create a project folder lab02 with a program in python named: studentrecords your program must ask the user for only one time the following information: studentid [6 numbers] name [string of characters] last name [string of characters] age [integer number] address [string of characters] phone number [10 integer numbers] ---> later on during the semester we will enter this field as a string in the format xxx-xxx-xxxx

Answers

Answer 1

The python folder that asks the user for only one time his student information is given below:

The Python Code

print("-----Program for Student Information-----")

D = dict()

n = int(input('How many student record you want to store?? '))

# Add student information

# to the dictionary

for i in range(0,n):

   x, y = input("Enter the complete name (First and last name) of student: ").split()

   z = input("Enter contact number: ")

  m = input('Enter Marks: ')

   D[x, y] = (z, m)

   

# define a function for shorting

# names based on first name

def sort():

   ls = list()

   # fetch key and value using

   # items() method

   for sname,details in D.items():

     

       # store key parts as an tuple

       tup = (sname[0],sname[1])

       

       # add tuple to the list

       ls.append(tup)  

       

   # sort the final list of tuples

   ls = sorted(ls)  

   for i in ls:

     

       # print first name and second name

      print(i[0],i[1])

   return

 

# define a function for

# finding the minimum marks

# in stored data

def minmarks():

   ls = list()

   # fetch key and value using

   # items() methods

   for sname,details in D.items():

       # add details second element

       # (marks) to the list

       ls.append(details[1])  

   

   # sort the list elements  

   ls = sorted(ls)  

   print("Minimum marks: ", min(ls))

   

   return

 

# define a function for searching

# student contact number

def searchdetail(fname):

   ls = list()

   

   for sname,details in D.items():

     

       tup=(sname,details)

       ls.append(tup)

       

   for i in ls:

       if i[0][0] == fname:

           print(i[1][0])

   return

 

# define a function for

# asking the options

def option():

 

   choice = int(input('Enter the operation detail: \n \

   1: Sorting using first name \n \

   2: Finding Minimum marks \n \

   3: Search contact number using first name: \n \

   4: Exit\n \

   Option: '))

   

   if choice == 1:

       # function call

       sort()

       print('Want to perform some other operation??? Y or N: ')

       inp = input()

       if inp == 'Y':

           option()

           

      # exit function call  

       exit()

       

   elif choice == 2:

       minmarks()

       print('Want to perform some other operation??? Y or N: ')

       

       inp = input()

       if inp == 'Y':

           option()

       exit()

       

   elif choice == 3:

       first = input('Enter first name of student: ')

       searchdetail(first)

       

       print('Want to perform some other operation??? Y or N: ')

       inp = input()

       if inp == 'Y':

           option()

           

       exit()

   else:

       print('Thanks for executing me!!!!')

       exit()

       

option()

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1


Related Questions

how do you get lugia in pokemon alpha saphire

Answers

Answer:

You'd have to have encountered Groudon in your story first. You're able to unlock Lugia as early as the battle with the 8th gym leader. First go east of Dufour town, once you landed on the ship go underwater to the control room. Pick up the scanner, and go to Captain Stern in the Stateport city ship dock. Give him the scanner, and he will give you a bell. Go back to Sea Marvel and notice your item start to resonate. There will be a portal underwater in the control room. Go through it and after that you'll see what happens, depending on which bell you have.

Explanation:

Hope this helped!!! Good luck!- Nya~ :3

Answer:

Go to the Sea Mauville

8.7 Code Practice Question 3
Use the following initializer list:
w = [“Algorithm”, “Logic”, “Filter”, “Software”, “Network”, “Parameters”, “Analyze”, “Algorithm”, “Functionality”, “Viruses”]

Create a second array named s. Then, using a loop, store the lengths of each word in the array above. In a separate for loop, print on separate lines the length of the word followed by the word

8.7 Code Practice Question 3Use the following initializer list:w = [Algorithm, Logic, Filter, Software,

Answers

I included my code in the picture below.

8.7 Code Practice Question 3Use the following initializer list:w = [Algorithm, Logic, Filter, Software,

The for loop that can be used to loop through the array s and get the length and the word is a follows:

s = ["Algorithm", "Logic", "Filter", "Software", "Network", "Parameters", "Analyze", "Algorithm", "Functionality", "Viruses"]

for i in s:

   print(len(i), ":", i)

The variable s is used to store the array of strings

The for loop is used to loop through the array .

The length of each string and the string is printed out.  

When the code is run, you will get exactly like the sample Run.  

learn more: https://brainly.com/question/23800781?referrer=searchResults

8.7 Code Practice Question 3Use the following initializer list:w = [Algorithm, Logic, Filter, Software,

In the report layout group the outline form puts the totals at the bottom of each group. true false

Answers

In the report layout group, the outline form puts the totals at the bottom of each group is true.

The report layout determines the appearance of the report. This report layout controls which data fields of the report data set appear, how they are organized, laid out, and more. Reports may have more than one layout, which can then be modified as needed. Example when there are multiple companies in the app, the layout is set on a per-company basis.

How do I run a report from a report layout?

The Report Layouts page appears and lists all the layouts currently available for all reports. In the Report Layouts list,

Select any layout for the reportSelect the Run Report action. On the report request page, select Send to > Microsoft Excel document (data only) Click OK

You can learn more about report layout here https://brainly.com/question/13438811

#SPJ4

When a style is changed in an embedded stylesheet, it automatically applies the change to every page linked to that style sheet.​

a. True
b. False

Answers

The statement that 'When a style is changed in an embedded stylesheet, it automatically applies the change to every page linked to that style sheet' is true.

This is because the stylesheets are usually used in web designing to control the layout of multiple pages at the same time. Hence, when you modify a stylesheet, the change applies to every page linked to that stylesheet.Embedded stylesheetAn embedded stylesheet is a type of stylesheet that is embedded within an HTML document. It is placed in the head section of the HTML document and contains CSS styles. Embedded stylesheets apply to a single HTML page and control the styling of that page. If there are multiple pages that need to have the same styling, each page would need its embedded stylesheet. However, this may lead to repetitive coding, and that is why an external stylesheet is more suitable.PageA page refers to a single HTML document in a web application. Each page typically has its HTML document file and may also have an embedded or an external stylesheet. The content of a page is displayed in a web browser, and it can be navigated to by clicking on a hyperlink

.In conclusion, changing a style in an embedded stylesheet applies the change to every page linked to that stylesheet, and this is an efficient way to modify styles for multiple pages at the same time.

To learn more about stylesheet:

https://brainly.com/question/32226913

#SPJ11

for loop traversing by index; 3 points: while loop; 3 points: 3 examples used to test your code, demonstrating the same outcome for all loops; 1 point: submission of file. Convert this for loop, which traverses by element, into a for loop that traverses by index. Then convert it into a while loop. n is an integer of your choice and word is a variable assigned to a string. You will have to use string indexing. for ch in word: print (ch* n) Once you have written code for your loops, or as you're developing them, choose three examples to demonstrate that all of the loops are result in the same outcome. You should use three different words and potentially three different values of n, whatever you choose! Write this in a script called traversing_strings.py and attach that file to your discussion post.

Answers

To convert the for loop, which traverses by element, into a for loop that traverses by index, use the following code:

word = "YOURSTRING"
n = YOURNUMBER
for i in range(len(word)):
   print (word[i] * n)


To convert the for loop into a while loop, use the following code:
word = "YOURSTRING"
n = YOURNUMBER
i = 0
while i < len(word):
   print (word[i] * n)
   i += 1


To demonstrate that all of the loops are result in the same outcome, you could use the following examples:

Example 1:
word = "hello"
n = 2

Example 2:
word = "apple"
n = 3

Example 3:
word = "cat"
n = 4

Learn more about programming:

https://brainly.com/question/29330362

#SPJ11

Which tab is used to configure editing restrictions in Word 2016? Review References Security Developer

Answers

Answer:

Review Tab is the correct answer to the given question .

Explanation:

Giving the permission to file in word 2016

Click on the Review tab and select the restrict tab .Chose the option allow this type of editing .After that choose the option No changes .Pick the section of the document they want to authorize the adjustments.After that there are multiple option are seen select accordingly  as user need and press ok button .Click on the start permission there is option is seen Start enforcement and press the button option start Enforcing Protection.After that feeding the password if the user need the password is in encrypt form then press encrypt option and click ok .

If the user need to read the file

Click on the Review tab and select the restrict tab .After that choose the option "Stop Protection" .Giving the password you are feeding in the permission of file  .Finally the user will edit the document

Answer:

It's D developer!!!

Explanation:

Took the test and got it right!!!!!!!

2. INFERENCE (a) The tabular version of Bayes theorem: You are listening to the statistics podcasts of two groups. Let us call them group Cool og group Clever. i. Prior: Let prior probabilities be proportional to the number of podcasts each group has made. Cool made 7 podcasts, Clever made 4. What are the respective prior probabilities? ii. In both groups they draw lots to decide which group member should do the podcast intro. Cool consists of 4 boys and 2 girls, whereas Clever has 2 boys and 4 girls. The podcast you are listening to is introduced by a girl. Update the probabilities for which of the groups you are currently listening to. iii. Group Cool does a toast to statistics within 5 minutes after the intro, on 70% of their podcasts. Group Clever doesn't toast. What is the probability that they will be toasting to statistics within the first 5 minutes of the podcast you are currently listening to? Digits in your answer Unless otherwise specified, give your answers with 4 digits. This means xyzw, xy.zw, x.yzw, 0.xyzw, 0.0xyzw, 0.00xyzw, etc. You will not get a point deduction for using more digits than indicated. If w=0, zw=00, or yzw = 000, then the zeroes may be dropped, ex: 0.1040 is 0.104, and 9.000 is 9. Use all available digits without rounding for intermediate calculations. Diagrams Diagrams may be drawn both by hand and by suitable software. What matters is that the diagram is clear and unambiguous. R/MatLab/Wolfram: Feel free to utilize these software packages. The end product shall nonetheless be neat and tidy and not a printout of program code. Intermediate values must also be made visible. Code + final answer is not sufficient. Colours Use of colours is permitted if the colours are visible on the finished product, and is recommended if it clarifies the contents.

Answers

(i) Prior probabilities: The respective prior probabilities can be calculated by dividing the number of podcasts made by each group by the total number of podcasts made.

(ii) Updating probabilities based on the gender of the podcast intro: Since the podcast intro is done by a girl, we need to calculate the conditional probabilities of the group given that the intro is done by a girl.

(iii) Probability of toasting to statistics within the first 5 minutes: Since Group Cool toasts on 70% of their podcasts and Group Clever doesn't toast, we can directly use the conditional probabilities.

Group Cool: 7 podcasts

Group Clever: 4 podcasts

Total podcasts: 7 + 4 = 11

Prior probability of Group Cool: 7/11 ≈ 0.6364 (rounded to four decimal places)

Prior probability of Group Clever: 4/11 ≈ 0.3636 (rounded to four decimal places)

(ii) Updating probabilities based on the gender of the podcast intro: Since the podcast intro is done by a girl, we need to calculate the conditional probabilities of the group given that the intro is done by a girl.

Group Cool: 4 girls out of 6 members

Group Clever: 4 girls out of 6 members

Conditional probability of Group Cool given a girl intro: P(Group Cool | Girl intro) = (4/6) * 0.6364 ≈ 0.4242 (rounded to four decimal places)

Conditional probability of Group Clever given a girl intro: P(Group Clever | Girl intro) = (4/6) * 0.3636 ≈ 0.2424 (rounded to four decimal places)

(iii) Probability of toasting to statistics within the first 5 minutes: Since Group Cool toasts on 70% of their podcasts and Group Clever doesn't toast, we can directly use the conditional probabilities.

Probability of toasting within the first 5 minutes given Group Cool: P(Toasting | Group Cool) = 0.70

Probability of toasting within the first 5 minutes given Group Clever: P(Toasting | Group Clever) = 0

The overall probability of toasting within the first 5 minutes of the podcast you are currently listening to can be calculated using the updated probabilities from step (ii):

P(Toasting) = P(Toasting | Group Cool) * P(Group Cool | Girl intro) + P(Toasting | Group Clever) * P(Group Clever | Girl intro)

           = 0.70 * 0.4242 + 0 * 0.2424

           ≈ 0.2969 (rounded to four decimal places)

The prior probabilities of Group Cool and Group Clever were calculated based on the number of podcasts each group made. Then, the probabilities were updated based on the gender of the podcast intro. Finally, the probability of toasting to statistics within the first 5 minutes of the current podcast was estimated using the conditional probabilities.

To know more about Prior Probabilities, visit

https://brainly.com/question/29381779

#SPJ11

what is control structure write it's types​ .

Answers

Answer

Defination-:

A control statement is a statement and a statement whose execution its control.

Types-:

Selection StatementIteration StatementUnconditional branching Statement

Grid computing, cloud computing, and virtualization are all elements of a(n) ________ MIS infrastructure.
a. virtualized
b. sustainable
c. information
d. agile

Answers

Grid computing, cloud computing, and virtualization are all elements of

a. virtualized MIS infrastructure.

Virtualization is the main answer to the given question. These three elements - grid computing, cloud computing, and virtualization - are all part of a virtualized management information system (MIS) infrastructure. Virtualization refers to the creation of a virtual version of a resource or system, such as servers, storage devices, or operating systems. In the context of an MIS infrastructure, virtualization allows for the abstraction and pooling of computing resources, making them available for multiple applications and users.

Grid computing is a type of distributed computing that utilizes a network of interconnected computers to solve complex problems or perform large-scale computations. It leverages virtualization to allocate and manage resources across multiple machines, creating a unified computing environment.

Cloud computing, on the other hand, is a model for delivering computing services over the internet. It relies heavily on virtualization to provide scalable and flexible access to shared pools of computing resources. By virtualizing servers, storage, and networks, cloud computing enables organizations to efficiently utilize and provision resources on-demand, reducing costs and improving overall operational agility.

Together, these elements contribute to a virtualized MIS infrastructure that offers increased flexibility, scalability, and resource utilization. By leveraging virtualization, organizations can optimize their IT infrastructure, reduce hardware costs, and enhance overall efficiency. This virtualized approach enables seamless allocation and management of computing resources, allowing businesses to adapt quickly to changing demands and maximize their IT investments.

Learn more about MIS infrastructure

brainly.com/question/8812389

#SPJ11

What are the values of a and b after the for loop finishes? int a = 10, b = 3, t; for (int i=1; i<=6; i++) tha; a = i + b; b = t - i; (1 point) A.a = 6 and b = 13 B.a = 6 and b = 7 C.a = 13 and b = 0 D.a = 6 and b = 0 E.a = 0 and b = 13

Answers

At the end of the for loop, the values of a and b will be 6 and 0, respectively. The correct answer is D. a = 6 and b = 0.


Before the for loop starts, a = 10 and b = 3. The for loop will run 6 times, and each time it will execute the following code:

t = a;
a = i + b;
b = t - i;

Let's see what happens to the values of a and b after each iteration:

Iteration 1:
t = 10;
a = 1 + 3 = 4;
b = 10 - 1 = 9;

Iteration 2:
t = 4;
a = 2 + 9 = 11;
b = 4 - 2 = 2;

Iteration 3:
t = 11;
a = 3 + 2 = 5;
b = 11 - 3 = 8;

Iteration 4:
t = 5;
a = 4 + 8 = 12;
b = 5 - 4 = 1;

Iteration 5:
t = 12;
a = 5 + 1 = 6;
b = 12 - 5 = 7;

Iteration 6:
t = 6;
a = 6 + 7 = 13;
b = 6 - 6 = 0;

So after the for loop finishes, a = 13 and b = 0.

Therefore, the correct answer is D. a = 6 and b = 0.

Learn more about loops: https://brainly.com/question/26568485

#SPJ11

The internet service that allows users to navigate among many pages is.

Answers

Answer:

The world wide web

Explanation:

The world wide web is a hypertext information system that links internet documents and allows users to navigate through the Web, by using a computer mouse to click on “links” that go to other web pages.

800,000= 180,000(P/AD, i,5) + 75,000(P/F,i,5) I want to find interest rate (i)
Would you let me know how to calculate this using Excel?

Answers

here is how to compute the above using Excel.

How to calculate the above

Open a new Excel spreadsheet and enter the following values in the cells:

Cell A1: 800,000 (Total amount)

Cell A2: 180,000 (Payment at the end of each period)

Cell A3: 75,000 (Payment at the beginning of each period)

Cell A4: 5 (Number of periods)

In cell A5, enter an initial guess for the interest rate (i). For example, you can start with 0.1 (10%).

In cell B1, enter the formula =A2*PMT(A5,A4,0) to calculate the present value of the periodic payments at the end of each period.

In cell B2, enter the formula =A3*PMT(A5,A4-1,0) to calculate the present value of the periodic payments at the beginning of each period.

In cell B3, enter the formula =A1 - B1 - B2 to calculate the remaining balance.

In cell B4, enter the formula =RATE(A4, B2, B1) to calculate the interest rate.

Learn more about Excel Formula at:

https://brainly.com/question/29280920

#SPJ1

What is the difference between HIPS and anti virus?

Answers

HIPS (Host-based Intrusion Prevention System) and antivirus (AV) are both cybersecurity technologies that are designed to protect against various types of malware and cyber attacks.

Approach: HIPS works by monitoring and analyzing system behavior, looking for suspicious or unauthorized activities that may indicate a cyber attack. It can prevent attacks by blocking or alerting the system administrator to suspicious behavior. Antivirus, on the other hand, uses a signature-based approach to detect known malware and viruses based on their unique code patterns.Coverage: HIPS is designed to protect against a broader range of threats, including zero-day attacks and unknown threats that do not yet have a signature. Antivirus is more effective at detecting known threats but may not be as effective against new or unknown threats.Impact: HIPS can have a higher impact on system performance and may require more configuration and management than antivirus, which typically runs in the background with minimal user intervention.

To learn more about antivirus (AV) click the link below:

brainly.com/question/31785361

#SPJ11

What parts of the computer does it not need to function?​

Answers

Fancy lights, mouse, keyboard, you can do fan but the computer will eventually overheat, it need coolant for it to run for a long while

match the san security control on the right with the appropriate description on the left

Answers

SAN security controls include access control, encryption, monitoring, and logging to ensure the integrity, confidentiality, and availability of data.

1. Access Control - Access control limits access to the storage area network by ensuring only authorized users and devices can connect to it. This is achieved through the use of access control lists (ACLs) and authentication protocols like CHAP (Challenge-Handshake Authentication Protocol).

2. Encryption - Encryption protects data stored in the SAN from unauthorized access and interception. Data is encrypted before being transmitted over the network and decrypted upon receipt by authorized users or devices. Common encryption methods include AES (Advanced Encryption Standard) and TLS (Transport Layer Security).

3. Intrusion Detection and Prevention Systems (IDPS) - IDPS monitors the SAN network for suspicious activities or potential threats, helping to identify and prevent unauthorized access or data breaches. They use a combination of signature-based and anomaly-based detection methods to identify potential security risks.

4. Auditing and Monitoring - Regular audits and monitoring of the SAN ensure that the network's security measures are effective and compliant with established policies. This includes tracking user access, data movement, and configuration changes, as well as monitoring for potential vulnerabilities.

5. Network Segmentation - Network segmentation divides the SAN into smaller, isolated segments to limit the potential impact of a security breach. By restricting access and communication between segments, organizations can better protect sensitive data and prevent unauthorized access.

Please provide the list of SAN security controls and descriptions you'd like me to match, and I'll be happy to help.

To know more about SAN security controls visit:

https://brainly.com/question/13154572

#SPJ11

How are sorting tools helpful for using spreadsheets and databases? Sorting tools let you locate information by searching for names, numbers, or dates in search boxes. Sorting tools give you access to all the information in a spreadsheet so you can see everything at once. Sorting tools help you identify meaningful information and discard the data that are not valuable to your search. Sorting tools allow you to organize data into columns and rows that help you locate what you are looking for.

Answers

Answer:

Sorting tools allow you to organize data into columns and rows that help you locate what you are looking for.

Explanation:

Spreadsheet applications and relational databases are similar in configuration as they are both arranged in rows and columns (tabular). Sorting a spreadsheet or database is useful as it helps to organize data. A sorted spreadsheet or database can be in ascending or descending order which makes it easier and faster to locate rows of data manually or by query.

Answer:

D on edge2020

Explanation:

I really need help in this!!!

Type the correct answer in each box. Spell all words correctly.

How does an employer judge a candidate?

The employer judge's the candidate's ________ for a job.

Answers

Answer:

An employer always looks over a candidate's resume (pronounced "reh-zoo-may" before deciding to hire them.

Explanation:

abel the cell connections and the important components of them.

Answers

The cell connections and the important components of them are tight junctions, adheren junctions, desmosomes, hap junctions, hmidesmosomes, etc., and all these serve very important functions in cell communication.

These cell connections and their components play very crucial roles in tissue development both in multicellular animals and plants, maintaining homeostasis, and various physiological processes. They also regulate the cell behavior, cell signaling, cell adhesion, and the tissue integrity which is very important for the functioning of the whole organism, and contribute to the overall functionality and organization of multicellular organisms.

Learn more about the cell junction here

https://brainly.com/question/28708542

#SPJ4

Which composer below was not part of the classical period?
A. Beethoven B. Bach
C. Mozart

Answers

Explanation:

B. Bach

Thanks for your point

The it team has purchased a few devices that are compatible with the trusted computing group security subsystem class called opal. which of these device specifications will take advantage of opal's security features?

Answers

From the following devices data encryption is the device that will take the advantage of opal's security features.

What exactly do you mean by "data encryption"?

Data encryption is a method of converting plaintext (unencrypted) data to ciphertext (encrypted). Users can use an encryption key to access encrypted data and a decryption key to access decrypted data. Keeping your data safe. Asymmetric vs. symmetric data encryption. The advantages of data encryption.

What are some examples of data encryption?

Individuals and businesses can use encryption to protect sensitive information from hackers. Websites that transmit credit card and bank account numbers, for example, encrypt this data to prevent identity theft and fraud.

To know more about data encryption visit:

https://brainly.com/question/14635177

#SPJ4

PLEASE HELP WITH MY COMPUTER
this thing is popped up and it's annoying. I'm on a HP laptop how do i get rid of it?​

PLEASE HELP WITH MY COMPUTERthis thing is popped up and it's annoying. I'm on a HP laptop how do i get

Answers

Answer:

Escape or turn it off then back on??

Explanation:

I'm not very sure what is going on but idfk

what is the concept used to verify the identity of the remote host with ssh connections?

Answers

The concept used to verify the identity of the remote host with SSH connections is known as host key verification. SSH (Secure Shell) is a cryptographic protocol that enables secure communication between two computers over an unsecured network.

It employs public-key cryptography to authenticate the remote computer and encrypt the data transmitted between them. When an SSH client connects to an SSH server, the two computers must establish a trust relationship to ensure that they are communicating with the intended partner. The SSH protocol utilizes a public-key cryptography-based system for verifying the identity of the remote host.

The SSH server generates a host key (public/private key pair) when it is first installed, and this key is used to authenticate the server to the client. The host key is used by the client to verify that the server it is connecting to is the intended server.

To know more about identity visit:

https://brainly.com/question/11539896

#SPJ11

Which of the following is a strategy used to enhance communication in a presentation?

A) using as few slides as possible by increasing the amount of information on each slide
B) using bullets to break up text and to highlight important talking points
C) using a large variety of backgrounds colors and slide transitions
D) using images to fill up unused space on each slide

Answers

Gonna be B my dude, the other three answers tend to make presentations more difficult for your audience to understand.

A strategy which is used to enhance communication in a presentation is: B. using bullets to break up text and to highlight important talking points.

What is a presentation?

A presentation refers to an act that involves the process of speaking to an audience, in order to formally explain an idea, subject matter, piece of work, topic, product, or project, especially through the use of multimedia resources or samples.

Generally, a strategy which can be used by a teacher or presenter to enhance communication in a presentation is by using bullets to break up text while highlighting important talking points.

Read more on presentation here: brainly.com/question/11827791

Out of 270 racers who started the marathon, 240 completed the race, 21 gave up, and 9 were disqualified. What percentage did not complete the marathon?

Answers

Approximately 11.11% of the racers did not complete the marathon.

To calculate the percentage of racers who did not complete the marathon, we need to find the total number of racers who did not finish the race. This includes both those who gave up and those who were disqualified.

Total number of racers who did not complete the marathon = Number who gave up + Number who were disqualified = 21 + 9 = 30.

Now, we can calculate the percentage using the following formula:

Percentage = (Number who did not complete / Total number of racers) * 100

Percentage = (30 / 270) * 100 = 11.11%.

Learn more about marathon here:

https://brainly.com/question/14845060

#SPJ11

The process by which the raw data are transformed into new variables that have a mean of 0 and variance of 1 is called?

Answers

The process by which the raw data are transformed into new variables that have a mean of 0 and variance of 1 is called standardization.

Standardization is a statistical method for transforming a variable in a dataset into a standard scale.

It transforms the values of a variable such that the new transformed values have a mean of zero and a standard deviation of 1. Standardization can be applied to a single variable or an entire dataset and is useful when comparing variables that have different units or scales.

Learn more about database at:

https://brainly.com/question/31798452

#SPJ11

what needs to be imported at the top of a program if you want to use the dialog box functions?

A java.swing*

B String{} args

C Class

D java

Answers

The correct answer is A) java.swing*.

Why is this used?

If you want to use dialog box functions in a Java program, you need to import the relevant classes and methods from the Swing package, which provides a set of graphical user interface (GUI) components for building desktop applications.

To do this, you can include the following import statement at the top of your program:

import javax.swing.*;

Read more about programs here:

https://brainly.com/question/26134656
#SPJ1

You receive an email from your school's head of IT. There is a concern for a potential hack to the school's servers. IT knows some accounts have been compromised, with their login and passwords overwritten by the hackers. They need to reset the accounts that the hackers have changed the passwords on. However, they don't have access to the passwords directly, and the change records were corrupted by the attack. They need students and staff to confirm their passwords by logging into a secure site. If the login fails, they'll know your account was compromised and reset your account immediately.
a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments phone number and call them about the email.
b.) This is a serious issue, and the email came from the head of IT. The site also shows that it's secure. The longer it takes to reset accounts, the longer the hackers will have access to your account. Follow the instructions in the email from the head of IT.

Answers

Answer:

a.) This could be a phishing attempt. If the situation is as described in the email, this is also serious, but the method suggested is the same methods used by social hackers. Look up your IT Departments; phone number and call them about the email.

Explanation:

This makes sense because many people do these types of scams to trick people into logging into their accounts and actually hack them from there, I actually got an email like this last week to my iCloud address. Make sure that the email actually came from the IT department by checking the domain the email comes from, and call the IT department to make sure.

Hope this helps!

Select the correct answer.

Max has been running a general store for over 50 years. He uses his computer to maintain Inventory and a landline telephone to communicate
with his suppliers. Max's granddaughter suggests that he needs a device that is capable of doing both of these tasks. Which device does Max
need?

A radio
В.HD television
C smart phone
D. telephone

Answers

Answer:

D. smart phone

explanation;

a. what the heck is a radio going to do?

b. an HD television? is his job watching movies?

d. he already has a form of communication he uses, he needs something that can to both things at the same time

c. a smart phone can do everything he needs to do, likely faster than a landline phone or laptop.

In the video case living in a digital society, what country was discussed as having a comprehensive egovernment program using digital technologies?

Answers

Experience Estonian digitalisation, gain insights on how to build a digital society & meet Estonian companies behind our e-solutions.

what country was discussed as having a comprehensive egovernment program using digital technologies?

The Federal Government of the United States has a broad framework of G2C technology to enhance citizen access to Government information and services.

Origin. e-Governance originated in India during the 1970s with a focus on in-house government applications in the areas of defence, economic monitoring, planning and deployment of ICT to manage data intensive functions related to elections, census, tax administration etc.

World Bank explained the E governance as the use by government agencies of information technologies (such as Wide Area Networks, the Internet, and mobile computing) that have the ability to transform relations with citizens, businesses, and other arms of government.

To learn more about egovernment refers to:

https://brainly.com/question/381572

#SPJ4

which search engine is used as a search engine for every web browser? Give two web browser name and describe them which search engine they use. And why?

Answers

That's Go.ogle.

Two famous web browsers present are

Ch romeMo zila Firefox.

Chr ome is known for efficiency and lots of ad shuttering + surfing through higher data usage and heavy n et traffic.

Where as Fire fox is comparatively faster , privacy at peak and surfing through compartively lower dat a usage

Answer:

go..ogle & Micr...osoft ed;.ge

Explanation:

i use go..ogle because its the default search engine so its already there unlike micr...osoft ed;.ge......

Other Questions
100 POINTS PLEASE HELP ASAPImagine youre a forensic scientist working in a crime lab. You work in one of the following units (choose one):- Biology unit (DNA, pathology, blood analysis)- Physical sciences unit (chemistry, physics, geology)- Firearms unit (ballistics, bullet analysis, gun identification)- Document unit (questioned documents, document analysis, and imaging)- Digital unit (networks, databases, computer/smartphone data, internet activity)- Fingerprint unit (fingerprint analysis and identification)- Toxicology unit (drug testing and evidence analysis)This year, you have a budget for new technology. Nows your chance to make your lab stand out! But first, youll have to convince your lab manager that your idea is worth the cost.Research:Do some research online to find an interesting new technology for your lab unit. It can be a technology thats still in development or an existing technology thats new and improved. It should relate to your specialty in some way.Once youve found a new technology you like, answer the following questions.What is the technology and how does it work? (one to two sentences)How does your technology relate to your specialty? (one to two sentences)What interests you about this technology? Why did you choose it? (two to three sentences)ProposalNow its time to convince the boss. Write a proposal to your manager about why your lab unit should have this great new technology. Your proposal should answer the following questions:When was the technology developed? Give a brief history of the technology, including any important names and dates. Is it still being refined, or is it ready for use? (two to three sentences)Why is this technology better than older technology? What are its benefits? (two to three sentences)Has the technology been used in any criminal cases recently? If so, describe one. If not, give an example of how you think it could be used in a modern criminal case. (two to three sentences)Give an example of a criminal case from the past that would have benefited from this technology, if it had existed back then. (two to three sentences)Are there any drawbacks to the technology or challenges in using it? Can it be further improved? Explain. (two to three sentences)Sum up your findings. Why should your lab get this technology? (two to three sentences) In a Godiva shop, 40% of the cookies are plain truffles,20% are black truffles, 10% are cherry cookies, and 30%are a mix of all the others. Suppose you pick one at ran-dom from a prepacked bag that reflects this composition.a. What is the probability of picking a plain truffle?b. What is the probability of picking truffle of any kind?c. If you instead pick three cookies in a row, what isthe probability that all three are black truffles? Cost of Quality Report A quality control activity analysis indicated the following four activity costs of a hotel: Inspecting cleanliness of rooms $175,000 Processing lost customer reservations 40,000 Rework incorrectly prepared room service meal 20,000 Employee training 265,000 Total $500,000 Sales are $4,000,000. Prepare a cost of quality report. Round percent of sales to one decimal place. Cost of Quality Report the degree of agreement among members of an organization about the importance of specific values is referred to as: Recommend strategies that the youth could put in place to ensure their cyber safety when using social media. In your answer, also indicate how this strategy could lead to greater cyber safety. Advices (3 x 3) (9) [21] the process of paying close attention to your behavior in order to shape the way you behave is known as: Model with math a manager needs to rope off a rectangular section for a private party. the length of the section must be 7.6 meters. the manager can use no more than 28 meters of rope. what inequality could you use to find the possible width, w, of the roped-off section? The nurse concludes that a patient newly diagnosed with glaucoma knows the purpose for the prescribed beta-adrenergic blocker timolol (Timoptic) when the client makes which statement The Chief Supreme Court Justice sends your teacher to federal prison. On the way to prison, your teacher stops an assassination plot against the president. Which branch can check/stop the Supreme Court and get your teacher out of jail If a circle is centered at the vertex of the angle, then the arc subtended by the angle's rays is 110 Correct times as long as 1/360th of the circumference of the circle. A circle is centered at the vertex of the angle, and 1/360th of the circumference is 0.04 cm long. What is the length of the arc subtended by the angle's rays of all the ways that people might have made it to chile near the tip of south america by 14,600 year ago, which two have been part of the most recent debate by anthropologists and archeologists? (select two) A single gene mutation occurred in a pea plant that caused it to be chlorophyll deficient. This decrease in chlorophyll might lead to which of the following... a decreased ability to absorb light b. increased ability to absorb light C. increased ATP production d. increased glucose production negative reinforcement refers to applying a(n) _____ consequence. Name and explain at least three reasonswhy the colonies started to become angryat the English Government. is 46.03 greater than or less than 46.030 Walmart tracks the habits of the 100 million customers who visit it stores each week and responds with products and services directed toward those customers' needs based on the information collected. This is an example of ________ marketing. A. undifferentiated B. database C. relationship D. consumer-generated . You receive 23 out of 25 points on an exam. What is your score as a percent? Who developed the philosophical idea of the atom which of the following entity in the certificate authority (ca) hierarchy validates the certificate request from a client? Colligative properties are unique to solutions. select an answer and submit. for keyboard navigation, use the up/down arrow keys to select an answer. a. true b. false