Answer:
in python:
n = int ( input ( "Pick a number" ) )
total = 0
for num in range ( 0, n+1, 2 ) :
total = total + num
print ( total )
Explanation
this algorithm will calculate the sum of all even number from 0 till the number that was inputed by the user. *the reason why there is an n+1 is because in python, the number entered will not be counted. for example if there is an input of 25, this will calculate the sum of even integers from 0 to 24. so we add 1 which will get 26. so if there is an input of 25, the code will solve it from 0 to 25.
What single awk command can be used to display all the login names and their associated numerical user IDs
Answer:
Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>
Explanation:
Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).
The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.
Evaluate when to use Object-oriented design
methodology
The time to use Object-oriented design methodology is when a person wants to fill the space between problem and solution.
Check more about Object-oriented design methodology below:
What is object oriented design used for?The term Object-oriented design (OOD) is known to be a kind of an act or method that involves the use of an object-oriented methodology to design a computing system or any form of application.
Note that this technique is known to be one that entails the act of the implementation of a software solution which is said to be as a result of an idea or the concepts of objects, since OOD serves as an aspect of the object-oriented programming (OOP) act or lifecycle.
Therefore, based on the above, one can say that The time to use Object-oriented design methodology is when a person wants to fill the space between problem and solution.
Learn more about Object-oriented design from
https://brainly.com/question/13383471
#SPJ1
1. Using the open function in python, read the file info.txt. You should use try/except for error handling. If the file is not found, show a message that says "File not found"
2. Read the data from the file using readlines method. Make sure to close the file after reading it
3. Take the data and place it into a list. The data in the list will look like the list below
['ankylosaurus\n', 'carnotaurus\n', 'spinosaurus\n', 'mosasaurus\n', ]
5. Create a function called modify_animal_names(list) and uppercase the first letter of each word.
6. Create a function called find_replace_name(list, name) that finds the word "Mosasaurus" and replace it with your name. DO NOT use the replace function. Do this manually by looping (for loop).
The words in the info.text:
ankylosaurus
carnotaurus
spinosaurus
mosasaurus
try:
f = open('info.txt', 'r')
except:
print('File not found')
dino_list = []
for line in f.readlines():
dino_list.append(line)
f.close()
def modify_animal_names(list):
for i in range(len(list)):
list[i] = list[i].capitalize().replace('\n', '')
modify_animal_names(dino_list)
def find_replace_name(list, name):
for i in range(len(list)):
if list[i] == name:
list[i] = 'NAME'
find_replace_name(dino_list, 'Ankylosaurus')
This will print out:
['Ankylosaurus', 'Carnotaurus', 'Spinosaurus', 'NAME']
(If you have any more questions, feel free to message me back)
to control specific offers for goods or services and thus the resulting contracts, important terms to provide online include
Important conditions to present online include a clause referring to the management of any dispute to regulate certain offers for products or services and therefore the following contracts.
What is it known as online?When a device is on and linked to other things, such as a computer, a network, or a device like a printer, it is said to be online. Online now refers to being hosted in more recent times.
What do you mean by an online course?An online course is one that is delivered over the Internet. Courses are often performed using a lms, where students may access their course curriculum, track their academic progress, and interact with their peers and instructors.
To know more about Online visit:
https://brainly.com/question/1395133
#SPJ1
The complete question is-
To control specific offers for goods or services and thus the resulting contracts, important terms to provide online include
a). a detailed history of the particular business.
b). an updated list of the goods or services.
c). a provision relating to the resolution of any dispute.
d). positive reviews from customers or clients.
What is output? Select all that apply.
C = 0
while (c 10):
C = c + 5
print (c)
Answer:
The answer is:
5
10
Explanation:
In the while loop, we specify, if C is not equal to 10, C += 5 and print(c). When python reads the loop, python will check to see if C is equal to 10 and if not it will add 5 until C is more than or equal to 10. In addition, python will print(c) to the console until it hits 10. Once C is less than or equal to 10 the loop will stop. In this scenario, since we print c in the loop, the codes output will be the following:
5
10
hope this helps :D
Explain these five exffects of moisture on smart and modern materials. The materials: 2. Photochromic pigment 1.Thermochromic pigment 3. Shape memory polymer 4. Shape memory Alloy 5.Hydrogels
Smart materials are referred to as "reactive materials." Exposure to stimuli like as electric and magnetic fields, stress, moisture, and temperature can alter their characteristics.
