Answer:
Answered below
Explanation:
#Program is written in Python programming language
#Get the weight and price and store them in #variables.
parcel_weight = float(input('Enter weight of parcel in pounds: "))
rate_per_pound = float(input ('Enter shipping price per pound: "))
# Calculate the total price per pound
total_price = parcel_weight * rate_per_pound
#print invoice
print ("Your parcel weighs $parcel_weight pounds')
print ("The rate per pound is $rate_per_pound")
print("Total shipping cost is; ")
print ("%.2f" % total_price)
Which computers were the first PCs with a GUI
MS-DOS
Linux
Windows
Mac
The earliest GUI-equipped PCs were Linux and Mac-based. These are the right answers to the question that was asked.
Which PCs had a graphical user interface (GUI) first?The first computer to employ a mouse, the desktop metaphor, and a graphical user interface (GUI), concepts Douglas Engelbart first introduced while at International, was the Xerox Alto, developed at Xerox PARC in 1973. It was the first instance of what is now known as a full-fledged personal computer.
When was the GUI added to Windows?Windows is based on what is known as a graphical user interface (GUI), which was created by Xerox in 1975 but was never used. The "window, icon, menu, and pointing device" (WIMP) combination will make up the majority of a typical GUI.
To learn more about GUI visit:
brainly.com/question/14758410
#SPJ1
What does this button mean in the computer ????????
Answer:
Context menu
Explanation:
If you want to open a context menu this is the one
Alternative is Shift+F10 in most applications to open a context menu. It's basically the same thing as the menu key
Answer:
Context MenuExplanation:
this button mean in the computer
Justify the existence of programming languages to precisely communicate instructions?
Answer:
Machines don't understand human language and so must be communicated to using programming languages
Explanation:
Machines help make our lives easier. A machine as simple as a Zip can help to make keep one from an embarrassing situation.
Computers have evolved from simple calculators to what they are today. In the case of a zip, the user thinks up the instructions and executes it. Because a computer is more autonomous and automated than a simple zip because it is given a set of instructions and left to execute them. Because machines are not humans and do not understand any human language, the man had to invent machine language which in it's most basic form is 0 and 1. 0 for 'Off' or 'No' and 1 for 'On' or 'Yes'.
This basic form of language, just like the human language too, has evolved into several more complex and varied forms of languages. They remain relevant and continue to evolve to enable man to communicate with the machine as easily as possible because
Without the programming languages, we would be unable to efficiently describe our commands to the computer. The existence of many languages stems from the fact that languages are deemed more efficient when one is able to communicate more with fewer words. An advanced program is one that enables the programmer to do more with fewer and fewer lines of code.
Cheers!
essay on computer memory and how is it related to computer?
Answer:
grvty f th rthnng fr t nd srch
Explanation:
ts bcs y dnt hv brn
Mr. Hoosier has gathered all these data about his finances.
Salary $159,000
Taxable interest $5,600
Municipal Bond interest $15,000
Total Itemized deductions $9,500
The personal exemption is $4700. The standardized deduction for a single filer is 5000.
Single Filer
If Taxable Income is Then tax is:
0-8000 10% of the amount over 0
8000- 35,000 800 + 15% of the amount over 8000
35000- 55,000 4850 + 20% of the amount over 35000
55000- 150,000 8850 + 30% of the amount over 55000
150000 – 200000 37350 + 35% of the amount over 150000
200000 and over 54850 + 40% of the amount over 200000
Married filing jointly:
If Taxable Income is Then tax is:
0-8000 10% of the amount over 0
8000- 35,000 800 + 18% of the amount over 8000
35000- 55,000 4850 + 22% of the amount over 35000
55000- 150,000 8850 + 35% of the amount over 55000
150000 – 200000 37350 + 37% of the amount over 150000
200000 and over 54850 + 45% of the amount over 200000
Please answer each question and you must show your work in order to get partial credit.
What is his average effective tax rate?
To calculate Mr. Hoosier's average effective tax rate, we need to determine his total tax liability and divide it by his taxable income.
First, we need to calculate his taxable income. We start with his salary of $159,000 and subtract his total itemized deductions of $9,500 and the personal exemption of $4,700.
Taxable Income = Salary - Total Itemized Deductions - Personal Exemption
= $159,000 - $9,500 - $4,700
= $144,800
Next, we calculate his tax liability using the tax brackets for a single filer:
$0 - $8,000: 10% of the amount over $0
Tax = 10% * $8,000 = $800
$8,000 - $35,000: $800 + 15% of the amount over $8,000
Tax = $800 + 15% * ($35,000 - $8,000) = $800 + 15% * $27,000 = $800 + $4,050 = $4,850
$35,000 - $55,000: $4,850 + 20% of the amount over $35,000
Tax = $4,850 + 20% * ($55,000 - $35,000) = $4,850 + 20% * $20,000 = $4,850 + $4,000 = $8,850
$55,000 - $144,800: $8,850 + 30% of the amount over $55,000
Tax = $8,850 + 30% * ($144,800 - $55,000) = $8,850 + 30% * $89,800 = $8,850 + $26,940 = $35,790
Now, we can calculate the average effective tax rate:
Average Effective Tax Rate = Total Tax Liability / Taxable Income
= $35,790 / $144,800
≈ 0.2469 or 24.69%
Therefore, Mr. Hoosier's average effective tax rate is approximately 24.69%.
QUESTION 1 Choose a term from COLUMN B that matches a description in COLUMN A. Write only the letter (A-L) next to the question number (1.1-1.10) in the ANSWER BOOK. COLUMN A 1.1. Substances that provide nourishment to the body 1.2. How you think and feel about something 1.3. Helps to cope with the challenges of being a student Exercise relating to increasing your heart rate 1.5. Having traits or qualities traditionally associated with 1.4. men 1.6. Seeing, hearing, or sensing something that is not really there 1.7. 1.8. Leaving everything till the last minute Is Chapter 2 in the Constitution of SA 1.9. Group of people who share notes and information 1.10. Ability to exercise for extended period of time COLUMN B A hallucination B nutrients C study group D procrastinate E endurance F Bill of Rights G Cardio-vascular H masculine I attitude J resilience K strength L flexibility
Answer:
1.1 B nutrients 1.2 I attitude 1.3 J resilience 1.4 H masculine 1.5 L flexibility 1.6 A hallucination 1.7 D procrastinate 1.8 F Bill of Rights 1.9 C study group 1.10 E endurance
Explanation:
Create a python program that will input their name and their age. It will show an output "Hi, {name} ! How are you? I know you are {age} old."
I WILL MARK YOU AS BRAINLIEST
Answer:
age = 10
name = Cynthia
make an f string so the variables appear in the string. There are other ways to do this but I prefer f strings instead of using string concatenation. It causes problems adding 2 strings together most of the time.
print(f'Hi, {name} ! How are you? I know you are {age} old.')
write the truth table for AND, OR, NAND and NOR, using for inputs A,B,C andD
The truth table for AND, OR, NAND and NOR using for inputs A,B,C and D is in the explanation part.
What is truth table?A truth table is a mathematical table used in logic that sets out the functional values of logical expressions on each of their functional arguments, that is, for each combination of values taken by their logical variables.
Truth tables are used in Boolean algebra and other branches of mathematics and science that use Boolean logic to show the possible outcomes of an expression or operation in terms of its truth or falsity.
Thus, the truth tables for AND, OR, NAND, and NOR gates with four inputs (A, B, C, and D) is in the image attached below respectively.
For more details regarding truth table, visit:
https://brainly.com/question/29155453
#SPJ1
The software used to provide visual support such as slide show during lectures
Answer:
microsoft powerpoint
Explanation:
create java program for these 2 question
1 see what you can do and go from their
azure cloud shell utilizes a sandbox. explain what a sandbox is and how powershell utilizes the sandbox. g
A sandbox is an isolated computing environment where users can run programs and evaluate code without the risk of permanently affecting the underlying system. Azure Cloud Shell utilizes the sandbox to provide users with a secure environment for running PowerShell commands.
What is PowerShell?
PowerShell is a task-based command-line shell and scripting language developed by Microsoft. It helps system administrators and power-users rapidly automate tasks that manage operating systems (Linux, macOS, and Windows) and processes. PowerShell commands let users create, delete, and manage objects on computers.
To know more about PowerShell
https://brainly.com/question/30410495
#SPJ4
Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT
Answer: C. Executive information system
Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.
An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.
Given that,
Most useful information about determining what direction to go in the next two years.
Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.
It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.
This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.
EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.
So, the correct option is,
C. Executive information system
To learn more about Executive information systems visit:
https://brainly.com/question/16665679
#SPJ6
An array called numbers contains 35 valid integer numbers. Determine and display how many of these values are greater than the average value of all the values of the elements. Hint: Calculate the average before counting the number of values higher than the average
python
Answer:
# put the numbers array here
average=sum(numbers)/35 # find average
count=0 #declare count
for i in numbers: #loop through list for each value
if i > average: #if the list number is greater than average
count+=1 #increment the count
print(count) #print count
A local firewall adds protection to a hardware firewall by protecting a device _______. Select all that apply. HELP ASAP
A. When device is not connected to internet
B. Not connected through hardware firewall
C. cellular traffic that a hardware firewall prevents
D. For traffic that get past a hardware firewall
Answer: D. For traffic that get past a hardware firewall
Explanation:
hardware firewalls protect network boundaries
local firewalls are KEYWORD LOCAL more restrictive to device
thus local firewalls are contained within hardware firewalls
the natural answer is D
Current Tetra Shillings user accounts are management from the company's on-premises Active Directory. Tetra Shillings employees sign-in into the company network using their Active Directory username and password.
Employees log into the corporate network using their Active Directory login credentials, which are maintained by Tetra Shillings' on-premises Active Directory.
Which collection of Azure Active Directory features allows businesses to secure and manage any external user, including clients and partners?Customers, partners, and other external users can all be secured and managed by enterprises using a set of tools called external identities. External Identities expands on B2B collaboration by giving you new options to communicate and collaborate with users outside of your company.
What are the three activities that Azure Active Directory Azure AD identity protection can be used for?Three crucial duties are made possible for businesses by identity protection: Automate the identification and elimination of threats based on identity. Use the portal's data to research dangers.
To know more about network visit:-
https://brainly.com/question/14276789
#SPJ1
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Tableau is said to mainly connects to Excel spreadsheets to make data analysis fast and easy. What Gilbert have to do to bring the spreadsheet into Tableau is that He is to connect to an outside data source.
Tableau is often used as a form of connection to Excel spreadsheets so as the data analysis very simple.It gives room for Excel users to keep their spreadsheets even when they are polishing their ability to analyze their data, while giving simple to build, simple to read visualizations that shows information boldly.
See full question below
Gilbert has an Excel spreadsheet open in Tableau. What did Gilbert have to do to bring the spreadsheet into Tableau?
Select an answer:
A. He moved the Excel spreadsheet onto the Tableau server, and then opened it in Tableau.
B. He connected to an outside data source.
C. He dragged and dropped the file into Tableau.
He duplicated the data in Tableau.
Learn more from
https://brainly.com/question/22908883
can the charger of my laptop get infected with viruses also when it was connected to it?
Answer:
Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.
Explanation:
He has asked for projected sales figures broken down
by season.
Create one formula that can be copied down and then across.
Below is an example of a formula that you can use to calculate projected sales figures broken down by season, which can be copied down and across:
What is the formula?Assuming that the seasons are in cells B1:E1 (Summer, Fall, Winter, Spring) and the projected sales data is in cells A2:A6 (Sporting Goods, Electronics, Housewares, Toys, Clothing), you can use the following formula in cell B2:
swift
=A$2 * IF($B$1="Summer", 0.13, IF($B$1="Fall", 0.25, IF($B$1="Winter", 0.30, IF($B$1="Spring", 0.32, 0))))
This formula multiplies the projected sales amount (cell A2) by the corresponding percentage for each season (0.13 for Summer, 0.25 for Fall, 0.30 for Winter, and 0.32 for Spring), based on the value in cell B1. The dollar signs ($) are used to lock the references for cell A2 and the column B, so that the formula can be copied across and down to calculate projected sales for other seasons and product categories.
You can copy this formula down for the remaining product categories (cells B3:B6) and across for the remaining seasons (cells C2:E6) to calculate the projected sales figures broken down by season for all the product categories.
Read more about seasons here:
https://brainly.com/question/15734021
#SPJ1
David's of Denison
Summer 13% Fall 25% Winter 30% Spring 32%
Projected Sales
Sporting Goods 350,000
Electronics 310,500
Housewares 289,400
Toys 390,200
Clothing 400,575
write an sql statement to display the warehouseid and the sum of quantityon-hand grouped by warehouseid. name the sum totalitemsonhand and display the results in descending order of totalitemsonhand. (provide the select script statement and screenshot) g
The command used in SQL statement is SELECT, SUM(), and DESC to display the warehouseid and the sum of quantityon-hand grouped by warehouseid and display the result in descending order.
What is command in SQL?Command in SQL is used as instructions to communicate the data in database.
The code is below,
SELECT warehouseid,
SUM(quantityon-hand) AS totalItemsonhand
FROM INVENTORY
GROUP BY warehouseid
ORDER BY totalItemsonhand DESC
First, we select the data that want to be displayed with SELECT command. Then SUM() command will sum all quantityon-hand from inventory in group warehouseid. Displayed result in descending order can be instructed by command DESC.
Since, we want to name it totalitemsonhand, then use AS command to rename the result of SUM() to totalitemsonhand.
Learn more about SQL here:
brainly.com/question/25694408
#SPJ4
explain the evolution of computers
Answer:
vintage computers
Computers have changed drastically since the 1930s. AP
From the 1930s to today, the computer has changed dramatically.
The first modern computer was created in the 1930s and was called the Z1, which was followed by large machinery that took up entire rooms.
In the '60s, computers evolved from professional use to personal use, as the first personal computer was introduced to the public.
In the 1980s, Apple introduced its first computer, the Macintosh, and has dominated the computer industry ever since with laptops and tablets.
Visit Insider's homepage for more stories.
Although computers seem like a relatively modern invention, computing dates back to the early 1800s.
Throughout computing history, there has not been a lone inventor or a single first computer. The invention of the computer was incremental, with dozens of scientists and mathematicians building on their predecessors. The modern computer, however, can be traced back to the 1930s.
The 1930s marked the beginning of calculating machines, which were considered the first programmable computers.
computer in the 1930s
A calculating machine in the 1930s. AP
Konrad Zuse created what became known as the first programmable computer, the Z1, in 1936 in his parent's living room in Berlin. He assembled metal plates, pins, and old film, creating a machine that could easily add and subtract. Although his early models were destroyed in World War II, Zuse is credited with creating the first digital computer.
In the 1940s, computers took up entire rooms, like the ENIAC, which was once called a "mathematical robot."
computer room vintage
A computer room. AP
John Mauchly created the ENIAC during World War II to help the Army with ballistics analytics. The machine could calculate thousands of problems each second. The large-scale ENIAC weighed 30 tons and needed a 1,500-square-foot room to house the 40 cabinets, 6,000 switches, and 18,000 vacuum tubes that comprise the machine.
Some call this invention the beginning of the computer age.
In the 1950s, computers were strictly used for scientific and engineering research, like the JOHNNIAC, which was once described as a "helpful assistant" for mathematicians.
A man working at a computer in the '50s. AP
The JOHNNIAC was completed in 1954 and was used by RAND researchers. The massive machine weighed just over two tons with over 5,000 vacuum tubes. This early computer operated for 13 years or 51,349 hours before being dismantled.
In the 1960s, everything changed when the Programma 101 became the first desktop computer sold to the average consumer.
Programma 101. Pierce Fuller/ Wikimedia Commons
Up until 1965, computers were reserved for mathematicians and engineers in a lab setting. The Programma 101 changed everything, by offering the general public a desktop computer that anyone could use. The 65-pound machine was the size of a typewriter and had 37 keys and a printer built-in.
The Italian invention ushered in the idea of the personal computer that would last to this day.
As personal computers became popular in the 1970s, the Xerox Alto helped pave the way for Steve Jobs' Apple.
Xerox Alto. Francisco Antunes/ Flickr
The Xerox Alto was created in the '70s as a personal computer that could print documents and send emails. What was most notable about the computer was its design, which included a mouse, keyboard, and screen. This state-of-the-art design would later influence Apple designs in the following decade.
The Alto computers were also designed to be kid-friendly so that everyone — no matter the age — could operate a personal computer.
In the '80s, Apple's Macintosh was described as a game-changer for the computer industry.
The Macintosh. Raneko/ Flickr
When Steve Jobs introduced the first Macintosh computer in 1984, Consumer Reports called it a "dazzling display of technical wizardry." Like the Xerox Alto, the Macintosh had a keyboard, a mouse, and a small 9-inch screen. The computer — which weighed in at 22 pounds and cost $2,495 — was applauded for its interface of windows and icons.
this is very long chapter cannot be type here so please watch video regarding this or search it in Google. I would have definitely helped you but it is not possible to type and help you , it is so long chapter that it might consume 15 to 25 pages to explain it .
Don't think and take my suggestion negatively. I am really sorry.
which of the following is not the correct definition of an operating system
A.
it controls all other execution in a computer
B.
interface between hardware and application programs
C.
its a platform for ensuring that other executions has taken place
D.
maintains consistency of data loss during execution
The correct answer is C. An operating system is not a platform for ensuring that other executions have taken place. An operating system is a software program that manages the hardware and software resources of a computer and provides common services for computer programs. It acts as an interface between the hardware and application programs and controls all other execution in a computer. It also maintains consistency of data during execution.
By comparing the time out mechanism used in TCP to that used in a data link layer protocol, outline why it is necessary for the TCP timeout mechanism to implement an adaptive timeout duration
Answer:
When there are network flows within the wireless link that experience prolonged poor transmission it can impact on the network, leading to the stalling of the source while waiting for the arrival of ACKS, due to the filling of the TCP source congestion window. More time is lost as the source waits for a timeout to be caused by the expiration of the RTO timer which results in lower efficiency and network throughput by the TCP that requires an adaptive timeout duration to be implemented
Explanation:
Describe the big data life cycle
Answer:
Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.
Explanation:
mark me as brainliest please
Answer:
Big data lifecycle consists of four phases: data collection, data storage, data analysis, and knowledge creation. Data collection phase consists of collecting data from different sources. In this phase, it is important to collect data from trusted data sources.
Explanation:
Difference between Python vs Pandas?
Python and Pandas are not directly comparable as they serve different purposes. Here's an explanation of each:
Python:
Python is a general-purpose programming language known for its simplicity and readability. It provides a wide range of functionalities and can be used for various tasks, including web development, data analysis, machine learning, and more. Python has a large standard library and an active community, making it versatile and widely used in different domains.
Pandas:
Pandas, on the other hand, is a powerful open-source library built on top of Python. It is specifically designed for data manipulation and analysis. Pandas provides easy-to-use data structures, such as Series (one-dimensional labeled arrays) and DataFrame (two-dimensional labeled data tables), along with a variety of functions for data cleaning, transformation, filtering, grouping, and aggregation.
In essence, Python is the programming language itself, while Pandas is a Python library that extends its capabilities for data analysis and manipulation. You can use Python to write code for a wide range of purposes, while Pandas is focused on providing efficient and convenient tools for working with structured data.
for similar questions on Python.
https://brainly.com/question/26497128
#SPJ8
bills is replacing a worn-cut cable to his power table saw.what type of cable is he most likely using ?
A.PSC
B.SO
C.CS
D.HPD
Bill is replacing a worn-cut cable for his power table saw. is using is A. PSC (Portable Cord).
What is the bills?Working with frayed cables can be dangerous and may act as a form of a risk of electric shock or other hazards. To make a safe and successful cable replacement, there are some general steps Bill can follow.
A is the most probable type of cable he is utilizing from the provided choices. A type of cord that can be easily carried or moved around. Flexible and durable, portable cords are frequently utilized for portable power tools and equipment.
Learn more about bills from
https://brainly.com/question/29550065
#SPJ1
What is the awnser the question I accidentally put 6 in but it’s not 6
Answer:
2
Explanation:
Should one own a smart home device
What are some security issues that one can find bothersome with these types of devices?
Yes, one can have or should one own a smart home device
Some security issues that one can find bothersome with these types of devices are:
Privacy concernsVulnerabilities to hackingLack of updatesWhat are the security issues?Smart home tools offer usefulness and can help create growth easier, but they further create freedom risks that should be deliberate.
Some freedom issues so that find bothersome accompanying smart home tools contain:
Lastly, in terms of Privacy concerns: Smart home ploys may accumulate individual dossier, such as custom patterns and choices, that could be joint accompanying after second-party parties for point or direct at a goal buildup or added purposes.
Learn more about security issues from
https://brainly.com/question/29477357
#SPJ1
Which statement is used to assign value to a variable?
Answer:
the "=" sign is used to assign value to a variable. Example:
int number = 25;
You are basically assigning the value '25' to a variable of type 'integer' called 'number'.
Explanation:
The so-called WAP gap involves the __________ of information where the two different networks meet, the WAP gateways.
Complete Question:
The so-called WAP gap involves the ______ of information where the two different networks meet, the WAP gateways.
Group of answer choices
A. integrity.
B. confidentiality.
C. authentication.
D. WTLS.
Answer:
B. confidentiality.
Explanation:
WAP is an acronym for wireless application protocol and it is a standard communications protocol used for accessing, formatting and filtering of data (informations) on wireless devices such as mobile phones over the internet or mobile wireless network.
Simply stated, a wireless application protocol (WAP) is a lightweight and easy to use protocol designed and developed for devices with low computing power e.g mobile devices.
There are two (2) main standard protocols that are being used for the wireless application protocol (WAP), these are;
1. Transport Layer Security (TLS).
2. Wireless Transport Layer Security (WTLS).
The so-called WAP gap involves the confidentiality of information where the two different networks (WTLS and TLS) meet, the WAP gateways.
In wireless communications, the wireless transport layer security was an improvement on the transport layer security. However, it created a major problem of confidentiality in the translation of the two protocols in a WAP architecture.
First, the user data is encrypted with a public key of an application server and then encrypted again from the client mobile device to the WAP gateway using the wireless transport layer security (WTLS) and lastly, the transport layer security (TLS) is used from the WAP gateway to the enterprise server. The TLS translates the WTLS data by decrypting it first and then encrypting it again.
The security concerns or confidentiality issues associated with using WAP is that, all messages are seen in plain text by the WAP gateways in the translation at the TLS point, thus causing the so called WAP gap.
Answer:
FROM THE TOP MAKE IT DROP THATS SOME WAP WAP WAP WAP
Explanation:
Meredith just installed a new smart security system in her home, which allows her to turn off her alarm system from her smartphone as she’s on her way home from work.
Meredith’s home security system is an example of ____.
an SSD
a microprocessor
an operating system
an integrated computer system
Meredith’s home security system is an example of an integrated computer system. The correct option is D.
What is an integrated computer system?A desktop computer is referred to as an integrated desktop computer if the computer and monitor are housed in the same housing, operate as a single unit, and are powered by the AC mains through the same cable.
An example of an integrated computer system is Meredith's home security system.
It is a system that integrates hardware and software elements, including cameras, sensors, microprocessors, and an operating system, to provide security features like access control, intruder detection, and video monitoring.
The system's components are made to function together seamlessly, and it gives the user a single point of control, such a smartphone, from which to manage the security features.
Thus, the correct option is D.
For more details regarding integrated computer system, visit:
https://brainly.com/question/30273876
#SPJ1