Answer:
Nested lists __________ is a tool for building a new list from another list by applying an expression to each item in a sequence.
Explanation:
The nested list can contain any sort object, even another list (sublist), which in turn can contain sublists themselves, and so on. Nested lists can be used to arrange data in hierarchical structures. Some nested lists are unordered lists, some are ordered lists, and others are description lists. The most important observation of a nested list is that it usually appears as an element on another list.
What is a ribbon or ribbions in Microsoft Word?
Write a program that asks the user for a string of lowercase letters and numbers. The program should evaluate the string and report the number of vowels ('a', 'e', 'i', 'o', 'u') and numbers ('0', '1', '2', '3', '4', '5', '6', '7', '8', '9') in the string.
Answer:
Follows are the code to this question:
def vowel(x):#defining a method vowel that accept a parameter
return(x=='a' or x=='e' or x=='i' or x=='o' or x=='u')#return char value
def number(x):#defining a method number that accept a parameter
return(x=='0' or x=='1' or x=='2' or x=='3' or x=='4' or x=='5' or x=='6' or x=='7' or x=='8' or x=='9')#return number value
def main():#defining main method
s=input("Enter a string: ")#defining string variable
v=0#defining integer variable
n=0#defining integer variable
for f in s:#defining for loop for count value
if vowel(f):#defining if to check vowel
v=v+1#count vowel value
elif number(f):#defining elif for count number
n=n+1#count number value
print("Total vowels: ",v)#print vowels value
print("Total numbers: ",n)#print numbers value
main()
Output:
Enter a string: 678qeaft
Total vowels: 2
Total numbers: 3
Explanation:
In the above program code, three methods, "vowel, number and main" is defined, in which "vowel and number" accept an x variable in its parameter and return a value with their respective name.
Inside the main method a string variable "s" is defined that accepts a string value and defines an "n and v" integer variable, and in the for loop, it calls the above methods to use the integer variable to count string and number value and print its calculated value.
In Python
Write a constructor with parameters self, num_mins and num_messages. num_mins and num_messages should have a default value of 0.
Sample output with one plan created with input: 200 300, one plan created with no input, and one plan created with input: 500
My plan... Mins: 200 Messages: 300
Dad's plan... Mins: 0 Messages: 0
Mom's plan... Mins: 500 Messages: 0
class Messaging:
txt = ""
first = 0
second = 0
def __init__(self, num_mins=0, num_messages=0):
self.txt = input("Who's plan is this? ")
self.first = num_mins
self.second = num_messages
def print_Something(self):
print(f"{self.txt} Mins: {self.first} Messages: {self.second}")
obj = Messaging(100, 100)
obj.print_Something()
If you want to change what's printed to the console, just manipulate the values in Messaging(). Leave them blank for 0.
Please define identity theft
Answer:
Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss
Explanation:
Which physical activity can you perform at the office to avoid strain?
A.
blink your eyes often
B.
cycling
C.
physiotherapy
D.
resting for long hours
Answer:
ill say eyes because straining your eyes hurts so a
Explanation:
Data mining is an integral part of knowledge discovery in database (KDD), which is the overall process of converting ____ into _____. a. primary data / secondary data b. input data / output data c. raw data / useful information d. input data / data fusion
Answer:
c. raw data / useful information
Explanation:
Data mining can be described as the cat of converting raw data into useful information.
In simple terms it can be defined as the process of extracting usable data from a much larger set or data(raw). This is done through the use of various softwares that support the process.
Through data mining patterns, anomalies, correlations etc are found in the data which is then used in the prediction of likely outcomes.
Which data type is -7?
O string
O int
O float
O single
Answer:
It's an int... Choose B
Answer:
int
Explanation:
correct on edge
write a C recursion function that can determine if a given number is a prime number. Must use recursion. g
A number is classified as a prime if it is greater than one and is divisible only by one and by itself. Only natural numbers are classified as prime. Before knowing more about the prime number, it is important to remember some rules of divisibility, which help in the identification of which numbers are not prime.
Code:
#include <stdio.h>
int prime_number(int, int);
int main()
{
int num, tmp;
printf("Input any integer number: ");
scanf("%d", &num);
tmp = prime_number(num, num / 2);
if (tmp == 1)
{
printf("%d is a prime number\n", num);
}
else
{
printf("%d is not a prime number\n", num);
}
return 0;
}
int prime_number(int num, int i)
{
if (i == 1)
{
return 1;
}
else
{
if (num % i == 0)
{
return 0;
}
else
{
return prime_number(num, i - 1);
}
}
}
Consider a 16 GByte memory (16G locations each holding one byte). What is the number of address lines (N)?
