Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size.

Answers

Answer 1

Answer:

The solution in Python is as follows:

class myClass:

    def doubleUp(self,doubleList):

         doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]

       

newlist =  []

n = int(input("Number of elements: "))

for i in range(n):

    num = int(input(": "))

    newlist.append(num)

   

list = myClass()

list.doubleUp(newlist)

print(newlist)

Explanation:

Start by creating a class

The solution in Python is as follows:

class myClass:

Then define the method doubleUp

    def doubleUp(self,doubleList):

The duplicates is done here

         doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]

The program main begins here

This defines an empty list        

newlist =  []

This prompts user for number of elements

n = int(input("Number of elements: "))

The following iteration get the elements of the list

for i in range(n):

    num = int(input(": "))

    newlist.append(num)

   

This defines the instance of the class

list = myClass()

This calls the method

list.doubleUp(newlist)

Lastly, this prints the duplicate list

print(newlist)


Related Questions

What is the current DoD repository for sharing security authorization packages and risk assessment data with Authorizing officials?

Answers

Answer:

The answer is "Army Portfolio Management System".

Explanation:

The Army Way to solve Information-Technology (APMS-AITR) portfolio management registration for IT investment, IT capacity, and IT software was its single legal army registry.

Its main goal of IM/IT Management Of working capital and Corporate Finance is to prioritize IM/IT expenditure by evaluating and handling TRADOC as just an investment portfolio. The APMS was its main decision supporting instrument for military portfolio management.

Which of the following are all involved in the evaluation of the presentation of a speech?
Vocal technique, organization, body language
Body language, organization, visual aids
Visual aids vocal technique, body language
Organization, body language, visual aids

Answers

Answer:

C.

Explanation:

The elements involved in the evaluation of the presentation of a speech includes visual aids, vocal technique, and body language.

Adding vivid pictures in the presentation makes it graphic and proficient. The visual aids in presentation also provides the succinct and clear meaning of the message to the reader.

The vocal technique is another element that adds value in presentation. A speaker's confidence is reflected through his/her tone. It is the speaker's voice that becomes an influential tool that draws the audience's attention.

Body language, like vocal technique, helps in effective delivering of the speech. Body language is a non-verbal form of communicatin that communicates a lot to the audience than one can imagine.

Therefore, option C is correct.

Visual aids, voice technique, and body language are all factors considered when assessing how well a speech is presented.Thus, option C is correct.

What evaluation of the presentation of a speech?

Making use of colorful images in the presentation gives it a visual and professional feel. The reader can easily understand the material thanks to the presentation's visual aids.

Another aspect of presenting that adds value is voice technique. The tone of a speaker conveys his or her level of assurance. The voice of the speaker becomes a powerful tool for grabbing the audience's attention.

Similar to vocal technique, body language aids in effective speech delivery. Body language is a non-verbal type of communication that tells your audience more than you might think.

Therefore, Visual aids vocal technique, body language all involved in the evaluation of the presentation of a speech.

Learn more about speech here:

https://brainly.com/question/12453277

#SPJ3

A sandbox is known as a holding area for website or .

Answers

Answer:

blog

Explanation:



..........answer is above or below me lol

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().

Answers

Answer:

Write a flowchart and C code for a program that does the following: Within main(), it asks for the user's annual income. Within main(), it calls a function called printIt() and passes the income value to printIt().

Explanation:

You will write a flowchart, and C code for a program that does the following:1. Within main(), it asks for the user’s annual income.2. Within main(), it calls a function called printIt() and passes the income value to printIt().  3. The printIt() function evaluates the income, and if the number is over 90000, prints a congratulatory message.  If the income is not over 90000, it prints a message of encouragement, like “You WILL make $50,000, if you keep going.”Here is what the output looks like.File SubmissionUpload your Flowgorithm file, your .c file, and a screen shot of your code output saved in a Word document including the path name directory at the top of the screen into the dropbox for grading.

The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as

Answers

Answer:

Security code review.

Explanation:

The process of auditing the source code for an application to verify that the proper security controls are present, that they work as intended, and that they have been invoked in all the right places is known as security code review.

The main purpose of security code review is to ensure that all the necessary security measures or procedures are adopted (available), to confirm the level of accuracy of its operations, and verify that all loopholes for unauthorized access or use by attackers is prevented.

Hence, various software developers employ the security code review process in order to ensure that the integrity and safety of their software applications or programs are present.

Code review is the process for auditing the source codes and is a an application that is used for verification of the proper security control that are present and that they are intended to use.

The code review is to assure the quality of the software and verity the activity that checks the program mainly for viewing the parts of code.

Learn more about the source code for an application to verify that the

brainly.com/question/24749514.

Write code that outputs variable numDays as follows. End with a newline. If input is 3, output is: Days: 3

Answers

Answer:

In C++:

#include<iostream>

using namespace std;

int main(){

int numDays;

cin>>numDays;

cout<<"Days: "<<numDays<<endl;

return 0;

}

Explanation:

This line declares numDays as integer

int numDays;

This line gets user input for numDays

cin>>numDays;

This line prints the required output and ends with a newline

cout<<"Days: "<<numDays<<endl;

Explain the development, design and implementation aspects of algorithms in the development of software.

Answers

Explanation:

Phases of software development are ;

1. Requirements analysis

2.Domain analysis

3.Client-oriented design

4.Implementation-oriented design

5.Implementation

6.Integration

7.Packaging.

Ongoing Activities in Software Development

1. Risk analysis

2. Planning

3.Verification

4.Documentation

Importance of computer in 150 words and essay​

Answers

Answer: See explanation

Explanation:

A computer is simply referred to as an electronic device that can be used to store information and which can also make our work easier and faster.

The role of the computer in our daily lives nowadays cannot be understated as the computer is useful and used in every aspect of our lives. Computers are accurate, and makes our works easier.

Also, huge data's can be stores on the computer system. Computers are used in the education sector to tech students, in medical field as they aid treatments of patients etc.

Which of the data repositories serves as a pool of raw data and stores large amounts of structured, semi-structured, and unstructured data in their native formats

Answers

Answer:

Data lakes.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

Data lakes can be defined as data repositories which serves as a pool of raw data and stores large amounts of structured, semi-structured, and unstructured data in their native formats. These pool of raw or natural data allow data scientists to perform various tasks such as artificial intelligence (AI), machine learning, visualization, reporting, advanced analytical study, etc.

How many passes will it take to find the four in this list? 4, 5, 6, 7, 8, 9, 10 1 2 3 4

Answers

Answer:

10 passes

Explanation

just count the numbers in between the 2 4s :|

Answer:

3

Explanation:

got it right on edge

Which two components are configured via software in order for a PC to participate in a network environment

Answers

Answer:

IP address and subnet mask.

Explanation:

The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;

I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.

II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.

Define and describe PaaS. List the benefits of PaaS solutions. Describe potential disadvantages of PaaS. Describe how a cloud-based database management system differs from an on-site database. List the computing resources normally provided with a PaaS.

Answers

Answer:

PaaS has become a cloud technology that offers a way for consumers just to establish, successfully manage implementations without any of the sophistication of preserving but instead developing the technology related to the development and start-up of apps.

Explanation:

Benefits:

Not no need to purchase hardware as well as raise revenues throughout leisure time. There was no need to consider throughout configurations.

Disadvantages:

These have privacy concerns, during which data security contributes to the problem as well as monitored. These have problems with the portability of implementation.

Difference between Cloud base DBMS and On-site database:

On-site DBMS data couldn't be accessed from just about any location as either a cloud-based management solution.DBMS Cloud base documentation to ensure mostly with highly valued information collected to provide direct exposure to everybody else together whilst on-site DBMS functionalities such as SQL.

Computing recourses:

The architecture of web applications. Prebuilt techniques for developing, managing, and testing applications.

