Answer:
Enter the following formula in B11
=AVERAGE(B7:B10)
Explanation:
Given
Cells: B7 to B10
Required
Determine the average
Cells B7 to B10 is represented as: B7:B10
To calculate the average of these cells in Excel, follow the below steps.
Start with =Type the name of the function: AVERAGE(Enter the cell range; B7:B10Close the bracket; )So, we have:
=AVERAGE(B7:B10)
Write a procedure that takes a positive integer as a parameter. If the number given to the procedure is no more than 30, the procedure should return the absolute difference between that number and 30
Question (continuation):
If the number is greater than 30, the procedure should return the number doubled.
Answer:
The procedure written in C++ is as follows:
void absdiff(int num){
if(num<=30){
num = abs(num - 30);
}
else{
num*=2;
}
cout<<num;
}
Explanation:
This defines the procedure
void absdiff(int num){
This checks if the integer parameter is not more than 30.
if(num<=30){
If yes, the absolute difference between 30 and the number is calculated
num = abs(num - 30);
}
If otherwise
else{
The number is doubled
num*=2;
}
This prints the processed result
cout<<num;
}
See attachment for complete program that includes the main
Design and implement an application that reads a set of values in the range 1 to 100 from the user and then creates a chart showing how often the values appeared
Answer:
import random
import matplotlib.pyplot as plt
n = int(input("Enter the number of values: "))
mylist = random.choices(range(1,100), k= n)
plt.hist(mylist, bins=[1,10,20,30,40,50,60,70,80,90,100])
plt.xlabel(" Numbers")
plt.ylabel(" Frequency")
plt.show()
Explanation:
The python progam creates an histogram where the x axis is a list of random numbers in the range of 1 to 100. The program uses the random and matplotlib packages. The random module is used to get the a list of randomly selected values from a range of 1 to 100 and the matplotlib denoted as plt is use to plot a chart of the list as the x-axis and the frequency of the number values in the list.
What happens when an arithmetic operator is applied to non-arithmetic data types such as Boolean or character
Answer:
Following are the code to this question:
#include<iostream>//defining header file
using namespace std;
int main()//defining main method
{
bool a = true;//defining bool variable that holds true value
bool b = false;//defining bool variable that holds false value
cout<<a+b<<endl;//using print method to add bool value
cout<<a-b<<endl;//using print method to subtract bool value
cout<<a*b<<endl;//using print method to multiply bool value
return 0;
}
Output:
1
1
0
Explanation:
In this code, Firstly we import the header file, and in the next step, the main method is defined, in this, two bool variable "a, b" is declared, that holds true and false value respectively, and in the next step, three print method is declared that adds, subtract, and multiply the given value and use print its calculated value.
Which threat hunting technique is best suitable when handling datasets that creates limited number of results
Answer:
Stacking
Explanation:
Threat hunting is searching through networks and datasets to see if their are suspicious or activities that are risky.
Stacking has to do with counting the frequency the frequency of occurrences for those values that are of o particular type. And then making an analysis) examination of the outliers of these results.
When the dataset is large or diverse, the effectiveness of the stacking technique reduces. It is best used with datasets that would give a finite number of results.
refers to guidelines for online behavior. a. Internet Rules b. Netiquette c. Net rules d. Web etiquette
Answer:
Option b (Netiquette) is the appropriate alternative.
Explanation:
Netiquette would be concerned about internet classrooms although it makes communication extra knowledgeable, straightforward as well as considerate, students are allowed to openly share experiences as well as provide feedback on assessments as well as internet communities as well as through e-mail. It's indeed exactly equivalent in quite a professional field environment to the responsible ways.Those certain possibilities are not connected to something like the present case. So above, there's the correct solution.
Which of the following is NOT a category on a shot list
Answer:
What’s the following I will edit this and answer it if I can know
Explanation:
Full virtualization is ideal for ___________. Migration capacity Computer system sharing,isolate users Disaster recovery Data replication
Answer:
Computer system sharing, isolate users
Explanation:
Full virtualization is ideal for "Computer system sharing, isolate users." This is evident in the fact that Full virtualization is a technique in which data are shared between operating systems and their hosted software. This strategy is then carried out from the top of the virtual hardware.
Also, the full virtualization strategy in computer service requests is distinguished from the physical hardware that enables them.
Hence, in this case, the correct answer is "Computer system sharing, isolate users."
Statistics are often calculated with varying amounts of input data. Write a program that takes any number of integers as input, and outputs the average and max.
Answer:
Explanation:
The following code is written in Python. It is a function that takes in a list of ints as a parameter. It then creates two variables one for sum and for max. It then loops through the list adding all the values to sum and adding only the largest value to max. Then it creates a variable called avg which calculates the average by dividing the variable sum by the number of elements in the list. Finally, it returns both avg and max to the user.
def avg_and_max(my_list):
sum = 0
max = 0
for x in my_list:
sum += x
if x > max:
max = x
avg = sum / len(my_list)
return avg, max
le
What are the six different categories used in assessing technology impacts' X
All
E News
Images
D Videos
More
Settings
Tools
What is the first thing that the criminalist must do after visualizing a print but before making any further attempts at preserving it
Answer:
Take a photograph
Explanation:
Prints, such as fingerprint, bare foot prints and others are evidences at crime scene that a criminalist can use when carrying out examination, analysis so that a link between the scene, the victim as well as the offender can be created. Once a print is visualized by a criminalist, then the next thing is to take take a photograph of it, then further attempt to preserve it can then be made. The photographs can also stand as physical evidence.
Identify the name given to the original information or intelligence signals that are transmitted directly via a communication medium.
Answer:
Baseband signals
Explanation:
A baseband signal is one that sends information signal without changing anything. That is without shifting frequency or modulation.
When voice signals, videos or audios are sent directly over a communication medium, we call it baseband transmission. The frequency range is near zero.
When digital signals are sent from computer to printer, this 8s an example of baseband signal.
Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase.
Answer:
The program in Python is as follows:
print("Enter a character followed by a phrase",end='')
word = input(": ")
char = word[0]
print("Occurrence: "+str((word.count(char))-1))
Explanation:
The prints an instruction to the user on how to input to the system
print("Enter a character followed by a phrase",end='')
This prompts and gets the user for input
word = input(": ")
This extracts the character from the input string
char = word[0]
This counts and prints the number of occurrence of the extracted character
print("Occurrence: "+str((word.count(char))-1))