A binary floating-poi Select 3 true statements about Python primitive types.
32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)
The int type in Python3 cannot represent a number greater than 2^31-1.
A binary floating-point method is used to represent fractions in binary numbers.
The decimal number 0.1 cannot be expressed without error in binary floating-point format.
The float type in Python3 can represent decimal 0.1 without error.nt method is used to represent fractions in binary numbers

Answers

Answer 1

The true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.

What are  Python primitive types?

The  Python primitive types is known to be made up of four primitive data types which are:

Integer.Float.String.Boolean.

Note that The true statements about Python primitive types.

32-bit integer type (a.k.a. int32) can represent integer value from -2^31 (-2,147,483,648) to 2^31-1 (2,147,483,647)A binary floating-point method is used to represent fractions in binary numbers.The decimal number 0.1 cannot be expressed without error in binary floating-point format.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ1


Related Questions

What are types of operators in Python

Answers

Answer:

Python divides the operators in the following groups:

Arithmetic operators.Assignment operators.Comparison operators.Logical operators.Identity operators.Membership operators.Bitwise operators.

Write the line of code (from the CSV package) that will import a comma-separated file named data.csv as a Julia Data Frame. Simply write the function and its argument reflecting the file name. You don't have to provide a delimiter.

Answers

The line of code that imports the csv file is df = DataFrame(CSV.File("data.csv"))

How to determine the line of code?

From the question, the file name is:

data.csv

The syntax that imports the file as a julia dataframe is:

df = DataFrame(CSV.File("file-name"))

Since the filename is data.csv, the code becomes

df = DataFrame(CSV.File("data.csv"))

Hence, the line of code that imports the csv file is df = DataFrame(CSV.File("data.csv"))

Read more about data frame at:

https://brainly.com/question/28016629

#SPJ1

Which of the following is not true about Mac computers? The current version of OS X is called El Capitan. Macs come with a variety of useful programs already installed. Boot Camp is a program that allows you to install and run Windows on a Mac Macs have a reputation for being unsecure, unstable and difficult to use.​

Answers

Mac’s current OS is El Capitan and Macs have a reputation to be unsecure. Both of these are not true.

How would you describe data communication system vis a vis computer networking.

Answers

Data communications is known to be the movement of digital data between two or a lot of computers while computer networking is known to be a form of  telecommunications network that gives room for computers to be able to exchange data.

What is the difference between communication system and network?

Data Communication is one that works in the area of communicating process and it entails all the different areas and through a lot of process but Computer Networking is one that moves information and allow file  movement across different localities to pass data.

Therefore, Data communications is known to be the movement of digital data between two or a lot of computers while computer networking is known to be a form of  telecommunications network that gives room for computers to be able to exchange data.

Learn more about Data communications  from

https://brainly.com/question/14657016

#SPJ1

HC - AL-Career Preparedness
8
English
11 12 13
Lee wants to format a paragraph that he just wrote. What are some of the options that Lee can do to his paragrap
Check all that apply.
O aligning zoom
O aligning text
O adding borders
O applying bullets
O applying numbering

Answers

The options that Lee can do to his paragraph are:

aligning textadding bordersapplying bulletsapplying numbering

What is Paragraphing?

This is known to be the act of  sharing or dividing a text into two or more paragraphs.

In paragraphing  one can use:

aligning textadding bordersapplying bulletsapplying numbering

Learn more about paragraphing from

https://brainly.com/question/8921852

#SPJ1

you are working at a computer that has standardized on windows 10 workstation for all. the phone rings and it is your superior. he tells you that his workstation is running incredibly slow, almost to the point where it is unusable. he reports that be has exited out of everything of the operating system. you suspect there are background process tying up the cpu memory. which utility can you have him use to look for such culprit?

Answers

Answer:

Task Manager

Explanation:

Task manager allows the user to look at all processes and applications running. Using Task Manager, the user find which component is being utilized the most and finding the processes that are effecting the component.

For Captive Analytics firms clients are well defined? True or false

Answers

From the aspect of captive Analytics firms, clients are well-defined. Yes, in this case, the given statement stands true.

