nd
Assume you have already imported the time module.
Which line of code will pause the program for 6 seconds?
time.pause(6)
time sleep()
O time.pause()
O time sleep(6)

Answers

Answer 1

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Time Module:  

Python's time module has a function to pause a program to the given time in seconds called sleep(). Essentially, as the name implies, it pauses your Python program.

The syntax of the sleep() function is given below:

time.sleep(second)

So, the given options for this question are :

time.pause(6) time.sleep() time.pause() time.sleep(6)

To pause a program for 6 seconds, option 4 is correct:

time.sleep(6)

While the other remaining options are not correct because to pause a program in python for 6 seconds, the correct statement is given in option 4.


Related Questions

The appropriate semaphore in C to give one more turn to writer so it can clean up IPC objects is WRITE_SEM. Is it true or false

Answers

Answer:

True

Explanation:

Semaphores are variables of abstract data types in programming used to control or restrict access to resources by multiple concurrent processes to avoid system failure like race conditions, by evaluating the available resources. There are various types of semaphores like the binary and counting semaphores which is used to lock and count resources respectively.

In C, the semaphore used to clean up the IPU objects is the WRITE_SEM.

Adding effects that move your text or pictures in your presentation is called:

Answers

the answer should be it’s a transitionl

What is one purpose of alogorihm​

Answers

Answer:

The purpose of an algorithm is to give a set of rules by which one person can solve a problem.

Step-by-step Explanation:

It can be reasoned by using a step-by-step guide that will help you accomplish a task or solving a specific calculation if the steps are followed correctly.

Answer:

One purpose of algorithm is so that it can help you understand the process of making something.

Example: For example, a recipe is an algorithm. It is a process of steps that helps you understand how to make something.

Or an equation. Equations are also a process of steps that help you understand how to get a correct calculation.

The SQL WHERE clause:___________.a) Limits the row data that are returned. b) Limits the column data that are returned. c) ALL Limits the column and row data that are returned.d) All of the above

Answers

Answer:

D. All of the above.

Explanation:

• To limit the number of rows use the WHERE clause.

• The WHERE clause filters for rows that meet certain criteria.

• WHERE is followed by a condition that returns either true or false.

• WHERE is used with SELECT, UPDATE, and DELETE.

The Bike and EBike classes are implemented as shown by the code below.public class Bike
{
private String make;
private int numGears;
private double tirePressure;
public Bike(String m, int g, double t)
{
make = m;
numGears = g;
tirePressure = t;
}
public void pumpTire()
{
tirePressure += 5.0;
}
}
public class EBike extends Bike
{
private int batteryLevel;
public EBike(String m, int g, double t, int b)
{
super(m, g, t);
batteryLevel = b;
}
public void chargeBattery()
{
batteryLevel++;
}
}
Suppose that the following declarations are made in a separate class.
Bike bike1 = new Bike("Clasic Cycle", 16, 65.0);
Bike bike2 = new EBike("Big EZ", 8, 72.0, 96);
EBike bike3 = new Bike("E-xtreme", 12, 80.0, 44);
Assuming the above three lines compile without error, which of the following statements will cause an error when compiled?
bike3.pumpTire();
bike2.pumpTire();
bike2.chargeBattery();
bike1.pumpTire();
bike3.chargeBattery();

Answers

Answer:

bike3.chargeBattery();

Explanation:

The Bite class is the super or parent class of the Java program while the Ebike class is the subclass or child class inheriting from the super-class. The Bike class defined methods can be used by the object instance of the Ebike class, but the method in the Ebike class cannot be used by the parent class "Bike".

Northern Trail Outfitters stores Last Name in a data extension. How should the text file be defined?

a. Varchar(100)
b. Char(100)
c. String(100)
d. Text(100)

Answers

Answer:

d. Text(100)

Explanation:

The data extensions can be defined as the table with the fields of the data about contacts. It can be related to some other data extensions or can be a standalone.

In the context, the Northern Trail Outfitters stores the Last Name in the data extension which is defined as a text file as Text(100).

Choosing a proper field length and a data type ensures an efficient storage as well as retrieval of the data in the data extensions.

Tips for staying safe using social media. Using in your own words.

Answers

Whatever you post on social media, it's now public. Yes there are ways to make posts private and such, but glitches do happen. Not only that, but hackers may be able to turn privacy features off. Also, sometimes the social media company changes policy on some aspects, which may turn some private features into public ones. That means you should be careful not to post anything too personal and also don't post anything such as addresses, bank account numbers, passwords, etc. This is probably common sense to you, but it's a good thing to keep in mind regardless.

Also, if there are people who verbally threaten or harass you, then you should either report them or block them. Preferably both, but blocking is probably more effective. If someone friend requests you, then it's ideal to only accept their request if you know who they are. Though you can relax this if you aren't worried about who sees your profile page.

In addition, you should be careful as to what you read on social media. Not everything is true. This is because practically anyone can post a news story even if it's completely made up. Lately there have been some efforts to do fact checking, but there's still a lot of fictional stuff out there. Be sure to avoid clicking on any links you may not recognized as they could be phishing links, or may lead to harmful malware. It's probably just best to get an antivirus of some kind.

A cyberbully is someone who invades another person’s privacy by posting mean-spirited messages. repeatedly sending text messages. visiting questionable websites. stealing original work.

Answers

Answer:

Its A.

Explanation:

Took the exam review

Answer:

A

Explanation:

on edge

Cryptography is the process of transforming data from cleartext into ciphertext.

a. True
b. False

Answers

Answer:

B) false

Explanation:

Encryption can be regarded as

the process involving encoding of information. It brings about convertion of of original information ( plaintext) to another alternative form (ciphertext). While While cryptography can be regarded as the science that deals with encrypting as well as decrypting of information. plaintext is unencrypted data while ciphertext is encrypted data. It should be noted that encryption is the process of transforming data from cleartext into ciphertext.

Imagine that you are a sound designer for a new spy/mystery film. In a pivotal scene, the lead character discovers that a mentor has betrayed her. She confronts her mentor on the rooftop of a high-rise building at night. What would you, as the sound designer, do to maximize the impact of this emotional scene? Your answer should be at least 150 words.

Answers

Answer:

I would of made the sound deep, somewhat emotional, like with violin or piano in the background, while the dialog played. If the mentor were to push the lead character off the building, I would add some music that was intense, to add onto it, and when the character would start to fall, the music would get deeper and quieter, and make the music cut out as the character fell the rest of the way. If somebody saved the person, like somebody were to save them by grappling onto a building and snatching the person, the music would go up, and be a bit more up beat.

that would be what I would of put if I were to have that same question on something.

I hope that helped you!

In this first journal assignment, you will explore the role of testing in the SDLC. You will explain the role and importance of testing in the SDLC and describe any exceptions in which the testing stage would occur earlier or later than it typically does in the life cycle. Address the following questions:_______.A. What occurs during the testing stage of the SDLC?B. Why is the testing stage vital to a successful SDLC?C. Are there any exceptions in which the testing stage would occur earlier or later than it typically does in the SDLC? Explain.

Answers

it is SDLC your welcome good luck

The I/O modules take care of data movement between main memory and a particular device interface.A. TrueB. False

Answers

Answer:

A: True

Explanation: hiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii

Commercial technical data and commercial software:_________.
a- [ ] Are provided to the Government with additional rights.
b- [ ] Must be marked ?proprietary? to have protection.
c- [ ] Must be available to consumers to qualify as commercial.
d- [ ] Are offered for sale on the commercial market.

Answers

Answer:

Must be available to consumers to qualify as commercial.

Explanation:

According to Defense Federal Acquisition Regulation Supplement and Federal Acquisition Regulation Supplement technical data and software belongs to the authentic developer or the direct beneficient otherwise, if made available to consumers it will then be regarded as the "Commercial technical data and commercial software."

Hence, the right answer to the question is option C "Must be available to consumers to qualify as commercial."

One of the keys on my keyboard doesn’t work but It’s used to login to windows. I’m trapped outside. What should i do :(

Answers

uhm- sorry, could explain this in a simpler way?

what is command is used to improve the vocabulary and in which tab is it found​

Answers

Answer:

Writers Talk About Writing

Ctrl+Shift+Return: Keys to Your Computer

By Mike PopeOctober 15, 2012

Your computer's keyboard has around 110 keys by which you can make your wishes known to the machine. Most of these have obvious labels: if you press the A key, the letter A appears on the screen. Some are less obvious, though — the Shift key and the mysterious Ctrl key — and in this article I'll explore why they're named what they're named.

Long before computers, many practical issues about using a machine to write had already been worked out for the typewriter. If you've never used a typewriter, you might be interested in this video that shows one in action.

Describe how you would create a Java program that prompted the user to correctly enter a username and password. The username is not case sensitive, bu

Answers

Answer:

Explanation:

The program in question would create a new Scanner Object which asks the user for the Username first. It would then save this input into a temporary variable and compare it to the actual username in the database. Since the username is not case sensitive, we would use the toLowerCase() method on both the input and the database username so that they match even if the letters are not the same case structure. If both usernames match then we would move on to ask the user for the Password and compare it with the database password for that user. Since this one is case sensitive we would compare as is. Finally, if both Username and Password match we would print "Hello World" otherwise we would print "Login Failed."

Sound technology has been influenced the most by the ___.
microphone
phonograph
record player
cassette recorder

Answers

I think its the phonograph i hope this helps!
The phonograph because it helped with hearing and seeing things

The method definition, or declaration, is defined as the method __________ followed by the method ________.

a. name, parameters
b. name, return
c. header, body
d. header, signature
e. signature, body

Answers

Answer:

The answer is option C "header, body"

Explanation:

Like a class, a method definition has two significant parts: the method revelation and the method body. The method declaration characterizes all the method's attributes, for example, access level, return type, name, and contentions. The method body is the place where all the activity happens. It contains the guidelines that actualize the method.

The lone required element of a method declaration are the method's name, return type, and a couple of brackets: ( and ). A method declaration can give more data about the method, including the return type of the method, the number and sort of the contentions needed by the method, and which different classes and objects can call the method.

In spite of the fact that a method name can be any legitimate identifier, code shows limit method names. By and large, method names should be action words  (verbs) and should be in upper case, with the principal letter in lowercase and the primary letter of each inside word in capitalized.

1. Write a function called changeLetter that can directly alter the value of a character variable. It takes one argument: a reference to a character. It returns nothing. If the passed in character is alphabetic ('a' to 'z' or 'A' to 'Z'), then make the character become the next higher ASCII value ('a' becomes 'b' etc.). If the passed in character is not a letter, don't alter it.
2. Write a calling statement for the changeLetter function. It takes one argument: a reference to a character and returns nothing. The calling statement should pass the char variable ch so that it is (potentially) altered.
3. Write a calling statement for the changeLetter function. It takes one argument: a reference to a character and returns nothing. The calling statement should pass the 2nd character in a char array called chAr (by second, I mean the sub-oneth) so that it is (potentially) altered.
4. Assume the following function header:

void fn( int &n )

Write an instruction for the function body that will store 10 into the caller's variable referred to by n.
5. Write a calling statement for the fn function. It takes one argument: a reference to an integer and returns nothing. The calling should pass the integer variable num to the function so that it can be altered.
6. The strlen() function returns
A. the number of chars in an array of char, including the null
B. the number of chars in an array of char not including the null
C. the declared number of chars an array can hold
7. What must be true of the arguments to strcat(s1, s2); More than one answer may be correct
A. s1 must be valid strings
B. s2 must be a valid string
C. s1 must have room to contain the result
D. s2 must have room to contain the result
8. How is a structure different from an array?
9. Write a definition for a structure called Part that can hold a part name (an array of characters that can hold 24 characters plus a null terminator), a part weight (int), and a part price (float). Make up appropriate names.
10. Assume the following structure definition:

struct Person

{

char name[50];

int age;

};

Write a declaration for a variable of type Person and initialize it with your name and the age 10. This should be done as part of the variable declaration statement.

11. Assume the following structure definition:

struct Person

{

char name[50];

int age;

};

Write a declaration for a variable of type Person and initialize it with your name and the age 10. This should be done as several executable statements.

12. Declare an array of 10 Person structures named peopleArray.

13. Assume the following structure definition and declaration:

struct Person

{

char name[50];

int age;

};

Person people[265];

Assuming that the people array contains 265 valid structs, write code to print out the age member for each item in the structure.

Answers

Answer:

1. Void changeLetter( char &ref )

{

If( isalpha(ref) )

{

Ref++;

}

}

2. changeLetter( ch );

3. changeLetter( chAr[1] );

4. n = 10;

5. fn( num );

6. (B) the number of chars in an array of char not including the null.

Explanation:

Functions are blocks of codes in any programming language. In C++, a void function is a function that does not return a value, while other types of functions have a return statement. There are three ways to pass an argument to a function in C++, by value, by reference and by pointer.

When a variable argument is passed as a value to a function, the value of that variable cannot be altered by the function, but when it is passed as a reference or a pointer, it can be altered.

To call a function in C++, specific the function name and the opening and closing parenthesis with the required arguments in between. The call must end with a semi-colon.

Databases and EC2 instances are most performant using block-level storage.
A. True
B. False

Answers

Answer:

A. True

Explanation:

It is TRUE that Databases and EC2 instances are most performant using block-level storage.

This is evident in the fact that Databases applications utilize block-level storage in storing files and data, and at the same time that EC2; Amàzon Elastic Compute Cloud, through Amàzon Elastic Block Store utilizes block-level storage to store data.

Hence, in this case, the correct answer is TRUE.

Define a function in Scheme (or relation in Prolog) that checks whether a set of elements (represented as a list) is a subset of another set (represented as a list).

Answers

Answer:

subset([],[]).

       subset([X|L],[X|S]) :-

           subset(L,S).

       subset(L, [_|S]) :-

           subset(L,S).

Success:

     subset([1,3], [1,2,3]).

     subset(X, [1,3,4]).        % error handling to compare sets in a given order

Fail:

     subset([2,1], [1,2,3]).   % compares in a different order from the first.

Explanation:

The function "Subset" in the source code above accepts two sets, then checks if the first set is a subset of the second. The code returns true if the condition is met.

Write down the different types of testing with their definition.

a. Acceptance/Beta testing________
b. Accessibility testing __________
c. Integration testing ___________
d. Usability testing _________
e. Stress Testing __________

Answers

Answer:

The answer is below

Explanation:

a. Acceptance/Beta testing: this is considered as the last test by the real users or a specific number of end-users of an application software before its final release.

b. Accessibility testing: this is a form of application software testing that is targeted to the disables, such as deaf, color blind, or any other disabled group of people

c. Integration testing: this is a form of testing that involves collective eating of different components of software or hardware that makes up a system.

d. Usability testing: this is a form of testing in which a computer product is tested based on users' experience. It seeks to assess the products from the users' experience.

e. Stress Testing: this is a form of testing that seeks to find the limitation of a product or software. By carrying out stress testing, the producer can quickly know the level at which the product can operate under heavy use.

Sara would like to begin creating macros in Excel 2016. Where can she find the ability to launch the Macro dialog box?

Insert tab in the Macros group
Formulas tab in the Macros group
Developer tab in the Code group
Developer tab in the Add-ins group

Answers

Answer:

C) Developer tab in the Code group

Explanation:

Which of the following defines methodology?
O Messages delivered within the company usually dealing with routine issues
O Shorter, less detailed business reports
O Various processes used in planning, testing and implementing a procedure
O Publication providing information on current and future events of a company

Answers

Answer:

O Various processes used in planning, testing and implementing a procedure

Explanation:

The set of rules and procedures followed in the process of  research and inquiry are said to be termed as methodology. A proper direction is followed to achieve the research process and analyzing the outcomes. Comprehending the topic, analyzing the given data and using methods of researching are the steps involved in the process of methodology. The process of methodology helps in the process of research and analyses of the research.

A company has four departments: A, B, C, and D. The number of IP addresses required by each department is 100, 60, 20, and 26 respectively. The company's application network is 172.168.1.0/24. Please list the address range and subnet mask that can be assigned by each department.

Answers

Answer:

deeppppuhjjuuiiijjjjk

Which option is created specifically for giving a slide presentation in front of an audience and works when the speaker is utilizing multiple monitors or a projector?

Normal view
Annotation tools
Presenter view
Notes tools

Answers

Answer:

Presenter view

Explanation:

SEMMA is a proprietary model? True or Flase

Answers

Answer:

true

Explanation:

SEMMA is a proprietary model is a true statement

Proprietal model in this context is a product or services that is exclusive to a company. SEMMA, is a property of SAS institute.

SEMMA simply means Sample, Explore, Modify, Model, and Assess. It is simply a list of sequential steps which was a product of SAS Institute. This institute is among the largest producers of statistics and business intelligence software. This product or property was made for passing or implementation of data mining applications.

Conclusively, we can say that SEMMA is a proprietary model is a true statement

Learn more from:

https://brainly.com/question/12719360?section=newest_q

Write a function solution that, given an array A consisting of N integers, returns the number of fragements of A whose sum equals 0 (that is, pairs (p,q) such that P

Answers

Answer:

#include <iostream>

using namespace std;

void fragment(int arr[], int n){

   for (int i = 0; i < n; i++){

       for (int x = 0; x < n; x++){

           if (x != i && arr[i] + arr[x] == 0){

               cout<< arr[i] << " , " << arr[x];

           }

       }

   }

}

int main(){

   int n = 7;

   int myArr = {1, 2, -1, -2, 0, 0, 3};

   fragment(myArr, n);

}

Explanation:

The C++ source code defines an array called "myArr" in the main program and its array size n. The void function "fragment" prints out the pairs of the array whose sum equates to zero.

What do you do to think positive and maintain discipline to play
with your friends ? write in four points.
)
no
S s.)​

Answers

Answer:

to make peaceful mind.to develop our character..

How to start the ms excel​

Answers

Answer:

The answer is below

Explanation:

To start Microsoft Excel, a user can click on the start menu and look for the Microsoft Excel icon in the list of programs available.

If this is not found, a user can either search it from the start menu or click on the All program menu, from there the user can look for Microsoft Excel then click on it to launch the application.

If Microsoft Excel can't be found, a user is recommended to click on Microsoft Office, from there Microsoft Excel will be found, then the user can click on it to launch the application.

After clicking, the Excel Starter startup screen shows, and an empty page called the spreadsheet is shown.

Other Questions
Which is an example of radiation?1.Hot air rises and cool air moves in to take its place.2.You burn your feet on a hot sidewalk on a sunny day.3.Your car parked in the sun is hot when you return. 20 points and brainlest.Examine the attached photo and answer the following for two points each:1. What is the niche of the hummingbird?2. Identify an adaptation that helps the hummingbird in this role.3. Identify an adaptation that helps the plant in this roleThis picture is the only thing that comes with the question. Anita y Lucas han viajado a Hawai para su luna de miel. Ellos han llegado a Honolulu y tienen reservaciones en el hotel all. Ellos se dieron cuenta que estaban enamorados cuando l la invit a la playa y al estar all, la bes. Algunas veces han peleado, pero en general se llevan muy bien. Lucas ha viajado por todo el mundo y ahora quiere que Anita conozca esta isla.Dnde llegaron Lucas y Anita? What,generally, is the current level of deforestation in the United States? In developing nations? How would you expect the deforestation in developing nations to change in the next 100 years? Explain. In 1947, after the independence of India, Jammu and Kashmir, Junagarh and Hyderabad did not sign the instrument of accession with India. Mention the reasons. When would a standardized table be useful in a health care setting? O A. When a doctor wants to track a patient's individual progress over the course of a year O B. When a doctor wants to show how the parts of a whole are divided O C. When a doctor wants to use a visual to help explain a procedure to a patient D. When a doctor wants to see how a patient is doing in comparison to others M Look at the photo pick A B C D either one explanation not needed thank you! to complete a task in 16 days a company needs Molecular iodine, I2(g)dissociates into iodine atoms at 625 K with a first-order rate constant of 0.271s-1What is the half-life for this reaction? Which statement below CANNOT be represented by the expression x - 10?a. 10 less than xb. x decreased by 10c. x less than 10d. 10 subtracted from x Which two statements describe the ocean floor? A. There are long underwater mountain chains. B. There are many active undersea volcanoes. C. It is covered with underwater forests of tall trees. D. It has only smooth surfaces between continental shelves. A and B is Correct What is a distinctive feature of a melody?OA singing.interval between notesOC. range of notesOD. repeats often hey um, so im learning ab percentages in my math class so can someone please explain to me how to solve percent problems if thats ok? thank you. If the sum of twice a number and four is eighteen, what is that number? Alexis and Paige work together as photographers for the local newspaper. Alexis is paid $25 for each news story she shoots and an additional $5 per picture. Paige makes $15 for each news story and $10 per picture. Write an expression to show how much the newspaper will pay if Alexis and Paige are hired together. Use p as the variable for pictures You have 4 black marbles, 3 green marbles and 5 red marbles in a bag. Whatis the probability of pulling out a black marble? How are digitized signals sent? Pizzazz I really need help! I only have little to spare, please make this count!!!What do we need to know to transcribe a note on the musical staff? If it gets louder or quieter Its form and interval If it speeds up or slows down Its pitch and duration Create a chart by calculating the heights of all the family members. Convert the heights in cm. Also find the average heights of your family. Compare your height with the average height and the height of your father.plz help me now Complete the proof.Drag and drop the expression to correctly complete the proof of the polynomial identity (xy)2+4xy=(x+y)2. Steam Workshop Downloader