Answer: 14. Operating 15. False I hope this helps :)
Explanation:
write an algorithm to find the average of six numbers
Answer:
Input: two numbers x and y Output: the average of x and y Step 1 : input x,y Step 2: sum=0,average=0 Step 3:sum = x + y Step 4:average = sum /2 Step 5: print average.
Explanation:
Input: two numbers x and y Output: the average of x and y Step 1 : input x,y Step 2: sum=0,average=0 Step 3:sum = x + y Step 4:average = sum /2 Step 5: print average.
Algorithms are set of instructions which are to be followed in other to solve a particular problem. The algorithm which gives the average of six values goes thus:
1.)
Input : a, b, c, d, e, f
#takes input of the six numbers
2.)
sum=0 ; average=0
# initialize sum and average variables to 0
3.)
sum = a + b + c + d + e + f
#takes the sum of the six numbers
4.)
average = sum /6
#divide the sum by the number of values.
5)
print average.
#display the average value
Learn more : https://brainly.com/question/24266817
You are in charge of five software development projects. The ‘characteristics’ of each of your projects are as follows:
• Project 1: Web-site for a local company. Relatively small system. Requirements are unclear and likely to change in the near future.
• Project 2: A very large embedded system whose requirements can be easily identified and are relatively stable.
• Project 3: A ‘standard’ business application. You have developed similar systems like this one in the past.
• Project 4: A relatively complex administrative system for one of the local hospitals. Some of the requirements seem to be pretty unclear, but all the requirements are stable.
• Project 5: A small real-time control system to be used for monitoring patients in a local hospital.
Consider the following software development approaches/models: waterfall, throw-away prototyping, evolutionary prototyping, component-based development, formal development. Which of the above approaches/models would you choose for each of your projects? Briefly explain your choices.
Brainly account. How to open?
Which of the following statements are true about how technology has changed work? Select 3 options. Responses Businesses can be more profitable by using communication technology to reduce the costs of travel. Businesses can be more profitable by using communication technology to reduce the costs of travel. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. With the spread of technology and the Internet, smaller businesses are not able to compete as effectively as before. In a gig economy, workers are only hired when they are needed for as long as they are needed. In a gig economy, workers are only hired when they are needed for as long as they are needed. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Through the use of the Internet and collaboration tools more workers are able to perform their jobs remotely. Technology has not really changed how businesses operate in the last fifty years. Technology has not really changed how businesses operate in the last fifty years.
The three genuine statements almost how technology has changed work are:
Businesses can be more productive by utilizing communication technology to decrease the costs of travel. This can be genuine since advances like video conferencing and virtual gatherings permit businesses to conduct gatherings, transactions, and collaborations remotely, lessening the require for costly travel courses of action.With the spread of technology and the Web, littler businesses are not able to compete as successfully as some time recently. This explanation is genuine since innovation has empowered bigger companies to use their assets and reach a worldwide advertise more effortlessly, making it challenging for littler businesses to compete on the same scale.Through the utilize of the Web and collaboration devices, more laborers are able to perform their occupations remotely. This explanation is genuine as innovation has encouraged farther work courses of action, allowing employees to work from anyplace with an online association. Collaboration instruments like extend administration computer program and communication stages have made inaccessible work more doable and effective.Technology explained.
Technology alludes to the application of logical information, aptitudes, and devices to form innovations, fathom issues, and move forward proficiency in different spaces of human movement. It includes the improvement, usage, and utilize of gadgets, frameworks, and processes that are outlined to achieve particular assignments or fulfill specific needs.
Technology can be broadly categorized into distinctive sorts, such as data technology, communication technology, therapeutic innovation, mechanical technology, and transportation technology, among others. These categories include different areas, counting computer science, hardware, broadcast communications, building, and biotechnology.
Learn more about technology below.
https://brainly.com/question/13044551
#SPJ1
PLS HELP WILL MARK BRAINLINESS AND 30 POINTS
In your own words in at least two paragraphs, explain why it is important, when developing a website, to create a sitemap and wireframe. Explain which process seems most important to you and why you feel most drawn to that process.
(i.e. paragraph one is why is it important and paragraph two is which process felt most important to you and why)
When creating a website, it is important to create a sitemap so that a search engine can find, crawl and index all of your website's content. a sitemap makes site creation much more efficient and simple. A sitemap also helps site developers (assuming you have any) understand the layout of your website, so that they can design according to your needs.
A wireframe is another important step in the web design process. Creating a website is like building a house. To build the house, you first need a foundation on which to build it upon. Without that foundation, the house will collapse. The same goes for a website. If you create a wireframe as a rough draft of your website before going through and adding final touches, the entire design process will become much easier. If you do not first create a wireframe, the design process will be considerably more difficult, and you are more likely to encounter problems later on.
To me, the wireframe is the most important due to the fact that is necessary in order to create a good website. In order to create a sitemap, you first need a rough outline of your website. Without that outline, creating a sitemap is impossible.
what kind of simple machine is a tow truck?
Answer:
●
Explanation:
Combining two or more simple machines to work together. Examples: Car Jack combines wedge and screw, Crane or tow truck combines lever and pulley, Wheel barrow combines wheel and axle with a lever.
Define a class named Bits that holds a single integer variable. You will use this integer simply as a container of bits. The number of bits you can support depends on the type of integer you use. We will use an unsigned long long, which on most platforms occupies 64 bits.
If you are uncertain how many times a loop should run. What type of a loop should you use?
A. For loop
B. For each loop
C. While loop
D. Definite loop
Answer:
While loop
Explanation:
write a program that reads the student information from a tab separated values (tsv) file. the program then creates a text file that records the course grades of the students. each row of the tsv file contains the last name, first name, midterm1 score, midterm2 score, and the final score of a student. a sample of the student information is provided in studentinfo.tsv. assume the number of students is at least 1 and at most 20. assume also the last names and first names do not contain whitespaces. the program performs the following tasks: read the file name of the tsv file from the user. open the tsv file and read the student information. compute the average exam score of each student. assign a letter grade to each student based on the average exam score in the following scale: a: 90
In order to have as few implementation dependencies as feasible, Java is a high-level, class-based, object-oriented programming language.
What is Java?It is a general-purpose programming language, compiled Java code can run on any platforms that accept Java without the need to recompile. This is known as writing once, running anywhere (WORA). Regardless of the underlying computer architecture, Java applications are often compiled to bytecode that can run on any Java virtual machine (JVM).
In order to write the code for this exercise, we must apply our knowledge of the Java programming language, hence we must:
There is a photo attached with the code.
As a result, for convenience, the code can be located a
using the std namespace;Students in the class must save the data. course studentpublic:lname stringphrase fname;marks[3] int;grade char;/ Function that produces the student's gradecalculate grade() in voiddouble sum equals 0 for (i=0;i;3;i++)marks[i] = sum+;}double average = total/three;If (average >= 90 and average > 100)this is a "A" grade;if (average >= 80)grade = 'B' in this;if (average >= 70)grade = 'C' in this; if (average >= 60)this is a "D" grade;if not this->grade = "F,"}};/ This function builds a vector of data for students after reading the file.
read file(string fileName), vector launching the filefin stream;fin.open(fileName);Temp variables in /graph list;matrix row;line, word, and temp strings;/ Input data into the vector.while(getline(fin,line)){row.clear();line; stringstream;while(getline(s,word,'\t')){row.push back(word); }st. students;row[0] = st.fname;row[1] = st.lname;row[2] = stoi(st.marks[0]);row[3] = stoi(st.marks[1]);row[4] = stoi(st.marks[2]);st.calculate grade();list.push back(st);}fin.close();return table;}/ This method accepts a list of students as input and filname to be output.writeFile() takes a string filename and a vector list. / Launching a fresh file fin(filename) ofstream; string line = list[i] for (int i=0;i). fname+"\t"+list[i]. lname+"\t"+to string(list[i].marks[0]) +"\t +to string(list[i].marks[1])+"\t"+to string(list[i].marks[2])+"\t"+list[i].grade+"\n"; fin< } / Locate the necessary stats a double average of 0, average 2, and average 3; (int i=0;i average1+=list [i].marks [0]; average2+=list[i].marks[1]; average3+=list[i].marks[2]; } average1/=list.size(); average2/=list.size(); average3/=list.size(); / Write the statistics Average: ""mid term1"" fin"n"n" / Delete the file fin.close(); } int primary() taking the input in / Type the filename here:" filename in a string cin>>filename; graph list; / Writing to and reading from the file read file (filename) = list writeFile("report.txt",list); }
Hence, In order to have as few implementation dependencies as feasible, Java is a high-level, class-based, object-oriented programming language.
To learn more about Java refer to:
https://brainly.com/question/25458754
#SPJ4
List and briefly describe various types of Malware?
Answer:
Here yah go.
Explanation:
Virus: A virus is a malicious program that attaches itself to legitimate files and spreads by infecting other files. It can cause damage to the infected system by corrupting or deleting files, slowing down the computer, or spreading to other connected devices.
Worm: Worms are self-replicating programs that spread over computer networks without the need for user interaction. They exploit vulnerabilities in operating systems or software to propagate themselves and can cause significant damage by consuming network bandwidth or carrying out malicious activities.
Trojan Horse: A Trojan horse appears as a legitimate and harmless program, but it contains malicious code that performs unauthorized activities without the user's knowledge. Trojans can enable remote access to a computer, steal sensitive information, or download and install additional malware.
Ransomware: Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid. It typically displays a ransom note, demanding payment in exchange for the decryption key. Ransomware attacks can be highly disruptive and costly for individuals and organizations.
Spyware: Spyware is designed to secretly monitor a user's activities and gather information without their consent. It can track keystrokes, capture screenshots, record browsing habits, and steal personal or sensitive data. Spyware often aims to collect financial information or login credentials.
Adware: Adware is a type of malware that displays unwanted advertisements on a user's computer. It can redirect web browsers, modify search results, and slow down system performance. Adware is typically bundled with legitimate software and generates revenue for its creators through advertising clicks or impressions.
Keylogger: Keyloggers are designed to record keystrokes on a computer or mobile device. They can capture usernames, passwords, credit card details, and other confidential information. Keyloggers can be delivered through malicious downloads, infected websites, or email attachments.
Botnet: A botnet is a network of compromised computers, also known as "zombies" or "bots," that are controlled by a central command and control (C&C) server. Botnets can be used for various malicious activities, including distributed denial-of-service (DDoS) attacks, spam distribution, or spreading other types of malware.
Rootkit: A rootkit is a type of malware that provides unauthorized access and control over a computer system while hiding its presence from detection by security software. Rootkits often modify operating system components and can be difficult to detect and remove.
Backdoor: A backdoor is a hidden entry point in a system that bypasses normal authentication mechanisms, allowing unauthorized access to a computer or network. Backdoors are often used by attackers to gain persistent access for further exploitation or to create a secret pathway for future access.
It is essential to stay vigilant, use reputable antivirus software, keep systems up to date, and exercise caution when downloading files or clicking on suspicious links to protect against these various types of malware.
provides high-speed connections to the Internet profiting from television distribution infrastructure.
An Internet service provider (ISP) provides high-speed connections to the Internet profiting from television distribution infrastructure.
Describe an ISP and its parts?Internet service providers (ISPs) are businesses that give people and organizations access to the internet and other associated services.
In order to establish a point of presence on the internet for the region they service, an ISP needs access to the necessary hardware and telecommunications lines. Those who offer internet access for a monthly charge are known as internet service providers (ISPs).
Therefore, Cable and DSL are the two primary ISP configurations. Other kinds do exist, albeit they frequently occur in more isolated areas. There are numerous neighbors using cable connections, which may slow down cable access. DSL connections, which link a DSL router to a phone jack or phone cable, are available from telephone service providers.
Learn more about Internet service provider from
https://brainly.com/question/27118899
#SPJ1
3.10 LAB: List basics
Given the user inputs, complete a program that does the following tasks:
Define a list, my_list, containing the user inputs: my_flower1, my_flower2, and my_flower3 in the same order.
Define a list, your_list, containing the user inputs, your_flower1 and your_flower2, in the same order.
Define a list, our_list, by concatenating my_list and your_list.
Append the user input, their_flower, to the end of our_list.
Replace my_flower2 in our_list with their_flower.
Remove the first occurrence of their_flower from our_list without using index().
Remove the second element of our_list.
Observe the output of each print statement carefully to understand what was done by each task of the program.
Ex: If the input is:
rose
peony
lily
rose
daisy
aster
the output is:
['rose', 'peony', 'lily', 'rose', 'daisy']
['rose', 'peony', 'lily', 'rose', 'daisy', 'aster']
['rose', 'aster', 'lily', 'rose', 'daisy', 'aster']
['rose', 'lily', 'rose', 'daisy', 'aster']
['rose', 'rose', 'daisy', 'aster']
The program is an illustration of Python lists; lists are used to hold multiple values in a variable
The main programThe program written in Python, where comments are used to explain the code is as follows:
#This gets all required outputs
my_flower1 = input(); my_flower2 = input(); my_flower3 = input(); your_flower1 = input(); your_flower2 = input(); their_flower = input()
# This defines my_list and appends the values of my_flower1, my_flower2, and my_flower3
my_list=[my_flower1,my_flower2,my_flower3]
# This defines your_list and appends your_flower1 and your_flower2
your_list=[your_flower1,your_flower2]
# This defines our_list by and concatenates my_list and your_list
our_list = my_list+your_list
#This prints our_list
print(our_list)
# This appends their_flower to the end of our_list
our_list.append(their_flower)
#This prints our_list
print(our_list)
# This replaces my_flower2 in our_list with their_flower
our_list[our_list.index(my_flower2)]=their_flower
#This prints our_list
print(our_list)
#This removes the first occurrence of their_flower from our_list
our_list.remove(their_flower)
#This prints our_list
print(our_list)
#This removes the second element of our_list
our_list.remove(our_list[1])
#This prints our_list
print(our_list)
Read more about python lists at:
https://brainly.com/question/16397886
What is the benefit of encapsulation?
A. To rename variables
B. To reuse code
C. To make all members public
D. To make all members protected
Answer:
B. To reuse code
import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in); final int NUM_ELEMENTS = 8; // Number of elements int[] userVals = new int[NUM_ELEMENTS]; // User numbers int i = 0; // Loop index int sumVal = 0; // For computing sum // Prompt user to populate array System.out.println("Enter " + NUM_ELEMENTS + " integer values..."); for (i = 0; i < NUM_ELEMENTS; ++i) { System.out.print("Value: "); userVals[i] = scnr.nextInt(); } // Determine sum sumVal = 0; for (i = 0; i < NUM_ELEMENTS; ++i) { sumVal = sumVal + userVals[i]; } System.out.println("Sum: " + sumVal); return; } }
Answer:
There's nothing wrong with the question you posted except that it's not well presented or arranged.
When properly formatted, the program will be error free and it'll run properly.
The programming language used in the question is Java programming lamguage.
in java, the sign ";" signifies the end of each line and lines that begins with // represent comments. Using this understanding of end of lines and comments, the formatted code goes thus
import java.util.Scanner;
public class Arraysum {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
final int NUM_ELEMENTS = 8;
// Number of elements
int[] userVals = new int[NUM_ELEMENTS];
// User numbers
int i = 0;
// Loop index
int sumVal = 0;
// For computing sum
// Prompt user to populate array
System.out.println("Enter " + NUM_ELEMENTS + " integer values...");
for (i = 0; i < NUM_ELEMENTS; ++i) {
System.out.print("Value: ");
userVals[i] = scnr.nextInt();
}
// Determine sum
sumVal = 0;
for (i = 0; i < NUM_ELEMENTS; ++i)
{
sumVal = sumVal + userVals[i];
}
System.out.println("Sum: " + sumVal); return;
}
}
Also, see attachment for source file
intellectual property laws cover software and many other digital creations. Which of the following is an example of a positive impact of intellectual property laws?
Pedram, a student, can always study in any library in the United States for free because US libraries are declared intellectual property.
Pedram, a student, can always study in any library in the United States for free because US libraries are declared intellectual property.
Chanel, a homebuyer, gets a tax break because her house includes an office room which counts as intellectual property.
Chanel, a homebuyer, gets a tax break because her house includes an office room which counts as intellectual property.
Ariel studies real estate laws and uses her knowledge to help low-income families find affordable housing.
Ariel studies real estate laws and uses her knowledge to help low-income families find affordable housing.
Ricardo, a medical researcher, sells a vaccine he discovered and uses the proceeds to fund more research.
Ricardo, a medical researcher, sells a vaccine he discovered and uses the proceeds to fund more research.
Patents are an example of intellectual property rights. names of domains. industry architecture.
What does intellectual personality entail?
Abstract. When people encounter a social, political, religious, historically significant, or economically significant cultural phenomena, they use their feelings, behaviour, beliefs, attitudes, and methods of reasoning, evaluation, and decision-making to decide whether to accept or reject it. What exactly is intellectual haughtiness? A person who is otherwise clever will often be blinded to the truth by a set of traits known as intellectual hubris. Some examples of these are a lack of logical rigour and the use of preconceived assumptions or what one believes he acquired in school rather than rigorous reasoning.
To know more about rights visit:-
https://brainly.com/question/7721379
#SPJ1
Answer:
the answer is Ricardo!
Explanation:
I got it right
You want to send an email to members of your team working on a school project. In which field would you put the email addresses of the team members?
Answer: In the "Send to" section.
Explanation: When sending an email to a single person or group, make sure to type their email addresses into the "Send to" section so that it goes to the correct person/people.
What is one way a lender can collect on a debt when the borrower defaults?
Answer:
When a borrower defaults on a debt, the lender may have several options for collecting on the debt. One way a lender can collect on a debt when the borrower defaults is by suing the borrower in court. If the lender is successful in court, they may be able to obtain a judgment against the borrower, which allows them to garnish the borrower's wages or seize their assets in order to pay off the debt.
Another way a lender can collect on a debt when the borrower defaults is by using a debt collection agency. Debt collection agencies are companies that specialize in recovering unpaid debts on behalf of lenders or creditors. Debt collection agencies may use a variety of tactics to try to collect on a debt, including contacting the borrower by phone, mail, or email, or even suing the borrower in court.
Finally, a lender may also be able to collect on a debt when the borrower defaults by repossessing any collateral that was pledged as security for the debt. For example, if the borrower defaulted on a car loan, the lender may be able to repossess the car and sell it in order to recover the unpaid balance on the loan.
Explanation:
A tech class question any help will be greatly apprieciated
Why would a programmer use a software artifact, such as a flowchart?
Answer:
With a code artifact, a software programmer can test the program in detail and perfect things before launching the software. The program can easily pass the testing phase for a project management artifact without any problems if errors are corrected at the level of the coding
Explanation:
:)
What feature allows a person to key on the new lines without tapping the return or enter key
The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap
How to determine the featureWhen the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.
In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.
This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.
Learn more about word wrap at: https://brainly.com/question/26721412
#SPJ1
Discussions
My Submissions
Java 8
Curious Shubham (100 Marks)
Draft save
1
2
3
4
There are 26 groups of people in Shubham's Company. At lunchtime, they all want to get some food to eat as soon as possible. All
the groups have made plan to get some food as soon as possible. According to the plan, every person of the group will share the
description of food he/she wants to eat so that all the group members will be able to order the food on the behalf of his/her group.
All the persons stand at various locations in the queue and whoever will get the food first, will distribute the food among all the
group.
But there is a weird procedure of getting the food from a queue. People having even indices form a new queue and process repeats
until only 1 person remains in the queue. He/she will able to order some food of his choice. Shubham and his friends are curious
about the group which will be able to get some food.
Input Format
The first line of input consists of the number of people present in the Queue, N.
The second line of input consists of a string that represents the group of each person who is standing in the queue.
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
Constraints
1
The string consists of uppercase letters only.
Answer:
Explanation:
A,B,D
Algorithm:
Suppose we have n jobs with priority p1,…,pn and duration d1,…,dn as well as n machines with capacities c1,…,cn.
We want to find a bijection between jobs and machines. Now, we consider a job inefficiently paired, if the capacity of the machine its paired with is lower than the duration of the job itself.
We want to build an algorithm that finds such a bijection such that the sum of the priorities of jobs that are inefficiently paired is minimized.
The algorithm should be O(nlogn)
My ideas so far:
1. Sort machines by capacity O(nlogn)
2. Sort jobs by priority O(nlogn)
3. Going through the stack of jobs one by one (highest priority first): Use binary search (O(logn)) to find the machine with smallest capacity bigger than the jobs duration (if there is one). If there is none, assign the lowest capacity machine, therefore pairing the job inefficiently.
Now my problem is what data structure I can use to delete the machine capacity from the ordered list of capacities in O(logn) while preserving the order of capacities.
Your help would be much appreciated!
To solve the problem efficiently, you can use a min-heap data structure to store the machine capacities.
Here's the algorithm:Sort the jobs by priority in descending order using a comparison-based sorting algorithm, which takes O(nlogn) time.
Sort the machines by capacity in ascending order using a comparison-based sorting algorithm, which also takes O(nlogn) time.
Initialize an empty min-heap to store the machine capacities.
Iterate through the sorted jobs in descending order of priority:
Pop the smallest capacity machine from the min-heap.
If the machine's capacity is greater than or equal to the duration of the current job, pair the job with the machine.
Otherwise, pair the job with the machine having the lowest capacity, which results in an inefficient pairing.
Add the capacity of the inefficiently paired machine back to the min-heap.
Return the total sum of priorities for inefficiently paired jobs.
This algorithm has a time complexity of O(nlogn) since the sorting steps dominate the overall time complexity. The min-heap operations take O(logn) time, resulting in a concise and efficient solution.
Read more about algorithm here:
https://brainly.com/question/13902805
#SPJ1
all flowcharts begin with me.i am elliptical in shape.
Note that it is FALSE to state that "all flowcharts begin with me.i am elliptical in shape."
How is this so?While it is common for flowcharts to start with a shape, typically represented as an oval or rounded rectangle, it is not always an elliptical shape.
The starting point of a flowchart can vary depending on the specific system or process being depicted.
The purpose of the initial shape is to indicate the beginning or initiation of the flowchart, and it can take various forms depending on the conventions and preferences of the flowchart designer.
Learn more about flow charts at:
https://brainly.com/question/6532130
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
All flowcharts begin with me.i am elliptical in shape. True or False?
24. Describe the role of keyboard and mouse in computer? What are the fundamental similarity and differences between them?
Answer: They give input
Explanation: The keyboard and the mouse controll the computer, by giving inputs. Similarity - They both give inputs
Difference - They give inputs in different ways
Which of these statements performs real number quotient division using type casting?
double x = 35 % 10:
double x = 35 / 10;
double x = 35.0 / 10.0;
double x = (double) 35 / 10;
double x = 35.0 % 10.0;
Answer:
Double x = 35 / 10;
Explanation:
Java provides simple data types for representing integers, real numbers, characters, and Boolean types. These types are known as _ or fundamental types.
<3
Can anyone help me figure out why my if statements are not executing properly? When the program executes with 7 as the value for num it should be executing the first line, but instead it goes to the third and displays, " a single digit."
public static String numberInfo(int num){
//TODO student
String numInfo;
if (num == 7) {
numInfo = "lucky sevens!";
}
if (num == 42) {
numInfo = "the answer to life the universe and everything.";
}
if (num < 10) {
numInfo = "a single digit.";
}
else {
numInfo = "a positive number.";
}
return numInfo;
}
Answer:
For the value of 7 of num, there are actually two if statements that are true and their contained code is executed.
So your line numInfo = "lucky sevens!"; is executed for sure, but then numInfo gets overwritten with by numInfo = "a single digit.";
To fix it, you have to decide how you want the program to behave, since technically, both numInfo's are equally correct.
- if you want to execute at most one if condition, chain them together like if (...) { ... } else if(...) { ... } etc.
- if you want to return multiple numInfo's, turn it into a collection where you add strings
A loop that will output every other name in the names list.
A loop that will output only the positive numbers in the numbers list.
A loop that will output the sum of all the values in the numbers list.
A loop that will output only the numbers that are odd.
A loop that will output only the names that come before "Thor" in the alphabet from the names list.
A loop that will find the maximum or minimum value in the numbers list. This algorithm requires an additional variable that is assigned to the first element in the list. Then, in a loop compare each element to the variable. If the element is > (for max) or < (for min), assign the variable to the element. After the loop, print the variable.
in python
PLEASE HELPPPP
Answer:
names = ['Peter', 'Bruce', 'Steve', 'Tony', 'Natasha', 'Clint', 'Wanda', 'Hope', 'Danny', 'Carol']
numbers = [100, 50, 10, 1, 2, 7, 11, 17, 53, -8, -4, -9, -72, -64, -80]
for index, element in enumerate(names):
if index % 2 == 0:
print(element)
for num in numbers:
if num >= 0:
print(num, end = " ")
count = 0
for i in numbers:
count += i
avg = count/len(numbers)
print("sum = ", count)
print("average = ", avg)
for num in numbers:
if num % 2 != 0:
print(num, end = " ")
Explanation:
I'm stuck on the last two.. I have to do those too for an assignment.
If you need to change the typeface of a document, which menu will you choose?
Format menu
Format menu is used to change typeface of a document
You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!
Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.
Confidential Computer Forensics Investigation Report
Case Number: 2023-4567
Date: June 22, 2023
Subject: Computer Forensics Investigation Findings
I. Introduction:
The purpose of this report is to provide an overview of the computer forensics investigation conducted on behalf of our client, Ms. [Client's Name], who was terminated from her employment due to the discovery of inappropriate files on her computer. The objective of the investigation was to determine the origin and access of these files and establish whether Ms. [Client's Name] was involved in their creation or dissemination.
II. Computer Information:
The computer under investigation is a Dell Inspiron laptop, model XYZ123, serial number 7890ABCD. It runs on the Windows 10 operating system and was assigned to Ms. [Client's Name] by her former employer, [Company Name]. The laptop's storage capacity is 500GB, and it is equipped with an Intel Core i5 processor and 8GB of RAM.
III. Access and Usage:
During the investigation, it was determined that Ms. [Client's Name] was the primary user of the laptop. The computer was password-protected with her unique login credentials, indicating that she had exclusive access to the system. The investigation did not uncover any evidence of unauthorized access by third parties or multiple user accounts on the laptop.
IV. Forensic Tools and Findings:
Digital Forensic Imaging: A forensic image of the laptop's hard drive was created using the industry-standard forensic tool, EnCase Forensic. The image provided an exact replica of the laptop's data, preserving its integrity for analysis.
Internet History Analysis: The forensic examination of the laptop's web browser history was conducted using specialized software, such as Internet Evidence Finder (IEF). This analysis revealed that Ms. [Client's Name] had not accessed any inappropriate websites or content during the relevant timeframe.
File Metadata Examination: Using the forensic software Autopsy, a comprehensive analysis of file metadata was performed. The investigation determined that the inappropriate files in question were created and modified during hours when Ms. [Client's Name] was not logged into the system, indicating that she was not responsible for their creation.
Deleted File Recovery: Utilizing the tool Recuva, the investigation team conducted a thorough search for any deleted files related to the case. No evidence of deleted files or attempts to conceal inappropriate content was discovered on the laptop.
V. Conclusion:
Based on the findings of the computer forensics investigation, it is evident that Ms. [Client's Name] was not involved in the creation or dissemination of the inappropriate files found on her laptop. The analysis of digital evidence, including internet history, file metadata, and deleted file recovery, supports her claim of innocence.
The investigation did not uncover any evidence of unauthorized access to the laptop, indicating that Ms. [Client's Name] was the sole user of the system. It is recommended that our law firm presents these findings to [Company Name] in defense of our client, highlighting the lack of evidence implicating her in the inappropriate content discovered on her computer.
Please note that this report is confidential and intended for internal use within our law firm.
Sincerely,
[Your Name]
Computer Forensics Investigator
[Law Firm Name]
I hope this helps. Cheers! ^^
explain the purpose of the bus in a computer system
Answer:
so here it is
Explanation:
The computer system bus is the method by which data is communicated between all the internal pieces of a computer. It connects the processor to the RAM, to the hard drive, to the video processor, to the I/O drives, and to all the other components of the computer.Mainly the BUS is used to allow the passage of commands and data between cpu and devices
Which of the following is NOT an example of editing?
O Adjusting photos
O Cutting video and audio
O Proofreading written content
O Designing graphics
Answer:
ang answer po at proofreading written
content
Explanation:
if I wrong please correction me!