Answer:
The answer is a method
Explanation:
Answer:
class and self
Explanation:
class Bike:
def __init__(self, str, float):
self.color = str
self.price = float
the basis of modern technology is traditional technology
Answer:
A customized innovation is of specialized advances where some unique things are added to extend it. The present day advances have been based on the fundamental structures purposes and working of the traditional technologies.
Hence, it can be concluded that “The basis of modern technology is traditional technology”
Give five (5) words that describes about computer.
Explanation:
C=Commonly
O=Operated
M=Machine
P=Particularly
U=Used for
T=Training
E=Education
R=Research
hope it helps you
africans are unique people they are rich culture and a glorious history
Explanation:
In Africa art including crafts and culture, mythology and faith, clothes, lifestyle, music and tongues, African pixel is influenced. In Africa, social identities are plentiful, with vast quantities of multiculturalism being discovered not only through various continents, as well as within individual nations.
HELP
Question 1 (1 point)
GIF, JPG, and TIFF are raster-based.
O True
O False
It is true. GIF and JPG are mostly rasted (can be a vector), and TIIFF is rasted.
Unitary method question 1) If the cost of 32 copies is Rs 960, how much more cost is of 3 dozen copies ?
Answer:
the cost of 3 dozen copies is Rs 1080.
Explanation:
32 copies =Rs 960
1 copy =Rs 960÷32
= Rs 30
3 dozen = 3 × 12. =36
36 copies = 36 × 30
= Rs 1080
While gaming online, Julian receives several insulting comments from another player. This is an example of
O denigration
O cyberstalking
harassment
O outing
Answer:
cyberstalking harassment
Explanation:
since Julian is being harrased or bullied online by someone
project members are called change agents. why?
A project members are called change agents because they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.
What does being a change agent mean?In regards to business, a change agent is known to be called any body be it a man or a woman that helps to promotes as well as supports a new method of doing things inside of the company, even if it is the use of a new method, the taking in of a new management structure or the changing of an old business model to those of a new one.
Therefore, based on the above, A project members are called change agents because they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.
Learn more about project members from
https://brainly.com/question/24248709
#SPJ1
What is included in a linked list node?
I a reference to the next node
II an array reference
III a data element
Answer: I a reference to the next node
III a data element
Explanation:
A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.
In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.
Therefore, based on the explanation above, the correct option will be:
I. a reference to the next node
III a data element
PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT
Answer:
B
Explanation:
I think that is the right answer
Typically you will not find biometric devices in _________ security buildings. Low High Minimal Medium
Answer:
Low
Explanation:
Biometrics security systems are hardware scanners that are useful for capturing the biometric of individuals as a means of verifying identity. These scans would be matched against the saved database and in turn access would be approved or denied to the system. In other words, biometric security gives the human body the “key” to unlock your access into buildings.
You will not find such devices in low security buildings.
this is computer programming and it confuses me very much
Answer:
Using a loop or using the power function from a math library.
Explanation:
Really the question needs a bit more context. But if you want to calculate [tex]a^{b}[/tex]
and b is a whole number, you could create a loop with b steps and keep multiplying by a.
Alternatively, you can use a power function such as pow(a,b) from math.h in the C programming language.
how do i create a business process flow chart?
Answer:
Determine the main components of the process. ...
Order the activities. ...
Choose the correct symbols for each activity. ...
Make the connection between the activities. ...
Indicate the beginning and end of the process. ...
Review your business process diagram.
Explanation:
Database are pranized in
consist of a series of
which consist of a senes of
Answer:
fields and records I guess is the answer
How is opera diffrerent from blues,gospel,and country music?
Answer: Opera has its roots in Europe; the other styles are American
Explanation:
Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way for her to do this? Use an existing template. Design a new theme for the presentation. Create a custom template for the presentation. Search for a design template online.
Answer:
The answer is A
Explanation:
Edge 2020
assembly language uses _____ coder for programming.
Answer:
Assembly language uses alphabetic codes in place of binary numbers used in machine language. assembly language code is converted into executable machine code by a utility program referred as assembler.
the acronym PC stands of
Answer:
personal computer
Explanation:
It stands for personal computer
A document template is a___
preformatted structure for a document
read-only document
type of reference for a document
passcode assigned to access a hidden document
Which steps can you take to remove all the data you've just typed from a cell?
Click the cell, then press Delete.
Click Undo on the Quick Access Toolbar.
Click Cut on the Clipboard group.
Press Ctrl+Z.
Press Ctrl+Shift.
Explanation:
Ctrl+Z
Click and press Delete
Click Undo
What character, when used at the beginning of the constructor name in a class, makes the class variables have a scope limited to the function?
* (an asterisk)
# (a pound sign)
$ (a dollar sign)
_ (an underscore)
Answer:
_ (an underscore)
Explanation:
The underscore character.
__init_ and __str__ have double underscore characters at the beginning and end of the function name.
Correct answer edge 2020
Answer:
The answer to your question is _ (an underscore).
I hope this helps you out and I hope that you have a wonderful day.<3<3<3
Explanation:
To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
1.Create custom theme fonts
2.Create custom theme
3.Create a custom paragraph style
4.Create a custom character style
Answer: crest custom theme
Explanation:
Answer:
crest custom theme
Explanation:
If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
A. O(N)
B. O(logN)
C. O(logN)+O(N)
D. O(NlogN)
Answer:
D. O(NlogN)
Explanation:
The computation of the overall algorithm cost is as follows:
Given that
O(logN) + O(N) × O(logN) + 1
In the case of complexity we considered the high order that dominates the other terms
Thus, that term would be
O(N) × O(logN)
It could be rewrite as
O(NlogN)
Hence, the correct option is D.
All the other options are wrong
Answer:
D. O(NlogN)
Explanation:
the overall algorithm cost would be: O(NlogN).
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Answer:
Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.
a clearly stated objective that how program should work and how it respond to a error is called??
Answer:
A Problem statement
Explanation:
I hope this is right
The Internet began when a large company wanted to sell products online.
True
or
False
Answer:
True
Explanation:
Answer:
It would be true
Explanation:
8.3.9 Text to Binary Python
Using the knowledge in computational language in python it is possible to write a code that write the binary code
Writting the code:
#function that will convert the text to binary
def text_to_binary(text):
#variable to store the converted binary value
binary_text = ""
#iterate for each character in the text
for i in text:
#get the ASCII value of that character
ascii = ord(i)
#call the function to get the value of the
#current ascii number and append it to the
#binary_text
binary_text += decimal_to_binary(ascii)
#return the final converted binary value
return binary_text
def decimal_to_binary(decimal_value):
binary_base = 2
num_bits_desired = 8
binary_value = str(bin(decimal_value))[2:]
while len(binary_value) < num_bits_desired:
binary_value = "0" + binary_value
return binary_value
text = input("Input the string you would like to encode: ")
binary = text_to_binary(text)
print(binary)
See more about python at brainly.com/question/18502436
#SPJ1
select the correct answer
Cyberbullying can negatively impact a victim’s
well-being.
Answer:
whats the questions
Explanation:
Answer:
Physical
Explanation:
took the test
The term structure, as it relates to programming, refers to the decisions you make to design your program to best meet its objective. Coral provides features to create clean, efficient code. How can the basic if/elseif/else control statements help meet structural design objectives in your code?
Answer:
Explanation:
if/elseif/else control statements help accomplish efficient code since it provides a condition. The program analyzes the code and determines if certain criteria are met, if so then it continues down a certain pre-defined path which would be the most efficient path towards the main program objective. If these criteria are not met then the code would follow the next most efficient path. This is all controlled through if/elseif/else statements. They ultimately provide various options for reaching the final objective in an order of most efficient to least efficient.
Question # 1
Multiple Choice
What will be the output of the following program?
def average(a, b):
total = a + b
return total / 2
ave = average(7,11)
print("Total", total)
print ("Average", ave)
A. an error statement since total's scope is limited to the average function.
B. Total 18
Average 9
C. Total18
Average9
D. an error statement since average is a keyword.
Answer:
an error statement since total's scope is limited to the average function.
Explanation:
The scope of total is the function average. Code outside of the function does not have access to its value.
Correct answer edge 2020
Answer:
an error statement since total's scope is limited to the average function.
Explanation:
The scope of total is the function average. Code outside of the function does not have access to its value.
Correct answer edge 2020