Answer:
Explanation:
The best way to do this would be to use the following line of code
clear: left;
This would make sure that there are no floating elements (li's in this scenario) on the left side of each element. Which in this navigation list would be each individual element, causing it to move each element underneath the previous element. Therefore the entire CSS code would be
.horizontal li {
display: block;
width: 12.5%;
float: left;
clear: left;
}
An example can be seen in the attached picture below.
Suppose that in a 00-11 knapsack problem, the order of the items when sorted by increasing weight is the same as their order when sorted by decreasing value. Give an efficient algorithm to find an optimal solution to this variant of the knapsack problem, and argue that your algorithm is correct.
Answer:
Following are the response to the given question:
Explanation:
The glamorous objective is to examine the items (as being the most valuable and "cheapest" items are chosen) while no item is selectable - in other words, the loading can be reached.
Assume that such a strategy also isn't optimum, this is that there is the set of items not including one of the selfish strategy items (say, i-th item), but instead a heavy, less valuable item j, with j > i and is optimal.
As [tex]W_i < w_j[/tex], the i-th item may be substituted by the j-th item, as well as the overall load is still sustainable. Moreover, because [tex]v_i>v_j[/tex] and this strategy is better, our total profit has dropped. Contradiction.
A Key Factor in Controlling Your Anger Is Using Passive behaviour.T/F
Answer:
The answer is "True".
Explanation:
Assertiveness means that others are encouraged to be open, honest about their thoughts, wishes and feelings so how they can act properly. Assertive behavior: be open and communicate wishes, ideas and feelings, as well as encourage others to do likewise. Please visit our Emotional Regulation page. A major aspect is the ability to control your anger. Once you are quiet or aggressive, work very hard.
space bar in computer
Answer: Its the one in the middle the really long thingy it looks like a rectangle
Explanation:
ITS IN THE MIDDLE
What are TWO examples of soft skills?
computer programming
o responsibility
certification
communication
troubleshooting
write short notes about monitor printer and speaker
Answer:
A computer monitor is an electronic device that shows pictures for computers. Monitors often look similar to televisions. The main difference between a monitor and a television is that a monitor does not have a television tuner to change channels. Monitors often have higher display resolution than televisions.
A printer is a device that accepts text and graphic output from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing.
Speakers receive audio input from the computer's sound card and produce audio output in the form of sound waves. Most computer speakers are active speakers, meaning they have an internal amplifier which allows you to increase the volume, or amplitude, of the sound.
High-level modulation is used: when the intelligence signal is added to the carrier at the last possible point before the transmitting antenna. in high-power applications such as standard radio broadcasting. when the transmitter must be made as power efficient as possible. all of the above.
Answer:
Option d (all of the above) is the correct answer.
Explanation:
Such High-level modulation has been provided whenever the manipulation or modification of intensity would be performed to something like a radio-frequency amplifier.Throughout the very last phase of transmitting, this then generates an AM waveform having relatively high speeds or velocity.Thus the above is the correct answer.
asdcvnmn bvcdxszasdfghjk.
Answer:
fewrugbrubpwerivrib
Explanation:
vbhresibvhresiupvkbjriururbvurfiuibvuefsbiuiuvuib
Consider the following class, which uses the instance variable balance to represent a bank account balance.
public class BankAccount {
private double balance;
public double deposit(double amount) {
/* missing code */
}
}
The deposit method is intended to increase the account balance by the deposit amount and then return the updated balance. Which of the following code segments should replace /* missing code */ so that the deposit method will work as intended?
a.
amount = balance + amount;
return amount;
b.
balance = amount;
return amount;
c.
balance = amount;
return balance;
d.
balance = amount;, , return balance;,
balance = balance + amount;
return amount;
e.
balance = balance + amount;
return balance;
Answer:
e.
balance = balance + amount;
return balance;
Explanation:
Required
Code to update account balance and return the updated balance
The code that does this task is (e).
