What will be displayed if code corresponding to the following pseudocode is executed? Set Number = 4 Repeat Write 2 * Number Set Number = Number + 2 Until Number = 8

Answers

Answer 1

Answer:

8

12

Explanation:

I made the code a bit easier to understand then worked out how it would go. Here's what I did.

number = 4

repeat until number = 8:

   write 2 * number

   number = number + 2

Following this itenary, we have, the system first writes "8" as it multipled 4 by 2. Number is now equal to 6.

Next repetition, the system writes "12" as it multipled 6 by 2. Now, number = 8. The proccess now stops as number is now equal to 8.


Related Questions

What is the value of the variable named myNum after the statements that follow are executed? var myNum = 14; var yourNum = 4; myNum++; yourNum-- myNum = myNum * yourNum;

Answers

Answer:

45

Explanation:

Initially, myNum is equal to 14 and yourNum is equal to 4

Then, myNum is incremented by 1 and becomes 15

Also, yourNum is decremented by 1 and becomes 3

Finally, myNum is set to myNum x yourNum, 15 x 3 = 45

An admission charge for The Little Rep Theater varies according to the age of the person. Develop a solution to print the ticket charge given the age of the person. The charges are as follows:

a. Over 55: $10.00
b. 21-54: $15.00
c. 13-20: $10.00
d. 3-12: $5.00
e. Under 3: Free

Use a Multiple Alternative IF Statement

Answers

Answer:

age = int(input("Enter your age: "))

charge = 0

if age > 55:

   charge = 10

if 21 <= age <= 54:

   charge = 15

if 13 <= age <= 20:

   charge = 10

if 3 <= age <= 12:

   charge = 5

if 0 <= age < 3:

   charge = 0

   

print(charge)

Explanation:

*It is in Python.

Ask the user for the age

Check the each given range and set the charge accordingly using if statements

Print the charge

1. Railroad tracks present no problems for a motorcyclist.
A. O TRUE
B. O FALSE

2. Which of the following is considered to be a vulnerable road user?
A. Bicyclists
B. Motorcyclists
C. Pedestrians
D. all of the above

Answers

Answer: 1 is A

2 is D

Explanation:

Which best describes the purpose of LoJack on a computer

Answers

Answer:The purpose of the lo jack on a computer  to the lock and delete files on the computer devices.

Explanation:The lo jack on a computer to locate all the lock and delete files.

lo jack can provides the computer on the passwords that contains different levels of the bios access.

lo jack perform on the computer operating system provides on the boot only the trusted by the computer operating system.

Lo jack computer on the function is used to the published  the exam answers on the websites.

Lo jack insures to the data into hard drives to the correct computer password.

Use the following cell phone airport data speeds​ (Mbps) from a particular network. Find P10. 0.1 0.1 0.3 0.3 0.3 0.4 0.4 0.4 0.6 0.7 0.7 0.7 0.8 0.8

Answers

Answer:

[tex]P_{10} =0.1[/tex]

Explanation:

Given

[tex]0.1, 0.1, 0.3, 0.3, 0.3, 0.4, 0.4, 0.4, 0.6, 0.7, 0.7, 0.7, 0.8, 0.8[/tex]

Required

Determine [tex]P_{10}[/tex]

[tex]P_{10}[/tex] implies 10th percentile and this is calculated as thus

[tex]P_{10} = \frac{10(n+1)}{100}[/tex]

Where n is the number of data; n = 14

[tex]P_{10} = \frac{10(n+1)}{100}[/tex]

Substitute 14 for n

[tex]P_{10} = \frac{10(14+1)}{100}[/tex]

[tex]P_{10} = \frac{10(15)}{100}[/tex]

Open the bracket

[tex]P_{10} = \frac{10 * 15}{100}[/tex]

[tex]P_{10} = \frac{150}{100}[/tex]

[tex]P_{10} = 1.5th\ item[/tex]

This means that the 1.5th item is [tex]P_{10}[/tex]

And this falls between the 1st and 2nd item and is calculated as thus;

[tex]P_{10} = 1.5th\ item[/tex]

Express 1.5 as 1 + 0.5

[tex]P_{10} = (1 +0.5)\ th\ item[/tex]

[tex]P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item[/tex]

From the given data; [tex]1st\ item = 0.1[/tex] and [tex]2nd\ item = 0.1[/tex]

[tex]P_{10} = 1^{st}\ item +0.5(2^{nd} - 1^{st}) item[/tex] becomes

[tex]P_{10} =0.1 +0.5(0.1 - 0.1)[/tex]

[tex]P_{10} =0.1 +0.5(0)[/tex]

[tex]P_{10} =0.1 +0[/tex]

[tex]P_{10} =0.1[/tex]

What is displayed by the alert dialog box after the following code executes? var name = "Donny,Duck"; var index = name.indexOf(","); var lastName = name.substr(index + 1, name.length - 1);; alert("Last name: " + lastName);

Answers

Answer:

Last name: Duck

Explanation:

explanation is provided in the attached document.

NMCI is the name used for a large-scale effort to link Navy and Marine Corps computer systems on bases, boats, and in offices around the world. When completed, this internal WAN will use Internet technology to link soldiers in the field with support personnel on bases, etc. NMCI is an example of a(n):

Answers

Answer:

The answer is "Intranet".

Explanation:

The intranet becomes an information exchange computer network, in which the resources collaborate with OS and other computing infrastructure within the organization. It is usually done without access from third parties and primarily uses for analysis of the data.

Here, the NMCI links the computer network of navy and maritime bodies on the bases of both the boats and the regional offices, that's why we can say that it is the example of the Internet.

Suppose that we want to multiply 500 matrices and we use the optimal parenthesization computed by the MATRIX-CHAIN-ORDER function discussed in class. After finding the optimal parenthesization, how many pairs of round brackets ( ) are printed by the procedure PRINT-OPTIMAL-PARENS(s, 1, 500)?
a. 249
b. 501
c. 251
d. 250
e. 499
f. 500

Answers

Answer:

síganme en las claves de ustedes pronto. Seré un buen día. He seguido un poco sobre el Is. He seguido un poco sobre el Is. He seguido un poco sobre el.

is (c)251? correct since i'm not really sure

Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques such as PCA and SVD.

Answers

Answer:

Following are the difference to this question can be defined as follows:

Explanation:

In terms of projections of information into a reduced dimension group, we can consider the dimension structure of PCA and SVD technologies.  In cases of a change in the length, based on consolidation, there's also a unit with dimensions. When we consider that the days have been aggregated by days or the trade of a commodity can be aggregated to both the area of the dimension, accumulation can be seen with a variance of dimension.

Dimensionality reduction based on aggregation involves selection of important character and variable from a large variable and dimensionality reduction based on techniques with the use of PCA and SVD.

What is dimensionality?

Dimensionality involves reducing features that have been written or identified or constructing less features from a pool of important features.

Principal components analysis(PCA) and Single value decomposition(SVD) is a form or analysis that can be used to reduce some character that are not important to an information and can also help to select important variables from among many variables.

Therefore, dimensionality reduction based on aggregation involves selection of important character and variable from a large variable and dimensionality reduction based on techniques with PCA and SVD.

Learn more on dimensional analysis here,

https://brainly.com/question/24514347

in terms of computer what does mie mean​

Answers

Answer:

Microsoft Internet explorer

MIE means:

Microsoft Internet Explorer.

Hope this answers your question! :)

ntify five key technologies/innovations and discuss their advantages and
disadvantages to developing countries like Ghana

Answers

Answer:

1. Blockchain Technology: Blockchain is a distributed ledger technology that lets data to be stored globally on its servers and it is based on a P2P topology which makes it difficult for someone to tamper with the network.

It can be used as a cryptocurrency wallet that supports BitCoin, Ethereum, etc.

An advantage of it is that it is distributed among several users and stable.

A disadvantage for a developing country like Ghana is that once a blockchain is sent, it cannot go back which brings up the question of security.

2.Artificial Intelligence: This technology is simply the simulation of human intelligence in machines. AI can be used for problem-solving and learning. An advantage of AI is that it reduces human error and is fast in solving problems. A disadvantage of AI is that its expensive to maintain and also it does not improve with experience.

3. Global Positioning System: GPS is a satellite-based positioning system that is used to pinpoint and track location. It has the advantage of being available worldwide and information is provided to users in real-time. One disadvantage of the GPS for a developing country like Ghana is that electromagnetic interference can affect the accuracy of the GPS.

4. 5G Network: This is the 5th generation of mobile internet connectivity that gives super fast download and upload speeds when compared to its predecessors 4G, 3G, 2G, and Edge networks.

One major disadvantage of 5G for a developing country like Ghana is that it is expensive and quite unknown and its security and privacy issues are yet to be resolved.

5. Lasers: This isn't a new technology as it has been in use for some time already but its importance cannot possibly be over-emphasized. LASER is an acronym that means Light Amplification by the Stimulated Emission of Radiation.

It is precise and accurate in cutting when compared to thermal and other conventional cutting methods. It is being used in surgeries that require the highest levels of accuracy with great success.

A disadvantage of Laser technology is that it is expensive to use and maintain.

The code below takes the list of country, country, and searches to see if it is in the dictionary gold which shows some countries who won gold during the Olympics. However, this code currently does not work. Correctly add try/except clause in the code so that it will correctly populate the list, country_gold, with either the number of golds won or the string "Did not get gold".
1
​2 gold = {"US":46, "Fiji":1, "Great Britain":27, "Cuba":5, "Thailand":2, "China":26, "France":10}
3 country = ["Fiji", "Chile", "Mexico", "France", "Norway", "US"]
4 country_gold = []
5
​6 for x in country:
7 country_gold.append(gold[x])
8 country_gold.append("Did not get gold")

Answers

Answer:

Modify your program by replacing

for x in country:

       country_gold.append(gold[x])

       country_gold.append("Did not get gold")

with

for x in country:

       try:

               country_gold.append(gold[x])

       except:

               country_gold.append("Did not get gold")

Explanation:

The addition of try/except clause in the program is to let the program manage error;

In this case, the program checks for a country in the list country; This is implemented using the following line

for x in country:

If the country exists, the statement in the try block is executed

try:

 country_gold.append(gold[x])  ->This appends the country name to the country_gold list

Otherwise, the statement in the except clause is executed

except:

 country_gold.append("Did not get gold")  -> This appends "Did not get gold" to the country_gold list

To confirm what you've done, you may add the following line of code at the end of the program: print(country_gold)

Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is:

Answers

Answer:

The program written in python is as follows

def countchr(phrase, char):

     count = 0

     for i in range(len(phrase)):

           if phrase[i] == char:

                 count = count + 1

     return count

phrase = input("Enter a Phrase: ")

char = input("Enter a character: ")

print("Occurence: ",countchr(phrase,char))

Explanation:

To answer this question, I made use of function

This line defines function countchr

def countchr(phrase, char):

This line initializes count to 0

     count = 0

This line iterates through each character of input phrase

     for i in range(len(phrase)):

This line checks if current character equals input character

           if phrase[i] == char:

The count variable is incremented, if the above condition is true

                 count = count + 1

The total number of occurrence is returned using this line

     return count

The main method starts here; This line prompts user for phrase

phrase = input("Enter a Phrase: ")

This line prompts user for a character

char = input("Enter a character: ")

This line prints the number of occurrence of the input charcater in the input phrase

print("Occurence: ",countchr(phrase,char))

Use the loop invariant (I) to show that the code below correctly computes the product of all elements in an array A of n integers for any n ≥ 1. First use induction to show that (I) is indeed a loop invariant, and then draw conclusions for the termination of the while loop.

Algorithm 1 computeProduct(int[ ] A, int n)
p = a[0]
i = 0
while i < n − 1 do
//(I) p = a[0] · a[1] · · · a[i] (Loop Invariant)
i + +
p = p · a[i]
end while
return p

Answers

Answer:

Given Loop Variant P = a[0], a[1] ... a[i]

It is product of n terms in array

Explanation:

The Basic Step: i = 0, loop invariant p=a[0], it is true because of 'p' initialized as a[0].

Induction Step: Assume that for i = n - 3, loop invariant p is product of a[0], a[1], a[2] .... a[n - 3].

So, after that multiply a[n - 2] with p, i.e P = a[0], a[1], a[2] .... a[n - 3].a[n - 2].

After execution of while loop, loop variant p becomes: P = a[0], a[1], a[2] .... a[n -3].a[n -2].

for the case i = n-2, invariant p is product of a[0], a[1], a[2] .... a[n-3].a[n-2]. It is the product of (n-1) terms. In while loop, incrementing the value of i, so i=n-1

And multiply a[n-1] with p, i.e P = a[0].a[1].a[2].... a[n-2].

a[n-1]. i.e. P=P.a[n-1]

By the assumption for i=n-3 loop invariant is true, therefore for i=n-2 also it is true.

By induction method proved that for all n > = 1 Code will return product of n array elements.

While loop check the condition i < n - 1. therefore the conditional statement is n - i > 1

If i = n , n - i = 0 , it will violate condition of while loop, so, the while loop will terminate at i = n at this time loop invariant P = a[0].a[1].a[2]....a[n-2].a[n-1]

The compare_strings function is supposed to compare just the alphanumeric content of two strings, ignoring upper vs lower case and punctuation. But something is not working. Fill in the code to try to find the problems, then fix the problems.

import re
def compare_strings(string1, string2):
#Convert both strings to lowercase
#and remove leading and trailing blanks
string1 = string1.lower().strip()
string2 = string2.lower().strip()

#Ignore punctuation
punctuation = r"[.?!,;:-']"
string1 = re.sub(punctuation, r"", string1)
string2 = re.sub(punctuation, r"", string2)

#DEBUG CODE GOES HERE
print(___)

return string1 == string2

print(compare_strings("Have a Great Day!", "Have a great day?")) # True
print(compare_strings("It's raining again.", "its raining, again")) # True
print(compare_strings("Learn to count: 1, 2, 3.", "Learn to count: one, two, three.")) # False
print(compare_strings("They found some body.", "They found somebody.")) # False

Answers

Answer:

There is a problem in the given code in the following statement:

Problem:

punctuation = r"[.?!,;:-']"

This produces the following error:

Error:

bad character range

Fix:

The hyphen - should be placed at the start or end of punctuation characters. Here the role of hyphen is to determine the range of characters. Another way is to escape the hyphen - using using backslash \ symbol.

So the above statement becomes:

punctuation = r"[-.?!,;:']"  

You can also do this:

punctuation = r"[.?!,;:'-]"  

You can also change this statement as:

punctuation = r"[.?!,;:\-']"

Explanation:

The complete program is as follows. I have added a print statement print('string1:',string1,'\nstring2:',string2) that prints the string1 and string2 followed by return string1 == string2  which either returns true or false. However you can omit this print('string1:',string1,'\nstring2:',string2) statement and the output will just display either true or false

import re  #to use regular expressions

def compare_strings(string1, string2):  #function compare_strings that takes two strings as argument and compares them

   string1 = string1.lower().strip()  # converts the string1 characters to lowercase using lower() method and removes trailing blanks

   string2 = string2.lower().strip()  # converts the string1 characters to lowercase using lower() method and removes trailing blanks

   punctuation = r"[-.?!,;:']"  #regular expression for punctuation characters

   string1 = re.sub(punctuation, r"", string1)  # specifies RE pattern i.e. punctuation in the 1st argument, new string r in 2nd argument, and a string to be handle i.e. string1 in the 3rd argument

   string2 = re.sub(punctuation, r"", string2)  # same as above statement but works on string2 as 3rd argument

   print('string1:',string1,'\nstring2:',string2)  #prints both the strings separated with a new line

   return string1 == string2  # compares strings and returns true if they matched else false

#function calls to test the working of the above function compare_strings

print(compare_strings("Have a Great Day!","Have a great day?")) # True

print(compare_strings("It's raining again.","its raining, again")) # True

print(compare_strings("Learn to count: 1, 2, 3.","Learn to count: one, two, three.")) # False

print(compare_strings("They found some body.","They found somebody.")) # False

The screenshot of the program along with its output is attached.

Following are the modified program to the given question:

Program Explanation:

Import package.Defining a method "compare_strings" that takes two parameters "string1, string2".Inside the method, parameter variables have been used that convert and hold string values into lower case.In the next step, a variable "punctuation" is defined that holds value.After this, a parameter variable is used that calls the sub-method that checks parameter value with punctuation variable value, and at the return keyword is used that check string1 value equal to string2.Outside the method, multiple print method is used calls the method, and prints its value.

Program:

import re #import package

def compare_strings(string1, string2):#defining a method compare_strings that takes two parameters

   string1 = string1.lower().strip()#defining a variable string1 that converts and holds string value into lower case  

   string2 = string2.lower().strip()#defining a variable string1 that converts and holds string value into lower case

   punctuation = r'[^\w\s]'#defining a variable that holds value

   string1 = re.sub(punctuation, '', string1)#using the variable that calls the sub method that checks parameter value with punctuation variable value  

   string2 = re.sub(punctuation, '', string2)#using the variable that calls the sub method that checks parameter value with punctuation variable value  

   return string1 == string2#using return keyword that check string1 value equal to string2

print(compare_strings("Have a Great Day!", "Have a great day?")) # calling method that prints the return value

print(compare_strings("It's raining again.", "its raining, again")) # calling method that prints the return value

print(compare_strings("Learn to count: 1, 2, 3.", "Learn to count: one, two, three.")) # calling method that prints the return value

print(compare_strings("They found some body.", "They found somebody.")) # calling method that prints the return value

Output:

Please find the attached file.

Learn more:

brainly.com/question/21579839

ou are sending a very small amount of information that you need the listening program to respond to immediately. Which Transmission Control Protocol (TCP) flag will be used

Answers

Answer:

The Push flag

Explanation:

When sending a very small amount of information which the listening program needs to respond to immediately. The Transmission Control Protocol (TCP) flag that will be used is the Push flag.

The Push flag, like the Urgent flag, was brought into existence to ensure that the data is given the priority it deserves and it is urgently processed at the sending or receiving end. Push flag is used more often at the beginning and end of a data transfer, it affect the way the data is handled at both ends (sending and receiving).

When developers make available new applications, they must always ensure they follow specific guidelines given by the RFC's to ensure that the applications created work properly / efficiently and control the flow of data in and out of the application layer of the OSI model perfectly. When used, the Push bit ensure that the data segment is handled correctly and given the deserved priority at both ends of a virtual connection.

What is a real-life example of a Microsoft Access Query?

Answers

Explanation:

Microsoft Access is an information management tool that helps you store information for reference, reporting, and analysis. Microsoft Access helps you analyze large amounts of information, and manage related data more efficiently than Microsoft Excel or other spreadsheet applications.

A real-life example of a Microsoft Access Query is a table that stores the names of new customers at a supermarket.

What is Microsoft Access?

Microsoft Access is a database management software application designed and developed by Microsoft Inc., in order to avail its end users an ability to create, store and add data to a relational database.

In Microsoft Access, the options that are available on the File tab include the following:

Opening a database.

Selecting a template.

Creating a new database.

In conclusion, a database is an element in Microsoft Access which is an ideal data source and a query would always obtain, generate, or pick information from it.

Read more on Microsoft Access here: brainly.com/question/11933613

#SPJ2

What is industry 4.0 -automation revolution-, what is your opinion about the direction this revolution is taking the industry in, and discuss the fate of unskilled and semi-skilled workers affected by industry 4.0.

Answers

Answer:

Find the explanation below.

Explanation:

1. Industry 4.0 -automation revolution is a term first used in Germany in 2011 to describe the fourth generation of the industrial revolution. It is the incorporation of digitalized procedures that use smart technology that can work in real-time to industrial production. This means that the machines used in production can independently interact between themselves to accomplish tasks that would otherwise have needed human involvement.

2. My opinion regarding this industrial revolution is that it is a welcome development for businesses because it will help them execute projects at faster rates and limit some working expenses.

3. Unskilled and Semi-skilled workers will be badly affected by this revolution because tasks ordinarily performed by them would be mostly taken over by these machines. This means that companies would most likely lay off these workers whose jobs would now be performed by machines. Job regulation agencies would do well to seek ways to intervene for this group of workers. They may also have to improve their skills if they want to remain relevant to their jobs.

The revolution, however, would be favorable for high-skilled workers because they would be needed to perform jobs such as the maintenance and programming of these machines.

Implement function easyCrypto() that takes as input a string and prints its encryption
defined as follows: Every character at an odd position i in the alphabet will be
encrypted with the character at position i+1, and every character at an even position i
will be encrypted with the character at position i 1. In other words, ‘a’ is encrypted with
‘b’, ‘b’ with ‘a’, ‘c’ with ‘d’, ‘d’ with ‘c’, and so on. Lowercase characters should remain
lowercase, and uppercase characters should remain uppercase.
>>> easyCrypto('abc')
bad
>>> easyCrypto('Z00')
YPP

Answers

Answer:

The program written in python is as follows;

import string

def easyCrypto(inputstring):

      for i in range(len(inputstring)):

             try:

                    ind = string.ascii_lowercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

                           print(string.ascii_lowercase[ind+1],end="")

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

anystring = input("Enter a string: ")

easyCrypto(anystring)

Explanation:

The first line imports the string module into the program

import string

The functipn easyCrypto() starts here

def easyCrypto(inputstring):

This line iterates through each character in the input string

      for i in range(len(inputstring)):

The try except handles the error in the program

             try:

This line gets the index of the current character (lower case)

                    ind = string.ascii_lowercase.index(inputstring[i])

This line adds 1 to the index

                    pos = ind+1

This line checks if the character is at even position

                    if pos%2 == 0:

If yes, it returns the alphabet before it

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

It returns the alphabet after it, if otherwise

                           print(string.ascii_lowercase[ind+1],end="")

The except block does the same thing as the try block, but it handles uppercase letters

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

The main starts here

This line prompts user for input

anystring = input("Enter a string: ")

This line calls the easyCrypto() function

easyCrypto(anystring)

what is filter in image processing

Answers

Answer:

Image processing operations implemented with filtering include smoothing, sharpening, and edge enhancement.

Identify five key technologies/innovations and discuss their advantages and disadvantages to developing countries like Ghana.​

Answers

Answer:

The key technology/ innovation advantage and disadvantage can be defined as follows:

Explanation:

Following are the 5 innovations and technology, which promote the other development goals, like renewable energy, quality of jobs, and growth of economic with the good health and very well-being:

1) The use of crop monitoring drone technology promotes sustainable farming.  

2) The production of plastic brick including highways, floors, and houses.  

3) The new banking market or digital banking.  

4) E-commerce site.    

5) Renewable energy deployment such as solar panels.  

Advantage:

It simple insect control, disease, fertilizer, etc.   It helps in aid in environmental purification and job formation.It is also fast and easy,  Funds are transferred extremely easily through one account to another.  Minimal prices, quick customer developments, and competition in the industry.  It saves them money in the medium-haul, less servicing.

Disadvantage:

The drones are too expensive to use, so poor farmers can be cut off.  Specialist technicians and gaining popularity are required.  The financial services data can be distributed through many devices and therefore become more fragile.  The personal contact loss, theft, security problems, etc. The higher operating costs, geographical limitations, and so on.

Assume a PHP document named hello.php has been saved in a folder named carla inside the htdocs folder on your computer. Which is the correct path to enter to view this page in a browser?

Answers

The available options are:

A. localhost/Carla/hello.php

B. localhost/htdocs/hello.php

C. localhost/htdocs/Carla/hello.php

D. carla/hello.php5

Answer:

C.  localhost/htdocs/Carla/hello.php  

Explanation:

A path in computer programming can be defined as the name of a file or directory, which specifies a unique location in a file system.

Therefore, to get the correct path to enter to view this page in a browser, one needs to follow the directory tree hierarchy, which is expressed in a string of characters in which path components, separated by a delimiting character, represent each directory.

Hence, correct path to enter to view this page in a browser is "localhost/htdocs/Carla/hello.php"

Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT a hashing algorithm?
A. SHA-256
B. MD5
C. DAT-1
D. SHA-1

Answers

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

An app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. What type of cloud service is he looking for?

Answers

Answer:

Platform as a Service (PaaS).

Explanation:

In this scenario, an app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. The type of cloud service he is looking for is a platform as a service (PaaS).

In Computer science, Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.

The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.

Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).

Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.

These are the different types of Platform as a Service;

1. Private PaaS.

2. Public PaaS.

3. Hybrid PaaS.

4. Mobile PaaS.

5. Communications PaaS.

6. Open PaaS.

The software developers can choose any of the aforementioned types of PaaS that is suitable, effective and efficient for their applications development. Some examples of PaaS providers are Google, Microsoft, IBM, Oracle etc.

Teachers in most school districts are paid on a schedule that provides a salary based on their number of years of teaching experience. For example, a beginning teacher in the Lexington School District might be paid $30,000 the first year. For each year of experience after this first year, up to 10 years, the teacher receives a 2% increase over the preceding value. Write a program that displays a salary schedule, in tabular format, for teachers in a school district. The inputs are:

Answers

Answer:

Here is the python code:

StartingSal = int(input("Enter the starting salary: "))

AnnualIncrease = (int(input("Enter the annual % increase: ")) / 100)

Years = int(input("Enter the number of years: "))

for count in range(1,Years+1):  

  print("Year ", count, " Salary: ", StartingSal*((1+AnnualIncrease)**(count-1)))

  

Explanation:

This program prompts the user to enter starting salary, percentage increase in salary per year and number of years.

The for loop has range function which is used to specify how many times the salaries are going to be calculated for the number of years entered. It starts from 1 and ends after Years+1 means one value more than the year to display 10 too when user inputs 10 days.

The year and corresponding salary is displayed in output. At every iteration the starting salary is multiplied by annual percentage increase input by user. Here count is used to count the number of salaries per year, count-1 means it will start from 30000.

In Network Address and Port Translation (NAPT), which best describes the information used in an attempt to identify the local destination address?

Answers

Answer:

Hello your question lacks the required options here are the options

source IP and destination IPsource IP and destination portsource IP and source portsource port and destination IPsource port and destination port

answer : source IP and destination port

Explanation:

The information that is used in an attempt to identify the local destination address is the source IP and destination port

source IP is simply the internet protocol address of a device from which an IP packet is sent to another device while destination port are the ports found in a destination device that receives IP packets from source ports  they are found in many internet applications  

Can someone help me out with this one? I'm not sure why my code is not working
Now, let's improve our steps() function to take one parameter
that represents the number of 'steps' to print. It should
then return a string that, when printed, shows output like
the following:
print(steps(3))
111
222
333
print(steps(6))
111
222
333
444
555
666
Specifically, it should start with 1, and show three of each
number from 1 to the inputted value, each on a separate
line. The first line should have no tabs in front, but each
subsequent line should have one more tab than the line
before it. You may assume that we will not call steps() with
a value greater than 9.
Hint: You'll want to use a loop, and you'll want to create
the string you're building before the loop starts, then add
to it with every iteration.
Write your function here
def steps(number):
i = 1
while i < number + 1:
string = str(i) * 3
string1 = str(string)
if i != 0:
string1 = (i * 4*' ' + "\b" + "\b" + "\b" + "\b") + string
elif i == 1:
string1 = string
print(string1)
i = i + 1
#The following two lines will test your code, but are not
#required for grading, so feel free to modify them.
print(steps(3))
print(steps(6)

Answers

Answer:

Add this statement at the end of your steps() function

return ""

This statement will not print None at the end of steps.

Explanation:

Here is the complete function with return statement added at the end:

def steps(number):  # function steps that takes number (number of steps to print) as parameter and prints the steps specified by number

   i = 1  #assigns 1 to i

   while i < number + 1:  

       string = str(i) * 3  #multiplies value of i by 3 after converting i to string

       string1 = str(string)  # stores the step pattern to string1

       if i != 0:  # if the value of i is not equal to 0

           string1 = (i * 4*' ' + "\b" + "\b" + "\b" + "\b") + string  #set the spaces between steps

       elif i == 1:  # if value of i is equal to 1

           string1 = string  #set the string to string1

       print(string1)  # print string1

       i = i + 1  # increments i at each iteration

   return "" #this will not print None at the end of the steps and just add a an empty line instead of None.

Screenshot of the corrected program along with its output is attached.

Below is some info for some internet transactions. We want to sort it by time and by location. Which sorting algorithm is appropriate for this particular problem?
a. radix sort.
b. heap sort.
c. selection sort.
d. shell sort.

Answers

Answer:

c. selection sort

Explanation:

The best way to sort the internet transactions data based on time and location is selection sort. The algorithms sorting technique is used to sort the complex data in computer programs. Shell sort is the technique which sorts the data apart from each other and reduces interval between them. Heap sort is sorting technique based on binary heap data structure. Radix sort is an integer sorting technique in algorithms.

The IT department sets up a user account and software. Which stage of the hardware lifecycle does this situation belong to?

Answers

Answer:

"Development" would be the correct answer.

Explanation:

All that would be required to complete the plan is designed mostly during the development or planning process. The production process is finished whenever it's prepared to resume execution.Local participants and perhaps suppliers are helped to bring in, a timetable would be managed to make, parts and equipment are decided to order, employee training should be given and many more.

state five uses of building​

Answers

Housing, warmth, shelter, to flex on others and pleasure

Hope this helped, but I doubt it(╹◡╹)
Answer

1) Housing

2) Power generation (factories and nuclear reactors)

3) Agriculture (greenhouse)

4) Research (Infectious Diseases Research, isolating different viruses to study them in laboratory conditions)

5) Entertainment and leisure (cinemas, shopping centres)

6) Law and governmental buildings
Other Questions
Searches related to Probability questions - A person frequents one of the two restaurants KARIM or NAZEER, choosing Chickens item 70% of the time and fishs item 30% of the time. Regardless of where he goes , he orders Afghani Chicken 60% of his visits. (a) The next time he goes into a restaurants, what is the probability that he goes to KARIM and orders Afghani Chicken. (b) Are the two events in part a independent? Explain. (c) If he goes into a restaurants and orders Afghani Chicken, what is the probability that he is at NAZEER. (d) What is the probability that he goes to KARIM or orders Afghani Chicken or both? Please help I need to graduate!!! : Did you know that ______Colfax Avenue is _the__ longest continuous street in _the_ United States? For functions f(x)=2x^24x+3 and g(x)=x^22x6, find a. (f+g)(x) b. (f+g)(3). Intntalo!Fill in the blanks Activity Textbook InstructionsWrite sentences using the present progressive with the information provided. Follow the model. All of the following Oklahoma cities have populations of greater than 50,000 exceptA. EdmondB. StillwaterC. MooreD. Lawton how to solve this problem:If a borrower can afford to make monthly principal and interest payments of $1,000 and the lender will make a 30-year loan at 5-1/2%, or a 20-year loan at 4-1/2%, what is the largest loan (rounded to the nearest $100) this buyer can afford? The function of Mitosis is to produce daughter cells that _______. have the same number of chromosomes as the parent cell but not the same genetic make-up are genetically identical to the parent cell have a random assortment of maternal and paternal chromosomes How are the elements arranged in the modern periodic table?O A. According to atomic numberB. According to atomic massC. According to the number of neutronsO D. According to the number of electrons Greenbrier Industrial Products' bonds have a 7.60 percent coupon and pay interest annually. The face value is $1,000 and the current market price is $1,062.50 per bond. The bonds mature in 16 years. What is the yield to maturity Can you cure a virus? Can you cure a bacteria? Can you cure a fungus? A defendant is told by his lawyer that he must testify in his defense. Why is this NOT true? intext:"Pelcher Co. maintains a $400 petty cash fund. On January 31, the fund is replenished. The accumulated receipts on that date represent $110 for office supplies, $140 for merchandise inventory, and $70 for miscellaneous expenses. There is a cash overage of $4. Based on this information, the amount of cash in the fund before the replenishment is" A soft drink machine can be regulated so that it discharges an average of Mu ounces per cup. If the ounces of fill are Normally distributed with a standard deviation of 0.4 ounces, what value should Mu be set at so that 6-ounce cups will overflow only 2% of the time what does a 9 round up to in the decimal when in the tenths place? for example if it is 30.98 and it says to round to the nearest tenths place what would the decimal be now? Micah is handing out miniature chocolate bars and butterscotch hard candies for Halloween. He wants tohave a total of 7 pounds of candy, but he doesn't want to spend more than $11.00 total on the candy. If miniature chocolate bars costs $1.80 per pound, and butterscotch hard candies costs $1.00 per pound, how many pounds of each type of candy should he buy? John wants to nail a thumbtack on his circular board, pictured below. If the thumbtack is equally likely to be placed anywhere on the board, what is the probability that the thumbtack will be placed on the inner circle? Use 3.14 for pi , and round your answer to the nearest whole percent. A. 51% B. 55% C. 57% D. 60% 5. Friday morning the Matthews family goes to town to buy groceries. The following threeoptions are available for cereal:CEREALCEREALCEREALOption 1:300 g for $3.89Option 2:450 g for $4.77Option 3:600 g for $6.59Which option is the best buy? Justify your answer. (17) Please answer it now in two minutes There is a bag with only red marbles and blue marbles. The probability of randomly choosing a red marble is 7 9 . There are 28 red marbles in the bag and each is equally likely to be chosen. Work out how many marbles in total there must be.