Answer:
sen = input("Enter a sentence: ")
sen = sen.lower()
sen = sen.replace(" ","")
sen = list(sen)
sen.sort()
print(sen)
sen1 = []
for i in sen:
if i not in sen1:
sen1.append(i)
print(sen1)
sen2 = []
for i in sen1:
sen2.append(sen.count(i))
print(sen2)
for i in range(len(sen1)):
print("The letter",sen1[i],"appears",sen2[i],"times")
Question 4 of 20
most applications will ask you to provide all of the following information
except
a. the date you can start work
b. the dates and hours you are available to work.
c. your desired salary or wage.
d. which of your previous jobs you didn't like.
Most applications will ask you to provide all of the following information except (d) which of your previous jobs you didn't like. The correct option is D.
Job applications typically require information such as your availability to start work, your preferred work schedule, and your desired salary or wage, as these are relevant to the employer's needs and decision-making process. However, they do not generally ask for personal opinions or preferences about previous jobs, as this is not relevant to the current application.
When filling out job applications, focus on providing the necessary information, such as your availability and desired compensation, and avoid discussing any negative experiences with previous jobs. The correct option is D.
To know more about decision-making process visit:
https://brainly.com/question/29772020
#SPJ11
What is phishing? Answer
Answer:
Phishing is a type of online scam where an attacker sends a fraudulent email purporting to be from reputable companies, designed to deceive a person into revealing sensitive and personal information (card numbers, passwords etc).
Hope this helps.
There are many different types of decision-making. Which of the following is NOT a type of decision-making? a. fiat rule b. single decision-maker c. majority rule d. consensus/collaboration
Answer:
These are all correct but if you want to get technical I would choose A, because fiat rule is used in the military without any consent from any political standpoint.
Explanation:
Answer:
the answer is A
Explanation:
so about computers can you tell me about bit coins and giga watts
Bitcoin is a decentralized digital money that may be purchased, sold, and exchanged whereas gigawatt hour is a measure of energy that equals one million kilowatt hours.
What is a Bitcoin?Bitcoin's creator, Satoshi Nakamoto, originally described the need for “an electronic payment system based on cryptographic proof instead of trust.” Digital currency known as Bitcoin is completely decentralized and not subject to bank or governmental regulation. Instead, cryptography and peer-to-peer software are employed. A public ledger, a copy of which is stored on servers throughout the world, records every bitcoin transaction.
What is a Giga Watts?1 Kilowatt hour [kWh] = 0.000 001 Gigawatt hour [GWh]
1,449 kilowatt hours (kWh) of energy to mine a single bitcoin.
0.001449 GWh
To know more about Cryptography visit:
https://brainly.com/question/88001
#SPJ1
for (int j- 4; j > 0; j--)
for (int k 1; k < j; k+)
System.out.print (j +);
System.out . println() ;
What is output when the program runs?
a.
4444
b
4321
321
21
4444
333
22
1234
123
12
4321
432
43
Answer:
C is your awnser
Explanation:
!WILL GIVE BRAINLIEST!
Write a Python program that prompts the user for a word. If the word comes between the words apple
and pear alphabetically, print a message that tells the user that the word is valid, otherwise, tell
the user the word is out of range.
Answer:
word = input()
if word > "apple" and word < "pear":
print("Word is valid.")
else:
print("Word is out of range.")
The getDefaultDisplay method from the WindowManager interface returns a __________________ reference.
Answer:
the answer is "display reference"
Normally, by the time teenagers have finished high school, they have formed their own identities and belief systems and have less
need for
against authority figures.
Answer:
The answer is rebellion
Explanation:
I took the test.
Answer:
rebellion
Explanation:
the security system has detected a downgrade attempt when contacting the 3-part spn
Text version of LSA Event 40970 When contacting the 3-part SPN, the security system discovered an attempt to downgrade.
What is a three-part SPN?The service class comes first, the host name comes second, and the service name comes third (if it's present). Adding a ":port" or ":instancename" component as a suffix to the host name part is optional.Text version of LSA Event 40970 When contacting the three-part SPN, the security system discovered an attempt to downgrade. The error message reads, "The SAM database on the Windows Server does not have a computer account for the workstation trust relationship (0x0000018b)" An authentication refusal was made.In every domain of an Active Directory, there is a default account called KRBTGT. It serves as the domain controllers' KDC (Key Distribution Centre) service account.To learn more about Security system refer to:
https://brainly.com/question/29037358
#SPJ4
Which of the following insulation is not used in cables?