Assume the following:
[tex]balance = 5000; amount = 2000;[/tex]
So, code (e) is as follows:
balance = balance + amount; [tex]\to[/tex]
[tex]balance = 5000 + 2000[/tex] [tex]\to[/tex]
[tex]balance = 7000[/tex]
Here, the updated value of balance is 7000
So: return balance
will return 7000 as the updated account balance
Other options are incorrect
A buffer is filled over a single input channel and emptied by a single channel with a capacity of 64 kbps. Measurements are taken in the steady state for this system with the following results:
Average packet waiting time in the buffer = 0.05 seconds
Average number of packets in residence = 1 packet
Average packet length = 1000 bits
The distributions of the arrival and service processes are unknown and cannot be assumed to be exponential.
Required:
What are the average arrival rate λ in units of packets/second and the average number of packets w waiting to be serviced in the buffer?
Answer:
a) 15.24 kbps
b) 762 bits
Explanation:
Using little law
a) Determine the average arrival rate ( λ ) in units of packets/s
λ = r / Tr --- 1
where ; r = 1000 bits , Tr = Tw + Ts = 0.05 + (( 1000 / (64 * 1000 )) = 0.0656
back to equation 1
λ = 1000 / 0.0656 = 15243.9 = 15.24 kbps
b) Determine average number of packets w to be served
w = λ * Tw = 15243.9 * 0.05 = 762.195 ≈ 762 bits
In Python, you can specify default arguments by assigning them a value in the function definition.
Answer:
use the input function to ask them their name like name = input(" enter name?: ") or
def greet(name, msg):
# This function greets to the person with the provided message
print("Hello", name + ', ' + msg)
greet("Andy", "Good morning!")
def greet(name, msg="Good morning!"):
# This function greets to
the person with the
provided message.
If the message is not provided,
it defaults to "Good
morning!
print("Hello", name + ', ' + msg)
greet("Kate")
greet("Bruce", "How do you do?")
Explanation:
it's one of these three but not sure
Given the declaration: char a[] = "Hello"; char *p = a, *q; what operations are valid syntactically? Select all that apply. Group of answer choices q = &&a[0]; q = &&a; *q = *(&a[0]); q = &(*p);
Answer:
The valid operations are:
*q = *(&a[0]); and q = &(*p);
Explanation:
Given
The above declarations
Required
The valid operations
*q = *(&a[0]); and q = &(*p); are valid assignment operations.
However, q = &&a[0]; q = &&a; are invalid because:
The assignment operations intend to implicitly cast the char array a to pointer q. C++ does not allow such operation.
Hence, *q = *(&a[0]); and q = &(*p); are valid
Another way to know the valid operations is to run the program and look out for the syntax errors thrown by the C++ compiler
A practice in which eavesdroppers drive by buildings or park outside and try to intercept wireless network traffic is referred to as: Group of answer choices cybervandalism. driveby downloading. war driving. sniffing. driveby tapping.
Answer:
war driving.
Explanation:
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.
Generally, the two (2) essential privacy concerns in the field of cybersecurity are knowing how personal data are collected and essentially how they're used by the beneficiaries or end users.
War driving can be defined as a form of cyber attack which typically involves having eavesdroppers in a moving vehicle drive by buildings or park outside so as to avail them the opportunity of intercepting a wireless network traffic using a smartphone or laptop computer and illegitimately obtain sensitive user informations for further unauthorized use or to perform other fraudulent activities.
A wireless router is what kind of networking device?
Select one
a. End device
b. Intermediary device
c Peripheral Device
d. Connecting Device
Answer:
D, routers enable us to connect to the internet.
find the summation of even number between (2,n)
Answer:
The program in python is as follows:
n = int(input("n: "))
sum = 0
for i in range(2,n+1):
if i%2 == 0:
sum+=i
print(sum)
Explanation:
This gets input n
n = int(input("n: "))
This initializes sum to 0
sum = 0
This iterates through n
for i in range(2,n+1):
This checks if current digit is even
if i%2 == 0:
If yes, take the sum of the digit
sum+=i
Print the calculated even sum
print(sum)
The small flash memory used in
protable device like Laptop
Answer: flash drive
Explanation:
Flash drives are refered to as small, portable storage devices which makes use of a USB interface in order to be connected to a laptop.
