Submitting Unit 11 Assignment – Step 1 Python CS Fundamentals
Need the code to this.
The Step 1 Python CS Fundamentals coding work is given in the document attached below.
What are the basic fundamentals of Python?The basic steps or lessons in Python is made up of:
Kinds of Data types ( such as int, float, strings)The kinds of Compound data structures ( such as lists, tuples, and dictionaries), etc.Note that by knowing the Step 1 of the Python CS Fundamentals coding work, one can know what to do next. See the document attached for more information.
Learn more about Coding from
https://brainly.com/question/16397886
#SPJ1
true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.
Answer:
False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.
PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above
IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:
(D) All of the above.
Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.
calculate the total and average number from 1 to 100
Answer:
Thus, 50.5 is an average of numbers from 1 to 100.
Explanation:
getcalc.com's average calculator to find what is the mean or average of natural numbers upto 100.
50.5 is an average of numbers from 1 to 100 mentioned in the below table, by substituting the total sum and count of numbers in the below formula. The corresponding formulas, chart, examples & workout may help students, teachers or professionals to learn, teach or practice the average of natural numbers upto 100.
Address the formula, input parameters & values.
Formula: Average = Total Sum of Numbers / Total Count of Numbers
Input parameters & values:
The numbers from 1 to 100 are
1, 2, 3, 4, . . . . , 98, 99, 100
Total Count of Numbers = 100
step 2 Find the sum of numbers from 1 to 100.
sum = 1 + 2 + 3 + . . . . + 99 + 100
= 5050
step 3 Divide the sum by 100 Average = 5050/100 = 50.5
Thus, 50.5 is an average of numbers from 1 to 100.
In order to view a page break what should you do
Answer:
.
.
Explanation:
I do a order view page .
.
.
.
.
Most of the indentured servants in the American colonies were born in. A. Africa B. Asia OC. South America OD. Europe
Answer:Europe
Explanation: Just took it
in python Simple geometry can compute the height of an object from the object's shadow length and shadow angle using the formula: tan(angleElevation) = treeHeight / shadowLength. Given the shadow length and angle of elevation, compute the tree height.
Sample output with inputs: 0.4 17.5
Tree height: 7.398881327917831
Answer:
import math
angle = float(input('Enter Angle: '))
shadowLength = float5(input('Enter Shadow Length: '))
tree_height = math.tan(angle)*shadowLength
print('Tree Height = {}'.format(tree_height))
Explanation:
From the equation given, the first step is to derive the equation for calculating the Tree Height.
In order to calculate the tangent of an angle, the math module has to be imported. math module allows the program to perform advanced math operations.
The program then prompts the user to input values for angle and shadow length.
The inputted values are converted to floats and used in the equation that was derived for Tree height.
Three height is evaluated and the result is printed to the screen
Write a function longer_string() with two string input parameters that returns the string that has more characters in it. If the strings are the same size, return the string that occurs later according to the dictionary order. Use the function in a program that takes two string inputs, and outputs the string that is longer.
Answer:
Here you go :)
Explanation:
Change this to your liking:
def longer_string(s1, s2):
if len(s1) > len(s2):
return s1
elif len(s1) < len(s2):
return s2
else:
return s2
x = input("Enter string 1: ")
y = input("Enter string 2: ")
print(longer_string(x, y))
Which function calls would provide the most helpful test of this function? Remember: With tests, you are attempting to figure out all the possible ways the function could be broken.
function findMin(num1, num2){
if(num1 < num2){
return num1;
} else {
return num2;
}
}
A. findMin(-1, 0)
findMin(2,4)
findMin(5,10)
B. findMin(5,3)
findMin(7,2)
findMin(5,1)
C. findMin(1,1)
findMin(-2,2)
findMin(0,3)
D. findMin(-1,1)
findMin(1,-1)
findMin(1,1)
Answer:
D
Explanation:
Based on the information given, the correct option will be:
D. findMin(-1,1)findMin(1,-1)
findMin(1,1)
It should be noted that based on the information given, the correct option is D because it contains a duplicate set of numbers.
