Answer:
rhymeWord
Explanation:
correct answer edge 2020
# the main part of your program that calls the function poem() userWord and rhymeWord. Hence, option C is correct.
What is rhymeWord?Rhyming words all have the same last consonant. Simply put, it is the repetition of similar sounds. When two words have similar sounds, usually those that follow the final stressed syllable of each word, the words are said to rhyme. Cat-hat, rotten-forgotten, and heard-bird are some examples of words that rhyme; they all have similar sounds after the final stressed syllable.
If the last sounds of two or more words are the same or similar, then the words will rhyme. Some words that rhyme are goat, boat, moat, float, and coat. To determine whether two words rhyme, use your ears to listen while you speak the words. If two words have a similar or matching sound, they rhyme.
Thus, option C is correct.
For more information about rhymeWord, click here:
https://brainly.com/question/2398244
#SPJ2
Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The first digit identifies the product category, the nextfive digits identify the manufacturer, the following five identify the particular product, andthe last digit is acheck digit. The check digit is determined in the following way:
• Beginning with the first digit multiply every second digit by 3.
• Sum all the multiplied digits and the rest of the digits except the last digit.
• If the (10 - sum % 10) is equal to the last digit, then the product code is valid.
• Otherwise it is not a valid UPC.The expression is:sum= 3.x1+x2+ 3.x3+x4+ 3.x5+x6+ 3.x7+x8+ 3.x9+x10+ 3.x11where the x’s are the first 11 digits of the code.
If you choose to add the last digit also in the second step and if the sum is a multiple of 10,then the UPC is valid. Either way, you still need to perform the modular division to checkwhether the given number is a valid code.In this problem, you need to use either a string or long long integer type for the product codebecause it is 12 digits long. If you use string, you can convert one character substring of thestring in to a single digit integer from left to right using the function stoi(str.substr(i,1)).This way you do not need to get last digit of the number and then divide the number by 10.
in c++
problem 3
Translate the following pseudocode for randomly permuting the characters in a string into a C++ program. Read a word. repeat word.length() times Pick a random position i in the word, but not the last position. Pick a random position j > i in the word. swap the letters at positions j and i. Print the word. Please work on this problem after we learn to generate random numbers in the class which is on Wednesday the latest. These problems only deal with simple loop while, for and do loops. You will get a second set of problems next week on nested loops.
Answer:
#include <iostream>
#include <cmath>
using namespace std;
int main(){
string upc;
char last;
cout<< "Enter UPC number: ";
cin >> upc;
if (upc.size() == 12){
last = upc[-1];
} else{
return 0;
}
cout<< last;
char myArr[upc.length()];
for (int i = 0 ; i < upc.substr(0,11).length(); ++i){
if (upc[i]%2 != 0){
myArr[i] = upc[i] * 3;
}
else{
myArr[i] = upc[i];
}
}
int sum = 0;
for (int x = 0; x < sizeof(myArr); ++x){
sum += (int)myArr[x] - '0';
}
if (sum% 10 == last){
cout<<"UPC number is valid";
}
else{
cout<<"Invalid UPC number.";
}
}
Explanation:
The UPC number in the c++ source code input must be 12 digits long for the rest of the code to execute. The code checks the validity of the number by comparing the reminder of the sum division with the last digit in the UPC number.
Python rephactor
1. Write code that swaps the first and last elements in a list called my_list. Assume that the list has already been created and contains at least one element.
2.Write code that creates a Python set containing each unique character in a string named my_string. For example, if the string is 'hello', the set would be {'h', 'e', 'l', 'o'} (in any order). Assign the set to a variable named my_set. Assume that my_string has already been initialized.
1.
my_list = ([1,2,3,4,5])
h = my_list[-1]
my_list[-1] = my_list[0]
my_list[0] = h
print(my_list)
2.
my_string = "hello"
my_set = set(my_string)
print(my_set)
The list has already been created and contains one element. The python set of my string has been already initiated.
What is python set?Python set is defined as a data type for unordered collections that is iterable, changeable, and lacks duplication of elements. There are essentially two sorts of sets in Python. the frozenset and the set. Whether the frozenset is changeable or not depends on the set type. On a set, we can use add(), remove(), and other operations of this nature; however, frozenset does not support these actions.
The program is
your list = ([1,2,3,4,5])
my list[-1] = h
MyList[-1] equals MyList[0]
h print(my list, "my list");
"hello" is my string
set(my string) my set
print(my set)
Thus, the list has already been created and contains one element. The python set of my string has been already initiated.
To learn more about python set, refer to the link below:
https://brainly.com/question/14936500
#SPJ5
How can we tell the computer what to put on the web page, and how to organize it?
Answer:
[tex]\boxed {\boxed {\sf Code}}[/tex]
Explanation:
Humans communicate with computers through code.
For web pages, HTML (HyperText Markup Language) is used.
A person writes the code to tell a computer what to display and how to structure the displayed information. You can create webpages with any information, add pictures, links, headings, paragraphs, change fonts, and more, all through the use of code.
The task of handling how active processes are making efficient use of the CPU processing cycles is called_______?
Answer:
Scheduling.
Explanation:
A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.
Hence, the task of handling how active processes are making efficient use of the central processing unit (CPU) processing cycles is called scheduling.
In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.
Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).
What is the main advantage of using a WYSIWYG("what you see is what you get")editor when constructing a website
A.only one programming language is required
B.websites may have more professional construction
C.knowledge of HTML is not required
D.Website templates are not necessary
Answer:
c
12121212121212121212121212121221212121212121212
Which of the following are reasons why it is important to write readable code?
Choose all that apply.
Readable code is easier to maintain.
Readable code is easier to modify.
Readable code is fun to write.
Writing readable code saves time in the long run.
Answer:
Readable code is easier to maintain.
Writing readable code saves time in the long run.
Readable code is easier to modify.
Readable code is fun to write.
Explanation:
Readability of a code means that how easy it is to read the code even if any person other than programmer reads the code. Different techniques like line breaks and indentation are used to make the code readable. the program follows an indentation pattern so it is easy and fun to write.
Hence,
it can be concluded that the true statements are:
Readable code is easier to maintain.
Writing readable code saves time in the long run.
Readable code is easier to modify.
Readable code is fun to write.
Answer:
for short answer it is a,b and D
Explanation:
Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address is 0x000C, If the branch is taken, what will be the new Program Counter (PC) value?
a. 0x00001844
b. 0x00001850
c. 0x00001870
d. 0x00001874
Answer:
a. 0x00001844
Explanation:
When the branch is takes the new program counter value is increased by 1. The value of existing memory is labelled with number sets and then next instruction is accepted in sequence. The new value is the increase in the current labelled value.
What is the primary purpose of a slideshow presentation
Answer:
to help us to complete all of useless project given by school
Answer:
support the presenter's ideas
Explanation:
Clyde Clerk is reviewing his firm’s expense reimbursement policies with the new salesperson, Trav Farr. "Our reimbursement policies depend on the situation. You see, first we determine if it is a local trip. If it is, we only pay mileage of 18.5 cents a mile. If the trip was a one-day trip, we pay mileage and then check the times of departure and return. To be reimbursed for breakfast, you must leave by 7:00 a.m., lunch by 11:00 a.m., and have dinner by 5:00 p.m. To receive reimbursement for breakfast, you must return later than 10:00 a.m., lunch later than 2:00 p.m., and have dinner by 7:00 p.m. On a trip lasting more than one day, we allow hotel, taxi, and airfare, as well as meal allowances. The same times apply for meal expenses." Write structured English for Clyde’s narrative of the reimbursement policies. Draw a decision tree.
Answer:
The answer is described in the image.
Explanation:
The firm is responsible for all expenses made by it's employees, so for a local trip, the cost of gas relative to the mileage covered during the journey is paid for ( 18 cents per mileage).
If it is not a local trip, then it is a one-day trip, so the firm pays for the mileage and the cost of the meals not taken in the company, which depends on the departure and return/arrival time. If the departure and return time is 7am to 10am, the employee is paid for breakfast, if the departure and return is 11am to 2pm then the employee is paid for lunch, and for dinner, 5pm to 7pm.
What are some areas in Computer Science that make use of multivariate statistical testing or MCM methods? Explain why they are used.
Explanation:
Computational modeling is one of the areas of Computer Science that uses mathematical systems to perform multivariate statistical tests to solve highly complex problems in multidisciplinary areas, such as medicine, engineering, science, etc.
An example of the use of multivariate statistical tests is social development research in social science, which uses multiple variables to find more hypotheses and greater coverage between variables.
Multivariate statistical tests have the benefit of making research more effective and providing a more systematic and real view of the study.
A Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with one of the nation’s largest
A)retail sellers of computers and related accessories.
B)in-store computer repair and service companies.
C)developers of computer operating systems.
D)makers of computer networking equipment.
Answer:
C
Explanation:
This job will have the largest amount of 1. computer programmers, 2. like-minded coworkers, and 3. a large number of like-minded coworkers.
Please give Brainliest if accurate!
The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.
What is the term like-minded?The Definition of the term like-minded is known to be when two or more people like or have the same purpose, habit or thought.
Therefore we can say that The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.
Learn more about Programmer from
https://brainly.com/question/23275071
#SPJ2
Why would a programmer use a flow chart? (Edge2020 Coding Critical Thinking Questions)
Answer:
As a visual representation of data flow, flowcharts are useful in writing a program or algorithm and explaining it to others or collaborating with them on it. You can use a flowchart to spell out the logic behind a program before ever starting to code the automated process.
Explanation:
Answer: I answered yo can give the other guy brainliest yw
Explanation:
What is the purpose of the Microsoft® PowerPoint® application? to design publications such as newsletters and brochures to create documents such as business letters and resumés to develop presentations for business meetings to design a company employee database
Answer:
The first one
Explanation:
The main purpose of MS PowerPoint is to enable the user to create dynamic, informational slides through the use of text, graphics, and animation.
The purpose of PowerPoint is to act as a visual aid as a presenter goes along presenting their option, ideas, sales pitch, etc. Make sure to not make your slides too wordy and concentrate on adding only basic bullet points.
Answer:
to develop presentations for business meetings
Explanation:
Any of the other options will be used in Word, Excel and Publisher.
But Power Point is mainly for presentations and not newsletters and other.
ASAP PLZ!!!. Which command group is used to apply effects and modify color schemes of SmartArt graphics?
Reset Graphics
SmartArt Styles
Graphic Layouts
Create Graphics
NVM!! The answer is B. SmartArt Styles
Answer:
I think I am wrong but I assume it is C. Graphic Layout Sorry if I am wrong but if I am not please reward me brainlist.
in the middle of the iteration, how should a team handle requirement changes from the customer
Answer:
Team may take up the changes in flight after discussing the overall impact with the Product owner
Explanation:
In the middle of the iteration, one of the best ways a team should handle requirement changes from the customer is to take up the changes in flight after discussing the overall impact with the Product owner.
This will make the customer well aware of the advantages and disadvantages that come with changes in the requirement, such that, the customer will be surprised about the final outcome of the iteration.
Return-from-trap instruction returns into the calling user program while simultaneously reducing the privilege level back to ________ Select one: a. User mode b. Kernel mode c. OS mode d. CPU mode
Answer:
A. user mode
Explanation:
A computer system is a machine that is run by a series of programs that connect the virtual parts (software) to the hardware or electronic parts. The kernel is a computer program that connects the software and hardware of a computer system.
The kernel-mode has several privileges like I/O, interrupts and traps, etc. This mode is tapped by root or administrators to utilize these privileges. Unlike the kernel mode, the user-mode does not have these functions, so a return from the trap instruction (kernel) reduces the privileges back to the user mode.
When was the information last updated
PLEASE HELPP
Why do you think it is important to write your high school plan in middle school? Explain your answer in 3-4 well written sentences.
Answer:
Es muy importante que escriba su plan para la escuela secundaria antes de llegar a la escuela secundaria. Te da algo a lo que admirar cuando llegas a la escuela secundaria. Cuando lo complete, sabrá que hizo algo bien. Entonces puede establecer sus metas cada vez más altas, dándole la oportunidad de una buena vida.
What feature allows you to access previous copies of a document on OneDrive?
File storage
Recover file
Stored work
Version history
Version history feature
OneDrive's Version history feature allows you to view older versions of an Office Online document. If you find a version you want, you can then restore it, moving it to the top of the list as the latest version of the file.
Answer:
Version history
Explanation:
4.8 code practice question 2 edhesive
Answer:
for y in range(88, 43, -4):
print(y, end=" ")
Explanation:
yw
The code practice is an illustration of loops;
Loops are program statements that are used to perform iterative operations
The complete program in PythonThe program in Python, where comments are used to explain each action is as follows:
#This iterates from 88 to 42, with a difference of -4
for i in range(88, 43, -4):
#This prints the numbers on a single line
print(i, end=" ")
Read more about loops at:
https://brainly.com/question/24833629
#SPJ2
A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?
Answer: Nothing should be done.
Explanation:
Group Policy helps in the provision of a centralized management of operating systems, and applications. It should be noted that a group policy object (GPO) is simply referred to as the configurations involving the group policy.
Nothing should be done to manage the GPO created. When the permission to create a GPO has been given to someone, it means that they can also manage the GPO therefore, nothing needs to be done anymore.
Question #2 Dropdown What are the missing words in the program? divide(numA, numB): numA / numb
Answer:
def
return
Explanation:
I hope this helps!
When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the variablec) the length of the variabled) a copy of the variablee) the binary memory address
Answer:
The answer is "Option d".
Explanation:
In this question the choice d, that is "a copy of the variable" is correct because the method takes a reference value or a copy of the variable in its parameter, the example of this question can be defined as follows:
void me2(double x)//defining a method me2 with a double parameter
{
//method body
}
double x = 35.655;//defining a double variable x
me2(x);//calling a method with passing the copy of th e variable
Consider a distributed denial of service (DDOS) attack, Assume the attacker has compromised a number of broadband connected computers to use as zombie systems. If the ISP provides a maximum uplink data rate of 512 Kbps in ADSL, what is the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second? How many such zombie systems would the attacker need to flood a target server in an organization that has
a. A Fast Ethernet.
b. A Gigabit Ethernet.
Answer:
A ) 200 Zombie systems
B ) 200 Zombie systems
Explanation:
maximum uplink data rate : 512 kbps = 512 * 1000 * 8 = 4096000 bits/sec
Determine the number of 512 byte ICMP echo packets = 512 * 8 = 4096 bits
hence the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second = 400 packets/sec
i.e. for 512kbps = 400 packets/sec
Determine the number of Zombie systems that the attacker will need to flood a target server
A) For a fast ethernet
A fast ethernet = 100 mbps
The number of Zombie systems needed = 1 zombie system * 200
and 1 zombie system = 512 kbps
therefore for a Fast ethernet the number of zombies systems needed = 200
B) For A Gigabit Ethernet
same as a fast ethernet system i.e. = 200
One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?
Explanation:
Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:
Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.What are the three categories of managerial decisions?
Top 3 levels of management
Strategic Production Planning
Technology decision
Capacity decisions
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.
Answer:
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.
Explanation:
thats all you said
In python 3.8:
def pyramid_volume(base_length, base_width, pyramid_height):
return round((base_length*base_width*pyramid_height)/3,2)
print(pyramid_volume(1,1,2))
I used the round function to round the volume to 2 decimal places. You can change this if you need more or less precision. I hope this helps!
Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse
Answer:
TrueExplanation:
Minoritys have always faced prejudice
how to create diagram that demonstrates the step
by step procedures in performing a mail merge.
Answer:
hope it helps
1-Creating a Main Document and the Template.
2-Creating a Data Source.
3-Defining the Merge Fields in the main document.
4-Merging the Data with the main document.
5-Saving/Exporting
We wish to produce a graphic that is pleasing and easily readable. Suppose we
make the background color pink. What color text font should we use to make
the text most readable? Justify your answer.Assume that the color Pink is obtained by mixing equal amounts of Red and White. Use the RGB color model and assume that the amount of each primary color in the model is described in the interval [0 255]. Describe the color of the text font you would choose using these conventions.
Answer:
light color
Explanation:
When we will mix equal amounts or equal quantities of the color red and the color white, we will get the color reddish pink. It is popularly called as the SOFT RED and the color code of this color is RGB (255, 128, 128).
Since, red color + white color = 0.5 RGB(255, 0, 0) + 0.5RGB(255, 255, 255)
= RGB (255, 128, 128)
According to me, the color white will best suit as the text color that can be used for a background having RGB(255, 128, 128). Because the color looks more red and not that pink, so it wise to use a light tone color for the natural reading purpose. Hence, it will not give strain to the eyes.