Answer:
Five ways in which computer has affected typography and lettering are discussed below;
1. Introduction of unconventional typeface: Computers have introduced unconventional typeface texts to typography and lettering by offering a wide range of typeface and fonts that the user can choose from, depending on the type of typing job at hand. Some of these fonts are suitable for aesthetic purpose, and some have official rating. These fonts and type faces range from the Times New Roman, Gothic, Serif, etc.
2. Size and legibility: Computers now allows different sizes of character sizes in typography. These sizes can be chosen easily to suite the degree of readability of the intended message.
3. Specialization: Computer has opened up typography and lettering to lay users and people not specialized in typography. Prior to the digital age, typing jobs were limited to specialist typists who have been trained in typography. Nowadays, anybody with access to a computer can easily learn solo, and be employed as a typist.
4. General layout: The arrangement and layout of text and lettering in typing can now be easily manipulated with a computer, by just selecting from a wide choice of arrangement available on the typing platform.
5. Minimization of errors: The use of computer in typography and lettering has greatly reduced the incidence and occurrence of error in typing. Most computers have built in prediction tools, and auto-correcting software that reduces and sometimes prevent grammatical and spelling errors.
What is an electronic tool that stores large amounts of data in one place in a systematic, logical way? A Database B Platform C Query D Software
Answer:
Database: An integrated collection of logically related records or files. A database consolidates records previously stored in separate files into a common pool of data records that provides data for many applications. The data is managed by systems software called database management systems (DBMS). The data stored in a database is independent of the application programs using it and of the types of secondary storage devices on which it is stored.
Create a Java program that asks the user for three test
scores. The program should display the average of the
test scores, and the letter grade (A, B, C, D or F) that
corresponds to the numerical average. (use dialog boxes
for input/output)
Answer:
there aren't many points so it's not really worth it but here
kotlin
Copy code
import javax.swing.JOptionPane;
public class TestScoreGrader {
public static void main(String[] args) {
double score1, score2, score3, average;
String input, output;
input = JOptionPane.showInputDialog("Enter score 1: ");
score1 = Double.parseDouble(input);
input = JOptionPane.showInputDialog("Enter score 2: ");
score2 = Double.parseDouble(input);
input = JOptionPane.showInputDialog("Enter score 3: ");
score3 = Double.parseDouble(input);
average = (score1 + score2 + score3) / 3;
output = "The average is " + average + "\n";
output += "The letter grade is " + getLetterGrade(average);
JOptionPane.showMessageDialog(null, output);
}
public static char getLetterGrade(double average) {
if (average >= 90) {
return 'A';
} else if (average >= 80) {
return 'B';
} else if (average >= 70) {
return 'C';
} else if (average >= 60) {
return 'D';
} else {
return 'F';
}
}
}
Explanation:
Which of the following terms is best described as
the choice of colors, fonts, and formatting to give
your presentation an overall look and feel?
Oslide view
Oslide master
Oslide show
O design theme
Design theme is the term is best described as the choice of colors, fonts, and formatting to give your presentation an overall look and feel.
What are the themes in PowerPoint?A theme is a collection of predetermined colours, fonts, and visual effects that you apply to your presentations to give them a uniform, polished appearance. Using a theme makes your presentation seem cohesive with little work.A theme is a coordinated combination of colours, fonts, effects, and backdrops you may use to make a presentation that has a polished appearance and a unified design. 2010's PowerPoint comes with a tonne of pre-built themes.Click the Design tab, select a theme, then check out how it appears on the slide to discover a theme to use in your presentation. By altering the fonts, colours, and background colours under the Design tab, you may further personalise the theme.Learn more about themes in PowerPoint refer to :
https://brainly.com/question/22505414
#SPJ4
Write a program that prompts the user to enter: The cost of renting one room The number of rooms booked The number of days the rooms are booked The sales tax (as a percent). The program outputs: The cost of renting one room The discount on each room as a percent The number of rooms booked The number of days the rooms are booked The total cost of the rooms The sales tax The total billing amount. Your program must use appropriate named constants to store special values such as various discounts.
Answer:
Written in Python
cost = float(input("Cost of one room: "))
numrooms = int(input("Number of rooms: "))
days = int(input("Number of days: "))
salestax = float(input("Sales tax (%): "))
print("Cost of one room: "+str(cost))
print("Discount: 0%")
print("Number of rooms: "+str(numrooms))
print("Number of days: "+str(days))
totalcost = numrooms * cost
print("Total cost: "+str(totalcost))
salestax = salestax * totalcost/100
print("Sales tax: "+str(salestax))
print("Total Billing: "+str(salestax + totalcost))
Explanation:
The next four lines prompts user for inputs as stated in the question
cost = float(input("Cost of one room: "))
numrooms = int(input("Number of rooms: "))
days = int(input("Number of days: "))
salestax = float(input("Sales tax (%): "))
The following line prints cost of a room
print("Cost of one room: "+str(cost))
The following line prints the discount on each room (No information about discount; So, we assume it is 0%)
print("Discount: 0%")
The following line prints number of rooms
print("Number of rooms: "+str(numrooms))
The following line prints number of days
print("Number of days: "+str(days))
The following line calculates total cost of rooms
totalcost = numrooms * cost
The following line prints total cost
print("Total cost: "+str(totalcost))
The following line calculates sales tax
salestax = salestax * totalcost/100
The following line prints sales tax
print("Sales tax: "+str(salestax))
The following line calculates and prints total billings
print("Total Billing: "+str(salestax + totalcost))
Will AI technology replace most jobs held by employees?
Short Answer:
Yes, it will replace many jobs but not all. You do not have to pay AI wages or for working overtime. AI will never complain for the workload and generally doesn't have feelings unless programmed to. Computers work faster than humans and more efficiently (less mistakes). AI will not replace all jobs since a lot of them can only be completed with the conscious of a human.
Which topic would be included within the discipline of information systems
, , , , , are only a few of the subjects covered within the study area of information systems. Business functional areas like business productivity tools, application programming and implementation, e-commerce, digital media production, data mining, and decision support are just a few examples of how information management addresses practical and theoretical issues related to gathering and analyzing information.
Telecommunications technology is the subject of communication and networking. Information systems is a branch of computer science that integrates the fields of economics and computer science to investigate various business models and the accompanying algorithmic methods for developing IT systems.
Refer this link to know more- https://brainly.com/question/11768396
Will meaning of a query may change over time?
Yes, throughout time, the meaning of a query may alter due to linguistic shifts, societal changes, and technology developments, among other things.
Does a question vary from a query?This distinction, which is frequently subtle and may also rely on context, carries over to the noun form. In more formal contexts, asking a question has a stronger connotation of "investigating" or "looking into," whereas asking a query has a stronger connotation of "doubting" or "challenging."
What is a query's advantage?All of the fields are visible when you open a table. A query is a useful tool for saving a number of fields. Note that a query does not actually save data; it just links to data.
To know more about technology visit:-
https://brainly.com/question/20414679
#SPJ1
Which of the following best describes an insider attack on a network?
OA. an attack by someone who uses fake emails to gather information related to user credentials
OB. an attack by someone who becomes an intermediary between two communication devices in an organizatio
OC. an attack by a current or former employee who misuses access to an organization's network
O D. an attack by an employee who tricks coworkers into divulging critical information to compromise a network
An attack by a current or former employee who misuses access to an organization's network ca be an insider attack on a network. The correct option is C.
An insider attack on a network refers to an attack carried out by a person who has authorized access to an organization's network infrastructure, either as a current or former employee.
This individual intentionally misuses their access privileges to compromise the network's security or to cause harm to the organization.
Option C best describes an insider attack as it specifically mentions the misuse of network access by a current or former employee.
The other options mentioned (A, B, and D) describe different types of attacks, but they do not specifically involve an insider with authorized access to the network.
Thus, the correct option is C.
For more details regarding network, visit:
https://brainly.com/question/29350844
#SPJ1
Select the feature in Windows Server 2016 that has the ability to support resource records of a type unknown to the DNS server on Windows Server 2016.
a. advanced record support
b. primary record support
c. unknown record support
d. secondary record support
On Windows Server 2016, there is a feature known as "unknown record support" that allows for resource records of a type the DNS server is unaware of to be supported.
Which DNS security feature in Windows Server 2016 can be set up to permit source port randomization for DNS queries?When a DNS server executes DNS queries, source port randomization is made possible by the security feature of the DNS socket pool.
Which DNS resource record type is employed to provide the IP address for the email server for a zone?Name Server records (NS Record) specify that a DNS Zone, like "example.com," is assigned to a particular Authoritative Name Server and indicate the name server's address.
To know more about DNS server visit :-
https://brainly.com/question/13852466
#SPJ4
Someone help me with 5.8.1 Ghosts from codehs
In this problem, you are given a list of integers called "ghosts" that represents the positions of ghosts on a game board. Your task is to count the number of ghosts that are next to each other and have the same value.
To solve this problem, you can use a loop to iterate through the list of ghosts. Inside the loop, you can compare each ghost with the next one using an if statement.
Here is a step-by-step explanation of how you can solve this problem:
1. Start by initializing a variable called "count" to 0. This variable will keep track of the number of pairs of adjacent ghosts with the same value.
2. Use a for loop to iterate through the list of ghosts. You can use the range function to generate the indices of the ghosts.
3. Inside the loop, compare the current ghost with the next one using an if statement. You can use the index variable to access the current ghost and the index variable plus 1 to access the next ghost.
4. If the current ghost is equal to the next ghost, increment the count variable by 1.
5. After the loop finishes, the count variable will contain the number of pairs of adjacent ghosts with the same value.
6. Return the value of the count variable as the answer.
Here is the code that solves the problem:
def count_adjacent_ghosts(ghosts):
count = 0
for i in range(len(ghosts) - 1):
if ghosts[i] == ghosts[i + 1]:
count += 1
return count
You can call this function with a list of integers representing the positions of ghosts, and it will return the number of pairs of adjacent ghosts with the same value.
For more such questions ghosts,Click on
https://brainly.com/question/10534475
#SPJ8
1. Human to ____Human____
2. _Human________ to machine
3. Machine to ______Machine
4. _______________ to machine
Answer:
uhmmm human machine whaT?
Explanation:
Answer:
4 is Machine to machine
Select all that apply
Select all the parts of an information system.
Answer:A,B,C
Explanation:Did it already
What is the main difference between structured and unstructured data?
Answer:
Please mark Brainliest, Look Down
Explanation:
Structured data vs. unstructured data: structured data is comprised of clearly defined data types with patterns that make them easily searchable; while unstructured data – “everything else” – is comprised of data that is usually not as easily searchable, including formats like audio, video, and social media postings.
Answer:
Structured data is data that appears in pre-defined models. It is organized and fits into templates and spreadsheets, making it easy to analyze. In contrast, unstructured data is not predefined and the data has no form or system to follow. It can come in the form of images, videos, text, and audio, and can be challenging to analyze.
Between structured and unstructured data, there is semi-structured data. Semi-structured data is a combination of organized data and unorganized text. For example, email is considered semi-structured because the body within the email can be unstructured but the email itself can be organized into different folders.
Explanation:
https://www.celonis.com/solutions/celonis-snap
Using this link
To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?
1. The number of overall cases are 53,761 cases.
2. The net order value of USD 1,390,121,425.00.
3. The number of variants selected is 7.4.
4. Seven variants were selected because it provides enough information to explain the majority of the deviations.
5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.
10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.
12. December stood out as the second-highest sales month,
13. with an automation rate of 99.9%.
14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and
15. Fruits, VV2, Plant WW10 (USD 43,935.00).
17. The most common path had a KPI of 4, averaging 1.8 days.
18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.
19. The Social Graph shows Bob as the first name,
20. receiving 11,106 cases at the Process Start.
1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.
5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757
Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1
8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.
11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.
The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.
19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.
