I really do need help asap

I Really Do Need Help Asap
I Really Do Need Help Asap

Answers

Answer 1

The third one.

Explanation:

The first answer is missing colons after the "if-else" clauses.

The second answer is missing quotes inside the print statements.

The fourth answer is missing indentation (which results in a syntax error in Python).


Related Questions

When is the possibility of solar weather affecting terrestrial weather the highest?(1 point)

during solar minimum
during solar minimum

during the solar cycle
during the solar cycle

during solar maximum
during solar maximum

during Total Solar Irradiance
during Total Solar Irradiance

Answers

The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.

Does solar weather have an effect on terrestrial weather?

There are different forms of weather on Earth, this is one that ranges from the surface of the planet out unto the outer space.

Note that Space weather as well as terrestrial weather are known to be influenced by the little  alterations that the Sun undergoes during its solar cycle.

Hence, The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.

Learn more about solar weather from

https://brainly.com/question/15279276

#SPJ1

Explain the impact of the continuing evolution of computer hardware and the accompanying evolution of operating systems software.

Answers

As computer hardware continues to evolve, so too does the software that runs on it. Operating systems are constantly being updated to take advantage of new hardware capabilities and to address security concerns. This continuing evolution has a major impact on the way we use computers.

For example, new hardware developments have led to the creation of new types of devices, such as touchscreen laptops and tablets.

Operating systems have been adapted to make use of these new devices, and the way we interact with computers has changed as a result. Similarly, the way we store and access data has also evolved, thanks to advances in storage devices and networking technology.

The ongoing evolution of computer hardware and software is thus having a major impact on the way we live and work. As new capabilities are introduced, we find new ways to use computers to improve our lives.

Learn more on computer hardware here:

https://brainly.com/question/24370161

#SPJ4

What is the first question john says we must ask ourselves about things we see online?.

Answers

Answer:

"who made this and why?"

Explanation:

To represent 9 different colours, what is the minimum
colour depth needed? Give your answer in bits.

Pls help!!

Answers

Answer:

4 bits

Explanation:

3 bits gives you 8 combinations, which is not enough.

4 bits gives you 16 combinations.

n bits gives you 2ⁿ combinations in general.

To represent 9 different colors, the minimum color depth needed is 4 bits.

A bit is the smallest unit of digital information, representing either a 0 or a 1 in binary code.

In computing, bits form the foundation of data storage and processing, enabling the representation of complex information through combinations of 0s and 1s.

To represent "n" different colors, there is a need to find the smallest "k" such that [tex]2^k[/tex] is greater than or equal to "n."

For this case, n = 9 (since there are 9 different colors).

Now, we find the smallest "k" such that [tex]2^k \le 9[/tex]:

[tex]2^k = 2^3 \\[/tex]

= 8 (with 3 bits, we can represent 8 different colors)

[tex]2^4[/tex] = 16 (with 4 bits, we can represent 16 different colors)

Since 4 bits ([tex]2^4[/tex]) is the smallest power of 2 that is greater than or equal to 9, the minimum color depth needed to represent 9 different colors is 4 bits.

Learn more about bit here:

https://brainly.com/question/13014227

#SPJ7

what are the limitations of the current thecnology​

Answers

Answer:

Disadvantages of Technology in Education

Learning Is Becoming More Expensive. Times have changed a lot in terms of education. ...

Insufficient Teaching Methods. ...

Misguiding Information. ...

Extra Distractions for Students. ...

Inefficient Learning by Students. ...

Technology Sometimes Fails. ...

Makes Cheating Easier. ...

Final Thoughts.

28-Oct-2020

How many hours per week do you spend on e-mail? data are presented here for a gss sample of 99 men and women, who each reported the number of hours they spent per week on e-mail.

Answers

The proportion of the sample that spent 3 hours or less per week on email is given as: 57.57%. See the computation below for explanation.

What is the calculation justifying the above result?

Given:

Total Number of People = 99

Number of people that spent 3 hours or less per week on e-mail

= 19+20+13+5 = 57

Thus, Required Proportion (Those who spent 3 hours or less per week on email)

57/99

= 0.5757

[tex]$\approx$[/tex] 57.57%

Learn more about sampling:
https://brainly.com/question/24466382

#SPJ1

Full Question:

How many hours per week do you spend on email? Data are represented here for a GSS sample of 99 men and women, who each reported the number of hours they spent per week on email E-mail Hours per Week Frequency 19 20 13 4 10 or more 23 What proportion of the sample spent 3 hours or less per week on e-mail?

When you load a program in windows, the pc copies the program from the mass storage device to _______________ and then runs it.

Answers

When you load a program in windows, the pc copies the program from the mass storage device to RAM and then runs it.

RAM is an abbreviation for random access memory. RAM is used to store programs and data that can be read and altered in any order. RAM has the advantage over hard disk drives as it is more convenient and faster to read and write from.

One of the disadvantages of this type of memory is that it cannot store data permanently as the data is lost when the computer is shut off.

RAM is stored in microchips of the pc and can bear only a small amount of data.

Dynamic random access memory and static random access memory are the two main types of RAM that differ in that the static random access memory the data does not need to be constantly refreshed.

To know more about RAM, click here:

https://brainly.com/question/3157583

#SPJ4

A student who wants to work with computers but does not have a strong aptitude for math might find a good fit by pursuing a(n)___systems degree.

Answers

A student who wants to work with computers but does not have a strong aptitude for math might find a good fit by pursuing a(n) information technology systems degree.

What is information technology meaning?

Information technology (IT) is known to be a term that connote the use of any form of computers, storage, as well as networking and other forms of physical devices, infrastructure and processes to be able to make, process, save as well as, secure and pass all kinds of electronic data.

Therefore, A student who wants to work with computers but does not have a strong aptitude for math might find a good fit by pursuing a(n) information technology systems degree.

Learn more about information technology from

https://brainly.com/question/25110079

#SPJ1

strong aptitude for math might find a good fit by pursuing a(n)____ systems degree.

A _________, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.

Answers

A domain name such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.

What is Domain name?

This is known to be a kind of Application programming interface. The  domain name is said to be a series or a string of letters that tells more about a realm of administrative autonomy.

It  tells about authority as well as control that is found  within the Internet. Domain names are said to be used in a lot of networking contexts and therefore, A domain name such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.

Learn more about Domain name from

https://brainly.com/question/13153286
#SPJ1

The total requests for a web page and are used as a measure of internet traffic are called ______. multiple choice question.

Answers

Answer:

hits

Explanation:

were i can use screwdriver

Answers

Answer:

On a screw

Explanation:

Which command prompt command will enable you to see all the files in the c:\fred folder with the extension exe?

Answers

DIR C:\FRED\*.EXE command prompt command will enable you see all the files in the c:\fred folder with the extension exe.

If you want to see all the files in a specific folder that have a certain file extension, you can use the DIR command in the Command Prompt.

To use the DIR command, you need to specify the path of the folder you want to list the contents of, and then add the file extension you're looking for. So, if you want to see all the files in the c:\fred folder that have the .exe extension, you would use the following command:

dir c:\fred\*.exe

This will list all the files in the c:\fred folder that have the .exe extension.

Learn more on command prompt here:

https://brainly.com/question/25808182

#SPJ4

What is the most popular example of specialized software for managing projects?
a) project apple
b) microsoft management
c) tool pert/cpm
d) microsoft project

Answers

The most popular example of specialized software for managing projects is: D) Microsoft project.

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task (function) and proffer solutions to a particular problem.

What is Microsoft office?

Microsoft Office can be defined as a processing software application or program that is designed and developed by Microsoft Inc.

Basically, the Microsoft Office comprises different software applications and these include the following:

Microsoft Word.Microsoft PowerPoint.Microsoft AccessMicrosoft ProjectMicrosoft Excel.

In conclusion, the most popular example of specialized software for managing projects is Microsoft project because it can be used by project managers to formulate plans, budget, distribute resources and monitor project progress.

Read more on Microsoft project here: https://brainly.com/question/2704239

#SPJ1

object-oriented methods provide an easy transition to o-o programming languages such as c , java, and swift

Answers

Object-oriented methods provide an easy transition to o-o programming languages such as c , java, and swift is a true statement.

What are programming languages?

Programming languages can be defined as a mode of our electronic medium in which the strings of the graphical design as well as the visual elements are being included, it is basically a machine output with the person get.

After using these various languages the person is getting output after the languages use like C, C plus, Java, etc all views languages contribute to an object-oriented method.

Learn more about programming languages, here:

https://brainly.com/question/23959041

#SPJ1

_____ are tools that track the memory usage, status, and errors of currently running software.

Answers

Process managers are tools that track the memory usage, status, and errors of currently running software.

What is a process management?

Process Management is known to be a term that is often called Business Process Management (BPM).

It is seen as  a kind of an organizational discipline that gives tools and resources that is said to be used for examining , defining, optimizing, monitoring, etc., of interdependent business processes.

Therefore, Process managers are tools that track the memory usage, status, and errors of currently running software.

Learn more about Process managers from

https://brainly.com/question/869693

#SPJ1

I Need help with this ASAP

Answers

Answer:It´s B. The code reults in an error

Explanation:

Activating the ______ will make the trigger stay in the operating mode even when it is released.

Answers

Answer:

Trigger lock

Explanation:

A variety of memory cards and flash drives can be classified as _____ storage, which stores data in a nonvolatile, erasable, low-power chip.

Answers

A variety of memory cards and flash drives can be classified as Solid state storage, which stores data in a nonvolatile, erasable, low-power chip.

What are memory cards?

A memory card is known to be  a type of storage device that is known to be used for saving media as well as data files.

Note that this is a tool that helps to give  a permanent as well as non-volatile tool to be able to save data and files from any attached device.

Therefore, A variety of memory cards and flash drives can be classified as Solid state storage, which stores data in a nonvolatile, erasable, low-power chip.

Learn more about memory cards from

https://brainly.com/question/21708725

#SPJ1

Which type of social engineering attack attempts to discover personal information through the use of email?

Answers

Answer:

A phishing attack

Explanation:

Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization

As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first task be?

Answers

As a technical support rep, Michael's first task will be option b: Determine the purpose of the message he will send as a response.

Who is a technical support rep?

The role or duty of a Technical Support is known to be any person that tends to troubleshoot customer tech issues.

Note that they are said to be people who often resolve issues that are linked to computers, phones, tablets, and others.

Therefore, As a technical support rep, Michael's first task will be option b: Determine the purpose of the message he will send as a response.

Learn more about technical support  from

https://brainly.com/question/27366294
#SPJ1

See option

a. conduct any necessary research

b. determine the purpose of the message he will send as a response

c. Hit the "reply" button

d. start composing his reply

How do clustered systems differ from multiprocessor systems? what is required for two machines belonging to a cluster to cooperate to provide a highly available service?

Answers

In order to complete a distributed computational task, clustered systems are often built by fusing several computers into a single system.

On the other hand, multiprocessor systems could be a single physical object made up of numerous CPUs.

A multiprocessor system is more strongly coupled than a clustered system. While the processors in a multiprocessor system might be able to interact using shared memory, clustered systems require messages.

The state on the two machines needs to be copied and regularly updated for two machines to deliver a highly available service. If one of the machines breaks down, the other might step in to take over.

