Answer:
time() or time.time()
Explanation:
The time() method from the time module gives the amount of seconds after epoch, or Jan 1, 1970. Running this in the Python shell would return a number like this:
>>> time.time()
1652747529.0429285
For most operating systems, the time() function returns the number of seconds after January 1, 1970, 0:00 UTC. Thus, the correct option is B,
What is the time() function?In python, the time() function is the function which returns the number of seconds that have been passed since an epoch. It is the point where time actually begins. For the Unix system, the time such as January 1, 1970, 00:00:00 at UTC is an epoch.
The time() method from the time module is used widely to give the amount of seconds which have been passed after the time period of an epoch, or Jan 1, 1970. Running this in the Python shell would return a number like the one listed in the question.
Therefore, the correct option is B.
Learn more about time() function here:
https://brainly.com/question/12174888
#SPJ2
write three questions you have about jow geography shapes economic activies in Australia and the pacific…
Answer:
Are the trades gonna be harder or easier?
How did geography shape conomic activies in Australia and the pacific?
How did the land get seperated?
ps im not good with these kind of stuff dk y u chose me to do it
What is the output?
>>> answer = "five times"
>>> answer[2:7]
The output is The string answer = "five times" All strings start at index 0 and end at the length of the string minus 1.
What is output?Other answer are:
Then count rightly, index 2 is v and index 7 is m answer[2:7] goes from v to m including v but not m, So, answer[2:7] = "ve ti".
Output is said to be the act of making something out of another thing.
Note that the output is The string answer = "five times" All strings start at index 0 and end at the length of the string minus 1. Then count rightly, index 2 is v and index 7 is m answer[2:7] goes from v to m including v but not m, So, answer[2:7] = "ve ti".
Learn more about output from
https://brainly.com/question/1786465
#SPJ1
How many characters can be store on a disk with a capacity of 1.4mb
Answer: If you want an exact number of characters, this one is really peculiar. A 1.44MB diskette can hold 1.44 x 1000 x 1024 characters, which is 1,474,560 characters.
Explanation:
What is a major advantage of medical simulators?
The procedures can be practiced with no risk to a patient.
The games have replaced more time-intensive training in hospitals.
The programs deliver more realistic training than actual surgeries.
The simulators are inexpensive and easy to design.
Answer:
The procedures can be practiced with no risk to a patient.
Explanation:
Which best describes external hardware?
Answer:
Peripherals
Explanation:
devices used to interact with the computer. External hardware devices include monitors, keyboards, mice, printers, and scanners.
a computer virus cannot be distributed by
Answer:
Similarly, in the same way that viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document.
Explanation:
HELP ME PASS!
Type the correct answer in the box. Spell all words correctly.
Nathan is creating a presentation for the employees at his office. Which media element should he use in the navigational buttons and menus in his presentation?
Nathan should use text or BLANK elements for the navigational buttons and menus in his presentation.
Nathan should use text or or Action button elements for the navigational buttons and menus in his presentation.
What is an Action Button?An action button is known to be an object that can be seen on a slide that helps one to be able to clicked or pointed to anything on a presentation.
Note that they are often used in self-running presentations and as such, Nathan should use text or or Action button elements for the navigational buttons and menus in his presentation.
Learn more about presentation from
https://brainly.com/question/24653274
#SPJ1
AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
connecting to unauthorized devices through the network
going onto unauthorized sites or downloading certain content
not sending spam or junk emails to anyone
not using the service to violate any law
reporting any attempt to break into one’s account
AUPs often involves not going onto unauthorized sites or downloading certain content, not using the service to violate any law, and not connecting to unauthorized devices through the network.
What is AUP?AUP stands for Acceptable Use Policy, which refers to a policy that regulates users when they access a corporate newtork.
How does an AUP regulates users?Most AUPs imply:
Users can only access certain sites and dowloading specific content is forbidden.The access to the internet or network cannot be used for criminal purposes.Only authorized users can connect to the corporate network.Learn more about AUP in: https://brainly.com/question/9509517
#SPJ1
Answer:
not sending spam or junk emails to anyone
not using the service to violate any law
reporting any attempt to break into one’s account
Explanation:
Comments are used to create a pseudocode plan.
Which line below is a comment?
print the average
print the average
print the average
print the average
print the average
print the average
print the average
print the average
The pseudocode plan line that is a comment is:
print the averageprint the averageWhat is a pseudocode?Pseudocode is known to be a kind of man made and informal type of language that is used by a lot of programmers to create algorithms.
Note that the Pseudocode is said to "text-based" as in the case above as it is made up of algorithmic design tool. The rules of Pseudocode are known to be straightforward such as print the average.
Learn more about pseudocode from
#SPJ1
what gases are involved in the process of respiration
Answer: (O(2)), nitric oxide (NO), and carbon dioxide (CO(2))
Explanation:
Does anyone knows What does Array.ContainsValue (namelist, "John") do to the program
Answer:
It checks to see if an array contains a value called John inside the container named name list.
2.
Select the correct answer.
Consider the following statements:
Pls "It is hot."
Q is "It is dry."
Ris "I am thirsty."
What does the sentence (P^Q)->R mean?
Ο Α.
If it is hot and dry, then I am thirsty.
B.
If I am thirsty and dry, then it is hot.
C.
If it is dry or hot, then I am thirsty.
OD.
If it is hot then I am dry and thirsty.
The structure argument can be given as, with dry and hot weather, it felt thirsty. Thus, option A is correct.
What is the structure of the argument?The argument is held valid and correct with the use of proper relationships between the sentences. The correct correlation depicts the conclusion to the sentence.
P Q means P followed by Q~R means excluding RP^Q means P and QFrom the given argumentative sentences it can be delivered as If it is dry and hot then I’m thirsty. Thus, option A is correct.
Learn more about structure of argument, here:
https://brainly.com/question/14993040
#SPJ1
CIS261: Python Programming I home
>
6.8: LAB: Miles to track laps
Python Programming Language is known to be a widely used general purpose high level language.
What is Computer Programming?This is known to be the way or method that is used in writing of a set of instructions that helps to inform the computer on what to do.
Note that in CIS261: Object Oriented Computer Programming, the computer program is made up of instructions that are said to be executing only one at a time.
Its basic instruction types is known to composed of input, process, and output.
Learn more about Python Programming from
https://brainly.com/question/26497128
#SPJ1
You wrote a program to allow the user to guess a number. Complete the code. (Coding program: Python) (20 points!)
Answer:
guess=int(guess)
Explanation:
This is to make the input number an integer so you can compare later on
Answer:
guess = int(guess)
Explanation:
This makes the guess input number an integer
ANSWER QUICKLY!!
Kenny is designing a document for the employee motivation campaign at his company. He is using various elements of design and grouping them accordingly. Which principle of design is Kenny following in his document?
Answer: The answer is Proximity.
Explanation:
....................
Answer:
What s this question about?
Explanation:
I will edit my answer but i need to understand what you want me to write about.
Question 3 of 25
What does the number of hertz measure in a CPU?
A. How quickly the data in RAM can be read, changed, and
overwritten
B. How fast a CPU can process data, indicating performance
O c. How many bits are fed into a CPU in a certain amount of time
D. How much data is stored magnetically and is used for long-term
How fast a CPU can process data, indicating performance does the number of hertz measure in a CPU. Hence, option B is correct.
What is process data?Process data is information about a business process that builds up in an XML document during the course of the process, in accordance with configured instructions in the BPML.
a stock trading program that creates a straightforward graph from millions of stock data points. Customers' search histories are used by an online retailer to suggest related products. A digital marketing company develops location-specific ads using demographic information about consumers.
Batch processing, real-time processing, and online processing are the models. Data processing that is done in batches is known as batch processing. This indicates that each item of data is processed separately.
