I cant get this for the life of me, I dont understand what im doing wrong, help?
def main():
numGuesses = 0
userGuess = 15
secretNum = 5
name = input("Hello! What is your name?")
userGuess = print ("Guess a number between 1 and 20:")
numGuesses = numGuesses + 1
if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")
if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")
if (userGuess = secretNum):
print9"Congrats! you are correct.")
main()
Answer:
what problems are you facing with this code?
Answer:
Your print statement has a 9 on it.
Which of the following is true about 'build' Maven life cycle?
A - It cleans up artifacts created by prior builds.
B - This is used to build the application.
C - This generates site documentation for the project.
D - None of the above.
Option B - "build" is used to build the application - is true about the Maven lifecycle.
In the Maven build lifecycle, the "build" phase is responsible for building the application. It compiles the source code, runs tests, and creates artifacts such as JAR or WAR files. Option A, cleaning up artifacts, is not part of the "build" phase but rather the "clean" phase.
Option C, generating site documentation, is handled by the "site" phase. The "build" phase focuses on assembling and packaging the application, making it ready for deployment or distribution. It ensures that the project's source code is compiled, dependencies are resolved, and the resulting artifacts are produced, preparing the application for further stages or use.
Learn more about Maven build lifecycle here: brainly.com/question/31148033
#SPJ11
computer network reduces expenses of an office justify this statement
Answer:
Computer Network reduces expenses of an office. Justify this statement with an example. Computer Networks can allow businesses to reduce expenses and improve efficiency by sharing data and common equipment, such as printers, among many different computers.Explanation:
Explain LCD and give two example
Answer:
LCD means least common denominator• a "Common Denominator" is when the bottom number is the same for the fractions.
Explanation:
Answer:
least common denominator.
Computer _ rely on up to date definitions?
A. Administrators
B. Malware Scan
C. Firmware updates
D. Storage Drivers
Answer: The correct answer is B. Malware Scan
Explanation:
The word "definition" only applies to antivirus and malware removal applications that scan for patterns using the definitions. The other choices do not use definitions. Firmware updates rely on images, storage drives use drivers and administrators are user privilege type.
what happens if you add a finite number of terms to a divergent series or delete a finite number of terms from a divergent​ series?
When you add a finite number of terms to a divergent series or delete a finite number of terms from a divergent series, the series will still remain divergent. This is because the overall behavior of the series is not affected by the addition or removal of a finite number of terms. The series will continue to either grow without bound or not settle to a fixed value.
If you add a finite number of terms to a divergent series or delete a finite number of terms from a divergent series, the series still remains divergent. This is because a divergent series is one where the sum of the terms goes to infinity or negative infinity, and adding or deleting a finite number of terms does not change this fact. However, if you add or delete terms from a convergent series, it may change the sum of the series and whether it converges or diverges.
a divergent series is an infinite series that is not convergent, meaning that the infinite sequence of the partial sums of the series does not have a finite limit. If a series converges, the individual terms of the series must approach zero. Thus any series in which the individual terms do not approach zero diverges.
learn more about divergent series here:
https://brainly.com/question/15415793
#SPJ11
The range of an unsigned 6 bit binary number is
0-63
0-64
0-127
1-128
Answer:
6 bit = 2^6-1=64-1=63
from 0 to 63
Which of the following statements holds true for the term plug-in? Group of answer choices It refers to a program (typically a marketing effort) that requires customer consent. It refers to a program that enrolls all customers by default, but that allows consumers to discontinue participation if they want to. It refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget. It refers to a small computer program that extends the feature set or capabilities of another application. It refers to recruiting a network of users with the goal of spreading IP addresses across several systems.
Answer:
it refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget
Explanation:
A plugin can be regarded as piece of software which serve as an add-on to a web browser, it provides the browser with additional functionality. It's functionality give room to a web browser so that the web can display additional content that was not designed to display originally. It should be noted that plug-in refers to the generation of bogus clicks, either for financial gain or to attack rivals by draining their online ad budget
define computer network
Answer:
Explanation:
A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other.
Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag
Answer: Document Scanner
Explanation: Cos then he can easily add the paper notes to his computer and email the client.
____________________ multiplexes or separates the data to be transmitted into smaller chunks and then transmitted the chunks on several sub channels.
Answer:
no one knows
Explanation:
Which of the following is used to represent comments in flowcharts?
A. Parallelogram
B. Diamond
C. Ghost rectangle or callout shape
D. Rectangle
The C. Ghost rectangle or callout shape is used to represent comments in flowcharts"
This shape is used to provide additional information or comments about a particular process or decision in a flowchart. It is typically a rectangular shape with a dashed or dotted border, and a tail pointing to the relevant step or decision. The parallelogram shape is used to represent input or output in a flowchart, while the diamond shape is used to represent decision points. The rectangle shape is used to represent a process or action in the flowchart. It is important to use the correct symbols and shapes in flowcharts to ensure clarity and accuracy in the representation of processes and decision-making.
learn more about callout shape here:
https://brainly.com/question/19704602
#SPJ11
Which of the following is used to close up security holes?
The option that is used to close up security holes is to Address Internal Threats.
What is security hole in cyber security?In regards to computer security, the term security hole is known to be a statement that connote a form of vulnerability as well as any form of weakness that can be seen in a system.
This is known to be one that may be as a result of a system design flaw or any form of bug.
If this is unresolved, such flaws can render a system vulnerable to attacks through the use of Internet that could act to compromise the integrity or confidentiality of that given system.
Therefore, The option that is used to close up security holes is to Address Internal Threats.
Learn more about security from
https://brainly.com/question/25720881
#SPJ1
WILL GIVE BRAINLIEST!!!!!!!!
Answer:
camera
Explanation:
they used a camaera so technology inspired
Write the role of UPS and spike guard in terms of power protection.
Answer:
It allows for safe and orderly shutdown of the Computer and Other Connected devices or equipments attached to It. It can be used as an immediate backup during power cut or failure.
Explanation:
The role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.
The spike guard is a device used to protect electrical equipments from fluctuations and surges.
The UPS is a device used to provide power backup been electrical power drops or fails to a certain unacceptable voltage level.
Role of UPSIt provides steady power to equipment during power failureIt absorbs power surges.Role of spike guardIt protects electrical equipments from power fluctuationsIt also protects from power surges.Therefore, the role of the UPS and spike guard in power protection is absorption of power surges and fluctuations.
Learn more about Uninterrupted power supply here:
https://brainly.com/question/7850680
#SPJ2
What does firewall do
Answer:
help
Explanation: to make people blocked on school computer
Which of the following is an incorrect statement?The cloud consumers save money because they can select most appropriate (effective) cloud services for their business operations.Adopting the cloud services saves the capital expenses, but, it does not save the operational costs.Like the cloud consumers, the cloud service providers can lease resources on the on-demand basis.Consumers save money because the cloud service providers purchase IT resources at the large scale and lower
"Adopting the cloud services saves the capital expenses, but, it does not save the operational costs." Adopting cloud services can also save operational costs as businesses don't have to maintain and upgrade their own IT infrastructure.
It is untrue to say that Adopting cloud services will save you money on capital expenses but not on operating costs. In fact, Adopting cloud services can save money on both capital and operating costs. Because businesses no longer need to invest in their own IT infrastructure, such as servers and data centers, moving to the cloud can save capital expenses. Additionally, cloud service providers frequently provide flexible pricing plans that let companies only pay for the resources they really utilize. Because cloud service providers handle the infrastructure, organizations can concentrate on their core business operations and save operational costs. Cloud services also offer scalability and flexibility, enabling companies to swiftly modify resources in response to demand.
learn more about Adopting cloud services here:
https://brainly.com/question/24118821?
#SPJ11
anyone know how to do this
The completed program that finds the area and perimeter of the rectangle using a C Program is given below:
The Program// C program to demonstrate the
// area and perimeter of rectangle
#include <stdio.h>
int main()
{
int l = 10, b = 10;
printf("Area of rectangle is : %d", l * b);
printf("\nPerimeter of rectangle is : %d", 2 * (l + b));
return 0;
}
OutputThe area of the rectangle is : 100
The perimeter of the rectangle is : 40
If we make use of functions, it would be:
// C program to demonstrate the
// area and perimeter of a rectangle
// using function
#include <stdio.h>
int area(int a, int b)
{
int A;
A = a * b;
return A;
}
int perimeter(int a, int b)
{
int P;
P = 2 * (a + b);
return P;
}
int main()
{
int l = 10, b = 10;
printf("Area of rectangle is : %d", area(l, b));
printf("\nPerimeter of rectangle is : %d",
perimeter(l, b));
return 0;
}
OutputThe area of rectangle is : 100
The perimeter of rectangle is : 40
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Oldnavy.Gap.com sells clothing and accessories. They want their line of maternity clothing to show up on searches that include 'maternity'. What should the URL for the maternity category be? https://Oldnavy.Gap .maternity.com/ https://Oldnavy.Gap .com/maternity https://maternity.Oldnavy.Gap com/ https://Oldnavy.Gap .com/category5
Answer:
Explanation:
The URL for the maternity category on Oldnavy.Gap.com should be **https://Oldnavy.Gap.com/maternity**.
Including the keyword "maternity" directly in the URL helps search engines understand the relevance of the page to maternity-related searches. By placing "maternity" as a subdirectory within the main domain, the URL structure becomes logical and intuitive for both users and search engines.
Therefore, the correct URL for the maternity category would be **https://Oldnavy.Gap.com/maternity**.
Learn more about maternity here:
https://brainly.in/question/37980162
#SPJ11
Which piece of equipment is necessary for a student to respond to tasks in the speaking test?
Speakers
CD player
Headphones
Headset with a microphone
D) Headset with a microphone is necessary for a student to respond to tasks in the speaking test.
Having the right headset with a microphone is essential for students who are taking a speaking test.
With the right headset, students can respond to tasks easily, ensuring that their answers are accurately heard and evaluated by the test instructor.
By investing in a quality headset with a microphone, students can ensure they are well-prepared to perform their best in the speaking test.
It is essential for students to have a headset with a microphone when taking the speaking test.
Without a headset, students will not be able to respond to tasks and will be unable to complete the test. Make sure to equip your students with the necessary tools to ensure they can complete the speaking test with ease.
To learn more about microphone, click here:
https://brainly.com/question/12484674
#SPJ4
Select the correct answer from each drop-down menu A manipulator and the end effector work together to execute a robot's tasks A manipulator is a series of joined segments, whose function is to capable of The manipulator is thus
The end effector and the manipulator collaborate to carry out a robot's operations. A manipulator is made up of a number of connected segments that are used to position and direct the end effector.
Which area of the robotic manipulator is utilized for object positioning within the robot work volume?The robot manipulator is divided into two parts: Body-and-arm - for positioning things within the work volume of the robot. Wrist assembly for object orientation.
Where is the manipulator's end effector connected?An end effector is an accessory that fastens to a robot's wrist and enables it to interact with the task at hand.
To know kore about manipulator visit:-
https://brainly.com/question/30002364
#SPJ1
Additional Activities Direction: List down all the safety and work procedures in using newly purchased gadget. Write your answers on a separate sheet of paper.
Answer: Keep your phone away from your body and head. Turn off your phone or turn on airplane mode at bedtime. Use headsets, preferably air tube, and speaker phone when possible. Don't carry your cell phone in your bra, shirt, or front pants pocket, especially if you're pregnant.
Explanation:
1. which is faster, an esata-600 port or a firewire 800 port?
The eSATA-600 port is faster than the FireWire 800 port. The eSATA-600 port has a data transfer rate of up to 600 MB/s, while the FireWire 800 port has a transfer rate of up to 800 Mbps (approximately 100 MB/s).
The eSATA-600 port is a faster data transfer interface compared to the FireWire 800 port. The eSATA-600 port can transfer data at a rate of up to 600 megabytes per second (MB/s), while the FireWire 800 port can transfer data at a rate of up to 800 megabits per second (Mbps), which is approximately 100 MB/s. The higher transfer rate of eSATA-600 makes it a more suitable choice for transferring large amounts of data quickly, such as when working with high-definition video or large files. However, both ports have their own strengths and weaknesses, and the choice of which one to use ultimately depends on the specific needs of the user.
Learn more about FireWire here;
https://brainly.com/question/11179545
#SPJ11
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?
Assignee
Client
Delegate
Manager
Answer:
I think it's B, Delegate
Explanation:
Cause the other options didn't seem to fit as the answer.
I really don't know though.
A delegate is someone who has been granted permission by another user to access. The correct answer would be an option (C).
What is a mailbox?A computer-simulated mailbox that stores email messages. Mailboxes are saved on a disc as a message file or a message database.
A delegate is someone who has been granted permission by another user to access and manage their mailbox, including sending and responding to email messages on their behalf.
When you grant delegate access to another person, you are giving them the ability to access specific folders within your mailbox and perform specific actions, such as reading, sending, and deleting email messages.
Assignee, client, and manager are not terms typically used in the context of delegate access in email systems.
Thus, the correct answer would be option (C).
Learn more about the mailbox here:
https://brainly.com/question/28430685
#SPJ6
Wesellyoubuy, a consumer electronics company, received consumer complaints about its employees not being able to communicate with consumers properly. After investigating the prime reason behind these complaints, the management found that the consumer service employees were following the same strategy to address all types of consumer issues. The management immediately started a new training program for the consumer service employees where they were trained to respond to every possible query a consumer might have. Eventually, their service ratings and sales showed improvement. In this scenario, the consumer service team improved _____.
Answer:
customer satisfaction
Explanation:
The consumer electronics company started a new training program for the consumer service employees as the company found that the consumer service employees were following the same strategy to address all types of consumer issues due to which they were not able to communicate with consumers properly.
This leads to improvement in service ratings and sales.
In this scenario, the consumer service team improved customer satisfaction
The point of entry from a wireless device to a wired network is performed at a device called a(n) ____________________.
Answer:
wireless access point
In computer networking, a wireless access point (WAP), or more generally just access point (AP), is a networking hardware device that allows other Wi-Fi devices to connect to a wired network.
g in the following public key encryption scenarios where you are communicating with me, please tell me the secrecy/authentication purpose of the following exchanges. (2pts)
One of the most significant advancements in public-key cryptography was the Diffie-Hellman key exchange, which is still extensively used in a variety of modern security protocols.
One of the most significant advancements in public-key cryptography was the Diffie-Hellman key exchange, which is still extensively used in a variety of modern security protocols.
It makes it possible for two parties who have never met before to safely create a key that they can use to encrypt their communications. This article will describe its applications, how it operates step-by-step, its various variations, and the security issues that must be taken into account before using it.
The first widely used technique for securely creating and exchanging keys over an unsecure channel was the Diffie-Hellman key exchange.
In light of the aforementioned, it might not seem particularly novel or exciting, so let's provide an illustration.
To know more about public-key cryptography click here:
https://brainly.com/question/15205343
#SPJ4
the form will consists of the following: a text box where an individual's ucid can be type in a submit button which the user will click to activate a js script that will validate the input.
The form will consist of a text box where an individual's UCID can be typed in, and a submit button. When the user clicks on the submit button, a JavaScript script will be activated to validate the input.
Create a form in HTML with a text box and a submit button. Use JavaScript to attach an event listener to the submit button. In the event listener function, retrieve the value entered in the text box. Use regular expressions or other validation techniques to check if the input matches the desired format for a UCID. If the input is valid, perform any additional actions required (e.g., submit the form, display a success message).
If the input is not valid, display an error message to the user indicating the issue with their input.To create a form with a text box for UCID input and a submit button, you can use HTML. To validate the input using JavaScript, attach an event listener to the submit button. Retrieve the input value, validate it using regular expressions or other techniques, and display an error or success message accordingly.
To know more about UCID visit:
https://brainly.com/question/33638134
#SPJ11
You have been on the phone with a user in a remote office for 30 minutes troubleshooting their minor desktop problem. no matter how many times you explain the solution to them, they do not understand what you are saying. what should you do
You should consider alternative communication methods such as providing written instructions or scheduling a screen-sharing session.
In this situation, it is recommended to consider alternative communication methods to ensure effective understanding and resolution of the problem. One option is to provide step-by-step written instructions or documentation that the user can follow at their own pace. This can help clarify the solution and allow the user to refer back to the instructions if needed.
Another option is to schedule a remote screen-sharing session where you can visually demonstrate the troubleshooting steps or directly take control of the user's desktop to resolve the problem yourself. This can provide a more hands-on and interactive approach to problem-solving.
Option: The correct answer is to consider alternative communication methods such as providing written instructions or scheduling a screen-sharing session.
You can learn more about screen-sharing session at
https://brainly.com/question/20165875
#SPJ11
you need to create a report to display the names of customers with a credit limit greater than the average credit limit of all customers. which select statement should you use? a. select last name, first name from customer where credit limit > avg(credit limit); b. select last name, first name, avg(credit limit) from customer group by avg(credit limit); c. select last name, first name, avg(credit limit) from customer group by avg(credit limit) having credit limit > avg(credit limit); d. select last name, first name from customer where credit limit > (select avg(credit limit) from customer); e. select last name, first name from customer where credit limit
The correct select statement to display the names of customers with a credit limit greater than the average credit limit of all customers is option (d): "select last name, first name from a customer where credit limit > (select avg(credit limit) from customer);".
This statement uses a subquery to calculate the average credit limit of all customers and then compares each customer's credit limit with the average using the "where" clause. Option (a) is incorrect because it does not calculate the average credit limit of all customers, but rather the average credit limit of only the customers who meet the condition. Option (b) is incorrect because it includes the average credit limit in the output, which is not necessary for the report. Option (c) is incorrect because the "having" clause is used to filter groups based on a condition, not individual rows. Option (e) is incorrect because it does not compare the credit limit with the average credit limit.
Find out more about subquery
brainly.com/question/29575628
#SPJ4