write a function that takes a number as its argument and * returns a string that represents that number's simplified fraction.

Answers

Answer 1

Following is the  program:

const hcf = function(num1, num2) {

 return !num2 ? a : hcf(num1, num1% mum2);

}

const toFraction = function(number) {

 const numberToArray = number.toString().split('');

 let denominator, numerator;

 if (numberToArray.length === 1) {

   denominator = 1;

   numerator = Number(numberToArray[0]);

 } else {

   // delete demical point //

   numberToArray.splice(numberToArray.indexOf('.'), 1);

   denominator = Math.pow(10, (numberToArray.length - 1));

   numerator = Number(numberToArray.join(''));

 }

 const fractionHCF = gcd(denominator, numerator);

 const result = (numerator / fractionGcd) + '/' + (denominator / fractionGcd);

 return result;

};

console.log(toFraction(3.0))

console.log(toFraction(2.5))

console.log(toFraction(3.0))

console.log(toFraction(2.14)) /* 107/50 */

console.log(toFraction(5.6505)) /* 11301/2000 */

console.log(toFraction(25.0504)) /* 31313/12500 */

Hence to conclude above is the required program for a function that takes a number as its argument and returns a string that represents that number's simplified fraction.

To know more on functions follow this link

https://brainly.com/question/25638609

#SPJ4


Related Questions

limitation of the 8-bit extended ASCII character set is that it can only represent up to 128 explain how can these limitations can be overcome?

Answers

use more bits to allow for more characters for example unicode uses i think up to 32 bit

What is logistics?
The commercial activity of transporting

Answers

Answer:

ctycricyyitc57ou5ir57ir56ir75ie65ie56ie65ie65ur65r65ie65urytie

are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

Answers

Viruses are programs that migrate through networks and operating systems and attach themselves to many other programs and databases.

Computer viruses refer to a type of malware that attaches to another program - like a document -which can replicate and spread after a user first runs or open it on their system. For instance, you may receive an email with an attachment containing virus, open the file unknowingly, and results in the migration of a computer virus on your computer.

Computer viruses are self-copying threats to databases, software, and other programs. It means that if a file damaged by a virus is executed, the virus replicates itself by modifying other computer programs and inserting its own program.

You can learn more about computer viruses at

https://brainly.com/question/26128220

#SPJ4

what is the system that connects application repositories, systems, and it environments in a way that allows access and exchange of data over a network by multiple devices and locations called?

Answers

The system that connects application repositories, systems, and it environments in a way that allows access and exchange of data over a network by multiple devices and locations is called Cloud integration.

What is cloud data integration?

Into the cloud Data integration involves consolidating disparate data from multiple systems where at least one endpoint is a cloud source.

In a simplified way, we can say that the cloud storage system works via the internet: you send data from your device to remote servers and, in this way, free up internal memory space on your machine and can access your files at any time and from any place.

See more about Cloud integration at brainly.com/question/24918185

#SPJ1

sum of digits in a string: write a program sumofdigits.cpp that asks the user to enter a series of single

Answers

Iterate through the string by using a generator expression. If a character is a digit, transform it into an integer on each iteration. To determine the total number of digits, use the sum() function.

By adding a number's digits without regard for place values, we can find the sum of its digits. Therefore, if we have the number 567, for instance, we may calculate the digit sum as 5 + 6 + 7 to get 18, which is what we get. Use the replace() method to replace any non-digit characters with an empty string, then access the length property of the result to determine how many digits are present in the string. A new string that has the matches replaced is the result of the replace method.

#include iostream> using the std namespace;

Enter the following number:

int main()

int n,sum=0,

m; cout "Enter a number: "; cin>>n; while(n>0) m=n%10;

sum=sum+m; n=n/10;

sum is equal to "sum" endl; return 0;

Learn more about string here-

https://brainly.com/question/27832355

#SPJ4

alice recently purchased a new cell phone. after her vacation, she decides to transfer her holiday photos to her computer, where she can do some touchup work before sending the pictures to her children. when alice attaches her phone to her computer, she sees that windows detected her phone and tried to load the applicable software to give her access to her phone. unfortunately, after trying for several minutes, windows displays a message indicating that the attempt was unsuccessful. when alice explores her available drives, her phone is not listed. which of the following would be the best administrative tool to help alice gain access to her phone?

Answers

Device Manager would be the best administrative tool to help Alice to gain access to her phone. Thus, option A 'Device Manager' is the correct answer.

Device Manager provides you with a graphical view of the installed hardware on your computer. Device Manager is an administrative tool  used to control, monitor, manage and install hardware devices and their drivers.

The scenario states that Alice is unable to connect her mobile phone to her computer after trying multiple times. When she plugged in her phone Windows found the new device and automatically tried to load a device driver that would give her access to her phone and pictures. In order to handle such a situation, Alice should open the 'Device Manager' administrative tool, from where she would install the applicable driver.

"

Missing part of the question is as follows:

A. Device Manager

B. Network Driver

C. Component Services

D. Computer Management

"

You can leran more about Device Manager at

https://brainly.com/question/11599959

#SPJ4

In a counter-controlled while loop, the loop control variable must be initialized before the loop.

a. True
b. False

Answers

The option 'a' is correct. It is true in a counter-controlled while loop, the loop control variable must be initialised before the loop.

An action is repeated a certain number of times in a while loop. Before the loop begins, a counter variable is created and initialised with a value. Whether the counter has reached a specific value is the condition that is checked before each iteration of the loop.

A language's provision of a looping construct enables a set of statements to be run repeatedly.

Uncontrolled loops (those that do not terminate) and controlled loops (those that do) are the two main types of loops.

One or more repetition conditions are present in a controlled loop, which eventually forces the looping construct to end. A test for logical expressions is contained within a controlled loop. The looping construct must include this "test" for exit in the proper location. The two types of controlled loops are count-controlled and event-controlled.

Count-controlled loops employ a counter (also known as a loop index) that counts particular items or values and causes the loop to come to an end after a predetermined number of increments or decrements.

To learn more about the while loop click here:

brainly.com/question/14390367

#SPJ4

An administrator is planning to use data loader to mass import new records to a custom object from a new api. What will the administrator need to do to use the data loader?.

Answers

The administrator would have to: D. change their security token and password in order to use this Data Loader.

What is an API?

The term "API" stands for "application programming interface," and it refers to a software computing interface made up of tools, a collection of executable programs, and protocols that enable data exchange (both import and export) as well as proper operation of software applications and computers.

In this scenario, the administrator would need to reset his or her password and their security token, so as to use this Data Loader in mass importing new records.

Data Loader has two different applications:

User interface: Define field mappings that correspond field names in your import file to field names in Salesforce, specify configuration parameters, and CSV files for import and export.You can specify the configuration, data sources, mappings, and actions in files using the command line (Windows only). You can configure Data Loader for automated processing using the command line.

The following are some of Data Loader's main features:

An interactive wizard interface that is simple to utilizeAn alternative command-line interface for batch tasks that are automated (Windows only)Up to 5 million records in huge files are supported.field mapping with drag and dropAll objects, including bespoke objects, are supported.can be used to process data from Database.com and Salesforce.files with thorough success and error logs.

Learn more about Data Loader click here:

https://brainly.com/question/15094949

#SPJ4

hen read numbers from the keyboard. ex: if the input is: 102 99 103 88 109 sample output is: sum extra: 14 steps: assign sum extra with the total extra credit received given list test grades. full credit is 100, so anything over 100 is extra credit. for the given program, sum extra is 14 because 2 0 3 0 9 is 14.

Answers

Python program that evaluates conditionals, and based on these conditionals assign extra credit to an accumulator variable.

Python program

if __name__ == '__main__':

# Define and Initialize variables

credit = int()

full_credit = int()

sum_extra = int()

full_credit = 100

sum_extra = 0

for j in range(1,6):

 print("Enter credit ",j, end=": ")

 credit = int(input())

# Assign sum extra to the total extra credit when credit be major one hundred

 if credit>full_credit:

  credit = credit-full_credit

  sum_extra = sum_extra+credit

# Displaying results

print("Total extra credit: ",sum_extra)

To learn more about Python program see: https://brainly.com/question/26497128

#SPJ4

which of the following is true of the way many large digital media vendors are using digital rights management technology? (select two.)

Answers

Vendors are using digital rights management technology to:

To protect the intellectual property of the vendor.To control how the customer uses the digital media.

Digital Rights Management for Large Digital Media Vendors

From what I can tell, many large digital media vendors are using digital rights management technology in order to protect their intellectual property and to control how the customer uses the digital media.

Additionally, the vendor may use DRM to prevent the customer from sharing the digital media or making unauthorized copies of the digital media.

Learn more about Digital Media at: https://brainly.com/question/25141949

#SPJ4

Consider the following code segment. Int a = 10; int b = 5 * 2; System. Out. Print(a == b); What is printed as a result of executing the code segment?

Answers

The code Int a = 10; int b = 5 * 2; System Out. Print(a == b) The printed result will be a= b i.e. in = out.

What is code?

Code is defined as a phrase used to describe text that a computer programmer has created utilizing the rules of a specific language. Computers can obey a set of instructions created through coding. Programmers can create programs, including websites and apps, by coding.

The piece of a program in an object file or in that contains executable instructions is referred to as a text segment, sometimes known as a code segment or simply as text.

Thus, the code Int a = 10; int b = 5 * 2; System Out. Print(a == b) The printed result will be a= b i.e. in = out.

To learn more about code, refer to the link below:

https://brainly.com/question/497311

#SPJ1

When using 2023 armada’s wireless charging pad, what color will the indicator light stay if it is actively charging a device?.

Answers

When the charging begin using 2023 armada's wireless charging pad, the color of indicator light will illuminate orange.

To charge your phone using armada's wireless charging pad, you need to put your phone horizontally on the center of the charging pad. Then, with the ignition in the on position, charging will begin automatically. The indicator light will illuminate orange, meaning the charging process is ongoing, and the indicator light will turn into green when your phone is charged.

If a malfunction occurs, the indicator light will blink orange for 8 seconds and then turn off.

Learn more about wireless charging pad here:

https://brainly.com/question/20382372

#SPJ4

write a statement that passes the value 4 to this function and assigns its return value to the variable result.

Answers

64, is the statement that passes the value 4 to this function and assigns its return value to the variable result.

What is statement?

The term statement was the based on the line are the perfectly in the arranged. The statement was the correct on the said by the famous in the personality. The statement was the line in the correct manner. There was the statement on the give to the situations.

According to the statement are the based on the def cube (num). The equation was the return num * num * num. The mathematical terms was the  cube(4).  (4 × 4 × 4 = 64) It was the variable in the result of the fraction.

As a result, the 64, is the statement that passes the value 4 to this function and assigns its return value to the variable result.

Learn more about on statement, here;

https://brainly.com/question/2285414

#SPJ1

Your question is incomplete, but most probably the full question was.

A program contains the following function definition: def cube(num): return num * num * num Write a statement that passes the value 4 to this function and assigns its return value to the variable result.

a database administrator is considering adding a primary key to enforce unique rows, defining a format for a phone number, and adding a rule so that a user must enter a date prior to today. what is the administrator adding to the database?

Answers

a database administrator is considering adding a primary key to enforce unique rows, defining a format for a phone number, and adding a rule so that a user must enter a date prior to today. The administrator is adding a constraint to the database.

What is the work of a database administrator?

The information technician tasked with overseeing and carrying out all tasks necessary to successfully maintain a database system is known as a database administrator (DBA). A DBA ensures that the databases and related applications of a business run effectively and functionally.

In a variety of public and private sector organizations, a database administrator is in charge of using, maintaining, and growing computerized databases in a precise and secure manner. A database administrator may be employed by any company that maintains huge volumes of data and information.

To learn more about a database administrator, use the link given
https://brainly.com/question/24223730
#SPJ4

a coworker asks you for help with his computer. he explains that his monitor suddenly went black while he was typing on the keyboard. what should be your first step to resolve the problem?

Answers

If you experience a blank or black screen on your Windows computer, try the following:

Use one of the following keyboard shortcuts to wake the screen: Ctrl + Alt + Del or Windows logo key + PFor a black screen, use this keyboard shortcut: Windows logo key + Ctrl + Shift + B.Else Restart the computerLastly, check the loose connection of the monitor power cable.

What is a Monitor?

A monitor, also known as a video display terminal (VDT) or a video display unit, is an electronic output device (VDU). It is used to display images, text, video, and graphics data generated by a connected computer via the video card of the computer. Although it looks like a TV, its resolution is much higher. On March 1, 1973, the first computer monitor was introduced as part of the Xerox Alto computer system.

To learn more about computer monitor, visit: https://brainly.com/question/1590202

#SPJ1

Please complete the following program according to the specification given. Partial credit will be given for incomplete answers, so provide as much of the answer as you can. Remember that all program segments are to be written in JAVA.

1.Write a method split() which takes an argument String s and prints each character of s with a comma(“,”) in between each character.


Example

split(“1234”) prints: “1,2,3,4”

split(“Hi, Mr. Programmer!”) prints “H,i,,, , M,r,., P,r,o,g,r,a,m,m,e,r,!”

split(“”) prints “”


static public void split(String s) {

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that write a method split() which takes an argument String s and prints each character of s with a comma(“,”) in between each character.

Writting the code:

import java.io.*;

public class Test

{

   public static void main(String args[])

   {

       String Str = new String("Geeks-for-Geeks");

       // Split above string in at-most two strings

       for (String val: Str.split("-", 2))

           System.out.println(val);

       System.out.println("");

 

       // Splits Str into all possible tokens

       for (String val: Str.split("-"))

           System.out.println(val);

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

what separates the control plane from the data plane to virtualize a physical network? software-defined visibility software-defined network hypervisor virtual lan

Answers

sdn design separates the control plane from the data plane to virtualize a physical network

What is sdn design?

The high-bandwidth, dynamic nature of today's applications makes Software-Defined Networking (SDN) a perfect fit. SDN is an emerging architecture that is dynamic, manageable, cost-effective, and adaptable. The network control can be directly programmed thanks to this architecture's decoupling of the forwarding and network control functions.

USES OF SDN:

business networks' changing forces. Enterprise companies are aware that their operations depend on reliable data networks.Orienting new users.status-checking the device.Finding suspicious traffic.Analyzing logs.

Hence we can conclude that sdn has several uses and it separates the control plane with data plan

To know more on sdn follow this link

https://brainly.com/question/28992430

#SPJ4

write a function that returns the longest common substring between two given strings . each string is of maximum length 100. consider using existing string methods like substr and find . note that find returns a large positive number instead of -1

Answers

Function that returns the longest common substring, between two given strings:

function longestCommonSubstring(str1, str2) {

 var longest = "";

 var current = "";

 for (var i = 0; i < str1.length; i++) {

   for (var j = 0; j < str2.length; j++) {

     if (str1.charAt(i) === str2.charAt(j)) {

       current += str1.charAt(i);

       if (current.length > longest.length) {

         longest = current;

       }

     } else {

       current = "";

     }

   }

 }

 return longest;

}

Code Explanation:

We initialize two variables longest and current to empty strings.We iterate over the first string str1 using a for loop.For every character in str1, we iterate over the second string str2.If the characters at the current indices of both the strings match, we append the character to the current string and compare its length with the longest string. If it is greater, we update the longest string.If the characters do not match, we reset the current string to an empty string.

Learn more about programming:

https://brainly.com/question/14277907

#SPJ4

a database management system has an overall availability of 98.94%. how many minutes of downtime can be expected in a typical week (7 days), assuming uniform distribution of failures? enter the number in minutes, rounded to the nearest whole number.

Answers

Essentially, a database management system (or DBMS) is just a computerized data-keeping system.

What is management?

In order to achieve desired goals and objectives, a person or group of people must be challenged and managed, according to the concept of management. Furthermore, the capacity to organize, supervise, and guide people is a component of management.

When the data structure—not the data values—of the data required for an application is largely unchanging, mainframe sites frequently utilize a hierarchical architecture. For instance, the structure of a Bill of Material (BOM) database always includes a top-level assembly part number as well as numerous tiers of components and subcomponents. The structure typically includes data on pricing, cost, and component forecasts, among other things.

Therefore, Thus, option (C) is correct.

Learn more about the management here:

brainly.com/question/29023210

#SPJ1

many countries restrict the use or exportation of cryptographic systems. what is the reason given when these types of restrictions are put into place?

Answers

Although the U.S. government has significantly decreased its prohibitions on the export of cryptography, some still exist. Any nation that the United States has designated as aiding terrorism is prohibited from purchasing products that use encryption. The worry is that the government won't be able to crack the encryption used by the country's enemies to hide their communications and track their data transfers.

What is Encryption?

The process of converting information into a secret code that conceals its true meaning is known as encryption. Cryptography is the study of information encryption and decryption. In the world of computers, ciphertext refers to encrypted data and plaintext to unencrypted data.

The science and art of changing signals to make them secure and impervious to attackers is known as cryptography. It is a technique for keeping and sending data in a specific format that only the intended audience can read and process. Cryptography can be used for user authentication in addition to safeguarding data against theft and modification.

Learn more about Cryptography click here:

https://brainly.com/question/88001

#SPJ4

What is the scope of password policy?

Answers

The scope of the password policy is to set a guideline for creating secure passwords to protect their networks, and changing them frequently.

What is cybersecurity?

Cybersecurity is the practice of assuring the confidentiality, integrity, and availability of information as well as the art of preventing unauthorized access to networks, devices, and data.

Information technology security, sometimes known as computer security, is the safeguarding of computer systems and networks against information leakage, theft, or damage to their hardware, software, or electronic data, as well as from disruption or misdirection of the networks service they offer.

To learn more about Cybersecurity, use the given link
https://brainly.com/question/28004913
#SPJ4

2 darrayoperations class write a class named 2d array operations with the following static methods: gettotal. this method should accept a two-dimensional array as its argument and return the total of all the values in the array. write overloaded versions of this method that work with int, float, double, and long arrays. getaverage. this method should accept a two-dimensional array as its argument and return the average of all the values in the array. write overloaded versions of this method that work with int, float, double, and long arrays. getrowtotal. this method should accept a two-dimensional array as its first argument and an integer as its second argument. the second argument should be the subscript of a row in the array. the method should return the total of the values in the specified row. write overloaded versions of this method that work with int, float, double, and long arrays. getcolumntotal. this method should accept a two-dimensional array as its first argument and an integer as its second argument. the second argument should be the subscript of a column in the array. the method should return the total of the values in the specified column. write overloaded versions of this method that work with int, float, double, and long arrays. gethighestinrow. this method should accept a two-dimensional array as its first argument and an integer as its second argument. the second argument should be the subscript of a row in the array. the method should return the highest value in the specified row of the array. write overloaded versions of this method that work with int, float, double, and long arrays. getlowestinrow. this method should accept a two-dimensional array as its first argument and an integer as its second argument. the second argument should be the subscript of a row in the array. the method should return the lowest value in the specified row of the array. write overloaded versions of this method that work with int, float, double, and long arrays.

Answers

To solve the following problem using java programmimg .

What is  java programmimg?

Millions of devices, including laptops, smartphones, gaming consoles, medical equipment, and many more, employ the object-oriented programming language and software platform known as Java. Java's syntax and principles are derived from the C and C++ languages.

Code for the given problem:

import java.io.*;

class TwoDArrayOperations

{

   public static int getTotal(int[][] arr)

   {

       int sum=0;

       for(int i=0;i<arr.length;i++)

       {

           for(int j=0;j<arr[i].length;j++)

           {

               sum+=arr[i][j];

           }

       }

       return sum;

   }

   public static long getTotal(long[][] arr)

   {

       long sum=0;

       for(int i=0;i<arr.length;i++)

       {

           for(int j=0;j<arr[i].length;j++)

           {

               sum+=arr[i][j];

           }

       }

       return sum;

   }

   public static double getTotal(double[][] arr)

   {

       double sum=0;

       for(int i=0;i<arr.length;i++)

       {

           for(int j=0;j<arr[i].length;j++)

           {

               sum+=arr[i][j];

           }

       }

       return sum;

   }

   

   public static double getAverage(int[][] arr)

   {

       double count=0;

       for(int i=0;i<arr.length;i++)

       {

           count+=arr[i].length;

       }

       return getTotal(arr)/count;

   }

   

   public static double getAverage(double[][] arr)

   {

       double count=0;

       for(int i=0;i<arr.length;i++)

       {

           count+=arr[i].length;

       }

       return getTotal(arr)/count;

   }

   

   public static double getAverage(long[][] arr)

   {

       double count=0;

       for(int i=0;i<arr.length;i++)

       {

           count+=arr[i].length;

       }

       return getTotal(arr)/count;

   }

   public static int getRowTotal(int[][] arr,int row)

   {

       int sum=0;

       for(int i=0;i<arr[row].length;i++)

       {

           sum+=arr[row][i];

       }

       return sum;

   }

   public static long getRowTotal(long[][] arr,int row)

   {

       long sum=0;

       for(int i=0;i<arr[row].length;i++)

       {

           sum+=arr[row][i];

       }

       return sum;

   }

   public static double getRowTotal(double[][] arr,int row)

   {

       double sum=0;

       for(int i=0;i<arr[row].length;i++)

       {

           sum+=arr[row][i];

       }

       return sum;

   }

   public static double getHighestInRow(double[][] arr,int row)

   {

       double highest=0;

       for(int i=0;i<arr[row].length;i++)

       {

           if(arr[row][i]>highest)

               highest=arr[row][i];

       }

       return highest;

   }

    public static long getHighestInRow(long[][] arr,int row)

   {

       long highest=0;

       for(int i=0;i<arr[row].length;i++)

       {

           if(arr[row][i]>highest)

               highest=arr[row][i];

       }

       return highest;

   }

    public static int getHighestInRow(int[][] arr,int row)

   {

       int highest=0;

       for(int i=0;i<arr[row].length;i++)

       {

           if(arr[row][i]>highest)

               highest=arr[row][i];

       }

       return highest;

   }

   

   public static double getLowestInRow(double[][] arr,int row)

   {

       double lowest=99999;

       for(int i=0;i<arr[row].length;i++)

       {

           if(arr[row][i]<lowest)

               lowest=arr[row][i];

       }

       return lowest;

   }

    public static long getLowestInRow(long[][] arr,int row)

   {

       long lowest=99999;

       for(int i=0;i<arr[row].length;i++)

       {

           if(arr[row][i]<lowest)

               lowest=arr[row][i];

       }

       return lowest;

   }

    public static int getLowestInRow(int[][] arr,int row)

   {

       int lowest=99999;

       for(int i=0;i<arr[row].length;i++)

       {

           if(arr[row][i]<lowest)

               lowest=arr[row][i];

       }

       return lowest;

   }

   

   public static long getColumnTotal(long[][] arr,int column)

   {

       long sum=0;

       for(int i=0;i<arr.length;i++)

       {

                       sum+=arr[i][column];

       }

       return sum;

   }

   public static double getColumnTotal(double[][] arr,int column)

   {

       double sum=0;

       for(int i=0;i<arr.length;i++)

       {

                       sum+=arr[i][column];

       }

       return sum;

   }

   public static int getColumnTotal(int[][] arr,int column)

   {

       int sum=0;

       for(int i=0;i<arr.length;i++)

       {

           sum+=arr[i][column];

       }

       return sum;

   }

   

Learn more about Java Prgramming click here:

https://brainly.com/question/18554491

#SPJ4

the steps of execution, implementation, and management of databases within healthcare are known as .

Answers

The steps of execution, implementation, and management of databases within healthcare are known as database lifecycle.

What do you know about Database ?

A database is a collection of data that has been organized to make it simple to manage and update. Data records or files containing information, including as sales transactions, customer information, financial data, and product information, are often aggregated and stored in computer databases.

The life cycle of a database in an information system is a cycle that shows its development. The necessary processes for database development are all included in the database life cycle, from requirements analysis to monitoring and change. Because database monitoring, improvement, and maintenance are ongoing aspects of the database life cycle, they go on indefinitely as long as the database is active and being used.

Four stages make up the database life cycle: analysis of the requirements, design, implementation, and maintenance. You completely and accurately specify important data to the users throughout the requirement analysis process. Conceptual data modeling, logical design, and physical design make up the design phases. During the implementation phase, you build a database using the tools or DBMS's SQL or diagramming features. To guarantee that changing information needs are satisfied, the database must be maintained.

Learn more about database lifecycle click here:

https://brainly.com/question/28481695

#SPJ4

you aren't currently taking any courses. what courses would you like to take? math,physics, science you are currently taking these courses: 1: math 2: physics 3: science what courses would you like to take? sociology ,english,compsci, psychology you are currently taking these courses: 1: math 2: physics 3: science 4: sociology 5: english 6: compsci 7: psychology what courses would you like to drop? compsci you are currently taking these courses: 1: math 2: physics 3: science 4: sociology 5: english 6: psychology what courses would you like to drop? pyhsics, english, science you are currently taking these courses: 1: math 2: physics 3: sociology 4: psychology what courses would you like to take? english, science you are currently taking these courses: 1: math 2: physics 3: sociology 4: psychology 5: english 6: science what courses would you like to drop? physics you are currently taking these courses: 1: math 2: sociology 3: psychology 4: english 5: science done!

Answers

To solve the given problem we are using Rubric .

What is Rubric?

a strong directive. especially: a liturgical service conduct guideline. b(1): title and name. specifically: the statute's name.

Code for the problem:

def printCourses(l):    

if len(l)==0:        

  print("You aren't currently taking any courses.")    

else:        

   print('You are currently taking these courses:')        

for i in range(len(l)):            

    print(str(i+1)+': '+l[i]) #main

l=[] printCourses(l)

while(len(l)!=5):    

if len(l)<5:        

s=input('What courses would you like to take? ')        

s = s.split(',')        

for i in s:          

 l.append(i.strip().capitalize())    

else:        

    s=input('What courses would you like to drop? ')

       s = s.split(',')  

      for i in s:

            if i.strip().capitalize() in l:

               l.pop(l.index(i.strip().capitalize()))

    printCourses(l)          

Output:

You aren't currently taking any courses.

What courses would you like to take? math,physics,  SCIENCE

You are currently taking these courses:

1: Math

2: Physics

3: Science

What courses would you like to take? Sociology ,english,CompSci,  psychology

You are currently taking these courses:

1: Math

2: Physics

3: Science

4: Sociology

5: English

6: Compsci

7: Psychology

What courses would you like to drop? compsci

You are currently taking these courses:

1: Math

2: Physics

3: Science

4: Sociology

5: English

6: Psychology

What courses would you like to drop? Pyhsics, English, science

You are currently taking these courses:

1: Math

2: Physics

3: Sociology

4: Psychology

What courses would you like to take? English, Science

You are currently taking these courses:

1: Math

2: Physics

3: Sociology

4: Psychology

5: English

6: Science

What courses would you like to drop? physics

You are currently taking these courses:

1: Math

2: Sociology

3: Psychology

4: English

5: Science

Learn more about Rubric click here:

https://brainly.com/question/25916190

#SPJ4

One way to format text is _____ it.
Choose the answer.
underlining
deleting
moving
inserting

Answers

Underlining is one method of text formatting because formatted text can direct the reader's attention to specific sections of a document and highlight key information.

What is Text Formatting?

Formatted text is text that is displayed in a specific manner. Formatting data may be associated with text data in computer applications to generate formatted text. The operating system and application software used on the computer determine how formatted text is created and displayed.

Data on text formatting can be qualitative (for example, font family) or quantitative (e.g., font size, or color). It may also indicate an emphasis style (for example, boldface or italics) or a notation style (e.g., strikethrough, or superscript).

To learn more about Text Formatting, visit: https://brainly.com/question/28669485

#SPJ1

A simple index of three stocks have opening values on day 1 and day 8 as
shown in the table below.
Stock ABC
Stock XYZ
Stock QRS
A. -2.0%
B. 1.2%
C. -1.2%
D. 2.0%
Day 1
No. shares
4000
5000
6000
Price per
share
$3.15
$4.30
$4.60
Day 8
No. shares
4000
5000
6000
Price per
share
$3.50
$3.90
$4.50
What is the rate of change of this simple index over one week? Round your
answer to the nearest tenth.

Answers

-1.2 >apex is the rate of change of this simple index over one week.

What do you mean by rate of change?

The rate of change (ROC) of anything relates to how quickly it changes over time. Thus, it is the acceleration and deceleration of changes (i.e., the pace) rather than the magnitude of individual changes. Rate of change is used in finance to analyse price returns and identify momentum in trends. Traders use moving averages to smooth out the rates of change in asset prices in order to better comprehend them. The Price Rate of Change indicator is a technical instrument that calculates the percentage difference in price between the current price and the price from a predetermined number of periods ago.

To learn more about rate of change
https://brainly.com/question/8728504

#SPJ1

do you think fintechs, in general, will make trading markets more or less volatile? be specific and provide solid defense in your post for the position you take

Answers

I believe that overall FinTechs will reduce the volatility of trading markets in the future.

What does reduce volatility means?

Volatility is frequently used to describe the degree of risk or uncertainty associated with the magnitude of variations in a security's value. A security's value may potentially range over a wider range of values if its volatility is higher. This implies that the security's price can fluctuate sharply in either direction over a brief period of time. A security's value will not change significantly and will be more stable if its volatility is lower.

FinTechs employ technology to improve the function of finance and boost the effectiveness of operations in the financial and investing industries. Technology may be employed in financial trading, and it has a lot of benefits and conveniences to offer.

There are benefits in terms of efficiency, accessibility, cost effectiveness, and speed for different trading market participants. The settings and circumstances for market volatility are greatly diminished and diluted by the integration and convergence of all these components.

Additionally, a lot of FinTechs are using blockchain technology, which makes up for the shortcomings of the centralized system it replaces. It should be noted that one of the main causes of market volatility is the use of a centralized system. Blockchain is based on a decentralized system, which significantly reduces market volatility.

Additionally, FinTechs eliminate unnecessary legal and financial red tape, which enables the hosting of real-time secondary markets. FinTechs implement a safe and unquestionable infrastructure based on mathematical principles, which reduces the level of volatility in the trading markets.

Learn more about Volatility click here:

https://brainly.com/question/29394588

#SPJ4

Consider the following method.

public void doSomething()
{
System.out.println("Something has been done");
}

Each of the following statements appears in a method in the same class as doSomething. Which of the following statements are valid uses of the method doSomething ?

doSomething();
String output = doSomething();
System.out.println(doSomething());

A: I only
B: II only
C: I and II only
D: I and III only
E: I, II, and III

Answers

Given the above method, the statements that are valid uses of the method doSomething is: I only.  (Option A).

What is a statement in computer programming?

A statement is a grammatical unit of an imperative programming language that expresses some action to be performed. A program developed in this language is made up of a series of one or more statements.

In programming, a statement is any piece of code that informs the compiler to do a specified operation. A computer program is a collection of these assertions. A program code can contain a variety of statements that regulate the input and output of the tasks that the program is supposed to do.

Learn more about statements:

https://brainly.com/question/13735734

#SPJ1

arturo is a new network technician. he wants to use remote desktop protocol (rdp) to connect to a server from his computer. the server is on the other side of the building. his computer is running windows 10. will he be able to make the connection?

Answers

Arturo wants to use remote desktop protocol (RDP) to connect to a server from his computer. He will not be able to make the connection. Because the RDP protocol works only on Linux. The correct option is A.

What is a remote desktop protocol?

A technical standard or protocol called Remote Desktop Protocol (RDP) allows users to access desktop computers from a distance.

RDP is the most widely used protocol for remote desktop software, but other options include Independent Computing Architecture (ICA), virtual network computing (VNC), and others.

Therefore, the correct option is A. No, because the RDP protocol works only on Linux.

To learn more about remote desktop protocol, refer to the link:

https://brainly.com/question/28903876

#SPJ1

The question is incomplete. Your most probably complete question is given below:

A. No, because the RDP protocol works only on Linux.

B. No, because the RDP protocol works only on Mac OSX.

C. Yes, because the RDP protocol has clients that work on the most common operating systems.

D. Yes, because the RDP protocol works only on Windows.

How is information sent through the Internet?

A.Magic
B.Packets
C. E-mail
D. Through microscopic machines coming from your router box (Wi-Fi)

Answers

Answer:

b.packets

before messages get sent, they're broken up into tinier parts called packets. These messages and packets travel from one source to the next using Internet Protocol (IP) and Transport Control Protocol (TCP).

Other Questions
What is the converse of the conditional statement "If the streetlights are on, then the sun has gone down."?O If the sun has gone down, then the street lights are on.O If the streetlights are not on, then the sun has gone down.O If the streetlights are not on, then the sun has not gone down.If the sun has not gone down, then the streetlights are on. (a) how many one-to-one functions are there from a set with four elements to a set with five elements? there are choices for where to send the first element of the domain, choices for where to send the second element of the domain, and so forth. thus, the total number of one-to-one functions is . (b) how many one-to-one functions are there from a set with four elements to a set with three elements? (c) how many one-to-one functions are there from a set with four elements to a set with four elements? (d) how many one-to-one functions are there from a set with four elements to a set with six elements? Kamala Helps Her NeighborKamala mowed the last patch of grass, turned off the lawn mower's engine, and wipedher forehead with the back of her hand. Mowing the lawn Twas hard work, but she enjoyedit she felt pleased as she surveyed the neat and tidy expense of green.It wasn't even her lawn. Her next door neighbor, Ms Addison, had recently had surgeryand couldn't handle yard work, so kamala had offered to help her out. she had out thelawn several times and had watered the plants and pulled weeds as well.Now she saw Ms. Addison waving her over"I can't tell you how much I appreciate all you've done for me," Ms. Addison bold herTve had this for years. Td like you to have it to Kamala's surprise, Ms. Addison handedher a tamished, ancient-looking pocket watch"Are you sure? Kamala askedT'm sure, Ms Addison said. "You've been a idesaver to me this summer and I can'tthank you enoughKamala thanked Ms. Addison for the pift and said goodbye, what was she supposed to dowith a pocket watch? It wasn't even digital. Probably it had been sitting in Ms. Addison'sJunk drawer for years, and she was looking to get ind of eAs soon as kamala walked in the house, her mom asked, "what's that in your handat a git from Ms Addison," she replied it was nice of her, but es kind of ugly"Honey, I hope you said thank you, her mom sad, examining "This is an antique,sterling silversein working condition you'd have to mow quite a fewe lans tobuy something thatxamala looked at the watch again, tuming it over in her hand and wondering how muchwas worth had no idea," she murmuredYou may not understand a thing's worth at firstParents usually know better than their childrenThe best gits aren't always worth much moneysiny other than taking an over-the-counter remedy or, if the symptoms are severe, a prescription drug, nothing can be done to help with dysmenorrhea or painful menstrual periods.a. trueb. false Find the component form of the vector that translates (3, 2) to ( 1, 4) How is Mitosis different from binary fission? Write an equation for line L in point-slope form and slope-intercept form.L is parallel to y = 5x. a fast-food company does not promote anyone to manager unless he or she started at the beginning, flipping burgers. this is an example of a company promoting which type of power? write a letter to the chairman of your local government council expressing your dissatisfaction with the achievement of his regime so far pointing out two major problem of your people which requires his urgent attention in not less than 450 words a client has just purchased a zzz june 35 call at eight when the stock is trading at 41. what is the contract's premium? Use the Law of Detachment to draw a conclusion from the two given statements.If two angles are complementary, then the sum of their measures is 90. traffic engineers and lawmakers have designed our roads, laws and traffic controls to help drivers what other road users are about to do. when choosing an area for research, we usually start either with a broad area of management, such as marketing or operations management, or a practical question that needs to be answered to help managers with decision-making wer:Find the slope of the line that passes through the given points.(-3, 7.2) and (2,-2.3) after begging his parents for 3 years, jason is finally going to clown college! on the first day, his juggling instructor divides a box of bean bags equally among the 16 clowns in jason's class. each clown gets 6 bean bags. which equation can you use to find the number of bean bags b in the instructor's box? CAN SOMEONE HELP AS SOON AS POSSIBLE and like someone gets cancer from UV rays, can it be passed down to their children A small van can hold 50 crates and boxes. For every 7 crates the van can hold, there isroom for 3 boxes. How many crates and boxes are in the van when it is completely full? If MLDEF = 119, then what are m/FEG and m ZHEG? The diagram isnot to scale. in a lead chloride (pbcl2) saturated solution at an elevated temperature, the chloride ion concentration, [cl-], is 4.20 * 10^-2 m. what is the value of ksp for pbcl2 at this temperature?