Answer:
a type of software that can be freely used and modified.
My code doesn't give me the right output: I have to use the Python input command, and the number could be a decimal fraction, such as 6.5, so I should use floating point numbers?
I need to have a loop that repeats six times, with a routine in the middle of the loop to get the user input as a floating point number and add the number to a sum.
Can someone check it for me?
score_list = [ input("Judge No {} :score ".format(num+1)) for num in range(6)]
int_accumilator :int = 0
for score in score_list:
if(score > 10 ):
print("i only like numbers within the 0-10 range !")
exit()
int_accumilator+= score
print("the average score is ...", int_accumilator/ len(score_list))
Answer:
def get_score(judge_num: int) -> float:
"""
Asks the user for the score of a single judge and returns it.
"""
score = float(input(f"Score for Judge {judge_num}: "))
return score
def calculate_average(scores: list[float]) -> float:
"""
Calculates the average score given a list of scores.
"""
return sum(scores) / len(scores)
# Initialize the total score to 0
total_score = 0
# Initialize an empty list to store the scores of the judges
scores = []
# Loop through each judge
for judge_num in range(1, 7):
# Get the score for the current judge
score = get_score(judge_num)
# Add the score to the total score
total_score += score
# Append the score to the list of scores
scores.append(score)
# Calculate the average score
average_score = calculate_average(scores)
# Print the average score
print(f"The average score is: {average_score:.2f}")
Code to be written in Python
Correct answer will be awarded Brainliest
In this task, we will be finding a possible solution to number puzzles like 'SAVE' + 'MORE' = 'MONEY'. Each alphabet represents a digit. You are required to implement a function addition_puzzle that returns a dictionary containing alphabet-digit mappings that satisfy the equation. Note that if there are multiple solutions, you can return any valid solution. If there is no solution, then your function should return False.
>>> addition_puzzle('ANT', 'MAN', 'COOL')
{'A': 8, 'C': 1, 'L': 9, 'M': 6, 'N': 7, 'O': 5, 'T': 2}
>>> addition_puzzle('AB', 'CD', 'E')
False
Explanations:
ANT + MAN = COOL: 872 + 687 = 1559
AB + CD = E: The sum of two 2-digit numbers must be at least a two-digit number.
Your solution needs to satisfy 2 conditions:
The leftmost letter cannot be zero in any word.
There must be a one-to-one mapping between letters and digits. In other words, if you choose the digit 6 for the letter M, then all of the M's in the puzzle must be 6 and no other letter can be a 6.
addition_puzzle takes in at least 3 arguments. The last argument is the sum of all the previous arguments.
Note: The test cases are small enough, don't worry too much about whether or not your code will run within the time limit.
def addition_puzzle(*args):
pass # your code here
Answer:
Here is one possible solution to this problem in Python:
from itertools import permutations
def addition_puzzle(*args):
# Get all permutations of the digits 0-9
digits = list(range(10))
all_permutations = list(permutations(digits))
# Iterate through each permutation
for perm in all_permutations:
# Create a dictionary mapping each alphabet to a digit
mapping = {alphabet: digit for alphabet, digit in zip(args[0], perm)}
if all(mapping[alphabet] != 0 for alphabet in args[0]):
# Check if the sum of the numbers is equal to the last argument
num1 = int(''.join(str(mapping[alphabet]) for alphabet in args[1]))
num2 = int(''.join(str(mapping[alphabet]) for alphabet in args[2]))
if num1 + num2 == int(''.join(str(mapping[alphabet]) for alphabet in args[3])):
return mapping
# If no solution is found, return False
return False
print(addition_puzzle('ANT', 'MAN', 'COOL'))
print(addition_puzzle('AB', 'CD', 'E'))
Explanation:
This solution first generates all possible permutations of the digits 0-9 using the permutations function from the itertools module. Then, it iterates through each permutation and creates a dictionary mapping each alphabet to a digit. It checks if the leftmost letter in any word is not zero and if the sum of the numbers is equal to the last argument. If both conditions are satisfied, it returns the mapping. If no solution is found after iterating through all permutations, it returns False.
Code to be written in python:
Correct answer will get brainliest :)
Mr Wu has been going to work every day by taxi for many years. However, the taxi fare has been increasing rather quickly in recent years. Therefore, he is considering driving to work instead. One of the costs for driving is the parking fee. The parking rates of the car park at Mr Wu's workplace are as shown as below:
Weekdays:
$2 per hour between 4am and 7am
$1.20 per half hour between 7am and 6pm
$5 per entry after 6pm
Saturdays:
$2.50 per hour between 4am and 7am
$1.50 per half hour between 7am and 6pm
$7 per entry after 6pm
Sunday: Flat rate of $5 per entry
For all days, there is a grace period of 10 minutes.
