Write a split_check function that returns the amount that each diner must pay to cover the cost of the meal. The function has 4 parameters: bill: The amount of the bill. people: The number of diners to split the bill between. tax_percentage: The extra tax percentage to add to the bill. tip_percentage: The extra tip percentage to add to the bill.

Answers

Answer 1

Answer:

def split_check(bill, people, tax_percentage, tip_percentage):

   tax = bill * tax_percentage

   tip = bill * tip_percentage

   

   total_bill = bill + tax + tip

   

   return total_bill / people

Explanation:

Create a function called split_check that takes four parameters, bill, people, tax_percentage, and tip_percentage

Inside the function, calculate the tax, multiply bill by tax_percentage. Calculate the tip, multiply bill by tip_percentage. Calculate the total_bill, sum bill, tax, and tip. Finally, return the total_bill / people which gives the amount each diner needs to pay.


Related Questions

A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) ________________ printer, and Computer2 considers the printer to be a(n) ________________ printer.

Answers

Answer:

A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) _____local___________ printer, and Computer2 considers the printer to be a(n) _____network___________ printer.

Explanation:

Any printer installed directly to Computer 1 is a local printer.  If this printer is then shared with computers 2 and 3 in a particular networked environment, it becomes a shared printer.  For these other computers 2 and 3, the shared printer is a network printer, because it is not locally installed in each of them.  There may be some features which network computers cannot use on a shared printer, especially if the printer can scan documents.

Start with the following Python code. alphabet = "abcdefghijklmnopqrstuvwxyz" test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"] test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"] # From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press. def histogram(s): d = dict() for c in s: if c not in d: d[c] = 1 else: d[c] += 1 return d Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source. Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False. Implement has_duplicates by creating a histogram using the histogram function above. Do not use any of the implementations of has_duplicates that are given in your textbook. Instead, your implementation should use the counts in the histogram to decide if there are any duplicates. Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups. Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string. The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet. It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter. The function missing_letters should combine the list of missing letters into a string and return that string. Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters. For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz If the string has all the letters in alphabet, the output should say it uses all the letters. For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters Print a line like one of the above for each of the strings in test_miss. Submit your Python program. It should include the following. The provided code for alphabet, test_dups, test_miss, and histogram. Your implementation of the has_duplicates function. A loop that outputs duplicate information for each string in test_dups. Your implementation of the missing_letters function. A loop that outputs missing letters for each string in test_miss. Also submit the output from running your program. Your submission will be assessed using the following Aspects. Does the program include a function called has_duplicates that takes a string parameter and returns a boolean? Does the has_duplicates function call the histogram function? Does the program include a loop over the strings in test_dups that calls has_duplicate on each string? Does the program correctly identify whether each string in test_dups has duplicates? Does the program include a function called missing_letters that takes a string parameter and returns a string parameter? Does the missing_letters function call the histogram function? Does the missing_letters function use the alphabet global variable directly? Does the program include a loop over the strings in test_miss that calls missing_letters on each string? Does the program correctly identify the missing letters for each string in test_miss, including each string that "uses all the letters"?

Answers

Answer:

alphabet = "abcdefghijklmnopqrstuvwxyz"

test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"]

test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"]

# From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press.

def histogram(s):

   d = dict()

   for c in s:

       if c not in d:

           d[c] = 1

       else:

           d[c] += 1

   return d

#Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.

def has_duplicates(stringP):

   dic = histogram(stringP)

   for key,value in dic.items():

       if value>1:

           return True

   return False

# Implement has_duplicates by creating a histogram using the histogram function above. Write a loop over the strings in the provided test_dups list.

# Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string.

# For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups.

print("***Implementation of has_duplicates fuction***")

for sTr in test_dups:

   if has_duplicates(sTr):

       print(sTr+": has duplicates")

   else:

       print(sTr+": has no duplicates")

#Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string.

#The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet.

#It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter.

#The function missing_letters should combine the list of missing letters into a string and return that string.

def missing_letters(sTr):

   missingLettersList = []

   dic = histogram(sTr)

   for l in alphabet:

       if l not in dic:

           missingLettersList.append(l)

   missingLettersList.sort()

   return "".join(missingLettersList)

#Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters.

#For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz

#If the string has all the letters in alphabet, the output should say it uses all the letters.

#For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters

#Print a line like one of the above for each of the strings in test_miss.

print("\n***Implementation of missing_letters fuction***")

for lTm in test_miss:

   sTr = missing_letters(lTm.replace(" ",""))

   if sTr!="":

       print(lTm+" is missing letters "+sTr)

   else:

       print(lTm +" uses all the letters")

Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write your code so that it works no matter how many items are in the list

Answers

Answer:

sports = ["football", "basketball", "volleyball", "baseball", "swimming"]

last = sports[-3:]

print(last)

Explanation:

*The code is in Python.

Create a list called sports

Create a variable called last and set it to the last three elements of the sports list using slicing

Print the last

Why do you think it is necessary to set the sequence in which the system initializes video cards so that the primary display is initialized first

Answers

Answer:

Because if you don't do it BIOS doesn't support it. ... In troubleshooting a boot problem what would be the point of disabling the quick boot feature in BIOS setup

Explanation:

what is the difference between ram and rom​

Answers

Answer:

RAM is used to store programs and data the CPU needs. ROM has prerecorded data and is used to boot the computer

Explanation:

what is the difference between head header and heading in HTML​

Answers

Answer:

<Head>the appears the "<body>" of a web page.

<Heading> the appears the body of the web page.

Explanation:<Head> it contains that provides the information about web page.

<Heading> it contains such as the title,date, summary.

<Heading> are the<h1>,<h2>,tags

it provides the title and subtitles of the web page.

<Heading>

</Heading>

Head is element is metadata.

Heading is element is actual element.

Answer:

Head>the appears the "<body>" of a web page.

<Heading> the appears the body of the web page.

Explanation:

Volume of Pyramid = A*h/3 where A is the area of the base of the pyramid and h is the height of the pyramid. Write a C++ program that asks the user to enter the necessary information about the pyramid (note that the user would not know the area of the base of the pyramid, you need to ask them for the length of one of the sides of the base and then calculate the area of the base). Using the information the user input, calculate the volume of the pyramid. Next display the results (rounded to two decimal places). Example Output (output will change depending on user input): The area of the base of the pyramid is: 25.00 The height of the pyramid is: 5.00 The volume of the pyramid is: 41.67 *Pseudocode IS required for this program and is worth 1 point. The program IS auto-graded.

Answers

Answer:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

   double side, height;

   

   cout<<"Enter the length of one of the sides of the base: ";

   cin>>side;

   cout<<"Enter the height: ";

   cin>>height;

   

   double area = side * side;

   double volume = area * height / 3;

   

   cout<<"The area of the base of the pyramid is: "<<area<<endl;

   cout<<"The height of the pyramid is: "<<height<<endl;

   cout<<"The volume of the pyramid is: "<<fixed<<setprecision(2)<<volume<<endl;

   return 0;

}

Pseudocode:

Declare side, height

Get side

Get height

Set area = side * side

Set volume = area * height / 3

Print area

Print height

Print volume

Explanation:

Include <iomanip> to have two decimal places

Declare the side and height

Ask the user to enter side and height

Calculate the base area, multiply side by side

Calculate the volume using the given formula

Print area, height and volume (use fixed and setprecision(2) to have two decimal places)

Write a small program that asks the user how many asterisks it should print out. The user responds with a number, then the program prints that number of asterisks.

Answers

Answer:

I am writing a C++ program. Let me know if you want the program in some other programming language.

#include <iostream> //to use input output functions

using namespace std; // to identify objects like cin cout

int main(){  //start of main() function body

int n; // number of asterisks

cout<<"how many asterisks do you want to print? "; //asks user how many asterisks it should print

   cin>>n; // reads the value of number of asterisks that user want to print

   for( int i=0; i< n; i++)    { //loop to display the number of asterisks in output

       printf("*");    } } // print * asterisks

Explanation:

I will explain how the for loop works.

Suppose the user entered 3 as number of asterisks that user wants to print.

So n=3

Now for loop has a variable i that is initialized to 0. For loop checks if the value of i is less than that of n. It is true because i=0 and n=3 and 0<3. So the body of the loop executes. This prints the first asterisk *

Then the value of i is incremented to 1 and becomes i=1

At next iteration loop again checks if value of i is less than n. It is true because i=1 and n=3 and 1<3. So the body of the loop executes. This prints the second asterisk **

Then the value of i is incremented to 1 and becomes i=2

At next iteration loop again checks if value of i is less than n. It is true because i=2 and n=3 and 2<3. So the body of the loop executes. This prints the third asterisk ***

Then the value of i is incremented to 1 and becomes i=3

At next iteration loop again checks if value of i is less than n. This time it evaluates to false because i=3 and n=3 so 3=3. So the loop ends and the output is

***

The output screenshot is attached.

Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation once for every millisecond of CPU computing and that each I/O operation takes 10 milliseconds to complete. Also assume that the context switching overhead is 0.1 millisecond and that all processes are long-running tasks. What is the CPU utilization for a round-robin scheduler when:

Answers

Answer:

10 minutes

Explanation:

Open up your database administraton GUI, and use the appropriate SQL Query Tool to write the SQL CREATE statement for your BOOK_TAGS table. You can either write the script manually and execute it through pgAdmin or you can create the table by using pgAdmin's wizard.
Afterwards, insert one row of dummy data that adds a tag to the sample book in the BOOKS table.

Answers

Answer:

nxlskshwhhwwlqlqoejebx znznxjslaa

a) five benefits of having
an operating system over not having one.

Answers

Answer:

Software Updates, Computing Sources, No Coding, Relatively Inexpensive, Safeguards Data.

Explanation:

Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file (directory.txt) that contains the numbers in random order. Handle lookups by name and also reverse lookups by phone number. Use a binary search for both lookups. A driver program and templates have been created for you.

Answers

Answer:

Here is the JAVA program:

Items.java

public class Item {  // Item class

private String name, ph_num;  // class data members name to hold the name and ph_num stores the telephone numbers

public Item(String fullName, String PhoneNo){  //constructor of Item class , so fields full name and ph_num can be initialized when the object is created

name = fullName;  // holds the name field

ph_num = PhoneNo;}  //holds the telephone number

public String getFullName(){  // accessor method to get access to the name field

return name;}  //returns the name from directory

public String getPhoneNo(){  //accessor method to get access to the ph_nujm field

return ph_num; } } //returns the telephone number

Explanation:

LookupTable.java

public class LookupTable{  //class name

private ArrayList<Item> data;  // dynamic array list named data of Item class. This array list stores the names and telephone numbers from file

public LookupTable(){  //default constructor

data = new ArrayList<Item>();}  // creates an array list of Item type which holds the names and phone numbers

public void read(Scanner in){  // Scanner class object is created and this class is used to read input and the method reads the names and phone numbers

while(in.hasNext()){  // the loop moves through each line of the file. scanner class method hasNext checks for the tokens in the input

String name = in.nextLine();  // scans for the name in the input

String ph_num = in.nextLine();  //scans for the phone numbers in the input

data.add(new Item(name, ph_num));}}  // adds the names and phone number in to the Array list

public String lookup(String k){  //method looks up for an item in the table.  param k is the key to find . returns the value with the given key, or null if no       such item was found

String result = null;  //result initialized to to null

for(Item item: data){  //creates Item object and traverses the array list for each item i.e. name or phone numbers

if(k.equals(item.getFullName())){  //access the getFullName method through object item and checks if that name matches the key to find.

result = item.getPhoneNo();}}  //gets the corresponding phone number and assigns it to result variable

return result;}  //returns the result containing the phone number

public String reverseLookup(String v){  //Looks up an item in the table. param v is the value to find . returns the key with the given value, or null if no  such item was found. This method performs the lookup through phone number

String result = null;  //result is set to null to start

for(Item item: data){  //Traversing list through the for each item in data  

if(v.equals(item.getPhoneNo())){  //if the value of v is equal to the phone number accessed by using accessor method and object item

result = item.getFullName();}}  //accesses the corresponding name of that phone number and assigns it to the result

return result;}}  //returns the result                                

The data from directory file which contains the number and names. The LookupTable class has a method lookup which handles the lookups by names and the method reverseLookup that handles the lookups by phone number.  

You should see an error. Let's examine why this error occured by looking at the values in the "Total Pay" column. Use the type function and set total_pay_type to the type of the first item from the "Total Pay" column.

Answers

Answer:

See below

Explanation:

Under this topic of functions, this question has been precisely answered in a word file and attached as an image herewith (in proper format). Visualizations and CEO incomes are some of the applications of this concept.

The response to this part shows the relation between total pay and raw compensation.

Hope that answers the question, have a great day!

what is filter in image processing

Answers

Answer:

Image processing operations implemented with filtering include smoothing, sharpening, and edge enhancement.

why does study state that unless you were sleeping it is almost impossible not to be communicating?

Answers

Answer:

Because your movements, expressions, and posture are also a type of communication

Explanation:

Below is some info for some internet transactions. We want to sort it by time and by location. Which sorting algorithm is appropriate for this particular problem?
a. radix sort.
b. heap sort.
c. selection sort.
d. shell sort.

Answers

Answer:

c. selection sort

Explanation:

The best way to sort the internet transactions data based on time and location is selection sort. The algorithms sorting technique is used to sort the complex data in computer programs. Shell sort is the technique which sorts the data apart from each other and reduces interval between them. Heap sort is sorting technique based on binary heap data structure. Radix sort is an integer sorting technique in algorithms.

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

Answers

Answer:

Op code table.

Explanation:

In Computer programming, an Op code is the short term for operational code and it is the single instruction which can be executed by the central processing unit (CPU) of a computer.

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the Op code table. The Op code can be defined as a visual representation of the entire operational codes contained in a set of executable instructions.

An Op code table is arranged in rows and columns which basically represents an upper or lower nibble and when combined depicts the full byte of the operational code. Each cells in the Op code table are labeled from 0-F for the rows and columns; when combined it forms values ranging from 00-FF which contains information about CPU cycle counts and instruction code parameters.

Hence, if the operational code table is created and sorted alphabetically, the binary search algorithm can be used to find an operational code to be executed by the central processing unit (CPU).

Write an application that calculates and displays the amount of money a user would have if his or her money could be invested at 5 percent interest for one year. Create a method that prompts the user for the starting value of the investment and returns it to the calling program. Call a separate method to do the calculation, and return the result to be displayed. Save the program as Interest.java.

Answers

Answer:

Following are the program to this question:

import java.util.*;//import package for user input

class Interest //defining class Interest

{

   static double rate_of_interest = 5.00;//defining static double varaibale  

   public static double Invest_value()//defining method Invest_value

   {

           double invest;//defining double variable invest

           Scanner inc = new Scanner(System.in);//creating Scanner class object  

           System.out.print("Enter investment value: ");

           invest = inc.nextDouble();//input value in invest variable

           return invest;//return invest value

  }

  public static double calculated_Amount(double invest)//defining method calculated_Amount that accept parameter

  {

           double amount;//defining double variable

           amount = invest+ (invest * (rate_of_interest/100));//use amount to calculat 5 % of invest value

           return amount;//return amount value

  }

   

   public static void main(String[] as)//defining main method

   {

   double investment_value;//defining double variable

   investment_value= Invest_value();//use investment_value to hold method Invest_value value

   System.out.println("The 5% of the invest value: "+ calculated_Amount(investment_value));//use print method to print calculated_Amount value

  }

}

Output:

Enter investment value: 3000

The 5% of the invest value: 3150.0

Explanation:

In the above program a class "Interest", is defined inside the class a static double variable "rate_of_interest"  is declared that store a double value, in the next step, two methods "Invest_value and calculated_Amount" is declared.

In the "Invest_value" method, scanner class object is created for input value in the "invest" variable and the "calculated_Amount" accepts an "invest" value in its parameter and calculate its 5% and store its value in the "amount" variable.

Inside the main method, the "investment_value" is declared that holds the "Invest_value"  method value and pass the value in the "investment_value" variable in the "calculated_Amount" method and prints its return value.

Implement function easyCrypto() that takes as input a string and prints its encryption
defined as follows: Every character at an odd position i in the alphabet will be
encrypted with the character at position i+1, and every character at an even position i
will be encrypted with the character at position i 1. In other words, ‘a’ is encrypted with
‘b’, ‘b’ with ‘a’, ‘c’ with ‘d’, ‘d’ with ‘c’, and so on. Lowercase characters should remain
lowercase, and uppercase characters should remain uppercase.
>>> easyCrypto('abc')
bad
>>> easyCrypto('Z00')
YPP

Answers

Answer:

The program written in python is as follows;

import string

def easyCrypto(inputstring):

      for i in range(len(inputstring)):

             try:

                    ind = string.ascii_lowercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

                           print(string.ascii_lowercase[ind+1],end="")

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

anystring = input("Enter a string: ")

easyCrypto(anystring)

Explanation:

The first line imports the string module into the program

import string

The functipn easyCrypto() starts here

def easyCrypto(inputstring):

This line iterates through each character in the input string

      for i in range(len(inputstring)):

The try except handles the error in the program

             try:

This line gets the index of the current character (lower case)

                    ind = string.ascii_lowercase.index(inputstring[i])

This line adds 1 to the index

                    pos = ind+1

This line checks if the character is at even position

                    if pos%2 == 0:

If yes, it returns the alphabet before it

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

It returns the alphabet after it, if otherwise

                           print(string.ascii_lowercase[ind+1],end="")

The except block does the same thing as the try block, but it handles uppercase letters

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

The main starts here

This line prompts user for input

anystring = input("Enter a string: ")

This line calls the easyCrypto() function

easyCrypto(anystring)

Velma is graduating from Ashford at the end of next year. After she completes her final class, she will reward herself for her hard work with a week-long vacation in Hawaii. But she wants to begin saving money for her trip now. Which of the following is the most effective way for Velma to save money each month?

Answers

This question is incomplete because the options are missing; here are the options for this question:

Which of the following is the most effective way for Velma to save money each month?

A. Automatically reroute a portion of her paycheck to her savings account.

B. Manually deposit 10% of her paycheck in her savings account.

C. Pay all of her bills and then place the remaining money in her savings account.

D. Pay all of her bills and then place the remaining money in her piggy bank.

The correct answer to this question is A. Automatically reroute a portion of her paycheck to her savings account.

Explanation:

In this case, Velma needs to consistently save money for her vacation as this guarantees she will have the money for the trip. This means it is ideal every month she contributes consistently to her savings for the vacation.

This can be better be achieved by automatically rerouting a part of her paycheck for this purpose (Option A) because in this way, every month the money for the vacations will increase and the amount of money will be consistent, which means Velma will know beforehand the money she will have for the vacation. Moreover, options such as using a piggy bank or paying the bills and using the rest for her savings, do not guarantee she will contribute to the savings every month, or she will have the money she needs at the end.

Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for the given program with one call to inc_num_kids():

Answers

Answer:

This is the instance method inc_num_kids()

def inc_num_kids(self):

       self.num_kids += 1

Explanation:

The first line is the definition of function inc_num_kids() which has a parameter self. self is basically an instance of  class PersonInfo

self.num_kids += 1 this statement incremented the data member num_kids by 1. This means that the instance method inc_num_kids, using instance self, increments the value of num_kids data member by 1.

The complete program is as following:

class PersonInfo:  #class name PersonInfo

   def __init__(self):   #constructor of the class

       self.num_kids = 0  # data member num_kids

   def inc_num_kids(self):  # method inc_num_kids

       self.num_kids += 1  #increments num_kids by 1

person1 = PersonInfo()  #creates object person of class PersonInfo

print('Kids:', person1.num_kids)  # prints num_kids value before increment

person1.inc_num_kids()  #calls inc_num_kids method to increment num_kids

print('New baby, kids now:', person1.num_kids) #prints the value of num_kids after increment by inc_num_kids method

The person1 object first access the initial value of num_kids initialized by the constructor. So the first value of num_kids is 0. self.num_kids = 0  This statement assigns the value 0 to num_kids data member. Next the method inc_num_kids() using the object person1. Now when this method is called the value of data member num_kids is incremented to 1.

So previously the value was 0 which now increments by 1 and becomes 1. Last print statement displays this new value which is incremented by the inc_num_kids() method.

Hence the output is:

Kids: 0

New baby, kids now: 1

The program along with its output is attached.

In this exercise we have to use the knowledge of computational language in python to describe a code, like this:

The code can be found in the attached image.

To make it easier the code can be found below as:

class PersonInfo:  

  def __init__(self):  

      self.num_kids = 0  

  def inc_num_kids(self):  

      self.num_kids += 1  

person1 = PersonInfo()

print('Kids:', person1.num_kids)  

person1.inc_num_kids()

print('New baby, kids now:', person1.num_kids)

See more about python at brainly.com/question/26104476

Would you expect all the devices listed in BIOS/UEFI setup to also be listed in Device Manager? Would you expect all devices listed in Device Manager to also be listed in BIOS/UEFI setup?

Answers

Answer:

1. Yes

2. No

Explanation:

1 Note that the term BIOS (Basic input and Output System) refers to instructions that controls a computer device operations. Thus, devices that shows up in BIOS should be in device manager.

2. Not all devices listed in devcie manager of a computer system will be listed in BIOS.

A__________provides an easier way for people to communicate with a computer than a graphical user interface (GUI).

Answers

Answer:

Natural language processing

Explanation:

NLP, because many people can use a device better when they can talk to it just like it is another person. Some systems that use an NLP are voice assistants such as Alexa and Siri.

Modularize the program by adding the following 4 functions. None of them have any parameters. void displayMenu() void findSquareArea() void findCircleArea() void findTriangleArea() To do that you will need to carry out the following steps: Write prototypes for the four functions and place them above main. Write function definitions (consisting of a function header and initially empty body) for the four functions and place them below main. Move the appropriate code out of main and into the body of each function. Move variable definitions in main for variables no longer in main to whatever functions now use those variables. They will be local variables in those functions. For example, findSquareArea will need to define the side variable and findCircleArea will need to define the radius variable. All of the functions that compute areas will now need to define a variable named area. Move the definition for the named constant PI out of main and place it above the main function. In main, replace each block of removed code with a function call to the function now containing that block of code.

Answers

Answer:

It is a C++ program  :

#include <iostream>  // to use input output functions

using namespace std;  //to identify objects like cin cout

//following are the prototypes for the four functions placed above main

void displayMenu();  

void findSquareArea();  

void findCircleArea();

void findTriangleArea();

//definition for constant PI out of main

const float PI = 3.14159;  

int main(){  //start of main function

displayMenu(); //calls displayMenu() method

}

  void displayMenu(){  // to make user selection and calls relevant function to compute area according to the choice of user

int selection=0;  //to choose from 4 options

cout<<"Program to calculate areas of objects:\n" ;  //displays this message at start

do  {  //this loop asks user to enter a choice and this continues to execute and calculate depending on users choice until user enters 4 to exit

cout<<"\n1.Square \n2.Circle \n3.Right Triangle \n4.Quit";

cout<<"\nEnter your choice:";  //prompts user to enter choice

cin>>selection;  //reads the input choice

if(selection==1)  //if user enters 1

{  //computes area of square by calling findSquareArea

findSquareArea();  //function call to the findSquareArea function

}  

else if(selection==2)  //if user enters 2

{  //computes area of circle by calling findCircleArea

findCircleArea();  //function call to the findCircleArea function

}  

else if(selection==3)   //if user enters 3

{  //computes area of triangle by calling findTriangleArea

findTriangleArea();  //function call to the findTriangleArea function

}  

else if(selection==4)   //if user enters 4

{  

cout<<"\nTerminating!!.";  //exits after displaying this message

break;

}

else  // displays the following message if user enters anything other than the given choices

{

cout<<"\nInvalid selection";  //displays this message

}

}

while(1);  

}  

void findSquareArea(){  //function definition. this function has no parameters

float area=0.0;  //variable to store the area of square

float side=0;  //local variable of this method that stores value of side of square

cout<<"\nLength of side: ";  //prompts user to enter length of side

cin>>side;  //reads value of side from user

area=side*side;  //formula to compute area of square and result is assigned to area variable

cout<<"\nArea of Square: "<<area<<endl;   //displays are of the square

}  

void findCircleArea(){  //function definition. this function has no parameters

float area=0.0;  //variable to store the area of square

float radius=0.0;  //local variable of this method that stores value of radius of circle

cout<<"\nRadius of circle: ";  //prompts user to enter radius of circle

cin>>radius;  // reads input value of radius

area=PI*radius*radius;  //formula to compute area of circle

cout<<"\nArea of circle: "<<area<<endl;}  //displays are of the circle

void findTriangleArea(){  //function definition. this function has no parameters

   float area=0.0;  //variable to store the area of triangle

   float base=0.0;  //local variable of this method that stores value of base of triangle

   float height=0.0;  //holds value of height of triangle

cout<<"\nHeight of Triangle: ";  //prompts user to enter height

cin>>height;  //reads input value of height

cout<<"\nBase of Triangle: "; //prompts user to enter base

cin>>base;  //reads input value of base

area=0.5*height*base;  //computes area of triangle and assign the result to area variable

cout<<"\nArea of Triangle: "<<area<<endl;  //displays area of triangle

}

Explanation:

The program is modified as above. The prototypes for the four functions that are named as :

void displayMenu();  to display the Menu of choices and call relevant function to compute area

void findSquareArea();  To compute area of square

void findCircleArea(); To compute area of circle

void findTriangleArea();  To compute area of triangle

Note that these methods have no parameters and their return type is void. These 4 methods prototypes are placed above main() function.

Next the function definitions (consisting of a function header and initially empty body) for the four functions are written and placed below main() For example definition of findTriangleArea() is given below:

void findTriangleArea()

{

}

Next the code in the main is moved to the relevant methods. Then variables selection=0;  is moved to displayMenu method,  radius=0.0 to findCircleArea method , side=0; to findSquareArea float area=0.0;  to each method, float height=0.0;  and float base=0.0; to findTriangleArea method.

The relevant code moved to each method is shown in the above code.

The definition for the named constant PI is moved out of main and placed above the main function. const keyword before datatype of PI variable shows that PI is declared constant and its value is initialized once only to 3.14159.

Type the correct answer in the box.

Who is responsible for creating and testing the incident response plan?

The _______ is responsible for creating and testing the incident response plan.

Answers

Answer: CSIRT

Explanation: CSIRT is team that specializes in day to day cyber incidents  

The CSIRT is responsible for creating and testing the incident response plan.

What is CSIRT?

CSIRT is the Computer emergency response team. One of the key areas for the efficient operation of a corporation is the legal department. Professionals face enormous challenges, particularly when you take into account the need for other bodies within the company itself.

We can list the reviews of the CSIRT procedures that are conducted through this department as one of its key responsibilities. This department also has the responsibility of comprehending the actions that the CSIRT will take to ensure that they comply with all applicable federal, state, and local laws and regulations.

Therefore, the incident response strategy must be written and tested by the CSIRT.

To learn more about CSIRT, refer to the link:

https://brainly.com/question/18493737

#SPJ2

Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0 otherwise. Assume that x, y and n are all of type int.

Answers

Answer:

See comments for line by line explanation (Lines that begins with // are comments)

The function written in C, is as follows:

//The function starts here

int check(x,y,n)

{

//This if condition checks if x and y are within range of 0 to n - 1

if((x>=0 && x<=n-1) && (y>=0 && y<=n-1))

{

//If the if conditional statement is true, the function returns 1

 return 1;

}

else

{

//If the if conditional statement is false, the function returns 0

 return 0;

}

//The if condition ends here

}

//The function ends here

Explanation:

We will pass in a value N. Write a program that outputs the complete Fibonacci sequence for N iterations. Important: If N is 0, then we expect to get an output of 0. If N=1 then we expect 0, 1 etc.

Answers

Answer:

The program written in Python is as follows

def fibonac(N):

    series = ""

    for i in range(0,N+1):

         series = series + str(i) + ","

   return series[:-1]

N = int(input("Number: "))

print(fibonac(N))

Explanation:

This line defines the function fibonac

def fibonac(N):

This line initializes variable "series" to an empty string

    series = ""

This line iterates through the passed argument, N

    for i in range(0,N+1):

This line determines the Fibonacci sequence

         series = series + str(i) + ","

Lastly, this line returns the Fibonacci sequence

   return series[:-1]

The main starts here

The firs line prompts user for input

N = int(input("Number: "))

This line prints the Fibonacci sequence

print(fibonac(N))

Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is done today. * 5 points technology and mathematics principles the engineering design process technical know-how positive and negative effects of using technology

Answers

Answer:

Early in the history of technology, the development of tools and machines was based on technical know-how versus scientific knowledge as is done today.

Explanation:

In the era prior to technological development, men had a basic and at times rudimentary manufacturing development, based on artisan processes that developed their tools and machinery by hand, without any type of automation or mass production rules.

Thus, each part or tool was manufactured in a unique way, which required a broad mastery of the production process by the manufacturer. This is how the first professions began to emerge, such as blacksmiths for example, who mastered the technique of manufacturing different implements and carried them out without any scientific knowledge.

A systems administrator wants to replace the process of using a CRL to verify certificate validity. Frequent downloads are becoming problematic. Which of the following would BEST suit the administrators needs?
A. OCSP
B. CSR
C. Key escrow
D. CA

Answers

Answer:

A. OCSP

Explanation:

Online Certificate Status Protocol (OCSP) is an Internet Protocol that is used as an alternative for CRL and is used to obtain the revocation status of a digital certificate.

A certificate revocation list (CRL) is a set of digital certificates that have been rendered invalid/revoked by the Certificate Authority (CA) because they can no longer be trusted.

Because an OCSP response uses less data than a CRL, it would be best suited to the administrator's needs.

function of network security​

Answers

Answer:ffffffffffffgggggg

Explanation:vvvc

Other Questions
Where is Marco going to work? at the flower shop, at the bakery, at the hospital, at school. Creative Solutions Company, a computer consulting firm, has decided to write off the $11,750 balance of an account owed by a customer, Wil Treadwell. Journalize the entry to record the write-off, assuming that the direct write-off method is used. Select the correct answer.Which table shows a proportional relationship between x and y?xy152637xy234669xy41686412144xy1329327 Cost of Goods Manufactured, using Variable Costing and Absorption Costing On March 31, the end of the first year of operations, Barnard Inc., manufactured 4,100 units and sold 3,500 units. The following income statement was prepared, based on the variable costing concept: Barnard Inc. Variable Costing Income Statement For the Year Ended March 31, 20Y1 Sales $1,085,000 Variable cost of goods sold: Variable cost of goods manufactured $610,900 Inventory, March 31 (89,400) Total variable cost of goods sold (521,500) Manufacturing margin $563,500 Total variable selling and administrative expenses (129,500) Contribution margin $434,000 Fixed costs: Fixed manufacturing costs $278,800 Fixed selling and administrative expenses 87,500 Total fixed costs (366,300) Operating income $67,700 Determine the unit cost of goods manufactured, based on (a) the variable costing concept and (b) the absorption costing concept. Variable costing $ Absorption costing $ what is ionic and covalent The last case of the day involves a 16-year-old high school dropout who was convicted of auto theft. He had no prior record and says that he dropped out of high school to help his family but has not been able to find work. You are convinced that he only stole the car out of economic need. You hand down a sentence consisting of probation, with a condition of attending job training. Your goal is to help the offender improve his chances at landing a job, which should help keep him away from crime. This decision reflects the ________________ ethic. The graph below shows a company's profit f(x), in dollars, depending on the price of erasers x, in dollars, sold by the company: Part A: What A certain clock is losing time. The clock loses 2/15 seconds every minute. How many seconds does the clock lose in one hour? Benjamin decides to treat himself to breakfast at his favorite restaurant. He orders chocolate milk thatcosts $3.25. Then, he wants to buy as many pancakes as he can, but he wants his bill to be at most $30before tax. The restaurant only sells pancakes in stacks of 4 pancakes for $5.50.Let S represent the number of stacks of pancakes that Benjamin buys.1) Which inequality describes this scenario? The manager for a growing firm is considering the launch of a new product. If the product goes directly to market, there is a 40 percent chance of success. For $165,000, the manager can conduct a focus group that will increase the products chance of success to 55 percent. Alternatively, the manager has the option to pay a consulting firm $380,000 to research the market and refine the product. The consulting firm successfully launches new products 70 percent of the time. If the firm successfully launches the product, the payoff will be $1.80 million. If the product is a failure, the NPV is zero.Calculate the NPV for each option available for the project. (Do not round intermediate calculations. Enter your answers in dollars, not millions of dollars, i.e. 1,234,567)NPVGo to market now $ Focus group $ Consulting firm $ Which action should the firm undertake?A. Go to market nowB. Consulting firmC. Focus group Using this data, what is the population proportion of semesters for which the number of student applications is less than 200,000? Tapiwa raked %5, percent more leaves than Adam raked. Tapiwa raked 357 liters of leaves. How many liters of leaves did Adam rake?HELP!! DUE SOON A square has diagonals of length 10 cm. Find the sides of the square John has 9 boxes of apples. Each box holds 16 apples. If 7 boxes are full, and 2 of the boxes are half full, how many apples does john have? In a standard normal distribution, what is the probability of a z-score being less than 2.55? GUYS SeRioUsly!!!!I REALLY NEED HELP JUST 3 SENTENCES!!!! THIS IS THE LAST QUESTION AND MY BRAIN HURT TOO MUC TO UNDERSTAND THIS!!!!! PLESE COME TO AT LEAST LOOK!!! WILL FOREVER BE GREATFUL!!!! PLS YOU GENIUSES!!!!!21. Colonists had many motivations for seeking independence from England, what they called natural rights was among the greatest. explain why natural rights, especially as they pertain to religion, was one of the leading reasons for the colonists to move towards revolution. Find all x in set of real numbers R Superscript 4 that are mapped into the zero vector by the transformation Bold x maps to Upper A Bold x for the given matrix A. Find the measure of b.Please help The adoption of higher law constitutions has often coincided with transitions to democracy. In many cases, the adoption of this type of constitution was a deliberate choice meant to provide individuals with additional protection from the state:_________ the sum of two consecutive multiples of 5 is 55.what are the multiples