The program requires user to read a specified number of values beyond a set limit from a given array. The program which performs this task is written in python 3 thus :
from random import randint
#import the randomint module
import random
#import the random module
double_list = [randint(11, 99) for p in range(0, 10)]
#randomly selects a list of 10 double integer values
def rand_num(lis, n_values , n):
#initialize a function named rand_num which takes in 3 parameters
filter = [val for val in lis if val > n]
#filters the variables to contain those only greater than the specified limit
arr_ = random.sample(filter, n_values)
#using the sample function, select the stated number of values from the filtered list
return arr_
#return the selected values
n_values = int(input('Enter number of values : '))
#prompts user for the length of array
n = int(input('Enter limit : '))
#prompts user for the limit of the values to be included in the array
print(rand_num(double_list, n_values, n))
#A sample run of the program is given and output attached.
Learn more :https://brainly.com/question/25434178
Write a statement that inserts the value 'wash dog' into the list activities so that it becomes the element at index 2.
I don't have much context on it or what programming language you want so...
activities[2] = 'wash dog'
g Deliverables: 1.Referencing the Arduino attachInterrupt() documentationand the provided code, what does the attachIntterupt() function call on line 19 do, and how does that work with the magnet_detected() function
Answer:software routine that hardware invokes in response to an interrupt.
Explanation:
4. When working at the CLI in Linux, you specify the exact location of a file, which is the ____________________ to it, by beginning with a forward slash (/) to indicate the root directory.
Command line interface is used in form of a messenger conversation with your computer. You specify the exact location of a file, which is the pwd to it.
The Command Line Interface (CLI), is said to be a non-graphical, text-based interface attached to the computer system.It is where the user input in a command and the computer then successfully executes it.
The Terminal is known to gives the command line interface (CLI) environment to the user.
The pwd command is simply known to be used in determining an exact folder location or path in Terminal.
Learn more from
https://brainly.com/question/25435538
Write a statement that slices a substring out of the string quote and puts it into a variable named selection. If given the string 'The only impossible journey is the one you never begin.', selection should contain 'possible jou' after your statement executes.
The statements that slices a substring out of the string quote and puts it into a variable named selection is as follows:
text = "The only impossible journey is the one you never begin."
selection = ""
selection += text[11:23]
print(selection)
The code is written in python.
The string is stored in a variable called text.
The variable selection is declared as an empty string. The purpose is to store our new substring.
The third line of the code is used to cut the string from the 11th index to the 23rd index(excluding the 23rd index) and add it to the declared variable selection.
Finally, we output the variable selection by using the print statement.
The bolded values in the code are python keywords.
read more; https://brainly.com/question/20361395?referrer=searchResults
which one is larger in size. a word document file or a pdf file?
Answer:
Pdf file is larger than document file
Explanation:
.
Kayla is on-location shooting a wedding while her other employees will be holding down the office and taking care of any walk-ins. Kayla left them written reminders and instructions for some things that they need to take care of in her absence. How did Kayla MOST LIKELY leave these instructions?
A.
in shot lists being created for upcoming events
B.
in purchase orders for equipment that needs to be ordered
C.
in memos she wrote prior to leaving
D.
by telling the models who would be photographed that day
Answer: A
Explanation:
In short lists being created for upcoming events did Kayla MOST LIKELY leave these instructions. Hence, option A is correct.
What is short lists?Every camera shot that needs to be recorded in a scene for a video production is listed in detail on a shot list.
A shot list, created by the director and cinematographer during pre-production, is a thorough list of each shot that must be taken on a particular shoot day. Its main objective is to deconstruct a scene into detailed phases that can be used as a guide for your day of shooting.
A shot list is a breakdown of each shot of each scene and the order in which you plan to shoot them, whereas a storyboard shows your cinematographer and production designer your vision for each specific scene.
Thus, option A is correct.
For more information about short lists, click here:
https://brainly.com/question/13099126
#SPJ2
Match the Tools with the name of the tool.
Toolbar Options
Question 1 options:
Increase Indent
Line Spacing
Decrease Indent
Justify Text
Bullet Points
Center Text
1
2
3
4.
5
6
Answer:
1. Center Text
2. Justify Text
3. Bullet Points
4. Decrease Indent
5. Increase Indent
6. Line Spacing
Hope this helps:)
An application maintains social security numbers and birth dates in a database to track medical records across multiple offices. To maintain the personally identifiable information (PII), which of the following de-identification methods should the application adopt?
There are different ways of management. To maintain the personally identifiable information (PII), Data masking as an de-identification methods should the application adopted.
Data masking is also called data obfuscation. This is simply known as the way of improving or modifying sensitive data so that it has no/little value to unauthorized intruders while still being usable by software or authorized personnel.
It often functions by shielding confidential data, such as credit card information, Social Security numbers, names, addresses, and phone numbers etc.
Learn more from
https://brainly.com/question/13438921
three types of keys on the keyboard
You have been elected to assist the school's yearbook committee and newspaper club in purchasing new computers. The current computers for both organizations are located in the school's secondary computer
lab. Your job is to help students understand how to use the new computers that were purchased.
Which stage of the computer life cycle are your duties associated with?
A) Deploying computers
B) Retiring computers
C) Supporting and upgrading
D) planning for and purchasing equipment
Answer:
A) Deploying computers
Explanation:
Just took the quiz :)
Match each word to its correct meaning.
central processing unit
file
graphical user interface
hardware
interrupts
kernel
memory
Answer:
Central Processing Unit (CPU)
=
The chip that runs the basic operations of the computer, abbreviated CPU
File
=
a collection of data, such as a program or document
Graphical User Interface (GUI)
=
images displayed on the screen that enables the user to interact with the computer
Hardware
=
Physical parts of the computer, such as the motherboard or hard disk
Interrupts
=
Breaks in the action of a program using the operating system
Kernel
=
Core program of a computer operating system
Memory
=
Format for storage of digital data
Hope this helps :)
What is software and what types of softwares?
Answer:
the programs and other operating information used by a computer
Explanation:
system software and application software
Answer:
Software is a group/collection of commands that tell a computer how to work/run. Software is the contrast for hardware which is a discussed topic in the software field.
Examples of software are, an Internet browser, Operating system, Movie player, Graphics program, etc.
Write a class number which has Following
N - integer
Methods
Default constructor
Argument constructor
setN method to change the value of N
isprime() to check that N is a prime number isarmstrong to check N is Armstrong iseven() to check if N is even or odd these method should also work for given numbers
class should have provision to know the count of objects
The Python program implementing the required features of the class number is lengthy. So, it is attached to the answer as an image
First, two attributes are defined in the class:
A class attribute called count_instances that is incremented anytime an instance is created. Thus, it keeps count of the number of instances created.An instance attribute called N that stores the numberPython does not allow operator overloading by default. To implement default and argument constructors, use default/optional arguments. Though there are other ways, this is the simplest approach for the purposes of this problem.
The isPrime method checks if the constructed number is a prime number. The for loop runs from 2(since this is the first prime number) to int(sqrt(N)), and checks which of these numbers divides N. If none divides N, then N is prime, and it returns true, else it returns false.
isArmstrong checks if the number is an Armstrong number. To easily get the order of the number, the number is converted to a string and the number of characters is gotten.
The number is an Armstrong Number if
[tex]abc...=a^n+b^n+c^n+...[/tex]
where
[tex]n=\text{order of the number, or, number of digits in the number}\\a,b,c,...=\text{the individual digits of the number}[/tex]
See another example on Prime numbers here: https://brainly.com/question/20379340
An information of a 500GB is transferred at the speed of 10MB/s. Calculate the full time the information will be transfer.
Answer:
50,000 seconds
Explanation:
First multiply 500GB into 1000.(*1GB is equal to 1000MB so were going to multiply it so that we can get the exact MB) and we will get 500,000 MB. Then let's divide it by 10.(*since 10MB can be transfer in just one second.) and we will get 50,000 SECONDS.
Hope it can help you lovelots
How does an organization comply with data-usage clauses within data protection regulations such as GDPR or the Data Protection Act?
Answer:
How does an organization comply with data security clauses in data protection regulations such as GDPR or the Data Protection Act? ... By ensuring all data storage is publicly accessible to guarantee fairness. By only sharing collected personal data with partners and third-party channels.
Which character is midway between the 3rd character from left and 6lh character from rights
a. 2
b. 3 ANS
c. 8
d. Y
Answer:
D
Explanation:
To classify wireless networks by coverage, which of the following are wireless networks?
A- WPAN
B-WLAN
C- WMAN
D- WWAN
Answer:
B -WLAN
Explanation:
Use the edit icon to pin, add or delete clips.
What sets blockchain solutions apart from conventional record-keeping solutions?
Blockchain technology are in commonly used in this dispensation. The thing that sets blockchain solutions apart from conventional record-keeping solutions is simply the ability to share different versions of the same data to multiple parties.
Blockchain is known to buildup trust, security, transparency, and the traceability of data shared across a business network. It also minimize cost with new efficiencies.
It is simply known to be distributed ledger technology that helps in the storage of information in the form of blocks and no one can change or add the data.
See full question below
What sets blockchain solutions apart from conventional record-keeping solutions?
the ability for multiple parties to be certain they are using the same data
the ability to share different versions of the same data to multiple parties
a focus and priority on bitcoin and cryptocurrency
a system that maintains rigor and complexity
Learn more from
https://brainly.com/question/21105181
The mean of a sequence of n numbers is m. If we split the sequence into two sequences of lengths n1 and n2 and compute their means m1 and m2, which of the following is TRUE?
The mean of a sequence of n numbers is m. If we split the sequence into two sequences of lengths n1 and n2 and compute their means m1 and m2, which of the following is TRUE?
The mean of a sequence of numbers is the average.
