Answer:
special_num = int(input())
if special_num == -99 or special_num == 0 or special_num == 44:
print('Special number')
else:
print('Not special number')
Explanation:
#get input
special_num = int(input())
#if function to evaluate true or false(aka Boolean)
if special_num == -99 or special_num == 0 or special_num == 44:
#true evaluation
print('Special number')
#false evaluation
print('Not special number')
The program evaluates the number inputted by a user, checks if it is one of three special numbers and displays the appropriate message. The program is written in python 3 ;
special_num = int(input('enter number : '))
#allows user to input an integer value which is assigned to the variable named special number
if(special_num == -99) or (special_num ==0) or (special_num == 44):
#checks if the inputted value is one of the three special numbers using the assignment operator '==' and 'OR'
print('special number')
# if the condition evaluates to true, display the message ;special number
else :
print('Not a special number')
#if otherwise, display the message, not a special number.
Learn more :https://brainly.com/question/18929518
Which of the following is classified as a workgroup information system?
The Monterey Bay Aquarium's tool that helps staff communicate, organize, plan, schedule, and track jobs is classified as a workgroup information system.
What is a workgroup information system?A workgroup information system (WIS) can be defined as a system that is designed and developed to provide support for team members during a group decision-making process.
The main purpose of a workgroup information system (WIS) is to enhance and promote the free flow of information among the members of a team.
Read more on workgroup information system here: https://brainly.com/question/25226643
#SPJ1
Tại sao xe chỉ sản xuất ra 1996cc mà không phải là 2000cc?
Answer:
hjfkkkjgfyuu7oiuygfffggg
Answer:
dhydufjfjf
Explanation:
djudififyliffyktkydyykkykykttjjtykm
If 294.00 units are made and demand is 287.00. Your fixed expenses are $1257.00. Your variable cost per unit is $2.25. Your Sales price is 6.49. The variable expenses for the day is?
If the 294.00 units are made and the cost per unit is $2.25 then variable expenses for the day is $661.5.
Given that 294.00 units are made and the variable cost per unit is $2.25
We have to find variable expenses for the day.
Total variable expenses for the day are a product of the output and the variable cost per unit.
So the variable expenses = no. of output x variable cost per unit
Variable expenses = 294 x 2.25
Variable expenses = 661.5
Hence the variable expenses for the day is $661.5
Learn more about variable expenses here: https://brainly.com/question/8225307
#SPJ10
When an original idea that involves some creative expression is put into a fixed medium, such as being written down on paper or drafted on canvas using paint.
An original idea that involves some creative expression and is put into a fixed medium is known as a "work of authorship." This can include things like writing a book, painting a picture, or composing a song.
Once a work of authorship is put into a fixed medium, it is protected by copyright law. This means that the creator of the work has exclusive rights to control how the work is used, reproduced, and distributed.
It is important to remember that copyright protection only applies to the original idea and creative expression that is put into a fixed medium, not to the underlying idea itself.
For example, if someone writes a book about a boy wizard going to a school for magic, that specific story is protected by copyright, but the idea of a boy wizard going to a school for magic is not.
Learn more about copyright: https://brainly.com/question/27516398
#SPJ11
To prepare his book report on The Adventures of Tom Sawyer, Anand must research life on the Mississippi River in the 1800s. Which strategy should Anand use in examining both the book and his research?
david is troubleshooting a new android application his company is creating. he has installed the app on an android tablet and needs to see observe diagnostic information about the app and its network connections while it is running to identify and correct a software bug. which of the following should david enable on the device?
David enables the power user in his device in order to troubleshoot a new android application.
What is Troubleshooting?Troubleshooting may be defined as a systematic and well-arranged procedure that is used to locate the cause of a fault in a computer system and correct the relevant hardware and software issues.
The process of approaching problem-solving using a logical and methodical approach is essential to a successful resolution. The group of power users includes those rights and permission that are essentially required to permit the computer-wide setting in order to install drivers.
Therefore, David enables the power user in his device in order to troubleshoot a new android application.
