Answer:
vecCont.capacity() returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.
Explanation:
Consider the provided information.
vecCont.capacity() is a function that returns the maximum number of elements(without reallocation) that can be inserted into the container.
vecCont.capacity() returns the maximum number of elements that can be inserted into the vector container vecCont without reallocation.
please help me guys
...
.
Answer:
An information 'source' can be categorized by the type of information it contains
Explanation:
An information source is the point of origin of a person's information or where a person's information comes from, and that tells the person about a subject or gives knowledge on a topic or subject knowledge to a person
Information sources can be either a primary source or a secondary source
The type of information sources can be categorized by the type of questions it answers or which depends on the type of information it contains
The types of information sources includes;
1) The internet
2) Databases
3) Newspaper
4) Encyclopedias
5) Books
6) Catalog in a Library
Therefore, we have that an information 'source' can be categorized by the type of information it contains
What is the missing line?
>>> myDeque = deque('math')
_____
>>> myDeque
deque(['m', 'a', 't'])
>>> myDeque.clear()
>>> myDeque.clear()
>>> myDeque.popleft()
>>> myDeque.pop()
Answer: i think it is >>> myDeque.clear()
The missing line >>> myDeque = deque('math') >>> myDeque.clear() >>> myDeque deque(['m', 'a', 't']). The correct option is B.
What are coding variables?A variable is a type of data storage in a computer program. Consider a variable to be a container, and its name to be the label on the container, indicating what is within.
Variables are used in coding and programming to assist programmers in understanding, remembering, and applying program information. A variable is anything that may be altered.
Variables are used in computer programming to store information that may change and can be utilised later in the program. In a game, for example, a variable could be the player's current score; if the player gained a point, we would add 1 to the variable.
Therefore, the correct option is B. >>> myDeque.clear().
To learn more about coding variables, refer to the link:
https://brainly.com/question/27935882
#SPJ5
Write a program that takes three numbers as input from the user, and prints the largest.
Answer:
I'll be using python:
__________________________
a=int(input("Enter a number :"))
b=int(input("Enter another number :"))
c=int(input("Enter last number :"))
lis=[a,b,c]
sort=sorted(lis)
print("The largest number is:", sort[1])
___________________________
National laws have been enacted to govern the actions permissible of IT professionals. Most laws governing IT professionals are geared more toward the actions of IT professionals. HIPAA is an example of a law that protects personal information, which all people, including IT professionals, are required to follow. There are no state or local laws that address information accessibility.
Answer:
C.HIPAA is an example of a law that protects personal information, which all people, including IT professionals, are required to follow.
Explanation:
i got it right
Answer:
A.HIPPA
Explanation:
Edg 2020
Sean is a lineman who is always on call to travel whenever there is a natural disaster. He has recently been called to help repair downed power lines for those who have been affected by a hurricane. What Energy cluster pathway does Sean work in? Environmental Resources Energy and Power Technology Telecommunications Plant Systems
Answer:
Energy and Power Technology
Explanation:
Energy and Power Technology is a field in engineering that typically deals with generation, transmission and distribution of electric energy to the end users. This energy are usually transmitted and distributed through the use of overhead cables running from the point of generation to the location of the end users.
Natural disasters such as hurricane, tornadoes, earthquake, etc., are capable of destroying the power lines (cables) as they are usually hung on poles.
In this scenario, Sean is a lineman who is always on call to travel whenever there is a natural disaster. He has recently been called to help repair downed power lines for those who have been affected by a hurricane. Therefore, the Energy cluster pathway that Sean works in is Energy and Power Technology.
Question # 5 Multiple Choice Which statement is true? A binary search can only be used on an ordered group of data values. A binary search is always preferred to a linear search. You can use a binary search in every situation where you use a linear search. You can use a binary search on any group of data values.
Answer:
A. A binary search can only be used on an ordered group of data values.
Explanation:
Binary search is an efficient algorithm used to find an item from a sorted list of items by using the run-time complexity of Ο(log n), where n is total number of elements.
