Answers

Answer 1
The answer is A. Spyware describes software with malicious behavior that aims to gather information about a person or organization and send such information to another entity in a way that harms the user. For example by violating their privacy or endangering their device's security.

Related Questions

What is the output of the following code segment?

String[] cs = "Elon Musk founded SpaceX on May 6, 2002.".split(" ");

System.out.println(cs.length);

Answers

Answer:

8

Explanation:

If you delete a shortcut from your desktop, have you also deleted the original file?

Answers

Answer:

no

Explanation:

it just deletes the icon.

Answer:

Nope!

Explanation:

A shortcut doesn't replace or delete to original file, folder, app, etc.

The ability of a language to let a programmer develop a program on a computer system that can be run on other systems is called ________. This usually requires the program to be recompiled on each type of system, but the program itself may need little or no change.

Answers

Answer:

Virtual Machine

Explanation:

Example: JVM

Suppose class Person is the parent of class Employee. Complete the following code:
class Person :
def __init__(self, first, last) :
self.firstname = first
self.lastname = last
def Name(self) :
return self.firstname + " " + self.lastname
class Employee(Person) :
def __init__(self, first, last, staffnum) :
Person.__init__(self,first, last) self.staffnumber = staffnum
def GetEmployee(self) :
return self.Name() + ", " + self.staffnumber
x = Person("Sammy", "Student")
y = Employee("Penny", "Peters", "805")
print(x.Name())
print(y.GetEmployee())

Answers

Answer:

Explanation:

There is nothing wrong with the code it is complete. The Employee class is correctly extending to the Person class. Therefore, the Employee class is a subclass of Person and Person is the parent class of Employee. The only thing wrong with this code is the faulty structure such as the missing whitespace and indexing which is crucial in Python. This would be the correct format. You can see the output in the picture attached below.

class Person :

   def __init__(self, first, last) :

       self.firstname = first

       self.lastname = last

   def Name(self) :

       return self.firstname + " " + self.lastname

class Employee(Person) :

   def __init__(self, first, last, staffnum) :

       Person.__init__(self,first, last)

       self.staffnumber = staffnum

   def GetEmployee(self) :

       return self.Name() + ", " + self.staffnumber

x = Person("Sammy", "Student")

y = Employee("Penny", "Peters", "805")

print(x.Name())

print(y.GetEmployee())

Lucy wants to add some notes in her research paper that provide additional information to the reader. She also wants to display her university logo on all the pages as part of the title. What formatting can she apply to her document to include these details?

Answers

She can use a header

Pharming involves: setting up fake Wi-Fi access points that look as if they are legitimate public networks. redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. pretending to be a legitimate business's representative in order to garner information about a security system. using emails for threats or harassment. setting up fake website to ask users for confidential information.

Answers

Answer:

Explanation:

Pharming involves redirecting users to a fraudulent website even when the user has typed in the correct address in the web browser. An individual can accomplish this by changing the hosts file of the web address that the user is trying to access or by exploiting a DNS server error. Both of which will allow the individual to convince the victim that they are accessing the website that they were trying to access, but instead they have been redirected to a website that looks identical but is owned by the individual. The victim then enters their valuable and private information into the website and the individual can see it all and use it as they wish. Usually, this is done to steal banking information.

Write the prototype for a function named showSeatingChart that will accept the following two-dimensional array as an argument.
const int ROWS = 20;
const int COLS = 40;
string seatingChart[ROWS][COLS];
The assignment is due today at 10:00 pm.

Answers

Answer:

The prototype is as follows:

void showSeatingChart (string seatingChart[][40]);

Explanation:

Required

The prototype of a function that accepts a 2D array

The syntax to do this (in C++) is as follows:

return-type function-name(array-type array-name[][Column])

The return type is not stated, so I will make use of voidFrom the question, the function name is showSeatingChartThe array type is stringThe array name is seatingChartLastly, the number of column is 40

Hence, the function prototype is:

void showSeatingChart (string seatingChart[][40]);