Learn more on clustered systems here:

https://brainly.com/question/26150121

#SPJ4

Acute exacerbation of addison's disease can lead to ecg changes and cardiovascular collapse as a result of electrolyte imbalance secondary to:_________

Answers

Acute exacerbation of Addison's disease can lead to ECG changes and cardiovascular collapse as a result of electrolyte imbalance and also as a consequence of low blood volume due to the K retention and/or Na excretion.

What is Addison's disease?

Addison's disease is a disorder associated with the faulty secretion of several hormones, which are fundamental to maintaining the homeostasis of the body (state of equilibrium) in normal conditions.

This disease (Addison's disease) is associated with electrocardiogram (ECG) changes due to arrhythmia caused by electrolyte imbalance issues, which is a process that depends on positive ion particles such as potassium K and sodium Na in normal concentration levels

In conclusion, acute exacerbation of Addison's disease can lead to ECG changes and cardiovascular collapse as a result of electrolyte imbalance and also as a consequence of low blood volume due to the K retention and/or Na excretion.

Learn more about Addison's disease here:

https://brainly.com/question/13840401

#SPJ1

Which of the following is NOT a possible result of personal information being located on an unsecure network?

Answers

The option that is not a possible result of personal information being located on an unsecure network is a computer virus is downloaded to the network.

What is an unsecure network?

An unsecured network is known to be a term that connote that a given network can be compromise at any time.

Note that this is said to be one that is refers to as a free Wi-Fi (wireless) network and it is one that tells that there is no form of special login or screening process to be able to get on the network, and as such you and anyone else can use it.

Therefore, based on the above, The option that is not a possible result of personal information being located on an unsecure network is a computer virus is downloaded to the network.

Learn more about unsecure network  from

https://brainly.com/question/14806619

#SPJ1

Q.

Which of the following is NOT a possible result of personal information being located on an unsecure network?

answer choices

A computer virus is downloaded to the network

A persons financial information is downloaded to social media

A persons identity is stolen

A computer hacker breaks into the network and downloads information

Given an array of integers of size 5, how does the computer know where the 3rd indexed variable is located?

Answers

The computer knows where the 3rd indexed variable is by adding space for 3 integers to the base address of the array.

A data type can be defined as metadata that defines the type of data that can be placed inside a PHP variable; Metadata means that it is data about data (information about data such as structure and syntax).

A data type in simpler words can be defined as nothing but a classification of values that can be used in variables and a collection of methods and operators that can be applied to those values. PHP programming language supports approximately 7 different standard data types, these data types are:

IntegerFloat (or double)StringBooleanArrayObjectNull

You can learn more about data type here https://brainly.com/question/14581918

#SPJ4

If using the md5 hashing algorithm, what is the length to which each message is padded?

Answers

Answer:

512 bits.

Explanation:

If using the md5 hashing algorithm, what is the length to which each message is padded?

The answer is 512 bits

hope this helps

Dexter went to the university library to print history report that was printed on a ____ printer which uses low quality and heat sensitive paper

Answers

Answer:

thermal printer

Explanation:

Dexter went to the university library to print history report that was printed on a thermal printer which uses low quality and heat sensitive paper

What is a thermal printer?

A thermal printer is known to be a kind of a a printer that is said to be compose of the use of heat so that it can be able to make the image on paper.

A a result of its quality of print, speed, as well as technological advances it has said to be used a lot in  airline, banking, and others.

Therefore, when compared to others, it is of low quality and as such,  Dexter went to the university library to print history report that was printed on a thermal printer which uses low quality and heat sensitive paper

Learn more about printer from

https://brainly.com/question/14156130

#SPJ1

1.21 lab: divide by x write a program using integers user_num and x as input, and output user_num divided by x three times. ex: if the input is:_________

Answers

A program using integers user_num and x as input, and output user_num divided by x three times is given below:

The Program

#include <stdio.h>

int main(void) {

  int userNum;

  int x;

  int ans1;

  int ans2;

  int ans3;

 

  scanf("%d", &userNum);

  scanf("%d", &x);

 

  ans1 = userNum/x;

  ans2 = ans1/x;

  ans3 = ans2/x;

 

  printf("%d %d %d\n", ans1, ans2, ans3);

  return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

In __________ write, the data are stored in the cache, and control returns to the caller.

Answers

In an asynchronous write, the data are stored in the cache, and control returns to the caller.

An asynchronous write is a write operation that does not block the caller until the data is actually written to the underlying storage. The data is instead stored in the cache, and control returns to the caller. When the data is eventually written to the underlying storage, the write is said to be "completed".

Asynchronous writes can be useful in situations where blocking the caller is not desirable, or where the time to complete the write is not known in advance. For example, an application that is writing data to a slow storage device may choose to use an asynchronous write in order to avoid blocking the caller while the data is being written.

Learn more about Asynchronous write here:

https://brainly.com/question/10057909

#SPJ4

An operating system is an example of which of the following?
A. Hardware
B.software
C.networking system
D.messaging system

Answers

B. Software.

Operating system is a software the supports a computer’s basic functions.

An internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web.

Answers

An internet security suites is a collection of utility programs designed to maintain your security and privacy while you are on the web.

What is Internet Security Suite?

As the name is called, an Internet Security Suite is known to be a kind of a protection services where all your security requirement are known to be in one package.

Note that they are called an all in one computer security packages that a person can have and it come with an anti-virus scanner, as well as an anti-spyware scanner, email protection, and others.

Therefore, An internet security suites is a collection of utility programs designed to maintain your security and privacy while you are on the web.

Learn more about internet security suites from

https://brainly.com/question/16341928
#SPJ1

Other Questions
The nurse develops? a health education program about preventing the transmission of hepatitis b. the nurse evaluates the teaching has been effective when the participants identify can you tell me what -48 What are tasks performed by people that customers will buy to satisfy a want or need? Write the equation of the line passing through the points (3,9) and (9,3).Question content area bottomPart 1The equation of the line is enter your response here. the points (-3,1), (-1,1), (0,-1), (-1,-3), (-3,-3) and (-4,-1) are vertices of a polygon. what type of polygon is formed by these points? For an object being launched at ground level at a tilted non-zero initial velocity, is the velocity zero anywhere? are the horizontal or vertical components of the velocity zero at any point? Exercise 2 Circle the appositive or appositive phrase in each sentence.Our local newspaper, The Sentinel, printed a picture of my stepfather with his award. If the growth rate of the number of bacteria at anytime t is proportional to the number present at t and doubles in 1 week, how many bacteriacan be expected :____after 2 weeks? after 4 weeks? Exercise 1 Circle the gerund or gerund phrase in each sentence.Recycling gives our family a sense of accomplishment. Under the tenth amendment, the federal government is the only level of government that can regulate elections. true false A rectangular picture has dimensions of length (2x-1) inches and width (x+7) inches. The area of the picture is 108 in^2. What are the length and width of the picture? How much more energy does a magnitude 8.0 earthquake release than does a magnitude 7.0 earthquake? What freedom is described in Line 1 of the Magna Carta? HELP Jessica is putting money into a checking account. Let y represent the total amount of money in the account (in dollars). Let x represent the number of weeks Jessica has been adding money. Suppose that x and y are related by the equation =+55030xy. What action should you take to keep Mohammad Nassar from exposing the other patients in the reception area Dr. gray studies the relative influence of heredity and environment on emotional intelligence. dr. gray's research belongs to the field of? As the single emt managing an apneic patient's airway, the preferred initial method of providing ventilations is the:_________ Exercise 1 Underline the correct pronoun.A woman was expected to quit teaching after (she, her) married. Which one of the worst natural disasters in history is associated with international trade? Calculate the riemann sum r(f,p,c)r(f,p,c) for f(x)=xf(x)=x, p={1,1.3,1.6,2}p={1,1.3,1.6,2}, c={1.2,1.45,2