Answer:
This Python code is an implementation of an anonymous function like a lambda function in other function.
Explanation:
The function 'make_test_dice' with the arguments 4, 6 and 1, returns a lambda function to the test_dice variable.
The test_dice is called with parenthesis to run the lambda function. This implementation is used to hide a parameter in a calculation or process.
What device to use when downloading a large file?
can someone explain to me what coom means? kekw
If it is espanish it is como and it means how.
Answer:
Outside of referring to the image and meme, Coomer, often lowercased as coomer, is used online as a general insult for an overshrexed young man. The term implies such a person is a sleazy loser, obsessed with masturbatling to pronography because he can't find shrexual partners.
Input a double and print the first two digits after the decimal point with a space between them. Sample run: Please input a decimal number: 57.8934 Answer: 8 9 Hint - to complete the second coding activity in lesson 5 you had to learn how to get individual digits from an int value. You can reuse this method once you convert the user input to an appropriate int value (you will need both multiplication and casting for this).
Answer:
number = float(input("Please input a decimal number: "))
number = int (number * 100)
second_digit = number % 10
first_digit = int(number / 10) % 10
print("Answer: " + str(first_digit) + " " + str(second_digit))
Explanation:
Ask the user to enter a decimal number (number = 57.8934)
Multiply it by 100 (number = 5789.34) and typecast to int (number = 5789)
Use the module to get the second digit (9)
Divide the number by 10 (578.9), typecast to int (578) and use module operator to get the first digit (8)
Print the numbers as requested
The code is:
int main(){
double n;
int v, d;
scanf("%lf\n", &n);
n = n*10;
v = (int)n;
d = v%10;
printf("The first digit is %d\n", d);
n = n*10;
v = (int)n;
d = v%10;
printf("The second digit is %d\n", d);
return 0;
}
----------------------
To get each decimal digit, we multiply by 10 until the digit, then calculate the remainder of the operation(mod) of the integer part relative to 10.For example:57.8934 x 10 = 578.934
The integer part is 578.
The remainder of the division of 578 by 10 is 8.
Now, we have to generalize it, thus:
int main(){
double n;
int v, d;
scanf("%lf\n", &n); -> Reads the double;
/*First digit*/
n = n*10; -> Multiplies by 10.
v = (int)n; -> Casts the integer part
d = v%10; 0 -> Remainder relative to 10 to get the first digit.
printf("The first digit is %d\n", d);
/*Second digit -> Does the same thing*/
n = n*10; -> Multiplies by 10.
v = (int)n; -> Casts the integer part
d = v%10; 0 -> Remainder relative to 10 to get the first digit.
printf("The second digit is %d\n", d);
return 0;
}
A similar problem is given at https://brainly.com/question/18340665
You’ve been given a new cell phone with a 2 gigabyte data plan. You plan to use your phone for text messages, images, video, and music. Which of these categories are best compressed using lossless compression? Which of these categories are best compressed using lossy compression? Why?
Answer:
texts and music are best compressed using lossy compression and videos are best compressed using lossless compression
Explanation: texts and music are best compressed using lossy compression because there are not many details to leave out while pictures and videos are best compressed using lossless compression because they need to be in good quality
Lossy compression should be applied to text messages and music while lossless compression should be applied to images and videos
A lossy compression of a file implies that the quality of the file is reduced in order to get the file compressed.
This type of compression can be applied to text messages and music because a reduction in the size and quality will only reduce few details about the text messages and music file.
However, a lossless compression is such that even after the file size is reduced, the quality remains unchanged. This type of compression can be applied to video and pictures because even if the size is reduced, the quality of the files are not expected to change.
Hence;
Lossy compression should be applied to text messages and musicLossless compression should be applied to images and videosRead more about file compressions at:
https://brainly.com/question/13663721
that is Entrepreneur ? ?
Answer:
An entrepreneur is an individual who creates a new business or, an organization. An entrepreneur combines these to manufacture goods or provide services and provides leadership and management for the business. That is entreprenuer.
Hope this helps...!
Explanation:
What is the Internet address of the speech you listed to?
Answer:
To get the address of a website page, check the URL address at the top of the browser window.
Explanation:
The internet is global interconnection of multiple networks. All devices in the network must have a web address to communicate in the network. The IP version 4 and 6 are two concepts of addressing devices on the internet. The DHCP and DNS internet protocols are used to assign address and map addresses to string-like URLs respectively.
One of the simplest and best known polyalphabetic ciphers is _________ cipher. In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.
Answer:
Vigenere
Explanation:
Vigenere Cipher is an encryption method of alphabetic symbols that utilizes an easy form of polyalphabetic exchange which is carried out through Vigenere table.
Hence, in this situation, the correct answer is VIGENERE Cipher because it is the form of cipher whereby the set of related monoalphabetic substitution rules comprises of the 26 Caesar ciphers with shifts of 0 through 25. Each cipher is indicated by a key letter which is the ciphertext letter that substitutes for the plaintext letter.
When following maintenance procedures, it is important to carefully read the procedures and to complete
each step before moving to the next step.
True or
False
The _____ is the size of the opening in the camera that the light passes through.
Shutter
Lens
Aperture
Sensor
Answer:
now you can give them brainlist by clicking on the crown on their answer! :)
Explanation:
Choose all of the items that represent functions of the operating system kernel.
memory management
process management
user interface
system input and output (I/O) management
file creation and management
Answer:
A. memory management
B. process management
D. system input and output (I/O) management
E. file creation and management
Answer:
1,2,4,5
Explanation:
E2020 - Intro to Information Technology
Why is it unlawful for an employer to refuse to employ someone based solely on their gender without evidence that such a characteristic is necessary for successful completion of the job? Answer by writing a paragraph of two to three sentences.
Employing someone based on gender is unlawful because, it is the skill which matters to get the required job done and skills are not based on gender. There is no evidence that this particular gender cannot do this job and this particular gender can do. Everyone who posses the required skillsets are eligible to get employed irrespective of gender.
===============================================
I tried my best
Question #1
What do you use to navigate through a file by moving the view
up and down or side to side?
O Title bar
O Ribbon
O Document area
O Scroll bar
Answer:
Answer is the Scroll Bar
Explanation:
When you are in a document, the way you move around or navigate in it is by dragging the scroll bar that is to the left of your screen or at the bottom of your screen. Hope this helps!
Web pages are accessed through a software program called a _____.A) web crawlerB) web browserC) web serverD) web app drawer
Answer: B) web browser
Explanation: A web browser may be explained as a software program or application available on various operating systems such as windows, Mac, Android, iOS among others. This program acts as an interface between information available on websites or pages and users. This application takes a specified uniform resource locator or web address as input and outputs the information available on a web page. Google Chrome, Internet Explorer, Microsoft edge, opera mini, Safari, Firefox and so on.
Discuss the main characteristics of the database approach and how it differs from traditional file systems.
The database system allows the creation of a single depository of information, which is updated periodically and which can be used simultaneously by many users, since this type of system allows the effective sharing of all data stored in its depository . In addition, this is a secure system and is very difficult to break into. This is because of the efficiency of the software used to maintain it. However, the use of these softwares can be a little complicated for users, in addition to requiring a high economic cost to obtain them.
The traditional file system, in turn, each user must obtain their own file related to the application they want to run. This may seem dull in comparison to the database, but it is advantageous as it does not require any spending on software, as it is simple and there are several cheap and efficient tools and editors on the market. However, this system is not so safe, it can cause isolation of data and even data inconsistency, which disrupts the entire system.
What is the name of a shortcut you can click to access other websites? A. A post B. A key C. HTML D. A link
Answer:
D. A link
Explanation:
I hope this helps.
Answer:
A LINK
Explanation:
I just did the test
The point-of-view of a game is influenced by the player role and game camera. Give an example of a game that uses omniscient player role. Explain what the game camera perspective looks like for that game and how that camera perspective assists in the omniscient immersive experience.
Answer:
REWORD
Explanation:
Having choices within a game gives the player a certain amount of control over the game,and can keep them immersed. When a choice is “meaningful” it is so because what you decide will have different outcomes, one such example being the game(s) Skyrim or Fallout 4. With these games, you are presented a multitude of choices, mainly within dialogue, and depending on how you choose to react, you can gain certain quests,.
The next four octal numbers after 36 is:________.
a. 36, 37, 40, 41
b. 37, 40, 41, 42
d. 36, 37, 38, 39
c. none of the Above
Answer: b. 37, 40, 41, 42
Explanation:
The next four octal numbers after 36 is 37, 40, 41, 42.
The octal numeral system, which is also referred to as "oct" for short, is simply base-8 number system.
It is a number system whereby only digits from 0 to 7 are used and there are no letters or numbers that are above 8 that are used.
In this case, after 36, the next number will be 37 after which we go to 40 as we can't write 38 in the octal system. Therefore, the next four octal numbers after 36 is 37, 40, 41, 42.
which check the functioning of all the connected hardwares including primary and secondary storage devices
Answer: The computer processor
Explanation:
The computer processor is also called the central processing unit and it's function is to analyzes data and also disperses data. It is the computer's brain as it tells the computer the kind of programs to do at a particular time.
The computer processor checks the functioning of all the connected hardwares including primary and secondary storage devices.
Why should we care about information being represented digitally? How does this impact you personally?
information digitally represented shows a level of understanding i.e it eases the stress of complexity. It is more interpretable.
it has a great impact on users personal since use can use and interpret information well as compared to other forms of represention
Reasons why the adoption of digital information representation should be made paramount include ; large storage, accessibility and retrieval among others.
Digital information may be explained to collection of records and data which are stored on computers and other electronic devices which makes use of digital storage components such as memory cards, hard drive and cloud services.
The advantages of digital data representation include :
Large storage space : Digital data representation allows large chunks of information to be kept and stored compared to traditional mode of data storage. Easy accessibility : Digital information representation allows users to access and transfer data and stored information more easily and on the go as it is very easy to access and transfer information seamlessly to other digital devices.Data stored digitally allows for easy manipulation and transformation of data as digital information allows for more orderly representation of information.The personal impact of digital information from an individual perspective is the large expanse of storage it allows and ease of retrieval.
Learn more : https://brainly.com/question/14255662?referrer=searchResults
Which of these is an example of gathering secondary data?
searching for a chart
drafting a map
collecting soil samples
interviewing experts
Answer:
searching for a chart
Explanation:
:)
Answer:a
Explanation:
took the quiz
Hulu suggestions? I just got it and I wanna know what's good :)
Answer:
I love hulu almost everything is good but I recommend Zoey's Extrordinary playlist
Explanation:
What are language standards? At this point in your study of programming, what do they mean to
you?
as future software developer what is the difference between
1. Are we developing the software right?
2. Are developing the right software?
Answer:
Well There are alot of different softwares so thats where "Are developing the right software?" Starts But Sometimes Its easy to mix up! Now, "Are we developing the software right?" Get the code and enter it into google docs, it will show your mistakes. Your welcome.
Verified By Al ✔️
Define the P0 and P1 indicators and explain what they mean?
Answer: The headcount index (P0) is used to measures the proportion of the population which are poor.
The poverty gap index (P1) is used measure the extent to which individuals fall below the poverty line.
Explanation:
The headcount index (P0) like the name suggests is used to measure or know the proportion of a population which are poor, this does not indicate or show us how poor, the poor people in that society are.
The poverty gap index (P1) is used measure the extent to which individuals fall below the poverty line. This is used or compared to a poverty line already created. To know how far below individuals are under the poverty line system.
paragraph on how atms work
What are three ways that you can protect and care for your camera? Why is taking care of your camera important?
Answer in 1-3 sentences.
avoid dirt and sand, touching your camera lense, and any type of liquid. be careful when cleaning dirt and sand off of your camera lense, as not doing so could scratch lense.
When does the VB.NET programming environment start to operate?
A. once a VB.NET project is compiled
B. once a VB.NET project is created in the Microsoft Visual Studio environment
C. once a VB.NET project is debugged
D. once a VB.NET project folder is opened
E. All of the above are correct
Answer:
B. once a VB.NET project is created in the Microsoft Visual Studio environment.
Explanation:
Visual Basic . Net is a programming language which is used to run complex software and projects. The VB projects which are created in Microsoft Visual Studio are run by console application. These computer applications run complex and technical software.
An ISP is considering adding additional redundant connections to its network. Which of the following best describes why the company would choose to do so?
Answer:
Redundant networks are generally more reliable.
Explanation:
The complete question is in this brainly link;
https://brainly.com/question/18302186
This is based on knowing the importance of a redundant network.
C. Redundant networks are more reliable
A redundant network is one that helps to increase the reliability of a computer system. Now, this is possible because the more critical the ISP NETWORK is, the more important it will be for the time it takes to resolve from a fault would be reduced. This implies that, by adding one redundant device to their connection, the time it will take to resolve from a fault would be drastically reduced and this will lead to a far more reliable system.Thus, redundant networks are more reliable.
Read more at; brainly.com/question/17878589
6. Write pseudo code that will perform the following. a) Read in 5 separate numbers. b) Calculate the average of the five numbers. c) Find the smallest (minimum) and largest (maximum) of the five entered numbers. d) Write out the results found from steps b and c with a message describing what they are.
Answer:
Pseudo CODE
a)
n= Input “Enter 5 integer value”
b)
sum=0.0
For loop with i ranging from 0 - 5
Inside loop sum=n[i]+sum
Outside loop avg= sum/5
Print avg
c)
small=n[0] # assume the first number in the list is smallest
large= n[0] # assume the first number in the list is largest
For loop with i ranging from 0 - 5
Inside loop if n[i]<small #if any another number is smaller than small(variable)
Inside if Then small=n[i]
Inside loop if n[i]>large # if any another number is larger than large(variable)
Inside if then large=n[i]
Print small
Print large
d)
print avg
print small
print large
Pseudocodes are used as a prototype of an actual program.
The pseudocode is as follows:
input n1, n2, n3, n4, n5
avg = (n1 + n2 + n3 + n4 + n5)/5
small = n1
large = n1
for i = 2 to 5:
if n1 > ni then:
small = ni
if n1 < ni: then:
large = ni
print("Average:", avg)
print("Smallest:", small)
print("Largest:", large)
The pseudocode starts by getting inputs for the 5 valuesNext, the average of the 5 values is calculatedThe fourth line iterates through the numbersWithin the iteration, there are 2 conditional statements that calculate the smallest and the largest valuesThe last three lines print the average, the smallest and the largest inputRead more about pseudocodes at:
https://brainly.com/question/24735155
How many pins are in the power supply connector that is typically used on most motherboards today?
Answer: 4 pins
Explanation: