€ which of the following is the correct procedure to Select an entire documents? Select one: a press control + Stamps press F5 three times from the Home tab, Choose the Command "Select Allan the edit group press F7 Five times.​

Answers

Answer 1

The  correct procedure to Select an entire documents is   a press control.

What is the procedure about?

"Control+F" (or "Command+F" on a Mac) is the console easy route for the Discover command. On the off chance that you're in a archive or in a web browser, squeezing the Ctrl key + the F key will bring up a look box within the beat right corner of the screen.

Therefore, After you press "Ctrl + A", all of the content within the report will be highlighted, demonstrating that it has been chosen. You'll be able at that point perform a assortment of actions on the chosen content, such as changing the textual style, applying designing, or erasing the content.

Learn more about Command  from

https://brainly.com/question/25808182

#SPJ1


Related Questions

When selecting an area of pixels to delete, which of the following tool could be used?
A. Magic wand
B. Marquee
C. Paint bucket
D. Gradient

Answers

When selecting an area of pixels to delete, the tool that could be used is option A. Magic wand

What is the tool about?

The Magic Wand tool is a selection tool commonly found in image editing software such as Adobe Photoshop. The Magic Wand tool is used to select an area of pixels based on similar color or tone.

Therefore,  Once an area of pixels has been selected, the user can perform various editing actions on that area, such as deleting the pixels, changing their color, or applying a filter. The Magic Wand tool can be especially useful when working with images that have large areas of solid color or uniform tone, as it can quickly and easily select these areas for editing.

Learn more about pixels  from

https://brainly.com/question/2894159

#SPJ1

What is the difference between symbolic addressing and absolute addressing? Which addressing is easier to understand

Answers

Symbolic addressing varies from Absolute Addresses in that they specify relocatable addresses by either utilizing an emblem as the label in the name field of an assembler code statement or equating a symbol to a relocatable expression. Absolute addressing (or values) are obtained by equating a marker to an absolute expression.

What is a symbolic address?

A symbolic address is associated with a program symbol or a symbol defined by the Equate subcommand. The topic of certified symbolic addressing is covered further down. See Restrictions on the Use of Symbols for a more thorough explanation.

In memory management, the compiler binds symbolic addresses from the source program on disk to relocatable locations (which are the instruction addresses relative to each other). The linker then associates the relocatable address with absolute addresses (which are the physical addresses allocated in key memory).

The contents of a register reflect an absolute address. The contents of a register reflect an absolute address. In the sense that it is not stated relative to the present instruction address, this addressing method is absolute.

Learn more about addressing:
https://brainly.com/question/28769221
#SPJ1

Chris is concerned about deploying an application to a cloud service provider and being locked in technologically so that his organization would have to stay with that cloud service provider in order to run that application. Which of the following could he possibly use that should allow for an easier migration from one cloud service provider to another?
a. Virtual machines.
b. Containerization.
c. Orchestration.
d. Serverless computing.

Answers

Answer:

d. Serverless computing.

Explanation:

Chris is concerned about deploying an application to a cloud service provider and being locked in technologically so that his organization would have to stay with that cloud service provider in order to run that application.

Therefore, the use of Serverless computing should allow for an easier migration from one cloud service provider to another.

This is because, serverless computing has to do with a cloud computing model which gives the machine resources tasks to take care of servers on behalf of clients.

will give brainlyist

Which sentence in the following paragraph correctly describes mobile technology?
Mobile devices have become the main source of communication for many people around the world. However, businesses are still to capitalize on the wide reach mobile communication. Social media is being increasingly used in marketing research. Customized advertising can be integrated based on specific users' location. Smartphones do not have videoconferencing capabilities that is becoming a major business tool.

Answers

i think its the first sentence: Mobile devices have become the main source of communication for many people around the world

if im wrong im dum ;-;

Answer:

Customized advertising can be integrated based on specific users location.

Explanation:

Right for Plato/edmentum

How do you think productivity software like Microsoft Office might be useful in the healthcare field?

Answers

Microsoft Office offers several applications that are widely used in the healthcare field. Here are some of the common uses of Microsoft Office in healthcare:

Microsoft Word: It is extensively used in healthcare for creating and formatting documents such as patient reports, medical records, and referral letters.Microsoft Excel: It is used for data analysis, tracking patient records, managing inventory, financial calculations, and creating charts or graphs for a visual representation of data.Microsoft PowerPoint: PowerPoint is commonly used in healthcare for creating presentations, training materials, educational content, and reports.

Learn more about Microsoft Office, here:

https://brainly.com/question/15131211

#SPJ1

1.convert the following binary numbers to decimal
1.AB2 base in 16
2.123 in base 16
3.ABB base 16
4.35E.E base 16​
2.convert binary numbers to decimals
1.237 in base 8
2.2731 in base 8
3.617.7 in base 8
4.22.11 in base 8
3.Find the two's complement representation of the following numbers using 8bit
a) -17
b) -11
c) -46
d) -78

Answers

a) The converted binary numbers are:

1.AB2 base in 16 =  2738

2.123 in base 16 = 291

3.ABB base 16 = 43787

4.35E.E base 16​ =  3.3671875

b) converted  binary numbers to decimals are:
237 in base 8 = 159

2731 in base 8 = 1497

617.7 in base 8 =  7.234375

22.11 in base 8 = 0.15625

c) The two's complement representations of the following numbers using 8bit are:

-17 = 11101111.

-11 = 11110101.

-46 = 11010010.

-78 = 10110010.

What is the explanation for the above?

1) Converting binary numbers to decimal:

AB2 base in 16:

The first digit from the right is 2, which represents 2 in decimal.

The second digit from the right is B, which represents 11 in decimal.

The third digit from the right is A, which represents 10 in decimal.

Therefore, AB2 base 16 in decimal is: 2 + 11x16 + 10x16^2 = 2 + 176 + 2560 = 2738


2) 123 in base 16:

The first digit from the right is 3, which represents 3 in decimal.

The second digit from the right is 2, which represents 2 in decimal.

The third digit from the right is 1, which represents 1 in decimal.

Therefore, 123 base 16 in decimal is: 3 + 2x16 + 1x16^2 = 3 + 32 + 256 = 291


3) ABB base 16:

The first digit from the right is B, which represents 11 in decimal.

The second digit from the right is B, which represents 11 in decimal.

The third digit from the right is A, which represents 10 in decimal.

Therefore, ABB base 16 in decimal is: 11 + 11x16 + 10x16^2 = 11 + 2816 + 40960 = 43787



4) 35E.E base 16:

The first digit from the right is E, which represents 14 in decimal.

The second digit from the right is ., which separates the integer and fraction parts.

The third digit from the right is 5, which represents 5 in decimal.

The fourth digit from the right is 3, which represents 3 in decimal.

The fifth digit from the right is E, which represents 14 in decimal.

Therefore, 35E.E base 16 in decimal is: 14/16 + 3x16^-1 + 5x16^-2 + 14x16^-3 = 14/16 + 3/16 + 5/256 + 14/4096 = 3.3671875


Converting binary numbers to decimal:



1) 237 in base 8:

The first digit from the right is 7, which represents 7 in decimal.

The second digit from the right is 3, which represents 3 in decimal.

The third digit from the right is 2, which represents 2 in decimal.

Therefore, 237 base 8 in decimal is: 7 + 3x8 + 2x8^2 = 7 + 24 + 128 = 159



2) 2731 in base 8:

The first digit from the right is 1, which represents 1 in decimal.

The second digit from the right is 3, which represents 3 in decimal.

The third digit from the right is 7, which represents 7 in decimal.

The fourth digit from the right is 2, which represents 2 in decimal.

Therefore, 2731 base 8 in decimal is: 1 + 3x8 + 7x8^2 + 2x8^3 = 1 + 24 + 448 + 1024 = 1497



3) 617.7 in base 8:

The first digit from the right is 7, which represents 7 in decimal.

- The second digit from the right is ., which separates the integer and fraction parts.

- The third digit from the right is 1, which represents 1 in decimal.

- The fourth digit from the right is 6, which represents 6 in decimal.

- Therefore, 617.7 base 8 in decimal is: 7/8 + 1x8^-1 + 6x8^-2 + 0x8^-3 + 0x8^-4 + 0x8^-5 + 0x8^-6 + 0x8^-7 = 7/8 + 1/8 + 6/64 = 7.234375

4) 22.11 in base 8:

The first digit from the right is 1, which represents 1 in decimal.

The second digit from the right is 1, which represents 1 in decimal.

The third digit from the right is ., which separates the integer and fraction parts.

The fourth digit from the right is 2, which represents 2 in decimal.

Therefore, 22.11 base 8 in decimal is: 1x8^-1 + 1x8^-2 + 2x8^-3 + 0x8^-4 = 0.140625 + 0.015625 = 0.15625

Finding the two's complement representation of the following numbers using 8-bit:

To find the two's complement of a negative number, we first need to represent the number in binary form, invert all the bits, and then add 1 to the result.

a) -17:

- The binary representation of 17 is 00010001.

- Inverting all the bits gives 11101110.

- Adding 1 to 11101110 gives 11101111.

- Therefore, the two's complement representation of -17 in 8-bit is 11101111.

b) -11:

- The binary representation of 11 is 00001011.

- Inverting all the bits gives 11110100.

- Adding 1 to 11110100 gives 11110101.

- Therefore, the two's complement representation of -11 in 8-bit is 11110101.

c) -46:

- The binary representation of 46 is 00101110.

- Inverting all the bits gives 11010001.

- Adding 1 to 11010001 gives 11010010.

- Therefore, the two's complement representation of -46 in 8-bit is 11010010.

d) -78:

- The binary representation of 78 is 01001110.

- Inverting all the bits gives 10110001.

- Adding 1 to 10110001 gives 10110010.

- Therefore, the two's complement representation of -78 in 8-bit is 10110010.

Learn more about binary numbers at:

https://brainly.com/question/28222245

#SPJ1

Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as well as the company? Why?

Answers

Answer:

i is struggling

Explanation:

How would an assignee enter details, such as mileage and billing information, for a task?

Create a new task, and enter the details.
Open the status report, and enter the details.
In the main task window, click the Details button.
Within the assigned task window, scroll to the bottom.

Answers

Answer:

It's C

Explanation:

On edg

Answer:

C is correct

Explanation:

I got it on edg

Read the following statements and select the
conditional statements. Check all that apply.
If my car starts, I can drive to work
It is inconvenient when the car does not start.
If my car does not start, I will ride the bus to
work
I purchased this car used, and it is not
reliable

Answers

if my car starts, i can drive to work

if my car does not start, i will ride the bus to work

Answer:

if my car does not start, i will ride the bus to work

if my car starts, i can drive to work

Explanation:

Which statement is most likely to be true about a computer network?

Which statement is most likely to be true about a computer network?

Answers

Answer:

the answer is b

Explanation:

hope this helps

Answer:

A network can have several client computers and only one server.

Explanation:

(Confirmed on Edge)

I hope this helped!

Good luck <3

Which version of Microsoft Office is free?

Answers

Answer:

the older versions and really all of them are

Answer:

This is what I found on the internet that I hope will help you! :3

Explanation:

It's a free app that will be preinstalled with Windows 10, and you don't need an Office 365 subscription to use it. The existing My Office app has many of these features, but the new Office app puts the focus on the free online versions of Office if you're not an Office 365 subscriber.

The so-called WAP gap involves the __________ of information where the two different networks meet, the WAP gateways.

Answers

Complete Question:

The so-called WAP gap involves the ______ of information where the two different networks meet, the WAP gateways.

Group of answer choices

A. integrity.

B. confidentiality.

C. authentication.

D. WTLS.  

Answer:

B. confidentiality.

Explanation:

WAP is an acronym for wireless application protocol and it is a standard communications protocol used for accessing, formatting and filtering of data (informations) on wireless devices such as mobile phones over the internet or mobile wireless network.

Simply stated, a wireless application protocol (WAP) is a lightweight and easy to use protocol designed and developed for devices with low computing power e.g mobile devices.

There are two (2) main standard protocols that are being used for the wireless application protocol (WAP), these are;

1. Transport Layer Security (TLS).

2. Wireless Transport Layer Security (WTLS).

The so-called WAP gap involves the confidentiality of information where the two different networks (WTLS and TLS) meet, the WAP gateways.

In wireless communications, the wireless transport layer security was an improvement on the transport layer security. However, it created a major problem of confidentiality in the translation of the two protocols in a WAP architecture.

First, the user data is encrypted with a public key of an application server and then encrypted again from the client mobile device to the WAP gateway using the wireless transport layer security (WTLS) and lastly, the transport layer security (TLS) is used from the WAP gateway to the enterprise server. The TLS translates the WTLS data by decrypting it first and then encrypting it again.

The security concerns or confidentiality issues associated with using WAP is that, all messages are seen in plain text by the WAP gateways in the translation at the TLS point, thus causing the so called WAP gap.

Answer:

FROM THE TOP MAKE IT DROP THATS SOME WAP WAP WAP WAP

Explanation:

Jake needs to create a spreadsheet for his coworkers. They will need to follow across a long row of data. Jake would like to make his spreadsheet easy to read. He should _____.


change the text color to light green and change the fill color to red

leave the spreadsheet without any format changes

highlight the cells

make some formatting changes such as adding a fill color to every other row

Answers

Answer:

Make some formatting changes such as adding a fill color to every other row

If he does that, it will help differentiate between the rows as you follow it along

Assignment Summary
In this assignment, you will conduct research to find the best loan for your first car. Using reference materials and Internet sites, you will collect information for a used car and loan options to buy the car. You will use an online loan calculator to find the best option for a used car loan. You will do a multimedia presentation on the best loan option for a used car and the resources you used, along with the options you explored to decide on the best loan option. A list of search term suggestions for finding resources is provided at the end of this guide.
Your presentation should include the following slides. The slides should be a title slide, a slide containing your used car information, a slide containing information on loan options with a bank and with a credit union, a slide including calculations, a slide comparing the loan options, a slide with the best choice for a car loan, and a works-cited slide.

Answers

In this project, you will conduct an investigation to uncover the optimal loan solution for acquiring a second-hand car.

What are you expected to do in this assignment?

You will examine the various utilized automobile alternatives and financing approaches provided through banks and credit unions. By using an online credit calculator, you will compute the best choice for your scenario.

Your multimedia demonstration will include slides featuring pertinent information regarding the pre-owned car and funding options, calculations made, as well as a comparison between several potential lending contingencies.

Further, a works-cited slide should be included providing all the sources and data you employed to make your ultimate decision.


Read more about loans here:

https://brainly.com/question/29553278

#SPJ1

why is hard disk called random access medium​

Answers

RAM is called “random access” because any storage location on the computer can be accessed directly (as opposed to randomly). Hard drives, for instance, are organized in a way that allows the user to store and access information easily by referencing specific locations on the hard drive's platters.

A robot worker and a human worker are both vulnerable to

Answers

Answer:

fire

Explanation:

Rewrite the following pseudocode to include two more scores, 99 and 87. start num myScores[10] = 78,95,84,92,88,85,94,89,97,82 num counter = 0 num highest = 0 while counter < 10 if myScores[counter] > highest then highest = myScores[counter] endif counter = counter + 1 endwhile output highest stop

Answers

Here's the rewritten pseudocode with the additional scores:

start
num myScores[12] = 78,95,84,92,88,85,94,89,97,82,99,87
num counter = 0
num highest = 0
while counter < 12
if myScores[counter] > highest then
highest = myScores[counter]
endif
counter = counter + 1
endwhile
output highest
stop

Which of the following is true about operating system.

a. acts as an intermediary between the computer user and the computer hardware.
b. program that manages the computer hardware.
c. provides a basis for application progra

Answers

Answer:

google kis kam ka hai us se puch lo

does anyone play r0bIox

Answers

Answer:

Ah, okay okay, I know that game seems like a MEME, but it's actually good. I know a lot of kids play it and this community is filled with people...

Because of inability to manage those risk. How does this explain the team vulnerability with 5 points and each references ​

Answers

The team is vulnerable due to a lack of risk assessment. Without risk understanding, they could be caught off guard by events. (PMI, 2020) Ineffective risk strategies leave teams vulnerable to potential impacts.

What is the inability?

Inadequate contingency planning can hinder response and recovery from materialized risks. Vulnerability due to lack of contingency planning.

Poor Communication and Collaboration: Ineffective communication and collaboration within the team can make it difficult to address risks collectively.

Learn more about inability  from

https://brainly.com/question/30845825

#SPJ1

In computer science, what does the word security mean?
A. The methods used to collaborate with others by dividing up the
work
B. The methods used to protect the information stored by a piece of
software
C. The methods used to understand how videoconferencing tools
work
D. The methods used to make work more efficient and less time-
consuming

Answers

Answer:

B

Explanation:

Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.[1]

Suppose the count function for a string didn’t exist. Define a function that returns the number of non-overlapping occurrences of a substring in a string.

Answers

Answer:

I am writing a Python program:

import re

def NonOverlapping():

   string = input("Enter a string: ")

   substring = input("Enter a substring to find its non-overlapping occurances in " + string +": ")

   occurrences=len(re.findall(substring,string))

   return occurrences

print("The number of non-overlapping occurrences: " , NonOverlapping())

Explanation:

I will explain the program line by line.

import re  this is the module for performing regular expressions matching operations in Python.

def NonOverlapping(): this is the function definition. The function name is NonOverlapping and this function returns the number of non-overlapping occurrences of a substring in a string.

string = input("Enter a string: ")

substring = input("Enter a substring to find its non-overlapping occurances in " + string +": ")

The above two statement ares used to take input from the user. First the user is prompted to enter a string and the string is stored in string variable. Next user is asked to input the substring and its stored in susbtring variable.

occurrences=len(re.findall(substring,string)) This is the main line of the function. It has two methods i.e. len() and re.findall().

The re.findall() method returns all non-overlapping matches of substring in string. The string is checked for the given substring from left to right and all the non-overlapping occurrences of the substring are found and a list of matches is returned. len() method is used to return the length of the string but here it is used to count the number of non-overlapping occurrences substring in a string which are returned by re.findall() method. The whole result of these two methods is stored in occurrences.

return occurrences  This statement returns the number of non-overlapping occurrences of a substring in a string computed in the above statement.

print("The number of non-overlapping occurrences: " , NonOverlapping())

This statement displays the result by calling NonOveralling() method.

Suppose the count function for a string didnt exist. Define a function that returns the number of non-overlapping

What does the following code snippet do?
Circle myCircle = new Circle(50, 50, 25);
TranslateTransition rtrans = new TranslateTransition(new Duration(5000), myCircle);

Answers

With a radius of 25, a 5 second duration, and a center point of (50, 50), the given code draws a circle. The class javafx.animation in JavaFX is used to represent the TranslateTransition.

To apply the appropriate Translate Transition to an object, we must first create an instance of this class.

The class contains three constructors.

