Explain afew of the different ways in which computers can be categorised

Answers

Answer 1
Computers are classed in a variety of ways, including size, function, and processing capacity.

Related Questions

What is the difference between a baseline and an objective?

A baseline is a start, and an objective is an ending.

A baseline is measurable, and an objective is not measurable.

A baseline is a start, and an objective shows progression.

A baseline is a benchmark, and an objective is an ending.

Answers

The difference between a baseline and an objective is a baseline is a start, and an objective is an ending. Therefore, option A is correct.

What is the objective of baseline?

Regardless of the study topic, a baseline study is a descriptive cross-sectional survey that primarily offers quantitative data on the current condition of a specific situation in a given population. It seeks to quantify how various variables are distributed over time within a study population.

A baseline is a constant point of comparison that is employed in comparison studies. In business, a project's or product's success is frequently evaluated in comparison to a baseline figure for expenses, sales, or any other number of factors. A project may go over or under its predetermined benchmark.

Thus, option A is correct.

To learn more about the objective of baseline, follow the link;

https://brainly.com/question/15018074

#SPJ1

Grayson is creating a program to keep track of how much money he earns and spends each week.he earns and spends each week. He wants to know if he has enough for ice cream? What data should he use to store his answer

Answers

Since Grayson uses a program that allows him to keep track of how much money he earns and spends each week. The type of data that will be used to give him the answer to the question is option A: "Boolean".

What is the program  about?

A Boolean variable can hold only two values: true or false.

He can use a conditional statement to check if the amount of money he has left over after subtracting his expenses from his earnings is greater than or equal to the cost of the ice cream. If it is, he can set the Boolean variable to "True", indicating that he has enough money for ice cream. If it is not, he can set the Boolean variable to "False", indicating that he does not have enough money.

Therefore, Grayson can compare the value of his remaining money to the cost of the ice cream, if the remaining money is greater than or equal to $4, he can set the Boolean variable to "True" which means he has enough money.

Learn more about program from
https://brainly.com/question/24613235

#SPJ1

See full question below

Grayson uses a program that allows him to keep track of how much money he earns and spends each week. Which type of data will be used to give him the answer to the following question?

"Do I have $4 to buy ice cream?"

Boolean

Images

Numbers

Text

Create a program for the given problems using one-dimensional array. Program to identify if the input number is odd or even.​

Answers

Answer:

Here's an example of a simple program in Python that uses a one-dimensional array to determine if a given number is odd or even:

def check_odd_even(arr):

   for i in range(len(arr)):

       if arr[i] % 2 == 0:

           print(str(arr[i]) + " is even")

       else:

           print(str(arr[i]) + " is odd")

# Example usage

numbers = [1, 2, 3, 4, 5, 6, 7]

check_odd_even(numbers)

The program defines a function check_odd_even that takes an array of numbers as an input. It then iterates over the array, checking the remainder of each number when divided by 2. If the remainder is 0, the number is even, if not then it is odd. The program then prints whether each number is even or odd.

You can input any array you want, of any lenght, and the function will work the same way.

Keep in mind that you can also check the parity in another ways, like using bitwise operation.

Explanation:

Write a Java program for user defined exception that checks the internal and external marks; if the internal marks is greater than 30 it raises the exception “Internal mark exceeded”; if the external marks is greater than 70 it raises the exception and displays the message “External mark exceeded”, Create the above exception and test the exceptions.

Answers

Answer:

class MarksException extends Exception {

   public MarksException(String message) {

       super(message);

   }

}

public class Main {

   public static void main(String[] args) {

       try {

           checkMarks(35, 80);

       } catch (MarksException e) {

           System.out.println(e.getMessage());

       }

   }

   public static void checkMarks(int internal, int external) throws MarksException {

       if (internal > 30) {

           throw new MarksException("Internal mark exceeded");

       }

       if (external > 70) {

           throw new MarksException("External mark exceeded");

       }

   }

}

Explanation:

explain the fundamental Components of a Programming Language
can u answer in 8 lines

Answers

Answer:

1. Syntax: Syntax is the structure of a programming language which includes rules for constructing valid statements and expressions.

2. Data Types: Data types are used to define the type of data that is stored in a variable.

3. Variables: Variables are used to store data values.

4. Operators: Operators are used to perform operations on variables and values.

5. Control Structures: Control structures are used to control the flow of a program.

6. Functions: Functions are used to group related code into a reusable block.

7. Libraries: Libraries are collections of functions and data structures that can be used in a program.

8. Comments: Comments are used to document code and make it easier to understand.

Explanation:

Which learners like to be outside and are good at preservation, conservation, and organizing a living area?

Answers

A naturalistic learner likes to be outside and is good at preservation, conservation, and organizing a living area The correct option is a.

What is a naturalistic learner?

Naturalistic Learners are students who have strengths in intelligence related to nature. They may be highly connected to nature in many ways: They may have a deep love of plants, animals, people, rocks, nature, being outdoors, camping, hiking, rock climbing, biology, astrology, dinosaurs, etc

Naturalistic learners enjoy nature and being outside, as the name suggests. They learn best outside and can easily connect with concepts centered on plants, animals, and the environment.

Therefore, the correct option is a, naturalistic learner.

To learn more about naturalistic learner, visit here:

https://brainly.com/question/8233227

#SPJ1

The question is incomplete. Your most probably complete question is given below:

naturalistic learner

kinesthetic learners

visual learners

aural Learners

Flowchart of Accepts as input the mass, in grams, and density, in grams per cubic centimeters, and outputs the volume of the object using the formula: density 1⁄4 mass / volume.

Answers

Below is a simple flowchart that shows the process of calculating the volume of an object using its mass and density:

       +-----------------------------+

       |     Input: Mass (m),        |

       |     Density (d)             |

       +-----------------------------+

                |

                |

       +-----------------------------+

       |   Volume = Mass / Density   |

       +-----------------------------+

                |

                |

       +-----------------------------+

       |    Output: Volume (v)       |

       +-----------------------------+

What is the Flowchart   about?

The flowchart I provided shows the basic process of calculating the volume of an object using its mass and density. The process starts with the input of the object's mass and density. The mass is typically given in grams and the density is given in grams per cubic centimeter.

The next step is to calculate the volume of the object. This is done by using the formula for density, which states that density is equal to mass divided by volume. So, to find the volume, we divide the mass of the object (in grams) by its density (in grams per cubic centimeter). This formula can be written as:

volume = mass / density

Finally, the calculated volume is then output, which is typically given in cubic centimeters.

Note that:

density = mass/volume.

Density = mass / volume

Learn more about Flowchart  from

https://brainly.com/question/6532130

#SPJ1

Which of the following statements is a possible explanation for why open source software (OSS) is free? A. OSS makes money by charging certain large corporations for licenses. B. OSS is typically lower quality than proprietary software. C. The OSS movement wants to encourage anyone to make improvements to the software and learn from its code. D. The OSS movement is funded by a private donor so it does not need to charge for its software licenses.

Answers

The statement that represents a possible explanation for why open-source software (OSS) is free is as follows:

The OSS movement is funded by a private donor so it does not need to charge for its software licenses.

Thus, the correct option for this question is D.

What is open-source software?

Free and open-source software (FOSS) is a term used to refer to groups of software consisting of both free software and open-source software where anyone is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared so that people are encouraged to voluntarily improve.

Open-source software (OSS) is computer software that is released under a license in which the copyright holder grants users the rights to use, study, change, and be marked by the user for a specific purpose in order to perform particular functions.

Therefore, the correct option for this question is D.

To learn more about Open-source software, refer to the link:

https://brainly.com/question/15039221

#SPJ1

Which benefits does the cloud provide to start-up companies without acccess to large funding

Answers

Answer:Among other things, the fact that anyone can connect to such a server from their home and work on something remotely

Explanation:

Which of the following components could you add to your network rec to help protect your servers from brown outdoor blackouts an ethernet switch patch panel

Answers

Assuming your local area experiences brownouts or blackouts during frequent electrical storms. A component which you could add to your network rack to help protect your servers from brownouts or blackouts include the following: A. UPS.

What is a UPS?

In Computer technology, UPS is an abbreviation for Uninterrupted Power Supply and it can be defined as a device that is designed and developed to with an enhanced battery system, in order to allow a computer and other electrical devices to keep running and functioning for at least a short time in the event of a power disruption or when the incoming (input) power is interrupted.

Generally speaking, a short-term decrease in electrical power availability is typically referred to as a ​brownout.

In order to protect a network equipment such as a router, server, or switch from brownouts or blackouts during frequent electrical storms, you must add an Uninterrupted Power Supply (UPS) to your network rack.

Read more on power here: https://brainly.com/question/23438819

#SPJ1

Complete Question:

Your local area experiences brownouts or blackouts during frequent electrical storms. Which of the following components could you add to your network rack to help protect your servers from brownouts or blackouts?

UPS

Ethernet switch

Patch panel

Wireless controller

Use routers, Switches and Hubs to design a simple network for Maendeleo Institute of Technology having 240 employees. The Institute has five departments: Computer Science has 100 employees, Information Technology 60 employees, Accounts 40 employees, Human Resource has 20 employees and Marketing has 20 employees.

Required:

• Network topology showing five network that corresponds to five departments.

• Use Class C IP addresses (example 192.168.10.0/24) to show the subnet ID and broadcast ID of each department, the IP address must not overlap

• Consider Scalability

• Give reasons for your choice/ decisions

Answers

Answer:

To design a simple network for Maendeleo Institute of Technology with 240 employees, we could use a combination of routers, switches, and hubs.

Our network would consist of five separate networks, one for each department at the institute. We would use class C IP addresses, with a subnet mask of /24, to create the following subnets:

Computer Science department: 192.168.10.0/24

Information Technology department: 192.168.11.0/24

Account department: 192.168.12.0/24

Human Resource department: 192.168.13.0/24

Marketing department: 192.168.14.0/24

Each department would be connected to the network via a switch, which would allow for communication within the department and with other departments as needed. A router would be used to connect the individual department networks to the wider internet, and would also serve as a firewall to protect the network from external threats.

We would also include a hub in the network to allow for communication between devices within a department, as well as to provide additional connectivity and scalability.

Overall, our network design would provide each department with its own separate network, with the ability to communicate with other departments as needed. It would also be scalable, allowing for the addition of new devices and departments as the institute grows. The use of class C IP addresses and a /24 subnet mask would ensure that IP addresses do not overlap, ensuring efficient and reliable communication within the network.

Code to be written in python:
Correct answer will get brainliest :)

Mr Wu has been going to work every day by taxi for many years. However, the taxi fare has been increasing rather quickly in recent years. Therefore, he is considering driving to work instead. One of the costs for driving is the parking fee. The parking rates of the car park at Mr Wu's workplace are as shown as below:

Weekdays:
$2 per hour between 4am and 7am
$1.20 per half hour between 7am and 6pm
$5 per entry after 6pm

Saturdays:
$2.50 per hour between 4am and 7am
$1.50 per half hour between 7am and 6pm
$7 per entry after 6pm

Sunday: Flat rate of $5 per entry

For all days, there is a grace period of 10 minutes.
The car park opens between 4am and 12 midnight daily. We assume vehicles are magically ejected at midnight.
There is a 10% surcharge on weekdays and a 20% surcharge on Saturdays for vehicles who park for more than 10 hours. There are no surcharges on Sunday.
There is an additional fee of $3 for exiting after 10pm on any day.
Your task is to write a function compute_fee(day, time_in, time_out) that computes the parking fee, where day is an integer between 1 and 7, with 7 representing Sunday, while time_in and time_out are integer values in a 24-hour format - e.g. 700 for 7am and 2359 for 11:59pm. Assume all input is valid.


Below are a few examples of how the fee is calculated:



Example 1: Tuesday, 4:29am to 7:50am.

• 4:29am to 7am is charged as 3 1-hour slots: $2.00 * 3 = $6.00

• 7am to 7:50am is charged as 2 30-minute slots: $1.20 * 2 = $2.40

• Total fee = $6.00 + $2.40 = $8.40



Example 2: Saturday, 7:01am to 7:49pm.

• 7:01am to 6pm is charged as 22 30-minute slots: $1.50 * 22 = $33.00

• 6pm to 7:49pm is charged as one entry: $7.00

• 20% Surcharge for parking more than 10 hours: ($33.00 + $7.00) * 20% = $8.00

• Total fee = $33.00 + $7.00 + $8.00 = $48.00


Example 3: Sunday, 3pm to 10:01pm.

• 3pm to 10:01pm is charged as one entry: $5.00

• Additional fee for exiting after 10pm: $3.00

• Total fee = $5.00 + $3.00 = $8.00


Example 4: Thursday, 11:49pm to 11:59pm.

• Grace period

• Total fee = $0.00


Example 5: Monday, 12pm to 10:01pm.

• 12pm to 6pm is charged as 12 30-minute slots: $1.20 * 12 = $14.40

• 6pm to 10:01pm is charged as one entry: $5.00

• 10% Surcharge for parking more than 10 hours: ($14.40 + $5.00) * 10% = $1.94

• Additional fee for exiting after 10pm: $3.00

• Total fee = $14.40 + $5.00 + $1.94 + $3.00 = $24.34

def compute_fee(day, time_in, time_out):
"""Your code here"""

Test Cases:
compute_fee(2, 429, 750) 8.4
compute_fee(6, 701, 1949) 48
compute_fee(7, 1500, 2201) 8
compute_fee(4, 2259, 2301) 0
compute_fee(1, 1200, 2201) 24.34

Answers

Here is the requested Python function that computes the parking fee based on the given information:

These tools protect networks from external threats.

A) firewalls
B) routers
C) antivirus software
D) VPN

Answers

Answer:

for safety everyone is needed, read the explanation

Explanation:

These tools protect networks from external threats.

A) firewalls

B) routers

C) antivirus software

D) VPN

the firewall, which can be installed in the pc but some routers also have it.

An antivirus is certainly needed, an antimalware is missing from the list, which is essential, for the VPN it is also useful to make believe you are connected in one place and instead you are in another, so I would say that all are needed for PC security

Match each characteristic to its operating system.

[A] This system can be ported to more computer platforms than any of its counterparts.
[B] The operating system functions require many system resources.
[C] The operating system works only with specific hardware.

[1] Microsoft Windows Operating System
[2] Linux Operating System
[3] Apple Operating System

Answers

Answer:

[A] This system can be ported to more computer platforms than any of its counterparts. - [2] Linux Operating System

[B] The operating system functions require many system resources. - [1] Microsoft Windows Operating System

[C] The operating system works only with specific hardware. - [3] Apple Operating System

explain the steps to adding a password in Smart Art

Answers

Answer:

To add a password to a SmartArt graphic in Microsoft PowerPoint, follow these steps:

Open the PowerPoint presentation containing the SmartArt graphic that you want to add a password to.

Select the SmartArt graphic by clicking on it.

In the ribbon at the top of the window, click the "Format" tab.

In the "Format" tab, click the "Security" button.

In the "Security" dialog box that appears, click the "Password" tab.

In the "Password" tab, enter a password in the "Password" field.

Re-enter the password in the "Confirm password" field to confirm it.

Click the "OK" button to save the password.

Save the presentation. The SmartArt graphic will now be protected with the password that you set. You will need to enter the password to edit or modify the SmartArt graphic.

What type of light comes from reflections off other objects?

Answers

Light that comes from reflections off other objects is called reflected light.

Write the Holiday Date of the following holidays:
1. Bonifacio Day –
2. Christmas Day –
3. Rizal Day –
4. Day of Valor –
5. Labor Day –
6. Independence Day –
7. New Year’s Day –
8. People Power Day –
9. Ninoy Aquino Day –
10. All Saint’s Day –

Answers

Answer:

1. November 30

2. December 25

3. December 30

4. April 9

5. September 1

6. (depends)

7. January 1

8. February 25

9. August 21

10. November 1

Explanation:

How did the case Cubby v. CompuServe affect hosted digital content and the contracts that surround it?

Answers

Although CompuServe did post libellous content on its forums, the court determined that CompuServe was just a distributor of the content and not its publisher. As a distributor, CompuServe could only be held accountable for defamation if it had actual knowledge of the content's offensive character.

What is CompuServe ?

As the first significant commercial online service provider and "the oldest of the Big Three information services," CompuServe was an American company. It dominated the industry in the 1980s and continued to exert significant impact into the mid-1990s.

CompuServe serves a crucial function as a member of the AOL Web Properties group by offering Internet connections to budget-conscious customers looking for both a dependable connection to the Internet and all the features and capabilities of an online service.

Thus,  CompuServe could only be held accountable for defamation if it had actual knowledge of the content's offensive character.

To learn more about CompuServe, follow the link;

https://brainly.com/question/12096912

#SPJ1

python best hashing algorithm for passwords with mysql

Answers

Answer: So you Wait a minute I do believe that mysql is a sql cracking suit but you would need to build a hashing suit or you could use passlib.hash.mysql41 so you are looking to crack some stuff ok look at the file I sent.

Explanation:

technology helps to produce, manipulate, store, communicate, and/or disseminate information. a. Computer b. Nano c. Communication d. Information O O ​

Answers

The technology that helps to produce, manipulate, store, communicate, and/or disseminate information are:

a. Computer

b. Communication

d. Information

What is the technology  about?

Computer technology helps to produce, manipulate, store, and communicate information through various software and hardware.

Communication technology helps to disseminate information through various means of communication such as phone, internet, radio, and television.

Therefore, Information technology encompasses all technologies used to handle and process information, including computer and communication technology.

Learn more about Communication from

https://brainly.com/question/26152499

#SPJ1

70 POINTS!!!!
what is the importance of genders in computer science
give at least 3 complete paragraphs
PLS answer correctly...i will mark u as brainlyst!!!!!

Answers

Answer:

Explanation:

The biggest question now is how do we attract more women into the computer science field. Women need more encouragement, especially from teachers of both sexes and fellow students. Mentoring is a definite means to attract and keep women more interested in the field. Even just the support of other females present in a classroom setting can help boost the confidence in each other. Multiple studies have shown that the lack of women in computer science is very likely to start before college (Cohoon). They need this encouragement not only while taking college courses but also early on in their education. Females tend to be just as interested in science as men when they are young but their teachers and schools, who would have the most influence on them, aren’t doing their job in nurturing and identifying these women (Gurian). A possible solution to improving their confidence would be to have more mentors who can help attract and keep women interested in the field. The shortage of women in the computer science field has made it more difficult to have women in high positions. This makes it important for women who are in high positions to be mentors to all women interested. According to Joanne Cohoon a professor at the University of Virginia “CS departments generally retained women at comparable rates to men when the faculty included at least one woman; was mentored, and supervised female students; enjoyed teaching; and shared responsibility for success with their students”. It is also found that departments with no female faculty lost female students at high rates relative to men (Cohoon). Seeing other women in computer science can definitely raise confidence in women to continue or begin studying the subject. “In a new survey, 40 percent of women in the STEM fields… report that they were discouraged from their career choices, typically in college and often by their professors” (Downey). This data shows how we need more mentors willing to support women and that we are lacking teachers to help inspire young women into entering the field.

Since the beginning of computing most software and programs have been male-oriented. Video games were originally targeted at males with sport and violent themes with mostly male lead characters and limiting female roles like women who need to be rescued (Lynn). Early experiences with computers are important in shaping someone’s willingness to explore technology. “Playing with computer, console, and arcade games and educational ware can provide an introduction to computer literacy, creating familiarity and building confidence in skills” (Lynn, 145). Because computer science is so dominated by men, the software tends to be more male- friendly. To make software more appealing to girls, it should have low frustration levels, be challenging and be interactive (Lynn). By having more women in the field, women can create much more women-friendly software. Girls tend to prefer games where they can make things, rather than destroy them(Lynn). Recently more and more games have been produced that are more girl-friendly, like simulation games. The Sims is a video game where you create humans, animals and homes and has proved to be a big success with a female audience. A strategy to get more women to break outside the stereotype of women being less competitive than men would be to take games designed for boys and demand comparable female characters to empower them to be more competitive and assertive. Video games often become involved with computing as a byproduct of wanting to master gaming (Lynn).

Many boys tend to have more experience with computers at a younger age because of video games, when boys and girls are put together in a class to learn about computers the boys are already at a higher level, which is not encouraging to the women beginning at a lower level in the same class. Making more computer classes mandatory both in high school and at the college level will not only help women because of the increasing number of other female peers, but it can spark interest in women early on, helping teachers to identify students with aptitude.

Which of the following are numbers and text that do not change unless manually altered?
equal sign
references
constants
mathematical operators

Answers

Answer:

constants are numbers and text that do not change unless manually altered.

Answer: c

Explanation:

Code to be written in Python
Will award brainliest automatically if correct!

Suppose that you have a list of numbers, and you need to normalize the list, i.e., the sum of all numbers in the list is equal to 1.

Tam came out with an implementation:

def normalize(lst):
s = sum(lst)
return list(map(lambda v: v / s, lst))


This code works correctly for normalize([1, 2, 5, 4]) but fails for normalize([1, 2, -7, 4]). What causes the second test case to fail?

Find out the error message and keep the list as it is when the error occurs by simply return the list. So without modifying the normalize function, implement this strategy in the safe_normalize function. Complete safe_normalize. You may assume that the normalize function has already been defined for you.

def safe_normalize(lst):
# handle the error
return normalize(lst)

Test Cases:

safe_normalize([1, 2, 2, 3]) [0.125, 0.25, 0.25, 0.375]
safe_normalize([1, 2, -5, 2]) [1, 2, -5, 2]

Answers

PYTHON

Here is an implementation of the safe_normalize function that catches the error and returns the original list if an error occurs:

def safe_normalize(lst):

try:

return normalize(lst)

except ZeroDivisionError:

return lst

This function calls the normalize function, which takes a list as input and returns a normalized list. However, if an error occurs (in this case, a ZeroDivisionError), the function will catch the error and return the original list instead.

To test the safe_normalize function, you can use the following test cases:

print(safe_normalize([1, 2, 2, 3])) # Expected output: [0.125, 0.25, 0.25, 0.375]

print(safe_normalize([1, 2, -5, 2])) # Expected output: [1, 2, -5, 2]

The first test case should return the normalized list, while the second test case should return the original list, since the normalize function would fail with a ZeroDivisionError if passed a list with a negative sum.

Hope This Helps You!

Code to be written in python:
Correct code will automatically be awarded the brainliest

You had learnt how to create the Pascal Triangle using recursion.

def pascal(row, col):
if col == 1 or col == row:
return 1
else:
return pascal(row - 1, col) + pascal(row - 1, col - 1)

But there is a limitation on the number of recursive calls. The reason is that the running time for recursive Pascal Triangle is exponential. If the input is huge, your computer won't be able to handle. But we know values in previous rows and columns can be cached and reused. Now with the knowledge of Dynamic Programming, write a function faster_pascal(row, col). The function should take in an integer row and an integer col, and return the value in (row, col).
Note: row and col starts from 1.

Test Cases:
faster_pascal(3, 2) 2
faster_pascal(4, 3) 3
faster_pascal(100, 45) 27651812046361280818524266832
faster_pascal(500, 3) 124251
faster_pascal(1, 1) 1

Answers

Answer:

def faster_pascal(row, col):

   # Create a list of lists to store the values

   table = [[0 for x in range(col + 1)] for x in range(row + 1)]

 

   # Initialize the first row

   table[1][1] = 1

 

   # Populate the table

   for i in range(2, row + 1):

       for j in range(1, min(i, col) + 1):

           # The first and last values in each row are 1

           if j == 1 or j == i:

               table[i][j] = 1

           # Other values are the sum of values just above and left of the current cell

           else:

               table[i][j] = table[i-1][j-1] + table[i-1][j]

 

   # Return the required result

   return table[row][col]

print(faster_pascal(3, 2))

print(faster_pascal(4, 3))

print(faster_pascal(100, 45))

print(faster_pascal(500, 3))

print(faster_pascal(1, 1))

Brainliest if this helps! :))

Hi, I have a CodeHS Python assignment called "Exclamation Points"


the assignment is as follows and I have no idea where to start with this if someone could help me please:


"Words are way more edgy when you replace the letter i with an exclamation point!