Thus, option B is correct.
For more information about process data, click here:
https://brainly.com/question/30094947
#SPJ2
What was Ada Lovelace's contribution to computer science?
Answer:
She made the first computer.
Explanation:
Augusta Ada King, Countess of Lovelace (née Byron; 10 December 1815 – 27 November 1852) was an English mathematician and writer, chiefly known for her work on Charles Babbage 's proposed mechanical general-purpose computer, the Analytical Engine.
Answer:
She made the first ever computer.
Explanation:
The computer was called the Analytical Engine.
Walter and Layla own neighboring cornfields. Walter harvested 5/8 of an acre of corn on Monday and Layla harvested 3/8 of an acre. How many more acres did Walter harvest than Layla?
Answer:
2/8 or if you have to reduce it, you could do 1/4
Explanation:
Walter = 5/8 on Monday
And
Layla harvested = 3/8
So you just do
5/8 - 3/8 = 2/8
You can check it by doing 2/8 + 3/8 = 5/8
ANSWER QUICKLY!!!
What is an advantage of digital portfolios?
Answer:
transmit
Explanation:
A method for breaking a program down into smaller parts
Answer:
Top Down Design
A method for breaking a program down into smaller parts
Explanation:
Answer:
Top Down Design
A method for breaking a program down into smaller parts
Explanation:
CIS261: Python Programming I home
>
6.8: LAB: Miles to track laps
Python Programming Language is known to help or act as a support language that is used by software developers, to build and other purposes.
What is Computer Programming?This is known to be the way or method that is used in writing of a composition of instructions that helps to inform the computer on what to do.
Note that in CIS261: Object Oriented Computer Programming, the computer program is made up of some set of given instructions that are said to be executing only once in a time.
Conclusively, Its Basic instruction types is known to made up of input, process, and output.
Learn more about Python Programming from
https://brainly.com/question/26497128
#SPJ1
i will pay for this anyone please
PowerPoint
On the first slide, state your name and summarize the first scenario in terms of what you believe the problem to be and how the other person is feeling. Do not just restate what is written above, but interpret it based on your understanding of the situation.
On the second slide, describe in detail what your response will be to help the project manager in the first scenario.
On the third slide, list which employability skills you used to resolve the project manager’s problem. Explain why you believe these employability skills are important to achieving a successful resolution.
On the fourth slide, provide at least two reasons why you believe this particular situation would be difficult to resolve.
Use slides five through eight to repeat the first four steps, but for the second scenario.
On the ninth slide, state your partner’s name and present your partner’s feedback.
Word Document with the Following Sections
Your name
Summary of the Scenarios: Summarize the scenario as you interpret what you believe the problem to be and how the other person is feeling. Do not just restate what is written above, but interpret it based on your understanding of the situation.
Responses to Resolve the Situations: Describe in detail what your response will be to help the project manager.
Employability Skills Used to Resolve the Situations: List which employability skills you used to resolve the project manager’s problem. Explain why you believe these employability skills are important to achieving a successful resolution.
Why This Situation Is Difficult to Resolve: Provide at least two reasons why you believe this situation would be difficult to resolve.
Partner Comments: State your partner’s name. Include your partner’s feedback about your project.
How do the following technologies help you with your quest to become a digital citizen kiosks enterprise computing, natural language processing, robotics and virtual reality
Answer:
How could be an individual become a digital citizens?
Skills such as self-advocacy, conflict resolution, anger management, and decision-making skills, as well as the ability to use assertiveness, resistance, and refusal techniques, are also included and can help students respond safely and effectively online
Explanation:
SAlamat po pa rate nalang
In this area, you want to focus on which hardware, application, personnel, or department(s) will be impacted by the security policy. For instance, what type of personal devices are allowed on the network and when? Must the personnel receive formal approval before using such devices on the network? What kind of activity is allowed on a personal device? Who is responsible for granting the permission to use a device on the network?
The type of personal devices that are allowed on the network are:
1. Laptops
2. Smartphones
3. Tablets
What devices do BYOD have?BYOD is known to be Personal devices such as smartphones that organizations often gives permission for employees that are working from home to be able to have a flexible schedule and others.
Therefore, The type of personal devices that are allowed on the network are, Laptops, Smartphones, tablets.
Learn more about personal device here,
https://brainly.com/question/12253360
#SPJ1
Considering all of the time and effort that is put into creating an online business, it is in a merchant’s best interest to make sure that as many people as possible make it to the merchant’s website. A good way to do this is to ensure search engine optimization. Describe three different steps you can take to ensure search engine optimization, and briefly explain what makes them effective.
Search engine optimization will help increase the number of clicks on the business' website and help to drive the sales by targeting the appropriate audience for buying the products.
What is search engine optimization?Search engine optimization, or SEO, is one of the most important functions of the generation of organic clicks on the website for an online ecommerce business.
It helps in creating a brand awareness, the costs of advertising are much lower, and also helps in improving the experience of the customers of ecommerce site.
Hence, the uses of search engine optimization in online business are as aforementioned.
Learn more about Search Engine Optimization here:
https://brainly.com/question/14850803
#SPJ1
Write a program that reads two numbers from the user, and proceeds as follows: If the input numbers are equal, the program displays: both numbers are the same. Otherwise, the program logs all the integers in the range of the input numbers from the smaller value to the larger value in the console. For example, if the user enters 22 and 16, the program displays: 16 17 18 19 20 21 22. Note that all the numbers are displayed in one line separated by a single space. . If any of the input values are invalid, the program displays an error message and terminates.
import sys
x = input("enter number 1: ") #ask for user input
y = input("enter number 2: ")
output = "" #the output string
try: #try integering them (this also has error message and will check if input is valid)
x = int(x)
except:
print("error! number 1 was not a number :(")
sys.exit() #leave
try:
y = int(y)
except:
print("error! number 2 was not a number :(")
sys.exit()
if x == y: #check they are not the same
print("both numbers are the same")
else: #do the thing
if y > x: #otherwise swap the order
for i in range (x, y + 1): #+1 for inclusive
output = (output + str(i) + " ")
else:
for i in range (y, x + 1):
output = (output + str(i) + " ")
print(output) #so it's all in one line
what are the benefits and drawbacks of a desktop utilising virtualisation and a server?
•Cons of Virtualization. High Initial Investment. Data Can be at Risk. Quick Scalability is a Challenge. Performance Witnesses a Dip.
•Pros of Virtualization. Uses Hardware Efficiently. Available at all Times. Recovery is Easy. Quick and Easy Setup. Cloud Migration is Easier.
Mark as brainlest answer!!!!!c. What are the four basic operations in a computer? Define each of them wit help of block diagram.
Answer:Answer: At a fundamental level, computers operate through these four functions: input, output, processing, and storage.
Explanation: Input is something entered into a machine or other system, the act of entering data or other information, or input can also describe giving one's help, advice or thoughts.
Output is defined as the act of producing something, the amount of something that is produced or the process in which something is delivered.
An example of process is the steps taken by someone to clean a kitchen. An example of process is a collection of action items to be decided on by government committees. noun.
A storage device is any type of computing hardware that is used for storing, porting or extracting data files and objects.
Explanation:
The first generation computers are likely to have been inverted in what period?
A. 1910s
B. 1920s
C. 1930s
D. 1940s
The first generation computers are likely to have been inverted in the period of the 1940s.
What is the era in 1st generation of computer?The era is known to be around 1940-1956. This is said to be the period where the first set of computers were made.
Note that the first generation is one that vacuum tubes as the basic parts for memory and thus The first generation computers are likely to have been inverted in the period of the 1940s.
Learn more about first generation computers from
https://brainly.com/question/14713070
#SPJ1