In this case, "1,1", would be vital in breaking the algorithm and require a bug fix from the developer. This then makes it the most helpful.
In conclusion, the correct option is D.
Learn more coding on:
https://brainly.com/question/22654163
Fill in the blank
A is a reserved word and can only be used for its intended purpose within a python program
Answer:
KeywordsExplanation:
In computer language, a word that cannot be used as an identifier is called reserved word e.g function, name of a variable or label, all these are reserved from use, while in python keywords are called reserved words, they have specific purpose and meaning. They cannot be used for anything else apart from their specific purposes. Python keywords are always available hence there is no need to import them into code.
Answer: keyword
Explanation:
Simply put, a Python keyword cannot be used outside of its intended purpose. It's reserved for it's intended purpose within a Python program. The person above wasn't necessarily wrong, they just made the term plural. Be sure to enter "keyword", as written.
I hope this helped!
Good luck <3
Drag each label to the correct location on the table.
Match the correct features to virtualization and cloud computing.
allows multiple operating systems
to run on a single machine
consolidates hardware devices into
a physical server
allows users to access data from anywhere
includes services such as platform
as a service and desktop as a service
uses a hypervisor that can be type 1 or type 2
allows users to run software applications
on web browsers without installing
the application locally
Match the correct features to virtualization and cloud computing is allows multiple operating systems to consolidates hardware and uses a hypervisor to allows users to access
Divide the statement in virtualization and cloud computing ?
sing virtualization, different operating systems can operate on a single machine using a type 1 or type 2 hypervisor.
Users can access data from anywhere using cloud computing, which combines hardware devices into a physical server and offers services like platform as a service and desktop as a service. Users can execute software applications on web browsers without having to install them locally.
Know more about virtualization Visit:
brainly.com/question/31037702
#SPJ1
In what year was napier bone invented
The Napier's Bones is a manually-operated calculating device, invented by the Scottish mathematician John Napier in the early 17th century, around the year 1617.
What is Napier bone used for?Napier's Bones, also known as Napier's rods, are used for multiplication, division, and square root calculations. The device consists of a set of rectangular rods or bones with each bone representing a single digit in the multiplication table.
By manipulating the rods, users can quickly perform calculations that would otherwise be time-consuming to complete by hand. The Napier bone is an early example of a calculating device and is considered a predecessor to modern mechanical calculators.
Learn more about Napier bone at:
https://brainly.com/question/24242764
#SPJ1
which type of cisco access lists can restrict ip traffic entering or leaving a router's interface based only on the source ip address?
The type of cisco access lists that can restrict ip traffic entering or leaving a router's interface based only on the source ip address is Standard IP.
What is an IP address standard?The IP addresses used by most residential networks begin with 192.168. Typically, the router's IP address will be something like 192.168.1.1 or 192.168.2.1.
Therefore, one can say that the degree of protection offered by an enclosure for electrical equipment with a rated voltage not exceeding 72.5 kV is categorized by the IP rating or IP code. This standard establishes different levels of sealing performance against "ingress," or entry of foreign objects like tools, dirt, and liquid water.
Learn more about cisco access from
https://brainly.com/question/29489223
#SPJ1
in a group ofpeople,20 like milk,30 like tea,22 like coffee,12 Like coffee only,2 like tea and coffee only and 8 lije milk and tea only
how many like at least one drink?
In the given group of people, a total of 58 individuals like at least one drink.
To determine the number of people who like at least one drink, we need to consider the different combinations mentioned in the given information.
First, we add the number of people who like each drink separately: 20 people like milk, 30 people like tea, and 22 people like coffee. Adding these values together, we get 20 + 30 + 22 = 72.
Next, we need to subtract the overlapping groups. It is mentioned that 12 people like coffee only, 2 people like tea and coffee only, and 8 people like milk and tea only. To find the overlap, we add these three values: 12 + 2 + 8 = 22.
