Answer:
3
Explanation:
We can split the expression into two sections
First Section:
7 // 2 = 3. Using the floor division we only utilize the integer part.
Second Section:
10 % 2**4 = 0**4 = 0
Bringing back the full version expression we have
3 + 0 = 3
Complete the statement using the correct term.
The [blank] of the site is what will be displayed on the web page.
answer is Body
The BODY of the site is what will be displayed on the web page. It contains most of the distinctive content of the web page.
A web page refers to a document exhibited by the browser, which is generally written in the HTML language.
The body of a web page is a big area in the center that contains the most important and distinctive content of a web page.
The body will determine the central content of the HTML document, which will be observable on the web page (e.g., a photo gallery).
Learn more about a web page here:
https://brainly.com/question/16515023
Which of the following is NOT an example of editing?
O Adjusting photos
O Cutting video and audio
O Proofreading written content
O Designing graphics
Answer:
ang answer po at proofreading written
content
Explanation:
if I wrong please correction me!
describe the process of terminating a crossover cable
People can use computers for sending ....... writing reports, listening to music and playing games.
Answer:
the answer is messages, emails, texts
Hope This Helps!!!
Answer:
People can use computers for sending MESSAGES'TEXT'EMAILS ,writing reports,listening to music and playing games....state an application that would be better to write c++ than java and give a rationale for your answer
Brainliest if correct. 5. if you wanted b show how many employees at your office ride a bicycle to work in
comparison to the number of employees who drive a car, take public transportation,
or walk wihat visual would be best? (1 point)
Answer:
I believe a bar graph would be best for me. What are your answer options though?
Explanation:
I really need help with this question! Please help!
Answer:
(C) Emma goes to sleep late and does not set an alarm.
Explanation:
Decomposing a problem is setting a back drop inference as to (WHY?) something happens . So Emma woke up late , the only reasonable (WHY?) in this question would be (C)
Alexis plans to stop trading once she lose 5% of her account balance, her account balance is $215.00. How much money is she willing to lose ?
Answer:
She's willing to lose $10.75.
Explanation:
$215.00 * .05 = answer
or
$215.00 * .95 = x
$215.00 - x = answer
Define Word Processing
Answer:
Word Processing refers to the act of using a computer to create, edit, save and print documents. ... Text can be inserted, edited, moved, copied or deleted within your document and the appearance of the text can be modified in numerous ways.
Write a program that reads the student information from a tab separated values (tsv) file. The program then creates a text file that records the course grades of the students. Each row of the tsv file contains the Last Name, First Name, Midterm1 score, Midterm2 score, and the Final score of a student. A sample of the student information is provided in StudentInfo.tsv. Assume the number of students is at least 1 and at most 20.
The program performs the following tasks:
Read the file name of the tsv file from the user.
Open the tsv file and read the student information.
Compute the average exam score of each student.
Assign a letter grade to each student based on the average exam score in the following scale:
A: 90=
B: 80=< X < 90
C: 70=< X < 80
D: 60=< X < 70
E: X < 60
Compute the average of each exam.
• Output the last names, first names, exam scores, and letter grades of the students into a text file named report.txt.
• Output one student per row and separate the values with a tab character.
• Output the average of each exam, with two digits after the decimal point at the end of report.txt. Hint: Use the setprecision manipulator to format the output.
Ex: If the input of the program is:
StudentInfo.tsv
and the contents of Studentinfo tsv are:
Barrett Edan 70 45 59
Bradshaw Reagan 96 97 88
Charlton Caius 73 94 80
Mayo Tyrese 88 61 36
Stern Brenda 90 86 45
the file report.txt should contain:
Barrett Edan 70 45 59 F
Bradshaw Reagan 96 97 88 A
Charlton Caius 73 94 80 B
Mayo Tyrese 88 61 36 D
Stern Brenda 90 86 45 C
Averages: midtermi 83.40, midterm2 76.60, final 61.60
Question 4 A data analyst wants to include a line of code directly in their .rmd file in order to explain their process more clearly. What is this code called
A line of code that can be inserted directly into a .rmd file is called an inline code.
R Markdown (.rmd file) is a file format that is typically used for making dynamic documents by using R Studio and R programming language. Also, R Markdown files can be used in the following ways:
To save, organize, and document an executable code.To create a record of any cleaning process.To generate reports containing an executable code for stakeholders.In R Studio, an inline code is a line of code that can be inserted directly into a R Markdown (.rmd file), in order to explain a process more clearly.
Read more on R Markdown here: https://brainly.com/question/25558534
Write a program that generates 100 random numbers and keeps a count of how many of those random numbers are even and how many of them are odd.
Answer:
import random
numbers = []
even = 0
odd = 0
for i in range(100):
numbers.append(random.randint(1, 200))
for i in range(100):
if numbers[i] % 2 == 0:
even += 1
else:
odd += 1
print("Even:", even)
print("Odd:", odd)
Explanation:
Gg ez.
VPN or Proxy is safer?
Where is the option to set Conditional Formatting rules found?
O Insert tab in the Formatting group
O Page Layout tab in the Styles group
O Home tab in the Styles group
Formulas tab in the Formatting group
Answer:
C. Home tab in the Styles group
Explanation:
answer on edge 2021
why do you think mobile devices have CPUs that are less powerful than those in a larger desktop computer?
Mobile devices have CPUs that are less powerful than those in a larger desktop computer needs power as well as the device memory that was needed is not present.
What is CPU?
The central processing unit also known as CPU is an important part of the computer as it posses the part where the basic functions like taking actions, input or ouput etc. This all process needs high power and battery as well as storage.
For a battery excessive electricity utilization and significant temperature rise can just be problems. The CPU of a device cannot be powered at higher, continuous levels using such a little battery.
As a result, the most recent cellphone cannot compete with the performance of a top-tier desktop computer. the processor as well as the battery is needed for a CPU that can not be in mobiles.
Learn more about CPUs, here:
https://brainly.com/question/16254036
#SPJ2
What is a shell programming? Write a shell program to get the following details from the student: NAME, AGE, USN and GENDER. Output all the details to the terminal and also display message whether the student is eligible to vote or not
Shell programs are computer programs designed to run on the Unix/Linux shell
The shell program where comments are used to explain each line is as follows:
#This gets input for NAME
read NAME
#This gets input for AGE
read AGE
#This gets input for USN
read USN
#This gets input for GENDER
read GENDER
#This prints the name
echo "Name: $NAME"
#This prints the age
echo "Age: AGE"
#This prints the usn
echo "USN: USN"
#This prints the gender
echo "GENDER: $GENDER"
#The following if condition determines, if the user is eligible to vote or not
if [ $USN -gt 50 ] then
echo "You are not eligible"
else
echo "You are eligible"
Read more about computer programs at:
https://brainly.com/question/13795586
explain the use of mail merge feature.
pls help
At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:
a) message content
b) source address
c) type of application
The answer is c) type of application
The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name. Thus, option C is correct.
What are the TCP/IP protocol hierarchy could a firewall?Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).
Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.
Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.
Learn more about TCP/IP here:
https://brainly.com/question/27742993
#SPJ2
If a client must wait too long for software that works, he might attempt to add requests for more and more features to be added to the program. This is known as ________.
Answer:
scope creep
Explanation:
hi hi hihihihihivvv hihihihihihi v vhi
Answer: hihihihihihiihihi hihihihiihihih
Explanation: hi.
I have a D in one of my majors, I got a lot of 70s and I'm failing music. im in middle school. Will I be held back? Please answer this
Answer:
probably sorry it will be okay
what are organization tools?
(a) Explain what the following Java components are used for.JListJFrameFLowLayoutJpanelJFrameEventListener(b) Write simple Java codes to illustrate how each one of the above components are implemented.
Answer:
Welcome to Gboard clipboard, any text you copy will be saved here.
Write a python program to calculate the sum of three numbers and as well require the user to input the numbers.
Answer:
numbers = []
for i in range(3):
numbers.append(eval(input("Enter number: ")))
print('Sum is:', sum(numbers))
Explanation:
You want to use a loop to prevent repeating your code.
Answer:
numbers = []
for i in range(3):
numbers.append(eval(input("Enter number: ")))
print('Sum is:', sum(numbers))
Identifies 3 different companies that use Information Systems. Then for each company describe the WHAT the company actually uses, the HOW the company uses it, and the WHY the company needs to implement this system within itself.
The companies that use Information Systems are
Amazon IBMRRE VenturesHow does Ama.zon use information systems?Ama.zon uses information systems in a lot of its business processes as it helps them to have good and improved efficiency in the the area of collection, storage, and analytics of all their customers' information.
Conclusively, IBM uses the information system for:
Keeping of customers information.communicating.Buying and selling etc.Learn more about Information Systems from
https://brainly.com/question/14688347
Complete the sentence based on the given information.
______ are responsible for analyzing the client business model, whereas _____ are responsible for identifying errors in the software product to confirm that it meets the client model.
Answer:
blank answer so brainly doesnt delete your question.
Explanation:
Diane, a developer, needs to program a logic component that will allow the user to enter a series of values
check image dont answer if you dont know please
Answer:
Explanation:
1-2nd option
2-1st option
3-last option
hope this helps!! have a good rest of ur day!! <3
13) You notice that the row labels in your spreadsheet are 1, 2, 3, 8, 9.
Row labels 4 through 7 are missing. What could cause this?
Possible reasons for missing out row 4 to 7 are as follows,
Chance of rows from 4 to 7 contain incorrect/ non formatted data.Chance of rows from 4 to 7 are in hidden state.Chance of rows from 4 to 7 are assigned to some other user which does not belongs to your current user.Chance of rows from 4 to 7 were deleted from the sheet.These are all the possible reasons for missing of row 4 to 7.
Learn more: https://brainly.com/question/24504878
A Product Manager has been given responsibility for overseeing the development of a new software application that will be deployed to a group of Accenture clients.
What would be the most time-saving and cost-effective way for the Product Manager to address the new application’s security considerations?
Utilize a DevSecOps approach to incorporate security into the development process from the beginning.
Schedule development of security features after the application’s initial release.
Design the application’s security features after the application’s initial build is complete.
Contract with an external vendor to develop a security solution separately from the main application.
I don't know this yet.
There are different software that has been developed today. The most time-saving and cost-effective way is to Design the application’s security features after the application’s initial build is complete.
Accenture is known for their work in improving business needs. They are constantly shifting to a new method of delivering information technology.
They are known to embed security into the product development life cycle helps secure the business and also keeping speed and assisting to remove friction.
Learn more about Accenture from
https://brainly.com/question/25737623