A program that reads a string from the user containing a date in the form mm/dd/yyyy. It should print the date in the format March 12, 2018 is given below:
The Programmonths_info = ['January', 'February','March','April', 'May','June', 'July','August', 'September', 'October', 'November', 'December']
date = input('Enter a date using the mm/dd/yyyy format ')
m, d, y = date.split('/')
m = int(m) - 1
name_of_month = months_info[m]
print('{} {}, {}'.format(March, 12, 2018))
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Research and a well-written problem statement are important because A)they give a clear understanding of the problem and its solution. B)they ensure that anyone in the general public will be able to understand and solve the problem. C)they give a list of the needs of the stakeholders. D)they ensure that questions still need to be asked about the problem.
Answer:
A. they give a clear understanding of the problem and it's solution
Explanation:
Research and a well-written problem statement are important because they give a clear understanding of the problem and its solution.
Answer:
Research and a well-written problem statement are important because
they give a clear understanding of the problem and its solution.
they ensure that anyone in the general public will be able to understand and solve the problem.
they give a list of the needs of the stakeholders.
they ensure that questions still need to be asked about the problem.
Using the in databases at the , perform the queries show belowFor each querytype the answer on the first line and the command used on the second line. Use the items ordered database on the siteYou will type your SQL command in the box at the bottom of the SQLCourse2 page you have completed your query correctly, you will receive the answer your query is incorrect , you will get an error message or only see a dot ) the page. One point will be given for answer and one point for correct query command
Using the knowledge in computational language in SQL it is possible to write a code that using the in databases at the , perform the queries show belowFor each querytype.
Writting the code:Database: employee
Owner: SYSDBA
PAGE_SIZE 4096
Number of DB pages allocated = 270
Sweep interval = 20000
Forced Writes are ON
Transaction - oldest = 190
Transaction - oldest active = 191
Transaction - oldest snapshot = 191
Transaction - Next = 211
ODS = 11.2
Default Character set: NONE
Database: employee
Owner: SYSDBA
PAGE_SIZE 4096
...
Default Character set: NONE
See more about SQL at brainly.com/question/19705654
#SPJ1
Trade secrets _____. give a competitive edge give a competitive edge protect owners for 20 years protect owners for 20 years are secret company names are secret company names are products that generate profit
Trade secrets are confidential business information that give a competitive edge give a competitive edge.
What is a trade secret?Note that trade secret protection is one that gives people or their owners the right to hinder or stop an information lawfully and it is one that is said to be within their control and this it cannot be disclosed, acquired or used by any other person without their consent.
Conclusively, confidential business information are said to give an enterprise a competitive edge and it is said to be unknown to others and thus it is said to be protected as a trade secret.
Learn more about Trade secrets from
https://brainly.com/question/993315
One notable disadvantage of SaaS is that _____. Group of answer choices it is not scalable or flexible it increases the burden on the subscriber's IS department it requires the subscriber to create training materials it requires a stable Internet connection
Based on the Internet of Things analysis, one notable disadvantage of SaaS is that "it requires a stable Internet connection."
Definition of SaasSaas is the acronym for Software as a web-based service. It is a form of licensing and delivery standard that ensures software is licensed on a hub hosted services, usually on a subscription
Disadvantages of Saas include the following:Lack of security and transparencyLack of stability due to need for constant and good internet connectionConfidentiality concerns arise from data being exposed to a public network.
Hence, in this case, it is concluded that the correct answer is option D. "it requires a stable Internet connection."
Learn more about Saas here: https://brainly.com/question/25713693
A technician installed a known-good, compatible motherboard on a new laptop. However, the motherboard is not working on the laptop. Which of the following
should the technician MOST likely have done to prevent damage?
A. Removed all jewelry
B. Completed an inventory of tools before use
C. Practiced electrical fire safety
D. Connected a proper ESD strap
The technician should have connected an appropriate ESD strap in order to avoid harm.
Why is grounding a computer necessary?By achieving a balance of voltage between you and the computer, the process of grounding safely releases the charge to the earth. In conclusion, you must ground yourself to eliminate static accumulation rather than letting it harm your computer's components.
Why is it crucial to root oneself to the computer case before using it?By grounding yourself, you can stop your body from acting as a static electricity generator and damaging electronic components. Your fingertips' static can harm memory chips and other delicate computer components like microprocessors.
