Answer:
Of the given choices, Assembly.
Explanation:
Assembly was one of the first fully flushed programming languages, built on paradigms built throughout the late 40's and early 50's.
FORTRAN however was the first programming language with a compiler.
Write a function that takes two integer lists (not necessarily sorted) and returns true precisely when the first list is a sublist of the second.
The first list may appear anywhere within the second, but its elements must appear contiguously.
HINT: You should define and test a helper function that you can use in sublist.
Answer:
The function written in Python is as follows:
def checksublist(lista,listb):
if(all(elem in lista for elem in listb)):
print("The first list is a sub list of the second list.")
else:
print("The first list is not a sub list of the second list.")
Explanation:
This line defines the function
def checksublist(lista,listb):
The following if condition checks if list1 is a subset of list2
if(all(elem in lista for elem in listb)):
print("The first list is a sub list of the second list.")
The following else statement is executed if the above if statement is not true
else:
print("The first list is not a sub list of the second list.")
The function that takes two integer lists (not necessarily sorted) and returns true precisely when the first list is a sub list of the second is as follows:
def check_sublist(x, y):
if(set(x).issubset(set(y))):
return "The first list is a sublist of the second"
else:
return "The first list is not a sublist of the second"
print(check_sublist([2, 3, 5], [1, 2, 3, 4, 5, 6, 7]))
The code is written is python.
Code explanation:A function is declared called check_sublist. The function accept two parameters namely x and y.if the parameter x is a subset of y then the it will return "The first list is a sublist of the second"Else it will return "The first list is not a sublist of the second"Finally, we use the print statement to call our function with the required parameter.learn more on python code here; https://brainly.com/question/25797503?referrer=searchResults
Which is smaller - 1 PB or 1,000 TB? *
1 PB
1,000 TB
O They're equal
PLEASE HELP 10points
Answer:
they are all equal
Explanation:
I did this before
in the evolution of the internet which event occurred most recently ?
Answer:
The real answer is: Web 2.0 replaced the World Wide Web.
Explanation:
a p e x
The World Wide Web was succeeded by Web 2.0, which is often referred to as the internet and was the most recent development.
What is Web 2.0?Websites that emphasize user-generated content, usability, participatory culture, and interoperability for end users are known as “Web 2.0” sites.
On the internet, the greater user interaction and cooperation, more ubiquitous network connectivity, and improved communication channels are characteristics of web 2.0.
Darcy DiNucci initially used the phrase in 1999, while Tim O'Reilly and Dale Dougherty popularized it in late 2004 at the inaugural Web 2.0 Conference. A Web 2.0 website enables on the internet users to communicate and work together as co-creators of user-generated content in a virtual community through social media discussion.
Therefore, it is Web 2.0.
To learn more about the internet, refer to:
https://brainly.com/question/13308791
#SPJ6
We need a program to calculate future cost of a loan taken by a user. The financial institution charges the following interest rates for loans. The user inputs are the amount of loan desired, the loan period (number of years), and the number of compounding per year. Your program should determine the interest rate based on the amount of the loan. Your program should calculate the future dollar amount of this loan. The total amount of interest at the end of the loan period. Your program should incorporate a looping structure so that the user could check out many loan scenarios. You need to determine how to stop the loop. Interest rate schedule is per following schedule: Loan < 10k rate = 2% 10k =
Answer:
Follows are the code to this question:
#include<iostream>//defining the header file
#include<cmath>//defining the header file
using namespace std;
int main() //defining main method
{
double p,a,r;//defining double variable
int n,t;//defining integer variable
bool flag = true;//defining bool variable flag
while(flag) //defining while loop for input value
{
cout<<"Enter Present Worth: ";//print message
cin>>p;//input value in p
cout<<"Enter number of compounding: ";//print message
cin>>n;//input value in n
cout<<"Enter Loan Period: ";//print message
cin>>t;//input value in t
if (p<10000)//defining if block that check principle value is graeter then 10000
{
r = 0.02;//defining r varaible that store 0.02 value
}
else if (p>=10000 && p<=50000)//defining else if that value of p is in 10000 to 50000
{
r = 0.05;//defining r varaible that store 0.05 value
}
else if (p>50000)//defining else if that value of p is in 50000
{
r = 0.07;//defining r varaible that store 0.07 value
}
a = p*pow((1 + r/((double)n)), n*t);//defining formula for calculate A
cout<<"\nInterest Rate of Loan: "<<r<<endl;//print r rate value
cout<<"Future Worth: $"<<a<<endl;//print A value
cout<<"Total Interest: $"<<(a-p)<<endl<<endl;//print total interest value
char c;//defining char variable c
cout<<"Do you want to check for more loans(Press 'Y' for yes, otherwise press any other key): ";//print message
cin>>c;//input char value
if (c!= 'Y' && c!= 'y')//define if block that check c value is not equal to y
flag = false;//use flag that hold value false
}
cout<<"Thank you!!!"<<endl;//print message
return 0;
}
Output:
please find the attched file.
Explanation:
In the code, inside the main method three double variables "p, a, and, r", two integer variable "n and t", a bool variable is defined, in which double variable "p, n, and t" is used to input the value from the user-end.
In the next step, a condition statement has used that check the p-value and set the value according to the "p" variable value.The formula is used that calculates the value and prints its value, and uses a char variable that takes input "y" for again run the code or input other value to exit the program.What is the purpose of application software
Answer:
Explanation:
type of computer program that performs a specific personal, educational, and business function. Each program is designed to assist the user with a particular process, which may be related to productivity, creativity, and/or communication.
fill in the blanks – the icons mean arranging them in a proper sequence
The K-Means algorithm terminates when:_______
a. a user-defined minimum value for the summation of squared error differences between instances and their corresponding cluster center is seen.
b. the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.
c. the number of instances in each cluster for the current iteration is identical to the number of instances in each cluster of the previous iteration.
d. the number of clusters formed for the current iteration is identical to the number of clusters formed in the previous iteration.
Answer:
b. the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.
Explanation:
K-mean algorithm is one of the mot widely used algorithm for partitioning into groups of k clusters. This is done by partitioning observations into clusters which are similar to each other. When using k-mean algorithm, each of the different clusters are represented by their centroid and each point are placed only in clusters in which the point is close to cluster centroid.
The K-Means algorithm terminates when the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.
The K-Means algorithm terminates when:_
B. the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.
According to the given question, we are asked to show when the K-Means algorithm terminates and the conditions which must be observed before this happens.
As a result of this, we can see that the K-mean algorithm has to do with dividing and organising k clusters of data which have similarities to each other and are denoted by a centroid.
With this in mind, we can see that the algorithm terminates when the cluster centers for the current iteration are identical to the cluster centers for the previous iteration.
Therefore, the correct answer is option B
Read more here:
https://brainly.com/question/15016224
Which one of these stores more data than a DVD ?
Floppy
CD Rom
Blue Ray Disk
Red Ray Disk
Submit
Answer:
Blue Ray Disk
Explanation:
which of the following is an example of a technique used by a texture artist? A: Using multiple colors in a landscape B: Animating water to simulate rainfall C: Choosing hair color for a character D: Making concrete have a rough appearance
Answer:
A: Using multiple colors in a landscape I think
Explanation:
Answer:
I believe its D making concrete have rough appearances
Explanation:
color is not the texture artist job
in a company you are in charge of system maintainance. Justify with 5 reasons why your role is key
Answer:
As u are the in charge of system maintainance u have to maintain safety and security to the system.as the system maintainance is a very big role and u can say it is the key to ur company or to ur work.
How to give brainliest?
Answer:
Once two people answer a question, it'll have a bar on each answer that says Mark As Brainliest. Click that and it'll make it the Brainliest answer
Answer:
when two people answer there would be a white crown at the bottom right corner (of the answer) when you click on it it turns yellow/gold which means that you have marked that answer brainliest.
Pick the better answer (in your opinion) and then mark it brainliest.
balance = 100
balance = ((1.05) * balance) + 100
balance = ((1.05) * balance) + 100
balance *= 1.05
print(round(balance, 2))
Answer:
huh?
Explanation:
Multiple Choice
Which discipline would you study to help a company have better tech support?
O information systems
O information technology
O computer engineering
O computer science
Answer:
information technology
Explanation:
correct on edge
The education discipline that helps in providing a company with technological support has been information technology. Thus, option B is correct.
What is tech support?Tech support has been the acronym for technological support. A company has been requiring the backend support that helps in resolving the issues related to the technical products.
The registered users can gain support for the products such as software, and the bugs can be resolved by the support team.
The support team has to deal with the problems related to the software and the technical bugs in the system that can be studied or solved with the knowledge of computer technology or information technology.
Thus, the discipline required for the tech support team is information technology. Hence, option B is correct.
Learn more about tech support, here:
https://brainly.com/question/21415070
#SPJ2
Can someone tell me what to type up this is for my web page design class
Answer:
You have to write the HTML code as given instructions/design.
Write the below code in text file and save as test.html and run.
Explanation:
<html>
<head>
<title>
Storyboard Practice - Text Formatting
</title>
</head>
<body>
<center>
<h1>
Web Design Overview
</h1>
</center>
</body>
</html>
2 paragraphs of shooting games doesn’t make you violent
Answer:
Video games. A common pastime for the American people, children and adults alike. However, one thing many people confuse about video games is the false notion that violent ones carry over into real life behavior. For example, are you a culinary chef after you play Overcooked? Are you a professional soccer player after playing FIFA? If the answers to those are no, or something of the sort, then shooter games should not be tied to school shootings and things of the such.
For one, shooter games are not realistic scenarios that children and adults will be played in. As for Counter Strike, players can play as police men and defend the people from terrorists who attack them, which is a positive message to send out. Another example would be Doom Eternal, which is a game about fighting demons, which at the end of the day is quite a religious and healthy message to spread to children. Even for more realistic shooter games, children are not likely to find a gun laying around, and by the chance that they do and they know how to use it, their judgment is greater than their anger at that age if they are knowledgeable in how to use a gun.
In conclusion, shooter games do not make people violent. The notion that they do is absurd, as it is, as parents say "not real", and therefore shouldn't have so much time invested in it. But, if a child is doing good in school and well behaved, there is no problem with letting them play shooter games. If anything, they build experiences with friends when they play with them. Isn't that what childhood is about, playing with friends? Adults are typically good with judgment in these sorts of things, and they should know better. For adulthood is full of freedom, and they should be able to do what they need to enjoy it.
Explanation:
Making a Type I error means: _________.
a. We do not find enough evidence that there`s a difference in TV habits by gender for the class, when actually there is a difference.
b. We find evidence that there`s a difference in TV habits by gender for the class. There is a difference in TV habits by gender.
c. We do not find enough evidence that there`s a difference in TV habits by gender for the class.
d. We find evidence that there`s a difference in TV habits by gender for the class, when there is actually no difference. There is no difference in TV habits by gender.
Answer:
d.
Explanation:
Making a Type I error means we find evidence that there`s a difference in TV habits by gender for the class when there is actually no difference. There is no difference in TV habits by gender. Type 1 errors are usually seen in statistical hypothesis testing and refer to accepting a conclusion that only occurred due to lucky circumstances but are not factually correct and will likely not happen again, the same applies for the opposite where a conclusion is rejected due to an unlikely circumstance when in actuality it is a correct conclusion.
You download a game from the Internet since it looks fun to play. As you begin to play the game, your computer begins
to act erratically and finally crashes. Which of the following types of malware did you download?
Trojan horse
Virus
Worm
O Spyware
HElp
Answer:
Trojan Horse
Explanation:
A trojan horse is something that looks different than what it really is; it's deceptive.
Plz answer me will mark as brainliest
Answer:
D is the answer
Explanation:
because arteriales don't requare valves because they only go to one direction
What would you do if you noticed a glass bottle of apple juice fell from a shelf and spilled in the aisle? What steps would you take to make sure no one got hurt?
answer/Explanation:
I would first put up a caution sign about the floor being wet. I would then carefully pick up the broken bottle. I would then mop up the spilled juice and make sure I had swept up all the tiny pieces of glass. I would leave the caution sign up while the floor was drying so that customers would know to be careful while walking down that aisle.
3.24 LAB: Seasons
Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day.
Ex: If the input is:
April 11
the output is:
Spring
In addition, check if the string and int are valid (an actual month and day).
Ex: If the input is:
Blue 65
the output is:
Invalid
The dates for each season are:
Spring: March 20 - June 20
Summer: June 21 - September 21
Autumn: September 22 - December 20
Winter: December 21 - March 19
270738.1591718
import java.util.Scanner;
public class LabProgram {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int inputYear;
boolean isLeapYear;
isLeapYear = false;
inputYear = scnr.nextInt();
/* Type your code here. */
}
}
Answer:
Seasons Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day. Ex: If the input is: April 11 the output is: Spring In addition, check if the string and int are valid (an actual month and day). Ex: If the input is: Blue 65 the output is: Invalid Invalid The dates for each season are: Spring: March 20 - June 20 Summer: June 21 - September 21 Autumn: September 22 - December 20 Winter: December 21 - March 19 LAB ACTIVITY 3.24.1: LAB: Seasons 0/10 main.cpp Load default template... 1 #include eam> 2 #include <string> 3 using namespace std; 4 5 int main() 6 string inputMonth; 7 int inputDay; 8 9 cin >> inputMonth; 10 cin >> inputDay; 11 12 /* Type your code here. */ 13 14 return; 15 }
A software program designed to simplify communication between various hospital systems such as ADT (Admission-Transfer-Discharge), Pharmacy, LIS (Lab Information System), RIS (Radiology Information System) and etc. is called
Answer:
"HL7 Translator" seems to be the appropriate answer.
Explanation:
HL7 would be a universal, user-friendly protocol that allows collaboration across two or maybe more programs for health administration. Throughout the context through one and sometimes more HL7 communications, including billing healthcare and customer data, health-related data will be transmitted. The implementation of HL7 includes the participation of clinical technology analysts, integration professionals, system administrators including analysts.We may think of relationships in the E/R model as having keys, just as entity sets do. Let R be a relationship among the entity sets E1, E2, …,En. Then a key for R is a set K of attributes chosen from the attributes of E1, E2,…, En such that if (e1,e2,…,en) and (f1,f2,…,fn) are two different tuples in the relationship set for R, then it is not possible that these tuples agree in all the attributes of K. Now, suppose n=2; that is, R is a binary relationship. Also, for each I, let Ki be a set of attributes that is a key for entity set Ei. In terms of E1 and E2, give a smallest possible key for R under the assumption that:_________.1. R is many-many
2. R is many-one from E1 to E2.
3. R is many-one from E2 to E1.
4. R is one-one.
Explanation:
1
R is many - many;
in this case we have that E1 is not what should be used to determine E2 and in this same way, W2 is not what should determine E1. So non of these can be a key on its own.
2.
R is many-one from E1 to E2
in this case there are 2 tuples (f1,f2) and (e1,e2) which have to be the same if they have the same key attribute for E1. All of them are the same so all the pairs are the same.
3.
R is many-one from E2 to E1:
the explanation for this is is almost the same with that of b. we apply the same logic. since for all keys, all pairs and sets are the same.
4.
R is one-one:
E1 is what determines E2 and likewise, E2 is what determines E1. irrespective of the key that is used, key K is going to the same value of n.
A first-in first-out (FIFO) is a memory unit that stores information in such a manner that the item first in is the item first out. Show how a FIFO memory operates with three counters: a write counter WC that holds the address for the memory write operation; a read counter RCthat holds the address for the read operation; and an available storage counter ASC that indicates the number of items stored. ASC is incremented for every item stored and decremented for every item that is retrieved. The memory unit communicates with MAR and MBR.
Answer:
tews
Explanation:
explain working principle of computer?
Answer:
The working principle of the computer system. Computers do the work primarily in the machine and we can not see, a control center that converts the information data input to output. This control center, called the central processing unit (CPU), How Computers Work is a very complex system.
Explanation:
The email application used by Jim’s office is sending emails with viruses attached to them to user’s computers. What step should Jim try first to resolve the issue?
Downgrade the email software to an older, previous version
Buy a newer email program and migrate the office computers to that program
Switch from open source software to proprietary software
Check for and install patches or software updates
The step that Jim should try first to resolve the issue is to check for and install patches or software updates. Thus, the correct option for this question is D.
What is a Software update?A software update may be defined as a sequence of changes to the software in order to update, fix or improve it. Changes to the software will usually either fix bugs, fix security vulnerabilities, provide new features or improve performance and usability.
The process of software update usually fixes bugs in your current operating system and secures your phone from malicious attacks by fixing any security lapses. G-Pixel handsets receive security updates every month. However, that's not the case with all Android phones.
Therefore, checking for and installing patches or software updates is the step that should Jim try first in order to resolve the issue. Thus, the correct option for this question is D.
To learn more about Software updates, refer to the link:
https://brainly.com/question/5057366
#SPJ2
what type of model does the Web use?
Answer:
Microsoft, Firefox, Google, and Office onenote webisite
Explanation:
cause they are a model
In the ____ model, each computer in a network can act as a server for all the other computers, sharing files and access to devices.
Answer:
peer to peer
Explanation:
i just know
In a peer-to-peer model, each computer in a network can act as a server for all the other computers, sharing files and access to devices.
What do you mean by Computer Network?Computer Network may be defined as a type of system that significantly connects two or more computing devices with the intention of transmitting and sharing information with one another. In a more simple sense, there is an interconnection between computing devices.
In a peer-to-peer networking model, a group of computers are linked together with having equal responsibilities for the processing of data and information. Each computer is capable to initiate a command that has to be followed by the rest.
Therefore, in a peer-to-peer model, each computer in a network can act as a server for all the other computers, sharing files and access to devices.
To learn more about the peer-to-peer model, refer to the link:
https://brainly.com/question/9315259
#SPJ2
3. An open source software operating system
TYPE THE ANSWER
Answer:
Linux
Explanation:
I read the reading
true false are computer has four main parts
Answer:
It is true because computer have four main parts
A friend of yours is analyzing data collected on the response time to emergency calls. They are unsure about statis have asked for your advice:
Friend: I have got data on the response time to emergency calls for a random sample of 60 emergency responses. I've been asked to report some numbers to describe the center and spread of this data. Apparently there are several ways to do that and I am unsure which method I should use. I've looked at the data and it seems that the response times are fairly evenly spread around a time of 5 minutes. How should I best report the center and spread of this data?
You respond to your friend saying that, in this case, it is best to report the:____.
a. mean, minimum and maximum values.
b. median and interquartile range.
c. mean and standard deviation.
d. variance.
e. mode and range.
f. mean only.
Answer:
c. mean and standard deviation.
Explanation:
You respond to your friend saying that, in this case, it is best to report the mean and standard deviation. The mean will provide the best representation of the average based on the data that is provided. Meaning that response time that occurs the most often from all the data that was provided. While the standard deviation tells us, by how much the rest of the data is separated from the calculated average value.