Answer:
there nothing in the doc
Explanation:
If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All computers are electronic devices. Some electronic devices are not made of clay.
Answer:
because the conclusion is not in agreement with the two premises.
Explanation:
Remember, the term syllogism refers to the form of reasoning that draws its conclusion based on the stated premises. In other words, a conclusion is reached if it satisfies all or part of the premises.
In this case, the statement "No computer is made of clay" and "All computers are electronic devices" should be inferred to mean, No electronic devices are made of clay" not "Some electronic devices are not made of clay," since the two premises neither suggest that electronic devices are made from clay.
The reason why the given syllogism is invalid is because; The conclusion does not agree with the premise.
We are given two statements as premises;
1) No computer is made of clay
2) All computers are electronic devices
The third statement is the conclusion which states that;
3) Some electronic devices are not made of clay.
Now in syllogism, the conclusion must be in agreement with the two premises.
In this question, the conclusion doesn't agree with the premises because the conclusion says "some electronic devices are not made of clay". Whereas the premise says that no computer which is an electronic device is made of clay.
Since none of the premise suggests that any electronic device is made of clay, then the syllogism is invalid.
Read more about syllogism at; https://brainly.com/question/1622136
What are the two extra registers that the fetch decode execute cycle uses to communicate with memory outside of the chip?
Answer:
Memory address register
Memory buffer register
Explanation:
In c/c++, the processor consists of mainly five stages.
FETCH DECODE EXECUTE MEMORYWRITE BACKThe memory address (MAR) register is a register where memory locations are being stored and where instructions are being fetched from the memory.
The memory buffer register (MBR) specifically enables the storage of data that are fetched or to be written in the memory.
Am giving BRAINLIEST!!!!!!! Assume you have entered the following after a prompt. >>> import time
How would you pause a program for 5 seconds?
Answer:
time.sleep(5)
Explanation:
Write a program that first gets a list of integers from input. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds).
Answer:
The program in Python is as follows:
mylist = []
num = int(input("Length: "))
for i in range(num):
inp = int(input(": "))
mylist.append(inp)
lower = int(input("Lower Bound: "))
upper = int(input("Upper Bound: "))
for i in mylist:
if i >= lower and i <= upper:
print(i, end=" ")
Explanation:
This initializes an empty list
mylist = []
The prompts the user for length of the list
num = int(input("Length: "))
The following iteration reads input into the list
for i in range(num):
inp = int(input(": "))
mylist.append(inp)
This gets the lower bound of the range
lower = int(input("Lower Bound: "))
This gets the upper bound
upper = int(input("Upper Bound: "))
This iterates through the list
for i in mylist:
This checks for elements of the list within the range
if i >= lower and i <= upper:
This prints the list element
print(i, end=" ")
Answer:input_numbers = [int(x) for x in input().split(' ')]
input_range = [int(x) for x in input().split(' ')]
for number in input_numbers:
if input_range[0] <= number <= input_range[1]:
print('{}'.format(number), end = ' ')
Explanation:
Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size.
Answer:
The solution in Python is as follows:
class myClass:
def doubleUp(self,doubleList):
doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]
newlist = []
n = int(input("Number of elements: "))
for i in range(n):
num = int(input(": "))
newlist.append(num)
list = myClass()
list.doubleUp(newlist)
print(newlist)
Explanation:
Start by creating a class
The solution in Python is as follows:
class myClass:
Then define the method doubleUp
def doubleUp(self,doubleList):
The duplicates is done here
doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]
The program main begins here
This defines an empty list
newlist = []
This prompts user for number of elements
n = int(input("Number of elements: "))
The following iteration get the elements of the list
for i in range(n):
num = int(input(": "))
newlist.append(num)
This defines the instance of the class
list = myClass()
This calls the method
list.doubleUp(newlist)
Lastly, this prints the duplicate list
print(newlist)
Enumerate the four basic mathematical operations and their corresponding Excel operators.
Answer:
The four basic mathematical operations are Addition, subtraction, multiplication, and division.
Explanation:
Consider the provided information.
The four basic mathematical operations are Addition, subtraction, multiplication, and division.
Their corresponding Excel operators.
Addition: If you want to add 2 numbers in excel, for example, 3 and 5. use the operation
=3+5
Then press enter.
Subtraction: If you want to subtract 2 numbers in excel, for example, 5 and 3. use the operation
=5-3
Then press enter.
Multiplication: If you want to multiply 2 numbers in excel, for example, 3 and 5. use the operation
=3*5
Press enter.
Division: If you want to divide 2 numbers in excel, for example, 3 and 5. use the operation
=3/5
Press enter.
Hence, the four basic mathematical operations are Addition, subtraction, multiplication, and division.
2.You have been specifically asked to implement a stream cipher. Which cryptographic algorithm could you use
Answer:
symmetric-key cryptography
Explanation:
There are two types of cryptographic algorithms, the public key algorithm which uses a public key to encode a message before transmission and a private key to decode the message after transmission, and the private key or symmetric key algorithm which uses a private key to both encode and decode a message.
To find any information on the Internet, we enter specific keywords into a search engine. What happens next
Answer:
Answer A
Explanation:
A company is completing research and development for software which it is planning to produce in approximately 2 years time. Which of the following assumptions should the company make about the processing speeds of the hardware which will be used to run this software.
Answer:
true tbh I don't really Know
2. A __________ is a single function that the program must perform in order to satisfy the customer.
Answer: A software requirement is a single function that the program must perform in order to satisfy the customer.
Explanation:
A program is a set of instructions or commands that are required to perform a job. So before programming , we should know what we want our program to do so we can do it and then verify it.
The set of required tasks in our program is called as software requirement.
These are agreed by the customer and the developer before hand. Each software requirement describe a single wanted functionality from our program.
ELO 3.6 Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
Answer:
iSCSI Qualified Name (IQN).
Explanation:
iSCSI is simply an acronym for Internet Small Computer Systems Interface and it is typically an internet protocol (IP) with respect to a storage area network (SAN) standard used essentially for connecting data storage facilities over a transmission control protocol and internet protocol (TCP/IP).
iSCSI Qualified Name (IQN) is a type of iSCSI name that requires a registered domain name to generate a unique iSCSI identifier.
This ultimately implies that, a data storage organization must have a registered domain name in order to be able to generate an iSCSI Qualified Name (IQN). Also, the iSCSI Qualified Name (IQN) is not linked to an internet protocol (IP) address and as such it is considered to be a logical name.
what are the qualities of different products that caught your eye and encourage you to buy them
Answer:
The qualities of different products that caught your eye and encourage you to buy them is described below in detail.
Explanation:
A fantastic method to do this would be to practice shiny colors in any advertisement you publish. This is an old method, but it's a great one. Glowing orange, for example, is sure to hold watching much higher than bland shades like gray. Play throughout here, and apply the color you think illustrates the eye most.
pls help
Will give brainlest Ashton assigned a string value to a variable. Which program statement should he use?
2bookName = "Brave New World"
Book Name = "Brave New World"
bookName = "Brave New World"
bookName! = "Brave New World"
Answer:
I think its B bookName! = "Brave New World"
Explanation:
Answer:
B: Book Name = "Brave New World"
Explanation:
Please helpppp. Rearrange the parts of the program to generate two random integers and then ask the user to guess the greatest common divisor.
First part
Second part
Fourth part
Third part
1. from math import gcd
from random import randrange
numA=randrange(6,50,2)
numB = randrange(6,30,2)
if guess == answer:
print("Good job! You are right.")
print("The right answer is",answer)
answer = gcd(numA,numB)
guess = input("Greatest common divisor of " + str(numA) + " and " + str(numB) + "? " )
Answer:
first part:
from math import gcd
from random import randrange
second part:
numA=randrange(6,50,2)
numB = randrange(6,30,2)
third part:
answer = gcd(numA,numB)
guess = input("Greatest common divisor of " + str(numA) + " and " + str(numB) + "? " )
fourth part:
if guess == answer:
print("Good job! You are right.")
print("The right answer is",answer)
Explanation:
got it right on edge
C++ Random Number Generation with a Range The modulus operator can produce random numbers in any range, much like 1 and 10 do. For instance, you could write int random = 1+ (rand()% 100) to produce numbers between 1 and 100.
What programs to generate two random integers?In the C/C++ computer languages, random number generation is accomplished using the rand() and srand() methods. The srand() value is fixed at 1, therefore the rand() function always produces the same results.
When we run the program, the same random number will be generated each time by the C++ rand() function. The srand (unsigned int seed) function is used to seed the rand() function.
Therefore, The pseudo-random number generation's starting point is set by the srand() function.
Learn more about random integers here:
https://brainly.com/question/15247918
#SPJ2
Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use
Question:
Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.
Answer:
This solution is implemented in C++
double compute_gas_volume(double P, double T, double n){
double V = 8.3144621 * n * T/P;
return V;
}
Explanation:
This line defines the function, along with three parameters
double compute_gas_volume(double P, double T, double n){
This calculates the volume
double V = 8.3144621 * n * T/P;
This returns the calculated volume
return V;
}
To call the function from the main, use:
cout<<compute_gas_volume(P,T,n);
Where P, T and n are double variables and they must have been initialized
Why is user testing ah important part of the design process
Answer:
The general description of the whole of the general concept is described below.
Explanation:
Usability testing would be an important part including its customer construction business it allows users to see what works and where it doesn't function properly with someone's design elements. Keep challenging yourself to provide much more of your workshops through using at least yet another novel concept from that kind of blog post during your very next or even first and another round of research.
Identify the device used to convert an information signal to a signal compatible with the medium over which it is being transmitted.
Answer:
A modulator
Explanation:
This device is called a modulator and it does the task of modulation. The act of modulation influences data information on the carrier, allowing signal to be sent over a bandpass frequency range.
The Modulator is what controls an input audio signal which is called a carrier. It does not make a sound. What it does instead is to change the original carrier sound wave. The work of the Modulator as evident in the question is the conversion of information signal to a signal compatible with the medium over which it is going to be transmitted.
How do you change the order of the slides in your presentation in the slide pane 
Copy and paste
Delete
Drag and drop
Remove
Answer:
Hold down on your slide number and then pull in the order
Explanation:
Remember push down the pull up
_________________ allows cloud controller to locate instances on separate zones to boost redundancy.
Answer:
_____Router___ allows the cloud controller to locate instances on separate zones to boost redundancy.
Explanation:
A router, as a networking device, forwards data packets between one computer network and other networks. With a router, one can use wired and wireless devices to connect to the Internet. Unlike a modem, which connects the home network to a wider internet, a router can enable the networks to interact with one another without using the Internet.
Timothy is an architect. He needs to create a prototype of a new apartment that his firm is building. Which multimedia software would he use? A. image editing program B. painting program C. animation program D. digital video program E. 3D modeling program
For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also known as _____________.
Answer:
Quality-of-Service (QoS) guarantees
Explanation:
This task for a computer is known as Quality-of-Service (QoS) guarantees. This is basically a protocol that is built into a specific product or service which analyzes that application process and makes sure that everything is correct. This would include the rate and timing requirements that need to be met in order for the computer to deliver the continuous media. If this is not the case certain actions can be implemented using the data provided to fix this issue.
Write a method that accepts a number of seconds and prints the correct number of hours, minutes, and seconds.
Answer:
This solution is implemented in Java
public static void timme(int seconds) {
int hours = seconds/3600;
System.out.println("Hours: "+hours);
[tex]seconds = seconds - hours * 3600;[/tex]
int minutes = seconds/60;
System.out.println("Minutes: "+minutes);
[tex]seconds = seconds - minutes * 60;[/tex]
System.out.println("Seconds: "+seconds);
}
Explanation:
This method defines the method along with one parameter
public static void timme(int seconds) {
This calculates hours from the seconds
int hours = seconds/3600;
This prints the calculated hours
System.out.println("Hours: "+hours);
This calculates the seconds remaining
[tex]seconds = seconds - hours * 3600;[/tex]
This calculates the minutes from the seconds left
int minutes = seconds/60;
This prints the calculated minutes
System.out.println("Minutes: "+minutes);
This calculates the seconds remaining
[tex]seconds = seconds - minutes * 60;[/tex]
This prints the seconds left
System.out.println("Seconds: "+seconds);
}
Write a method named swap that takes an int parameter followed by a double and prints them in the reverse order. For example, calling swap(4, 7.5) would print 7.5 4.
Answer:
Explanation:
The following code is written in Python and does exactly what is being asked in the question. It creates a function/method that takes in two parameters one int and one double, and prints them in reverse order. Double first and the Int second
def swap_numbers(int_num, double_num):
print(double_num, int_num)
The method named swap that takes an int parameter followed by a double
and prints them in the reverse order is as follows:
def swap(x, y):
print(y, x)
swap(4, 7.5)
The code is written in python
A function/method is declared in python.
This method accept two parameters x and y.
The parameters accept integers and double(float) respectively.
Then we call the functions/method with its parameters.
learn more: https://brainly.com/question/19880203?referrer=searchResults
A drop light that does not allow any electrical parts to come in contact with the outer casing of the device is called a:
Answer:
The right answer is "Double insulated light".
Explanation:
Double insulated led is mostly a sophisticated type of natural light that does not necessitate a terrestrial or planetary correlation. These illuminations could be based on these metals, are indicated in the electrical protection environmental standards that now the construction workers comply with, and therefore are readily accessible about every bedroom.Give ways on how to effectively save.
Answer:
Explanation:
say goodbye to debt. Monthly debt payments are the biggest money suck when it comes to saving. ...
Cut down on groceries. ...
Cancel automatic subscriptions and memberships.
how to promote CPA offers without a website?
Answer:
Report Promote Marketing For CPA Offer: Article advertising is the same as blog entry advancement. Agree to take some excellent article accommodation destinations and begin submitting encouraging posts. Compose articles that are by one Way or another pertinent to your exclusive CPA offer
Explanation:
:)
If you convinced your teacher to give you an extension on an assignment, what would this situation be an example of? OA. Generalization O O B. Prediction C. Drawing conclusions D. Rhetoric
Answer:
D. Rhetoric
Explanation:
Just trust me....okay!?......okay
What are the characteristics of desktop alerts in Outlook 2016? Check all that apply.
On-screen notifications will pop up for new emails, meeting invites, and new tasks.
Email pop-ups will display the sender's name, subject, and a small bit of the message.
Reading the pop-up alert is the best way to read email messages.
Desktop alerts cannot be turned off.
O Sound notifications can be customized.
Answer:
A & B
Explanation:
Answer:
A. On-screen notifications will pop up for new emails, meeting invites, and new tasks.
B. Email pop-ups will display the sender’s name, subject, and a small bit of the message.
E. Sound notifications can be customized.
Explanation:
this is for Outlook 2019
True or False: Kitchen lighting can be included on a small appliance branch circuit.. Single line text.
5. Give an example of a database application that has hundreds of users and a very large and complicated database.
Answer:
IBM DB2
Explanation:
Database Applications are separate applications that do not have a specific database, instead, they are used to be able to manipulate any database that you have access to. One very popular database application that has hundreds of users is IBM DB2. This database application was created by the company IBM which is a multinational company and can even be used to access their own database which is extremely large, and as any database the larger it is the more complicated it is as well since there is more data to sift through