Binary search applies the principles of divide and conquer.
In Computer programming, performing a binary search on an array requires that the array should be sorted in an ascending order i.e from the least to the highest with respect to the data value.
Hence, the true statement is that a binary search can only be used on an ordered (sorted) group of data values.
Answer: Binary Search
Explanation: Other user is correct
how many bits would be needed if there is 15 students in the class
Answer:
Bits??
Explanation:
In which phase of the ethical hacking methodology would a hacker be expected to discover available targets on a network
Answer:
Scanning and enumeration.
Explanation:
In the scanning and enumeration phase of the ethical hacking methodology, a hacker would be expected to discover available targets on a network.
The scanning and enumeration phase of the ethical hacking follows the reconnaissance phase and it typically involves discovering available targets on a network for informations such as username, password, IP address etc.
Answer will be marked brainliest
answer fast
you'll get points too
How much does it cost for a laptop screen repairment in UAE?
This type of damage is what im referring to
Answer:
Normal laptop screen repair services cost AED 350 to AED 950 i think...
What does the Python print() function do?
Completes a calculation
Displays a string value
Sends a document to the printer
Shows a keyword
Answer:
B. Displays a string value
Answer:
the guy above is right
Explanation:
Which uses flowcharts to communicate?
incremental project design
solution modeling
programming code
writing the problem statement
Answer:
Solution modeling.
Explanation:
Another person already asked this question lol.
:))
Answer:
solution modeling
Explanation:
Which of the following could not go on a resumes for a position in the fashion and interior design field?
a) favorite fashion designer
b) volunteer positions
c) participation in school activities
d) relevant class is taken
Answer: I believe it would be your favorite fashion designer, because it just seems irrelevant... :)
100 POINTS!! Help me out please I need help with this!!
wa- im lost 2. i need that answer 2.
Calling all engineers and tech geniuses etc for help! Brainliest for correct answer!
My cousin has this toy walkie talkie which I want to fix. But, it needs batteries to work. There isn’t a label which says but a certain kind of battery in.
So, which battery should I put in to make it work???
Answer: so the standard battery for any kind device such as walkie talkies or Remotes, commonly use Double A batteries
Explanation:
20. The following are considered as ICT skills EXCEPT
a. video, audio and text
c. social media managem
b. email management and setup
d. online research
Answer:
b
Explanation:
Write atleast 3 targeted audience or users
Answer:
Three categories of audience are the "lay" audience, the "managerial" audience, and the "experts." The "lay" audience has no special or expert knowledge. They connect with the human interest aspect of articles.
Explanation:
Lay
Managerial
Experts
with the advent of technology one can experience special features such as 3D theater experiences true or false
The answer would be true
what is reddits nickname
Answer:
the front page of the internet
Explanation:
Answer:
I don't know
Explanation:
I just don't know
Have you ever watched Full House? Who is your favorite character and why? EXPLAIN AND ILL GIVE BRAINLIEST!
Answer:
havent watched it and thanks for this
Explanation:
What is the purpose of the input() function? (5 points)
1. To add predetermined feedback
2. To determine information about the programmer
3. To display a string literal on the screen
4. To make a program interactive
Answer:
Pretty sure it's 4. To make a program interactive
Answer:
input function is used to take vali of variable
How can you use the Address Book to address an email message? Use the drop-down menus to complete the sentences. 1. Type an email contact in the To bar and choose from the options. 2. Click in the ribbon to open the Global Address List.
Answer:
1. AutoCorrect
2. Address book
Explanation:
stan bts ?
Answer:
1. auto correct
2. address book
Explanation:
(I WILL GIVE BRAINLIEST) Which steps will delete an appointment?
left-clicking on the appointment and hitting delete on the keyboard
double-clicking on the appointment and hitting delete on the keyboard
right-clicking the Calendar folder and hitting delete on the keyboard
clicking the Calendar folder and hitting delete on the keyboard
Answer:
right clicking should be your answer
A copyright gives the exclusive legal right to the original author or creator to print, publish, perform, record, or produce material.
True
False
Answer:
True.
Explain: TRUE
Please Help. Nobody Does!!! will give brainliest and 50 points
1. What is step one in the digital file organization process?
2. What is rule number one?
3. What is rule number two?
4. What is the obvious advantage to rule number two?
5. What is the tree structure?
6. What are two main ways to organize your files?
7. How should you name your files?
8. What is cloud storage?
9. What are some different cloud storage software?
10. What is the importance of backing up your computer?
Answer: Use the Default Installation Folders for Program Files,
Explanation:
It’s Saturday and you’re looking forward to hanging out with friends and having some fun. However, you get two phone calls early in the morning that make you stop and think. First, a friend calls to invite you to an all-day basketball tournament. With tickets, lunch, and dinner, you figure you’ll spend $50. That would put a dent in the money you’re saving for a future goal. Then your neighbors call offering you the opportunity to help paint their apartment. They will pay you $75 for the day of work. What will you do?
Answer with Explanation:
I would forego the all-day basketball tournament because, clearly, I will be spending so much for just a one-day fun. I'm sure there will be other upcoming basketball tournaments I can attend to. So, I will accept my neighbor's offer of helping to paint their apartment because I will be earning $75 and such offer doesn't come every day. Since I also want to enjoy and hang out with friends, I would call a friend to help me in painting the apartment so we could split the payment, which means both of us will have $37.5. In this case, I will not only earn money on Saturday but will also get to enjoy the company of my friend.
30 POINTS! ANSWER ASAP:
Type the correct answer in the box. Spell all words correctly.
Two students measure the dimensions of a single-storey structure. One takes measurements from the outside, while the other takes
measurements from the inside. The students discover that their measurements for the height of the wall vary. The dimensions of the height of
the walls are greater when measured from the outside than when the same walls are measured from the inside of the structure.
What is the explanation for this difference in wall height?
The walls have a greater dimension in height when measured from the outside of the structure because of the presence of a _______
Answer:
roof
Explanation:
Draw a circle with radius 2cm and display its perimeter
Answer:
12.57
Explanation:
circumference =
[tex]2\pi r = [/tex]
[tex]2 \times \frac{22}{7} \times2[/tex]
[tex] = 12.57[/tex]
When a guest is wearing the medallion, they can order a drink with their smartphone or open their cabin door automatically by standing in front of it. Which emerging technology does Cloud combine with to enable this medallion's features?
Answer:
The Ocean Medallion.
Explanation:
The Ocean Medallion is a handheld interface that, on boarding a cruise liner, digitally attaches to multiple devices. They could order a cocktail with their mobile or instantly open the cockpit door by walking in front of something while a guest wears the ocean medallion.
How can computational thinking techniques be applied to software development
in education, computational thinking (CT) is a set of problem-solving methods that involve expressing problems and their solutions in ways that a computer could also execute. It involves the mental skills and practices for designing computations that get computers to do jobs for people, and explaining and interpreting the world as a complex of information processes. Those ideas range from basic CT for beginners to advanced CT for experts, and CT includes both CT-in-the-small (related to how to design small programs and algorithms by single people) and CT-in-the-large (related to how to design multi-version programs consisting of millions of lines of code written in team effort, ported to numerous platforms, and compatible with a range of different system setups).
hope this helped and good luck
your company decides to implement a RAID-5 array on several file servers. Which feature is provided by this deployment
Answer:
High availability
Explanation:
RAID-5 array is defined as a redundant array for independent disk configuration which makes use of the disk striping with the parity. It consists of a minimum three disk drives and it uses the data striping and the parity data to provide the redundancy.
RAID 5 is a powerful tool to ensure integrity of the data. It provides both performance as well as security to the data.
In the context, "high availability" is the feature that is provided by the deployment of RAID 5 array on the several file services.