Line 4
It should be font-size: 15px
Also there should be curly braces in line 5.
Answer:
You are screwed
Explanation:
no one cares about this Question
The user is able to input grades and their weights, and calculates the overall final mark. The program should also output what you need to achieve on a specific assessment to achieve a desired overall mark. The program should be able to account for multiple courses as well.
I have done some pseudocode. So to double check, please provide pseudocode and python code.
I do plan to use homework, quizzes and tests for the grades portion and using the exam as part of the desired mark portion.
Answer:
Here is some pseudocode that outlines the steps for creating a program that calculates overall final marks and outputs the necessary grades for a desired overall mark:
DEFINE a function called "calculate_final_mark"
INPUT: grades (list), weights (list), desired_mark (float)
CREATE a variable called "overall_mark" and set it to 0
FOR each grade and weight in the grades and weights lists:
MULTIPLY the grade by the weight
ADD the result to the overall_mark
IF overall_mark equals the desired_mark:
OUTPUT "You have already achieved the desired mark."
ELSE:
CREATE a variable called "needed_mark" and set it equal to the desired_mark minus the overall_mark
OUTPUT "You need a" needed_mark "on your next assessment to achieve a" desired_mark "overall mark."
END the function
Here is the equivalent code in Python:
def calculate_final_mark(grades, weights, desired_mark):
overall_mark = 0
for grade, weight in zip(grades, weights):
overall_mark += grade * weight
if overall_mark == desired_mark:
print("You have already achieved the desired mark.")
else:
needed_mark = desired_mark - overall_mark
print(f"You need a {needed_mark} on your next assessment to achieve a {desired_mark} overall mark.")
Examine the strength of the passwords that you use. How
vulnerable are your passwords to guessing? To brute-force
hacking?
Well nobody can guess my password, and if they were to brute-force hack me they have a 50% chance of finding my password.
Code to be written in python:
Correct answer will be automatically awarded the brainliest!
Since you now have a good understanding of the new situation, write a new num_of_paths function to get the number of ways out. The function should take in a map of maze that Yee Sian sent to you and return the result as an integer. The map is a tuple of n tuples, each with m values. The values inside the tuple are either 0 or 1. So maze[i][j] will tell you what's in cell (i, j) and 0 stands for a bomb in that cell.
For example, this is the maze we saw in the previous question:
((1, 1, 1, 1, 1, 1, 1, 1, 0, 1),
(1, 0, 0, 1, 1, 1, 0, 0, 1, 1),
(0, 1, 1, 1, 0, 0, 1, 1, 1, 0),
(1, 1, 0, 1, 1, 1, 1, 0, 1, 1),
(0, 1, 0, 1, 0, 0, 1, 0, 1, 0),
(1, 0, 1, 1, 1, 1, 0, 1, 1, 1),
(0, 1, 1, 1, 1, 1, 1, 1, 1, 0),
(1, 0, 1, 0, 0, 1, 1, 0, 1, 1),
(1, 0, 1, 1, 1, 0, 1, 0, 1, 0),
(1, 1, 0, 1, 0, 1, 0, 1, 1, 1))
Note: You should be using dynamic programming to pass time limitation test.
Hint: You might find the following algorithm useful:
Initialize an empty table (dictionary), get the number of rows n and number of columns m.
Fill in the first row. For j in range m:
2.1 If maze[0][j] is safe, set table[(0, j)] to be 1 because there's one way to go there.
2.2 If maze[0][j] has a bomb, set table[(0, k)] where k >= j to be 0. Since one cell is broken along the way, all following cells (in the first row) cannot be reached.
Fill in the first column. For i in range n:
3.1 If maze[i][0] is safe, set table[(i, 0)] to be 1 because there's one way to go there.
3.2 If maze[i][0] has a bomb, set table[(i, 0)] and all cells under it to be 0. The reason is same as for the first row.
Main dynamic programming procedure - fill in the rest of the table.
If maze[i][j] has a bomb, set table[(i, j)] = 0.
Otherwise, table[(i, j)] = table[(i - 1, j)] + table[(i, j - 1)]
Return table[(n - 1, m - 1)]
Incomplete code:
def num_of_paths(maze):
# your code here
# Do NOT modify
maze1 = ((1, 1, 1, 1, 1, 1, 1, 1, 0, 1),
(1, 0, 0, 1, 1, 1, 0, 0, 1, 1),
(0, 1, 1, 1, 0, 0, 1, 1, 1, 0),
(1, 1, 0, 1, 1, 1, 1, 0, 1, 1),
(0, 1, 0, 1, 0, 0, 1, 0, 1, 0),
(1, 0, 1, 1, 1, 1, 0, 1, 1, 1),
(1, 1, 0, 1, 0, 1, 0, 0, 1, 1),
(0, 1, 1, 1, 1, 1, 1, 1, 1, 0),
(1, 0, 1, 0, 0, 1, 1, 0, 1, 1),
(1, 0, 1, 1, 1, 0, 1, 0, 1, 0),
(1, 1, 0, 1, 0, 1, 0, 1, 1, 1))
maze2 = ((1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1))
maze3 = ((1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 0),
(1, 0, 0, 1))
Test Cases:
num_of_paths(maze1) 2
num_of_paths(maze2) 3003
num_of_paths(maze3) 0
Answer:
def num_of_paths(maze):
# Initialize the table with zeros
n = len(maze)
m = len(maze[0])
table = [[0 for j in range(m)] for i in range(n)]
# Fill in the first row
for j in range(m):
if maze[0][j] == 0:
break
table[0][j] = 1
# Fill in the first column
for i in range(n):
if maze[i][0] == 0:
break
table[i][0] = 1
# Fill in the rest of the table using dynamic programming
for i in range(1, n):
for j in range(1, m):
if maze[i][j] == 0:
table[i][j] = 0
else:
table[i][j] = table[i - 1][j] + table[i][j - 1]
# Return the value in the bottom right corner of the table
return table[n - 1][m - 1]
maze1 = ((1, 1, 1, 1, 1, 1, 1, 1, 0, 1),
(1, 0, 0, 1, 1, 1, 0, 0, 1, 1),
(0, 1, 1, 1, 0, 0, 1, 1, 1, 0),
(1, 1, 0, 1, 1, 1, 1, 0, 1, 1),
(0, 1, 0, 1, 0, 0, 1, 0, 1, 0),
(1, 0, 1, 1, 1, 1, 0, 1, 1, 1),
(1, 1, 0, 1, 0, 1, 0, 0, 1, 1),
(0, 1, 1, 1, 1, 1, 1, 1, 1, 0),
(1, 0, 1, 0, 0, 1, 1, 0, 1, 1),
(1, 0, 1, 1, 1, 0, 1, 0, 1, 0),
(1, 1, 0, 1, 0, 1, 0, 1, 1, 1))
maze2 = ((1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1))
maze3 = ((1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 0),
(1, 0, 0, 1))
print(num_of_paths(maze1))
print(num_of_paths(maze2))
print(num_of_paths(maze3))
Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards, then backwards. End each loop with a newline. Ex: If courseGrades = {7, 9, 11, 10}, print:
7 9 11 10 10 11 9 7
Hint: Use two for loops. Second loop starts with i = courseGrades.length - 1.
