Answer:
val = int(input("Enter a positive odd value "))
flag = True # let the number entered is alreay prime
if(val > 2 and val%2 == 1): # prime numbers start from 2
half = int(val/2);
for div in range(2,half): # dividing the number from 2 to half of its number
if(val % div == 0): # if completely divisible
print("Not prime")
flag = False # Changing the status of prime number as false
break
if(flag == True):
print(val, "is a prime number")
else:
print("Invalid input, Please Enter a valid positive odd number")
Explanation:
Steps:
1. Let us take input from the user using input() method.
2. Initially, let the number is prime.
3. If the number is negative or even, the go to else part and ask the user for a valid input and terminate the program by giving a message to user.
(We actually check for values greater than 2 because 1 is not considered as a prime number)
4. If the number is positive and odd, then we keep on dividing the number from 2 to half of its number.
(We actually check for values greater than 2 because 1 is not considered as a prime number)
5. If the number is divisible, we change the status to False and break the loop.
6. If the flag is still True, we print that it is a Prime number else we print that it is not a prime number.
Please refer to the comments section as well and the attached image for proper indentation of the program.
Complete this truth Table. Write a program that you can enter from the keyboard, a 1 or 0 into three Boolean variables, A,B,C. Write an if statement that tests the condition ( (A or B ) and C ). Run the program 8 separate times, testing each of the following 8 combinations. Write the results below in the following truth table.
Module 9-Alternative Sequences and Complex logical Criteria v17 (1).pdf. Adobe Acrobat Reader DC
File Edit View Window Help
Home Tools Module 9 - Altema...X
A B C (A or B ) (A or B ) and C
0 0 0
0 0 1
0 1 0
0 1 1
1 0 0
1 0 1
1 1 0
1 1 1
Answer:
Following are the code to this question:
#include<stdio.h>//defining header file
int AND(int x,int y) //defining a method AND that hold two variable in its parameter
{
if(x==1 && y==1)//defining if block to check x and y value is equal to 1
{
return 1;//return value 1
}
else //defining else block
{
return 0;//return value 0
}
}
int OR(int x,int y)//defining method OR that hold two variable in its parameter
{
if(x==0&&y==0)//defining if block to check x and y value is equal to 1
{
return 0;//return value 0
}
else //defining else block
{
return 1;//return value 1
}
}
int main()//defining main method
{
int a,b,c;//defining integer variable
int k=1;//defining integer variable k that holds a value 1
while(k<=8)//defining while loop for 8 time input
{
printf("Please insert 3 numbers in (0 0r 1):\n ");//print message
scanf("%d%d%d", &a, &b, &c);//input value
k++;//increment the value of k by 1
printf("value: %d\n",AND(OR(a,b),c));
}
return 0;
}
Output:
please find the attachment.
Explanation:
In the above-given C language code two methods "AND and OR" is declared, holds two integer variable "x and y" in its parameters, inside the method a conditional it used that can be defined as follows:
In the AND method, inside a conditional statement, if block check x and y both value is same that is 1 it will return 1 or it will goto else block in this it will return value 0. In the OR method, inside a conditional statement, if block check x and y both value is the same, that is 0 it will return 0 or it will goto else block in this it will return value 1.In the main method, four integers "a,b,c, and k" is declared in which variable "a, b, c" is used in the loop for 8 times input values from the user and print method is used to call the method and prints its return values.The variable sentence stores a string. Write code to determine how many words in sentence start and end with the same letter, including one-letter words. Store the result in the variable same_letter_count.
Answer:
sentence = "hello wow a stores good"
same_letter_count = 0
sentence_list = sentence.split()
for s in sentence_list:
if s[0] == s[-1]:
same_letter_count += 1
print(same_letter_count)
Explanation:
*The code is in Python.
Initialize the sentence with a string
Initialize the same_letter_count as 0
Split the sentence using split method and set it to the sentence_list
Create a for loop that iterates through the sentence_list. If the first and last of the letters of a string are same, increment the same_letter_count by 1
When the loop is done, print the same_letter_count
Write a program that takes as command-line arguments an integer N and a double value p (between 0 and 1), plots N equally spaced dots of size .05 on the circumference of a circle, and then, with probability p for each pair of points, draws a gray line connecting them.
