Question # 3
Fill in the Blank
What is the output?
answer = "Hi mom"
print(answer.lower())

Answers

Answer 1

what not understanding

Answer 2
the output is mom, hope this helped p

Related Questions

A device _____ is a program that must be installed in order for the peripheral device to be ableto work with the computer or laptop.

Answers

Driver would be the answer

Creating the model of a character is one of the first things a 3D artist will do.

True or false

Answers

Answer:

false

Explanation:

the character must first be drawn and designed

Answer:

True

Explanation:

I had this same question in my work, and after submitting it, I saw that the answer was true.  I hope this was of good use to someone who had this question. Bye bye now :)))

Under which condition are hareholder mot likely to be concerned about agency conflict?

Answers

Shareholders are likely to be concerned about agency conflict when they believe that the interests of the company's management are not aligned with their own interests as shareholders.

Why should shareholders concerned about agent problem?Agency conflict can arise in various situations, including when management makes decisions that prioritize their own short-term interests or personal gain over the long-term interests of the company and its shareholders. For example, management may be motivated to pursue risky investments or engage in irresponsible spending in order to receive bonuses or other financial incentives, even if these actions are not in the best interests of the company or its shareholders.Shareholders may also be concerned about agency conflict when they believe that the board of directors, which is responsible for overseeing management and representing the interests of shareholders, is not effectively fulfilling its role.

To learn more about Shareholders refer :

https://brainly.com/question/28452798

#SPJ4

consider inserting keys 3,4,2,5,1 in the order given into a hash table of length m = 5 using hash function h (k) = k2 mod m

(1) Using h(k) as the hash function, illustrate the result of inserting these keys using chaining. Also, compute the load factor a for the hash table resulting from the insertions.
(2) Using h (k) as the primary hash function, illustrate the result of inserting these keys using open addressing with linear probing.
(3) Using h(k) as the primary hash function, illustrate the result of inserting these keys using open addressing with quadratic probing, where c1-1 and c2-2.
(4) What different values can the hash function h(k) k2 mod m produce when m- 11? Carefully justify your answer in detail.

Answers

The hash function h(k) = k²  mod m, where m = 11, can produce values in the range [0, 10] inclusive.

How does the hash function h(k) = k²  mod m, where m = 11, determine the possible values it can produce?

Using chaining:

- Key 3: Hashes to index 4, inserts as the head of the linked list at index 4.

- Key 4: Hashes to index 1, inserts as the head of the linked list at index 1.

- Key 2: Hashes to index 4, inserts at the end of the linked list at index 4.

- Key 5: Hashes to index 0, inserts as the head of the linked list at index 0.

- Key 1: Hashes to index 1, inserts at the end of the linked list at index 1.

The resulting hash table:

Index 0: 5 -> NULL

Index 1: 4 -> 1 -> NULL

Index 2: NULL

Index 3: NULL

Index 4: 3 -> 2 -> NULL

The load factor (a) is the number of keys (n) divided by the table length (m):

a = n/m = 5/5 = 1

Using open addressing with linear probing:

- Key 3: Hashes to index 4, inserts at index 4.

- Key 4: Hashes to index 1, inserts at index 1.

- Key 2: Hashes to index 4, probes to index 0, inserts at index 0.

- Key 5: Hashes to index 0, probes to index 1, inserts at index 1.

- Key 1: Hashes to index 1, probes to index 2, inserts at index 2.

The resulting hash table:

Index 0: 5

Index 1: 4

Index 2: 1

Index 3: NULL

Index 4: 3

Using open addressing with quadratic probing:

- Key 3: Hashes to index 4, inserts at index 4.

- Key 4: Hashes to index 1, inserts at index 1.

- Key 2: Hashes to index 4, probes with quadratic sequence (0, 1, 4, 9, 16, ...) and inserts at index 0.

- Key 5: Hashes to index 0, probes with quadratic sequence (0, 1, 4, 9, 16, ...) and inserts at index 2.

- Key 1: Hashes to index 1, probes with quadratic sequence (0, 1, 4, 9, 16, ...) and inserts at index 3.

The resulting hash table:

Index 0: 2

Index 1: 4

Index 2: 5

Index 3: 1

Index 4: 3

The hash function h(k) = k²   mod m, where m = 11, can produce values in the range [0, 10] inclusive. This is because the result of k²   mod m will always be between 0 and m-1. In this case, k²   mod 11 will produce values in the range [0, 10] when k varies from 0 to 10. The modulus operation ensures that the result remains within the specified range.

Learn more about hash function

brainly.com/question/31579763

#SPJ11

Which is not one of the phases of the intrusion kill chain? Command and Control
Delivery
Activation
Installation

Answers

The Cyber Kill Chain has seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and control (C2), and actions on objectives.

What does the term "weaponisation" mean?

weaponisation (uncountable) (uncountable) the process of converting anything into a weapon or improving its weaponry. Weaponizing anything means using it to intentionally cause harm to others. Your brother might accuse you of turning your fruit salad into a weapon if you start throwing grapes at him. Directly forcing the child to spy on the abused parent or warning the abused parent that they would never see the child again if they end the relationship are two examples of this behaviour. Turning a child against the other parent is another method a parent might use them as a weapon.

Know more about  installation Visit:

https://brainly.com/question/13267432

#SPJ4

which of these stamtemnst correctly descride how to adjust a imange on a slide

Answers

Answer:

To resize an image, just click and drag its edges.

Explanation:

?i really don't understand. I hope I'm correct..

Design using trnsys any HVAC system, please state the
parameters and connections with snaps

Answers

I have designed an HVAC system using TRNSYS, incorporating parameters such as heat load, equipment specifications, and control strategies. The system's connections are illustrated with accompanying snaps.

In response to your request, I have utilized TRNSYS (Transient System Simulation Tool) to design an HVAC (Heating, Ventilation, and Air Conditioning) system. TRNSYS is a widely used software for simulating energy systems and their components.

The HVAC system design involves several key parameters to ensure efficient and effective operation. Firstly, the heat load of the space or building is calculated, taking into account factors such as occupancy, insulation, and climate conditions. This information serves as the basis for determining the required heating and cooling capacities of the system.

Secondly, equipment specifications are considered. This includes selecting appropriate components such as boilers, chillers, heat pumps, air handlers, and ductwork. Each equipment type has specific characteristics and efficiencies that must be taken into account during the design process.

Lastly, control strategies play a crucial role in HVAC system performance. By implementing advanced control algorithms, it is possible to optimize energy consumption and maintain comfortable indoor conditions. These strategies may involve temperature and humidity sensors, occupancy detectors, and feedback loops to adjust the operation of the HVAC equipment in real-time.

To provide a more comprehensive explanation, it would be helpful to illustrate the connections and configurations of the designed HVAC system using accompanying snapshots. These visuals would showcase the arrangement of the equipment, the flow of air or fluids, and the control interfaces, enabling a better understanding of the system's overall design.

Learn more about HVAC

brainly.com/question/32679929

#SPJ11

sign that your desktop may need cleaning​

Answers

Answer:

My desktop may need be cleaning but for real!!

for _____, the original media file is stored on the media distributor’s server, so you can watch the content more than once.

Answers

On demand content, the storing of the original media file is been done on the media distributor’s server, so that the content can be watched many times

On demand can be regarded as program that one can download as well as watch even though the program is not been shown on live TV,

These programs are programs that one can  accessed on a website or with some mobile apps. On demand encompass all exclusive programs which can only be assessed online.

Therefore, On demand content, original media file can be saved on the distributor’s server.

Learn more at: https://brainly.com/question/3110525?referrer=searchResults

write a class definition line and a one line docstring for the classdog. write an init method for the classdog that gives each dog its ownname andbreed.test this on a successful creation of adog object.

Answers

category Dog

A canine with a name and breed.

Defined as self, name, and breed:

self.name equals name

breed = self.breed

foreign dog

if "__main" and "__name" match:

dog = sugar

Dog

"Sugar" and "border collie"

print(sugar.name)

print(sugar.breed)

What is Classdog?

CLASS: The word class is used to define a class, which is a type of object that has methods and functions and describes what an object will be.

category Dog

# The class has a definition

Docstring, which is just a shortened version of documentation strings, offers a simple means of connecting Python modules, functions, classes, and methods with their corresponding documentation. That is, it reveals what they do.

It's stated by enclosing it in triple quotations.

A canine with a name and breed.

The method is then defined, and the class is given attributes (Name and Breed).

Defined as self, name, and breed:

self.name equals name

breed = self.breed

Next, we import the class: Make sure you save your source file with the name dog before proceeding.

We finally print out its characteristics.

foreign dog

if "__main" and "__name" match:

dog = sugar

Dog

"Sugar" and "border collie"

print(sugar.name)

print(sugar.breed)

To help you understand how the code functions, I've attached an image.

To Learn more About category Dog refer To:

https://brainly.com/question/5992870

#SPJ1

write a class definition line and a one line docstring for the classdog. write an init method for the

What is the output for the following program? numB = 2 while numB < 15: numB = numB + 5 print(numB) Output:

Answers

The following program is a while loop that will output the following data

7,12,17.

In the first iteration, the variable numB is 2, since 2 is less than 15, the program will run the command

numB = numB+5 and it will print 7

The second iteration is still valid because numB is now 7 and is less than 15, so the program will run the command

numB = numB+5 and it will print 12

The third iteration is still valid because numB is now 12 and is less than 15, so the program will run the command

numB = numB+5 and it will print 17

The fourth iteration is not valid because numB is now 17 and is greater than 15, so the program will not run the command

Learn more:

https://brainly.com/question/19344465

Answer: 7,12,17.

Explanation: got it right on edgen

which feature of project management includes monetary compensation for the employees

Answers

Answer:

Extrinsic compensation

Explanation:

The feature of project management that includes monetary compensation for employees is the Extrinsic compensation.

Extrinsic compensation is reward ( tangible ) given to workers/employees by the management of a project for the speedy completion of a task or for the completion of a specific task . It can in the form of monetary compensation or non-monetary compensation.

example of Non-monetary compensation includes certificate of honor, medical insurance .

example of monetary compensation includes : work Bonuses , salaries

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

identity theft

corporate espionage

software piracy

sale of trade secrets

Answers

Answer:Sale of trade secrets

Explanation:

Just took it

Answer:

sale of trade secrets

Explanation:

Just took it edgen 2020 is correct

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

trade

/trād/

the action of buying and selling goods and services.

A web developer overhears an executives username and password, and then uses it to download the companys

Which system procedure is normally done with both hand valves opened on a gauge manifold connected to a refrigeration system?

Answers

Answer:

The answer is "Evacuation".

Explanation:

The evacuation in coolants was its removal from the coolant of heat, air, and non-condensable toxic gases. Its seal HVAC system is drawn to a vacuum and use a pressure washer throughout this process.  

It loses the air and water vapor throughout the coolant point is called it. The two primary goals are accomplished by evacuating, that are eliminates content and hydrates.

Answer:

the answer is c i belive

Explanation:

i belive this is the answer good luck :>

What is the difference between weak AI and strong AI?

Answers

Explanation:Strong AI has a complex algorithm that helps it act in different situations, while all the actions in weak AIs are pre-programmed by a human. Strong AI-powered machines have a mind of their own. They can process and make independent decisions, while weak AI-based machines can only simulate human behavior.

Critical thinking: why would the network designers include fragmentation (segmentation) as a function instead of just requiring all packets to be a certain size? be specific.

Answers

The reason why  network designers include fragmentation (segmentation) as a function  instead of just requiring all packets to be a certain size is the fact that it helps to improve security as well as make a predictable traffic flows.

What is Packet fragmentation?

IP fragmentation is known to called an Internet Protocol (IP) process that tends to breaks down packets into little  pieces (fragments), so that the outcome of those pieces can be able to pass through a link with a little maximum transmission unit (MTU) than when compared to original packet size.

Note that by the act of fragmenting data packets and also sending a lot of packet, it is one that tends to have shorter transmission frames, all of the transmission will also be made up a lower probability of having a collision with a Bluetooth packet.

The reducing of the frame size tends to increases the percentage of overhead bits that is used in the transmission.

Therefore, The reason why  network designers include fragmentation (segmentation) as a function  instead of just requiring all packets to be a certain size is the fact that it helps to improve security as well as make a predictable traffic flows.

Learn more about fragmentation from

https://brainly.com/question/26260432

#SPJ1

____________________ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.

Answers

I’m pretty sure it’s encryption

presenting results to the user is called

Answers

Answer:

You're answer is,

Output devices

Explanation:

An output device is any piece of computer hardware equipment which converts information into a human-perceptible form or, historically, into a physical machine-readable form for use with other non-computerized equipment. It can be text, graphics, tactile, audio, or video. Examples include monitors, printers, speakers, headphones, projectors, GPS devices, optical mark readers, and braille readers.

Hope this helps

`

`

`

Tori

You can use the ____ to change the order of the wat windows are stacked.

A). taskbar
B). Open bar
C). toolbar
D). Menu bar

Answers

Answer:

A

Explanation:

3.7 Code Practice
can someone write a code for me

3.7 Code Practicecan someone write a code for me

Answers

Answer:

Explanation:

raaaaa faraon- yt:

love shady

Explain one rule the company must follow when using cookies on its website.

Answers

Explanation:

Work out what cookies your site sets, and what they are used for, with a cookie audit.

Tell your visitors how you use cookies.

Obtain their consent, such as by using Optanon, and give them some control.

Which guideline should an employee use when taking notes for a report?
O A. Create long, accurate notes by copying and pasting
B. Stick to key points, uncluttered with the name of the source
OC. Include information about unrelated topics in case he or she
expands the report
D. Write ideas briefly in his or her own words, and give the source

Answers

When taking notes for a report, an employee should write ideas briefly in his or her own words, and give the source.

The correct andswer is option D.

This involves writing ideas briefly in their own words and providing the source of the information. By doing so, the employee can effectively summarize and synthesize key points, making the report concise and easily understandable. This approach ensures that the report is focused on relevant information while acknowledging the original source of the information.

Including long, accurate notes by copying and pasting (option A) can lead to excessive detail and potential plagiarism issues. Sticking to key points without mentioning the source (option B) is not recommended as it omits important context and may lead to credibility issues. Including information about unrelated topics (option C) can make the report unfocused and difficult to follow.

Therefore, option D is correct.

For more such questions on plagiarism, click on:

https://brainly.com/question/11946294

#SPJ11

How do you add a new comment to a document?
A. Choose the References tab, then New Comment.
B. Choose the Layout tab, then Insert Comment.
C. Choose the File tab, then New Comment.
D. Choose the Review tab, then New Comment.

Answers

Answer:

D. Choose the Review tab, then New Comment

Explanation:

It's quite easy to add comments to word documents.

From the list of given options, only option D satisfy the given question.

To add comments to a text, you simply highlight the text

Go to the review tab then select new comment.

Once you follow these simple steps, a new comment will be created in your word document.

The correct answer is D. Choose the Review tab, then New Comment.

If you go to the review tab in Microsoft Word, the center there is a group labeled Comments. There's a large button on the left-hand side in that group labeled New Comment.

Hope this helps :)

How many bits of a Class A IP address are used for host information? 8 bits 32 bits 24 bits 16 bits. 24.

Answers

In a Class A IP address, the first octet is used to identify the network, and the remaining three octets are used to identify hosts on that network. Therefore, the answer is 24 bits.

How to calculate no. of bits of a Class A IP address?

Since each octet is 8 bits, the number of bits used for host information in a Class A IP address is:

32 bits (total number of bits in an IPv4 address) - 8 bits (used for network identification in Class A) = 24 bits.

Therefore, the answer is 24 bits.

To learn more about IP address, visit: https://brainly.com/question/29556849

#SPJ4

you have fixed a printer problem and verified full functionality. what is the next step to take in the best practice methodology?

Answers

After fixing the printer problem and having verified full functionality as needed, the final step in the best practice methodology is to document findings, actions, and outcomes.

Define methodology.

In order to create a strategy that meets your aims, methodology entails researching the methods employed in your area and the theories or principles that underpin them.

The precise instruments and steps you employ to gather and evaluate data are referred to as methods (for example, experiments, surveys, and statistical tests).

A system of procedures for carrying out, instructing in, or investigating something is known as a methodology. For instance, the research team's methodology and findings have come under fire. ways to accomplish goals. actively.

To learn more about methodology, use the link given
https://brainly.com/question/21761325
#SPJ4

Write a SOL SELECT statement that selects only the Name field from records whose magazine name begins with the letter C. f. Write a SQL SELECT statement that selects only the Name field from records whose magazine name contains two characters. g. Write a SQL SELECT statement that selects only the Name and Cost fields from records whose cost is from $4 to $6. inclusive. h. Write a SQL SELECT statement that selects only records for the Code provided by the user.

Answers

A SQL SELECT statement that selects only records for the Code provided by the user.Syntax:SELECT *FROM table_nameWHERE Code = user_input.

a. Write a SQL SELECT statement that selects only the Name field from records whose magazine name begins with the letter C.SQL SELECT statement is used to query the database and retrieve the data. The statement consists of several clauses like SELECT, FROM, WHERE, GROUP BY, HAVING, and ORDER BY.

The SELECT clause is used to select the columns of the table.Syntax:SELECT NameFROM table_nameWHERE magazine_name LIKE 'C%';b. Write a SQL SELECT statement that selects only the Name field from records whose magazine name contains two characters.Syntax:SELECT NameFROM table_nameWHERE magazine_name LIKE '__';c. Write a SQL SELECT statement that selects only the Name and Cost fields from records whose cost is from 4 to 6 inclusive.Syntax:SELECT Name, CostFROM table_nameWHERE Cost BETWEEN 4 AND 6;d. Write a SQL SELECT statement that selects only records for the Code provided by the user.Syntax:SELECT *FROM table_nameWHERE Code = user_input.

To know more about SQL SELECT visit :

https://brainly.com/question/29733104

#SPJ11

Discuss the ways you can perform to prevent your computer/device and its data/contents from being stolen. Define two-facto authentication.

Answers

Answer:

is a security that needs two types of identification to access what your trying to enter.

Explanation:

Ex= to enter email, you first need to put in password, then verify by phone call that u need to enter.

please can someone help me with this?

please can someone help me with this?

Answers

Explanation:

there fore 36:4 = m¤

46:6

20:16

#von5

Describe in 2-4 sentences how you would select a function.

Answers

Explanation:

You would call the capacity from the primary. At that point execute your own factors to it. When the capacity is in the cell, you can copy and after that paste it into another cell to do a similar capacity for that diverse scope of cells.

The unix operating system associates a protection domain with the ____. the unix operating system associates a protection domain with the ____. task tread process user

Answers

The unix operating system associates a protection domain with the user.

In the Unix operating system, each user is assigned a protection domain. This domain defines the user's permissions and access rights. Protection domains are used to prevent unauthorized access to system resources and to ensure that users can only access the resources that they are authorized to access.

This domain is used to protect the user's files and data from being accessed by unauthorized users. The domain is also used to limit the user's ability to modify system files.

The security domain of a user is the set of all objects to which the user has access. A user's security domain is determined by the user's security clearance and the security policies of the domain.

clearance: the user's security clearance

domain: the set of all objects to which the user has access.

Learn more about Unix operating system here:

https://brainly.com/question/4837956

#SPJ4

Other Questions
when will it make sense to borrow to finance education beyond high school? what are some of the factors that will make borrowing to finance higher education risky? Which of the following actions is a good exampleof protecting sensitive information? Check all ofthe boxes that apply.using a paper shredder to discard documentsthat contain personal medical informationkeeping patient files in a secure electronic filesystem with limited accessmaintaining a confidential patient consultationarea in a doctor's officediscussing private matters with patients in thewaiting room Suppose a company uses wood pulp (chemically processed wood) instead of recycled materials to make paper. What is the opportunity cost of the companys choice? which workplace concept embraces shared governance, in which management and workers cooperate in decision-making and workers have the right to participate on the board of directors of their company? Is it just asking me a congruence theorem, does it want me to say whats congruent to what, or does it just want the angles and or sides? The nabonidus chronicle confirms that ________ was coregent as stated in the book of daniel. Find the zeros of the function.Enter the solutions from least to greatest.f(x)=-3x+75lesser x =greater x =Show Calculator if the representative firm in a monopolistically competitive industry has an optimal output where p < atc, the industry will expand in the long run.T/F Which is the best summary of this part of antonys speech?. The item in this illustration that is highlighted is the _____.status barhome commandresize handlezoom control The Second Continental Congress was the first attempt at what type of government that would unify the colonies?Please please help. I need this to get done. When evaluating the performance of a cost center, the appropriate measurement technique would be:____________. 10. Yo(blank)11. Ellos12. Nosotros13. Ella(blank)14. T(blank)(blank)(blank)15. Ustedes16. La gente(blank)(blank)17. Toms y yomuy cordial.18. Los profesores(blank)simpticos.muy tontos.antiptica.muy generoso.(blank)cordiales.amable.muy felices.buenos. 1945 pounds to ounces When you listen to jazz.What is incorrect about this sentence and what type of sentence is it; fragment, comma splices or run on? Even though John is a very skilled and talented auto mechanic, his repair shop still failed due to his lack of skills in finance, marketing, customer service, and employee management. This common scenario is known as:______. A local gym has 2 types of cardio machines, treadmills and elliptical machines. There are 38 cardio machines in all. There are 10 more treadmills than there are elliptical machines. How many elliptical machines are at the gym? 9 elliptical machines 14 elliptical machines 24 elliptical machines 28 elliptical machines which one of the following statements captures how public opinions about special counsel mueller changed during the course of the investigation what is one criticism leveled against universal entitlement programs quizle A seal is swimming in the ocean 5 feet below sea level. It dives down 12 feet to catchsome fish. Then, the seal swims 8 feet up towards the surface with its catch. What isthe seal's final elevation relative to seal level?