The pseudocode of the program is simply a prototype of the actual program
How to write the pseudocode?The pseudocode that does the requirements in the question is as follows:
StartGet Input for amount of purchaseCompute the state tax: sales tax = sales tax percentage * amountCompute the provisional sales tax: provisional sales tax = provisional sales tax percentage * amountPrint the taxesRead more about pseudocode at:
https://brainly.com/question/24735155
#SPJ1
Write code that does the following: opens an output file with the filename number_ list.txt, uses a loop to write the numbers 1 through 100 to the file, then closes the file.
Answer:
6
Explanation:
# create the file
filemane= "Testfile.txt"
# for writing, we create the iutput file:
output = open(filename, "w")
#Writibg numbers from 1-100
for item in range 1,101):
Question 5
What keyboard button do you hold to select multiple cells simultaneously?
Shift
Alt
Ctrl
Tab
2 p
2 nts
Answer:
Ctrl hope it will help :)
What is the error in this program?
when
clicked
define Tickle
Tickle Cat
forever
touching mouse pointer ? then
play sound Giggle- until done
O A. The name of the function doesn't match the function that is
defined.
OB. There is no end block under the "Tickle Cat" function.
OC. All the blocks should be in one connected stack to function.
O D. The "forever" block should be removed so the "Giggle" sound
stops.
The error in this program above is that All the blocks should be in one connected stack to function.
What are the errors in a program?In the act of developing a programs there are some kinds of error that can take place such as syntax errors, logic errors and others.
Note that in the program above, The error in this program above is that All the blocks should be in one connected stack to function and thus there is an error.
Learn more about program from
https://brainly.com/question/1538272
#SPJ1
Which tasks fall under WBS?
Kevin’s WBS for a project
Project manager Kevin has made a project plan for a software development project. a) Kevin calls a meeting with his team members to further discuss project requirements.
In the meeting they decide to b) break down deliverables into subdeliverables with detailed explanations.
After listing the tasks and milestones, the project team c) decides to enter the duration for each task. The entire list of tasks follows a logical sequence which aids in scheduling.
Answer:
Amongst them are a risk management plan, quality plan, procurement plan, communications plan, staffing plan, and a work breakdown schedule plan. The work breakdown schedule includes the start and completion dates for all tasks, activities, and deliverables defined in the WBS.
A diagram of a ten-node network that uses ten routers
The diagram of the of a ten-node network that uses ten routers is given in the image attached.
What is a node in a network?A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.
Note that they are known to often receive and send data from one network or endpoint to another.
Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.
Learn more about routers from
https://brainly.com/question/24812743
#SPJ1
PLEASE HELP!
I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please help!
On a phone.
To block link that keeps popping up everywhere, one can:
Use your browser and click on block Pop-ups in settingsInstall an antivirus.How do I stop pop-up links?One can do so if they Manage the pop-up by blocking it in the Chrome browser where they:
Click on Settings from the Chrome menu.input 'pop' in the search bar.Select Site Settings and then select Pop-ups and redirects.Here one can toggle the Pop-ups and redirections option to Blocked them.Therefore, To block link that keeps popping up everywhere, one can:
Use your browser and click on block Pop-ups in settingsInstall an antivirus.Learn more about pop up link from
https://brainly.com/question/13666301
#SPJ1
which access object cannot be used to enter or edit data
a. Report
b. Table
c.Query
d. Form
Answer:
Should be B. table !
Write a java program as follows Write a method called powOfTwo that takes an integer as parameter, computes, and outputs it’s square
Answer:
public static int powOfTwo(int input) {
return input*input;
}
You will have to call this method in main
for printing it, write
System.out.println(powOfTwo(your number));
in public static void main(str[]args) {
}
I need help with some homework. I would like to know what is the easiest way to reach out.
Read the quotation from "Song of Myself."
It is not far, it is within reach,
Perhaps you have been on it since you were born and did not know,
Perhaps it is everywhere on water and on land.
Shoulder your duds dear son, and I will mine, and let us hasten forth,
Wonderful cities and free nations we shall fetch as we go.
In this quotation, the first stanza has a different style from the second section. What does this suggest about Whitman’s overall style in the poem?
that Whitman does not have a distinctive style as a poet
that Whitman’s style allows for various kinds of language
that Whitman is comfortable using traditional styles of poetry
that Whitman’s style conforms to age-old rules of poetry
Mark this and return
Based on the first stanza from "Song of Myself," the overall style suggests: B. that Whitman's style allows for various kinds of language.
What is a poem?A poem is a literary work that comprises either written or spoken words which are carefully chosen and arranged in separate lines, especially based on their diction (sound), rhythm, and meaning.
Based on the first stanza from "Song of Myself," we can infer and logically conclude that the overall style suggests: B. that Whitman's style allows for various kinds of language.
Read more on Whitman's style here: https://brainly.com/question/12881683
#SPJ1
Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method
Using the computational language in python we have to use it to write to a file and read with the code.
Writing this code in python we have:filename = input()
file = open(filename)
lines = file.readlines()
data = {}
for i in range(0, len(lines), 2):
num_seasons = int(lines[i].strip())
show = lines[i + 1].strip()
if num_seasons not in data:
data[num_seasons] = []
data[num_seasons].append(show)
file.close()
file_writer = open('output_keys.txt', 'w')
titles = []
for num_seasons in sorted(data):
shows = []
for show in sorted(data[num_seasons]):
titles.append(show)
file_writer.write(str(num_seasons) + ': ' + '; '.join(data[num_seasons]) + '\n')
file_writer.close()
file_writer = open('output_titles.txt', 'w')
for title in sorted(titles):
file_writer.write(title + '\n')
file_writer.close()
See more about python at brainly.com/question/18502436
#SPJ1
I need a WordPress or Shopify website for my new business? Can anyone recommend low-budget services for e-commerce?
A good recommendation in terms of low-budget services for e-commerce is Shopify website.
Which is better for eCommerce?When comparing the two options that are given above, i will chose Shopify as it is known to be sales-focused businesses and very easy-to-use.
Note that it is made up of full-featured and an automated e-commerce solution and thus A good recommendation in terms of low-budget services for e-commerce is Shopify website.
Learn more about WordPress from
https://brainly.com/question/14391618
#SPJ1
can u please help me solve this
Alice has twice as many pencils as Cara. Leon has three more pencils than Alice. The three children have a total of 58 pencils.
What are the no. of pencils?
The no. of pencils are there totally as the 11.
Read more about the basic maths:
https://brainly.com/question/19493296
#SPJ1
Write an if-else statement that determines whether the variable points is outside the range of 9 to 51. If points is outside the range,
"Invalid Points" should be displayed. Otherwise, "valid Points" should be displayed.
Answer: Using Python
Explanation:
num = int(input("Enter number > "))
if num in range (9, 52):
print("Valid Points")
else:
print("Invalid Points ")
Choose the correct answer (picture included)
GIVING BRAINLIEST
15 POINTS!
Answer:
C++
Explanation:
for robot arms the first three axes are called
[tex]\huge\purple{Hi!}[/tex]
Cartesian robots (sometimes called rectilinear or gantry robots) have three linear axes, x, y, z.
Task 2
Rearrange the lines in the Python program below, so that you have a runnable program
that holds a meaningful interaction with the user.
2
1 print("And where do you live", name)
print("I've never been to", location)
name = input()
3
4 print("What is your name?")
5 location = input()
Write your rearranged program below:
Answer:
If the following answer is helpful please mark as brainliest. This is the answer:
Explanation:
print("What is your name?")
name=input()
print("And where do you live", name)
location=input()
print("I've never been to", location)
when a playtester is playing your game, it is useful to give them frequent hints, help them, or otherwise defend your game. True false
If a playtester is playing your game, it is useful to give them frequent hints, help them, or otherwise defend your game is a false statement.
What makes a good game method?In game mechanics, one to look or think about the experience of the game that is made or one is creating.
Note that If a playtester is playing your game, it is useful to give them frequent hints, help them, or otherwise defend your game is a false statement as it does not need those kind of input.
Learn more about Games from
https://brainly.com/question/2684713
#SPJ1
If your laptop is not able to connect to your wireless network, which of the
following might be a likely cause of the problem?
A. The laptop is too far away from the source of the signal.
B. The display screen on the laptop is too small.
C. The signal from the wireless source is too strong for the laptop.
D. The laptop is operating from a battery rather than a wall outlet.
Which of the following answers is incorrect regarding the Naive Bayes algorithm?
Select the best answer (as an incorrect claim)
Select one:
A.
The algorithm uses the conditional probability of the feature given by the class.
B.
The features can be discrete, but can also be continuous.
C.
Because we want to prevent underflow, we calculate a sum of logs of the probabilities instead of their multiplication .
D.
We prefer features with high dependency to get better prediction.
Answer:
B. The features can be discrete, but can also be continuous.
Explanation:
Each continuous attribute can be discretized and the continuous attribute value replaced with the matching discrete interval.
View One | View All
2
A team of students is in the process of designing a control system. After
conducting extensive testing of the prototype, the team discovers that it does not
work as expected. The team returns to a previous step of the engineering design
process.
Which step should the team take next in order to complete this project?
to present their solution
to plan their next prototype tests
to design a new solution
to define their new problem
In the case above step should the team take next in order to complete this project is to to plan their next prototype tests.
What are the steps in the design process?The engineering design process is known to be made up of seven step and they are:
Define the problem AskImaginePlan Prototype Test ImproveNote that In the case above step should the team take next in order to complete this project is to to plan their next prototype tests because they have gone a step backward.
Learn more about engineering design process from
https://brainly.com/question/17711844
#SPJ1
various types of mouse pointer
Answer:
Text Pointer
Busy Pointer
Link Pointer
Precision Pointer
Standard Pointer
Help Pointer
Background Busy Pointer
How do the InfoSec management team's goals and objectives differ from those of the IT and general management communities
InfoSec management team's goals and objectives differ from those of the IT and general management communities in terms of:
Strategic planningLevels of work.Risk management How does SecDLC differs?The SecSDLC is known to be a lot more aligned with risk management practices and it is one that makes a huge effort in knowing the kinds of specific threats and risks, and makes or create and implements a lot of controls to counter those threats and aid in management of the said risk.
Therefore, InfoSec management team's goals and objectives differ from those of the IT and general management communities in terms of:
Strategic planningLevels of work.Risk managementLearn more about management team's from
https://brainly.com/question/24553900
#SPJ1
Dominic's plane was delayed, so he connected to the free Wi-Fi and was about to log into Netflix to watch a movie. He thought about his friend who was coming to pet sit for his family while they were away. He thought he might get bored and want to watch a movie too while he was there and sent him a text.
In the case above, to be able to use the Netflix to watch a movie, he needs the password for the Netflix account as well as if there is already a Netflix subscription.
Is Netflix free?It is known to be only the first month that is said to be free and then one can either proceed to either cancel or let NETFLIX automatically charge one for the account.
In the case above, to be able to use the Netflix to watch a movie, he needs the password for the Netflix account as well as if there is already a Netflix subscription.
Learn more about Wifi from
https://brainly.com/question/13267315
#SPJ1
In order to protect your computer from the newest virues which of the following should you do after you installed virus scan software
In order to protect your computer from the newest viruses, you should update the antivirus software and virus definition on a regular basis.
What is a virus?A virus can be defined as a malicious software program that moves through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.
This ultimately implies that, you should update the antivirus software and virus definition on a regular basis, so as to protect your computer from the newest viruses.
Read more on a virus here: brainly.com/question/26128220
#SPJ1
If your computer determines the destination address of a network packet is to a remote network.
What does the Data Link layer software do with that packet?
The data link layer software would replace the MAC address of the next hop or gateway when the destination address of a network packet is to a remote network.
What is a data link layer?The data link layer is the second layer of the OSI model and it can be defined as an interface between the network and physical layer. Also, it comprises two (2) main sublayers and these include the following:
Logical link control (LLC) layer.Media access control (MAC) layer.In Computer networking, the data link layer software would replace the MAC address of the next hop or gateway when the destination address of a network packet is to a remote network.
Read more on data link layer here: https://brainly.com/question/13131540
#SPJ1
Why do many organizations use the hybrid and multi-Cloud approach?
A lot of organizations use the hybrid and multi-Cloud approach as It allows businesses to share control of their data with other businesses.
What is hybrid and multi-cloud approach?The "multi-cloud" and "hybrid cloud" are known to be a kind of cloud deployments that help to bring out or use more than one cloud.
Note that A lot of organizations use the hybrid and multi-Cloud approach as It allows businesses to share control of their data with other businesses and thus makes work easy for them.
See full question below
Why do many organizations use the hybrid and multi-cloud approach? A.it allows businesses to share control of their data with other businesses. B.it combines the benefits of public and private cloud providers. C.it eliminates the dependency on any private cloud providers. D.it ensures the business is completely dependent on a single provider.
Learn more about multi-Cloud approach from
https://brainly.com/question/13273767
#SPJ1
Irene establishes a wireless connection between her laptop and smartphone for sharing files. She has created a LANWANPAN, which generally uses Ethernet cablesBluetoothWi-Fi for communication.
Irene created a LAN , which generally uses Ethernet cables for communication.
What is LAN about?The LAN ports are known to be employed to link computers that do not have Wi-Fi access and it is one that make use of an Ethernet cable.
Note that Irene created a LAN , which generally uses Ethernet cables for communication to access the internet.
Learn more about wireless connection from
https://brainly.com/question/26956118
#SPJ1
Design a program that will ask the user to enter the amount of a purchase. The program
should then compute the state and provincial sales tax. Assume the state sales tax is 5
percent and the provincial sales tax is 2 percent. The program should display the
amount of the purchase, the state sales tax, the provincial sales tax, the total sales tax,
and the total of the sale (which is the sum of the amount of purchase plus the total sales
tax)
The program is a sequential program, and they do not require loops and conditions
The program design in PythonThe complete program written in Python is as follows:
purchaseAmount = float(input("Amount: "))
stateSalesTax = 0.05 * purchaseAmount
provincialSalesTax = 0.02 * purchaseAmount
print("Amount:",purchaseAmount)
print("State sales tax:",stateSalesTax)
print("Provincial sales tax:",provincialSalesTax)
print("Total sales tax:",(stateSalesTax + provincialSalesTax))
print("Total sales:",(purchaseAmount + stateSalesTax + provincialSalesTax))
Read more about Python programs at:
https://brainly.com/question/26497128
#SPJ1
If I use the command right(90), which way will Tracy turn?
If correct I mark brainlist
Answer: Right
Explanation: If you use the Command Right (90°), it makes sense that Tracy turns right 90°...