Answer:
Explanation:
The program first asks the user for the sequence of words. Then it splits the sequence into an array of words. Then it loops through the array checking each word to see if it is a palindrome. If it is it prints the word, the boolean value, and adds 1 to the palindrome_count variable. Otherwise it prints the word, false, and moves on to the next word in the list. Finally, it prints out the total value of palindrome_count.
word = input("Enter sequence of words: ")
word_list = word.split(' ')
print(word_list)
palindrome_count = 0
for word in word_list:
print('\n\n')
reverse = word[::-1]
if word == reverse:
print(word, end='\n')
print(True, end="\n")
palindrome_count += 1
else:
print(word, end='\n')
print(False, end='\n')
print("\n\nNumber of Palindromes in Sequence: " + str(palindrome_count))
Define Word Processing
Answer:
Word Processing refers to the act of using a computer to create, edit, save and print documents. ... Text can be inserted, edited, moved, copied or deleted within your document and the appearance of the text can be modified in numerous ways.
Please hurry, it's a test! 30 POINTS. :)
What computing and payment model does cloud computing follow?
Cloud computing allows users to_____ computing resources and follows the ______
payment model.
1. Buy, Own, Rent, Sell
2. pay-as-you-go, pay-anytime-anywhere, pay-once-use-multiple-times
RAM or RIM is correct?
I wake up the computer and remind it what to do
Answer:
what's the question or answer you want or is it a joke?
Explanation:
Where is the option to set Conditional Formatting rules found?
O Insert tab in the Formatting group
O Page Layout tab in the Styles group
O Home tab in the Styles group
Formulas tab in the Formatting group
Answer:
C. Home tab in the Styles group
Explanation:
answer on edge 2021
Brainliest if correct. 3. You are researching ways to boost employee morale for a proposal. How can you
avoid copyright issues when you find materials from outside sources? (1 point)
Why linked list is better than an array?
In transcription Files are transcribed in:
a) Australian English
b) American English unless a client states otherwise.
c) Canadian English
d) British English
Answer:
B
Explanation:
American English unless a client states otherwise
Answer:
b american english
Explanation:
Window server how it works
what is operating system?
The software that supports a computer's basic functions, such as scheduling tasks, executing applications, and controlling peripherals.
You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store. This would be an example of a(n):
The given situation is an example of shoplifting.
What is hardware?All the mechanical components made of simply plastic or metal used in houses or industries are termed as hardware.
You enter a hardware store where you have an account, pick up a pair of $5.00 pliers, and wave them at the manager as you leave the store.
This gives an idea of the shoplifting, as he hold the account with them. He doesn't need to pay every time he buys anything.
This, this would be an example of shoplifting.
Learn more about hardware.
https://brainly.com/question/15232088
#SPJ2
The program allows the user to type in any linux command and then executes that command, such as "pwd" or "echo". The problem is that it should allow multiple commands to be typed in and executed at the same time, but it only allows one at a time currently. Please help fix it so it allows multiple commands to be typed and executed.
Code:
#include
#include
#include
#include
#include
#include
void parse(char *line, char **argv)
{
while (*line != '\0') { /* if not the end of line ....... */
while (*line == ' ' || *line == '\t' || *line == '\n')
*line++ = '\0'; /* replace white spaces with 0 */
*argv++ = line; /* save the argument position */
while (*line != '\0' && *line != ' ' &&
*line != '\t' && *line != '\n')
line++; /* skip the argument until ... */
}
*argv = '\0'; /* mark the end of argument list */
}
void execute(char **argv)
{
pid_t pid;
int status;
if ((pid = fork()) < 0) { /* fork a child process */
printf("*** ERROR: forking child process failed\n");
exit(1);
}
else if (pid == 0) { /* for the child process: */
if (execvp(*argv, argv) < 0) { /* execute the command */
printf("*** ERROR: exec failed\n");
exit(1);
}
}
else { /* for the parent: */
while (wait(&status) != pid) /* wait for completion */
;
}
}
void main(void)
{
char line[1024]; /* the input line */
char *argv[64]; /* the command line argument */
while (1) { /* repeat until done .... */
printf("Enter Shell Command -> "); /* display a prompt */
fgets(line, 1024, stdin); /* read in the command line */
printf("\n");
parse(line, argv); /* parse the line */
if (strcmp(argv[0], "exit") == 0) /* is it an "exit"? */
exit(0); /* exit if it is */
execute(argv); /* otherwise, execute the command */
}
}
This function receives a commend line argument list with the */ /* the first argument being cd and the next argument being the */ /* directory to change.
