a Word document

b to standardize the top and bottom margin of a Word document

c to standardize the way a paragraph looks on a Word document

d to standardize the quality of images included in a Word document

e to standardize the color of the main headings of a Word document

Answer:

1,3,5 is the answer will give brainless

Explanation:

1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:

4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
 WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
 WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:

Answers

Network controls that would meet the requirements is option a) Stateful Firewall

Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option  b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEP

What is the statement about?

A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.

A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.

Learn more about network administrator  from

https://brainly.com/question/28729189

#SPJ1

This means that the surface area is composed of the base area (i.e., the area of bottom square) plus the side area (i.e., the sum of the areas of all four triangles). You are given the following incomplete code to calculate and print out the total surface area of a square pyramid: linclude > h: base azea- calcBasekrea (a) : cout << "Base auxface area of the squaze pyzamid is" << base area << "square feet."< endi: // add your funetion call to calculate the side ares and assign // the zesult to side area, and then print the result //hdd your function call to print the total surface area return 0F float calcBaseArea (float a) return pou (a, 2) /I add your function definicion for calcSideärea here // add your function definition tor prntSurfârea here This code prompts for, and reads in the side length of the base (a) and height of a square pyramid (h) in feet, and then calculates the surface area. The function prototype (i.e. function declaration), function definition, and function call to calculate and print the base area has already been completed for you. In the above program, a and h are declared in the main function and are local to main. Since a is a local variable, notice how the length a must be passed to calcBaseArea to make this calculation. One of your tasks is to add a new function called calesidearea that computes and returns the side area of the square pyramid. Given that the formula uses both the length a and height h of the square pyramid, you must pass these two local variables to this function. You will assign the returned value of this function to side area and then print the value to the terminal. Refer to what was done for calcBaseArea when adding your code. Your other task is to add a new function called prntsprfArea that accepts the base area and side area values (i.e, these are the parameters) and prints out the total surface area of the square pyramid inside this function. Since this function does not return a value to the calling function, the return type of this function should be void Now, modify the above program, referring to the comments included in the code. Complete the requested changes, and then save the file as Lab7A. opp, making sure it compiles and works as expected. Note that you will submit this file to Canvas

Answers

Answer:-

CODE:

#include <iostream>

#include<cmath>

using namespace std;

float calcBaseArea(float a);

float calcSideArea(float s,float l);

void prntSprfArea(float base_area,float side_area);

int main()

{

float h;

float a;

float base_area

float side_area;

cout<<"Enter the side length of the base of the square pyramid in feet : ";

cin>>a;

cout<<"Enter the height of the square pyramid in feet : ";

cin>>h;

base_area=calcBaseArea(a);

side_area=calcSideArea(a,h);

cout<<"Base surface area of the square pyramid is "<<base_area<<" square feet. "<<endl;

cout<<"Side area of the square pyramid is "<<side_area<<" square feet."<<endl;

prntSprfArea(base_area,side_area);

return 0;

}

float calcBaseArea(float a)

{

return pow(a,2);

}

float calcSideArea(float s,float l)

{

float area=(s*l)/2;

return 4*area;

}

void prntSprfArea(float base_area,float side_area)

{

cout<<"Total surface area of the pyramid is "<<base_area+side_area<<" square feet.";

OUTPUT:

This means that the surface area is composed of the base area (i.e., the area of bottom square) plus

DISCUSS the information security governance and risk management

Answers

Information security governance and risk management are critical components of an organization's overall cybersecurity strategy. Let's discuss each of these concepts in more detail:

1. Information Security Governance:
Information security governance refers to the framework, processes, and practices implemented by an organization to ensure the effective management and protection of its information assets. It involves defining and implementing policies, procedures, and controls that align with the organization's goals, objectives, and regulatory requirements.

Key aspects of information security governance include:

a. Leadership and Management: Information security governance starts with strong leadership commitment and involvement. Senior management should establish clear roles, responsibilities, and accountability for information security.

b. Risk Management: Information security governance requires organizations to identify, assess, and manage risks related to their information assets. This involves conducting risk assessments, implementing risk mitigation strategies, and regularly monitoring and reviewing the effectiveness of security controls.

c. Policies and Procedures: Organizations need to develop and communicate information security policies and procedures to guide employees and stakeholders in their security-related activities. These policies should cover areas such as data classification, access controls, incident response, and compliance.

d. Compliance and Legal Requirements: Information security governance ensures that organizations comply with relevant laws, regulations, and industry standards. It involves understanding the legal and regulatory landscape, assessing compliance requirements, and implementing measures to meet those obligations.

