Assignment 4 divisible by three
I need a little help. I do not understand what I am doing wrong. I keep getting this message in the picture included.

n = int(input("How many numbers do you need to check? "))

divisible = 0

notdivisible = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

divisible += 1

print(str(num)+" is divisible by 3.")

else:
num % 3== 0

notdivisible += 1

print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")



n = int(input("How many numbers do you need to check? "))

divisible = 0

notdivisible = 0

for x in range(n):

num = int(input("Enter number: "))

if num % 3== 0:

divisible += 1

print(str(num)+" is divisible by 3.")

else:
num % 3== 0

notdivisible += 1

print(str(num)+" is not divisible by 3.")

print("You entered "+str(divisible )+" number(s) that are divisible by 3.")

print("You entered "+str(notdivisible )+" number(s) that are not divisible by 3.")

Assignment 4 Divisible By ThreeI Need A Little Help. I Do Not Understand What I Am Doing Wrong. I Keep

Answers

Answer 1

Answer:

I'm not sure if this is the problem, but you do else: num % 3 == 0. I don't think this should be here. In the else case, it is not divisible by 3, so you only need to add 1 to the notdivisible variable.

Explanation:

Answer 2

The issue is with the line num % 3 == 0 in the else statement. This is a comparison expression that evaluates to either True or False and does not change the value of notdivisible.

What is programming?

Computer programming is the process of carrying out a specific computation, typically by designing and constructing an executable computer programme.

Here's the corrected code:

n = int(input("How many numbers do you need to check? "))

divisible = 0

notdivisible = 0

for x in range(n):

   num = int(input("Enter number: "))

   if num % 3 == 0:

       divisible += 1

       print(str(num) + " is divisible by 3.")

   else:

       notdivisible += 1

       print(str(num) + " is not divisible by 3.")

print("You entered " + str(divisible) + " number(s) that are divisible by 3.")

print("You entered " + str(notdivisible) + " number(s) that are not divisible by 3.")

Thus, this code should correctly count the numbers that are divisible and not divisible by 3.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2


Related Questions

which products (of those we covered) allow you to build data pipelines using graphical user interface and no coding?

Answers

The product that allow you to build data pipelines using graphical user interface and no coding is IBM SPSS Modeler and Modeler Flows in Watson Studio. The correct option is d.

What is the graphical user interface?

A mouse is used to interact with a graphics-based operating system interface, which uses menus and icons to govern user interaction. It is a user-friendly visual interface that enables any action to be taken by the user without the need for programming expertise.

The GUI, as seen in Windows, MacOS, or Android environments, allows commands to be communicated without the need for programming using mouse motions or gestures.

Therefore, the correct option is d. IBM SPSS Modeler and Modeler Flows in Watson Studio.

To learn more about the graphical user interface, refer to the link:

https://brainly.com/question/14758410

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. Only IBM SPSS Statistics

b. Only IBM SPSS Modeler

c. OpenScale

d. IBM SPSS Modeler and Modeler Flows in Watson Studio

e. All of the above

Under what tab In PowerPoint will you find the "Add New Slide" button?

Home
Insert
Slide show
Delete

Answers

Under the home tab you will find the add new slide button.

Answer:

Home

Explanation:

It is just under the home tab.

In right side of copy paste icon

The commands to save a file as a powerpoint show is located in which portion of backstage view?.

Answers

Answer:1. How to Save a PowerPoint Presentation?

Once you have saved a PowerPoint presentation, you can easily save it again with just one click. Furthermore, you can also save a PowerPoint presentation in other formats. However, the process of saving a PowerPoint presentation is slightly different on Windows and on Mac.

Let’s understand the process in further detail.

1a. Saving a PowerPoint Presentation on Windows

To save a PowerPoint Presentation on Windows PC, you can follow either of the 2 simple methods.

Method-1: Using the “Save” button on Quick Access Toolbar

In the Quick Access Toolbar located at the very top of the screen, click on the “Save” icon.

The “Save” icon is located on the left side in the Quick Access Toolbar and looks like a floppy disk. Clicking on the “Save” button will immediately save the PowerPoint presentation in its current location as a “.pptx” file.

If you have opened a new presentation and you are saving it for the first time, clicking on the “Save” button will open a new explorer window. Simply navigate to the folder where you wish to save the new presentation on your computer, and click on “Save“.

Method-2: Using the “File” tab

Another, more common method is to use the “File” tab in PowerPoint to save your PowerPoint presentation.

Here’s what you need to do –

Step 1 – Click on the “File” Tab

Another way to save a PowerPoint presentation is to use the “File” menu. You have to first click on the “File” tab located at the left corner of the menu ribbon at the top of the screen.

Step 2 – Click on the “Save” option

This will open the backstage view in PowerPoint. Now, click on the “Save” option from the sidebar on the left side of the screen. This will save the Microsoft PowerPoint as a “.pptx” file in the current location.

Subscribe to Art of Presentations!

Get updates on the latest posts and more from Art of Presentations straight to your inbox.

Your Email...

SUBSCRIBE

I consent to receiving emails and personalized ads.

1b. Saving a PowerPoint Presentation on Mac

On a Mac computer, you can use the “File” menu as well to save the PowerPoint presentation.

The first step is to click on the “File” menu in the menu bar located at the top of the screen (above the PowerPoint window). This will open a dropdown menu. Click on the “Save” option from the dropdown menu to save the presentation as a “.pptx” file which is the standard format for presentations.

1c. Shortcut Keys to Save a PowerPoint Presentation

Microsoft PowerPoint also allows you to save a presentation with keyboard shortcuts. All you have to do is press the “Ctrl+S” keys on your keyboard in an open PowerPoint file. This will save the PowerPoint presentation.

1d. Best Format to Save a PowerPoint Presentation?

PowerPoint allows you to save a presentation in various different file formats! For instance, you can use the .ppt format if you wish to open the presentation file using PowerPoint 2007 or earlier. You can use .ppsx to open presentation directly as a PowerPoint Show file that opens it in the presentation mode.

In fact, there are several other formats you can save a presentation in. We shall explore how to save a PowerPoint presentation in several different formats later in the article.

However, the best format to save a PowerPoint Presentation is a “.pptx” file. This type can support all the latest as well as the older features of the PowerPoint presentation.

If you will be opening the presentation using a different software other than Microsoft PowerPoint, “.odp” is the best format. For printing, make sure to save the PowerPoint presentation as a PDF. That said, .pptx file format can help serve these purposes too.

2. How to Save a PowerPoint Presentation as PDF

Saving a PowerPoint presentation in PDF format is the suitable method for printing out your presentation. To save the PowerPoint presentation as a PDF file, follow the 4 easy steps.

Step-1: Click on the “File” Tab

Explanation:

when using selection sort to sort a list with 7 elements, what is the minimum number of assignments to indexsmallest?

Answers

10 is the minimum number of assignments to index smallest.

What is a selection sort?

In computer science, an in-place comparison sorting algorithm is known as selection sort. Its O(n2) time complexity renders it useless on huge lists, which causes it to perform worse than the equivalent insertion sort in general. Selection sort, recognized for its simplicity, occasionally beats more complex algorithms in terms of performance, especially when auxiliary memory is limited.

The method divides the input list into two parts: a sublist of the remaining unsorted items, which fills the remainder of the list, and a sublist of the sorted items, which are built up from left to right at the beginning (left) of the list. The full input list is initially present in both the sorted and unsorted sublists, whereas the sorted sublist is originally empty.

To know more about selection sort visit:

https://brainly.com/question/29659711

#SPJ1

Who is Joe??????????

Answers

In Greenville, South Carolina, Joe Urban oversees the food and nutrition services for the Greenville County Schools. With 76,000 kids enrolled, Greenville County Schools is the largest school district in South Carolina and the 43rd largest in the country.

What are the main work Joe did?

Given that he has consistently shown to be a significant asset to the firm, the 42-year-old veteran of the wrestling business had to be one of the biggest surprises of all the names on the list.

Therefore, Joe and ten other Superstars were allegedly let go by WWE in April as a result of financial cuts.

Learn more about Joe here:

https://brainly.com/question/21580513

#SPJ1

fttp uses fiber-optic cable to provide extremely high-speed internet access to a user's physical permanent location. a. true b. false

Answers

False, FTTP stands for "Fiber to the Premises," which refers to a type of broadband network architecture in which fiber-optic cable is used to provide high-speed internet access directly to a user's premises

What is FTTP?

FTTP stands for "Fiber to the Premises," which is a type of broadband network architecture in which fiber-optic cable is used to provide high-speed internet access directly to a user's premises, such as their home or business.

In an FTTP network, a fiber-optic cable is run from a central network hub to a user's location, providing them with a direct connection to the internet. This allows for much faster and more reliable internet access than is possible with other types of broadband technologies, such as coaxial cable or DSL.

To Know More About Coaxial cables, Check Out

https://brainly.com/question/13013836

#SPJ1

collecting and analyzing information that offers multiple points of view on a topic is known as:_____.

Answers

Data collection is the process of gathering and examining information that presents several viewpoints on a subject.

What is Data collection?

The procedure of acquiring and examining precise data from numerous sources to identify trends, possibilities, and solutions to research problems. The process of acquiring and measuring data on certain variables in an established system is known as data collection or data gathering. Cross-sectional studies gather information from a large number of subjects at one time, whereas longitudinal studies gather information from the same subjects over time, frequently concentrating on a smaller group of people who share a characteristic. Both are beneficial for addressing various kinds of research problems.

To learn more about data gathering from given brainly.com/question/17538970

#SPJ4

VLOOKUP: setting "range_lookup" to FALSE results in VLOOKUP?
a. not reporting errors
b. only returning exact matches
c. only matching text strings
d. not being case sensitive

Answers

Answer:

b. only returning exact matches

during the third or last phase of the aries algorithm, a decision is made about where in the log to start the processing. describe precisely how the record number that this phase begins with is determined

Answers

The ARIES method was developed in response to the industrial needs of database transactions. The three steps of this algorithm are analysis, redo, & undo.

What is an algorithm's straightforward definition?

The process by which a task is completed or an issue is resolved is known as an algorithm. Methods work as a thorough set of instructions that carry out preset actions consecutively in hardware-based or technological procedures. All disciplines of digital technologies heavily rely on algorithms.

Briefing:

Every time an operation is undone, in the third or final phase, also known as the undo phase. A replacement log record is written to the log file for each record, and modifications are undone for each record (using the data in the Undo field). When there are no more live transactions in the transaction table, this phase is finished. To ensure that the database is consistent, transactions that have not been completed are undone during the undo phase. If a log record is obtained for a transaction, prev LSN (previously Sequence Number field) is utilized to locate the subsequent transaction.

After the Undo step is over, the database returns to normal.

To know more about Algorithm visit:

https://brainly.com/question/29927475

#SPJ4

In what circumstance might someone receive an acceptance letter?
O when they have applied for college admission
O when they have an employee quitting their job
O when they are being extended a job offer
O when they have complained to a company about poor service

Answers

The answer is when they have applied for college

Answer:

O when they have applied for college admission

Explanation:

An acceptance letter is typically sent in response to a job offer or college admission application. It is a formal letter that informs the recipient that their application has been accepted and that they have been offered the opportunity to attend a particular college or to take on a specific job. An acceptance letter may also be sent in response to a request for membership in a club or organization.

azure file storage allows for applications to have shared storage using the smb 2.1 protocol. true false

Answers

With the use of the common Server Message Block 2.1 (SMB 2.1) Protocol, files can be shared utilizing the Azure File Service, a cloud-based file storage and sharing service.

Does SMB work with Azure files?

As long as your applications are compatible with the industry-standard SMB and NFS protocols, you may easily replace your on-premises file shares with Azure file shares.

Which Azure versions of SMB 3.0 are used?

Using the common Server Message Block (SMB) Protocol, Azure File Storage provides cloud-based file shares. SMB 3.0 and SMB 2.1 are both supported. With Azure File storage, you can rapidly and inexpensively transfer old applications that depend on file shares to Azure.

to know more about Azure files here:

brainly.com/question/13144160

#SPJ4

3
var1
False
False
True
True
ete the table below:
var2
False
True
False
True
A
var1 and var2 var1 or var2
not var1 and
var2
var1 or not
var2
not (var1 and
not var2)

Answers

There is a match here, indeed. As far as I'm aware, this process is known as short-circuit evaluation, and it refers to the fact that the interpreter will always return false for the entire boolean expression if even one of its components is false.

What takes place when VAR1 == true is true?

However, if the first portion of the conditional statement, var1 == true, is true, which it obviously is, the part of the conditional statement after && is examined. The second component of the condition is currently a setting that it performs (var2 = true).

What distinguishes the true and false operators?

In order to show that its operand is unquestionably false, the false operator returns the bool value true. It's not necessary for the true and false operators to complement one another.

To know more about boolean visit :-

https://brainly.com/question/13265286

#SPJ1

ian, a systems administrator, was checking systems on monday morning when he noticed several alarms on his screen. he found many of the normal settings in his computer and programs changed, but he was sure no one had physically entered his room since friday. if ian did not make these changes, which of the events below is the most likely reason for the anomalies?

Answers

Over the weekend, the backdoor that had been previously installed was used to view the pc and the programs.

Do I really need to say programs?

The proper spelling of "program" in American English. The more typical spelling for the word "program" in Australian nor Canadian English. Although program is frequently used in computing contexts, program is the preferred spelling in British English.

What does a program aim to accomplish?

Your computer would only be able to run the version of windows (system software) without application software (apps), and it would be unable to do any other tasks. A software enables both the user and the machine to carry out daily duties.

To know more about Programs visit :

https://brainly.com/question/11023419

#SPJ4

what is the minimum staffing requirement for a basic life support (bls) with mobile intensive care unit (micu) capability authorized ambulance when operating at a bls level?

Answers

MICU capability level becomes active at full MICU status when staffed by Two Emergency Care Attendants.

What must all EMS providers follow?When staffed with: At least one certified or licensed paramedic and one EMT Basic, an ambulance that is approved at the BLS with MICU capability level becomes operational at full MICU status.Emergency medical service (EMS) protocols are the accepted operating procedures that paramedics and emergency medical technicians (EMTs) must adhere to when assessing, treating, transporting, and delivering patients to definitive care.Critically sick patients are cared for in a MICU, which is a hospital area. We provide medical ICU treatment for patients who have a wide range of illnesses, many of which are life-threatening.

To learn more about Emergency medical service   refer,

https://brainly.com/question/14488605

#SPJ4

which of the following factors underlie the younger-age language-learning advantage? group of answer choices complete lateralization of the language function to the left hemisphere sensitivity to sound variations in languages not regularly heard neural networks becoming dedicated to processing native-language sounds an ability to hear sound variations across all languages

Answers

The advantage of acquiring a language at a younger age is because brain networks become specialized in processing sounds from the native tongue.

How does a child's development change as a result of acquiring a new language?

A youngster will become more adept at acquiring new languages once they have studied and mastered one. Because they can detect linguistic norms and patterns, even when the vocabulary is different, language learners are able to transmit skills from one language to another.

Is learning a language a talent that every youngster ought to possess?

The ability to acquire a language is not one that kids either have or don't. In reality, a variety of internal and environmental factors, ranging from the child's personality to the way language is taught at their school, affect how quickly youngsters pick up a new language.

To learn more about language visit:

brainly.com/question/2714657

#SPJ4

insuring a field is populated with usable data is called what? data validation substantiated data verified schema data data authentication

Answers

Insuring a field is populated with usable data is called data validation.

What is data validation?The process of ensuring that the data entered into a database or other system is accurate and consistent is known as data validation. Data that has been supported by another source, such as an audit trail or a manual review, is referred to as substantial data. Verified data is information that has been examined by a qualified individual for completeness and accuracy. Schema data, which includes columns, rows, keys, etc., is the format or organisation of the data. Data authentication is the process of ensuring that the data is valid and that it was created by the owner or originator and not by another party who might have corrupted or modified it.

To learn more about data validation refer to:

https://brainly.com/question/29746514

#SPJ4

Which company provides a crowdsourcing platform for corporate research and development?
OA.
MTurk
OB.
WikiAnswers
O C.
MediaWiki
OD.
Innocentive

correct answer: D. innocentive

Answers

Answer: D

Explanation: innocentive

1) in ip v4, does the router need to update the ip header checksum hop by hop? why? 2) is aloha good for heavy traffic or light traffic? 3) i took my laptop to willard building, and connected to the penn state wireless lan. what protocol did i use to get my ip address for this connection? 4) in ipv4, how many bits are used to represent the source ip address? what protocol is used to get the mac address of a node based on its ip address?

Answers

Version 4 of the Internet Protocol (IPv4) uses the Internet checksum, also known as the IPv4 header checksum, as a checksum to identify packet header damage.

Why does the IPv4 header contain a checksum field?Version 4 of the Internet Protocol (IPv4) uses the Internet checksum, also known as the IPv4 header checksum, as a checksum to identify packet header damage. It represents the 16-bit outcome of summing the header words and is carried in the IP packet header.At every stage of processing the internet header, this is recalculated and confirmed because some header fields (like time to live) vary. Therefore, before performing any action on a received packet, it is essential to check the IP header checksum at each entity of the network layer (layer 3).

To learn more about  Internet Protocol  refer,

https://brainly.com/question/17820678

#SPJ4


Fill is the inside color of a shape.
O
a. True
B. False

Answers

Answer:

True.

Explanation:

Fill describes the color of the area inside a designated shape. This statement is true.

the correct answer is true

Write a program that asks the user to enter a city name, and then prints Oh! CITY is a cool spot. Your program should repeat these steps until the user inputs Nope.

Answers

Answer:

city = input("Please enter a city name: (Nope to end) ")

while city != "Nope":

   print("Oh!", city, "is a cool spot.")

   city = input("Please enter a city name: (Nope to end) ")

What are the different parts of a URL? Why is it important to understand the different parts?

Answers

Answer:

The different parts of a URL are the protocol, the domain name, the port number, the path, and the query string.

The protocol is the set of rules used to exchange data between a client and a server. The most common protocol used on the web is HTTPS.

The domain name is the unique address of a website. It typically consists of a combination of a domain and a top-level domain, such as example.com.

The port number is an optional part of a URL that specifies the communication port used by the server. It is not typically included in a URL unless it is different from the default port for the protocol.

The path is the part of the URL that specifies the location of a specific resource on the server. It can consist of multiple segments separated by slashes.

The query string is an optional part of the URL that specifies additional information to be sent to the server. It is typically used to pass data to a web application, such as search terms or form data.

It is important to understand the different parts of a URL because they provide information about how to access a specific resource on the web. For example, knowing the protocol and domain name can help you determine the correct way to access a website, and understanding the path and query string can help you navigate to specific resources on that website.

Explanation:

Let's examine what that distinction means in more detail. The required parts of a URL depend to a great extent on the context in which the URL is used. In your browser's address bar, a URL doesn't have any context, so you must provide a full (or absolute) URL, like the ones we saw above.

What must be integrated into an organization’s enterprise resource management solution to allow it to create and maintain regulatory and compliance information from a centralized location?.

Answers

Financial management systems software is  an organization’s enterprise resource management solution to allow it to create and maintain regulatory and compliance information from a centralized location.

What is resource management?Planning, scheduling, forecasting, and optimizing the full resource lifecycle for effective project delivery is the process of resource management. It aids in maximizing resource potential, enhancing firm profitability, and reducing market volatility.Planning, organizing, managing, and assessing a resource's efforts on a project are all parts of the resource management process. Its goal is to efficiently organize, distribute, and schedule an organization's resources.Planning of any pertinent tasks, budgeting, and scheduling are a few examples of resource management.

To learn more about resource management  refer,

https://brainly.com/question/14099157

#SPJ1

when using icacl in the windows cli, what flag shows that a given user can create files?

Answers

The icacls command is used in the Windows Command Prompt to display or modify Access Control Lists (ACLs) for files and directories. It does not have a flag that specifically indicates whether a user can create files.

To see the permissions that a user has on a file or directory, you can use the icacls command with the /grant flag and the name of the user or group. For example:

icacls C:\path\to\file /grant UserName:(permission)

Replace C:\path\to\file with the path to the file or directory that you want to check, and UserName with the name of the user or group that you want to check. The (permission) part of the command specifies the type of permission that you want to check for.

For example, if you want to check whether a user has the ability to create files in a directory, you could use the (F) permission, which stands for "full control":

icacls C:\path\to\directory /grant UserName:(F)

Learn more about icacls  in the window, here https://brainly.com/question/28971265

#SPJ4

In the game, Stars Wars: Knights of the Old Republic, the player becomes a Jedi, decides whether to join the Republic or the Dark Side, and fights battles with light sabers. What category of game does Stars Wars: Knights of the Old Republic most likely belong to?

A.
role-playing game
B.
platformer game
C.
shooter game
D.
puzzle game

Answers

Answer:

A. role-playing game

Explanation:

Stars Wars: Knights of the Old Republic most likely belongs to the category of role-playing games. In a role-playing game (RPG), players assume the role of a character and interact with the game world and other characters to advance the story. RPGs often include elements of character development, decision making, and combat.

which is the correct syntax for mapping drive letter w to a shared folder named accounting on the finance server

Answers

Answer:

net use W: \\Finance\Accounting

Explanation:

a technician is configuring a mobile client to use email through an isp. which port number should they configure to use smtp?

Answers

The  technician is configuring a mobile client to use email through an isp.The port number should they configure to use smtp  TCP port 25

What is port number?The logical address of every programme or process that communicates across a network or the Internet is represented by a port number. On a computer, a network-based programme is uniquely identified by its port number. A 16-bit integer port number is allotted to each application or software. This number can be chosen explicitly by the user, automatically by the operating system, or set as the default for some well-known apps.The main function of a port number is to facilitate data transmission between a network and an application. All outgoing network packets contain application port numbers in the packet header to enable the recipient to recognise the individual application. Port numbers work in conjunction with networking protocols to achieve this.

To learn more about port number refer to:

https://brainly.com/question/29712893

#SPJ4

In Scratch, what is located in the bottom right section of the screen?

A.
code blocks
B.
editor
C.
run/test window
D.
sprite library

Answers

Answer: C

Explanation:

Answer = C. Run/test window

imagine that your project coordinator is using a word processor to review an electronic file of a document you have prepared. the coordinator does not understand the meanings of certain terms you have used in the document. what should the project coordinator do as a reviewer?

Answers

Project coordinator should do as a reviewer, Use the comment feature to ask "Will the reader understand this term?".

How do you use comment feature?The benefit of using the comments feature in word processing programmes is that it offers a simple and efficient way for users to collaborate and make comments on draught documents.An explanation or comment in a computer program's source code that may be viewed by programmers is known as a remark. Compilers and interpreters often disregard them since they were introduced to make the source code simpler for humans to comprehend.A document can have comments added to it without changing the content itself. In the balloons that will show up in the document's margins, you may enter a comment. Additionally, they can be concealed until you wish to modify your article.You may frequently come across the comment symbol (') as you read the code samples. This symbol instructs the Visual Basic compiler to disregard the text or comment that comes after it. Brief explanations are supplied to code as comments for the benefit of readers.

Learn more about comment feature refer to :

https://brainly.com/question/28525289

#SPJ4

plllsssssss i have a test rn for computer science in code hs 3.2.1: Fetch
pllss i need the answer asap tyy

Answers

Using the knowledge in computational language in python it is possible to write a code that made the functions and  Fetch.

Writting the code:

def getInfo(sc: SparkContext, startDate:String, cachingValue: Int, sparkLoggerParams: SparkLoggerParams, zkIP: String, zkPort: String): RDD[(String)] = {{

val scan = new Scan

   scan.addFamily("family")

   scan.addColumn("family","time")

   val rdd = getHbaseConfiguredRDDFromScan(sc, zkIP, zkPort, "myTable", scan, cachingValue, sparkLoggerParams)

   val output: RDD[(String)] = rdd.map { row =>

     (Bytes.toString(row._2.getRow))

   }

   output

 }

def getHbaseConfiguredRDDFromScan(sc: SparkContext, zkIP: String, zkPort: String, tableName: String,

                                   scan: Scan, cachingValue: Int, sparkLoggerParams: SparkLoggerParams): NewHadoopRDD[ImmutableBytesWritable, Result] = {

   scan.setCaching(cachingValue)

   val scanString = Base64.getEncoder.encodeToString(org.apache.hadoop.hbase.protobuf.ProtobufUtil.toScan(scan).toByteArray)

   val hbaseContext = new SparkHBaseContext(zkIP, zkPort)

   val hbaseConfig = hbaseContext.getConfiguration()

   hbaseConfig.set(TableInputFormat.INPUT_TABLE, tableName)

   hbaseConfig.set(TableInputFormat.SCAN, scanString)

   sc.newAPIHadoopRDD(

     hbaseConfig,

     classOf[TableInputFormat],

     classOf[ImmutableBytesWritable], classOf[Result]

   ).asInstanceOf[NewHadoopRDD[ImmutableBytesWritable, Result]]

 }

See more about python at brainly.com/question/18502436

#SPJ1

When I want to view the Internet, I use this tool that converts html code into a visual format for users to view and interact with

URL
search engine
directory
browser

Answers

Answer:

browser

Explanation:

the URL is the address that you either type or copy into the address line of the browser.

you can usually use a search engine as a web page (and using its URL address) in your browser

and yes, when clicking on a link of the result of a search in a search engine this results in a copy of that URL of the link into the address line of your browser (either for a new tab or window or in the existing window).

a directory is just a list of content either in your file browser or on a web page/service in your web browser.

Other Questions
Find the surface area of a square pyramid with a side length of 5cm and slant height of 6cm. Find the root of the polynomial by factoring (if you can give steps thatd be great) what were some unintended results of the Latin American revolutions whats the sum of 1 3/5 + 8 1/2 When parameters are passed between the calling code and the called function, parameters and arguments are matched by The principal P is borrowed and the loan's future value A at time t is given. Determine the loan's simple interest rater.P = $6000.00, A = $6180.00, t = 1 year% (Round to the nearest tenth of a percent as needed.) During an investigation a scientist heated 2.76 g of silver carbonate till it decomposed to leave a silver residue. The total mass of the silver residue formed was 2.16 g. Does the law of conservation of mass hold true in this case? Shared values and beliefs that are in direct opposition to the values of the broader organizational culture represent a:A subculture.B counterculture.C weak culture.D strong culture. Who is the clause talking to? How do you kWhile the largest numbers of immigrants were who entered the United States through in the East, Western cities such as San Francisco became known as the center of immigration. immigrants who entered the country at in the West often faced lengthy detentions and harsh interrogations as a result of discriminatory immigration laws.now? Hola! Me llamo Miranda y soy de Estados Unidos. El verano pasado visit Costa Rica con mi familia. El animal que vimos fue el mono araa. La caza, la deforestacin y el uso de estas especies exticas como mascotas son algunas de las causas por las que esta especie est en vas de extincin. El mono araa come flores e insectos. La deforestacin no permite a los monos araas tener sus hbitats. Yo estoy escribiendo a mis amigos sobre por qu no es bueno tener un mono araa como mascota. Iguana is to lizard as vowel is to A light shines on a metal surface but no electrons are observed to be leaving. What would we need to do experimentally to eject electrons from the surface?. What is NOT a result of the Reformation and/or theCounterreformation?The Peace of AugsburgO The Reformations led to political, religious, and social changes in Europe.1The Thirty Years WarGermany becomes the dominate world power during the 17th centuryConflicts between Catholicism and Protestantism caused prolonged war for much of the 16th centuryNone of the above (they were all results of the reformation) what factor appears to be leading to the increased perception of biculturalism as a desirable identity? Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on. Read the following excerpts from Frederick Douglass' text "What to a Slave is the Fourth of July?" and answer the question that follows. Fellow-citizens, above your national, tumultuous joy, I hear the mournful wail of millions! whose chains, heavy and grievous yesterday, are, to-day, rendered more intolerable by the jubilee shouts that reach them. If I do forget, if I do not faithfully remember those bleeding children of sorrow this day, "may my right hand forget her cunning, and may my tongue cleave to the roof of my mouth!" To forget them, to pass lightly over their wrongs, and to chime in with the popular theme, would be treason most scandalous and shocking, and would make me a reproach before God and the world. My subject, then, fellow-citizens, is American slavery. I shall see this day and its popular characteristics from the slave's point of view. Standing there identified with the American bondman, making his wrongs mine, I do not hesitate to declare, with all my soul, that the character and conduct of this nation never looked blacker to me than on this 4th of July! Whether we turn to the declarations of the past, or to the professions of the present, the conduct of the nation seems equally hideous and revolting. America vis false to the past, false to the present, and solemnly binds herself to be false to the future. Standing with God and the crushed and bleeding slave on this occasion, I will, in the name of humanity which is outraged, in the name of liberty which is fettered, in the name of the constitution and the Bible which are disregarded and trampled upon, dare to call in question and to denounce, with all the emphasis I can command, everything that serves to perpetuate slavery the great sin and shame of America! "I will not equivocate; I will not excuse"; I will use the severest language I can command; and yet not one word shall escape me that any man, whose judgment is not blinded by prejudice, or who is not at heart a slaveholder, shall not confess to be right and just At a time like this, scorching irony, not convincing argument, is needed. O! had I the ability, and could reach the nation's ear, I would, to-day, pour out a fiery stream of biting ridicule, blasting reproach, withering sarcasm, and stern rebuke. For it is not light that is needed, but fire; it is not the gentle shower, but thunder. We need the storm, the whirlwind, and the earthquake. The feeling of the nation must be quickened; the conscience of the nation must be roused; the propriety of the nation must be startled; the hypocrisy of the nation must be exposed; and its crimes against God and man must be proclaimed and denounced. What, to the American slave, is your 4th of July? I answer; a day that reveals to him, more than all other days in the year, the gross injustice and cruelty to which he is the constant victim. To him, your celebration is a sham; your boasted liberty, an unholy license; your national greatness, swelling vanity; your sounds of rejoicing are empty and heartless; your denunciation of tyrants, brass fronted impudence; your shouts of liberty and equality, hollow mockery; your prayers and hymns, your sermons and thanksgivings, with all your religious parade and solemnity, are, to Him, mere bombast, fraud, deception, impiety, and hypocrisya thin veil to cover up crimes which would disgrace a nation of savages In a well-written paragraph of 710 sentences, identify and evaluate Douglass' use of two rhetorical devices and one rhetorical appeal. Trade and Specialization Introduction: Think about the terms you have learned regarding trade and specialization. Match each term with the example that best describes it. import opportunity cost export trade T Ecuador sells bananas to other. countries. The United States buys bananas from another country. Ecuador and the United States buy and sell to each other. The United States sells wheat instead of bananas. What is the value of x in the equation 2/3 (1/2+ 12) = 1/2(1/3x +14) - 32 What is defined as the process of influencing others to understand and agree about what needs to be done while facilitating individual and collective efforts to accomplish shared objectives?A. Psychological empowermentB. Managerial leadershipC. Passive leadershipD. Socialized power A company sells a product for $3. The company prepares a flexible budget at two sales volumes. At a sales volume of 50 units, budgeted sales will be $___________. At a sales volume of 60 units, budgeted sales will be $__________.($3 x 50 units) = $150($3 x 60 units) = $180