Answer:
user_input = [int(input()) for i in range(20)]
even = []
odd = []
for i in user_input:
if i%2:
even.append(i)
else:
odd.append(i)
print("odd : ", len(odd), "even : ", len(even))
Explanation:
The above code is written in python :
Using a list comprehension we obtain a list of 20 values from the user and store in the variable user_input.
Two empty list are defined, even and odd which is created to store even and odd values.
A for loop is used to evaluate through the numbers in user_input. Even values leave no remainder when Divided by 2 and are appended to the even list while those those leave a raunder are automatically odd values. The elements each list are counted using the len function and are displayed using the print statement.
Inputting a range of numbers comprising a batch and then inputting each serially numbered document is characteristic of the control plan called: cumulative sequence check batch sequence check suspense file of missing numbers computer agreement of batch totals
Answer:
batch sequence check.
Explanation:
A batch sequence check can be defined as a strategic and systematic control plan which typically involves the process of inputting a range of numbers comprising a batch and then inputting each serially numbered document.
The steps for checking an event data within a batch using a batch sequence check include the following;
I. You'll enter a range of serial numbers of the document in a batch.
II. You'll enter each serially pre-numbered document one after the other.
III. The input documents are sorted by a computer into a serial (numerical) order, match the sequence number range against the input documents, and then reports any part of the document that is missing, a duplicate and out of range.
outline the steps involved in changing the colour of a theme
Answer:
Right click on the desktop and click on personalize option and then click on window color. After that window color and appearance window appears. select a color scheme you want. Go to Appearance and personalization, click on theme and select any theme from the list and click on ok.
what is the use of a piano
¿Si tengo un disco de 1Tb, y en el tengo almacenado lo siguiente:
a) 300 videos de 126GB en total
b) 1376 archivos de office que cada uno pesa 117kb.
c) 3000 mp3 de 3.8mb cada uno.
d) 4Gb ocupados en el sistema operativo.
¿Cuánto espacio me sobre en el disco duro?
Answer:
Espacio a la izquierda = 858,8439008 Gb
Explanation:
Dados los siguientes datos;
Tamaño del disco duro = 1 Tb
Vídeos = 126 Gb
Archivos de Office = 1376 * 117 Kb = 160992 Kb
Mp3 = 3000 * 3.8 mb = 11400 Mb
Sistema operativo (OS) = 4 Gb
Conversión:
En primer lugar, convertiríamos el tamaño del archivo en kilobytes a megabytes.
1000 Kb = 1 Mb
160992 Kb = 160992/1000 = 160.992 Mb
Memoria total (Mb) = 11400 + 160,992
Memoria total (Mb) = 11560.992 Mb
A continuación, convertiríamos el tamaño del archivo en megabytes a gigabytes;
1000 Mb = 1 Gb
11560.992 Mb = 11560.992/1000 = 11.560992 Gb
Por último, sumaríamos todos los tamaños de archivo en gigabytes;
Espacio total (memoria) utilizado = 126 + 11.560992 + 4
Espacio total (memoria) utilizado = 141,560992 Gb
Conversión:
1000 Gb = 1 Tb
Espacio restante = tamaño del disco duro - memoria total utilizada
Espacio a la izquierda = 1000 - 141.560992
Espacio a la izquierda = 858,8439008 Gb
Nota:
Kb significa kilobyte. Mb significa megabyte. Gb significa gigabyte. Tb significa terabyte.B2B partners often connect to each other on the Internet through special __________ designed to facilitate information exchanges and transactions. search engines web masters web portals web routes gatekeepers
Answer:
web portals
Explanation:
B2B (business-to-business) is a marketing strategy that deals with meeting the needs of other businesses, by selling products or services to the organizations for resale to other consumers, used in production of goods or for the operation of an organisation.
B2B (business-to-business) model focuses on facilitating sales transactions between businesses.
Under the B2B, the producer sells its products directly to other businesses such as wholesalers or retailers and not the end consumers.
B2B partners often connect to each other on the Internet through special web portals that are designed to facilitate exchange of information and simplified business transactions.
Additionally, a popular application of the seller-side marketplace model, which is a major business-to-business (B2B) e-commerce model, is e-procurement of goods through the use of web portals over the internet and as such eliminating the option of physical buying or procurement.
Discuss if you think technology, mobile apps, and/or social networks make us lazy or not. Justify your answer.
Identify ways that you’ve seen social media affect people in the workplace or in society (whether positively or negatively).
Analyze technology’s impact (and in particular, consider social media and mobile apps) on your own life.
Answer:
Yes, I do you can't just go out and work, play, or anything outside and people just want to stay inside on electronics like phones, tv, game systems.
Explanation:
In truth, technology has made a lot of difference in our society, but it has also transformed humans into lazy-bones. These days, people don't need to run errands anymore; they push a button on their phone (another product of tech) and have most of the human's first world problems solved
What is the process of adding random characters at the beginning or end of a password to generate a completely different hash called?
Answer:
Salting
Explanation:
Salting is an idea that is related to hashing of password which is the mapping of input data to a fixed length output data by the use of algorithms.
Salting is the addition of a distinctive value to the beginning or end of a password in order to form a different hash value from the hash value that would have been generated without the 'salt', thereby making the passwords more secure from attacks
The salt for each user is a unique value that is stored along with the username in a database
You work in a branch office and use a desktop system named Comp1. A Windows server named Srv1 is located in the main office.Srv1 stores several shared folders that you use, including the Data share. You use Offline Files in the branch office to make the files on the server are available when the WAN link is down.How can you prevent all files in the Data share from being cached while making sure files in other shared folders are still available?A. On Srv1, edit the Local Security Policy.B. On Comp1, edit the Offline Files settings in the Sync Center.C. On Srv1, edit the properties for the Datafolder.D. On Srv1, edit the Offline Files settings in the Sync Center.
Answer:
C. On Srv1, edit the properties for the Data folder
Explanation:
Using the caching feature of Offline Folder gives users access to shared folders through the maintenance of a local copy which allows users to continue working with the resources in the shared folder in the event the server hosting the folder cannot be reached, which leads to increased productivity. However, when a shared folder is the storage location of sensitive data to which there is restricted access, it may be required to prevent the folder from being cached
The caching option property for the shared folder can be set from within the Offline Settings, to configure the availability of the folder when the server WAN link is down
c724 wgu True or false. A storage device consists of all the components that work together to process data into useful information
Answer:
False
Explanation:
A output device consists of all the components that work together to process data into useful information
Choose all that apply: You are servicing a Dell Inspiron 22 3265/3263 AIO Desktop and determine that the LCD panel is faulty. What troubleshooting steps will you follow before replacing the LCD Assembly
Explanation:
1.) Run ePSA, but press ESC to stop testing and regain control of the cursor. Double tap on the screen and see if the cursor moves to your pressed location. That will determine if the hardware is needed to be replaced or it is a software problem
2.) If the system boots into windows, check the device manager for the USB Input device which has a white circle and a down arrow, right click and enable it to test its functionality.
The troubleshooting steps that the user will need to follow before the LCD Assembly is replaced goes thus:
One will have to run the ePSA.The cursor will have to be regained by press esc in order to stop the testing.Then one will have to double tap the screen in order to check whether the cursor had been moved to the pressed location.The above is necessary in order to know if there will be a replacement of the hardware or whether it is a software problem Then if the system boots into windows, one will have to check the device manager in order to find the USB Input device which will then be right clicked to test its functionality.In conclusion, the above method will be used for the troubleshooting.
Read related link on:
https://brainly.com/question/18275236
In design and implementation of any _____ reasoning application, there are 4 Rs involved: retrieve, reuse, revise, and retain.
Answer:
case-based.
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer on how to perform a specific task and solve a particular problem.
Simply stated, it's a computer program or application that comprises of sets of code for performing specific tasks on the system.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Maintenance.
A case-based reasoning application refers to a knowledge-based system that is designed and developed to use previous case scenarios (similar past problems) to interprete or proffer a solution to a problem.
In design and implementation of any case-based reasoning application, there are four (4) Rs involved: retrieve, reuse, revise, and retain.
A number of computers have been reported to be getting incorrect IP addresses. After doing some investigation, an unauthorized DHCP server has been determined to be the cause. Which step in the troubleshooting process should be performed next
Answer:
Establish a plan of action to find the DHCP server.
Explanation:
The troubleshooting process can be defined as the sequential steps that are to be taken while trying to proffer a solution to a problem, usually on computer systems.
The seven (7) steps of the troubleshooting process in ascending order are;
1. Identify the problem.
2. Establishing a theory of probable cause of the problem.
3. Test the established theory to determine cause.
4. You should establish a plan of action to resolve the problem while identifying its potential effects.
5. Implement a solution.
6. Verify full system functionality.
7. Document findings, actions and outcomes.
In this scenario, the step in the troubleshooting process that should be performed next is establishing a plan of action to resolve the problem by finding the unauthorized dynamic host control protocol (DHCP) server issuing the incorrect internet protocol (IP) addresses.
Answer please in order
Answer:
analogue; discrete; sampled; sample rate; bit depth; bit rate; quality; larger; file size.
Explanation:
Sound are mechanical waves that are highly dependent on matter for their propagation and transmission.
Generally, it travels faster through solids than it does through either liquids or gases.
Sound is a continuously varying, or analogue value. To record sound onto a computer it must be turned into a digital, or discrete variable. To do this, the sound is sampled at regular intervals; the number of times this is done per second is called the sample rate. The quality of the sound depends on the number of bits stored each time - the bit depth. The number of bits stored for each second of sound is the bit rate and is calculated by multiplying these two values (sample rate and bit depth) together - kilobits per seconds (kbps). The higher these values, the better the quality of the sound stored, but also the larger the file size.
What is the Role of an algorithm?
Answer:
Informally, an algorithm is any well-defined computational procedure that takes some value, or set of values, as input and produces some value, or set of values, as output. An algorithm is thus a sequence of computational steps that transform the input into the output.
pls Mark me as brainliest trust me
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Answer:
" CRL (certificate revocation list)" is the appropriate answer.
Explanation:
A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.A construct that enables you to create custom types by grouping together variables of other types is called a what
Answer:
A class
Explanation:
A class is a construct that enables you to create your own custom types by grouping together variables of other types, methods and events. You can map classes to an existing database or use them to generate a database. In this tutorial, you'll create the data models by writing data model classes.
Which power backup method will continually provide power to a server if the power goes out during a thunderstorm
Answer:
An online UPS
Explanation:
An online uninterrupted power supply (ups) can be defined as an electronic device that is designed to supply continuous power to a load that uses alternating current (AC), through the inverter and rectifier arrangement (combination) during normal operation of the device. Thus, an online UPS through its inverter supplies continuous AC power in the event of a power failure.
Hence, an online UPS power backup method is designed and developed to continually provide power to a server (load) if there is a power outage as a result of a thunderstorm.
In conclusion, an online uninterrupted power supply (ups) guarantees a 24 hour power supply when properly installed and connected to a load or end user device such as a server.
When a primitive type variable is passed as an argument to a method, what is passed into the receiving method's parameter variable
Answer:
The value of the primitive type variable is passed into the receiving method
Explanation:
Examples of primitive data types are integers, floats, real, double, character, byte, etc.
When any of these data types variables are passed to a method, the method which receives the variables receives the value of the variable being passed.
Take, for instance; the following code segment:
int doubleNum(int num){ ..... }
int main(){ ... num = 2; doubleNum(num);}
The above function doubleNum will receive the value of num (which is 2).
HELPPPPP !!!!!!!!!!!
Answer:
Computers are developed along two separate engineering paths, producing two different types of computers.
An analog computer operates on continuosly varying data.
A digital computer operates on descrete data.
Data sorting refers to the arrangement of the data records in the ascending or descending order on the basis of numeric of alphabetic fields.
Answer:
hope this will help you friend.
a passcode is created using 4 digits. how many passcodes can be created where the code has to be 5000 or greater with no digit allowed to repeat
Answer:
5000 passcodes
Explanation:
5x10x10x10 = 5000
We use loops to: Process Numeric Data Ask users to enter information Repeat blocks of code Ask True/False questions
Answer:
Repeat blocks of code.
Explanation:
EXAMPLE JAVASCRIPT LOOP CODE
_________________________________________________________
INPUT:
while(true){//Check If bool True=True
console.log("Hello World!")
}
_________________________________________________________
OUTPUT:
Hello World!
Hello World!
Hello World!
Hello World!
Hello World!
[tex]\cdots[/tex]
Hello World!
Hello World!
Draw a flowchart to find greater number among three number
Answer:
See attachment for flowchart
Explanation:
First, we get input for the three numbers
The flowchart then checks if the first number is greater than the other two
If yes, the first is assigned the largest
If otherwise, the second number is tested
If it is greater than the other two, then the second is assigned the largest
If otherwise, the third is assigned the largest
Lastly, the largest is printed before the flowchart ends
A connection has been terminated and no communication is possible. What is the Transmission Control Protocol (TCP) socket state?
Answer:
Closed
Explanation:
When a connection has been terminated and no communication is possible between the communicating network devices, the Transmission Control Protocol (TCP) socket would be closed.
Objects normally have __________ that perform useful operations on their data, but primitive variables do not.
Answer:
methods
Explanation:
which shooting games is good for low end PC. CSGO or Valorant?
the best choice would be csgo
State True or False: 1. Application software can run without the presence of system software. 2. . A language processor translates the machine language into programming language. Backup is a process of shrinking the files on a disk. VisiCalc was the first computer spreadsheet program. An interpreter translates the whole program into an equivalent code in one go.
Answer:
2. translates program written in any programming language into Machine language
last ko . false
Explanation:
aru aaunna
1) a program that is designed to perform only one task.
Answer:
special purpose application software
Explanation:
it is a type of software created to execute one specific task.for example a camera application on your phone wul only allow you to take and share pictures.
Other example of special purpose application are web browsers,calculators,media playors,calendar programs e.t.c.
Stacy is in the process of creating a storyboard for her personal website, but she is unable to decide which storyboarding technique to use. Which technique would work best for her?
Answer:
Webbed storyboard technique
Explanation:
There are several storyboard techniques; however, the best for a website is the webbed storyboard technique.
Coined from the word "web", this technique does not only help in linking pages within the website where a page can be access from other pages, it also links pages of the website to external pages.
An illustration is as follows:
From the homepage of a website, one can access the contact page, the about page, etc.
Each of the listed pages also have link back to the homepage and to every other pages.
Answer the following questions in your own words on how you understand the lesson.
differentiate the following pairs of terms.
1.Save and Save As
2.Blank Document and Template
3. Existing File and Recently Open File
Answer:
Explanation:
1.Save and Save As
The main difference between Save and Save As is that Save helps to update the lastly preserved file with the latest content while Save As helps to store a new file or to store an existing file to a new location with the same name or a different name
2.Blank Document and Template
Templates in Panda Doc are used for generic content that you intend on using multiple times, while documents are used for specific information. In order to send a document, you must first create it from an existing template
3. Existing File and Recently Open File
Opens a file for writing and reading in binary mode. a: opens a file for appending new information to it . ... A new file is created if one with the same name doesn't exist
como se llama el arte de pintar en las cuevas sus actividades de caceria