• Public TranslateTransition(): This function generates a new instance of TranslateTransition with the predefined settings.

• public TranslateTransition(Duration length): This function generates a new instance of TranslateTransition with the given duration.

• public TranslateTransition(Duration duration, Node node): This method generates a new instance of Translate Transition using the duration and node parameters supplied.

During its length, the TranslateTransition performs a move/translate animation. This is accomplished by routinely modifying the node's translateX, translateY, and translateZ variables.

Over the time period indicated, it moves the node from one point to another. Transition is accomplished by repeatedly modifying the node's translateX and translateY properties at predetermined intervals.

The amount of cycles the transition will go through throughout the allotted time will determine how quickly it transitions.

To learn more about JavaFX click here:

brainly.com/question/24259713

#SPJ4

________ is a standard method or protocol for web pages to request special processing on the web server, such as database queries, sending e-mails, or handling form data.

Answers

Common Gateway Interface is a standard method or protocol for web pages to request special processing on the web server, such as database queries, sending e-mails, or handling form data. The correct option is B.

What is Common Gateway Interface?

Common Gateway Interface (CGI) is a computing interface specification that allows web servers to execute an external program, typically to process user requests.

Such programs are typically written in a scripting language and are known as CGI scripts, but they may also include compiled programs.

The Common Gateway Interface (CGI) is a standard method or protocol for web pages to request special processing on the web server, such as database queries, e-mail transmission, or form data handling.

Thus, the correct option is B.

For more details regarding Common Gateway Interface, visit:

https://brainly.com/question/13147329

#SPJ1

Your question seems incomplete, the missing options are:

Fieldset

Common Gateway Interface

JavaScript

none of these

What single awk command can be used to display all the login names and their associated numerical user IDs

Answers

Answer:

Used the command syntax; awk -F":" '{ print "username: " $<number location> "\t\tuid:" $<number location> }' <target folder>

Explanation:

Linux operating system is a fast open-source computer platform for programmers and network administrators. Its system is arranged in a hierarchical tree structure with the root represented as "/" (for absolute path).

The passwd is a folder in the Linux OS that holds the login details of all users in the system network. The 'awk' is one of the commands used to get information from a file in a folder. It prints out the result by specifying the location of the values (like the username and user id) as a variable (with prefix '$') and then the target folder.

Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks]​

Answers

The Java code for the TestElection class that does the tasks is

java

import javax.swing.JOptionPane;

public class TestElection {

   public static void main(String[] args) {

       // Declare an array to store objects of the Election class

       int length = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of candidates:"));

       Election[] candidates = new Election[length];

       // Request values from the user to initialize the instance variables of Election objects and assign these objects to the array

       for (int i = 0; i < length; i++) {

           String name = JOptionPane.showInputDialog("Enter the name of candidate " + (i + 1) + ":");

           int votes = Integer.parseInt(JOptionPane.showInputDialog("Enter the number of votes for candidate " + (i + 1) + ":"));

           candidates[i] = new Election(name, votes);

       }

       // Determine the total number of votes

       int totalVotes = 0;

       for (Election candidate : candidates) {

           totalVotes += candidate.getVotes();

       }

       // Determine the percentage of the total votes received by each candidate and the winner of the election

       String winner = "";

       double maxPercentage = 0.0;

       for (Election candidate : candidates) {

           double percentage = (double) candidate.getVotes() / totalVotes * 100;

           System.out.println(candidate.getName() + " received " + candidate.getVotes() + " votes (" + percentage + "%)");

           if (percentage > maxPercentage) {

               maxPercentage = percentage;

               winner = candidate.getName();

           }

       }

       System.out.println("The winner of the election is " + winner);

   }

}

What is the arrays about?

In the above code, it is talking about a group of things called "candidates" that are being saved in a special place called an "array. " One can ask the user how long they want the list to be using JOptionPane and then make the list that long.

Also based on the code, one can also ask the user to give us information for each Election object in the array, like the name and number of votes they got, using a tool called JOptionPane.

Learn more about  arrays from

https://brainly.com/question/19634243

#SPJ1

Using your knowledge of classes, arrays, and array list, write the Java code for the UML above in NetBeans. [7 marks] Write the Java code for the main method in a class called TestElection to do the following: a) Declare an array to store objects of the class defined by the UML above. Use a method from the JOptionPane class to request the length of the array from the user. [3 marks] b) Use a method from the JOptionPane class to request values from the user to initialize the instance variables of Election objects and assign these objects to the array. The array must be filled. [5 marks] c) Determine the total number of votes and the percentage of the total votes received by each candidate and the winner of the election. The sample output of your program is shown below. Use methods from the System.out stream for your output.

Voltage as low as ____ volts is potentially deadly .
A.65
B.20
C.10
D.50

Answers

Answer:

50

Explanation:

i do not know what im supposed to say, however it is indeed 50

voltage as low as ____volts is potentially deadly
a. 65
b.29
c.10
d.50

answer is d 50

Write a program named palindromefinder.py which takes two files as arguments. The first file is the input file which contains one word per line and the second file is the output file. The output file is created by finding and outputting all the palindromes in the input file. A palindrome is a sequence of characters which reads the same backwards and forwards. For example, the word 'racecar' is a palindrome because if you read it from left to right or right to left the word is the same. Let us further limit our definition of a palindrome to a sequence of characters greater than length 1. A sample input file is provided named words_shuffled. The file contains 235,885 words. You may want to create smaller sample input files before attempting to tackle the 235,885 word sample file. Your program should not take longer than 5 seconds to calculate the output
In Python 3,
MY CODE: palindromefinder.py
import sys
def is_Palindrome(s):
if len(s) > 1 and s == s[::-1]:
return true
else:
return false
def main():
if len(sys.argv) < 2:
print('Not enough arguments. Please provide a file')
exit(1)
file_name = sys.argv[1]
list_of_palindrome = []
with open(file_name, 'r') as file_handle:
for line in file_handle:
lowercase_string = string.lower()
if is_Palindrome(lowercase_string):
list_of_palindrome.append(string)
else:
print(list_of_palindrome)
If you can adjust my code to get program running that would be ideal, but if you need to start from scratch that is fine.

Answers

Open your python-3 console and import the following .py file

#necessary to import file

import sys

#define function

def palindrome(s):

   return len(s) > 1 and s == s[::-1]

def main():

   if len(sys.argv) < 3:

       print('Problem reading the file')

       exit(1)

   file_input = sys.argv[1]

   file_output = sys.argv[2]

   try:

       with open(file_input, 'r') as file open(file_output, 'w') as w:

           for raw in file:

               raw = raw.strip()

               #call function

               if palindrome(raw.lower()):

                   w.write(raw + "\n")

   except IOError:

       print("error with ", file_input)

if __name__ == '__main__':

   main()

Which of the following BEST describes an inside attacker?
An agent who uses their technical knowledge to bypass security.
An attacker with lots of resources and money at their disposal.
A good guy who tries to help a company see their vulnerabilities.
An unintentional threat actor. This is the most common threat.​

Answers

The inside attacker should be a non-intentional threat actor that represents the most common threat.

The following information related to the inside attacker is:

It is introduced by the internal user that have authorization for using the system i.e. attacked.It could be intentional or an accidental.So it can be non-intentional threat.

Therefore we can conclude that The inside attacker should be a non-intentional threat actor that represents the most common threat.

Learn more about the threat here: brainly.com/question/3275422

Fill in the blanks with the correct words.

Option-Numeric., Adjustment., Cell Style., Insert., Horizontal.

1)Two types of alignment are possible in a cell namely vertical Alignment and __________ Alignment.

2)Shift + F11 is used to ___________a worksheet from a workbook.

