Answer:
Here is the Python program along with the comments of program design
#this program is designed to compute the average quiz grades for a group of five students
students = ["Alex", "John", "David", "Joseph", "Mathew"] #create a list of 5 students
grades = [] # create an empty list to store the grades in
for student in students: #loop through the students list
grade = input("Enter the quiz grade for "+student+": ") #prompt the user for the quiz grade of each student
#store the input grades of each student to grade
grades.append(int(grade)) # convert the grade to an integer number and append it to the list
print("Grades are:", grades) #display the grades of five students
average = sum(grades) / len(grades) #compute the average of five grades
print("The average of grades is:", average) #display the average of five grades
highest = max(grades) #compute the highest grade
print("The highest grade is:", highest) #print highest grade
Explanation:
The program first creates a list of 5 students who are:
Alex
John
David
Joseph
Mathew
It stores these into a list named students.
Next the program creates another list named grades to store the grades of each of the above students.
Next the program prompts the user for the quiz grade for each of the five students and accepts input grades using input() method. The statement contains student variable so each prompt includes the name of the student whose quiz grade is to be input. Each of the grades are stored in grade variable.
Next the append() method is used to add each of the input grades stored in grade to the list grades. The int() method is used to first convert these grades into integer.
Next print() method is used to display the list grades on output screen which contains grades of 5 students.
Next the average is computed by taking the sum of all input grades and dividing the sum by the total number of grades. The sum() method is used to compute the sum and len() method is used to return the number of grades i.e. 5. The result is stored in average. Then the print() method is used to display the resultant value of average.
At last the highest of the grades is computed by using max() method which returns the maximum value from the grades list and print() method is used to display the highest value.
The screenshot of the program and its output is attached.
How many components does a network have ?
Answer:
There are three primary components to understanding networks: 1. Physical Connections; 2. Network Operating System; and 3. Application Component. Hope this helps!
Explanation:
If a program compiles fine, but it produces an incorrect result, then the program suffers from _______________.
If a program compiles fine, but it produces an incorrect result, then the program suffers from Logic Error.
What is program?A program has been the set of the instructions that the computer can follow that are written in a programming language. The size of the computer program affects the likelihood that an error may occur. To create an executable that a computer can run, a C program needs to be run through a C compiler. Programs are collections of instructions that a computer follows. Function is an ordered, reusable code unit.
When a program is syntactically sound but has a bug that is only discovered during program execution, it is said to have a runtime error. The Java compiler is unable to catch these errors during compilation; instead, the Java Virtual Machine (JVM) only notices them when the application is running. Runtime problems may occur when a website uses HTML code that is incompatible with a web browser's capabilities.
Therefore, if a program compiles fine, but it terminates abnormally at runtime, then the program suffers a runtime error.
To learn more about program, refer to the link below:
brainly.com/question/11023419
#SPJ2
how do we use electricity?
Answer:
People use electricity for lighting, heating, cooling, and refrigeration and for operating appliances, computers, electronics, machinery, and public transportation systems.
Answer:
People use electricity for lighting, heating, cooling, and refrigeration and for operating appliances, computers, electronics, machinery, and public transportation systems.
mark me a brainlistDescribe your Johari Window. Which area or areas are largest for you? Smallest?
Question 2 (1 point) What should the main body paragraphs of a written document include?
identification of the subject
an outline
facts, statements, and examples a
summary of key points
The key concept or subject that will be covered in that specific paragraph should be introduced in the first sentence of that paragraph. Providing background information and highlighting a critical point can accomplish.
What information should a body paragraph contain?At a minimum, a good paragraph should include the following four components: Transition, main idea, precise supporting details, and a succinct conclusion (also known as a warrant)
What constitutes a primary body paragraph in an essay?The theme sentence (or "key sentence"), relevant supporting sentences, and the conclusion (or "transitional") sentence are the three main components of a strong body paragraph. This arrangement helps your paragraph stay on topic and provides a clear, concise flow of information.
To know more about information visit:-
https://brainly.com/question/15709585
#SPJ1
If you were at the front of a long line of people, stepped onto a chair and took a
picture of the line going back in the distance, what is the best F-Stop to use if you
want only the people in the middle to be in focus?
4. What information is in the payload section of the TCP segments?
The actual data being transferred, such as the content of a web page, an email message, or a file transfer, is contained in the payload part of the TCP segments.
The content of a TCP segment is what?A segment header and a data chunk make up a TCP segment. There are ten required fields and one optional extension field in the segment header (Options, pink background in table). The payload data for the application is carried in the data section, which comes after the header.
What is the TCP Wireshark payload size?In established mode, a packet's maximum payload size is 1448 bytes (1500 - 20 IP header - 32 TCP header).
To know more about data visit:-
https://brainly.com/question/29851366
#SPJ1
Create a python program that asks the user to input the subject and mark a student received in 5 subjects. Output the word “Fail” or “Pass” if the mark entered is below the pass mark. The program should also print out how much more is required for the student to have reached the pass mark.
Pass mark = 70%
The output should look like:
Chemistry: 80 : Pass: 0% more required to pass
English: 65 : Fail: 5% more required to pass
Biology: 90 : Pass: 0% more required to pass
Math: 70 : Pass: 0% more required to pass
IT: 60 : Fail: 10% more required to pass
The program asks the user to enter their scores for each subject, determines if they passed or failed, and calculates how much more they need to score in order to pass. The percentage needed to pass is never negative thanks to the use of the max() method. The desired format for the results is printed using the f-string format.
how do you get The special ending in final fight 2 for super nintendo
it is really interesting on.....................
these are tags that are inside the html tag including head and body tags.
a.head tag
b.nested tag
c.body tag
d.article tag
don't know the answer
sorry sis
Answer:
The answer is C (body tags)
Explanation:
The <body> element contains all the contents of an HTML document, such as text, hyperlinks, images, tables, lists, etc. The <head> element is a container for all the head elements. The <head> element must include a title for the document, and can include scripts, styles, meta information, and more.
Maintenance is classified into how many categories ?
Answer:
hope it helps..
Explanation:
four types.
More information: Adaptive, corrective, perfective and preventive are the four types of software maintenance.
PLEASE THANK MY ANSWER
As you learned in the Learning Activity titled, "What is a Database?" databases are used by organizations to manage large amounts of data. Assume you are the database administrator for a small company and you have been asked to merge data from a new supplier into your inventory. Based on the various types of databases discussed in the Learning Activity titled, "Knowing Databases", what type of database would be most appropriate for your company and why? What factors would influence your decision? What are some considerations you would consider if you want to ensure your database is scalable and could support future growth?
For the given scenario, a relational database would be the most suitable choice
How can this be used?Structured data management and intricate interconnections between entities, such as suppliers and inventory items, are efficiently handled by relational databases.
The decision is being influenced by various factors such as the coherence of data, its reliability, and the potential to execute intricate inquiries. In order to guarantee the potential for expansion and accommodate future development, it is crucial to make thoughtful decisions such as selecting a database management system that facilitates horizontal scaling, enhancing the design of the schema, improving indexing and query efficiency, and supervising the system for performance adjustments and capacity forecasting.
Implementing these measures would facilitate the effective management of growing amounts of data without compromising scalability.
Read more about relational database here:
https://brainly.com/question/13262352
#SPJ1
When a person’s personal information is collected by other parties, it refers to the issue of_______.
Answer:
The answer should be privacy
Explanation:
Answer: it refers to the issue of version control privacy personality so
The answer should be privacy
Explanation:
suppose you have a language with only the three letters a; b; c, and they occur with frequencies .9, .09, and .01, respectively. the ciphertext bcccbcbcbc was encrypted by the vigen`ere method (shifts are mod 3, not mod 26). find the plaintext (note: the plaintext is not a meaningful english message.)
The correct answer is One letter in the ciphertext corresponds to several letters in the plaintext; a character appears in a language. makes frequency analysis more effective...
Cipher, by definition, is an algorithm that transforms plain text into ciphertext. It is the unintelligible result of a cryptographic method. Ciphertext can also sometimes be referred to by the word "cypher." It takes a key to translate ciphertext into plain text before it can be deciphered. The output of encryption techniques, often known as cyphers, is ciphertext. When a person or device lacking the cypher cannot read the data, the data is said to be encrypted. To decode the data, they or it would require the cypher. By the kind of input data, cyphers can be divided into two categories: block cyphers, which encrypt blocks of data with a set size, and stream cyphers, which encrypt streams of data continuously.
To learn more about ciphertext click on the link below:
brainly.com/question/30143645
#SPJ4
Your friend Alicia says to you, “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I don’t think I’m going to do that.” How would you respond to Alicia? Explain.
Since my friend said “It took me so long to just write my resume. I can’t imagine tailoring it each time I apply for a job. I will respond to Alicia that it is very easy that it does not have to be hard and there are a lot of resume template that are online that can help her to create a task free resume.
What is a resume builder?A resume builder is seen as a form of online app or kind of software that helps to provides a lot of people with interactive forms as well as templates for creating a resume quickly and very easily.
There is the use of Zety Resume Maker as an example that helps to offers tips as well as suggestions to help you make each resume section fast.
Note that the Resume Builder often helps to formats your documents in an automatic way every time you make any change.
Learn more about resume template from
https://brainly.com/question/14218463
#SPJ1
the roles of I c t play in banking
Answer: Information and communications technology
Explanation: Information and communications technology has played a significant role in banking over the years. In fact ICT has made the banking industry more competitive. ICT allows the banks to cater to the needs of customers by strengthening their internal control systems which are then backed by effective communications mechanisms.
Question 7 (True/False Worth 3 points)
(01.02 LC)
High-level programming languages are considered less readable by humans because they are written in the computer's native machine code.
True
False
Question 8(Multiple Choice Worth 3 points)
(02.04 LC)
What is one way programmers notify users of program updates?
Magazine advertisements
Public service announcements
Recall notices
Version upgrades
Question 9(Multiple Choice Worth 3 points)
(02.04 LC)
What is the most effective way to document version control and change management?
Colorful posters
Detailed notes
Push notifications
Text messages
Question 10 (True/False Worth 3 points)
(01.04 LC)
In Python, the first character in a string has an index position of one.
True
False
Question 11(Multiple Choice Worth 3 points)
(02.04 MC)
Monica has been assigned to a project team that is responsible for creating a program that will involve calculating the square root of numbers. How can Python help the team rapidly develop this program?
Python has built-in libraries that eliminate the possibility of errors, so the team can skip the testing phase.
Python has built-in libraries that automatically make design improvements based on user feedback, so the team does not have to maintain the code.
Python has a built-in Math Module with a sqrt() function, so the team does not have to create code from scratch.
Python has a built-in Turtle Graphics Module with a forward() function, so the team can move along quickly.
Question 12(Multiple Choice Worth 3 points)
(03.02 MC)
Read the following code:
for count in range(80);
leo.forward(count * 2)
leo.left(count + 2)
There is an error in the for loop. What should be fixed?
Begin the statement with the proper keyword to start the loop
Change the semicolon to a colon after the statement
Place the loop condition outside the parentheses
Replace the parentheses around the range with quotation marks
Question 13 (True/False Worth 3 points)
(01.03 LC)
A runtime error means there is a problem with the computer's hardware, making it impossible to execute a program.
True
False
Question 14(Multiple Choice Worth 3 points)
(03.02 LC)
Why would a programmer use a for loop in Python?
To print an action a certain number of times
To print an action when a condition is true
To repeat an action a certain number of times
To repeat an action when the test condition is false
Question 15(Multiple Choice Worth 3 points)
(02.04 MC)
Tanisha and Raj are using the software development life cycle to develop a career interest app. They ran their code for the first time and have the results of their test. What should the team do next?
Analyze the scope of the project
Design the program by writing pseudocode
Identify bugs and document changes
Write the program code
Question 16(Multiple Choice Worth 3 points)
(02.04 MC)
How are the waterfall and agile methods of software development similar?
Both methods allow project teams to complete small portions of the entire project in small sprints and work on different steps simultaneously.
Both methods focus on development rather than planning, in order for project teams to work more quickly.
Both methods have project teams work on one step at a time and move on when the previous step is completed and approved.
Both methods require documentation so project teams stay on track and keep control over what version of the project they are working on.
Question 17(Multiple Choice Worth 3 points)
(01.04 LC)
What is the purpose of a string variable in Python?
To calculate values using characters
To create variable names with characters
To place value on certain characters
To represent a sequence of characters
Question 18(Multiple Choice Worth 3 points)
(01.03 LC)
Which of the following is an example of a runtime error in programming?
Not using quotation marks and parentheses to print a string literal
Printing an inaccurate fact, like print("Dogs have wings.")
Trying to perform an impossible task, like 5 / 0
Using camelcase when a variable name contains two or more words
Answer:
Question 7: false
Question 8: 4th answer
Explanation:
Answer:
7. False
8.Version upgrades and emails and push notifications
10.False
14. To repeat an action a certain number of times.
15. Identify bugs and document changes
16.Waterfall project teams work on one step of the development at a time, while agile teams develop smaller portions of the entire project in small sprints.
17. To create variable names with characters
Explanation:
I took test
does anyone know what blue holler is if so, what are the new tracks?
Answer:
No
Explanation:
No I don't know about it sorry
Suppose E and E2 are two encryption methods. Let K1 and K2 be keys and consider the double encryption EK1,K2(m) = E1k1,(E2k2(m)). (a) Suppose you know a plaintext-ciphertext pair. Show how to per- form a meet-in-the-middle attack on this double encryption. (b) An affine encryption given by x H ax + B (mod 26) can be re- garded as a double encryption, where one encryption is multiply- ing the plaintext by a and the other is a shift by B. Assume that you have a plaintext and ciphertext that are long enough that a and ß are unique. Show that the meet-in-the-middle attack from part (a) takes at most 38 steps (not including the comparisons between the lists). Note that this is much faster than a brute force search through all 312 keys.
The meet-in-the-middle attack is a way to perform a double encryption of EK1, K2(m) = E1k1,(E2k2(m)) by knowing a plaintext-ciphertext pair.
A double encryption is used to make it more difficult to break an encryption scheme. The meet-in-the-middle attack is a way to break the encryption. The steps to perform a meet-in-the-middle attack are as follows:Take the plaintext and encrypt it using all possible keys of E1k1.Create a list of the plaintext-ciphertext pairs for each key.Take the ciphertext and decrypt it using all possible keys of E2k2.Create a list of the ciphertext-plaintext pairs for each key. Sort both lists by the ciphertext.The two lists are now sorted by the same values. Go through both lists and look for matching ciphertexts. When a matching ciphertext is found, the corresponding plaintext is the result of the meet-in-the-middle attack.The affine encryption given by x H ax + B (mod 26) can be regarded as a double encryption. One encryption is multiplying the plaintext by a, and the other is shifting by B. Assume that you have a plaintext and ciphertext that are long enough that a and ß are unique. The meet-in-the-middle attack from part (a) takes at most 38 steps (not including the comparisons between the lists). Note that this is much faster than a brute force search through all 312 keys.for more such question on encryption
https://brainly.com/question/20709892
#SPJ11
g Write a function named vowels that has one parameter and will return two values. Here is how the function works: Use a while loop to determine if the parameter is greater than 1. If it is not greater than 1, do the following: Display a message to the user saying the value must be greater than 1 and to try again. Prompt the user to enter how many numbers there will be. Use a for loop that will use the parameter to repeat the correct number of times (if the parameter is 10, the loop should repeat 10 times). Within this for loop, do the following: Generate a random integer between 65 and 90 Convert this integer to is equivalent capital letter character by using the chr function. If num is the variable with this integer, the conversion is done like this: ch
Why does inclusion matter in the design of technologies or digital media?
Inclusion matters in the design of technologies or digital media because it allows for a wider range of people to be able to access and use the technology or media.
What is digital media?
Any type of material that is distributed through electronic means is considered digital media. Electronic devices can be used to create, view, modify, and distribute this type of material. Software, video games, movies, websites, social media, or online advertising are all examples of digital media. Despite the fact that digital media is a part of everyday life, business owners still feel uneasy about switching to internet marketing services in place of traditional paper advertising. However, given the ongoing changes in technology, it is impossible to ignore the impact that digital media has on our way of life. It transforms how we regularly engage with one another, educate ourselves, and amuse ourselves. And as a result of the this influence, the corporate world is propelled from the industrial to the information ages by digital media.
When technology or digital media is designed with inclusion in mind, it takes into account the needs of a wide range of users, including those with disabilities. This can make it possible for everyone to use the technology or media, regardless of their ability level.
To learn more about digital media
https://brainly.com/question/25356502
#SPJ13
What most defines a community in the digital age?
A. Availability
B. Location
C. Language
D. Interests
The option that most defines a community in the digital age is Interests.
What is Communities in a Digital Age?This is known to be a domain of people that has common interest that links and work together.
Note that the option that most defines a community in the digital age is Interests as they all have one common goal.
Learn more about community from
https://brainly.com/question/2748145
#SPJ2
Can someone please help me?m
Answer:
(_(
Explanation:
The rules of the new game were undefined.
We couldn't figure out how to play it, so we
chose another game.
made too easy
not explained
not written
made very long
X
Answer: not written
Explanation: The game should have data for it and it if it was undefined maybe the creator had something missing or a command messed up.
What is the benefit of making an archive folder visible in the Outlook folder list?
This makes the folder available on the Office 365 website.
The folder can be password protected to increase security.
Archived items in the folder are accessible within the Outlook client.
Archived items in the folder can be shared with other Outlook users.
Answer:
a
Explanation:
Match each number system to set of symbols used to represent numbers in that system.
binary
hexadecimal
Digits
the digits 0 to 9
0 and 1
decimal
the digits 0 to 9 and the letters from A to F
Reset
Next
Number System
>
Answer:
1. The digits 0 to 9 --> decimal
3. 0 and 1 --> binary
2. The digits 0 to 9 and the letters from A to F --> hexadecimal
which of the following filter functions properly removes all green and blue from a pixel and returns the modified color tuple?
pixel[RED] = 0; pixel[GREEN] = 1; pixel[BLUE] = 2; function remove Green And Blue(pixel) pixel[GREEN] = 0; pixel[BLUE] = 0; return pixel; The following filters remove all green and blue from a pixel and return the changed color tuple.
A pixel with an R GB value of (255, 0, 0) is red, a pixel with an RGB value of (0, 255, 0) is green, and a pixel with an RGB value of (0, 0, 255) is blue. (255, 255, 255) is white, whereas (0, 0, 0) is black. The eye perceives a broad spectrum of colors when the RGB value of the three color constituents is varied. ASCII encodes characters into binary data of seven bits. Because each bit may be either a 1 or a 0, there are a total of 128 potential possibilities. The value of a pixel in an 8-bit grayscale picture ranging from 0 to 255. A pixel's value at any position corresponds to the intensity of light photons reaching that spot. While 256 characters is enough for expressing English characters, it is significantly too little to carry every character in other languages such as Chinese or Arabic. Unicode uses 16 bits and has a character set of over 65,000 characters. This makes it more appropriate for certain circumstances.
Learn more about R GB from here;
https://brainly.com/question/13451620
#SPJ4
Big Data, Apple Pie, and the Future In this unit, you were introduced to various kinds of software, particularly databases. Databases have made it possible to gather and analyze vast amounts of data. The study of that data has led to some surprises, such as the real favorite flavor of pie for most people—it’s not what you might think! Watch the video Big Data Is Better Data. After you finish watching the video, answer the following questions: Were you surprised by the “pie data”? Is it true for you, your family, and your friends? Why or why not? The speaker argues that more data allow us to see new things. Think about your favorite hobby—skateboarding, listening to music, or whatever you most enjoy doing. What kinds of insights could big data provide about your hobby? How might these insights make things better for you? Are there any ways that big data could make your hobby worse? The author mentions several challenges facing the world, including poverty and climate change. How might big data help us solve these problems? Think of—and explain—one or more ways that society could use big data, other than the ones mentioned in the video. Think for a moment about the potential problems with big data that the speaker mentioned: Will we treat people unfairly for crimes they haven’t yet committed? Will most jobs disappear due to automation? Can we protect data from people who shouldn’t have it? Choose one of these topics and research it by reading two articles about it. Here are three sources to use to begin your research: Tween Tribune Newsela Channel One News If you are having a difficult time finding what you want, try searching for “data privacy,” “data breach,” “automation and jobs,” “crime and technology,” or “robots and jobs.” Include the following in your answer to the question you choose: Screenshots of the two articles that you read The question that you chose to answer Your answer to the question Three reasons that explain your answer to the question; use evidence from your research to support your op
Answer:
I want to answer the 1st question. It asks, “Will we treat people unfairly for crimes they haven’t committed?” Well, of course, that’s a 100% chance. But, some people forget that people treat people unfairly for crimes they haven’t committed. Some people stay in jail for up to 35 years and are then released because they are innocent. Yes, computers will make mistakes, but the probability is much, much smaller than a human.
Explanation:
The role of ICT In government.
Answer:Communication between a government and its citizens can happen in real-time since messages are delivered instantaneously.
E-Government uses ICT for the development of more efficient and more economical government.
Explanation:
Using Phyton
Write a program with the following functions.
function 1: Accepts 2 strings as arguments. returns true if the second string is a part of the first string.
def something(string1, string2):
return True if string2 in string1 else False
This would be the most concise way of writing this function.