For more such questions deviations,Click on
https://brainly.com/question/24251046
#SPJ8
Which of the following statements is something the operations system of a computer is responsible for doing? Managing memory allocation for all apps.
Providing a way for the user to create text docs
allowing the user to access the internet.
Allowing the user to write programs
Explanation:
took the test
The statement "Managing memory allocation for all apps" is something the operations system of a computer is responsible for doing. So, option 1 is true.
Ask about the statements that are something the operations system of a computer is responsible for doing.
The operating system handles memory management, ensuring that different applications have appropriate memory allocation and can efficiently utilize system resources.
It is not directly responsible for providing a way to create text documents, accessing the internet, or allowing the user to write programs, although these functionalities can be facilitated by certain applications or tools within the operating system.
Therefore, option 2 is true.
To know more about the operating system visit:-
https://brainly.com/question/30692693
#SPJ3
Question 3 of 15
Which term describes a computer program's ability to run, receive feedback to
rewrite, and improve its own algorithms for the future?
A. Machine learning
B. Operator with variables
C. Algorithmic bias
D. If-then programming
A. Machine learning
Machine learning is the study of computer algorithms that can be automatically modified for improvement through experience and the use of data.
You work part-time at a computer repair store. You are building a new computer. A customer has purchased two serial ATA (SATA) hard drives for his computer. In addition, he would like you to add an extra eSATA port that he can use for external drives. In
Install an eSATA expansion card in the computer to add an extra eSATA port for the customer's external drives.
To fulfill the customer's request of adding an extra eSATA port for external drives, you can install an eSATA expansion card in the computer. This expansion card will provide the necessary connectivity for the customer to connect eSATA devices, such as external hard drives, to the computer.
First, ensure that the computer has an available PCIe slot where the expansion card can be inserted. Open the computer case and locate an empty PCIe slot, typically identified by its size and the number of pins. Carefully align the expansion card with the slot and firmly insert it, ensuring that it is properly seated.
Next, connect the power supply cable of the expansion card, if required. Some expansion cards may require additional power to operate properly, and this is typically provided through a dedicated power connector on the card itself.
Once the card is securely installed, connect the eSATA port cable to the expansion card. The cable should be included with the expansion card or can be purchased separately if needed.
Connect one end of the cable to the eSATA port on the expansion card and the other end to the desired location on the computer case where the customer can easily access it.
After all connections are made, close the computer case, ensuring that it is properly secured. Power on the computer and install any necessary drivers or software for the expansion card, following the instructions provided by the manufacturer.
With the eSATA expansion card installed and configured, the customer will now have an additional eSATA port available on their computer, allowing them to connect external drives and enjoy fast data transfer speeds.
For more question on computer visit:
https://brainly.com/question/30995425
#SPJ8
Complete the code to generate a pseudo-random integer between 1 and 44, including the possibility of both 1 and
44.
>>> import secrets
>>> secret
Answer:
Explanation:
.randbelow(44) + 1
The code above uses the secrets module, which is a part of the Python standard library and uses a cryptographically strong random number generator. The randbelow() function generates a random integer below the number given as an argument. In this case, the argument is 44, which means that the function will generate a random integer between 0 and 43. To get a random integer between 1 and 44, we add 1 to the result of the function.
How does technology change thinking?
Answer:
AnswerTechnology has altered human physiology. It makes us think differently, feel differently, even dream differently. It affects our memory, attention spans and sleep cycles. This is attributed to a scientific phenomenon known as neuroplasticity, or the brain's ability to alter its behavior based on new experiences.
have a nice day <3if this helped, rate 5 stars
In reinforcement learning, an episode:
In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.
The reinforcement learningDuring an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.
The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.
Read more on reinforcement learning here:https://brainly.com/question/21328677
#SPJ1
How is LUA different from Python?
Give an example.
This is the answer I couldn't write it here since brainly said it contained some bad word whatever.
Answer:
good old brainly think stuff is bad word even tho it is not had to use txt file since brainly think code or rblx is bad word
Which four of the following are true about fair use?
D,C,B
Should be the correct answers. I'm not the best when it comes to copyright but I believe those are correct.
Patients and providers enter into contracts for specific services when an appointment is scheduled.
Discuss third-party privacy, security, and compliance guidelines that affect medical coding, and list examples. What errors can occur within security and compliance guidelines? Would you report the errors? If yes, please list why, and what outcome you would expect to see from reporting the errors.
When it comes to medical coding, third-party privacy, security, and compliance standards are crucial factors to take into account. These rules guarantee the confidentiality and security of patient data.
What sort of medical code would you use?In this medical coding illustration, the coder must convert the details of the indications, medicine, and procedure into medical codes in accordance with the intervention radiology CPT codes after receiving a patient record on abscess drainage.
Which coding scheme is the primary cause of the health problems a region or community is experiencing?The ICD-10-CM (International Classification of Diseases, 10th Revision, Clinical Modification) coding system links patient health issues to payer injuries, diseases, and conditions by using three- to seven-digit alphanumeric numbers to identify indications, symptoms.
To know more about coding visit:-
https://brainly.com/question/17293834
#SPJ1
true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.
Answer:
False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.
Networks and the interconnectivity of media have affected our society in that:
A. information is hard to get and has not been democratized.
B. countries have shifted away from a global economy.
C. ideas and information are shared quickly and easily.
O
D. the quantity of media now loses out to quality.
Ideas and information are shared quickly and easily
Answer:
C. Ideas and information are shared quickly and easily
Explanation:
Implement a binary search function in three substantially different programming languages. In each program (identical, except for the programming language), carry out the same 10,000,000 unsuccessful searches for eight different-sized arrays, namely arrays of sizes 128, 512, 2048, 8192, 32768, 131072, 524288, and 2,097,152. Measure in each of the three programs the time it takes to do the 10,000,000 searches for each of the eight arrays. Compare these timings to the theoretical timings the algorithm binary search provides. Are there differences between the three programs? Explain your timings and observations!!
Answer:
The code to this question can be defined as follows:
Explanation:
C language code:
#include <stdio.h>//defining header file
int binarySearch(int x[], int l, int y, int z)//defining method binarySearch that accepts four integer parameter
{
if (y >= l)//defining if block that check r value is greater the l
{
int m= l + (y - l)/2; //defining if block that holds mid value of array
if (x[m] == z)//use if block that check value in array
return m;// return array value
if (x[m] > z) //defining if block that check array value greater then x value
return binarySearch(x, l, m-1, z);//use return keyword to call method
return binarySearch(x, m+1, y, z);// in else it use return keyword to call method
}
return -1;//return value -1
}
int main()//defining main method
{
int x[] = {2, 3, 4, 10, 40};//defining array that hold integer values
int n = sizeof(x)/ sizeof(x[0]);//use n variable to hold its size value
int z = 10;//defining x varaiable that hold integer value
int r= binarySearch(x, 0, n-1, z);//use r varaiable to hold method return value
if(r== -1) //defining if block that check its value equal to -1
printf("Number is not foud in array ");//print message
else
printf("Number is present at %d position", r);//print value
return 0;
}
C++ language code:
#include <iostream>// header file
using namespace std;
int binarySearch(int x[], int l, int y, int z)//defining method binarySearch that accepts four integer parameter
{
if (y >= l)//defining if block that check r value is greater the l
{
int m= l + (y - l)/2; //defining if block that holds mid value of array
if (x[m] == z)//use if block that check value in array
return m;// return array value
if (x[m] > z) //defining if block that check array value greater then x value
return binarySearch(x, l, m-1, z);//use return keyword to call method
return binarySearch(x, m+1, y, z);// in else it use return keyword to call method
}
return -1;//return value -1
}
int main()//defining main method
{
int x[] = {2, 3, 4, 10, 40};//defining array that hold integer values
int n = sizeof(x)/ sizeof(x[0]);//use n variable to hold its size value
int z = 10;//defining x varaiable that hold integer value
int r= binarySearch(x, 0, n-1, z);//use r varaiable to hold method return value
if(r== -1) //defining if block that check its value equal to -1
cout<<"Number is not foud in array ";//print message
else
cout<<"Number is present at position "<< r;//print value
return 0;
}
Python language code:
def binarySearch (a, x, r, y):#defining a method binarySearch
if r >= x:#defining if block that checks r is greater than equal to x
m = x + (r - x)//2#defining m variable that hold mid value
if a[m] == y:#use if that check its input value equal y
return m#return m value
elif a[m] > y:#use array that check its value greaterthan y
return binarySearch(a,x, m-1, y) #use return keyword to call method
else:#defining else block
return binarySearch(a, m+1, r, y)#use return keyword to call method
else: #defining else block
return -1#return value -1
a = [ 2, 3, 4, 10, 40 ]#defining list a that holds value
y = 10#defining integer variable
r = binarySearch(a, 0, len(a)-1, y)#defining r variable that holds method value
if r != -1:#use if that check r is not equal to -1
print ("Number is available at ", r," position")#print value
else:#else block
print ("Number is not available in array")#print message
Demonstrate understanding of different number conversion techniques between data types (at least 2).
To carry out number conversion,
Step 1: Divide the decimal number to be converted by the new base value. Step 2 Take the residual from Step 1 and use it as the rightmost (least significant) digit of the new base number. Step 3: Divide the previous divide's quotient by the new base.
What is number conversion?As we all know, the number system is a method of representing numbers. In number system conversion, we will learn how to convert a number from one base to another.
There are other number systems that may be used, including binary numbers, decimal numbers, hexadecimal numbers, and octal numbers.
Learn more about number conversion techniques at:
https://brainly.com/question/28587953
#SPJ1
Write a program to move the Turtle based on the user’s request. Display a menu with options for the user to choose. Use the following guidelines to write your program.
1. Create a menu that gives the user options for moving the Turtle. The menu should contain letters or numbers that align with movements such as forward, backward, and/or drawing a particular pattern.
2. Use at least one if-else or elif statement in this program. It should be used to move the Turtle based on the user's input.
3. A loop is optional but may be used to ask the user to select multiple choices.
4. Use one color other than black.
Answer:
#import turtle
import turtle
# set screen
Screen = turtle.Turtle()
# decide colors
cir= ['red','green','blue','yellow','purple']
# decide pensize
turtle.pensize(4)
# Draw star pattern
turtle.penup()
turtle.setpos(-90,30)
turtle.pendown()
for i in range(5):
turtle.pencolor(cir[i])
turtle.forward(200)
turtle.right(144)
turtle.penup()
turtle.setpos(80,-140)
turtle.pendown()
# choose pen color
turtle.pencolor("Black")
# importing turtle module
import turtle
# number of sides
n = 10
# creating instance of turtle
pen = turtle.Turtle()
# loop to draw a side
for i in range(n):
# drawing side of
# length i*10
pen.forward(i * 10)
# changing direction of pen
# by 144 degree in clockwise
pen.right(144)
# closing the instance
turtle.done()
turtle.done()
Explanation:
Jesse owns a video game store. He wants to do a quick poll to find out what kind of games players like the most among what is popular right now. What kind of data collection method is this?
A. Observation
B. Survey
C. Field research
D. Focus group
Answer:
B. Survey
Explanation:
The third definition of a survey is to "investigate the opinions or experience of (a group of people) by asking them questions." and the definition of a poll is to "record the opinion or vote of."
Answer:
its b
Explanation:
other guy said so
which one of the following statements is true? 1 point a filter and a quick filter are the same thing. filters can not be modified. a filter has an associated jql statement.
The true statement is: A filter has an associated JQL statement.
A filter is a saved search query in Jira. It is possible to create custom filters that can be used to view and manage issues.
A filter can be modified and contains a JQL (Jira Query Language) statement that defines the parameters of the search. A Quick Filter is a temporary filter that can be used to quickly view a set of results based on a certain criterion, such as an assignee or status. Quick Filters can be modified and saved as a filter, and they do not have an associated JQL statement.
Learn more about filters: https://brainly.com/question/16837219
#SPJ4