Answer: i can see that it is i i org site
Explanation:
Answer: the website belongs to an organization
Explanation:
Plato
The 0-1 knapsack problem is the following. A thief robbing a store finds n items. The ith item is worth vi dollars and weighs wi pounds, where vi and wi are integers. The thief wants to take as valuable a load as possible, but he can carry at most W pounds in his knapsack, for some integer W . Which items should he take?
Step by step Explanation:
Based on what we could deduce from the above statement, the items he should take are:
must either take one single item or must leave the other behind,and only a whole amount of an item must be taken,in which an item cannot be taken more than once into his knapsack.Hence, the thief needs to carefully determine items with an optimal value which still falls within his specified weight (W).
Aubrey is on a Windows machine. She wants to back up her Halloween pictures on an external hard drive. Which of the following tasks is she likely to perform as part of a sequence of actions do that? Right-click the file and choose the Copy option. Open the application and select the File menu. Right-click the file and select the Delete option. Go to the location where you want to save the file. Right-click an empty area and select the Paste option.
Answer:
Right-click the file and choose the Copy option, Go to the location where you want to save the file, Open the application and select the File menu, and Right-click an empty area and select the Paste option.
Explanation:
You would not need to Right-click the file and delete it to back up her Halloween photos, but you would need to upload them to an external application. To do that, you would basically do every step besides right-clicking and deleting the file (Right-click the file and select the Delete option)
Answer: A, D, E
Explanation: correct on Plato, plus you wouldn’t select the file menu or delete the files.
What tips do you have for learning at home???
Answer:
nothing
Explanation:
Answer:
listen to music stay in a quiet space in your house and always have a snack with you
Jenny has entered data about models of laptops from company A and company B in a worksheet. She enters model numbers of laptops from company A along with their details in different columns of the worksheet. Similarly, she enters details of all the laptop models from company B, Which option will help Jenny view the data for company A and company B in two separate sections after printing? The option will help her view the data for company A and company B in two separate sections after printing.
Answer:
The Split option under the view tab.
Explanation:
Click the View tab on the Ribbon, then select the Split command. The workbook will be split into different panes. You can scroll through each pane separately using the scroll bars, allowing you to compare different sections of the workbook.
Answer:
Split
Explanation:
In tynker, it is not possible to create a
Answer:
whats tynker
Explanation:
Write a program that tells the user what animal and personality characteristics he/she is likely to have based on the Chinese Zodiac Calendar. The program should ask the user for the year in which he/she was born. The twelve animals of the Zodiac and some of their associated years are rat (1924, 1936, 1948, 1960) · ox (1925, 1937, 1949, 1961) tiger (1926, 1938, 1950, 1962) rabbit (1927, 1939, 1951, 1963) dragon (1928, 1940, 1952, 1964) snake (1929, 1941, 1953, 1965) horse (1930, 1942, 1954, 1966) goat (1931, 1943, 1955, 1967) monkey (1932, 1944, 1956, 1968) rooster (1933, 1945, 1957, 1969) dog (1934, 1946, 1958, 1970) pig (1935, 1947, 1959, 1971) Each year is associated with a particular animal. The years cycle through the animals hence the animal repeats every twelve years. Some characteristics of each animal are as follows Rat: industrious, sensitive, sociable Ox: dependable, modest, patient Tiger: rebellious, daring, impulsive
Answer:
I have a question for you
.
.
Are you a INDIAN?
.
.
IF YES
THEN,
BOYCOTT CHINA
Write a program that uses key events to make a circle larger and smaller.
Your circle should start at a radius of 100 and a position of 250, 250. Each time the user hits the left arrow, the circle should decrease by 10. If the user hits the right arrow, it should increase by 10.
Hint: Use the get_radius() and set_radius() method to change the size of your circle. Find more details and examples on these functions in the DOCs tab.
Challenge: Can you prevent the circle from getting smaller than a radius of 10 and larger than a radius of 400?
in python code
Answer:
circ = Circle(100)
circ.set_position(250, 250)
circ.set_color(Color.yellow)
add(circ)
def grow_circle(event):
if event.key == "ArrowLeft":
circ.set_radius(circ.get_radius() - 10)
if event.key == "ArrowRight":
circ.set_radius(circ.get_radius() + 10)
add_key_down_handler(grow_circle)
Explanation:
By making it that when the left/right arrow is clicked the radius of the circle is first taking into account before anything else, then each time the arrow is clicked the current radius either gets 10 added or removed from it.
Assume that the OS uses a minimum page size of 16 KB. Assume that your L1 cache must be 4-way set-associative. If you're trying to correctly implement a virtually indexed physically tagged cache (with no additional support from the OS or hardware), what is the largest L1 cache that you can design
Answer:
The largest size of L1 = 16 bits
Explanation:
hello attached below is the diagram related to the solution
assuming that the OS uses a minimum page size of 16 KB
when we assume that our L1 cache must have 4-way set-associative
The largest L1 cache that you can design = 16 bits ( when the L1 cache is of a page size )
The L1 cache is closest to the processor and also the L1 is slowest and the largest of all
If you are caught in a situation with an active shooter, which order should you plan a safe escape? A. Hide, Fight, Run B. Fight, Run, Hide C. Run, Hide, Fight D. Run, Fight, Hide
Answer:
The answer is C
Explanation:
the answer is run, hide, fight.
the first thing to do is try and run and get away.
the second thing you should do if you can't run is hide. Then if you can't run away nor hide you have to fight.
In a team if someone gets stuck with the selected tasks for the iteration, what is the immediate next step?
Answer:
The team member has to immediately inform the lead or onsite coordinator without wasting time and take up another task
Explanation:
In a situation where someone in a team is unable to move further to another tasks the next step is for the team member to immediately inform the onsite coordinator in order for them to take up another task reason been that the onsite coordinator sole responsibility is to ensure the completion of tasks without any flaw and Secondly if the team members did not inform the onsite coordinator immediately it will eventually lead to waste of time due to the time spent on the tasks thereby affecting the next tasks.
Therefore the immediate next step is for the team member to immediately inform the lead or onsite coordinator without wasting time and take up another task.
In a mobile phone network, how many times as strong would
Answer:
how many times as strong would what?
put your question in the replies to this answer and I'll gladly answer it
Explanation:
May I have brainliest please? :)
How many Leaf Nodes in the Binary Tree shown in figure:
Answer:
There are 2 leaf nodes in the given binary tree.
Explanation:
A tree stores the elements in the form of a hierarchal structure. The first node which has children is called the root of the tree. And the nodes with no children are called leaf nodes.
In the given diagram, we can see that all nodes have children except C and D so C and D are leaf nodes.
Hence,
There are 2 leaf nodes in the given binary tree.
Create a dictionary that maps a fruit name to its color. Both the keys and the values should be stored as strings. Include only the following three entries in the dictionary: apple (red), orange (orange), and banana (yellow). Store the dictionary in a variable named fruit_dictionary.
Answer:
Written in Python:
fruit_dictionary = {}
fruit_dictionary = {'apple': 'red', 'orange': 'orange', 'banana': 'yellow'}
Explanation:
First (although, not necessary), we create an empty dictionary named fruit_dictionary on line 1
Next, we populate the dictionary using the following syntax:
{key-1:value-1, key-2:value-2,......,key-n:value-n}
In this case, the entry would be:
{'apple': 'red',
'orange': 'orange',
'banana': 'yellow'}
The items on the first column (i.e. apple, orange and banana) are the keys while the items on the second (i.e. red, orange and yellow) are the values of the dictionary
To print the items in the dictionary, you can add the following line of code:
print(fruit_dictionary.items())
You should use _____ text on a light blue background.
yellow
black
lavender
white
You should use black text on a light blue background.
Explanation:
The other colors are too light for a light blue background and wouldn't show up well enough to read it easily.
Answer:
black cause you want a darker shade
Explanation:
When you are fit, you can exercise and do physical work without getting too tired. A. True B. False\
Answer:
A.
Explanation:
But all of us get tired
Answer: I did the test it's A
Explanation:
Write a program which takes a String input, and then prints the number of times the string "sh" appears in the String (s and h can be any case).
Hint - remember there are String methods which return a copy of the String it is called on with all letter characters changed to the same case.
Sample run
Input String:
She sells seashells on the seashore
Contains "sh" 3 times.
import java.util.Scanner;
public class JavaApplication61 {
public static void main(String[] args) {
Scanner scan = new Scanner(System.in);
System.out.println("Input String:");
String text = scan.nextLine();
text = text.toLowerCase();
char c = ' ', prevC = ' ';
int count = 0;
for (int i = 0; i < text.length(); i++){
c = text.charAt(i);
if (c == 'h' && prevC == 's' && i >= 1){
count += 1;
}
prevC = c;
}
System.out.println("Contains \"sh\" "+count+" times.");
}
}
This works for me. Best of luck.
import java.util.Scanner;
public class{
public static void main(String[ ] args){
Scanner reader = new Scanner(System.in);
System.out.println(“Input String:”);
String input = reader.nextLine();
input = input.toLowerCase();
int count = 0;
for (int i = 0; i < input.length()-1; i++){
if (input.substring(i, i+2).equals(“sh”)){
count++;
}
}
System.out.println(“Contains \”sh\” ” + count + “times.”);
}
}
for the following graph, what is the goal state?
Answer:
E
Explanation:
Answer:
the answer is b
Explanation:
I got it right on the test
6.6 Code Practice: Question 1 in Edhesive
If u have done Edhesive and done this code practice show me how to make the boat please.
Answer:
import simplegui
width = 600
height = 400
def draw(canvas):
# Water:
for x in range (1, 800, 120):
canvas.draw_circle ((x, 330), 60, 3, "Blue")
canvas.draw_line((1, 300), (width, 300), 70, "White")
# Boat
canvas.draw_circle((width/2, 280), 90, 5, "Black", "White")
canvas.draw_line((1, 220), (width, 220), 150, "White")
canvas.draw_line((210, 298), (390, 298), 5, "Black")
canvas.draw_line((width/2, 295),(width/2, 210), 5, "Black")
canvas.draw_line((width/2 + 60, 280),(width/2, 210),5, "Black")
canvas.draw_line((width/2 + 60, 280),(width/2, 280),5, "Black")
frame = simplegui.create_frame('Boat in Water', width, height)
frame.set_canvas_background("White")
frame.set_draw_handler(draw)
frame.start()
EMERGENCY- I am giving 55 points for this, please help. WITH working out
What would be the size of a sound file, which is 30 seconds in length and has a bitrate of 96kbps? You must show your working out.
Answer:
360 kilobytes
Explanation:
(Time × Bitrate) / 8
30 × 96 = 2880 / 8
360 kilobytes
8: kilobits in a kilobyte
Time is always in seconds to obey the kb*ps* rule
Bitrate is always on bits so thats kilobits not kilobytes purpose of conversion
Write a calculate_sq_inches_of_good_pizza function that accepts the diameter of a pizza and returns the area of the pizza minus 1 inch at the edge.
Answer:
#include <iostream>
using namespace std;
float calculate_sq_inches_of_good_pizza(float diameter) {
float radius= diameter/2;
float pi=3.14;
float area;
area = pi*(radius*radius );
return area;
}
int main() {
float d;
cout<<"enter the diameter of pizza"<<endl;
cin>>d>>endl;
float area_of_pizza = calculate_sq_inches_of_good_pizza();
return 0;
}
Explanation:
Above program is written in C++ language which has function namely float calculate_sq_inches_of_good_pizza(float diameter). This will calculate area of pizza from given diameter and return it to main() function.
As we know pizza is circle and area of circle is equal to:
Area = π * radius*radius
π =pi=3.14
and we have calculated radius from given diameter
radius = diameter/2;
If you only want function not whole program than ignore main () function and only consider float calculate_sq_inches_of_good_pizza(float diameter) function which is in ITALIC notation.
Identify a security context of interest to you. Within this context, what constitutes a direct benefit of a risk management strategy? An indirect benefit? Provide examples.
Here,the Preparedness of the National(National Preparedness), that which gives a description of mission areas and also provide a framework for the consideration of management of risk.
It gives an illustration of the relationship of the National preparedness mission elements of risk.
Activities aimed at prevention are also associated with the efforts for the addressing of protection efforts generally address vulnerabilities recovery efforts.
However,we see that efforts of mitigation transcends vulnerability and also consequence spectrum.
Here,the PPD-8 mission areas are central,and this is to enhance national preparedness and also for infrastructure risk management activities.
When these are developed,they contribute to the achievement of resilient and secure critical infrastructure,and these critical infrastructure risks are however seen as part of setting capability targets.
THREAT AND HAZARD IDENTIFICATION AND RISK ASSESSMENT.
"THIRA" gives a provision of an approach for the identification and assessment of risks and also the associated impacts.
Determination that THIRA process has been completed by jurisdiction,then you consider the results when undergoing the assessment of risks to critical infrastructure.
Write an application that stores the following nine integers in an array: 10, 15, 19, 23, 26, 29, 31, 34, 38. Display the integers from first to last, and then display the integers from last to first.
Following are the code to this question:
Program Explanation:
Defining an array "arr1" of an integer value is declared, which stores 9 elements. In the next step, an integer variable "i" is declared, which uses two for loops to print the value in the given order.In the first for loop, it starts from 0 and ends when its value is less than 9, and prints the array value.In the second for loop, it starts from 9 and ends when the index value is equal to 0, and prints the array value in reverse order.Program:
#include <iostream>// header file
using namespace std;
int main()//main method
{
int arr1[]= {10, 15, 19, 23, 26, 29, 31, 34, 38};//defining array of integer values
int i;//defining integer variable
cout<<" Array from first to last: ";//print message
for(i=0;i<9;i++)//use for loop to print array
{
cout<<arr1[i]<<" ";//print array value
}
cout<<"\n Array from last to first : ";//print message
for(i=9-1;i>=0;i--)//defining for loop to print array in reverse order
{
cout<<arr1[i]<<" ";//print array
}
return 0;
}
Output:
Array from first to last: 10 15 19 23 26 29 31 34 38
Array from last to first : 38 34 31 29 26 23 19 15 10
Learn more:
brainly.com/question/12906023
Select all the correct answers.
Shari is using a word processor to type a recipe for making chocolate chip cookies. Which of the following tasks can she perform using the tools provided in the word processor?
include a numbered list of steps in the procedure
insert an image of the chocolate chip cookies
email the recipe to her friend as an attachment
convert quantities measured in cups to metric units
print a copy of the recipe to have handy while baking
Answer:
The correct options are:
include a numbered list of steps in the procedure
insert an image of the chocolate chip cookies
email the recipe to her friend as an attachment
print a copy of the recipe to have handy while baking
Explanation:
Microsoft word provides several features which can be used to perform different tasks.
Lets look at each option one by one:
include a numbered list of steps in the procedure
The Bullets and Numbering" feature can be used for this purpose.
insert an image of the chocolate chip cookies
Can be inserted via "Add picture" Option
email the recipe to her friend as an attachment
"Share" option can be used for this purpose.
convert quantities measured in cups to metric units
Calculations cannot be done in MS word
print a copy of the recipe to have handy while baking
Print option can be used for this purpose.
Hence,
The correct options are:
include a numbered list of steps in the procedure
insert an image of the chocolate chip cookies
email the recipe to her friend as an attachment
print a copy of the recipe to have handy while baking
Plz help!! ASAP!! And thank you!!
Answer:
first one, become vulnerable to online harassment
With __________________________, the IT resource is relocated to a host with more capacity. For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk-based SAN storage device with 8 GB per second I/O capacity.
Answer:
Dynamic Relocation.
Explanation:
The dynamic relocation is one of the methods used to implement a dynamic scalability architecture amongst others such as dynamic horizontal scaling and dynamic vertical scaling.
With dynamic relocation, the IT resource is relocated to a host with more capacity. For example, a database may need to be moved from a tape-based SAN storage device with 4 GB per second I/O capacity to another disk-based SAN storage device with 8 GB per second I/O capacity.
Justify the existence of programming languages to precisely communicate instructions?
Answer:
Machines don't understand human language and so must be communicated to using programming languages
Explanation:
Machines help make our lives easier. A machine as simple as a Zip can help to make keep one from an embarrassing situation.
Computers have evolved from simple calculators to what they are today. In the case of a zip, the user thinks up the instructions and executes it. Because a computer is more autonomous and automated than a simple zip because it is given a set of instructions and left to execute them. Because machines are not humans and do not understand any human language, the man had to invent machine language which in it's most basic form is 0 and 1. 0 for 'Off' or 'No' and 1 for 'On' or 'Yes'.
This basic form of language, just like the human language too, has evolved into several more complex and varied forms of languages. They remain relevant and continue to evolve to enable man to communicate with the machine as easily as possible because
Without the programming languages, we would be unable to efficiently describe our commands to the computer. The existence of many languages stems from the fact that languages are deemed more efficient when one is able to communicate more with fewer words. An advanced program is one that enables the programmer to do more with fewer and fewer lines of code.
Cheers!
Which of the following will increase the level of security for personal information on a mobile device if the device is lost or stolen
Answer:
this is a very cool day for me yeah know
What is the output by the code below system.out.print(8-4+2);
Answer:
6
Explanation:
John's father specifically asked him to get a magnetic disk from the store in his neighborhood. What should John buy?
A. a floppy disk
B. a DVD
C. a CD-ROM
D. a Blu-ray disk
Answer:
A floppy disk
Explanation:
A floppy disk uses a thin sheet of magnetic material to store data. It would make the most sense as the other choices use an entirely different system.
What study skill is being used when taking a large project and breaking it down into smaller manageable tasks?
Answer:
prioritization
Explanation:
this is the answer