PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!


Answers

Answer 1

Answer:

what's the question?

Explanation:

I see no question.


Related Questions

What is the term for the action of Brazil imposing tariffs on US imports in response to the imposed tariffs by the U.S. on Brazilian exports to the United States ?

A. Reclaiming
B. Retaliation
C.retribution

Answers

I think the answer is B.

Can someone help me do this who ever does it first get 100 points :)

Answers

Answer:

Wired: Means a cable or a wire connected thats the opposite of wireless.

Wireless is bascially a device with no cable needed.

3G: GB

4G: GB

5G: GB

Explanation:

Wired: Means a cable or a wire connected thats the opposite of wireless.

Wireless is bascially a device with no cable needed.

3G: GB

4G: GB

5G: GB

P3. Produce a plan to use social media in a business to meet its business requirements.

Answers

The plan to use social media in a business include:

It is important to audit the current social presence.  The company should document who their Ideal customer is. A mission statement should be created. One should identify the key success metrics. An engaging content should be created.  The company should also invest in a social media management tool.

It should be noted that using social media in a business is an effective way to meet its business requirements and achieve organizational goals.

Learn more about social media on:

https://brainly.com/question/1163631

What did World Com do to try to keep its stock price from falling?

Answers

The company had good enough internal controls to prevent Scott D.

The term for an operator that may not evaluate one of its subexpressions is

Answers

Answer:

short-circuit

Explanation:

What’s the relationship among speed frequency and the number of poles in a three phase induction motor

Answers

Answer:

The number of poles in the windings defines the motor's ideal speed. A motor with a higher number of poles will have a slower rated speed but a higher rated torque.

Explanation:

The relationship among speed, frequency, and the number of poles in a three-phase induction motor is governed by what is known as the synchronous speed equation.

The synchronous speed of an induction motor is the speed at which the rotating magnetic field generated by the stator windings of the motor rotates.

The synchronous speed (Ns) of a three-phase induction motor is given by the following equation:

Ns = (120 × f) / P

where:

Ns is the synchronous speed in revolutions per minute (RPM).

f is the supply frequency in hertz (Hz).

P is the number of poles.

From the equation, it can be observed that the synchronous speed is directly proportional to the frequency and inversely proportional to the number of poles.

This means that if the frequency increases, the synchronous speed also increases, assuming the number of poles remains constant.

Conversely, if the frequency decreases, the synchronous speed decreases.

The actual speed of an induction motor is known as the rotor speed or slip speed, which is always slightly lower than the synchronous speed. The difference between the synchronous speed and the actual speed is referred to as slip and is necessary for the motor to induce a voltage in the rotor and generate torque.

It's important to note that the synchronous speed equation assumes an ideal motor with no load. In practice, the actual speed of the motor depends on various factors, including the load torque, rotor resistance, and motor design.

Learn more about synchronous speed equation click;

https://brainly.com/question/33166801

#SPJ2

Marci enjoyed the restaurant's meatloaf so much, she asked for the recipe. She wants to make 1/6 of the recipe. How much garlic powder does Marci need?

Answers

Answer:

she needs 1/6 of the garlic powder in the original recipe

Hope This Helps!!!

Many subject elements make for simple and streamlined looking images. true or false

Answers

Answer:

Explanation:

false. many elements means a complicated picture, not a simple one.

The statement "Many subject elements make for simple and streamlined-looking images" is absolutely false.

What do you mean by Subject element?

The Subject element may be defined as the elements or components of the subject that are significantly responsible for constructing simple or complicated representations in the form of images.

It is a term or phrase that deals with the representation of fundamental topics on which a particular image relies. It significantly defines all the taxonomic attributes of the streamlined-looking images.

According to the context of this question, many subject elements will definitely lead to complicated and more streamlined images rather than simple ones.

Therefore, the statement "Many subject elements make for simple and streamlined-looking images" is absolutely false.

To learn more about Images elements, refer to the link:

https://brainly.com/question/26307469

#SPJ2

The operation of an enable input on a multiplexer chip is.

Answers

Answer:

is used to activate the chip.

Explanation:

when enable is high the chip works (ACTIVE), when enable is low the chip does not work (MEMORY).

Does technology always follow the science,yes or no explain why to choice

Answers

Answer:

No

Explanation:

because Technology does not always follow science but it may actually lead science in some instances. An example is weather forecasting.Again Mark me brainliest plz i really need it

Simple question: what is bandwidth?

Answers

The maximum amount of data transmitted over an internet connection in a given amount of time

Answer:

It is the amount of data that can be transmitted in a set period of time, that is the rate of data supported by the network connection.

In simple definition, it can be said to be the data transfer capacity of a computer network in bits per second (bps).

Explanation:

Making data secure means keeping it secret

Answers

Answer:

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.

Term software refers to

(a) Computer manuals only

(b) Computer programs only

(c) Machinery

(d) Computer manuals and programs

Answers

Answer:

(b) Computer programs only

Explanation:

[tex]{}[/tex]

Answer:

b

Explanation:

HOPE THAT THIS IS HELPFUL. HAVE A GREAT DAY.

Implement a function mystery( ) that takes as input a positive integer n and answers this
question. How many times can n be halved (using integer division) before reaching 1?

Answers

Count= 0
While n > 1
n = n
Count += 1
Return count

The function mystery that takes as input a positive integer n is given below. The number of times that can n be halved (using integer division) before reaching 1 is infinite.

What are function mysteries?

The non-negative integers are used to define the mystery function. The more common name of this method is hidden to avoid tempting you to explore the Web for assistance in completing this task, which would be a very dishonorable thing to do. Assume n has m bits.

Count= 0

While n > 1

n = n

Count += 1

Return count

Once. You now have 1/2. You can split 1/2 in half to make quarters, but that is not dividing one, it is dividing one half. If you mean how long the series of subsequent subdivisions you can make can be, the answer is infinite.

Therefore, the number of times that can n be halved (using integer division) before reaching 1 is infinite.

To learn more about function mysteries, refer to the below link:

https://brainly.com/question/14201335

#SPJ2

See if you can do better then I did

Answers

Answer:

no i can't do better ggs

Explanation:

im not smart (also I did answer the question ;) )

Distinguish between principles, guidelines and standards, using examples of each to illustrate​

Answers

Explanation:

principles is what governs a place

guidelines is what you read to guide you

standards is what build up in your self

Answer:

A principle is a basic truth to live by, such as “All human beings are equal in the eyes of God.” A guideline is a general rule or piece of advice such as “don't burn your bridges.” A standard is a rule to be upheld such as the Ten

Building a String Library

Sometimes when programming you need to introduce a new data type and develop a library of functions for manipulating instances of that data type. Often this is done as methods on a new class but not always.

In this assignment, you'll be defining a collection of functions on strings, most of which already exist as methods on the str class. However, you should pretend that they don't already exist and define them as functions. Of course, you can't just use the existing methods. This will give you a bunch of practice on manipulating strings and also on defining functions.

In this assignment, you'll be defining a collection of functions on strings. You should define each of these as a new function with a function header as below. The description of each is in the comment supplied. Recall that strings are immutable, so you will have to return a new copy of the string for those that call for you to return a string. If you are returning the same string as the input, just return it; there is no need to make a new copy, and it wouldn't anyway.

The only string functions/methods to use:

ord, chr
indexing and slicing
append (i.e., ``+'')
len, in, not in
equality comparison (== or !=))
Looping over strings (while or for loops) and selection (if statements) are allowed. BUT You cannot convert the strings to other types such as lists.

Define each of the following functions, with semantics as indicated by the comment. In each of the following ch is a single character, str, str1, str2 are strings, and i is a non-negative integer. You do not have to validate the inputs, except as indicated; you can assume these types.

At least one question asks you to return two values. That really means returning a tuple (pair) of values. You do that as follows:

return value1, value2
This actually returns the pair (value1, value2). The caller can then assign the members of the pair to two variables:

x, y = pairReturningFunction() # assumes function returns a pair
z, w = (value1, value2) # assigning a tuple to 2 variables
If you like, you can use earlier functions in later ones, or define helper functions, though it shouldn't really be necessary. Note that some of these are trivial to write, while others are a bit harder. I have done the first one for you.

def myAppend( str, ch ):
# Return a new string that is like str but with
# character ch added at the end
return str + ch

def myCount( str, ch ):
# Return the number of times character ch appears
# in str.

def myExtend( str1, str2 ):
# Return a new string that contains the elements of
# str1 followed by the elements of str2, in the same
# order they appear in str2.

def myMin( str ):
# Return the character in str with the lowest ASCII code.
# If str is empty, print "Empty string: no min value"
# and return None.

def myInsert( str, i, ch ):
# Return a new string like str except that ch has been
# inserted at the ith position. I.e., the string is now
# one character longer than before. Print "Invalid index" if
# i is greater than the length of str and return None.

def myPop( str, i ):
# Return two results:
# 1. a new string that is like str but with the ith
# element removed;
# 2. the value that was removed.
# Print "Invalid index" if i is greater than or
# equal to len(str), and return str unchanged and None

def myFind( str, ch ):
# Return the index of the first (leftmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

def myRFind( str, ch ):
# Return the index of the last (rightmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

def myRemove( str, ch ):
# Return a new string with the first occurrence of ch
# removed. If there is none, return str.

def myRemoveAll( str, ch ):
# Return a new string with all occurrences of ch.
# removed. If there are none, return str.

def myReverse( str ):
# Return a new string like str but with the characters
# in the reverse order.
Expected output:

>>> from MyStringFunctions import *
>>> s1 = "abcd"
>>> s2 = "efgh"
>>> myAppend( s1, "e" )
'abcde'
>>> myCount( s1, "e")
0
>>> myCount( s1, "a")
1
>>> myCount( "abcabc", "a")
2
>>> myExtend( s1, s2 )
'abcdefgh'
>>> myMin( "" )
Empty string: no min value # Note the None doesn't print
>>> myMin( "zqralm" )
'a'
>>> myMin( "Hello World!" )
' '
>>> myInsert( "abc", 0, "d")
'dabc'
>>> myInsert( "abc", 2, "d")
'abdc'
>>> myInsert( "abc", 4, "d")
Invalid index # Note the None doesn't print
>>> myPop( "abcd", 1 )
('acd', 'b')
>>> myPop( "abcd", 0 )
('bcd', 'a')
>>> myPop( "abcd", 5)
Invalid index
('abcd', None)
>>> myFind( "abcdabcd", "a")
0
>>> myFind( "abcdabcd", "c")
2
>>> myFind( "abcdabcd", "f")
-1
>>> myRFind("abcdabcd", "d")
7
>>> myRFind("abcdabcd", "e")
-1
>>> myRemove( "abcdabcd", "a")
'bcdabcd'
>>> myRemove( "abcdabcd", "x")
'abcdabcd'
>>> myRemove( "abcdabcd", "d")
'abcabcd'
>>> myRemoveAll("abcabcabca", "a")
'bcbcbc'
>>> myReverse( "abcd" )
'dcba'
>>> myReverse( "" )
''

Answers

Code:

def myAppend( str, ch ):
# Return a new string that is like str but with
# character ch added at the end
return str + ch

def myCount( str, ch ):
# Return the number of times character ch appears
# in str.

# initiaalizing count with 0
count = 0

# iterating over every characters present in str
for character in str:
# incrementing count by 1 if character == ch
if character == ch:
count += 1

# returning count
return count


def myExtend( str1, str2 ):
# Return a new string that contains the elements of
# str1 followed by the elements of str2, in the same
# order they appear in str2.

# concatenating both strings and returning its result
return str1 + str2

def myMin( str ):
# Return the character in str with the lowest ASCII code.

# If str is empty, print "Empty string: no min value"
# and return None.
if str == "":
print("Empty string: no min value")
return None

# storing first character from str in char
char = str[0]

# iterating over every characters present in str
for character in str:
# if current character is lower than char then
# assigning char with current character
if character < char:
char = character
# returning char
return char


def myInsert( str, i, ch ):
# Return a new string like str except that ch has been
# inserted at the ith position. I.e., the string is now
# one character longer than before.

# Print "Invalid index" if
# i is greater than the length of str and return None.

if i > len(str):
print("Invalid index")
return None

# str[:i] gives substring starting from 0 and upto ith position
# str[i:] gives substring starting from i and till last position
# returning the concatenated result of all three
return str[:i]+ch+str[i:]

def myPop( str, i ):
# Return two results:
# 1. a new string that is like str but with the ith
# element removed;
# 2. the value that was removed.
# Print "Invalid index" if i is greater than or
# equal to len(str), and return str unchanged and None
if i >= len(str):
print("Invalid index")
return str, None

# finding new string without ith character
new_str = str[:i] + str[i+1:]

# returning new_str and popped character
return new_str, str[i]

def myFind( str, ch ):
# Return the index of the first (leftmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

# finding length of the string
length = len(str)

# iterating over every characters present in str
for i in range(length):
# returning position i at which character was found
if str[i]==ch:
return i
# returning -1 otherwise
return -1


def myRFind( str, ch ):
# Return the index of the last (rightmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

# finding length of the string
length = len(str)

# iterating over every characters present in str from right side
for i in range(length-1, 0, -1):
# returning position i at which character was found
if str[i]==ch:
return i
# returning -1 otherwise
return -1

def myRemove( str, ch ):
# Return a new string with the first occurrence of ch
# removed. If there is none, return str.

# returning str if ch is not present in str
if ch not in str:
return str

# finding position of first occurence of ch in str
pos = 0

for char in str:
# stopping loop if both character matches
if char == ch:
break
# incrementing pos by 1
pos += 1

# returning strig excluding first occurence of ch
return str[:pos] + str[pos+1:]

def myRemoveAll( str, ch ):
# Return a new string with all occurrences of ch.
# removed. If there are none, return str.

# creating an empty string
string = ""

# iterating over each and every character of str
for char in str:
# if char is not matching with ch then adding it to string
if char!=ch:
string += char
# returning string
return string

def myReverse( str ):
# Return a new string like str but with the characters
# in the reverse order.

return str[::-1]

when i use python idle to execute a command, i get this message in shell

RESTART: C:/something something

Answers

Answer:

yes it always come whenever u execute a command

It comes with everyone

Questions Description Explain how you will identify and use texts according to the function you wish for it to serve in the particular industry​

Answers

The texts have different purposes that can be identified with the following tips:

Identify the main ideas. Identify the author's purpose.

What is a text?

A text is a term to refer to the set of phrases and words ordered coherently to be interpreted and to transmit the ideas of an author (emitter or speaker).

Texts can have a variety of topics depending on the author's intention. For example:

Scientific texts: They are the texts that have the purpose of sharing scientific information with exact data and results of experiments or others. Literary texts: They are the best known texts that stand out for including a diversity of topics, they are characterized by telling an in-depth story. News texts: They are the texts that expose all the details of a news story and have the purpose of objectively reporting.

According to the above, to identify a text it is necessary to read it and identify the main ideas and the purpose of its author when writing it. Additionally, the texts are tools for different professions to teach skills, knowledge and techniques depending on the requirement.

Learn more about text in: https://brainly.com/question/1142673

What would graphics be classified as?

Answers

Answer:

raster and vector graphics

raster graphics is the answer

Write code that assigns bigValue with the return value of calling the function GetBiggestValue passing number1 and number2 as arguments (in that order). Then, assign bigValue with the return value of calling GetBiggestValue passing bigValue and number3 as arguments (in that order).

Answers

Code:

Function GetBiggestValue(integer value1, integer value2) returns integer result
if value1 > value2
result = value1
else
result = value2

Function Main() returns nothing
integer userVal1
integer userVal2
integer userVal3
integer bigValue

userVal1 = Get next input
userVal2 = Get next input
userVal3 = Get next input

bigValue = GetBiggestValue(userVal1, userVal2)
bigValue = GetBiggestValue(bigValue, userVal3)

Put "Max value: " to output
Put bigValue to output

Assume that students in a course are required to produce a written report on an ICT-related
the topic each semester. If you wanted to create a model to estimate how long it should take a student to
complete such an assignment, what measure of work content would you use? Some reports might be
more difficult to produce than others: what factors might affect the degree of difficulty? Provide a list
of factors and explain each briefly.

Answers

Based on the information given, the measures of work content that can be utilized will be:

The student's knowledge of the subject.   The work's difficulty. The student's research hours.

In order to create a model to estimate how long it should take a student to

complete such an assignment, the important measures include the knowledge of the student on the subject, research hours, etc. This may be evaluated on a scale of 0 to 10.

The factors that may influence the degree of difficulty include:

The student's access to materials for the assignment. The student's familiarity with the work. The amount of time required to fully grasp the subject.

Learn more about a model on:

https://brainly.com/question/17764105

reflection image and design

Answers

Explanation:

It is the image and design

A data analyst is working with a data frame named retail. It has separate columns for dollars (price_dollars) and cents (price_cents). The analyst wants to combine the two columns into a single column named price, with the dollars and cents separated by a decimal point. For example, if the value in the price_dollars column is 10, and the value in the price_cents column is 50, the value in the price column will be 10.50. What code chunk lets the analyst create the price column

Answers

The code chunk that lets the analyst create the price column is;

unite(retail, “price”, price_dollars, price_cents, sep=”.”)

The code chunk unite(retail, “price”, price_dollars, price_cents, sep=”.”) is the one that will allow the analyst to create the price column.

The reason for that answer is that;

The unite() function would allow the analyst  to make the dollars and cents data to be combined into a single column.Meanwhile, in the parentheses of the given function, the analyst will write the name of the data frame.Next step for the analyst is to write the name of the new column in quotation marks.Next step is the names of the two columns they want to combine.Lastly, the argument sep=”.” will now place a decimal point between the dollars and cents data given in the price column.

Read more about programming at; https://brainly.com/question/15683939

A company purchases a flood insurance policy for its data center. What is its risk

management decision?

1) Mitigation

2) Acceptance

3) Avoidance

4) Transference

Answers

When a company purchases a flood insurance policy for its data center, the risk management decision it took is: 4) Transference.

Risk management can be defined as a process which involves identifying, evaluating, analyzing and controlling potential risks (threats) that are present in a business, which can serve as an obstacle to its capital, revenues and profits.

Basically, risk management decision typically involves prioritizing cause of action or potential threats, so as to avoid, mitigate or transfer the risk that are likely to arise from such business decisions.

The risks or threats that are faced by a business firm can be transferred to a third-party such as an insurance agency, especially to protect its assets and resources in the event of a natural disaster such as flood, fire, earthquake, etc.

In conclusion, transference is a risk management decision that occurs when  a company purchases a flood insurance policy for its data center.

Read more on risk management here: https://brainly.com/question/13760012

When running the following code:
true = 5
false = 6
print (true + false)
-
The interpreter will:

Answers

Answer:

print(11)

Explanation:

true + false = print statement

5 + 6 = 11

To permit communication between two people who do not speak the same language, interpreters accurately and objectively translate spoken or sign languages into other languages.

What is role of print statements in interpreter?

It is the interpreter's responsibility to use these code objects and carry out the directives. You might be astonished to learn that compilation even occurs during the execution of Python code.

As contrast to “compiled” languages like C or Rust, Python is frequently referred to as a “interpreted” language like Ruby or Perl.

A trained expert who facilitates communication between those who speak or sign in various languages is known as an interpretation.

The print() function outputs the message to the normal output device, such as the screen. The message can be a string or any other object, and before it is displayed on the screen, the object will be changed into a string.

Therefore, true + false = print statement 5 + 6 = 11

Learn more about print statements here:

https://brainly.com/question/24200615

#SPJ2

Convert 12 bits to bytes​

Answers

Answer:

1.5 bytes

Explanation:

I byte = 8 bit ....

Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself. The program should ask for a destination file to save as the last question.

Answers

Answer:

there was a type of user name and sentences

I need help in php coding

Answers

How can i help you please post your question

Write a program to test if an integer input from the keyboard is odd or even. Sample Run 1: Enter a Number: 78 Even Sample Run 2: Enter a Number: 17 Odd

Answers

Answer:

number = int(input("Enter a number: "))

if number % 2 == 0:

   print("Even")

else:

   print("Odd")

Explanation:

Currently taking python at school. On the last few lessons.

Other Questions
When there are two bearings and you want to go out to five how many will they be left Which of the following statements correctly uses the distributive property?-2(15 - 3) = -2(15) + (-2)(3)7(9 - 8) = 7(9) - 89(-7 + 6) = 9(-7) + 9(6)-3(12 + 5) = -3(12) - (-3)(5) Which expression is equivalent to StartFraction RootIndex 7 StartRoot x squared EndRoot Over RootIndex 5 StartRoot y cubed EndRoot? Assume y not-equals 0. (x Superscript two-sevenths Baseline) (y Superscript negative three-fifths Baseline) (x Superscript two-sevenths Baseline) (y Superscript five-thirds Baseline) (x Superscript two-sevenths Baseline) (y Superscript three-fifths Baseline) (x Superscript seven-halves Baseline) (y Superscript negative five-thirds Baseline). the weak base ionization constant (ka) for h2c2o4 is equal to what? How do I find x please I need help asap Which ordered pairs are solutions to the inequality 2y-x-6 ? a. (0,-3) b. (5,10) c. (2, -2) d. (-5, 2) How many crew members did Zheng He command?a.16,000c.40,000b.32,000d.28,000 You plan on making a $235. 15 monthly deposit into an account that pays 3. 2% interest, compounded monthly, for 20 years. At the end of this period, you plan on withdrawing regular monthly payments. Determine the amount that you can withdraw each month for 10 years, if you plan on not having anything in the account at the end of the 10 year period and no future deposits are made to the account. A. $769. 27 b. $767. 23 c. $78,910. 41 d. $79,120. 84. which event occurs as a direct result of pops tellling ted he wants t get rid of Ollly Militia members ready to fight atminute's notice" were calledA. the best of the militiaB. turn coatsC. minute men Fifteen cards numbered 1-15 are placed in a hat. What is the probability that the card has a multiple of 3 on it, given that the card picked is an oddnumber? Express your answer as a fraction in simplest form. Select all the polygons that have reflection symmetry.A quadrilateral with two pairs of adjacent congruent sides, forming a kite. A polygon is shaped like a composite figure made up of a rectangle with a small square on its top side and the same sized square on its right side.A polygon shaped like a five-pointed star in which the left and right sides of the star are mirror imagesA six-sided polygon that generally appears as a diagonally-oriented trapezoid attached to a shorter horizontally-oriented rectangle.Assessment navigation(added this for all^ my homies with k12 so its easier to find just ignore it) Summarize the lytic cycle. (1 point)The viral DNA incorporates itself with the host cells and replicates whenever the host cell replicates itself.A virus copies its genetic material and then splits its cell membranes in half to form identical viruses.A virus lays eggs on the host cells protein coat, which then hatch and move on to infect other cells.A virus injects its genetic material into the host cell, copies itself, and then forms new viruses that burst out of the host cell. 1. How does the figure below illustrate Hund's rule? What happens to a liquid in a U-tube manometer when placed in a vacuum What led to the Boston Massacre in 1770? Debt from French and Indian War High taxes for property owners Presence of British soldiers in Boston Reduced prices on imported goods #8) Identify all pairs of congruent sides Turn the following pair of sentence into one sentence by using present participleThey hope to find the place before darkThey continued their journey. What was king David (from the Bible) reason for fighting? A line passes through the points (-4,1) and (-3,3). This line can be modeled by the equation y = mx + b.Complete the table to determine the values of m and b.