Answer:
bulleted list
Explanation:
Bulleted list is the best way to format the list. As a document contains a list of items that appear in no particular order.
What is meant by Bulleted list?A bullet list is simply a list of items with dotted dots separating each item and a heading at the top. These lists are flexible and may be used for whatever you need them for, from something as informal as an agenda to something as serious as a business strategy for your place of business.
A bullet list is used when making a list of two or more items, where the order of the items is not important. A retailer may display a list of items you want to buy in the form of a bullet list, for example.
Use a number list if you're composing a list of actions or instructions when the order is important.
Thus, it is Bulleted list.
For more details about Bulleted list, click here:
https://brainly.com/question/17359798
#SPJ2
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.
Answer:
Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.
Explanation:
thats all you said
In python 3.8:
def pyramid_volume(base_length, base_width, pyramid_height):
return round((base_length*base_width*pyramid_height)/3,2)
print(pyramid_volume(1,1,2))
I used the round function to round the volume to 2 decimal places. You can change this if you need more or less precision. I hope this helps!
Why is content knowledge as important as generalized critical thinking for Web Analytics and Web Intelligence reporting and insights? A) Because it's very difficult for students to apply critical thinking skills learned in one subject to another, even between different fields of science. B) It is said that content is king and that having up to date content knowledge of Web Analytics is crucial in order to be an effective Analyst C) Everything is changing so fast that you need to keep up to date with the changes in the platforms that you use or are considering using for personal or organizational deployment. D) Content knowledge of Web Analytics is important because in a field like emerging technology that Web Analytics is still considered to be, new features of a Web Analytics platform can have a major impact on the ability to do the project and deliver value from it.
Answer:
B) It is said that content is king and that having up to date content knowledge of Web Analytics is crucial in order to be an effective Analyst
Explanation:
The answer is option B. A good knowledge of content is very important and crucial due to the fact that knowledge stands at the center or the most important thing in the business sector.
Web analytics is a method of measuring, analysing and reporting web usage data. Content knowledge is a good understanding of the subject area. To understand web analytics, a going knowledge of the facts, theories and concepts are important if one wants to be an effective analyst.
Therefore b is the answer to this question.
What are the three categories of managerial decisions?
Top 3 levels of management
Strategic Production Planning
Technology decision
Capacity decisions
What is the minimum size of a data type, in bytes, to be impacted by system endianness. (Whole numbers only)?
Answer:
30
Explanation:
A data type must be at least 2 bytes in size to be affected by the endianness system.
What is endianness system?Endianness in computing refers to the arrangement of bytes inside a word of digital data stored in a computer's memory.
Big-endian or little-endian are the two main ways that endianness is stated.
The least significant byte in a word is kept at the largest memory location and the most significant byte is kept at the smallest address in a big-endian system.
The term "endianness" refers to the arrangement of bytes as they are stored in computer memory. Endianness is classified as big or little depending on which value is stored first.
Thus, for the endianness system to apply, a data type must be at least 2 bytes in size.
For more details regarding endianness system, visit:
https://brainly.com/question/14488920
#SPJ6
PLZ HELP!!!!!!!!! XC
what dose it mean if a circuit is hot to the touch
Answer:
The circuit is carrying more than it is supposed to and is overheating.
4.8 code practice question 2 edhesive
Answer:
for y in range(88, 43, -4):
print(y, end=" ")
Explanation:
yw
The code practice is an illustration of loops;
Loops are program statements that are used to perform iterative operations
The complete program in PythonThe program in Python, where comments are used to explain each action is as follows:
#This iterates from 88 to 42, with a difference of -4
for i in range(88, 43, -4):
#This prints the numbers on a single line
print(i, end=" ")
Read more about loops at:
https://brainly.com/question/24833629
#SPJ2
Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, you would use:a) *sptr[*3] b) *sptr+3 c) sptr +3 d) *(sptr + 3)
Answer:
The correct option for accessing the value in sarray[3] is : d) *(sptr+3)
Explanation:
a) *sptr[*3] is wrong option because its syntax is not right it will give errors.
b) *sptr+3 is also wrong option because it will add 3 to the value of sarray[0].
c) sptr+3 is wrong option because it will only access the address of sarray[3] not the value it contains.
d) *(sptr +3) is correct syntax for accessing value in sarray[3] by using pointer
different between input and output device
Answer:
An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.
Explanation:
in the middle of the iteration, how should a team handle requirement changes from the customer
Answer:
Team may take up the changes in flight after discussing the overall impact with the Product owner
Explanation:
In the middle of the iteration, one of the best ways a team should handle requirement changes from the customer is to take up the changes in flight after discussing the overall impact with the Product owner.
This will make the customer well aware of the advantages and disadvantages that come with changes in the requirement, such that, the customer will be surprised about the final outcome of the iteration.
One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?
Explanation:
Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:
Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.Which of the following are reasons why it is important to write readable code?
Choose all that apply.
Readable code is easier to maintain.
Readable code is easier to modify.
Readable code is fun to write.
Writing readable code saves time in the long run.
Answer:
Readable code is easier to maintain.
Writing readable code saves time in the long run.
Readable code is easier to modify.
Readable code is fun to write.
Explanation:
Readability of a code means that how easy it is to read the code even if any person other than programmer reads the code. Different techniques like line breaks and indentation are used to make the code readable. the program follows an indentation pattern so it is easy and fun to write.
Hence,
it can be concluded that the true statements are:
Readable code is easier to maintain.
Writing readable code saves time in the long run.
Readable code is easier to modify.
Readable code is fun to write.
Answer:
for short answer it is a,b and D
Explanation:
Which of the following online activities seem appropriate for the workplace? (select all that apply) A.watching a webinar to learn new job skills
B.watching TV online
C. seeking donations to support your election to the Senate
D. reading press releases from your company's competitors
E. sharing career advice with your peers
F. sharing company secrets in a public forum
Answer:
A, D, and E
watching a webinar to learn new job skills
reading press releases from your company’s competitors
sharing career advice with your peers
Explanation:
got it right on edge2020
The online activities that seem appropriate for the workplace is sharing career advice with your peers.
What are virtual activities?The virtual activities are known to be any kind of online activities that is often done by people to make sure they have good and continued collaboration with other people.
Conclusively, Note that the use of online activities in the workplace should be the one that will help you and your peers to grow such as sharing career advice with your peers.
Learn more about online activities from
https://brainly.com/question/13171394
What are some areas in Computer Science that make use of multivariate statistical testing or MCM methods? Explain why they are used.
Explanation:
Computational modeling is one of the areas of Computer Science that uses mathematical systems to perform multivariate statistical tests to solve highly complex problems in multidisciplinary areas, such as medicine, engineering, science, etc.
An example of the use of multivariate statistical tests is social development research in social science, which uses multiple variables to find more hypotheses and greater coverage between variables.
Multivariate statistical tests have the benefit of making research more effective and providing a more systematic and real view of the study.
PLEASE I NEED HELP NOW!!!!!
Frank types in many numbers to calculate baseball statistics. To enter these numbers, he should use the _____.
Answer:
Numeric keypad
Explanation:
The numeric keypad has mostly only numbers so it would be more convenient for him.
Hope this helps!
Answer:
Numeric keypad on the right side of the keyboard.
Explanation:
Ap*x
The task of handling how active processes are making efficient use of the CPU processing cycles is called_______?
Answer:
Scheduling.
Explanation:
A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.
Hence, the task of handling how active processes are making efficient use of the central processing unit (CPU) processing cycles is called scheduling.
In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.
Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).
A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?
Answer: Nothing should be done.
Explanation:
Group Policy helps in the provision of a centralized management of operating systems, and applications. It should be noted that a group policy object (GPO) is simply referred to as the configurations involving the group policy.
Nothing should be done to manage the GPO created. When the permission to create a GPO has been given to someone, it means that they can also manage the GPO therefore, nothing needs to be done anymore.
Python rephactor
1. Write code that swaps the first and last elements in a list called my_list. Assume that the list has already been created and contains at least one element.
2.Write code that creates a Python set containing each unique character in a string named my_string. For example, if the string is 'hello', the set would be {'h', 'e', 'l', 'o'} (in any order). Assign the set to a variable named my_set. Assume that my_string has already been initialized.
1.
my_list = ([1,2,3,4,5])
h = my_list[-1]
my_list[-1] = my_list[0]
my_list[0] = h
print(my_list)
2.
my_string = "hello"
my_set = set(my_string)
print(my_set)
The list has already been created and contains one element. The python set of my string has been already initiated.
What is python set?Python set is defined as a data type for unordered collections that is iterable, changeable, and lacks duplication of elements. There are essentially two sorts of sets in Python. the frozenset and the set. Whether the frozenset is changeable or not depends on the set type. On a set, we can use add(), remove(), and other operations of this nature; however, frozenset does not support these actions.
The program is
your list = ([1,2,3,4,5])
my list[-1] = h
MyList[-1] equals MyList[0]
h print(my list, "my list");
"hello" is my string
set(my string) my set
print(my set)
Thus, the list has already been created and contains one element. The python set of my string has been already initiated.
To learn more about python set, refer to the link below:
https://brainly.com/question/14936500
#SPJ5
solve the system of equations and choose the correct ordered pair.
4x+5y=22
2x+3y = 12
Answer:
(3,2) x = 3, y = 2
Explanation:
can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and communications facilities to organizations and individual users.
A)Global Communication
B)Social Media Platform
C)Internet
D)Technological Advancement
Answer:
Internet
Explanation:
just took the test and got A
A Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with one of the nation’s largest
A)retail sellers of computers and related accessories.
B)in-store computer repair and service companies.
C)developers of computer operating systems.
D)makers of computer networking equipment.
Answer:
C
Explanation:
This job will have the largest amount of 1. computer programmers, 2. like-minded coworkers, and 3. a large number of like-minded coworkers.
Please give Brainliest if accurate!
The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.
What is the term like-minded?The Definition of the term like-minded is known to be when two or more people like or have the same purpose, habit or thought.
Therefore we can say that The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.
Learn more about Programmer from
https://brainly.com/question/23275071
#SPJ2
When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c. aborts program execution d. returns to the calling function
Answer:
sorry this is tought
Explanation:
no idea
A Python programmer is writing a function definition. What syntax should be used?
def( statement ): functionName
argument1
argument2
argument3
def functionName( arguments ):
statement1
statement2
statement3
def functionName( statement ):
argument1
argument2
argument3
def( arguments ): functionName
statement1
statement2
statement3
Answer:
Python - Functions
Advertisements
A function is a block of orgaof code that is used to perform a single, related action. Functions provide better modularity for your application and a high degree ofAdvertisement
As you already know, Python gives you many built-in functions like print(), etc. but you can also create your own functions. These functions are called user-defined functions.
Defining a Function
You can define functions to provide the required functionality. Here are simple rules to define a function in Python.
Function blocks begin with the keyword def followed by the function name and parentheses ( ( ) ).
Any input parameters or arguments should be placed within these parentheses. You can also define parameters inside these parentheses.
The first statement of a function can be an optional statement - the documentation string of the function or docstring.
The code block within every function starts with a colon (:) and is indented.
The statement return [expression] exits a function, optionally passing back an expression to the caller. A return statement with no arguments is the same as return None.
Answer:
def functionName( arguments ):
statement1
statement2
statement3
Explanation:
the formula to calculate percentage is the same as which other functions
Answer:
Division
Explanatio
Answer: everyone’s saying division, so I’m guessing the correct answer is division
Explanation: hope y’all have a blessed day
kali linux os and window os who is the best
Answer:
Windows
Explanation:
It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.
Answer:
It is only what you prefer
Explanation:
im doing programming with kali and i have no problems. although windows is more user friendly and what people use on a day to day, kali is for pentsters mostly.
PLEASE HELPP
Why do you think it is important to write your high school plan in middle school? Explain your answer in 3-4 well written sentences.
Answer:
Es muy importante que escriba su plan para la escuela secundaria antes de llegar a la escuela secundaria. Te da algo a lo que admirar cuando llegas a la escuela secundaria. Cuando lo complete, sabrá que hizo algo bien. Entonces puede establecer sus metas cada vez más altas, dándole la oportunidad de una buena vida.
Question 1 (1 point)
What is an advantage of the wireless option for peripheral?
When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the variablec) the length of the variabled) a copy of the variablee) the binary memory address
Answer:
The answer is "Option d".
Explanation:
In this question the choice d, that is "a copy of the variable" is correct because the method takes a reference value or a copy of the variable in its parameter, the example of this question can be defined as follows:
void me2(double x)//defining a method me2 with a double parameter
{
//method body
}
double x = 35.655;//defining a double variable x
me2(x);//calling a method with passing the copy of th e variable
Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse
Answer:
TrueExplanation:
Minoritys have always faced prejudice
We wish to produce a graphic that is pleasing and easily readable. Suppose we
make the background color pink. What color text font should we use to make
the text most readable? Justify your answer.Assume that the color Pink is obtained by mixing equal amounts of Red and White. Use the RGB color model and assume that the amount of each primary color in the model is described in the interval [0 255]. Describe the color of the text font you would choose using these conventions.
Answer:
light color
Explanation:
When we will mix equal amounts or equal quantities of the color red and the color white, we will get the color reddish pink. It is popularly called as the SOFT RED and the color code of this color is RGB (255, 128, 128).
Since, red color + white color = 0.5 RGB(255, 0, 0) + 0.5RGB(255, 255, 255)
= RGB (255, 128, 128)
According to me, the color white will best suit as the text color that can be used for a background having RGB(255, 128, 128). Because the color looks more red and not that pink, so it wise to use a light tone color for the natural reading purpose. Hence, it will not give strain to the eyes.
Return-from-trap instruction returns into the calling user program while simultaneously reducing the privilege level back to ________ Select one: a. User mode b. Kernel mode c. OS mode d. CPU mode
Answer:
A. user mode
Explanation:
A computer system is a machine that is run by a series of programs that connect the virtual parts (software) to the hardware or electronic parts. The kernel is a computer program that connects the software and hardware of a computer system.
The kernel-mode has several privileges like I/O, interrupts and traps, etc. This mode is tapped by root or administrators to utilize these privileges. Unlike the kernel mode, the user-mode does not have these functions, so a return from the trap instruction (kernel) reduces the privileges back to the user mode.