Answer:
the same as
Explanation:
Classified information is confidential information that a government deems to be protected.
There are certain penalties for the person if they ignore any protection measure for classified information when using social networking services and the penalties are the same as if someone uses other media and methods of dissemination.
Hence, the correct answer for the blanks is "the same as".
The penalties for ignoring the requirements for protecting classified information when using social networking services are the same as when using other media and methods of dissemination.
Penalties is the way of punishing an offender for doing wrong.
It is of necessity to ensure that all sensitive data are kept in a confidential manner as the punishment for someone who ignored all the important condition for protecting sensitive data or information are all the same as when using the following:
•Social networking services
•Media such as Radio,Television
• Methods of dissemination such as Newspaper publication, Publishing in journal
Learn more here:
https://brainly.com/question/17199136
Suppose your network support company employs 75 technicians who travel constantly and work at customer sites. Your task is to design an information system that provides technical data and information to the field team. What types of output and information delivery would you suggest for the system?
Answer:
Proceso mediante el cual el SI toma los datos que requiere para procesar la información. Las entradas pueden ser manuales o automáticas. Las unidades típicas ...
Explanation:
Digital certificates, smart cards, picture passwords, and biometrics are used to perform which of the following actions?
a. Integrity
b. Confidentiality
c. Authorization
d. Authentication
Answer:
d. Authentication.
Explanation:
In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.
Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification
Digital certificates, smart cards, picture passwords, and biometrics are used to perform an authentication.
Computer science;
What is an Algorithm? B: Mention five attributes of a properly prepared Algorithm. C: The roots of a quadratic equation ax2+b×+c=0 can be gotten using the almighty formular Using a properly designed algorithm, write a pseudocode and draw a flowchart to take quadratic equation coefficients as input and calculate their roots using the almighty formular, and display result according to value of the discriminant d, d=square root b rest to power 2 minus 4ac, i.e when d=o, when's o. Note when d
Answer:
Flowchart of an algorithm (Euclid's algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≥ A yields "yes" or "true" (more accurately, the number b in location B is greater than or equal to the number a in location A) THEN, the algorithm specifies B ← B − A (meaning the number b − a replaces the old b). Similarly, IF A > B, THEN A ← A − B. The process terminates when (the contents of) B is 0, yielding the g.c.d. in A. (Algorithm derived from Scott 2009:13; symbols and drawing style from Tausworthe 1977).
Explanation:
Flowchart of an algorithm (Euclid's algorithm) for calculating the greatest common divisor (g.c.d.) of two numbers a and b in locations named A and B. The algorithm proceeds by successive subtractions in two loops: IF the test B ≥ A yields "yes" or "true" (more accurately, the number b in location B is greater than or equal to the number a in location A) THEN, the algorithm specifies B ← B − A (meaning the number b − a replaces the old b). Similarly, IF A > B, THEN A ← A − B. The process terminates when (the contents of) B is 0, yielding the g.c.d. in A. (Algorithm derived from Scott 2009:13; symbols and drawing style from Tausworthe 1977).
If I execute the expression x <- 4L in R, what is the class of the object `x' as determined by the `class()' function?
Answer:
integer
Explanation:
The expression can be implemented as follows:
x <- 4L
class(x)
Here x is the object. When this expression is executed in R, the class "integer" of object 'x' is determined by the class() function. R objects for example x in this example have a class attribute determines the names of the classes from which the object inherits. The output of the above expression is:
"integer"
Here function class prints the vector of names of class i.e. integer that x inherits from. In order to declare an integer, L suffix is appended to it. Basically integer is a subset of numeric. If L suffix is not appended then x<-4 gives the output "numeric". Integers in R are identified by the suffix L while all other numbers are of class numeric independent of their value.
Use the words: Explain, Compare. Create a question using "explain" as the verb. Answer that question.
EG: Explain what collective action is? Answer: It is behaviors that....
Answer:
i need free points cus i have zero sry
Explanation:
Assume that the variables v, w, x, y, and z are stored in memory locations 200, 201, 202, 203, and 204, respectively.
Using any of the machine language instructions in
Section 5.2.4, translate the following algorithmic operations into their machine language equivalents.
a. Set v to the value of x – y + z. (Assume the existence of the machine language command SUBTRACT X, Y, Z that computes CON(Z) = CON(X) – CON(Y).)
b. Set v to the value (w + x ) - ( y + z)
c. If (v ≥?w) then
set x to y Else set x to z
d. While y < z do
Set y to the value ( y + w + z)
Set z to the value (z + v)
End of the loop
Answer and Explanation:
A. To translate the above algorithm to machine language, we first assign have to perform the first part of the operation which is x-y and set the value to the v variable. The x, y and v values are stored in memory location 202, 203 and 200 respectively.
The z value in the memory location 204 is then added to the v value in memory location 200. The first code sequence is stored in memory location 50 and the second code sequence to achieve x+y-z stored in v is stored in memory location 51(as asummed in question)
B. In the second algorithm, we add value in w which is in memory location 201 to value in x in memory location 202 and assign the result to v in memory location 200. The same is done for y+z in memory locations 203 and 204 respectively with result stored in w. We then subtract the values in v in memory location 200 from w and assign the value to v in memory location 200
C. in the first memory location 50, the code sequence v compared to w is stored. If v(stored in memory location 201)is greater than or equal to w(in memory location 202), it moves to address 54 and assigns the y value to x in memory locations 203 and 202 respectively else it assigns z valuein memory 204 to x value in 202 and jumps to next instruction
D. In this algorithm, it first compares y and z in memory locations 203 and 204 respectively in the first code sequence memory 50. In 51, it checks to see if the condition is satisfied and if it is, it jumps to address 53 and adds y and w in their various memory locations and stores it in memory 203 in y otherwise it moves to address 57. Now to get y+w+z, It then adds y +w in memory location 203 in y to z in memory location 204 and then stores the result in y. Subsequently it adds the z value to v and stores the result in v and moves to address 50 where it compares a new set of value as in a loop in the algorithm which continues till the "while" condition can no longer be satisfied.
Compute the overall (Cache) performance CPU:
A processor runs at 3.0 GHz and has a CPI=1.5 for a perfect cache (i.e. without including the stall cycles due to cache misses). Assume that load and store instructions are 25% of the instructions. The processor has an I-cache (Instruction – cache) with a 5% miss rate and a Dcache (Data memory cache) with 4% miss rate. The hit time is 1 clock cycle for both caches.
Assume that the time required to transfer a block of data from the main memory to the cache, i.e. miss penalty, is 40 ns.
a. Compute the number of stall cycles per instruction
b. Compute the overall (cycle per instruction) CPI
c. Compute the average memory access time (AMAT) in ns.
Answer:
See explanation.
Explanation:
Given:
Instruction miss rate = I-cache miss rate = 5% = 0.05
Data miss rate = D-cache miss rate = 4% = 0.04
CPI (without including the stall cycles) = 1.5
Miss Penalty = 40 ns × 3 GHz = 120 cycles
load and store instructions = 25% = 0.25
hit time = 1 clock cycle
a. Compute the number of stall cycles per instruction
Instruction miss cycles = I-cache miss rate * miss penalty
= 0.05 * 120
= 6
Data miss cycles = D-cache miss rate * miss penalty * load and store
instructions
= 0.04 * 120 * 0.25
= 1.2
Total memory stall cycles = Instruction miss cycles + Data miss cycles
= 6 + 1.2
= 7.2
number of stall cycles per instruction = 7.2
b. Compute the overall (cycle per instruction) CPI
CPI (stall) = 1.5 + 7.2
= 8.7
Ideal CPU = CPU time with stalls / CPU time with perfect cache
= I x CPI (stall) x Clock cycle/ I x CPI x Clock cycle
= 8.7 / 1.5
= 5.8
c. Compute the average memory access time (AMAT) in ns.
Combined misses per instruction = 0.05 + 0.25 * 0.04 = 0.06
Combined Miss Rate = Combined misses per I/ 1.25 access per I
Combined Miss Rate = 0.06 / 1.25 = 0.048
Average Memory Access time (AMAT) = Hit time + Miss rate × Miss penalty
= 1 + 0.048 * 120
= 6.7
= 6.76 cycles
= 6.76 / 3
= 2.253 ns
AMAT = 2.253 ns
Design a class named Person with fields for holding a person’s name, address, and telephone number. Write one or more constructors and the appropriate mutator and accessor methods for the class’s fields. Next, design a class named Customer, which extends the Person class. The Customer class should have a field for a customer number and a boolean field indicating whether the customer wishes to be on a mailing list. Write one or more constructors and the appropriate mutator and accessor methods for the class’s fields. Demonstrate an object of the Customer class in a simple program.
Answer:
Here is the Person class:
class Person { //class name
//below are the private data members/fields of Person class
private String name; //to hold name
private String address; //to hold address
private String phoneNo; // contains telephone number
public Person(String name, String address, String phoneNo){ //constructor of Person class with name, address and phoneNo as parameters
this.name = name;
this.address = address;
this.phoneNo = phoneNo; }
public String getName(){ //accessor method to get/access the name
return this.name; } //returns the name
public String getAddress(){ //accessor method to get/access the address
return this.address; } //returns the address
public String getPhoneNo(){ //accessor method to get/access the phone number
return this.phoneNo; } //returns the telephone number
//mutator methods
public void setName(String nam){ //mutator method to set the name
this.name = nam; }
public void setAddress(String addr){ //mutator method to set the address
this.address = addr; }
public void setPhoneNo(String phNo){ //mutator method to set the telephone number
this.phoneNo = phNo; } }
Here is the Customer class which extends the Person class:
class Customer extends Person{ //Customer class that is sub class of Person class
//below are the private data members/fields of Customer class
private String CustomerNo; //String type field to hold customer number
private boolean MailingList; //boolean field indicating whether the customer wishes to be on a mailing list
public Customer(String name, String address, String phoneNo, String custNum, boolean mail) { //constructor of Customer class that has parameters name, address and phoneNo (of Person class) and parameters custNum and mail ( of Customer class)
super(name, address, phoneNo); // super keyword is used to refer to Person objects and to access the Person class constructor
this.CustomerNo = custNum;
this.MailingList = mail; }
//accessor methods
public String getCustomerNo(){ //accessor method to get/access the customer number
return this.CustomerNo; }
public boolean getMailingList(){ //accessor method to get/access the boolean mailing list to check whether a person wants to be on mailing list
return this.MailingList; }
//mutator methods
public void setCustomerNo(String custNo){ //mutator method to set the customer number
this.CustomerNo = custNo; }
public void setMailingList(boolean mailing){ //mutator method to set the mailing list
this.MailingList = mailing; } }
Explanation:
Here is the demonstration class to demonstrate object of Customer class, calls Person and Customer class methods to display the Customer information such as name, address, phone number, customer number and if customer wants to receive mail.
import java.util.Scanner; //used to take input from user
class Demonstration{ //test class
public static void main(String args[]){ //start of main() function
Scanner input= new Scanner(System.in); //creates object of Scanner class
System.out.print("Enter Customer Name: "); //prompts user to enter name
String fname = input.nextLine();
System.out.print("Enter Customer Address: "); //prompts user to enter address
String address = input.nextLine();
System.out.print("Enter Customer Telephone Number: "); //prompts user to enter telephone number
String phoneNumber = input.nextLine();
System.out.print("Enter Customer Number: "); //prompts user to enter customer number
String customerNum = input.nextLine();
System.out.print("Does Customer wish to be on a mailing list? \nPress 1 for yes, 0 for no: "); //asks user if he wishes to receive mail
String choice = input.nextLine();
boolean mailList = (choice.equals("1")); //if user enters 1 indicating that he wishes to be on mailing list
Customer customer = new Customer(fname, address, phoneNumber, customerNum, mailList); //creates object of Customer class and calls Customer class constructor
System.out.println("\nCustomer Information: ");
System.out.println("Name: "+customer.getName()); //calls getName method of Person class using customer object to get the name and displays the name
System.out.println("Address: "+customer.getAddress()); //calls getAddress method of Person class using customer object to get the name and prints the address
System.out.println("Telephone Number: "+customer.getPhoneNo()); //calls getPhoneNo method of Person class using customer object to get the telephone number and prints phone number
System.out.println("Customer Number: "+customer.getCustomerNo()); //calls getCustomerNo method of Customer class using customer object to get the customer number and prints the customer number
System.out.println("Mailing List?: "+customer.getMailingList()); }} //calls getMailingList method of Customer class using customer object to get the mailing list and prints true of false on the basis of customers choice to be on mailing list.
JavaCalculate the ChangeProgramming challenge description:The goal of this question is to design a cash register program. Your register currently has the following notes/coins within it:One Pence: .01Two Pence: .02Five Pence: .05Ten Pence: .10Twenty Pence: .20Fifty Pence: .50One Pound: 1Two Pounds: 2Five Pounds: 5Ten Pounds: 10Twenty Pounds: 20Fifty Pounds: 50The aim of the program is to calculate the change that has to be returned to the customer with the least number of coins/notes. Note that the expectation is to have an object-oriented solution - think about creating classes for better reusability.Input:Your program should read lines of text from standard input (this is already part of the initial template). Each line contains two numbers which are separated by a semicolon. The first is the Purchase price (PP) and the second is the cash(CH) given by the customer.Output:For each line of input print a single line to standard output which is the change to be returned to the customer. If CH == PP, print out Zero. If CH > PP, print the amount that needs to be returned (in terms of the currency values). Any other case where the result is an error, the output should be ERROR.The output should change from highest to lowest denomination.Test 1Test 1 Input11.2520Expected OutputFive Pounds, Two Pounds, One Pound, Fifty Pence, Twenty Pence, Five PenceTest 2Test 2 Input8.7550Expected OutputTwenty Pounds, Twenty Pounds, One Pound, Twenty Pence, Five PenceTest 3Test InputDownload Test 3 Input2010Expected OutputDownload Test 3 InputERRORCode below:please fill the functions and or classes here. thank you for help.import java.io.BufferedReader;import java.io.IOException;import java.io.InputStreamReader;import java.nio.charset.StandardCharsets;public class Main {/*** Iterate through each line of input.*/public static void main(String[] args) throws IOException {InputStreamReader reader = new InputStreamReader(System.in);BufferedReader in = new BufferedReader(reader);try {double purchasePrice = Double.parseDouble(in.readLine());double cash = Double.parseDouble(in.readLine());Main.calculateChange(purchasePrice, cash);} catch (Exception e) {System.out.println(e);}}public static void calculateChange(double purchasePrice, double cash) {// Access your code here. Feel free to create other classes as required}}
Answer:
i dont know
Explanation:
____________ are used to store all the data in a database
Answer:
The correct answer is data store
Explanation:
How can software assist in procuring goods and services?
What is e-procurement software?
Do you see any ethical issues with e-procurement?
For example, should stores be able to block people with smartphones from taking pictures of barcodes to do comparison shopping?
Answer:
Answered below
Explanation:
E-procurement software is the enterprise software that integrates and automates an organisation's procurement processes.
E-procurement software assists in procuring goods and services by allowing customers to browse online catalogs and stores, add their goods to shopping carts and send their requisition. This process reduces errors and improves efficiency.
Ethics of procurement include integrity, impartiality, fairness and transparency. Stores shouldn't block customers from doing comparison shopping.
Create a Python script that takes two parameters to do the following:-
1) List all files names, size, date created in the given folder
2) Parameter1 = Root Folder name
Parameter2= File size >>> to filter file size ( you can do =, > or <) it is up to you, or a range.
The script should check and validate the folder name, and the size
The script should loop until find all files greater than the specified size in all the sub-folders
3) Use catch-exception block (Make sure that the error messages do not reveal any of the application code)
4) Optionally, you can save the list into a file "Results.txt" using the redirection operator or by creating the file in the script.
Answer:
import sys, time
from os import walk, remove
from os.path import exists, join, getsize, getctime
file_counter = [ ]
folder_name, file_size = argv
isExist = exists( folder_name )
if folder_name == True:
for root, folder, files in walk( folder_name ):
for file in files:
if getsize( join ( root, file ) ) >= file_size:
file_log = [ ]
file_log.append( file )
file_log.append( join ( root, file) )
file_log.append( time.ctime( getctime( file ) ) )
file_counter.append( file_log )
else:
remove ( join ( root, file ) )
Explanation:
The python script above output the filename, size and file creation date of any folder passed to it.
A static class method can be accessed without referring to any objects of the class. True False
Answer:
True
Explanation:
This is true because a static class method can be accessed without referring to any objects of the class. When a class member is made static, it's very easy to access the object.
The member becomes static and becomes class level
Companies expose themselves to harsh sanctions by federal agencies when they violate the privacy policies that their customers rely upon.
a. True
b. False
Answer:
True
Explanation:
A privacy policy is a legal document or statement that discloses the ways a party gathers uses and manages a customer's data. These data include personal information such as address, name, financial records, medical history, travel records etc.
Policies such as the Children Online Privacy Protection Act which protects children on websites collecting children's data, the Gram-Leach-Bliley Act, The Health Insurance Portability and Accountability Act, are in place to ensure that privacy is protected and sanctions are metted out to violating companies.
What command would you use to display the disk usage in human readable format of a directory named test3. Assume this directory is right under your home directory and you are executing this command from your home directory.
Explanation:
if we use the above command with -h then this will show the result in human readable format.
df -h
Ex: df -h test3 (The command as asked in the question)
So the above command is showing the disk status in Gigabyte format.
Try the same command in your system. If directory test 3 is not present then create a new one with mkdir command.
________ includes reviewing transactoin logs and uses real-time monitoring to find evidence
Complete Question:
________ includes reviewing transaction logs and uses real-time monitoring to find evidence.
Group of answer choices
A. Log analysis
B. Network analysis
C. Code analysis
D. Media analysis
Answer:
B. Network analysis
Explanation:
Network analysis includes reviewing transaction logs and uses real-time monitoring to find evidence. Network analysis is a form of computer forensic service, which involves the scientific process of identifying, capturing and analyzing or examining data that are stored on digital devices in an electronic format, for the sole purpose of unraveling the truth about an allegation such as fraud, without preempting the outcome of the investigation.
Network analysis involves the use of network analyzers such as a sniffing and tracing tool to analyze or examine network traffic in real-time. Some examples of network analyzing tools are netdetector, tcpdump, pyflag, networkminer, xplico, tsat, wireshark, omnipeek, etc.
Please note, network analysis is also known as network forensics in computer science.
Describe conceptually how an sql retrieval query will be executed by specifying the conceptual order of executing each of the six clauses
Answer:
Answered below
Explanation:
An SQL retrieval query contains six clauses which are executed in an orderly sequence. These clauses include; SELECT, FROM, WHERE, GROUP BY, HAVING and ORDER BY.
The select clause enables us specify the data we want to retrieve. This statement is the starting point of SQL queries.
The FROM statement comes second and specifies the table the data is being retrieved from.
The WHERE clause helps us limit the data to those that meet a particular condition.
The GROUP BY statement helps group your information in a more meaningful way.
The HAVING clause puts a condition on your group.
The ORDER BY statement orders your information in descending order or ascending order.
there are primarily three methods of programming in use today: procedural, recursive, and object oriented true or false
Answer:
False.
Explanation:
In Computer programming, there are primarily two (2) methods of programming in use today:
1. Procedural programming: it is an early form of programming (coding) in which software developers make use of a top to down approach in instructing the computer on what actions to take through logical or step-by-step processes. This top-down approach is known as an inline programming, it basically involves calling a procedure such as functions, routines or sub-routines. Some examples of a procedural programming language are Java, Pascal, C, BASIC and FORTRAN.
2. Object-oriented programming (OOP): it is a high level programming language which is based on creating objects that comprises of data (fields) and code (procedures). This procedure includes a method while the data that makes up the object is generally referred to as fields and includes arrays, variables, class etc. Some examples of object-oriented programming language are Python, Ruby, Raku, Java, C++ etc.
Generally, in computer programming a procedural programming is primarily based on creating procedures while an object-oriented programming is based on the creation of objects.
write a function that given an integer Y and 3 non-empty string A,B,W, denotingthe year of vacations, the beginning month, the end month and the day of the week for 1st January of that year
Answer:un spain please
Explanation:
Security problems with master keys include (mark all that apply): Master keys are easier to copy than other keys. Master keying reduces the number of useful combinations. Locks that have the master pins needed for master keys are easier to pick. Unauthorized master keys will permit access to any lock in the series.
Answer:
- Master keys are easier to copy than other keys.
- Unauthorized master keys will permit access to any lock in the series.
Explanation:
This is the sad reality when an individual who's unauthorized gains access to a master key, then, he may be permitted access to any lock in the series.
Also, rather trying to copy other keys, it will be far easier to copy just one key– the master key.
You have just used a command that produced some interesting output on the screen. You would like to save that information into a file named "interesting.txt", which does not currently exist. You can do this by issuing the same command, but appending which of the following?
A. > interesting.txt
B.
C. interesting.txt
D. | interesting.txt
Answer: A. > interesting.txt
Explanation: From the command line, one can perform numerous tasks from navigating into a directory, creating a new directory, deleting files, create files, modify files and so on using simple commands. In the scenario above, after using a common which is used to produce an output on the screen, such as the 'echo' command, one may wish to save the file giving the user the ability to access the file later. Since it is stated the file name 'interesting.txt' given to the file does not currently exist, appending the sign > saves the file. If the filename already exists, it will overwrite the existing content.
which statement compares the copy and cut commands?
1. only the copy command requires the highlighting text
2. only to cut command removes the text from the original document
3. only the cut command uses the paste command to complete the task
4. only the copy command is used to add text from a document to a new document
Answer:
only to cut command removes the text from the original document
Explanation:
To say that only the cut command removes the text from the original document implies that you can use the cut command on a text, let's say "a boy and girl" to remove the text on the original document where it was located to a new document or text box, in other words, the text "a boy and girl" would no longer be found in the original document.
However, the copy command would not remove the text from the original document.
Answer:
only the command removes the text from the original document.
Explanation:
just did it
People from this cultural group are more tolerant to new ideas and opinions that differ from their own
A) North Americans
B) People with low uncertainty avoidance
C) None of these
D) People with high uncertainty avoidance
Answer:
B) People with low uncertainty avoidance
Explanation:
Uncertainty avoidance is how cultures differ on the amount of tolerance they have of unpredictability. Mostly, uncertainty avoidance deals with technology, law, and religion. People with low uncertainty avoidance cultures accept and feel comfortable in unstructured situations or changeable environments and tend to be more pragmatic and more tolerant of change. People in cultures with high uncertainty avoidance try to minimize the occurrence of unknown and unusual circumstances.
Multisensory input/output devices, such as data gloves or jumpsuits, are commonly used with _______________ systems.
Answer:
virtual reality
Explanation:
Virtual reality is basically a simulated or virtual environment. This environment is implemented by compute technology for the users that can interact with the virtual 3 dimensional objects instead of just watching them on the screen. With the use of multi-sensory input and output devices the senses of the user are simulated.
Virtual reality devices are the products used for interacting with a virtual environment for the users. Some of the multisensory input/output devices include:
data gloves
jumpsuits
track pads
joysticks
treadmills
multi-speaker audio
visual displays
controller wands
head set
For example a data glove enables the users to interact with virtual objects and feel the object rather than just a movement of hand in the air and it is also used in virtual gaming. Jumpsuits are also used to feel sensations in the virtual reality environment. It stimulates different body parts in response to any action taken by user in a virtual environment.
Answer:
virtual reality
Explanation:
yeah this is correct
What is part of the computer?
Hardware
Software
CPU
All of these
Answer:
All of these are the parts of computer
Answer:
yes your answer is correct all those are the parts of the computer
hope it is helpful to you
The following program is supposed to display a message indicating if the integer entered by the user is even or odd. What is wrong with the program?
num = int(input("Enter an integer: "))
print("The integer is", evenOdd(num))
def evenOdd(n) :
if n % 2 == 0 :
return "even"
return "odd"
A. The function definition must appear before the function is called.
B. The input and print statements must reside in a function named main.
C. The variable num and the parameter variable n must have the same name.
D. An else clause must be added to the if statement.
Answer:
A. The function definition must appear before the function is called
Explanation:
Given
The above lines of code
Required
Determine the error in the program
In python, functions has be defined before they are called but in this case (of the given program), the function is called before it was defined and this will definitely result in an error;
Hence, option A answers the question
The correct sequence of the program is as follows:
def evenOdd(n):
if n % 2 == 0:
return "even"
return "odd"
num = int(input("Enter an integer: "))
print("The integer is", evenOdd(num))
Which social media platform provides filters that alter the user's face by smoothing and whitening skin, changing eye shape, nose size, and jaw profile
Answer: Snap-chat
Explanation:
is a social media platform application developed for mainly sharing of photos with the use of some special filters which are able alter how the person looks. examples of such filters are filters that alter the user's face, smoothing and whitening the users skin, changes the eye shape of the user, alters the nose size and jaw profile of the individual using the app. Snap chat has become a photo favorite for many young people today and celebrities alike.
What type of job involves working at client locations and the ability to work with little direct supervision?
a. field-based
b. project-based
c. office-based
d. home-based
Answer:
A
Explanation:
write a pseudocode thats accept and then find out whether the number is divisible by 5
Answer:
input number
calculate modulus of the number and 5
compare outcome to 0
if 0 then output "divisible by 5"
else output "not divisible by 5"
Explanation:
The modulo operator is key here. It returns the remainder after integer division. So 8 mod 5 for example is 3, since 5x1+3 = 8. Only if the outcome is 0, you know the number you divided is a multiple of 5.
4. Write a script called lineCounter that accepts a filename as a command line argument. It should run through the file line by line, displaying a character count for each line. The script should include a line counter, which records the line number, and is incremented when each line is processed.
Answer:
from sys import argv
script, filename = argv
with open( filename ) as file:
line_counter = 0
while True:
extract_line = file.readlines( )
line_counter += 1
character_count = extract_line.count( )
print( " line number: { } , character count: { }". format( line_counter, character_counter )
print ( " Nothing left to count" )
file.close( )
Explanation:
The 'argv' is a module in the python system package, which allows for user input and script execution in the command. It loads the script and the file as a tuple which is offloaded in the script like arguments in a function.