To learn more about Troubleshooting, refer to the link:
https://brainly.com/question/14394407
#SPJ1
according to stone and chiseri-strater, a(n) can be defined as any self-identified group of people who share language, stories, rituals, behaviors, and values group of answer choices culture artifact subculture all of the above
Stone and Chiseri-Strater define a(n) as any self-identified group of persons who share all of the aforementioned characteristics.
What are rituals ?
Rituals are a set of traditional activities that are performed in a certain way and at certain times. They are often associated with religious or spiritual practices, but they can also be secular in nature. Rituals can be performed individually or as part of a larger community. Rituals can be used for purposes such as celebrating special occasions, honoring the dead, or expressing thanks and appreciation. Common rituals include ceremonies, prayers, offerings, fasting, feasting, and other activities. Rituals often involve the use of symbols, music, and other forms of art to express meaning and evoke emotion. In addition, rituals are often used to mark important milestones in an individual's life, such as coming-of-age ceremonies.
To know more about Rituals
https://brainly.com/question/6202322
#SPJ4
Write a C++ program that creates a word-search puzzle game where the user should find the hidden
words in a square array of letters. Your program should first read from the user their choice for the
game: a) easy, b) medium, c) hard, d) exit the game. If the user selects easy, then the 6x6 puzzle,
shown in Figure 1, will be generated and displayed to the user. If the user selects medium, then the
14 x 14 puzzle shown in Figure 2 should be generated and displayed and lastly, if the user selects
the hard choice, the program should generate a random puzzle, filling the square array of 20 x 20
using random characters/words.
Then your program should repeatedly read from the user, a word to be searched for in the puzzle,
the row and column number where the word starts from and which orientation to search for. The
words can be searched vertically (top to bottom), horizontally (left to right), diagonally (upper left
to lower right) and diagonally (upper right to lower left). The program should check if the column
and row number given by the user are inside the puzzle (array) boundaries, otherwise should display
an error message and ask the user to enter another position. For each word the user inputs, the
2
program should display whether the word was found or not. The program should stop reading
words when the user will press “X” and then the total number of found words will be displayed to
the user.
The program should repeatedly display the game menu until the user will select to exit the game
C++ program to create a word-search puzzle game. #include <iostream> #include <cstring> using namespace std; int main() { char input; cout << "Choose.
What is program technology?Any technology (including, without limitation, any new and practical process, method of manufacture, or composition of matter) or proprietary material developed or first put into use (actively or constructively) by either Party in the course of the Research Program is referred to as "Program Technology."
A 33 board with 8 tiles (each tile has a number from 1 to 8) and a single empty space is provided. The goal is to use the vacant space to arrange the numbers on the tiles so that they match the final arrangement. Four neighboring (left, right, above, and below) tiles can be slid into the available area.
Therefore, C++ programs create a word-search puzzle game. #include <iostream> #include <cstring>
Learn more about the program here:
https://brainly.com/question/11023419
#SPJ1
What is the next step to solve a problem with video drivers after Windows reports it cannot find a driver that is better than the current driver
Answer:
Explanation:
In such a situation like this one, the first step would be to identify the brand and model of the video card itself. Once you find the brand and model you can simply go over to the brand manufacturer's website and go to the driver downloads section. There you simply search for the model series of the video card in your computer and download/install the latest version. The brand manufacturer's official website always has the most up to date drivers for all of their hardware.
Can someone give me answers for 1-4
Answer:
you want me help u with this one?
2. The different amount of shades of color
3. The artist had given every marvel or DC or villian the color that fit them and the texture is also very nice in the picture.
4. The artist maybe could make the pic a little bit more high quality cause in the image is sort of blurry and you cant really see the further people that well.
Who first demonstrated the computer mouse?
O Microsoft
O Alan Turing
O Douglas Engelbart
O Apple, Inc.
FAST PLEASEEE THANK YOUUU
Answer:
C. Douglas Engelbart
Explanation:
Answer: C
Explanation:
a democratic government has to respect some rules after winning the elections. Which of these points is not a part of those rules
After coming to power, a democratic administration is bound to follow certainrules and regulations. And Office-bearers are not accountable is not a part of those rules.