To know more about ESD visit:-
https://brainly.com/question/28516846
#SPJ1
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
Help is very much appreciated. Thank you for your time!
Answer: 266299 669922 292629 969622 Also just saying did you backup your files to the cloud? If not you can buy a usb-c flash drive or a lighting cable flashdrive. Best Luck.
Explanation:
Read the following code:
x = 1
(x < 26):
print(x)
x = x + 1
There is an error in the while loop. What should be fixed? (5 points)
Add quotation marks around the relational operator
Begin the statement with the proper keyword to start the loop
Change the parentheses around the test condition to quotation marks
Change the colon to a semicolon at the end of the statement
The given code snippet contains a syntax error in the while loop. To fix the error, the statement should be modified as follows:
x = 1
while x < 26:
print(x)
x = x + 1
The correction involves removing the parentheses around the test condition in the while loop. In Python, parentheses are not required for the condition in a while loop.
The condition itself is evaluated as a Boolean expression, and if it is true, the loop continues executing. By removing the unnecessary parentheses, the code becomes syntactically correct.
In Python, the while loop is used to repeatedly execute a block of code as long as a certain condition is true. The condition is evaluated before each iteration, and if it is true, the code inside the loop is executed. In this case, the code will print the value of the variable "x" and then increment it by 1 until "x" reaches the value of 26.
Therefore, the correct fix for the error in the while loop is to remove the parentheses around the test condition. This allows the code to execute as intended, repeatedly printing the value of "x" and incrementing it until it reaches 26.
For more questions on code
https://brainly.com/question/28338824
#SPJ11
HURRY GANG 100points!!!! How can you determine which hardware brands and models are the most reliable?
O read the information on the device's packaging
O find out how many of them are being sold per year
O read the manufacturer's website
O find customer reviews online
Answer: A, read the information on the device's packaging
Explanation:
The info in the packaging has to be accurate because it goes through tests and they cannot make up info on there. This means any info about the materials used is accurate.
Answer:
A. read the information on the device's packaging
Explanation:
Any information that's on packaging is made separately from the product manufacturers and needed to be checked and correct. If there is anything out of the ordinary on the device's packaging, then it is a good way to tell it's reliableness.
Write a method that turns some text into something Porky Pig would say.
To do that, you just need to add "Bdap bdap bb" to before the given text.
For example, if you called
porkyPig("that's all folks!"),
it would return
"Bdap bdap bb that's all folks!"
The method signature should be
public String porkyPig (String something)
To emulate Porky Pig's speaking pattern, define the public String porkyPig(String something) function to preface the given text with "Bdap bdap bb".
What's a good illustration of concatenation?The number created by concatenating the numerals of two or more numbers is known as a concatenation. For instance, the result of adding 1, 234 and 5678 is 12345678. The numeric base, which is normally understood from context, determines the value of the outcome.
Why do people use string concatenation?Concatenation of strings in Java is an operation that joins one or more strings and produces a new one. Concatenation can also be used to convert types to strings.
To know more about String visit:
https://brainly.com/question/15706308
#SPJ9
are most often used to create web pages and web applications
Answer: HTML CSS AND JS
Explanation: These programming languages are best well known for building webs HTML is for the skeleton basically and the CSS is for styling the JS is for cool interactions.
How to use the screen mirroring Samsung TV app
If you want to show what's on your phone or computer screen on a Samsung TV, you can do it by these steps:
Make sure both your Samsung TV and the thing you want to copy are using the same Wi-Fi.
What is screen mirroringThe step also includes: To get to the main menu on your Samsung TV, just press the "Home" button on your remote.
The screen mirroring is Copying or making a duplicate of something. They are repeating each other's words to try to fix the problem between them. This is the way to show what is on your computer or phone screen on another screen by using wireless connection.
Learn more about screen mirroring from
https://brainly.com/question/31663009
#SPJ1
Julia has recorded a new song. Which input device would she have used?
O A.
OB.
O C.
D.
keyboard
projector
sound card
microphone
Answer: Microphone
Explanation:
Expert Explanation:
Input devices are a piece of equipment used to provide data and control signals to an information processing system
Easy Explanation:
We use input devices for devices like microphones, but based on your choices, it is best to choose a microphone.