2. Risk Management:
Risk management is the process of identifying, assessing, and prioritizing risks to minimize potential harm and loss to an organization's information assets. It involves understanding the organization's risk appetite, analyzing threats and vulnerabilities, and implementing controls to mitigate and manage risks effectively.

Key aspects of risk management include:

a. Risk Assessment: Organizations need to identify and assess potential risks to their information assets. This involves conducting risk assessments to understand the likelihood and impact of threats and vulnerabilities. Risk assessments help prioritize security investments and determine appropriate control measures.

b. Risk Mitigation: Once risks are identified and assessed, organizations need to implement controls and measures to mitigate those risks. This may include implementing technical safeguards, adopting security best practices, and establishing incident response plans.

c. Monitoring and Review: Risk management is an ongoing process. Organizations should continuously monitor and review their security controls to ensure they remain effective and aligned with changing threats and business requirements. Regular audits, vulnerability assessments, and security testing can help identify and address emerging risks.

d. Business Continuity and Incident Response: Risk management includes planning for potential incidents and establishing business continuity and incident response plans. These plans outline how the organization will respond to and recover from security incidents, minimizing the impact on business operations and information assets.

In summary, information security governance provides the framework for managing information security within an organization, while risk management focuses on identifying, assessing, and mitigating risks to protect information assets. Both are crucial for establishing a robust and effective cybersecurity program that aligns with the organization's objectives and ensures the confidentiality, integrity, and availability of its information.

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.

Answers

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

What is the difference between MySQL and MariaDB?

Answers

Answer:

Explained below

Explanation:

They are both server database.

MySQL Server database has two licensing options namely GPLv2 and Enterprise. Whereas, MariaDB Server database is one that has only one license which it is licensed to namely GPLv2.

Now, the license for both of them differs in that the one for MySQL Server database comes with some available features and support. Whereas, the one for MariaDB comes with the full-featured package.

Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are, respectively: Job A = 2 ms, Job B = 12 ms, Job C = 15 ms, Job D = 7 ms, and Job E = 3 ms.

Using FCFS, in what order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for each of these five jobs?

Answers

This is an example with solution:

Five jobs arrive nearly simultaneously for processing and their estimated CPU cycles are, respectively: Job A = 12, Job B = 2, Job C = 15, Job D = 7, and Job E = 3 ms.

a. Using FCFS, and assuming the difference in arrival time is negligible, in what order would they be processed? What is the total time required to process all five jobs? What is the average turnaround time for all five jobs?

Answer: The order of processing for the given jobs = A->B->C->D->E.

Total time needed to process all the jobs = 12+2+15+7+3 = 39 ms.

Turn around time for job A = 12 ms.

Turn around time for job B = 15 ms.

Turn around time for job C = 30 ms.

Turn around time for job D = 37 ms.

Turn around time for job E = 40 ms.

Answer : Therefore, the average turnaround time = (12+15+30+37+40)/5 = 26.8 ms.

Order of processing is A, B, C, D, E and Total time to process and Average turnaround time is 39 ms and 24 ms

Turnover time and order of processing:

Order of processing = A, B, C, D, E

Total time to process all five jobs = Job A + Job B + Job C + Job D + Job E

Total time to process all five jobs = 2 + 12 + 15 + 7 + 3

Total time to process all five jobs = 39 ms

Average turnaround time = [(2-0) + (2+12-0) + (2+12+15-0) + (2+12+15+7-0) + (2+12+15+7+3-0)] / 5

Average turnaround time = (2+14+29+36+39) / 5

Average turnaround time = 24 ms

Find out more information about 'Turnaround time'.

https://brainly.com/question/5768680?referrer=searchResults

A file concordance tracks the unique words in a file and their frequencies. Write a program that displays a concordance for a file. The program should output the unique words and their frequencies in alphabetical order. Variations are to track sequences of two words and their frequencies, or n words and their frequencies. Below is an example file along with the program input and output: example.txt I AM SAM I AM SAM SAM I AM

Answers

Answer:

