Write a class named Car that has the following data attributes: __year_model: (for the car's year model) __make: (for the make of the car) __speed: (for the car's current speed) In addition, the class should have the following methods: __init__ method that accepts the car’s year model and make as arguments. These values should be assigned to the object’s __year_model and __make data attributes. It should also assign 0 to the __speed data attribute. accelerate: The accelerate method should add 5 to the speed data attribute when it is called. brake: The brake method should subtract 5 from the speed data attribute eachtime it is called. get_speed: The get_speed method should return the current speed

Answers

Answer 1

Answer: Provided in the explanation section

Explanation:

Provided below is the program to carry out this task, i hope you can follow it clearly.

Program is run below

class Car:

   def __init__(self, model, make):

       self.__year_model = model

       self.__make = make

       self.__speed = 0

   def accelerate(self):

       self.__speed += 5

   def brake(self):

       self.__speed -= 5

   def get_speed(self):

       return self.__speed

car = Car("F1", "Ferrari")

for i in range(5):

   car.accelerate()

   print(car.get_speed())

for i in range(5):

   car.brake()

   print(car.get_speed())

cheers i hope this helped !!


Related Questions

describe source code escrow​

Answers

Answer:

Source code escrow is the deposit of the source code of software with a third-party escrow agent.

type two statements. the first reads user input into person name. the second reads user input into person age. use the int() function to convert person age into an integer. below is a sample output for the given program if the user's input is: amy 4

Answers

The code in which the first reads user input into person name and the second reads user input into person age is in the explanation part.

What is coding?

We connect with computers through coding, often known as computer programming.

Coding is similar to writing a set of instructions because it instructs a machine what to do. You can instruct computers what to do or how to behave much more quickly by learning to write code.

The statement can be like::

person_name = input()

person_age = int(input())

print('In 5 years,', person_name,'will be',(5+person_age))

Thus, this can be the code for the given scenario.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ1

Write a Python Program to find Prime Factors of a Number using For Loop, and While Loop

Answers

Answer:

1. Take the value of the integer and store in a variable.

2. Using a while loop, first obtain the factors of the number.

3. Using another while loop within the previous one, compute if the factors are prime or not.

4. Exit.

hope it helps☺

Write a program to read the the address of a person. The address consists of the following:

4 bytes street number

space

15 bytes street name

new line

11 bytes city

comma

space

2 bytes state

So the input could look like this:
Example: 1234 Los Angeles St.
Los Angeles, CA

Answers

This application presumes that the provided input format is precise (with a 4-digit street number, 15-byte street name, 11-byte city name, and 2-byte state abbreviation separated by spaces, new lines, and commas as specified).

How does BigQuery's Regexp replace work?

For instance, the result of SELECT REGEXP REPLACE("abc", "b(.)", "X1"); is aXc. Only non-overlapping matches are replaced using the REGEXP REPLACE function. As an illustration, substituting ana with banana only causes one replacement, not two. This function gives a false value if the regex parameter is an invalid regular expression. Additionally, it presumes that the input was typed accurately and without any mistakes or typos. You might want to add more validation and error-handling logic to a real-world application to make sure the input is accurate and complete.

# Read street address

street_address = input("Enter street address (4-digit street number, street name): ")

# Split the street address into street number and street name

street_number, street_name = street_address.split(' ', 1)

# Read city and state

city_state = input("Enter city and state (city, state abbreviation): ")

city, state = city_state.split(', ')

# Print the address

print(street_number)

print(street_name)

print(city)

print(state)

To know more about format visit:-

https://brainly.com/question/14725358

#SPJ1

Best answer brainliest :)
ridiculous answers just for points will be reported

thank you!
When is Internet Control Message Protocol most often used?


when Internet Protocol does not apply

when a receiver or sender cannot be located

when one needs to reassemble data sent via UDP

in the Network Access Layer

Answers

Answer:

d

Explanation:

because I did this before

Answer:

d

Explanation:

Thanks for ur time :)

Suppose that the five measured SampleRTT values are 106 ms, 120 ms, 140 ms, 90 ms, and 115 ms.

a. Compute the EstimatedRTT after each of these SampleRTT values is obtained, using a value of α = 0.125 and assuming that the value of EstimatedRTT was 100 ms just before the first of these five samples were obtained.
b. Compute also the DevRTT after each sample is obtained, assuming a value of β=0.25 and assuming the value of DevRTT was 5 ms just before the first of these five samples was obtained. Last, compute the TCP TimeoutInterval after each of these samples is obtained.

Answers

Answer:

a) 100.75,   103.15,    107.756,    105.536,   106.72

b) 5.06,    8,       14.061,       14.43,    12.89

Explanation:

Measured sample RTT values : 106 ms, 120 ms, 140 ms,  90 ms,  115 ms

First estimated RTT value = 100 ms

∝ = 0.125

β = 0.25

First DevRTT value = 5 ms

A)   Compute the EstimatedRTT after each of these SampleRTT values is obtained,

Formula for estimated RTT = ( 1 - ∝ ) . estimated RTT + ∝.sample RTT

B). Compute  the DevRTT after each sample is obtained,

Formula for DevRTT = ( 1 - β ) . DevRTT + β. | sample RTT - Estimated RTT |

attached below is a detailed solution

Suppose that the five measured SampleRTT values are 106 ms, 120 ms, 140 ms, 90 ms, and 115 ms. a. Compute
Suppose that the five measured SampleRTT values are 106 ms, 120 ms, 140 ms, 90 ms, and 115 ms. a. Compute

The Answer will be  

Answer a) 100.75,   103.15,    107.756,    105.536,   106.72

Answer b) 5.06,    8,       14.061,       14.43,    12.89

After Measured the sample RTT values are:  106 ms, 120 ms, 140 ms,  90 ms,  115 ms Then First estimated RTT value are = 100 ms ∝ = 0.125 β = 0.25 secondly ,then we find DevRTT value = 5 ms

A) Then  Compute the Estimated RTT after each of these SampleRTT values is obtained, apply the formula  

The Formula for estimated RTT are = ( 1 - ∝ ) . estimated RTT + ∝.sample is RTT

B). Compute  the DevRTT after each sample is obtained,

The Formula for DevRTT are = ( 1 - β ).  Dev RTT + β. | sample RTT - Estimated RTT |

Learn more information:

https://brainly.com/question/14979936

How is workflow defined? (IMAGE ATTACHED)

How is workflow defined? (IMAGE ATTACHED)

Answers

The sequence of steps one follows from start to finish of a work process is how workflow is defined. (Option C)

What is the rationale for the above response?

Workflow refers to the sequence of steps or tasks that are performed in order to complete a particular work process, often in a specific order or with specific dependencies between steps.

A workflow can involve the interaction between hardware, software, and humans, but it is primarily defined by the steps that must be followed to achieve a specific outcome. In this sense, a workflow can be thought of as a structured or organized way of working, designed to optimize efficiency and productivity.

Learn more about workflow:

https://brainly.com/question/14399047

#SPJ1

Write programs that read a line of input as a string and print:
a) Only the uppercase letters in the string.
b) Every second letter of the string, ignoring other characters such as spaces and symbols. For example, if the string is "abc, defg", then the program should print out a c e g.
c) The string, with all vowels replaced by an underscore.
d) The number of vowels in the string.
e) The positions of all vowels in the string.

Answers

import java.util.Scanner;

public class ReadLine {

   public static boolean isUpper(char c) {

       if (c >= 'A' && c <= 'Z') {

           return true;

       } else return false;

   }

   public static void printUpper(String s) {

       for (int i = 0; i < s.length(); i++) {

           if (isUpper(s.charAt(i))) {

               System.out.print(s.charAt(i));

           }

       }

   }

   public static char toLowerCase(char c) {

       if (c >= 65 && c <= 90) {

           c += 32;

       }

       return c;

   }

   public static boolean isLetter(char c) {

       return (c >= 'A' && c <= 'Z') || (c >= 'a' && c <= 'z');

   }

   public static void printSecondLetter(String s) {

       int n = 0;

       for (int i = 0; i < s.length(); i++) {

           if (isLetter(s.charAt(i))) {

               if (n % 2 == 1)

                   System.out.print(s.charAt(i));

               n++;

           }

       }

   }

   public static boolean isVowel(char c) {

       char a = toLowerCase(c);

       if (a == 'a' || a == 'o' || a == 'y' || a == 'i' || a == 'u' || a == 'e') {

           return true;

       } else return false;

   }

   public static void replaceUnderscore(String s) {

       for (int i = 0; i < s.length(); i++) {

           if (isVowel(s.charAt(i))) {

               System.out.print("_");

           } else {

               System.out.print(s.charAt(i));

