Answer:
?
Explanation:
?
PLEASE HELP I WILL GIVE BRAINLYEST
Answer:
I am guessing photoshop
Explanation:
Photoshop is also under the Adobe company of graphics designs
Brainly account. How to open?
Which expression evaluates as True when the value stored in the variable is 5? Select two options. 5 => 5 5 => 5, 5 == 5 5 == 5, 5 >= 5 5 >= 5, 5 > 5 5 > 5, 5 = 5
The expressions that evaluate as True when the value stored in the variable is 5 are:
5 == 5
5 >= 5
Therefore, the correct options are:
5 == 5, and
5 >= 5.
What is the explanation for the above response?The reason why the expressions "5 == 5" and "5 >= 5" evaluate as True when the value stored in the variable is 5 is as follows:
"5 == 5" checks if the value stored in the variable is equal to 5. Since the value stored in the variable is 5, this expression evaluates as True.
"5 >= 5" checks if the value stored in the variable is greater than or equal to 5. Since the value stored in the variable is 5, which is equal to 5, this expression evaluates as True.
On the other hand, the expressions "5 => 5", "5 > 5", "5 = 5" do not evaluate as True when the value stored in the variable is 5 because:
"5 => 5" is not a valid syntax for a comparison operator. It should be ">=" instead of "=>".
"5 > 5" checks if the value stored in the variable is greater than 5. Since the value stored in the variable is 5, which is not greater than 5, this expression evaluates as False.
"5 = 5" is not a valid syntax for a comparison operator. It should be "==" instead of "=" (which is an assignment operator).
Learn more about variables at:
https://brainly.com/question/15740935
#SPJ1
Answer:
5==
Explanation:
How long will it take to send 1.1 million bits using the Stop and Wait ARQ protocol if each packet contains 1000 bits and the only delay is propagation delay
Answer:
1.111 second
Explanation:
We know propagation speed = \($2 \times 10^8$\) m/s
= \($2 \times 10^5$\) km/s
One packet size = 1000 bit
Distance between sender and the receiver = 1000 m = 1 km
The channel data rate = 1 Mbps = \($1 \times 10^6$\) bits per sec
There is no transmission delays of ACKs,
The time to transmit one data packet = \($T_{trans}+2T_{prop}$\)
Here, time to transmit frame = \($T_{trans}$\)
propagation time = \($T_{prop}$\)
Therefore, \($T_{trans}$\) = \($\frac{bits\ per\ frame}{transmission \ speed}$\)
= \($\frac{1000}{1 \times 10^6}$\) = 0.001 seconds
\($T_{prop}=\frac{distance\ between\ sender\ and\ receiver}{propagation \ speed}$\)
= \($\frac{1}{2 \times 10^5}$\)
= 0.000005 seconds
Therefore, T = 0.001 +2(0.000005)
= 0.00101 seconds
We known, 1.1 million bits= 1100 packets
Therefore to transmit 1 million bits = 1100 x 0.00101
= 1.111 second
State three modules in HansaWorld and briefly describe what each is used for. (6)
2. With an example, explain what settings are used for. (3)
3. What is Personal Desktop and why is it good to use? Mention two ways in which an
entry can be deleted from the personal desktop. (6)
4. Describe how you invalidate a record in HansaWorld (3)
5. Briefly explain what specification, paste special and report windows are used for. (6)
6. How many reports can you have on the screen at once? How many reports does
HansaWorld have? (4)
7. Describe any two views of the Calendar and how you can open them (4)
8. Describe three (3) ways in which records can be attached to Mails. (6)
9. Describe the basic SALES PROCESS where there is no stock involved and how the
same is implemented in HansaWorld. (12)
1. We can see here that the three modules in HansaWorld and their brief descriptions:
AccountingInventoryCRM2. We can deduce that settings are actually used in HansaWorld for used for configuring the system to meet specific business requirements.
What is HansaWorld?It is important for us to understand what HansaWorld is all about. We can see here that HansaWorld is actually known to be an enterprise resource planning (ERP) system that provides integrated software solutions for businesses.
3. Personal Desktop is actually known to be a feature in HansaWorld. It allows users to create a personalized workspace within the system.
It can help users to increase their productivity and efficiency.
4. To actually invalidate a record in HansaWorld, there steps to take.
5. We can deduce here that specification, paste special and report windows help users to actually manage data and generate report.