Here is the Python program:

filename=input('Enter the file name: ')  #prompts to enter file name

file = open(filename,"r+")  #opens file in read mode

dict={}  #creates a dictionary

for word in file.read().split(): #reads and splits the file and checks each word in the file

 if word not in dict:  #if word is not already present in dictionary

    dict[word] = 1  #sets dict[word] to 1

 else:  #if word is already in the dictionary

    dict[word] += 1  #adds 1 to the count of that word

file.close();  #closes file

for key in sorted(dict):  #words are sorted as per their ASCII value

 print("{0} {1} ".format(key, dict[key])); #prints the unique words (sorted order) and their frequencies

   

Explanation:

I will explain the program with an example:

Lets say the file contains the following contents:

I AM SAM I AM SAM SAM I AM

This file is read using read() method and is split into a list using split() method so the file contents become:

['I', 'AM', 'SAM', 'I', 'AM', 'SAM', 'SAM', 'I', 'AM']      

for word in file.read().split():  

The above for loop checks file contents after the contents are split into a list of words. So if statement if word not in dict: inside for loop checks if each item in the list i.e. each word is not already in dict. It first checks word 'I'. As the dictionary dict is empty so this word is not present in dict. So the statement dict[word] = 1 executes which adds the word 'I' to dict and sets it to 1. At each iteration, each word is checked if it is not present in dictionary and sets its count to 1. This way the words 'I', 'AM' and 'SAM' count is set to 1. Now when 'I' appears again then this if condition: if word not in dict: evaluates to false because 'I' is already present in the dict. So else part executes dict[word] += 1 which adds 1 to the count of this word. So frequency of 'I' becomes 2. Now each time when 'I' in encountered its count is incremented by 1. Since 'I' appears three times so frequency of 'I' is 3.

After all the words are checked and the loop ends, the next for loop for key in sorted(dict): uses sorted method to sort the items in dict in alphabetical order then check each key of the dict and prints the key value along with it frequency. So the output of the entire program is:

AM 3                                                                                                                           I 3                                                                                                                            SAM 3

The screenshot of program along with its output is attached.

A file concordance tracks the unique words in a file and their frequencies. Write a program that displays

Submit your three to five page report on three manufacturing careers that interest you.

Answers

Answer:

Manufacturing jobs are those that create new products directly from either raw materials or components. These jobs are found in a factory, plant, or mill. They can also exist in a home, as long as products, not services, are created.1

For example, bakeries, candy stores, and custom tailors are considered manufacturing because they create products out of components. On the other hand, book publishing, logging, and mining are not considered manufacturing because they don't change the good into a new product.

Construction is in its own category and is not considered manufacturing. New home builders are construction companies that build single-family homes.2 New home construction and the commercial real estate construction industry are significant components of gross domestic product.3

Statistics

There are 12.839 million Americans in manufacturing jobs as of March 2020, the National Association of Manufacturers reported from the Bureau of Labor Statistics.4 In 2018, they earned $87,185 a year each. This included pay and benefits. That's 21 percent more than the average worker, who earned $68,782 annually.5

U.S. manufacturing workers deserve this pay. They are the most productive in the world.6 That's due to increased use of computers and robotics.7 They also reduced the number of jobs by replacing workers.8

Yet, 89 percent of manufacturers are leaving jobs unfilled. They can't find qualified applicants, according to a 2018 Deloitte Institute report. The skills gap could leave 2.4 million vacant jobs between 2018 and 2028. That could cost the industry $2.5 trillion by 2028.

Manufacturers also face 2.69 million jobs to be vacated by retirees. Another 1.96 million are opening up due to growth in the industry. The Deloitte report found that manufacturers need to fill 4.6 million jobs between 2018 and 2028.9

Types of Manufacturing Jobs

The Census divides manufacturing industries into many sectors.10 Here's a summary:

Food, Beverage, and Tobacco

Textiles, Leather, and Apparel

Wood, Paper, and Printing

Petroleum, Coal, Chemicals, Plastics, and Rubber

Nonmetallic Mineral

Primary Metal, Fabricated Metal, and Machinery

Computer and Electronics

Electrical Equipment, Appliances, and Components

Transportation

Furniture

Miscellaneous Manufacturing

If you want details about any of the industries, go to the Manufacturing Index. It will tell you more about the sector, including trends and prices in the industry. You'll also find statistics about the workforce itself, including fatalities, injuries, and illnesses.

A second resource is the Bureau of Labor Statistics. It provides a guide to the types of jobs that are in these industries. Here's a quick list:

Assemblers and Fabricators

Bakers

Dental Laboratory Technicians

Food Processing Occupations

Food Processing Operators

Jewelers and Precious Stone and Metal Workers

Machinists and Tool and Die

Medical Appliance Technicians

Metal and Plastic Machine Workers

Ophthalmic Laboratory Technicians

Painting and Coating Workers

Power Plant Operators

Printing

Quality Control

Semiconductor Processors

Sewers and Tailors

Slaughterers and Meat Packers

Stationary Engineers and Boiler Operators

Upholsterers

Water and Wastewater Treatment

Welders, Cutters, Solderers

Woodworkers11

The Bureau of Labor Statistics describes what these jobs are like, how much education or training is needed, and the salary level. It also will tell you what it's like to work in the occupation, how many there are, and whether it's a growing field. You can also find what particular skills are used, whether specific certification is required, and how to get the training needed.11 This guide can be found at Production Occupations.

Trends in Manufacturing Jobs

Manufacturing processes are changing, and so are the job skills that are needed. Manufacturers are always searching for more cost-effective ways of producing their goods. That's why, even though the number of jobs is projected to decline, the jobs that remain are likely to be higher paid. But they will require education and training to acquire the skills needed.

That's for two reasons. First, the demand for manufactured products is growing from emerging markets like India and China. McKinsey & Company estimated that this could almost triple to $30 trillion by 2025. These countries would demand 70 percent of global manufactured goods.12

How will this demand change manufacturing jobs? Companies will have to offer products specific to the needs of these very diverse markets. As a result, customer service jobs will become more important to manufacturers.

Second, manufacturers are adopting very sophisticated technology to both meet these specialized needs and to lower costs.

Application for a lawn-mowing service. The lawn-mowing season lasts 20 weeks. The weekly fee for mowing a lot under 40 square feet is $25. The fee for a lot that is 40 square feet or more, but under 60 square feet, is $35 per week. The fee for a lot that is 60 square feet or over is $50 per week. Prompt the user for the length and width of a lawn USING JOPTIONPANE, and then display the weekly mowing fee USING JOPTIONPANE , as well as the 10-week seasonal fee.

Answers

The prompt to the user for the length and width of a lawn is; Done by the program created below in Java using JOPTIONPANE

How do you write a Program in Java?

// library

import java.util.*;

// class definition

class Main

{// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

  try{

   // object to read inputs

     Scanner scr=new Scanner(System.in);

     System.out.print("Enter length of lawn:");

     // read the length of lawn

     int length=scr.nextInt();

     System.out.print("Enter width of lawn:");

     // read the width of lawn

     int width=scr.nextInt();

     // find area of lawn

     int area=length*width;

     //if area is less than 400

     if(area<400)

     {// Weekly mowing fee

         System.out.println("Weekly mowing fee is:$25");

         // seasonal fee

         System.out.println("20-week seasonal fee is:$"+(25*20));

     }

     // if area >=400 and area <600

     else if(area>=400 && area<600)

     {

        // Weekly mowing fee

         System.out.println("Weekly mowing fee is:$35");

         // seasonal fee

         System.out.println("20-week seasonal fee is:$"+(35*20));

     }

     // if area >=600

     else if(area>=600)

     {

        // Weekly mowing fee

         System.out.println("Weekly mowing fee is:$50");

         // seasonal fee

         System.out.println("20-week seasonal fee is:$"+(50*20));

     }

  }catch(Exception ex){

      return;}

}

}

Read more about Java Programming at; https://brainly.com/question/18554491

The main issues covered by IT law are: Hardware licensing Data privacy Department security True False

Answers

The main issues covered by IT law are: Hardware licensing, Data privacy, Department security is a true statement.

What topics are addressed by cyber law?

There are three main types of cyberlaw:

Human-targeted crimes (e.g.: harassment, stalking, identity theft) Vandalism of property (e.g.: DDOS attacks, hacking, copyright infringement) The theft from the govt (e.g.: hacking, cyber terrorism)

Cyber law includes provisions for intellectual property, contracts, jurisdiction, data protection regulations, privacy, and freedom of expression. It regulates the online dissemination of software, knowledge, online safety, and e-commerce.

Note that some Internet security issues that must be considered are:

Ransomware Attacks. IoT Attacks. Cloud Attacks. Phishing Attacks.Software Vulnerabilities, etc.

Learn more about IT law from

https://brainly.com/question/9928756
#SPJ1  

You are given a decimal number to convert into binary. Press the buttons to
change their values so that the row represents the decimal number on the left.
When a 1 is used, we consider the value to be ON. When a 0 is used, we consider
the value to be OFF.

128
90
69
93
76
47
12
66
122
70
103

Answers

To convert the given decimal numbers into binary, here are their binary representations:

128: 10000000
90: 01011010
69: 01000101
93: 01011101
76: 01001100
47: 00101111
12: 00001100
66: 01000010
122: 01111010
70: 01000110
103: 01100111
Other Questions
8-1 find a place to live financial algebra answers Help pls will give brainlist make sure to show work if needed how can you use documents e and f to argue that imperialism was more important than alliances and arms build-up as the underlying cause of world war i? how could you counter this argument? which group supported the change in the total money supply between 1875 and 1895 but wanted the change to be larger than it was? Which of the following situations are equal to 90%? Select all that apply. A) 18 out of 24 B) 18 out of 20 C) 36 out of 40 D) 54 out of 60 E) 81 out of 90 after a grueling flight, your plane lands in tokyo. starving, you stop at the first sushi bar you see and spend 5,800 japanese yen. your currency from an earlier stop in germany is still in euros. how many euros did you spend? assume the dollar per yen exchange rate is .00806 and the dollar per euro exchange rate is .9203. HELPPPPWhat was the impact of the fall of Rome on Western Europe?A.It ended the brilliance of the Classical Era of civilizations.B.It allowed the Muslims to get a foothold in Spain.C.It led to a nationalistic spirit among European nations.D.It ended the spread of Christianity throughout Europe. the three main events of daedalus and icarus Triangle ABC was dilated using a center of dilation at (8, 0) to create image triangle A'B'C'. What scale factor was used to perform this dilation?232/33/2 Where can I get bass pro shop online? the frequency of the standing wave shown in (figure 1) is 225 hzhz. Part AWhat is the fundamental frequency of this pipe?Part BWhat is the length of the pipe? Lake Superior, along the us Canada border, has a maximum depth of 1333 feet. There are 5280 feet in one mile. How deep is lake Superior in miles ? Round to the nearest hundredth if necessary. PLEASE HELP PLEASE A group of students visited the zoo caf for lunch. Each student received a bacon cheeseburger and milkshake, and the total bill was $104.00. How many students were in the group? Please show your work.Sandwiches Sides BeveragesHamburger $3.25Bacon Cheeseburger $4.75Chicken Fajita Taco $3.50French Fries, Small $1.55French Fries, Large $1.90Onion Rings $2.40Cole Slaw $1.45Soft Drink, Small $1.30Soft Drink, Large $1.65Milkshake $3.25Juice $1.80 which of the following is a tool that helps evaluate potential solutions? group of answer choices fishbone diagram. buzz groups. action plan. decision matrix. Which element of the story has the MOST influence on the eventualtriumph that Kyle and Uncle Terrance experience?A) The setting of the woods and the hillB)The description of Kyle's math homeworkC)The dialogue between Kyle and Uncle TerranceD) The details of what they packed in their backpacks The brakes in a car work because of a. Archimedes' principle. b. Pascal's principle. c. Bernoulli's principle. O d. Torricelli's principle. e. none of these principles. does anyone know how to use remainder theorem in algebra 2? You are watching an object that is moving in SHM. When the object is displaced 0.600 m to the right of its equilibrium position, it has a velocity of 2.20 m/s to the right and an acceleration of 8.40m/s2 to the left.How much farther from this point will the object move before it stops momentarily and then starts to move back to the left? you are alone with a client who is in crisis. you remember that your body language is an important crisis intervention strategy. how should you adjust your body language towards the client? Question 6 (0.5 points)Find the midpoint of the line segment with endpoints (9, -8) and (-6, -3)0 (0.5, -4.5)(1.5.-5.5)0 (7.5, -2,5)O(-21, 2)Question 710 5 noints)