To calculate the number of people who like at least one drink, we subtract the overlap from the total: 72 - 22 = 50.
Therefore, in the given group, 58 individuals like at least one drink. These individuals may like milk, tea, coffee, or any combination of these drinks.
For more questions on group
https://brainly.com/question/32857201
#SPJ8
The Security Configuration Wizard saves any changes that are made as a __________ security policy which can be used as a baseline and applied to other servers in the network. a. user- or server-specific b. port- or program-specific c. role- or function-specific d. file or folder-specific
Answer:
c. role- or function-specific.
Explanation:
The Security Configuration Wizard was firstly used by Microsoft in its development of the Windows Server 2003 Service Pack 1. It provides guidance to network security administrators, secure domain controllers, firewall rules and reduce the attack surface on production servers.
Security Configuration Wizard saves any changes that are made as a role- or function-specific security policy which can be used as a baseline and applied to other servers in the network.
After checking the Group policy by an administrator, any changes made as a role- or function-specific security policy by the Security Configuration Wizard (SCW) is used as a baseline and can be applied either immediately or sometimes in the future to other servers in the network after testing it in a well secured environment.
Basically, the Microsoft Security Configuration Wizard (SCW) typically help administrators in running the following;
1. Role-Based Service Configuration.
2. Registry settings.
3. Network and Firewall Security settings.
4. Auditing Policy settings.
____ routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist. a. RIPv1 b. Classless c. Classful d. Class-oriented
Classful routing protocols cannot adapt to work in an environment where discontiguous networks or VLSM exist.
What is classful routing protocols?
Older networks are the only ones that use the outdated classful routing protocols RIPv1 and IGRP.
Both RIPv2 and EIGRP are classless routing protocols that have developed from these earlier ones. Link-state routing protocols are inherently non-classical.
What defines classy and unclassy behavior?
IP addresses are divided into five groups using the classful addressing approach when they are assigned. In order to prevent the depletion of IP addresses, classless addressing is a method of IP address allocation that will eventually replace classful addressing.
Problems involving routing between classfull and classless systems are resolved using static routes. You can't, sorry. In accordance with the wider routing context, static routes might be either.
Learn more about Classful routing protocols
brainly.com/question/28446917
#SPJ4
Test if a date is a fee day for a subscription based on the day of the month (the subscription has fees on the 16th and the 29th every month).
Sample Run 1
Enter today's day numerically: 17
Sorry, not a fee day.
Sample Run 2
Enter today's day numerically: 29
It's a fee day!
The program to test the date will be:
def test_fee_day(day):
if(day!=16 and day !=29):
#if else loop to check if its a fee day or not
print("Sorry, not a fee day.")
else:
print("It's a fee day!")
#main driver method
if __name__=='__main__':
while(True):
#get user input
day=int(input("Enter today's day numerically: "))
if(day>0 and day<=31):
#call the function
test_fee_day(day)
break
else:
print("Invalid Input!")
What is a computer program?A computer program is a set of instructions written in a programming language that a computer can execute. A program is a set of instructions that a computer follows in order to complete a specific task.
In this case, the program is to test if a date is a fee day for a subscription based on the day of the month.
Learn more about program on:
https://brainly.com/question/26642771
#SPJ1
write a program that first defines three string objects called firstName, middleName, and lastName which contains your own first, middle and last name separately. If you do not have middle name, then make up one. Then try to generate a new user name for you by using your first letter of your first name(captilized), first letter of you middle name (Captilized), plus all letters in your last name, add a random number between (1 to 100) to the your new user name. Here is an exampl: Name: John blake adams then the user name generated by your program coulde be: JBadams23
Answer:
Written in Python
import random
firstName = "Charles"
lastName = "Dawson"
middleName = "Rutherford"
pwd = firstName[0] + lastName[0]+middleName+str(random.randint(1,101))
print(pwd)
Explanation:
This line imports random library into the program
import random
The next three lines initializes the name of the user
firstName = "Charles"
lastName = "Dawson"
middleName = "Rutherford"
This line generates the password
pwd = firstName[0] + lastName[0]+middleName+str(random.randint(1,101))
This line prints the generated password
print(pwd)
Duolingo is a widely used foreign language app, with 300 million users in 2018. While there is a free version of the app, a premium Duolingo subscription eliminates advertisements during language practice and offers new quizzes with the ability to save lessons for offline use. a. Identify each hurdle for users of the free version of the app.
The hurdle for users of the free version of the app is the subscription fee paid for the premium version of the app.
A lot of people do not pay and cannot afford the premium fee. Some people are not very sure at the initial stage of using the app.
People sometimes want use app for free for some time.
A Subscription is simply known to be paid so as to access content from an app or service for a set out period of time. For example, subscription to Netflix on a monthly basis.
Learn more from
https://brainly.com/question/15301858
Change the screen resolution so you can view more information on your screen. Use the resolution that enables you to fit the most information on the screen while still being able to read the display.
Use the space below to indicate your screen resolution and to describe the steps you used to do this.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
My laptop's current screen resolution is (1366 by 768 recommended). When you change your screen resolution, your pc automatically suggests the recommended screen resolution that helps you to view more information on your screen and enable you to fit the most information on the screen while still being able to read the display.
To change the screen resolution, you need to go through from the following steps:
Right-click on empty space of desktop.As you right-click, a list of options will open, select "display setting" among themA new setting window will get open, at the left of the window, among given option, click on the first option i.e "display"The content of the display setting gets open in the right area of the window. scroll down and find the "Scale and Layout"under scale and layout, you can change your screen resolution while selecting the different screen resolution. However, it is good to select the recommended screen resolution based on your screen size.Database systems are exposed to many attacks, including dictionary attack, show with implantation how dictionary attack is launched?(Java or Python) ?
A type of brute-force attack in which an intruder uses a "dictionary list" of common words and phrases used by businesses and individuals to attempt to crack password-protected databases.
What is a dictionary attack?
A Dictionary Attack is an attack vector used by an attacker to break into a password-protected system by using every word in a dictionary as a password for that system. This type of attack vector is a Brute Force Attack.
The dictionary can contain words from an English dictionary as well as a leaked list of commonly used passwords, which, when combined with common character replacement with numbers, can be very effective and fast at times.
To know more about the dictionary attack, visit: https://brainly.com/question/14313052
#SPJ1
How many NOTS points are added to your record for not completely stopping at a stop sign?
Describe the importance of the human interaction in the computing system your class created
Answer:
The goal of HCI is to improve the interaction between users and computers by making computers more user-friendly and receptive to the user's needs
Explanation:
Human-computer interaction (HCI) is a multidisciplinary subject that focuses on computer design and user experience. It brings together expertise from computer science, cognitive psychology, behavioural science, and design to understand and facilitate better interactions between users and machines.
Human interaction is crucial in the computing system created by your class because it determines the system's usability and effectiveness in meeting user needs and goals.
What is a computing system?
A computing system refers to a collection of hardware and software components that work together to process and manage data.
What is a class?
In programming, a class is a blueprint for creating objects that define a set of properties and methods.
To know more about hardware and software, visit:
https://brainly.com/question/15232088
#SPJ1
Order the steps to successfully create a data table.
Answer: Write the formula used to create table values
Select the range
Select the Data tab and What-If Analysis
Select Data Table
Select the values for row/column input.
Here are the steps to successfully create a data table:
Select the range.Select the Data tab and What-If Analysis.Select Data Table.Write the formula used to create table values.Select the values for row/column input.How to create the data tableFor achieving the desired outcome of generating a data table, it is suggested to adhere to the following measures:
Choose the cells group in which you intend to generate the data table. Include both the cells for input and presentation of results in the specified range.