6. There are factors that play in in determining the amount of reports generated.
7. The Calendar on HansaWorld is used to view upcoming events. There is the Day View and there is the Month View.
8. We can see that in attaching records, HansaWorld allows you to:
Drag and drop.Insert linkUse the Mail Merge FunctionLearn more about report on https://brainly.com/question/26177190
#SPJ1
HELP PLEASE
Today, not only do companies employ public relations managers but so do many
celebrities and politicians. Research and explain what the role of a public relations
manager is and see if you can think of the reasons why many public figures seem
to find them useful.
Answer: The role of a public relations manager is to keep the image of a celebrity, politician, ect. good so that they can keep their career going while constantly in the eye of the public. Public figures may find this useful because it can help them keep their record clean and have a personal life while also making it seem like they are perfect people to their audience, which in hand can help with business.
Explanation:
Question 4 of 10
To find an image's____
count the number of pixels across each inch of the image.
A. binary value
B. bitmap
C. pixel density
D. RGB value
True or False
4. The Timeline is a window at the bottom of the Stage which is divided into frames.
Answer:
I think the answer is true
At what point will a while loop stop repeating in Python? (5 points)
When the condition registers as false
When the condition registers as true
When the end value in the range is a value less than one
When the start value begins with a value greater than one
A while loop stop repeating in Python When the condition registers as false.
The condition statement of a while loop is evaluated at the beginning of each iteration. If the condition evaluates to true, the code block inside the loop is executed. After executing the code block, the condition is evaluated again. If the condition still evaluates to true, the code block is executed again, and the process continues. However, when the condition finally evaluates to false, the loop stops repeating, and the program moves on to the next line of code after the loop.
It is important to ensure that the condition statement eventually evaluates to false; otherwise, the loop will continue indefinitely, resulting in an infinite loop. This can cause the program to hang or become unresponsive.
The end value in the range or the start value in the loop is not directly related to when a while loop stops repeating. The condition statement dictates the termination of the loop based on its truth value, regardless of the values used in the loop's initialization or range.
In summary, a while loop in Python will stop repeating when the condition specified in the loop's condition statement registers as false. This condition statement is evaluated at the beginning of each iteration, and once it evaluates to false, the loop terminates, and the program proceeds to the next line of code.
For more questions on Python
https://brainly.com/question/26497128
#SPJ11
How could you use a spreadsheet you didn't like to simplify access also the problem
Explanation:
......
Explain the difference between storage devices and virtual storage
Answer:
Storage devices tend to be built in/physical pieces of storage such as an SD Card or Hard Drive. Virtual storage is more-so like Cloud storage, where the files are hosted elsewhere.
Explanation:
What were Roman Capitals first used for?
Answer:
Square capitals were used to write inscriptions, and less often to supplement everyday handwriting. When written in documents this style is known as Latin book hand. For everyday writing the Romans used a current cursive hand known as Latin cursive. Notable examples of square capitals used for inscriptions are found on the Roman Pantheon, Trajan's Column, and the Arch of Titus, all in Rome. Square capitals are characterized by sharp, straight lines, supple curves, thick and thin strokes, angled stressing and incised serifs. These Roman capitals are also called majuscules, as a counterpart to minuscule letters such as Merovingian and Carolingian.
Q3. White the advantages of using- E-mail Computer network
Answer:
Ease of use: Email is a simple and convenient way to communicate with others on a computer network. It requires minimal technical skills and can be accessed from any device with internet access.Time-saving: Email allows for quick and efficient communication, as messages can be sent and received instantly. This can save a lot of time compared to traditional methods of communication, such as snail mail or phone calls.Cost-effective: Email is a cost-effective way to communicate with others, as there are no fees for sending or receiving messages.Enhanced collaboration: Email allows for easy collaboration with others on a computer network. It allows for the sharing of documents, images, and other files, which can be useful for group projects or team-building.Increased accessibility: Email allows for communication with people who are not physically present, as messages can be sent and received from anywhere with an internet connection. This increases accessibility and allows for communication with a wider range of people.Explanation:
which type of computer is used to process large amount of data
Answer:
Mainframe Computer
Explanation:
Supercomputers
if you are looking for a different answer, please let me know and i will take a look! i'd love to help you out with any other questions you may have
A vendor conducting a pilot program with your organization contacts you for
organizational data to use in a prototype. How should you respond?
Since the vendor is conducting a pilot program with your organization contacts you for organizational data to use in a prototype, The way that you can respond is to Refer the vendor to the right personnel.
What is an example of a reference vendor?A report outlining the payment history between a company customer and its supplier or vendor is known as a supplier reference (or trade reference). It helps a supplier to evaluate your creditworthiness and determine whether you're a trustworthy customer before extending credit to you.
You can determine whether you are prepared to undertake the project fully by running a pilot program. It might highlight unforeseen difficulties that must be resolved, providing you the chance to change and improve in a way that lessens the effects of those difficulties.
Hence, An organization can discover how a large-scale project might function in practice by conducting a small-scale, brief experiment known as a pilot program, also known as a feasibility study or experimental trial.
Learn more about pilot program from
https://brainly.com/question/28920126
#SPJ1
Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.
The three genuine statements almost how technology has changed work are:
Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.Technology explained.
Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.
Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.
Learn more about technology below.
https://brainly.com/question/13044551
#SPJ1
Which popular video game franchise has released games with the subtitles World At War and Black Ops?
Answer:
Call of duty i think has released those games
Answer:
IT WAS CALL OF DUTY
Explanation:
A 2-dimensional 3x3 array of ints, has been created and assigned to tictactoe. Write an expression whose value is true if the elements of the last row are all equal.
If every element in the final row is equal, the following expression has the value true : tictactoe[0] [0] == tictactoe[0][1] && tictactoe[0] [0] == tictactoe[0][2].
What is meant by array?For utilities, enterprises, small businesses, and homes, Array Technologies, Inc. is the top U.S.-based solar producer of clever, economical, dependable, and strong solar tracking and solar racking solutions.Array Technologies Inc.'s CEO and founder, Ron Corio. the brand-new facility created just for studying, creating, and field-testing cutting-edge solar tracker technology. Trade secret theft, tortious interference with contractual obligations, and contract breach were among the allegations made by Array in the case. On Monday, July 18, 2022, the trial was scheduled to start. A multidimensional array of items can be made with the Array Tool. By specifying incremental translation, rotation, and scale values in three dimensions, users can quickly produce repeating duplicates of prims.To learn more about array, refer to:
https://brainly.com/question/28565733
What are some examples of duties Information Support and Service workers perform?
1. Write and crest info for up and coming nursing students
2.research, design, and maintain websites for clientle
3. Crest lessson plans for kindergarten through K-12 students
4. Provide critical feedback to companies on the quality of their products and practices
Answer:
d
Explanation:
Answer:
guy above me is right if you look at the question it says EXAMPLES of INFORMATION SUPPORT which is giving information to support so 4 logically would be correct because they providing information (feedback)
Explanation:
What does the list "car_makes" contain after these commands are executed?
car_makes = ["Ford", "Volkswagen", "Toyota"]
car_makes.remove("Ford")
1. ['', 'Porsche', 'Vokswagen', 'Toyota']
2. ['Volkswagen', 'Toyota']
3. ['Toyota', 'Ford']
4. [null, 'Porsche', 'Toyota']
Answer:
The correct answer is option 2: ['Volkswagen', 'Toyota']
Explanation:
After the remove method is called on the car_makes list to remove the element "Ford", the list car_makes will contain the elements "Volkswagen" and "Toyota"
Edil wants to create a document by typing in a few paragraphs of text into his computer. He needs to use a pointing device to click the appropriate
buttons to run the text editor.He also needs to see what he is typing. Which three peripherals will Edil need to perform this task?
keyboard
joystick
speaker
mouse
monitor
A monitor is a screen that is used, for instance, in airports or television studios, to show specific types of information. He was observing a tennis match on a television screen. Screen, visual display unit, and VDU More alternatives to monitor
Explain about the monitor?A computer system can be monitored to ensure proactive response, data protection, data collection, and overall system health. Although monitoring doesn't solve issues, it does make computers more dependable and stable.
A computer monitor is a display adapter that shows data from the video card of the computer. Images are displayed on the directly attached monitor after binary data, which consists of 1s and 0s, is converted into images by a video card or graphics card.
The most popular sort of monitor you can find right now, along with LED, is LCD. In order to organize the liquid between the two glass panes that make up an LCD monitor, hundreds of rows of pixels are used.
Monitor helps us to see what we are typing.
To learn more about monitor refer to:
https://brainly.com/question/3927906
#SPJ1
Given integer currentBananas, if the number of bananas is 5 or more but fewer than or equal to 20, output "Allowable batch", followed by a newline.
Ex: If the input is 18, then the output is:
Allowable batch
To implement this in C++, you can use an if statement to check if the value of currentBananas is within the given range.
How to implement the statement in c++?A sample code for implementing the check for the allowable batch of currentbananas would be:
#include <iostream>
int main() {
int currentBananas;
std::cin >> currentBananas;
if (currentBananas >= 5 && currentBananas <= 20) {
std::cout << "Allowable batch" << std::endl;
}
return 0;
}
This code takes an integer input for currentBananas and checks if its value is greater than or equal to 5 and less than or equal to 20. If the condition is true, it prints "Allowable batch" followed by a newline.
Find out more on input at https://brainly.com/question/13885665
#SPJ1
In the data preparation phase of the
DAL, for which of the following reasons are analytical sandboxes the preferred type of data repository rather than those used by the rest of the organization?
Select all that apply.
A) The IT group in a company cannot interfere with the nature of data, security policies, and data transfer protocols that are required and used by the data analytics team.
B) The data analytics team is a high-performing team working on extremely short deadlines and cannot afford to wait for members of other IT teams to set up the databases, data mining procedures, and test data models.
C) The data analytics team needs to collect and analyze high volumes of diverse types of data in order to achieve its goals, whereas IT is inclined to grant access to only the minimum data needed to achieve data analytics’ objectives
D) The IT group in most organizations simply does not have the expertise to provide the data and support the analytics team needs
E) Creating a sandbox for the data analytics project ensures none of the operations need to be done in the live, production version of the organization’s databases, thereby eliminating the risk of unauthorized access or corruption.
Analytical Sandboxes provide a controlled environment where Data Analytics teams can test and evaluate hypotheses, perform exploratory data analysis, develop models, and other tasks that are required to prepare data for analysis without affecting the operational systems. Analytical Sandboxes are preferred over other data repositories for several reasons which are explained below:
a) The IT group in a company cannot interfere with the nature of data, security policies, and data transfer protocols that are required and used by the data analytics team. Therefore, Analytical Sandboxes are preferred as it ensures the independence of the Data Analytics teams.
During the data preparation phase of the Data Analytics Lifecycle, Analytical Sandboxes are preferred over other data repositories. Analytical Sandboxes provide a controlled environment where Data Analytics teams can test and evaluate hypotheses, perform exploratory data analysis, develop models, and other tasks that are required to prepare data for analysis without affecting the operational systems.
Thus, they have the following benefits:
Analytical Sandboxes provide a controlled environment where Data Analytics teams can test and evaluate hypotheses, perform exploratory data analysis, develop models, and other tasks that are required to prepare data for analysis without affecting the operational systems. Analytical Sandboxes are preferred over other data repositories for several reasons which are explained below:
a) The IT group in a company cannot interfere with the nature of data, security policies, and data transfer protocols that are required and used by the data analytics team. Therefore, Analytical Sandboxes are preferred as it ensures the independence of the Data Analytics teams.
b) The Data Analytics team is a high-performing team working on extremely short deadlines and cannot afford to wait for members of other IT teams to set up the databases, data mining procedures, and test data models. Therefore, Analytical Sandboxes provide a self-service approach that reduces the time and effort required to set up the databases, data mining procedures, and test data models.
c) The Data Analytics team needs to collect and analyze high volumes of diverse types of data to achieve its goals, whereas IT is inclined to grant access to only the minimum data needed to achieve data analytics’ objectives. Therefore, Analytical Sandboxes provide complete access to all data without any restrictions.
d) The IT group in most organizations simply does not have the expertise to provide the data and support the analytics team needs. Therefore, Analytical Sandboxes are preferred as it ensures the availability of the necessary tools and expertise.
e) Creating a sandbox for the data analytics project ensures none of the operations need to be done in the live, production version of the organization’s databases, thereby eliminating the risk of unauthorized access or corruption. Therefore, Analytical Sandboxes are preferred to ensure the security of the data and to minimize the risk of corruption.
For more such questions on Data Analytics, click on:
https://brainly.com/question/29961082
#SPJ8
In an ancient land, the beautiful princess Eve (or handsome prince Val) had many suitors. Being royalty, it was decided that a special process must be used to determine which suitor would win the hand of the prince/princess. First, all of the suitors would be lined up one after the other and assigned numbers. The first suitor would be number 1, the second number 2, and so on up to the last suitor, number n. Starting at 4 the suitor in the first position, she/he would then count three suitors down the line (because of the three letters in his/her name) and that suitor would be eliminated and removed from the line. The prince/princess would then continue, counting three more suitors, and eliminate every third suitor. When the end of the line is reached, counting would continue from the beginning. For example, if there were 6 suitors, the elimination process would proceed as follows:_____.
12456 Suitor 3 eliminated; continue counting from 4.
1245 Suitor 6 eliminated; continue counting from 1.
125 Suitor 4 eliminated; continue counting from 5.
15 Suitor 2 eliminated; continue counting from 5.
1 Suitor 5 eliminated; 1 is the lucky winner.
Write a program that creates a circular linked list of nodes to determine which position you should stand in to marry the princess if there are n suitors. Your program should simulate the elimination process by deleting the node that corresponds to the suitor that is eliminated for each step in the process.
Explanation:
public class CircularLinkedListTest
{
private Node head;
private int size;
private class Node
{
private int num;
private Node next;
public Node(int n)
{
num = n;
next = null;
}
public int getNum()
{
return num;
}
public void setNext(Node n)
{
this.next = n;
}
public Node getNext()
{
return next;
}
}
public CircularLinkedListTest ()
{
head = null;
int numNodes = 0;
}
public void add(int num)
{
int numNodes = 0;
if(head == null)
{
head = new Node(num);
head.setNext(head);
numNodes++;
}
else
{
Node temp = head;
while(temp.getNext() != head)
temp = temp.getNext();
temp.setNext(new Node(num));
temp.getNext().setNext(head);
numNodes++;
}
}
public int size()
{
int numNodes = 0;
return numNodes;
}
public int get(int index)
{
Node t = head;
for(int i = 0; i < index; i++)
t= t.getNext();
return t.getNum();
}
public int remove(int index)
{
if(index < 0 || index >= size)
{
System.out.println("Error, index out of Qbounds.");
System.exit(0);
}
Node temp = head;
if(index == 0)
{
while(temp.getNext() != head)
temp = temp.getNext();
int value = head.getNum();
if(size > 1)
{
head = head.getNext();
temp.setNext(head);
}
else
head = null;
size--;
return value;
}
else
{
for(int i = 0; i < index - 1; i++)
temp = temp.getNext();
int answer = temp.getNext().getNum();
temp.setNext(temp.getNext().getNext());
size--;
return answer;
}
}
public static void main(String args[])
{
CircularLinkedListTest suitors = new CircularLinkedListTest ();
for(int i = 1; i <= 6; i++)
suitors.add(i);
int currentIndex = 0;
while(suitors.size() != 1)
{
for(int i = 1; i <= 2; i++)
{
currentIndex++;
if(currentIndex == suitors.size())
currentIndex = 0;
}
suitors.remove(currentIndex);
if(currentIndex == suitors.size())
currentIndex = 0;
for(int i = 0; i < suitors.size(); i++)
System.out.print(suitors.get(i) + " ");
System.out.println();
}
}
}
QUESTION 4/10
Which of the following should be part of an access data request?
Answer: Access to their personal information.
Explanation: Your lawful basis for processing their data. The period for which you'll store their data (or the criteria you'll use to determine that period—i.e., “as long as you're a customer”) Any relevant information about how the data was obtained
The following should be part of an access data request: Provide justification and Specify exact data needed should be part of an access data request. The correct option is A and B.
What is an access data request?An access data request is a request made to a data controller or processor by an individual seeking to obtain access to their personal data held by that organization.
Under data protection laws, individuals have the right to request access to their personal data, as well as the right to request corrections or deletions of that data if necessary.
In order to make an effective access data request, it is important to provide justification for the request and specify the exact data needed.
Provide justification and Specify exact data needed should be part of an access data request should be part of an access data request. Therefore, correct option is A and B.
Learn more about access data request here:
https://brainly.com/question/31600082
#SPJ2
The complete question might be:
Which of the following should be part of an access data request?
a) Provide justification
b) Specify exact data needed
c) A second signature
d) Time limit
1. Write a Python code to:
1. a. Find the inverse of the following matrix. Show that the matrix you found satisfies the definition of a multiplicative inverse.
(AA' = A'A= 1) A [i 4 3 21 1 7 4 5 =I 72 5 3 1 (1 3 29 [4 3 2] 3 -1 2 61
b. Find a 3 x 4 matrix X such that 5 6 3 X = 7 4 1 5 . 3 5 2 5 2 4 1
Show that the matrix X satisfies the above equation.
2. Following the instructions given in the text, section 3.4.4, use Python to solve problems 3.4.9 and 3.4.10, i.e., enter the Python commands to determine the eigenvalues, eigenvectors and characteristic polynomial for the 3 x 3 matrices given in these problems. From these results, write the general solutions in vector form. (Note that Python is not used in writing the general solutions; just apply the ideas discussed in class and write (by hand) the general solutions.)
Answer:
hope this help and do consider giving brainliest
Explanation:
1)
a)
import numpy as np
A=np.array([[1,4,3,2],[1,7,4,5],[2,5,3,1],[1,3,2,9]]);
print("Inverse is");
B=np.linalg.inv(A);
print(B);
print("A*A^-1=");
print(np.dot(A,B));
print("A^-1*A=");
print(np.dot(B,A));
2)
import numpy as np
A=np.array([[4,3,2],[5,6,3],[3,5,2]]);
B=np.array([[3,-1,2,6],[7,4,1,5],[5,2,4,1]]);
X=np.dot(np.linalg.inv(A),B);
print("X=");
print(X);
Choose the correct option.
Which of the following infection types can send information on how you use your computer
to a third party without you realizing it?
Spyware accumulates your personal information and passes it on to curious third parties without your knowledge or consent.
Spyware is also learned for installing Trojan viruses.
What is spyware?
Spyware is a type of malicious software or malware that is established on a computing device without the end user's knowledge. It plagues the device, steals exposed information and internet usage data, and relays it to advertisers, data firms, or external users.
How do hackers utilize spyware?
Spyware monitors and logs computer use and activity. It celebrates the user's behavior and finds vulnerabilities that allows the hacker to see data and other personal details that you'd normally consider confidential or sensitive.
To learn more about Spyware, refer
https://brainly.com/question/7126046
#SPJ9
Write a program that converts a time in 12-hour format to 24-hour format. The program will prompt the user to enter a time in HH:MM:SS AM/PM form. (The time must be entered exactly in this format all on one line.) It will then convert the time to 24 hour form. You may use a string type to read in the entire time at once, including the space before AM/PM, or you may choose to use separate variables for the hours, minutes, seconds and AM/PM.
Answer:
This program is written in Python
inputtime = input("HH:MM:SS AM/PM: ")
splittime = inputtime.split(":")
secondAM = splittime[2].split()
if secondAM[1] == "AM":
print(splittime[0]+":"+splittime[1]+":"+secondAM[0])
elif secondAM[1] == "PM":
HH = int(splittime[0])
HH = HH + 12
print(str(HH)+":"+splittime[1]+":"+secondAM[0])
Explanation:
This line prompts user for input
inputtime = input("HH:MM:SS AM/PM: ")
This line splits the input string to HH, MM and "SS AM/PM"
splittime = inputtime.split(":")
This line splits "SS AM/PM" to SS and AM/PM
secondAM = splittime[2].split()
This line checks if time is AM
if secondAM[1] == "AM":
This line prints the equivalent time
print(splittime[0]+":"+splittime[1]+":"+secondAM[0])
Else;
elif secondAM[1] == "PM":
The equivalent 24 hour is calculated
HH = int(splittime[0]) + 12
This line prints the equivalent time
print(str(HH)+":"+splittime[1]+":"+secondAM[0])
What tool does a programmer use to produce Python source code?
Answer:
Cog is a simple code generation tool written in Python. We use it or its results every day in the production of Kubi. Kubi is a collaboration system embodied in a handful of different products.
which statements are true? Select 4 options. Responses A function can have no parameters. A function can have no parameters. A function can have a numeric parameter. A function can have a numeric parameter. A function can have only one parameter. A function can have only one parameter. A function can have a string parameter. A function can have a string parameter. A function can have many parameters. A function can have many parameters.
Answer:
A function can have a numeric parameter.
A function can have many parameters.
A function can have only one parameter.
A function can have a string parameter.
Explanation: