The existing rules are setup to allow access based on windows group membership. I need to get a wireless jetdirect connected to the wifi network.
You defined a book data type.
class book:
title = ''
author = ''
pages = 0
Which statement creates an instance of your book?
myBook.myBook = book()
myBook = new book()
myBook = book
myBook = book()
Answer:
myBook = book()
Explanation:
Correct answer edge 2020
Answer:
myBook=book()
Explanation:
took test
Which of these could be a valid IPv4 or IPv6 address?
a
251.70.349.287
b
eeed:6654:2f34:94cf:bfa0:20c9:08e1:bfcd
c
92.169.42.163
d
67d250:4650d2:94b753:f27588:a49175:0e46be:368442:70fd8d
e
146.49.98.20.184.223
f
4b32:3b3d:6cec:8438:d20f:397c
Answer:
F
4b32:3b3d:6cec:8438:d20f:397c
An IP address is a numerical protocol address with an numerical value that is connected by a computer network for communication.
The IPv4 is a 32-bit address and the IPv6 is a 128-bit address. The IPv4 address usually represents dot-decimal notions. Each range from 0 to 255. The Ip address may be represented by hexadecimal, octal and binary decimals. Thus the valid IPv4 could be a 92.169.42.163Hence the correct option is C.
Learn more about which could be the valid IPv4 or 6.
brainly.in/question/35357295.
Examples of fifth generation
Answer:
Intelligent systems that could control the route of a missile and defense-systems that could fend off attacks; Word processors that could be controlled by means by speech recognition; Programs that could translate documents from one language to another.
Hope this helps :)
Do you think the human race will benefit from advanced AI?
Answer:
Yes and no
Explanation:
I think that we would benefit to an extent, however we could foreseeable future where they out smart us. For our everyday lives advanced AI could be a great help to us, we just have to make sure we keep it in control.
what is social media
Answer:
websites and applications that enable users to create and share content or to participate in social networking.
Explanation:
In the GO programming language you can't declare a float, it must be a float32 or float64. Why do you think this is done if the data type is not necessary? Why do you think they used float64 instead of double? Think about the lexical analyzer and how it interprets a symbol.
Answer and Explanation:
a. Go programming language specifies data types and does not allow mixing them up. Therefore instead of just declaring a float variable, one has to be specific and declare either a float32(single precision floating point number) variable or float64(double precision floating point number). Float64 numbers occupy larger spaces and could be slower in some systems but they represent more accurate numbers.
b. Float64 is more accurate and is used by most math libraries. Float64 and double are same thing, although double precision numbers are called float64 in Go, it doesn't affect the lexical analyzer in any way.
Interface elements include but are not limited to:
Question 10 options:
A)Navigational components, informational components, visual design
B)Input controls, informational components, visual design
C)Input controls, navigational components, visual design
D)Navigational components, containers, interaction design
E)Input controls, informational components, containers
Answer:
E
Explanation:
Interface elements include but are not limited to E. Input controls, informational components, containers.
User interface elements refer to the parts that are used in building websites and applications. They're important for adding interactivity to the interface of a user.
It should be noted that the interface elements include navigational components, informational components, input controls, and containers.
Therefore, the last option depicts this as the navigational component isn't added.
Read related link on:
https://brainly.com/question/19593397
what number will be output by the console.log command on line 5?
Answer:
16
Explanation:
If you follow the line of code and add 1, 2, and then 3, 10 + 1 + 2 + 3 = 16.
Please, need Brailliest. if you need any further assistance let me know.
If you use microsoft windows, the windows _____ application can automatically update the operating system as well as microsoft programs installed on your computer
Answer:
Microsoft Windows 10 ... (Windows) If you accidentally delete files from your computer's hard drive, ... Upgrade to remove ads ... (Windows) Applications (or apps) in Windows 10 that you use frequently can be ... the operating system, installed programs, settings, and user files that you can later use to recover your computer.
Explanation:
Answer:
Task Manager?
Explanation:
How can you get to the Excel Function Reference information? Check all that apply.
Help tab
Esc
F1
searching in the Tell Me bar
Ctrl+R
Answer: Help tab, F1, tell me bar
Explanation:
Answer:
Help tab, F1, tell me bar
Explanation:
I got it right
Objective: Write a program that will read and parse data from a file, then make use of lists to solve a problem.
Problem: Using python, write a program that will compute the maximum possible profit for a stock trade using historical data on a selection of companies. We would like to find the maximum possible profit that we could have gained, if we had made an ideal investment (if we ever finish that time machine). We must determine the largest increase in value from the purchase date to the sell date, using historical information. We will use the daily low price to purchase and the daily high price to sell a stock. For this assignment, we will use actual freelyavailable stock data stored in .CSV (comma separated values) format from Yahoo finance. A significant part of the exercise is learning to read and parse data from files and to format output.
1. Request the name for the input data file to be used to determine the results. You will have to run your program on all of the data sets to generate the required results. If the program does not exist, print a warning message and allow the user to try again.
2. Read in all the data from the requested file and parse the data; extracting the useful bits into one or more lists.
3. Use the data to determine the largest gain possible in a stock price by comparing Low values as the purchase price and High values as the sale price.
4. Report for each stock symbol (AAPL, AMZN, GOOG, MSFT, and TSLA) the purchase and sale days, the purchase and sale prices, profit per share, and the ratio of the change in value. Enter these results as submission comments in Blackboard.
5. Continue to request file names until the user enters a blank name (empty string), then exit the program.
6. Use good functional style and suitable variable names.
7. In the submission comment, answer the question: If you could travel back in time and invest in one of the five stocks listed, which stock would you pick?
Note: Assume that you must keep stocks for at least one day, no buying and selling on the same day. The data files contain more data than is needed, be sure to use the correct values. Be sure to move the data files into the same folder as your code so that your program can find the data files.
Example Output and Results: Please enter the data file name: BLARG.csv
Error Reading data ...
The file does not exist. Please check the name and try again.
Please enter the data file name: GOOG.csv
Reading data ...
****************************************
The maximum profit is 1045.88 per share
Buy on 2015-01-12 at a price of 486.23
Sell on 2020-02-19 at a price of 1532.11
Change in value ratio: 3.151
Answer:
import csv
def stock_prof():
csvfile = input("Enter absolute path to file name")
while csvfile:
file = open(csvfile, 'r')
data = csv.DictReader(file)
profit_list = [row['High'] - row['Low'] for row in data]
print(f"The maximum profit is: {max(profit_list)}")
for row in data:
print(f"Buy on {row['Data']} at the price of {row['Low']}")
print(f"Sell on {row['Data']} at the price of {row['High']}")
print(f"Change in value ratio: {row['High']/row['Low']}")
csvfile = input("Enter filename: ")
stock_prof()
Explanation:
Assuming the CSV file is in the same directory as the python script, the user inputs the file name and uses the CSV DictReader method to read the file as an ordered dictionary, then the maximum profit is printed as well as the date to buy and sell and the change in value ratio.
If I wanted to include a picture of a dog in my document, I could use
AutoCorrect
SmartArt
WordArt
Online Pictures
Answer:
Online Pictures
Explanation:
Answer:
Online Pictures
Explanation:
It's not Auto Correct obviously, Word art is with text, and Smart art is formatting or the way it looks
find different between manocots and dicots clarify with example
Answer:
hope it's help you..............
Select the correct answer. Which number system consists of digits 0 to 9 and letters A to F? octal binary hexadecimal decimal
Answer:
hexadecimal
represents a radix of 16
You should always be afraid to use the internet
True or false?
Answer:
false
Explanation:
you should be but in the same time no
Complete each sentence to describe features of the VLOOKUP function.
The VLOOKUP function structure begins with =VLOOKUP(
To use the VLOOKUP function, the lookup value should be in the
of the table.
Answer:
Look Up Value, Table Array, First Column
Explanation:
The VLOOKUP function structure begins with =VLOOKUP(
✔ lookup value
,
✔ table array
…)
To use the VLOOKUP function, the lookup value should be in the
✔ first column
of the table.
How is LUA different from Python?
Give an example.
This is the answer I couldn't write it here since brainly said it contained some bad word whatever.
Answer:
good old brainly think stuff is bad word even tho it is not had to use txt file since brainly think code or rblx is bad word
Instructions
Which of the connection types listed is
used to support analog telephony?