What are captive Analytics firms?

Captive Analytics firms save the exceedingly exclusive data, typically in the BFSI space, and hire specialists in setting up their division. And then the crew grows primarily based totally on the ROI and the sort of initiatives they take up.

Thus, From the aspect of captive Analytics firms, clients are well-defined. Yes, in this case, the given statement stands true.

Learn more about captive Analytics firms:

https://brainly.com/question/24304837

#SPJ1

26. A network administrator is looking to expand the available bandwidth of his extranet remote branch by adding another leased line. The ISP has notified the administrator that another physical serial connection will need to be added to his gateway router. Which of the following will realise this?

A. Add a distribution layer card into the router allowing another gigabit ethernet port.
B. Add a layer 3 switch into the network.
C. Install a WAN interface card with appropriate interface connectors to the
router.
D. Multiplex the existing serial using the appropriate commands in the config
file.



27. What happens after configure a rule with IP address 0.0.0.0 and wildcard mask 255.255.255.255?
A. This is default configuration B. Block all IP address
C. Allow all IP addresses
D. Nothing will happens

Answers

The option that will realize the above case is that  Add a distribution layer card into the router allowing another gigabit ethernet port.

How do one  Increase Bandwidth on Router

The steps are:

Alter the Router's Location. Then Reboot your Router.Have a Dual-bandwidth Router. Then do Update the Router's Firmware.

So therefore, The option that will realize the above case is that  Add a distribution layer card into the router allowing another gigabit ethernet port.

Learn more about expanding bandwidth from

https://brainly.com/question/25898149

#SPJ1

Which of the following shows how to correctly declare pointer variable x?
A. int x;
B. int &x;
C. ptr x;
D. int *x;

Answers

Answer:

declaration of pointer variables are done using *

Explanation:

* denotes the declared variable is a pointer which can hold address of another location. To get values of any address & is used. For example, we have an integer variable a to which holds a value 10. if you want to read the address of the variable a, use &a. To store this address in any other memory declare a pointer variable.

int a = 10;

int *loc_a;

loc_a = &a;

Create a python program that converts number grades to letter grades.


Console

Letter Grade Converter


Enter numerical grade: 90

Letter grade: A


Continue? (y/n): y


Enter numerical grade: 88

Letter grade: A


Continue? (y/n): y


Enter numerical grade: 80

Letter grade: B


Continue? (y/n): y


Enter numerical grade: 67

Letter grade: C


Continue? (y/n): y


Enter numerical grade: 59

Letter grade: F


Continue? (y/n): n


Bye!


Specifications

 The grading criteria is as follows:

A 88-100

B 80-87

C 67-79

D 60-66

F <60

 Assume that the user will enter valid integers for the grades.

 The program should continue only if the user enters “y” or “Y” to continue.

Answers

The python program that converts number grades to letter grades is as written below.

How to create a python program?

The python program that converts number grades to letter grades is as written below;

def test(nums):

   return ["A" if grade >= 88

                       else ("B" if grade >= 80

                                   else ("C" if grade >= 67

                                         else ("D" if grade >= 60

                                               else ("C" if grade < 60

           for grade in nums]

Read more about python codes at; https://brainly.com/question/26497128

#SPJ1

6.24 LAB: Convert to binary - functions
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:

As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.

Ex: If the input is:

6
the output is:

110
The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.
def int_to_reverse_binary(integer_value)
def string_reverse(input_string)

in python

Answers

The program illustrates the use of functions, iterations and modulo operator

The complete program

The program written in Python is as follows:

import math

def int_to_reverse_binary(integer_value):

  remainder = ""

  while integer_value>=1:

      remainder+=str(integer_value % 2)

      integer_value=math.floor(integer_value/2)

  reverse_string(remainder)

def reverse_string(input_string):

  binaryOutput=""

  for i in range(len(input_string)-1,-1,-1):

      binaryOutput = binaryOutput + input_string[i]

  print(binaryOutput)

integer_value = int(input("Enter a Number : "))

int_to_reverse_binary(integer_value)

Read more about Python programs at:

https://brainly.com/question/13246781

#SPJ1

Execute and explain this program using // in Layman's language. Thank you!

Answers

The explanation of the program using layman's language is:

It wants to find the highest and lowest contributions madeIt wants to discover how many individual contributions were needed to reach the targetThe total amount of contributions collectedThe program wants to test various input data for contributions and how many contributions are needed to reach the goal.

What is a Program?

This refers to the sequence of instructions in a programming language that executes the instruction given to the computer.

Hence, we can see that different input sizes would be used to test the program as it is in the testing stage to see just how efficient the program is.

Read more about programs here:

https://brainly.com/question/1538272

#SPJ1

An Inspect and Adapt (I&A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable Program Increment (PI) commitments. One of the participants suggests that they are working on too many things at one time. What aspect Of the program causes uncontrollable amounts of work in process

Teams do not do a good job of task.switching
Stories are too small
Items in the program Backlog are large chunks Of work at different layers Of the System instead Of true Features
All program teams are cross-functional so every team creates work in multiple areas at the same time

Answers

The aspect Of the program that causes uncontrollable amounts of work in process is that Teams do not do a good job of task switching.

What is task switching?

Task switching or task interleaving is known to often take place if a task is voluntarily or involuntarily stopped so as to listen  to another task.

In the case above, The aspect Of the program that causes uncontrollable amounts of work in process is that Teams do not do a good job of task switching.

Learn more about task switching from

https://brainly.com/question/12977989

#SPJ1

Question 8 of 10
What are two issues that can be encountered when sending documents
through email?
A. The sender can forget to attach the document to the email.
B. Emailing documents is a long, complex process.
C. The paper clip icon in the program must be selected to find the
correct file and attach it.
D. Some documents are too large to be sent through email.

Answers

Answer:

A & D

Explanation:

A) Forgetting to attach a document/misclicking is a common issue when sending documents.

B) Attaching a document is not a complex topic and does not require much time.

C) There are other ways of attaching a document; after looking, it is not hard to find the icon. You can also search for the file uploader button as well.

D) This is a big issue; to scale the document down, you have to shrink it or transform the size. It creates multiple issues.

multiplication algorithm flow chart

Answers

An example of a multiplication algorithm flow chart is given in the image attached.

What is booth algorithm flowchart?

The Booth's Algorithm Flowchart  is known to be a that is unique. The standard algorithm is known to be a method used in doing multiplication by via the use of partial products or via multiplying in parts.

Therefore, An example of a multiplication algorithm flow chart is given in the image attached.

Learn more about algorithm flow chart from

https://brainly.com/question/18088572

#SPJ1

Data frames can be subset by a chosen value using ==.

Ex: df[df.x == 5] gives all the rows in the data frame df for which the column x has a value of 5.

Write a program that performs the following tasks:

Load the file mtcars.csv into a data frame called df

Create a new data frame df_cyl by subsetting the data frame based on a user defined value for the column cyl.

Print the shape of the new data frame.

Answers

Using python knowledge and writing code importing pandas, it is possible to create a function that corresponds to what you want.

Writting in python:

import pandas as pd

if __name__ == "__main__":

   df=pd.read_csv('mtcars.csv')

   cylinders=int(input())

   print(df[df.cyl==cylinders].shape)

See more about python at brainly.com/question/18502436

#SPJ1


You've determined that your email program, Outlook, is not working, and your
manager tells you to reboot your email program. Which of these should you NOT do?

Answers

You've determined that your email program, Outlook, is not working, and your manager tells you to reboot your email program Go and restart outlook. If it begins offevolved and works fine, then Outlook is fine, if now no longer, continue to the following approach to troubleshoot.

Why is my Outlook Email now no longer working?

Remove and re-upload the e-mail account at the Outlook app. Check for any pending updates in your tool or for the Outlook app. Remove the Outlook app out of your telecellsmartphone and re-down load it out of your tele cellsmartphone's app save to make certain which you have the maximum up to date Outlook app. Restart your smartphone/too.

