Correct this code-
from earsketch import *

setTempo(120)
innit()
setTempo (120)
def sectionA(startMeasure, endMeasure):
setEffect(1, DISTORTION, DISTO_GAIN, 2, 1)

drums1 = CIARA_MELANIN_THEME_ TUBA_2
drums2 = CIARA_MELANIN_DRUMBEAT_1
synth = (RD_FUTURE_DUBSTEP_SUBBASS_2)

fitMedia(drums1, 1, startMeasure, endMeasure)
fitMedia(drums2, 3, startMeasure + 5, startMeasure + 9)
fitMedia(synth, 3, 17, 29)

#Delay
setEffect(1, DELAY, DELAY_TIME, 350)

beat1 = "-00-00+++00--0-0-00--00-00+"
beat2 = "0--0--000-000--00-0--00-0-0"

#Beat Pattern of audio every quarter note
beatPattern = "0+++0+++0-000+00"

for measure in range(1, 45, 2):
makeBeat(drums2, 2, measure, beatPattern)

sectionA(1, 15)

sectionA(31, 46)

finish()

Answers

Answer 1

Answer:

from earsketch import *

setTempo(120)

init() # fixed spelling of function name

setTempo(120) # removed unnecessary second call to setTempo

def sectionA(startMeasure, endMeasure):

   # added indentation to the next line

   setEffect(1, DISTORTION, DISTO_GAIN, 2, 1)

drums1 = CIARA_MELANIN_THEME_TUBA_2 # fixed spelling of variable name

drums2 = CIARA_MELANIN_DRUMBEAT_1 # fixed spelling of variable name

synth = RD_FUTURE_DUBSTEP_SUBBASS_2 # removed unnecessary parentheses

fitMedia(drums1, 1, startMeasure, endMeasure)

fitMedia(drums2, 3, startMeasure + 5, startMeasure + 9)

fitMedia(synth, 3, 17, 29)

#Delay

setEffect(1, DELAY, DELAY_TIME, 350)

beat1 = "-00-00+++00--0-0-00--00-00+"

beat2 = "0--0--000-000--00-0--00-0-0"

#Beat Pattern of audio every quarter note

beatPattern = "0+++0+++0-000+00"

# added range end value

for measure in range(1, 45, 2):

   makeBeat(drums2, 2, measure, beatPattern)

sectionA(1, 15)

sectionA(31, 46)

finish()


Related Questions

The integrity of a program's output is only as good as the integrity of its input. For this reason the program should discard input that is invalid and prompt the user to enter correct data. (true or false)
Most studied answer

Answers

This is a true statement because the integrity of the output of a program is only as good as the integrity of its input. For this reason, the program should discard input that is invalid and prompt the user to enter the correct data.

The given statement is true in that a program carries out input data integrity before proceeding to obtain the output. Input integrity refers to the process of checking the data that has been entered into a program to ensure it is valid, accurate, and complete before any computation performs to get output. Since the output of the program is completely dependence on the accuracy of the data entered as input.

Therefore, the given statement is true which states that a program's output data integrity depends on its input data integrity, for this reason, the program discards invalid input and promots the user to input accurate and valid data.

You can learn more about data integrity at:

https://brainly.com/question/14898034

#SPJ4

True

The integrity of a program's output heavily depends on its input's integrity. The program may produce incorrect or unexpected results if the input is invalid or incorrect. Therefore, it is often important for a program to validate its input and discard invalid data. This can help ensure that the program produces reliable and accurate output.

However, there may be situations where it is not practical or necessary to validate all input or where the consequences of invalid input are not significant. In these cases, discarding invalid input may not be necessary and prompt the user to enter the correct data. It is important to consider the specific requirements and constraints of the program and the potential impact of invalid input on the program's output.

read more about this at https://brainly.com/question/14282557

#SPJ4

You've just connected a USB wireless network adapter to a Windows desktop system in your home office. You want to use the Windows Connect Now (WCN) push-button connect feature to connect your desktop to your wireless network. Which technology must be implemented on both the wireless access point and the wireless network interface to enable this feature?

Answers

Wi-Fi Protected Setup (WPS) technology must be implemented on both the wireless access point and the wireless network interface to enable this feature.

What is Wi-Fi Protected Setup (WPS)?

WPS stands for Wi-Fi Protected Setup, a network security standard that makes connecting devices to a wireless network easier. It allows users to add devices to their Wi-Fi networks in seconds without having to enter long passwords.

One critical distinction is that WPS only handles the transmission of connection data between a router and a client device. It is not in charge of the Wi-Fi connection.

The Wi-Fi Alliance introduced the WPS standard in 2006, and it has since been adopted by all manufacturers of Wi-Fi equipment. As a result, WPS has become a standard feature on all wireless routers and mesh Wi-Fi systems.

To learn more about Wi-Fi Protected Setup (WPS), visit: https://brainly.com/question/21272192

#SPJ4

22. Copying formulas saves a lot of time. Which of the following is a method for copying a formula?
a.
Ctrl+c to copy the formula, Ctrl+v to paste the formula.
b. Drag the Fill Handle down, up, left or right to copy a formula.
C.
Press the Copy button on the Ribbon to copy the formula and the Paste button on the Ribbon to Paste it.
All of the above options are correct.
d.

Answers

a!!! it’s the only one that rlly makes sense . the other ones are wrong because there’s only like 2 ways to copy paste on pc

Problem: Develop a program that utilizes random number generators to play number guessing games with the user. The user has two game choices - Pick 1 and Pick 3. The table below details the rules for each game. The program should allow the user to continue playing until the user wishes to end the program or the user has reached the cap (i.e. $100). The program should produce a report indicating the total wining prizes as well as subtotal prizes from each game (i.e. one for Pick 1 and one for Pick 3). Use at least FIVE different functions besides the main function to complete this project.



Game


How to Play


Number Range


Winning Rule

(Only the highest prize can be claimed)


Pick 1


user enters one number within the allowed range


0 through 50


$5 - number matched


Pick 3


user enters 2 regular numbers and one special number (all numbers need to be different)


regular number - 1 through 60

special number - 1 through 30 except 7 and 13


$5 - only the special number matched

$20 - two regular numbers matched

$50 - one regular number AND the special number matched

$100 - all numbers matched


this is C++ please help me with the code

Answers

A program that utilizes random number generators to play number guessing games with the user will be:

#include

#include

#include

using namespace std;

int main()

cout << "\n\t\t\tWelcome to GuessTheNumber game!"

<< endl;

cout << "You have to guess a number between 1 and 100. "

"You'll have limited choices based on the "

"level you choose. Good Luck!"

<< endl;

while (true) {

cout << "\nEnter the difficulty level: \n";

cout << "1 for easy!\t";

cout << "2 for medium!\t";

cout << "3 for difficult!\t";

cout << "0 for ending the game!\n" << endl;

// select the level of difficulty

int difficultyChoice;

cout << "Enter the number: ";

cin >> difficultyChoice;

// generating the secret number

srand(time(0));

int secretNumber = 1 + (rand() % 100);

int playerChoice;

// Difficulty Level:Easy

if (difficultyChoice == 1) {

cout << "\nYou have 10 choices for finding the "

"secret number between 1 and 100.";

int choicesLeft = 10;

for (int i = 1; i <= 10; i++) {

// prompting the player to guess the secret

// number

cout << "\n\nEnter the number: ";

cin >> playerChoice;

// determining if the playerChoice matches

// the secret number

if (playerChoice == secretNumber) {

cout << "Well played! You won, "

<< playerChoice

<< " is the secret number" << endl;

cout << "\t\t\t Thanks for playing...."

<< endl;

cout << "Play the game again with "

"us!!\n\n"

<< endl;

break;

}

else {

cout << "Nope, " << playerChoice

<< " is not the right number\n";

if (playerChoice > secretNumber) {

cout << "The secret number is "

"smaller than the number "

"you have chosen"

<< endl;

}

else {

cout << "The secret number is "

"greater than the number "

"you have chosen"

<< endl;

}

choicesLeft--;

cout << choicesLeft << " choices left. "

<< endl;

if (choicesLeft == 0) {

cout << "You couldn't find the "

"secret number, it was "

<< secretNumber

<< ", You lose!!\n\n";

cout << "Play the game again to "

"win!!!\n\n";

}

What is a program?

C++ is a powerful general-purpose programming language. It can be used to develop operating systems, browsers, games, and so on. The best programming language for developing embedded system drivers and applications is C.

This language is the most widely used due to the availability of machine-level hardware APIs, C compilers, dynamic memory allocation, and deterministic resource consumption.

Learn more about program on:

https://brainly.com/question/1538272

#SPJ1

a user is complaining about a clicking noise from inside her computer. you open up the case and find that the noise is coming from the hard drive. which of the following actions should you take to deal with this issue

Answers

An uneven case surface that causes fan blade and motor noise, dust buildup that needs to be cleaned.

The motion to read and write data from the disc should be fluid when the actuator is in operation. When this movement isn't as smooth, the actuator tries to reset itself frequently. This is what causes the well-known hard disk clicking sound. In most situations, this is the source of your hard disk noise.

A broken or faulty equipment, on the other hand, will make a succession of short, sharp sounds, or clicks. These sounds, known as a hard disk "click of death," usually signify a mechanical breakdown. A clicking hard disk can also result in data loss if left ignored.

A failing hard disk has developed from a clicking noise in your computer to a grinding noise. Furthermore, you are seeing more error warnings while running applications, and your computer periodically stops.

Learn more about hard disk here https://brainly.com/question/14867477

#SPJ4

What do you do to boost cybersecurity?