How is this so?In a democratic administration,office-bearers are indeed accountable as they are bound by rules and regulations.
The accountability ensures transparency,ethical conduct, and adherence to the principles of democracy.
Office-bearers are expected to uphold the laws and serve the interests of the people they represent.
Learn more about democratic administration at:
https://brainly.com/question/31766921
#SPJ1
What is the best definition of a programming language? A. The language that developers use to communicate with one another about software design B. The internal language a computer uses to communicate with other computers and devices C. A language that instructs a computer how to carry out functions D. A complex thought process that breaks down difficult problems to find their solutions
The best definition of a programming language include the following: C. A language that instructs a computer how to carry out functions.
What is programming?In Computer technology, programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) in order to instruct a software on how to perform a specific task on a computer system.
Additionally, some examples of programming language include the following:
FORTRANBASICC++JavaPythonIn conclusion, we can reasonably infer and logically deduce that a programming language is designed and developed to instruct a computer system on how to carry out its functions.
Read more on programming languages here: brainly.com/question/26497128
#SPJ1
During an investigation of a cybercrime, the law enforcement officers came across a computer that had the hard drive encrypted. Chose the best course of action they should take to access the data on that drive.
a. Use image filtering techniques to see what's behing the encrypted files.
b. Try to convince the owner of the computer to give you to decryption key/password.
c. Identify the encryption algorithm and attempt a brute force attack to get access to the file.
d. Disconnect the hard drive from power so the encryption key can be exposed on the next power up.
e. Try to copy the drive bit by bit so you can see the files in each directory.
Answer:
b. Try to convince the owner of the computer to give you to decryption key/password.
Explanation:
Encrypted hard drives have maximum security and high data protection. to access them you need to enter a password to unlock them.
The image filtering technique is a method that serves to selectively highlight information contained in an image, for which it does not work.
The encryption algorithm is a component used for the security of electronic data transport, not to access data on an encrypted hard drive.
The encryption key is used in encryption algorithms to transform a message and cannot be exposed by disconnecting the hard drive from its power source.
difference between a lesson plan and scheme of work
SORRY BUT THERE IS No difference at all
Every workplace should have an emergency plan of action.
Please select the best answer from the choices provided
T
F
It is true that every workplace should have an emergency action plan.
What is an emergency action plan (EAP)?
A written document required by specific OSHA standards is an emergency action plan (EAP). [29 CFR 1910.38(a)] An EAP's purpose is to facilitate and organize employer and employee actions in the event of a workplace emergency.
During an emergency, well-developed emergency plans and proper employee training (so that employees understand their roles and responsibilities within the plan) will result in fewer and less severe employee injuries and less structural damage to the facility.
A poorly prepared plan will almost certainly result in a disorganized evacuation or emergency response, causing confusion, injury, and property damage.
So, the correct answer to the question is True (T).
To know more about the emergency action plan, visit: https://brainly.com/question/3238467
#SPJ1
: "I have a customer who is very taciturn."
The client typically communicates in a reserved or silent manner
B. He won't speak with you.
Why are some customers taciturn?People who are taciturn communicate less and more concisely. These individuals do not value verbosity. Many of them may also be introverts, but I lack the scientific evidence to support that assertion, so I won't make any inferences or make conclusions of that nature.
The phrase itself alludes to the characteristic of reticence, of coming out as distant and uncommunicative. A taciturn individual may be bashful, naturally reserved, or snooty.
Learn more about taciturn people here:
https://brainly.com/question/30094511
#SPJ1
This project assumes that you have
completed Project 1. Place several
Student objects into a list and
shuffle it. Then run the sort
method with this list and display all of
the students' information. Print to the
console the unsorted list first of all
students followed by the sorted list of
all students
Answer:ty
Explanation:ty
The following code shown in the image can be utilized to implement the required functionality, assuming Project 1 entailed developing a class called "Student" with attributes like name, ID number, and GPA.
What is Coding?The process of developing, writing, testing, and maintaining software programme is known as coding, commonly referred to as computer programming. It entails writing code or instructions that a computer can comprehend and use to carry out a certain operation or address an issue.