Flash cards are removable and rewritable. They are mainly used to store data. Flash cards can be found in computers, laptops, digital cameras etc.
Kesley has been hired to set up a network for a large business with ten employees. Which of the factors below will be
least important to her in designing the company's network?
the tasks performed by each computer on the network
the number of hours each employee works
O the number of computers that will be on the network
the way in which business documents are shared in the organization
TURN IT IN
NEXT QUESTION
ASK FOR HELP
The first PCI bus has a 32-bit data path, supplied 5 V of power to an adapter card, and operated at what frequency?
a. 88 MHz
b.64 MHz
c. 16 MHz
d. 33 MHz
Answer:
D. 33mhz
Explanation:
The PCI is short for peripheral component interconnect. This has speed and was made by Intel. At first it was made to be 32 bits and with a speed that 2as up to 33 megahertz. But other versions that followed had 64 bit and 66 megahertz.
This bus can stay with other buses and can work in synchronous or the asynchronous mode.
Assume that a file contains students’ ids, full names, and their scores (Assignments grade, quizzes grade, Midterm grade, Practical exam grade, and final exam grade) (each column is separated by $). You are required to write a C program to do the following:
• Using the concept of parallel arrays create records for students with above attributes (id, full name, score).(you are not allowed to use structure)
• Ask the user to enter the input file name and read it (suppose that, there are different files you could read data from). Read the data from the file and store it in record for students, which has IDs, Names, and Scores. The IDs should be declared as integers, the Names as a two-dimensional array of characters and the Scores as doubles. Assume that the maximum length of full name of any student is 50 characters. Also, you may assume that there will be No more than a 1000 student records in the file.
• Calculate the final grade as the flowing:
Grade= (Assignment)*15%+(Quizzes) *15%+(Midterm exam) *25%+(Practical Exam)
*10%+(Final) *35% Assuming that data in files are arranged in same order of the above equation with respect to grades
Hint: read form file, calculate the final score, and store it in the record before going to the next step.
• Display the following menu to the user and read the entered choice:
1) Sort data in ascending order according to students’ IDs and then display it.
2) Sort data in ascending order according to students’ names and then display it.
3) Sort data in descending order according to students’ scores and then display it.
Note: After running any of the above menus items, ask the user if he/she would like to save the current result, if so, prompt user to enter file name.
4) Ask the user to enter a student ID and display his score
5) Ask the user to enter a student name and display his score
6) Exit the program
The program should keep displaying the menu until the user selects to exit from the program.
Implement each of the first five menu options as a separate function.
The attached file “data.txt” is for test.
JavaAssignmentFirst, launch NetBeans and close any previous projects that may be open (at the top menu go to File ==> Close All Projects).Then create a new Java application called "BackwardsStrings" (without the quotation marks) that:Prompts the user at the command line for one 3-character string.Then (after the user inputs that first 3-character string) prompts the user for another 3-character string.Then prints out the two input strings with a space between them.Finally prints on a separate line the two input strings 'in reverse' (see example below) with a space between them.So, for example, if the first string is 'usr' and the second string is 'bin', your program would output something like the following:The two strings you entered are: usr bin.The two strings in reverse are: nib rsu.Note that the reversed SECOND string comes FIRST when printing the strings in reverse.my result/*Name: Saima SultanaLab:PA - BackwardsStrings (Group 2)*/package backwardsstrings;import java.util.Scanner;public class BackwardsStrings { public static void main(String[] args) { //variables String first, second; // TODO code application logic here StringBuilder firstReversed= new StringBuilder(); StringBuilder secondReversed= new StringBuilder(); Scanner input = new Scanner(System.in); // read strings first=input.nextLine(); second=input.nextLine(); // print out the input strings System.out.println("The two string you entered are:"+ first+" "+second+"."); // reverse the strings for ( int i=first.length()-1;i>=0; i--) firstReversed.append(first.charAt(i)); for ( int i=second.length()-1;i>=0; i--) secondReversed.append(second.charAt(i));// print out the reverse string System.out.println("The two strings in reverse are:"+secondReversed+" "+ firstReversed+ ".");}}
Answer:
Your program would run without error if you declared the first and second string variables before using them:
Modify the following:
first=input.nextLine();
second=input.nextLine();
to:
String first=input.nextLine();
String second=input.nextLine();
Explanation:
Required
Program to print two strings in forward and reversed order
The program you added is correct. The only thing that needs to be done is variable declarations (because variables that are not declared cannot be used).
So, you need to declared first and second as strings. This can be done as follows:
(1) Only declaration
String first, second;
(2) Declaration and inputs
String first=input.nextLine();
String second=input.nextLine();
evaluate (0.999)^8, to six places of decimal
Answer:
Here is your answer 0.99202794407
C++Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in an expression.#include using namespace std;double FindMax(double num1, double num2) { double maxVal; // Note: if-else statements need not be understood to complete this activity if (num1 > num2) { // if num1 is greater than num2, maxVal = num1; // then num1 is the maxVal. } else { // Otherwise, maxVal = num2; // num2 is the maxVal. } return maxVal;}int main() { double numA; double numB; double numY; double numZ; double maxSum; cin >> numA; cin >> numB; cin >> numY; cin >> numZ; /* Your solution goes here */ cout << "maxSum is: " << maxSum << endl; return 0;}
Answer:
Replace the comment with:
maxSum =FindMax(numA,numB)+FindMax(numY,numZ);
Explanation:
Required
The statement to add up the two maximum from the functions
To do this, we have to call FindMax for both arguments i.e.
FindMax(numA,numB) and FindMax(numY,numZ) respectively
Next, use the + sign to add up the returned value.
So, the complete statement is:
maxSum =FindMax(numA,numB)+FindMax(numY,numZ);
See attachment for complete program
why absolute reference is used in spreadsheet
Absolute reference is used especially to keep the value or content of a column or row constant.
Explanation:Cell referencing is one common and important concept in spreadsheets. A cell reference or cell address is a value, mostly alphanumeric, used to identify a specific cell or cell range in a worksheet.
In spreadsheets such as that of Microsoft - excel - there are basically two types of referencing.
i. relative referencing
ii. absolute referencing
iii. mixed referencing
Relative reference is the default cell reference. When a relative reference is copied and pasted across multiple cells, it changes depending on its relative position. This type of reference is especially useful when there is a need to apply same formula across multiple rows or columns.
Absolute reference, on the other hand, will not change even though it is copied across multiple cells. It is used especially to keep the value or content of a column or row constant.
Mixed reference is a hybrid of the relative and absolute references.
Selecting missing puppies 1 # Select the dogs where Age is greater than 2 2 greater_than_2 = mpr [mpr. Age > 2] 3 print(greater_than_2) Let's return to our DataFrame of missing puppies, which is loaded as mpr. Let's select a few different rows to learn more about the other missing dogs. 5 # Select the dogs whose Status is equal to Still Missing 6 still_missing = mpr[mpr. Status == 'Still Missing'] 7 print (still_missing) Instructions 100 XP • Select the dogs where Age is greater than 2. 9 # Select all dogs whose Dog Breed is not equal to Poodle 10 not-poodle = mpr [mpr.Dog Breed != 'Poodle'] 11 print(not_poodle) • Select the dogs whose Status is equal to Still Missing. • Select all dogs whose Dog Breed is not equal to Poodle. Run Code Submit Answer * Take Hint (-30 XP) IPython Shell Slides Incorrect Submission Did you correctly define the variable not_poodle ? Expected something different. # Select all dogs whose Dog Breed is not equal to Poodle not_poodle = mpr[mpr.Dog Breed != 'Poodle'] print(not_poodle) File "", line 10 not_poodle = mpr [mpr.Dog Breed != 'Poodle'] Did you find this feedback helpful? ✓ Yes x No SyntaxError: invalid syntax
Answer:
# the dog dataframe has been loaded as mpr
# select the dogs where Age is greater than 2
greater_than_2 = mpr [mpr. age > 2]
print(greater_than_2)
# select the dogs whose status is equal to 'still missing'
still_missing = mpr[mpr. status == 'Still Missing']
print(still_missing)
# select all dogs whose dog breed is not equal to Poodle
not_poodle = mpr [mpr.breed != 'Poodle']
print(not_poodle)
Explanation:
The pandas dataframe is a tabular data structure that holds data in rows and columns like a spreadsheet. It is used for statistical data analysis and visualization.
The three program statements above use python conditional statements and operators to retrieve rows matching a given value or condition.
how can you explain that algorithm and flowchart are problem solving tools?
Answer:
Algorithm and flowchart are the powerful tools for learning programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way. Algorithm and flowcharts helps to clarify all the steps for solving the problem.
NO LINKS
Write a C++ program to accept a 5 digit integer and to validate the input based on the following rules.
Rules
1) The input number is divisible by 2. 2) The sum of the first two digits is less than last two digits. if the input number satisfies all the rules, the system prints valid and invalid, otherwise,
Example 1:
Enter a value: 11222
Output: Input number is valid
Example 2:
Enter a value: 1234
Output: Input number is invalid
Answer:
#include <iostream>
#include <string>
#include <regex>
using namespace std;
int main()
{
cout << "Enter a 5-digit number: ";
string number;
cin >> number;
bool valid = regex_search(number, regex("^\\d{4}[02468]$"));
if (valid) {
valid = stoi(number.substr(0, 1)) + stoi(number.substr(1, 1))
< stoi(number.substr(3, 1)) + stoi(number.substr(4, 1));
}
cout << number << (valid ? " is valid" : " is invalid");
}
Explanation:
Regular expressions can do all of your checking except for the sum of digits check. The checks are i.m.o. easiest if you don't treat the input as a number, but as a string with digits in it.
The regex means:
^ start of string
\d{4} exactly 4 digits
[02468] one of 0, 2, 4, 6 or 8 (this is what makes it even)
$ end of string
explain about primary memory?
Answer:
Primary memory is computer memory that a processor or computer accesses first or directly. It allows a processor to access running execution applications and services that are temporarily stored in a specific memory location. Primary memory is also known as primary storage or main memory.
Explanation:
When an item is gray that means...
A. The item only works with another application
B. The item has been selected
C. The item is unavailable
D. The item has been deleted
A,B,C,orD, can anyone please help?
Answer:
B. The item has been selected
Answer:
C
Explanation:
When an item is unavailable, usually referring to the Technology field, it is gray. Gray items are things that are not created anymore, sold out or not enough supply. The color gray is usually used to symbol something bad, and not having a product is considered bad. Using our background knowledge, we can concude that the answer is option C.
Write a program that accepts a date in the form month/day/year and outputs whether or not the date is valid. For example, 5/24/1962 is valid, but 9/31/2000 is not. (September has only 30 days.)
Answer:
Here is the code.
Explanation:
#include <stdlib.h>
#include <stdio.h>
int check_month(int month);
int check_date(int year, int month, int day);
void display_date(int year, int month, int day);
int check_year(int year);
int main (void)
{
int year, month, day;
int valid;
printf("\t\t\t\tEnter Date \n");
printf("\nyear (yyyy): ");
scanf("%d",&year);
printf("month: ");
scanf("%d",&month);
printf("day: ");
scanf("%d", &day);
valid = check_month(month);
if (valid)
{
valid = check_date(year, month, day);
}
if (valid)
{
display_date(year, month, day);
printf("is a valid date. \n");
}
else
{
display_date(year, month, day);
printf("is a illegal date. \n");
}
system ("pause");
return 0;
}
int check_month(int month)
{
int flag;
if (month>=1 && month<=12)
flag = 1;
else
flag = 0;
return flag;
}
int check_date(int year, int month, int day)
{
int valid;
int leep_year;
switch (month)
{
case 1:
case 3:
case 5:
case 7:
case 8:
case 10:
case 12:
if (day>=1 && day<=31)
valid = 1;
else
valid = 0;
break;
case 2:
leep_year = check_year(year);
if (leep_year)
{ if (day>=1 && day<=29)
valid = 1;
else
valid = 0;
}
else
{ if (day>=1 && day<=28)
valid = 1;
else
valid = 0;
}
break;
case 4:
case 6:
case 9:
case 11:
if (day>=1 && day<=30)
valid = 1;
else
valid = 0;
break;
}
return valid;
}
int check_year(int year)
{
int leep_year;
if (year%4==0)
{
if (year%100==0)
{
if (year%400==0)
leep_year = 1; // 1600, 2000
else
leep_year = 0; // 1700, 1800, 1900, 2100
}
else
{
leep_year = 1; // 2004, 1996
}
}
else
{
leep_year = 0; // 2003, 2011
}
return leep_year;
}
void display_date(int year, int month, int day)
{
if (month == 1)
printf("January");
else if (month == 2)
printf("February");
else if (month == 3)
printf("March");
else if (month == 4)
printf("April");
else if (month == 5)
printf("May");
else if (month == 6)
printf("June");
else if (month == 7)
printf("July");
else if (month == 8)
printf("August");
else if (month == 9)
printf("September");
else if (month == 10)
printf("October");
else if (month == 11)
printf("November");
else if (month == 12)
printf("December");
else
printf("The Month enter is not valid.\n");
printf(" %d, %d ",day,year);
}
Which statement describes what happens when a user configures No Automatic Filtering in Junk Mail Options?
O No messages will ever be blocked from the user's mailbox.
O Messages can still be blocked at the server level
O Messages cannot be blocked at the network firewall
O Most obvious spam messages will still reach the client computer
ANSWER IM TIMED
Answer: Most obvious spam messages will still reach the client computer
Explanation:
It should be noted that by default, usually the junk email filter is already set to No Automatic Filtering.
When a user configures No Automatic Filtering in Junk Mail Options, it should be noted that most obvious spam messages will still reach the client computer.
Therefore, the correct option is D.
Use the drop-down menus to complete the steps for rearranging the layout of a form.
1. Open the form in
✔ Design
view.
2.
✔ Press Ctrl+A
to highlight all of the fields.
3. Under Form Design Tools, select the
✔ Arrange
tab.
4. Choose the Remove Layout button.
5. Reorder and arrange the layout as desired.
6. Review the changes in the
✔ Layout
view.
7. Click Save.
Just did it.
Answer:
1. Open the Form
2. Arrange tabs
3. Layout view
4. Reoder and arrange the Layout as desired
5. Press Ctrl + A
6. Choose the remove Layout button
7. Click Save
I am not sure
The complete steps for rearranging the layout of a form are in the order:
1, 2, 3, 4, 5, 6, and 7.What is a form layout?A form layout is the arrangement of all elements, components, and attributes of your form and the placement of the form on a specific page.
When rearranging the layout of the form, the steps to take are as follows:
Open the form in Design View (this means that the form needs adjustment and rearrangement.Press Ctrl+A (this control all function) helps to highlight all the features in the form layout fields.Under Form Design Tools, select the Arrange tab.Choose the Remove Layout button.Reorder and arrange the layout as desired.Review the changes in the Layout view.Click Save.Learn more about form layout arrangement here:
https://brainly.com/question/9759966
#SPJ2