Please mark brainliest if this helped!
There are several possible reasons why a high percentage of IT projects are abandoned-the business strategy changed, technology changed, the project was not going to be completed on time or budget, the project sponsors responsible did not work well together, or the IT strategy was changed to cloud or SaaS.
a. True
b. False
Answer:
a. True
Explanation:
The above listed information are part of the reasons why so many IT projects are abandoned by the business entities after a given period of time frame.
Write a program that defines an object of type double. Define a pointer that points to that
object. Print the value of the pointed-to object by dereferencing a pointer.
Answer:
#include <iostream>
using namespace std;
int main()
{
//make a double
double object = 1.5;
//make a pointer
double* pointer;
//make the pointer point to address of the object
pointer = &object;
//print by dereferencing a pointer
cout<<*pointer;
return 0;
}
What do y’all think are the pros and cons to using technology?
Answer:
Explanation:
pros. convenient, easy to use, and educational cons. addictive, mentally draining, and creates a social divide.
Write the mostValuableNeighbor method, which compares the item in row r and column c to the items to its left and to its right. The method determines which of the three items has the greatest value and returns its name. If more than one of the values have a value that is greatest, then any of their names can be returned. If the item has no item to its left, it is compared only to the item to its right. If the item has no item to its right, it is compared only to the item to its left.
Answer:
Explanation:
The following method is written in Java, using the Item class and ItemGrid class found online we can use this method to grab the 2-dimensional array and compare the three neighbors in the same row. It saves the position of the neighbor with the greatest value in the variable greatest and then uses that position to call the getName() method from the object in that position to get the name of that Neighbor and returns the name.
public String mostValuableNeighbor(ItemGrid grid, int r, int c) {
int greatest = grid[r][c];
if (grid[r][c+1].getValue() > greatest.getValue()) {
greatest = grid[r][c+1];
}
if (grid[r][c-1].getValue() > greatest.getValue()) {
greatest = grid[r][c-1];
}
return greatest.getName();
}
In this exercise we have to use the knowledge of computational language in JAVA to write the code.
We have the code in the attached image.
The code in Java can be found as:
public String mostValuableNeighbor(ItemGrid grid, int r, int c) {
int greatest = grid[r][c];
if (grid[r][c+1].getValue() > greatest.getValue()) {
greatest = grid[r][c+1];
}
if (grid[r][c-1].getValue() > greatest.getValue()) {
greatest = grid[r][c-1];
}
return greatest.getName();
}
See more about JAVA at brainly.com/question/26104476
A technician is installing new power supplies for the application engineering team's workstations. The management team has not yet made a decision about installing dual graphics cards, but they want to proceed with the project anyway. Which of the following power supplies would provide the BEST solution?
Answer:
a
Explanation:
The 500W redundant power supply. is the most ideal decision, offering adequate power and reinforcement in the event of a power supply disappointment. Hence, option C is the right answer.
Which of the following power supplies would provide the best solution?The BEST answer for the professional to install new power supplies for the application engineering team's workstations would be choice C: 500W redundant power supply.
A 1000W 24-pin measured power supply might be unreasonable for the workstations, possibly prompting failures and higher power utilization.
A 220VAC 9000J flood defender isn't a power supply; it just safeguards against voltage spikes.
A 2000VA uninterruptible power supply (UPS) may give reinforcement power in the event of blackouts, however, it isn't guaranteed to address the requirement for dual graphics cards.
The 500W repetitive power supply offers adequate power limits with respect to the workstations and overt repetitiveness, guaranteeing persistent activity regardless of whether one power supply falls flat. This considers potential double illustration cards from here on out, settling on it as the most reasonable decision for the task.
Learn more about power supply here:
https://brainly.com/question/29979352
#SPJ2
What free website can you record videos on, and edit them without money?
Answer:
You can edit videos on Capcut for free and I think you can also use Alightmoon
Answer:
You can edit videos using this application called Kinemaster.
Explanation:
After recording the video download Kinemaster available on Playstore and App store
what privacy risks do new technologies present,
and how do we decide if they're worth it?
Answer:
Los riesgos de las nuevas tecnologías se multiplican a medida que nos hacemos dependientes de ellas. También lo hacen a medida que sustituyen a otras formas de contacto social más cercanas
Los riesgos de las nuevas tecnologías son grandes desconocidos. El mal uso de las redes sociales y de Internet en los ordenadores y en el teléfono móvil, entre otros factores, supone un peligro real para todos los estratos de población, pero en especial para los más jóvenes. Pensemos, ¿realmente somos conscientes de los riesgos que suponen las nuevas tecnologías? ¿Sabemos cómo utilizarlas para no ponernos en riesgo?
Cabe destacar que las denominadas nuevas tecnologías de la información y de la comunicación (TICs) son un distintivo de la época actual y se han convertido en herramientas esenciales en las diferentes áreas de la vida. Esto es, para el área académica, laboral, social, de ocio…
En la mayoría de los ámbitos están presentes las TICS, pues incluyen las diferentes herramientas con las que nos manejamos hoy en día: servicios de contacto electrónico (e-mails, servicios de mensajería instantánea, chats), los teléfonos móviles, tablets y ordenadores, las plataformas online de difusión de contenidos, las redes sociales, entre otros..
Explanation:
Please help if you have the correct answer to the post test manufacturing and safety answer.
——— is a form of semi-renewable energy that you can produce from agricultural feedstock. It can be made from common crops
such as sugarcane, potato, manioc, and corn. It does not completely replace gasoline as a fuel because of efficiency, food, and environmental
concerns.
Answer:
ethanol
Explanation:
got it right on ed
In Coral Code Language - A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-life of about 6 hours in humans. Given the caffeine amount (in mg) as input, output the caffeine level after 6, 12, and 18 hours.
Ex: If the input is 100, the output is:
After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
Note: A cup of coffee has about 100 mg. A soda has about 40 mg. An "energy" drink (a misnomer) has between 100 mg and 200 mg.
To calculate the caffeine level after 6, 12, and 18 hours using the half-life of 6 hours, you can use the formula:
Caffeine level = Initial caffeine amount * (0.5 ^ (time elapsed / half-life))
Here's the Coral Code to calculate the caffeine level:
function calculateCaffeineLevel(initialCaffeineAmount) {
const halfLife = 6; // Half-life of caffeine in hours
const levelAfter6Hours = initialCaffeineAmount * Math.pow(0.5, 6 / halfLife);
const levelAfter12Hours = initialCaffeineAmount * Math.pow(0.5, 12 / halfLife);
const levelAfter18Hours = initialCaffeineAmount * Math.pow(0.5, 18/ halfLife);
return {
'After 6 hours': levelAfter6Hours.toFixed(1),
'After 12 hours': levelAfter12Hours.toFixed(1),
'After 18 hours': levelAfter18Hours.toFixed(1)
};
}
// Example usage:
const initialCaffeineAmount = 100;
const caffeineLevels = calculateCaffeineLevel(initialCaffeineAmount);
console.log('After 6 hours:', caffeineLevels['After 6 hours'], 'mg');
console.log('After 12 hours:', caffeineLevels['After 12 hours'], 'mg');
console.log('After 18 hours:', caffeineLevels['After 18 hours'], 'mg');
When you run this code with an initial caffeine amount of 100 mg, it will output the caffeine levels after 6, 12, and 18 hours:
After 6 hours: 50.0 mg
After 12 hours: 25.0 mg
After 18 hours: 12.5 mg
You can replace the initialCaffeineAmount variable with any other value to calculate the caffeine levels for different initial amounts.
for similar questions on Coral Code Language.
https://brainly.com/question/31161819
#SPJ8
PLEASE QUICK IM TIMED.
Write a program that assigns the value 14 to a variable. Then print out the type of the variable. What will the output of the program be?
This is for Python
Code:
variable = 14
print(type(variable))
Output:
<class 'int'>
Diversity in the workplace is also represented by four different generations. Name and explain the characteristics of each generations.
The Names and explanation of the characteristics of each generations is given below.
What is the Diversity about?They are:
Traditionalists/Silent Generation (Born before 1946): This generation grew up during times of economic depression and war, and they tend to value hard work, loyalty, and respect for authority. They are known for their strong work ethic, discipline, and adherence to rules and traditions. They may have a more conservative approach to technology and may prefer face-to-face communication. Traditionalists value stability, loyalty, and are typically motivated by a sense of duty and responsibility.
Baby Boomers (Born between 1946 and 1964): This generation witnessed significant social and cultural changes, such as the civil rights movement and the Vietnam War. They are often characterized by their optimistic and idealistic outlook, and they value teamwork, collaboration, and personal fulfillment in the workplace. Baby Boomers are known for their dedication to their careers and may have a strong work-life balance perspective. They may prefer phone or email communication and are generally motivated by recognition, promotions, and financial rewards.
Generation X (Born between 1965 and 1980): This generation grew up in a time of economic instability and rapid technological advancement. They are known for their independence, adaptability, and self-reliance. Generation X tends to value work-life balance, flexibility, and autonomy in the workplace. They may prefer digital communication methods, such as email or instant messaging, and are generally motivated by opportunities for growth, learning, and work-life integration.
Lastly, Millennials/Generation Y (Born between 1981 and 1996): This generation came of age during the digital revolution and globalization. They are known for their tech-savviness, diversity, and desire for meaningful work. Millennials value work-life balance, flexibility, and social responsibility in the workplace. They prefer digital communication methods, such as text messages or social media, and are motivated by opportunities for career advancement, purpose-driven work, and work-life integration.
Read more about Diversity here:
https://brainly.com/question/26794205
#SPJ1
When does information become a liability for an organization
Answer:
A. When it is not managed properly
Explanation:
when stuff is not mananged as it should then it becomes a liablilty
Create a dice game that randomly “rolls” five dice for the computer and five dice for the player. After each random roll, store the result in a computer dice roll list and player dice roll list. The application displays all the values, which can be from 1 to 6 inclusive for each die. Decide the winner based on which player had the largest number of matching dice. For this game, the numeric dice values do not count. For example, if both the player and computer have three of a kind, it is a tie, no matter what the values of the three dice are.
Be sure to review the provided links on generating random integers, and using the Python count() function, as both will be used in this program. To assist you, pseudocode has been provided. Download the file DiceGamePseudocode.py and follow the pseudocode to complete the program.
Program 2 requirements:
The program generates and stores five random dice values each for the player and computer
The program determines the largest number of matching dice for the player and computer
The program displays the dice values for the player and computer
The program displays the largest number of matching dice for the player and computer
The program uses a decision structure to display a message indicating who won the game
And please follow the pseudocode!
The Python program that can be able to implements the dice game based on the things that are given in the pseudocode is given below.
What is the dice game about?This python code is known to be program that tends to bring about or make as well as stores five random dice values for the people that is both the player as well as computer using list comprehensions.
Therefore, it is one that tends to make use the max() function along with the key parameter that is known to be set to the count() method to be able to find the most frequent dice value for all of the player as well as the computer.
Hence The program also shows the dice values as well as the number of matching dice for all of the player.
Learn more about dice game from
https://brainly.com/question/30028788
#SPJ1
What is a catalyst? a chemical found in leaves a chemical which promotes a chemical reaction a chemical which reacts with sunlight a cell with chlorophyll
Answer:
a chemical which promotes a chemical reaction
Explanation:
this is the right answer. please mark me as brainiest
what is it with the order of operations
Answer:
PEMDAS
P-Parenthesis
E-Exponents
M-multiplication
D-division
A-Addition
S-Subtraction
Explanation:
This is the best way to remember the order of operations. It tells us the order that we should take to solve multiple step equations like (3+3)+8.
We would solve inside the parenthesis since its first in line and then add 8
TRUE or FALSE.
2.1 Information is a collective term used for words, numbers, facts,
Answer:
true
Explanation:
Because it is the very best way
What is your biggest concern when it comes to purchasing a used phone or laptop?
Answer:
quality
Explanation:
if i know about the phone or laptop quality and quantity then i can know which is important if i buy.
i can give you example by laptop. For example i want to get buy laptop. i should know about the quantity and quality. then if i choose quantity i can buy so many laptops if they are more than 3 laptops and i get it in low price. then i take it and i try to open the laptops for some other thing to do but they cant opened so it means it has lowest quality.
and if i choose the quality. may be i can't buy more than 1 laptops but the qulaity of the laptops is high so when i open the laptop it opened
Notequality is the superiority or the quality level of a things.
quantity is the abundance or the quantity level of a thing
Debbie can use the feature in the email to copy her manager on the email without her colleague knowing she did so