Answer:
In Python:
import random
computerguess = random.randint(1,101)
userguess = int(input("Take a guess: "))
while not (userguess == computerguess):
if userguess<1 or userguess>100:
print("Error")
elif not (userguess == computerguess):
if userguess < computerguess:
print("Too small")
else:
print("Too large")
userguess = int(input("Take a guess: "))
print("Congratulations")
Explanation:
This imports the random module
import random
Here, a random number is generated
computerguess = random.randint(1,101)
This prompts the user for a guess
userguess = int(input("Take a guess: "))
The following loop is repeated until the user guess correctly
while not (userguess == computerguess):
If user guess is not between 1 and 100 (inclusive)
if userguess<1 or userguess>100:
This prints error
print("Error")
If the user guessed is not correct
elif not (userguess == computerguess):
If the user guess is less
if userguess < computerguess:
It prints too small
print("Too small")
If otherwise
else:
It prints too large
print("Too large")
This prompts the user for a guess
userguess = int(input("Take a guess: "))
The loop ends here
This prints congratulations when the user guess correctly
print("Congratulations")
Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:
Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.
The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.
What do you mean by term E-mail?
An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..
E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.
Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.
In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.
Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.
Therefore, correct options are A and C.
Learn more about E-mail, refer to the link:
https://brainly.com/question/13313275
#SPJ2
Dan is working with a team that is integrating an application with a database system. Which of these statements are true with regard to database systems?
The testing phase of the SDLC creates databases.
Selection of a DBMS occurs during the designing phase of the SDLC.
Database development also has a life cycle, with phases similar to those of the SDLC.
All compilers intrinsically support database creation.
Databases use query language to perform operations.
Answer:
Database development also has a life cycle, with phases similar to those of the SDLC.
Databases use query language to perform operations.
Explanation:
PLATO :) no prob btw
Explain how the value of 90 is stored in the Java variable, myFinalGrade.
Answer:
As integer
Explanation:
More information is needed to properly answer this question.
However, I will answer this question with the limited information given.
90 will be stored as an integer in the variable.
First, the variable needs to be declared;
int myFinalGrade;
Then the variable is initialized;
myFinalGrade = 90;
Hence, the value is stored as an integer.
Certain programs, such as Adobe Acrobat
Reader, may install additional tabs to the
Ribbon. These tabs are called add-ins.
True or False
Answer:
true
Explanation:
mark brainliest ☺☺☺☺☺☺
Document accurately describes the differences between servers and computers and between local and wide area networks. Document provides at least four suggestions including password managers and safe browsers.
Thinks someone could help me out with this?
Answer:
Cell towers and internet uses allow local and wide area networks, but they also allow you to steal IP and things like that.
Explanation:
This is quite difficult. I appologize if I get this wrong.
(Also if you upload a file for someone to answer, and they give you a link, don't click on it!! They track your IP address and things like that!)
Bryan's company is new and has limited funds to work with. He has been tasked with finding a telecommunications technology that will improve worker productivity on their latest project. So he doesn't go over budget, he must carefully consider all items that affect cost. His considerations include:
Answer:
Download Speed, Operating Costs, & Purchase Price.
Explanation:
He needs it quick and he's on a budget, so he's gonna be worried about these three things that fall under the categories.
You're welcome my fellow seeker.
Successful businesses must have managers who are able to complete each of the management functions well. True False
Answer:
I think that is true.
........... Is ready made button for defining hyperlink on a slide
PlEASE HELP!
Identify in the space below three rules you feel are most important for deciding what personal information is
appropriate to post online.
Answer:
.
Names. Be careful how you use your name. Avoid using your full name. Even a nickname could spell trouble -- for instance, if it says something suggestive about your character, if it's a name you already use with others who know your real identity, or if it's made up from your real name (say, from your initials). First names are best, unless yours is extremely unusual. These days, many people do use their full names for online posting -- on social media sites and blogs for example. Just know that in doing so you're raising the risk of becoming an identity theft victim.
Photos. Bearing in mind Golden Rule #1, don't post photos you wouldn't want everyone to see. Full face, high resolution photos may be "snagged" (copied) and used for identity theft. Some people don't know how easy this is to do with any photo, with just a couple of clicks. Also, as a matter of etiquette, don't post photos of others without their permission, unless you're prepared for the consequences if the other person doesn't think it's funny. For preference, use photos in which identities are obscured. And, as a general rule, don't post photos of children online (especially not other people's children without permission). If you want to share photos of your kids, put them in a private online album, accessible by invitation or password. Or email them directly to your friends.
Explanation:
Meat and poultry exposed to some forms of radiations to extend shelf life. *
Answer:
Food Irradation
Explanation:
:)
A. RHYTHM
B. HARMONY
C. INFORMAL BALANCE
D. FORMAL BALANCE
E. PROPOTION
F. REPETITION
G. EMPHASIS
H.GRADIATION
I. BALANCE
G.RADIATION
1. It is a type of balance when the structure decoration and
accessories are different both sides from the center of the design.
2. These are smooth movement repeated again and again
3. It is a type of rhythm in which the eyes can move easily from
one part to the other on the small lines created by gathers
4. It a
principle of design in which from the center of the dress the
design should be identified on both sides.
5. It is a type of rhythm in which the parallel lines are formed by the
use of seams, lace, etc. which helps uninterrupted eye movement
6. It is a type of rhythm can be created by gradual change of lines,
shape or shade of the color
7. It is a type of balance shown when pants have pockets on both
sides with the same style, size and shape
8 It refers to a principle of design in which a large hat on a small
boy is out of proportion to his size.
9. It is a principle of design when a pretty collar, an attractive bow
bow or a lovely pin are observed
10. It is a relationship of different portion of a dress
Answer:
1. Informal balance.
2. Rhythm.
3. Radiation.
4. Balance.
5. Repetition.
6. Gradation.
7. Formal balance.
8. Proportion.
9. Emphasis.
10. Harmony.
Explanation:
Principles of designs can be defined as concepts which are typically used for organizing or arranging the structural
elements of a design. Thus, the ways in which these principles are applied generally affects the message of a piece of work.
1. Informal balance: It is a type of balance when the structure decoration and accessories are different both sides from the center of the design.
2. Rhythm: These are smooth movement repeated again and again
3. Radiation: It is a type of rhythm in which the eyes can move easily from one part to the other on the small lines created by gathers
4. Balance: It is a principle of design in which from the center of the dress the
design should be identified on both sides.
5. Repetition: It is a type of rhythm in which the parallel lines are formed by the use of seams, lace, etc. which helps uninterrupted eye movement
6. Gradation: It is a type of rhythm that can be created by gradual change of lines, shape or shade of the color
7. Formal balance: It is a type of balance shown when pants have pockets on both sides with the same style, size and shape.
8. Proportion: It refers to a principle of design in which a large hat on a small boy is out of proportion to his size.
9. Emphasis: It is a principle of design when a pretty collar, an attractive bow or a lovely pin are observed.
10. Harmony: It is a relationship of different portion of a dress.
Me pueden decir todo lo que sepan sobre las redes informáticas porfa? De preferencia que sea algo largo
Answer:
Una red informática es una fusión de varios sistemas electrónicos técnicos, principalmente independientes que permite que los sistemas individuales se comuniquen entre sí. El objetivo aquí es el intercambio de recursos como impresoras de red, servidores, archivos y bases de datos.
La estructura de red más conocida es Internet, y los protocolos a través de los cuales se transmite la información más conocidos son el TCP (Protocolo de control de transmisión) y el IP (Protocolo de Internet), pero varios otros protocolos también desempeñan funciones importantes en Internet. Internet en sí no es una red homogénea, sino que consta de un gran número de subredes, algunas de las cuales tienen diseños muy diferentes, que solo tienen en común las capas de protocolo superiores y que manejan la transmisión de datos de usuario en las capas de protocolo inferiores en muy diferentes caminos.
Select the correct answer from each drop-down menu. Which are the features of conditional formatting? Conditional formatting enables you to and .
Edhesive 8.5 code Practice help me pls
Answer:
twainQuotes = ['I have never let my schooling interfere with my education.', 'Get your facts first, and then you can distort them as much as you please.', "If you tell the truth, you don't have to remember anything.", 'The secret of getting ahead is getting started.', "Age is an issue of mind over matter. If you don't mind, it doesn't matter. "]
print(twainQuotes)
twainQuotes.sort()
print(twainQuotes)
twainQuotes.insert(1,'Courage is resistance to fear, mastery of fear, not absence of fear.' )
print(twainQuotes)
Explanation:
ok
The program is an illustration of lists and list manipulation
ListsLists are variables that are used to hold multiple values in one variable name
Python ProgramThe program in Python, where comments are used to explain each line is as follows:
#This initializes the list
twainQuotes = ['I have never let my schooling interfere with my education.', 'Get your facts first, and then you can distort them as much as you please.', "If you tell the truth, you don't have to remember anything.", 'The secret of getting ahead is getting started.', "Age is an issue of mind over matter. If you don't mind, it doesn't matter. "]
#This prints the list elements
print(twainQuotes)
#This sorts the list elements
twainQuotes.sort()
#This prints the sorted list
print(twainQuotes)
#This inserts an element into the list
twainQuotes.insert(1,'Courage is resistance to fear, mastery of fear, not absence of fear.' )
#This prints the new list
print(twainQuotes)
Read more about lists and list manipulations at:
https://brainly.com/question/24941798
What’s an input Device
Answer:
._. a computer is a input why because you can tell
Explanation:
PLS REPLY ASAP WILL MARK BRAINLIEST
Answer:
I replied ...?
Explanation:
state 4 error checking methofds for data transmition
Answer:
parity bits
CRC
MD5 hash
SHA256 hash
After inserting a video into your slide how can you test it
Explanation:
How to insert video into PowerPoint
Click on the slide you want, then go to Menu > Insert.In the top right corner, click Video > Video on My PC.Find the video you want to add and click “Insert”.Adjust the settings in the Video Format toolbar to make sure it plays the way you want.how can online presence help others?
Answer:
Online Presence helps others who might be naturally introverted, stuck in a precarious situation, or even by allowing someone company who desperately needs it.
Explanation:
int x = 42
fill in the missing part of the following code to divide x by 3 using the shorthand division operator
Select the best answer to the following question.
Remote data storage and the ability to access data from any device using the Internet is called
Answer:
I think its called "cloud computing"
Answer:
cloud computering
Explanation:
Helppppp plzzzz it's computer science helpp plzzz
1. String
2. "is assigned to"
Hello Everyone,
Please I have been have problems answering this question. I do not know if anyone could be of help to me.
Describe the difference between objects and values using the terms “equivalent” and “identical”. Illustrate the difference using your own examples with Python lists and the “is” operator.
Describe the relationship between objects, references, and aliasing. Again, create your own examples with Python lists.
Finally, create your own example of a function that modifies a list passed in as an argument. Describe what your function does in terms of arguments, parameters, objects, and references.
Create your own unique examples for this assignment. Do not copy them from the textbook or any other source
is a way og saving a file so it can be used by a different program
Answer:
what are you even asking
libre office is what program
Question 6 (2 points)
The recipe for good communication includes these "ingredients":
a.clause, brevity, comments, impact, value
B.clarity, brevity, comments, impact, value
C.clarity, brevity, context, impact, value
D.clause, brevity, context, impact, value
Answer:
C
Explanation:
i think lng hehehehehe
I need anyone's help so please do so!
Do some research online about plasmapheresis. Then write a paragraph explaining what it is and in what kind of situation it would be useful to a patient.
To add a hyperlink to your presentation, select the text, choose Hyperlink from the Insert menu, and then
type the word “hyperlink" in the Target field.
O click Apply.
change the font to blue.
O type the Internet address in the Target field.
Answer:
I guessed D, taking it right now, sorry if it's wrong
Explanation:
Answer:I guess D
Explanation:
acess labeling windows
Answer:
I got the same thing
Explanation:
What will be printed if the below code is run?
1. a = "123"
2. b = “456"
3. a = b + "123"
4. b = a
5. print (b + a)
Answer:
What will be printed if the below code is run?
1. a = "123"
2. b = “456"
3. a = b + "123"
4. b = a
5. print (b + a)