Please debbug this code for me
public class SavingAccount { // interest rate for all accounts private static double annualInterestRate = 0; private final double savingsBalance; // balance for currrent account // constructor, creates a new account with the specified balance public void SavingAccount( double savingsBalance ) { savingsBalance = savingsBalance; } // end constructor // get monthly interest public void calculateMonthlyInterest() { savingsBalance += savingsBalance * ( annualInterestRate / 12.0 ); } // end method calculateMonthlyInterest // modify interest rate public static void modifyInterestRate( double newRate ) { annualInterestRate = ( newRate >= 0 && newRate <= 1.0 ) ? newRate : 0.04; } // end method modifyInterestRate // get string representation of SavingAccount public String toString() { return String.format( "$%.2f", savingsBalance ); } // end method toSavingAccountString } // end class SavingAccount
Answer:
/
Explanation:
As a Waterfall project manager, your goal is to minimize any changes that could lead to scope creep. You want to protect your team from building something the client or stakeholders don’t want. What formal and rigorous process could you set up to safeguard against this?
The necessary things that should be done to avoid a project scope creep include documenting the project requirements and setting up change control processes.
The scope of a project simply means the work that is required in order to complete a project. On the other hand, project scope creep means the occurrence that happens when changes are made to the scope without a change request.
To avoid project scope creep, it's important to document the project requirements, set up changes in control processes, and have a clear project schedule.
Learn more about projects on:
https://brainly.com/question/4853153
Consider that a man is watching a picture of a Black Horse. He receives an external stimulus from input channel. Man gains some information about the picture from external environment and stores it in the memory. Once the initial information is gained, it is compared with the memory and then stores it. Finally upon perceiving and storing the information in memory Man says that the picture contains Black horse.
Based on the information-processing model, cognition is conceptualized as a series of processing stages where perceptual, cognitive, motor processors are organized in relation to one another.
You are required to identify and elaborate that which cognitive processes i.e. Perceptual system, Cognitive system, and motor system are involved when man interacts with the picture and also that which input channel is responsible in taking information to the brain.
The first Cognitive Process that was in play according to the excerpt is Perceptual System. It is also called Perceptual Representation and Intelligence.
This function of the brain is responsible for the sensory input which may be auditory (sounds), visual (pictures), and kinesthetic (emotions or feelings).
So the Perceptual Cognitive system (visual) relays the input (image of the horse to his brain, then it is stored.
This next stage is handled by the memory. Memory (a crucial process for learning) is a cognitive function that enables us to code, store, and recover information from the past.
Notice that the man perceived the information, and as the input interacts with the memory, he is able to say that the image or picture contains a black horse because there is a recall function.
Learn more about cognitive functions in the link below:
https://brainly.com/question/7272441
Create a Python script that will compare two (2) numbers entered by the user. Refer to the attached image and to the following algorithm. There is no need to create a class similar to how Java works.
3.1. User enters the first number.
3.2. User enters the second number.
3.3. If the first number is less than, greater than, or equal the second number, a message is displayed.
Please Help me. Thank You!
Marry Christmas!
x = int(input("Enter first number\n"))
y = int(input("Enter second number\n"))
if x > y:
print(x, "is greater than", y)
elif x < y:
print(x, "is less than", y)
else:
print(x, "is equal to", y)
i'm not the greatest coder, but it works :)
VPN or Proxy is safer?
Brainliest if correct. 5. if you wanted b show how many employees at your office ride a bicycle to work in
comparison to the number of employees who drive a car, take public transportation,
or walk wihat visual would be best? (1 point)
Answer:
I believe a bar graph would be best for me. What are your answer options though?
Explanation:
Read two numbers from user input. Then, print the sum of those numbers.
Hint -- Copy/paste the following code, then just type code where the question marks are to finish the code.
num1 = int(input())
num2 = ?
print(num1 + ?)
Answer:
First ? - int(input())
Second ? - num2
Explanation:
This works because we are just mimicing the first input in your first variable.
The second one is adding them together.
Don't remember to give me brainliest :)
A Product Manager has been given responsibility for overseeing the development of a new software application that will be deployed to a group of Accenture clients.
What would be the most time-saving and cost-effective way for the Product Manager to address the new application’s security considerations?
Utilize a DevSecOps approach to incorporate security into the development process from the beginning.
Schedule development of security features after the application’s initial release.
Design the application’s security features after the application’s initial build is complete.
Contract with an external vendor to develop a security solution separately from the main application.
I don't know this yet.
There are different software that has been developed today. The most time-saving and cost-effective way is to Design the application’s security features after the application’s initial build is complete.
Accenture is known for their work in improving business needs. They are constantly shifting to a new method of delivering information technology.
They are known to embed security into the product development life cycle helps secure the business and also keeping speed and assisting to remove friction.
Learn more about Accenture from
https://brainly.com/question/25737623
What type of system software manages memory?
Answer:
"Operating System"
Explanation:
The type of system software that manages memory is an operating system. To manage memory, the operating system employs a number of software strategies.
What is system software?The most crucial piece of software that runs on a computer is the operating system. It controls the memory, operations, software, and hardware of the computer.
You can converse with the computer using this method even if you don't understand its language. Memory connections are the structures that come before and after all memory areas, whether they are allocated or available.
Working memory, short-term memory, and long-term memory are the three primary categories of memory. While long-term memory stores your enduring memories, working memory and short-term memory enable you to retain and use transient information.
Therefore, an operating system is a sort of system software that controls memory.
To learn more about system software, refer to the link:
https://brainly.com/question/12908197
#SPJ2
The ratio of sparrows to bluejays at the bird sanctuary was 5 to 3 If there were 15 bluejays in the sanctuary, how many sparrows were there?
Which of the following will you do in step X in the following series of clicks to change the bounds of
a chart axis: Chart > Chart Tools > Format tab > Current Selection> Format Selection > Format Axis
> Axis Options > Vertical Axis crosses > At Category number > X?
O Expand Labels, then under Interval between labels, select Specify interval unit and type the
number you want in the text box.
O Expand Tick Marks, and then in the Interval between tick marks box, and type the number that
you want
N
Type the number that you want in the text box.
O Expand Tick Marks, and then select the options that you want in the Major type and Minor type
boxes.
In order to change the bounds of a chart axis after performing the aforementioned series of clicks, at step X: C. Type the number that you want in the text box.
A step chart can be defined as a line chart that uses both the vertical and horizontal lines to connect two (2) data points. Thus, it enables an end user to see the exact point on the X-axis when there is a change in the Y-axis.
In Microsoft Excel, the series of clicks that are used to change the bounds of a chart axis are:
Click on chart.Select chart tools and then format tab.Select the current selection and then format selection.Click on format axis and then axis options.Click on vertical axis crosses.At category number, you should type the number that you want in the text box.In conclusion, typing the number that you want in the text box is the action that should be performed at step X.
Read more on step chart here: https://brainly.com/question/9737411
please write an Introduction on intrusion detection system and prevention system
PLEASE
Answer:
An Intrusion Detection System (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered. It is a software application that scans a network or a system for harmful activity or policy breaching. Any malicious venture or violation is normally reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system integrates outputs from multiple sources and uses alarm filtering techniques to differentiate malicious activity from false alarms.
Suppose a password must have at least 8, but no more than 12 characters, where each character can be either:
Answer:
A combination of uppercase letters, lower case letters, numbers, and special characters.
Explanation:
A password is a word that permit you to register, log or sign in a site.
in which country was Abacus build
if ur smart don't searh
Answer:
Abacus many be built first in China
Explanation:
I know Abacus ^o^
Answer:
Hewo There!!!!
__________________
China- i thinkkk maybe?
__________________
“Hold fast to dreams,
For if dreams die
Life is a broken-winged bird,
That cannot fly.”
― Langston Hughes
__________________
Think of life as a mytery because well it sort of is! You don't know what may happen may be good or bad but be a little curious and get ready for whatever comes your way!! ~Ashlynn
An input statement is used to interact with the user of a program.
True False
Answer:
True.
Explanation:
An input statement asks a user a question, where the user has to input a value for the program to move forward. This means that yes, the program does interact with the user.
C++
see attached file for quesion
how to download film
hi hi hihihihihivvv hihihihihihi v vhi
Answer: hihihihihihiihihi hihihihiihihih
Explanation: hi.