           }

       }

   }

   public static int countVowel(String s) {

       int count = 0;

       s = s.toLowerCase();

       for (int i = 0; i < s.length(); i++) {

           if (isVowel(s.charAt(i))) {

               count++;

           }

       }

       return count;

   }

   public static void printVowelPosition(String s) {

       for (int i = 0; i < s.length(); i++) {

           if (isVowel(s.charAt(i))) {

               System.out.print(i + " ");

           }

       }

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Input your text: ");

       String text = scan.nextLine();

       System.out.println();

       System.out.print("The uppercase letters in the string: ");

       printUpper(text);

       System.out.println();

       System.out.print("Every second letter of the string: ");

       printSecondLetter(text);

       System.out.println();

       System.out.print("Vowels replaced by an underscore: ");

       replaceUnderscore(text);

       System.out.println();

       System.out.println("The number of vowels in the string: " + countVowel(text));

       System.out.print("The positions of all vowels in the string: ");

       printVowelPosition(text);

       scan.close();

   }

Ê ông dân hanu phải khônggg

The program is an illustration of loops.

Loops are used to perform repetitive operations

The program in Java, where comments are used to explain each line is as follows:

import java.lang.*;

import java.util.*;

public class Main {

  public static void main(String[] args) {

      //This creates a scanner object

      Scanner input = new Scanner(System.in);

      //This prompts the user for input

      System.out.print("Input your text: ");

      //This gets the input

      String str = input.nextLine();

      //The following loop prints the upper case letters

      System.out.print("Uppercase letters: ");

      for (int i = 0; i < str.length(); i++) {

          if (Character.isUpperCase(str.charAt(i))) {

              System.out.print(str.charAt(i)+" ");

          }

      }

      //The following loop prints every second letters

      System.out.print("\nEvery second letters: ");

      int n = 0;

      for (int i = 0; i < str.length(); i++) {

          if (Character.isLetter(str.charAt(i))) {

              if (n % 2 == 1){

                  System.out.print(str.charAt(i));}

              n++;

          }

      }

      char a; int countVowel = 0; String vowelPosition = "";

      //The following loop prints the string after the vowels are replaced by underscores

      System.out.print("\nThe new string: ");

      for (int i = 0; i < str.length(); i++) {

          a = Character.toLowerCase(str.charAt(i));

          if (a == 'a' || a == 'e' || a == 'i' || a == 'o' || a == 'u') {

              System.out.print("_");

              //This counts the number of vowels

              countVowel++;

              //This notes the positions of vowels

              vowelPosition+=Integer.toString(i+1)+" ";

          }

          else {

              System.out.print(str.charAt(i));

          }

      }

      //This prints the number of vowels

      System.out.print("\nThe number of vowels in the string: " + countVowel);

      //This prints the positions of vowels

      System.out.print("\nThe positions of all vowels in the string: "+vowelPosition);

  }

}

Read more about similar programs at:

https://brainly.com/question/6858475

Select the Account Lockout Policy item that determines how many failed logins can occur on an account before the account is locked.

Answers

The Account Lockout Policy item is a security feature in most computer systems that helps prevent unauthorized access to user accounts

What is Account Lockout Policy item?

The Account Lockout Policy item is a security feature in most computer systems that helps prevent unauthorized access to user accounts. It specifies how many failed login attempts are allowed before an account is locked out. This feature is designed to protect against brute-force attacks, where an attacker repeatedly tries to guess a user's password until they get it right.

The exact details of the Account Lockout Policy can vary depending on the specific system and its configuration, but in general, the policy includes the following elements:

A threshold for the number of failed login attempts that trigger an account lockout. This threshold is typically set to a small number, such as three or five, to help prevent attackers from making too many attempts.

A duration for which the account is locked out. This can range from a few minutes to several hours or even days, depending on the system's configuration.

An option to unlock the account manually or automatically after the lockout period has expired.

The purpose of the Account Lockout Policy is to prevent attackers from gaining unauthorized access to user accounts by making it more difficult to guess passwords through brute-force attacks. By limiting the number of failed login attempts, the policy makes it harder for attackers to guess passwords by trial and error.

To know more about logins visit:

brainly.com/question/29869447

#SPJ4

TRUE OR FALSE Failing to include specific resource locations, even when the author's name is mentioned, is still considered plagiarism.

Answers

TRUE ,Failing to include specific resource locations, even when the author's name is mentioned, is still considered plagiarism.

What is plagiarism
Plagiarism is the act of using someone else’s work, words, or ideas and passing them off as one’s own. It is a form of intellectual theft and fraud. It can be done deliberately or unintentionally. Examples of plagiarism include copying another person’s work, paraphrasing or summarizing a source without proper citation, or even taking credit for someone else’s work. Plagiarism is a serious offense and can have serious consequences in both academic and professional settings. To avoid plagiarism, it is important to use proper citation, give proper attribution, and always provide a reference list.

To know more about plagiarism
https://brainly.com/question/17990253
#SPJ4

How many types of operating systems do we have as from 2010 till date​

Answers

Answer:

2010 Census Apportionment Results. December 2010. Apportionment is the process of dividing the 435 memberships, or seats, in the U.S. House of Representatives among the 50 states. At the conclusion …

Explanation:

On the Cities worksheet, click cell E13. Depending on the city, you will either take a shuttle to/from the airport or rent a car. Insert an IF function that compares to see if Yes or No is located in the Rental Car? Column for a city. If the city contains No, display the value in cell F2. If the city contains Yes, display the value in the Rental Car Total (F4)

Answers

The completed formula should look like this: =IF(F3="No", F2, F4) as per the given data.

What is if function?

The IF function is a popular Excel function that allows you to make logical comparisons between a value and what you expect. As a result, an IF statement can have two outcomes.

To insert the IF function in cell E13 to compare the Rental Car? column for a city and display the appropriate value, follow these steps:

Click on cell E13.Type the equal sign (=) to begin the formula.Type IF, followed by an opening parenthesis.Type F3="No", followed by a comma. This checks if the value in cell F3 (Rental Car?) is equal to "No".Type F2, followed by a comma. This displays the value in cell F2 if the Rental Car? column for the city contains "No".Type F4, followed by a closing parenthesis. This displays the value in cell F4 if the Rental Car? column for the city contains "Yes".Press Enter to complete the formula.

Thus, "=IF(F3="No", F2, F4)" can be the complete function.

For more details regarding Excel function, visit:

https://brainly.com/question/30324226

#SPJ1

Given integer currentBananas, if the number of bananas is 5 or more but fewer than or equal to 20, output "Allowable batch", followed by a newline.

Ex: If the input is 18, then the output is:

Allowable batch

Answers

To implement this in C++, you can use an if statement to check if the value of currentBananas is within the given range.

How to implement the statement in c++?

A sample code for implementing the check for the allowable batch of currentbananas would be:

#include <iostream>

int main() {

   int currentBananas;

   std::cin >> currentBananas;

   if (currentBananas >= 5 && currentBananas <= 20) {

       std::cout << "Allowable batch" << std::endl;

   }

   return 0;

}

This code takes an integer input for currentBananas and checks if its value is greater than or equal to 5 and less than or equal to 20. If the condition is true, it prints "Allowable batch" followed by a newline.

Find out more on input at https://brainly.com/question/13885665

#SPJ1



George has been appointed as the new CISO and aske
to implement a new user based authentication solution
This solution includes granting logical access based a
physical location and proximity. Which of the following
the BEST autentication solution for George to implement

Answers

Answer:

Explanation:

There are several options for implementing user-based authentication based on physical location and proximity. One option could be to use a combination of two-factor authentication (2FA) and location-based authentication.

Two-factor authentication involves requiring users to provide two different forms of authentication in order to access a system. This could include something the user knows (e.g. a password), something the user has (e.g. a security token), and/or something the user is (e.g. a fingerprint). By requiring two forms of authentication, it increases the security of the system and makes it harder for unauthorized individuals to gain access.

Location-based authentication involves using the user's physical location as an additional factor in the authentication process. This could be done using GPS coordinates or by detecting the user's proximity to a specific location or device (e.g. using Bluetooth). By requiring users to be in a specific location in order to access the system, it adds an additional layer of security.

Combining two-factor authentication with location-based authentication can provide a strong solution for user-based authentication. However, it is important to carefully consider the specific requirements and constraints of the system and ensure that the chosen solution is appropriate and effective.

Guidewords for the word “serpent” may be

Answers

Answer:

snake

Explanation:

Answer:

snake or a family that belongs to snake

In 2-5 paragraphs, describe how technology helps business professionals to be more efficient.

Answers

The ways that technology helps business professionals to be more efficient is that  Business professionals may stay more organized, communicate more effectively, and keep firms secure with the use of technology.

Technology makes it simpler to connect with employees by utilizing e-mail and memos, and it helps keep employee information and corporate paperwork a lot more organized using computers and software.

How does technology improve the productivity of business people?

By streamlining time-consuming procedures, technology also increases office productivity. For instance, using document management software eliminates the need for manual data entry, filing, as well as in file retrieval.

Therefore, one can say that Technology can be used to safeguard private executive decisions, financial data, and other forms of proprietary information that gives a company a competitive edge. Simply simply, technology aids firms in protecting their ideas from rivals.

Learn more about technology from

https://brainly.com/question/1162014
#SPJ1

When a program runs in a text-based environment, such as a command line interface, what determines the order in which things happen?

Answers

The set of commands will determines the order in which things

If you use a pen down block to instruct a sprite to go to random position and then move 100, what happens? A. The sprite teleports randomly and creates a single line 100 units long. B. The sprite creates a 100-unit line between its starting point and a random location. C. The sprite draws a line to a random position, then creates another line 100 units long. D. The program does not run because these commands can’t be combined.

Answers

Answer:

C

Explanation:

The sprite draws a line to a random position, then creates another line 100 units long

What characteristics are common among operating systems? List types of operating systems, and examples of each. How does the device affect the functionality of an operating system?

Answers

The operating system (OS) controls all of the computer's software and hardware. It manages files, memory, and processes, handles input and output, and controls peripheral devices like disk drives and printers.

What are the characteristics of OS?The fundamental software applications running on that hardware enable unauthorized users to interact with the equipment because instructions can be sent and results can be obtained.Developers provide technology that may be compatible, mismatched, or completely incompatible with several other OS categories across multiple versions of the same similar OS.The operating systems are frequently 32-Bit and 64-Bit in two different versions.Types of Operating System:

         Distributed OS .

         Batch processing OS.

         Time sharing OS.

To learn more about operating system refer to :

https://brainly.com/question/22811693

#SPJ1

Select the three main repetition structures in Java.

Answers

The three main repetition structures in Java are while loops, do-while loops and for loops.

What is java?

Java is a high-level, class-based, object-oriented programming language with a low number of implementation dependencies. It is a general-purpose programming language designed to allow programmers to write once and run anywhere (WORA), which means that compiled Java code can run on any platform that supports Java without the need for recompilation. Java applications are usually compiled to bytecode which can run on any Java virtual machine (JVM), regardless of computer architecture. Java's syntax is similar to that of C and C++, but it has very few low-level facilities than either of them. The Java runtime supports dynamic capabilities that traditional compiled languages do not have.

To learn more about java

https://brainly.com/question/25458754

#SPJ13

how to make windiws 10 to wundows 21?​

Answers

Answer:

You multiply it.

Veronica observes how the force of friction causes an object to slow down. She writes the following observation: When an object moves across a smooth surface, there is less friction created than when an object moves across a rough surface. When the object stops moving, friction is created. Which statement corrects the error(s) in Veronica's observations?

Answers

The statement corrects the error in Veronica's observations is "when an object stops moving, there is no friction." The correct option is D.

What is friction?

Friction is the force that prevents one solid object from sliding or rolling over another.

Frictional forces, such as the traction required to walk without slipping, are beneficial, but they also present a significant amount of resistance to motion.

When an object begins to move on a surface, friction is created. Veronica's conclusions about friction being less on a smooth surface and more on a rough surface were correct.

However, she stated that friction occurs when an object stops moving, which is incorrect. When an object is static, friction cannot be produced.

Thus, the correct option is D.

For more details regarding friction, visit:

https://brainly.com/question/28356847

#SPJ1

Your question seems incomplete, the missing options are:

It is not smooth or rough surfaces that affects friction. It is the size of the push.When an object moves across a rough surface, there is no friction.When an object moves across a smooth surface, the friction increases.When an object stops moving, there is no friction.

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

Which of these statements performs real number quotient division using type casting?

double x = 35 % 10:
double x = 35 / 10;
double x = 35.0 / 10.0;
double x = (double) 35 / 10;
double x = 35.0 % 10.0;

Answers

Answer:

Double x = 35 / 10;

Explanation:

Java provides simple data types for representing integers, real numbers, characters, and Boolean types. These types are known as _ or fundamental types.

<3

Describe how one character is represented in the character set

Answers

A character set is independent of a coded representation. A coded character set is the coded representation of a set of characters, where each character is assigned a numerical position, called a code point, in the encoding scheme.

For example, the number code for the character ‘ a could be decimal 97 and a ‘space’ character could be 32. When a character is stored on a computer system it is therefore the number code that is actually stored (as a binary number).

What is a character set?

A character set is a complete set of characters and their number codes that can be recognized by a computer system.

How is a character set represented in a computer system?

In order to represent characters in a computer, each code point in a coded character set must be mapped to a sequence of bits.

Thus, a character in a character set is assigned a numerical position.

To know more about the character set:

https://brainly.com/question/28480297

#SPJ1

Uma wants to create a cycle to describe the seasons and explain how they blend into each other. Which SmartArt diagram would work best for this?

Answers

Answer: SmartArt offers different ways of visually presenting information, using shapes arranged in different formations.

Explanation:SmartArt offers different ways of visually presenting information, using shapes arranged in different formations. The SmartArt feature also allows you to preview different SmartArt formations, making it very easy to change shapes and formations.

You have a project that requires you to work in a team setting. You know of a developer who has the credentials you
need, works well in a team, and does not need supervision to get the job done. The problem is that the developer is not
within your geographic location. One solution is to allow the developer to blank
full-time.

Answers

Answer:

work remotely

Explanation:

The best solution would be to allow the developer to work remotely full-time. This means that they would be working from home all the time and would most likely communicate with the rest of the team via other means. Usually, unimportant communication would be done through e-mail while important issues and team meetings would be done through video conference. This will allow you to hire this developer and add him/her to the team without having to worry about any issues arising due to transportation.

*Python Coding
2. Driver’s License ExamThe local driver’s license office has asked you to create an application that grades the written portion of thedriver’s license exam. The exam has 20 multiple-choice questions. Hereare the correct answers:1. B 6. A 11. B 16. C2. D 7. B 12. C 17. C3. A 8. A 13. D 18. B4. A 9. C 14. A 19. D5. C 10. D 15. D 20. AYour program should store these correct answers in a list. The program should read thestudent’s answers for each of the 20 questions from a text file and store the answers inanother list. (Create your own text file to test the application.) After the student’s answershave been read from the file, the program should display a message indicating whether thestudent passed or failed the exam. (A student must correctly answer 15 of the 20 questionsto pass the exam.) It should then display the total number of correctly answered questions,the total number of incorrectly answered questions, and a list showing the question numbers of the incorrectly answered questions.

Answers

correct = (["1.B", "6.A", "11.B", "16.C","2.D", "7.B", "12.C", "17.C", "3.A", "8.A", "13.D", "18.B","4.A" ,"9.C", "14.A", "19.D","5.C", "10.D", "15.D", "20.A"])

f = open("MyFile.txt", "r")

user_answers = ([])

count = 0

txt = ""

for x in f.read():

   if x == " " or x == "\n":

       x = ""

       count += 1

   if count == 2 :

       user_answers.append(txt)

       txt = ""

       count = 0

   txt += x

i = 0

cor = 0

wrong = ([])

while i < len(correct):

   if correct[i] == user_answers[i]:

       cor += 1

   else:

       wrong.append(user_answers[i])

   i += 1

questions = ([])

for i in wrong:

   txt = ""

   for w in i:

       if w == ".":

           questions.append(int(txt))

       txt+=w

print("There were {} correct answers".format(cor))

print("There were {} incorrect answers".format(len(questions)))

print("The incorrectly answered questions are {}".format(questions))

f.close()

The file I used for testing looks like:

1. C 6. A 11. B 16. C

2. D 7. B 12. C 17. C

3. A 8. D 13. D 18. D

4. A 9. C 14. A 19. A

5. C 10. D 15. D 20. C

The code only works if there is a new line after 20. C (press enter after that question if a new line isn't already included)

I hope this helps!

To use cache memory main memory are divided into cache lines typically 32 or 64 bytes long.an entire cache line is cached at once what is the advantage of caching an entire line instead of single byte or word at a time?

Answers

Answer:

The advantage of caching an entire line in the main memory instead of a single byte or word at a time is to avoid cache pollution from used data

Explanation:

The major advantage of caching an entire line instead of single byte is to reduce the excess cache from used data and also to take advantage of the principle of spatial locality.

Sometimes young adults may want to experience physical intimacy, and their lack of knowledge may result in .

Answers

Answer:

Unexpected outcome: Sometimes young adults may want to experience physical intimacy, and their lack of knowledge may result in pregnancy. ... Parents may experience emotions of frustration and anger when they have to deal with a cranky or troublesome child.

Other Questions
For the expression:(9x^2 + 4y^2 -12xy) / (4y^2 - 9x^2)Find the domainFind the domain of the simplified expression Do you think all of these creatures would be long to the same Kingdom? Why or why not.Use the following key to help you complete the field study.HINT: You can view the creatures by clicking on the link HERE. You may also use the activity on Page 5 of the lesson in order to view them. StepPhysical FeatureClassification1Smooth skinGo to 2FurGo to 32One eyeGo to 4Two eyesGo to 53One eyeGo to 7Two eyesGo to 84Arms and legsSilkus monowrestleLegs onlySilkus monosquirmus5Arms and legsGo to 6Legs onlySilkus duosquirmus6TailSilkus tallyhasNo tailSilkus stretchilus7TailFuzzus tallywagNo tailFuzzus feelzalot8Two teethGo to 9More than two teethFuzzus chompilus9PointyFuzzus pointilusSquareFuzzus squarilus In parallelogram HJKL if mKLH=125find mLHJ. I Need Help With A Story Called Theseus And The Minotaur Describe All The Question All The Way To 6 Please I Have 60 Points To Give Away For The Person That Answers Correctly And Brainliest.1. Exposition: Who Are The Characters What Is The Setting (Time And Place) Describe Some Of The Background Information That You Learn At The Beginning Of The Story.2. Inciting Idicident: Describe The Event Of The Story That Sets The Plot In Motion?3. Rising Action: Describe At Least 3 Events Is The Rising Action Of The Story.4. Climax: Describe The Climax Of The Story What Is The Turning Point Of The Story?5. Falling Action: Describe At Least 1 Event In The Falling Actions Of The Story.Lastly6. Resolution: Describe The Resolution Of The Story. How Has The Conflict Resolved. How Has The Character Changed.Please Answer All 6 Of These Question Yet Again These Question Are Base On The Short Story Of Theseus And The Minotaur Story I Dont Have The Pdf For You But I Can Tell You Its Only 1 Page I Read It But Dont Understad How To Answer Help a vector has an x component of -24.0 units and a y component of 36.6 units. find the magnitude and direction of this vector. Whats a drug? Can you name some drugs? What do drugs do to your body and mind? for each of the following situations determine whether it involves the principle of separation of powers, checks and balances, judicial review, federalism, or some combination of these principles. specify the principle or principles involved and explain your answer. 1. Simplify the following by combining like terms (5 points).4x-10+14+7x-10x+2 Given z1 = 2(cos(136) + i sin(136)) 22 = 10(cos(14) + i sin(14)) Find the product 21 22. Enter an exact answer. Questions for class discussion about life of pi, and what story to believe, the animal or human the human story . discuss, analyze and explain how we handle the selection and useof current communications technologies.200-300 words please Describe you agree or disagree with Human cloning Michelle currently has $280 and is spending $6 per day. Nick has no money but is earning $8 per day. After how many days will they have the same amount of money? How much money will they have on that day at what rate is the flywheel spinning when the power comes back on? 5) Find the measure of the unknownangle in the triangleO 100O 1051060 112PLEASE HELP Sherry needs to sell T-shirts as a fundraiser for a charity. She starts with 40 T-shirts and begins selling at a constant rate of 5 T-shirts each day. Is the below graph an accurate representation of the number of T-shirts Sherry has left to sell from the time she begins selling until the T-Shirts are gone. Question 1 options:TrueFalse refer to table 17-8. if player b chooses right, player A should choosea.Up and earn a payoff of 1.b.Middle and earn a payoff of 5.c.Middle and earn a payoff of 7.d.Down and earn a payoff of 4. Which statement about the original Mormons is the most accurate?O Many rejected basic American values and political developments.O At the core of their teachings weretranscendentalist philosophical beliefs.O Many experienceddoubtsabout the fundamental tenets of traditionalChristianity.O They soughtto reconcile the quest for personal wealth with their religiousbeliefs.O They adoptedadeep and radical antislavery stance. How important is risk to returns and what are the key elementsthat must be analyzed in this regard before an investment decisionis made? Discuss in no more than 200words. PLS HELP ME I WILL MARK THE BRAINLIEST