Answer:
Number of address lines (N) = 34
Explanation:
16G locations each holding 1 byte
byte
1g 1 - 1 - 1 - 1 - 1 - 1 - 1 - 1
2g
3g
.
.
.
16g
note that; 1 byte = 8 bit
therefore for 16G location, address line(N) will be:
since it is known that [tex]2^{N}[/tex] = 16G ,and 1 gigabyte = [tex]2^{30}[/tex] byte
∴ 16G = 16 × [tex]2^{30}[/tex]
= 2⁴ × 2³⁰
= 2³⁴
since [tex]2^{N}[/tex] = 16G
∴ [tex]2^{N}[/tex] = 2³⁴
N = 34
what are the commonly used computer categories.
Answer:
PCs (Personal Computers) with Microsoft Windows
Explanation:
i used google. hope this helped!!!
Python uses sequencing to
A) allow the code to run faster
B) carryt out a series of steps
C) let the computer pick the order of the steps
D) make the code easier to read
plz help this is exammmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
Answer:
B: Carry out a series of steps
Explanation:
Sequences is a general term for ordered sets. It tells in a set order what the program needs to do
PogChamp
Answer:
b
Explanation:
Which arithmetic operation is used by a signed binary comparator to determine if two operands are equal
Answer:
Equality Operators
Explanation:
The equality operators, which are often written as "equal (==), and not-equal (!=)" are technically used by a signed binary comparator to determine if two operands are equal or not equal. They produce 1 in a situation where both operands have equal value, and 0 if they do not have equal value.
Hence, in this case, the correct answer is Equality Operators.
A computer provides each process with 65,536 bytes of physical address space divided into page-frames of 4096 bytes. A particular program has a text size of 32,768 bytes, a data size of 16,386 bytes, and a stack size of 15,870 bytes. Will this program fit in the address space?
Answer:
No, we require 17 pages but we have only 16 pages available
Explanation:
As computer provide allocated address space is 65,536 which is 2∧16 bytes and page size is 4096 bytes which is 2^12 bytes.
Therefore, the number that can be formed with each 4096 bytes are 16 pages (2^16 / 2^12 = 2^4).
That program text size is 32,768 bytes which is equal to 8 pages (32768/4096 = 8).
The data of the program require 16386 bytes which is equal to 5 pages (16386/4096 = 4.005) and the stack of that program require 4 pages (15870/4096 = 3.875).
Therefore, the program requires 17 pages but have only 16 pages that's why it doesn't fit in address space.
Write a Python function to get the first half of a specified string of even length. Suppose the input string is "Python" ,after calling the function, we should see the output "Pyt"
In python:
def get_even(txt):
return txt[0:int((len(txt) / 2))]
We can test our function with the following code:
print(get_even("Python")) This returns "Pyt" in the console.
I hope this helps!
Answer:
c
Explanation:
Some systems automatically delete all user files when a user logs off or a job terminates, unless the user explicitly requests that they be kept. Other systems keep all files unless the user explicitly deletes them. Discuss the relative merits of each approach.
Answer:
Follows are the Scenario to this question:
Explanation:
Scenario 1:
Removing files trying to follow patient problems is effectively preserving a lot of bandwidth unless defined. Because the device doesn't allow unnecessary data to also be saved, and All system storage is also protected.
Its system efficiency also is increased as its device erases data which are not needed around the same time.
Scenario 2:
It is possible that its consumer unintentionally keeps forgetting to save information, and in that case, the user may lose a lot. Everything is therefore deleted before ensuring its customer.
Its machine may also be closed down due to varying any or even all model calibration, so that storage capacity helps to restore as the backup is still preserved.
Functions of a microcomputer
Answer:
Many functions can have less amount of storage can have a small CPU could have smaller mother board units and also have different types of programming
Given this instruction mix and the assumption that an arithmetic instruction requires 2 cycles, a load/store instruction takes 6 cycles, and a branch instruction takes 3 cycles, find the average CPI.
Answer:
2.6
Explanation:
I am assuming that for any given program, that 70% of it's executed instructions happen to be arithmetic, another 10% happen to be load/store, and finally, a 20% happen to be branch. If so, then I can say
Average CPI =
3Σi=1 Percentage of instructions * CPI
Average CPI = (0.7 * 2) + (0.1 * 6) + (0.2 * 3)
Average CPI = 1.4 + 0.6 + 0.6
Average CPI = 2.6
Alina needs to e-mail an Excel spreadsheet to a colleague. What is the best method to send the file if she does not want the colleague to easily make changes to the original file?
selecting Send Using E-mail and sending a link
selecting Send Using E-mail and sending as a PDF
selecting Send Using E-mail and sending as an attachment
selecting Send Using E-mail and sending as a published document
Answer:
B
Explanation:
PLEASE HURRY!!!
