Answer:
A, D, and E
watching a webinar to learn new job skills
reading press releases from your company’s competitors
sharing career advice with your peers
Explanation:
got it right on edge2020
The online activities that seem appropriate for the workplace is sharing career advice with your peers.
What are virtual activities?The virtual activities are known to be any kind of online activities that is often done by people to make sure they have good and continued collaboration with other people.
Conclusively, Note that the use of online activities in the workplace should be the one that will help you and your peers to grow such as sharing career advice with your peers.
Learn more about online activities from
https://brainly.com/question/13171394
working with the tkinter(python) library
make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?
To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.
How can I make a tkinter window always appear on top of other windows?By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.
This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.
Read more about python
brainly.com/question/26497128
#SPJ1
Write JavaScript code to convert the number 236.2363611111556 into currency format
and JavaScript statement to show output.
please someone help me, I am asking this for second time.
The JavaScript code to convert the number 236.2363611111556 into currency format and show output is given below:
The JavaScript Codefunction financial(x) {
return Number.parseFloat(x).toFixed(2);
}
This code helps to convert the given number: 236.2363611111556 into currency format..
The code defines a method and function which is x, then uses curly brackets to tell the compiler that a new command is being sent.
Then an already declared variable, Number would be parsed to another variable using float so it could contain decimal numbers.
At the end, the given number: 236.2363611111556 would be converted into currency format..
Read more about javascript here:
https://brainly.com/question/16698901
#SPJ1
I don't know, but could you get all edmentum.com answers by creating a teacher's account and choosing the lesson your on and get all the answers that way?
Answer:
you have to have some authorization
Explanation: just tried
Difference between Python vs Pandas?
Python and Pandas are not directly comparable as they serve different purposes. Here's an explanation of each:
Python:
Python is a general-purpose programming language known for its simplicity and readability. It provides a wide range of functionalities and can be used for various tasks, including web development, data analysis, machine learning, and more. Python has a large standard library and an active community, making it versatile and widely used in different domains.
Pandas:
Pandas, on the other hand, is a powerful open-source library built on top of Python. It is specifically designed for data manipulation and analysis. Pandas provides easy-to-use data structures, such as Series (one-dimensional labeled arrays) and DataFrame (two-dimensional labeled data tables), along with a variety of functions for data cleaning, transformation, filtering, grouping, and aggregation.
In essence, Python is the programming language itself, while Pandas is a Python library that extends its capabilities for data analysis and manipulation. You can use Python to write code for a wide range of purposes, while Pandas is focused on providing efficient and convenient tools for working with structured data.
for similar questions on Python.
https://brainly.com/question/26497128
#SPJ8
A poetry reading is a type of
A. performance
B. blog
C. installation
D. zine
reimplement the bug class from this self check exercise, but use a different internal representation. represent the distance climbed by a string of - characters, one for every 10 cm. the up, reset, and get position member functions should have the exact same behavior as before, so the bug slides back to the bottom when it reaches the top of the pole (at 100 cm). of course, their implementation will be quite different.
#include
#include
using namespace std;
class Bug
{
public:
// Provide the public interface for get_position, reset, and up
private:
string climbed;
};
// Implement the get_position, reset, and up member functions
int main()
{
Bug bugsy;
Bug itsy_bitsy;
bugsy.reset();
itsy_bitsy.reset();
bugsy.up();
bugsy.up();
cout << bugsy.get_position() << endl;
cout << "Expected: 20" << endl;
itsy_bitsy.up();
itsy_bitsy.up();
itsy_bitsy.up();
cout << itsy_bitsy.get_position() << endl;
cout << "Expected: 30" << endl;
for (int i = 1; i <= 8; i++) { bugsy.up(); }
cout << bugsy.get_position() << endl;
cout << "Expected: 0" << endl;
bugsy.up();
cout << bugsy.get_position() << endl;
cout << "Expected: 10" << endl;
return 0;
}
//Implementation of class bug:
class Bug:
def __init__(self,start=0):
self.position = start
self.units = 10
def get_position(self):
return self.position
def reset(self):
self.position = 0
def up(self):
self.position += self.units
if self.position >= 100:
self.reset()
def down(self):
self.position -= self.units
def main():
bugsy = Bug()
itsy_bitsy = Bug()
bugsy.reset()
itsy_bitsy.reset()
bugsy.up()
bugsy.up()
print("bugsy's position: ",bugsy.get_position())
print("Expected: 20")
itsy_bitsy.up()
itsy_bitsy.up()
itsy_bitsy.up()
print("itsy_bitsy's position: ",itsy_bitsy.get_position())
print("Expected: 30")
for i in range(1,9):
bugsy.up()
print("bugsy's position: ",bugsy.get_position())
print("Expected: 0")
bugsy.up()
print("bugsy's position: ",bugsy.get_position())
print("Expected: 10")
if __name__ == "__main__":
main()
What is member function?A member function allows you to express yourself by associating functionality with a class. Make an informed decision. In general, functions are created equal, therefore they should all make the same assumptions about a class's interface. Member functions are operators and functions that have been specified as class members. Operators and functions specified with the friend specifier are not considered member functions. These are known as classmates' pals. A static member function is one that has been declared as static by the user.
To know more about member function,
https://brainly.com/question/17017198
#SPJ4
1. Using the open function in python, read the file info.txt. You should use try/except for error handling. If the file is not found, show a message that says "File not found"
2. Read the data from the file using readlines method. Make sure to close the file after reading it
3. Take the data and place it into a list. The data in the list will look like the list below
['ankylosaurus\n', 'carnotaurus\n', 'spinosaurus\n', 'mosasaurus\n', ]
5. Create a function called modify_animal_names(list) and uppercase the first letter of each word.
6. Create a function called find_replace_name(list, name) that finds the word "Mosasaurus" and replace it with your name. DO NOT use the replace function. Do this manually by looping (for loop).
The words in the info.text:
ankylosaurus
carnotaurus
spinosaurus
mosasaurus
try:
f = open('info.txt', 'r')
except:
print('File not found')
dino_list = []
for line in f.readlines():
dino_list.append(line)
f.close()
def modify_animal_names(list):
for i in range(len(list)):
list[i] = list[i].capitalize().replace('\n', '')
modify_animal_names(dino_list)
def find_replace_name(list, name):
for i in range(len(list)):
if list[i] == name:
list[i] = 'NAME'
find_replace_name(dino_list, 'Ankylosaurus')
This will print out:
['Ankylosaurus', 'Carnotaurus', 'Spinosaurus', 'NAME']
(If you have any more questions, feel free to message me back)
What is the purpose of a computer network needs assessment? to evaluate how to move from the current status to the desired goal to determine what steps employees can take to increase company revenue to analyze which workers need more training to improve their performance to compare worker productivity
Answer:
to evaluate how to move from the current status to the desired goal
What was one of the main advantages of BPR at Chevron?
Answer:
Business process re-engineering improves performance of chevron at end-to-end process and saves company's fifty million dollars by reducing operation cost.
Your professor is advising a new crowd-funding app for women's self-help groups (SHGs) in Latin America on their database architecture. This is the business requirement she has worked on: All campaigns belong to a SHG. An SHG must exist before a campaign is created, and when an SHG is deleted from the database, all its campaigns are deleted. SHGs always belong to a country, and a country must be added to the app before SHGs are added to it. Which of the following is true of the entities defined in the database? Select all that apply.
Question 6 options:
An SHG entity depends on a Campaign entity
A Campaign entity is a depend on the SHG entity
A Country is not dependent on the Campaign entity
An SHG entity is dependent on a Country entity
A Campaign is an Independent entity
Based on the given information, the following statements are true:
An SHG entity depends on a Country entity.A Campaign entity is dependent on the SHG entity.What is a country entity?In the context of database design, a country entity refers to a logical representation of a country within a database system.
It typically stores information related to countries, such as their names, codes, demographics, or any other relevant data.
The country entity serves as a reference point for other entities in the database, such as self-help groups (SHGs) or campaigns, allowing for proper organization and association of data within the system.
Learn more about Entity at:
https://brainly.com/question/29491576
#SPJ1
System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio
System testing is a crucial stage where the software design is implemented as a collection of program units.
What is Unit testing?Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.
It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.
Read more about System testing here:
https://brainly.com/question/29511803
#SPJ1
Question 2:
(5 marks)
According to the following code; you are required to draw the flowchart in details with
clear sequences
message=input("enter yes if there is message in the inbox");
attached=input("\n enter yes if there is attachment");
inbox=eval (input ("enter number of email"));
while inbox > 0:
if message=="yes":
print ("extract the message");
if attached=="yes":
print("extract the message");
email=input("eneter v for valied or not");
if email=="V":
print ("extract attached ");
print("inject Job ");
print("inject Submission");
en email=="N":
print("Inject an error");
print ("Remove the inbox mail ");
inbox-inbox-1;
DIO:
print("stop")
Flowcharts are visual representations of a code or program segments
How to draw the flowchart?To draw the flowchart, we make use of the following symbols and figures
Oval: To begin and end the flowchartParallelogram: To accept input for the message, attached, inbox & email variables Parallelogram: To display all outputsRectangle: To perform the arithmetic operation; inbox = inbox - 1Diamond: To make several decisions and to initiate a loop processSee attachment for the flowchart that represents the code
Read more about flowcharts at:
https://brainly.com/question/24735155
list any 8 styles that can be found in the home tab of Microsoft word?
Home tab in MS Word's components: The Clipboard, Font, Paragraph, and Styles tabs are the four separate sections that make up the Home tab.
Where does a clipboard get kept?Several operating systems include the clipboard as a buffer for quick storage, copying, and moving data within and among application processes. The contents of the clipboard typically reside in the RAM of the computer and are nameless and transient. The contents of the clipboard typically reside in the RAM of the computer and are nameless and transient. Applications can specify cut, copy, and paste operations through the application programming interface that the clipboard offers.Please open the toolbar popup or right-click on an editable area, then select Clipboard Manager from the menu that appears, to retrieve the items that are now being stored on the clipboard. On your iPad or iPhone, open the Shortcuts app, then select Gallery. You will get various possibilities if you search for "clipboard" here. For a product that meets your needs, read their description.To learn more about Clipboard, refer to:
https://brainly.com/question/30006106
Humans are constantly creating new and innovative technologies designed to simplify difficult processes. Why do you think this is? What might this mean for the future of 3D modeling? Explain.
Humans are constantly creating new and innovative technologies to simplify difficult processes because it is in our nature to seek ways to make our lives easier and more efficient. We have a strong desire to solve problems and improve upon existing methods.
What is the 3D modeling?In terms of 3D modeling, this means that as technology continues to advance, the process of creating 3D models will become increasingly simpler and more intuitive. This will likely lead to a wider adoption of 3D modeling across various industries, as well as an increase in the complexity and realism of models created.
Additionally, new technologies like virtual reality and augmented reality will allow for more immersive and interactive experiences with 3D models. This will open new possibilities for fields such as architecture, product design, and gaming.
Learn more about 3D modeling from
https://brainly.com/question/27512139
#SPJ1
Use do while loop to find square root of odd number 1 to 200
which of the following is not among the functions typically performed within the infosec department as a compliance enforcement obligation?
The following duties are often included in the infosec department's compliance and enforcement obligations: assessment and control of risks, Development and implementation of security policies.
It is advised that information security functions in large enterprises be divided into four categories ?IT functions, non-technology business functions, information security customer service functions, and information security compliance enforcement functions.
Which of the following best sums up the main argument against the InfoSec department being included in the IT function?The objectives of the IT function, which prioritises information processing and access efficiency, and the InfoSec department, which places a strong emphasis on data security, are out of sync.
To know more about infosec department visit:-
brainly.com/question/9171028
#SPJ1
Diversity in the workplace is also represented by four different generations. Name and explain the characteristics of each generations.
The Names and explanation of the characteristics of each generations is given below.
What is the Diversity about?They are:
Traditionalists/Silent Generation (Born before 1946): This generation grew up during times of economic depression and war, and they tend to value hard work, loyalty, and respect for authority. They are known for their strong work ethic, discipline, and adherence to rules and traditions. They may have a more conservative approach to technology and may prefer face-to-face communication. Traditionalists value stability, loyalty, and are typically motivated by a sense of duty and responsibility.
Baby Boomers (Born between 1946 and 1964): This generation witnessed significant social and cultural changes, such as the civil rights movement and the Vietnam War. They are often characterized by their optimistic and idealistic outlook, and they value teamwork, collaboration, and personal fulfillment in the workplace. Baby Boomers are known for their dedication to their careers and may have a strong work-life balance perspective. They may prefer phone or email communication and are generally motivated by recognition, promotions, and financial rewards.
Generation X (Born between 1965 and 1980): This generation grew up in a time of economic instability and rapid technological advancement. They are known for their independence, adaptability, and self-reliance. Generation X tends to value work-life balance, flexibility, and autonomy in the workplace. They may prefer digital communication methods, such as email or instant messaging, and are generally motivated by opportunities for growth, learning, and work-life integration.
Lastly, Millennials/Generation Y (Born between 1981 and 1996): This generation came of age during the digital revolution and globalization. They are known for their tech-savviness, diversity, and desire for meaningful work. Millennials value work-life balance, flexibility, and social responsibility in the workplace. They prefer digital communication methods, such as text messages or social media, and are motivated by opportunities for career advancement, purpose-driven work, and work-life integration.
Read more about Diversity here:
https://brainly.com/question/26794205
#SPJ1
Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
< html>
Answer:
In HTML file
<body style="background-color:orange;">
Or
In CSS file
body {
background-color: orange;
}
What is the mode (most frequent number) of the following set of numbers: [38,39,40,40,40,41,41,41,42,43,44]
Which of the following is true of how packets are sent through the internet?
Answer:
It is A: Packet metadata is used to route and reassemble information travelling through the internet.
Explanation:
Step 1: The Internet works by chopping data into chunks called packets. Each packet then moves through the network in a series of hops. Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee
Step 2: Entering the network
Each packet hops to a local Internet service provider (ISP), a company that offers access to the network -- usually for a fee.
Step 3: Taking flight
The next hop delivers the packet to a long-haul provider, one of the airlines of cyberspace that quickly carrying data across the world.
Step 4: BGP
These providers use the Border Gateway Protocol to find a route across the many individual networks that together form the Internet.
Step 5: Finding a route
This journey often takes several more hops, which are plotted out one by one as the data packet moves across the Internet.
Step 6: Bad information
For the system to work properly, the BGP information shared among routers cannot contain lies or errors that might cause a packet to go off track – or get lost altogether.
Last step: Arrival
The final hop takes a packet to the recipient, which reassembles all of the packets into a coherent message. A separate message goes back through the network confirming successful delivery.
An __________ hard drive is a hard disk drive just like the one inside your, where you can store any kind of file.
An external hard drive is a hard disk drive just like the one inside your computer, where you can store any kind of file.
These drives come in various sizes, ranging from small portable drives that can fit in your pocket to larger desktop-sized drives with higher storage capacities. They often offer greater storage capacity than what is available internally in laptops or desktop computers, making them useful for backups, archiving data, or expanding storage capacity.
Overall, external hard drives are a convenient and flexible solution for expanding storage capacity and ensuring the safety and accessibility of your files.
QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin
Answer:
Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.
Explanation:
Explain one way in which programmers may get hired.
Explanation:
I think you first get interviewed?
Then you get like a test and then have to explain it to the admission people on a whiteboard or something.
Considering the following part of the database to keep track of students and their marks for the courses that they follow.
Student(sid, sname, year)
Registered(sid, cid, mark, grade)
Course(cid, cname, no_credit, deptid)
Which of the following sequence of operations would list the names of students who have not registered for any course?
To list the names of students who have not registered for any course, we can use the following sequence of operations:
Retrieve all student IDs (sid) from the Student table.Retrieve all student IDs (sid) from the Registered table.Perform a LEFT JOIN between the two sets of student IDs, filtering out the matching records.Retrieve the names (sname) of the students from the resulting set.How can we list the names of students who have not registered for any course?To obtain the names of students who have not registered for any course, we need to compare the student IDs between the Student and Registered tables.
By performing a LEFT JOIN and filtering out the matching records, we will be left with the students who have not registered for any course. Finally, we can retrieve their names from the resulting set to list them.
Read more about sequence of operations
brainly.com/question/550188
#SPJ1
As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.
Answer:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.
First, let's convert -9/2 to a decimal number: -9/2 = -4.5
Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:
1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM
Sign bit: Since the number is negative, the sign bit is 1: 1
Mantissa and exponent: Convert -4.5 into binary and normalize it:
-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2
Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)
Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101
Now, put the sign, exponent, and mantissa together: 1101 0010
So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.
B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.
To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:
Sign bit: 1
Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)
Mantissa: Smallest mantissa is 0000
The 8-bit representation is 1001 0000. Converting this to decimal:
-1 * 2^{-2} * 1.0000 which is -0.25.
The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.
C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.
To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:
Sign bit: 0
Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)
Mantissa: Largest mantissa is 1111
The 8-bit representation is 0110 1111. Converting this to decimal:
1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.
The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.
Explanation:
You have interviewed Ms. Erin Roye, an IT staff member, after conducting your initial security testing of the Alexander Rocco Corporation. She informs you that the company is running an older version of Oracle’s database, Oracle 10g, for its personnel database. You decide to research whether Oracle 10g has any known vulnerabilities that you can include in your report to Ms. Roye. You don’t know whether Ms. Roye has installed any patches or software fixes; you simply want to create a report with general information.
Based on this information, write a memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g. (Hint: A search of the CVE Web site sponsored by US-CERT, https://cve.mitre.org/, can save you a lot of time.) If you do find vulnerabilities, your memo should include recommendations and be written in a way that doesn’t generate fear or uncertainty but encourages prudent decision-making.
A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given below:
Hello, Ms. Roye,
I performed a CVE and CAN analysis of your continued use of Oracle 10g for your personnel and made some interesting findings.
One vulnerability that caught my eye about Oracle 10g was that it allows remote authenticated users to execute arbitrary SQL commands with elevated privileges.
I would urge you to rethink your use of this version of Oracle
What is a Memo?
This refers to the written message that is usually used in a professional setting to communicate.
Hence, we can see that A sample memo to Ms. Roye describing any CVEs (common vulnerabilities and exposures) or CAN (candidate) documents you found related to Oracle 10g is given above.
Read more about memo here:
https://brainly.com/question/11736904
#SPJ1
What law protects published work?
Answer:
Copyright
It protect published and not published work from other using their work.
what coder does assembly language use for programming?
Answer:
These short codes are converted into machine learning language (binary, i.e., 1s and 0s) through the use of programs called assemblers. In a nutshell, machine language uses binary code, which is almost impossible for humans to decipher, whereas assembly language uses mnemonic codes to write a program.
The breastbone or ________________ extends down the chest.
Answer:
The sternum or breastbone is a long flat bone located in the central part of the chest.
The sternum or breastbone is a long flat bone located in the central part of the chest.
In the middle of the chest, there is a long, flat bone known as the sternum or breastbone. It forms the front of the rib cage and is joined to the ribs by cartilage, assisting in the protection of the heart, lungs, and major blood arteries from harm. It is one of the longest and largest flat bones in the body, somewhat resembling a necktie. The manubrium, body, and xiphoid process are its three regions.
Therefore, the sternum or breastbone is a long flat bone located in the central part of the chest.
Learn more about the breastbone here:
https://brainly.com/question/32917871.
#SPJ2
true false) keybord has two shift keys.
Answer:
True, looking at 'em right now!
Explanation: