nums = [30, 10, 30, 14, 10, 3, 9, 7]
print(nums)

nums.extend([24, 3, 21, 19])
print(nums)
What is output by the second print statement in the code above?

Group of answer choices

[30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]

[30, 10, 30, 14, 10, 3, 9, 7]

[24, 3, 21, 19]

[24, 3, 21, 19, 30, 10, 30, 14, 10, 3, 9, 7, 24, 3, 21, 19]

Answers

Answer 1
The range function must have two parameters? False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.
Answer 2

The range function must have two parameters is False. ~Range has three possible sets of parameters: range(stop) - Returns 0 to the given stop value, counts by one.

What is program?

A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.

On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.

Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.

Learn more about program on:

brainly.com/question/30613605

#SPJ3


Related Questions

A photograph is created by what
A) Silver
B) Shutters
C) Light
4) Mirror

Answers

A photograph is created by Light.

What are photographs made of?

Any photograph created is one that is made up of Support and binders.

The steps that are needed in the creation of a photograph are:

First one need to expose or bring the film to light.Then develop or work on the imageLastly print the photograph.

Hence, for a person to create a photograph, light is needed and as such, A photograph is created by Light.

Learn more about photograph from

https://brainly.com/question/25821700

#SPJ1

In addition to assessing whether each of your independent variables has an effect on the dependent variable, a factorial ANOVA also allows you to:
A) use multiple dependent measures in a single analysis.
B) control for a third variable that might be related to your dependent measure prior to
investigating the independent variable of interest.
C) determine whether the effects of one factor depend on the other factor.
D) partition out the variability due to individual differences and the variability due to
measurement error.

Answers

Answer:

C) determine whether the effects of one factor depend on the other factor.

Explanation:

ANOVA is analysis of variance which helps to understand whether the population mean are equal or not. It is statistical model which is used by the businessmen to analyze their business performance. ANOVA also determines whether the effect of one factor are related or dependent on other factor.

Suppose you are an ad-serving company and you maintain a log of cookie data for ads you serve to the Web pages for a particular vendor (say Amazon). a. How can you use this data to determine which are the best ads? b. How can you use this data to determine which are the best ad formats? c. How could you records of past ads and ad clicks to determine which ads to send to a given IP address? d. How could you use this data to determine how well the technique you used in your answer to part c was working? e. How could you use this data to determine that a given IP address is used by more than one person? f. How does having this data give you a competitive advantage vis-à-vis other ad-serving companies?

Answers

Answer:

A

Explanation:

thethe more you have attached the more people are going to know your product so that it's going to be a long process which people can introduce to their friends

Which of the following is an example of artificial intelligent agent/agents? a) Autonomous Spacecraft b) Human c) Robot d) All of the mentioned.

Answers

People could be categorized as agents. Sensors include things like the eyes, ears, skin, taste buds, and so on in contrast to effectors, which include the hands, fingers, legs, and mouth. Machines make up agents.

What is an artificial intelligence agent ?

Artificial sweetening agents are substances that add sweetness to food. Our bodies do not gain calories from them. They have no negative effects on our physical health. Aspartame, sucrose, sucralose, and alitame are a few examples.Using sensors and actuators, an AI agent detects its surroundings and takes appropriate action. It senses its surroundings via sensors and responds to them with actuators. Simple reflex agent, model-based reflex agent, reflex agent with goals, reflex agent with utility, and learning agent.

The Hong Kong-based company Hanson Robotics created Sophia, a social humanoid robot. In mid-March 2016 during South by Southwest (SXSW) in Austin, Texas, the United States, Sophia made its first public appearance after being activated on February 14. George Devol created the first digitally controlled and programmable robot in 1954, which he named the Unimate. The contemporary robotics industry was later built on the foundations laid by this.

To learn more about artificial intelligent refer to :

https://brainly.com/question/20339012

#SPJ4

what is a difference between asa ipv4 acls and ios ipv4 acls?

Answers

The main difference between ASA IPv4 ACLs and IOS IPv4 ACLs is that they are implemented in different Cisco platforms, with ASA being used in Adaptive Security Appliance devices and IOS in Cisco routers and switches.

ASA IPv4 ACLs are applied to firewall devices for securing networks, while IOS IPv4 ACLs are used in routing and switching environments. Now let's break down the differences step by step:

1. Syntax: ASA IPv4 ACLs use a different syntax compared to IOS IPv4 ACLs. ASA ACLs include "access-list" followed by the name or number, whereas IOS ACLs use "access-list" followed by the number and an optional name.

2. Implied rules: ASA IPv4 ACLs have an implicit deny rule at the end, meaning that any traffic not explicitly permitted will be denied. IOS IPv4 ACLs also have an implicit deny rule, but they include an implicit permit rule for routing updates.

3. Direction: In ASA IPv4 ACLs, the direction (inbound or outbound) is specified when applying the ACL to an interface. In IOS IPv4 ACLs, the direction is specified within the ACL itself.

4. Object groups: ASA IPv4 ACLs support object groups, which allow you to group multiple IP addresses, services, or protocols for easier management. IOS IPv4 ACLs do not support object groups.

5. Logging: ASA IPv4 ACLs support logging on a per-entry basis, whereas IOS IPv4 ACLs support logging only on a per-ACL basis.

In summary, ASA IPv4 ACLs and IOS IPv4 ACLs serve similar purposes but have different syntax, rules, and features due to their implementation on different Cisco platforms.

Know more about the IP addresses click here:

https://brainly.com/question/32082556

#SPJ11

Social media marketers need the ability to do what?
Code in JavaScript
Collaborate across teams
Communicate with customers
Make a website useful

Answers

Communication with customers
I believe the answer is communicate with customers

Computerized spreadsheets that consider in combination both the
risk that different situations will occur and the consequences if
they do are called _________________.

Answers

risk assessment spreadsheets or risk analysis spreadsheets

Both answers are correct

The given statement refers to computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do which are called decision tables.

A decision table is a form of decision aid. It is a tool for portraying and evaluating decision logic. A decision table is a grid that contains one or more columns and two or more rows. In the table, each row specifies one rule, and each column represents a condition that is true or false. The advantage of using a decision table is that it simplifies the decision-making process. Decision tables can be used to analyze and manage complex business logic.

In conclusion, computerized spreadsheets that consider in combination both the risk that different situations will occur and the consequences if they do are called decision tables. Decision tables can help simplify the decision-making process and can be used to analyze and manage complex business logic.

To know more about spreadsheets visit:

https://brainly.com/question/31511720

#SPJ11

what is full form COMPUTER????​

Answers

Explanation:

The full form of the Computer is Common Operating Machine Purposely Used for Technological and Educational Research.

Explanation:

The computer full form of common opreating machine purposely used for technical educational research

I hope you helps:)

Hey i need some help with code.org practice. I was doing a code for finding the mean median and range. the code is supposed to be including a conditional , parameter and loop. I'm suppose to make a library out of it and then use the library to test the code? please help!
here is the link to the code.
https://studio.code.org/projects/applab/YGZyNfVPTnCullQsVFijy6blqJPMBOgh5tQ5osNhq5c
P.S. you cant just type on the link i shared you have to click view code and then remix to edit it. thanks

Answers

Answer:

https://studio.code.org/projects/applab/YGZyNfVPTnCullQsVfijy6blqJPMBOgh5tQ5osNhq5c

Explanation:

Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.

Answers

What I think the highest is carbon dioxide . Because we use a lot of CO2 in every single day . So image that for 365 . We use a lot of carbon dioxide . In which that is ruining our earth

A music producer is recording a soundtrack for a new television wildlife programme that is being produced in collaboration with the OU. The music producer wishes to use a sampling rate of 96 kHz with each sample being 3 bytes of data. The recording is being made on a single (mono) channel. i. How many bits are there in each sample? ii. How many bits per second are processed while the music is being recorded? Express your answer in scientific notation to 3 significant figures. iii. One piece of music is 5 minutes 10 seconds long, how many bits are processed in total? Express your answer in scientific notation to 3 significant figures. iv. If the sampling rate is reduced to 24 kHz how many bits will be processed using the same piece of music? Express your answer in scientific notation to 3 significant figures. v. What is the percentage decrease in the number of bits processed as a result of reducing the sampling rate from 96 kHz to 24 kHz. Express your answer to 2 decimal places.

Answers

i. Each sample consists of 24 bits of data.ii. The processing rate while recording is 2.304 x 10^6 bits/s.iii. The total number of bits processed for a 5 minutes 10 seconds music piece is 7.1344 x 10^8 bits.iv. If the sampling rate is reduced to 24 kHz, the number of bits processed is 5.76 x 10^5 bits.v. The percentage decrease in the number of bits processed is 75%.

i. Each sample consists of 3 bytes of data, and since 1 byte is equal to 8 bits, there are 3 * 8 = 24 bits in each sample.

ii. The sampling rate is 96 kHz, which means 96,000 samples are processed per second. Since each sample is 24 bits, the number of bits processed per second is 96,000 * 24 = 2,304,000 bits/s.

iii. The duration of the music is 5 minutes 10 seconds, which is equivalent to 310 seconds. Since there are 2,304,000 bits processed per second, the total number of bits processed is 2,304,000 * 310 = 713,440,000 bits.

iv. If the sampling rate is reduced to 24 kHz, the number of samples processed per second becomes 24,000. With each sample still being 24 bits, the number of bits processed per second is 24,000 * 24 = 576,000 bits/s.

v. The percentage decrease in the number of bits processed is given by ((original bits - new bits) / original bits) * 100. Substituting the values, ((2,304,000 - 576,000) / 2,304,000) * 100 = 75%.

To know more about original bits visit :

https://brainly.com/question/33445462

#SPJ11

the last digit (lsb) of a signed 2's complement binary number is a 1. can you say whether the number is even or odd?

Answers

If the least significant bit (LSB) of a signed 2's complement binary number is 1, the number is odd; if it is 0, the number is even.

Yes, we can determine whether a signed 2's complement binary number is even or odd based on the value of its least significant bit (LSB).

In 2's complement representation, the LSB represents the least significant value or the "ones" place. If the LSB is 1, it indicates that the number is odd. Conversely, if the LSB is 0, it indicates that the number is even.

If the last digit (LSB) of a signed 2's complement binary number is 1, we can say that the number is odd.

In a signed 2's complement binary representation, the least significant bit (LSB) represents the value of \(2^0\), which is the "ones" place. If the LSB is 1, it signifies that the number is odd because an odd number always has a nonzero value in the ones place.

On the other hand, if the LSB is 0, the number is even because even numbers always have a zero in the ones place. Therefore, by examining the value of the LSB, we can determine the parity of a signed 2's complement binary number, distinguishing between even and odd numbers.

To know more about least significant bit refer here

https://brainly.com/question/28799444#

#SPJ11

If the last digit (lsb) of a signed 2's complement binary number is a 1, then the number is odd. This is because in 2's complement, the rightmost bit (lsb) represents the sign of the number. When it is 1, it means the number is negative.

If the rest of the bits represent an even number, adding a negative number (which is odd) will result in an odd number. Let's say we have a signed 2's complement binary number with a length of 4 bits: 1101. The leftmost bit represents the sign, so this number is negative.

The remaining 3 bits represent the magnitude of the number in binary. Converting 1101 to decimal, we get: -1 * 2^3 + 1 * 2^2 + 0 * 2^1 + 1 * 2^0 = -8 + 4 + 0 + 1 = -3.So, in this case, the number is odd.

Know more about binary number:

https://brainly.com/question/28222245

#SPJ11

inserting merge fields in the letter
steps required
plz ​

Answers

Answer:

Click or tap where you want the merge field.

Choose the down-arrow under Insert Merge Field, and select a field.

Insert Merge Field menu of available fields

If you don’t see your field name in the list, choose Insert Merge Field.

Choose Database Fields to see the list of fields that are in your data source.

Choose Insert.

Answer:

Once you have a data source connected to your document, adding merge fields is a way to personalize a document with information from the data source. The merge fields come from the column headings in the data source.

WindowsmacOS

Here’s an example of how the Address Block and Greeting Line collections of merge fields might pull data from an Excel spreadsheet into a form letter.

Data pulled into mail merge fields

The Address Block and Greeting Line fields are collections of merge fields.

Note: If the merge field commands appears dimmed, click Select Recipients and choose the kind of mailing list you’re using. If you don’t have a mailing list yet, click Type New List to create your list in Word.

Explanation:

Hope it's answer you plz mark as Brainlist

a static class method can be accessed without referring to any objects of the class. group of answer choices false true

Answers

A static method cannot be invoked by an object of a class.

What is the difference between class methods and static methods?

A class method does not require a class instance. You can't access the instance ( self ), but you can access the class itself via cls . Static methods cannot access cls or self. They work like normal functions, but belong to the namespace of the class.

How can I find the static methods of a class?

A static method can be called directly from a class without creating an instance of the class. Static methods can only access static variables. Cannot access instance variables. A static method is associated with a class, so the syntax for calling or referencing a static method is:

name of the class. Method name.

How can I access static classes in Java?

A static class is a class created within a class, known in Java as a static nested class. Non-static data members and methods cannot be accessed. You can access it via the external class name. You can access static data members of external classes, including private ones.

To know more about  static method visit;

https://brainly.com/question/13098297

#SPJ4

The province is considering changing its existing licence plate registration scheme for private vehicles to follow these convoluted guidelines: - Licence plates must follow the pattern A-MN-BCD-XY where A, B, C, and D are letters (A-Z), while M,N,X, and Y are digits (0-9); - The letters I, O, or Q cannot appear anywhere in the licence plate; - The digit X cannot be 0 , unless both X and Y are 0; - If M is odd, then A must be a consonant; - Two of the letters B, C, and D must be the same, but not all three. Determine how many possible licence plates the province can issue under this scheme. (Vowels are A, E, I, O, U; all other letters are consonants.) Solution:

Answers

The answer is 35,198,421. The pattern that the license plates for private vehicles in a particular province follows is A-MN-BCD-XY, and they are considering changing it to this pattern.

The letters I, O, or Q cannot appear on the license plate in any way, shape, or form. The digit X cannot be 0 unless both X and Y are 0. If M is odd, then A must be a consonant, and two of the letters B, C, and D must be the same, but not all three. All vowels are included in the alphabet. As a result, there are 21 consonants and five vowels in the English alphabet. We'll go through each condition to figure out how many license plates the province can issue.
1. The first three letters may be consonants or vowels. As a result, we have 21 options for the first letter, 21 options for the second letter, and 5 options for the third letter, for a total of 21 × 21 × 5 = 2,205 options.
2. The fourth letter must be the same as the fifth letter, which can be any of the 26 letters (since I, O, and Q are not allowed). As a result, we have 26 options.
3. The sixth and seventh digits can be any of the ten digits (0-9), except that X cannot be 0 unless Y is 0 as well. As a result, the sixth digit can be any of the ten digits (0-9) except for 0 (9 options). If X = 0, Y may be any of the ten digits (0-9) (10 options), and if X is not 0, Y may be any of the ten digits (0-9) (10 options). As a result, we have a total of 9 × 10 + 10 × 10 + 10 × 9 = 190 options.
4. If M is odd, then A must be a consonant. As a result, we have 21 choices for the first letter if M is odd, and 5 choices for the third letter. We have ten options for the second letter, and 26 options for the fourth and fifth letters (as before). We also have ten options for the sixth and seventh digits (as before). As a result, we have (21 × 10 × 5 × 26 × 26 × 10) + (21 × 26 × 5 × 26 × 26 × 10) = 35,196,000 choices.
5. Finally, we must subtract the cases in which all three letters B, C, and D are the same. Because there are 26 choices for the fourth letter and only one option for the three letters to be the same, we have 26 options in total.
Adding all of the cases together, the province has a total of 2,205 + 26 + 190 + 35,196,000 = 35,198,421 possible license plates that can be issued under this system. Therefore, the answer is 35,198,421.

Learn more about pattern :

https://brainly.com/question/14423905

#SPJ11

Write an inheritance hierarchy that models sports players. Create a common superclass to store information common to any player regardless of sport, such as name, number, and salary. Then create subclasses for players of your favorite sports, such as basketball, soccer or tennis. Place sport-specific information and behavior (such as kicking or vertical jump height) into subclasses whenever possible. All athletes need to have at least 2 specific attributes that are added on in the subclass

Answers

To model an inheritance hierarchy for sports players, we'll start by creating a common superclass named Player. This superclass will store information that applies to any player, regardless of their sport. Then, we'll create subclasses for specific sports like BasketballPlayer, SoccerPlayer, and TennisPlayer. These subclasses will include sport-specific attributes and behavior.

Here's the hierarchy:

1. Player (superclass)
  - Attributes: name, number, salary
  - Methods: None

2. BasketballPlayer (subclass of Player)
  - Attributes: verticalJumpHeight, threePointAccuracy
  - Methods: shoot(), dribble()

3. SoccerPlayer (subclass of Player)
  - Attributes: kickingPower, dribblingSkill
  - Methods: kick(), pass()

4. TennisPlayer (subclass of Player)
  - Attributes: serveSpeed, forehandAccuracy
  - Methods: serve(), hit()

In this hierarchy, the superclass Player includes common attributes such as name, number, and salary. Subclasses for specific sports then inherit these attributes and add their own sport-specific attributes (e.g., verticalJumpHeight for BasketballPlayer) and behaviors (e.g., shoot() method for BasketballPlayer).

Know more about the hierarchy click here:

https://brainly.com/question/30076090

#SPJ11

There are several technologies that have emerged to support Big
Data. Pick one Big Data technology and write a summary describing
the technology and how it is used. Include examples where possible
of

Answers

There are several technologies that have emerged to support Big Data and the big Data technology is Apache Hadoop, that is notable. Hadoop consists of two core components: the Hadoop Distributed File System (HDFS) and the MapReduce processing engine. 

Data analytics is when the hadoop enables organizations to perform advanced analytics on massive datasets, and it can process structured and unstructured data from various sources, such as social media feeds, log files, sensor data, and more. Recommend system such as those used by e-commerce platforms or streaming services, rely on Hadoop for processing and analyzing user behavior data, and financial institutions utilize Hadoop to detect and prevent fraud. 

Learn more about the bigdata here

https://brainly.com/question/32897217

#SPJ4

How does the OS make multitasking possible?

Answers

Answer: By allocating RAM to open applications.

Explanation:

Hope this Helped!!

By allocating ram to open applications

11. Mrs Lowery prefers ta insert her own eve droph. As you ebse fow hef deine so, what key aspects of the administration procedure should she be doing to ensure coerect techinizue? 12. Mrs. Loweryrefuses the extenderor spacer for her Combinent inhaler, telling you, "7t's too much trouble, "How would you explain the benefits of its use to her?

Answers

To ensure correct technique when inserting her own eye drops, Mrs. Lowery should follow these key aspects of the administration procedure:

1. Wash hands: Mrs. Lowery should thoroughly wash her hands with soap and water before handling the eye drops to prevent any potential contamination.

2. Tilt head back: Mrs. Lowery should tilt her head back slightly, looking up towards the ceiling. This helps to create a clear pathway for the eye drops to enter the eye.

3. Pull down lower eyelid: Using a clean finger, Mrs. Lowery should gently pull down her lower eyelid to create a small pocket.

4. Administer drops: With the eye drop bottle held close to her eye, Mrs. Lowery should squeeze the bottle to release a single drop into the lower eyelid pocket. It's important to avoid touching the eye or eyelashes with the dropper tip.

5. Close eyes gently: After applying the eye drops, Mrs. Lowery should close her eyes gently and keep them closed for a few minutes. This allows the medication to spread evenly across the eye's surface.

6. Avoid blinking excessively: Mrs. Lowery should try to minimize blinking immediately after applying the eye drops to prevent the medication from being expelled from the eye.

12. The extender or spacer for the Combinent inhaler offers several benefits that Mrs. Lowery should consider:

1. Improved medication delivery: The extender or spacer helps to ensure that the medication is properly delivered to the lungs. It increases the effectiveness of the inhaler by allowing more time for the medication to be inhaled.

2. Reduced side effects: Using the extender or spacer can help reduce the risk of side effects such as sore throat or oral thrush. It prevents the medication from directly contacting the mouth and throat.

3. Increased ease of use: While Mrs. Lowery may find it troublesome initially, using the extender or spacer can actually make it easier to use the inhaler. It provides a larger surface area for the medication to disperse, making it simpler to inhale.

4. Better coordination: The extender or spacer helps individuals coordinate their inhalation with the activation of the inhaler. This can be particularly helpful for those who struggle with timing or coordination.

By explaining these benefits to Mrs. Lowery, she may be more inclined to consider using the extender or spacer with her Combinent inhaler, as it can improve the effectiveness and ease of use of her medication.


To know more about administration visit :-  
https://brainly.com/question/33766641

#SPJ11

Pls help me I beg u

Pls help me I beg u

Answers

Self attribute skills

Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.

Answers

Answer:

I am using normally using conditions it will suit for all programming language

Explanation:

if(minimum){

hours=10

}

An end-user has reported that a legitimate sender sent an unexpected email stating the user needed to urgently update the password account information to a vendor website. Once the user clicked on the URL in the email, the user was taken to a landing page to update the user's credentials. The user entered the credentials, despite noticing the URL was slightly misspelled. What happened in this situation

Answers

Group of answer choices.

A) The attacker has sniffed the user's packets on the user's local network and has captured the user's credentials in plain text.

B) The user is a victim of a pharming attack by using social engineering to trick the user into clicking a link that redirected their traffic to a spoof website.

C) The user is the victim of an impersonation attack, where the attacker used intimidation by coaxing the target and engaging with them by putting them at ease.

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Answer:

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

Explanation:

Social engineering can be defined as an art of manipulating people, especially the vulnerable to divulge confidential information or performing actions that compromises their security.

Basically, it is a manipulative strategy or technique that involves the use of deceptive and malicious activities on unsuspecting victims in order to gain unauthorized access to their confidential or private information for fraud-related purposes. Some examples of social engineering attacks include quid pro quo, spear phishing, baiting, tailgating, water-holing, vishing, pretexting, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Furthermore, phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

This ultimately implies that, the user in this scenario is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website to make it look like a credible, authentic and original one.

Answer:

D) The user is a victim of a phishing scam, and the attacker spoofed or compromised the sender's email address and spoofed the website.

WHAT ARE THE RISK OF DUST​

Answers

Answer:

over heating

Explanation:

in computers dust acts as a blanket which traps heat, excessive heat causes components to burn up and short out

A. Design an algorithm that takes 2 integers input from users in 2 variables, without using any other variable swap the values. Design its flow chart as well.

Answers

Answer:

The algorithm is as follows

Start Accept Input1 and Input2 Input1 = Input1 + Input2 Input2= Input1- Input2 Input1= Input1- Input2 Print Input1 Print Input2 Stop

See attachment for Flowchart

Line 1 and 8 of the algorithm starts and stops the algorithm

Line 2 accepts the two integer variables (input1 and input2)

Take for instance input1 = 5 and input2 = 4

Line 3 increases input1 by input2

At this point, Input1 = 5 + 4 = 9

Line 4 subtracts input2 from input1 and saves it in input2

i.e. Input2 = 9 - 4 = 5

Note that, the value of input2 has changed to the initial value of Input1

Line 5 subtracts input2 from input1 and saves it in input1

i.e. Input1 = 9 - 5 = 4

Note that, the value of input1 has changed to the initial value of Input2

Line 6 and 7 prints the new values of input1 and input2

The flowchart does the same thing as the algorithm; the only difference is that it uses lines and shapes to depict flow of program

The flowchart was designed using Microsoft Office Word

A. Design an algorithm that takes 2 integers input from users in 2 variables, without using any other

Describe types of hardware used for output​

Answers

A computer output device is used to extract information from a computer. There are visual, audio, print and data output devices. Different types of specific hardware include monitors, speakers and headphones, printers and external hard drives.

1.1.1 Give two examples of situations or applications where electrical circuits are used. (2)​

Answers

An electric circuit contains a device that gives energy to the charged particles constituting the current, such as a battery or a generator; machines that use current, such as lamps, electric motors, or computers; and the connecting wires or communication lines.

Two of the basic laws that mathematically represent the implementation of electric circuits are Ohm’s law and Kirchhoff’s rules.

What is electric circuit?

Electric circuits are organized in several ways. A direct-current circuit carries a current that courses only in one direction. An alternating-current circuit holds a current that pulsates back and forth many times each second, as in most household circuits. A series circuit includes a path along which the whole current flows through each piece

To learn more about Electric circuits , refer

https://brainly.com/question/2969220

#SPJ9

This is used to track a user’s browser and download history with the intent to display popup banner ads that will lure a user into making a purchase.

Select one:
Adware
Worm
Phishing
Malware

Answers

Answer:

Adware

Explanation:

Adware is software designed to display advertisements on your screen, most often within a web browser.

Hope that helps.

A software that used to track a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase is: A. Adware.

An adware is also referred to as an advertisement-supported software and it can be defined as a software application (program) that is designed and developed to automatically display advertising materials such as banners or pop-up adverts (ads) on the graphical user-interface (GUI) of a user's computer system or mobile device.

The main purpose for the development of an adware is to automatically display popup banner adverts (ads), in order to lure or convince an end user into making purchase of the advertised product or service.

In conclusion, an adware is a software that is typically used to track and gather information about a user’s web browser and download history with the intent to display popup banner adverts (ads) that will lure an end user into making a purchase.

Read more on adware here: https://brainly.com/question/9692296

how does one award the brainliest???? will give brainliest.

Answers

Answer:

you need 2 people to anwser then there should be a little crown button. it will not work with one perosn

Explanation:

Answer:

all you have to do is click the little crown icon on the answer you want to mark brainliest

Explanation:

hope this helps :)

write a paragraph on plastic and pollution within 100 words

Answers

Plastic is everywhere nowadays. People are using it endlessly just for their comfort. However, no one realizes how it is harming our planet. We need to become aware of the consequences so that we can stop plastic pollution. Kids should be taught from their childhood to avoid using plastic. Similarly, adults must check each other on the same. In addition, the government must take stringent measures to stop plastic pollution before it gets too late.

Plastic has become one of the most used substances. It is seen everywhere these days, from supermarkets to common households. Why is that? Why is the use of plastic on the rise instead of diminishing? The main reason is that plastic is very cheap. It costs lesser than other alternatives like paper and cloth. This is why it is so common.

Secondly, it is very easy to use. Plastic can be used for almost anything either liquid or solid. Moreover, it comes in different forms which we can easily mold.

Furthermore, we see that plastic is a non-biodegradable material. It does not leave the face of the Earth. We cannot dissolve plastic in land or water, it remains forever. Thus, more and more use of plastic means more plastic which won’t get dissolved. Thus, the uprise of plastic pollution is happening at a very rapid rate.

Most importantly, plastic pollution harms the Marine life. The plastic litter in the water is mistaken for food by the aquatic animals. They eat it and die eventually. For instance, a dolphin died due to a plastic ring stuck in its mouth. It couldn’t open its mouth due to that and died of starvation. Thus, we see how innocent animals are dying because of plastic pollution.

In short, we see how plastic pollution is ruining everyone’s life on earth. We must take major steps to prevent it. We must use alternatives like cloth bags and paper bags instead of plastic bags. If we are purchasing plastic, we must reuse it. We must avoid drinking bottled water which contributes largely to plastic pollution. The government must put a plastic ban on the use of plastic. All this can prevent plastic pollution to a large extent.

Answer:

Plastic is everywhere nowadays. People are using it endlessly just for their comfort. However, no one realizes how it is harming our planet. We need to become aware of the consequences so that we can stop plastic pollution. Kids should be taught from their childhood to avoid using plastic. Similarly, adults must check each other on the same. In addition, the government must take stringent measures to stop plastic pollution before it gets too late.

Uprise of Plastic Pollution

Plastic has become one of the most used substances. It is seen everywhere these days, from supermarkets to common households. Why is that? Why is the use of plastic on the rise instead of diminishing? The main reason is that plastic is very cheap. It costs lesser than other alternatives like paper and cloth. This is why it is so common.

Secondly, it is very easy to use. Plastic can be used for almost anything either liquid or solid. Moreover, it comes in different forms which we can easily mold.

Furthermore, we see that plastic is a non-biodegradable material. It does not leave the face of the Earth. We cannot dissolve plastic in land or water, it remains forever. Thus, more and more use of plastic means more plastic which won’t get dissolved. Thus, the uprise of plastic pollution is happening at a very rapid rate.

Which system will be safer? Explain your answer.​

Answers

What do you mean by sythem like code or firewall
Other Questions
How did Homer Plessy violate?. which type of thought does not begin until the stage of formal operational thought? Which is a large, fan-shaped muscle that forms the chest and enables several arm movements? sternocleidomastoid pectoralis biceps transverse abdominis 7 ????????????????????????????????????????????Please help a person is most likely to conform if he or she is from ______ culture and is ______ with the task. A water tanker can finish a certain journey in 10 hours at the speed of 38 km/hr. By how much should its speed be increased so that it may take only 8 hours to cover the same distance? What is the main theme of Beowulf? 32000 divided by 14 needs to be an whole number. find the area of 8in 5in 4in 4in 10in 6in With reference to the extract, explain the need for Total Quality Management in Managing Public Finance in South Africa a stock is expected to pay a dividend of $2 forever. assuming the required rate of return on that stock is 10%, what should the price of this stock be today? A set of data is described as:The data is around 7. If another measurement were taken it would probably be around 7.Which group of measures would lead to this conclusion? Think backwards to look at the sets of data that would give the results described above.Range4, Mode6, Median7, Mean8Range5, Mode9, Median9, Mean7Range12, Mode9, Median9, Mean9Range10, Mode7, Median9, Mean5 The Great Gatsby vocabulary ambiguous sentence Write an algebraic formula for the future value of an account with an initial investment of $15,000 for "t"years at an APR of 1.75% under each of the following conditions.a. Interest compounded quarterlyb. Interest compounded monthlyc. Interest compounded continuously Required information. Wardell Company purchased a mini computer on January 1, 2019, at a cost of $34,900. The computer has been depreciated using the straight-line method over an estimated five-year useful life with an estimated residual value of $3,400. On January 1, 2021, the estimate of useful life was changed to a total of 10 years, and the estimate of residual value was changed to $940.Prepare the appropriate adjusting entry for depreciation in 2021 to reflect the revised estimate,assuming that the company uses the sum-of-the-years'-digits method instead of the straight-line method.(If no entry is required for a transaction/event, select "No journal entry required" in the first account field. Do not round intermediate calculations and round your final answers to nearest whole dollar.) if one tries to solve eq.4.1-21 by the method of separation of variables without first recognizing that the solution can be written as the sum of a steady-state solution and a transient solution? The value of the 9 in 964,352 is how many times the value of the 9 in 290,481 ? At 20 degrees celsius, the ice will melt in 20 minutes. How long will it take to melt in 30 degrees celsius? what is the mother doing The first step in preparing successful marketing and sales messages is ____________________.A. determining key selling pointsB. anticipating purchasing objectionsC. determining benefitsD. analyzing audience needsE. analyzing your competition