Explain these five effects of moisture on smart and modern materials?Photochromic pigment—When exposed to light, photochromic pigments change color. Thermochromic pigment-When the temperature of thermochromic pigments shifts, the color changes. Shape memory polymer- Shape-memory Polymers are clever synthetic polymers that may return to their original shape after being deformed.Shape memory Alloy - Shape-memory alloys are metals that, even when distorted below a certain temperature, retain their shape.Hydrogels- A hydrogel is a three-dimensional system of hydrophilic polymers that can swell and absorb a lot of water.Thus, Smart materials are referred to as "reactive materials
For more information about Smart materials, click here:
https://brainly.com/question/2987553
#SPJ1
Which of the following best describes the ribbon?
In computer science, a ribbon refers to a graphical user interface (GUI) element used in software applications to provide access to various functions and features.
What is the Ribbon?The ribbon is typically a horizontal strip located at the top of the application window and contains tabs and groups of commands organized by functionality.
Users can click on a tab to display a group of related commands, and then select the desired command to perform a specific task. The ribbon was introduced in Microsoft Office 2007 and has since been adopted by many other software applications as a modern and user-friendly interface for organizing and accessing program features.
Read more about graphics here:
https://brainly.com/question/18068928
#SPJ1
Which of the following internet protocols is used to request and send pages and files on the World Wide Web
it is . org Explanation:
Which of these inventions where the most iconic and important of the 1970s? Why?
The First Floppy Disk (1971).
The First Digital Camera (1975).
Altair 8000 (1974).
Pong (1972).
Rubik’s Cube (1974).
Answer:
Explanation:
Discussion
I don't think I would choose Rubik's Cube, although I think many people would. It does have a depth of something that moves in all three dimensions, but lot's of things do that. It was more of a craze than something of every lasting value.
Pong is a game. Game software has advanced so dramatically that I don't think you know anyone who has played Pong. You could argue it was a beginning -- but there are others that shared that distinction like Pacman.
Do you know anyone who ever owned an Altair 8000? I don't. by then the Apple 2 was well on its way. And so was Apple which is a huge corporation.
Computer storage has always been forefront in Computer Engineer's minds. I think the First Floppy Disk is likely your answer, although if you choose the digital camera, I don't think you be wrong.
Answer: First Floppy Disk
NG STOCK MARKET FRAUD
Assignment Directions
1. For this assignment, you will explore securities or stock market fraud. Title your assignment "Stock Fraud" and ther
list the case you analyzed.
2. Visit the SEC Web site. Select and read through one of the actions against Enron.
Submission Requirements
1. Write a summary of the facts of the case, your understanding of all security law violations, and any settlement or
payment made to the stock-holders or others. Explore her online sources to get additional information.
2. The paper must be between one and two pages in length, double spaced, and with one-inch margins. Be sure to
include a reference page.
e.owschools.com/owsoo/studentAssignment/index?eh-390541091 #section Tab you like to do next?
Stock market fraud refers to the fraudulent practice of manipulating stock prices and the market. The Nigerian Stock Market Fraud, also known as the N14 billion stock fraud, is one of the most notorious cases of stock market fraud that happened in Nigeria.
It occurred between 2001 and 2002 and involved some of Nigeria’s most influential figures, including stockbrokers, top executives of blue-chip companies, and bankers.The Nigerian Stock Market Fraud is one of the largest stock market scandals in the world. It was the result of a lack of regulation and oversight in the Nigerian stock market, which allowed fraudulent practices to thrive.
The Securities and Exchange Commission (SEC) is the regulatory body responsible for regulating the Nigerian Stock Exchange. However, the SEC was ineffective in preventing the fraud from occurring, and many of its officials were implicated in the scandal.The N14 billion stock fraud involved the manipulation of stock prices, insider trading, and market rigging.
The fraudsters would inflate the price of stocks artificially, then sell the stocks to unsuspecting investors at inflated prices. They would then use the proceeds from the sale of the stocks to buy more stocks, further inflating the prices.
The fraudsters also engaged in insider trading, where they would use insider information to make trades in the stock market. This gave them an unfair advantage over other investors and allowed them to make huge profits from their trades.
In conclusion, the Nigerian Stock Market Fraud was a result of a lack of regulation and oversight in the Nigerian stock market. The SEC was ineffective in preventing the fraud from occurring, and many of its officials were implicated in the scandal. The fraudsters engaged in the manipulation of stock prices, insider trading, and market rigging.
For more such questions on Stock market, click on:
https://brainly.com/question/690070
#SPJ8
Which model emphasizes the risk analysis phase of development?
The
model emphasizes the risk analysis phase of development.
Answer: Spiral
Explanation:
:)
Which statement is valid with respect to configuring the Oracle Cloud Infrastructure (OCI) API Gateway?
A single gateway can only be deployed in a private OCI VCN subnet.