Look at the image below!
The first, third, and last are correct.
PLEASE HURRY!!!
Look at the image below!
The value of category will be normal because the if statement is false and the first elif statement is false but the second elif statement is true.
Write the HTML code to make the text "Learn Magic" link to a page called "magic-tricks.html”.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The below code is written in HTML
************************************************************************************************
<!DOCTYPE html>
<!--html start from here and this is comment line -->
<html lang="en-US">
<body> <!--html body start from here -->
<!-- a link attribute is given below that links another file (magic-tricks) in the same folder -->
<p><a href="magic-tricks.html">Learn Magic</a></p>
</body><!--html body end at here -->
</html>
<!--html end at here and this is comment line -->
*************************************************************************************************
When you run this code, it is neccessary for you to create another html file in same folder and named it "magic-tricks". When you will run the code into any browser and link "learn magic" will appear, as you will click on it "magic-tricks.html" file will get open.
Which of the following are labels used to identify illustrations such as tables, charts and figures in a document?
O Headers
O Footers
O Captions
O Citations
There are data which are given charts, tables and illustrated by the help of some labelling. This labelling helps us to identify the data and makes us understand what the data says.
This labelled data has to be given some name and thus in order to represent the figures in a document. This term caption is given to those data sets in the form of tables and illustrations.Hence the option C is correct,
Learn more about the labels used to identify the tables, charts and figures in a document.
brainly.in/question/11644668.
A technology-literate knowledge worker: A. knows how and when to apply technology B. is a computer savvy worker C. knows all computer programming languages D. is knowledgeable about emerging technology
Answer:
A. knows how and when to apply technology
Explanation:
Technology can be defined as a branch of knowledge which typically involves the process of applying, creating and managing practical or scientific knowledge to solve problems and improve human life. Technologies are applied to many fields in the world such as medicine, information technology, cybersecurity, engineering, environmental etc.
A technology-literate knowledge worker knows how and when to apply technology. This ultimately implies that, someone who is well grounded or informed about a technology understands how and when to apply technology.
Basically, knowing how to use a technology simply means he or she understands the appropriate method or technique to be used in the application of a technology such as when solving a problem. Also, knowing when to use a technology means to know the appropriate time to use a particular technology without it having any repercussion or adverse effect.
Answer:
A
Explanation:
Think about it like this:
A literate person in writing doesn't just know letters, they know how to put them together. Now put that in terms of computers.
Write a function password_check() that takes as input two strings newpassword and oldpassword, and accepts the new password (i.e., returns True) if newpassword is different from oldpassword and newpassword is at least 6 letters long. If the new password fails the check, your functions should return False
In python:
def password_check(newpassword, oldpassword):
return True if newpassword != oldpassword and len(newpassword) >= 6 else False
Just for clarification, that return statement is on one line. I hope this helps!
4. What is the output of the following code snippet? void prevnext(int a, int& prv, int nxt) { prv = a - 1; nxt = a + 1; } int main() { int a = 100; int b = 0;
Answer:
Previous = 99, Next = 101
Explanation:
Given that a = 100
Previous says that it's formula is a - 1, where a = 100.
Therefore, previous code would show in its output as 100 - 1. 100 - 1 = 99.
Thus, the output of previous code will be 99
Like with previous, Next says that it's formula is a + 1, where a = 100.
Therefore, the next code would show in its output as 100 + 1. 100 + 1 = 101
Thus, the output of previous code will be 101
I hope that's explanatory enough. Thanks.
Assistive Technologies: You have just purchased a new computer and, because of a visual impairment, you are having trouble reading the information on the screen. What are your next steps
Answer:
The definition has been mentioned below and according to the situation described.
Explanation:
If you already have recently purchased a new device and also have a visual disability condition, you increasing considering utilizing a few available assistive resources, such as screen readers, magnifiers, huge-print keyboards, as well as applications and resources for navigating assistance. These resources are explicitly available for those instances often come pre-installed in a device window throughout today's context.Which three actions can be done to panels to customize a user's Photoshop space?
Report them
Show them
Cast them
Separate them
Nest them
Answer:
Show them
Separate them
Nest them
Explanation:
In Photoshop space, the three actions that can be done to panels to customize a user's space is to show them, make them visible then nest them, and separate them.
Which type of programming language translates all lines of code together and then executes them at once?
Compiled
Interpreted
Machine
Python
Answer:
Compiled
Explanation:
Doors and windows are important compositional elements that impact the facade of a building True False
Answer:
true
Explanation:
11000011 00010011 00111010 00011101 / 00010010
In this example of IP address, determine: class, hostID, netID.
Answer:
Just imagine asalt rifle XD it be firing salts.....need some salt? Ask the asalt rifle.
Explanation: