What do people in the movie e.t think about the character E.T
please answer its due in 8:30 PM pleaeee
Answer:
They were scared of him then they felt devotion to him.
Explanation:
can you help me with my homework what should i do
Answer:
what is matter and two examples
How has segmentation of voters influenced direct mail?
The segmentation of voters has had a significant impact on direct mail in political campaigns. With the help of data analytics and voter databases, campaigns can target specific demographics and voter groups with tailored messages and advertising.
This means that campaigns can use direct mail to reach out to specific groups of voters, rather than sending mass mailings to entire regions or zip codes.For example, a campaign may use data to identify a group of voters who are particularly concerned about environmental issues, and then send a direct mail piece that highlights the candidate's positions on environmental policies. This approach allows campaigns to make more effective use of their resources and can increase the likelihood of reaching and persuading specific groups of voters.
To learn more about campaigns click the link below:
brainly.com/question/23323399
#SPJ11
Complete the method/function so that it converts dash/underscore delimited words into camel casing. The first word within the output should be capitalized only if the original word was capitalized. Specifications Challenge.toCamelCase(str) given a string with dashes and underscore, convert to camel case Parameters str: String - String to be converted Return Value String - String without dashes/underscores and camel cased Examples str Return Value "the-stealth-warrior" "theStealthWarrior" "A-B-C" "ABC"
Answer:
I am writing a Python program. Let me know if you want the program in some other programming language.
def toCamelCase(str):
string = str.replace("-", " ").replace("_", " ")
string = string.split()
if len(str) == 0:
return str
return string[0] + ''.join(i.capitalize() for i in string[1:])
print(toCamelCase("the-stealth-warrior"))
Explanation:
I will explain the code line by line. First line is the definition of toCamelCase() method with str as an argument. str is basically a string of characters that is to be converted to camel casing in this method.
string = str.replace("-", " ").replace("_", " ") . This statement means the underscore or dash in the entire are removed. After removing the dash and underscore in the string (str), the rest of the string is stored in string variable.
Next the string = string.split() uses split() method that splits or breaks the rest of the string in string variable to a list of all words in this variable.
if len(str) == 0 means if the length of the input string is 0 then return str as it is.
If the length of the str string is not 0 then return string[0] + ''.join(i.capitalize() for i in string[1:]) will execute. Lets take an example of a str to show the working of this statement.
Lets say we have str = "the-stealth-warrior". Now after removal of dash in by replace() method the value stored in string variable becomes the stealth warrior. Now the split() method splits this string into list of three words the, stealth, warrior.
Next return string[0] + ''.join(i.capitalize() for i in string[1:]) has string[0] which is the word. Here join() method is used to join all the items or words in the string together.
Now i variable moves through the string from index 1 and onward and keeps capitalizing the first character of the list of every word present in string variable from that index position to the end. capitalize() method is used for this purpose.
So this means first each first character of each word in the string starting from index position 1 to the end of the string is capitalized and then all the items/words in string are joined by join() method. This means the S of stealth and W of warrior are capitalized and joined as StealthWarrior and added to string[0] = the which returns theStealthWarrior in the output.
he following items are inserted in the given order into an avl-tree: 6, 1, 4, 3, 5, 2, 7. which node is in the deepest node?
To determine the deepest node in the AVL tree after inserting the items in the given order, we need to construct the tree and calculate the height of each node.
Starting with the root node, we insert the items in the given order and balance the tree using rotations to maintain the AVL property:
6
/ \
1 7
\
4
/ \
3 5
\
2
The deepest node is the node with the largest height. We can calculate the height of each node using the formula:
height = 1 + max(left_height, right_height)
where left_height and right_height are the heights of the left and right subtrees, respectively.
Starting at the bottom of the tree, we can calculate the height of each node as follows:
Node 2 has a height of 1.
arduino
3 (height = 2)
/ \
- -
Node 3 has a height of 2.
arduino
4 (height = 3)
/ \
3 5 (height = 2)
Node 4 has a height of 3.
arduino
1 (height = 1)
\
4 (height = 3)
/ \
3 5
\
2 (height = 2)
Node 1 has a height of 1.
arduino
Copy code
7 (height = 1)
/ \
6 -
Node 7 has a height of 1.
arduino
6 (height = 2)
/ \
1 7
\ \
4 -
/ \
3 5
\
2
Node 6 has a height of 2.
Therefore, the deepest node in the AVL tree is node 4, which has a height of 3.
To learn more about construct
https://brainly.com/question/13425324
#SPJ11
lucca wants to prevent workstations on his network from attacking each other. if lucca's corporate network looks like the network shown here, what technology should he select to prevent laptop a from being able to attack workstation b?
In this instance, Lucca's unique demand is to prevent assaults rather than just detect them, necessitating the use of a HIPS to satisfy his requirements.
What precisely is HIPS?A security strategy known as a host intrusion prevention system (HIPS) uses external software tools to detect and stop hostile activity. Endpoint device protection is frequently provided by host-based intrusion prevention systems.
How do we describe Lucca's technical issue?HIPS. -A host-based solution is necessary when endpoints are linked without a network control point in between them. In this instance, Lucca's unique demand is to prevent assaults rather than just detect them, necessitating the use of a HIPS to satisfy his requirements. If Lucca chooses a product with those qualities, which are common in contemporary products, he could have access to extra valuable features like data loss protection and system compliance profiling.
To know more about network security visit
brainly.com/question/14407522
#SPJ4
I get the following error : TypeError: append() missing 1 required positional argument: 'values'
where did I go wrong ?
The error "TypeError: append() missing 1 required positional argument: 'values'" is caused by the fact that the `append()` method is missing an argument that is required by the program.
To fix the error, add a value argument to the append() method. This error occurs when you forget to include a value to be appended to a list. It is a type error. Here is an example of how to append a value to a list correctly:```values = [1, 2, 3, 4]values.append(5)```ExplanationThe `append()` method is used to add new items to an existing list in python.
It adds the item to the end of the list. Here is the syntax for the `append()` method:`list.append(item)`In this syntax, `list` is the name of the list you want to append the item to, and `item` is the new item you want to add to the list.The error message is indicating that you are missing the `values` argument for the `append()` method. To fix this, make sure to provide a value for the method.
To know more about error visit:
https://brainly.com/question/32108561
#SPJ11
a hard disk is a _ storage device
electro-mechanical data storage device
A computer program that is installed on the hard drive of a personal computer and that requires a computer operating system such as Microsoft Windows or Apple OSX to run
A computer program that is installed on the hard drive of a personal computer and requires an operating system such as Microsoft Windows or Apple OSX to run is known as an application or software. It is designed to run on an operating system, which is the software that manages computer hardware and software resources.
A computer program that is installed on the hard drive of a personal computer and requires a computer operating system such as Microsoft Windows or Apple OSX to run is called an application or software. In computing, a program is a collection of instructions that tell a computer what to do.The term "program" is frequently used synonymously with "application" and "software," and the terms are frequently used interchangeably. These programs are designed to run on an operating system, which is a system software that manages computer hardware and software resources and provides common services for computer programs. Operating systems serve as a link between hardware and software and provide a platform for programs to operate on.
Users interact with software by using the operating system's graphical user interface (GUI). The graphical user interface (GUI) is a type of user interface that allows users to interact with electronic devices using graphical icons and visual indicators instead of text-based user interfaces.A personal computer's hard drive, also known as the hard disk, is where programs and data are stored. Programs are installed on the hard drive so that they may be accessed by the user when needed. In summary, a computer program that is installed on the hard drive of a personal computer and requires an operating system such as Microsoft Windows or Apple OSX to run is known as an application or software. It is designed to run on an operating system, which is the software that manages computer hardware and software resources.
Learn more about Software here,https://brainly.com/question/28224061
#SPJ11
A computer program is a software application that requires a computer operating system such as Microsoft Windows or Apple OSX to run.
A computer program is a software application that is installed on the hard drive of a personal computer. These programs are designed to perform specific tasks or functions, such as word processing, web browsing, or gaming. However, in order to run these programs, a computer operating system is required.
An operating system is a software that manages computer hardware and software resources and provides common services for computer programs. It acts as an intermediary between the computer's hardware and the software applications, allowing them to communicate and interact with each other.
Examples of popular computer operating systems include Microsoft Windows and Apple OSX. These operating systems provide a platform for computer programs to run and utilize the computer's resources effectively. They provide a user-friendly interface, file management system, and other essential services that enable users to interact with their computer and run various software applications.
Without an operating system, computer programs would not be able to execute and utilize the computer's resources effectively. The operating system provides the necessary environment and resources for the programs to run, ensuring their proper functioning and compatibility with the computer's hardware.
Learn more:About computer program here:
https://brainly.com/question/3397678
#SPJ11
the page that is being used for i/o some os pages a new page that has just been brought in a page that belongs to a high priority process
The page that is being used for Input/output (I/O) is a new page that has just been brought in and belongs to a high-priority process.
When a process needs to perform I/O operations, it may require additional pages of memory to store the data being read from or written to external devices. In this case, the operating system (OS) will bring in a new page from secondary storage (such as a hard disk) into the main memory (RAM). This newly brought-in page is then used for the I/O operation.
Furthermore, since the process that requires this page is of high priority, it is given precedence over other processes in terms of accessing memory. This ensures that the high-priority process can quickly perform its I/O operations and continue executing without unnecessary delays.
Overall, the page being used for I/O is a recently brought-in page that specifically belongs to a high-priority process.
Know more about Input/output (I/O) here,
https://brainly.com/question/13566370
#SPJ11
In what year was the TED group created?
Answer:
1984
Explanation:
what is the predefined business logic within a blockchain called?
Smart contracts: With so much being said and published about blockchain, it appears that the technology may be misunderstood by the general public. They see it as a one-man band that can do everything, including enabling bitcoin, safeguard data, brew coffee, and more, rather than a technology.
Blockchain is a distributed, immutable database that simplifies the tracking of assets and the recording of transactions inside a business network. An asset may be tangible (such a home, automobile, sum of money, or plot of land) or intangible (intellectual property, patents, copyrights, branding). A blockchain network allows for the recording and trading of practically everything of value, lowering risk and increasing efficiency for all parties. Business depends heavily on information, which is why blockchain technology is significant. It is preferable if it is received promptly and accurately.Because it provides real-time, shareable, and fully transparent data that is recorded on an immutable ledger and only available to users of a permissioned network, blockchain is the perfect technology for delivering such information.
To learn more about " database " Click on below link brainly.com/question/28391263
#SPJ4
help pls
cmu cs 0
4.1.2.1 Creating Groups checkpoint 1
Answer: For each group, you want to add, click the [ +] sign and select it from the list that shows. A Check Point Host can have multiple interfaces but no routing takes place. It is an endpoint that receives traffic for itself through its interfaces. (In comparison, a Security Gateway routes traffic between its multiple interfaces.)
Explanation: The Check Point Rule Base must not have these objects. If it does, the Security Management Server will not generate Access Lists. OSE devices report their network interfaces and setup at boot time. Each OSE device has a different command to list its configuration. You must define at least one interface for each device, or the Install Policy will fail.
(Java) What, in your opinion, is wrong with this nested for loop?
for(int x = 0; x < 10; x++){
for(int x = 10; x > 0; x--){
System.out.println(x);
}
}
The issue with this nested for loop in Java is the declarationof the second loop variable.
Why is this so?Both loops use the same variable name"x" for iteration. This creates a conflict because the inner loop re-declares the "x" variable, leading to a compilation error.
Each loop should have a unique variable name to avoid naming conflicts and ensure proper loop execution.
The corrected code will be --
for (int x =0; x < 10; x++) {
for (int y = 10;y > 0; y--) {
System.out.println(y);
}
}
Learn more about Java at:
https://brainly.com/question/25458754
#SPJ1
Which of the following best describes an operating system's actions during typical system use? (1 point) A. Communicates between the computer and the end user or external world. B. Performs a specific action or function and processes data for the end user. C The main action an operating system performs during typical use is storing memory. D. Facilitates a computer's basic functions, such as executing applications, communicating between software applications programs and hardware.
Answer:
D. Facilitates a computer's basic functions, such as executing applications, communicating between software applications programs and hardware.
Explanation:
Operating systems generally act as the middle man between programs and hardware, though the code for the applications is usually executed by the hardware directly.
Having many _________ values in your database wastes space and causes problems working out totals.
Having many null values in your database wastes space and causes problems working out totals.
What are NULL values in SQL?The SQL NULL is known to be a word that connote a term used that is often used to depict a missing value.
A null value can be seen in any form of a relational database is known to also be one that is often used if the value in a column is said to unknown or missing.
Note that there are different kinds of database system and as such one can say that A null value in a relational database is used when the value in a column is unknown or missing and then it acts in its place.
Learn more about null values from
https://brainly.com/question/15593034
#SPJ1
BRAINLIEST 14 points
The Great Firewall of China _____. Select 4 options.
blocks websites
filters all emails
filters social media
filters web searches
jams signals
Answer:
the first four options
Explanation:
they make the most sense
The Great Firewall of China is designed and developed to:
Block websites.Filter all emails.Filter social media.Filter web searches.What is the Great Firewall of China?The Great Firewall of China can be defined as a set of legislation and network security protocol that domestically monitors, regulates and controls inbound and outbound Internet traffic in the People's Republic of China, based on set aside security rules.
In this context, the Great Firewall of China is designed and developed to domestically:
Block websites.Filter all emails.Filter social media.Filter web searches.Read more on Great Firewall of China here: https://brainly.com/question/27411286
#SPJ2
Select the three type of undesirable software.
virus
firewall
peer-to-peer
nannyware
adware
malware
VPN
Virus, Adware, Malware
a workstation was patched last night with the latest operating system security update. this morning, the workstation only displays a blank screen. you restart the computer, but the operating system fails to load. what is the next step you should attempt to boot this workstation? reboot the workstation into safe mode and disable windows services/applications reboot the workstation into safe mode and roll back the recent security update reboot the workstation into safe mode, open regedit, and repair the windows registry reboot the workstation into the bios and reconfigure boot options see all questions back next question
Answer:
A workstation was patched last night with the latest operating system security update. This morning, the workstation only displays a black screen
Explanation:
navigation tracking uses satellites to transmit signals that determine the location of a device. called
Global positioning system (GPS) tracking, the technology is used in a variety of applications, including navigation, surveillance, and theft prevention.
What is Navigation?
Navigation is the process of planning, recording and controlling the movement of a vehicle from one place to another. It involves the use of various navigational tools such as maps, compasses, GPS systems, radar, and sonar to determine the position of a vehicle at any given time. It also involves accurate calculation of time, speed, and direction in order to get to the desired destination safely and efficiently. Navigation plays a critical role in the transportation industry, military operations, and marine exploration.
To know more about Navigation
https://brainly.com/question/146597
#SPJ4
Information system using the latest information technology has benefited which modern need?.
Information system using the latest information technology has benefited increased data security.
Give a brief account on data security.Data security is the process of guarding digital data against unwanted access, corruption, and theft across all stages of its life. It is a notion that covers every facet of information security, including the logical security of software programs, administrative and access controls, and the physical security of hardware and storage devices. It also contains the policies and practices of the organization.
Strong data security measures, when correctly executed, will safeguard an organization's information assets from cybercriminal activities but they also guard against insider threats and human mistake, which continue to be among the top causes of data breaches in the present. Data security entails the use of tools and technology that increase an organization's awareness of where its crucial data is located and how it is being used. These solutions ought to be able to implement security measures like encryption, data masking, and redaction of sensitive files, as well as automate reporting to speed up audits and ensure compliance with legal standards.
To know more about, data security, visit :
https://brainly.com/question/14487203
#SPJ1
listen with readspeaker which remote access protocol is used over an ethernet network?
The remote access protocol that is typically used over an Ethernet network is the Remote Desktop Protocol (RDP).
This protocol is used to remotely connect to a computer or server over a network connection, allowing users to access resources and applications from a remote location. RDP is commonly used for remote support, remote administration, and remote access to desktops and applications. Other remote access protocols that may be used over an Ethernet network include Virtual Network Computing (VNC) and Secure Shell (SSH). However, RDP is the most commonly used protocol for remote access over an Ethernet network.
Learn more about Remote Desktop Protocol: https://brainly.com/question/14099873
#SPJ11
A database administrator wants to correlate pairs of rows from the same table. Which type of join should the database administrator use?
To construct two or more database copies of the same table using a self-join, a table is linked to itself using a table alias. A join condition is then used to match the rows from the various copies of the table.
Which join may be used to link rows from two tables so that there is a match in every row in each table?Data from both tables is retrieved using the INNER JOIN statement, which only returns records or rows with matching values.
Which of the following joins is used to return every row from every table when the join condition is met?When the join condition is met, the MySQL INNER JOIN is utilised to return all rows from all tables.
To know more about database visit:-
https://brainly.com/question/3804672
#SPJ1
I need to learn c++ program . can someone please help me With this
Answer:
sure i can help
Explanation:
A collection of wiress connecting the CPU with main memory that is used to identify particular location is called
Answer:
Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory. The width of the address bus (that is, the number of wires) determines how many unique memory locations can be addressed.
Explanation:
Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.
What is CPU?
The electronic equipment that carries out the instructions included in a computer program is known as a central processing unit (CPU), sometimes known as a central processor, main processor, or simply processor.
The CPU executes fundamental mathematical, logical, controlling, and input/output (I/O) activities as directed by the program's instructions. In contrast, specialized processors like graphics processing units and external components like main memory and I/O circuitry (GPUs).
Although CPUs' shape, design, and implementation have evolved throughout time, their basic function has remained mostly same. The arithmetic-logic unit (ALU), which performs arithmetic and logic operations, processor registers.
Therefore, Address buses are made up of a collection of wires connecting the CPU with main memory that is used to identify particular locations (addresses) in main memory.
To learn more about CPU, refer to the link:
https://brainly.com/question/16254036
#SPJ5
Why is the no video recording in iPhone camera
Answer:
it really does depend on what iphone you have but go to Settings > Privacy > Camera and disable the last app that was allowed access to the phone's Camera. check the camera app again and you should see the video recording access.
hope this helped!
Answer:
Wait is this a genuine question im not sure how to answer
Explanation:
If you were to make a looping photo carousel you would select...
A both the state 'Next' and check Wrap from last to first
B check Wrap from last to first
C State 1
D the state 'Next'
To make a looping photo carousel, you would select A both the state 'Next' and check 'Wrap from last to first'. This would allow the carousel to loop continuously without stopping at the last photo.
By selecting the state 'Next', the carousel will move to the next photo in the sequence. By checking the "Wrap from last to first" option, the carousel will automatically move back to the first photo after reaching the last one, creating a continuous loop. Without this option, the carousel would stop at the last photo and not continue. Therefore, the correct answer is A both the state 'Next' and check Wrap from last to first.
Learn more about looping: https://brainly.com/question/28814421
#SPJ11
select the name, creaturetype, creaturesubtype, gender, and appearance from litcharacters for creatures who have made 5 or more appearances (this includes characters that have made 5 appearances). order ascending by the character id. what is the first entry?
I'm sorry, but as an I don't have access to a specific database or its data. Therefore, I cannot retrieve the first entry from the "litcharacters" table as requested.
To obtain the first entry from the "litcharacters" table with the given conditions, you would need to execute a SQL query on the database that contains the table. The query would look something like this:
SELECT name, creaturetype, creaturesubtype, gender, appearance
FROM litcharacters
WHERE appearance >= 5
ORDER BY character_id ASC
LIMIT 1;
Executing this query on the appropriate database would give you the first entry from the "litcharacters" table that meets the criteria of having 5 or more appearances.
Learn more about database here
https://brainly.com/question/24027204
#SPJ11
You are in a group of five people whose small airplane crashed and
now you are stranded on a deserted tropical island for 24 hours. The
safety island is 3 miles away and can not be reached by walking.
Limited supplies from the plane have washed ashore(a flashlight, 2
bottles of water, a sheet, the tail of the plane, a bottle of perfume,
a ball of string, and a knife). Flora(plants/vegetation) and
fauna(animals) exist on the island.
1. You must use all of the supplies
2. Think of the "what if" issues: ex. How will your group
protect themselves from the animals? How can you reach
the safety island? How will your group eat? The sea
contains salt water, etc.
First and foremost, it's important to prioritize survival and safety in this situation.
What are the necessary steps?Here are some steps that the group could take using the available supplies:
Using the knife and ball of string, construct a shelter that can protect the group from the elements and provide a place to sleep. The sheet can be used as a roof or to create walls, and the tail of the plane can be used for support.
With the flashlight and knife, explore the island to find a fresh water source. If one is not found, the group can ration the two bottles of water until they can be rescued.
Use the knife and ball of string to create weapons and tools for protection and gathering food. The perfume can be used as a deterrent for some animals.
If there is no source of fresh water on the island, the group can use the ball of string and sheet to create a solar still to purify salt water from the sea.
Finally, the group can work together to come up with a plan to safely make their way to the safety island. This may involve using the tail of the plane as a makeshift raft, or building a larger boat using materials found on the island.
To protect themselves from animals, the group can create weapons and tools using the knife and ball of string.
Learn more about word problem on;
https://brainly.com/question/21405634
#SPJ1
write a program to loop 1,2,3,4,5,....20th term using for...next statement
Here's a program that uses the for...next statement to loop through the numbers 1 to 20:
The Python Programfor i in range(1, 21):
print(i)
In this program, the for statement is used to iterate through the range of numbers from 1 to 20 (inclusive). The range function generates a sequence of numbers starting from the first parameter (1) and ending before the second parameter (21). Inside the loop, each number i is printed using the print function.
This program will output the numbers 1 to 20, each on a separate line.
Read more about programs here:
https://brainly.com/question/26497128
#SPJ1