Answers

enforce password rules, use a vpn, retire all unused services, etc

Which operating system is not proprietary and does not rely on cloud-based applications?
Question 2 options:
a. Windows

b. Chrome

c. macOS

d. Linux

Answers

Option A just yoke the test
Answer is = A windows

[window title] remote desktop connection [content] an internal error has occurred. [^] hide details [ok] [expanded information] error code: 0x4 extended error code: 0x0 timestamp (utc): 11/28/22 03:21:28 pm press ctrl c to copy.

Answers

1)Allow remote connections. 2)Change Remote Desktop connection settings. 3)Allow the Windows Firewall to connect to RDP. 4)Leave and re-join a domain. 5)Restart the Remote Desktop Services service.

What is remote desktop service?

The term "remote desktop" in computing refers to a software- or operating-system functionality that enables a desktop environment on a personal computer to be run remotely off of one system and shown on a different client device. The key element of Windows Server 2008 that permits communication with and access to virtual machines is known as the remote desktop service. Remote Desktop Services refers to a feature of Microsoft Windows Server that offers remote access to graphical desktops and Windows apps (RDS).

RD Gateway creates an encrypted link between remote users and Amazon Elastic Compute Cloud (Amazon EC2) instances running Microsoft Windows without the need for a virtual private network (VPN).

To know more about remote desktop service visit:

https://brainly.com/question/29479708

#SPJ1

A requested task is subject to be reported when:

Requesting for a screenshot

When it is asking for 3 proofs

When it contain an expired offer

When it requested for an app to be tested

Answers

A requested task may be reported if the links take you to a different offer than what is described in the steps.

What is requested task?A Task Request is a formal document used by a manager to define how much extra work an assigned employee is expected to perform in addition to routinely scheduled tasks and jobs.A request is one that includes several tasks. Each task is a single type of object that is released to the request. Once the tasks are assigned to the request, it can be transported.When workers are chosen to perform a campaigning task, it is not acceptable to ask them to use their credit cards or reveal credit card information. Similarly, they should not be compelled to reveal personal information such as their social security number.

To learn more about requested task refer to :

https://brainly.com/question/20052358

#SPJ1

If you could design a different type of virtual memory addressing system, mapping physical memory to virtual memory, what would that look like? Please explain what you would do differently and what you would keep the same as what is normally done.
In your responses to your peers, compare and contrast your answer to those of your peers.
Your Discussion should be a minimum of 200 words in length and not more than 500 words. Please include a word count. Provide references.

Answers

The physical memory will be divided into segments in a segmentation-based system, and each sector will be translated to a different area of the memory space.

How much memory can be addressed?

The number of equipped in the CPU is just one of several variables that affect a device's memory capacity. 32-bit CPUs can only address memory with a size of up to 4 GB. A 64-bit computer has a limitless amount of memory. Memory capacity is also influenced by operating systems.

What kind of address is in memory?

A memory address's data type is a reference, which is indicated by the type to which it points and an asterisk (*).

To know more about memory address visit:

https://brainly.com/question/22079432

#SPJ1

Determine whether the statement is true or false. If f has an absolute minimum value at C, then f'(c) = 0. True False

Answers

The statement  on the absolute minimum value is False.

Absolute Minima and Maxima:

We occasionally encounter operations with hills and valleys. Hill and valley points in polynomial functions typically have many locations. We are aware that these places, which can be categorized as maxima or minima, are the function's crucial points. The valley points are referred to as minimas and the hill points as maxima. We must determine the locations of the function's global maxima and global minima, which are known as the minimum and maximum values, respectively, due to the fact that there are several maxima and minima.

Critical Points:

When the derivative of a function f(x), for example, reaches 0, those locations are said to be its crucial points. Both maxima and minima are possible for these places. The second derivative test determines if a crucial point is a minima or maximum. Since the derivative of the function might occur more than once, several minima or maxima are possible.

Extrema Value Theorem:

Under specific circumstances, the extrema value theorem ensures that a function has both a maximum and a minimum. Although this theorem just states that the extreme points will occur, it does not specify where they will be. The theorem asserts,

If a function f(x) is continuous on a closed interval [a, b], then f(x) has both at least one maximum and minimum value on [a, b].

To know more about minima and maxima visit:

https://brainly.com/question/29562544

#SPJ4

according to research firm gartner, the majority of loss-causing security incidents involve the handiwork of international cyber-criminal gangs.

Answers

According to research firm Gartner, the majority of loss causing security incidents involve the handiwork of international cyber criminal gangs. (False)

What are cyber criminal?

Cybercriminals are individuals or groups of people who use technology to carry out nefarious acts on digital networks or systems with the goal of stealing confidential business information or personal data and making money.

It is well known that cybercriminals use the deep web's cybercriminal underground markets to exchange harmful products and services, like hacking tools and data that has been stolen. It's well known that some goods or services are specialized in the underground markets operated by cybercriminals.

In many nations around the world, laws pertaining to cybercrime are still changing. The task of locating, apprehending, accusing, and establishing cybercrimes poses a constant challenge to law enforcement agencies.

Learn more about cybercriminals

https://brainly.com/question/23326398

#SPJ4

What factors or characteristics do you think are necessary to succeed in the Metaverse from a business perspective?

Answers

From a business perspective, the factors or characteristics that are necessary to succeed in the Metaverse from a business perspective are to spot the needs of players within the metaverse, examine trends, and build businesses around those.

What is the Metaverse?

The metaverse is a fictional incarnation of the Internet as a single, ubiquitous, and immersive virtual environment made possible by the usage of virtual reality and augmented reality headgear. A metaverse is a network of 3D virtual environments centered on social connection.

The metaverse is a computer industry concept of the next version of the internet: a single, shared, immersive, permanent, 3D virtual place where humans may experience life in ways they cannot in the physical world.

Given that the Metaverse is supposed to be a mirror of reality, it thus would make business sense for commercial needs within the metaverse to be catered for by virtual businesses within the same environment.

Learn more about Metaverse:
https://brainly.com/question/29340413
#SPJ1

Employees at a video streaming website suspect that users on desktop computers spend more time on their website than users on mobile devices. They plan on taking a large random sample of users to see if their suspicions are correct. What type of study is this, and what is the explanatory variable?

Answers

This is an observational study where type of device is the explanatory variable.

What is explanatory variable?

A specific class of independent variable is an explanatory variable. Frequently, both words are used in the same sentence. The two, however, differ in a subtle way. Any other variables have no bearing on an independent variable at all. It is an explanatory variable when a variable cannot be independently determined.

Consider the case where soda and fast food were the two factors you used to explain weight gain. In spite of what you might believe, soda consumption and fast food consumption aren't actually unrelated.

Because they tempt you to buy a soda along with your meal, fast food restaurants are to blame. A lot of fast food options, such as nachos or hot dogs, are frequently available if you stop somewhere to buy a soda.

Learn more about explanatory variable

https://brainly.com/question/1529707

#SPJ1

To cut or copy text first

Answers

Answer:

The cut command removes the selected data from its original position, while the copy command creates a duplicate; in both cases the selected data is kept in temporary storage (the clipboard). The data from the clipboard is later inserted wherever a paste command is issued.

Consider the following program code:
x = 9
y = 3
temp = x
x = y
y = temp

What are the values of x and y as a result of this program code?

Answers

The values of x and y as a result of this program code are x = 3 and y = 9

How to determine the values of x and y in the program code

From the question, we have the following parameters that can be used in our computation:

x = 9

y = 3

temp = x

x = y

y = temp

Next, we analyze the code segment one after the other

x = 9 ⇒ this means that the value of x is 9y = 3 ⇒ this means that the value of y is 3temp = x ⇒ this means that the of temp is x i.e. temp = 9x = y ⇒ this means that the of x is y i.e. x = 3y = temp ⇒ this means that the of y is temp i.e. y = 9

Using the above as a guide, we have the following:

x = 3 and y = 9

Hence, the values are x = 3 and y = 9

Read more about code segments at

https://brainly.com/question/29104073

#SPJ1

Does the method call in the following method cause compile errors?
public static void main(String[] args) {Math.pow(2, 4);}
A. Yes
B. No

Answers

The method call in the following method cause compile errors of: public static void main(String[] args) {Math.pow(2, 4);} is B. No.

What is an example of a build error?

When there is Missing parenthesis, omitting a semicolon, using undeclared variables, and other examples are compile-time mistakes. All of these mistakes are found during compilation, and the compiler displays the appropriate error.

Therefore, compile error occurs when the compiler alerts you to a problem with your software but fails to translate it into machine language. Compile errors will appear and thus the response is No.

Learn more about compile errors from

https://brainly.com/question/29453137
#SPJ1

A local variable is printed outside its function. What is the output?
A global version of the variable
Both local and global versions of the variable
The local variable
The output is not defined
In which of the following cases should an import statement not be used?

For a library module needed in a code
For a package with functions from the libraries
For code from Python libraries
For redefining a function called in a code
Select a circumstance when placing a comment inside your code is not justified.

When mentioning useful information that is not in the code
When referencing obscure logic to make sure others follow the code
When stating a simple fact in the code
When using block comments for a longer explanation of the code
For the program below, suppose shipping=200. What is the program output?

def main():
shipping = int(input("Please enter shipping distance."))
if shipping <= 200:
print("We can ship your package!")
else:
print("We are sorry, but we cannot ship your package.")

main()

200
Please enter shipping distance.
We are sorry, but we cannot ship your package.
We can ship your package!

Answers

Answer:

Output: We can ship your package

Explanation:

Since the 200 its greater than or equal to shipping.

Which command will you choise to convert a column of data into row

Answers

A command which you should choose to convert a column of data into row is: B. Edit >> Paste Special >> Transpose.

What is a spreadsheet?

In Computer technology, a spreadsheet can be defined as a type of computer document which comprises cells that are arranged in a tabulated format with rows and columns.

Additionally, a spreadsheet is typically used in various field to do the following on a data:

FormatArrangeSortCalculate

In this scenario, the set of commands in ascending order that can be used by an end user for the conversion of a column of data into row include the following;

EditPaste Special Transpose

Read more on spreadsheets here: brainly.com/question/2996234

#SPJ1

Complete Question:

Which command will you choose to convert a column of data into row?

A.Cut and Paste

B. Edit >> Paste Special >> Transpose

C.Both of above

D. None of above

Identify a Web page with an active rollover image and where it is located and describe the image

Answers

The Web was initially just text, which was incredibly boring. Thankfully, it didn't take long for the option to include photographs (as well as other more intriguing sorts of material) inside web pages.

What does a website rollover image mean?

Rollovers are graphic elements that improve the aesthetics of a website and convey navigational information. As an indication that the picture is a link and can take the visitor to another part of the website, the Rollover changes when the user's mouse moves over the image.

What does HTML rollover mean?

When a user rolls their mouse pointer over a graphical picture, rollover is a JavaScript technique used by Web developers to create the desired effect. The term "rollover" can also refer to a button on a website that enables user and website interaction.

to know more about rollover here:

brainly.com/question/28902915

#SPJ1

what is the maximum file size supported by a file system with 20 direct blocks, single, double, and triple indirection? The block size is 1024 bytes. Disk block numbers can be stored in 4 bytes.

Answers

Answer:

We have, block size = 512

number of block numbers in an indirection block

= block size / 4

= 128

number of blocks for file data in that file object

= 16 + 128 + 128^2 + 128^3

Maximum file size:

(direct + single indirect + double indirect + triple indirect) * (blocksize)

= (16 + 512/4 + (512/4)^2 + (512/4)^3) * (512)

= 68853964800 bytes, ~64 gigs

Explanation:

Answer:

64 gigs

Explanation:

Ur mum!

the following code checks if the value in memory address x3025 is equal to 32, and if so, it prints a message to the screen. however, it has a bug.

Answers

LDI R1, ADDRESS    ; R1 = value in address 0x3025

ADD R1, R1, #-32    ; so R1 = R1 - 32

BRnp FINISH    ; branch if above result is either positive or negative.

Hence above line is logically not correct. We should check for zero by writing BRz FINISH i.e branch if zero.

So line 4 has a bug. It can be fixed by writing,  BRz FINISH .

What is computer bug?

A bug is a coding error in a computer program in computer technology. (We define a program as including the microcode that is built into a microprocessor.) Debugging is the process of finding bugs before users do. Debugging begins after the code is written and progresses in stages as the code is combined with other programming units to form a software product, such as an operating system or an application.

Bugs are frequently found after a product has been released or during public beta testing. When this happens, users must either avoid using the faulty code or obtain a patch from the software developers.

To know more about Debugging, visit: https://brainly.com/question/28159811

#SPJ4

a common technique to clear a float within a container element is to add a line break (
) element configured with the clear property; if cleared with
it is coded before the closing

Answers

The <br>  HTML element causes a line break in the text.

What are tags in HTML?HTML tags are used to keep the HTML element in place. The HTML element contains the content. HTML attributes are used to describe an HTML element's properties in detail. HTML tags begin with < and end with >. Whatever is written within an HTML tag is an HTML element.In HTML, four tags are required. These are the html tags, title, head, and body. The table below displays the opening and closing tags, as well as a description and an example. These are the tags that go at the start and end of an HTML file.If you want to start a new line, you must use the <br>  to insert a line break. In the document, the tag inserts a single carriage return or breaks. This component has no end.

To learn more about HTML tags refer to :

https://brainly.com/question/13153211

#SPJ4

Examine the experience of shopping online vs shopping in traditional environment. Imagine that you have decided to purchase a digital camera or any other item of your choice, first shop for the camera in traditional manner.
Describe how you would do so (eg: how would you gather the necessary information, you would need to choose the particular item, what stores you would visit, how long it would take, price etc)
Next, shop for the item on the web or via a mobile app.
Compare and contrast your experiences, what were the advantages and disadvantages of each.
What would prefer and why?

Answers

Answer:

Explanation:

If I had to buy, let’s say an iPad, I would visit the official store. First of all, I would take a closer look at the product, revising it carefully, if it feels right and if it meets my needs. Then I would ask for the price if they have a discount or any sale upcoming or payment plan. If everything meets my requirements I would buy the item. On the other hand, if there weren’t any official stores around the place I live in, I would visit three different department stores, preferably where they have the product of my interest displayed, also I would ask about the price and/or payment plan or discounts and availability. I must mention that cost is an important aspect to make a decision on where to buy the item. All of this process would take about 1 or 2 days at most.

Advantages

-You can see, feel, check the product to dissipate any doubts, there are people willing to answer any question and help to make a better choice.  

Get the product at the same moment you are paying for it and if you want to you can use/wear it immediately.

Disadvantages

If they are out of stock of the item of your interest, there is a chance you will have to wait a long time for it, although it could happen the store won’t have the product available again.  

The offers are not as wide as on the web sites.

Shopping on the web or via a mobile app

It is almost the same as shopping in a traditional manner, the greater differences are that there are more virtual places/shops online to compare prices and availability and sometimes they have great offers, because of the competition. Generally, the items are cheaper than a department store.

This process could take about a week, especially if you are waiting for a specific offer.

Advantages

There are lots of options, lots of different online stores, that increase the chances to get a good offer or an item with better characteristics at the same price; if you don’t find availability in one web you can find it in another in no time.

There is no need to leave your house or put on pause your busy schedule, as you will receive the item at your door.

Disadvantages

You can’t check the product given they only display a few pictures of it and a brief description, there is no one to answer your doubts about the item, basically, the decision relies on your research and recommendations of the product.

After making your purchase, you will have to wait a few days to receive your item at home or the workplace. Sometimes happens the store confuses your order sending a different product or other with different characteristics, resulting in having to return the item and wait days to get what you order in the first place.

Explanation:

Which did I prefer and why?

Considering the advances in technology, I prefer to shop online, there I can find what I'm looking for and of course, they have a great offers, too. Besides, with day to day occupations I barely have time to go to a department store, so is easier to access using a computer or an app on the smartphone.

for 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts.

Answers

For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts: True.

What is 802.11ac?

In Computer networking, 802.11ac is one of the wireless network standards which was developed by the Institute of Electrical and Electronics Engineers (IEEE) to operate on a 5 GHz microwave bandwidth (frequency) and as a result, it is faster and can transmit over a long distance.

As a general rule and generally speaking, a wireless security toolkit for 802.11 wireless networks should include all of the following features;

An ability to sniff wireless trafficAn ability to scan wireless hostsAn ability to assess the level of privacy afforded on its network.An ability to assess confidentiality afforded on its network.

Read more on wireless network here: brainly.com/question/18370953

#SPJ1

Complete Question:

For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts. True or False

spreadsheet software for management science assists users by multiple select question. providing a familiar environment bringing management science tools within reach of managers teaching managers mathematical theory.

Answers

The options that apply for the spreadsheet software for management science are:

- Providing a familiar environment- Bringing management science tools within reach of managers.

The Benefits of Spreadsheet Software for Management Science

Spreadsheet software has become an increasingly popular tool for managing data, but it can also be used for management science. Management science is a field of study that looks at how to use data and analytics to make better decisions and improve organizational performance. Spreadsheet software provides a familiar environment that makes it easier for managers to use these tools. It also brings management science tools within reach of managers, so they can make better decisions and focus on the things that really matter in their organizations.

Spreadsheet software is a great tool for managing data, as it allows users to organize, store, and analyze data in one place. This makes it easier for managers to keep track of their data and make decisions based on the information they have. Spreadsheet software also provides powerful tools for data analysis, such as graphing, filtering, and pivot tables. These features can help managers gain insights into their data and make more informed decisions.

Learn more about software:

https://brainly.com/question/28224061

#SPJ4

Create a class called Car that includes three instance variables a model (type
String), a year (type String), and a price (double). Provide a constructor that initializes the three
instance variables. Provide a set and a get method for each instance variable. If the price is not positive,
do not set its value. Write a test application named CarApplication that demonstrates class Car’s capabilities. Create two Car objects and display each object’s price. Then apply a 5% discount on the
price of the first car and a 7% discount on the price of the second. Display each Car’s price again.

Answers

Answer:

Here is an example of a class called Car that includes three instance variables: model (type String), year (type String), and price (double). The class includes a constructor that initializes the three instance variables, as well as set and get methods for each instance variable:

Car.java:

public class Car {

  private String model;

  private String year;

  private double price;

  // Constructor

  public Car(String model, String year, double price) {

     this.model = model;

     this.year = year;

     if (price > 0) {

        this.price = price;

     }

  }

  // Set methods

  public void setModel(String model) {

     this.model = model;

  }

  public void setYear(String year) {

     this.year = year;

  }

  public void setPrice(double price) {

     if (price > 0) {

        this.price = price;

     }

  }

  // Get methods

  public String getModel() {

     return model;

  }

  public String getYear() {

     return year;

  }

  public double getPrice() {

     return price;

  }

}

Here is an example of a test application named CarApplication that demonstrates the capabilities of the Car class:

CarApplication.Java:

public class CarApplication {

  public static void main(String[] args) {

     Car car1 = new Car("Ford", "2020", 30000.0);

     Car car2 = new Car("Toyota", "2019", 35000.0);

     // Display the price of each car

     System.out.println("Car 1: " + car1.getPrice());

     System.out.println("Car 2: " + car2.getPrice());

     // Apply a 5% discount on the price of car 1

     car1.setPrice(car1.getPrice() * 0.95);

     // Apply a 7% discount on the price of car 2

     car2.setPrice(car2.getPrice() * 0.93);

     // Display the price of each car again

     System.out.println("Car 1: " + car1.getPrice());

     System.out.println("Car 2: " + car2.getPrice());

  }

}

Explanation:

When this code is run, it will output the following:

Car 1: 30000.0

Car 2: 35000.0

Car 1: 28500.0

Car 2: 32850.0

prefixes = "BCFHMPRSVT"
suffix = "at"
for p in prefixes:
print(p + suffix)
Since Tat is not a word, the program needs to be changed to print That instead of Tat. Add a conditional statement to make the program print That instead of Tat.

