Plz help doe today 15 points

Answers

Answer 1

Answer:

there nothing in the doc

Explanation:


Related Questions

If we assume the modern view of existential import, why is the following syllogism invalid? No computer is made of clay. All computers are electronic devices. Some electronic devices are not made of clay.

Answers

Answer:

because the conclusion is not in agreement with the two premises.

Explanation:

Remember, the term syllogism refers to the form of reasoning that draws its conclusion based on the stated premises. In other words, a conclusion is reached if it satisfies all or part of the premises.

In this case, the statement "No computer is made of clay" and  "All computers are electronic devices" should be inferred to mean, No electronic devices are made of clay" not "Some electronic devices are not made of clay," since the two premises neither suggest that electronic devices are made from clay.

The reason why the given syllogism is invalid is because; The conclusion does not agree with the premise.

We are given two statements as premises;

1) No computer is made of clay

2) All computers are electronic devices

The third statement is the conclusion which states that;

3) Some electronic devices are not made of clay.

Now in syllogism, the conclusion must be in agreement with the two premises.

In this question, the conclusion doesn't agree with the premises because the conclusion says "some electronic devices are not made of clay". Whereas the premise says that no computer which is an electronic device is made of clay.

Since none of the premise suggests that any electronic device is made of clay, then the syllogism is invalid.

Read more about syllogism at; https://brainly.com/question/1622136

What are the two extra registers that the fetch decode execute cycle uses to communicate with memory outside of the chip?

Answers

Answer:

Memory address register

Memory buffer register

Explanation:

In c/c++, the processor consists of mainly five stages.

FETCH DECODE EXECUTE MEMORYWRITE BACK    

The memory address (MAR) register is a register where memory locations are being stored and where instructions are being fetched from the memory.

The memory buffer register (MBR) specifically enables the storage of data that are fetched or to be written in the memory.

Am giving BRAINLIEST!!!!!!! Assume you have entered the following after a prompt. >>> import time
How would you pause a program for 5 seconds?

Answers

Answer:

time.sleep(5)

Explanation:

Write a program that first gets a list of integers from input. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds).

Answers

Answer:

The program in Python is as follows:

mylist = []

num = int(input("Length: "))

for i in range(num):

    inp = int(input(": "))

    mylist.append(inp)

lower = int(input("Lower Bound: "))

upper = int(input("Upper Bound: "))

for i in mylist:

    if i >= lower and i <= upper:

         print(i, end=" ")

Explanation:

This initializes an empty list

mylist = []

The prompts the user for length of the list

num = int(input("Length: "))

The following iteration reads input into the list

for i in range(num):

    inp = int(input(": "))

    mylist.append(inp)

This gets the lower bound of the range

lower = int(input("Lower Bound: "))

This gets the upper bound

upper = int(input("Upper Bound: "))

This iterates through the list

for i in mylist:

This checks for elements of the list within the range

    if i >= lower and i <= upper:

This prints the list element

         print(i, end=" ")

Answer:input_numbers = [int(x) for x in input().split(' ')]

input_range = [int(x) for x in input().split(' ')]

for number in input_numbers:

   if input_range[0] <= number <= input_range[1]:

       print('{}'.format(number), end = ' ')

Explanation:

Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size.

Answers

Answer:

The solution in Python is as follows:

class myClass:

    def doubleUp(self,doubleList):

         doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]

       

newlist =  []

n = int(input("Number of elements: "))

for i in range(n):

    num = int(input(": "))

    newlist.append(num)

   

list = myClass()

list.doubleUp(newlist)

print(newlist)

Explanation:

Start by creating a class

The solution in Python is as follows:

class myClass:

Then define the method doubleUp

    def doubleUp(self,doubleList):

The duplicates is done here

         doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]

The program main begins here

This defines an empty list        

newlist =  []

This prompts user for number of elements

n = int(input("Number of elements: "))

The following iteration get the elements of the list

for i in range(n):

    num = int(input(": "))

    newlist.append(num)

   

This defines the instance of the class

list = myClass()

This calls the method

list.doubleUp(newlist)

Lastly, this prints the duplicate list

print(newlist)

Enumerate the four basic mathematical operations and their corresponding Excel operators.

Answers

Answer:

The four basic mathematical operations are Addition, subtraction, multiplication, and division.

Explanation:

Consider the provided information.

The four basic mathematical operations are Addition, subtraction, multiplication, and division.

Their corresponding Excel operators.

Addition: If you want to add 2 numbers in excel, for example, 3 and 5. use the operation

=3+5

Then press enter.

Subtraction: If you want to subtract 2 numbers in excel, for example, 5 and 3. use the operation

=5-3

Then press enter.

Multiplication: If you want to multiply 2 numbers in excel, for example, 3 and 5. use the operation

=3*5

Press enter.

Division: If you want to divide 2 numbers in excel, for example, 3 and 5. use the operation

=3/5

Press enter.

Hence, the four basic mathematical operations are Addition, subtraction, multiplication, and division.

2.You have been specifically asked to implement a stream cipher. Which cryptographic algorithm could you use

Answers

Answer:

symmetric-key cryptography

Explanation:

There are two types of cryptographic algorithms, the public key algorithm which uses a public key to encode a message before transmission and a private key to decode the message after transmission, and the private key or symmetric key algorithm which uses a private key to both encode and decode a message.

To find any information on the Internet, we enter specific keywords into a search engine. What happens next

Answers

Answer:

Answer A

Explanation:

A company is completing research and development for software which it is planning to produce in approximately 2 years time. Which of the following assumptions should the company make about the processing speeds of the hardware which will be used to run this software.

Answers

Answer:

true tbh I don't really Know

2. A __________ is a single function that the program must perform in order to satisfy the customer.

Answers

Answer:   A software requirement is a single function that the program must perform in order to satisfy the customer.

Explanation:

A program is a set of instructions or commands that are required to perform a job.  So before programming , we should know what we want our program to do so we can do it and then verify it.

The set of required tasks in our program is called as software requirement.

These are agreed by the customer and the developer before hand. Each software requirement describe a single wanted functionality from our program.

ELO 3.6 Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?

Answers

Answer:

iSCSI Qualified Name (IQN).

Explanation:

iSCSI is simply an acronym for Internet Small Computer Systems Interface and it is typically an internet protocol (IP) with respect to a storage area network (SAN) standard used essentially for connecting data storage facilities over a transmission control protocol and internet protocol (TCP/IP).

iSCSI Qualified Name (IQN) is a type of iSCSI name that requires a registered domain name to generate a unique iSCSI identifier.

This ultimately implies that, a data storage organization must have a registered domain name in order to be able to generate an iSCSI Qualified Name (IQN). Also, the iSCSI Qualified Name (IQN) is not linked to an internet protocol (IP) address and as such it is considered to be a logical name.

what are the qualities of different products that caught your eye and encourage you to buy them​

Answers

Answer:

The qualities of different products that caught your eye and encourage you to buy them​ is described below in detail.

Explanation:

A fantastic method to do this would be to practice shiny colors in any advertisement you publish. This is an old method, but it's a great one. Glowing orange, for example, is sure to hold watching much higher than bland shades like gray. Play throughout here, and apply the color you think illustrates the eye most.

pls help
Will give brainlest Ashton assigned a string value to a variable. Which program statement should he use?


2bookName = "Brave New World"

Book Name = "Brave New World"

bookName = "Brave New World"

bookName! = "Brave New World"

Answers

Answer:

I think its B bookName! = "Brave New World"

Explanation:

Answer:

B: Book Name = "Brave New World"

Explanation:

Please helpppp. Rearrange the parts of the program to generate two random integers and then ask the user to guess the greatest common divisor.
First part
Second part
Fourth part
Third part

1. from math import gcd
from random import randrange

numA=randrange(6,50,2)

numB = randrange(6,30,2)

if guess == answer:

print("Good job! You are right.")

print("The right answer is",answer)

answer = gcd(numA,numB)
guess = input("Greatest common divisor of " + str(numA) + " and " + str(numB) + "? " )

Answers

Answer:

first part:

from math import gcd  

from random import randrange

second part:

numA=randrange(6,50,2)

numB = randrange(6,30,2)

third part:

answer = gcd(numA,numB)

guess = input("Greatest common divisor of " + str(numA) + " and " + str(numB) + "? " )

fourth part:

if guess == answer:  

print("Good job! You are right.")

print("The right answer is",answer)

Explanation:

got it right on edge

C++ Random Number Generation with a Range The modulus operator can produce random numbers in any range, much like 1 and 10 do. For instance, you could write int random = 1+ (rand()% 100) to produce numbers between 1 and 100.

What programs to generate two random integers?

In the C/C++ computer languages, random number generation is accomplished using the rand() and srand() methods. The srand() value is fixed at 1, therefore the rand() function always produces the same results.

When we run the program, the same random number will be generated each time by the C++ rand() function. The srand (unsigned int seed) function is used to seed the rand() function.

Therefore, The pseudo-random number generation's starting point is set by the srand() function.

Learn more about random integers here:

https://brainly.com/question/15247918

#SPJ2

Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use

Answers

Question:

Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.

Answer:

This solution is implemented in C++

double compute_gas_volume(double P, double T, double n){

   double V = 8.3144621 * n * T/P;

   return V;

}

Explanation:

This line defines the function, along with three parameters

double compute_gas_volume(double P, double T, double n){

This calculates the volume

   double V = 8.3144621 * n * T/P;

This returns the calculated volume

   return V;

}

To call the function  from the main, use:

cout<<compute_gas_volume(P,T,n);

Where P, T and n are double variables and they must have been initialized

Why is user testing ah important part of the design process

Answers

Answer:

The general description of the whole of the general concept is described below.

Explanation:

Usability testing would be an important part including its customer construction business it allows users to see what works and where it doesn't function properly with someone's design elements. Keep challenging yourself to provide much more of your workshops through using at least yet another novel concept from that kind of blog post during your very next or even first and another round of research.

Identify the device used to convert an information signal to a signal compatible with the medium over which it is being transmitted.

Answers

Answer:

A modulator

Explanation:

This device is called a modulator and it does the task of modulation. The act of modulation influences data information on the carrier, allowing signal to be sent over a bandpass frequency range.

The Modulator is what controls an input audio signal which is called a carrier. It does not make a sound. What it does instead is to change the original carrier sound wave. The work of the Modulator as evident in the question is the conversion of information signal to a signal compatible with the medium over which it is going to be transmitted.

How do you change the order of the slides in your presentation in the slide pane 
Copy and paste
Delete
Drag and drop
Remove

Answers

Drag and drop! Good luck

Answer:

Hold down on your slide number and then pull in the order

Explanation:

Remember push down the pull up

_________________ allows cloud controller to locate instances on separate zones to boost redundancy.

Answers

Answer:

_____Router___ allows the cloud controller to locate instances on separate zones to boost redundancy.

Explanation:

A router, as a networking device, forwards data packets between one computer network and other networks.  With a router, one can use wired and wireless devices to connect to the Internet.  Unlike a modem, which connects the home network to a wider internet, a router can enable the networks to interact with one another without using the Internet.

Timothy is an architect. He needs to create a prototype of a new apartment that his firm is building. Which multimedia software would he use? A. image editing program B. painting program C. animation program D. digital video program E. 3D modeling program

Answers

E. 3D modeling program! This will always been used for architectural designing, a software example would be Archicad.

For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also known as _____________.

Answers

Answer:

Quality-of-Service (QoS) guarantees

Explanation:

This task for a computer is known as Quality-of-Service (QoS) guarantees. This is basically a protocol that is built into a specific product or service which analyzes that application process and makes sure that everything is correct. This would include the rate and timing requirements that need to be met in order for the computer to deliver the continuous media. If this is not the case certain actions can be implemented using the data provided to fix this issue.

Write a method that accepts a number of seconds and prints the correct number of hours, minutes, and seconds.

Answers

Answer:

This solution is implemented in Java

public static void timme(int seconds) {

       int hours = seconds/3600;

       System.out.println("Hours: "+hours);

[tex]seconds = seconds - hours * 3600;[/tex]

       int minutes = seconds/60;

       System.out.println("Minutes: "+minutes);

[tex]seconds = seconds - minutes * 60;[/tex]

       System.out.println("Seconds: "+seconds);

   }

   

Explanation:

This method defines the method along with one parameter

public static void timme(int seconds) {

This calculates hours from the seconds

       int hours = seconds/3600;

This prints the calculated hours

       System.out.println("Hours: "+hours);

This calculates the seconds remaining

    [tex]seconds = seconds - hours * 3600;[/tex]

This calculates the minutes from the seconds left

       int minutes = seconds/60;

This prints the calculated minutes

       System.out.println("Minutes: "+minutes);

This calculates the seconds remaining

    [tex]seconds = seconds - minutes * 60;[/tex]

This prints the seconds left    

  System.out.println("Seconds: "+seconds);

   }

Write a method named swap that takes an int parameter followed by a double and prints them in the reverse order. For example, calling swap(4, 7.5) would print 7.5 4.

Answers

Answer:

Explanation:

The following code is written in Python and does exactly what is being asked in the question. It creates a function/method that takes in two parameters one int and one double, and prints them in reverse order. Double first and the Int second

def swap_numbers(int_num, double_num):

   print(double_num, int_num)

The  method named swap that takes an int parameter followed by a double

and prints them in the reverse order is as follows:

def swap(x, y):

   print(y, x)

swap(4, 7.5)

The code is written in python

A function/method is declared in python.

This method accept two parameters x and y.

The parameters accept integers and double(float) respectively.

Then we call the functions/method with its parameters.

learn more: https://brainly.com/question/19880203?referrer=searchResults

A drop light that does not allow any electrical parts to come in contact with the outer casing of the device is called a:

Answers

Answer:

The right answer is "Double insulated light".

Explanation:

Double insulated led is mostly a sophisticated type of natural light that does not necessitate a terrestrial or planetary correlation. These illuminations could be based on these metals, are indicated in the electrical protection environmental standards that now the construction workers comply with, and therefore are readily accessible about every bedroom.

Give ways on how to effectively save.​

Answers

Answer:

Explanation:

say goodbye to debt. Monthly debt payments are the biggest money suck when it comes to saving. ...

Cut down on groceries. ...

Cancel automatic subscriptions and memberships.

how to promote CPA offers without a website?

Answers

Answer:

Report Promote Marketing For CPA Offer: Article advertising is the same as blog entry advancement. Agree to take some excellent article accommodation destinations and begin submitting encouraging posts. Compose articles that are by one Way or another pertinent to your exclusive CPA offer

Explanation:

:)

If you convinced your teacher to give you an extension on an assignment, what would this situation be an example of? OA. Generalization O O B. Prediction C. Drawing conclusions D. Rhetoric

Answers

Answer:

D. Rhetoric

Explanation:

Just trust me....okay!?......okay

What are the characteristics of desktop alerts in Outlook 2016? Check all that apply.
On-screen notifications will pop up for new emails, meeting invites, and new tasks.
Email pop-ups will display the sender's name, subject, and a small bit of the message.
Reading the pop-up alert is the best way to read email messages.
Desktop alerts cannot be turned off.
O Sound notifications can be customized.

Answers

Answer:

A & B

Explanation:

Answer:

A. On-screen notifications will pop up for new emails, meeting invites, and new tasks.

B. Email pop-ups will display the sender’s name, subject, and a small bit of the message.

E. Sound notifications can be customized.

Explanation:

this is for Outlook 2019

True or False: Kitchen lighting can be included on a small appliance branch circuit.. Single line text.

Answers

The answers is False

5. Give an example of a database application that has hundreds of users and a very large and complicated database.

Answers

Answer:

IBM DB2

Explanation:

Database Applications are separate applications that do not have a specific database, instead, they are used to be able to manipulate any database that you have access to. One very popular database application that has hundreds of users is IBM DB2. This database application was created by the company IBM which is a multinational company and can even be used to access their own database which is extremely large, and as any database the larger it is the more complicated it is as well since there is more data to sift through

Other Questions
In the selection from Silent Spring, how do animal populations change after the town changes?OA Animal populations mostly stay the same.B. Birds are still plentiful, but most insects die.O C. Most birds disappear, but farm animals are fineD. Animal life in general disappears or does poorly. 10 Tom a reu un montant d'argent en hritage.Sachant que 3 fois ce montant augment de 18 000 $ est gal 5 fois ce montantdiminu de 16 000 $, quel est le montant de l'hritage? heLP NeED iT nOw wiLL GivE ONe mILlion poINtS! How did the invention of photography influence/change paintings artistically? what 2 plus 3[tex]2 + 3 = [/tex] Which best describes the language of "Climate Change: An Overview? objective language subjective language equally objective and subjective language neither objective nor subjective language What is -2.3+4.2-3.4 step by step? True/false: x=7 DOES NOT satisfy the inequality x>7 The point where each plate meets is called What type of government doe U.K. have? *O Federal DemocracyO Parliamentary DemocracyO Federal RepublicO DictatorshipNeed help fast yall Rasheed is buying wings and quesadillas for a party. A package of wings costs $8. A package of quesadillas costs $10. He must spend no more than $160. Rasheeds freezer will hold a maximum of 20 packages of wings and quesadillas.If Rasheed buys 7 packages of wings, what is the maximum number of packages of quesadillas he can buy? probability with area model. I WILL GIVE BRAINLY 4,11,18what is the 109th value of this sequence ? 25.Chemical equations should be balanced so that they demonstrate the Law of Conservation of Mass. Which statement about balanced chemical equations is correct?AThe products must contain the same number and types of atoms as the reactants.B. The products must contain the same arrangement of atoms as found in the reactants,C. The products must contain the same number but not the same types of atoms as the reactants.D. The products must contain the same types but not the same numbers of atoms as the reactants, Consider the following work breakdown structure: Time Estimates (days) Activity Precedes Optimistic Most Likely Pessimistic Start A,B - - - A C,D 44 50 56 B D 45 60 75 C E 42 45 48 D F 31 40 49 E F 27 36 39 F End 58 70 82 What is the probability that the critical path for this project will be completed within 210 days 1.) What is the half-life of a 100.0 g sample of nitrogen-16 that decays to 12.5 grams in 21.6 seconds? Sharon realizes that she needs additional research before she approaches potential investors. What kind of research should she do to effectively evaluate her potential business opportunity?A. Conduct market research to determine whether her business idea is a business opportunity that meets a consumer need or want.B. Discuss the situation with her cousin who has shopped at the local bakery a few times.C. Discuss the situation with a family friend who has money and might want to invest in her idea.D. Analyze a national chain that sells pies and model her new business after it. This will save time and money that would otherwise be spent on independent research and planning. help plsssssssssssssssss Which weather event is most likely to occur if there are warmer than average ocean waters in the Pacific?1 option choicea Flooding in the southern United States due to El Niob Drought in the southern United States due to La Niac Wet conditions in the Pacific Northwest due to El Niod Weak trade winds due to La Nia 2x2=4 because 2+2=4 and 2,4 bam got ur answer 4 4. Write the etymology, or origin, of the word incendiary. y=(x + 2) + 2Graph