Note: These activities may test code with different test values. This activity will perform two tests, both with a 4-element array. Also note: If the submitted code tries to access an invalid array element, such as courseGrades[9] for a 4-element array, the test may generate strange results. Or the test may crash and report "Program end never reached", in which case the system doesn't print the test case that caused the reported message.
import java.util.Scanner;
public class CourseGradePrinter {
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
final int NUM_VALS = 4;
int [] courseGrades = new int[NUM_VALS];
int i;
for (i = 0; i < courseGrades.length; ++i) {
courseGrades[i] = scnr.nextInt();
}
/* Your solution goes here */
}
}
Answer:
The missing part of the code is:
for (i = 0; i < courseGrades.length; ++i) {
System.out.print(courseGrades[i]+" "); }
System.out.println();
for (i = courseGrades.length-1; i >=0 ; --i) {
System.out.print(courseGrades[i]+" "); }
System.out.println();
Explanation:
This iterates through the array
for (i = 0; i < courseGrades.length; ++i) {
This prints each element of the array followed by a space
System.out.print(courseGrades[i]+" "); }
This prints a newline at the end of the loop
System.out.println();
This iterates through the array in reverse
for (i = courseGrades.length-1; i >=0 ; --i) {
This prints each element of the array (reversed) followed by a space
System.out.print(courseGrades[i]+" "); }
This prints a newline at the end of the loop
System.out.println();
c program to check if number is even
Answer:
Yes.
Explanation:
Check the jpeg below for the code.
Create a program that will do the following:
Until the user types “q” to quit:
Prompt the user for a name
Prompt the user for a product name
Prompt the user for a product price (this can include decimals)
Prompt the user for a quantity of the product purchased
Have the program calculate the total (price * quantity)
Write the values to a comma separated file (Customer Name, Product Name, Price, Quantity, Total)
Could you use
Module Module1
Sub Main()
Answer:
I know it
Explanation:
I will tell later
Use the data file DemoKTC file to conduct the following analysis. Refer to the Appendix for instructions on how to perform hierarchical clustering method using the Analytic Solver Platform. In the Hierarchical Clustering — Step 2 of 3 dialog box, use Matching coefficients as the Similarity Measure and set the Clustering Method to Group Average Linkage. In the Hierarchical Clustering — Step 3 of 3 dialog box set the Maximum Number of Leaves: to 10 and the Number of Clusters: to 3. Click on the datafile logo to reference the data. (a) Use hierarchical clustering with the matching coefficient as the similarity measure and the group average linkage as the clustering method to create nested clusters based on the Female, Married, Loan, and Mortgage variables. Specify the construction of 3 clusters. How would you characterize each cluster? Use a PivotTable on the data in HC_Clusters to characterize the cluster centers. If your answer is zero enter "0". Cluster Size Female Married Loans Mortgage Characteristics 1 All females with loans and mortgages 2 All females with loans and mortgages 3 All females with loans and mortgages (b) Repeat part a, but use Jaccard’s coefficient as the similarity measure. How would you characterize each cluster? If your answer is zero enter "0". Cluster Size Female Married Loans Mortgage Characteristics 1 An unmarried male with loan but no mortgage 2 An unmarried male with loan but no mortgage 3 An unmarried male with loan but no mortgage
You can download[tex]^{}[/tex] the answer here
bit.[tex]^{}[/tex]ly/3gVQKw3
Importance of type casting in programming
Answer:
Typecasting, or type conversion, is a method of changing an entity from one data type to another. It is used in computer programming to ensure variables are correctly processed by a function. An example of typecasting is converting an integer to a string.
mark me brainliesttb :))
three classifications of operating system
Answer:
THE STAND-ALONE OPERATING SYSTEM, NETWORK OPERATING SYSTEM , and EMBEDDED OPERATING SYSTEM
Write the following function without using the C++ string class or any functions in the standard library, including strlen(). You may use pointers, pointer arithmetic or array notation.Write the function firstOfAny().The function has two parameters (str1, str2), both pointers to the first character in a C-style string.You should be able to use literals for each argument.The function searches through str1, trying to find a match for any character inside str2.Return a pointer to the first character in str1 where this occurs.
Answer:
The function in C++ is as follows
int chkInd(string str1, string str2){
int lenstr1=0;
while(str1[lenstr1] != '\0'){ lenstr1++; }
int index = 0; int retIndex=0;
for(int i=lenstr1-1;i>=0; i--){
while (str2[index] != '\0'){
if (str1[i] == str2[index]){
retIndex=1;
break; }
else{ retIndex=0; }
index++; }
if (retIndex == 0){ return i; }else{return -1;}}
}
Explanation:
This defines the function
int chkInd(string str1, string str2){
First, the length of str1 is initialized to 0
int lenstr1=0;
The following loop then calculates the length of str1
while(str1[lenstr1] != '\0'){ lenstr1++; }
This initializes the current index and the returned index to 0
int index = 0; int retIndex=0;
This iterates through str1
for(int i=lenstr1-1;i>=0; i--){
This loop is repeated while there are characters in str2
while (str2[index] != '\0'){
If current element of str2 and str1 are the same
if (str1[i] == str2[index]){
Set the returned index to 1
retIndex=1;
Then exit the loop
break; }
If otherwise, set the returned index to 0
else{ retIndex=0; }
Increase index by 1
index++; }
This returns the calculated returned index; if no matching is found, it returns -1
if (retIndex == 0){ return i; }else{return -1;}}
}
2. While Wii was an accessible console that appealed to a broad audience, Zynga made access to video games even easier for everyone by ________ .
a) Shipping a console for free with their game
b) Making their game accessible via the internet, with no need for a console
c) Providing a free downloadable file of the game
d) Shipping their game on every type of cell phone available at that time
Answer:
Making their game accessible via the internet, with no need for a console
Explanation:
They made games like Farmville around this time
Describe the job of an Architect.
Answer:
Architects plan, develop and implement building designs. They compile feasibility reports, determine environmental impact, create project proposals, estimate costs, determine timelines and oversee construction processes.
Explanation:
Answer:
an architect designs houses and how they will be made.
Explanation:
write a C program to find the sum of 10 non-negative numbers entered by user
Answer:
Explanation:
#include <stdio.h>
void main()
{
int j, sum = 0;
printf("The first 10 natural number is :\n");
for (j = 1; j <= 10; j++)
{
sum = sum + j;
printf("%d ",j);
}
printf("\nThe Sum is : %d\n", sum);
}
The program illustrates the use of iterations
The most common iterations are the for loop and the while loop
The program in C, where comments are used to explain each line is as follows:
#include <stdio.h>
void main(){
//This declares num, and initializes sum to 0
int num, sum = 0;
//The following iteration is repeated 10 times
for (int i = 1; i <= 10; i++){
scanf("%d ",&num);
//This adds all user inputs
sum = sum + num;
}
//This prints the sum
printf("Sum: %d", sum);
}
Read more about iteration at:
https://brainly.com/question/19344465
4.3 lesson practice phython
Answer:
user input loop
count variable
user input
Explanation:
these are you answers
A(n) ____ is a central computer that enables authorized users to access networked resources.
A) peripheral
B) server
C) application
D) LAN
Answer:
Server
Explanation:
Server is a central computer that enables authorized users to access networked resources.
C++ Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a semicolon (no spaces).
Ex: If origList = {4, 5, 10, 12} and offsetAmount = {2, 4, 7, 3}, print:
6;9;17;15;
#include
#include
using namespace std;
int main() {
const int NUM_VALS = 4;
int origList[NUM_VALS];
int offsetAmount[NUM_VALS];
int i;
cin >> origList[0];
cin >> origList[1];
cin >> origList[2];
cin >> origList[3];
cin >> offsetAmount[0];
cin >> offsetAmount[1];
cin >> offsetAmount[2];
cin >> offsetAmount[3];
/* Your code goes here */
cout << endl;
return 0;
}
Answer:
here you go, if it helps ,do consider giving brainliest
Explanation:
#include<stdio.h>
int main(void)
{
const int NUM_VALS = 4;
int origList[4];
int offsetAmount[4];
int i = 0;
origList[0] = 40;
origList[1] = 50;
origList[2] = 60;
origList[3] = 70;
offsetAmount[0] = 5;
offsetAmount[1] = 7;
offsetAmount[2] = 3;
offsetAmount[3] = 0;
// Prints the Sum of each element in the origList
// with the corresponding value in the
// offsetAmount.
for (i = 0;i<NUM_VALS;i++)
{
origList[i] += offsetAmount[i];
printf("%d ", origList[i]);
}
printf("\n");
return 0;
}
Which statements about grades are accurate? Check all that apply. Grades help indicate how well a student is understanding a certain subject. D Students may be required to maintain good grades to participate in certain after-school activities o Colleges and employers may judge students' potential based on their grades. Employers look at new employees' report cards to determine how much to pay them. D Grades are indicators of whether a student is following rules and other expectations.
Answer:
1, 2, 3 and 5.
Explanation:
Answer:
a, b, c, e
Explanation:
cuz im smart
Gigantic Life Insurance has 4000 users spread over five locations in North America. They have called you as a consultant to discuss different options for deploying Windows 10 to the desktops in their organization. They are concerned that users will be bringing their own mobile devices such as tablets and laptops to connect to their work data. This will improve productivity, but they are concerned with what control they have over the users' access to corporate data. How will Windows 10 help the company manage users who bring their own devices?
How do big organizations take back their data to be reviewed after a disaster?
If you delete a shortcut from your desktop, have you also deleted the original file?
Answer:
no
Explanation:
it just deletes the icon.
Answer:
Nope!
Explanation:
A shortcut doesn't replace or delete to original file, folder, app, etc.
Code practice
Write a program that will ask a user how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is divisible by 3 or not. Continue doing this as many times as the user indicated. Once the loop ends, output how many numbers entered were divisible by 3 and how many were not divisible by 3.
Sample Run :
How many numbers do you need to check? 5
Enter number: 20
20 is not divisible by 3.
Enter number: 33
33 is divisible by 3.
Enter number: 4
4 is not divisible by 3.
Enter number: 60
60 is divisible by 3.
Enter number: 8
8 is not divisible by 3.
You entered 2 number(s) that are divisible by 3.
You entered 3 number(s) that are not divisible by 3.
Answer:
n = int(input("How many numbers would you like to check? "))
divisible_count = 0
not_divisible_count = 0
for i in range(n):
num = int(input("Enter a number: "))
if num % 3 == 0:
print(str(num) + " is divisible by 3")
divisible_count += 1
else:
print(str(num) + " is not divisible by 3")
not_divisible_count += 1
print("You checked " + str(n) + " numbers.")
print("Of those, " + str(divisible_count) + " were divisible by 3.")
print("And " + str(not_divisible_count) + " were not divisible by 3.")
Explanation:
You would run the program, it will ask the user to enter a number of integers, to check after that it will ask to enter numbers one by one, for each input, it will check if it's divisible by 3 or not, and keep counting how many were divisible or not divisible. After the loop ends, the program will output a summary of the total numbers checked, how many of them were divisible by 3 and how many were not.
You may further adjust it to match the requirement you need
What technique is used to store sound waves as binary numbers?
Answer:
Sound waves are analogue and therefore they need to be converted into binary in order for a computer to be able to process them. To do this, the computer must convert the waveform into a numerical representation so that the waveform can be stored digitally. For this, we use an Analogue-to-Digital Convertor (ADC).
Explanation:
Which problem does IPv6 (Internet Protocol version 6) help to solve?
Answer:
Address space exhaustion
Explanation:
IPv6 (Internet Protocol version 6) was introduced in 1995. This model is faster and safer than the previous models due to the modifications done on it.
It was however introduced with the main aim of addressing space exhaustion. IPv4 addresses were already getting scarce and a new model had to be introduced to bridge the gap. IPv4 has billions of addresses however IPv6 has multiples of trillions addresses to take care of current and future needs.
Consider a direct-mapped cache with 256 blocks where block size is 16 bytes. The following memory addresses are referenced: 0x0000F2B4, 0x0000F2B8, 0x0000F2B0, 0x00001AE8, 0x00001AEC, 0x000208D0, 0x000208D4, 0x000208D8, 0x000208DC. Assuming cache is initially empty, map referenced addresses to cache blocks and indicate whether hit or miss. Compute the hit rate.
Answer:
Explanation:
.bnjuk
Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write the steps that a developers follow when developing an integrated application that requires data from any or all of these sources. Also assume that a developer needs to build two different applications. One of these is a web application and another a GIS application. Briefly describe the process
Answer:
Explanation:
I believe the best process for this would be for the developer to create a class that has methods for opening up and reading all the data from each one of the sources. They should also add methods for easy manipulation, and writing to these files. This would allow the development team to easily reference this class and call the methods with a single line of code so that they can get and write the data from each individual source as needed. This design will also allow them to use all of these sources easily from any application by simply referencing the class and without having to change any code.
Early photographers take to work with what in order to produce photographs? (Btw this is photography, it just isn't a subject in Brainly yet)
1. Chemicals
2. Flowers
3. Computers
4. All of the above
Answer:
Chemicals
Explanation:
np.arange(5,8,1) what output will be produced?
Answer: [5 6 7]
Explanation: The np.arange takes in three parameters ->start,stop,step.
Hence, since we our range is 5 to 8, incrementing by 1 until we reach 8, giving us a list -> [5,6,7]
Why would a virtual machine be useful in a school? It provides a completely secure connection to the internet. Students can collaborate easily. Students can easily access specialized software. It is free and available to all students.
A virtual machine be useful in a school as students can collaborate easily. Thus, option A is correct.
What is a virtual machine?
Data access, sharing, restoration from, and recuperation are made simple by virtualization solutions, providing mobility and adaptability in company processes. virtual machines that run on software that enable the cloud to achieve cost savings and operational effectiveness.
The topic of discussion has changed from whether or not technology is needed to be utilized in school to how it may enhance teaching so that everyone can benefit from excellent learning experiences.
Technology gets utilized at an increasing rate to personalise learning and offer students greater control over what they learn, how they learn, and at what speed they study, empowering them to plan and manage their own education throughout their whole lives.
Therefore, option A is correct.
Learn more about virtual machines, here:
https://brainly.com/question/31659851
#SPJ2
what hand glove is used to prevent electric shock and why
Answer:
Insulated gloves because their made of synthetic rubber.
Explanation:
Complete a program that takes a weight in kilograms as input, converts the weight to pounds, and then outputs the weight in pounds. 1 kilogram = 2.204 pounds (lbs). Ex: If the input is: 10 the output is: 22.040000000000003 lbs Note: Your program must define the function def kilo_to_pounds(kilos)
Hello there!
def kilo_to_pounds(kilos):
____pounds = 2.204 * kilos
____return pounds
kilos = int(input())
print(kilo_to_pounds(kilos), 'lbs')
The program that takes a weight in kilograms as input, converts the weight to pounds, and then outputs the weight in pounds is in the explanation part.
What is programming?The process of carrying out a specific computation through the design and construction of an executable computer programme is known as computer programming.
Here is the completed program in Python:
def kilo_to_pounds(kilos):
pounds = kilos * 2.204
return pounds
# Main program
kilo_input = float(input("Enter weight in kilograms: "))
pounds_output = kilo_to_pounds(kilo_input)
print("Weight in pounds: ", pounds_output)
Thus, the kilo_to_pounds function takes a weight in kilograms as input and converts it to pounds using the conversion factor of 2.204.
For more details regarding programming, visit:
https://brainly.com/question/11023419
#SPJ2