The true statement is: [tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]
The given parameters are:
[tex]\mathbf{Mean=m}[/tex]
[tex]\mathbf{Size=n}[/tex]
The mean of a dataset is calculated as:
[tex]\mathbf{Mean = \frac{Sum}{Count}}[/tex]
So, we have:
[tex]\mathbf{m = \frac{Sum}{n}}[/tex]
Multiply both sides by m
[tex]\mathbf{Sum = mn}[/tex]
When the sequence is split into two, we have:
[tex]\mathbf{\sum x_1 = m_1n_1}[/tex]
[tex]\mathbf{\sum x_2 = m_2n_2}[/tex]
Where:
[tex]\mathbf{Sum = \sum x_1 + \sum x_2}[/tex]
So, we have:
[tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]
Hence, the true statement is: [tex]\mathbf{mn = m_1n_1 + m_2n_2}[/tex]
Read more about mean and averages at:
https://brainly.com/question/25421763
In cell G5, enter a formula without using a function that subtracts the actual dollars billed from the estimated amount to determine the remaining amount of the estimate for general administrative services
Using the appropriate excel syntax, the formula which calculates the actual amount from estimated amount is : =C10 - D10
Using the cells thus :
Actual dollar billed = C10Estimated amount = D10Using the cell values defined above ; the required excel syntax is as follows :
=C10 - D10Note : All excel formulas begin with the equal to sign.
Learn more : https://brainly.com/question/25644130
buying a good computer you should consider what?
I recommend a Samsung or Chromebook both good conputers
Show the stages of running Shellsort on the input 8, 9, 7, 5, 4, 6, 3, 2, 1 using increments {1, 3, 7}.
A keyboard would be considered _____. Select 2 options.
an input device
storage
an output device
software
hardware
Answer:
input devise and hardware
Explanation:
vA student found a book on the library bookshelf last week, and recorded the source information.
Book title: My Traitor’s Heart Author: Rian Malan
Publication date: 1990 Publisher: Bodley Head Publication city: London
Use the drop-down menus to indicate how the student should format this source on a works-cited list.
My Traitor’s Heart.
London:
Answer:
3,1,2,1
Explanation:
got it right on edge
have a nice day
:)
Answer:
1. Malan, Rian
2. London:
3. Bodley Head, 1990
4. Print
Explanation:
did it
Choose a project with a relatively simple description (e.g. building a LAN,
designing a business web page, inventing a new communication device,
etc.). Describe your project scope in 100 words and then identify at least
five significant varied risks associated with the project. Be sure that at
least one of them is a positive risk
Answer:
Design a web page
Explanation:
It is easier html is a very easy language to learn css it should take ou about a week for a solid website
what is the difference b\w computer science and IT
Answer:
IT involves working both with hardware e.g CPUs, RAM, hard disks and software e.g mobile application. While
computer science deals with the development and testing of software and software systems.
What is the distinct functionality of WPS writer? (distinct means wala ang functionality na iyon sa ibang word processors :))
Answer:
WPS Office' Writer gives you a handful of unique features that can enhance your productivity, such as efficient cloud integration, ability to convert PDF to Word, exporting the document to a picture, picture to text, making backups, inserting watermarks, and more
Works with Windows, Linux, Mac, Android, and iOS, and can also be used directly from a browser
The installer includes other software you can optionally add to your computer, like WPS Spreadsheets and WPS Presentation
Common formatting is allowed, such as organizing data in columns, changing the orientation of the page, aligning text and objects, adding a header and footer, overlaying a watermark, and using heading styles
Encryption is supported, which means when you save a document you can choose a custom encryption type and a unique password for opening the document, and another for modifying it
While discussing the testing procedures for relays, Technician A says that if a relay does not
click or activate a circuit it is intended to operate, it can be comprehensively tested using a
voltmeter, test light, or ohmmeter. Technician B says that electronic relay testers do not
require a voltage source. Who is correct?
Select one:
O a. Technician A only
O b. Technician B only
O c. Both Technician A and Technician B
O d. Neither Technician A nor Technician B
Answer:
Socratic app
Explanation:
it will help you
Write a program to grade an n-question multiple-choice exam (for n between 5 and 50) and provide feedback about the most frequently missed questions. Your program will take data from the file examdat.txt. The first line of the file contains the number of questions on the exam followed by a space and then an n-character string of the correct answers. Write a function fgets Answers that inputs the answers from an open input file. Each of the lines that follow contain an integer student ID followed by a space and then that stu dent's answers. Function fgets Answers can also be called to input a student's answers. Your program is to produce an output file, report.txt, containing the answer key, each student's ID, and each student's score as a percentage, and then information about how many students missed each question. Here is a short sample input and output files. examdat.txt 5 dbbac 111 dabac 102 dcbde 251 dbbac
Answer:
I was able to create script however it was not in the correct language, sorry.
Explanation:
Evaluate the expression using stack 14-(6-10)-10
Answer:
14 -(6-10)-10
14-(-4)-10
18-10
= 8