4.5 code practice PUT IN PYTHON LANGUAGE HELP NEEDED

4.5 Code Practice PUT IN PYTHON LANGUAGE HELP NEEDED

Answers

Answer 1

Answer:

wordcount = 0

while (True):

 word = input("Please enter the next word: ")

 if word.lower() == "done": break

 wordcount = wordcount+1

 print("#%d: You entered the word %s" % (wordcount, word))

 

print ("A total of %d words were entered." % wordcount)

Explanation:

I made the stop word case insensitive, so both done and DONE will work.


Related Questions

Phillip is using an optical device to look at the stars. He knows that it uses mirrors, but cannot remember its name. He is using a ......

refracting telescope
reflecting telescope
refracting microscope
reflecting microscope

EXPLAIN WHY YOU CHOOSE THAT ANSWER​

Answers

Answer:

He is using a REFLECTING TELESCOPE.

Explanation:

A telescope is an optical instrument that is used by scientists or astronomers to view objects that are very faraway such as objects that are in space. For example: the galaxies, the stars, the moon, the planet e.t.c.

The mode of operation of a telescope is, a telescope makes use of either a lens or mirrors which are curved. This lens or mirrors focus the light rays from the faraway objects and uses them to form an image.

We have two types of telescopes.

a. Refracting Telescope: Another name for a refracting telescope is a refractor. The refracting telescope uses a lens to focus the rays of light and form an image.

b. Reflecting telescope: This is also called a reflector. It is different from the refracting telescope because it makes use of curved mirrors to focus the rays of light and form an image. The images formed by reflecting telescopes are very big and clear. Those images are also free from any form of abberation such as chromatic abberation.

From the above question, Phillip is using an optical device to look at the stars. He knows that it uses mirrors, but cannot remember its name. He is using a REFLECTING TELESCOPE. The reason for my answer is because it is said in the question that the optical device makes use of mirrors and it is only a reflecting telescope that uses mirrors.

match each sentence to the type of context clue it represents.

Answers

Answer: was willing to help but there isn’t any picture of anything about what each sentence says

Write a single instruction that will move the value in register 12 to register 14. (The answer should be lowercase.)

Answers

In computer architecture, a register is a small amount of memory storage used for rapid access by the central processing unit (CPU) of a computer. The CPU can manipulate the data stored in the registers using instructions that specify the operation to be performed and the operands (e.g., registers or memory locations) involved in the operation.

To move the value in register 12 to register 14, we can use a single instruction that specifies the operation of moving the data and the source and destination registers. The instruction to accomplish this in assembly language depends on the specific instruction set architecture (ISA) of the CPU, but a common example in x86 assembly language would be:

mov r12, r14

This instruction copies the value stored in register 12 to register 14 by moving the data from the source register (r12) to the destination register (r14). Other ISAs may use different syntax or mnemonics for the same operation, but the underlying principle remains the same.

Learn more about register here:

https://brainly.com/question/31807041

#SPJ11

Which of the following careers often requires expertise in mathematics and statistics to find relevant trends and patterns in data?
1 Database developer
2 Data scientist
3 Data analyst
4 Database administrator

Answers

Answer:

Explanation:

1. Database developer - set theory, relational algebra, relational calculus, and logic. These skills will allow managers to handle

2.  Data scientist

Linear Algebra. Knowing how to build linear equations is a critical component of machine learning algorithm development. ...

Calculus. ...

Statistics. ...

Probability.

3. 3 Data analyst

Applied Statistics. Applied statistics involves model formulation, model assumptions, and logistic regression. ...

Probability Theory. ...

Linear Algebra. ...

Calculus.

Why can the internet keep growing as more devices are added without decrease in performance?

Answers

Answer:

Explanation:

There may be many reasons why your internet speed is slow. Internet use requires a reliable connection between your device and the destination, which may be a server that is physically located on the other side of the world.Your connection to that server could pass through hundreds of devices on its journey. Each one of these is a potential failure, or weak point. If one point along this path isn’t functioning optimally, this can significantly affect your internet experience.

There are many reasons your Internet connection might appear slow. It could be a problem with your modem or router, Wi-Fi signal, signal strength on your cable line, devices on your network saturating your bandwidth, or even a slow DNS server. These troubleshooting steps will help you pin down the cause.

A progress Bar appears as a Dark blue line in the Gantt chart Bar when
OA. We print the Repda
OB. We enter the actual values
OC. We create Summary Tasks
OD. We Enter Resources

Answers

Answer: The answer is OD

Explanation:

The answer is OD. We Enter Resources. A progress bar in a Gantt Chart Bar will appear when resources are entered, as the progress bar is used to visually show how much of the task has been completed. When resources are entered, the progress bar will be blue to indicate the amount of work done by each resource on the task.

How can I learn programming in mobile?​

Answers

Answer:

You sadly cannot use your coding knowledge to complete things on mobile, but you can learn through YouTuube and Gooogle and such, and simple type it out in Gooogle docs or something. There are sadly no mobile friendly coding websites.

Hope This Helped!

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

A web search engine is a that helps you locate on the web.

Answers

A web search engine is a software which helps you locate on the web.

A web search engine is a software that searches the web  for information is known as a web search engine. A user query's search results are frequently presented as a list. Web pages, pictures, and other file kinds could be included in the lists.

some major search engines are  Yahoo , Bing etc

Learn more about search engine here:

https://brainly.com/question/20850124

#SPJ10

which language is written using 0s and 1S​

Answers

Answer:

binary

Explanation:

a computer speak because of how they are built

pls help with this two.

pls help with this two.

Answers

Answer:

I love my *country ** so i am going visit it

Answer:

I also like my country very much

you should write a program to open a file called novel.txt and read in all the words. for this purpose let's assume that words are groups of letters and punctuation separated by spaces.

Answers

To write a program that opens a file called "novel.txt" and reads in all the words, you can follow these steps:



1. Start by opening the file using the appropriate function or method in your programming language. In most programming languages, you can use the "open" function to do this. Make sure to specify the file name ("novel.txt") and the mode as "read" so that you can read the contents of the file.

2. Once the file is open, you can read its contents. In many programming languages, you can use a loop to iterate through each line of the file. Inside the loop, you can use a split function or method to break the line into individual words based on spaces.

3. After splitting each line into words, you can store them in a data structure like a list or an array. This will allow you to access the words later for further processing.

Here's an example in Python:

```python
# Open the file
with open("novel.txt", "r") as file:
   # Initialize an empty list to store the words
   words = []
   
   # Read each line in the file
   for line in file:
       # Split the line into words based on spaces
       line_words = line.split()
       
       # Add the words to the list
       words.extend(line_words)

# Print the total number of words in the novel
print(f"The novel contains {len(words)} words.")
```

In this example, we use the `open` function to open the "novel.txt" file in read mode. The words are added to the `words` list using the `extend` method. Finally, we print the total number of words in the novel by using the `len` function on the `words` list.

To know more about novel.txt visit:

https://brainly.com/question/28746762

#SPJ11

CODE IN JAVA
Overview The purpose of this assignment is to practice object oriented design to create two programs: 1. An object that evaluates mathematical expressions 2. A GUI around the artifact from (1)
. Submission Your assignment will be submitted using github. Only the "main" branch of your repository will be graded. Late submission is determined by the last commit time on the "main" branch. You are required to submit a documentation PDF named "documentation.pdf" in a "documentation" folder at the root of your project. Please refer to the documentation requirements posted on iLearn. Organization and appearance of this document is critical. Please use spelling and grammar checkers - your ability to communicate about software and technology is almost as important as your ability to write software! We will test your program using the following commands: 1. git clone your-repository-name 2. cd your-repository-name 3. find . -name "*.class" -type f -delete 4. find . -name "*.jar" -type f -delete 5. Copy some code into your repository that is going to be expecting Evaluator.java and EvaluatorUi.java at the root Requirements You will be provided with a code skeleton for the Evaluator class (Evaluator.java). You should program the utility classes it uses - Operand and Operator - and then follow the algorithm described below to complete the implementation of the Evaluator class. The Evaluator implements a single public method, eval, that takes a single String parameter that represents an infix mathematical expression, parses and evaluates the expression, and returns the integer result. An example expression is 2 + 3 * 4, which would be evaluated to 14. The expressions are composed of integer operands and operators drawn from the set +, -, *, /, ^, (, and ). These operators have the following precedence: The algorithm that is partially implemented in eval processes the tokens in the expression string using two Stacks; one for operators and one for operands (algorithm reproduced here from http://csis.pace.edu/~murthy/ProgrammingProblems/ 16_Evaluation_of_infix_expressions): * If an operand token is scanned, an Operand object is created from the token, and pushed to the operand Stack * If an operator token is scanned, and the operator Stack is empty, then an Operator object is created from the token, and pushed to the operator Stack * If an operator token is scanned, and the operator Stack is not empty, and the operator’s precedence is greater than the precedence of the Operator at the top of the Stack, then an Operator object is created from the token, and pushed to the operator Stack * If the token is (, an Operator object is created from the token, and pushed to the operator Stack * If the token is ), then process Operators until the corresponding ( is encountered. Pop the ( Operator. * If none of the above cases apply, process an Operator. Processing an Operator means to: * Pop the operand Stack twice (for each operand - note the order!!) * Pop the operator Stack * Execute the Operator with the two Operands * Push the result onto the operand Stack When all tokens are read, process Operators until the operator Stack is empty.
Requirement 1: Implement the above algorithm within the Evaluator class.
Requirement 2: Test this implementation with expressions that test all possible cases (you may use the included EvaluatorTest class to do this). Operator Precedence +, - 2 *, / 3 ^ 4
Requirement 3: Implement the following class hierarchy * Operator must be an abstract superclass. * boolean check( String token ) - returns true if the specified token is an operator * abstract int priority() - returns the precedence of the operator * abstract Operand execute( Operand operandOne, Operand operandTwo ) - performs a mathematical calculation dependent on its type * This class should contain a HashMap with all of the Operators stored as values, keyed by their token. An interface should be created in Operator to allow the Evaluator (or other software components in our system) to look up Operators by token. * Individual Operator classes must be subclassed from Operator to implement each of the operations allowed in our expressions, and should be properly organized in your project. *Operand * boolean check( String token ) - returns true if the specified token is an operand * Operand( String token ) - Constructor * Operand( int value ) - Constructor * int getValue() - returns the integer value of this operand
Requirement 4: Reuse your Evaluator implementation in the provided GUI Calculator (EvaluatorUI.java)

Answers

This assignment focuses on creating two programs using object-oriented design principles. The first program is an evaluator for mathematical expressions, while the second program is a GUI calculator that utilizes the evaluator.

The assignment requires the implementation of utility classes such as Operand and Operator, following a provided algorithm for evaluating expressions. Additionally, a class hierarchy for operators needs to be implemented, with the Operator class as an abstract superclass and individual operator classes subclassed from it. The hierarchy should include methods for checking operators, determining operator precedence, and performing mathematical calculations. Finally, the Evaluator implementation should be reused in the provided GUI Calculator (EvaluatorUI.java).

To complete this assignment, you need to follow the requirements outlined in the prompt. Start by implementing the algorithm for evaluating mathematical expressions in the Evaluator class. This involves processing tokens, managing operand and operator stacks, and executing operators with operands. Test your implementation thoroughly using different expressions to ensure it handles all possible cases correctly.

Next, create a class hierarchy for operators, with the Operator class as an abstract superclass. Implement methods for checking operators, determining operator precedence, and performing calculations based on the operator type. Use a HashMap to store the operators, allowing lookup by their tokens. Subclass the Operator class to create individual operator classes for each allowed operation, ensuring proper organization in your project.

Finally, reuse your Evaluator implementation in the provided GUI Calculator (EvaluatorUI.java). Integrate the evaluator with the GUI components to enable expression evaluation and display the results to the user.

Learn more about object-oriented design here:

https://brainly.com/question/31857274

#SPJ11

What can Amber do to make sure no one else can access her document? O Use password protection. O Add editing restrictions. O Use Hidden text. O Mark it as final.​

Answers

Add a password.

The question is asking how to make sure no one can “access” it which means look at it at all. This means that Editing restricting still allow people to access it, white text does nothing but make the text invisible, and marking it as final still gives them access
use password protection.

Which of the following is a valid statement?​

A. Constraints are rules used to enforce business rules, practices, and policies

B. Constraints ensure the accuracy and integrity of data.

C. Constraints prevent errors by not allowing data to be added to tables if the data violates specific rules.

D. All of the above

Answers

The valid statement among the following are Constraints are rules used to enforce business rules, practices, and policies; Constraints ensure the accuracy and integrity of data and Constraints prevent errors by not allowing data to be added to tables if the data violates specific rules.

So, the correct answer is D "All of the above."

What are Constraints?

Constraints can be referred to as the specific limitations placed on tables and columns. These limitations are placed to ensure the accuracy and reliability of the data stored in the database. They help in preventing errors by not allowing the data to be added to tables if the data violates specific rules.

Constraints are used to enforce business rules, practices, and policies. Constraints ensure the accuracy and integrity of data. Hence, "All of the above" is the valid statement among the following terms.

Therefore the answer is D

Learn more about constraints at

https://brainly.com/question/31076408

#SPJ11

Short response: write blank verse

what if romeo had taken slower-acting poison? imagine that juliet wakes before the poison kills romeo, so that he is able to utter his last words of love to her. write six to eight lines of blank verse in which romeo says goodbye to juliet before dying.

from: romeo and juliet

Answers

If Romeo had taken a slower-acting poison, Perhaps he would have had more time with Juliet, To say the words of love that he held so dear, To feel her warmth and hold her near.

And if by chance Juliet woke before his end, He could whisper his last goodbye to his friend, "Fair Juliet, my love for thee shall never wane, Even in death, my heart doth remain."

In this alternate scenario, Romeo takes a slower-acting poison, allowing for a heartfelt farewell with Juliet as she awakens. Here are six lines of blank verse capturing Romeo's last words to Juliet: "With feeble breath, my love, I see thee wake, As poison courses slowly through my veins.

I wish to hold thee close, but death's embrace Draws nearer still, and soon will claim my life. Oh, sweetest Juliet, my final words Are those of love for thee, unyielding, true."

Learn more about Romeo and Juliet https://brainly.com/question/8933214

#SPJ11

in windows 10, what is the name of a program you can use to find a file or folder?

Answers

Answer:

windows search explorer

Twenty staff members will be doing data entry activities from 10 p.m. to 3 a.m. on a regular basis. You could check if a given operating system will handle this activity by performing _____.

soak testing.
stress testing
load testing
spike testing

Answers

I would say Stress Testing and if not that than Load Testing

Instructions
Write the code to input a number and print the square root. Use the absolute value function to make sure that if the user enters a
negative number, the program does not crash.

Answers

Answer:

*** Python Code ***

from math import sqrt

def squareRoot(x):

   print(sqrt(abs(x)))

squareRoot(float(input("Square-root of this number: ")))

*** Sample Input ***

Square-root of this number: 4

*** Sample Output ***

2.0

Explanation:

For this problem, we will simply use the python built-in methods for finding the square root and taking the absolute value of a number.

Line 1:  from math import sqrt

This line of code imports the square root method from the math module so we can compute the square root of our number

Line 2: def squareRoot(x):

This line of code is a function definition of a method we are creating called "sqareRoot" in which it takes a single argument x

Line 3:  print(sqrt(abs(x)))

This line of code takes the absolute value of the function argument x, takes the square root of that number, and then prints the result to the console

Line 4:  squareRoot(float(input("Square-root of this number: ")))

This line of code takes in a user input number, converts the string to a float, and then passes the number as the argument to our user defined function squareRoot

Cheers.

a. demonstrate your knowledge of application of the law by doing the following: 1. explain how the computer fraud and abuse act and the electronic communications privacy act each specifically relate to the criminal activity described in the case study. 2. explain how three laws, regulations, or legal cases apply in the justification of legal action based upon negligence described in the case study. 3. discuss two instances in which duty of due care was lacking. 4. describe how the sarbanes-oxley act (sox) applies to the case study.

Answers

In this response, we address several aspects related to the application of laws in a case study. We explain how the Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA) relate to criminal activities described in the case study.

1. The Computer Fraud and Abuse Act (CFAA) and the Electronic Communications Privacy Act (ECPA) are relevant to the criminal activity in the case study. The CFAA addresses unauthorized access to computer systems and the intentional or malicious use of information obtained through such access. The ECPA focuses on privacy protection by regulating the interception and disclosure of electronic communications. In the case study, if the perpetrator gained unauthorized access to computer systems or intercepted electronic communications, these laws would apply to prosecute the criminal activity.

2. Three laws, regulations, or legal cases that justify legal action based on negligence in the case study could include data protection regulations, such as the General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA). These laws emphasize the need for organizations to protect personal data and implement appropriate security measures.

3. Instances where a duty of due care was lacking could be observed in the case study. For example, if the organization failed to implement reasonable security measures, such as encryption protocols, secure access controls, or regular security assessments, it would indicate a lack of duty of due care.

4. The Sarbanes-Oxley Act (SOX) applies to the case study if the organization involved is a publicly traded company. SOX requires companies to establish and maintain internal controls over financial reporting to ensure the accuracy and integrity of financial statements. If the case study involves fraudulent financial activities or misrepresentation of financial data, SOX would be applicable to enforce accountability and prevent such fraudulent practices.

Learn more about legal frameworks here:

https://brainly.com/question/30746795

#SPJ11

The iteration variable begins counting with which number?
O 0
O 1
O 10
O 0 or 1

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The iteration variable begins counting with 0 or 1.

As you know the iteration mostly done in the looping. For example, for loop and foreach loop and while loop, etc.

It depends upon you that from where you can begin the counting. You can begin counting either from zero or from one.

For example: this program counts 0 to 9.

int total=0;

for(int i=0; i>10;i++)

{

total = total+i;

}

Let's suppose, if you want to begin counting from 1, then the loop should look like below:

int total=0;

for(int i=1; i>10;i++)

{

total = total+i;

}

Answer:

I truly believe its 0

hope it helps :)

Explanation:

1)write a python program to check wheter the given number is even or odd
2) write a python program to add any 5 subjects makrs, find sum and average (average=sum/5)
3)write a python program to print numbers from 1 to 100 using loops

Answers

Answer:

n = 16

if n%2:

 print('{} is odd'.format(n))

else:

 print('{} is even'.format(n))

m1 = 5

m2 = 4

m3 = 6

m4 = 8

m5 = 9

sum = m1+m2+m3+m4+m5

average = sum/5

print("The sum is {}, the average is {}". format(sum, average))

for i in range(1, 101): print(i, end=",")

Explanation:

Above program does all three tasks.

Answer:

1) num1 = int(input("Enter the number to be checked: "))

if num1%2==0:

   print("Your number is an even number!")

else:

   print("Your number is not even!")

2) maths = int(input("Enter your maths mark: "))

english = int(input("Enter your english mark: "))

social = int(input("Enter your social mark: "))

science = int(input("Enter your science mark: "))

computer = int(input("Enter your computer mark: "))

Sum =  maths + english + social + science + computer

average = Sum / 5

print("Sum of your marks are:",Sum)

print("average of your marks are:",average)

3) num = 0

while num <= 99:

   num+=1

   print(num)

Explanation:

Welcome.

A programmer is developing an action-adventure game that will require the player to defeat different types of enemies and a boss on each level. Which part of the game design document should include this information?

Answers

The part of the game design document that should include this information is demographic. The correct option is D.

What is programming?

Programming is the process of creating a program that contains a set of instructions that form a system to run on a computer. These programs are the working base of the computer.

Games are developed with proper programming and here an adventure game is to be made by programming language. These programming languages are java, C++, Python, etc. Demographic game design should be used here.

Therefore, the correct option is d, Demographic.

To learn more about programming, refer to the link:

https://brainly.com/question/14409192

#SPJ1

Answer:

Project highlights

2.4.2 just did it

Explanation:

Morgan is the operations manager for a national appliance distributor. The company has offices throughout the United States. Communication between offices is vital to the efficient operation of the company. Phone sales are an important source of revenue.

Managers and department heads across the nation strategize on a weekly, if not daily, basis. For the past three quarters, telephone charges have increased and sales have decreased. Morgan needs to cut expenses while keeping the lines of communication open.

Analyze the telecommunications technologies you've studied in this unit—fax, broadcasting, VoIP, e-mail, blogs, and wikis—to determine which technology will best meet the needs of Morgan's company.

Once you have determined the best technology solution, use the Internet to compare the features and pricing offered by different providers of that technology. Select four or five criteria you think would be most important to Morgan. Create a comparison chart to help compare the products and services offered by providers of the technology you selected.
Write down the technology you selected for Morgan's company and the reason for your choice.
Then select a provider for Morgan to use. Indicate the reason(s) for your choices.

Answers

Answer:

Your objectives are to evaluate the use of different telecommunications technologies for performing a specific business purpose.

Using a spreadsheet, compare similar telecommunications technologies.

Use decision-making strategies to select the most appropriate telecommunications technology for a specific business need.

Explanation:

what options can you give someone who wats massive video files for there website

what options can you give someone who wats massive video files for there website

Answers

There are several options for hosting and delivering large video files on a website, including:

Self-hostingVideo hosting platformsContent Delivery Networks (CDNs)Cloud storage services

What is the services about?

There are a lot of types  for hosting and delivering large video files on a website, and they are:

Self-hosting: This involves hosting the video files on your own web server or a dedicated hosting service. This gives you full control over the video playback and delivery, but can also be more expensive and require more technical expertise.

Video hosting platforms: These are third-party platforms specifically designed for hosting and delivering video content. These platforms handle the video delivery and playback, but may have limitations on file size and customizations.

Content Delivery Networks (CDNs): These are networks of servers that are distributed around the world, allowing for faster and more reliable delivery of large video files.

Lastly, Cloud storage services: These are services like Amazon S3, Go ogle Cloud Storage and Microsoft Azure which allows you to store and deliver video files from the cloud.

Learn more about website from

https://brainly.com/question/28431103
#SPJ1

How do you use a while loop in python

Answers

Answer:

The syntax of while loop is:

while condition:

    statement - 1

    statement - 2

     " " " "

     statement - n

Explanation:

Required

How while loop is used in Python

While loop is used for repititive operations as long as a certain conditions is true.

Take for instance a program to print from 1 to 10.

This can be achieved using the following while statement

num = 0

while num < 10:

   print(num+1)

   num+=1

The indented code is repeated as long as num < 10.

Hence, the general syntax of the while loop is:

while condition:

    statement - 1

    statement - 2

     " " " "

     statement - n

9. Which of the following will best protect your computer from viruses and hackers?
A. A passcode
O B. A Trojan horse
O C. Avoiding strangers on the Internet
OD. Antivirus software

Answers

Answer:

D

Explanation:

I believe its Antivirus software because it protects your computer from virus and hackers . If i am wrong im so sorry

Have A Good Day

Antivirus software best protect your computer from viruses and hackers.

The correct option is D.

Antivirus software:

Antivirus software is a program that is designed to protect computer against harmful software, also known as malware. Antivirus software scans your computer for any viruses and malware and removes them from your system.

Antivirus software is crucial in protecting computer from viruses and hackers. It can detect and eliminate malicious software before it can damage your computer or compromise your data.

Therefore, having antivirus software installed on your computer is important in keeping your system secure and preventing unauthorized access by hackers and other malicious actors.

The correct option is D.

Know more about Antivirus software,

https://brainly.com/question/32545924

#SPJ3

BLANK refer to system maintenance activities such as backups and file management.

Remote desktop service
Network management services
Network encryption


BLANK provide features to prevent unauthorized access to the network.

Security services
File replication services
Printing services

Answers

First answer:
Network management services

Second answer:
Security services

Which of the answers listed below refers to a technology designed to simplify network infrastructure management? SAN SDN SSP SEH.

Answers

The technology designed to simplify network infrastructure management is SDN (Software-Defined Networking).

SDN is a network architecture that separates the control plane and data plane of network devices, allowing network administrators to centrally manage and configure network devices through a software controller. SDN provides a simplified and centralized approach to network management, enabling organizations to more easily provision and configure network resources, optimize traffic flow, and improve security.

SAN (Storage Area Network) is a technology used to connect storage devices over a dedicated network to enable efficient data storage and retrieval. SSP (Security Service Provider) is a term used to describe a security technology or service that provides security-related functions to applications or systems.

Learn more about Software-Defined Networking here

https://brainly.com/question/24321959

#SPJ11

Jason is creating a web page for his school's basketball team. He just finished creating his storyboard. Which tool should he use to start coding?

Storyboard
Text editor
Web browser
Word processing document
You must check the box below prior to sub

Answers

Jason should use a text editor

Answer:

text editor

Explanation:

Other Questions
4 points Which best describes NPV? the present value of all expected inflows minus the sum of all expected outflows the present value of all expected inflows net of the present value of all expected outflows the present value of all expected inflows the sum of all inflows minus the sum of all outflows PLS HELP ME, PLS THIS IS DUE FIRST CORRECT ANSWER GETS BRAINLIEST Choose the correct word or phrase for each of the following. Risking reinjury helps neither them nor the team. A. neither them or the team B. either them nor the team C. either them or the team D. correct as is [tex]3x^{2} -5x-4=0[/tex] solve using quadratic formmual 2/3 a minus 1/6 equals 1/3 what is a a car of mass 1000kg accelarates from rest to a speed of 10m/s. what's its power? El mesero te sirvi muy bien ayer. Qu le dejaste?A. Una buena propina B. Una cucharaC. Una pimienta picante D. Una mesa What is the LCD of 8/9 and 2/3 the process of assessing for the presence of specific factors in each of the categories that have been identified as being associated with an increased likelihood of an illness (such as cancer) or an unhealthy event (such as a car accident) How would microbes/microorganisms adapt differently depending onthe different elements available? Does cauterizing a wound help the growing of beneficial bacteria? HELP GIVING BRAINLESTTTT!!!!!!!! Can someone please help me with this?The x-values need to go on the horizontal axis and the y-values need to go on the vertical axis (just switch them around).How do I do that? Could someone please show me how? Suggest a technology worth developing that will have the most positive impact on peoples' life in your field of study. Explain briefly about the technology and list down its advantages and disadvantag You are given the following information: Stockholders' equity as reported on the firms balance sheet = $4.25 billion, price/earnings ratio = 12.5, common shares outstanding = 230 million, and market/book ratio = 2.1. The firm's market value of total debt is $8 billion, the firm has cash and equivalents totaling $300 million, and the firm's EBITDA equals $2 billion. What is the price of a share of the company's common stock? Do not round intermediate calculations. Round your answer to the nearest cent.$What is the firm's EV/EBITDA? Do not round intermediate calculations. Round your answer to two decimal places. "Discuss the role of predation in structuring communities, usingrelevant case studies to demonstrate these processesAnswer in a short essay forms and should not under 500 words." This is 15 points plz help ( no links ) EXPLAIN YOUR ANSWER plz( ONLY ANSWER THIS IF YOU HAVE AN EXPLANATION AND IF YOU KNOW WHAT THE ANSWER IS)( the answer is not 1,920 because i got it wrong when i typed the answer in ) Because each daughter cell contains one strand of original DNA, replication is said to be {{c1::semiconservative}} Dnde estudian los dos muchachos?Group of answer choicesen un colegioen una universidaden una escuela secundaria three-fourths + two-sixths =a)5/10b)5/12c)12/12 or 1d)13/12 or 1 1/12