Answers

Answer:

prefixes = "BCFHMPRSVT"

suffix = "at"

for p in prefixes:

   if p == "T":

       print("That")

   else:

       print(p + suffix)

It is often easier to maintain data in a datasheet using a form because all changes for a ____ are the focus at one time. Single record.

Answers

It is often easier to maintain data in a datasheet using a form because all changes for a Single Record are the focus at one time.

What is the definition of a single record in a database?

Records. A Tuple, Record, or Row is a single entry in a table. In a table, a tuple represents a collection of connected data. As a result, Option 1 is right. A record is a horizontal collection of information in a database; the content of those fields is unique to that row.

The most frequent technique to utilize sub-forms is that the main form only displays one record at a time – in a “form” view, not a datasheet view. The sub-forms exhibit all the records on the many side of a one-to-many connection with the main form’s single record.

To learn more about Database Record refer:

https://brainly.com/question/13158607

#SPJ4

Answer

Explanation

The Find and Replace dialog box cannot find background color formatting in tables that was applied using __________ or formatting that is applied based on ____________
table style, conditional formatting

Answers

The Find and Replace dialog box cannot find background color formatting in tables that were applied using table style or formatting that is applied based on conditional formatting.

The Find and Replace a dialog box is a powerful tool for quickly searching and replacing multiple words or phrases in a document. However, it cannot find background color formatting that has been applied to tables using table style or formatting based on conditional formatting.

This is because the Find and Replace dialog box only searches for text and not formatting. To find and replace background color formatting applied to tables, you will need to use the Formatting pane, which allows you to search for all formatting, including the background color.

For more questions like Conditional formatting click the link below:

https://brainly.com/question/16014701

#SPJ4

Other Questions
True or false: an investor calculates an incremental return of renovating a building of 14 percent. other properties provide a 12.5 percent overall rate of return to equity investors. therefore, the property is a good investment. Which political trend do the maps show in the united states from 1848 to 1860? a. Nationalism that kept the northern states in the union a. Nationalism that kept the northern states in the union b. An increase in northern support of the democratic party b. An increase in northern support of the democratic party c. An increase in southern support of the democratic party c. An increase in southern support of the democratic party d. Sectionalism that led to the secession of the southern states d. Sectionalism that led to the secession of the southern states. Facts about Mughal Empire Humayun and Akbar any thing can help You want to prove a theorem in a two-column proof. You start with your given statement and list deductions in the left-hand column. What are the three main types of reasoning you will use for reasons in the right-hand column?In an indirect proof, you prove an "if-then" statement is true by assuming the statement is false (stating the inverse or converse), and then disproving the false statement. You want to prove the statement shown below in an indirect proof. What statement should you prove is false? (1 point)Statement to Prove True: If a figure has exactly three sides, then it is a triangle.Statement to Prove False They were expensive combs, she knew., and her heart had simply craved and yearned over them without the least hope of possession.Type of Figurative language used:Justify your answer below: 7) What is the better deal? A 12 pack of gatorade for $25.20 or a 15 pack of gatorade for $33? Jada has time on the weekends to earn some money. A local bookstore is looking for someone to help sort books and will pay $12.20 an hour. To get to and from the bookstore on a work day, however, Jada would have to spend $7.15 on bus fare.Write an equation that represents Jadas take-home earnings in dollars, , if she works at the bookstore for hours in one day. One day, Jada takes home $90.45 after working hours and after paying the bus fare. Write an equation to represent this situation. Is 4 a solution to the last equation you wrote? What about 7? If so, be prepared to explain how you know one or both of them are solutions. If not, be prepared to explain why they are not solutions. Then, find the solution. In this situation, what does the solution to the equation tell us? Adriano mixed 19/24 pound of butter with 3/16 pound of honey he ay that he ued 16/8 pound of butter than honey i hi tatement reaonable F(x)=2x-7G(x)=3x-5x-7Find:f(g(x))Express your answer as a polynomial in standard form. Your lab has a 10 X TAE stock solution. You are asked to prepare 30.0 mL of a 1X working solution. How many milliliters of the 10 X stock solution do you need to mix with deionized water to make 30.0 mL of a 1X solution.What volume of water is needed?amount of TAE stock solution? Calculate net worth using the following information.Assets Liabilitiescar - $3,500 car loan - $3,000savings account - $1,000 credit card - $500cash - $80 stock - $120 $1,200$8,200$12,000$500 Philosophies, beliefs, and norms that are explicitly stated by the organization reflects its _____ values.enactedobservedachievedespoused 1. Coreys pay increases from 12.36 per hour to 14.11 per hour. Find the percentage increase to 1 decimal place.2. Dele invests $6000 for 4 years at 3% per annum compound interest. Calculate the value of his investment at the end of 4 years.3. The value of a car depreciates by 14% per annum. At the end of 2017 the car is worth $17500. How much is it worth at the end of 2020? The body is lowered to slide from the top of a smooth steep plane inclined at 45. How long will it take the body to go down the plane of length 2.82m? Test the hypothesis using the P-value approach. Be sure to verify the requirements of the test. H0: P=0.93 versus H1:p0.93 n=500, x=450, a=0.05 Is np0(1-P0) 10? Select the correct choice below and fill in the answer box to complete your choice. A. No because np0(1-P0) equals__ B. Yes, because np0(1-P0) equals__ a man with a blood type marries a woman with b blood type. a. can they have a child with o-type blood? explain. --Lincolns Second Inaugural AddressAbraham Lincoln1 Fellow countrymen: At this second appearing to take the oath of the presidential office, there is less occasion for an extended address than there was at the first. Then a statement, somewhat in detail, of a course to be pursued, seemed fitting and proper. Now, at the expiration of four years, during which public declarations have been constantly called forth on every point and phase of the great contest which still absorbs the attention and engrosses the energies of the nation, little that is new could be presented. The progress of our arms, upon which all else chiefly depends, is as well known to the public as to myself; and it is, I trust, reasonably satisfactory and encouraging to all. With high hope for the future, no prediction in regard to it is ventured.2 On the occasion corresponding to this four years ago, all thoughts were anxiously directed to an impending civil war. All dreaded itall sought to avert it. While the inaugural address was being delivered from this place, devoted altogether to saving the Union without war, insurgent agents were in the city seeking to destroy it without warseeking to dissolve the Union, and divide effects, by negotiation. Both parties deprecated war; but one of them would make war rather than let the nation survive; and the other would accept war rather than let it perish. And the war came.3 One-eighth of the whole population were colored slaves, not distributed generally over the Union, but localized in the Southern part of it. These slaves constituted a peculiar and powerful interest. All knew that this interest was, somehow, the cause of the war. To strengthen, perpetuate, and extend this interest was the object for which the insurgents would rend the Union, even by war; while the government claimed no right to do more than to restrict the territorial enlargement of it.4 Neither party expected for the war the magnitude or the duration which it has already attained. Neither anticipated that the cause of the conflict might cease with, or even before, the conflict itself should cease. Each looked for an easier triumph, and a result less fundamental and astounding. Both read the same Bible, and pray to the same God; and each invokes his aid against the other. It may seem strange that any men should dare to ask a just Gods assistance in wringing their bread from the sweat of other mens faces; but let us judge not, that we be not judged. The prayers of both could not be answeredthat of neither has been answered fully.5 The Almighty has his own purposes. Woe unto the world because of offenses! for it must needs be that offenses come; but woe to that man by whom the offense cometh. If we shall suppose that American slavery is one of those offenses which, in the providence of God, must needs come, but which, having continued through his appointed time, he now wills to remove, and that he gives to both North and South this terrible war, as the woe due to those by whom the offense came, shall we discern therein any departure from those divine attributes which the believers in a living God always ascribe to him? Fondly do we hopefervently do we praythat this mighty scourge of war may speedily pass away. Yet, if God wills that it continue until all the wealth piled by the bondsmans two hundred and fifty years of unrequited toil shall be sunk, and until every drop of blood drawn by the lash shall be paid by another drawn with the sword, as was said three thousand years ago, so still it must be said, The judgments of the Lord are true and righteous altogether.6 With malice toward none; with charity for all; with firmness in the right, as God gives us to see the right, let us strive on to finish the work we are in; to bind up the nations wounds; to care for him who shall have borne the battle, and for his widow, and his orphanto do all which may achieve and cherish a just and lasting peace among ourselves, and with all nations.QuestionThe judgments of the Lord are true and righteous altogether.What does the use of the affix -ous used in the word righteous indicate about the word?ResponsesA The word righteous is an adverb.The word righteous is an adverb.B The word righteous is a noun.The word righteous is a noun.C The word righteous is an adjective.The word righteous is an adjective.D The word righteous is a verb.The word righteous is a verb. ________ are rules, typically applied to router interfaces that specify permitted and denied traffic.ACL (Access Control Lists) Input a list of employee names and salaries stored in parallel arrays. The salaries should be floating point numbers in increments of 100. For example, a salary of $36,000 should be input as 36.0 and a salary of $85,900 should be input as 85.9. Find the mean (average) salary and display the names and salaries of employees who earn within a range of $5,000 from the mean. In other words, if the mean salary is $45,000, all employees who earn between $40,000 and $50,000 should be displayed in python Carrie is writing an essay and wants to use a word with the same definition as "heroic." She will choose the word based on its