Go and restart outlook. If it begins offevolved and works fine, then Outlook is fine, if now no longer, continue to the following approach to troubleshoot. Press the Windows key and press “r” to your keyboard and sort outlook.exe /reset navpane in the “Run” conversation box. Press “Enter” to run OutlookWhile the using of Microsoft Outlook, you may have come upon several forms of mistakes which restrict you from getting access to it completely. And one of the maximum encountered mistakes is ‘Outlook isn't closing’, even after clicking the go out button a couple of times.

Read more about managers:

https://brainly.com/question/24553900

#SPJ1

Which of the following formulas properly produces the string "Income Statement"?
O
OO
= "Income"&"Statement"
= "Income "+"Statement"
=Income&Statement
= "Income"&" "&"Statement"

Answers

The  formulas that properly produces the string "Income Statement" is: D. = "Income"&" "&"Statement"

What is income statement?

Income statement is a statement that report the income and expenditure a company or an organization generated at particular or specific period of time.

Option A="Income"&"Statement" :Will produce value IncomeStatement

Option B="Income"+"Statement": Will produce no value

Option C =Income&Statement: Will  produce no value.

Option D ="Income"&" "&"Statement": Will produce value Income Statement

Hence, the formulas that properly produces the string "Income Statement" is option  D which is: = "Income"&" "&"Statement"

Learn more about Income statement here:

https://brainly.com/question/15169974

https://brainly.com/question/24498019

#SPJ1

Write an if-else statement for the following: If user_tickets is less than 5, assign num_tickets with 1. Else, assign num_tickets with user_tickets. Sample output with input: 3 Value of num_tickets: 1

Answers

The if-else statement as based on python 3.8 is given below

if user_tickets < 5:

  num_tickets = 1

else:

  num_tickets = user_tickets

Note that if this code is to work properly, a person need to first declare user_tickets before the if-else statements.

What is this if statement?

The if/else statement is known to be that which carry out a block of code if a given condition is true.

Note that If the condition is false, a given  or another block of code iis one that can be executed.

Learn more about if-else statements from

https://brainly.com/question/18736215

#SPJ1

The Horse table has the following columns:

ID - integer, auto increment, primary key
RegisteredName - variable-length string
Breed - variable-length string, must be one of the following: Egyptian Arab, Holsteiner, Quarter Horse, Paint, Saddlebred
Height - decimal number, must be between 10.0 and 20.0
BirthDate - date, must be on or after Jan 1, 2015
Insert the following data into the Horse table:

RegisteredName Breed Height BirthDate
Babe Quarter Horse 15.3 2015-02-10
Independence Holsteiner 16.0 2017-03-13
Ellie Saddlebred 15.0 2016-12-22
NULL Egyptian Arab 14.9 2019-10-12

Answers

See below for the statement to insert the data values

How to insert the records?

To do this, we make use of the insert statement.

This is done using the following syntax:

INSERT INTO table_name (column_name, ...) VALUES (value, ...)

Using the above syntax and the data values, we have the following insert statement.

INSERT INTO Horse (RegisteredName, Breed, Height, BirthDate)

VALUES ('Babe Quarter', 'Horse', '15.3', '2015-02-10'), ('Independence', 'Holsteiner', '16.0', '2017-03-13'), ('Ellie', 'Saddlebred', '15.0', '2016-12-22')

INSERT INTO Horse (Breed, Height, BirthDate) VALUES ('Egyptian Arab', '14.9','2019-10-12')

Read more about SQL at:

https://brainly.com/question/10097523

#SPJ1

Answer:

INSERT INTO Horse (RegisteredName, Breed, Height, BirthDate) VALUES

  ('Babe', 'Quarter Horse', '15.3', '2015-02-10');

INSERT INTO Horse (RegisteredName, Breed, Height, BirthDate) VALUES

  ('Independence', 'Holsteiner', '16.0', '2017-03-13');

 

INSERT INTO Horse (RegisteredName, Breed, Height, BirthDate) VALUES

  ('Ellie', 'Saddlebred', '15.0', '2016-12-22');

INSERT INTO Horse (RegisteredName, Breed, Height, BirthDate) VALUES

  (NULL, 'Egyptian Arab', '14.9', '2019-10-12');

Explanation:

Data elements in a relational database are organized into ____

Answers

Data elements in a relational database are organized into _Tables_

Hope it helps!

A computer cannot boot if it doesn't have ?

Answers

Answer:

without an operating system, a computer cannot boot, as it also provides services for the computer programs.

Hope This Helps!!!

Answer: A computer can't boot without an operating system.

Explanation:

An operating system is  a system software that manages computer hardware, software resources, and provides common services for computer programs. Without the operating system, the computer can't function to have a boot-able device.

Choose the 3 correct statements for the code below.

An object of the ActivationLayer class has a name attribute.
An object of the BaseLayer class has a size attribute.
print(FCLayer(42)) prints FullyConnectedLayer.
When creating an object of the ActivationLayer class, the size argument must be given.
When creating an object of the BaseLayer class, the name argument must be given.

Answers

Answer:

True

False

True

False

True

Explanation:

So I'll go through each statement and explain why or why not they're correct.

An object of the ActivationLayer class has a name attribute. So because ActivationLayer is inheriting the BaseLayer and it's calling super().__int__("Activation") it's going to call the BaseLayer.__init__ thus setting a name attribute equal to "Activation" for any ActivationLayer object that is initalized. So this is true

An object of the BaseLayer class has a size attribute. While it is true that FC layer is inheriting from BaseLayer and it has a size attribute, this does nothing to change the BaseLayer class. So any object initialized to a BaseLayer object will only have the instance attribute "self.name". So this is false

print(FCLayer(42)) prints FullyConnectedLayer. So whenever you print an object, it tries to convert the object to a string using the __str__ magic method, but if that wasn't defined it then tries the __repr__ method, which the FCLayer class technically doesn't define, but it inherits it from the BaseLayer class. And since whenever you define an FCLayer object it calls super().__init__ with "FullyConnected", which will then be assigned to the instance variable self.name,  it will print "FullyConnectedLayer". So this is true

When creating an object of the ActivationLayer class, the size argument must be given. This is true, because the size is a parameter of the __init__ method of ActivationLayer, it is not an optional parameter, and is something that must be passed otherwise an error will be raised. So this is false

When creating an object of the BaseLayer class, the name argument must be given. This is not true, because name is a default argument. This means if you do not pass an argument for name, then name will equal an empty string

An engineer is developing an algorithm to diagnose a person’s illness based on their reported symptoms.

In this scenario, the engineer would likely want to favor __________ as the most important category when developing their algorithm.

Answers

The engineer would likely want to favor accuracy as the most important category when developing his or her algorithm.

What is an algorithm?

An algorithm can be defined as a standard formula or procedures which consist of a set of finite steps and instructions that are executed on a computer system, in order to enable a software solve a particular problem under appropriate conditions.

In this scenario, the engineer would likely favor accuracy as the most important category when developing his or her algorithm to diagnose illness in a person based on their reported symptoms.

Read more on algorithm here: brainly.com/question/24793921

#SPJ1

Accuracy

The engineer would likely want to favor accuracy as the most important category when developing her algorithm.

An algorithm is a standard formula or procedures which consist of a set of finite steps and instructions that are executed on a computer system, to enable a software to solve a problem under appropriate conditions.

This engineer would favor accuracy as the most important category when developing her algorithm to diagnose illness in a person based on his reported symptoms.

2.16 LAB: Port Scan (Modules)
In network security, it is important to understand port scanning. Hackers use tools to scan a network and determine if there are open ports and if they contain some sort of vulnerability. To scan ports, you first have to find active hosts on a network. Once you find active hosts and discover a list of IP addresses for those hosts, a port scan can be performed to gather information about open ports and analyze services running on those ports. A port scan is the process of sending packets to an active host's ports and learning details that can help you gain access to that host or to discover open vulnerabilities on your network.

Some common ports are:
Port 20 - File Transfer Protocol or FTP
Port 22 - Secure Shell protocol or SSH
Port 23 - Telnet protocol for unencrypted transfer
Port 80 - HyperText Transfer Protocol or HTTP
Port 443 - HyperText Transfer Protocol Secure or HTTPS

The Well Known Ports are those from 0 through 1023

We are going to simulate a port scan by filling a list with 100 random port numbers. These values will be used as the keys in a dictionary where the values will be randomly generated integers 0 / 1. The 0 will be a closed port and a 1 will be an open port.

Your first TODO is to create a function called "create_host_IPs( )" that randomly generates a list of 10 IP addresses with 4 random octets values, concatenating the 4 values into a string and appending it to a host list. The function returns the generated host list. The random values can be limited to a range of 10 to 200.

Ex: IPv4 address should look like this:

192.168.34.23
Your next TODO is to create another function called "simulate_scan(h)" that iterates through the host list (received as h ) and then creates a new list called open_ports. The function should use a nested for loop that iterates through the host list, and then iterates through the returned list from a call to "create_random_open_ports()". If the returned list value is 1, then append it to your open_ports list. This simulates a scan of all the IPs in the host list and creates randomly generated open ports. Finally it should print the host IP and a list of open ports as displayed in this example output.

Ex: Your output should contain 10 IP reports. Here is and example of 2 of the 10 reports:

Host IP: 66.78.126.11
Open ports are:
[53, 87, 21, 57, 71, 37, 61, 38, 45, 94, 84, 26, 72, 52, 75, 41, 90, 88, 82, 59, 50, 36, 60, 16, 51, 76, 24, 66, 33, 63, 86, 93, 34, 85]

Host IP: 11.96.129.20
Open ports are:
[15, 77, 19, 72, 78, 37, 93, 42, 26, 30, 79, 16, 47, 48, 43, 50, 82, 60, 46, 10, 62, 96, 12, 99, 76, 51, 32, 24, 61, 87, 73, 65, 85, 67, 29]
417412.2037272.qx3zqy7
LAB ACTIVITY
2.16.1: LAB: Port Scan (Modules)
0 / 10


I REALLY NEED HELP!!!

Answers

This solution is written in Python programming language. See the details below.

What is Python Programming language?

Python is a coding language that is frequently used to applications, automate operations, make websites and execute analyze data.

It is a general-purpose programming language, because, it can be used to develop a wide range of applications and is not specialized for any particular problem.

What is the code required for the instance above?

The code required to deliver the given output is:

import random

def create_random_open_ports():

#Create empty list / dictionary

port = []

ports = {}

#Fill list with 100 random port numbers from 10 - 100

for i in range(1,101):

random_port = random.randint(10, 100)

port.append(random_port)

#Create a new dictionary with ports numbers as keys

new_ports = ports.fromkeys(port, 0)

#Iterate through new dictionary add random 0 / 1

#Closed port = 0, Open port = 1

for key in new_ports:

r1 = random.randint(0,1)

new_ports[key] = r1

return new_ports

# TODO: create a function called create_host_IPs() that randomly generates a list of 10 IP addresses

# concatenating the 4 values into a string and appending it to a host list. The function returns the generated

# host list

def create_host_IPs():

host = []

octet1 = ""

octet2 = ""

octet3 = ""

octet4 = ""

#Add loop with range 1 - 11 to create the 10 host IPs EX: 192.123.11.1

for i in range(1,11):

octet1 = str(random.randint(1,255));#Not taking 0 as first octet cannot be zero

octet2 = str(random.randint(0,255));

octet3 = str(random.randint(0,255));

octet4 = str(random.randint(0,255));

host.append(octet1 + "." + octet2 + "." + octet3 + "." + octet4)

return host

# TODO: create a function called simulate_scan(h) that iterates through the host list (received as h ) and

# then creates a new list called open_ports. The function should use a nested for loop that iterates

# through the host list, and then iterates through the returned list from a call to create_random_open_ports().

# If the returned list value is 1, then append it to your open_ports list.

# This simulates a scan of all the IPs in the host list and creates randomly generated open ports.

# Finally it should print the host IP and a list of open ports as displayed in assignment information.

def simulate_scan(h):

open_ports = []

for i in range(len(h)):

random_ports = create_random_open_ports()

for j in random_ports:

if random_ports[j] == 1:

open_ports.append(j)

print("IP Address :" + h[i] + " Open Ports :" + str(open_ports))

if __name__ == "__main__":

#Simulate port scanning for open ports

active_hosts = create_host_IPs()

simulate_scan(active_hosts)

Learn more bout Python Programming at;
https://brainly.com/question/26497128
#SPJ1

Select 3 true statements about Python primitive types.

Answers

The true statements about Python primitive types are:

32.bit integer type (a.k.a. int32) can represent integer value from -2 31 (-2.147,483,648) to 2"31-1 (2,147,483,647) A binary floating point method is used to represent fractions in binary numbers. The decimal number 0.1 cannot be expressed without error in binary floating-point format.

What are thee Python primitive data types?

The Python is known to have four primitive variable types which are:

Integers.Float.Strings.Boolean.

Note that The true statements about Python primitive types are:

32.bit integer type (a.k.a. int32) can represent integer value from -2 31 (-2.147,483,648) to 2"31-1 (2,147,483,647) A binary floating point method is used to represent fractions in binary numbers. The decimal number 0.1 cannot be expressed without error in binary floating-point format.

Learn more about Python from

https://brainly.com/question/26497128

#SPJ1

the objective fuction of linear progrmming should be

Answers

the real-valued function whose value is to be either minimized or maximized subject to the constraints defined on the given LPP over the set of feasible solutions. The objective function of a LPP is a linear function of the form z = ax + by.

which window would show you bindings for local area connection 2?

Answers

Local area connection 2 properties

What is one way a pivottable could combine the following data?

Gadget
Doodad Green
Gizmo
Widget
Color
Doodad Orange 400
Widget
Widget
Blue
Yellow
Unit Sales
Brown
h
White
200
350
125
100
175

Answers

answer

gadget color blue yellow

How do you create a function in C++

Answers

Answer:

1. Declaration: the return type, the name of the function, and parameters (if     any)

2. Definition: the body of the function (code to be executed)

Explanation:

Other Questions
Figure ABCD is transformed to figure A prime B prime C prime D prime, as shown below:A coordinate grid is shown from negative 5 to 0 to 5 on both x -and y-axes. A polygon ABCD has A at ordered pair 1, 3, B at ordered pair 3, 4, C at ordered pair 2, 1, D at ordered pair 1, 1. A polygon A prime B prime C prime D prime has A prime at ordered pair negative 3, 3, B prime at ordered pair negative 5, 4, C prime at ordered pair negative 4, 1, D prime at ordered pair negative 3, 1.Which of the following sequences of transformations is used to obtain figure A prime B prime C prime D prime from figure ABCD? Reflection over the x-axis followed by a translation to the right by 2 units Reflection over the y-axis followed by a translation to the left by 2 units Counterclockwise rotation by 90 degrees about the origin followed by a translation to the right by 2 units Counterclockwise rotation by 90 degrees about the origin followed by a translation to the left by 2 units How does the area of triangle rst compare to the area of triangle lmn? the area of rst is 2 square units less than the area of lmn. the area of rst is equal to the area of lmn. the area of rst is 2 square units greater than the area of lmn. the area of rst is 4 square units greater than the area of lmn. Solve the equation f(x)=x3+2x2+4x+8 given that one of its roots is x=2. what is the formula of the philosophical question based on the conversation between meno and socrates 7. Suppose a force of 15 N is required to stretch and hold a spring 0.25 m from its equilibrium position. a. Assuming the spring obeys Hooks law, find the spring constant k. b. How much work is required to compress the spring 0.2 m from its equilibrium position Mikal is proving that AE CE . Triangles A B E and C D E are connected at point E. Angles A B E and E D C are right angles. The lengths of A C and D C are congruent.Which reason does the represent in Mikals proof?SASSSSASAAAS I WILL MARK BRAINLIEST PLEASE HELP !! Determine whether the two triangles are similar. 4= 3/7(3x+14)Solve for x in simplest form. A law used to finance public services, such as waste treatment plants, parks, and schools, in newly developed areas, can result in extra-high taxes, in addition to the normal property taxes, and MUST be made known to any buyer before a purchase takes place. This law is: 29Select the correct answer.How did Hitler use anti-Semitism to increase his power?O.A. He convinced Germans that Jews were responsible for the fallure of the National Socialist movement.OB. He fed German bellef that Jews were responsible for the loss of World War I, which caused the ills of the country.OC. He caused Germans' bellef that Jews were a threat to national security because they did not believe in domination of the world.OD. He gained the support of Germans with disabilities because of the Jews' bellef that people could only be strong if they were"pure."Reset Westfalia is a country with a conservative population that bases its culture around traditional values and long cultural traditions. This year Westfalia began to have an increase of electronic media, movies and literature from a neighboring country, Dogoni. Dogoni's culture is broadly different from Westfalia being more liberal and explicit in its media. Westfalia's parliament is now passing new protectionist policies to restrict or ban electronic media, movies and literature from Dogoni. What reason would most rationally support Westfalia's government actions what is your favorite scent at bath and body works? trying to rid my account of points. 1235 6 789Luis is researching how he can gain muscle. He hascome across the website www.protein4U.comPROTEIN 4 UProtein 4 U is a fast-acting and natural protein powderdesigned to help you gain muscle. It is pleasanttasting and dissolves easily into water or a favoritebeverage. Added to a weight-lifting or bodybuildingroutine, Protein 4 U will help you build muscle quicklyand safely. But don't listen to us-listen to what someof our customers are saying"Protein 4 U is the best product ever. It helped megain musclelMark this and return"The results were even faster than promised. In justtwo weeks, I started noticing a difference!"1 add it to my smoothie every day before my workout.I've tried protein shakes before, but this tastes and10Which statement is a correct evaluation of the source?O The source is valid because it contains informationthat comes directly from the company.O The source is invalid because it relies on personaltestimonials about the product.TIME REMAINING39:51O The source is valid because it cites the people whosupplied information for the article.O The source is invalid because it is unrelated to thetopic that Luis is researchingSave and ExitNextSubmit HUD received a complaint from Jameel, an Annapolis resident who claimed that his landlord evicted him when she found out he was gay. What will HUD likely do with this complaint Use the following set of data: 78, 78, 83, 85, 89, 91, 95, 98 what is the median for the set of data? (a) 85 (b) 89 (c) 87 (d) 98 please help!!!!!!!!!!!!!1 Your cousin asks you to help her prepare for her computer science exam next week. She gives you two clues about a type of relational database key: No column values may be NULL, and columns must be necessary for uniqueness. Which type of key is she referring to An astronaut is on the moon. He drops a hammer from a height of 3.2metres and it takes 2.0 seconds to reach the lunar landscape. What is the acceleration due to gravity of the moon? A vector of magnitube 5 units is inclined at an angle 37 to the x-axis and another vector of magnitube 10 units is inclined at 53 to the x-axis. What is the magnitude of the sumbof the vector components ( i ) along the x-axis ( ii ) along the y-axis? ( sin 37 = cos 53 = 0.6 / sin 53 = cos 37 = 0.8 ) The graph shows the heights, y (in centimeters), of a plant after a certain number of weeks, x. Donna drew the line of best fit on the graph.A graph titled Plant Height shows Number of Weeks on x axis and Height of Plant in cm on y axis. The scales on both x and y axes are shown from 0 to 5 at increments of 5. The graph shows dots at the ordered pairs 0, 1 and 0.5, 1.5 and 1, 2 and 1.5, 2.5 and 2, 2.8 and 2.5, 3 and 3, 3.4 and 3.5, 3.5 and 4, 4 and 4.5,4.5 and 5, 5. A straight line joins the ordered pairs 0, 1 and 5, 5What would most likely be the approximate height of the plant after 8 weeks? 11.0 centimeters 9.25 centimeters 8.8 centimeters 7.4 centimeters(Please show your work)Thank you! Mohandas gandhi used his philosophy of nonviolent noncooperation in an effort to:.