Write the function exclamations that takes a string and then returns the same string with every lowercase i replaced with an exclamation point. Your function should:


Convert the initial string to a list

Use a for loop to go through your list element by element

Whenever you see a lowercase i, replace it with an exclamation point in the list

Return the stringified version of the list when your for loop is finished"

Answers

Using the knowledge in computational language in python it is possible write the function exclamations that takes a string and then returns the same string with every lowercase i replaced with an exclamation point.

Writting the code;

my_string = input("Enter text: ")

my_list = list(my_string)

for item in my_list:

   if item == "i":

       print "!"

       my_list.remove("i")

   print item

(" ").join(my_list)

my_string = list(input('Enter string: '))

for i, char in enumerate(my_string):

   if char == 'i':

       my_string[i] == '!'

print(''.join(my_string))

my_string = input("Enter text: ")

my_list = list(my_string)

for item in my_list:

   if item == "i":

       print "!"

       my_list.remove("i")

   else:

       print item

(" ").join(my_list)

See more about python at  brainly.com/question/18502436

#SPJ1

Which option is considered hardware and is designed by computer
engineers?
O A. The operating system that runs a computer
OB. A computer's processors and circuit boards
OC. Networks that connect computers
D. Game and web applications

Answers

Hardware includes components like circuit boards and CPUs, which are created by computer experts.

Hardware definition and examples.

Computer: Any component of the computer that we can touch is referred to as hardware. These are the main electronic components that go into making a computer. The Processor, Memory Devices, Monitor, Printer, Keyboard, Mouse, and Central Processing Unit are a few examples of hardware in a computer.

How do software and hardware differ?

Any physical component of a computer is referred to as hardware. This includes hardware like monitors and keyboards as well as components found within gadgets like hard drives and microchips. Software, which includes computer programs and mobile apps, is anything that instructs hardware on what to do and how to accomplish it.

To learn more about hardware visit:

brainly.com/question/15232088

#SPJ1


3. Describe how homes and businesses use networks.

Answers

Homes and Businesses use networks because it can help you better to find customers and staff and suppliers and business partners. Homes and Businesses also use network when it comes to conferences and you can also communicate through apps using the network.
There are many ways that homes and businesses use networks. Here are a few examples:

1. Home networks: Many homes have a local area network (LAN) that connects all of the devices in the home, such as computers, printers, and smartphones. This allows people to share resources, such as files, printers, and internet access.
2. Business networks: Businesses often have a more complex network setup, with a LAN that connects all of the devices in the office, as well as a wider area network (WAN) that connects multiple offices in different locations. This allows employees to share resources and communicate with each other, no matter where they are located.
3. The Internet: Both homes and businesses use the internet to connect to the rest of the world. This allows them to access a wide range of information and services, as well as communicate with people all over the globe.
4. Cloud computing: Many businesses and even some homes are using cloud computing, which allows them to store and access data and applications over the internet, rather than on a local server or computer. This can be more convenient and cost-effective, as it reduces the need for expensive hardware and IT staff.
5. Internet of Things (IoT): Both homes and businesses are using networks to connect a variety of devices that make up the Internet of Things (IoT). This includes things like smart thermostats, security cameras, and appliances that can be controlled and monitored over the internet.

Read the excerpt below from the play Antigone by Sophocles and answer the question that follows.



ANTIGONE:
I did not think
anything which you proclaimed strong enough
to let a mortal override the gods
and their unwritten and unchanging laws.
They’re not just for today or yesterday,
but exist forever, and no one knows
where they first appeared.



What does the passage reveal about the beliefs of the ancient Greeks?
A. Some believed humans were the ultimate authority.
B. Some believed women were the ultimate authority.
C. Some believed men were the ultimate authority.
D. Some believed the gods were the ultimate authority.

Answers

Answer:

D. Some believed the gods were the ultimate authority.

Explanation:

What is the main difference between a goal and an objective?



A goal is a broad-based projection, and an objective is a set of benchmarks.

A goal is a broad-based projection, and an objective is a specific accomplishment.

A goal is a broad-based projection, and an objective is a set of mini-goals.

A goal is a measurable projection, and an objective is a specific accomplishment

Answers

A goal is a desired outcome, but an objective is a targeted action that may be completed quickly and is frequently tied to a goal.

Give an example of each and explain the difference between an objective and a goal.

Objectives are specified in terms of measurable, tangible targets, whereas goals can be immaterial and unmeasurable. For instance, while "offering great customer service" is an intangible goal, "reducing the client wait time to one minute" is a tangible goal that contributes to the achievement of the primary goal.

What distinguishes educational goals from objectives?

Learning In contrast to aims, which convey a broad declaration of intent, objectives are specific, distinct intentions of student performance. Goals cannot be measured or seen; however, objectives can.

to know more about goals and an objective here:

brainly.com/question/28017832

#SPJ1

you will need to back up your computer files.

Answers

?what do u mean by this
Other Questions
A problematic Windows system needs to be restarted. You decide to use a command prompt window that is open. Which command do you use The nurse is caring for an elderly client with depression who is being treated with a tricyclic antidepressant (TCA). Which are clinical manifestations that would alert the nurse that the client is experiencing a complication of treatment with the TCA find xy=\frac{1}{4} x+3 Consider the reaction H2 + I2 2HI for which K = 44.8 at a high temperature. If an equimolar mixture of reactants gives the concentration of the product to be 0.50 M at equilibrium, determine the equilibrium concentration of the hydrogen. A) 1.1 * 10^1 M B) 7.5 * 10^2 M C) 3.7 *10^2 M D) 1.3 * 10^1 M E) 5.6 * 10^3 M What concept refers to the ways that a society keeps people from breaking the laws and norms? Why will the speedup of a parallel algorithm will eventually reach some limit? What are the chronological events? Notch is a receptor protein displayed on the surface of certain cells in developing fruit fly embryos. Notchs ligand is a membrane-bound protein called Delta that is displayed on the surface of adjacent cells. When Notch is activated by its ligand, the intracellular tail of the Notch protein becomes separated from the rest of the protein. This allows the intracellular tail to move to the cells nucleus and alter the expression of specific genes.Which of the following statements best explains Deltas role in regulating cell communication through the Notch signaling pathway?A. Delta transmits a chemical signal to all the cells of a developing embryo.B. Delta allows the cells of a developing embryo to communicate without making direct contact.C. Delta restricts cell communication to short distances within a developing embryo.D. Delta determines which cells in a developing embryo express the gene that encodes the Notch protein. a three tiered birthday cake rests on a table. From the bottom to the top, the cake tiers weigh 15 N, 8N, and 6N, respectively. What is the magnitude and direction of the normal force acting on the base of the seconf tier How do you find the third side? A snake has scaly skin to keep from drying out in the desert. A cactus has sharp spines and a thick stem that keep water in. Which term describes such traits that help organisms survive What is the greatest common factor of 20 and 65 Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional questions."Evolution of News Media and Social Media"What are some responsibilities of the media? How has increased social media impacted citizens' ability to gain information. Calculate the size of angle ABC Suppose there are two possible income distributions in a society of ten people. In the first distribution, nine people have incomes of $30,000 and one person has an income of $10,000. In the second distribution, all ten people have incomes of $25,000. If the society had the first income distribution, the utilitarian would argue that the marginal utility of income for the person with an income of $30,000 is than the marginal utility of income for someone with an income of $10,000, so income be redistributed. Rawls considers distribution to be more equitable. True or False: Nozick considers neither distribution to be more equitable. True False What is the formula for total risk? A right triangle has one leg with a length of 5 units. The hypotenuse is 30 units long. What is the length of the other leg?A. 5 UnitsB. 25 Units C. V 875D. V 375 1.2/4=x/28 what is the value of x How do you know if 3 lengths will make a triangle? The elevation of a small submarine changes by -3/8 mile after each exploration. After how many explorations will the submarines elevation have changed by -1 1/2 miles?PLEASE HELP