3)The ___________tool is used to change the width is a column through the column heading in a worksheet.

4)You can ensure consistent formatting in all the cells in a worksheet in one go using ___________.

5)A formula which is used to perform mathematical calculation is called______________formula.​

Answers

Answer:

1) Horizontal

2) Insert

3) Adjustment

4) Cell Style

5) Option-numeric

Explanation:

Other Questions
Which of the following notations is the correct noble gas configuration forCo?OA. [Ar]4s23dB. [Ar]4s4p63dOC. [kr]4s4p64dOD. [Co]4s3d7 axon has $65 in his savings account. He deposits $15 every week. His father also deposits $25 into the account every time Jaxon mows the lawn. His savings account balance can be shown with the following expression: 65 + 15w + 25m Part A: Identify a coefficient, a variable, and a constant in this expression. (3 points) Part B: If Jaxon saves for 20 weeks and mows the lawn 3 times, how much will he have in his account? Show your work to receive full credit. (4 points) Part C: If Jaxon had $75 in his savings account, would the coefficient, variable, or constant in the expression change? Why? (3 points) (10 points) Find the length of the arc, s, on a circle of radius r interceptedby a central angle . r = 9.2m = 10.5 Which of the following statements best distinguishes the difference between real and financial assets?a. Real assets have less value than financial assets.b. Real assets are tangible; financial assets are not.c. Financial assets represent claims to income that is generated by real assets.d. Financial assets appreciate in value; real assets depreciate in value. Which fraction is equivalent to 16.6%? find the volume of the triangular prism h - 9m L - 7.2 m w - 3 m !!!!! solve for the missing coordinate. most problems have two answers. please help. the questions are attached in the picture 1.2.1 write the design brief for the design of the device that will solve the problem that is causing the price increase for electricity Besides temperature, the factor that is important for conduction, convection, and thermal radiation isa. thermal conductivity.b. wind speed.c. emissivity.d. surface area.e. thermal gradient. $1,000 of cash was received in advance of performing services. by the end of the period, $300 had not yet been earned. (the unearned revenue account was increased at the time of the initial cash receipt.) demonstrate the required adjusting journal entry by selecting from the choices below. (check all that apply.) multiple select question. service revenue would be credited for $700. accounts receivable would be debited for $700. unearned revenue would be debited for $700. service revenue would be credited for $300. unearned revenue would be debited for $300. Which of the following tools or commands can be used to monitor resources in Windows? Select all that apply.a) The PowerShell Get-Processcommandlet. b) Control Panel. c) The msinfo32 command entered in the CLI. d) The Resource Monitoring tool If a varies directly as m and n2 and inversely as y3, and a 4 when m 9, n 4, and y 2, find a if m 8, n 3, and y 5. a-(Type an integer or a simplified fraction.) Recently, the value of justine's college savings fund decreased by $4,371. if her fund was worth $7,397 before, about how much is it worth now? the traditional american family farm is being replaced by which type of enterprise? On November 1, 2020, Elle Supplies, Inc. purchased 2,000 shares of FashionWorks, Inc. for $30,000. FashionWorks shares are actively traded. The per share stock prices were: what is the distinction between an intrinsic and an extrinsic semiconductor? which statement would provide the best guide for activity during the rehabilitation period for a client who has been treated for retinal detachment? the activity level is: Suppose sequence has S4 = 13 and S5 = 20. Find the value of U5 Staci invested $1,150 five (5) years ago. Her investment paid 7.2 percent interest compounded monthly. Staci's twin sister Shelli invested $1,050 at the same time. But Shelli's investment earned 8 percent interest compounded quarterly. How much is each investment worth today? Do not round intermediate calculations. Round your answers to the nearest cent.Staci's investment worth today: $Shelli's investment worth today: $ which fraction is equivalent to 0.36 (repeating 0.36666) A.)3/6 B.)36/100 C.)4/11 D.)9/25