The car park opens between 4am and 12 midnight daily. We assume vehicles are magically ejected at midnight.
There is a 10% surcharge on weekdays and a 20% surcharge on Saturdays for vehicles who park for more than 10 hours. There are no surcharges on Sunday.
There is an additional fee of $3 for exiting after 10pm on any day.
Your task is to write a function compute_fee(day, time_in, time_out) that computes the parking fee, where day is an integer between 1 and 7, with 7 representing Sunday, while time_in and time_out are integer values in a 24-hour format - e.g. 700 for 7am and 2359 for 11:59pm. Assume all input is valid.
Below are a few examples of how the fee is calculated:
Example 1: Tuesday, 4:29am to 7:50am.
• 4:29am to 7am is charged as 3 1-hour slots: $2.00 * 3 = $6.00
• 7am to 7:50am is charged as 2 30-minute slots: $1.20 * 2 = $2.40
• Total fee = $6.00 + $2.40 = $8.40
Example 2: Saturday, 7:01am to 7:49pm.
• 7:01am to 6pm is charged as 22 30-minute slots: $1.50 * 22 = $33.00
• 6pm to 7:49pm is charged as one entry: $7.00
• 20% Surcharge for parking more than 10 hours: ($33.00 + $7.00) * 20% = $8.00
• Total fee = $33.00 + $7.00 + $8.00 = $48.00
Example 3: Sunday, 3pm to 10:01pm.
• 3pm to 10:01pm is charged as one entry: $5.00
• Additional fee for exiting after 10pm: $3.00
• Total fee = $5.00 + $3.00 = $8.00
Example 4: Thursday, 11:49pm to 11:59pm.
• Grace period
• Total fee = $0.00
Example 5: Monday, 12pm to 10:01pm.
• 12pm to 6pm is charged as 12 30-minute slots: $1.20 * 12 = $14.40
• 6pm to 10:01pm is charged as one entry: $5.00
• 10% Surcharge for parking more than 10 hours: ($14.40 + $5.00) * 10% = $1.94
• Additional fee for exiting after 10pm: $3.00
• Total fee = $14.40 + $5.00 + $1.94 + $3.00 = $24.34
def compute_fee(day, time_in, time_out):
"""Your code here"""
Test Cases:
compute_fee(2, 429, 750) 8.4
compute_fee(6, 701, 1949) 48
compute_fee(7, 1500, 2201) 8
compute_fee(4, 2259, 2301) 0
compute_fee(1, 1200, 2201) 24.34
Here is the requested Python function that computes the parking fee based on the given information:
"1jaiz4 and 1 more users found this answer helpful" - who the heII is 1jaiz4?
i was the one that rated that answer like waht
Answer:
My suspicioun is that they are fake engagements/profiles created by Brainly to boost the reputability of the answer.
Explanation:
TLDR; it's probably fake
Answer:
most likely a fake pf, its just so that answers can gain credibility.
Explanation:
explain the steps to adding a password in Smart Art
Answer:
To add a password to a SmartArt graphic in Microsoft PowerPoint, follow these steps:
Open the PowerPoint presentation containing the SmartArt graphic that you want to add a password to.
Select the SmartArt graphic by clicking on it.
In the ribbon at the top of the window, click the "Format" tab.
In the "Format" tab, click the "Security" button.
In the "Security" dialog box that appears, click the "Password" tab.
In the "Password" tab, enter a password in the "Password" field.
Re-enter the password in the "Confirm password" field to confirm it.
Click the "OK" button to save the password.
Save the presentation. The SmartArt graphic will now be protected with the password that you set. You will need to enter the password to edit or modify the SmartArt graphic.
Identifying the Location of the Property Sheet
es
When active, where is the Property Sheet located?
o to the left of the tables and reports
O above the tables and reports
O to the right of the tables and reports
O below the tables and reports
We
Answer: C) To the right of the tables and reports
differentiate between RAM and ROM
Explanation:
RAM is a volatile memory that temporarily stores the files you are working on.
ROM is a non-volatile memory that permanently stores instructions for your computer.
Which of the following is a factor that could cause an individual to have excited delirium syndrome?
Choose only ONE best answer.
PMS
Ulcer
Nose bleed
D
Respiratory problems
Respiratory problems is a factor could cause an individual to have excited
delirium syndrome.
People with excited delirium syndrome exhibit unique characteristics such as
Paranoia HallucinationViolenceDistressThis is usually as a result of the use of some drugs such as cocaine and
methamphetamine which decreases the effect of dopamine modulating
respiratory functions thereby resulting to asphyxia and cardiac arrest.
Read more about Syndromes here https://brainly.com/question/24825576
8 cosas que hacemos que gastan mucha energia
6. This interface uses only commands that you type:
To protect your online privacy, you should not?
A. be careful when talking to strangers online.
B. use an antivirus software.
C. download updates for mobile devices and computers.
D. use the same password for every account.
Answer:
Your answer to this will be D) Use the same password for every account.
Explanation:
This is the only option you should not do. If someone gets access or hacks into one of your accounts, and all accounts to anything are the same password they will have all of your accounts.
Write a program that prompts the user to enter the hourly rate, the total consulting time, and whether the person has low income. The program should output the billing amount. Your program must contain a function that takes as input the hourly rate, the total consulting time, and a value indicating whether the person has low income. The function should return the billing amount. Your program may prompt the user to enter the consulting time in minutes.
Answer:
Explanation:
The following program was written in Java. It creates the function as requested and asks the user for all the values as inputs. No proper reason was given for asking for low income so I just added it as a yes or no print statement. The picture below shows the inputs and outputs of the program.
import java.util.ArrayList;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Hourly rate: ");
double rate = in.nextDouble();
System.out.println("Consulting Time in minutes: ");
int consultingTime = in.nextInt();
System.out.println("Low Income? y/n");
String lowIncome = in.next().toLowerCase();
String lowIncomeAnswer;
if (lowIncome.charAt(0) == 'y') {
lowIncomeAnswer = "Yes";
} else {
lowIncomeAnswer = "No";
}
System.out.println("Billing Amount: " + billing(rate, consultingTime, lowIncome));
System.out.println("Low Income: " + lowIncomeAnswer);
}
public static double billing(double rate, int consultingTime, String lowIncome) {
double timeHours = consultingTime / 60;
double billing = rate * timeHours;
return billing;
}
}
Which of the following are numbers and text that do not change unless manually altered?
equal sign
references
constants
mathematical operators
Answer:
constants are numbers and text that do not change unless manually altered.
Answer: c
Explanation:
The most reliable way to store important files without having to worry about backups or media failure is ____________.
A) cloud storage
B) on a USB flash drive
C) on a hard disk drive
D) on an optical disc
what is primary key? List any two advantage of it.
Why does trust usually break down in a designer-client relationship?
A lack of service
B lack of privacy
C lack of communication
D lack of contract
Trust is usually broken down in a designer-client relationship due to a lack of service. Thus, the correct option for this question is A.
How do you end a client relationship?You would end a client relationship by staying calm, rational, and polite. Apart from this, reasons for terminating the relationship, but keep emotion and name-calling out of the conversation.
Follow-up with a phone call. You can start the process with an email, but you should follow up with a phone call in order to talk your client through the process and answer any questions.
But on contrary, one can build trust with clients by giving respect to them, Admit Mistakes and Correct Ethically, listening to them, listening to their words first followed by a systematic response, etc.
Therefore, trust is usually broken down in a designer-client relationship due to a lack of service. Thus, the correct option for this question is A.
To learn more about Client relationships, refer to the link:
https://brainly.com/question/25656282
#SPJ1
What is Accenture's approach when it comes to helping our clients with security?
Answer: Once actual project work starts, the CDP approach is implemented across all active contracts, helping Accenture client teams work with clients to drive a security governance and operational environment that addresses the unique security risks of each client engagement.
Explanation: Hopefully this helps you (Don't know if this is the right answer pls don't report if it is the wrong answer)
You are given a design board with four input pins a 4-bit INDATA,
1-bit Load,Enable, and Clock; and one output, a 4-bit OUTDATA.
Build a sequential circuit that contains a register (Don’t forget to
trigger that register by the FALLING edge of the clock, Logisim’s default
is the opposite!).
The register is updated every clock cycle in which Enable is up. If
Load is down, the register is incremented, otherwise it is loaded with the
data asserted on the INDATA pin.
The register data output should be connected with the output pin
OUTDATA.
The steps to Build a sequential circuit that contains a register is given below
The first step is to connect the 4-bit INDATA input to the data input of a 4-bit register.Next, we need to connect the Load and Enable inputs to a multiplexer. The multiplexer will be used to select between the INDATA input and the output of the register.The multiplexer output should be connected to the input of the register.We also need to create an AND gate that will be used to trigger the register on the falling edge of the clock. The AND gate should have the Clock input as well as the Enable input as its inputs.The output of the AND gate should be connected to the clock input of the register.The output of the register should be connected to the OUTDATA output.Create a NOT gate and connect the Load input to it, and connect the output of the NOT gate to one of the multiplexer input.Connect the output of the register to the second input of the multiplexer.What is the design board about?To build a sequential circuit that contains a register, we can use a combination of logic gates, flip-flops, and multiplexers.
In the above way, the register will be updated every clock cycle in which the Enable input is high. If the Load input is low, the multiplexer will select the output of the register and it will be incremented.
Otherwise, the multiplexer will select the INDATA input and the register will be loaded with the data asserted on the INDATA pin. The output of the register will be connected to the OUTDATA output, providing the register data.
Learn more about design board from
https://brainly.com/question/28721884
#SPJ1
Q1: Fill in the blanks in each of the following statements: a. The international standard database language is ______________. b. A table in a database consists of ___________and ___________ c. Statement objects return SQL query results as ___________ d. The ___________uniquely identifies each row in a table. e. SQL keyword _________ is followed by the selection criteria that specify the rows to selectin a query. f. SQL keywords ___________specify the order in which rows are sorted in a query. g. Merging rows from multiple database tables is called __________ the tables. h. A(n) ________ is an organized collection of data. i. A(n) ________is a set of columns whose values match the primary-key values of anothertable. j. method _______is used to obtain a Connection to a database. k. Interface ___________helps manage the connection between a Java program and adatabase. l. A(n) ___________object is used to submit a query to a database
Answer:
a. SQL.
b. Rows and columns.
c. ResultSet objects.
d. Primary key.
e. WHERE.
f. ORDER BY.
g. Joining.
h. Database.
i. Foreign key.
j. DriverManager; getConnection ().
k. Connection.
l. Statement.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A structured query language (SQL) can be defined as a domain-specific language designed and developed for managing the various data saved in a relational or structured database.
In Computer programming, any word restricted for use, only in object names because they belong to the SQL programming language are called reserved word.
Some examples of reserved words in structured query language (SQL) are UPDATE, GROUP, CURRENT_USER, CURRENT_DATE, WHERE, CREATE, DELETE, ORDER BY, etc.
Filling in the missing words or texts in the question, we have;
a. The international standard database language is SQL.
b. A table in a database consists of rows and columns.
c. Statement objects return SQL query results as ResultSet objects.
d. The primary key uniquely identifies each row in a table.
e. SQL keyword WHERE is followed by the selection criteria that specify the rows to selectin a query.
f. SQL keywords ORDER BY the order in which rows are sorted in a query.
g. Merging rows from multiple database tables is called joining the tables.
h. A database is an organized collection of data.
i. A foreign key is a set of columns whose values match the primary-key values of another table.
j. DriverManager method, getConnection () is used to obtain a Connection to a database.
k. Interface connection helps manage the connection between a Java program and a database.
l. A statement object is used to submit a query to a database.
Which type of query should be used to select fields from one or more related tables in a database? Crosstab Find duplicates Simple Outer Join
Data files in specified directories can be opened by applications as if they were in the current directory. Append displays the appended directory list when it is invoked without any parameters.
What is the use of append query in database?A query that appends copies selected records to an existing table by selecting them from one or more data sources.
Consider, for instance, that you already have a table in your existing database that maintains this type of data and that you acquire a database that contains a table of possible new clients.
Therefore, append query should be used to select fields from one or more related tables in a database. Using records from one or more tables, an add query creates a new table.
Learn more about database here:
https://brainly.com/question/22536427
#SPJ1
what are the qualitative data items about text book
Answer:
Qualitative data is defined as the data that approximates and characterizes. Qualitative data can be observed and recorded. ... This type of data is collected through methods of observations, one-to-one interviews, conducting focus groups, and similar methods.
MS-DOS can be characterized by which statement?
known for being user friendly
designed for smartphones
a command-line interface
a graphical user interface
Answer:
MS-Dos was a computer invented a long time ago, and it was one of the first computers that had a command-line interface.
Your answer is C.
Read the excerpt below from the play Antigone by Sophocles and answer the question that follows.
ANTIGONE:
I did not think
anything which you proclaimed strong enough
to let a mortal override the gods
and their unwritten and unchanging laws.
They’re not just for today or yesterday,
but exist forever, and no one knows
where they first appeared.
What does the passage reveal about the beliefs of the ancient Greeks?
A. Some believed humans were the ultimate authority.
B. Some believed women were the ultimate authority.
C. Some believed men were the ultimate authority.
D. Some believed the gods were the ultimate authority.
Answer:
D. Some believed the gods were the ultimate authority.
Explanation:
These tools protect networks from external threats.
A) firewalls
B) routers
C) antivirus software
D) VPN
Answer:
for safety everyone is needed, read the explanation
Explanation:
These tools protect networks from external threats.
A) firewalls
B) routers
C) antivirus software
D) VPN
the firewall, which can be installed in the pc but some routers also have it.
An antivirus is certainly needed, an antimalware is missing from the list, which is essential, for the VPN it is also useful to make believe you are connected in one place and instead you are in another, so I would say that all are needed for PC security
why does a computer system need memory
Explanation:
Computer memory is a temporary storage area. It holds the data and instructions that the Central Processing Unit (CPU) needs.
A question to determine your ability to use the reference materials effectively. Your boss has determined that you will be using the CIS-20 Security Controls. He has indicated that your organization must restrict access to client machine's use of wireless so that machines with a vital business purpose can only be allowed on approved wireless networks and not allowed on other wireless networks. His question is this: which Implementation Group does this security control apply toward
Answer:
The answer is "implement on group 2 and group 3".
Explanation:
In the given scenario, When technology workers are using in the project teams. People like to be stable, and we can't allow wireless network transmission to maintain their security and privacy. When we considering category 1 being the only ones who have links to a higher authority, that's why Group 2 and Group 3 were needing to be implemented.
how computer user interact with an application programs
Answer:
From the help of graphic user interface
Explanation:
A graphical user interface, or GUI, is used in almost all software programmes. This indicates that the software contains graphical functions that the user can manipulate using a any input device like mouse or keyboard. A software configuration program's graphical user interface (GUI) contains a menu bar, toolbar, tabs, controls, as well as other functions.
A yellow inspection tag on a scaffold means the scaffold has been inspected and
Answer:CAUTION
Explanation: on edg
• Describe the core components and terminology of Group Policy.
The core components and terminology of the group policy are directory services and file sharing.
What is the group policy component?A GPO is a virtual object that stores policy-setting information and consists of two parts: GPO's and their attributes are saved in a directory service, such as Active Directory.
It essentially provides a centralized location for administrators to manage and configure the settings of operating systems, applications, and users.
File share: GPO's can also save policy settings to a local or remote file share, such as the Group Policy file share.
Therefore, the group policy's main components and terminology are directory services and file sharing.
To learn more about the group policy component, visit here:
https://brainly.com/question/14275197
#SPJ1
Which of the following devices can store large amounts of electricity, even when unplugged?
LCD monitor
DVD optical drive
CRT monitor
Hard disk drive
Even when unplugged, a CRT (Cathode Ray Tube) monitor can store a lot of electricity. The capacitors within CRT monitors can store enough power to be fatal, thus you should never open one.
What does CRT stand for?An electron beam striking a phosphorescent surface creates images in a cathode-ray tube (CRT), a specialized vacuum tube. CRTs are typically used for desktop computer displays. The "picture tube" in a television receiver is comparable to the CRT in a computer display.
What characteristics does CRT have?Flat screen, touch screen, anti-reflective coating, non-interlaced, industrial metal cabinet, and digital video input signal are typical features of CRT monitors. As opposed to the typically curved screen found in most CRT displays, the monitor's screen can be (almost) flat.
To learn more about CRT monitors visit:
brainly.com/question/29525173
#SPJ1
Answer:
CRT monitor
Explanation:
A cathode ray tube (CRT) monitor can store large amounts of electricity, even when unplugged. You should never open a CRT monitor, as the capacitors within the CRT can store enough electricity to be lethal.
LCD monitors do not use large capacitors and are much safer to work on than CRT monitors (although the CCFL backlight has mercury vapor in it, which could be harmful if the tube is broken).
DVD optical drives and hard disk drives do not store electricity in sufficient quantity to be harmful.