OPaper.
O Varnished cambric.
O Metal
O Rubber
Answer:
\(\huge \boxed{\mathrm{Metal}}\)
Explanation:
Metal is a conductor of electricity, thus is not used in cables for insulation. Varnished cambric, paper, and rubber, are all insulators of electricity.
Alex needs to create a function capable of counting item reference numbers that he is inserting into a spread sheet. The purpose of this function will be to keep track of inventory. How would Alex go about finding a function to do this? Click the Home tab and use the Find.
Alex can find a function to do this by entering the item reference numbers into the worksheet, and click the Sort button to count the items.
A spreadsheet can be defined as a document or file which comprises cells in a tabulated format (rows and columns), that are typically used for formatting, arranging, analyzing, storing, calculating, counting, and sorting data on computer systems through the use of a spreadsheet application such as Microsoft Excel.
In this scenario, Alex wants to keep track of inventory by creating a function that is capable of counting item reference numbers as he is inserting into a spread sheet. Thus, he should enter the reference numbers of each item into the worksheet, and click the Sort button to count the items.
Read more: https://brainly.com/question/14299634
Answer:
It’s C
Explanation:
edge
which of the following types of data might be used in an Internet of Things (loT) connected device
The types of data might be used in and IoT connected device is Both Temperature and Sensors
What is IoT connected device?Temperature data maybe calm by temperature sensors, that are usual in preservation of natural resources schemes, HVAC (Heating, Ventilation, and Air Conditioning) systems, and industrialized control schemes.
Therefore, Sensor tool refers to a broad classification of data that maybe calm by various types of sensors, containing motion sensors, light sensors, pressure sensors, and more. Sensor data maybe secondhand for a variety of purposes.
Learn more about IoT connected device from
https://brainly.com/question/20354967
#SPJ1
Please please help I don’t understand thus
Answer:
I am pretty sure the answer is path.
Explanation:
Each section in the user/juanita/etc thing makes up a path.
Which of the following routing protocols uses relative link cost as the metric?a. BGPb. EIGRPc. OSPFd. RIP
The routing protocol that uses relative link cost as the metric is OSPF (Open Shortest Path First).
OSPF is a link-state routing protocol that calculates the shortest path to a destination using a metric called the cost. The cost of a path is calculated by adding up the costs of the links along that path. The cost of a link is determined by the bandwidth of the link, so higher bandwidth links have a lower cost than lower bandwidth links.
In OSPF, the cost of a link is used as a metric to determine the best path to a destination. The lower the cost, the better the path. OSPF uses a hierarchical network structure and divides the network into areas, with each area having its own link-state database.
BGP (Border Gateway Protocol) is a path-vector routing protocol that is used to exchange routing information between different autonomous systems on the Internet. BGP uses the AS path as the metric to determine the best path to a destination.
EIGRP (Enhanced Interior Gateway Routing Protocol) is a distance-vector routing protocol that uses bandwidth, delay, reliability, and load as the metrics to determine the best path to a destination.
RIP (Routing Information Protocol) is also a distance-vector routing protocol that uses hop count as the metric to determine the best path to a destination.
Learn more about routing protocol here:
https://brainly.com/question/28446917
#SPJ11
Most hard drives are divided into sectors of 512 bytes each. Our disk has a size of 16 GB. Fill in the blank to calculate how many sectors the disk has. Note: Your result should be in the format of just a number, not a sentence.
disk_size = 16*1024*1024*1024
sector_size = 512
sector_amount =
print(sector_amount)
A source mainly provides
from a text or piece of media.
Answer:
✔ information
A source mainly provides information from a text or piece of media.
Explanation:
because of edge
Answer:
Information is correct !!!!!!!!!!!!!!!!!!!!!!!!!!!!!1
Explanation:
May I have brainiest but its okay if not
In a problem-solving model, information is gathered to help identify different alternatives. *
true or false
Answer:
true
Explanation:
1. Keisha is in her first semester of college and is taking 10 credit hours: ACA 122, CIS 110, PSY 150, and developmental math. She never tried very hard in high school but still managed to graduate with a 3.0 GPA. She's doing well in her classes, except for CIS 110 and PSY 150. Both regularly have multiple-chapter reading assignments. In PSY 150, she's failed her first test and all three of her quizzes. In CIS 110, she hasn't had a test yet, but she feels completely lost. She's frustrated with the classes. She blames her instructors for not teaching well and is thinking about dropping the classes. Based on this chapter, what advice would you give to Keisha to help her with her problems?
The advice is that she should not give up and that she should relax, and think of the time she comprehend more and then start to read. Another is to hire a private tutor to help or put her through.
What does a private tutor do?A private tutor is known to be a person who is a specialist that has been trained in helping students known more and take in the concepts and details of any given course work.
Therefore, The advice is that she should not give up and that she should relax, and think of the time she comprehend more and then start to read. Another is to hire a private tutor to help or put her through and she will pass her exams in flying colors.
Learn more about private tutor from
https://brainly.com/question/6950210
#SPJ1
After running the following pseudocode, what will the value of VARIABLE be? 1. Set value of VARIABLE to 5 2. Increase the value of VARIABLE by 3 3. If the value of VARIABLE is odd, increase its value by 1 4. If the value of VARIABLE is even, increase its value by 1 5. If the value of VARIABLE is odd, increase its value by 1
Answer:
10
Explanation:
you start with 5 5
you add 3 8
the variable is not odd so skip 8
the variable is even so add 1 9
the variable is odd so add 1 10
10
hope this helps <3
Select cell A1. Activate the Track Changes feature, highlight all changes on screen, click the When check box to deselect it, and then create a History worksheet. Select the data on the History worksheet, copy it to the Clipboard, add a new worksheet (in the third position), and paste to keep source column widths. Rename the sheet Changes.
Answer:
The Track changes feature in Microsoft Excel is used to monitor changes made to a or all worksheets in a workbook. These changes can also be compiled in a new worksheet.
Explanation:
To track changes made to a cell or group of cells and save it to a new worksheet, go to the review tab, click on the Track Changes option and select Highlight Changes in the changes group, then click on the highlight track changes dialog box, input "All" in the "When" text box option and click the "list track change in new sheet" option to save changes in a new worksheet, then click ok.
PLEASE I REALLY NEED HELP
I have an hp laptop and it is FROZEN!! I cannot press x out of any of my tabs and the whole thing is frozen but I can pull up my settings and I can move my mouse. Shutting it off/down didn't work and it's still frozen please tell me what to do. also, will restarting it log me out of my whole account(s)? I NEED HELP PLEASEE
First try shutting down your computer for 5 minutes.
Turn it on if tabs are still open, try to right click it and press delete if you have that.
if you have none of your acounts try to make anew accounts the add a account to the new account you just made. still having peroblems, let me know?
Answer:
wait to it dies or hold the shut down button till it turns off
Explanation:
How have these advances in-home technology changed the role of technicians in our society?
Answer:
From the industrial age to modern day, technology has improved working conditions. Its impact on the work environment has streamlined tedious and environmentally wasteful processes, expedited access to work while exponentially increasing productivity and made working from anywhere easier than ever.
a given program is parallelized to run in an 8-core multicore processor. if 1/8th of the program remains serial while 7/8ths is parallelized, what is the speedup of the program?
When a system's resources are upgraded, Amdahl's Law predicts the theoretical speed in latency of a process at a fixed workload.
It is used to forecast the theoretical speedup in parallel computing when many processors are used.
Amdahl's Law speed for an unlimited number of processes is calculated as follows:
Maximum Speedup, S = \(\frac{1}{sequential part}\) = \(\frac{1}{1/8}\)= 0.08
Limit of Speedup on 8-core processor, S = 8/(1+ (8-1)*12.5 )= 0.09
What is a Multi-core Processor?
A single processor chip with multiple processors on it that are housed in a single container is known as a multi-core processor.
A processor, often known as a "core," is a circuit that executes commands or computations.
A multicore processor can run programs and do calculations more quickly than a single processor chip because it contains many processing units.
The majority of today's computers, smartphones, and tablets employ multicore processors, which enable them to operate more quickly than they would if they used a single-core processor chip.
To know more about Multi-core Processor, visit: https://brainly.com/question/14442448
#SPJ4
What is a popular phone is it an iPhone or samsung?
Answer:
According to global market share data from the first quarter of 2021, Samsung is the world's most popular smartphone manufacturer, followed by Apple (which produces the iPhone). However, it's worth noting that the popularity of different phone brands and models can vary widely depending on the region or country being considered.
which category of system software provides a platform for application software to run on?
The Computing platform is the category of system software which provides a platform for application software.
Let understand that Software means some set of instructions on a computer which are used for operation and execution of specific tasks.
The different type of software include:
System Software: This is the software designed to provide platform for other software installed on the computer. Eg. Microsoft Operating system. Apple Operating System etcApplication Software: These are software which is installed on the system to perform function on the computer E.g. Chrome.When a laptop is running Windows as an Operating system, the platform its runs on is known as Computing platform.In conclusion, the computing platform (Operating system) is the category of system software that provides a platform for application software to run on.
Read more on this here
brainly.com/question/5339724
The short-range two-way communication technology behind contactless payments is called ____.
Hi there,
I hope you and your family are staying safe and healthy!
The answer is: Near Field Communication (NFC).
The short-range two-way communication technology behind contactless payments is called the Near Field Communication (NFC).
Happy to help!
~Garebear
3.5 code practice
grade = str(input("What year of high school are you in?: "))
if ("grade ==Freshman"):
print("You are in grade: 9")
elif ("grade == Sophomore"):
print("You are in grade: 10")
elif ("grade == Junior"):
print("You are in grade: 11")
elif ("grade == Senior"):
print("You are in grade: 12")
else:
print("Not in High School")
It keeps printing your are in grade 9. Why?
The fixed code is shown below. input() function already returns string that's why you don't have to convert string again. Also the syntax in if-else scope is wrong.
grade = input("What year of high school are you in?: ")
if(grade.lower()=="freshman"):
print("You are in Grade 9.")
elif(grade.lower()=="sophomore"):
print("You are in Grade 10.")
elif(grade.lower()=="junior"):
print("You are in Grade 11.")
elif(grade.lower()=="senior"):
print("You are in Grade 12.")
else:
print("Wrong input!")
We are creating a new 8 bit floating point binary number format. It will consist of a sign bit (0 positive, 1 negative), 4 bits for the exponent, and 3 bits for the mantissa. We will be using a 7 offset for the exponent. Assume there is a leading 1 (to the left of the decimal point) for the mantissa. Convert F3 (hex) to floating point decimal format, show all work.
A left shift that multiplies the number by two is equivalent to moving the binary point one position to the left. A right shift that divides the integer by 2 is equivalent to shifting the binary point one position to the left.
Multiply the fractional component by 2, then take the one bit that comes before the decimal point to convert the fractional part to binary. Use the same process to add 1.0 after the decimal point (.). To do this, the floating point uses a biased exponent, which is the original exponent plus a constant bias. A bias of 127 is used in a 32-bit floating-point. For instance, the biased exponent for the exponent 7 is 7 + 127 = 134 = 100001102. The biased exponent for the exponent 4 is 4 + 127.
Learn more about binary.
https://brainly.com/question/20856226
#SPJ4
which vpc component is useful when you need to allow the instances in a private subnet of an amazon vpc to connect to the internet to perform tasks like downloading patches and updates, while still preventing any inbound connections from being initiated to these instances via the internet? select one answer internet gateway nat gateway vpc peering connections transit gateway
The VPC component that is useful when you need to allow the instances in a private subnet of an amazon VPC to connect to the internet to perform tasks like downloading patches and updates, while still preventing any inbound connections from being initiated to these instances via the internet is a NAT gateway.
What is internet?The internet is a global network of interconnected computers and devices that allows communication, information sharing, and access to resources over vast geographical distances.
It is a decentralized network, meaning there is no central authority controlling it. Instead, it is made up of numerous interconnected networks operated by different organizations and individuals.
Learn more about internet on https://brainly.com/question/21527655
#SPJ4
Question # 2 Long Text (essay) Explain why E-mail B is inappropriate for the workplace and revise it to be appropriate.
Due to its informal tone and unsuitable language, Email B is inappropriate for usage at work. Communication that is respectful and straightforward is crucial in a work setting.
What constitutes improper email use at work?Keep it businesslike. Never express rage, use foul language, or make racial or gendered insults. Remember that sending offensive text or images via email could come back to haunt you. Even if they are intended as a joke, avoid sending or forwarding emails that contain libellous, defamatory, insulting, racist, or obscene remarks.
What does improper communication at work mean?One manifestation of the issue is the practise of communicating with coworkers solely via email and memos and never in person. deliberately ignoring a task or working.
To know more about Email visit:-
https://brainly.com/question/14666241
#SPJ1