Answer:
Explanation:
cool ..........................,...............................
output: tired : doing math on your calculator. wired : doing math in python. hint: these two lines are shorter than the other one. you are not allowed to use the fact that these are the first two sentences of the text.
Here is the code:
s = ["Tired Doing math on your calculator.", "Wired Doing math in Python.", "Inspired Training literal pythons to carry out long-division using an abacus."]
result = [x.replace("Tired", "Wired").replace("Wired", "Inspired") for x in s]
print(*result, sep="\n")
Code refers to a set of instructions written in a programming language that a computer can understand and execute to perform a specific task or set of tasks. Code is written by a software developer and can range from a simple script to a complex software application. The code is transformed into machine-readable form by a compiler or interpreter, and when executed, it carries out the intended operations. Different programming languages have their own syntax, structures, and functions, and are used for a wide variety of purposes, including web development, data analysis, artificial intelligence, and more.
Learn more about coding: https://brainly.com/question/20712703
#SPJ4
What are the dominant InfoSec-related credentials used to document knowledge and/or experience?
Answer:
One of the most widely cited information security certifications is the Certified Information Systems Security Professional (CISSP), offered by the International Information Systems Security Certification Consortium (ISC)2[1].
The while loop and the do loop are equivalent in their expressive power; in other words, you can rewrite a while loop using a do loop, and vice versa.
a. True
b. False
Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)
if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):
The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):
In the given statement, the condition is that a person should be 18 years or older in order to vote.
The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.
This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.
Let's analyze the other if statements:
1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.
However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.
2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.
Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.
3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.
While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.
For more questions on Boolean condition
https://brainly.com/question/26041371
#SPJ8
Which of the following scenarios describes an advantage of a global economy?
A car company makes its products in a country known for high manufacturing requirements.
A lightbulb company expands to a country where potential workers all have the same educational background.
An electronics company manufactures products in a country where the materials cost is high.
A toothpaste company expands to another country where there is a lot of competition for jobs.
When the toothpaste company diversifies to the other country so this represents the advantage of the global economy.
The information related to the global economy is as follows:
It is the inter-linked worldwide activities that could be taken place between the different types of countries. It is related to economic activities.Therefore, the other options are incorrect.
Thus we can conclude that when the toothpaste company diversifies to the other country so this represents the advantage of the global economy.
Learn more about the economy here: brainly.com/question/11905095
True or False, Inheritance refers to subclasses passing on characteristics to their parent class
Which physical activity can you perform at the office to avoid strain?
A.
blink your eyes often
B.
cycling
C.
physiotherapy
D.
resting for long hours
Answer:
ill say eyes because straining your eyes hurts so a
Explanation:
Jacob was sitting in class. His teacher understands that he is the type of student that doesn't comprehend when he sees or hears something, but he must actually do it to understand. So instead of having him sit through her instruction, she asks him to start writing down a list of questions when he comes to a problem he doesn't understand.
Which type of learning style describes Jacob?
A. auditory
B. visual
C. kinesthetic
D. dependent
Answer:
Jacob Is a Kinesthetic Learner
simple explanation of how a satellite works
Answer:
A satellite is basically a self-contained communications system with the ability to receive signals from Earth and to retransmit those signals back with the use of a transponder —an integrated receiver and transmitter of radio signals.
Explanation:
To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
1.Create custom theme fonts
2.Create custom theme
3.Create a custom paragraph style
4.Create a custom character style
Answer: crest custom theme
Explanation:
Answer:
crest custom theme
Explanation:
You and your brother are sharing a printer. You install the driver software onto your computer and install the printer. Then, you disconnect the printer and lend it to your brother. When you reconnect the printer later on, what is most likely to happen?
If the drivers for the printer aren't installed on your brother's computer, then the printer will not work. Everything attached to a computer needs a driver, including the internals, like the graphics card (through the desktop) and the RAM (through the BIOS). When you reconnect it to your computer, it will work because I am assuming that you have the latest drivers installed. However, if you try to plug in the printer to your computer without the proper drivers, then it will NOT work.
I hope this helps!
You want to send an email to members of your team working on a school project. In which field would you put the email addresses of the team members?
Answer: In the "Send to" section.
Explanation: When sending an email to a single person or group, make sure to type their email addresses into the "Send to" section so that it goes to the correct person/people.
QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin
Answer:
Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.
Explanation:
By using your own data, search engines and other sites try to make your web experience more personalized. However, by doing this, certain information is being hidden from you. Which of the following terms is used to describe the virtual environment a person ends up in when sites choose to show them only certain, customized information?
A filter bubble
A clustered circle
A relational table
An indexed environment
Answer:
A filter bubble
Explanation:
Internet Retailing
Visit an e-commerce Web site such as Amazon.com and find a product you would like to purchase. While looking at the page for that item, count the number of other products that are being offered on that page.
Activity
Answer the following questions: What do they have in common? Why are they appearing on that page?
When I visited the e-commerce Web site such as Amazon.com and find a product that I would like to purchase which is a laptop, The thing that the sellers have in common is that they are trusted and verified sellers, their product presentation is nice and has warranty on it. The reason they are appearing on that page is because the product are similar.
What is E-commerce site website?The term e-commerce website is one that enables customers to buy and sell tangible products, services, and digital commodities over the internet as opposed to at a physical store. A company can process orders, receive payments, handle shipping and logistics, and offer customer care through an e-commerce website.
Note that there are numerous eCommerce platforms available, each with its own set of characteristics. The optimal eCommerce platform will therefore rely on your demands, available resources, and business objectives.
So, for instance, if you're a novice or small business owner looking to set up an online store in only a few clicks, go with a website builder like Hostinger. Oberlo, on the other hand, boasts the best inventory management system for dropshippers and is the top eCommerce platform overall.
Learn more about e-commerce Web site from
https://brainly.com/question/23369154
#SPJ1
find out what has led micro computers to be very popular
Microcomputers became very popular due to the emergence of powerful microprocessors. It includes data processing logic and control in a simple integrated circuit.
Microcomputers and microprocessorsMicrocomputers are small computers that have a microprocessor acting as a central processing unit.
Microcomputers consist of a microprocessor, a memory, and minimal circuitry for output and input.
Microcomputers became popular due to the emergence of better microprocessors, which have greatly increased the processing speed of these devices for many applications.
A microprocessor refers to a computer component that includes data processing logic and control in a single (and simple) integrated circuit.
Learn more about microcomputers here:
https://brainly.com/question/5154911
Some scientists hypothesize that Earth's ozone layer is being damaged by ____.
a.
ultraviolet radiation
c.
plant life on Earth
b.
chlorofluorocarbons
d.
global warming
Please select the best answer from the choices provided
A
B
C
D
Some scientists hypothesize that Earth's ozone layer is being damaged by the emission of certain chemical compounds known as ozone-depleting substances (ODS), such as chlorofluorocarbons (CFCs).
b. chlorofluorocarbonsWhat are ozone-depleting substances (ODS)?These substances have been widely used in various industrial processes, aerosol propellants, refrigerants, and fire suppression systems. When released into the atmosphere,
CFCs can reach the stratosphere and interact with ozone molecules, leading to their depletion and thinning of the ozone layer. Ultraviolet radiation is a consequence of ozone layer depletion, and global warming, while impacting the Earth's climate, is not directly linked to ozone layer damage.
Plant life on Earth plays a vital role in oxygen production and carbon dioxide absorption but is not a direct cause of ozone layer depletion.
Learn more about ozone layer at
https://brainly.com/question/520639
#SPJ1
advantage of using computer
Answer:
What are the advantages of using a computer?Although there are disadvantages to using a computer, we believe the advantages greatly outweigh the disadvantages (although we may be biased). Below is a list of the main advantages and benefits you'll get and society gets from using a computer.Increase your productivityComputers increase your productivity and, with a good understanding of the software running on them, you become more productive at everything you do. For example, once you have a basic understanding of using a word processor, you can create, store, edit, share, and print documents and letters. Each of these things was either impossible or slower with all pre-existing technologies.Connects you to the InternetConnecting a computer to the Internet is what unlocks the full potential of a computer. Once connected, your choices and available options are almost limitless. Many of the benefits listed on this page are with a computer connected to the Internet.Can make you money?When connected to the Internet, a computer could help you make money many different ways. For example, it's cheaper to create and run an online store than having a physical store. Also, once online, your store or product has a global audience and you could sell to anyone in the world.Save timeToday, there are many services that help save you time. Several examples are listed below.Using a site like Amazon, you can find many of the same products you would find at a store for the same price or cheaper. You can also have those items shipped to your door without having to leave your home.You could use an online banking site to view your bank balance and pay bills.If your favorite restaurant has a website, you can order take out without having to wait in line.You can view online traffic cameras and maps with traffic information to find the quickest route.True/False: not is evaluated first; and is evaluated next; or is evaluated last.
Is the answer True or False
HELP PLS THIS IS DUE TODAY!!!
Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?
To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.
How to calculateTo calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.
Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.
Therefore, we need 2 subnet bits.
Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.
Read more about subnet mask here:
https://brainly.com/question/28390252
#SPJ1
the ___ 1 layer is where security filtering, address aggregation, and media translation occur.
The distribution layer of the hierarchical model is responsible for security filtering, address and area aggregation, and media translation. Between the Access Layer and the Core Layer, this layer also serves as a bridge in WLANs.
A network must be separated into several local (Access Layer) networks when it reaches a particular size. These networks are linked through the distribution layer. It controls traffic flow between various networks and makes sure that local traffic is contained to local networks.
To link various networks together, this layer employs routers. This layer's equipment, such as routers, is designed to link together multiple networks rather than a single host. IP Address often referred to as Logical Address, is used to direct traffic between hosts on various networks. To choose which interface to forward the incoming data packet on, the router keeps a Routing Table.
To learn more about WLAN click here:
brainly.com/question/29554011
#SPJ4
What type of bus does PCI use?
Answer:
PCI uses a 32-bit or 64-bit parallel bus.
Jane owns a dress-making business. Her income last quarter was $8,000, her cost of goods was $1,500, and her
total expenses were $3,000. What were Jane’s gross income and net income?
According to the data, Jane's gross income was $3,500, while net income was $3,430
What is gross income?Gross income is a term to refer to the total income that a person obtains from an economic activity. That is, gross income is the subtraction of costs and expenses from income.
What is net income?Net income is a term for a person's income after including all tax deductions from gross income.
So, to calculate the gross income we must identify what her total income was and subtract the expenses and costs that she spent. Additionally, to find the net income we must identify her gross income and subtract the equivalent of taxes on her earnings as shown below:
$8,000 - $3,000 - $1,500 = $3,500
$3,500 / 100 = $35
$35 * 2 = $70
$3,500 - $70 = 3430
Based on the above, it can be inferred that Jane's gross income is $3,500 while her net income from her is $3,430 because she had 2% tax deducted from her earnings from her.
Learn more about taxes in: https://brainly.com/question/16423331
#SPJ1
Why would a user select More Items for mail merge fields? to manually set an IF-THEN logic for the data field to manually change what merge field data is shown to manually select the format of the name in the greeting line to manually select and place additional fields at an insertion point
Answer:to manually select and place additional fields at an insertion point
Explanation:
Answer:
D. to manually select and place additional fields at an insertion point
Explanation:
edg. 2020
Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.
Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.
You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:
What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.
In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:
Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.What is the Case Facts?First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.
Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.
Learn more about affidavit from
https://brainly.com/question/30833464
#SPJ1
five uses of the operating system
Answer:
Security – ...
Control over system performance – ...
Job accounting – ...
Error detecting aids – ...
Memory Management – ...
help!!!!!!
hhhhhhhhh
Answer:
A
Explanation:
Part A
In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:
What is your name? Amanda
How old are you? 15
Hello Amanda! You were born in 2005.
Write the program. Format your code using best practices. Refer to the zyBooks style guide, if needed, to use proper naming conventions for variables and methods. Use the most appropriate statements with minimal extraneous elements, steps, or procedures.
Run the program.
Debug the program. Be sure your code produces the correct results.
Save and submit your file.
Part B
While you don’t need an IDE to write a program, there are some features that make it desirable. What did you notice when using PyCharm to develop a simple program? For instance, you might have noticed how color is used. Identify two to three features that could make coding easier for programmers, and briefly explain why.
Using the knowledge in computational language in python it is possible to write a code that write a program that prompts the user for their name and age.
Writting the code:def born_yr(age):
return 2020-age
if __name__=="__main__":
name = input("What is your name?")
age = int(input("How old are you?"))
born=born_yr(age)
print("Hello", name + "!", "You are born in " + str(born) + ".");
See more about python at brainly.com/question/18502436
SPJ1
Sasha is viewing a primary component of her Inbox in Outlook. She sees that the subject is “Meeting Time,” the message is from her co-worker Trevon, and the message was received on Monday, January 10th. Sasha can also see the contents of the message. Which part of the Inbox is Sasha viewing?
the status bar
the Reading Pane
the message header
the Task List
sasha is viewing the status bar
Answer: Its B, The reading pane
Assume the variable s is a String and index is an int. Write an if-else statement that assigns 100 to index if the value of s would come between "mortgage" and "mortuary" in the dictionary. Otherwise, assign 0 to index.
Using the knowledge in computational language in python it is possible to write a code that Assume the variable s is a String and index is an int.
Writting the code:Assume the variable s is a String
and index is an int
an if-else statement that assigns 100 to index
if the value of s would come between "mortgage" and "mortuary" in the dictionary
Otherwise, assign 0 to index
is
if(s.compareTo("mortgage")>0 && s.compareTo("mortuary")<0)
{
index = 100;
}
else
{
index = 0;
}
See more about JAVA at brainly.com/question/12975450
#SPJ1