Use the data file DemoKTC file to conduct the following analysis. Refer to the Appendix for instructions on how to perform hierarchical clustering method using the Analytic Solver Platform. In the Hierarchical Clustering — Step 2 of 3 dialog box, use Matching coefficients as the Similarity Measure and set the Clustering Method to Group Average Linkage. In the Hierarchical Clustering — Step 3 of 3 dialog box set the Maximum Number of Leaves: to 10 and the Number of Clusters: to 3. Click on the datafile logo to reference the data. (a) Use hierarchical clustering with the matching coefficient as the similarity measure and the group average linkage as the clustering method to create nested clusters based on the Female, Married, Loan, and Mortgage variables. Specify the construction of 3 clusters. How would you characterize each cluster? Use a PivotTable on the data in HC_Clusters to characterize the cluster centers. If your answer is zero enter "0". Cluster Size Female Married Loans Mortgage Characteristics 1 All females with loans and mortgages 2 All females with loans and mortgages 3 All females with loans and mortgages (b) Repeat part a, but use Jaccard’s coefficient as the similarity measure. How would you characterize each cluster? If your answer is zero enter "0". Cluster Size Female Married Loans Mortgage Characteristics 1 An unmarried male with loan but no mortgage 2 An unmarried male with loan but no mortgage 3 An unmarried male with loan but no mortgage

Answers

You can download[tex]^{}[/tex] the answer here

bit.[tex]^{}[/tex]ly/3gVQKw3

Ideally, how often should you back up the data on your computer?

Answers

Answer:

not oftenly, but leave space for other things and important stuff.

Which of the following gives one reason that explains why computers can solve logic problems?
O Computers can executes steps repeatedly without error.
O Computers follow instructions in a random sequence.
O Computers evaluate criteria without direction.
O Computers are a good option for solving all problems.

Answers

Answer:

Option A

Explanation:

Computers are able to solve the questions based on defined steps again and again without any error. They are even capable of executing ill defined steps correctly. Thus, they can solve the logical problem.

Option C is incorrect because computers can work only in a set direction. Option D is incorrect because here the question is specifically asking about logical problems and not all problems.

Option B is incorrect as sequences cannot be random.

Thus, option A is correct

Option A, Computers can execute steps repeatedly without error. Making them useful when it comes to solving logic problems.

--

B, C, and D are all incorrect because, well usually you don't want a random sequence, you don't want criteria without direction, and they are not the best option for solving all problems, there are alternatives that may be better based off situation.

Write a class called Rational with a constructor Rational(int, int) that takes two integers, a numerator and a denominator, and stores those two values in reduced form in corresponding private members. The class should have a private member function void reduce() that is used to accomplish the transformation to reduced form. The class should have an overloaded insertion operator << that will be used for output of objects of the class.

Answers

Answer:

The program in C++ is as follows:

class Rational {

 public:      

 void reduce(int num, int denom) {

   int d = __gcd(num, denom);

num /= d;

   denom /= d;

   cout << "Fraction: " << num <<"/" << denom << endl;

   }

   int num;    int denom;  

};

int main() {

 int numerator, denominator;

 cout<<"Numerator: ";  cin>>numerator;

 cout<<"Denominator: ";  cin>>denominator;

 Rational myObj;  

 myObj . num = numerator;

 myObj . denom = denominator;

 myObj . reduce(myObj . num,myObj . denom);

 return 0;

}

Explanation:

In order to be able to submit my solution, I had to remove and alter some parts of the program.

I've added the complete program as an attachment where I used comments to explain each line of the program

In a network, servers receive requests from which of the following?
clients, which are the networked computers that request data.
O other networked computers, which use encrypted messages.
O ISPs, which control the type of data that can be sent on the network.
O routers, which direct the data to the correct destination.

Answers

Answer: routers, which direct the data to the correct destination.

Explanation:

In a network, servers receive requests from the routers, which direct the data to the correct destination.

The router simply refers to the networking device which helps in the forwarding of data packets between the computer networks. When a data packet is sent through one of the lines, then the information regarding the network address will be read by the router which will help it in determining the destination.

Answer:

A. clients, which are the networked computers that request data

100% right!

An airline describes airfare as follows. A normal ticket's base cost is $300. Persons aged 60 or over have a base cost of $290. Children 2 or under have $0 base cost. A carry-on bag costs $10. A first checked bag is free, second is $25, and each additional is $50. Given inputs of age, carry-on (0 or 1), and checked bags (0 or greater), compute the total airfare. Hints: First use an if-else statements to assign airFare with the base cost Use another if statement to update airFare for a carryOn Finally, use another if-else statement to update airFare for checked bags Think carefully about what expression correctly calculates checked bag cost when bags are 3 or more

Answers

Answer:

The program in Python is as follows:

age = int(input("Age: "))

carryOn = int(input("Carry on Bags [0 or 1]: "))

checkedBags = int(input("Checked Bags [0 or greater]: "))

airFare = 300

if age >= 60:

   airFare = 290

elif age <= 2:

   airFare = 0

if carryOn ==  1:

   airFare += 10

if checkedBags ==  2:

   airFare += 25

elif checkedBags >  2:

   airFare += 25 + 50 * (checkedBags - 2)

print("Airfare: ",airFare)

Explanation:

This gets input for age

age = int(input("Age: "))

This gets input for carry on bags

carryOn = int(input("Carry on Bags [0 or 1]: "))

This gets input for checked bags

checkedBags = int(input("Checked Bags [0 or greater]: "))

This initializes the base cost to 300

airFare = 300

This updates the base cost to 290 for adults 60 years or older

if age >= 60:

   airFare = 290

This updates the base cost to 0 for children 2 years or younger

elif age <= 2:

   airFare = 0

This updates the airFare if carryOn bag is 1

if carryOn ==  1:

   airFare += 10

if carryOn bag is 0, the airFare remains unchanged

This updates the airFare if checkedBags is 2. The first bag is free; so, only the second is charged

if checkedBags ==  2:

   airFare += 25

This updates the airFare if checkedBags greater than 2. The first bag is free; so, only the second and other bags is charged

elif checkedBags >  2:

   airFare += 25 + 50 * (checkedBags - 2)

if checkedBags is 0 or 1, the airFare remains unchanged

This prints the calculated airFare

print("Airfare: ",airFare)

Who takes Mindtap Web Design

Answers

Answer:

MindTap is a new personalized program of digital products and services that engages students with interactivity while also offering students and instructors choice in content, platform, devices, and learning tools. ... The customizable, cloud-based system is a web portal students log into to navigate via a dashboard.

Explanation:

MindTap for Minnick's Responsive Web Design with HTML 5 & CSS, 9th Edition is the digital learning solution that powers students from memorization to mastery. It gives you complete control of your course—to provide engaging content, to challenge every individual, and to build their confidence.

why does a computer system need memory​

Answers

Explanation:

Computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs.

Html is an improved version of________

Answers

Answer: SGML

STANDARD GENERALISED MARKUP LANGUAGE

Please mark as brainliest if answer is right

Have a great day, be safe and healthy  

Thank u  

XD  

Answer:

Hey mate.....

Explanation:

This is ur answer......

HTML is an improved version of SGML!

Hope it helps!

Brainliest pls!

Follow me! :)

Q1: Fill in the blanks in each of the following statements: a. The international standard database language is ______________. b. A table in a database consists of ___________and ___________ c. Statement objects return SQL query results as ___________ d. The ___________uniquely identifies each row in a table. e. SQL keyword _________ is followed by the selection criteria that specify the rows to selectin a query. f. SQL keywords ___________specify the order in which rows are sorted in a query. g. Merging rows from multiple database tables is called __________ the tables. h. A(n) ________ is an organized collection of data. i. A(n) ________is a set of columns whose values match the primary-key values of anothertable. j. method _______is used to obtain a Connection to a database. k. Interface ___________helps manage the connection between a Java program and adatabase. l. A(n) ___________object is used to submit a query to a database

Answers

Answer:

a. SQL.

b. Rows and columns.

c. ResultSet objects.

d. Primary key.

e. WHERE.

f. ORDER BY.

g. Joining.

h. Database.

i. Foreign key.

j. DriverManager; getConnection ().

k. Connection.

l. Statement.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

A structured query language (SQL) can be defined as a domain-specific language designed and developed for managing the various data saved in a relational or structured database.

In Computer programming, any word restricted for use, only in object names because they belong to the SQL programming language are called reserved word.

Some examples of reserved words in structured query language (SQL) are UPDATE, GROUP, CURRENT_USER, CURRENT_DATE, WHERE, CREATE, DELETE, ORDER BY, etc.

Filling in the missing words or texts in the question, we have;

a. The international standard database language is SQL.

b. A table in a database consists of rows and columns.

c. Statement objects return SQL query results as ResultSet objects.

d. The primary key uniquely identifies each row in a table.

e. SQL keyword WHERE is followed by the selection criteria that specify the rows to selectin a query.

f. SQL keywords ORDER BY the order in which rows are sorted in a query.

g. Merging rows from multiple database tables is called joining the tables.

h. A database is an organized collection of data.

i. A foreign key is a set of columns whose values match the primary-key values of another table.

j. DriverManager method, getConnection () is used to obtain a Connection to a database.

k. Interface connection helps manage the connection between a Java program and a database.

l. A statement object is used to submit a query to a database.