In the illustrative code, a class called "Student" is first created and given attributes for name, ID number, and GPA. After that, we make a list of some sample students. The student list is shuffled using the random.shuffle() technique.
The list of students is then sorted based on GPA in descending order using the sort() method in conjunction with a lambda function. Then the sorted list of students is printed, followed by the unsorted list.
Thus, the following code shown in the image can be utilized to implement the required functionality, assuming Project 1 entailed developing a class called "Student" with attributes like name, ID number, and GPA.
Learn more about Coding, here:
https://brainly.com/question/17204194
#SPJ2
What is the minimum number of app service plans that should be created
The minimum number of App Service plans that should be created depends on a person's specific requirements and the workload you are planning to host
What is service plansWhen you want to decide how many App Service plans to use, think about these things such as: If you have different apps that need different things or need to be kept separate for safety, you can put them in different groups so they don't affect each other.
Scalability means being able to handle more work. If you need to handle more work by making things bigger (vertical scaling) or having more of them (horizontal scaling), you might need to use multiple plans for each application.
Learn more about service plans from
https://brainly.com/question/14249760
#SPJ1
Write an application that uses String method region-Matches to compare two stringsinput by the user. The application should input the number of characters to be compared andthe starting index of the comparison. The application should state whether the comparedcharacters are equal. Ignore the case of the characters when performing the comparison.
Answer:
Explanation:
The following program creates a function called region_Matches that takes in two strings as arguments as well as an int for starting point and an int for amount of characters to compare. Then it compares those characters in each of the words. If they match (ignoring case) then the function outputs True, else it ouputs False. The test cases compare the words "moving" and "loving", the first test case compares the words starting at point 0 which outputs false because m and l are different. Test case 2 ouputs True since it starts at point 1 which is o and o.
class Brainly {
public static void main(String[] args) {
String word1 = "moving";
String word2 = "loving";
boolean result = region_Matches(word1, word2, 0, 4);
boolean result2 = region_Matches(word1, word2, 1, 4);
System.out.println(result);
System.out.println(result2);
}
public static boolean region_Matches(String word1, String word2, int start, int numberOfChars) {
boolean same = true;
for (int x = 0; x < numberOfChars; x++) {
if (Character.toLowerCase(word1.charAt(start + x)) == Character.toLowerCase(word2.charAt(start + x))) {
continue;
} else {
same = false;
break;
}
}
return same;
}
}
How many subnets and host per subnet are available from network 192.168.43.0 255.255.255.224?
It should be noted that the number of subnets and hosts available from network 192.168.43.0 255.255.255.224 is 8 and 32, respectively. Only 30 of the 32 hosts are generally functional.
What is a host in computer networking?A network host is a computer or other device that is connected to a computer network. A host can serve as a server, supplying network users and other hosts with information resources, services, and applications. Each host is given at least one network address.
A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, computers use common communication protocols over digital links.
So, in respect to the above response, bear in mind that we may compute the total number of: by putting the information into an online IPv4 subnet calculator.
8 subnets; and30 hosts available for 192.168.43.0 (IP Address) and 255.255.255.224 (Subnet)
Learn more about hosts:
https://brainly.com/question/14258036
#SPJ1
find four
reasons
Why must shutdown the system following the normal sequence
If you have a problem with a server and you want to bring the system down so that you could then reseat the card before restarting it, you can use this command, it will shut down the system in an orderly manner.
"init 0" command completely shuts down the system in an order manner
init is the first process to start when a computer boots up and keep running until the system ends. It is the root of all other processes.
İnit command is used in different runlevels, which extend from 0 through 6. "init 0" is used to halt the system, basically init 0
shuts down the system before safely turning power off.
stops system services and daemons.
terminates all running processes.
Unmounts all file systems.
Learn more about server on:
https://brainly.com/question/29888289
#SPJ1
Miranda works in a product-testing laboratory. New products come in for testing frequently. As the products come in, test protocols are developed. Testers in several different departments perform different tests and record their results. The results are then compiled into a database. The project manager reviews the test results and writes up a report describing the findings. When the business was small, it was easy for the company to share these documents using e-mail. But now the laboratory has grown. It receives many more products for testing and has hired many more employees. As a result, e-mail is no longer an efficient way in which to handle the exchange of documents. For this reason, Miranda implemented the use of a new tool. What technology did Miranda adopt?
The technology that Miranda adopt is a wiki. The correct option is d.
What is technology?Technology is the application of scientific knowledge and information to make new gadgets and equipment which work for the welfare of society. Technology is overcoming the problems of society with new scientific gadgets.
Here, Miranda works in a product-testing laboratory. The lab should make new and technical equipment. She needed a new tool for the lab, so she should opt for a wiki for the information on new techniques.
Therefore, the correct option is d, a wiki.
To learn more about technology, refer to the link:
https://brainly.com/question/28288301
#SPJ1
The question is incomplete. Your most probably complete question is given below:
a blog
a fax machine
a wiki
What can toxic substances do to your body?
Select all that apply.
Answer:
burn you, affect your whole body
Explanation:
hope this helps :) !!!
25 Points !! HELP ASAP . DUE TOMORROW MORNING .
Imagine you are scrolling through your social media and you see these two links, which one would you click on? Why? Explain answer 2-3 sentences long .
Answer:
The Associated Press
Explanation:
Out of the two options presented, The Associated Press caught my attention more due to its compelling content. The content displayed is visually appealing and likely to pique one's curiosity, motivating one to seek further information.
What is software piracy? Check all of the boxes that apply.
copying computer software or programs illegally
using someone’s ideas without giving them credit
making lots of copies and sharing with friends
breaking the security on software so it can be used illegally
knowing the laws regarding copyright and intellectual property
Answer:
Explanation:
Software Piracy includes all of the following:
copying computer software or programs illegallymaking lots of copies and sharing with friendsbreaking the security on software so it can be used illegallyAll of these acts provide ways of individuals gaining access to the software illegally and without paying for it. Doing so ultimately prevents the software developers from making any money on the idea and all of the hard work that they have put into making that software.
Answer:
A C D
Explanation:
What Is OpenShift Deployment?
Deploying applications on OpenShift, a Red Hat-designed container application platform, is an involved process that compiles the lifecycle management of the application, its horizontal and vertical scaling abilities, updates rolling out, and ensuring the application’s health and reliability.
How to explain the informationUnlocking these toolsets can be made easier with OpenShift's powerful selection of programmes and features which automate deployment while also monitoring and logging.
It also provides essential Continuous Integration and Deployment (CI/CD) pipelines to streamline the development process.
Learn more about deployment on
https://brainly.com/question/30259268
#SPJ1
Do you believe that technology has or is bringing out the worst in society? Why?
Answer:
No I think technologies are helpful for the humanity in case the people are used it for valuable tasks .
Explanation:
Technologies have two sides effects and we can use the better side to facilitate our life .
define artificial intelligence?
Answer:
the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
Explanation:
hope this helps!! have a great day!! :D
Answer:
the theory and development of computer systems able to perform tasks normally requiring human intelligence, such as visual perception, speech recognition, decision-making, and translation between languages.
how to identify the significant accounts, disclosures, and relevant assertions in auditing long-lived assets.
To identify the significant accounts, disclosures, and relevant assertions in auditing long-lived assets are as follows:
How do you calculate the Long-Lived assets?
Upon recognition, a long-lived asset is either reported under the cost model at its historical cost less accumulated depreciation (amortisation) and less any impairment or under the revaluation model at its fair value.
Why are long-lived assets are depreciated?
Long-term assets must be depreciated throughout the period of their useful lives, much like most other types of assets. It is because a long-term asset is not anticipated to produce benefits indefinitely.
The long-lived assets are also called Non-current assets, and they contain both tangible and intangible assets and are utilised throughout several operational cycles.
-Tangible assets are things with a physical shape. • Equipment, structures, and land.
-Intangible assets have a form that is not physical. • Copyrights, patents, trademarks, and brand recognition.
Hence, the significant accounts, closures and relevant assertions are identified by the above steps.
To learn more about the long-lived assets from the given link
https://brainly.com/question/26718741
#SPJ1