Answer:
To capture the contents of the currently active window, press Alt-PrtScrn (or Alt-Print Screen ). To capture the contents of the entire screen, press PrtScrn (or Print Screen ) by itself.
hope it helps you
make me brainliest plz
I need help with coding in python!
class CommandLine:
def __init__(self):
self.root = Directory('', None)
self.current_path = self.root
def run(self):
command = input('>>> ')
while command.strip().lower() != 'exit':
split_command = command.split()
if len(split_command):
if split_command[0] == 'ls':
self.current_path.display()
if len(split_command) >= 2:
if split_command[0] == 'cd':
self.change_directory(split_command[1])
elif split_command[0] == 'makedir':
self.current_path.create_directory(split_command[1])
elif split_command[0] == 'fcreate':
self.current_path.create_file(split_command[1])
elif split_command[0] == 'fwrite':
self.current_path.file_write(split_command[1])
elif split_command[0] == 'fread':
self.current_path.file_read(split_command[1])
elif split_command[0] == 'fclose':
self.current_path.close_file(split_command[1])
elif split_command[0] == 'fopen':
self.current_path.open_file(split_command[1])
command = input('>>> ')
def change_directory(self, dir_name):
pass
class Directory:
def __init__(self, name, parent):
pass
def display(self):
pass
def create_file(self, file_name):
pass
def create_directory(self, dir_name):
pass
def file_write(self, file_name):
pass
def file_read(self, file_name):
pass
def close_file(self, file_name):
pass
def open_file(self, file_name):
pass
class File:
pass
if __name__ == '__main__':
cmd_line = CommandLine()
cmd_line.run()
You must keep track of your current directory, and then you must be able to execute the commands listed below.
(The commands are explicitly different from linux so that you don't accidentally execute them in the shell, except for ls and cd which are harmless.)
Command
ls
Lists contents of the directory
cd [dirname]
Change directory up or down one level.
makedir [dirname]
Make a directory
fcreate [filename]
Creates a file, sets it closed.
fwrite [filename]
Write to a file, only if it's open.
fread [filename]
Read a file, even if it's closed.
fclose [filename]
Close a file. Prevents write.
fopen [filename]
Open a file. Reset the contents
Answer:
B
Explanation:
Which of the following is the best example of a purpose of e-mail?
rapidly create and track project schedules of employees in different locations
easily provide printed documents to multiple people in one location
quickly share information with multiple recipients in several locations
O privately communicate with select participants at a single, common location
Answer:
The best example of a purpose of email among the options provided is: quickly share information with multiple recipients in several locations.
While each option serves a specific purpose, the ability to quickly share information with multiple recipients in different locations is one of the primary and most commonly used functions of email. Email allows for efficient communication, ensuring that information can be disseminated to multiple individuals simultaneously, regardless of their physical location. It eliminates the need for physical copies or face-to-face interactions, making it an effective tool for communication across distances.
Explanation:
You are interested in buying a laptop computer. Your list of considerations include the computer's speed in processing data, its weight, screen size and price. You consider a number of different models, and narrow your list based on its speed and monitor screen size, then finally select a model to buy based on its weight and price. In this decision, speed and monitor screen size are examples of:_______.
a. order winners.
b. the voice of the supplier.
c. the voice of the customer.
d. order qualifiers.
In this decision, speed and monitor screen size of a laptop are examples of a. order winners.
What is a laptop?A laptop can be defined as a small, portable computer that is embedded with a keyboard and mousepad, and it is usually light enough to be placed on an end user's lap while he or she is using it to work.
What are order winners?Order winners are can be defined as the aspects of a product that wins the heart of a customer over, so as to choose or select a product by a specific business firm. Some examples of order winners include the following:
SpeedMonitor screen sizePerformanceRead more on a laptop here: https://brainly.com/question/26021194
Consider the following pseudocode.
i = 0
sum = 0
REPEAT UNTIL i = 4
i = 1
sum++
DISPLAY sum
What is the output?
Considering the pseudocode :
i = 0
sum = 0
REPEAT UNTIL i = 4
i = 1
sum++
DISPLAY sum
The output of the pseudocode will be 4.
pseudocodepseudocode is a plain language description of the steps in an algorithm or another system.
Let's write the code in python.
i = 0
sum = 0
while i < 4:
sum += 1
i += 1
print(sum)
Code explanation:The first line of code, we initialise i as zero.The sum was also initialise as zero.Then we use the while loop to loop through i until its less than 4.Then we add one to the sum for each loop.Then, increase the value of i to continue the loop.Finally, we print the sum.learn more on pseudocode here : https://brainly.com/question/17101205
Unit 4: Lesson 1 - Coding Activity 3
Write a program that requests the user to input a word, then prints out the first two letters - then skips a letter - then prints out the next two consecutive letters - then skips a letter - then this process repeats through the rest of the word.
Hint #1 - You will need to use the substring method inside a loop in order to determine which letters of the String should be printed.
Hint #2 - You can use the length method on the String to work out when this loop should end.
Sample run #1:
Input a word:
calculator
cacuatr
Sample run #2:
Input a word:
okay
oky
/* Lesson 1 Coding Activity Question 3 */
import java.util.Scanner;
public class U4_L1_Activity_Three
{
public static void main(String[] args)
{
Scanner scan = new Scanner(System.in);
System.out.println("Input a word:");
String word = scan.nextLine();
int index = 0;
while (index < word.length()){
if
}
}
}
The program will be:
import java.util.*;
public class Main
{
//main driver method
public static void main(String[] args) {
//get user input
Scanner sc = new Scanner(System.in);
System.out.print("Input a word: " );
String inp = sc.next();
//first index to be skipped is 2
//as we are considering 0 based indexing
int j=2;
String res="";
//iterate through the input
for(int i=0;i<inp.length();i++)
{
//check if we are at the 2nd, 5th, 8th.. characters
//if yes then skip and continue
if(i==j)
{
j=j+3;
continue;
}
//else append to string
else
{
res=res+inp.charAt(i);
}
}
System.out.print("The output is: "+res);
}
What is a program?C++ is a powerful general-purpose programming language. It can be used to develop operating systems, browsers, games, and so on. The best programming language for developing embedded system drivers and applications is C.
This language is the most widely used due to the availability of machine-level hardware APIs, C compilers, dynamic memory allocation, and deterministic resource consumption.
Learn more about program on:
https://brainly.com/question/1538272
#SPJ1
What are some characteristics of pseudocode? Check all that apply. Pseudocode is an informal way of expressing ideas and algorithms during the development process. Pseudocode uses simple and concise words and symbols to represent the different operations of the code. Pseudocode can be used to express both complex and simple processes. Pseudocode can be executed as a software program.
Answer:
all but the last one
The pseudocode have the characteristics of expressing ideas and algorithms in the developmental process, uses simple and concise words for varying code operations, and express both complex and simple processes. Thus, options A, B, and C are correct.
What is a pseudocode?A pseudocode in computer science can be given as the language description of the steps that are used in algorithm. They are comprised with the text based and are straightforward.
The characteristics of pseudocode are:
Pseudocode is an informal way of expressing ideas and algorithms during the development process.Pseudocode uses simple and concise words and symbols to represent the different operations of the code.Pseudocode can be used to express both complex and simple processesThus, options A, B, and C are correct.
Learn more about pseudocode, here:
https://brainly.com/question/13208346
#SPJ2
Using the data for the JC Consulting database shown in Figure 2-1, identify the one-to-many relationships as well as the primary key fields and foreign key fields for each of the five tables.
The JC consulting database is a structure used to store organized information of JC consulting
How to identify the relationshipFrom the figure, we can see that the cardinality of the project table and the client table is 1 : many.
Similarly, the cardinality of the project table and the ProjectLifeItems is 1 : many.
Hence, the one-to-many relationships are Project & Clients and Project & ProjectLifeItems
How to identify the primary keyThis is the key on the first table (i.e. the client table)
Hence, the primary key field is ClientID
How to identify the foreign keysThese are the fields that correspond to the primary key on the client table
The fields that correspond to ClientID are ProjectID, EmployeeID, TaskID and ProjectLifeItemsID
Hence, the foreign keys are ClientID are ProjectID, EmployeeID, TaskID and ProjectLifeItemsID
Read more about database at:
https://brainly.com/question/24223730
in order to avoid keyerror exceptions, you can check whether a key is in the dictionary using the operator.
You can use the in operator to determine whether a key is present in the dictionary and so prevent KeyError exceptions.
Which of the following operators checks to see if a dictionary has a key?Using the in operator is the simplest approach to determine whether a key is present in a dictionary. It is a unique operator that is used to assess a value's membership. Most developers intend to use and favor this strategy.
Which approach would you take to get a list of tuples representing every element in a dictionary?Get Things. Each item in a dictionary will be returned by the items() method as tuples in a list.
To know more about operator visit:-
https://brainly.com/question/29949119
#SPJ4
Question:
In order to avoid KeyError exceptions, you can check whether a key is in the dictionary using the _____ operator.
included
of
in
not in
The Internet of Things refers to devices that are able to talk to each other. Group of answer choices False True
Define- Emerging technology
Answer: Emerging technologies are technologies whose development, practical applications, or both are still largely unrealized, such that they are figuratively emerging into prominence from a background of nonexistence or obscurity.
Explanation: brainliest?
To delete unnecessary files on a hard disk use software
How dose society use computer in finance?
☁️ Answer ☁️
annyeonghaseyo!
Your answer is:
"Computers are able to calculate things faster than any human can, and they're a lot cheaper to maintain than it is to pay a human. Computers don't make mistakes so people rely on them to make massive calculations 100% accurately."
Hope it helps.
Have a nice day hyung/noona!~  ̄▽ ̄❤️
osing Commands
This term describes the keyboard shortcuts for every command or action on the ribbon.
dialog
This term describes the buttons at the bottom of a dialog box used to execute or cancel a
command.
option
This term describes a box that opens up to provide additional options for working with a
file.
list bo
This term describes an instruction that tells an application to complete a certain task.
Choos
This term describes buttons filled with a dark circle when selected; only one such button
can be selected at any time.
Choos
This term describes a list of options that you can scroll through if the list is long.
oos
This term describes the area in a Microsoft Office application that displays when the File
Choos
Answer:
Beggin the perfume and I Can Do B the work done ✅ you are the instances of a marriage license pa bili kami ulam namin pwede po ma'am pwede the too much talking to the work done na na lang sa pag you po sir I will be solemnized
What would be the result of the following calculation in a spreadsheet?
=5+10/5-3*3-1
a. -1
b. -3
c. 1
d. 3
e. 0
answer: B. -3
Answer:
answer a -1
b-3 hi hello who are you
write a function that gives the product of two numbers in c language
Explanation:
printf("Enter two numbers: "); scanf("%lf %lf", &a, &b);
Then, the product of a and b is evaluated and the result is stored in product.
product = a * b;
Finally, product is displayed on the screen using printf().
printf("Product = %.2lf", product);
Notice that, the result is rounded off to the second decimal place using %.2lf conversion character.
How to use section header in word document?
Please answer fast
Answer:
Configure headers and footers for different sections of a document
Click or tap the page at the beginning of a section. Select Layout > Breaks > Next Page. Double-click the header or footer on the first page of the new section.Explanation:
Where are the kidneys located?
a) Attached to the bladder
b) Lower back
c) Upper back
d) Middle back
e) Chest cavity
f the following is acian of health
Answer:
B
Explanation:
Your kidneys are fist-sized organs shaped like beans that are located at the back of the middle of your trunk, in the area called your flank. They are under the lower part of your ribcage on the right and left sides of your backbone.
Fumiko is a network technician. She is configuring rules on one of her company's externally facing firewalls. Her network has a host address range of 192.168.42.140-190. She wants to allow all hosts access to a certain port except for hosts 188, 189, and 190. What rule or rules must she write
The rule that she must write is that A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.
What is a Firewall?A firewall is known to be a form of a network security device that helps one to manage, monitors and filters any form of incoming and outgoing network traffic.
This is often done based on an firm's formerly set up security policies. A firewall is known as the barrier that exist between a private internal network and the public Internet.
See options below
What rule or rules must she write?
a) A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.
b) Multiple rules are necessary for this configuration; one or more rules must define Deny exceptions for 188, 189, and 190, followed by the Allow rule for the 140–190 range.
c) A Deny rule is needed for 188, 189, and 190, and then exception rules for the 140–187 range.
d) The default Deny all rule needs to be placed first in the list, and then an exception rule for the 140–187 range.
Learn more about firewalls from
https://brainly.com/question/13693641
when a product owner adds a new feature/idea in the backlog and bring it up for discussion during refinement session, how should a team repond.
The team should respond to the new feature/idea with an open mind and be willing to discuss its merits and how it could potentially fit into the product.
What is potentially?Potentially is the possibility of something being realized or coming into existence. It suggests that something has the potential to become actualized, although it may or may not actually happen. Potential can refer to the capability or capacity to become or develop into something in the future, or the likelihood that something will occur.
During the refinement session, the team should ask questions to better understand the feature/idea and its potential impact, such as how it fits into the product vision, how it might benefit the user, and what effort would be required to implement it. The team should also offer their own ideas and suggestions related to the feature/idea. Ultimately, the team should collaborate to identify whether the feature/idea is worth pursuing and determine how best to move forward with it.
To learn more about potentially
https://brainly.com/question/30010821
#SPJ1
What is your favorite LEGO set
Answer:
star wars death star....
Which syntax error in programming is unlikely to be highlighted by a compiler or an interpreter? a variable name misspelling a missing space a comma in place of a period a missing closing quotation mark
Answer:
A variable name misspelling.
Explanation:
A Syntax Error that occurs as the result of a variable name that is misspelled will not be highlighted.
On edg 2020
Answer:
A variable name misspelling.
Ex planation:
A
For my c++ class I need to complete this assignment. I've been stuck on it for a few hours now and was wondering if anyone could help me out by giving me some hints or whatever.
You work for an exchange bank. At the end of the day a teller needs to be able to add up the value of all of the foreign currency they have. A typical interaction with the computer program should look like this:
How many Euros do you have?
245.59
How many Mexican Pesos do you have?
4678
How many Chinese Yen do you have?
5432
The total value in US dollars is: $1378.73
Think about how to break this problem into simple steps. You need to ask how much the teller has of each currency, then make the conversion to US dollars and finally add the dollar amounts into a total.
Here is a sketch of the solution.
double currencyAmount;
double total;
// get the amount for the first currency
total += currencyAmount;
// get the amount for the second currency
total += currencyAmount;
// get the amount for the third currency
total += currencyAmount;
// output the total
Notice the use of the += operator, this is a shortcut that means the same thing as total = total + currencyAmount. It is usful for accumulating a total like we are doing here.
Submit only the .cpp file containing the code. Don't forget the code requirements for this class:
Good style: Use good naming conventions, for example use lower camel case variable names.
Usability: Always prompt the user for input so they know what to do and provide meaningful output messages.
Documentation: Add a comments that document what each part of your code does.
Testing: Don't submit your solution until you have tested it. The code must compile, execute and produce the correct output for any input.
Answer:
246,45 Euro
Explanation:
A simple algorithm that would help you convert the individual currencies is given below:
Step 1: Find the exchange rate for Euros, Mexican Pesos, and Chinese Yen to the United States Dollar
Step 2: Convert the values of each currency to the United States Dollar
Step 3: Add the values of all
Step 4: Express your answer in United States Dollars
Step 5: End process.
What is an Algorithm?This refers to the process or set of rules to be followed in calculations or other problem-solving operations, to find a value.
Read more about algorithm here:
https://brainly.com/question/24953880
#SPJ1
Enterprise projects developing Mobile applications are more concerned with security than small scale app development because
Answer:
Security is a major concern for organisations.
Explanation:
Developing mobile application for companies is usually centered on security because of the fear of beach of sensitive company information.
For example, a company may need to decide what measures to put in place that can prevent or reduce data breaches. They may either give employees customize devices with already installed mobile applications or provide unique login details to employees to access the Enterprise mobile application on their own phone.
Difference between 2nd and 3rd generation of computer
Answer: It is between 1 generation.
Explanation: It's self explanatory. Since it's 2nd gen to 3rd gen, it's the same device but more newer and has more features than the last one. Think of it as the iPhone SE (2016) compared to the iPhone SE (2020)
You want to make access to files easier for your users. Currently, files are stored on several NTFS volumes such as the C:, D:, and E: drives. You want users to be able to access all files by specifying only the C: drive so they don't have to remember which drive letter to use. For example, if the accounting files are stored on the D: drive, users should be able to access them using C:\accounting. What can you do?
Answer:
volume mount points
Explanation:
The best thing to do would be to use volume mount points. This is a feature that allows you to mount/target (from a single partition) another folder or storage disk that is connected to the system. This will easily allow the user in this scenario to access the different files located in the D: and E: drive from the C:\ drive itself. Without having to go and find each file in their own separate physical drive on the computer.
Which of the following would be considered unethical for a programmer to do? (5 points)
Create software used to protect users from identity theft
Ignore errors in programming code that could cause security issues
Protect users from unauthorized access to their personal information
Use someone else's code with the original developer's permission
One thing that would be onsidered unethical for a programmer to do is B. Ignore errors in programming code that could cause security issues
Why would this be unethical for a programmer ?Creating software designed to protect users from identity theft stands as a commendable and ethical endeavor, demonstrating the programmer's commitment to safeguarding user information and thwarting identity theft.
Engaging in such behavior would be considered unethical since it undermines the security and integrity of the software, potentially exposing users to vulnerabilities and compromising their sensitive data. Respecting intellectual property rights and obtaining proper authorization reflects adherence to ethical and legal standards.
Find out more on programmers at https://brainly.com/question/13341308
#SPJ1
i make you brainliest
Answer:
Explanation:
I apprieciate your kindness here i will give you some points
List the rules involved in declaring variables in python . Explain with examples
1. The variable name should start with a letter or underscore.
2. The variable name should not start with a number.
3. The variable name can only contain letters, numbers, and underscores.
4. Variable names are case sensitive.
5. Avoid using Python keywords as variable names.
Here are some examples of variable declaration in Python:1. Declaring a variable with a string value
message = "Hello, world!"2. Declaring a variable with an integer value
age = 303. Declaring a variable with a float value
temperature = 98.64. Declaring a variable with a boolean value
is_sunny = TrueDetermine the distance between point (x1, y1) and point (x2, y2), and assign the result to points Distance. The calculation is:
Distance = √((x^2-x^1)^2 + (y^2 - y^1)^2)
You may declare additional variables.
Question:
Snapshot of the question has been attached to this response.
Answer:
import java.util.Scanner;
import java.lang.Math;
public class CoordinateGeometry{
public static void main(String []args){
double x1 = 1.0;
double y1 = 2.0;
double x2 = 1.0;
double y2 = 5.0;
double pointsDistance = 0.0;
//Declare a variable to hold the result of (x2 - x1)²
double x;
//Solve (x2 - x1)^2 and store result in the variable x
x = Math.pow(x2 - x1, 2);
//Declare a variable to hold the result of (y2 - y1)²
double y;
//Solve (y2 - y1)^2 and store result in the variable y
y = Math.pow(y2 - y1, 2);
//Now pointsDistance = SquareRootOf(x + y)
pointsDistance = Math.sqrt(x + y);
System.out.println("Points distance: ");
System.out.println(pointsDistance);
return;
}
}
Sample Output:
Points distance:
3.0
Explanation:
The above code has been written in Java and it contains comments explaining important lines of the code. Please go through the comments.
The snapshots of the program and a sample output have been attached to this response.
Which data storage or software tool is used to unify vast amounts of raw data of all types from across an organization
A data lake is a type of repository that stores large sets of raw data of all types from across an organization.
What is a data lake?A data lake is a central location in which to store all data, regardless of its source or format, for an organization at any scale.
Characteristics of a data lakeIt is low cost, easily scalable, and are often used with applied machine learning analytics.It allows to import any type of data from multiple sources in its native format, this allows organizations to scale in the size of the data as needed.Therefore, we can conclude data lakes are a vital component in data management as it stores all data across an organization.
Learn more about data lakes here: https://brainly.com/question/23182700