A single gateway can be deployed in both a public and private OCI Virtual Cloud Network (VCN) subnet.
A single gateway can be deployed in either a public or private OCI VCN subnet.
A single gateway can only be deployed in a public OCI VCN subnet.
The statement that is valid with respect to configuring the Oracle Cloud Infrastructure (OCI) API Gateway is: "A single gateway can be deployed in either a public or private OCI VCN subnet."
What is OCI Gateway?OCI API Gateway can be deployed in either public or private subnets within a Virtual Cloud Network (VCN). Deploying the gateway in a public subnet allows the gateway to be accessible from the internet, while deploying it in a private subnet restricts access to the gateway only from resources within the same VCN or through a VPN connection. The choice of subnet type depends on the specific use case and security requirements.
Internet, NAT, service, and dynamic routing gateways are examples of gateways in OCI. Data can move from one network to another with the help of a gateway, a network component. It serves as a gate between two networks, as suggested by its name, as all data entering or leaving a network must pass through it.
To know more about OCI VCN visit:-
brainly.com/question/30541561
#SPJ1
3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification
Here's the correct match for the purpose and content of the documents:
The Correct Matching of the documentsProject proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.
Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.
Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.
Read more about Project proposal here:
https://brainly.com/question/29307495
#SPJ1
What is OTT and how is it different from other digital media
Answer:
OTT (over-the-top) is a means of providing television and film content over the internet at the request and to suit the requirements of the individual consumer. The term itself stands for “over-the-top”, which implies that a content provider is going over the top of existing internet services
Explanation:
Question 3 3.1 Describe the TWO main elements of a CPU 3.2 Describe the fetch/execute cycle 3.3 Convert the binary number 00000011 to a decimal
Answer:
Here are the answers to the questions:
3.1 The two main elements of a CPU are:
The Control Unit (CU): The CU controls and coordinates the operations of the CPU. It is responsible for interpreting instructions and sequencing them for execution.
The Arithmetic Logic Unit (ALU): The ALU executes arithmetic and logical operations like addition, subtraction, AND, OR, etc. It contains registers that hold operands and results.
3.2 The fetch/execute cycle refers to the cycle of events where the CPU fetches instructions from memory, decodes them, and then executes them. The steps in the cycle are:
Fetch: The next instruction is fetched from memory.
Decode: The instruction is decoded to determine what it is asking the CPU to do.
Execute: The CPU executes the instruction. This could involve accessing data, performing calculations, storing results, etc.
Go back to Fetch: The cycle continues as the next instruction is fetched.
3.3 The binary number 00000011 is equal to the decimal number 3.
Binary: 00000011
Decimal: 1 + 2 = 3
So the conversion of the binary number 00000011 to decimal is 3.
Explanation:
According to Nagrin, what are the four roles that video can play?
Answer:
4 Types of Play
Functional Play. Functional play is playing simply to enjoy the experience.
Constructive Play. As the name suggests, this play involves constructing something (building, drawing, crafting, etc.).
Exploratory Play. During exploratory play, a child examines something closely in order to learn more about it.
Dramatic Play.
A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain?
Security and risk management
Security architecture and engineering
Communication and network security
Asset security
The responsibilities of a security professional described above belong to the security domain of option D: "Asset security."
What is the servers?Asset safety focuses on identifying, classifying, and defending an organization's valuable assets, containing sensitive personally capable of being traced information (SPII) stored on guest servers.
This domain encompasses the secure management, storage, memory, and disposal of sensitive dossier, ensuring that appropriate controls are in place to safeguard the secrecy, integrity, and availability of property.
Learn more about servers from
https://brainly.com/question/29490350
#SPJ1
How university has utilised Information Technology in society for efficient business process?
Employees can easily understand and identify their goals, targets, or even if the exertion used was undertaking or not with the help of strong information technology.
What is information technology?The use of technology to communicate, transfer data, and process information is referred to as information technology.
Among the various trends in information technology are, but are not limited to, analytics, automation, and artificial intelligence.
The use of computers, storage, networking, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data is referred to as information technology (IT).
With the assistance of powerful information technology, employees can easily understand and identify their goals, targets, or even whether the exertion used was undertaken or not.
Thus, universities utilized Information Technology in society for efficient business process.
For more details regarding information technology, visit:
https://brainly.com/question/14426682
#SPJ1
In 2019, selected automobiles had an average cost of $16,000. The average cost of those same automobiles is now $20,000.
What was the rate of increase for these automobiles between the two time periods?
The rate of increase for these automobiles between the two time periods is 25%.
What is average?It is defined as the single number that represents the mean value for the given set of data or the closed value for each entry given in the set of data.
It is given that:
In 2019, selected automobiles had an average cost of $16,000. The average cost of those same automobiles is now $20,000.
Average cost of automobiles in 2019 = $16,000
Average cost of automobiles now = $20,000
Change in average cost = $20,000 - $16,000
Change in average cost = $4000
Rate of increase in cost is the ratio between the increase and the
average cost before the increase:
Rate of increase = ($4000/$16,000)×100%
Rate of increase = 25%
Thus, the rate of increase for these automobiles between the two time periods is 25%.
Learn more about the average here:
brainly.com/question/24057012
#SPJ2
what is the difference between hydra and hadoop?
Hadoop is batch oriented whereas Hydra supports both real-time as well as batch orientation.
The Hadoop library is a framework that allows the distribution of the processing of large data maps across clusters of computers using simple as well as complex programming models. batch-oriented analytics tool to an ecosystem full of multiple sellers in its own orientation, applications, tools, devices, and services has coincided with the rise of the big data market.
What is Hydra?
It’s a distributing multi - task-processing management system that supports batch operations as well as streaming in one go. It uses the help of a tree-based data structure and log algorithms to store data as well as process them across clusters with thousands of individual nodes and vertexes.
Hydra features a Linux-based file system In addition to a job/client management component that automatically allocates new jobs to the cluster and re-schedules the jobs.Know more about Big Data: https://brainly.com/question/28333051
What is the output
print( ‘You are’, age, ‘years old. ‘)
The output print(‘You are’, age, ‘years old.’) function is a useful tool for programmers looking to display a person's age as part of a string of text. It is a straightforward function that can be easily incorporated into a variety of Python programs.
The outputprint(‘You are’, age, ‘years old.’) is a Python function that outputs a string of text that includes the variable ‘age’. The function prints the phrase ‘You are’, followed by the value of the variable ‘age’, and ends with the phrase ‘years old.’ For example, if the variable ‘age’ is assigned the value of 25, then the output of the function would be ‘You are 25 years old.’
This function is commonly used in programs that involve age calculations or when displaying a person's age. It is a simple way to incorporate the value of a variable into a text string and output it to the console or screen.
For more such questions on Python function, click on:
https://brainly.com/question/25755578
#SPJ11
Invoking time.time() returns the elapsed time in seconds since midnight of January 1, 1970. Write a function that returns the current time as a string. Call the function and displays the current time.
Functions are collections of program statements that are executed when evoked
How to write the functionThe program in Python, where comments are used to explain each line
#This imports the time module
from time import time, ctime
#This generates the time
t = time()
#This prints the current time
print(ctime(t))
Read more about Python functions at:
https://brainly.com/question/14284563
This is to be done in java
Task 1: Write a car class - this is a prototype or blueprint for many different cars that will follow the same basic type of pattern. Your car class should have 4 fields that describe characteristics of a car including model, make, year, color, speed, velocity.
Possible values for each field:
Model: Wrangler, Grand Cherokee, Camry, Corolla, Corvette, Bolt
Make: Jeep, Toyota, Chevrolet
Year: 1946, 2022
Color: red, blue, silver
Speed: 25, 25, 55, 75,100
Task 2: Your car class should also have several methods - assuming it has a rider to do them, the car can have certain behaviors or actions that it can take. Add the methods to accomplish the following:
Set a speed (could take an integer in mph)
Calculate a speed (could take a distance in miles and a time in hours)
Get a speed (in mph)
Task 3: Create a constructor that takes four parameters for your car class and initializes speed to 0.
Write a main method and inside it, invoke a new car object for every person at your table. Print a complete ‘description’ of each car to the console using the System.out.println and toString methods. Each car should be unique, so be creative with the color choice.
Task 4: Agree on the value of and create a speedLimit field for your car class and create two public methods to get and change the value of the speed limit.
Task 5: Draw the UML representation of the class that you have created.
IndividualTask 6: Create a class method that is named isSpeeding that takes as arguments a distance in miles, a time in hours and a Car to determine whether the car is speeding. Ask your colleges how fast they want to go to the beach and determine whether they would be speeding. Assume the beach is 330 miles away.
IndividualTask 7: Draw the UML Diagram for your class.
Please respond ASAP
Using the knowledge in computational language in python it is possible to write a code that write a car class - this is a prototype or blueprint for many different cars that will follow the same basic type of pattern.
Writting the code:public class Car {
private String model, make, color;
private int year, speed, speedLimit;
public void setSpeed(int speed) { this.speed = speed; }
public int calculateSpeed(int miles, int hours) {
return (int)(Double.valueOf(miles) / hours);
}
public int getSpeed() { return speed; }
public Car(String model, String make, String color, int year) {
this.model = model;
this.make = make;
this.color = color;
this.year = year;
this.speed = 0;
this.speedLimit = 35;
}
// method that returns a string representation of the object
public String toString() {
return "Model: " + model + ", Make: " + make + ", Color: " + color +
", Year: " + year + ", Speed: " + speed + " mph";
}
// method to get the value of speed limit
public int getSpeedLimit() { return speedLimit; }
// method to change the value of speed limit
public void setSpeedLimit(int limit) { speedLimit = limit; }
public boolean isSpeeding(int miles, int hours) {
int carSpeed = calculateSpeed(miles, hours);
if(carSpeed > speedLimit)
return true;
else
return false;
}
}
See more about JAVA at brainly.com/question/18502436
#SPJ1
What is your idea for creating a new and fresh Gaming experience around viewing occasions for Mike's?
My idea on creating a new and fresh Gaming experience around viewing occasions is that one should incorporate emotions into games that people around around viewing occasions can feel.
What is a gaming experience?Gaming is known to be that experience or one can say the origin of identity and also the community that is made for gamers.
Note that the experience is one that goes far more than the game itself, and as such, My idea on creating a new and fresh Gaming experience around viewing occasions is that one should incorporate emotions into games that people around around viewing occasions can feel.
Learn more about Gaming experience from
https://brainly.com/question/27355039
#SPJ1
a typically consumes more electrical power than the other listed computer types due to the emphasis on speed.
A server typically consumes more electrical power than the other listed computer types due to the emphasis on speed.
What is electrical power?Electric circuits transfer electrical energy at a certain rate, which is known as electric power. A watt is equal to one joule per second and is the SI unit of power. Similar to other SI units, watts have standard prefixes: kilowatts, megawatts, and gigawatts, respectively, denote thousands, millions, and billions of watts.
Contrary to a widespread misconception, electrical energy is actually purchased and sold. Due to the fact that energy is simply power multiplied by time, it is, for instance, sold to consumers in kilowatt-hours (kilowatts multiplied by hours).
Typically, electric generators are used to generate electricity, but other energy sources, like electric batteries, are also capable of doing so.
Learn more about electrical circuits
https://brainly.com/question/29032441
#SPJ4
What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another country a field in a table that uniquely identifies a record in a relational database a field in a table that links it to other tables in a relational database
Answer: a field in a table that links it to other tables in a relational database
A - a security key to a database that stores foreign data
To convert microseconds to nanoseconds: a. Take the reciprocal of the number of microseconds. b. Multiply the number of microseconds by 0.001. c. Multiply the number of microseconds by 0.000001. d. Multiply the number of microseconds by 1,000. e. Multiply the number of microseconds by 1,000,000.
Answer: D. Multiply the number of microseconds by 1,000.
Explanation:
In order to convert microseconds to nanoseconds, it should be noted that one should multiply the number of microseconds by 1,000.
For example, if we want to convert 12 microseconds to nanoseconds. This will be:
= 12 × 1000
= 12000 nanoseconds.
Therefore, with regards to the information given above, the correct option is D.
A macro is assigned as a button or a ___________ shortcut.
Answer:
Quick access toolbar
In which document view type is it impossible to edit the document in Word 2019?
Read Mode
View Mode
Print Mode
Drift Layout
Answer:
Read Mode
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.
In Microsoft Word 2019, the users are availed with the ability to edit the word document in the following view type;
I. View Mode
II. Print Mode
III. Drift Layout
Hence, the document view type in which it is impossible to edit the document in Word 2019 is the Read Mode. Basically, the Read Mode is a view type that only allows the user to read the word document.
Pretend that your mother is a real estate agent and that she has decided to automate her daily tasks by using a laptop computer. Consider her potential hardware and software needs and create a hardware and software specification that describes them. The specification should be developed to help your mother buy her hardware and software on her own.
The specification should be developed to help your mother buy her hardware and software on her own is hardware.
Which is hardware?Hardware refers back to the computer's tangible additives or shipping structures that shop and run the written commands furnished through the software program. The software program is the intangible a part of the tool that shall we the consumer have interaction with the hardware and command it to carry out unique tasks.
A few automatic software programs could ship messages, alert and notifications to the customer in addition to the owner.The pc need to be of respectable potential and processing pace three. Video calling software program to have interaction with the clients. Softwares like Excel to keep the information and all An running gadget of right here convenience 4.320 to 500 GB difficult drive three.2.2 GHz of processor. Long battery life Software: three GB RAM.Read more about the hardware :
https://brainly.com/question/3273029
#SPJ2