Answer:
Analog telephone connections , ISDN, Voice-over-IP (VoIP) telephone connections.
Explanation:
Analog telephone connections , Integrated Services Digital Network (ISDN) telephone connections and Voice-over-IP (VoIP) telephone connections are the three network connection types that support analog telephony. Voice packets are transmitted via three cable connections to various ports in the network.
Which of the following is a common use for spreadsheets?
A.
storing graphical data
B.
planning a monthly budget
C.
formatting text for presentability
D.
verifying data validity
Described FOUR (4) issues that possibly raised when the organization does
not emphasize the code of ethics concerning to the software engineering
issues?
Explanation:
1- Information theft: One of the problems that can arise when an organization does not develop an efficient code of ethics regarding software engineering is the use of confidential information for its own benefit or for the benefit of third parties.
2- Access to confidential information: An organization has private information that can only be accessed by the top hierarchy, such as management decisions, performance indexes, etc. Therefore, an unethical attitude would be a software engineer to access such information and have access to information. confidential.
3- Intrapersonal conflicts: It is possible that there is hacker interference in an organization to harm some team or collaborator, exposing facts and rumors for the generation of conflicts and exposure.
4- Asset theft: Accessing some system vulnerabilities, it is possible to access the organization's bank accounts by stealing financial assets without leaving a trace.
python code 100 Random Numbers (twice)
python code
instructions:
You need to write code that will print two bricks of numbers, one with integers, one with decimals.
import random
i = 1
while i <= 100:
print("#"+str(i)+": "+str(random.randint(1,100)), end=", ")
i+=1
print()
i = 1
while i <= 100:
print("#"+str(i)+": "+str(random.uniform(1,100)), end=", ")
i += 1
I hope this helps!
You are in the process of configuring an iSCSI storage area network (SAN) for your network.
You want to configure a Windows Server 2016 system to connect to an iSCSI target defined on a different server system. You also need to define iSCSI security settings, including CHAP and IPsec.
Which tool should you use?
A. iSCSI under File and Storage Services in Server Manager
B. iSCSI Initiator
C. Multipath I/O
D. Internet Storage Name Service
Answer: B. iSCSI Initiator
Explanation:
Based on the above scenario discussed, the tool that'll be used is the iSCSI Initiator. It should be noted that it typically functions as the iSCSI client.
The Internet Small Computer System Interface (iSCSI) initiator can be used to configure an iSCSI storage area network (SAN) for the network. Through the iSCSI Initiator, commands can be sent over an IP network. When one wants to connect to a particular iSCSI target, the iSCSI Initiator can be used.
Use the drop-down menus to complete statements about the Outlook filter option and Clutter folder.
The Filter dialog box can be accessed under the View tab and the ______
button.
The Clutter folder uses _______
filtering to divert low-priority messages.
Answer:
1. view settings
2. smart
Explanation:
In the Outlook filter option and Clutter folder, the Filter dialog box can be accessed under the View tab and the view settings button.
What is Microsoft Outlook?Microsoft Outlook can be defined as an e-mail and task management software application which is designed and developed by Microsoft Inc., so as to enable users send electronic messages, schedule and plan their work activities.
In the Outlook filter option and Clutter folder, the Filter dialog box can be accessed under the View tab and the view settings button. Also, the Clutter folder uses Smart filtering to divert low-priority messages.
Read more on Microsoft Outlook here: https://brainly.com/question/1538272
#SPJ2
python
You need to have some text that will repeat on 50 random images to create memes for your Twitter account. Don’t worry about having any images; just get the text to repeat for a meme that you would create. That would take you a while to do… but luckily you have for loops! Using a for loop, print “Takes one political science class. Knows how to solve the world’s problems.” for your 50 meme images, so 50 times
for i in range(50):
print("Takes one political science class. Knows how to solve the world's problems.")
I hope this helps!
A group consists of 10 kids and 2 adults. On a hike, they must form a line with an adult at the front and an adult at the back. How many ways are there to form the line?a. 4.9!b. 2.99!c. 11!d. 11!/2
Answer:
b. 2.9!
Explanation:
There are is a mistake in the question.
Suppose the group consist of 10 kids and 2 adults, the number of ways in which they can form the line is:
= 2! 10!
= 2× 1× 10!
= 2.10!
But since that is not in the given option.
Let assume that the group consists of 9 kids and 2 adults, the number of ways in which they can form the line is:
No of ways the kids can be permutated = 9 ways
No of ways the adult can be permutated = two ways.
Thus; the number of ways in which they can form the line = 2! 9!
= 2 × 1× 9!
= 2.9!
Lets assume we are writing a system to backup a list of transactions: class Transaction 1 String TransactioniD: Date TranactionTime: Account account: enum Type(ADD, EDIT, ADMIN): Type type: Transactions are constantly added to the system as quickly as possible (hundreds a minute) and occasionally, your system will need to retrieve them but only if there is a error with the main system (once or twice per million transactions). Additionally, transactions may not come in order as some transactions take longer to process. What is the best way to store the transactions in your system? a) as a list sorted by transactionID b) As an unsorted list of transactions c) as a list sorted by transaction Time d) As a list sorted by a new systemiD int since they transactions are not coming into our system in order of time. Activate Windows Go to Settings to activate Windo e) As a 2d list with the columns sorted by Account and the rows sorted by date
Answer:
The answer is "Option d"
Explanation:
In this question, the easiest way that will save the payment on your database in such a process ID-sorting list would be to mark a payment, that's been recorded mostly on the database whenever this payment became used serial number is not transaction ID, and the wrong choice can be defined as follows:
In choice a, It is wrong because it may be processed, however, payments aren't entered through our process, which does not help remove older.In choice b, the unordered list would not enable any transaction to only be retrieved, that's why it is wrong.In choice c, it will not be helpful because the includes video is either begin or complete the payment, it will not be helpful to hold it with transaction time.In choice e, this approach won't help to identify the payments since one date will have a lot of payments over a certain account.What charts the cost to the company of the unavailability of information and technology and the cost to the company of recovering from a disaster over time?A. Disaster organizational cost analysisB. Disaster recovery improvementsC. Disaster financial costD. Disaster recovery cost curve
Answer:
D. Disaster recovery cost curve
Explanation:
Disaster Recovery Cost Curve can be regarded as the chart to the cost of the
unavailability of information and technology as well as the the cost to the company of recovering from a disaster over time. It should be noted that recovery plan is very essential in any organization because it makes response to disaster as well as other emergency that can tamper with information system to be easier as well as minimization of any effect of the disaster on business operations.
Assume a system has a TLB hit ratio of 90%. It requires 15 nanoseconds to access the TLB, and 85 nanoseconds to access main memory. What is the effective memory access time in nanoseconds for this system?
Answer:
310 ns
Explanation:
Given that
TLB hit ratio = 90%
TLB hit ratio = 90/100
TLB hit ratio = 0.9
Time needed to access TLB = 15 ns
Time needed to access main Memory = 85 ns
Effective memory access time = ?.
The formula for finding the effective memory access time is given by
The effective memory access time = [TLB Hit ratio (main memory access time + required time to access TLB) + [2 * (main memory access time + required time to access TLB)] * (2 - TLB hit ratio)]
On substituting the values given in the question to the equation, we have
The effective memory access time = [0.9 (85 + 15) + [2 * (85 + 15)] * (2 - 0.90)]
The effective memory access time =
[(0.9 * 100) + (2 * 100) * 1.1]
The effective memory access time =
(90 + (200 * 1.1))
The effective memory access time =
90 + 220
The effective memory access time =
310 ns
Jacob has a text file open, and he is typing on the keyboard. What is the best description of how the
changes are being implemented?
The original file is temporarily changed; the changes become permanent when he clicks "save."
O The new version is kept in a special virtual space; the file is only changed when he clicks 'save."
O The information is stored on the clipboard.
O A copy is created with a new filename, which will overwrite the old one when he clicks "save."
Answer:
The new version is kept in a special virtual space; the file is only changed when he clicks “save.”
Explanation:
I took the test and got it correct.
PLEASE ANSWER
Select the correct answer.
What test was developed to filter humanlike artificial intelligence?
Answer:
Turing test is the answer