Provide the equation that you intend to apply for computing the figures enlisted in the data chart. This equation must refer to the designated cells and yield the intended outcome.
Access the What-If Analysis feature by navigating to the Data tab within your spreadsheet program. To access the menu, simply click on it.
Choose the Data Table option from the What-If Analysis menu. This action will trigger the appearance of a dialog box or prompt that will require you to input the required details.
Determine the desired input values for either the row or the column in the data table dialogue box. The table's outcomes will be computed based on these values.
By adhering to these guidelines, you can produce a chart of data that exhibits computed figures derived from various input situations, aiding you in scrutinizing and comprehending the ramifications of different factors on your data.
Read more about data tables here:
https://brainly.com/question/32534586
#SPJ1
TRUE/FALSE. according to stuart hall's encoding/decoding model, the ''real meaning'' of any popular culture text is simply located in either the senders or the receivers. group starts
According to Stuart hall's encoding/decoding model, the ''real meaning'' of any popular culture text is simply located in either the senders or the receivers is true.
What is the encoding and decoding hypothesis of Stuart Hall?According to Stuart Hall, producers encode (create/insert) a range of signals into media texts, which consumers subsequently decode (understand). What we see is therefore just a "re-presentation" of what the makers want us to see.
So, each stage is "quite autonomous" from the others in his eyes. This indicates that while a message's coding does affect how it is received, this control is not obvious because each stage has unique constraints and opportunities.
Therefore, Hall argued that audience members can actively participate in message decoding because they draw on their own social contexts and have the power to alter messages through group action. Thus, encoding and decoding refer to the translation required to make a message understandable.
Learn more about Stuart hall's encoding from
https://brainly.com/question/28115577
#SPJ1
In "PUBATTLEGROUNDS” what is the name of the Military Base island?
Answer:
Erangel
Explanation:
Answer:
Erangel
Explanation:
The Military Base is located on the main map known as Erangel. Erangel is the original map in the game and features various landmarks and areas, including the Military Base.
The Military Base is a high-risk area with a significant amount of loot, making it an attractive drop location for players looking for strong weapons and equipment. It is situated on the southern coast of Erangel and is known for its large buildings, warehouses, and military-themed structures.
The Military Base is a popular destination for intense early-game fights due to its high loot density and potential for player encounters.
Hope this helps!
Draw a data flow diagram that indicates the condition and factors that must be satisfied before a customer request for goods can be granted from a factory
And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase
There were 5 staff members in the office before the increase.
To find the number of staff members in the office before the increase, we can work backward from the given information.
Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.
Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.
Moving on to the information about the year prior, it states that there was a 500% increase in staff.
To calculate this, we need to find the original number of employees and then determine what 500% of that number is.
Let's assume the original number of employees before the increase was x.
If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:
5 * x = 24
Dividing both sides of the equation by 5, we find:
x = 24 / 5 = 4.8
However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.
Thus, before the increase, there were 5 employees in the office.
For more questions on staff members
https://brainly.com/question/30298095
#SPJ8
PLEASE HELP WILL MARK BRAINLEST!!
What are some inadvertent effects of technology?
Answer:
Industrialization increased our standard of living, but has led to much pollution and arguably, even some social ills. The benefits brought by the internet are too many to mention, yet viral misinformation, vast erosion of privacy, and the diminishing patience of society as a whole were all unintended consequences.
Answer:
It has also increased idle time of workers
It is also true that we are now spending more time visiting social networking sites, rather than our friends and family
Explanation:
Ethics in Al can contribute toward social progress and boost positive changes in society. Which aspect should be removed to achieve this change society ?
A. safety
B. management
C. bias
D. law
Answer: Hayaa~!
The answer is: . c. bias
Is known when someone purposefully biased an answer towards what they belive or think, this can be avoided by not asking them about topics that we firmly believe they are biased.
Explanation: I took the test
Hope this Helps
-Aaden<3