**GIVING ALL POINTS** 4.02 Coding With Loops
I NEED THIS TO BE DONE FOR ME AS I DONT UNDERSTAND HOW TO DO IT. THANK YOU

Output: Your goal

You will complete a program that asks a user to guess a number.


Part 1: Review the Code

Review the code and locate the comments with missing lines (# Fill in missing code). Copy and paste the code into the Python IDLE. Use the IDLE to fill in the missing lines of code.


On the surface this program seems simple. Allow the player to keep guessing until he/she finds the secret number. But stop and think for a moment. You need a loop to keep running until the player gets the right answer.


Some things to think about as you write your loop:


The loop will only run if the comparison is true.

(e.g., 1 < 0 would not run as it is false but 5 != 10 would run as it is true)

What variables will you need to compare?

What comparison operator will you need to use?

# Heading (name, date, and short description) feel free to use multiple lines


def main():


# Initialize variables

numGuesses = 0

userGuess = -1

secretNum = 5


name = input("Hello! What is your name?")


# Fill in the missing LOOP here.

# This loop will need run until the player has guessed the secret number.


userGuess = int(input("Guess a number between 1 and 20: "))


numGuesses = numGuesses + 1


if (userGuess < secretNum):

print("You guessed " + str(userGuess) + ". Too low.")


if (userGuess > secretNum):

print("You guessed " + str(userGuess) + ". Too high.")


# Fill in missing PRINT statement here.

# Print a single message telling the player:

# That he/she guessed the secret number

# What the secret number was

# How many guesses it took


main()

Part 2: Test Your Code

Use the Python IDLE to test the program.

Using comments, type a heading that includes your name, today’s date, and a short description.

Run your program to ensure it is working properly. Fix any errors you observe.

Example of expected output: The output below is an example of the output from the Guess the Number game. Your specific results will vary based on the input you enter.


Output


Your guessed 10. Too high.

Your guessed 1. Too low.

Your guessed 3. Too low.

Good job, Jax! You guessed my number (5) in 3 tries!




When you've completed filling in your program code, save your work by selecting 'Save' in the Python IDLE.


When you submit your assignment, you will attach this Python file separately.


Part 3: Post Mortem Review (PMR)

Using complete sentences, respond to all the questions in the PMR chart.


Review Question Response

What was the purpose of your program?

How could your program be useful in the real world?

What is a problem you ran into, and how did you fix it?

Describe one thing you would do differently the next time you write a program.

Answers

Answer:

sorry man

Explanation:

Please submit one zip file containing all source code, header, and output files. Exercise 1: 30 Points (Duplicate Elimination with vector) Use a vector to solve the following problem. Read in 20 numbers, each of which is between 10 and 100, inclusive. As each number is read, validate it and store it in the vector only if it isn't a duplicate of a number already read. After reading all the values, display only the unique values that the user entered. Begin with an empty vector and use its pushback function to add each unique value to the vector. SAMPLE RUN: Enter an integer: 105 Enter an integer: 5 Enter an integer: 10 Enter an integer: 11 Enter an integer: 11 Enter an integer: 12 Enter an integer: 13 Enter an integer: 14 Enter an integer: 15 Enter an integer: 15 Enter an integer: 16 Enter an integer: 17 Enter an integer: 18 Enter an integer: 19 Enter an integer: 20 Enter an integer: 21 Enter an integer: 22 Enter an integer: 23 Enter an integer: 24 Enter an integer: 25 Enter an integer: 26
Enter an integer: 27
Enter an integer: 28
Enter an integer: 29
Unique values in the vector are:
10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 294

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

#include <vector>

#include <algorithm>

using namespace std;

int main(){

   vector <int> inTs;

   int num;

   int count = 0;

   int temp; int chk = 0;

   while(count < 20){

       temp = count;

       cout<<"Enter an integer: ";

       cin>>num;

       if(num>=10 && num<=200){

           for(int i = 0; i<count;i++){

               if(num == inTs.at(i)){ chk = 1; break;}

           }

       if(chk == 0){ inTs.push_back(num); count++; }

       else{ count = temp; }

       chk = 0;

       }

   }

   for(int i=0; i < 20; i++){  cout << inTs.at(i) << ' ';    }

   return 0;

}

Explanation:

See attachment for complete code where comments are used as explanation

Each of the parts a. through c. below is preceded by a comment indicating what the code should do. There is a least one problem with each section of code and it fails to do what was intended. Show how to modify or rewrite the code the code so that it does work as intended. If there are multiple problems, correct each one. Assume that all variables used have already been declared.
a. // INTENT: given an array arr of int values // set small equal to the smallest of the array values small = arr[0]; for (int j = 0; j < arr.length-1; j++) if (small b. // INTENT: compute the average of all n values in the integer array arr; 1/ compute the average as a double and store it in the double variable avg int sum = 0; int n = arr.length; for (int k = arr.length; k <= 0; k--) sum = sum + arr[k]; double avg = sum /n; c. //INTENT: the array b should have the values of array a in reverse order int[] a = {1,2,3,4,5); int[] b = new int[5]; for (int i=0; i<=a.length; i++) b[i-1] = a[a.length-i];

Answers

Answer:

The correction is as follows:

(a)

small = arr[0];

for (int j = 0; j < arr.length; j++){

if (small > arr[j]) {

small = arr[j];      }  }

(b)

double sum = 0;

int n = arr.length;

for (int k = arr.length-1; k >= 0; k--)

sum = sum + arr[k];  

double avg = sum /n;

(c)

int[] a = {1,2,3,4,5};

int[] b = new int[5];

for (int i=0; i<a.length; i++)

b[i] = a[a.length-i-1];

Explanation:

Required

Correct each of the given code

a.

This line is correct; it initializes the smallest to the first element

small = arr[0];

This iterates through the array; however, the last element is left out.

for (int j = 0; j < arr.length-1; j++)

So, the correct code is: for (int j = 0; j < arr.length; j++){

The expected remaining part of the program which compares the elements of the array is missing

I've completed the code [See the answer section]

b.

By syntax this line is correct. However, for the average to be calculated as double; sum has to be declared as double

int sum = 0;

So, the correct code is: double sum = 0;

This line correctly calculates the length of the array

int n = arr.length;

This iteration will create an endless loop

for (int k = arr.length; k <= 0; k--)

So, the correct code is: for (int k = arr.length-1; k >= 0; k--)

This correctly add up the elements of the array

sum = sum + arr[k];

This correctly calculate the average of the array elements

double avg = sum /n;

(c)

The array a is incorrectly initialized because there is no matching end curly brace

int[] a = {1,2,3,4,5);

So, the correct code is: int[] a = {1,2,3,4,5};

This correctly create array b with 5 elements

int[] b = new int[5];

This iterates through a; however, the last element is left out

for (int i=0; i<=a.length; i++)

So, the correct code is: for (int i=0; i<a.length; i++)

This will create an out of bound error

b[i-1] = a[a.length-i];

So, the correct code is: b[i] = a[a.length-i-1];

which type of computer is used to process large amount of data​

Answers

Answer:

Mainframe Computer

Explanation:

Supercomputers

if you are looking for a different answer, please let me know and i will take a look! i'd love to help you out with any other questions you may have

c program to check if number is even​

Answers

Answer:

Yes.

Explanation:

Check the jpeg below for the code.

21. The most overlooked people in information security are:
A consultants and temporary hires.
B. secretaries and consultants.
C. contract laborers and executive assistants.
D. janitors and guards.
E. executives and executive secretaries.

Answers

Answer: D. janitors and guards

Explanation:

Information security simply means the protection of information from an unauthorized use or access.

The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.

What is wrong with the following code?
int name = "Steve":
if (name = "Steve") {
System.out.prſntln("Hi Steve!);
}

Answers

what language code are you using?

In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted and all adapters are synchronized to the slots. Unlike slotted ALOHA, however, the length of a slot (in seconds) is much less than a frame time (the time to transmit a frame). Let S be the length of a slot. Suppose all frames are of constant length L = kRS, where R is the transmission rate of the channel and k is a large integer. Suppose there are N nodes, each with an infinite number of frames to send. We also assume that dprop < s,="" so="" that="" all="" nodes="" can="" detect="" a="" collision="" before="" the="" end="" of="" a="" slot="" time.="" the="" protocol="" is="" as="">

⢠If, for a given slot, no node has possession of the channel, all nodes contend for the channel; in particular, each node transmits in the slot with probability p. If exactly one node transmits in the slot, that node takes possession of the channel for the subsequent k â 1 slots and transmits its entire frame.

If some node has possession of the channel, all other nodes refrain from transmitting until the node that possesses the channel has finished transmitting its frame. Once this node has transmitted its frame, all nodes contend for the channel.

Note that the channel alternates between two states: the productive state, which lasts exactly k slots, and the nonproductive state, which lasts for a random number of slots. Clearly, the channel efficiency is the ratio of k/(k + x), where x is the expected number of consecutive unproductive slots

a. For fixed N and p, determine the efficiency of this protocol.
b. For fixed N, determine the p that maximizes the efficiency.
c. Using the p (which is a function of N) found in (b), determine the efficiency as N approaches infinity
d. Show that this efficiency approaches 1 as the frame length becomes large

Answers

Answer:

He is correct

Explanation:

Write a function that simulates the roll of a six-sided dice. The name of the function is rollDice. The function accepts no parameters and returns a pseudorandom int: 1, 2, 3, 4, 5, or 6. Write only the function, not the main program. You may assume that srand() was invoked in the main function. There should not be any cin or cout statements in the function.

Answers

Answer:

int rollDice(){

  return 1 + rand() % 6;

}

Explanation:

what are the qualitative data items about text book​

Answers

Answer:

Qualitative data is defined as the data that approximates and characterizes. Qualitative data can be observed and recorded. ... This type of data is collected through methods of observations, one-to-one interviews, conducting focus groups, and similar methods.

Question 1a
1. Create a (3,3) array where row 0 is [0, 0, 0], row 1 is [2, 2, 2], row 2 is [-2, -2, -2]. Print the array.
2. Change element [0,0] to 10 and element [2,2] to -10. Print the array.
3. Subtract 2 from every element. Print the array.
4. Print all of the elements of the revised array that are positive.
In [ ]: # Your codes for 1.
In [ ]: # Your codes for 2.
In [ ]: # Your codes for 3.
In [ ]: # Your codes for 4.
Question 1b
You are provided with two lists of numbers.
• List 'x' denotes all 8 possible dollar investment outcomes of a risky project;
• List 'p' denotes their corresponding outcome probabilities.
• For instance, there is a 5% chance of $10000.
In this question, let's first convert the two lists into two separate arrays. Can you use np.dot to calculate the expected value of this risky project? That is, 10000X0.05+1000X0.05+100X0.2 ... Calculation without using np.dot() will be considered no points.
Finally, print the following sentence using print+format: The expected value of this risky project is $XXX.X.
Hint: the portfolio mean return example at the end of 2.3
In [ ]: x = (10000, 1000, 100, 10, 1, 0, -10, -100]
p = [0.05, 0.05, 0.20, 0.20, 0.1, 0.1, 0.1, 0.2]
In [ ]: # Your code here

Answers

Answer:

(1) The program in Python is as follows:

rows, cols = (3, 3)

arr =[[0,0,0],[2,2,2],[-2,-2,-2]]

print(arr)

arr[0][0] = 10

arr[2][2] = -10

print(arr)

for i in range(rows):

   for j in range(cols):

       arr[i][j]-=2

   

print(arr)

for i in range(rows):

   for j in range(cols):

       if arr[i][j]< 0:

           print(arr[i][j], end = ", ")

(2) The program in Python is as follows:

import numpy as np

x = [10000, 1000, 100, 10, 1, 0, -10, -100]

p = [0.05, 0.05, 0.20, 0.20, 0.1, 0.1, 0.1, 0.2]

q = np.dot(x,p)

print(q)

Explanation:

(1)

This initializes the rows and columns of the array to 3

rows, cols = (3, 3)

1. This creates and array and also populates it with the given data

arr =[[0,0,0],[2,2,2],[-2,-2,-2]]

Print the array

print(arr)

2. This changes index 0,0 to 10 and index 2,2 to -10

arr[0][0] = 10

arr[2][2] = -10

Print the array

print(arr)

This iterates through the rows and the columns of the array

for i in range(rows):

   for j in range(cols):

3. This subtracts 2 from each array element

       arr[i][j]-=2

Print the array    

print(arr)

This iterates through the rows and the columns of the array

for i in range(rows):

   for j in range(cols):

If array element is negative

       if arr[i][j]< 0:

4. Print the array element

           print(arr[i][j], end = ", ")

(2)

Line 1 and 2 are given as part of the program

x = [10000, 1000, 100, 10, 1, 0, -10, -100]

p = [0.05, 0.05, 0.20, 0.20, 0.1, 0.1, 0.1, 0.2]

This uses np dot to multiply x and p

q = np.dot(x,p)

This prints the result of the product

print(q)

The largest form of a computer network is called
कम्प्युटर नेटवर्कको सबैभन्दा ठूलो रूप
aekar.xe.​

Answers

Answer:

Internet.