Answer:
Please see below
Explanation:
Suppose N = 10. And you have these dots equidistant from each other, and probability = 0.3. According to the data provided in the question statement, we will then have forty-five pairs of points. The task is to draw lines amongst these pairs, all 45 of them, with a 30% probability. Keep in mind that every one of the 45 lines are independent.
A few lines of simple code (just some for loops) needed to run this is attached in the image herewith, .
Assume a PHP document named hello.php has been saved in a folder named carla inside the htdocs folder on your computer. Which is the correct path to enter to view this page in a browser?
The available options are:
A. localhost/Carla/hello.php
B. localhost/htdocs/hello.php
C. localhost/htdocs/Carla/hello.php
D. carla/hello.php5
Answer:
C. localhost/htdocs/Carla/hello.php
Explanation:
A path in computer programming can be defined as the name of a file or directory, which specifies a unique location in a file system.
Therefore, to get the correct path to enter to view this page in a browser, one needs to follow the directory tree hierarchy, which is expressed in a string of characters in which path components, separated by a delimiting character, represent each directory.
Hence, correct path to enter to view this page in a browser is "localhost/htdocs/Carla/hello.php"
For the Python program below, will there be any output, and will the program terminate?
while True: while 1 > 0: break print("Got it!") break
a. Yes and no
b. No and no
c. Yes and yes
d. No and yes
e. Run-time error
Boolean expressions control _________________ Select one: a. recursion b. conditional execution c. alternative execution d. all of the above
Answer:
Option D, all of the above, is the right answer.
Explanation:
A Boolean expression is an expression in Computer Science. It is employed in programming languages that create a Boolean value when it is evaluated. There may be a true or false Boolean value. These expressions correspond to propositional formularies in logic. In Boolean expression, the expression 3 > 5 is evaluated as false while 5 > 3 is evaluated as true
Boolean expressions control all of the above method execution and as such option d is correct.
What is Boolean expressions?A Boolean expression is known to be a kind of logical statement that is said to be one of the two options that is it can be TRUE or FALSE .
Conclusively, Note that Boolean expressions are used to compare two or more data of any type only if both parts of the expression have equal basic data type. Boolean expressions control recursion, conditional execution and alternative execution.
Learn ore about Boolean expressions from
https://brainly.com/question/25039269
Which functions are examples of logical test arguments used in formulas? Check all that apply. OR IF SUM COUNT NOT AND
Answer: Which functions are examples of logical test arguments used in formulas? Check all that apply.
Explanation: A.or B.if E.not F. And
This is correct just took it :)
Among the following functions, those that are the logical test arguments used in formulas are OR, IF, NOT and, AND.
What are logical test argument functions ?To compare several conditions or numerous sets of conditions, logical functions are utilized. By weighing the arguments, it determines if the answer is TRUE or FALSE.
These operations are used to determine the outcome and aid in choosing one of the available data. The contents of the cell are assessed using the appropriate logical condition depending on the necessity. The types of logical functions used in this tutorial include: OR, AND, IF, NOT and XOR.
These all functions are used in different conditions. Therefore, for the given options the logical testing arguments are OR, IF, NOT and, AND. They are very common functions in Excel sheet.
Find more on logical functions :
https://brainly.com/question/27053886
#SPJ3
a software development management tool that easily integrates into his business’s enterprise software/information system
Answer:
Enterprise software/system
Explanation:
Enterprise software which is also known as Enterprise Application Software (EAS) is computer software that its primary function is to meet the needs of an organization rather than that of an individual.
EAS or Enterprise System is the software development management tool that easily integrates into a business' enterprise software system.
7. When using find command in word we can search?
a. Characters
b. Formats
c. Symbols
d. All of the above
Answer:
When using find command in word we can search all of the above
A number, a, is a power of b if it is divisible by b and a/b is a power of b. Write a function called is_power that takes parameters a and b and returns True if a is a power of b.
Answer:
Here is the Python program.
def is_power(a, b): # function that takes two positive integers a and b as arguments
if a == b: #first base case: if both the numbers are equal
return True #returns True if a=b
elif b==1: #second base case: if the value of b is equal to 1
return False #returns False if b==1
else: #recursive step
return a%b==0 and is_power(a/b, b) #call divisible method and is_power method recursively to determine if the number is the power of another
Explanation:
return a%b==0 and is_power(a/b, b) statement basically means a number, a, is a power of b if it is divisible by b and a/b is a power of b
In the statement return a%b==0 and is_power(a/b, b) , a%b==0 checks whether a number a is completely divisible by number b. The % modulo operator is used to find the remainder of the division. If the remainder of the division is 0 it means that the number a is completely divisible by b otherwise it is not completely divisible.
The second part of the above statement calls is_power() method recursively. The and operator between the two means that both of the parts of the statement should be true in order to return true.
is_power() method takes two numbers a and b as arguments. First the method checks for two base cases. The first base case: a == b. Suppose the value of a = 1 and b =1 Then a is a power of b if both of them are equal. So this returns True if both a and b are equal.
Now the program checks its second base case b == 1. Lets say a is 10 and b is 1 Then the function returns False because there is no positive integer that is the power of 1 except 1 itself.
Now the recursive case return return a%b==0 and is_power(a/b, b) takes the modulo of a and b, and is_power method is called recursively in this statement. For example if a is 27 and b is 3 then this statement:
a%b==0 is True because 27 is completely divisible by 3 i.e. 27 % 3 = 0
is_power(a/b,b) is called. This method will be called recursively until the base condition is reached. You can see it has two arguments a/b and b. a/b = 27/3 = 9 So this becomes is_power(9,3)
The base cases are checked. Now this else statement is again executed return a%b==0 and is_power(a/b, b) as none of the above base cases is evaluated to true. when a%b==0 is True as 9 is completely divisible by 3 i.e. 9%3 =0 and is_power returns (9/3,3) which is (3,3). So this becomes is_power(3,3)
Now as value of a becomes 3 and value of b becomes 3. So the first base case a == b: condition now evaluates to true as 3=3. So it returns True.
Now in order to check the working of this function you can call this method as:
print(is_power(27, 3))
The output is:
True
#Write a function called after_second that accepts two #arguments: a target string to search, and string to search #for. The function should return everything in the first #string *after* the *second* occurrence of the search term. #You can assume there will always be at least two #occurrences of the search term in the first string. # #For example: # after_second("11223344554321", "3") -> 44554321 # #The search term "3" appears at indices 4 and 5. So, this #returns everything from the index 6 to the end. # # after_second("heyyoheyhi!", "hey") -> hi! # #The search term "hey" appears at indices 0 and 5. The #search term itself is three characters. So, this returns #everything from the index 8 to the end. # #Hint: This may be more complicated than it looks! You'll #have to look at the length of the search string and #either modify the target string or take advantage of the #extra arguments you can pass to find(). #Write your function here!
Answer:
Following are the code to this question:
def after_second(s,sub):#defining a method a fter_second
first = s.find(sub)#defining a variable first that hold method find value
if first != -1:#defining if block to check first variable value not equal to -1 using slicing
s = s[len(sub)+first:]#defining s variable to calculate sub parameter length of parameter and use slicing
second = s.find(sub)#defining second variable to calculate find method value
if second != -1:#defining if block to calculate second variable slicing
return s[len(sub)+second:]#return s variable value
print(after_second("heyyoheyhi","hey"))#defining print method to call after_second method
print(after_second("11223344554321","3"))#defining print method to call after_second method
Output:
hi
44554321
Explanation:
In the above python code a method "after_second" is declared, that accepts two-variable "s, and sub" as the parameter inside the method a first variable is declared that uses the inbuilt method "find" to find the value and stores it value. In the next step, two if blocks are used, in which both if blocks use the slicing to checks its value is not equal to "-1".
In the first, if block the first variable is declared that uses the s variable to calculate subparameter length by using slicing and defines the second variable that finds its value and stores its value. In the next, if block the s variable is used to return its calculated value, and at the end of the print, the method is used to call the method by passing parameter value and prints its return value.Class or Variable "____________" serve as a model for a family of classes or variables in functions` definitions
Answer:
Parameter.
Explanation:
A parameter variable stores information which is passed from the location of the method call directly to the method that is called by the program.
Class or Variable parameter serve as a model for a family of classes or variables in functions' definitions.
For instance, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.
Hence, when you create classes or variables in a function, you can can set the values for their parameters.
For instance, to pass a class to a family of classes use the code;
\\parameter Name as Type (Keywords) = value;
\\procedure XorSwap (var a,b :integer) = "myvalue";
Which of these statements are true about managing through Active Directory? Check all that apply.
Answer:
ADAC uses powershell
Domain Local, Global, and Universal are examples of group scenes
Explanation:
Active directory software is suitable for directory which is installed exclusively on Windows network. These directories have data which is shared volumes, servers, and computer accounts. The main function of active directory is that it centralizes the management of users.
It should be noted thst statements are true about managing through Active Directory are;
ADAC uses powershellDomain Local, Global, and Universal are examples of group scenes.Active Directory can be regarded as directory service that is been put in place by Microsoft and it serves a crucial purpose for Windows domain networks.
It should be noted that in managing through Active, ADAC uses powershell.
Therefore, in active directory Domain Local, Global, and Universal are examples of group scenes .
Learn more about Active Directory at:
https://brainly.com/question/14364696
K-Map is a method used for : 1 Solving number system 2 To apply De-morgan’s Law 3 To simplify Logic Diagram 4 Above all
Answer:
The answer is to simplify the logic diagrams.
Explanation:
With the help of K-map, we can find the Boolean expression with the minimum number of the variables. To solve the K-map, there is no need of theorems of the Boolean algebra. There are 2 forms of the K-map - POS (Product of Sum) and SOP (Sum of Product), these forms are used according to the requirement. From these forms, the expression can be found.
How I to turn this ''loop while'' in ''loop for''?
var i = 0;
while (i < 20) {
var lineY = 20 + (i * 20);
line(0, lineY, 400, lineY);
i++;
}
Answer:
for (var i = 0; i <20; i++)
{
var lineY = 20 + (i * 20);
line(0, lineY, 400, lineY);
}
Explanation:
To turn the loop while to for loop, you start by considering the iterating variable i and its iterating operations which are;
var i = 0; while (i < 20) and i++;
Where var i = 0; is the initializing statement
(i < 20) is the conditional statement
i++ is the increment
The next is to combine these operations to a for loop; using the following syntax: for(initializing; condition; increment){}
This gives: for(var i = 0; i<20; i++)
Hence, the full code snippet is:
for (var i = 0; i <20; i++)
{
var lineY = 20 + (i * 20);
line(0, lineY, 400, lineY);
}
The most widely used presentation software program is Microsoft PowerPoint. You can produce a professional and memorable presentation using this program if you plan ahead and follow important design guidelines. What text and background should you use in a darkened room
Answer:
Light text on a dark background
Explanation:
Microsoft PowerPoint is an application software in which the company ables to introduce themselves by making slides and presented to an audience in an easy and innovative way. In this, we can add pictures, sound, video by adding the different text, colors, backgrounds, etc
For memorable and professional presentations, the light text on a dark background is a best combination as it is easy to read and give the best view of the message you want to convey.
You want to change your cell phone plan and call the company to discuss options. This is a typical example of CRM that focuses on_______loyalty programs for current customerscustomer service and supportprofitability for the companyacquisition of new customers.
Answer:
customer service and support
Explanation:
-Loyalty programs for current customers refer to incentives companies provide to existing customers to encourage them to keep buying their products or services.
-Customer service and support refers to the assistance companies provide to their existing customers to help them solve issues or provide information about their current products or services and other options.
-Profitability for the company refers to actions that will increase the financial gains of the company.
-Acquisition of new customers refers to actions implemented to attract clients.
According to this, the answer is that this is a typical example of CRM that focuses on customer service and support because you call the company to get assistance with options to change your current products.
The other options are not right because the situation is not about incentives for the customer or actions the company implements to increase its revenue. Also, you are not a new customer.
A signal travels from point A to point B. At point A, the signal power is 100 W. At point B, the power is 90 W. What is the attenuation in decibels?
Answer:
[tex]Attenuation = 0.458\ db[/tex]
Explanation:
Given
Power at point A = 100W
Power at point B = 90W
Required
Determine the attenuation in decibels
Attenuation is calculated using the following formula
[tex]Attenuation = 10Log_{10}\frac{P_s}{P_d}[/tex]
Where [tex]P_s = Power\ Inpu[/tex]t and [tex]P_d = Power\ outpu[/tex]t
[tex]P_s = 100W[/tex]
[tex]P_d = 90W[/tex]
Substitute these values in the given formula
[tex]Attenuation = 10Log_{10}\frac{P_s}{P_d}[/tex]
[tex]Attenuation = 10Log_{10}\frac{100}{90}[/tex]
[tex]Attenuation = 10 * 0.04575749056[/tex]
[tex]Attenuation = 0.4575749056[/tex]
[tex]Attenuation = 0.458\ db[/tex] (Approximated)
"The ______ code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious Web site in an email or opening an infected PDF file."
Answer:
Dropper.
Explanation:
A rootkit can be defined as a collection of hidden malicious computer software applications that gives a hacker, attacker or threat actor unauthorized access to parts of a computer and installed software. Some examples of rootkits are trojan, virus, worm etc.
The dropper code of a rootkit gets the rootkit installation started and can be activated by clicking on a link to a malicious website in an email or opening an infected PDF file such as phishing.
Hence, the dropper code of a rootkit launches and installs the loader program and eventually deletes itself, so it becomes hidden and not be noticed by the owner of the computer.
A rootkit can affect the performance of a computer negatively causing it to run slowly.
If distances are recorded as 4-bit numbers in a 500-router network, and distance vectors are exchanged 3 times/second, how much total bandwidth (in bps) is used by the distributed routing algorithm
Answer:
A total of 6,000 bps of bandwidth is used by the distributed routing algorithm
Explanation:
This is a bandwidth requirement question.
We proceed as follows;
To calculate the total number of bits for a routing table, we use the following formula;
Routing table=Number of routers * length of cost
we are given the following parameters from the question;
Number of routers = 500
length of cost = 4 bits
Routing table = 500*4
=2000
Hence, a routing table is 2000 bits in length.
Now we proceed to calculate the bandwidth required on each line using the formula below;
Bandwidth = no.of seconds * no.of bits in routing table
Bandwidth required on each line = 3*2000
=6000
What is a what if analysis in Excel example?
Answer:
What-If Analysis in Excel allows you to try out different values (scenarios) for formulas. The following example helps you master what-if analysis quickly and easily.
Assume you own a book store and have 100 books in storage. You sell a certain % for the highest price of $50 and a certain % for the lower price of $20.
(i really hope this is what u needed)
CHALLENGE ACTIVITY 2.1.2: Assigning a sum. Write a statement that assigns total_coins with the sum of nickel_count and dime_count. Sample output for 100 nickels and 200 dimes is: 300
Answer:
Assuming python language:
total_coins = nickel_count + dime_count
Explanation:
The values of nickel_count and dime_count are added together and stored into total_coins.
Cheers.
Following are the code to the given question:
Program Explanation:
Defining a variable "nickel_count, dime_count" that initializes the value that is "100, 200" within it.In the next step, the "total_coins" variable is declared that initializes with 0.After initializing into the "total_coins" we add the above variable value and print its value.Program:
nickel_count = 100#defining a variable nickel_count that holds an integer value
dime_count = 200#defining a variable dime_count that holds an integer value
total_coins = 0#defining a variable total_coins that initilize the value with 0
total_coins = nickel_count + dime_count#using total_coins that adds nickel and dime value
print(total_coins)#print total_coins value
Output:
Please find the attached file.
Learn more:
brainly.com/question/17027551
Recall that within the ArrayBoundedQueue the front variable and the rear variable hold the indices of the elements array where the current front and rear elements, respectively, of the queue are stored. Which of the following code sequences could be used to correctly enqueue element into the queue, assuming that enqueue is called on a non-full queue and that the code also correctly increments numElements?
a. numElements++; elements[rear) - element:
b. front++; elements(front) - element:
c. rear = (rear + 1) % elements.length; elements[rear) - element;
d. front = (front + 1) % elements.length; elements[front) - element;
Answer:
c. rear = (rear + 1) % elements.length; elements[rear] = element;
Explanation:
In the above statement:
Name of the array is elements.
rear holds current index of elements array where current rear element of queue is stored. Front are rear are two open ends of the queue and the end from which the element is inserted into the queue is called rear.
element is the element that is required to enqueue into the queue
Enqueue basically mean to add an element to a queue.
Here it is assumed that the queue is not full. This means an element can be added to the queue.
It is also assumed that code also correctly increments numElements.
rear = (rear + 1) % elements.length; This statement adds 1 to the rear and takes the modulus of rear+1 to the length of the array elements[]. This statement specifies the new position of the rear.
Now that the new position of rear is found using the above statement. Next the element can be enqueued to that new rear position using the following statement:
elements[rear] = element; this statement sets the element at the rear-th (new position) index of elements[] array.
For example we have a queue of length 5 and there are already 4 elements inserted into this queue. We have to add a new element i.e. 6 to the queue. There are four elements in elements[] array and length of the array is 5 so this means the queue is not full. Lets say that rear = 3
elements.length = 5
rear = 3
Using above two statements we get.
rear = (rear + 1) % elements.length;
= 3 + 1 % 5
= 4%5
= 4
This computes the new position of rear. So the new position of rear is the 4-th index of elements[]. Now next statement:
elements[rear] = element;
elements[4] = 6
This statement adds element 6 to the 4-th index of elements[] array.
Thus the above statement enqueues element (element 6 in above example) into the queue.
#Write a function called "replace_all" that accepts three #arguments: # # - target_string, a string in which to search. # - find_string, a string to search for. # - replace_string, a string to use to replace every instance # of the value of find. # #The arguments will be provided in this order. Your function #should mimic the behavior of "replace", but you cannot use #that function in your implementation. Instead, you should #find the result using a combination of split() and join(), #or some other method. # #Hint: This exercise can be complicated, but it can also #be done in a single short line of code! Think carefully about #the methods we've covered. #Write your function here!
Answer:
Here is the function replace_all:
def replace_all(target_string,find_string,replace_string):
result_string = replace_string.join(target_string.split(find_string))
return result_string
#if you want to see the working of this function then you can call this function using the following statements:
target_string = "In case I don't see ya, good afternoon, good evening, and good night!"
find_string = "good"
replace_string = "bad"
print(replace_all(target_string, find_string, replace_string)
Explanation:
The above program has a function called replace_all that accepts three arguments i.e target_string, a string in which to search ,find_string, a string to search for and replace_string, a string to use to replace every instance of the value of find_string. The function has the following statement:
replace_string.join(target_string.split(find_string))
split() method in the above statement is splits or breaks the target_string in to a list of strings based on find_string. Here find_string is passed to split() method as a parameter which works as a separator. For example above:
target_string = In case I don't see ya, good afternoon, good evening, and good night!
find_string = good
After using target_string.split(find_string) we get:
["In case I don't see ya, ", ' afternoon, ', ' evening, and ', ' night']
Next join() method is used to return a string concatenated with the elements of target_string.split(find_string). Here join takes the list ["In case I don't see ya, ", ' afternoon, ', ' evening, and ', ' night'] as parameter and joins elements of this list by 'bad'.
replace_string = bad
After using replace_string.join(target_string.split(find_string)) we get:
In case I don't see ya, bad afternoon, bad evening, and bad night!
The program and output is attached as a screenshot.
vSphere Client is used to install and operate the guest OS. true or false
Answer:
True
Explanation:
A guest Operating System (OS) is a secondary OS to the main installed OS which is the host Operating System (OS). Guest OS can either be a part of a partition or a Virtual Machine (VM). This guest OS is used as a substitute to the host OS.
vSphere Web Client can be installed by using a CD-ROM, DVD or ISO image which has the installation image to make a Virtual Machine (VM) functional.
#Write a function called "in_parentheses" that accepts a
#single argument, a string representing a sentence that
#contains some words in parentheses. Your function should
#return the contents of the parentheses.
#
#For example:
#
# in_parentheses("This is a sentence (words!)") -> "words!"
#
#If no text appears in parentheses, return an empty string.
#Note that there are several edge cases introduced by this:
#all of the following function calls would return an empty
#string:
#
# in_parentheses("No parentheses")
# in_parentheses("Open ( only")
# in_parentheses("Closed ) only")
# in_parentheses("Closed ) before ( open")
#
#You may assume, however, that there will not be multiple
#open or closed parentheses.
#Write your function here!
def in_parentheses(a_string):
import re
regex = re.compile(".*?\((.*?)\)")
result = re.findall(regex, a_string)
return(result)
#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print (including the blank lines):
#words!
#
#as he is doing right now
#
#
#!
print(in_parentheses("This is a sentence (words!)."))
print(in_parentheses("No parentheses here!"))
print(in_parentheses("David tends to use parentheses a lot (as he is doing right now). It tends to be quite annoying."))
print(in_parentheses("Open ( only"))
print(in_parentheses("Closed ) only"))
print(in_parentheses("Closed ) before ( open"))
print(in_parentheses("That's a lot of test cases(!)"))
Answer:
import regex as re
def in_parentheses(a_string):
regeX = re.compile(".*?\((.*?)\)")
result = re.findall(regeX, a_string)
return str(result).replace("[","").replace("]","")
print("test 1: "+in_parentheses("Open ( only"))
print("test 2: "+in_parentheses("This is a sentence (words!)."))
When you use Word's Email option to share a document, you should edit the _____ line to let the recipient know the email is from a legitimate source.
Answer:
Subject line
Explanation:
Editing the subject line is very important so as to enable the recipient know the source of received the message (document).
For example, if a remote team working on a project called Project X receives a shared document by one member of team, we would expect the subject line of the email to be– Project X document. By so doing the legitimacy of the email is easily verified.
In the Stop-and-Wait flow-control protocol, what best describes the sender’s (S) and receiver’s (R) respective window sizes?
Answer:
The answer is "For the stop and wait the value of S and R is equal to 1".
Explanation:
As we know that, the SR protocol is also known as the automatic repeat request (ARQ), this process allows the sender to sends a series of frames with window size, without waiting for the particular ACK of the recipient including with Go-Back-N ARQ. This process is mainly used in the data link layer, which uses the sliding window method for the reliable provisioning of data frames, that's why for the SR protocol the value of S =R and S> 1.An app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. What type of cloud service is he looking for?
Answer:
Platform as a Service (PaaS).
Explanation:
In this scenario, an app developer is shopping for a cloud service that will allow him to build code, store information in a database and serve his application from a single place. The type of cloud service he is looking for is a platform as a service (PaaS).
In Computer science, Platform as a Service (PaaS) refers to a type of cloud computing model in which a service provider makes available a platform that allow users (software developers) to build code (develop), run, store information in a database and manage applications over the internet.
The main purpose of a Platform as a Service (PaaS) is to provide an enabling environment for software developers to code without having to build and maintain complex infrastructure needed for the development, storage and launching of their software applications.
Simply stated, PaaS makes provision for all of the software and hardware tools required for all the stages associated with application development over the internet (web browser).
Hence, the advantage of the Platform as a Service (PaaS) is that, it avails software developers with enough convenience as well as simplicity, service availability, ease of licensing and reduced costs for the development of software applications.
These are the different types of Platform as a Service;
1. Private PaaS.
2. Public PaaS.
3. Hybrid PaaS.
4. Mobile PaaS.
5. Communications PaaS.
6. Open PaaS.
The software developers can choose any of the aforementioned types of PaaS that is suitable, effective and efficient for their applications development. Some examples of PaaS providers are Google, Microsoft, IBM, Oracle etc.
ntify five key technologies/innovations and discuss their advantages and
disadvantages to developing countries like Ghana
Answer:
1. Blockchain Technology: Blockchain is a distributed ledger technology that lets data to be stored globally on its servers and it is based on a P2P topology which makes it difficult for someone to tamper with the network.
It can be used as a cryptocurrency wallet that supports BitCoin, Ethereum, etc.
An advantage of it is that it is distributed among several users and stable.
A disadvantage for a developing country like Ghana is that once a blockchain is sent, it cannot go back which brings up the question of security.
2.Artificial Intelligence: This technology is simply the simulation of human intelligence in machines. AI can be used for problem-solving and learning. An advantage of AI is that it reduces human error and is fast in solving problems. A disadvantage of AI is that its expensive to maintain and also it does not improve with experience.
3. Global Positioning System: GPS is a satellite-based positioning system that is used to pinpoint and track location. It has the advantage of being available worldwide and information is provided to users in real-time. One disadvantage of the GPS for a developing country like Ghana is that electromagnetic interference can affect the accuracy of the GPS.
4. 5G Network: This is the 5th generation of mobile internet connectivity that gives super fast download and upload speeds when compared to its predecessors 4G, 3G, 2G, and Edge networks.
One major disadvantage of 5G for a developing country like Ghana is that it is expensive and quite unknown and its security and privacy issues are yet to be resolved.
5. Lasers: This isn't a new technology as it has been in use for some time already but its importance cannot possibly be over-emphasized. LASER is an acronym that means Light Amplification by the Stimulated Emission of Radiation.
It is precise and accurate in cutting when compared to thermal and other conventional cutting methods. It is being used in surgeries that require the highest levels of accuracy with great success.
A disadvantage of Laser technology is that it is expensive to use and maintain.