Which type of table is the most commonly used in Access databases?
A. one-to-one
B. one-to-many
C. many-to-many
D. many-to-all

Answers

The table of one-to-many is used most commonly for the purpose of getting access to a database.

What is a database?

Any kind of data, record, or information, which is stored over a computer or network of computers with an intention to access such data as and when required is known as a database.

Hence, option B holds true regarding a database.

Learn more about database here:

https://brainly.com/question/6447559

#SPJ2

In the picture below

Answers

Answer:

The answer is "It is a public method in the Car class".

Explanation:

In this question, the fourth choice is correct because the accessor method will be public, and the incorrect choice can be defined as follows:

The first and second choice was wrong because the class name is "Car".In the third choice, it is wrong because the method will not be private.In the fifth choice, it is wrong because the object name "mustang".

why should technology be used. No plagiarism pls.

Answers

Answer:

Explanation:

mobile devices and the applications they help us in life devisec can individualize instruction. three specific reasons that technology is good is that it saves lives by improving medicine, keeps us connected to each other, and provides education and entertainment. One reason why technology is good is that it has saved many lives.

i have an answer, but it won’t let me type it because it says incorrect answer which is ridiculous. here’s what i had, though

products in which titanium is used

Answers

Answer:

It is used in jewelry, tennis rackets, scissors, bicycle frames, surgical tools, mobile phones and some other high-performance products.

Explanation:

Titanium is a familiar metal. Titanium is as strong as steel but weights about half as much.

It’s made in rings in necklaces it also is made for tennis rackets and tool in the medical field

What certificate authority user role is tasked with the approval of requests for certificate enrollment and revocation

Answers

Answer:

Certificate manager.

Explanation:

Certification can be defined as a recognition given for completing a course of study or passing an examination. This is to certify that the individual is a professional in that course of study. Some examples are CCNA, Comptia A+, HSE I and II

Certificate manager is the certificate authority user role that is tasked with the approval of requests for certificate enrollment and revocation.

This ultimately implies that, the individual who is saddled with the responsibility of approving requests for certificate enrollment and revocation is a certificate manager.

Hence, a certificate can be revoked by a certificate manager if a person issued the certificate contravenes the set rules, requirements and standard binding on the certificate.

write one for loop to print out each element of the list several things. then write another for loop

Answers

Question:

Write one for loop to print out each element of the list several_things. Then, write another for loop to print out the TYPE of each element of the list several_things.

Answer:

The solution in python is as follows:

for element in several_things:

    print(element)

   

for element in several_things:

    print(type(element))

Explanation:

The solution assumes that the list several_things has already been initialized.

So, the rest of the code is explained as follows:

This line iterates through the list, several_things

for element in several_things:

This line prints each element

    print(element)

This line iterates through the list, several_things for the second time    

for element in several_things:

This line prints the type of each element

    print(type(element))

When an antivirus program identifies a virus and quarantines this file, has the malware been eradicated

Answers

Answer:

NO

Explanation:

No, it's not, when a virus blocks a file stored in a sandbox, it does not affect the system. However, the virus program does not necessarily recognize other parts of the program. It still takes analysis to determine what. Also, the virus vault must be emptied to delete the original files

This Command to insert copied text anywhere in your document
Cut
Copy
Format painter
Paste

Answers

Answer:

Paste

Explanation:

Answer:

Please give me brainliest. The answer is paste

Explanation:

What item appears in a user’s My Unresolved items after synchronization using Salesforce for Outlook? (2 answers)

Answers

The avialble options are:

1. Notes not associated to a record

2. Emails not associated to a record

3. Contacts not assigned to an account

4. Cases not assigned to a contact

Answer:

1. Contacts not assigned to an account

2. Emails not associated to a record

Explanation:

Given that any items that are not automatically assigned to Salesforce records are found in My Unresolved Items.

Hence, usually, Items such as Contacts, Events, Emails, and Tasks are found in a user's My Unresolved Items after synchronization using Salesforce for Outlook.

Thereby, in this case, the correct answers are:

1. Contacts not assigned to an account

2. Emails not associated with a record

Write two lines of code to draw the following circles centered at 600,600. The radius of the smallest circle is 200. There are 50 points between the larger circle and the smaller circle.

Answers

Answer:

canvas.draw_circle((600, 600), 200, 3, "Black")

canvas.draw_circle((600, 600), 250, 3, "Black")

Explanation:

# include < conio.h>

# include < iostream.h>

int canvas.draw_circle,

namespace std

{

canvas.draw_circle((600, 600), 200, 3, "Black")

canvas.draw_circle((600, 600), 250, 3, "Black")

}

return,

Write a program that reads a list of words. Then, the program outputs those words and their frequencies.

Answers

Answer:

The program in Python is as follows:

mylist = []

nword= "y"

while(nword== "y"):

    word = input(": ")

    mylist.append(word)

    nword = input("New word: y/n: ")

for item in mylist:

    freq = mylist.count(item)  

    print(item, freq)

Explanation:

This creates an empty list

mylist = []

This is used to let the user input more word or stop input

nword = "y"

The following iteration lets the program read words from the user

while(nword == "y"):

This gets the user input

    word = input(": ")

This appends the inputted word into the list

    mylist.append(word)

This prompts if the user wants to input more word or not

    nword = input("New word: y/n: ")

This iterates through the list

for item in mylist:

This gets the frequency of each word in the list

    freq = mylist.count(item)  

This prints the word and the frequency

    print(item, freq)

Which technology provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address

Answers

Answer:

Network Address Translation (NAT).

Explanation:

An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6).

Network Address Translation (NAT) is a technology that provides a solution to IPv4 address depletion by allowing multiple devices to share one public IP address.

This ultimately implies that, Network Address Translation (NAT) is a technology used by network engineers to translate IP addresses into a single IP address on a local area network.

Disney's first cartoon

Answers

Answer:

Mickey Mouse

Explanation:

Answer:

Oswald the Lucky Rabbit \(⋅⃘﹎᷊⋅⃘)

Explanation:

Oswald the Lucky Rabbit (also known as Oswald the Rabbit or Oswald Rabbit) is a cartoon character created in 1927 by Walt Disney and Ub Iwerks for Universal Pictures. He starred in several animated short films released to theaters from 1927 to 1938. 27 animated Oswald shorts were produced at the Walt Disney Studio.

50 POINTS!!!!! WILL MARK BRAINLIEST!!!!!HURRY!!!!!
Your Python program has this code.

for n = 1 to 10:
position = position + 10 # Move the position 10 steps.
direction = direction + 90 # Change the direction by 90 degrees.

You decided to write your program in a block programming language.

What type of block do you need to accomplish what this line does?
direction = direction + 90 # Change the direction by 90 degrees.

A) event

B) voice and graphics

C) control

D) motion

Answers

Answer:

control

Explanation:

Repeat 10 times is a control block.

The type of block that would be needed to accomplish the line would be C. Control

What is Programming?

This refers to the set of code that is given to the computer by a programmer to execute a task.

Hence, we can see that from the line of code that shows a sequence of numbers from 1 to 10 and to move and change the direction of the position and degree, to write this program in a block programming language, the type of block that is needed is a control block.

Read more about block programming here:

https://brainly.com/question/14525641

#SPJ2

Think of a simple software project that requires your design skills. Specify the requirements needed on each design process

Answers

Answer:In this guide, we'll go over the basics of your software development ... I know which option I'd choose. ... Will you need to integrate with other tools or APIs? ... With the requirements in place, it's time to start designing what this ... In its most basic form, you can think of the Waterfall method as following each ...

Explanation:

These comprise fundamental elements such as the functions, features, and requirements, which are chosen after analysing user demands. Hardware and software specifications, maintainability, availability, and testability are a few design criteria.

What requirements needed on each design process?

Design specifications specify the conditions that a new good or service must fulfil to be deemed successful. In order for your team to design, create, and assess your solution, it is crucial to identify these requirements in the beginning.

Therefore, Criteria are the requirements that the design must meet in order to succeed. The design is limited by constraints. These could include the materials on hand, the cost of the supplies, the time allotted for developing the solution, etc.

Learn more about design process here:

https://brainly.com/question/28221020

#SPJ2

i'll give brainliest to whoever says Tom Clancy's: The Division 2 is a garbage game.

Answers

Tom Clancy the division 2 is garbage.

2.Explain the differences between kernel applications of the OS and the applications installed by an organization or user.

Answers

Explanation:

Operating system is a system software, whereas,  Kernel is a part of operating system. Operating system acts as an interface between user and hardware. Kernel acts as an interface between applications and hardware. In Linux, for example, device drivers are often part of a kernel (specifically Loadable Kernel Modules).

The analogy of a computer system is often used to illustrate the different parts of memory. The keyboard is where we encode new information, the hard drive is where we store information, and the monitor is where we retrieve information. Now create your own analogy and explain why each part of the memory system corresponds with the analogy you have selected.

Answers

Answer:

Different memory parts is used to provide an analogy of the computer system. In keyboard, we give new new information, we store the information in a hard drive and we retrieve information from the monitor.

Explanation:

The Encoding:  keyboard- encoding: we write something on a piece of a paper and then place it into a manila file folder.

Example: let a poem about Santa Claus

The Storage: Next CPU-Label of the folder and then put it into the file cabinets in the hanging file folder which is labeled with subject

Example: Label folder Santa Clause and put it into the present hanging file folder that is labeled "the Mythical winter figures"

The Retrieval: Now monitor-Open file cabinet, then flip to an appropriate hanging file, and then go to the specific file folder to get access to the paper.

Example: Flip to the "mythical winter figures" and then browse through the files until we locate the "Santa Claus,"  pull it out to read the poem. Then define and also give an example of the parallel processing.

Other Questions
3x - 5 = 1/2x + 2x solve the equation and please show your work im confused Which statement is true about language?1 All languages have different words for the same concepts.2 A cultures language does not reflect the things that are important to that culture.3 People who speak different languages are considered to be culturally the same.4 In some countries, people speak more than one languagei think 1. Denise works in the quality control section of a large shipping company. In this capacity, she monitors and reports on how well (or how poorly) the system operates and how well the subsystems of the company relate to each other. With what does Denise provide her organization (8x4 + 9x2 - 9) - (8x3 + 3x2 7) simplify 2^9 divided by 2^6 I need help ASAP can you help me pleaseee On a map of the city, 2 inches represents 1 mile. Michelle is trying to plan out her trip from downtown to uptown. On the map, the distance is 16 inches. What is the actual distance that Michelle will travel from downtown to uptown? A coin has heads on one side and tails on the other. The coin is tossed 12 times and lands heads up 4 times. Which best describes what happens when the number of trials increases significantly? A. The observed frequency of landing heads up gets closer to the expected frequency based on the probability of the coin landing heads up. B. The observed frequency of landing heads up will always be 1/3 of the number of tosses. C. The expected frequency based on the probability of the coin landing heads up gets closer. D. The expected frequency based on the probability of the coin landing heads up gets closer to the observed frequency. Why are symbols important in stories Describe therelationshipbetween rocklayers and anintrusion fromigneous rock Which statement describes the relationship between a gene and an allele?Alleles are different versions of a geneGenes are different versions of an alleleMany genes make up an entire alleleAlleles are similar genes from different species of organisms. answer PLEASEEEE :) Evaluate 3^2 + (7 - 2) x 4 -6/3 In what way is blood the bodies liquid messenger? Write an equation in slope-intercept form of the line that passes through (-1,4) and (0,2). Read the sentence: Both Courtney and I will go to soccer practice afterschool. The verb go can be identified as one of the following.transitiveintransitiveadverbO symbolism Mg2+ and Br- formula Whats the answer???????? 150 adults complete a survey 80 are women Write the ratio men to women in its simplest form Who know this word think Using your own words, create a word problem around the given problem. Then solve it65% of $300