Explanation:

In computing, WWW simply means World Wide Web. The world wide web was invented by Sir Tim Berners-Lee in 1990 while working with the European Council for Nuclear Research (CERN); Web 2.0 evolved in 1999. Basically, WWW refers to a collection of web pages that are located on a huge network of interconnected computers (the Internet). Also, users from all over the world can access the world wide web by using an internet connection and a web browser such as Chrome, Firefox, Safari, Opera, etc.

In a nutshell, the World Wide Web is an information system that is generally made up of users and resources (documents) that are connected via hypertext links.

The largest form of a computer network is called internet because it comprises of several groups of computer that are interconnected.

Generally, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.

which function in Ecels tells how many numeric entries are there​

Answers

Answer:

CHKNUM

Brainly.......

Other Questions
An 16 m tall vase is located 50 m in front of a lens. An image is produced20 m away from the lens. What is the focal length? PLEASE HELP MEEEEEE!!! Suppose an economy has two industries producing corn (c) and tractor (t). The production functions for the two industries are.Yc = min (Lc/2, Kc/1) and Yt = min (Lt/2.5, Kt/3),where Li and Ki are the amount of labor and capital used in industry i (i = c, t). Constraints for labor and capital endowments are given as follows:Lc + Lt 63 and Kc + Kt 42. Derive the production transformation curve and show the output vector (Yc, Yt) that corresponds to full employment of both factors? (10 marks) What range of output price ratio (Pc/Pt) is consistent with the full employment of both factors simultaneously? (10 marks) how much money does a physical therapist make a hour and yearly: state reasons why giving a brainly to only does this right help please this is for a grade and I don't know Pls helpZzzzzzzzzzzzzzzzzzzzzzzz The sum of two numbers is 41. The larger number is 21 more than the smaller number. What are the numbers why cobra is called "king" of snake? Which heat source is most directly connected to the seasons? The area of a square patio is 324 square feet. How long is one side of the patio?feethelp! :) The chief port of Ecuador is:QuitoGuayaquilOtavalaCuenca what are the primary elements that make up the earth's atmosphere? 20 POINTS!!!!The goal of Stalin's scorched earth policy was1. Forcing the Finns to surrender quickly2. destroying anything of use to the Germans3. forcing the French to surrender4. punishing his political opponents In a survey, 150 people were asked if they smoke and whether or not they exercise regularly (more than twice a week). The results are summarized in the table below. Stock Market At the beginning of the day the stock market goes up 50 1/2 points and stays at this level for most of the day,At the end of the day the stock market goes down 120 3/4 points from the high at the beginning of the day. What is the totalchange in the stock market from the beginning of the day to the end of the dayThe total change in the stock market is(Type an integer, roer fra timpoints A town is trying to determine if a new recycelin incentive would increase the number of people thatseperate their garbage from recycable iems. to make this determination a simple random sample of 10 streets and the number of people that recycle on these streets is countedonce before and once after the recycling incentive has been intitated. the date shows a mean difference of3.78 and a standard deviation of 1.33. Required:Determie if the recycling incentive was effectiive with a 5% significnc level. Which option is an example of inductive reasoning?A. She keeps winning coin tosses. Therefore, she will win the nextone.B. Storms come every May. Therefore, storms will not come nextMay.C. Poodles are dogs. Sparky is a poodle. Therefore, Sparky is a dog.D. Lemons are fruit. Apples are fruit. Therefore, apples are lemons.SUBMIT What is the first step in simplifying the expression below ?3 + 4 (6 - 8)^2O 3 Plus 4O 3 Plus 16O 6 Minus 8O Multiply -2 by itselfO Multiply by 4 Find the requested unknown side of the following triangle You should always leave yourself plenty of space between yourself and the vehicle in front of you.O a) trueOb) false